Tweak target_xfer_status_to_string
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
ecd75fc8 3 Copyright (C) 1986-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
c906108c 39#include <errno.h>
0e9f083f 40#include <string.h>
4a1970e4 41#include "gdb_assert.h"
f4c5303c 42#include "observer.h"
3e3b026f 43#include "objfiles.h"
79afc5ef 44#include "exceptions.h"
c906108c 45
ccce17b0 46extern unsigned int overload_debug;
c906108c
SS
47/* Local functions. */
48
ad2f7632
DJ
49static int typecmp (int staticp, int varargs, int nargs,
50 struct field t1[], struct value *t2[]);
c906108c 51
714f19d5 52static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 53 int, struct type *, int);
c906108c 54
714f19d5
TT
55static struct value *search_struct_method (const char *, struct value **,
56 struct value **,
57 int, int *, struct type *);
c906108c 58
da096638 59static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
60 const char *, const char *,
61 struct symbol ***,
7322dca9
SW
62 struct badness_vector **,
63 const int no_adl);
8d577d32
DC
64
65static
da096638 66int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
67 const char *, const char *,
68 int, struct symbol ***,
7322dca9
SW
69 struct badness_vector **, int *,
70 const int no_adl);
ac3eeb49 71
da096638 72static int find_oload_champ (struct value **, int, int, int,
ac3eeb49
MS
73 struct fn_field *, struct symbol **,
74 struct badness_vector **);
75
76static int oload_method_static (int, struct fn_field *, int);
8d577d32
DC
77
78enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
79
80static enum
ac3eeb49
MS
81oload_classification classify_oload_match (struct badness_vector *,
82 int, int);
8d577d32 83
ac3eeb49
MS
84static struct value *value_struct_elt_for_reference (struct type *,
85 int, struct type *,
86 char *,
87 struct type *,
88 int, enum noside);
79c2c32d 89
ac3eeb49
MS
90static struct value *value_namespace_elt (const struct type *,
91 char *, int , enum noside);
79c2c32d 92
ac3eeb49
MS
93static struct value *value_maybe_namespace_elt (const struct type *,
94 char *, int,
95 enum noside);
63d06c5c 96
a14ed312 97static CORE_ADDR allocate_space_in_inferior (int);
c906108c 98
f23631e4 99static struct value *cast_into_complex (struct type *, struct value *);
c906108c 100
714f19d5 101static struct fn_field *find_method_list (struct value **, const char *,
ac3eeb49
MS
102 int, struct type *, int *,
103 struct type **, int *);
7a292a7a 104
a14ed312 105void _initialize_valops (void);
c906108c 106
c906108c 107#if 0
ac3eeb49
MS
108/* Flag for whether we want to abandon failed expression evals by
109 default. */
110
c906108c
SS
111static int auto_abandon = 0;
112#endif
113
114int overload_resolution = 0;
920d2a44
AC
115static void
116show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
117 struct cmd_list_element *c,
118 const char *value)
920d2a44 119{
3e43a32a
MS
120 fprintf_filtered (file, _("Overload resolution in evaluating "
121 "C++ functions is %s.\n"),
920d2a44
AC
122 value);
123}
242bfc55 124
3e3b026f
UW
125/* Find the address of function name NAME in the inferior. If OBJF_P
126 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
127 is defined. */
c906108c 128
f23631e4 129struct value *
3e3b026f 130find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 131{
52f0bd74 132 struct symbol *sym;
a109c7c1 133
2570f2b7 134 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
135 if (sym != NULL)
136 {
137 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
138 {
8a3fe4f8 139 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
140 name);
141 }
3e3b026f
UW
142
143 if (objf_p)
144 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
145
c906108c
SS
146 return value_of_variable (sym, NULL);
147 }
148 else
149 {
7c7b6655
TT
150 struct bound_minimal_symbol msymbol =
151 lookup_bound_minimal_symbol (name);
a109c7c1 152
7c7b6655 153 if (msymbol.minsym != NULL)
c906108c 154 {
7c7b6655 155 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
156 struct gdbarch *gdbarch = get_objfile_arch (objfile);
157
c906108c 158 struct type *type;
4478b372 159 CORE_ADDR maddr;
3e3b026f 160 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
161 type = lookup_function_type (type);
162 type = lookup_pointer_type (type);
7c7b6655 163 maddr = SYMBOL_VALUE_ADDRESS (msymbol.minsym);
3e3b026f
UW
164
165 if (objf_p)
166 *objf_p = objfile;
167
4478b372 168 return value_from_pointer (type, maddr);
c906108c
SS
169 }
170 else
171 {
c5aa993b 172 if (!target_has_execution)
3e43a32a
MS
173 error (_("evaluation of this expression "
174 "requires the target program to be active"));
c5aa993b 175 else
3e43a32a
MS
176 error (_("evaluation of this expression requires the "
177 "program to have a function \"%s\"."),
178 name);
c906108c
SS
179 }
180 }
181}
182
ac3eeb49
MS
183/* Allocate NBYTES of space in the inferior using the inferior's
184 malloc and return a value that is a pointer to the allocated
185 space. */
c906108c 186
f23631e4 187struct value *
fba45db2 188value_allocate_space_in_inferior (int len)
c906108c 189{
3e3b026f
UW
190 struct objfile *objf;
191 struct value *val = find_function_in_inferior ("malloc", &objf);
192 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 193 struct value *blocklen;
c906108c 194
3e3b026f 195 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
196 val = call_function_by_hand (val, 1, &blocklen);
197 if (value_logical_not (val))
198 {
199 if (!target_has_execution)
3e43a32a
MS
200 error (_("No memory available to program now: "
201 "you need to start the target first"));
c5aa993b 202 else
8a3fe4f8 203 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
204 }
205 return val;
206}
207
208static CORE_ADDR
fba45db2 209allocate_space_in_inferior (int len)
c906108c
SS
210{
211 return value_as_long (value_allocate_space_in_inferior (len));
212}
213
6af87b03
AR
214/* Cast struct value VAL to type TYPE and return as a value.
215 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
216 for this to work. Typedef to one of the codes is permitted.
217 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
218
219static struct value *
220value_cast_structs (struct type *type, struct value *v2)
221{
222 struct type *t1;
223 struct type *t2;
224 struct value *v;
225
226 gdb_assert (type != NULL && v2 != NULL);
227
228 t1 = check_typedef (type);
229 t2 = check_typedef (value_type (v2));
230
231 /* Check preconditions. */
232 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
233 || TYPE_CODE (t1) == TYPE_CODE_UNION)
234 && !!"Precondition is that type is of STRUCT or UNION kind.");
235 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
236 || TYPE_CODE (t2) == TYPE_CODE_UNION)
237 && !!"Precondition is that value is of STRUCT or UNION kind");
238
191ca0a1
CM
239 if (TYPE_NAME (t1) != NULL
240 && TYPE_NAME (t2) != NULL
241 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
242 return NULL;
243
6af87b03
AR
244 /* Upcasting: look in the type of the source to see if it contains the
245 type of the target as a superclass. If so, we'll need to
246 offset the pointer rather than just change its type. */
247 if (TYPE_NAME (t1) != NULL)
248 {
249 v = search_struct_field (type_name_no_tag (t1),
250 v2, 0, t2, 1);
251 if (v)
252 return v;
253 }
254
255 /* Downcasting: look in the type of the target to see if it contains the
256 type of the source as a superclass. If so, we'll need to
9c3c02fd 257 offset the pointer rather than just change its type. */
6af87b03
AR
258 if (TYPE_NAME (t2) != NULL)
259 {
9c3c02fd
TT
260 /* Try downcasting using the run-time type of the value. */
261 int full, top, using_enc;
262 struct type *real_type;
263
264 real_type = value_rtti_type (v2, &full, &top, &using_enc);
265 if (real_type)
266 {
267 v = value_full_object (v2, real_type, full, top, using_enc);
268 v = value_at_lazy (real_type, value_address (v));
269
270 /* We might be trying to cast to the outermost enclosing
271 type, in which case search_struct_field won't work. */
272 if (TYPE_NAME (real_type) != NULL
273 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
274 return v;
275
276 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
277 if (v)
278 return v;
279 }
280
281 /* Try downcasting using information from the destination type
282 T2. This wouldn't work properly for classes with virtual
283 bases, but those were handled above. */
6af87b03
AR
284 v = search_struct_field (type_name_no_tag (t2),
285 value_zero (t1, not_lval), 0, t1, 1);
286 if (v)
287 {
288 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 289 CORE_ADDR addr2 = value_address (v2);
a109c7c1 290
42ae5230 291 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
292 return value_at (type, addr2);
293 }
294 }
694182d2
DJ
295
296 return NULL;
6af87b03
AR
297}
298
fb933624
DJ
299/* Cast one pointer or reference type to another. Both TYPE and
300 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
301 reference types. If SUBCLASS_CHECK is non-zero, this will force a
302 check to see whether TYPE is a superclass of ARG2's type. If
303 SUBCLASS_CHECK is zero, then the subclass check is done only when
304 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
305
306struct value *
b1af9e97
TT
307value_cast_pointers (struct type *type, struct value *arg2,
308 int subclass_check)
fb933624 309{
d160942f 310 struct type *type1 = check_typedef (type);
fb933624 311 struct type *type2 = check_typedef (value_type (arg2));
d160942f 312 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
313 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
314
315 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
316 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 317 && (subclass_check || !value_logical_not (arg2)))
fb933624 318 {
6af87b03 319 struct value *v2;
fb933624 320
6af87b03
AR
321 if (TYPE_CODE (type2) == TYPE_CODE_REF)
322 v2 = coerce_ref (arg2);
323 else
324 v2 = value_ind (arg2);
3e43a32a
MS
325 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
326 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
327 v2 = value_cast_structs (t1, v2);
328 /* At this point we have what we can have, un-dereference if needed. */
329 if (v2)
fb933624 330 {
6af87b03 331 struct value *v = value_addr (v2);
a109c7c1 332
6af87b03
AR
333 deprecated_set_value_type (v, type);
334 return v;
fb933624 335 }
6af87b03 336 }
fb933624
DJ
337
338 /* No superclass found, just change the pointer type. */
0d5de010 339 arg2 = value_copy (arg2);
fb933624 340 deprecated_set_value_type (arg2, type);
4dfea560 341 set_value_enclosing_type (arg2, type);
fb933624
DJ
342 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
343 return arg2;
344}
345
c906108c
SS
346/* Cast value ARG2 to type TYPE and return as a value.
347 More general than a C cast: accepts any two types of the same length,
348 and if ARG2 is an lvalue it can be cast into anything at all. */
349/* In C++, casts may change pointer or object representations. */
350
f23631e4
AC
351struct value *
352value_cast (struct type *type, struct value *arg2)
c906108c 353{
52f0bd74
AC
354 enum type_code code1;
355 enum type_code code2;
356 int scalar;
c906108c
SS
357 struct type *type2;
358
359 int convert_to_boolean = 0;
c5aa993b 360
df407dfe 361 if (value_type (arg2) == type)
c906108c
SS
362 return arg2;
363
6af87b03
AR
364 code1 = TYPE_CODE (check_typedef (type));
365
366 /* Check if we are casting struct reference to struct reference. */
367 if (code1 == TYPE_CODE_REF)
368 {
369 /* We dereference type; then we recurse and finally
581e13c1 370 we generate value of the given reference. Nothing wrong with
6af87b03
AR
371 that. */
372 struct type *t1 = check_typedef (type);
373 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
374 struct value *val = value_cast (dereftype, arg2);
a109c7c1 375
6af87b03
AR
376 return value_ref (val);
377 }
378
379 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
380
381 if (code2 == TYPE_CODE_REF)
382 /* We deref the value and then do the cast. */
383 return value_cast (type, coerce_ref (arg2));
384
c906108c
SS
385 CHECK_TYPEDEF (type);
386 code1 = TYPE_CODE (type);
994b9211 387 arg2 = coerce_ref (arg2);
df407dfe 388 type2 = check_typedef (value_type (arg2));
c906108c 389
fb933624
DJ
390 /* You can't cast to a reference type. See value_cast_pointers
391 instead. */
392 gdb_assert (code1 != TYPE_CODE_REF);
393
ac3eeb49
MS
394 /* A cast to an undetermined-length array_type, such as
395 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
396 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
397 if (code1 == TYPE_CODE_ARRAY)
398 {
399 struct type *element_type = TYPE_TARGET_TYPE (type);
400 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 401
d78df370 402 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
403 {
404 struct type *range_type = TYPE_INDEX_TYPE (type);
405 int val_length = TYPE_LENGTH (type2);
406 LONGEST low_bound, high_bound, new_length;
a109c7c1 407
c906108c
SS
408 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
409 low_bound = 0, high_bound = 0;
410 new_length = val_length / element_length;
411 if (val_length % element_length != 0)
3e43a32a
MS
412 warning (_("array element type size does not "
413 "divide object size in cast"));
ac3eeb49
MS
414 /* FIXME-type-allocation: need a way to free this type when
415 we are done with it. */
c906108c
SS
416 range_type = create_range_type ((struct type *) NULL,
417 TYPE_TARGET_TYPE (range_type),
418 low_bound,
419 new_length + low_bound - 1);
ac3eeb49
MS
420 deprecated_set_value_type (arg2,
421 create_array_type ((struct type *) NULL,
422 element_type,
423 range_type));
c906108c
SS
424 return arg2;
425 }
426 }
427
428 if (current_language->c_style_arrays
3bdf2bbd
KW
429 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
430 && !TYPE_VECTOR (type2))
c906108c
SS
431 arg2 = value_coerce_array (arg2);
432
433 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
434 arg2 = value_coerce_function (arg2);
435
df407dfe 436 type2 = check_typedef (value_type (arg2));
c906108c
SS
437 code2 = TYPE_CODE (type2);
438
439 if (code1 == TYPE_CODE_COMPLEX)
440 return cast_into_complex (type, arg2);
441 if (code1 == TYPE_CODE_BOOL)
442 {
443 code1 = TYPE_CODE_INT;
444 convert_to_boolean = 1;
445 }
446 if (code1 == TYPE_CODE_CHAR)
447 code1 = TYPE_CODE_INT;
448 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
449 code2 = TYPE_CODE_INT;
450
451 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
452 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
453 || code2 == TYPE_CODE_RANGE);
c906108c 454
6af87b03
AR
455 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
456 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 457 && TYPE_NAME (type) != 0)
694182d2
DJ
458 {
459 struct value *v = value_cast_structs (type, arg2);
a109c7c1 460
694182d2
DJ
461 if (v)
462 return v;
463 }
464
c906108c
SS
465 if (code1 == TYPE_CODE_FLT && scalar)
466 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
467 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
468 {
e17a4113 469 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
470 int dec_len = TYPE_LENGTH (type);
471 gdb_byte dec[16];
472
473 if (code2 == TYPE_CODE_FLT)
e17a4113 474 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
475 else if (code2 == TYPE_CODE_DECFLOAT)
476 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 477 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
478 else
479 /* The only option left is an integral type. */
e17a4113 480 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
481
482 return value_from_decfloat (type, dec);
483 }
c906108c
SS
484 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
485 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
486 && (scalar || code2 == TYPE_CODE_PTR
487 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
488 {
489 LONGEST longest;
c5aa993b 490
2bf1f4a1 491 /* When we cast pointers to integers, we mustn't use
76e71323 492 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
493 represents, as value_as_long would. GDB should evaluate
494 expressions just as the compiler would --- and the compiler
495 sees a cast as a simple reinterpretation of the pointer's
496 bits. */
497 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
498 longest = extract_unsigned_integer
499 (value_contents (arg2), TYPE_LENGTH (type2),
500 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
501 else
502 longest = value_as_long (arg2);
802db21b 503 return value_from_longest (type, convert_to_boolean ?
716c501e 504 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 505 }
ac3eeb49
MS
506 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
507 || code2 == TYPE_CODE_ENUM
508 || code2 == TYPE_CODE_RANGE))
634acd5f 509 {
4603e466
DT
510 /* TYPE_LENGTH (type) is the length of a pointer, but we really
511 want the length of an address! -- we are really dealing with
512 addresses (i.e., gdb representations) not pointers (i.e.,
513 target representations) here.
514
515 This allows things like "print *(int *)0x01000234" to work
516 without printing a misleading message -- which would
517 otherwise occur when dealing with a target having two byte
518 pointers and four byte addresses. */
519
50810684 520 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 521 LONGEST longest = value_as_long (arg2);
a109c7c1 522
4603e466 523 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 524 {
4603e466
DT
525 if (longest >= ((LONGEST) 1 << addr_bit)
526 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 527 warning (_("value truncated"));
634acd5f
AC
528 }
529 return value_from_longest (type, longest);
530 }
0d5de010
DJ
531 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
532 && value_as_long (arg2) == 0)
533 {
534 struct value *result = allocate_value (type);
a109c7c1 535
ad4820ab 536 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
537 return result;
538 }
539 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
540 && value_as_long (arg2) == 0)
541 {
542 /* The Itanium C++ ABI represents NULL pointers to members as
543 minus one, instead of biasing the normal case. */
544 return value_from_longest (type, -1);
545 }
8954db33
AB
546 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
547 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
548 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
549 error (_("Cannot convert between vector values of different sizes"));
550 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
551 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
552 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
553 else if (code1 == TYPE_CODE_VOID)
554 {
555 return value_zero (type, not_lval);
556 }
c906108c
SS
557 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
558 {
559 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 560 return value_cast_pointers (type, arg2, 0);
fb933624 561
0d5de010 562 arg2 = value_copy (arg2);
04624583 563 deprecated_set_value_type (arg2, type);
4dfea560 564 set_value_enclosing_type (arg2, type);
b44d461b 565 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
566 return arg2;
567 }
c906108c 568 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 569 return value_at_lazy (type, value_address (arg2));
c906108c
SS
570 else
571 {
8a3fe4f8 572 error (_("Invalid cast."));
c906108c
SS
573 return 0;
574 }
575}
576
4e8f195d
TT
577/* The C++ reinterpret_cast operator. */
578
579struct value *
580value_reinterpret_cast (struct type *type, struct value *arg)
581{
582 struct value *result;
583 struct type *real_type = check_typedef (type);
584 struct type *arg_type, *dest_type;
585 int is_ref = 0;
586 enum type_code dest_code, arg_code;
587
588 /* Do reference, function, and array conversion. */
589 arg = coerce_array (arg);
590
591 /* Attempt to preserve the type the user asked for. */
592 dest_type = type;
593
594 /* If we are casting to a reference type, transform
595 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
596 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
597 {
598 is_ref = 1;
599 arg = value_addr (arg);
600 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
601 real_type = lookup_pointer_type (real_type);
602 }
603
604 arg_type = value_type (arg);
605
606 dest_code = TYPE_CODE (real_type);
607 arg_code = TYPE_CODE (arg_type);
608
609 /* We can convert pointer types, or any pointer type to int, or int
610 type to pointer. */
611 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
612 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
613 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
614 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
615 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
616 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
617 || (dest_code == arg_code
618 && (dest_code == TYPE_CODE_PTR
619 || dest_code == TYPE_CODE_METHODPTR
620 || dest_code == TYPE_CODE_MEMBERPTR)))
621 result = value_cast (dest_type, arg);
622 else
623 error (_("Invalid reinterpret_cast"));
624
625 if (is_ref)
626 result = value_cast (type, value_ref (value_ind (result)));
627
628 return result;
629}
630
631/* A helper for value_dynamic_cast. This implements the first of two
632 runtime checks: we iterate over all the base classes of the value's
633 class which are equal to the desired class; if only one of these
634 holds the value, then it is the answer. */
635
636static int
637dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
638 const gdb_byte *valaddr,
639 int embedded_offset,
4e8f195d 640 CORE_ADDR address,
8af8e3bc 641 struct value *val,
4e8f195d
TT
642 struct type *search_type,
643 CORE_ADDR arg_addr,
644 struct type *arg_type,
645 struct value **result)
646{
647 int i, result_count = 0;
648
649 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
650 {
8af8e3bc
PA
651 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
652 address, val);
a109c7c1 653
4e8f195d
TT
654 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
655 {
8af8e3bc
PA
656 if (address + embedded_offset + offset >= arg_addr
657 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
658 {
659 ++result_count;
660 if (!*result)
661 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 662 address + embedded_offset + offset);
4e8f195d
TT
663 }
664 }
665 else
666 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
667 valaddr,
668 embedded_offset + offset,
669 address, val,
4e8f195d
TT
670 TYPE_BASECLASS (search_type, i),
671 arg_addr,
672 arg_type,
673 result);
674 }
675
676 return result_count;
677}
678
679/* A helper for value_dynamic_cast. This implements the second of two
680 runtime checks: we look for a unique public sibling class of the
681 argument's declared class. */
682
683static int
684dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
685 const gdb_byte *valaddr,
686 int embedded_offset,
4e8f195d 687 CORE_ADDR address,
8af8e3bc 688 struct value *val,
4e8f195d
TT
689 struct type *search_type,
690 struct value **result)
691{
692 int i, result_count = 0;
693
694 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
695 {
696 int offset;
697
698 if (! BASETYPE_VIA_PUBLIC (search_type, i))
699 continue;
700
8af8e3bc
PA
701 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
702 address, val);
4e8f195d
TT
703 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
704 {
705 ++result_count;
706 if (*result == NULL)
707 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 708 address + embedded_offset + offset);
4e8f195d
TT
709 }
710 else
711 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
712 valaddr,
713 embedded_offset + offset,
714 address, val,
4e8f195d
TT
715 TYPE_BASECLASS (search_type, i),
716 result);
717 }
718
719 return result_count;
720}
721
722/* The C++ dynamic_cast operator. */
723
724struct value *
725value_dynamic_cast (struct type *type, struct value *arg)
726{
8f78b329 727 int full, top, using_enc;
4e8f195d
TT
728 struct type *resolved_type = check_typedef (type);
729 struct type *arg_type = check_typedef (value_type (arg));
730 struct type *class_type, *rtti_type;
731 struct value *result, *tem, *original_arg = arg;
732 CORE_ADDR addr;
733 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
734
735 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
736 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
737 error (_("Argument to dynamic_cast must be a pointer or reference type"));
738 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
739 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
740 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
741
742 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
743 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
744 {
745 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
746 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
747 && value_as_long (arg) == 0))
748 error (_("Argument to dynamic_cast does not have pointer type"));
749 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
750 {
751 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
752 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
753 error (_("Argument to dynamic_cast does "
754 "not have pointer to class type"));
4e8f195d
TT
755 }
756
757 /* Handle NULL pointers. */
758 if (value_as_long (arg) == 0)
759 return value_zero (type, not_lval);
760
761 arg = value_ind (arg);
762 }
763 else
764 {
765 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
766 error (_("Argument to dynamic_cast does not have class type"));
767 }
768
769 /* If the classes are the same, just return the argument. */
770 if (class_types_same_p (class_type, arg_type))
771 return value_cast (type, arg);
772
773 /* If the target type is a unique base class of the argument's
774 declared type, just cast it. */
775 if (is_ancestor (class_type, arg_type))
776 {
777 if (is_unique_ancestor (class_type, arg))
778 return value_cast (type, original_arg);
779 error (_("Ambiguous dynamic_cast"));
780 }
781
782 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
783 if (! rtti_type)
784 error (_("Couldn't determine value's most derived type for dynamic_cast"));
785
786 /* Compute the most derived object's address. */
787 addr = value_address (arg);
788 if (full)
789 {
790 /* Done. */
791 }
792 else if (using_enc)
793 addr += top;
794 else
795 addr += top + value_embedded_offset (arg);
796
797 /* dynamic_cast<void *> means to return a pointer to the
798 most-derived object. */
799 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
800 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
801 return value_at_lazy (type, addr);
802
803 tem = value_at (type, addr);
804
805 /* The first dynamic check specified in 5.2.7. */
806 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
807 {
808 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
809 return tem;
810 result = NULL;
811 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
812 value_contents_for_printing (tem),
813 value_embedded_offset (tem),
814 value_address (tem), tem,
4e8f195d
TT
815 rtti_type, addr,
816 arg_type,
817 &result) == 1)
818 return value_cast (type,
819 is_ref ? value_ref (result) : value_addr (result));
820 }
821
822 /* The second dynamic check specified in 5.2.7. */
823 result = NULL;
824 if (is_public_ancestor (arg_type, rtti_type)
825 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
826 value_contents_for_printing (tem),
827 value_embedded_offset (tem),
828 value_address (tem), tem,
4e8f195d
TT
829 rtti_type, &result) == 1)
830 return value_cast (type,
831 is_ref ? value_ref (result) : value_addr (result));
832
833 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
834 return value_zero (type, not_lval);
835
836 error (_("dynamic_cast failed"));
837}
838
c906108c
SS
839/* Create a value of type TYPE that is zero, and return it. */
840
f23631e4 841struct value *
fba45db2 842value_zero (struct type *type, enum lval_type lv)
c906108c 843{
f23631e4 844 struct value *val = allocate_value (type);
c906108c 845
bb7da2bf 846 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
847 return val;
848}
849
18a46dbe 850/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
851
852struct value *
18a46dbe 853value_one (struct type *type)
301f0ecf
DE
854{
855 struct type *type1 = check_typedef (type);
4e608b4f 856 struct value *val;
301f0ecf
DE
857
858 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
859 {
e17a4113 860 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 861 gdb_byte v[16];
a109c7c1 862
e17a4113 863 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
864 val = value_from_decfloat (type, v);
865 }
866 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
867 {
868 val = value_from_double (type, (DOUBLEST) 1);
869 }
870 else if (is_integral_type (type1))
871 {
872 val = value_from_longest (type, (LONGEST) 1);
873 }
120bd360
KW
874 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
875 {
876 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
877 int i;
878 LONGEST low_bound, high_bound;
120bd360
KW
879 struct value *tmp;
880
cfa6f054
KW
881 if (!get_array_bounds (type1, &low_bound, &high_bound))
882 error (_("Could not determine the vector bounds"));
883
120bd360 884 val = allocate_value (type);
cfa6f054 885 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 886 {
18a46dbe 887 tmp = value_one (eltype);
120bd360
KW
888 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
889 value_contents_all (tmp), TYPE_LENGTH (eltype));
890 }
891 }
301f0ecf
DE
892 else
893 {
894 error (_("Not a numeric type."));
895 }
896
18a46dbe
JK
897 /* value_one result is never used for assignments to. */
898 gdb_assert (VALUE_LVAL (val) == not_lval);
899
301f0ecf
DE
900 return val;
901}
902
4e5d721f
DE
903/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack. */
904
905static struct value *
906get_value_at (struct type *type, CORE_ADDR addr, int lazy)
907{
908 struct value *val;
909
910 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
911 error (_("Attempt to dereference a generic pointer."));
912
a3d34bf4 913 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 914
a3d34bf4
PA
915 if (!lazy)
916 value_fetch_lazy (val);
4e5d721f
DE
917
918 return val;
919}
920
070ad9f0 921/* Return a value with type TYPE located at ADDR.
c906108c
SS
922
923 Call value_at only if the data needs to be fetched immediately;
924 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
925 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 926 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 927 is tested in the value_contents macro, which is used if and when
070ad9f0 928 the contents are actually required.
c906108c
SS
929
930 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 931 adjustments before or after calling it. */
c906108c 932
f23631e4 933struct value *
00a4c844 934value_at (struct type *type, CORE_ADDR addr)
c906108c 935{
4e5d721f 936 return get_value_at (type, addr, 0);
c906108c
SS
937}
938
939/* Return a lazy value with type TYPE located at ADDR (cf. value_at). */
940
f23631e4 941struct value *
00a4c844 942value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 943{
4e5d721f 944 return get_value_at (type, addr, 1);
c906108c
SS
945}
946
e6ca34fc
PA
947void
948read_value_memory (struct value *val, int embedded_offset,
949 int stack, CORE_ADDR memaddr,
950 gdb_byte *buffer, size_t length)
951{
5a2eb0ef
YQ
952 ULONGEST xfered = 0;
953
954 while (xfered < length)
955 {
956 enum target_xfer_status status;
957 ULONGEST xfered_len;
958
959 status = target_xfer_partial (current_target.beneath,
960 TARGET_OBJECT_MEMORY, NULL,
961 buffer + xfered, NULL,
962 memaddr + xfered, length - xfered,
963 &xfered_len);
964
965 if (status == TARGET_XFER_OK)
966 /* nothing */;
967 else if (status == TARGET_XFER_E_UNAVAILABLE)
968 mark_value_bytes_unavailable (val, embedded_offset + xfered,
969 xfered_len);
970 else if (status == TARGET_XFER_EOF)
971 memory_error (TARGET_XFER_E_IO, memaddr + xfered);
e6ca34fc 972 else
5a2eb0ef 973 memory_error (status, memaddr + xfered);
e6ca34fc 974
5a2eb0ef
YQ
975 xfered += xfered_len;
976 QUIT;
e6ca34fc
PA
977 }
978}
c906108c
SS
979
980/* Store the contents of FROMVAL into the location of TOVAL.
981 Return a new value with the location of TOVAL and contents of FROMVAL. */
982
f23631e4
AC
983struct value *
984value_assign (struct value *toval, struct value *fromval)
c906108c 985{
52f0bd74 986 struct type *type;
f23631e4 987 struct value *val;
cb741690 988 struct frame_id old_frame;
c906108c 989
88e3b34b 990 if (!deprecated_value_modifiable (toval))
8a3fe4f8 991 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 992
994b9211 993 toval = coerce_ref (toval);
c906108c 994
df407dfe 995 type = value_type (toval);
c906108c 996 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 997 fromval = value_cast (type, fromval);
c906108c 998 else
63092375
DJ
999 {
1000 /* Coerce arrays and functions to pointers, except for arrays
1001 which only live in GDB's storage. */
1002 if (!value_must_coerce_to_target (fromval))
1003 fromval = coerce_array (fromval);
1004 }
1005
c906108c
SS
1006 CHECK_TYPEDEF (type);
1007
ac3eeb49
MS
1008 /* Since modifying a register can trash the frame chain, and
1009 modifying memory can trash the frame cache, we save the old frame
1010 and then restore the new frame afterwards. */
206415a3 1011 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1012
c906108c
SS
1013 switch (VALUE_LVAL (toval))
1014 {
1015 case lval_internalvar:
1016 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1017 return value_of_internalvar (get_type_arch (type),
1018 VALUE_INTERNALVAR (toval));
c906108c
SS
1019
1020 case lval_internalvar_component:
d9e98382
SDJ
1021 {
1022 int offset = value_offset (toval);
1023
1024 /* Are we dealing with a bitfield?
1025
1026 It is important to mention that `value_parent (toval)' is
1027 non-NULL iff `value_bitsize (toval)' is non-zero. */
1028 if (value_bitsize (toval))
1029 {
1030 /* VALUE_INTERNALVAR below refers to the parent value, while
1031 the offset is relative to this parent value. */
1032 gdb_assert (value_parent (value_parent (toval)) == NULL);
1033 offset += value_offset (value_parent (toval));
1034 }
1035
1036 set_internalvar_component (VALUE_INTERNALVAR (toval),
1037 offset,
1038 value_bitpos (toval),
1039 value_bitsize (toval),
1040 fromval);
1041 }
c906108c
SS
1042 break;
1043
1044 case lval_memory:
1045 {
fc1a4b47 1046 const gdb_byte *dest_buffer;
c5aa993b
JM
1047 CORE_ADDR changed_addr;
1048 int changed_len;
10c42a71 1049 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1050
df407dfe 1051 if (value_bitsize (toval))
c5aa993b 1052 {
2d88202a 1053 struct value *parent = value_parent (toval);
2d88202a 1054
a109c7c1 1055 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1056 changed_len = (value_bitpos (toval)
1057 + value_bitsize (toval)
c5aa993b
JM
1058 + HOST_CHAR_BIT - 1)
1059 / HOST_CHAR_BIT;
c906108c 1060
4ea48cc1
DJ
1061 /* If we can read-modify-write exactly the size of the
1062 containing type (e.g. short or int) then do so. This
1063 is safer for volatile bitfields mapped to hardware
1064 registers. */
1065 if (changed_len < TYPE_LENGTH (type)
1066 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1067 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1068 changed_len = TYPE_LENGTH (type);
1069
c906108c 1070 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1071 error (_("Can't handle bitfields which "
1072 "don't fit in a %d bit word."),
baa6f10b 1073 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1074
2d88202a 1075 read_memory (changed_addr, buffer, changed_len);
50810684 1076 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1077 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1078 dest_buffer = buffer;
1079 }
c906108c
SS
1080 else
1081 {
42ae5230 1082 changed_addr = value_address (toval);
c906108c 1083 changed_len = TYPE_LENGTH (type);
0fd88904 1084 dest_buffer = value_contents (fromval);
c906108c
SS
1085 }
1086
972daa01 1087 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1088 }
1089 break;
1090
492254e9 1091 case lval_register:
c906108c 1092 {
c906108c 1093 struct frame_info *frame;
d80b854b 1094 struct gdbarch *gdbarch;
ff2e87ac 1095 int value_reg;
c906108c
SS
1096
1097 /* Figure out which frame this is in currently. */
0c16dd26
AC
1098 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1099 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1100
1101 if (!frame)
8a3fe4f8 1102 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1103
1104 gdbarch = get_frame_arch (frame);
1105 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1106 {
ff2e87ac 1107 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1108 conversion of program values to a special raw
1109 format. */
d80b854b 1110 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1111 VALUE_REGNUM (toval), type,
1112 value_contents (fromval));
492254e9 1113 }
c906108c 1114 else
492254e9 1115 {
df407dfe 1116 if (value_bitsize (toval))
00fa51f6 1117 {
2d88202a
UW
1118 struct value *parent = value_parent (toval);
1119 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1120 int changed_len;
1121 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1122 int optim, unavail;
00fa51f6
UW
1123
1124 changed_len = (value_bitpos (toval)
1125 + value_bitsize (toval)
1126 + HOST_CHAR_BIT - 1)
1127 / HOST_CHAR_BIT;
1128
1129 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1130 error (_("Can't handle bitfields which "
1131 "don't fit in a %d bit word."),
00fa51f6
UW
1132 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1133
8dccd430
PA
1134 if (!get_frame_register_bytes (frame, value_reg, offset,
1135 changed_len, buffer,
1136 &optim, &unavail))
1137 {
1138 if (optim)
710409a2
PA
1139 throw_error (OPTIMIZED_OUT_ERROR,
1140 _("value has been optimized out"));
8dccd430
PA
1141 if (unavail)
1142 throw_error (NOT_AVAILABLE_ERROR,
1143 _("value is not available"));
1144 }
00fa51f6 1145
50810684
UW
1146 modify_field (type, buffer, value_as_long (fromval),
1147 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1148
2d88202a 1149 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1150 changed_len, buffer);
1151 }
c906108c 1152 else
00fa51f6
UW
1153 {
1154 put_frame_register_bytes (frame, value_reg,
1155 value_offset (toval),
1156 TYPE_LENGTH (type),
1157 value_contents (fromval));
1158 }
ff2e87ac 1159 }
00fa51f6 1160
9a4105ab
AC
1161 if (deprecated_register_changed_hook)
1162 deprecated_register_changed_hook (-1);
ff2e87ac 1163 break;
c906108c 1164 }
5f5233d4
PA
1165
1166 case lval_computed:
1167 {
c8f2448a 1168 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1169
ac71a68c
JK
1170 if (funcs->write != NULL)
1171 {
1172 funcs->write (toval, fromval);
1173 break;
1174 }
5f5233d4 1175 }
ac71a68c 1176 /* Fall through. */
5f5233d4 1177
c906108c 1178 default:
8a3fe4f8 1179 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1180 }
1181
cb741690
DJ
1182 /* Assigning to the stack pointer, frame pointer, and other
1183 (architecture and calling convention specific) registers may
d649a38e 1184 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1185 also can. We just do this on all assignments to registers or
1186 memory, for simplicity's sake; I doubt the slowdown matters. */
1187 switch (VALUE_LVAL (toval))
1188 {
1189 case lval_memory:
1190 case lval_register:
0e03807e 1191 case lval_computed:
cb741690 1192
d649a38e 1193 observer_notify_target_changed (&current_target);
cb741690 1194
ac3eeb49
MS
1195 /* Having destroyed the frame cache, restore the selected
1196 frame. */
cb741690
DJ
1197
1198 /* FIXME: cagney/2002-11-02: There has to be a better way of
1199 doing this. Instead of constantly saving/restoring the
1200 frame. Why not create a get_selected_frame() function that,
1201 having saved the selected frame's ID can automatically
1202 re-find the previously selected frame automatically. */
1203
1204 {
1205 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1206
cb741690
DJ
1207 if (fi != NULL)
1208 select_frame (fi);
1209 }
1210
1211 break;
1212 default:
1213 break;
1214 }
1215
ac3eeb49
MS
1216 /* If the field does not entirely fill a LONGEST, then zero the sign
1217 bits. If the field is signed, and is negative, then sign
1218 extend. */
df407dfe
AC
1219 if ((value_bitsize (toval) > 0)
1220 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1221 {
1222 LONGEST fieldval = value_as_long (fromval);
df407dfe 1223 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1224
1225 fieldval &= valmask;
ac3eeb49
MS
1226 if (!TYPE_UNSIGNED (type)
1227 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1228 fieldval |= ~valmask;
1229
1230 fromval = value_from_longest (type, fieldval);
1231 }
1232
4aac0db7
UW
1233 /* The return value is a copy of TOVAL so it shares its location
1234 information, but its contents are updated from FROMVAL. This
1235 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1236 val = value_copy (toval);
4aac0db7 1237 set_value_lazy (val, 0);
0fd88904 1238 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1239 TYPE_LENGTH (type));
4aac0db7
UW
1240
1241 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1242 in the case of pointer types. For object types, the enclosing type
1243 and embedded offset must *not* be copied: the target object refered
1244 to by TOVAL retains its original dynamic type after assignment. */
1245 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1246 {
1247 set_value_enclosing_type (val, value_enclosing_type (fromval));
1248 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1249 }
c5aa993b 1250
c906108c
SS
1251 return val;
1252}
1253
1254/* Extend a value VAL to COUNT repetitions of its type. */
1255
f23631e4
AC
1256struct value *
1257value_repeat (struct value *arg1, int count)
c906108c 1258{
f23631e4 1259 struct value *val;
c906108c
SS
1260
1261 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1262 error (_("Only values in memory can be extended with '@'."));
c906108c 1263 if (count < 1)
8a3fe4f8 1264 error (_("Invalid number %d of repetitions."), count);
c906108c 1265
4754a64e 1266 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1267
c906108c 1268 VALUE_LVAL (val) = lval_memory;
42ae5230 1269 set_value_address (val, value_address (arg1));
c906108c 1270
24e6bcee
PA
1271 read_value_memory (val, 0, value_stack (val), value_address (val),
1272 value_contents_all_raw (val),
1273 TYPE_LENGTH (value_enclosing_type (val)));
1274
c906108c
SS
1275 return val;
1276}
1277
f23631e4 1278struct value *
9df2fbc4 1279value_of_variable (struct symbol *var, const struct block *b)
c906108c 1280{
61212c0f 1281 struct frame_info *frame;
c906108c 1282
61212c0f
UW
1283 if (!symbol_read_needs_frame (var))
1284 frame = NULL;
1285 else if (!b)
1286 frame = get_selected_frame (_("No frame selected."));
1287 else
c906108c
SS
1288 {
1289 frame = block_innermost_frame (b);
1290 if (!frame)
c5aa993b 1291 {
edb3359d 1292 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1293 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1294 error (_("No frame is currently executing in block %s."),
de5ad195 1295 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1296 else
8a3fe4f8 1297 error (_("No frame is currently executing in specified block"));
c5aa993b 1298 }
c906108c
SS
1299 }
1300
8afd712c 1301 return read_var_value (var, frame);
c906108c
SS
1302}
1303
61212c0f 1304struct value *
270140bd 1305address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1306{
1307 struct type *type = SYMBOL_TYPE (var);
1308 struct value *val;
1309
1310 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1311 Lazy evaluation pays off here. */
61212c0f
UW
1312
1313 val = value_of_variable (var, b);
1314
1315 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1316 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1317 {
42ae5230 1318 CORE_ADDR addr = value_address (val);
a109c7c1 1319
61212c0f
UW
1320 return value_from_pointer (lookup_pointer_type (type), addr);
1321 }
1322
1323 /* Not a memory address; check what the problem was. */
1324 switch (VALUE_LVAL (val))
1325 {
1326 case lval_register:
1327 {
1328 struct frame_info *frame;
1329 const char *regname;
1330
1331 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1332 gdb_assert (frame);
1333
1334 regname = gdbarch_register_name (get_frame_arch (frame),
1335 VALUE_REGNUM (val));
1336 gdb_assert (regname && *regname);
1337
1338 error (_("Address requested for identifier "
1339 "\"%s\" which is in register $%s"),
1340 SYMBOL_PRINT_NAME (var), regname);
1341 break;
1342 }
1343
1344 default:
1345 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1346 SYMBOL_PRINT_NAME (var));
1347 break;
1348 }
1349
1350 return val;
1351}
1352
63092375
DJ
1353/* Return one if VAL does not live in target memory, but should in order
1354 to operate on it. Otherwise return zero. */
1355
1356int
1357value_must_coerce_to_target (struct value *val)
1358{
1359 struct type *valtype;
1360
1361 /* The only lval kinds which do not live in target memory. */
1362 if (VALUE_LVAL (val) != not_lval
1363 && VALUE_LVAL (val) != lval_internalvar)
1364 return 0;
1365
1366 valtype = check_typedef (value_type (val));
1367
1368 switch (TYPE_CODE (valtype))
1369 {
1370 case TYPE_CODE_ARRAY:
3cbaedff 1371 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1372 case TYPE_CODE_STRING:
1373 return 1;
1374 default:
1375 return 0;
1376 }
1377}
1378
3e43a32a
MS
1379/* Make sure that VAL lives in target memory if it's supposed to. For
1380 instance, strings are constructed as character arrays in GDB's
1381 storage, and this function copies them to the target. */
63092375
DJ
1382
1383struct value *
1384value_coerce_to_target (struct value *val)
1385{
1386 LONGEST length;
1387 CORE_ADDR addr;
1388
1389 if (!value_must_coerce_to_target (val))
1390 return val;
1391
1392 length = TYPE_LENGTH (check_typedef (value_type (val)));
1393 addr = allocate_space_in_inferior (length);
1394 write_memory (addr, value_contents (val), length);
1395 return value_at_lazy (value_type (val), addr);
1396}
1397
ac3eeb49
MS
1398/* Given a value which is an array, return a value which is a pointer
1399 to its first element, regardless of whether or not the array has a
1400 nonzero lower bound.
c906108c 1401
ac3eeb49
MS
1402 FIXME: A previous comment here indicated that this routine should
1403 be substracting the array's lower bound. It's not clear to me that
1404 this is correct. Given an array subscripting operation, it would
1405 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1406
1407 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1408
ac3eeb49
MS
1409 However I believe a more appropriate and logical place to account
1410 for the lower bound is to do so in value_subscript, essentially
1411 computing:
c906108c
SS
1412
1413 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1414
ac3eeb49
MS
1415 As further evidence consider what would happen with operations
1416 other than array subscripting, where the caller would get back a
1417 value that had an address somewhere before the actual first element
1418 of the array, and the information about the lower bound would be
581e13c1 1419 lost because of the coercion to pointer type. */
c906108c 1420
f23631e4
AC
1421struct value *
1422value_coerce_array (struct value *arg1)
c906108c 1423{
df407dfe 1424 struct type *type = check_typedef (value_type (arg1));
c906108c 1425
63092375
DJ
1426 /* If the user tries to do something requiring a pointer with an
1427 array that has not yet been pushed to the target, then this would
1428 be a good time to do so. */
1429 arg1 = value_coerce_to_target (arg1);
1430
c906108c 1431 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1432 error (_("Attempt to take address of value not located in memory."));
c906108c 1433
4478b372 1434 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1435 value_address (arg1));
c906108c
SS
1436}
1437
1438/* Given a value which is a function, return a value which is a pointer
1439 to it. */
1440
f23631e4
AC
1441struct value *
1442value_coerce_function (struct value *arg1)
c906108c 1443{
f23631e4 1444 struct value *retval;
c906108c
SS
1445
1446 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1447 error (_("Attempt to take address of value not located in memory."));
c906108c 1448
df407dfe 1449 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1450 value_address (arg1));
c906108c 1451 return retval;
c5aa993b 1452}
c906108c 1453
ac3eeb49
MS
1454/* Return a pointer value for the object for which ARG1 is the
1455 contents. */
c906108c 1456
f23631e4
AC
1457struct value *
1458value_addr (struct value *arg1)
c906108c 1459{
f23631e4 1460 struct value *arg2;
df407dfe 1461 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1462
c906108c
SS
1463 if (TYPE_CODE (type) == TYPE_CODE_REF)
1464 {
ac3eeb49
MS
1465 /* Copy the value, but change the type from (T&) to (T*). We
1466 keep the same location information, which is efficient, and
1467 allows &(&X) to get the location containing the reference. */
c906108c 1468 arg2 = value_copy (arg1);
ac3eeb49
MS
1469 deprecated_set_value_type (arg2,
1470 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1471 return arg2;
1472 }
1473 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1474 return value_coerce_function (arg1);
1475
63092375
DJ
1476 /* If this is an array that has not yet been pushed to the target,
1477 then this would be a good time to force it to memory. */
1478 arg1 = value_coerce_to_target (arg1);
1479
c906108c 1480 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1481 error (_("Attempt to take address of value not located in memory."));
c906108c 1482
581e13c1 1483 /* Get target memory address. */
df407dfe 1484 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1485 (value_address (arg1)
13c3b5f5 1486 + value_embedded_offset (arg1)));
c906108c
SS
1487
1488 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1489 full derived object's type ... */
4dfea560
DE
1490 set_value_enclosing_type (arg2,
1491 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1492 /* ... and also the relative position of the subobject in the full
1493 object. */
b44d461b 1494 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1495 return arg2;
1496}
1497
ac3eeb49
MS
1498/* Return a reference value for the object for which ARG1 is the
1499 contents. */
fb933624
DJ
1500
1501struct value *
1502value_ref (struct value *arg1)
1503{
1504 struct value *arg2;
fb933624 1505 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1506
fb933624
DJ
1507 if (TYPE_CODE (type) == TYPE_CODE_REF)
1508 return arg1;
1509
1510 arg2 = value_addr (arg1);
1511 deprecated_set_value_type (arg2, lookup_reference_type (type));
1512 return arg2;
1513}
1514
ac3eeb49
MS
1515/* Given a value of a pointer type, apply the C unary * operator to
1516 it. */
c906108c 1517
f23631e4
AC
1518struct value *
1519value_ind (struct value *arg1)
c906108c
SS
1520{
1521 struct type *base_type;
f23631e4 1522 struct value *arg2;
c906108c 1523
994b9211 1524 arg1 = coerce_array (arg1);
c906108c 1525
df407dfe 1526 base_type = check_typedef (value_type (arg1));
c906108c 1527
8cf6f0b1
TT
1528 if (VALUE_LVAL (arg1) == lval_computed)
1529 {
c8f2448a 1530 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1531
1532 if (funcs->indirect)
1533 {
1534 struct value *result = funcs->indirect (arg1);
1535
1536 if (result)
1537 return result;
1538 }
1539 }
1540
22fe0fbb 1541 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1542 {
1543 struct type *enc_type;
a109c7c1 1544
ac3eeb49
MS
1545 /* We may be pointing to something embedded in a larger object.
1546 Get the real type of the enclosing object. */
4754a64e 1547 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1548 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1549
1550 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1551 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1552 /* For functions, go through find_function_addr, which knows
1553 how to handle function descriptors. */
ac3eeb49
MS
1554 arg2 = value_at_lazy (enc_type,
1555 find_function_addr (arg1, NULL));
0d5de010 1556 else
581e13c1 1557 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1558 arg2 = value_at_lazy (enc_type,
1559 (value_as_address (arg1)
1560 - value_pointed_to_offset (arg1)));
0d5de010 1561
dfcee124 1562 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1563 }
1564
8a3fe4f8 1565 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1566 return 0; /* For lint -- never reached. */
c906108c
SS
1567}
1568\f
39d37385
PA
1569/* Create a value for an array by allocating space in GDB, copying the
1570 data into that space, and then setting up an array value.
c906108c 1571
ac3eeb49
MS
1572 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1573 is populated from the values passed in ELEMVEC.
c906108c
SS
1574
1575 The element type of the array is inherited from the type of the
1576 first element, and all elements must have the same size (though we
ac3eeb49 1577 don't currently enforce any restriction on their types). */
c906108c 1578
f23631e4
AC
1579struct value *
1580value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1581{
1582 int nelem;
1583 int idx;
1584 unsigned int typelength;
f23631e4 1585 struct value *val;
c906108c 1586 struct type *arraytype;
c906108c 1587
ac3eeb49
MS
1588 /* Validate that the bounds are reasonable and that each of the
1589 elements have the same size. */
c906108c
SS
1590
1591 nelem = highbound - lowbound + 1;
1592 if (nelem <= 0)
1593 {
8a3fe4f8 1594 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1595 }
4754a64e 1596 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1597 for (idx = 1; idx < nelem; idx++)
1598 {
4754a64e 1599 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1600 {
8a3fe4f8 1601 error (_("array elements must all be the same size"));
c906108c
SS
1602 }
1603 }
1604
e3506a9f
UW
1605 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1606 lowbound, highbound);
c906108c
SS
1607
1608 if (!current_language->c_style_arrays)
1609 {
1610 val = allocate_value (arraytype);
1611 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1612 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1613 typelength);
c906108c
SS
1614 return val;
1615 }
1616
63092375
DJ
1617 /* Allocate space to store the array, and then initialize it by
1618 copying in each element. */
c906108c 1619
63092375 1620 val = allocate_value (arraytype);
c906108c 1621 for (idx = 0; idx < nelem; idx++)
39d37385 1622 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1623 return val;
c906108c
SS
1624}
1625
6c7a06a3 1626struct value *
63375b74 1627value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1628{
1629 struct value *val;
1630 int lowbound = current_language->string_lower_bound;
63375b74 1631 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1632 struct type *stringtype
e3506a9f 1633 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1634
1635 val = allocate_value (stringtype);
1636 memcpy (value_contents_raw (val), ptr, len);
1637 return val;
1638}
1639
ac3eeb49
MS
1640/* Create a value for a string constant by allocating space in the
1641 inferior, copying the data into that space, and returning the
1642 address with type TYPE_CODE_STRING. PTR points to the string
1643 constant data; LEN is number of characters.
1644
1645 Note that string types are like array of char types with a lower
1646 bound of zero and an upper bound of LEN - 1. Also note that the
1647 string may contain embedded null bytes. */
c906108c 1648
f23631e4 1649struct value *
63375b74 1650value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1651{
f23631e4 1652 struct value *val;
c906108c 1653 int lowbound = current_language->string_lower_bound;
63375b74 1654 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1655 struct type *stringtype
e3506a9f 1656 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1657
3b7538c0
UW
1658 val = allocate_value (stringtype);
1659 memcpy (value_contents_raw (val), ptr, len);
1660 return val;
c906108c
SS
1661}
1662
c906108c 1663\f
ac3eeb49
MS
1664/* See if we can pass arguments in T2 to a function which takes
1665 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1666 a NULL-terminated vector. If some arguments need coercion of some
1667 sort, then the coerced values are written into T2. Return value is
1668 0 if the arguments could be matched, or the position at which they
1669 differ if not.
c906108c 1670
ac3eeb49
MS
1671 STATICP is nonzero if the T1 argument list came from a static
1672 member function. T2 will still include the ``this'' pointer, but
1673 it will be skipped.
c906108c
SS
1674
1675 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1676 which is the type of the instance variable. This is because we
1677 want to handle calls with objects from derived classes. This is
1678 not entirely correct: we should actually check to make sure that a
c906108c
SS
1679 requested operation is type secure, shouldn't we? FIXME. */
1680
1681static int
ad2f7632
DJ
1682typecmp (int staticp, int varargs, int nargs,
1683 struct field t1[], struct value *t2[])
c906108c
SS
1684{
1685 int i;
1686
1687 if (t2 == 0)
ac3eeb49
MS
1688 internal_error (__FILE__, __LINE__,
1689 _("typecmp: no argument list"));
ad2f7632 1690
ac3eeb49
MS
1691 /* Skip ``this'' argument if applicable. T2 will always include
1692 THIS. */
4a1970e4 1693 if (staticp)
ad2f7632
DJ
1694 t2 ++;
1695
1696 for (i = 0;
1697 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1698 i++)
c906108c 1699 {
c5aa993b 1700 struct type *tt1, *tt2;
ad2f7632 1701
c5aa993b
JM
1702 if (!t2[i])
1703 return i + 1;
ad2f7632
DJ
1704
1705 tt1 = check_typedef (t1[i].type);
df407dfe 1706 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1707
c906108c 1708 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1709 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1710 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1711 == TYPE_CODE (tt2)))
c906108c
SS
1712 {
1713 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1714 t2[i] = value_coerce_array (t2[i]);
1715 else
fb933624 1716 t2[i] = value_ref (t2[i]);
c906108c
SS
1717 continue;
1718 }
1719
802db21b
DB
1720 /* djb - 20000715 - Until the new type structure is in the
1721 place, and we can attempt things like implicit conversions,
1722 we need to do this so you can take something like a map<const
1723 char *>, and properly access map["hello"], because the
1724 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1725 and the argument will be a pointer to a char. */
1726 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1727 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1728 {
1729 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1730 }
ac3eeb49
MS
1731 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1732 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1733 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1734 {
ac3eeb49 1735 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1736 }
c5aa993b
JM
1737 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1738 continue;
ac3eeb49
MS
1739 /* Array to pointer is a `trivial conversion' according to the
1740 ARM. */
c906108c 1741
ac3eeb49
MS
1742 /* We should be doing much hairier argument matching (see
1743 section 13.2 of the ARM), but as a quick kludge, just check
1744 for the same type code. */
df407dfe 1745 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1746 return i + 1;
c906108c 1747 }
ad2f7632 1748 if (varargs || t2[i] == NULL)
c5aa993b 1749 return 0;
ad2f7632 1750 return i + 1;
c906108c
SS
1751}
1752
b1af9e97
TT
1753/* Helper class for do_search_struct_field that updates *RESULT_PTR
1754 and *LAST_BOFFSET, and possibly throws an exception if the field
1755 search has yielded ambiguous results. */
c906108c 1756
b1af9e97
TT
1757static void
1758update_search_result (struct value **result_ptr, struct value *v,
1759 int *last_boffset, int boffset,
1760 const char *name, struct type *type)
1761{
1762 if (v != NULL)
1763 {
1764 if (*result_ptr != NULL
1765 /* The result is not ambiguous if all the classes that are
1766 found occupy the same space. */
1767 && *last_boffset != boffset)
1768 error (_("base class '%s' is ambiguous in type '%s'"),
1769 name, TYPE_SAFE_NAME (type));
1770 *result_ptr = v;
1771 *last_boffset = boffset;
1772 }
1773}
c906108c 1774
b1af9e97
TT
1775/* A helper for search_struct_field. This does all the work; most
1776 arguments are as passed to search_struct_field. The result is
1777 stored in *RESULT_PTR, which must be initialized to NULL.
1778 OUTERMOST_TYPE is the type of the initial type passed to
1779 search_struct_field; this is used for error reporting when the
1780 lookup is ambiguous. */
1781
1782static void
1783do_search_struct_field (const char *name, struct value *arg1, int offset,
1784 struct type *type, int looking_for_baseclass,
1785 struct value **result_ptr,
1786 int *last_boffset,
1787 struct type *outermost_type)
c906108c
SS
1788{
1789 int i;
edf3d5f3 1790 int nbases;
c906108c
SS
1791
1792 CHECK_TYPEDEF (type);
edf3d5f3 1793 nbases = TYPE_N_BASECLASSES (type);
c906108c 1794
c5aa993b 1795 if (!looking_for_baseclass)
c906108c
SS
1796 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1797 {
0d5cff50 1798 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1799
db577aea 1800 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1801 {
f23631e4 1802 struct value *v;
a109c7c1 1803
d6a843b5 1804 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1805 v = value_static_field (type, i);
c906108c 1806 else
b1af9e97
TT
1807 v = value_primitive_field (arg1, offset, i, type);
1808 *result_ptr = v;
1809 return;
c906108c
SS
1810 }
1811
1812 if (t_field_name
1813 && (t_field_name[0] == '\0'
1814 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 1815 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
1816 {
1817 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1818
c906108c
SS
1819 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1820 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1821 {
ac3eeb49
MS
1822 /* Look for a match through the fields of an anonymous
1823 union, or anonymous struct. C++ provides anonymous
1824 unions.
c906108c 1825
1b831c93
AC
1826 In the GNU Chill (now deleted from GDB)
1827 implementation of variant record types, each
1828 <alternative field> has an (anonymous) union type,
1829 each member of the union represents a <variant
1830 alternative>. Each <variant alternative> is
1831 represented as a struct, with a member for each
1832 <variant field>. */
c5aa993b 1833
b1af9e97 1834 struct value *v = NULL;
c906108c
SS
1835 int new_offset = offset;
1836
db034ac5
AC
1837 /* This is pretty gross. In G++, the offset in an
1838 anonymous union is relative to the beginning of the
1b831c93
AC
1839 enclosing struct. In the GNU Chill (now deleted
1840 from GDB) implementation of variant records, the
1841 bitpos is zero in an anonymous union field, so we
ac3eeb49 1842 have to add the offset of the union here. */
c906108c
SS
1843 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1844 || (TYPE_NFIELDS (field_type) > 0
1845 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1846 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1847
b1af9e97
TT
1848 do_search_struct_field (name, arg1, new_offset,
1849 field_type,
1850 looking_for_baseclass, &v,
1851 last_boffset,
1852 outermost_type);
c906108c 1853 if (v)
b1af9e97
TT
1854 {
1855 *result_ptr = v;
1856 return;
1857 }
c906108c
SS
1858 }
1859 }
1860 }
1861
c5aa993b 1862 for (i = 0; i < nbases; i++)
c906108c 1863 {
b1af9e97 1864 struct value *v = NULL;
c906108c 1865 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1866 /* If we are looking for baseclasses, this is what we get when
1867 we hit them. But it could happen that the base part's member
1868 name is not yet filled in. */
c906108c
SS
1869 int found_baseclass = (looking_for_baseclass
1870 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1871 && (strcmp_iw (name,
1872 TYPE_BASECLASS_NAME (type,
1873 i)) == 0));
b1af9e97 1874 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1875
1876 if (BASETYPE_VIA_VIRTUAL (type, i))
1877 {
3e3d7139 1878 struct value *v2;
c906108c
SS
1879
1880 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1881 value_contents_for_printing (arg1),
1882 value_embedded_offset (arg1) + offset,
1883 value_address (arg1),
1884 arg1);
c906108c 1885
ac3eeb49 1886 /* The virtual base class pointer might have been clobbered
581e13c1 1887 by the user program. Make sure that it still points to a
ac3eeb49 1888 valid memory location. */
c906108c 1889
1a334831
TT
1890 boffset += value_embedded_offset (arg1) + offset;
1891 if (boffset < 0
1892 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1893 {
1894 CORE_ADDR base_addr;
c5aa993b 1895
42ae5230 1896 base_addr = value_address (arg1) + boffset;
08039c9e 1897 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1898 if (target_read_memory (base_addr,
1899 value_contents_raw (v2),
acc900c2 1900 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1901 error (_("virtual baseclass botch"));
c906108c
SS
1902 }
1903 else
1904 {
1a334831
TT
1905 v2 = value_copy (arg1);
1906 deprecated_set_value_type (v2, basetype);
1907 set_value_embedded_offset (v2, boffset);
c906108c
SS
1908 }
1909
1910 if (found_baseclass)
b1af9e97
TT
1911 v = v2;
1912 else
1913 {
1914 do_search_struct_field (name, v2, 0,
1915 TYPE_BASECLASS (type, i),
1916 looking_for_baseclass,
1917 result_ptr, last_boffset,
1918 outermost_type);
1919 }
c906108c
SS
1920 }
1921 else if (found_baseclass)
1922 v = value_primitive_field (arg1, offset, i, type);
1923 else
b1af9e97
TT
1924 {
1925 do_search_struct_field (name, arg1,
1926 offset + TYPE_BASECLASS_BITPOS (type,
1927 i) / 8,
1928 basetype, looking_for_baseclass,
1929 result_ptr, last_boffset,
1930 outermost_type);
1931 }
1932
1933 update_search_result (result_ptr, v, last_boffset,
1934 boffset, name, outermost_type);
c906108c 1935 }
b1af9e97
TT
1936}
1937
1938/* Helper function used by value_struct_elt to recurse through
1939 baseclasses. Look for a field NAME in ARG1. Adjust the address of
1940 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1941 TYPE. If found, return value, else return NULL.
1942
1943 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1944 fields, look for a baseclass named NAME. */
1945
1946static struct value *
1947search_struct_field (const char *name, struct value *arg1, int offset,
1948 struct type *type, int looking_for_baseclass)
1949{
1950 struct value *result = NULL;
1951 int boffset = 0;
1952
1953 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
1954 &result, &boffset, type);
1955 return result;
c906108c
SS
1956}
1957
ac3eeb49 1958/* Helper function used by value_struct_elt to recurse through
581e13c1 1959 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1960 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1961 TYPE.
1962
1963 If found, return value, else if name matched and args not return
1964 (value) -1, else return NULL. */
c906108c 1965
f23631e4 1966static struct value *
714f19d5 1967search_struct_method (const char *name, struct value **arg1p,
f23631e4 1968 struct value **args, int offset,
aa1ee363 1969 int *static_memfuncp, struct type *type)
c906108c
SS
1970{
1971 int i;
f23631e4 1972 struct value *v;
c906108c
SS
1973 int name_matched = 0;
1974 char dem_opname[64];
1975
1976 CHECK_TYPEDEF (type);
1977 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1978 {
0d5cff50 1979 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1980
581e13c1 1981 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
1982 if (strncmp (t_field_name, "__", 2) == 0 ||
1983 strncmp (t_field_name, "op", 2) == 0 ||
1984 strncmp (t_field_name, "type", 4) == 0)
c906108c 1985 {
c5aa993b
JM
1986 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
1987 t_field_name = dem_opname;
1988 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 1989 t_field_name = dem_opname;
c906108c 1990 }
db577aea 1991 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
1992 {
1993 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
1994 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 1995
a109c7c1 1996 name_matched = 1;
de17c821 1997 check_stub_method_group (type, i);
c906108c 1998 if (j > 0 && args == 0)
3e43a32a
MS
1999 error (_("cannot resolve overloaded method "
2000 "`%s': no arguments supplied"), name);
acf5ed49 2001 else if (j == 0 && args == 0)
c906108c 2002 {
acf5ed49
DJ
2003 v = value_fn_field (arg1p, f, j, type, offset);
2004 if (v != NULL)
2005 return v;
c906108c 2006 }
acf5ed49
DJ
2007 else
2008 while (j >= 0)
2009 {
acf5ed49 2010 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2011 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2012 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2013 TYPE_FN_FIELD_ARGS (f, j), args))
2014 {
2015 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2016 return value_virtual_fn_field (arg1p, f, j,
2017 type, offset);
2018 if (TYPE_FN_FIELD_STATIC_P (f, j)
2019 && static_memfuncp)
acf5ed49
DJ
2020 *static_memfuncp = 1;
2021 v = value_fn_field (arg1p, f, j, type, offset);
2022 if (v != NULL)
2023 return v;
2024 }
2025 j--;
2026 }
c906108c
SS
2027 }
2028 }
2029
2030 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2031 {
2032 int base_offset;
8af8e3bc 2033 int this_offset;
c906108c
SS
2034
2035 if (BASETYPE_VIA_VIRTUAL (type, i))
2036 {
086280be 2037 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2038 struct value *base_val;
086280be
UW
2039 const gdb_byte *base_valaddr;
2040
2041 /* The virtual base class pointer might have been
581e13c1 2042 clobbered by the user program. Make sure that it
086280be
UW
2043 still points to a valid memory location. */
2044
2045 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2046 {
6c18f3e0
SP
2047 gdb_byte *tmp;
2048 struct cleanup *back_to;
2049 CORE_ADDR address;
2050
2051 tmp = xmalloc (TYPE_LENGTH (baseclass));
2052 back_to = make_cleanup (xfree, tmp);
2053 address = value_address (*arg1p);
a109c7c1 2054
8af8e3bc 2055 if (target_read_memory (address + offset,
086280be
UW
2056 tmp, TYPE_LENGTH (baseclass)) != 0)
2057 error (_("virtual baseclass botch"));
8af8e3bc
PA
2058
2059 base_val = value_from_contents_and_address (baseclass,
2060 tmp,
2061 address + offset);
2062 base_valaddr = value_contents_for_printing (base_val);
2063 this_offset = 0;
6c18f3e0 2064 do_cleanups (back_to);
c5aa993b
JM
2065 }
2066 else
8af8e3bc
PA
2067 {
2068 base_val = *arg1p;
2069 base_valaddr = value_contents_for_printing (*arg1p);
2070 this_offset = offset;
2071 }
c5aa993b 2072
086280be 2073 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2074 this_offset, value_address (base_val),
2075 base_val);
c5aa993b 2076 }
c906108c
SS
2077 else
2078 {
2079 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2080 }
c906108c
SS
2081 v = search_struct_method (name, arg1p, args, base_offset + offset,
2082 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2083 if (v == (struct value *) - 1)
c906108c
SS
2084 {
2085 name_matched = 1;
2086 }
2087 else if (v)
2088 {
ac3eeb49
MS
2089 /* FIXME-bothner: Why is this commented out? Why is it here? */
2090 /* *arg1p = arg1_tmp; */
c906108c 2091 return v;
c5aa993b 2092 }
c906108c 2093 }
c5aa993b 2094 if (name_matched)
f23631e4 2095 return (struct value *) - 1;
c5aa993b
JM
2096 else
2097 return NULL;
c906108c
SS
2098}
2099
2100/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2101 extract the component named NAME from the ultimate target
2102 structure/union and return it as a value with its appropriate type.
c906108c
SS
2103 ERR is used in the error message if *ARGP's type is wrong.
2104
2105 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2106 an appropriate method. Also, handle derived types.
c906108c
SS
2107
2108 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2109 where the truthvalue of whether the function that was resolved was
2110 a static member function or not is stored.
2111
ac3eeb49
MS
2112 ERR is an error message to be printed in case the field is not
2113 found. */
c906108c 2114
f23631e4
AC
2115struct value *
2116value_struct_elt (struct value **argp, struct value **args,
714f19d5 2117 const char *name, int *static_memfuncp, const char *err)
c906108c 2118{
52f0bd74 2119 struct type *t;
f23631e4 2120 struct value *v;
c906108c 2121
994b9211 2122 *argp = coerce_array (*argp);
c906108c 2123
df407dfe 2124 t = check_typedef (value_type (*argp));
c906108c
SS
2125
2126 /* Follow pointers until we get to a non-pointer. */
2127
2128 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2129 {
2130 *argp = value_ind (*argp);
2131 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2132 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2133 *argp = coerce_array (*argp);
df407dfe 2134 t = check_typedef (value_type (*argp));
c906108c
SS
2135 }
2136
c5aa993b 2137 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2138 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2139 error (_("Attempt to extract a component of a value that is not a %s."),
2140 err);
c906108c
SS
2141
2142 /* Assume it's not, unless we see that it is. */
2143 if (static_memfuncp)
c5aa993b 2144 *static_memfuncp = 0;
c906108c
SS
2145
2146 if (!args)
2147 {
2148 /* if there are no arguments ...do this... */
2149
ac3eeb49
MS
2150 /* Try as a field first, because if we succeed, there is less
2151 work to be done. */
c906108c
SS
2152 v = search_struct_field (name, *argp, 0, t, 0);
2153 if (v)
2154 return v;
2155
2156 /* C++: If it was not found as a data field, then try to
7b83ea04 2157 return it as a pointer to a method. */
ac3eeb49
MS
2158 v = search_struct_method (name, argp, args, 0,
2159 static_memfuncp, t);
c906108c 2160
f23631e4 2161 if (v == (struct value *) - 1)
55b39184 2162 error (_("Cannot take address of method %s."), name);
c906108c
SS
2163 else if (v == 0)
2164 {
2165 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2166 error (_("There is no member or method named %s."), name);
c906108c 2167 else
8a3fe4f8 2168 error (_("There is no member named %s."), name);
c906108c
SS
2169 }
2170 return v;
2171 }
2172
ac3eeb49
MS
2173 v = search_struct_method (name, argp, args, 0,
2174 static_memfuncp, t);
7168a814 2175
f23631e4 2176 if (v == (struct value *) - 1)
c906108c 2177 {
3e43a32a
MS
2178 error (_("One of the arguments you tried to pass to %s could not "
2179 "be converted to what the function wants."), name);
c906108c
SS
2180 }
2181 else if (v == 0)
2182 {
ac3eeb49
MS
2183 /* See if user tried to invoke data as function. If so, hand it
2184 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2185 gdb should give an error. */
c906108c 2186 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2187 /* If we found an ordinary field, then it is not a method call.
2188 So, treat it as if it were a static member function. */
2189 if (v && static_memfuncp)
2190 *static_memfuncp = 1;
c906108c
SS
2191 }
2192
2193 if (!v)
79afc5ef
SW
2194 throw_error (NOT_FOUND_ERROR,
2195 _("Structure has no component named %s."), name);
c906108c
SS
2196 return v;
2197}
2198
b5b08fb4
SC
2199/* Given *ARGP, a value of type structure or union, or a pointer/reference
2200 to a structure or union, extract and return its component (field) of
2201 type FTYPE at the specified BITPOS.
2202 Throw an exception on error. */
2203
2204struct value *
2205value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2206 const char *err)
2207{
2208 struct type *t;
2209 struct value *v;
2210 int i;
2211 int nbases;
2212
2213 *argp = coerce_array (*argp);
2214
2215 t = check_typedef (value_type (*argp));
2216
2217 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2218 {
2219 *argp = value_ind (*argp);
2220 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2221 *argp = coerce_array (*argp);
2222 t = check_typedef (value_type (*argp));
2223 }
2224
2225 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2226 && TYPE_CODE (t) != TYPE_CODE_UNION)
2227 error (_("Attempt to extract a component of a value that is not a %s."),
2228 err);
2229
2230 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2231 {
2232 if (!field_is_static (&TYPE_FIELD (t, i))
2233 && bitpos == TYPE_FIELD_BITPOS (t, i)
2234 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2235 return value_primitive_field (*argp, 0, i, t);
2236 }
2237
2238 error (_("No field with matching bitpos and type."));
2239
2240 /* Never hit. */
2241 return NULL;
2242}
2243
ac3eeb49 2244/* Search through the methods of an object (and its bases) to find a
cfe9eade 2245 specified method. Return the pointer to the fn_field list of
ac3eeb49
MS
2246 overloaded instances.
2247
2248 Helper function for value_find_oload_list.
2249 ARGP is a pointer to a pointer to a value (the object).
2250 METHOD is a string containing the method name.
2251 OFFSET is the offset within the value.
2252 TYPE is the assumed type of the object.
2253 NUM_FNS is the number of overloaded instances.
2254 BASETYPE is set to the actual type of the subobject where the
2255 method is found.
581e13c1 2256 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2257
7a292a7a 2258static struct fn_field *
714f19d5 2259find_method_list (struct value **argp, const char *method,
ac3eeb49 2260 int offset, struct type *type, int *num_fns,
fba45db2 2261 struct type **basetype, int *boffset)
c906108c
SS
2262{
2263 int i;
c5aa993b 2264 struct fn_field *f;
c906108c
SS
2265 CHECK_TYPEDEF (type);
2266
2267 *num_fns = 0;
2268
ac3eeb49 2269 /* First check in object itself. */
c5aa993b 2270 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c906108c 2271 {
ac3eeb49 2272 /* pai: FIXME What about operators and type conversions? */
0d5cff50 2273 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2274
db577aea 2275 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
c5aa993b 2276 {
4a1970e4
DJ
2277 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2278 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
4a1970e4
DJ
2279
2280 *num_fns = len;
c5aa993b
JM
2281 *basetype = type;
2282 *boffset = offset;
4a1970e4 2283
de17c821
DJ
2284 /* Resolve any stub methods. */
2285 check_stub_method_group (type, i);
4a1970e4
DJ
2286
2287 return f;
c5aa993b
JM
2288 }
2289 }
2290
ac3eeb49 2291 /* Not found in object, check in base subobjects. */
c906108c
SS
2292 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2293 {
2294 int base_offset;
a109c7c1 2295
c906108c
SS
2296 if (BASETYPE_VIA_VIRTUAL (type, i))
2297 {
086280be 2298 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2299 value_contents_for_printing (*argp),
2300 value_offset (*argp) + offset,
2301 value_address (*argp), *argp);
c5aa993b 2302 }
ac3eeb49
MS
2303 else /* Non-virtual base, simply use bit position from debug
2304 info. */
c906108c
SS
2305 {
2306 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2307 }
c906108c 2308 f = find_method_list (argp, method, base_offset + offset,
ac3eeb49
MS
2309 TYPE_BASECLASS (type, i), num_fns,
2310 basetype, boffset);
c906108c 2311 if (f)
c5aa993b 2312 return f;
c906108c 2313 }
c5aa993b 2314 return NULL;
c906108c
SS
2315}
2316
2317/* Return the list of overloaded methods of a specified name.
ac3eeb49
MS
2318
2319 ARGP is a pointer to a pointer to a value (the object).
2320 METHOD is the method name.
2321 OFFSET is the offset within the value contents.
2322 NUM_FNS is the number of overloaded instances.
2323 BASETYPE is set to the type of the base subobject that defines the
2324 method.
581e13c1 2325 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2326
6598ed07 2327static struct fn_field *
714f19d5 2328value_find_oload_method_list (struct value **argp, const char *method,
ac3eeb49
MS
2329 int offset, int *num_fns,
2330 struct type **basetype, int *boffset)
c906108c 2331{
c5aa993b 2332 struct type *t;
c906108c 2333
df407dfe 2334 t = check_typedef (value_type (*argp));
c906108c 2335
ac3eeb49 2336 /* Code snarfed from value_struct_elt. */
c906108c
SS
2337 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2338 {
2339 *argp = value_ind (*argp);
2340 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2341 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2342 *argp = coerce_array (*argp);
df407dfe 2343 t = check_typedef (value_type (*argp));
c906108c 2344 }
c5aa993b 2345
c5aa993b
JM
2346 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2347 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2348 error (_("Attempt to extract a component of a "
2349 "value that is not a struct or union"));
c5aa993b 2350
ac3eeb49
MS
2351 return find_method_list (argp, method, 0, t, num_fns,
2352 basetype, boffset);
c906108c
SS
2353}
2354
da096638 2355/* Given an array of arguments (ARGS) (which includes an
c906108c 2356 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2357 arguments NARGS, the NAME of a function, and whether it's a method or
2358 not (METHOD), find the best function that matches on the argument types
2359 according to the overload resolution rules.
c906108c 2360
4c3376c8
SW
2361 METHOD can be one of three values:
2362 NON_METHOD for non-member functions.
2363 METHOD: for member functions.
2364 BOTH: used for overload resolution of operators where the
2365 candidates are expected to be either member or non member
581e13c1 2366 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2367 (representing 'this') is expected to be a reference to the
2368 target object, and will be dereferenced when attempting the
2369 non-member search.
2370
c906108c
SS
2371 In the case of class methods, the parameter OBJ is an object value
2372 in which to search for overloaded methods.
2373
2374 In the case of non-method functions, the parameter FSYM is a symbol
2375 corresponding to one of the overloaded functions.
2376
2377 Return value is an integer: 0 -> good match, 10 -> debugger applied
2378 non-standard coercions, 100 -> incompatible.
2379
2380 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2381 If a non-method is being searched for, SYMP will hold the symbol
2382 for it.
c906108c
SS
2383
2384 If a method is being searched for, and it is a static method,
2385 then STATICP will point to a non-zero value.
2386
7322dca9
SW
2387 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2388 ADL overload candidates when performing overload resolution for a fully
2389 qualified name.
2390
c906108c
SS
2391 Note: This function does *not* check the value of
2392 overload_resolution. Caller must check it to see whether overload
581e13c1 2393 resolution is permitted. */
c906108c
SS
2394
2395int
da096638 2396find_overload_match (struct value **args, int nargs,
4c3376c8 2397 const char *name, enum oload_search_type method,
28c64fc2 2398 struct value **objp, struct symbol *fsym,
ac3eeb49 2399 struct value **valp, struct symbol **symp,
7322dca9 2400 int *staticp, const int no_adl)
c906108c 2401{
7f8c9282 2402 struct value *obj = (objp ? *objp : NULL);
da096638 2403 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2404 /* Index of best overloaded function. */
4c3376c8
SW
2405 int func_oload_champ = -1;
2406 int method_oload_champ = -1;
2407
ac3eeb49 2408 /* The measure for the current best match. */
4c3376c8
SW
2409 struct badness_vector *method_badness = NULL;
2410 struct badness_vector *func_badness = NULL;
2411
f23631e4 2412 struct value *temp = obj;
ac3eeb49
MS
2413 /* For methods, the list of overloaded methods. */
2414 struct fn_field *fns_ptr = NULL;
2415 /* For non-methods, the list of overloaded function symbols. */
2416 struct symbol **oload_syms = NULL;
2417 /* Number of overloaded instances being considered. */
2418 int num_fns = 0;
c5aa993b 2419 struct type *basetype = NULL;
c906108c 2420 int boffset;
7322dca9
SW
2421
2422 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2423
8d577d32 2424 const char *obj_type_name = NULL;
7322dca9 2425 const char *func_name = NULL;
8d577d32 2426 enum oload_classification match_quality;
4c3376c8
SW
2427 enum oload_classification method_match_quality = INCOMPATIBLE;
2428 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2429
ac3eeb49 2430 /* Get the list of overloaded methods or functions. */
4c3376c8 2431 if (method == METHOD || method == BOTH)
c906108c 2432 {
a2ca50ae 2433 gdb_assert (obj);
94af9270
KS
2434
2435 /* OBJ may be a pointer value rather than the object itself. */
2436 obj = coerce_ref (obj);
2437 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2438 obj = coerce_ref (value_ind (obj));
df407dfe 2439 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2440
2441 /* First check whether this is a data member, e.g. a pointer to
2442 a function. */
2443 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2444 {
2445 *valp = search_struct_field (name, obj, 0,
2446 check_typedef (value_type (obj)), 0);
2447 if (*valp)
2448 {
2449 *staticp = 1;
f748fb40 2450 do_cleanups (all_cleanups);
94af9270
KS
2451 return 0;
2452 }
2453 }
c906108c 2454
4c3376c8 2455 /* Retrieve the list of methods with the name NAME. */
ac3eeb49
MS
2456 fns_ptr = value_find_oload_method_list (&temp, name,
2457 0, &num_fns,
c5aa993b 2458 &basetype, &boffset);
4c3376c8
SW
2459 /* If this is a method only search, and no methods were found
2460 the search has faild. */
2461 if (method == METHOD && (!fns_ptr || !num_fns))
8a3fe4f8 2462 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2463 obj_type_name,
2464 (obj_type_name && *obj_type_name) ? "::" : "",
2465 name);
4a1970e4 2466 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2467 been resolved by find_method_list via
2468 value_find_oload_method_list above. */
4c3376c8
SW
2469 if (fns_ptr)
2470 {
2471 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
da096638 2472 method_oload_champ = find_oload_champ (args, nargs, method,
4c3376c8
SW
2473 num_fns, fns_ptr,
2474 oload_syms, &method_badness);
2475
2476 method_match_quality =
2477 classify_oload_match (method_badness, nargs,
2478 oload_method_static (method, fns_ptr,
2479 method_oload_champ));
2480
2481 make_cleanup (xfree, method_badness);
2482 }
2483
c906108c 2484 }
4c3376c8
SW
2485
2486 if (method == NON_METHOD || method == BOTH)
c906108c 2487 {
7322dca9 2488 const char *qualified_name = NULL;
c906108c 2489
b021a221
MS
2490 /* If the overload match is being search for both as a method
2491 and non member function, the first argument must now be
2492 dereferenced. */
4c3376c8 2493 if (method == BOTH)
2b214ea6 2494 args[0] = value_ind (args[0]);
4c3376c8 2495
7322dca9
SW
2496 if (fsym)
2497 {
2498 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2499
2500 /* If we have a function with a C++ name, try to extract just
2501 the function part. Do not try this for non-functions (e.g.
2502 function pointers). */
2503 if (qualified_name
3e43a32a
MS
2504 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2505 == TYPE_CODE_FUNC)
7322dca9
SW
2506 {
2507 char *temp;
2508
2509 temp = cp_func_name (qualified_name);
2510
2511 /* If cp_func_name did not remove anything, the name of the
2512 symbol did not include scope or argument types - it was
2513 probably a C-style function. */
2514 if (temp)
2515 {
2516 make_cleanup (xfree, temp);
2517 if (strcmp (temp, qualified_name) == 0)
2518 func_name = NULL;
2519 else
2520 func_name = temp;
2521 }
2522 }
2523 }
2524 else
94af9270 2525 {
7322dca9
SW
2526 func_name = name;
2527 qualified_name = name;
94af9270 2528 }
d9639e13 2529
94af9270
KS
2530 /* If there was no C++ name, this must be a C-style function or
2531 not a function at all. Just return the same symbol. Do the
2532 same if cp_func_name fails for some reason. */
8d577d32 2533 if (func_name == NULL)
7b83ea04 2534 {
917317f4 2535 *symp = fsym;
5fe41fbf 2536 do_cleanups (all_cleanups);
7b83ea04
AC
2537 return 0;
2538 }
917317f4 2539
da096638 2540 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2541 func_name,
2542 qualified_name,
2543 &oload_syms,
2544 &func_badness,
2545 no_adl);
8d577d32 2546
4c3376c8
SW
2547 if (func_oload_champ >= 0)
2548 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2549
2550 make_cleanup (xfree, oload_syms);
2551 make_cleanup (xfree, func_badness);
8d577d32
DC
2552 }
2553
7322dca9 2554 /* Did we find a match ? */
4c3376c8 2555 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2556 throw_error (NOT_FOUND_ERROR,
2557 _("No symbol \"%s\" in current context."),
2558 name);
8d577d32 2559
4c3376c8
SW
2560 /* If we have found both a method match and a function
2561 match, find out which one is better, and calculate match
2562 quality. */
2563 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2564 {
2565 switch (compare_badness (func_badness, method_badness))
2566 {
2567 case 0: /* Top two contenders are equally good. */
b021a221
MS
2568 /* FIXME: GDB does not support the general ambiguous case.
2569 All candidates should be collected and presented the
2570 user. */
4c3376c8
SW
2571 error (_("Ambiguous overload resolution"));
2572 break;
2573 case 1: /* Incomparable top contenders. */
2574 /* This is an error incompatible candidates
2575 should not have been proposed. */
3e43a32a
MS
2576 error (_("Internal error: incompatible "
2577 "overload candidates proposed"));
4c3376c8
SW
2578 break;
2579 case 2: /* Function champion. */
2580 method_oload_champ = -1;
2581 match_quality = func_match_quality;
2582 break;
2583 case 3: /* Method champion. */
2584 func_oload_champ = -1;
2585 match_quality = method_match_quality;
2586 break;
2587 default:
2588 error (_("Internal error: unexpected overload comparison result"));
2589 break;
2590 }
2591 }
2592 else
2593 {
2594 /* We have either a method match or a function match. */
2595 if (method_oload_champ >= 0)
2596 match_quality = method_match_quality;
2597 else
2598 match_quality = func_match_quality;
2599 }
8d577d32
DC
2600
2601 if (match_quality == INCOMPATIBLE)
2602 {
4c3376c8 2603 if (method == METHOD)
8a3fe4f8 2604 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2605 obj_type_name,
2606 (obj_type_name && *obj_type_name) ? "::" : "",
2607 name);
2608 else
8a3fe4f8 2609 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2610 func_name);
2611 }
2612 else if (match_quality == NON_STANDARD)
2613 {
4c3376c8 2614 if (method == METHOD)
3e43a32a
MS
2615 warning (_("Using non-standard conversion to match "
2616 "method %s%s%s to supplied arguments"),
8d577d32
DC
2617 obj_type_name,
2618 (obj_type_name && *obj_type_name) ? "::" : "",
2619 name);
2620 else
3e43a32a
MS
2621 warning (_("Using non-standard conversion to match "
2622 "function %s to supplied arguments"),
8d577d32
DC
2623 func_name);
2624 }
2625
4c3376c8
SW
2626 if (staticp != NULL)
2627 *staticp = oload_method_static (method, fns_ptr, method_oload_champ);
2628
2629 if (method_oload_champ >= 0)
8d577d32 2630 {
4c3376c8
SW
2631 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2632 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2633 basetype, boffset);
8d577d32 2634 else
4c3376c8 2635 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2636 basetype, boffset);
8d577d32
DC
2637 }
2638 else
4c3376c8 2639 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2640
2641 if (objp)
2642 {
a4295225 2643 struct type *temp_type = check_typedef (value_type (temp));
da096638 2644 struct type *objtype = check_typedef (obj_type);
a109c7c1 2645
a4295225 2646 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2647 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2648 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2649 {
2650 temp = value_addr (temp);
2651 }
2652 *objp = temp;
2653 }
7322dca9
SW
2654
2655 do_cleanups (all_cleanups);
8d577d32
DC
2656
2657 switch (match_quality)
2658 {
2659 case INCOMPATIBLE:
2660 return 100;
2661 case NON_STANDARD:
2662 return 10;
2663 default: /* STANDARD */
2664 return 0;
2665 }
2666}
2667
2668/* Find the best overload match, searching for FUNC_NAME in namespaces
2669 contained in QUALIFIED_NAME until it either finds a good match or
2670 runs out of namespaces. It stores the overloaded functions in
2671 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2672 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2673 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2674 performned. */
8d577d32
DC
2675
2676static int
da096638 2677find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2678 const char *func_name,
2679 const char *qualified_name,
2680 struct symbol ***oload_syms,
7322dca9
SW
2681 struct badness_vector **oload_champ_bv,
2682 const int no_adl)
8d577d32
DC
2683{
2684 int oload_champ;
2685
da096638 2686 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2687 func_name,
2688 qualified_name, 0,
2689 oload_syms, oload_champ_bv,
7322dca9
SW
2690 &oload_champ,
2691 no_adl);
8d577d32
DC
2692
2693 return oload_champ;
2694}
2695
2696/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2697 how deep we've looked for namespaces, and the champ is stored in
2698 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2699 if it isn't. Other arguments are the same as in
2700 find_oload_champ_namespace
8d577d32
DC
2701
2702 It is the caller's responsibility to free *OLOAD_SYMS and
2703 *OLOAD_CHAMP_BV. */
2704
2705static int
da096638 2706find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2707 const char *func_name,
2708 const char *qualified_name,
2709 int namespace_len,
2710 struct symbol ***oload_syms,
2711 struct badness_vector **oload_champ_bv,
7322dca9
SW
2712 int *oload_champ,
2713 const int no_adl)
8d577d32
DC
2714{
2715 int next_namespace_len = namespace_len;
2716 int searched_deeper = 0;
2717 int num_fns = 0;
2718 struct cleanup *old_cleanups;
2719 int new_oload_champ;
2720 struct symbol **new_oload_syms;
2721 struct badness_vector *new_oload_champ_bv;
2722 char *new_namespace;
2723
2724 if (next_namespace_len != 0)
2725 {
2726 gdb_assert (qualified_name[next_namespace_len] == ':');
2727 next_namespace_len += 2;
c906108c 2728 }
ac3eeb49
MS
2729 next_namespace_len +=
2730 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2731
2732 /* Initialize these to values that can safely be xfree'd. */
2733 *oload_syms = NULL;
2734 *oload_champ_bv = NULL;
c5aa993b 2735
581e13c1 2736 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2737 If we get a good match there, use it. */
8d577d32
DC
2738
2739 if (qualified_name[next_namespace_len] == ':')
2740 {
2741 searched_deeper = 1;
2742
da096638 2743 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2744 func_name, qualified_name,
2745 next_namespace_len,
2746 oload_syms, oload_champ_bv,
7322dca9 2747 oload_champ, no_adl))
8d577d32
DC
2748 {
2749 return 1;
2750 }
2751 };
2752
2753 /* If we reach here, either we're in the deepest namespace or we
2754 didn't find a good match in a deeper namespace. But, in the
2755 latter case, we still have a bad match in a deeper namespace;
2756 note that we might not find any match at all in the current
2757 namespace. (There's always a match in the deepest namespace,
2758 because this overload mechanism only gets called if there's a
2759 function symbol to start off with.) */
2760
2761 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2762 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2763 new_namespace = alloca (namespace_len + 1);
2764 strncpy (new_namespace, qualified_name, namespace_len);
2765 new_namespace[namespace_len] = '\0';
2766 new_oload_syms = make_symbol_overload_list (func_name,
2767 new_namespace);
7322dca9
SW
2768
2769 /* If we have reached the deepest level perform argument
2770 determined lookup. */
2771 if (!searched_deeper && !no_adl)
da096638
KS
2772 {
2773 int ix;
2774 struct type **arg_types;
2775
2776 /* Prepare list of argument types for overload resolution. */
2777 arg_types = (struct type **)
2778 alloca (nargs * (sizeof (struct type *)));
2779 for (ix = 0; ix < nargs; ix++)
2780 arg_types[ix] = value_type (args[ix]);
2781 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2782 }
7322dca9 2783
8d577d32
DC
2784 while (new_oload_syms[num_fns])
2785 ++num_fns;
2786
da096638 2787 new_oload_champ = find_oload_champ (args, nargs, 0, num_fns,
8d577d32
DC
2788 NULL, new_oload_syms,
2789 &new_oload_champ_bv);
2790
2791 /* Case 1: We found a good match. Free earlier matches (if any),
2792 and return it. Case 2: We didn't find a good match, but we're
2793 not the deepest function. Then go with the bad match that the
2794 deeper function found. Case 3: We found a bad match, and we're
2795 the deepest function. Then return what we found, even though
2796 it's a bad match. */
2797
2798 if (new_oload_champ != -1
2799 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2800 {
2801 *oload_syms = new_oload_syms;
2802 *oload_champ = new_oload_champ;
2803 *oload_champ_bv = new_oload_champ_bv;
2804 do_cleanups (old_cleanups);
2805 return 1;
2806 }
2807 else if (searched_deeper)
2808 {
2809 xfree (new_oload_syms);
2810 xfree (new_oload_champ_bv);
2811 discard_cleanups (old_cleanups);
2812 return 0;
2813 }
2814 else
2815 {
8d577d32
DC
2816 *oload_syms = new_oload_syms;
2817 *oload_champ = new_oload_champ;
2818 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2819 do_cleanups (old_cleanups);
8d577d32
DC
2820 return 0;
2821 }
2822}
2823
da096638 2824/* Look for a function to take NARGS args of ARGS. Find
8d577d32
DC
2825 the best match from among the overloaded methods or functions
2826 (depending on METHOD) given by FNS_PTR or OLOAD_SYMS, respectively.
2827 The number of methods/functions in the list is given by NUM_FNS.
2828 Return the index of the best match; store an indication of the
2829 quality of the match in OLOAD_CHAMP_BV.
2830
2831 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2832
2833static int
da096638 2834find_oload_champ (struct value **args, int nargs, int method,
8d577d32
DC
2835 int num_fns, struct fn_field *fns_ptr,
2836 struct symbol **oload_syms,
2837 struct badness_vector **oload_champ_bv)
2838{
2839 int ix;
ac3eeb49
MS
2840 /* A measure of how good an overloaded instance is. */
2841 struct badness_vector *bv;
2842 /* Index of best overloaded function. */
2843 int oload_champ = -1;
2844 /* Current ambiguity state for overload resolution. */
2845 int oload_ambiguous = 0;
2846 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32
DC
2847
2848 *oload_champ_bv = NULL;
c906108c 2849
ac3eeb49 2850 /* Consider each candidate in turn. */
c906108c
SS
2851 for (ix = 0; ix < num_fns; ix++)
2852 {
8d577d32
DC
2853 int jj;
2854 int static_offset = oload_method_static (method, fns_ptr, ix);
2855 int nparms;
2856 struct type **parm_types;
2857
db577aea
AC
2858 if (method)
2859 {
ad2f7632 2860 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
db577aea
AC
2861 }
2862 else
2863 {
ac3eeb49
MS
2864 /* If it's not a method, this is the proper place. */
2865 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
db577aea 2866 }
c906108c 2867
ac3eeb49
MS
2868 /* Prepare array of parameter types. */
2869 parm_types = (struct type **)
2870 xmalloc (nparms * (sizeof (struct type *)));
c906108c 2871 for (jj = 0; jj < nparms; jj++)
db577aea 2872 parm_types[jj] = (method
ad2f7632 2873 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
ac3eeb49
MS
2874 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
2875 jj));
c906108c 2876
ac3eeb49
MS
2877 /* Compare parameter types to supplied argument types. Skip
2878 THIS for static methods. */
2879 bv = rank_function (parm_types, nparms,
da096638 2880 args + static_offset,
4a1970e4 2881 nargs - static_offset);
c5aa993b 2882
8d577d32 2883 if (!*oload_champ_bv)
c5aa993b 2884 {
8d577d32 2885 *oload_champ_bv = bv;
c5aa993b 2886 oload_champ = 0;
c5aa993b 2887 }
ac3eeb49
MS
2888 else /* See whether current candidate is better or worse than
2889 previous best. */
8d577d32 2890 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 2891 {
ac3eeb49
MS
2892 case 0: /* Top two contenders are equally good. */
2893 oload_ambiguous = 1;
c5aa993b 2894 break;
ac3eeb49
MS
2895 case 1: /* Incomparable top contenders. */
2896 oload_ambiguous = 2;
c5aa993b 2897 break;
ac3eeb49
MS
2898 case 2: /* New champion, record details. */
2899 *oload_champ_bv = bv;
c5aa993b
JM
2900 oload_ambiguous = 0;
2901 oload_champ = ix;
c5aa993b
JM
2902 break;
2903 case 3:
2904 default:
2905 break;
2906 }
b8c9b27d 2907 xfree (parm_types);
6b1ba9a0
ND
2908 if (overload_debug)
2909 {
2910 if (method)
ac3eeb49 2911 fprintf_filtered (gdb_stderr,
3e43a32a 2912 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 2913 fns_ptr[ix].physname, nparms);
6b1ba9a0 2914 else
ac3eeb49 2915 fprintf_filtered (gdb_stderr,
3e43a32a
MS
2916 "Overloaded function instance "
2917 "%s # of parms %d\n",
ac3eeb49
MS
2918 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
2919 nparms);
4a1970e4 2920 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
2921 fprintf_filtered (gdb_stderr,
2922 "...Badness @ %d : %d\n",
6403aeea 2923 jj, bv->rank[jj].rank);
3e43a32a
MS
2924 fprintf_filtered (gdb_stderr, "Overload resolution "
2925 "champion is %d, ambiguous? %d\n",
ac3eeb49 2926 oload_champ, oload_ambiguous);
6b1ba9a0 2927 }
c906108c
SS
2928 }
2929
8d577d32
DC
2930 return oload_champ;
2931}
6b1ba9a0 2932
8d577d32
DC
2933/* Return 1 if we're looking at a static method, 0 if we're looking at
2934 a non-static method or a function that isn't a method. */
c906108c 2935
8d577d32
DC
2936static int
2937oload_method_static (int method, struct fn_field *fns_ptr, int index)
2938{
4c3376c8
SW
2939 if (method && fns_ptr && index >= 0
2940 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 2941 return 1;
c906108c 2942 else
8d577d32
DC
2943 return 0;
2944}
c906108c 2945
8d577d32
DC
2946/* Check how good an overload match OLOAD_CHAMP_BV represents. */
2947
2948static enum oload_classification
2949classify_oload_match (struct badness_vector *oload_champ_bv,
2950 int nargs,
2951 int static_offset)
2952{
2953 int ix;
da096638 2954 enum oload_classification worst = STANDARD;
8d577d32
DC
2955
2956 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 2957 {
6403aeea
SW
2958 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
2959 or worse return INCOMPATIBLE. */
2960 if (compare_ranks (oload_champ_bv->rank[ix],
2961 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 2962 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
2963 /* Otherwise If this conversion is as bad as
2964 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
2965 else if (compare_ranks (oload_champ_bv->rank[ix],
2966 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 2967 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 2968 needed. */
7f8c9282 2969 }
02f0d45d 2970
da096638
KS
2971 /* If no INCOMPATIBLE classification was found, return the worst one
2972 that was found (if any). */
2973 return worst;
c906108c
SS
2974}
2975
ac3eeb49
MS
2976/* C++: return 1 is NAME is a legitimate name for the destructor of
2977 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
2978 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
2979 have CHECK_TYPEDEF applied, this function will apply it itself. */
2980
c906108c 2981int
d8228535 2982destructor_name_p (const char *name, struct type *type)
c906108c 2983{
c906108c
SS
2984 if (name[0] == '~')
2985 {
d8228535
JK
2986 const char *dname = type_name_no_tag_or_error (type);
2987 const char *cp = strchr (dname, '<');
c906108c
SS
2988 unsigned int len;
2989
2990 /* Do not compare the template part for template classes. */
2991 if (cp == NULL)
2992 len = strlen (dname);
2993 else
2994 len = cp - dname;
bf896cb0 2995 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 2996 error (_("name of destructor must equal name of class"));
c906108c
SS
2997 else
2998 return 1;
2999 }
3000 return 0;
3001}
3002
79c2c32d 3003/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3004 return the appropriate member (or the address of the member, if
3005 WANT_ADDRESS). This function is used to resolve user expressions
3006 of the form "DOMAIN::NAME". For more details on what happens, see
3007 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3008
3009struct value *
072bba3b
KS
3010value_aggregate_elt (struct type *curtype, char *name,
3011 struct type *expect_type, int want_address,
79c2c32d
DC
3012 enum noside noside)
3013{
3014 switch (TYPE_CODE (curtype))
3015 {
3016 case TYPE_CODE_STRUCT:
3017 case TYPE_CODE_UNION:
ac3eeb49 3018 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3019 name, expect_type,
0d5de010 3020 want_address, noside);
79c2c32d 3021 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3022 return value_namespace_elt (curtype, name,
3023 want_address, noside);
79c2c32d
DC
3024 default:
3025 internal_error (__FILE__, __LINE__,
e2e0b3e5 3026 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3027 }
3028}
3029
072bba3b 3030/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3031 with respect to the methods' parameters. If the types of the
072bba3b
KS
3032 two parameter lists are the same, returns 1; 0 otherwise. This
3033 comparison may ignore any artificial parameters in T1 if
3034 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3035 the first artificial parameter in T1, assumed to be a 'this' pointer.
3036
3037 The type T2 is expected to have come from make_params (in eval.c). */
3038
3039static int
3040compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3041{
3042 int start = 0;
3043
80b23b6a 3044 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3045 ++start;
3046
3047 /* If skipping artificial fields, find the first real field
581e13c1 3048 in T1. */
072bba3b
KS
3049 if (skip_artificial)
3050 {
3051 while (start < TYPE_NFIELDS (t1)
3052 && TYPE_FIELD_ARTIFICIAL (t1, start))
3053 ++start;
3054 }
3055
581e13c1 3056 /* Now compare parameters. */
072bba3b
KS
3057
3058 /* Special case: a method taking void. T1 will contain no
3059 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3060 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3061 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3062 return 1;
3063
3064 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3065 {
3066 int i;
a109c7c1 3067
072bba3b
KS
3068 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3069 {
6403aeea 3070 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3071 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3072 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3073 return 0;
3074 }
3075
3076 return 1;
3077 }
3078
3079 return 0;
3080}
3081
c906108c 3082/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3083 return the address of this member as a "pointer to member" type.
3084 If INTYPE is non-null, then it will be the type of the member we
3085 are looking for. This will help us resolve "pointers to member
3086 functions". This function is used to resolve user expressions of
3087 the form "DOMAIN::NAME". */
c906108c 3088
63d06c5c 3089static struct value *
fba45db2
KB
3090value_struct_elt_for_reference (struct type *domain, int offset,
3091 struct type *curtype, char *name,
ac3eeb49
MS
3092 struct type *intype,
3093 int want_address,
63d06c5c 3094 enum noside noside)
c906108c 3095{
52f0bd74
AC
3096 struct type *t = curtype;
3097 int i;
0d5de010 3098 struct value *v, *result;
c906108c 3099
c5aa993b 3100 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3101 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3102 error (_("Internal error: non-aggregate type "
3103 "to value_struct_elt_for_reference"));
c906108c
SS
3104
3105 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3106 {
0d5cff50 3107 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3108
6314a349 3109 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3110 {
d6a843b5 3111 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3112 {
3113 v = value_static_field (t, i);
0d5de010
DJ
3114 if (want_address)
3115 v = value_addr (v);
c906108c
SS
3116 return v;
3117 }
3118 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3119 error (_("pointers to bitfield members not allowed"));
c5aa993b 3120
0d5de010
DJ
3121 if (want_address)
3122 return value_from_longest
3123 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3124 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3125 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3126 return allocate_value (TYPE_FIELD_TYPE (t, i));
3127 else
f7e3ecae
KS
3128 {
3129 /* Try to evaluate NAME as a qualified name with implicit
3130 this pointer. In this case, attempt to return the
3131 equivalent to `this->*(&TYPE::NAME)'. */
3132 v = value_of_this_silent (current_language);
3133 if (v != NULL)
3134 {
3135 struct value *ptr;
3136 long mem_offset;
3137 struct type *type, *tmp;
3138
3139 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3140 type = check_typedef (value_type (ptr));
3141 gdb_assert (type != NULL
3142 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
3143 tmp = lookup_pointer_type (TYPE_DOMAIN_TYPE (type));
3144 v = value_cast_pointers (tmp, v, 1);
3145 mem_offset = value_as_long (ptr);
3146 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3147 result = value_from_pointer (tmp,
3148 value_as_long (v) + mem_offset);
3149 return value_ind (result);
3150 }
3151
3152 error (_("Cannot reference non-static field \"%s\""), name);
3153 }
c906108c
SS
3154 }
3155 }
3156
ac3eeb49
MS
3157 /* C++: If it was not found as a data field, then try to return it
3158 as a pointer to a method. */
c906108c 3159
c906108c
SS
3160 /* Perform all necessary dereferencing. */
3161 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3162 intype = TYPE_TARGET_TYPE (intype);
3163
3164 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3165 {
0d5cff50 3166 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3167 char dem_opname[64];
3168
ac3eeb49
MS
3169 if (strncmp (t_field_name, "__", 2) == 0
3170 || strncmp (t_field_name, "op", 2) == 0
3171 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3172 {
ac3eeb49
MS
3173 if (cplus_demangle_opname (t_field_name,
3174 dem_opname, DMGL_ANSI))
c5aa993b 3175 t_field_name = dem_opname;
ac3eeb49
MS
3176 else if (cplus_demangle_opname (t_field_name,
3177 dem_opname, 0))
c906108c 3178 t_field_name = dem_opname;
c906108c 3179 }
6314a349 3180 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3181 {
072bba3b
KS
3182 int j;
3183 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3184 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3185
de17c821
DJ
3186 check_stub_method_group (t, i);
3187
c906108c
SS
3188 if (intype)
3189 {
072bba3b
KS
3190 for (j = 0; j < len; ++j)
3191 {
3192 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3193 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3194 intype, 1))
072bba3b
KS
3195 break;
3196 }
3197
3198 if (j == len)
3e43a32a
MS
3199 error (_("no member function matches "
3200 "that type instantiation"));
7f79b1c5 3201 }
c906108c 3202 else
072bba3b
KS
3203 {
3204 int ii;
7f79b1c5
DJ
3205
3206 j = -1;
53832f31 3207 for (ii = 0; ii < len; ++ii)
072bba3b 3208 {
7f79b1c5
DJ
3209 /* Skip artificial methods. This is necessary if,
3210 for example, the user wants to "print
3211 subclass::subclass" with only one user-defined
53832f31
TT
3212 constructor. There is no ambiguity in this case.
3213 We are careful here to allow artificial methods
3214 if they are the unique result. */
072bba3b 3215 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3216 {
3217 if (j == -1)
3218 j = ii;
3219 continue;
3220 }
072bba3b 3221
7f79b1c5
DJ
3222 /* Desired method is ambiguous if more than one
3223 method is defined. */
53832f31 3224 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3225 error (_("non-unique member `%s' requires "
3226 "type instantiation"), name);
072bba3b 3227
7f79b1c5
DJ
3228 j = ii;
3229 }
53832f31
TT
3230
3231 if (j == -1)
3232 error (_("no matching member function"));
072bba3b 3233 }
c5aa993b 3234
0d5de010
DJ
3235 if (TYPE_FN_FIELD_STATIC_P (f, j))
3236 {
ac3eeb49
MS
3237 struct symbol *s =
3238 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3239 0, VAR_DOMAIN, 0);
a109c7c1 3240
0d5de010
DJ
3241 if (s == NULL)
3242 return NULL;
3243
3244 if (want_address)
3245 return value_addr (read_var_value (s, 0));
3246 else
3247 return read_var_value (s, 0);
3248 }
3249
c906108c
SS
3250 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3251 {
0d5de010
DJ
3252 if (want_address)
3253 {
3254 result = allocate_value
3255 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3256 cplus_make_method_ptr (value_type (result),
3257 value_contents_writeable (result),
0d5de010
DJ
3258 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3259 }
3260 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3261 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3262 else
3263 error (_("Cannot reference virtual member function \"%s\""),
3264 name);
c906108c
SS
3265 }
3266 else
3267 {
ac3eeb49
MS
3268 struct symbol *s =
3269 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3270 0, VAR_DOMAIN, 0);
a109c7c1 3271
c906108c 3272 if (s == NULL)
0d5de010
DJ
3273 return NULL;
3274
3275 v = read_var_value (s, 0);
3276 if (!want_address)
3277 result = v;
c906108c
SS
3278 else
3279 {
0d5de010 3280 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3281 cplus_make_method_ptr (value_type (result),
3282 value_contents_writeable (result),
42ae5230 3283 value_address (v), 0);
c906108c 3284 }
c906108c 3285 }
0d5de010 3286 return result;
c906108c
SS
3287 }
3288 }
3289 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3290 {
f23631e4 3291 struct value *v;
c906108c
SS
3292 int base_offset;
3293
3294 if (BASETYPE_VIA_VIRTUAL (t, i))
3295 base_offset = 0;
3296 else
3297 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3298 v = value_struct_elt_for_reference (domain,
3299 offset + base_offset,
3300 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3301 name, intype,
3302 want_address, noside);
c906108c
SS
3303 if (v)
3304 return v;
3305 }
63d06c5c
DC
3306
3307 /* As a last chance, pretend that CURTYPE is a namespace, and look
3308 it up that way; this (frequently) works for types nested inside
3309 classes. */
3310
ac3eeb49
MS
3311 return value_maybe_namespace_elt (curtype, name,
3312 want_address, noside);
c906108c
SS
3313}
3314
79c2c32d
DC
3315/* C++: Return the member NAME of the namespace given by the type
3316 CURTYPE. */
3317
3318static struct value *
3319value_namespace_elt (const struct type *curtype,
0d5de010 3320 char *name, int want_address,
79c2c32d 3321 enum noside noside)
63d06c5c
DC
3322{
3323 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3324 want_address,
3325 noside);
63d06c5c
DC
3326
3327 if (retval == NULL)
ac3eeb49
MS
3328 error (_("No symbol \"%s\" in namespace \"%s\"."),
3329 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3330
3331 return retval;
3332}
3333
3334/* A helper function used by value_namespace_elt and
3335 value_struct_elt_for_reference. It looks up NAME inside the
3336 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3337 is a class and NAME refers to a type in CURTYPE itself (as opposed
3338 to, say, some base class of CURTYPE). */
3339
3340static struct value *
3341value_maybe_namespace_elt (const struct type *curtype,
0d5de010 3342 char *name, int want_address,
63d06c5c 3343 enum noside noside)
79c2c32d
DC
3344{
3345 const char *namespace_name = TYPE_TAG_NAME (curtype);
3346 struct symbol *sym;
0d5de010 3347 struct value *result;
79c2c32d 3348
13387711 3349 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3350 get_selected_block (0), VAR_DOMAIN);
3351
3352 if (sym == NULL)
3353 {
3354 char *concatenated_name = alloca (strlen (namespace_name) + 2
3355 + strlen (name) + 1);
3356
3357 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3358 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3359 }
79c2c32d
DC
3360
3361 if (sym == NULL)
63d06c5c 3362 return NULL;
79c2c32d
DC
3363 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3364 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3365 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3366 else
0d5de010
DJ
3367 result = value_of_variable (sym, get_selected_block (0));
3368
3369 if (result && want_address)
3370 result = value_addr (result);
3371
3372 return result;
79c2c32d
DC
3373}
3374
dfcee124 3375/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3376
c906108c 3377 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3378 and refer to the values computed for the object pointed to. */
c906108c
SS
3379
3380struct type *
dfcee124
AG
3381value_rtti_indirect_type (struct value *v, int *full,
3382 int *top, int *using_enc)
c906108c 3383{
f23631e4 3384 struct value *target;
dfcee124
AG
3385 struct type *type, *real_type, *target_type;
3386
3387 type = value_type (v);
3388 type = check_typedef (type);
3389 if (TYPE_CODE (type) == TYPE_CODE_REF)
3390 target = coerce_ref (v);
3391 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3392 target = value_ind (v);
3393 else
3394 return NULL;
c906108c 3395
dfcee124
AG
3396 real_type = value_rtti_type (target, full, top, using_enc);
3397
3398 if (real_type)
3399 {
3400 /* Copy qualifiers to the referenced object. */
3401 target_type = value_type (target);
3402 real_type = make_cv_type (TYPE_CONST (target_type),
3403 TYPE_VOLATILE (target_type), real_type, NULL);
3404 if (TYPE_CODE (type) == TYPE_CODE_REF)
3405 real_type = lookup_reference_type (real_type);
3406 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3407 real_type = lookup_pointer_type (real_type);
3408 else
3409 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3410
3411 /* Copy qualifiers to the pointer/reference. */
3412 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3413 real_type, NULL);
3414 }
c906108c 3415
dfcee124 3416 return real_type;
c906108c
SS
3417}
3418
3419/* Given a value pointed to by ARGP, check its real run-time type, and
3420 if that is different from the enclosing type, create a new value
3421 using the real run-time type as the enclosing type (and of the same
3422 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3423 be the correct offset to the enclosed object. RTYPE is the type,
3424 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3425 by value_rtti_type(). If these are available, they can be supplied
3426 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3427 NULL if they're not available. */
c906108c 3428
f23631e4 3429struct value *
ac3eeb49
MS
3430value_full_object (struct value *argp,
3431 struct type *rtype,
3432 int xfull, int xtop,
fba45db2 3433 int xusing_enc)
c906108c 3434{
c5aa993b 3435 struct type *real_type;
c906108c
SS
3436 int full = 0;
3437 int top = -1;
3438 int using_enc = 0;
f23631e4 3439 struct value *new_val;
c906108c
SS
3440
3441 if (rtype)
3442 {
3443 real_type = rtype;
3444 full = xfull;
3445 top = xtop;
3446 using_enc = xusing_enc;
3447 }
3448 else
3449 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3450
ac3eeb49 3451 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3452 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3453 return argp;
3454
a7860e76
TT
3455 /* In a destructor we might see a real type that is a superclass of
3456 the object's type. In this case it is better to leave the object
3457 as-is. */
3458 if (full
3459 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3460 return argp;
3461
c906108c 3462 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3463 type is wrong, set it. */
3464 /* pai: FIXME -- sounds iffy */
c906108c
SS
3465 if (full)
3466 {
4dfea560
DE
3467 argp = value_copy (argp);
3468 set_value_enclosing_type (argp, real_type);
c906108c
SS
3469 return argp;
3470 }
3471
581e13c1 3472 /* Check if object is in memory. */
c906108c
SS
3473 if (VALUE_LVAL (argp) != lval_memory)
3474 {
3e43a32a
MS
3475 warning (_("Couldn't retrieve complete object of RTTI "
3476 "type %s; object may be in register(s)."),
ac3eeb49 3477 TYPE_NAME (real_type));
c5aa993b 3478
c906108c
SS
3479 return argp;
3480 }
c5aa993b 3481
ac3eeb49
MS
3482 /* All other cases -- retrieve the complete object. */
3483 /* Go back by the computed top_offset from the beginning of the
3484 object, adjusting for the embedded offset of argp if that's what
3485 value_rtti_type used for its computation. */
42ae5230 3486 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3487 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3488 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3489 set_value_embedded_offset (new_val, (using_enc
3490 ? top + value_embedded_offset (argp)
3491 : top));
c906108c
SS
3492 return new_val;
3493}
3494
389e51db 3495
85bc8cb7
JK
3496/* Return the value of the local variable, if one exists. Throw error
3497 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3498
f23631e4 3499struct value *
85bc8cb7 3500value_of_this (const struct language_defn *lang)
c906108c 3501{
66a17cb6 3502 struct symbol *sym;
c906108c 3503 struct block *b;
206415a3 3504 struct frame_info *frame;
c906108c 3505
66a17cb6 3506 if (!lang->la_name_of_this)
85bc8cb7 3507 error (_("no `this' in current language"));
aee28ec6 3508
85bc8cb7 3509 frame = get_selected_frame (_("no frame selected"));
c906108c 3510
66a17cb6 3511 b = get_frame_block (frame, NULL);
c906108c 3512
66a17cb6 3513 sym = lookup_language_this (lang, b);
c906108c 3514 if (sym == NULL)
85bc8cb7
JK
3515 error (_("current stack frame does not contain a variable named `%s'"),
3516 lang->la_name_of_this);
3517
3518 return read_var_value (sym, frame);
3519}
3520
3521/* Return the value of the local variable, if one exists. Return NULL
3522 otherwise. Never throw error. */
3523
3524struct value *
3525value_of_this_silent (const struct language_defn *lang)
3526{
3527 struct value *ret = NULL;
3528 volatile struct gdb_exception except;
3529
3530 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3531 {
85bc8cb7 3532 ret = value_of_this (lang);
c906108c
SS
3533 }
3534
d069f99d
AF
3535 return ret;
3536}
3537
ac3eeb49
MS
3538/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3539 elements long, starting at LOWBOUND. The result has the same lower
3540 bound as the original ARRAY. */
c906108c 3541
f23631e4
AC
3542struct value *
3543value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3544{
3545 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3546 LONGEST lowerbound, upperbound;
f23631e4 3547 struct value *slice;
c906108c 3548 struct type *array_type;
ac3eeb49 3549
df407dfe 3550 array_type = check_typedef (value_type (array));
c906108c 3551 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3552 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3553 error (_("cannot take slice of non-array"));
ac3eeb49 3554
c906108c
SS
3555 range_type = TYPE_INDEX_TYPE (array_type);
3556 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3557 error (_("slice from bad array or bitstring"));
ac3eeb49 3558
c906108c 3559 if (lowbound < lowerbound || length < 0
db034ac5 3560 || lowbound + length - 1 > upperbound)
8a3fe4f8 3561 error (_("slice out of range"));
ac3eeb49 3562
c906108c
SS
3563 /* FIXME-type-allocation: need a way to free this type when we are
3564 done with it. */
c5aa993b 3565 slice_range_type = create_range_type ((struct type *) NULL,
c906108c 3566 TYPE_TARGET_TYPE (range_type),
a7c88acd 3567 lowbound,
ac3eeb49 3568 lowbound + length - 1);
ac3eeb49 3569
a7c88acd
JB
3570 {
3571 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3572 LONGEST offset
3573 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3574
a7c88acd
JB
3575 slice_type = create_array_type ((struct type *) NULL,
3576 element_type,
3577 slice_range_type);
3578 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3579
a7c88acd
JB
3580 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3581 slice = allocate_value_lazy (slice_type);
3582 else
3583 {
3584 slice = allocate_value (slice_type);
3585 value_contents_copy (slice, 0, array, offset,
3586 TYPE_LENGTH (slice_type));
3587 }
3588
3589 set_value_component_location (slice, array);
3590 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3591 set_value_offset (slice, value_offset (array) + offset);
3592 }
ac3eeb49 3593
c906108c
SS
3594 return slice;
3595}
3596
ac3eeb49
MS
3597/* Create a value for a FORTRAN complex number. Currently most of the
3598 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3599 composed of 2 doubles. This really should be a smarter routine
3600 that figures out precision inteligently as opposed to assuming
ac3eeb49 3601 doubles. FIXME: fmb */
c906108c 3602
f23631e4 3603struct value *
ac3eeb49
MS
3604value_literal_complex (struct value *arg1,
3605 struct value *arg2,
3606 struct type *type)
c906108c 3607{
f23631e4 3608 struct value *val;
c906108c
SS
3609 struct type *real_type = TYPE_TARGET_TYPE (type);
3610
3611 val = allocate_value (type);
3612 arg1 = value_cast (real_type, arg1);
3613 arg2 = value_cast (real_type, arg2);
3614
990a07ab 3615 memcpy (value_contents_raw (val),
0fd88904 3616 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3617 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3618 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3619 return val;
3620}
3621
ac3eeb49 3622/* Cast a value into the appropriate complex data type. */
c906108c 3623
f23631e4
AC
3624static struct value *
3625cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3626{
3627 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3628
df407dfe 3629 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3630 {
df407dfe 3631 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3632 struct value *re_val = allocate_value (val_real_type);
3633 struct value *im_val = allocate_value (val_real_type);
c906108c 3634
990a07ab 3635 memcpy (value_contents_raw (re_val),
0fd88904 3636 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3637 memcpy (value_contents_raw (im_val),
0fd88904 3638 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3639 TYPE_LENGTH (val_real_type));
c906108c
SS
3640
3641 return value_literal_complex (re_val, im_val, type);
3642 }
df407dfe
AC
3643 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3644 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3645 return value_literal_complex (val,
3646 value_zero (real_type, not_lval),
3647 type);
c906108c 3648 else
8a3fe4f8 3649 error (_("cannot cast non-number to complex"));
c906108c
SS
3650}
3651
3652void
fba45db2 3653_initialize_valops (void)
c906108c 3654{
5bf193a2
AC
3655 add_setshow_boolean_cmd ("overload-resolution", class_support,
3656 &overload_resolution, _("\
3657Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3658Show overload resolution in evaluating C++ functions."),
3659 NULL, NULL,
920d2a44 3660 show_overload_resolution,
5bf193a2 3661 &setlist, &showlist);
c906108c 3662 overload_resolution = 1;
c906108c 3663}
This page took 1.79353 seconds and 4 git commands to generate.