add gnu_triplet_regexp gdbarch method
[deliverable/binutils-gdb.git] / gdb / infcall.c
CommitLineData
04714b91
AC
1/* Perform an inferior function call, for GDB, the GNU debugger.
2
ecd75fc8 3 Copyright (C) 1986-2014 Free Software Foundation, Inc.
04714b91
AC
4
5 This file is part of GDB.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
04714b91
AC
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
04714b91
AC
19
20#include "defs.h"
21#include "breakpoint.h"
573cda03 22#include "tracepoint.h"
04714b91
AC
23#include "target.h"
24#include "regcache.h"
25#include "inferior.h"
45741a9c 26#include "infrun.h"
04714b91
AC
27#include "block.h"
28#include "gdbcore.h"
29#include "language.h"
9ab9195f 30#include "objfiles.h"
04714b91
AC
31#include "gdbcmd.h"
32#include "command.h"
b9362cc7 33#include "infcall.h"
96860204 34#include "dummy-frame.h"
a93c0eb6 35#include "ada-lang.h"
347bddb7 36#include "gdbthread.h"
beb460e8 37#include "event-top.h"
162078c8 38#include "observer.h"
b89667eb
DE
39
40/* If we can't find a function's name from its address,
41 we print this instead. */
42#define RAW_FUNCTION_ADDRESS_FORMAT "at 0x%s"
43#define RAW_FUNCTION_ADDRESS_SIZE (sizeof (RAW_FUNCTION_ADDRESS_FORMAT) \
44 + 2 * sizeof (CORE_ADDR))
04714b91
AC
45
46/* NOTE: cagney/2003-04-16: What's the future of this code?
47
48 GDB needs an asynchronous expression evaluator, that means an
49 asynchronous inferior function call implementation, and that in
50 turn means restructuring the code so that it is event driven. */
51
52/* How you should pass arguments to a function depends on whether it
53 was defined in K&R style or prototype style. If you define a
54 function using the K&R syntax that takes a `float' argument, then
55 callers must pass that argument as a `double'. If you define the
56 function using the prototype syntax, then you must pass the
57 argument as a `float', with no promotion.
58
59 Unfortunately, on certain older platforms, the debug info doesn't
60 indicate reliably how each function was defined. A function type's
61 TYPE_FLAG_PROTOTYPED flag may be clear, even if the function was
62 defined in prototype style. When calling a function whose
63 TYPE_FLAG_PROTOTYPED flag is clear, GDB consults this flag to
64 decide what to do.
65
66 For modern targets, it is proper to assume that, if the prototype
67 flag is clear, that can be trusted: `float' arguments should be
68 promoted to `double'. For some older targets, if the prototype
69 flag is clear, that doesn't tell us anything. The default is to
70 trust the debug information; the user can override this behavior
71 with "set coerce-float-to-double 0". */
72
73static int coerce_float_to_double_p = 1;
920d2a44
AC
74static void
75show_coerce_float_to_double_p (struct ui_file *file, int from_tty,
76 struct cmd_list_element *c, const char *value)
77{
3e43a32a
MS
78 fprintf_filtered (file,
79 _("Coercion of floats to doubles "
80 "when calling functions is %s.\n"),
920d2a44
AC
81 value);
82}
04714b91
AC
83
84/* This boolean tells what gdb should do if a signal is received while
85 in a function called from gdb (call dummy). If set, gdb unwinds
86 the stack and restore the context to what as it was before the
87 call.
88
1777feb0 89 The default is to stop in the frame where the signal was received. */
04714b91 90
ef61f180 91static int unwind_on_signal_p = 0;
920d2a44
AC
92static void
93show_unwind_on_signal_p (struct ui_file *file, int from_tty,
94 struct cmd_list_element *c, const char *value)
95{
3e43a32a
MS
96 fprintf_filtered (file,
97 _("Unwinding of stack if a signal is "
98 "received while in a call dummy is %s.\n"),
920d2a44
AC
99 value);
100}
101
7cd1089b
PM
102/* This boolean tells what gdb should do if a std::terminate call is
103 made while in a function called from gdb (call dummy).
104 As the confines of a single dummy stack prohibit out-of-frame
105 handlers from handling a raised exception, and as out-of-frame
106 handlers are common in C++, this can lead to no handler being found
107 by the unwinder, and a std::terminate call. This is a false positive.
108 If set, gdb unwinds the stack and restores the context to what it
109 was before the call.
110
111 The default is to unwind the frame if a std::terminate call is
112 made. */
113
114static int unwind_on_terminating_exception_p = 1;
115
116static void
117show_unwind_on_terminating_exception_p (struct ui_file *file, int from_tty,
118 struct cmd_list_element *c,
119 const char *value)
120
121{
3e43a32a
MS
122 fprintf_filtered (file,
123 _("Unwind stack if a C++ exception is "
124 "unhandled while in a call dummy is %s.\n"),
7cd1089b
PM
125 value);
126}
04714b91
AC
127
128/* Perform the standard coercions that are specified
a93c0eb6 129 for arguments to be passed to C or Ada functions.
04714b91
AC
130
131 If PARAM_TYPE is non-NULL, it is the expected parameter type.
a93c0eb6
JB
132 IS_PROTOTYPED is non-zero if the function declaration is prototyped.
133 SP is the stack pointer were additional data can be pushed (updating
134 its value as needed). */
04714b91
AC
135
136static struct value *
7788af6d
UW
137value_arg_coerce (struct gdbarch *gdbarch, struct value *arg,
138 struct type *param_type, int is_prototyped, CORE_ADDR *sp)
04714b91 139{
7788af6d 140 const struct builtin_type *builtin = builtin_type (gdbarch);
df407dfe 141 struct type *arg_type = check_typedef (value_type (arg));
52f0bd74 142 struct type *type
04714b91
AC
143 = param_type ? check_typedef (param_type) : arg_type;
144
a93c0eb6
JB
145 /* Perform any Ada-specific coercion first. */
146 if (current_language->la_language == language_ada)
40bc484c 147 arg = ada_convert_actual (arg, type);
a93c0eb6 148
63092375
DJ
149 /* Force the value to the target if we will need its address. At
150 this point, we could allocate arguments on the stack instead of
151 calling malloc if we knew that their addresses would not be
152 saved by the called function. */
153 arg = value_coerce_to_target (arg);
154
04714b91
AC
155 switch (TYPE_CODE (type))
156 {
157 case TYPE_CODE_REF:
fb933624
DJ
158 {
159 struct value *new_value;
160
161 if (TYPE_CODE (arg_type) == TYPE_CODE_REF)
b1af9e97 162 return value_cast_pointers (type, arg, 0);
fb933624
DJ
163
164 /* Cast the value to the reference's target type, and then
165 convert it back to a reference. This will issue an error
166 if the value was not previously in memory - in some cases
167 we should clearly be allowing this, but how? */
168 new_value = value_cast (TYPE_TARGET_TYPE (type), arg);
169 new_value = value_ref (new_value);
170 return new_value;
171 }
04714b91
AC
172 case TYPE_CODE_INT:
173 case TYPE_CODE_CHAR:
174 case TYPE_CODE_BOOL:
175 case TYPE_CODE_ENUM:
176 /* If we don't have a prototype, coerce to integer type if necessary. */
177 if (!is_prototyped)
178 {
7788af6d
UW
179 if (TYPE_LENGTH (type) < TYPE_LENGTH (builtin->builtin_int))
180 type = builtin->builtin_int;
04714b91
AC
181 }
182 /* Currently all target ABIs require at least the width of an integer
183 type for an argument. We may have to conditionalize the following
184 type coercion for future targets. */
7788af6d
UW
185 if (TYPE_LENGTH (type) < TYPE_LENGTH (builtin->builtin_int))
186 type = builtin->builtin_int;
04714b91
AC
187 break;
188 case TYPE_CODE_FLT:
189 if (!is_prototyped && coerce_float_to_double_p)
190 {
7788af6d
UW
191 if (TYPE_LENGTH (type) < TYPE_LENGTH (builtin->builtin_double))
192 type = builtin->builtin_double;
193 else if (TYPE_LENGTH (type) > TYPE_LENGTH (builtin->builtin_double))
194 type = builtin->builtin_long_double;
04714b91
AC
195 }
196 break;
197 case TYPE_CODE_FUNC:
198 type = lookup_pointer_type (type);
199 break;
200 case TYPE_CODE_ARRAY:
201 /* Arrays are coerced to pointers to their first element, unless
202 they are vectors, in which case we want to leave them alone,
203 because they are passed by value. */
204 if (current_language->c_style_arrays)
205 if (!TYPE_VECTOR (type))
206 type = lookup_pointer_type (TYPE_TARGET_TYPE (type));
207 break;
208 case TYPE_CODE_UNDEF:
209 case TYPE_CODE_PTR:
210 case TYPE_CODE_STRUCT:
211 case TYPE_CODE_UNION:
212 case TYPE_CODE_VOID:
213 case TYPE_CODE_SET:
214 case TYPE_CODE_RANGE:
215 case TYPE_CODE_STRING:
04714b91 216 case TYPE_CODE_ERROR:
0d5de010
DJ
217 case TYPE_CODE_MEMBERPTR:
218 case TYPE_CODE_METHODPTR:
04714b91
AC
219 case TYPE_CODE_METHOD:
220 case TYPE_CODE_COMPLEX:
221 default:
222 break;
223 }
224
225 return value_cast (type, arg);
226}
227
07be84bf
JK
228/* Return the return type of a function with its first instruction exactly at
229 the PC address. Return NULL otherwise. */
230
231static struct type *
232find_function_return_type (CORE_ADDR pc)
233{
234 struct symbol *sym = find_pc_function (pc);
235
236 if (sym != NULL && BLOCK_START (SYMBOL_BLOCK_VALUE (sym)) == pc
237 && SYMBOL_TYPE (sym) != NULL)
238 return TYPE_TARGET_TYPE (SYMBOL_TYPE (sym));
239
240 return NULL;
241}
242
04714b91
AC
243/* Determine a function's address and its return type from its value.
244 Calls error() if the function is not valid for calling. */
245
a9fa03de 246CORE_ADDR
04714b91
AC
247find_function_addr (struct value *function, struct type **retval_type)
248{
df407dfe 249 struct type *ftype = check_typedef (value_type (function));
50810684 250 struct gdbarch *gdbarch = get_type_arch (ftype);
7788af6d 251 struct type *value_type = NULL;
09b58708
JK
252 /* Initialize it just to avoid a GCC false warning. */
253 CORE_ADDR funaddr = 0;
04714b91
AC
254
255 /* If it's a member function, just look at the function
256 part of it. */
257
258 /* Determine address to call. */
300f8e10
JK
259 if (TYPE_CODE (ftype) == TYPE_CODE_FUNC
260 || TYPE_CODE (ftype) == TYPE_CODE_METHOD)
261 funaddr = value_address (function);
262 else if (TYPE_CODE (ftype) == TYPE_CODE_PTR)
04714b91
AC
263 {
264 funaddr = value_as_address (function);
265 ftype = check_typedef (TYPE_TARGET_TYPE (ftype));
266 if (TYPE_CODE (ftype) == TYPE_CODE_FUNC
267 || TYPE_CODE (ftype) == TYPE_CODE_METHOD)
300f8e10
JK
268 funaddr = gdbarch_convert_from_func_ptr_addr (gdbarch, funaddr,
269 &current_target);
04714b91 270 }
300f8e10
JK
271 if (TYPE_CODE (ftype) == TYPE_CODE_FUNC
272 || TYPE_CODE (ftype) == TYPE_CODE_METHOD)
07be84bf
JK
273 {
274 value_type = TYPE_TARGET_TYPE (ftype);
275
276 if (TYPE_GNU_IFUNC (ftype))
277 {
278 funaddr = gnu_ifunc_resolve_addr (gdbarch, funaddr);
279
280 /* Skip querying the function symbol if no RETVAL_TYPE has been
281 asked for. */
282 if (retval_type)
283 value_type = find_function_return_type (funaddr);
284 }
285 }
300f8e10 286 else if (TYPE_CODE (ftype) == TYPE_CODE_INT)
04714b91
AC
287 {
288 /* Handle the case of functions lacking debugging info.
1777feb0 289 Their values are characters since their addresses are char. */
04714b91
AC
290 if (TYPE_LENGTH (ftype) == 1)
291 funaddr = value_as_address (value_addr (function));
292 else
2bbe3cc1
DJ
293 {
294 /* Handle function descriptors lacking debug info. */
295 int found_descriptor = 0;
abbb1732 296
87bc73ea 297 funaddr = 0; /* pacify "gcc -Werror" */
2bbe3cc1
DJ
298 if (VALUE_LVAL (function) == lval_memory)
299 {
300 CORE_ADDR nfunaddr;
abbb1732 301
2bbe3cc1
DJ
302 funaddr = value_as_address (value_addr (function));
303 nfunaddr = funaddr;
50810684 304 funaddr = gdbarch_convert_from_func_ptr_addr (gdbarch, funaddr,
2bbe3cc1
DJ
305 &current_target);
306 if (funaddr != nfunaddr)
307 found_descriptor = 1;
308 }
309 if (!found_descriptor)
310 /* Handle integer used as address of a function. */
311 funaddr = (CORE_ADDR) value_as_long (function);
312 }
04714b91
AC
313 }
314 else
8a3fe4f8 315 error (_("Invalid data type for function to be called."));
04714b91 316
7d9b040b
RC
317 if (retval_type != NULL)
318 *retval_type = value_type;
50810684 319 return funaddr + gdbarch_deprecated_function_start_offset (gdbarch);
04714b91
AC
320}
321
d3712828
AC
322/* For CALL_DUMMY_ON_STACK, push a breakpoint sequence that the called
323 function returns to. */
7043d8dc
AC
324
325static CORE_ADDR
326push_dummy_code (struct gdbarch *gdbarch,
82585c72 327 CORE_ADDR sp, CORE_ADDR funaddr,
7043d8dc
AC
328 struct value **args, int nargs,
329 struct type *value_type,
e4fd649a
UW
330 CORE_ADDR *real_pc, CORE_ADDR *bp_addr,
331 struct regcache *regcache)
7043d8dc 332{
50a834af
MK
333 gdb_assert (gdbarch_push_dummy_code_p (gdbarch));
334
335 return gdbarch_push_dummy_code (gdbarch, sp, funaddr,
336 args, nargs, value_type, real_pc, bp_addr,
337 regcache);
7043d8dc
AC
338}
339
b89667eb
DE
340/* Fetch the name of the function at FUNADDR.
341 This is used in printing an error message for call_function_by_hand.
342 BUF is used to print FUNADDR in hex if the function name cannot be
343 determined. It must be large enough to hold formatted result of
344 RAW_FUNCTION_ADDRESS_FORMAT. */
345
346static const char *
347get_function_name (CORE_ADDR funaddr, char *buf, int buf_size)
348{
349 {
350 struct symbol *symbol = find_pc_function (funaddr);
abbb1732 351
b89667eb
DE
352 if (symbol)
353 return SYMBOL_PRINT_NAME (symbol);
354 }
355
356 {
357 /* Try the minimal symbols. */
7cbd4a93 358 struct bound_minimal_symbol msymbol = lookup_minimal_symbol_by_pc (funaddr);
abbb1732 359
7cbd4a93 360 if (msymbol.minsym)
efd66ac6 361 return MSYMBOL_PRINT_NAME (msymbol.minsym);
b89667eb
DE
362 }
363
364 {
365 char *tmp = xstrprintf (_(RAW_FUNCTION_ADDRESS_FORMAT),
366 hex_string (funaddr));
abbb1732 367
b89667eb
DE
368 gdb_assert (strlen (tmp) + 1 <= buf_size);
369 strcpy (buf, tmp);
370 xfree (tmp);
371 return buf;
372 }
373}
374
375/* Subroutine of call_function_by_hand to simplify it.
376 Start up the inferior and wait for it to stop.
377 Return the exception if there's an error, or an exception with
378 reason >= 0 if there's no error.
379
380 This is done inside a TRY_CATCH so the caller needn't worry about
381 thrown errors. The caller should rethrow if there's an error. */
382
383static struct gdb_exception
384run_inferior_call (struct thread_info *call_thread, CORE_ADDR real_pc)
385{
386 volatile struct gdb_exception e;
16c381f0 387 int saved_in_infcall = call_thread->control.in_infcall;
b89667eb 388 ptid_t call_thread_ptid = call_thread->ptid;
c933f875
PA
389 int saved_sync_execution = sync_execution;
390
391 /* Infcalls run synchronously, in the foreground. */
392 if (target_can_async_p ())
393 sync_execution = 1;
b89667eb 394
16c381f0 395 call_thread->control.in_infcall = 1;
c5a4d20b 396
70509625 397 clear_proceed_status (0);
b89667eb
DE
398
399 disable_watchpoints_before_interactive_call_start ();
16c381f0 400
1777feb0 401 /* We want stop_registers, please... */
16c381f0 402 call_thread->control.proceed_to_finish = 1;
b89667eb 403
b89667eb 404 TRY_CATCH (e, RETURN_MASK_ALL)
3dd5b83d 405 {
beb460e8
PA
406 int was_sync = sync_execution;
407
a493e3e2 408 proceed (real_pc, GDB_SIGNAL_0, 0);
3dd5b83d
PA
409
410 /* Inferior function calls are always synchronous, even if the
411 target supports asynchronous execution. Do here what
412 `proceed' itself does in sync mode. */
4ae57c05 413 if (target_can_async_p ())
3dd5b83d
PA
414 {
415 wait_for_inferior ();
416 normal_stop ();
beb460e8
PA
417 /* If GDB was previously in sync execution mode, then ensure
418 that it remains so. normal_stop calls
419 async_enable_stdin, so reset it again here. In other
420 cases, stdin will be re-enabled by
421 inferior_event_handler, when an exception is thrown. */
422 if (was_sync)
423 async_disable_stdin ();
3dd5b83d
PA
424 }
425 }
b89667eb 426
c5a4d20b
PA
427 /* At this point the current thread may have changed. Refresh
428 CALL_THREAD as it could be invalid if its thread has exited. */
e09875d4 429 call_thread = find_thread_ptid (call_thread_ptid);
b89667eb 430
b89667eb
DE
431 enable_watchpoints_after_interactive_call_stop ();
432
433 /* Call breakpoint_auto_delete on the current contents of the bpstat
434 of inferior call thread.
435 If all error()s out of proceed ended up calling normal_stop
436 (and perhaps they should; it already does in the special case
437 of error out of resume()), then we wouldn't need this. */
438 if (e.reason < 0)
439 {
c5a4d20b 440 if (call_thread != NULL)
16c381f0 441 breakpoint_auto_delete (call_thread->control.stop_bpstat);
b89667eb
DE
442 }
443
c5a4d20b 444 if (call_thread != NULL)
16c381f0 445 call_thread->control.in_infcall = saved_in_infcall;
c5a4d20b 446
c933f875
PA
447 sync_execution = saved_sync_execution;
448
b89667eb
DE
449 return e;
450}
451
aa7d318d
TT
452/* A cleanup function that calls delete_std_terminate_breakpoint. */
453static void
454cleanup_delete_std_terminate_breakpoint (void *ignore)
455{
456 delete_std_terminate_breakpoint ();
457}
458
04714b91
AC
459/* All this stuff with a dummy frame may seem unnecessarily complicated
460 (why not just save registers in GDB?). The purpose of pushing a dummy
461 frame which looks just like a real frame is so that if you call a
462 function and then hit a breakpoint (get a signal, etc), "backtrace"
463 will look right. Whether the backtrace needs to actually show the
464 stack at the time the inferior function was called is debatable, but
465 it certainly needs to not display garbage. So if you are contemplating
466 making dummy frames be different from normal frames, consider that. */
467
468/* Perform a function call in the inferior.
469 ARGS is a vector of values of arguments (NARGS of them).
470 FUNCTION is a value, the function to be called.
471 Returns a value representing what the function returned.
472 May fail to return, if a breakpoint or signal is hit
473 during the execution of the function.
474
1777feb0 475 ARGS is modified to contain coerced values. */
04714b91
AC
476
477struct value *
478call_function_by_hand (struct value *function, int nargs, struct value **args)
479{
52f0bd74 480 CORE_ADDR sp;
41f1b697 481 struct type *values_type, *target_values_type;
18648a37 482 unsigned char struct_return = 0, hidden_first_param_p = 0;
04714b91 483 CORE_ADDR struct_addr = 0;
16c381f0 484 struct infcall_control_state *inf_status;
04714b91 485 struct cleanup *inf_status_cleanup;
16c381f0 486 struct infcall_suspend_state *caller_state;
04714b91 487 CORE_ADDR funaddr;
04714b91 488 CORE_ADDR real_pc;
df407dfe 489 struct type *ftype = check_typedef (value_type (function));
d585e13a 490 CORE_ADDR bp_addr;
96860204 491 struct frame_id dummy_id;
41f1b697 492 struct cleanup *args_cleanup;
0b9dfe2b
MD
493 struct frame_info *frame;
494 struct gdbarch *gdbarch;
aa7d318d 495 struct cleanup *terminate_bp_cleanup;
b89667eb
DE
496 ptid_t call_thread_ptid;
497 struct gdb_exception e;
b89667eb 498 char name_buf[RAW_FUNCTION_ADDRESS_SIZE];
6c659fc2 499 int stack_temporaries = thread_stack_temporaries_enabled_p (inferior_ptid);
04714b91 500
4c850810
DJ
501 if (TYPE_CODE (ftype) == TYPE_CODE_PTR)
502 ftype = check_typedef (TYPE_TARGET_TYPE (ftype));
503
04714b91
AC
504 if (!target_has_execution)
505 noprocess ();
506
573cda03
SS
507 if (get_traceframe_number () >= 0)
508 error (_("May not call functions while looking at trace frames."));
509
949dc678 510 if (execution_direction == EXEC_REVERSE)
c2949be0 511 error (_("Cannot call functions in reverse mode."));
949dc678 512
0b9dfe2b
MD
513 frame = get_current_frame ();
514 gdbarch = get_frame_arch (frame);
515
516 if (!gdbarch_push_dummy_call_p (gdbarch))
2e74121d 517 error (_("This target does not support function calls."));
a86c5fc9 518
b89667eb
DE
519 /* A cleanup for the inferior status.
520 This is only needed while we're preparing the inferior function call. */
16c381f0
JK
521 inf_status = save_infcall_control_state ();
522 inf_status_cleanup
523 = make_cleanup_restore_infcall_control_state (inf_status);
04714b91 524
b89667eb
DE
525 /* Save the caller's registers and other state associated with the
526 inferior itself so that they can be restored once the
96860204
AC
527 callee returns. To allow nested calls the registers are (further
528 down) pushed onto a dummy frame stack. Include a cleanup (which
529 is tossed once the regcache has been pushed). */
16c381f0
JK
530 caller_state = save_infcall_suspend_state ();
531 make_cleanup_restore_infcall_suspend_state (caller_state);
04714b91 532
04714b91 533 /* Ensure that the initial SP is correctly aligned. */
ebc7896c 534 {
0b9dfe2b 535 CORE_ADDR old_sp = get_frame_sp (frame);
abbb1732 536
0b9dfe2b 537 if (gdbarch_frame_align_p (gdbarch))
ebc7896c 538 {
0b9dfe2b 539 sp = gdbarch_frame_align (gdbarch, old_sp);
8b148df9
AC
540 /* NOTE: cagney/2003-08-13: Skip the "red zone". For some
541 ABIs, a function can use memory beyond the inner most stack
542 address. AMD64 called that region the "red zone". Skip at
543 least the "red zone" size before allocating any space on
544 the stack. */
0b9dfe2b
MD
545 if (gdbarch_inner_than (gdbarch, 1, 2))
546 sp -= gdbarch_frame_red_zone_size (gdbarch);
8b148df9 547 else
0b9dfe2b 548 sp += gdbarch_frame_red_zone_size (gdbarch);
8b148df9 549 /* Still aligned? */
0b9dfe2b 550 gdb_assert (sp == gdbarch_frame_align (gdbarch, sp));
ebc7896c
AC
551 /* NOTE: cagney/2002-09-18:
552
553 On a RISC architecture, a void parameterless generic dummy
554 frame (i.e., no parameters, no result) typically does not
555 need to push anything the stack and hence can leave SP and
c48a845b 556 FP. Similarly, a frameless (possibly leaf) function does
ebc7896c
AC
557 not push anything on the stack and, hence, that too can
558 leave FP and SP unchanged. As a consequence, a sequence of
559 void parameterless generic dummy frame calls to frameless
560 functions will create a sequence of effectively identical
561 frames (SP, FP and TOS and PC the same). This, not
562 suprisingly, results in what appears to be a stack in an
563 infinite loop --- when GDB tries to find a generic dummy
564 frame on the internal dummy frame stack, it will always
565 find the first one.
566
567 To avoid this problem, the code below always grows the
568 stack. That way, two dummy frames can never be identical.
569 It does burn a few bytes of stack but that is a small price
570 to pay :-). */
ebc7896c
AC
571 if (sp == old_sp)
572 {
0b9dfe2b 573 if (gdbarch_inner_than (gdbarch, 1, 2))
ebc7896c 574 /* Stack grows down. */
0b9dfe2b 575 sp = gdbarch_frame_align (gdbarch, old_sp - 1);
ebc7896c
AC
576 else
577 /* Stack grows up. */
0b9dfe2b 578 sp = gdbarch_frame_align (gdbarch, old_sp + 1);
ebc7896c 579 }
0e095b7e
JK
580 /* SP may have underflown address zero here from OLD_SP. Memory access
581 functions will probably fail in such case but that is a target's
582 problem. */
ebc7896c
AC
583 }
584 else
a59fe496
AC
585 /* FIXME: cagney/2002-09-18: Hey, you loose!
586
8b148df9
AC
587 Who knows how badly aligned the SP is!
588
589 If the generic dummy frame ends up empty (because nothing is
590 pushed) GDB won't be able to correctly perform back traces.
591 If a target is having trouble with backtraces, first thing to
1777feb0 592 do is add FRAME_ALIGN() to the architecture vector. If that
669fac23 593 fails, try dummy_id().
8b148df9
AC
594
595 If the ABI specifies a "Red Zone" (see the doco) the code
596 below will quietly trash it. */
ebc7896c 597 sp = old_sp;
6c659fc2
SC
598
599 /* Skip over the stack temporaries that might have been generated during
600 the evaluation of an expression. */
601 if (stack_temporaries)
602 {
603 struct value *lastval;
604
605 lastval = get_last_thread_stack_temporary (inferior_ptid);
606 if (lastval != NULL)
607 {
608 CORE_ADDR lastval_addr = value_address (lastval);
609
610 if (gdbarch_inner_than (gdbarch, 1, 2))
611 {
612 gdb_assert (sp >= lastval_addr);
613 sp = lastval_addr;
614 }
615 else
616 {
617 gdb_assert (sp <= lastval_addr);
618 sp = lastval_addr + TYPE_LENGTH (value_type (lastval));
619 }
620
621 if (gdbarch_frame_align_p (gdbarch))
622 sp = gdbarch_frame_align (gdbarch, sp);
623 }
624 }
ebc7896c 625 }
04714b91 626
df407dfe 627 funaddr = find_function_addr (function, &values_type);
7788af6d
UW
628 if (!values_type)
629 values_type = builtin_type (gdbarch)->builtin_int;
630
df407dfe 631 CHECK_TYPEDEF (values_type);
04714b91 632
41f1b697
DJ
633 /* Are we returning a value using a structure return (passing a
634 hidden argument pointing to storage) or a normal value return?
635 There are two cases: language-mandated structure return and
636 target ABI structure return. The variable STRUCT_RETURN only
637 describes the latter. The language version is handled by passing
638 the return location as the first parameter to the function,
639 even preceding "this". This is different from the target
640 ABI version, which is target-specific; for instance, on ia64
641 the first argument is passed in out0 but the hidden structure
642 return pointer would normally be passed in r8. */
643
18648a37 644 if (gdbarch_return_in_first_hidden_param_p (gdbarch, values_type))
41f1b697 645 {
18648a37 646 hidden_first_param_p = 1;
04714b91 647
41f1b697
DJ
648 /* Tell the target specific argument pushing routine not to
649 expect a value. */
48319d1f 650 target_values_type = builtin_type (gdbarch)->builtin_void;
41f1b697
DJ
651 }
652 else
653 {
6a3a010b 654 struct_return = using_struct_return (gdbarch, function, values_type);
41f1b697
DJ
655 target_values_type = values_type;
656 }
04714b91 657
162078c8
NB
658 observer_notify_inferior_call_pre (inferior_ptid, funaddr);
659
7043d8dc
AC
660 /* Determine the location of the breakpoint (and possibly other
661 stuff) that the called function will return to. The SPARC, for a
662 function returning a structure or union, needs to make space for
663 not just the breakpoint but also an extra word containing the
664 size (?) of the structure being passed. */
665
0b9dfe2b 666 switch (gdbarch_call_dummy_location (gdbarch))
04714b91
AC
667 {
668 case ON_STACK:
a14dd77e
JK
669 {
670 const gdb_byte *bp_bytes;
671 CORE_ADDR bp_addr_as_address;
672 int bp_size;
673
674 /* Be careful BP_ADDR is in inferior PC encoding while
675 BP_ADDR_AS_ADDRESS is a plain memory address. */
676
677 sp = push_dummy_code (gdbarch, sp, funaddr, args, nargs,
678 target_values_type, &real_pc, &bp_addr,
679 get_current_regcache ());
680
681 /* Write a legitimate instruction at the point where the infcall
682 breakpoint is going to be inserted. While this instruction
683 is never going to be executed, a user investigating the
684 memory from GDB would see this instruction instead of random
685 uninitialized bytes. We chose the breakpoint instruction
686 as it may look as the most logical one to the user and also
687 valgrind 3.7.0 needs it for proper vgdb inferior calls.
688
689 If software breakpoints are unsupported for this target we
690 leave the user visible memory content uninitialized. */
691
692 bp_addr_as_address = bp_addr;
693 bp_bytes = gdbarch_breakpoint_from_pc (gdbarch, &bp_addr_as_address,
694 &bp_size);
695 if (bp_bytes != NULL)
696 write_memory (bp_addr_as_address, bp_bytes, bp_size);
697 }
7043d8dc 698 break;
5931a2fa
JK
699 case AT_ENTRY_POINT:
700 {
701 CORE_ADDR dummy_addr;
702
703 real_pc = funaddr;
704 dummy_addr = entry_point_address ();
a14dd77e 705
5931a2fa 706 /* A call dummy always consists of just a single breakpoint, so
a14dd77e
JK
707 its address is the same as the address of the dummy.
708
709 The actual breakpoint is inserted separatly so there is no need to
710 write that out. */
5931a2fa
JK
711 bp_addr = dummy_addr;
712 break;
713 }
04714b91 714 default:
e2e0b3e5 715 internal_error (__FILE__, __LINE__, _("bad switch"));
04714b91
AC
716 }
717
04714b91 718 if (nargs < TYPE_NFIELDS (ftype))
2e74121d 719 error (_("Too few arguments in function call."));
04714b91 720
ebc7896c
AC
721 {
722 int i;
abbb1732 723
ebc7896c
AC
724 for (i = nargs - 1; i >= 0; i--)
725 {
726 int prototyped;
727 struct type *param_type;
728
729 /* FIXME drow/2002-05-31: Should just always mark methods as
730 prototyped. Can we respect TYPE_VARARGS? Probably not. */
731 if (TYPE_CODE (ftype) == TYPE_CODE_METHOD)
732 prototyped = 1;
733 else if (i < TYPE_NFIELDS (ftype))
734 prototyped = TYPE_PROTOTYPED (ftype);
735 else
736 prototyped = 0;
737
738 if (i < TYPE_NFIELDS (ftype))
739 param_type = TYPE_FIELD_TYPE (ftype, i);
740 else
741 param_type = NULL;
41f1b697 742
7788af6d
UW
743 args[i] = value_arg_coerce (gdbarch, args[i],
744 param_type, prototyped, &sp);
ebc7896c 745
41f1b697
DJ
746 if (param_type != NULL && language_pass_by_reference (param_type))
747 args[i] = value_addr (args[i]);
ebc7896c
AC
748 }
749 }
04714b91 750
04714b91
AC
751 /* Reserve space for the return structure to be written on the
752 stack, if necessary. Make certain that the value is correctly
6c659fc2
SC
753 aligned.
754
755 While evaluating expressions, we reserve space on the stack for
756 return values of class type even if the language ABI and the target
757 ABI do not require that the return value be passed as a hidden first
758 argument. This is because we want to store the return value as an
759 on-stack temporary while the expression is being evaluated. This
760 enables us to have chained function calls in expressions.
04714b91 761
6c659fc2
SC
762 Keeping the return values as on-stack temporaries while the expression
763 is being evaluated is OK because the thread is stopped until the
764 expression is completely evaluated. */
765
766 if (struct_return || hidden_first_param_p
767 || (stack_temporaries && class_or_union_p (values_type)))
04714b91 768 {
0b9dfe2b 769 if (gdbarch_inner_than (gdbarch, 1, 2))
04714b91
AC
770 {
771 /* Stack grows downward. Align STRUCT_ADDR and SP after
772 making space for the return value. */
744a8059 773 sp -= TYPE_LENGTH (values_type);
0b9dfe2b
MD
774 if (gdbarch_frame_align_p (gdbarch))
775 sp = gdbarch_frame_align (gdbarch, sp);
04714b91
AC
776 struct_addr = sp;
777 }
778 else
779 {
780 /* Stack grows upward. Align the frame, allocate space, and
1777feb0 781 then again, re-align the frame??? */
0b9dfe2b
MD
782 if (gdbarch_frame_align_p (gdbarch))
783 sp = gdbarch_frame_align (gdbarch, sp);
04714b91 784 struct_addr = sp;
744a8059 785 sp += TYPE_LENGTH (values_type);
0b9dfe2b
MD
786 if (gdbarch_frame_align_p (gdbarch))
787 sp = gdbarch_frame_align (gdbarch, sp);
04714b91
AC
788 }
789 }
790
18648a37 791 if (hidden_first_param_p)
41f1b697
DJ
792 {
793 struct value **new_args;
794
795 /* Add the new argument to the front of the argument list. */
796 new_args = xmalloc (sizeof (struct value *) * (nargs + 1));
797 new_args[0] = value_from_pointer (lookup_pointer_type (values_type),
798 struct_addr);
799 memcpy (&new_args[1], &args[0], sizeof (struct value *) * nargs);
800 args = new_args;
801 nargs++;
802 args_cleanup = make_cleanup (xfree, args);
803 }
804 else
805 args_cleanup = make_cleanup (null_cleanup, NULL);
806
04714b91
AC
807 /* Create the dummy stack frame. Pass in the call dummy address as,
808 presumably, the ABI code knows where, in the call dummy, the
809 return address should be pointed. */
0b9dfe2b
MD
810 sp = gdbarch_push_dummy_call (gdbarch, function, get_current_regcache (),
811 bp_addr, nargs, args,
594f7785 812 sp, struct_return, struct_addr);
04714b91 813
41f1b697
DJ
814 do_cleanups (args_cleanup);
815
96860204
AC
816 /* Set up a frame ID for the dummy frame so we can pass it to
817 set_momentary_breakpoint. We need to give the breakpoint a frame
818 ID so that the breakpoint code can correctly re-identify the
819 dummy breakpoint. */
8241eaa6 820 /* Sanity. The exact same SP value is returned by PUSH_DUMMY_CALL,
669fac23 821 saved as the dummy-frame TOS, and used by dummy_id to form
8241eaa6 822 the frame ID's stack address. */
96860204 823 dummy_id = frame_id_build (sp, bp_addr);
04714b91 824
74cfe982
AC
825 /* Create a momentary breakpoint at the return address of the
826 inferior. That way it breaks when it returns. */
04714b91 827
74cfe982 828 {
e2e4d78b 829 struct breakpoint *bpt, *longjmp_b;
74cfe982 830 struct symtab_and_line sal;
abbb1732 831
74cfe982 832 init_sal (&sal); /* initialize to zeroes */
6c95b8df 833 sal.pspace = current_program_space;
74cfe982
AC
834 sal.pc = bp_addr;
835 sal.section = find_pc_overlay (sal.pc);
8241eaa6
AC
836 /* Sanity. The exact same SP value is returned by
837 PUSH_DUMMY_CALL, saved as the dummy-frame TOS, and used by
669fac23 838 dummy_id to form the frame ID's stack address. */
a6d9a66e 839 bpt = set_momentary_breakpoint (gdbarch, sal, dummy_id, bp_call_dummy);
c70a6932
JK
840
841 /* set_momentary_breakpoint invalidates FRAME. */
842 frame = NULL;
843
74cfe982 844 bpt->disposition = disp_del;
e2e4d78b
JK
845 gdb_assert (bpt->related_breakpoint == bpt);
846
847 longjmp_b = set_longjmp_breakpoint_for_call_dummy ();
848 if (longjmp_b)
849 {
850 /* Link BPT into the chain of LONGJMP_B. */
851 bpt->related_breakpoint = longjmp_b;
852 while (longjmp_b->related_breakpoint != bpt->related_breakpoint)
853 longjmp_b = longjmp_b->related_breakpoint;
854 longjmp_b->related_breakpoint = bpt;
855 }
74cfe982 856 }
04714b91 857
7cd1089b
PM
858 /* Create a breakpoint in std::terminate.
859 If a C++ exception is raised in the dummy-frame, and the
860 exception handler is (normally, and expected to be) out-of-frame,
861 the default C++ handler will (wrongly) be called in an inferior
862 function call. This is wrong, as an exception can be normally
863 and legally handled out-of-frame. The confines of the dummy frame
864 prevent the unwinder from finding the correct handler (or any
865 handler, unless it is in-frame). The default handler calls
866 std::terminate. This will kill the inferior. Assert that
867 terminate should never be called in an inferior function
868 call. Place a momentary breakpoint in the std::terminate function
869 and if triggered in the call, rewind. */
870 if (unwind_on_terminating_exception_p)
aa7d318d 871 set_std_terminate_breakpoint ();
7cd1089b 872
96860204
AC
873 /* Everything's ready, push all the info needed to restore the
874 caller (and identify the dummy-frame) onto the dummy-frame
875 stack. */
b67a2c6f 876 dummy_frame_push (caller_state, &dummy_id, inferior_ptid);
b89667eb
DE
877
878 /* Discard both inf_status and caller_state cleanups.
879 From this point on we explicitly restore the associated state
880 or discard it. */
881 discard_cleanups (inf_status_cleanup);
96860204 882
7cd1089b 883 /* Register a clean-up for unwind_on_terminating_exception_breakpoint. */
aa7d318d
TT
884 terminate_bp_cleanup = make_cleanup (cleanup_delete_std_terminate_breakpoint,
885 NULL);
7cd1089b 886
96860204
AC
887 /* - SNIP - SNIP - SNIP - SNIP - SNIP - SNIP - SNIP - SNIP - SNIP -
888 If you're looking to implement asynchronous dummy-frames, then
889 just below is the place to chop this function in two.. */
890
b89667eb
DE
891 /* TP is invalid after run_inferior_call returns, so enclose this
892 in a block so that it's only in scope during the time it's valid. */
74cfe982 893 {
32400beb 894 struct thread_info *tp = inferior_thread ();
74cfe982 895
b89667eb
DE
896 /* Save this thread's ptid, we need it later but the thread
897 may have exited. */
898 call_thread_ptid = tp->ptid;
74cfe982 899
b89667eb 900 /* Run the inferior until it stops. */
f5871ec0 901
b89667eb 902 e = run_inferior_call (tp, real_pc);
52557533 903 }
04714b91 904
162078c8
NB
905 observer_notify_inferior_call_post (call_thread_ptid, funaddr);
906
b89667eb
DE
907 /* Rethrow an error if we got one trying to run the inferior. */
908
909 if (e.reason < 0)
910 {
911 const char *name = get_function_name (funaddr,
912 name_buf, sizeof (name_buf));
913
16c381f0 914 discard_infcall_control_state (inf_status);
b89667eb
DE
915
916 /* We could discard the dummy frame here if the program exited,
917 but it will get garbage collected the next time the program is
918 run anyway. */
919
920 switch (e.reason)
921 {
922 case RETURN_ERROR:
ac74f770
MS
923 throw_error (e.error, _("%s\n\
924An error occurred while in a function called from GDB.\n\
925Evaluation of the expression containing the function\n\
926(%s) will be abandoned.\n\
927When the function is done executing, GDB will silently stop."),
b89667eb
DE
928 e.message, name);
929 case RETURN_QUIT:
930 default:
931 throw_exception (e);
932 }
933 }
934
935 /* If the program has exited, or we stopped at a different thread,
936 exit and inform the user. */
937
de04a248
DE
938 if (! target_has_execution)
939 {
b89667eb
DE
940 const char *name = get_function_name (funaddr,
941 name_buf, sizeof (name_buf));
942
943 /* If we try to restore the inferior status,
de04a248 944 we'll crash as the inferior is no longer running. */
16c381f0 945 discard_infcall_control_state (inf_status);
b89667eb
DE
946
947 /* We could discard the dummy frame here given that the program exited,
948 but it will get garbage collected the next time the program is
949 run anyway. */
950
3e43a32a
MS
951 error (_("The program being debugged exited while in a function "
952 "called from GDB.\n"
953 "Evaluation of the expression containing the function\n"
954 "(%s) will be abandoned."),
b89667eb
DE
955 name);
956 }
957
958 if (! ptid_equal (call_thread_ptid, inferior_ptid))
959 {
960 const char *name = get_function_name (funaddr,
961 name_buf, sizeof (name_buf));
962
963 /* We've switched threads. This can happen if another thread gets a
964 signal or breakpoint while our thread was running.
965 There's no point in restoring the inferior status,
966 we're in a different thread. */
16c381f0 967 discard_infcall_control_state (inf_status);
b89667eb
DE
968 /* Keep the dummy frame record, if the user switches back to the
969 thread with the hand-call, we'll need it. */
970 if (stopped_by_random_signal)
ac74f770
MS
971 error (_("\
972The program received a signal in another thread while\n\
973making a function call from GDB.\n\
974Evaluation of the expression containing the function\n\
975(%s) will be abandoned.\n\
976When the function is done executing, GDB will silently stop."),
b89667eb
DE
977 name);
978 else
ac74f770
MS
979 error (_("\
980The program stopped in another thread while making a function call from GDB.\n\
981Evaluation of the expression containing the function\n\
982(%s) will be abandoned.\n\
983When the function is done executing, GDB will silently stop."),
b89667eb 984 name);
de04a248
DE
985 }
986
aa7d318d 987 if (stopped_by_random_signal || stop_stack_dummy != STOP_STACK_DUMMY)
52557533 988 {
b89667eb
DE
989 const char *name = get_function_name (funaddr,
990 name_buf, sizeof (name_buf));
991
52557533
AC
992 if (stopped_by_random_signal)
993 {
994 /* We stopped inside the FUNCTION because of a random
995 signal. Further execution of the FUNCTION is not
1777feb0 996 allowed. */
04714b91 997
52557533
AC
998 if (unwind_on_signal_p)
999 {
1777feb0 1000 /* The user wants the context restored. */
52557533
AC
1001
1002 /* We must get back to the frame we were before the
b89667eb 1003 dummy call. */
b67a2c6f 1004 dummy_frame_pop (dummy_id, call_thread_ptid);
b89667eb
DE
1005
1006 /* We also need to restore inferior status to that before the
1007 dummy call. */
16c381f0 1008 restore_infcall_control_state (inf_status);
04714b91 1009
52557533
AC
1010 /* FIXME: Insert a bunch of wrap_here; name can be very
1011 long if it's a C++ name with arguments and stuff. */
ac74f770
MS
1012 error (_("\
1013The program being debugged was signaled while in a function called from GDB.\n\
1014GDB has restored the context to what it was before the call.\n\
1015To change this behavior use \"set unwindonsignal off\".\n\
1016Evaluation of the expression containing the function\n\
1017(%s) will be abandoned."),
52557533
AC
1018 name);
1019 }
1020 else
1021 {
1022 /* The user wants to stay in the frame where we stopped
b89667eb
DE
1023 (default).
1024 Discard inferior status, we're not at the same point
1025 we started at. */
16c381f0 1026 discard_infcall_control_state (inf_status);
b89667eb 1027
52557533
AC
1028 /* FIXME: Insert a bunch of wrap_here; name can be very
1029 long if it's a C++ name with arguments and stuff. */
ac74f770
MS
1030 error (_("\
1031The program being debugged was signaled while in a function called from GDB.\n\
1032GDB remains in the frame where the signal was received.\n\
1033To change this behavior use \"set unwindonsignal on\".\n\
1034Evaluation of the expression containing the function\n\
1035(%s) will be abandoned.\n\
1036When the function is done executing, GDB will silently stop."),
52557533
AC
1037 name);
1038 }
1039 }
04714b91 1040
aa7d318d 1041 if (stop_stack_dummy == STOP_STD_TERMINATE)
52557533 1042 {
aa7d318d
TT
1043 /* We must get back to the frame we were before the dummy
1044 call. */
b67a2c6f 1045 dummy_frame_pop (dummy_id, call_thread_ptid);
7cd1089b 1046
aa7d318d
TT
1047 /* We also need to restore inferior status to that before
1048 the dummy call. */
16c381f0 1049 restore_infcall_control_state (inf_status);
aa7d318d 1050
ac74f770
MS
1051 error (_("\
1052The program being debugged entered a std::terminate call, most likely\n\
1053caused by an unhandled C++ exception. GDB blocked this call in order\n\
1054to prevent the program from being terminated, and has restored the\n\
1055context to its original state before the call.\n\
1056To change this behaviour use \"set unwind-on-terminating-exception off\".\n\
1057Evaluation of the expression containing the function (%s)\n\
1058will be abandoned."),
aa7d318d
TT
1059 name);
1060 }
1061 else if (stop_stack_dummy == STOP_NONE)
1062 {
1063
b89667eb
DE
1064 /* We hit a breakpoint inside the FUNCTION.
1065 Keep the dummy frame, the user may want to examine its state.
1066 Discard inferior status, we're not at the same point
1067 we started at. */
16c381f0 1068 discard_infcall_control_state (inf_status);
b89667eb 1069
52557533
AC
1070 /* The following error message used to say "The expression
1071 which contained the function call has been discarded."
1072 It is a hard concept to explain in a few words. Ideally,
1073 GDB would be able to resume evaluation of the expression
1074 when the function finally is done executing. Perhaps
1075 someday this will be implemented (it would not be easy). */
1076 /* FIXME: Insert a bunch of wrap_here; name can be very long if it's
1077 a C++ name with arguments and stuff. */
ac74f770
MS
1078 error (_("\
1079The program being debugged stopped while in a function called from GDB.\n\
1080Evaluation of the expression containing the function\n\
1081(%s) will be abandoned.\n\
1082When the function is done executing, GDB will silently stop."),
b89667eb 1083 name);
52557533
AC
1084 }
1085
1086 /* The above code errors out, so ... */
e2e0b3e5 1087 internal_error (__FILE__, __LINE__, _("... should not be here"));
52557533 1088 }
04714b91 1089
aa7d318d 1090 do_cleanups (terminate_bp_cleanup);
2f2da8f6 1091
b89667eb
DE
1092 /* If we get here the called FUNCTION ran to completion,
1093 and the dummy frame has already been popped. */
74cfe982 1094
44e5158b 1095 {
d37346f0
DJ
1096 struct address_space *aspace = get_regcache_aspace (stop_registers);
1097 struct regcache *retbuf = regcache_xmalloc (gdbarch, aspace);
b89667eb 1098 struct cleanup *retbuf_cleanup = make_cleanup_regcache_xfree (retbuf);
1a4d7a36
MK
1099 struct value *retval = NULL;
1100
b89667eb
DE
1101 regcache_cpy_no_passthrough (retbuf, stop_registers);
1102
1103 /* Inferior call is successful. Restore the inferior status.
1104 At this stage, leave the RETBUF alone. */
16c381f0 1105 restore_infcall_control_state (inf_status);
b89667eb 1106
6c659fc2
SC
1107 if (TYPE_CODE (values_type) == TYPE_CODE_VOID)
1108 retval = allocate_value (values_type);
1109 else if (struct_return || hidden_first_param_p)
44e5158b 1110 {
6c659fc2
SC
1111 if (stack_temporaries)
1112 {
1113 retval = value_from_contents_and_address (values_type, NULL,
1114 struct_addr);
1115 push_thread_stack_temporary (inferior_ptid, retval);
1116 }
1117 else
1a4d7a36 1118 {
6c659fc2 1119 retval = allocate_value (values_type);
81b4675a
UW
1120 read_value_memory (retval, 0, 1, struct_addr,
1121 value_contents_raw (retval),
1122 TYPE_LENGTH (values_type));
6c659fc2
SC
1123 }
1124 }
1125 else
1126 {
1127 retval = allocate_value (values_type);
1128 gdbarch_return_value (gdbarch, function, values_type,
1129 retbuf, value_contents_raw (retval), NULL);
1130 if (stack_temporaries && class_or_union_p (values_type))
1131 {
1132 /* Values of class type returned in registers are copied onto
1133 the stack and their lval_type set to lval_memory. This is
1134 required because further evaluation of the expression
1135 could potentially invoke methods on the return value
1136 requiring GDB to evaluate the "this" pointer. To evaluate
1137 the this pointer, GDB needs the memory address of the
1138 value. */
1139 value_force_lval (retval, struct_addr);
1140 push_thread_stack_temporary (inferior_ptid, retval);
1a4d7a36
MK
1141 }
1142 }
1143
44e5158b 1144 do_cleanups (retbuf_cleanup);
1a4d7a36 1145
b89667eb 1146 gdb_assert (retval);
44e5158b
AC
1147 return retval;
1148 }
04714b91 1149}
1a4d7a36 1150\f
04714b91 1151
1a4d7a36 1152/* Provide a prototype to silence -Wmissing-prototypes. */
04714b91
AC
1153void _initialize_infcall (void);
1154
1155void
1156_initialize_infcall (void)
1157{
1158 add_setshow_boolean_cmd ("coerce-float-to-double", class_obscure,
7915a72c
AC
1159 &coerce_float_to_double_p, _("\
1160Set coercion of floats to doubles when calling functions."), _("\
1161Show coercion of floats to doubles when calling functions"), _("\
04714b91
AC
1162Variables of type float should generally be converted to doubles before\n\
1163calling an unprototyped function, and left alone when calling a prototyped\n\
1164function. However, some older debug info formats do not provide enough\n\
1165information to determine that a function is prototyped. If this flag is\n\
1166set, GDB will perform the conversion for a function it considers\n\
1167unprototyped.\n\
7915a72c 1168The default is to perform the conversion.\n"),
2c5b56ce 1169 NULL,
920d2a44 1170 show_coerce_float_to_double_p,
2c5b56ce 1171 &setlist, &showlist);
04714b91
AC
1172
1173 add_setshow_boolean_cmd ("unwindonsignal", no_class,
7915a72c
AC
1174 &unwind_on_signal_p, _("\
1175Set unwinding of stack if a signal is received while in a call dummy."), _("\
1176Show unwinding of stack if a signal is received while in a call dummy."), _("\
04714b91
AC
1177The unwindonsignal lets the user determine what gdb should do if a signal\n\
1178is received while in a function called from gdb (call dummy). If set, gdb\n\
1179unwinds the stack and restore the context to what as it was before the call.\n\
7915a72c 1180The default is to stop in the frame where the signal was received."),
2c5b56ce 1181 NULL,
920d2a44 1182 show_unwind_on_signal_p,
2c5b56ce 1183 &setlist, &showlist);
7cd1089b
PM
1184
1185 add_setshow_boolean_cmd ("unwind-on-terminating-exception", no_class,
1186 &unwind_on_terminating_exception_p, _("\
1187Set unwinding of stack if std::terminate is called while in call dummy."), _("\
3e43a32a
MS
1188Show unwinding of stack if std::terminate() is called while in a call dummy."),
1189 _("\
7cd1089b
PM
1190The unwind on terminating exception flag lets the user determine\n\
1191what gdb should do if a std::terminate() call is made from the\n\
1192default exception handler. If set, gdb unwinds the stack and restores\n\
1193the context to what it was before the call. If unset, gdb allows the\n\
1194std::terminate call to proceed.\n\
1195The default is to unwind the frame."),
1196 NULL,
1197 show_unwind_on_terminating_exception_p,
1198 &setlist, &showlist);
1199
04714b91 1200}
This page took 1.021202 seconds and 4 git commands to generate.