gdb: Convert language la_pass_by_reference field to a method
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
b811d2c2 3 Copyright (C) 1992-2020 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
d55e5aa6 23#include "gdb_regex.h"
4de283e4
TT
24#include "frame.h"
25#include "symtab.h"
26#include "gdbtypes.h"
14f9c5c9 27#include "gdbcmd.h"
4de283e4
TT
28#include "expression.h"
29#include "parser-defs.h"
30#include "language.h"
31#include "varobj.h"
4de283e4
TT
32#include "inferior.h"
33#include "symfile.h"
34#include "objfiles.h"
35#include "breakpoint.h"
14f9c5c9 36#include "gdbcore.h"
4c4b4cd2 37#include "hashtab.h"
4de283e4
TT
38#include "gdb_obstack.h"
39#include "ada-lang.h"
40#include "completer.h"
4de283e4
TT
41#include "ui-out.h"
42#include "block.h"
04714b91 43#include "infcall.h"
4de283e4
TT
44#include "annotate.h"
45#include "valprint.h"
d55e5aa6 46#include "source.h"
4de283e4 47#include "observable.h"
692465f1 48#include "stack.h"
79d43c61 49#include "typeprint.h"
4de283e4 50#include "namespace.h"
7f6aba03 51#include "cli/cli-style.h"
4de283e4 52
40bc484c 53#include "value.h"
4de283e4
TT
54#include "mi/mi-common.h"
55#include "arch-utils.h"
56#include "cli/cli-utils.h"
268a13a5
TT
57#include "gdbsupport/function-view.h"
58#include "gdbsupport/byte-vector.h"
4de283e4 59#include <algorithm>
ccefe4c4 60
4c4b4cd2 61/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 62 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
63 Copied from valarith.c. */
64
65#ifndef TRUNCATION_TOWARDS_ZERO
66#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
67#endif
68
d2e4a39e 69static struct type *desc_base_type (struct type *);
14f9c5c9 70
d2e4a39e 71static struct type *desc_bounds_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct value *desc_bounds (struct value *);
14f9c5c9 74
d2e4a39e 75static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 78
556bdfd4 79static struct type *desc_data_target_type (struct type *);
14f9c5c9 80
d2e4a39e 81static struct value *desc_data (struct value *);
14f9c5c9 82
d2e4a39e 83static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 86
d2e4a39e 87static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 88
d2e4a39e 89static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static struct type *desc_index_type (struct type *, int);
14f9c5c9 94
d2e4a39e 95static int desc_arity (struct type *);
14f9c5c9 96
d2e4a39e 97static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 98
d2e4a39e 99static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 100
40bc484c 101static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 102
4c4b4cd2 103static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
104 const struct block *,
105 const lookup_name_info &lookup_name,
106 domain_enum, struct objfile *);
14f9c5c9 107
22cee43f 108static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
109 const lookup_name_info &lookup_name,
110 domain_enum, int, int *);
22cee43f 111
d12307c1 112static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 113
76a01679 114static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 115 const struct block *);
14f9c5c9 116
4c4b4cd2
PH
117static int num_defns_collected (struct obstack *);
118
d12307c1 119static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 120
e9d9f57e 121static struct value *resolve_subexp (expression_up *, int *, int,
699bd4cf
TT
122 struct type *, int,
123 innermost_block_tracker *);
14f9c5c9 124
e9d9f57e 125static void replace_operator_with_call (expression_up *, int, int, int,
270140bd 126 struct symbol *, const struct block *);
14f9c5c9 127
d2e4a39e 128static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 129
a121b7c1 130static const char *ada_op_name (enum exp_opcode);
4c4b4cd2
PH
131
132static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 133
d2e4a39e 134static int numeric_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int integer_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int scalar_type_p (struct type *);
14f9c5c9 139
d2e4a39e 140static int discrete_type_p (struct type *);
14f9c5c9 141
a121b7c1 142static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
988f6b3d 143 int, int);
4c4b4cd2 144
d2e4a39e 145static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 146
b4ba55a1
JB
147static struct type *ada_find_parallel_type_with_name (struct type *,
148 const char *);
149
d2e4a39e 150static int is_dynamic_field (struct type *, int);
14f9c5c9 151
10a2c479 152static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 153 const gdb_byte *,
4c4b4cd2
PH
154 CORE_ADDR, struct value *);
155
156static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 157
28c85d6c 158static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 159
d2e4a39e 160static struct type *to_static_fixed_type (struct type *);
f192137b 161static struct type *static_unwrap_type (struct type *type);
14f9c5c9 162
d2e4a39e 163static struct value *unwrap_value (struct value *);
14f9c5c9 164
ad82864c 165static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 166
ad82864c 167static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 168
ad82864c
JB
169static long decode_packed_array_bitsize (struct type *);
170
171static struct value *decode_constrained_packed_array (struct value *);
172
173static int ada_is_packed_array_type (struct type *);
174
175static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 176
d2e4a39e 177static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 178 struct value **);
14f9c5c9 179
4c4b4cd2
PH
180static struct value *coerce_unspec_val_to_type (struct value *,
181 struct type *);
14f9c5c9 182
d2e4a39e 183static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 184
d2e4a39e 185static int equiv_types (struct type *, struct type *);
14f9c5c9 186
d2e4a39e 187static int is_name_suffix (const char *);
14f9c5c9 188
73589123
PH
189static int advance_wild_match (const char **, const char *, int);
190
b5ec771e 191static bool wild_match (const char *name, const char *patn);
14f9c5c9 192
d2e4a39e 193static struct value *ada_coerce_ref (struct value *);
14f9c5c9 194
4c4b4cd2
PH
195static LONGEST pos_atr (struct value *);
196
3cb382c9 197static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 198
53a47a3e
TT
199static struct value *val_atr (struct type *, LONGEST);
200
d2e4a39e 201static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 202
4c4b4cd2
PH
203static struct symbol *standard_lookup (const char *, const struct block *,
204 domain_enum);
14f9c5c9 205
108d56a4 206static struct value *ada_search_struct_field (const char *, struct value *, int,
4c4b4cd2
PH
207 struct type *);
208
0d5cff50 209static int find_struct_field (const char *, struct type *, int,
52ce6436 210 struct type **, int *, int *, int *, int *);
4c4b4cd2 211
d12307c1 212static int ada_resolve_function (struct block_symbol *, int,
4c4b4cd2 213 struct value **, int, const char *,
2a612529 214 struct type *, int);
4c4b4cd2 215
4c4b4cd2
PH
216static int ada_is_direct_array_type (struct type *);
217
72d5681a
PH
218static void ada_language_arch_info (struct gdbarch *,
219 struct language_arch_info *);
714e53ab 220
52ce6436
PH
221static struct value *ada_index_struct_field (int, struct value *, int,
222 struct type *);
223
224static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
225 struct expression *,
226 int *, enum noside);
52ce6436
PH
227
228static void aggregate_assign_from_choices (struct value *, struct value *,
229 struct expression *,
230 int *, LONGEST *, int *,
231 int, LONGEST, LONGEST);
232
233static void aggregate_assign_positional (struct value *, struct value *,
234 struct expression *,
235 int *, LONGEST *, int *, int,
236 LONGEST, LONGEST);
237
238
239static void aggregate_assign_others (struct value *, struct value *,
240 struct expression *,
241 int *, LONGEST *, int, LONGEST, LONGEST);
242
243
244static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
245
246
247static struct value *ada_evaluate_subexp (struct type *, struct expression *,
248 int *, enum noside);
249
250static void ada_forward_operator_length (struct expression *, int, int *,
251 int *);
852dff6c
JB
252
253static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
254
255static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
256 (const lookup_name_info &lookup_name);
257
4c4b4cd2
PH
258\f
259
ee01b665
JB
260/* The result of a symbol lookup to be stored in our symbol cache. */
261
262struct cache_entry
263{
264 /* The name used to perform the lookup. */
265 const char *name;
266 /* The namespace used during the lookup. */
fe978cb0 267 domain_enum domain;
ee01b665
JB
268 /* The symbol returned by the lookup, or NULL if no matching symbol
269 was found. */
270 struct symbol *sym;
271 /* The block where the symbol was found, or NULL if no matching
272 symbol was found. */
273 const struct block *block;
274 /* A pointer to the next entry with the same hash. */
275 struct cache_entry *next;
276};
277
278/* The Ada symbol cache, used to store the result of Ada-mode symbol
279 lookups in the course of executing the user's commands.
280
281 The cache is implemented using a simple, fixed-sized hash.
282 The size is fixed on the grounds that there are not likely to be
283 all that many symbols looked up during any given session, regardless
284 of the size of the symbol table. If we decide to go to a resizable
285 table, let's just use the stuff from libiberty instead. */
286
287#define HASH_SIZE 1009
288
289struct ada_symbol_cache
290{
291 /* An obstack used to store the entries in our cache. */
292 struct obstack cache_space;
293
294 /* The root of the hash table used to implement our symbol cache. */
295 struct cache_entry *root[HASH_SIZE];
296};
297
298static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 299
4c4b4cd2 300/* Maximum-sized dynamic type. */
14f9c5c9
AS
301static unsigned int varsize_limit;
302
67cb5b2d 303static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
304#ifdef VMS
305 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
306#else
14f9c5c9 307 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 308#endif
14f9c5c9 309
4c4b4cd2 310/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 311static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 312 = "__gnat_ada_main_program_name";
14f9c5c9 313
4c4b4cd2
PH
314/* Limit on the number of warnings to raise per expression evaluation. */
315static int warning_limit = 2;
316
317/* Number of warning messages issued; reset to 0 by cleanups after
318 expression evaluation. */
319static int warnings_issued = 0;
320
321static const char *known_runtime_file_name_patterns[] = {
322 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
323};
324
325static const char *known_auxiliary_function_name_patterns[] = {
326 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
327};
328
c6044dd1
JB
329/* Maintenance-related settings for this module. */
330
331static struct cmd_list_element *maint_set_ada_cmdlist;
332static struct cmd_list_element *maint_show_ada_cmdlist;
333
c6044dd1
JB
334/* The "maintenance ada set/show ignore-descriptive-type" value. */
335
491144b5 336static bool ada_ignore_descriptive_types_p = false;
c6044dd1 337
e802dbe0
JB
338 /* Inferior-specific data. */
339
340/* Per-inferior data for this module. */
341
342struct ada_inferior_data
343{
344 /* The ada__tags__type_specific_data type, which is used when decoding
345 tagged types. With older versions of GNAT, this type was directly
346 accessible through a component ("tsd") in the object tag. But this
347 is no longer the case, so we cache it for each inferior. */
f37b313d 348 struct type *tsd_type = nullptr;
3eecfa55
JB
349
350 /* The exception_support_info data. This data is used to determine
351 how to implement support for Ada exception catchpoints in a given
352 inferior. */
f37b313d 353 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
354};
355
356/* Our key to this module's inferior data. */
f37b313d 357static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
358
359/* Return our inferior data for the given inferior (INF).
360
361 This function always returns a valid pointer to an allocated
362 ada_inferior_data structure. If INF's inferior data has not
363 been previously set, this functions creates a new one with all
364 fields set to zero, sets INF's inferior to it, and then returns
365 a pointer to that newly allocated ada_inferior_data. */
366
367static struct ada_inferior_data *
368get_ada_inferior_data (struct inferior *inf)
369{
370 struct ada_inferior_data *data;
371
f37b313d 372 data = ada_inferior_data.get (inf);
e802dbe0 373 if (data == NULL)
f37b313d 374 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
375
376 return data;
377}
378
379/* Perform all necessary cleanups regarding our module's inferior data
380 that is required after the inferior INF just exited. */
381
382static void
383ada_inferior_exit (struct inferior *inf)
384{
f37b313d 385 ada_inferior_data.clear (inf);
e802dbe0
JB
386}
387
ee01b665
JB
388
389 /* program-space-specific data. */
390
391/* This module's per-program-space data. */
392struct ada_pspace_data
393{
f37b313d
TT
394 ~ada_pspace_data ()
395 {
396 if (sym_cache != NULL)
397 ada_free_symbol_cache (sym_cache);
398 }
399
ee01b665 400 /* The Ada symbol cache. */
f37b313d 401 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
402};
403
404/* Key to our per-program-space data. */
f37b313d 405static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
406
407/* Return this module's data for the given program space (PSPACE).
408 If not is found, add a zero'ed one now.
409
410 This function always returns a valid object. */
411
412static struct ada_pspace_data *
413get_ada_pspace_data (struct program_space *pspace)
414{
415 struct ada_pspace_data *data;
416
f37b313d 417 data = ada_pspace_data_handle.get (pspace);
ee01b665 418 if (data == NULL)
f37b313d 419 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
420
421 return data;
422}
423
4c4b4cd2
PH
424 /* Utilities */
425
720d1a40 426/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 427 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
428
429 Normally, we really expect a typedef type to only have 1 typedef layer.
430 In other words, we really expect the target type of a typedef type to be
431 a non-typedef type. This is particularly true for Ada units, because
432 the language does not have a typedef vs not-typedef distinction.
433 In that respect, the Ada compiler has been trying to eliminate as many
434 typedef definitions in the debugging information, since they generally
435 do not bring any extra information (we still use typedef under certain
436 circumstances related mostly to the GNAT encoding).
437
438 Unfortunately, we have seen situations where the debugging information
439 generated by the compiler leads to such multiple typedef layers. For
440 instance, consider the following example with stabs:
441
442 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
443 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
444
445 This is an error in the debugging information which causes type
446 pck__float_array___XUP to be defined twice, and the second time,
447 it is defined as a typedef of a typedef.
448
449 This is on the fringe of legality as far as debugging information is
450 concerned, and certainly unexpected. But it is easy to handle these
451 situations correctly, so we can afford to be lenient in this case. */
452
453static struct type *
454ada_typedef_target_type (struct type *type)
455{
78134374 456 while (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
457 type = TYPE_TARGET_TYPE (type);
458 return type;
459}
460
41d27058
JB
461/* Given DECODED_NAME a string holding a symbol name in its
462 decoded form (ie using the Ada dotted notation), returns
463 its unqualified name. */
464
465static const char *
466ada_unqualified_name (const char *decoded_name)
467{
2b0f535a
JB
468 const char *result;
469
470 /* If the decoded name starts with '<', it means that the encoded
471 name does not follow standard naming conventions, and thus that
472 it is not your typical Ada symbol name. Trying to unqualify it
473 is therefore pointless and possibly erroneous. */
474 if (decoded_name[0] == '<')
475 return decoded_name;
476
477 result = strrchr (decoded_name, '.');
41d27058
JB
478 if (result != NULL)
479 result++; /* Skip the dot... */
480 else
481 result = decoded_name;
482
483 return result;
484}
485
39e7af3e 486/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 487
39e7af3e 488static std::string
41d27058
JB
489add_angle_brackets (const char *str)
490{
39e7af3e 491 return string_printf ("<%s>", str);
41d27058 492}
96d887e8 493
67cb5b2d 494static const char *
4c4b4cd2
PH
495ada_get_gdb_completer_word_break_characters (void)
496{
497 return ada_completer_word_break_characters;
498}
499
e2b7af72
JB
500/* la_watch_location_expression for Ada. */
501
de93309a 502static gdb::unique_xmalloc_ptr<char>
e2b7af72
JB
503ada_watch_location_expression (struct type *type, CORE_ADDR addr)
504{
505 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
506 std::string name = type_to_string (type);
507 return gdb::unique_xmalloc_ptr<char>
508 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
509}
510
de93309a
SM
511/* Assuming V points to an array of S objects, make sure that it contains at
512 least M objects, updating V and S as necessary. */
513
514#define GROW_VECT(v, s, m) \
515 if ((s) < (m)) (v) = (char *) grow_vect (v, &(s), m, sizeof *(v));
516
f27cf670 517/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 518 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 519 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 520
de93309a 521static void *
f27cf670 522grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 523{
d2e4a39e
AS
524 if (*size < min_size)
525 {
526 *size *= 2;
527 if (*size < min_size)
4c4b4cd2 528 *size = min_size;
f27cf670 529 vect = xrealloc (vect, *size * element_size);
d2e4a39e 530 }
f27cf670 531 return vect;
14f9c5c9
AS
532}
533
534/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 535 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
536
537static int
ebf56fd3 538field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
539{
540 int len = strlen (target);
5b4ee69b 541
d2e4a39e 542 return
4c4b4cd2
PH
543 (strncmp (field_name, target, len) == 0
544 && (field_name[len] == '\0'
61012eef 545 || (startswith (field_name + len, "___")
76a01679
JB
546 && strcmp (field_name + strlen (field_name) - 6,
547 "___XVN") != 0)));
14f9c5c9
AS
548}
549
550
872c8b51
JB
551/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
552 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
553 and return its index. This function also handles fields whose name
554 have ___ suffixes because the compiler sometimes alters their name
555 by adding such a suffix to represent fields with certain constraints.
556 If the field could not be found, return a negative number if
557 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
558
559int
560ada_get_field_index (const struct type *type, const char *field_name,
561 int maybe_missing)
562{
563 int fieldno;
872c8b51
JB
564 struct type *struct_type = check_typedef ((struct type *) type);
565
1f704f76 566 for (fieldno = 0; fieldno < struct_type->num_fields (); fieldno++)
872c8b51 567 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
568 return fieldno;
569
570 if (!maybe_missing)
323e0a4a 571 error (_("Unable to find field %s in struct %s. Aborting"),
7d93a1e0 572 field_name, struct_type->name ());
4c4b4cd2
PH
573
574 return -1;
575}
576
577/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
578
579int
d2e4a39e 580ada_name_prefix_len (const char *name)
14f9c5c9
AS
581{
582 if (name == NULL)
583 return 0;
d2e4a39e 584 else
14f9c5c9 585 {
d2e4a39e 586 const char *p = strstr (name, "___");
5b4ee69b 587
14f9c5c9 588 if (p == NULL)
4c4b4cd2 589 return strlen (name);
14f9c5c9 590 else
4c4b4cd2 591 return p - name;
14f9c5c9
AS
592 }
593}
594
4c4b4cd2
PH
595/* Return non-zero if SUFFIX is a suffix of STR.
596 Return zero if STR is null. */
597
14f9c5c9 598static int
d2e4a39e 599is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
600{
601 int len1, len2;
5b4ee69b 602
14f9c5c9
AS
603 if (str == NULL)
604 return 0;
605 len1 = strlen (str);
606 len2 = strlen (suffix);
4c4b4cd2 607 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
608}
609
4c4b4cd2
PH
610/* The contents of value VAL, treated as a value of type TYPE. The
611 result is an lval in memory if VAL is. */
14f9c5c9 612
d2e4a39e 613static struct value *
4c4b4cd2 614coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 615{
61ee279c 616 type = ada_check_typedef (type);
df407dfe 617 if (value_type (val) == type)
4c4b4cd2 618 return val;
d2e4a39e 619 else
14f9c5c9 620 {
4c4b4cd2
PH
621 struct value *result;
622
623 /* Make sure that the object size is not unreasonable before
624 trying to allocate some memory for it. */
c1b5a1a6 625 ada_ensure_varsize_limit (type);
4c4b4cd2 626
41e8491f
JK
627 if (value_lazy (val)
628 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
629 result = allocate_value_lazy (type);
630 else
631 {
632 result = allocate_value (type);
9a0dc9e3 633 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 634 }
74bcbdf3 635 set_value_component_location (result, val);
9bbda503
AC
636 set_value_bitsize (result, value_bitsize (val));
637 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
638 if (VALUE_LVAL (result) == lval_memory)
639 set_value_address (result, value_address (val));
14f9c5c9
AS
640 return result;
641 }
642}
643
fc1a4b47
AC
644static const gdb_byte *
645cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
646{
647 if (valaddr == NULL)
648 return NULL;
649 else
650 return valaddr + offset;
651}
652
653static CORE_ADDR
ebf56fd3 654cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
655{
656 if (address == 0)
657 return 0;
d2e4a39e 658 else
14f9c5c9
AS
659 return address + offset;
660}
661
4c4b4cd2
PH
662/* Issue a warning (as for the definition of warning in utils.c, but
663 with exactly one argument rather than ...), unless the limit on the
664 number of warnings has passed during the evaluation of the current
665 expression. */
a2249542 666
77109804
AC
667/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
668 provided by "complaint". */
a0b31db1 669static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 670
14f9c5c9 671static void
a2249542 672lim_warning (const char *format, ...)
14f9c5c9 673{
a2249542 674 va_list args;
a2249542 675
5b4ee69b 676 va_start (args, format);
4c4b4cd2
PH
677 warnings_issued += 1;
678 if (warnings_issued <= warning_limit)
a2249542
MK
679 vwarning (format, args);
680
681 va_end (args);
4c4b4cd2
PH
682}
683
714e53ab
PH
684/* Issue an error if the size of an object of type T is unreasonable,
685 i.e. if it would be a bad idea to allocate a value of this type in
686 GDB. */
687
c1b5a1a6
JB
688void
689ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
690{
691 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 692 error (_("object size is larger than varsize-limit"));
714e53ab
PH
693}
694
0963b4bd 695/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 696static LONGEST
c3e5cd34 697max_of_size (int size)
4c4b4cd2 698{
76a01679 699 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 700
76a01679 701 return top_bit | (top_bit - 1);
4c4b4cd2
PH
702}
703
0963b4bd 704/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 705static LONGEST
c3e5cd34 706min_of_size (int size)
4c4b4cd2 707{
c3e5cd34 708 return -max_of_size (size) - 1;
4c4b4cd2
PH
709}
710
0963b4bd 711/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 712static ULONGEST
c3e5cd34 713umax_of_size (int size)
4c4b4cd2 714{
76a01679 715 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 716
76a01679 717 return top_bit | (top_bit - 1);
4c4b4cd2
PH
718}
719
0963b4bd 720/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
721static LONGEST
722max_of_type (struct type *t)
4c4b4cd2 723{
c3e5cd34
PH
724 if (TYPE_UNSIGNED (t))
725 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
726 else
727 return max_of_size (TYPE_LENGTH (t));
728}
729
0963b4bd 730/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
731static LONGEST
732min_of_type (struct type *t)
733{
734 if (TYPE_UNSIGNED (t))
735 return 0;
736 else
737 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
738}
739
740/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
741LONGEST
742ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 743{
b249d2c2 744 type = resolve_dynamic_type (type, {}, 0);
78134374 745 switch (type->code ())
4c4b4cd2
PH
746 {
747 case TYPE_CODE_RANGE:
690cc4eb 748 return TYPE_HIGH_BOUND (type);
4c4b4cd2 749 case TYPE_CODE_ENUM:
1f704f76 750 return TYPE_FIELD_ENUMVAL (type, type->num_fields () - 1);
690cc4eb
PH
751 case TYPE_CODE_BOOL:
752 return 1;
753 case TYPE_CODE_CHAR:
76a01679 754 case TYPE_CODE_INT:
690cc4eb 755 return max_of_type (type);
4c4b4cd2 756 default:
43bbcdc2 757 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
758 }
759}
760
14e75d8e 761/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
762LONGEST
763ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 764{
b249d2c2 765 type = resolve_dynamic_type (type, {}, 0);
78134374 766 switch (type->code ())
4c4b4cd2
PH
767 {
768 case TYPE_CODE_RANGE:
690cc4eb 769 return TYPE_LOW_BOUND (type);
4c4b4cd2 770 case TYPE_CODE_ENUM:
14e75d8e 771 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
772 case TYPE_CODE_BOOL:
773 return 0;
774 case TYPE_CODE_CHAR:
76a01679 775 case TYPE_CODE_INT:
690cc4eb 776 return min_of_type (type);
4c4b4cd2 777 default:
43bbcdc2 778 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
779 }
780}
781
782/* The identity on non-range types. For range types, the underlying
76a01679 783 non-range scalar type. */
4c4b4cd2
PH
784
785static struct type *
18af8284 786get_base_type (struct type *type)
4c4b4cd2 787{
78134374 788 while (type != NULL && type->code () == TYPE_CODE_RANGE)
4c4b4cd2 789 {
76a01679
JB
790 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
791 return type;
4c4b4cd2
PH
792 type = TYPE_TARGET_TYPE (type);
793 }
794 return type;
14f9c5c9 795}
41246937
JB
796
797/* Return a decoded version of the given VALUE. This means returning
798 a value whose type is obtained by applying all the GNAT-specific
85102364 799 encodings, making the resulting type a static but standard description
41246937
JB
800 of the initial type. */
801
802struct value *
803ada_get_decoded_value (struct value *value)
804{
805 struct type *type = ada_check_typedef (value_type (value));
806
807 if (ada_is_array_descriptor_type (type)
808 || (ada_is_constrained_packed_array_type (type)
78134374 809 && type->code () != TYPE_CODE_PTR))
41246937 810 {
78134374 811 if (type->code () == TYPE_CODE_TYPEDEF) /* array access type. */
41246937
JB
812 value = ada_coerce_to_simple_array_ptr (value);
813 else
814 value = ada_coerce_to_simple_array (value);
815 }
816 else
817 value = ada_to_fixed_value (value);
818
819 return value;
820}
821
822/* Same as ada_get_decoded_value, but with the given TYPE.
823 Because there is no associated actual value for this type,
824 the resulting type might be a best-effort approximation in
825 the case of dynamic types. */
826
827struct type *
828ada_get_decoded_type (struct type *type)
829{
830 type = to_static_fixed_type (type);
831 if (ada_is_constrained_packed_array_type (type))
832 type = ada_coerce_to_simple_array_type (type);
833 return type;
834}
835
4c4b4cd2 836\f
76a01679 837
4c4b4cd2 838 /* Language Selection */
14f9c5c9
AS
839
840/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 841 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 842
de93309a 843static enum language
ccefe4c4 844ada_update_initial_language (enum language lang)
14f9c5c9 845{
cafb3438 846 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 847 return language_ada;
14f9c5c9
AS
848
849 return lang;
850}
96d887e8
PH
851
852/* If the main procedure is written in Ada, then return its name.
853 The result is good until the next call. Return NULL if the main
854 procedure doesn't appear to be in Ada. */
855
856char *
857ada_main_name (void)
858{
3b7344d5 859 struct bound_minimal_symbol msym;
e83e4e24 860 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 861
96d887e8
PH
862 /* For Ada, the name of the main procedure is stored in a specific
863 string constant, generated by the binder. Look for that symbol,
864 extract its address, and then read that string. If we didn't find
865 that string, then most probably the main procedure is not written
866 in Ada. */
867 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
868
3b7344d5 869 if (msym.minsym != NULL)
96d887e8 870 {
f9bc20b9
JB
871 CORE_ADDR main_program_name_addr;
872 int err_code;
873
77e371c0 874 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 875 if (main_program_name_addr == 0)
323e0a4a 876 error (_("Invalid address for Ada main program name."));
96d887e8 877
f9bc20b9
JB
878 target_read_string (main_program_name_addr, &main_program_name,
879 1024, &err_code);
880
881 if (err_code != 0)
882 return NULL;
e83e4e24 883 return main_program_name.get ();
96d887e8
PH
884 }
885
886 /* The main procedure doesn't seem to be in Ada. */
887 return NULL;
888}
14f9c5c9 889\f
4c4b4cd2 890 /* Symbols */
d2e4a39e 891
4c4b4cd2
PH
892/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
893 of NULLs. */
14f9c5c9 894
d2e4a39e
AS
895const struct ada_opname_map ada_opname_table[] = {
896 {"Oadd", "\"+\"", BINOP_ADD},
897 {"Osubtract", "\"-\"", BINOP_SUB},
898 {"Omultiply", "\"*\"", BINOP_MUL},
899 {"Odivide", "\"/\"", BINOP_DIV},
900 {"Omod", "\"mod\"", BINOP_MOD},
901 {"Orem", "\"rem\"", BINOP_REM},
902 {"Oexpon", "\"**\"", BINOP_EXP},
903 {"Olt", "\"<\"", BINOP_LESS},
904 {"Ole", "\"<=\"", BINOP_LEQ},
905 {"Ogt", "\">\"", BINOP_GTR},
906 {"Oge", "\">=\"", BINOP_GEQ},
907 {"Oeq", "\"=\"", BINOP_EQUAL},
908 {"One", "\"/=\"", BINOP_NOTEQUAL},
909 {"Oand", "\"and\"", BINOP_BITWISE_AND},
910 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
911 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
912 {"Oconcat", "\"&\"", BINOP_CONCAT},
913 {"Oabs", "\"abs\"", UNOP_ABS},
914 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
915 {"Oadd", "\"+\"", UNOP_PLUS},
916 {"Osubtract", "\"-\"", UNOP_NEG},
917 {NULL, NULL}
14f9c5c9
AS
918};
919
b5ec771e
PA
920/* The "encoded" form of DECODED, according to GNAT conventions. The
921 result is valid until the next call to ada_encode. If
922 THROW_ERRORS, throw an error if invalid operator name is found.
923 Otherwise, return NULL in that case. */
4c4b4cd2 924
b5ec771e
PA
925static char *
926ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 927{
4c4b4cd2
PH
928 static char *encoding_buffer = NULL;
929 static size_t encoding_buffer_size = 0;
d2e4a39e 930 const char *p;
14f9c5c9 931 int k;
d2e4a39e 932
4c4b4cd2 933 if (decoded == NULL)
14f9c5c9
AS
934 return NULL;
935
4c4b4cd2
PH
936 GROW_VECT (encoding_buffer, encoding_buffer_size,
937 2 * strlen (decoded) + 10);
14f9c5c9
AS
938
939 k = 0;
4c4b4cd2 940 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 941 {
cdc7bb92 942 if (*p == '.')
4c4b4cd2
PH
943 {
944 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
945 k += 2;
946 }
14f9c5c9 947 else if (*p == '"')
4c4b4cd2
PH
948 {
949 const struct ada_opname_map *mapping;
950
951 for (mapping = ada_opname_table;
1265e4aa 952 mapping->encoded != NULL
61012eef 953 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
954 ;
955 if (mapping->encoded == NULL)
b5ec771e
PA
956 {
957 if (throw_errors)
958 error (_("invalid Ada operator name: %s"), p);
959 else
960 return NULL;
961 }
4c4b4cd2
PH
962 strcpy (encoding_buffer + k, mapping->encoded);
963 k += strlen (mapping->encoded);
964 break;
965 }
d2e4a39e 966 else
4c4b4cd2
PH
967 {
968 encoding_buffer[k] = *p;
969 k += 1;
970 }
14f9c5c9
AS
971 }
972
4c4b4cd2
PH
973 encoding_buffer[k] = '\0';
974 return encoding_buffer;
14f9c5c9
AS
975}
976
b5ec771e
PA
977/* The "encoded" form of DECODED, according to GNAT conventions.
978 The result is valid until the next call to ada_encode. */
979
980char *
981ada_encode (const char *decoded)
982{
983 return ada_encode_1 (decoded, true);
984}
985
14f9c5c9 986/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
987 quotes, unfolded, but with the quotes stripped away. Result good
988 to next call. */
989
de93309a 990static char *
e0802d59 991ada_fold_name (gdb::string_view name)
14f9c5c9 992{
d2e4a39e 993 static char *fold_buffer = NULL;
14f9c5c9
AS
994 static size_t fold_buffer_size = 0;
995
e0802d59 996 int len = name.size ();
d2e4a39e 997 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
998
999 if (name[0] == '\'')
1000 {
e0802d59 1001 strncpy (fold_buffer, name.data () + 1, len - 2);
d2e4a39e 1002 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1003 }
1004 else
1005 {
1006 int i;
5b4ee69b 1007
14f9c5c9 1008 for (i = 0; i <= len; i += 1)
4c4b4cd2 1009 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1010 }
1011
1012 return fold_buffer;
1013}
1014
529cad9c
PH
1015/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1016
1017static int
1018is_lower_alphanum (const char c)
1019{
1020 return (isdigit (c) || (isalpha (c) && islower (c)));
1021}
1022
c90092fe
JB
1023/* ENCODED is the linkage name of a symbol and LEN contains its length.
1024 This function saves in LEN the length of that same symbol name but
1025 without either of these suffixes:
29480c32
JB
1026 . .{DIGIT}+
1027 . ${DIGIT}+
1028 . ___{DIGIT}+
1029 . __{DIGIT}+.
c90092fe 1030
29480c32
JB
1031 These are suffixes introduced by the compiler for entities such as
1032 nested subprogram for instance, in order to avoid name clashes.
1033 They do not serve any purpose for the debugger. */
1034
1035static void
1036ada_remove_trailing_digits (const char *encoded, int *len)
1037{
1038 if (*len > 1 && isdigit (encoded[*len - 1]))
1039 {
1040 int i = *len - 2;
5b4ee69b 1041
29480c32
JB
1042 while (i > 0 && isdigit (encoded[i]))
1043 i--;
1044 if (i >= 0 && encoded[i] == '.')
1045 *len = i;
1046 else if (i >= 0 && encoded[i] == '$')
1047 *len = i;
61012eef 1048 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1049 *len = i - 2;
61012eef 1050 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1051 *len = i - 1;
1052 }
1053}
1054
1055/* Remove the suffix introduced by the compiler for protected object
1056 subprograms. */
1057
1058static void
1059ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1060{
1061 /* Remove trailing N. */
1062
1063 /* Protected entry subprograms are broken into two
1064 separate subprograms: The first one is unprotected, and has
1065 a 'N' suffix; the second is the protected version, and has
0963b4bd 1066 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1067 the protection. Since the P subprograms are internally generated,
1068 we leave these names undecoded, giving the user a clue that this
1069 entity is internal. */
1070
1071 if (*len > 1
1072 && encoded[*len - 1] == 'N'
1073 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1074 *len = *len - 1;
1075}
1076
1077/* If ENCODED follows the GNAT entity encoding conventions, then return
1078 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
f945dedf 1079 replaced by ENCODED. */
14f9c5c9 1080
f945dedf 1081std::string
4c4b4cd2 1082ada_decode (const char *encoded)
14f9c5c9
AS
1083{
1084 int i, j;
1085 int len0;
d2e4a39e 1086 const char *p;
14f9c5c9 1087 int at_start_name;
f945dedf 1088 std::string decoded;
d2e4a39e 1089
0d81f350
JG
1090 /* With function descriptors on PPC64, the value of a symbol named
1091 ".FN", if it exists, is the entry point of the function "FN". */
1092 if (encoded[0] == '.')
1093 encoded += 1;
1094
29480c32
JB
1095 /* The name of the Ada main procedure starts with "_ada_".
1096 This prefix is not part of the decoded name, so skip this part
1097 if we see this prefix. */
61012eef 1098 if (startswith (encoded, "_ada_"))
4c4b4cd2 1099 encoded += 5;
14f9c5c9 1100
29480c32
JB
1101 /* If the name starts with '_', then it is not a properly encoded
1102 name, so do not attempt to decode it. Similarly, if the name
1103 starts with '<', the name should not be decoded. */
4c4b4cd2 1104 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1105 goto Suppress;
1106
4c4b4cd2 1107 len0 = strlen (encoded);
4c4b4cd2 1108
29480c32
JB
1109 ada_remove_trailing_digits (encoded, &len0);
1110 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1111
4c4b4cd2
PH
1112 /* Remove the ___X.* suffix if present. Do not forget to verify that
1113 the suffix is located before the current "end" of ENCODED. We want
1114 to avoid re-matching parts of ENCODED that have previously been
1115 marked as discarded (by decrementing LEN0). */
1116 p = strstr (encoded, "___");
1117 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1118 {
1119 if (p[3] == 'X')
4c4b4cd2 1120 len0 = p - encoded;
14f9c5c9 1121 else
4c4b4cd2 1122 goto Suppress;
14f9c5c9 1123 }
4c4b4cd2 1124
29480c32
JB
1125 /* Remove any trailing TKB suffix. It tells us that this symbol
1126 is for the body of a task, but that information does not actually
1127 appear in the decoded name. */
1128
61012eef 1129 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1130 len0 -= 3;
76a01679 1131
a10967fa
JB
1132 /* Remove any trailing TB suffix. The TB suffix is slightly different
1133 from the TKB suffix because it is used for non-anonymous task
1134 bodies. */
1135
61012eef 1136 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1137 len0 -= 2;
1138
29480c32
JB
1139 /* Remove trailing "B" suffixes. */
1140 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1141
61012eef 1142 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1143 len0 -= 1;
1144
4c4b4cd2 1145 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1146
f945dedf 1147 decoded.resize (2 * len0 + 1, 'X');
14f9c5c9 1148
29480c32
JB
1149 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1150
4c4b4cd2 1151 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1152 {
4c4b4cd2
PH
1153 i = len0 - 2;
1154 while ((i >= 0 && isdigit (encoded[i]))
1155 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1156 i -= 1;
1157 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1158 len0 = i - 1;
1159 else if (encoded[i] == '$')
1160 len0 = i;
d2e4a39e 1161 }
14f9c5c9 1162
29480c32
JB
1163 /* The first few characters that are not alphabetic are not part
1164 of any encoding we use, so we can copy them over verbatim. */
1165
4c4b4cd2
PH
1166 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1167 decoded[j] = encoded[i];
14f9c5c9
AS
1168
1169 at_start_name = 1;
1170 while (i < len0)
1171 {
29480c32 1172 /* Is this a symbol function? */
4c4b4cd2
PH
1173 if (at_start_name && encoded[i] == 'O')
1174 {
1175 int k;
5b4ee69b 1176
4c4b4cd2
PH
1177 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1178 {
1179 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1180 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1181 op_len - 1) == 0)
1182 && !isalnum (encoded[i + op_len]))
4c4b4cd2 1183 {
f945dedf 1184 strcpy (&decoded.front() + j, ada_opname_table[k].decoded);
4c4b4cd2
PH
1185 at_start_name = 0;
1186 i += op_len;
1187 j += strlen (ada_opname_table[k].decoded);
1188 break;
1189 }
1190 }
1191 if (ada_opname_table[k].encoded != NULL)
1192 continue;
1193 }
14f9c5c9
AS
1194 at_start_name = 0;
1195
529cad9c
PH
1196 /* Replace "TK__" with "__", which will eventually be translated
1197 into "." (just below). */
1198
61012eef 1199 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1200 i += 2;
529cad9c 1201
29480c32
JB
1202 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1203 be translated into "." (just below). These are internal names
1204 generated for anonymous blocks inside which our symbol is nested. */
1205
1206 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1207 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1208 && isdigit (encoded [i+4]))
1209 {
1210 int k = i + 5;
1211
1212 while (k < len0 && isdigit (encoded[k]))
1213 k++; /* Skip any extra digit. */
1214
1215 /* Double-check that the "__B_{DIGITS}+" sequence we found
1216 is indeed followed by "__". */
1217 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1218 i = k;
1219 }
1220
529cad9c
PH
1221 /* Remove _E{DIGITS}+[sb] */
1222
1223 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1224 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1225 one implements the actual entry code, and has a suffix following
1226 the convention above; the second one implements the barrier and
1227 uses the same convention as above, except that the 'E' is replaced
1228 by a 'B'.
1229
1230 Just as above, we do not decode the name of barrier functions
1231 to give the user a clue that the code he is debugging has been
1232 internally generated. */
1233
1234 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1235 && isdigit (encoded[i+2]))
1236 {
1237 int k = i + 3;
1238
1239 while (k < len0 && isdigit (encoded[k]))
1240 k++;
1241
1242 if (k < len0
1243 && (encoded[k] == 'b' || encoded[k] == 's'))
1244 {
1245 k++;
1246 /* Just as an extra precaution, make sure that if this
1247 suffix is followed by anything else, it is a '_'.
1248 Otherwise, we matched this sequence by accident. */
1249 if (k == len0
1250 || (k < len0 && encoded[k] == '_'))
1251 i = k;
1252 }
1253 }
1254
1255 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1256 the GNAT front-end in protected object subprograms. */
1257
1258 if (i < len0 + 3
1259 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1260 {
1261 /* Backtrack a bit up until we reach either the begining of
1262 the encoded name, or "__". Make sure that we only find
1263 digits or lowercase characters. */
1264 const char *ptr = encoded + i - 1;
1265
1266 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1267 ptr--;
1268 if (ptr < encoded
1269 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1270 i++;
1271 }
1272
4c4b4cd2
PH
1273 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1274 {
29480c32
JB
1275 /* This is a X[bn]* sequence not separated from the previous
1276 part of the name with a non-alpha-numeric character (in other
1277 words, immediately following an alpha-numeric character), then
1278 verify that it is placed at the end of the encoded name. If
1279 not, then the encoding is not valid and we should abort the
1280 decoding. Otherwise, just skip it, it is used in body-nested
1281 package names. */
4c4b4cd2
PH
1282 do
1283 i += 1;
1284 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1285 if (i < len0)
1286 goto Suppress;
1287 }
cdc7bb92 1288 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1289 {
29480c32 1290 /* Replace '__' by '.'. */
4c4b4cd2
PH
1291 decoded[j] = '.';
1292 at_start_name = 1;
1293 i += 2;
1294 j += 1;
1295 }
14f9c5c9 1296 else
4c4b4cd2 1297 {
29480c32
JB
1298 /* It's a character part of the decoded name, so just copy it
1299 over. */
4c4b4cd2
PH
1300 decoded[j] = encoded[i];
1301 i += 1;
1302 j += 1;
1303 }
14f9c5c9 1304 }
f945dedf 1305 decoded.resize (j);
14f9c5c9 1306
29480c32
JB
1307 /* Decoded names should never contain any uppercase character.
1308 Double-check this, and abort the decoding if we find one. */
1309
f945dedf 1310 for (i = 0; i < decoded.length(); ++i)
4c4b4cd2 1311 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1312 goto Suppress;
1313
f945dedf 1314 return decoded;
14f9c5c9
AS
1315
1316Suppress:
4c4b4cd2 1317 if (encoded[0] == '<')
f945dedf 1318 decoded = encoded;
14f9c5c9 1319 else
f945dedf 1320 decoded = '<' + std::string(encoded) + '>';
4c4b4cd2
PH
1321 return decoded;
1322
1323}
1324
1325/* Table for keeping permanent unique copies of decoded names. Once
1326 allocated, names in this table are never released. While this is a
1327 storage leak, it should not be significant unless there are massive
1328 changes in the set of decoded names in successive versions of a
1329 symbol table loaded during a single session. */
1330static struct htab *decoded_names_store;
1331
1332/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1333 in the language-specific part of GSYMBOL, if it has not been
1334 previously computed. Tries to save the decoded name in the same
1335 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1336 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1337 GSYMBOL).
4c4b4cd2
PH
1338 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1339 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1340 when a decoded name is cached in it. */
4c4b4cd2 1341
45e6c716 1342const char *
f85f34ed 1343ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1344{
f85f34ed
TT
1345 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1346 const char **resultp =
615b3f62 1347 &gsymbol->language_specific.demangled_name;
5b4ee69b 1348
f85f34ed 1349 if (!gsymbol->ada_mangled)
4c4b4cd2 1350 {
4d4eaa30 1351 std::string decoded = ada_decode (gsymbol->linkage_name ());
f85f34ed 1352 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1353
f85f34ed 1354 gsymbol->ada_mangled = 1;
5b4ee69b 1355
f85f34ed 1356 if (obstack != NULL)
f945dedf 1357 *resultp = obstack_strdup (obstack, decoded.c_str ());
f85f34ed 1358 else
76a01679 1359 {
f85f34ed
TT
1360 /* Sometimes, we can't find a corresponding objfile, in
1361 which case, we put the result on the heap. Since we only
1362 decode when needed, we hope this usually does not cause a
1363 significant memory leak (FIXME). */
1364
76a01679 1365 char **slot = (char **) htab_find_slot (decoded_names_store,
f945dedf 1366 decoded.c_str (), INSERT);
5b4ee69b 1367
76a01679 1368 if (*slot == NULL)
f945dedf 1369 *slot = xstrdup (decoded.c_str ());
76a01679
JB
1370 *resultp = *slot;
1371 }
4c4b4cd2 1372 }
14f9c5c9 1373
4c4b4cd2
PH
1374 return *resultp;
1375}
76a01679 1376
2c0b251b 1377static char *
76a01679 1378ada_la_decode (const char *encoded, int options)
4c4b4cd2 1379{
f945dedf 1380 return xstrdup (ada_decode (encoded).c_str ());
14f9c5c9
AS
1381}
1382
8b302db8
TT
1383/* Implement la_sniff_from_mangled_name for Ada. */
1384
1385static int
1386ada_sniff_from_mangled_name (const char *mangled, char **out)
1387{
f945dedf 1388 std::string demangled = ada_decode (mangled);
8b302db8
TT
1389
1390 *out = NULL;
1391
f945dedf 1392 if (demangled != mangled && demangled[0] != '<')
8b302db8
TT
1393 {
1394 /* Set the gsymbol language to Ada, but still return 0.
1395 Two reasons for that:
1396
1397 1. For Ada, we prefer computing the symbol's decoded name
1398 on the fly rather than pre-compute it, in order to save
1399 memory (Ada projects are typically very large).
1400
1401 2. There are some areas in the definition of the GNAT
1402 encoding where, with a bit of bad luck, we might be able
1403 to decode a non-Ada symbol, generating an incorrect
1404 demangled name (Eg: names ending with "TB" for instance
1405 are identified as task bodies and so stripped from
1406 the decoded name returned).
1407
1408 Returning 1, here, but not setting *DEMANGLED, helps us get a
1409 little bit of the best of both worlds. Because we're last,
1410 we should not affect any of the other languages that were
1411 able to demangle the symbol before us; we get to correctly
1412 tag Ada symbols as such; and even if we incorrectly tagged a
1413 non-Ada symbol, which should be rare, any routing through the
1414 Ada language should be transparent (Ada tries to behave much
1415 like C/C++ with non-Ada symbols). */
1416 return 1;
1417 }
1418
1419 return 0;
1420}
1421
14f9c5c9 1422\f
d2e4a39e 1423
4c4b4cd2 1424 /* Arrays */
14f9c5c9 1425
28c85d6c
JB
1426/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1427 generated by the GNAT compiler to describe the index type used
1428 for each dimension of an array, check whether it follows the latest
1429 known encoding. If not, fix it up to conform to the latest encoding.
1430 Otherwise, do nothing. This function also does nothing if
1431 INDEX_DESC_TYPE is NULL.
1432
85102364 1433 The GNAT encoding used to describe the array index type evolved a bit.
28c85d6c
JB
1434 Initially, the information would be provided through the name of each
1435 field of the structure type only, while the type of these fields was
1436 described as unspecified and irrelevant. The debugger was then expected
1437 to perform a global type lookup using the name of that field in order
1438 to get access to the full index type description. Because these global
1439 lookups can be very expensive, the encoding was later enhanced to make
1440 the global lookup unnecessary by defining the field type as being
1441 the full index type description.
1442
1443 The purpose of this routine is to allow us to support older versions
1444 of the compiler by detecting the use of the older encoding, and by
1445 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1446 we essentially replace each field's meaningless type by the associated
1447 index subtype). */
1448
1449void
1450ada_fixup_array_indexes_type (struct type *index_desc_type)
1451{
1452 int i;
1453
1454 if (index_desc_type == NULL)
1455 return;
1f704f76 1456 gdb_assert (index_desc_type->num_fields () > 0);
28c85d6c
JB
1457
1458 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1459 to check one field only, no need to check them all). If not, return
1460 now.
1461
1462 If our INDEX_DESC_TYPE was generated using the older encoding,
1463 the field type should be a meaningless integer type whose name
1464 is not equal to the field name. */
7d93a1e0
SM
1465 if (TYPE_FIELD_TYPE (index_desc_type, 0)->name () != NULL
1466 && strcmp (TYPE_FIELD_TYPE (index_desc_type, 0)->name (),
28c85d6c
JB
1467 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1468 return;
1469
1470 /* Fixup each field of INDEX_DESC_TYPE. */
1f704f76 1471 for (i = 0; i < index_desc_type->num_fields (); i++)
28c85d6c 1472 {
0d5cff50 1473 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1474 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1475
1476 if (raw_type)
1477 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1478 }
1479}
1480
4c4b4cd2
PH
1481/* The desc_* routines return primitive portions of array descriptors
1482 (fat pointers). */
14f9c5c9
AS
1483
1484/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1485 level of indirection, if needed. */
1486
d2e4a39e
AS
1487static struct type *
1488desc_base_type (struct type *type)
14f9c5c9
AS
1489{
1490 if (type == NULL)
1491 return NULL;
61ee279c 1492 type = ada_check_typedef (type);
78134374 1493 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
1494 type = ada_typedef_target_type (type);
1495
1265e4aa 1496 if (type != NULL
78134374
SM
1497 && (type->code () == TYPE_CODE_PTR
1498 || type->code () == TYPE_CODE_REF))
61ee279c 1499 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1500 else
1501 return type;
1502}
1503
4c4b4cd2
PH
1504/* True iff TYPE indicates a "thin" array pointer type. */
1505
14f9c5c9 1506static int
d2e4a39e 1507is_thin_pntr (struct type *type)
14f9c5c9 1508{
d2e4a39e 1509 return
14f9c5c9
AS
1510 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1511 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1512}
1513
4c4b4cd2
PH
1514/* The descriptor type for thin pointer type TYPE. */
1515
d2e4a39e
AS
1516static struct type *
1517thin_descriptor_type (struct type *type)
14f9c5c9 1518{
d2e4a39e 1519 struct type *base_type = desc_base_type (type);
5b4ee69b 1520
14f9c5c9
AS
1521 if (base_type == NULL)
1522 return NULL;
1523 if (is_suffix (ada_type_name (base_type), "___XVE"))
1524 return base_type;
d2e4a39e 1525 else
14f9c5c9 1526 {
d2e4a39e 1527 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1528
14f9c5c9 1529 if (alt_type == NULL)
4c4b4cd2 1530 return base_type;
14f9c5c9 1531 else
4c4b4cd2 1532 return alt_type;
14f9c5c9
AS
1533 }
1534}
1535
4c4b4cd2
PH
1536/* A pointer to the array data for thin-pointer value VAL. */
1537
d2e4a39e
AS
1538static struct value *
1539thin_data_pntr (struct value *val)
14f9c5c9 1540{
828292f2 1541 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1542 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1543
556bdfd4
UW
1544 data_type = lookup_pointer_type (data_type);
1545
78134374 1546 if (type->code () == TYPE_CODE_PTR)
556bdfd4 1547 return value_cast (data_type, value_copy (val));
d2e4a39e 1548 else
42ae5230 1549 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1550}
1551
4c4b4cd2
PH
1552/* True iff TYPE indicates a "thick" array pointer type. */
1553
14f9c5c9 1554static int
d2e4a39e 1555is_thick_pntr (struct type *type)
14f9c5c9
AS
1556{
1557 type = desc_base_type (type);
78134374 1558 return (type != NULL && type->code () == TYPE_CODE_STRUCT
4c4b4cd2 1559 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1560}
1561
4c4b4cd2
PH
1562/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1563 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1564
d2e4a39e
AS
1565static struct type *
1566desc_bounds_type (struct type *type)
14f9c5c9 1567{
d2e4a39e 1568 struct type *r;
14f9c5c9
AS
1569
1570 type = desc_base_type (type);
1571
1572 if (type == NULL)
1573 return NULL;
1574 else if (is_thin_pntr (type))
1575 {
1576 type = thin_descriptor_type (type);
1577 if (type == NULL)
4c4b4cd2 1578 return NULL;
14f9c5c9
AS
1579 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1580 if (r != NULL)
61ee279c 1581 return ada_check_typedef (r);
14f9c5c9 1582 }
78134374 1583 else if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
1584 {
1585 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1586 if (r != NULL)
61ee279c 1587 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1588 }
1589 return NULL;
1590}
1591
1592/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1593 one, a pointer to its bounds data. Otherwise NULL. */
1594
d2e4a39e
AS
1595static struct value *
1596desc_bounds (struct value *arr)
14f9c5c9 1597{
df407dfe 1598 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1599
d2e4a39e 1600 if (is_thin_pntr (type))
14f9c5c9 1601 {
d2e4a39e 1602 struct type *bounds_type =
4c4b4cd2 1603 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1604 LONGEST addr;
1605
4cdfadb1 1606 if (bounds_type == NULL)
323e0a4a 1607 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1608
1609 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1610 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1611 the correct calculation is a real pain. FIXME (and fix GCC). */
78134374 1612 if (type->code () == TYPE_CODE_PTR)
4c4b4cd2 1613 addr = value_as_long (arr);
d2e4a39e 1614 else
42ae5230 1615 addr = value_address (arr);
14f9c5c9 1616
d2e4a39e 1617 return
4c4b4cd2
PH
1618 value_from_longest (lookup_pointer_type (bounds_type),
1619 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1620 }
1621
1622 else if (is_thick_pntr (type))
05e522ef
JB
1623 {
1624 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1625 _("Bad GNAT array descriptor"));
1626 struct type *p_bounds_type = value_type (p_bounds);
1627
1628 if (p_bounds_type
78134374 1629 && p_bounds_type->code () == TYPE_CODE_PTR)
05e522ef
JB
1630 {
1631 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1632
1633 if (TYPE_STUB (target_type))
1634 p_bounds = value_cast (lookup_pointer_type
1635 (ada_check_typedef (target_type)),
1636 p_bounds);
1637 }
1638 else
1639 error (_("Bad GNAT array descriptor"));
1640
1641 return p_bounds;
1642 }
14f9c5c9
AS
1643 else
1644 return NULL;
1645}
1646
4c4b4cd2
PH
1647/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1648 position of the field containing the address of the bounds data. */
1649
14f9c5c9 1650static int
d2e4a39e 1651fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1652{
1653 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1654}
1655
1656/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1657 size of the field containing the address of the bounds data. */
1658
14f9c5c9 1659static int
d2e4a39e 1660fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1661{
1662 type = desc_base_type (type);
1663
d2e4a39e 1664 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1665 return TYPE_FIELD_BITSIZE (type, 1);
1666 else
61ee279c 1667 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1668}
1669
4c4b4cd2 1670/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1671 pointer to one, the type of its array data (a array-with-no-bounds type);
1672 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1673 data. */
4c4b4cd2 1674
d2e4a39e 1675static struct type *
556bdfd4 1676desc_data_target_type (struct type *type)
14f9c5c9
AS
1677{
1678 type = desc_base_type (type);
1679
4c4b4cd2 1680 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1681 if (is_thin_pntr (type))
556bdfd4 1682 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1683 else if (is_thick_pntr (type))
556bdfd4
UW
1684 {
1685 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1686
1687 if (data_type
78134374 1688 && ada_check_typedef (data_type)->code () == TYPE_CODE_PTR)
05e522ef 1689 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1690 }
1691
1692 return NULL;
14f9c5c9
AS
1693}
1694
1695/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1696 its array data. */
4c4b4cd2 1697
d2e4a39e
AS
1698static struct value *
1699desc_data (struct value *arr)
14f9c5c9 1700{
df407dfe 1701 struct type *type = value_type (arr);
5b4ee69b 1702
14f9c5c9
AS
1703 if (is_thin_pntr (type))
1704 return thin_data_pntr (arr);
1705 else if (is_thick_pntr (type))
d2e4a39e 1706 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1707 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1708 else
1709 return NULL;
1710}
1711
1712
1713/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1714 position of the field containing the address of the data. */
1715
14f9c5c9 1716static int
d2e4a39e 1717fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1718{
1719 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1720}
1721
1722/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1723 size of the field containing the address of the data. */
1724
14f9c5c9 1725static int
d2e4a39e 1726fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1727{
1728 type = desc_base_type (type);
1729
1730 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1731 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1732 else
14f9c5c9
AS
1733 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1734}
1735
4c4b4cd2 1736/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1737 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1738 bound, if WHICH is 1. The first bound is I=1. */
1739
d2e4a39e
AS
1740static struct value *
1741desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1742{
250106a7
TT
1743 char bound_name[20];
1744 xsnprintf (bound_name, sizeof (bound_name), "%cB%d",
1745 which ? 'U' : 'L', i - 1);
1746 return value_struct_elt (&bounds, NULL, bound_name, NULL,
323e0a4a 1747 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1748}
1749
1750/* If BOUNDS is an array-bounds structure type, return the bit position
1751 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1752 bound, if WHICH is 1. The first bound is I=1. */
1753
14f9c5c9 1754static int
d2e4a39e 1755desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1756{
d2e4a39e 1757 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1758}
1759
1760/* If BOUNDS is an array-bounds structure type, return the bit field size
1761 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1762 bound, if WHICH is 1. The first bound is I=1. */
1763
76a01679 1764static int
d2e4a39e 1765desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1766{
1767 type = desc_base_type (type);
1768
d2e4a39e
AS
1769 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1770 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1771 else
1772 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1773}
1774
1775/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1776 Ith bound (numbering from 1). Otherwise, NULL. */
1777
d2e4a39e
AS
1778static struct type *
1779desc_index_type (struct type *type, int i)
14f9c5c9
AS
1780{
1781 type = desc_base_type (type);
1782
78134374 1783 if (type->code () == TYPE_CODE_STRUCT)
250106a7
TT
1784 {
1785 char bound_name[20];
1786 xsnprintf (bound_name, sizeof (bound_name), "LB%d", i - 1);
1787 return lookup_struct_elt_type (type, bound_name, 1);
1788 }
d2e4a39e 1789 else
14f9c5c9
AS
1790 return NULL;
1791}
1792
4c4b4cd2
PH
1793/* The number of index positions in the array-bounds type TYPE.
1794 Return 0 if TYPE is NULL. */
1795
14f9c5c9 1796static int
d2e4a39e 1797desc_arity (struct type *type)
14f9c5c9
AS
1798{
1799 type = desc_base_type (type);
1800
1801 if (type != NULL)
1f704f76 1802 return type->num_fields () / 2;
14f9c5c9
AS
1803 return 0;
1804}
1805
4c4b4cd2
PH
1806/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1807 an array descriptor type (representing an unconstrained array
1808 type). */
1809
76a01679
JB
1810static int
1811ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1812{
1813 if (type == NULL)
1814 return 0;
61ee279c 1815 type = ada_check_typedef (type);
78134374 1816 return (type->code () == TYPE_CODE_ARRAY
76a01679 1817 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1818}
1819
52ce6436 1820/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1821 * to one. */
52ce6436 1822
2c0b251b 1823static int
52ce6436
PH
1824ada_is_array_type (struct type *type)
1825{
78134374
SM
1826 while (type != NULL
1827 && (type->code () == TYPE_CODE_PTR
1828 || type->code () == TYPE_CODE_REF))
52ce6436
PH
1829 type = TYPE_TARGET_TYPE (type);
1830 return ada_is_direct_array_type (type);
1831}
1832
4c4b4cd2 1833/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1834
14f9c5c9 1835int
4c4b4cd2 1836ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1837{
1838 if (type == NULL)
1839 return 0;
61ee279c 1840 type = ada_check_typedef (type);
78134374
SM
1841 return (type->code () == TYPE_CODE_ARRAY
1842 || (type->code () == TYPE_CODE_PTR
1843 && (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ()
1844 == TYPE_CODE_ARRAY)));
14f9c5c9
AS
1845}
1846
4c4b4cd2
PH
1847/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1848
14f9c5c9 1849int
4c4b4cd2 1850ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1851{
556bdfd4 1852 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1853
1854 if (type == NULL)
1855 return 0;
61ee279c 1856 type = ada_check_typedef (type);
556bdfd4 1857 return (data_type != NULL
78134374 1858 && data_type->code () == TYPE_CODE_ARRAY
556bdfd4 1859 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1860}
1861
1862/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1863 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1864 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1865 is still needed. */
1866
14f9c5c9 1867int
ebf56fd3 1868ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1869{
d2e4a39e 1870 return
14f9c5c9 1871 type != NULL
78134374 1872 && type->code () == TYPE_CODE_STRUCT
14f9c5c9 1873 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1874 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1875 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1876}
1877
1878
4c4b4cd2 1879/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1880 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1881 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1882 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1883 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1884 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1885 a descriptor. */
de93309a
SM
1886
1887static struct type *
d2e4a39e 1888ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1889{
ad82864c
JB
1890 if (ada_is_constrained_packed_array_type (value_type (arr)))
1891 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1892
df407dfe
AC
1893 if (!ada_is_array_descriptor_type (value_type (arr)))
1894 return value_type (arr);
d2e4a39e
AS
1895
1896 if (!bounds)
ad82864c
JB
1897 {
1898 struct type *array_type =
1899 ada_check_typedef (desc_data_target_type (value_type (arr)));
1900
1901 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1902 TYPE_FIELD_BITSIZE (array_type, 0) =
1903 decode_packed_array_bitsize (value_type (arr));
1904
1905 return array_type;
1906 }
14f9c5c9
AS
1907 else
1908 {
d2e4a39e 1909 struct type *elt_type;
14f9c5c9 1910 int arity;
d2e4a39e 1911 struct value *descriptor;
14f9c5c9 1912
df407dfe
AC
1913 elt_type = ada_array_element_type (value_type (arr), -1);
1914 arity = ada_array_arity (value_type (arr));
14f9c5c9 1915
d2e4a39e 1916 if (elt_type == NULL || arity == 0)
df407dfe 1917 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1918
1919 descriptor = desc_bounds (arr);
d2e4a39e 1920 if (value_as_long (descriptor) == 0)
4c4b4cd2 1921 return NULL;
d2e4a39e 1922 while (arity > 0)
4c4b4cd2 1923 {
e9bb382b
UW
1924 struct type *range_type = alloc_type_copy (value_type (arr));
1925 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1926 struct value *low = desc_one_bound (descriptor, arity, 0);
1927 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1928
5b4ee69b 1929 arity -= 1;
0c9c3474
SA
1930 create_static_range_type (range_type, value_type (low),
1931 longest_to_int (value_as_long (low)),
1932 longest_to_int (value_as_long (high)));
4c4b4cd2 1933 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1934
1935 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1936 {
1937 /* We need to store the element packed bitsize, as well as
1938 recompute the array size, because it was previously
1939 computed based on the unpacked element size. */
1940 LONGEST lo = value_as_long (low);
1941 LONGEST hi = value_as_long (high);
1942
1943 TYPE_FIELD_BITSIZE (elt_type, 0) =
1944 decode_packed_array_bitsize (value_type (arr));
1945 /* If the array has no element, then the size is already
1946 zero, and does not need to be recomputed. */
1947 if (lo < hi)
1948 {
1949 int array_bitsize =
1950 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
1951
1952 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1953 }
1954 }
4c4b4cd2 1955 }
14f9c5c9
AS
1956
1957 return lookup_pointer_type (elt_type);
1958 }
1959}
1960
1961/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
1962 Otherwise, returns either a standard GDB array with bounds set
1963 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
1964 GDB array. Returns NULL if ARR is a null fat pointer. */
1965
d2e4a39e
AS
1966struct value *
1967ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 1968{
df407dfe 1969 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1970 {
d2e4a39e 1971 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 1972
14f9c5c9 1973 if (arrType == NULL)
4c4b4cd2 1974 return NULL;
14f9c5c9
AS
1975 return value_cast (arrType, value_copy (desc_data (arr)));
1976 }
ad82864c
JB
1977 else if (ada_is_constrained_packed_array_type (value_type (arr)))
1978 return decode_constrained_packed_array (arr);
14f9c5c9
AS
1979 else
1980 return arr;
1981}
1982
1983/* If ARR does not represent an array, returns ARR unchanged.
1984 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
1985 be ARR itself if it already is in the proper form). */
1986
720d1a40 1987struct value *
d2e4a39e 1988ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 1989{
df407dfe 1990 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1991 {
d2e4a39e 1992 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 1993
14f9c5c9 1994 if (arrVal == NULL)
323e0a4a 1995 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 1996 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
1997 return value_ind (arrVal);
1998 }
ad82864c
JB
1999 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2000 return decode_constrained_packed_array (arr);
d2e4a39e 2001 else
14f9c5c9
AS
2002 return arr;
2003}
2004
2005/* If TYPE represents a GNAT array type, return it translated to an
2006 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2007 packing). For other types, is the identity. */
2008
d2e4a39e
AS
2009struct type *
2010ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2011{
ad82864c
JB
2012 if (ada_is_constrained_packed_array_type (type))
2013 return decode_constrained_packed_array_type (type);
17280b9f
UW
2014
2015 if (ada_is_array_descriptor_type (type))
556bdfd4 2016 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2017
2018 return type;
14f9c5c9
AS
2019}
2020
4c4b4cd2
PH
2021/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2022
ad82864c
JB
2023static int
2024ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2025{
2026 if (type == NULL)
2027 return 0;
4c4b4cd2 2028 type = desc_base_type (type);
61ee279c 2029 type = ada_check_typedef (type);
d2e4a39e 2030 return
14f9c5c9
AS
2031 ada_type_name (type) != NULL
2032 && strstr (ada_type_name (type), "___XP") != NULL;
2033}
2034
ad82864c
JB
2035/* Non-zero iff TYPE represents a standard GNAT constrained
2036 packed-array type. */
2037
2038int
2039ada_is_constrained_packed_array_type (struct type *type)
2040{
2041 return ada_is_packed_array_type (type)
2042 && !ada_is_array_descriptor_type (type);
2043}
2044
2045/* Non-zero iff TYPE represents an array descriptor for a
2046 unconstrained packed-array type. */
2047
2048static int
2049ada_is_unconstrained_packed_array_type (struct type *type)
2050{
2051 return ada_is_packed_array_type (type)
2052 && ada_is_array_descriptor_type (type);
2053}
2054
2055/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2056 return the size of its elements in bits. */
2057
2058static long
2059decode_packed_array_bitsize (struct type *type)
2060{
0d5cff50
DE
2061 const char *raw_name;
2062 const char *tail;
ad82864c
JB
2063 long bits;
2064
720d1a40
JB
2065 /* Access to arrays implemented as fat pointers are encoded as a typedef
2066 of the fat pointer type. We need the name of the fat pointer type
2067 to do the decoding, so strip the typedef layer. */
78134374 2068 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
2069 type = ada_typedef_target_type (type);
2070
2071 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2072 if (!raw_name)
2073 raw_name = ada_type_name (desc_base_type (type));
2074
2075 if (!raw_name)
2076 return 0;
2077
2078 tail = strstr (raw_name, "___XP");
720d1a40 2079 gdb_assert (tail != NULL);
ad82864c
JB
2080
2081 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2082 {
2083 lim_warning
2084 (_("could not understand bit size information on packed array"));
2085 return 0;
2086 }
2087
2088 return bits;
2089}
2090
14f9c5c9
AS
2091/* Given that TYPE is a standard GDB array type with all bounds filled
2092 in, and that the element size of its ultimate scalar constituents
2093 (that is, either its elements, or, if it is an array of arrays, its
2094 elements' elements, etc.) is *ELT_BITS, return an identical type,
2095 but with the bit sizes of its elements (and those of any
2096 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2097 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2098 in bits.
2099
2100 Note that, for arrays whose index type has an XA encoding where
2101 a bound references a record discriminant, getting that discriminant,
2102 and therefore the actual value of that bound, is not possible
2103 because none of the given parameters gives us access to the record.
2104 This function assumes that it is OK in the context where it is being
2105 used to return an array whose bounds are still dynamic and where
2106 the length is arbitrary. */
4c4b4cd2 2107
d2e4a39e 2108static struct type *
ad82864c 2109constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2110{
d2e4a39e
AS
2111 struct type *new_elt_type;
2112 struct type *new_type;
99b1c762
JB
2113 struct type *index_type_desc;
2114 struct type *index_type;
14f9c5c9
AS
2115 LONGEST low_bound, high_bound;
2116
61ee279c 2117 type = ada_check_typedef (type);
78134374 2118 if (type->code () != TYPE_CODE_ARRAY)
14f9c5c9
AS
2119 return type;
2120
99b1c762
JB
2121 index_type_desc = ada_find_parallel_type (type, "___XA");
2122 if (index_type_desc)
2123 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2124 NULL);
2125 else
2126 index_type = TYPE_INDEX_TYPE (type);
2127
e9bb382b 2128 new_type = alloc_type_copy (type);
ad82864c
JB
2129 new_elt_type =
2130 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2131 elt_bits);
99b1c762 2132 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9 2133 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
d0e39ea2 2134 new_type->set_name (ada_type_name (type));
14f9c5c9 2135
78134374 2136 if ((check_typedef (index_type)->code () == TYPE_CODE_RANGE
4a46959e
JB
2137 && is_dynamic_type (check_typedef (index_type)))
2138 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2139 low_bound = high_bound = 0;
2140 if (high_bound < low_bound)
2141 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2142 else
14f9c5c9
AS
2143 {
2144 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2145 TYPE_LENGTH (new_type) =
4c4b4cd2 2146 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2147 }
2148
876cecd0 2149 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2150 return new_type;
2151}
2152
ad82864c
JB
2153/* The array type encoded by TYPE, where
2154 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2155
d2e4a39e 2156static struct type *
ad82864c 2157decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2158{
0d5cff50 2159 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2160 char *name;
0d5cff50 2161 const char *tail;
d2e4a39e 2162 struct type *shadow_type;
14f9c5c9 2163 long bits;
14f9c5c9 2164
727e3d2e
JB
2165 if (!raw_name)
2166 raw_name = ada_type_name (desc_base_type (type));
2167
2168 if (!raw_name)
2169 return NULL;
2170
2171 name = (char *) alloca (strlen (raw_name) + 1);
2172 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2173 type = desc_base_type (type);
2174
14f9c5c9
AS
2175 memcpy (name, raw_name, tail - raw_name);
2176 name[tail - raw_name] = '\000';
2177
b4ba55a1
JB
2178 shadow_type = ada_find_parallel_type_with_name (type, name);
2179
2180 if (shadow_type == NULL)
14f9c5c9 2181 {
323e0a4a 2182 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2183 return NULL;
2184 }
f168693b 2185 shadow_type = check_typedef (shadow_type);
14f9c5c9 2186
78134374 2187 if (shadow_type->code () != TYPE_CODE_ARRAY)
14f9c5c9 2188 {
0963b4bd
MS
2189 lim_warning (_("could not understand bounds "
2190 "information on packed array"));
14f9c5c9
AS
2191 return NULL;
2192 }
d2e4a39e 2193
ad82864c
JB
2194 bits = decode_packed_array_bitsize (type);
2195 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2196}
2197
ad82864c
JB
2198/* Given that ARR is a struct value *indicating a GNAT constrained packed
2199 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2200 standard GDB array type except that the BITSIZEs of the array
2201 target types are set to the number of bits in each element, and the
4c4b4cd2 2202 type length is set appropriately. */
14f9c5c9 2203
d2e4a39e 2204static struct value *
ad82864c 2205decode_constrained_packed_array (struct value *arr)
14f9c5c9 2206{
4c4b4cd2 2207 struct type *type;
14f9c5c9 2208
11aa919a
PMR
2209 /* If our value is a pointer, then dereference it. Likewise if
2210 the value is a reference. Make sure that this operation does not
2211 cause the target type to be fixed, as this would indirectly cause
2212 this array to be decoded. The rest of the routine assumes that
2213 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2214 and "value_ind" routines to perform the dereferencing, as opposed
2215 to using "ada_coerce_ref" or "ada_value_ind". */
2216 arr = coerce_ref (arr);
78134374 2217 if (ada_check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
284614f0 2218 arr = value_ind (arr);
4c4b4cd2 2219
ad82864c 2220 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2221 if (type == NULL)
2222 {
323e0a4a 2223 error (_("can't unpack array"));
14f9c5c9
AS
2224 return NULL;
2225 }
61ee279c 2226
d5a22e77 2227 if (type_byte_order (value_type (arr)) == BFD_ENDIAN_BIG
32c9a795 2228 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2229 {
2230 /* This is a (right-justified) modular type representing a packed
2231 array with no wrapper. In order to interpret the value through
2232 the (left-justified) packed array type we just built, we must
2233 first left-justify it. */
2234 int bit_size, bit_pos;
2235 ULONGEST mod;
2236
df407dfe 2237 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2238 bit_size = 0;
2239 while (mod > 0)
2240 {
2241 bit_size += 1;
2242 mod >>= 1;
2243 }
df407dfe 2244 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2245 arr = ada_value_primitive_packed_val (arr, NULL,
2246 bit_pos / HOST_CHAR_BIT,
2247 bit_pos % HOST_CHAR_BIT,
2248 bit_size,
2249 type);
2250 }
2251
4c4b4cd2 2252 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2253}
2254
2255
2256/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2257 given in IND. ARR must be a simple array. */
14f9c5c9 2258
d2e4a39e
AS
2259static struct value *
2260value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2261{
2262 int i;
2263 int bits, elt_off, bit_off;
2264 long elt_total_bit_offset;
d2e4a39e
AS
2265 struct type *elt_type;
2266 struct value *v;
14f9c5c9
AS
2267
2268 bits = 0;
2269 elt_total_bit_offset = 0;
df407dfe 2270 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2271 for (i = 0; i < arity; i += 1)
14f9c5c9 2272 {
78134374 2273 if (elt_type->code () != TYPE_CODE_ARRAY
4c4b4cd2
PH
2274 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2275 error
0963b4bd
MS
2276 (_("attempt to do packed indexing of "
2277 "something other than a packed array"));
14f9c5c9 2278 else
4c4b4cd2
PH
2279 {
2280 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2281 LONGEST lowerbound, upperbound;
2282 LONGEST idx;
2283
2284 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2285 {
323e0a4a 2286 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2287 lowerbound = upperbound = 0;
2288 }
2289
3cb382c9 2290 idx = pos_atr (ind[i]);
4c4b4cd2 2291 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2292 lim_warning (_("packed array index %ld out of bounds"),
2293 (long) idx);
4c4b4cd2
PH
2294 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2295 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2296 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2297 }
14f9c5c9
AS
2298 }
2299 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2300 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2301
2302 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2303 bits, elt_type);
14f9c5c9
AS
2304 return v;
2305}
2306
4c4b4cd2 2307/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2308
2309static int
d2e4a39e 2310has_negatives (struct type *type)
14f9c5c9 2311{
78134374 2312 switch (type->code ())
d2e4a39e
AS
2313 {
2314 default:
2315 return 0;
2316 case TYPE_CODE_INT:
2317 return !TYPE_UNSIGNED (type);
2318 case TYPE_CODE_RANGE:
4e962e74 2319 return TYPE_LOW_BOUND (type) - TYPE_RANGE_DATA (type)->bias < 0;
d2e4a39e 2320 }
14f9c5c9 2321}
d2e4a39e 2322
f93fca70 2323/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2324 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2325 the unpacked buffer.
14f9c5c9 2326
5b639dea
JB
2327 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2328 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2329
f93fca70
JB
2330 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2331 zero otherwise.
14f9c5c9 2332
f93fca70 2333 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2334
f93fca70
JB
2335 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2336
2337static void
2338ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2339 gdb_byte *unpacked, int unpacked_len,
2340 int is_big_endian, int is_signed_type,
2341 int is_scalar)
2342{
a1c95e6b
JB
2343 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2344 int src_idx; /* Index into the source area */
2345 int src_bytes_left; /* Number of source bytes left to process. */
2346 int srcBitsLeft; /* Number of source bits left to move */
2347 int unusedLS; /* Number of bits in next significant
2348 byte of source that are unused */
2349
a1c95e6b
JB
2350 int unpacked_idx; /* Index into the unpacked buffer */
2351 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2352
4c4b4cd2 2353 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2354 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2355 unsigned char sign;
a1c95e6b 2356
4c4b4cd2
PH
2357 /* Transmit bytes from least to most significant; delta is the direction
2358 the indices move. */
f93fca70 2359 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2360
5b639dea
JB
2361 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2362 bits from SRC. .*/
2363 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2364 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2365 bit_size, unpacked_len);
2366
14f9c5c9 2367 srcBitsLeft = bit_size;
086ca51f 2368 src_bytes_left = src_len;
f93fca70 2369 unpacked_bytes_left = unpacked_len;
14f9c5c9 2370 sign = 0;
f93fca70
JB
2371
2372 if (is_big_endian)
14f9c5c9 2373 {
086ca51f 2374 src_idx = src_len - 1;
f93fca70
JB
2375 if (is_signed_type
2376 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2377 sign = ~0;
d2e4a39e
AS
2378
2379 unusedLS =
4c4b4cd2
PH
2380 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2381 % HOST_CHAR_BIT;
14f9c5c9 2382
f93fca70
JB
2383 if (is_scalar)
2384 {
2385 accumSize = 0;
2386 unpacked_idx = unpacked_len - 1;
2387 }
2388 else
2389 {
4c4b4cd2
PH
2390 /* Non-scalar values must be aligned at a byte boundary... */
2391 accumSize =
2392 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2393 /* ... And are placed at the beginning (most-significant) bytes
2394 of the target. */
086ca51f
JB
2395 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2396 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2397 }
14f9c5c9 2398 }
d2e4a39e 2399 else
14f9c5c9
AS
2400 {
2401 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2402
086ca51f 2403 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2404 unusedLS = bit_offset;
2405 accumSize = 0;
2406
f93fca70 2407 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2408 sign = ~0;
14f9c5c9 2409 }
d2e4a39e 2410
14f9c5c9 2411 accum = 0;
086ca51f 2412 while (src_bytes_left > 0)
14f9c5c9
AS
2413 {
2414 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2415 part of the value. */
d2e4a39e 2416 unsigned int unusedMSMask =
4c4b4cd2
PH
2417 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2418 1;
2419 /* Sign-extend bits for this byte. */
14f9c5c9 2420 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2421
d2e4a39e 2422 accum |=
086ca51f 2423 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2424 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2425 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2 2426 {
db297a65 2427 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
4c4b4cd2
PH
2428 accumSize -= HOST_CHAR_BIT;
2429 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2430 unpacked_bytes_left -= 1;
2431 unpacked_idx += delta;
4c4b4cd2 2432 }
14f9c5c9
AS
2433 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2434 unusedLS = 0;
086ca51f
JB
2435 src_bytes_left -= 1;
2436 src_idx += delta;
14f9c5c9 2437 }
086ca51f 2438 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2439 {
2440 accum |= sign << accumSize;
db297a65 2441 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2442 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2443 if (accumSize < 0)
2444 accumSize = 0;
14f9c5c9 2445 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2446 unpacked_bytes_left -= 1;
2447 unpacked_idx += delta;
14f9c5c9 2448 }
f93fca70
JB
2449}
2450
2451/* Create a new value of type TYPE from the contents of OBJ starting
2452 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2453 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2454 assigning through the result will set the field fetched from.
2455 VALADDR is ignored unless OBJ is NULL, in which case,
2456 VALADDR+OFFSET must address the start of storage containing the
2457 packed value. The value returned in this case is never an lval.
2458 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2459
2460struct value *
2461ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2462 long offset, int bit_offset, int bit_size,
2463 struct type *type)
2464{
2465 struct value *v;
bfb1c796 2466 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2467 gdb_byte *unpacked;
220475ed 2468 const int is_scalar = is_scalar_type (type);
d5a22e77 2469 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d5722aa2 2470 gdb::byte_vector staging;
f93fca70
JB
2471
2472 type = ada_check_typedef (type);
2473
d0a9e810 2474 if (obj == NULL)
bfb1c796 2475 src = valaddr + offset;
d0a9e810 2476 else
bfb1c796 2477 src = value_contents (obj) + offset;
d0a9e810
JB
2478
2479 if (is_dynamic_type (type))
2480 {
2481 /* The length of TYPE might by dynamic, so we need to resolve
2482 TYPE in order to know its actual size, which we then use
2483 to create the contents buffer of the value we return.
2484 The difficulty is that the data containing our object is
2485 packed, and therefore maybe not at a byte boundary. So, what
2486 we do, is unpack the data into a byte-aligned buffer, and then
2487 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2488 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2489 staging.resize (staging_len);
d0a9e810
JB
2490
2491 ada_unpack_from_contents (src, bit_offset, bit_size,
d5722aa2 2492 staging.data (), staging.size (),
d0a9e810
JB
2493 is_big_endian, has_negatives (type),
2494 is_scalar);
b249d2c2 2495 type = resolve_dynamic_type (type, staging, 0);
0cafa88c
JB
2496 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2497 {
2498 /* This happens when the length of the object is dynamic,
2499 and is actually smaller than the space reserved for it.
2500 For instance, in an array of variant records, the bit_size
2501 we're given is the array stride, which is constant and
2502 normally equal to the maximum size of its element.
2503 But, in reality, each element only actually spans a portion
2504 of that stride. */
2505 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2506 }
d0a9e810
JB
2507 }
2508
f93fca70
JB
2509 if (obj == NULL)
2510 {
2511 v = allocate_value (type);
bfb1c796 2512 src = valaddr + offset;
f93fca70
JB
2513 }
2514 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2515 {
0cafa88c 2516 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2517 gdb_byte *buf;
0cafa88c 2518
f93fca70 2519 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2520 buf = (gdb_byte *) alloca (src_len);
2521 read_memory (value_address (v), buf, src_len);
2522 src = buf;
f93fca70
JB
2523 }
2524 else
2525 {
2526 v = allocate_value (type);
bfb1c796 2527 src = value_contents (obj) + offset;
f93fca70
JB
2528 }
2529
2530 if (obj != NULL)
2531 {
2532 long new_offset = offset;
2533
2534 set_value_component_location (v, obj);
2535 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2536 set_value_bitsize (v, bit_size);
2537 if (value_bitpos (v) >= HOST_CHAR_BIT)
2538 {
2539 ++new_offset;
2540 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2541 }
2542 set_value_offset (v, new_offset);
2543
2544 /* Also set the parent value. This is needed when trying to
2545 assign a new value (in inferior memory). */
2546 set_value_parent (v, obj);
2547 }
2548 else
2549 set_value_bitsize (v, bit_size);
bfb1c796 2550 unpacked = value_contents_writeable (v);
f93fca70
JB
2551
2552 if (bit_size == 0)
2553 {
2554 memset (unpacked, 0, TYPE_LENGTH (type));
2555 return v;
2556 }
2557
d5722aa2 2558 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2559 {
d0a9e810
JB
2560 /* Small short-cut: If we've unpacked the data into a buffer
2561 of the same size as TYPE's length, then we can reuse that,
2562 instead of doing the unpacking again. */
d5722aa2 2563 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2564 }
d0a9e810
JB
2565 else
2566 ada_unpack_from_contents (src, bit_offset, bit_size,
2567 unpacked, TYPE_LENGTH (type),
2568 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2569
14f9c5c9
AS
2570 return v;
2571}
d2e4a39e 2572
14f9c5c9
AS
2573/* Store the contents of FROMVAL into the location of TOVAL.
2574 Return a new value with the location of TOVAL and contents of
2575 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2576 floating-point or non-scalar types. */
14f9c5c9 2577
d2e4a39e
AS
2578static struct value *
2579ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2580{
df407dfe
AC
2581 struct type *type = value_type (toval);
2582 int bits = value_bitsize (toval);
14f9c5c9 2583
52ce6436
PH
2584 toval = ada_coerce_ref (toval);
2585 fromval = ada_coerce_ref (fromval);
2586
2587 if (ada_is_direct_array_type (value_type (toval)))
2588 toval = ada_coerce_to_simple_array (toval);
2589 if (ada_is_direct_array_type (value_type (fromval)))
2590 fromval = ada_coerce_to_simple_array (fromval);
2591
88e3b34b 2592 if (!deprecated_value_modifiable (toval))
323e0a4a 2593 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2594
d2e4a39e 2595 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2596 && bits > 0
78134374
SM
2597 && (type->code () == TYPE_CODE_FLT
2598 || type->code () == TYPE_CODE_STRUCT))
14f9c5c9 2599 {
df407dfe
AC
2600 int len = (value_bitpos (toval)
2601 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2602 int from_size;
224c3ddb 2603 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2604 struct value *val;
42ae5230 2605 CORE_ADDR to_addr = value_address (toval);
14f9c5c9 2606
78134374 2607 if (type->code () == TYPE_CODE_FLT)
4c4b4cd2 2608 fromval = value_cast (type, fromval);
14f9c5c9 2609
52ce6436 2610 read_memory (to_addr, buffer, len);
aced2898
PH
2611 from_size = value_bitsize (fromval);
2612 if (from_size == 0)
2613 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4 2614
d5a22e77 2615 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d48e62f4
TT
2616 ULONGEST from_offset = 0;
2617 if (is_big_endian && is_scalar_type (value_type (fromval)))
2618 from_offset = from_size - bits;
2619 copy_bitwise (buffer, value_bitpos (toval),
2620 value_contents (fromval), from_offset,
2621 bits, is_big_endian);
972daa01 2622 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2623
14f9c5c9 2624 val = value_copy (toval);
0fd88904 2625 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2626 TYPE_LENGTH (type));
04624583 2627 deprecated_set_value_type (val, type);
d2e4a39e 2628
14f9c5c9
AS
2629 return val;
2630 }
2631
2632 return value_assign (toval, fromval);
2633}
2634
2635
7c512744
JB
2636/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2637 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2638 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2639 COMPONENT, and not the inferior's memory. The current contents
2640 of COMPONENT are ignored.
2641
2642 Although not part of the initial design, this function also works
2643 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2644 had a null address, and COMPONENT had an address which is equal to
2645 its offset inside CONTAINER. */
2646
52ce6436
PH
2647static void
2648value_assign_to_component (struct value *container, struct value *component,
2649 struct value *val)
2650{
2651 LONGEST offset_in_container =
42ae5230 2652 (LONGEST) (value_address (component) - value_address (container));
7c512744 2653 int bit_offset_in_container =
52ce6436
PH
2654 value_bitpos (component) - value_bitpos (container);
2655 int bits;
7c512744 2656
52ce6436
PH
2657 val = value_cast (value_type (component), val);
2658
2659 if (value_bitsize (component) == 0)
2660 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2661 else
2662 bits = value_bitsize (component);
2663
d5a22e77 2664 if (type_byte_order (value_type (container)) == BFD_ENDIAN_BIG)
2a62dfa9
JB
2665 {
2666 int src_offset;
2667
2668 if (is_scalar_type (check_typedef (value_type (component))))
2669 src_offset
2670 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2671 else
2672 src_offset = 0;
a99bc3d2
JB
2673 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2674 value_bitpos (container) + bit_offset_in_container,
2675 value_contents (val), src_offset, bits, 1);
2a62dfa9 2676 }
52ce6436 2677 else
a99bc3d2
JB
2678 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2679 value_bitpos (container) + bit_offset_in_container,
2680 value_contents (val), 0, bits, 0);
7c512744
JB
2681}
2682
736ade86
XR
2683/* Determine if TYPE is an access to an unconstrained array. */
2684
d91e9ea8 2685bool
736ade86
XR
2686ada_is_access_to_unconstrained_array (struct type *type)
2687{
78134374 2688 return (type->code () == TYPE_CODE_TYPEDEF
736ade86
XR
2689 && is_thick_pntr (ada_typedef_target_type (type)));
2690}
2691
4c4b4cd2
PH
2692/* The value of the element of array ARR at the ARITY indices given in IND.
2693 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2694 thereto. */
2695
d2e4a39e
AS
2696struct value *
2697ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2698{
2699 int k;
d2e4a39e
AS
2700 struct value *elt;
2701 struct type *elt_type;
14f9c5c9
AS
2702
2703 elt = ada_coerce_to_simple_array (arr);
2704
df407dfe 2705 elt_type = ada_check_typedef (value_type (elt));
78134374 2706 if (elt_type->code () == TYPE_CODE_ARRAY
14f9c5c9
AS
2707 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2708 return value_subscript_packed (elt, arity, ind);
2709
2710 for (k = 0; k < arity; k += 1)
2711 {
b9c50e9a
XR
2712 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2713
78134374 2714 if (elt_type->code () != TYPE_CODE_ARRAY)
323e0a4a 2715 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2716
2497b498 2717 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2718
2719 if (ada_is_access_to_unconstrained_array (saved_elt_type)
78134374 2720 && value_type (elt)->code () != TYPE_CODE_TYPEDEF)
b9c50e9a
XR
2721 {
2722 /* The element is a typedef to an unconstrained array,
2723 except that the value_subscript call stripped the
2724 typedef layer. The typedef layer is GNAT's way to
2725 specify that the element is, at the source level, an
2726 access to the unconstrained array, rather than the
2727 unconstrained array. So, we need to restore that
2728 typedef layer, which we can do by forcing the element's
2729 type back to its original type. Otherwise, the returned
2730 value is going to be printed as the array, rather
2731 than as an access. Another symptom of the same issue
2732 would be that an expression trying to dereference the
2733 element would also be improperly rejected. */
2734 deprecated_set_value_type (elt, saved_elt_type);
2735 }
2736
2737 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2738 }
b9c50e9a 2739
14f9c5c9
AS
2740 return elt;
2741}
2742
deede10c
JB
2743/* Assuming ARR is a pointer to a GDB array, the value of the element
2744 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2745 Does not read the entire array into memory.
2746
2747 Note: Unlike what one would expect, this function is used instead of
2748 ada_value_subscript for basically all non-packed array types. The reason
2749 for this is that a side effect of doing our own pointer arithmetics instead
2750 of relying on value_subscript is that there is no implicit typedef peeling.
2751 This is important for arrays of array accesses, where it allows us to
2752 preserve the fact that the array's element is an array access, where the
2753 access part os encoded in a typedef layer. */
14f9c5c9 2754
2c0b251b 2755static struct value *
deede10c 2756ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2757{
2758 int k;
919e6dbe 2759 struct value *array_ind = ada_value_ind (arr);
deede10c 2760 struct type *type
919e6dbe
PMR
2761 = check_typedef (value_enclosing_type (array_ind));
2762
78134374 2763 if (type->code () == TYPE_CODE_ARRAY
919e6dbe
PMR
2764 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2765 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2766
2767 for (k = 0; k < arity; k += 1)
2768 {
2769 LONGEST lwb, upb;
14f9c5c9 2770
78134374 2771 if (type->code () != TYPE_CODE_ARRAY)
323e0a4a 2772 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2773 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2774 value_copy (arr));
14f9c5c9 2775 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
53a47a3e 2776 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2777 type = TYPE_TARGET_TYPE (type);
2778 }
2779
2780 return value_ind (arr);
2781}
2782
0b5d8877 2783/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2784 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2785 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2786 this array is LOW, as per Ada rules. */
0b5d8877 2787static struct value *
f5938064
JG
2788ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2789 int low, int high)
0b5d8877 2790{
b0dd7688 2791 struct type *type0 = ada_check_typedef (type);
aa715135 2792 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0));
0c9c3474 2793 struct type *index_type
aa715135 2794 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2795 struct type *slice_type = create_array_type_with_stride
2796 (NULL, TYPE_TARGET_TYPE (type0), index_type,
24e99c6c 2797 type0->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2798 TYPE_FIELD_BITSIZE (type0, 0));
aa715135
JG
2799 int base_low = ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0));
2800 LONGEST base_low_pos, low_pos;
2801 CORE_ADDR base;
2802
2803 if (!discrete_position (base_index_type, low, &low_pos)
2804 || !discrete_position (base_index_type, base_low, &base_low_pos))
2805 {
2806 warning (_("unable to get positions in slice, use bounds instead"));
2807 low_pos = low;
2808 base_low_pos = base_low;
2809 }
5b4ee69b 2810
aa715135
JG
2811 base = value_as_address (array_ptr)
2812 + ((low_pos - base_low_pos)
2813 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
f5938064 2814 return value_at_lazy (slice_type, base);
0b5d8877
PH
2815}
2816
2817
2818static struct value *
2819ada_value_slice (struct value *array, int low, int high)
2820{
b0dd7688 2821 struct type *type = ada_check_typedef (value_type (array));
aa715135 2822 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
0c9c3474
SA
2823 struct type *index_type
2824 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
9fe561ab
JB
2825 struct type *slice_type = create_array_type_with_stride
2826 (NULL, TYPE_TARGET_TYPE (type), index_type,
24e99c6c 2827 type->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2828 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2829 LONGEST low_pos, high_pos;
5b4ee69b 2830
aa715135
JG
2831 if (!discrete_position (base_index_type, low, &low_pos)
2832 || !discrete_position (base_index_type, high, &high_pos))
2833 {
2834 warning (_("unable to get positions in slice, use bounds instead"));
2835 low_pos = low;
2836 high_pos = high;
2837 }
2838
2839 return value_cast (slice_type,
2840 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2841}
2842
14f9c5c9
AS
2843/* If type is a record type in the form of a standard GNAT array
2844 descriptor, returns the number of dimensions for type. If arr is a
2845 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2846 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2847
2848int
d2e4a39e 2849ada_array_arity (struct type *type)
14f9c5c9
AS
2850{
2851 int arity;
2852
2853 if (type == NULL)
2854 return 0;
2855
2856 type = desc_base_type (type);
2857
2858 arity = 0;
78134374 2859 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9 2860 return desc_arity (desc_bounds_type (type));
d2e4a39e 2861 else
78134374 2862 while (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2863 {
4c4b4cd2 2864 arity += 1;
61ee279c 2865 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2866 }
d2e4a39e 2867
14f9c5c9
AS
2868 return arity;
2869}
2870
2871/* If TYPE is a record type in the form of a standard GNAT array
2872 descriptor or a simple array type, returns the element type for
2873 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2874 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2875
d2e4a39e
AS
2876struct type *
2877ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2878{
2879 type = desc_base_type (type);
2880
78134374 2881 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
2882 {
2883 int k;
d2e4a39e 2884 struct type *p_array_type;
14f9c5c9 2885
556bdfd4 2886 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2887
2888 k = ada_array_arity (type);
2889 if (k == 0)
4c4b4cd2 2890 return NULL;
d2e4a39e 2891
4c4b4cd2 2892 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2893 if (nindices >= 0 && k > nindices)
4c4b4cd2 2894 k = nindices;
d2e4a39e 2895 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2896 {
61ee279c 2897 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2898 k -= 1;
2899 }
14f9c5c9
AS
2900 return p_array_type;
2901 }
78134374 2902 else if (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2903 {
78134374 2904 while (nindices != 0 && type->code () == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2905 {
2906 type = TYPE_TARGET_TYPE (type);
2907 nindices -= 1;
2908 }
14f9c5c9
AS
2909 return type;
2910 }
2911
2912 return NULL;
2913}
2914
4c4b4cd2 2915/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2916 Does not examine memory. Throws an error if N is invalid or TYPE
2917 is not an array type. NAME is the name of the Ada attribute being
2918 evaluated ('range, 'first, 'last, or 'length); it is used in building
2919 the error message. */
14f9c5c9 2920
1eea4ebd
UW
2921static struct type *
2922ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2923{
4c4b4cd2
PH
2924 struct type *result_type;
2925
14f9c5c9
AS
2926 type = desc_base_type (type);
2927
1eea4ebd
UW
2928 if (n < 0 || n > ada_array_arity (type))
2929 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2930
4c4b4cd2 2931 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2932 {
2933 int i;
2934
2935 for (i = 1; i < n; i += 1)
4c4b4cd2 2936 type = TYPE_TARGET_TYPE (type);
262452ec 2937 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2938 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2939 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2940 perhaps stabsread.c would make more sense. */
78134374 2941 if (result_type && result_type->code () == TYPE_CODE_UNDEF)
1eea4ebd 2942 result_type = NULL;
14f9c5c9 2943 }
d2e4a39e 2944 else
1eea4ebd
UW
2945 {
2946 result_type = desc_index_type (desc_bounds_type (type), n);
2947 if (result_type == NULL)
2948 error (_("attempt to take bound of something that is not an array"));
2949 }
2950
2951 return result_type;
14f9c5c9
AS
2952}
2953
2954/* Given that arr is an array type, returns the lower bound of the
2955 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2956 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2957 array-descriptor type. It works for other arrays with bounds supplied
2958 by run-time quantities other than discriminants. */
14f9c5c9 2959
abb68b3e 2960static LONGEST
fb5e3d5c 2961ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2962{
8a48ac95 2963 struct type *type, *index_type_desc, *index_type;
1ce677a4 2964 int i;
262452ec
JK
2965
2966 gdb_assert (which == 0 || which == 1);
14f9c5c9 2967
ad82864c
JB
2968 if (ada_is_constrained_packed_array_type (arr_type))
2969 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2970
4c4b4cd2 2971 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2972 return (LONGEST) - which;
14f9c5c9 2973
78134374 2974 if (arr_type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
2975 type = TYPE_TARGET_TYPE (arr_type);
2976 else
2977 type = arr_type;
2978
bafffb51
JB
2979 if (TYPE_FIXED_INSTANCE (type))
2980 {
2981 /* The array has already been fixed, so we do not need to
2982 check the parallel ___XA type again. That encoding has
2983 already been applied, so ignore it now. */
2984 index_type_desc = NULL;
2985 }
2986 else
2987 {
2988 index_type_desc = ada_find_parallel_type (type, "___XA");
2989 ada_fixup_array_indexes_type (index_type_desc);
2990 }
2991
262452ec 2992 if (index_type_desc != NULL)
28c85d6c
JB
2993 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2994 NULL);
262452ec 2995 else
8a48ac95
JB
2996 {
2997 struct type *elt_type = check_typedef (type);
2998
2999 for (i = 1; i < n; i++)
3000 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3001
3002 index_type = TYPE_INDEX_TYPE (elt_type);
3003 }
262452ec 3004
43bbcdc2
PH
3005 return
3006 (LONGEST) (which == 0
3007 ? ada_discrete_type_low_bound (index_type)
3008 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3009}
3010
3011/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3012 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3013 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3014 supplied by run-time quantities other than discriminants. */
14f9c5c9 3015
1eea4ebd 3016static LONGEST
4dc81987 3017ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3018{
eb479039
JB
3019 struct type *arr_type;
3020
78134374 3021 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3022 arr = value_ind (arr);
3023 arr_type = value_enclosing_type (arr);
14f9c5c9 3024
ad82864c
JB
3025 if (ada_is_constrained_packed_array_type (arr_type))
3026 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3027 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3028 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3029 else
1eea4ebd 3030 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3031}
3032
3033/* Given that arr is an array value, returns the length of the
3034 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3035 supplied by run-time quantities other than discriminants.
3036 Does not work for arrays indexed by enumeration types with representation
3037 clauses at the moment. */
14f9c5c9 3038
1eea4ebd 3039static LONGEST
d2e4a39e 3040ada_array_length (struct value *arr, int n)
14f9c5c9 3041{
aa715135
JG
3042 struct type *arr_type, *index_type;
3043 int low, high;
eb479039 3044
78134374 3045 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3046 arr = value_ind (arr);
3047 arr_type = value_enclosing_type (arr);
14f9c5c9 3048
ad82864c
JB
3049 if (ada_is_constrained_packed_array_type (arr_type))
3050 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3051
4c4b4cd2 3052 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3053 {
3054 low = ada_array_bound_from_type (arr_type, n, 0);
3055 high = ada_array_bound_from_type (arr_type, n, 1);
3056 }
14f9c5c9 3057 else
aa715135
JG
3058 {
3059 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3060 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3061 }
3062
f168693b 3063 arr_type = check_typedef (arr_type);
7150d33c 3064 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3065 if (index_type != NULL)
3066 {
3067 struct type *base_type;
78134374 3068 if (index_type->code () == TYPE_CODE_RANGE)
aa715135
JG
3069 base_type = TYPE_TARGET_TYPE (index_type);
3070 else
3071 base_type = index_type;
3072
3073 low = pos_atr (value_from_longest (base_type, low));
3074 high = pos_atr (value_from_longest (base_type, high));
3075 }
3076 return high - low + 1;
4c4b4cd2
PH
3077}
3078
bff8c71f
TT
3079/* An array whose type is that of ARR_TYPE (an array type), with
3080 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3081 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3082
3083static struct value *
bff8c71f 3084empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3085{
b0dd7688 3086 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3087 struct type *index_type
3088 = create_static_range_type
bff8c71f
TT
3089 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low,
3090 high < low ? low - 1 : high);
b0dd7688 3091 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3092
0b5d8877 3093 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3094}
14f9c5c9 3095\f
d2e4a39e 3096
4c4b4cd2 3097 /* Name resolution */
14f9c5c9 3098
4c4b4cd2
PH
3099/* The "decoded" name for the user-definable Ada operator corresponding
3100 to OP. */
14f9c5c9 3101
d2e4a39e 3102static const char *
4c4b4cd2 3103ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3104{
3105 int i;
3106
4c4b4cd2 3107 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3108 {
3109 if (ada_opname_table[i].op == op)
4c4b4cd2 3110 return ada_opname_table[i].decoded;
14f9c5c9 3111 }
323e0a4a 3112 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3113}
3114
de93309a
SM
3115/* Returns true (non-zero) iff decoded name N0 should appear before N1
3116 in a listing of choices during disambiguation (see sort_choices, below).
3117 The idea is that overloadings of a subprogram name from the
3118 same package should sort in their source order. We settle for ordering
3119 such symbols by their trailing number (__N or $N). */
14f9c5c9 3120
de93309a
SM
3121static int
3122encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9 3123{
de93309a
SM
3124 if (N1 == NULL)
3125 return 0;
3126 else if (N0 == NULL)
3127 return 1;
3128 else
3129 {
3130 int k0, k1;
30b15541 3131
de93309a
SM
3132 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
3133 ;
3134 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
3135 ;
3136 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
3137 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3138 {
3139 int n0, n1;
30b15541 3140
de93309a
SM
3141 n0 = k0;
3142 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3143 n0 -= 1;
3144 n1 = k1;
3145 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3146 n1 -= 1;
3147 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3148 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3149 }
3150 return (strcmp (N0, N1) < 0);
3151 }
14f9c5c9
AS
3152}
3153
de93309a
SM
3154/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3155 encoded names. */
14f9c5c9 3156
de93309a
SM
3157static void
3158sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3159{
14f9c5c9 3160 int i;
14f9c5c9 3161
de93309a 3162 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3163 {
de93309a
SM
3164 struct block_symbol sym = syms[i];
3165 int j;
3166
3167 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2 3168 {
987012b8
CB
3169 if (encoded_ordered_before (syms[j].symbol->linkage_name (),
3170 sym.symbol->linkage_name ()))
de93309a
SM
3171 break;
3172 syms[j + 1] = syms[j];
4c4b4cd2 3173 }
de93309a
SM
3174 syms[j + 1] = sym;
3175 }
3176}
14f9c5c9 3177
de93309a
SM
3178/* Whether GDB should display formals and return types for functions in the
3179 overloads selection menu. */
3180static bool print_signatures = true;
4c4b4cd2 3181
de93309a
SM
3182/* Print the signature for SYM on STREAM according to the FLAGS options. For
3183 all but functions, the signature is just the name of the symbol. For
3184 functions, this is the name of the function, the list of types for formals
3185 and the return type (if any). */
4c4b4cd2 3186
de93309a
SM
3187static void
3188ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3189 const struct type_print_options *flags)
3190{
3191 struct type *type = SYMBOL_TYPE (sym);
14f9c5c9 3192
987012b8 3193 fprintf_filtered (stream, "%s", sym->print_name ());
de93309a
SM
3194 if (!print_signatures
3195 || type == NULL
78134374 3196 || type->code () != TYPE_CODE_FUNC)
de93309a 3197 return;
4c4b4cd2 3198
1f704f76 3199 if (type->num_fields () > 0)
de93309a
SM
3200 {
3201 int i;
14f9c5c9 3202
de93309a 3203 fprintf_filtered (stream, " (");
1f704f76 3204 for (i = 0; i < type->num_fields (); ++i)
de93309a
SM
3205 {
3206 if (i > 0)
3207 fprintf_filtered (stream, "; ");
3208 ada_print_type (TYPE_FIELD_TYPE (type, i), NULL, stream, -1, 0,
3209 flags);
3210 }
3211 fprintf_filtered (stream, ")");
3212 }
3213 if (TYPE_TARGET_TYPE (type) != NULL
78134374 3214 && TYPE_TARGET_TYPE (type)->code () != TYPE_CODE_VOID)
de93309a
SM
3215 {
3216 fprintf_filtered (stream, " return ");
3217 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3218 }
3219}
14f9c5c9 3220
de93309a
SM
3221/* Read and validate a set of numeric choices from the user in the
3222 range 0 .. N_CHOICES-1. Place the results in increasing
3223 order in CHOICES[0 .. N-1], and return N.
14f9c5c9 3224
de93309a
SM
3225 The user types choices as a sequence of numbers on one line
3226 separated by blanks, encoding them as follows:
14f9c5c9 3227
de93309a
SM
3228 + A choice of 0 means to cancel the selection, throwing an error.
3229 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3230 + The user chooses k by typing k+IS_ALL_CHOICE+1.
14f9c5c9 3231
de93309a 3232 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9 3233
de93309a
SM
3234 ANNOTATION_SUFFIX, if present, is used to annotate the input
3235 prompts (for use with the -f switch). */
14f9c5c9 3236
de93309a
SM
3237static int
3238get_selections (int *choices, int n_choices, int max_results,
3239 int is_all_choice, const char *annotation_suffix)
3240{
992a7040 3241 const char *args;
de93309a
SM
3242 const char *prompt;
3243 int n_chosen;
3244 int first_choice = is_all_choice ? 2 : 1;
14f9c5c9 3245
de93309a
SM
3246 prompt = getenv ("PS2");
3247 if (prompt == NULL)
3248 prompt = "> ";
4c4b4cd2 3249
de93309a 3250 args = command_line_input (prompt, annotation_suffix);
4c4b4cd2 3251
de93309a
SM
3252 if (args == NULL)
3253 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3254
de93309a 3255 n_chosen = 0;
4c4b4cd2 3256
de93309a
SM
3257 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3258 order, as given in args. Choices are validated. */
3259 while (1)
14f9c5c9 3260 {
de93309a
SM
3261 char *args2;
3262 int choice, j;
76a01679 3263
de93309a
SM
3264 args = skip_spaces (args);
3265 if (*args == '\0' && n_chosen == 0)
3266 error_no_arg (_("one or more choice numbers"));
3267 else if (*args == '\0')
3268 break;
76a01679 3269
de93309a
SM
3270 choice = strtol (args, &args2, 10);
3271 if (args == args2 || choice < 0
3272 || choice > n_choices + first_choice - 1)
3273 error (_("Argument must be choice number"));
3274 args = args2;
76a01679 3275
de93309a
SM
3276 if (choice == 0)
3277 error (_("cancelled"));
76a01679 3278
de93309a
SM
3279 if (choice < first_choice)
3280 {
3281 n_chosen = n_choices;
3282 for (j = 0; j < n_choices; j += 1)
3283 choices[j] = j;
3284 break;
76a01679 3285 }
de93309a 3286 choice -= first_choice;
76a01679 3287
de93309a 3288 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
76a01679 3289 {
76a01679 3290 }
4c4b4cd2 3291
de93309a 3292 if (j < 0 || choice != choices[j])
4c4b4cd2 3293 {
de93309a 3294 int k;
4c4b4cd2 3295
de93309a
SM
3296 for (k = n_chosen - 1; k > j; k -= 1)
3297 choices[k + 1] = choices[k];
3298 choices[j + 1] = choice;
3299 n_chosen += 1;
4c4b4cd2 3300 }
14f9c5c9
AS
3301 }
3302
de93309a
SM
3303 if (n_chosen > max_results)
3304 error (_("Select no more than %d of the above"), max_results);
3305
3306 return n_chosen;
14f9c5c9
AS
3307}
3308
de93309a
SM
3309/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3310 by asking the user (if necessary), returning the number selected,
3311 and setting the first elements of SYMS items. Error if no symbols
3312 selected. */
3313
3314/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
3315 to be re-integrated one of these days. */
14f9c5c9
AS
3316
3317static int
de93309a 3318user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9 3319{
de93309a
SM
3320 int i;
3321 int *chosen = XALLOCAVEC (int , nsyms);
3322 int n_chosen;
3323 int first_choice = (max_results == 1) ? 1 : 2;
3324 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9 3325
de93309a
SM
3326 if (max_results < 1)
3327 error (_("Request to select 0 symbols!"));
3328 if (nsyms <= 1)
3329 return nsyms;
14f9c5c9 3330
de93309a
SM
3331 if (select_mode == multiple_symbols_cancel)
3332 error (_("\
3333canceled because the command is ambiguous\n\
3334See set/show multiple-symbol."));
14f9c5c9 3335
de93309a
SM
3336 /* If select_mode is "all", then return all possible symbols.
3337 Only do that if more than one symbol can be selected, of course.
3338 Otherwise, display the menu as usual. */
3339 if (select_mode == multiple_symbols_all && max_results > 1)
3340 return nsyms;
14f9c5c9 3341
de93309a
SM
3342 printf_filtered (_("[0] cancel\n"));
3343 if (max_results > 1)
3344 printf_filtered (_("[1] all\n"));
14f9c5c9 3345
de93309a 3346 sort_choices (syms, nsyms);
14f9c5c9 3347
de93309a
SM
3348 for (i = 0; i < nsyms; i += 1)
3349 {
3350 if (syms[i].symbol == NULL)
3351 continue;
14f9c5c9 3352
de93309a
SM
3353 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
3354 {
3355 struct symtab_and_line sal =
3356 find_function_start_sal (syms[i].symbol, 1);
14f9c5c9 3357
de93309a
SM
3358 printf_filtered ("[%d] ", i + first_choice);
3359 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3360 &type_print_raw_options);
3361 if (sal.symtab == NULL)
3362 printf_filtered (_(" at %p[<no source file available>%p]:%d\n"),
3363 metadata_style.style ().ptr (), nullptr, sal.line);
3364 else
3365 printf_filtered
3366 (_(" at %ps:%d\n"),
3367 styled_string (file_name_style.style (),
3368 symtab_to_filename_for_display (sal.symtab)),
3369 sal.line);
3370 continue;
3371 }
76a01679
JB
3372 else
3373 {
de93309a
SM
3374 int is_enumeral =
3375 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3376 && SYMBOL_TYPE (syms[i].symbol) != NULL
78134374 3377 && SYMBOL_TYPE (syms[i].symbol)->code () == TYPE_CODE_ENUM);
de93309a 3378 struct symtab *symtab = NULL;
4c4b4cd2 3379
de93309a
SM
3380 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3381 symtab = symbol_symtab (syms[i].symbol);
3382
3383 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
3384 {
3385 printf_filtered ("[%d] ", i + first_choice);
3386 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3387 &type_print_raw_options);
3388 printf_filtered (_(" at %s:%d\n"),
3389 symtab_to_filename_for_display (symtab),
3390 SYMBOL_LINE (syms[i].symbol));
3391 }
3392 else if (is_enumeral
7d93a1e0 3393 && SYMBOL_TYPE (syms[i].symbol)->name () != NULL)
de93309a
SM
3394 {
3395 printf_filtered (("[%d] "), i + first_choice);
3396 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
3397 gdb_stdout, -1, 0, &type_print_raw_options);
3398 printf_filtered (_("'(%s) (enumeral)\n"),
987012b8 3399 syms[i].symbol->print_name ());
de93309a
SM
3400 }
3401 else
3402 {
3403 printf_filtered ("[%d] ", i + first_choice);
3404 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3405 &type_print_raw_options);
3406
3407 if (symtab != NULL)
3408 printf_filtered (is_enumeral
3409 ? _(" in %s (enumeral)\n")
3410 : _(" at %s:?\n"),
3411 symtab_to_filename_for_display (symtab));
3412 else
3413 printf_filtered (is_enumeral
3414 ? _(" (enumeral)\n")
3415 : _(" at ?\n"));
3416 }
76a01679 3417 }
14f9c5c9 3418 }
14f9c5c9 3419
de93309a
SM
3420 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
3421 "overload-choice");
14f9c5c9 3422
de93309a
SM
3423 for (i = 0; i < n_chosen; i += 1)
3424 syms[i] = syms[chosen[i]];
14f9c5c9 3425
de93309a
SM
3426 return n_chosen;
3427}
14f9c5c9 3428
de93309a
SM
3429/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3430 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3431 undefined namespace) and converts operators that are
3432 user-defined into appropriate function calls. If CONTEXT_TYPE is
3433 non-null, it provides a preferred result type [at the moment, only
3434 type void has any effect---causing procedures to be preferred over
3435 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
3436 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3437
de93309a
SM
3438static void
3439resolve (expression_up *expp, int void_context_p, int parse_completion,
3440 innermost_block_tracker *tracker)
3441{
3442 struct type *context_type = NULL;
3443 int pc = 0;
14f9c5c9 3444
de93309a
SM
3445 if (void_context_p)
3446 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
14f9c5c9 3447
de93309a
SM
3448 resolve_subexp (expp, &pc, 1, context_type, parse_completion, tracker);
3449}
4c4b4cd2 3450
de93309a
SM
3451/* Resolve the operator of the subexpression beginning at
3452 position *POS of *EXPP. "Resolving" consists of replacing
3453 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3454 with their resolutions, replacing built-in operators with
3455 function calls to user-defined operators, where appropriate, and,
3456 when DEPROCEDURE_P is non-zero, converting function-valued variables
3457 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3458 are as in ada_resolve, above. */
14f9c5c9 3459
de93309a
SM
3460static struct value *
3461resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
3462 struct type *context_type, int parse_completion,
3463 innermost_block_tracker *tracker)
14f9c5c9 3464{
de93309a
SM
3465 int pc = *pos;
3466 int i;
3467 struct expression *exp; /* Convenience: == *expp. */
3468 enum exp_opcode op = (*expp)->elts[pc].opcode;
3469 struct value **argvec; /* Vector of operand types (alloca'ed). */
3470 int nargs; /* Number of operands. */
3471 int oplen;
14f9c5c9 3472
de93309a
SM
3473 argvec = NULL;
3474 nargs = 0;
3475 exp = expp->get ();
4c4b4cd2 3476
de93309a
SM
3477 /* Pass one: resolve operands, saving their types and updating *pos,
3478 if needed. */
3479 switch (op)
3480 {
3481 case OP_FUNCALL:
3482 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3483 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3484 *pos += 7;
3485 else
3486 {
3487 *pos += 3;
3488 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2 3489 }
de93309a
SM
3490 nargs = longest_to_int (exp->elts[pc + 1].longconst);
3491 break;
14f9c5c9 3492
de93309a
SM
3493 case UNOP_ADDR:
3494 *pos += 1;
3495 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3496 break;
3497
3498 case UNOP_QUAL:
3499 *pos += 3;
3500 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
3501 parse_completion, tracker);
3502 break;
3503
3504 case OP_ATR_MODULUS:
3505 case OP_ATR_SIZE:
3506 case OP_ATR_TAG:
3507 case OP_ATR_FIRST:
3508 case OP_ATR_LAST:
3509 case OP_ATR_LENGTH:
3510 case OP_ATR_POS:
3511 case OP_ATR_VAL:
3512 case OP_ATR_MIN:
3513 case OP_ATR_MAX:
3514 case TERNOP_IN_RANGE:
3515 case BINOP_IN_BOUNDS:
3516 case UNOP_IN_RANGE:
3517 case OP_AGGREGATE:
3518 case OP_OTHERS:
3519 case OP_CHOICES:
3520 case OP_POSITIONAL:
3521 case OP_DISCRETE_RANGE:
3522 case OP_NAME:
3523 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3524 *pos += oplen;
3525 break;
3526
3527 case BINOP_ASSIGN:
3528 {
3529 struct value *arg1;
3530
3531 *pos += 1;
3532 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3533 if (arg1 == NULL)
3534 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
3535 else
3536 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
3537 tracker);
3538 break;
3539 }
3540
3541 case UNOP_CAST:
3542 *pos += 3;
3543 nargs = 1;
3544 break;
3545
3546 case BINOP_ADD:
3547 case BINOP_SUB:
3548 case BINOP_MUL:
3549 case BINOP_DIV:
3550 case BINOP_REM:
3551 case BINOP_MOD:
3552 case BINOP_EXP:
3553 case BINOP_CONCAT:
3554 case BINOP_LOGICAL_AND:
3555 case BINOP_LOGICAL_OR:
3556 case BINOP_BITWISE_AND:
3557 case BINOP_BITWISE_IOR:
3558 case BINOP_BITWISE_XOR:
3559
3560 case BINOP_EQUAL:
3561 case BINOP_NOTEQUAL:
3562 case BINOP_LESS:
3563 case BINOP_GTR:
3564 case BINOP_LEQ:
3565 case BINOP_GEQ:
3566
3567 case BINOP_REPEAT:
3568 case BINOP_SUBSCRIPT:
3569 case BINOP_COMMA:
3570 *pos += 1;
3571 nargs = 2;
3572 break;
3573
3574 case UNOP_NEG:
3575 case UNOP_PLUS:
3576 case UNOP_LOGICAL_NOT:
3577 case UNOP_ABS:
3578 case UNOP_IND:
3579 *pos += 1;
3580 nargs = 1;
3581 break;
3582
3583 case OP_LONG:
3584 case OP_FLOAT:
3585 case OP_VAR_VALUE:
3586 case OP_VAR_MSYM_VALUE:
3587 *pos += 4;
3588 break;
3589
3590 case OP_TYPE:
3591 case OP_BOOL:
3592 case OP_LAST:
3593 case OP_INTERNALVAR:
3594 *pos += 3;
3595 break;
3596
3597 case UNOP_MEMVAL:
3598 *pos += 3;
3599 nargs = 1;
3600 break;
3601
3602 case OP_REGISTER:
3603 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3604 break;
3605
3606 case STRUCTOP_STRUCT:
3607 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3608 nargs = 1;
3609 break;
3610
3611 case TERNOP_SLICE:
3612 *pos += 1;
3613 nargs = 3;
3614 break;
3615
3616 case OP_STRING:
3617 break;
3618
3619 default:
3620 error (_("Unexpected operator during name resolution"));
14f9c5c9 3621 }
14f9c5c9 3622
de93309a
SM
3623 argvec = XALLOCAVEC (struct value *, nargs + 1);
3624 for (i = 0; i < nargs; i += 1)
3625 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3626 tracker);
3627 argvec[i] = NULL;
3628 exp = expp->get ();
4c4b4cd2 3629
de93309a
SM
3630 /* Pass two: perform any resolution on principal operator. */
3631 switch (op)
14f9c5c9 3632 {
de93309a
SM
3633 default:
3634 break;
5b4ee69b 3635
de93309a
SM
3636 case OP_VAR_VALUE:
3637 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
4c4b4cd2 3638 {
de93309a
SM
3639 std::vector<struct block_symbol> candidates;
3640 int n_candidates;
5b4ee69b 3641
de93309a 3642 n_candidates =
987012b8 3643 ada_lookup_symbol_list (exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3644 exp->elts[pc + 1].block, VAR_DOMAIN,
3645 &candidates);
d2e4a39e 3646
de93309a
SM
3647 if (n_candidates > 1)
3648 {
3649 /* Types tend to get re-introduced locally, so if there
3650 are any local symbols that are not types, first filter
3651 out all types. */
3652 int j;
3653 for (j = 0; j < n_candidates; j += 1)
3654 switch (SYMBOL_CLASS (candidates[j].symbol))
3655 {
3656 case LOC_REGISTER:
3657 case LOC_ARG:
3658 case LOC_REF_ARG:
3659 case LOC_REGPARM_ADDR:
3660 case LOC_LOCAL:
3661 case LOC_COMPUTED:
3662 goto FoundNonType;
3663 default:
3664 break;
3665 }
3666 FoundNonType:
3667 if (j < n_candidates)
3668 {
3669 j = 0;
3670 while (j < n_candidates)
3671 {
3672 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
3673 {
3674 candidates[j] = candidates[n_candidates - 1];
3675 n_candidates -= 1;
3676 }
3677 else
3678 j += 1;
3679 }
3680 }
3681 }
4c4b4cd2 3682
de93309a
SM
3683 if (n_candidates == 0)
3684 error (_("No definition found for %s"),
987012b8 3685 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3686 else if (n_candidates == 1)
3687 i = 0;
3688 else if (deprocedure_p
3689 && !is_nonfunction (candidates.data (), n_candidates))
3690 {
3691 i = ada_resolve_function
3692 (candidates.data (), n_candidates, NULL, 0,
987012b8 3693 exp->elts[pc + 2].symbol->linkage_name (),
de93309a
SM
3694 context_type, parse_completion);
3695 if (i < 0)
3696 error (_("Could not find a match for %s"),
987012b8 3697 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3698 }
3699 else
3700 {
3701 printf_filtered (_("Multiple matches for %s\n"),
987012b8 3702 exp->elts[pc + 2].symbol->print_name ());
de93309a
SM
3703 user_select_syms (candidates.data (), n_candidates, 1);
3704 i = 0;
3705 }
5b4ee69b 3706
de93309a
SM
3707 exp->elts[pc + 1].block = candidates[i].block;
3708 exp->elts[pc + 2].symbol = candidates[i].symbol;
3709 tracker->update (candidates[i]);
3710 }
14f9c5c9 3711
de93309a 3712 if (deprocedure_p
78134374 3713 && (SYMBOL_TYPE (exp->elts[pc + 2].symbol)->code ()
de93309a 3714 == TYPE_CODE_FUNC))
4c4b4cd2 3715 {
de93309a
SM
3716 replace_operator_with_call (expp, pc, 0, 4,
3717 exp->elts[pc + 2].symbol,
3718 exp->elts[pc + 1].block);
3719 exp = expp->get ();
4c4b4cd2 3720 }
de93309a
SM
3721 break;
3722
3723 case OP_FUNCALL:
3724 {
3725 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3726 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3727 {
3728 std::vector<struct block_symbol> candidates;
3729 int n_candidates;
3730
3731 n_candidates =
987012b8 3732 ada_lookup_symbol_list (exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3733 exp->elts[pc + 4].block, VAR_DOMAIN,
3734 &candidates);
14f9c5c9 3735
de93309a
SM
3736 if (n_candidates == 1)
3737 i = 0;
3738 else
3739 {
3740 i = ada_resolve_function
3741 (candidates.data (), n_candidates,
3742 argvec, nargs,
987012b8 3743 exp->elts[pc + 5].symbol->linkage_name (),
de93309a
SM
3744 context_type, parse_completion);
3745 if (i < 0)
3746 error (_("Could not find a match for %s"),
987012b8 3747 exp->elts[pc + 5].symbol->print_name ());
de93309a 3748 }
d72413e6 3749
de93309a
SM
3750 exp->elts[pc + 4].block = candidates[i].block;
3751 exp->elts[pc + 5].symbol = candidates[i].symbol;
3752 tracker->update (candidates[i]);
3753 }
3754 }
3755 break;
3756 case BINOP_ADD:
3757 case BINOP_SUB:
3758 case BINOP_MUL:
3759 case BINOP_DIV:
3760 case BINOP_REM:
3761 case BINOP_MOD:
3762 case BINOP_CONCAT:
3763 case BINOP_BITWISE_AND:
3764 case BINOP_BITWISE_IOR:
3765 case BINOP_BITWISE_XOR:
3766 case BINOP_EQUAL:
3767 case BINOP_NOTEQUAL:
3768 case BINOP_LESS:
3769 case BINOP_GTR:
3770 case BINOP_LEQ:
3771 case BINOP_GEQ:
3772 case BINOP_EXP:
3773 case UNOP_NEG:
3774 case UNOP_PLUS:
3775 case UNOP_LOGICAL_NOT:
3776 case UNOP_ABS:
3777 if (possible_user_operator_p (op, argvec))
3778 {
3779 std::vector<struct block_symbol> candidates;
3780 int n_candidates;
d72413e6 3781
de93309a
SM
3782 n_candidates =
3783 ada_lookup_symbol_list (ada_decoded_op_name (op),
3784 NULL, VAR_DOMAIN,
3785 &candidates);
d72413e6 3786
de93309a
SM
3787 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
3788 nargs, ada_decoded_op_name (op), NULL,
3789 parse_completion);
3790 if (i < 0)
3791 break;
d72413e6 3792
de93309a
SM
3793 replace_operator_with_call (expp, pc, nargs, 1,
3794 candidates[i].symbol,
3795 candidates[i].block);
3796 exp = expp->get ();
3797 }
3798 break;
d72413e6 3799
de93309a
SM
3800 case OP_TYPE:
3801 case OP_REGISTER:
3802 return NULL;
d72413e6 3803 }
d72413e6 3804
de93309a
SM
3805 *pos = pc;
3806 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3807 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3808 exp->elts[pc + 1].objfile,
3809 exp->elts[pc + 2].msymbol);
3810 else
3811 return evaluate_subexp_type (exp, pos);
3812}
14f9c5c9 3813
de93309a
SM
3814/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
3815 MAY_DEREF is non-zero, the formal may be a pointer and the actual
3816 a non-pointer. */
3817/* The term "match" here is rather loose. The match is heuristic and
3818 liberal. */
14f9c5c9 3819
de93309a
SM
3820static int
3821ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3822{
de93309a
SM
3823 ftype = ada_check_typedef (ftype);
3824 atype = ada_check_typedef (atype);
14f9c5c9 3825
78134374 3826 if (ftype->code () == TYPE_CODE_REF)
de93309a 3827 ftype = TYPE_TARGET_TYPE (ftype);
78134374 3828 if (atype->code () == TYPE_CODE_REF)
de93309a 3829 atype = TYPE_TARGET_TYPE (atype);
14f9c5c9 3830
78134374 3831 switch (ftype->code ())
14f9c5c9 3832 {
de93309a 3833 default:
78134374 3834 return ftype->code () == atype->code ();
de93309a 3835 case TYPE_CODE_PTR:
78134374 3836 if (atype->code () == TYPE_CODE_PTR)
de93309a
SM
3837 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3838 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3839 else
de93309a
SM
3840 return (may_deref
3841 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
3842 case TYPE_CODE_INT:
3843 case TYPE_CODE_ENUM:
3844 case TYPE_CODE_RANGE:
78134374 3845 switch (atype->code ())
4c4b4cd2 3846 {
de93309a
SM
3847 case TYPE_CODE_INT:
3848 case TYPE_CODE_ENUM:
3849 case TYPE_CODE_RANGE:
3850 return 1;
3851 default:
3852 return 0;
4c4b4cd2 3853 }
d2e4a39e 3854
de93309a 3855 case TYPE_CODE_ARRAY:
78134374 3856 return (atype->code () == TYPE_CODE_ARRAY
de93309a 3857 || ada_is_array_descriptor_type (atype));
14f9c5c9 3858
de93309a
SM
3859 case TYPE_CODE_STRUCT:
3860 if (ada_is_array_descriptor_type (ftype))
78134374 3861 return (atype->code () == TYPE_CODE_ARRAY
de93309a
SM
3862 || ada_is_array_descriptor_type (atype));
3863 else
78134374 3864 return (atype->code () == TYPE_CODE_STRUCT
de93309a 3865 && !ada_is_array_descriptor_type (atype));
14f9c5c9 3866
de93309a
SM
3867 case TYPE_CODE_UNION:
3868 case TYPE_CODE_FLT:
78134374 3869 return (atype->code () == ftype->code ());
de93309a 3870 }
14f9c5c9
AS
3871}
3872
de93309a
SM
3873/* Return non-zero if the formals of FUNC "sufficiently match" the
3874 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3875 may also be an enumeral, in which case it is treated as a 0-
3876 argument function. */
14f9c5c9 3877
de93309a
SM
3878static int
3879ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
3880{
3881 int i;
3882 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3883
de93309a 3884 if (SYMBOL_CLASS (func) == LOC_CONST
78134374 3885 && func_type->code () == TYPE_CODE_ENUM)
de93309a 3886 return (n_actuals == 0);
78134374 3887 else if (func_type == NULL || func_type->code () != TYPE_CODE_FUNC)
de93309a 3888 return 0;
14f9c5c9 3889
1f704f76 3890 if (func_type->num_fields () != n_actuals)
de93309a 3891 return 0;
14f9c5c9 3892
de93309a
SM
3893 for (i = 0; i < n_actuals; i += 1)
3894 {
3895 if (actuals[i] == NULL)
3896 return 0;
3897 else
3898 {
3899 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3900 i));
3901 struct type *atype = ada_check_typedef (value_type (actuals[i]));
14f9c5c9 3902
de93309a
SM
3903 if (!ada_type_match (ftype, atype, 1))
3904 return 0;
3905 }
3906 }
3907 return 1;
3908}
d2e4a39e 3909
de93309a
SM
3910/* False iff function type FUNC_TYPE definitely does not produce a value
3911 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3912 FUNC_TYPE is not a valid function type with a non-null return type
3913 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
14f9c5c9 3914
de93309a
SM
3915static int
3916return_match (struct type *func_type, struct type *context_type)
3917{
3918 struct type *return_type;
d2e4a39e 3919
de93309a
SM
3920 if (func_type == NULL)
3921 return 1;
14f9c5c9 3922
78134374 3923 if (func_type->code () == TYPE_CODE_FUNC)
de93309a
SM
3924 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
3925 else
3926 return_type = get_base_type (func_type);
3927 if (return_type == NULL)
3928 return 1;
76a01679 3929
de93309a 3930 context_type = get_base_type (context_type);
14f9c5c9 3931
78134374 3932 if (return_type->code () == TYPE_CODE_ENUM)
de93309a
SM
3933 return context_type == NULL || return_type == context_type;
3934 else if (context_type == NULL)
78134374 3935 return return_type->code () != TYPE_CODE_VOID;
de93309a 3936 else
78134374 3937 return return_type->code () == context_type->code ();
de93309a 3938}
14f9c5c9 3939
14f9c5c9 3940
de93309a
SM
3941/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
3942 function (if any) that matches the types of the NARGS arguments in
3943 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3944 that returns that type, then eliminate matches that don't. If
3945 CONTEXT_TYPE is void and there is at least one match that does not
3946 return void, eliminate all matches that do.
14f9c5c9 3947
de93309a
SM
3948 Asks the user if there is more than one match remaining. Returns -1
3949 if there is no such symbol or none is selected. NAME is used
3950 solely for messages. May re-arrange and modify SYMS in
3951 the process; the index returned is for the modified vector. */
14f9c5c9 3952
de93309a
SM
3953static int
3954ada_resolve_function (struct block_symbol syms[],
3955 int nsyms, struct value **args, int nargs,
3956 const char *name, struct type *context_type,
3957 int parse_completion)
3958{
3959 int fallback;
3960 int k;
3961 int m; /* Number of hits */
14f9c5c9 3962
de93309a
SM
3963 m = 0;
3964 /* In the first pass of the loop, we only accept functions matching
3965 context_type. If none are found, we add a second pass of the loop
3966 where every function is accepted. */
3967 for (fallback = 0; m == 0 && fallback < 2; fallback++)
3968 {
3969 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3970 {
de93309a 3971 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
5b4ee69b 3972
de93309a
SM
3973 if (ada_args_match (syms[k].symbol, args, nargs)
3974 && (fallback || return_match (type, context_type)))
3975 {
3976 syms[m] = syms[k];
3977 m += 1;
3978 }
4c4b4cd2 3979 }
14f9c5c9
AS
3980 }
3981
de93309a
SM
3982 /* If we got multiple matches, ask the user which one to use. Don't do this
3983 interactive thing during completion, though, as the purpose of the
3984 completion is providing a list of all possible matches. Prompting the
3985 user to filter it down would be completely unexpected in this case. */
3986 if (m == 0)
3987 return -1;
3988 else if (m > 1 && !parse_completion)
3989 {
3990 printf_filtered (_("Multiple matches for %s\n"), name);
3991 user_select_syms (syms, m, 1);
3992 return 0;
3993 }
3994 return 0;
14f9c5c9
AS
3995}
3996
4c4b4cd2
PH
3997/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3998 on the function identified by SYM and BLOCK, and taking NARGS
3999 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
4000
4001static void
e9d9f57e 4002replace_operator_with_call (expression_up *expp, int pc, int nargs,
4c4b4cd2 4003 int oplen, struct symbol *sym,
270140bd 4004 const struct block *block)
14f9c5c9
AS
4005{
4006 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 4007 symbol, -oplen for operator being replaced). */
d2e4a39e 4008 struct expression *newexp = (struct expression *)
8c1a34e7 4009 xzalloc (sizeof (struct expression)
4c4b4cd2 4010 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
e9d9f57e 4011 struct expression *exp = expp->get ();
14f9c5c9
AS
4012
4013 newexp->nelts = exp->nelts + 7 - oplen;
4014 newexp->language_defn = exp->language_defn;
3489610d 4015 newexp->gdbarch = exp->gdbarch;
14f9c5c9 4016 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 4017 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 4018 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
4019
4020 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
4021 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
4022
4023 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
4024 newexp->elts[pc + 4].block = block;
4025 newexp->elts[pc + 5].symbol = sym;
4026
e9d9f57e 4027 expp->reset (newexp);
d2e4a39e 4028}
14f9c5c9
AS
4029
4030/* Type-class predicates */
4031
4c4b4cd2
PH
4032/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4033 or FLOAT). */
14f9c5c9
AS
4034
4035static int
d2e4a39e 4036numeric_type_p (struct type *type)
14f9c5c9
AS
4037{
4038 if (type == NULL)
4039 return 0;
d2e4a39e
AS
4040 else
4041 {
78134374 4042 switch (type->code ())
4c4b4cd2
PH
4043 {
4044 case TYPE_CODE_INT:
4045 case TYPE_CODE_FLT:
4046 return 1;
4047 case TYPE_CODE_RANGE:
4048 return (type == TYPE_TARGET_TYPE (type)
4049 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4050 default:
4051 return 0;
4052 }
d2e4a39e 4053 }
14f9c5c9
AS
4054}
4055
4c4b4cd2 4056/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4057
4058static int
d2e4a39e 4059integer_type_p (struct type *type)
14f9c5c9
AS
4060{
4061 if (type == NULL)
4062 return 0;
d2e4a39e
AS
4063 else
4064 {
78134374 4065 switch (type->code ())
4c4b4cd2
PH
4066 {
4067 case TYPE_CODE_INT:
4068 return 1;
4069 case TYPE_CODE_RANGE:
4070 return (type == TYPE_TARGET_TYPE (type)
4071 || integer_type_p (TYPE_TARGET_TYPE (type)));
4072 default:
4073 return 0;
4074 }
d2e4a39e 4075 }
14f9c5c9
AS
4076}
4077
4c4b4cd2 4078/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4079
4080static int
d2e4a39e 4081scalar_type_p (struct type *type)
14f9c5c9
AS
4082{
4083 if (type == NULL)
4084 return 0;
d2e4a39e
AS
4085 else
4086 {
78134374 4087 switch (type->code ())
4c4b4cd2
PH
4088 {
4089 case TYPE_CODE_INT:
4090 case TYPE_CODE_RANGE:
4091 case TYPE_CODE_ENUM:
4092 case TYPE_CODE_FLT:
4093 return 1;
4094 default:
4095 return 0;
4096 }
d2e4a39e 4097 }
14f9c5c9
AS
4098}
4099
4c4b4cd2 4100/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4101
4102static int
d2e4a39e 4103discrete_type_p (struct type *type)
14f9c5c9
AS
4104{
4105 if (type == NULL)
4106 return 0;
d2e4a39e
AS
4107 else
4108 {
78134374 4109 switch (type->code ())
4c4b4cd2
PH
4110 {
4111 case TYPE_CODE_INT:
4112 case TYPE_CODE_RANGE:
4113 case TYPE_CODE_ENUM:
872f0337 4114 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4115 return 1;
4116 default:
4117 return 0;
4118 }
d2e4a39e 4119 }
14f9c5c9
AS
4120}
4121
4c4b4cd2
PH
4122/* Returns non-zero if OP with operands in the vector ARGS could be
4123 a user-defined function. Errs on the side of pre-defined operators
4124 (i.e., result 0). */
14f9c5c9
AS
4125
4126static int
d2e4a39e 4127possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4128{
76a01679 4129 struct type *type0 =
df407dfe 4130 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4131 struct type *type1 =
df407dfe 4132 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4133
4c4b4cd2
PH
4134 if (type0 == NULL)
4135 return 0;
4136
14f9c5c9
AS
4137 switch (op)
4138 {
4139 default:
4140 return 0;
4141
4142 case BINOP_ADD:
4143 case BINOP_SUB:
4144 case BINOP_MUL:
4145 case BINOP_DIV:
d2e4a39e 4146 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4147
4148 case BINOP_REM:
4149 case BINOP_MOD:
4150 case BINOP_BITWISE_AND:
4151 case BINOP_BITWISE_IOR:
4152 case BINOP_BITWISE_XOR:
d2e4a39e 4153 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4154
4155 case BINOP_EQUAL:
4156 case BINOP_NOTEQUAL:
4157 case BINOP_LESS:
4158 case BINOP_GTR:
4159 case BINOP_LEQ:
4160 case BINOP_GEQ:
d2e4a39e 4161 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4162
4163 case BINOP_CONCAT:
ee90b9ab 4164 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4165
4166 case BINOP_EXP:
d2e4a39e 4167 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4168
4169 case UNOP_NEG:
4170 case UNOP_PLUS:
4171 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4172 case UNOP_ABS:
4173 return (!numeric_type_p (type0));
14f9c5c9
AS
4174
4175 }
4176}
4177\f
4c4b4cd2 4178 /* Renaming */
14f9c5c9 4179
aeb5907d
JB
4180/* NOTES:
4181
4182 1. In the following, we assume that a renaming type's name may
4183 have an ___XD suffix. It would be nice if this went away at some
4184 point.
4185 2. We handle both the (old) purely type-based representation of
4186 renamings and the (new) variable-based encoding. At some point,
4187 it is devoutly to be hoped that the former goes away
4188 (FIXME: hilfinger-2007-07-09).
4189 3. Subprogram renamings are not implemented, although the XRS
4190 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4191
4192/* If SYM encodes a renaming,
4193
4194 <renaming> renames <renamed entity>,
4195
4196 sets *LEN to the length of the renamed entity's name,
4197 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4198 the string describing the subcomponent selected from the renamed
0963b4bd 4199 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4200 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4201 are undefined). Otherwise, returns a value indicating the category
4202 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4203 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4204 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4205 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4206 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4207 may be NULL, in which case they are not assigned.
4208
4209 [Currently, however, GCC does not generate subprogram renamings.] */
4210
4211enum ada_renaming_category
4212ada_parse_renaming (struct symbol *sym,
4213 const char **renamed_entity, int *len,
4214 const char **renaming_expr)
4215{
4216 enum ada_renaming_category kind;
4217 const char *info;
4218 const char *suffix;
4219
4220 if (sym == NULL)
4221 return ADA_NOT_RENAMING;
4222 switch (SYMBOL_CLASS (sym))
14f9c5c9 4223 {
aeb5907d
JB
4224 default:
4225 return ADA_NOT_RENAMING;
aeb5907d
JB
4226 case LOC_LOCAL:
4227 case LOC_STATIC:
4228 case LOC_COMPUTED:
4229 case LOC_OPTIMIZED_OUT:
987012b8 4230 info = strstr (sym->linkage_name (), "___XR");
aeb5907d
JB
4231 if (info == NULL)
4232 return ADA_NOT_RENAMING;
4233 switch (info[5])
4234 {
4235 case '_':
4236 kind = ADA_OBJECT_RENAMING;
4237 info += 6;
4238 break;
4239 case 'E':
4240 kind = ADA_EXCEPTION_RENAMING;
4241 info += 7;
4242 break;
4243 case 'P':
4244 kind = ADA_PACKAGE_RENAMING;
4245 info += 7;
4246 break;
4247 case 'S':
4248 kind = ADA_SUBPROGRAM_RENAMING;
4249 info += 7;
4250 break;
4251 default:
4252 return ADA_NOT_RENAMING;
4253 }
14f9c5c9 4254 }
4c4b4cd2 4255
de93309a
SM
4256 if (renamed_entity != NULL)
4257 *renamed_entity = info;
4258 suffix = strstr (info, "___XE");
4259 if (suffix == NULL || suffix == info)
4260 return ADA_NOT_RENAMING;
4261 if (len != NULL)
4262 *len = strlen (info) - strlen (suffix);
4263 suffix += 5;
4264 if (renaming_expr != NULL)
4265 *renaming_expr = suffix;
4266 return kind;
4267}
4268
4269/* Compute the value of the given RENAMING_SYM, which is expected to
4270 be a symbol encoding a renaming expression. BLOCK is the block
4271 used to evaluate the renaming. */
4272
4273static struct value *
4274ada_read_renaming_var_value (struct symbol *renaming_sym,
4275 const struct block *block)
4276{
4277 const char *sym_name;
4278
987012b8 4279 sym_name = renaming_sym->linkage_name ();
de93309a
SM
4280 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4281 return evaluate_expression (expr.get ());
4282}
4283\f
4284
4285 /* Evaluation: Function Calls */
4286
4287/* Return an lvalue containing the value VAL. This is the identity on
4288 lvalues, and otherwise has the side-effect of allocating memory
4289 in the inferior where a copy of the value contents is copied. */
4290
4291static struct value *
4292ensure_lval (struct value *val)
4293{
4294 if (VALUE_LVAL (val) == not_lval
4295 || VALUE_LVAL (val) == lval_internalvar)
4296 {
4297 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
4298 const CORE_ADDR addr =
4299 value_as_long (value_allocate_space_in_inferior (len));
4300
4301 VALUE_LVAL (val) = lval_memory;
4302 set_value_address (val, addr);
4303 write_memory (addr, value_contents (val), len);
4304 }
4305
4306 return val;
4307}
4308
4309/* Given ARG, a value of type (pointer or reference to a)*
4310 structure/union, extract the component named NAME from the ultimate
4311 target structure/union and return it as a value with its
4312 appropriate type.
4313
4314 The routine searches for NAME among all members of the structure itself
4315 and (recursively) among all members of any wrapper members
4316 (e.g., '_parent').
4317
4318 If NO_ERR, then simply return NULL in case of error, rather than
4319 calling error. */
4320
4321static struct value *
4322ada_value_struct_elt (struct value *arg, const char *name, int no_err)
4323{
4324 struct type *t, *t1;
4325 struct value *v;
4326 int check_tag;
4327
4328 v = NULL;
4329 t1 = t = ada_check_typedef (value_type (arg));
78134374 4330 if (t->code () == TYPE_CODE_REF)
de93309a
SM
4331 {
4332 t1 = TYPE_TARGET_TYPE (t);
4333 if (t1 == NULL)
4334 goto BadValue;
4335 t1 = ada_check_typedef (t1);
78134374 4336 if (t1->code () == TYPE_CODE_PTR)
de93309a
SM
4337 {
4338 arg = coerce_ref (arg);
4339 t = t1;
4340 }
4341 }
4342
78134374 4343 while (t->code () == TYPE_CODE_PTR)
de93309a
SM
4344 {
4345 t1 = TYPE_TARGET_TYPE (t);
4346 if (t1 == NULL)
4347 goto BadValue;
4348 t1 = ada_check_typedef (t1);
78134374 4349 if (t1->code () == TYPE_CODE_PTR)
de93309a
SM
4350 {
4351 arg = value_ind (arg);
4352 t = t1;
4353 }
4354 else
4355 break;
4356 }
aeb5907d 4357
78134374 4358 if (t1->code () != TYPE_CODE_STRUCT && t1->code () != TYPE_CODE_UNION)
de93309a 4359 goto BadValue;
52ce6436 4360
de93309a
SM
4361 if (t1 == t)
4362 v = ada_search_struct_field (name, arg, 0, t);
4363 else
4364 {
4365 int bit_offset, bit_size, byte_offset;
4366 struct type *field_type;
4367 CORE_ADDR address;
a5ee536b 4368
78134374 4369 if (t->code () == TYPE_CODE_PTR)
de93309a
SM
4370 address = value_address (ada_value_ind (arg));
4371 else
4372 address = value_address (ada_coerce_ref (arg));
d2e4a39e 4373
de93309a
SM
4374 /* Check to see if this is a tagged type. We also need to handle
4375 the case where the type is a reference to a tagged type, but
4376 we have to be careful to exclude pointers to tagged types.
4377 The latter should be shown as usual (as a pointer), whereas
4378 a reference should mostly be transparent to the user. */
14f9c5c9 4379
de93309a 4380 if (ada_is_tagged_type (t1, 0)
78134374 4381 || (t1->code () == TYPE_CODE_REF
de93309a
SM
4382 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
4383 {
4384 /* We first try to find the searched field in the current type.
4385 If not found then let's look in the fixed type. */
14f9c5c9 4386
de93309a
SM
4387 if (!find_struct_field (name, t1, 0,
4388 &field_type, &byte_offset, &bit_offset,
4389 &bit_size, NULL))
4390 check_tag = 1;
4391 else
4392 check_tag = 0;
4393 }
4394 else
4395 check_tag = 0;
c3e5cd34 4396
de93309a
SM
4397 /* Convert to fixed type in all cases, so that we have proper
4398 offsets to each field in unconstrained record types. */
4399 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
4400 address, NULL, check_tag);
4401
4402 if (find_struct_field (name, t1, 0,
4403 &field_type, &byte_offset, &bit_offset,
4404 &bit_size, NULL))
4405 {
4406 if (bit_size != 0)
4407 {
78134374 4408 if (t->code () == TYPE_CODE_REF)
de93309a
SM
4409 arg = ada_coerce_ref (arg);
4410 else
4411 arg = ada_value_ind (arg);
4412 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
4413 bit_offset, bit_size,
4414 field_type);
4415 }
4416 else
4417 v = value_at_lazy (field_type, address + byte_offset);
4418 }
c3e5cd34 4419 }
14f9c5c9 4420
de93309a
SM
4421 if (v != NULL || no_err)
4422 return v;
4423 else
4424 error (_("There is no member named %s."), name);
4425
4426 BadValue:
4427 if (no_err)
4428 return NULL;
4429 else
4430 error (_("Attempt to extract a component of "
4431 "a value that is not a record."));
14f9c5c9
AS
4432}
4433
4434/* Return the value ACTUAL, converted to be an appropriate value for a
4435 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4436 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4437 values not residing in memory, updating it as needed. */
14f9c5c9 4438
a93c0eb6 4439struct value *
40bc484c 4440ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4441{
df407dfe 4442 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4443 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e 4444 struct type *formal_target =
78134374 4445 formal_type->code () == TYPE_CODE_PTR
61ee279c 4446 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e 4447 struct type *actual_target =
78134374 4448 actual_type->code () == TYPE_CODE_PTR
61ee279c 4449 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4450
4c4b4cd2 4451 if (ada_is_array_descriptor_type (formal_target)
78134374 4452 && actual_target->code () == TYPE_CODE_ARRAY)
40bc484c 4453 return make_array_descriptor (formal_type, actual);
78134374
SM
4454 else if (formal_type->code () == TYPE_CODE_PTR
4455 || formal_type->code () == TYPE_CODE_REF)
14f9c5c9 4456 {
a84a8a0d 4457 struct value *result;
5b4ee69b 4458
78134374 4459 if (formal_target->code () == TYPE_CODE_ARRAY
4c4b4cd2 4460 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4461 result = desc_data (actual);
78134374 4462 else if (formal_type->code () != TYPE_CODE_PTR)
4c4b4cd2
PH
4463 {
4464 if (VALUE_LVAL (actual) != lval_memory)
4465 {
4466 struct value *val;
5b4ee69b 4467
df407dfe 4468 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4469 val = allocate_value (actual_type);
990a07ab 4470 memcpy ((char *) value_contents_raw (val),
0fd88904 4471 (char *) value_contents (actual),
4c4b4cd2 4472 TYPE_LENGTH (actual_type));
40bc484c 4473 actual = ensure_lval (val);
4c4b4cd2 4474 }
a84a8a0d 4475 result = value_addr (actual);
4c4b4cd2 4476 }
a84a8a0d
JB
4477 else
4478 return actual;
b1af9e97 4479 return value_cast_pointers (formal_type, result, 0);
14f9c5c9 4480 }
78134374 4481 else if (actual_type->code () == TYPE_CODE_PTR)
14f9c5c9 4482 return ada_value_ind (actual);
8344af1e
JB
4483 else if (ada_is_aligner_type (formal_type))
4484 {
4485 /* We need to turn this parameter into an aligner type
4486 as well. */
4487 struct value *aligner = allocate_value (formal_type);
4488 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4489
4490 value_assign_to_component (aligner, component, actual);
4491 return aligner;
4492 }
14f9c5c9
AS
4493
4494 return actual;
4495}
4496
438c98a1
JB
4497/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4498 type TYPE. This is usually an inefficient no-op except on some targets
4499 (such as AVR) where the representation of a pointer and an address
4500 differs. */
4501
4502static CORE_ADDR
4503value_pointer (struct value *value, struct type *type)
4504{
4505 struct gdbarch *gdbarch = get_type_arch (type);
4506 unsigned len = TYPE_LENGTH (type);
224c3ddb 4507 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4508 CORE_ADDR addr;
4509
4510 addr = value_address (value);
4511 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
34877895 4512 addr = extract_unsigned_integer (buf, len, type_byte_order (type));
438c98a1
JB
4513 return addr;
4514}
4515
14f9c5c9 4516
4c4b4cd2
PH
4517/* Push a descriptor of type TYPE for array value ARR on the stack at
4518 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4519 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4520 to-descriptor type rather than a descriptor type), a struct value *
4521 representing a pointer to this descriptor. */
14f9c5c9 4522
d2e4a39e 4523static struct value *
40bc484c 4524make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4525{
d2e4a39e
AS
4526 struct type *bounds_type = desc_bounds_type (type);
4527 struct type *desc_type = desc_base_type (type);
4528 struct value *descriptor = allocate_value (desc_type);
4529 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4530 int i;
d2e4a39e 4531
0963b4bd
MS
4532 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4533 i > 0; i -= 1)
14f9c5c9 4534 {
19f220c3
JK
4535 modify_field (value_type (bounds), value_contents_writeable (bounds),
4536 ada_array_bound (arr, i, 0),
4537 desc_bound_bitpos (bounds_type, i, 0),
4538 desc_bound_bitsize (bounds_type, i, 0));
4539 modify_field (value_type (bounds), value_contents_writeable (bounds),
4540 ada_array_bound (arr, i, 1),
4541 desc_bound_bitpos (bounds_type, i, 1),
4542 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4543 }
d2e4a39e 4544
40bc484c 4545 bounds = ensure_lval (bounds);
d2e4a39e 4546
19f220c3
JK
4547 modify_field (value_type (descriptor),
4548 value_contents_writeable (descriptor),
4549 value_pointer (ensure_lval (arr),
4550 TYPE_FIELD_TYPE (desc_type, 0)),
4551 fat_pntr_data_bitpos (desc_type),
4552 fat_pntr_data_bitsize (desc_type));
4553
4554 modify_field (value_type (descriptor),
4555 value_contents_writeable (descriptor),
4556 value_pointer (bounds,
4557 TYPE_FIELD_TYPE (desc_type, 1)),
4558 fat_pntr_bounds_bitpos (desc_type),
4559 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4560
40bc484c 4561 descriptor = ensure_lval (descriptor);
14f9c5c9 4562
78134374 4563 if (type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
4564 return value_addr (descriptor);
4565 else
4566 return descriptor;
4567}
14f9c5c9 4568\f
3d9434b5
JB
4569 /* Symbol Cache Module */
4570
3d9434b5 4571/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4572 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4573 on the type of entity being printed, the cache can make it as much
4574 as an order of magnitude faster than without it.
4575
4576 The descriptive type DWARF extension has significantly reduced
4577 the need for this cache, at least when DWARF is being used. However,
4578 even in this case, some expensive name-based symbol searches are still
4579 sometimes necessary - to find an XVZ variable, mostly. */
4580
ee01b665 4581/* Initialize the contents of SYM_CACHE. */
3d9434b5 4582
ee01b665
JB
4583static void
4584ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4585{
4586 obstack_init (&sym_cache->cache_space);
4587 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4588}
3d9434b5 4589
ee01b665
JB
4590/* Free the memory used by SYM_CACHE. */
4591
4592static void
4593ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4594{
ee01b665
JB
4595 obstack_free (&sym_cache->cache_space, NULL);
4596 xfree (sym_cache);
4597}
3d9434b5 4598
ee01b665
JB
4599/* Return the symbol cache associated to the given program space PSPACE.
4600 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4601
ee01b665
JB
4602static struct ada_symbol_cache *
4603ada_get_symbol_cache (struct program_space *pspace)
4604{
4605 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4606
66c168ae 4607 if (pspace_data->sym_cache == NULL)
ee01b665 4608 {
66c168ae
JB
4609 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4610 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4611 }
4612
66c168ae 4613 return pspace_data->sym_cache;
ee01b665 4614}
3d9434b5
JB
4615
4616/* Clear all entries from the symbol cache. */
4617
4618static void
4619ada_clear_symbol_cache (void)
4620{
ee01b665
JB
4621 struct ada_symbol_cache *sym_cache
4622 = ada_get_symbol_cache (current_program_space);
4623
4624 obstack_free (&sym_cache->cache_space, NULL);
4625 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4626}
4627
fe978cb0 4628/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4629 Return it if found, or NULL otherwise. */
4630
4631static struct cache_entry **
fe978cb0 4632find_entry (const char *name, domain_enum domain)
3d9434b5 4633{
ee01b665
JB
4634 struct ada_symbol_cache *sym_cache
4635 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4636 int h = msymbol_hash (name) % HASH_SIZE;
4637 struct cache_entry **e;
4638
ee01b665 4639 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4640 {
fe978cb0 4641 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4642 return e;
4643 }
4644 return NULL;
4645}
4646
fe978cb0 4647/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4648 Return 1 if found, 0 otherwise.
4649
4650 If an entry was found and SYM is not NULL, set *SYM to the entry's
4651 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4652
96d887e8 4653static int
fe978cb0 4654lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4655 struct symbol **sym, const struct block **block)
96d887e8 4656{
fe978cb0 4657 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4658
4659 if (e == NULL)
4660 return 0;
4661 if (sym != NULL)
4662 *sym = (*e)->sym;
4663 if (block != NULL)
4664 *block = (*e)->block;
4665 return 1;
96d887e8
PH
4666}
4667
3d9434b5 4668/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4669 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4670
96d887e8 4671static void
fe978cb0 4672cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4673 const struct block *block)
96d887e8 4674{
ee01b665
JB
4675 struct ada_symbol_cache *sym_cache
4676 = ada_get_symbol_cache (current_program_space);
3d9434b5 4677 int h;
3d9434b5
JB
4678 struct cache_entry *e;
4679
1994afbf
DE
4680 /* Symbols for builtin types don't have a block.
4681 For now don't cache such symbols. */
4682 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4683 return;
4684
3d9434b5
JB
4685 /* If the symbol is a local symbol, then do not cache it, as a search
4686 for that symbol depends on the context. To determine whether
4687 the symbol is local or not, we check the block where we found it
4688 against the global and static blocks of its associated symtab. */
4689 if (sym
08be3fe3 4690 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4691 GLOBAL_BLOCK) != block
08be3fe3 4692 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4693 STATIC_BLOCK) != block)
3d9434b5
JB
4694 return;
4695
4696 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4697 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4698 e->next = sym_cache->root[h];
4699 sym_cache->root[h] = e;
2ef5453b 4700 e->name = obstack_strdup (&sym_cache->cache_space, name);
3d9434b5 4701 e->sym = sym;
fe978cb0 4702 e->domain = domain;
3d9434b5 4703 e->block = block;
96d887e8 4704}
4c4b4cd2
PH
4705\f
4706 /* Symbol Lookup */
4707
b5ec771e
PA
4708/* Return the symbol name match type that should be used used when
4709 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4710
4711 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4712 for Ada lookups. */
c0431670 4713
b5ec771e
PA
4714static symbol_name_match_type
4715name_match_type_from_name (const char *lookup_name)
c0431670 4716{
b5ec771e
PA
4717 return (strstr (lookup_name, "__") == NULL
4718 ? symbol_name_match_type::WILD
4719 : symbol_name_match_type::FULL);
c0431670
JB
4720}
4721
4c4b4cd2
PH
4722/* Return the result of a standard (literal, C-like) lookup of NAME in
4723 given DOMAIN, visible from lexical block BLOCK. */
4724
4725static struct symbol *
4726standard_lookup (const char *name, const struct block *block,
4727 domain_enum domain)
4728{
acbd605d 4729 /* Initialize it just to avoid a GCC false warning. */
6640a367 4730 struct block_symbol sym = {};
4c4b4cd2 4731
d12307c1
PMR
4732 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4733 return sym.symbol;
a2cd4f14 4734 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4735 cache_symbol (name, domain, sym.symbol, sym.block);
4736 return sym.symbol;
4c4b4cd2
PH
4737}
4738
4739
4740/* Non-zero iff there is at least one non-function/non-enumeral symbol
4741 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4742 since they contend in overloading in the same way. */
4743static int
d12307c1 4744is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4745{
4746 int i;
4747
4748 for (i = 0; i < n; i += 1)
78134374
SM
4749 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_FUNC
4750 && (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM
d12307c1 4751 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4752 return 1;
4753
4754 return 0;
4755}
4756
4757/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4758 struct types. Otherwise, they may not. */
14f9c5c9
AS
4759
4760static int
d2e4a39e 4761equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4762{
d2e4a39e 4763 if (type0 == type1)
14f9c5c9 4764 return 1;
d2e4a39e 4765 if (type0 == NULL || type1 == NULL
78134374 4766 || type0->code () != type1->code ())
14f9c5c9 4767 return 0;
78134374
SM
4768 if ((type0->code () == TYPE_CODE_STRUCT
4769 || type0->code () == TYPE_CODE_ENUM)
14f9c5c9 4770 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4771 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4772 return 1;
d2e4a39e 4773
14f9c5c9
AS
4774 return 0;
4775}
4776
4777/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4778 no more defined than that of SYM1. */
14f9c5c9
AS
4779
4780static int
d2e4a39e 4781lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4782{
4783 if (sym0 == sym1)
4784 return 1;
176620f1 4785 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4786 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4787 return 0;
4788
d2e4a39e 4789 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4790 {
4791 case LOC_UNDEF:
4792 return 1;
4793 case LOC_TYPEDEF:
4794 {
4c4b4cd2
PH
4795 struct type *type0 = SYMBOL_TYPE (sym0);
4796 struct type *type1 = SYMBOL_TYPE (sym1);
987012b8
CB
4797 const char *name0 = sym0->linkage_name ();
4798 const char *name1 = sym1->linkage_name ();
4c4b4cd2 4799 int len0 = strlen (name0);
5b4ee69b 4800
4c4b4cd2 4801 return
78134374 4802 type0->code () == type1->code ()
4c4b4cd2
PH
4803 && (equiv_types (type0, type1)
4804 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4805 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4806 }
4807 case LOC_CONST:
4808 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4809 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
4b610737
TT
4810
4811 case LOC_STATIC:
4812 {
987012b8
CB
4813 const char *name0 = sym0->linkage_name ();
4814 const char *name1 = sym1->linkage_name ();
4b610737
TT
4815 return (strcmp (name0, name1) == 0
4816 && SYMBOL_VALUE_ADDRESS (sym0) == SYMBOL_VALUE_ADDRESS (sym1));
4817 }
4818
d2e4a39e
AS
4819 default:
4820 return 0;
14f9c5c9
AS
4821 }
4822}
4823
d12307c1 4824/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4825 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4826
4827static void
76a01679
JB
4828add_defn_to_vec (struct obstack *obstackp,
4829 struct symbol *sym,
f0c5f9b2 4830 const struct block *block)
14f9c5c9
AS
4831{
4832 int i;
d12307c1 4833 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4834
529cad9c
PH
4835 /* Do not try to complete stub types, as the debugger is probably
4836 already scanning all symbols matching a certain name at the
4837 time when this function is called. Trying to replace the stub
4838 type by its associated full type will cause us to restart a scan
4839 which may lead to an infinite recursion. Instead, the client
4840 collecting the matching symbols will end up collecting several
4841 matches, with at least one of them complete. It can then filter
4842 out the stub ones if needed. */
4843
4c4b4cd2
PH
4844 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4845 {
d12307c1 4846 if (lesseq_defined_than (sym, prevDefns[i].symbol))
4c4b4cd2 4847 return;
d12307c1 4848 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
4c4b4cd2 4849 {
d12307c1 4850 prevDefns[i].symbol = sym;
4c4b4cd2 4851 prevDefns[i].block = block;
4c4b4cd2 4852 return;
76a01679 4853 }
4c4b4cd2
PH
4854 }
4855
4856 {
d12307c1 4857 struct block_symbol info;
4c4b4cd2 4858
d12307c1 4859 info.symbol = sym;
4c4b4cd2 4860 info.block = block;
d12307c1 4861 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4862 }
4863}
4864
d12307c1
PMR
4865/* Number of block_symbol structures currently collected in current vector in
4866 OBSTACKP. */
4c4b4cd2 4867
76a01679
JB
4868static int
4869num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4870{
d12307c1 4871 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4872}
4873
d12307c1
PMR
4874/* Vector of block_symbol structures currently collected in current vector in
4875 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4876
d12307c1 4877static struct block_symbol *
4c4b4cd2
PH
4878defns_collected (struct obstack *obstackp, int finish)
4879{
4880 if (finish)
224c3ddb 4881 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4882 else
d12307c1 4883 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4884}
4885
7c7b6655
TT
4886/* Return a bound minimal symbol matching NAME according to Ada
4887 decoding rules. Returns an invalid symbol if there is no such
4888 minimal symbol. Names prefixed with "standard__" are handled
4889 specially: "standard__" is first stripped off, and only static and
4890 global symbols are searched. */
4c4b4cd2 4891
7c7b6655 4892struct bound_minimal_symbol
96d887e8 4893ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4894{
7c7b6655 4895 struct bound_minimal_symbol result;
4c4b4cd2 4896
7c7b6655
TT
4897 memset (&result, 0, sizeof (result));
4898
b5ec771e
PA
4899 symbol_name_match_type match_type = name_match_type_from_name (name);
4900 lookup_name_info lookup_name (name, match_type);
4901
4902 symbol_name_matcher_ftype *match_name
4903 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4904
2030c079 4905 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4906 {
7932255d 4907 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf 4908 {
c9d95fa3 4909 if (match_name (msymbol->linkage_name (), lookup_name, NULL)
5325b9bf
TT
4910 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4911 {
4912 result.minsym = msymbol;
4913 result.objfile = objfile;
4914 break;
4915 }
4916 }
4917 }
4c4b4cd2 4918
7c7b6655 4919 return result;
96d887e8 4920}
4c4b4cd2 4921
96d887e8
PH
4922/* For all subprograms that statically enclose the subprogram of the
4923 selected frame, add symbols matching identifier NAME in DOMAIN
4924 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4925 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4926 with a wildcard prefix. */
4c4b4cd2 4927
96d887e8
PH
4928static void
4929add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4930 const lookup_name_info &lookup_name,
4931 domain_enum domain)
96d887e8 4932{
96d887e8 4933}
14f9c5c9 4934
96d887e8
PH
4935/* True if TYPE is definitely an artificial type supplied to a symbol
4936 for which no debugging information was given in the symbol file. */
14f9c5c9 4937
96d887e8
PH
4938static int
4939is_nondebugging_type (struct type *type)
4940{
0d5cff50 4941 const char *name = ada_type_name (type);
5b4ee69b 4942
96d887e8
PH
4943 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4944}
4c4b4cd2 4945
8f17729f
JB
4946/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4947 that are deemed "identical" for practical purposes.
4948
4949 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4950 types and that their number of enumerals is identical (in other
1f704f76 4951 words, type1->num_fields () == type2->num_fields ()). */
8f17729f
JB
4952
4953static int
4954ada_identical_enum_types_p (struct type *type1, struct type *type2)
4955{
4956 int i;
4957
4958 /* The heuristic we use here is fairly conservative. We consider
4959 that 2 enumerate types are identical if they have the same
4960 number of enumerals and that all enumerals have the same
4961 underlying value and name. */
4962
4963 /* All enums in the type should have an identical underlying value. */
1f704f76 4964 for (i = 0; i < type1->num_fields (); i++)
14e75d8e 4965 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4966 return 0;
4967
4968 /* All enumerals should also have the same name (modulo any numerical
4969 suffix). */
1f704f76 4970 for (i = 0; i < type1->num_fields (); i++)
8f17729f 4971 {
0d5cff50
DE
4972 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4973 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4974 int len_1 = strlen (name_1);
4975 int len_2 = strlen (name_2);
4976
4977 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4978 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4979 if (len_1 != len_2
4980 || strncmp (TYPE_FIELD_NAME (type1, i),
4981 TYPE_FIELD_NAME (type2, i),
4982 len_1) != 0)
4983 return 0;
4984 }
4985
4986 return 1;
4987}
4988
4989/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4990 that are deemed "identical" for practical purposes. Sometimes,
4991 enumerals are not strictly identical, but their types are so similar
4992 that they can be considered identical.
4993
4994 For instance, consider the following code:
4995
4996 type Color is (Black, Red, Green, Blue, White);
4997 type RGB_Color is new Color range Red .. Blue;
4998
4999 Type RGB_Color is a subrange of an implicit type which is a copy
5000 of type Color. If we call that implicit type RGB_ColorB ("B" is
5001 for "Base Type"), then type RGB_ColorB is a copy of type Color.
5002 As a result, when an expression references any of the enumeral
5003 by name (Eg. "print green"), the expression is technically
5004 ambiguous and the user should be asked to disambiguate. But
5005 doing so would only hinder the user, since it wouldn't matter
5006 what choice he makes, the outcome would always be the same.
5007 So, for practical purposes, we consider them as the same. */
5008
5009static int
54d343a2 5010symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
5011{
5012 int i;
5013
5014 /* Before performing a thorough comparison check of each type,
5015 we perform a series of inexpensive checks. We expect that these
5016 checks will quickly fail in the vast majority of cases, and thus
5017 help prevent the unnecessary use of a more expensive comparison.
5018 Said comparison also expects us to make some of these checks
5019 (see ada_identical_enum_types_p). */
5020
5021 /* Quick check: All symbols should have an enum type. */
54d343a2 5022 for (i = 0; i < syms.size (); i++)
78134374 5023 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM)
8f17729f
JB
5024 return 0;
5025
5026 /* Quick check: They should all have the same value. */
54d343a2 5027 for (i = 1; i < syms.size (); i++)
d12307c1 5028 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
5029 return 0;
5030
5031 /* Quick check: They should all have the same number of enumerals. */
54d343a2 5032 for (i = 1; i < syms.size (); i++)
1f704f76
SM
5033 if (SYMBOL_TYPE (syms[i].symbol)->num_fields ()
5034 != SYMBOL_TYPE (syms[0].symbol)->num_fields ())
8f17729f
JB
5035 return 0;
5036
5037 /* All the sanity checks passed, so we might have a set of
5038 identical enumeration types. Perform a more complete
5039 comparison of the type of each symbol. */
54d343a2 5040 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
5041 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
5042 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5043 return 0;
5044
5045 return 1;
5046}
5047
54d343a2 5048/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
5049 duplicate other symbols in the list (The only case I know of where
5050 this happens is when object files containing stabs-in-ecoff are
5051 linked with files containing ordinary ecoff debugging symbols (or no
5052 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5053 Returns the number of items in the modified list. */
4c4b4cd2 5054
96d887e8 5055static int
54d343a2 5056remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5057{
5058 int i, j;
4c4b4cd2 5059
8f17729f
JB
5060 /* We should never be called with less than 2 symbols, as there
5061 cannot be any extra symbol in that case. But it's easy to
5062 handle, since we have nothing to do in that case. */
54d343a2
TT
5063 if (syms->size () < 2)
5064 return syms->size ();
8f17729f 5065
96d887e8 5066 i = 0;
54d343a2 5067 while (i < syms->size ())
96d887e8 5068 {
a35ddb44 5069 int remove_p = 0;
339c13b6
JB
5070
5071 /* If two symbols have the same name and one of them is a stub type,
5072 the get rid of the stub. */
5073
54d343a2 5074 if (TYPE_STUB (SYMBOL_TYPE ((*syms)[i].symbol))
987012b8 5075 && (*syms)[i].symbol->linkage_name () != NULL)
339c13b6 5076 {
54d343a2 5077 for (j = 0; j < syms->size (); j++)
339c13b6
JB
5078 {
5079 if (j != i
54d343a2 5080 && !TYPE_STUB (SYMBOL_TYPE ((*syms)[j].symbol))
987012b8
CB
5081 && (*syms)[j].symbol->linkage_name () != NULL
5082 && strcmp ((*syms)[i].symbol->linkage_name (),
5083 (*syms)[j].symbol->linkage_name ()) == 0)
a35ddb44 5084 remove_p = 1;
339c13b6
JB
5085 }
5086 }
5087
5088 /* Two symbols with the same name, same class and same address
5089 should be identical. */
5090
987012b8 5091 else if ((*syms)[i].symbol->linkage_name () != NULL
54d343a2
TT
5092 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5093 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
96d887e8 5094 {
54d343a2 5095 for (j = 0; j < syms->size (); j += 1)
96d887e8
PH
5096 {
5097 if (i != j
987012b8
CB
5098 && (*syms)[j].symbol->linkage_name () != NULL
5099 && strcmp ((*syms)[i].symbol->linkage_name (),
5100 (*syms)[j].symbol->linkage_name ()) == 0
54d343a2
TT
5101 && SYMBOL_CLASS ((*syms)[i].symbol)
5102 == SYMBOL_CLASS ((*syms)[j].symbol)
5103 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5104 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
a35ddb44 5105 remove_p = 1;
4c4b4cd2 5106 }
4c4b4cd2 5107 }
339c13b6 5108
a35ddb44 5109 if (remove_p)
54d343a2 5110 syms->erase (syms->begin () + i);
339c13b6 5111
96d887e8 5112 i += 1;
14f9c5c9 5113 }
8f17729f
JB
5114
5115 /* If all the remaining symbols are identical enumerals, then
5116 just keep the first one and discard the rest.
5117
5118 Unlike what we did previously, we do not discard any entry
5119 unless they are ALL identical. This is because the symbol
5120 comparison is not a strict comparison, but rather a practical
5121 comparison. If all symbols are considered identical, then
5122 we can just go ahead and use the first one and discard the rest.
5123 But if we cannot reduce the list to a single element, we have
5124 to ask the user to disambiguate anyways. And if we have to
5125 present a multiple-choice menu, it's less confusing if the list
5126 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5127 if (symbols_are_identical_enums (*syms))
5128 syms->resize (1);
8f17729f 5129
54d343a2 5130 return syms->size ();
14f9c5c9
AS
5131}
5132
96d887e8
PH
5133/* Given a type that corresponds to a renaming entity, use the type name
5134 to extract the scope (package name or function name, fully qualified,
5135 and following the GNAT encoding convention) where this renaming has been
49d83361 5136 defined. */
4c4b4cd2 5137
49d83361 5138static std::string
96d887e8 5139xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5140{
96d887e8 5141 /* The renaming types adhere to the following convention:
0963b4bd 5142 <scope>__<rename>___<XR extension>.
96d887e8
PH
5143 So, to extract the scope, we search for the "___XR" extension,
5144 and then backtrack until we find the first "__". */
76a01679 5145
7d93a1e0 5146 const char *name = renaming_type->name ();
108d56a4
SM
5147 const char *suffix = strstr (name, "___XR");
5148 const char *last;
14f9c5c9 5149
96d887e8
PH
5150 /* Now, backtrack a bit until we find the first "__". Start looking
5151 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5152
96d887e8
PH
5153 for (last = suffix - 3; last > name; last--)
5154 if (last[0] == '_' && last[1] == '_')
5155 break;
76a01679 5156
96d887e8 5157 /* Make a copy of scope and return it. */
49d83361 5158 return std::string (name, last);
4c4b4cd2
PH
5159}
5160
96d887e8 5161/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5162
96d887e8
PH
5163static int
5164is_package_name (const char *name)
4c4b4cd2 5165{
96d887e8
PH
5166 /* Here, We take advantage of the fact that no symbols are generated
5167 for packages, while symbols are generated for each function.
5168 So the condition for NAME represent a package becomes equivalent
5169 to NAME not existing in our list of symbols. There is only one
5170 small complication with library-level functions (see below). */
4c4b4cd2 5171
96d887e8
PH
5172 /* If it is a function that has not been defined at library level,
5173 then we should be able to look it up in the symbols. */
5174 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5175 return 0;
14f9c5c9 5176
96d887e8
PH
5177 /* Library-level function names start with "_ada_". See if function
5178 "_ada_" followed by NAME can be found. */
14f9c5c9 5179
96d887e8 5180 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5181 functions names cannot contain "__" in them. */
96d887e8
PH
5182 if (strstr (name, "__") != NULL)
5183 return 0;
4c4b4cd2 5184
528e1572 5185 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5186
528e1572 5187 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5188}
14f9c5c9 5189
96d887e8 5190/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5191 not visible from FUNCTION_NAME. */
14f9c5c9 5192
96d887e8 5193static int
0d5cff50 5194old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5195{
aeb5907d
JB
5196 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5197 return 0;
5198
49d83361 5199 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5200
96d887e8 5201 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5202 if (is_package_name (scope.c_str ()))
5203 return 0;
14f9c5c9 5204
96d887e8
PH
5205 /* Check that the rename is in the current function scope by checking
5206 that its name starts with SCOPE. */
76a01679 5207
96d887e8
PH
5208 /* If the function name starts with "_ada_", it means that it is
5209 a library-level function. Strip this prefix before doing the
5210 comparison, as the encoding for the renaming does not contain
5211 this prefix. */
61012eef 5212 if (startswith (function_name, "_ada_"))
96d887e8 5213 function_name += 5;
f26caa11 5214
49d83361 5215 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5216}
5217
aeb5907d
JB
5218/* Remove entries from SYMS that corresponds to a renaming entity that
5219 is not visible from the function associated with CURRENT_BLOCK or
5220 that is superfluous due to the presence of more specific renaming
5221 information. Places surviving symbols in the initial entries of
5222 SYMS and returns the number of surviving symbols.
96d887e8
PH
5223
5224 Rationale:
aeb5907d
JB
5225 First, in cases where an object renaming is implemented as a
5226 reference variable, GNAT may produce both the actual reference
5227 variable and the renaming encoding. In this case, we discard the
5228 latter.
5229
5230 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5231 entity. Unfortunately, STABS currently does not support the definition
5232 of types that are local to a given lexical block, so all renamings types
5233 are emitted at library level. As a consequence, if an application
5234 contains two renaming entities using the same name, and a user tries to
5235 print the value of one of these entities, the result of the ada symbol
5236 lookup will also contain the wrong renaming type.
f26caa11 5237
96d887e8
PH
5238 This function partially covers for this limitation by attempting to
5239 remove from the SYMS list renaming symbols that should be visible
5240 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5241 method with the current information available. The implementation
5242 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5243
5244 - When the user tries to print a rename in a function while there
5245 is another rename entity defined in a package: Normally, the
5246 rename in the function has precedence over the rename in the
5247 package, so the latter should be removed from the list. This is
5248 currently not the case.
5249
5250 - This function will incorrectly remove valid renames if
5251 the CURRENT_BLOCK corresponds to a function which symbol name
5252 has been changed by an "Export" pragma. As a consequence,
5253 the user will be unable to print such rename entities. */
4c4b4cd2 5254
14f9c5c9 5255static int
54d343a2
TT
5256remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5257 const struct block *current_block)
4c4b4cd2
PH
5258{
5259 struct symbol *current_function;
0d5cff50 5260 const char *current_function_name;
4c4b4cd2 5261 int i;
aeb5907d
JB
5262 int is_new_style_renaming;
5263
5264 /* If there is both a renaming foo___XR... encoded as a variable and
5265 a simple variable foo in the same block, discard the latter.
0963b4bd 5266 First, zero out such symbols, then compress. */
aeb5907d 5267 is_new_style_renaming = 0;
54d343a2 5268 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5269 {
54d343a2
TT
5270 struct symbol *sym = (*syms)[i].symbol;
5271 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5272 const char *name;
5273 const char *suffix;
5274
5275 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5276 continue;
987012b8 5277 name = sym->linkage_name ();
aeb5907d
JB
5278 suffix = strstr (name, "___XR");
5279
5280 if (suffix != NULL)
5281 {
5282 int name_len = suffix - name;
5283 int j;
5b4ee69b 5284
aeb5907d 5285 is_new_style_renaming = 1;
54d343a2
TT
5286 for (j = 0; j < syms->size (); j += 1)
5287 if (i != j && (*syms)[j].symbol != NULL
987012b8 5288 && strncmp (name, (*syms)[j].symbol->linkage_name (),
aeb5907d 5289 name_len) == 0
54d343a2
TT
5290 && block == (*syms)[j].block)
5291 (*syms)[j].symbol = NULL;
aeb5907d
JB
5292 }
5293 }
5294 if (is_new_style_renaming)
5295 {
5296 int j, k;
5297
54d343a2
TT
5298 for (j = k = 0; j < syms->size (); j += 1)
5299 if ((*syms)[j].symbol != NULL)
aeb5907d 5300 {
54d343a2 5301 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5302 k += 1;
5303 }
5304 return k;
5305 }
4c4b4cd2
PH
5306
5307 /* Extract the function name associated to CURRENT_BLOCK.
5308 Abort if unable to do so. */
76a01679 5309
4c4b4cd2 5310 if (current_block == NULL)
54d343a2 5311 return syms->size ();
76a01679 5312
7f0df278 5313 current_function = block_linkage_function (current_block);
4c4b4cd2 5314 if (current_function == NULL)
54d343a2 5315 return syms->size ();
4c4b4cd2 5316
987012b8 5317 current_function_name = current_function->linkage_name ();
4c4b4cd2 5318 if (current_function_name == NULL)
54d343a2 5319 return syms->size ();
4c4b4cd2
PH
5320
5321 /* Check each of the symbols, and remove it from the list if it is
5322 a type corresponding to a renaming that is out of the scope of
5323 the current block. */
5324
5325 i = 0;
54d343a2 5326 while (i < syms->size ())
4c4b4cd2 5327 {
54d343a2 5328 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
aeb5907d 5329 == ADA_OBJECT_RENAMING
54d343a2
TT
5330 && old_renaming_is_invisible ((*syms)[i].symbol,
5331 current_function_name))
5332 syms->erase (syms->begin () + i);
4c4b4cd2
PH
5333 else
5334 i += 1;
5335 }
5336
54d343a2 5337 return syms->size ();
4c4b4cd2
PH
5338}
5339
339c13b6
JB
5340/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5341 whose name and domain match NAME and DOMAIN respectively.
5342 If no match was found, then extend the search to "enclosing"
5343 routines (in other words, if we're inside a nested function,
5344 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5345 If WILD_MATCH_P is nonzero, perform the naming matching in
5346 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5347
5348 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5349
5350static void
b5ec771e
PA
5351ada_add_local_symbols (struct obstack *obstackp,
5352 const lookup_name_info &lookup_name,
5353 const struct block *block, domain_enum domain)
339c13b6
JB
5354{
5355 int block_depth = 0;
5356
5357 while (block != NULL)
5358 {
5359 block_depth += 1;
b5ec771e 5360 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5361
5362 /* If we found a non-function match, assume that's the one. */
5363 if (is_nonfunction (defns_collected (obstackp, 0),
5364 num_defns_collected (obstackp)))
5365 return;
5366
5367 block = BLOCK_SUPERBLOCK (block);
5368 }
5369
5370 /* If no luck so far, try to find NAME as a local symbol in some lexically
5371 enclosing subprogram. */
5372 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5373 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5374}
5375
ccefe4c4 5376/* An object of this type is used as the user_data argument when
40658b94 5377 calling the map_matching_symbols method. */
ccefe4c4 5378
40658b94 5379struct match_data
ccefe4c4 5380{
40658b94 5381 struct objfile *objfile;
ccefe4c4 5382 struct obstack *obstackp;
40658b94
PH
5383 struct symbol *arg_sym;
5384 int found_sym;
ccefe4c4
TT
5385};
5386
199b4314
TT
5387/* A callback for add_nonlocal_symbols that adds symbol, found in BSYM,
5388 to a list of symbols. DATA is a pointer to a struct match_data *
40658b94
PH
5389 containing the obstack that collects the symbol list, the file that SYM
5390 must come from, a flag indicating whether a non-argument symbol has
5391 been found in the current block, and the last argument symbol
5392 passed in SYM within the current block (if any). When SYM is null,
5393 marking the end of a block, the argument symbol is added if no
5394 other has been found. */
ccefe4c4 5395
199b4314
TT
5396static bool
5397aux_add_nonlocal_symbols (struct block_symbol *bsym,
5398 struct match_data *data)
ccefe4c4 5399{
199b4314
TT
5400 const struct block *block = bsym->block;
5401 struct symbol *sym = bsym->symbol;
5402
40658b94
PH
5403 if (sym == NULL)
5404 {
5405 if (!data->found_sym && data->arg_sym != NULL)
5406 add_defn_to_vec (data->obstackp,
5407 fixup_symbol_section (data->arg_sym, data->objfile),
5408 block);
5409 data->found_sym = 0;
5410 data->arg_sym = NULL;
5411 }
5412 else
5413 {
5414 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
199b4314 5415 return true;
40658b94
PH
5416 else if (SYMBOL_IS_ARGUMENT (sym))
5417 data->arg_sym = sym;
5418 else
5419 {
5420 data->found_sym = 1;
5421 add_defn_to_vec (data->obstackp,
5422 fixup_symbol_section (sym, data->objfile),
5423 block);
5424 }
5425 }
199b4314 5426 return true;
40658b94
PH
5427}
5428
b5ec771e
PA
5429/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5430 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5431 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5432
5433static int
5434ada_add_block_renamings (struct obstack *obstackp,
5435 const struct block *block,
b5ec771e
PA
5436 const lookup_name_info &lookup_name,
5437 domain_enum domain)
22cee43f
PMR
5438{
5439 struct using_direct *renaming;
5440 int defns_mark = num_defns_collected (obstackp);
5441
b5ec771e
PA
5442 symbol_name_matcher_ftype *name_match
5443 = ada_get_symbol_name_matcher (lookup_name);
5444
22cee43f
PMR
5445 for (renaming = block_using (block);
5446 renaming != NULL;
5447 renaming = renaming->next)
5448 {
5449 const char *r_name;
22cee43f
PMR
5450
5451 /* Avoid infinite recursions: skip this renaming if we are actually
5452 already traversing it.
5453
5454 Currently, symbol lookup in Ada don't use the namespace machinery from
5455 C++/Fortran support: skip namespace imports that use them. */
5456 if (renaming->searched
5457 || (renaming->import_src != NULL
5458 && renaming->import_src[0] != '\0')
5459 || (renaming->import_dest != NULL
5460 && renaming->import_dest[0] != '\0'))
5461 continue;
5462 renaming->searched = 1;
5463
5464 /* TODO: here, we perform another name-based symbol lookup, which can
5465 pull its own multiple overloads. In theory, we should be able to do
5466 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5467 not a simple name. But in order to do this, we would need to enhance
5468 the DWARF reader to associate a symbol to this renaming, instead of a
5469 name. So, for now, we do something simpler: re-use the C++/Fortran
5470 namespace machinery. */
5471 r_name = (renaming->alias != NULL
5472 ? renaming->alias
5473 : renaming->declaration);
b5ec771e
PA
5474 if (name_match (r_name, lookup_name, NULL))
5475 {
5476 lookup_name_info decl_lookup_name (renaming->declaration,
5477 lookup_name.match_type ());
5478 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5479 1, NULL);
5480 }
22cee43f
PMR
5481 renaming->searched = 0;
5482 }
5483 return num_defns_collected (obstackp) != defns_mark;
5484}
5485
db230ce3
JB
5486/* Implements compare_names, but only applying the comparision using
5487 the given CASING. */
5b4ee69b 5488
40658b94 5489static int
db230ce3
JB
5490compare_names_with_case (const char *string1, const char *string2,
5491 enum case_sensitivity casing)
40658b94
PH
5492{
5493 while (*string1 != '\0' && *string2 != '\0')
5494 {
db230ce3
JB
5495 char c1, c2;
5496
40658b94
PH
5497 if (isspace (*string1) || isspace (*string2))
5498 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5499
5500 if (casing == case_sensitive_off)
5501 {
5502 c1 = tolower (*string1);
5503 c2 = tolower (*string2);
5504 }
5505 else
5506 {
5507 c1 = *string1;
5508 c2 = *string2;
5509 }
5510 if (c1 != c2)
40658b94 5511 break;
db230ce3 5512
40658b94
PH
5513 string1 += 1;
5514 string2 += 1;
5515 }
db230ce3 5516
40658b94
PH
5517 switch (*string1)
5518 {
5519 case '(':
5520 return strcmp_iw_ordered (string1, string2);
5521 case '_':
5522 if (*string2 == '\0')
5523 {
052874e8 5524 if (is_name_suffix (string1))
40658b94
PH
5525 return 0;
5526 else
1a1d5513 5527 return 1;
40658b94 5528 }
dbb8534f 5529 /* FALLTHROUGH */
40658b94
PH
5530 default:
5531 if (*string2 == '(')
5532 return strcmp_iw_ordered (string1, string2);
5533 else
db230ce3
JB
5534 {
5535 if (casing == case_sensitive_off)
5536 return tolower (*string1) - tolower (*string2);
5537 else
5538 return *string1 - *string2;
5539 }
40658b94 5540 }
ccefe4c4
TT
5541}
5542
db230ce3
JB
5543/* Compare STRING1 to STRING2, with results as for strcmp.
5544 Compatible with strcmp_iw_ordered in that...
5545
5546 strcmp_iw_ordered (STRING1, STRING2) <= 0
5547
5548 ... implies...
5549
5550 compare_names (STRING1, STRING2) <= 0
5551
5552 (they may differ as to what symbols compare equal). */
5553
5554static int
5555compare_names (const char *string1, const char *string2)
5556{
5557 int result;
5558
5559 /* Similar to what strcmp_iw_ordered does, we need to perform
5560 a case-insensitive comparison first, and only resort to
5561 a second, case-sensitive, comparison if the first one was
5562 not sufficient to differentiate the two strings. */
5563
5564 result = compare_names_with_case (string1, string2, case_sensitive_off);
5565 if (result == 0)
5566 result = compare_names_with_case (string1, string2, case_sensitive_on);
5567
5568 return result;
5569}
5570
b5ec771e
PA
5571/* Convenience function to get at the Ada encoded lookup name for
5572 LOOKUP_NAME, as a C string. */
5573
5574static const char *
5575ada_lookup_name (const lookup_name_info &lookup_name)
5576{
5577 return lookup_name.ada ().lookup_name ().c_str ();
5578}
5579
339c13b6 5580/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5581 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5582 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5583 symbols otherwise. */
339c13b6
JB
5584
5585static void
b5ec771e
PA
5586add_nonlocal_symbols (struct obstack *obstackp,
5587 const lookup_name_info &lookup_name,
5588 domain_enum domain, int global)
339c13b6 5589{
40658b94 5590 struct match_data data;
339c13b6 5591
6475f2fe 5592 memset (&data, 0, sizeof data);
ccefe4c4 5593 data.obstackp = obstackp;
339c13b6 5594
b5ec771e
PA
5595 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5596
199b4314
TT
5597 auto callback = [&] (struct block_symbol *bsym)
5598 {
5599 return aux_add_nonlocal_symbols (bsym, &data);
5600 };
5601
2030c079 5602 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5603 {
5604 data.objfile = objfile;
5605
b054970d
TT
5606 objfile->sf->qf->map_matching_symbols (objfile, lookup_name,
5607 domain, global, callback,
5608 (is_wild_match
5609 ? NULL : compare_names));
22cee43f 5610
b669c953 5611 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5612 {
5613 const struct block *global_block
5614 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5615
b5ec771e
PA
5616 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5617 domain))
22cee43f
PMR
5618 data.found_sym = 1;
5619 }
40658b94
PH
5620 }
5621
5622 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5623 {
b5ec771e 5624 const char *name = ada_lookup_name (lookup_name);
e0802d59
TT
5625 std::string bracket_name = std::string ("<_ada_") + name + '>';
5626 lookup_name_info name1 (bracket_name, symbol_name_match_type::FULL);
b5ec771e 5627
2030c079 5628 for (objfile *objfile : current_program_space->objfiles ())
40658b94 5629 {
40658b94 5630 data.objfile = objfile;
b054970d 5631 objfile->sf->qf->map_matching_symbols (objfile, name1,
199b4314 5632 domain, global, callback,
b5ec771e 5633 compare_names);
40658b94
PH
5634 }
5635 }
339c13b6
JB
5636}
5637
b5ec771e
PA
5638/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5639 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5640 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5641
22cee43f
PMR
5642 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5643 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5644 is the one match returned (no other matches in that or
d9680e73 5645 enclosing blocks is returned). If there are any matches in or
22cee43f 5646 surrounding BLOCK, then these alone are returned.
4eeaa230 5647
b5ec771e
PA
5648 Names prefixed with "standard__" are handled specially:
5649 "standard__" is first stripped off (by the lookup_name
5650 constructor), and only static and global symbols are searched.
14f9c5c9 5651
22cee43f
PMR
5652 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5653 to lookup global symbols. */
5654
5655static void
5656ada_add_all_symbols (struct obstack *obstackp,
5657 const struct block *block,
b5ec771e 5658 const lookup_name_info &lookup_name,
22cee43f
PMR
5659 domain_enum domain,
5660 int full_search,
5661 int *made_global_lookup_p)
14f9c5c9
AS
5662{
5663 struct symbol *sym;
14f9c5c9 5664
22cee43f
PMR
5665 if (made_global_lookup_p)
5666 *made_global_lookup_p = 0;
339c13b6
JB
5667
5668 /* Special case: If the user specifies a symbol name inside package
5669 Standard, do a non-wild matching of the symbol name without
5670 the "standard__" prefix. This was primarily introduced in order
5671 to allow the user to specifically access the standard exceptions
5672 using, for instance, Standard.Constraint_Error when Constraint_Error
5673 is ambiguous (due to the user defining its own Constraint_Error
5674 entity inside its program). */
b5ec771e
PA
5675 if (lookup_name.ada ().standard_p ())
5676 block = NULL;
4c4b4cd2 5677
339c13b6 5678 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5679
4eeaa230
DE
5680 if (block != NULL)
5681 {
5682 if (full_search)
b5ec771e 5683 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5684 else
5685 {
5686 /* In the !full_search case we're are being called by
5687 ada_iterate_over_symbols, and we don't want to search
5688 superblocks. */
b5ec771e 5689 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5690 }
22cee43f
PMR
5691 if (num_defns_collected (obstackp) > 0 || !full_search)
5692 return;
4eeaa230 5693 }
d2e4a39e 5694
339c13b6
JB
5695 /* No non-global symbols found. Check our cache to see if we have
5696 already performed this search before. If we have, then return
5697 the same result. */
5698
b5ec771e
PA
5699 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5700 domain, &sym, &block))
4c4b4cd2
PH
5701 {
5702 if (sym != NULL)
b5ec771e 5703 add_defn_to_vec (obstackp, sym, block);
22cee43f 5704 return;
4c4b4cd2 5705 }
14f9c5c9 5706
22cee43f
PMR
5707 if (made_global_lookup_p)
5708 *made_global_lookup_p = 1;
b1eedac9 5709
339c13b6
JB
5710 /* Search symbols from all global blocks. */
5711
b5ec771e 5712 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5713
4c4b4cd2 5714 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5715 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5716
22cee43f 5717 if (num_defns_collected (obstackp) == 0)
b5ec771e 5718 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5719}
5720
b5ec771e
PA
5721/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5722 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5723 matches.
54d343a2
TT
5724 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5725 found and the blocks and symbol tables (if any) in which they were
5726 found.
22cee43f
PMR
5727
5728 When full_search is non-zero, any non-function/non-enumeral
5729 symbol match within the nest of blocks whose innermost member is BLOCK,
5730 is the one match returned (no other matches in that or
5731 enclosing blocks is returned). If there are any matches in or
5732 surrounding BLOCK, then these alone are returned.
5733
5734 Names prefixed with "standard__" are handled specially: "standard__"
5735 is first stripped off, and only static and global symbols are searched. */
5736
5737static int
b5ec771e
PA
5738ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5739 const struct block *block,
22cee43f 5740 domain_enum domain,
54d343a2 5741 std::vector<struct block_symbol> *results,
22cee43f
PMR
5742 int full_search)
5743{
22cee43f
PMR
5744 int syms_from_global_search;
5745 int ndefns;
ec6a20c2 5746 auto_obstack obstack;
22cee43f 5747
ec6a20c2 5748 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5749 domain, full_search, &syms_from_global_search);
14f9c5c9 5750
ec6a20c2
JB
5751 ndefns = num_defns_collected (&obstack);
5752
54d343a2
TT
5753 struct block_symbol *base = defns_collected (&obstack, 1);
5754 for (int i = 0; i < ndefns; ++i)
5755 results->push_back (base[i]);
4c4b4cd2 5756
54d343a2 5757 ndefns = remove_extra_symbols (results);
4c4b4cd2 5758
b1eedac9 5759 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5760 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5761
b1eedac9 5762 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5763 cache_symbol (ada_lookup_name (lookup_name), domain,
5764 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5765
54d343a2 5766 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5767
14f9c5c9
AS
5768 return ndefns;
5769}
5770
b5ec771e 5771/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5772 in global scopes, returning the number of matches, and filling *RESULTS
5773 with (SYM,BLOCK) tuples.
ec6a20c2 5774
4eeaa230
DE
5775 See ada_lookup_symbol_list_worker for further details. */
5776
5777int
b5ec771e 5778ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5779 domain_enum domain,
5780 std::vector<struct block_symbol> *results)
4eeaa230 5781{
b5ec771e
PA
5782 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5783 lookup_name_info lookup_name (name, name_match_type);
5784
5785 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5786}
5787
5788/* Implementation of the la_iterate_over_symbols method. */
5789
6969f124 5790static bool
14bc53a8 5791ada_iterate_over_symbols
b5ec771e
PA
5792 (const struct block *block, const lookup_name_info &name,
5793 domain_enum domain,
14bc53a8 5794 gdb::function_view<symbol_found_callback_ftype> callback)
4eeaa230
DE
5795{
5796 int ndefs, i;
54d343a2 5797 std::vector<struct block_symbol> results;
4eeaa230
DE
5798
5799 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
ec6a20c2 5800
4eeaa230
DE
5801 for (i = 0; i < ndefs; ++i)
5802 {
7e41c8db 5803 if (!callback (&results[i]))
6969f124 5804 return false;
4eeaa230 5805 }
6969f124
TT
5806
5807 return true;
4eeaa230
DE
5808}
5809
4e5c77fe
JB
5810/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5811 to 1, but choosing the first symbol found if there are multiple
5812 choices.
5813
5e2336be
JB
5814 The result is stored in *INFO, which must be non-NULL.
5815 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5816
5817void
5818ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5819 domain_enum domain,
d12307c1 5820 struct block_symbol *info)
14f9c5c9 5821{
b5ec771e
PA
5822 /* Since we already have an encoded name, wrap it in '<>' to force a
5823 verbatim match. Otherwise, if the name happens to not look like
5824 an encoded name (because it doesn't include a "__"),
5825 ada_lookup_name_info would re-encode/fold it again, and that
5826 would e.g., incorrectly lowercase object renaming names like
5827 "R28b" -> "r28b". */
5828 std::string verbatim = std::string ("<") + name + '>';
5829
5e2336be 5830 gdb_assert (info != NULL);
65392b3e 5831 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5832}
aeb5907d
JB
5833
5834/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5835 scope and in global scopes, or NULL if none. NAME is folded and
5836 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5837 choosing the first symbol if there are multiple choices. */
4e5c77fe 5838
d12307c1 5839struct block_symbol
aeb5907d 5840ada_lookup_symbol (const char *name, const struct block *block0,
65392b3e 5841 domain_enum domain)
aeb5907d 5842{
54d343a2 5843 std::vector<struct block_symbol> candidates;
f98fc17b 5844 int n_candidates;
f98fc17b
PA
5845
5846 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5847
5848 if (n_candidates == 0)
54d343a2 5849 return {};
f98fc17b
PA
5850
5851 block_symbol info = candidates[0];
5852 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5853 return info;
4c4b4cd2 5854}
14f9c5c9 5855
d12307c1 5856static struct block_symbol
f606139a
DE
5857ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5858 const char *name,
76a01679 5859 const struct block *block,
21b556f4 5860 const domain_enum domain)
4c4b4cd2 5861{
d12307c1 5862 struct block_symbol sym;
04dccad0 5863
65392b3e 5864 sym = ada_lookup_symbol (name, block_static_block (block), domain);
d12307c1 5865 if (sym.symbol != NULL)
04dccad0
JB
5866 return sym;
5867
5868 /* If we haven't found a match at this point, try the primitive
5869 types. In other languages, this search is performed before
5870 searching for global symbols in order to short-circuit that
5871 global-symbol search if it happens that the name corresponds
5872 to a primitive type. But we cannot do the same in Ada, because
5873 it is perfectly legitimate for a program to declare a type which
5874 has the same name as a standard type. If looking up a type in
5875 that situation, we have traditionally ignored the primitive type
5876 in favor of user-defined types. This is why, unlike most other
5877 languages, we search the primitive types this late and only after
5878 having searched the global symbols without success. */
5879
5880 if (domain == VAR_DOMAIN)
5881 {
5882 struct gdbarch *gdbarch;
5883
5884 if (block == NULL)
5885 gdbarch = target_gdbarch ();
5886 else
5887 gdbarch = block_gdbarch (block);
d12307c1
PMR
5888 sym.symbol = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5889 if (sym.symbol != NULL)
04dccad0
JB
5890 return sym;
5891 }
5892
6640a367 5893 return {};
14f9c5c9
AS
5894}
5895
5896
4c4b4cd2
PH
5897/* True iff STR is a possible encoded suffix of a normal Ada name
5898 that is to be ignored for matching purposes. Suffixes of parallel
5899 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5900 are given by any of the regular expressions:
4c4b4cd2 5901
babe1480
JB
5902 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5903 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5904 TKB [subprogram suffix for task bodies]
babe1480 5905 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5906 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5907
5908 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5909 match is performed. This sequence is used to differentiate homonyms,
5910 is an optional part of a valid name suffix. */
4c4b4cd2 5911
14f9c5c9 5912static int
d2e4a39e 5913is_name_suffix (const char *str)
14f9c5c9
AS
5914{
5915 int k;
4c4b4cd2
PH
5916 const char *matching;
5917 const int len = strlen (str);
5918
babe1480
JB
5919 /* Skip optional leading __[0-9]+. */
5920
4c4b4cd2
PH
5921 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5922 {
babe1480
JB
5923 str += 3;
5924 while (isdigit (str[0]))
5925 str += 1;
4c4b4cd2 5926 }
babe1480
JB
5927
5928 /* [.$][0-9]+ */
4c4b4cd2 5929
babe1480 5930 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5931 {
babe1480 5932 matching = str + 1;
4c4b4cd2
PH
5933 while (isdigit (matching[0]))
5934 matching += 1;
5935 if (matching[0] == '\0')
5936 return 1;
5937 }
5938
5939 /* ___[0-9]+ */
babe1480 5940
4c4b4cd2
PH
5941 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5942 {
5943 matching = str + 3;
5944 while (isdigit (matching[0]))
5945 matching += 1;
5946 if (matching[0] == '\0')
5947 return 1;
5948 }
5949
9ac7f98e
JB
5950 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5951
5952 if (strcmp (str, "TKB") == 0)
5953 return 1;
5954
529cad9c
PH
5955#if 0
5956 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5957 with a N at the end. Unfortunately, the compiler uses the same
5958 convention for other internal types it creates. So treating
529cad9c 5959 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5960 some regressions. For instance, consider the case of an enumerated
5961 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5962 name ends with N.
5963 Having a single character like this as a suffix carrying some
0963b4bd 5964 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5965 to be something like "_N" instead. In the meantime, do not do
5966 the following check. */
5967 /* Protected Object Subprograms */
5968 if (len == 1 && str [0] == 'N')
5969 return 1;
5970#endif
5971
5972 /* _E[0-9]+[bs]$ */
5973 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5974 {
5975 matching = str + 3;
5976 while (isdigit (matching[0]))
5977 matching += 1;
5978 if ((matching[0] == 'b' || matching[0] == 's')
5979 && matching [1] == '\0')
5980 return 1;
5981 }
5982
4c4b4cd2
PH
5983 /* ??? We should not modify STR directly, as we are doing below. This
5984 is fine in this case, but may become problematic later if we find
5985 that this alternative did not work, and want to try matching
5986 another one from the begining of STR. Since we modified it, we
5987 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5988 if (str[0] == 'X')
5989 {
5990 str += 1;
d2e4a39e 5991 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5992 {
5993 if (str[0] != 'n' && str[0] != 'b')
5994 return 0;
5995 str += 1;
5996 }
14f9c5c9 5997 }
babe1480 5998
14f9c5c9
AS
5999 if (str[0] == '\000')
6000 return 1;
babe1480 6001
d2e4a39e 6002 if (str[0] == '_')
14f9c5c9
AS
6003 {
6004 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 6005 return 0;
d2e4a39e 6006 if (str[2] == '_')
4c4b4cd2 6007 {
61ee279c
PH
6008 if (strcmp (str + 3, "JM") == 0)
6009 return 1;
6010 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
6011 the LJM suffix in favor of the JM one. But we will
6012 still accept LJM as a valid suffix for a reasonable
6013 amount of time, just to allow ourselves to debug programs
6014 compiled using an older version of GNAT. */
4c4b4cd2
PH
6015 if (strcmp (str + 3, "LJM") == 0)
6016 return 1;
6017 if (str[3] != 'X')
6018 return 0;
1265e4aa
JB
6019 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
6020 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
6021 return 1;
6022 if (str[4] == 'R' && str[5] != 'T')
6023 return 1;
6024 return 0;
6025 }
6026 if (!isdigit (str[2]))
6027 return 0;
6028 for (k = 3; str[k] != '\0'; k += 1)
6029 if (!isdigit (str[k]) && str[k] != '_')
6030 return 0;
14f9c5c9
AS
6031 return 1;
6032 }
4c4b4cd2 6033 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 6034 {
4c4b4cd2
PH
6035 for (k = 2; str[k] != '\0'; k += 1)
6036 if (!isdigit (str[k]) && str[k] != '_')
6037 return 0;
14f9c5c9
AS
6038 return 1;
6039 }
6040 return 0;
6041}
d2e4a39e 6042
aeb5907d
JB
6043/* Return non-zero if the string starting at NAME and ending before
6044 NAME_END contains no capital letters. */
529cad9c
PH
6045
6046static int
6047is_valid_name_for_wild_match (const char *name0)
6048{
f945dedf 6049 std::string decoded_name = ada_decode (name0);
529cad9c
PH
6050 int i;
6051
5823c3ef
JB
6052 /* If the decoded name starts with an angle bracket, it means that
6053 NAME0 does not follow the GNAT encoding format. It should then
6054 not be allowed as a possible wild match. */
6055 if (decoded_name[0] == '<')
6056 return 0;
6057
529cad9c
PH
6058 for (i=0; decoded_name[i] != '\0'; i++)
6059 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
6060 return 0;
6061
6062 return 1;
6063}
6064
73589123
PH
6065/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
6066 that could start a simple name. Assumes that *NAMEP points into
6067 the string beginning at NAME0. */
4c4b4cd2 6068
14f9c5c9 6069static int
73589123 6070advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 6071{
73589123 6072 const char *name = *namep;
5b4ee69b 6073
5823c3ef 6074 while (1)
14f9c5c9 6075 {
aa27d0b3 6076 int t0, t1;
73589123
PH
6077
6078 t0 = *name;
6079 if (t0 == '_')
6080 {
6081 t1 = name[1];
6082 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6083 {
6084 name += 1;
61012eef 6085 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6086 break;
6087 else
6088 name += 1;
6089 }
aa27d0b3
JB
6090 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6091 || name[2] == target0))
73589123
PH
6092 {
6093 name += 2;
6094 break;
6095 }
6096 else
6097 return 0;
6098 }
6099 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6100 name += 1;
6101 else
5823c3ef 6102 return 0;
73589123
PH
6103 }
6104
6105 *namep = name;
6106 return 1;
6107}
6108
b5ec771e
PA
6109/* Return true iff NAME encodes a name of the form prefix.PATN.
6110 Ignores any informational suffixes of NAME (i.e., for which
6111 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6112 simple name. */
73589123 6113
b5ec771e 6114static bool
73589123
PH
6115wild_match (const char *name, const char *patn)
6116{
22e048c9 6117 const char *p;
73589123
PH
6118 const char *name0 = name;
6119
6120 while (1)
6121 {
6122 const char *match = name;
6123
6124 if (*name == *patn)
6125 {
6126 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6127 if (*p != *name)
6128 break;
6129 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6130 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6131
6132 if (name[-1] == '_')
6133 name -= 1;
6134 }
6135 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6136 return false;
96d887e8 6137 }
96d887e8
PH
6138}
6139
b5ec771e
PA
6140/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6141 any trailing suffixes that encode debugging information or leading
6142 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6143 information that is ignored). */
40658b94 6144
b5ec771e 6145static bool
c4d840bd
PH
6146full_match (const char *sym_name, const char *search_name)
6147{
b5ec771e
PA
6148 size_t search_name_len = strlen (search_name);
6149
6150 if (strncmp (sym_name, search_name, search_name_len) == 0
6151 && is_name_suffix (sym_name + search_name_len))
6152 return true;
6153
6154 if (startswith (sym_name, "_ada_")
6155 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6156 && is_name_suffix (sym_name + search_name_len + 5))
6157 return true;
c4d840bd 6158
b5ec771e
PA
6159 return false;
6160}
c4d840bd 6161
b5ec771e
PA
6162/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6163 *defn_symbols, updating the list of symbols in OBSTACKP (if
6164 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6165
6166static void
6167ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6168 const struct block *block,
6169 const lookup_name_info &lookup_name,
6170 domain_enum domain, struct objfile *objfile)
96d887e8 6171{
8157b174 6172 struct block_iterator iter;
96d887e8
PH
6173 /* A matching argument symbol, if any. */
6174 struct symbol *arg_sym;
6175 /* Set true when we find a matching non-argument symbol. */
6176 int found_sym;
6177 struct symbol *sym;
6178
6179 arg_sym = NULL;
6180 found_sym = 0;
b5ec771e
PA
6181 for (sym = block_iter_match_first (block, lookup_name, &iter);
6182 sym != NULL;
6183 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6184 {
c1b5c1eb 6185 if (symbol_matches_domain (sym->language (), SYMBOL_DOMAIN (sym), domain))
b5ec771e
PA
6186 {
6187 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6188 {
6189 if (SYMBOL_IS_ARGUMENT (sym))
6190 arg_sym = sym;
6191 else
6192 {
6193 found_sym = 1;
6194 add_defn_to_vec (obstackp,
6195 fixup_symbol_section (sym, objfile),
6196 block);
6197 }
6198 }
6199 }
96d887e8
PH
6200 }
6201
22cee43f
PMR
6202 /* Handle renamings. */
6203
b5ec771e 6204 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6205 found_sym = 1;
6206
96d887e8
PH
6207 if (!found_sym && arg_sym != NULL)
6208 {
76a01679
JB
6209 add_defn_to_vec (obstackp,
6210 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6211 block);
96d887e8
PH
6212 }
6213
b5ec771e 6214 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6215 {
6216 arg_sym = NULL;
6217 found_sym = 0;
b5ec771e
PA
6218 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6219 const char *name = ada_lookup_name.c_str ();
6220 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6221
6222 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6223 {
c1b5c1eb 6224 if (symbol_matches_domain (sym->language (),
4186eb54 6225 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6226 {
6227 int cmp;
6228
987012b8 6229 cmp = (int) '_' - (int) sym->linkage_name ()[0];
76a01679
JB
6230 if (cmp == 0)
6231 {
987012b8 6232 cmp = !startswith (sym->linkage_name (), "_ada_");
76a01679 6233 if (cmp == 0)
987012b8 6234 cmp = strncmp (name, sym->linkage_name () + 5,
76a01679
JB
6235 name_len);
6236 }
6237
6238 if (cmp == 0
987012b8 6239 && is_name_suffix (sym->linkage_name () + name_len + 5))
76a01679 6240 {
2a2d4dc3
AS
6241 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6242 {
6243 if (SYMBOL_IS_ARGUMENT (sym))
6244 arg_sym = sym;
6245 else
6246 {
6247 found_sym = 1;
6248 add_defn_to_vec (obstackp,
6249 fixup_symbol_section (sym, objfile),
6250 block);
6251 }
6252 }
76a01679
JB
6253 }
6254 }
76a01679 6255 }
96d887e8
PH
6256
6257 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6258 They aren't parameters, right? */
6259 if (!found_sym && arg_sym != NULL)
6260 {
6261 add_defn_to_vec (obstackp,
76a01679 6262 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6263 block);
96d887e8
PH
6264 }
6265 }
6266}
6267\f
41d27058
JB
6268
6269 /* Symbol Completion */
6270
b5ec771e 6271/* See symtab.h. */
41d27058 6272
b5ec771e
PA
6273bool
6274ada_lookup_name_info::matches
6275 (const char *sym_name,
6276 symbol_name_match_type match_type,
a207cff2 6277 completion_match_result *comp_match_res) const
41d27058 6278{
b5ec771e
PA
6279 bool match = false;
6280 const char *text = m_encoded_name.c_str ();
6281 size_t text_len = m_encoded_name.size ();
41d27058
JB
6282
6283 /* First, test against the fully qualified name of the symbol. */
6284
6285 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6286 match = true;
41d27058 6287
f945dedf 6288 std::string decoded_name = ada_decode (sym_name);
b5ec771e 6289 if (match && !m_encoded_p)
41d27058
JB
6290 {
6291 /* One needed check before declaring a positive match is to verify
6292 that iff we are doing a verbatim match, the decoded version
6293 of the symbol name starts with '<'. Otherwise, this symbol name
6294 is not a suitable completion. */
41d27058 6295
f945dedf 6296 bool has_angle_bracket = (decoded_name[0] == '<');
b5ec771e 6297 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6298 }
6299
b5ec771e 6300 if (match && !m_verbatim_p)
41d27058
JB
6301 {
6302 /* When doing non-verbatim match, another check that needs to
6303 be done is to verify that the potentially matching symbol name
6304 does not include capital letters, because the ada-mode would
6305 not be able to understand these symbol names without the
6306 angle bracket notation. */
6307 const char *tmp;
6308
6309 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6310 if (*tmp != '\0')
b5ec771e 6311 match = false;
41d27058
JB
6312 }
6313
6314 /* Second: Try wild matching... */
6315
b5ec771e 6316 if (!match && m_wild_match_p)
41d27058
JB
6317 {
6318 /* Since we are doing wild matching, this means that TEXT
6319 may represent an unqualified symbol name. We therefore must
6320 also compare TEXT against the unqualified name of the symbol. */
f945dedf 6321 sym_name = ada_unqualified_name (decoded_name.c_str ());
41d27058
JB
6322
6323 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6324 match = true;
41d27058
JB
6325 }
6326
b5ec771e 6327 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6328
6329 if (!match)
b5ec771e 6330 return false;
41d27058 6331
a207cff2 6332 if (comp_match_res != NULL)
b5ec771e 6333 {
a207cff2 6334 std::string &match_str = comp_match_res->match.storage ();
41d27058 6335
b5ec771e 6336 if (!m_encoded_p)
a207cff2 6337 match_str = ada_decode (sym_name);
b5ec771e
PA
6338 else
6339 {
6340 if (m_verbatim_p)
6341 match_str = add_angle_brackets (sym_name);
6342 else
6343 match_str = sym_name;
41d27058 6344
b5ec771e 6345 }
a207cff2
PA
6346
6347 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6348 }
6349
b5ec771e 6350 return true;
41d27058
JB
6351}
6352
b5ec771e 6353/* Add the list of possible symbol names completing TEXT to TRACKER.
eb3ff9a5 6354 WORD is the entire command on which completion is made. */
41d27058 6355
eb3ff9a5
PA
6356static void
6357ada_collect_symbol_completion_matches (completion_tracker &tracker,
c6756f62 6358 complete_symbol_mode mode,
b5ec771e
PA
6359 symbol_name_match_type name_match_type,
6360 const char *text, const char *word,
eb3ff9a5 6361 enum type_code code)
41d27058 6362{
41d27058 6363 struct symbol *sym;
3977b71f 6364 const struct block *b, *surrounding_static_block = 0;
8157b174 6365 struct block_iterator iter;
41d27058 6366
2f68a895
TT
6367 gdb_assert (code == TYPE_CODE_UNDEF);
6368
1b026119 6369 lookup_name_info lookup_name (text, name_match_type, true);
41d27058
JB
6370
6371 /* First, look at the partial symtab symbols. */
14bc53a8 6372 expand_symtabs_matching (NULL,
b5ec771e
PA
6373 lookup_name,
6374 NULL,
14bc53a8
PA
6375 NULL,
6376 ALL_DOMAIN);
41d27058
JB
6377
6378 /* At this point scan through the misc symbol vectors and add each
6379 symbol you find to the list. Eventually we want to ignore
6380 anything that isn't a text symbol (everything else will be
6381 handled by the psymtab code above). */
6382
2030c079 6383 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 6384 {
7932255d 6385 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
6386 {
6387 QUIT;
6388
6389 if (completion_skip_symbol (mode, msymbol))
6390 continue;
6391
c1b5c1eb 6392 language symbol_language = msymbol->language ();
5325b9bf
TT
6393
6394 /* Ada minimal symbols won't have their language set to Ada. If
6395 we let completion_list_add_name compare using the
6396 default/C-like matcher, then when completing e.g., symbols in a
6397 package named "pck", we'd match internal Ada symbols like
6398 "pckS", which are invalid in an Ada expression, unless you wrap
6399 them in '<' '>' to request a verbatim match.
6400
6401 Unfortunately, some Ada encoded names successfully demangle as
6402 C++ symbols (using an old mangling scheme), such as "name__2Xn"
6403 -> "Xn::name(void)" and thus some Ada minimal symbols end up
6404 with the wrong language set. Paper over that issue here. */
6405 if (symbol_language == language_auto
6406 || symbol_language == language_cplus)
6407 symbol_language = language_ada;
6408
6409 completion_list_add_name (tracker,
6410 symbol_language,
c9d95fa3 6411 msymbol->linkage_name (),
5325b9bf
TT
6412 lookup_name, text, word);
6413 }
6414 }
41d27058
JB
6415
6416 /* Search upwards from currently selected frame (so that we can
6417 complete on local vars. */
6418
6419 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6420 {
6421 if (!BLOCK_SUPERBLOCK (b))
6422 surrounding_static_block = b; /* For elmin of dups */
6423
6424 ALL_BLOCK_SYMBOLS (b, iter, sym)
6425 {
f9d67a22
PA
6426 if (completion_skip_symbol (mode, sym))
6427 continue;
6428
b5ec771e 6429 completion_list_add_name (tracker,
c1b5c1eb 6430 sym->language (),
987012b8 6431 sym->linkage_name (),
1b026119 6432 lookup_name, text, word);
41d27058
JB
6433 }
6434 }
6435
6436 /* Go through the symtabs and check the externs and statics for
43f3e411 6437 symbols which match. */
41d27058 6438
2030c079 6439 for (objfile *objfile : current_program_space->objfiles ())
41d27058 6440 {
b669c953 6441 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6442 {
6443 QUIT;
6444 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
6445 ALL_BLOCK_SYMBOLS (b, iter, sym)
6446 {
6447 if (completion_skip_symbol (mode, sym))
6448 continue;
f9d67a22 6449
d8aeb77f 6450 completion_list_add_name (tracker,
c1b5c1eb 6451 sym->language (),
987012b8 6452 sym->linkage_name (),
d8aeb77f
TT
6453 lookup_name, text, word);
6454 }
6455 }
41d27058 6456 }
41d27058 6457
2030c079 6458 for (objfile *objfile : current_program_space->objfiles ())
d8aeb77f 6459 {
b669c953 6460 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6461 {
6462 QUIT;
6463 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
6464 /* Don't do this block twice. */
6465 if (b == surrounding_static_block)
6466 continue;
6467 ALL_BLOCK_SYMBOLS (b, iter, sym)
6468 {
6469 if (completion_skip_symbol (mode, sym))
6470 continue;
f9d67a22 6471
d8aeb77f 6472 completion_list_add_name (tracker,
c1b5c1eb 6473 sym->language (),
987012b8 6474 sym->linkage_name (),
d8aeb77f
TT
6475 lookup_name, text, word);
6476 }
6477 }
41d27058 6478 }
41d27058
JB
6479}
6480
963a6417 6481 /* Field Access */
96d887e8 6482
73fb9985
JB
6483/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6484 for tagged types. */
6485
6486static int
6487ada_is_dispatch_table_ptr_type (struct type *type)
6488{
0d5cff50 6489 const char *name;
73fb9985 6490
78134374 6491 if (type->code () != TYPE_CODE_PTR)
73fb9985
JB
6492 return 0;
6493
7d93a1e0 6494 name = TYPE_TARGET_TYPE (type)->name ();
73fb9985
JB
6495 if (name == NULL)
6496 return 0;
6497
6498 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6499}
6500
ac4a2da4
JG
6501/* Return non-zero if TYPE is an interface tag. */
6502
6503static int
6504ada_is_interface_tag (struct type *type)
6505{
7d93a1e0 6506 const char *name = type->name ();
ac4a2da4
JG
6507
6508 if (name == NULL)
6509 return 0;
6510
6511 return (strcmp (name, "ada__tags__interface_tag") == 0);
6512}
6513
963a6417
PH
6514/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6515 to be invisible to users. */
96d887e8 6516
963a6417
PH
6517int
6518ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6519{
1f704f76 6520 if (field_num < 0 || field_num > type->num_fields ())
963a6417 6521 return 1;
ffde82bf 6522
73fb9985
JB
6523 /* Check the name of that field. */
6524 {
6525 const char *name = TYPE_FIELD_NAME (type, field_num);
6526
6527 /* Anonymous field names should not be printed.
6528 brobecker/2007-02-20: I don't think this can actually happen
30baf67b 6529 but we don't want to print the value of anonymous fields anyway. */
73fb9985
JB
6530 if (name == NULL)
6531 return 1;
6532
ffde82bf
JB
6533 /* Normally, fields whose name start with an underscore ("_")
6534 are fields that have been internally generated by the compiler,
6535 and thus should not be printed. The "_parent" field is special,
6536 however: This is a field internally generated by the compiler
6537 for tagged types, and it contains the components inherited from
6538 the parent type. This field should not be printed as is, but
6539 should not be ignored either. */
61012eef 6540 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6541 return 1;
6542 }
6543
ac4a2da4
JG
6544 /* If this is the dispatch table of a tagged type or an interface tag,
6545 then ignore. */
73fb9985 6546 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6547 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6548 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6549 return 1;
6550
6551 /* Not a special field, so it should not be ignored. */
6552 return 0;
963a6417 6553}
96d887e8 6554
963a6417 6555/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6556 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6557
963a6417
PH
6558int
6559ada_is_tagged_type (struct type *type, int refok)
6560{
988f6b3d 6561 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6562}
96d887e8 6563
963a6417 6564/* True iff TYPE represents the type of X'Tag */
96d887e8 6565
963a6417
PH
6566int
6567ada_is_tag_type (struct type *type)
6568{
460efde1
JB
6569 type = ada_check_typedef (type);
6570
78134374 6571 if (type == NULL || type->code () != TYPE_CODE_PTR)
963a6417
PH
6572 return 0;
6573 else
96d887e8 6574 {
963a6417 6575 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6576
963a6417
PH
6577 return (name != NULL
6578 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6579 }
96d887e8
PH
6580}
6581
963a6417 6582/* The type of the tag on VAL. */
76a01679 6583
de93309a 6584static struct type *
963a6417 6585ada_tag_type (struct value *val)
96d887e8 6586{
988f6b3d 6587 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6588}
96d887e8 6589
b50d69b5
JG
6590/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6591 retired at Ada 05). */
6592
6593static int
6594is_ada95_tag (struct value *tag)
6595{
6596 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6597}
6598
963a6417 6599/* The value of the tag on VAL. */
96d887e8 6600
de93309a 6601static struct value *
963a6417
PH
6602ada_value_tag (struct value *val)
6603{
03ee6b2e 6604 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6605}
6606
963a6417
PH
6607/* The value of the tag on the object of type TYPE whose contents are
6608 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6609 ADDRESS. */
96d887e8 6610
963a6417 6611static struct value *
10a2c479 6612value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6613 const gdb_byte *valaddr,
963a6417 6614 CORE_ADDR address)
96d887e8 6615{
b5385fc0 6616 int tag_byte_offset;
963a6417 6617 struct type *tag_type;
5b4ee69b 6618
963a6417 6619 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6620 NULL, NULL, NULL))
96d887e8 6621 {
fc1a4b47 6622 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6623 ? NULL
6624 : valaddr + tag_byte_offset);
963a6417 6625 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6626
963a6417 6627 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6628 }
963a6417
PH
6629 return NULL;
6630}
96d887e8 6631
963a6417
PH
6632static struct type *
6633type_from_tag (struct value *tag)
6634{
6635 const char *type_name = ada_tag_name (tag);
5b4ee69b 6636
963a6417
PH
6637 if (type_name != NULL)
6638 return ada_find_any_type (ada_encode (type_name));
6639 return NULL;
6640}
96d887e8 6641
b50d69b5
JG
6642/* Given a value OBJ of a tagged type, return a value of this
6643 type at the base address of the object. The base address, as
6644 defined in Ada.Tags, it is the address of the primary tag of
6645 the object, and therefore where the field values of its full
6646 view can be fetched. */
6647
6648struct value *
6649ada_tag_value_at_base_address (struct value *obj)
6650{
b50d69b5
JG
6651 struct value *val;
6652 LONGEST offset_to_top = 0;
6653 struct type *ptr_type, *obj_type;
6654 struct value *tag;
6655 CORE_ADDR base_address;
6656
6657 obj_type = value_type (obj);
6658
6659 /* It is the responsability of the caller to deref pointers. */
6660
78134374 6661 if (obj_type->code () == TYPE_CODE_PTR || obj_type->code () == TYPE_CODE_REF)
b50d69b5
JG
6662 return obj;
6663
6664 tag = ada_value_tag (obj);
6665 if (!tag)
6666 return obj;
6667
6668 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6669
6670 if (is_ada95_tag (tag))
6671 return obj;
6672
08f49010
XR
6673 ptr_type = language_lookup_primitive_type
6674 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6675 ptr_type = lookup_pointer_type (ptr_type);
6676 val = value_cast (ptr_type, tag);
6677 if (!val)
6678 return obj;
6679
6680 /* It is perfectly possible that an exception be raised while
6681 trying to determine the base address, just like for the tag;
6682 see ada_tag_name for more details. We do not print the error
6683 message for the same reason. */
6684
a70b8144 6685 try
b50d69b5
JG
6686 {
6687 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6688 }
6689
230d2906 6690 catch (const gdb_exception_error &e)
492d29ea
PA
6691 {
6692 return obj;
6693 }
b50d69b5
JG
6694
6695 /* If offset is null, nothing to do. */
6696
6697 if (offset_to_top == 0)
6698 return obj;
6699
6700 /* -1 is a special case in Ada.Tags; however, what should be done
6701 is not quite clear from the documentation. So do nothing for
6702 now. */
6703
6704 if (offset_to_top == -1)
6705 return obj;
6706
08f49010
XR
6707 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6708 from the base address. This was however incompatible with
6709 C++ dispatch table: C++ uses a *negative* value to *add*
6710 to the base address. Ada's convention has therefore been
6711 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6712 use the same convention. Here, we support both cases by
6713 checking the sign of OFFSET_TO_TOP. */
6714
6715 if (offset_to_top > 0)
6716 offset_to_top = -offset_to_top;
6717
6718 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6719 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6720
6721 /* Make sure that we have a proper tag at the new address.
6722 Otherwise, offset_to_top is bogus (which can happen when
6723 the object is not initialized yet). */
6724
6725 if (!tag)
6726 return obj;
6727
6728 obj_type = type_from_tag (tag);
6729
6730 if (!obj_type)
6731 return obj;
6732
6733 return value_from_contents_and_address (obj_type, NULL, base_address);
6734}
6735
1b611343
JB
6736/* Return the "ada__tags__type_specific_data" type. */
6737
6738static struct type *
6739ada_get_tsd_type (struct inferior *inf)
963a6417 6740{
1b611343 6741 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6742
1b611343
JB
6743 if (data->tsd_type == 0)
6744 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6745 return data->tsd_type;
6746}
529cad9c 6747
1b611343
JB
6748/* Return the TSD (type-specific data) associated to the given TAG.
6749 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6750
1b611343 6751 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6752
1b611343
JB
6753static struct value *
6754ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6755{
4c4b4cd2 6756 struct value *val;
1b611343 6757 struct type *type;
5b4ee69b 6758
1b611343
JB
6759 /* First option: The TSD is simply stored as a field of our TAG.
6760 Only older versions of GNAT would use this format, but we have
6761 to test it first, because there are no visible markers for
6762 the current approach except the absence of that field. */
529cad9c 6763
1b611343
JB
6764 val = ada_value_struct_elt (tag, "tsd", 1);
6765 if (val)
6766 return val;
e802dbe0 6767
1b611343
JB
6768 /* Try the second representation for the dispatch table (in which
6769 there is no explicit 'tsd' field in the referent of the tag pointer,
6770 and instead the tsd pointer is stored just before the dispatch
6771 table. */
e802dbe0 6772
1b611343
JB
6773 type = ada_get_tsd_type (current_inferior());
6774 if (type == NULL)
6775 return NULL;
6776 type = lookup_pointer_type (lookup_pointer_type (type));
6777 val = value_cast (type, tag);
6778 if (val == NULL)
6779 return NULL;
6780 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6781}
6782
1b611343
JB
6783/* Given the TSD of a tag (type-specific data), return a string
6784 containing the name of the associated type.
6785
6786 The returned value is good until the next call. May return NULL
6787 if we are unable to determine the tag name. */
6788
6789static char *
6790ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6791{
529cad9c
PH
6792 static char name[1024];
6793 char *p;
1b611343 6794 struct value *val;
529cad9c 6795
1b611343 6796 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6797 if (val == NULL)
1b611343 6798 return NULL;
4c4b4cd2
PH
6799 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6800 for (p = name; *p != '\0'; p += 1)
6801 if (isalpha (*p))
6802 *p = tolower (*p);
1b611343 6803 return name;
4c4b4cd2
PH
6804}
6805
6806/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6807 a C string.
6808
6809 Return NULL if the TAG is not an Ada tag, or if we were unable to
6810 determine the name of that tag. The result is good until the next
6811 call. */
4c4b4cd2
PH
6812
6813const char *
6814ada_tag_name (struct value *tag)
6815{
1b611343 6816 char *name = NULL;
5b4ee69b 6817
df407dfe 6818 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6819 return NULL;
1b611343
JB
6820
6821 /* It is perfectly possible that an exception be raised while trying
6822 to determine the TAG's name, even under normal circumstances:
6823 The associated variable may be uninitialized or corrupted, for
6824 instance. We do not let any exception propagate past this point.
6825 instead we return NULL.
6826
6827 We also do not print the error message either (which often is very
6828 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6829 the caller print a more meaningful message if necessary. */
a70b8144 6830 try
1b611343
JB
6831 {
6832 struct value *tsd = ada_get_tsd_from_tag (tag);
6833
6834 if (tsd != NULL)
6835 name = ada_tag_name_from_tsd (tsd);
6836 }
230d2906 6837 catch (const gdb_exception_error &e)
492d29ea
PA
6838 {
6839 }
1b611343
JB
6840
6841 return name;
4c4b4cd2
PH
6842}
6843
6844/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6845
d2e4a39e 6846struct type *
ebf56fd3 6847ada_parent_type (struct type *type)
14f9c5c9
AS
6848{
6849 int i;
6850
61ee279c 6851 type = ada_check_typedef (type);
14f9c5c9 6852
78134374 6853 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
6854 return NULL;
6855
1f704f76 6856 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 6857 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6858 {
6859 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6860
6861 /* If the _parent field is a pointer, then dereference it. */
78134374 6862 if (parent_type->code () == TYPE_CODE_PTR)
0c1f74cf
JB
6863 parent_type = TYPE_TARGET_TYPE (parent_type);
6864 /* If there is a parallel XVS type, get the actual base type. */
6865 parent_type = ada_get_base_type (parent_type);
6866
6867 return ada_check_typedef (parent_type);
6868 }
14f9c5c9
AS
6869
6870 return NULL;
6871}
6872
4c4b4cd2
PH
6873/* True iff field number FIELD_NUM of structure type TYPE contains the
6874 parent-type (inherited) fields of a derived type. Assumes TYPE is
6875 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6876
6877int
ebf56fd3 6878ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6879{
61ee279c 6880 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6881
4c4b4cd2 6882 return (name != NULL
61012eef
GB
6883 && (startswith (name, "PARENT")
6884 || startswith (name, "_parent")));
14f9c5c9
AS
6885}
6886
4c4b4cd2 6887/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6888 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6889 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6890 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6891 structures. */
14f9c5c9
AS
6892
6893int
ebf56fd3 6894ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6895{
d2e4a39e 6896 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6897
dddc0e16
JB
6898 if (name != NULL && strcmp (name, "RETVAL") == 0)
6899 {
6900 /* This happens in functions with "out" or "in out" parameters
6901 which are passed by copy. For such functions, GNAT describes
6902 the function's return type as being a struct where the return
6903 value is in a field called RETVAL, and where the other "out"
6904 or "in out" parameters are fields of that struct. This is not
6905 a wrapper. */
6906 return 0;
6907 }
6908
d2e4a39e 6909 return (name != NULL
61012eef 6910 && (startswith (name, "PARENT")
4c4b4cd2 6911 || strcmp (name, "REP") == 0
61012eef 6912 || startswith (name, "_parent")
4c4b4cd2 6913 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6914}
6915
4c4b4cd2
PH
6916/* True iff field number FIELD_NUM of structure or union type TYPE
6917 is a variant wrapper. Assumes TYPE is a structure type with at least
6918 FIELD_NUM+1 fields. */
14f9c5c9
AS
6919
6920int
ebf56fd3 6921ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6922{
8ecb59f8
TT
6923 /* Only Ada types are eligible. */
6924 if (!ADA_TYPE_P (type))
6925 return 0;
6926
d2e4a39e 6927 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6928
78134374
SM
6929 return (field_type->code () == TYPE_CODE_UNION
6930 || (is_dynamic_field (type, field_num)
6931 && (TYPE_TARGET_TYPE (field_type)->code ()
c3e5cd34 6932 == TYPE_CODE_UNION)));
14f9c5c9
AS
6933}
6934
6935/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6936 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6937 returns the type of the controlling discriminant for the variant.
6938 May return NULL if the type could not be found. */
14f9c5c9 6939
d2e4a39e 6940struct type *
ebf56fd3 6941ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6942{
a121b7c1 6943 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6944
988f6b3d 6945 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6946}
6947
4c4b4cd2 6948/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6949 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6950 represents a 'when others' clause; otherwise 0. */
14f9c5c9 6951
de93309a 6952static int
ebf56fd3 6953ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6954{
d2e4a39e 6955 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6956
14f9c5c9
AS
6957 return (name != NULL && name[0] == 'O');
6958}
6959
6960/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6961 returns the name of the discriminant controlling the variant.
6962 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6963
a121b7c1 6964const char *
ebf56fd3 6965ada_variant_discrim_name (struct type *type0)
14f9c5c9 6966{
d2e4a39e 6967 static char *result = NULL;
14f9c5c9 6968 static size_t result_len = 0;
d2e4a39e
AS
6969 struct type *type;
6970 const char *name;
6971 const char *discrim_end;
6972 const char *discrim_start;
14f9c5c9 6973
78134374 6974 if (type0->code () == TYPE_CODE_PTR)
14f9c5c9
AS
6975 type = TYPE_TARGET_TYPE (type0);
6976 else
6977 type = type0;
6978
6979 name = ada_type_name (type);
6980
6981 if (name == NULL || name[0] == '\000')
6982 return "";
6983
6984 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6985 discrim_end -= 1)
6986 {
61012eef 6987 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6988 break;
14f9c5c9
AS
6989 }
6990 if (discrim_end == name)
6991 return "";
6992
d2e4a39e 6993 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6994 discrim_start -= 1)
6995 {
d2e4a39e 6996 if (discrim_start == name + 1)
4c4b4cd2 6997 return "";
76a01679 6998 if ((discrim_start > name + 3
61012eef 6999 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
7000 || discrim_start[-1] == '.')
7001 break;
14f9c5c9
AS
7002 }
7003
7004 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
7005 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 7006 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
7007 return result;
7008}
7009
4c4b4cd2
PH
7010/* Scan STR for a subtype-encoded number, beginning at position K.
7011 Put the position of the character just past the number scanned in
7012 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
7013 Return 1 if there was a valid number at the given position, and 0
7014 otherwise. A "subtype-encoded" number consists of the absolute value
7015 in decimal, followed by the letter 'm' to indicate a negative number.
7016 Assumes 0m does not occur. */
14f9c5c9
AS
7017
7018int
d2e4a39e 7019ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
7020{
7021 ULONGEST RU;
7022
d2e4a39e 7023 if (!isdigit (str[k]))
14f9c5c9
AS
7024 return 0;
7025
4c4b4cd2 7026 /* Do it the hard way so as not to make any assumption about
14f9c5c9 7027 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 7028 LONGEST. */
14f9c5c9
AS
7029 RU = 0;
7030 while (isdigit (str[k]))
7031 {
d2e4a39e 7032 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
7033 k += 1;
7034 }
7035
d2e4a39e 7036 if (str[k] == 'm')
14f9c5c9
AS
7037 {
7038 if (R != NULL)
4c4b4cd2 7039 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
7040 k += 1;
7041 }
7042 else if (R != NULL)
7043 *R = (LONGEST) RU;
7044
4c4b4cd2 7045 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
7046 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
7047 number representable as a LONGEST (although either would probably work
7048 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 7049 above is always equivalent to the negative of RU. */
14f9c5c9
AS
7050
7051 if (new_k != NULL)
7052 *new_k = k;
7053 return 1;
7054}
7055
4c4b4cd2
PH
7056/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
7057 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
7058 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 7059
de93309a 7060static int
ebf56fd3 7061ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 7062{
d2e4a39e 7063 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
7064 int p;
7065
7066 p = 0;
7067 while (1)
7068 {
d2e4a39e 7069 switch (name[p])
4c4b4cd2
PH
7070 {
7071 case '\0':
7072 return 0;
7073 case 'S':
7074 {
7075 LONGEST W;
5b4ee69b 7076
4c4b4cd2
PH
7077 if (!ada_scan_number (name, p + 1, &W, &p))
7078 return 0;
7079 if (val == W)
7080 return 1;
7081 break;
7082 }
7083 case 'R':
7084 {
7085 LONGEST L, U;
5b4ee69b 7086
4c4b4cd2
PH
7087 if (!ada_scan_number (name, p + 1, &L, &p)
7088 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
7089 return 0;
7090 if (val >= L && val <= U)
7091 return 1;
7092 break;
7093 }
7094 case 'O':
7095 return 1;
7096 default:
7097 return 0;
7098 }
7099 }
7100}
7101
0963b4bd 7102/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
7103
7104/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
7105 ARG_TYPE, extract and return the value of one of its (non-static)
7106 fields. FIELDNO says which field. Differs from value_primitive_field
7107 only in that it can handle packed values of arbitrary type. */
14f9c5c9 7108
5eb68a39 7109struct value *
d2e4a39e 7110ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 7111 struct type *arg_type)
14f9c5c9 7112{
14f9c5c9
AS
7113 struct type *type;
7114
61ee279c 7115 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
7116 type = TYPE_FIELD_TYPE (arg_type, fieldno);
7117
4504bbde
TT
7118 /* Handle packed fields. It might be that the field is not packed
7119 relative to its containing structure, but the structure itself is
7120 packed; in this case we must take the bit-field path. */
7121 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
7122 {
7123 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
7124 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 7125
0fd88904 7126 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
7127 offset + bit_pos / 8,
7128 bit_pos % 8, bit_size, type);
14f9c5c9
AS
7129 }
7130 else
7131 return value_primitive_field (arg1, offset, fieldno, arg_type);
7132}
7133
52ce6436
PH
7134/* Find field with name NAME in object of type TYPE. If found,
7135 set the following for each argument that is non-null:
7136 - *FIELD_TYPE_P to the field's type;
7137 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
7138 an object of that type;
7139 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
7140 - *BIT_SIZE_P to its size in bits if the field is packed, and
7141 0 otherwise;
7142 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
7143 fields up to but not including the desired field, or by the total
7144 number of fields if not found. A NULL value of NAME never
7145 matches; the function just counts visible fields in this case.
7146
828d5846
XR
7147 Notice that we need to handle when a tagged record hierarchy
7148 has some components with the same name, like in this scenario:
7149
7150 type Top_T is tagged record
7151 N : Integer := 1;
7152 U : Integer := 974;
7153 A : Integer := 48;
7154 end record;
7155
7156 type Middle_T is new Top.Top_T with record
7157 N : Character := 'a';
7158 C : Integer := 3;
7159 end record;
7160
7161 type Bottom_T is new Middle.Middle_T with record
7162 N : Float := 4.0;
7163 C : Character := '5';
7164 X : Integer := 6;
7165 A : Character := 'J';
7166 end record;
7167
7168 Let's say we now have a variable declared and initialized as follow:
7169
7170 TC : Top_A := new Bottom_T;
7171
7172 And then we use this variable to call this function
7173
7174 procedure Assign (Obj: in out Top_T; TV : Integer);
7175
7176 as follow:
7177
7178 Assign (Top_T (B), 12);
7179
7180 Now, we're in the debugger, and we're inside that procedure
7181 then and we want to print the value of obj.c:
7182
7183 Usually, the tagged record or one of the parent type owns the
7184 component to print and there's no issue but in this particular
7185 case, what does it mean to ask for Obj.C? Since the actual
7186 type for object is type Bottom_T, it could mean two things: type
7187 component C from the Middle_T view, but also component C from
7188 Bottom_T. So in that "undefined" case, when the component is
7189 not found in the non-resolved type (which includes all the
7190 components of the parent type), then resolve it and see if we
7191 get better luck once expanded.
7192
7193 In the case of homonyms in the derived tagged type, we don't
7194 guaranty anything, and pick the one that's easiest for us
7195 to program.
7196
0963b4bd 7197 Returns 1 if found, 0 otherwise. */
52ce6436 7198
4c4b4cd2 7199static int
0d5cff50 7200find_struct_field (const char *name, struct type *type, int offset,
76a01679 7201 struct type **field_type_p,
52ce6436
PH
7202 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
7203 int *index_p)
4c4b4cd2
PH
7204{
7205 int i;
828d5846 7206 int parent_offset = -1;
4c4b4cd2 7207
61ee279c 7208 type = ada_check_typedef (type);
76a01679 7209
52ce6436
PH
7210 if (field_type_p != NULL)
7211 *field_type_p = NULL;
7212 if (byte_offset_p != NULL)
d5d6fca5 7213 *byte_offset_p = 0;
52ce6436
PH
7214 if (bit_offset_p != NULL)
7215 *bit_offset_p = 0;
7216 if (bit_size_p != NULL)
7217 *bit_size_p = 0;
7218
1f704f76 7219 for (i = 0; i < type->num_fields (); i += 1)
4c4b4cd2
PH
7220 {
7221 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7222 int fld_offset = offset + bit_pos / 8;
0d5cff50 7223 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7224
4c4b4cd2
PH
7225 if (t_field_name == NULL)
7226 continue;
7227
828d5846
XR
7228 else if (ada_is_parent_field (type, i))
7229 {
7230 /* This is a field pointing us to the parent type of a tagged
7231 type. As hinted in this function's documentation, we give
7232 preference to fields in the current record first, so what
7233 we do here is just record the index of this field before
7234 we skip it. If it turns out we couldn't find our field
7235 in the current record, then we'll get back to it and search
7236 inside it whether the field might exist in the parent. */
7237
7238 parent_offset = i;
7239 continue;
7240 }
7241
52ce6436 7242 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7243 {
7244 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7245
52ce6436
PH
7246 if (field_type_p != NULL)
7247 *field_type_p = TYPE_FIELD_TYPE (type, i);
7248 if (byte_offset_p != NULL)
7249 *byte_offset_p = fld_offset;
7250 if (bit_offset_p != NULL)
7251 *bit_offset_p = bit_pos % 8;
7252 if (bit_size_p != NULL)
7253 *bit_size_p = bit_size;
76a01679
JB
7254 return 1;
7255 }
4c4b4cd2
PH
7256 else if (ada_is_wrapper_field (type, i))
7257 {
52ce6436
PH
7258 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7259 field_type_p, byte_offset_p, bit_offset_p,
7260 bit_size_p, index_p))
76a01679
JB
7261 return 1;
7262 }
4c4b4cd2
PH
7263 else if (ada_is_variant_part (type, i))
7264 {
52ce6436
PH
7265 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7266 fixed type?? */
4c4b4cd2 7267 int j;
52ce6436
PH
7268 struct type *field_type
7269 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7270
1f704f76 7271 for (j = 0; j < field_type->num_fields (); j += 1)
4c4b4cd2 7272 {
76a01679
JB
7273 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7274 fld_offset
7275 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7276 field_type_p, byte_offset_p,
52ce6436 7277 bit_offset_p, bit_size_p, index_p))
76a01679 7278 return 1;
4c4b4cd2
PH
7279 }
7280 }
52ce6436
PH
7281 else if (index_p != NULL)
7282 *index_p += 1;
4c4b4cd2 7283 }
828d5846
XR
7284
7285 /* Field not found so far. If this is a tagged type which
7286 has a parent, try finding that field in the parent now. */
7287
7288 if (parent_offset != -1)
7289 {
7290 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7291 int fld_offset = offset + bit_pos / 8;
7292
7293 if (find_struct_field (name, TYPE_FIELD_TYPE (type, parent_offset),
7294 fld_offset, field_type_p, byte_offset_p,
7295 bit_offset_p, bit_size_p, index_p))
7296 return 1;
7297 }
7298
4c4b4cd2
PH
7299 return 0;
7300}
7301
0963b4bd 7302/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7303
52ce6436
PH
7304static int
7305num_visible_fields (struct type *type)
7306{
7307 int n;
5b4ee69b 7308
52ce6436
PH
7309 n = 0;
7310 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7311 return n;
7312}
14f9c5c9 7313
4c4b4cd2 7314/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7315 and search in it assuming it has (class) type TYPE.
7316 If found, return value, else return NULL.
7317
828d5846
XR
7318 Searches recursively through wrapper fields (e.g., '_parent').
7319
7320 In the case of homonyms in the tagged types, please refer to the
7321 long explanation in find_struct_field's function documentation. */
14f9c5c9 7322
4c4b4cd2 7323static struct value *
108d56a4 7324ada_search_struct_field (const char *name, struct value *arg, int offset,
4c4b4cd2 7325 struct type *type)
14f9c5c9
AS
7326{
7327 int i;
828d5846 7328 int parent_offset = -1;
14f9c5c9 7329
5b4ee69b 7330 type = ada_check_typedef (type);
1f704f76 7331 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 7332 {
0d5cff50 7333 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7334
7335 if (t_field_name == NULL)
4c4b4cd2 7336 continue;
14f9c5c9 7337
828d5846
XR
7338 else if (ada_is_parent_field (type, i))
7339 {
7340 /* This is a field pointing us to the parent type of a tagged
7341 type. As hinted in this function's documentation, we give
7342 preference to fields in the current record first, so what
7343 we do here is just record the index of this field before
7344 we skip it. If it turns out we couldn't find our field
7345 in the current record, then we'll get back to it and search
7346 inside it whether the field might exist in the parent. */
7347
7348 parent_offset = i;
7349 continue;
7350 }
7351
14f9c5c9 7352 else if (field_name_match (t_field_name, name))
4c4b4cd2 7353 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7354
7355 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7356 {
0963b4bd 7357 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7358 ada_search_struct_field (name, arg,
7359 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7360 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7361
4c4b4cd2
PH
7362 if (v != NULL)
7363 return v;
7364 }
14f9c5c9
AS
7365
7366 else if (ada_is_variant_part (type, i))
4c4b4cd2 7367 {
0963b4bd 7368 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7369 int j;
5b4ee69b
MS
7370 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7371 i));
4c4b4cd2
PH
7372 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7373
1f704f76 7374 for (j = 0; j < field_type->num_fields (); j += 1)
4c4b4cd2 7375 {
0963b4bd
MS
7376 struct value *v = ada_search_struct_field /* Force line
7377 break. */
06d5cf63
JB
7378 (name, arg,
7379 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7380 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7381
4c4b4cd2
PH
7382 if (v != NULL)
7383 return v;
7384 }
7385 }
14f9c5c9 7386 }
828d5846
XR
7387
7388 /* Field not found so far. If this is a tagged type which
7389 has a parent, try finding that field in the parent now. */
7390
7391 if (parent_offset != -1)
7392 {
7393 struct value *v = ada_search_struct_field (
7394 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
7395 TYPE_FIELD_TYPE (type, parent_offset));
7396
7397 if (v != NULL)
7398 return v;
7399 }
7400
14f9c5c9
AS
7401 return NULL;
7402}
d2e4a39e 7403
52ce6436
PH
7404static struct value *ada_index_struct_field_1 (int *, struct value *,
7405 int, struct type *);
7406
7407
7408/* Return field #INDEX in ARG, where the index is that returned by
7409 * find_struct_field through its INDEX_P argument. Adjust the address
7410 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7411 * If found, return value, else return NULL. */
52ce6436
PH
7412
7413static struct value *
7414ada_index_struct_field (int index, struct value *arg, int offset,
7415 struct type *type)
7416{
7417 return ada_index_struct_field_1 (&index, arg, offset, type);
7418}
7419
7420
7421/* Auxiliary function for ada_index_struct_field. Like
7422 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7423 * *INDEX_P. */
52ce6436
PH
7424
7425static struct value *
7426ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7427 struct type *type)
7428{
7429 int i;
7430 type = ada_check_typedef (type);
7431
1f704f76 7432 for (i = 0; i < type->num_fields (); i += 1)
52ce6436
PH
7433 {
7434 if (TYPE_FIELD_NAME (type, i) == NULL)
7435 continue;
7436 else if (ada_is_wrapper_field (type, i))
7437 {
0963b4bd 7438 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7439 ada_index_struct_field_1 (index_p, arg,
7440 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7441 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7442
52ce6436
PH
7443 if (v != NULL)
7444 return v;
7445 }
7446
7447 else if (ada_is_variant_part (type, i))
7448 {
7449 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7450 find_struct_field. */
52ce6436
PH
7451 error (_("Cannot assign this kind of variant record"));
7452 }
7453 else if (*index_p == 0)
7454 return ada_value_primitive_field (arg, offset, i, type);
7455 else
7456 *index_p -= 1;
7457 }
7458 return NULL;
7459}
7460
3b4de39c 7461/* Return a string representation of type TYPE. */
99bbb428 7462
3b4de39c 7463static std::string
99bbb428
PA
7464type_as_string (struct type *type)
7465{
d7e74731 7466 string_file tmp_stream;
99bbb428 7467
d7e74731 7468 type_print (type, "", &tmp_stream, -1);
99bbb428 7469
d7e74731 7470 return std::move (tmp_stream.string ());
99bbb428
PA
7471}
7472
14f9c5c9 7473/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7474 If DISPP is non-null, add its byte displacement from the beginning of a
7475 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7476 work for packed fields).
7477
7478 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7479 followed by "___".
14f9c5c9 7480
0963b4bd 7481 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7482 be a (pointer or reference)+ to a struct or union, and the
7483 ultimate target type will be searched.
14f9c5c9
AS
7484
7485 Looks recursively into variant clauses and parent types.
7486
828d5846
XR
7487 In the case of homonyms in the tagged types, please refer to the
7488 long explanation in find_struct_field's function documentation.
7489
4c4b4cd2
PH
7490 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7491 TYPE is not a type of the right kind. */
14f9c5c9 7492
4c4b4cd2 7493static struct type *
a121b7c1 7494ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
988f6b3d 7495 int noerr)
14f9c5c9
AS
7496{
7497 int i;
828d5846 7498 int parent_offset = -1;
14f9c5c9
AS
7499
7500 if (name == NULL)
7501 goto BadName;
7502
76a01679 7503 if (refok && type != NULL)
4c4b4cd2
PH
7504 while (1)
7505 {
61ee279c 7506 type = ada_check_typedef (type);
78134374 7507 if (type->code () != TYPE_CODE_PTR && type->code () != TYPE_CODE_REF)
76a01679
JB
7508 break;
7509 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7510 }
14f9c5c9 7511
76a01679 7512 if (type == NULL
78134374
SM
7513 || (type->code () != TYPE_CODE_STRUCT
7514 && type->code () != TYPE_CODE_UNION))
14f9c5c9 7515 {
4c4b4cd2 7516 if (noerr)
76a01679 7517 return NULL;
99bbb428 7518
3b4de39c
PA
7519 error (_("Type %s is not a structure or union type"),
7520 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7521 }
7522
7523 type = to_static_fixed_type (type);
7524
1f704f76 7525 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 7526 {
0d5cff50 7527 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7528 struct type *t;
d2e4a39e 7529
14f9c5c9 7530 if (t_field_name == NULL)
4c4b4cd2 7531 continue;
14f9c5c9 7532
828d5846
XR
7533 else if (ada_is_parent_field (type, i))
7534 {
7535 /* This is a field pointing us to the parent type of a tagged
7536 type. As hinted in this function's documentation, we give
7537 preference to fields in the current record first, so what
7538 we do here is just record the index of this field before
7539 we skip it. If it turns out we couldn't find our field
7540 in the current record, then we'll get back to it and search
7541 inside it whether the field might exist in the parent. */
7542
7543 parent_offset = i;
7544 continue;
7545 }
7546
14f9c5c9 7547 else if (field_name_match (t_field_name, name))
988f6b3d 7548 return TYPE_FIELD_TYPE (type, i);
14f9c5c9
AS
7549
7550 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7551 {
4c4b4cd2 7552 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
988f6b3d 7553 0, 1);
4c4b4cd2 7554 if (t != NULL)
988f6b3d 7555 return t;
4c4b4cd2 7556 }
14f9c5c9
AS
7557
7558 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7559 {
7560 int j;
5b4ee69b
MS
7561 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7562 i));
4c4b4cd2 7563
1f704f76 7564 for (j = field_type->num_fields () - 1; j >= 0; j -= 1)
4c4b4cd2 7565 {
b1f33ddd
JB
7566 /* FIXME pnh 2008/01/26: We check for a field that is
7567 NOT wrapped in a struct, since the compiler sometimes
7568 generates these for unchecked variant types. Revisit
0963b4bd 7569 if the compiler changes this practice. */
0d5cff50 7570 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7571
b1f33ddd
JB
7572 if (v_field_name != NULL
7573 && field_name_match (v_field_name, name))
460efde1 7574 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7575 else
0963b4bd
MS
7576 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7577 j),
988f6b3d 7578 name, 0, 1);
b1f33ddd 7579
4c4b4cd2 7580 if (t != NULL)
988f6b3d 7581 return t;
4c4b4cd2
PH
7582 }
7583 }
14f9c5c9
AS
7584
7585 }
7586
828d5846
XR
7587 /* Field not found so far. If this is a tagged type which
7588 has a parent, try finding that field in the parent now. */
7589
7590 if (parent_offset != -1)
7591 {
7592 struct type *t;
7593
7594 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, parent_offset),
7595 name, 0, 1);
7596 if (t != NULL)
7597 return t;
7598 }
7599
14f9c5c9 7600BadName:
d2e4a39e 7601 if (!noerr)
14f9c5c9 7602 {
2b2798cc 7603 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7604
7605 error (_("Type %s has no component named %s"),
3b4de39c 7606 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7607 }
7608
7609 return NULL;
7610}
7611
b1f33ddd
JB
7612/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7613 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7614 represents an unchecked union (that is, the variant part of a
0963b4bd 7615 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7616
7617static int
7618is_unchecked_variant (struct type *var_type, struct type *outer_type)
7619{
a121b7c1 7620 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7621
988f6b3d 7622 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7623}
7624
7625
14f9c5c9 7626/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
d8af9068 7627 within OUTER, determine which variant clause (field number in VAR_TYPE,
4c4b4cd2 7628 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7629
d2e4a39e 7630int
d8af9068 7631ada_which_variant_applies (struct type *var_type, struct value *outer)
14f9c5c9
AS
7632{
7633 int others_clause;
7634 int i;
a121b7c1 7635 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816 7636 struct value *discrim;
14f9c5c9
AS
7637 LONGEST discrim_val;
7638
012370f6
TT
7639 /* Using plain value_from_contents_and_address here causes problems
7640 because we will end up trying to resolve a type that is currently
7641 being constructed. */
0c281816
JB
7642 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7643 if (discrim == NULL)
14f9c5c9 7644 return -1;
0c281816 7645 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7646
7647 others_clause = -1;
1f704f76 7648 for (i = 0; i < var_type->num_fields (); i += 1)
14f9c5c9
AS
7649 {
7650 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7651 others_clause = i;
14f9c5c9 7652 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7653 return i;
14f9c5c9
AS
7654 }
7655
7656 return others_clause;
7657}
d2e4a39e 7658\f
14f9c5c9
AS
7659
7660
4c4b4cd2 7661 /* Dynamic-Sized Records */
14f9c5c9
AS
7662
7663/* Strategy: The type ostensibly attached to a value with dynamic size
7664 (i.e., a size that is not statically recorded in the debugging
7665 data) does not accurately reflect the size or layout of the value.
7666 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7667 conventional types that are constructed on the fly. */
14f9c5c9
AS
7668
7669/* There is a subtle and tricky problem here. In general, we cannot
7670 determine the size of dynamic records without its data. However,
7671 the 'struct value' data structure, which GDB uses to represent
7672 quantities in the inferior process (the target), requires the size
7673 of the type at the time of its allocation in order to reserve space
7674 for GDB's internal copy of the data. That's why the
7675 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7676 rather than struct value*s.
14f9c5c9
AS
7677
7678 However, GDB's internal history variables ($1, $2, etc.) are
7679 struct value*s containing internal copies of the data that are not, in
7680 general, the same as the data at their corresponding addresses in
7681 the target. Fortunately, the types we give to these values are all
7682 conventional, fixed-size types (as per the strategy described
7683 above), so that we don't usually have to perform the
7684 'to_fixed_xxx_type' conversions to look at their values.
7685 Unfortunately, there is one exception: if one of the internal
7686 history variables is an array whose elements are unconstrained
7687 records, then we will need to create distinct fixed types for each
7688 element selected. */
7689
7690/* The upshot of all of this is that many routines take a (type, host
7691 address, target address) triple as arguments to represent a value.
7692 The host address, if non-null, is supposed to contain an internal
7693 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7694 target at the target address. */
14f9c5c9
AS
7695
7696/* Assuming that VAL0 represents a pointer value, the result of
7697 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7698 dynamic-sized types. */
14f9c5c9 7699
d2e4a39e
AS
7700struct value *
7701ada_value_ind (struct value *val0)
14f9c5c9 7702{
c48db5ca 7703 struct value *val = value_ind (val0);
5b4ee69b 7704
b50d69b5
JG
7705 if (ada_is_tagged_type (value_type (val), 0))
7706 val = ada_tag_value_at_base_address (val);
7707
4c4b4cd2 7708 return ada_to_fixed_value (val);
14f9c5c9
AS
7709}
7710
7711/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7712 qualifiers on VAL0. */
7713
d2e4a39e
AS
7714static struct value *
7715ada_coerce_ref (struct value *val0)
7716{
78134374 7717 if (value_type (val0)->code () == TYPE_CODE_REF)
d2e4a39e
AS
7718 {
7719 struct value *val = val0;
5b4ee69b 7720
994b9211 7721 val = coerce_ref (val);
b50d69b5
JG
7722
7723 if (ada_is_tagged_type (value_type (val), 0))
7724 val = ada_tag_value_at_base_address (val);
7725
4c4b4cd2 7726 return ada_to_fixed_value (val);
d2e4a39e
AS
7727 }
7728 else
14f9c5c9
AS
7729 return val0;
7730}
7731
4c4b4cd2 7732/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7733
7734static unsigned int
ebf56fd3 7735field_alignment (struct type *type, int f)
14f9c5c9 7736{
d2e4a39e 7737 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7738 int len;
14f9c5c9
AS
7739 int align_offset;
7740
64a1bf19
JB
7741 /* The field name should never be null, unless the debugging information
7742 is somehow malformed. In this case, we assume the field does not
7743 require any alignment. */
7744 if (name == NULL)
7745 return 1;
7746
7747 len = strlen (name);
7748
4c4b4cd2
PH
7749 if (!isdigit (name[len - 1]))
7750 return 1;
14f9c5c9 7751
d2e4a39e 7752 if (isdigit (name[len - 2]))
14f9c5c9
AS
7753 align_offset = len - 2;
7754 else
7755 align_offset = len - 1;
7756
61012eef 7757 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7758 return TARGET_CHAR_BIT;
7759
4c4b4cd2
PH
7760 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7761}
7762
852dff6c 7763/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7764
852dff6c
JB
7765static struct symbol *
7766ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7767{
7768 struct symbol *sym;
7769
7770 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7771 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7772 return sym;
7773
4186eb54
KS
7774 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7775 return sym;
14f9c5c9
AS
7776}
7777
dddfab26
UW
7778/* Find a type named NAME. Ignores ambiguity. This routine will look
7779 solely for types defined by debug info, it will not search the GDB
7780 primitive types. */
4c4b4cd2 7781
852dff6c 7782static struct type *
ebf56fd3 7783ada_find_any_type (const char *name)
14f9c5c9 7784{
852dff6c 7785 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7786
14f9c5c9 7787 if (sym != NULL)
dddfab26 7788 return SYMBOL_TYPE (sym);
14f9c5c9 7789
dddfab26 7790 return NULL;
14f9c5c9
AS
7791}
7792
739593e0
JB
7793/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7794 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7795 symbol, in which case it is returned. Otherwise, this looks for
7796 symbols whose name is that of NAME_SYM suffixed with "___XR".
7797 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7798
c0e70c62
TT
7799static bool
7800ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7801{
987012b8 7802 const char *name = name_sym->linkage_name ();
c0e70c62 7803 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7804}
7805
14f9c5c9 7806/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7807 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7808 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7809 otherwise return 0. */
7810
14f9c5c9 7811int
d2e4a39e 7812ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7813{
7814 if (type1 == NULL)
7815 return 1;
7816 else if (type0 == NULL)
7817 return 0;
78134374 7818 else if (type1->code () == TYPE_CODE_VOID)
14f9c5c9 7819 return 1;
78134374 7820 else if (type0->code () == TYPE_CODE_VOID)
14f9c5c9 7821 return 0;
7d93a1e0 7822 else if (type1->name () == NULL && type0->name () != NULL)
4c4b4cd2 7823 return 1;
ad82864c 7824 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7825 return 1;
4c4b4cd2
PH
7826 else if (ada_is_array_descriptor_type (type0)
7827 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7828 return 1;
aeb5907d
JB
7829 else
7830 {
7d93a1e0
SM
7831 const char *type0_name = type0->name ();
7832 const char *type1_name = type1->name ();
aeb5907d
JB
7833
7834 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7835 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7836 return 1;
7837 }
14f9c5c9
AS
7838 return 0;
7839}
7840
e86ca25f
TT
7841/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7842 null. */
4c4b4cd2 7843
0d5cff50 7844const char *
d2e4a39e 7845ada_type_name (struct type *type)
14f9c5c9 7846{
d2e4a39e 7847 if (type == NULL)
14f9c5c9 7848 return NULL;
7d93a1e0 7849 return type->name ();
14f9c5c9
AS
7850}
7851
b4ba55a1
JB
7852/* Search the list of "descriptive" types associated to TYPE for a type
7853 whose name is NAME. */
7854
7855static struct type *
7856find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7857{
931e5bc3 7858 struct type *result, *tmp;
b4ba55a1 7859
c6044dd1
JB
7860 if (ada_ignore_descriptive_types_p)
7861 return NULL;
7862
b4ba55a1
JB
7863 /* If there no descriptive-type info, then there is no parallel type
7864 to be found. */
7865 if (!HAVE_GNAT_AUX_INFO (type))
7866 return NULL;
7867
7868 result = TYPE_DESCRIPTIVE_TYPE (type);
7869 while (result != NULL)
7870 {
0d5cff50 7871 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7872
7873 if (result_name == NULL)
7874 {
7875 warning (_("unexpected null name on descriptive type"));
7876 return NULL;
7877 }
7878
7879 /* If the names match, stop. */
7880 if (strcmp (result_name, name) == 0)
7881 break;
7882
7883 /* Otherwise, look at the next item on the list, if any. */
7884 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7885 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7886 else
7887 tmp = NULL;
7888
7889 /* If not found either, try after having resolved the typedef. */
7890 if (tmp != NULL)
7891 result = tmp;
b4ba55a1 7892 else
931e5bc3 7893 {
f168693b 7894 result = check_typedef (result);
931e5bc3
JG
7895 if (HAVE_GNAT_AUX_INFO (result))
7896 result = TYPE_DESCRIPTIVE_TYPE (result);
7897 else
7898 result = NULL;
7899 }
b4ba55a1
JB
7900 }
7901
7902 /* If we didn't find a match, see whether this is a packed array. With
7903 older compilers, the descriptive type information is either absent or
7904 irrelevant when it comes to packed arrays so the above lookup fails.
7905 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7906 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7907 return ada_find_any_type (name);
7908
7909 return result;
7910}
7911
7912/* Find a parallel type to TYPE with the specified NAME, using the
7913 descriptive type taken from the debugging information, if available,
7914 and otherwise using the (slower) name-based method. */
7915
7916static struct type *
7917ada_find_parallel_type_with_name (struct type *type, const char *name)
7918{
7919 struct type *result = NULL;
7920
7921 if (HAVE_GNAT_AUX_INFO (type))
7922 result = find_parallel_type_by_descriptive_type (type, name);
7923 else
7924 result = ada_find_any_type (name);
7925
7926 return result;
7927}
7928
7929/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7930 SUFFIX to the name of TYPE. */
14f9c5c9 7931
d2e4a39e 7932struct type *
ebf56fd3 7933ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7934{
0d5cff50 7935 char *name;
fe978cb0 7936 const char *type_name = ada_type_name (type);
14f9c5c9 7937 int len;
d2e4a39e 7938
fe978cb0 7939 if (type_name == NULL)
14f9c5c9
AS
7940 return NULL;
7941
fe978cb0 7942 len = strlen (type_name);
14f9c5c9 7943
b4ba55a1 7944 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7945
fe978cb0 7946 strcpy (name, type_name);
14f9c5c9
AS
7947 strcpy (name + len, suffix);
7948
b4ba55a1 7949 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7950}
7951
14f9c5c9 7952/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7953 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7954
d2e4a39e
AS
7955static struct type *
7956dynamic_template_type (struct type *type)
14f9c5c9 7957{
61ee279c 7958 type = ada_check_typedef (type);
14f9c5c9 7959
78134374 7960 if (type == NULL || type->code () != TYPE_CODE_STRUCT
d2e4a39e 7961 || ada_type_name (type) == NULL)
14f9c5c9 7962 return NULL;
d2e4a39e 7963 else
14f9c5c9
AS
7964 {
7965 int len = strlen (ada_type_name (type));
5b4ee69b 7966
4c4b4cd2
PH
7967 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7968 return type;
14f9c5c9 7969 else
4c4b4cd2 7970 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7971 }
7972}
7973
7974/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7975 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7976
d2e4a39e
AS
7977static int
7978is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7979{
7980 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7981
d2e4a39e 7982 return name != NULL
78134374 7983 && TYPE_FIELD_TYPE (templ_type, field_num)->code () == TYPE_CODE_PTR
14f9c5c9
AS
7984 && strstr (name, "___XVL") != NULL;
7985}
7986
4c4b4cd2
PH
7987/* The index of the variant field of TYPE, or -1 if TYPE does not
7988 represent a variant record type. */
14f9c5c9 7989
d2e4a39e 7990static int
4c4b4cd2 7991variant_field_index (struct type *type)
14f9c5c9
AS
7992{
7993 int f;
7994
78134374 7995 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
4c4b4cd2
PH
7996 return -1;
7997
1f704f76 7998 for (f = 0; f < type->num_fields (); f += 1)
4c4b4cd2
PH
7999 {
8000 if (ada_is_variant_part (type, f))
8001 return f;
8002 }
8003 return -1;
14f9c5c9
AS
8004}
8005
4c4b4cd2
PH
8006/* A record type with no fields. */
8007
d2e4a39e 8008static struct type *
fe978cb0 8009empty_record (struct type *templ)
14f9c5c9 8010{
fe978cb0 8011 struct type *type = alloc_type_copy (templ);
5b4ee69b 8012
67607e24 8013 type->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8014 INIT_NONE_SPECIFIC (type);
d0e39ea2 8015 type->set_name ("<empty>");
14f9c5c9
AS
8016 TYPE_LENGTH (type) = 0;
8017 return type;
8018}
8019
8020/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
8021 the value of type TYPE at VALADDR or ADDRESS (see comments at
8022 the beginning of this section) VAL according to GNAT conventions.
8023 DVAL0 should describe the (portion of a) record that contains any
df407dfe 8024 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
8025 an outer-level type (i.e., as opposed to a branch of a variant.) A
8026 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 8027 of the variant.
14f9c5c9 8028
4c4b4cd2
PH
8029 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
8030 length are not statically known are discarded. As a consequence,
8031 VALADDR, ADDRESS and DVAL0 are ignored.
8032
8033 NOTE: Limitations: For now, we assume that dynamic fields and
8034 variants occupy whole numbers of bytes. However, they need not be
8035 byte-aligned. */
8036
8037struct type *
10a2c479 8038ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 8039 const gdb_byte *valaddr,
4c4b4cd2
PH
8040 CORE_ADDR address, struct value *dval0,
8041 int keep_dynamic_fields)
14f9c5c9 8042{
d2e4a39e
AS
8043 struct value *mark = value_mark ();
8044 struct value *dval;
8045 struct type *rtype;
14f9c5c9 8046 int nfields, bit_len;
4c4b4cd2 8047 int variant_field;
14f9c5c9 8048 long off;
d94e4f4f 8049 int fld_bit_len;
14f9c5c9
AS
8050 int f;
8051
4c4b4cd2
PH
8052 /* Compute the number of fields in this record type that are going
8053 to be processed: unless keep_dynamic_fields, this includes only
8054 fields whose position and length are static will be processed. */
8055 if (keep_dynamic_fields)
1f704f76 8056 nfields = type->num_fields ();
4c4b4cd2
PH
8057 else
8058 {
8059 nfields = 0;
1f704f76 8060 while (nfields < type->num_fields ()
4c4b4cd2
PH
8061 && !ada_is_variant_part (type, nfields)
8062 && !is_dynamic_field (type, nfields))
8063 nfields++;
8064 }
8065
e9bb382b 8066 rtype = alloc_type_copy (type);
67607e24 8067 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8068 INIT_NONE_SPECIFIC (rtype);
5e33d5f4 8069 rtype->set_num_fields (nfields);
3cabb6b0
SM
8070 rtype->set_fields
8071 ((struct field *) TYPE_ZALLOC (rtype, nfields * sizeof (struct field)));
d0e39ea2 8072 rtype->set_name (ada_type_name (type));
876cecd0 8073 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 8074
d2e4a39e
AS
8075 off = 0;
8076 bit_len = 0;
4c4b4cd2
PH
8077 variant_field = -1;
8078
14f9c5c9
AS
8079 for (f = 0; f < nfields; f += 1)
8080 {
a89febbd 8081 off = align_up (off, field_alignment (type, f))
6c038f32 8082 + TYPE_FIELD_BITPOS (type, f);
ceacbf6e 8083 SET_FIELD_BITPOS (rtype->field (f), off);
d2e4a39e 8084 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 8085
d2e4a39e 8086 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
8087 {
8088 variant_field = f;
d94e4f4f 8089 fld_bit_len = 0;
4c4b4cd2 8090 }
14f9c5c9 8091 else if (is_dynamic_field (type, f))
4c4b4cd2 8092 {
284614f0
JB
8093 const gdb_byte *field_valaddr = valaddr;
8094 CORE_ADDR field_address = address;
8095 struct type *field_type =
8096 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
8097
4c4b4cd2 8098 if (dval0 == NULL)
b5304971
JG
8099 {
8100 /* rtype's length is computed based on the run-time
8101 value of discriminants. If the discriminants are not
8102 initialized, the type size may be completely bogus and
0963b4bd 8103 GDB may fail to allocate a value for it. So check the
b5304971 8104 size first before creating the value. */
c1b5a1a6 8105 ada_ensure_varsize_limit (rtype);
012370f6
TT
8106 /* Using plain value_from_contents_and_address here
8107 causes problems because we will end up trying to
8108 resolve a type that is currently being
8109 constructed. */
8110 dval = value_from_contents_and_address_unresolved (rtype,
8111 valaddr,
8112 address);
9f1f738a 8113 rtype = value_type (dval);
b5304971 8114 }
4c4b4cd2
PH
8115 else
8116 dval = dval0;
8117
284614f0
JB
8118 /* If the type referenced by this field is an aligner type, we need
8119 to unwrap that aligner type, because its size might not be set.
8120 Keeping the aligner type would cause us to compute the wrong
8121 size for this field, impacting the offset of the all the fields
8122 that follow this one. */
8123 if (ada_is_aligner_type (field_type))
8124 {
8125 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8126
8127 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8128 field_address = cond_offset_target (field_address, field_offset);
8129 field_type = ada_aligned_type (field_type);
8130 }
8131
8132 field_valaddr = cond_offset_host (field_valaddr,
8133 off / TARGET_CHAR_BIT);
8134 field_address = cond_offset_target (field_address,
8135 off / TARGET_CHAR_BIT);
8136
8137 /* Get the fixed type of the field. Note that, in this case,
8138 we do not want to get the real type out of the tag: if
8139 the current field is the parent part of a tagged record,
8140 we will get the tag of the object. Clearly wrong: the real
8141 type of the parent is not the real type of the child. We
8142 would end up in an infinite loop. */
8143 field_type = ada_get_base_type (field_type);
8144 field_type = ada_to_fixed_type (field_type, field_valaddr,
8145 field_address, dval, 0);
27f2a97b
JB
8146 /* If the field size is already larger than the maximum
8147 object size, then the record itself will necessarily
8148 be larger than the maximum object size. We need to make
8149 this check now, because the size might be so ridiculously
8150 large (due to an uninitialized variable in the inferior)
8151 that it would cause an overflow when adding it to the
8152 record size. */
c1b5a1a6 8153 ada_ensure_varsize_limit (field_type);
284614f0
JB
8154
8155 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8156 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8157 /* The multiplication can potentially overflow. But because
8158 the field length has been size-checked just above, and
8159 assuming that the maximum size is a reasonable value,
8160 an overflow should not happen in practice. So rather than
8161 adding overflow recovery code to this already complex code,
8162 we just assume that it's not going to happen. */
d94e4f4f 8163 fld_bit_len =
4c4b4cd2
PH
8164 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8165 }
14f9c5c9 8166 else
4c4b4cd2 8167 {
5ded5331
JB
8168 /* Note: If this field's type is a typedef, it is important
8169 to preserve the typedef layer.
8170
8171 Otherwise, we might be transforming a typedef to a fat
8172 pointer (encoding a pointer to an unconstrained array),
8173 into a basic fat pointer (encoding an unconstrained
8174 array). As both types are implemented using the same
8175 structure, the typedef is the only clue which allows us
8176 to distinguish between the two options. Stripping it
8177 would prevent us from printing this field appropriately. */
8178 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8179 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8180 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8181 fld_bit_len =
4c4b4cd2
PH
8182 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8183 else
5ded5331
JB
8184 {
8185 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8186
8187 /* We need to be careful of typedefs when computing
8188 the length of our field. If this is a typedef,
8189 get the length of the target type, not the length
8190 of the typedef. */
78134374 8191 if (field_type->code () == TYPE_CODE_TYPEDEF)
5ded5331
JB
8192 field_type = ada_typedef_target_type (field_type);
8193
8194 fld_bit_len =
8195 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8196 }
4c4b4cd2 8197 }
14f9c5c9 8198 if (off + fld_bit_len > bit_len)
4c4b4cd2 8199 bit_len = off + fld_bit_len;
d94e4f4f 8200 off += fld_bit_len;
4c4b4cd2 8201 TYPE_LENGTH (rtype) =
a89febbd 8202 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8203 }
4c4b4cd2
PH
8204
8205 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8206 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8207 the record. This can happen in the presence of representation
8208 clauses. */
8209 if (variant_field >= 0)
8210 {
8211 struct type *branch_type;
8212
8213 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8214
8215 if (dval0 == NULL)
9f1f738a 8216 {
012370f6
TT
8217 /* Using plain value_from_contents_and_address here causes
8218 problems because we will end up trying to resolve a type
8219 that is currently being constructed. */
8220 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8221 address);
9f1f738a
SA
8222 rtype = value_type (dval);
8223 }
4c4b4cd2
PH
8224 else
8225 dval = dval0;
8226
8227 branch_type =
8228 to_fixed_variant_branch_type
8229 (TYPE_FIELD_TYPE (type, variant_field),
8230 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8231 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8232 if (branch_type == NULL)
8233 {
1f704f76 8234 for (f = variant_field + 1; f < rtype->num_fields (); f += 1)
80fc5e77 8235 rtype->field (f - 1) = rtype->field (f);
5e33d5f4 8236 rtype->set_num_fields (rtype->num_fields () - 1);
4c4b4cd2
PH
8237 }
8238 else
8239 {
8240 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8241 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8242 fld_bit_len =
8243 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8244 TARGET_CHAR_BIT;
8245 if (off + fld_bit_len > bit_len)
8246 bit_len = off + fld_bit_len;
8247 TYPE_LENGTH (rtype) =
a89febbd 8248 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
4c4b4cd2
PH
8249 }
8250 }
8251
714e53ab
PH
8252 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8253 should contain the alignment of that record, which should be a strictly
8254 positive value. If null or negative, then something is wrong, most
8255 probably in the debug info. In that case, we don't round up the size
0963b4bd 8256 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8257 the current RTYPE length might be good enough for our purposes. */
8258 if (TYPE_LENGTH (type) <= 0)
8259 {
7d93a1e0 8260 if (rtype->name ())
cc1defb1 8261 warning (_("Invalid type size for `%s' detected: %s."),
7d93a1e0 8262 rtype->name (), pulongest (TYPE_LENGTH (type)));
323e0a4a 8263 else
cc1defb1
KS
8264 warning (_("Invalid type size for <unnamed> detected: %s."),
8265 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8266 }
8267 else
8268 {
a89febbd
TT
8269 TYPE_LENGTH (rtype) = align_up (TYPE_LENGTH (rtype),
8270 TYPE_LENGTH (type));
714e53ab 8271 }
14f9c5c9
AS
8272
8273 value_free_to_mark (mark);
d2e4a39e 8274 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8275 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8276 return rtype;
8277}
8278
4c4b4cd2
PH
8279/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8280 of 1. */
14f9c5c9 8281
d2e4a39e 8282static struct type *
fc1a4b47 8283template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8284 CORE_ADDR address, struct value *dval0)
8285{
8286 return ada_template_to_fixed_record_type_1 (type, valaddr,
8287 address, dval0, 1);
8288}
8289
8290/* An ordinary record type in which ___XVL-convention fields and
8291 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8292 static approximations, containing all possible fields. Uses
8293 no runtime values. Useless for use in values, but that's OK,
8294 since the results are used only for type determinations. Works on both
8295 structs and unions. Representation note: to save space, we memorize
8296 the result of this function in the TYPE_TARGET_TYPE of the
8297 template type. */
8298
8299static struct type *
8300template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8301{
8302 struct type *type;
8303 int nfields;
8304 int f;
8305
9e195661
PMR
8306 /* No need no do anything if the input type is already fixed. */
8307 if (TYPE_FIXED_INSTANCE (type0))
8308 return type0;
8309
8310 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8311 if (TYPE_TARGET_TYPE (type0) != NULL)
8312 return TYPE_TARGET_TYPE (type0);
8313
9e195661 8314 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8315 type = type0;
1f704f76 8316 nfields = type0->num_fields ();
9e195661
PMR
8317
8318 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8319 recompute all over next time. */
8320 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8321
8322 for (f = 0; f < nfields; f += 1)
8323 {
460efde1 8324 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8325 struct type *new_type;
14f9c5c9 8326
4c4b4cd2 8327 if (is_dynamic_field (type0, f))
460efde1
JB
8328 {
8329 field_type = ada_check_typedef (field_type);
8330 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8331 }
14f9c5c9 8332 else
f192137b 8333 new_type = static_unwrap_type (field_type);
9e195661
PMR
8334
8335 if (new_type != field_type)
8336 {
8337 /* Clone TYPE0 only the first time we get a new field type. */
8338 if (type == type0)
8339 {
8340 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
78134374 8341 type->set_code (type0->code ());
8ecb59f8 8342 INIT_NONE_SPECIFIC (type);
5e33d5f4 8343 type->set_num_fields (nfields);
3cabb6b0
SM
8344
8345 field *fields =
8346 ((struct field *)
8347 TYPE_ALLOC (type, nfields * sizeof (struct field)));
80fc5e77 8348 memcpy (fields, type0->fields (),
9e195661 8349 sizeof (struct field) * nfields);
3cabb6b0
SM
8350 type->set_fields (fields);
8351
d0e39ea2 8352 type->set_name (ada_type_name (type0));
9e195661
PMR
8353 TYPE_FIXED_INSTANCE (type) = 1;
8354 TYPE_LENGTH (type) = 0;
8355 }
8356 TYPE_FIELD_TYPE (type, f) = new_type;
8357 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8358 }
14f9c5c9 8359 }
9e195661 8360
14f9c5c9
AS
8361 return type;
8362}
8363
4c4b4cd2 8364/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8365 whose address in memory is ADDRESS, returns a revision of TYPE,
8366 which should be a non-dynamic-sized record, in which the variant
8367 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8368 for discriminant values in DVAL0, which can be NULL if the record
8369 contains the necessary discriminant values. */
8370
d2e4a39e 8371static struct type *
fc1a4b47 8372to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8373 CORE_ADDR address, struct value *dval0)
14f9c5c9 8374{
d2e4a39e 8375 struct value *mark = value_mark ();
4c4b4cd2 8376 struct value *dval;
d2e4a39e 8377 struct type *rtype;
14f9c5c9 8378 struct type *branch_type;
1f704f76 8379 int nfields = type->num_fields ();
4c4b4cd2 8380 int variant_field = variant_field_index (type);
14f9c5c9 8381
4c4b4cd2 8382 if (variant_field == -1)
14f9c5c9
AS
8383 return type;
8384
4c4b4cd2 8385 if (dval0 == NULL)
9f1f738a
SA
8386 {
8387 dval = value_from_contents_and_address (type, valaddr, address);
8388 type = value_type (dval);
8389 }
4c4b4cd2
PH
8390 else
8391 dval = dval0;
8392
e9bb382b 8393 rtype = alloc_type_copy (type);
67607e24 8394 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8395 INIT_NONE_SPECIFIC (rtype);
5e33d5f4 8396 rtype->set_num_fields (nfields);
3cabb6b0
SM
8397
8398 field *fields =
d2e4a39e 8399 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
80fc5e77 8400 memcpy (fields, type->fields (), sizeof (struct field) * nfields);
3cabb6b0
SM
8401 rtype->set_fields (fields);
8402
d0e39ea2 8403 rtype->set_name (ada_type_name (type));
876cecd0 8404 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8405 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8406
4c4b4cd2
PH
8407 branch_type = to_fixed_variant_branch_type
8408 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8409 cond_offset_host (valaddr,
4c4b4cd2
PH
8410 TYPE_FIELD_BITPOS (type, variant_field)
8411 / TARGET_CHAR_BIT),
d2e4a39e 8412 cond_offset_target (address,
4c4b4cd2
PH
8413 TYPE_FIELD_BITPOS (type, variant_field)
8414 / TARGET_CHAR_BIT), dval);
d2e4a39e 8415 if (branch_type == NULL)
14f9c5c9 8416 {
4c4b4cd2 8417 int f;
5b4ee69b 8418
4c4b4cd2 8419 for (f = variant_field + 1; f < nfields; f += 1)
80fc5e77 8420 rtype->field (f - 1) = rtype->field (f);
5e33d5f4 8421 rtype->set_num_fields (rtype->num_fields () - 1);
14f9c5c9
AS
8422 }
8423 else
8424 {
4c4b4cd2
PH
8425 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8426 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8427 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8428 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8429 }
4c4b4cd2 8430 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8431
4c4b4cd2 8432 value_free_to_mark (mark);
14f9c5c9
AS
8433 return rtype;
8434}
8435
8436/* An ordinary record type (with fixed-length fields) that describes
8437 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8438 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8439 should be in DVAL, a record value; it may be NULL if the object
8440 at ADDR itself contains any necessary discriminant values.
8441 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8442 values from the record are needed. Except in the case that DVAL,
8443 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8444 unchecked) is replaced by a particular branch of the variant.
8445
8446 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8447 is questionable and may be removed. It can arise during the
8448 processing of an unconstrained-array-of-record type where all the
8449 variant branches have exactly the same size. This is because in
8450 such cases, the compiler does not bother to use the XVS convention
8451 when encoding the record. I am currently dubious of this
8452 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8453
d2e4a39e 8454static struct type *
fc1a4b47 8455to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8456 CORE_ADDR address, struct value *dval)
14f9c5c9 8457{
d2e4a39e 8458 struct type *templ_type;
14f9c5c9 8459
876cecd0 8460 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8461 return type0;
8462
d2e4a39e 8463 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8464
8465 if (templ_type != NULL)
8466 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8467 else if (variant_field_index (type0) >= 0)
8468 {
8469 if (dval == NULL && valaddr == NULL && address == 0)
8470 return type0;
8471 return to_record_with_fixed_variant_part (type0, valaddr, address,
8472 dval);
8473 }
14f9c5c9
AS
8474 else
8475 {
876cecd0 8476 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8477 return type0;
8478 }
8479
8480}
8481
8482/* An ordinary record type (with fixed-length fields) that describes
8483 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8484 union type. Any necessary discriminants' values should be in DVAL,
8485 a record value. That is, this routine selects the appropriate
8486 branch of the union at ADDR according to the discriminant value
b1f33ddd 8487 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8488 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8489
d2e4a39e 8490static struct type *
fc1a4b47 8491to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8492 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8493{
8494 int which;
d2e4a39e
AS
8495 struct type *templ_type;
8496 struct type *var_type;
14f9c5c9 8497
78134374 8498 if (var_type0->code () == TYPE_CODE_PTR)
14f9c5c9 8499 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8500 else
14f9c5c9
AS
8501 var_type = var_type0;
8502
8503 templ_type = ada_find_parallel_type (var_type, "___XVU");
8504
8505 if (templ_type != NULL)
8506 var_type = templ_type;
8507
b1f33ddd
JB
8508 if (is_unchecked_variant (var_type, value_type (dval)))
8509 return var_type0;
d8af9068 8510 which = ada_which_variant_applies (var_type, dval);
14f9c5c9
AS
8511
8512 if (which < 0)
e9bb382b 8513 return empty_record (var_type);
14f9c5c9 8514 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8515 return to_fixed_record_type
d2e4a39e
AS
8516 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8517 valaddr, address, dval);
4c4b4cd2 8518 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8519 return
8520 to_fixed_record_type
8521 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8522 else
8523 return TYPE_FIELD_TYPE (var_type, which);
8524}
8525
8908fca5
JB
8526/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8527 ENCODING_TYPE, a type following the GNAT conventions for discrete
8528 type encodings, only carries redundant information. */
8529
8530static int
8531ada_is_redundant_range_encoding (struct type *range_type,
8532 struct type *encoding_type)
8533{
108d56a4 8534 const char *bounds_str;
8908fca5
JB
8535 int n;
8536 LONGEST lo, hi;
8537
78134374 8538 gdb_assert (range_type->code () == TYPE_CODE_RANGE);
8908fca5 8539
78134374
SM
8540 if (get_base_type (range_type)->code ()
8541 != get_base_type (encoding_type)->code ())
005e2509
JB
8542 {
8543 /* The compiler probably used a simple base type to describe
8544 the range type instead of the range's actual base type,
8545 expecting us to get the real base type from the encoding
8546 anyway. In this situation, the encoding cannot be ignored
8547 as redundant. */
8548 return 0;
8549 }
8550
8908fca5
JB
8551 if (is_dynamic_type (range_type))
8552 return 0;
8553
7d93a1e0 8554 if (encoding_type->name () == NULL)
8908fca5
JB
8555 return 0;
8556
7d93a1e0 8557 bounds_str = strstr (encoding_type->name (), "___XDLU_");
8908fca5
JB
8558 if (bounds_str == NULL)
8559 return 0;
8560
8561 n = 8; /* Skip "___XDLU_". */
8562 if (!ada_scan_number (bounds_str, n, &lo, &n))
8563 return 0;
8564 if (TYPE_LOW_BOUND (range_type) != lo)
8565 return 0;
8566
8567 n += 2; /* Skip the "__" separator between the two bounds. */
8568 if (!ada_scan_number (bounds_str, n, &hi, &n))
8569 return 0;
8570 if (TYPE_HIGH_BOUND (range_type) != hi)
8571 return 0;
8572
8573 return 1;
8574}
8575
8576/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8577 a type following the GNAT encoding for describing array type
8578 indices, only carries redundant information. */
8579
8580static int
8581ada_is_redundant_index_type_desc (struct type *array_type,
8582 struct type *desc_type)
8583{
8584 struct type *this_layer = check_typedef (array_type);
8585 int i;
8586
1f704f76 8587 for (i = 0; i < desc_type->num_fields (); i++)
8908fca5
JB
8588 {
8589 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8590 TYPE_FIELD_TYPE (desc_type, i)))
8591 return 0;
8592 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8593 }
8594
8595 return 1;
8596}
8597
14f9c5c9
AS
8598/* Assuming that TYPE0 is an array type describing the type of a value
8599 at ADDR, and that DVAL describes a record containing any
8600 discriminants used in TYPE0, returns a type for the value that
8601 contains no dynamic components (that is, no components whose sizes
8602 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8603 true, gives an error message if the resulting type's size is over
4c4b4cd2 8604 varsize_limit. */
14f9c5c9 8605
d2e4a39e
AS
8606static struct type *
8607to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8608 int ignore_too_big)
14f9c5c9 8609{
d2e4a39e
AS
8610 struct type *index_type_desc;
8611 struct type *result;
ad82864c 8612 int constrained_packed_array_p;
931e5bc3 8613 static const char *xa_suffix = "___XA";
14f9c5c9 8614
b0dd7688 8615 type0 = ada_check_typedef (type0);
284614f0 8616 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8617 return type0;
14f9c5c9 8618
ad82864c
JB
8619 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8620 if (constrained_packed_array_p)
8621 type0 = decode_constrained_packed_array_type (type0);
284614f0 8622
931e5bc3
JG
8623 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8624
8625 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8626 encoding suffixed with 'P' may still be generated. If so,
8627 it should be used to find the XA type. */
8628
8629 if (index_type_desc == NULL)
8630 {
1da0522e 8631 const char *type_name = ada_type_name (type0);
931e5bc3 8632
1da0522e 8633 if (type_name != NULL)
931e5bc3 8634 {
1da0522e 8635 const int len = strlen (type_name);
931e5bc3
JG
8636 char *name = (char *) alloca (len + strlen (xa_suffix));
8637
1da0522e 8638 if (type_name[len - 1] == 'P')
931e5bc3 8639 {
1da0522e 8640 strcpy (name, type_name);
931e5bc3
JG
8641 strcpy (name + len - 1, xa_suffix);
8642 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8643 }
8644 }
8645 }
8646
28c85d6c 8647 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8648 if (index_type_desc != NULL
8649 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8650 {
8651 /* Ignore this ___XA parallel type, as it does not bring any
8652 useful information. This allows us to avoid creating fixed
8653 versions of the array's index types, which would be identical
8654 to the original ones. This, in turn, can also help avoid
8655 the creation of fixed versions of the array itself. */
8656 index_type_desc = NULL;
8657 }
8658
14f9c5c9
AS
8659 if (index_type_desc == NULL)
8660 {
61ee279c 8661 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8662
14f9c5c9 8663 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8664 depend on the contents of the array in properly constructed
8665 debugging data. */
529cad9c
PH
8666 /* Create a fixed version of the array element type.
8667 We're not providing the address of an element here,
e1d5a0d2 8668 and thus the actual object value cannot be inspected to do
529cad9c
PH
8669 the conversion. This should not be a problem, since arrays of
8670 unconstrained objects are not allowed. In particular, all
8671 the elements of an array of a tagged type should all be of
8672 the same type specified in the debugging info. No need to
8673 consult the object tag. */
1ed6ede0 8674 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8675
284614f0
JB
8676 /* Make sure we always create a new array type when dealing with
8677 packed array types, since we're going to fix-up the array
8678 type length and element bitsize a little further down. */
ad82864c 8679 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8680 result = type0;
14f9c5c9 8681 else
e9bb382b 8682 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8683 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8684 }
8685 else
8686 {
8687 int i;
8688 struct type *elt_type0;
8689
8690 elt_type0 = type0;
1f704f76 8691 for (i = index_type_desc->num_fields (); i > 0; i -= 1)
4c4b4cd2 8692 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8693
8694 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8695 depend on the contents of the array in properly constructed
8696 debugging data. */
529cad9c
PH
8697 /* Create a fixed version of the array element type.
8698 We're not providing the address of an element here,
e1d5a0d2 8699 and thus the actual object value cannot be inspected to do
529cad9c
PH
8700 the conversion. This should not be a problem, since arrays of
8701 unconstrained objects are not allowed. In particular, all
8702 the elements of an array of a tagged type should all be of
8703 the same type specified in the debugging info. No need to
8704 consult the object tag. */
1ed6ede0
JB
8705 result =
8706 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8707
8708 elt_type0 = type0;
1f704f76 8709 for (i = index_type_desc->num_fields () - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8710 {
8711 struct type *range_type =
28c85d6c 8712 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8713
e9bb382b 8714 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8715 result, range_type);
1ce677a4 8716 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8717 }
d2e4a39e 8718 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8719 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8720 }
8721
2e6fda7d
JB
8722 /* We want to preserve the type name. This can be useful when
8723 trying to get the type name of a value that has already been
8724 printed (for instance, if the user did "print VAR; whatis $". */
7d93a1e0 8725 result->set_name (type0->name ());
2e6fda7d 8726
ad82864c 8727 if (constrained_packed_array_p)
284614f0
JB
8728 {
8729 /* So far, the resulting type has been created as if the original
8730 type was a regular (non-packed) array type. As a result, the
8731 bitsize of the array elements needs to be set again, and the array
8732 length needs to be recomputed based on that bitsize. */
8733 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8734 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8735
8736 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8737 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8738 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8739 TYPE_LENGTH (result)++;
8740 }
8741
876cecd0 8742 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8743 return result;
d2e4a39e 8744}
14f9c5c9
AS
8745
8746
8747/* A standard type (containing no dynamically sized components)
8748 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8749 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8750 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8751 ADDRESS or in VALADDR contains these discriminants.
8752
1ed6ede0
JB
8753 If CHECK_TAG is not null, in the case of tagged types, this function
8754 attempts to locate the object's tag and use it to compute the actual
8755 type. However, when ADDRESS is null, we cannot use it to determine the
8756 location of the tag, and therefore compute the tagged type's actual type.
8757 So we return the tagged type without consulting the tag. */
529cad9c 8758
f192137b
JB
8759static struct type *
8760ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8761 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8762{
61ee279c 8763 type = ada_check_typedef (type);
8ecb59f8
TT
8764
8765 /* Only un-fixed types need to be handled here. */
8766 if (!HAVE_GNAT_AUX_INFO (type))
8767 return type;
8768
78134374 8769 switch (type->code ())
d2e4a39e
AS
8770 {
8771 default:
14f9c5c9 8772 return type;
d2e4a39e 8773 case TYPE_CODE_STRUCT:
4c4b4cd2 8774 {
76a01679 8775 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8776 struct type *fixed_record_type =
8777 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8778
529cad9c
PH
8779 /* If STATIC_TYPE is a tagged type and we know the object's address,
8780 then we can determine its tag, and compute the object's actual
0963b4bd 8781 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8782 type (the parent part of the record may have dynamic fields
8783 and the way the location of _tag is expressed may depend on
8784 them). */
529cad9c 8785
1ed6ede0 8786 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8787 {
b50d69b5
JG
8788 struct value *tag =
8789 value_tag_from_contents_and_address
8790 (fixed_record_type,
8791 valaddr,
8792 address);
8793 struct type *real_type = type_from_tag (tag);
8794 struct value *obj =
8795 value_from_contents_and_address (fixed_record_type,
8796 valaddr,
8797 address);
9f1f738a 8798 fixed_record_type = value_type (obj);
76a01679 8799 if (real_type != NULL)
b50d69b5
JG
8800 return to_fixed_record_type
8801 (real_type, NULL,
8802 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8803 }
4af88198
JB
8804
8805 /* Check to see if there is a parallel ___XVZ variable.
8806 If there is, then it provides the actual size of our type. */
8807 else if (ada_type_name (fixed_record_type) != NULL)
8808 {
0d5cff50 8809 const char *name = ada_type_name (fixed_record_type);
224c3ddb
SM
8810 char *xvz_name
8811 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8812 bool xvz_found = false;
4af88198
JB
8813 LONGEST size;
8814
88c15c34 8815 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8816 try
eccab96d
JB
8817 {
8818 xvz_found = get_int_var_value (xvz_name, size);
8819 }
230d2906 8820 catch (const gdb_exception_error &except)
eccab96d
JB
8821 {
8822 /* We found the variable, but somehow failed to read
8823 its value. Rethrow the same error, but with a little
8824 bit more information, to help the user understand
8825 what went wrong (Eg: the variable might have been
8826 optimized out). */
8827 throw_error (except.error,
8828 _("unable to read value of %s (%s)"),
3d6e9d23 8829 xvz_name, except.what ());
eccab96d 8830 }
eccab96d
JB
8831
8832 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
4af88198
JB
8833 {
8834 fixed_record_type = copy_type (fixed_record_type);
8835 TYPE_LENGTH (fixed_record_type) = size;
8836
8837 /* The FIXED_RECORD_TYPE may have be a stub. We have
8838 observed this when the debugging info is STABS, and
8839 apparently it is something that is hard to fix.
8840
8841 In practice, we don't need the actual type definition
8842 at all, because the presence of the XVZ variable allows us
8843 to assume that there must be a XVS type as well, which we
8844 should be able to use later, when we need the actual type
8845 definition.
8846
8847 In the meantime, pretend that the "fixed" type we are
8848 returning is NOT a stub, because this can cause trouble
8849 when using this type to create new types targeting it.
8850 Indeed, the associated creation routines often check
8851 whether the target type is a stub and will try to replace
0963b4bd 8852 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8853 might cause the new type to have the wrong size too.
8854 Consider the case of an array, for instance, where the size
8855 of the array is computed from the number of elements in
8856 our array multiplied by the size of its element. */
8857 TYPE_STUB (fixed_record_type) = 0;
8858 }
8859 }
1ed6ede0 8860 return fixed_record_type;
4c4b4cd2 8861 }
d2e4a39e 8862 case TYPE_CODE_ARRAY:
4c4b4cd2 8863 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8864 case TYPE_CODE_UNION:
8865 if (dval == NULL)
4c4b4cd2 8866 return type;
d2e4a39e 8867 else
4c4b4cd2 8868 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8869 }
14f9c5c9
AS
8870}
8871
f192137b
JB
8872/* The same as ada_to_fixed_type_1, except that it preserves the type
8873 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8874
8875 The typedef layer needs be preserved in order to differentiate between
8876 arrays and array pointers when both types are implemented using the same
8877 fat pointer. In the array pointer case, the pointer is encoded as
8878 a typedef of the pointer type. For instance, considering:
8879
8880 type String_Access is access String;
8881 S1 : String_Access := null;
8882
8883 To the debugger, S1 is defined as a typedef of type String. But
8884 to the user, it is a pointer. So if the user tries to print S1,
8885 we should not dereference the array, but print the array address
8886 instead.
8887
8888 If we didn't preserve the typedef layer, we would lose the fact that
8889 the type is to be presented as a pointer (needs de-reference before
8890 being printed). And we would also use the source-level type name. */
f192137b
JB
8891
8892struct type *
8893ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8894 CORE_ADDR address, struct value *dval, int check_tag)
8895
8896{
8897 struct type *fixed_type =
8898 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8899
96dbd2c1
JB
8900 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8901 then preserve the typedef layer.
8902
8903 Implementation note: We can only check the main-type portion of
8904 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8905 from TYPE now returns a type that has the same instance flags
8906 as TYPE. For instance, if TYPE is a "typedef const", and its
8907 target type is a "struct", then the typedef elimination will return
8908 a "const" version of the target type. See check_typedef for more
8909 details about how the typedef layer elimination is done.
8910
8911 brobecker/2010-11-19: It seems to me that the only case where it is
8912 useful to preserve the typedef layer is when dealing with fat pointers.
8913 Perhaps, we could add a check for that and preserve the typedef layer
85102364 8914 only in that situation. But this seems unnecessary so far, probably
96dbd2c1
JB
8915 because we call check_typedef/ada_check_typedef pretty much everywhere.
8916 */
78134374 8917 if (type->code () == TYPE_CODE_TYPEDEF
720d1a40 8918 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8919 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8920 return type;
8921
8922 return fixed_type;
8923}
8924
14f9c5c9 8925/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8926 TYPE0, but based on no runtime data. */
14f9c5c9 8927
d2e4a39e
AS
8928static struct type *
8929to_static_fixed_type (struct type *type0)
14f9c5c9 8930{
d2e4a39e 8931 struct type *type;
14f9c5c9
AS
8932
8933 if (type0 == NULL)
8934 return NULL;
8935
876cecd0 8936 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8937 return type0;
8938
61ee279c 8939 type0 = ada_check_typedef (type0);
d2e4a39e 8940
78134374 8941 switch (type0->code ())
14f9c5c9
AS
8942 {
8943 default:
8944 return type0;
8945 case TYPE_CODE_STRUCT:
8946 type = dynamic_template_type (type0);
d2e4a39e 8947 if (type != NULL)
4c4b4cd2
PH
8948 return template_to_static_fixed_type (type);
8949 else
8950 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8951 case TYPE_CODE_UNION:
8952 type = ada_find_parallel_type (type0, "___XVU");
8953 if (type != NULL)
4c4b4cd2
PH
8954 return template_to_static_fixed_type (type);
8955 else
8956 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8957 }
8958}
8959
4c4b4cd2
PH
8960/* A static approximation of TYPE with all type wrappers removed. */
8961
d2e4a39e
AS
8962static struct type *
8963static_unwrap_type (struct type *type)
14f9c5c9
AS
8964{
8965 if (ada_is_aligner_type (type))
8966 {
61ee279c 8967 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8968 if (ada_type_name (type1) == NULL)
d0e39ea2 8969 type1->set_name (ada_type_name (type));
14f9c5c9
AS
8970
8971 return static_unwrap_type (type1);
8972 }
d2e4a39e 8973 else
14f9c5c9 8974 {
d2e4a39e 8975 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8976
d2e4a39e 8977 if (raw_real_type == type)
4c4b4cd2 8978 return type;
14f9c5c9 8979 else
4c4b4cd2 8980 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8981 }
8982}
8983
8984/* In some cases, incomplete and private types require
4c4b4cd2 8985 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8986 type Foo;
8987 type FooP is access Foo;
8988 V: FooP;
8989 type Foo is array ...;
4c4b4cd2 8990 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8991 cross-references to such types, we instead substitute for FooP a
8992 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8993 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8994
8995/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8996 exists, otherwise TYPE. */
8997
d2e4a39e 8998struct type *
61ee279c 8999ada_check_typedef (struct type *type)
14f9c5c9 9000{
727e3d2e
JB
9001 if (type == NULL)
9002 return NULL;
9003
736ade86
XR
9004 /* If our type is an access to an unconstrained array, which is encoded
9005 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
9006 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
9007 what allows us to distinguish between fat pointers that represent
9008 array types, and fat pointers that represent array access types
9009 (in both cases, the compiler implements them as fat pointers). */
736ade86 9010 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
9011 return type;
9012
f168693b 9013 type = check_typedef (type);
78134374 9014 if (type == NULL || type->code () != TYPE_CODE_ENUM
529cad9c 9015 || !TYPE_STUB (type)
7d93a1e0 9016 || type->name () == NULL)
14f9c5c9 9017 return type;
d2e4a39e 9018 else
14f9c5c9 9019 {
7d93a1e0 9020 const char *name = type->name ();
d2e4a39e 9021 struct type *type1 = ada_find_any_type (name);
5b4ee69b 9022
05e522ef
JB
9023 if (type1 == NULL)
9024 return type;
9025
9026 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
9027 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
9028 types, only for the typedef-to-array types). If that's the case,
9029 strip the typedef layer. */
78134374 9030 if (type1->code () == TYPE_CODE_TYPEDEF)
3a867c22
JB
9031 type1 = ada_check_typedef (type1);
9032
9033 return type1;
14f9c5c9
AS
9034 }
9035}
9036
9037/* A value representing the data at VALADDR/ADDRESS as described by
9038 type TYPE0, but with a standard (static-sized) type that correctly
9039 describes it. If VAL0 is not NULL and TYPE0 already is a standard
9040 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 9041 creation of struct values]. */
14f9c5c9 9042
4c4b4cd2
PH
9043static struct value *
9044ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
9045 struct value *val0)
14f9c5c9 9046{
1ed6ede0 9047 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 9048
14f9c5c9
AS
9049 if (type == type0 && val0 != NULL)
9050 return val0;
cc0e770c
JB
9051
9052 if (VALUE_LVAL (val0) != lval_memory)
9053 {
9054 /* Our value does not live in memory; it could be a convenience
9055 variable, for instance. Create a not_lval value using val0's
9056 contents. */
9057 return value_from_contents (type, value_contents (val0));
9058 }
9059
9060 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
9061}
9062
9063/* A value representing VAL, but with a standard (static-sized) type
9064 that correctly describes it. Does not necessarily create a new
9065 value. */
9066
0c3acc09 9067struct value *
4c4b4cd2
PH
9068ada_to_fixed_value (struct value *val)
9069{
c48db5ca 9070 val = unwrap_value (val);
d8ce9127 9071 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 9072 return val;
14f9c5c9 9073}
d2e4a39e 9074\f
14f9c5c9 9075
14f9c5c9
AS
9076/* Attributes */
9077
4c4b4cd2
PH
9078/* Table mapping attribute numbers to names.
9079 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 9080
d2e4a39e 9081static const char *attribute_names[] = {
14f9c5c9
AS
9082 "<?>",
9083
d2e4a39e 9084 "first",
14f9c5c9
AS
9085 "last",
9086 "length",
9087 "image",
14f9c5c9
AS
9088 "max",
9089 "min",
4c4b4cd2
PH
9090 "modulus",
9091 "pos",
9092 "size",
9093 "tag",
14f9c5c9 9094 "val",
14f9c5c9
AS
9095 0
9096};
9097
de93309a 9098static const char *
4c4b4cd2 9099ada_attribute_name (enum exp_opcode n)
14f9c5c9 9100{
4c4b4cd2
PH
9101 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
9102 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
9103 else
9104 return attribute_names[0];
9105}
9106
4c4b4cd2 9107/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 9108
4c4b4cd2
PH
9109static LONGEST
9110pos_atr (struct value *arg)
14f9c5c9 9111{
24209737
PH
9112 struct value *val = coerce_ref (arg);
9113 struct type *type = value_type (val);
aa715135 9114 LONGEST result;
14f9c5c9 9115
d2e4a39e 9116 if (!discrete_type_p (type))
323e0a4a 9117 error (_("'POS only defined on discrete types"));
14f9c5c9 9118
aa715135
JG
9119 if (!discrete_position (type, value_as_long (val), &result))
9120 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 9121
aa715135 9122 return result;
4c4b4cd2
PH
9123}
9124
9125static struct value *
3cb382c9 9126value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 9127{
3cb382c9 9128 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
9129}
9130
4c4b4cd2 9131/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 9132
d2e4a39e 9133static struct value *
53a47a3e 9134val_atr (struct type *type, LONGEST val)
14f9c5c9 9135{
53a47a3e 9136 gdb_assert (discrete_type_p (type));
0bc2354b
TT
9137 if (type->code () == TYPE_CODE_RANGE)
9138 type = TYPE_TARGET_TYPE (type);
78134374 9139 if (type->code () == TYPE_CODE_ENUM)
14f9c5c9 9140 {
53a47a3e 9141 if (val < 0 || val >= type->num_fields ())
323e0a4a 9142 error (_("argument to 'VAL out of range"));
53a47a3e 9143 val = TYPE_FIELD_ENUMVAL (type, val);
14f9c5c9 9144 }
53a47a3e
TT
9145 return value_from_longest (type, val);
9146}
9147
9148static struct value *
9149value_val_atr (struct type *type, struct value *arg)
9150{
9151 if (!discrete_type_p (type))
9152 error (_("'VAL only defined on discrete types"));
9153 if (!integer_type_p (value_type (arg)))
9154 error (_("'VAL requires integral argument"));
9155
9156 return val_atr (type, value_as_long (arg));
14f9c5c9 9157}
14f9c5c9 9158\f
d2e4a39e 9159
4c4b4cd2 9160 /* Evaluation */
14f9c5c9 9161
4c4b4cd2
PH
9162/* True if TYPE appears to be an Ada character type.
9163 [At the moment, this is true only for Character and Wide_Character;
9164 It is a heuristic test that could stand improvement]. */
14f9c5c9 9165
fc913e53 9166bool
d2e4a39e 9167ada_is_character_type (struct type *type)
14f9c5c9 9168{
7b9f71f2
JB
9169 const char *name;
9170
9171 /* If the type code says it's a character, then assume it really is,
9172 and don't check any further. */
78134374 9173 if (type->code () == TYPE_CODE_CHAR)
fc913e53 9174 return true;
7b9f71f2
JB
9175
9176 /* Otherwise, assume it's a character type iff it is a discrete type
9177 with a known character type name. */
9178 name = ada_type_name (type);
9179 return (name != NULL
78134374
SM
9180 && (type->code () == TYPE_CODE_INT
9181 || type->code () == TYPE_CODE_RANGE)
7b9f71f2
JB
9182 && (strcmp (name, "character") == 0
9183 || strcmp (name, "wide_character") == 0
5a517ebd 9184 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9185 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9186}
9187
4c4b4cd2 9188/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9189
fc913e53 9190bool
ebf56fd3 9191ada_is_string_type (struct type *type)
14f9c5c9 9192{
61ee279c 9193 type = ada_check_typedef (type);
d2e4a39e 9194 if (type != NULL
78134374 9195 && type->code () != TYPE_CODE_PTR
76a01679
JB
9196 && (ada_is_simple_array_type (type)
9197 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9198 && ada_array_arity (type) == 1)
9199 {
9200 struct type *elttype = ada_array_element_type (type, 1);
9201
9202 return ada_is_character_type (elttype);
9203 }
d2e4a39e 9204 else
fc913e53 9205 return false;
14f9c5c9
AS
9206}
9207
5bf03f13
JB
9208/* The compiler sometimes provides a parallel XVS type for a given
9209 PAD type. Normally, it is safe to follow the PAD type directly,
9210 but older versions of the compiler have a bug that causes the offset
9211 of its "F" field to be wrong. Following that field in that case
9212 would lead to incorrect results, but this can be worked around
9213 by ignoring the PAD type and using the associated XVS type instead.
9214
9215 Set to True if the debugger should trust the contents of PAD types.
9216 Otherwise, ignore the PAD type if there is a parallel XVS type. */
491144b5 9217static bool trust_pad_over_xvs = true;
14f9c5c9
AS
9218
9219/* True if TYPE is a struct type introduced by the compiler to force the
9220 alignment of a value. Such types have a single field with a
4c4b4cd2 9221 distinctive name. */
14f9c5c9
AS
9222
9223int
ebf56fd3 9224ada_is_aligner_type (struct type *type)
14f9c5c9 9225{
61ee279c 9226 type = ada_check_typedef (type);
714e53ab 9227
5bf03f13 9228 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9229 return 0;
9230
78134374 9231 return (type->code () == TYPE_CODE_STRUCT
1f704f76 9232 && type->num_fields () == 1
4c4b4cd2 9233 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9234}
9235
9236/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9237 the parallel type. */
14f9c5c9 9238
d2e4a39e
AS
9239struct type *
9240ada_get_base_type (struct type *raw_type)
14f9c5c9 9241{
d2e4a39e
AS
9242 struct type *real_type_namer;
9243 struct type *raw_real_type;
14f9c5c9 9244
78134374 9245 if (raw_type == NULL || raw_type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
9246 return raw_type;
9247
284614f0
JB
9248 if (ada_is_aligner_type (raw_type))
9249 /* The encoding specifies that we should always use the aligner type.
9250 So, even if this aligner type has an associated XVS type, we should
9251 simply ignore it.
9252
9253 According to the compiler gurus, an XVS type parallel to an aligner
9254 type may exist because of a stabs limitation. In stabs, aligner
9255 types are empty because the field has a variable-sized type, and
9256 thus cannot actually be used as an aligner type. As a result,
9257 we need the associated parallel XVS type to decode the type.
9258 Since the policy in the compiler is to not change the internal
9259 representation based on the debugging info format, we sometimes
9260 end up having a redundant XVS type parallel to the aligner type. */
9261 return raw_type;
9262
14f9c5c9 9263 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9264 if (real_type_namer == NULL
78134374 9265 || real_type_namer->code () != TYPE_CODE_STRUCT
1f704f76 9266 || real_type_namer->num_fields () != 1)
14f9c5c9
AS
9267 return raw_type;
9268
78134374 9269 if (TYPE_FIELD_TYPE (real_type_namer, 0)->code () != TYPE_CODE_REF)
f80d3ff2
JB
9270 {
9271 /* This is an older encoding form where the base type needs to be
85102364 9272 looked up by name. We prefer the newer encoding because it is
f80d3ff2
JB
9273 more efficient. */
9274 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9275 if (raw_real_type == NULL)
9276 return raw_type;
9277 else
9278 return raw_real_type;
9279 }
9280
9281 /* The field in our XVS type is a reference to the base type. */
9282 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9283}
14f9c5c9 9284
4c4b4cd2 9285/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9286
d2e4a39e
AS
9287struct type *
9288ada_aligned_type (struct type *type)
14f9c5c9
AS
9289{
9290 if (ada_is_aligner_type (type))
9291 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9292 else
9293 return ada_get_base_type (type);
9294}
9295
9296
9297/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9298 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9299
fc1a4b47
AC
9300const gdb_byte *
9301ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9302{
d2e4a39e 9303 if (ada_is_aligner_type (type))
14f9c5c9 9304 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9305 valaddr +
9306 TYPE_FIELD_BITPOS (type,
9307 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9308 else
9309 return valaddr;
9310}
9311
4c4b4cd2
PH
9312
9313
14f9c5c9 9314/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9315 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9316const char *
9317ada_enum_name (const char *name)
14f9c5c9 9318{
4c4b4cd2
PH
9319 static char *result;
9320 static size_t result_len = 0;
e6a959d6 9321 const char *tmp;
14f9c5c9 9322
4c4b4cd2
PH
9323 /* First, unqualify the enumeration name:
9324 1. Search for the last '.' character. If we find one, then skip
177b42fe 9325 all the preceding characters, the unqualified name starts
76a01679 9326 right after that dot.
4c4b4cd2 9327 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9328 translates dots into "__". Search forward for double underscores,
9329 but stop searching when we hit an overloading suffix, which is
9330 of the form "__" followed by digits. */
4c4b4cd2 9331
c3e5cd34
PH
9332 tmp = strrchr (name, '.');
9333 if (tmp != NULL)
4c4b4cd2
PH
9334 name = tmp + 1;
9335 else
14f9c5c9 9336 {
4c4b4cd2
PH
9337 while ((tmp = strstr (name, "__")) != NULL)
9338 {
9339 if (isdigit (tmp[2]))
9340 break;
9341 else
9342 name = tmp + 2;
9343 }
14f9c5c9
AS
9344 }
9345
9346 if (name[0] == 'Q')
9347 {
14f9c5c9 9348 int v;
5b4ee69b 9349
14f9c5c9 9350 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9351 {
9352 if (sscanf (name + 2, "%x", &v) != 1)
9353 return name;
9354 }
272560b5
TT
9355 else if (((name[1] >= '0' && name[1] <= '9')
9356 || (name[1] >= 'a' && name[1] <= 'z'))
9357 && name[2] == '\0')
9358 {
9359 GROW_VECT (result, result_len, 4);
9360 xsnprintf (result, result_len, "'%c'", name[1]);
9361 return result;
9362 }
14f9c5c9 9363 else
4c4b4cd2 9364 return name;
14f9c5c9 9365
4c4b4cd2 9366 GROW_VECT (result, result_len, 16);
14f9c5c9 9367 if (isascii (v) && isprint (v))
88c15c34 9368 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9369 else if (name[1] == 'U')
88c15c34 9370 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9371 else
88c15c34 9372 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9373
9374 return result;
9375 }
d2e4a39e 9376 else
4c4b4cd2 9377 {
c3e5cd34
PH
9378 tmp = strstr (name, "__");
9379 if (tmp == NULL)
9380 tmp = strstr (name, "$");
9381 if (tmp != NULL)
4c4b4cd2
PH
9382 {
9383 GROW_VECT (result, result_len, tmp - name + 1);
9384 strncpy (result, name, tmp - name);
9385 result[tmp - name] = '\0';
9386 return result;
9387 }
9388
9389 return name;
9390 }
14f9c5c9
AS
9391}
9392
14f9c5c9
AS
9393/* Evaluate the subexpression of EXP starting at *POS as for
9394 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9395 expression. */
14f9c5c9 9396
d2e4a39e
AS
9397static struct value *
9398evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9399{
4b27a620 9400 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9401}
9402
9403/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9404 value it wraps. */
14f9c5c9 9405
d2e4a39e
AS
9406static struct value *
9407unwrap_value (struct value *val)
14f9c5c9 9408{
df407dfe 9409 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9410
14f9c5c9
AS
9411 if (ada_is_aligner_type (type))
9412 {
de4d072f 9413 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9414 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9415
14f9c5c9 9416 if (ada_type_name (val_type) == NULL)
d0e39ea2 9417 val_type->set_name (ada_type_name (type));
14f9c5c9
AS
9418
9419 return unwrap_value (v);
9420 }
d2e4a39e 9421 else
14f9c5c9 9422 {
d2e4a39e 9423 struct type *raw_real_type =
61ee279c 9424 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9425
5bf03f13
JB
9426 /* If there is no parallel XVS or XVE type, then the value is
9427 already unwrapped. Return it without further modification. */
9428 if ((type == raw_real_type)
9429 && ada_find_parallel_type (type, "___XVE") == NULL)
9430 return val;
14f9c5c9 9431
d2e4a39e 9432 return
4c4b4cd2
PH
9433 coerce_unspec_val_to_type
9434 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9435 value_address (val),
1ed6ede0 9436 NULL, 1));
14f9c5c9
AS
9437 }
9438}
d2e4a39e
AS
9439
9440static struct value *
50eff16b 9441cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9442{
50eff16b
UW
9443 struct value *scale = ada_scaling_factor (value_type (arg));
9444 arg = value_cast (value_type (scale), arg);
14f9c5c9 9445
50eff16b
UW
9446 arg = value_binop (arg, scale, BINOP_MUL);
9447 return value_cast (type, arg);
14f9c5c9
AS
9448}
9449
d2e4a39e 9450static struct value *
50eff16b 9451cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9 9452{
50eff16b
UW
9453 if (type == value_type (arg))
9454 return arg;
5b4ee69b 9455
50eff16b 9456 struct value *scale = ada_scaling_factor (type);
b2188a06 9457 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg)))
50eff16b
UW
9458 arg = cast_from_fixed (value_type (scale), arg);
9459 else
9460 arg = value_cast (value_type (scale), arg);
9461
9462 arg = value_binop (arg, scale, BINOP_DIV);
9463 return value_cast (type, arg);
14f9c5c9
AS
9464}
9465
d99dcf51
JB
9466/* Given two array types T1 and T2, return nonzero iff both arrays
9467 contain the same number of elements. */
9468
9469static int
9470ada_same_array_size_p (struct type *t1, struct type *t2)
9471{
9472 LONGEST lo1, hi1, lo2, hi2;
9473
9474 /* Get the array bounds in order to verify that the size of
9475 the two arrays match. */
9476 if (!get_array_bounds (t1, &lo1, &hi1)
9477 || !get_array_bounds (t2, &lo2, &hi2))
9478 error (_("unable to determine array bounds"));
9479
9480 /* To make things easier for size comparison, normalize a bit
9481 the case of empty arrays by making sure that the difference
9482 between upper bound and lower bound is always -1. */
9483 if (lo1 > hi1)
9484 hi1 = lo1 - 1;
9485 if (lo2 > hi2)
9486 hi2 = lo2 - 1;
9487
9488 return (hi1 - lo1 == hi2 - lo2);
9489}
9490
9491/* Assuming that VAL is an array of integrals, and TYPE represents
9492 an array with the same number of elements, but with wider integral
9493 elements, return an array "casted" to TYPE. In practice, this
9494 means that the returned array is built by casting each element
9495 of the original array into TYPE's (wider) element type. */
9496
9497static struct value *
9498ada_promote_array_of_integrals (struct type *type, struct value *val)
9499{
9500 struct type *elt_type = TYPE_TARGET_TYPE (type);
9501 LONGEST lo, hi;
9502 struct value *res;
9503 LONGEST i;
9504
9505 /* Verify that both val and type are arrays of scalars, and
9506 that the size of val's elements is smaller than the size
9507 of type's element. */
78134374 9508 gdb_assert (type->code () == TYPE_CODE_ARRAY);
d99dcf51 9509 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
78134374 9510 gdb_assert (value_type (val)->code () == TYPE_CODE_ARRAY);
d99dcf51
JB
9511 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9512 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9513 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9514
9515 if (!get_array_bounds (type, &lo, &hi))
9516 error (_("unable to determine array bounds"));
9517
9518 res = allocate_value (type);
9519
9520 /* Promote each array element. */
9521 for (i = 0; i < hi - lo + 1; i++)
9522 {
9523 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9524
9525 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9526 value_contents_all (elt), TYPE_LENGTH (elt_type));
9527 }
9528
9529 return res;
9530}
9531
4c4b4cd2
PH
9532/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9533 return the converted value. */
9534
d2e4a39e
AS
9535static struct value *
9536coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9537{
df407dfe 9538 struct type *type2 = value_type (val);
5b4ee69b 9539
14f9c5c9
AS
9540 if (type == type2)
9541 return val;
9542
61ee279c
PH
9543 type2 = ada_check_typedef (type2);
9544 type = ada_check_typedef (type);
14f9c5c9 9545
78134374
SM
9546 if (type2->code () == TYPE_CODE_PTR
9547 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9
AS
9548 {
9549 val = ada_value_ind (val);
df407dfe 9550 type2 = value_type (val);
14f9c5c9
AS
9551 }
9552
78134374
SM
9553 if (type2->code () == TYPE_CODE_ARRAY
9554 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9 9555 {
d99dcf51
JB
9556 if (!ada_same_array_size_p (type, type2))
9557 error (_("cannot assign arrays of different length"));
9558
9559 if (is_integral_type (TYPE_TARGET_TYPE (type))
9560 && is_integral_type (TYPE_TARGET_TYPE (type2))
9561 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9562 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9563 {
9564 /* Allow implicit promotion of the array elements to
9565 a wider type. */
9566 return ada_promote_array_of_integrals (type, val);
9567 }
9568
9569 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9570 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9571 error (_("Incompatible types in assignment"));
04624583 9572 deprecated_set_value_type (val, type);
14f9c5c9 9573 }
d2e4a39e 9574 return val;
14f9c5c9
AS
9575}
9576
4c4b4cd2
PH
9577static struct value *
9578ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9579{
9580 struct value *val;
9581 struct type *type1, *type2;
9582 LONGEST v, v1, v2;
9583
994b9211
AC
9584 arg1 = coerce_ref (arg1);
9585 arg2 = coerce_ref (arg2);
18af8284
JB
9586 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9587 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9588
78134374
SM
9589 if (type1->code () != TYPE_CODE_INT
9590 || type2->code () != TYPE_CODE_INT)
4c4b4cd2
PH
9591 return value_binop (arg1, arg2, op);
9592
76a01679 9593 switch (op)
4c4b4cd2
PH
9594 {
9595 case BINOP_MOD:
9596 case BINOP_DIV:
9597 case BINOP_REM:
9598 break;
9599 default:
9600 return value_binop (arg1, arg2, op);
9601 }
9602
9603 v2 = value_as_long (arg2);
9604 if (v2 == 0)
323e0a4a 9605 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9606
9607 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9608 return value_binop (arg1, arg2, op);
9609
9610 v1 = value_as_long (arg1);
9611 switch (op)
9612 {
9613 case BINOP_DIV:
9614 v = v1 / v2;
76a01679
JB
9615 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9616 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9617 break;
9618 case BINOP_REM:
9619 v = v1 % v2;
76a01679
JB
9620 if (v * v1 < 0)
9621 v -= v2;
4c4b4cd2
PH
9622 break;
9623 default:
9624 /* Should not reach this point. */
9625 v = 0;
9626 }
9627
9628 val = allocate_value (type1);
990a07ab 9629 store_unsigned_integer (value_contents_raw (val),
e17a4113 9630 TYPE_LENGTH (value_type (val)),
34877895 9631 type_byte_order (type1), v);
4c4b4cd2
PH
9632 return val;
9633}
9634
9635static int
9636ada_value_equal (struct value *arg1, struct value *arg2)
9637{
df407dfe
AC
9638 if (ada_is_direct_array_type (value_type (arg1))
9639 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9640 {
79e8fcaa
JB
9641 struct type *arg1_type, *arg2_type;
9642
f58b38bf
JB
9643 /* Automatically dereference any array reference before
9644 we attempt to perform the comparison. */
9645 arg1 = ada_coerce_ref (arg1);
9646 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9647
4c4b4cd2
PH
9648 arg1 = ada_coerce_to_simple_array (arg1);
9649 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9650
9651 arg1_type = ada_check_typedef (value_type (arg1));
9652 arg2_type = ada_check_typedef (value_type (arg2));
9653
78134374
SM
9654 if (arg1_type->code () != TYPE_CODE_ARRAY
9655 || arg2_type->code () != TYPE_CODE_ARRAY)
323e0a4a 9656 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9657 /* FIXME: The following works only for types whose
76a01679
JB
9658 representations use all bits (no padding or undefined bits)
9659 and do not have user-defined equality. */
79e8fcaa
JB
9660 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9661 && memcmp (value_contents (arg1), value_contents (arg2),
9662 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9663 }
9664 return value_equal (arg1, arg2);
9665}
9666
52ce6436
PH
9667/* Total number of component associations in the aggregate starting at
9668 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9669 OP_AGGREGATE. */
52ce6436
PH
9670
9671static int
9672num_component_specs (struct expression *exp, int pc)
9673{
9674 int n, m, i;
5b4ee69b 9675
52ce6436
PH
9676 m = exp->elts[pc + 1].longconst;
9677 pc += 3;
9678 n = 0;
9679 for (i = 0; i < m; i += 1)
9680 {
9681 switch (exp->elts[pc].opcode)
9682 {
9683 default:
9684 n += 1;
9685 break;
9686 case OP_CHOICES:
9687 n += exp->elts[pc + 1].longconst;
9688 break;
9689 }
9690 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9691 }
9692 return n;
9693}
9694
9695/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9696 component of LHS (a simple array or a record), updating *POS past
9697 the expression, assuming that LHS is contained in CONTAINER. Does
9698 not modify the inferior's memory, nor does it modify LHS (unless
9699 LHS == CONTAINER). */
9700
9701static void
9702assign_component (struct value *container, struct value *lhs, LONGEST index,
9703 struct expression *exp, int *pos)
9704{
9705 struct value *mark = value_mark ();
9706 struct value *elt;
0e2da9f0 9707 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9708
78134374 9709 if (lhs_type->code () == TYPE_CODE_ARRAY)
52ce6436 9710 {
22601c15
UW
9711 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9712 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9713
52ce6436
PH
9714 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9715 }
9716 else
9717 {
9718 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9719 elt = ada_to_fixed_value (elt);
52ce6436
PH
9720 }
9721
9722 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9723 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9724 else
9725 value_assign_to_component (container, elt,
9726 ada_evaluate_subexp (NULL, exp, pos,
9727 EVAL_NORMAL));
9728
9729 value_free_to_mark (mark);
9730}
9731
9732/* Assuming that LHS represents an lvalue having a record or array
9733 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9734 of that aggregate's value to LHS, advancing *POS past the
9735 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9736 lvalue containing LHS (possibly LHS itself). Does not modify
9737 the inferior's memory, nor does it modify the contents of
0963b4bd 9738 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9739
9740static struct value *
9741assign_aggregate (struct value *container,
9742 struct value *lhs, struct expression *exp,
9743 int *pos, enum noside noside)
9744{
9745 struct type *lhs_type;
9746 int n = exp->elts[*pos+1].longconst;
9747 LONGEST low_index, high_index;
9748 int num_specs;
9749 LONGEST *indices;
9750 int max_indices, num_indices;
52ce6436 9751 int i;
52ce6436
PH
9752
9753 *pos += 3;
9754 if (noside != EVAL_NORMAL)
9755 {
52ce6436
PH
9756 for (i = 0; i < n; i += 1)
9757 ada_evaluate_subexp (NULL, exp, pos, noside);
9758 return container;
9759 }
9760
9761 container = ada_coerce_ref (container);
9762 if (ada_is_direct_array_type (value_type (container)))
9763 container = ada_coerce_to_simple_array (container);
9764 lhs = ada_coerce_ref (lhs);
9765 if (!deprecated_value_modifiable (lhs))
9766 error (_("Left operand of assignment is not a modifiable lvalue."));
9767
0e2da9f0 9768 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9769 if (ada_is_direct_array_type (lhs_type))
9770 {
9771 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9772 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9773 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9774 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436 9775 }
78134374 9776 else if (lhs_type->code () == TYPE_CODE_STRUCT)
52ce6436
PH
9777 {
9778 low_index = 0;
9779 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9780 }
9781 else
9782 error (_("Left-hand side must be array or record."));
9783
9784 num_specs = num_component_specs (exp, *pos - 3);
9785 max_indices = 4 * num_specs + 4;
8d749320 9786 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9787 indices[0] = indices[1] = low_index - 1;
9788 indices[2] = indices[3] = high_index + 1;
9789 num_indices = 4;
9790
9791 for (i = 0; i < n; i += 1)
9792 {
9793 switch (exp->elts[*pos].opcode)
9794 {
1fbf5ada
JB
9795 case OP_CHOICES:
9796 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9797 &num_indices, max_indices,
9798 low_index, high_index);
9799 break;
9800 case OP_POSITIONAL:
9801 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9802 &num_indices, max_indices,
9803 low_index, high_index);
1fbf5ada
JB
9804 break;
9805 case OP_OTHERS:
9806 if (i != n-1)
9807 error (_("Misplaced 'others' clause"));
9808 aggregate_assign_others (container, lhs, exp, pos, indices,
9809 num_indices, low_index, high_index);
9810 break;
9811 default:
9812 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9813 }
9814 }
9815
9816 return container;
9817}
9818
9819/* Assign into the component of LHS indexed by the OP_POSITIONAL
9820 construct at *POS, updating *POS past the construct, given that
9821 the positions are relative to lower bound LOW, where HIGH is the
9822 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9823 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9824 assign_aggregate. */
52ce6436
PH
9825static void
9826aggregate_assign_positional (struct value *container,
9827 struct value *lhs, struct expression *exp,
9828 int *pos, LONGEST *indices, int *num_indices,
9829 int max_indices, LONGEST low, LONGEST high)
9830{
9831 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9832
9833 if (ind - 1 == high)
e1d5a0d2 9834 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9835 if (ind <= high)
9836 {
9837 add_component_interval (ind, ind, indices, num_indices, max_indices);
9838 *pos += 3;
9839 assign_component (container, lhs, ind, exp, pos);
9840 }
9841 else
9842 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9843}
9844
9845/* Assign into the components of LHS indexed by the OP_CHOICES
9846 construct at *POS, updating *POS past the construct, given that
9847 the allowable indices are LOW..HIGH. Record the indices assigned
9848 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9849 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9850static void
9851aggregate_assign_from_choices (struct value *container,
9852 struct value *lhs, struct expression *exp,
9853 int *pos, LONGEST *indices, int *num_indices,
9854 int max_indices, LONGEST low, LONGEST high)
9855{
9856 int j;
9857 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9858 int choice_pos, expr_pc;
9859 int is_array = ada_is_direct_array_type (value_type (lhs));
9860
9861 choice_pos = *pos += 3;
9862
9863 for (j = 0; j < n_choices; j += 1)
9864 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9865 expr_pc = *pos;
9866 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9867
9868 for (j = 0; j < n_choices; j += 1)
9869 {
9870 LONGEST lower, upper;
9871 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9872
52ce6436
PH
9873 if (op == OP_DISCRETE_RANGE)
9874 {
9875 choice_pos += 1;
9876 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9877 EVAL_NORMAL));
9878 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9879 EVAL_NORMAL));
9880 }
9881 else if (is_array)
9882 {
9883 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9884 EVAL_NORMAL));
9885 upper = lower;
9886 }
9887 else
9888 {
9889 int ind;
0d5cff50 9890 const char *name;
5b4ee69b 9891
52ce6436
PH
9892 switch (op)
9893 {
9894 case OP_NAME:
9895 name = &exp->elts[choice_pos + 2].string;
9896 break;
9897 case OP_VAR_VALUE:
987012b8 9898 name = exp->elts[choice_pos + 2].symbol->natural_name ();
52ce6436
PH
9899 break;
9900 default:
9901 error (_("Invalid record component association."));
9902 }
9903 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9904 ind = 0;
9905 if (! find_struct_field (name, value_type (lhs), 0,
9906 NULL, NULL, NULL, NULL, &ind))
9907 error (_("Unknown component name: %s."), name);
9908 lower = upper = ind;
9909 }
9910
9911 if (lower <= upper && (lower < low || upper > high))
9912 error (_("Index in component association out of bounds."));
9913
9914 add_component_interval (lower, upper, indices, num_indices,
9915 max_indices);
9916 while (lower <= upper)
9917 {
9918 int pos1;
5b4ee69b 9919
52ce6436
PH
9920 pos1 = expr_pc;
9921 assign_component (container, lhs, lower, exp, &pos1);
9922 lower += 1;
9923 }
9924 }
9925}
9926
9927/* Assign the value of the expression in the OP_OTHERS construct in
9928 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9929 have not been previously assigned. The index intervals already assigned
9930 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9931 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9932static void
9933aggregate_assign_others (struct value *container,
9934 struct value *lhs, struct expression *exp,
9935 int *pos, LONGEST *indices, int num_indices,
9936 LONGEST low, LONGEST high)
9937{
9938 int i;
5ce64950 9939 int expr_pc = *pos + 1;
52ce6436
PH
9940
9941 for (i = 0; i < num_indices - 2; i += 2)
9942 {
9943 LONGEST ind;
5b4ee69b 9944
52ce6436
PH
9945 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9946 {
5ce64950 9947 int localpos;
5b4ee69b 9948
5ce64950
MS
9949 localpos = expr_pc;
9950 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9951 }
9952 }
9953 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9954}
9955
9956/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9957 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9958 modifying *SIZE as needed. It is an error if *SIZE exceeds
9959 MAX_SIZE. The resulting intervals do not overlap. */
9960static void
9961add_component_interval (LONGEST low, LONGEST high,
9962 LONGEST* indices, int *size, int max_size)
9963{
9964 int i, j;
5b4ee69b 9965
52ce6436
PH
9966 for (i = 0; i < *size; i += 2) {
9967 if (high >= indices[i] && low <= indices[i + 1])
9968 {
9969 int kh;
5b4ee69b 9970
52ce6436
PH
9971 for (kh = i + 2; kh < *size; kh += 2)
9972 if (high < indices[kh])
9973 break;
9974 if (low < indices[i])
9975 indices[i] = low;
9976 indices[i + 1] = indices[kh - 1];
9977 if (high > indices[i + 1])
9978 indices[i + 1] = high;
9979 memcpy (indices + i + 2, indices + kh, *size - kh);
9980 *size -= kh - i - 2;
9981 return;
9982 }
9983 else if (high < indices[i])
9984 break;
9985 }
9986
9987 if (*size == max_size)
9988 error (_("Internal error: miscounted aggregate components."));
9989 *size += 2;
9990 for (j = *size-1; j >= i+2; j -= 1)
9991 indices[j] = indices[j - 2];
9992 indices[i] = low;
9993 indices[i + 1] = high;
9994}
9995
6e48bd2c
JB
9996/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9997 is different. */
9998
9999static struct value *
b7e22850 10000ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
10001{
10002 if (type == ada_check_typedef (value_type (arg2)))
10003 return arg2;
10004
b2188a06 10005 if (ada_is_gnat_encoded_fixed_point_type (type))
95f39a5b 10006 return cast_to_fixed (type, arg2);
6e48bd2c 10007
b2188a06 10008 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
a53b7a21 10009 return cast_from_fixed (type, arg2);
6e48bd2c
JB
10010
10011 return value_cast (type, arg2);
10012}
10013
284614f0
JB
10014/* Evaluating Ada expressions, and printing their result.
10015 ------------------------------------------------------
10016
21649b50
JB
10017 1. Introduction:
10018 ----------------
10019
284614f0
JB
10020 We usually evaluate an Ada expression in order to print its value.
10021 We also evaluate an expression in order to print its type, which
10022 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
10023 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
10024 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
10025 the evaluation compared to the EVAL_NORMAL, but is otherwise very
10026 similar.
10027
10028 Evaluating expressions is a little more complicated for Ada entities
10029 than it is for entities in languages such as C. The main reason for
10030 this is that Ada provides types whose definition might be dynamic.
10031 One example of such types is variant records. Or another example
10032 would be an array whose bounds can only be known at run time.
10033
10034 The following description is a general guide as to what should be
10035 done (and what should NOT be done) in order to evaluate an expression
10036 involving such types, and when. This does not cover how the semantic
10037 information is encoded by GNAT as this is covered separatly. For the
10038 document used as the reference for the GNAT encoding, see exp_dbug.ads
10039 in the GNAT sources.
10040
10041 Ideally, we should embed each part of this description next to its
10042 associated code. Unfortunately, the amount of code is so vast right
10043 now that it's hard to see whether the code handling a particular
10044 situation might be duplicated or not. One day, when the code is
10045 cleaned up, this guide might become redundant with the comments
10046 inserted in the code, and we might want to remove it.
10047
21649b50
JB
10048 2. ``Fixing'' an Entity, the Simple Case:
10049 -----------------------------------------
10050
284614f0
JB
10051 When evaluating Ada expressions, the tricky issue is that they may
10052 reference entities whose type contents and size are not statically
10053 known. Consider for instance a variant record:
10054
10055 type Rec (Empty : Boolean := True) is record
10056 case Empty is
10057 when True => null;
10058 when False => Value : Integer;
10059 end case;
10060 end record;
10061 Yes : Rec := (Empty => False, Value => 1);
10062 No : Rec := (empty => True);
10063
10064 The size and contents of that record depends on the value of the
10065 descriminant (Rec.Empty). At this point, neither the debugging
10066 information nor the associated type structure in GDB are able to
10067 express such dynamic types. So what the debugger does is to create
10068 "fixed" versions of the type that applies to the specific object.
30baf67b 10069 We also informally refer to this operation as "fixing" an object,
284614f0
JB
10070 which means creating its associated fixed type.
10071
10072 Example: when printing the value of variable "Yes" above, its fixed
10073 type would look like this:
10074
10075 type Rec is record
10076 Empty : Boolean;
10077 Value : Integer;
10078 end record;
10079
10080 On the other hand, if we printed the value of "No", its fixed type
10081 would become:
10082
10083 type Rec is record
10084 Empty : Boolean;
10085 end record;
10086
10087 Things become a little more complicated when trying to fix an entity
10088 with a dynamic type that directly contains another dynamic type,
10089 such as an array of variant records, for instance. There are
10090 two possible cases: Arrays, and records.
10091
21649b50
JB
10092 3. ``Fixing'' Arrays:
10093 ---------------------
10094
10095 The type structure in GDB describes an array in terms of its bounds,
10096 and the type of its elements. By design, all elements in the array
10097 have the same type and we cannot represent an array of variant elements
10098 using the current type structure in GDB. When fixing an array,
10099 we cannot fix the array element, as we would potentially need one
10100 fixed type per element of the array. As a result, the best we can do
10101 when fixing an array is to produce an array whose bounds and size
10102 are correct (allowing us to read it from memory), but without having
10103 touched its element type. Fixing each element will be done later,
10104 when (if) necessary.
10105
10106 Arrays are a little simpler to handle than records, because the same
10107 amount of memory is allocated for each element of the array, even if
1b536f04 10108 the amount of space actually used by each element differs from element
21649b50 10109 to element. Consider for instance the following array of type Rec:
284614f0
JB
10110
10111 type Rec_Array is array (1 .. 2) of Rec;
10112
1b536f04
JB
10113 The actual amount of memory occupied by each element might be different
10114 from element to element, depending on the value of their discriminant.
21649b50 10115 But the amount of space reserved for each element in the array remains
1b536f04 10116 fixed regardless. So we simply need to compute that size using
21649b50
JB
10117 the debugging information available, from which we can then determine
10118 the array size (we multiply the number of elements of the array by
10119 the size of each element).
10120
10121 The simplest case is when we have an array of a constrained element
10122 type. For instance, consider the following type declarations:
10123
10124 type Bounded_String (Max_Size : Integer) is
10125 Length : Integer;
10126 Buffer : String (1 .. Max_Size);
10127 end record;
10128 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
10129
10130 In this case, the compiler describes the array as an array of
10131 variable-size elements (identified by its XVS suffix) for which
10132 the size can be read in the parallel XVZ variable.
10133
10134 In the case of an array of an unconstrained element type, the compiler
10135 wraps the array element inside a private PAD type. This type should not
10136 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
10137 that we also use the adjective "aligner" in our code to designate
10138 these wrapper types.
10139
1b536f04 10140 In some cases, the size allocated for each element is statically
21649b50
JB
10141 known. In that case, the PAD type already has the correct size,
10142 and the array element should remain unfixed.
10143
10144 But there are cases when this size is not statically known.
10145 For instance, assuming that "Five" is an integer variable:
284614f0
JB
10146
10147 type Dynamic is array (1 .. Five) of Integer;
10148 type Wrapper (Has_Length : Boolean := False) is record
10149 Data : Dynamic;
10150 case Has_Length is
10151 when True => Length : Integer;
10152 when False => null;
10153 end case;
10154 end record;
10155 type Wrapper_Array is array (1 .. 2) of Wrapper;
10156
10157 Hello : Wrapper_Array := (others => (Has_Length => True,
10158 Data => (others => 17),
10159 Length => 1));
10160
10161
10162 The debugging info would describe variable Hello as being an
10163 array of a PAD type. The size of that PAD type is not statically
10164 known, but can be determined using a parallel XVZ variable.
10165 In that case, a copy of the PAD type with the correct size should
10166 be used for the fixed array.
10167
21649b50
JB
10168 3. ``Fixing'' record type objects:
10169 ----------------------------------
10170
10171 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10172 record types. In this case, in order to compute the associated
10173 fixed type, we need to determine the size and offset of each of
10174 its components. This, in turn, requires us to compute the fixed
10175 type of each of these components.
10176
10177 Consider for instance the example:
10178
10179 type Bounded_String (Max_Size : Natural) is record
10180 Str : String (1 .. Max_Size);
10181 Length : Natural;
10182 end record;
10183 My_String : Bounded_String (Max_Size => 10);
10184
10185 In that case, the position of field "Length" depends on the size
10186 of field Str, which itself depends on the value of the Max_Size
21649b50 10187 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10188 we need to fix the type of field Str. Therefore, fixing a variant
10189 record requires us to fix each of its components.
10190
10191 However, if a component does not have a dynamic size, the component
10192 should not be fixed. In particular, fields that use a PAD type
10193 should not fixed. Here is an example where this might happen
10194 (assuming type Rec above):
10195
10196 type Container (Big : Boolean) is record
10197 First : Rec;
10198 After : Integer;
10199 case Big is
10200 when True => Another : Integer;
10201 when False => null;
10202 end case;
10203 end record;
10204 My_Container : Container := (Big => False,
10205 First => (Empty => True),
10206 After => 42);
10207
10208 In that example, the compiler creates a PAD type for component First,
10209 whose size is constant, and then positions the component After just
10210 right after it. The offset of component After is therefore constant
10211 in this case.
10212
10213 The debugger computes the position of each field based on an algorithm
10214 that uses, among other things, the actual position and size of the field
21649b50
JB
10215 preceding it. Let's now imagine that the user is trying to print
10216 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10217 end up computing the offset of field After based on the size of the
10218 fixed version of field First. And since in our example First has
10219 only one actual field, the size of the fixed type is actually smaller
10220 than the amount of space allocated to that field, and thus we would
10221 compute the wrong offset of field After.
10222
21649b50
JB
10223 To make things more complicated, we need to watch out for dynamic
10224 components of variant records (identified by the ___XVL suffix in
10225 the component name). Even if the target type is a PAD type, the size
10226 of that type might not be statically known. So the PAD type needs
10227 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10228 we might end up with the wrong size for our component. This can be
10229 observed with the following type declarations:
284614f0
JB
10230
10231 type Octal is new Integer range 0 .. 7;
10232 type Octal_Array is array (Positive range <>) of Octal;
10233 pragma Pack (Octal_Array);
10234
10235 type Octal_Buffer (Size : Positive) is record
10236 Buffer : Octal_Array (1 .. Size);
10237 Length : Integer;
10238 end record;
10239
10240 In that case, Buffer is a PAD type whose size is unset and needs
10241 to be computed by fixing the unwrapped type.
10242
21649b50
JB
10243 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10244 ----------------------------------------------------------
10245
10246 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10247 thus far, be actually fixed?
10248
10249 The answer is: Only when referencing that element. For instance
10250 when selecting one component of a record, this specific component
10251 should be fixed at that point in time. Or when printing the value
10252 of a record, each component should be fixed before its value gets
10253 printed. Similarly for arrays, the element of the array should be
10254 fixed when printing each element of the array, or when extracting
10255 one element out of that array. On the other hand, fixing should
10256 not be performed on the elements when taking a slice of an array!
10257
31432a67 10258 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10259 size of each field is that we end up also miscomputing the size
10260 of the containing type. This can have adverse results when computing
10261 the value of an entity. GDB fetches the value of an entity based
10262 on the size of its type, and thus a wrong size causes GDB to fetch
10263 the wrong amount of memory. In the case where the computed size is
10264 too small, GDB fetches too little data to print the value of our
31432a67 10265 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10266 past the buffer containing the data =:-o. */
10267
ced9779b
JB
10268/* Evaluate a subexpression of EXP, at index *POS, and return a value
10269 for that subexpression cast to TO_TYPE. Advance *POS over the
10270 subexpression. */
10271
10272static value *
10273ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10274 enum noside noside, struct type *to_type)
10275{
10276 int pc = *pos;
10277
10278 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10279 || exp->elts[pc].opcode == OP_VAR_VALUE)
10280 {
10281 (*pos) += 4;
10282
10283 value *val;
10284 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
10285 {
10286 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10287 return value_zero (to_type, not_lval);
10288
10289 val = evaluate_var_msym_value (noside,
10290 exp->elts[pc + 1].objfile,
10291 exp->elts[pc + 2].msymbol);
10292 }
10293 else
10294 val = evaluate_var_value (noside,
10295 exp->elts[pc + 1].block,
10296 exp->elts[pc + 2].symbol);
10297
10298 if (noside == EVAL_SKIP)
10299 return eval_skip_value (exp);
10300
10301 val = ada_value_cast (to_type, val);
10302
10303 /* Follow the Ada language semantics that do not allow taking
10304 an address of the result of a cast (view conversion in Ada). */
10305 if (VALUE_LVAL (val) == lval_memory)
10306 {
10307 if (value_lazy (val))
10308 value_fetch_lazy (val);
10309 VALUE_LVAL (val) = not_lval;
10310 }
10311 return val;
10312 }
10313
10314 value *val = evaluate_subexp (to_type, exp, pos, noside);
10315 if (noside == EVAL_SKIP)
10316 return eval_skip_value (exp);
10317 return ada_value_cast (to_type, val);
10318}
10319
284614f0
JB
10320/* Implement the evaluate_exp routine in the exp_descriptor structure
10321 for the Ada language. */
10322
52ce6436 10323static struct value *
ebf56fd3 10324ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10325 int *pos, enum noside noside)
14f9c5c9
AS
10326{
10327 enum exp_opcode op;
b5385fc0 10328 int tem;
14f9c5c9 10329 int pc;
5ec18f2b 10330 int preeval_pos;
14f9c5c9
AS
10331 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10332 struct type *type;
52ce6436 10333 int nargs, oplen;
d2e4a39e 10334 struct value **argvec;
14f9c5c9 10335
d2e4a39e
AS
10336 pc = *pos;
10337 *pos += 1;
14f9c5c9
AS
10338 op = exp->elts[pc].opcode;
10339
d2e4a39e 10340 switch (op)
14f9c5c9
AS
10341 {
10342 default:
10343 *pos -= 1;
6e48bd2c 10344 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10345
10346 if (noside == EVAL_NORMAL)
10347 arg1 = unwrap_value (arg1);
6e48bd2c 10348
edd079d9 10349 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
6e48bd2c
JB
10350 then we need to perform the conversion manually, because
10351 evaluate_subexp_standard doesn't do it. This conversion is
10352 necessary in Ada because the different kinds of float/fixed
10353 types in Ada have different representations.
10354
10355 Similarly, we need to perform the conversion from OP_LONG
10356 ourselves. */
edd079d9 10357 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
b7e22850 10358 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10359
10360 return arg1;
4c4b4cd2
PH
10361
10362 case OP_STRING:
10363 {
76a01679 10364 struct value *result;
5b4ee69b 10365
76a01679
JB
10366 *pos -= 1;
10367 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10368 /* The result type will have code OP_STRING, bashed there from
10369 OP_ARRAY. Bash it back. */
78134374 10370 if (value_type (result)->code () == TYPE_CODE_STRING)
67607e24 10371 value_type (result)->set_code (TYPE_CODE_ARRAY);
76a01679 10372 return result;
4c4b4cd2 10373 }
14f9c5c9
AS
10374
10375 case UNOP_CAST:
10376 (*pos) += 2;
10377 type = exp->elts[pc + 1].type;
ced9779b 10378 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10379
4c4b4cd2
PH
10380 case UNOP_QUAL:
10381 (*pos) += 2;
10382 type = exp->elts[pc + 1].type;
10383 return ada_evaluate_subexp (type, exp, pos, noside);
10384
14f9c5c9
AS
10385 case BINOP_ASSIGN:
10386 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10387 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10388 {
10389 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10390 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10391 return arg1;
10392 return ada_value_assign (arg1, arg1);
10393 }
003f3813
JB
10394 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10395 except if the lhs of our assignment is a convenience variable.
10396 In the case of assigning to a convenience variable, the lhs
10397 should be exactly the result of the evaluation of the rhs. */
10398 type = value_type (arg1);
10399 if (VALUE_LVAL (arg1) == lval_internalvar)
10400 type = NULL;
10401 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10402 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10403 return arg1;
f411722c
TT
10404 if (VALUE_LVAL (arg1) == lval_internalvar)
10405 {
10406 /* Nothing. */
10407 }
b2188a06 10408 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
df407dfe 10409 arg2 = cast_to_fixed (value_type (arg1), arg2);
b2188a06 10410 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
76a01679 10411 error
323e0a4a 10412 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10413 else
df407dfe 10414 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10415 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10416
10417 case BINOP_ADD:
10418 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10419 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10420 if (noside == EVAL_SKIP)
4c4b4cd2 10421 goto nosideret;
78134374 10422 if (value_type (arg1)->code () == TYPE_CODE_PTR)
2ac8a782
JB
10423 return (value_from_longest
10424 (value_type (arg1),
10425 value_as_long (arg1) + value_as_long (arg2)));
78134374 10426 if (value_type (arg2)->code () == TYPE_CODE_PTR)
c40cc657
JB
10427 return (value_from_longest
10428 (value_type (arg2),
10429 value_as_long (arg1) + value_as_long (arg2)));
b2188a06
JB
10430 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
10431 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
df407dfe 10432 && value_type (arg1) != value_type (arg2))
323e0a4a 10433 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10434 /* Do the addition, and cast the result to the type of the first
10435 argument. We cannot cast the result to a reference type, so if
10436 ARG1 is a reference type, find its underlying type. */
10437 type = value_type (arg1);
78134374 10438 while (type->code () == TYPE_CODE_REF)
b7789565 10439 type = TYPE_TARGET_TYPE (type);
f44316fa 10440 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10441 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10442
10443 case BINOP_SUB:
10444 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10445 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10446 if (noside == EVAL_SKIP)
4c4b4cd2 10447 goto nosideret;
78134374 10448 if (value_type (arg1)->code () == TYPE_CODE_PTR)
2ac8a782
JB
10449 return (value_from_longest
10450 (value_type (arg1),
10451 value_as_long (arg1) - value_as_long (arg2)));
78134374 10452 if (value_type (arg2)->code () == TYPE_CODE_PTR)
c40cc657
JB
10453 return (value_from_longest
10454 (value_type (arg2),
10455 value_as_long (arg1) - value_as_long (arg2)));
b2188a06
JB
10456 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
10457 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
df407dfe 10458 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10459 error (_("Operands of fixed-point subtraction "
10460 "must have the same type"));
b7789565
JB
10461 /* Do the substraction, and cast the result to the type of the first
10462 argument. We cannot cast the result to a reference type, so if
10463 ARG1 is a reference type, find its underlying type. */
10464 type = value_type (arg1);
78134374 10465 while (type->code () == TYPE_CODE_REF)
b7789565 10466 type = TYPE_TARGET_TYPE (type);
f44316fa 10467 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10468 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10469
10470 case BINOP_MUL:
10471 case BINOP_DIV:
e1578042
JB
10472 case BINOP_REM:
10473 case BINOP_MOD:
14f9c5c9
AS
10474 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10475 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10476 if (noside == EVAL_SKIP)
4c4b4cd2 10477 goto nosideret;
e1578042 10478 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10479 {
10480 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10481 return value_zero (value_type (arg1), not_lval);
10482 }
14f9c5c9 10483 else
4c4b4cd2 10484 {
a53b7a21 10485 type = builtin_type (exp->gdbarch)->builtin_double;
b2188a06 10486 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
a53b7a21 10487 arg1 = cast_from_fixed (type, arg1);
b2188a06 10488 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
a53b7a21 10489 arg2 = cast_from_fixed (type, arg2);
f44316fa 10490 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10491 return ada_value_binop (arg1, arg2, op);
10492 }
10493
4c4b4cd2
PH
10494 case BINOP_EQUAL:
10495 case BINOP_NOTEQUAL:
14f9c5c9 10496 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10497 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10498 if (noside == EVAL_SKIP)
76a01679 10499 goto nosideret;
4c4b4cd2 10500 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10501 tem = 0;
4c4b4cd2 10502 else
f44316fa
UW
10503 {
10504 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10505 tem = ada_value_equal (arg1, arg2);
10506 }
4c4b4cd2 10507 if (op == BINOP_NOTEQUAL)
76a01679 10508 tem = !tem;
fbb06eb1
UW
10509 type = language_bool_type (exp->language_defn, exp->gdbarch);
10510 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10511
10512 case UNOP_NEG:
10513 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10514 if (noside == EVAL_SKIP)
10515 goto nosideret;
b2188a06 10516 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
df407dfe 10517 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10518 else
f44316fa
UW
10519 {
10520 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10521 return value_neg (arg1);
10522 }
4c4b4cd2 10523
2330c6c6
JB
10524 case BINOP_LOGICAL_AND:
10525 case BINOP_LOGICAL_OR:
10526 case UNOP_LOGICAL_NOT:
000d5124
JB
10527 {
10528 struct value *val;
10529
10530 *pos -= 1;
10531 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10532 type = language_bool_type (exp->language_defn, exp->gdbarch);
10533 return value_cast (type, val);
000d5124 10534 }
2330c6c6
JB
10535
10536 case BINOP_BITWISE_AND:
10537 case BINOP_BITWISE_IOR:
10538 case BINOP_BITWISE_XOR:
000d5124
JB
10539 {
10540 struct value *val;
10541
10542 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10543 *pos = pc;
10544 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10545
10546 return value_cast (value_type (arg1), val);
10547 }
2330c6c6 10548
14f9c5c9
AS
10549 case OP_VAR_VALUE:
10550 *pos -= 1;
6799def4 10551
14f9c5c9 10552 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10553 {
10554 *pos += 4;
10555 goto nosideret;
10556 }
da5c522f
JB
10557
10558 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10559 /* Only encountered when an unresolved symbol occurs in a
10560 context other than a function call, in which case, it is
52ce6436 10561 invalid. */
323e0a4a 10562 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10563 exp->elts[pc + 2].symbol->print_name ());
da5c522f
JB
10564
10565 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10566 {
0c1f74cf 10567 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10568 /* Check to see if this is a tagged type. We also need to handle
10569 the case where the type is a reference to a tagged type, but
10570 we have to be careful to exclude pointers to tagged types.
10571 The latter should be shown as usual (as a pointer), whereas
10572 a reference should mostly be transparent to the user. */
10573 if (ada_is_tagged_type (type, 0)
78134374 10574 || (type->code () == TYPE_CODE_REF
31dbc1c5 10575 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10576 {
10577 /* Tagged types are a little special in the fact that the real
10578 type is dynamic and can only be determined by inspecting the
10579 object's tag. This means that we need to get the object's
10580 value first (EVAL_NORMAL) and then extract the actual object
10581 type from its tag.
10582
10583 Note that we cannot skip the final step where we extract
10584 the object type from its tag, because the EVAL_NORMAL phase
10585 results in dynamic components being resolved into fixed ones.
10586 This can cause problems when trying to print the type
10587 description of tagged types whose parent has a dynamic size:
10588 We use the type name of the "_parent" component in order
10589 to print the name of the ancestor type in the type description.
10590 If that component had a dynamic size, the resolution into
10591 a fixed type would result in the loss of that type name,
10592 thus preventing us from printing the name of the ancestor
10593 type in the type description. */
10594 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10595
78134374 10596 if (type->code () != TYPE_CODE_REF)
0d72a7c3
JB
10597 {
10598 struct type *actual_type;
10599
10600 actual_type = type_from_tag (ada_value_tag (arg1));
10601 if (actual_type == NULL)
10602 /* If, for some reason, we were unable to determine
10603 the actual type from the tag, then use the static
10604 approximation that we just computed as a fallback.
10605 This can happen if the debugging information is
10606 incomplete, for instance. */
10607 actual_type = type;
10608 return value_zero (actual_type, not_lval);
10609 }
10610 else
10611 {
10612 /* In the case of a ref, ada_coerce_ref takes care
10613 of determining the actual type. But the evaluation
10614 should return a ref as it should be valid to ask
10615 for its address; so rebuild a ref after coerce. */
10616 arg1 = ada_coerce_ref (arg1);
a65cfae5 10617 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10618 }
10619 }
0c1f74cf 10620
84754697
JB
10621 /* Records and unions for which GNAT encodings have been
10622 generated need to be statically fixed as well.
10623 Otherwise, non-static fixing produces a type where
10624 all dynamic properties are removed, which prevents "ptype"
10625 from being able to completely describe the type.
10626 For instance, a case statement in a variant record would be
10627 replaced by the relevant components based on the actual
10628 value of the discriminants. */
78134374 10629 if ((type->code () == TYPE_CODE_STRUCT
84754697 10630 && dynamic_template_type (type) != NULL)
78134374 10631 || (type->code () == TYPE_CODE_UNION
84754697
JB
10632 && ada_find_parallel_type (type, "___XVU") != NULL))
10633 {
10634 *pos += 4;
10635 return value_zero (to_static_fixed_type (type), not_lval);
10636 }
4c4b4cd2 10637 }
da5c522f
JB
10638
10639 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10640 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10641
10642 case OP_FUNCALL:
10643 (*pos) += 2;
10644
10645 /* Allocate arg vector, including space for the function to be
10646 called in argvec[0] and a terminating NULL. */
10647 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10648 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10649
10650 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10651 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10652 error (_("Unexpected unresolved symbol, %s, during evaluation"),
987012b8 10653 exp->elts[pc + 5].symbol->print_name ());
4c4b4cd2
PH
10654 else
10655 {
10656 for (tem = 0; tem <= nargs; tem += 1)
10657 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10658 argvec[tem] = 0;
10659
10660 if (noside == EVAL_SKIP)
10661 goto nosideret;
10662 }
10663
ad82864c
JB
10664 if (ada_is_constrained_packed_array_type
10665 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10666 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
78134374 10667 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
284614f0
JB
10668 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10669 /* This is a packed array that has already been fixed, and
10670 therefore already coerced to a simple array. Nothing further
10671 to do. */
10672 ;
78134374 10673 else if (value_type (argvec[0])->code () == TYPE_CODE_REF)
e6c2c623
PMR
10674 {
10675 /* Make sure we dereference references so that all the code below
10676 feels like it's really handling the referenced value. Wrapping
10677 types (for alignment) may be there, so make sure we strip them as
10678 well. */
10679 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10680 }
78134374 10681 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
e6c2c623
PMR
10682 && VALUE_LVAL (argvec[0]) == lval_memory)
10683 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10684
df407dfe 10685 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10686
10687 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10688 them. So, if this is an array typedef (encoding use for array
10689 access types encoded as fat pointers), strip it now. */
78134374 10690 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
10691 type = ada_typedef_target_type (type);
10692
78134374 10693 if (type->code () == TYPE_CODE_PTR)
4c4b4cd2 10694 {
78134374 10695 switch (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ())
4c4b4cd2
PH
10696 {
10697 case TYPE_CODE_FUNC:
61ee279c 10698 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10699 break;
10700 case TYPE_CODE_ARRAY:
10701 break;
10702 case TYPE_CODE_STRUCT:
10703 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10704 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10705 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10706 break;
10707 default:
323e0a4a 10708 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10709 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10710 break;
10711 }
10712 }
10713
78134374 10714 switch (type->code ())
4c4b4cd2
PH
10715 {
10716 case TYPE_CODE_FUNC:
10717 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10718 {
7022349d
PA
10719 if (TYPE_TARGET_TYPE (type) == NULL)
10720 error_call_unknown_return_type (NULL);
10721 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10722 }
e71585ff
PA
10723 return call_function_by_hand (argvec[0], NULL,
10724 gdb::make_array_view (argvec + 1,
10725 nargs));
c8ea1972
PH
10726 case TYPE_CODE_INTERNAL_FUNCTION:
10727 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10728 /* We don't know anything about what the internal
10729 function might return, but we have to return
10730 something. */
10731 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10732 not_lval);
10733 else
10734 return call_internal_function (exp->gdbarch, exp->language_defn,
10735 argvec[0], nargs, argvec + 1);
10736
4c4b4cd2
PH
10737 case TYPE_CODE_STRUCT:
10738 {
10739 int arity;
10740
4c4b4cd2
PH
10741 arity = ada_array_arity (type);
10742 type = ada_array_element_type (type, nargs);
10743 if (type == NULL)
323e0a4a 10744 error (_("cannot subscript or call a record"));
4c4b4cd2 10745 if (arity != nargs)
323e0a4a 10746 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10747 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10748 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10749 return
10750 unwrap_value (ada_value_subscript
10751 (argvec[0], nargs, argvec + 1));
10752 }
10753 case TYPE_CODE_ARRAY:
10754 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10755 {
10756 type = ada_array_element_type (type, nargs);
10757 if (type == NULL)
323e0a4a 10758 error (_("element type of array unknown"));
4c4b4cd2 10759 else
0a07e705 10760 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10761 }
10762 return
10763 unwrap_value (ada_value_subscript
10764 (ada_coerce_to_simple_array (argvec[0]),
10765 nargs, argvec + 1));
10766 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10767 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10768 {
deede10c 10769 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10770 type = ada_array_element_type (type, nargs);
10771 if (type == NULL)
323e0a4a 10772 error (_("element type of array unknown"));
4c4b4cd2 10773 else
0a07e705 10774 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10775 }
10776 return
deede10c
JB
10777 unwrap_value (ada_value_ptr_subscript (argvec[0],
10778 nargs, argvec + 1));
4c4b4cd2
PH
10779
10780 default:
e1d5a0d2
PH
10781 error (_("Attempt to index or call something other than an "
10782 "array or function"));
4c4b4cd2
PH
10783 }
10784
10785 case TERNOP_SLICE:
10786 {
10787 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10788 struct value *low_bound_val =
10789 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10790 struct value *high_bound_val =
10791 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10792 LONGEST low_bound;
10793 LONGEST high_bound;
5b4ee69b 10794
994b9211
AC
10795 low_bound_val = coerce_ref (low_bound_val);
10796 high_bound_val = coerce_ref (high_bound_val);
aa715135
JG
10797 low_bound = value_as_long (low_bound_val);
10798 high_bound = value_as_long (high_bound_val);
963a6417 10799
4c4b4cd2
PH
10800 if (noside == EVAL_SKIP)
10801 goto nosideret;
10802
4c4b4cd2
PH
10803 /* If this is a reference to an aligner type, then remove all
10804 the aligners. */
78134374 10805 if (value_type (array)->code () == TYPE_CODE_REF
df407dfe
AC
10806 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10807 TYPE_TARGET_TYPE (value_type (array)) =
10808 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10809
ad82864c 10810 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10811 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10812
10813 /* If this is a reference to an array or an array lvalue,
10814 convert to a pointer. */
78134374
SM
10815 if (value_type (array)->code () == TYPE_CODE_REF
10816 || (value_type (array)->code () == TYPE_CODE_ARRAY
4c4b4cd2
PH
10817 && VALUE_LVAL (array) == lval_memory))
10818 array = value_addr (array);
10819
1265e4aa 10820 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10821 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10822 (value_type (array))))
bff8c71f
TT
10823 return empty_array (ada_type_of_array (array, 0), low_bound,
10824 high_bound);
4c4b4cd2
PH
10825
10826 array = ada_coerce_to_simple_array_ptr (array);
10827
714e53ab
PH
10828 /* If we have more than one level of pointer indirection,
10829 dereference the value until we get only one level. */
78134374
SM
10830 while (value_type (array)->code () == TYPE_CODE_PTR
10831 && (TYPE_TARGET_TYPE (value_type (array))->code ()
714e53ab
PH
10832 == TYPE_CODE_PTR))
10833 array = value_ind (array);
10834
10835 /* Make sure we really do have an array type before going further,
10836 to avoid a SEGV when trying to get the index type or the target
10837 type later down the road if the debug info generated by
10838 the compiler is incorrect or incomplete. */
df407dfe 10839 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10840 error (_("cannot take slice of non-array"));
714e53ab 10841
78134374 10842 if (ada_check_typedef (value_type (array))->code ()
828292f2 10843 == TYPE_CODE_PTR)
4c4b4cd2 10844 {
828292f2
JB
10845 struct type *type0 = ada_check_typedef (value_type (array));
10846
0b5d8877 10847 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
bff8c71f 10848 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
4c4b4cd2
PH
10849 else
10850 {
10851 struct type *arr_type0 =
828292f2 10852 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10853
f5938064
JG
10854 return ada_value_slice_from_ptr (array, arr_type0,
10855 longest_to_int (low_bound),
10856 longest_to_int (high_bound));
4c4b4cd2
PH
10857 }
10858 }
10859 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10860 return array;
10861 else if (high_bound < low_bound)
bff8c71f 10862 return empty_array (value_type (array), low_bound, high_bound);
4c4b4cd2 10863 else
529cad9c
PH
10864 return ada_value_slice (array, longest_to_int (low_bound),
10865 longest_to_int (high_bound));
4c4b4cd2 10866 }
14f9c5c9 10867
4c4b4cd2
PH
10868 case UNOP_IN_RANGE:
10869 (*pos) += 2;
10870 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10871 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10872
14f9c5c9 10873 if (noside == EVAL_SKIP)
4c4b4cd2 10874 goto nosideret;
14f9c5c9 10875
78134374 10876 switch (type->code ())
4c4b4cd2
PH
10877 {
10878 default:
e1d5a0d2
PH
10879 lim_warning (_("Membership test incompletely implemented; "
10880 "always returns true"));
fbb06eb1
UW
10881 type = language_bool_type (exp->language_defn, exp->gdbarch);
10882 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10883
10884 case TYPE_CODE_RANGE:
030b4912
UW
10885 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10886 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10887 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10888 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10889 type = language_bool_type (exp->language_defn, exp->gdbarch);
10890 return
10891 value_from_longest (type,
4c4b4cd2
PH
10892 (value_less (arg1, arg3)
10893 || value_equal (arg1, arg3))
10894 && (value_less (arg2, arg1)
10895 || value_equal (arg2, arg1)));
10896 }
10897
10898 case BINOP_IN_BOUNDS:
14f9c5c9 10899 (*pos) += 2;
4c4b4cd2
PH
10900 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10901 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10902
4c4b4cd2
PH
10903 if (noside == EVAL_SKIP)
10904 goto nosideret;
14f9c5c9 10905
4c4b4cd2 10906 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10907 {
10908 type = language_bool_type (exp->language_defn, exp->gdbarch);
10909 return value_zero (type, not_lval);
10910 }
14f9c5c9 10911
4c4b4cd2 10912 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10913
1eea4ebd
UW
10914 type = ada_index_type (value_type (arg2), tem, "range");
10915 if (!type)
10916 type = value_type (arg1);
14f9c5c9 10917
1eea4ebd
UW
10918 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10919 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10920
f44316fa
UW
10921 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10922 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10923 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10924 return
fbb06eb1 10925 value_from_longest (type,
4c4b4cd2
PH
10926 (value_less (arg1, arg3)
10927 || value_equal (arg1, arg3))
10928 && (value_less (arg2, arg1)
10929 || value_equal (arg2, arg1)));
10930
10931 case TERNOP_IN_RANGE:
10932 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10933 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10934 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10935
10936 if (noside == EVAL_SKIP)
10937 goto nosideret;
10938
f44316fa
UW
10939 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10940 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10941 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10942 return
fbb06eb1 10943 value_from_longest (type,
4c4b4cd2
PH
10944 (value_less (arg1, arg3)
10945 || value_equal (arg1, arg3))
10946 && (value_less (arg2, arg1)
10947 || value_equal (arg2, arg1)));
10948
10949 case OP_ATR_FIRST:
10950 case OP_ATR_LAST:
10951 case OP_ATR_LENGTH:
10952 {
76a01679 10953 struct type *type_arg;
5b4ee69b 10954
76a01679
JB
10955 if (exp->elts[*pos].opcode == OP_TYPE)
10956 {
10957 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10958 arg1 = NULL;
5bc23cb3 10959 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10960 }
10961 else
10962 {
10963 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10964 type_arg = NULL;
10965 }
10966
10967 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10968 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10969 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10970 *pos += 4;
10971
10972 if (noside == EVAL_SKIP)
10973 goto nosideret;
680e1bee
TT
10974 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10975 {
10976 if (type_arg == NULL)
10977 type_arg = value_type (arg1);
76a01679 10978
680e1bee
TT
10979 if (ada_is_constrained_packed_array_type (type_arg))
10980 type_arg = decode_constrained_packed_array_type (type_arg);
10981
10982 if (!discrete_type_p (type_arg))
10983 {
10984 switch (op)
10985 {
10986 default: /* Should never happen. */
10987 error (_("unexpected attribute encountered"));
10988 case OP_ATR_FIRST:
10989 case OP_ATR_LAST:
10990 type_arg = ada_index_type (type_arg, tem,
10991 ada_attribute_name (op));
10992 break;
10993 case OP_ATR_LENGTH:
10994 type_arg = builtin_type (exp->gdbarch)->builtin_int;
10995 break;
10996 }
10997 }
10998
10999 return value_zero (type_arg, not_lval);
11000 }
11001 else if (type_arg == NULL)
76a01679
JB
11002 {
11003 arg1 = ada_coerce_ref (arg1);
11004
ad82864c 11005 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
11006 arg1 = ada_coerce_to_simple_array (arg1);
11007
aa4fb036 11008 if (op == OP_ATR_LENGTH)
1eea4ebd 11009 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11010 else
11011 {
11012 type = ada_index_type (value_type (arg1), tem,
11013 ada_attribute_name (op));
11014 if (type == NULL)
11015 type = builtin_type (exp->gdbarch)->builtin_int;
11016 }
76a01679 11017
76a01679
JB
11018 switch (op)
11019 {
11020 default: /* Should never happen. */
323e0a4a 11021 error (_("unexpected attribute encountered"));
76a01679 11022 case OP_ATR_FIRST:
1eea4ebd
UW
11023 return value_from_longest
11024 (type, ada_array_bound (arg1, tem, 0));
76a01679 11025 case OP_ATR_LAST:
1eea4ebd
UW
11026 return value_from_longest
11027 (type, ada_array_bound (arg1, tem, 1));
76a01679 11028 case OP_ATR_LENGTH:
1eea4ebd
UW
11029 return value_from_longest
11030 (type, ada_array_length (arg1, tem));
76a01679
JB
11031 }
11032 }
11033 else if (discrete_type_p (type_arg))
11034 {
11035 struct type *range_type;
0d5cff50 11036 const char *name = ada_type_name (type_arg);
5b4ee69b 11037
76a01679 11038 range_type = NULL;
78134374 11039 if (name != NULL && type_arg->code () != TYPE_CODE_ENUM)
28c85d6c 11040 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
11041 if (range_type == NULL)
11042 range_type = type_arg;
11043 switch (op)
11044 {
11045 default:
323e0a4a 11046 error (_("unexpected attribute encountered"));
76a01679 11047 case OP_ATR_FIRST:
690cc4eb 11048 return value_from_longest
43bbcdc2 11049 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 11050 case OP_ATR_LAST:
690cc4eb 11051 return value_from_longest
43bbcdc2 11052 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 11053 case OP_ATR_LENGTH:
323e0a4a 11054 error (_("the 'length attribute applies only to array types"));
76a01679
JB
11055 }
11056 }
78134374 11057 else if (type_arg->code () == TYPE_CODE_FLT)
323e0a4a 11058 error (_("unimplemented type attribute"));
76a01679
JB
11059 else
11060 {
11061 LONGEST low, high;
11062
ad82864c
JB
11063 if (ada_is_constrained_packed_array_type (type_arg))
11064 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 11065
aa4fb036 11066 if (op == OP_ATR_LENGTH)
1eea4ebd 11067 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11068 else
11069 {
11070 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
11071 if (type == NULL)
11072 type = builtin_type (exp->gdbarch)->builtin_int;
11073 }
1eea4ebd 11074
76a01679
JB
11075 switch (op)
11076 {
11077 default:
323e0a4a 11078 error (_("unexpected attribute encountered"));
76a01679 11079 case OP_ATR_FIRST:
1eea4ebd 11080 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
11081 return value_from_longest (type, low);
11082 case OP_ATR_LAST:
1eea4ebd 11083 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11084 return value_from_longest (type, high);
11085 case OP_ATR_LENGTH:
1eea4ebd
UW
11086 low = ada_array_bound_from_type (type_arg, tem, 0);
11087 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11088 return value_from_longest (type, high - low + 1);
11089 }
11090 }
14f9c5c9
AS
11091 }
11092
4c4b4cd2
PH
11093 case OP_ATR_TAG:
11094 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11095 if (noside == EVAL_SKIP)
76a01679 11096 goto nosideret;
4c4b4cd2
PH
11097
11098 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11099 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
11100
11101 return ada_value_tag (arg1);
11102
11103 case OP_ATR_MIN:
11104 case OP_ATR_MAX:
11105 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11106 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11107 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11108 if (noside == EVAL_SKIP)
76a01679 11109 goto nosideret;
d2e4a39e 11110 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11111 return value_zero (value_type (arg1), not_lval);
14f9c5c9 11112 else
f44316fa
UW
11113 {
11114 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11115 return value_binop (arg1, arg2,
11116 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
11117 }
14f9c5c9 11118
4c4b4cd2
PH
11119 case OP_ATR_MODULUS:
11120 {
31dedfee 11121 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 11122
5b4ee69b 11123 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
11124 if (noside == EVAL_SKIP)
11125 goto nosideret;
4c4b4cd2 11126
76a01679 11127 if (!ada_is_modular_type (type_arg))
323e0a4a 11128 error (_("'modulus must be applied to modular type"));
4c4b4cd2 11129
76a01679
JB
11130 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
11131 ada_modulus (type_arg));
4c4b4cd2
PH
11132 }
11133
11134
11135 case OP_ATR_POS:
11136 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11137 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11138 if (noside == EVAL_SKIP)
76a01679 11139 goto nosideret;
3cb382c9
UW
11140 type = builtin_type (exp->gdbarch)->builtin_int;
11141 if (noside == EVAL_AVOID_SIDE_EFFECTS)
11142 return value_zero (type, not_lval);
14f9c5c9 11143 else
3cb382c9 11144 return value_pos_atr (type, arg1);
14f9c5c9 11145
4c4b4cd2
PH
11146 case OP_ATR_SIZE:
11147 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
11148 type = value_type (arg1);
11149
11150 /* If the argument is a reference, then dereference its type, since
11151 the user is really asking for the size of the actual object,
11152 not the size of the pointer. */
78134374 11153 if (type->code () == TYPE_CODE_REF)
8c1c099f
JB
11154 type = TYPE_TARGET_TYPE (type);
11155
4c4b4cd2 11156 if (noside == EVAL_SKIP)
76a01679 11157 goto nosideret;
4c4b4cd2 11158 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 11159 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 11160 else
22601c15 11161 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 11162 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
11163
11164 case OP_ATR_VAL:
11165 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 11166 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 11167 type = exp->elts[pc + 2].type;
14f9c5c9 11168 if (noside == EVAL_SKIP)
76a01679 11169 goto nosideret;
4c4b4cd2 11170 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11171 return value_zero (type, not_lval);
4c4b4cd2 11172 else
76a01679 11173 return value_val_atr (type, arg1);
4c4b4cd2
PH
11174
11175 case BINOP_EXP:
11176 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11177 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11178 if (noside == EVAL_SKIP)
11179 goto nosideret;
11180 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11181 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11182 else
f44316fa
UW
11183 {
11184 /* For integer exponentiation operations,
11185 only promote the first argument. */
11186 if (is_integral_type (value_type (arg2)))
11187 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11188 else
11189 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11190
11191 return value_binop (arg1, arg2, op);
11192 }
4c4b4cd2
PH
11193
11194 case UNOP_PLUS:
11195 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11196 if (noside == EVAL_SKIP)
11197 goto nosideret;
11198 else
11199 return arg1;
11200
11201 case UNOP_ABS:
11202 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11203 if (noside == EVAL_SKIP)
11204 goto nosideret;
f44316fa 11205 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11206 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 11207 return value_neg (arg1);
14f9c5c9 11208 else
4c4b4cd2 11209 return arg1;
14f9c5c9
AS
11210
11211 case UNOP_IND:
5ec18f2b 11212 preeval_pos = *pos;
6b0d7253 11213 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 11214 if (noside == EVAL_SKIP)
4c4b4cd2 11215 goto nosideret;
df407dfe 11216 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11217 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
11218 {
11219 if (ada_is_array_descriptor_type (type))
11220 /* GDB allows dereferencing GNAT array descriptors. */
11221 {
11222 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 11223
4c4b4cd2 11224 if (arrType == NULL)
323e0a4a 11225 error (_("Attempt to dereference null array pointer."));
00a4c844 11226 return value_at_lazy (arrType, 0);
4c4b4cd2 11227 }
78134374
SM
11228 else if (type->code () == TYPE_CODE_PTR
11229 || type->code () == TYPE_CODE_REF
4c4b4cd2 11230 /* In C you can dereference an array to get the 1st elt. */
78134374 11231 || type->code () == TYPE_CODE_ARRAY)
714e53ab 11232 {
5ec18f2b
JG
11233 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11234 only be determined by inspecting the object's tag.
11235 This means that we need to evaluate completely the
11236 expression in order to get its type. */
11237
78134374
SM
11238 if ((type->code () == TYPE_CODE_REF
11239 || type->code () == TYPE_CODE_PTR)
5ec18f2b
JG
11240 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11241 {
11242 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11243 EVAL_NORMAL);
11244 type = value_type (ada_value_ind (arg1));
11245 }
11246 else
11247 {
11248 type = to_static_fixed_type
11249 (ada_aligned_type
11250 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11251 }
c1b5a1a6 11252 ada_ensure_varsize_limit (type);
714e53ab
PH
11253 return value_zero (type, lval_memory);
11254 }
78134374 11255 else if (type->code () == TYPE_CODE_INT)
6b0d7253
JB
11256 {
11257 /* GDB allows dereferencing an int. */
11258 if (expect_type == NULL)
11259 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11260 lval_memory);
11261 else
11262 {
11263 expect_type =
11264 to_static_fixed_type (ada_aligned_type (expect_type));
11265 return value_zero (expect_type, lval_memory);
11266 }
11267 }
4c4b4cd2 11268 else
323e0a4a 11269 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11270 }
0963b4bd 11271 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11272 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11273
78134374 11274 if (type->code () == TYPE_CODE_INT)
96967637
JB
11275 /* GDB allows dereferencing an int. If we were given
11276 the expect_type, then use that as the target type.
11277 Otherwise, assume that the target type is an int. */
11278 {
11279 if (expect_type != NULL)
11280 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11281 arg1));
11282 else
11283 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11284 (CORE_ADDR) value_as_address (arg1));
11285 }
6b0d7253 11286
4c4b4cd2
PH
11287 if (ada_is_array_descriptor_type (type))
11288 /* GDB allows dereferencing GNAT array descriptors. */
11289 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11290 else
4c4b4cd2 11291 return ada_value_ind (arg1);
14f9c5c9
AS
11292
11293 case STRUCTOP_STRUCT:
11294 tem = longest_to_int (exp->elts[pc + 1].longconst);
11295 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11296 preeval_pos = *pos;
14f9c5c9
AS
11297 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11298 if (noside == EVAL_SKIP)
4c4b4cd2 11299 goto nosideret;
14f9c5c9 11300 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11301 {
df407dfe 11302 struct type *type1 = value_type (arg1);
5b4ee69b 11303
76a01679
JB
11304 if (ada_is_tagged_type (type1, 1))
11305 {
11306 type = ada_lookup_struct_elt_type (type1,
11307 &exp->elts[pc + 2].string,
988f6b3d 11308 1, 1);
5ec18f2b
JG
11309
11310 /* If the field is not found, check if it exists in the
11311 extension of this object's type. This means that we
11312 need to evaluate completely the expression. */
11313
76a01679 11314 if (type == NULL)
5ec18f2b
JG
11315 {
11316 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11317 EVAL_NORMAL);
11318 arg1 = ada_value_struct_elt (arg1,
11319 &exp->elts[pc + 2].string,
11320 0);
11321 arg1 = unwrap_value (arg1);
11322 type = value_type (ada_to_fixed_value (arg1));
11323 }
76a01679
JB
11324 }
11325 else
11326 type =
11327 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
988f6b3d 11328 0);
76a01679
JB
11329
11330 return value_zero (ada_aligned_type (type), lval_memory);
11331 }
14f9c5c9 11332 else
a579cd9a
MW
11333 {
11334 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11335 arg1 = unwrap_value (arg1);
11336 return ada_to_fixed_value (arg1);
11337 }
284614f0 11338
14f9c5c9 11339 case OP_TYPE:
4c4b4cd2
PH
11340 /* The value is not supposed to be used. This is here to make it
11341 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11342 (*pos) += 2;
11343 if (noside == EVAL_SKIP)
4c4b4cd2 11344 goto nosideret;
14f9c5c9 11345 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11346 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11347 else
323e0a4a 11348 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11349
11350 case OP_AGGREGATE:
11351 case OP_CHOICES:
11352 case OP_OTHERS:
11353 case OP_DISCRETE_RANGE:
11354 case OP_POSITIONAL:
11355 case OP_NAME:
11356 if (noside == EVAL_NORMAL)
11357 switch (op)
11358 {
11359 case OP_NAME:
11360 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11361 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11362 case OP_AGGREGATE:
11363 error (_("Aggregates only allowed on the right of an assignment"));
11364 default:
0963b4bd
MS
11365 internal_error (__FILE__, __LINE__,
11366 _("aggregate apparently mangled"));
52ce6436
PH
11367 }
11368
11369 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11370 *pos += oplen - 1;
11371 for (tem = 0; tem < nargs; tem += 1)
11372 ada_evaluate_subexp (NULL, exp, pos, noside);
11373 goto nosideret;
14f9c5c9
AS
11374 }
11375
11376nosideret:
ced9779b 11377 return eval_skip_value (exp);
14f9c5c9 11378}
14f9c5c9 11379\f
d2e4a39e 11380
4c4b4cd2 11381 /* Fixed point */
14f9c5c9
AS
11382
11383/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11384 type name that encodes the 'small and 'delta information.
4c4b4cd2 11385 Otherwise, return NULL. */
14f9c5c9 11386
d2e4a39e 11387static const char *
b2188a06 11388gnat_encoded_fixed_type_info (struct type *type)
14f9c5c9 11389{
d2e4a39e 11390 const char *name = ada_type_name (type);
78134374 11391 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : type->code ();
14f9c5c9 11392
d2e4a39e
AS
11393 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11394 {
14f9c5c9 11395 const char *tail = strstr (name, "___XF_");
5b4ee69b 11396
14f9c5c9 11397 if (tail == NULL)
4c4b4cd2 11398 return NULL;
d2e4a39e 11399 else
4c4b4cd2 11400 return tail + 5;
14f9c5c9
AS
11401 }
11402 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
b2188a06 11403 return gnat_encoded_fixed_type_info (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
11404 else
11405 return NULL;
11406}
11407
4c4b4cd2 11408/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11409
11410int
b2188a06 11411ada_is_gnat_encoded_fixed_point_type (struct type *type)
14f9c5c9 11412{
b2188a06 11413 return gnat_encoded_fixed_type_info (type) != NULL;
14f9c5c9
AS
11414}
11415
4c4b4cd2
PH
11416/* Return non-zero iff TYPE represents a System.Address type. */
11417
11418int
11419ada_is_system_address_type (struct type *type)
11420{
7d93a1e0 11421 return (type->name () && strcmp (type->name (), "system__address") == 0);
4c4b4cd2
PH
11422}
11423
14f9c5c9 11424/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11425 type, return the target floating-point type to be used to represent
11426 of this type during internal computation. */
11427
11428static struct type *
11429ada_scaling_type (struct type *type)
11430{
11431 return builtin_type (get_type_arch (type))->builtin_long_double;
11432}
11433
11434/* Assuming that TYPE is the representation of an Ada fixed-point
11435 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11436 delta cannot be determined. */
14f9c5c9 11437
50eff16b 11438struct value *
b2188a06 11439gnat_encoded_fixed_point_delta (struct type *type)
14f9c5c9 11440{
b2188a06 11441 const char *encoding = gnat_encoded_fixed_type_info (type);
50eff16b
UW
11442 struct type *scale_type = ada_scaling_type (type);
11443
11444 long long num, den;
11445
11446 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11447 return nullptr;
d2e4a39e 11448 else
50eff16b
UW
11449 return value_binop (value_from_longest (scale_type, num),
11450 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11451}
11452
b2188a06
JB
11453/* Assuming that ada_is_gnat_encoded_fixed_point_type (TYPE), return
11454 the scaling factor ('SMALL value) associated with the type. */
14f9c5c9 11455
50eff16b
UW
11456struct value *
11457ada_scaling_factor (struct type *type)
14f9c5c9 11458{
b2188a06 11459 const char *encoding = gnat_encoded_fixed_type_info (type);
50eff16b
UW
11460 struct type *scale_type = ada_scaling_type (type);
11461
11462 long long num0, den0, num1, den1;
14f9c5c9 11463 int n;
d2e4a39e 11464
50eff16b 11465 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11466 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11467
11468 if (n < 2)
50eff16b 11469 return value_from_longest (scale_type, 1);
14f9c5c9 11470 else if (n == 4)
50eff16b
UW
11471 return value_binop (value_from_longest (scale_type, num1),
11472 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11473 else
50eff16b
UW
11474 return value_binop (value_from_longest (scale_type, num0),
11475 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11476}
11477
14f9c5c9 11478\f
d2e4a39e 11479
4c4b4cd2 11480 /* Range types */
14f9c5c9
AS
11481
11482/* Scan STR beginning at position K for a discriminant name, and
11483 return the value of that discriminant field of DVAL in *PX. If
11484 PNEW_K is not null, put the position of the character beyond the
11485 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11486 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11487
11488static int
108d56a4 11489scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
76a01679 11490 int *pnew_k)
14f9c5c9
AS
11491{
11492 static char *bound_buffer = NULL;
11493 static size_t bound_buffer_len = 0;
5da1a4d3 11494 const char *pstart, *pend, *bound;
d2e4a39e 11495 struct value *bound_val;
14f9c5c9
AS
11496
11497 if (dval == NULL || str == NULL || str[k] == '\0')
11498 return 0;
11499
5da1a4d3
SM
11500 pstart = str + k;
11501 pend = strstr (pstart, "__");
14f9c5c9
AS
11502 if (pend == NULL)
11503 {
5da1a4d3 11504 bound = pstart;
14f9c5c9
AS
11505 k += strlen (bound);
11506 }
d2e4a39e 11507 else
14f9c5c9 11508 {
5da1a4d3
SM
11509 int len = pend - pstart;
11510
11511 /* Strip __ and beyond. */
11512 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11513 strncpy (bound_buffer, pstart, len);
11514 bound_buffer[len] = '\0';
11515
14f9c5c9 11516 bound = bound_buffer;
d2e4a39e 11517 k = pend - str;
14f9c5c9 11518 }
d2e4a39e 11519
df407dfe 11520 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11521 if (bound_val == NULL)
11522 return 0;
11523
11524 *px = value_as_long (bound_val);
11525 if (pnew_k != NULL)
11526 *pnew_k = k;
11527 return 1;
11528}
11529
11530/* Value of variable named NAME in the current environment. If
11531 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11532 otherwise causes an error with message ERR_MSG. */
11533
d2e4a39e 11534static struct value *
edb0c9cb 11535get_var_value (const char *name, const char *err_msg)
14f9c5c9 11536{
b5ec771e 11537 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11538
54d343a2 11539 std::vector<struct block_symbol> syms;
b5ec771e
PA
11540 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11541 get_selected_block (0),
11542 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11543
11544 if (nsyms != 1)
11545 {
11546 if (err_msg == NULL)
4c4b4cd2 11547 return 0;
14f9c5c9 11548 else
8a3fe4f8 11549 error (("%s"), err_msg);
14f9c5c9
AS
11550 }
11551
54d343a2 11552 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11553}
d2e4a39e 11554
edb0c9cb
PA
11555/* Value of integer variable named NAME in the current environment.
11556 If no such variable is found, returns false. Otherwise, sets VALUE
11557 to the variable's value and returns true. */
4c4b4cd2 11558
edb0c9cb
PA
11559bool
11560get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11561{
4c4b4cd2 11562 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11563
14f9c5c9 11564 if (var_val == 0)
edb0c9cb
PA
11565 return false;
11566
11567 value = value_as_long (var_val);
11568 return true;
14f9c5c9 11569}
d2e4a39e 11570
14f9c5c9
AS
11571
11572/* Return a range type whose base type is that of the range type named
11573 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11574 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11575 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11576 corresponding range type from debug information; fall back to using it
11577 if symbol lookup fails. If a new type must be created, allocate it
11578 like ORIG_TYPE was. The bounds information, in general, is encoded
11579 in NAME, the base type given in the named range type. */
14f9c5c9 11580
d2e4a39e 11581static struct type *
28c85d6c 11582to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11583{
0d5cff50 11584 const char *name;
14f9c5c9 11585 struct type *base_type;
108d56a4 11586 const char *subtype_info;
14f9c5c9 11587
28c85d6c 11588 gdb_assert (raw_type != NULL);
7d93a1e0 11589 gdb_assert (raw_type->name () != NULL);
dddfab26 11590
78134374 11591 if (raw_type->code () == TYPE_CODE_RANGE)
14f9c5c9
AS
11592 base_type = TYPE_TARGET_TYPE (raw_type);
11593 else
11594 base_type = raw_type;
11595
7d93a1e0 11596 name = raw_type->name ();
14f9c5c9
AS
11597 subtype_info = strstr (name, "___XD");
11598 if (subtype_info == NULL)
690cc4eb 11599 {
43bbcdc2
PH
11600 LONGEST L = ada_discrete_type_low_bound (raw_type);
11601 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11602
690cc4eb
PH
11603 if (L < INT_MIN || U > INT_MAX)
11604 return raw_type;
11605 else
0c9c3474
SA
11606 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11607 L, U);
690cc4eb 11608 }
14f9c5c9
AS
11609 else
11610 {
11611 static char *name_buf = NULL;
11612 static size_t name_len = 0;
11613 int prefix_len = subtype_info - name;
11614 LONGEST L, U;
11615 struct type *type;
108d56a4 11616 const char *bounds_str;
14f9c5c9
AS
11617 int n;
11618
11619 GROW_VECT (name_buf, name_len, prefix_len + 5);
11620 strncpy (name_buf, name, prefix_len);
11621 name_buf[prefix_len] = '\0';
11622
11623 subtype_info += 5;
11624 bounds_str = strchr (subtype_info, '_');
11625 n = 1;
11626
d2e4a39e 11627 if (*subtype_info == 'L')
4c4b4cd2
PH
11628 {
11629 if (!ada_scan_number (bounds_str, n, &L, &n)
11630 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11631 return raw_type;
11632 if (bounds_str[n] == '_')
11633 n += 2;
0963b4bd 11634 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11635 n += 1;
11636 subtype_info += 1;
11637 }
d2e4a39e 11638 else
4c4b4cd2 11639 {
4c4b4cd2 11640 strcpy (name_buf + prefix_len, "___L");
edb0c9cb 11641 if (!get_int_var_value (name_buf, L))
4c4b4cd2 11642 {
323e0a4a 11643 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11644 L = 1;
11645 }
11646 }
14f9c5c9 11647
d2e4a39e 11648 if (*subtype_info == 'U')
4c4b4cd2
PH
11649 {
11650 if (!ada_scan_number (bounds_str, n, &U, &n)
11651 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11652 return raw_type;
11653 }
d2e4a39e 11654 else
4c4b4cd2 11655 {
4c4b4cd2 11656 strcpy (name_buf + prefix_len, "___U");
edb0c9cb 11657 if (!get_int_var_value (name_buf, U))
4c4b4cd2 11658 {
323e0a4a 11659 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11660 U = L;
11661 }
11662 }
14f9c5c9 11663
0c9c3474
SA
11664 type = create_static_range_type (alloc_type_copy (raw_type),
11665 base_type, L, U);
f5a91472
JB
11666 /* create_static_range_type alters the resulting type's length
11667 to match the size of the base_type, which is not what we want.
11668 Set it back to the original range type's length. */
11669 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d0e39ea2 11670 type->set_name (name);
14f9c5c9
AS
11671 return type;
11672 }
11673}
11674
4c4b4cd2
PH
11675/* True iff NAME is the name of a range type. */
11676
14f9c5c9 11677int
d2e4a39e 11678ada_is_range_type_name (const char *name)
14f9c5c9
AS
11679{
11680 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11681}
14f9c5c9 11682\f
d2e4a39e 11683
4c4b4cd2
PH
11684 /* Modular types */
11685
11686/* True iff TYPE is an Ada modular type. */
14f9c5c9 11687
14f9c5c9 11688int
d2e4a39e 11689ada_is_modular_type (struct type *type)
14f9c5c9 11690{
18af8284 11691 struct type *subranged_type = get_base_type (type);
14f9c5c9 11692
78134374
SM
11693 return (subranged_type != NULL && type->code () == TYPE_CODE_RANGE
11694 && subranged_type->code () == TYPE_CODE_INT
4c4b4cd2 11695 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11696}
11697
4c4b4cd2
PH
11698/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11699
61ee279c 11700ULONGEST
0056e4d5 11701ada_modulus (struct type *type)
14f9c5c9 11702{
43bbcdc2 11703 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11704}
d2e4a39e 11705\f
f7f9143b
JB
11706
11707/* Ada exception catchpoint support:
11708 ---------------------------------
11709
11710 We support 3 kinds of exception catchpoints:
11711 . catchpoints on Ada exceptions
11712 . catchpoints on unhandled Ada exceptions
11713 . catchpoints on failed assertions
11714
11715 Exceptions raised during failed assertions, or unhandled exceptions
11716 could perfectly be caught with the general catchpoint on Ada exceptions.
11717 However, we can easily differentiate these two special cases, and having
11718 the option to distinguish these two cases from the rest can be useful
11719 to zero-in on certain situations.
11720
11721 Exception catchpoints are a specialized form of breakpoint,
11722 since they rely on inserting breakpoints inside known routines
11723 of the GNAT runtime. The implementation therefore uses a standard
11724 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11725 of breakpoint_ops.
11726
0259addd
JB
11727 Support in the runtime for exception catchpoints have been changed
11728 a few times already, and these changes affect the implementation
11729 of these catchpoints. In order to be able to support several
11730 variants of the runtime, we use a sniffer that will determine
28010a5d 11731 the runtime variant used by the program being debugged. */
f7f9143b 11732
82eacd52
JB
11733/* Ada's standard exceptions.
11734
11735 The Ada 83 standard also defined Numeric_Error. But there so many
11736 situations where it was unclear from the Ada 83 Reference Manual
11737 (RM) whether Constraint_Error or Numeric_Error should be raised,
11738 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11739 Interpretation saying that anytime the RM says that Numeric_Error
11740 should be raised, the implementation may raise Constraint_Error.
11741 Ada 95 went one step further and pretty much removed Numeric_Error
11742 from the list of standard exceptions (it made it a renaming of
11743 Constraint_Error, to help preserve compatibility when compiling
11744 an Ada83 compiler). As such, we do not include Numeric_Error from
11745 this list of standard exceptions. */
3d0b0fa3 11746
a121b7c1 11747static const char *standard_exc[] = {
3d0b0fa3
JB
11748 "constraint_error",
11749 "program_error",
11750 "storage_error",
11751 "tasking_error"
11752};
11753
0259addd
JB
11754typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11755
11756/* A structure that describes how to support exception catchpoints
11757 for a given executable. */
11758
11759struct exception_support_info
11760{
11761 /* The name of the symbol to break on in order to insert
11762 a catchpoint on exceptions. */
11763 const char *catch_exception_sym;
11764
11765 /* The name of the symbol to break on in order to insert
11766 a catchpoint on unhandled exceptions. */
11767 const char *catch_exception_unhandled_sym;
11768
11769 /* The name of the symbol to break on in order to insert
11770 a catchpoint on failed assertions. */
11771 const char *catch_assert_sym;
11772
9f757bf7
XR
11773 /* The name of the symbol to break on in order to insert
11774 a catchpoint on exception handling. */
11775 const char *catch_handlers_sym;
11776
0259addd
JB
11777 /* Assuming that the inferior just triggered an unhandled exception
11778 catchpoint, this function is responsible for returning the address
11779 in inferior memory where the name of that exception is stored.
11780 Return zero if the address could not be computed. */
11781 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11782};
11783
11784static CORE_ADDR ada_unhandled_exception_name_addr (void);
11785static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11786
11787/* The following exception support info structure describes how to
11788 implement exception catchpoints with the latest version of the
ca683e3a 11789 Ada runtime (as of 2019-08-??). */
0259addd
JB
11790
11791static const struct exception_support_info default_exception_support_info =
ca683e3a
AO
11792{
11793 "__gnat_debug_raise_exception", /* catch_exception_sym */
11794 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11795 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11796 "__gnat_begin_handler_v1", /* catch_handlers_sym */
11797 ada_unhandled_exception_name_addr
11798};
11799
11800/* The following exception support info structure describes how to
11801 implement exception catchpoints with an earlier version of the
11802 Ada runtime (as of 2007-03-06) using v0 of the EH ABI. */
11803
11804static const struct exception_support_info exception_support_info_v0 =
0259addd
JB
11805{
11806 "__gnat_debug_raise_exception", /* catch_exception_sym */
11807 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11808 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11809 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11810 ada_unhandled_exception_name_addr
11811};
11812
11813/* The following exception support info structure describes how to
11814 implement exception catchpoints with a slightly older version
11815 of the Ada runtime. */
11816
11817static const struct exception_support_info exception_support_info_fallback =
11818{
11819 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11820 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11821 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11822 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11823 ada_unhandled_exception_name_addr_from_raise
11824};
11825
f17011e0
JB
11826/* Return nonzero if we can detect the exception support routines
11827 described in EINFO.
11828
11829 This function errors out if an abnormal situation is detected
11830 (for instance, if we find the exception support routines, but
11831 that support is found to be incomplete). */
11832
11833static int
11834ada_has_this_exception_support (const struct exception_support_info *einfo)
11835{
11836 struct symbol *sym;
11837
11838 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11839 that should be compiled with debugging information. As a result, we
11840 expect to find that symbol in the symtabs. */
11841
11842 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11843 if (sym == NULL)
a6af7abe
JB
11844 {
11845 /* Perhaps we did not find our symbol because the Ada runtime was
11846 compiled without debugging info, or simply stripped of it.
11847 It happens on some GNU/Linux distributions for instance, where
11848 users have to install a separate debug package in order to get
11849 the runtime's debugging info. In that situation, let the user
11850 know why we cannot insert an Ada exception catchpoint.
11851
11852 Note: Just for the purpose of inserting our Ada exception
11853 catchpoint, we could rely purely on the associated minimal symbol.
11854 But we would be operating in degraded mode anyway, since we are
11855 still lacking the debugging info needed later on to extract
11856 the name of the exception being raised (this name is printed in
11857 the catchpoint message, and is also used when trying to catch
11858 a specific exception). We do not handle this case for now. */
3b7344d5 11859 struct bound_minimal_symbol msym
1c8e84b0
JB
11860 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11861
3b7344d5 11862 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11863 error (_("Your Ada runtime appears to be missing some debugging "
11864 "information.\nCannot insert Ada exception catchpoint "
11865 "in this configuration."));
11866
11867 return 0;
11868 }
f17011e0
JB
11869
11870 /* Make sure that the symbol we found corresponds to a function. */
11871
11872 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
ca683e3a
AO
11873 {
11874 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11875 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11876 return 0;
11877 }
11878
11879 sym = standard_lookup (einfo->catch_handlers_sym, NULL, VAR_DOMAIN);
11880 if (sym == NULL)
11881 {
11882 struct bound_minimal_symbol msym
11883 = lookup_minimal_symbol (einfo->catch_handlers_sym, NULL, NULL);
11884
11885 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
11886 error (_("Your Ada runtime appears to be missing some debugging "
11887 "information.\nCannot insert Ada exception catchpoint "
11888 "in this configuration."));
11889
11890 return 0;
11891 }
11892
11893 /* Make sure that the symbol we found corresponds to a function. */
11894
11895 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11896 {
11897 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11898 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11899 return 0;
11900 }
f17011e0
JB
11901
11902 return 1;
11903}
11904
0259addd
JB
11905/* Inspect the Ada runtime and determine which exception info structure
11906 should be used to provide support for exception catchpoints.
11907
3eecfa55
JB
11908 This function will always set the per-inferior exception_info,
11909 or raise an error. */
0259addd
JB
11910
11911static void
11912ada_exception_support_info_sniffer (void)
11913{
3eecfa55 11914 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11915
11916 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11917 if (data->exception_info != NULL)
0259addd
JB
11918 return;
11919
11920 /* Check the latest (default) exception support info. */
f17011e0 11921 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11922 {
3eecfa55 11923 data->exception_info = &default_exception_support_info;
0259addd
JB
11924 return;
11925 }
11926
ca683e3a
AO
11927 /* Try the v0 exception suport info. */
11928 if (ada_has_this_exception_support (&exception_support_info_v0))
11929 {
11930 data->exception_info = &exception_support_info_v0;
11931 return;
11932 }
11933
0259addd 11934 /* Try our fallback exception suport info. */
f17011e0 11935 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11936 {
3eecfa55 11937 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11938 return;
11939 }
11940
11941 /* Sometimes, it is normal for us to not be able to find the routine
11942 we are looking for. This happens when the program is linked with
11943 the shared version of the GNAT runtime, and the program has not been
11944 started yet. Inform the user of these two possible causes if
11945 applicable. */
11946
ccefe4c4 11947 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11948 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11949
11950 /* If the symbol does not exist, then check that the program is
11951 already started, to make sure that shared libraries have been
11952 loaded. If it is not started, this may mean that the symbol is
11953 in a shared library. */
11954
e99b03dc 11955 if (inferior_ptid.pid () == 0)
0259addd
JB
11956 error (_("Unable to insert catchpoint. Try to start the program first."));
11957
11958 /* At this point, we know that we are debugging an Ada program and
11959 that the inferior has been started, but we still are not able to
0963b4bd 11960 find the run-time symbols. That can mean that we are in
0259addd
JB
11961 configurable run time mode, or that a-except as been optimized
11962 out by the linker... In any case, at this point it is not worth
11963 supporting this feature. */
11964
7dda8cff 11965 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11966}
11967
f7f9143b
JB
11968/* True iff FRAME is very likely to be that of a function that is
11969 part of the runtime system. This is all very heuristic, but is
11970 intended to be used as advice as to what frames are uninteresting
11971 to most users. */
11972
11973static int
11974is_known_support_routine (struct frame_info *frame)
11975{
692465f1 11976 enum language func_lang;
f7f9143b 11977 int i;
f35a17b5 11978 const char *fullname;
f7f9143b 11979
4ed6b5be
JB
11980 /* If this code does not have any debugging information (no symtab),
11981 This cannot be any user code. */
f7f9143b 11982
51abb421 11983 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
11984 if (sal.symtab == NULL)
11985 return 1;
11986
4ed6b5be
JB
11987 /* If there is a symtab, but the associated source file cannot be
11988 located, then assume this is not user code: Selecting a frame
11989 for which we cannot display the code would not be very helpful
11990 for the user. This should also take care of case such as VxWorks
11991 where the kernel has some debugging info provided for a few units. */
f7f9143b 11992
f35a17b5
JK
11993 fullname = symtab_to_fullname (sal.symtab);
11994 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11995 return 1;
11996
85102364 11997 /* Check the unit filename against the Ada runtime file naming.
4ed6b5be
JB
11998 We also check the name of the objfile against the name of some
11999 known system libraries that sometimes come with debugging info
12000 too. */
12001
f7f9143b
JB
12002 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
12003 {
12004 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 12005 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 12006 return 1;
eb822aa6
DE
12007 if (SYMTAB_OBJFILE (sal.symtab) != NULL
12008 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 12009 return 1;
f7f9143b
JB
12010 }
12011
4ed6b5be 12012 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 12013
c6dc63a1
TT
12014 gdb::unique_xmalloc_ptr<char> func_name
12015 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
12016 if (func_name == NULL)
12017 return 1;
12018
12019 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
12020 {
12021 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
12022 if (re_exec (func_name.get ()))
12023 return 1;
f7f9143b
JB
12024 }
12025
12026 return 0;
12027}
12028
12029/* Find the first frame that contains debugging information and that is not
12030 part of the Ada run-time, starting from FI and moving upward. */
12031
0ef643c8 12032void
f7f9143b
JB
12033ada_find_printable_frame (struct frame_info *fi)
12034{
12035 for (; fi != NULL; fi = get_prev_frame (fi))
12036 {
12037 if (!is_known_support_routine (fi))
12038 {
12039 select_frame (fi);
12040 break;
12041 }
12042 }
12043
12044}
12045
12046/* Assuming that the inferior just triggered an unhandled exception
12047 catchpoint, return the address in inferior memory where the name
12048 of the exception is stored.
12049
12050 Return zero if the address could not be computed. */
12051
12052static CORE_ADDR
12053ada_unhandled_exception_name_addr (void)
0259addd
JB
12054{
12055 return parse_and_eval_address ("e.full_name");
12056}
12057
12058/* Same as ada_unhandled_exception_name_addr, except that this function
12059 should be used when the inferior uses an older version of the runtime,
12060 where the exception name needs to be extracted from a specific frame
12061 several frames up in the callstack. */
12062
12063static CORE_ADDR
12064ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
12065{
12066 int frame_level;
12067 struct frame_info *fi;
3eecfa55 12068 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
12069
12070 /* To determine the name of this exception, we need to select
12071 the frame corresponding to RAISE_SYM_NAME. This frame is
12072 at least 3 levels up, so we simply skip the first 3 frames
12073 without checking the name of their associated function. */
12074 fi = get_current_frame ();
12075 for (frame_level = 0; frame_level < 3; frame_level += 1)
12076 if (fi != NULL)
12077 fi = get_prev_frame (fi);
12078
12079 while (fi != NULL)
12080 {
692465f1
JB
12081 enum language func_lang;
12082
c6dc63a1
TT
12083 gdb::unique_xmalloc_ptr<char> func_name
12084 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
12085 if (func_name != NULL)
12086 {
c6dc63a1 12087 if (strcmp (func_name.get (),
55b87a52
KS
12088 data->exception_info->catch_exception_sym) == 0)
12089 break; /* We found the frame we were looking for... */
55b87a52 12090 }
fb44b1a7 12091 fi = get_prev_frame (fi);
f7f9143b
JB
12092 }
12093
12094 if (fi == NULL)
12095 return 0;
12096
12097 select_frame (fi);
12098 return parse_and_eval_address ("id.full_name");
12099}
12100
12101/* Assuming the inferior just triggered an Ada exception catchpoint
12102 (of any type), return the address in inferior memory where the name
12103 of the exception is stored, if applicable.
12104
45db7c09
PA
12105 Assumes the selected frame is the current frame.
12106
f7f9143b
JB
12107 Return zero if the address could not be computed, or if not relevant. */
12108
12109static CORE_ADDR
761269c8 12110ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12111 struct breakpoint *b)
12112{
3eecfa55
JB
12113 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12114
f7f9143b
JB
12115 switch (ex)
12116 {
761269c8 12117 case ada_catch_exception:
f7f9143b
JB
12118 return (parse_and_eval_address ("e.full_name"));
12119 break;
12120
761269c8 12121 case ada_catch_exception_unhandled:
3eecfa55 12122 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b 12123 break;
9f757bf7
XR
12124
12125 case ada_catch_handlers:
12126 return 0; /* The runtimes does not provide access to the exception
12127 name. */
12128 break;
12129
761269c8 12130 case ada_catch_assert:
f7f9143b
JB
12131 return 0; /* Exception name is not relevant in this case. */
12132 break;
12133
12134 default:
12135 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12136 break;
12137 }
12138
12139 return 0; /* Should never be reached. */
12140}
12141
e547c119
JB
12142/* Assuming the inferior is stopped at an exception catchpoint,
12143 return the message which was associated to the exception, if
12144 available. Return NULL if the message could not be retrieved.
12145
e547c119
JB
12146 Note: The exception message can be associated to an exception
12147 either through the use of the Raise_Exception function, or
12148 more simply (Ada 2005 and later), via:
12149
12150 raise Exception_Name with "exception message";
12151
12152 */
12153
6f46ac85 12154static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12155ada_exception_message_1 (void)
12156{
12157 struct value *e_msg_val;
e547c119 12158 int e_msg_len;
e547c119
JB
12159
12160 /* For runtimes that support this feature, the exception message
12161 is passed as an unbounded string argument called "message". */
12162 e_msg_val = parse_and_eval ("message");
12163 if (e_msg_val == NULL)
12164 return NULL; /* Exception message not supported. */
12165
12166 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
12167 gdb_assert (e_msg_val != NULL);
12168 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
12169
12170 /* If the message string is empty, then treat it as if there was
12171 no exception message. */
12172 if (e_msg_len <= 0)
12173 return NULL;
12174
6f46ac85
TT
12175 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12176 read_memory_string (value_address (e_msg_val), e_msg.get (), e_msg_len + 1);
12177 e_msg.get ()[e_msg_len] = '\0';
e547c119 12178
e547c119
JB
12179 return e_msg;
12180}
12181
12182/* Same as ada_exception_message_1, except that all exceptions are
12183 contained here (returning NULL instead). */
12184
6f46ac85 12185static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12186ada_exception_message (void)
12187{
6f46ac85 12188 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12189
a70b8144 12190 try
e547c119
JB
12191 {
12192 e_msg = ada_exception_message_1 ();
12193 }
230d2906 12194 catch (const gdb_exception_error &e)
e547c119 12195 {
6f46ac85 12196 e_msg.reset (nullptr);
e547c119 12197 }
e547c119
JB
12198
12199 return e_msg;
12200}
12201
f7f9143b
JB
12202/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12203 any error that ada_exception_name_addr_1 might cause to be thrown.
12204 When an error is intercepted, a warning with the error message is printed,
12205 and zero is returned. */
12206
12207static CORE_ADDR
761269c8 12208ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12209 struct breakpoint *b)
12210{
f7f9143b
JB
12211 CORE_ADDR result = 0;
12212
a70b8144 12213 try
f7f9143b
JB
12214 {
12215 result = ada_exception_name_addr_1 (ex, b);
12216 }
12217
230d2906 12218 catch (const gdb_exception_error &e)
f7f9143b 12219 {
3d6e9d23 12220 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12221 return 0;
12222 }
12223
12224 return result;
12225}
12226
cb7de75e 12227static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12228 (const char *excep_string,
12229 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12230
12231/* Ada catchpoints.
12232
12233 In the case of catchpoints on Ada exceptions, the catchpoint will
12234 stop the target on every exception the program throws. When a user
12235 specifies the name of a specific exception, we translate this
12236 request into a condition expression (in text form), and then parse
12237 it into an expression stored in each of the catchpoint's locations.
12238 We then use this condition to check whether the exception that was
12239 raised is the one the user is interested in. If not, then the
12240 target is resumed again. We store the name of the requested
12241 exception, in order to be able to re-set the condition expression
12242 when symbols change. */
12243
12244/* An instance of this type is used to represent an Ada catchpoint
5625a286 12245 breakpoint location. */
28010a5d 12246
5625a286 12247class ada_catchpoint_location : public bp_location
28010a5d 12248{
5625a286 12249public:
5f486660 12250 ada_catchpoint_location (breakpoint *owner)
f06f1252 12251 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12252 {}
28010a5d
PA
12253
12254 /* The condition that checks whether the exception that was raised
12255 is the specific exception the user specified on catchpoint
12256 creation. */
4d01a485 12257 expression_up excep_cond_expr;
28010a5d
PA
12258};
12259
c1fc2657 12260/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12261
c1fc2657 12262struct ada_catchpoint : public breakpoint
28010a5d 12263{
37f6a7f4
TT
12264 explicit ada_catchpoint (enum ada_exception_catchpoint_kind kind)
12265 : m_kind (kind)
12266 {
12267 }
12268
28010a5d 12269 /* The name of the specific exception the user specified. */
bc18fbb5 12270 std::string excep_string;
37f6a7f4
TT
12271
12272 /* What kind of catchpoint this is. */
12273 enum ada_exception_catchpoint_kind m_kind;
28010a5d
PA
12274};
12275
12276/* Parse the exception condition string in the context of each of the
12277 catchpoint's locations, and store them for later evaluation. */
12278
12279static void
9f757bf7
XR
12280create_excep_cond_exprs (struct ada_catchpoint *c,
12281 enum ada_exception_catchpoint_kind ex)
28010a5d 12282{
fccf9de1
TT
12283 struct bp_location *bl;
12284
28010a5d 12285 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12286 if (c->excep_string.empty ())
28010a5d
PA
12287 return;
12288
12289 /* Same if there are no locations... */
c1fc2657 12290 if (c->loc == NULL)
28010a5d
PA
12291 return;
12292
fccf9de1
TT
12293 /* Compute the condition expression in text form, from the specific
12294 expection we want to catch. */
12295 std::string cond_string
12296 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (), ex);
28010a5d 12297
fccf9de1
TT
12298 /* Iterate over all the catchpoint's locations, and parse an
12299 expression for each. */
12300 for (bl = c->loc; bl != NULL; bl = bl->next)
28010a5d
PA
12301 {
12302 struct ada_catchpoint_location *ada_loc
fccf9de1 12303 = (struct ada_catchpoint_location *) bl;
4d01a485 12304 expression_up exp;
28010a5d 12305
fccf9de1 12306 if (!bl->shlib_disabled)
28010a5d 12307 {
bbc13ae3 12308 const char *s;
28010a5d 12309
cb7de75e 12310 s = cond_string.c_str ();
a70b8144 12311 try
28010a5d 12312 {
fccf9de1
TT
12313 exp = parse_exp_1 (&s, bl->address,
12314 block_for_pc (bl->address),
036e657b 12315 0);
28010a5d 12316 }
230d2906 12317 catch (const gdb_exception_error &e)
849f2b52
JB
12318 {
12319 warning (_("failed to reevaluate internal exception condition "
12320 "for catchpoint %d: %s"),
3d6e9d23 12321 c->number, e.what ());
849f2b52 12322 }
28010a5d
PA
12323 }
12324
b22e99fd 12325 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12326 }
28010a5d
PA
12327}
12328
28010a5d
PA
12329/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12330 structure for all exception catchpoint kinds. */
12331
12332static struct bp_location *
37f6a7f4 12333allocate_location_exception (struct breakpoint *self)
28010a5d 12334{
5f486660 12335 return new ada_catchpoint_location (self);
28010a5d
PA
12336}
12337
12338/* Implement the RE_SET method in the breakpoint_ops structure for all
12339 exception catchpoint kinds. */
12340
12341static void
37f6a7f4 12342re_set_exception (struct breakpoint *b)
28010a5d
PA
12343{
12344 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12345
12346 /* Call the base class's method. This updates the catchpoint's
12347 locations. */
2060206e 12348 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12349
12350 /* Reparse the exception conditional expressions. One for each
12351 location. */
37f6a7f4 12352 create_excep_cond_exprs (c, c->m_kind);
28010a5d
PA
12353}
12354
12355/* Returns true if we should stop for this breakpoint hit. If the
12356 user specified a specific exception, we only want to cause a stop
12357 if the program thrown that exception. */
12358
12359static int
12360should_stop_exception (const struct bp_location *bl)
12361{
12362 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12363 const struct ada_catchpoint_location *ada_loc
12364 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12365 int stop;
12366
37f6a7f4
TT
12367 struct internalvar *var = lookup_internalvar ("_ada_exception");
12368 if (c->m_kind == ada_catch_assert)
12369 clear_internalvar (var);
12370 else
12371 {
12372 try
12373 {
12374 const char *expr;
12375
12376 if (c->m_kind == ada_catch_handlers)
12377 expr = ("GNAT_GCC_exception_Access(gcc_exception)"
12378 ".all.occurrence.id");
12379 else
12380 expr = "e";
12381
12382 struct value *exc = parse_and_eval (expr);
12383 set_internalvar (var, exc);
12384 }
12385 catch (const gdb_exception_error &ex)
12386 {
12387 clear_internalvar (var);
12388 }
12389 }
12390
28010a5d 12391 /* With no specific exception, should always stop. */
bc18fbb5 12392 if (c->excep_string.empty ())
28010a5d
PA
12393 return 1;
12394
12395 if (ada_loc->excep_cond_expr == NULL)
12396 {
12397 /* We will have a NULL expression if back when we were creating
12398 the expressions, this location's had failed to parse. */
12399 return 1;
12400 }
12401
12402 stop = 1;
a70b8144 12403 try
28010a5d
PA
12404 {
12405 struct value *mark;
12406
12407 mark = value_mark ();
4d01a485 12408 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12409 value_free_to_mark (mark);
12410 }
230d2906 12411 catch (const gdb_exception &ex)
492d29ea
PA
12412 {
12413 exception_fprintf (gdb_stderr, ex,
12414 _("Error in testing exception condition:\n"));
12415 }
492d29ea 12416
28010a5d
PA
12417 return stop;
12418}
12419
12420/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12421 for all exception catchpoint kinds. */
12422
12423static void
37f6a7f4 12424check_status_exception (bpstat bs)
28010a5d
PA
12425{
12426 bs->stop = should_stop_exception (bs->bp_location_at);
12427}
12428
f7f9143b
JB
12429/* Implement the PRINT_IT method in the breakpoint_ops structure
12430 for all exception catchpoint kinds. */
12431
12432static enum print_stop_action
37f6a7f4 12433print_it_exception (bpstat bs)
f7f9143b 12434{
79a45e25 12435 struct ui_out *uiout = current_uiout;
348d480f
PA
12436 struct breakpoint *b = bs->breakpoint_at;
12437
956a9fb9 12438 annotate_catchpoint (b->number);
f7f9143b 12439
112e8700 12440 if (uiout->is_mi_like_p ())
f7f9143b 12441 {
112e8700 12442 uiout->field_string ("reason",
956a9fb9 12443 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12444 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12445 }
12446
112e8700
SM
12447 uiout->text (b->disposition == disp_del
12448 ? "\nTemporary catchpoint " : "\nCatchpoint ");
381befee 12449 uiout->field_signed ("bkptno", b->number);
112e8700 12450 uiout->text (", ");
f7f9143b 12451
45db7c09
PA
12452 /* ada_exception_name_addr relies on the selected frame being the
12453 current frame. Need to do this here because this function may be
12454 called more than once when printing a stop, and below, we'll
12455 select the first frame past the Ada run-time (see
12456 ada_find_printable_frame). */
12457 select_frame (get_current_frame ());
12458
37f6a7f4
TT
12459 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12460 switch (c->m_kind)
f7f9143b 12461 {
761269c8
JB
12462 case ada_catch_exception:
12463 case ada_catch_exception_unhandled:
9f757bf7 12464 case ada_catch_handlers:
956a9fb9 12465 {
37f6a7f4 12466 const CORE_ADDR addr = ada_exception_name_addr (c->m_kind, b);
956a9fb9
JB
12467 char exception_name[256];
12468
12469 if (addr != 0)
12470 {
c714b426
PA
12471 read_memory (addr, (gdb_byte *) exception_name,
12472 sizeof (exception_name) - 1);
956a9fb9
JB
12473 exception_name [sizeof (exception_name) - 1] = '\0';
12474 }
12475 else
12476 {
12477 /* For some reason, we were unable to read the exception
12478 name. This could happen if the Runtime was compiled
12479 without debugging info, for instance. In that case,
12480 just replace the exception name by the generic string
12481 "exception" - it will read as "an exception" in the
12482 notification we are about to print. */
967cff16 12483 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12484 }
12485 /* In the case of unhandled exception breakpoints, we print
12486 the exception name as "unhandled EXCEPTION_NAME", to make
12487 it clearer to the user which kind of catchpoint just got
12488 hit. We used ui_out_text to make sure that this extra
12489 info does not pollute the exception name in the MI case. */
37f6a7f4 12490 if (c->m_kind == ada_catch_exception_unhandled)
112e8700
SM
12491 uiout->text ("unhandled ");
12492 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12493 }
12494 break;
761269c8 12495 case ada_catch_assert:
956a9fb9
JB
12496 /* In this case, the name of the exception is not really
12497 important. Just print "failed assertion" to make it clearer
12498 that his program just hit an assertion-failure catchpoint.
12499 We used ui_out_text because this info does not belong in
12500 the MI output. */
112e8700 12501 uiout->text ("failed assertion");
956a9fb9 12502 break;
f7f9143b 12503 }
e547c119 12504
6f46ac85 12505 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12506 if (exception_message != NULL)
12507 {
e547c119 12508 uiout->text (" (");
6f46ac85 12509 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12510 uiout->text (")");
e547c119
JB
12511 }
12512
112e8700 12513 uiout->text (" at ");
956a9fb9 12514 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12515
12516 return PRINT_SRC_AND_LOC;
12517}
12518
12519/* Implement the PRINT_ONE method in the breakpoint_ops structure
12520 for all exception catchpoint kinds. */
12521
12522static void
37f6a7f4 12523print_one_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12524{
79a45e25 12525 struct ui_out *uiout = current_uiout;
28010a5d 12526 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12527 struct value_print_options opts;
12528
12529 get_user_print_options (&opts);
f06f1252 12530
79a45b7d 12531 if (opts.addressprint)
f06f1252 12532 uiout->field_skip ("addr");
f7f9143b
JB
12533
12534 annotate_field (5);
37f6a7f4 12535 switch (c->m_kind)
f7f9143b 12536 {
761269c8 12537 case ada_catch_exception:
bc18fbb5 12538 if (!c->excep_string.empty ())
f7f9143b 12539 {
bc18fbb5
TT
12540 std::string msg = string_printf (_("`%s' Ada exception"),
12541 c->excep_string.c_str ());
28010a5d 12542
112e8700 12543 uiout->field_string ("what", msg);
f7f9143b
JB
12544 }
12545 else
112e8700 12546 uiout->field_string ("what", "all Ada exceptions");
f7f9143b
JB
12547
12548 break;
12549
761269c8 12550 case ada_catch_exception_unhandled:
112e8700 12551 uiout->field_string ("what", "unhandled Ada exceptions");
f7f9143b
JB
12552 break;
12553
9f757bf7 12554 case ada_catch_handlers:
bc18fbb5 12555 if (!c->excep_string.empty ())
9f757bf7
XR
12556 {
12557 uiout->field_fmt ("what",
12558 _("`%s' Ada exception handlers"),
bc18fbb5 12559 c->excep_string.c_str ());
9f757bf7
XR
12560 }
12561 else
12562 uiout->field_string ("what", "all Ada exceptions handlers");
12563 break;
12564
761269c8 12565 case ada_catch_assert:
112e8700 12566 uiout->field_string ("what", "failed Ada assertions");
f7f9143b
JB
12567 break;
12568
12569 default:
12570 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12571 break;
12572 }
12573}
12574
12575/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12576 for all exception catchpoint kinds. */
12577
12578static void
37f6a7f4 12579print_mention_exception (struct breakpoint *b)
f7f9143b 12580{
28010a5d 12581 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12582 struct ui_out *uiout = current_uiout;
28010a5d 12583
112e8700 12584 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
00eb2c4a 12585 : _("Catchpoint "));
381befee 12586 uiout->field_signed ("bkptno", b->number);
112e8700 12587 uiout->text (": ");
00eb2c4a 12588
37f6a7f4 12589 switch (c->m_kind)
f7f9143b 12590 {
761269c8 12591 case ada_catch_exception:
bc18fbb5 12592 if (!c->excep_string.empty ())
00eb2c4a 12593 {
862d101a 12594 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12595 c->excep_string.c_str ());
862d101a 12596 uiout->text (info.c_str ());
00eb2c4a 12597 }
f7f9143b 12598 else
112e8700 12599 uiout->text (_("all Ada exceptions"));
f7f9143b
JB
12600 break;
12601
761269c8 12602 case ada_catch_exception_unhandled:
112e8700 12603 uiout->text (_("unhandled Ada exceptions"));
f7f9143b 12604 break;
9f757bf7
XR
12605
12606 case ada_catch_handlers:
bc18fbb5 12607 if (!c->excep_string.empty ())
9f757bf7
XR
12608 {
12609 std::string info
12610 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12611 c->excep_string.c_str ());
9f757bf7
XR
12612 uiout->text (info.c_str ());
12613 }
12614 else
12615 uiout->text (_("all Ada exceptions handlers"));
12616 break;
12617
761269c8 12618 case ada_catch_assert:
112e8700 12619 uiout->text (_("failed Ada assertions"));
f7f9143b
JB
12620 break;
12621
12622 default:
12623 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12624 break;
12625 }
12626}
12627
6149aea9
PA
12628/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12629 for all exception catchpoint kinds. */
12630
12631static void
37f6a7f4 12632print_recreate_exception (struct breakpoint *b, struct ui_file *fp)
6149aea9 12633{
28010a5d
PA
12634 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12635
37f6a7f4 12636 switch (c->m_kind)
6149aea9 12637 {
761269c8 12638 case ada_catch_exception:
6149aea9 12639 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12640 if (!c->excep_string.empty ())
12641 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12642 break;
12643
761269c8 12644 case ada_catch_exception_unhandled:
78076abc 12645 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12646 break;
12647
9f757bf7
XR
12648 case ada_catch_handlers:
12649 fprintf_filtered (fp, "catch handlers");
12650 break;
12651
761269c8 12652 case ada_catch_assert:
6149aea9
PA
12653 fprintf_filtered (fp, "catch assert");
12654 break;
12655
12656 default:
12657 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12658 }
d9b3f62e 12659 print_recreate_thread (b, fp);
6149aea9
PA
12660}
12661
37f6a7f4 12662/* Virtual tables for various breakpoint types. */
2060206e 12663static struct breakpoint_ops catch_exception_breakpoint_ops;
2060206e 12664static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
2060206e 12665static struct breakpoint_ops catch_assert_breakpoint_ops;
9f757bf7
XR
12666static struct breakpoint_ops catch_handlers_breakpoint_ops;
12667
f06f1252
TT
12668/* See ada-lang.h. */
12669
12670bool
12671is_ada_exception_catchpoint (breakpoint *bp)
12672{
12673 return (bp->ops == &catch_exception_breakpoint_ops
12674 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12675 || bp->ops == &catch_assert_breakpoint_ops
12676 || bp->ops == &catch_handlers_breakpoint_ops);
12677}
12678
f7f9143b
JB
12679/* Split the arguments specified in a "catch exception" command.
12680 Set EX to the appropriate catchpoint type.
28010a5d 12681 Set EXCEP_STRING to the name of the specific exception if
5845583d 12682 specified by the user.
9f757bf7
XR
12683 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12684 "catch handlers" command. False otherwise.
5845583d
JB
12685 If a condition is found at the end of the arguments, the condition
12686 expression is stored in COND_STRING (memory must be deallocated
12687 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12688
12689static void
a121b7c1 12690catch_ada_exception_command_split (const char *args,
9f757bf7 12691 bool is_catch_handlers_cmd,
761269c8 12692 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12693 std::string *excep_string,
12694 std::string *cond_string)
f7f9143b 12695{
bc18fbb5 12696 std::string exception_name;
f7f9143b 12697
bc18fbb5
TT
12698 exception_name = extract_arg (&args);
12699 if (exception_name == "if")
5845583d
JB
12700 {
12701 /* This is not an exception name; this is the start of a condition
12702 expression for a catchpoint on all exceptions. So, "un-get"
12703 this token, and set exception_name to NULL. */
bc18fbb5 12704 exception_name.clear ();
5845583d
JB
12705 args -= 2;
12706 }
f7f9143b 12707
5845583d 12708 /* Check to see if we have a condition. */
f7f9143b 12709
f1735a53 12710 args = skip_spaces (args);
61012eef 12711 if (startswith (args, "if")
5845583d
JB
12712 && (isspace (args[2]) || args[2] == '\0'))
12713 {
12714 args += 2;
f1735a53 12715 args = skip_spaces (args);
5845583d
JB
12716
12717 if (args[0] == '\0')
12718 error (_("Condition missing after `if' keyword"));
bc18fbb5 12719 *cond_string = args;
5845583d
JB
12720
12721 args += strlen (args);
12722 }
12723
12724 /* Check that we do not have any more arguments. Anything else
12725 is unexpected. */
f7f9143b
JB
12726
12727 if (args[0] != '\0')
12728 error (_("Junk at end of expression"));
12729
9f757bf7
XR
12730 if (is_catch_handlers_cmd)
12731 {
12732 /* Catch handling of exceptions. */
12733 *ex = ada_catch_handlers;
12734 *excep_string = exception_name;
12735 }
bc18fbb5 12736 else if (exception_name.empty ())
f7f9143b
JB
12737 {
12738 /* Catch all exceptions. */
761269c8 12739 *ex = ada_catch_exception;
bc18fbb5 12740 excep_string->clear ();
f7f9143b 12741 }
bc18fbb5 12742 else if (exception_name == "unhandled")
f7f9143b
JB
12743 {
12744 /* Catch unhandled exceptions. */
761269c8 12745 *ex = ada_catch_exception_unhandled;
bc18fbb5 12746 excep_string->clear ();
f7f9143b
JB
12747 }
12748 else
12749 {
12750 /* Catch a specific exception. */
761269c8 12751 *ex = ada_catch_exception;
28010a5d 12752 *excep_string = exception_name;
f7f9143b
JB
12753 }
12754}
12755
12756/* Return the name of the symbol on which we should break in order to
12757 implement a catchpoint of the EX kind. */
12758
12759static const char *
761269c8 12760ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12761{
3eecfa55
JB
12762 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12763
12764 gdb_assert (data->exception_info != NULL);
0259addd 12765
f7f9143b
JB
12766 switch (ex)
12767 {
761269c8 12768 case ada_catch_exception:
3eecfa55 12769 return (data->exception_info->catch_exception_sym);
f7f9143b 12770 break;
761269c8 12771 case ada_catch_exception_unhandled:
3eecfa55 12772 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12773 break;
761269c8 12774 case ada_catch_assert:
3eecfa55 12775 return (data->exception_info->catch_assert_sym);
f7f9143b 12776 break;
9f757bf7
XR
12777 case ada_catch_handlers:
12778 return (data->exception_info->catch_handlers_sym);
12779 break;
f7f9143b
JB
12780 default:
12781 internal_error (__FILE__, __LINE__,
12782 _("unexpected catchpoint kind (%d)"), ex);
12783 }
12784}
12785
12786/* Return the breakpoint ops "virtual table" used for catchpoints
12787 of the EX kind. */
12788
c0a91b2b 12789static const struct breakpoint_ops *
761269c8 12790ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12791{
12792 switch (ex)
12793 {
761269c8 12794 case ada_catch_exception:
f7f9143b
JB
12795 return (&catch_exception_breakpoint_ops);
12796 break;
761269c8 12797 case ada_catch_exception_unhandled:
f7f9143b
JB
12798 return (&catch_exception_unhandled_breakpoint_ops);
12799 break;
761269c8 12800 case ada_catch_assert:
f7f9143b
JB
12801 return (&catch_assert_breakpoint_ops);
12802 break;
9f757bf7
XR
12803 case ada_catch_handlers:
12804 return (&catch_handlers_breakpoint_ops);
12805 break;
f7f9143b
JB
12806 default:
12807 internal_error (__FILE__, __LINE__,
12808 _("unexpected catchpoint kind (%d)"), ex);
12809 }
12810}
12811
12812/* Return the condition that will be used to match the current exception
12813 being raised with the exception that the user wants to catch. This
12814 assumes that this condition is used when the inferior just triggered
12815 an exception catchpoint.
cb7de75e 12816 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 12817
cb7de75e 12818static std::string
9f757bf7
XR
12819ada_exception_catchpoint_cond_string (const char *excep_string,
12820 enum ada_exception_catchpoint_kind ex)
f7f9143b 12821{
3d0b0fa3 12822 int i;
fccf9de1 12823 bool is_standard_exc = false;
cb7de75e 12824 std::string result;
9f757bf7
XR
12825
12826 if (ex == ada_catch_handlers)
12827 {
12828 /* For exception handlers catchpoints, the condition string does
12829 not use the same parameter as for the other exceptions. */
fccf9de1
TT
12830 result = ("long_integer (GNAT_GCC_exception_Access"
12831 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
12832 }
12833 else
fccf9de1 12834 result = "long_integer (e)";
3d0b0fa3 12835
0963b4bd 12836 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12837 runtime units that have been compiled without debugging info; if
28010a5d 12838 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12839 exception (e.g. "constraint_error") then, during the evaluation
12840 of the condition expression, the symbol lookup on this name would
0963b4bd 12841 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12842 may then be set only on user-defined exceptions which have the
12843 same not-fully-qualified name (e.g. my_package.constraint_error).
12844
12845 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12846 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12847 exception constraint_error" is rewritten into "catch exception
12848 standard.constraint_error".
12849
85102364 12850 If an exception named constraint_error is defined in another package of
3d0b0fa3
JB
12851 the inferior program, then the only way to specify this exception as a
12852 breakpoint condition is to use its fully-qualified named:
fccf9de1 12853 e.g. my_package.constraint_error. */
3d0b0fa3
JB
12854
12855 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12856 {
28010a5d 12857 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 12858 {
fccf9de1 12859 is_standard_exc = true;
9f757bf7 12860 break;
3d0b0fa3
JB
12861 }
12862 }
9f757bf7 12863
fccf9de1
TT
12864 result += " = ";
12865
12866 if (is_standard_exc)
12867 string_appendf (result, "long_integer (&standard.%s)", excep_string);
12868 else
12869 string_appendf (result, "long_integer (&%s)", excep_string);
9f757bf7 12870
9f757bf7 12871 return result;
f7f9143b
JB
12872}
12873
12874/* Return the symtab_and_line that should be used to insert an exception
12875 catchpoint of the TYPE kind.
12876
28010a5d
PA
12877 ADDR_STRING returns the name of the function where the real
12878 breakpoint that implements the catchpoints is set, depending on the
12879 type of catchpoint we need to create. */
f7f9143b
JB
12880
12881static struct symtab_and_line
bc18fbb5 12882ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 12883 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12884{
12885 const char *sym_name;
12886 struct symbol *sym;
f7f9143b 12887
0259addd
JB
12888 /* First, find out which exception support info to use. */
12889 ada_exception_support_info_sniffer ();
12890
12891 /* Then lookup the function on which we will break in order to catch
f7f9143b 12892 the Ada exceptions requested by the user. */
f7f9143b
JB
12893 sym_name = ada_exception_sym_name (ex);
12894 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12895
57aff202
JB
12896 if (sym == NULL)
12897 error (_("Catchpoint symbol not found: %s"), sym_name);
12898
12899 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
12900 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
12901
12902 /* Set ADDR_STRING. */
cc12f4a8 12903 *addr_string = sym_name;
f7f9143b 12904
f7f9143b 12905 /* Set OPS. */
4b9eee8c 12906 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12907
f17011e0 12908 return find_function_start_sal (sym, 1);
f7f9143b
JB
12909}
12910
b4a5b78b 12911/* Create an Ada exception catchpoint.
f7f9143b 12912
b4a5b78b 12913 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12914
bc18fbb5 12915 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 12916 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 12917 of the exception to which this catchpoint applies.
2df4d1d5 12918
bc18fbb5 12919 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 12920
b4a5b78b
JB
12921 TEMPFLAG, if nonzero, means that the underlying breakpoint
12922 should be temporary.
28010a5d 12923
b4a5b78b 12924 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12925
349774ef 12926void
28010a5d 12927create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12928 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 12929 const std::string &excep_string,
56ecd069 12930 const std::string &cond_string,
28010a5d 12931 int tempflag,
349774ef 12932 int disabled,
28010a5d
PA
12933 int from_tty)
12934{
cc12f4a8 12935 std::string addr_string;
b4a5b78b 12936 const struct breakpoint_ops *ops = NULL;
bc18fbb5 12937 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 12938
37f6a7f4 12939 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint (ex_kind));
cc12f4a8 12940 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 12941 ops, tempflag, disabled, from_tty);
28010a5d 12942 c->excep_string = excep_string;
9f757bf7 12943 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069
XR
12944 if (!cond_string.empty ())
12945 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty);
b270e6f9 12946 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
12947}
12948
9ac4176b
PA
12949/* Implement the "catch exception" command. */
12950
12951static void
eb4c3f4a 12952catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
12953 struct cmd_list_element *command)
12954{
a121b7c1 12955 const char *arg = arg_entry;
9ac4176b
PA
12956 struct gdbarch *gdbarch = get_current_arch ();
12957 int tempflag;
761269c8 12958 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12959 std::string excep_string;
56ecd069 12960 std::string cond_string;
9ac4176b
PA
12961
12962 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12963
12964 if (!arg)
12965 arg = "";
9f757bf7 12966 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 12967 &cond_string);
9f757bf7
XR
12968 create_ada_exception_catchpoint (gdbarch, ex_kind,
12969 excep_string, cond_string,
12970 tempflag, 1 /* enabled */,
12971 from_tty);
12972}
12973
12974/* Implement the "catch handlers" command. */
12975
12976static void
12977catch_ada_handlers_command (const char *arg_entry, int from_tty,
12978 struct cmd_list_element *command)
12979{
12980 const char *arg = arg_entry;
12981 struct gdbarch *gdbarch = get_current_arch ();
12982 int tempflag;
12983 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12984 std::string excep_string;
56ecd069 12985 std::string cond_string;
9f757bf7
XR
12986
12987 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12988
12989 if (!arg)
12990 arg = "";
12991 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 12992 &cond_string);
b4a5b78b
JB
12993 create_ada_exception_catchpoint (gdbarch, ex_kind,
12994 excep_string, cond_string,
349774ef
JB
12995 tempflag, 1 /* enabled */,
12996 from_tty);
9ac4176b
PA
12997}
12998
71bed2db
TT
12999/* Completion function for the Ada "catch" commands. */
13000
13001static void
13002catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
13003 const char *text, const char *word)
13004{
13005 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
13006
13007 for (const ada_exc_info &info : exceptions)
13008 {
13009 if (startswith (info.name, word))
b02f78f9 13010 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
13011 }
13012}
13013
b4a5b78b 13014/* Split the arguments specified in a "catch assert" command.
5845583d 13015
b4a5b78b
JB
13016 ARGS contains the command's arguments (or the empty string if
13017 no arguments were passed).
5845583d
JB
13018
13019 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 13020 (the memory needs to be deallocated after use). */
5845583d 13021
b4a5b78b 13022static void
56ecd069 13023catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 13024{
f1735a53 13025 args = skip_spaces (args);
f7f9143b 13026
5845583d 13027 /* Check whether a condition was provided. */
61012eef 13028 if (startswith (args, "if")
5845583d 13029 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 13030 {
5845583d 13031 args += 2;
f1735a53 13032 args = skip_spaces (args);
5845583d
JB
13033 if (args[0] == '\0')
13034 error (_("condition missing after `if' keyword"));
56ecd069 13035 cond_string.assign (args);
f7f9143b
JB
13036 }
13037
5845583d
JB
13038 /* Otherwise, there should be no other argument at the end of
13039 the command. */
13040 else if (args[0] != '\0')
13041 error (_("Junk at end of arguments."));
f7f9143b
JB
13042}
13043
9ac4176b
PA
13044/* Implement the "catch assert" command. */
13045
13046static void
eb4c3f4a 13047catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13048 struct cmd_list_element *command)
13049{
a121b7c1 13050 const char *arg = arg_entry;
9ac4176b
PA
13051 struct gdbarch *gdbarch = get_current_arch ();
13052 int tempflag;
56ecd069 13053 std::string cond_string;
9ac4176b
PA
13054
13055 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13056
13057 if (!arg)
13058 arg = "";
56ecd069 13059 catch_ada_assert_command_split (arg, cond_string);
761269c8 13060 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 13061 "", cond_string,
349774ef
JB
13062 tempflag, 1 /* enabled */,
13063 from_tty);
9ac4176b 13064}
778865d3
JB
13065
13066/* Return non-zero if the symbol SYM is an Ada exception object. */
13067
13068static int
13069ada_is_exception_sym (struct symbol *sym)
13070{
7d93a1e0 13071 const char *type_name = SYMBOL_TYPE (sym)->name ();
778865d3
JB
13072
13073 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
13074 && SYMBOL_CLASS (sym) != LOC_BLOCK
13075 && SYMBOL_CLASS (sym) != LOC_CONST
13076 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
13077 && type_name != NULL && strcmp (type_name, "exception") == 0);
13078}
13079
13080/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
13081 Ada exception object. This matches all exceptions except the ones
13082 defined by the Ada language. */
13083
13084static int
13085ada_is_non_standard_exception_sym (struct symbol *sym)
13086{
13087 int i;
13088
13089 if (!ada_is_exception_sym (sym))
13090 return 0;
13091
13092 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
987012b8 13093 if (strcmp (sym->linkage_name (), standard_exc[i]) == 0)
778865d3
JB
13094 return 0; /* A standard exception. */
13095
13096 /* Numeric_Error is also a standard exception, so exclude it.
13097 See the STANDARD_EXC description for more details as to why
13098 this exception is not listed in that array. */
987012b8 13099 if (strcmp (sym->linkage_name (), "numeric_error") == 0)
778865d3
JB
13100 return 0;
13101
13102 return 1;
13103}
13104
ab816a27 13105/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
13106 objects.
13107
13108 The comparison is determined first by exception name, and then
13109 by exception address. */
13110
ab816a27 13111bool
cc536b21 13112ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 13113{
778865d3
JB
13114 int result;
13115
ab816a27
TT
13116 result = strcmp (name, other.name);
13117 if (result < 0)
13118 return true;
13119 if (result == 0 && addr < other.addr)
13120 return true;
13121 return false;
13122}
778865d3 13123
ab816a27 13124bool
cc536b21 13125ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
13126{
13127 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
13128}
13129
13130/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
13131 routine, but keeping the first SKIP elements untouched.
13132
13133 All duplicates are also removed. */
13134
13135static void
ab816a27 13136sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
13137 int skip)
13138{
ab816a27
TT
13139 std::sort (exceptions->begin () + skip, exceptions->end ());
13140 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
13141 exceptions->end ());
778865d3
JB
13142}
13143
778865d3
JB
13144/* Add all exceptions defined by the Ada standard whose name match
13145 a regular expression.
13146
13147 If PREG is not NULL, then this regexp_t object is used to
13148 perform the symbol name matching. Otherwise, no name-based
13149 filtering is performed.
13150
13151 EXCEPTIONS is a vector of exceptions to which matching exceptions
13152 gets pushed. */
13153
13154static void
2d7cc5c7 13155ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 13156 std::vector<ada_exc_info> *exceptions)
778865d3
JB
13157{
13158 int i;
13159
13160 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13161 {
13162 if (preg == NULL
2d7cc5c7 13163 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
13164 {
13165 struct bound_minimal_symbol msymbol
13166 = ada_lookup_simple_minsym (standard_exc[i]);
13167
13168 if (msymbol.minsym != NULL)
13169 {
13170 struct ada_exc_info info
77e371c0 13171 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 13172
ab816a27 13173 exceptions->push_back (info);
778865d3
JB
13174 }
13175 }
13176 }
13177}
13178
13179/* Add all Ada exceptions defined locally and accessible from the given
13180 FRAME.
13181
13182 If PREG is not NULL, then this regexp_t object is used to
13183 perform the symbol name matching. Otherwise, no name-based
13184 filtering is performed.
13185
13186 EXCEPTIONS is a vector of exceptions to which matching exceptions
13187 gets pushed. */
13188
13189static void
2d7cc5c7
PA
13190ada_add_exceptions_from_frame (compiled_regex *preg,
13191 struct frame_info *frame,
ab816a27 13192 std::vector<ada_exc_info> *exceptions)
778865d3 13193{
3977b71f 13194 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13195
13196 while (block != 0)
13197 {
13198 struct block_iterator iter;
13199 struct symbol *sym;
13200
13201 ALL_BLOCK_SYMBOLS (block, iter, sym)
13202 {
13203 switch (SYMBOL_CLASS (sym))
13204 {
13205 case LOC_TYPEDEF:
13206 case LOC_BLOCK:
13207 case LOC_CONST:
13208 break;
13209 default:
13210 if (ada_is_exception_sym (sym))
13211 {
987012b8 13212 struct ada_exc_info info = {sym->print_name (),
778865d3
JB
13213 SYMBOL_VALUE_ADDRESS (sym)};
13214
ab816a27 13215 exceptions->push_back (info);
778865d3
JB
13216 }
13217 }
13218 }
13219 if (BLOCK_FUNCTION (block) != NULL)
13220 break;
13221 block = BLOCK_SUPERBLOCK (block);
13222 }
13223}
13224
14bc53a8
PA
13225/* Return true if NAME matches PREG or if PREG is NULL. */
13226
13227static bool
2d7cc5c7 13228name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13229{
13230 return (preg == NULL
f945dedf 13231 || preg->exec (ada_decode (name).c_str (), 0, NULL, 0) == 0);
14bc53a8
PA
13232}
13233
778865d3
JB
13234/* Add all exceptions defined globally whose name name match
13235 a regular expression, excluding standard exceptions.
13236
13237 The reason we exclude standard exceptions is that they need
13238 to be handled separately: Standard exceptions are defined inside
13239 a runtime unit which is normally not compiled with debugging info,
13240 and thus usually do not show up in our symbol search. However,
13241 if the unit was in fact built with debugging info, we need to
13242 exclude them because they would duplicate the entry we found
13243 during the special loop that specifically searches for those
13244 standard exceptions.
13245
13246 If PREG is not NULL, then this regexp_t object is used to
13247 perform the symbol name matching. Otherwise, no name-based
13248 filtering is performed.
13249
13250 EXCEPTIONS is a vector of exceptions to which matching exceptions
13251 gets pushed. */
13252
13253static void
2d7cc5c7 13254ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13255 std::vector<ada_exc_info> *exceptions)
778865d3 13256{
14bc53a8
PA
13257 /* In Ada, the symbol "search name" is a linkage name, whereas the
13258 regular expression used to do the matching refers to the natural
13259 name. So match against the decoded name. */
13260 expand_symtabs_matching (NULL,
b5ec771e 13261 lookup_name_info::match_any (),
14bc53a8
PA
13262 [&] (const char *search_name)
13263 {
f945dedf
CB
13264 std::string decoded = ada_decode (search_name);
13265 return name_matches_regex (decoded.c_str (), preg);
14bc53a8
PA
13266 },
13267 NULL,
13268 VARIABLES_DOMAIN);
778865d3 13269
2030c079 13270 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13271 {
b669c953 13272 for (compunit_symtab *s : objfile->compunits ())
778865d3 13273 {
d8aeb77f
TT
13274 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13275 int i;
778865d3 13276
d8aeb77f
TT
13277 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13278 {
582942f4 13279 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13280 struct block_iterator iter;
13281 struct symbol *sym;
778865d3 13282
d8aeb77f
TT
13283 ALL_BLOCK_SYMBOLS (b, iter, sym)
13284 if (ada_is_non_standard_exception_sym (sym)
987012b8 13285 && name_matches_regex (sym->natural_name (), preg))
d8aeb77f
TT
13286 {
13287 struct ada_exc_info info
987012b8 13288 = {sym->print_name (), SYMBOL_VALUE_ADDRESS (sym)};
d8aeb77f
TT
13289
13290 exceptions->push_back (info);
13291 }
13292 }
778865d3
JB
13293 }
13294 }
13295}
13296
13297/* Implements ada_exceptions_list with the regular expression passed
13298 as a regex_t, rather than a string.
13299
13300 If not NULL, PREG is used to filter out exceptions whose names
13301 do not match. Otherwise, all exceptions are listed. */
13302
ab816a27 13303static std::vector<ada_exc_info>
2d7cc5c7 13304ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13305{
ab816a27 13306 std::vector<ada_exc_info> result;
778865d3
JB
13307 int prev_len;
13308
13309 /* First, list the known standard exceptions. These exceptions
13310 need to be handled separately, as they are usually defined in
13311 runtime units that have been compiled without debugging info. */
13312
13313 ada_add_standard_exceptions (preg, &result);
13314
13315 /* Next, find all exceptions whose scope is local and accessible
13316 from the currently selected frame. */
13317
13318 if (has_stack_frames ())
13319 {
ab816a27 13320 prev_len = result.size ();
778865d3
JB
13321 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13322 &result);
ab816a27 13323 if (result.size () > prev_len)
778865d3
JB
13324 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13325 }
13326
13327 /* Add all exceptions whose scope is global. */
13328
ab816a27 13329 prev_len = result.size ();
778865d3 13330 ada_add_global_exceptions (preg, &result);
ab816a27 13331 if (result.size () > prev_len)
778865d3
JB
13332 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13333
778865d3
JB
13334 return result;
13335}
13336
13337/* Return a vector of ada_exc_info.
13338
13339 If REGEXP is NULL, all exceptions are included in the result.
13340 Otherwise, it should contain a valid regular expression,
13341 and only the exceptions whose names match that regular expression
13342 are included in the result.
13343
13344 The exceptions are sorted in the following order:
13345 - Standard exceptions (defined by the Ada language), in
13346 alphabetical order;
13347 - Exceptions only visible from the current frame, in
13348 alphabetical order;
13349 - Exceptions whose scope is global, in alphabetical order. */
13350
ab816a27 13351std::vector<ada_exc_info>
778865d3
JB
13352ada_exceptions_list (const char *regexp)
13353{
2d7cc5c7
PA
13354 if (regexp == NULL)
13355 return ada_exceptions_list_1 (NULL);
778865d3 13356
2d7cc5c7
PA
13357 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13358 return ada_exceptions_list_1 (&reg);
778865d3
JB
13359}
13360
13361/* Implement the "info exceptions" command. */
13362
13363static void
1d12d88f 13364info_exceptions_command (const char *regexp, int from_tty)
778865d3 13365{
778865d3 13366 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13367
ab816a27 13368 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13369
13370 if (regexp != NULL)
13371 printf_filtered
13372 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13373 else
13374 printf_filtered (_("All defined Ada exceptions:\n"));
13375
ab816a27
TT
13376 for (const ada_exc_info &info : exceptions)
13377 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13378}
13379
4c4b4cd2
PH
13380 /* Operators */
13381/* Information about operators given special treatment in functions
13382 below. */
13383/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13384
13385#define ADA_OPERATORS \
13386 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13387 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13388 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13389 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13390 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13391 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13392 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13393 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13394 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13395 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13396 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13397 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13398 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13399 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13400 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13401 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13402 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13403 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13404 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13405
13406static void
554794dc
SDJ
13407ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13408 int *argsp)
4c4b4cd2
PH
13409{
13410 switch (exp->elts[pc - 1].opcode)
13411 {
76a01679 13412 default:
4c4b4cd2
PH
13413 operator_length_standard (exp, pc, oplenp, argsp);
13414 break;
13415
13416#define OP_DEFN(op, len, args, binop) \
13417 case op: *oplenp = len; *argsp = args; break;
13418 ADA_OPERATORS;
13419#undef OP_DEFN
52ce6436
PH
13420
13421 case OP_AGGREGATE:
13422 *oplenp = 3;
13423 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13424 break;
13425
13426 case OP_CHOICES:
13427 *oplenp = 3;
13428 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13429 break;
4c4b4cd2
PH
13430 }
13431}
13432
c0201579
JK
13433/* Implementation of the exp_descriptor method operator_check. */
13434
13435static int
13436ada_operator_check (struct expression *exp, int pos,
13437 int (*objfile_func) (struct objfile *objfile, void *data),
13438 void *data)
13439{
13440 const union exp_element *const elts = exp->elts;
13441 struct type *type = NULL;
13442
13443 switch (elts[pos].opcode)
13444 {
13445 case UNOP_IN_RANGE:
13446 case UNOP_QUAL:
13447 type = elts[pos + 1].type;
13448 break;
13449
13450 default:
13451 return operator_check_standard (exp, pos, objfile_func, data);
13452 }
13453
13454 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13455
13456 if (type && TYPE_OBJFILE (type)
13457 && (*objfile_func) (TYPE_OBJFILE (type), data))
13458 return 1;
13459
13460 return 0;
13461}
13462
a121b7c1 13463static const char *
4c4b4cd2
PH
13464ada_op_name (enum exp_opcode opcode)
13465{
13466 switch (opcode)
13467 {
76a01679 13468 default:
4c4b4cd2 13469 return op_name_standard (opcode);
52ce6436 13470
4c4b4cd2
PH
13471#define OP_DEFN(op, len, args, binop) case op: return #op;
13472 ADA_OPERATORS;
13473#undef OP_DEFN
52ce6436
PH
13474
13475 case OP_AGGREGATE:
13476 return "OP_AGGREGATE";
13477 case OP_CHOICES:
13478 return "OP_CHOICES";
13479 case OP_NAME:
13480 return "OP_NAME";
4c4b4cd2
PH
13481 }
13482}
13483
13484/* As for operator_length, but assumes PC is pointing at the first
13485 element of the operator, and gives meaningful results only for the
52ce6436 13486 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13487
13488static void
76a01679
JB
13489ada_forward_operator_length (struct expression *exp, int pc,
13490 int *oplenp, int *argsp)
4c4b4cd2 13491{
76a01679 13492 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13493 {
13494 default:
13495 *oplenp = *argsp = 0;
13496 break;
52ce6436 13497
4c4b4cd2
PH
13498#define OP_DEFN(op, len, args, binop) \
13499 case op: *oplenp = len; *argsp = args; break;
13500 ADA_OPERATORS;
13501#undef OP_DEFN
52ce6436
PH
13502
13503 case OP_AGGREGATE:
13504 *oplenp = 3;
13505 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13506 break;
13507
13508 case OP_CHOICES:
13509 *oplenp = 3;
13510 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13511 break;
13512
13513 case OP_STRING:
13514 case OP_NAME:
13515 {
13516 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13517
52ce6436
PH
13518 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13519 *argsp = 0;
13520 break;
13521 }
4c4b4cd2
PH
13522 }
13523}
13524
13525static int
13526ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13527{
13528 enum exp_opcode op = exp->elts[elt].opcode;
13529 int oplen, nargs;
13530 int pc = elt;
13531 int i;
76a01679 13532
4c4b4cd2
PH
13533 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13534
76a01679 13535 switch (op)
4c4b4cd2 13536 {
76a01679 13537 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13538 case OP_ATR_FIRST:
13539 case OP_ATR_LAST:
13540 case OP_ATR_LENGTH:
13541 case OP_ATR_IMAGE:
13542 case OP_ATR_MAX:
13543 case OP_ATR_MIN:
13544 case OP_ATR_MODULUS:
13545 case OP_ATR_POS:
13546 case OP_ATR_SIZE:
13547 case OP_ATR_TAG:
13548 case OP_ATR_VAL:
13549 break;
13550
13551 case UNOP_IN_RANGE:
13552 case UNOP_QUAL:
323e0a4a
AC
13553 /* XXX: gdb_sprint_host_address, type_sprint */
13554 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13555 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13556 fprintf_filtered (stream, " (");
13557 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13558 fprintf_filtered (stream, ")");
13559 break;
13560 case BINOP_IN_BOUNDS:
52ce6436
PH
13561 fprintf_filtered (stream, " (%d)",
13562 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13563 break;
13564 case TERNOP_IN_RANGE:
13565 break;
13566
52ce6436
PH
13567 case OP_AGGREGATE:
13568 case OP_OTHERS:
13569 case OP_DISCRETE_RANGE:
13570 case OP_POSITIONAL:
13571 case OP_CHOICES:
13572 break;
13573
13574 case OP_NAME:
13575 case OP_STRING:
13576 {
13577 char *name = &exp->elts[elt + 2].string;
13578 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13579
52ce6436
PH
13580 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13581 break;
13582 }
13583
4c4b4cd2
PH
13584 default:
13585 return dump_subexp_body_standard (exp, stream, elt);
13586 }
13587
13588 elt += oplen;
13589 for (i = 0; i < nargs; i += 1)
13590 elt = dump_subexp (exp, stream, elt);
13591
13592 return elt;
13593}
13594
13595/* The Ada extension of print_subexp (q.v.). */
13596
76a01679
JB
13597static void
13598ada_print_subexp (struct expression *exp, int *pos,
13599 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13600{
52ce6436 13601 int oplen, nargs, i;
4c4b4cd2
PH
13602 int pc = *pos;
13603 enum exp_opcode op = exp->elts[pc].opcode;
13604
13605 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13606
52ce6436 13607 *pos += oplen;
4c4b4cd2
PH
13608 switch (op)
13609 {
13610 default:
52ce6436 13611 *pos -= oplen;
4c4b4cd2
PH
13612 print_subexp_standard (exp, pos, stream, prec);
13613 return;
13614
13615 case OP_VAR_VALUE:
987012b8 13616 fputs_filtered (exp->elts[pc + 2].symbol->natural_name (), stream);
4c4b4cd2
PH
13617 return;
13618
13619 case BINOP_IN_BOUNDS:
323e0a4a 13620 /* XXX: sprint_subexp */
4c4b4cd2 13621 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13622 fputs_filtered (" in ", stream);
4c4b4cd2 13623 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13624 fputs_filtered ("'range", stream);
4c4b4cd2 13625 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13626 fprintf_filtered (stream, "(%ld)",
13627 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13628 return;
13629
13630 case TERNOP_IN_RANGE:
4c4b4cd2 13631 if (prec >= PREC_EQUAL)
76a01679 13632 fputs_filtered ("(", stream);
323e0a4a 13633 /* XXX: sprint_subexp */
4c4b4cd2 13634 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13635 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13636 print_subexp (exp, pos, stream, PREC_EQUAL);
13637 fputs_filtered (" .. ", stream);
13638 print_subexp (exp, pos, stream, PREC_EQUAL);
13639 if (prec >= PREC_EQUAL)
76a01679
JB
13640 fputs_filtered (")", stream);
13641 return;
4c4b4cd2
PH
13642
13643 case OP_ATR_FIRST:
13644 case OP_ATR_LAST:
13645 case OP_ATR_LENGTH:
13646 case OP_ATR_IMAGE:
13647 case OP_ATR_MAX:
13648 case OP_ATR_MIN:
13649 case OP_ATR_MODULUS:
13650 case OP_ATR_POS:
13651 case OP_ATR_SIZE:
13652 case OP_ATR_TAG:
13653 case OP_ATR_VAL:
4c4b4cd2 13654 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679 13655 {
78134374 13656 if (exp->elts[*pos + 1].type->code () != TYPE_CODE_VOID)
79d43c61
TT
13657 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13658 &type_print_raw_options);
76a01679
JB
13659 *pos += 3;
13660 }
4c4b4cd2 13661 else
76a01679 13662 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13663 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13664 if (nargs > 1)
76a01679
JB
13665 {
13666 int tem;
5b4ee69b 13667
76a01679
JB
13668 for (tem = 1; tem < nargs; tem += 1)
13669 {
13670 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13671 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13672 }
13673 fputs_filtered (")", stream);
13674 }
4c4b4cd2 13675 return;
14f9c5c9 13676
4c4b4cd2 13677 case UNOP_QUAL:
4c4b4cd2
PH
13678 type_print (exp->elts[pc + 1].type, "", stream, 0);
13679 fputs_filtered ("'(", stream);
13680 print_subexp (exp, pos, stream, PREC_PREFIX);
13681 fputs_filtered (")", stream);
13682 return;
14f9c5c9 13683
4c4b4cd2 13684 case UNOP_IN_RANGE:
323e0a4a 13685 /* XXX: sprint_subexp */
4c4b4cd2 13686 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13687 fputs_filtered (" in ", stream);
79d43c61
TT
13688 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13689 &type_print_raw_options);
4c4b4cd2 13690 return;
52ce6436
PH
13691
13692 case OP_DISCRETE_RANGE:
13693 print_subexp (exp, pos, stream, PREC_SUFFIX);
13694 fputs_filtered ("..", stream);
13695 print_subexp (exp, pos, stream, PREC_SUFFIX);
13696 return;
13697
13698 case OP_OTHERS:
13699 fputs_filtered ("others => ", stream);
13700 print_subexp (exp, pos, stream, PREC_SUFFIX);
13701 return;
13702
13703 case OP_CHOICES:
13704 for (i = 0; i < nargs-1; i += 1)
13705 {
13706 if (i > 0)
13707 fputs_filtered ("|", stream);
13708 print_subexp (exp, pos, stream, PREC_SUFFIX);
13709 }
13710 fputs_filtered (" => ", stream);
13711 print_subexp (exp, pos, stream, PREC_SUFFIX);
13712 return;
13713
13714 case OP_POSITIONAL:
13715 print_subexp (exp, pos, stream, PREC_SUFFIX);
13716 return;
13717
13718 case OP_AGGREGATE:
13719 fputs_filtered ("(", stream);
13720 for (i = 0; i < nargs; i += 1)
13721 {
13722 if (i > 0)
13723 fputs_filtered (", ", stream);
13724 print_subexp (exp, pos, stream, PREC_SUFFIX);
13725 }
13726 fputs_filtered (")", stream);
13727 return;
4c4b4cd2
PH
13728 }
13729}
14f9c5c9
AS
13730
13731/* Table mapping opcodes into strings for printing operators
13732 and precedences of the operators. */
13733
d2e4a39e
AS
13734static const struct op_print ada_op_print_tab[] = {
13735 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13736 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13737 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13738 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13739 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13740 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13741 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13742 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13743 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13744 {">=", BINOP_GEQ, PREC_ORDER, 0},
13745 {">", BINOP_GTR, PREC_ORDER, 0},
13746 {"<", BINOP_LESS, PREC_ORDER, 0},
13747 {">>", BINOP_RSH, PREC_SHIFT, 0},
13748 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13749 {"+", BINOP_ADD, PREC_ADD, 0},
13750 {"-", BINOP_SUB, PREC_ADD, 0},
13751 {"&", BINOP_CONCAT, PREC_ADD, 0},
13752 {"*", BINOP_MUL, PREC_MUL, 0},
13753 {"/", BINOP_DIV, PREC_MUL, 0},
13754 {"rem", BINOP_REM, PREC_MUL, 0},
13755 {"mod", BINOP_MOD, PREC_MUL, 0},
13756 {"**", BINOP_EXP, PREC_REPEAT, 0},
13757 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13758 {"-", UNOP_NEG, PREC_PREFIX, 0},
13759 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13760 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13761 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13762 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13763 {".all", UNOP_IND, PREC_SUFFIX, 1},
13764 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13765 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 13766 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9
AS
13767};
13768\f
72d5681a
PH
13769enum ada_primitive_types {
13770 ada_primitive_type_int,
13771 ada_primitive_type_long,
13772 ada_primitive_type_short,
13773 ada_primitive_type_char,
13774 ada_primitive_type_float,
13775 ada_primitive_type_double,
13776 ada_primitive_type_void,
13777 ada_primitive_type_long_long,
13778 ada_primitive_type_long_double,
13779 ada_primitive_type_natural,
13780 ada_primitive_type_positive,
13781 ada_primitive_type_system_address,
08f49010 13782 ada_primitive_type_storage_offset,
72d5681a
PH
13783 nr_ada_primitive_types
13784};
6c038f32
PH
13785
13786static void
d4a9a881 13787ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13788 struct language_arch_info *lai)
13789{
d4a9a881 13790 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13791
72d5681a 13792 lai->primitive_type_vector
d4a9a881 13793 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13794 struct type *);
e9bb382b
UW
13795
13796 lai->primitive_type_vector [ada_primitive_type_int]
13797 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13798 0, "integer");
13799 lai->primitive_type_vector [ada_primitive_type_long]
13800 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13801 0, "long_integer");
13802 lai->primitive_type_vector [ada_primitive_type_short]
13803 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13804 0, "short_integer");
13805 lai->string_char_type
13806 = lai->primitive_type_vector [ada_primitive_type_char]
cd7c1778 13807 = arch_character_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
e9bb382b
UW
13808 lai->primitive_type_vector [ada_primitive_type_float]
13809 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
49f190bc 13810 "float", gdbarch_float_format (gdbarch));
e9bb382b
UW
13811 lai->primitive_type_vector [ada_primitive_type_double]
13812 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
49f190bc 13813 "long_float", gdbarch_double_format (gdbarch));
e9bb382b
UW
13814 lai->primitive_type_vector [ada_primitive_type_long_long]
13815 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13816 0, "long_long_integer");
13817 lai->primitive_type_vector [ada_primitive_type_long_double]
5f3bceb6 13818 = arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
49f190bc 13819 "long_long_float", gdbarch_long_double_format (gdbarch));
e9bb382b
UW
13820 lai->primitive_type_vector [ada_primitive_type_natural]
13821 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13822 0, "natural");
13823 lai->primitive_type_vector [ada_primitive_type_positive]
13824 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13825 0, "positive");
13826 lai->primitive_type_vector [ada_primitive_type_void]
13827 = builtin->builtin_void;
13828
13829 lai->primitive_type_vector [ada_primitive_type_system_address]
77b7c781
UW
13830 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
13831 "void"));
d0e39ea2
SM
13832 lai->primitive_type_vector [ada_primitive_type_system_address]
13833 ->set_name ("system__address");
fbb06eb1 13834
08f49010
XR
13835 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
13836 type. This is a signed integral type whose size is the same as
13837 the size of addresses. */
13838 {
13839 unsigned int addr_length = TYPE_LENGTH
13840 (lai->primitive_type_vector [ada_primitive_type_system_address]);
13841
13842 lai->primitive_type_vector [ada_primitive_type_storage_offset]
13843 = arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
13844 "storage_offset");
13845 }
13846
47e729a8 13847 lai->bool_type_symbol = NULL;
fbb06eb1 13848 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13849}
6c038f32
PH
13850\f
13851 /* Language vector */
13852
13853/* Not really used, but needed in the ada_language_defn. */
13854
13855static void
6c7a06a3 13856emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13857{
6c7a06a3 13858 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13859}
13860
13861static int
410a0ff2 13862parse (struct parser_state *ps)
6c038f32
PH
13863{
13864 warnings_issued = 0;
410a0ff2 13865 return ada_parse (ps);
6c038f32
PH
13866}
13867
13868static const struct exp_descriptor ada_exp_descriptor = {
13869 ada_print_subexp,
13870 ada_operator_length,
c0201579 13871 ada_operator_check,
6c038f32
PH
13872 ada_op_name,
13873 ada_dump_subexp_body,
13874 ada_evaluate_subexp
13875};
13876
b5ec771e
PA
13877/* symbol_name_matcher_ftype adapter for wild_match. */
13878
13879static bool
13880do_wild_match (const char *symbol_search_name,
13881 const lookup_name_info &lookup_name,
a207cff2 13882 completion_match_result *comp_match_res)
b5ec771e
PA
13883{
13884 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
13885}
13886
13887/* symbol_name_matcher_ftype adapter for full_match. */
13888
13889static bool
13890do_full_match (const char *symbol_search_name,
13891 const lookup_name_info &lookup_name,
a207cff2 13892 completion_match_result *comp_match_res)
b5ec771e
PA
13893{
13894 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
13895}
13896
a2cd4f14
JB
13897/* symbol_name_matcher_ftype for exact (verbatim) matches. */
13898
13899static bool
13900do_exact_match (const char *symbol_search_name,
13901 const lookup_name_info &lookup_name,
13902 completion_match_result *comp_match_res)
13903{
13904 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
13905}
13906
b5ec771e
PA
13907/* Build the Ada lookup name for LOOKUP_NAME. */
13908
13909ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
13910{
e0802d59 13911 gdb::string_view user_name = lookup_name.name ();
b5ec771e
PA
13912
13913 if (user_name[0] == '<')
13914 {
13915 if (user_name.back () == '>')
e0802d59
TT
13916 m_encoded_name
13917 = user_name.substr (1, user_name.size () - 2).to_string ();
b5ec771e 13918 else
e0802d59
TT
13919 m_encoded_name
13920 = user_name.substr (1, user_name.size () - 1).to_string ();
b5ec771e
PA
13921 m_encoded_p = true;
13922 m_verbatim_p = true;
13923 m_wild_match_p = false;
13924 m_standard_p = false;
13925 }
13926 else
13927 {
13928 m_verbatim_p = false;
13929
e0802d59 13930 m_encoded_p = user_name.find ("__") != gdb::string_view::npos;
b5ec771e
PA
13931
13932 if (!m_encoded_p)
13933 {
e0802d59 13934 const char *folded = ada_fold_name (user_name);
b5ec771e
PA
13935 const char *encoded = ada_encode_1 (folded, false);
13936 if (encoded != NULL)
13937 m_encoded_name = encoded;
13938 else
e0802d59 13939 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13940 }
13941 else
e0802d59 13942 m_encoded_name = user_name.to_string ();
b5ec771e
PA
13943
13944 /* Handle the 'package Standard' special case. See description
13945 of m_standard_p. */
13946 if (startswith (m_encoded_name.c_str (), "standard__"))
13947 {
13948 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
13949 m_standard_p = true;
13950 }
13951 else
13952 m_standard_p = false;
74ccd7f5 13953
b5ec771e
PA
13954 /* If the name contains a ".", then the user is entering a fully
13955 qualified entity name, and the match must not be done in wild
13956 mode. Similarly, if the user wants to complete what looks
13957 like an encoded name, the match must not be done in wild
13958 mode. Also, in the standard__ special case always do
13959 non-wild matching. */
13960 m_wild_match_p
13961 = (lookup_name.match_type () != symbol_name_match_type::FULL
13962 && !m_encoded_p
13963 && !m_standard_p
13964 && user_name.find ('.') == std::string::npos);
13965 }
13966}
13967
13968/* symbol_name_matcher_ftype method for Ada. This only handles
13969 completion mode. */
13970
13971static bool
13972ada_symbol_name_matches (const char *symbol_search_name,
13973 const lookup_name_info &lookup_name,
a207cff2 13974 completion_match_result *comp_match_res)
74ccd7f5 13975{
b5ec771e
PA
13976 return lookup_name.ada ().matches (symbol_search_name,
13977 lookup_name.match_type (),
a207cff2 13978 comp_match_res);
b5ec771e
PA
13979}
13980
de63c46b
PA
13981/* A name matcher that matches the symbol name exactly, with
13982 strcmp. */
13983
13984static bool
13985literal_symbol_name_matcher (const char *symbol_search_name,
13986 const lookup_name_info &lookup_name,
13987 completion_match_result *comp_match_res)
13988{
e0802d59 13989 gdb::string_view name_view = lookup_name.name ();
de63c46b 13990
e0802d59
TT
13991 if (lookup_name.completion_mode ()
13992 ? (strncmp (symbol_search_name, name_view.data (),
13993 name_view.size ()) == 0)
13994 : symbol_search_name == name_view)
de63c46b
PA
13995 {
13996 if (comp_match_res != NULL)
13997 comp_match_res->set_match (symbol_search_name);
13998 return true;
13999 }
14000 else
14001 return false;
14002}
14003
b5ec771e
PA
14004/* Implement the "la_get_symbol_name_matcher" language_defn method for
14005 Ada. */
14006
14007static symbol_name_matcher_ftype *
14008ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
14009{
de63c46b
PA
14010 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
14011 return literal_symbol_name_matcher;
14012
b5ec771e
PA
14013 if (lookup_name.completion_mode ())
14014 return ada_symbol_name_matches;
74ccd7f5 14015 else
b5ec771e
PA
14016 {
14017 if (lookup_name.ada ().wild_match_p ())
14018 return do_wild_match;
a2cd4f14
JB
14019 else if (lookup_name.ada ().verbatim_p ())
14020 return do_exact_match;
b5ec771e
PA
14021 else
14022 return do_full_match;
14023 }
74ccd7f5
JB
14024}
14025
56618e20
TT
14026static const char *ada_extensions[] =
14027{
14028 ".adb", ".ads", ".a", ".ada", ".dg", NULL
14029};
14030
0874fd07
AB
14031/* Constant data that describes the Ada language. */
14032
14033extern const struct language_data ada_language_data =
14034{
6c038f32 14035 "ada", /* Language name */
6abde28f 14036 "Ada",
6c038f32 14037 language_ada,
6c038f32 14038 range_check_off,
6c038f32
PH
14039 case_sensitive_on, /* Yes, Ada is case-insensitive, but
14040 that's not quite what this means. */
6c038f32 14041 array_row_major,
9a044a89 14042 macro_expansion_no,
56618e20 14043 ada_extensions,
6c038f32
PH
14044 &ada_exp_descriptor,
14045 parse,
6c038f32
PH
14046 resolve,
14047 ada_printchar, /* Print a character constant */
14048 ada_printstr, /* Function to print string constant */
14049 emit_char, /* Function to print single char (not used) */
6c038f32 14050 ada_print_type, /* Print a type using appropriate syntax */
be942545 14051 ada_print_typedef, /* Print a typedef using appropriate syntax */
26792ee0 14052 ada_value_print_inner, /* la_value_print_inner */
6c038f32
PH
14053 ada_value_print, /* Print a top-level value */
14054 NULL, /* Language specific skip_trampoline */
2b2d9e11 14055 NULL, /* name_of_this */
59cc4834 14056 true, /* la_store_sym_names_in_linkage_form_p */
6c038f32
PH
14057 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
14058 basic_lookup_transparent_type, /* lookup_transparent_type */
14059 ada_la_decode, /* Language specific symbol demangler */
8b302db8 14060 ada_sniff_from_mangled_name,
0963b4bd
MS
14061 NULL, /* Language specific
14062 class_name_from_physname */
6c038f32
PH
14063 ada_op_print_tab, /* expression operators for printing */
14064 0, /* c-style arrays */
14065 1, /* String lower bound */
6c038f32 14066 ada_get_gdb_completer_word_break_characters,
eb3ff9a5 14067 ada_collect_symbol_completion_matches,
72d5681a 14068 ada_language_arch_info,
e2b7af72 14069 ada_watch_location_expression,
b5ec771e 14070 ada_get_symbol_name_matcher, /* la_get_symbol_name_matcher */
f8eba3c6 14071 ada_iterate_over_symbols,
5ffa0793 14072 default_search_name_hash,
a53b64ea 14073 &ada_varobj_ops,
bb2ec1b3 14074 NULL,
721b08c6 14075 NULL,
4be290b2 14076 ada_is_string_type,
721b08c6 14077 "(...)" /* la_struct_too_deep_ellipsis */
6c038f32
PH
14078};
14079
0874fd07
AB
14080/* Class representing the Ada language. */
14081
14082class ada_language : public language_defn
14083{
14084public:
14085 ada_language ()
14086 : language_defn (language_ada, ada_language_data)
14087 { /* Nothing. */ }
5bd40f2a
AB
14088
14089 /* Print an array element index using the Ada syntax. */
14090
14091 void print_array_index (struct type *index_type,
14092 LONGEST index,
14093 struct ui_file *stream,
14094 const value_print_options *options) const override
14095 {
14096 struct value *index_value = val_atr (index_type, index);
14097
14098 LA_VALUE_PRINT (index_value, stream, options);
14099 fprintf_filtered (stream, " => ");
14100 }
15e5fd35
AB
14101
14102 /* Implement the "read_var_value" language_defn method for Ada. */
14103
14104 struct value *read_var_value (struct symbol *var,
14105 const struct block *var_block,
14106 struct frame_info *frame) const override
14107 {
14108 /* The only case where default_read_var_value is not sufficient
14109 is when VAR is a renaming... */
14110 if (frame != nullptr)
14111 {
14112 const struct block *frame_block = get_frame_block (frame, NULL);
14113 if (frame_block != nullptr && ada_is_renaming_symbol (var))
14114 return ada_read_renaming_var_value (var, frame_block);
14115 }
14116
14117 /* This is a typical case where we expect the default_read_var_value
14118 function to work. */
14119 return language_defn::read_var_value (var, var_block, frame);
14120 }
0874fd07
AB
14121};
14122
14123/* Single instance of the Ada language class. */
14124
14125static ada_language ada_language_defn;
14126
5bf03f13
JB
14127/* Command-list for the "set/show ada" prefix command. */
14128static struct cmd_list_element *set_ada_list;
14129static struct cmd_list_element *show_ada_list;
14130
2060206e
PA
14131static void
14132initialize_ada_catchpoint_ops (void)
14133{
14134 struct breakpoint_ops *ops;
14135
14136 initialize_breakpoint_ops ();
14137
14138 ops = &catch_exception_breakpoint_ops;
14139 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14140 ops->allocate_location = allocate_location_exception;
14141 ops->re_set = re_set_exception;
14142 ops->check_status = check_status_exception;
14143 ops->print_it = print_it_exception;
14144 ops->print_one = print_one_exception;
14145 ops->print_mention = print_mention_exception;
14146 ops->print_recreate = print_recreate_exception;
2060206e
PA
14147
14148 ops = &catch_exception_unhandled_breakpoint_ops;
14149 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14150 ops->allocate_location = allocate_location_exception;
14151 ops->re_set = re_set_exception;
14152 ops->check_status = check_status_exception;
14153 ops->print_it = print_it_exception;
14154 ops->print_one = print_one_exception;
14155 ops->print_mention = print_mention_exception;
14156 ops->print_recreate = print_recreate_exception;
2060206e
PA
14157
14158 ops = &catch_assert_breakpoint_ops;
14159 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14160 ops->allocate_location = allocate_location_exception;
14161 ops->re_set = re_set_exception;
14162 ops->check_status = check_status_exception;
14163 ops->print_it = print_it_exception;
14164 ops->print_one = print_one_exception;
14165 ops->print_mention = print_mention_exception;
14166 ops->print_recreate = print_recreate_exception;
9f757bf7
XR
14167
14168 ops = &catch_handlers_breakpoint_ops;
14169 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14170 ops->allocate_location = allocate_location_exception;
14171 ops->re_set = re_set_exception;
14172 ops->check_status = check_status_exception;
14173 ops->print_it = print_it_exception;
14174 ops->print_one = print_one_exception;
14175 ops->print_mention = print_mention_exception;
14176 ops->print_recreate = print_recreate_exception;
2060206e
PA
14177}
14178
3d9434b5
JB
14179/* This module's 'new_objfile' observer. */
14180
14181static void
14182ada_new_objfile_observer (struct objfile *objfile)
14183{
14184 ada_clear_symbol_cache ();
14185}
14186
14187/* This module's 'free_objfile' observer. */
14188
14189static void
14190ada_free_objfile_observer (struct objfile *objfile)
14191{
14192 ada_clear_symbol_cache ();
14193}
14194
6c265988 14195void _initialize_ada_language ();
d2e4a39e 14196void
6c265988 14197_initialize_ada_language ()
14f9c5c9 14198{
2060206e
PA
14199 initialize_ada_catchpoint_ops ();
14200
0743fc83
TT
14201 add_basic_prefix_cmd ("ada", no_class,
14202 _("Prefix command for changing Ada-specific settings."),
14203 &set_ada_list, "set ada ", 0, &setlist);
5bf03f13 14204
0743fc83
TT
14205 add_show_prefix_cmd ("ada", no_class,
14206 _("Generic command for showing Ada-specific settings."),
14207 &show_ada_list, "show ada ", 0, &showlist);
5bf03f13
JB
14208
14209 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
14210 &trust_pad_over_xvs, _("\
590042fc
PW
14211Enable or disable an optimization trusting PAD types over XVS types."), _("\
14212Show whether an optimization trusting PAD types over XVS types is activated."),
5bf03f13
JB
14213 _("\
14214This is related to the encoding used by the GNAT compiler. The debugger\n\
14215should normally trust the contents of PAD types, but certain older versions\n\
14216of GNAT have a bug that sometimes causes the information in the PAD type\n\
14217to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14218work around this bug. It is always safe to turn this option \"off\", but\n\
14219this incurs a slight performance penalty, so it is recommended to NOT change\n\
14220this option to \"off\" unless necessary."),
14221 NULL, NULL, &set_ada_list, &show_ada_list);
14222
d72413e6
PMR
14223 add_setshow_boolean_cmd ("print-signatures", class_vars,
14224 &print_signatures, _("\
14225Enable or disable the output of formal and return types for functions in the \
590042fc 14226overloads selection menu."), _("\
d72413e6 14227Show whether the output of formal and return types for functions in the \
590042fc 14228overloads selection menu is activated."),
d72413e6
PMR
14229 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14230
9ac4176b
PA
14231 add_catch_command ("exception", _("\
14232Catch Ada exceptions, when raised.\n\
9bf7038b 14233Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14234Without any argument, stop when any Ada exception is raised.\n\
14235If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14236being raised does not have a handler (and will therefore lead to the task's\n\
14237termination).\n\
14238Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14239raised is the same as ARG.\n\
14240CONDITION is a boolean expression that is evaluated to see whether the\n\
14241exception should cause a stop."),
9ac4176b 14242 catch_ada_exception_command,
71bed2db 14243 catch_ada_completer,
9ac4176b
PA
14244 CATCH_PERMANENT,
14245 CATCH_TEMPORARY);
9f757bf7
XR
14246
14247 add_catch_command ("handlers", _("\
14248Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14249Usage: catch handlers [ARG] [if CONDITION]\n\
14250Without any argument, stop when any Ada exception is handled.\n\
14251With an argument, catch only exceptions with the given name.\n\
14252CONDITION is a boolean expression that is evaluated to see whether the\n\
14253exception should cause a stop."),
9f757bf7 14254 catch_ada_handlers_command,
71bed2db 14255 catch_ada_completer,
9f757bf7
XR
14256 CATCH_PERMANENT,
14257 CATCH_TEMPORARY);
9ac4176b
PA
14258 add_catch_command ("assert", _("\
14259Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14260Usage: catch assert [if CONDITION]\n\
14261CONDITION is a boolean expression that is evaluated to see whether the\n\
14262exception should cause a stop."),
9ac4176b
PA
14263 catch_assert_command,
14264 NULL,
14265 CATCH_PERMANENT,
14266 CATCH_TEMPORARY);
14267
6c038f32 14268 varsize_limit = 65536;
3fcded8f
JB
14269 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14270 &varsize_limit, _("\
14271Set the maximum number of bytes allowed in a variable-size object."), _("\
14272Show the maximum number of bytes allowed in a variable-size object."), _("\
14273Attempts to access an object whose size is not a compile-time constant\n\
14274and exceeds this limit will cause an error."),
14275 NULL, NULL, &setlist, &showlist);
6c038f32 14276
778865d3
JB
14277 add_info ("exceptions", info_exceptions_command,
14278 _("\
14279List all Ada exception names.\n\
9bf7038b 14280Usage: info exceptions [REGEXP]\n\
778865d3
JB
14281If a regular expression is passed as an argument, only those matching\n\
14282the regular expression are listed."));
14283
0743fc83
TT
14284 add_basic_prefix_cmd ("ada", class_maintenance,
14285 _("Set Ada maintenance-related variables."),
14286 &maint_set_ada_cmdlist, "maintenance set ada ",
14287 0/*allow-unknown*/, &maintenance_set_cmdlist);
c6044dd1 14288
0743fc83
TT
14289 add_show_prefix_cmd ("ada", class_maintenance,
14290 _("Show Ada maintenance-related variables."),
14291 &maint_show_ada_cmdlist, "maintenance show ada ",
14292 0/*allow-unknown*/, &maintenance_show_cmdlist);
c6044dd1
JB
14293
14294 add_setshow_boolean_cmd
14295 ("ignore-descriptive-types", class_maintenance,
14296 &ada_ignore_descriptive_types_p,
14297 _("Set whether descriptive types generated by GNAT should be ignored."),
14298 _("Show whether descriptive types generated by GNAT should be ignored."),
14299 _("\
14300When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14301DWARF attribute."),
14302 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14303
459a2e4c
TT
14304 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14305 NULL, xcalloc, xfree);
6b69afc4 14306
3d9434b5 14307 /* The ada-lang observers. */
76727919
TT
14308 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14309 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14310 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14311}
This page took 3.132895 seconds and 4 git commands to generate.