Add ability to return rvalue reference values from value_ref
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
61baf725 3 Copyright (C) 1986-2017 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
f4c5303c 39#include "observer.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
c906108c 42
ccce17b0 43extern unsigned int overload_debug;
c906108c
SS
44/* Local functions. */
45
ad2f7632
DJ
46static int typecmp (int staticp, int varargs, int nargs,
47 struct field t1[], struct value *t2[]);
c906108c 48
714f19d5 49static struct value *search_struct_field (const char *, struct value *,
8a13d42d 50 struct type *, int);
c906108c 51
714f19d5
TT
52static struct value *search_struct_method (const char *, struct value **,
53 struct value **,
6b850546 54 LONGEST, int *, struct type *);
c906108c 55
da096638 56static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
57 const char *, const char *,
58 struct symbol ***,
7322dca9
SW
59 struct badness_vector **,
60 const int no_adl);
8d577d32
DC
61
62static
da096638 63int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
64 const char *, const char *,
65 int, struct symbol ***,
7322dca9
SW
66 struct badness_vector **, int *,
67 const int no_adl);
ac3eeb49 68
9cf95373 69static int find_oload_champ (struct value **, int, int,
233e8b28
SC
70 struct fn_field *, VEC (xmethod_worker_ptr) *,
71 struct symbol **, struct badness_vector **);
ac3eeb49 72
2bca57ba 73static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
74
75enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
76
77static enum
ac3eeb49
MS
78oload_classification classify_oload_match (struct badness_vector *,
79 int, int);
8d577d32 80
ac3eeb49
MS
81static struct value *value_struct_elt_for_reference (struct type *,
82 int, struct type *,
c848d642 83 const char *,
ac3eeb49
MS
84 struct type *,
85 int, enum noside);
79c2c32d 86
ac3eeb49 87static struct value *value_namespace_elt (const struct type *,
c848d642 88 const char *, int , enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 91 const char *, int,
ac3eeb49 92 enum noside);
63d06c5c 93
a14ed312 94static CORE_ADDR allocate_space_in_inferior (int);
c906108c 95
f23631e4 96static struct value *cast_into_complex (struct type *, struct value *);
c906108c 97
233e8b28 98static void find_method_list (struct value **, const char *,
6b850546 99 LONGEST, struct type *, struct fn_field **, int *,
233e8b28 100 VEC (xmethod_worker_ptr) **,
6b850546 101 struct type **, LONGEST *);
7a292a7a 102
a14ed312 103void _initialize_valops (void);
c906108c 104
c906108c 105#if 0
ac3eeb49
MS
106/* Flag for whether we want to abandon failed expression evals by
107 default. */
108
c906108c
SS
109static int auto_abandon = 0;
110#endif
111
112int overload_resolution = 0;
920d2a44
AC
113static void
114show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
115 struct cmd_list_element *c,
116 const char *value)
920d2a44 117{
3e43a32a
MS
118 fprintf_filtered (file, _("Overload resolution in evaluating "
119 "C++ functions is %s.\n"),
920d2a44
AC
120 value);
121}
242bfc55 122
3e3b026f
UW
123/* Find the address of function name NAME in the inferior. If OBJF_P
124 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
125 is defined. */
c906108c 126
f23631e4 127struct value *
3e3b026f 128find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 129{
d12307c1 130 struct block_symbol sym;
a109c7c1 131
2570f2b7 132 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
d12307c1 133 if (sym.symbol != NULL)
c906108c 134 {
d12307c1 135 if (SYMBOL_CLASS (sym.symbol) != LOC_BLOCK)
c906108c 136 {
8a3fe4f8 137 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
138 name);
139 }
3e3b026f
UW
140
141 if (objf_p)
d12307c1 142 *objf_p = symbol_objfile (sym.symbol);
3e3b026f 143
d12307c1 144 return value_of_variable (sym.symbol, sym.block);
c906108c
SS
145 }
146 else
147 {
7c7b6655
TT
148 struct bound_minimal_symbol msymbol =
149 lookup_bound_minimal_symbol (name);
a109c7c1 150
7c7b6655 151 if (msymbol.minsym != NULL)
c906108c 152 {
7c7b6655 153 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
154 struct gdbarch *gdbarch = get_objfile_arch (objfile);
155
c906108c 156 struct type *type;
4478b372 157 CORE_ADDR maddr;
3e3b026f 158 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
159 type = lookup_function_type (type);
160 type = lookup_pointer_type (type);
77e371c0 161 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
162
163 if (objf_p)
164 *objf_p = objfile;
165
4478b372 166 return value_from_pointer (type, maddr);
c906108c
SS
167 }
168 else
169 {
c5aa993b 170 if (!target_has_execution)
3e43a32a
MS
171 error (_("evaluation of this expression "
172 "requires the target program to be active"));
c5aa993b 173 else
3e43a32a
MS
174 error (_("evaluation of this expression requires the "
175 "program to have a function \"%s\"."),
176 name);
c906108c
SS
177 }
178 }
179}
180
ac3eeb49
MS
181/* Allocate NBYTES of space in the inferior using the inferior's
182 malloc and return a value that is a pointer to the allocated
183 space. */
c906108c 184
f23631e4 185struct value *
fba45db2 186value_allocate_space_in_inferior (int len)
c906108c 187{
3e3b026f
UW
188 struct objfile *objf;
189 struct value *val = find_function_in_inferior ("malloc", &objf);
190 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 191 struct value *blocklen;
c906108c 192
3e3b026f 193 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
194 val = call_function_by_hand (val, 1, &blocklen);
195 if (value_logical_not (val))
196 {
197 if (!target_has_execution)
3e43a32a
MS
198 error (_("No memory available to program now: "
199 "you need to start the target first"));
c5aa993b 200 else
8a3fe4f8 201 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
202 }
203 return val;
204}
205
206static CORE_ADDR
fba45db2 207allocate_space_in_inferior (int len)
c906108c
SS
208{
209 return value_as_long (value_allocate_space_in_inferior (len));
210}
211
6af87b03
AR
212/* Cast struct value VAL to type TYPE and return as a value.
213 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
214 for this to work. Typedef to one of the codes is permitted.
215 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
216
217static struct value *
218value_cast_structs (struct type *type, struct value *v2)
219{
220 struct type *t1;
221 struct type *t2;
222 struct value *v;
223
224 gdb_assert (type != NULL && v2 != NULL);
225
226 t1 = check_typedef (type);
227 t2 = check_typedef (value_type (v2));
228
229 /* Check preconditions. */
230 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
231 || TYPE_CODE (t1) == TYPE_CODE_UNION)
232 && !!"Precondition is that type is of STRUCT or UNION kind.");
233 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
234 || TYPE_CODE (t2) == TYPE_CODE_UNION)
235 && !!"Precondition is that value is of STRUCT or UNION kind");
236
191ca0a1
CM
237 if (TYPE_NAME (t1) != NULL
238 && TYPE_NAME (t2) != NULL
239 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
240 return NULL;
241
6af87b03
AR
242 /* Upcasting: look in the type of the source to see if it contains the
243 type of the target as a superclass. If so, we'll need to
244 offset the pointer rather than just change its type. */
245 if (TYPE_NAME (t1) != NULL)
246 {
247 v = search_struct_field (type_name_no_tag (t1),
8a13d42d 248 v2, t2, 1);
6af87b03
AR
249 if (v)
250 return v;
251 }
252
253 /* Downcasting: look in the type of the target to see if it contains the
254 type of the source as a superclass. If so, we'll need to
9c3c02fd 255 offset the pointer rather than just change its type. */
6af87b03
AR
256 if (TYPE_NAME (t2) != NULL)
257 {
9c3c02fd 258 /* Try downcasting using the run-time type of the value. */
6b850546
DT
259 int full, using_enc;
260 LONGEST top;
9c3c02fd
TT
261 struct type *real_type;
262
263 real_type = value_rtti_type (v2, &full, &top, &using_enc);
264 if (real_type)
265 {
266 v = value_full_object (v2, real_type, full, top, using_enc);
267 v = value_at_lazy (real_type, value_address (v));
9f1f738a 268 real_type = value_type (v);
9c3c02fd
TT
269
270 /* We might be trying to cast to the outermost enclosing
271 type, in which case search_struct_field won't work. */
272 if (TYPE_NAME (real_type) != NULL
273 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
274 return v;
275
8a13d42d 276 v = search_struct_field (type_name_no_tag (t2), v, real_type, 1);
9c3c02fd
TT
277 if (v)
278 return v;
279 }
280
281 /* Try downcasting using information from the destination type
282 T2. This wouldn't work properly for classes with virtual
283 bases, but those were handled above. */
6af87b03 284 v = search_struct_field (type_name_no_tag (t2),
8a13d42d 285 value_zero (t1, not_lval), t1, 1);
6af87b03
AR
286 if (v)
287 {
288 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 289 CORE_ADDR addr2 = value_address (v2);
a109c7c1 290
42ae5230 291 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
292 return value_at (type, addr2);
293 }
294 }
694182d2
DJ
295
296 return NULL;
6af87b03
AR
297}
298
fb933624
DJ
299/* Cast one pointer or reference type to another. Both TYPE and
300 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
301 reference types. If SUBCLASS_CHECK is non-zero, this will force a
302 check to see whether TYPE is a superclass of ARG2's type. If
303 SUBCLASS_CHECK is zero, then the subclass check is done only when
304 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
305
306struct value *
b1af9e97
TT
307value_cast_pointers (struct type *type, struct value *arg2,
308 int subclass_check)
fb933624 309{
d160942f 310 struct type *type1 = check_typedef (type);
fb933624 311 struct type *type2 = check_typedef (value_type (arg2));
d160942f 312 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
313 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
314
315 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
316 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 317 && (subclass_check || !value_logical_not (arg2)))
fb933624 318 {
6af87b03 319 struct value *v2;
fb933624 320
6af87b03
AR
321 if (TYPE_CODE (type2) == TYPE_CODE_REF)
322 v2 = coerce_ref (arg2);
323 else
324 v2 = value_ind (arg2);
3e43a32a
MS
325 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
326 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
327 v2 = value_cast_structs (t1, v2);
328 /* At this point we have what we can have, un-dereference if needed. */
329 if (v2)
fb933624 330 {
6af87b03 331 struct value *v = value_addr (v2);
a109c7c1 332
6af87b03
AR
333 deprecated_set_value_type (v, type);
334 return v;
fb933624 335 }
8301c89e 336 }
fb933624
DJ
337
338 /* No superclass found, just change the pointer type. */
0d5de010 339 arg2 = value_copy (arg2);
fb933624 340 deprecated_set_value_type (arg2, type);
4dfea560 341 set_value_enclosing_type (arg2, type);
fb933624
DJ
342 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
343 return arg2;
344}
345
c906108c
SS
346/* Cast value ARG2 to type TYPE and return as a value.
347 More general than a C cast: accepts any two types of the same length,
348 and if ARG2 is an lvalue it can be cast into anything at all. */
349/* In C++, casts may change pointer or object representations. */
350
f23631e4
AC
351struct value *
352value_cast (struct type *type, struct value *arg2)
c906108c 353{
52f0bd74
AC
354 enum type_code code1;
355 enum type_code code2;
356 int scalar;
c906108c
SS
357 struct type *type2;
358
359 int convert_to_boolean = 0;
c5aa993b 360
df407dfe 361 if (value_type (arg2) == type)
c906108c
SS
362 return arg2;
363
6af87b03
AR
364 code1 = TYPE_CODE (check_typedef (type));
365
366 /* Check if we are casting struct reference to struct reference. */
367 if (code1 == TYPE_CODE_REF)
368 {
369 /* We dereference type; then we recurse and finally
581e13c1 370 we generate value of the given reference. Nothing wrong with
6af87b03
AR
371 that. */
372 struct type *t1 = check_typedef (type);
373 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
374 struct value *val = value_cast (dereftype, arg2);
a109c7c1 375
a65cfae5 376 return value_ref (val, TYPE_CODE (t1));
6af87b03
AR
377 }
378
379 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
380
381 if (code2 == TYPE_CODE_REF)
382 /* We deref the value and then do the cast. */
383 return value_cast (type, coerce_ref (arg2));
384
f168693b 385 type = check_typedef (type);
c906108c 386 code1 = TYPE_CODE (type);
994b9211 387 arg2 = coerce_ref (arg2);
df407dfe 388 type2 = check_typedef (value_type (arg2));
c906108c 389
fb933624
DJ
390 /* You can't cast to a reference type. See value_cast_pointers
391 instead. */
392 gdb_assert (code1 != TYPE_CODE_REF);
393
ac3eeb49
MS
394 /* A cast to an undetermined-length array_type, such as
395 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
396 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
397 if (code1 == TYPE_CODE_ARRAY)
398 {
399 struct type *element_type = TYPE_TARGET_TYPE (type);
400 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 401
d78df370 402 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
403 {
404 struct type *range_type = TYPE_INDEX_TYPE (type);
405 int val_length = TYPE_LENGTH (type2);
406 LONGEST low_bound, high_bound, new_length;
a109c7c1 407
c906108c
SS
408 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
409 low_bound = 0, high_bound = 0;
410 new_length = val_length / element_length;
411 if (val_length % element_length != 0)
3e43a32a
MS
412 warning (_("array element type size does not "
413 "divide object size in cast"));
ac3eeb49
MS
414 /* FIXME-type-allocation: need a way to free this type when
415 we are done with it. */
0c9c3474
SA
416 range_type = create_static_range_type ((struct type *) NULL,
417 TYPE_TARGET_TYPE (range_type),
418 low_bound,
419 new_length + low_bound - 1);
ac3eeb49
MS
420 deprecated_set_value_type (arg2,
421 create_array_type ((struct type *) NULL,
422 element_type,
423 range_type));
c906108c
SS
424 return arg2;
425 }
426 }
427
428 if (current_language->c_style_arrays
3bdf2bbd
KW
429 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
430 && !TYPE_VECTOR (type2))
c906108c
SS
431 arg2 = value_coerce_array (arg2);
432
433 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
434 arg2 = value_coerce_function (arg2);
435
df407dfe 436 type2 = check_typedef (value_type (arg2));
c906108c
SS
437 code2 = TYPE_CODE (type2);
438
439 if (code1 == TYPE_CODE_COMPLEX)
440 return cast_into_complex (type, arg2);
441 if (code1 == TYPE_CODE_BOOL)
442 {
443 code1 = TYPE_CODE_INT;
444 convert_to_boolean = 1;
445 }
446 if (code1 == TYPE_CODE_CHAR)
447 code1 = TYPE_CODE_INT;
448 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
449 code2 = TYPE_CODE_INT;
450
451 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
452 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
453 || code2 == TYPE_CODE_RANGE);
c906108c 454
6af87b03
AR
455 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
456 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 457 && TYPE_NAME (type) != 0)
694182d2
DJ
458 {
459 struct value *v = value_cast_structs (type, arg2);
a109c7c1 460
694182d2
DJ
461 if (v)
462 return v;
463 }
464
c906108c
SS
465 if (code1 == TYPE_CODE_FLT && scalar)
466 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
467 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
468 {
e17a4113 469 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
470 int dec_len = TYPE_LENGTH (type);
471 gdb_byte dec[16];
472
473 if (code2 == TYPE_CODE_FLT)
e17a4113 474 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
475 else if (code2 == TYPE_CODE_DECFLOAT)
476 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 477 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
478 else
479 /* The only option left is an integral type. */
e17a4113 480 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
481
482 return value_from_decfloat (type, dec);
483 }
c906108c
SS
484 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
485 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
486 && (scalar || code2 == TYPE_CODE_PTR
487 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
488 {
489 LONGEST longest;
c5aa993b 490
2bf1f4a1 491 /* When we cast pointers to integers, we mustn't use
76e71323 492 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
493 represents, as value_as_long would. GDB should evaluate
494 expressions just as the compiler would --- and the compiler
495 sees a cast as a simple reinterpretation of the pointer's
496 bits. */
497 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
498 longest = extract_unsigned_integer
499 (value_contents (arg2), TYPE_LENGTH (type2),
500 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
501 else
502 longest = value_as_long (arg2);
802db21b 503 return value_from_longest (type, convert_to_boolean ?
716c501e 504 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 505 }
ac3eeb49
MS
506 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
507 || code2 == TYPE_CODE_ENUM
508 || code2 == TYPE_CODE_RANGE))
634acd5f 509 {
4603e466
DT
510 /* TYPE_LENGTH (type) is the length of a pointer, but we really
511 want the length of an address! -- we are really dealing with
512 addresses (i.e., gdb representations) not pointers (i.e.,
513 target representations) here.
514
515 This allows things like "print *(int *)0x01000234" to work
516 without printing a misleading message -- which would
517 otherwise occur when dealing with a target having two byte
518 pointers and four byte addresses. */
519
50810684 520 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 521 LONGEST longest = value_as_long (arg2);
a109c7c1 522
4603e466 523 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 524 {
4603e466
DT
525 if (longest >= ((LONGEST) 1 << addr_bit)
526 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 527 warning (_("value truncated"));
634acd5f
AC
528 }
529 return value_from_longest (type, longest);
530 }
0d5de010
DJ
531 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
532 && value_as_long (arg2) == 0)
533 {
534 struct value *result = allocate_value (type);
a109c7c1 535
ad4820ab 536 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
537 return result;
538 }
539 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
540 && value_as_long (arg2) == 0)
541 {
542 /* The Itanium C++ ABI represents NULL pointers to members as
543 minus one, instead of biasing the normal case. */
544 return value_from_longest (type, -1);
545 }
8954db33
AB
546 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
547 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
548 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
549 error (_("Cannot convert between vector values of different sizes"));
550 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
551 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
552 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
553 else if (code1 == TYPE_CODE_VOID)
554 {
555 return value_zero (type, not_lval);
556 }
c906108c
SS
557 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
558 {
559 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 560 return value_cast_pointers (type, arg2, 0);
fb933624 561
0d5de010 562 arg2 = value_copy (arg2);
04624583 563 deprecated_set_value_type (arg2, type);
4dfea560 564 set_value_enclosing_type (arg2, type);
b44d461b 565 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
566 return arg2;
567 }
c906108c 568 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 569 return value_at_lazy (type, value_address (arg2));
c906108c
SS
570 else
571 {
8a3fe4f8 572 error (_("Invalid cast."));
c906108c
SS
573 return 0;
574 }
575}
576
4e8f195d
TT
577/* The C++ reinterpret_cast operator. */
578
579struct value *
580value_reinterpret_cast (struct type *type, struct value *arg)
581{
582 struct value *result;
583 struct type *real_type = check_typedef (type);
584 struct type *arg_type, *dest_type;
585 int is_ref = 0;
586 enum type_code dest_code, arg_code;
587
588 /* Do reference, function, and array conversion. */
589 arg = coerce_array (arg);
590
591 /* Attempt to preserve the type the user asked for. */
592 dest_type = type;
593
594 /* If we are casting to a reference type, transform
595 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
596 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
597 {
598 is_ref = 1;
599 arg = value_addr (arg);
600 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
601 real_type = lookup_pointer_type (real_type);
602 }
603
604 arg_type = value_type (arg);
605
606 dest_code = TYPE_CODE (real_type);
607 arg_code = TYPE_CODE (arg_type);
608
609 /* We can convert pointer types, or any pointer type to int, or int
610 type to pointer. */
611 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
612 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
613 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
614 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
615 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
616 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
617 || (dest_code == arg_code
618 && (dest_code == TYPE_CODE_PTR
619 || dest_code == TYPE_CODE_METHODPTR
620 || dest_code == TYPE_CODE_MEMBERPTR)))
621 result = value_cast (dest_type, arg);
622 else
623 error (_("Invalid reinterpret_cast"));
624
625 if (is_ref)
a65cfae5
AV
626 result = value_cast (type, value_ref (value_ind (result),
627 TYPE_CODE (type)));
4e8f195d
TT
628
629 return result;
630}
631
632/* A helper for value_dynamic_cast. This implements the first of two
633 runtime checks: we iterate over all the base classes of the value's
634 class which are equal to the desired class; if only one of these
635 holds the value, then it is the answer. */
636
637static int
638dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc 639 const gdb_byte *valaddr,
6b850546 640 LONGEST embedded_offset,
4e8f195d 641 CORE_ADDR address,
8af8e3bc 642 struct value *val,
4e8f195d
TT
643 struct type *search_type,
644 CORE_ADDR arg_addr,
645 struct type *arg_type,
646 struct value **result)
647{
648 int i, result_count = 0;
649
650 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
651 {
6b850546
DT
652 LONGEST offset = baseclass_offset (search_type, i, valaddr,
653 embedded_offset,
654 address, val);
a109c7c1 655
4e8f195d
TT
656 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
657 {
8af8e3bc
PA
658 if (address + embedded_offset + offset >= arg_addr
659 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
660 {
661 ++result_count;
662 if (!*result)
663 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 664 address + embedded_offset + offset);
4e8f195d
TT
665 }
666 }
667 else
668 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
669 valaddr,
670 embedded_offset + offset,
671 address, val,
4e8f195d
TT
672 TYPE_BASECLASS (search_type, i),
673 arg_addr,
674 arg_type,
675 result);
676 }
677
678 return result_count;
679}
680
681/* A helper for value_dynamic_cast. This implements the second of two
682 runtime checks: we look for a unique public sibling class of the
683 argument's declared class. */
684
685static int
686dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc 687 const gdb_byte *valaddr,
6b850546 688 LONGEST embedded_offset,
4e8f195d 689 CORE_ADDR address,
8af8e3bc 690 struct value *val,
4e8f195d
TT
691 struct type *search_type,
692 struct value **result)
693{
694 int i, result_count = 0;
695
696 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
697 {
6b850546 698 LONGEST offset;
4e8f195d
TT
699
700 if (! BASETYPE_VIA_PUBLIC (search_type, i))
701 continue;
702
8af8e3bc
PA
703 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
704 address, val);
4e8f195d
TT
705 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
706 {
707 ++result_count;
708 if (*result == NULL)
709 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 710 address + embedded_offset + offset);
4e8f195d
TT
711 }
712 else
713 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
714 valaddr,
715 embedded_offset + offset,
716 address, val,
4e8f195d
TT
717 TYPE_BASECLASS (search_type, i),
718 result);
719 }
720
721 return result_count;
722}
723
724/* The C++ dynamic_cast operator. */
725
726struct value *
727value_dynamic_cast (struct type *type, struct value *arg)
728{
6b850546
DT
729 int full, using_enc;
730 LONGEST top;
4e8f195d
TT
731 struct type *resolved_type = check_typedef (type);
732 struct type *arg_type = check_typedef (value_type (arg));
733 struct type *class_type, *rtti_type;
734 struct value *result, *tem, *original_arg = arg;
735 CORE_ADDR addr;
736 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
737
738 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
739 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
740 error (_("Argument to dynamic_cast must be a pointer or reference type"));
741 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 742 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
743 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
744
745 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
746 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
747 {
748 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
749 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
750 && value_as_long (arg) == 0))
751 error (_("Argument to dynamic_cast does not have pointer type"));
752 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
753 {
754 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 755 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
756 error (_("Argument to dynamic_cast does "
757 "not have pointer to class type"));
4e8f195d
TT
758 }
759
760 /* Handle NULL pointers. */
761 if (value_as_long (arg) == 0)
762 return value_zero (type, not_lval);
763
764 arg = value_ind (arg);
765 }
766 else
767 {
4753d33b 768 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
769 error (_("Argument to dynamic_cast does not have class type"));
770 }
771
772 /* If the classes are the same, just return the argument. */
773 if (class_types_same_p (class_type, arg_type))
774 return value_cast (type, arg);
775
776 /* If the target type is a unique base class of the argument's
777 declared type, just cast it. */
778 if (is_ancestor (class_type, arg_type))
779 {
780 if (is_unique_ancestor (class_type, arg))
781 return value_cast (type, original_arg);
782 error (_("Ambiguous dynamic_cast"));
783 }
784
785 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
786 if (! rtti_type)
787 error (_("Couldn't determine value's most derived type for dynamic_cast"));
788
789 /* Compute the most derived object's address. */
790 addr = value_address (arg);
791 if (full)
792 {
793 /* Done. */
794 }
795 else if (using_enc)
796 addr += top;
797 else
798 addr += top + value_embedded_offset (arg);
799
800 /* dynamic_cast<void *> means to return a pointer to the
801 most-derived object. */
802 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
803 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
804 return value_at_lazy (type, addr);
805
806 tem = value_at (type, addr);
9f1f738a 807 type = value_type (tem);
4e8f195d
TT
808
809 /* The first dynamic check specified in 5.2.7. */
810 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
811 {
812 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
813 return tem;
814 result = NULL;
815 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
816 value_contents_for_printing (tem),
817 value_embedded_offset (tem),
818 value_address (tem), tem,
4e8f195d
TT
819 rtti_type, addr,
820 arg_type,
821 &result) == 1)
822 return value_cast (type,
a65cfae5
AV
823 is_ref
824 ? value_ref (result, TYPE_CODE (resolved_type))
825 : value_addr (result));
4e8f195d
TT
826 }
827
828 /* The second dynamic check specified in 5.2.7. */
829 result = NULL;
830 if (is_public_ancestor (arg_type, rtti_type)
831 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
832 value_contents_for_printing (tem),
833 value_embedded_offset (tem),
834 value_address (tem), tem,
4e8f195d
TT
835 rtti_type, &result) == 1)
836 return value_cast (type,
a65cfae5
AV
837 is_ref
838 ? value_ref (result, TYPE_CODE (resolved_type))
839 : value_addr (result));
4e8f195d
TT
840
841 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
842 return value_zero (type, not_lval);
843
844 error (_("dynamic_cast failed"));
845}
846
c906108c
SS
847/* Create a value of type TYPE that is zero, and return it. */
848
f23631e4 849struct value *
fba45db2 850value_zero (struct type *type, enum lval_type lv)
c906108c 851{
f23631e4 852 struct value *val = allocate_value (type);
c906108c 853
bb7da2bf 854 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
855 return val;
856}
857
18a46dbe 858/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
859
860struct value *
18a46dbe 861value_one (struct type *type)
301f0ecf
DE
862{
863 struct type *type1 = check_typedef (type);
4e608b4f 864 struct value *val;
301f0ecf
DE
865
866 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
867 {
e17a4113 868 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 869 gdb_byte v[16];
a109c7c1 870
e17a4113 871 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
872 val = value_from_decfloat (type, v);
873 }
874 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
875 {
876 val = value_from_double (type, (DOUBLEST) 1);
877 }
878 else if (is_integral_type (type1))
879 {
880 val = value_from_longest (type, (LONGEST) 1);
881 }
120bd360
KW
882 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
883 {
884 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
885 int i;
886 LONGEST low_bound, high_bound;
120bd360
KW
887 struct value *tmp;
888
cfa6f054
KW
889 if (!get_array_bounds (type1, &low_bound, &high_bound))
890 error (_("Could not determine the vector bounds"));
891
120bd360 892 val = allocate_value (type);
cfa6f054 893 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 894 {
18a46dbe 895 tmp = value_one (eltype);
120bd360
KW
896 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
897 value_contents_all (tmp), TYPE_LENGTH (eltype));
898 }
899 }
301f0ecf
DE
900 else
901 {
902 error (_("Not a numeric type."));
903 }
904
18a46dbe
JK
905 /* value_one result is never used for assignments to. */
906 gdb_assert (VALUE_LVAL (val) == not_lval);
907
301f0ecf
DE
908 return val;
909}
910
80180f79
SA
911/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
912 The type of the created value may differ from the passed type TYPE.
913 Make sure to retrieve the returned values's new type after this call
914 e.g. in case the type is a variable length array. */
4e5d721f
DE
915
916static struct value *
917get_value_at (struct type *type, CORE_ADDR addr, int lazy)
918{
919 struct value *val;
920
921 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
922 error (_("Attempt to dereference a generic pointer."));
923
a3d34bf4 924 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 925
a3d34bf4
PA
926 if (!lazy)
927 value_fetch_lazy (val);
4e5d721f
DE
928
929 return val;
930}
931
070ad9f0 932/* Return a value with type TYPE located at ADDR.
c906108c
SS
933
934 Call value_at only if the data needs to be fetched immediately;
935 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
936 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 937 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 938 is tested in the value_contents macro, which is used if and when
80180f79
SA
939 the contents are actually required. The type of the created value
940 may differ from the passed type TYPE. Make sure to retrieve the
941 returned values's new type after this call e.g. in case the type
942 is a variable length array.
c906108c
SS
943
944 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 945 adjustments before or after calling it. */
c906108c 946
f23631e4 947struct value *
00a4c844 948value_at (struct type *type, CORE_ADDR addr)
c906108c 949{
4e5d721f 950 return get_value_at (type, addr, 0);
c906108c
SS
951}
952
80180f79
SA
953/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
954 The type of the created value may differ from the passed type TYPE.
955 Make sure to retrieve the returned values's new type after this call
956 e.g. in case the type is a variable length array. */
c906108c 957
f23631e4 958struct value *
00a4c844 959value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 960{
4e5d721f 961 return get_value_at (type, addr, 1);
c906108c
SS
962}
963
e6ca34fc 964void
6b850546 965read_value_memory (struct value *val, LONGEST embedded_offset,
e6ca34fc
PA
966 int stack, CORE_ADDR memaddr,
967 gdb_byte *buffer, size_t length)
968{
3ae385af
SM
969 ULONGEST xfered_total = 0;
970 struct gdbarch *arch = get_value_arch (val);
971 int unit_size = gdbarch_addressable_memory_unit_size (arch);
6d7e9d3b
YQ
972 enum target_object object;
973
974 object = stack ? TARGET_OBJECT_STACK_MEMORY : TARGET_OBJECT_MEMORY;
5a2eb0ef 975
3ae385af 976 while (xfered_total < length)
5a2eb0ef
YQ
977 {
978 enum target_xfer_status status;
3ae385af 979 ULONGEST xfered_partial;
5a2eb0ef
YQ
980
981 status = target_xfer_partial (current_target.beneath,
6d7e9d3b 982 object, NULL,
3ae385af
SM
983 buffer + xfered_total * unit_size, NULL,
984 memaddr + xfered_total,
985 length - xfered_total,
986 &xfered_partial);
5a2eb0ef
YQ
987
988 if (status == TARGET_XFER_OK)
989 /* nothing */;
bc113b4e 990 else if (status == TARGET_XFER_UNAVAILABLE)
3ae385af
SM
991 mark_value_bytes_unavailable (val, embedded_offset + xfered_total,
992 xfered_partial);
5a2eb0ef 993 else if (status == TARGET_XFER_EOF)
3ae385af 994 memory_error (TARGET_XFER_E_IO, memaddr + xfered_total);
e6ca34fc 995 else
3ae385af 996 memory_error (status, memaddr + xfered_total);
e6ca34fc 997
3ae385af 998 xfered_total += xfered_partial;
5a2eb0ef 999 QUIT;
e6ca34fc
PA
1000 }
1001}
c906108c
SS
1002
1003/* Store the contents of FROMVAL into the location of TOVAL.
1004 Return a new value with the location of TOVAL and contents of FROMVAL. */
1005
f23631e4
AC
1006struct value *
1007value_assign (struct value *toval, struct value *fromval)
c906108c 1008{
52f0bd74 1009 struct type *type;
f23631e4 1010 struct value *val;
cb741690 1011 struct frame_id old_frame;
c906108c 1012
88e3b34b 1013 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1014 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1015
994b9211 1016 toval = coerce_ref (toval);
c906108c 1017
df407dfe 1018 type = value_type (toval);
c906108c 1019 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1020 fromval = value_cast (type, fromval);
c906108c 1021 else
63092375
DJ
1022 {
1023 /* Coerce arrays and functions to pointers, except for arrays
1024 which only live in GDB's storage. */
1025 if (!value_must_coerce_to_target (fromval))
1026 fromval = coerce_array (fromval);
1027 }
1028
f168693b 1029 type = check_typedef (type);
c906108c 1030
ac3eeb49
MS
1031 /* Since modifying a register can trash the frame chain, and
1032 modifying memory can trash the frame cache, we save the old frame
1033 and then restore the new frame afterwards. */
206415a3 1034 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1035
c906108c
SS
1036 switch (VALUE_LVAL (toval))
1037 {
1038 case lval_internalvar:
1039 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1040 return value_of_internalvar (get_type_arch (type),
1041 VALUE_INTERNALVAR (toval));
c906108c
SS
1042
1043 case lval_internalvar_component:
d9e98382 1044 {
6b850546 1045 LONGEST offset = value_offset (toval);
d9e98382
SDJ
1046
1047 /* Are we dealing with a bitfield?
1048
1049 It is important to mention that `value_parent (toval)' is
1050 non-NULL iff `value_bitsize (toval)' is non-zero. */
1051 if (value_bitsize (toval))
1052 {
1053 /* VALUE_INTERNALVAR below refers to the parent value, while
1054 the offset is relative to this parent value. */
1055 gdb_assert (value_parent (value_parent (toval)) == NULL);
1056 offset += value_offset (value_parent (toval));
1057 }
1058
1059 set_internalvar_component (VALUE_INTERNALVAR (toval),
1060 offset,
1061 value_bitpos (toval),
1062 value_bitsize (toval),
1063 fromval);
1064 }
c906108c
SS
1065 break;
1066
1067 case lval_memory:
1068 {
fc1a4b47 1069 const gdb_byte *dest_buffer;
c5aa993b
JM
1070 CORE_ADDR changed_addr;
1071 int changed_len;
10c42a71 1072 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1073
df407dfe 1074 if (value_bitsize (toval))
c5aa993b 1075 {
2d88202a 1076 struct value *parent = value_parent (toval);
2d88202a 1077
a109c7c1 1078 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1079 changed_len = (value_bitpos (toval)
1080 + value_bitsize (toval)
c5aa993b
JM
1081 + HOST_CHAR_BIT - 1)
1082 / HOST_CHAR_BIT;
c906108c 1083
4ea48cc1
DJ
1084 /* If we can read-modify-write exactly the size of the
1085 containing type (e.g. short or int) then do so. This
1086 is safer for volatile bitfields mapped to hardware
1087 registers. */
1088 if (changed_len < TYPE_LENGTH (type)
1089 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1090 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1091 changed_len = TYPE_LENGTH (type);
1092
c906108c 1093 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1094 error (_("Can't handle bitfields which "
1095 "don't fit in a %d bit word."),
baa6f10b 1096 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1097
2d88202a 1098 read_memory (changed_addr, buffer, changed_len);
50810684 1099 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1100 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1101 dest_buffer = buffer;
1102 }
c906108c
SS
1103 else
1104 {
42ae5230 1105 changed_addr = value_address (toval);
3ae385af 1106 changed_len = type_length_units (type);
0fd88904 1107 dest_buffer = value_contents (fromval);
c906108c
SS
1108 }
1109
972daa01 1110 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1111 }
1112 break;
1113
492254e9 1114 case lval_register:
c906108c 1115 {
c906108c 1116 struct frame_info *frame;
d80b854b 1117 struct gdbarch *gdbarch;
ff2e87ac 1118 int value_reg;
c906108c 1119
41b56feb
KB
1120 /* Figure out which frame this is in currently.
1121
1122 We use VALUE_FRAME_ID for obtaining the value's frame id instead of
1123 VALUE_NEXT_FRAME_ID due to requiring a frame which may be passed to
1124 put_frame_register_bytes() below. That function will (eventually)
1125 perform the necessary unwind operation by first obtaining the next
1126 frame. */
0c16dd26 1127 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
41b56feb 1128
0c16dd26 1129 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1130
1131 if (!frame)
8a3fe4f8 1132 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1133
1134 gdbarch = get_frame_arch (frame);
3e871532
LM
1135
1136 if (value_bitsize (toval))
492254e9 1137 {
3e871532 1138 struct value *parent = value_parent (toval);
6b850546 1139 LONGEST offset = value_offset (parent) + value_offset (toval);
3e871532
LM
1140 int changed_len;
1141 gdb_byte buffer[sizeof (LONGEST)];
1142 int optim, unavail;
1143
1144 changed_len = (value_bitpos (toval)
1145 + value_bitsize (toval)
1146 + HOST_CHAR_BIT - 1)
1147 / HOST_CHAR_BIT;
1148
1149 if (changed_len > (int) sizeof (LONGEST))
1150 error (_("Can't handle bitfields which "
1151 "don't fit in a %d bit word."),
1152 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1153
1154 if (!get_frame_register_bytes (frame, value_reg, offset,
1155 changed_len, buffer,
1156 &optim, &unavail))
1157 {
1158 if (optim)
1159 throw_error (OPTIMIZED_OUT_ERROR,
1160 _("value has been optimized out"));
1161 if (unavail)
1162 throw_error (NOT_AVAILABLE_ERROR,
1163 _("value is not available"));
1164 }
1165
1166 modify_field (type, buffer, value_as_long (fromval),
1167 value_bitpos (toval), value_bitsize (toval));
1168
1169 put_frame_register_bytes (frame, value_reg, offset,
1170 changed_len, buffer);
492254e9 1171 }
c906108c 1172 else
492254e9 1173 {
3e871532
LM
1174 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1175 type))
00fa51f6 1176 {
3e871532
LM
1177 /* If TOVAL is a special machine register requiring
1178 conversion of program values to a special raw
1179 format. */
1180 gdbarch_value_to_register (gdbarch, frame,
1181 VALUE_REGNUM (toval), type,
1182 value_contents (fromval));
00fa51f6 1183 }
c906108c 1184 else
00fa51f6
UW
1185 {
1186 put_frame_register_bytes (frame, value_reg,
1187 value_offset (toval),
1188 TYPE_LENGTH (type),
1189 value_contents (fromval));
1190 }
ff2e87ac 1191 }
00fa51f6 1192
162078c8 1193 observer_notify_register_changed (frame, value_reg);
ff2e87ac 1194 break;
c906108c 1195 }
5f5233d4
PA
1196
1197 case lval_computed:
1198 {
c8f2448a 1199 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1200
ac71a68c
JK
1201 if (funcs->write != NULL)
1202 {
1203 funcs->write (toval, fromval);
1204 break;
1205 }
5f5233d4 1206 }
ac71a68c 1207 /* Fall through. */
5f5233d4 1208
c906108c 1209 default:
8a3fe4f8 1210 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1211 }
1212
cb741690
DJ
1213 /* Assigning to the stack pointer, frame pointer, and other
1214 (architecture and calling convention specific) registers may
d649a38e 1215 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1216 also can. We just do this on all assignments to registers or
1217 memory, for simplicity's sake; I doubt the slowdown matters. */
1218 switch (VALUE_LVAL (toval))
1219 {
1220 case lval_memory:
1221 case lval_register:
0e03807e 1222 case lval_computed:
cb741690 1223
d649a38e 1224 observer_notify_target_changed (&current_target);
cb741690 1225
ac3eeb49
MS
1226 /* Having destroyed the frame cache, restore the selected
1227 frame. */
cb741690
DJ
1228
1229 /* FIXME: cagney/2002-11-02: There has to be a better way of
1230 doing this. Instead of constantly saving/restoring the
1231 frame. Why not create a get_selected_frame() function that,
1232 having saved the selected frame's ID can automatically
1233 re-find the previously selected frame automatically. */
1234
1235 {
1236 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1237
cb741690
DJ
1238 if (fi != NULL)
1239 select_frame (fi);
1240 }
1241
1242 break;
1243 default:
1244 break;
1245 }
1246
ac3eeb49
MS
1247 /* If the field does not entirely fill a LONGEST, then zero the sign
1248 bits. If the field is signed, and is negative, then sign
1249 extend. */
df407dfe
AC
1250 if ((value_bitsize (toval) > 0)
1251 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1252 {
1253 LONGEST fieldval = value_as_long (fromval);
df407dfe 1254 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1255
1256 fieldval &= valmask;
ac3eeb49
MS
1257 if (!TYPE_UNSIGNED (type)
1258 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1259 fieldval |= ~valmask;
1260
1261 fromval = value_from_longest (type, fieldval);
1262 }
1263
4aac0db7
UW
1264 /* The return value is a copy of TOVAL so it shares its location
1265 information, but its contents are updated from FROMVAL. This
1266 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1267 val = value_copy (toval);
4aac0db7 1268 set_value_lazy (val, 0);
0fd88904 1269 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1270 TYPE_LENGTH (type));
4aac0db7
UW
1271
1272 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1273 in the case of pointer types. For object types, the enclosing type
1274 and embedded offset must *not* be copied: the target object refered
1275 to by TOVAL retains its original dynamic type after assignment. */
1276 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1277 {
1278 set_value_enclosing_type (val, value_enclosing_type (fromval));
1279 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1280 }
c5aa993b 1281
c906108c
SS
1282 return val;
1283}
1284
1285/* Extend a value VAL to COUNT repetitions of its type. */
1286
f23631e4
AC
1287struct value *
1288value_repeat (struct value *arg1, int count)
c906108c 1289{
f23631e4 1290 struct value *val;
c906108c
SS
1291
1292 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1293 error (_("Only values in memory can be extended with '@'."));
c906108c 1294 if (count < 1)
8a3fe4f8 1295 error (_("Invalid number %d of repetitions."), count);
c906108c 1296
4754a64e 1297 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1298
c906108c 1299 VALUE_LVAL (val) = lval_memory;
42ae5230 1300 set_value_address (val, value_address (arg1));
c906108c 1301
24e6bcee
PA
1302 read_value_memory (val, 0, value_stack (val), value_address (val),
1303 value_contents_all_raw (val),
3ae385af 1304 type_length_units (value_enclosing_type (val)));
24e6bcee 1305
c906108c
SS
1306 return val;
1307}
1308
f23631e4 1309struct value *
9df2fbc4 1310value_of_variable (struct symbol *var, const struct block *b)
c906108c 1311{
63e43d3a 1312 struct frame_info *frame = NULL;
c906108c 1313
63e43d3a 1314 if (symbol_read_needs_frame (var))
61212c0f 1315 frame = get_selected_frame (_("No frame selected."));
c906108c 1316
63e43d3a 1317 return read_var_value (var, b, frame);
c906108c
SS
1318}
1319
61212c0f 1320struct value *
270140bd 1321address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1322{
1323 struct type *type = SYMBOL_TYPE (var);
1324 struct value *val;
1325
1326 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1327 Lazy evaluation pays off here. */
61212c0f
UW
1328
1329 val = value_of_variable (var, b);
9f1f738a 1330 type = value_type (val);
61212c0f
UW
1331
1332 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1333 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1334 {
42ae5230 1335 CORE_ADDR addr = value_address (val);
a109c7c1 1336
61212c0f
UW
1337 return value_from_pointer (lookup_pointer_type (type), addr);
1338 }
1339
1340 /* Not a memory address; check what the problem was. */
1341 switch (VALUE_LVAL (val))
1342 {
1343 case lval_register:
1344 {
1345 struct frame_info *frame;
1346 const char *regname;
1347
41b56feb 1348 frame = frame_find_by_id (VALUE_NEXT_FRAME_ID (val));
61212c0f
UW
1349 gdb_assert (frame);
1350
1351 regname = gdbarch_register_name (get_frame_arch (frame),
1352 VALUE_REGNUM (val));
1353 gdb_assert (regname && *regname);
1354
1355 error (_("Address requested for identifier "
1356 "\"%s\" which is in register $%s"),
1357 SYMBOL_PRINT_NAME (var), regname);
1358 break;
1359 }
1360
1361 default:
1362 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1363 SYMBOL_PRINT_NAME (var));
1364 break;
1365 }
1366
1367 return val;
1368}
1369
63092375
DJ
1370/* Return one if VAL does not live in target memory, but should in order
1371 to operate on it. Otherwise return zero. */
1372
1373int
1374value_must_coerce_to_target (struct value *val)
1375{
1376 struct type *valtype;
1377
1378 /* The only lval kinds which do not live in target memory. */
1379 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1380 && VALUE_LVAL (val) != lval_internalvar
1381 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1382 return 0;
1383
1384 valtype = check_typedef (value_type (val));
1385
1386 switch (TYPE_CODE (valtype))
1387 {
1388 case TYPE_CODE_ARRAY:
3cbaedff 1389 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1390 case TYPE_CODE_STRING:
1391 return 1;
1392 default:
1393 return 0;
1394 }
1395}
1396
3e43a32a
MS
1397/* Make sure that VAL lives in target memory if it's supposed to. For
1398 instance, strings are constructed as character arrays in GDB's
1399 storage, and this function copies them to the target. */
63092375
DJ
1400
1401struct value *
1402value_coerce_to_target (struct value *val)
1403{
1404 LONGEST length;
1405 CORE_ADDR addr;
1406
1407 if (!value_must_coerce_to_target (val))
1408 return val;
1409
1410 length = TYPE_LENGTH (check_typedef (value_type (val)));
1411 addr = allocate_space_in_inferior (length);
1412 write_memory (addr, value_contents (val), length);
1413 return value_at_lazy (value_type (val), addr);
1414}
1415
ac3eeb49
MS
1416/* Given a value which is an array, return a value which is a pointer
1417 to its first element, regardless of whether or not the array has a
1418 nonzero lower bound.
c906108c 1419
ac3eeb49
MS
1420 FIXME: A previous comment here indicated that this routine should
1421 be substracting the array's lower bound. It's not clear to me that
1422 this is correct. Given an array subscripting operation, it would
1423 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1424
1425 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1426
ac3eeb49
MS
1427 However I believe a more appropriate and logical place to account
1428 for the lower bound is to do so in value_subscript, essentially
1429 computing:
c906108c
SS
1430
1431 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1432
ac3eeb49
MS
1433 As further evidence consider what would happen with operations
1434 other than array subscripting, where the caller would get back a
1435 value that had an address somewhere before the actual first element
1436 of the array, and the information about the lower bound would be
581e13c1 1437 lost because of the coercion to pointer type. */
c906108c 1438
f23631e4
AC
1439struct value *
1440value_coerce_array (struct value *arg1)
c906108c 1441{
df407dfe 1442 struct type *type = check_typedef (value_type (arg1));
c906108c 1443
63092375
DJ
1444 /* If the user tries to do something requiring a pointer with an
1445 array that has not yet been pushed to the target, then this would
1446 be a good time to do so. */
1447 arg1 = value_coerce_to_target (arg1);
1448
c906108c 1449 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1450 error (_("Attempt to take address of value not located in memory."));
c906108c 1451
4478b372 1452 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1453 value_address (arg1));
c906108c
SS
1454}
1455
1456/* Given a value which is a function, return a value which is a pointer
1457 to it. */
1458
f23631e4
AC
1459struct value *
1460value_coerce_function (struct value *arg1)
c906108c 1461{
f23631e4 1462 struct value *retval;
c906108c
SS
1463
1464 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1465 error (_("Attempt to take address of value not located in memory."));
c906108c 1466
df407dfe 1467 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1468 value_address (arg1));
c906108c 1469 return retval;
c5aa993b 1470}
c906108c 1471
ac3eeb49
MS
1472/* Return a pointer value for the object for which ARG1 is the
1473 contents. */
c906108c 1474
f23631e4
AC
1475struct value *
1476value_addr (struct value *arg1)
c906108c 1477{
f23631e4 1478 struct value *arg2;
df407dfe 1479 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1480
c906108c
SS
1481 if (TYPE_CODE (type) == TYPE_CODE_REF)
1482 {
3326303b
MG
1483 if (value_bits_synthetic_pointer (arg1, value_embedded_offset (arg1),
1484 TARGET_CHAR_BIT * TYPE_LENGTH (type)))
1485 arg1 = coerce_ref (arg1);
1486 else
1487 {
1488 /* Copy the value, but change the type from (T&) to (T*). We
1489 keep the same location information, which is efficient, and
1490 allows &(&X) to get the location containing the reference.
1491 Do the same to its enclosing type for consistency. */
1492 struct type *type_ptr
1493 = lookup_pointer_type (TYPE_TARGET_TYPE (type));
1494 struct type *enclosing_type
1495 = check_typedef (value_enclosing_type (arg1));
1496 struct type *enclosing_type_ptr
1497 = lookup_pointer_type (TYPE_TARGET_TYPE (enclosing_type));
1498
1499 arg2 = value_copy (arg1);
1500 deprecated_set_value_type (arg2, type_ptr);
1501 set_value_enclosing_type (arg2, enclosing_type_ptr);
a22df60a 1502
3326303b
MG
1503 return arg2;
1504 }
c906108c
SS
1505 }
1506 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1507 return value_coerce_function (arg1);
1508
63092375
DJ
1509 /* If this is an array that has not yet been pushed to the target,
1510 then this would be a good time to force it to memory. */
1511 arg1 = value_coerce_to_target (arg1);
1512
c906108c 1513 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1514 error (_("Attempt to take address of value not located in memory."));
c906108c 1515
581e13c1 1516 /* Get target memory address. */
df407dfe 1517 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1518 (value_address (arg1)
13c3b5f5 1519 + value_embedded_offset (arg1)));
c906108c
SS
1520
1521 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1522 full derived object's type ... */
4dfea560
DE
1523 set_value_enclosing_type (arg2,
1524 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1525 /* ... and also the relative position of the subobject in the full
1526 object. */
b44d461b 1527 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1528 return arg2;
1529}
1530
ac3eeb49
MS
1531/* Return a reference value for the object for which ARG1 is the
1532 contents. */
fb933624
DJ
1533
1534struct value *
a65cfae5 1535value_ref (struct value *arg1, enum type_code refcode)
fb933624
DJ
1536{
1537 struct value *arg2;
fb933624 1538 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1539
a65cfae5
AV
1540 gdb_assert (refcode == TYPE_CODE_REF || refcode == TYPE_CODE_RVALUE_REF);
1541
1542 if ((TYPE_CODE (type) == TYPE_CODE_REF
1543 || TYPE_CODE (type) == TYPE_CODE_RVALUE_REF)
1544 && TYPE_CODE (type) == refcode)
fb933624
DJ
1545 return arg1;
1546
1547 arg2 = value_addr (arg1);
a65cfae5 1548 deprecated_set_value_type (arg2, lookup_reference_type (type, refcode));
fb933624
DJ
1549 return arg2;
1550}
1551
ac3eeb49
MS
1552/* Given a value of a pointer type, apply the C unary * operator to
1553 it. */
c906108c 1554
f23631e4
AC
1555struct value *
1556value_ind (struct value *arg1)
c906108c
SS
1557{
1558 struct type *base_type;
f23631e4 1559 struct value *arg2;
c906108c 1560
994b9211 1561 arg1 = coerce_array (arg1);
c906108c 1562
df407dfe 1563 base_type = check_typedef (value_type (arg1));
c906108c 1564
8cf6f0b1
TT
1565 if (VALUE_LVAL (arg1) == lval_computed)
1566 {
c8f2448a 1567 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1568
1569 if (funcs->indirect)
1570 {
1571 struct value *result = funcs->indirect (arg1);
1572
1573 if (result)
1574 return result;
1575 }
1576 }
1577
22fe0fbb 1578 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1579 {
1580 struct type *enc_type;
a109c7c1 1581
ac3eeb49
MS
1582 /* We may be pointing to something embedded in a larger object.
1583 Get the real type of the enclosing object. */
4754a64e 1584 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1585 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1586
1587 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1588 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1589 /* For functions, go through find_function_addr, which knows
1590 how to handle function descriptors. */
ac3eeb49
MS
1591 arg2 = value_at_lazy (enc_type,
1592 find_function_addr (arg1, NULL));
0d5de010 1593 else
581e13c1 1594 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1595 arg2 = value_at_lazy (enc_type,
1596 (value_as_address (arg1)
1597 - value_pointed_to_offset (arg1)));
0d5de010 1598
9f1f738a 1599 enc_type = value_type (arg2);
dfcee124 1600 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1601 }
1602
8a3fe4f8 1603 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1604 return 0; /* For lint -- never reached. */
c906108c
SS
1605}
1606\f
39d37385
PA
1607/* Create a value for an array by allocating space in GDB, copying the
1608 data into that space, and then setting up an array value.
c906108c 1609
ac3eeb49
MS
1610 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1611 is populated from the values passed in ELEMVEC.
c906108c
SS
1612
1613 The element type of the array is inherited from the type of the
1614 first element, and all elements must have the same size (though we
ac3eeb49 1615 don't currently enforce any restriction on their types). */
c906108c 1616
f23631e4
AC
1617struct value *
1618value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1619{
1620 int nelem;
1621 int idx;
6b850546 1622 ULONGEST typelength;
f23631e4 1623 struct value *val;
c906108c 1624 struct type *arraytype;
c906108c 1625
ac3eeb49
MS
1626 /* Validate that the bounds are reasonable and that each of the
1627 elements have the same size. */
c906108c
SS
1628
1629 nelem = highbound - lowbound + 1;
1630 if (nelem <= 0)
1631 {
8a3fe4f8 1632 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1633 }
3ae385af 1634 typelength = type_length_units (value_enclosing_type (elemvec[0]));
c906108c
SS
1635 for (idx = 1; idx < nelem; idx++)
1636 {
3ae385af
SM
1637 if (type_length_units (value_enclosing_type (elemvec[idx]))
1638 != typelength)
c906108c 1639 {
8a3fe4f8 1640 error (_("array elements must all be the same size"));
c906108c
SS
1641 }
1642 }
1643
e3506a9f
UW
1644 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1645 lowbound, highbound);
c906108c
SS
1646
1647 if (!current_language->c_style_arrays)
1648 {
1649 val = allocate_value (arraytype);
1650 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1651 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1652 typelength);
c906108c
SS
1653 return val;
1654 }
1655
63092375
DJ
1656 /* Allocate space to store the array, and then initialize it by
1657 copying in each element. */
c906108c 1658
63092375 1659 val = allocate_value (arraytype);
c906108c 1660 for (idx = 0; idx < nelem; idx++)
39d37385 1661 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1662 return val;
c906108c
SS
1663}
1664
6c7a06a3 1665struct value *
e3a3797e 1666value_cstring (const char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1667{
1668 struct value *val;
1669 int lowbound = current_language->string_lower_bound;
63375b74 1670 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1671 struct type *stringtype
e3506a9f 1672 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1673
1674 val = allocate_value (stringtype);
1675 memcpy (value_contents_raw (val), ptr, len);
1676 return val;
1677}
1678
ac3eeb49
MS
1679/* Create a value for a string constant by allocating space in the
1680 inferior, copying the data into that space, and returning the
1681 address with type TYPE_CODE_STRING. PTR points to the string
1682 constant data; LEN is number of characters.
1683
1684 Note that string types are like array of char types with a lower
1685 bound of zero and an upper bound of LEN - 1. Also note that the
1686 string may contain embedded null bytes. */
c906108c 1687
f23631e4 1688struct value *
7cc3f8e2 1689value_string (const char *ptr, ssize_t len, struct type *char_type)
c906108c 1690{
f23631e4 1691 struct value *val;
c906108c 1692 int lowbound = current_language->string_lower_bound;
63375b74 1693 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1694 struct type *stringtype
e3506a9f 1695 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1696
3b7538c0
UW
1697 val = allocate_value (stringtype);
1698 memcpy (value_contents_raw (val), ptr, len);
1699 return val;
c906108c
SS
1700}
1701
c906108c 1702\f
ac3eeb49
MS
1703/* See if we can pass arguments in T2 to a function which takes
1704 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1705 a NULL-terminated vector. If some arguments need coercion of some
1706 sort, then the coerced values are written into T2. Return value is
1707 0 if the arguments could be matched, or the position at which they
1708 differ if not.
c906108c 1709
ac3eeb49
MS
1710 STATICP is nonzero if the T1 argument list came from a static
1711 member function. T2 will still include the ``this'' pointer, but
1712 it will be skipped.
c906108c
SS
1713
1714 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1715 which is the type of the instance variable. This is because we
1716 want to handle calls with objects from derived classes. This is
1717 not entirely correct: we should actually check to make sure that a
c906108c
SS
1718 requested operation is type secure, shouldn't we? FIXME. */
1719
1720static int
ad2f7632
DJ
1721typecmp (int staticp, int varargs, int nargs,
1722 struct field t1[], struct value *t2[])
c906108c
SS
1723{
1724 int i;
1725
1726 if (t2 == 0)
ac3eeb49
MS
1727 internal_error (__FILE__, __LINE__,
1728 _("typecmp: no argument list"));
ad2f7632 1729
ac3eeb49
MS
1730 /* Skip ``this'' argument if applicable. T2 will always include
1731 THIS. */
4a1970e4 1732 if (staticp)
ad2f7632
DJ
1733 t2 ++;
1734
1735 for (i = 0;
1736 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1737 i++)
c906108c 1738 {
c5aa993b 1739 struct type *tt1, *tt2;
ad2f7632 1740
c5aa993b
JM
1741 if (!t2[i])
1742 return i + 1;
ad2f7632
DJ
1743
1744 tt1 = check_typedef (t1[i].type);
df407dfe 1745 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1746
c906108c 1747 if (TYPE_CODE (tt1) == TYPE_CODE_REF
8301c89e 1748 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1749 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1750 == TYPE_CODE (tt2)))
c906108c
SS
1751 {
1752 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1753 t2[i] = value_coerce_array (t2[i]);
1754 else
a65cfae5 1755 t2[i] = value_ref (t2[i], TYPE_CODE (tt1));
c906108c
SS
1756 continue;
1757 }
1758
802db21b
DB
1759 /* djb - 20000715 - Until the new type structure is in the
1760 place, and we can attempt things like implicit conversions,
1761 we need to do this so you can take something like a map<const
1762 char *>, and properly access map["hello"], because the
1763 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1764 and the argument will be a pointer to a char. */
1765 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1766 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1767 {
1768 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1769 }
ac3eeb49
MS
1770 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1771 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1772 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1773 {
ac3eeb49 1774 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1775 }
c5aa993b
JM
1776 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1777 continue;
ac3eeb49
MS
1778 /* Array to pointer is a `trivial conversion' according to the
1779 ARM. */
c906108c 1780
ac3eeb49
MS
1781 /* We should be doing much hairier argument matching (see
1782 section 13.2 of the ARM), but as a quick kludge, just check
1783 for the same type code. */
df407dfe 1784 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1785 return i + 1;
c906108c 1786 }
ad2f7632 1787 if (varargs || t2[i] == NULL)
c5aa993b 1788 return 0;
ad2f7632 1789 return i + 1;
c906108c
SS
1790}
1791
b1af9e97
TT
1792/* Helper class for do_search_struct_field that updates *RESULT_PTR
1793 and *LAST_BOFFSET, and possibly throws an exception if the field
1794 search has yielded ambiguous results. */
c906108c 1795
b1af9e97
TT
1796static void
1797update_search_result (struct value **result_ptr, struct value *v,
6b850546 1798 LONGEST *last_boffset, LONGEST boffset,
b1af9e97
TT
1799 const char *name, struct type *type)
1800{
1801 if (v != NULL)
1802 {
1803 if (*result_ptr != NULL
1804 /* The result is not ambiguous if all the classes that are
1805 found occupy the same space. */
1806 && *last_boffset != boffset)
1807 error (_("base class '%s' is ambiguous in type '%s'"),
1808 name, TYPE_SAFE_NAME (type));
1809 *result_ptr = v;
1810 *last_boffset = boffset;
1811 }
1812}
c906108c 1813
b1af9e97
TT
1814/* A helper for search_struct_field. This does all the work; most
1815 arguments are as passed to search_struct_field. The result is
1816 stored in *RESULT_PTR, which must be initialized to NULL.
1817 OUTERMOST_TYPE is the type of the initial type passed to
1818 search_struct_field; this is used for error reporting when the
1819 lookup is ambiguous. */
1820
1821static void
6b850546 1822do_search_struct_field (const char *name, struct value *arg1, LONGEST offset,
b1af9e97
TT
1823 struct type *type, int looking_for_baseclass,
1824 struct value **result_ptr,
6b850546 1825 LONGEST *last_boffset,
b1af9e97 1826 struct type *outermost_type)
c906108c
SS
1827{
1828 int i;
edf3d5f3 1829 int nbases;
c906108c 1830
f168693b 1831 type = check_typedef (type);
edf3d5f3 1832 nbases = TYPE_N_BASECLASSES (type);
c906108c 1833
c5aa993b 1834 if (!looking_for_baseclass)
c906108c
SS
1835 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1836 {
0d5cff50 1837 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1838
db577aea 1839 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1840 {
f23631e4 1841 struct value *v;
a109c7c1 1842
d6a843b5 1843 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1844 v = value_static_field (type, i);
c906108c 1845 else
b1af9e97
TT
1846 v = value_primitive_field (arg1, offset, i, type);
1847 *result_ptr = v;
1848 return;
c906108c
SS
1849 }
1850
1851 if (t_field_name
47c6ee49 1852 && t_field_name[0] == '\0')
c906108c
SS
1853 {
1854 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1855
c906108c
SS
1856 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1857 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1858 {
ac3eeb49
MS
1859 /* Look for a match through the fields of an anonymous
1860 union, or anonymous struct. C++ provides anonymous
1861 unions.
c906108c 1862
1b831c93
AC
1863 In the GNU Chill (now deleted from GDB)
1864 implementation of variant record types, each
1865 <alternative field> has an (anonymous) union type,
1866 each member of the union represents a <variant
1867 alternative>. Each <variant alternative> is
1868 represented as a struct, with a member for each
1869 <variant field>. */
c5aa993b 1870
b1af9e97 1871 struct value *v = NULL;
6b850546 1872 LONGEST new_offset = offset;
c906108c 1873
db034ac5
AC
1874 /* This is pretty gross. In G++, the offset in an
1875 anonymous union is relative to the beginning of the
1b831c93
AC
1876 enclosing struct. In the GNU Chill (now deleted
1877 from GDB) implementation of variant records, the
1878 bitpos is zero in an anonymous union field, so we
ac3eeb49 1879 have to add the offset of the union here. */
c906108c
SS
1880 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1881 || (TYPE_NFIELDS (field_type) > 0
1882 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1883 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1884
b1af9e97
TT
1885 do_search_struct_field (name, arg1, new_offset,
1886 field_type,
1887 looking_for_baseclass, &v,
1888 last_boffset,
1889 outermost_type);
c906108c 1890 if (v)
b1af9e97
TT
1891 {
1892 *result_ptr = v;
1893 return;
1894 }
c906108c
SS
1895 }
1896 }
1897 }
1898
c5aa993b 1899 for (i = 0; i < nbases; i++)
c906108c 1900 {
b1af9e97 1901 struct value *v = NULL;
c906108c 1902 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1903 /* If we are looking for baseclasses, this is what we get when
1904 we hit them. But it could happen that the base part's member
1905 name is not yet filled in. */
c906108c
SS
1906 int found_baseclass = (looking_for_baseclass
1907 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1908 && (strcmp_iw (name,
1909 TYPE_BASECLASS_NAME (type,
1910 i)) == 0));
6b850546 1911 LONGEST boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1912
1913 if (BASETYPE_VIA_VIRTUAL (type, i))
1914 {
3e3d7139 1915 struct value *v2;
c906108c
SS
1916
1917 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1918 value_contents_for_printing (arg1),
1919 value_embedded_offset (arg1) + offset,
1920 value_address (arg1),
1921 arg1);
c906108c 1922
ac3eeb49 1923 /* The virtual base class pointer might have been clobbered
581e13c1 1924 by the user program. Make sure that it still points to a
ac3eeb49 1925 valid memory location. */
c906108c 1926
1a334831
TT
1927 boffset += value_embedded_offset (arg1) + offset;
1928 if (boffset < 0
1929 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1930 {
1931 CORE_ADDR base_addr;
c5aa993b 1932
42ae5230 1933 base_addr = value_address (arg1) + boffset;
08039c9e 1934 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1935 if (target_read_memory (base_addr,
1936 value_contents_raw (v2),
acc900c2 1937 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1938 error (_("virtual baseclass botch"));
c906108c
SS
1939 }
1940 else
1941 {
1a334831
TT
1942 v2 = value_copy (arg1);
1943 deprecated_set_value_type (v2, basetype);
1944 set_value_embedded_offset (v2, boffset);
c906108c
SS
1945 }
1946
1947 if (found_baseclass)
b1af9e97
TT
1948 v = v2;
1949 else
1950 {
1951 do_search_struct_field (name, v2, 0,
1952 TYPE_BASECLASS (type, i),
1953 looking_for_baseclass,
1954 result_ptr, last_boffset,
1955 outermost_type);
1956 }
c906108c
SS
1957 }
1958 else if (found_baseclass)
1959 v = value_primitive_field (arg1, offset, i, type);
1960 else
b1af9e97
TT
1961 {
1962 do_search_struct_field (name, arg1,
1963 offset + TYPE_BASECLASS_BITPOS (type,
1964 i) / 8,
1965 basetype, looking_for_baseclass,
1966 result_ptr, last_boffset,
1967 outermost_type);
1968 }
1969
1970 update_search_result (result_ptr, v, last_boffset,
1971 boffset, name, outermost_type);
c906108c 1972 }
b1af9e97
TT
1973}
1974
1975/* Helper function used by value_struct_elt to recurse through
8a13d42d
SM
1976 baseclasses. Look for a field NAME in ARG1. Search in it assuming
1977 it has (class) type TYPE. If found, return value, else return NULL.
b1af9e97
TT
1978
1979 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1980 fields, look for a baseclass named NAME. */
1981
1982static struct value *
8a13d42d 1983search_struct_field (const char *name, struct value *arg1,
b1af9e97
TT
1984 struct type *type, int looking_for_baseclass)
1985{
1986 struct value *result = NULL;
6b850546 1987 LONGEST boffset = 0;
b1af9e97 1988
8a13d42d 1989 do_search_struct_field (name, arg1, 0, type, looking_for_baseclass,
b1af9e97
TT
1990 &result, &boffset, type);
1991 return result;
c906108c
SS
1992}
1993
ac3eeb49 1994/* Helper function used by value_struct_elt to recurse through
581e13c1 1995 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1996 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1997 TYPE.
1998
1999 If found, return value, else if name matched and args not return
2000 (value) -1, else return NULL. */
c906108c 2001
f23631e4 2002static struct value *
714f19d5 2003search_struct_method (const char *name, struct value **arg1p,
6b850546 2004 struct value **args, LONGEST offset,
aa1ee363 2005 int *static_memfuncp, struct type *type)
c906108c
SS
2006{
2007 int i;
f23631e4 2008 struct value *v;
c906108c
SS
2009 int name_matched = 0;
2010 char dem_opname[64];
2011
f168693b 2012 type = check_typedef (type);
c906108c
SS
2013 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
2014 {
0d5cff50 2015 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2016
581e13c1 2017 /* FIXME! May need to check for ARM demangling here. */
61012eef
GB
2018 if (startswith (t_field_name, "__") ||
2019 startswith (t_field_name, "op") ||
2020 startswith (t_field_name, "type"))
c906108c 2021 {
c5aa993b
JM
2022 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2023 t_field_name = dem_opname;
2024 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2025 t_field_name = dem_opname;
c906108c 2026 }
db577aea 2027 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2028 {
2029 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2030 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2031
a109c7c1 2032 name_matched = 1;
de17c821 2033 check_stub_method_group (type, i);
c906108c 2034 if (j > 0 && args == 0)
3e43a32a
MS
2035 error (_("cannot resolve overloaded method "
2036 "`%s': no arguments supplied"), name);
acf5ed49 2037 else if (j == 0 && args == 0)
c906108c 2038 {
acf5ed49
DJ
2039 v = value_fn_field (arg1p, f, j, type, offset);
2040 if (v != NULL)
2041 return v;
c906108c 2042 }
acf5ed49
DJ
2043 else
2044 while (j >= 0)
2045 {
acf5ed49 2046 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2047 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2048 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2049 TYPE_FN_FIELD_ARGS (f, j), args))
2050 {
2051 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2052 return value_virtual_fn_field (arg1p, f, j,
2053 type, offset);
2054 if (TYPE_FN_FIELD_STATIC_P (f, j)
2055 && static_memfuncp)
acf5ed49
DJ
2056 *static_memfuncp = 1;
2057 v = value_fn_field (arg1p, f, j, type, offset);
2058 if (v != NULL)
2059 return v;
2060 }
2061 j--;
2062 }
c906108c
SS
2063 }
2064 }
2065
2066 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2067 {
6b850546
DT
2068 LONGEST base_offset;
2069 LONGEST this_offset;
c906108c
SS
2070
2071 if (BASETYPE_VIA_VIRTUAL (type, i))
2072 {
086280be 2073 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2074 struct value *base_val;
086280be
UW
2075 const gdb_byte *base_valaddr;
2076
2077 /* The virtual base class pointer might have been
581e13c1 2078 clobbered by the user program. Make sure that it
8301c89e 2079 still points to a valid memory location. */
086280be
UW
2080
2081 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2082 {
6c18f3e0
SP
2083 gdb_byte *tmp;
2084 struct cleanup *back_to;
2085 CORE_ADDR address;
2086
224c3ddb 2087 tmp = (gdb_byte *) xmalloc (TYPE_LENGTH (baseclass));
6c18f3e0
SP
2088 back_to = make_cleanup (xfree, tmp);
2089 address = value_address (*arg1p);
a109c7c1 2090
8af8e3bc 2091 if (target_read_memory (address + offset,
086280be
UW
2092 tmp, TYPE_LENGTH (baseclass)) != 0)
2093 error (_("virtual baseclass botch"));
8af8e3bc
PA
2094
2095 base_val = value_from_contents_and_address (baseclass,
2096 tmp,
2097 address + offset);
2098 base_valaddr = value_contents_for_printing (base_val);
2099 this_offset = 0;
6c18f3e0 2100 do_cleanups (back_to);
c5aa993b
JM
2101 }
2102 else
8af8e3bc
PA
2103 {
2104 base_val = *arg1p;
2105 base_valaddr = value_contents_for_printing (*arg1p);
2106 this_offset = offset;
2107 }
c5aa993b 2108
086280be 2109 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2110 this_offset, value_address (base_val),
2111 base_val);
c5aa993b 2112 }
c906108c
SS
2113 else
2114 {
2115 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2116 }
c906108c
SS
2117 v = search_struct_method (name, arg1p, args, base_offset + offset,
2118 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2119 if (v == (struct value *) - 1)
c906108c
SS
2120 {
2121 name_matched = 1;
2122 }
2123 else if (v)
2124 {
ac3eeb49
MS
2125 /* FIXME-bothner: Why is this commented out? Why is it here? */
2126 /* *arg1p = arg1_tmp; */
c906108c 2127 return v;
c5aa993b 2128 }
c906108c 2129 }
c5aa993b 2130 if (name_matched)
f23631e4 2131 return (struct value *) - 1;
c5aa993b
JM
2132 else
2133 return NULL;
c906108c
SS
2134}
2135
2136/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2137 extract the component named NAME from the ultimate target
2138 structure/union and return it as a value with its appropriate type.
c906108c
SS
2139 ERR is used in the error message if *ARGP's type is wrong.
2140
2141 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2142 an appropriate method. Also, handle derived types.
c906108c
SS
2143
2144 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2145 where the truthvalue of whether the function that was resolved was
2146 a static member function or not is stored.
2147
ac3eeb49
MS
2148 ERR is an error message to be printed in case the field is not
2149 found. */
c906108c 2150
f23631e4
AC
2151struct value *
2152value_struct_elt (struct value **argp, struct value **args,
714f19d5 2153 const char *name, int *static_memfuncp, const char *err)
c906108c 2154{
52f0bd74 2155 struct type *t;
f23631e4 2156 struct value *v;
c906108c 2157
994b9211 2158 *argp = coerce_array (*argp);
c906108c 2159
df407dfe 2160 t = check_typedef (value_type (*argp));
c906108c
SS
2161
2162 /* Follow pointers until we get to a non-pointer. */
2163
2164 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2165 {
2166 *argp = value_ind (*argp);
2167 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2168 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2169 *argp = coerce_array (*argp);
df407dfe 2170 t = check_typedef (value_type (*argp));
c906108c
SS
2171 }
2172
c5aa993b 2173 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2174 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2175 error (_("Attempt to extract a component of a value that is not a %s."),
2176 err);
c906108c
SS
2177
2178 /* Assume it's not, unless we see that it is. */
2179 if (static_memfuncp)
c5aa993b 2180 *static_memfuncp = 0;
c906108c
SS
2181
2182 if (!args)
2183 {
2184 /* if there are no arguments ...do this... */
2185
ac3eeb49
MS
2186 /* Try as a field first, because if we succeed, there is less
2187 work to be done. */
8a13d42d 2188 v = search_struct_field (name, *argp, t, 0);
c906108c
SS
2189 if (v)
2190 return v;
2191
2192 /* C++: If it was not found as a data field, then try to
7b83ea04 2193 return it as a pointer to a method. */
ac3eeb49
MS
2194 v = search_struct_method (name, argp, args, 0,
2195 static_memfuncp, t);
c906108c 2196
f23631e4 2197 if (v == (struct value *) - 1)
55b39184 2198 error (_("Cannot take address of method %s."), name);
c906108c
SS
2199 else if (v == 0)
2200 {
2201 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2202 error (_("There is no member or method named %s."), name);
c906108c 2203 else
8a3fe4f8 2204 error (_("There is no member named %s."), name);
c906108c
SS
2205 }
2206 return v;
2207 }
2208
8301c89e
DE
2209 v = search_struct_method (name, argp, args, 0,
2210 static_memfuncp, t);
7168a814 2211
f23631e4 2212 if (v == (struct value *) - 1)
c906108c 2213 {
3e43a32a
MS
2214 error (_("One of the arguments you tried to pass to %s could not "
2215 "be converted to what the function wants."), name);
c906108c
SS
2216 }
2217 else if (v == 0)
2218 {
ac3eeb49
MS
2219 /* See if user tried to invoke data as function. If so, hand it
2220 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2221 gdb should give an error. */
8a13d42d 2222 v = search_struct_field (name, *argp, t, 0);
fa8de41e
TT
2223 /* If we found an ordinary field, then it is not a method call.
2224 So, treat it as if it were a static member function. */
2225 if (v && static_memfuncp)
2226 *static_memfuncp = 1;
c906108c
SS
2227 }
2228
2229 if (!v)
79afc5ef
SW
2230 throw_error (NOT_FOUND_ERROR,
2231 _("Structure has no component named %s."), name);
c906108c
SS
2232 return v;
2233}
2234
b5b08fb4
SC
2235/* Given *ARGP, a value of type structure or union, or a pointer/reference
2236 to a structure or union, extract and return its component (field) of
2237 type FTYPE at the specified BITPOS.
2238 Throw an exception on error. */
2239
2240struct value *
2241value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2242 const char *err)
2243{
2244 struct type *t;
b5b08fb4 2245 int i;
b5b08fb4
SC
2246
2247 *argp = coerce_array (*argp);
2248
2249 t = check_typedef (value_type (*argp));
2250
2251 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2252 {
2253 *argp = value_ind (*argp);
2254 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2255 *argp = coerce_array (*argp);
2256 t = check_typedef (value_type (*argp));
2257 }
2258
2259 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2260 && TYPE_CODE (t) != TYPE_CODE_UNION)
2261 error (_("Attempt to extract a component of a value that is not a %s."),
2262 err);
2263
2264 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2265 {
2266 if (!field_is_static (&TYPE_FIELD (t, i))
2267 && bitpos == TYPE_FIELD_BITPOS (t, i)
2268 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2269 return value_primitive_field (*argp, 0, i, t);
2270 }
2271
2272 error (_("No field with matching bitpos and type."));
2273
2274 /* Never hit. */
2275 return NULL;
2276}
2277
ac3eeb49 2278/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2279 specified method. Return the pointer to the fn_field list FN_LIST of
2280 overloaded instances defined in the source language. If available
2281 and matching, a vector of matching xmethods defined in extension
2282 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2283
2284 Helper function for value_find_oload_list.
2285 ARGP is a pointer to a pointer to a value (the object).
2286 METHOD is a string containing the method name.
2287 OFFSET is the offset within the value.
2288 TYPE is the assumed type of the object.
233e8b28
SC
2289 FN_LIST is the pointer to matching overloaded instances defined in
2290 source language. Since this is a recursive function, *FN_LIST
2291 should be set to NULL when calling this function.
2292 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2293 0 when calling this function.
2294 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2295 should also be set to NULL when calling this function.
ac3eeb49
MS
2296 BASETYPE is set to the actual type of the subobject where the
2297 method is found.
581e13c1 2298 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2299
233e8b28 2300static void
714f19d5 2301find_method_list (struct value **argp, const char *method,
6b850546 2302 LONGEST offset, struct type *type,
233e8b28
SC
2303 struct fn_field **fn_list, int *num_fns,
2304 VEC (xmethod_worker_ptr) **xm_worker_vec,
6b850546 2305 struct type **basetype, LONGEST *boffset)
c906108c
SS
2306{
2307 int i;
233e8b28
SC
2308 struct fn_field *f = NULL;
2309 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2310
233e8b28 2311 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
f168693b 2312 type = check_typedef (type);
c906108c 2313
233e8b28
SC
2314 /* First check in object itself.
2315 This function is called recursively to search through base classes.
2316 If there is a source method match found at some stage, then we need not
2317 look for source methods in consequent recursive calls. */
2318 if ((*fn_list) == NULL)
c906108c 2319 {
233e8b28 2320 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2321 {
233e8b28
SC
2322 /* pai: FIXME What about operators and type conversions? */
2323 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2324
2325 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2326 {
2327 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2328 f = TYPE_FN_FIELDLIST1 (type, i);
2329 *fn_list = f;
4a1970e4 2330
233e8b28
SC
2331 *num_fns = len;
2332 *basetype = type;
2333 *boffset = offset;
4a1970e4 2334
233e8b28
SC
2335 /* Resolve any stub methods. */
2336 check_stub_method_group (type, i);
4a1970e4 2337
233e8b28
SC
2338 break;
2339 }
c5aa993b
JM
2340 }
2341 }
2342
233e8b28
SC
2343 /* Unlike source methods, xmethods can be accumulated over successive
2344 recursive calls. In other words, an xmethod named 'm' in a class
2345 will not hide an xmethod named 'm' in its base class(es). We want
2346 it to be this way because xmethods are after all convenience functions
2347 and hence there is no point restricting them with something like method
2348 hiding. Moreover, if hiding is done for xmethods as well, then we will
2349 have to provide a mechanism to un-hide (like the 'using' construct). */
2350 worker_vec = get_matching_xmethod_workers (type, method);
2351 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2352
2353 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2354 VEC_free (xmethod_worker_ptr, worker_vec);
2355 *xm_worker_vec = new_vec;
2356
2357 /* If source methods are not found in current class, look for them in the
2358 base classes. We also have to go through the base classes to gather
2359 extension methods. */
c906108c
SS
2360 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2361 {
6b850546 2362 LONGEST base_offset;
a109c7c1 2363
c906108c
SS
2364 if (BASETYPE_VIA_VIRTUAL (type, i))
2365 {
086280be 2366 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2367 value_contents_for_printing (*argp),
2368 value_offset (*argp) + offset,
2369 value_address (*argp), *argp);
c5aa993b 2370 }
ac3eeb49
MS
2371 else /* Non-virtual base, simply use bit position from debug
2372 info. */
c906108c
SS
2373 {
2374 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2375 }
233e8b28
SC
2376
2377 find_method_list (argp, method, base_offset + offset,
2378 TYPE_BASECLASS (type, i), fn_list, num_fns,
2379 xm_worker_vec, basetype, boffset);
c906108c 2380 }
c906108c
SS
2381}
2382
233e8b28
SC
2383/* Return the list of overloaded methods of a specified name. The methods
2384 could be those GDB finds in the binary, or xmethod. Methods found in
2385 the binary are returned in FN_LIST, and xmethods are returned in
2386 XM_WORKER_VEC.
ac3eeb49
MS
2387
2388 ARGP is a pointer to a pointer to a value (the object).
2389 METHOD is the method name.
2390 OFFSET is the offset within the value contents.
233e8b28
SC
2391 FN_LIST is the pointer to matching overloaded instances defined in
2392 source language.
ac3eeb49 2393 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2394 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2395 extension languages.
ac3eeb49
MS
2396 BASETYPE is set to the type of the base subobject that defines the
2397 method.
581e13c1 2398 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2399
233e8b28 2400static void
714f19d5 2401value_find_oload_method_list (struct value **argp, const char *method,
6b850546 2402 LONGEST offset, struct fn_field **fn_list,
233e8b28
SC
2403 int *num_fns,
2404 VEC (xmethod_worker_ptr) **xm_worker_vec,
6b850546 2405 struct type **basetype, LONGEST *boffset)
c906108c 2406{
c5aa993b 2407 struct type *t;
c906108c 2408
df407dfe 2409 t = check_typedef (value_type (*argp));
c906108c 2410
ac3eeb49 2411 /* Code snarfed from value_struct_elt. */
c906108c
SS
2412 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2413 {
2414 *argp = value_ind (*argp);
2415 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2416 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2417 *argp = coerce_array (*argp);
df407dfe 2418 t = check_typedef (value_type (*argp));
c906108c 2419 }
c5aa993b 2420
c5aa993b
JM
2421 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2422 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2423 error (_("Attempt to extract a component of a "
2424 "value that is not a struct or union"));
c5aa993b 2425
233e8b28
SC
2426 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2427
2428 /* Clear the lists. */
2429 *fn_list = NULL;
2430 *num_fns = 0;
2431 *xm_worker_vec = NULL;
2432
2433 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2434 basetype, boffset);
c906108c
SS
2435}
2436
da096638 2437/* Given an array of arguments (ARGS) (which includes an
c906108c 2438 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2439 arguments NARGS, the NAME of a function, and whether it's a method or
2440 not (METHOD), find the best function that matches on the argument types
2441 according to the overload resolution rules.
c906108c 2442
4c3376c8
SW
2443 METHOD can be one of three values:
2444 NON_METHOD for non-member functions.
2445 METHOD: for member functions.
2446 BOTH: used for overload resolution of operators where the
2447 candidates are expected to be either member or non member
581e13c1 2448 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2449 (representing 'this') is expected to be a reference to the
2450 target object, and will be dereferenced when attempting the
2451 non-member search.
2452
c906108c
SS
2453 In the case of class methods, the parameter OBJ is an object value
2454 in which to search for overloaded methods.
2455
2456 In the case of non-method functions, the parameter FSYM is a symbol
2457 corresponding to one of the overloaded functions.
2458
2459 Return value is an integer: 0 -> good match, 10 -> debugger applied
2460 non-standard coercions, 100 -> incompatible.
2461
2462 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2463 If a non-method is being searched for, SYMP will hold the symbol
2464 for it.
c906108c
SS
2465
2466 If a method is being searched for, and it is a static method,
2467 then STATICP will point to a non-zero value.
2468
7322dca9
SW
2469 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2470 ADL overload candidates when performing overload resolution for a fully
2471 qualified name.
2472
e66d4446
SC
2473 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2474 read while picking the best overload match (it may be all zeroes and thus
2475 not have a vtable pointer), in which case skip virtual function lookup.
2476 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2477 the result type.
2478
c906108c
SS
2479 Note: This function does *not* check the value of
2480 overload_resolution. Caller must check it to see whether overload
581e13c1 2481 resolution is permitted. */
c906108c
SS
2482
2483int
da096638 2484find_overload_match (struct value **args, int nargs,
4c3376c8 2485 const char *name, enum oload_search_type method,
28c64fc2 2486 struct value **objp, struct symbol *fsym,
ac3eeb49 2487 struct value **valp, struct symbol **symp,
e66d4446
SC
2488 int *staticp, const int no_adl,
2489 const enum noside noside)
c906108c 2490{
7f8c9282 2491 struct value *obj = (objp ? *objp : NULL);
da096638 2492 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2493 /* Index of best overloaded function. */
4c3376c8
SW
2494 int func_oload_champ = -1;
2495 int method_oload_champ = -1;
233e8b28
SC
2496 int src_method_oload_champ = -1;
2497 int ext_method_oload_champ = -1;
4c3376c8 2498
ac3eeb49 2499 /* The measure for the current best match. */
4c3376c8
SW
2500 struct badness_vector *method_badness = NULL;
2501 struct badness_vector *func_badness = NULL;
233e8b28
SC
2502 struct badness_vector *ext_method_badness = NULL;
2503 struct badness_vector *src_method_badness = NULL;
4c3376c8 2504
f23631e4 2505 struct value *temp = obj;
ac3eeb49
MS
2506 /* For methods, the list of overloaded methods. */
2507 struct fn_field *fns_ptr = NULL;
2508 /* For non-methods, the list of overloaded function symbols. */
2509 struct symbol **oload_syms = NULL;
233e8b28
SC
2510 /* For xmethods, the VEC of xmethod workers. */
2511 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2512 /* Number of overloaded instances being considered. */
2513 int num_fns = 0;
c5aa993b 2514 struct type *basetype = NULL;
6b850546 2515 LONGEST boffset;
7322dca9
SW
2516
2517 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2518
8d577d32 2519 const char *obj_type_name = NULL;
7322dca9 2520 const char *func_name = NULL;
8d577d32 2521 enum oload_classification match_quality;
4c3376c8 2522 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2523 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2524 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2525 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2526
ac3eeb49 2527 /* Get the list of overloaded methods or functions. */
4c3376c8 2528 if (method == METHOD || method == BOTH)
c906108c 2529 {
a2ca50ae 2530 gdb_assert (obj);
94af9270
KS
2531
2532 /* OBJ may be a pointer value rather than the object itself. */
2533 obj = coerce_ref (obj);
2534 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2535 obj = coerce_ref (value_ind (obj));
df407dfe 2536 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2537
2538 /* First check whether this is a data member, e.g. a pointer to
2539 a function. */
2540 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2541 {
8a13d42d 2542 *valp = search_struct_field (name, obj,
94af9270
KS
2543 check_typedef (value_type (obj)), 0);
2544 if (*valp)
2545 {
2546 *staticp = 1;
f748fb40 2547 do_cleanups (all_cleanups);
94af9270
KS
2548 return 0;
2549 }
2550 }
c906108c 2551
4c3376c8 2552 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2553 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2554 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2555 /* If this is a method only search, and no methods were found
2556 the search has faild. */
233e8b28 2557 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2558 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2559 obj_type_name,
2560 (obj_type_name && *obj_type_name) ? "::" : "",
2561 name);
4a1970e4 2562 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2563 been resolved by find_method_list via
2564 value_find_oload_method_list above. */
4c3376c8
SW
2565 if (fns_ptr)
2566 {
4bfb94b8 2567 gdb_assert (TYPE_SELF_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2568
233e8b28
SC
2569 src_method_oload_champ = find_oload_champ (args, nargs,
2570 num_fns, fns_ptr, NULL,
2571 NULL, &src_method_badness);
2572
2573 src_method_match_quality = classify_oload_match
2574 (src_method_badness, nargs,
2575 oload_method_static_p (fns_ptr, src_method_oload_champ));
2576
2577 make_cleanup (xfree, src_method_badness);
2578 }
4c3376c8 2579
233e8b28
SC
2580 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2581 {
2582 ext_method_oload_champ = find_oload_champ (args, nargs,
2583 0, NULL, xm_worker_vec,
2584 NULL, &ext_method_badness);
2585 ext_method_match_quality = classify_oload_match (ext_method_badness,
2586 nargs, 0);
2587 make_cleanup (xfree, ext_method_badness);
2588 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2589 }
2590
233e8b28
SC
2591 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2592 {
2593 switch (compare_badness (ext_method_badness, src_method_badness))
2594 {
2595 case 0: /* Src method and xmethod are equally good. */
233e8b28
SC
2596 /* If src method and xmethod are equally good, then
2597 xmethod should be the winner. Hence, fall through to the
2598 case where a xmethod is better than the source
2599 method, except when the xmethod match quality is
2600 non-standard. */
2601 /* FALLTHROUGH */
2602 case 1: /* Src method and ext method are incompatible. */
2603 /* If ext method match is not standard, then let source method
2604 win. Otherwise, fallthrough to let xmethod win. */
2605 if (ext_method_match_quality != STANDARD)
2606 {
2607 method_oload_champ = src_method_oload_champ;
2608 method_badness = src_method_badness;
2609 ext_method_oload_champ = -1;
2610 method_match_quality = src_method_match_quality;
2611 break;
2612 }
2613 /* FALLTHROUGH */
2614 case 2: /* Ext method is champion. */
2615 method_oload_champ = ext_method_oload_champ;
2616 method_badness = ext_method_badness;
2617 src_method_oload_champ = -1;
2618 method_match_quality = ext_method_match_quality;
2619 break;
2620 case 3: /* Src method is champion. */
2621 method_oload_champ = src_method_oload_champ;
2622 method_badness = src_method_badness;
2623 ext_method_oload_champ = -1;
2624 method_match_quality = src_method_match_quality;
2625 break;
2626 default:
2627 gdb_assert_not_reached ("Unexpected overload comparison "
2628 "result");
2629 break;
2630 }
2631 }
2632 else if (src_method_oload_champ >= 0)
2633 {
2634 method_oload_champ = src_method_oload_champ;
2635 method_badness = src_method_badness;
2636 method_match_quality = src_method_match_quality;
2637 }
2638 else if (ext_method_oload_champ >= 0)
2639 {
2640 method_oload_champ = ext_method_oload_champ;
2641 method_badness = ext_method_badness;
2642 method_match_quality = ext_method_match_quality;
2643 }
c906108c 2644 }
4c3376c8
SW
2645
2646 if (method == NON_METHOD || method == BOTH)
c906108c 2647 {
7322dca9 2648 const char *qualified_name = NULL;
c906108c 2649
b021a221
MS
2650 /* If the overload match is being search for both as a method
2651 and non member function, the first argument must now be
2652 dereferenced. */
4c3376c8 2653 if (method == BOTH)
2b214ea6 2654 args[0] = value_ind (args[0]);
4c3376c8 2655
7322dca9
SW
2656 if (fsym)
2657 {
2658 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2659
2660 /* If we have a function with a C++ name, try to extract just
2661 the function part. Do not try this for non-functions (e.g.
2662 function pointers). */
2663 if (qualified_name
3e43a32a
MS
2664 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2665 == TYPE_CODE_FUNC)
7322dca9
SW
2666 {
2667 char *temp;
2668
2669 temp = cp_func_name (qualified_name);
2670
2671 /* If cp_func_name did not remove anything, the name of the
2672 symbol did not include scope or argument types - it was
2673 probably a C-style function. */
2674 if (temp)
2675 {
2676 make_cleanup (xfree, temp);
2677 if (strcmp (temp, qualified_name) == 0)
2678 func_name = NULL;
2679 else
2680 func_name = temp;
2681 }
2682 }
2683 }
2684 else
94af9270 2685 {
7322dca9
SW
2686 func_name = name;
2687 qualified_name = name;
94af9270 2688 }
d9639e13 2689
94af9270
KS
2690 /* If there was no C++ name, this must be a C-style function or
2691 not a function at all. Just return the same symbol. Do the
2692 same if cp_func_name fails for some reason. */
8d577d32 2693 if (func_name == NULL)
7b83ea04 2694 {
917317f4 2695 *symp = fsym;
5fe41fbf 2696 do_cleanups (all_cleanups);
7b83ea04
AC
2697 return 0;
2698 }
917317f4 2699
da096638 2700 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2701 func_name,
2702 qualified_name,
2703 &oload_syms,
2704 &func_badness,
2705 no_adl);
8d577d32 2706
4c3376c8
SW
2707 if (func_oload_champ >= 0)
2708 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2709
2710 make_cleanup (xfree, oload_syms);
2711 make_cleanup (xfree, func_badness);
8d577d32
DC
2712 }
2713
7322dca9 2714 /* Did we find a match ? */
4c3376c8 2715 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2716 throw_error (NOT_FOUND_ERROR,
2717 _("No symbol \"%s\" in current context."),
2718 name);
8d577d32 2719
4c3376c8
SW
2720 /* If we have found both a method match and a function
2721 match, find out which one is better, and calculate match
2722 quality. */
2723 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2724 {
2725 switch (compare_badness (func_badness, method_badness))
2726 {
2727 case 0: /* Top two contenders are equally good. */
b021a221
MS
2728 /* FIXME: GDB does not support the general ambiguous case.
2729 All candidates should be collected and presented the
2730 user. */
4c3376c8
SW
2731 error (_("Ambiguous overload resolution"));
2732 break;
2733 case 1: /* Incomparable top contenders. */
2734 /* This is an error incompatible candidates
2735 should not have been proposed. */
3e43a32a
MS
2736 error (_("Internal error: incompatible "
2737 "overload candidates proposed"));
4c3376c8
SW
2738 break;
2739 case 2: /* Function champion. */
2740 method_oload_champ = -1;
2741 match_quality = func_match_quality;
2742 break;
2743 case 3: /* Method champion. */
2744 func_oload_champ = -1;
2745 match_quality = method_match_quality;
2746 break;
2747 default:
2748 error (_("Internal error: unexpected overload comparison result"));
2749 break;
2750 }
2751 }
2752 else
2753 {
2754 /* We have either a method match or a function match. */
2755 if (method_oload_champ >= 0)
2756 match_quality = method_match_quality;
2757 else
2758 match_quality = func_match_quality;
2759 }
8d577d32
DC
2760
2761 if (match_quality == INCOMPATIBLE)
2762 {
4c3376c8 2763 if (method == METHOD)
8a3fe4f8 2764 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2765 obj_type_name,
2766 (obj_type_name && *obj_type_name) ? "::" : "",
2767 name);
2768 else
8a3fe4f8 2769 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2770 func_name);
2771 }
2772 else if (match_quality == NON_STANDARD)
2773 {
4c3376c8 2774 if (method == METHOD)
3e43a32a
MS
2775 warning (_("Using non-standard conversion to match "
2776 "method %s%s%s to supplied arguments"),
8d577d32
DC
2777 obj_type_name,
2778 (obj_type_name && *obj_type_name) ? "::" : "",
2779 name);
2780 else
3e43a32a
MS
2781 warning (_("Using non-standard conversion to match "
2782 "function %s to supplied arguments"),
8d577d32
DC
2783 func_name);
2784 }
2785
4c3376c8 2786 if (staticp != NULL)
2bca57ba 2787 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2788
2789 if (method_oload_champ >= 0)
8d577d32 2790 {
233e8b28
SC
2791 if (src_method_oload_champ >= 0)
2792 {
e66d4446
SC
2793 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ)
2794 && noside != EVAL_AVOID_SIDE_EFFECTS)
2795 {
2796 *valp = value_virtual_fn_field (&temp, fns_ptr,
2797 method_oload_champ, basetype,
2798 boffset);
2799 }
233e8b28
SC
2800 else
2801 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2802 basetype, boffset);
2803 }
8d577d32 2804 else
233e8b28
SC
2805 {
2806 *valp = value_of_xmethod (clone_xmethod_worker
2807 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2808 ext_method_oload_champ)));
2809 }
8d577d32
DC
2810 }
2811 else
4c3376c8 2812 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2813
2814 if (objp)
2815 {
a4295225 2816 struct type *temp_type = check_typedef (value_type (temp));
da096638 2817 struct type *objtype = check_typedef (obj_type);
a109c7c1 2818
a4295225 2819 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2820 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2821 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2822 {
2823 temp = value_addr (temp);
2824 }
2825 *objp = temp;
2826 }
7322dca9
SW
2827
2828 do_cleanups (all_cleanups);
8d577d32
DC
2829
2830 switch (match_quality)
2831 {
2832 case INCOMPATIBLE:
2833 return 100;
2834 case NON_STANDARD:
2835 return 10;
2836 default: /* STANDARD */
2837 return 0;
2838 }
2839}
2840
2841/* Find the best overload match, searching for FUNC_NAME in namespaces
2842 contained in QUALIFIED_NAME until it either finds a good match or
2843 runs out of namespaces. It stores the overloaded functions in
2844 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2845 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2846 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2847 performned. */
8d577d32
DC
2848
2849static int
da096638 2850find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2851 const char *func_name,
2852 const char *qualified_name,
2853 struct symbol ***oload_syms,
7322dca9
SW
2854 struct badness_vector **oload_champ_bv,
2855 const int no_adl)
8d577d32
DC
2856{
2857 int oload_champ;
2858
da096638 2859 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2860 func_name,
2861 qualified_name, 0,
2862 oload_syms, oload_champ_bv,
7322dca9
SW
2863 &oload_champ,
2864 no_adl);
8d577d32
DC
2865
2866 return oload_champ;
2867}
2868
2869/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2870 how deep we've looked for namespaces, and the champ is stored in
2871 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2872 if it isn't. Other arguments are the same as in
2873 find_oload_champ_namespace
8d577d32
DC
2874
2875 It is the caller's responsibility to free *OLOAD_SYMS and
2876 *OLOAD_CHAMP_BV. */
2877
2878static int
da096638 2879find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2880 const char *func_name,
2881 const char *qualified_name,
2882 int namespace_len,
2883 struct symbol ***oload_syms,
2884 struct badness_vector **oload_champ_bv,
7322dca9
SW
2885 int *oload_champ,
2886 const int no_adl)
8d577d32
DC
2887{
2888 int next_namespace_len = namespace_len;
2889 int searched_deeper = 0;
2890 int num_fns = 0;
2891 struct cleanup *old_cleanups;
2892 int new_oload_champ;
2893 struct symbol **new_oload_syms;
2894 struct badness_vector *new_oload_champ_bv;
2895 char *new_namespace;
2896
2897 if (next_namespace_len != 0)
2898 {
2899 gdb_assert (qualified_name[next_namespace_len] == ':');
2900 next_namespace_len += 2;
c906108c 2901 }
ac3eeb49
MS
2902 next_namespace_len +=
2903 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2904
2905 /* Initialize these to values that can safely be xfree'd. */
2906 *oload_syms = NULL;
2907 *oload_champ_bv = NULL;
c5aa993b 2908
581e13c1 2909 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2910 If we get a good match there, use it. */
8d577d32
DC
2911
2912 if (qualified_name[next_namespace_len] == ':')
2913 {
2914 searched_deeper = 1;
2915
da096638 2916 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2917 func_name, qualified_name,
2918 next_namespace_len,
2919 oload_syms, oload_champ_bv,
7322dca9 2920 oload_champ, no_adl))
8d577d32
DC
2921 {
2922 return 1;
2923 }
2924 };
2925
2926 /* If we reach here, either we're in the deepest namespace or we
2927 didn't find a good match in a deeper namespace. But, in the
2928 latter case, we still have a bad match in a deeper namespace;
2929 note that we might not find any match at all in the current
2930 namespace. (There's always a match in the deepest namespace,
2931 because this overload mechanism only gets called if there's a
2932 function symbol to start off with.) */
2933
2934 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2935 make_cleanup (xfree, *oload_champ_bv);
224c3ddb 2936 new_namespace = (char *) alloca (namespace_len + 1);
8d577d32
DC
2937 strncpy (new_namespace, qualified_name, namespace_len);
2938 new_namespace[namespace_len] = '\0';
2939 new_oload_syms = make_symbol_overload_list (func_name,
2940 new_namespace);
7322dca9
SW
2941
2942 /* If we have reached the deepest level perform argument
2943 determined lookup. */
2944 if (!searched_deeper && !no_adl)
da096638
KS
2945 {
2946 int ix;
2947 struct type **arg_types;
2948
2949 /* Prepare list of argument types for overload resolution. */
2950 arg_types = (struct type **)
2951 alloca (nargs * (sizeof (struct type *)));
2952 for (ix = 0; ix < nargs; ix++)
2953 arg_types[ix] = value_type (args[ix]);
2954 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2955 }
7322dca9 2956
8d577d32
DC
2957 while (new_oload_syms[num_fns])
2958 ++num_fns;
2959
9cf95373 2960 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2961 NULL, NULL, new_oload_syms,
8d577d32
DC
2962 &new_oload_champ_bv);
2963
2964 /* Case 1: We found a good match. Free earlier matches (if any),
2965 and return it. Case 2: We didn't find a good match, but we're
2966 not the deepest function. Then go with the bad match that the
2967 deeper function found. Case 3: We found a bad match, and we're
2968 the deepest function. Then return what we found, even though
2969 it's a bad match. */
2970
2971 if (new_oload_champ != -1
2972 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2973 {
2974 *oload_syms = new_oload_syms;
2975 *oload_champ = new_oload_champ;
2976 *oload_champ_bv = new_oload_champ_bv;
2977 do_cleanups (old_cleanups);
2978 return 1;
2979 }
2980 else if (searched_deeper)
2981 {
2982 xfree (new_oload_syms);
2983 xfree (new_oload_champ_bv);
2984 discard_cleanups (old_cleanups);
2985 return 0;
2986 }
2987 else
2988 {
8d577d32
DC
2989 *oload_syms = new_oload_syms;
2990 *oload_champ = new_oload_champ;
2991 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2992 do_cleanups (old_cleanups);
8d577d32
DC
2993 return 0;
2994 }
2995}
2996
da096638 2997/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2998 the best match from among the overloaded methods or functions
233e8b28
SC
2999 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
3000 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
3001 non-NULL.
3002
3003 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
3004 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
3005
8d577d32
DC
3006 Return the index of the best match; store an indication of the
3007 quality of the match in OLOAD_CHAMP_BV.
3008
3009 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
3010
3011static int
9cf95373 3012find_oload_champ (struct value **args, int nargs,
8d577d32 3013 int num_fns, struct fn_field *fns_ptr,
233e8b28 3014 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
3015 struct symbol **oload_syms,
3016 struct badness_vector **oload_champ_bv)
3017{
3018 int ix;
233e8b28 3019 int fn_count;
ac3eeb49
MS
3020 /* A measure of how good an overloaded instance is. */
3021 struct badness_vector *bv;
3022 /* Index of best overloaded function. */
3023 int oload_champ = -1;
3024 /* Current ambiguity state for overload resolution. */
3025 int oload_ambiguous = 0;
3026 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3027
9cf95373 3028 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3029 alone, or in xmethods alone, but not in more than one of these
3030 groups. */
3031 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3032 == 1);
9cf95373 3033
8d577d32 3034 *oload_champ_bv = NULL;
c906108c 3035
233e8b28
SC
3036 fn_count = (xm_worker_vec != NULL
3037 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3038 : num_fns);
ac3eeb49 3039 /* Consider each candidate in turn. */
233e8b28 3040 for (ix = 0; ix < fn_count; ix++)
c906108c 3041 {
8d577d32 3042 int jj;
233e8b28 3043 int static_offset = 0;
8d577d32
DC
3044 int nparms;
3045 struct type **parm_types;
233e8b28 3046 struct xmethod_worker *worker = NULL;
8d577d32 3047
233e8b28 3048 if (xm_worker_vec != NULL)
db577aea 3049 {
233e8b28
SC
3050 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3051 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3052 }
3053 else
3054 {
233e8b28
SC
3055 if (fns_ptr != NULL)
3056 {
3057 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3058 static_offset = oload_method_static_p (fns_ptr, ix);
3059 }
3060 else
3061 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3062
8d749320 3063 parm_types = XNEWVEC (struct type *, nparms);
233e8b28
SC
3064 for (jj = 0; jj < nparms; jj++)
3065 parm_types[jj] = (fns_ptr != NULL
3066 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3067 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
8301c89e 3068 jj));
db577aea 3069 }
c906108c 3070
ac3eeb49
MS
3071 /* Compare parameter types to supplied argument types. Skip
3072 THIS for static methods. */
3073 bv = rank_function (parm_types, nparms,
da096638 3074 args + static_offset,
4a1970e4 3075 nargs - static_offset);
c5aa993b 3076
8d577d32 3077 if (!*oload_champ_bv)
c5aa993b 3078 {
8d577d32 3079 *oload_champ_bv = bv;
c5aa993b 3080 oload_champ = 0;
c5aa993b 3081 }
ac3eeb49
MS
3082 else /* See whether current candidate is better or worse than
3083 previous best. */
8d577d32 3084 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3085 {
ac3eeb49
MS
3086 case 0: /* Top two contenders are equally good. */
3087 oload_ambiguous = 1;
c5aa993b 3088 break;
ac3eeb49
MS
3089 case 1: /* Incomparable top contenders. */
3090 oload_ambiguous = 2;
c5aa993b 3091 break;
ac3eeb49
MS
3092 case 2: /* New champion, record details. */
3093 *oload_champ_bv = bv;
c5aa993b
JM
3094 oload_ambiguous = 0;
3095 oload_champ = ix;
c5aa993b
JM
3096 break;
3097 case 3:
3098 default:
3099 break;
3100 }
b8c9b27d 3101 xfree (parm_types);
6b1ba9a0
ND
3102 if (overload_debug)
3103 {
233e8b28 3104 if (fns_ptr != NULL)
ac3eeb49 3105 fprintf_filtered (gdb_stderr,
3e43a32a 3106 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3107 fns_ptr[ix].physname, nparms);
233e8b28
SC
3108 else if (xm_worker_vec != NULL)
3109 fprintf_filtered (gdb_stderr,
3110 "Xmethod worker, # of parms %d\n",
3111 nparms);
6b1ba9a0 3112 else
ac3eeb49 3113 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3114 "Overloaded function instance "
3115 "%s # of parms %d\n",
ac3eeb49
MS
3116 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3117 nparms);
4a1970e4 3118 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3119 fprintf_filtered (gdb_stderr,
3120 "...Badness @ %d : %d\n",
6403aeea 3121 jj, bv->rank[jj].rank);
3e43a32a
MS
3122 fprintf_filtered (gdb_stderr, "Overload resolution "
3123 "champion is %d, ambiguous? %d\n",
ac3eeb49 3124 oload_champ, oload_ambiguous);
6b1ba9a0 3125 }
c906108c
SS
3126 }
3127
8d577d32
DC
3128 return oload_champ;
3129}
6b1ba9a0 3130
8d577d32
DC
3131/* Return 1 if we're looking at a static method, 0 if we're looking at
3132 a non-static method or a function that isn't a method. */
c906108c 3133
8d577d32 3134static int
2bca57ba 3135oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3136{
2bca57ba 3137 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3138 return 1;
c906108c 3139 else
8d577d32
DC
3140 return 0;
3141}
c906108c 3142
8d577d32
DC
3143/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3144
3145static enum oload_classification
3146classify_oload_match (struct badness_vector *oload_champ_bv,
3147 int nargs,
3148 int static_offset)
3149{
3150 int ix;
da096638 3151 enum oload_classification worst = STANDARD;
8d577d32
DC
3152
3153 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3154 {
6403aeea
SW
3155 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3156 or worse return INCOMPATIBLE. */
3157 if (compare_ranks (oload_champ_bv->rank[ix],
3158 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3159 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3160 /* Otherwise If this conversion is as bad as
3161 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3162 else if (compare_ranks (oload_champ_bv->rank[ix],
3163 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3164 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3165 needed. */
7f8c9282 3166 }
02f0d45d 3167
da096638
KS
3168 /* If no INCOMPATIBLE classification was found, return the worst one
3169 that was found (if any). */
3170 return worst;
c906108c
SS
3171}
3172
ac3eeb49
MS
3173/* C++: return 1 is NAME is a legitimate name for the destructor of
3174 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3175 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3176 have CHECK_TYPEDEF applied, this function will apply it itself. */
3177
c906108c 3178int
d8228535 3179destructor_name_p (const char *name, struct type *type)
c906108c 3180{
c906108c
SS
3181 if (name[0] == '~')
3182 {
d8228535
JK
3183 const char *dname = type_name_no_tag_or_error (type);
3184 const char *cp = strchr (dname, '<');
c906108c
SS
3185 unsigned int len;
3186
3187 /* Do not compare the template part for template classes. */
3188 if (cp == NULL)
3189 len = strlen (dname);
3190 else
3191 len = cp - dname;
bf896cb0 3192 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3193 error (_("name of destructor must equal name of class"));
c906108c
SS
3194 else
3195 return 1;
3196 }
3197 return 0;
3198}
3199
3d567982
TT
3200/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3201 class". If the name is found, return a value representing it;
3202 otherwise throw an exception. */
3203
3204static struct value *
3205enum_constant_from_type (struct type *type, const char *name)
3206{
3207 int i;
3208 int name_len = strlen (name);
3209
3210 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3211 && TYPE_DECLARED_CLASS (type));
3212
3213 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3214 {
3215 const char *fname = TYPE_FIELD_NAME (type, i);
3216 int len;
3217
3218 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3219 || fname == NULL)
3220 continue;
3221
3222 /* Look for the trailing "::NAME", since enum class constant
3223 names are qualified here. */
3224 len = strlen (fname);
3225 if (len + 2 >= name_len
3226 && fname[len - name_len - 2] == ':'
3227 && fname[len - name_len - 1] == ':'
3228 && strcmp (&fname[len - name_len], name) == 0)
3229 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3230 }
3231
3232 error (_("no constant named \"%s\" in enum \"%s\""),
3233 name, TYPE_TAG_NAME (type));
3234}
3235
79c2c32d 3236/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3237 return the appropriate member (or the address of the member, if
3238 WANT_ADDRESS). This function is used to resolve user expressions
3239 of the form "DOMAIN::NAME". For more details on what happens, see
3240 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3241
3242struct value *
c848d642 3243value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3244 struct type *expect_type, int want_address,
79c2c32d
DC
3245 enum noside noside)
3246{
3247 switch (TYPE_CODE (curtype))
3248 {
3249 case TYPE_CODE_STRUCT:
3250 case TYPE_CODE_UNION:
ac3eeb49 3251 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3252 name, expect_type,
0d5de010 3253 want_address, noside);
79c2c32d 3254 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3255 return value_namespace_elt (curtype, name,
3256 want_address, noside);
3d567982
TT
3257
3258 case TYPE_CODE_ENUM:
3259 return enum_constant_from_type (curtype, name);
3260
79c2c32d
DC
3261 default:
3262 internal_error (__FILE__, __LINE__,
e2e0b3e5 3263 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3264 }
3265}
3266
072bba3b 3267/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3268 with respect to the methods' parameters. If the types of the
072bba3b
KS
3269 two parameter lists are the same, returns 1; 0 otherwise. This
3270 comparison may ignore any artificial parameters in T1 if
3271 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3272 the first artificial parameter in T1, assumed to be a 'this' pointer.
3273
3274 The type T2 is expected to have come from make_params (in eval.c). */
3275
3276static int
3277compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3278{
3279 int start = 0;
3280
80b23b6a 3281 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3282 ++start;
3283
3284 /* If skipping artificial fields, find the first real field
581e13c1 3285 in T1. */
072bba3b
KS
3286 if (skip_artificial)
3287 {
3288 while (start < TYPE_NFIELDS (t1)
3289 && TYPE_FIELD_ARTIFICIAL (t1, start))
3290 ++start;
3291 }
3292
581e13c1 3293 /* Now compare parameters. */
072bba3b
KS
3294
3295 /* Special case: a method taking void. T1 will contain no
3296 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3297 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3298 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3299 return 1;
3300
3301 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3302 {
3303 int i;
a109c7c1 3304
072bba3b
KS
3305 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3306 {
6403aeea 3307 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3308 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3309 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3310 return 0;
3311 }
3312
3313 return 1;
3314 }
3315
3316 return 0;
3317}
3318
c906108c 3319/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3320 return the address of this member as a "pointer to member" type.
3321 If INTYPE is non-null, then it will be the type of the member we
3322 are looking for. This will help us resolve "pointers to member
3323 functions". This function is used to resolve user expressions of
3324 the form "DOMAIN::NAME". */
c906108c 3325
63d06c5c 3326static struct value *
fba45db2 3327value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3328 struct type *curtype, const char *name,
ac3eeb49
MS
3329 struct type *intype,
3330 int want_address,
63d06c5c 3331 enum noside noside)
c906108c 3332{
52f0bd74
AC
3333 struct type *t = curtype;
3334 int i;
0d5de010 3335 struct value *v, *result;
c906108c 3336
c5aa993b 3337 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3338 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3339 error (_("Internal error: non-aggregate type "
3340 "to value_struct_elt_for_reference"));
c906108c
SS
3341
3342 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3343 {
0d5cff50 3344 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3345
6314a349 3346 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3347 {
d6a843b5 3348 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3349 {
3350 v = value_static_field (t, i);
0d5de010
DJ
3351 if (want_address)
3352 v = value_addr (v);
c906108c
SS
3353 return v;
3354 }
3355 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3356 error (_("pointers to bitfield members not allowed"));
c5aa993b 3357
0d5de010
DJ
3358 if (want_address)
3359 return value_from_longest
3360 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3361 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3362 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3363 return allocate_value (TYPE_FIELD_TYPE (t, i));
3364 else
f7e3ecae
KS
3365 {
3366 /* Try to evaluate NAME as a qualified name with implicit
3367 this pointer. In this case, attempt to return the
3368 equivalent to `this->*(&TYPE::NAME)'. */
3369 v = value_of_this_silent (current_language);
3370 if (v != NULL)
3371 {
3372 struct value *ptr;
3373 long mem_offset;
3374 struct type *type, *tmp;
3375
3376 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3377 type = check_typedef (value_type (ptr));
3378 gdb_assert (type != NULL
3379 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
4bfb94b8 3380 tmp = lookup_pointer_type (TYPE_SELF_TYPE (type));
f7e3ecae
KS
3381 v = value_cast_pointers (tmp, v, 1);
3382 mem_offset = value_as_long (ptr);
3383 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3384 result = value_from_pointer (tmp,
3385 value_as_long (v) + mem_offset);
3386 return value_ind (result);
3387 }
3388
3389 error (_("Cannot reference non-static field \"%s\""), name);
3390 }
c906108c
SS
3391 }
3392 }
3393
ac3eeb49
MS
3394 /* C++: If it was not found as a data field, then try to return it
3395 as a pointer to a method. */
c906108c 3396
c906108c
SS
3397 /* Perform all necessary dereferencing. */
3398 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3399 intype = TYPE_TARGET_TYPE (intype);
3400
3401 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3402 {
0d5cff50 3403 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3404 char dem_opname[64];
3405
61012eef
GB
3406 if (startswith (t_field_name, "__")
3407 || startswith (t_field_name, "op")
3408 || startswith (t_field_name, "type"))
c906108c 3409 {
ac3eeb49
MS
3410 if (cplus_demangle_opname (t_field_name,
3411 dem_opname, DMGL_ANSI))
c5aa993b 3412 t_field_name = dem_opname;
ac3eeb49
MS
3413 else if (cplus_demangle_opname (t_field_name,
3414 dem_opname, 0))
c906108c 3415 t_field_name = dem_opname;
c906108c 3416 }
6314a349 3417 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3418 {
072bba3b
KS
3419 int j;
3420 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3421 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3422
de17c821
DJ
3423 check_stub_method_group (t, i);
3424
c906108c
SS
3425 if (intype)
3426 {
072bba3b
KS
3427 for (j = 0; j < len; ++j)
3428 {
3429 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3430 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3431 intype, 1))
072bba3b
KS
3432 break;
3433 }
3434
3435 if (j == len)
3e43a32a
MS
3436 error (_("no member function matches "
3437 "that type instantiation"));
7f79b1c5 3438 }
c906108c 3439 else
072bba3b
KS
3440 {
3441 int ii;
7f79b1c5
DJ
3442
3443 j = -1;
53832f31 3444 for (ii = 0; ii < len; ++ii)
072bba3b 3445 {
7f79b1c5
DJ
3446 /* Skip artificial methods. This is necessary if,
3447 for example, the user wants to "print
3448 subclass::subclass" with only one user-defined
53832f31
TT
3449 constructor. There is no ambiguity in this case.
3450 We are careful here to allow artificial methods
3451 if they are the unique result. */
072bba3b 3452 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3453 {
3454 if (j == -1)
3455 j = ii;
3456 continue;
3457 }
072bba3b 3458
7f79b1c5
DJ
3459 /* Desired method is ambiguous if more than one
3460 method is defined. */
53832f31 3461 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3462 error (_("non-unique member `%s' requires "
3463 "type instantiation"), name);
072bba3b 3464
7f79b1c5
DJ
3465 j = ii;
3466 }
53832f31
TT
3467
3468 if (j == -1)
3469 error (_("no matching member function"));
072bba3b 3470 }
c5aa993b 3471
0d5de010
DJ
3472 if (TYPE_FN_FIELD_STATIC_P (f, j))
3473 {
ac3eeb49
MS
3474 struct symbol *s =
3475 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3476 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3477
0d5de010
DJ
3478 if (s == NULL)
3479 return NULL;
3480
3481 if (want_address)
63e43d3a 3482 return value_addr (read_var_value (s, 0, 0));
0d5de010 3483 else
63e43d3a 3484 return read_var_value (s, 0, 0);
0d5de010
DJ
3485 }
3486
c906108c
SS
3487 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3488 {
0d5de010
DJ
3489 if (want_address)
3490 {
3491 result = allocate_value
3492 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3493 cplus_make_method_ptr (value_type (result),
3494 value_contents_writeable (result),
0d5de010
DJ
3495 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3496 }
3497 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3498 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3499 else
3500 error (_("Cannot reference virtual member function \"%s\""),
3501 name);
c906108c
SS
3502 }
3503 else
3504 {
ac3eeb49
MS
3505 struct symbol *s =
3506 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3507 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3508
c906108c 3509 if (s == NULL)
0d5de010
DJ
3510 return NULL;
3511
63e43d3a 3512 v = read_var_value (s, 0, 0);
0d5de010
DJ
3513 if (!want_address)
3514 result = v;
c906108c
SS
3515 else
3516 {
0d5de010 3517 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3518 cplus_make_method_ptr (value_type (result),
3519 value_contents_writeable (result),
42ae5230 3520 value_address (v), 0);
c906108c 3521 }
c906108c 3522 }
0d5de010 3523 return result;
c906108c
SS
3524 }
3525 }
3526 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3527 {
f23631e4 3528 struct value *v;
c906108c
SS
3529 int base_offset;
3530
3531 if (BASETYPE_VIA_VIRTUAL (t, i))
3532 base_offset = 0;
3533 else
3534 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3535 v = value_struct_elt_for_reference (domain,
3536 offset + base_offset,
3537 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3538 name, intype,
3539 want_address, noside);
c906108c
SS
3540 if (v)
3541 return v;
3542 }
63d06c5c
DC
3543
3544 /* As a last chance, pretend that CURTYPE is a namespace, and look
3545 it up that way; this (frequently) works for types nested inside
3546 classes. */
3547
ac3eeb49
MS
3548 return value_maybe_namespace_elt (curtype, name,
3549 want_address, noside);
c906108c
SS
3550}
3551
79c2c32d
DC
3552/* C++: Return the member NAME of the namespace given by the type
3553 CURTYPE. */
3554
3555static struct value *
3556value_namespace_elt (const struct type *curtype,
c848d642 3557 const char *name, int want_address,
79c2c32d 3558 enum noside noside)
63d06c5c
DC
3559{
3560 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3561 want_address,
3562 noside);
63d06c5c
DC
3563
3564 if (retval == NULL)
ac3eeb49
MS
3565 error (_("No symbol \"%s\" in namespace \"%s\"."),
3566 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3567
3568 return retval;
3569}
3570
3571/* A helper function used by value_namespace_elt and
3572 value_struct_elt_for_reference. It looks up NAME inside the
3573 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3574 is a class and NAME refers to a type in CURTYPE itself (as opposed
3575 to, say, some base class of CURTYPE). */
3576
3577static struct value *
3578value_maybe_namespace_elt (const struct type *curtype,
c848d642 3579 const char *name, int want_address,
63d06c5c 3580 enum noside noside)
79c2c32d
DC
3581{
3582 const char *namespace_name = TYPE_TAG_NAME (curtype);
d12307c1 3583 struct block_symbol sym;
0d5de010 3584 struct value *result;
79c2c32d 3585
13387711 3586 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3587 get_selected_block (0), VAR_DOMAIN);
3588
d12307c1 3589 if (sym.symbol == NULL)
63d06c5c 3590 return NULL;
79c2c32d 3591 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
d12307c1
PMR
3592 && (SYMBOL_CLASS (sym.symbol) == LOC_TYPEDEF))
3593 result = allocate_value (SYMBOL_TYPE (sym.symbol));
79c2c32d 3594 else
d12307c1 3595 result = value_of_variable (sym.symbol, sym.block);
0d5de010 3596
ae6a105d 3597 if (want_address)
0d5de010
DJ
3598 result = value_addr (result);
3599
3600 return result;
79c2c32d
DC
3601}
3602
dfcee124 3603/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3604
c906108c 3605 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3606 and refer to the values computed for the object pointed to. */
c906108c
SS
3607
3608struct type *
dfcee124 3609value_rtti_indirect_type (struct value *v, int *full,
6b850546 3610 LONGEST *top, int *using_enc)
c906108c 3611{
f7e5394d 3612 struct value *target = NULL;
dfcee124
AG
3613 struct type *type, *real_type, *target_type;
3614
3615 type = value_type (v);
3616 type = check_typedef (type);
3617 if (TYPE_CODE (type) == TYPE_CODE_REF)
3618 target = coerce_ref (v);
3619 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
f7e5394d 3620 {
f7e5394d 3621
492d29ea 3622 TRY
f7e5394d
SM
3623 {
3624 target = value_ind (v);
3625 }
492d29ea 3626 CATCH (except, RETURN_MASK_ERROR)
f7e5394d
SM
3627 {
3628 if (except.error == MEMORY_ERROR)
3629 {
3630 /* value_ind threw a memory error. The pointer is NULL or
3631 contains an uninitialized value: we can't determine any
3632 type. */
3633 return NULL;
3634 }
3635 throw_exception (except);
3636 }
492d29ea 3637 END_CATCH
f7e5394d 3638 }
dfcee124
AG
3639 else
3640 return NULL;
c906108c 3641
dfcee124
AG
3642 real_type = value_rtti_type (target, full, top, using_enc);
3643
3644 if (real_type)
3645 {
3646 /* Copy qualifiers to the referenced object. */
3647 target_type = value_type (target);
3648 real_type = make_cv_type (TYPE_CONST (target_type),
3649 TYPE_VOLATILE (target_type), real_type, NULL);
3650 if (TYPE_CODE (type) == TYPE_CODE_REF)
3b224330 3651 real_type = lookup_lvalue_reference_type (real_type);
dfcee124
AG
3652 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3653 real_type = lookup_pointer_type (real_type);
3654 else
3655 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3656
3657 /* Copy qualifiers to the pointer/reference. */
3658 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3659 real_type, NULL);
3660 }
c906108c 3661
dfcee124 3662 return real_type;
c906108c
SS
3663}
3664
3665/* Given a value pointed to by ARGP, check its real run-time type, and
3666 if that is different from the enclosing type, create a new value
3667 using the real run-time type as the enclosing type (and of the same
3668 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3669 be the correct offset to the enclosed object. RTYPE is the type,
3670 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3671 by value_rtti_type(). If these are available, they can be supplied
3672 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3673 NULL if they're not available. */
c906108c 3674
f23631e4 3675struct value *
ac3eeb49
MS
3676value_full_object (struct value *argp,
3677 struct type *rtype,
3678 int xfull, int xtop,
fba45db2 3679 int xusing_enc)
c906108c 3680{
c5aa993b 3681 struct type *real_type;
c906108c 3682 int full = 0;
6b850546 3683 LONGEST top = -1;
c906108c 3684 int using_enc = 0;
f23631e4 3685 struct value *new_val;
c906108c
SS
3686
3687 if (rtype)
3688 {
3689 real_type = rtype;
3690 full = xfull;
3691 top = xtop;
3692 using_enc = xusing_enc;
3693 }
3694 else
3695 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3696
ac3eeb49 3697 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3698 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3699 return argp;
3700
a7860e76
TT
3701 /* In a destructor we might see a real type that is a superclass of
3702 the object's type. In this case it is better to leave the object
3703 as-is. */
3704 if (full
3705 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3706 return argp;
3707
c906108c 3708 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3709 type is wrong, set it. */
3710 /* pai: FIXME -- sounds iffy */
c906108c
SS
3711 if (full)
3712 {
4dfea560
DE
3713 argp = value_copy (argp);
3714 set_value_enclosing_type (argp, real_type);
c906108c
SS
3715 return argp;
3716 }
3717
581e13c1 3718 /* Check if object is in memory. */
c906108c
SS
3719 if (VALUE_LVAL (argp) != lval_memory)
3720 {
3e43a32a
MS
3721 warning (_("Couldn't retrieve complete object of RTTI "
3722 "type %s; object may be in register(s)."),
ac3eeb49 3723 TYPE_NAME (real_type));
c5aa993b 3724
c906108c
SS
3725 return argp;
3726 }
c5aa993b 3727
ac3eeb49
MS
3728 /* All other cases -- retrieve the complete object. */
3729 /* Go back by the computed top_offset from the beginning of the
3730 object, adjusting for the embedded offset of argp if that's what
3731 value_rtti_type used for its computation. */
42ae5230 3732 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3733 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3734 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3735 set_value_embedded_offset (new_val, (using_enc
3736 ? top + value_embedded_offset (argp)
3737 : top));
c906108c
SS
3738 return new_val;
3739}
3740
389e51db 3741
85bc8cb7
JK
3742/* Return the value of the local variable, if one exists. Throw error
3743 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3744
f23631e4 3745struct value *
85bc8cb7 3746value_of_this (const struct language_defn *lang)
c906108c 3747{
63e43d3a 3748 struct block_symbol sym;
3977b71f 3749 const struct block *b;
206415a3 3750 struct frame_info *frame;
c906108c 3751
66a17cb6 3752 if (!lang->la_name_of_this)
85bc8cb7 3753 error (_("no `this' in current language"));
aee28ec6 3754
85bc8cb7 3755 frame = get_selected_frame (_("no frame selected"));
c906108c 3756
66a17cb6 3757 b = get_frame_block (frame, NULL);
c906108c 3758
63e43d3a
PMR
3759 sym = lookup_language_this (lang, b);
3760 if (sym.symbol == NULL)
85bc8cb7
JK
3761 error (_("current stack frame does not contain a variable named `%s'"),
3762 lang->la_name_of_this);
3763
63e43d3a 3764 return read_var_value (sym.symbol, sym.block, frame);
85bc8cb7
JK
3765}
3766
3767/* Return the value of the local variable, if one exists. Return NULL
3768 otherwise. Never throw error. */
3769
3770struct value *
3771value_of_this_silent (const struct language_defn *lang)
3772{
3773 struct value *ret = NULL;
85bc8cb7 3774
492d29ea 3775 TRY
c906108c 3776 {
85bc8cb7 3777 ret = value_of_this (lang);
c906108c 3778 }
492d29ea
PA
3779 CATCH (except, RETURN_MASK_ERROR)
3780 {
3781 }
3782 END_CATCH
c906108c 3783
d069f99d
AF
3784 return ret;
3785}
3786
ac3eeb49
MS
3787/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3788 elements long, starting at LOWBOUND. The result has the same lower
3789 bound as the original ARRAY. */
c906108c 3790
f23631e4
AC
3791struct value *
3792value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3793{
3794 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3795 LONGEST lowerbound, upperbound;
f23631e4 3796 struct value *slice;
c906108c 3797 struct type *array_type;
ac3eeb49 3798
df407dfe 3799 array_type = check_typedef (value_type (array));
c906108c 3800 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3801 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3802 error (_("cannot take slice of non-array"));
ac3eeb49 3803
c906108c
SS
3804 range_type = TYPE_INDEX_TYPE (array_type);
3805 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3806 error (_("slice from bad array or bitstring"));
ac3eeb49 3807
c906108c 3808 if (lowbound < lowerbound || length < 0
db034ac5 3809 || lowbound + length - 1 > upperbound)
8a3fe4f8 3810 error (_("slice out of range"));
ac3eeb49 3811
c906108c
SS
3812 /* FIXME-type-allocation: need a way to free this type when we are
3813 done with it. */
0c9c3474
SA
3814 slice_range_type = create_static_range_type ((struct type *) NULL,
3815 TYPE_TARGET_TYPE (range_type),
3816 lowbound,
3817 lowbound + length - 1);
ac3eeb49 3818
a7c88acd
JB
3819 {
3820 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3821 LONGEST offset
3822 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3823
a7c88acd
JB
3824 slice_type = create_array_type ((struct type *) NULL,
3825 element_type,
3826 slice_range_type);
3827 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3828
a7c88acd
JB
3829 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3830 slice = allocate_value_lazy (slice_type);
3831 else
3832 {
3833 slice = allocate_value (slice_type);
3834 value_contents_copy (slice, 0, array, offset,
3ae385af 3835 type_length_units (slice_type));
a7c88acd
JB
3836 }
3837
3838 set_value_component_location (slice, array);
a7c88acd
JB
3839 set_value_offset (slice, value_offset (array) + offset);
3840 }
ac3eeb49 3841
c906108c
SS
3842 return slice;
3843}
3844
ac3eeb49
MS
3845/* Create a value for a FORTRAN complex number. Currently most of the
3846 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3847 composed of 2 doubles. This really should be a smarter routine
3848 that figures out precision inteligently as opposed to assuming
ac3eeb49 3849 doubles. FIXME: fmb */
c906108c 3850
f23631e4 3851struct value *
ac3eeb49
MS
3852value_literal_complex (struct value *arg1,
3853 struct value *arg2,
3854 struct type *type)
c906108c 3855{
f23631e4 3856 struct value *val;
c906108c
SS
3857 struct type *real_type = TYPE_TARGET_TYPE (type);
3858
3859 val = allocate_value (type);
3860 arg1 = value_cast (real_type, arg1);
3861 arg2 = value_cast (real_type, arg2);
3862
990a07ab 3863 memcpy (value_contents_raw (val),
0fd88904 3864 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3865 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3866 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3867 return val;
3868}
3869
ac3eeb49 3870/* Cast a value into the appropriate complex data type. */
c906108c 3871
f23631e4
AC
3872static struct value *
3873cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3874{
3875 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3876
df407dfe 3877 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3878 {
df407dfe 3879 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3880 struct value *re_val = allocate_value (val_real_type);
3881 struct value *im_val = allocate_value (val_real_type);
c906108c 3882
990a07ab 3883 memcpy (value_contents_raw (re_val),
0fd88904 3884 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3885 memcpy (value_contents_raw (im_val),
0fd88904 3886 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3887 TYPE_LENGTH (val_real_type));
c906108c
SS
3888
3889 return value_literal_complex (re_val, im_val, type);
3890 }
df407dfe
AC
3891 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3892 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3893 return value_literal_complex (val,
3894 value_zero (real_type, not_lval),
3895 type);
c906108c 3896 else
8a3fe4f8 3897 error (_("cannot cast non-number to complex"));
c906108c
SS
3898}
3899
3900void
fba45db2 3901_initialize_valops (void)
c906108c 3902{
5bf193a2
AC
3903 add_setshow_boolean_cmd ("overload-resolution", class_support,
3904 &overload_resolution, _("\
3905Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3906Show overload resolution in evaluating C++ functions."),
3907 NULL, NULL,
920d2a44 3908 show_overload_resolution,
5bf193a2 3909 &setlist, &showlist);
c906108c 3910 overload_resolution = 1;
c906108c 3911}
This page took 3.189717 seconds and 4 git commands to generate.