make calls to help_list use enumerator
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
ecd75fc8 3 Copyright (C) 1992-2014 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <stdio.h>
0e9f083f 23#include <string.h>
14f9c5c9
AS
24#include <ctype.h>
25#include <stdarg.h>
26#include "demangle.h"
4c4b4cd2
PH
27#include "gdb_regex.h"
28#include "frame.h"
14f9c5c9
AS
29#include "symtab.h"
30#include "gdbtypes.h"
31#include "gdbcmd.h"
32#include "expression.h"
33#include "parser-defs.h"
34#include "language.h"
a53b64ea 35#include "varobj.h"
14f9c5c9
AS
36#include "c-lang.h"
37#include "inferior.h"
38#include "symfile.h"
39#include "objfiles.h"
40#include "breakpoint.h"
41#include "gdbcore.h"
4c4b4cd2
PH
42#include "hashtab.h"
43#include "gdb_obstack.h"
14f9c5c9 44#include "ada-lang.h"
4c4b4cd2 45#include "completer.h"
53ce3c39 46#include <sys/stat.h>
14f9c5c9 47#include "ui-out.h"
fe898f56 48#include "block.h"
04714b91 49#include "infcall.h"
de4f826b 50#include "dictionary.h"
60250e8b 51#include "exceptions.h"
f7f9143b
JB
52#include "annotate.h"
53#include "valprint.h"
9bbc9174 54#include "source.h"
0259addd 55#include "observer.h"
2ba95b9b 56#include "vec.h"
692465f1 57#include "stack.h"
fa864999 58#include "gdb_vecs.h"
79d43c61 59#include "typeprint.h"
14f9c5c9 60
ccefe4c4 61#include "psymtab.h"
40bc484c 62#include "value.h"
956a9fb9 63#include "mi/mi-common.h"
9ac4176b 64#include "arch-utils.h"
0fcd72ba 65#include "cli/cli-utils.h"
ccefe4c4 66
4c4b4cd2 67/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 68 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
69 Copied from valarith.c. */
70
71#ifndef TRUNCATION_TOWARDS_ZERO
72#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
73#endif
74
d2e4a39e 75static struct type *desc_base_type (struct type *);
14f9c5c9 76
d2e4a39e 77static struct type *desc_bounds_type (struct type *);
14f9c5c9 78
d2e4a39e 79static struct value *desc_bounds (struct value *);
14f9c5c9 80
d2e4a39e 81static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 82
d2e4a39e 83static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 84
556bdfd4 85static struct type *desc_data_target_type (struct type *);
14f9c5c9 86
d2e4a39e 87static struct value *desc_data (struct value *);
14f9c5c9 88
d2e4a39e 89static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 90
d2e4a39e 91static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 92
d2e4a39e 93static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 94
d2e4a39e 95static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 96
d2e4a39e 97static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 98
d2e4a39e 99static struct type *desc_index_type (struct type *, int);
14f9c5c9 100
d2e4a39e 101static int desc_arity (struct type *);
14f9c5c9 102
d2e4a39e 103static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 104
d2e4a39e 105static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 106
40658b94
PH
107static int full_match (const char *, const char *);
108
40bc484c 109static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 110
4c4b4cd2 111static void ada_add_block_symbols (struct obstack *,
f0c5f9b2 112 const struct block *, const char *,
2570f2b7 113 domain_enum, struct objfile *, int);
14f9c5c9 114
4c4b4cd2 115static int is_nonfunction (struct ada_symbol_info *, int);
14f9c5c9 116
76a01679 117static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 118 const struct block *);
14f9c5c9 119
4c4b4cd2
PH
120static int num_defns_collected (struct obstack *);
121
122static struct ada_symbol_info *defns_collected (struct obstack *, int);
14f9c5c9 123
4c4b4cd2 124static struct value *resolve_subexp (struct expression **, int *, int,
76a01679 125 struct type *);
14f9c5c9 126
d2e4a39e 127static void replace_operator_with_call (struct expression **, int, int, int,
270140bd 128 struct symbol *, const struct block *);
14f9c5c9 129
d2e4a39e 130static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 131
4c4b4cd2
PH
132static char *ada_op_name (enum exp_opcode);
133
134static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 135
d2e4a39e 136static int numeric_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int integer_type_p (struct type *);
14f9c5c9 139
d2e4a39e 140static int scalar_type_p (struct type *);
14f9c5c9 141
d2e4a39e 142static int discrete_type_p (struct type *);
14f9c5c9 143
aeb5907d
JB
144static enum ada_renaming_category parse_old_style_renaming (struct type *,
145 const char **,
146 int *,
147 const char **);
148
149static struct symbol *find_old_style_renaming_symbol (const char *,
270140bd 150 const struct block *);
aeb5907d 151
4c4b4cd2 152static struct type *ada_lookup_struct_elt_type (struct type *, char *,
76a01679 153 int, int, int *);
4c4b4cd2 154
d2e4a39e 155static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 156
b4ba55a1
JB
157static struct type *ada_find_parallel_type_with_name (struct type *,
158 const char *);
159
d2e4a39e 160static int is_dynamic_field (struct type *, int);
14f9c5c9 161
10a2c479 162static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 163 const gdb_byte *,
4c4b4cd2
PH
164 CORE_ADDR, struct value *);
165
166static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 167
28c85d6c 168static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 169
d2e4a39e 170static struct type *to_static_fixed_type (struct type *);
f192137b 171static struct type *static_unwrap_type (struct type *type);
14f9c5c9 172
d2e4a39e 173static struct value *unwrap_value (struct value *);
14f9c5c9 174
ad82864c 175static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 176
ad82864c 177static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 178
ad82864c
JB
179static long decode_packed_array_bitsize (struct type *);
180
181static struct value *decode_constrained_packed_array (struct value *);
182
183static int ada_is_packed_array_type (struct type *);
184
185static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 186
d2e4a39e 187static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 188 struct value **);
14f9c5c9 189
50810684 190static void move_bits (gdb_byte *, int, const gdb_byte *, int, int, int);
52ce6436 191
4c4b4cd2
PH
192static struct value *coerce_unspec_val_to_type (struct value *,
193 struct type *);
14f9c5c9 194
d2e4a39e 195static struct value *get_var_value (char *, char *);
14f9c5c9 196
d2e4a39e 197static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 198
d2e4a39e 199static int equiv_types (struct type *, struct type *);
14f9c5c9 200
d2e4a39e 201static int is_name_suffix (const char *);
14f9c5c9 202
73589123
PH
203static int advance_wild_match (const char **, const char *, int);
204
205static int wild_match (const char *, const char *);
14f9c5c9 206
d2e4a39e 207static struct value *ada_coerce_ref (struct value *);
14f9c5c9 208
4c4b4cd2
PH
209static LONGEST pos_atr (struct value *);
210
3cb382c9 211static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 212
d2e4a39e 213static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 214
4c4b4cd2
PH
215static struct symbol *standard_lookup (const char *, const struct block *,
216 domain_enum);
14f9c5c9 217
4c4b4cd2
PH
218static struct value *ada_search_struct_field (char *, struct value *, int,
219 struct type *);
220
221static struct value *ada_value_primitive_field (struct value *, int, int,
222 struct type *);
223
0d5cff50 224static int find_struct_field (const char *, struct type *, int,
52ce6436 225 struct type **, int *, int *, int *, int *);
4c4b4cd2
PH
226
227static struct value *ada_to_fixed_value_create (struct type *, CORE_ADDR,
228 struct value *);
229
4c4b4cd2
PH
230static int ada_resolve_function (struct ada_symbol_info *, int,
231 struct value **, int, const char *,
232 struct type *);
233
4c4b4cd2
PH
234static int ada_is_direct_array_type (struct type *);
235
72d5681a
PH
236static void ada_language_arch_info (struct gdbarch *,
237 struct language_arch_info *);
714e53ab
PH
238
239static void check_size (const struct type *);
52ce6436
PH
240
241static struct value *ada_index_struct_field (int, struct value *, int,
242 struct type *);
243
244static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
245 struct expression *,
246 int *, enum noside);
52ce6436
PH
247
248static void aggregate_assign_from_choices (struct value *, struct value *,
249 struct expression *,
250 int *, LONGEST *, int *,
251 int, LONGEST, LONGEST);
252
253static void aggregate_assign_positional (struct value *, struct value *,
254 struct expression *,
255 int *, LONGEST *, int *, int,
256 LONGEST, LONGEST);
257
258
259static void aggregate_assign_others (struct value *, struct value *,
260 struct expression *,
261 int *, LONGEST *, int, LONGEST, LONGEST);
262
263
264static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
265
266
267static struct value *ada_evaluate_subexp (struct type *, struct expression *,
268 int *, enum noside);
269
270static void ada_forward_operator_length (struct expression *, int, int *,
271 int *);
852dff6c
JB
272
273static struct type *ada_find_any_type (const char *name);
4c4b4cd2
PH
274\f
275
ee01b665
JB
276/* The result of a symbol lookup to be stored in our symbol cache. */
277
278struct cache_entry
279{
280 /* The name used to perform the lookup. */
281 const char *name;
282 /* The namespace used during the lookup. */
283 domain_enum namespace;
284 /* The symbol returned by the lookup, or NULL if no matching symbol
285 was found. */
286 struct symbol *sym;
287 /* The block where the symbol was found, or NULL if no matching
288 symbol was found. */
289 const struct block *block;
290 /* A pointer to the next entry with the same hash. */
291 struct cache_entry *next;
292};
293
294/* The Ada symbol cache, used to store the result of Ada-mode symbol
295 lookups in the course of executing the user's commands.
296
297 The cache is implemented using a simple, fixed-sized hash.
298 The size is fixed on the grounds that there are not likely to be
299 all that many symbols looked up during any given session, regardless
300 of the size of the symbol table. If we decide to go to a resizable
301 table, let's just use the stuff from libiberty instead. */
302
303#define HASH_SIZE 1009
304
305struct ada_symbol_cache
306{
307 /* An obstack used to store the entries in our cache. */
308 struct obstack cache_space;
309
310 /* The root of the hash table used to implement our symbol cache. */
311 struct cache_entry *root[HASH_SIZE];
312};
313
314static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 315
4c4b4cd2 316/* Maximum-sized dynamic type. */
14f9c5c9
AS
317static unsigned int varsize_limit;
318
4c4b4cd2
PH
319/* FIXME: brobecker/2003-09-17: No longer a const because it is
320 returned by a function that does not return a const char *. */
321static char *ada_completer_word_break_characters =
322#ifdef VMS
323 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
324#else
14f9c5c9 325 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 326#endif
14f9c5c9 327
4c4b4cd2 328/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 329static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 330 = "__gnat_ada_main_program_name";
14f9c5c9 331
4c4b4cd2
PH
332/* Limit on the number of warnings to raise per expression evaluation. */
333static int warning_limit = 2;
334
335/* Number of warning messages issued; reset to 0 by cleanups after
336 expression evaluation. */
337static int warnings_issued = 0;
338
339static const char *known_runtime_file_name_patterns[] = {
340 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
341};
342
343static const char *known_auxiliary_function_name_patterns[] = {
344 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
345};
346
347/* Space for allocating results of ada_lookup_symbol_list. */
348static struct obstack symbol_list_obstack;
349
c6044dd1
JB
350/* Maintenance-related settings for this module. */
351
352static struct cmd_list_element *maint_set_ada_cmdlist;
353static struct cmd_list_element *maint_show_ada_cmdlist;
354
355/* Implement the "maintenance set ada" (prefix) command. */
356
357static void
358maint_set_ada_cmd (char *args, int from_tty)
359{
635c7e8a
TT
360 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
361 gdb_stdout);
c6044dd1
JB
362}
363
364/* Implement the "maintenance show ada" (prefix) command. */
365
366static void
367maint_show_ada_cmd (char *args, int from_tty)
368{
369 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
370}
371
372/* The "maintenance ada set/show ignore-descriptive-type" value. */
373
374static int ada_ignore_descriptive_types_p = 0;
375
e802dbe0
JB
376 /* Inferior-specific data. */
377
378/* Per-inferior data for this module. */
379
380struct ada_inferior_data
381{
382 /* The ada__tags__type_specific_data type, which is used when decoding
383 tagged types. With older versions of GNAT, this type was directly
384 accessible through a component ("tsd") in the object tag. But this
385 is no longer the case, so we cache it for each inferior. */
386 struct type *tsd_type;
3eecfa55
JB
387
388 /* The exception_support_info data. This data is used to determine
389 how to implement support for Ada exception catchpoints in a given
390 inferior. */
391 const struct exception_support_info *exception_info;
e802dbe0
JB
392};
393
394/* Our key to this module's inferior data. */
395static const struct inferior_data *ada_inferior_data;
396
397/* A cleanup routine for our inferior data. */
398static void
399ada_inferior_data_cleanup (struct inferior *inf, void *arg)
400{
401 struct ada_inferior_data *data;
402
403 data = inferior_data (inf, ada_inferior_data);
404 if (data != NULL)
405 xfree (data);
406}
407
408/* Return our inferior data for the given inferior (INF).
409
410 This function always returns a valid pointer to an allocated
411 ada_inferior_data structure. If INF's inferior data has not
412 been previously set, this functions creates a new one with all
413 fields set to zero, sets INF's inferior to it, and then returns
414 a pointer to that newly allocated ada_inferior_data. */
415
416static struct ada_inferior_data *
417get_ada_inferior_data (struct inferior *inf)
418{
419 struct ada_inferior_data *data;
420
421 data = inferior_data (inf, ada_inferior_data);
422 if (data == NULL)
423 {
41bf6aca 424 data = XCNEW (struct ada_inferior_data);
e802dbe0
JB
425 set_inferior_data (inf, ada_inferior_data, data);
426 }
427
428 return data;
429}
430
431/* Perform all necessary cleanups regarding our module's inferior data
432 that is required after the inferior INF just exited. */
433
434static void
435ada_inferior_exit (struct inferior *inf)
436{
437 ada_inferior_data_cleanup (inf, NULL);
438 set_inferior_data (inf, ada_inferior_data, NULL);
439}
440
ee01b665
JB
441
442 /* program-space-specific data. */
443
444/* This module's per-program-space data. */
445struct ada_pspace_data
446{
447 /* The Ada symbol cache. */
448 struct ada_symbol_cache *sym_cache;
449};
450
451/* Key to our per-program-space data. */
452static const struct program_space_data *ada_pspace_data_handle;
453
454/* Return this module's data for the given program space (PSPACE).
455 If not is found, add a zero'ed one now.
456
457 This function always returns a valid object. */
458
459static struct ada_pspace_data *
460get_ada_pspace_data (struct program_space *pspace)
461{
462 struct ada_pspace_data *data;
463
464 data = program_space_data (pspace, ada_pspace_data_handle);
465 if (data == NULL)
466 {
467 data = XCNEW (struct ada_pspace_data);
468 set_program_space_data (pspace, ada_pspace_data_handle, data);
469 }
470
471 return data;
472}
473
474/* The cleanup callback for this module's per-program-space data. */
475
476static void
477ada_pspace_data_cleanup (struct program_space *pspace, void *data)
478{
479 struct ada_pspace_data *pspace_data = data;
480
481 if (pspace_data->sym_cache != NULL)
482 ada_free_symbol_cache (pspace_data->sym_cache);
483 xfree (pspace_data);
484}
485
4c4b4cd2
PH
486 /* Utilities */
487
720d1a40 488/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 489 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
490
491 Normally, we really expect a typedef type to only have 1 typedef layer.
492 In other words, we really expect the target type of a typedef type to be
493 a non-typedef type. This is particularly true for Ada units, because
494 the language does not have a typedef vs not-typedef distinction.
495 In that respect, the Ada compiler has been trying to eliminate as many
496 typedef definitions in the debugging information, since they generally
497 do not bring any extra information (we still use typedef under certain
498 circumstances related mostly to the GNAT encoding).
499
500 Unfortunately, we have seen situations where the debugging information
501 generated by the compiler leads to such multiple typedef layers. For
502 instance, consider the following example with stabs:
503
504 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
505 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
506
507 This is an error in the debugging information which causes type
508 pck__float_array___XUP to be defined twice, and the second time,
509 it is defined as a typedef of a typedef.
510
511 This is on the fringe of legality as far as debugging information is
512 concerned, and certainly unexpected. But it is easy to handle these
513 situations correctly, so we can afford to be lenient in this case. */
514
515static struct type *
516ada_typedef_target_type (struct type *type)
517{
518 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
519 type = TYPE_TARGET_TYPE (type);
520 return type;
521}
522
41d27058
JB
523/* Given DECODED_NAME a string holding a symbol name in its
524 decoded form (ie using the Ada dotted notation), returns
525 its unqualified name. */
526
527static const char *
528ada_unqualified_name (const char *decoded_name)
529{
530 const char *result = strrchr (decoded_name, '.');
531
532 if (result != NULL)
533 result++; /* Skip the dot... */
534 else
535 result = decoded_name;
536
537 return result;
538}
539
540/* Return a string starting with '<', followed by STR, and '>'.
541 The result is good until the next call. */
542
543static char *
544add_angle_brackets (const char *str)
545{
546 static char *result = NULL;
547
548 xfree (result);
88c15c34 549 result = xstrprintf ("<%s>", str);
41d27058
JB
550 return result;
551}
96d887e8 552
4c4b4cd2
PH
553static char *
554ada_get_gdb_completer_word_break_characters (void)
555{
556 return ada_completer_word_break_characters;
557}
558
e79af960
JB
559/* Print an array element index using the Ada syntax. */
560
561static void
562ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 563 const struct value_print_options *options)
e79af960 564{
79a45b7d 565 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
566 fprintf_filtered (stream, " => ");
567}
568
f27cf670 569/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 570 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 571 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 572
f27cf670
AS
573void *
574grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 575{
d2e4a39e
AS
576 if (*size < min_size)
577 {
578 *size *= 2;
579 if (*size < min_size)
4c4b4cd2 580 *size = min_size;
f27cf670 581 vect = xrealloc (vect, *size * element_size);
d2e4a39e 582 }
f27cf670 583 return vect;
14f9c5c9
AS
584}
585
586/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 587 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
588
589static int
ebf56fd3 590field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
591{
592 int len = strlen (target);
5b4ee69b 593
d2e4a39e 594 return
4c4b4cd2
PH
595 (strncmp (field_name, target, len) == 0
596 && (field_name[len] == '\0'
597 || (strncmp (field_name + len, "___", 3) == 0
76a01679
JB
598 && strcmp (field_name + strlen (field_name) - 6,
599 "___XVN") != 0)));
14f9c5c9
AS
600}
601
602
872c8b51
JB
603/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
604 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
605 and return its index. This function also handles fields whose name
606 have ___ suffixes because the compiler sometimes alters their name
607 by adding such a suffix to represent fields with certain constraints.
608 If the field could not be found, return a negative number if
609 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
610
611int
612ada_get_field_index (const struct type *type, const char *field_name,
613 int maybe_missing)
614{
615 int fieldno;
872c8b51
JB
616 struct type *struct_type = check_typedef ((struct type *) type);
617
618 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
619 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
620 return fieldno;
621
622 if (!maybe_missing)
323e0a4a 623 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 624 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
625
626 return -1;
627}
628
629/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
630
631int
d2e4a39e 632ada_name_prefix_len (const char *name)
14f9c5c9
AS
633{
634 if (name == NULL)
635 return 0;
d2e4a39e 636 else
14f9c5c9 637 {
d2e4a39e 638 const char *p = strstr (name, "___");
5b4ee69b 639
14f9c5c9 640 if (p == NULL)
4c4b4cd2 641 return strlen (name);
14f9c5c9 642 else
4c4b4cd2 643 return p - name;
14f9c5c9
AS
644 }
645}
646
4c4b4cd2
PH
647/* Return non-zero if SUFFIX is a suffix of STR.
648 Return zero if STR is null. */
649
14f9c5c9 650static int
d2e4a39e 651is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
652{
653 int len1, len2;
5b4ee69b 654
14f9c5c9
AS
655 if (str == NULL)
656 return 0;
657 len1 = strlen (str);
658 len2 = strlen (suffix);
4c4b4cd2 659 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
660}
661
4c4b4cd2
PH
662/* The contents of value VAL, treated as a value of type TYPE. The
663 result is an lval in memory if VAL is. */
14f9c5c9 664
d2e4a39e 665static struct value *
4c4b4cd2 666coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 667{
61ee279c 668 type = ada_check_typedef (type);
df407dfe 669 if (value_type (val) == type)
4c4b4cd2 670 return val;
d2e4a39e 671 else
14f9c5c9 672 {
4c4b4cd2
PH
673 struct value *result;
674
675 /* Make sure that the object size is not unreasonable before
676 trying to allocate some memory for it. */
714e53ab 677 check_size (type);
4c4b4cd2 678
41e8491f
JK
679 if (value_lazy (val)
680 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
681 result = allocate_value_lazy (type);
682 else
683 {
684 result = allocate_value (type);
685 memcpy (value_contents_raw (result), value_contents (val),
686 TYPE_LENGTH (type));
687 }
74bcbdf3 688 set_value_component_location (result, val);
9bbda503
AC
689 set_value_bitsize (result, value_bitsize (val));
690 set_value_bitpos (result, value_bitpos (val));
42ae5230 691 set_value_address (result, value_address (val));
eca07816 692 set_value_optimized_out (result, value_optimized_out_const (val));
14f9c5c9
AS
693 return result;
694 }
695}
696
fc1a4b47
AC
697static const gdb_byte *
698cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
699{
700 if (valaddr == NULL)
701 return NULL;
702 else
703 return valaddr + offset;
704}
705
706static CORE_ADDR
ebf56fd3 707cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
708{
709 if (address == 0)
710 return 0;
d2e4a39e 711 else
14f9c5c9
AS
712 return address + offset;
713}
714
4c4b4cd2
PH
715/* Issue a warning (as for the definition of warning in utils.c, but
716 with exactly one argument rather than ...), unless the limit on the
717 number of warnings has passed during the evaluation of the current
718 expression. */
a2249542 719
77109804
AC
720/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
721 provided by "complaint". */
a0b31db1 722static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 723
14f9c5c9 724static void
a2249542 725lim_warning (const char *format, ...)
14f9c5c9 726{
a2249542 727 va_list args;
a2249542 728
5b4ee69b 729 va_start (args, format);
4c4b4cd2
PH
730 warnings_issued += 1;
731 if (warnings_issued <= warning_limit)
a2249542
MK
732 vwarning (format, args);
733
734 va_end (args);
4c4b4cd2
PH
735}
736
714e53ab
PH
737/* Issue an error if the size of an object of type T is unreasonable,
738 i.e. if it would be a bad idea to allocate a value of this type in
739 GDB. */
740
741static void
742check_size (const struct type *type)
743{
744 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 745 error (_("object size is larger than varsize-limit"));
714e53ab
PH
746}
747
0963b4bd 748/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 749static LONGEST
c3e5cd34 750max_of_size (int size)
4c4b4cd2 751{
76a01679 752 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 753
76a01679 754 return top_bit | (top_bit - 1);
4c4b4cd2
PH
755}
756
0963b4bd 757/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 758static LONGEST
c3e5cd34 759min_of_size (int size)
4c4b4cd2 760{
c3e5cd34 761 return -max_of_size (size) - 1;
4c4b4cd2
PH
762}
763
0963b4bd 764/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 765static ULONGEST
c3e5cd34 766umax_of_size (int size)
4c4b4cd2 767{
76a01679 768 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 769
76a01679 770 return top_bit | (top_bit - 1);
4c4b4cd2
PH
771}
772
0963b4bd 773/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
774static LONGEST
775max_of_type (struct type *t)
4c4b4cd2 776{
c3e5cd34
PH
777 if (TYPE_UNSIGNED (t))
778 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
779 else
780 return max_of_size (TYPE_LENGTH (t));
781}
782
0963b4bd 783/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
784static LONGEST
785min_of_type (struct type *t)
786{
787 if (TYPE_UNSIGNED (t))
788 return 0;
789 else
790 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
791}
792
793/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
794LONGEST
795ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 796{
8739bc53 797 type = resolve_dynamic_type (type, 0);
76a01679 798 switch (TYPE_CODE (type))
4c4b4cd2
PH
799 {
800 case TYPE_CODE_RANGE:
690cc4eb 801 return TYPE_HIGH_BOUND (type);
4c4b4cd2 802 case TYPE_CODE_ENUM:
14e75d8e 803 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
804 case TYPE_CODE_BOOL:
805 return 1;
806 case TYPE_CODE_CHAR:
76a01679 807 case TYPE_CODE_INT:
690cc4eb 808 return max_of_type (type);
4c4b4cd2 809 default:
43bbcdc2 810 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
811 }
812}
813
14e75d8e 814/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
815LONGEST
816ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 817{
8739bc53 818 type = resolve_dynamic_type (type, 0);
76a01679 819 switch (TYPE_CODE (type))
4c4b4cd2
PH
820 {
821 case TYPE_CODE_RANGE:
690cc4eb 822 return TYPE_LOW_BOUND (type);
4c4b4cd2 823 case TYPE_CODE_ENUM:
14e75d8e 824 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
825 case TYPE_CODE_BOOL:
826 return 0;
827 case TYPE_CODE_CHAR:
76a01679 828 case TYPE_CODE_INT:
690cc4eb 829 return min_of_type (type);
4c4b4cd2 830 default:
43bbcdc2 831 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
832 }
833}
834
835/* The identity on non-range types. For range types, the underlying
76a01679 836 non-range scalar type. */
4c4b4cd2
PH
837
838static struct type *
18af8284 839get_base_type (struct type *type)
4c4b4cd2
PH
840{
841 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
842 {
76a01679
JB
843 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
844 return type;
4c4b4cd2
PH
845 type = TYPE_TARGET_TYPE (type);
846 }
847 return type;
14f9c5c9 848}
41246937
JB
849
850/* Return a decoded version of the given VALUE. This means returning
851 a value whose type is obtained by applying all the GNAT-specific
852 encondings, making the resulting type a static but standard description
853 of the initial type. */
854
855struct value *
856ada_get_decoded_value (struct value *value)
857{
858 struct type *type = ada_check_typedef (value_type (value));
859
860 if (ada_is_array_descriptor_type (type)
861 || (ada_is_constrained_packed_array_type (type)
862 && TYPE_CODE (type) != TYPE_CODE_PTR))
863 {
864 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
865 value = ada_coerce_to_simple_array_ptr (value);
866 else
867 value = ada_coerce_to_simple_array (value);
868 }
869 else
870 value = ada_to_fixed_value (value);
871
872 return value;
873}
874
875/* Same as ada_get_decoded_value, but with the given TYPE.
876 Because there is no associated actual value for this type,
877 the resulting type might be a best-effort approximation in
878 the case of dynamic types. */
879
880struct type *
881ada_get_decoded_type (struct type *type)
882{
883 type = to_static_fixed_type (type);
884 if (ada_is_constrained_packed_array_type (type))
885 type = ada_coerce_to_simple_array_type (type);
886 return type;
887}
888
4c4b4cd2 889\f
76a01679 890
4c4b4cd2 891 /* Language Selection */
14f9c5c9
AS
892
893/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 894 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 895
14f9c5c9 896enum language
ccefe4c4 897ada_update_initial_language (enum language lang)
14f9c5c9 898{
d2e4a39e 899 if (lookup_minimal_symbol ("adainit", (const char *) NULL,
3b7344d5 900 (struct objfile *) NULL).minsym != NULL)
4c4b4cd2 901 return language_ada;
14f9c5c9
AS
902
903 return lang;
904}
96d887e8
PH
905
906/* If the main procedure is written in Ada, then return its name.
907 The result is good until the next call. Return NULL if the main
908 procedure doesn't appear to be in Ada. */
909
910char *
911ada_main_name (void)
912{
3b7344d5 913 struct bound_minimal_symbol msym;
f9bc20b9 914 static char *main_program_name = NULL;
6c038f32 915
96d887e8
PH
916 /* For Ada, the name of the main procedure is stored in a specific
917 string constant, generated by the binder. Look for that symbol,
918 extract its address, and then read that string. If we didn't find
919 that string, then most probably the main procedure is not written
920 in Ada. */
921 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
922
3b7344d5 923 if (msym.minsym != NULL)
96d887e8 924 {
f9bc20b9
JB
925 CORE_ADDR main_program_name_addr;
926 int err_code;
927
77e371c0 928 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 929 if (main_program_name_addr == 0)
323e0a4a 930 error (_("Invalid address for Ada main program name."));
96d887e8 931
f9bc20b9
JB
932 xfree (main_program_name);
933 target_read_string (main_program_name_addr, &main_program_name,
934 1024, &err_code);
935
936 if (err_code != 0)
937 return NULL;
96d887e8
PH
938 return main_program_name;
939 }
940
941 /* The main procedure doesn't seem to be in Ada. */
942 return NULL;
943}
14f9c5c9 944\f
4c4b4cd2 945 /* Symbols */
d2e4a39e 946
4c4b4cd2
PH
947/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
948 of NULLs. */
14f9c5c9 949
d2e4a39e
AS
950const struct ada_opname_map ada_opname_table[] = {
951 {"Oadd", "\"+\"", BINOP_ADD},
952 {"Osubtract", "\"-\"", BINOP_SUB},
953 {"Omultiply", "\"*\"", BINOP_MUL},
954 {"Odivide", "\"/\"", BINOP_DIV},
955 {"Omod", "\"mod\"", BINOP_MOD},
956 {"Orem", "\"rem\"", BINOP_REM},
957 {"Oexpon", "\"**\"", BINOP_EXP},
958 {"Olt", "\"<\"", BINOP_LESS},
959 {"Ole", "\"<=\"", BINOP_LEQ},
960 {"Ogt", "\">\"", BINOP_GTR},
961 {"Oge", "\">=\"", BINOP_GEQ},
962 {"Oeq", "\"=\"", BINOP_EQUAL},
963 {"One", "\"/=\"", BINOP_NOTEQUAL},
964 {"Oand", "\"and\"", BINOP_BITWISE_AND},
965 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
966 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
967 {"Oconcat", "\"&\"", BINOP_CONCAT},
968 {"Oabs", "\"abs\"", UNOP_ABS},
969 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
970 {"Oadd", "\"+\"", UNOP_PLUS},
971 {"Osubtract", "\"-\"", UNOP_NEG},
972 {NULL, NULL}
14f9c5c9
AS
973};
974
4c4b4cd2
PH
975/* The "encoded" form of DECODED, according to GNAT conventions.
976 The result is valid until the next call to ada_encode. */
977
14f9c5c9 978char *
4c4b4cd2 979ada_encode (const char *decoded)
14f9c5c9 980{
4c4b4cd2
PH
981 static char *encoding_buffer = NULL;
982 static size_t encoding_buffer_size = 0;
d2e4a39e 983 const char *p;
14f9c5c9 984 int k;
d2e4a39e 985
4c4b4cd2 986 if (decoded == NULL)
14f9c5c9
AS
987 return NULL;
988
4c4b4cd2
PH
989 GROW_VECT (encoding_buffer, encoding_buffer_size,
990 2 * strlen (decoded) + 10);
14f9c5c9
AS
991
992 k = 0;
4c4b4cd2 993 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 994 {
cdc7bb92 995 if (*p == '.')
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
998 k += 2;
999 }
14f9c5c9 1000 else if (*p == '"')
4c4b4cd2
PH
1001 {
1002 const struct ada_opname_map *mapping;
1003
1004 for (mapping = ada_opname_table;
1265e4aa
JB
1005 mapping->encoded != NULL
1006 && strncmp (mapping->decoded, p,
1007 strlen (mapping->decoded)) != 0; mapping += 1)
4c4b4cd2
PH
1008 ;
1009 if (mapping->encoded == NULL)
323e0a4a 1010 error (_("invalid Ada operator name: %s"), p);
4c4b4cd2
PH
1011 strcpy (encoding_buffer + k, mapping->encoded);
1012 k += strlen (mapping->encoded);
1013 break;
1014 }
d2e4a39e 1015 else
4c4b4cd2
PH
1016 {
1017 encoding_buffer[k] = *p;
1018 k += 1;
1019 }
14f9c5c9
AS
1020 }
1021
4c4b4cd2
PH
1022 encoding_buffer[k] = '\0';
1023 return encoding_buffer;
14f9c5c9
AS
1024}
1025
1026/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1027 quotes, unfolded, but with the quotes stripped away. Result good
1028 to next call. */
1029
d2e4a39e
AS
1030char *
1031ada_fold_name (const char *name)
14f9c5c9 1032{
d2e4a39e 1033 static char *fold_buffer = NULL;
14f9c5c9
AS
1034 static size_t fold_buffer_size = 0;
1035
1036 int len = strlen (name);
d2e4a39e 1037 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1038
1039 if (name[0] == '\'')
1040 {
d2e4a39e
AS
1041 strncpy (fold_buffer, name + 1, len - 2);
1042 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1043 }
1044 else
1045 {
1046 int i;
5b4ee69b 1047
14f9c5c9 1048 for (i = 0; i <= len; i += 1)
4c4b4cd2 1049 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1050 }
1051
1052 return fold_buffer;
1053}
1054
529cad9c
PH
1055/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1056
1057static int
1058is_lower_alphanum (const char c)
1059{
1060 return (isdigit (c) || (isalpha (c) && islower (c)));
1061}
1062
c90092fe
JB
1063/* ENCODED is the linkage name of a symbol and LEN contains its length.
1064 This function saves in LEN the length of that same symbol name but
1065 without either of these suffixes:
29480c32
JB
1066 . .{DIGIT}+
1067 . ${DIGIT}+
1068 . ___{DIGIT}+
1069 . __{DIGIT}+.
c90092fe 1070
29480c32
JB
1071 These are suffixes introduced by the compiler for entities such as
1072 nested subprogram for instance, in order to avoid name clashes.
1073 They do not serve any purpose for the debugger. */
1074
1075static void
1076ada_remove_trailing_digits (const char *encoded, int *len)
1077{
1078 if (*len > 1 && isdigit (encoded[*len - 1]))
1079 {
1080 int i = *len - 2;
5b4ee69b 1081
29480c32
JB
1082 while (i > 0 && isdigit (encoded[i]))
1083 i--;
1084 if (i >= 0 && encoded[i] == '.')
1085 *len = i;
1086 else if (i >= 0 && encoded[i] == '$')
1087 *len = i;
1088 else if (i >= 2 && strncmp (encoded + i - 2, "___", 3) == 0)
1089 *len = i - 2;
1090 else if (i >= 1 && strncmp (encoded + i - 1, "__", 2) == 0)
1091 *len = i - 1;
1092 }
1093}
1094
1095/* Remove the suffix introduced by the compiler for protected object
1096 subprograms. */
1097
1098static void
1099ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1100{
1101 /* Remove trailing N. */
1102
1103 /* Protected entry subprograms are broken into two
1104 separate subprograms: The first one is unprotected, and has
1105 a 'N' suffix; the second is the protected version, and has
0963b4bd 1106 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1107 the protection. Since the P subprograms are internally generated,
1108 we leave these names undecoded, giving the user a clue that this
1109 entity is internal. */
1110
1111 if (*len > 1
1112 && encoded[*len - 1] == 'N'
1113 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1114 *len = *len - 1;
1115}
1116
69fadcdf
JB
1117/* Remove trailing X[bn]* suffixes (indicating names in package bodies). */
1118
1119static void
1120ada_remove_Xbn_suffix (const char *encoded, int *len)
1121{
1122 int i = *len - 1;
1123
1124 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n'))
1125 i--;
1126
1127 if (encoded[i] != 'X')
1128 return;
1129
1130 if (i == 0)
1131 return;
1132
1133 if (isalnum (encoded[i-1]))
1134 *len = i;
1135}
1136
29480c32
JB
1137/* If ENCODED follows the GNAT entity encoding conventions, then return
1138 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1139 replaced by ENCODED.
14f9c5c9 1140
4c4b4cd2 1141 The resulting string is valid until the next call of ada_decode.
29480c32 1142 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1143 is returned. */
1144
1145const char *
1146ada_decode (const char *encoded)
14f9c5c9
AS
1147{
1148 int i, j;
1149 int len0;
d2e4a39e 1150 const char *p;
4c4b4cd2 1151 char *decoded;
14f9c5c9 1152 int at_start_name;
4c4b4cd2
PH
1153 static char *decoding_buffer = NULL;
1154 static size_t decoding_buffer_size = 0;
d2e4a39e 1155
29480c32
JB
1156 /* The name of the Ada main procedure starts with "_ada_".
1157 This prefix is not part of the decoded name, so skip this part
1158 if we see this prefix. */
4c4b4cd2
PH
1159 if (strncmp (encoded, "_ada_", 5) == 0)
1160 encoded += 5;
14f9c5c9 1161
29480c32
JB
1162 /* If the name starts with '_', then it is not a properly encoded
1163 name, so do not attempt to decode it. Similarly, if the name
1164 starts with '<', the name should not be decoded. */
4c4b4cd2 1165 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1166 goto Suppress;
1167
4c4b4cd2 1168 len0 = strlen (encoded);
4c4b4cd2 1169
29480c32
JB
1170 ada_remove_trailing_digits (encoded, &len0);
1171 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1172
4c4b4cd2
PH
1173 /* Remove the ___X.* suffix if present. Do not forget to verify that
1174 the suffix is located before the current "end" of ENCODED. We want
1175 to avoid re-matching parts of ENCODED that have previously been
1176 marked as discarded (by decrementing LEN0). */
1177 p = strstr (encoded, "___");
1178 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1179 {
1180 if (p[3] == 'X')
4c4b4cd2 1181 len0 = p - encoded;
14f9c5c9 1182 else
4c4b4cd2 1183 goto Suppress;
14f9c5c9 1184 }
4c4b4cd2 1185
29480c32
JB
1186 /* Remove any trailing TKB suffix. It tells us that this symbol
1187 is for the body of a task, but that information does not actually
1188 appear in the decoded name. */
1189
4c4b4cd2 1190 if (len0 > 3 && strncmp (encoded + len0 - 3, "TKB", 3) == 0)
14f9c5c9 1191 len0 -= 3;
76a01679 1192
a10967fa
JB
1193 /* Remove any trailing TB suffix. The TB suffix is slightly different
1194 from the TKB suffix because it is used for non-anonymous task
1195 bodies. */
1196
1197 if (len0 > 2 && strncmp (encoded + len0 - 2, "TB", 2) == 0)
1198 len0 -= 2;
1199
29480c32
JB
1200 /* Remove trailing "B" suffixes. */
1201 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1202
4c4b4cd2 1203 if (len0 > 1 && strncmp (encoded + len0 - 1, "B", 1) == 0)
14f9c5c9
AS
1204 len0 -= 1;
1205
4c4b4cd2 1206 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1207
4c4b4cd2
PH
1208 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1209 decoded = decoding_buffer;
14f9c5c9 1210
29480c32
JB
1211 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1212
4c4b4cd2 1213 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1214 {
4c4b4cd2
PH
1215 i = len0 - 2;
1216 while ((i >= 0 && isdigit (encoded[i]))
1217 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1218 i -= 1;
1219 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1220 len0 = i - 1;
1221 else if (encoded[i] == '$')
1222 len0 = i;
d2e4a39e 1223 }
14f9c5c9 1224
29480c32
JB
1225 /* The first few characters that are not alphabetic are not part
1226 of any encoding we use, so we can copy them over verbatim. */
1227
4c4b4cd2
PH
1228 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1229 decoded[j] = encoded[i];
14f9c5c9
AS
1230
1231 at_start_name = 1;
1232 while (i < len0)
1233 {
29480c32 1234 /* Is this a symbol function? */
4c4b4cd2
PH
1235 if (at_start_name && encoded[i] == 'O')
1236 {
1237 int k;
5b4ee69b 1238
4c4b4cd2
PH
1239 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1240 {
1241 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1242 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1243 op_len - 1) == 0)
1244 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1245 {
1246 strcpy (decoded + j, ada_opname_table[k].decoded);
1247 at_start_name = 0;
1248 i += op_len;
1249 j += strlen (ada_opname_table[k].decoded);
1250 break;
1251 }
1252 }
1253 if (ada_opname_table[k].encoded != NULL)
1254 continue;
1255 }
14f9c5c9
AS
1256 at_start_name = 0;
1257
529cad9c
PH
1258 /* Replace "TK__" with "__", which will eventually be translated
1259 into "." (just below). */
1260
4c4b4cd2
PH
1261 if (i < len0 - 4 && strncmp (encoded + i, "TK__", 4) == 0)
1262 i += 2;
529cad9c 1263
29480c32
JB
1264 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1265 be translated into "." (just below). These are internal names
1266 generated for anonymous blocks inside which our symbol is nested. */
1267
1268 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1269 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1270 && isdigit (encoded [i+4]))
1271 {
1272 int k = i + 5;
1273
1274 while (k < len0 && isdigit (encoded[k]))
1275 k++; /* Skip any extra digit. */
1276
1277 /* Double-check that the "__B_{DIGITS}+" sequence we found
1278 is indeed followed by "__". */
1279 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1280 i = k;
1281 }
1282
529cad9c
PH
1283 /* Remove _E{DIGITS}+[sb] */
1284
1285 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1286 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1287 one implements the actual entry code, and has a suffix following
1288 the convention above; the second one implements the barrier and
1289 uses the same convention as above, except that the 'E' is replaced
1290 by a 'B'.
1291
1292 Just as above, we do not decode the name of barrier functions
1293 to give the user a clue that the code he is debugging has been
1294 internally generated. */
1295
1296 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1297 && isdigit (encoded[i+2]))
1298 {
1299 int k = i + 3;
1300
1301 while (k < len0 && isdigit (encoded[k]))
1302 k++;
1303
1304 if (k < len0
1305 && (encoded[k] == 'b' || encoded[k] == 's'))
1306 {
1307 k++;
1308 /* Just as an extra precaution, make sure that if this
1309 suffix is followed by anything else, it is a '_'.
1310 Otherwise, we matched this sequence by accident. */
1311 if (k == len0
1312 || (k < len0 && encoded[k] == '_'))
1313 i = k;
1314 }
1315 }
1316
1317 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1318 the GNAT front-end in protected object subprograms. */
1319
1320 if (i < len0 + 3
1321 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1322 {
1323 /* Backtrack a bit up until we reach either the begining of
1324 the encoded name, or "__". Make sure that we only find
1325 digits or lowercase characters. */
1326 const char *ptr = encoded + i - 1;
1327
1328 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1329 ptr--;
1330 if (ptr < encoded
1331 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1332 i++;
1333 }
1334
4c4b4cd2
PH
1335 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1336 {
29480c32
JB
1337 /* This is a X[bn]* sequence not separated from the previous
1338 part of the name with a non-alpha-numeric character (in other
1339 words, immediately following an alpha-numeric character), then
1340 verify that it is placed at the end of the encoded name. If
1341 not, then the encoding is not valid and we should abort the
1342 decoding. Otherwise, just skip it, it is used in body-nested
1343 package names. */
4c4b4cd2
PH
1344 do
1345 i += 1;
1346 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1347 if (i < len0)
1348 goto Suppress;
1349 }
cdc7bb92 1350 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1351 {
29480c32 1352 /* Replace '__' by '.'. */
4c4b4cd2
PH
1353 decoded[j] = '.';
1354 at_start_name = 1;
1355 i += 2;
1356 j += 1;
1357 }
14f9c5c9 1358 else
4c4b4cd2 1359 {
29480c32
JB
1360 /* It's a character part of the decoded name, so just copy it
1361 over. */
4c4b4cd2
PH
1362 decoded[j] = encoded[i];
1363 i += 1;
1364 j += 1;
1365 }
14f9c5c9 1366 }
4c4b4cd2 1367 decoded[j] = '\000';
14f9c5c9 1368
29480c32
JB
1369 /* Decoded names should never contain any uppercase character.
1370 Double-check this, and abort the decoding if we find one. */
1371
4c4b4cd2
PH
1372 for (i = 0; decoded[i] != '\0'; i += 1)
1373 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1374 goto Suppress;
1375
4c4b4cd2
PH
1376 if (strcmp (decoded, encoded) == 0)
1377 return encoded;
1378 else
1379 return decoded;
14f9c5c9
AS
1380
1381Suppress:
4c4b4cd2
PH
1382 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1383 decoded = decoding_buffer;
1384 if (encoded[0] == '<')
1385 strcpy (decoded, encoded);
14f9c5c9 1386 else
88c15c34 1387 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1388 return decoded;
1389
1390}
1391
1392/* Table for keeping permanent unique copies of decoded names. Once
1393 allocated, names in this table are never released. While this is a
1394 storage leak, it should not be significant unless there are massive
1395 changes in the set of decoded names in successive versions of a
1396 symbol table loaded during a single session. */
1397static struct htab *decoded_names_store;
1398
1399/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1400 in the language-specific part of GSYMBOL, if it has not been
1401 previously computed. Tries to save the decoded name in the same
1402 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1403 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1404 GSYMBOL).
4c4b4cd2
PH
1405 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1406 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1407 when a decoded name is cached in it. */
4c4b4cd2 1408
45e6c716 1409const char *
f85f34ed 1410ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1411{
f85f34ed
TT
1412 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1413 const char **resultp =
1414 &gsymbol->language_specific.mangled_lang.demangled_name;
5b4ee69b 1415
f85f34ed 1416 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1417 {
1418 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1419 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1420
f85f34ed 1421 gsymbol->ada_mangled = 1;
5b4ee69b 1422
f85f34ed
TT
1423 if (obstack != NULL)
1424 *resultp = obstack_copy0 (obstack, decoded, strlen (decoded));
1425 else
76a01679 1426 {
f85f34ed
TT
1427 /* Sometimes, we can't find a corresponding objfile, in
1428 which case, we put the result on the heap. Since we only
1429 decode when needed, we hope this usually does not cause a
1430 significant memory leak (FIXME). */
1431
76a01679
JB
1432 char **slot = (char **) htab_find_slot (decoded_names_store,
1433 decoded, INSERT);
5b4ee69b 1434
76a01679
JB
1435 if (*slot == NULL)
1436 *slot = xstrdup (decoded);
1437 *resultp = *slot;
1438 }
4c4b4cd2 1439 }
14f9c5c9 1440
4c4b4cd2
PH
1441 return *resultp;
1442}
76a01679 1443
2c0b251b 1444static char *
76a01679 1445ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1446{
1447 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1448}
1449
1450/* Returns non-zero iff SYM_NAME matches NAME, ignoring any trailing
4c4b4cd2
PH
1451 suffixes that encode debugging information or leading _ada_ on
1452 SYM_NAME (see is_name_suffix commentary for the debugging
1453 information that is ignored). If WILD, then NAME need only match a
1454 suffix of SYM_NAME minus the same suffixes. Also returns 0 if
1455 either argument is NULL. */
14f9c5c9 1456
2c0b251b 1457static int
40658b94 1458match_name (const char *sym_name, const char *name, int wild)
14f9c5c9
AS
1459{
1460 if (sym_name == NULL || name == NULL)
1461 return 0;
1462 else if (wild)
73589123 1463 return wild_match (sym_name, name) == 0;
d2e4a39e
AS
1464 else
1465 {
1466 int len_name = strlen (name);
5b4ee69b 1467
4c4b4cd2
PH
1468 return (strncmp (sym_name, name, len_name) == 0
1469 && is_name_suffix (sym_name + len_name))
1470 || (strncmp (sym_name, "_ada_", 5) == 0
1471 && strncmp (sym_name + 5, name, len_name) == 0
1472 && is_name_suffix (sym_name + len_name + 5));
d2e4a39e 1473 }
14f9c5c9 1474}
14f9c5c9 1475\f
d2e4a39e 1476
4c4b4cd2 1477 /* Arrays */
14f9c5c9 1478
28c85d6c
JB
1479/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1480 generated by the GNAT compiler to describe the index type used
1481 for each dimension of an array, check whether it follows the latest
1482 known encoding. If not, fix it up to conform to the latest encoding.
1483 Otherwise, do nothing. This function also does nothing if
1484 INDEX_DESC_TYPE is NULL.
1485
1486 The GNAT encoding used to describle the array index type evolved a bit.
1487 Initially, the information would be provided through the name of each
1488 field of the structure type only, while the type of these fields was
1489 described as unspecified and irrelevant. The debugger was then expected
1490 to perform a global type lookup using the name of that field in order
1491 to get access to the full index type description. Because these global
1492 lookups can be very expensive, the encoding was later enhanced to make
1493 the global lookup unnecessary by defining the field type as being
1494 the full index type description.
1495
1496 The purpose of this routine is to allow us to support older versions
1497 of the compiler by detecting the use of the older encoding, and by
1498 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1499 we essentially replace each field's meaningless type by the associated
1500 index subtype). */
1501
1502void
1503ada_fixup_array_indexes_type (struct type *index_desc_type)
1504{
1505 int i;
1506
1507 if (index_desc_type == NULL)
1508 return;
1509 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1510
1511 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1512 to check one field only, no need to check them all). If not, return
1513 now.
1514
1515 If our INDEX_DESC_TYPE was generated using the older encoding,
1516 the field type should be a meaningless integer type whose name
1517 is not equal to the field name. */
1518 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1519 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1520 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1521 return;
1522
1523 /* Fixup each field of INDEX_DESC_TYPE. */
1524 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1525 {
0d5cff50 1526 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1527 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1528
1529 if (raw_type)
1530 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1531 }
1532}
1533
4c4b4cd2 1534/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1535
d2e4a39e
AS
1536static char *bound_name[] = {
1537 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1538 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1539};
1540
1541/* Maximum number of array dimensions we are prepared to handle. */
1542
4c4b4cd2 1543#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1544
14f9c5c9 1545
4c4b4cd2
PH
1546/* The desc_* routines return primitive portions of array descriptors
1547 (fat pointers). */
14f9c5c9
AS
1548
1549/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1550 level of indirection, if needed. */
1551
d2e4a39e
AS
1552static struct type *
1553desc_base_type (struct type *type)
14f9c5c9
AS
1554{
1555 if (type == NULL)
1556 return NULL;
61ee279c 1557 type = ada_check_typedef (type);
720d1a40
JB
1558 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1559 type = ada_typedef_target_type (type);
1560
1265e4aa
JB
1561 if (type != NULL
1562 && (TYPE_CODE (type) == TYPE_CODE_PTR
1563 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1564 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1565 else
1566 return type;
1567}
1568
4c4b4cd2
PH
1569/* True iff TYPE indicates a "thin" array pointer type. */
1570
14f9c5c9 1571static int
d2e4a39e 1572is_thin_pntr (struct type *type)
14f9c5c9 1573{
d2e4a39e 1574 return
14f9c5c9
AS
1575 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1576 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1577}
1578
4c4b4cd2
PH
1579/* The descriptor type for thin pointer type TYPE. */
1580
d2e4a39e
AS
1581static struct type *
1582thin_descriptor_type (struct type *type)
14f9c5c9 1583{
d2e4a39e 1584 struct type *base_type = desc_base_type (type);
5b4ee69b 1585
14f9c5c9
AS
1586 if (base_type == NULL)
1587 return NULL;
1588 if (is_suffix (ada_type_name (base_type), "___XVE"))
1589 return base_type;
d2e4a39e 1590 else
14f9c5c9 1591 {
d2e4a39e 1592 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1593
14f9c5c9 1594 if (alt_type == NULL)
4c4b4cd2 1595 return base_type;
14f9c5c9 1596 else
4c4b4cd2 1597 return alt_type;
14f9c5c9
AS
1598 }
1599}
1600
4c4b4cd2
PH
1601/* A pointer to the array data for thin-pointer value VAL. */
1602
d2e4a39e
AS
1603static struct value *
1604thin_data_pntr (struct value *val)
14f9c5c9 1605{
828292f2 1606 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1607 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1608
556bdfd4
UW
1609 data_type = lookup_pointer_type (data_type);
1610
14f9c5c9 1611 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1612 return value_cast (data_type, value_copy (val));
d2e4a39e 1613 else
42ae5230 1614 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1615}
1616
4c4b4cd2
PH
1617/* True iff TYPE indicates a "thick" array pointer type. */
1618
14f9c5c9 1619static int
d2e4a39e 1620is_thick_pntr (struct type *type)
14f9c5c9
AS
1621{
1622 type = desc_base_type (type);
1623 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1624 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1625}
1626
4c4b4cd2
PH
1627/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1628 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1629
d2e4a39e
AS
1630static struct type *
1631desc_bounds_type (struct type *type)
14f9c5c9 1632{
d2e4a39e 1633 struct type *r;
14f9c5c9
AS
1634
1635 type = desc_base_type (type);
1636
1637 if (type == NULL)
1638 return NULL;
1639 else if (is_thin_pntr (type))
1640 {
1641 type = thin_descriptor_type (type);
1642 if (type == NULL)
4c4b4cd2 1643 return NULL;
14f9c5c9
AS
1644 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1645 if (r != NULL)
61ee279c 1646 return ada_check_typedef (r);
14f9c5c9
AS
1647 }
1648 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1649 {
1650 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1651 if (r != NULL)
61ee279c 1652 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1653 }
1654 return NULL;
1655}
1656
1657/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1658 one, a pointer to its bounds data. Otherwise NULL. */
1659
d2e4a39e
AS
1660static struct value *
1661desc_bounds (struct value *arr)
14f9c5c9 1662{
df407dfe 1663 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1664
d2e4a39e 1665 if (is_thin_pntr (type))
14f9c5c9 1666 {
d2e4a39e 1667 struct type *bounds_type =
4c4b4cd2 1668 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1669 LONGEST addr;
1670
4cdfadb1 1671 if (bounds_type == NULL)
323e0a4a 1672 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1673
1674 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1675 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1676 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1677 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1678 addr = value_as_long (arr);
d2e4a39e 1679 else
42ae5230 1680 addr = value_address (arr);
14f9c5c9 1681
d2e4a39e 1682 return
4c4b4cd2
PH
1683 value_from_longest (lookup_pointer_type (bounds_type),
1684 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1685 }
1686
1687 else if (is_thick_pntr (type))
05e522ef
JB
1688 {
1689 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1690 _("Bad GNAT array descriptor"));
1691 struct type *p_bounds_type = value_type (p_bounds);
1692
1693 if (p_bounds_type
1694 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1695 {
1696 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1697
1698 if (TYPE_STUB (target_type))
1699 p_bounds = value_cast (lookup_pointer_type
1700 (ada_check_typedef (target_type)),
1701 p_bounds);
1702 }
1703 else
1704 error (_("Bad GNAT array descriptor"));
1705
1706 return p_bounds;
1707 }
14f9c5c9
AS
1708 else
1709 return NULL;
1710}
1711
4c4b4cd2
PH
1712/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1713 position of the field containing the address of the bounds data. */
1714
14f9c5c9 1715static int
d2e4a39e 1716fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1717{
1718 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1719}
1720
1721/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1722 size of the field containing the address of the bounds data. */
1723
14f9c5c9 1724static int
d2e4a39e 1725fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1726{
1727 type = desc_base_type (type);
1728
d2e4a39e 1729 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1730 return TYPE_FIELD_BITSIZE (type, 1);
1731 else
61ee279c 1732 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1733}
1734
4c4b4cd2 1735/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1736 pointer to one, the type of its array data (a array-with-no-bounds type);
1737 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1738 data. */
4c4b4cd2 1739
d2e4a39e 1740static struct type *
556bdfd4 1741desc_data_target_type (struct type *type)
14f9c5c9
AS
1742{
1743 type = desc_base_type (type);
1744
4c4b4cd2 1745 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1746 if (is_thin_pntr (type))
556bdfd4 1747 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1748 else if (is_thick_pntr (type))
556bdfd4
UW
1749 {
1750 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1751
1752 if (data_type
1753 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1754 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1755 }
1756
1757 return NULL;
14f9c5c9
AS
1758}
1759
1760/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1761 its array data. */
4c4b4cd2 1762
d2e4a39e
AS
1763static struct value *
1764desc_data (struct value *arr)
14f9c5c9 1765{
df407dfe 1766 struct type *type = value_type (arr);
5b4ee69b 1767
14f9c5c9
AS
1768 if (is_thin_pntr (type))
1769 return thin_data_pntr (arr);
1770 else if (is_thick_pntr (type))
d2e4a39e 1771 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1772 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1773 else
1774 return NULL;
1775}
1776
1777
1778/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1779 position of the field containing the address of the data. */
1780
14f9c5c9 1781static int
d2e4a39e 1782fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1783{
1784 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1785}
1786
1787/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1788 size of the field containing the address of the data. */
1789
14f9c5c9 1790static int
d2e4a39e 1791fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1792{
1793 type = desc_base_type (type);
1794
1795 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1796 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1797 else
14f9c5c9
AS
1798 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1799}
1800
4c4b4cd2 1801/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1802 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1803 bound, if WHICH is 1. The first bound is I=1. */
1804
d2e4a39e
AS
1805static struct value *
1806desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1807{
d2e4a39e 1808 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1809 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1810}
1811
1812/* If BOUNDS is an array-bounds structure type, return the bit position
1813 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1814 bound, if WHICH is 1. The first bound is I=1. */
1815
14f9c5c9 1816static int
d2e4a39e 1817desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1818{
d2e4a39e 1819 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1820}
1821
1822/* If BOUNDS is an array-bounds structure type, return the bit field size
1823 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1824 bound, if WHICH is 1. The first bound is I=1. */
1825
76a01679 1826static int
d2e4a39e 1827desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1828{
1829 type = desc_base_type (type);
1830
d2e4a39e
AS
1831 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1832 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1833 else
1834 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1835}
1836
1837/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1838 Ith bound (numbering from 1). Otherwise, NULL. */
1839
d2e4a39e
AS
1840static struct type *
1841desc_index_type (struct type *type, int i)
14f9c5c9
AS
1842{
1843 type = desc_base_type (type);
1844
1845 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1846 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1847 else
14f9c5c9
AS
1848 return NULL;
1849}
1850
4c4b4cd2
PH
1851/* The number of index positions in the array-bounds type TYPE.
1852 Return 0 if TYPE is NULL. */
1853
14f9c5c9 1854static int
d2e4a39e 1855desc_arity (struct type *type)
14f9c5c9
AS
1856{
1857 type = desc_base_type (type);
1858
1859 if (type != NULL)
1860 return TYPE_NFIELDS (type) / 2;
1861 return 0;
1862}
1863
4c4b4cd2
PH
1864/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1865 an array descriptor type (representing an unconstrained array
1866 type). */
1867
76a01679
JB
1868static int
1869ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1870{
1871 if (type == NULL)
1872 return 0;
61ee279c 1873 type = ada_check_typedef (type);
4c4b4cd2 1874 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1875 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1876}
1877
52ce6436 1878/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1879 * to one. */
52ce6436 1880
2c0b251b 1881static int
52ce6436
PH
1882ada_is_array_type (struct type *type)
1883{
1884 while (type != NULL
1885 && (TYPE_CODE (type) == TYPE_CODE_PTR
1886 || TYPE_CODE (type) == TYPE_CODE_REF))
1887 type = TYPE_TARGET_TYPE (type);
1888 return ada_is_direct_array_type (type);
1889}
1890
4c4b4cd2 1891/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1892
14f9c5c9 1893int
4c4b4cd2 1894ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1895{
1896 if (type == NULL)
1897 return 0;
61ee279c 1898 type = ada_check_typedef (type);
14f9c5c9 1899 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1900 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1901 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1902 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1903}
1904
4c4b4cd2
PH
1905/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1906
14f9c5c9 1907int
4c4b4cd2 1908ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1909{
556bdfd4 1910 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1911
1912 if (type == NULL)
1913 return 0;
61ee279c 1914 type = ada_check_typedef (type);
556bdfd4
UW
1915 return (data_type != NULL
1916 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1917 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1918}
1919
1920/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1921 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1922 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1923 is still needed. */
1924
14f9c5c9 1925int
ebf56fd3 1926ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1927{
d2e4a39e 1928 return
14f9c5c9
AS
1929 type != NULL
1930 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1931 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1932 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1933 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1934}
1935
1936
4c4b4cd2 1937/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1938 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1939 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1940 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1941 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1942 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1943 a descriptor. */
d2e4a39e
AS
1944struct type *
1945ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1946{
ad82864c
JB
1947 if (ada_is_constrained_packed_array_type (value_type (arr)))
1948 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1949
df407dfe
AC
1950 if (!ada_is_array_descriptor_type (value_type (arr)))
1951 return value_type (arr);
d2e4a39e
AS
1952
1953 if (!bounds)
ad82864c
JB
1954 {
1955 struct type *array_type =
1956 ada_check_typedef (desc_data_target_type (value_type (arr)));
1957
1958 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1959 TYPE_FIELD_BITSIZE (array_type, 0) =
1960 decode_packed_array_bitsize (value_type (arr));
1961
1962 return array_type;
1963 }
14f9c5c9
AS
1964 else
1965 {
d2e4a39e 1966 struct type *elt_type;
14f9c5c9 1967 int arity;
d2e4a39e 1968 struct value *descriptor;
14f9c5c9 1969
df407dfe
AC
1970 elt_type = ada_array_element_type (value_type (arr), -1);
1971 arity = ada_array_arity (value_type (arr));
14f9c5c9 1972
d2e4a39e 1973 if (elt_type == NULL || arity == 0)
df407dfe 1974 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1975
1976 descriptor = desc_bounds (arr);
d2e4a39e 1977 if (value_as_long (descriptor) == 0)
4c4b4cd2 1978 return NULL;
d2e4a39e 1979 while (arity > 0)
4c4b4cd2 1980 {
e9bb382b
UW
1981 struct type *range_type = alloc_type_copy (value_type (arr));
1982 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1983 struct value *low = desc_one_bound (descriptor, arity, 0);
1984 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1985
5b4ee69b 1986 arity -= 1;
0c9c3474
SA
1987 create_static_range_type (range_type, value_type (low),
1988 longest_to_int (value_as_long (low)),
1989 longest_to_int (value_as_long (high)));
4c4b4cd2 1990 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1991
1992 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1993 {
1994 /* We need to store the element packed bitsize, as well as
1995 recompute the array size, because it was previously
1996 computed based on the unpacked element size. */
1997 LONGEST lo = value_as_long (low);
1998 LONGEST hi = value_as_long (high);
1999
2000 TYPE_FIELD_BITSIZE (elt_type, 0) =
2001 decode_packed_array_bitsize (value_type (arr));
2002 /* If the array has no element, then the size is already
2003 zero, and does not need to be recomputed. */
2004 if (lo < hi)
2005 {
2006 int array_bitsize =
2007 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
2008
2009 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
2010 }
2011 }
4c4b4cd2 2012 }
14f9c5c9
AS
2013
2014 return lookup_pointer_type (elt_type);
2015 }
2016}
2017
2018/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2019 Otherwise, returns either a standard GDB array with bounds set
2020 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2021 GDB array. Returns NULL if ARR is a null fat pointer. */
2022
d2e4a39e
AS
2023struct value *
2024ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2025{
df407dfe 2026 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2027 {
d2e4a39e 2028 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2029
14f9c5c9 2030 if (arrType == NULL)
4c4b4cd2 2031 return NULL;
14f9c5c9
AS
2032 return value_cast (arrType, value_copy (desc_data (arr)));
2033 }
ad82864c
JB
2034 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2035 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2036 else
2037 return arr;
2038}
2039
2040/* If ARR does not represent an array, returns ARR unchanged.
2041 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2042 be ARR itself if it already is in the proper form). */
2043
720d1a40 2044struct value *
d2e4a39e 2045ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2046{
df407dfe 2047 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2048 {
d2e4a39e 2049 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2050
14f9c5c9 2051 if (arrVal == NULL)
323e0a4a 2052 error (_("Bounds unavailable for null array pointer."));
529cad9c 2053 check_size (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2054 return value_ind (arrVal);
2055 }
ad82864c
JB
2056 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2057 return decode_constrained_packed_array (arr);
d2e4a39e 2058 else
14f9c5c9
AS
2059 return arr;
2060}
2061
2062/* If TYPE represents a GNAT array type, return it translated to an
2063 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2064 packing). For other types, is the identity. */
2065
d2e4a39e
AS
2066struct type *
2067ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2068{
ad82864c
JB
2069 if (ada_is_constrained_packed_array_type (type))
2070 return decode_constrained_packed_array_type (type);
17280b9f
UW
2071
2072 if (ada_is_array_descriptor_type (type))
556bdfd4 2073 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2074
2075 return type;
14f9c5c9
AS
2076}
2077
4c4b4cd2
PH
2078/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2079
ad82864c
JB
2080static int
2081ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2082{
2083 if (type == NULL)
2084 return 0;
4c4b4cd2 2085 type = desc_base_type (type);
61ee279c 2086 type = ada_check_typedef (type);
d2e4a39e 2087 return
14f9c5c9
AS
2088 ada_type_name (type) != NULL
2089 && strstr (ada_type_name (type), "___XP") != NULL;
2090}
2091
ad82864c
JB
2092/* Non-zero iff TYPE represents a standard GNAT constrained
2093 packed-array type. */
2094
2095int
2096ada_is_constrained_packed_array_type (struct type *type)
2097{
2098 return ada_is_packed_array_type (type)
2099 && !ada_is_array_descriptor_type (type);
2100}
2101
2102/* Non-zero iff TYPE represents an array descriptor for a
2103 unconstrained packed-array type. */
2104
2105static int
2106ada_is_unconstrained_packed_array_type (struct type *type)
2107{
2108 return ada_is_packed_array_type (type)
2109 && ada_is_array_descriptor_type (type);
2110}
2111
2112/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2113 return the size of its elements in bits. */
2114
2115static long
2116decode_packed_array_bitsize (struct type *type)
2117{
0d5cff50
DE
2118 const char *raw_name;
2119 const char *tail;
ad82864c
JB
2120 long bits;
2121
720d1a40
JB
2122 /* Access to arrays implemented as fat pointers are encoded as a typedef
2123 of the fat pointer type. We need the name of the fat pointer type
2124 to do the decoding, so strip the typedef layer. */
2125 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2126 type = ada_typedef_target_type (type);
2127
2128 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2129 if (!raw_name)
2130 raw_name = ada_type_name (desc_base_type (type));
2131
2132 if (!raw_name)
2133 return 0;
2134
2135 tail = strstr (raw_name, "___XP");
720d1a40 2136 gdb_assert (tail != NULL);
ad82864c
JB
2137
2138 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2139 {
2140 lim_warning
2141 (_("could not understand bit size information on packed array"));
2142 return 0;
2143 }
2144
2145 return bits;
2146}
2147
14f9c5c9
AS
2148/* Given that TYPE is a standard GDB array type with all bounds filled
2149 in, and that the element size of its ultimate scalar constituents
2150 (that is, either its elements, or, if it is an array of arrays, its
2151 elements' elements, etc.) is *ELT_BITS, return an identical type,
2152 but with the bit sizes of its elements (and those of any
2153 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2
PH
2154 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
2155 in bits. */
2156
d2e4a39e 2157static struct type *
ad82864c 2158constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2159{
d2e4a39e
AS
2160 struct type *new_elt_type;
2161 struct type *new_type;
99b1c762
JB
2162 struct type *index_type_desc;
2163 struct type *index_type;
14f9c5c9
AS
2164 LONGEST low_bound, high_bound;
2165
61ee279c 2166 type = ada_check_typedef (type);
14f9c5c9
AS
2167 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2168 return type;
2169
99b1c762
JB
2170 index_type_desc = ada_find_parallel_type (type, "___XA");
2171 if (index_type_desc)
2172 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2173 NULL);
2174 else
2175 index_type = TYPE_INDEX_TYPE (type);
2176
e9bb382b 2177 new_type = alloc_type_copy (type);
ad82864c
JB
2178 new_elt_type =
2179 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2180 elt_bits);
99b1c762 2181 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2182 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2183 TYPE_NAME (new_type) = ada_type_name (type);
2184
99b1c762 2185 if (get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2186 low_bound = high_bound = 0;
2187 if (high_bound < low_bound)
2188 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2189 else
14f9c5c9
AS
2190 {
2191 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2192 TYPE_LENGTH (new_type) =
4c4b4cd2 2193 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2194 }
2195
876cecd0 2196 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2197 return new_type;
2198}
2199
ad82864c
JB
2200/* The array type encoded by TYPE, where
2201 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2202
d2e4a39e 2203static struct type *
ad82864c 2204decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2205{
0d5cff50 2206 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2207 char *name;
0d5cff50 2208 const char *tail;
d2e4a39e 2209 struct type *shadow_type;
14f9c5c9 2210 long bits;
14f9c5c9 2211
727e3d2e
JB
2212 if (!raw_name)
2213 raw_name = ada_type_name (desc_base_type (type));
2214
2215 if (!raw_name)
2216 return NULL;
2217
2218 name = (char *) alloca (strlen (raw_name) + 1);
2219 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2220 type = desc_base_type (type);
2221
14f9c5c9
AS
2222 memcpy (name, raw_name, tail - raw_name);
2223 name[tail - raw_name] = '\000';
2224
b4ba55a1
JB
2225 shadow_type = ada_find_parallel_type_with_name (type, name);
2226
2227 if (shadow_type == NULL)
14f9c5c9 2228 {
323e0a4a 2229 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2230 return NULL;
2231 }
cb249c71 2232 CHECK_TYPEDEF (shadow_type);
14f9c5c9
AS
2233
2234 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2235 {
0963b4bd
MS
2236 lim_warning (_("could not understand bounds "
2237 "information on packed array"));
14f9c5c9
AS
2238 return NULL;
2239 }
d2e4a39e 2240
ad82864c
JB
2241 bits = decode_packed_array_bitsize (type);
2242 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2243}
2244
ad82864c
JB
2245/* Given that ARR is a struct value *indicating a GNAT constrained packed
2246 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2247 standard GDB array type except that the BITSIZEs of the array
2248 target types are set to the number of bits in each element, and the
4c4b4cd2 2249 type length is set appropriately. */
14f9c5c9 2250
d2e4a39e 2251static struct value *
ad82864c 2252decode_constrained_packed_array (struct value *arr)
14f9c5c9 2253{
4c4b4cd2 2254 struct type *type;
14f9c5c9 2255
11aa919a
PMR
2256 /* If our value is a pointer, then dereference it. Likewise if
2257 the value is a reference. Make sure that this operation does not
2258 cause the target type to be fixed, as this would indirectly cause
2259 this array to be decoded. The rest of the routine assumes that
2260 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2261 and "value_ind" routines to perform the dereferencing, as opposed
2262 to using "ada_coerce_ref" or "ada_value_ind". */
2263 arr = coerce_ref (arr);
828292f2 2264 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2265 arr = value_ind (arr);
4c4b4cd2 2266
ad82864c 2267 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2268 if (type == NULL)
2269 {
323e0a4a 2270 error (_("can't unpack array"));
14f9c5c9
AS
2271 return NULL;
2272 }
61ee279c 2273
50810684 2274 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2275 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2276 {
2277 /* This is a (right-justified) modular type representing a packed
2278 array with no wrapper. In order to interpret the value through
2279 the (left-justified) packed array type we just built, we must
2280 first left-justify it. */
2281 int bit_size, bit_pos;
2282 ULONGEST mod;
2283
df407dfe 2284 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2285 bit_size = 0;
2286 while (mod > 0)
2287 {
2288 bit_size += 1;
2289 mod >>= 1;
2290 }
df407dfe 2291 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2292 arr = ada_value_primitive_packed_val (arr, NULL,
2293 bit_pos / HOST_CHAR_BIT,
2294 bit_pos % HOST_CHAR_BIT,
2295 bit_size,
2296 type);
2297 }
2298
4c4b4cd2 2299 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2300}
2301
2302
2303/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2304 given in IND. ARR must be a simple array. */
14f9c5c9 2305
d2e4a39e
AS
2306static struct value *
2307value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2308{
2309 int i;
2310 int bits, elt_off, bit_off;
2311 long elt_total_bit_offset;
d2e4a39e
AS
2312 struct type *elt_type;
2313 struct value *v;
14f9c5c9
AS
2314
2315 bits = 0;
2316 elt_total_bit_offset = 0;
df407dfe 2317 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2318 for (i = 0; i < arity; i += 1)
14f9c5c9 2319 {
d2e4a39e 2320 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2321 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2322 error
0963b4bd
MS
2323 (_("attempt to do packed indexing of "
2324 "something other than a packed array"));
14f9c5c9 2325 else
4c4b4cd2
PH
2326 {
2327 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2328 LONGEST lowerbound, upperbound;
2329 LONGEST idx;
2330
2331 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2332 {
323e0a4a 2333 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2334 lowerbound = upperbound = 0;
2335 }
2336
3cb382c9 2337 idx = pos_atr (ind[i]);
4c4b4cd2 2338 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2339 lim_warning (_("packed array index %ld out of bounds"),
2340 (long) idx);
4c4b4cd2
PH
2341 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2342 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2343 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2344 }
14f9c5c9
AS
2345 }
2346 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2347 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2348
2349 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2350 bits, elt_type);
14f9c5c9
AS
2351 return v;
2352}
2353
4c4b4cd2 2354/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2355
2356static int
d2e4a39e 2357has_negatives (struct type *type)
14f9c5c9 2358{
d2e4a39e
AS
2359 switch (TYPE_CODE (type))
2360 {
2361 default:
2362 return 0;
2363 case TYPE_CODE_INT:
2364 return !TYPE_UNSIGNED (type);
2365 case TYPE_CODE_RANGE:
2366 return TYPE_LOW_BOUND (type) < 0;
2367 }
14f9c5c9 2368}
d2e4a39e 2369
14f9c5c9
AS
2370
2371/* Create a new value of type TYPE from the contents of OBJ starting
2372 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2373 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
0963b4bd 2374 assigning through the result will set the field fetched from.
4c4b4cd2
PH
2375 VALADDR is ignored unless OBJ is NULL, in which case,
2376 VALADDR+OFFSET must address the start of storage containing the
2377 packed value. The value returned in this case is never an lval.
2378 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
14f9c5c9 2379
d2e4a39e 2380struct value *
fc1a4b47 2381ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
a2bd3dcd 2382 long offset, int bit_offset, int bit_size,
4c4b4cd2 2383 struct type *type)
14f9c5c9 2384{
d2e4a39e 2385 struct value *v;
4c4b4cd2
PH
2386 int src, /* Index into the source area */
2387 targ, /* Index into the target area */
2388 srcBitsLeft, /* Number of source bits left to move */
2389 nsrc, ntarg, /* Number of source and target bytes */
2390 unusedLS, /* Number of bits in next significant
2391 byte of source that are unused */
2392 accumSize; /* Number of meaningful bits in accum */
2393 unsigned char *bytes; /* First byte containing data to unpack */
d2e4a39e 2394 unsigned char *unpacked;
4c4b4cd2 2395 unsigned long accum; /* Staging area for bits being transferred */
14f9c5c9
AS
2396 unsigned char sign;
2397 int len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
4c4b4cd2
PH
2398 /* Transmit bytes from least to most significant; delta is the direction
2399 the indices move. */
50810684 2400 int delta = gdbarch_bits_big_endian (get_type_arch (type)) ? -1 : 1;
14f9c5c9 2401
61ee279c 2402 type = ada_check_typedef (type);
14f9c5c9
AS
2403
2404 if (obj == NULL)
2405 {
2406 v = allocate_value (type);
d2e4a39e 2407 bytes = (unsigned char *) (valaddr + offset);
14f9c5c9 2408 }
9214ee5f 2409 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
14f9c5c9 2410 {
53ba8333 2411 v = value_at (type, value_address (obj));
9f1f738a 2412 type = value_type (v);
d2e4a39e 2413 bytes = (unsigned char *) alloca (len);
53ba8333 2414 read_memory (value_address (v) + offset, bytes, len);
14f9c5c9 2415 }
d2e4a39e 2416 else
14f9c5c9
AS
2417 {
2418 v = allocate_value (type);
0fd88904 2419 bytes = (unsigned char *) value_contents (obj) + offset;
14f9c5c9 2420 }
d2e4a39e
AS
2421
2422 if (obj != NULL)
14f9c5c9 2423 {
53ba8333 2424 long new_offset = offset;
5b4ee69b 2425
74bcbdf3 2426 set_value_component_location (v, obj);
9bbda503
AC
2427 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2428 set_value_bitsize (v, bit_size);
df407dfe 2429 if (value_bitpos (v) >= HOST_CHAR_BIT)
4c4b4cd2 2430 {
53ba8333 2431 ++new_offset;
9bbda503 2432 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
4c4b4cd2 2433 }
53ba8333
JB
2434 set_value_offset (v, new_offset);
2435
2436 /* Also set the parent value. This is needed when trying to
2437 assign a new value (in inferior memory). */
2438 set_value_parent (v, obj);
14f9c5c9
AS
2439 }
2440 else
9bbda503 2441 set_value_bitsize (v, bit_size);
0fd88904 2442 unpacked = (unsigned char *) value_contents (v);
14f9c5c9
AS
2443
2444 srcBitsLeft = bit_size;
2445 nsrc = len;
2446 ntarg = TYPE_LENGTH (type);
2447 sign = 0;
2448 if (bit_size == 0)
2449 {
2450 memset (unpacked, 0, TYPE_LENGTH (type));
2451 return v;
2452 }
50810684 2453 else if (gdbarch_bits_big_endian (get_type_arch (type)))
14f9c5c9 2454 {
d2e4a39e 2455 src = len - 1;
1265e4aa
JB
2456 if (has_negatives (type)
2457 && ((bytes[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2458 sign = ~0;
d2e4a39e
AS
2459
2460 unusedLS =
4c4b4cd2
PH
2461 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2462 % HOST_CHAR_BIT;
14f9c5c9
AS
2463
2464 switch (TYPE_CODE (type))
4c4b4cd2
PH
2465 {
2466 case TYPE_CODE_ARRAY:
2467 case TYPE_CODE_UNION:
2468 case TYPE_CODE_STRUCT:
2469 /* Non-scalar values must be aligned at a byte boundary... */
2470 accumSize =
2471 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2472 /* ... And are placed at the beginning (most-significant) bytes
2473 of the target. */
529cad9c 2474 targ = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
0056e4d5 2475 ntarg = targ + 1;
4c4b4cd2
PH
2476 break;
2477 default:
2478 accumSize = 0;
2479 targ = TYPE_LENGTH (type) - 1;
2480 break;
2481 }
14f9c5c9 2482 }
d2e4a39e 2483 else
14f9c5c9
AS
2484 {
2485 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2486
2487 src = targ = 0;
2488 unusedLS = bit_offset;
2489 accumSize = 0;
2490
d2e4a39e 2491 if (has_negatives (type) && (bytes[len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2492 sign = ~0;
14f9c5c9 2493 }
d2e4a39e 2494
14f9c5c9
AS
2495 accum = 0;
2496 while (nsrc > 0)
2497 {
2498 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2499 part of the value. */
d2e4a39e 2500 unsigned int unusedMSMask =
4c4b4cd2
PH
2501 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2502 1;
2503 /* Sign-extend bits for this byte. */
14f9c5c9 2504 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2505
d2e4a39e 2506 accum |=
4c4b4cd2 2507 (((bytes[src] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2508 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2509 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2
PH
2510 {
2511 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2512 accumSize -= HOST_CHAR_BIT;
2513 accum >>= HOST_CHAR_BIT;
2514 ntarg -= 1;
2515 targ += delta;
2516 }
14f9c5c9
AS
2517 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2518 unusedLS = 0;
2519 nsrc -= 1;
2520 src += delta;
2521 }
2522 while (ntarg > 0)
2523 {
2524 accum |= sign << accumSize;
2525 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2526 accumSize -= HOST_CHAR_BIT;
2527 accum >>= HOST_CHAR_BIT;
2528 ntarg -= 1;
2529 targ += delta;
2530 }
2531
2532 return v;
2533}
d2e4a39e 2534
14f9c5c9
AS
2535/* Move N bits from SOURCE, starting at bit offset SRC_OFFSET to
2536 TARGET, starting at bit offset TARG_OFFSET. SOURCE and TARGET must
4c4b4cd2 2537 not overlap. */
14f9c5c9 2538static void
fc1a4b47 2539move_bits (gdb_byte *target, int targ_offset, const gdb_byte *source,
50810684 2540 int src_offset, int n, int bits_big_endian_p)
14f9c5c9
AS
2541{
2542 unsigned int accum, mask;
2543 int accum_bits, chunk_size;
2544
2545 target += targ_offset / HOST_CHAR_BIT;
2546 targ_offset %= HOST_CHAR_BIT;
2547 source += src_offset / HOST_CHAR_BIT;
2548 src_offset %= HOST_CHAR_BIT;
50810684 2549 if (bits_big_endian_p)
14f9c5c9
AS
2550 {
2551 accum = (unsigned char) *source;
2552 source += 1;
2553 accum_bits = HOST_CHAR_BIT - src_offset;
2554
d2e4a39e 2555 while (n > 0)
4c4b4cd2
PH
2556 {
2557 int unused_right;
5b4ee69b 2558
4c4b4cd2
PH
2559 accum = (accum << HOST_CHAR_BIT) + (unsigned char) *source;
2560 accum_bits += HOST_CHAR_BIT;
2561 source += 1;
2562 chunk_size = HOST_CHAR_BIT - targ_offset;
2563 if (chunk_size > n)
2564 chunk_size = n;
2565 unused_right = HOST_CHAR_BIT - (chunk_size + targ_offset);
2566 mask = ((1 << chunk_size) - 1) << unused_right;
2567 *target =
2568 (*target & ~mask)
2569 | ((accum >> (accum_bits - chunk_size - unused_right)) & mask);
2570 n -= chunk_size;
2571 accum_bits -= chunk_size;
2572 target += 1;
2573 targ_offset = 0;
2574 }
14f9c5c9
AS
2575 }
2576 else
2577 {
2578 accum = (unsigned char) *source >> src_offset;
2579 source += 1;
2580 accum_bits = HOST_CHAR_BIT - src_offset;
2581
d2e4a39e 2582 while (n > 0)
4c4b4cd2
PH
2583 {
2584 accum = accum + ((unsigned char) *source << accum_bits);
2585 accum_bits += HOST_CHAR_BIT;
2586 source += 1;
2587 chunk_size = HOST_CHAR_BIT - targ_offset;
2588 if (chunk_size > n)
2589 chunk_size = n;
2590 mask = ((1 << chunk_size) - 1) << targ_offset;
2591 *target = (*target & ~mask) | ((accum << targ_offset) & mask);
2592 n -= chunk_size;
2593 accum_bits -= chunk_size;
2594 accum >>= chunk_size;
2595 target += 1;
2596 targ_offset = 0;
2597 }
14f9c5c9
AS
2598 }
2599}
2600
14f9c5c9
AS
2601/* Store the contents of FROMVAL into the location of TOVAL.
2602 Return a new value with the location of TOVAL and contents of
2603 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2604 floating-point or non-scalar types. */
14f9c5c9 2605
d2e4a39e
AS
2606static struct value *
2607ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2608{
df407dfe
AC
2609 struct type *type = value_type (toval);
2610 int bits = value_bitsize (toval);
14f9c5c9 2611
52ce6436
PH
2612 toval = ada_coerce_ref (toval);
2613 fromval = ada_coerce_ref (fromval);
2614
2615 if (ada_is_direct_array_type (value_type (toval)))
2616 toval = ada_coerce_to_simple_array (toval);
2617 if (ada_is_direct_array_type (value_type (fromval)))
2618 fromval = ada_coerce_to_simple_array (fromval);
2619
88e3b34b 2620 if (!deprecated_value_modifiable (toval))
323e0a4a 2621 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2622
d2e4a39e 2623 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2624 && bits > 0
d2e4a39e 2625 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2626 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2627 {
df407dfe
AC
2628 int len = (value_bitpos (toval)
2629 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2630 int from_size;
948f8e3d 2631 gdb_byte *buffer = alloca (len);
d2e4a39e 2632 struct value *val;
42ae5230 2633 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2634
2635 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2636 fromval = value_cast (type, fromval);
14f9c5c9 2637
52ce6436 2638 read_memory (to_addr, buffer, len);
aced2898
PH
2639 from_size = value_bitsize (fromval);
2640 if (from_size == 0)
2641 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
50810684 2642 if (gdbarch_bits_big_endian (get_type_arch (type)))
df407dfe 2643 move_bits (buffer, value_bitpos (toval),
50810684 2644 value_contents (fromval), from_size - bits, bits, 1);
14f9c5c9 2645 else
50810684
UW
2646 move_bits (buffer, value_bitpos (toval),
2647 value_contents (fromval), 0, bits, 0);
972daa01 2648 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2649
14f9c5c9 2650 val = value_copy (toval);
0fd88904 2651 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2652 TYPE_LENGTH (type));
04624583 2653 deprecated_set_value_type (val, type);
d2e4a39e 2654
14f9c5c9
AS
2655 return val;
2656 }
2657
2658 return value_assign (toval, fromval);
2659}
2660
2661
52ce6436
PH
2662/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2663 * CONTAINER, assign the contents of VAL to COMPONENTS's place in
2664 * CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2665 * COMPONENT, and not the inferior's memory. The current contents
2666 * of COMPONENT are ignored. */
2667static void
2668value_assign_to_component (struct value *container, struct value *component,
2669 struct value *val)
2670{
2671 LONGEST offset_in_container =
42ae5230 2672 (LONGEST) (value_address (component) - value_address (container));
52ce6436
PH
2673 int bit_offset_in_container =
2674 value_bitpos (component) - value_bitpos (container);
2675 int bits;
2676
2677 val = value_cast (value_type (component), val);
2678
2679 if (value_bitsize (component) == 0)
2680 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2681 else
2682 bits = value_bitsize (component);
2683
50810684 2684 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
52ce6436
PH
2685 move_bits (value_contents_writeable (container) + offset_in_container,
2686 value_bitpos (container) + bit_offset_in_container,
2687 value_contents (val),
2688 TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits,
50810684 2689 bits, 1);
52ce6436
PH
2690 else
2691 move_bits (value_contents_writeable (container) + offset_in_container,
2692 value_bitpos (container) + bit_offset_in_container,
50810684 2693 value_contents (val), 0, bits, 0);
52ce6436
PH
2694}
2695
4c4b4cd2
PH
2696/* The value of the element of array ARR at the ARITY indices given in IND.
2697 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2698 thereto. */
2699
d2e4a39e
AS
2700struct value *
2701ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2702{
2703 int k;
d2e4a39e
AS
2704 struct value *elt;
2705 struct type *elt_type;
14f9c5c9
AS
2706
2707 elt = ada_coerce_to_simple_array (arr);
2708
df407dfe 2709 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2710 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2711 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2712 return value_subscript_packed (elt, arity, ind);
2713
2714 for (k = 0; k < arity; k += 1)
2715 {
2716 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2717 error (_("too many subscripts (%d expected)"), k);
2497b498 2718 elt = value_subscript (elt, pos_atr (ind[k]));
14f9c5c9
AS
2719 }
2720 return elt;
2721}
2722
2723/* Assuming ARR is a pointer to a standard GDB array of type TYPE, the
2724 value of the element of *ARR at the ARITY indices given in
4c4b4cd2 2725 IND. Does not read the entire array into memory. */
14f9c5c9 2726
2c0b251b 2727static struct value *
d2e4a39e 2728ada_value_ptr_subscript (struct value *arr, struct type *type, int arity,
4c4b4cd2 2729 struct value **ind)
14f9c5c9
AS
2730{
2731 int k;
2732
2733 for (k = 0; k < arity; k += 1)
2734 {
2735 LONGEST lwb, upb;
14f9c5c9
AS
2736
2737 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2738 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2739 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2740 value_copy (arr));
14f9c5c9 2741 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
2497b498 2742 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2743 type = TYPE_TARGET_TYPE (type);
2744 }
2745
2746 return value_ind (arr);
2747}
2748
0b5d8877 2749/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
f5938064
JG
2750 actual type of ARRAY_PTR is ignored), returns the Ada slice of HIGH-LOW+1
2751 elements starting at index LOW. The lower bound of this array is LOW, as
0963b4bd 2752 per Ada rules. */
0b5d8877 2753static struct value *
f5938064
JG
2754ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2755 int low, int high)
0b5d8877 2756{
b0dd7688 2757 struct type *type0 = ada_check_typedef (type);
6c038f32 2758 CORE_ADDR base = value_as_address (array_ptr)
b0dd7688
JB
2759 + ((low - ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0)))
2760 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
0c9c3474
SA
2761 struct type *index_type
2762 = create_static_range_type (NULL,
2763 TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0)),
2764 low, high);
6c038f32 2765 struct type *slice_type =
b0dd7688 2766 create_array_type (NULL, TYPE_TARGET_TYPE (type0), index_type);
5b4ee69b 2767
f5938064 2768 return value_at_lazy (slice_type, base);
0b5d8877
PH
2769}
2770
2771
2772static struct value *
2773ada_value_slice (struct value *array, int low, int high)
2774{
b0dd7688 2775 struct type *type = ada_check_typedef (value_type (array));
0c9c3474
SA
2776 struct type *index_type
2777 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
6c038f32 2778 struct type *slice_type =
0b5d8877 2779 create_array_type (NULL, TYPE_TARGET_TYPE (type), index_type);
5b4ee69b 2780
6c038f32 2781 return value_cast (slice_type, value_slice (array, low, high - low + 1));
0b5d8877
PH
2782}
2783
14f9c5c9
AS
2784/* If type is a record type in the form of a standard GNAT array
2785 descriptor, returns the number of dimensions for type. If arr is a
2786 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2787 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2788
2789int
d2e4a39e 2790ada_array_arity (struct type *type)
14f9c5c9
AS
2791{
2792 int arity;
2793
2794 if (type == NULL)
2795 return 0;
2796
2797 type = desc_base_type (type);
2798
2799 arity = 0;
d2e4a39e 2800 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2801 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2802 else
2803 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2804 {
4c4b4cd2 2805 arity += 1;
61ee279c 2806 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2807 }
d2e4a39e 2808
14f9c5c9
AS
2809 return arity;
2810}
2811
2812/* If TYPE is a record type in the form of a standard GNAT array
2813 descriptor or a simple array type, returns the element type for
2814 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2815 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2816
d2e4a39e
AS
2817struct type *
2818ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2819{
2820 type = desc_base_type (type);
2821
d2e4a39e 2822 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2823 {
2824 int k;
d2e4a39e 2825 struct type *p_array_type;
14f9c5c9 2826
556bdfd4 2827 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2828
2829 k = ada_array_arity (type);
2830 if (k == 0)
4c4b4cd2 2831 return NULL;
d2e4a39e 2832
4c4b4cd2 2833 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2834 if (nindices >= 0 && k > nindices)
4c4b4cd2 2835 k = nindices;
d2e4a39e 2836 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2837 {
61ee279c 2838 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2839 k -= 1;
2840 }
14f9c5c9
AS
2841 return p_array_type;
2842 }
2843 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2844 {
2845 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2846 {
2847 type = TYPE_TARGET_TYPE (type);
2848 nindices -= 1;
2849 }
14f9c5c9
AS
2850 return type;
2851 }
2852
2853 return NULL;
2854}
2855
4c4b4cd2 2856/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2857 Does not examine memory. Throws an error if N is invalid or TYPE
2858 is not an array type. NAME is the name of the Ada attribute being
2859 evaluated ('range, 'first, 'last, or 'length); it is used in building
2860 the error message. */
14f9c5c9 2861
1eea4ebd
UW
2862static struct type *
2863ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2864{
4c4b4cd2
PH
2865 struct type *result_type;
2866
14f9c5c9
AS
2867 type = desc_base_type (type);
2868
1eea4ebd
UW
2869 if (n < 0 || n > ada_array_arity (type))
2870 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2871
4c4b4cd2 2872 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2873 {
2874 int i;
2875
2876 for (i = 1; i < n; i += 1)
4c4b4cd2 2877 type = TYPE_TARGET_TYPE (type);
262452ec 2878 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2879 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2880 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2881 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2882 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2883 result_type = NULL;
14f9c5c9 2884 }
d2e4a39e 2885 else
1eea4ebd
UW
2886 {
2887 result_type = desc_index_type (desc_bounds_type (type), n);
2888 if (result_type == NULL)
2889 error (_("attempt to take bound of something that is not an array"));
2890 }
2891
2892 return result_type;
14f9c5c9
AS
2893}
2894
2895/* Given that arr is an array type, returns the lower bound of the
2896 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2897 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2898 array-descriptor type. It works for other arrays with bounds supplied
2899 by run-time quantities other than discriminants. */
14f9c5c9 2900
abb68b3e 2901static LONGEST
fb5e3d5c 2902ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2903{
8a48ac95 2904 struct type *type, *index_type_desc, *index_type;
1ce677a4 2905 int i;
262452ec
JK
2906
2907 gdb_assert (which == 0 || which == 1);
14f9c5c9 2908
ad82864c
JB
2909 if (ada_is_constrained_packed_array_type (arr_type))
2910 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2911
4c4b4cd2 2912 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2913 return (LONGEST) - which;
14f9c5c9
AS
2914
2915 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2916 type = TYPE_TARGET_TYPE (arr_type);
2917 else
2918 type = arr_type;
2919
2920 index_type_desc = ada_find_parallel_type (type, "___XA");
28c85d6c 2921 ada_fixup_array_indexes_type (index_type_desc);
262452ec 2922 if (index_type_desc != NULL)
28c85d6c
JB
2923 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2924 NULL);
262452ec 2925 else
8a48ac95
JB
2926 {
2927 struct type *elt_type = check_typedef (type);
2928
2929 for (i = 1; i < n; i++)
2930 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
2931
2932 index_type = TYPE_INDEX_TYPE (elt_type);
2933 }
262452ec 2934
43bbcdc2
PH
2935 return
2936 (LONGEST) (which == 0
2937 ? ada_discrete_type_low_bound (index_type)
2938 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
2939}
2940
2941/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
2942 nth index (numbering from 1) if WHICH is 0, and the upper bound if
2943 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 2944 supplied by run-time quantities other than discriminants. */
14f9c5c9 2945
1eea4ebd 2946static LONGEST
4dc81987 2947ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 2948{
df407dfe 2949 struct type *arr_type = value_type (arr);
14f9c5c9 2950
ad82864c
JB
2951 if (ada_is_constrained_packed_array_type (arr_type))
2952 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 2953 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 2954 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 2955 else
1eea4ebd 2956 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
2957}
2958
2959/* Given that arr is an array value, returns the length of the
2960 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
2961 supplied by run-time quantities other than discriminants.
2962 Does not work for arrays indexed by enumeration types with representation
2963 clauses at the moment. */
14f9c5c9 2964
1eea4ebd 2965static LONGEST
d2e4a39e 2966ada_array_length (struct value *arr, int n)
14f9c5c9 2967{
df407dfe 2968 struct type *arr_type = ada_check_typedef (value_type (arr));
14f9c5c9 2969
ad82864c
JB
2970 if (ada_is_constrained_packed_array_type (arr_type))
2971 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 2972
4c4b4cd2 2973 if (ada_is_simple_array_type (arr_type))
1eea4ebd
UW
2974 return (ada_array_bound_from_type (arr_type, n, 1)
2975 - ada_array_bound_from_type (arr_type, n, 0) + 1);
14f9c5c9 2976 else
1eea4ebd
UW
2977 return (value_as_long (desc_one_bound (desc_bounds (arr), n, 1))
2978 - value_as_long (desc_one_bound (desc_bounds (arr), n, 0)) + 1);
4c4b4cd2
PH
2979}
2980
2981/* An empty array whose type is that of ARR_TYPE (an array type),
2982 with bounds LOW to LOW-1. */
2983
2984static struct value *
2985empty_array (struct type *arr_type, int low)
2986{
b0dd7688 2987 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
2988 struct type *index_type
2989 = create_static_range_type
2990 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low, low - 1);
b0dd7688 2991 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 2992
0b5d8877 2993 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 2994}
14f9c5c9 2995\f
d2e4a39e 2996
4c4b4cd2 2997 /* Name resolution */
14f9c5c9 2998
4c4b4cd2
PH
2999/* The "decoded" name for the user-definable Ada operator corresponding
3000 to OP. */
14f9c5c9 3001
d2e4a39e 3002static const char *
4c4b4cd2 3003ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3004{
3005 int i;
3006
4c4b4cd2 3007 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3008 {
3009 if (ada_opname_table[i].op == op)
4c4b4cd2 3010 return ada_opname_table[i].decoded;
14f9c5c9 3011 }
323e0a4a 3012 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3013}
3014
3015
4c4b4cd2
PH
3016/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3017 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3018 undefined namespace) and converts operators that are
3019 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3020 non-null, it provides a preferred result type [at the moment, only
3021 type void has any effect---causing procedures to be preferred over
3022 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3023 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3024
4c4b4cd2
PH
3025static void
3026resolve (struct expression **expp, int void_context_p)
14f9c5c9 3027{
30b15541
UW
3028 struct type *context_type = NULL;
3029 int pc = 0;
3030
3031 if (void_context_p)
3032 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3033
3034 resolve_subexp (expp, &pc, 1, context_type);
14f9c5c9
AS
3035}
3036
4c4b4cd2
PH
3037/* Resolve the operator of the subexpression beginning at
3038 position *POS of *EXPP. "Resolving" consists of replacing
3039 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3040 with their resolutions, replacing built-in operators with
3041 function calls to user-defined operators, where appropriate, and,
3042 when DEPROCEDURE_P is non-zero, converting function-valued variables
3043 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3044 are as in ada_resolve, above. */
14f9c5c9 3045
d2e4a39e 3046static struct value *
4c4b4cd2 3047resolve_subexp (struct expression **expp, int *pos, int deprocedure_p,
76a01679 3048 struct type *context_type)
14f9c5c9
AS
3049{
3050 int pc = *pos;
3051 int i;
4c4b4cd2 3052 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3053 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3054 struct value **argvec; /* Vector of operand types (alloca'ed). */
3055 int nargs; /* Number of operands. */
52ce6436 3056 int oplen;
14f9c5c9
AS
3057
3058 argvec = NULL;
3059 nargs = 0;
3060 exp = *expp;
3061
52ce6436
PH
3062 /* Pass one: resolve operands, saving their types and updating *pos,
3063 if needed. */
14f9c5c9
AS
3064 switch (op)
3065 {
4c4b4cd2
PH
3066 case OP_FUNCALL:
3067 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3068 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3069 *pos += 7;
4c4b4cd2
PH
3070 else
3071 {
3072 *pos += 3;
3073 resolve_subexp (expp, pos, 0, NULL);
3074 }
3075 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3076 break;
3077
14f9c5c9 3078 case UNOP_ADDR:
4c4b4cd2
PH
3079 *pos += 1;
3080 resolve_subexp (expp, pos, 0, NULL);
3081 break;
3082
52ce6436
PH
3083 case UNOP_QUAL:
3084 *pos += 3;
17466c1a 3085 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type));
4c4b4cd2
PH
3086 break;
3087
52ce6436 3088 case OP_ATR_MODULUS:
4c4b4cd2
PH
3089 case OP_ATR_SIZE:
3090 case OP_ATR_TAG:
4c4b4cd2
PH
3091 case OP_ATR_FIRST:
3092 case OP_ATR_LAST:
3093 case OP_ATR_LENGTH:
3094 case OP_ATR_POS:
3095 case OP_ATR_VAL:
4c4b4cd2
PH
3096 case OP_ATR_MIN:
3097 case OP_ATR_MAX:
52ce6436
PH
3098 case TERNOP_IN_RANGE:
3099 case BINOP_IN_BOUNDS:
3100 case UNOP_IN_RANGE:
3101 case OP_AGGREGATE:
3102 case OP_OTHERS:
3103 case OP_CHOICES:
3104 case OP_POSITIONAL:
3105 case OP_DISCRETE_RANGE:
3106 case OP_NAME:
3107 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3108 *pos += oplen;
14f9c5c9
AS
3109 break;
3110
3111 case BINOP_ASSIGN:
3112 {
4c4b4cd2
PH
3113 struct value *arg1;
3114
3115 *pos += 1;
3116 arg1 = resolve_subexp (expp, pos, 0, NULL);
3117 if (arg1 == NULL)
3118 resolve_subexp (expp, pos, 1, NULL);
3119 else
df407dfe 3120 resolve_subexp (expp, pos, 1, value_type (arg1));
4c4b4cd2 3121 break;
14f9c5c9
AS
3122 }
3123
4c4b4cd2 3124 case UNOP_CAST:
4c4b4cd2
PH
3125 *pos += 3;
3126 nargs = 1;
3127 break;
14f9c5c9 3128
4c4b4cd2
PH
3129 case BINOP_ADD:
3130 case BINOP_SUB:
3131 case BINOP_MUL:
3132 case BINOP_DIV:
3133 case BINOP_REM:
3134 case BINOP_MOD:
3135 case BINOP_EXP:
3136 case BINOP_CONCAT:
3137 case BINOP_LOGICAL_AND:
3138 case BINOP_LOGICAL_OR:
3139 case BINOP_BITWISE_AND:
3140 case BINOP_BITWISE_IOR:
3141 case BINOP_BITWISE_XOR:
14f9c5c9 3142
4c4b4cd2
PH
3143 case BINOP_EQUAL:
3144 case BINOP_NOTEQUAL:
3145 case BINOP_LESS:
3146 case BINOP_GTR:
3147 case BINOP_LEQ:
3148 case BINOP_GEQ:
14f9c5c9 3149
4c4b4cd2
PH
3150 case BINOP_REPEAT:
3151 case BINOP_SUBSCRIPT:
3152 case BINOP_COMMA:
40c8aaa9
JB
3153 *pos += 1;
3154 nargs = 2;
3155 break;
14f9c5c9 3156
4c4b4cd2
PH
3157 case UNOP_NEG:
3158 case UNOP_PLUS:
3159 case UNOP_LOGICAL_NOT:
3160 case UNOP_ABS:
3161 case UNOP_IND:
3162 *pos += 1;
3163 nargs = 1;
3164 break;
14f9c5c9 3165
4c4b4cd2
PH
3166 case OP_LONG:
3167 case OP_DOUBLE:
3168 case OP_VAR_VALUE:
3169 *pos += 4;
3170 break;
14f9c5c9 3171
4c4b4cd2
PH
3172 case OP_TYPE:
3173 case OP_BOOL:
3174 case OP_LAST:
4c4b4cd2
PH
3175 case OP_INTERNALVAR:
3176 *pos += 3;
3177 break;
14f9c5c9 3178
4c4b4cd2
PH
3179 case UNOP_MEMVAL:
3180 *pos += 3;
3181 nargs = 1;
3182 break;
3183
67f3407f
DJ
3184 case OP_REGISTER:
3185 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3186 break;
3187
4c4b4cd2
PH
3188 case STRUCTOP_STRUCT:
3189 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3190 nargs = 1;
3191 break;
3192
4c4b4cd2 3193 case TERNOP_SLICE:
4c4b4cd2
PH
3194 *pos += 1;
3195 nargs = 3;
3196 break;
3197
52ce6436 3198 case OP_STRING:
14f9c5c9 3199 break;
4c4b4cd2
PH
3200
3201 default:
323e0a4a 3202 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3203 }
3204
76a01679 3205 argvec = (struct value * *) alloca (sizeof (struct value *) * (nargs + 1));
4c4b4cd2
PH
3206 for (i = 0; i < nargs; i += 1)
3207 argvec[i] = resolve_subexp (expp, pos, 1, NULL);
3208 argvec[i] = NULL;
3209 exp = *expp;
3210
3211 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3212 switch (op)
3213 {
3214 default:
3215 break;
3216
14f9c5c9 3217 case OP_VAR_VALUE:
4c4b4cd2 3218 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
3219 {
3220 struct ada_symbol_info *candidates;
3221 int n_candidates;
3222
3223 n_candidates =
3224 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3225 (exp->elts[pc + 2].symbol),
3226 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3227 &candidates);
76a01679
JB
3228
3229 if (n_candidates > 1)
3230 {
3231 /* Types tend to get re-introduced locally, so if there
3232 are any local symbols that are not types, first filter
3233 out all types. */
3234 int j;
3235 for (j = 0; j < n_candidates; j += 1)
3236 switch (SYMBOL_CLASS (candidates[j].sym))
3237 {
3238 case LOC_REGISTER:
3239 case LOC_ARG:
3240 case LOC_REF_ARG:
76a01679
JB
3241 case LOC_REGPARM_ADDR:
3242 case LOC_LOCAL:
76a01679 3243 case LOC_COMPUTED:
76a01679
JB
3244 goto FoundNonType;
3245 default:
3246 break;
3247 }
3248 FoundNonType:
3249 if (j < n_candidates)
3250 {
3251 j = 0;
3252 while (j < n_candidates)
3253 {
3254 if (SYMBOL_CLASS (candidates[j].sym) == LOC_TYPEDEF)
3255 {
3256 candidates[j] = candidates[n_candidates - 1];
3257 n_candidates -= 1;
3258 }
3259 else
3260 j += 1;
3261 }
3262 }
3263 }
3264
3265 if (n_candidates == 0)
323e0a4a 3266 error (_("No definition found for %s"),
76a01679
JB
3267 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3268 else if (n_candidates == 1)
3269 i = 0;
3270 else if (deprocedure_p
3271 && !is_nonfunction (candidates, n_candidates))
3272 {
06d5cf63
JB
3273 i = ada_resolve_function
3274 (candidates, n_candidates, NULL, 0,
3275 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
3276 context_type);
76a01679 3277 if (i < 0)
323e0a4a 3278 error (_("Could not find a match for %s"),
76a01679
JB
3279 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3280 }
3281 else
3282 {
323e0a4a 3283 printf_filtered (_("Multiple matches for %s\n"),
76a01679
JB
3284 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3285 user_select_syms (candidates, n_candidates, 1);
3286 i = 0;
3287 }
3288
3289 exp->elts[pc + 1].block = candidates[i].block;
3290 exp->elts[pc + 2].symbol = candidates[i].sym;
1265e4aa
JB
3291 if (innermost_block == NULL
3292 || contained_in (candidates[i].block, innermost_block))
76a01679
JB
3293 innermost_block = candidates[i].block;
3294 }
3295
3296 if (deprocedure_p
3297 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3298 == TYPE_CODE_FUNC))
3299 {
3300 replace_operator_with_call (expp, pc, 0, 0,
3301 exp->elts[pc + 2].symbol,
3302 exp->elts[pc + 1].block);
3303 exp = *expp;
3304 }
14f9c5c9
AS
3305 break;
3306
3307 case OP_FUNCALL:
3308 {
4c4b4cd2 3309 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3310 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2
PH
3311 {
3312 struct ada_symbol_info *candidates;
3313 int n_candidates;
3314
3315 n_candidates =
76a01679
JB
3316 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3317 (exp->elts[pc + 5].symbol),
3318 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3319 &candidates);
4c4b4cd2
PH
3320 if (n_candidates == 1)
3321 i = 0;
3322 else
3323 {
06d5cf63
JB
3324 i = ada_resolve_function
3325 (candidates, n_candidates,
3326 argvec, nargs,
3327 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
3328 context_type);
4c4b4cd2 3329 if (i < 0)
323e0a4a 3330 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3331 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3332 }
3333
3334 exp->elts[pc + 4].block = candidates[i].block;
3335 exp->elts[pc + 5].symbol = candidates[i].sym;
1265e4aa
JB
3336 if (innermost_block == NULL
3337 || contained_in (candidates[i].block, innermost_block))
4c4b4cd2
PH
3338 innermost_block = candidates[i].block;
3339 }
14f9c5c9
AS
3340 }
3341 break;
3342 case BINOP_ADD:
3343 case BINOP_SUB:
3344 case BINOP_MUL:
3345 case BINOP_DIV:
3346 case BINOP_REM:
3347 case BINOP_MOD:
3348 case BINOP_CONCAT:
3349 case BINOP_BITWISE_AND:
3350 case BINOP_BITWISE_IOR:
3351 case BINOP_BITWISE_XOR:
3352 case BINOP_EQUAL:
3353 case BINOP_NOTEQUAL:
3354 case BINOP_LESS:
3355 case BINOP_GTR:
3356 case BINOP_LEQ:
3357 case BINOP_GEQ:
3358 case BINOP_EXP:
3359 case UNOP_NEG:
3360 case UNOP_PLUS:
3361 case UNOP_LOGICAL_NOT:
3362 case UNOP_ABS:
3363 if (possible_user_operator_p (op, argvec))
4c4b4cd2
PH
3364 {
3365 struct ada_symbol_info *candidates;
3366 int n_candidates;
3367
3368 n_candidates =
3369 ada_lookup_symbol_list (ada_encode (ada_decoded_op_name (op)),
3370 (struct block *) NULL, VAR_DOMAIN,
4eeaa230 3371 &candidates);
4c4b4cd2 3372 i = ada_resolve_function (candidates, n_candidates, argvec, nargs,
76a01679 3373 ada_decoded_op_name (op), NULL);
4c4b4cd2
PH
3374 if (i < 0)
3375 break;
3376
76a01679
JB
3377 replace_operator_with_call (expp, pc, nargs, 1,
3378 candidates[i].sym, candidates[i].block);
4c4b4cd2
PH
3379 exp = *expp;
3380 }
14f9c5c9 3381 break;
4c4b4cd2
PH
3382
3383 case OP_TYPE:
b3dbf008 3384 case OP_REGISTER:
4c4b4cd2 3385 return NULL;
14f9c5c9
AS
3386 }
3387
3388 *pos = pc;
3389 return evaluate_subexp_type (exp, pos);
3390}
3391
3392/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3393 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3394 a non-pointer. */
14f9c5c9 3395/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3396 liberal. */
14f9c5c9
AS
3397
3398static int
4dc81987 3399ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3400{
61ee279c
PH
3401 ftype = ada_check_typedef (ftype);
3402 atype = ada_check_typedef (atype);
14f9c5c9
AS
3403
3404 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3405 ftype = TYPE_TARGET_TYPE (ftype);
3406 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3407 atype = TYPE_TARGET_TYPE (atype);
3408
d2e4a39e 3409 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3410 {
3411 default:
5b3d5b7d 3412 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3413 case TYPE_CODE_PTR:
3414 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3415 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3416 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3417 else
1265e4aa
JB
3418 return (may_deref
3419 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3420 case TYPE_CODE_INT:
3421 case TYPE_CODE_ENUM:
3422 case TYPE_CODE_RANGE:
3423 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3424 {
3425 case TYPE_CODE_INT:
3426 case TYPE_CODE_ENUM:
3427 case TYPE_CODE_RANGE:
3428 return 1;
3429 default:
3430 return 0;
3431 }
14f9c5c9
AS
3432
3433 case TYPE_CODE_ARRAY:
d2e4a39e 3434 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3435 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3436
3437 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3438 if (ada_is_array_descriptor_type (ftype))
3439 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3440 || ada_is_array_descriptor_type (atype));
14f9c5c9 3441 else
4c4b4cd2
PH
3442 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3443 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3444
3445 case TYPE_CODE_UNION:
3446 case TYPE_CODE_FLT:
3447 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3448 }
3449}
3450
3451/* Return non-zero if the formals of FUNC "sufficiently match" the
3452 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3453 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3454 argument function. */
14f9c5c9
AS
3455
3456static int
d2e4a39e 3457ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3458{
3459 int i;
d2e4a39e 3460 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3461
1265e4aa
JB
3462 if (SYMBOL_CLASS (func) == LOC_CONST
3463 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3464 return (n_actuals == 0);
3465 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3466 return 0;
3467
3468 if (TYPE_NFIELDS (func_type) != n_actuals)
3469 return 0;
3470
3471 for (i = 0; i < n_actuals; i += 1)
3472 {
4c4b4cd2 3473 if (actuals[i] == NULL)
76a01679
JB
3474 return 0;
3475 else
3476 {
5b4ee69b
MS
3477 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3478 i));
df407dfe 3479 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3480
76a01679
JB
3481 if (!ada_type_match (ftype, atype, 1))
3482 return 0;
3483 }
14f9c5c9
AS
3484 }
3485 return 1;
3486}
3487
3488/* False iff function type FUNC_TYPE definitely does not produce a value
3489 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3490 FUNC_TYPE is not a valid function type with a non-null return type
3491 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3492
3493static int
d2e4a39e 3494return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3495{
d2e4a39e 3496 struct type *return_type;
14f9c5c9
AS
3497
3498 if (func_type == NULL)
3499 return 1;
3500
4c4b4cd2 3501 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3502 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3503 else
18af8284 3504 return_type = get_base_type (func_type);
14f9c5c9
AS
3505 if (return_type == NULL)
3506 return 1;
3507
18af8284 3508 context_type = get_base_type (context_type);
14f9c5c9
AS
3509
3510 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3511 return context_type == NULL || return_type == context_type;
3512 else if (context_type == NULL)
3513 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3514 else
3515 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3516}
3517
3518
4c4b4cd2 3519/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3520 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3521 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3522 that returns that type, then eliminate matches that don't. If
3523 CONTEXT_TYPE is void and there is at least one match that does not
3524 return void, eliminate all matches that do.
3525
14f9c5c9
AS
3526 Asks the user if there is more than one match remaining. Returns -1
3527 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3528 solely for messages. May re-arrange and modify SYMS in
3529 the process; the index returned is for the modified vector. */
14f9c5c9 3530
4c4b4cd2
PH
3531static int
3532ada_resolve_function (struct ada_symbol_info syms[],
3533 int nsyms, struct value **args, int nargs,
3534 const char *name, struct type *context_type)
14f9c5c9 3535{
30b15541 3536 int fallback;
14f9c5c9 3537 int k;
4c4b4cd2 3538 int m; /* Number of hits */
14f9c5c9 3539
d2e4a39e 3540 m = 0;
30b15541
UW
3541 /* In the first pass of the loop, we only accept functions matching
3542 context_type. If none are found, we add a second pass of the loop
3543 where every function is accepted. */
3544 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3545 {
3546 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3547 {
61ee279c 3548 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].sym));
4c4b4cd2
PH
3549
3550 if (ada_args_match (syms[k].sym, args, nargs)
30b15541 3551 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3552 {
3553 syms[m] = syms[k];
3554 m += 1;
3555 }
3556 }
14f9c5c9
AS
3557 }
3558
3559 if (m == 0)
3560 return -1;
3561 else if (m > 1)
3562 {
323e0a4a 3563 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3564 user_select_syms (syms, m, 1);
14f9c5c9
AS
3565 return 0;
3566 }
3567 return 0;
3568}
3569
4c4b4cd2
PH
3570/* Returns true (non-zero) iff decoded name N0 should appear before N1
3571 in a listing of choices during disambiguation (see sort_choices, below).
3572 The idea is that overloadings of a subprogram name from the
3573 same package should sort in their source order. We settle for ordering
3574 such symbols by their trailing number (__N or $N). */
3575
14f9c5c9 3576static int
0d5cff50 3577encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3578{
3579 if (N1 == NULL)
3580 return 0;
3581 else if (N0 == NULL)
3582 return 1;
3583 else
3584 {
3585 int k0, k1;
5b4ee69b 3586
d2e4a39e 3587 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3588 ;
d2e4a39e 3589 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3590 ;
d2e4a39e 3591 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3592 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3593 {
3594 int n0, n1;
5b4ee69b 3595
4c4b4cd2
PH
3596 n0 = k0;
3597 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3598 n0 -= 1;
3599 n1 = k1;
3600 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3601 n1 -= 1;
3602 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3603 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3604 }
14f9c5c9
AS
3605 return (strcmp (N0, N1) < 0);
3606 }
3607}
d2e4a39e 3608
4c4b4cd2
PH
3609/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3610 encoded names. */
3611
d2e4a39e 3612static void
4c4b4cd2 3613sort_choices (struct ada_symbol_info syms[], int nsyms)
14f9c5c9 3614{
4c4b4cd2 3615 int i;
5b4ee69b 3616
d2e4a39e 3617 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3618 {
4c4b4cd2 3619 struct ada_symbol_info sym = syms[i];
14f9c5c9
AS
3620 int j;
3621
d2e4a39e 3622 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2
PH
3623 {
3624 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].sym),
3625 SYMBOL_LINKAGE_NAME (sym.sym)))
3626 break;
3627 syms[j + 1] = syms[j];
3628 }
d2e4a39e 3629 syms[j + 1] = sym;
14f9c5c9
AS
3630 }
3631}
3632
4c4b4cd2
PH
3633/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3634 by asking the user (if necessary), returning the number selected,
3635 and setting the first elements of SYMS items. Error if no symbols
3636 selected. */
14f9c5c9
AS
3637
3638/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3639 to be re-integrated one of these days. */
14f9c5c9
AS
3640
3641int
4c4b4cd2 3642user_select_syms (struct ada_symbol_info *syms, int nsyms, int max_results)
14f9c5c9
AS
3643{
3644 int i;
d2e4a39e 3645 int *chosen = (int *) alloca (sizeof (int) * nsyms);
14f9c5c9
AS
3646 int n_chosen;
3647 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3648 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3649
3650 if (max_results < 1)
323e0a4a 3651 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3652 if (nsyms <= 1)
3653 return nsyms;
3654
717d2f5a
JB
3655 if (select_mode == multiple_symbols_cancel)
3656 error (_("\
3657canceled because the command is ambiguous\n\
3658See set/show multiple-symbol."));
3659
3660 /* If select_mode is "all", then return all possible symbols.
3661 Only do that if more than one symbol can be selected, of course.
3662 Otherwise, display the menu as usual. */
3663 if (select_mode == multiple_symbols_all && max_results > 1)
3664 return nsyms;
3665
323e0a4a 3666 printf_unfiltered (_("[0] cancel\n"));
14f9c5c9 3667 if (max_results > 1)
323e0a4a 3668 printf_unfiltered (_("[1] all\n"));
14f9c5c9 3669
4c4b4cd2 3670 sort_choices (syms, nsyms);
14f9c5c9
AS
3671
3672 for (i = 0; i < nsyms; i += 1)
3673 {
4c4b4cd2
PH
3674 if (syms[i].sym == NULL)
3675 continue;
3676
3677 if (SYMBOL_CLASS (syms[i].sym) == LOC_BLOCK)
3678 {
76a01679
JB
3679 struct symtab_and_line sal =
3680 find_function_start_sal (syms[i].sym, 1);
5b4ee69b 3681
323e0a4a
AC
3682 if (sal.symtab == NULL)
3683 printf_unfiltered (_("[%d] %s at <no source file available>:%d\n"),
3684 i + first_choice,
3685 SYMBOL_PRINT_NAME (syms[i].sym),
3686 sal.line);
3687 else
3688 printf_unfiltered (_("[%d] %s at %s:%d\n"), i + first_choice,
3689 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3690 symtab_to_filename_for_display (sal.symtab),
3691 sal.line);
4c4b4cd2
PH
3692 continue;
3693 }
d2e4a39e 3694 else
4c4b4cd2
PH
3695 {
3696 int is_enumeral =
3697 (SYMBOL_CLASS (syms[i].sym) == LOC_CONST
3698 && SYMBOL_TYPE (syms[i].sym) != NULL
3699 && TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) == TYPE_CODE_ENUM);
210bbc17 3700 struct symtab *symtab = SYMBOL_SYMTAB (syms[i].sym);
4c4b4cd2
PH
3701
3702 if (SYMBOL_LINE (syms[i].sym) != 0 && symtab != NULL)
323e0a4a 3703 printf_unfiltered (_("[%d] %s at %s:%d\n"),
4c4b4cd2
PH
3704 i + first_choice,
3705 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3706 symtab_to_filename_for_display (symtab),
3707 SYMBOL_LINE (syms[i].sym));
76a01679
JB
3708 else if (is_enumeral
3709 && TYPE_NAME (SYMBOL_TYPE (syms[i].sym)) != NULL)
4c4b4cd2 3710 {
a3f17187 3711 printf_unfiltered (("[%d] "), i + first_choice);
76a01679 3712 ada_print_type (SYMBOL_TYPE (syms[i].sym), NULL,
79d43c61 3713 gdb_stdout, -1, 0, &type_print_raw_options);
323e0a4a 3714 printf_unfiltered (_("'(%s) (enumeral)\n"),
4c4b4cd2
PH
3715 SYMBOL_PRINT_NAME (syms[i].sym));
3716 }
3717 else if (symtab != NULL)
3718 printf_unfiltered (is_enumeral
323e0a4a
AC
3719 ? _("[%d] %s in %s (enumeral)\n")
3720 : _("[%d] %s at %s:?\n"),
4c4b4cd2
PH
3721 i + first_choice,
3722 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821 3723 symtab_to_filename_for_display (symtab));
4c4b4cd2
PH
3724 else
3725 printf_unfiltered (is_enumeral
323e0a4a
AC
3726 ? _("[%d] %s (enumeral)\n")
3727 : _("[%d] %s at ?\n"),
4c4b4cd2
PH
3728 i + first_choice,
3729 SYMBOL_PRINT_NAME (syms[i].sym));
3730 }
14f9c5c9 3731 }
d2e4a39e 3732
14f9c5c9 3733 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3734 "overload-choice");
14f9c5c9
AS
3735
3736 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3737 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3738
3739 return n_chosen;
3740}
3741
3742/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3743 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3744 order in CHOICES[0 .. N-1], and return N.
3745
3746 The user types choices as a sequence of numbers on one line
3747 separated by blanks, encoding them as follows:
3748
4c4b4cd2 3749 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3750 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3751 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3752
4c4b4cd2 3753 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3754
3755 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3756 prompts (for use with the -f switch). */
14f9c5c9
AS
3757
3758int
d2e4a39e 3759get_selections (int *choices, int n_choices, int max_results,
4c4b4cd2 3760 int is_all_choice, char *annotation_suffix)
14f9c5c9 3761{
d2e4a39e 3762 char *args;
0bcd0149 3763 char *prompt;
14f9c5c9
AS
3764 int n_chosen;
3765 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3766
14f9c5c9
AS
3767 prompt = getenv ("PS2");
3768 if (prompt == NULL)
0bcd0149 3769 prompt = "> ";
14f9c5c9 3770
0bcd0149 3771 args = command_line_input (prompt, 0, annotation_suffix);
d2e4a39e 3772
14f9c5c9 3773 if (args == NULL)
323e0a4a 3774 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3775
3776 n_chosen = 0;
76a01679 3777
4c4b4cd2
PH
3778 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3779 order, as given in args. Choices are validated. */
14f9c5c9
AS
3780 while (1)
3781 {
d2e4a39e 3782 char *args2;
14f9c5c9
AS
3783 int choice, j;
3784
0fcd72ba 3785 args = skip_spaces (args);
14f9c5c9 3786 if (*args == '\0' && n_chosen == 0)
323e0a4a 3787 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3788 else if (*args == '\0')
4c4b4cd2 3789 break;
14f9c5c9
AS
3790
3791 choice = strtol (args, &args2, 10);
d2e4a39e 3792 if (args == args2 || choice < 0
4c4b4cd2 3793 || choice > n_choices + first_choice - 1)
323e0a4a 3794 error (_("Argument must be choice number"));
14f9c5c9
AS
3795 args = args2;
3796
d2e4a39e 3797 if (choice == 0)
323e0a4a 3798 error (_("cancelled"));
14f9c5c9
AS
3799
3800 if (choice < first_choice)
4c4b4cd2
PH
3801 {
3802 n_chosen = n_choices;
3803 for (j = 0; j < n_choices; j += 1)
3804 choices[j] = j;
3805 break;
3806 }
14f9c5c9
AS
3807 choice -= first_choice;
3808
d2e4a39e 3809 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
3810 {
3811 }
14f9c5c9
AS
3812
3813 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
3814 {
3815 int k;
5b4ee69b 3816
4c4b4cd2
PH
3817 for (k = n_chosen - 1; k > j; k -= 1)
3818 choices[k + 1] = choices[k];
3819 choices[j + 1] = choice;
3820 n_chosen += 1;
3821 }
14f9c5c9
AS
3822 }
3823
3824 if (n_chosen > max_results)
323e0a4a 3825 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 3826
14f9c5c9
AS
3827 return n_chosen;
3828}
3829
4c4b4cd2
PH
3830/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3831 on the function identified by SYM and BLOCK, and taking NARGS
3832 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3833
3834static void
d2e4a39e 3835replace_operator_with_call (struct expression **expp, int pc, int nargs,
4c4b4cd2 3836 int oplen, struct symbol *sym,
270140bd 3837 const struct block *block)
14f9c5c9
AS
3838{
3839 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 3840 symbol, -oplen for operator being replaced). */
d2e4a39e 3841 struct expression *newexp = (struct expression *)
8c1a34e7 3842 xzalloc (sizeof (struct expression)
4c4b4cd2 3843 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
d2e4a39e 3844 struct expression *exp = *expp;
14f9c5c9
AS
3845
3846 newexp->nelts = exp->nelts + 7 - oplen;
3847 newexp->language_defn = exp->language_defn;
3489610d 3848 newexp->gdbarch = exp->gdbarch;
14f9c5c9 3849 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 3850 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 3851 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
3852
3853 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
3854 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
3855
3856 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
3857 newexp->elts[pc + 4].block = block;
3858 newexp->elts[pc + 5].symbol = sym;
3859
3860 *expp = newexp;
aacb1f0a 3861 xfree (exp);
d2e4a39e 3862}
14f9c5c9
AS
3863
3864/* Type-class predicates */
3865
4c4b4cd2
PH
3866/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
3867 or FLOAT). */
14f9c5c9
AS
3868
3869static int
d2e4a39e 3870numeric_type_p (struct type *type)
14f9c5c9
AS
3871{
3872 if (type == NULL)
3873 return 0;
d2e4a39e
AS
3874 else
3875 {
3876 switch (TYPE_CODE (type))
4c4b4cd2
PH
3877 {
3878 case TYPE_CODE_INT:
3879 case TYPE_CODE_FLT:
3880 return 1;
3881 case TYPE_CODE_RANGE:
3882 return (type == TYPE_TARGET_TYPE (type)
3883 || numeric_type_p (TYPE_TARGET_TYPE (type)));
3884 default:
3885 return 0;
3886 }
d2e4a39e 3887 }
14f9c5c9
AS
3888}
3889
4c4b4cd2 3890/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
3891
3892static int
d2e4a39e 3893integer_type_p (struct type *type)
14f9c5c9
AS
3894{
3895 if (type == NULL)
3896 return 0;
d2e4a39e
AS
3897 else
3898 {
3899 switch (TYPE_CODE (type))
4c4b4cd2
PH
3900 {
3901 case TYPE_CODE_INT:
3902 return 1;
3903 case TYPE_CODE_RANGE:
3904 return (type == TYPE_TARGET_TYPE (type)
3905 || integer_type_p (TYPE_TARGET_TYPE (type)));
3906 default:
3907 return 0;
3908 }
d2e4a39e 3909 }
14f9c5c9
AS
3910}
3911
4c4b4cd2 3912/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
3913
3914static int
d2e4a39e 3915scalar_type_p (struct type *type)
14f9c5c9
AS
3916{
3917 if (type == NULL)
3918 return 0;
d2e4a39e
AS
3919 else
3920 {
3921 switch (TYPE_CODE (type))
4c4b4cd2
PH
3922 {
3923 case TYPE_CODE_INT:
3924 case TYPE_CODE_RANGE:
3925 case TYPE_CODE_ENUM:
3926 case TYPE_CODE_FLT:
3927 return 1;
3928 default:
3929 return 0;
3930 }
d2e4a39e 3931 }
14f9c5c9
AS
3932}
3933
4c4b4cd2 3934/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
3935
3936static int
d2e4a39e 3937discrete_type_p (struct type *type)
14f9c5c9
AS
3938{
3939 if (type == NULL)
3940 return 0;
d2e4a39e
AS
3941 else
3942 {
3943 switch (TYPE_CODE (type))
4c4b4cd2
PH
3944 {
3945 case TYPE_CODE_INT:
3946 case TYPE_CODE_RANGE:
3947 case TYPE_CODE_ENUM:
872f0337 3948 case TYPE_CODE_BOOL:
4c4b4cd2
PH
3949 return 1;
3950 default:
3951 return 0;
3952 }
d2e4a39e 3953 }
14f9c5c9
AS
3954}
3955
4c4b4cd2
PH
3956/* Returns non-zero if OP with operands in the vector ARGS could be
3957 a user-defined function. Errs on the side of pre-defined operators
3958 (i.e., result 0). */
14f9c5c9
AS
3959
3960static int
d2e4a39e 3961possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 3962{
76a01679 3963 struct type *type0 =
df407dfe 3964 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 3965 struct type *type1 =
df407dfe 3966 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 3967
4c4b4cd2
PH
3968 if (type0 == NULL)
3969 return 0;
3970
14f9c5c9
AS
3971 switch (op)
3972 {
3973 default:
3974 return 0;
3975
3976 case BINOP_ADD:
3977 case BINOP_SUB:
3978 case BINOP_MUL:
3979 case BINOP_DIV:
d2e4a39e 3980 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
3981
3982 case BINOP_REM:
3983 case BINOP_MOD:
3984 case BINOP_BITWISE_AND:
3985 case BINOP_BITWISE_IOR:
3986 case BINOP_BITWISE_XOR:
d2e4a39e 3987 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
3988
3989 case BINOP_EQUAL:
3990 case BINOP_NOTEQUAL:
3991 case BINOP_LESS:
3992 case BINOP_GTR:
3993 case BINOP_LEQ:
3994 case BINOP_GEQ:
d2e4a39e 3995 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
3996
3997 case BINOP_CONCAT:
ee90b9ab 3998 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
3999
4000 case BINOP_EXP:
d2e4a39e 4001 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4002
4003 case UNOP_NEG:
4004 case UNOP_PLUS:
4005 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4006 case UNOP_ABS:
4007 return (!numeric_type_p (type0));
14f9c5c9
AS
4008
4009 }
4010}
4011\f
4c4b4cd2 4012 /* Renaming */
14f9c5c9 4013
aeb5907d
JB
4014/* NOTES:
4015
4016 1. In the following, we assume that a renaming type's name may
4017 have an ___XD suffix. It would be nice if this went away at some
4018 point.
4019 2. We handle both the (old) purely type-based representation of
4020 renamings and the (new) variable-based encoding. At some point,
4021 it is devoutly to be hoped that the former goes away
4022 (FIXME: hilfinger-2007-07-09).
4023 3. Subprogram renamings are not implemented, although the XRS
4024 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4025
4026/* If SYM encodes a renaming,
4027
4028 <renaming> renames <renamed entity>,
4029
4030 sets *LEN to the length of the renamed entity's name,
4031 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4032 the string describing the subcomponent selected from the renamed
0963b4bd 4033 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4034 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4035 are undefined). Otherwise, returns a value indicating the category
4036 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4037 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4038 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4039 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4040 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4041 may be NULL, in which case they are not assigned.
4042
4043 [Currently, however, GCC does not generate subprogram renamings.] */
4044
4045enum ada_renaming_category
4046ada_parse_renaming (struct symbol *sym,
4047 const char **renamed_entity, int *len,
4048 const char **renaming_expr)
4049{
4050 enum ada_renaming_category kind;
4051 const char *info;
4052 const char *suffix;
4053
4054 if (sym == NULL)
4055 return ADA_NOT_RENAMING;
4056 switch (SYMBOL_CLASS (sym))
14f9c5c9 4057 {
aeb5907d
JB
4058 default:
4059 return ADA_NOT_RENAMING;
4060 case LOC_TYPEDEF:
4061 return parse_old_style_renaming (SYMBOL_TYPE (sym),
4062 renamed_entity, len, renaming_expr);
4063 case LOC_LOCAL:
4064 case LOC_STATIC:
4065 case LOC_COMPUTED:
4066 case LOC_OPTIMIZED_OUT:
4067 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4068 if (info == NULL)
4069 return ADA_NOT_RENAMING;
4070 switch (info[5])
4071 {
4072 case '_':
4073 kind = ADA_OBJECT_RENAMING;
4074 info += 6;
4075 break;
4076 case 'E':
4077 kind = ADA_EXCEPTION_RENAMING;
4078 info += 7;
4079 break;
4080 case 'P':
4081 kind = ADA_PACKAGE_RENAMING;
4082 info += 7;
4083 break;
4084 case 'S':
4085 kind = ADA_SUBPROGRAM_RENAMING;
4086 info += 7;
4087 break;
4088 default:
4089 return ADA_NOT_RENAMING;
4090 }
14f9c5c9 4091 }
4c4b4cd2 4092
aeb5907d
JB
4093 if (renamed_entity != NULL)
4094 *renamed_entity = info;
4095 suffix = strstr (info, "___XE");
4096 if (suffix == NULL || suffix == info)
4097 return ADA_NOT_RENAMING;
4098 if (len != NULL)
4099 *len = strlen (info) - strlen (suffix);
4100 suffix += 5;
4101 if (renaming_expr != NULL)
4102 *renaming_expr = suffix;
4103 return kind;
4104}
4105
4106/* Assuming TYPE encodes a renaming according to the old encoding in
4107 exp_dbug.ads, returns details of that renaming in *RENAMED_ENTITY,
4108 *LEN, and *RENAMING_EXPR, as for ada_parse_renaming, above. Returns
4109 ADA_NOT_RENAMING otherwise. */
4110static enum ada_renaming_category
4111parse_old_style_renaming (struct type *type,
4112 const char **renamed_entity, int *len,
4113 const char **renaming_expr)
4114{
4115 enum ada_renaming_category kind;
4116 const char *name;
4117 const char *info;
4118 const char *suffix;
14f9c5c9 4119
aeb5907d
JB
4120 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
4121 || TYPE_NFIELDS (type) != 1)
4122 return ADA_NOT_RENAMING;
14f9c5c9 4123
aeb5907d
JB
4124 name = type_name_no_tag (type);
4125 if (name == NULL)
4126 return ADA_NOT_RENAMING;
4127
4128 name = strstr (name, "___XR");
4129 if (name == NULL)
4130 return ADA_NOT_RENAMING;
4131 switch (name[5])
4132 {
4133 case '\0':
4134 case '_':
4135 kind = ADA_OBJECT_RENAMING;
4136 break;
4137 case 'E':
4138 kind = ADA_EXCEPTION_RENAMING;
4139 break;
4140 case 'P':
4141 kind = ADA_PACKAGE_RENAMING;
4142 break;
4143 case 'S':
4144 kind = ADA_SUBPROGRAM_RENAMING;
4145 break;
4146 default:
4147 return ADA_NOT_RENAMING;
4148 }
14f9c5c9 4149
aeb5907d
JB
4150 info = TYPE_FIELD_NAME (type, 0);
4151 if (info == NULL)
4152 return ADA_NOT_RENAMING;
4153 if (renamed_entity != NULL)
4154 *renamed_entity = info;
4155 suffix = strstr (info, "___XE");
4156 if (renaming_expr != NULL)
4157 *renaming_expr = suffix + 5;
4158 if (suffix == NULL || suffix == info)
4159 return ADA_NOT_RENAMING;
4160 if (len != NULL)
4161 *len = suffix - info;
4162 return kind;
a5ee536b
JB
4163}
4164
4165/* Compute the value of the given RENAMING_SYM, which is expected to
4166 be a symbol encoding a renaming expression. BLOCK is the block
4167 used to evaluate the renaming. */
52ce6436 4168
a5ee536b
JB
4169static struct value *
4170ada_read_renaming_var_value (struct symbol *renaming_sym,
4171 struct block *block)
4172{
bbc13ae3 4173 const char *sym_name;
a5ee536b
JB
4174 struct expression *expr;
4175 struct value *value;
4176 struct cleanup *old_chain = NULL;
4177
bbc13ae3 4178 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
1bb9788d 4179 expr = parse_exp_1 (&sym_name, 0, block, 0);
bbc13ae3 4180 old_chain = make_cleanup (free_current_contents, &expr);
a5ee536b
JB
4181 value = evaluate_expression (expr);
4182
4183 do_cleanups (old_chain);
4184 return value;
4185}
14f9c5c9 4186\f
d2e4a39e 4187
4c4b4cd2 4188 /* Evaluation: Function Calls */
14f9c5c9 4189
4c4b4cd2 4190/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4191 lvalues, and otherwise has the side-effect of allocating memory
4192 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4193
d2e4a39e 4194static struct value *
40bc484c 4195ensure_lval (struct value *val)
14f9c5c9 4196{
40bc484c
JB
4197 if (VALUE_LVAL (val) == not_lval
4198 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4199 {
df407dfe 4200 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4201 const CORE_ADDR addr =
4202 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4203
40bc484c 4204 set_value_address (val, addr);
a84a8a0d 4205 VALUE_LVAL (val) = lval_memory;
40bc484c 4206 write_memory (addr, value_contents (val), len);
c3e5cd34 4207 }
14f9c5c9
AS
4208
4209 return val;
4210}
4211
4212/* Return the value ACTUAL, converted to be an appropriate value for a
4213 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4214 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4215 values not residing in memory, updating it as needed. */
14f9c5c9 4216
a93c0eb6 4217struct value *
40bc484c 4218ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4219{
df407dfe 4220 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4221 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4222 struct type *formal_target =
4223 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4224 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4225 struct type *actual_target =
4226 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4227 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4228
4c4b4cd2 4229 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4230 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4231 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4232 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4233 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4234 {
a84a8a0d 4235 struct value *result;
5b4ee69b 4236
14f9c5c9 4237 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4238 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4239 result = desc_data (actual);
14f9c5c9 4240 else if (TYPE_CODE (actual_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4241 {
4242 if (VALUE_LVAL (actual) != lval_memory)
4243 {
4244 struct value *val;
5b4ee69b 4245
df407dfe 4246 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4247 val = allocate_value (actual_type);
990a07ab 4248 memcpy ((char *) value_contents_raw (val),
0fd88904 4249 (char *) value_contents (actual),
4c4b4cd2 4250 TYPE_LENGTH (actual_type));
40bc484c 4251 actual = ensure_lval (val);
4c4b4cd2 4252 }
a84a8a0d 4253 result = value_addr (actual);
4c4b4cd2 4254 }
a84a8a0d
JB
4255 else
4256 return actual;
b1af9e97 4257 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4258 }
4259 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4260 return ada_value_ind (actual);
4261
4262 return actual;
4263}
4264
438c98a1
JB
4265/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4266 type TYPE. This is usually an inefficient no-op except on some targets
4267 (such as AVR) where the representation of a pointer and an address
4268 differs. */
4269
4270static CORE_ADDR
4271value_pointer (struct value *value, struct type *type)
4272{
4273 struct gdbarch *gdbarch = get_type_arch (type);
4274 unsigned len = TYPE_LENGTH (type);
4275 gdb_byte *buf = alloca (len);
4276 CORE_ADDR addr;
4277
4278 addr = value_address (value);
4279 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4280 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4281 return addr;
4282}
4283
14f9c5c9 4284
4c4b4cd2
PH
4285/* Push a descriptor of type TYPE for array value ARR on the stack at
4286 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4287 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4288 to-descriptor type rather than a descriptor type), a struct value *
4289 representing a pointer to this descriptor. */
14f9c5c9 4290
d2e4a39e 4291static struct value *
40bc484c 4292make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4293{
d2e4a39e
AS
4294 struct type *bounds_type = desc_bounds_type (type);
4295 struct type *desc_type = desc_base_type (type);
4296 struct value *descriptor = allocate_value (desc_type);
4297 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4298 int i;
d2e4a39e 4299
0963b4bd
MS
4300 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4301 i > 0; i -= 1)
14f9c5c9 4302 {
19f220c3
JK
4303 modify_field (value_type (bounds), value_contents_writeable (bounds),
4304 ada_array_bound (arr, i, 0),
4305 desc_bound_bitpos (bounds_type, i, 0),
4306 desc_bound_bitsize (bounds_type, i, 0));
4307 modify_field (value_type (bounds), value_contents_writeable (bounds),
4308 ada_array_bound (arr, i, 1),
4309 desc_bound_bitpos (bounds_type, i, 1),
4310 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4311 }
d2e4a39e 4312
40bc484c 4313 bounds = ensure_lval (bounds);
d2e4a39e 4314
19f220c3
JK
4315 modify_field (value_type (descriptor),
4316 value_contents_writeable (descriptor),
4317 value_pointer (ensure_lval (arr),
4318 TYPE_FIELD_TYPE (desc_type, 0)),
4319 fat_pntr_data_bitpos (desc_type),
4320 fat_pntr_data_bitsize (desc_type));
4321
4322 modify_field (value_type (descriptor),
4323 value_contents_writeable (descriptor),
4324 value_pointer (bounds,
4325 TYPE_FIELD_TYPE (desc_type, 1)),
4326 fat_pntr_bounds_bitpos (desc_type),
4327 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4328
40bc484c 4329 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4330
4331 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4332 return value_addr (descriptor);
4333 else
4334 return descriptor;
4335}
14f9c5c9 4336\f
3d9434b5
JB
4337 /* Symbol Cache Module */
4338
3d9434b5 4339/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4340 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4341 on the type of entity being printed, the cache can make it as much
4342 as an order of magnitude faster than without it.
4343
4344 The descriptive type DWARF extension has significantly reduced
4345 the need for this cache, at least when DWARF is being used. However,
4346 even in this case, some expensive name-based symbol searches are still
4347 sometimes necessary - to find an XVZ variable, mostly. */
4348
ee01b665 4349/* Initialize the contents of SYM_CACHE. */
3d9434b5 4350
ee01b665
JB
4351static void
4352ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4353{
4354 obstack_init (&sym_cache->cache_space);
4355 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4356}
3d9434b5 4357
ee01b665
JB
4358/* Free the memory used by SYM_CACHE. */
4359
4360static void
4361ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4362{
ee01b665
JB
4363 obstack_free (&sym_cache->cache_space, NULL);
4364 xfree (sym_cache);
4365}
3d9434b5 4366
ee01b665
JB
4367/* Return the symbol cache associated to the given program space PSPACE.
4368 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4369
ee01b665
JB
4370static struct ada_symbol_cache *
4371ada_get_symbol_cache (struct program_space *pspace)
4372{
4373 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
4374 struct ada_symbol_cache *sym_cache = pspace_data->sym_cache;
4375
4376 if (sym_cache == NULL)
4377 {
4378 sym_cache = XCNEW (struct ada_symbol_cache);
4379 ada_init_symbol_cache (sym_cache);
4380 }
4381
4382 return sym_cache;
4383}
3d9434b5
JB
4384
4385/* Clear all entries from the symbol cache. */
4386
4387static void
4388ada_clear_symbol_cache (void)
4389{
ee01b665
JB
4390 struct ada_symbol_cache *sym_cache
4391 = ada_get_symbol_cache (current_program_space);
4392
4393 obstack_free (&sym_cache->cache_space, NULL);
4394 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4395}
4396
4397/* Search our cache for an entry matching NAME and NAMESPACE.
4398 Return it if found, or NULL otherwise. */
4399
4400static struct cache_entry **
4401find_entry (const char *name, domain_enum namespace)
4402{
ee01b665
JB
4403 struct ada_symbol_cache *sym_cache
4404 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4405 int h = msymbol_hash (name) % HASH_SIZE;
4406 struct cache_entry **e;
4407
ee01b665 4408 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5
JB
4409 {
4410 if (namespace == (*e)->namespace && strcmp (name, (*e)->name) == 0)
4411 return e;
4412 }
4413 return NULL;
4414}
4415
4416/* Search the symbol cache for an entry matching NAME and NAMESPACE.
4417 Return 1 if found, 0 otherwise.
4418
4419 If an entry was found and SYM is not NULL, set *SYM to the entry's
4420 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4421
96d887e8
PH
4422static int
4423lookup_cached_symbol (const char *name, domain_enum namespace,
f0c5f9b2 4424 struct symbol **sym, const struct block **block)
96d887e8 4425{
3d9434b5
JB
4426 struct cache_entry **e = find_entry (name, namespace);
4427
4428 if (e == NULL)
4429 return 0;
4430 if (sym != NULL)
4431 *sym = (*e)->sym;
4432 if (block != NULL)
4433 *block = (*e)->block;
4434 return 1;
96d887e8
PH
4435}
4436
3d9434b5
JB
4437/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
4438 in domain NAMESPACE, save this result in our symbol cache. */
4439
96d887e8
PH
4440static void
4441cache_symbol (const char *name, domain_enum namespace, struct symbol *sym,
270140bd 4442 const struct block *block)
96d887e8 4443{
ee01b665
JB
4444 struct ada_symbol_cache *sym_cache
4445 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4446 int h;
4447 char *copy;
4448 struct cache_entry *e;
4449
4450 /* If the symbol is a local symbol, then do not cache it, as a search
4451 for that symbol depends on the context. To determine whether
4452 the symbol is local or not, we check the block where we found it
4453 against the global and static blocks of its associated symtab. */
4454 if (sym
4455 && BLOCKVECTOR_BLOCK (BLOCKVECTOR (sym->symtab), GLOBAL_BLOCK) != block
4456 && BLOCKVECTOR_BLOCK (BLOCKVECTOR (sym->symtab), STATIC_BLOCK) != block)
4457 return;
4458
4459 h = msymbol_hash (name) % HASH_SIZE;
ee01b665
JB
4460 e = (struct cache_entry *) obstack_alloc (&sym_cache->cache_space,
4461 sizeof (*e));
4462 e->next = sym_cache->root[h];
4463 sym_cache->root[h] = e;
4464 e->name = copy = obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4465 strcpy (copy, name);
4466 e->sym = sym;
4467 e->namespace = namespace;
4468 e->block = block;
96d887e8 4469}
4c4b4cd2
PH
4470\f
4471 /* Symbol Lookup */
4472
c0431670
JB
4473/* Return nonzero if wild matching should be used when searching for
4474 all symbols matching LOOKUP_NAME.
4475
4476 LOOKUP_NAME is expected to be a symbol name after transformation
4477 for Ada lookups (see ada_name_for_lookup). */
4478
4479static int
4480should_use_wild_match (const char *lookup_name)
4481{
4482 return (strstr (lookup_name, "__") == NULL);
4483}
4484
4c4b4cd2
PH
4485/* Return the result of a standard (literal, C-like) lookup of NAME in
4486 given DOMAIN, visible from lexical block BLOCK. */
4487
4488static struct symbol *
4489standard_lookup (const char *name, const struct block *block,
4490 domain_enum domain)
4491{
acbd605d
MGD
4492 /* Initialize it just to avoid a GCC false warning. */
4493 struct symbol *sym = NULL;
4c4b4cd2 4494
2570f2b7 4495 if (lookup_cached_symbol (name, domain, &sym, NULL))
4c4b4cd2 4496 return sym;
2570f2b7
UW
4497 sym = lookup_symbol_in_language (name, block, domain, language_c, 0);
4498 cache_symbol (name, domain, sym, block_found);
4c4b4cd2
PH
4499 return sym;
4500}
4501
4502
4503/* Non-zero iff there is at least one non-function/non-enumeral symbol
4504 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4505 since they contend in overloading in the same way. */
4506static int
4507is_nonfunction (struct ada_symbol_info syms[], int n)
4508{
4509 int i;
4510
4511 for (i = 0; i < n; i += 1)
4512 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_FUNC
4513 && (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM
4514 || SYMBOL_CLASS (syms[i].sym) != LOC_CONST))
14f9c5c9
AS
4515 return 1;
4516
4517 return 0;
4518}
4519
4520/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4521 struct types. Otherwise, they may not. */
14f9c5c9
AS
4522
4523static int
d2e4a39e 4524equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4525{
d2e4a39e 4526 if (type0 == type1)
14f9c5c9 4527 return 1;
d2e4a39e 4528 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4529 || TYPE_CODE (type0) != TYPE_CODE (type1))
4530 return 0;
d2e4a39e 4531 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4532 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4533 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4534 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4535 return 1;
d2e4a39e 4536
14f9c5c9
AS
4537 return 0;
4538}
4539
4540/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4541 no more defined than that of SYM1. */
14f9c5c9
AS
4542
4543static int
d2e4a39e 4544lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4545{
4546 if (sym0 == sym1)
4547 return 1;
176620f1 4548 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4549 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4550 return 0;
4551
d2e4a39e 4552 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4553 {
4554 case LOC_UNDEF:
4555 return 1;
4556 case LOC_TYPEDEF:
4557 {
4c4b4cd2
PH
4558 struct type *type0 = SYMBOL_TYPE (sym0);
4559 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4560 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4561 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4562 int len0 = strlen (name0);
5b4ee69b 4563
4c4b4cd2
PH
4564 return
4565 TYPE_CODE (type0) == TYPE_CODE (type1)
4566 && (equiv_types (type0, type1)
4567 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
4568 && strncmp (name1 + len0, "___XV", 5) == 0));
14f9c5c9
AS
4569 }
4570 case LOC_CONST:
4571 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4572 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4573 default:
4574 return 0;
14f9c5c9
AS
4575 }
4576}
4577
4c4b4cd2
PH
4578/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct ada_symbol_info
4579 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4580
4581static void
76a01679
JB
4582add_defn_to_vec (struct obstack *obstackp,
4583 struct symbol *sym,
f0c5f9b2 4584 const struct block *block)
14f9c5c9
AS
4585{
4586 int i;
4c4b4cd2 4587 struct ada_symbol_info *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4588
529cad9c
PH
4589 /* Do not try to complete stub types, as the debugger is probably
4590 already scanning all symbols matching a certain name at the
4591 time when this function is called. Trying to replace the stub
4592 type by its associated full type will cause us to restart a scan
4593 which may lead to an infinite recursion. Instead, the client
4594 collecting the matching symbols will end up collecting several
4595 matches, with at least one of them complete. It can then filter
4596 out the stub ones if needed. */
4597
4c4b4cd2
PH
4598 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4599 {
4600 if (lesseq_defined_than (sym, prevDefns[i].sym))
4601 return;
4602 else if (lesseq_defined_than (prevDefns[i].sym, sym))
4603 {
4604 prevDefns[i].sym = sym;
4605 prevDefns[i].block = block;
4c4b4cd2 4606 return;
76a01679 4607 }
4c4b4cd2
PH
4608 }
4609
4610 {
4611 struct ada_symbol_info info;
4612
4613 info.sym = sym;
4614 info.block = block;
4c4b4cd2
PH
4615 obstack_grow (obstackp, &info, sizeof (struct ada_symbol_info));
4616 }
4617}
4618
4619/* Number of ada_symbol_info structures currently collected in
4620 current vector in *OBSTACKP. */
4621
76a01679
JB
4622static int
4623num_defns_collected (struct obstack *obstackp)
4c4b4cd2
PH
4624{
4625 return obstack_object_size (obstackp) / sizeof (struct ada_symbol_info);
4626}
4627
4628/* Vector of ada_symbol_info structures currently collected in current
4629 vector in *OBSTACKP. If FINISH, close off the vector and return
4630 its final address. */
4631
76a01679 4632static struct ada_symbol_info *
4c4b4cd2
PH
4633defns_collected (struct obstack *obstackp, int finish)
4634{
4635 if (finish)
4636 return obstack_finish (obstackp);
4637 else
4638 return (struct ada_symbol_info *) obstack_base (obstackp);
4639}
4640
7c7b6655
TT
4641/* Return a bound minimal symbol matching NAME according to Ada
4642 decoding rules. Returns an invalid symbol if there is no such
4643 minimal symbol. Names prefixed with "standard__" are handled
4644 specially: "standard__" is first stripped off, and only static and
4645 global symbols are searched. */
4c4b4cd2 4646
7c7b6655 4647struct bound_minimal_symbol
96d887e8 4648ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4649{
7c7b6655 4650 struct bound_minimal_symbol result;
4c4b4cd2 4651 struct objfile *objfile;
96d887e8 4652 struct minimal_symbol *msymbol;
dc4024cd 4653 const int wild_match_p = should_use_wild_match (name);
4c4b4cd2 4654
7c7b6655
TT
4655 memset (&result, 0, sizeof (result));
4656
c0431670
JB
4657 /* Special case: If the user specifies a symbol name inside package
4658 Standard, do a non-wild matching of the symbol name without
4659 the "standard__" prefix. This was primarily introduced in order
4660 to allow the user to specifically access the standard exceptions
4661 using, for instance, Standard.Constraint_Error when Constraint_Error
4662 is ambiguous (due to the user defining its own Constraint_Error
4663 entity inside its program). */
96d887e8 4664 if (strncmp (name, "standard__", sizeof ("standard__") - 1) == 0)
c0431670 4665 name += sizeof ("standard__") - 1;
4c4b4cd2 4666
96d887e8
PH
4667 ALL_MSYMBOLS (objfile, msymbol)
4668 {
efd66ac6 4669 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), name, wild_match_p)
96d887e8 4670 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
7c7b6655
TT
4671 {
4672 result.minsym = msymbol;
4673 result.objfile = objfile;
4674 break;
4675 }
96d887e8 4676 }
4c4b4cd2 4677
7c7b6655 4678 return result;
96d887e8 4679}
4c4b4cd2 4680
96d887e8
PH
4681/* For all subprograms that statically enclose the subprogram of the
4682 selected frame, add symbols matching identifier NAME in DOMAIN
4683 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4684 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4685 with a wildcard prefix. */
4c4b4cd2 4686
96d887e8
PH
4687static void
4688add_symbols_from_enclosing_procs (struct obstack *obstackp,
76a01679 4689 const char *name, domain_enum namespace,
48b78332 4690 int wild_match_p)
96d887e8 4691{
96d887e8 4692}
14f9c5c9 4693
96d887e8
PH
4694/* True if TYPE is definitely an artificial type supplied to a symbol
4695 for which no debugging information was given in the symbol file. */
14f9c5c9 4696
96d887e8
PH
4697static int
4698is_nondebugging_type (struct type *type)
4699{
0d5cff50 4700 const char *name = ada_type_name (type);
5b4ee69b 4701
96d887e8
PH
4702 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4703}
4c4b4cd2 4704
8f17729f
JB
4705/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4706 that are deemed "identical" for practical purposes.
4707
4708 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4709 types and that their number of enumerals is identical (in other
4710 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4711
4712static int
4713ada_identical_enum_types_p (struct type *type1, struct type *type2)
4714{
4715 int i;
4716
4717 /* The heuristic we use here is fairly conservative. We consider
4718 that 2 enumerate types are identical if they have the same
4719 number of enumerals and that all enumerals have the same
4720 underlying value and name. */
4721
4722 /* All enums in the type should have an identical underlying value. */
4723 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4724 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4725 return 0;
4726
4727 /* All enumerals should also have the same name (modulo any numerical
4728 suffix). */
4729 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4730 {
0d5cff50
DE
4731 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4732 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4733 int len_1 = strlen (name_1);
4734 int len_2 = strlen (name_2);
4735
4736 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4737 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4738 if (len_1 != len_2
4739 || strncmp (TYPE_FIELD_NAME (type1, i),
4740 TYPE_FIELD_NAME (type2, i),
4741 len_1) != 0)
4742 return 0;
4743 }
4744
4745 return 1;
4746}
4747
4748/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4749 that are deemed "identical" for practical purposes. Sometimes,
4750 enumerals are not strictly identical, but their types are so similar
4751 that they can be considered identical.
4752
4753 For instance, consider the following code:
4754
4755 type Color is (Black, Red, Green, Blue, White);
4756 type RGB_Color is new Color range Red .. Blue;
4757
4758 Type RGB_Color is a subrange of an implicit type which is a copy
4759 of type Color. If we call that implicit type RGB_ColorB ("B" is
4760 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4761 As a result, when an expression references any of the enumeral
4762 by name (Eg. "print green"), the expression is technically
4763 ambiguous and the user should be asked to disambiguate. But
4764 doing so would only hinder the user, since it wouldn't matter
4765 what choice he makes, the outcome would always be the same.
4766 So, for practical purposes, we consider them as the same. */
4767
4768static int
4769symbols_are_identical_enums (struct ada_symbol_info *syms, int nsyms)
4770{
4771 int i;
4772
4773 /* Before performing a thorough comparison check of each type,
4774 we perform a series of inexpensive checks. We expect that these
4775 checks will quickly fail in the vast majority of cases, and thus
4776 help prevent the unnecessary use of a more expensive comparison.
4777 Said comparison also expects us to make some of these checks
4778 (see ada_identical_enum_types_p). */
4779
4780 /* Quick check: All symbols should have an enum type. */
4781 for (i = 0; i < nsyms; i++)
4782 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM)
4783 return 0;
4784
4785 /* Quick check: They should all have the same value. */
4786 for (i = 1; i < nsyms; i++)
4787 if (SYMBOL_VALUE (syms[i].sym) != SYMBOL_VALUE (syms[0].sym))
4788 return 0;
4789
4790 /* Quick check: They should all have the same number of enumerals. */
4791 for (i = 1; i < nsyms; i++)
4792 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].sym))
4793 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].sym)))
4794 return 0;
4795
4796 /* All the sanity checks passed, so we might have a set of
4797 identical enumeration types. Perform a more complete
4798 comparison of the type of each symbol. */
4799 for (i = 1; i < nsyms; i++)
4800 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].sym),
4801 SYMBOL_TYPE (syms[0].sym)))
4802 return 0;
4803
4804 return 1;
4805}
4806
96d887e8
PH
4807/* Remove any non-debugging symbols in SYMS[0 .. NSYMS-1] that definitely
4808 duplicate other symbols in the list (The only case I know of where
4809 this happens is when object files containing stabs-in-ecoff are
4810 linked with files containing ordinary ecoff debugging symbols (or no
4811 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
4812 Returns the number of items in the modified list. */
4c4b4cd2 4813
96d887e8
PH
4814static int
4815remove_extra_symbols (struct ada_symbol_info *syms, int nsyms)
4816{
4817 int i, j;
4c4b4cd2 4818
8f17729f
JB
4819 /* We should never be called with less than 2 symbols, as there
4820 cannot be any extra symbol in that case. But it's easy to
4821 handle, since we have nothing to do in that case. */
4822 if (nsyms < 2)
4823 return nsyms;
4824
96d887e8
PH
4825 i = 0;
4826 while (i < nsyms)
4827 {
a35ddb44 4828 int remove_p = 0;
339c13b6
JB
4829
4830 /* If two symbols have the same name and one of them is a stub type,
4831 the get rid of the stub. */
4832
4833 if (TYPE_STUB (SYMBOL_TYPE (syms[i].sym))
4834 && SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL)
4835 {
4836 for (j = 0; j < nsyms; j++)
4837 {
4838 if (j != i
4839 && !TYPE_STUB (SYMBOL_TYPE (syms[j].sym))
4840 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4841 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
4842 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0)
a35ddb44 4843 remove_p = 1;
339c13b6
JB
4844 }
4845 }
4846
4847 /* Two symbols with the same name, same class and same address
4848 should be identical. */
4849
4850 else if (SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL
96d887e8
PH
4851 && SYMBOL_CLASS (syms[i].sym) == LOC_STATIC
4852 && is_nondebugging_type (SYMBOL_TYPE (syms[i].sym)))
4853 {
4854 for (j = 0; j < nsyms; j += 1)
4855 {
4856 if (i != j
4857 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4858 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
76a01679 4859 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0
96d887e8
PH
4860 && SYMBOL_CLASS (syms[i].sym) == SYMBOL_CLASS (syms[j].sym)
4861 && SYMBOL_VALUE_ADDRESS (syms[i].sym)
4862 == SYMBOL_VALUE_ADDRESS (syms[j].sym))
a35ddb44 4863 remove_p = 1;
4c4b4cd2 4864 }
4c4b4cd2 4865 }
339c13b6 4866
a35ddb44 4867 if (remove_p)
339c13b6
JB
4868 {
4869 for (j = i + 1; j < nsyms; j += 1)
4870 syms[j - 1] = syms[j];
4871 nsyms -= 1;
4872 }
4873
96d887e8 4874 i += 1;
14f9c5c9 4875 }
8f17729f
JB
4876
4877 /* If all the remaining symbols are identical enumerals, then
4878 just keep the first one and discard the rest.
4879
4880 Unlike what we did previously, we do not discard any entry
4881 unless they are ALL identical. This is because the symbol
4882 comparison is not a strict comparison, but rather a practical
4883 comparison. If all symbols are considered identical, then
4884 we can just go ahead and use the first one and discard the rest.
4885 But if we cannot reduce the list to a single element, we have
4886 to ask the user to disambiguate anyways. And if we have to
4887 present a multiple-choice menu, it's less confusing if the list
4888 isn't missing some choices that were identical and yet distinct. */
4889 if (symbols_are_identical_enums (syms, nsyms))
4890 nsyms = 1;
4891
96d887e8 4892 return nsyms;
14f9c5c9
AS
4893}
4894
96d887e8
PH
4895/* Given a type that corresponds to a renaming entity, use the type name
4896 to extract the scope (package name or function name, fully qualified,
4897 and following the GNAT encoding convention) where this renaming has been
4898 defined. The string returned needs to be deallocated after use. */
4c4b4cd2 4899
96d887e8
PH
4900static char *
4901xget_renaming_scope (struct type *renaming_type)
14f9c5c9 4902{
96d887e8 4903 /* The renaming types adhere to the following convention:
0963b4bd 4904 <scope>__<rename>___<XR extension>.
96d887e8
PH
4905 So, to extract the scope, we search for the "___XR" extension,
4906 and then backtrack until we find the first "__". */
76a01679 4907
96d887e8
PH
4908 const char *name = type_name_no_tag (renaming_type);
4909 char *suffix = strstr (name, "___XR");
4910 char *last;
4911 int scope_len;
4912 char *scope;
14f9c5c9 4913
96d887e8
PH
4914 /* Now, backtrack a bit until we find the first "__". Start looking
4915 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 4916
96d887e8
PH
4917 for (last = suffix - 3; last > name; last--)
4918 if (last[0] == '_' && last[1] == '_')
4919 break;
76a01679 4920
96d887e8 4921 /* Make a copy of scope and return it. */
14f9c5c9 4922
96d887e8
PH
4923 scope_len = last - name;
4924 scope = (char *) xmalloc ((scope_len + 1) * sizeof (char));
14f9c5c9 4925
96d887e8
PH
4926 strncpy (scope, name, scope_len);
4927 scope[scope_len] = '\0';
4c4b4cd2 4928
96d887e8 4929 return scope;
4c4b4cd2
PH
4930}
4931
96d887e8 4932/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 4933
96d887e8
PH
4934static int
4935is_package_name (const char *name)
4c4b4cd2 4936{
96d887e8
PH
4937 /* Here, We take advantage of the fact that no symbols are generated
4938 for packages, while symbols are generated for each function.
4939 So the condition for NAME represent a package becomes equivalent
4940 to NAME not existing in our list of symbols. There is only one
4941 small complication with library-level functions (see below). */
4c4b4cd2 4942
96d887e8 4943 char *fun_name;
76a01679 4944
96d887e8
PH
4945 /* If it is a function that has not been defined at library level,
4946 then we should be able to look it up in the symbols. */
4947 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
4948 return 0;
14f9c5c9 4949
96d887e8
PH
4950 /* Library-level function names start with "_ada_". See if function
4951 "_ada_" followed by NAME can be found. */
14f9c5c9 4952
96d887e8 4953 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 4954 functions names cannot contain "__" in them. */
96d887e8
PH
4955 if (strstr (name, "__") != NULL)
4956 return 0;
4c4b4cd2 4957
b435e160 4958 fun_name = xstrprintf ("_ada_%s", name);
14f9c5c9 4959
96d887e8
PH
4960 return (standard_lookup (fun_name, NULL, VAR_DOMAIN) == NULL);
4961}
14f9c5c9 4962
96d887e8 4963/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 4964 not visible from FUNCTION_NAME. */
14f9c5c9 4965
96d887e8 4966static int
0d5cff50 4967old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 4968{
aeb5907d 4969 char *scope;
1509e573 4970 struct cleanup *old_chain;
aeb5907d
JB
4971
4972 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
4973 return 0;
4974
4975 scope = xget_renaming_scope (SYMBOL_TYPE (sym));
1509e573 4976 old_chain = make_cleanup (xfree, scope);
14f9c5c9 4977
96d887e8
PH
4978 /* If the rename has been defined in a package, then it is visible. */
4979 if (is_package_name (scope))
1509e573
JB
4980 {
4981 do_cleanups (old_chain);
4982 return 0;
4983 }
14f9c5c9 4984
96d887e8
PH
4985 /* Check that the rename is in the current function scope by checking
4986 that its name starts with SCOPE. */
76a01679 4987
96d887e8
PH
4988 /* If the function name starts with "_ada_", it means that it is
4989 a library-level function. Strip this prefix before doing the
4990 comparison, as the encoding for the renaming does not contain
4991 this prefix. */
4992 if (strncmp (function_name, "_ada_", 5) == 0)
4993 function_name += 5;
f26caa11 4994
1509e573
JB
4995 {
4996 int is_invisible = strncmp (function_name, scope, strlen (scope)) != 0;
4997
4998 do_cleanups (old_chain);
4999 return is_invisible;
5000 }
f26caa11
PH
5001}
5002
aeb5907d
JB
5003/* Remove entries from SYMS that corresponds to a renaming entity that
5004 is not visible from the function associated with CURRENT_BLOCK or
5005 that is superfluous due to the presence of more specific renaming
5006 information. Places surviving symbols in the initial entries of
5007 SYMS and returns the number of surviving symbols.
96d887e8
PH
5008
5009 Rationale:
aeb5907d
JB
5010 First, in cases where an object renaming is implemented as a
5011 reference variable, GNAT may produce both the actual reference
5012 variable and the renaming encoding. In this case, we discard the
5013 latter.
5014
5015 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5016 entity. Unfortunately, STABS currently does not support the definition
5017 of types that are local to a given lexical block, so all renamings types
5018 are emitted at library level. As a consequence, if an application
5019 contains two renaming entities using the same name, and a user tries to
5020 print the value of one of these entities, the result of the ada symbol
5021 lookup will also contain the wrong renaming type.
f26caa11 5022
96d887e8
PH
5023 This function partially covers for this limitation by attempting to
5024 remove from the SYMS list renaming symbols that should be visible
5025 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5026 method with the current information available. The implementation
5027 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5028
5029 - When the user tries to print a rename in a function while there
5030 is another rename entity defined in a package: Normally, the
5031 rename in the function has precedence over the rename in the
5032 package, so the latter should be removed from the list. This is
5033 currently not the case.
5034
5035 - This function will incorrectly remove valid renames if
5036 the CURRENT_BLOCK corresponds to a function which symbol name
5037 has been changed by an "Export" pragma. As a consequence,
5038 the user will be unable to print such rename entities. */
4c4b4cd2 5039
14f9c5c9 5040static int
aeb5907d
JB
5041remove_irrelevant_renamings (struct ada_symbol_info *syms,
5042 int nsyms, const struct block *current_block)
4c4b4cd2
PH
5043{
5044 struct symbol *current_function;
0d5cff50 5045 const char *current_function_name;
4c4b4cd2 5046 int i;
aeb5907d
JB
5047 int is_new_style_renaming;
5048
5049 /* If there is both a renaming foo___XR... encoded as a variable and
5050 a simple variable foo in the same block, discard the latter.
0963b4bd 5051 First, zero out such symbols, then compress. */
aeb5907d
JB
5052 is_new_style_renaming = 0;
5053 for (i = 0; i < nsyms; i += 1)
5054 {
5055 struct symbol *sym = syms[i].sym;
270140bd 5056 const struct block *block = syms[i].block;
aeb5907d
JB
5057 const char *name;
5058 const char *suffix;
5059
5060 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5061 continue;
5062 name = SYMBOL_LINKAGE_NAME (sym);
5063 suffix = strstr (name, "___XR");
5064
5065 if (suffix != NULL)
5066 {
5067 int name_len = suffix - name;
5068 int j;
5b4ee69b 5069
aeb5907d
JB
5070 is_new_style_renaming = 1;
5071 for (j = 0; j < nsyms; j += 1)
5072 if (i != j && syms[j].sym != NULL
5073 && strncmp (name, SYMBOL_LINKAGE_NAME (syms[j].sym),
5074 name_len) == 0
5075 && block == syms[j].block)
5076 syms[j].sym = NULL;
5077 }
5078 }
5079 if (is_new_style_renaming)
5080 {
5081 int j, k;
5082
5083 for (j = k = 0; j < nsyms; j += 1)
5084 if (syms[j].sym != NULL)
5085 {
5086 syms[k] = syms[j];
5087 k += 1;
5088 }
5089 return k;
5090 }
4c4b4cd2
PH
5091
5092 /* Extract the function name associated to CURRENT_BLOCK.
5093 Abort if unable to do so. */
76a01679 5094
4c4b4cd2
PH
5095 if (current_block == NULL)
5096 return nsyms;
76a01679 5097
7f0df278 5098 current_function = block_linkage_function (current_block);
4c4b4cd2
PH
5099 if (current_function == NULL)
5100 return nsyms;
5101
5102 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5103 if (current_function_name == NULL)
5104 return nsyms;
5105
5106 /* Check each of the symbols, and remove it from the list if it is
5107 a type corresponding to a renaming that is out of the scope of
5108 the current block. */
5109
5110 i = 0;
5111 while (i < nsyms)
5112 {
aeb5907d
JB
5113 if (ada_parse_renaming (syms[i].sym, NULL, NULL, NULL)
5114 == ADA_OBJECT_RENAMING
5115 && old_renaming_is_invisible (syms[i].sym, current_function_name))
4c4b4cd2
PH
5116 {
5117 int j;
5b4ee69b 5118
aeb5907d 5119 for (j = i + 1; j < nsyms; j += 1)
76a01679 5120 syms[j - 1] = syms[j];
4c4b4cd2
PH
5121 nsyms -= 1;
5122 }
5123 else
5124 i += 1;
5125 }
5126
5127 return nsyms;
5128}
5129
339c13b6
JB
5130/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5131 whose name and domain match NAME and DOMAIN respectively.
5132 If no match was found, then extend the search to "enclosing"
5133 routines (in other words, if we're inside a nested function,
5134 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5135 If WILD_MATCH_P is nonzero, perform the naming matching in
5136 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5137
5138 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5139
5140static void
5141ada_add_local_symbols (struct obstack *obstackp, const char *name,
f0c5f9b2 5142 const struct block *block, domain_enum domain,
d0a8ab18 5143 int wild_match_p)
339c13b6
JB
5144{
5145 int block_depth = 0;
5146
5147 while (block != NULL)
5148 {
5149 block_depth += 1;
d0a8ab18
JB
5150 ada_add_block_symbols (obstackp, block, name, domain, NULL,
5151 wild_match_p);
339c13b6
JB
5152
5153 /* If we found a non-function match, assume that's the one. */
5154 if (is_nonfunction (defns_collected (obstackp, 0),
5155 num_defns_collected (obstackp)))
5156 return;
5157
5158 block = BLOCK_SUPERBLOCK (block);
5159 }
5160
5161 /* If no luck so far, try to find NAME as a local symbol in some lexically
5162 enclosing subprogram. */
5163 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
d0a8ab18 5164 add_symbols_from_enclosing_procs (obstackp, name, domain, wild_match_p);
339c13b6
JB
5165}
5166
ccefe4c4 5167/* An object of this type is used as the user_data argument when
40658b94 5168 calling the map_matching_symbols method. */
ccefe4c4 5169
40658b94 5170struct match_data
ccefe4c4 5171{
40658b94 5172 struct objfile *objfile;
ccefe4c4 5173 struct obstack *obstackp;
40658b94
PH
5174 struct symbol *arg_sym;
5175 int found_sym;
ccefe4c4
TT
5176};
5177
40658b94
PH
5178/* A callback for add_matching_symbols that adds SYM, found in BLOCK,
5179 to a list of symbols. DATA0 is a pointer to a struct match_data *
5180 containing the obstack that collects the symbol list, the file that SYM
5181 must come from, a flag indicating whether a non-argument symbol has
5182 been found in the current block, and the last argument symbol
5183 passed in SYM within the current block (if any). When SYM is null,
5184 marking the end of a block, the argument symbol is added if no
5185 other has been found. */
ccefe4c4 5186
40658b94
PH
5187static int
5188aux_add_nonlocal_symbols (struct block *block, struct symbol *sym, void *data0)
ccefe4c4 5189{
40658b94
PH
5190 struct match_data *data = (struct match_data *) data0;
5191
5192 if (sym == NULL)
5193 {
5194 if (!data->found_sym && data->arg_sym != NULL)
5195 add_defn_to_vec (data->obstackp,
5196 fixup_symbol_section (data->arg_sym, data->objfile),
5197 block);
5198 data->found_sym = 0;
5199 data->arg_sym = NULL;
5200 }
5201 else
5202 {
5203 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5204 return 0;
5205 else if (SYMBOL_IS_ARGUMENT (sym))
5206 data->arg_sym = sym;
5207 else
5208 {
5209 data->found_sym = 1;
5210 add_defn_to_vec (data->obstackp,
5211 fixup_symbol_section (sym, data->objfile),
5212 block);
5213 }
5214 }
5215 return 0;
5216}
5217
db230ce3
JB
5218/* Implements compare_names, but only applying the comparision using
5219 the given CASING. */
5b4ee69b 5220
40658b94 5221static int
db230ce3
JB
5222compare_names_with_case (const char *string1, const char *string2,
5223 enum case_sensitivity casing)
40658b94
PH
5224{
5225 while (*string1 != '\0' && *string2 != '\0')
5226 {
db230ce3
JB
5227 char c1, c2;
5228
40658b94
PH
5229 if (isspace (*string1) || isspace (*string2))
5230 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5231
5232 if (casing == case_sensitive_off)
5233 {
5234 c1 = tolower (*string1);
5235 c2 = tolower (*string2);
5236 }
5237 else
5238 {
5239 c1 = *string1;
5240 c2 = *string2;
5241 }
5242 if (c1 != c2)
40658b94 5243 break;
db230ce3 5244
40658b94
PH
5245 string1 += 1;
5246 string2 += 1;
5247 }
db230ce3 5248
40658b94
PH
5249 switch (*string1)
5250 {
5251 case '(':
5252 return strcmp_iw_ordered (string1, string2);
5253 case '_':
5254 if (*string2 == '\0')
5255 {
052874e8 5256 if (is_name_suffix (string1))
40658b94
PH
5257 return 0;
5258 else
1a1d5513 5259 return 1;
40658b94 5260 }
dbb8534f 5261 /* FALLTHROUGH */
40658b94
PH
5262 default:
5263 if (*string2 == '(')
5264 return strcmp_iw_ordered (string1, string2);
5265 else
db230ce3
JB
5266 {
5267 if (casing == case_sensitive_off)
5268 return tolower (*string1) - tolower (*string2);
5269 else
5270 return *string1 - *string2;
5271 }
40658b94 5272 }
ccefe4c4
TT
5273}
5274
db230ce3
JB
5275/* Compare STRING1 to STRING2, with results as for strcmp.
5276 Compatible with strcmp_iw_ordered in that...
5277
5278 strcmp_iw_ordered (STRING1, STRING2) <= 0
5279
5280 ... implies...
5281
5282 compare_names (STRING1, STRING2) <= 0
5283
5284 (they may differ as to what symbols compare equal). */
5285
5286static int
5287compare_names (const char *string1, const char *string2)
5288{
5289 int result;
5290
5291 /* Similar to what strcmp_iw_ordered does, we need to perform
5292 a case-insensitive comparison first, and only resort to
5293 a second, case-sensitive, comparison if the first one was
5294 not sufficient to differentiate the two strings. */
5295
5296 result = compare_names_with_case (string1, string2, case_sensitive_off);
5297 if (result == 0)
5298 result = compare_names_with_case (string1, string2, case_sensitive_on);
5299
5300 return result;
5301}
5302
339c13b6
JB
5303/* Add to OBSTACKP all non-local symbols whose name and domain match
5304 NAME and DOMAIN respectively. The search is performed on GLOBAL_BLOCK
5305 symbols if GLOBAL is non-zero, or on STATIC_BLOCK symbols otherwise. */
5306
5307static void
40658b94
PH
5308add_nonlocal_symbols (struct obstack *obstackp, const char *name,
5309 domain_enum domain, int global,
5310 int is_wild_match)
339c13b6
JB
5311{
5312 struct objfile *objfile;
40658b94 5313 struct match_data data;
339c13b6 5314
6475f2fe 5315 memset (&data, 0, sizeof data);
ccefe4c4 5316 data.obstackp = obstackp;
339c13b6 5317
ccefe4c4 5318 ALL_OBJFILES (objfile)
40658b94
PH
5319 {
5320 data.objfile = objfile;
5321
5322 if (is_wild_match)
4186eb54
KS
5323 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5324 aux_add_nonlocal_symbols, &data,
5325 wild_match, NULL);
40658b94 5326 else
4186eb54
KS
5327 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5328 aux_add_nonlocal_symbols, &data,
5329 full_match, compare_names);
40658b94
PH
5330 }
5331
5332 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5333 {
5334 ALL_OBJFILES (objfile)
5335 {
5336 char *name1 = alloca (strlen (name) + sizeof ("_ada_"));
5337 strcpy (name1, "_ada_");
5338 strcpy (name1 + sizeof ("_ada_") - 1, name);
5339 data.objfile = objfile;
ade7ed9e
DE
5340 objfile->sf->qf->map_matching_symbols (objfile, name1, domain,
5341 global,
0963b4bd
MS
5342 aux_add_nonlocal_symbols,
5343 &data,
40658b94
PH
5344 full_match, compare_names);
5345 }
5346 }
339c13b6
JB
5347}
5348
4eeaa230
DE
5349/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and, if full_search is
5350 non-zero, enclosing scope and in global scopes, returning the number of
5351 matches.
9f88c959 5352 Sets *RESULTS to point to a vector of (SYM,BLOCK) tuples,
4c4b4cd2 5353 indicating the symbols found and the blocks and symbol tables (if
4eeaa230
DE
5354 any) in which they were found. This vector is transient---good only to
5355 the next call of ada_lookup_symbol_list.
5356
5357 When full_search is non-zero, any non-function/non-enumeral
4c4b4cd2
PH
5358 symbol match within the nest of blocks whose innermost member is BLOCK0,
5359 is the one match returned (no other matches in that or
d9680e73 5360 enclosing blocks is returned). If there are any matches in or
4eeaa230
DE
5361 surrounding BLOCK0, then these alone are returned.
5362
9f88c959 5363 Names prefixed with "standard__" are handled specially: "standard__"
4c4b4cd2 5364 is first stripped off, and only static and global symbols are searched. */
14f9c5c9 5365
4eeaa230
DE
5366static int
5367ada_lookup_symbol_list_worker (const char *name0, const struct block *block0,
5368 domain_enum namespace,
5369 struct ada_symbol_info **results,
5370 int full_search)
14f9c5c9
AS
5371{
5372 struct symbol *sym;
f0c5f9b2 5373 const struct block *block;
4c4b4cd2 5374 const char *name;
82ccd55e 5375 const int wild_match_p = should_use_wild_match (name0);
14f9c5c9 5376 int cacheIfUnique;
4c4b4cd2 5377 int ndefns;
14f9c5c9 5378
4c4b4cd2
PH
5379 obstack_free (&symbol_list_obstack, NULL);
5380 obstack_init (&symbol_list_obstack);
14f9c5c9 5381
14f9c5c9
AS
5382 cacheIfUnique = 0;
5383
5384 /* Search specified block and its superiors. */
5385
4c4b4cd2 5386 name = name0;
f0c5f9b2 5387 block = block0;
339c13b6
JB
5388
5389 /* Special case: If the user specifies a symbol name inside package
5390 Standard, do a non-wild matching of the symbol name without
5391 the "standard__" prefix. This was primarily introduced in order
5392 to allow the user to specifically access the standard exceptions
5393 using, for instance, Standard.Constraint_Error when Constraint_Error
5394 is ambiguous (due to the user defining its own Constraint_Error
5395 entity inside its program). */
4c4b4cd2
PH
5396 if (strncmp (name0, "standard__", sizeof ("standard__") - 1) == 0)
5397 {
4c4b4cd2
PH
5398 block = NULL;
5399 name = name0 + sizeof ("standard__") - 1;
5400 }
5401
339c13b6 5402 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5403
4eeaa230
DE
5404 if (block != NULL)
5405 {
5406 if (full_search)
5407 {
5408 ada_add_local_symbols (&symbol_list_obstack, name, block,
5409 namespace, wild_match_p);
5410 }
5411 else
5412 {
5413 /* In the !full_search case we're are being called by
5414 ada_iterate_over_symbols, and we don't want to search
5415 superblocks. */
5416 ada_add_block_symbols (&symbol_list_obstack, block, name,
5417 namespace, NULL, wild_match_p);
5418 }
5419 if (num_defns_collected (&symbol_list_obstack) > 0 || !full_search)
5420 goto done;
5421 }
d2e4a39e 5422
339c13b6
JB
5423 /* No non-global symbols found. Check our cache to see if we have
5424 already performed this search before. If we have, then return
5425 the same result. */
5426
14f9c5c9 5427 cacheIfUnique = 1;
2570f2b7 5428 if (lookup_cached_symbol (name0, namespace, &sym, &block))
4c4b4cd2
PH
5429 {
5430 if (sym != NULL)
2570f2b7 5431 add_defn_to_vec (&symbol_list_obstack, sym, block);
4c4b4cd2
PH
5432 goto done;
5433 }
14f9c5c9 5434
339c13b6
JB
5435 /* Search symbols from all global blocks. */
5436
40658b94 5437 add_nonlocal_symbols (&symbol_list_obstack, name, namespace, 1,
82ccd55e 5438 wild_match_p);
d2e4a39e 5439
4c4b4cd2 5440 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5441 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5442
4c4b4cd2 5443 if (num_defns_collected (&symbol_list_obstack) == 0)
40658b94 5444 add_nonlocal_symbols (&symbol_list_obstack, name, namespace, 0,
82ccd55e 5445 wild_match_p);
14f9c5c9 5446
4c4b4cd2
PH
5447done:
5448 ndefns = num_defns_collected (&symbol_list_obstack);
5449 *results = defns_collected (&symbol_list_obstack, 1);
5450
5451 ndefns = remove_extra_symbols (*results, ndefns);
5452
2ad01556 5453 if (ndefns == 0 && full_search)
2570f2b7 5454 cache_symbol (name0, namespace, NULL, NULL);
14f9c5c9 5455
2ad01556 5456 if (ndefns == 1 && full_search && cacheIfUnique)
2570f2b7 5457 cache_symbol (name0, namespace, (*results)[0].sym, (*results)[0].block);
14f9c5c9 5458
aeb5907d 5459 ndefns = remove_irrelevant_renamings (*results, ndefns, block0);
14f9c5c9 5460
14f9c5c9
AS
5461 return ndefns;
5462}
5463
4eeaa230
DE
5464/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and enclosing scope and
5465 in global scopes, returning the number of matches, and setting *RESULTS
5466 to a vector of (SYM,BLOCK) tuples.
5467 See ada_lookup_symbol_list_worker for further details. */
5468
5469int
5470ada_lookup_symbol_list (const char *name0, const struct block *block0,
5471 domain_enum domain, struct ada_symbol_info **results)
5472{
5473 return ada_lookup_symbol_list_worker (name0, block0, domain, results, 1);
5474}
5475
5476/* Implementation of the la_iterate_over_symbols method. */
5477
5478static void
5479ada_iterate_over_symbols (const struct block *block,
5480 const char *name, domain_enum domain,
5481 symbol_found_callback_ftype *callback,
5482 void *data)
5483{
5484 int ndefs, i;
5485 struct ada_symbol_info *results;
5486
5487 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
5488 for (i = 0; i < ndefs; ++i)
5489 {
5490 if (! (*callback) (results[i].sym, data))
5491 break;
5492 }
5493}
5494
f8eba3c6
TT
5495/* If NAME is the name of an entity, return a string that should
5496 be used to look that entity up in Ada units. This string should
5497 be deallocated after use using xfree.
5498
5499 NAME can have any form that the "break" or "print" commands might
5500 recognize. In other words, it does not have to be the "natural"
5501 name, or the "encoded" name. */
5502
5503char *
5504ada_name_for_lookup (const char *name)
5505{
5506 char *canon;
5507 int nlen = strlen (name);
5508
5509 if (name[0] == '<' && name[nlen - 1] == '>')
5510 {
5511 canon = xmalloc (nlen - 1);
5512 memcpy (canon, name + 1, nlen - 2);
5513 canon[nlen - 2] = '\0';
5514 }
5515 else
5516 canon = xstrdup (ada_encode (ada_fold_name (name)));
5517 return canon;
5518}
5519
4e5c77fe
JB
5520/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5521 to 1, but choosing the first symbol found if there are multiple
5522 choices.
5523
5e2336be
JB
5524 The result is stored in *INFO, which must be non-NULL.
5525 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5526
5527void
5528ada_lookup_encoded_symbol (const char *name, const struct block *block,
5529 domain_enum namespace,
5e2336be 5530 struct ada_symbol_info *info)
14f9c5c9 5531{
4c4b4cd2 5532 struct ada_symbol_info *candidates;
14f9c5c9
AS
5533 int n_candidates;
5534
5e2336be
JB
5535 gdb_assert (info != NULL);
5536 memset (info, 0, sizeof (struct ada_symbol_info));
4e5c77fe 5537
4eeaa230 5538 n_candidates = ada_lookup_symbol_list (name, block, namespace, &candidates);
14f9c5c9 5539 if (n_candidates == 0)
4e5c77fe 5540 return;
4c4b4cd2 5541
5e2336be
JB
5542 *info = candidates[0];
5543 info->sym = fixup_symbol_section (info->sym, NULL);
4e5c77fe 5544}
aeb5907d
JB
5545
5546/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5547 scope and in global scopes, or NULL if none. NAME is folded and
5548 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
0963b4bd 5549 choosing the first symbol if there are multiple choices.
4e5c77fe
JB
5550 If IS_A_FIELD_OF_THIS is not NULL, it is set to zero. */
5551
aeb5907d
JB
5552struct symbol *
5553ada_lookup_symbol (const char *name, const struct block *block0,
21b556f4 5554 domain_enum namespace, int *is_a_field_of_this)
aeb5907d 5555{
5e2336be 5556 struct ada_symbol_info info;
4e5c77fe 5557
aeb5907d
JB
5558 if (is_a_field_of_this != NULL)
5559 *is_a_field_of_this = 0;
5560
4e5c77fe 5561 ada_lookup_encoded_symbol (ada_encode (ada_fold_name (name)),
5e2336be
JB
5562 block0, namespace, &info);
5563 return info.sym;
4c4b4cd2 5564}
14f9c5c9 5565
4c4b4cd2
PH
5566static struct symbol *
5567ada_lookup_symbol_nonlocal (const char *name,
76a01679 5568 const struct block *block,
21b556f4 5569 const domain_enum domain)
4c4b4cd2 5570{
94af9270 5571 return ada_lookup_symbol (name, block_static_block (block), domain, NULL);
14f9c5c9
AS
5572}
5573
5574
4c4b4cd2
PH
5575/* True iff STR is a possible encoded suffix of a normal Ada name
5576 that is to be ignored for matching purposes. Suffixes of parallel
5577 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5578 are given by any of the regular expressions:
4c4b4cd2 5579
babe1480
JB
5580 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5581 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5582 TKB [subprogram suffix for task bodies]
babe1480 5583 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5584 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5585
5586 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5587 match is performed. This sequence is used to differentiate homonyms,
5588 is an optional part of a valid name suffix. */
4c4b4cd2 5589
14f9c5c9 5590static int
d2e4a39e 5591is_name_suffix (const char *str)
14f9c5c9
AS
5592{
5593 int k;
4c4b4cd2
PH
5594 const char *matching;
5595 const int len = strlen (str);
5596
babe1480
JB
5597 /* Skip optional leading __[0-9]+. */
5598
4c4b4cd2
PH
5599 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5600 {
babe1480
JB
5601 str += 3;
5602 while (isdigit (str[0]))
5603 str += 1;
4c4b4cd2 5604 }
babe1480
JB
5605
5606 /* [.$][0-9]+ */
4c4b4cd2 5607
babe1480 5608 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5609 {
babe1480 5610 matching = str + 1;
4c4b4cd2
PH
5611 while (isdigit (matching[0]))
5612 matching += 1;
5613 if (matching[0] == '\0')
5614 return 1;
5615 }
5616
5617 /* ___[0-9]+ */
babe1480 5618
4c4b4cd2
PH
5619 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5620 {
5621 matching = str + 3;
5622 while (isdigit (matching[0]))
5623 matching += 1;
5624 if (matching[0] == '\0')
5625 return 1;
5626 }
5627
9ac7f98e
JB
5628 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5629
5630 if (strcmp (str, "TKB") == 0)
5631 return 1;
5632
529cad9c
PH
5633#if 0
5634 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5635 with a N at the end. Unfortunately, the compiler uses the same
5636 convention for other internal types it creates. So treating
529cad9c 5637 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5638 some regressions. For instance, consider the case of an enumerated
5639 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5640 name ends with N.
5641 Having a single character like this as a suffix carrying some
0963b4bd 5642 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5643 to be something like "_N" instead. In the meantime, do not do
5644 the following check. */
5645 /* Protected Object Subprograms */
5646 if (len == 1 && str [0] == 'N')
5647 return 1;
5648#endif
5649
5650 /* _E[0-9]+[bs]$ */
5651 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5652 {
5653 matching = str + 3;
5654 while (isdigit (matching[0]))
5655 matching += 1;
5656 if ((matching[0] == 'b' || matching[0] == 's')
5657 && matching [1] == '\0')
5658 return 1;
5659 }
5660
4c4b4cd2
PH
5661 /* ??? We should not modify STR directly, as we are doing below. This
5662 is fine in this case, but may become problematic later if we find
5663 that this alternative did not work, and want to try matching
5664 another one from the begining of STR. Since we modified it, we
5665 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5666 if (str[0] == 'X')
5667 {
5668 str += 1;
d2e4a39e 5669 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5670 {
5671 if (str[0] != 'n' && str[0] != 'b')
5672 return 0;
5673 str += 1;
5674 }
14f9c5c9 5675 }
babe1480 5676
14f9c5c9
AS
5677 if (str[0] == '\000')
5678 return 1;
babe1480 5679
d2e4a39e 5680 if (str[0] == '_')
14f9c5c9
AS
5681 {
5682 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5683 return 0;
d2e4a39e 5684 if (str[2] == '_')
4c4b4cd2 5685 {
61ee279c
PH
5686 if (strcmp (str + 3, "JM") == 0)
5687 return 1;
5688 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5689 the LJM suffix in favor of the JM one. But we will
5690 still accept LJM as a valid suffix for a reasonable
5691 amount of time, just to allow ourselves to debug programs
5692 compiled using an older version of GNAT. */
4c4b4cd2
PH
5693 if (strcmp (str + 3, "LJM") == 0)
5694 return 1;
5695 if (str[3] != 'X')
5696 return 0;
1265e4aa
JB
5697 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5698 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5699 return 1;
5700 if (str[4] == 'R' && str[5] != 'T')
5701 return 1;
5702 return 0;
5703 }
5704 if (!isdigit (str[2]))
5705 return 0;
5706 for (k = 3; str[k] != '\0'; k += 1)
5707 if (!isdigit (str[k]) && str[k] != '_')
5708 return 0;
14f9c5c9
AS
5709 return 1;
5710 }
4c4b4cd2 5711 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5712 {
4c4b4cd2
PH
5713 for (k = 2; str[k] != '\0'; k += 1)
5714 if (!isdigit (str[k]) && str[k] != '_')
5715 return 0;
14f9c5c9
AS
5716 return 1;
5717 }
5718 return 0;
5719}
d2e4a39e 5720
aeb5907d
JB
5721/* Return non-zero if the string starting at NAME and ending before
5722 NAME_END contains no capital letters. */
529cad9c
PH
5723
5724static int
5725is_valid_name_for_wild_match (const char *name0)
5726{
5727 const char *decoded_name = ada_decode (name0);
5728 int i;
5729
5823c3ef
JB
5730 /* If the decoded name starts with an angle bracket, it means that
5731 NAME0 does not follow the GNAT encoding format. It should then
5732 not be allowed as a possible wild match. */
5733 if (decoded_name[0] == '<')
5734 return 0;
5735
529cad9c
PH
5736 for (i=0; decoded_name[i] != '\0'; i++)
5737 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5738 return 0;
5739
5740 return 1;
5741}
5742
73589123
PH
5743/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
5744 that could start a simple name. Assumes that *NAMEP points into
5745 the string beginning at NAME0. */
4c4b4cd2 5746
14f9c5c9 5747static int
73589123 5748advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 5749{
73589123 5750 const char *name = *namep;
5b4ee69b 5751
5823c3ef 5752 while (1)
14f9c5c9 5753 {
aa27d0b3 5754 int t0, t1;
73589123
PH
5755
5756 t0 = *name;
5757 if (t0 == '_')
5758 {
5759 t1 = name[1];
5760 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
5761 {
5762 name += 1;
5763 if (name == name0 + 5 && strncmp (name0, "_ada", 4) == 0)
5764 break;
5765 else
5766 name += 1;
5767 }
aa27d0b3
JB
5768 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
5769 || name[2] == target0))
73589123
PH
5770 {
5771 name += 2;
5772 break;
5773 }
5774 else
5775 return 0;
5776 }
5777 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
5778 name += 1;
5779 else
5823c3ef 5780 return 0;
73589123
PH
5781 }
5782
5783 *namep = name;
5784 return 1;
5785}
5786
5787/* Return 0 iff NAME encodes a name of the form prefix.PATN. Ignores any
5788 informational suffixes of NAME (i.e., for which is_name_suffix is
5789 true). Assumes that PATN is a lower-cased Ada simple name. */
5790
5791static int
5792wild_match (const char *name, const char *patn)
5793{
22e048c9 5794 const char *p;
73589123
PH
5795 const char *name0 = name;
5796
5797 while (1)
5798 {
5799 const char *match = name;
5800
5801 if (*name == *patn)
5802 {
5803 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
5804 if (*p != *name)
5805 break;
5806 if (*p == '\0' && is_name_suffix (name))
5807 return match != name0 && !is_valid_name_for_wild_match (name0);
5808
5809 if (name[-1] == '_')
5810 name -= 1;
5811 }
5812 if (!advance_wild_match (&name, name0, *patn))
5813 return 1;
96d887e8 5814 }
96d887e8
PH
5815}
5816
40658b94
PH
5817/* Returns 0 iff symbol name SYM_NAME matches SEARCH_NAME, apart from
5818 informational suffix. */
5819
c4d840bd
PH
5820static int
5821full_match (const char *sym_name, const char *search_name)
5822{
40658b94 5823 return !match_name (sym_name, search_name, 0);
c4d840bd
PH
5824}
5825
5826
96d887e8
PH
5827/* Add symbols from BLOCK matching identifier NAME in DOMAIN to
5828 vector *defn_symbols, updating the list of symbols in OBSTACKP
0963b4bd 5829 (if necessary). If WILD, treat as NAME with a wildcard prefix.
4eeaa230 5830 OBJFILE is the section containing BLOCK. */
96d887e8
PH
5831
5832static void
5833ada_add_block_symbols (struct obstack *obstackp,
f0c5f9b2 5834 const struct block *block, const char *name,
96d887e8 5835 domain_enum domain, struct objfile *objfile,
2570f2b7 5836 int wild)
96d887e8 5837{
8157b174 5838 struct block_iterator iter;
96d887e8
PH
5839 int name_len = strlen (name);
5840 /* A matching argument symbol, if any. */
5841 struct symbol *arg_sym;
5842 /* Set true when we find a matching non-argument symbol. */
5843 int found_sym;
5844 struct symbol *sym;
5845
5846 arg_sym = NULL;
5847 found_sym = 0;
5848 if (wild)
5849 {
8157b174
TT
5850 for (sym = block_iter_match_first (block, name, wild_match, &iter);
5851 sym != NULL; sym = block_iter_match_next (name, wild_match, &iter))
76a01679 5852 {
4186eb54
KS
5853 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5854 SYMBOL_DOMAIN (sym), domain)
73589123 5855 && wild_match (SYMBOL_LINKAGE_NAME (sym), name) == 0)
76a01679 5856 {
2a2d4dc3
AS
5857 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5858 continue;
5859 else if (SYMBOL_IS_ARGUMENT (sym))
5860 arg_sym = sym;
5861 else
5862 {
76a01679
JB
5863 found_sym = 1;
5864 add_defn_to_vec (obstackp,
5865 fixup_symbol_section (sym, objfile),
2570f2b7 5866 block);
76a01679
JB
5867 }
5868 }
5869 }
96d887e8
PH
5870 }
5871 else
5872 {
8157b174
TT
5873 for (sym = block_iter_match_first (block, name, full_match, &iter);
5874 sym != NULL; sym = block_iter_match_next (name, full_match, &iter))
76a01679 5875 {
4186eb54
KS
5876 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5877 SYMBOL_DOMAIN (sym), domain))
76a01679 5878 {
c4d840bd
PH
5879 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5880 {
5881 if (SYMBOL_IS_ARGUMENT (sym))
5882 arg_sym = sym;
5883 else
2a2d4dc3 5884 {
c4d840bd
PH
5885 found_sym = 1;
5886 add_defn_to_vec (obstackp,
5887 fixup_symbol_section (sym, objfile),
5888 block);
2a2d4dc3 5889 }
c4d840bd 5890 }
76a01679
JB
5891 }
5892 }
96d887e8
PH
5893 }
5894
5895 if (!found_sym && arg_sym != NULL)
5896 {
76a01679
JB
5897 add_defn_to_vec (obstackp,
5898 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5899 block);
96d887e8
PH
5900 }
5901
5902 if (!wild)
5903 {
5904 arg_sym = NULL;
5905 found_sym = 0;
5906
5907 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 5908 {
4186eb54
KS
5909 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5910 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
5911 {
5912 int cmp;
5913
5914 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
5915 if (cmp == 0)
5916 {
5917 cmp = strncmp ("_ada_", SYMBOL_LINKAGE_NAME (sym), 5);
5918 if (cmp == 0)
5919 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
5920 name_len);
5921 }
5922
5923 if (cmp == 0
5924 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
5925 {
2a2d4dc3
AS
5926 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5927 {
5928 if (SYMBOL_IS_ARGUMENT (sym))
5929 arg_sym = sym;
5930 else
5931 {
5932 found_sym = 1;
5933 add_defn_to_vec (obstackp,
5934 fixup_symbol_section (sym, objfile),
5935 block);
5936 }
5937 }
76a01679
JB
5938 }
5939 }
76a01679 5940 }
96d887e8
PH
5941
5942 /* NOTE: This really shouldn't be needed for _ada_ symbols.
5943 They aren't parameters, right? */
5944 if (!found_sym && arg_sym != NULL)
5945 {
5946 add_defn_to_vec (obstackp,
76a01679 5947 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5948 block);
96d887e8
PH
5949 }
5950 }
5951}
5952\f
41d27058
JB
5953
5954 /* Symbol Completion */
5955
5956/* If SYM_NAME is a completion candidate for TEXT, return this symbol
5957 name in a form that's appropriate for the completion. The result
5958 does not need to be deallocated, but is only good until the next call.
5959
5960 TEXT_LEN is equal to the length of TEXT.
e701b3c0 5961 Perform a wild match if WILD_MATCH_P is set.
6ea35997 5962 ENCODED_P should be set if TEXT represents the start of a symbol name
41d27058
JB
5963 in its encoded form. */
5964
5965static const char *
5966symbol_completion_match (const char *sym_name,
5967 const char *text, int text_len,
6ea35997 5968 int wild_match_p, int encoded_p)
41d27058 5969{
41d27058
JB
5970 const int verbatim_match = (text[0] == '<');
5971 int match = 0;
5972
5973 if (verbatim_match)
5974 {
5975 /* Strip the leading angle bracket. */
5976 text = text + 1;
5977 text_len--;
5978 }
5979
5980 /* First, test against the fully qualified name of the symbol. */
5981
5982 if (strncmp (sym_name, text, text_len) == 0)
5983 match = 1;
5984
6ea35997 5985 if (match && !encoded_p)
41d27058
JB
5986 {
5987 /* One needed check before declaring a positive match is to verify
5988 that iff we are doing a verbatim match, the decoded version
5989 of the symbol name starts with '<'. Otherwise, this symbol name
5990 is not a suitable completion. */
5991 const char *sym_name_copy = sym_name;
5992 int has_angle_bracket;
5993
5994 sym_name = ada_decode (sym_name);
5995 has_angle_bracket = (sym_name[0] == '<');
5996 match = (has_angle_bracket == verbatim_match);
5997 sym_name = sym_name_copy;
5998 }
5999
6000 if (match && !verbatim_match)
6001 {
6002 /* When doing non-verbatim match, another check that needs to
6003 be done is to verify that the potentially matching symbol name
6004 does not include capital letters, because the ada-mode would
6005 not be able to understand these symbol names without the
6006 angle bracket notation. */
6007 const char *tmp;
6008
6009 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6010 if (*tmp != '\0')
6011 match = 0;
6012 }
6013
6014 /* Second: Try wild matching... */
6015
e701b3c0 6016 if (!match && wild_match_p)
41d27058
JB
6017 {
6018 /* Since we are doing wild matching, this means that TEXT
6019 may represent an unqualified symbol name. We therefore must
6020 also compare TEXT against the unqualified name of the symbol. */
6021 sym_name = ada_unqualified_name (ada_decode (sym_name));
6022
6023 if (strncmp (sym_name, text, text_len) == 0)
6024 match = 1;
6025 }
6026
6027 /* Finally: If we found a mach, prepare the result to return. */
6028
6029 if (!match)
6030 return NULL;
6031
6032 if (verbatim_match)
6033 sym_name = add_angle_brackets (sym_name);
6034
6ea35997 6035 if (!encoded_p)
41d27058
JB
6036 sym_name = ada_decode (sym_name);
6037
6038 return sym_name;
6039}
6040
6041/* A companion function to ada_make_symbol_completion_list().
6042 Check if SYM_NAME represents a symbol which name would be suitable
6043 to complete TEXT (TEXT_LEN is the length of TEXT), in which case
6044 it is appended at the end of the given string vector SV.
6045
6046 ORIG_TEXT is the string original string from the user command
6047 that needs to be completed. WORD is the entire command on which
6048 completion should be performed. These two parameters are used to
6049 determine which part of the symbol name should be added to the
6050 completion vector.
c0af1706 6051 if WILD_MATCH_P is set, then wild matching is performed.
cb8e9b97 6052 ENCODED_P should be set if TEXT represents a symbol name in its
41d27058
JB
6053 encoded formed (in which case the completion should also be
6054 encoded). */
6055
6056static void
d6565258 6057symbol_completion_add (VEC(char_ptr) **sv,
41d27058
JB
6058 const char *sym_name,
6059 const char *text, int text_len,
6060 const char *orig_text, const char *word,
cb8e9b97 6061 int wild_match_p, int encoded_p)
41d27058
JB
6062{
6063 const char *match = symbol_completion_match (sym_name, text, text_len,
cb8e9b97 6064 wild_match_p, encoded_p);
41d27058
JB
6065 char *completion;
6066
6067 if (match == NULL)
6068 return;
6069
6070 /* We found a match, so add the appropriate completion to the given
6071 string vector. */
6072
6073 if (word == orig_text)
6074 {
6075 completion = xmalloc (strlen (match) + 5);
6076 strcpy (completion, match);
6077 }
6078 else if (word > orig_text)
6079 {
6080 /* Return some portion of sym_name. */
6081 completion = xmalloc (strlen (match) + 5);
6082 strcpy (completion, match + (word - orig_text));
6083 }
6084 else
6085 {
6086 /* Return some of ORIG_TEXT plus sym_name. */
6087 completion = xmalloc (strlen (match) + (orig_text - word) + 5);
6088 strncpy (completion, word, orig_text - word);
6089 completion[orig_text - word] = '\0';
6090 strcat (completion, match);
6091 }
6092
d6565258 6093 VEC_safe_push (char_ptr, *sv, completion);
41d27058
JB
6094}
6095
ccefe4c4 6096/* An object of this type is passed as the user_data argument to the
bb4142cf 6097 expand_symtabs_matching method. */
ccefe4c4
TT
6098struct add_partial_datum
6099{
6100 VEC(char_ptr) **completions;
6f937416 6101 const char *text;
ccefe4c4 6102 int text_len;
6f937416
PA
6103 const char *text0;
6104 const char *word;
ccefe4c4
TT
6105 int wild_match;
6106 int encoded;
6107};
6108
bb4142cf
DE
6109/* A callback for expand_symtabs_matching. */
6110
7b08b9eb 6111static int
bb4142cf 6112ada_complete_symbol_matcher (const char *name, void *user_data)
ccefe4c4
TT
6113{
6114 struct add_partial_datum *data = user_data;
7b08b9eb
JK
6115
6116 return symbol_completion_match (name, data->text, data->text_len,
6117 data->wild_match, data->encoded) != NULL;
ccefe4c4
TT
6118}
6119
49c4e619
TT
6120/* Return a list of possible symbol names completing TEXT0. WORD is
6121 the entire command on which completion is made. */
41d27058 6122
49c4e619 6123static VEC (char_ptr) *
6f937416
PA
6124ada_make_symbol_completion_list (const char *text0, const char *word,
6125 enum type_code code)
41d27058
JB
6126{
6127 char *text;
6128 int text_len;
b1ed564a
JB
6129 int wild_match_p;
6130 int encoded_p;
2ba95b9b 6131 VEC(char_ptr) *completions = VEC_alloc (char_ptr, 128);
41d27058
JB
6132 struct symbol *sym;
6133 struct symtab *s;
41d27058
JB
6134 struct minimal_symbol *msymbol;
6135 struct objfile *objfile;
6136 struct block *b, *surrounding_static_block = 0;
6137 int i;
8157b174 6138 struct block_iterator iter;
b8fea896 6139 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
41d27058 6140
2f68a895
TT
6141 gdb_assert (code == TYPE_CODE_UNDEF);
6142
41d27058
JB
6143 if (text0[0] == '<')
6144 {
6145 text = xstrdup (text0);
6146 make_cleanup (xfree, text);
6147 text_len = strlen (text);
b1ed564a
JB
6148 wild_match_p = 0;
6149 encoded_p = 1;
41d27058
JB
6150 }
6151 else
6152 {
6153 text = xstrdup (ada_encode (text0));
6154 make_cleanup (xfree, text);
6155 text_len = strlen (text);
6156 for (i = 0; i < text_len; i++)
6157 text[i] = tolower (text[i]);
6158
b1ed564a 6159 encoded_p = (strstr (text0, "__") != NULL);
41d27058
JB
6160 /* If the name contains a ".", then the user is entering a fully
6161 qualified entity name, and the match must not be done in wild
6162 mode. Similarly, if the user wants to complete what looks like
6163 an encoded name, the match must not be done in wild mode. */
b1ed564a 6164 wild_match_p = (strchr (text0, '.') == NULL && !encoded_p);
41d27058
JB
6165 }
6166
6167 /* First, look at the partial symtab symbols. */
41d27058 6168 {
ccefe4c4
TT
6169 struct add_partial_datum data;
6170
6171 data.completions = &completions;
6172 data.text = text;
6173 data.text_len = text_len;
6174 data.text0 = text0;
6175 data.word = word;
b1ed564a
JB
6176 data.wild_match = wild_match_p;
6177 data.encoded = encoded_p;
bb4142cf
DE
6178 expand_symtabs_matching (NULL, ada_complete_symbol_matcher, ALL_DOMAIN,
6179 &data);
41d27058
JB
6180 }
6181
6182 /* At this point scan through the misc symbol vectors and add each
6183 symbol you find to the list. Eventually we want to ignore
6184 anything that isn't a text symbol (everything else will be
6185 handled by the psymtab code above). */
6186
6187 ALL_MSYMBOLS (objfile, msymbol)
6188 {
6189 QUIT;
efd66ac6 6190 symbol_completion_add (&completions, MSYMBOL_LINKAGE_NAME (msymbol),
b1ed564a
JB
6191 text, text_len, text0, word, wild_match_p,
6192 encoded_p);
41d27058
JB
6193 }
6194
6195 /* Search upwards from currently selected frame (so that we can
6196 complete on local vars. */
6197
6198 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6199 {
6200 if (!BLOCK_SUPERBLOCK (b))
6201 surrounding_static_block = b; /* For elmin of dups */
6202
6203 ALL_BLOCK_SYMBOLS (b, iter, sym)
6204 {
d6565258 6205 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6206 text, text_len, text0, word,
b1ed564a 6207 wild_match_p, encoded_p);
41d27058
JB
6208 }
6209 }
6210
6211 /* Go through the symtabs and check the externs and statics for
6212 symbols which match. */
6213
6214 ALL_SYMTABS (objfile, s)
6215 {
6216 QUIT;
6217 b = BLOCKVECTOR_BLOCK (BLOCKVECTOR (s), GLOBAL_BLOCK);
6218 ALL_BLOCK_SYMBOLS (b, iter, sym)
6219 {
d6565258 6220 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6221 text, text_len, text0, word,
b1ed564a 6222 wild_match_p, encoded_p);
41d27058
JB
6223 }
6224 }
6225
6226 ALL_SYMTABS (objfile, s)
6227 {
6228 QUIT;
6229 b = BLOCKVECTOR_BLOCK (BLOCKVECTOR (s), STATIC_BLOCK);
6230 /* Don't do this block twice. */
6231 if (b == surrounding_static_block)
6232 continue;
6233 ALL_BLOCK_SYMBOLS (b, iter, sym)
6234 {
d6565258 6235 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6236 text, text_len, text0, word,
b1ed564a 6237 wild_match_p, encoded_p);
41d27058
JB
6238 }
6239 }
6240
b8fea896 6241 do_cleanups (old_chain);
49c4e619 6242 return completions;
41d27058
JB
6243}
6244
963a6417 6245 /* Field Access */
96d887e8 6246
73fb9985
JB
6247/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6248 for tagged types. */
6249
6250static int
6251ada_is_dispatch_table_ptr_type (struct type *type)
6252{
0d5cff50 6253 const char *name;
73fb9985
JB
6254
6255 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6256 return 0;
6257
6258 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6259 if (name == NULL)
6260 return 0;
6261
6262 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6263}
6264
ac4a2da4
JG
6265/* Return non-zero if TYPE is an interface tag. */
6266
6267static int
6268ada_is_interface_tag (struct type *type)
6269{
6270 const char *name = TYPE_NAME (type);
6271
6272 if (name == NULL)
6273 return 0;
6274
6275 return (strcmp (name, "ada__tags__interface_tag") == 0);
6276}
6277
963a6417
PH
6278/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6279 to be invisible to users. */
96d887e8 6280
963a6417
PH
6281int
6282ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6283{
963a6417
PH
6284 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6285 return 1;
ffde82bf 6286
73fb9985
JB
6287 /* Check the name of that field. */
6288 {
6289 const char *name = TYPE_FIELD_NAME (type, field_num);
6290
6291 /* Anonymous field names should not be printed.
6292 brobecker/2007-02-20: I don't think this can actually happen
6293 but we don't want to print the value of annonymous fields anyway. */
6294 if (name == NULL)
6295 return 1;
6296
ffde82bf
JB
6297 /* Normally, fields whose name start with an underscore ("_")
6298 are fields that have been internally generated by the compiler,
6299 and thus should not be printed. The "_parent" field is special,
6300 however: This is a field internally generated by the compiler
6301 for tagged types, and it contains the components inherited from
6302 the parent type. This field should not be printed as is, but
6303 should not be ignored either. */
73fb9985
JB
6304 if (name[0] == '_' && strncmp (name, "_parent", 7) != 0)
6305 return 1;
6306 }
6307
ac4a2da4
JG
6308 /* If this is the dispatch table of a tagged type or an interface tag,
6309 then ignore. */
73fb9985 6310 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6311 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6312 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6313 return 1;
6314
6315 /* Not a special field, so it should not be ignored. */
6316 return 0;
963a6417 6317}
96d887e8 6318
963a6417 6319/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6320 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6321
963a6417
PH
6322int
6323ada_is_tagged_type (struct type *type, int refok)
6324{
6325 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1, NULL) != NULL);
6326}
96d887e8 6327
963a6417 6328/* True iff TYPE represents the type of X'Tag */
96d887e8 6329
963a6417
PH
6330int
6331ada_is_tag_type (struct type *type)
6332{
6333 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6334 return 0;
6335 else
96d887e8 6336 {
963a6417 6337 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6338
963a6417
PH
6339 return (name != NULL
6340 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6341 }
96d887e8
PH
6342}
6343
963a6417 6344/* The type of the tag on VAL. */
76a01679 6345
963a6417
PH
6346struct type *
6347ada_tag_type (struct value *val)
96d887e8 6348{
df407dfe 6349 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0, NULL);
963a6417 6350}
96d887e8 6351
b50d69b5
JG
6352/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6353 retired at Ada 05). */
6354
6355static int
6356is_ada95_tag (struct value *tag)
6357{
6358 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6359}
6360
963a6417 6361/* The value of the tag on VAL. */
96d887e8 6362
963a6417
PH
6363struct value *
6364ada_value_tag (struct value *val)
6365{
03ee6b2e 6366 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6367}
6368
963a6417
PH
6369/* The value of the tag on the object of type TYPE whose contents are
6370 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6371 ADDRESS. */
96d887e8 6372
963a6417 6373static struct value *
10a2c479 6374value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6375 const gdb_byte *valaddr,
963a6417 6376 CORE_ADDR address)
96d887e8 6377{
b5385fc0 6378 int tag_byte_offset;
963a6417 6379 struct type *tag_type;
5b4ee69b 6380
963a6417 6381 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6382 NULL, NULL, NULL))
96d887e8 6383 {
fc1a4b47 6384 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6385 ? NULL
6386 : valaddr + tag_byte_offset);
963a6417 6387 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6388
963a6417 6389 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6390 }
963a6417
PH
6391 return NULL;
6392}
96d887e8 6393
963a6417
PH
6394static struct type *
6395type_from_tag (struct value *tag)
6396{
6397 const char *type_name = ada_tag_name (tag);
5b4ee69b 6398
963a6417
PH
6399 if (type_name != NULL)
6400 return ada_find_any_type (ada_encode (type_name));
6401 return NULL;
6402}
96d887e8 6403
b50d69b5
JG
6404/* Given a value OBJ of a tagged type, return a value of this
6405 type at the base address of the object. The base address, as
6406 defined in Ada.Tags, it is the address of the primary tag of
6407 the object, and therefore where the field values of its full
6408 view can be fetched. */
6409
6410struct value *
6411ada_tag_value_at_base_address (struct value *obj)
6412{
6413 volatile struct gdb_exception e;
6414 struct value *val;
6415 LONGEST offset_to_top = 0;
6416 struct type *ptr_type, *obj_type;
6417 struct value *tag;
6418 CORE_ADDR base_address;
6419
6420 obj_type = value_type (obj);
6421
6422 /* It is the responsability of the caller to deref pointers. */
6423
6424 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6425 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6426 return obj;
6427
6428 tag = ada_value_tag (obj);
6429 if (!tag)
6430 return obj;
6431
6432 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6433
6434 if (is_ada95_tag (tag))
6435 return obj;
6436
6437 ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
6438 ptr_type = lookup_pointer_type (ptr_type);
6439 val = value_cast (ptr_type, tag);
6440 if (!val)
6441 return obj;
6442
6443 /* It is perfectly possible that an exception be raised while
6444 trying to determine the base address, just like for the tag;
6445 see ada_tag_name for more details. We do not print the error
6446 message for the same reason. */
6447
6448 TRY_CATCH (e, RETURN_MASK_ERROR)
6449 {
6450 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6451 }
6452
6453 if (e.reason < 0)
6454 return obj;
6455
6456 /* If offset is null, nothing to do. */
6457
6458 if (offset_to_top == 0)
6459 return obj;
6460
6461 /* -1 is a special case in Ada.Tags; however, what should be done
6462 is not quite clear from the documentation. So do nothing for
6463 now. */
6464
6465 if (offset_to_top == -1)
6466 return obj;
6467
6468 base_address = value_address (obj) - offset_to_top;
6469 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6470
6471 /* Make sure that we have a proper tag at the new address.
6472 Otherwise, offset_to_top is bogus (which can happen when
6473 the object is not initialized yet). */
6474
6475 if (!tag)
6476 return obj;
6477
6478 obj_type = type_from_tag (tag);
6479
6480 if (!obj_type)
6481 return obj;
6482
6483 return value_from_contents_and_address (obj_type, NULL, base_address);
6484}
6485
1b611343
JB
6486/* Return the "ada__tags__type_specific_data" type. */
6487
6488static struct type *
6489ada_get_tsd_type (struct inferior *inf)
963a6417 6490{
1b611343 6491 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6492
1b611343
JB
6493 if (data->tsd_type == 0)
6494 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6495 return data->tsd_type;
6496}
529cad9c 6497
1b611343
JB
6498/* Return the TSD (type-specific data) associated to the given TAG.
6499 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6500
1b611343 6501 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6502
1b611343
JB
6503static struct value *
6504ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6505{
4c4b4cd2 6506 struct value *val;
1b611343 6507 struct type *type;
5b4ee69b 6508
1b611343
JB
6509 /* First option: The TSD is simply stored as a field of our TAG.
6510 Only older versions of GNAT would use this format, but we have
6511 to test it first, because there are no visible markers for
6512 the current approach except the absence of that field. */
529cad9c 6513
1b611343
JB
6514 val = ada_value_struct_elt (tag, "tsd", 1);
6515 if (val)
6516 return val;
e802dbe0 6517
1b611343
JB
6518 /* Try the second representation for the dispatch table (in which
6519 there is no explicit 'tsd' field in the referent of the tag pointer,
6520 and instead the tsd pointer is stored just before the dispatch
6521 table. */
e802dbe0 6522
1b611343
JB
6523 type = ada_get_tsd_type (current_inferior());
6524 if (type == NULL)
6525 return NULL;
6526 type = lookup_pointer_type (lookup_pointer_type (type));
6527 val = value_cast (type, tag);
6528 if (val == NULL)
6529 return NULL;
6530 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6531}
6532
1b611343
JB
6533/* Given the TSD of a tag (type-specific data), return a string
6534 containing the name of the associated type.
6535
6536 The returned value is good until the next call. May return NULL
6537 if we are unable to determine the tag name. */
6538
6539static char *
6540ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6541{
529cad9c
PH
6542 static char name[1024];
6543 char *p;
1b611343 6544 struct value *val;
529cad9c 6545
1b611343 6546 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6547 if (val == NULL)
1b611343 6548 return NULL;
4c4b4cd2
PH
6549 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6550 for (p = name; *p != '\0'; p += 1)
6551 if (isalpha (*p))
6552 *p = tolower (*p);
1b611343 6553 return name;
4c4b4cd2
PH
6554}
6555
6556/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6557 a C string.
6558
6559 Return NULL if the TAG is not an Ada tag, or if we were unable to
6560 determine the name of that tag. The result is good until the next
6561 call. */
4c4b4cd2
PH
6562
6563const char *
6564ada_tag_name (struct value *tag)
6565{
1b611343
JB
6566 volatile struct gdb_exception e;
6567 char *name = NULL;
5b4ee69b 6568
df407dfe 6569 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6570 return NULL;
1b611343
JB
6571
6572 /* It is perfectly possible that an exception be raised while trying
6573 to determine the TAG's name, even under normal circumstances:
6574 The associated variable may be uninitialized or corrupted, for
6575 instance. We do not let any exception propagate past this point.
6576 instead we return NULL.
6577
6578 We also do not print the error message either (which often is very
6579 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6580 the caller print a more meaningful message if necessary. */
6581 TRY_CATCH (e, RETURN_MASK_ERROR)
6582 {
6583 struct value *tsd = ada_get_tsd_from_tag (tag);
6584
6585 if (tsd != NULL)
6586 name = ada_tag_name_from_tsd (tsd);
6587 }
6588
6589 return name;
4c4b4cd2
PH
6590}
6591
6592/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6593
d2e4a39e 6594struct type *
ebf56fd3 6595ada_parent_type (struct type *type)
14f9c5c9
AS
6596{
6597 int i;
6598
61ee279c 6599 type = ada_check_typedef (type);
14f9c5c9
AS
6600
6601 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6602 return NULL;
6603
6604 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6605 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6606 {
6607 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6608
6609 /* If the _parent field is a pointer, then dereference it. */
6610 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6611 parent_type = TYPE_TARGET_TYPE (parent_type);
6612 /* If there is a parallel XVS type, get the actual base type. */
6613 parent_type = ada_get_base_type (parent_type);
6614
6615 return ada_check_typedef (parent_type);
6616 }
14f9c5c9
AS
6617
6618 return NULL;
6619}
6620
4c4b4cd2
PH
6621/* True iff field number FIELD_NUM of structure type TYPE contains the
6622 parent-type (inherited) fields of a derived type. Assumes TYPE is
6623 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6624
6625int
ebf56fd3 6626ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6627{
61ee279c 6628 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6629
4c4b4cd2
PH
6630 return (name != NULL
6631 && (strncmp (name, "PARENT", 6) == 0
6632 || strncmp (name, "_parent", 7) == 0));
14f9c5c9
AS
6633}
6634
4c4b4cd2 6635/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6636 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6637 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6638 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6639 structures. */
14f9c5c9
AS
6640
6641int
ebf56fd3 6642ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6643{
d2e4a39e 6644 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6645
d2e4a39e 6646 return (name != NULL
4c4b4cd2
PH
6647 && (strncmp (name, "PARENT", 6) == 0
6648 || strcmp (name, "REP") == 0
6649 || strncmp (name, "_parent", 7) == 0
6650 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6651}
6652
4c4b4cd2
PH
6653/* True iff field number FIELD_NUM of structure or union type TYPE
6654 is a variant wrapper. Assumes TYPE is a structure type with at least
6655 FIELD_NUM+1 fields. */
14f9c5c9
AS
6656
6657int
ebf56fd3 6658ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6659{
d2e4a39e 6660 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6661
14f9c5c9 6662 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6663 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6664 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6665 == TYPE_CODE_UNION)));
14f9c5c9
AS
6666}
6667
6668/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6669 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6670 returns the type of the controlling discriminant for the variant.
6671 May return NULL if the type could not be found. */
14f9c5c9 6672
d2e4a39e 6673struct type *
ebf56fd3 6674ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6675{
d2e4a39e 6676 char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6677
7c964f07 6678 return ada_lookup_struct_elt_type (outer_type, name, 1, 1, NULL);
14f9c5c9
AS
6679}
6680
4c4b4cd2 6681/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6682 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6683 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6684
6685int
ebf56fd3 6686ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6687{
d2e4a39e 6688 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6689
14f9c5c9
AS
6690 return (name != NULL && name[0] == 'O');
6691}
6692
6693/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6694 returns the name of the discriminant controlling the variant.
6695 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6696
d2e4a39e 6697char *
ebf56fd3 6698ada_variant_discrim_name (struct type *type0)
14f9c5c9 6699{
d2e4a39e 6700 static char *result = NULL;
14f9c5c9 6701 static size_t result_len = 0;
d2e4a39e
AS
6702 struct type *type;
6703 const char *name;
6704 const char *discrim_end;
6705 const char *discrim_start;
14f9c5c9
AS
6706
6707 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6708 type = TYPE_TARGET_TYPE (type0);
6709 else
6710 type = type0;
6711
6712 name = ada_type_name (type);
6713
6714 if (name == NULL || name[0] == '\000')
6715 return "";
6716
6717 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6718 discrim_end -= 1)
6719 {
4c4b4cd2
PH
6720 if (strncmp (discrim_end, "___XVN", 6) == 0)
6721 break;
14f9c5c9
AS
6722 }
6723 if (discrim_end == name)
6724 return "";
6725
d2e4a39e 6726 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6727 discrim_start -= 1)
6728 {
d2e4a39e 6729 if (discrim_start == name + 1)
4c4b4cd2 6730 return "";
76a01679 6731 if ((discrim_start > name + 3
4c4b4cd2
PH
6732 && strncmp (discrim_start - 3, "___", 3) == 0)
6733 || discrim_start[-1] == '.')
6734 break;
14f9c5c9
AS
6735 }
6736
6737 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6738 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6739 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6740 return result;
6741}
6742
4c4b4cd2
PH
6743/* Scan STR for a subtype-encoded number, beginning at position K.
6744 Put the position of the character just past the number scanned in
6745 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6746 Return 1 if there was a valid number at the given position, and 0
6747 otherwise. A "subtype-encoded" number consists of the absolute value
6748 in decimal, followed by the letter 'm' to indicate a negative number.
6749 Assumes 0m does not occur. */
14f9c5c9
AS
6750
6751int
d2e4a39e 6752ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6753{
6754 ULONGEST RU;
6755
d2e4a39e 6756 if (!isdigit (str[k]))
14f9c5c9
AS
6757 return 0;
6758
4c4b4cd2 6759 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6760 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6761 LONGEST. */
14f9c5c9
AS
6762 RU = 0;
6763 while (isdigit (str[k]))
6764 {
d2e4a39e 6765 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6766 k += 1;
6767 }
6768
d2e4a39e 6769 if (str[k] == 'm')
14f9c5c9
AS
6770 {
6771 if (R != NULL)
4c4b4cd2 6772 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6773 k += 1;
6774 }
6775 else if (R != NULL)
6776 *R = (LONGEST) RU;
6777
4c4b4cd2 6778 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6779 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6780 number representable as a LONGEST (although either would probably work
6781 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6782 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6783
6784 if (new_k != NULL)
6785 *new_k = k;
6786 return 1;
6787}
6788
4c4b4cd2
PH
6789/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6790 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6791 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6792
d2e4a39e 6793int
ebf56fd3 6794ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6795{
d2e4a39e 6796 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6797 int p;
6798
6799 p = 0;
6800 while (1)
6801 {
d2e4a39e 6802 switch (name[p])
4c4b4cd2
PH
6803 {
6804 case '\0':
6805 return 0;
6806 case 'S':
6807 {
6808 LONGEST W;
5b4ee69b 6809
4c4b4cd2
PH
6810 if (!ada_scan_number (name, p + 1, &W, &p))
6811 return 0;
6812 if (val == W)
6813 return 1;
6814 break;
6815 }
6816 case 'R':
6817 {
6818 LONGEST L, U;
5b4ee69b 6819
4c4b4cd2
PH
6820 if (!ada_scan_number (name, p + 1, &L, &p)
6821 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6822 return 0;
6823 if (val >= L && val <= U)
6824 return 1;
6825 break;
6826 }
6827 case 'O':
6828 return 1;
6829 default:
6830 return 0;
6831 }
6832 }
6833}
6834
0963b4bd 6835/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6836
6837/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6838 ARG_TYPE, extract and return the value of one of its (non-static)
6839 fields. FIELDNO says which field. Differs from value_primitive_field
6840 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6841
4c4b4cd2 6842static struct value *
d2e4a39e 6843ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 6844 struct type *arg_type)
14f9c5c9 6845{
14f9c5c9
AS
6846 struct type *type;
6847
61ee279c 6848 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
6849 type = TYPE_FIELD_TYPE (arg_type, fieldno);
6850
4c4b4cd2 6851 /* Handle packed fields. */
14f9c5c9
AS
6852
6853 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0)
6854 {
6855 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6856 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6857
0fd88904 6858 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
6859 offset + bit_pos / 8,
6860 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6861 }
6862 else
6863 return value_primitive_field (arg1, offset, fieldno, arg_type);
6864}
6865
52ce6436
PH
6866/* Find field with name NAME in object of type TYPE. If found,
6867 set the following for each argument that is non-null:
6868 - *FIELD_TYPE_P to the field's type;
6869 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6870 an object of that type;
6871 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6872 - *BIT_SIZE_P to its size in bits if the field is packed, and
6873 0 otherwise;
6874 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6875 fields up to but not including the desired field, or by the total
6876 number of fields if not found. A NULL value of NAME never
6877 matches; the function just counts visible fields in this case.
6878
0963b4bd 6879 Returns 1 if found, 0 otherwise. */
52ce6436 6880
4c4b4cd2 6881static int
0d5cff50 6882find_struct_field (const char *name, struct type *type, int offset,
76a01679 6883 struct type **field_type_p,
52ce6436
PH
6884 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
6885 int *index_p)
4c4b4cd2
PH
6886{
6887 int i;
6888
61ee279c 6889 type = ada_check_typedef (type);
76a01679 6890
52ce6436
PH
6891 if (field_type_p != NULL)
6892 *field_type_p = NULL;
6893 if (byte_offset_p != NULL)
d5d6fca5 6894 *byte_offset_p = 0;
52ce6436
PH
6895 if (bit_offset_p != NULL)
6896 *bit_offset_p = 0;
6897 if (bit_size_p != NULL)
6898 *bit_size_p = 0;
6899
6900 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
6901 {
6902 int bit_pos = TYPE_FIELD_BITPOS (type, i);
6903 int fld_offset = offset + bit_pos / 8;
0d5cff50 6904 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 6905
4c4b4cd2
PH
6906 if (t_field_name == NULL)
6907 continue;
6908
52ce6436 6909 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
6910 {
6911 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 6912
52ce6436
PH
6913 if (field_type_p != NULL)
6914 *field_type_p = TYPE_FIELD_TYPE (type, i);
6915 if (byte_offset_p != NULL)
6916 *byte_offset_p = fld_offset;
6917 if (bit_offset_p != NULL)
6918 *bit_offset_p = bit_pos % 8;
6919 if (bit_size_p != NULL)
6920 *bit_size_p = bit_size;
76a01679
JB
6921 return 1;
6922 }
4c4b4cd2
PH
6923 else if (ada_is_wrapper_field (type, i))
6924 {
52ce6436
PH
6925 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
6926 field_type_p, byte_offset_p, bit_offset_p,
6927 bit_size_p, index_p))
76a01679
JB
6928 return 1;
6929 }
4c4b4cd2
PH
6930 else if (ada_is_variant_part (type, i))
6931 {
52ce6436
PH
6932 /* PNH: Wait. Do we ever execute this section, or is ARG always of
6933 fixed type?? */
4c4b4cd2 6934 int j;
52ce6436
PH
6935 struct type *field_type
6936 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 6937
52ce6436 6938 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 6939 {
76a01679
JB
6940 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
6941 fld_offset
6942 + TYPE_FIELD_BITPOS (field_type, j) / 8,
6943 field_type_p, byte_offset_p,
52ce6436 6944 bit_offset_p, bit_size_p, index_p))
76a01679 6945 return 1;
4c4b4cd2
PH
6946 }
6947 }
52ce6436
PH
6948 else if (index_p != NULL)
6949 *index_p += 1;
4c4b4cd2
PH
6950 }
6951 return 0;
6952}
6953
0963b4bd 6954/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 6955
52ce6436
PH
6956static int
6957num_visible_fields (struct type *type)
6958{
6959 int n;
5b4ee69b 6960
52ce6436
PH
6961 n = 0;
6962 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
6963 return n;
6964}
14f9c5c9 6965
4c4b4cd2 6966/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
6967 and search in it assuming it has (class) type TYPE.
6968 If found, return value, else return NULL.
6969
4c4b4cd2 6970 Searches recursively through wrapper fields (e.g., '_parent'). */
14f9c5c9 6971
4c4b4cd2 6972static struct value *
d2e4a39e 6973ada_search_struct_field (char *name, struct value *arg, int offset,
4c4b4cd2 6974 struct type *type)
14f9c5c9
AS
6975{
6976 int i;
14f9c5c9 6977
5b4ee69b 6978 type = ada_check_typedef (type);
52ce6436 6979 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 6980 {
0d5cff50 6981 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
6982
6983 if (t_field_name == NULL)
4c4b4cd2 6984 continue;
14f9c5c9
AS
6985
6986 else if (field_name_match (t_field_name, name))
4c4b4cd2 6987 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
6988
6989 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 6990 {
0963b4bd 6991 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
6992 ada_search_struct_field (name, arg,
6993 offset + TYPE_FIELD_BITPOS (type, i) / 8,
6994 TYPE_FIELD_TYPE (type, i));
5b4ee69b 6995
4c4b4cd2
PH
6996 if (v != NULL)
6997 return v;
6998 }
14f9c5c9
AS
6999
7000 else if (ada_is_variant_part (type, i))
4c4b4cd2 7001 {
0963b4bd 7002 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7003 int j;
5b4ee69b
MS
7004 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7005 i));
4c4b4cd2
PH
7006 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7007
52ce6436 7008 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7009 {
0963b4bd
MS
7010 struct value *v = ada_search_struct_field /* Force line
7011 break. */
06d5cf63
JB
7012 (name, arg,
7013 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7014 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7015
4c4b4cd2
PH
7016 if (v != NULL)
7017 return v;
7018 }
7019 }
14f9c5c9
AS
7020 }
7021 return NULL;
7022}
d2e4a39e 7023
52ce6436
PH
7024static struct value *ada_index_struct_field_1 (int *, struct value *,
7025 int, struct type *);
7026
7027
7028/* Return field #INDEX in ARG, where the index is that returned by
7029 * find_struct_field through its INDEX_P argument. Adjust the address
7030 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7031 * If found, return value, else return NULL. */
52ce6436
PH
7032
7033static struct value *
7034ada_index_struct_field (int index, struct value *arg, int offset,
7035 struct type *type)
7036{
7037 return ada_index_struct_field_1 (&index, arg, offset, type);
7038}
7039
7040
7041/* Auxiliary function for ada_index_struct_field. Like
7042 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7043 * *INDEX_P. */
52ce6436
PH
7044
7045static struct value *
7046ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7047 struct type *type)
7048{
7049 int i;
7050 type = ada_check_typedef (type);
7051
7052 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7053 {
7054 if (TYPE_FIELD_NAME (type, i) == NULL)
7055 continue;
7056 else if (ada_is_wrapper_field (type, i))
7057 {
0963b4bd 7058 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7059 ada_index_struct_field_1 (index_p, arg,
7060 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7061 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7062
52ce6436
PH
7063 if (v != NULL)
7064 return v;
7065 }
7066
7067 else if (ada_is_variant_part (type, i))
7068 {
7069 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7070 find_struct_field. */
52ce6436
PH
7071 error (_("Cannot assign this kind of variant record"));
7072 }
7073 else if (*index_p == 0)
7074 return ada_value_primitive_field (arg, offset, i, type);
7075 else
7076 *index_p -= 1;
7077 }
7078 return NULL;
7079}
7080
4c4b4cd2
PH
7081/* Given ARG, a value of type (pointer or reference to a)*
7082 structure/union, extract the component named NAME from the ultimate
7083 target structure/union and return it as a value with its
f5938064 7084 appropriate type.
14f9c5c9 7085
4c4b4cd2
PH
7086 The routine searches for NAME among all members of the structure itself
7087 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7088 (e.g., '_parent').
7089
03ee6b2e
PH
7090 If NO_ERR, then simply return NULL in case of error, rather than
7091 calling error. */
14f9c5c9 7092
d2e4a39e 7093struct value *
03ee6b2e 7094ada_value_struct_elt (struct value *arg, char *name, int no_err)
14f9c5c9 7095{
4c4b4cd2 7096 struct type *t, *t1;
d2e4a39e 7097 struct value *v;
14f9c5c9 7098
4c4b4cd2 7099 v = NULL;
df407dfe 7100 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7101 if (TYPE_CODE (t) == TYPE_CODE_REF)
7102 {
7103 t1 = TYPE_TARGET_TYPE (t);
7104 if (t1 == NULL)
03ee6b2e 7105 goto BadValue;
61ee279c 7106 t1 = ada_check_typedef (t1);
4c4b4cd2 7107 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7108 {
994b9211 7109 arg = coerce_ref (arg);
76a01679
JB
7110 t = t1;
7111 }
4c4b4cd2 7112 }
14f9c5c9 7113
4c4b4cd2
PH
7114 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7115 {
7116 t1 = TYPE_TARGET_TYPE (t);
7117 if (t1 == NULL)
03ee6b2e 7118 goto BadValue;
61ee279c 7119 t1 = ada_check_typedef (t1);
4c4b4cd2 7120 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7121 {
7122 arg = value_ind (arg);
7123 t = t1;
7124 }
4c4b4cd2 7125 else
76a01679 7126 break;
4c4b4cd2 7127 }
14f9c5c9 7128
4c4b4cd2 7129 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7130 goto BadValue;
14f9c5c9 7131
4c4b4cd2
PH
7132 if (t1 == t)
7133 v = ada_search_struct_field (name, arg, 0, t);
7134 else
7135 {
7136 int bit_offset, bit_size, byte_offset;
7137 struct type *field_type;
7138 CORE_ADDR address;
7139
76a01679 7140 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7141 address = value_address (ada_value_ind (arg));
4c4b4cd2 7142 else
b50d69b5 7143 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7144
1ed6ede0 7145 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL, address, NULL, 1);
76a01679
JB
7146 if (find_struct_field (name, t1, 0,
7147 &field_type, &byte_offset, &bit_offset,
52ce6436 7148 &bit_size, NULL))
76a01679
JB
7149 {
7150 if (bit_size != 0)
7151 {
714e53ab
PH
7152 if (TYPE_CODE (t) == TYPE_CODE_REF)
7153 arg = ada_coerce_ref (arg);
7154 else
7155 arg = ada_value_ind (arg);
76a01679
JB
7156 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7157 bit_offset, bit_size,
7158 field_type);
7159 }
7160 else
f5938064 7161 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7162 }
7163 }
7164
03ee6b2e
PH
7165 if (v != NULL || no_err)
7166 return v;
7167 else
323e0a4a 7168 error (_("There is no member named %s."), name);
14f9c5c9 7169
03ee6b2e
PH
7170 BadValue:
7171 if (no_err)
7172 return NULL;
7173 else
0963b4bd
MS
7174 error (_("Attempt to extract a component of "
7175 "a value that is not a record."));
14f9c5c9
AS
7176}
7177
7178/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7179 If DISPP is non-null, add its byte displacement from the beginning of a
7180 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7181 work for packed fields).
7182
7183 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7184 followed by "___".
14f9c5c9 7185
0963b4bd 7186 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7187 be a (pointer or reference)+ to a struct or union, and the
7188 ultimate target type will be searched.
14f9c5c9
AS
7189
7190 Looks recursively into variant clauses and parent types.
7191
4c4b4cd2
PH
7192 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7193 TYPE is not a type of the right kind. */
14f9c5c9 7194
4c4b4cd2 7195static struct type *
76a01679
JB
7196ada_lookup_struct_elt_type (struct type *type, char *name, int refok,
7197 int noerr, int *dispp)
14f9c5c9
AS
7198{
7199 int i;
7200
7201 if (name == NULL)
7202 goto BadName;
7203
76a01679 7204 if (refok && type != NULL)
4c4b4cd2
PH
7205 while (1)
7206 {
61ee279c 7207 type = ada_check_typedef (type);
76a01679
JB
7208 if (TYPE_CODE (type) != TYPE_CODE_PTR
7209 && TYPE_CODE (type) != TYPE_CODE_REF)
7210 break;
7211 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7212 }
14f9c5c9 7213
76a01679 7214 if (type == NULL
1265e4aa
JB
7215 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7216 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7217 {
4c4b4cd2 7218 if (noerr)
76a01679 7219 return NULL;
4c4b4cd2 7220 else
76a01679
JB
7221 {
7222 target_terminal_ours ();
7223 gdb_flush (gdb_stdout);
323e0a4a
AC
7224 if (type == NULL)
7225 error (_("Type (null) is not a structure or union type"));
7226 else
7227 {
7228 /* XXX: type_sprint */
7229 fprintf_unfiltered (gdb_stderr, _("Type "));
7230 type_print (type, "", gdb_stderr, -1);
7231 error (_(" is not a structure or union type"));
7232 }
76a01679 7233 }
14f9c5c9
AS
7234 }
7235
7236 type = to_static_fixed_type (type);
7237
7238 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7239 {
0d5cff50 7240 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7241 struct type *t;
7242 int disp;
d2e4a39e 7243
14f9c5c9 7244 if (t_field_name == NULL)
4c4b4cd2 7245 continue;
14f9c5c9
AS
7246
7247 else if (field_name_match (t_field_name, name))
4c4b4cd2
PH
7248 {
7249 if (dispp != NULL)
7250 *dispp += TYPE_FIELD_BITPOS (type, i) / 8;
61ee279c 7251 return ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7252 }
14f9c5c9
AS
7253
7254 else if (ada_is_wrapper_field (type, i))
4c4b4cd2
PH
7255 {
7256 disp = 0;
7257 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
7258 0, 1, &disp);
7259 if (t != NULL)
7260 {
7261 if (dispp != NULL)
7262 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7263 return t;
7264 }
7265 }
14f9c5c9
AS
7266
7267 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7268 {
7269 int j;
5b4ee69b
MS
7270 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7271 i));
4c4b4cd2
PH
7272
7273 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7274 {
b1f33ddd
JB
7275 /* FIXME pnh 2008/01/26: We check for a field that is
7276 NOT wrapped in a struct, since the compiler sometimes
7277 generates these for unchecked variant types. Revisit
0963b4bd 7278 if the compiler changes this practice. */
0d5cff50 7279 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
4c4b4cd2 7280 disp = 0;
b1f33ddd
JB
7281 if (v_field_name != NULL
7282 && field_name_match (v_field_name, name))
7283 t = ada_check_typedef (TYPE_FIELD_TYPE (field_type, j));
7284 else
0963b4bd
MS
7285 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7286 j),
b1f33ddd
JB
7287 name, 0, 1, &disp);
7288
4c4b4cd2
PH
7289 if (t != NULL)
7290 {
7291 if (dispp != NULL)
7292 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7293 return t;
7294 }
7295 }
7296 }
14f9c5c9
AS
7297
7298 }
7299
7300BadName:
d2e4a39e 7301 if (!noerr)
14f9c5c9
AS
7302 {
7303 target_terminal_ours ();
7304 gdb_flush (gdb_stdout);
323e0a4a
AC
7305 if (name == NULL)
7306 {
7307 /* XXX: type_sprint */
7308 fprintf_unfiltered (gdb_stderr, _("Type "));
7309 type_print (type, "", gdb_stderr, -1);
7310 error (_(" has no component named <null>"));
7311 }
7312 else
7313 {
7314 /* XXX: type_sprint */
7315 fprintf_unfiltered (gdb_stderr, _("Type "));
7316 type_print (type, "", gdb_stderr, -1);
7317 error (_(" has no component named %s"), name);
7318 }
14f9c5c9
AS
7319 }
7320
7321 return NULL;
7322}
7323
b1f33ddd
JB
7324/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7325 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7326 represents an unchecked union (that is, the variant part of a
0963b4bd 7327 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7328
7329static int
7330is_unchecked_variant (struct type *var_type, struct type *outer_type)
7331{
7332 char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7333
b1f33ddd
JB
7334 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1, NULL)
7335 == NULL);
7336}
7337
7338
14f9c5c9
AS
7339/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7340 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7341 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7342 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7343
d2e4a39e 7344int
ebf56fd3 7345ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7346 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7347{
7348 int others_clause;
7349 int i;
d2e4a39e 7350 char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7351 struct value *outer;
7352 struct value *discrim;
14f9c5c9
AS
7353 LONGEST discrim_val;
7354
012370f6
TT
7355 /* Using plain value_from_contents_and_address here causes problems
7356 because we will end up trying to resolve a type that is currently
7357 being constructed. */
7358 outer = value_from_contents_and_address_unresolved (outer_type,
7359 outer_valaddr, 0);
0c281816
JB
7360 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7361 if (discrim == NULL)
14f9c5c9 7362 return -1;
0c281816 7363 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7364
7365 others_clause = -1;
7366 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7367 {
7368 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7369 others_clause = i;
14f9c5c9 7370 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7371 return i;
14f9c5c9
AS
7372 }
7373
7374 return others_clause;
7375}
d2e4a39e 7376\f
14f9c5c9
AS
7377
7378
4c4b4cd2 7379 /* Dynamic-Sized Records */
14f9c5c9
AS
7380
7381/* Strategy: The type ostensibly attached to a value with dynamic size
7382 (i.e., a size that is not statically recorded in the debugging
7383 data) does not accurately reflect the size or layout of the value.
7384 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7385 conventional types that are constructed on the fly. */
14f9c5c9
AS
7386
7387/* There is a subtle and tricky problem here. In general, we cannot
7388 determine the size of dynamic records without its data. However,
7389 the 'struct value' data structure, which GDB uses to represent
7390 quantities in the inferior process (the target), requires the size
7391 of the type at the time of its allocation in order to reserve space
7392 for GDB's internal copy of the data. That's why the
7393 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7394 rather than struct value*s.
14f9c5c9
AS
7395
7396 However, GDB's internal history variables ($1, $2, etc.) are
7397 struct value*s containing internal copies of the data that are not, in
7398 general, the same as the data at their corresponding addresses in
7399 the target. Fortunately, the types we give to these values are all
7400 conventional, fixed-size types (as per the strategy described
7401 above), so that we don't usually have to perform the
7402 'to_fixed_xxx_type' conversions to look at their values.
7403 Unfortunately, there is one exception: if one of the internal
7404 history variables is an array whose elements are unconstrained
7405 records, then we will need to create distinct fixed types for each
7406 element selected. */
7407
7408/* The upshot of all of this is that many routines take a (type, host
7409 address, target address) triple as arguments to represent a value.
7410 The host address, if non-null, is supposed to contain an internal
7411 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7412 target at the target address. */
14f9c5c9
AS
7413
7414/* Assuming that VAL0 represents a pointer value, the result of
7415 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7416 dynamic-sized types. */
14f9c5c9 7417
d2e4a39e
AS
7418struct value *
7419ada_value_ind (struct value *val0)
14f9c5c9 7420{
c48db5ca 7421 struct value *val = value_ind (val0);
5b4ee69b 7422
b50d69b5
JG
7423 if (ada_is_tagged_type (value_type (val), 0))
7424 val = ada_tag_value_at_base_address (val);
7425
4c4b4cd2 7426 return ada_to_fixed_value (val);
14f9c5c9
AS
7427}
7428
7429/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7430 qualifiers on VAL0. */
7431
d2e4a39e
AS
7432static struct value *
7433ada_coerce_ref (struct value *val0)
7434{
df407dfe 7435 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7436 {
7437 struct value *val = val0;
5b4ee69b 7438
994b9211 7439 val = coerce_ref (val);
b50d69b5
JG
7440
7441 if (ada_is_tagged_type (value_type (val), 0))
7442 val = ada_tag_value_at_base_address (val);
7443
4c4b4cd2 7444 return ada_to_fixed_value (val);
d2e4a39e
AS
7445 }
7446 else
14f9c5c9
AS
7447 return val0;
7448}
7449
7450/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7451 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7452
7453static unsigned int
ebf56fd3 7454align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7455{
7456 return (off + alignment - 1) & ~(alignment - 1);
7457}
7458
4c4b4cd2 7459/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7460
7461static unsigned int
ebf56fd3 7462field_alignment (struct type *type, int f)
14f9c5c9 7463{
d2e4a39e 7464 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7465 int len;
14f9c5c9
AS
7466 int align_offset;
7467
64a1bf19
JB
7468 /* The field name should never be null, unless the debugging information
7469 is somehow malformed. In this case, we assume the field does not
7470 require any alignment. */
7471 if (name == NULL)
7472 return 1;
7473
7474 len = strlen (name);
7475
4c4b4cd2
PH
7476 if (!isdigit (name[len - 1]))
7477 return 1;
14f9c5c9 7478
d2e4a39e 7479 if (isdigit (name[len - 2]))
14f9c5c9
AS
7480 align_offset = len - 2;
7481 else
7482 align_offset = len - 1;
7483
4c4b4cd2 7484 if (align_offset < 7 || strncmp ("___XV", name + align_offset - 6, 5) != 0)
14f9c5c9
AS
7485 return TARGET_CHAR_BIT;
7486
4c4b4cd2
PH
7487 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7488}
7489
852dff6c 7490/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7491
852dff6c
JB
7492static struct symbol *
7493ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7494{
7495 struct symbol *sym;
7496
7497 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7498 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7499 return sym;
7500
4186eb54
KS
7501 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7502 return sym;
14f9c5c9
AS
7503}
7504
dddfab26
UW
7505/* Find a type named NAME. Ignores ambiguity. This routine will look
7506 solely for types defined by debug info, it will not search the GDB
7507 primitive types. */
4c4b4cd2 7508
852dff6c 7509static struct type *
ebf56fd3 7510ada_find_any_type (const char *name)
14f9c5c9 7511{
852dff6c 7512 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7513
14f9c5c9 7514 if (sym != NULL)
dddfab26 7515 return SYMBOL_TYPE (sym);
14f9c5c9 7516
dddfab26 7517 return NULL;
14f9c5c9
AS
7518}
7519
739593e0
JB
7520/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7521 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7522 symbol, in which case it is returned. Otherwise, this looks for
7523 symbols whose name is that of NAME_SYM suffixed with "___XR".
7524 Return symbol if found, and NULL otherwise. */
4c4b4cd2
PH
7525
7526struct symbol *
270140bd 7527ada_find_renaming_symbol (struct symbol *name_sym, const struct block *block)
aeb5907d 7528{
739593e0 7529 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
aeb5907d
JB
7530 struct symbol *sym;
7531
739593e0
JB
7532 if (strstr (name, "___XR") != NULL)
7533 return name_sym;
7534
aeb5907d
JB
7535 sym = find_old_style_renaming_symbol (name, block);
7536
7537 if (sym != NULL)
7538 return sym;
7539
0963b4bd 7540 /* Not right yet. FIXME pnh 7/20/2007. */
852dff6c 7541 sym = ada_find_any_type_symbol (name);
aeb5907d
JB
7542 if (sym != NULL && strstr (SYMBOL_LINKAGE_NAME (sym), "___XR") != NULL)
7543 return sym;
7544 else
7545 return NULL;
7546}
7547
7548static struct symbol *
270140bd 7549find_old_style_renaming_symbol (const char *name, const struct block *block)
4c4b4cd2 7550{
7f0df278 7551 const struct symbol *function_sym = block_linkage_function (block);
4c4b4cd2
PH
7552 char *rename;
7553
7554 if (function_sym != NULL)
7555 {
7556 /* If the symbol is defined inside a function, NAME is not fully
7557 qualified. This means we need to prepend the function name
7558 as well as adding the ``___XR'' suffix to build the name of
7559 the associated renaming symbol. */
0d5cff50 7560 const char *function_name = SYMBOL_LINKAGE_NAME (function_sym);
529cad9c
PH
7561 /* Function names sometimes contain suffixes used
7562 for instance to qualify nested subprograms. When building
7563 the XR type name, we need to make sure that this suffix is
7564 not included. So do not include any suffix in the function
7565 name length below. */
69fadcdf 7566 int function_name_len = ada_name_prefix_len (function_name);
76a01679
JB
7567 const int rename_len = function_name_len + 2 /* "__" */
7568 + strlen (name) + 6 /* "___XR\0" */ ;
4c4b4cd2 7569
529cad9c 7570 /* Strip the suffix if necessary. */
69fadcdf
JB
7571 ada_remove_trailing_digits (function_name, &function_name_len);
7572 ada_remove_po_subprogram_suffix (function_name, &function_name_len);
7573 ada_remove_Xbn_suffix (function_name, &function_name_len);
529cad9c 7574
4c4b4cd2
PH
7575 /* Library-level functions are a special case, as GNAT adds
7576 a ``_ada_'' prefix to the function name to avoid namespace
aeb5907d 7577 pollution. However, the renaming symbols themselves do not
4c4b4cd2
PH
7578 have this prefix, so we need to skip this prefix if present. */
7579 if (function_name_len > 5 /* "_ada_" */
7580 && strstr (function_name, "_ada_") == function_name)
69fadcdf
JB
7581 {
7582 function_name += 5;
7583 function_name_len -= 5;
7584 }
4c4b4cd2
PH
7585
7586 rename = (char *) alloca (rename_len * sizeof (char));
69fadcdf
JB
7587 strncpy (rename, function_name, function_name_len);
7588 xsnprintf (rename + function_name_len, rename_len - function_name_len,
7589 "__%s___XR", name);
4c4b4cd2
PH
7590 }
7591 else
7592 {
7593 const int rename_len = strlen (name) + 6;
5b4ee69b 7594
4c4b4cd2 7595 rename = (char *) alloca (rename_len * sizeof (char));
88c15c34 7596 xsnprintf (rename, rename_len * sizeof (char), "%s___XR", name);
4c4b4cd2
PH
7597 }
7598
852dff6c 7599 return ada_find_any_type_symbol (rename);
4c4b4cd2
PH
7600}
7601
14f9c5c9 7602/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7603 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7604 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7605 otherwise return 0. */
7606
14f9c5c9 7607int
d2e4a39e 7608ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7609{
7610 if (type1 == NULL)
7611 return 1;
7612 else if (type0 == NULL)
7613 return 0;
7614 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7615 return 1;
7616 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7617 return 0;
4c4b4cd2
PH
7618 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7619 return 1;
ad82864c 7620 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7621 return 1;
4c4b4cd2
PH
7622 else if (ada_is_array_descriptor_type (type0)
7623 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7624 return 1;
aeb5907d
JB
7625 else
7626 {
7627 const char *type0_name = type_name_no_tag (type0);
7628 const char *type1_name = type_name_no_tag (type1);
7629
7630 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7631 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7632 return 1;
7633 }
14f9c5c9
AS
7634 return 0;
7635}
7636
7637/* The name of TYPE, which is either its TYPE_NAME, or, if that is
4c4b4cd2
PH
7638 null, its TYPE_TAG_NAME. Null if TYPE is null. */
7639
0d5cff50 7640const char *
d2e4a39e 7641ada_type_name (struct type *type)
14f9c5c9 7642{
d2e4a39e 7643 if (type == NULL)
14f9c5c9
AS
7644 return NULL;
7645 else if (TYPE_NAME (type) != NULL)
7646 return TYPE_NAME (type);
7647 else
7648 return TYPE_TAG_NAME (type);
7649}
7650
b4ba55a1
JB
7651/* Search the list of "descriptive" types associated to TYPE for a type
7652 whose name is NAME. */
7653
7654static struct type *
7655find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7656{
7657 struct type *result;
7658
c6044dd1
JB
7659 if (ada_ignore_descriptive_types_p)
7660 return NULL;
7661
b4ba55a1
JB
7662 /* If there no descriptive-type info, then there is no parallel type
7663 to be found. */
7664 if (!HAVE_GNAT_AUX_INFO (type))
7665 return NULL;
7666
7667 result = TYPE_DESCRIPTIVE_TYPE (type);
7668 while (result != NULL)
7669 {
0d5cff50 7670 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7671
7672 if (result_name == NULL)
7673 {
7674 warning (_("unexpected null name on descriptive type"));
7675 return NULL;
7676 }
7677
7678 /* If the names match, stop. */
7679 if (strcmp (result_name, name) == 0)
7680 break;
7681
7682 /* Otherwise, look at the next item on the list, if any. */
7683 if (HAVE_GNAT_AUX_INFO (result))
7684 result = TYPE_DESCRIPTIVE_TYPE (result);
7685 else
7686 result = NULL;
7687 }
7688
7689 /* If we didn't find a match, see whether this is a packed array. With
7690 older compilers, the descriptive type information is either absent or
7691 irrelevant when it comes to packed arrays so the above lookup fails.
7692 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7693 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7694 return ada_find_any_type (name);
7695
7696 return result;
7697}
7698
7699/* Find a parallel type to TYPE with the specified NAME, using the
7700 descriptive type taken from the debugging information, if available,
7701 and otherwise using the (slower) name-based method. */
7702
7703static struct type *
7704ada_find_parallel_type_with_name (struct type *type, const char *name)
7705{
7706 struct type *result = NULL;
7707
7708 if (HAVE_GNAT_AUX_INFO (type))
7709 result = find_parallel_type_by_descriptive_type (type, name);
7710 else
7711 result = ada_find_any_type (name);
7712
7713 return result;
7714}
7715
7716/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7717 SUFFIX to the name of TYPE. */
14f9c5c9 7718
d2e4a39e 7719struct type *
ebf56fd3 7720ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7721{
0d5cff50
DE
7722 char *name;
7723 const char *typename = ada_type_name (type);
14f9c5c9 7724 int len;
d2e4a39e 7725
14f9c5c9
AS
7726 if (typename == NULL)
7727 return NULL;
7728
7729 len = strlen (typename);
7730
b4ba55a1 7731 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9
AS
7732
7733 strcpy (name, typename);
7734 strcpy (name + len, suffix);
7735
b4ba55a1 7736 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7737}
7738
14f9c5c9 7739/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7740 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7741
d2e4a39e
AS
7742static struct type *
7743dynamic_template_type (struct type *type)
14f9c5c9 7744{
61ee279c 7745 type = ada_check_typedef (type);
14f9c5c9
AS
7746
7747 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7748 || ada_type_name (type) == NULL)
14f9c5c9 7749 return NULL;
d2e4a39e 7750 else
14f9c5c9
AS
7751 {
7752 int len = strlen (ada_type_name (type));
5b4ee69b 7753
4c4b4cd2
PH
7754 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7755 return type;
14f9c5c9 7756 else
4c4b4cd2 7757 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7758 }
7759}
7760
7761/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7762 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7763
d2e4a39e
AS
7764static int
7765is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7766{
7767 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7768
d2e4a39e 7769 return name != NULL
14f9c5c9
AS
7770 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
7771 && strstr (name, "___XVL") != NULL;
7772}
7773
4c4b4cd2
PH
7774/* The index of the variant field of TYPE, or -1 if TYPE does not
7775 represent a variant record type. */
14f9c5c9 7776
d2e4a39e 7777static int
4c4b4cd2 7778variant_field_index (struct type *type)
14f9c5c9
AS
7779{
7780 int f;
7781
4c4b4cd2
PH
7782 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
7783 return -1;
7784
7785 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
7786 {
7787 if (ada_is_variant_part (type, f))
7788 return f;
7789 }
7790 return -1;
14f9c5c9
AS
7791}
7792
4c4b4cd2
PH
7793/* A record type with no fields. */
7794
d2e4a39e 7795static struct type *
e9bb382b 7796empty_record (struct type *template)
14f9c5c9 7797{
e9bb382b 7798 struct type *type = alloc_type_copy (template);
5b4ee69b 7799
14f9c5c9
AS
7800 TYPE_CODE (type) = TYPE_CODE_STRUCT;
7801 TYPE_NFIELDS (type) = 0;
7802 TYPE_FIELDS (type) = NULL;
b1f33ddd 7803 INIT_CPLUS_SPECIFIC (type);
14f9c5c9
AS
7804 TYPE_NAME (type) = "<empty>";
7805 TYPE_TAG_NAME (type) = NULL;
14f9c5c9
AS
7806 TYPE_LENGTH (type) = 0;
7807 return type;
7808}
7809
7810/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7811 the value of type TYPE at VALADDR or ADDRESS (see comments at
7812 the beginning of this section) VAL according to GNAT conventions.
7813 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7814 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7815 an outer-level type (i.e., as opposed to a branch of a variant.) A
7816 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7817 of the variant.
14f9c5c9 7818
4c4b4cd2
PH
7819 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7820 length are not statically known are discarded. As a consequence,
7821 VALADDR, ADDRESS and DVAL0 are ignored.
7822
7823 NOTE: Limitations: For now, we assume that dynamic fields and
7824 variants occupy whole numbers of bytes. However, they need not be
7825 byte-aligned. */
7826
7827struct type *
10a2c479 7828ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7829 const gdb_byte *valaddr,
4c4b4cd2
PH
7830 CORE_ADDR address, struct value *dval0,
7831 int keep_dynamic_fields)
14f9c5c9 7832{
d2e4a39e
AS
7833 struct value *mark = value_mark ();
7834 struct value *dval;
7835 struct type *rtype;
14f9c5c9 7836 int nfields, bit_len;
4c4b4cd2 7837 int variant_field;
14f9c5c9 7838 long off;
d94e4f4f 7839 int fld_bit_len;
14f9c5c9
AS
7840 int f;
7841
4c4b4cd2
PH
7842 /* Compute the number of fields in this record type that are going
7843 to be processed: unless keep_dynamic_fields, this includes only
7844 fields whose position and length are static will be processed. */
7845 if (keep_dynamic_fields)
7846 nfields = TYPE_NFIELDS (type);
7847 else
7848 {
7849 nfields = 0;
76a01679 7850 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
7851 && !ada_is_variant_part (type, nfields)
7852 && !is_dynamic_field (type, nfields))
7853 nfields++;
7854 }
7855
e9bb382b 7856 rtype = alloc_type_copy (type);
14f9c5c9
AS
7857 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
7858 INIT_CPLUS_SPECIFIC (rtype);
7859 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 7860 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
7861 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
7862 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
7863 TYPE_NAME (rtype) = ada_type_name (type);
7864 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 7865 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 7866
d2e4a39e
AS
7867 off = 0;
7868 bit_len = 0;
4c4b4cd2
PH
7869 variant_field = -1;
7870
14f9c5c9
AS
7871 for (f = 0; f < nfields; f += 1)
7872 {
6c038f32
PH
7873 off = align_value (off, field_alignment (type, f))
7874 + TYPE_FIELD_BITPOS (type, f);
945b3a32 7875 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 7876 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7877
d2e4a39e 7878 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
7879 {
7880 variant_field = f;
d94e4f4f 7881 fld_bit_len = 0;
4c4b4cd2 7882 }
14f9c5c9 7883 else if (is_dynamic_field (type, f))
4c4b4cd2 7884 {
284614f0
JB
7885 const gdb_byte *field_valaddr = valaddr;
7886 CORE_ADDR field_address = address;
7887 struct type *field_type =
7888 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
7889
4c4b4cd2 7890 if (dval0 == NULL)
b5304971
JG
7891 {
7892 /* rtype's length is computed based on the run-time
7893 value of discriminants. If the discriminants are not
7894 initialized, the type size may be completely bogus and
0963b4bd 7895 GDB may fail to allocate a value for it. So check the
b5304971
JG
7896 size first before creating the value. */
7897 check_size (rtype);
012370f6
TT
7898 /* Using plain value_from_contents_and_address here
7899 causes problems because we will end up trying to
7900 resolve a type that is currently being
7901 constructed. */
7902 dval = value_from_contents_and_address_unresolved (rtype,
7903 valaddr,
7904 address);
9f1f738a 7905 rtype = value_type (dval);
b5304971 7906 }
4c4b4cd2
PH
7907 else
7908 dval = dval0;
7909
284614f0
JB
7910 /* If the type referenced by this field is an aligner type, we need
7911 to unwrap that aligner type, because its size might not be set.
7912 Keeping the aligner type would cause us to compute the wrong
7913 size for this field, impacting the offset of the all the fields
7914 that follow this one. */
7915 if (ada_is_aligner_type (field_type))
7916 {
7917 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
7918
7919 field_valaddr = cond_offset_host (field_valaddr, field_offset);
7920 field_address = cond_offset_target (field_address, field_offset);
7921 field_type = ada_aligned_type (field_type);
7922 }
7923
7924 field_valaddr = cond_offset_host (field_valaddr,
7925 off / TARGET_CHAR_BIT);
7926 field_address = cond_offset_target (field_address,
7927 off / TARGET_CHAR_BIT);
7928
7929 /* Get the fixed type of the field. Note that, in this case,
7930 we do not want to get the real type out of the tag: if
7931 the current field is the parent part of a tagged record,
7932 we will get the tag of the object. Clearly wrong: the real
7933 type of the parent is not the real type of the child. We
7934 would end up in an infinite loop. */
7935 field_type = ada_get_base_type (field_type);
7936 field_type = ada_to_fixed_type (field_type, field_valaddr,
7937 field_address, dval, 0);
27f2a97b
JB
7938 /* If the field size is already larger than the maximum
7939 object size, then the record itself will necessarily
7940 be larger than the maximum object size. We need to make
7941 this check now, because the size might be so ridiculously
7942 large (due to an uninitialized variable in the inferior)
7943 that it would cause an overflow when adding it to the
7944 record size. */
7945 check_size (field_type);
284614f0
JB
7946
7947 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 7948 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
7949 /* The multiplication can potentially overflow. But because
7950 the field length has been size-checked just above, and
7951 assuming that the maximum size is a reasonable value,
7952 an overflow should not happen in practice. So rather than
7953 adding overflow recovery code to this already complex code,
7954 we just assume that it's not going to happen. */
d94e4f4f 7955 fld_bit_len =
4c4b4cd2
PH
7956 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
7957 }
14f9c5c9 7958 else
4c4b4cd2 7959 {
5ded5331
JB
7960 /* Note: If this field's type is a typedef, it is important
7961 to preserve the typedef layer.
7962
7963 Otherwise, we might be transforming a typedef to a fat
7964 pointer (encoding a pointer to an unconstrained array),
7965 into a basic fat pointer (encoding an unconstrained
7966 array). As both types are implemented using the same
7967 structure, the typedef is the only clue which allows us
7968 to distinguish between the two options. Stripping it
7969 would prevent us from printing this field appropriately. */
7970 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
7971 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
7972 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 7973 fld_bit_len =
4c4b4cd2
PH
7974 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
7975 else
5ded5331
JB
7976 {
7977 struct type *field_type = TYPE_FIELD_TYPE (type, f);
7978
7979 /* We need to be careful of typedefs when computing
7980 the length of our field. If this is a typedef,
7981 get the length of the target type, not the length
7982 of the typedef. */
7983 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
7984 field_type = ada_typedef_target_type (field_type);
7985
7986 fld_bit_len =
7987 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
7988 }
4c4b4cd2 7989 }
14f9c5c9 7990 if (off + fld_bit_len > bit_len)
4c4b4cd2 7991 bit_len = off + fld_bit_len;
d94e4f4f 7992 off += fld_bit_len;
4c4b4cd2
PH
7993 TYPE_LENGTH (rtype) =
7994 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 7995 }
4c4b4cd2
PH
7996
7997 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 7998 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
7999 the record. This can happen in the presence of representation
8000 clauses. */
8001 if (variant_field >= 0)
8002 {
8003 struct type *branch_type;
8004
8005 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8006
8007 if (dval0 == NULL)
9f1f738a 8008 {
012370f6
TT
8009 /* Using plain value_from_contents_and_address here causes
8010 problems because we will end up trying to resolve a type
8011 that is currently being constructed. */
8012 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8013 address);
9f1f738a
SA
8014 rtype = value_type (dval);
8015 }
4c4b4cd2
PH
8016 else
8017 dval = dval0;
8018
8019 branch_type =
8020 to_fixed_variant_branch_type
8021 (TYPE_FIELD_TYPE (type, variant_field),
8022 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8023 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8024 if (branch_type == NULL)
8025 {
8026 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8027 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8028 TYPE_NFIELDS (rtype) -= 1;
8029 }
8030 else
8031 {
8032 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8033 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8034 fld_bit_len =
8035 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8036 TARGET_CHAR_BIT;
8037 if (off + fld_bit_len > bit_len)
8038 bit_len = off + fld_bit_len;
8039 TYPE_LENGTH (rtype) =
8040 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8041 }
8042 }
8043
714e53ab
PH
8044 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8045 should contain the alignment of that record, which should be a strictly
8046 positive value. If null or negative, then something is wrong, most
8047 probably in the debug info. In that case, we don't round up the size
0963b4bd 8048 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8049 the current RTYPE length might be good enough for our purposes. */
8050 if (TYPE_LENGTH (type) <= 0)
8051 {
323e0a4a
AC
8052 if (TYPE_NAME (rtype))
8053 warning (_("Invalid type size for `%s' detected: %d."),
8054 TYPE_NAME (rtype), TYPE_LENGTH (type));
8055 else
8056 warning (_("Invalid type size for <unnamed> detected: %d."),
8057 TYPE_LENGTH (type));
714e53ab
PH
8058 }
8059 else
8060 {
8061 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8062 TYPE_LENGTH (type));
8063 }
14f9c5c9
AS
8064
8065 value_free_to_mark (mark);
d2e4a39e 8066 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8067 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8068 return rtype;
8069}
8070
4c4b4cd2
PH
8071/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8072 of 1. */
14f9c5c9 8073
d2e4a39e 8074static struct type *
fc1a4b47 8075template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8076 CORE_ADDR address, struct value *dval0)
8077{
8078 return ada_template_to_fixed_record_type_1 (type, valaddr,
8079 address, dval0, 1);
8080}
8081
8082/* An ordinary record type in which ___XVL-convention fields and
8083 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8084 static approximations, containing all possible fields. Uses
8085 no runtime values. Useless for use in values, but that's OK,
8086 since the results are used only for type determinations. Works on both
8087 structs and unions. Representation note: to save space, we memorize
8088 the result of this function in the TYPE_TARGET_TYPE of the
8089 template type. */
8090
8091static struct type *
8092template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8093{
8094 struct type *type;
8095 int nfields;
8096 int f;
8097
4c4b4cd2
PH
8098 if (TYPE_TARGET_TYPE (type0) != NULL)
8099 return TYPE_TARGET_TYPE (type0);
8100
8101 nfields = TYPE_NFIELDS (type0);
8102 type = type0;
14f9c5c9
AS
8103
8104 for (f = 0; f < nfields; f += 1)
8105 {
61ee279c 8106 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type0, f));
4c4b4cd2 8107 struct type *new_type;
14f9c5c9 8108
4c4b4cd2
PH
8109 if (is_dynamic_field (type0, f))
8110 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
14f9c5c9 8111 else
f192137b 8112 new_type = static_unwrap_type (field_type);
4c4b4cd2
PH
8113 if (type == type0 && new_type != field_type)
8114 {
e9bb382b 8115 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
4c4b4cd2
PH
8116 TYPE_CODE (type) = TYPE_CODE (type0);
8117 INIT_CPLUS_SPECIFIC (type);
8118 TYPE_NFIELDS (type) = nfields;
8119 TYPE_FIELDS (type) = (struct field *)
8120 TYPE_ALLOC (type, nfields * sizeof (struct field));
8121 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8122 sizeof (struct field) * nfields);
8123 TYPE_NAME (type) = ada_type_name (type0);
8124 TYPE_TAG_NAME (type) = NULL;
876cecd0 8125 TYPE_FIXED_INSTANCE (type) = 1;
4c4b4cd2
PH
8126 TYPE_LENGTH (type) = 0;
8127 }
8128 TYPE_FIELD_TYPE (type, f) = new_type;
8129 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
14f9c5c9 8130 }
14f9c5c9
AS
8131 return type;
8132}
8133
4c4b4cd2 8134/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8135 whose address in memory is ADDRESS, returns a revision of TYPE,
8136 which should be a non-dynamic-sized record, in which the variant
8137 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8138 for discriminant values in DVAL0, which can be NULL if the record
8139 contains the necessary discriminant values. */
8140
d2e4a39e 8141static struct type *
fc1a4b47 8142to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8143 CORE_ADDR address, struct value *dval0)
14f9c5c9 8144{
d2e4a39e 8145 struct value *mark = value_mark ();
4c4b4cd2 8146 struct value *dval;
d2e4a39e 8147 struct type *rtype;
14f9c5c9
AS
8148 struct type *branch_type;
8149 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8150 int variant_field = variant_field_index (type);
14f9c5c9 8151
4c4b4cd2 8152 if (variant_field == -1)
14f9c5c9
AS
8153 return type;
8154
4c4b4cd2 8155 if (dval0 == NULL)
9f1f738a
SA
8156 {
8157 dval = value_from_contents_and_address (type, valaddr, address);
8158 type = value_type (dval);
8159 }
4c4b4cd2
PH
8160 else
8161 dval = dval0;
8162
e9bb382b 8163 rtype = alloc_type_copy (type);
14f9c5c9 8164 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
4c4b4cd2
PH
8165 INIT_CPLUS_SPECIFIC (rtype);
8166 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8167 TYPE_FIELDS (rtype) =
8168 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8169 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8170 sizeof (struct field) * nfields);
14f9c5c9
AS
8171 TYPE_NAME (rtype) = ada_type_name (type);
8172 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 8173 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8174 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8175
4c4b4cd2
PH
8176 branch_type = to_fixed_variant_branch_type
8177 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8178 cond_offset_host (valaddr,
4c4b4cd2
PH
8179 TYPE_FIELD_BITPOS (type, variant_field)
8180 / TARGET_CHAR_BIT),
d2e4a39e 8181 cond_offset_target (address,
4c4b4cd2
PH
8182 TYPE_FIELD_BITPOS (type, variant_field)
8183 / TARGET_CHAR_BIT), dval);
d2e4a39e 8184 if (branch_type == NULL)
14f9c5c9 8185 {
4c4b4cd2 8186 int f;
5b4ee69b 8187
4c4b4cd2
PH
8188 for (f = variant_field + 1; f < nfields; f += 1)
8189 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8190 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8191 }
8192 else
8193 {
4c4b4cd2
PH
8194 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8195 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8196 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8197 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8198 }
4c4b4cd2 8199 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8200
4c4b4cd2 8201 value_free_to_mark (mark);
14f9c5c9
AS
8202 return rtype;
8203}
8204
8205/* An ordinary record type (with fixed-length fields) that describes
8206 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8207 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8208 should be in DVAL, a record value; it may be NULL if the object
8209 at ADDR itself contains any necessary discriminant values.
8210 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8211 values from the record are needed. Except in the case that DVAL,
8212 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8213 unchecked) is replaced by a particular branch of the variant.
8214
8215 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8216 is questionable and may be removed. It can arise during the
8217 processing of an unconstrained-array-of-record type where all the
8218 variant branches have exactly the same size. This is because in
8219 such cases, the compiler does not bother to use the XVS convention
8220 when encoding the record. I am currently dubious of this
8221 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8222
d2e4a39e 8223static struct type *
fc1a4b47 8224to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8225 CORE_ADDR address, struct value *dval)
14f9c5c9 8226{
d2e4a39e 8227 struct type *templ_type;
14f9c5c9 8228
876cecd0 8229 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8230 return type0;
8231
d2e4a39e 8232 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8233
8234 if (templ_type != NULL)
8235 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8236 else if (variant_field_index (type0) >= 0)
8237 {
8238 if (dval == NULL && valaddr == NULL && address == 0)
8239 return type0;
8240 return to_record_with_fixed_variant_part (type0, valaddr, address,
8241 dval);
8242 }
14f9c5c9
AS
8243 else
8244 {
876cecd0 8245 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8246 return type0;
8247 }
8248
8249}
8250
8251/* An ordinary record type (with fixed-length fields) that describes
8252 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8253 union type. Any necessary discriminants' values should be in DVAL,
8254 a record value. That is, this routine selects the appropriate
8255 branch of the union at ADDR according to the discriminant value
b1f33ddd 8256 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8257 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8258
d2e4a39e 8259static struct type *
fc1a4b47 8260to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8261 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8262{
8263 int which;
d2e4a39e
AS
8264 struct type *templ_type;
8265 struct type *var_type;
14f9c5c9
AS
8266
8267 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8268 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8269 else
14f9c5c9
AS
8270 var_type = var_type0;
8271
8272 templ_type = ada_find_parallel_type (var_type, "___XVU");
8273
8274 if (templ_type != NULL)
8275 var_type = templ_type;
8276
b1f33ddd
JB
8277 if (is_unchecked_variant (var_type, value_type (dval)))
8278 return var_type0;
d2e4a39e
AS
8279 which =
8280 ada_which_variant_applies (var_type,
0fd88904 8281 value_type (dval), value_contents (dval));
14f9c5c9
AS
8282
8283 if (which < 0)
e9bb382b 8284 return empty_record (var_type);
14f9c5c9 8285 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8286 return to_fixed_record_type
d2e4a39e
AS
8287 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8288 valaddr, address, dval);
4c4b4cd2 8289 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8290 return
8291 to_fixed_record_type
8292 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8293 else
8294 return TYPE_FIELD_TYPE (var_type, which);
8295}
8296
8297/* Assuming that TYPE0 is an array type describing the type of a value
8298 at ADDR, and that DVAL describes a record containing any
8299 discriminants used in TYPE0, returns a type for the value that
8300 contains no dynamic components (that is, no components whose sizes
8301 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8302 true, gives an error message if the resulting type's size is over
4c4b4cd2 8303 varsize_limit. */
14f9c5c9 8304
d2e4a39e
AS
8305static struct type *
8306to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8307 int ignore_too_big)
14f9c5c9 8308{
d2e4a39e
AS
8309 struct type *index_type_desc;
8310 struct type *result;
ad82864c 8311 int constrained_packed_array_p;
14f9c5c9 8312
b0dd7688 8313 type0 = ada_check_typedef (type0);
284614f0 8314 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8315 return type0;
14f9c5c9 8316
ad82864c
JB
8317 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8318 if (constrained_packed_array_p)
8319 type0 = decode_constrained_packed_array_type (type0);
284614f0 8320
14f9c5c9 8321 index_type_desc = ada_find_parallel_type (type0, "___XA");
28c85d6c 8322 ada_fixup_array_indexes_type (index_type_desc);
14f9c5c9
AS
8323 if (index_type_desc == NULL)
8324 {
61ee279c 8325 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8326
14f9c5c9 8327 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8328 depend on the contents of the array in properly constructed
8329 debugging data. */
529cad9c
PH
8330 /* Create a fixed version of the array element type.
8331 We're not providing the address of an element here,
e1d5a0d2 8332 and thus the actual object value cannot be inspected to do
529cad9c
PH
8333 the conversion. This should not be a problem, since arrays of
8334 unconstrained objects are not allowed. In particular, all
8335 the elements of an array of a tagged type should all be of
8336 the same type specified in the debugging info. No need to
8337 consult the object tag. */
1ed6ede0 8338 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8339
284614f0
JB
8340 /* Make sure we always create a new array type when dealing with
8341 packed array types, since we're going to fix-up the array
8342 type length and element bitsize a little further down. */
ad82864c 8343 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8344 result = type0;
14f9c5c9 8345 else
e9bb382b 8346 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8347 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8348 }
8349 else
8350 {
8351 int i;
8352 struct type *elt_type0;
8353
8354 elt_type0 = type0;
8355 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8356 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8357
8358 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8359 depend on the contents of the array in properly constructed
8360 debugging data. */
529cad9c
PH
8361 /* Create a fixed version of the array element type.
8362 We're not providing the address of an element here,
e1d5a0d2 8363 and thus the actual object value cannot be inspected to do
529cad9c
PH
8364 the conversion. This should not be a problem, since arrays of
8365 unconstrained objects are not allowed. In particular, all
8366 the elements of an array of a tagged type should all be of
8367 the same type specified in the debugging info. No need to
8368 consult the object tag. */
1ed6ede0
JB
8369 result =
8370 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8371
8372 elt_type0 = type0;
14f9c5c9 8373 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8374 {
8375 struct type *range_type =
28c85d6c 8376 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8377
e9bb382b 8378 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8379 result, range_type);
1ce677a4 8380 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8381 }
d2e4a39e 8382 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8383 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8384 }
8385
2e6fda7d
JB
8386 /* We want to preserve the type name. This can be useful when
8387 trying to get the type name of a value that has already been
8388 printed (for instance, if the user did "print VAR; whatis $". */
8389 TYPE_NAME (result) = TYPE_NAME (type0);
8390
ad82864c 8391 if (constrained_packed_array_p)
284614f0
JB
8392 {
8393 /* So far, the resulting type has been created as if the original
8394 type was a regular (non-packed) array type. As a result, the
8395 bitsize of the array elements needs to be set again, and the array
8396 length needs to be recomputed based on that bitsize. */
8397 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8398 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8399
8400 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8401 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8402 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8403 TYPE_LENGTH (result)++;
8404 }
8405
876cecd0 8406 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8407 return result;
d2e4a39e 8408}
14f9c5c9
AS
8409
8410
8411/* A standard type (containing no dynamically sized components)
8412 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8413 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8414 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8415 ADDRESS or in VALADDR contains these discriminants.
8416
1ed6ede0
JB
8417 If CHECK_TAG is not null, in the case of tagged types, this function
8418 attempts to locate the object's tag and use it to compute the actual
8419 type. However, when ADDRESS is null, we cannot use it to determine the
8420 location of the tag, and therefore compute the tagged type's actual type.
8421 So we return the tagged type without consulting the tag. */
529cad9c 8422
f192137b
JB
8423static struct type *
8424ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8425 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8426{
61ee279c 8427 type = ada_check_typedef (type);
d2e4a39e
AS
8428 switch (TYPE_CODE (type))
8429 {
8430 default:
14f9c5c9 8431 return type;
d2e4a39e 8432 case TYPE_CODE_STRUCT:
4c4b4cd2 8433 {
76a01679 8434 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8435 struct type *fixed_record_type =
8436 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8437
529cad9c
PH
8438 /* If STATIC_TYPE is a tagged type and we know the object's address,
8439 then we can determine its tag, and compute the object's actual
0963b4bd 8440 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8441 type (the parent part of the record may have dynamic fields
8442 and the way the location of _tag is expressed may depend on
8443 them). */
529cad9c 8444
1ed6ede0 8445 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8446 {
b50d69b5
JG
8447 struct value *tag =
8448 value_tag_from_contents_and_address
8449 (fixed_record_type,
8450 valaddr,
8451 address);
8452 struct type *real_type = type_from_tag (tag);
8453 struct value *obj =
8454 value_from_contents_and_address (fixed_record_type,
8455 valaddr,
8456 address);
9f1f738a 8457 fixed_record_type = value_type (obj);
76a01679 8458 if (real_type != NULL)
b50d69b5
JG
8459 return to_fixed_record_type
8460 (real_type, NULL,
8461 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8462 }
4af88198
JB
8463
8464 /* Check to see if there is a parallel ___XVZ variable.
8465 If there is, then it provides the actual size of our type. */
8466 else if (ada_type_name (fixed_record_type) != NULL)
8467 {
0d5cff50 8468 const char *name = ada_type_name (fixed_record_type);
4af88198
JB
8469 char *xvz_name = alloca (strlen (name) + 7 /* "___XVZ\0" */);
8470 int xvz_found = 0;
8471 LONGEST size;
8472
88c15c34 8473 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
4af88198
JB
8474 size = get_int_var_value (xvz_name, &xvz_found);
8475 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8476 {
8477 fixed_record_type = copy_type (fixed_record_type);
8478 TYPE_LENGTH (fixed_record_type) = size;
8479
8480 /* The FIXED_RECORD_TYPE may have be a stub. We have
8481 observed this when the debugging info is STABS, and
8482 apparently it is something that is hard to fix.
8483
8484 In practice, we don't need the actual type definition
8485 at all, because the presence of the XVZ variable allows us
8486 to assume that there must be a XVS type as well, which we
8487 should be able to use later, when we need the actual type
8488 definition.
8489
8490 In the meantime, pretend that the "fixed" type we are
8491 returning is NOT a stub, because this can cause trouble
8492 when using this type to create new types targeting it.
8493 Indeed, the associated creation routines often check
8494 whether the target type is a stub and will try to replace
0963b4bd 8495 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8496 might cause the new type to have the wrong size too.
8497 Consider the case of an array, for instance, where the size
8498 of the array is computed from the number of elements in
8499 our array multiplied by the size of its element. */
8500 TYPE_STUB (fixed_record_type) = 0;
8501 }
8502 }
1ed6ede0 8503 return fixed_record_type;
4c4b4cd2 8504 }
d2e4a39e 8505 case TYPE_CODE_ARRAY:
4c4b4cd2 8506 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8507 case TYPE_CODE_UNION:
8508 if (dval == NULL)
4c4b4cd2 8509 return type;
d2e4a39e 8510 else
4c4b4cd2 8511 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8512 }
14f9c5c9
AS
8513}
8514
f192137b
JB
8515/* The same as ada_to_fixed_type_1, except that it preserves the type
8516 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8517
8518 The typedef layer needs be preserved in order to differentiate between
8519 arrays and array pointers when both types are implemented using the same
8520 fat pointer. In the array pointer case, the pointer is encoded as
8521 a typedef of the pointer type. For instance, considering:
8522
8523 type String_Access is access String;
8524 S1 : String_Access := null;
8525
8526 To the debugger, S1 is defined as a typedef of type String. But
8527 to the user, it is a pointer. So if the user tries to print S1,
8528 we should not dereference the array, but print the array address
8529 instead.
8530
8531 If we didn't preserve the typedef layer, we would lose the fact that
8532 the type is to be presented as a pointer (needs de-reference before
8533 being printed). And we would also use the source-level type name. */
f192137b
JB
8534
8535struct type *
8536ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8537 CORE_ADDR address, struct value *dval, int check_tag)
8538
8539{
8540 struct type *fixed_type =
8541 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8542
96dbd2c1
JB
8543 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8544 then preserve the typedef layer.
8545
8546 Implementation note: We can only check the main-type portion of
8547 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8548 from TYPE now returns a type that has the same instance flags
8549 as TYPE. For instance, if TYPE is a "typedef const", and its
8550 target type is a "struct", then the typedef elimination will return
8551 a "const" version of the target type. See check_typedef for more
8552 details about how the typedef layer elimination is done.
8553
8554 brobecker/2010-11-19: It seems to me that the only case where it is
8555 useful to preserve the typedef layer is when dealing with fat pointers.
8556 Perhaps, we could add a check for that and preserve the typedef layer
8557 only in that situation. But this seems unecessary so far, probably
8558 because we call check_typedef/ada_check_typedef pretty much everywhere.
8559 */
f192137b 8560 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8561 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8562 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8563 return type;
8564
8565 return fixed_type;
8566}
8567
14f9c5c9 8568/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8569 TYPE0, but based on no runtime data. */
14f9c5c9 8570
d2e4a39e
AS
8571static struct type *
8572to_static_fixed_type (struct type *type0)
14f9c5c9 8573{
d2e4a39e 8574 struct type *type;
14f9c5c9
AS
8575
8576 if (type0 == NULL)
8577 return NULL;
8578
876cecd0 8579 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8580 return type0;
8581
61ee279c 8582 type0 = ada_check_typedef (type0);
d2e4a39e 8583
14f9c5c9
AS
8584 switch (TYPE_CODE (type0))
8585 {
8586 default:
8587 return type0;
8588 case TYPE_CODE_STRUCT:
8589 type = dynamic_template_type (type0);
d2e4a39e 8590 if (type != NULL)
4c4b4cd2
PH
8591 return template_to_static_fixed_type (type);
8592 else
8593 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8594 case TYPE_CODE_UNION:
8595 type = ada_find_parallel_type (type0, "___XVU");
8596 if (type != NULL)
4c4b4cd2
PH
8597 return template_to_static_fixed_type (type);
8598 else
8599 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8600 }
8601}
8602
4c4b4cd2
PH
8603/* A static approximation of TYPE with all type wrappers removed. */
8604
d2e4a39e
AS
8605static struct type *
8606static_unwrap_type (struct type *type)
14f9c5c9
AS
8607{
8608 if (ada_is_aligner_type (type))
8609 {
61ee279c 8610 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8611 if (ada_type_name (type1) == NULL)
4c4b4cd2 8612 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8613
8614 return static_unwrap_type (type1);
8615 }
d2e4a39e 8616 else
14f9c5c9 8617 {
d2e4a39e 8618 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8619
d2e4a39e 8620 if (raw_real_type == type)
4c4b4cd2 8621 return type;
14f9c5c9 8622 else
4c4b4cd2 8623 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8624 }
8625}
8626
8627/* In some cases, incomplete and private types require
4c4b4cd2 8628 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8629 type Foo;
8630 type FooP is access Foo;
8631 V: FooP;
8632 type Foo is array ...;
4c4b4cd2 8633 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8634 cross-references to such types, we instead substitute for FooP a
8635 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8636 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8637
8638/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8639 exists, otherwise TYPE. */
8640
d2e4a39e 8641struct type *
61ee279c 8642ada_check_typedef (struct type *type)
14f9c5c9 8643{
727e3d2e
JB
8644 if (type == NULL)
8645 return NULL;
8646
720d1a40
JB
8647 /* If our type is a typedef type of a fat pointer, then we're done.
8648 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8649 what allows us to distinguish between fat pointers that represent
8650 array types, and fat pointers that represent array access types
8651 (in both cases, the compiler implements them as fat pointers). */
8652 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
8653 && is_thick_pntr (ada_typedef_target_type (type)))
8654 return type;
8655
14f9c5c9
AS
8656 CHECK_TYPEDEF (type);
8657 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 8658 || !TYPE_STUB (type)
14f9c5c9
AS
8659 || TYPE_TAG_NAME (type) == NULL)
8660 return type;
d2e4a39e 8661 else
14f9c5c9 8662 {
0d5cff50 8663 const char *name = TYPE_TAG_NAME (type);
d2e4a39e 8664 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8665
05e522ef
JB
8666 if (type1 == NULL)
8667 return type;
8668
8669 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8670 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8671 types, only for the typedef-to-array types). If that's the case,
8672 strip the typedef layer. */
8673 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
8674 type1 = ada_check_typedef (type1);
8675
8676 return type1;
14f9c5c9
AS
8677 }
8678}
8679
8680/* A value representing the data at VALADDR/ADDRESS as described by
8681 type TYPE0, but with a standard (static-sized) type that correctly
8682 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8683 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8684 creation of struct values]. */
14f9c5c9 8685
4c4b4cd2
PH
8686static struct value *
8687ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
8688 struct value *val0)
14f9c5c9 8689{
1ed6ede0 8690 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8691
14f9c5c9
AS
8692 if (type == type0 && val0 != NULL)
8693 return val0;
d2e4a39e 8694 else
4c4b4cd2
PH
8695 return value_from_contents_and_address (type, 0, address);
8696}
8697
8698/* A value representing VAL, but with a standard (static-sized) type
8699 that correctly describes it. Does not necessarily create a new
8700 value. */
8701
0c3acc09 8702struct value *
4c4b4cd2
PH
8703ada_to_fixed_value (struct value *val)
8704{
c48db5ca
JB
8705 val = unwrap_value (val);
8706 val = ada_to_fixed_value_create (value_type (val),
8707 value_address (val),
8708 val);
8709 return val;
14f9c5c9 8710}
d2e4a39e 8711\f
14f9c5c9 8712
14f9c5c9
AS
8713/* Attributes */
8714
4c4b4cd2
PH
8715/* Table mapping attribute numbers to names.
8716 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8717
d2e4a39e 8718static const char *attribute_names[] = {
14f9c5c9
AS
8719 "<?>",
8720
d2e4a39e 8721 "first",
14f9c5c9
AS
8722 "last",
8723 "length",
8724 "image",
14f9c5c9
AS
8725 "max",
8726 "min",
4c4b4cd2
PH
8727 "modulus",
8728 "pos",
8729 "size",
8730 "tag",
14f9c5c9 8731 "val",
14f9c5c9
AS
8732 0
8733};
8734
d2e4a39e 8735const char *
4c4b4cd2 8736ada_attribute_name (enum exp_opcode n)
14f9c5c9 8737{
4c4b4cd2
PH
8738 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8739 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8740 else
8741 return attribute_names[0];
8742}
8743
4c4b4cd2 8744/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8745
4c4b4cd2
PH
8746static LONGEST
8747pos_atr (struct value *arg)
14f9c5c9 8748{
24209737
PH
8749 struct value *val = coerce_ref (arg);
8750 struct type *type = value_type (val);
14f9c5c9 8751
d2e4a39e 8752 if (!discrete_type_p (type))
323e0a4a 8753 error (_("'POS only defined on discrete types"));
14f9c5c9
AS
8754
8755 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8756 {
8757 int i;
24209737 8758 LONGEST v = value_as_long (val);
14f9c5c9 8759
d2e4a39e 8760 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2 8761 {
14e75d8e 8762 if (v == TYPE_FIELD_ENUMVAL (type, i))
4c4b4cd2
PH
8763 return i;
8764 }
323e0a4a 8765 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9
AS
8766 }
8767 else
24209737 8768 return value_as_long (val);
4c4b4cd2
PH
8769}
8770
8771static struct value *
3cb382c9 8772value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8773{
3cb382c9 8774 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8775}
8776
4c4b4cd2 8777/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8778
d2e4a39e
AS
8779static struct value *
8780value_val_atr (struct type *type, struct value *arg)
14f9c5c9 8781{
d2e4a39e 8782 if (!discrete_type_p (type))
323e0a4a 8783 error (_("'VAL only defined on discrete types"));
df407dfe 8784 if (!integer_type_p (value_type (arg)))
323e0a4a 8785 error (_("'VAL requires integral argument"));
14f9c5c9
AS
8786
8787 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8788 {
8789 long pos = value_as_long (arg);
5b4ee69b 8790
14f9c5c9 8791 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 8792 error (_("argument to 'VAL out of range"));
14e75d8e 8793 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
8794 }
8795 else
8796 return value_from_longest (type, value_as_long (arg));
8797}
14f9c5c9 8798\f
d2e4a39e 8799
4c4b4cd2 8800 /* Evaluation */
14f9c5c9 8801
4c4b4cd2
PH
8802/* True if TYPE appears to be an Ada character type.
8803 [At the moment, this is true only for Character and Wide_Character;
8804 It is a heuristic test that could stand improvement]. */
14f9c5c9 8805
d2e4a39e
AS
8806int
8807ada_is_character_type (struct type *type)
14f9c5c9 8808{
7b9f71f2
JB
8809 const char *name;
8810
8811 /* If the type code says it's a character, then assume it really is,
8812 and don't check any further. */
8813 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
8814 return 1;
8815
8816 /* Otherwise, assume it's a character type iff it is a discrete type
8817 with a known character type name. */
8818 name = ada_type_name (type);
8819 return (name != NULL
8820 && (TYPE_CODE (type) == TYPE_CODE_INT
8821 || TYPE_CODE (type) == TYPE_CODE_RANGE)
8822 && (strcmp (name, "character") == 0
8823 || strcmp (name, "wide_character") == 0
5a517ebd 8824 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 8825 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
8826}
8827
4c4b4cd2 8828/* True if TYPE appears to be an Ada string type. */
14f9c5c9
AS
8829
8830int
ebf56fd3 8831ada_is_string_type (struct type *type)
14f9c5c9 8832{
61ee279c 8833 type = ada_check_typedef (type);
d2e4a39e 8834 if (type != NULL
14f9c5c9 8835 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
8836 && (ada_is_simple_array_type (type)
8837 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
8838 && ada_array_arity (type) == 1)
8839 {
8840 struct type *elttype = ada_array_element_type (type, 1);
8841
8842 return ada_is_character_type (elttype);
8843 }
d2e4a39e 8844 else
14f9c5c9
AS
8845 return 0;
8846}
8847
5bf03f13
JB
8848/* The compiler sometimes provides a parallel XVS type for a given
8849 PAD type. Normally, it is safe to follow the PAD type directly,
8850 but older versions of the compiler have a bug that causes the offset
8851 of its "F" field to be wrong. Following that field in that case
8852 would lead to incorrect results, but this can be worked around
8853 by ignoring the PAD type and using the associated XVS type instead.
8854
8855 Set to True if the debugger should trust the contents of PAD types.
8856 Otherwise, ignore the PAD type if there is a parallel XVS type. */
8857static int trust_pad_over_xvs = 1;
14f9c5c9
AS
8858
8859/* True if TYPE is a struct type introduced by the compiler to force the
8860 alignment of a value. Such types have a single field with a
4c4b4cd2 8861 distinctive name. */
14f9c5c9
AS
8862
8863int
ebf56fd3 8864ada_is_aligner_type (struct type *type)
14f9c5c9 8865{
61ee279c 8866 type = ada_check_typedef (type);
714e53ab 8867
5bf03f13 8868 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
8869 return 0;
8870
14f9c5c9 8871 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
8872 && TYPE_NFIELDS (type) == 1
8873 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
8874}
8875
8876/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 8877 the parallel type. */
14f9c5c9 8878
d2e4a39e
AS
8879struct type *
8880ada_get_base_type (struct type *raw_type)
14f9c5c9 8881{
d2e4a39e
AS
8882 struct type *real_type_namer;
8883 struct type *raw_real_type;
14f9c5c9
AS
8884
8885 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
8886 return raw_type;
8887
284614f0
JB
8888 if (ada_is_aligner_type (raw_type))
8889 /* The encoding specifies that we should always use the aligner type.
8890 So, even if this aligner type has an associated XVS type, we should
8891 simply ignore it.
8892
8893 According to the compiler gurus, an XVS type parallel to an aligner
8894 type may exist because of a stabs limitation. In stabs, aligner
8895 types are empty because the field has a variable-sized type, and
8896 thus cannot actually be used as an aligner type. As a result,
8897 we need the associated parallel XVS type to decode the type.
8898 Since the policy in the compiler is to not change the internal
8899 representation based on the debugging info format, we sometimes
8900 end up having a redundant XVS type parallel to the aligner type. */
8901 return raw_type;
8902
14f9c5c9 8903 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 8904 if (real_type_namer == NULL
14f9c5c9
AS
8905 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
8906 || TYPE_NFIELDS (real_type_namer) != 1)
8907 return raw_type;
8908
f80d3ff2
JB
8909 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
8910 {
8911 /* This is an older encoding form where the base type needs to be
8912 looked up by name. We prefer the newer enconding because it is
8913 more efficient. */
8914 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
8915 if (raw_real_type == NULL)
8916 return raw_type;
8917 else
8918 return raw_real_type;
8919 }
8920
8921 /* The field in our XVS type is a reference to the base type. */
8922 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 8923}
14f9c5c9 8924
4c4b4cd2 8925/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 8926
d2e4a39e
AS
8927struct type *
8928ada_aligned_type (struct type *type)
14f9c5c9
AS
8929{
8930 if (ada_is_aligner_type (type))
8931 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
8932 else
8933 return ada_get_base_type (type);
8934}
8935
8936
8937/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 8938 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 8939
fc1a4b47
AC
8940const gdb_byte *
8941ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 8942{
d2e4a39e 8943 if (ada_is_aligner_type (type))
14f9c5c9 8944 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
8945 valaddr +
8946 TYPE_FIELD_BITPOS (type,
8947 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
8948 else
8949 return valaddr;
8950}
8951
4c4b4cd2
PH
8952
8953
14f9c5c9 8954/* The printed representation of an enumeration literal with encoded
4c4b4cd2 8955 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
8956const char *
8957ada_enum_name (const char *name)
14f9c5c9 8958{
4c4b4cd2
PH
8959 static char *result;
8960 static size_t result_len = 0;
d2e4a39e 8961 char *tmp;
14f9c5c9 8962
4c4b4cd2
PH
8963 /* First, unqualify the enumeration name:
8964 1. Search for the last '.' character. If we find one, then skip
177b42fe 8965 all the preceding characters, the unqualified name starts
76a01679 8966 right after that dot.
4c4b4cd2 8967 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
8968 translates dots into "__". Search forward for double underscores,
8969 but stop searching when we hit an overloading suffix, which is
8970 of the form "__" followed by digits. */
4c4b4cd2 8971
c3e5cd34
PH
8972 tmp = strrchr (name, '.');
8973 if (tmp != NULL)
4c4b4cd2
PH
8974 name = tmp + 1;
8975 else
14f9c5c9 8976 {
4c4b4cd2
PH
8977 while ((tmp = strstr (name, "__")) != NULL)
8978 {
8979 if (isdigit (tmp[2]))
8980 break;
8981 else
8982 name = tmp + 2;
8983 }
14f9c5c9
AS
8984 }
8985
8986 if (name[0] == 'Q')
8987 {
14f9c5c9 8988 int v;
5b4ee69b 8989
14f9c5c9 8990 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
8991 {
8992 if (sscanf (name + 2, "%x", &v) != 1)
8993 return name;
8994 }
14f9c5c9 8995 else
4c4b4cd2 8996 return name;
14f9c5c9 8997
4c4b4cd2 8998 GROW_VECT (result, result_len, 16);
14f9c5c9 8999 if (isascii (v) && isprint (v))
88c15c34 9000 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9001 else if (name[1] == 'U')
88c15c34 9002 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9003 else
88c15c34 9004 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9005
9006 return result;
9007 }
d2e4a39e 9008 else
4c4b4cd2 9009 {
c3e5cd34
PH
9010 tmp = strstr (name, "__");
9011 if (tmp == NULL)
9012 tmp = strstr (name, "$");
9013 if (tmp != NULL)
4c4b4cd2
PH
9014 {
9015 GROW_VECT (result, result_len, tmp - name + 1);
9016 strncpy (result, name, tmp - name);
9017 result[tmp - name] = '\0';
9018 return result;
9019 }
9020
9021 return name;
9022 }
14f9c5c9
AS
9023}
9024
14f9c5c9
AS
9025/* Evaluate the subexpression of EXP starting at *POS as for
9026 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9027 expression. */
14f9c5c9 9028
d2e4a39e
AS
9029static struct value *
9030evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9031{
4b27a620 9032 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9033}
9034
9035/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9036 value it wraps. */
14f9c5c9 9037
d2e4a39e
AS
9038static struct value *
9039unwrap_value (struct value *val)
14f9c5c9 9040{
df407dfe 9041 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9042
14f9c5c9
AS
9043 if (ada_is_aligner_type (type))
9044 {
de4d072f 9045 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9046 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9047
14f9c5c9 9048 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9049 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9050
9051 return unwrap_value (v);
9052 }
d2e4a39e 9053 else
14f9c5c9 9054 {
d2e4a39e 9055 struct type *raw_real_type =
61ee279c 9056 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9057
5bf03f13
JB
9058 /* If there is no parallel XVS or XVE type, then the value is
9059 already unwrapped. Return it without further modification. */
9060 if ((type == raw_real_type)
9061 && ada_find_parallel_type (type, "___XVE") == NULL)
9062 return val;
14f9c5c9 9063
d2e4a39e 9064 return
4c4b4cd2
PH
9065 coerce_unspec_val_to_type
9066 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9067 value_address (val),
1ed6ede0 9068 NULL, 1));
14f9c5c9
AS
9069 }
9070}
d2e4a39e
AS
9071
9072static struct value *
9073cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9
AS
9074{
9075 LONGEST val;
9076
df407dfe 9077 if (type == value_type (arg))
14f9c5c9 9078 return arg;
df407dfe 9079 else if (ada_is_fixed_point_type (value_type (arg)))
d2e4a39e 9080 val = ada_float_to_fixed (type,
df407dfe 9081 ada_fixed_to_float (value_type (arg),
4c4b4cd2 9082 value_as_long (arg)));
d2e4a39e 9083 else
14f9c5c9 9084 {
a53b7a21 9085 DOUBLEST argd = value_as_double (arg);
5b4ee69b 9086
14f9c5c9
AS
9087 val = ada_float_to_fixed (type, argd);
9088 }
9089
9090 return value_from_longest (type, val);
9091}
9092
d2e4a39e 9093static struct value *
a53b7a21 9094cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9095{
df407dfe 9096 DOUBLEST val = ada_fixed_to_float (value_type (arg),
4c4b4cd2 9097 value_as_long (arg));
5b4ee69b 9098
a53b7a21 9099 return value_from_double (type, val);
14f9c5c9
AS
9100}
9101
d99dcf51
JB
9102/* Given two array types T1 and T2, return nonzero iff both arrays
9103 contain the same number of elements. */
9104
9105static int
9106ada_same_array_size_p (struct type *t1, struct type *t2)
9107{
9108 LONGEST lo1, hi1, lo2, hi2;
9109
9110 /* Get the array bounds in order to verify that the size of
9111 the two arrays match. */
9112 if (!get_array_bounds (t1, &lo1, &hi1)
9113 || !get_array_bounds (t2, &lo2, &hi2))
9114 error (_("unable to determine array bounds"));
9115
9116 /* To make things easier for size comparison, normalize a bit
9117 the case of empty arrays by making sure that the difference
9118 between upper bound and lower bound is always -1. */
9119 if (lo1 > hi1)
9120 hi1 = lo1 - 1;
9121 if (lo2 > hi2)
9122 hi2 = lo2 - 1;
9123
9124 return (hi1 - lo1 == hi2 - lo2);
9125}
9126
9127/* Assuming that VAL is an array of integrals, and TYPE represents
9128 an array with the same number of elements, but with wider integral
9129 elements, return an array "casted" to TYPE. In practice, this
9130 means that the returned array is built by casting each element
9131 of the original array into TYPE's (wider) element type. */
9132
9133static struct value *
9134ada_promote_array_of_integrals (struct type *type, struct value *val)
9135{
9136 struct type *elt_type = TYPE_TARGET_TYPE (type);
9137 LONGEST lo, hi;
9138 struct value *res;
9139 LONGEST i;
9140
9141 /* Verify that both val and type are arrays of scalars, and
9142 that the size of val's elements is smaller than the size
9143 of type's element. */
9144 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9145 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9146 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9147 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9148 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9149 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9150
9151 if (!get_array_bounds (type, &lo, &hi))
9152 error (_("unable to determine array bounds"));
9153
9154 res = allocate_value (type);
9155
9156 /* Promote each array element. */
9157 for (i = 0; i < hi - lo + 1; i++)
9158 {
9159 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9160
9161 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9162 value_contents_all (elt), TYPE_LENGTH (elt_type));
9163 }
9164
9165 return res;
9166}
9167
4c4b4cd2
PH
9168/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9169 return the converted value. */
9170
d2e4a39e
AS
9171static struct value *
9172coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9173{
df407dfe 9174 struct type *type2 = value_type (val);
5b4ee69b 9175
14f9c5c9
AS
9176 if (type == type2)
9177 return val;
9178
61ee279c
PH
9179 type2 = ada_check_typedef (type2);
9180 type = ada_check_typedef (type);
14f9c5c9 9181
d2e4a39e
AS
9182 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9183 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9184 {
9185 val = ada_value_ind (val);
df407dfe 9186 type2 = value_type (val);
14f9c5c9
AS
9187 }
9188
d2e4a39e 9189 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9190 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9191 {
d99dcf51
JB
9192 if (!ada_same_array_size_p (type, type2))
9193 error (_("cannot assign arrays of different length"));
9194
9195 if (is_integral_type (TYPE_TARGET_TYPE (type))
9196 && is_integral_type (TYPE_TARGET_TYPE (type2))
9197 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9198 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9199 {
9200 /* Allow implicit promotion of the array elements to
9201 a wider type. */
9202 return ada_promote_array_of_integrals (type, val);
9203 }
9204
9205 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9206 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9207 error (_("Incompatible types in assignment"));
04624583 9208 deprecated_set_value_type (val, type);
14f9c5c9 9209 }
d2e4a39e 9210 return val;
14f9c5c9
AS
9211}
9212
4c4b4cd2
PH
9213static struct value *
9214ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9215{
9216 struct value *val;
9217 struct type *type1, *type2;
9218 LONGEST v, v1, v2;
9219
994b9211
AC
9220 arg1 = coerce_ref (arg1);
9221 arg2 = coerce_ref (arg2);
18af8284
JB
9222 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9223 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9224
76a01679
JB
9225 if (TYPE_CODE (type1) != TYPE_CODE_INT
9226 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9227 return value_binop (arg1, arg2, op);
9228
76a01679 9229 switch (op)
4c4b4cd2
PH
9230 {
9231 case BINOP_MOD:
9232 case BINOP_DIV:
9233 case BINOP_REM:
9234 break;
9235 default:
9236 return value_binop (arg1, arg2, op);
9237 }
9238
9239 v2 = value_as_long (arg2);
9240 if (v2 == 0)
323e0a4a 9241 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9242
9243 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9244 return value_binop (arg1, arg2, op);
9245
9246 v1 = value_as_long (arg1);
9247 switch (op)
9248 {
9249 case BINOP_DIV:
9250 v = v1 / v2;
76a01679
JB
9251 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9252 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9253 break;
9254 case BINOP_REM:
9255 v = v1 % v2;
76a01679
JB
9256 if (v * v1 < 0)
9257 v -= v2;
4c4b4cd2
PH
9258 break;
9259 default:
9260 /* Should not reach this point. */
9261 v = 0;
9262 }
9263
9264 val = allocate_value (type1);
990a07ab 9265 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9266 TYPE_LENGTH (value_type (val)),
9267 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9268 return val;
9269}
9270
9271static int
9272ada_value_equal (struct value *arg1, struct value *arg2)
9273{
df407dfe
AC
9274 if (ada_is_direct_array_type (value_type (arg1))
9275 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9276 {
f58b38bf
JB
9277 /* Automatically dereference any array reference before
9278 we attempt to perform the comparison. */
9279 arg1 = ada_coerce_ref (arg1);
9280 arg2 = ada_coerce_ref (arg2);
9281
4c4b4cd2
PH
9282 arg1 = ada_coerce_to_simple_array (arg1);
9283 arg2 = ada_coerce_to_simple_array (arg2);
df407dfe
AC
9284 if (TYPE_CODE (value_type (arg1)) != TYPE_CODE_ARRAY
9285 || TYPE_CODE (value_type (arg2)) != TYPE_CODE_ARRAY)
323e0a4a 9286 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9287 /* FIXME: The following works only for types whose
76a01679
JB
9288 representations use all bits (no padding or undefined bits)
9289 and do not have user-defined equality. */
9290 return
df407dfe 9291 TYPE_LENGTH (value_type (arg1)) == TYPE_LENGTH (value_type (arg2))
0fd88904 9292 && memcmp (value_contents (arg1), value_contents (arg2),
df407dfe 9293 TYPE_LENGTH (value_type (arg1))) == 0;
4c4b4cd2
PH
9294 }
9295 return value_equal (arg1, arg2);
9296}
9297
52ce6436
PH
9298/* Total number of component associations in the aggregate starting at
9299 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9300 OP_AGGREGATE. */
52ce6436
PH
9301
9302static int
9303num_component_specs (struct expression *exp, int pc)
9304{
9305 int n, m, i;
5b4ee69b 9306
52ce6436
PH
9307 m = exp->elts[pc + 1].longconst;
9308 pc += 3;
9309 n = 0;
9310 for (i = 0; i < m; i += 1)
9311 {
9312 switch (exp->elts[pc].opcode)
9313 {
9314 default:
9315 n += 1;
9316 break;
9317 case OP_CHOICES:
9318 n += exp->elts[pc + 1].longconst;
9319 break;
9320 }
9321 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9322 }
9323 return n;
9324}
9325
9326/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9327 component of LHS (a simple array or a record), updating *POS past
9328 the expression, assuming that LHS is contained in CONTAINER. Does
9329 not modify the inferior's memory, nor does it modify LHS (unless
9330 LHS == CONTAINER). */
9331
9332static void
9333assign_component (struct value *container, struct value *lhs, LONGEST index,
9334 struct expression *exp, int *pos)
9335{
9336 struct value *mark = value_mark ();
9337 struct value *elt;
5b4ee69b 9338
52ce6436
PH
9339 if (TYPE_CODE (value_type (lhs)) == TYPE_CODE_ARRAY)
9340 {
22601c15
UW
9341 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9342 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9343
52ce6436
PH
9344 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9345 }
9346 else
9347 {
9348 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9349 elt = ada_to_fixed_value (elt);
52ce6436
PH
9350 }
9351
9352 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9353 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9354 else
9355 value_assign_to_component (container, elt,
9356 ada_evaluate_subexp (NULL, exp, pos,
9357 EVAL_NORMAL));
9358
9359 value_free_to_mark (mark);
9360}
9361
9362/* Assuming that LHS represents an lvalue having a record or array
9363 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9364 of that aggregate's value to LHS, advancing *POS past the
9365 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9366 lvalue containing LHS (possibly LHS itself). Does not modify
9367 the inferior's memory, nor does it modify the contents of
0963b4bd 9368 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9369
9370static struct value *
9371assign_aggregate (struct value *container,
9372 struct value *lhs, struct expression *exp,
9373 int *pos, enum noside noside)
9374{
9375 struct type *lhs_type;
9376 int n = exp->elts[*pos+1].longconst;
9377 LONGEST low_index, high_index;
9378 int num_specs;
9379 LONGEST *indices;
9380 int max_indices, num_indices;
52ce6436 9381 int i;
52ce6436
PH
9382
9383 *pos += 3;
9384 if (noside != EVAL_NORMAL)
9385 {
52ce6436
PH
9386 for (i = 0; i < n; i += 1)
9387 ada_evaluate_subexp (NULL, exp, pos, noside);
9388 return container;
9389 }
9390
9391 container = ada_coerce_ref (container);
9392 if (ada_is_direct_array_type (value_type (container)))
9393 container = ada_coerce_to_simple_array (container);
9394 lhs = ada_coerce_ref (lhs);
9395 if (!deprecated_value_modifiable (lhs))
9396 error (_("Left operand of assignment is not a modifiable lvalue."));
9397
9398 lhs_type = value_type (lhs);
9399 if (ada_is_direct_array_type (lhs_type))
9400 {
9401 lhs = ada_coerce_to_simple_array (lhs);
9402 lhs_type = value_type (lhs);
9403 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9404 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9405 }
9406 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9407 {
9408 low_index = 0;
9409 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9410 }
9411 else
9412 error (_("Left-hand side must be array or record."));
9413
9414 num_specs = num_component_specs (exp, *pos - 3);
9415 max_indices = 4 * num_specs + 4;
9416 indices = alloca (max_indices * sizeof (indices[0]));
9417 indices[0] = indices[1] = low_index - 1;
9418 indices[2] = indices[3] = high_index + 1;
9419 num_indices = 4;
9420
9421 for (i = 0; i < n; i += 1)
9422 {
9423 switch (exp->elts[*pos].opcode)
9424 {
1fbf5ada
JB
9425 case OP_CHOICES:
9426 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9427 &num_indices, max_indices,
9428 low_index, high_index);
9429 break;
9430 case OP_POSITIONAL:
9431 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9432 &num_indices, max_indices,
9433 low_index, high_index);
1fbf5ada
JB
9434 break;
9435 case OP_OTHERS:
9436 if (i != n-1)
9437 error (_("Misplaced 'others' clause"));
9438 aggregate_assign_others (container, lhs, exp, pos, indices,
9439 num_indices, low_index, high_index);
9440 break;
9441 default:
9442 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9443 }
9444 }
9445
9446 return container;
9447}
9448
9449/* Assign into the component of LHS indexed by the OP_POSITIONAL
9450 construct at *POS, updating *POS past the construct, given that
9451 the positions are relative to lower bound LOW, where HIGH is the
9452 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9453 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9454 assign_aggregate. */
52ce6436
PH
9455static void
9456aggregate_assign_positional (struct value *container,
9457 struct value *lhs, struct expression *exp,
9458 int *pos, LONGEST *indices, int *num_indices,
9459 int max_indices, LONGEST low, LONGEST high)
9460{
9461 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9462
9463 if (ind - 1 == high)
e1d5a0d2 9464 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9465 if (ind <= high)
9466 {
9467 add_component_interval (ind, ind, indices, num_indices, max_indices);
9468 *pos += 3;
9469 assign_component (container, lhs, ind, exp, pos);
9470 }
9471 else
9472 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9473}
9474
9475/* Assign into the components of LHS indexed by the OP_CHOICES
9476 construct at *POS, updating *POS past the construct, given that
9477 the allowable indices are LOW..HIGH. Record the indices assigned
9478 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9479 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9480static void
9481aggregate_assign_from_choices (struct value *container,
9482 struct value *lhs, struct expression *exp,
9483 int *pos, LONGEST *indices, int *num_indices,
9484 int max_indices, LONGEST low, LONGEST high)
9485{
9486 int j;
9487 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9488 int choice_pos, expr_pc;
9489 int is_array = ada_is_direct_array_type (value_type (lhs));
9490
9491 choice_pos = *pos += 3;
9492
9493 for (j = 0; j < n_choices; j += 1)
9494 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9495 expr_pc = *pos;
9496 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9497
9498 for (j = 0; j < n_choices; j += 1)
9499 {
9500 LONGEST lower, upper;
9501 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9502
52ce6436
PH
9503 if (op == OP_DISCRETE_RANGE)
9504 {
9505 choice_pos += 1;
9506 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9507 EVAL_NORMAL));
9508 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9509 EVAL_NORMAL));
9510 }
9511 else if (is_array)
9512 {
9513 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9514 EVAL_NORMAL));
9515 upper = lower;
9516 }
9517 else
9518 {
9519 int ind;
0d5cff50 9520 const char *name;
5b4ee69b 9521
52ce6436
PH
9522 switch (op)
9523 {
9524 case OP_NAME:
9525 name = &exp->elts[choice_pos + 2].string;
9526 break;
9527 case OP_VAR_VALUE:
9528 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9529 break;
9530 default:
9531 error (_("Invalid record component association."));
9532 }
9533 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9534 ind = 0;
9535 if (! find_struct_field (name, value_type (lhs), 0,
9536 NULL, NULL, NULL, NULL, &ind))
9537 error (_("Unknown component name: %s."), name);
9538 lower = upper = ind;
9539 }
9540
9541 if (lower <= upper && (lower < low || upper > high))
9542 error (_("Index in component association out of bounds."));
9543
9544 add_component_interval (lower, upper, indices, num_indices,
9545 max_indices);
9546 while (lower <= upper)
9547 {
9548 int pos1;
5b4ee69b 9549
52ce6436
PH
9550 pos1 = expr_pc;
9551 assign_component (container, lhs, lower, exp, &pos1);
9552 lower += 1;
9553 }
9554 }
9555}
9556
9557/* Assign the value of the expression in the OP_OTHERS construct in
9558 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9559 have not been previously assigned. The index intervals already assigned
9560 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9561 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9562static void
9563aggregate_assign_others (struct value *container,
9564 struct value *lhs, struct expression *exp,
9565 int *pos, LONGEST *indices, int num_indices,
9566 LONGEST low, LONGEST high)
9567{
9568 int i;
5ce64950 9569 int expr_pc = *pos + 1;
52ce6436
PH
9570
9571 for (i = 0; i < num_indices - 2; i += 2)
9572 {
9573 LONGEST ind;
5b4ee69b 9574
52ce6436
PH
9575 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9576 {
5ce64950 9577 int localpos;
5b4ee69b 9578
5ce64950
MS
9579 localpos = expr_pc;
9580 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9581 }
9582 }
9583 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9584}
9585
9586/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9587 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9588 modifying *SIZE as needed. It is an error if *SIZE exceeds
9589 MAX_SIZE. The resulting intervals do not overlap. */
9590static void
9591add_component_interval (LONGEST low, LONGEST high,
9592 LONGEST* indices, int *size, int max_size)
9593{
9594 int i, j;
5b4ee69b 9595
52ce6436
PH
9596 for (i = 0; i < *size; i += 2) {
9597 if (high >= indices[i] && low <= indices[i + 1])
9598 {
9599 int kh;
5b4ee69b 9600
52ce6436
PH
9601 for (kh = i + 2; kh < *size; kh += 2)
9602 if (high < indices[kh])
9603 break;
9604 if (low < indices[i])
9605 indices[i] = low;
9606 indices[i + 1] = indices[kh - 1];
9607 if (high > indices[i + 1])
9608 indices[i + 1] = high;
9609 memcpy (indices + i + 2, indices + kh, *size - kh);
9610 *size -= kh - i - 2;
9611 return;
9612 }
9613 else if (high < indices[i])
9614 break;
9615 }
9616
9617 if (*size == max_size)
9618 error (_("Internal error: miscounted aggregate components."));
9619 *size += 2;
9620 for (j = *size-1; j >= i+2; j -= 1)
9621 indices[j] = indices[j - 2];
9622 indices[i] = low;
9623 indices[i + 1] = high;
9624}
9625
6e48bd2c
JB
9626/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9627 is different. */
9628
9629static struct value *
9630ada_value_cast (struct type *type, struct value *arg2, enum noside noside)
9631{
9632 if (type == ada_check_typedef (value_type (arg2)))
9633 return arg2;
9634
9635 if (ada_is_fixed_point_type (type))
9636 return (cast_to_fixed (type, arg2));
9637
9638 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 9639 return cast_from_fixed (type, arg2);
6e48bd2c
JB
9640
9641 return value_cast (type, arg2);
9642}
9643
284614f0
JB
9644/* Evaluating Ada expressions, and printing their result.
9645 ------------------------------------------------------
9646
21649b50
JB
9647 1. Introduction:
9648 ----------------
9649
284614f0
JB
9650 We usually evaluate an Ada expression in order to print its value.
9651 We also evaluate an expression in order to print its type, which
9652 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9653 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9654 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9655 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9656 similar.
9657
9658 Evaluating expressions is a little more complicated for Ada entities
9659 than it is for entities in languages such as C. The main reason for
9660 this is that Ada provides types whose definition might be dynamic.
9661 One example of such types is variant records. Or another example
9662 would be an array whose bounds can only be known at run time.
9663
9664 The following description is a general guide as to what should be
9665 done (and what should NOT be done) in order to evaluate an expression
9666 involving such types, and when. This does not cover how the semantic
9667 information is encoded by GNAT as this is covered separatly. For the
9668 document used as the reference for the GNAT encoding, see exp_dbug.ads
9669 in the GNAT sources.
9670
9671 Ideally, we should embed each part of this description next to its
9672 associated code. Unfortunately, the amount of code is so vast right
9673 now that it's hard to see whether the code handling a particular
9674 situation might be duplicated or not. One day, when the code is
9675 cleaned up, this guide might become redundant with the comments
9676 inserted in the code, and we might want to remove it.
9677
21649b50
JB
9678 2. ``Fixing'' an Entity, the Simple Case:
9679 -----------------------------------------
9680
284614f0
JB
9681 When evaluating Ada expressions, the tricky issue is that they may
9682 reference entities whose type contents and size are not statically
9683 known. Consider for instance a variant record:
9684
9685 type Rec (Empty : Boolean := True) is record
9686 case Empty is
9687 when True => null;
9688 when False => Value : Integer;
9689 end case;
9690 end record;
9691 Yes : Rec := (Empty => False, Value => 1);
9692 No : Rec := (empty => True);
9693
9694 The size and contents of that record depends on the value of the
9695 descriminant (Rec.Empty). At this point, neither the debugging
9696 information nor the associated type structure in GDB are able to
9697 express such dynamic types. So what the debugger does is to create
9698 "fixed" versions of the type that applies to the specific object.
9699 We also informally refer to this opperation as "fixing" an object,
9700 which means creating its associated fixed type.
9701
9702 Example: when printing the value of variable "Yes" above, its fixed
9703 type would look like this:
9704
9705 type Rec is record
9706 Empty : Boolean;
9707 Value : Integer;
9708 end record;
9709
9710 On the other hand, if we printed the value of "No", its fixed type
9711 would become:
9712
9713 type Rec is record
9714 Empty : Boolean;
9715 end record;
9716
9717 Things become a little more complicated when trying to fix an entity
9718 with a dynamic type that directly contains another dynamic type,
9719 such as an array of variant records, for instance. There are
9720 two possible cases: Arrays, and records.
9721
21649b50
JB
9722 3. ``Fixing'' Arrays:
9723 ---------------------
9724
9725 The type structure in GDB describes an array in terms of its bounds,
9726 and the type of its elements. By design, all elements in the array
9727 have the same type and we cannot represent an array of variant elements
9728 using the current type structure in GDB. When fixing an array,
9729 we cannot fix the array element, as we would potentially need one
9730 fixed type per element of the array. As a result, the best we can do
9731 when fixing an array is to produce an array whose bounds and size
9732 are correct (allowing us to read it from memory), but without having
9733 touched its element type. Fixing each element will be done later,
9734 when (if) necessary.
9735
9736 Arrays are a little simpler to handle than records, because the same
9737 amount of memory is allocated for each element of the array, even if
1b536f04 9738 the amount of space actually used by each element differs from element
21649b50 9739 to element. Consider for instance the following array of type Rec:
284614f0
JB
9740
9741 type Rec_Array is array (1 .. 2) of Rec;
9742
1b536f04
JB
9743 The actual amount of memory occupied by each element might be different
9744 from element to element, depending on the value of their discriminant.
21649b50 9745 But the amount of space reserved for each element in the array remains
1b536f04 9746 fixed regardless. So we simply need to compute that size using
21649b50
JB
9747 the debugging information available, from which we can then determine
9748 the array size (we multiply the number of elements of the array by
9749 the size of each element).
9750
9751 The simplest case is when we have an array of a constrained element
9752 type. For instance, consider the following type declarations:
9753
9754 type Bounded_String (Max_Size : Integer) is
9755 Length : Integer;
9756 Buffer : String (1 .. Max_Size);
9757 end record;
9758 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
9759
9760 In this case, the compiler describes the array as an array of
9761 variable-size elements (identified by its XVS suffix) for which
9762 the size can be read in the parallel XVZ variable.
9763
9764 In the case of an array of an unconstrained element type, the compiler
9765 wraps the array element inside a private PAD type. This type should not
9766 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9767 that we also use the adjective "aligner" in our code to designate
9768 these wrapper types.
9769
1b536f04 9770 In some cases, the size allocated for each element is statically
21649b50
JB
9771 known. In that case, the PAD type already has the correct size,
9772 and the array element should remain unfixed.
9773
9774 But there are cases when this size is not statically known.
9775 For instance, assuming that "Five" is an integer variable:
284614f0
JB
9776
9777 type Dynamic is array (1 .. Five) of Integer;
9778 type Wrapper (Has_Length : Boolean := False) is record
9779 Data : Dynamic;
9780 case Has_Length is
9781 when True => Length : Integer;
9782 when False => null;
9783 end case;
9784 end record;
9785 type Wrapper_Array is array (1 .. 2) of Wrapper;
9786
9787 Hello : Wrapper_Array := (others => (Has_Length => True,
9788 Data => (others => 17),
9789 Length => 1));
9790
9791
9792 The debugging info would describe variable Hello as being an
9793 array of a PAD type. The size of that PAD type is not statically
9794 known, but can be determined using a parallel XVZ variable.
9795 In that case, a copy of the PAD type with the correct size should
9796 be used for the fixed array.
9797
21649b50
JB
9798 3. ``Fixing'' record type objects:
9799 ----------------------------------
9800
9801 Things are slightly different from arrays in the case of dynamic
284614f0
JB
9802 record types. In this case, in order to compute the associated
9803 fixed type, we need to determine the size and offset of each of
9804 its components. This, in turn, requires us to compute the fixed
9805 type of each of these components.
9806
9807 Consider for instance the example:
9808
9809 type Bounded_String (Max_Size : Natural) is record
9810 Str : String (1 .. Max_Size);
9811 Length : Natural;
9812 end record;
9813 My_String : Bounded_String (Max_Size => 10);
9814
9815 In that case, the position of field "Length" depends on the size
9816 of field Str, which itself depends on the value of the Max_Size
21649b50 9817 discriminant. In order to fix the type of variable My_String,
284614f0
JB
9818 we need to fix the type of field Str. Therefore, fixing a variant
9819 record requires us to fix each of its components.
9820
9821 However, if a component does not have a dynamic size, the component
9822 should not be fixed. In particular, fields that use a PAD type
9823 should not fixed. Here is an example where this might happen
9824 (assuming type Rec above):
9825
9826 type Container (Big : Boolean) is record
9827 First : Rec;
9828 After : Integer;
9829 case Big is
9830 when True => Another : Integer;
9831 when False => null;
9832 end case;
9833 end record;
9834 My_Container : Container := (Big => False,
9835 First => (Empty => True),
9836 After => 42);
9837
9838 In that example, the compiler creates a PAD type for component First,
9839 whose size is constant, and then positions the component After just
9840 right after it. The offset of component After is therefore constant
9841 in this case.
9842
9843 The debugger computes the position of each field based on an algorithm
9844 that uses, among other things, the actual position and size of the field
21649b50
JB
9845 preceding it. Let's now imagine that the user is trying to print
9846 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
9847 end up computing the offset of field After based on the size of the
9848 fixed version of field First. And since in our example First has
9849 only one actual field, the size of the fixed type is actually smaller
9850 than the amount of space allocated to that field, and thus we would
9851 compute the wrong offset of field After.
9852
21649b50
JB
9853 To make things more complicated, we need to watch out for dynamic
9854 components of variant records (identified by the ___XVL suffix in
9855 the component name). Even if the target type is a PAD type, the size
9856 of that type might not be statically known. So the PAD type needs
9857 to be unwrapped and the resulting type needs to be fixed. Otherwise,
9858 we might end up with the wrong size for our component. This can be
9859 observed with the following type declarations:
284614f0
JB
9860
9861 type Octal is new Integer range 0 .. 7;
9862 type Octal_Array is array (Positive range <>) of Octal;
9863 pragma Pack (Octal_Array);
9864
9865 type Octal_Buffer (Size : Positive) is record
9866 Buffer : Octal_Array (1 .. Size);
9867 Length : Integer;
9868 end record;
9869
9870 In that case, Buffer is a PAD type whose size is unset and needs
9871 to be computed by fixing the unwrapped type.
9872
21649b50
JB
9873 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
9874 ----------------------------------------------------------
9875
9876 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
9877 thus far, be actually fixed?
9878
9879 The answer is: Only when referencing that element. For instance
9880 when selecting one component of a record, this specific component
9881 should be fixed at that point in time. Or when printing the value
9882 of a record, each component should be fixed before its value gets
9883 printed. Similarly for arrays, the element of the array should be
9884 fixed when printing each element of the array, or when extracting
9885 one element out of that array. On the other hand, fixing should
9886 not be performed on the elements when taking a slice of an array!
9887
9888 Note that one of the side-effects of miscomputing the offset and
9889 size of each field is that we end up also miscomputing the size
9890 of the containing type. This can have adverse results when computing
9891 the value of an entity. GDB fetches the value of an entity based
9892 on the size of its type, and thus a wrong size causes GDB to fetch
9893 the wrong amount of memory. In the case where the computed size is
9894 too small, GDB fetches too little data to print the value of our
9895 entiry. Results in this case as unpredicatble, as we usually read
9896 past the buffer containing the data =:-o. */
9897
9898/* Implement the evaluate_exp routine in the exp_descriptor structure
9899 for the Ada language. */
9900
52ce6436 9901static struct value *
ebf56fd3 9902ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 9903 int *pos, enum noside noside)
14f9c5c9
AS
9904{
9905 enum exp_opcode op;
b5385fc0 9906 int tem;
14f9c5c9 9907 int pc;
5ec18f2b 9908 int preeval_pos;
14f9c5c9
AS
9909 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
9910 struct type *type;
52ce6436 9911 int nargs, oplen;
d2e4a39e 9912 struct value **argvec;
14f9c5c9 9913
d2e4a39e
AS
9914 pc = *pos;
9915 *pos += 1;
14f9c5c9
AS
9916 op = exp->elts[pc].opcode;
9917
d2e4a39e 9918 switch (op)
14f9c5c9
AS
9919 {
9920 default:
9921 *pos -= 1;
6e48bd2c 9922 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
9923
9924 if (noside == EVAL_NORMAL)
9925 arg1 = unwrap_value (arg1);
6e48bd2c
JB
9926
9927 /* If evaluating an OP_DOUBLE and an EXPECT_TYPE was provided,
9928 then we need to perform the conversion manually, because
9929 evaluate_subexp_standard doesn't do it. This conversion is
9930 necessary in Ada because the different kinds of float/fixed
9931 types in Ada have different representations.
9932
9933 Similarly, we need to perform the conversion from OP_LONG
9934 ourselves. */
9935 if ((op == OP_DOUBLE || op == OP_LONG) && expect_type != NULL)
9936 arg1 = ada_value_cast (expect_type, arg1, noside);
9937
9938 return arg1;
4c4b4cd2
PH
9939
9940 case OP_STRING:
9941 {
76a01679 9942 struct value *result;
5b4ee69b 9943
76a01679
JB
9944 *pos -= 1;
9945 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
9946 /* The result type will have code OP_STRING, bashed there from
9947 OP_ARRAY. Bash it back. */
df407dfe
AC
9948 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
9949 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 9950 return result;
4c4b4cd2 9951 }
14f9c5c9
AS
9952
9953 case UNOP_CAST:
9954 (*pos) += 2;
9955 type = exp->elts[pc + 1].type;
9956 arg1 = evaluate_subexp (type, exp, pos, noside);
9957 if (noside == EVAL_SKIP)
4c4b4cd2 9958 goto nosideret;
6e48bd2c 9959 arg1 = ada_value_cast (type, arg1, noside);
14f9c5c9
AS
9960 return arg1;
9961
4c4b4cd2
PH
9962 case UNOP_QUAL:
9963 (*pos) += 2;
9964 type = exp->elts[pc + 1].type;
9965 return ada_evaluate_subexp (type, exp, pos, noside);
9966
14f9c5c9
AS
9967 case BINOP_ASSIGN:
9968 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
9969 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9970 {
9971 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
9972 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
9973 return arg1;
9974 return ada_value_assign (arg1, arg1);
9975 }
003f3813
JB
9976 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
9977 except if the lhs of our assignment is a convenience variable.
9978 In the case of assigning to a convenience variable, the lhs
9979 should be exactly the result of the evaluation of the rhs. */
9980 type = value_type (arg1);
9981 if (VALUE_LVAL (arg1) == lval_internalvar)
9982 type = NULL;
9983 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 9984 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 9985 return arg1;
df407dfe
AC
9986 if (ada_is_fixed_point_type (value_type (arg1)))
9987 arg2 = cast_to_fixed (value_type (arg1), arg2);
9988 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 9989 error
323e0a4a 9990 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 9991 else
df407dfe 9992 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 9993 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
9994
9995 case BINOP_ADD:
9996 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
9997 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
9998 if (noside == EVAL_SKIP)
4c4b4cd2 9999 goto nosideret;
2ac8a782
JB
10000 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10001 return (value_from_longest
10002 (value_type (arg1),
10003 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10004 if ((ada_is_fixed_point_type (value_type (arg1))
10005 || ada_is_fixed_point_type (value_type (arg2)))
10006 && value_type (arg1) != value_type (arg2))
323e0a4a 10007 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10008 /* Do the addition, and cast the result to the type of the first
10009 argument. We cannot cast the result to a reference type, so if
10010 ARG1 is a reference type, find its underlying type. */
10011 type = value_type (arg1);
10012 while (TYPE_CODE (type) == TYPE_CODE_REF)
10013 type = TYPE_TARGET_TYPE (type);
f44316fa 10014 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10015 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10016
10017 case BINOP_SUB:
10018 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10019 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10020 if (noside == EVAL_SKIP)
4c4b4cd2 10021 goto nosideret;
2ac8a782
JB
10022 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10023 return (value_from_longest
10024 (value_type (arg1),
10025 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10026 if ((ada_is_fixed_point_type (value_type (arg1))
10027 || ada_is_fixed_point_type (value_type (arg2)))
10028 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10029 error (_("Operands of fixed-point subtraction "
10030 "must have the same type"));
b7789565
JB
10031 /* Do the substraction, and cast the result to the type of the first
10032 argument. We cannot cast the result to a reference type, so if
10033 ARG1 is a reference type, find its underlying type. */
10034 type = value_type (arg1);
10035 while (TYPE_CODE (type) == TYPE_CODE_REF)
10036 type = TYPE_TARGET_TYPE (type);
f44316fa 10037 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10038 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10039
10040 case BINOP_MUL:
10041 case BINOP_DIV:
e1578042
JB
10042 case BINOP_REM:
10043 case BINOP_MOD:
14f9c5c9
AS
10044 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10045 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10046 if (noside == EVAL_SKIP)
4c4b4cd2 10047 goto nosideret;
e1578042 10048 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10049 {
10050 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10051 return value_zero (value_type (arg1), not_lval);
10052 }
14f9c5c9 10053 else
4c4b4cd2 10054 {
a53b7a21 10055 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10056 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10057 arg1 = cast_from_fixed (type, arg1);
df407dfe 10058 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10059 arg2 = cast_from_fixed (type, arg2);
f44316fa 10060 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10061 return ada_value_binop (arg1, arg2, op);
10062 }
10063
4c4b4cd2
PH
10064 case BINOP_EQUAL:
10065 case BINOP_NOTEQUAL:
14f9c5c9 10066 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10067 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10068 if (noside == EVAL_SKIP)
76a01679 10069 goto nosideret;
4c4b4cd2 10070 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10071 tem = 0;
4c4b4cd2 10072 else
f44316fa
UW
10073 {
10074 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10075 tem = ada_value_equal (arg1, arg2);
10076 }
4c4b4cd2 10077 if (op == BINOP_NOTEQUAL)
76a01679 10078 tem = !tem;
fbb06eb1
UW
10079 type = language_bool_type (exp->language_defn, exp->gdbarch);
10080 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10081
10082 case UNOP_NEG:
10083 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10084 if (noside == EVAL_SKIP)
10085 goto nosideret;
df407dfe
AC
10086 else if (ada_is_fixed_point_type (value_type (arg1)))
10087 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10088 else
f44316fa
UW
10089 {
10090 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10091 return value_neg (arg1);
10092 }
4c4b4cd2 10093
2330c6c6
JB
10094 case BINOP_LOGICAL_AND:
10095 case BINOP_LOGICAL_OR:
10096 case UNOP_LOGICAL_NOT:
000d5124
JB
10097 {
10098 struct value *val;
10099
10100 *pos -= 1;
10101 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10102 type = language_bool_type (exp->language_defn, exp->gdbarch);
10103 return value_cast (type, val);
000d5124 10104 }
2330c6c6
JB
10105
10106 case BINOP_BITWISE_AND:
10107 case BINOP_BITWISE_IOR:
10108 case BINOP_BITWISE_XOR:
000d5124
JB
10109 {
10110 struct value *val;
10111
10112 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10113 *pos = pc;
10114 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10115
10116 return value_cast (value_type (arg1), val);
10117 }
2330c6c6 10118
14f9c5c9
AS
10119 case OP_VAR_VALUE:
10120 *pos -= 1;
6799def4 10121
14f9c5c9 10122 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10123 {
10124 *pos += 4;
10125 goto nosideret;
10126 }
10127 else if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10128 /* Only encountered when an unresolved symbol occurs in a
10129 context other than a function call, in which case, it is
52ce6436 10130 invalid. */
323e0a4a 10131 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10132 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
14f9c5c9 10133 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10134 {
0c1f74cf 10135 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10136 /* Check to see if this is a tagged type. We also need to handle
10137 the case where the type is a reference to a tagged type, but
10138 we have to be careful to exclude pointers to tagged types.
10139 The latter should be shown as usual (as a pointer), whereas
10140 a reference should mostly be transparent to the user. */
10141 if (ada_is_tagged_type (type, 0)
023db19c 10142 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10143 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0c1f74cf
JB
10144 {
10145 /* Tagged types are a little special in the fact that the real
10146 type is dynamic and can only be determined by inspecting the
10147 object's tag. This means that we need to get the object's
10148 value first (EVAL_NORMAL) and then extract the actual object
10149 type from its tag.
10150
10151 Note that we cannot skip the final step where we extract
10152 the object type from its tag, because the EVAL_NORMAL phase
10153 results in dynamic components being resolved into fixed ones.
10154 This can cause problems when trying to print the type
10155 description of tagged types whose parent has a dynamic size:
10156 We use the type name of the "_parent" component in order
10157 to print the name of the ancestor type in the type description.
10158 If that component had a dynamic size, the resolution into
10159 a fixed type would result in the loss of that type name,
10160 thus preventing us from printing the name of the ancestor
10161 type in the type description. */
10162 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
b50d69b5
JG
10163
10164 if (TYPE_CODE (type) != TYPE_CODE_REF)
10165 {
10166 struct type *actual_type;
10167
10168 actual_type = type_from_tag (ada_value_tag (arg1));
10169 if (actual_type == NULL)
10170 /* If, for some reason, we were unable to determine
10171 the actual type from the tag, then use the static
10172 approximation that we just computed as a fallback.
10173 This can happen if the debugging information is
10174 incomplete, for instance. */
10175 actual_type = type;
10176 return value_zero (actual_type, not_lval);
10177 }
10178 else
10179 {
10180 /* In the case of a ref, ada_coerce_ref takes care
10181 of determining the actual type. But the evaluation
10182 should return a ref as it should be valid to ask
10183 for its address; so rebuild a ref after coerce. */
10184 arg1 = ada_coerce_ref (arg1);
10185 return value_ref (arg1);
10186 }
0c1f74cf
JB
10187 }
10188
4c4b4cd2 10189 *pos += 4;
52865325 10190 return value_zero (to_static_fixed_type (type), not_lval);
4c4b4cd2 10191 }
d2e4a39e 10192 else
4c4b4cd2 10193 {
284614f0 10194 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
4c4b4cd2
PH
10195 return ada_to_fixed_value (arg1);
10196 }
10197
10198 case OP_FUNCALL:
10199 (*pos) += 2;
10200
10201 /* Allocate arg vector, including space for the function to be
10202 called in argvec[0] and a terminating NULL. */
10203 nargs = longest_to_int (exp->elts[pc + 1].longconst);
10204 argvec =
10205 (struct value **) alloca (sizeof (struct value *) * (nargs + 2));
10206
10207 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10208 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10209 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10210 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10211 else
10212 {
10213 for (tem = 0; tem <= nargs; tem += 1)
10214 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10215 argvec[tem] = 0;
10216
10217 if (noside == EVAL_SKIP)
10218 goto nosideret;
10219 }
10220
ad82864c
JB
10221 if (ada_is_constrained_packed_array_type
10222 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10223 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10224 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10225 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10226 /* This is a packed array that has already been fixed, and
10227 therefore already coerced to a simple array. Nothing further
10228 to do. */
10229 ;
df407dfe
AC
10230 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF
10231 || (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
76a01679 10232 && VALUE_LVAL (argvec[0]) == lval_memory))
4c4b4cd2
PH
10233 argvec[0] = value_addr (argvec[0]);
10234
df407dfe 10235 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10236
10237 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10238 them. So, if this is an array typedef (encoding use for array
10239 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10240 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10241 type = ada_typedef_target_type (type);
10242
4c4b4cd2
PH
10243 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10244 {
61ee279c 10245 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10246 {
10247 case TYPE_CODE_FUNC:
61ee279c 10248 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10249 break;
10250 case TYPE_CODE_ARRAY:
10251 break;
10252 case TYPE_CODE_STRUCT:
10253 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10254 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10255 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10256 break;
10257 default:
323e0a4a 10258 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10259 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10260 break;
10261 }
10262 }
10263
10264 switch (TYPE_CODE (type))
10265 {
10266 case TYPE_CODE_FUNC:
10267 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972
PH
10268 {
10269 struct type *rtype = TYPE_TARGET_TYPE (type);
10270
10271 if (TYPE_GNU_IFUNC (type))
10272 return allocate_value (TYPE_TARGET_TYPE (rtype));
10273 return allocate_value (rtype);
10274 }
4c4b4cd2 10275 return call_function_by_hand (argvec[0], nargs, argvec + 1);
c8ea1972
PH
10276 case TYPE_CODE_INTERNAL_FUNCTION:
10277 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10278 /* We don't know anything about what the internal
10279 function might return, but we have to return
10280 something. */
10281 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10282 not_lval);
10283 else
10284 return call_internal_function (exp->gdbarch, exp->language_defn,
10285 argvec[0], nargs, argvec + 1);
10286
4c4b4cd2
PH
10287 case TYPE_CODE_STRUCT:
10288 {
10289 int arity;
10290
4c4b4cd2
PH
10291 arity = ada_array_arity (type);
10292 type = ada_array_element_type (type, nargs);
10293 if (type == NULL)
323e0a4a 10294 error (_("cannot subscript or call a record"));
4c4b4cd2 10295 if (arity != nargs)
323e0a4a 10296 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10297 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10298 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10299 return
10300 unwrap_value (ada_value_subscript
10301 (argvec[0], nargs, argvec + 1));
10302 }
10303 case TYPE_CODE_ARRAY:
10304 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10305 {
10306 type = ada_array_element_type (type, nargs);
10307 if (type == NULL)
323e0a4a 10308 error (_("element type of array unknown"));
4c4b4cd2 10309 else
0a07e705 10310 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10311 }
10312 return
10313 unwrap_value (ada_value_subscript
10314 (ada_coerce_to_simple_array (argvec[0]),
10315 nargs, argvec + 1));
10316 case TYPE_CODE_PTR: /* Pointer to array */
10317 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
10318 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10319 {
10320 type = ada_array_element_type (type, nargs);
10321 if (type == NULL)
323e0a4a 10322 error (_("element type of array unknown"));
4c4b4cd2 10323 else
0a07e705 10324 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10325 }
10326 return
10327 unwrap_value (ada_value_ptr_subscript (argvec[0], type,
10328 nargs, argvec + 1));
10329
10330 default:
e1d5a0d2
PH
10331 error (_("Attempt to index or call something other than an "
10332 "array or function"));
4c4b4cd2
PH
10333 }
10334
10335 case TERNOP_SLICE:
10336 {
10337 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10338 struct value *low_bound_val =
10339 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10340 struct value *high_bound_val =
10341 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10342 LONGEST low_bound;
10343 LONGEST high_bound;
5b4ee69b 10344
994b9211
AC
10345 low_bound_val = coerce_ref (low_bound_val);
10346 high_bound_val = coerce_ref (high_bound_val);
714e53ab
PH
10347 low_bound = pos_atr (low_bound_val);
10348 high_bound = pos_atr (high_bound_val);
963a6417 10349
4c4b4cd2
PH
10350 if (noside == EVAL_SKIP)
10351 goto nosideret;
10352
4c4b4cd2
PH
10353 /* If this is a reference to an aligner type, then remove all
10354 the aligners. */
df407dfe
AC
10355 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10356 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10357 TYPE_TARGET_TYPE (value_type (array)) =
10358 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10359
ad82864c 10360 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10361 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10362
10363 /* If this is a reference to an array or an array lvalue,
10364 convert to a pointer. */
df407dfe
AC
10365 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10366 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10367 && VALUE_LVAL (array) == lval_memory))
10368 array = value_addr (array);
10369
1265e4aa 10370 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10371 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10372 (value_type (array))))
0b5d8877 10373 return empty_array (ada_type_of_array (array, 0), low_bound);
4c4b4cd2
PH
10374
10375 array = ada_coerce_to_simple_array_ptr (array);
10376
714e53ab
PH
10377 /* If we have more than one level of pointer indirection,
10378 dereference the value until we get only one level. */
df407dfe
AC
10379 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10380 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10381 == TYPE_CODE_PTR))
10382 array = value_ind (array);
10383
10384 /* Make sure we really do have an array type before going further,
10385 to avoid a SEGV when trying to get the index type or the target
10386 type later down the road if the debug info generated by
10387 the compiler is incorrect or incomplete. */
df407dfe 10388 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10389 error (_("cannot take slice of non-array"));
714e53ab 10390
828292f2
JB
10391 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10392 == TYPE_CODE_PTR)
4c4b4cd2 10393 {
828292f2
JB
10394 struct type *type0 = ada_check_typedef (value_type (array));
10395
0b5d8877 10396 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
828292f2 10397 return empty_array (TYPE_TARGET_TYPE (type0), low_bound);
4c4b4cd2
PH
10398 else
10399 {
10400 struct type *arr_type0 =
828292f2 10401 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10402
f5938064
JG
10403 return ada_value_slice_from_ptr (array, arr_type0,
10404 longest_to_int (low_bound),
10405 longest_to_int (high_bound));
4c4b4cd2
PH
10406 }
10407 }
10408 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10409 return array;
10410 else if (high_bound < low_bound)
df407dfe 10411 return empty_array (value_type (array), low_bound);
4c4b4cd2 10412 else
529cad9c
PH
10413 return ada_value_slice (array, longest_to_int (low_bound),
10414 longest_to_int (high_bound));
4c4b4cd2 10415 }
14f9c5c9 10416
4c4b4cd2
PH
10417 case UNOP_IN_RANGE:
10418 (*pos) += 2;
10419 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10420 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10421
14f9c5c9 10422 if (noside == EVAL_SKIP)
4c4b4cd2 10423 goto nosideret;
14f9c5c9 10424
4c4b4cd2
PH
10425 switch (TYPE_CODE (type))
10426 {
10427 default:
e1d5a0d2
PH
10428 lim_warning (_("Membership test incompletely implemented; "
10429 "always returns true"));
fbb06eb1
UW
10430 type = language_bool_type (exp->language_defn, exp->gdbarch);
10431 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10432
10433 case TYPE_CODE_RANGE:
030b4912
UW
10434 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10435 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10436 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10437 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10438 type = language_bool_type (exp->language_defn, exp->gdbarch);
10439 return
10440 value_from_longest (type,
4c4b4cd2
PH
10441 (value_less (arg1, arg3)
10442 || value_equal (arg1, arg3))
10443 && (value_less (arg2, arg1)
10444 || value_equal (arg2, arg1)));
10445 }
10446
10447 case BINOP_IN_BOUNDS:
14f9c5c9 10448 (*pos) += 2;
4c4b4cd2
PH
10449 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10450 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10451
4c4b4cd2
PH
10452 if (noside == EVAL_SKIP)
10453 goto nosideret;
14f9c5c9 10454
4c4b4cd2 10455 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10456 {
10457 type = language_bool_type (exp->language_defn, exp->gdbarch);
10458 return value_zero (type, not_lval);
10459 }
14f9c5c9 10460
4c4b4cd2 10461 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10462
1eea4ebd
UW
10463 type = ada_index_type (value_type (arg2), tem, "range");
10464 if (!type)
10465 type = value_type (arg1);
14f9c5c9 10466
1eea4ebd
UW
10467 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10468 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10469
f44316fa
UW
10470 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10471 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10472 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10473 return
fbb06eb1 10474 value_from_longest (type,
4c4b4cd2
PH
10475 (value_less (arg1, arg3)
10476 || value_equal (arg1, arg3))
10477 && (value_less (arg2, arg1)
10478 || value_equal (arg2, arg1)));
10479
10480 case TERNOP_IN_RANGE:
10481 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10482 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10483 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10484
10485 if (noside == EVAL_SKIP)
10486 goto nosideret;
10487
f44316fa
UW
10488 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10489 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10490 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10491 return
fbb06eb1 10492 value_from_longest (type,
4c4b4cd2
PH
10493 (value_less (arg1, arg3)
10494 || value_equal (arg1, arg3))
10495 && (value_less (arg2, arg1)
10496 || value_equal (arg2, arg1)));
10497
10498 case OP_ATR_FIRST:
10499 case OP_ATR_LAST:
10500 case OP_ATR_LENGTH:
10501 {
76a01679 10502 struct type *type_arg;
5b4ee69b 10503
76a01679
JB
10504 if (exp->elts[*pos].opcode == OP_TYPE)
10505 {
10506 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10507 arg1 = NULL;
5bc23cb3 10508 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10509 }
10510 else
10511 {
10512 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10513 type_arg = NULL;
10514 }
10515
10516 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10517 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10518 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10519 *pos += 4;
10520
10521 if (noside == EVAL_SKIP)
10522 goto nosideret;
10523
10524 if (type_arg == NULL)
10525 {
10526 arg1 = ada_coerce_ref (arg1);
10527
ad82864c 10528 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
10529 arg1 = ada_coerce_to_simple_array (arg1);
10530
aa4fb036 10531 if (op == OP_ATR_LENGTH)
1eea4ebd 10532 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10533 else
10534 {
10535 type = ada_index_type (value_type (arg1), tem,
10536 ada_attribute_name (op));
10537 if (type == NULL)
10538 type = builtin_type (exp->gdbarch)->builtin_int;
10539 }
76a01679
JB
10540
10541 if (noside == EVAL_AVOID_SIDE_EFFECTS)
1eea4ebd 10542 return allocate_value (type);
76a01679
JB
10543
10544 switch (op)
10545 {
10546 default: /* Should never happen. */
323e0a4a 10547 error (_("unexpected attribute encountered"));
76a01679 10548 case OP_ATR_FIRST:
1eea4ebd
UW
10549 return value_from_longest
10550 (type, ada_array_bound (arg1, tem, 0));
76a01679 10551 case OP_ATR_LAST:
1eea4ebd
UW
10552 return value_from_longest
10553 (type, ada_array_bound (arg1, tem, 1));
76a01679 10554 case OP_ATR_LENGTH:
1eea4ebd
UW
10555 return value_from_longest
10556 (type, ada_array_length (arg1, tem));
76a01679
JB
10557 }
10558 }
10559 else if (discrete_type_p (type_arg))
10560 {
10561 struct type *range_type;
0d5cff50 10562 const char *name = ada_type_name (type_arg);
5b4ee69b 10563
76a01679
JB
10564 range_type = NULL;
10565 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 10566 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
10567 if (range_type == NULL)
10568 range_type = type_arg;
10569 switch (op)
10570 {
10571 default:
323e0a4a 10572 error (_("unexpected attribute encountered"));
76a01679 10573 case OP_ATR_FIRST:
690cc4eb 10574 return value_from_longest
43bbcdc2 10575 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 10576 case OP_ATR_LAST:
690cc4eb 10577 return value_from_longest
43bbcdc2 10578 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 10579 case OP_ATR_LENGTH:
323e0a4a 10580 error (_("the 'length attribute applies only to array types"));
76a01679
JB
10581 }
10582 }
10583 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 10584 error (_("unimplemented type attribute"));
76a01679
JB
10585 else
10586 {
10587 LONGEST low, high;
10588
ad82864c
JB
10589 if (ada_is_constrained_packed_array_type (type_arg))
10590 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10591
aa4fb036 10592 if (op == OP_ATR_LENGTH)
1eea4ebd 10593 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10594 else
10595 {
10596 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10597 if (type == NULL)
10598 type = builtin_type (exp->gdbarch)->builtin_int;
10599 }
1eea4ebd 10600
76a01679
JB
10601 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10602 return allocate_value (type);
10603
10604 switch (op)
10605 {
10606 default:
323e0a4a 10607 error (_("unexpected attribute encountered"));
76a01679 10608 case OP_ATR_FIRST:
1eea4ebd 10609 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
10610 return value_from_longest (type, low);
10611 case OP_ATR_LAST:
1eea4ebd 10612 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10613 return value_from_longest (type, high);
10614 case OP_ATR_LENGTH:
1eea4ebd
UW
10615 low = ada_array_bound_from_type (type_arg, tem, 0);
10616 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10617 return value_from_longest (type, high - low + 1);
10618 }
10619 }
14f9c5c9
AS
10620 }
10621
4c4b4cd2
PH
10622 case OP_ATR_TAG:
10623 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10624 if (noside == EVAL_SKIP)
76a01679 10625 goto nosideret;
4c4b4cd2
PH
10626
10627 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10628 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10629
10630 return ada_value_tag (arg1);
10631
10632 case OP_ATR_MIN:
10633 case OP_ATR_MAX:
10634 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10635 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10636 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10637 if (noside == EVAL_SKIP)
76a01679 10638 goto nosideret;
d2e4a39e 10639 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10640 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10641 else
f44316fa
UW
10642 {
10643 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10644 return value_binop (arg1, arg2,
10645 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10646 }
14f9c5c9 10647
4c4b4cd2
PH
10648 case OP_ATR_MODULUS:
10649 {
31dedfee 10650 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10651
5b4ee69b 10652 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
10653 if (noside == EVAL_SKIP)
10654 goto nosideret;
4c4b4cd2 10655
76a01679 10656 if (!ada_is_modular_type (type_arg))
323e0a4a 10657 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10658
76a01679
JB
10659 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10660 ada_modulus (type_arg));
4c4b4cd2
PH
10661 }
10662
10663
10664 case OP_ATR_POS:
10665 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10666 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10667 if (noside == EVAL_SKIP)
76a01679 10668 goto nosideret;
3cb382c9
UW
10669 type = builtin_type (exp->gdbarch)->builtin_int;
10670 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10671 return value_zero (type, not_lval);
14f9c5c9 10672 else
3cb382c9 10673 return value_pos_atr (type, arg1);
14f9c5c9 10674
4c4b4cd2
PH
10675 case OP_ATR_SIZE:
10676 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
10677 type = value_type (arg1);
10678
10679 /* If the argument is a reference, then dereference its type, since
10680 the user is really asking for the size of the actual object,
10681 not the size of the pointer. */
10682 if (TYPE_CODE (type) == TYPE_CODE_REF)
10683 type = TYPE_TARGET_TYPE (type);
10684
4c4b4cd2 10685 if (noside == EVAL_SKIP)
76a01679 10686 goto nosideret;
4c4b4cd2 10687 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 10688 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10689 else
22601c15 10690 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 10691 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10692
10693 case OP_ATR_VAL:
10694 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 10695 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 10696 type = exp->elts[pc + 2].type;
14f9c5c9 10697 if (noside == EVAL_SKIP)
76a01679 10698 goto nosideret;
4c4b4cd2 10699 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10700 return value_zero (type, not_lval);
4c4b4cd2 10701 else
76a01679 10702 return value_val_atr (type, arg1);
4c4b4cd2
PH
10703
10704 case BINOP_EXP:
10705 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10706 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10707 if (noside == EVAL_SKIP)
10708 goto nosideret;
10709 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10710 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 10711 else
f44316fa
UW
10712 {
10713 /* For integer exponentiation operations,
10714 only promote the first argument. */
10715 if (is_integral_type (value_type (arg2)))
10716 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10717 else
10718 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10719
10720 return value_binop (arg1, arg2, op);
10721 }
4c4b4cd2
PH
10722
10723 case UNOP_PLUS:
10724 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10725 if (noside == EVAL_SKIP)
10726 goto nosideret;
10727 else
10728 return arg1;
10729
10730 case UNOP_ABS:
10731 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10732 if (noside == EVAL_SKIP)
10733 goto nosideret;
f44316fa 10734 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 10735 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 10736 return value_neg (arg1);
14f9c5c9 10737 else
4c4b4cd2 10738 return arg1;
14f9c5c9
AS
10739
10740 case UNOP_IND:
5ec18f2b 10741 preeval_pos = *pos;
6b0d7253 10742 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10743 if (noside == EVAL_SKIP)
4c4b4cd2 10744 goto nosideret;
df407dfe 10745 type = ada_check_typedef (value_type (arg1));
14f9c5c9 10746 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
10747 {
10748 if (ada_is_array_descriptor_type (type))
10749 /* GDB allows dereferencing GNAT array descriptors. */
10750 {
10751 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 10752
4c4b4cd2 10753 if (arrType == NULL)
323e0a4a 10754 error (_("Attempt to dereference null array pointer."));
00a4c844 10755 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
10756 }
10757 else if (TYPE_CODE (type) == TYPE_CODE_PTR
10758 || TYPE_CODE (type) == TYPE_CODE_REF
10759 /* In C you can dereference an array to get the 1st elt. */
10760 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 10761 {
5ec18f2b
JG
10762 /* As mentioned in the OP_VAR_VALUE case, tagged types can
10763 only be determined by inspecting the object's tag.
10764 This means that we need to evaluate completely the
10765 expression in order to get its type. */
10766
023db19c
JB
10767 if ((TYPE_CODE (type) == TYPE_CODE_REF
10768 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
10769 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
10770 {
10771 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10772 EVAL_NORMAL);
10773 type = value_type (ada_value_ind (arg1));
10774 }
10775 else
10776 {
10777 type = to_static_fixed_type
10778 (ada_aligned_type
10779 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
10780 }
10781 check_size (type);
714e53ab
PH
10782 return value_zero (type, lval_memory);
10783 }
4c4b4cd2 10784 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
10785 {
10786 /* GDB allows dereferencing an int. */
10787 if (expect_type == NULL)
10788 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10789 lval_memory);
10790 else
10791 {
10792 expect_type =
10793 to_static_fixed_type (ada_aligned_type (expect_type));
10794 return value_zero (expect_type, lval_memory);
10795 }
10796 }
4c4b4cd2 10797 else
323e0a4a 10798 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 10799 }
0963b4bd 10800 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 10801 type = ada_check_typedef (value_type (arg1));
d2e4a39e 10802
96967637
JB
10803 if (TYPE_CODE (type) == TYPE_CODE_INT)
10804 /* GDB allows dereferencing an int. If we were given
10805 the expect_type, then use that as the target type.
10806 Otherwise, assume that the target type is an int. */
10807 {
10808 if (expect_type != NULL)
10809 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
10810 arg1));
10811 else
10812 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
10813 (CORE_ADDR) value_as_address (arg1));
10814 }
6b0d7253 10815
4c4b4cd2
PH
10816 if (ada_is_array_descriptor_type (type))
10817 /* GDB allows dereferencing GNAT array descriptors. */
10818 return ada_coerce_to_simple_array (arg1);
14f9c5c9 10819 else
4c4b4cd2 10820 return ada_value_ind (arg1);
14f9c5c9
AS
10821
10822 case STRUCTOP_STRUCT:
10823 tem = longest_to_int (exp->elts[pc + 1].longconst);
10824 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 10825 preeval_pos = *pos;
14f9c5c9
AS
10826 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10827 if (noside == EVAL_SKIP)
4c4b4cd2 10828 goto nosideret;
14f9c5c9 10829 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10830 {
df407dfe 10831 struct type *type1 = value_type (arg1);
5b4ee69b 10832
76a01679
JB
10833 if (ada_is_tagged_type (type1, 1))
10834 {
10835 type = ada_lookup_struct_elt_type (type1,
10836 &exp->elts[pc + 2].string,
10837 1, 1, NULL);
5ec18f2b
JG
10838
10839 /* If the field is not found, check if it exists in the
10840 extension of this object's type. This means that we
10841 need to evaluate completely the expression. */
10842
76a01679 10843 if (type == NULL)
5ec18f2b
JG
10844 {
10845 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10846 EVAL_NORMAL);
10847 arg1 = ada_value_struct_elt (arg1,
10848 &exp->elts[pc + 2].string,
10849 0);
10850 arg1 = unwrap_value (arg1);
10851 type = value_type (ada_to_fixed_value (arg1));
10852 }
76a01679
JB
10853 }
10854 else
10855 type =
10856 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
10857 0, NULL);
10858
10859 return value_zero (ada_aligned_type (type), lval_memory);
10860 }
14f9c5c9 10861 else
284614f0
JB
10862 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
10863 arg1 = unwrap_value (arg1);
10864 return ada_to_fixed_value (arg1);
10865
14f9c5c9 10866 case OP_TYPE:
4c4b4cd2
PH
10867 /* The value is not supposed to be used. This is here to make it
10868 easier to accommodate expressions that contain types. */
14f9c5c9
AS
10869 (*pos) += 2;
10870 if (noside == EVAL_SKIP)
4c4b4cd2 10871 goto nosideret;
14f9c5c9 10872 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 10873 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 10874 else
323e0a4a 10875 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
10876
10877 case OP_AGGREGATE:
10878 case OP_CHOICES:
10879 case OP_OTHERS:
10880 case OP_DISCRETE_RANGE:
10881 case OP_POSITIONAL:
10882 case OP_NAME:
10883 if (noside == EVAL_NORMAL)
10884 switch (op)
10885 {
10886 case OP_NAME:
10887 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 10888 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
10889 case OP_AGGREGATE:
10890 error (_("Aggregates only allowed on the right of an assignment"));
10891 default:
0963b4bd
MS
10892 internal_error (__FILE__, __LINE__,
10893 _("aggregate apparently mangled"));
52ce6436
PH
10894 }
10895
10896 ada_forward_operator_length (exp, pc, &oplen, &nargs);
10897 *pos += oplen - 1;
10898 for (tem = 0; tem < nargs; tem += 1)
10899 ada_evaluate_subexp (NULL, exp, pos, noside);
10900 goto nosideret;
14f9c5c9
AS
10901 }
10902
10903nosideret:
22601c15 10904 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int, 1);
14f9c5c9 10905}
14f9c5c9 10906\f
d2e4a39e 10907
4c4b4cd2 10908 /* Fixed point */
14f9c5c9
AS
10909
10910/* If TYPE encodes an Ada fixed-point type, return the suffix of the
10911 type name that encodes the 'small and 'delta information.
4c4b4cd2 10912 Otherwise, return NULL. */
14f9c5c9 10913
d2e4a39e 10914static const char *
ebf56fd3 10915fixed_type_info (struct type *type)
14f9c5c9 10916{
d2e4a39e 10917 const char *name = ada_type_name (type);
14f9c5c9
AS
10918 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
10919
d2e4a39e
AS
10920 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
10921 {
14f9c5c9 10922 const char *tail = strstr (name, "___XF_");
5b4ee69b 10923
14f9c5c9 10924 if (tail == NULL)
4c4b4cd2 10925 return NULL;
d2e4a39e 10926 else
4c4b4cd2 10927 return tail + 5;
14f9c5c9
AS
10928 }
10929 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
10930 return fixed_type_info (TYPE_TARGET_TYPE (type));
10931 else
10932 return NULL;
10933}
10934
4c4b4cd2 10935/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
10936
10937int
ebf56fd3 10938ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
10939{
10940 return fixed_type_info (type) != NULL;
10941}
10942
4c4b4cd2
PH
10943/* Return non-zero iff TYPE represents a System.Address type. */
10944
10945int
10946ada_is_system_address_type (struct type *type)
10947{
10948 return (TYPE_NAME (type)
10949 && strcmp (TYPE_NAME (type), "system__address") == 0);
10950}
10951
14f9c5c9
AS
10952/* Assuming that TYPE is the representation of an Ada fixed-point
10953 type, return its delta, or -1 if the type is malformed and the
4c4b4cd2 10954 delta cannot be determined. */
14f9c5c9
AS
10955
10956DOUBLEST
ebf56fd3 10957ada_delta (struct type *type)
14f9c5c9
AS
10958{
10959 const char *encoding = fixed_type_info (type);
facc390f 10960 DOUBLEST num, den;
14f9c5c9 10961
facc390f
JB
10962 /* Strictly speaking, num and den are encoded as integer. However,
10963 they may not fit into a long, and they will have to be converted
10964 to DOUBLEST anyway. So scan them as DOUBLEST. */
10965 if (sscanf (encoding, "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
10966 &num, &den) < 2)
14f9c5c9 10967 return -1.0;
d2e4a39e 10968 else
facc390f 10969 return num / den;
14f9c5c9
AS
10970}
10971
10972/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 10973 factor ('SMALL value) associated with the type. */
14f9c5c9
AS
10974
10975static DOUBLEST
ebf56fd3 10976scaling_factor (struct type *type)
14f9c5c9
AS
10977{
10978 const char *encoding = fixed_type_info (type);
facc390f 10979 DOUBLEST num0, den0, num1, den1;
14f9c5c9 10980 int n;
d2e4a39e 10981
facc390f
JB
10982 /* Strictly speaking, num's and den's are encoded as integer. However,
10983 they may not fit into a long, and they will have to be converted
10984 to DOUBLEST anyway. So scan them as DOUBLEST. */
10985 n = sscanf (encoding,
10986 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT
10987 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
10988 &num0, &den0, &num1, &den1);
14f9c5c9
AS
10989
10990 if (n < 2)
10991 return 1.0;
10992 else if (n == 4)
facc390f 10993 return num1 / den1;
d2e4a39e 10994 else
facc390f 10995 return num0 / den0;
14f9c5c9
AS
10996}
10997
10998
10999/* Assuming that X is the representation of a value of fixed-point
4c4b4cd2 11000 type TYPE, return its floating-point equivalent. */
14f9c5c9
AS
11001
11002DOUBLEST
ebf56fd3 11003ada_fixed_to_float (struct type *type, LONGEST x)
14f9c5c9 11004{
d2e4a39e 11005 return (DOUBLEST) x *scaling_factor (type);
14f9c5c9
AS
11006}
11007
4c4b4cd2
PH
11008/* The representation of a fixed-point value of type TYPE
11009 corresponding to the value X. */
14f9c5c9
AS
11010
11011LONGEST
ebf56fd3 11012ada_float_to_fixed (struct type *type, DOUBLEST x)
14f9c5c9
AS
11013{
11014 return (LONGEST) (x / scaling_factor (type) + 0.5);
11015}
11016
14f9c5c9 11017\f
d2e4a39e 11018
4c4b4cd2 11019 /* Range types */
14f9c5c9
AS
11020
11021/* Scan STR beginning at position K for a discriminant name, and
11022 return the value of that discriminant field of DVAL in *PX. If
11023 PNEW_K is not null, put the position of the character beyond the
11024 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11025 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11026
11027static int
07d8f827 11028scan_discrim_bound (char *str, int k, struct value *dval, LONGEST * px,
76a01679 11029 int *pnew_k)
14f9c5c9
AS
11030{
11031 static char *bound_buffer = NULL;
11032 static size_t bound_buffer_len = 0;
11033 char *bound;
11034 char *pend;
d2e4a39e 11035 struct value *bound_val;
14f9c5c9
AS
11036
11037 if (dval == NULL || str == NULL || str[k] == '\0')
11038 return 0;
11039
d2e4a39e 11040 pend = strstr (str + k, "__");
14f9c5c9
AS
11041 if (pend == NULL)
11042 {
d2e4a39e 11043 bound = str + k;
14f9c5c9
AS
11044 k += strlen (bound);
11045 }
d2e4a39e 11046 else
14f9c5c9 11047 {
d2e4a39e 11048 GROW_VECT (bound_buffer, bound_buffer_len, pend - (str + k) + 1);
14f9c5c9 11049 bound = bound_buffer;
d2e4a39e
AS
11050 strncpy (bound_buffer, str + k, pend - (str + k));
11051 bound[pend - (str + k)] = '\0';
11052 k = pend - str;
14f9c5c9 11053 }
d2e4a39e 11054
df407dfe 11055 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11056 if (bound_val == NULL)
11057 return 0;
11058
11059 *px = value_as_long (bound_val);
11060 if (pnew_k != NULL)
11061 *pnew_k = k;
11062 return 1;
11063}
11064
11065/* Value of variable named NAME in the current environment. If
11066 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11067 otherwise causes an error with message ERR_MSG. */
11068
d2e4a39e
AS
11069static struct value *
11070get_var_value (char *name, char *err_msg)
14f9c5c9 11071{
4c4b4cd2 11072 struct ada_symbol_info *syms;
14f9c5c9
AS
11073 int nsyms;
11074
4c4b4cd2 11075 nsyms = ada_lookup_symbol_list (name, get_selected_block (0), VAR_DOMAIN,
4eeaa230 11076 &syms);
14f9c5c9
AS
11077
11078 if (nsyms != 1)
11079 {
11080 if (err_msg == NULL)
4c4b4cd2 11081 return 0;
14f9c5c9 11082 else
8a3fe4f8 11083 error (("%s"), err_msg);
14f9c5c9
AS
11084 }
11085
4c4b4cd2 11086 return value_of_variable (syms[0].sym, syms[0].block);
14f9c5c9 11087}
d2e4a39e 11088
14f9c5c9 11089/* Value of integer variable named NAME in the current environment. If
4c4b4cd2
PH
11090 no such variable found, returns 0, and sets *FLAG to 0. If
11091 successful, sets *FLAG to 1. */
11092
14f9c5c9 11093LONGEST
4c4b4cd2 11094get_int_var_value (char *name, int *flag)
14f9c5c9 11095{
4c4b4cd2 11096 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11097
14f9c5c9
AS
11098 if (var_val == 0)
11099 {
11100 if (flag != NULL)
4c4b4cd2 11101 *flag = 0;
14f9c5c9
AS
11102 return 0;
11103 }
11104 else
11105 {
11106 if (flag != NULL)
4c4b4cd2 11107 *flag = 1;
14f9c5c9
AS
11108 return value_as_long (var_val);
11109 }
11110}
d2e4a39e 11111
14f9c5c9
AS
11112
11113/* Return a range type whose base type is that of the range type named
11114 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11115 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11116 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11117 corresponding range type from debug information; fall back to using it
11118 if symbol lookup fails. If a new type must be created, allocate it
11119 like ORIG_TYPE was. The bounds information, in general, is encoded
11120 in NAME, the base type given in the named range type. */
14f9c5c9 11121
d2e4a39e 11122static struct type *
28c85d6c 11123to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11124{
0d5cff50 11125 const char *name;
14f9c5c9 11126 struct type *base_type;
d2e4a39e 11127 char *subtype_info;
14f9c5c9 11128
28c85d6c
JB
11129 gdb_assert (raw_type != NULL);
11130 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11131
1ce677a4 11132 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11133 base_type = TYPE_TARGET_TYPE (raw_type);
11134 else
11135 base_type = raw_type;
11136
28c85d6c 11137 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11138 subtype_info = strstr (name, "___XD");
11139 if (subtype_info == NULL)
690cc4eb 11140 {
43bbcdc2
PH
11141 LONGEST L = ada_discrete_type_low_bound (raw_type);
11142 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11143
690cc4eb
PH
11144 if (L < INT_MIN || U > INT_MAX)
11145 return raw_type;
11146 else
0c9c3474
SA
11147 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11148 L, U);
690cc4eb 11149 }
14f9c5c9
AS
11150 else
11151 {
11152 static char *name_buf = NULL;
11153 static size_t name_len = 0;
11154 int prefix_len = subtype_info - name;
11155 LONGEST L, U;
11156 struct type *type;
11157 char *bounds_str;
11158 int n;
11159
11160 GROW_VECT (name_buf, name_len, prefix_len + 5);
11161 strncpy (name_buf, name, prefix_len);
11162 name_buf[prefix_len] = '\0';
11163
11164 subtype_info += 5;
11165 bounds_str = strchr (subtype_info, '_');
11166 n = 1;
11167
d2e4a39e 11168 if (*subtype_info == 'L')
4c4b4cd2
PH
11169 {
11170 if (!ada_scan_number (bounds_str, n, &L, &n)
11171 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11172 return raw_type;
11173 if (bounds_str[n] == '_')
11174 n += 2;
0963b4bd 11175 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11176 n += 1;
11177 subtype_info += 1;
11178 }
d2e4a39e 11179 else
4c4b4cd2
PH
11180 {
11181 int ok;
5b4ee69b 11182
4c4b4cd2
PH
11183 strcpy (name_buf + prefix_len, "___L");
11184 L = get_int_var_value (name_buf, &ok);
11185 if (!ok)
11186 {
323e0a4a 11187 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11188 L = 1;
11189 }
11190 }
14f9c5c9 11191
d2e4a39e 11192 if (*subtype_info == 'U')
4c4b4cd2
PH
11193 {
11194 if (!ada_scan_number (bounds_str, n, &U, &n)
11195 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11196 return raw_type;
11197 }
d2e4a39e 11198 else
4c4b4cd2
PH
11199 {
11200 int ok;
5b4ee69b 11201
4c4b4cd2
PH
11202 strcpy (name_buf + prefix_len, "___U");
11203 U = get_int_var_value (name_buf, &ok);
11204 if (!ok)
11205 {
323e0a4a 11206 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11207 U = L;
11208 }
11209 }
14f9c5c9 11210
0c9c3474
SA
11211 type = create_static_range_type (alloc_type_copy (raw_type),
11212 base_type, L, U);
d2e4a39e 11213 TYPE_NAME (type) = name;
14f9c5c9
AS
11214 return type;
11215 }
11216}
11217
4c4b4cd2
PH
11218/* True iff NAME is the name of a range type. */
11219
14f9c5c9 11220int
d2e4a39e 11221ada_is_range_type_name (const char *name)
14f9c5c9
AS
11222{
11223 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11224}
14f9c5c9 11225\f
d2e4a39e 11226
4c4b4cd2
PH
11227 /* Modular types */
11228
11229/* True iff TYPE is an Ada modular type. */
14f9c5c9 11230
14f9c5c9 11231int
d2e4a39e 11232ada_is_modular_type (struct type *type)
14f9c5c9 11233{
18af8284 11234 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11235
11236 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11237 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11238 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11239}
11240
4c4b4cd2
PH
11241/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11242
61ee279c 11243ULONGEST
0056e4d5 11244ada_modulus (struct type *type)
14f9c5c9 11245{
43bbcdc2 11246 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11247}
d2e4a39e 11248\f
f7f9143b
JB
11249
11250/* Ada exception catchpoint support:
11251 ---------------------------------
11252
11253 We support 3 kinds of exception catchpoints:
11254 . catchpoints on Ada exceptions
11255 . catchpoints on unhandled Ada exceptions
11256 . catchpoints on failed assertions
11257
11258 Exceptions raised during failed assertions, or unhandled exceptions
11259 could perfectly be caught with the general catchpoint on Ada exceptions.
11260 However, we can easily differentiate these two special cases, and having
11261 the option to distinguish these two cases from the rest can be useful
11262 to zero-in on certain situations.
11263
11264 Exception catchpoints are a specialized form of breakpoint,
11265 since they rely on inserting breakpoints inside known routines
11266 of the GNAT runtime. The implementation therefore uses a standard
11267 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11268 of breakpoint_ops.
11269
0259addd
JB
11270 Support in the runtime for exception catchpoints have been changed
11271 a few times already, and these changes affect the implementation
11272 of these catchpoints. In order to be able to support several
11273 variants of the runtime, we use a sniffer that will determine
28010a5d 11274 the runtime variant used by the program being debugged. */
f7f9143b 11275
82eacd52
JB
11276/* Ada's standard exceptions.
11277
11278 The Ada 83 standard also defined Numeric_Error. But there so many
11279 situations where it was unclear from the Ada 83 Reference Manual
11280 (RM) whether Constraint_Error or Numeric_Error should be raised,
11281 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11282 Interpretation saying that anytime the RM says that Numeric_Error
11283 should be raised, the implementation may raise Constraint_Error.
11284 Ada 95 went one step further and pretty much removed Numeric_Error
11285 from the list of standard exceptions (it made it a renaming of
11286 Constraint_Error, to help preserve compatibility when compiling
11287 an Ada83 compiler). As such, we do not include Numeric_Error from
11288 this list of standard exceptions. */
3d0b0fa3
JB
11289
11290static char *standard_exc[] = {
11291 "constraint_error",
11292 "program_error",
11293 "storage_error",
11294 "tasking_error"
11295};
11296
0259addd
JB
11297typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11298
11299/* A structure that describes how to support exception catchpoints
11300 for a given executable. */
11301
11302struct exception_support_info
11303{
11304 /* The name of the symbol to break on in order to insert
11305 a catchpoint on exceptions. */
11306 const char *catch_exception_sym;
11307
11308 /* The name of the symbol to break on in order to insert
11309 a catchpoint on unhandled exceptions. */
11310 const char *catch_exception_unhandled_sym;
11311
11312 /* The name of the symbol to break on in order to insert
11313 a catchpoint on failed assertions. */
11314 const char *catch_assert_sym;
11315
11316 /* Assuming that the inferior just triggered an unhandled exception
11317 catchpoint, this function is responsible for returning the address
11318 in inferior memory where the name of that exception is stored.
11319 Return zero if the address could not be computed. */
11320 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11321};
11322
11323static CORE_ADDR ada_unhandled_exception_name_addr (void);
11324static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11325
11326/* The following exception support info structure describes how to
11327 implement exception catchpoints with the latest version of the
11328 Ada runtime (as of 2007-03-06). */
11329
11330static const struct exception_support_info default_exception_support_info =
11331{
11332 "__gnat_debug_raise_exception", /* catch_exception_sym */
11333 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11334 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11335 ada_unhandled_exception_name_addr
11336};
11337
11338/* The following exception support info structure describes how to
11339 implement exception catchpoints with a slightly older version
11340 of the Ada runtime. */
11341
11342static const struct exception_support_info exception_support_info_fallback =
11343{
11344 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11345 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11346 "system__assertions__raise_assert_failure", /* catch_assert_sym */
11347 ada_unhandled_exception_name_addr_from_raise
11348};
11349
f17011e0
JB
11350/* Return nonzero if we can detect the exception support routines
11351 described in EINFO.
11352
11353 This function errors out if an abnormal situation is detected
11354 (for instance, if we find the exception support routines, but
11355 that support is found to be incomplete). */
11356
11357static int
11358ada_has_this_exception_support (const struct exception_support_info *einfo)
11359{
11360 struct symbol *sym;
11361
11362 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11363 that should be compiled with debugging information. As a result, we
11364 expect to find that symbol in the symtabs. */
11365
11366 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11367 if (sym == NULL)
a6af7abe
JB
11368 {
11369 /* Perhaps we did not find our symbol because the Ada runtime was
11370 compiled without debugging info, or simply stripped of it.
11371 It happens on some GNU/Linux distributions for instance, where
11372 users have to install a separate debug package in order to get
11373 the runtime's debugging info. In that situation, let the user
11374 know why we cannot insert an Ada exception catchpoint.
11375
11376 Note: Just for the purpose of inserting our Ada exception
11377 catchpoint, we could rely purely on the associated minimal symbol.
11378 But we would be operating in degraded mode anyway, since we are
11379 still lacking the debugging info needed later on to extract
11380 the name of the exception being raised (this name is printed in
11381 the catchpoint message, and is also used when trying to catch
11382 a specific exception). We do not handle this case for now. */
3b7344d5 11383 struct bound_minimal_symbol msym
1c8e84b0
JB
11384 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11385
3b7344d5 11386 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11387 error (_("Your Ada runtime appears to be missing some debugging "
11388 "information.\nCannot insert Ada exception catchpoint "
11389 "in this configuration."));
11390
11391 return 0;
11392 }
f17011e0
JB
11393
11394 /* Make sure that the symbol we found corresponds to a function. */
11395
11396 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11397 error (_("Symbol \"%s\" is not a function (class = %d)"),
11398 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11399
11400 return 1;
11401}
11402
0259addd
JB
11403/* Inspect the Ada runtime and determine which exception info structure
11404 should be used to provide support for exception catchpoints.
11405
3eecfa55
JB
11406 This function will always set the per-inferior exception_info,
11407 or raise an error. */
0259addd
JB
11408
11409static void
11410ada_exception_support_info_sniffer (void)
11411{
3eecfa55 11412 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11413
11414 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11415 if (data->exception_info != NULL)
0259addd
JB
11416 return;
11417
11418 /* Check the latest (default) exception support info. */
f17011e0 11419 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11420 {
3eecfa55 11421 data->exception_info = &default_exception_support_info;
0259addd
JB
11422 return;
11423 }
11424
11425 /* Try our fallback exception suport info. */
f17011e0 11426 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11427 {
3eecfa55 11428 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11429 return;
11430 }
11431
11432 /* Sometimes, it is normal for us to not be able to find the routine
11433 we are looking for. This happens when the program is linked with
11434 the shared version of the GNAT runtime, and the program has not been
11435 started yet. Inform the user of these two possible causes if
11436 applicable. */
11437
ccefe4c4 11438 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11439 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11440
11441 /* If the symbol does not exist, then check that the program is
11442 already started, to make sure that shared libraries have been
11443 loaded. If it is not started, this may mean that the symbol is
11444 in a shared library. */
11445
11446 if (ptid_get_pid (inferior_ptid) == 0)
11447 error (_("Unable to insert catchpoint. Try to start the program first."));
11448
11449 /* At this point, we know that we are debugging an Ada program and
11450 that the inferior has been started, but we still are not able to
0963b4bd 11451 find the run-time symbols. That can mean that we are in
0259addd
JB
11452 configurable run time mode, or that a-except as been optimized
11453 out by the linker... In any case, at this point it is not worth
11454 supporting this feature. */
11455
7dda8cff 11456 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11457}
11458
f7f9143b
JB
11459/* True iff FRAME is very likely to be that of a function that is
11460 part of the runtime system. This is all very heuristic, but is
11461 intended to be used as advice as to what frames are uninteresting
11462 to most users. */
11463
11464static int
11465is_known_support_routine (struct frame_info *frame)
11466{
4ed6b5be 11467 struct symtab_and_line sal;
55b87a52 11468 char *func_name;
692465f1 11469 enum language func_lang;
f7f9143b 11470 int i;
f35a17b5 11471 const char *fullname;
f7f9143b 11472
4ed6b5be
JB
11473 /* If this code does not have any debugging information (no symtab),
11474 This cannot be any user code. */
f7f9143b 11475
4ed6b5be 11476 find_frame_sal (frame, &sal);
f7f9143b
JB
11477 if (sal.symtab == NULL)
11478 return 1;
11479
4ed6b5be
JB
11480 /* If there is a symtab, but the associated source file cannot be
11481 located, then assume this is not user code: Selecting a frame
11482 for which we cannot display the code would not be very helpful
11483 for the user. This should also take care of case such as VxWorks
11484 where the kernel has some debugging info provided for a few units. */
f7f9143b 11485
f35a17b5
JK
11486 fullname = symtab_to_fullname (sal.symtab);
11487 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11488 return 1;
11489
4ed6b5be
JB
11490 /* Check the unit filename againt the Ada runtime file naming.
11491 We also check the name of the objfile against the name of some
11492 known system libraries that sometimes come with debugging info
11493 too. */
11494
f7f9143b
JB
11495 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11496 {
11497 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11498 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 11499 return 1;
4ed6b5be 11500 if (sal.symtab->objfile != NULL
4262abfb 11501 && re_exec (objfile_name (sal.symtab->objfile)))
4ed6b5be 11502 return 1;
f7f9143b
JB
11503 }
11504
4ed6b5be 11505 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11506
e9e07ba6 11507 find_frame_funname (frame, &func_name, &func_lang, NULL);
f7f9143b
JB
11508 if (func_name == NULL)
11509 return 1;
11510
11511 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11512 {
11513 re_comp (known_auxiliary_function_name_patterns[i]);
11514 if (re_exec (func_name))
55b87a52
KS
11515 {
11516 xfree (func_name);
11517 return 1;
11518 }
f7f9143b
JB
11519 }
11520
55b87a52 11521 xfree (func_name);
f7f9143b
JB
11522 return 0;
11523}
11524
11525/* Find the first frame that contains debugging information and that is not
11526 part of the Ada run-time, starting from FI and moving upward. */
11527
0ef643c8 11528void
f7f9143b
JB
11529ada_find_printable_frame (struct frame_info *fi)
11530{
11531 for (; fi != NULL; fi = get_prev_frame (fi))
11532 {
11533 if (!is_known_support_routine (fi))
11534 {
11535 select_frame (fi);
11536 break;
11537 }
11538 }
11539
11540}
11541
11542/* Assuming that the inferior just triggered an unhandled exception
11543 catchpoint, return the address in inferior memory where the name
11544 of the exception is stored.
11545
11546 Return zero if the address could not be computed. */
11547
11548static CORE_ADDR
11549ada_unhandled_exception_name_addr (void)
0259addd
JB
11550{
11551 return parse_and_eval_address ("e.full_name");
11552}
11553
11554/* Same as ada_unhandled_exception_name_addr, except that this function
11555 should be used when the inferior uses an older version of the runtime,
11556 where the exception name needs to be extracted from a specific frame
11557 several frames up in the callstack. */
11558
11559static CORE_ADDR
11560ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11561{
11562 int frame_level;
11563 struct frame_info *fi;
3eecfa55 11564 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
55b87a52 11565 struct cleanup *old_chain;
f7f9143b
JB
11566
11567 /* To determine the name of this exception, we need to select
11568 the frame corresponding to RAISE_SYM_NAME. This frame is
11569 at least 3 levels up, so we simply skip the first 3 frames
11570 without checking the name of their associated function. */
11571 fi = get_current_frame ();
11572 for (frame_level = 0; frame_level < 3; frame_level += 1)
11573 if (fi != NULL)
11574 fi = get_prev_frame (fi);
11575
55b87a52 11576 old_chain = make_cleanup (null_cleanup, NULL);
f7f9143b
JB
11577 while (fi != NULL)
11578 {
55b87a52 11579 char *func_name;
692465f1
JB
11580 enum language func_lang;
11581
e9e07ba6 11582 find_frame_funname (fi, &func_name, &func_lang, NULL);
55b87a52
KS
11583 if (func_name != NULL)
11584 {
11585 make_cleanup (xfree, func_name);
11586
11587 if (strcmp (func_name,
11588 data->exception_info->catch_exception_sym) == 0)
11589 break; /* We found the frame we were looking for... */
11590 fi = get_prev_frame (fi);
11591 }
f7f9143b 11592 }
55b87a52 11593 do_cleanups (old_chain);
f7f9143b
JB
11594
11595 if (fi == NULL)
11596 return 0;
11597
11598 select_frame (fi);
11599 return parse_and_eval_address ("id.full_name");
11600}
11601
11602/* Assuming the inferior just triggered an Ada exception catchpoint
11603 (of any type), return the address in inferior memory where the name
11604 of the exception is stored, if applicable.
11605
11606 Return zero if the address could not be computed, or if not relevant. */
11607
11608static CORE_ADDR
761269c8 11609ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11610 struct breakpoint *b)
11611{
3eecfa55
JB
11612 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11613
f7f9143b
JB
11614 switch (ex)
11615 {
761269c8 11616 case ada_catch_exception:
f7f9143b
JB
11617 return (parse_and_eval_address ("e.full_name"));
11618 break;
11619
761269c8 11620 case ada_catch_exception_unhandled:
3eecfa55 11621 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b
JB
11622 break;
11623
761269c8 11624 case ada_catch_assert:
f7f9143b
JB
11625 return 0; /* Exception name is not relevant in this case. */
11626 break;
11627
11628 default:
11629 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11630 break;
11631 }
11632
11633 return 0; /* Should never be reached. */
11634}
11635
11636/* Same as ada_exception_name_addr_1, except that it intercepts and contains
11637 any error that ada_exception_name_addr_1 might cause to be thrown.
11638 When an error is intercepted, a warning with the error message is printed,
11639 and zero is returned. */
11640
11641static CORE_ADDR
761269c8 11642ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11643 struct breakpoint *b)
11644{
bfd189b1 11645 volatile struct gdb_exception e;
f7f9143b
JB
11646 CORE_ADDR result = 0;
11647
11648 TRY_CATCH (e, RETURN_MASK_ERROR)
11649 {
11650 result = ada_exception_name_addr_1 (ex, b);
11651 }
11652
11653 if (e.reason < 0)
11654 {
11655 warning (_("failed to get exception name: %s"), e.message);
11656 return 0;
11657 }
11658
11659 return result;
11660}
11661
28010a5d
PA
11662static char *ada_exception_catchpoint_cond_string (const char *excep_string);
11663
11664/* Ada catchpoints.
11665
11666 In the case of catchpoints on Ada exceptions, the catchpoint will
11667 stop the target on every exception the program throws. When a user
11668 specifies the name of a specific exception, we translate this
11669 request into a condition expression (in text form), and then parse
11670 it into an expression stored in each of the catchpoint's locations.
11671 We then use this condition to check whether the exception that was
11672 raised is the one the user is interested in. If not, then the
11673 target is resumed again. We store the name of the requested
11674 exception, in order to be able to re-set the condition expression
11675 when symbols change. */
11676
11677/* An instance of this type is used to represent an Ada catchpoint
11678 breakpoint location. It includes a "struct bp_location" as a kind
11679 of base class; users downcast to "struct bp_location *" when
11680 needed. */
11681
11682struct ada_catchpoint_location
11683{
11684 /* The base class. */
11685 struct bp_location base;
11686
11687 /* The condition that checks whether the exception that was raised
11688 is the specific exception the user specified on catchpoint
11689 creation. */
11690 struct expression *excep_cond_expr;
11691};
11692
11693/* Implement the DTOR method in the bp_location_ops structure for all
11694 Ada exception catchpoint kinds. */
11695
11696static void
11697ada_catchpoint_location_dtor (struct bp_location *bl)
11698{
11699 struct ada_catchpoint_location *al = (struct ada_catchpoint_location *) bl;
11700
11701 xfree (al->excep_cond_expr);
11702}
11703
11704/* The vtable to be used in Ada catchpoint locations. */
11705
11706static const struct bp_location_ops ada_catchpoint_location_ops =
11707{
11708 ada_catchpoint_location_dtor
11709};
11710
11711/* An instance of this type is used to represent an Ada catchpoint.
11712 It includes a "struct breakpoint" as a kind of base class; users
11713 downcast to "struct breakpoint *" when needed. */
11714
11715struct ada_catchpoint
11716{
11717 /* The base class. */
11718 struct breakpoint base;
11719
11720 /* The name of the specific exception the user specified. */
11721 char *excep_string;
11722};
11723
11724/* Parse the exception condition string in the context of each of the
11725 catchpoint's locations, and store them for later evaluation. */
11726
11727static void
11728create_excep_cond_exprs (struct ada_catchpoint *c)
11729{
11730 struct cleanup *old_chain;
11731 struct bp_location *bl;
11732 char *cond_string;
11733
11734 /* Nothing to do if there's no specific exception to catch. */
11735 if (c->excep_string == NULL)
11736 return;
11737
11738 /* Same if there are no locations... */
11739 if (c->base.loc == NULL)
11740 return;
11741
11742 /* Compute the condition expression in text form, from the specific
11743 expection we want to catch. */
11744 cond_string = ada_exception_catchpoint_cond_string (c->excep_string);
11745 old_chain = make_cleanup (xfree, cond_string);
11746
11747 /* Iterate over all the catchpoint's locations, and parse an
11748 expression for each. */
11749 for (bl = c->base.loc; bl != NULL; bl = bl->next)
11750 {
11751 struct ada_catchpoint_location *ada_loc
11752 = (struct ada_catchpoint_location *) bl;
11753 struct expression *exp = NULL;
11754
11755 if (!bl->shlib_disabled)
11756 {
11757 volatile struct gdb_exception e;
bbc13ae3 11758 const char *s;
28010a5d
PA
11759
11760 s = cond_string;
11761 TRY_CATCH (e, RETURN_MASK_ERROR)
11762 {
1bb9788d
TT
11763 exp = parse_exp_1 (&s, bl->address,
11764 block_for_pc (bl->address), 0);
28010a5d
PA
11765 }
11766 if (e.reason < 0)
849f2b52
JB
11767 {
11768 warning (_("failed to reevaluate internal exception condition "
11769 "for catchpoint %d: %s"),
11770 c->base.number, e.message);
11771 /* There is a bug in GCC on sparc-solaris when building with
11772 optimization which causes EXP to change unexpectedly
11773 (http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56982).
11774 The problem should be fixed starting with GCC 4.9.
11775 In the meantime, work around it by forcing EXP back
11776 to NULL. */
11777 exp = NULL;
11778 }
28010a5d
PA
11779 }
11780
11781 ada_loc->excep_cond_expr = exp;
11782 }
11783
11784 do_cleanups (old_chain);
11785}
11786
11787/* Implement the DTOR method in the breakpoint_ops structure for all
11788 exception catchpoint kinds. */
11789
11790static void
761269c8 11791dtor_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
11792{
11793 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
11794
11795 xfree (c->excep_string);
348d480f 11796
2060206e 11797 bkpt_breakpoint_ops.dtor (b);
28010a5d
PA
11798}
11799
11800/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
11801 structure for all exception catchpoint kinds. */
11802
11803static struct bp_location *
761269c8 11804allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
11805 struct breakpoint *self)
11806{
11807 struct ada_catchpoint_location *loc;
11808
11809 loc = XNEW (struct ada_catchpoint_location);
11810 init_bp_location (&loc->base, &ada_catchpoint_location_ops, self);
11811 loc->excep_cond_expr = NULL;
11812 return &loc->base;
11813}
11814
11815/* Implement the RE_SET method in the breakpoint_ops structure for all
11816 exception catchpoint kinds. */
11817
11818static void
761269c8 11819re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
11820{
11821 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
11822
11823 /* Call the base class's method. This updates the catchpoint's
11824 locations. */
2060206e 11825 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
11826
11827 /* Reparse the exception conditional expressions. One for each
11828 location. */
11829 create_excep_cond_exprs (c);
11830}
11831
11832/* Returns true if we should stop for this breakpoint hit. If the
11833 user specified a specific exception, we only want to cause a stop
11834 if the program thrown that exception. */
11835
11836static int
11837should_stop_exception (const struct bp_location *bl)
11838{
11839 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
11840 const struct ada_catchpoint_location *ada_loc
11841 = (const struct ada_catchpoint_location *) bl;
11842 volatile struct gdb_exception ex;
11843 int stop;
11844
11845 /* With no specific exception, should always stop. */
11846 if (c->excep_string == NULL)
11847 return 1;
11848
11849 if (ada_loc->excep_cond_expr == NULL)
11850 {
11851 /* We will have a NULL expression if back when we were creating
11852 the expressions, this location's had failed to parse. */
11853 return 1;
11854 }
11855
11856 stop = 1;
11857 TRY_CATCH (ex, RETURN_MASK_ALL)
11858 {
11859 struct value *mark;
11860
11861 mark = value_mark ();
11862 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr));
11863 value_free_to_mark (mark);
11864 }
11865 if (ex.reason < 0)
11866 exception_fprintf (gdb_stderr, ex,
11867 _("Error in testing exception condition:\n"));
11868 return stop;
11869}
11870
11871/* Implement the CHECK_STATUS method in the breakpoint_ops structure
11872 for all exception catchpoint kinds. */
11873
11874static void
761269c8 11875check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
11876{
11877 bs->stop = should_stop_exception (bs->bp_location_at);
11878}
11879
f7f9143b
JB
11880/* Implement the PRINT_IT method in the breakpoint_ops structure
11881 for all exception catchpoint kinds. */
11882
11883static enum print_stop_action
761269c8 11884print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 11885{
79a45e25 11886 struct ui_out *uiout = current_uiout;
348d480f
PA
11887 struct breakpoint *b = bs->breakpoint_at;
11888
956a9fb9 11889 annotate_catchpoint (b->number);
f7f9143b 11890
956a9fb9 11891 if (ui_out_is_mi_like_p (uiout))
f7f9143b 11892 {
956a9fb9
JB
11893 ui_out_field_string (uiout, "reason",
11894 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
11895 ui_out_field_string (uiout, "disp", bpdisp_text (b->disposition));
f7f9143b
JB
11896 }
11897
00eb2c4a
JB
11898 ui_out_text (uiout,
11899 b->disposition == disp_del ? "\nTemporary catchpoint "
11900 : "\nCatchpoint ");
956a9fb9
JB
11901 ui_out_field_int (uiout, "bkptno", b->number);
11902 ui_out_text (uiout, ", ");
f7f9143b 11903
f7f9143b
JB
11904 switch (ex)
11905 {
761269c8
JB
11906 case ada_catch_exception:
11907 case ada_catch_exception_unhandled:
956a9fb9
JB
11908 {
11909 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
11910 char exception_name[256];
11911
11912 if (addr != 0)
11913 {
c714b426
PA
11914 read_memory (addr, (gdb_byte *) exception_name,
11915 sizeof (exception_name) - 1);
956a9fb9
JB
11916 exception_name [sizeof (exception_name) - 1] = '\0';
11917 }
11918 else
11919 {
11920 /* For some reason, we were unable to read the exception
11921 name. This could happen if the Runtime was compiled
11922 without debugging info, for instance. In that case,
11923 just replace the exception name by the generic string
11924 "exception" - it will read as "an exception" in the
11925 notification we are about to print. */
967cff16 11926 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
11927 }
11928 /* In the case of unhandled exception breakpoints, we print
11929 the exception name as "unhandled EXCEPTION_NAME", to make
11930 it clearer to the user which kind of catchpoint just got
11931 hit. We used ui_out_text to make sure that this extra
11932 info does not pollute the exception name in the MI case. */
761269c8 11933 if (ex == ada_catch_exception_unhandled)
956a9fb9
JB
11934 ui_out_text (uiout, "unhandled ");
11935 ui_out_field_string (uiout, "exception-name", exception_name);
11936 }
11937 break;
761269c8 11938 case ada_catch_assert:
956a9fb9
JB
11939 /* In this case, the name of the exception is not really
11940 important. Just print "failed assertion" to make it clearer
11941 that his program just hit an assertion-failure catchpoint.
11942 We used ui_out_text because this info does not belong in
11943 the MI output. */
11944 ui_out_text (uiout, "failed assertion");
11945 break;
f7f9143b 11946 }
956a9fb9
JB
11947 ui_out_text (uiout, " at ");
11948 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
11949
11950 return PRINT_SRC_AND_LOC;
11951}
11952
11953/* Implement the PRINT_ONE method in the breakpoint_ops structure
11954 for all exception catchpoint kinds. */
11955
11956static void
761269c8 11957print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 11958 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 11959{
79a45e25 11960 struct ui_out *uiout = current_uiout;
28010a5d 11961 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
11962 struct value_print_options opts;
11963
11964 get_user_print_options (&opts);
11965 if (opts.addressprint)
f7f9143b
JB
11966 {
11967 annotate_field (4);
5af949e3 11968 ui_out_field_core_addr (uiout, "addr", b->loc->gdbarch, b->loc->address);
f7f9143b
JB
11969 }
11970
11971 annotate_field (5);
a6d9a66e 11972 *last_loc = b->loc;
f7f9143b
JB
11973 switch (ex)
11974 {
761269c8 11975 case ada_catch_exception:
28010a5d 11976 if (c->excep_string != NULL)
f7f9143b 11977 {
28010a5d
PA
11978 char *msg = xstrprintf (_("`%s' Ada exception"), c->excep_string);
11979
f7f9143b
JB
11980 ui_out_field_string (uiout, "what", msg);
11981 xfree (msg);
11982 }
11983 else
11984 ui_out_field_string (uiout, "what", "all Ada exceptions");
11985
11986 break;
11987
761269c8 11988 case ada_catch_exception_unhandled:
f7f9143b
JB
11989 ui_out_field_string (uiout, "what", "unhandled Ada exceptions");
11990 break;
11991
761269c8 11992 case ada_catch_assert:
f7f9143b
JB
11993 ui_out_field_string (uiout, "what", "failed Ada assertions");
11994 break;
11995
11996 default:
11997 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11998 break;
11999 }
12000}
12001
12002/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12003 for all exception catchpoint kinds. */
12004
12005static void
761269c8 12006print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12007 struct breakpoint *b)
12008{
28010a5d 12009 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12010 struct ui_out *uiout = current_uiout;
28010a5d 12011
00eb2c4a
JB
12012 ui_out_text (uiout, b->disposition == disp_del ? _("Temporary catchpoint ")
12013 : _("Catchpoint "));
12014 ui_out_field_int (uiout, "bkptno", b->number);
12015 ui_out_text (uiout, ": ");
12016
f7f9143b
JB
12017 switch (ex)
12018 {
761269c8 12019 case ada_catch_exception:
28010a5d 12020 if (c->excep_string != NULL)
00eb2c4a
JB
12021 {
12022 char *info = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12023 struct cleanup *old_chain = make_cleanup (xfree, info);
12024
12025 ui_out_text (uiout, info);
12026 do_cleanups (old_chain);
12027 }
f7f9143b 12028 else
00eb2c4a 12029 ui_out_text (uiout, _("all Ada exceptions"));
f7f9143b
JB
12030 break;
12031
761269c8 12032 case ada_catch_exception_unhandled:
00eb2c4a 12033 ui_out_text (uiout, _("unhandled Ada exceptions"));
f7f9143b
JB
12034 break;
12035
761269c8 12036 case ada_catch_assert:
00eb2c4a 12037 ui_out_text (uiout, _("failed Ada assertions"));
f7f9143b
JB
12038 break;
12039
12040 default:
12041 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12042 break;
12043 }
12044}
12045
6149aea9
PA
12046/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12047 for all exception catchpoint kinds. */
12048
12049static void
761269c8 12050print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12051 struct breakpoint *b, struct ui_file *fp)
12052{
28010a5d
PA
12053 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12054
6149aea9
PA
12055 switch (ex)
12056 {
761269c8 12057 case ada_catch_exception:
6149aea9 12058 fprintf_filtered (fp, "catch exception");
28010a5d
PA
12059 if (c->excep_string != NULL)
12060 fprintf_filtered (fp, " %s", c->excep_string);
6149aea9
PA
12061 break;
12062
761269c8 12063 case ada_catch_exception_unhandled:
78076abc 12064 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12065 break;
12066
761269c8 12067 case ada_catch_assert:
6149aea9
PA
12068 fprintf_filtered (fp, "catch assert");
12069 break;
12070
12071 default:
12072 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12073 }
d9b3f62e 12074 print_recreate_thread (b, fp);
6149aea9
PA
12075}
12076
f7f9143b
JB
12077/* Virtual table for "catch exception" breakpoints. */
12078
28010a5d
PA
12079static void
12080dtor_catch_exception (struct breakpoint *b)
12081{
761269c8 12082 dtor_exception (ada_catch_exception, b);
28010a5d
PA
12083}
12084
12085static struct bp_location *
12086allocate_location_catch_exception (struct breakpoint *self)
12087{
761269c8 12088 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12089}
12090
12091static void
12092re_set_catch_exception (struct breakpoint *b)
12093{
761269c8 12094 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12095}
12096
12097static void
12098check_status_catch_exception (bpstat bs)
12099{
761269c8 12100 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12101}
12102
f7f9143b 12103static enum print_stop_action
348d480f 12104print_it_catch_exception (bpstat bs)
f7f9143b 12105{
761269c8 12106 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12107}
12108
12109static void
a6d9a66e 12110print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12111{
761269c8 12112 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12113}
12114
12115static void
12116print_mention_catch_exception (struct breakpoint *b)
12117{
761269c8 12118 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12119}
12120
6149aea9
PA
12121static void
12122print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12123{
761269c8 12124 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12125}
12126
2060206e 12127static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12128
12129/* Virtual table for "catch exception unhandled" breakpoints. */
12130
28010a5d
PA
12131static void
12132dtor_catch_exception_unhandled (struct breakpoint *b)
12133{
761269c8 12134 dtor_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12135}
12136
12137static struct bp_location *
12138allocate_location_catch_exception_unhandled (struct breakpoint *self)
12139{
761269c8 12140 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12141}
12142
12143static void
12144re_set_catch_exception_unhandled (struct breakpoint *b)
12145{
761269c8 12146 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12147}
12148
12149static void
12150check_status_catch_exception_unhandled (bpstat bs)
12151{
761269c8 12152 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12153}
12154
f7f9143b 12155static enum print_stop_action
348d480f 12156print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12157{
761269c8 12158 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12159}
12160
12161static void
a6d9a66e
UW
12162print_one_catch_exception_unhandled (struct breakpoint *b,
12163 struct bp_location **last_loc)
f7f9143b 12164{
761269c8 12165 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12166}
12167
12168static void
12169print_mention_catch_exception_unhandled (struct breakpoint *b)
12170{
761269c8 12171 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12172}
12173
6149aea9
PA
12174static void
12175print_recreate_catch_exception_unhandled (struct breakpoint *b,
12176 struct ui_file *fp)
12177{
761269c8 12178 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12179}
12180
2060206e 12181static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12182
12183/* Virtual table for "catch assert" breakpoints. */
12184
28010a5d
PA
12185static void
12186dtor_catch_assert (struct breakpoint *b)
12187{
761269c8 12188 dtor_exception (ada_catch_assert, b);
28010a5d
PA
12189}
12190
12191static struct bp_location *
12192allocate_location_catch_assert (struct breakpoint *self)
12193{
761269c8 12194 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12195}
12196
12197static void
12198re_set_catch_assert (struct breakpoint *b)
12199{
761269c8 12200 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12201}
12202
12203static void
12204check_status_catch_assert (bpstat bs)
12205{
761269c8 12206 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12207}
12208
f7f9143b 12209static enum print_stop_action
348d480f 12210print_it_catch_assert (bpstat bs)
f7f9143b 12211{
761269c8 12212 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12213}
12214
12215static void
a6d9a66e 12216print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12217{
761269c8 12218 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12219}
12220
12221static void
12222print_mention_catch_assert (struct breakpoint *b)
12223{
761269c8 12224 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12225}
12226
6149aea9
PA
12227static void
12228print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12229{
761269c8 12230 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12231}
12232
2060206e 12233static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12234
f7f9143b
JB
12235/* Return a newly allocated copy of the first space-separated token
12236 in ARGSP, and then adjust ARGSP to point immediately after that
12237 token.
12238
12239 Return NULL if ARGPS does not contain any more tokens. */
12240
12241static char *
12242ada_get_next_arg (char **argsp)
12243{
12244 char *args = *argsp;
12245 char *end;
12246 char *result;
12247
0fcd72ba 12248 args = skip_spaces (args);
f7f9143b
JB
12249 if (args[0] == '\0')
12250 return NULL; /* No more arguments. */
12251
12252 /* Find the end of the current argument. */
12253
0fcd72ba 12254 end = skip_to_space (args);
f7f9143b
JB
12255
12256 /* Adjust ARGSP to point to the start of the next argument. */
12257
12258 *argsp = end;
12259
12260 /* Make a copy of the current argument and return it. */
12261
12262 result = xmalloc (end - args + 1);
12263 strncpy (result, args, end - args);
12264 result[end - args] = '\0';
12265
12266 return result;
12267}
12268
12269/* Split the arguments specified in a "catch exception" command.
12270 Set EX to the appropriate catchpoint type.
28010a5d 12271 Set EXCEP_STRING to the name of the specific exception if
5845583d
JB
12272 specified by the user.
12273 If a condition is found at the end of the arguments, the condition
12274 expression is stored in COND_STRING (memory must be deallocated
12275 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12276
12277static void
12278catch_ada_exception_command_split (char *args,
761269c8 12279 enum ada_exception_catchpoint_kind *ex,
5845583d
JB
12280 char **excep_string,
12281 char **cond_string)
f7f9143b
JB
12282{
12283 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
12284 char *exception_name;
5845583d 12285 char *cond = NULL;
f7f9143b
JB
12286
12287 exception_name = ada_get_next_arg (&args);
5845583d
JB
12288 if (exception_name != NULL && strcmp (exception_name, "if") == 0)
12289 {
12290 /* This is not an exception name; this is the start of a condition
12291 expression for a catchpoint on all exceptions. So, "un-get"
12292 this token, and set exception_name to NULL. */
12293 xfree (exception_name);
12294 exception_name = NULL;
12295 args -= 2;
12296 }
f7f9143b
JB
12297 make_cleanup (xfree, exception_name);
12298
5845583d 12299 /* Check to see if we have a condition. */
f7f9143b 12300
0fcd72ba 12301 args = skip_spaces (args);
5845583d
JB
12302 if (strncmp (args, "if", 2) == 0
12303 && (isspace (args[2]) || args[2] == '\0'))
12304 {
12305 args += 2;
12306 args = skip_spaces (args);
12307
12308 if (args[0] == '\0')
12309 error (_("Condition missing after `if' keyword"));
12310 cond = xstrdup (args);
12311 make_cleanup (xfree, cond);
12312
12313 args += strlen (args);
12314 }
12315
12316 /* Check that we do not have any more arguments. Anything else
12317 is unexpected. */
f7f9143b
JB
12318
12319 if (args[0] != '\0')
12320 error (_("Junk at end of expression"));
12321
12322 discard_cleanups (old_chain);
12323
12324 if (exception_name == NULL)
12325 {
12326 /* Catch all exceptions. */
761269c8 12327 *ex = ada_catch_exception;
28010a5d 12328 *excep_string = NULL;
f7f9143b
JB
12329 }
12330 else if (strcmp (exception_name, "unhandled") == 0)
12331 {
12332 /* Catch unhandled exceptions. */
761269c8 12333 *ex = ada_catch_exception_unhandled;
28010a5d 12334 *excep_string = NULL;
f7f9143b
JB
12335 }
12336 else
12337 {
12338 /* Catch a specific exception. */
761269c8 12339 *ex = ada_catch_exception;
28010a5d 12340 *excep_string = exception_name;
f7f9143b 12341 }
5845583d 12342 *cond_string = cond;
f7f9143b
JB
12343}
12344
12345/* Return the name of the symbol on which we should break in order to
12346 implement a catchpoint of the EX kind. */
12347
12348static const char *
761269c8 12349ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12350{
3eecfa55
JB
12351 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12352
12353 gdb_assert (data->exception_info != NULL);
0259addd 12354
f7f9143b
JB
12355 switch (ex)
12356 {
761269c8 12357 case ada_catch_exception:
3eecfa55 12358 return (data->exception_info->catch_exception_sym);
f7f9143b 12359 break;
761269c8 12360 case ada_catch_exception_unhandled:
3eecfa55 12361 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12362 break;
761269c8 12363 case ada_catch_assert:
3eecfa55 12364 return (data->exception_info->catch_assert_sym);
f7f9143b
JB
12365 break;
12366 default:
12367 internal_error (__FILE__, __LINE__,
12368 _("unexpected catchpoint kind (%d)"), ex);
12369 }
12370}
12371
12372/* Return the breakpoint ops "virtual table" used for catchpoints
12373 of the EX kind. */
12374
c0a91b2b 12375static const struct breakpoint_ops *
761269c8 12376ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12377{
12378 switch (ex)
12379 {
761269c8 12380 case ada_catch_exception:
f7f9143b
JB
12381 return (&catch_exception_breakpoint_ops);
12382 break;
761269c8 12383 case ada_catch_exception_unhandled:
f7f9143b
JB
12384 return (&catch_exception_unhandled_breakpoint_ops);
12385 break;
761269c8 12386 case ada_catch_assert:
f7f9143b
JB
12387 return (&catch_assert_breakpoint_ops);
12388 break;
12389 default:
12390 internal_error (__FILE__, __LINE__,
12391 _("unexpected catchpoint kind (%d)"), ex);
12392 }
12393}
12394
12395/* Return the condition that will be used to match the current exception
12396 being raised with the exception that the user wants to catch. This
12397 assumes that this condition is used when the inferior just triggered
12398 an exception catchpoint.
12399
12400 The string returned is a newly allocated string that needs to be
12401 deallocated later. */
12402
12403static char *
28010a5d 12404ada_exception_catchpoint_cond_string (const char *excep_string)
f7f9143b 12405{
3d0b0fa3
JB
12406 int i;
12407
0963b4bd 12408 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12409 runtime units that have been compiled without debugging info; if
28010a5d 12410 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12411 exception (e.g. "constraint_error") then, during the evaluation
12412 of the condition expression, the symbol lookup on this name would
0963b4bd 12413 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12414 may then be set only on user-defined exceptions which have the
12415 same not-fully-qualified name (e.g. my_package.constraint_error).
12416
12417 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12418 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12419 exception constraint_error" is rewritten into "catch exception
12420 standard.constraint_error".
12421
12422 If an exception named contraint_error is defined in another package of
12423 the inferior program, then the only way to specify this exception as a
12424 breakpoint condition is to use its fully-qualified named:
12425 e.g. my_package.constraint_error. */
12426
12427 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12428 {
28010a5d 12429 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3
JB
12430 {
12431 return xstrprintf ("long_integer (e) = long_integer (&standard.%s)",
28010a5d 12432 excep_string);
3d0b0fa3
JB
12433 }
12434 }
28010a5d 12435 return xstrprintf ("long_integer (e) = long_integer (&%s)", excep_string);
f7f9143b
JB
12436}
12437
12438/* Return the symtab_and_line that should be used to insert an exception
12439 catchpoint of the TYPE kind.
12440
28010a5d
PA
12441 EXCEP_STRING should contain the name of a specific exception that
12442 the catchpoint should catch, or NULL otherwise.
f7f9143b 12443
28010a5d
PA
12444 ADDR_STRING returns the name of the function where the real
12445 breakpoint that implements the catchpoints is set, depending on the
12446 type of catchpoint we need to create. */
f7f9143b
JB
12447
12448static struct symtab_and_line
761269c8 12449ada_exception_sal (enum ada_exception_catchpoint_kind ex, char *excep_string,
c0a91b2b 12450 char **addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12451{
12452 const char *sym_name;
12453 struct symbol *sym;
f7f9143b 12454
0259addd
JB
12455 /* First, find out which exception support info to use. */
12456 ada_exception_support_info_sniffer ();
12457
12458 /* Then lookup the function on which we will break in order to catch
f7f9143b 12459 the Ada exceptions requested by the user. */
f7f9143b
JB
12460 sym_name = ada_exception_sym_name (ex);
12461 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12462
f17011e0
JB
12463 /* We can assume that SYM is not NULL at this stage. If the symbol
12464 did not exist, ada_exception_support_info_sniffer would have
12465 raised an exception.
f7f9143b 12466
f17011e0
JB
12467 Also, ada_exception_support_info_sniffer should have already
12468 verified that SYM is a function symbol. */
12469 gdb_assert (sym != NULL);
12470 gdb_assert (SYMBOL_CLASS (sym) == LOC_BLOCK);
f7f9143b
JB
12471
12472 /* Set ADDR_STRING. */
f7f9143b
JB
12473 *addr_string = xstrdup (sym_name);
12474
f7f9143b 12475 /* Set OPS. */
4b9eee8c 12476 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12477
f17011e0 12478 return find_function_start_sal (sym, 1);
f7f9143b
JB
12479}
12480
b4a5b78b 12481/* Create an Ada exception catchpoint.
f7f9143b 12482
b4a5b78b 12483 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12484
2df4d1d5
JB
12485 If EXCEPT_STRING is NULL, this catchpoint is expected to trigger
12486 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
12487 of the exception to which this catchpoint applies. When not NULL,
12488 the string must be allocated on the heap, and its deallocation
12489 is no longer the responsibility of the caller.
12490
12491 COND_STRING, if not NULL, is the catchpoint condition. This string
12492 must be allocated on the heap, and its deallocation is no longer
12493 the responsibility of the caller.
f7f9143b 12494
b4a5b78b
JB
12495 TEMPFLAG, if nonzero, means that the underlying breakpoint
12496 should be temporary.
28010a5d 12497
b4a5b78b 12498 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12499
349774ef 12500void
28010a5d 12501create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12502 enum ada_exception_catchpoint_kind ex_kind,
28010a5d 12503 char *excep_string,
5845583d 12504 char *cond_string,
28010a5d 12505 int tempflag,
349774ef 12506 int disabled,
28010a5d
PA
12507 int from_tty)
12508{
12509 struct ada_catchpoint *c;
b4a5b78b
JB
12510 char *addr_string = NULL;
12511 const struct breakpoint_ops *ops = NULL;
12512 struct symtab_and_line sal
12513 = ada_exception_sal (ex_kind, excep_string, &addr_string, &ops);
28010a5d
PA
12514
12515 c = XNEW (struct ada_catchpoint);
12516 init_ada_exception_breakpoint (&c->base, gdbarch, sal, addr_string,
349774ef 12517 ops, tempflag, disabled, from_tty);
28010a5d
PA
12518 c->excep_string = excep_string;
12519 create_excep_cond_exprs (c);
5845583d
JB
12520 if (cond_string != NULL)
12521 set_breakpoint_condition (&c->base, cond_string, from_tty);
3ea46bff 12522 install_breakpoint (0, &c->base, 1);
f7f9143b
JB
12523}
12524
9ac4176b
PA
12525/* Implement the "catch exception" command. */
12526
12527static void
12528catch_ada_exception_command (char *arg, int from_tty,
12529 struct cmd_list_element *command)
12530{
12531 struct gdbarch *gdbarch = get_current_arch ();
12532 int tempflag;
761269c8 12533 enum ada_exception_catchpoint_kind ex_kind;
28010a5d 12534 char *excep_string = NULL;
5845583d 12535 char *cond_string = NULL;
9ac4176b
PA
12536
12537 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12538
12539 if (!arg)
12540 arg = "";
b4a5b78b
JB
12541 catch_ada_exception_command_split (arg, &ex_kind, &excep_string,
12542 &cond_string);
12543 create_ada_exception_catchpoint (gdbarch, ex_kind,
12544 excep_string, cond_string,
349774ef
JB
12545 tempflag, 1 /* enabled */,
12546 from_tty);
9ac4176b
PA
12547}
12548
b4a5b78b 12549/* Split the arguments specified in a "catch assert" command.
5845583d 12550
b4a5b78b
JB
12551 ARGS contains the command's arguments (or the empty string if
12552 no arguments were passed).
5845583d
JB
12553
12554 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12555 (the memory needs to be deallocated after use). */
5845583d 12556
b4a5b78b
JB
12557static void
12558catch_ada_assert_command_split (char *args, char **cond_string)
f7f9143b 12559{
5845583d 12560 args = skip_spaces (args);
f7f9143b 12561
5845583d
JB
12562 /* Check whether a condition was provided. */
12563 if (strncmp (args, "if", 2) == 0
12564 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12565 {
5845583d 12566 args += 2;
0fcd72ba 12567 args = skip_spaces (args);
5845583d
JB
12568 if (args[0] == '\0')
12569 error (_("condition missing after `if' keyword"));
12570 *cond_string = xstrdup (args);
f7f9143b
JB
12571 }
12572
5845583d
JB
12573 /* Otherwise, there should be no other argument at the end of
12574 the command. */
12575 else if (args[0] != '\0')
12576 error (_("Junk at end of arguments."));
f7f9143b
JB
12577}
12578
9ac4176b
PA
12579/* Implement the "catch assert" command. */
12580
12581static void
12582catch_assert_command (char *arg, int from_tty,
12583 struct cmd_list_element *command)
12584{
12585 struct gdbarch *gdbarch = get_current_arch ();
12586 int tempflag;
5845583d 12587 char *cond_string = NULL;
9ac4176b
PA
12588
12589 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12590
12591 if (!arg)
12592 arg = "";
b4a5b78b 12593 catch_ada_assert_command_split (arg, &cond_string);
761269c8 12594 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
b4a5b78b 12595 NULL, cond_string,
349774ef
JB
12596 tempflag, 1 /* enabled */,
12597 from_tty);
9ac4176b 12598}
778865d3
JB
12599
12600/* Return non-zero if the symbol SYM is an Ada exception object. */
12601
12602static int
12603ada_is_exception_sym (struct symbol *sym)
12604{
12605 const char *type_name = type_name_no_tag (SYMBOL_TYPE (sym));
12606
12607 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
12608 && SYMBOL_CLASS (sym) != LOC_BLOCK
12609 && SYMBOL_CLASS (sym) != LOC_CONST
12610 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12611 && type_name != NULL && strcmp (type_name, "exception") == 0);
12612}
12613
12614/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12615 Ada exception object. This matches all exceptions except the ones
12616 defined by the Ada language. */
12617
12618static int
12619ada_is_non_standard_exception_sym (struct symbol *sym)
12620{
12621 int i;
12622
12623 if (!ada_is_exception_sym (sym))
12624 return 0;
12625
12626 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12627 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
12628 return 0; /* A standard exception. */
12629
12630 /* Numeric_Error is also a standard exception, so exclude it.
12631 See the STANDARD_EXC description for more details as to why
12632 this exception is not listed in that array. */
12633 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
12634 return 0;
12635
12636 return 1;
12637}
12638
12639/* A helper function for qsort, comparing two struct ada_exc_info
12640 objects.
12641
12642 The comparison is determined first by exception name, and then
12643 by exception address. */
12644
12645static int
12646compare_ada_exception_info (const void *a, const void *b)
12647{
12648 const struct ada_exc_info *exc_a = (struct ada_exc_info *) a;
12649 const struct ada_exc_info *exc_b = (struct ada_exc_info *) b;
12650 int result;
12651
12652 result = strcmp (exc_a->name, exc_b->name);
12653 if (result != 0)
12654 return result;
12655
12656 if (exc_a->addr < exc_b->addr)
12657 return -1;
12658 if (exc_a->addr > exc_b->addr)
12659 return 1;
12660
12661 return 0;
12662}
12663
12664/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12665 routine, but keeping the first SKIP elements untouched.
12666
12667 All duplicates are also removed. */
12668
12669static void
12670sort_remove_dups_ada_exceptions_list (VEC(ada_exc_info) **exceptions,
12671 int skip)
12672{
12673 struct ada_exc_info *to_sort
12674 = VEC_address (ada_exc_info, *exceptions) + skip;
12675 int to_sort_len
12676 = VEC_length (ada_exc_info, *exceptions) - skip;
12677 int i, j;
12678
12679 qsort (to_sort, to_sort_len, sizeof (struct ada_exc_info),
12680 compare_ada_exception_info);
12681
12682 for (i = 1, j = 1; i < to_sort_len; i++)
12683 if (compare_ada_exception_info (&to_sort[i], &to_sort[j - 1]) != 0)
12684 to_sort[j++] = to_sort[i];
12685 to_sort_len = j;
12686 VEC_truncate(ada_exc_info, *exceptions, skip + to_sort_len);
12687}
12688
12689/* A function intended as the "name_matcher" callback in the struct
12690 quick_symbol_functions' expand_symtabs_matching method.
12691
12692 SEARCH_NAME is the symbol's search name.
12693
12694 If USER_DATA is not NULL, it is a pointer to a regext_t object
12695 used to match the symbol (by natural name). Otherwise, when USER_DATA
12696 is null, no filtering is performed, and all symbols are a positive
12697 match. */
12698
12699static int
12700ada_exc_search_name_matches (const char *search_name, void *user_data)
12701{
12702 regex_t *preg = user_data;
12703
12704 if (preg == NULL)
12705 return 1;
12706
12707 /* In Ada, the symbol "search name" is a linkage name, whereas
12708 the regular expression used to do the matching refers to
12709 the natural name. So match against the decoded name. */
12710 return (regexec (preg, ada_decode (search_name), 0, NULL, 0) == 0);
12711}
12712
12713/* Add all exceptions defined by the Ada standard whose name match
12714 a regular expression.
12715
12716 If PREG is not NULL, then this regexp_t object is used to
12717 perform the symbol name matching. Otherwise, no name-based
12718 filtering is performed.
12719
12720 EXCEPTIONS is a vector of exceptions to which matching exceptions
12721 gets pushed. */
12722
12723static void
12724ada_add_standard_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12725{
12726 int i;
12727
12728 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12729 {
12730 if (preg == NULL
12731 || regexec (preg, standard_exc[i], 0, NULL, 0) == 0)
12732 {
12733 struct bound_minimal_symbol msymbol
12734 = ada_lookup_simple_minsym (standard_exc[i]);
12735
12736 if (msymbol.minsym != NULL)
12737 {
12738 struct ada_exc_info info
77e371c0 12739 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3
JB
12740
12741 VEC_safe_push (ada_exc_info, *exceptions, &info);
12742 }
12743 }
12744 }
12745}
12746
12747/* Add all Ada exceptions defined locally and accessible from the given
12748 FRAME.
12749
12750 If PREG is not NULL, then this regexp_t object is used to
12751 perform the symbol name matching. Otherwise, no name-based
12752 filtering is performed.
12753
12754 EXCEPTIONS is a vector of exceptions to which matching exceptions
12755 gets pushed. */
12756
12757static void
12758ada_add_exceptions_from_frame (regex_t *preg, struct frame_info *frame,
12759 VEC(ada_exc_info) **exceptions)
12760{
12761 struct block *block = get_frame_block (frame, 0);
12762
12763 while (block != 0)
12764 {
12765 struct block_iterator iter;
12766 struct symbol *sym;
12767
12768 ALL_BLOCK_SYMBOLS (block, iter, sym)
12769 {
12770 switch (SYMBOL_CLASS (sym))
12771 {
12772 case LOC_TYPEDEF:
12773 case LOC_BLOCK:
12774 case LOC_CONST:
12775 break;
12776 default:
12777 if (ada_is_exception_sym (sym))
12778 {
12779 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
12780 SYMBOL_VALUE_ADDRESS (sym)};
12781
12782 VEC_safe_push (ada_exc_info, *exceptions, &info);
12783 }
12784 }
12785 }
12786 if (BLOCK_FUNCTION (block) != NULL)
12787 break;
12788 block = BLOCK_SUPERBLOCK (block);
12789 }
12790}
12791
12792/* Add all exceptions defined globally whose name name match
12793 a regular expression, excluding standard exceptions.
12794
12795 The reason we exclude standard exceptions is that they need
12796 to be handled separately: Standard exceptions are defined inside
12797 a runtime unit which is normally not compiled with debugging info,
12798 and thus usually do not show up in our symbol search. However,
12799 if the unit was in fact built with debugging info, we need to
12800 exclude them because they would duplicate the entry we found
12801 during the special loop that specifically searches for those
12802 standard exceptions.
12803
12804 If PREG is not NULL, then this regexp_t object is used to
12805 perform the symbol name matching. Otherwise, no name-based
12806 filtering is performed.
12807
12808 EXCEPTIONS is a vector of exceptions to which matching exceptions
12809 gets pushed. */
12810
12811static void
12812ada_add_global_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12813{
12814 struct objfile *objfile;
12815 struct symtab *s;
12816
bb4142cf
DE
12817 expand_symtabs_matching (NULL, ada_exc_search_name_matches,
12818 VARIABLES_DOMAIN, preg);
778865d3
JB
12819
12820 ALL_PRIMARY_SYMTABS (objfile, s)
12821 {
12822 struct blockvector *bv = BLOCKVECTOR (s);
12823 int i;
12824
12825 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
12826 {
12827 struct block *b = BLOCKVECTOR_BLOCK (bv, i);
12828 struct block_iterator iter;
12829 struct symbol *sym;
12830
12831 ALL_BLOCK_SYMBOLS (b, iter, sym)
12832 if (ada_is_non_standard_exception_sym (sym)
12833 && (preg == NULL
12834 || regexec (preg, SYMBOL_NATURAL_NAME (sym),
12835 0, NULL, 0) == 0))
12836 {
12837 struct ada_exc_info info
12838 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
12839
12840 VEC_safe_push (ada_exc_info, *exceptions, &info);
12841 }
12842 }
12843 }
12844}
12845
12846/* Implements ada_exceptions_list with the regular expression passed
12847 as a regex_t, rather than a string.
12848
12849 If not NULL, PREG is used to filter out exceptions whose names
12850 do not match. Otherwise, all exceptions are listed. */
12851
12852static VEC(ada_exc_info) *
12853ada_exceptions_list_1 (regex_t *preg)
12854{
12855 VEC(ada_exc_info) *result = NULL;
12856 struct cleanup *old_chain
12857 = make_cleanup (VEC_cleanup (ada_exc_info), &result);
12858 int prev_len;
12859
12860 /* First, list the known standard exceptions. These exceptions
12861 need to be handled separately, as they are usually defined in
12862 runtime units that have been compiled without debugging info. */
12863
12864 ada_add_standard_exceptions (preg, &result);
12865
12866 /* Next, find all exceptions whose scope is local and accessible
12867 from the currently selected frame. */
12868
12869 if (has_stack_frames ())
12870 {
12871 prev_len = VEC_length (ada_exc_info, result);
12872 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
12873 &result);
12874 if (VEC_length (ada_exc_info, result) > prev_len)
12875 sort_remove_dups_ada_exceptions_list (&result, prev_len);
12876 }
12877
12878 /* Add all exceptions whose scope is global. */
12879
12880 prev_len = VEC_length (ada_exc_info, result);
12881 ada_add_global_exceptions (preg, &result);
12882 if (VEC_length (ada_exc_info, result) > prev_len)
12883 sort_remove_dups_ada_exceptions_list (&result, prev_len);
12884
12885 discard_cleanups (old_chain);
12886 return result;
12887}
12888
12889/* Return a vector of ada_exc_info.
12890
12891 If REGEXP is NULL, all exceptions are included in the result.
12892 Otherwise, it should contain a valid regular expression,
12893 and only the exceptions whose names match that regular expression
12894 are included in the result.
12895
12896 The exceptions are sorted in the following order:
12897 - Standard exceptions (defined by the Ada language), in
12898 alphabetical order;
12899 - Exceptions only visible from the current frame, in
12900 alphabetical order;
12901 - Exceptions whose scope is global, in alphabetical order. */
12902
12903VEC(ada_exc_info) *
12904ada_exceptions_list (const char *regexp)
12905{
12906 VEC(ada_exc_info) *result = NULL;
12907 struct cleanup *old_chain = NULL;
12908 regex_t reg;
12909
12910 if (regexp != NULL)
12911 old_chain = compile_rx_or_error (&reg, regexp,
12912 _("invalid regular expression"));
12913
12914 result = ada_exceptions_list_1 (regexp != NULL ? &reg : NULL);
12915
12916 if (old_chain != NULL)
12917 do_cleanups (old_chain);
12918 return result;
12919}
12920
12921/* Implement the "info exceptions" command. */
12922
12923static void
12924info_exceptions_command (char *regexp, int from_tty)
12925{
12926 VEC(ada_exc_info) *exceptions;
12927 struct cleanup *cleanup;
12928 struct gdbarch *gdbarch = get_current_arch ();
12929 int ix;
12930 struct ada_exc_info *info;
12931
12932 exceptions = ada_exceptions_list (regexp);
12933 cleanup = make_cleanup (VEC_cleanup (ada_exc_info), &exceptions);
12934
12935 if (regexp != NULL)
12936 printf_filtered
12937 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
12938 else
12939 printf_filtered (_("All defined Ada exceptions:\n"));
12940
12941 for (ix = 0; VEC_iterate(ada_exc_info, exceptions, ix, info); ix++)
12942 printf_filtered ("%s: %s\n", info->name, paddress (gdbarch, info->addr));
12943
12944 do_cleanups (cleanup);
12945}
12946
4c4b4cd2
PH
12947 /* Operators */
12948/* Information about operators given special treatment in functions
12949 below. */
12950/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
12951
12952#define ADA_OPERATORS \
12953 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
12954 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
12955 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
12956 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
12957 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
12958 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
12959 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
12960 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
12961 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
12962 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
12963 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
12964 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
12965 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
12966 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
12967 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
12968 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
12969 OP_DEFN (OP_OTHERS, 1, 1, 0) \
12970 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
12971 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
12972
12973static void
554794dc
SDJ
12974ada_operator_length (const struct expression *exp, int pc, int *oplenp,
12975 int *argsp)
4c4b4cd2
PH
12976{
12977 switch (exp->elts[pc - 1].opcode)
12978 {
76a01679 12979 default:
4c4b4cd2
PH
12980 operator_length_standard (exp, pc, oplenp, argsp);
12981 break;
12982
12983#define OP_DEFN(op, len, args, binop) \
12984 case op: *oplenp = len; *argsp = args; break;
12985 ADA_OPERATORS;
12986#undef OP_DEFN
52ce6436
PH
12987
12988 case OP_AGGREGATE:
12989 *oplenp = 3;
12990 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
12991 break;
12992
12993 case OP_CHOICES:
12994 *oplenp = 3;
12995 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
12996 break;
4c4b4cd2
PH
12997 }
12998}
12999
c0201579
JK
13000/* Implementation of the exp_descriptor method operator_check. */
13001
13002static int
13003ada_operator_check (struct expression *exp, int pos,
13004 int (*objfile_func) (struct objfile *objfile, void *data),
13005 void *data)
13006{
13007 const union exp_element *const elts = exp->elts;
13008 struct type *type = NULL;
13009
13010 switch (elts[pos].opcode)
13011 {
13012 case UNOP_IN_RANGE:
13013 case UNOP_QUAL:
13014 type = elts[pos + 1].type;
13015 break;
13016
13017 default:
13018 return operator_check_standard (exp, pos, objfile_func, data);
13019 }
13020
13021 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13022
13023 if (type && TYPE_OBJFILE (type)
13024 && (*objfile_func) (TYPE_OBJFILE (type), data))
13025 return 1;
13026
13027 return 0;
13028}
13029
4c4b4cd2
PH
13030static char *
13031ada_op_name (enum exp_opcode opcode)
13032{
13033 switch (opcode)
13034 {
76a01679 13035 default:
4c4b4cd2 13036 return op_name_standard (opcode);
52ce6436 13037
4c4b4cd2
PH
13038#define OP_DEFN(op, len, args, binop) case op: return #op;
13039 ADA_OPERATORS;
13040#undef OP_DEFN
52ce6436
PH
13041
13042 case OP_AGGREGATE:
13043 return "OP_AGGREGATE";
13044 case OP_CHOICES:
13045 return "OP_CHOICES";
13046 case OP_NAME:
13047 return "OP_NAME";
4c4b4cd2
PH
13048 }
13049}
13050
13051/* As for operator_length, but assumes PC is pointing at the first
13052 element of the operator, and gives meaningful results only for the
52ce6436 13053 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13054
13055static void
76a01679
JB
13056ada_forward_operator_length (struct expression *exp, int pc,
13057 int *oplenp, int *argsp)
4c4b4cd2 13058{
76a01679 13059 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13060 {
13061 default:
13062 *oplenp = *argsp = 0;
13063 break;
52ce6436 13064
4c4b4cd2
PH
13065#define OP_DEFN(op, len, args, binop) \
13066 case op: *oplenp = len; *argsp = args; break;
13067 ADA_OPERATORS;
13068#undef OP_DEFN
52ce6436
PH
13069
13070 case OP_AGGREGATE:
13071 *oplenp = 3;
13072 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13073 break;
13074
13075 case OP_CHOICES:
13076 *oplenp = 3;
13077 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13078 break;
13079
13080 case OP_STRING:
13081 case OP_NAME:
13082 {
13083 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13084
52ce6436
PH
13085 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13086 *argsp = 0;
13087 break;
13088 }
4c4b4cd2
PH
13089 }
13090}
13091
13092static int
13093ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13094{
13095 enum exp_opcode op = exp->elts[elt].opcode;
13096 int oplen, nargs;
13097 int pc = elt;
13098 int i;
76a01679 13099
4c4b4cd2
PH
13100 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13101
76a01679 13102 switch (op)
4c4b4cd2 13103 {
76a01679 13104 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13105 case OP_ATR_FIRST:
13106 case OP_ATR_LAST:
13107 case OP_ATR_LENGTH:
13108 case OP_ATR_IMAGE:
13109 case OP_ATR_MAX:
13110 case OP_ATR_MIN:
13111 case OP_ATR_MODULUS:
13112 case OP_ATR_POS:
13113 case OP_ATR_SIZE:
13114 case OP_ATR_TAG:
13115 case OP_ATR_VAL:
13116 break;
13117
13118 case UNOP_IN_RANGE:
13119 case UNOP_QUAL:
323e0a4a
AC
13120 /* XXX: gdb_sprint_host_address, type_sprint */
13121 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13122 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13123 fprintf_filtered (stream, " (");
13124 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13125 fprintf_filtered (stream, ")");
13126 break;
13127 case BINOP_IN_BOUNDS:
52ce6436
PH
13128 fprintf_filtered (stream, " (%d)",
13129 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13130 break;
13131 case TERNOP_IN_RANGE:
13132 break;
13133
52ce6436
PH
13134 case OP_AGGREGATE:
13135 case OP_OTHERS:
13136 case OP_DISCRETE_RANGE:
13137 case OP_POSITIONAL:
13138 case OP_CHOICES:
13139 break;
13140
13141 case OP_NAME:
13142 case OP_STRING:
13143 {
13144 char *name = &exp->elts[elt + 2].string;
13145 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13146
52ce6436
PH
13147 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13148 break;
13149 }
13150
4c4b4cd2
PH
13151 default:
13152 return dump_subexp_body_standard (exp, stream, elt);
13153 }
13154
13155 elt += oplen;
13156 for (i = 0; i < nargs; i += 1)
13157 elt = dump_subexp (exp, stream, elt);
13158
13159 return elt;
13160}
13161
13162/* The Ada extension of print_subexp (q.v.). */
13163
76a01679
JB
13164static void
13165ada_print_subexp (struct expression *exp, int *pos,
13166 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13167{
52ce6436 13168 int oplen, nargs, i;
4c4b4cd2
PH
13169 int pc = *pos;
13170 enum exp_opcode op = exp->elts[pc].opcode;
13171
13172 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13173
52ce6436 13174 *pos += oplen;
4c4b4cd2
PH
13175 switch (op)
13176 {
13177 default:
52ce6436 13178 *pos -= oplen;
4c4b4cd2
PH
13179 print_subexp_standard (exp, pos, stream, prec);
13180 return;
13181
13182 case OP_VAR_VALUE:
4c4b4cd2
PH
13183 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13184 return;
13185
13186 case BINOP_IN_BOUNDS:
323e0a4a 13187 /* XXX: sprint_subexp */
4c4b4cd2 13188 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13189 fputs_filtered (" in ", stream);
4c4b4cd2 13190 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13191 fputs_filtered ("'range", stream);
4c4b4cd2 13192 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13193 fprintf_filtered (stream, "(%ld)",
13194 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13195 return;
13196
13197 case TERNOP_IN_RANGE:
4c4b4cd2 13198 if (prec >= PREC_EQUAL)
76a01679 13199 fputs_filtered ("(", stream);
323e0a4a 13200 /* XXX: sprint_subexp */
4c4b4cd2 13201 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13202 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13203 print_subexp (exp, pos, stream, PREC_EQUAL);
13204 fputs_filtered (" .. ", stream);
13205 print_subexp (exp, pos, stream, PREC_EQUAL);
13206 if (prec >= PREC_EQUAL)
76a01679
JB
13207 fputs_filtered (")", stream);
13208 return;
4c4b4cd2
PH
13209
13210 case OP_ATR_FIRST:
13211 case OP_ATR_LAST:
13212 case OP_ATR_LENGTH:
13213 case OP_ATR_IMAGE:
13214 case OP_ATR_MAX:
13215 case OP_ATR_MIN:
13216 case OP_ATR_MODULUS:
13217 case OP_ATR_POS:
13218 case OP_ATR_SIZE:
13219 case OP_ATR_TAG:
13220 case OP_ATR_VAL:
4c4b4cd2 13221 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13222 {
13223 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13224 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13225 &type_print_raw_options);
76a01679
JB
13226 *pos += 3;
13227 }
4c4b4cd2 13228 else
76a01679 13229 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13230 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13231 if (nargs > 1)
76a01679
JB
13232 {
13233 int tem;
5b4ee69b 13234
76a01679
JB
13235 for (tem = 1; tem < nargs; tem += 1)
13236 {
13237 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13238 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13239 }
13240 fputs_filtered (")", stream);
13241 }
4c4b4cd2 13242 return;
14f9c5c9 13243
4c4b4cd2 13244 case UNOP_QUAL:
4c4b4cd2
PH
13245 type_print (exp->elts[pc + 1].type, "", stream, 0);
13246 fputs_filtered ("'(", stream);
13247 print_subexp (exp, pos, stream, PREC_PREFIX);
13248 fputs_filtered (")", stream);
13249 return;
14f9c5c9 13250
4c4b4cd2 13251 case UNOP_IN_RANGE:
323e0a4a 13252 /* XXX: sprint_subexp */
4c4b4cd2 13253 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13254 fputs_filtered (" in ", stream);
79d43c61
TT
13255 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13256 &type_print_raw_options);
4c4b4cd2 13257 return;
52ce6436
PH
13258
13259 case OP_DISCRETE_RANGE:
13260 print_subexp (exp, pos, stream, PREC_SUFFIX);
13261 fputs_filtered ("..", stream);
13262 print_subexp (exp, pos, stream, PREC_SUFFIX);
13263 return;
13264
13265 case OP_OTHERS:
13266 fputs_filtered ("others => ", stream);
13267 print_subexp (exp, pos, stream, PREC_SUFFIX);
13268 return;
13269
13270 case OP_CHOICES:
13271 for (i = 0; i < nargs-1; i += 1)
13272 {
13273 if (i > 0)
13274 fputs_filtered ("|", stream);
13275 print_subexp (exp, pos, stream, PREC_SUFFIX);
13276 }
13277 fputs_filtered (" => ", stream);
13278 print_subexp (exp, pos, stream, PREC_SUFFIX);
13279 return;
13280
13281 case OP_POSITIONAL:
13282 print_subexp (exp, pos, stream, PREC_SUFFIX);
13283 return;
13284
13285 case OP_AGGREGATE:
13286 fputs_filtered ("(", stream);
13287 for (i = 0; i < nargs; i += 1)
13288 {
13289 if (i > 0)
13290 fputs_filtered (", ", stream);
13291 print_subexp (exp, pos, stream, PREC_SUFFIX);
13292 }
13293 fputs_filtered (")", stream);
13294 return;
4c4b4cd2
PH
13295 }
13296}
14f9c5c9
AS
13297
13298/* Table mapping opcodes into strings for printing operators
13299 and precedences of the operators. */
13300
d2e4a39e
AS
13301static const struct op_print ada_op_print_tab[] = {
13302 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13303 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13304 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13305 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13306 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13307 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13308 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13309 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13310 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13311 {">=", BINOP_GEQ, PREC_ORDER, 0},
13312 {">", BINOP_GTR, PREC_ORDER, 0},
13313 {"<", BINOP_LESS, PREC_ORDER, 0},
13314 {">>", BINOP_RSH, PREC_SHIFT, 0},
13315 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13316 {"+", BINOP_ADD, PREC_ADD, 0},
13317 {"-", BINOP_SUB, PREC_ADD, 0},
13318 {"&", BINOP_CONCAT, PREC_ADD, 0},
13319 {"*", BINOP_MUL, PREC_MUL, 0},
13320 {"/", BINOP_DIV, PREC_MUL, 0},
13321 {"rem", BINOP_REM, PREC_MUL, 0},
13322 {"mod", BINOP_MOD, PREC_MUL, 0},
13323 {"**", BINOP_EXP, PREC_REPEAT, 0},
13324 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13325 {"-", UNOP_NEG, PREC_PREFIX, 0},
13326 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13327 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13328 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13329 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13330 {".all", UNOP_IND, PREC_SUFFIX, 1},
13331 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13332 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
d2e4a39e 13333 {NULL, 0, 0, 0}
14f9c5c9
AS
13334};
13335\f
72d5681a
PH
13336enum ada_primitive_types {
13337 ada_primitive_type_int,
13338 ada_primitive_type_long,
13339 ada_primitive_type_short,
13340 ada_primitive_type_char,
13341 ada_primitive_type_float,
13342 ada_primitive_type_double,
13343 ada_primitive_type_void,
13344 ada_primitive_type_long_long,
13345 ada_primitive_type_long_double,
13346 ada_primitive_type_natural,
13347 ada_primitive_type_positive,
13348 ada_primitive_type_system_address,
13349 nr_ada_primitive_types
13350};
6c038f32
PH
13351
13352static void
d4a9a881 13353ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13354 struct language_arch_info *lai)
13355{
d4a9a881 13356 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13357
72d5681a 13358 lai->primitive_type_vector
d4a9a881 13359 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13360 struct type *);
e9bb382b
UW
13361
13362 lai->primitive_type_vector [ada_primitive_type_int]
13363 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13364 0, "integer");
13365 lai->primitive_type_vector [ada_primitive_type_long]
13366 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13367 0, "long_integer");
13368 lai->primitive_type_vector [ada_primitive_type_short]
13369 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13370 0, "short_integer");
13371 lai->string_char_type
13372 = lai->primitive_type_vector [ada_primitive_type_char]
13373 = arch_integer_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
13374 lai->primitive_type_vector [ada_primitive_type_float]
13375 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13376 "float", NULL);
13377 lai->primitive_type_vector [ada_primitive_type_double]
13378 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13379 "long_float", NULL);
13380 lai->primitive_type_vector [ada_primitive_type_long_long]
13381 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13382 0, "long_long_integer");
13383 lai->primitive_type_vector [ada_primitive_type_long_double]
13384 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13385 "long_long_float", NULL);
13386 lai->primitive_type_vector [ada_primitive_type_natural]
13387 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13388 0, "natural");
13389 lai->primitive_type_vector [ada_primitive_type_positive]
13390 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13391 0, "positive");
13392 lai->primitive_type_vector [ada_primitive_type_void]
13393 = builtin->builtin_void;
13394
13395 lai->primitive_type_vector [ada_primitive_type_system_address]
13396 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, 1, "void"));
72d5681a
PH
13397 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13398 = "system__address";
fbb06eb1 13399
47e729a8 13400 lai->bool_type_symbol = NULL;
fbb06eb1 13401 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13402}
6c038f32
PH
13403\f
13404 /* Language vector */
13405
13406/* Not really used, but needed in the ada_language_defn. */
13407
13408static void
6c7a06a3 13409emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13410{
6c7a06a3 13411 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13412}
13413
13414static int
410a0ff2 13415parse (struct parser_state *ps)
6c038f32
PH
13416{
13417 warnings_issued = 0;
410a0ff2 13418 return ada_parse (ps);
6c038f32
PH
13419}
13420
13421static const struct exp_descriptor ada_exp_descriptor = {
13422 ada_print_subexp,
13423 ada_operator_length,
c0201579 13424 ada_operator_check,
6c038f32
PH
13425 ada_op_name,
13426 ada_dump_subexp_body,
13427 ada_evaluate_subexp
13428};
13429
1a119f36 13430/* Implement the "la_get_symbol_name_cmp" language_defn method
74ccd7f5
JB
13431 for Ada. */
13432
1a119f36
JB
13433static symbol_name_cmp_ftype
13434ada_get_symbol_name_cmp (const char *lookup_name)
74ccd7f5
JB
13435{
13436 if (should_use_wild_match (lookup_name))
13437 return wild_match;
13438 else
13439 return compare_names;
13440}
13441
a5ee536b
JB
13442/* Implement the "la_read_var_value" language_defn method for Ada. */
13443
13444static struct value *
13445ada_read_var_value (struct symbol *var, struct frame_info *frame)
13446{
13447 struct block *frame_block = NULL;
13448 struct symbol *renaming_sym = NULL;
13449
13450 /* The only case where default_read_var_value is not sufficient
13451 is when VAR is a renaming... */
13452 if (frame)
13453 frame_block = get_frame_block (frame, NULL);
13454 if (frame_block)
13455 renaming_sym = ada_find_renaming_symbol (var, frame_block);
13456 if (renaming_sym != NULL)
13457 return ada_read_renaming_var_value (renaming_sym, frame_block);
13458
13459 /* This is a typical case where we expect the default_read_var_value
13460 function to work. */
13461 return default_read_var_value (var, frame);
13462}
13463
6c038f32
PH
13464const struct language_defn ada_language_defn = {
13465 "ada", /* Language name */
6abde28f 13466 "Ada",
6c038f32 13467 language_ada,
6c038f32 13468 range_check_off,
6c038f32
PH
13469 case_sensitive_on, /* Yes, Ada is case-insensitive, but
13470 that's not quite what this means. */
6c038f32 13471 array_row_major,
9a044a89 13472 macro_expansion_no,
6c038f32
PH
13473 &ada_exp_descriptor,
13474 parse,
13475 ada_error,
13476 resolve,
13477 ada_printchar, /* Print a character constant */
13478 ada_printstr, /* Function to print string constant */
13479 emit_char, /* Function to print single char (not used) */
6c038f32 13480 ada_print_type, /* Print a type using appropriate syntax */
be942545 13481 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
13482 ada_val_print, /* Print a value using appropriate syntax */
13483 ada_value_print, /* Print a top-level value */
a5ee536b 13484 ada_read_var_value, /* la_read_var_value */
6c038f32 13485 NULL, /* Language specific skip_trampoline */
2b2d9e11 13486 NULL, /* name_of_this */
6c038f32
PH
13487 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
13488 basic_lookup_transparent_type, /* lookup_transparent_type */
13489 ada_la_decode, /* Language specific symbol demangler */
0963b4bd
MS
13490 NULL, /* Language specific
13491 class_name_from_physname */
6c038f32
PH
13492 ada_op_print_tab, /* expression operators for printing */
13493 0, /* c-style arrays */
13494 1, /* String lower bound */
6c038f32 13495 ada_get_gdb_completer_word_break_characters,
41d27058 13496 ada_make_symbol_completion_list,
72d5681a 13497 ada_language_arch_info,
e79af960 13498 ada_print_array_index,
41f1b697 13499 default_pass_by_reference,
ae6a3a4c 13500 c_get_string,
1a119f36 13501 ada_get_symbol_name_cmp, /* la_get_symbol_name_cmp */
f8eba3c6 13502 ada_iterate_over_symbols,
a53b64ea 13503 &ada_varobj_ops,
6c038f32
PH
13504 LANG_MAGIC
13505};
13506
2c0b251b
PA
13507/* Provide a prototype to silence -Wmissing-prototypes. */
13508extern initialize_file_ftype _initialize_ada_language;
13509
5bf03f13
JB
13510/* Command-list for the "set/show ada" prefix command. */
13511static struct cmd_list_element *set_ada_list;
13512static struct cmd_list_element *show_ada_list;
13513
13514/* Implement the "set ada" prefix command. */
13515
13516static void
13517set_ada_command (char *arg, int from_tty)
13518{
13519 printf_unfiltered (_(\
13520"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 13521 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
13522}
13523
13524/* Implement the "show ada" prefix command. */
13525
13526static void
13527show_ada_command (char *args, int from_tty)
13528{
13529 cmd_show_list (show_ada_list, from_tty, "");
13530}
13531
2060206e
PA
13532static void
13533initialize_ada_catchpoint_ops (void)
13534{
13535 struct breakpoint_ops *ops;
13536
13537 initialize_breakpoint_ops ();
13538
13539 ops = &catch_exception_breakpoint_ops;
13540 *ops = bkpt_breakpoint_ops;
13541 ops->dtor = dtor_catch_exception;
13542 ops->allocate_location = allocate_location_catch_exception;
13543 ops->re_set = re_set_catch_exception;
13544 ops->check_status = check_status_catch_exception;
13545 ops->print_it = print_it_catch_exception;
13546 ops->print_one = print_one_catch_exception;
13547 ops->print_mention = print_mention_catch_exception;
13548 ops->print_recreate = print_recreate_catch_exception;
13549
13550 ops = &catch_exception_unhandled_breakpoint_ops;
13551 *ops = bkpt_breakpoint_ops;
13552 ops->dtor = dtor_catch_exception_unhandled;
13553 ops->allocate_location = allocate_location_catch_exception_unhandled;
13554 ops->re_set = re_set_catch_exception_unhandled;
13555 ops->check_status = check_status_catch_exception_unhandled;
13556 ops->print_it = print_it_catch_exception_unhandled;
13557 ops->print_one = print_one_catch_exception_unhandled;
13558 ops->print_mention = print_mention_catch_exception_unhandled;
13559 ops->print_recreate = print_recreate_catch_exception_unhandled;
13560
13561 ops = &catch_assert_breakpoint_ops;
13562 *ops = bkpt_breakpoint_ops;
13563 ops->dtor = dtor_catch_assert;
13564 ops->allocate_location = allocate_location_catch_assert;
13565 ops->re_set = re_set_catch_assert;
13566 ops->check_status = check_status_catch_assert;
13567 ops->print_it = print_it_catch_assert;
13568 ops->print_one = print_one_catch_assert;
13569 ops->print_mention = print_mention_catch_assert;
13570 ops->print_recreate = print_recreate_catch_assert;
13571}
13572
3d9434b5
JB
13573/* This module's 'new_objfile' observer. */
13574
13575static void
13576ada_new_objfile_observer (struct objfile *objfile)
13577{
13578 ada_clear_symbol_cache ();
13579}
13580
13581/* This module's 'free_objfile' observer. */
13582
13583static void
13584ada_free_objfile_observer (struct objfile *objfile)
13585{
13586 ada_clear_symbol_cache ();
13587}
13588
d2e4a39e 13589void
6c038f32 13590_initialize_ada_language (void)
14f9c5c9 13591{
6c038f32
PH
13592 add_language (&ada_language_defn);
13593
2060206e
PA
13594 initialize_ada_catchpoint_ops ();
13595
5bf03f13
JB
13596 add_prefix_cmd ("ada", no_class, set_ada_command,
13597 _("Prefix command for changing Ada-specfic settings"),
13598 &set_ada_list, "set ada ", 0, &setlist);
13599
13600 add_prefix_cmd ("ada", no_class, show_ada_command,
13601 _("Generic command for showing Ada-specific settings."),
13602 &show_ada_list, "show ada ", 0, &showlist);
13603
13604 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
13605 &trust_pad_over_xvs, _("\
13606Enable or disable an optimization trusting PAD types over XVS types"), _("\
13607Show whether an optimization trusting PAD types over XVS types is activated"),
13608 _("\
13609This is related to the encoding used by the GNAT compiler. The debugger\n\
13610should normally trust the contents of PAD types, but certain older versions\n\
13611of GNAT have a bug that sometimes causes the information in the PAD type\n\
13612to be incorrect. Turning this setting \"off\" allows the debugger to\n\
13613work around this bug. It is always safe to turn this option \"off\", but\n\
13614this incurs a slight performance penalty, so it is recommended to NOT change\n\
13615this option to \"off\" unless necessary."),
13616 NULL, NULL, &set_ada_list, &show_ada_list);
13617
9ac4176b
PA
13618 add_catch_command ("exception", _("\
13619Catch Ada exceptions, when raised.\n\
13620With an argument, catch only exceptions with the given name."),
13621 catch_ada_exception_command,
13622 NULL,
13623 CATCH_PERMANENT,
13624 CATCH_TEMPORARY);
13625 add_catch_command ("assert", _("\
13626Catch failed Ada assertions, when raised.\n\
13627With an argument, catch only exceptions with the given name."),
13628 catch_assert_command,
13629 NULL,
13630 CATCH_PERMANENT,
13631 CATCH_TEMPORARY);
13632
6c038f32 13633 varsize_limit = 65536;
6c038f32 13634
778865d3
JB
13635 add_info ("exceptions", info_exceptions_command,
13636 _("\
13637List all Ada exception names.\n\
13638If a regular expression is passed as an argument, only those matching\n\
13639the regular expression are listed."));
13640
c6044dd1
JB
13641 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
13642 _("Set Ada maintenance-related variables."),
13643 &maint_set_ada_cmdlist, "maintenance set ada ",
13644 0/*allow-unknown*/, &maintenance_set_cmdlist);
13645
13646 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
13647 _("Show Ada maintenance-related variables"),
13648 &maint_show_ada_cmdlist, "maintenance show ada ",
13649 0/*allow-unknown*/, &maintenance_show_cmdlist);
13650
13651 add_setshow_boolean_cmd
13652 ("ignore-descriptive-types", class_maintenance,
13653 &ada_ignore_descriptive_types_p,
13654 _("Set whether descriptive types generated by GNAT should be ignored."),
13655 _("Show whether descriptive types generated by GNAT should be ignored."),
13656 _("\
13657When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
13658DWARF attribute."),
13659 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
13660
6c038f32
PH
13661 obstack_init (&symbol_list_obstack);
13662
13663 decoded_names_store = htab_create_alloc
13664 (256, htab_hash_string, (int (*)(const void *, const void *)) streq,
13665 NULL, xcalloc, xfree);
6b69afc4 13666
3d9434b5
JB
13667 /* The ada-lang observers. */
13668 observer_attach_new_objfile (ada_new_objfile_observer);
13669 observer_attach_free_objfile (ada_free_objfile_observer);
e802dbe0 13670 observer_attach_inferior_exit (ada_inferior_exit);
ee01b665
JB
13671
13672 /* Setup various context-specific data. */
e802dbe0 13673 ada_inferior_data
8e260fc0 13674 = register_inferior_data_with_cleanup (NULL, ada_inferior_data_cleanup);
ee01b665
JB
13675 ada_pspace_data_handle
13676 = register_program_space_data_with_cleanup (NULL, ada_pspace_data_cleanup);
14f9c5c9 13677}
This page took 1.836985 seconds and 4 git commands to generate.