testsuite/gdb.ada/var_rec_arr: New testcase.
[deliverable/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
32d0add0 3 Copyright (C) 1992-2015 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
4c4b4cd2
PH
24#include "gdb_regex.h"
25#include "frame.h"
14f9c5c9
AS
26#include "symtab.h"
27#include "gdbtypes.h"
28#include "gdbcmd.h"
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
a53b64ea 32#include "varobj.h"
14f9c5c9
AS
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
38#include "gdbcore.h"
4c4b4cd2
PH
39#include "hashtab.h"
40#include "gdb_obstack.h"
14f9c5c9 41#include "ada-lang.h"
4c4b4cd2 42#include "completer.h"
53ce3c39 43#include <sys/stat.h>
14f9c5c9 44#include "ui-out.h"
fe898f56 45#include "block.h"
04714b91 46#include "infcall.h"
de4f826b 47#include "dictionary.h"
f7f9143b
JB
48#include "annotate.h"
49#include "valprint.h"
9bbc9174 50#include "source.h"
0259addd 51#include "observer.h"
2ba95b9b 52#include "vec.h"
692465f1 53#include "stack.h"
fa864999 54#include "gdb_vecs.h"
79d43c61 55#include "typeprint.h"
14f9c5c9 56
ccefe4c4 57#include "psymtab.h"
40bc484c 58#include "value.h"
956a9fb9 59#include "mi/mi-common.h"
9ac4176b 60#include "arch-utils.h"
0fcd72ba 61#include "cli/cli-utils.h"
ccefe4c4 62
4c4b4cd2 63/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 64 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
65 Copied from valarith.c. */
66
67#ifndef TRUNCATION_TOWARDS_ZERO
68#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
69#endif
70
d2e4a39e 71static struct type *desc_base_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct type *desc_bounds_type (struct type *);
14f9c5c9 74
d2e4a39e 75static struct value *desc_bounds (struct value *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 78
d2e4a39e 79static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 80
556bdfd4 81static struct type *desc_data_target_type (struct type *);
14f9c5c9 82
d2e4a39e 83static struct value *desc_data (struct value *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 86
d2e4a39e 87static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 88
d2e4a39e 89static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 94
d2e4a39e 95static struct type *desc_index_type (struct type *, int);
14f9c5c9 96
d2e4a39e 97static int desc_arity (struct type *);
14f9c5c9 98
d2e4a39e 99static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 100
d2e4a39e 101static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 102
40658b94
PH
103static int full_match (const char *, const char *);
104
40bc484c 105static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 106
4c4b4cd2 107static void ada_add_block_symbols (struct obstack *,
f0c5f9b2 108 const struct block *, const char *,
2570f2b7 109 domain_enum, struct objfile *, int);
14f9c5c9 110
4c4b4cd2 111static int is_nonfunction (struct ada_symbol_info *, int);
14f9c5c9 112
76a01679 113static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 114 const struct block *);
14f9c5c9 115
4c4b4cd2
PH
116static int num_defns_collected (struct obstack *);
117
118static struct ada_symbol_info *defns_collected (struct obstack *, int);
14f9c5c9 119
4c4b4cd2 120static struct value *resolve_subexp (struct expression **, int *, int,
76a01679 121 struct type *);
14f9c5c9 122
d2e4a39e 123static void replace_operator_with_call (struct expression **, int, int, int,
270140bd 124 struct symbol *, const struct block *);
14f9c5c9 125
d2e4a39e 126static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 127
4c4b4cd2
PH
128static char *ada_op_name (enum exp_opcode);
129
130static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 131
d2e4a39e 132static int numeric_type_p (struct type *);
14f9c5c9 133
d2e4a39e 134static int integer_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int scalar_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int discrete_type_p (struct type *);
14f9c5c9 139
aeb5907d
JB
140static enum ada_renaming_category parse_old_style_renaming (struct type *,
141 const char **,
142 int *,
143 const char **);
144
145static struct symbol *find_old_style_renaming_symbol (const char *,
270140bd 146 const struct block *);
aeb5907d 147
4c4b4cd2 148static struct type *ada_lookup_struct_elt_type (struct type *, char *,
76a01679 149 int, int, int *);
4c4b4cd2 150
d2e4a39e 151static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 152
b4ba55a1
JB
153static struct type *ada_find_parallel_type_with_name (struct type *,
154 const char *);
155
d2e4a39e 156static int is_dynamic_field (struct type *, int);
14f9c5c9 157
10a2c479 158static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 159 const gdb_byte *,
4c4b4cd2
PH
160 CORE_ADDR, struct value *);
161
162static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 163
28c85d6c 164static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 165
d2e4a39e 166static struct type *to_static_fixed_type (struct type *);
f192137b 167static struct type *static_unwrap_type (struct type *type);
14f9c5c9 168
d2e4a39e 169static struct value *unwrap_value (struct value *);
14f9c5c9 170
ad82864c 171static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 172
ad82864c 173static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 174
ad82864c
JB
175static long decode_packed_array_bitsize (struct type *);
176
177static struct value *decode_constrained_packed_array (struct value *);
178
179static int ada_is_packed_array_type (struct type *);
180
181static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 182
d2e4a39e 183static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 184 struct value **);
14f9c5c9 185
50810684 186static void move_bits (gdb_byte *, int, const gdb_byte *, int, int, int);
52ce6436 187
4c4b4cd2
PH
188static struct value *coerce_unspec_val_to_type (struct value *,
189 struct type *);
14f9c5c9 190
d2e4a39e 191static struct value *get_var_value (char *, char *);
14f9c5c9 192
d2e4a39e 193static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 194
d2e4a39e 195static int equiv_types (struct type *, struct type *);
14f9c5c9 196
d2e4a39e 197static int is_name_suffix (const char *);
14f9c5c9 198
73589123
PH
199static int advance_wild_match (const char **, const char *, int);
200
201static int wild_match (const char *, const char *);
14f9c5c9 202
d2e4a39e 203static struct value *ada_coerce_ref (struct value *);
14f9c5c9 204
4c4b4cd2
PH
205static LONGEST pos_atr (struct value *);
206
3cb382c9 207static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 208
d2e4a39e 209static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 210
4c4b4cd2
PH
211static struct symbol *standard_lookup (const char *, const struct block *,
212 domain_enum);
14f9c5c9 213
4c4b4cd2
PH
214static struct value *ada_search_struct_field (char *, struct value *, int,
215 struct type *);
216
217static struct value *ada_value_primitive_field (struct value *, int, int,
218 struct type *);
219
0d5cff50 220static int find_struct_field (const char *, struct type *, int,
52ce6436 221 struct type **, int *, int *, int *, int *);
4c4b4cd2
PH
222
223static struct value *ada_to_fixed_value_create (struct type *, CORE_ADDR,
224 struct value *);
225
4c4b4cd2
PH
226static int ada_resolve_function (struct ada_symbol_info *, int,
227 struct value **, int, const char *,
228 struct type *);
229
4c4b4cd2
PH
230static int ada_is_direct_array_type (struct type *);
231
72d5681a
PH
232static void ada_language_arch_info (struct gdbarch *,
233 struct language_arch_info *);
714e53ab 234
52ce6436
PH
235static struct value *ada_index_struct_field (int, struct value *, int,
236 struct type *);
237
238static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
239 struct expression *,
240 int *, enum noside);
52ce6436
PH
241
242static void aggregate_assign_from_choices (struct value *, struct value *,
243 struct expression *,
244 int *, LONGEST *, int *,
245 int, LONGEST, LONGEST);
246
247static void aggregate_assign_positional (struct value *, struct value *,
248 struct expression *,
249 int *, LONGEST *, int *, int,
250 LONGEST, LONGEST);
251
252
253static void aggregate_assign_others (struct value *, struct value *,
254 struct expression *,
255 int *, LONGEST *, int, LONGEST, LONGEST);
256
257
258static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
259
260
261static struct value *ada_evaluate_subexp (struct type *, struct expression *,
262 int *, enum noside);
263
264static void ada_forward_operator_length (struct expression *, int, int *,
265 int *);
852dff6c
JB
266
267static struct type *ada_find_any_type (const char *name);
4c4b4cd2
PH
268\f
269
ee01b665
JB
270/* The result of a symbol lookup to be stored in our symbol cache. */
271
272struct cache_entry
273{
274 /* The name used to perform the lookup. */
275 const char *name;
276 /* The namespace used during the lookup. */
fe978cb0 277 domain_enum domain;
ee01b665
JB
278 /* The symbol returned by the lookup, or NULL if no matching symbol
279 was found. */
280 struct symbol *sym;
281 /* The block where the symbol was found, or NULL if no matching
282 symbol was found. */
283 const struct block *block;
284 /* A pointer to the next entry with the same hash. */
285 struct cache_entry *next;
286};
287
288/* The Ada symbol cache, used to store the result of Ada-mode symbol
289 lookups in the course of executing the user's commands.
290
291 The cache is implemented using a simple, fixed-sized hash.
292 The size is fixed on the grounds that there are not likely to be
293 all that many symbols looked up during any given session, regardless
294 of the size of the symbol table. If we decide to go to a resizable
295 table, let's just use the stuff from libiberty instead. */
296
297#define HASH_SIZE 1009
298
299struct ada_symbol_cache
300{
301 /* An obstack used to store the entries in our cache. */
302 struct obstack cache_space;
303
304 /* The root of the hash table used to implement our symbol cache. */
305 struct cache_entry *root[HASH_SIZE];
306};
307
308static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 309
4c4b4cd2 310/* Maximum-sized dynamic type. */
14f9c5c9
AS
311static unsigned int varsize_limit;
312
4c4b4cd2
PH
313/* FIXME: brobecker/2003-09-17: No longer a const because it is
314 returned by a function that does not return a const char *. */
315static char *ada_completer_word_break_characters =
316#ifdef VMS
317 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
318#else
14f9c5c9 319 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 320#endif
14f9c5c9 321
4c4b4cd2 322/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 323static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 324 = "__gnat_ada_main_program_name";
14f9c5c9 325
4c4b4cd2
PH
326/* Limit on the number of warnings to raise per expression evaluation. */
327static int warning_limit = 2;
328
329/* Number of warning messages issued; reset to 0 by cleanups after
330 expression evaluation. */
331static int warnings_issued = 0;
332
333static const char *known_runtime_file_name_patterns[] = {
334 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
335};
336
337static const char *known_auxiliary_function_name_patterns[] = {
338 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
339};
340
341/* Space for allocating results of ada_lookup_symbol_list. */
342static struct obstack symbol_list_obstack;
343
c6044dd1
JB
344/* Maintenance-related settings for this module. */
345
346static struct cmd_list_element *maint_set_ada_cmdlist;
347static struct cmd_list_element *maint_show_ada_cmdlist;
348
349/* Implement the "maintenance set ada" (prefix) command. */
350
351static void
352maint_set_ada_cmd (char *args, int from_tty)
353{
635c7e8a
TT
354 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
355 gdb_stdout);
c6044dd1
JB
356}
357
358/* Implement the "maintenance show ada" (prefix) command. */
359
360static void
361maint_show_ada_cmd (char *args, int from_tty)
362{
363 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
364}
365
366/* The "maintenance ada set/show ignore-descriptive-type" value. */
367
368static int ada_ignore_descriptive_types_p = 0;
369
e802dbe0
JB
370 /* Inferior-specific data. */
371
372/* Per-inferior data for this module. */
373
374struct ada_inferior_data
375{
376 /* The ada__tags__type_specific_data type, which is used when decoding
377 tagged types. With older versions of GNAT, this type was directly
378 accessible through a component ("tsd") in the object tag. But this
379 is no longer the case, so we cache it for each inferior. */
380 struct type *tsd_type;
3eecfa55
JB
381
382 /* The exception_support_info data. This data is used to determine
383 how to implement support for Ada exception catchpoints in a given
384 inferior. */
385 const struct exception_support_info *exception_info;
e802dbe0
JB
386};
387
388/* Our key to this module's inferior data. */
389static const struct inferior_data *ada_inferior_data;
390
391/* A cleanup routine for our inferior data. */
392static void
393ada_inferior_data_cleanup (struct inferior *inf, void *arg)
394{
395 struct ada_inferior_data *data;
396
397 data = inferior_data (inf, ada_inferior_data);
398 if (data != NULL)
399 xfree (data);
400}
401
402/* Return our inferior data for the given inferior (INF).
403
404 This function always returns a valid pointer to an allocated
405 ada_inferior_data structure. If INF's inferior data has not
406 been previously set, this functions creates a new one with all
407 fields set to zero, sets INF's inferior to it, and then returns
408 a pointer to that newly allocated ada_inferior_data. */
409
410static struct ada_inferior_data *
411get_ada_inferior_data (struct inferior *inf)
412{
413 struct ada_inferior_data *data;
414
415 data = inferior_data (inf, ada_inferior_data);
416 if (data == NULL)
417 {
41bf6aca 418 data = XCNEW (struct ada_inferior_data);
e802dbe0
JB
419 set_inferior_data (inf, ada_inferior_data, data);
420 }
421
422 return data;
423}
424
425/* Perform all necessary cleanups regarding our module's inferior data
426 that is required after the inferior INF just exited. */
427
428static void
429ada_inferior_exit (struct inferior *inf)
430{
431 ada_inferior_data_cleanup (inf, NULL);
432 set_inferior_data (inf, ada_inferior_data, NULL);
433}
434
ee01b665
JB
435
436 /* program-space-specific data. */
437
438/* This module's per-program-space data. */
439struct ada_pspace_data
440{
441 /* The Ada symbol cache. */
442 struct ada_symbol_cache *sym_cache;
443};
444
445/* Key to our per-program-space data. */
446static const struct program_space_data *ada_pspace_data_handle;
447
448/* Return this module's data for the given program space (PSPACE).
449 If not is found, add a zero'ed one now.
450
451 This function always returns a valid object. */
452
453static struct ada_pspace_data *
454get_ada_pspace_data (struct program_space *pspace)
455{
456 struct ada_pspace_data *data;
457
458 data = program_space_data (pspace, ada_pspace_data_handle);
459 if (data == NULL)
460 {
461 data = XCNEW (struct ada_pspace_data);
462 set_program_space_data (pspace, ada_pspace_data_handle, data);
463 }
464
465 return data;
466}
467
468/* The cleanup callback for this module's per-program-space data. */
469
470static void
471ada_pspace_data_cleanup (struct program_space *pspace, void *data)
472{
473 struct ada_pspace_data *pspace_data = data;
474
475 if (pspace_data->sym_cache != NULL)
476 ada_free_symbol_cache (pspace_data->sym_cache);
477 xfree (pspace_data);
478}
479
4c4b4cd2
PH
480 /* Utilities */
481
720d1a40 482/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 483 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
484
485 Normally, we really expect a typedef type to only have 1 typedef layer.
486 In other words, we really expect the target type of a typedef type to be
487 a non-typedef type. This is particularly true for Ada units, because
488 the language does not have a typedef vs not-typedef distinction.
489 In that respect, the Ada compiler has been trying to eliminate as many
490 typedef definitions in the debugging information, since they generally
491 do not bring any extra information (we still use typedef under certain
492 circumstances related mostly to the GNAT encoding).
493
494 Unfortunately, we have seen situations where the debugging information
495 generated by the compiler leads to such multiple typedef layers. For
496 instance, consider the following example with stabs:
497
498 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
499 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
500
501 This is an error in the debugging information which causes type
502 pck__float_array___XUP to be defined twice, and the second time,
503 it is defined as a typedef of a typedef.
504
505 This is on the fringe of legality as far as debugging information is
506 concerned, and certainly unexpected. But it is easy to handle these
507 situations correctly, so we can afford to be lenient in this case. */
508
509static struct type *
510ada_typedef_target_type (struct type *type)
511{
512 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
513 type = TYPE_TARGET_TYPE (type);
514 return type;
515}
516
41d27058
JB
517/* Given DECODED_NAME a string holding a symbol name in its
518 decoded form (ie using the Ada dotted notation), returns
519 its unqualified name. */
520
521static const char *
522ada_unqualified_name (const char *decoded_name)
523{
2b0f535a
JB
524 const char *result;
525
526 /* If the decoded name starts with '<', it means that the encoded
527 name does not follow standard naming conventions, and thus that
528 it is not your typical Ada symbol name. Trying to unqualify it
529 is therefore pointless and possibly erroneous. */
530 if (decoded_name[0] == '<')
531 return decoded_name;
532
533 result = strrchr (decoded_name, '.');
41d27058
JB
534 if (result != NULL)
535 result++; /* Skip the dot... */
536 else
537 result = decoded_name;
538
539 return result;
540}
541
542/* Return a string starting with '<', followed by STR, and '>'.
543 The result is good until the next call. */
544
545static char *
546add_angle_brackets (const char *str)
547{
548 static char *result = NULL;
549
550 xfree (result);
88c15c34 551 result = xstrprintf ("<%s>", str);
41d27058
JB
552 return result;
553}
96d887e8 554
4c4b4cd2
PH
555static char *
556ada_get_gdb_completer_word_break_characters (void)
557{
558 return ada_completer_word_break_characters;
559}
560
e79af960
JB
561/* Print an array element index using the Ada syntax. */
562
563static void
564ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 565 const struct value_print_options *options)
e79af960 566{
79a45b7d 567 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
568 fprintf_filtered (stream, " => ");
569}
570
f27cf670 571/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 572 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 573 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 574
f27cf670
AS
575void *
576grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 577{
d2e4a39e
AS
578 if (*size < min_size)
579 {
580 *size *= 2;
581 if (*size < min_size)
4c4b4cd2 582 *size = min_size;
f27cf670 583 vect = xrealloc (vect, *size * element_size);
d2e4a39e 584 }
f27cf670 585 return vect;
14f9c5c9
AS
586}
587
588/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 589 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
590
591static int
ebf56fd3 592field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
593{
594 int len = strlen (target);
5b4ee69b 595
d2e4a39e 596 return
4c4b4cd2
PH
597 (strncmp (field_name, target, len) == 0
598 && (field_name[len] == '\0'
61012eef 599 || (startswith (field_name + len, "___")
76a01679
JB
600 && strcmp (field_name + strlen (field_name) - 6,
601 "___XVN") != 0)));
14f9c5c9
AS
602}
603
604
872c8b51
JB
605/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
606 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
607 and return its index. This function also handles fields whose name
608 have ___ suffixes because the compiler sometimes alters their name
609 by adding such a suffix to represent fields with certain constraints.
610 If the field could not be found, return a negative number if
611 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
612
613int
614ada_get_field_index (const struct type *type, const char *field_name,
615 int maybe_missing)
616{
617 int fieldno;
872c8b51
JB
618 struct type *struct_type = check_typedef ((struct type *) type);
619
620 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
621 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
622 return fieldno;
623
624 if (!maybe_missing)
323e0a4a 625 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 626 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
627
628 return -1;
629}
630
631/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
632
633int
d2e4a39e 634ada_name_prefix_len (const char *name)
14f9c5c9
AS
635{
636 if (name == NULL)
637 return 0;
d2e4a39e 638 else
14f9c5c9 639 {
d2e4a39e 640 const char *p = strstr (name, "___");
5b4ee69b 641
14f9c5c9 642 if (p == NULL)
4c4b4cd2 643 return strlen (name);
14f9c5c9 644 else
4c4b4cd2 645 return p - name;
14f9c5c9
AS
646 }
647}
648
4c4b4cd2
PH
649/* Return non-zero if SUFFIX is a suffix of STR.
650 Return zero if STR is null. */
651
14f9c5c9 652static int
d2e4a39e 653is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
654{
655 int len1, len2;
5b4ee69b 656
14f9c5c9
AS
657 if (str == NULL)
658 return 0;
659 len1 = strlen (str);
660 len2 = strlen (suffix);
4c4b4cd2 661 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
662}
663
4c4b4cd2
PH
664/* The contents of value VAL, treated as a value of type TYPE. The
665 result is an lval in memory if VAL is. */
14f9c5c9 666
d2e4a39e 667static struct value *
4c4b4cd2 668coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 669{
61ee279c 670 type = ada_check_typedef (type);
df407dfe 671 if (value_type (val) == type)
4c4b4cd2 672 return val;
d2e4a39e 673 else
14f9c5c9 674 {
4c4b4cd2
PH
675 struct value *result;
676
677 /* Make sure that the object size is not unreasonable before
678 trying to allocate some memory for it. */
c1b5a1a6 679 ada_ensure_varsize_limit (type);
4c4b4cd2 680
41e8491f
JK
681 if (value_lazy (val)
682 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
683 result = allocate_value_lazy (type);
684 else
685 {
686 result = allocate_value (type);
9a0dc9e3 687 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 688 }
74bcbdf3 689 set_value_component_location (result, val);
9bbda503
AC
690 set_value_bitsize (result, value_bitsize (val));
691 set_value_bitpos (result, value_bitpos (val));
42ae5230 692 set_value_address (result, value_address (val));
14f9c5c9
AS
693 return result;
694 }
695}
696
fc1a4b47
AC
697static const gdb_byte *
698cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
699{
700 if (valaddr == NULL)
701 return NULL;
702 else
703 return valaddr + offset;
704}
705
706static CORE_ADDR
ebf56fd3 707cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
708{
709 if (address == 0)
710 return 0;
d2e4a39e 711 else
14f9c5c9
AS
712 return address + offset;
713}
714
4c4b4cd2
PH
715/* Issue a warning (as for the definition of warning in utils.c, but
716 with exactly one argument rather than ...), unless the limit on the
717 number of warnings has passed during the evaluation of the current
718 expression. */
a2249542 719
77109804
AC
720/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
721 provided by "complaint". */
a0b31db1 722static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 723
14f9c5c9 724static void
a2249542 725lim_warning (const char *format, ...)
14f9c5c9 726{
a2249542 727 va_list args;
a2249542 728
5b4ee69b 729 va_start (args, format);
4c4b4cd2
PH
730 warnings_issued += 1;
731 if (warnings_issued <= warning_limit)
a2249542
MK
732 vwarning (format, args);
733
734 va_end (args);
4c4b4cd2
PH
735}
736
714e53ab
PH
737/* Issue an error if the size of an object of type T is unreasonable,
738 i.e. if it would be a bad idea to allocate a value of this type in
739 GDB. */
740
c1b5a1a6
JB
741void
742ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
743{
744 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 745 error (_("object size is larger than varsize-limit"));
714e53ab
PH
746}
747
0963b4bd 748/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 749static LONGEST
c3e5cd34 750max_of_size (int size)
4c4b4cd2 751{
76a01679 752 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 753
76a01679 754 return top_bit | (top_bit - 1);
4c4b4cd2
PH
755}
756
0963b4bd 757/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 758static LONGEST
c3e5cd34 759min_of_size (int size)
4c4b4cd2 760{
c3e5cd34 761 return -max_of_size (size) - 1;
4c4b4cd2
PH
762}
763
0963b4bd 764/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 765static ULONGEST
c3e5cd34 766umax_of_size (int size)
4c4b4cd2 767{
76a01679 768 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 769
76a01679 770 return top_bit | (top_bit - 1);
4c4b4cd2
PH
771}
772
0963b4bd 773/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
774static LONGEST
775max_of_type (struct type *t)
4c4b4cd2 776{
c3e5cd34
PH
777 if (TYPE_UNSIGNED (t))
778 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
779 else
780 return max_of_size (TYPE_LENGTH (t));
781}
782
0963b4bd 783/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
784static LONGEST
785min_of_type (struct type *t)
786{
787 if (TYPE_UNSIGNED (t))
788 return 0;
789 else
790 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
791}
792
793/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
794LONGEST
795ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 796{
c3345124 797 type = resolve_dynamic_type (type, NULL, 0);
76a01679 798 switch (TYPE_CODE (type))
4c4b4cd2
PH
799 {
800 case TYPE_CODE_RANGE:
690cc4eb 801 return TYPE_HIGH_BOUND (type);
4c4b4cd2 802 case TYPE_CODE_ENUM:
14e75d8e 803 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
804 case TYPE_CODE_BOOL:
805 return 1;
806 case TYPE_CODE_CHAR:
76a01679 807 case TYPE_CODE_INT:
690cc4eb 808 return max_of_type (type);
4c4b4cd2 809 default:
43bbcdc2 810 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
811 }
812}
813
14e75d8e 814/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
815LONGEST
816ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 817{
c3345124 818 type = resolve_dynamic_type (type, NULL, 0);
76a01679 819 switch (TYPE_CODE (type))
4c4b4cd2
PH
820 {
821 case TYPE_CODE_RANGE:
690cc4eb 822 return TYPE_LOW_BOUND (type);
4c4b4cd2 823 case TYPE_CODE_ENUM:
14e75d8e 824 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
825 case TYPE_CODE_BOOL:
826 return 0;
827 case TYPE_CODE_CHAR:
76a01679 828 case TYPE_CODE_INT:
690cc4eb 829 return min_of_type (type);
4c4b4cd2 830 default:
43bbcdc2 831 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
832 }
833}
834
835/* The identity on non-range types. For range types, the underlying
76a01679 836 non-range scalar type. */
4c4b4cd2
PH
837
838static struct type *
18af8284 839get_base_type (struct type *type)
4c4b4cd2
PH
840{
841 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
842 {
76a01679
JB
843 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
844 return type;
4c4b4cd2
PH
845 type = TYPE_TARGET_TYPE (type);
846 }
847 return type;
14f9c5c9 848}
41246937
JB
849
850/* Return a decoded version of the given VALUE. This means returning
851 a value whose type is obtained by applying all the GNAT-specific
852 encondings, making the resulting type a static but standard description
853 of the initial type. */
854
855struct value *
856ada_get_decoded_value (struct value *value)
857{
858 struct type *type = ada_check_typedef (value_type (value));
859
860 if (ada_is_array_descriptor_type (type)
861 || (ada_is_constrained_packed_array_type (type)
862 && TYPE_CODE (type) != TYPE_CODE_PTR))
863 {
864 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
865 value = ada_coerce_to_simple_array_ptr (value);
866 else
867 value = ada_coerce_to_simple_array (value);
868 }
869 else
870 value = ada_to_fixed_value (value);
871
872 return value;
873}
874
875/* Same as ada_get_decoded_value, but with the given TYPE.
876 Because there is no associated actual value for this type,
877 the resulting type might be a best-effort approximation in
878 the case of dynamic types. */
879
880struct type *
881ada_get_decoded_type (struct type *type)
882{
883 type = to_static_fixed_type (type);
884 if (ada_is_constrained_packed_array_type (type))
885 type = ada_coerce_to_simple_array_type (type);
886 return type;
887}
888
4c4b4cd2 889\f
76a01679 890
4c4b4cd2 891 /* Language Selection */
14f9c5c9
AS
892
893/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 894 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 895
14f9c5c9 896enum language
ccefe4c4 897ada_update_initial_language (enum language lang)
14f9c5c9 898{
d2e4a39e 899 if (lookup_minimal_symbol ("adainit", (const char *) NULL,
3b7344d5 900 (struct objfile *) NULL).minsym != NULL)
4c4b4cd2 901 return language_ada;
14f9c5c9
AS
902
903 return lang;
904}
96d887e8
PH
905
906/* If the main procedure is written in Ada, then return its name.
907 The result is good until the next call. Return NULL if the main
908 procedure doesn't appear to be in Ada. */
909
910char *
911ada_main_name (void)
912{
3b7344d5 913 struct bound_minimal_symbol msym;
f9bc20b9 914 static char *main_program_name = NULL;
6c038f32 915
96d887e8
PH
916 /* For Ada, the name of the main procedure is stored in a specific
917 string constant, generated by the binder. Look for that symbol,
918 extract its address, and then read that string. If we didn't find
919 that string, then most probably the main procedure is not written
920 in Ada. */
921 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
922
3b7344d5 923 if (msym.minsym != NULL)
96d887e8 924 {
f9bc20b9
JB
925 CORE_ADDR main_program_name_addr;
926 int err_code;
927
77e371c0 928 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 929 if (main_program_name_addr == 0)
323e0a4a 930 error (_("Invalid address for Ada main program name."));
96d887e8 931
f9bc20b9
JB
932 xfree (main_program_name);
933 target_read_string (main_program_name_addr, &main_program_name,
934 1024, &err_code);
935
936 if (err_code != 0)
937 return NULL;
96d887e8
PH
938 return main_program_name;
939 }
940
941 /* The main procedure doesn't seem to be in Ada. */
942 return NULL;
943}
14f9c5c9 944\f
4c4b4cd2 945 /* Symbols */
d2e4a39e 946
4c4b4cd2
PH
947/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
948 of NULLs. */
14f9c5c9 949
d2e4a39e
AS
950const struct ada_opname_map ada_opname_table[] = {
951 {"Oadd", "\"+\"", BINOP_ADD},
952 {"Osubtract", "\"-\"", BINOP_SUB},
953 {"Omultiply", "\"*\"", BINOP_MUL},
954 {"Odivide", "\"/\"", BINOP_DIV},
955 {"Omod", "\"mod\"", BINOP_MOD},
956 {"Orem", "\"rem\"", BINOP_REM},
957 {"Oexpon", "\"**\"", BINOP_EXP},
958 {"Olt", "\"<\"", BINOP_LESS},
959 {"Ole", "\"<=\"", BINOP_LEQ},
960 {"Ogt", "\">\"", BINOP_GTR},
961 {"Oge", "\">=\"", BINOP_GEQ},
962 {"Oeq", "\"=\"", BINOP_EQUAL},
963 {"One", "\"/=\"", BINOP_NOTEQUAL},
964 {"Oand", "\"and\"", BINOP_BITWISE_AND},
965 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
966 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
967 {"Oconcat", "\"&\"", BINOP_CONCAT},
968 {"Oabs", "\"abs\"", UNOP_ABS},
969 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
970 {"Oadd", "\"+\"", UNOP_PLUS},
971 {"Osubtract", "\"-\"", UNOP_NEG},
972 {NULL, NULL}
14f9c5c9
AS
973};
974
4c4b4cd2
PH
975/* The "encoded" form of DECODED, according to GNAT conventions.
976 The result is valid until the next call to ada_encode. */
977
14f9c5c9 978char *
4c4b4cd2 979ada_encode (const char *decoded)
14f9c5c9 980{
4c4b4cd2
PH
981 static char *encoding_buffer = NULL;
982 static size_t encoding_buffer_size = 0;
d2e4a39e 983 const char *p;
14f9c5c9 984 int k;
d2e4a39e 985
4c4b4cd2 986 if (decoded == NULL)
14f9c5c9
AS
987 return NULL;
988
4c4b4cd2
PH
989 GROW_VECT (encoding_buffer, encoding_buffer_size,
990 2 * strlen (decoded) + 10);
14f9c5c9
AS
991
992 k = 0;
4c4b4cd2 993 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 994 {
cdc7bb92 995 if (*p == '.')
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
998 k += 2;
999 }
14f9c5c9 1000 else if (*p == '"')
4c4b4cd2
PH
1001 {
1002 const struct ada_opname_map *mapping;
1003
1004 for (mapping = ada_opname_table;
1265e4aa 1005 mapping->encoded != NULL
61012eef 1006 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
1007 ;
1008 if (mapping->encoded == NULL)
323e0a4a 1009 error (_("invalid Ada operator name: %s"), p);
4c4b4cd2
PH
1010 strcpy (encoding_buffer + k, mapping->encoded);
1011 k += strlen (mapping->encoded);
1012 break;
1013 }
d2e4a39e 1014 else
4c4b4cd2
PH
1015 {
1016 encoding_buffer[k] = *p;
1017 k += 1;
1018 }
14f9c5c9
AS
1019 }
1020
4c4b4cd2
PH
1021 encoding_buffer[k] = '\0';
1022 return encoding_buffer;
14f9c5c9
AS
1023}
1024
1025/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1026 quotes, unfolded, but with the quotes stripped away. Result good
1027 to next call. */
1028
d2e4a39e
AS
1029char *
1030ada_fold_name (const char *name)
14f9c5c9 1031{
d2e4a39e 1032 static char *fold_buffer = NULL;
14f9c5c9
AS
1033 static size_t fold_buffer_size = 0;
1034
1035 int len = strlen (name);
d2e4a39e 1036 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1037
1038 if (name[0] == '\'')
1039 {
d2e4a39e
AS
1040 strncpy (fold_buffer, name + 1, len - 2);
1041 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1042 }
1043 else
1044 {
1045 int i;
5b4ee69b 1046
14f9c5c9 1047 for (i = 0; i <= len; i += 1)
4c4b4cd2 1048 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1049 }
1050
1051 return fold_buffer;
1052}
1053
529cad9c
PH
1054/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1055
1056static int
1057is_lower_alphanum (const char c)
1058{
1059 return (isdigit (c) || (isalpha (c) && islower (c)));
1060}
1061
c90092fe
JB
1062/* ENCODED is the linkage name of a symbol and LEN contains its length.
1063 This function saves in LEN the length of that same symbol name but
1064 without either of these suffixes:
29480c32
JB
1065 . .{DIGIT}+
1066 . ${DIGIT}+
1067 . ___{DIGIT}+
1068 . __{DIGIT}+.
c90092fe 1069
29480c32
JB
1070 These are suffixes introduced by the compiler for entities such as
1071 nested subprogram for instance, in order to avoid name clashes.
1072 They do not serve any purpose for the debugger. */
1073
1074static void
1075ada_remove_trailing_digits (const char *encoded, int *len)
1076{
1077 if (*len > 1 && isdigit (encoded[*len - 1]))
1078 {
1079 int i = *len - 2;
5b4ee69b 1080
29480c32
JB
1081 while (i > 0 && isdigit (encoded[i]))
1082 i--;
1083 if (i >= 0 && encoded[i] == '.')
1084 *len = i;
1085 else if (i >= 0 && encoded[i] == '$')
1086 *len = i;
61012eef 1087 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1088 *len = i - 2;
61012eef 1089 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1090 *len = i - 1;
1091 }
1092}
1093
1094/* Remove the suffix introduced by the compiler for protected object
1095 subprograms. */
1096
1097static void
1098ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1099{
1100 /* Remove trailing N. */
1101
1102 /* Protected entry subprograms are broken into two
1103 separate subprograms: The first one is unprotected, and has
1104 a 'N' suffix; the second is the protected version, and has
0963b4bd 1105 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1106 the protection. Since the P subprograms are internally generated,
1107 we leave these names undecoded, giving the user a clue that this
1108 entity is internal. */
1109
1110 if (*len > 1
1111 && encoded[*len - 1] == 'N'
1112 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1113 *len = *len - 1;
1114}
1115
69fadcdf
JB
1116/* Remove trailing X[bn]* suffixes (indicating names in package bodies). */
1117
1118static void
1119ada_remove_Xbn_suffix (const char *encoded, int *len)
1120{
1121 int i = *len - 1;
1122
1123 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n'))
1124 i--;
1125
1126 if (encoded[i] != 'X')
1127 return;
1128
1129 if (i == 0)
1130 return;
1131
1132 if (isalnum (encoded[i-1]))
1133 *len = i;
1134}
1135
29480c32
JB
1136/* If ENCODED follows the GNAT entity encoding conventions, then return
1137 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1138 replaced by ENCODED.
14f9c5c9 1139
4c4b4cd2 1140 The resulting string is valid until the next call of ada_decode.
29480c32 1141 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1142 is returned. */
1143
1144const char *
1145ada_decode (const char *encoded)
14f9c5c9
AS
1146{
1147 int i, j;
1148 int len0;
d2e4a39e 1149 const char *p;
4c4b4cd2 1150 char *decoded;
14f9c5c9 1151 int at_start_name;
4c4b4cd2
PH
1152 static char *decoding_buffer = NULL;
1153 static size_t decoding_buffer_size = 0;
d2e4a39e 1154
29480c32
JB
1155 /* The name of the Ada main procedure starts with "_ada_".
1156 This prefix is not part of the decoded name, so skip this part
1157 if we see this prefix. */
61012eef 1158 if (startswith (encoded, "_ada_"))
4c4b4cd2 1159 encoded += 5;
14f9c5c9 1160
29480c32
JB
1161 /* If the name starts with '_', then it is not a properly encoded
1162 name, so do not attempt to decode it. Similarly, if the name
1163 starts with '<', the name should not be decoded. */
4c4b4cd2 1164 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1165 goto Suppress;
1166
4c4b4cd2 1167 len0 = strlen (encoded);
4c4b4cd2 1168
29480c32
JB
1169 ada_remove_trailing_digits (encoded, &len0);
1170 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1171
4c4b4cd2
PH
1172 /* Remove the ___X.* suffix if present. Do not forget to verify that
1173 the suffix is located before the current "end" of ENCODED. We want
1174 to avoid re-matching parts of ENCODED that have previously been
1175 marked as discarded (by decrementing LEN0). */
1176 p = strstr (encoded, "___");
1177 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1178 {
1179 if (p[3] == 'X')
4c4b4cd2 1180 len0 = p - encoded;
14f9c5c9 1181 else
4c4b4cd2 1182 goto Suppress;
14f9c5c9 1183 }
4c4b4cd2 1184
29480c32
JB
1185 /* Remove any trailing TKB suffix. It tells us that this symbol
1186 is for the body of a task, but that information does not actually
1187 appear in the decoded name. */
1188
61012eef 1189 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1190 len0 -= 3;
76a01679 1191
a10967fa
JB
1192 /* Remove any trailing TB suffix. The TB suffix is slightly different
1193 from the TKB suffix because it is used for non-anonymous task
1194 bodies. */
1195
61012eef 1196 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1197 len0 -= 2;
1198
29480c32
JB
1199 /* Remove trailing "B" suffixes. */
1200 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1201
61012eef 1202 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1203 len0 -= 1;
1204
4c4b4cd2 1205 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1206
4c4b4cd2
PH
1207 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1208 decoded = decoding_buffer;
14f9c5c9 1209
29480c32
JB
1210 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1211
4c4b4cd2 1212 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1213 {
4c4b4cd2
PH
1214 i = len0 - 2;
1215 while ((i >= 0 && isdigit (encoded[i]))
1216 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1217 i -= 1;
1218 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1219 len0 = i - 1;
1220 else if (encoded[i] == '$')
1221 len0 = i;
d2e4a39e 1222 }
14f9c5c9 1223
29480c32
JB
1224 /* The first few characters that are not alphabetic are not part
1225 of any encoding we use, so we can copy them over verbatim. */
1226
4c4b4cd2
PH
1227 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1228 decoded[j] = encoded[i];
14f9c5c9
AS
1229
1230 at_start_name = 1;
1231 while (i < len0)
1232 {
29480c32 1233 /* Is this a symbol function? */
4c4b4cd2
PH
1234 if (at_start_name && encoded[i] == 'O')
1235 {
1236 int k;
5b4ee69b 1237
4c4b4cd2
PH
1238 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1239 {
1240 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1241 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1242 op_len - 1) == 0)
1243 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1244 {
1245 strcpy (decoded + j, ada_opname_table[k].decoded);
1246 at_start_name = 0;
1247 i += op_len;
1248 j += strlen (ada_opname_table[k].decoded);
1249 break;
1250 }
1251 }
1252 if (ada_opname_table[k].encoded != NULL)
1253 continue;
1254 }
14f9c5c9
AS
1255 at_start_name = 0;
1256
529cad9c
PH
1257 /* Replace "TK__" with "__", which will eventually be translated
1258 into "." (just below). */
1259
61012eef 1260 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1261 i += 2;
529cad9c 1262
29480c32
JB
1263 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1264 be translated into "." (just below). These are internal names
1265 generated for anonymous blocks inside which our symbol is nested. */
1266
1267 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1268 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1269 && isdigit (encoded [i+4]))
1270 {
1271 int k = i + 5;
1272
1273 while (k < len0 && isdigit (encoded[k]))
1274 k++; /* Skip any extra digit. */
1275
1276 /* Double-check that the "__B_{DIGITS}+" sequence we found
1277 is indeed followed by "__". */
1278 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1279 i = k;
1280 }
1281
529cad9c
PH
1282 /* Remove _E{DIGITS}+[sb] */
1283
1284 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1285 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1286 one implements the actual entry code, and has a suffix following
1287 the convention above; the second one implements the barrier and
1288 uses the same convention as above, except that the 'E' is replaced
1289 by a 'B'.
1290
1291 Just as above, we do not decode the name of barrier functions
1292 to give the user a clue that the code he is debugging has been
1293 internally generated. */
1294
1295 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1296 && isdigit (encoded[i+2]))
1297 {
1298 int k = i + 3;
1299
1300 while (k < len0 && isdigit (encoded[k]))
1301 k++;
1302
1303 if (k < len0
1304 && (encoded[k] == 'b' || encoded[k] == 's'))
1305 {
1306 k++;
1307 /* Just as an extra precaution, make sure that if this
1308 suffix is followed by anything else, it is a '_'.
1309 Otherwise, we matched this sequence by accident. */
1310 if (k == len0
1311 || (k < len0 && encoded[k] == '_'))
1312 i = k;
1313 }
1314 }
1315
1316 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1317 the GNAT front-end in protected object subprograms. */
1318
1319 if (i < len0 + 3
1320 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1321 {
1322 /* Backtrack a bit up until we reach either the begining of
1323 the encoded name, or "__". Make sure that we only find
1324 digits or lowercase characters. */
1325 const char *ptr = encoded + i - 1;
1326
1327 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1328 ptr--;
1329 if (ptr < encoded
1330 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1331 i++;
1332 }
1333
4c4b4cd2
PH
1334 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1335 {
29480c32
JB
1336 /* This is a X[bn]* sequence not separated from the previous
1337 part of the name with a non-alpha-numeric character (in other
1338 words, immediately following an alpha-numeric character), then
1339 verify that it is placed at the end of the encoded name. If
1340 not, then the encoding is not valid and we should abort the
1341 decoding. Otherwise, just skip it, it is used in body-nested
1342 package names. */
4c4b4cd2
PH
1343 do
1344 i += 1;
1345 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1346 if (i < len0)
1347 goto Suppress;
1348 }
cdc7bb92 1349 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1350 {
29480c32 1351 /* Replace '__' by '.'. */
4c4b4cd2
PH
1352 decoded[j] = '.';
1353 at_start_name = 1;
1354 i += 2;
1355 j += 1;
1356 }
14f9c5c9 1357 else
4c4b4cd2 1358 {
29480c32
JB
1359 /* It's a character part of the decoded name, so just copy it
1360 over. */
4c4b4cd2
PH
1361 decoded[j] = encoded[i];
1362 i += 1;
1363 j += 1;
1364 }
14f9c5c9 1365 }
4c4b4cd2 1366 decoded[j] = '\000';
14f9c5c9 1367
29480c32
JB
1368 /* Decoded names should never contain any uppercase character.
1369 Double-check this, and abort the decoding if we find one. */
1370
4c4b4cd2
PH
1371 for (i = 0; decoded[i] != '\0'; i += 1)
1372 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1373 goto Suppress;
1374
4c4b4cd2
PH
1375 if (strcmp (decoded, encoded) == 0)
1376 return encoded;
1377 else
1378 return decoded;
14f9c5c9
AS
1379
1380Suppress:
4c4b4cd2
PH
1381 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1382 decoded = decoding_buffer;
1383 if (encoded[0] == '<')
1384 strcpy (decoded, encoded);
14f9c5c9 1385 else
88c15c34 1386 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1387 return decoded;
1388
1389}
1390
1391/* Table for keeping permanent unique copies of decoded names. Once
1392 allocated, names in this table are never released. While this is a
1393 storage leak, it should not be significant unless there are massive
1394 changes in the set of decoded names in successive versions of a
1395 symbol table loaded during a single session. */
1396static struct htab *decoded_names_store;
1397
1398/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1399 in the language-specific part of GSYMBOL, if it has not been
1400 previously computed. Tries to save the decoded name in the same
1401 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1402 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1403 GSYMBOL).
4c4b4cd2
PH
1404 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1405 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1406 when a decoded name is cached in it. */
4c4b4cd2 1407
45e6c716 1408const char *
f85f34ed 1409ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1410{
f85f34ed
TT
1411 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1412 const char **resultp =
1413 &gsymbol->language_specific.mangled_lang.demangled_name;
5b4ee69b 1414
f85f34ed 1415 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1416 {
1417 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1418 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1419
f85f34ed 1420 gsymbol->ada_mangled = 1;
5b4ee69b 1421
f85f34ed
TT
1422 if (obstack != NULL)
1423 *resultp = obstack_copy0 (obstack, decoded, strlen (decoded));
1424 else
76a01679 1425 {
f85f34ed
TT
1426 /* Sometimes, we can't find a corresponding objfile, in
1427 which case, we put the result on the heap. Since we only
1428 decode when needed, we hope this usually does not cause a
1429 significant memory leak (FIXME). */
1430
76a01679
JB
1431 char **slot = (char **) htab_find_slot (decoded_names_store,
1432 decoded, INSERT);
5b4ee69b 1433
76a01679
JB
1434 if (*slot == NULL)
1435 *slot = xstrdup (decoded);
1436 *resultp = *slot;
1437 }
4c4b4cd2 1438 }
14f9c5c9 1439
4c4b4cd2
PH
1440 return *resultp;
1441}
76a01679 1442
2c0b251b 1443static char *
76a01679 1444ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1445{
1446 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1447}
1448
1449/* Returns non-zero iff SYM_NAME matches NAME, ignoring any trailing
4c4b4cd2
PH
1450 suffixes that encode debugging information or leading _ada_ on
1451 SYM_NAME (see is_name_suffix commentary for the debugging
1452 information that is ignored). If WILD, then NAME need only match a
1453 suffix of SYM_NAME minus the same suffixes. Also returns 0 if
1454 either argument is NULL. */
14f9c5c9 1455
2c0b251b 1456static int
40658b94 1457match_name (const char *sym_name, const char *name, int wild)
14f9c5c9
AS
1458{
1459 if (sym_name == NULL || name == NULL)
1460 return 0;
1461 else if (wild)
73589123 1462 return wild_match (sym_name, name) == 0;
d2e4a39e
AS
1463 else
1464 {
1465 int len_name = strlen (name);
5b4ee69b 1466
4c4b4cd2
PH
1467 return (strncmp (sym_name, name, len_name) == 0
1468 && is_name_suffix (sym_name + len_name))
61012eef 1469 || (startswith (sym_name, "_ada_")
4c4b4cd2
PH
1470 && strncmp (sym_name + 5, name, len_name) == 0
1471 && is_name_suffix (sym_name + len_name + 5));
d2e4a39e 1472 }
14f9c5c9 1473}
14f9c5c9 1474\f
d2e4a39e 1475
4c4b4cd2 1476 /* Arrays */
14f9c5c9 1477
28c85d6c
JB
1478/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1479 generated by the GNAT compiler to describe the index type used
1480 for each dimension of an array, check whether it follows the latest
1481 known encoding. If not, fix it up to conform to the latest encoding.
1482 Otherwise, do nothing. This function also does nothing if
1483 INDEX_DESC_TYPE is NULL.
1484
1485 The GNAT encoding used to describle the array index type evolved a bit.
1486 Initially, the information would be provided through the name of each
1487 field of the structure type only, while the type of these fields was
1488 described as unspecified and irrelevant. The debugger was then expected
1489 to perform a global type lookup using the name of that field in order
1490 to get access to the full index type description. Because these global
1491 lookups can be very expensive, the encoding was later enhanced to make
1492 the global lookup unnecessary by defining the field type as being
1493 the full index type description.
1494
1495 The purpose of this routine is to allow us to support older versions
1496 of the compiler by detecting the use of the older encoding, and by
1497 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1498 we essentially replace each field's meaningless type by the associated
1499 index subtype). */
1500
1501void
1502ada_fixup_array_indexes_type (struct type *index_desc_type)
1503{
1504 int i;
1505
1506 if (index_desc_type == NULL)
1507 return;
1508 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1509
1510 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1511 to check one field only, no need to check them all). If not, return
1512 now.
1513
1514 If our INDEX_DESC_TYPE was generated using the older encoding,
1515 the field type should be a meaningless integer type whose name
1516 is not equal to the field name. */
1517 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1518 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1519 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1520 return;
1521
1522 /* Fixup each field of INDEX_DESC_TYPE. */
1523 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1524 {
0d5cff50 1525 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1526 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1527
1528 if (raw_type)
1529 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1530 }
1531}
1532
4c4b4cd2 1533/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1534
d2e4a39e
AS
1535static char *bound_name[] = {
1536 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1537 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1538};
1539
1540/* Maximum number of array dimensions we are prepared to handle. */
1541
4c4b4cd2 1542#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1543
14f9c5c9 1544
4c4b4cd2
PH
1545/* The desc_* routines return primitive portions of array descriptors
1546 (fat pointers). */
14f9c5c9
AS
1547
1548/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1549 level of indirection, if needed. */
1550
d2e4a39e
AS
1551static struct type *
1552desc_base_type (struct type *type)
14f9c5c9
AS
1553{
1554 if (type == NULL)
1555 return NULL;
61ee279c 1556 type = ada_check_typedef (type);
720d1a40
JB
1557 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1558 type = ada_typedef_target_type (type);
1559
1265e4aa
JB
1560 if (type != NULL
1561 && (TYPE_CODE (type) == TYPE_CODE_PTR
1562 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1563 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1564 else
1565 return type;
1566}
1567
4c4b4cd2
PH
1568/* True iff TYPE indicates a "thin" array pointer type. */
1569
14f9c5c9 1570static int
d2e4a39e 1571is_thin_pntr (struct type *type)
14f9c5c9 1572{
d2e4a39e 1573 return
14f9c5c9
AS
1574 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1575 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1576}
1577
4c4b4cd2
PH
1578/* The descriptor type for thin pointer type TYPE. */
1579
d2e4a39e
AS
1580static struct type *
1581thin_descriptor_type (struct type *type)
14f9c5c9 1582{
d2e4a39e 1583 struct type *base_type = desc_base_type (type);
5b4ee69b 1584
14f9c5c9
AS
1585 if (base_type == NULL)
1586 return NULL;
1587 if (is_suffix (ada_type_name (base_type), "___XVE"))
1588 return base_type;
d2e4a39e 1589 else
14f9c5c9 1590 {
d2e4a39e 1591 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1592
14f9c5c9 1593 if (alt_type == NULL)
4c4b4cd2 1594 return base_type;
14f9c5c9 1595 else
4c4b4cd2 1596 return alt_type;
14f9c5c9
AS
1597 }
1598}
1599
4c4b4cd2
PH
1600/* A pointer to the array data for thin-pointer value VAL. */
1601
d2e4a39e
AS
1602static struct value *
1603thin_data_pntr (struct value *val)
14f9c5c9 1604{
828292f2 1605 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1606 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1607
556bdfd4
UW
1608 data_type = lookup_pointer_type (data_type);
1609
14f9c5c9 1610 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1611 return value_cast (data_type, value_copy (val));
d2e4a39e 1612 else
42ae5230 1613 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1614}
1615
4c4b4cd2
PH
1616/* True iff TYPE indicates a "thick" array pointer type. */
1617
14f9c5c9 1618static int
d2e4a39e 1619is_thick_pntr (struct type *type)
14f9c5c9
AS
1620{
1621 type = desc_base_type (type);
1622 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1623 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1624}
1625
4c4b4cd2
PH
1626/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1627 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1628
d2e4a39e
AS
1629static struct type *
1630desc_bounds_type (struct type *type)
14f9c5c9 1631{
d2e4a39e 1632 struct type *r;
14f9c5c9
AS
1633
1634 type = desc_base_type (type);
1635
1636 if (type == NULL)
1637 return NULL;
1638 else if (is_thin_pntr (type))
1639 {
1640 type = thin_descriptor_type (type);
1641 if (type == NULL)
4c4b4cd2 1642 return NULL;
14f9c5c9
AS
1643 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1644 if (r != NULL)
61ee279c 1645 return ada_check_typedef (r);
14f9c5c9
AS
1646 }
1647 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1648 {
1649 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1650 if (r != NULL)
61ee279c 1651 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1652 }
1653 return NULL;
1654}
1655
1656/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1657 one, a pointer to its bounds data. Otherwise NULL. */
1658
d2e4a39e
AS
1659static struct value *
1660desc_bounds (struct value *arr)
14f9c5c9 1661{
df407dfe 1662 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1663
d2e4a39e 1664 if (is_thin_pntr (type))
14f9c5c9 1665 {
d2e4a39e 1666 struct type *bounds_type =
4c4b4cd2 1667 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1668 LONGEST addr;
1669
4cdfadb1 1670 if (bounds_type == NULL)
323e0a4a 1671 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1672
1673 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1674 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1675 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1676 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1677 addr = value_as_long (arr);
d2e4a39e 1678 else
42ae5230 1679 addr = value_address (arr);
14f9c5c9 1680
d2e4a39e 1681 return
4c4b4cd2
PH
1682 value_from_longest (lookup_pointer_type (bounds_type),
1683 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1684 }
1685
1686 else if (is_thick_pntr (type))
05e522ef
JB
1687 {
1688 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1689 _("Bad GNAT array descriptor"));
1690 struct type *p_bounds_type = value_type (p_bounds);
1691
1692 if (p_bounds_type
1693 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1694 {
1695 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1696
1697 if (TYPE_STUB (target_type))
1698 p_bounds = value_cast (lookup_pointer_type
1699 (ada_check_typedef (target_type)),
1700 p_bounds);
1701 }
1702 else
1703 error (_("Bad GNAT array descriptor"));
1704
1705 return p_bounds;
1706 }
14f9c5c9
AS
1707 else
1708 return NULL;
1709}
1710
4c4b4cd2
PH
1711/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1712 position of the field containing the address of the bounds data. */
1713
14f9c5c9 1714static int
d2e4a39e 1715fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1716{
1717 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1718}
1719
1720/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1721 size of the field containing the address of the bounds data. */
1722
14f9c5c9 1723static int
d2e4a39e 1724fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1725{
1726 type = desc_base_type (type);
1727
d2e4a39e 1728 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1729 return TYPE_FIELD_BITSIZE (type, 1);
1730 else
61ee279c 1731 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1732}
1733
4c4b4cd2 1734/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1735 pointer to one, the type of its array data (a array-with-no-bounds type);
1736 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1737 data. */
4c4b4cd2 1738
d2e4a39e 1739static struct type *
556bdfd4 1740desc_data_target_type (struct type *type)
14f9c5c9
AS
1741{
1742 type = desc_base_type (type);
1743
4c4b4cd2 1744 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1745 if (is_thin_pntr (type))
556bdfd4 1746 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1747 else if (is_thick_pntr (type))
556bdfd4
UW
1748 {
1749 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1750
1751 if (data_type
1752 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1753 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1754 }
1755
1756 return NULL;
14f9c5c9
AS
1757}
1758
1759/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1760 its array data. */
4c4b4cd2 1761
d2e4a39e
AS
1762static struct value *
1763desc_data (struct value *arr)
14f9c5c9 1764{
df407dfe 1765 struct type *type = value_type (arr);
5b4ee69b 1766
14f9c5c9
AS
1767 if (is_thin_pntr (type))
1768 return thin_data_pntr (arr);
1769 else if (is_thick_pntr (type))
d2e4a39e 1770 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1771 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1772 else
1773 return NULL;
1774}
1775
1776
1777/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1778 position of the field containing the address of the data. */
1779
14f9c5c9 1780static int
d2e4a39e 1781fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1782{
1783 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1784}
1785
1786/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1787 size of the field containing the address of the data. */
1788
14f9c5c9 1789static int
d2e4a39e 1790fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1791{
1792 type = desc_base_type (type);
1793
1794 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1795 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1796 else
14f9c5c9
AS
1797 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1798}
1799
4c4b4cd2 1800/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1801 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1802 bound, if WHICH is 1. The first bound is I=1. */
1803
d2e4a39e
AS
1804static struct value *
1805desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1806{
d2e4a39e 1807 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1808 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1809}
1810
1811/* If BOUNDS is an array-bounds structure type, return the bit position
1812 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1813 bound, if WHICH is 1. The first bound is I=1. */
1814
14f9c5c9 1815static int
d2e4a39e 1816desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1817{
d2e4a39e 1818 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1819}
1820
1821/* If BOUNDS is an array-bounds structure type, return the bit field size
1822 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1823 bound, if WHICH is 1. The first bound is I=1. */
1824
76a01679 1825static int
d2e4a39e 1826desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1827{
1828 type = desc_base_type (type);
1829
d2e4a39e
AS
1830 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1831 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1832 else
1833 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1834}
1835
1836/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1837 Ith bound (numbering from 1). Otherwise, NULL. */
1838
d2e4a39e
AS
1839static struct type *
1840desc_index_type (struct type *type, int i)
14f9c5c9
AS
1841{
1842 type = desc_base_type (type);
1843
1844 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1845 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1846 else
14f9c5c9
AS
1847 return NULL;
1848}
1849
4c4b4cd2
PH
1850/* The number of index positions in the array-bounds type TYPE.
1851 Return 0 if TYPE is NULL. */
1852
14f9c5c9 1853static int
d2e4a39e 1854desc_arity (struct type *type)
14f9c5c9
AS
1855{
1856 type = desc_base_type (type);
1857
1858 if (type != NULL)
1859 return TYPE_NFIELDS (type) / 2;
1860 return 0;
1861}
1862
4c4b4cd2
PH
1863/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1864 an array descriptor type (representing an unconstrained array
1865 type). */
1866
76a01679
JB
1867static int
1868ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1869{
1870 if (type == NULL)
1871 return 0;
61ee279c 1872 type = ada_check_typedef (type);
4c4b4cd2 1873 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1874 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1875}
1876
52ce6436 1877/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1878 * to one. */
52ce6436 1879
2c0b251b 1880static int
52ce6436
PH
1881ada_is_array_type (struct type *type)
1882{
1883 while (type != NULL
1884 && (TYPE_CODE (type) == TYPE_CODE_PTR
1885 || TYPE_CODE (type) == TYPE_CODE_REF))
1886 type = TYPE_TARGET_TYPE (type);
1887 return ada_is_direct_array_type (type);
1888}
1889
4c4b4cd2 1890/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1891
14f9c5c9 1892int
4c4b4cd2 1893ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1894{
1895 if (type == NULL)
1896 return 0;
61ee279c 1897 type = ada_check_typedef (type);
14f9c5c9 1898 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1899 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1900 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1901 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1902}
1903
4c4b4cd2
PH
1904/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1905
14f9c5c9 1906int
4c4b4cd2 1907ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1908{
556bdfd4 1909 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1910
1911 if (type == NULL)
1912 return 0;
61ee279c 1913 type = ada_check_typedef (type);
556bdfd4
UW
1914 return (data_type != NULL
1915 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1916 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1917}
1918
1919/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1920 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1921 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1922 is still needed. */
1923
14f9c5c9 1924int
ebf56fd3 1925ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1926{
d2e4a39e 1927 return
14f9c5c9
AS
1928 type != NULL
1929 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1930 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1931 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1932 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1933}
1934
1935
4c4b4cd2 1936/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1937 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1938 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1939 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1940 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1941 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1942 a descriptor. */
d2e4a39e
AS
1943struct type *
1944ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1945{
ad82864c
JB
1946 if (ada_is_constrained_packed_array_type (value_type (arr)))
1947 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1948
df407dfe
AC
1949 if (!ada_is_array_descriptor_type (value_type (arr)))
1950 return value_type (arr);
d2e4a39e
AS
1951
1952 if (!bounds)
ad82864c
JB
1953 {
1954 struct type *array_type =
1955 ada_check_typedef (desc_data_target_type (value_type (arr)));
1956
1957 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1958 TYPE_FIELD_BITSIZE (array_type, 0) =
1959 decode_packed_array_bitsize (value_type (arr));
1960
1961 return array_type;
1962 }
14f9c5c9
AS
1963 else
1964 {
d2e4a39e 1965 struct type *elt_type;
14f9c5c9 1966 int arity;
d2e4a39e 1967 struct value *descriptor;
14f9c5c9 1968
df407dfe
AC
1969 elt_type = ada_array_element_type (value_type (arr), -1);
1970 arity = ada_array_arity (value_type (arr));
14f9c5c9 1971
d2e4a39e 1972 if (elt_type == NULL || arity == 0)
df407dfe 1973 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1974
1975 descriptor = desc_bounds (arr);
d2e4a39e 1976 if (value_as_long (descriptor) == 0)
4c4b4cd2 1977 return NULL;
d2e4a39e 1978 while (arity > 0)
4c4b4cd2 1979 {
e9bb382b
UW
1980 struct type *range_type = alloc_type_copy (value_type (arr));
1981 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1982 struct value *low = desc_one_bound (descriptor, arity, 0);
1983 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1984
5b4ee69b 1985 arity -= 1;
0c9c3474
SA
1986 create_static_range_type (range_type, value_type (low),
1987 longest_to_int (value_as_long (low)),
1988 longest_to_int (value_as_long (high)));
4c4b4cd2 1989 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1990
1991 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1992 {
1993 /* We need to store the element packed bitsize, as well as
1994 recompute the array size, because it was previously
1995 computed based on the unpacked element size. */
1996 LONGEST lo = value_as_long (low);
1997 LONGEST hi = value_as_long (high);
1998
1999 TYPE_FIELD_BITSIZE (elt_type, 0) =
2000 decode_packed_array_bitsize (value_type (arr));
2001 /* If the array has no element, then the size is already
2002 zero, and does not need to be recomputed. */
2003 if (lo < hi)
2004 {
2005 int array_bitsize =
2006 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
2007
2008 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
2009 }
2010 }
4c4b4cd2 2011 }
14f9c5c9
AS
2012
2013 return lookup_pointer_type (elt_type);
2014 }
2015}
2016
2017/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2018 Otherwise, returns either a standard GDB array with bounds set
2019 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2020 GDB array. Returns NULL if ARR is a null fat pointer. */
2021
d2e4a39e
AS
2022struct value *
2023ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2024{
df407dfe 2025 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2026 {
d2e4a39e 2027 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2028
14f9c5c9 2029 if (arrType == NULL)
4c4b4cd2 2030 return NULL;
14f9c5c9
AS
2031 return value_cast (arrType, value_copy (desc_data (arr)));
2032 }
ad82864c
JB
2033 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2034 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2035 else
2036 return arr;
2037}
2038
2039/* If ARR does not represent an array, returns ARR unchanged.
2040 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2041 be ARR itself if it already is in the proper form). */
2042
720d1a40 2043struct value *
d2e4a39e 2044ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2045{
df407dfe 2046 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2047 {
d2e4a39e 2048 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2049
14f9c5c9 2050 if (arrVal == NULL)
323e0a4a 2051 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2052 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2053 return value_ind (arrVal);
2054 }
ad82864c
JB
2055 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2056 return decode_constrained_packed_array (arr);
d2e4a39e 2057 else
14f9c5c9
AS
2058 return arr;
2059}
2060
2061/* If TYPE represents a GNAT array type, return it translated to an
2062 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2063 packing). For other types, is the identity. */
2064
d2e4a39e
AS
2065struct type *
2066ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2067{
ad82864c
JB
2068 if (ada_is_constrained_packed_array_type (type))
2069 return decode_constrained_packed_array_type (type);
17280b9f
UW
2070
2071 if (ada_is_array_descriptor_type (type))
556bdfd4 2072 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2073
2074 return type;
14f9c5c9
AS
2075}
2076
4c4b4cd2
PH
2077/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2078
ad82864c
JB
2079static int
2080ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2081{
2082 if (type == NULL)
2083 return 0;
4c4b4cd2 2084 type = desc_base_type (type);
61ee279c 2085 type = ada_check_typedef (type);
d2e4a39e 2086 return
14f9c5c9
AS
2087 ada_type_name (type) != NULL
2088 && strstr (ada_type_name (type), "___XP") != NULL;
2089}
2090
ad82864c
JB
2091/* Non-zero iff TYPE represents a standard GNAT constrained
2092 packed-array type. */
2093
2094int
2095ada_is_constrained_packed_array_type (struct type *type)
2096{
2097 return ada_is_packed_array_type (type)
2098 && !ada_is_array_descriptor_type (type);
2099}
2100
2101/* Non-zero iff TYPE represents an array descriptor for a
2102 unconstrained packed-array type. */
2103
2104static int
2105ada_is_unconstrained_packed_array_type (struct type *type)
2106{
2107 return ada_is_packed_array_type (type)
2108 && ada_is_array_descriptor_type (type);
2109}
2110
2111/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2112 return the size of its elements in bits. */
2113
2114static long
2115decode_packed_array_bitsize (struct type *type)
2116{
0d5cff50
DE
2117 const char *raw_name;
2118 const char *tail;
ad82864c
JB
2119 long bits;
2120
720d1a40
JB
2121 /* Access to arrays implemented as fat pointers are encoded as a typedef
2122 of the fat pointer type. We need the name of the fat pointer type
2123 to do the decoding, so strip the typedef layer. */
2124 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2125 type = ada_typedef_target_type (type);
2126
2127 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2128 if (!raw_name)
2129 raw_name = ada_type_name (desc_base_type (type));
2130
2131 if (!raw_name)
2132 return 0;
2133
2134 tail = strstr (raw_name, "___XP");
720d1a40 2135 gdb_assert (tail != NULL);
ad82864c
JB
2136
2137 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2138 {
2139 lim_warning
2140 (_("could not understand bit size information on packed array"));
2141 return 0;
2142 }
2143
2144 return bits;
2145}
2146
14f9c5c9
AS
2147/* Given that TYPE is a standard GDB array type with all bounds filled
2148 in, and that the element size of its ultimate scalar constituents
2149 (that is, either its elements, or, if it is an array of arrays, its
2150 elements' elements, etc.) is *ELT_BITS, return an identical type,
2151 but with the bit sizes of its elements (and those of any
2152 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2153 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2154 in bits.
2155
2156 Note that, for arrays whose index type has an XA encoding where
2157 a bound references a record discriminant, getting that discriminant,
2158 and therefore the actual value of that bound, is not possible
2159 because none of the given parameters gives us access to the record.
2160 This function assumes that it is OK in the context where it is being
2161 used to return an array whose bounds are still dynamic and where
2162 the length is arbitrary. */
4c4b4cd2 2163
d2e4a39e 2164static struct type *
ad82864c 2165constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2166{
d2e4a39e
AS
2167 struct type *new_elt_type;
2168 struct type *new_type;
99b1c762
JB
2169 struct type *index_type_desc;
2170 struct type *index_type;
14f9c5c9
AS
2171 LONGEST low_bound, high_bound;
2172
61ee279c 2173 type = ada_check_typedef (type);
14f9c5c9
AS
2174 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2175 return type;
2176
99b1c762
JB
2177 index_type_desc = ada_find_parallel_type (type, "___XA");
2178 if (index_type_desc)
2179 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2180 NULL);
2181 else
2182 index_type = TYPE_INDEX_TYPE (type);
2183
e9bb382b 2184 new_type = alloc_type_copy (type);
ad82864c
JB
2185 new_elt_type =
2186 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2187 elt_bits);
99b1c762 2188 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2189 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2190 TYPE_NAME (new_type) = ada_type_name (type);
2191
4a46959e
JB
2192 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2193 && is_dynamic_type (check_typedef (index_type)))
2194 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2195 low_bound = high_bound = 0;
2196 if (high_bound < low_bound)
2197 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2198 else
14f9c5c9
AS
2199 {
2200 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2201 TYPE_LENGTH (new_type) =
4c4b4cd2 2202 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2203 }
2204
876cecd0 2205 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2206 return new_type;
2207}
2208
ad82864c
JB
2209/* The array type encoded by TYPE, where
2210 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2211
d2e4a39e 2212static struct type *
ad82864c 2213decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2214{
0d5cff50 2215 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2216 char *name;
0d5cff50 2217 const char *tail;
d2e4a39e 2218 struct type *shadow_type;
14f9c5c9 2219 long bits;
14f9c5c9 2220
727e3d2e
JB
2221 if (!raw_name)
2222 raw_name = ada_type_name (desc_base_type (type));
2223
2224 if (!raw_name)
2225 return NULL;
2226
2227 name = (char *) alloca (strlen (raw_name) + 1);
2228 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2229 type = desc_base_type (type);
2230
14f9c5c9
AS
2231 memcpy (name, raw_name, tail - raw_name);
2232 name[tail - raw_name] = '\000';
2233
b4ba55a1
JB
2234 shadow_type = ada_find_parallel_type_with_name (type, name);
2235
2236 if (shadow_type == NULL)
14f9c5c9 2237 {
323e0a4a 2238 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2239 return NULL;
2240 }
cb249c71 2241 CHECK_TYPEDEF (shadow_type);
14f9c5c9
AS
2242
2243 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2244 {
0963b4bd
MS
2245 lim_warning (_("could not understand bounds "
2246 "information on packed array"));
14f9c5c9
AS
2247 return NULL;
2248 }
d2e4a39e 2249
ad82864c
JB
2250 bits = decode_packed_array_bitsize (type);
2251 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2252}
2253
ad82864c
JB
2254/* Given that ARR is a struct value *indicating a GNAT constrained packed
2255 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2256 standard GDB array type except that the BITSIZEs of the array
2257 target types are set to the number of bits in each element, and the
4c4b4cd2 2258 type length is set appropriately. */
14f9c5c9 2259
d2e4a39e 2260static struct value *
ad82864c 2261decode_constrained_packed_array (struct value *arr)
14f9c5c9 2262{
4c4b4cd2 2263 struct type *type;
14f9c5c9 2264
11aa919a
PMR
2265 /* If our value is a pointer, then dereference it. Likewise if
2266 the value is a reference. Make sure that this operation does not
2267 cause the target type to be fixed, as this would indirectly cause
2268 this array to be decoded. The rest of the routine assumes that
2269 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2270 and "value_ind" routines to perform the dereferencing, as opposed
2271 to using "ada_coerce_ref" or "ada_value_ind". */
2272 arr = coerce_ref (arr);
828292f2 2273 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2274 arr = value_ind (arr);
4c4b4cd2 2275
ad82864c 2276 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2277 if (type == NULL)
2278 {
323e0a4a 2279 error (_("can't unpack array"));
14f9c5c9
AS
2280 return NULL;
2281 }
61ee279c 2282
50810684 2283 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2284 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2285 {
2286 /* This is a (right-justified) modular type representing a packed
2287 array with no wrapper. In order to interpret the value through
2288 the (left-justified) packed array type we just built, we must
2289 first left-justify it. */
2290 int bit_size, bit_pos;
2291 ULONGEST mod;
2292
df407dfe 2293 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2294 bit_size = 0;
2295 while (mod > 0)
2296 {
2297 bit_size += 1;
2298 mod >>= 1;
2299 }
df407dfe 2300 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2301 arr = ada_value_primitive_packed_val (arr, NULL,
2302 bit_pos / HOST_CHAR_BIT,
2303 bit_pos % HOST_CHAR_BIT,
2304 bit_size,
2305 type);
2306 }
2307
4c4b4cd2 2308 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2309}
2310
2311
2312/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2313 given in IND. ARR must be a simple array. */
14f9c5c9 2314
d2e4a39e
AS
2315static struct value *
2316value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2317{
2318 int i;
2319 int bits, elt_off, bit_off;
2320 long elt_total_bit_offset;
d2e4a39e
AS
2321 struct type *elt_type;
2322 struct value *v;
14f9c5c9
AS
2323
2324 bits = 0;
2325 elt_total_bit_offset = 0;
df407dfe 2326 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2327 for (i = 0; i < arity; i += 1)
14f9c5c9 2328 {
d2e4a39e 2329 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2330 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2331 error
0963b4bd
MS
2332 (_("attempt to do packed indexing of "
2333 "something other than a packed array"));
14f9c5c9 2334 else
4c4b4cd2
PH
2335 {
2336 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2337 LONGEST lowerbound, upperbound;
2338 LONGEST idx;
2339
2340 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2341 {
323e0a4a 2342 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2343 lowerbound = upperbound = 0;
2344 }
2345
3cb382c9 2346 idx = pos_atr (ind[i]);
4c4b4cd2 2347 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2348 lim_warning (_("packed array index %ld out of bounds"),
2349 (long) idx);
4c4b4cd2
PH
2350 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2351 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2352 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2353 }
14f9c5c9
AS
2354 }
2355 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2356 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2357
2358 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2359 bits, elt_type);
14f9c5c9
AS
2360 return v;
2361}
2362
4c4b4cd2 2363/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2364
2365static int
d2e4a39e 2366has_negatives (struct type *type)
14f9c5c9 2367{
d2e4a39e
AS
2368 switch (TYPE_CODE (type))
2369 {
2370 default:
2371 return 0;
2372 case TYPE_CODE_INT:
2373 return !TYPE_UNSIGNED (type);
2374 case TYPE_CODE_RANGE:
2375 return TYPE_LOW_BOUND (type) < 0;
2376 }
14f9c5c9 2377}
d2e4a39e 2378
14f9c5c9
AS
2379
2380/* Create a new value of type TYPE from the contents of OBJ starting
2381 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2382 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
0963b4bd 2383 assigning through the result will set the field fetched from.
4c4b4cd2
PH
2384 VALADDR is ignored unless OBJ is NULL, in which case,
2385 VALADDR+OFFSET must address the start of storage containing the
2386 packed value. The value returned in this case is never an lval.
2387 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
14f9c5c9 2388
d2e4a39e 2389struct value *
fc1a4b47 2390ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
a2bd3dcd 2391 long offset, int bit_offset, int bit_size,
4c4b4cd2 2392 struct type *type)
14f9c5c9 2393{
d2e4a39e 2394 struct value *v;
4c4b4cd2
PH
2395 int src, /* Index into the source area */
2396 targ, /* Index into the target area */
2397 srcBitsLeft, /* Number of source bits left to move */
2398 nsrc, ntarg, /* Number of source and target bytes */
2399 unusedLS, /* Number of bits in next significant
2400 byte of source that are unused */
2401 accumSize; /* Number of meaningful bits in accum */
2402 unsigned char *bytes; /* First byte containing data to unpack */
d2e4a39e 2403 unsigned char *unpacked;
4c4b4cd2 2404 unsigned long accum; /* Staging area for bits being transferred */
14f9c5c9
AS
2405 unsigned char sign;
2406 int len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
4c4b4cd2
PH
2407 /* Transmit bytes from least to most significant; delta is the direction
2408 the indices move. */
50810684 2409 int delta = gdbarch_bits_big_endian (get_type_arch (type)) ? -1 : 1;
14f9c5c9 2410
61ee279c 2411 type = ada_check_typedef (type);
14f9c5c9
AS
2412
2413 if (obj == NULL)
2414 {
2415 v = allocate_value (type);
d2e4a39e 2416 bytes = (unsigned char *) (valaddr + offset);
14f9c5c9 2417 }
9214ee5f 2418 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
14f9c5c9 2419 {
ca34b84f 2420 v = value_at (type, value_address (obj) + offset);
9f1f738a 2421 type = value_type (v);
fc958966
JB
2422 if (TYPE_LENGTH (type) * HOST_CHAR_BIT < bit_size)
2423 {
2424 /* This can happen in the case of an array of dynamic objects,
2425 where the size of each element changes from element to element.
2426 In that case, we're initially given the array stride, but
2427 after resolving the element type, we find that its size is
2428 less than this stride. In that case, adjust bit_size to
2429 match TYPE's length, and recompute LEN accordingly. */
2430 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2431 len = TYPE_LENGTH (type) + (bit_offset + HOST_CHAR_BIT - 1) / 8;
2432 }
d2e4a39e 2433 bytes = (unsigned char *) alloca (len);
ca34b84f 2434 read_memory (value_address (v), bytes, len);
14f9c5c9 2435 }
d2e4a39e 2436 else
14f9c5c9
AS
2437 {
2438 v = allocate_value (type);
0fd88904 2439 bytes = (unsigned char *) value_contents (obj) + offset;
14f9c5c9 2440 }
d2e4a39e
AS
2441
2442 if (obj != NULL)
14f9c5c9 2443 {
53ba8333 2444 long new_offset = offset;
5b4ee69b 2445
74bcbdf3 2446 set_value_component_location (v, obj);
9bbda503
AC
2447 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2448 set_value_bitsize (v, bit_size);
df407dfe 2449 if (value_bitpos (v) >= HOST_CHAR_BIT)
4c4b4cd2 2450 {
53ba8333 2451 ++new_offset;
9bbda503 2452 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
4c4b4cd2 2453 }
53ba8333
JB
2454 set_value_offset (v, new_offset);
2455
2456 /* Also set the parent value. This is needed when trying to
2457 assign a new value (in inferior memory). */
2458 set_value_parent (v, obj);
14f9c5c9
AS
2459 }
2460 else
9bbda503 2461 set_value_bitsize (v, bit_size);
0fd88904 2462 unpacked = (unsigned char *) value_contents (v);
14f9c5c9
AS
2463
2464 srcBitsLeft = bit_size;
2465 nsrc = len;
2466 ntarg = TYPE_LENGTH (type);
2467 sign = 0;
2468 if (bit_size == 0)
2469 {
2470 memset (unpacked, 0, TYPE_LENGTH (type));
2471 return v;
2472 }
50810684 2473 else if (gdbarch_bits_big_endian (get_type_arch (type)))
14f9c5c9 2474 {
d2e4a39e 2475 src = len - 1;
1265e4aa
JB
2476 if (has_negatives (type)
2477 && ((bytes[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2478 sign = ~0;
d2e4a39e
AS
2479
2480 unusedLS =
4c4b4cd2
PH
2481 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2482 % HOST_CHAR_BIT;
14f9c5c9
AS
2483
2484 switch (TYPE_CODE (type))
4c4b4cd2
PH
2485 {
2486 case TYPE_CODE_ARRAY:
2487 case TYPE_CODE_UNION:
2488 case TYPE_CODE_STRUCT:
2489 /* Non-scalar values must be aligned at a byte boundary... */
2490 accumSize =
2491 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2492 /* ... And are placed at the beginning (most-significant) bytes
2493 of the target. */
529cad9c 2494 targ = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
0056e4d5 2495 ntarg = targ + 1;
4c4b4cd2
PH
2496 break;
2497 default:
2498 accumSize = 0;
2499 targ = TYPE_LENGTH (type) - 1;
2500 break;
2501 }
14f9c5c9 2502 }
d2e4a39e 2503 else
14f9c5c9
AS
2504 {
2505 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2506
2507 src = targ = 0;
2508 unusedLS = bit_offset;
2509 accumSize = 0;
2510
d2e4a39e 2511 if (has_negatives (type) && (bytes[len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2512 sign = ~0;
14f9c5c9 2513 }
d2e4a39e 2514
14f9c5c9
AS
2515 accum = 0;
2516 while (nsrc > 0)
2517 {
2518 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2519 part of the value. */
d2e4a39e 2520 unsigned int unusedMSMask =
4c4b4cd2
PH
2521 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2522 1;
2523 /* Sign-extend bits for this byte. */
14f9c5c9 2524 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2525
d2e4a39e 2526 accum |=
4c4b4cd2 2527 (((bytes[src] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2528 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2529 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2
PH
2530 {
2531 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2532 accumSize -= HOST_CHAR_BIT;
2533 accum >>= HOST_CHAR_BIT;
2534 ntarg -= 1;
2535 targ += delta;
2536 }
14f9c5c9
AS
2537 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2538 unusedLS = 0;
2539 nsrc -= 1;
2540 src += delta;
2541 }
2542 while (ntarg > 0)
2543 {
2544 accum |= sign << accumSize;
2545 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2546 accumSize -= HOST_CHAR_BIT;
2547 accum >>= HOST_CHAR_BIT;
2548 ntarg -= 1;
2549 targ += delta;
2550 }
2551
2552 return v;
2553}
d2e4a39e 2554
14f9c5c9
AS
2555/* Move N bits from SOURCE, starting at bit offset SRC_OFFSET to
2556 TARGET, starting at bit offset TARG_OFFSET. SOURCE and TARGET must
4c4b4cd2 2557 not overlap. */
14f9c5c9 2558static void
fc1a4b47 2559move_bits (gdb_byte *target, int targ_offset, const gdb_byte *source,
50810684 2560 int src_offset, int n, int bits_big_endian_p)
14f9c5c9
AS
2561{
2562 unsigned int accum, mask;
2563 int accum_bits, chunk_size;
2564
2565 target += targ_offset / HOST_CHAR_BIT;
2566 targ_offset %= HOST_CHAR_BIT;
2567 source += src_offset / HOST_CHAR_BIT;
2568 src_offset %= HOST_CHAR_BIT;
50810684 2569 if (bits_big_endian_p)
14f9c5c9
AS
2570 {
2571 accum = (unsigned char) *source;
2572 source += 1;
2573 accum_bits = HOST_CHAR_BIT - src_offset;
2574
d2e4a39e 2575 while (n > 0)
4c4b4cd2
PH
2576 {
2577 int unused_right;
5b4ee69b 2578
4c4b4cd2
PH
2579 accum = (accum << HOST_CHAR_BIT) + (unsigned char) *source;
2580 accum_bits += HOST_CHAR_BIT;
2581 source += 1;
2582 chunk_size = HOST_CHAR_BIT - targ_offset;
2583 if (chunk_size > n)
2584 chunk_size = n;
2585 unused_right = HOST_CHAR_BIT - (chunk_size + targ_offset);
2586 mask = ((1 << chunk_size) - 1) << unused_right;
2587 *target =
2588 (*target & ~mask)
2589 | ((accum >> (accum_bits - chunk_size - unused_right)) & mask);
2590 n -= chunk_size;
2591 accum_bits -= chunk_size;
2592 target += 1;
2593 targ_offset = 0;
2594 }
14f9c5c9
AS
2595 }
2596 else
2597 {
2598 accum = (unsigned char) *source >> src_offset;
2599 source += 1;
2600 accum_bits = HOST_CHAR_BIT - src_offset;
2601
d2e4a39e 2602 while (n > 0)
4c4b4cd2
PH
2603 {
2604 accum = accum + ((unsigned char) *source << accum_bits);
2605 accum_bits += HOST_CHAR_BIT;
2606 source += 1;
2607 chunk_size = HOST_CHAR_BIT - targ_offset;
2608 if (chunk_size > n)
2609 chunk_size = n;
2610 mask = ((1 << chunk_size) - 1) << targ_offset;
2611 *target = (*target & ~mask) | ((accum << targ_offset) & mask);
2612 n -= chunk_size;
2613 accum_bits -= chunk_size;
2614 accum >>= chunk_size;
2615 target += 1;
2616 targ_offset = 0;
2617 }
14f9c5c9
AS
2618 }
2619}
2620
14f9c5c9
AS
2621/* Store the contents of FROMVAL into the location of TOVAL.
2622 Return a new value with the location of TOVAL and contents of
2623 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2624 floating-point or non-scalar types. */
14f9c5c9 2625
d2e4a39e
AS
2626static struct value *
2627ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2628{
df407dfe
AC
2629 struct type *type = value_type (toval);
2630 int bits = value_bitsize (toval);
14f9c5c9 2631
52ce6436
PH
2632 toval = ada_coerce_ref (toval);
2633 fromval = ada_coerce_ref (fromval);
2634
2635 if (ada_is_direct_array_type (value_type (toval)))
2636 toval = ada_coerce_to_simple_array (toval);
2637 if (ada_is_direct_array_type (value_type (fromval)))
2638 fromval = ada_coerce_to_simple_array (fromval);
2639
88e3b34b 2640 if (!deprecated_value_modifiable (toval))
323e0a4a 2641 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2642
d2e4a39e 2643 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2644 && bits > 0
d2e4a39e 2645 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2646 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2647 {
df407dfe
AC
2648 int len = (value_bitpos (toval)
2649 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2650 int from_size;
948f8e3d 2651 gdb_byte *buffer = alloca (len);
d2e4a39e 2652 struct value *val;
42ae5230 2653 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2654
2655 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2656 fromval = value_cast (type, fromval);
14f9c5c9 2657
52ce6436 2658 read_memory (to_addr, buffer, len);
aced2898
PH
2659 from_size = value_bitsize (fromval);
2660 if (from_size == 0)
2661 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
50810684 2662 if (gdbarch_bits_big_endian (get_type_arch (type)))
df407dfe 2663 move_bits (buffer, value_bitpos (toval),
50810684 2664 value_contents (fromval), from_size - bits, bits, 1);
14f9c5c9 2665 else
50810684
UW
2666 move_bits (buffer, value_bitpos (toval),
2667 value_contents (fromval), 0, bits, 0);
972daa01 2668 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2669
14f9c5c9 2670 val = value_copy (toval);
0fd88904 2671 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2672 TYPE_LENGTH (type));
04624583 2673 deprecated_set_value_type (val, type);
d2e4a39e 2674
14f9c5c9
AS
2675 return val;
2676 }
2677
2678 return value_assign (toval, fromval);
2679}
2680
2681
52ce6436
PH
2682/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2683 * CONTAINER, assign the contents of VAL to COMPONENTS's place in
2684 * CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2685 * COMPONENT, and not the inferior's memory. The current contents
2686 * of COMPONENT are ignored. */
2687static void
2688value_assign_to_component (struct value *container, struct value *component,
2689 struct value *val)
2690{
2691 LONGEST offset_in_container =
42ae5230 2692 (LONGEST) (value_address (component) - value_address (container));
52ce6436
PH
2693 int bit_offset_in_container =
2694 value_bitpos (component) - value_bitpos (container);
2695 int bits;
2696
2697 val = value_cast (value_type (component), val);
2698
2699 if (value_bitsize (component) == 0)
2700 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2701 else
2702 bits = value_bitsize (component);
2703
50810684 2704 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
52ce6436
PH
2705 move_bits (value_contents_writeable (container) + offset_in_container,
2706 value_bitpos (container) + bit_offset_in_container,
2707 value_contents (val),
2708 TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits,
50810684 2709 bits, 1);
52ce6436
PH
2710 else
2711 move_bits (value_contents_writeable (container) + offset_in_container,
2712 value_bitpos (container) + bit_offset_in_container,
50810684 2713 value_contents (val), 0, bits, 0);
52ce6436
PH
2714}
2715
4c4b4cd2
PH
2716/* The value of the element of array ARR at the ARITY indices given in IND.
2717 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2718 thereto. */
2719
d2e4a39e
AS
2720struct value *
2721ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2722{
2723 int k;
d2e4a39e
AS
2724 struct value *elt;
2725 struct type *elt_type;
14f9c5c9
AS
2726
2727 elt = ada_coerce_to_simple_array (arr);
2728
df407dfe 2729 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2730 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2731 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2732 return value_subscript_packed (elt, arity, ind);
2733
2734 for (k = 0; k < arity; k += 1)
2735 {
2736 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2737 error (_("too many subscripts (%d expected)"), k);
2497b498 2738 elt = value_subscript (elt, pos_atr (ind[k]));
14f9c5c9
AS
2739 }
2740 return elt;
2741}
2742
deede10c
JB
2743/* Assuming ARR is a pointer to a GDB array, the value of the element
2744 of *ARR at the ARITY indices given in IND.
2745 Does not read the entire array into memory. */
14f9c5c9 2746
2c0b251b 2747static struct value *
deede10c 2748ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2749{
2750 int k;
deede10c
JB
2751 struct type *type
2752 = check_typedef (value_enclosing_type (ada_value_ind (arr)));
14f9c5c9
AS
2753
2754 for (k = 0; k < arity; k += 1)
2755 {
2756 LONGEST lwb, upb;
14f9c5c9
AS
2757
2758 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2759 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2760 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2761 value_copy (arr));
14f9c5c9 2762 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
2497b498 2763 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2764 type = TYPE_TARGET_TYPE (type);
2765 }
2766
2767 return value_ind (arr);
2768}
2769
0b5d8877 2770/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
f5938064
JG
2771 actual type of ARRAY_PTR is ignored), returns the Ada slice of HIGH-LOW+1
2772 elements starting at index LOW. The lower bound of this array is LOW, as
0963b4bd 2773 per Ada rules. */
0b5d8877 2774static struct value *
f5938064
JG
2775ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2776 int low, int high)
0b5d8877 2777{
b0dd7688 2778 struct type *type0 = ada_check_typedef (type);
6c038f32 2779 CORE_ADDR base = value_as_address (array_ptr)
b0dd7688
JB
2780 + ((low - ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0)))
2781 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
0c9c3474
SA
2782 struct type *index_type
2783 = create_static_range_type (NULL,
2784 TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0)),
2785 low, high);
6c038f32 2786 struct type *slice_type =
b0dd7688 2787 create_array_type (NULL, TYPE_TARGET_TYPE (type0), index_type);
5b4ee69b 2788
f5938064 2789 return value_at_lazy (slice_type, base);
0b5d8877
PH
2790}
2791
2792
2793static struct value *
2794ada_value_slice (struct value *array, int low, int high)
2795{
b0dd7688 2796 struct type *type = ada_check_typedef (value_type (array));
0c9c3474
SA
2797 struct type *index_type
2798 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
6c038f32 2799 struct type *slice_type =
0b5d8877 2800 create_array_type (NULL, TYPE_TARGET_TYPE (type), index_type);
5b4ee69b 2801
6c038f32 2802 return value_cast (slice_type, value_slice (array, low, high - low + 1));
0b5d8877
PH
2803}
2804
14f9c5c9
AS
2805/* If type is a record type in the form of a standard GNAT array
2806 descriptor, returns the number of dimensions for type. If arr is a
2807 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2808 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2809
2810int
d2e4a39e 2811ada_array_arity (struct type *type)
14f9c5c9
AS
2812{
2813 int arity;
2814
2815 if (type == NULL)
2816 return 0;
2817
2818 type = desc_base_type (type);
2819
2820 arity = 0;
d2e4a39e 2821 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2822 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2823 else
2824 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2825 {
4c4b4cd2 2826 arity += 1;
61ee279c 2827 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2828 }
d2e4a39e 2829
14f9c5c9
AS
2830 return arity;
2831}
2832
2833/* If TYPE is a record type in the form of a standard GNAT array
2834 descriptor or a simple array type, returns the element type for
2835 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2836 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2837
d2e4a39e
AS
2838struct type *
2839ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2840{
2841 type = desc_base_type (type);
2842
d2e4a39e 2843 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2844 {
2845 int k;
d2e4a39e 2846 struct type *p_array_type;
14f9c5c9 2847
556bdfd4 2848 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2849
2850 k = ada_array_arity (type);
2851 if (k == 0)
4c4b4cd2 2852 return NULL;
d2e4a39e 2853
4c4b4cd2 2854 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2855 if (nindices >= 0 && k > nindices)
4c4b4cd2 2856 k = nindices;
d2e4a39e 2857 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2858 {
61ee279c 2859 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2860 k -= 1;
2861 }
14f9c5c9
AS
2862 return p_array_type;
2863 }
2864 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2865 {
2866 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2867 {
2868 type = TYPE_TARGET_TYPE (type);
2869 nindices -= 1;
2870 }
14f9c5c9
AS
2871 return type;
2872 }
2873
2874 return NULL;
2875}
2876
4c4b4cd2 2877/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2878 Does not examine memory. Throws an error if N is invalid or TYPE
2879 is not an array type. NAME is the name of the Ada attribute being
2880 evaluated ('range, 'first, 'last, or 'length); it is used in building
2881 the error message. */
14f9c5c9 2882
1eea4ebd
UW
2883static struct type *
2884ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2885{
4c4b4cd2
PH
2886 struct type *result_type;
2887
14f9c5c9
AS
2888 type = desc_base_type (type);
2889
1eea4ebd
UW
2890 if (n < 0 || n > ada_array_arity (type))
2891 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2892
4c4b4cd2 2893 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2894 {
2895 int i;
2896
2897 for (i = 1; i < n; i += 1)
4c4b4cd2 2898 type = TYPE_TARGET_TYPE (type);
262452ec 2899 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2900 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2901 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2902 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2903 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2904 result_type = NULL;
14f9c5c9 2905 }
d2e4a39e 2906 else
1eea4ebd
UW
2907 {
2908 result_type = desc_index_type (desc_bounds_type (type), n);
2909 if (result_type == NULL)
2910 error (_("attempt to take bound of something that is not an array"));
2911 }
2912
2913 return result_type;
14f9c5c9
AS
2914}
2915
2916/* Given that arr is an array type, returns the lower bound of the
2917 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2918 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2919 array-descriptor type. It works for other arrays with bounds supplied
2920 by run-time quantities other than discriminants. */
14f9c5c9 2921
abb68b3e 2922static LONGEST
fb5e3d5c 2923ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2924{
8a48ac95 2925 struct type *type, *index_type_desc, *index_type;
1ce677a4 2926 int i;
262452ec
JK
2927
2928 gdb_assert (which == 0 || which == 1);
14f9c5c9 2929
ad82864c
JB
2930 if (ada_is_constrained_packed_array_type (arr_type))
2931 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2932
4c4b4cd2 2933 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2934 return (LONGEST) - which;
14f9c5c9
AS
2935
2936 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2937 type = TYPE_TARGET_TYPE (arr_type);
2938 else
2939 type = arr_type;
2940
bafffb51
JB
2941 if (TYPE_FIXED_INSTANCE (type))
2942 {
2943 /* The array has already been fixed, so we do not need to
2944 check the parallel ___XA type again. That encoding has
2945 already been applied, so ignore it now. */
2946 index_type_desc = NULL;
2947 }
2948 else
2949 {
2950 index_type_desc = ada_find_parallel_type (type, "___XA");
2951 ada_fixup_array_indexes_type (index_type_desc);
2952 }
2953
262452ec 2954 if (index_type_desc != NULL)
28c85d6c
JB
2955 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2956 NULL);
262452ec 2957 else
8a48ac95
JB
2958 {
2959 struct type *elt_type = check_typedef (type);
2960
2961 for (i = 1; i < n; i++)
2962 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
2963
2964 index_type = TYPE_INDEX_TYPE (elt_type);
2965 }
262452ec 2966
43bbcdc2
PH
2967 return
2968 (LONGEST) (which == 0
2969 ? ada_discrete_type_low_bound (index_type)
2970 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
2971}
2972
2973/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
2974 nth index (numbering from 1) if WHICH is 0, and the upper bound if
2975 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 2976 supplied by run-time quantities other than discriminants. */
14f9c5c9 2977
1eea4ebd 2978static LONGEST
4dc81987 2979ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 2980{
eb479039
JB
2981 struct type *arr_type;
2982
2983 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
2984 arr = value_ind (arr);
2985 arr_type = value_enclosing_type (arr);
14f9c5c9 2986
ad82864c
JB
2987 if (ada_is_constrained_packed_array_type (arr_type))
2988 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 2989 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 2990 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 2991 else
1eea4ebd 2992 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
2993}
2994
2995/* Given that arr is an array value, returns the length of the
2996 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
2997 supplied by run-time quantities other than discriminants.
2998 Does not work for arrays indexed by enumeration types with representation
2999 clauses at the moment. */
14f9c5c9 3000
1eea4ebd 3001static LONGEST
d2e4a39e 3002ada_array_length (struct value *arr, int n)
14f9c5c9 3003{
eb479039
JB
3004 struct type *arr_type;
3005
3006 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3007 arr = value_ind (arr);
3008 arr_type = value_enclosing_type (arr);
14f9c5c9 3009
ad82864c
JB
3010 if (ada_is_constrained_packed_array_type (arr_type))
3011 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3012
4c4b4cd2 3013 if (ada_is_simple_array_type (arr_type))
1eea4ebd
UW
3014 return (ada_array_bound_from_type (arr_type, n, 1)
3015 - ada_array_bound_from_type (arr_type, n, 0) + 1);
14f9c5c9 3016 else
1eea4ebd
UW
3017 return (value_as_long (desc_one_bound (desc_bounds (arr), n, 1))
3018 - value_as_long (desc_one_bound (desc_bounds (arr), n, 0)) + 1);
4c4b4cd2
PH
3019}
3020
3021/* An empty array whose type is that of ARR_TYPE (an array type),
3022 with bounds LOW to LOW-1. */
3023
3024static struct value *
3025empty_array (struct type *arr_type, int low)
3026{
b0dd7688 3027 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3028 struct type *index_type
3029 = create_static_range_type
3030 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low, low - 1);
b0dd7688 3031 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3032
0b5d8877 3033 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3034}
14f9c5c9 3035\f
d2e4a39e 3036
4c4b4cd2 3037 /* Name resolution */
14f9c5c9 3038
4c4b4cd2
PH
3039/* The "decoded" name for the user-definable Ada operator corresponding
3040 to OP. */
14f9c5c9 3041
d2e4a39e 3042static const char *
4c4b4cd2 3043ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3044{
3045 int i;
3046
4c4b4cd2 3047 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3048 {
3049 if (ada_opname_table[i].op == op)
4c4b4cd2 3050 return ada_opname_table[i].decoded;
14f9c5c9 3051 }
323e0a4a 3052 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3053}
3054
3055
4c4b4cd2
PH
3056/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3057 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3058 undefined namespace) and converts operators that are
3059 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3060 non-null, it provides a preferred result type [at the moment, only
3061 type void has any effect---causing procedures to be preferred over
3062 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3063 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3064
4c4b4cd2
PH
3065static void
3066resolve (struct expression **expp, int void_context_p)
14f9c5c9 3067{
30b15541
UW
3068 struct type *context_type = NULL;
3069 int pc = 0;
3070
3071 if (void_context_p)
3072 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3073
3074 resolve_subexp (expp, &pc, 1, context_type);
14f9c5c9
AS
3075}
3076
4c4b4cd2
PH
3077/* Resolve the operator of the subexpression beginning at
3078 position *POS of *EXPP. "Resolving" consists of replacing
3079 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3080 with their resolutions, replacing built-in operators with
3081 function calls to user-defined operators, where appropriate, and,
3082 when DEPROCEDURE_P is non-zero, converting function-valued variables
3083 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3084 are as in ada_resolve, above. */
14f9c5c9 3085
d2e4a39e 3086static struct value *
4c4b4cd2 3087resolve_subexp (struct expression **expp, int *pos, int deprocedure_p,
76a01679 3088 struct type *context_type)
14f9c5c9
AS
3089{
3090 int pc = *pos;
3091 int i;
4c4b4cd2 3092 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3093 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3094 struct value **argvec; /* Vector of operand types (alloca'ed). */
3095 int nargs; /* Number of operands. */
52ce6436 3096 int oplen;
14f9c5c9
AS
3097
3098 argvec = NULL;
3099 nargs = 0;
3100 exp = *expp;
3101
52ce6436
PH
3102 /* Pass one: resolve operands, saving their types and updating *pos,
3103 if needed. */
14f9c5c9
AS
3104 switch (op)
3105 {
4c4b4cd2
PH
3106 case OP_FUNCALL:
3107 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3108 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3109 *pos += 7;
4c4b4cd2
PH
3110 else
3111 {
3112 *pos += 3;
3113 resolve_subexp (expp, pos, 0, NULL);
3114 }
3115 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3116 break;
3117
14f9c5c9 3118 case UNOP_ADDR:
4c4b4cd2
PH
3119 *pos += 1;
3120 resolve_subexp (expp, pos, 0, NULL);
3121 break;
3122
52ce6436
PH
3123 case UNOP_QUAL:
3124 *pos += 3;
17466c1a 3125 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type));
4c4b4cd2
PH
3126 break;
3127
52ce6436 3128 case OP_ATR_MODULUS:
4c4b4cd2
PH
3129 case OP_ATR_SIZE:
3130 case OP_ATR_TAG:
4c4b4cd2
PH
3131 case OP_ATR_FIRST:
3132 case OP_ATR_LAST:
3133 case OP_ATR_LENGTH:
3134 case OP_ATR_POS:
3135 case OP_ATR_VAL:
4c4b4cd2
PH
3136 case OP_ATR_MIN:
3137 case OP_ATR_MAX:
52ce6436
PH
3138 case TERNOP_IN_RANGE:
3139 case BINOP_IN_BOUNDS:
3140 case UNOP_IN_RANGE:
3141 case OP_AGGREGATE:
3142 case OP_OTHERS:
3143 case OP_CHOICES:
3144 case OP_POSITIONAL:
3145 case OP_DISCRETE_RANGE:
3146 case OP_NAME:
3147 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3148 *pos += oplen;
14f9c5c9
AS
3149 break;
3150
3151 case BINOP_ASSIGN:
3152 {
4c4b4cd2
PH
3153 struct value *arg1;
3154
3155 *pos += 1;
3156 arg1 = resolve_subexp (expp, pos, 0, NULL);
3157 if (arg1 == NULL)
3158 resolve_subexp (expp, pos, 1, NULL);
3159 else
df407dfe 3160 resolve_subexp (expp, pos, 1, value_type (arg1));
4c4b4cd2 3161 break;
14f9c5c9
AS
3162 }
3163
4c4b4cd2 3164 case UNOP_CAST:
4c4b4cd2
PH
3165 *pos += 3;
3166 nargs = 1;
3167 break;
14f9c5c9 3168
4c4b4cd2
PH
3169 case BINOP_ADD:
3170 case BINOP_SUB:
3171 case BINOP_MUL:
3172 case BINOP_DIV:
3173 case BINOP_REM:
3174 case BINOP_MOD:
3175 case BINOP_EXP:
3176 case BINOP_CONCAT:
3177 case BINOP_LOGICAL_AND:
3178 case BINOP_LOGICAL_OR:
3179 case BINOP_BITWISE_AND:
3180 case BINOP_BITWISE_IOR:
3181 case BINOP_BITWISE_XOR:
14f9c5c9 3182
4c4b4cd2
PH
3183 case BINOP_EQUAL:
3184 case BINOP_NOTEQUAL:
3185 case BINOP_LESS:
3186 case BINOP_GTR:
3187 case BINOP_LEQ:
3188 case BINOP_GEQ:
14f9c5c9 3189
4c4b4cd2
PH
3190 case BINOP_REPEAT:
3191 case BINOP_SUBSCRIPT:
3192 case BINOP_COMMA:
40c8aaa9
JB
3193 *pos += 1;
3194 nargs = 2;
3195 break;
14f9c5c9 3196
4c4b4cd2
PH
3197 case UNOP_NEG:
3198 case UNOP_PLUS:
3199 case UNOP_LOGICAL_NOT:
3200 case UNOP_ABS:
3201 case UNOP_IND:
3202 *pos += 1;
3203 nargs = 1;
3204 break;
14f9c5c9 3205
4c4b4cd2
PH
3206 case OP_LONG:
3207 case OP_DOUBLE:
3208 case OP_VAR_VALUE:
3209 *pos += 4;
3210 break;
14f9c5c9 3211
4c4b4cd2
PH
3212 case OP_TYPE:
3213 case OP_BOOL:
3214 case OP_LAST:
4c4b4cd2
PH
3215 case OP_INTERNALVAR:
3216 *pos += 3;
3217 break;
14f9c5c9 3218
4c4b4cd2
PH
3219 case UNOP_MEMVAL:
3220 *pos += 3;
3221 nargs = 1;
3222 break;
3223
67f3407f
DJ
3224 case OP_REGISTER:
3225 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3226 break;
3227
4c4b4cd2
PH
3228 case STRUCTOP_STRUCT:
3229 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3230 nargs = 1;
3231 break;
3232
4c4b4cd2 3233 case TERNOP_SLICE:
4c4b4cd2
PH
3234 *pos += 1;
3235 nargs = 3;
3236 break;
3237
52ce6436 3238 case OP_STRING:
14f9c5c9 3239 break;
4c4b4cd2
PH
3240
3241 default:
323e0a4a 3242 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3243 }
3244
76a01679 3245 argvec = (struct value * *) alloca (sizeof (struct value *) * (nargs + 1));
4c4b4cd2
PH
3246 for (i = 0; i < nargs; i += 1)
3247 argvec[i] = resolve_subexp (expp, pos, 1, NULL);
3248 argvec[i] = NULL;
3249 exp = *expp;
3250
3251 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3252 switch (op)
3253 {
3254 default:
3255 break;
3256
14f9c5c9 3257 case OP_VAR_VALUE:
4c4b4cd2 3258 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
3259 {
3260 struct ada_symbol_info *candidates;
3261 int n_candidates;
3262
3263 n_candidates =
3264 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3265 (exp->elts[pc + 2].symbol),
3266 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3267 &candidates);
76a01679
JB
3268
3269 if (n_candidates > 1)
3270 {
3271 /* Types tend to get re-introduced locally, so if there
3272 are any local symbols that are not types, first filter
3273 out all types. */
3274 int j;
3275 for (j = 0; j < n_candidates; j += 1)
3276 switch (SYMBOL_CLASS (candidates[j].sym))
3277 {
3278 case LOC_REGISTER:
3279 case LOC_ARG:
3280 case LOC_REF_ARG:
76a01679
JB
3281 case LOC_REGPARM_ADDR:
3282 case LOC_LOCAL:
76a01679 3283 case LOC_COMPUTED:
76a01679
JB
3284 goto FoundNonType;
3285 default:
3286 break;
3287 }
3288 FoundNonType:
3289 if (j < n_candidates)
3290 {
3291 j = 0;
3292 while (j < n_candidates)
3293 {
3294 if (SYMBOL_CLASS (candidates[j].sym) == LOC_TYPEDEF)
3295 {
3296 candidates[j] = candidates[n_candidates - 1];
3297 n_candidates -= 1;
3298 }
3299 else
3300 j += 1;
3301 }
3302 }
3303 }
3304
3305 if (n_candidates == 0)
323e0a4a 3306 error (_("No definition found for %s"),
76a01679
JB
3307 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3308 else if (n_candidates == 1)
3309 i = 0;
3310 else if (deprocedure_p
3311 && !is_nonfunction (candidates, n_candidates))
3312 {
06d5cf63
JB
3313 i = ada_resolve_function
3314 (candidates, n_candidates, NULL, 0,
3315 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
3316 context_type);
76a01679 3317 if (i < 0)
323e0a4a 3318 error (_("Could not find a match for %s"),
76a01679
JB
3319 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3320 }
3321 else
3322 {
323e0a4a 3323 printf_filtered (_("Multiple matches for %s\n"),
76a01679
JB
3324 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3325 user_select_syms (candidates, n_candidates, 1);
3326 i = 0;
3327 }
3328
3329 exp->elts[pc + 1].block = candidates[i].block;
3330 exp->elts[pc + 2].symbol = candidates[i].sym;
1265e4aa
JB
3331 if (innermost_block == NULL
3332 || contained_in (candidates[i].block, innermost_block))
76a01679
JB
3333 innermost_block = candidates[i].block;
3334 }
3335
3336 if (deprocedure_p
3337 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3338 == TYPE_CODE_FUNC))
3339 {
3340 replace_operator_with_call (expp, pc, 0, 0,
3341 exp->elts[pc + 2].symbol,
3342 exp->elts[pc + 1].block);
3343 exp = *expp;
3344 }
14f9c5c9
AS
3345 break;
3346
3347 case OP_FUNCALL:
3348 {
4c4b4cd2 3349 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3350 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2
PH
3351 {
3352 struct ada_symbol_info *candidates;
3353 int n_candidates;
3354
3355 n_candidates =
76a01679
JB
3356 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3357 (exp->elts[pc + 5].symbol),
3358 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3359 &candidates);
4c4b4cd2
PH
3360 if (n_candidates == 1)
3361 i = 0;
3362 else
3363 {
06d5cf63
JB
3364 i = ada_resolve_function
3365 (candidates, n_candidates,
3366 argvec, nargs,
3367 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
3368 context_type);
4c4b4cd2 3369 if (i < 0)
323e0a4a 3370 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3371 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3372 }
3373
3374 exp->elts[pc + 4].block = candidates[i].block;
3375 exp->elts[pc + 5].symbol = candidates[i].sym;
1265e4aa
JB
3376 if (innermost_block == NULL
3377 || contained_in (candidates[i].block, innermost_block))
4c4b4cd2
PH
3378 innermost_block = candidates[i].block;
3379 }
14f9c5c9
AS
3380 }
3381 break;
3382 case BINOP_ADD:
3383 case BINOP_SUB:
3384 case BINOP_MUL:
3385 case BINOP_DIV:
3386 case BINOP_REM:
3387 case BINOP_MOD:
3388 case BINOP_CONCAT:
3389 case BINOP_BITWISE_AND:
3390 case BINOP_BITWISE_IOR:
3391 case BINOP_BITWISE_XOR:
3392 case BINOP_EQUAL:
3393 case BINOP_NOTEQUAL:
3394 case BINOP_LESS:
3395 case BINOP_GTR:
3396 case BINOP_LEQ:
3397 case BINOP_GEQ:
3398 case BINOP_EXP:
3399 case UNOP_NEG:
3400 case UNOP_PLUS:
3401 case UNOP_LOGICAL_NOT:
3402 case UNOP_ABS:
3403 if (possible_user_operator_p (op, argvec))
4c4b4cd2
PH
3404 {
3405 struct ada_symbol_info *candidates;
3406 int n_candidates;
3407
3408 n_candidates =
3409 ada_lookup_symbol_list (ada_encode (ada_decoded_op_name (op)),
3410 (struct block *) NULL, VAR_DOMAIN,
4eeaa230 3411 &candidates);
4c4b4cd2 3412 i = ada_resolve_function (candidates, n_candidates, argvec, nargs,
76a01679 3413 ada_decoded_op_name (op), NULL);
4c4b4cd2
PH
3414 if (i < 0)
3415 break;
3416
76a01679
JB
3417 replace_operator_with_call (expp, pc, nargs, 1,
3418 candidates[i].sym, candidates[i].block);
4c4b4cd2
PH
3419 exp = *expp;
3420 }
14f9c5c9 3421 break;
4c4b4cd2
PH
3422
3423 case OP_TYPE:
b3dbf008 3424 case OP_REGISTER:
4c4b4cd2 3425 return NULL;
14f9c5c9
AS
3426 }
3427
3428 *pos = pc;
3429 return evaluate_subexp_type (exp, pos);
3430}
3431
3432/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3433 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3434 a non-pointer. */
14f9c5c9 3435/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3436 liberal. */
14f9c5c9
AS
3437
3438static int
4dc81987 3439ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3440{
61ee279c
PH
3441 ftype = ada_check_typedef (ftype);
3442 atype = ada_check_typedef (atype);
14f9c5c9
AS
3443
3444 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3445 ftype = TYPE_TARGET_TYPE (ftype);
3446 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3447 atype = TYPE_TARGET_TYPE (atype);
3448
d2e4a39e 3449 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3450 {
3451 default:
5b3d5b7d 3452 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3453 case TYPE_CODE_PTR:
3454 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3455 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3456 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3457 else
1265e4aa
JB
3458 return (may_deref
3459 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3460 case TYPE_CODE_INT:
3461 case TYPE_CODE_ENUM:
3462 case TYPE_CODE_RANGE:
3463 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3464 {
3465 case TYPE_CODE_INT:
3466 case TYPE_CODE_ENUM:
3467 case TYPE_CODE_RANGE:
3468 return 1;
3469 default:
3470 return 0;
3471 }
14f9c5c9
AS
3472
3473 case TYPE_CODE_ARRAY:
d2e4a39e 3474 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3475 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3476
3477 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3478 if (ada_is_array_descriptor_type (ftype))
3479 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3480 || ada_is_array_descriptor_type (atype));
14f9c5c9 3481 else
4c4b4cd2
PH
3482 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3483 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3484
3485 case TYPE_CODE_UNION:
3486 case TYPE_CODE_FLT:
3487 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3488 }
3489}
3490
3491/* Return non-zero if the formals of FUNC "sufficiently match" the
3492 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3493 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3494 argument function. */
14f9c5c9
AS
3495
3496static int
d2e4a39e 3497ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3498{
3499 int i;
d2e4a39e 3500 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3501
1265e4aa
JB
3502 if (SYMBOL_CLASS (func) == LOC_CONST
3503 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3504 return (n_actuals == 0);
3505 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3506 return 0;
3507
3508 if (TYPE_NFIELDS (func_type) != n_actuals)
3509 return 0;
3510
3511 for (i = 0; i < n_actuals; i += 1)
3512 {
4c4b4cd2 3513 if (actuals[i] == NULL)
76a01679
JB
3514 return 0;
3515 else
3516 {
5b4ee69b
MS
3517 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3518 i));
df407dfe 3519 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3520
76a01679
JB
3521 if (!ada_type_match (ftype, atype, 1))
3522 return 0;
3523 }
14f9c5c9
AS
3524 }
3525 return 1;
3526}
3527
3528/* False iff function type FUNC_TYPE definitely does not produce a value
3529 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3530 FUNC_TYPE is not a valid function type with a non-null return type
3531 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3532
3533static int
d2e4a39e 3534return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3535{
d2e4a39e 3536 struct type *return_type;
14f9c5c9
AS
3537
3538 if (func_type == NULL)
3539 return 1;
3540
4c4b4cd2 3541 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3542 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3543 else
18af8284 3544 return_type = get_base_type (func_type);
14f9c5c9
AS
3545 if (return_type == NULL)
3546 return 1;
3547
18af8284 3548 context_type = get_base_type (context_type);
14f9c5c9
AS
3549
3550 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3551 return context_type == NULL || return_type == context_type;
3552 else if (context_type == NULL)
3553 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3554 else
3555 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3556}
3557
3558
4c4b4cd2 3559/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3560 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3561 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3562 that returns that type, then eliminate matches that don't. If
3563 CONTEXT_TYPE is void and there is at least one match that does not
3564 return void, eliminate all matches that do.
3565
14f9c5c9
AS
3566 Asks the user if there is more than one match remaining. Returns -1
3567 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3568 solely for messages. May re-arrange and modify SYMS in
3569 the process; the index returned is for the modified vector. */
14f9c5c9 3570
4c4b4cd2
PH
3571static int
3572ada_resolve_function (struct ada_symbol_info syms[],
3573 int nsyms, struct value **args, int nargs,
3574 const char *name, struct type *context_type)
14f9c5c9 3575{
30b15541 3576 int fallback;
14f9c5c9 3577 int k;
4c4b4cd2 3578 int m; /* Number of hits */
14f9c5c9 3579
d2e4a39e 3580 m = 0;
30b15541
UW
3581 /* In the first pass of the loop, we only accept functions matching
3582 context_type. If none are found, we add a second pass of the loop
3583 where every function is accepted. */
3584 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3585 {
3586 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3587 {
61ee279c 3588 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].sym));
4c4b4cd2
PH
3589
3590 if (ada_args_match (syms[k].sym, args, nargs)
30b15541 3591 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3592 {
3593 syms[m] = syms[k];
3594 m += 1;
3595 }
3596 }
14f9c5c9
AS
3597 }
3598
3599 if (m == 0)
3600 return -1;
3601 else if (m > 1)
3602 {
323e0a4a 3603 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3604 user_select_syms (syms, m, 1);
14f9c5c9
AS
3605 return 0;
3606 }
3607 return 0;
3608}
3609
4c4b4cd2
PH
3610/* Returns true (non-zero) iff decoded name N0 should appear before N1
3611 in a listing of choices during disambiguation (see sort_choices, below).
3612 The idea is that overloadings of a subprogram name from the
3613 same package should sort in their source order. We settle for ordering
3614 such symbols by their trailing number (__N or $N). */
3615
14f9c5c9 3616static int
0d5cff50 3617encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3618{
3619 if (N1 == NULL)
3620 return 0;
3621 else if (N0 == NULL)
3622 return 1;
3623 else
3624 {
3625 int k0, k1;
5b4ee69b 3626
d2e4a39e 3627 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3628 ;
d2e4a39e 3629 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3630 ;
d2e4a39e 3631 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3632 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3633 {
3634 int n0, n1;
5b4ee69b 3635
4c4b4cd2
PH
3636 n0 = k0;
3637 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3638 n0 -= 1;
3639 n1 = k1;
3640 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3641 n1 -= 1;
3642 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3643 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3644 }
14f9c5c9
AS
3645 return (strcmp (N0, N1) < 0);
3646 }
3647}
d2e4a39e 3648
4c4b4cd2
PH
3649/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3650 encoded names. */
3651
d2e4a39e 3652static void
4c4b4cd2 3653sort_choices (struct ada_symbol_info syms[], int nsyms)
14f9c5c9 3654{
4c4b4cd2 3655 int i;
5b4ee69b 3656
d2e4a39e 3657 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3658 {
4c4b4cd2 3659 struct ada_symbol_info sym = syms[i];
14f9c5c9
AS
3660 int j;
3661
d2e4a39e 3662 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2
PH
3663 {
3664 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].sym),
3665 SYMBOL_LINKAGE_NAME (sym.sym)))
3666 break;
3667 syms[j + 1] = syms[j];
3668 }
d2e4a39e 3669 syms[j + 1] = sym;
14f9c5c9
AS
3670 }
3671}
3672
4c4b4cd2
PH
3673/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3674 by asking the user (if necessary), returning the number selected,
3675 and setting the first elements of SYMS items. Error if no symbols
3676 selected. */
14f9c5c9
AS
3677
3678/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3679 to be re-integrated one of these days. */
14f9c5c9
AS
3680
3681int
4c4b4cd2 3682user_select_syms (struct ada_symbol_info *syms, int nsyms, int max_results)
14f9c5c9
AS
3683{
3684 int i;
d2e4a39e 3685 int *chosen = (int *) alloca (sizeof (int) * nsyms);
14f9c5c9
AS
3686 int n_chosen;
3687 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3688 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3689
3690 if (max_results < 1)
323e0a4a 3691 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3692 if (nsyms <= 1)
3693 return nsyms;
3694
717d2f5a
JB
3695 if (select_mode == multiple_symbols_cancel)
3696 error (_("\
3697canceled because the command is ambiguous\n\
3698See set/show multiple-symbol."));
3699
3700 /* If select_mode is "all", then return all possible symbols.
3701 Only do that if more than one symbol can be selected, of course.
3702 Otherwise, display the menu as usual. */
3703 if (select_mode == multiple_symbols_all && max_results > 1)
3704 return nsyms;
3705
323e0a4a 3706 printf_unfiltered (_("[0] cancel\n"));
14f9c5c9 3707 if (max_results > 1)
323e0a4a 3708 printf_unfiltered (_("[1] all\n"));
14f9c5c9 3709
4c4b4cd2 3710 sort_choices (syms, nsyms);
14f9c5c9
AS
3711
3712 for (i = 0; i < nsyms; i += 1)
3713 {
4c4b4cd2
PH
3714 if (syms[i].sym == NULL)
3715 continue;
3716
3717 if (SYMBOL_CLASS (syms[i].sym) == LOC_BLOCK)
3718 {
76a01679
JB
3719 struct symtab_and_line sal =
3720 find_function_start_sal (syms[i].sym, 1);
5b4ee69b 3721
323e0a4a
AC
3722 if (sal.symtab == NULL)
3723 printf_unfiltered (_("[%d] %s at <no source file available>:%d\n"),
3724 i + first_choice,
3725 SYMBOL_PRINT_NAME (syms[i].sym),
3726 sal.line);
3727 else
3728 printf_unfiltered (_("[%d] %s at %s:%d\n"), i + first_choice,
3729 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3730 symtab_to_filename_for_display (sal.symtab),
3731 sal.line);
4c4b4cd2
PH
3732 continue;
3733 }
d2e4a39e 3734 else
4c4b4cd2
PH
3735 {
3736 int is_enumeral =
3737 (SYMBOL_CLASS (syms[i].sym) == LOC_CONST
3738 && SYMBOL_TYPE (syms[i].sym) != NULL
3739 && TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) == TYPE_CODE_ENUM);
1994afbf
DE
3740 struct symtab *symtab = NULL;
3741
3742 if (SYMBOL_OBJFILE_OWNED (syms[i].sym))
3743 symtab = symbol_symtab (syms[i].sym);
4c4b4cd2
PH
3744
3745 if (SYMBOL_LINE (syms[i].sym) != 0 && symtab != NULL)
323e0a4a 3746 printf_unfiltered (_("[%d] %s at %s:%d\n"),
4c4b4cd2
PH
3747 i + first_choice,
3748 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3749 symtab_to_filename_for_display (symtab),
3750 SYMBOL_LINE (syms[i].sym));
76a01679
JB
3751 else if (is_enumeral
3752 && TYPE_NAME (SYMBOL_TYPE (syms[i].sym)) != NULL)
4c4b4cd2 3753 {
a3f17187 3754 printf_unfiltered (("[%d] "), i + first_choice);
76a01679 3755 ada_print_type (SYMBOL_TYPE (syms[i].sym), NULL,
79d43c61 3756 gdb_stdout, -1, 0, &type_print_raw_options);
323e0a4a 3757 printf_unfiltered (_("'(%s) (enumeral)\n"),
4c4b4cd2
PH
3758 SYMBOL_PRINT_NAME (syms[i].sym));
3759 }
3760 else if (symtab != NULL)
3761 printf_unfiltered (is_enumeral
323e0a4a
AC
3762 ? _("[%d] %s in %s (enumeral)\n")
3763 : _("[%d] %s at %s:?\n"),
4c4b4cd2
PH
3764 i + first_choice,
3765 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821 3766 symtab_to_filename_for_display (symtab));
4c4b4cd2
PH
3767 else
3768 printf_unfiltered (is_enumeral
323e0a4a
AC
3769 ? _("[%d] %s (enumeral)\n")
3770 : _("[%d] %s at ?\n"),
4c4b4cd2
PH
3771 i + first_choice,
3772 SYMBOL_PRINT_NAME (syms[i].sym));
3773 }
14f9c5c9 3774 }
d2e4a39e 3775
14f9c5c9 3776 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3777 "overload-choice");
14f9c5c9
AS
3778
3779 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3780 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3781
3782 return n_chosen;
3783}
3784
3785/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3786 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3787 order in CHOICES[0 .. N-1], and return N.
3788
3789 The user types choices as a sequence of numbers on one line
3790 separated by blanks, encoding them as follows:
3791
4c4b4cd2 3792 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3793 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3794 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3795
4c4b4cd2 3796 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3797
3798 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3799 prompts (for use with the -f switch). */
14f9c5c9
AS
3800
3801int
d2e4a39e 3802get_selections (int *choices, int n_choices, int max_results,
4c4b4cd2 3803 int is_all_choice, char *annotation_suffix)
14f9c5c9 3804{
d2e4a39e 3805 char *args;
0bcd0149 3806 char *prompt;
14f9c5c9
AS
3807 int n_chosen;
3808 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3809
14f9c5c9
AS
3810 prompt = getenv ("PS2");
3811 if (prompt == NULL)
0bcd0149 3812 prompt = "> ";
14f9c5c9 3813
0bcd0149 3814 args = command_line_input (prompt, 0, annotation_suffix);
d2e4a39e 3815
14f9c5c9 3816 if (args == NULL)
323e0a4a 3817 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3818
3819 n_chosen = 0;
76a01679 3820
4c4b4cd2
PH
3821 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3822 order, as given in args. Choices are validated. */
14f9c5c9
AS
3823 while (1)
3824 {
d2e4a39e 3825 char *args2;
14f9c5c9
AS
3826 int choice, j;
3827
0fcd72ba 3828 args = skip_spaces (args);
14f9c5c9 3829 if (*args == '\0' && n_chosen == 0)
323e0a4a 3830 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3831 else if (*args == '\0')
4c4b4cd2 3832 break;
14f9c5c9
AS
3833
3834 choice = strtol (args, &args2, 10);
d2e4a39e 3835 if (args == args2 || choice < 0
4c4b4cd2 3836 || choice > n_choices + first_choice - 1)
323e0a4a 3837 error (_("Argument must be choice number"));
14f9c5c9
AS
3838 args = args2;
3839
d2e4a39e 3840 if (choice == 0)
323e0a4a 3841 error (_("cancelled"));
14f9c5c9
AS
3842
3843 if (choice < first_choice)
4c4b4cd2
PH
3844 {
3845 n_chosen = n_choices;
3846 for (j = 0; j < n_choices; j += 1)
3847 choices[j] = j;
3848 break;
3849 }
14f9c5c9
AS
3850 choice -= first_choice;
3851
d2e4a39e 3852 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
3853 {
3854 }
14f9c5c9
AS
3855
3856 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
3857 {
3858 int k;
5b4ee69b 3859
4c4b4cd2
PH
3860 for (k = n_chosen - 1; k > j; k -= 1)
3861 choices[k + 1] = choices[k];
3862 choices[j + 1] = choice;
3863 n_chosen += 1;
3864 }
14f9c5c9
AS
3865 }
3866
3867 if (n_chosen > max_results)
323e0a4a 3868 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 3869
14f9c5c9
AS
3870 return n_chosen;
3871}
3872
4c4b4cd2
PH
3873/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3874 on the function identified by SYM and BLOCK, and taking NARGS
3875 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3876
3877static void
d2e4a39e 3878replace_operator_with_call (struct expression **expp, int pc, int nargs,
4c4b4cd2 3879 int oplen, struct symbol *sym,
270140bd 3880 const struct block *block)
14f9c5c9
AS
3881{
3882 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 3883 symbol, -oplen for operator being replaced). */
d2e4a39e 3884 struct expression *newexp = (struct expression *)
8c1a34e7 3885 xzalloc (sizeof (struct expression)
4c4b4cd2 3886 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
d2e4a39e 3887 struct expression *exp = *expp;
14f9c5c9
AS
3888
3889 newexp->nelts = exp->nelts + 7 - oplen;
3890 newexp->language_defn = exp->language_defn;
3489610d 3891 newexp->gdbarch = exp->gdbarch;
14f9c5c9 3892 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 3893 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 3894 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
3895
3896 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
3897 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
3898
3899 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
3900 newexp->elts[pc + 4].block = block;
3901 newexp->elts[pc + 5].symbol = sym;
3902
3903 *expp = newexp;
aacb1f0a 3904 xfree (exp);
d2e4a39e 3905}
14f9c5c9
AS
3906
3907/* Type-class predicates */
3908
4c4b4cd2
PH
3909/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
3910 or FLOAT). */
14f9c5c9
AS
3911
3912static int
d2e4a39e 3913numeric_type_p (struct type *type)
14f9c5c9
AS
3914{
3915 if (type == NULL)
3916 return 0;
d2e4a39e
AS
3917 else
3918 {
3919 switch (TYPE_CODE (type))
4c4b4cd2
PH
3920 {
3921 case TYPE_CODE_INT:
3922 case TYPE_CODE_FLT:
3923 return 1;
3924 case TYPE_CODE_RANGE:
3925 return (type == TYPE_TARGET_TYPE (type)
3926 || numeric_type_p (TYPE_TARGET_TYPE (type)));
3927 default:
3928 return 0;
3929 }
d2e4a39e 3930 }
14f9c5c9
AS
3931}
3932
4c4b4cd2 3933/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
3934
3935static int
d2e4a39e 3936integer_type_p (struct type *type)
14f9c5c9
AS
3937{
3938 if (type == NULL)
3939 return 0;
d2e4a39e
AS
3940 else
3941 {
3942 switch (TYPE_CODE (type))
4c4b4cd2
PH
3943 {
3944 case TYPE_CODE_INT:
3945 return 1;
3946 case TYPE_CODE_RANGE:
3947 return (type == TYPE_TARGET_TYPE (type)
3948 || integer_type_p (TYPE_TARGET_TYPE (type)));
3949 default:
3950 return 0;
3951 }
d2e4a39e 3952 }
14f9c5c9
AS
3953}
3954
4c4b4cd2 3955/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
3956
3957static int
d2e4a39e 3958scalar_type_p (struct type *type)
14f9c5c9
AS
3959{
3960 if (type == NULL)
3961 return 0;
d2e4a39e
AS
3962 else
3963 {
3964 switch (TYPE_CODE (type))
4c4b4cd2
PH
3965 {
3966 case TYPE_CODE_INT:
3967 case TYPE_CODE_RANGE:
3968 case TYPE_CODE_ENUM:
3969 case TYPE_CODE_FLT:
3970 return 1;
3971 default:
3972 return 0;
3973 }
d2e4a39e 3974 }
14f9c5c9
AS
3975}
3976
4c4b4cd2 3977/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
3978
3979static int
d2e4a39e 3980discrete_type_p (struct type *type)
14f9c5c9
AS
3981{
3982 if (type == NULL)
3983 return 0;
d2e4a39e
AS
3984 else
3985 {
3986 switch (TYPE_CODE (type))
4c4b4cd2
PH
3987 {
3988 case TYPE_CODE_INT:
3989 case TYPE_CODE_RANGE:
3990 case TYPE_CODE_ENUM:
872f0337 3991 case TYPE_CODE_BOOL:
4c4b4cd2
PH
3992 return 1;
3993 default:
3994 return 0;
3995 }
d2e4a39e 3996 }
14f9c5c9
AS
3997}
3998
4c4b4cd2
PH
3999/* Returns non-zero if OP with operands in the vector ARGS could be
4000 a user-defined function. Errs on the side of pre-defined operators
4001 (i.e., result 0). */
14f9c5c9
AS
4002
4003static int
d2e4a39e 4004possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4005{
76a01679 4006 struct type *type0 =
df407dfe 4007 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4008 struct type *type1 =
df407dfe 4009 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4010
4c4b4cd2
PH
4011 if (type0 == NULL)
4012 return 0;
4013
14f9c5c9
AS
4014 switch (op)
4015 {
4016 default:
4017 return 0;
4018
4019 case BINOP_ADD:
4020 case BINOP_SUB:
4021 case BINOP_MUL:
4022 case BINOP_DIV:
d2e4a39e 4023 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4024
4025 case BINOP_REM:
4026 case BINOP_MOD:
4027 case BINOP_BITWISE_AND:
4028 case BINOP_BITWISE_IOR:
4029 case BINOP_BITWISE_XOR:
d2e4a39e 4030 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4031
4032 case BINOP_EQUAL:
4033 case BINOP_NOTEQUAL:
4034 case BINOP_LESS:
4035 case BINOP_GTR:
4036 case BINOP_LEQ:
4037 case BINOP_GEQ:
d2e4a39e 4038 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4039
4040 case BINOP_CONCAT:
ee90b9ab 4041 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4042
4043 case BINOP_EXP:
d2e4a39e 4044 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4045
4046 case UNOP_NEG:
4047 case UNOP_PLUS:
4048 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4049 case UNOP_ABS:
4050 return (!numeric_type_p (type0));
14f9c5c9
AS
4051
4052 }
4053}
4054\f
4c4b4cd2 4055 /* Renaming */
14f9c5c9 4056
aeb5907d
JB
4057/* NOTES:
4058
4059 1. In the following, we assume that a renaming type's name may
4060 have an ___XD suffix. It would be nice if this went away at some
4061 point.
4062 2. We handle both the (old) purely type-based representation of
4063 renamings and the (new) variable-based encoding. At some point,
4064 it is devoutly to be hoped that the former goes away
4065 (FIXME: hilfinger-2007-07-09).
4066 3. Subprogram renamings are not implemented, although the XRS
4067 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4068
4069/* If SYM encodes a renaming,
4070
4071 <renaming> renames <renamed entity>,
4072
4073 sets *LEN to the length of the renamed entity's name,
4074 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4075 the string describing the subcomponent selected from the renamed
0963b4bd 4076 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4077 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4078 are undefined). Otherwise, returns a value indicating the category
4079 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4080 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4081 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4082 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4083 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4084 may be NULL, in which case they are not assigned.
4085
4086 [Currently, however, GCC does not generate subprogram renamings.] */
4087
4088enum ada_renaming_category
4089ada_parse_renaming (struct symbol *sym,
4090 const char **renamed_entity, int *len,
4091 const char **renaming_expr)
4092{
4093 enum ada_renaming_category kind;
4094 const char *info;
4095 const char *suffix;
4096
4097 if (sym == NULL)
4098 return ADA_NOT_RENAMING;
4099 switch (SYMBOL_CLASS (sym))
14f9c5c9 4100 {
aeb5907d
JB
4101 default:
4102 return ADA_NOT_RENAMING;
4103 case LOC_TYPEDEF:
4104 return parse_old_style_renaming (SYMBOL_TYPE (sym),
4105 renamed_entity, len, renaming_expr);
4106 case LOC_LOCAL:
4107 case LOC_STATIC:
4108 case LOC_COMPUTED:
4109 case LOC_OPTIMIZED_OUT:
4110 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4111 if (info == NULL)
4112 return ADA_NOT_RENAMING;
4113 switch (info[5])
4114 {
4115 case '_':
4116 kind = ADA_OBJECT_RENAMING;
4117 info += 6;
4118 break;
4119 case 'E':
4120 kind = ADA_EXCEPTION_RENAMING;
4121 info += 7;
4122 break;
4123 case 'P':
4124 kind = ADA_PACKAGE_RENAMING;
4125 info += 7;
4126 break;
4127 case 'S':
4128 kind = ADA_SUBPROGRAM_RENAMING;
4129 info += 7;
4130 break;
4131 default:
4132 return ADA_NOT_RENAMING;
4133 }
14f9c5c9 4134 }
4c4b4cd2 4135
aeb5907d
JB
4136 if (renamed_entity != NULL)
4137 *renamed_entity = info;
4138 suffix = strstr (info, "___XE");
4139 if (suffix == NULL || suffix == info)
4140 return ADA_NOT_RENAMING;
4141 if (len != NULL)
4142 *len = strlen (info) - strlen (suffix);
4143 suffix += 5;
4144 if (renaming_expr != NULL)
4145 *renaming_expr = suffix;
4146 return kind;
4147}
4148
4149/* Assuming TYPE encodes a renaming according to the old encoding in
4150 exp_dbug.ads, returns details of that renaming in *RENAMED_ENTITY,
4151 *LEN, and *RENAMING_EXPR, as for ada_parse_renaming, above. Returns
4152 ADA_NOT_RENAMING otherwise. */
4153static enum ada_renaming_category
4154parse_old_style_renaming (struct type *type,
4155 const char **renamed_entity, int *len,
4156 const char **renaming_expr)
4157{
4158 enum ada_renaming_category kind;
4159 const char *name;
4160 const char *info;
4161 const char *suffix;
14f9c5c9 4162
aeb5907d
JB
4163 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
4164 || TYPE_NFIELDS (type) != 1)
4165 return ADA_NOT_RENAMING;
14f9c5c9 4166
aeb5907d
JB
4167 name = type_name_no_tag (type);
4168 if (name == NULL)
4169 return ADA_NOT_RENAMING;
4170
4171 name = strstr (name, "___XR");
4172 if (name == NULL)
4173 return ADA_NOT_RENAMING;
4174 switch (name[5])
4175 {
4176 case '\0':
4177 case '_':
4178 kind = ADA_OBJECT_RENAMING;
4179 break;
4180 case 'E':
4181 kind = ADA_EXCEPTION_RENAMING;
4182 break;
4183 case 'P':
4184 kind = ADA_PACKAGE_RENAMING;
4185 break;
4186 case 'S':
4187 kind = ADA_SUBPROGRAM_RENAMING;
4188 break;
4189 default:
4190 return ADA_NOT_RENAMING;
4191 }
14f9c5c9 4192
aeb5907d
JB
4193 info = TYPE_FIELD_NAME (type, 0);
4194 if (info == NULL)
4195 return ADA_NOT_RENAMING;
4196 if (renamed_entity != NULL)
4197 *renamed_entity = info;
4198 suffix = strstr (info, "___XE");
4199 if (renaming_expr != NULL)
4200 *renaming_expr = suffix + 5;
4201 if (suffix == NULL || suffix == info)
4202 return ADA_NOT_RENAMING;
4203 if (len != NULL)
4204 *len = suffix - info;
4205 return kind;
a5ee536b
JB
4206}
4207
4208/* Compute the value of the given RENAMING_SYM, which is expected to
4209 be a symbol encoding a renaming expression. BLOCK is the block
4210 used to evaluate the renaming. */
52ce6436 4211
a5ee536b
JB
4212static struct value *
4213ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4214 const struct block *block)
a5ee536b 4215{
bbc13ae3 4216 const char *sym_name;
a5ee536b
JB
4217 struct expression *expr;
4218 struct value *value;
4219 struct cleanup *old_chain = NULL;
4220
bbc13ae3 4221 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
1bb9788d 4222 expr = parse_exp_1 (&sym_name, 0, block, 0);
bbc13ae3 4223 old_chain = make_cleanup (free_current_contents, &expr);
a5ee536b
JB
4224 value = evaluate_expression (expr);
4225
4226 do_cleanups (old_chain);
4227 return value;
4228}
14f9c5c9 4229\f
d2e4a39e 4230
4c4b4cd2 4231 /* Evaluation: Function Calls */
14f9c5c9 4232
4c4b4cd2 4233/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4234 lvalues, and otherwise has the side-effect of allocating memory
4235 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4236
d2e4a39e 4237static struct value *
40bc484c 4238ensure_lval (struct value *val)
14f9c5c9 4239{
40bc484c
JB
4240 if (VALUE_LVAL (val) == not_lval
4241 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4242 {
df407dfe 4243 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4244 const CORE_ADDR addr =
4245 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4246
40bc484c 4247 set_value_address (val, addr);
a84a8a0d 4248 VALUE_LVAL (val) = lval_memory;
40bc484c 4249 write_memory (addr, value_contents (val), len);
c3e5cd34 4250 }
14f9c5c9
AS
4251
4252 return val;
4253}
4254
4255/* Return the value ACTUAL, converted to be an appropriate value for a
4256 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4257 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4258 values not residing in memory, updating it as needed. */
14f9c5c9 4259
a93c0eb6 4260struct value *
40bc484c 4261ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4262{
df407dfe 4263 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4264 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4265 struct type *formal_target =
4266 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4267 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4268 struct type *actual_target =
4269 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4270 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4271
4c4b4cd2 4272 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4273 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4274 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4275 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4276 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4277 {
a84a8a0d 4278 struct value *result;
5b4ee69b 4279
14f9c5c9 4280 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4281 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4282 result = desc_data (actual);
14f9c5c9 4283 else if (TYPE_CODE (actual_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4284 {
4285 if (VALUE_LVAL (actual) != lval_memory)
4286 {
4287 struct value *val;
5b4ee69b 4288
df407dfe 4289 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4290 val = allocate_value (actual_type);
990a07ab 4291 memcpy ((char *) value_contents_raw (val),
0fd88904 4292 (char *) value_contents (actual),
4c4b4cd2 4293 TYPE_LENGTH (actual_type));
40bc484c 4294 actual = ensure_lval (val);
4c4b4cd2 4295 }
a84a8a0d 4296 result = value_addr (actual);
4c4b4cd2 4297 }
a84a8a0d
JB
4298 else
4299 return actual;
b1af9e97 4300 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4301 }
4302 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4303 return ada_value_ind (actual);
4304
4305 return actual;
4306}
4307
438c98a1
JB
4308/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4309 type TYPE. This is usually an inefficient no-op except on some targets
4310 (such as AVR) where the representation of a pointer and an address
4311 differs. */
4312
4313static CORE_ADDR
4314value_pointer (struct value *value, struct type *type)
4315{
4316 struct gdbarch *gdbarch = get_type_arch (type);
4317 unsigned len = TYPE_LENGTH (type);
4318 gdb_byte *buf = alloca (len);
4319 CORE_ADDR addr;
4320
4321 addr = value_address (value);
4322 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4323 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4324 return addr;
4325}
4326
14f9c5c9 4327
4c4b4cd2
PH
4328/* Push a descriptor of type TYPE for array value ARR on the stack at
4329 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4330 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4331 to-descriptor type rather than a descriptor type), a struct value *
4332 representing a pointer to this descriptor. */
14f9c5c9 4333
d2e4a39e 4334static struct value *
40bc484c 4335make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4336{
d2e4a39e
AS
4337 struct type *bounds_type = desc_bounds_type (type);
4338 struct type *desc_type = desc_base_type (type);
4339 struct value *descriptor = allocate_value (desc_type);
4340 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4341 int i;
d2e4a39e 4342
0963b4bd
MS
4343 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4344 i > 0; i -= 1)
14f9c5c9 4345 {
19f220c3
JK
4346 modify_field (value_type (bounds), value_contents_writeable (bounds),
4347 ada_array_bound (arr, i, 0),
4348 desc_bound_bitpos (bounds_type, i, 0),
4349 desc_bound_bitsize (bounds_type, i, 0));
4350 modify_field (value_type (bounds), value_contents_writeable (bounds),
4351 ada_array_bound (arr, i, 1),
4352 desc_bound_bitpos (bounds_type, i, 1),
4353 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4354 }
d2e4a39e 4355
40bc484c 4356 bounds = ensure_lval (bounds);
d2e4a39e 4357
19f220c3
JK
4358 modify_field (value_type (descriptor),
4359 value_contents_writeable (descriptor),
4360 value_pointer (ensure_lval (arr),
4361 TYPE_FIELD_TYPE (desc_type, 0)),
4362 fat_pntr_data_bitpos (desc_type),
4363 fat_pntr_data_bitsize (desc_type));
4364
4365 modify_field (value_type (descriptor),
4366 value_contents_writeable (descriptor),
4367 value_pointer (bounds,
4368 TYPE_FIELD_TYPE (desc_type, 1)),
4369 fat_pntr_bounds_bitpos (desc_type),
4370 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4371
40bc484c 4372 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4373
4374 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4375 return value_addr (descriptor);
4376 else
4377 return descriptor;
4378}
14f9c5c9 4379\f
3d9434b5
JB
4380 /* Symbol Cache Module */
4381
3d9434b5 4382/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4383 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4384 on the type of entity being printed, the cache can make it as much
4385 as an order of magnitude faster than without it.
4386
4387 The descriptive type DWARF extension has significantly reduced
4388 the need for this cache, at least when DWARF is being used. However,
4389 even in this case, some expensive name-based symbol searches are still
4390 sometimes necessary - to find an XVZ variable, mostly. */
4391
ee01b665 4392/* Initialize the contents of SYM_CACHE. */
3d9434b5 4393
ee01b665
JB
4394static void
4395ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4396{
4397 obstack_init (&sym_cache->cache_space);
4398 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4399}
3d9434b5 4400
ee01b665
JB
4401/* Free the memory used by SYM_CACHE. */
4402
4403static void
4404ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4405{
ee01b665
JB
4406 obstack_free (&sym_cache->cache_space, NULL);
4407 xfree (sym_cache);
4408}
3d9434b5 4409
ee01b665
JB
4410/* Return the symbol cache associated to the given program space PSPACE.
4411 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4412
ee01b665
JB
4413static struct ada_symbol_cache *
4414ada_get_symbol_cache (struct program_space *pspace)
4415{
4416 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4417
66c168ae 4418 if (pspace_data->sym_cache == NULL)
ee01b665 4419 {
66c168ae
JB
4420 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4421 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4422 }
4423
66c168ae 4424 return pspace_data->sym_cache;
ee01b665 4425}
3d9434b5
JB
4426
4427/* Clear all entries from the symbol cache. */
4428
4429static void
4430ada_clear_symbol_cache (void)
4431{
ee01b665
JB
4432 struct ada_symbol_cache *sym_cache
4433 = ada_get_symbol_cache (current_program_space);
4434
4435 obstack_free (&sym_cache->cache_space, NULL);
4436 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4437}
4438
fe978cb0 4439/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4440 Return it if found, or NULL otherwise. */
4441
4442static struct cache_entry **
fe978cb0 4443find_entry (const char *name, domain_enum domain)
3d9434b5 4444{
ee01b665
JB
4445 struct ada_symbol_cache *sym_cache
4446 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4447 int h = msymbol_hash (name) % HASH_SIZE;
4448 struct cache_entry **e;
4449
ee01b665 4450 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4451 {
fe978cb0 4452 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4453 return e;
4454 }
4455 return NULL;
4456}
4457
fe978cb0 4458/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4459 Return 1 if found, 0 otherwise.
4460
4461 If an entry was found and SYM is not NULL, set *SYM to the entry's
4462 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4463
96d887e8 4464static int
fe978cb0 4465lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4466 struct symbol **sym, const struct block **block)
96d887e8 4467{
fe978cb0 4468 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4469
4470 if (e == NULL)
4471 return 0;
4472 if (sym != NULL)
4473 *sym = (*e)->sym;
4474 if (block != NULL)
4475 *block = (*e)->block;
4476 return 1;
96d887e8
PH
4477}
4478
3d9434b5 4479/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4480 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4481
96d887e8 4482static void
fe978cb0 4483cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4484 const struct block *block)
96d887e8 4485{
ee01b665
JB
4486 struct ada_symbol_cache *sym_cache
4487 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4488 int h;
4489 char *copy;
4490 struct cache_entry *e;
4491
1994afbf
DE
4492 /* Symbols for builtin types don't have a block.
4493 For now don't cache such symbols. */
4494 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4495 return;
4496
3d9434b5
JB
4497 /* If the symbol is a local symbol, then do not cache it, as a search
4498 for that symbol depends on the context. To determine whether
4499 the symbol is local or not, we check the block where we found it
4500 against the global and static blocks of its associated symtab. */
4501 if (sym
08be3fe3 4502 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4503 GLOBAL_BLOCK) != block
08be3fe3 4504 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4505 STATIC_BLOCK) != block)
3d9434b5
JB
4506 return;
4507
4508 h = msymbol_hash (name) % HASH_SIZE;
ee01b665
JB
4509 e = (struct cache_entry *) obstack_alloc (&sym_cache->cache_space,
4510 sizeof (*e));
4511 e->next = sym_cache->root[h];
4512 sym_cache->root[h] = e;
4513 e->name = copy = obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4514 strcpy (copy, name);
4515 e->sym = sym;
fe978cb0 4516 e->domain = domain;
3d9434b5 4517 e->block = block;
96d887e8 4518}
4c4b4cd2
PH
4519\f
4520 /* Symbol Lookup */
4521
c0431670
JB
4522/* Return nonzero if wild matching should be used when searching for
4523 all symbols matching LOOKUP_NAME.
4524
4525 LOOKUP_NAME is expected to be a symbol name after transformation
4526 for Ada lookups (see ada_name_for_lookup). */
4527
4528static int
4529should_use_wild_match (const char *lookup_name)
4530{
4531 return (strstr (lookup_name, "__") == NULL);
4532}
4533
4c4b4cd2
PH
4534/* Return the result of a standard (literal, C-like) lookup of NAME in
4535 given DOMAIN, visible from lexical block BLOCK. */
4536
4537static struct symbol *
4538standard_lookup (const char *name, const struct block *block,
4539 domain_enum domain)
4540{
acbd605d
MGD
4541 /* Initialize it just to avoid a GCC false warning. */
4542 struct symbol *sym = NULL;
4c4b4cd2 4543
2570f2b7 4544 if (lookup_cached_symbol (name, domain, &sym, NULL))
4c4b4cd2 4545 return sym;
2570f2b7
UW
4546 sym = lookup_symbol_in_language (name, block, domain, language_c, 0);
4547 cache_symbol (name, domain, sym, block_found);
4c4b4cd2
PH
4548 return sym;
4549}
4550
4551
4552/* Non-zero iff there is at least one non-function/non-enumeral symbol
4553 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4554 since they contend in overloading in the same way. */
4555static int
4556is_nonfunction (struct ada_symbol_info syms[], int n)
4557{
4558 int i;
4559
4560 for (i = 0; i < n; i += 1)
4561 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_FUNC
4562 && (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM
4563 || SYMBOL_CLASS (syms[i].sym) != LOC_CONST))
14f9c5c9
AS
4564 return 1;
4565
4566 return 0;
4567}
4568
4569/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4570 struct types. Otherwise, they may not. */
14f9c5c9
AS
4571
4572static int
d2e4a39e 4573equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4574{
d2e4a39e 4575 if (type0 == type1)
14f9c5c9 4576 return 1;
d2e4a39e 4577 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4578 || TYPE_CODE (type0) != TYPE_CODE (type1))
4579 return 0;
d2e4a39e 4580 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4581 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4582 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4583 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4584 return 1;
d2e4a39e 4585
14f9c5c9
AS
4586 return 0;
4587}
4588
4589/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4590 no more defined than that of SYM1. */
14f9c5c9
AS
4591
4592static int
d2e4a39e 4593lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4594{
4595 if (sym0 == sym1)
4596 return 1;
176620f1 4597 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4598 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4599 return 0;
4600
d2e4a39e 4601 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4602 {
4603 case LOC_UNDEF:
4604 return 1;
4605 case LOC_TYPEDEF:
4606 {
4c4b4cd2
PH
4607 struct type *type0 = SYMBOL_TYPE (sym0);
4608 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4609 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4610 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4611 int len0 = strlen (name0);
5b4ee69b 4612
4c4b4cd2
PH
4613 return
4614 TYPE_CODE (type0) == TYPE_CODE (type1)
4615 && (equiv_types (type0, type1)
4616 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4617 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4618 }
4619 case LOC_CONST:
4620 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4621 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4622 default:
4623 return 0;
14f9c5c9
AS
4624 }
4625}
4626
4c4b4cd2
PH
4627/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct ada_symbol_info
4628 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4629
4630static void
76a01679
JB
4631add_defn_to_vec (struct obstack *obstackp,
4632 struct symbol *sym,
f0c5f9b2 4633 const struct block *block)
14f9c5c9
AS
4634{
4635 int i;
4c4b4cd2 4636 struct ada_symbol_info *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4637
529cad9c
PH
4638 /* Do not try to complete stub types, as the debugger is probably
4639 already scanning all symbols matching a certain name at the
4640 time when this function is called. Trying to replace the stub
4641 type by its associated full type will cause us to restart a scan
4642 which may lead to an infinite recursion. Instead, the client
4643 collecting the matching symbols will end up collecting several
4644 matches, with at least one of them complete. It can then filter
4645 out the stub ones if needed. */
4646
4c4b4cd2
PH
4647 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4648 {
4649 if (lesseq_defined_than (sym, prevDefns[i].sym))
4650 return;
4651 else if (lesseq_defined_than (prevDefns[i].sym, sym))
4652 {
4653 prevDefns[i].sym = sym;
4654 prevDefns[i].block = block;
4c4b4cd2 4655 return;
76a01679 4656 }
4c4b4cd2
PH
4657 }
4658
4659 {
4660 struct ada_symbol_info info;
4661
4662 info.sym = sym;
4663 info.block = block;
4c4b4cd2
PH
4664 obstack_grow (obstackp, &info, sizeof (struct ada_symbol_info));
4665 }
4666}
4667
4668/* Number of ada_symbol_info structures currently collected in
4669 current vector in *OBSTACKP. */
4670
76a01679
JB
4671static int
4672num_defns_collected (struct obstack *obstackp)
4c4b4cd2
PH
4673{
4674 return obstack_object_size (obstackp) / sizeof (struct ada_symbol_info);
4675}
4676
4677/* Vector of ada_symbol_info structures currently collected in current
4678 vector in *OBSTACKP. If FINISH, close off the vector and return
4679 its final address. */
4680
76a01679 4681static struct ada_symbol_info *
4c4b4cd2
PH
4682defns_collected (struct obstack *obstackp, int finish)
4683{
4684 if (finish)
4685 return obstack_finish (obstackp);
4686 else
4687 return (struct ada_symbol_info *) obstack_base (obstackp);
4688}
4689
7c7b6655
TT
4690/* Return a bound minimal symbol matching NAME according to Ada
4691 decoding rules. Returns an invalid symbol if there is no such
4692 minimal symbol. Names prefixed with "standard__" are handled
4693 specially: "standard__" is first stripped off, and only static and
4694 global symbols are searched. */
4c4b4cd2 4695
7c7b6655 4696struct bound_minimal_symbol
96d887e8 4697ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4698{
7c7b6655 4699 struct bound_minimal_symbol result;
4c4b4cd2 4700 struct objfile *objfile;
96d887e8 4701 struct minimal_symbol *msymbol;
dc4024cd 4702 const int wild_match_p = should_use_wild_match (name);
4c4b4cd2 4703
7c7b6655
TT
4704 memset (&result, 0, sizeof (result));
4705
c0431670
JB
4706 /* Special case: If the user specifies a symbol name inside package
4707 Standard, do a non-wild matching of the symbol name without
4708 the "standard__" prefix. This was primarily introduced in order
4709 to allow the user to specifically access the standard exceptions
4710 using, for instance, Standard.Constraint_Error when Constraint_Error
4711 is ambiguous (due to the user defining its own Constraint_Error
4712 entity inside its program). */
61012eef 4713 if (startswith (name, "standard__"))
c0431670 4714 name += sizeof ("standard__") - 1;
4c4b4cd2 4715
96d887e8
PH
4716 ALL_MSYMBOLS (objfile, msymbol)
4717 {
efd66ac6 4718 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), name, wild_match_p)
96d887e8 4719 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
7c7b6655
TT
4720 {
4721 result.minsym = msymbol;
4722 result.objfile = objfile;
4723 break;
4724 }
96d887e8 4725 }
4c4b4cd2 4726
7c7b6655 4727 return result;
96d887e8 4728}
4c4b4cd2 4729
96d887e8
PH
4730/* For all subprograms that statically enclose the subprogram of the
4731 selected frame, add symbols matching identifier NAME in DOMAIN
4732 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4733 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4734 with a wildcard prefix. */
4c4b4cd2 4735
96d887e8
PH
4736static void
4737add_symbols_from_enclosing_procs (struct obstack *obstackp,
fe978cb0 4738 const char *name, domain_enum domain,
48b78332 4739 int wild_match_p)
96d887e8 4740{
96d887e8 4741}
14f9c5c9 4742
96d887e8
PH
4743/* True if TYPE is definitely an artificial type supplied to a symbol
4744 for which no debugging information was given in the symbol file. */
14f9c5c9 4745
96d887e8
PH
4746static int
4747is_nondebugging_type (struct type *type)
4748{
0d5cff50 4749 const char *name = ada_type_name (type);
5b4ee69b 4750
96d887e8
PH
4751 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4752}
4c4b4cd2 4753
8f17729f
JB
4754/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4755 that are deemed "identical" for practical purposes.
4756
4757 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4758 types and that their number of enumerals is identical (in other
4759 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4760
4761static int
4762ada_identical_enum_types_p (struct type *type1, struct type *type2)
4763{
4764 int i;
4765
4766 /* The heuristic we use here is fairly conservative. We consider
4767 that 2 enumerate types are identical if they have the same
4768 number of enumerals and that all enumerals have the same
4769 underlying value and name. */
4770
4771 /* All enums in the type should have an identical underlying value. */
4772 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4773 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4774 return 0;
4775
4776 /* All enumerals should also have the same name (modulo any numerical
4777 suffix). */
4778 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4779 {
0d5cff50
DE
4780 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4781 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4782 int len_1 = strlen (name_1);
4783 int len_2 = strlen (name_2);
4784
4785 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4786 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4787 if (len_1 != len_2
4788 || strncmp (TYPE_FIELD_NAME (type1, i),
4789 TYPE_FIELD_NAME (type2, i),
4790 len_1) != 0)
4791 return 0;
4792 }
4793
4794 return 1;
4795}
4796
4797/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4798 that are deemed "identical" for practical purposes. Sometimes,
4799 enumerals are not strictly identical, but their types are so similar
4800 that they can be considered identical.
4801
4802 For instance, consider the following code:
4803
4804 type Color is (Black, Red, Green, Blue, White);
4805 type RGB_Color is new Color range Red .. Blue;
4806
4807 Type RGB_Color is a subrange of an implicit type which is a copy
4808 of type Color. If we call that implicit type RGB_ColorB ("B" is
4809 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4810 As a result, when an expression references any of the enumeral
4811 by name (Eg. "print green"), the expression is technically
4812 ambiguous and the user should be asked to disambiguate. But
4813 doing so would only hinder the user, since it wouldn't matter
4814 what choice he makes, the outcome would always be the same.
4815 So, for practical purposes, we consider them as the same. */
4816
4817static int
4818symbols_are_identical_enums (struct ada_symbol_info *syms, int nsyms)
4819{
4820 int i;
4821
4822 /* Before performing a thorough comparison check of each type,
4823 we perform a series of inexpensive checks. We expect that these
4824 checks will quickly fail in the vast majority of cases, and thus
4825 help prevent the unnecessary use of a more expensive comparison.
4826 Said comparison also expects us to make some of these checks
4827 (see ada_identical_enum_types_p). */
4828
4829 /* Quick check: All symbols should have an enum type. */
4830 for (i = 0; i < nsyms; i++)
4831 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM)
4832 return 0;
4833
4834 /* Quick check: They should all have the same value. */
4835 for (i = 1; i < nsyms; i++)
4836 if (SYMBOL_VALUE (syms[i].sym) != SYMBOL_VALUE (syms[0].sym))
4837 return 0;
4838
4839 /* Quick check: They should all have the same number of enumerals. */
4840 for (i = 1; i < nsyms; i++)
4841 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].sym))
4842 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].sym)))
4843 return 0;
4844
4845 /* All the sanity checks passed, so we might have a set of
4846 identical enumeration types. Perform a more complete
4847 comparison of the type of each symbol. */
4848 for (i = 1; i < nsyms; i++)
4849 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].sym),
4850 SYMBOL_TYPE (syms[0].sym)))
4851 return 0;
4852
4853 return 1;
4854}
4855
96d887e8
PH
4856/* Remove any non-debugging symbols in SYMS[0 .. NSYMS-1] that definitely
4857 duplicate other symbols in the list (The only case I know of where
4858 this happens is when object files containing stabs-in-ecoff are
4859 linked with files containing ordinary ecoff debugging symbols (or no
4860 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
4861 Returns the number of items in the modified list. */
4c4b4cd2 4862
96d887e8
PH
4863static int
4864remove_extra_symbols (struct ada_symbol_info *syms, int nsyms)
4865{
4866 int i, j;
4c4b4cd2 4867
8f17729f
JB
4868 /* We should never be called with less than 2 symbols, as there
4869 cannot be any extra symbol in that case. But it's easy to
4870 handle, since we have nothing to do in that case. */
4871 if (nsyms < 2)
4872 return nsyms;
4873
96d887e8
PH
4874 i = 0;
4875 while (i < nsyms)
4876 {
a35ddb44 4877 int remove_p = 0;
339c13b6
JB
4878
4879 /* If two symbols have the same name and one of them is a stub type,
4880 the get rid of the stub. */
4881
4882 if (TYPE_STUB (SYMBOL_TYPE (syms[i].sym))
4883 && SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL)
4884 {
4885 for (j = 0; j < nsyms; j++)
4886 {
4887 if (j != i
4888 && !TYPE_STUB (SYMBOL_TYPE (syms[j].sym))
4889 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4890 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
4891 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0)
a35ddb44 4892 remove_p = 1;
339c13b6
JB
4893 }
4894 }
4895
4896 /* Two symbols with the same name, same class and same address
4897 should be identical. */
4898
4899 else if (SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL
96d887e8
PH
4900 && SYMBOL_CLASS (syms[i].sym) == LOC_STATIC
4901 && is_nondebugging_type (SYMBOL_TYPE (syms[i].sym)))
4902 {
4903 for (j = 0; j < nsyms; j += 1)
4904 {
4905 if (i != j
4906 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4907 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
76a01679 4908 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0
96d887e8
PH
4909 && SYMBOL_CLASS (syms[i].sym) == SYMBOL_CLASS (syms[j].sym)
4910 && SYMBOL_VALUE_ADDRESS (syms[i].sym)
4911 == SYMBOL_VALUE_ADDRESS (syms[j].sym))
a35ddb44 4912 remove_p = 1;
4c4b4cd2 4913 }
4c4b4cd2 4914 }
339c13b6 4915
a35ddb44 4916 if (remove_p)
339c13b6
JB
4917 {
4918 for (j = i + 1; j < nsyms; j += 1)
4919 syms[j - 1] = syms[j];
4920 nsyms -= 1;
4921 }
4922
96d887e8 4923 i += 1;
14f9c5c9 4924 }
8f17729f
JB
4925
4926 /* If all the remaining symbols are identical enumerals, then
4927 just keep the first one and discard the rest.
4928
4929 Unlike what we did previously, we do not discard any entry
4930 unless they are ALL identical. This is because the symbol
4931 comparison is not a strict comparison, but rather a practical
4932 comparison. If all symbols are considered identical, then
4933 we can just go ahead and use the first one and discard the rest.
4934 But if we cannot reduce the list to a single element, we have
4935 to ask the user to disambiguate anyways. And if we have to
4936 present a multiple-choice menu, it's less confusing if the list
4937 isn't missing some choices that were identical and yet distinct. */
4938 if (symbols_are_identical_enums (syms, nsyms))
4939 nsyms = 1;
4940
96d887e8 4941 return nsyms;
14f9c5c9
AS
4942}
4943
96d887e8
PH
4944/* Given a type that corresponds to a renaming entity, use the type name
4945 to extract the scope (package name or function name, fully qualified,
4946 and following the GNAT encoding convention) where this renaming has been
4947 defined. The string returned needs to be deallocated after use. */
4c4b4cd2 4948
96d887e8
PH
4949static char *
4950xget_renaming_scope (struct type *renaming_type)
14f9c5c9 4951{
96d887e8 4952 /* The renaming types adhere to the following convention:
0963b4bd 4953 <scope>__<rename>___<XR extension>.
96d887e8
PH
4954 So, to extract the scope, we search for the "___XR" extension,
4955 and then backtrack until we find the first "__". */
76a01679 4956
96d887e8
PH
4957 const char *name = type_name_no_tag (renaming_type);
4958 char *suffix = strstr (name, "___XR");
4959 char *last;
4960 int scope_len;
4961 char *scope;
14f9c5c9 4962
96d887e8
PH
4963 /* Now, backtrack a bit until we find the first "__". Start looking
4964 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 4965
96d887e8
PH
4966 for (last = suffix - 3; last > name; last--)
4967 if (last[0] == '_' && last[1] == '_')
4968 break;
76a01679 4969
96d887e8 4970 /* Make a copy of scope and return it. */
14f9c5c9 4971
96d887e8
PH
4972 scope_len = last - name;
4973 scope = (char *) xmalloc ((scope_len + 1) * sizeof (char));
14f9c5c9 4974
96d887e8
PH
4975 strncpy (scope, name, scope_len);
4976 scope[scope_len] = '\0';
4c4b4cd2 4977
96d887e8 4978 return scope;
4c4b4cd2
PH
4979}
4980
96d887e8 4981/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 4982
96d887e8
PH
4983static int
4984is_package_name (const char *name)
4c4b4cd2 4985{
96d887e8
PH
4986 /* Here, We take advantage of the fact that no symbols are generated
4987 for packages, while symbols are generated for each function.
4988 So the condition for NAME represent a package becomes equivalent
4989 to NAME not existing in our list of symbols. There is only one
4990 small complication with library-level functions (see below). */
4c4b4cd2 4991
96d887e8 4992 char *fun_name;
76a01679 4993
96d887e8
PH
4994 /* If it is a function that has not been defined at library level,
4995 then we should be able to look it up in the symbols. */
4996 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
4997 return 0;
14f9c5c9 4998
96d887e8
PH
4999 /* Library-level function names start with "_ada_". See if function
5000 "_ada_" followed by NAME can be found. */
14f9c5c9 5001
96d887e8 5002 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5003 functions names cannot contain "__" in them. */
96d887e8
PH
5004 if (strstr (name, "__") != NULL)
5005 return 0;
4c4b4cd2 5006
b435e160 5007 fun_name = xstrprintf ("_ada_%s", name);
14f9c5c9 5008
96d887e8
PH
5009 return (standard_lookup (fun_name, NULL, VAR_DOMAIN) == NULL);
5010}
14f9c5c9 5011
96d887e8 5012/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5013 not visible from FUNCTION_NAME. */
14f9c5c9 5014
96d887e8 5015static int
0d5cff50 5016old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5017{
aeb5907d 5018 char *scope;
1509e573 5019 struct cleanup *old_chain;
aeb5907d
JB
5020
5021 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5022 return 0;
5023
5024 scope = xget_renaming_scope (SYMBOL_TYPE (sym));
1509e573 5025 old_chain = make_cleanup (xfree, scope);
14f9c5c9 5026
96d887e8
PH
5027 /* If the rename has been defined in a package, then it is visible. */
5028 if (is_package_name (scope))
1509e573
JB
5029 {
5030 do_cleanups (old_chain);
5031 return 0;
5032 }
14f9c5c9 5033
96d887e8
PH
5034 /* Check that the rename is in the current function scope by checking
5035 that its name starts with SCOPE. */
76a01679 5036
96d887e8
PH
5037 /* If the function name starts with "_ada_", it means that it is
5038 a library-level function. Strip this prefix before doing the
5039 comparison, as the encoding for the renaming does not contain
5040 this prefix. */
61012eef 5041 if (startswith (function_name, "_ada_"))
96d887e8 5042 function_name += 5;
f26caa11 5043
1509e573 5044 {
61012eef 5045 int is_invisible = !startswith (function_name, scope);
1509e573
JB
5046
5047 do_cleanups (old_chain);
5048 return is_invisible;
5049 }
f26caa11
PH
5050}
5051
aeb5907d
JB
5052/* Remove entries from SYMS that corresponds to a renaming entity that
5053 is not visible from the function associated with CURRENT_BLOCK or
5054 that is superfluous due to the presence of more specific renaming
5055 information. Places surviving symbols in the initial entries of
5056 SYMS and returns the number of surviving symbols.
96d887e8
PH
5057
5058 Rationale:
aeb5907d
JB
5059 First, in cases where an object renaming is implemented as a
5060 reference variable, GNAT may produce both the actual reference
5061 variable and the renaming encoding. In this case, we discard the
5062 latter.
5063
5064 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5065 entity. Unfortunately, STABS currently does not support the definition
5066 of types that are local to a given lexical block, so all renamings types
5067 are emitted at library level. As a consequence, if an application
5068 contains two renaming entities using the same name, and a user tries to
5069 print the value of one of these entities, the result of the ada symbol
5070 lookup will also contain the wrong renaming type.
f26caa11 5071
96d887e8
PH
5072 This function partially covers for this limitation by attempting to
5073 remove from the SYMS list renaming symbols that should be visible
5074 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5075 method with the current information available. The implementation
5076 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5077
5078 - When the user tries to print a rename in a function while there
5079 is another rename entity defined in a package: Normally, the
5080 rename in the function has precedence over the rename in the
5081 package, so the latter should be removed from the list. This is
5082 currently not the case.
5083
5084 - This function will incorrectly remove valid renames if
5085 the CURRENT_BLOCK corresponds to a function which symbol name
5086 has been changed by an "Export" pragma. As a consequence,
5087 the user will be unable to print such rename entities. */
4c4b4cd2 5088
14f9c5c9 5089static int
aeb5907d
JB
5090remove_irrelevant_renamings (struct ada_symbol_info *syms,
5091 int nsyms, const struct block *current_block)
4c4b4cd2
PH
5092{
5093 struct symbol *current_function;
0d5cff50 5094 const char *current_function_name;
4c4b4cd2 5095 int i;
aeb5907d
JB
5096 int is_new_style_renaming;
5097
5098 /* If there is both a renaming foo___XR... encoded as a variable and
5099 a simple variable foo in the same block, discard the latter.
0963b4bd 5100 First, zero out such symbols, then compress. */
aeb5907d
JB
5101 is_new_style_renaming = 0;
5102 for (i = 0; i < nsyms; i += 1)
5103 {
5104 struct symbol *sym = syms[i].sym;
270140bd 5105 const struct block *block = syms[i].block;
aeb5907d
JB
5106 const char *name;
5107 const char *suffix;
5108
5109 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5110 continue;
5111 name = SYMBOL_LINKAGE_NAME (sym);
5112 suffix = strstr (name, "___XR");
5113
5114 if (suffix != NULL)
5115 {
5116 int name_len = suffix - name;
5117 int j;
5b4ee69b 5118
aeb5907d
JB
5119 is_new_style_renaming = 1;
5120 for (j = 0; j < nsyms; j += 1)
5121 if (i != j && syms[j].sym != NULL
5122 && strncmp (name, SYMBOL_LINKAGE_NAME (syms[j].sym),
5123 name_len) == 0
5124 && block == syms[j].block)
5125 syms[j].sym = NULL;
5126 }
5127 }
5128 if (is_new_style_renaming)
5129 {
5130 int j, k;
5131
5132 for (j = k = 0; j < nsyms; j += 1)
5133 if (syms[j].sym != NULL)
5134 {
5135 syms[k] = syms[j];
5136 k += 1;
5137 }
5138 return k;
5139 }
4c4b4cd2
PH
5140
5141 /* Extract the function name associated to CURRENT_BLOCK.
5142 Abort if unable to do so. */
76a01679 5143
4c4b4cd2
PH
5144 if (current_block == NULL)
5145 return nsyms;
76a01679 5146
7f0df278 5147 current_function = block_linkage_function (current_block);
4c4b4cd2
PH
5148 if (current_function == NULL)
5149 return nsyms;
5150
5151 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5152 if (current_function_name == NULL)
5153 return nsyms;
5154
5155 /* Check each of the symbols, and remove it from the list if it is
5156 a type corresponding to a renaming that is out of the scope of
5157 the current block. */
5158
5159 i = 0;
5160 while (i < nsyms)
5161 {
aeb5907d
JB
5162 if (ada_parse_renaming (syms[i].sym, NULL, NULL, NULL)
5163 == ADA_OBJECT_RENAMING
5164 && old_renaming_is_invisible (syms[i].sym, current_function_name))
4c4b4cd2
PH
5165 {
5166 int j;
5b4ee69b 5167
aeb5907d 5168 for (j = i + 1; j < nsyms; j += 1)
76a01679 5169 syms[j - 1] = syms[j];
4c4b4cd2
PH
5170 nsyms -= 1;
5171 }
5172 else
5173 i += 1;
5174 }
5175
5176 return nsyms;
5177}
5178
339c13b6
JB
5179/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5180 whose name and domain match NAME and DOMAIN respectively.
5181 If no match was found, then extend the search to "enclosing"
5182 routines (in other words, if we're inside a nested function,
5183 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5184 If WILD_MATCH_P is nonzero, perform the naming matching in
5185 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5186
5187 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5188
5189static void
5190ada_add_local_symbols (struct obstack *obstackp, const char *name,
f0c5f9b2 5191 const struct block *block, domain_enum domain,
d0a8ab18 5192 int wild_match_p)
339c13b6
JB
5193{
5194 int block_depth = 0;
5195
5196 while (block != NULL)
5197 {
5198 block_depth += 1;
d0a8ab18
JB
5199 ada_add_block_symbols (obstackp, block, name, domain, NULL,
5200 wild_match_p);
339c13b6
JB
5201
5202 /* If we found a non-function match, assume that's the one. */
5203 if (is_nonfunction (defns_collected (obstackp, 0),
5204 num_defns_collected (obstackp)))
5205 return;
5206
5207 block = BLOCK_SUPERBLOCK (block);
5208 }
5209
5210 /* If no luck so far, try to find NAME as a local symbol in some lexically
5211 enclosing subprogram. */
5212 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
d0a8ab18 5213 add_symbols_from_enclosing_procs (obstackp, name, domain, wild_match_p);
339c13b6
JB
5214}
5215
ccefe4c4 5216/* An object of this type is used as the user_data argument when
40658b94 5217 calling the map_matching_symbols method. */
ccefe4c4 5218
40658b94 5219struct match_data
ccefe4c4 5220{
40658b94 5221 struct objfile *objfile;
ccefe4c4 5222 struct obstack *obstackp;
40658b94
PH
5223 struct symbol *arg_sym;
5224 int found_sym;
ccefe4c4
TT
5225};
5226
40658b94
PH
5227/* A callback for add_matching_symbols that adds SYM, found in BLOCK,
5228 to a list of symbols. DATA0 is a pointer to a struct match_data *
5229 containing the obstack that collects the symbol list, the file that SYM
5230 must come from, a flag indicating whether a non-argument symbol has
5231 been found in the current block, and the last argument symbol
5232 passed in SYM within the current block (if any). When SYM is null,
5233 marking the end of a block, the argument symbol is added if no
5234 other has been found. */
ccefe4c4 5235
40658b94
PH
5236static int
5237aux_add_nonlocal_symbols (struct block *block, struct symbol *sym, void *data0)
ccefe4c4 5238{
40658b94
PH
5239 struct match_data *data = (struct match_data *) data0;
5240
5241 if (sym == NULL)
5242 {
5243 if (!data->found_sym && data->arg_sym != NULL)
5244 add_defn_to_vec (data->obstackp,
5245 fixup_symbol_section (data->arg_sym, data->objfile),
5246 block);
5247 data->found_sym = 0;
5248 data->arg_sym = NULL;
5249 }
5250 else
5251 {
5252 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5253 return 0;
5254 else if (SYMBOL_IS_ARGUMENT (sym))
5255 data->arg_sym = sym;
5256 else
5257 {
5258 data->found_sym = 1;
5259 add_defn_to_vec (data->obstackp,
5260 fixup_symbol_section (sym, data->objfile),
5261 block);
5262 }
5263 }
5264 return 0;
5265}
5266
db230ce3
JB
5267/* Implements compare_names, but only applying the comparision using
5268 the given CASING. */
5b4ee69b 5269
40658b94 5270static int
db230ce3
JB
5271compare_names_with_case (const char *string1, const char *string2,
5272 enum case_sensitivity casing)
40658b94
PH
5273{
5274 while (*string1 != '\0' && *string2 != '\0')
5275 {
db230ce3
JB
5276 char c1, c2;
5277
40658b94
PH
5278 if (isspace (*string1) || isspace (*string2))
5279 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5280
5281 if (casing == case_sensitive_off)
5282 {
5283 c1 = tolower (*string1);
5284 c2 = tolower (*string2);
5285 }
5286 else
5287 {
5288 c1 = *string1;
5289 c2 = *string2;
5290 }
5291 if (c1 != c2)
40658b94 5292 break;
db230ce3 5293
40658b94
PH
5294 string1 += 1;
5295 string2 += 1;
5296 }
db230ce3 5297
40658b94
PH
5298 switch (*string1)
5299 {
5300 case '(':
5301 return strcmp_iw_ordered (string1, string2);
5302 case '_':
5303 if (*string2 == '\0')
5304 {
052874e8 5305 if (is_name_suffix (string1))
40658b94
PH
5306 return 0;
5307 else
1a1d5513 5308 return 1;
40658b94 5309 }
dbb8534f 5310 /* FALLTHROUGH */
40658b94
PH
5311 default:
5312 if (*string2 == '(')
5313 return strcmp_iw_ordered (string1, string2);
5314 else
db230ce3
JB
5315 {
5316 if (casing == case_sensitive_off)
5317 return tolower (*string1) - tolower (*string2);
5318 else
5319 return *string1 - *string2;
5320 }
40658b94 5321 }
ccefe4c4
TT
5322}
5323
db230ce3
JB
5324/* Compare STRING1 to STRING2, with results as for strcmp.
5325 Compatible with strcmp_iw_ordered in that...
5326
5327 strcmp_iw_ordered (STRING1, STRING2) <= 0
5328
5329 ... implies...
5330
5331 compare_names (STRING1, STRING2) <= 0
5332
5333 (they may differ as to what symbols compare equal). */
5334
5335static int
5336compare_names (const char *string1, const char *string2)
5337{
5338 int result;
5339
5340 /* Similar to what strcmp_iw_ordered does, we need to perform
5341 a case-insensitive comparison first, and only resort to
5342 a second, case-sensitive, comparison if the first one was
5343 not sufficient to differentiate the two strings. */
5344
5345 result = compare_names_with_case (string1, string2, case_sensitive_off);
5346 if (result == 0)
5347 result = compare_names_with_case (string1, string2, case_sensitive_on);
5348
5349 return result;
5350}
5351
339c13b6
JB
5352/* Add to OBSTACKP all non-local symbols whose name and domain match
5353 NAME and DOMAIN respectively. The search is performed on GLOBAL_BLOCK
5354 symbols if GLOBAL is non-zero, or on STATIC_BLOCK symbols otherwise. */
5355
5356static void
40658b94
PH
5357add_nonlocal_symbols (struct obstack *obstackp, const char *name,
5358 domain_enum domain, int global,
5359 int is_wild_match)
339c13b6
JB
5360{
5361 struct objfile *objfile;
40658b94 5362 struct match_data data;
339c13b6 5363
6475f2fe 5364 memset (&data, 0, sizeof data);
ccefe4c4 5365 data.obstackp = obstackp;
339c13b6 5366
ccefe4c4 5367 ALL_OBJFILES (objfile)
40658b94
PH
5368 {
5369 data.objfile = objfile;
5370
5371 if (is_wild_match)
4186eb54
KS
5372 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5373 aux_add_nonlocal_symbols, &data,
5374 wild_match, NULL);
40658b94 5375 else
4186eb54
KS
5376 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5377 aux_add_nonlocal_symbols, &data,
5378 full_match, compare_names);
40658b94
PH
5379 }
5380
5381 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5382 {
5383 ALL_OBJFILES (objfile)
5384 {
5385 char *name1 = alloca (strlen (name) + sizeof ("_ada_"));
5386 strcpy (name1, "_ada_");
5387 strcpy (name1 + sizeof ("_ada_") - 1, name);
5388 data.objfile = objfile;
ade7ed9e
DE
5389 objfile->sf->qf->map_matching_symbols (objfile, name1, domain,
5390 global,
0963b4bd
MS
5391 aux_add_nonlocal_symbols,
5392 &data,
40658b94
PH
5393 full_match, compare_names);
5394 }
5395 }
339c13b6
JB
5396}
5397
4eeaa230
DE
5398/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and, if full_search is
5399 non-zero, enclosing scope and in global scopes, returning the number of
5400 matches.
9f88c959 5401 Sets *RESULTS to point to a vector of (SYM,BLOCK) tuples,
4c4b4cd2 5402 indicating the symbols found and the blocks and symbol tables (if
4eeaa230
DE
5403 any) in which they were found. This vector is transient---good only to
5404 the next call of ada_lookup_symbol_list.
5405
5406 When full_search is non-zero, any non-function/non-enumeral
4c4b4cd2
PH
5407 symbol match within the nest of blocks whose innermost member is BLOCK0,
5408 is the one match returned (no other matches in that or
d9680e73 5409 enclosing blocks is returned). If there are any matches in or
4eeaa230
DE
5410 surrounding BLOCK0, then these alone are returned.
5411
9f88c959 5412 Names prefixed with "standard__" are handled specially: "standard__"
4c4b4cd2 5413 is first stripped off, and only static and global symbols are searched. */
14f9c5c9 5414
4eeaa230
DE
5415static int
5416ada_lookup_symbol_list_worker (const char *name0, const struct block *block0,
fe978cb0 5417 domain_enum domain,
4eeaa230
DE
5418 struct ada_symbol_info **results,
5419 int full_search)
14f9c5c9
AS
5420{
5421 struct symbol *sym;
f0c5f9b2 5422 const struct block *block;
4c4b4cd2 5423 const char *name;
82ccd55e 5424 const int wild_match_p = should_use_wild_match (name0);
b1eedac9 5425 int syms_from_global_search = 0;
4c4b4cd2 5426 int ndefns;
14f9c5c9 5427
4c4b4cd2
PH
5428 obstack_free (&symbol_list_obstack, NULL);
5429 obstack_init (&symbol_list_obstack);
14f9c5c9 5430
14f9c5c9
AS
5431 /* Search specified block and its superiors. */
5432
4c4b4cd2 5433 name = name0;
f0c5f9b2 5434 block = block0;
339c13b6
JB
5435
5436 /* Special case: If the user specifies a symbol name inside package
5437 Standard, do a non-wild matching of the symbol name without
5438 the "standard__" prefix. This was primarily introduced in order
5439 to allow the user to specifically access the standard exceptions
5440 using, for instance, Standard.Constraint_Error when Constraint_Error
5441 is ambiguous (due to the user defining its own Constraint_Error
5442 entity inside its program). */
61012eef 5443 if (startswith (name0, "standard__"))
4c4b4cd2 5444 {
4c4b4cd2
PH
5445 block = NULL;
5446 name = name0 + sizeof ("standard__") - 1;
5447 }
5448
339c13b6 5449 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5450
4eeaa230
DE
5451 if (block != NULL)
5452 {
5453 if (full_search)
5454 {
5455 ada_add_local_symbols (&symbol_list_obstack, name, block,
fe978cb0 5456 domain, wild_match_p);
4eeaa230
DE
5457 }
5458 else
5459 {
5460 /* In the !full_search case we're are being called by
5461 ada_iterate_over_symbols, and we don't want to search
5462 superblocks. */
5463 ada_add_block_symbols (&symbol_list_obstack, block, name,
fe978cb0 5464 domain, NULL, wild_match_p);
4eeaa230
DE
5465 }
5466 if (num_defns_collected (&symbol_list_obstack) > 0 || !full_search)
5467 goto done;
5468 }
d2e4a39e 5469
339c13b6
JB
5470 /* No non-global symbols found. Check our cache to see if we have
5471 already performed this search before. If we have, then return
5472 the same result. */
5473
fe978cb0 5474 if (lookup_cached_symbol (name0, domain, &sym, &block))
4c4b4cd2
PH
5475 {
5476 if (sym != NULL)
2570f2b7 5477 add_defn_to_vec (&symbol_list_obstack, sym, block);
4c4b4cd2
PH
5478 goto done;
5479 }
14f9c5c9 5480
b1eedac9
JB
5481 syms_from_global_search = 1;
5482
339c13b6
JB
5483 /* Search symbols from all global blocks. */
5484
fe978cb0 5485 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 1,
82ccd55e 5486 wild_match_p);
d2e4a39e 5487
4c4b4cd2 5488 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5489 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5490
4c4b4cd2 5491 if (num_defns_collected (&symbol_list_obstack) == 0)
fe978cb0 5492 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 0,
82ccd55e 5493 wild_match_p);
14f9c5c9 5494
4c4b4cd2
PH
5495done:
5496 ndefns = num_defns_collected (&symbol_list_obstack);
5497 *results = defns_collected (&symbol_list_obstack, 1);
5498
5499 ndefns = remove_extra_symbols (*results, ndefns);
5500
b1eedac9 5501 if (ndefns == 0 && full_search && syms_from_global_search)
fe978cb0 5502 cache_symbol (name0, domain, NULL, NULL);
14f9c5c9 5503
b1eedac9 5504 if (ndefns == 1 && full_search && syms_from_global_search)
fe978cb0 5505 cache_symbol (name0, domain, (*results)[0].sym, (*results)[0].block);
14f9c5c9 5506
aeb5907d 5507 ndefns = remove_irrelevant_renamings (*results, ndefns, block0);
14f9c5c9 5508
14f9c5c9
AS
5509 return ndefns;
5510}
5511
4eeaa230
DE
5512/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and enclosing scope and
5513 in global scopes, returning the number of matches, and setting *RESULTS
5514 to a vector of (SYM,BLOCK) tuples.
5515 See ada_lookup_symbol_list_worker for further details. */
5516
5517int
5518ada_lookup_symbol_list (const char *name0, const struct block *block0,
5519 domain_enum domain, struct ada_symbol_info **results)
5520{
5521 return ada_lookup_symbol_list_worker (name0, block0, domain, results, 1);
5522}
5523
5524/* Implementation of the la_iterate_over_symbols method. */
5525
5526static void
5527ada_iterate_over_symbols (const struct block *block,
5528 const char *name, domain_enum domain,
5529 symbol_found_callback_ftype *callback,
5530 void *data)
5531{
5532 int ndefs, i;
5533 struct ada_symbol_info *results;
5534
5535 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
5536 for (i = 0; i < ndefs; ++i)
5537 {
5538 if (! (*callback) (results[i].sym, data))
5539 break;
5540 }
5541}
5542
f8eba3c6
TT
5543/* If NAME is the name of an entity, return a string that should
5544 be used to look that entity up in Ada units. This string should
5545 be deallocated after use using xfree.
5546
5547 NAME can have any form that the "break" or "print" commands might
5548 recognize. In other words, it does not have to be the "natural"
5549 name, or the "encoded" name. */
5550
5551char *
5552ada_name_for_lookup (const char *name)
5553{
5554 char *canon;
5555 int nlen = strlen (name);
5556
5557 if (name[0] == '<' && name[nlen - 1] == '>')
5558 {
5559 canon = xmalloc (nlen - 1);
5560 memcpy (canon, name + 1, nlen - 2);
5561 canon[nlen - 2] = '\0';
5562 }
5563 else
5564 canon = xstrdup (ada_encode (ada_fold_name (name)));
5565 return canon;
5566}
5567
4e5c77fe
JB
5568/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5569 to 1, but choosing the first symbol found if there are multiple
5570 choices.
5571
5e2336be
JB
5572 The result is stored in *INFO, which must be non-NULL.
5573 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5574
5575void
5576ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5577 domain_enum domain,
5e2336be 5578 struct ada_symbol_info *info)
14f9c5c9 5579{
4c4b4cd2 5580 struct ada_symbol_info *candidates;
14f9c5c9
AS
5581 int n_candidates;
5582
5e2336be
JB
5583 gdb_assert (info != NULL);
5584 memset (info, 0, sizeof (struct ada_symbol_info));
4e5c77fe 5585
fe978cb0 5586 n_candidates = ada_lookup_symbol_list (name, block, domain, &candidates);
14f9c5c9 5587 if (n_candidates == 0)
4e5c77fe 5588 return;
4c4b4cd2 5589
5e2336be
JB
5590 *info = candidates[0];
5591 info->sym = fixup_symbol_section (info->sym, NULL);
4e5c77fe 5592}
aeb5907d
JB
5593
5594/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5595 scope and in global scopes, or NULL if none. NAME is folded and
5596 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
0963b4bd 5597 choosing the first symbol if there are multiple choices.
4e5c77fe
JB
5598 If IS_A_FIELD_OF_THIS is not NULL, it is set to zero. */
5599
aeb5907d
JB
5600struct symbol *
5601ada_lookup_symbol (const char *name, const struct block *block0,
fe978cb0 5602 domain_enum domain, int *is_a_field_of_this)
aeb5907d 5603{
5e2336be 5604 struct ada_symbol_info info;
4e5c77fe 5605
aeb5907d
JB
5606 if (is_a_field_of_this != NULL)
5607 *is_a_field_of_this = 0;
5608
4e5c77fe 5609 ada_lookup_encoded_symbol (ada_encode (ada_fold_name (name)),
fe978cb0 5610 block0, domain, &info);
5e2336be 5611 return info.sym;
4c4b4cd2 5612}
14f9c5c9 5613
4c4b4cd2 5614static struct symbol *
f606139a
DE
5615ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5616 const char *name,
76a01679 5617 const struct block *block,
21b556f4 5618 const domain_enum domain)
4c4b4cd2 5619{
04dccad0
JB
5620 struct symbol *sym;
5621
5622 sym = ada_lookup_symbol (name, block_static_block (block), domain, NULL);
5623 if (sym != NULL)
5624 return sym;
5625
5626 /* If we haven't found a match at this point, try the primitive
5627 types. In other languages, this search is performed before
5628 searching for global symbols in order to short-circuit that
5629 global-symbol search if it happens that the name corresponds
5630 to a primitive type. But we cannot do the same in Ada, because
5631 it is perfectly legitimate for a program to declare a type which
5632 has the same name as a standard type. If looking up a type in
5633 that situation, we have traditionally ignored the primitive type
5634 in favor of user-defined types. This is why, unlike most other
5635 languages, we search the primitive types this late and only after
5636 having searched the global symbols without success. */
5637
5638 if (domain == VAR_DOMAIN)
5639 {
5640 struct gdbarch *gdbarch;
5641
5642 if (block == NULL)
5643 gdbarch = target_gdbarch ();
5644 else
5645 gdbarch = block_gdbarch (block);
5646 sym = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5647 if (sym != NULL)
5648 return sym;
5649 }
5650
5651 return NULL;
14f9c5c9
AS
5652}
5653
5654
4c4b4cd2
PH
5655/* True iff STR is a possible encoded suffix of a normal Ada name
5656 that is to be ignored for matching purposes. Suffixes of parallel
5657 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5658 are given by any of the regular expressions:
4c4b4cd2 5659
babe1480
JB
5660 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5661 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5662 TKB [subprogram suffix for task bodies]
babe1480 5663 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5664 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5665
5666 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5667 match is performed. This sequence is used to differentiate homonyms,
5668 is an optional part of a valid name suffix. */
4c4b4cd2 5669
14f9c5c9 5670static int
d2e4a39e 5671is_name_suffix (const char *str)
14f9c5c9
AS
5672{
5673 int k;
4c4b4cd2
PH
5674 const char *matching;
5675 const int len = strlen (str);
5676
babe1480
JB
5677 /* Skip optional leading __[0-9]+. */
5678
4c4b4cd2
PH
5679 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5680 {
babe1480
JB
5681 str += 3;
5682 while (isdigit (str[0]))
5683 str += 1;
4c4b4cd2 5684 }
babe1480
JB
5685
5686 /* [.$][0-9]+ */
4c4b4cd2 5687
babe1480 5688 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5689 {
babe1480 5690 matching = str + 1;
4c4b4cd2
PH
5691 while (isdigit (matching[0]))
5692 matching += 1;
5693 if (matching[0] == '\0')
5694 return 1;
5695 }
5696
5697 /* ___[0-9]+ */
babe1480 5698
4c4b4cd2
PH
5699 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5700 {
5701 matching = str + 3;
5702 while (isdigit (matching[0]))
5703 matching += 1;
5704 if (matching[0] == '\0')
5705 return 1;
5706 }
5707
9ac7f98e
JB
5708 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5709
5710 if (strcmp (str, "TKB") == 0)
5711 return 1;
5712
529cad9c
PH
5713#if 0
5714 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5715 with a N at the end. Unfortunately, the compiler uses the same
5716 convention for other internal types it creates. So treating
529cad9c 5717 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5718 some regressions. For instance, consider the case of an enumerated
5719 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5720 name ends with N.
5721 Having a single character like this as a suffix carrying some
0963b4bd 5722 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5723 to be something like "_N" instead. In the meantime, do not do
5724 the following check. */
5725 /* Protected Object Subprograms */
5726 if (len == 1 && str [0] == 'N')
5727 return 1;
5728#endif
5729
5730 /* _E[0-9]+[bs]$ */
5731 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5732 {
5733 matching = str + 3;
5734 while (isdigit (matching[0]))
5735 matching += 1;
5736 if ((matching[0] == 'b' || matching[0] == 's')
5737 && matching [1] == '\0')
5738 return 1;
5739 }
5740
4c4b4cd2
PH
5741 /* ??? We should not modify STR directly, as we are doing below. This
5742 is fine in this case, but may become problematic later if we find
5743 that this alternative did not work, and want to try matching
5744 another one from the begining of STR. Since we modified it, we
5745 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5746 if (str[0] == 'X')
5747 {
5748 str += 1;
d2e4a39e 5749 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5750 {
5751 if (str[0] != 'n' && str[0] != 'b')
5752 return 0;
5753 str += 1;
5754 }
14f9c5c9 5755 }
babe1480 5756
14f9c5c9
AS
5757 if (str[0] == '\000')
5758 return 1;
babe1480 5759
d2e4a39e 5760 if (str[0] == '_')
14f9c5c9
AS
5761 {
5762 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5763 return 0;
d2e4a39e 5764 if (str[2] == '_')
4c4b4cd2 5765 {
61ee279c
PH
5766 if (strcmp (str + 3, "JM") == 0)
5767 return 1;
5768 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5769 the LJM suffix in favor of the JM one. But we will
5770 still accept LJM as a valid suffix for a reasonable
5771 amount of time, just to allow ourselves to debug programs
5772 compiled using an older version of GNAT. */
4c4b4cd2
PH
5773 if (strcmp (str + 3, "LJM") == 0)
5774 return 1;
5775 if (str[3] != 'X')
5776 return 0;
1265e4aa
JB
5777 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5778 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5779 return 1;
5780 if (str[4] == 'R' && str[5] != 'T')
5781 return 1;
5782 return 0;
5783 }
5784 if (!isdigit (str[2]))
5785 return 0;
5786 for (k = 3; str[k] != '\0'; k += 1)
5787 if (!isdigit (str[k]) && str[k] != '_')
5788 return 0;
14f9c5c9
AS
5789 return 1;
5790 }
4c4b4cd2 5791 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5792 {
4c4b4cd2
PH
5793 for (k = 2; str[k] != '\0'; k += 1)
5794 if (!isdigit (str[k]) && str[k] != '_')
5795 return 0;
14f9c5c9
AS
5796 return 1;
5797 }
5798 return 0;
5799}
d2e4a39e 5800
aeb5907d
JB
5801/* Return non-zero if the string starting at NAME and ending before
5802 NAME_END contains no capital letters. */
529cad9c
PH
5803
5804static int
5805is_valid_name_for_wild_match (const char *name0)
5806{
5807 const char *decoded_name = ada_decode (name0);
5808 int i;
5809
5823c3ef
JB
5810 /* If the decoded name starts with an angle bracket, it means that
5811 NAME0 does not follow the GNAT encoding format. It should then
5812 not be allowed as a possible wild match. */
5813 if (decoded_name[0] == '<')
5814 return 0;
5815
529cad9c
PH
5816 for (i=0; decoded_name[i] != '\0'; i++)
5817 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5818 return 0;
5819
5820 return 1;
5821}
5822
73589123
PH
5823/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
5824 that could start a simple name. Assumes that *NAMEP points into
5825 the string beginning at NAME0. */
4c4b4cd2 5826
14f9c5c9 5827static int
73589123 5828advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 5829{
73589123 5830 const char *name = *namep;
5b4ee69b 5831
5823c3ef 5832 while (1)
14f9c5c9 5833 {
aa27d0b3 5834 int t0, t1;
73589123
PH
5835
5836 t0 = *name;
5837 if (t0 == '_')
5838 {
5839 t1 = name[1];
5840 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
5841 {
5842 name += 1;
61012eef 5843 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
5844 break;
5845 else
5846 name += 1;
5847 }
aa27d0b3
JB
5848 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
5849 || name[2] == target0))
73589123
PH
5850 {
5851 name += 2;
5852 break;
5853 }
5854 else
5855 return 0;
5856 }
5857 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
5858 name += 1;
5859 else
5823c3ef 5860 return 0;
73589123
PH
5861 }
5862
5863 *namep = name;
5864 return 1;
5865}
5866
5867/* Return 0 iff NAME encodes a name of the form prefix.PATN. Ignores any
5868 informational suffixes of NAME (i.e., for which is_name_suffix is
5869 true). Assumes that PATN is a lower-cased Ada simple name. */
5870
5871static int
5872wild_match (const char *name, const char *patn)
5873{
22e048c9 5874 const char *p;
73589123
PH
5875 const char *name0 = name;
5876
5877 while (1)
5878 {
5879 const char *match = name;
5880
5881 if (*name == *patn)
5882 {
5883 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
5884 if (*p != *name)
5885 break;
5886 if (*p == '\0' && is_name_suffix (name))
5887 return match != name0 && !is_valid_name_for_wild_match (name0);
5888
5889 if (name[-1] == '_')
5890 name -= 1;
5891 }
5892 if (!advance_wild_match (&name, name0, *patn))
5893 return 1;
96d887e8 5894 }
96d887e8
PH
5895}
5896
40658b94
PH
5897/* Returns 0 iff symbol name SYM_NAME matches SEARCH_NAME, apart from
5898 informational suffix. */
5899
c4d840bd
PH
5900static int
5901full_match (const char *sym_name, const char *search_name)
5902{
40658b94 5903 return !match_name (sym_name, search_name, 0);
c4d840bd
PH
5904}
5905
5906
96d887e8
PH
5907/* Add symbols from BLOCK matching identifier NAME in DOMAIN to
5908 vector *defn_symbols, updating the list of symbols in OBSTACKP
0963b4bd 5909 (if necessary). If WILD, treat as NAME with a wildcard prefix.
4eeaa230 5910 OBJFILE is the section containing BLOCK. */
96d887e8
PH
5911
5912static void
5913ada_add_block_symbols (struct obstack *obstackp,
f0c5f9b2 5914 const struct block *block, const char *name,
96d887e8 5915 domain_enum domain, struct objfile *objfile,
2570f2b7 5916 int wild)
96d887e8 5917{
8157b174 5918 struct block_iterator iter;
96d887e8
PH
5919 int name_len = strlen (name);
5920 /* A matching argument symbol, if any. */
5921 struct symbol *arg_sym;
5922 /* Set true when we find a matching non-argument symbol. */
5923 int found_sym;
5924 struct symbol *sym;
5925
5926 arg_sym = NULL;
5927 found_sym = 0;
5928 if (wild)
5929 {
8157b174
TT
5930 for (sym = block_iter_match_first (block, name, wild_match, &iter);
5931 sym != NULL; sym = block_iter_match_next (name, wild_match, &iter))
76a01679 5932 {
4186eb54
KS
5933 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5934 SYMBOL_DOMAIN (sym), domain)
73589123 5935 && wild_match (SYMBOL_LINKAGE_NAME (sym), name) == 0)
76a01679 5936 {
2a2d4dc3
AS
5937 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5938 continue;
5939 else if (SYMBOL_IS_ARGUMENT (sym))
5940 arg_sym = sym;
5941 else
5942 {
76a01679
JB
5943 found_sym = 1;
5944 add_defn_to_vec (obstackp,
5945 fixup_symbol_section (sym, objfile),
2570f2b7 5946 block);
76a01679
JB
5947 }
5948 }
5949 }
96d887e8
PH
5950 }
5951 else
5952 {
8157b174
TT
5953 for (sym = block_iter_match_first (block, name, full_match, &iter);
5954 sym != NULL; sym = block_iter_match_next (name, full_match, &iter))
76a01679 5955 {
4186eb54
KS
5956 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5957 SYMBOL_DOMAIN (sym), domain))
76a01679 5958 {
c4d840bd
PH
5959 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5960 {
5961 if (SYMBOL_IS_ARGUMENT (sym))
5962 arg_sym = sym;
5963 else
2a2d4dc3 5964 {
c4d840bd
PH
5965 found_sym = 1;
5966 add_defn_to_vec (obstackp,
5967 fixup_symbol_section (sym, objfile),
5968 block);
2a2d4dc3 5969 }
c4d840bd 5970 }
76a01679
JB
5971 }
5972 }
96d887e8
PH
5973 }
5974
5975 if (!found_sym && arg_sym != NULL)
5976 {
76a01679
JB
5977 add_defn_to_vec (obstackp,
5978 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5979 block);
96d887e8
PH
5980 }
5981
5982 if (!wild)
5983 {
5984 arg_sym = NULL;
5985 found_sym = 0;
5986
5987 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 5988 {
4186eb54
KS
5989 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5990 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
5991 {
5992 int cmp;
5993
5994 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
5995 if (cmp == 0)
5996 {
61012eef 5997 cmp = !startswith (SYMBOL_LINKAGE_NAME (sym), "_ada_");
76a01679
JB
5998 if (cmp == 0)
5999 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
6000 name_len);
6001 }
6002
6003 if (cmp == 0
6004 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
6005 {
2a2d4dc3
AS
6006 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6007 {
6008 if (SYMBOL_IS_ARGUMENT (sym))
6009 arg_sym = sym;
6010 else
6011 {
6012 found_sym = 1;
6013 add_defn_to_vec (obstackp,
6014 fixup_symbol_section (sym, objfile),
6015 block);
6016 }
6017 }
76a01679
JB
6018 }
6019 }
76a01679 6020 }
96d887e8
PH
6021
6022 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6023 They aren't parameters, right? */
6024 if (!found_sym && arg_sym != NULL)
6025 {
6026 add_defn_to_vec (obstackp,
76a01679 6027 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6028 block);
96d887e8
PH
6029 }
6030 }
6031}
6032\f
41d27058
JB
6033
6034 /* Symbol Completion */
6035
6036/* If SYM_NAME is a completion candidate for TEXT, return this symbol
6037 name in a form that's appropriate for the completion. The result
6038 does not need to be deallocated, but is only good until the next call.
6039
6040 TEXT_LEN is equal to the length of TEXT.
e701b3c0 6041 Perform a wild match if WILD_MATCH_P is set.
6ea35997 6042 ENCODED_P should be set if TEXT represents the start of a symbol name
41d27058
JB
6043 in its encoded form. */
6044
6045static const char *
6046symbol_completion_match (const char *sym_name,
6047 const char *text, int text_len,
6ea35997 6048 int wild_match_p, int encoded_p)
41d27058 6049{
41d27058
JB
6050 const int verbatim_match = (text[0] == '<');
6051 int match = 0;
6052
6053 if (verbatim_match)
6054 {
6055 /* Strip the leading angle bracket. */
6056 text = text + 1;
6057 text_len--;
6058 }
6059
6060 /* First, test against the fully qualified name of the symbol. */
6061
6062 if (strncmp (sym_name, text, text_len) == 0)
6063 match = 1;
6064
6ea35997 6065 if (match && !encoded_p)
41d27058
JB
6066 {
6067 /* One needed check before declaring a positive match is to verify
6068 that iff we are doing a verbatim match, the decoded version
6069 of the symbol name starts with '<'. Otherwise, this symbol name
6070 is not a suitable completion. */
6071 const char *sym_name_copy = sym_name;
6072 int has_angle_bracket;
6073
6074 sym_name = ada_decode (sym_name);
6075 has_angle_bracket = (sym_name[0] == '<');
6076 match = (has_angle_bracket == verbatim_match);
6077 sym_name = sym_name_copy;
6078 }
6079
6080 if (match && !verbatim_match)
6081 {
6082 /* When doing non-verbatim match, another check that needs to
6083 be done is to verify that the potentially matching symbol name
6084 does not include capital letters, because the ada-mode would
6085 not be able to understand these symbol names without the
6086 angle bracket notation. */
6087 const char *tmp;
6088
6089 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6090 if (*tmp != '\0')
6091 match = 0;
6092 }
6093
6094 /* Second: Try wild matching... */
6095
e701b3c0 6096 if (!match && wild_match_p)
41d27058
JB
6097 {
6098 /* Since we are doing wild matching, this means that TEXT
6099 may represent an unqualified symbol name. We therefore must
6100 also compare TEXT against the unqualified name of the symbol. */
6101 sym_name = ada_unqualified_name (ada_decode (sym_name));
6102
6103 if (strncmp (sym_name, text, text_len) == 0)
6104 match = 1;
6105 }
6106
6107 /* Finally: If we found a mach, prepare the result to return. */
6108
6109 if (!match)
6110 return NULL;
6111
6112 if (verbatim_match)
6113 sym_name = add_angle_brackets (sym_name);
6114
6ea35997 6115 if (!encoded_p)
41d27058
JB
6116 sym_name = ada_decode (sym_name);
6117
6118 return sym_name;
6119}
6120
6121/* A companion function to ada_make_symbol_completion_list().
6122 Check if SYM_NAME represents a symbol which name would be suitable
6123 to complete TEXT (TEXT_LEN is the length of TEXT), in which case
6124 it is appended at the end of the given string vector SV.
6125
6126 ORIG_TEXT is the string original string from the user command
6127 that needs to be completed. WORD is the entire command on which
6128 completion should be performed. These two parameters are used to
6129 determine which part of the symbol name should be added to the
6130 completion vector.
c0af1706 6131 if WILD_MATCH_P is set, then wild matching is performed.
cb8e9b97 6132 ENCODED_P should be set if TEXT represents a symbol name in its
41d27058
JB
6133 encoded formed (in which case the completion should also be
6134 encoded). */
6135
6136static void
d6565258 6137symbol_completion_add (VEC(char_ptr) **sv,
41d27058
JB
6138 const char *sym_name,
6139 const char *text, int text_len,
6140 const char *orig_text, const char *word,
cb8e9b97 6141 int wild_match_p, int encoded_p)
41d27058
JB
6142{
6143 const char *match = symbol_completion_match (sym_name, text, text_len,
cb8e9b97 6144 wild_match_p, encoded_p);
41d27058
JB
6145 char *completion;
6146
6147 if (match == NULL)
6148 return;
6149
6150 /* We found a match, so add the appropriate completion to the given
6151 string vector. */
6152
6153 if (word == orig_text)
6154 {
6155 completion = xmalloc (strlen (match) + 5);
6156 strcpy (completion, match);
6157 }
6158 else if (word > orig_text)
6159 {
6160 /* Return some portion of sym_name. */
6161 completion = xmalloc (strlen (match) + 5);
6162 strcpy (completion, match + (word - orig_text));
6163 }
6164 else
6165 {
6166 /* Return some of ORIG_TEXT plus sym_name. */
6167 completion = xmalloc (strlen (match) + (orig_text - word) + 5);
6168 strncpy (completion, word, orig_text - word);
6169 completion[orig_text - word] = '\0';
6170 strcat (completion, match);
6171 }
6172
d6565258 6173 VEC_safe_push (char_ptr, *sv, completion);
41d27058
JB
6174}
6175
ccefe4c4 6176/* An object of this type is passed as the user_data argument to the
bb4142cf 6177 expand_symtabs_matching method. */
ccefe4c4
TT
6178struct add_partial_datum
6179{
6180 VEC(char_ptr) **completions;
6f937416 6181 const char *text;
ccefe4c4 6182 int text_len;
6f937416
PA
6183 const char *text0;
6184 const char *word;
ccefe4c4
TT
6185 int wild_match;
6186 int encoded;
6187};
6188
bb4142cf
DE
6189/* A callback for expand_symtabs_matching. */
6190
7b08b9eb 6191static int
bb4142cf 6192ada_complete_symbol_matcher (const char *name, void *user_data)
ccefe4c4
TT
6193{
6194 struct add_partial_datum *data = user_data;
7b08b9eb
JK
6195
6196 return symbol_completion_match (name, data->text, data->text_len,
6197 data->wild_match, data->encoded) != NULL;
ccefe4c4
TT
6198}
6199
49c4e619
TT
6200/* Return a list of possible symbol names completing TEXT0. WORD is
6201 the entire command on which completion is made. */
41d27058 6202
49c4e619 6203static VEC (char_ptr) *
6f937416
PA
6204ada_make_symbol_completion_list (const char *text0, const char *word,
6205 enum type_code code)
41d27058
JB
6206{
6207 char *text;
6208 int text_len;
b1ed564a
JB
6209 int wild_match_p;
6210 int encoded_p;
2ba95b9b 6211 VEC(char_ptr) *completions = VEC_alloc (char_ptr, 128);
41d27058 6212 struct symbol *sym;
43f3e411 6213 struct compunit_symtab *s;
41d27058
JB
6214 struct minimal_symbol *msymbol;
6215 struct objfile *objfile;
3977b71f 6216 const struct block *b, *surrounding_static_block = 0;
41d27058 6217 int i;
8157b174 6218 struct block_iterator iter;
b8fea896 6219 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
41d27058 6220
2f68a895
TT
6221 gdb_assert (code == TYPE_CODE_UNDEF);
6222
41d27058
JB
6223 if (text0[0] == '<')
6224 {
6225 text = xstrdup (text0);
6226 make_cleanup (xfree, text);
6227 text_len = strlen (text);
b1ed564a
JB
6228 wild_match_p = 0;
6229 encoded_p = 1;
41d27058
JB
6230 }
6231 else
6232 {
6233 text = xstrdup (ada_encode (text0));
6234 make_cleanup (xfree, text);
6235 text_len = strlen (text);
6236 for (i = 0; i < text_len; i++)
6237 text[i] = tolower (text[i]);
6238
b1ed564a 6239 encoded_p = (strstr (text0, "__") != NULL);
41d27058
JB
6240 /* If the name contains a ".", then the user is entering a fully
6241 qualified entity name, and the match must not be done in wild
6242 mode. Similarly, if the user wants to complete what looks like
6243 an encoded name, the match must not be done in wild mode. */
b1ed564a 6244 wild_match_p = (strchr (text0, '.') == NULL && !encoded_p);
41d27058
JB
6245 }
6246
6247 /* First, look at the partial symtab symbols. */
41d27058 6248 {
ccefe4c4
TT
6249 struct add_partial_datum data;
6250
6251 data.completions = &completions;
6252 data.text = text;
6253 data.text_len = text_len;
6254 data.text0 = text0;
6255 data.word = word;
b1ed564a
JB
6256 data.wild_match = wild_match_p;
6257 data.encoded = encoded_p;
276d885b
GB
6258 expand_symtabs_matching (NULL, ada_complete_symbol_matcher, NULL,
6259 ALL_DOMAIN, &data);
41d27058
JB
6260 }
6261
6262 /* At this point scan through the misc symbol vectors and add each
6263 symbol you find to the list. Eventually we want to ignore
6264 anything that isn't a text symbol (everything else will be
6265 handled by the psymtab code above). */
6266
6267 ALL_MSYMBOLS (objfile, msymbol)
6268 {
6269 QUIT;
efd66ac6 6270 symbol_completion_add (&completions, MSYMBOL_LINKAGE_NAME (msymbol),
b1ed564a
JB
6271 text, text_len, text0, word, wild_match_p,
6272 encoded_p);
41d27058
JB
6273 }
6274
6275 /* Search upwards from currently selected frame (so that we can
6276 complete on local vars. */
6277
6278 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6279 {
6280 if (!BLOCK_SUPERBLOCK (b))
6281 surrounding_static_block = b; /* For elmin of dups */
6282
6283 ALL_BLOCK_SYMBOLS (b, iter, sym)
6284 {
d6565258 6285 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6286 text, text_len, text0, word,
b1ed564a 6287 wild_match_p, encoded_p);
41d27058
JB
6288 }
6289 }
6290
6291 /* Go through the symtabs and check the externs and statics for
43f3e411 6292 symbols which match. */
41d27058 6293
43f3e411 6294 ALL_COMPUNITS (objfile, s)
41d27058
JB
6295 {
6296 QUIT;
43f3e411 6297 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
41d27058
JB
6298 ALL_BLOCK_SYMBOLS (b, iter, sym)
6299 {
d6565258 6300 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6301 text, text_len, text0, word,
b1ed564a 6302 wild_match_p, encoded_p);
41d27058
JB
6303 }
6304 }
6305
43f3e411 6306 ALL_COMPUNITS (objfile, s)
41d27058
JB
6307 {
6308 QUIT;
43f3e411 6309 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
41d27058
JB
6310 /* Don't do this block twice. */
6311 if (b == surrounding_static_block)
6312 continue;
6313 ALL_BLOCK_SYMBOLS (b, iter, sym)
6314 {
d6565258 6315 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6316 text, text_len, text0, word,
b1ed564a 6317 wild_match_p, encoded_p);
41d27058
JB
6318 }
6319 }
6320
b8fea896 6321 do_cleanups (old_chain);
49c4e619 6322 return completions;
41d27058
JB
6323}
6324
963a6417 6325 /* Field Access */
96d887e8 6326
73fb9985
JB
6327/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6328 for tagged types. */
6329
6330static int
6331ada_is_dispatch_table_ptr_type (struct type *type)
6332{
0d5cff50 6333 const char *name;
73fb9985
JB
6334
6335 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6336 return 0;
6337
6338 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6339 if (name == NULL)
6340 return 0;
6341
6342 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6343}
6344
ac4a2da4
JG
6345/* Return non-zero if TYPE is an interface tag. */
6346
6347static int
6348ada_is_interface_tag (struct type *type)
6349{
6350 const char *name = TYPE_NAME (type);
6351
6352 if (name == NULL)
6353 return 0;
6354
6355 return (strcmp (name, "ada__tags__interface_tag") == 0);
6356}
6357
963a6417
PH
6358/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6359 to be invisible to users. */
96d887e8 6360
963a6417
PH
6361int
6362ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6363{
963a6417
PH
6364 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6365 return 1;
ffde82bf 6366
73fb9985
JB
6367 /* Check the name of that field. */
6368 {
6369 const char *name = TYPE_FIELD_NAME (type, field_num);
6370
6371 /* Anonymous field names should not be printed.
6372 brobecker/2007-02-20: I don't think this can actually happen
6373 but we don't want to print the value of annonymous fields anyway. */
6374 if (name == NULL)
6375 return 1;
6376
ffde82bf
JB
6377 /* Normally, fields whose name start with an underscore ("_")
6378 are fields that have been internally generated by the compiler,
6379 and thus should not be printed. The "_parent" field is special,
6380 however: This is a field internally generated by the compiler
6381 for tagged types, and it contains the components inherited from
6382 the parent type. This field should not be printed as is, but
6383 should not be ignored either. */
61012eef 6384 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6385 return 1;
6386 }
6387
ac4a2da4
JG
6388 /* If this is the dispatch table of a tagged type or an interface tag,
6389 then ignore. */
73fb9985 6390 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6391 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6392 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6393 return 1;
6394
6395 /* Not a special field, so it should not be ignored. */
6396 return 0;
963a6417 6397}
96d887e8 6398
963a6417 6399/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6400 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6401
963a6417
PH
6402int
6403ada_is_tagged_type (struct type *type, int refok)
6404{
6405 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1, NULL) != NULL);
6406}
96d887e8 6407
963a6417 6408/* True iff TYPE represents the type of X'Tag */
96d887e8 6409
963a6417
PH
6410int
6411ada_is_tag_type (struct type *type)
6412{
460efde1
JB
6413 type = ada_check_typedef (type);
6414
963a6417
PH
6415 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6416 return 0;
6417 else
96d887e8 6418 {
963a6417 6419 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6420
963a6417
PH
6421 return (name != NULL
6422 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6423 }
96d887e8
PH
6424}
6425
963a6417 6426/* The type of the tag on VAL. */
76a01679 6427
963a6417
PH
6428struct type *
6429ada_tag_type (struct value *val)
96d887e8 6430{
df407dfe 6431 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0, NULL);
963a6417 6432}
96d887e8 6433
b50d69b5
JG
6434/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6435 retired at Ada 05). */
6436
6437static int
6438is_ada95_tag (struct value *tag)
6439{
6440 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6441}
6442
963a6417 6443/* The value of the tag on VAL. */
96d887e8 6444
963a6417
PH
6445struct value *
6446ada_value_tag (struct value *val)
6447{
03ee6b2e 6448 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6449}
6450
963a6417
PH
6451/* The value of the tag on the object of type TYPE whose contents are
6452 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6453 ADDRESS. */
96d887e8 6454
963a6417 6455static struct value *
10a2c479 6456value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6457 const gdb_byte *valaddr,
963a6417 6458 CORE_ADDR address)
96d887e8 6459{
b5385fc0 6460 int tag_byte_offset;
963a6417 6461 struct type *tag_type;
5b4ee69b 6462
963a6417 6463 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6464 NULL, NULL, NULL))
96d887e8 6465 {
fc1a4b47 6466 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6467 ? NULL
6468 : valaddr + tag_byte_offset);
963a6417 6469 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6470
963a6417 6471 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6472 }
963a6417
PH
6473 return NULL;
6474}
96d887e8 6475
963a6417
PH
6476static struct type *
6477type_from_tag (struct value *tag)
6478{
6479 const char *type_name = ada_tag_name (tag);
5b4ee69b 6480
963a6417
PH
6481 if (type_name != NULL)
6482 return ada_find_any_type (ada_encode (type_name));
6483 return NULL;
6484}
96d887e8 6485
b50d69b5
JG
6486/* Given a value OBJ of a tagged type, return a value of this
6487 type at the base address of the object. The base address, as
6488 defined in Ada.Tags, it is the address of the primary tag of
6489 the object, and therefore where the field values of its full
6490 view can be fetched. */
6491
6492struct value *
6493ada_tag_value_at_base_address (struct value *obj)
6494{
b50d69b5
JG
6495 struct value *val;
6496 LONGEST offset_to_top = 0;
6497 struct type *ptr_type, *obj_type;
6498 struct value *tag;
6499 CORE_ADDR base_address;
6500
6501 obj_type = value_type (obj);
6502
6503 /* It is the responsability of the caller to deref pointers. */
6504
6505 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6506 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6507 return obj;
6508
6509 tag = ada_value_tag (obj);
6510 if (!tag)
6511 return obj;
6512
6513 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6514
6515 if (is_ada95_tag (tag))
6516 return obj;
6517
6518 ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
6519 ptr_type = lookup_pointer_type (ptr_type);
6520 val = value_cast (ptr_type, tag);
6521 if (!val)
6522 return obj;
6523
6524 /* It is perfectly possible that an exception be raised while
6525 trying to determine the base address, just like for the tag;
6526 see ada_tag_name for more details. We do not print the error
6527 message for the same reason. */
6528
492d29ea 6529 TRY
b50d69b5
JG
6530 {
6531 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6532 }
6533
492d29ea
PA
6534 CATCH (e, RETURN_MASK_ERROR)
6535 {
6536 return obj;
6537 }
6538 END_CATCH
b50d69b5
JG
6539
6540 /* If offset is null, nothing to do. */
6541
6542 if (offset_to_top == 0)
6543 return obj;
6544
6545 /* -1 is a special case in Ada.Tags; however, what should be done
6546 is not quite clear from the documentation. So do nothing for
6547 now. */
6548
6549 if (offset_to_top == -1)
6550 return obj;
6551
6552 base_address = value_address (obj) - offset_to_top;
6553 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6554
6555 /* Make sure that we have a proper tag at the new address.
6556 Otherwise, offset_to_top is bogus (which can happen when
6557 the object is not initialized yet). */
6558
6559 if (!tag)
6560 return obj;
6561
6562 obj_type = type_from_tag (tag);
6563
6564 if (!obj_type)
6565 return obj;
6566
6567 return value_from_contents_and_address (obj_type, NULL, base_address);
6568}
6569
1b611343
JB
6570/* Return the "ada__tags__type_specific_data" type. */
6571
6572static struct type *
6573ada_get_tsd_type (struct inferior *inf)
963a6417 6574{
1b611343 6575 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6576
1b611343
JB
6577 if (data->tsd_type == 0)
6578 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6579 return data->tsd_type;
6580}
529cad9c 6581
1b611343
JB
6582/* Return the TSD (type-specific data) associated to the given TAG.
6583 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6584
1b611343 6585 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6586
1b611343
JB
6587static struct value *
6588ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6589{
4c4b4cd2 6590 struct value *val;
1b611343 6591 struct type *type;
5b4ee69b 6592
1b611343
JB
6593 /* First option: The TSD is simply stored as a field of our TAG.
6594 Only older versions of GNAT would use this format, but we have
6595 to test it first, because there are no visible markers for
6596 the current approach except the absence of that field. */
529cad9c 6597
1b611343
JB
6598 val = ada_value_struct_elt (tag, "tsd", 1);
6599 if (val)
6600 return val;
e802dbe0 6601
1b611343
JB
6602 /* Try the second representation for the dispatch table (in which
6603 there is no explicit 'tsd' field in the referent of the tag pointer,
6604 and instead the tsd pointer is stored just before the dispatch
6605 table. */
e802dbe0 6606
1b611343
JB
6607 type = ada_get_tsd_type (current_inferior());
6608 if (type == NULL)
6609 return NULL;
6610 type = lookup_pointer_type (lookup_pointer_type (type));
6611 val = value_cast (type, tag);
6612 if (val == NULL)
6613 return NULL;
6614 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6615}
6616
1b611343
JB
6617/* Given the TSD of a tag (type-specific data), return a string
6618 containing the name of the associated type.
6619
6620 The returned value is good until the next call. May return NULL
6621 if we are unable to determine the tag name. */
6622
6623static char *
6624ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6625{
529cad9c
PH
6626 static char name[1024];
6627 char *p;
1b611343 6628 struct value *val;
529cad9c 6629
1b611343 6630 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6631 if (val == NULL)
1b611343 6632 return NULL;
4c4b4cd2
PH
6633 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6634 for (p = name; *p != '\0'; p += 1)
6635 if (isalpha (*p))
6636 *p = tolower (*p);
1b611343 6637 return name;
4c4b4cd2
PH
6638}
6639
6640/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6641 a C string.
6642
6643 Return NULL if the TAG is not an Ada tag, or if we were unable to
6644 determine the name of that tag. The result is good until the next
6645 call. */
4c4b4cd2
PH
6646
6647const char *
6648ada_tag_name (struct value *tag)
6649{
1b611343 6650 char *name = NULL;
5b4ee69b 6651
df407dfe 6652 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6653 return NULL;
1b611343
JB
6654
6655 /* It is perfectly possible that an exception be raised while trying
6656 to determine the TAG's name, even under normal circumstances:
6657 The associated variable may be uninitialized or corrupted, for
6658 instance. We do not let any exception propagate past this point.
6659 instead we return NULL.
6660
6661 We also do not print the error message either (which often is very
6662 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6663 the caller print a more meaningful message if necessary. */
492d29ea 6664 TRY
1b611343
JB
6665 {
6666 struct value *tsd = ada_get_tsd_from_tag (tag);
6667
6668 if (tsd != NULL)
6669 name = ada_tag_name_from_tsd (tsd);
6670 }
492d29ea
PA
6671 CATCH (e, RETURN_MASK_ERROR)
6672 {
6673 }
6674 END_CATCH
1b611343
JB
6675
6676 return name;
4c4b4cd2
PH
6677}
6678
6679/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6680
d2e4a39e 6681struct type *
ebf56fd3 6682ada_parent_type (struct type *type)
14f9c5c9
AS
6683{
6684 int i;
6685
61ee279c 6686 type = ada_check_typedef (type);
14f9c5c9
AS
6687
6688 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6689 return NULL;
6690
6691 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6692 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6693 {
6694 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6695
6696 /* If the _parent field is a pointer, then dereference it. */
6697 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6698 parent_type = TYPE_TARGET_TYPE (parent_type);
6699 /* If there is a parallel XVS type, get the actual base type. */
6700 parent_type = ada_get_base_type (parent_type);
6701
6702 return ada_check_typedef (parent_type);
6703 }
14f9c5c9
AS
6704
6705 return NULL;
6706}
6707
4c4b4cd2
PH
6708/* True iff field number FIELD_NUM of structure type TYPE contains the
6709 parent-type (inherited) fields of a derived type. Assumes TYPE is
6710 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6711
6712int
ebf56fd3 6713ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6714{
61ee279c 6715 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6716
4c4b4cd2 6717 return (name != NULL
61012eef
GB
6718 && (startswith (name, "PARENT")
6719 || startswith (name, "_parent")));
14f9c5c9
AS
6720}
6721
4c4b4cd2 6722/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6723 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6724 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6725 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6726 structures. */
14f9c5c9
AS
6727
6728int
ebf56fd3 6729ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6730{
d2e4a39e 6731 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6732
d2e4a39e 6733 return (name != NULL
61012eef 6734 && (startswith (name, "PARENT")
4c4b4cd2 6735 || strcmp (name, "REP") == 0
61012eef 6736 || startswith (name, "_parent")
4c4b4cd2 6737 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6738}
6739
4c4b4cd2
PH
6740/* True iff field number FIELD_NUM of structure or union type TYPE
6741 is a variant wrapper. Assumes TYPE is a structure type with at least
6742 FIELD_NUM+1 fields. */
14f9c5c9
AS
6743
6744int
ebf56fd3 6745ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6746{
d2e4a39e 6747 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6748
14f9c5c9 6749 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6750 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6751 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6752 == TYPE_CODE_UNION)));
14f9c5c9
AS
6753}
6754
6755/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6756 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6757 returns the type of the controlling discriminant for the variant.
6758 May return NULL if the type could not be found. */
14f9c5c9 6759
d2e4a39e 6760struct type *
ebf56fd3 6761ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6762{
d2e4a39e 6763 char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6764
7c964f07 6765 return ada_lookup_struct_elt_type (outer_type, name, 1, 1, NULL);
14f9c5c9
AS
6766}
6767
4c4b4cd2 6768/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6769 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6770 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6771
6772int
ebf56fd3 6773ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6774{
d2e4a39e 6775 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6776
14f9c5c9
AS
6777 return (name != NULL && name[0] == 'O');
6778}
6779
6780/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6781 returns the name of the discriminant controlling the variant.
6782 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6783
d2e4a39e 6784char *
ebf56fd3 6785ada_variant_discrim_name (struct type *type0)
14f9c5c9 6786{
d2e4a39e 6787 static char *result = NULL;
14f9c5c9 6788 static size_t result_len = 0;
d2e4a39e
AS
6789 struct type *type;
6790 const char *name;
6791 const char *discrim_end;
6792 const char *discrim_start;
14f9c5c9
AS
6793
6794 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6795 type = TYPE_TARGET_TYPE (type0);
6796 else
6797 type = type0;
6798
6799 name = ada_type_name (type);
6800
6801 if (name == NULL || name[0] == '\000')
6802 return "";
6803
6804 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6805 discrim_end -= 1)
6806 {
61012eef 6807 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6808 break;
14f9c5c9
AS
6809 }
6810 if (discrim_end == name)
6811 return "";
6812
d2e4a39e 6813 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6814 discrim_start -= 1)
6815 {
d2e4a39e 6816 if (discrim_start == name + 1)
4c4b4cd2 6817 return "";
76a01679 6818 if ((discrim_start > name + 3
61012eef 6819 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
6820 || discrim_start[-1] == '.')
6821 break;
14f9c5c9
AS
6822 }
6823
6824 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6825 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6826 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6827 return result;
6828}
6829
4c4b4cd2
PH
6830/* Scan STR for a subtype-encoded number, beginning at position K.
6831 Put the position of the character just past the number scanned in
6832 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6833 Return 1 if there was a valid number at the given position, and 0
6834 otherwise. A "subtype-encoded" number consists of the absolute value
6835 in decimal, followed by the letter 'm' to indicate a negative number.
6836 Assumes 0m does not occur. */
14f9c5c9
AS
6837
6838int
d2e4a39e 6839ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6840{
6841 ULONGEST RU;
6842
d2e4a39e 6843 if (!isdigit (str[k]))
14f9c5c9
AS
6844 return 0;
6845
4c4b4cd2 6846 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6847 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6848 LONGEST. */
14f9c5c9
AS
6849 RU = 0;
6850 while (isdigit (str[k]))
6851 {
d2e4a39e 6852 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6853 k += 1;
6854 }
6855
d2e4a39e 6856 if (str[k] == 'm')
14f9c5c9
AS
6857 {
6858 if (R != NULL)
4c4b4cd2 6859 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6860 k += 1;
6861 }
6862 else if (R != NULL)
6863 *R = (LONGEST) RU;
6864
4c4b4cd2 6865 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6866 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6867 number representable as a LONGEST (although either would probably work
6868 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6869 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6870
6871 if (new_k != NULL)
6872 *new_k = k;
6873 return 1;
6874}
6875
4c4b4cd2
PH
6876/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6877 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6878 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6879
d2e4a39e 6880int
ebf56fd3 6881ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6882{
d2e4a39e 6883 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6884 int p;
6885
6886 p = 0;
6887 while (1)
6888 {
d2e4a39e 6889 switch (name[p])
4c4b4cd2
PH
6890 {
6891 case '\0':
6892 return 0;
6893 case 'S':
6894 {
6895 LONGEST W;
5b4ee69b 6896
4c4b4cd2
PH
6897 if (!ada_scan_number (name, p + 1, &W, &p))
6898 return 0;
6899 if (val == W)
6900 return 1;
6901 break;
6902 }
6903 case 'R':
6904 {
6905 LONGEST L, U;
5b4ee69b 6906
4c4b4cd2
PH
6907 if (!ada_scan_number (name, p + 1, &L, &p)
6908 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6909 return 0;
6910 if (val >= L && val <= U)
6911 return 1;
6912 break;
6913 }
6914 case 'O':
6915 return 1;
6916 default:
6917 return 0;
6918 }
6919 }
6920}
6921
0963b4bd 6922/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6923
6924/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6925 ARG_TYPE, extract and return the value of one of its (non-static)
6926 fields. FIELDNO says which field. Differs from value_primitive_field
6927 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6928
4c4b4cd2 6929static struct value *
d2e4a39e 6930ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 6931 struct type *arg_type)
14f9c5c9 6932{
14f9c5c9
AS
6933 struct type *type;
6934
61ee279c 6935 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
6936 type = TYPE_FIELD_TYPE (arg_type, fieldno);
6937
4c4b4cd2 6938 /* Handle packed fields. */
14f9c5c9
AS
6939
6940 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0)
6941 {
6942 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6943 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6944
0fd88904 6945 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
6946 offset + bit_pos / 8,
6947 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6948 }
6949 else
6950 return value_primitive_field (arg1, offset, fieldno, arg_type);
6951}
6952
52ce6436
PH
6953/* Find field with name NAME in object of type TYPE. If found,
6954 set the following for each argument that is non-null:
6955 - *FIELD_TYPE_P to the field's type;
6956 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6957 an object of that type;
6958 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6959 - *BIT_SIZE_P to its size in bits if the field is packed, and
6960 0 otherwise;
6961 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6962 fields up to but not including the desired field, or by the total
6963 number of fields if not found. A NULL value of NAME never
6964 matches; the function just counts visible fields in this case.
6965
0963b4bd 6966 Returns 1 if found, 0 otherwise. */
52ce6436 6967
4c4b4cd2 6968static int
0d5cff50 6969find_struct_field (const char *name, struct type *type, int offset,
76a01679 6970 struct type **field_type_p,
52ce6436
PH
6971 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
6972 int *index_p)
4c4b4cd2
PH
6973{
6974 int i;
6975
61ee279c 6976 type = ada_check_typedef (type);
76a01679 6977
52ce6436
PH
6978 if (field_type_p != NULL)
6979 *field_type_p = NULL;
6980 if (byte_offset_p != NULL)
d5d6fca5 6981 *byte_offset_p = 0;
52ce6436
PH
6982 if (bit_offset_p != NULL)
6983 *bit_offset_p = 0;
6984 if (bit_size_p != NULL)
6985 *bit_size_p = 0;
6986
6987 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
6988 {
6989 int bit_pos = TYPE_FIELD_BITPOS (type, i);
6990 int fld_offset = offset + bit_pos / 8;
0d5cff50 6991 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 6992
4c4b4cd2
PH
6993 if (t_field_name == NULL)
6994 continue;
6995
52ce6436 6996 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
6997 {
6998 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 6999
52ce6436
PH
7000 if (field_type_p != NULL)
7001 *field_type_p = TYPE_FIELD_TYPE (type, i);
7002 if (byte_offset_p != NULL)
7003 *byte_offset_p = fld_offset;
7004 if (bit_offset_p != NULL)
7005 *bit_offset_p = bit_pos % 8;
7006 if (bit_size_p != NULL)
7007 *bit_size_p = bit_size;
76a01679
JB
7008 return 1;
7009 }
4c4b4cd2
PH
7010 else if (ada_is_wrapper_field (type, i))
7011 {
52ce6436
PH
7012 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7013 field_type_p, byte_offset_p, bit_offset_p,
7014 bit_size_p, index_p))
76a01679
JB
7015 return 1;
7016 }
4c4b4cd2
PH
7017 else if (ada_is_variant_part (type, i))
7018 {
52ce6436
PH
7019 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7020 fixed type?? */
4c4b4cd2 7021 int j;
52ce6436
PH
7022 struct type *field_type
7023 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7024
52ce6436 7025 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7026 {
76a01679
JB
7027 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7028 fld_offset
7029 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7030 field_type_p, byte_offset_p,
52ce6436 7031 bit_offset_p, bit_size_p, index_p))
76a01679 7032 return 1;
4c4b4cd2
PH
7033 }
7034 }
52ce6436
PH
7035 else if (index_p != NULL)
7036 *index_p += 1;
4c4b4cd2
PH
7037 }
7038 return 0;
7039}
7040
0963b4bd 7041/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7042
52ce6436
PH
7043static int
7044num_visible_fields (struct type *type)
7045{
7046 int n;
5b4ee69b 7047
52ce6436
PH
7048 n = 0;
7049 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7050 return n;
7051}
14f9c5c9 7052
4c4b4cd2 7053/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7054 and search in it assuming it has (class) type TYPE.
7055 If found, return value, else return NULL.
7056
4c4b4cd2 7057 Searches recursively through wrapper fields (e.g., '_parent'). */
14f9c5c9 7058
4c4b4cd2 7059static struct value *
d2e4a39e 7060ada_search_struct_field (char *name, struct value *arg, int offset,
4c4b4cd2 7061 struct type *type)
14f9c5c9
AS
7062{
7063 int i;
14f9c5c9 7064
5b4ee69b 7065 type = ada_check_typedef (type);
52ce6436 7066 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7067 {
0d5cff50 7068 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7069
7070 if (t_field_name == NULL)
4c4b4cd2 7071 continue;
14f9c5c9
AS
7072
7073 else if (field_name_match (t_field_name, name))
4c4b4cd2 7074 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7075
7076 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7077 {
0963b4bd 7078 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7079 ada_search_struct_field (name, arg,
7080 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7081 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7082
4c4b4cd2
PH
7083 if (v != NULL)
7084 return v;
7085 }
14f9c5c9
AS
7086
7087 else if (ada_is_variant_part (type, i))
4c4b4cd2 7088 {
0963b4bd 7089 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7090 int j;
5b4ee69b
MS
7091 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7092 i));
4c4b4cd2
PH
7093 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7094
52ce6436 7095 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7096 {
0963b4bd
MS
7097 struct value *v = ada_search_struct_field /* Force line
7098 break. */
06d5cf63
JB
7099 (name, arg,
7100 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7101 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7102
4c4b4cd2
PH
7103 if (v != NULL)
7104 return v;
7105 }
7106 }
14f9c5c9
AS
7107 }
7108 return NULL;
7109}
d2e4a39e 7110
52ce6436
PH
7111static struct value *ada_index_struct_field_1 (int *, struct value *,
7112 int, struct type *);
7113
7114
7115/* Return field #INDEX in ARG, where the index is that returned by
7116 * find_struct_field through its INDEX_P argument. Adjust the address
7117 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7118 * If found, return value, else return NULL. */
52ce6436
PH
7119
7120static struct value *
7121ada_index_struct_field (int index, struct value *arg, int offset,
7122 struct type *type)
7123{
7124 return ada_index_struct_field_1 (&index, arg, offset, type);
7125}
7126
7127
7128/* Auxiliary function for ada_index_struct_field. Like
7129 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7130 * *INDEX_P. */
52ce6436
PH
7131
7132static struct value *
7133ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7134 struct type *type)
7135{
7136 int i;
7137 type = ada_check_typedef (type);
7138
7139 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7140 {
7141 if (TYPE_FIELD_NAME (type, i) == NULL)
7142 continue;
7143 else if (ada_is_wrapper_field (type, i))
7144 {
0963b4bd 7145 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7146 ada_index_struct_field_1 (index_p, arg,
7147 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7148 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7149
52ce6436
PH
7150 if (v != NULL)
7151 return v;
7152 }
7153
7154 else if (ada_is_variant_part (type, i))
7155 {
7156 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7157 find_struct_field. */
52ce6436
PH
7158 error (_("Cannot assign this kind of variant record"));
7159 }
7160 else if (*index_p == 0)
7161 return ada_value_primitive_field (arg, offset, i, type);
7162 else
7163 *index_p -= 1;
7164 }
7165 return NULL;
7166}
7167
4c4b4cd2
PH
7168/* Given ARG, a value of type (pointer or reference to a)*
7169 structure/union, extract the component named NAME from the ultimate
7170 target structure/union and return it as a value with its
f5938064 7171 appropriate type.
14f9c5c9 7172
4c4b4cd2
PH
7173 The routine searches for NAME among all members of the structure itself
7174 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7175 (e.g., '_parent').
7176
03ee6b2e
PH
7177 If NO_ERR, then simply return NULL in case of error, rather than
7178 calling error. */
14f9c5c9 7179
d2e4a39e 7180struct value *
03ee6b2e 7181ada_value_struct_elt (struct value *arg, char *name, int no_err)
14f9c5c9 7182{
4c4b4cd2 7183 struct type *t, *t1;
d2e4a39e 7184 struct value *v;
14f9c5c9 7185
4c4b4cd2 7186 v = NULL;
df407dfe 7187 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7188 if (TYPE_CODE (t) == TYPE_CODE_REF)
7189 {
7190 t1 = TYPE_TARGET_TYPE (t);
7191 if (t1 == NULL)
03ee6b2e 7192 goto BadValue;
61ee279c 7193 t1 = ada_check_typedef (t1);
4c4b4cd2 7194 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7195 {
994b9211 7196 arg = coerce_ref (arg);
76a01679
JB
7197 t = t1;
7198 }
4c4b4cd2 7199 }
14f9c5c9 7200
4c4b4cd2
PH
7201 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7202 {
7203 t1 = TYPE_TARGET_TYPE (t);
7204 if (t1 == NULL)
03ee6b2e 7205 goto BadValue;
61ee279c 7206 t1 = ada_check_typedef (t1);
4c4b4cd2 7207 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7208 {
7209 arg = value_ind (arg);
7210 t = t1;
7211 }
4c4b4cd2 7212 else
76a01679 7213 break;
4c4b4cd2 7214 }
14f9c5c9 7215
4c4b4cd2 7216 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7217 goto BadValue;
14f9c5c9 7218
4c4b4cd2
PH
7219 if (t1 == t)
7220 v = ada_search_struct_field (name, arg, 0, t);
7221 else
7222 {
7223 int bit_offset, bit_size, byte_offset;
7224 struct type *field_type;
7225 CORE_ADDR address;
7226
76a01679 7227 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7228 address = value_address (ada_value_ind (arg));
4c4b4cd2 7229 else
b50d69b5 7230 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7231
1ed6ede0 7232 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL, address, NULL, 1);
76a01679
JB
7233 if (find_struct_field (name, t1, 0,
7234 &field_type, &byte_offset, &bit_offset,
52ce6436 7235 &bit_size, NULL))
76a01679
JB
7236 {
7237 if (bit_size != 0)
7238 {
714e53ab
PH
7239 if (TYPE_CODE (t) == TYPE_CODE_REF)
7240 arg = ada_coerce_ref (arg);
7241 else
7242 arg = ada_value_ind (arg);
76a01679
JB
7243 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7244 bit_offset, bit_size,
7245 field_type);
7246 }
7247 else
f5938064 7248 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7249 }
7250 }
7251
03ee6b2e
PH
7252 if (v != NULL || no_err)
7253 return v;
7254 else
323e0a4a 7255 error (_("There is no member named %s."), name);
14f9c5c9 7256
03ee6b2e
PH
7257 BadValue:
7258 if (no_err)
7259 return NULL;
7260 else
0963b4bd
MS
7261 error (_("Attempt to extract a component of "
7262 "a value that is not a record."));
14f9c5c9
AS
7263}
7264
7265/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7266 If DISPP is non-null, add its byte displacement from the beginning of a
7267 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7268 work for packed fields).
7269
7270 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7271 followed by "___".
14f9c5c9 7272
0963b4bd 7273 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7274 be a (pointer or reference)+ to a struct or union, and the
7275 ultimate target type will be searched.
14f9c5c9
AS
7276
7277 Looks recursively into variant clauses and parent types.
7278
4c4b4cd2
PH
7279 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7280 TYPE is not a type of the right kind. */
14f9c5c9 7281
4c4b4cd2 7282static struct type *
76a01679
JB
7283ada_lookup_struct_elt_type (struct type *type, char *name, int refok,
7284 int noerr, int *dispp)
14f9c5c9
AS
7285{
7286 int i;
7287
7288 if (name == NULL)
7289 goto BadName;
7290
76a01679 7291 if (refok && type != NULL)
4c4b4cd2
PH
7292 while (1)
7293 {
61ee279c 7294 type = ada_check_typedef (type);
76a01679
JB
7295 if (TYPE_CODE (type) != TYPE_CODE_PTR
7296 && TYPE_CODE (type) != TYPE_CODE_REF)
7297 break;
7298 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7299 }
14f9c5c9 7300
76a01679 7301 if (type == NULL
1265e4aa
JB
7302 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7303 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7304 {
4c4b4cd2 7305 if (noerr)
76a01679 7306 return NULL;
4c4b4cd2 7307 else
76a01679
JB
7308 {
7309 target_terminal_ours ();
7310 gdb_flush (gdb_stdout);
323e0a4a
AC
7311 if (type == NULL)
7312 error (_("Type (null) is not a structure or union type"));
7313 else
7314 {
7315 /* XXX: type_sprint */
7316 fprintf_unfiltered (gdb_stderr, _("Type "));
7317 type_print (type, "", gdb_stderr, -1);
7318 error (_(" is not a structure or union type"));
7319 }
76a01679 7320 }
14f9c5c9
AS
7321 }
7322
7323 type = to_static_fixed_type (type);
7324
7325 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7326 {
0d5cff50 7327 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7328 struct type *t;
7329 int disp;
d2e4a39e 7330
14f9c5c9 7331 if (t_field_name == NULL)
4c4b4cd2 7332 continue;
14f9c5c9
AS
7333
7334 else if (field_name_match (t_field_name, name))
4c4b4cd2
PH
7335 {
7336 if (dispp != NULL)
7337 *dispp += TYPE_FIELD_BITPOS (type, i) / 8;
460efde1 7338 return TYPE_FIELD_TYPE (type, i);
4c4b4cd2 7339 }
14f9c5c9
AS
7340
7341 else if (ada_is_wrapper_field (type, i))
4c4b4cd2
PH
7342 {
7343 disp = 0;
7344 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
7345 0, 1, &disp);
7346 if (t != NULL)
7347 {
7348 if (dispp != NULL)
7349 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7350 return t;
7351 }
7352 }
14f9c5c9
AS
7353
7354 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7355 {
7356 int j;
5b4ee69b
MS
7357 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7358 i));
4c4b4cd2
PH
7359
7360 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7361 {
b1f33ddd
JB
7362 /* FIXME pnh 2008/01/26: We check for a field that is
7363 NOT wrapped in a struct, since the compiler sometimes
7364 generates these for unchecked variant types. Revisit
0963b4bd 7365 if the compiler changes this practice. */
0d5cff50 7366 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
4c4b4cd2 7367 disp = 0;
b1f33ddd
JB
7368 if (v_field_name != NULL
7369 && field_name_match (v_field_name, name))
460efde1 7370 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7371 else
0963b4bd
MS
7372 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7373 j),
b1f33ddd
JB
7374 name, 0, 1, &disp);
7375
4c4b4cd2
PH
7376 if (t != NULL)
7377 {
7378 if (dispp != NULL)
7379 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7380 return t;
7381 }
7382 }
7383 }
14f9c5c9
AS
7384
7385 }
7386
7387BadName:
d2e4a39e 7388 if (!noerr)
14f9c5c9
AS
7389 {
7390 target_terminal_ours ();
7391 gdb_flush (gdb_stdout);
323e0a4a
AC
7392 if (name == NULL)
7393 {
7394 /* XXX: type_sprint */
7395 fprintf_unfiltered (gdb_stderr, _("Type "));
7396 type_print (type, "", gdb_stderr, -1);
7397 error (_(" has no component named <null>"));
7398 }
7399 else
7400 {
7401 /* XXX: type_sprint */
7402 fprintf_unfiltered (gdb_stderr, _("Type "));
7403 type_print (type, "", gdb_stderr, -1);
7404 error (_(" has no component named %s"), name);
7405 }
14f9c5c9
AS
7406 }
7407
7408 return NULL;
7409}
7410
b1f33ddd
JB
7411/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7412 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7413 represents an unchecked union (that is, the variant part of a
0963b4bd 7414 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7415
7416static int
7417is_unchecked_variant (struct type *var_type, struct type *outer_type)
7418{
7419 char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7420
b1f33ddd
JB
7421 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1, NULL)
7422 == NULL);
7423}
7424
7425
14f9c5c9
AS
7426/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7427 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7428 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7429 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7430
d2e4a39e 7431int
ebf56fd3 7432ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7433 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7434{
7435 int others_clause;
7436 int i;
d2e4a39e 7437 char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7438 struct value *outer;
7439 struct value *discrim;
14f9c5c9
AS
7440 LONGEST discrim_val;
7441
012370f6
TT
7442 /* Using plain value_from_contents_and_address here causes problems
7443 because we will end up trying to resolve a type that is currently
7444 being constructed. */
7445 outer = value_from_contents_and_address_unresolved (outer_type,
7446 outer_valaddr, 0);
0c281816
JB
7447 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7448 if (discrim == NULL)
14f9c5c9 7449 return -1;
0c281816 7450 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7451
7452 others_clause = -1;
7453 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7454 {
7455 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7456 others_clause = i;
14f9c5c9 7457 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7458 return i;
14f9c5c9
AS
7459 }
7460
7461 return others_clause;
7462}
d2e4a39e 7463\f
14f9c5c9
AS
7464
7465
4c4b4cd2 7466 /* Dynamic-Sized Records */
14f9c5c9
AS
7467
7468/* Strategy: The type ostensibly attached to a value with dynamic size
7469 (i.e., a size that is not statically recorded in the debugging
7470 data) does not accurately reflect the size or layout of the value.
7471 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7472 conventional types that are constructed on the fly. */
14f9c5c9
AS
7473
7474/* There is a subtle and tricky problem here. In general, we cannot
7475 determine the size of dynamic records without its data. However,
7476 the 'struct value' data structure, which GDB uses to represent
7477 quantities in the inferior process (the target), requires the size
7478 of the type at the time of its allocation in order to reserve space
7479 for GDB's internal copy of the data. That's why the
7480 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7481 rather than struct value*s.
14f9c5c9
AS
7482
7483 However, GDB's internal history variables ($1, $2, etc.) are
7484 struct value*s containing internal copies of the data that are not, in
7485 general, the same as the data at their corresponding addresses in
7486 the target. Fortunately, the types we give to these values are all
7487 conventional, fixed-size types (as per the strategy described
7488 above), so that we don't usually have to perform the
7489 'to_fixed_xxx_type' conversions to look at their values.
7490 Unfortunately, there is one exception: if one of the internal
7491 history variables is an array whose elements are unconstrained
7492 records, then we will need to create distinct fixed types for each
7493 element selected. */
7494
7495/* The upshot of all of this is that many routines take a (type, host
7496 address, target address) triple as arguments to represent a value.
7497 The host address, if non-null, is supposed to contain an internal
7498 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7499 target at the target address. */
14f9c5c9
AS
7500
7501/* Assuming that VAL0 represents a pointer value, the result of
7502 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7503 dynamic-sized types. */
14f9c5c9 7504
d2e4a39e
AS
7505struct value *
7506ada_value_ind (struct value *val0)
14f9c5c9 7507{
c48db5ca 7508 struct value *val = value_ind (val0);
5b4ee69b 7509
b50d69b5
JG
7510 if (ada_is_tagged_type (value_type (val), 0))
7511 val = ada_tag_value_at_base_address (val);
7512
4c4b4cd2 7513 return ada_to_fixed_value (val);
14f9c5c9
AS
7514}
7515
7516/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7517 qualifiers on VAL0. */
7518
d2e4a39e
AS
7519static struct value *
7520ada_coerce_ref (struct value *val0)
7521{
df407dfe 7522 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7523 {
7524 struct value *val = val0;
5b4ee69b 7525
994b9211 7526 val = coerce_ref (val);
b50d69b5
JG
7527
7528 if (ada_is_tagged_type (value_type (val), 0))
7529 val = ada_tag_value_at_base_address (val);
7530
4c4b4cd2 7531 return ada_to_fixed_value (val);
d2e4a39e
AS
7532 }
7533 else
14f9c5c9
AS
7534 return val0;
7535}
7536
7537/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7538 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7539
7540static unsigned int
ebf56fd3 7541align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7542{
7543 return (off + alignment - 1) & ~(alignment - 1);
7544}
7545
4c4b4cd2 7546/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7547
7548static unsigned int
ebf56fd3 7549field_alignment (struct type *type, int f)
14f9c5c9 7550{
d2e4a39e 7551 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7552 int len;
14f9c5c9
AS
7553 int align_offset;
7554
64a1bf19
JB
7555 /* The field name should never be null, unless the debugging information
7556 is somehow malformed. In this case, we assume the field does not
7557 require any alignment. */
7558 if (name == NULL)
7559 return 1;
7560
7561 len = strlen (name);
7562
4c4b4cd2
PH
7563 if (!isdigit (name[len - 1]))
7564 return 1;
14f9c5c9 7565
d2e4a39e 7566 if (isdigit (name[len - 2]))
14f9c5c9
AS
7567 align_offset = len - 2;
7568 else
7569 align_offset = len - 1;
7570
61012eef 7571 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7572 return TARGET_CHAR_BIT;
7573
4c4b4cd2
PH
7574 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7575}
7576
852dff6c 7577/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7578
852dff6c
JB
7579static struct symbol *
7580ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7581{
7582 struct symbol *sym;
7583
7584 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7585 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7586 return sym;
7587
4186eb54
KS
7588 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7589 return sym;
14f9c5c9
AS
7590}
7591
dddfab26
UW
7592/* Find a type named NAME. Ignores ambiguity. This routine will look
7593 solely for types defined by debug info, it will not search the GDB
7594 primitive types. */
4c4b4cd2 7595
852dff6c 7596static struct type *
ebf56fd3 7597ada_find_any_type (const char *name)
14f9c5c9 7598{
852dff6c 7599 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7600
14f9c5c9 7601 if (sym != NULL)
dddfab26 7602 return SYMBOL_TYPE (sym);
14f9c5c9 7603
dddfab26 7604 return NULL;
14f9c5c9
AS
7605}
7606
739593e0
JB
7607/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7608 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7609 symbol, in which case it is returned. Otherwise, this looks for
7610 symbols whose name is that of NAME_SYM suffixed with "___XR".
7611 Return symbol if found, and NULL otherwise. */
4c4b4cd2
PH
7612
7613struct symbol *
270140bd 7614ada_find_renaming_symbol (struct symbol *name_sym, const struct block *block)
aeb5907d 7615{
739593e0 7616 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
aeb5907d
JB
7617 struct symbol *sym;
7618
739593e0
JB
7619 if (strstr (name, "___XR") != NULL)
7620 return name_sym;
7621
aeb5907d
JB
7622 sym = find_old_style_renaming_symbol (name, block);
7623
7624 if (sym != NULL)
7625 return sym;
7626
0963b4bd 7627 /* Not right yet. FIXME pnh 7/20/2007. */
852dff6c 7628 sym = ada_find_any_type_symbol (name);
aeb5907d
JB
7629 if (sym != NULL && strstr (SYMBOL_LINKAGE_NAME (sym), "___XR") != NULL)
7630 return sym;
7631 else
7632 return NULL;
7633}
7634
7635static struct symbol *
270140bd 7636find_old_style_renaming_symbol (const char *name, const struct block *block)
4c4b4cd2 7637{
7f0df278 7638 const struct symbol *function_sym = block_linkage_function (block);
4c4b4cd2
PH
7639 char *rename;
7640
7641 if (function_sym != NULL)
7642 {
7643 /* If the symbol is defined inside a function, NAME is not fully
7644 qualified. This means we need to prepend the function name
7645 as well as adding the ``___XR'' suffix to build the name of
7646 the associated renaming symbol. */
0d5cff50 7647 const char *function_name = SYMBOL_LINKAGE_NAME (function_sym);
529cad9c
PH
7648 /* Function names sometimes contain suffixes used
7649 for instance to qualify nested subprograms. When building
7650 the XR type name, we need to make sure that this suffix is
7651 not included. So do not include any suffix in the function
7652 name length below. */
69fadcdf 7653 int function_name_len = ada_name_prefix_len (function_name);
76a01679
JB
7654 const int rename_len = function_name_len + 2 /* "__" */
7655 + strlen (name) + 6 /* "___XR\0" */ ;
4c4b4cd2 7656
529cad9c 7657 /* Strip the suffix if necessary. */
69fadcdf
JB
7658 ada_remove_trailing_digits (function_name, &function_name_len);
7659 ada_remove_po_subprogram_suffix (function_name, &function_name_len);
7660 ada_remove_Xbn_suffix (function_name, &function_name_len);
529cad9c 7661
4c4b4cd2
PH
7662 /* Library-level functions are a special case, as GNAT adds
7663 a ``_ada_'' prefix to the function name to avoid namespace
aeb5907d 7664 pollution. However, the renaming symbols themselves do not
4c4b4cd2
PH
7665 have this prefix, so we need to skip this prefix if present. */
7666 if (function_name_len > 5 /* "_ada_" */
7667 && strstr (function_name, "_ada_") == function_name)
69fadcdf
JB
7668 {
7669 function_name += 5;
7670 function_name_len -= 5;
7671 }
4c4b4cd2
PH
7672
7673 rename = (char *) alloca (rename_len * sizeof (char));
69fadcdf
JB
7674 strncpy (rename, function_name, function_name_len);
7675 xsnprintf (rename + function_name_len, rename_len - function_name_len,
7676 "__%s___XR", name);
4c4b4cd2
PH
7677 }
7678 else
7679 {
7680 const int rename_len = strlen (name) + 6;
5b4ee69b 7681
4c4b4cd2 7682 rename = (char *) alloca (rename_len * sizeof (char));
88c15c34 7683 xsnprintf (rename, rename_len * sizeof (char), "%s___XR", name);
4c4b4cd2
PH
7684 }
7685
852dff6c 7686 return ada_find_any_type_symbol (rename);
4c4b4cd2
PH
7687}
7688
14f9c5c9 7689/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7690 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7691 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7692 otherwise return 0. */
7693
14f9c5c9 7694int
d2e4a39e 7695ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7696{
7697 if (type1 == NULL)
7698 return 1;
7699 else if (type0 == NULL)
7700 return 0;
7701 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7702 return 1;
7703 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7704 return 0;
4c4b4cd2
PH
7705 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7706 return 1;
ad82864c 7707 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7708 return 1;
4c4b4cd2
PH
7709 else if (ada_is_array_descriptor_type (type0)
7710 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7711 return 1;
aeb5907d
JB
7712 else
7713 {
7714 const char *type0_name = type_name_no_tag (type0);
7715 const char *type1_name = type_name_no_tag (type1);
7716
7717 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7718 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7719 return 1;
7720 }
14f9c5c9
AS
7721 return 0;
7722}
7723
7724/* The name of TYPE, which is either its TYPE_NAME, or, if that is
4c4b4cd2
PH
7725 null, its TYPE_TAG_NAME. Null if TYPE is null. */
7726
0d5cff50 7727const char *
d2e4a39e 7728ada_type_name (struct type *type)
14f9c5c9 7729{
d2e4a39e 7730 if (type == NULL)
14f9c5c9
AS
7731 return NULL;
7732 else if (TYPE_NAME (type) != NULL)
7733 return TYPE_NAME (type);
7734 else
7735 return TYPE_TAG_NAME (type);
7736}
7737
b4ba55a1
JB
7738/* Search the list of "descriptive" types associated to TYPE for a type
7739 whose name is NAME. */
7740
7741static struct type *
7742find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7743{
7744 struct type *result;
7745
c6044dd1
JB
7746 if (ada_ignore_descriptive_types_p)
7747 return NULL;
7748
b4ba55a1
JB
7749 /* If there no descriptive-type info, then there is no parallel type
7750 to be found. */
7751 if (!HAVE_GNAT_AUX_INFO (type))
7752 return NULL;
7753
7754 result = TYPE_DESCRIPTIVE_TYPE (type);
7755 while (result != NULL)
7756 {
0d5cff50 7757 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7758
7759 if (result_name == NULL)
7760 {
7761 warning (_("unexpected null name on descriptive type"));
7762 return NULL;
7763 }
7764
7765 /* If the names match, stop. */
7766 if (strcmp (result_name, name) == 0)
7767 break;
7768
7769 /* Otherwise, look at the next item on the list, if any. */
7770 if (HAVE_GNAT_AUX_INFO (result))
7771 result = TYPE_DESCRIPTIVE_TYPE (result);
7772 else
7773 result = NULL;
7774 }
7775
7776 /* If we didn't find a match, see whether this is a packed array. With
7777 older compilers, the descriptive type information is either absent or
7778 irrelevant when it comes to packed arrays so the above lookup fails.
7779 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7780 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7781 return ada_find_any_type (name);
7782
7783 return result;
7784}
7785
7786/* Find a parallel type to TYPE with the specified NAME, using the
7787 descriptive type taken from the debugging information, if available,
7788 and otherwise using the (slower) name-based method. */
7789
7790static struct type *
7791ada_find_parallel_type_with_name (struct type *type, const char *name)
7792{
7793 struct type *result = NULL;
7794
7795 if (HAVE_GNAT_AUX_INFO (type))
7796 result = find_parallel_type_by_descriptive_type (type, name);
7797 else
7798 result = ada_find_any_type (name);
7799
7800 return result;
7801}
7802
7803/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7804 SUFFIX to the name of TYPE. */
14f9c5c9 7805
d2e4a39e 7806struct type *
ebf56fd3 7807ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7808{
0d5cff50 7809 char *name;
fe978cb0 7810 const char *type_name = ada_type_name (type);
14f9c5c9 7811 int len;
d2e4a39e 7812
fe978cb0 7813 if (type_name == NULL)
14f9c5c9
AS
7814 return NULL;
7815
fe978cb0 7816 len = strlen (type_name);
14f9c5c9 7817
b4ba55a1 7818 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7819
fe978cb0 7820 strcpy (name, type_name);
14f9c5c9
AS
7821 strcpy (name + len, suffix);
7822
b4ba55a1 7823 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7824}
7825
14f9c5c9 7826/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7827 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7828
d2e4a39e
AS
7829static struct type *
7830dynamic_template_type (struct type *type)
14f9c5c9 7831{
61ee279c 7832 type = ada_check_typedef (type);
14f9c5c9
AS
7833
7834 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7835 || ada_type_name (type) == NULL)
14f9c5c9 7836 return NULL;
d2e4a39e 7837 else
14f9c5c9
AS
7838 {
7839 int len = strlen (ada_type_name (type));
5b4ee69b 7840
4c4b4cd2
PH
7841 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7842 return type;
14f9c5c9 7843 else
4c4b4cd2 7844 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7845 }
7846}
7847
7848/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7849 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7850
d2e4a39e
AS
7851static int
7852is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7853{
7854 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7855
d2e4a39e 7856 return name != NULL
14f9c5c9
AS
7857 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
7858 && strstr (name, "___XVL") != NULL;
7859}
7860
4c4b4cd2
PH
7861/* The index of the variant field of TYPE, or -1 if TYPE does not
7862 represent a variant record type. */
14f9c5c9 7863
d2e4a39e 7864static int
4c4b4cd2 7865variant_field_index (struct type *type)
14f9c5c9
AS
7866{
7867 int f;
7868
4c4b4cd2
PH
7869 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
7870 return -1;
7871
7872 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
7873 {
7874 if (ada_is_variant_part (type, f))
7875 return f;
7876 }
7877 return -1;
14f9c5c9
AS
7878}
7879
4c4b4cd2
PH
7880/* A record type with no fields. */
7881
d2e4a39e 7882static struct type *
fe978cb0 7883empty_record (struct type *templ)
14f9c5c9 7884{
fe978cb0 7885 struct type *type = alloc_type_copy (templ);
5b4ee69b 7886
14f9c5c9
AS
7887 TYPE_CODE (type) = TYPE_CODE_STRUCT;
7888 TYPE_NFIELDS (type) = 0;
7889 TYPE_FIELDS (type) = NULL;
b1f33ddd 7890 INIT_CPLUS_SPECIFIC (type);
14f9c5c9
AS
7891 TYPE_NAME (type) = "<empty>";
7892 TYPE_TAG_NAME (type) = NULL;
14f9c5c9
AS
7893 TYPE_LENGTH (type) = 0;
7894 return type;
7895}
7896
7897/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7898 the value of type TYPE at VALADDR or ADDRESS (see comments at
7899 the beginning of this section) VAL according to GNAT conventions.
7900 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7901 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7902 an outer-level type (i.e., as opposed to a branch of a variant.) A
7903 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7904 of the variant.
14f9c5c9 7905
4c4b4cd2
PH
7906 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7907 length are not statically known are discarded. As a consequence,
7908 VALADDR, ADDRESS and DVAL0 are ignored.
7909
7910 NOTE: Limitations: For now, we assume that dynamic fields and
7911 variants occupy whole numbers of bytes. However, they need not be
7912 byte-aligned. */
7913
7914struct type *
10a2c479 7915ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7916 const gdb_byte *valaddr,
4c4b4cd2
PH
7917 CORE_ADDR address, struct value *dval0,
7918 int keep_dynamic_fields)
14f9c5c9 7919{
d2e4a39e
AS
7920 struct value *mark = value_mark ();
7921 struct value *dval;
7922 struct type *rtype;
14f9c5c9 7923 int nfields, bit_len;
4c4b4cd2 7924 int variant_field;
14f9c5c9 7925 long off;
d94e4f4f 7926 int fld_bit_len;
14f9c5c9
AS
7927 int f;
7928
4c4b4cd2
PH
7929 /* Compute the number of fields in this record type that are going
7930 to be processed: unless keep_dynamic_fields, this includes only
7931 fields whose position and length are static will be processed. */
7932 if (keep_dynamic_fields)
7933 nfields = TYPE_NFIELDS (type);
7934 else
7935 {
7936 nfields = 0;
76a01679 7937 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
7938 && !ada_is_variant_part (type, nfields)
7939 && !is_dynamic_field (type, nfields))
7940 nfields++;
7941 }
7942
e9bb382b 7943 rtype = alloc_type_copy (type);
14f9c5c9
AS
7944 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
7945 INIT_CPLUS_SPECIFIC (rtype);
7946 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 7947 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
7948 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
7949 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
7950 TYPE_NAME (rtype) = ada_type_name (type);
7951 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 7952 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 7953
d2e4a39e
AS
7954 off = 0;
7955 bit_len = 0;
4c4b4cd2
PH
7956 variant_field = -1;
7957
14f9c5c9
AS
7958 for (f = 0; f < nfields; f += 1)
7959 {
6c038f32
PH
7960 off = align_value (off, field_alignment (type, f))
7961 + TYPE_FIELD_BITPOS (type, f);
945b3a32 7962 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 7963 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7964
d2e4a39e 7965 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
7966 {
7967 variant_field = f;
d94e4f4f 7968 fld_bit_len = 0;
4c4b4cd2 7969 }
14f9c5c9 7970 else if (is_dynamic_field (type, f))
4c4b4cd2 7971 {
284614f0
JB
7972 const gdb_byte *field_valaddr = valaddr;
7973 CORE_ADDR field_address = address;
7974 struct type *field_type =
7975 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
7976
4c4b4cd2 7977 if (dval0 == NULL)
b5304971
JG
7978 {
7979 /* rtype's length is computed based on the run-time
7980 value of discriminants. If the discriminants are not
7981 initialized, the type size may be completely bogus and
0963b4bd 7982 GDB may fail to allocate a value for it. So check the
b5304971 7983 size first before creating the value. */
c1b5a1a6 7984 ada_ensure_varsize_limit (rtype);
012370f6
TT
7985 /* Using plain value_from_contents_and_address here
7986 causes problems because we will end up trying to
7987 resolve a type that is currently being
7988 constructed. */
7989 dval = value_from_contents_and_address_unresolved (rtype,
7990 valaddr,
7991 address);
9f1f738a 7992 rtype = value_type (dval);
b5304971 7993 }
4c4b4cd2
PH
7994 else
7995 dval = dval0;
7996
284614f0
JB
7997 /* If the type referenced by this field is an aligner type, we need
7998 to unwrap that aligner type, because its size might not be set.
7999 Keeping the aligner type would cause us to compute the wrong
8000 size for this field, impacting the offset of the all the fields
8001 that follow this one. */
8002 if (ada_is_aligner_type (field_type))
8003 {
8004 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8005
8006 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8007 field_address = cond_offset_target (field_address, field_offset);
8008 field_type = ada_aligned_type (field_type);
8009 }
8010
8011 field_valaddr = cond_offset_host (field_valaddr,
8012 off / TARGET_CHAR_BIT);
8013 field_address = cond_offset_target (field_address,
8014 off / TARGET_CHAR_BIT);
8015
8016 /* Get the fixed type of the field. Note that, in this case,
8017 we do not want to get the real type out of the tag: if
8018 the current field is the parent part of a tagged record,
8019 we will get the tag of the object. Clearly wrong: the real
8020 type of the parent is not the real type of the child. We
8021 would end up in an infinite loop. */
8022 field_type = ada_get_base_type (field_type);
8023 field_type = ada_to_fixed_type (field_type, field_valaddr,
8024 field_address, dval, 0);
27f2a97b
JB
8025 /* If the field size is already larger than the maximum
8026 object size, then the record itself will necessarily
8027 be larger than the maximum object size. We need to make
8028 this check now, because the size might be so ridiculously
8029 large (due to an uninitialized variable in the inferior)
8030 that it would cause an overflow when adding it to the
8031 record size. */
c1b5a1a6 8032 ada_ensure_varsize_limit (field_type);
284614f0
JB
8033
8034 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8035 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8036 /* The multiplication can potentially overflow. But because
8037 the field length has been size-checked just above, and
8038 assuming that the maximum size is a reasonable value,
8039 an overflow should not happen in practice. So rather than
8040 adding overflow recovery code to this already complex code,
8041 we just assume that it's not going to happen. */
d94e4f4f 8042 fld_bit_len =
4c4b4cd2
PH
8043 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8044 }
14f9c5c9 8045 else
4c4b4cd2 8046 {
5ded5331
JB
8047 /* Note: If this field's type is a typedef, it is important
8048 to preserve the typedef layer.
8049
8050 Otherwise, we might be transforming a typedef to a fat
8051 pointer (encoding a pointer to an unconstrained array),
8052 into a basic fat pointer (encoding an unconstrained
8053 array). As both types are implemented using the same
8054 structure, the typedef is the only clue which allows us
8055 to distinguish between the two options. Stripping it
8056 would prevent us from printing this field appropriately. */
8057 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8058 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8059 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8060 fld_bit_len =
4c4b4cd2
PH
8061 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8062 else
5ded5331
JB
8063 {
8064 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8065
8066 /* We need to be careful of typedefs when computing
8067 the length of our field. If this is a typedef,
8068 get the length of the target type, not the length
8069 of the typedef. */
8070 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8071 field_type = ada_typedef_target_type (field_type);
8072
8073 fld_bit_len =
8074 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8075 }
4c4b4cd2 8076 }
14f9c5c9 8077 if (off + fld_bit_len > bit_len)
4c4b4cd2 8078 bit_len = off + fld_bit_len;
d94e4f4f 8079 off += fld_bit_len;
4c4b4cd2
PH
8080 TYPE_LENGTH (rtype) =
8081 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8082 }
4c4b4cd2
PH
8083
8084 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8085 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8086 the record. This can happen in the presence of representation
8087 clauses. */
8088 if (variant_field >= 0)
8089 {
8090 struct type *branch_type;
8091
8092 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8093
8094 if (dval0 == NULL)
9f1f738a 8095 {
012370f6
TT
8096 /* Using plain value_from_contents_and_address here causes
8097 problems because we will end up trying to resolve a type
8098 that is currently being constructed. */
8099 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8100 address);
9f1f738a
SA
8101 rtype = value_type (dval);
8102 }
4c4b4cd2
PH
8103 else
8104 dval = dval0;
8105
8106 branch_type =
8107 to_fixed_variant_branch_type
8108 (TYPE_FIELD_TYPE (type, variant_field),
8109 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8110 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8111 if (branch_type == NULL)
8112 {
8113 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8114 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8115 TYPE_NFIELDS (rtype) -= 1;
8116 }
8117 else
8118 {
8119 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8120 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8121 fld_bit_len =
8122 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8123 TARGET_CHAR_BIT;
8124 if (off + fld_bit_len > bit_len)
8125 bit_len = off + fld_bit_len;
8126 TYPE_LENGTH (rtype) =
8127 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8128 }
8129 }
8130
714e53ab
PH
8131 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8132 should contain the alignment of that record, which should be a strictly
8133 positive value. If null or negative, then something is wrong, most
8134 probably in the debug info. In that case, we don't round up the size
0963b4bd 8135 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8136 the current RTYPE length might be good enough for our purposes. */
8137 if (TYPE_LENGTH (type) <= 0)
8138 {
323e0a4a
AC
8139 if (TYPE_NAME (rtype))
8140 warning (_("Invalid type size for `%s' detected: %d."),
8141 TYPE_NAME (rtype), TYPE_LENGTH (type));
8142 else
8143 warning (_("Invalid type size for <unnamed> detected: %d."),
8144 TYPE_LENGTH (type));
714e53ab
PH
8145 }
8146 else
8147 {
8148 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8149 TYPE_LENGTH (type));
8150 }
14f9c5c9
AS
8151
8152 value_free_to_mark (mark);
d2e4a39e 8153 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8154 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8155 return rtype;
8156}
8157
4c4b4cd2
PH
8158/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8159 of 1. */
14f9c5c9 8160
d2e4a39e 8161static struct type *
fc1a4b47 8162template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8163 CORE_ADDR address, struct value *dval0)
8164{
8165 return ada_template_to_fixed_record_type_1 (type, valaddr,
8166 address, dval0, 1);
8167}
8168
8169/* An ordinary record type in which ___XVL-convention fields and
8170 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8171 static approximations, containing all possible fields. Uses
8172 no runtime values. Useless for use in values, but that's OK,
8173 since the results are used only for type determinations. Works on both
8174 structs and unions. Representation note: to save space, we memorize
8175 the result of this function in the TYPE_TARGET_TYPE of the
8176 template type. */
8177
8178static struct type *
8179template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8180{
8181 struct type *type;
8182 int nfields;
8183 int f;
8184
9e195661
PMR
8185 /* No need no do anything if the input type is already fixed. */
8186 if (TYPE_FIXED_INSTANCE (type0))
8187 return type0;
8188
8189 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8190 if (TYPE_TARGET_TYPE (type0) != NULL)
8191 return TYPE_TARGET_TYPE (type0);
8192
9e195661 8193 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8194 type = type0;
9e195661
PMR
8195 nfields = TYPE_NFIELDS (type0);
8196
8197 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8198 recompute all over next time. */
8199 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8200
8201 for (f = 0; f < nfields; f += 1)
8202 {
460efde1 8203 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8204 struct type *new_type;
14f9c5c9 8205
4c4b4cd2 8206 if (is_dynamic_field (type0, f))
460efde1
JB
8207 {
8208 field_type = ada_check_typedef (field_type);
8209 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8210 }
14f9c5c9 8211 else
f192137b 8212 new_type = static_unwrap_type (field_type);
9e195661
PMR
8213
8214 if (new_type != field_type)
8215 {
8216 /* Clone TYPE0 only the first time we get a new field type. */
8217 if (type == type0)
8218 {
8219 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
8220 TYPE_CODE (type) = TYPE_CODE (type0);
8221 INIT_CPLUS_SPECIFIC (type);
8222 TYPE_NFIELDS (type) = nfields;
8223 TYPE_FIELDS (type) = (struct field *)
8224 TYPE_ALLOC (type, nfields * sizeof (struct field));
8225 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8226 sizeof (struct field) * nfields);
8227 TYPE_NAME (type) = ada_type_name (type0);
8228 TYPE_TAG_NAME (type) = NULL;
8229 TYPE_FIXED_INSTANCE (type) = 1;
8230 TYPE_LENGTH (type) = 0;
8231 }
8232 TYPE_FIELD_TYPE (type, f) = new_type;
8233 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8234 }
14f9c5c9 8235 }
9e195661 8236
14f9c5c9
AS
8237 return type;
8238}
8239
4c4b4cd2 8240/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8241 whose address in memory is ADDRESS, returns a revision of TYPE,
8242 which should be a non-dynamic-sized record, in which the variant
8243 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8244 for discriminant values in DVAL0, which can be NULL if the record
8245 contains the necessary discriminant values. */
8246
d2e4a39e 8247static struct type *
fc1a4b47 8248to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8249 CORE_ADDR address, struct value *dval0)
14f9c5c9 8250{
d2e4a39e 8251 struct value *mark = value_mark ();
4c4b4cd2 8252 struct value *dval;
d2e4a39e 8253 struct type *rtype;
14f9c5c9
AS
8254 struct type *branch_type;
8255 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8256 int variant_field = variant_field_index (type);
14f9c5c9 8257
4c4b4cd2 8258 if (variant_field == -1)
14f9c5c9
AS
8259 return type;
8260
4c4b4cd2 8261 if (dval0 == NULL)
9f1f738a
SA
8262 {
8263 dval = value_from_contents_and_address (type, valaddr, address);
8264 type = value_type (dval);
8265 }
4c4b4cd2
PH
8266 else
8267 dval = dval0;
8268
e9bb382b 8269 rtype = alloc_type_copy (type);
14f9c5c9 8270 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
4c4b4cd2
PH
8271 INIT_CPLUS_SPECIFIC (rtype);
8272 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8273 TYPE_FIELDS (rtype) =
8274 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8275 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8276 sizeof (struct field) * nfields);
14f9c5c9
AS
8277 TYPE_NAME (rtype) = ada_type_name (type);
8278 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 8279 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8280 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8281
4c4b4cd2
PH
8282 branch_type = to_fixed_variant_branch_type
8283 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8284 cond_offset_host (valaddr,
4c4b4cd2
PH
8285 TYPE_FIELD_BITPOS (type, variant_field)
8286 / TARGET_CHAR_BIT),
d2e4a39e 8287 cond_offset_target (address,
4c4b4cd2
PH
8288 TYPE_FIELD_BITPOS (type, variant_field)
8289 / TARGET_CHAR_BIT), dval);
d2e4a39e 8290 if (branch_type == NULL)
14f9c5c9 8291 {
4c4b4cd2 8292 int f;
5b4ee69b 8293
4c4b4cd2
PH
8294 for (f = variant_field + 1; f < nfields; f += 1)
8295 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8296 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8297 }
8298 else
8299 {
4c4b4cd2
PH
8300 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8301 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8302 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8303 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8304 }
4c4b4cd2 8305 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8306
4c4b4cd2 8307 value_free_to_mark (mark);
14f9c5c9
AS
8308 return rtype;
8309}
8310
8311/* An ordinary record type (with fixed-length fields) that describes
8312 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8313 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8314 should be in DVAL, a record value; it may be NULL if the object
8315 at ADDR itself contains any necessary discriminant values.
8316 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8317 values from the record are needed. Except in the case that DVAL,
8318 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8319 unchecked) is replaced by a particular branch of the variant.
8320
8321 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8322 is questionable and may be removed. It can arise during the
8323 processing of an unconstrained-array-of-record type where all the
8324 variant branches have exactly the same size. This is because in
8325 such cases, the compiler does not bother to use the XVS convention
8326 when encoding the record. I am currently dubious of this
8327 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8328
d2e4a39e 8329static struct type *
fc1a4b47 8330to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8331 CORE_ADDR address, struct value *dval)
14f9c5c9 8332{
d2e4a39e 8333 struct type *templ_type;
14f9c5c9 8334
876cecd0 8335 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8336 return type0;
8337
d2e4a39e 8338 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8339
8340 if (templ_type != NULL)
8341 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8342 else if (variant_field_index (type0) >= 0)
8343 {
8344 if (dval == NULL && valaddr == NULL && address == 0)
8345 return type0;
8346 return to_record_with_fixed_variant_part (type0, valaddr, address,
8347 dval);
8348 }
14f9c5c9
AS
8349 else
8350 {
876cecd0 8351 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8352 return type0;
8353 }
8354
8355}
8356
8357/* An ordinary record type (with fixed-length fields) that describes
8358 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8359 union type. Any necessary discriminants' values should be in DVAL,
8360 a record value. That is, this routine selects the appropriate
8361 branch of the union at ADDR according to the discriminant value
b1f33ddd 8362 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8363 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8364
d2e4a39e 8365static struct type *
fc1a4b47 8366to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8367 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8368{
8369 int which;
d2e4a39e
AS
8370 struct type *templ_type;
8371 struct type *var_type;
14f9c5c9
AS
8372
8373 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8374 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8375 else
14f9c5c9
AS
8376 var_type = var_type0;
8377
8378 templ_type = ada_find_parallel_type (var_type, "___XVU");
8379
8380 if (templ_type != NULL)
8381 var_type = templ_type;
8382
b1f33ddd
JB
8383 if (is_unchecked_variant (var_type, value_type (dval)))
8384 return var_type0;
d2e4a39e
AS
8385 which =
8386 ada_which_variant_applies (var_type,
0fd88904 8387 value_type (dval), value_contents (dval));
14f9c5c9
AS
8388
8389 if (which < 0)
e9bb382b 8390 return empty_record (var_type);
14f9c5c9 8391 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8392 return to_fixed_record_type
d2e4a39e
AS
8393 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8394 valaddr, address, dval);
4c4b4cd2 8395 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8396 return
8397 to_fixed_record_type
8398 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8399 else
8400 return TYPE_FIELD_TYPE (var_type, which);
8401}
8402
8908fca5
JB
8403/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8404 ENCODING_TYPE, a type following the GNAT conventions for discrete
8405 type encodings, only carries redundant information. */
8406
8407static int
8408ada_is_redundant_range_encoding (struct type *range_type,
8409 struct type *encoding_type)
8410{
8411 struct type *fixed_range_type;
8412 char *bounds_str;
8413 int n;
8414 LONGEST lo, hi;
8415
8416 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8417
005e2509
JB
8418 if (TYPE_CODE (get_base_type (range_type))
8419 != TYPE_CODE (get_base_type (encoding_type)))
8420 {
8421 /* The compiler probably used a simple base type to describe
8422 the range type instead of the range's actual base type,
8423 expecting us to get the real base type from the encoding
8424 anyway. In this situation, the encoding cannot be ignored
8425 as redundant. */
8426 return 0;
8427 }
8428
8908fca5
JB
8429 if (is_dynamic_type (range_type))
8430 return 0;
8431
8432 if (TYPE_NAME (encoding_type) == NULL)
8433 return 0;
8434
8435 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8436 if (bounds_str == NULL)
8437 return 0;
8438
8439 n = 8; /* Skip "___XDLU_". */
8440 if (!ada_scan_number (bounds_str, n, &lo, &n))
8441 return 0;
8442 if (TYPE_LOW_BOUND (range_type) != lo)
8443 return 0;
8444
8445 n += 2; /* Skip the "__" separator between the two bounds. */
8446 if (!ada_scan_number (bounds_str, n, &hi, &n))
8447 return 0;
8448 if (TYPE_HIGH_BOUND (range_type) != hi)
8449 return 0;
8450
8451 return 1;
8452}
8453
8454/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8455 a type following the GNAT encoding for describing array type
8456 indices, only carries redundant information. */
8457
8458static int
8459ada_is_redundant_index_type_desc (struct type *array_type,
8460 struct type *desc_type)
8461{
8462 struct type *this_layer = check_typedef (array_type);
8463 int i;
8464
8465 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8466 {
8467 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8468 TYPE_FIELD_TYPE (desc_type, i)))
8469 return 0;
8470 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8471 }
8472
8473 return 1;
8474}
8475
14f9c5c9
AS
8476/* Assuming that TYPE0 is an array type describing the type of a value
8477 at ADDR, and that DVAL describes a record containing any
8478 discriminants used in TYPE0, returns a type for the value that
8479 contains no dynamic components (that is, no components whose sizes
8480 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8481 true, gives an error message if the resulting type's size is over
4c4b4cd2 8482 varsize_limit. */
14f9c5c9 8483
d2e4a39e
AS
8484static struct type *
8485to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8486 int ignore_too_big)
14f9c5c9 8487{
d2e4a39e
AS
8488 struct type *index_type_desc;
8489 struct type *result;
ad82864c 8490 int constrained_packed_array_p;
14f9c5c9 8491
b0dd7688 8492 type0 = ada_check_typedef (type0);
284614f0 8493 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8494 return type0;
14f9c5c9 8495
ad82864c
JB
8496 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8497 if (constrained_packed_array_p)
8498 type0 = decode_constrained_packed_array_type (type0);
284614f0 8499
14f9c5c9 8500 index_type_desc = ada_find_parallel_type (type0, "___XA");
28c85d6c 8501 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8502 if (index_type_desc != NULL
8503 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8504 {
8505 /* Ignore this ___XA parallel type, as it does not bring any
8506 useful information. This allows us to avoid creating fixed
8507 versions of the array's index types, which would be identical
8508 to the original ones. This, in turn, can also help avoid
8509 the creation of fixed versions of the array itself. */
8510 index_type_desc = NULL;
8511 }
8512
14f9c5c9
AS
8513 if (index_type_desc == NULL)
8514 {
61ee279c 8515 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8516
14f9c5c9 8517 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8518 depend on the contents of the array in properly constructed
8519 debugging data. */
529cad9c
PH
8520 /* Create a fixed version of the array element type.
8521 We're not providing the address of an element here,
e1d5a0d2 8522 and thus the actual object value cannot be inspected to do
529cad9c
PH
8523 the conversion. This should not be a problem, since arrays of
8524 unconstrained objects are not allowed. In particular, all
8525 the elements of an array of a tagged type should all be of
8526 the same type specified in the debugging info. No need to
8527 consult the object tag. */
1ed6ede0 8528 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8529
284614f0
JB
8530 /* Make sure we always create a new array type when dealing with
8531 packed array types, since we're going to fix-up the array
8532 type length and element bitsize a little further down. */
ad82864c 8533 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8534 result = type0;
14f9c5c9 8535 else
e9bb382b 8536 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8537 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8538 }
8539 else
8540 {
8541 int i;
8542 struct type *elt_type0;
8543
8544 elt_type0 = type0;
8545 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8546 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8547
8548 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8549 depend on the contents of the array in properly constructed
8550 debugging data. */
529cad9c
PH
8551 /* Create a fixed version of the array element type.
8552 We're not providing the address of an element here,
e1d5a0d2 8553 and thus the actual object value cannot be inspected to do
529cad9c
PH
8554 the conversion. This should not be a problem, since arrays of
8555 unconstrained objects are not allowed. In particular, all
8556 the elements of an array of a tagged type should all be of
8557 the same type specified in the debugging info. No need to
8558 consult the object tag. */
1ed6ede0
JB
8559 result =
8560 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8561
8562 elt_type0 = type0;
14f9c5c9 8563 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8564 {
8565 struct type *range_type =
28c85d6c 8566 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8567
e9bb382b 8568 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8569 result, range_type);
1ce677a4 8570 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8571 }
d2e4a39e 8572 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8573 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8574 }
8575
2e6fda7d
JB
8576 /* We want to preserve the type name. This can be useful when
8577 trying to get the type name of a value that has already been
8578 printed (for instance, if the user did "print VAR; whatis $". */
8579 TYPE_NAME (result) = TYPE_NAME (type0);
8580
ad82864c 8581 if (constrained_packed_array_p)
284614f0
JB
8582 {
8583 /* So far, the resulting type has been created as if the original
8584 type was a regular (non-packed) array type. As a result, the
8585 bitsize of the array elements needs to be set again, and the array
8586 length needs to be recomputed based on that bitsize. */
8587 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8588 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8589
8590 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8591 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8592 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8593 TYPE_LENGTH (result)++;
8594 }
8595
876cecd0 8596 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8597 return result;
d2e4a39e 8598}
14f9c5c9
AS
8599
8600
8601/* A standard type (containing no dynamically sized components)
8602 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8603 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8604 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8605 ADDRESS or in VALADDR contains these discriminants.
8606
1ed6ede0
JB
8607 If CHECK_TAG is not null, in the case of tagged types, this function
8608 attempts to locate the object's tag and use it to compute the actual
8609 type. However, when ADDRESS is null, we cannot use it to determine the
8610 location of the tag, and therefore compute the tagged type's actual type.
8611 So we return the tagged type without consulting the tag. */
529cad9c 8612
f192137b
JB
8613static struct type *
8614ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8615 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8616{
61ee279c 8617 type = ada_check_typedef (type);
d2e4a39e
AS
8618 switch (TYPE_CODE (type))
8619 {
8620 default:
14f9c5c9 8621 return type;
d2e4a39e 8622 case TYPE_CODE_STRUCT:
4c4b4cd2 8623 {
76a01679 8624 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8625 struct type *fixed_record_type =
8626 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8627
529cad9c
PH
8628 /* If STATIC_TYPE is a tagged type and we know the object's address,
8629 then we can determine its tag, and compute the object's actual
0963b4bd 8630 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8631 type (the parent part of the record may have dynamic fields
8632 and the way the location of _tag is expressed may depend on
8633 them). */
529cad9c 8634
1ed6ede0 8635 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8636 {
b50d69b5
JG
8637 struct value *tag =
8638 value_tag_from_contents_and_address
8639 (fixed_record_type,
8640 valaddr,
8641 address);
8642 struct type *real_type = type_from_tag (tag);
8643 struct value *obj =
8644 value_from_contents_and_address (fixed_record_type,
8645 valaddr,
8646 address);
9f1f738a 8647 fixed_record_type = value_type (obj);
76a01679 8648 if (real_type != NULL)
b50d69b5
JG
8649 return to_fixed_record_type
8650 (real_type, NULL,
8651 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8652 }
4af88198
JB
8653
8654 /* Check to see if there is a parallel ___XVZ variable.
8655 If there is, then it provides the actual size of our type. */
8656 else if (ada_type_name (fixed_record_type) != NULL)
8657 {
0d5cff50 8658 const char *name = ada_type_name (fixed_record_type);
4af88198
JB
8659 char *xvz_name = alloca (strlen (name) + 7 /* "___XVZ\0" */);
8660 int xvz_found = 0;
8661 LONGEST size;
8662
88c15c34 8663 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
4af88198
JB
8664 size = get_int_var_value (xvz_name, &xvz_found);
8665 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8666 {
8667 fixed_record_type = copy_type (fixed_record_type);
8668 TYPE_LENGTH (fixed_record_type) = size;
8669
8670 /* The FIXED_RECORD_TYPE may have be a stub. We have
8671 observed this when the debugging info is STABS, and
8672 apparently it is something that is hard to fix.
8673
8674 In practice, we don't need the actual type definition
8675 at all, because the presence of the XVZ variable allows us
8676 to assume that there must be a XVS type as well, which we
8677 should be able to use later, when we need the actual type
8678 definition.
8679
8680 In the meantime, pretend that the "fixed" type we are
8681 returning is NOT a stub, because this can cause trouble
8682 when using this type to create new types targeting it.
8683 Indeed, the associated creation routines often check
8684 whether the target type is a stub and will try to replace
0963b4bd 8685 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8686 might cause the new type to have the wrong size too.
8687 Consider the case of an array, for instance, where the size
8688 of the array is computed from the number of elements in
8689 our array multiplied by the size of its element. */
8690 TYPE_STUB (fixed_record_type) = 0;
8691 }
8692 }
1ed6ede0 8693 return fixed_record_type;
4c4b4cd2 8694 }
d2e4a39e 8695 case TYPE_CODE_ARRAY:
4c4b4cd2 8696 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8697 case TYPE_CODE_UNION:
8698 if (dval == NULL)
4c4b4cd2 8699 return type;
d2e4a39e 8700 else
4c4b4cd2 8701 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8702 }
14f9c5c9
AS
8703}
8704
f192137b
JB
8705/* The same as ada_to_fixed_type_1, except that it preserves the type
8706 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8707
8708 The typedef layer needs be preserved in order to differentiate between
8709 arrays and array pointers when both types are implemented using the same
8710 fat pointer. In the array pointer case, the pointer is encoded as
8711 a typedef of the pointer type. For instance, considering:
8712
8713 type String_Access is access String;
8714 S1 : String_Access := null;
8715
8716 To the debugger, S1 is defined as a typedef of type String. But
8717 to the user, it is a pointer. So if the user tries to print S1,
8718 we should not dereference the array, but print the array address
8719 instead.
8720
8721 If we didn't preserve the typedef layer, we would lose the fact that
8722 the type is to be presented as a pointer (needs de-reference before
8723 being printed). And we would also use the source-level type name. */
f192137b
JB
8724
8725struct type *
8726ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8727 CORE_ADDR address, struct value *dval, int check_tag)
8728
8729{
8730 struct type *fixed_type =
8731 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8732
96dbd2c1
JB
8733 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8734 then preserve the typedef layer.
8735
8736 Implementation note: We can only check the main-type portion of
8737 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8738 from TYPE now returns a type that has the same instance flags
8739 as TYPE. For instance, if TYPE is a "typedef const", and its
8740 target type is a "struct", then the typedef elimination will return
8741 a "const" version of the target type. See check_typedef for more
8742 details about how the typedef layer elimination is done.
8743
8744 brobecker/2010-11-19: It seems to me that the only case where it is
8745 useful to preserve the typedef layer is when dealing with fat pointers.
8746 Perhaps, we could add a check for that and preserve the typedef layer
8747 only in that situation. But this seems unecessary so far, probably
8748 because we call check_typedef/ada_check_typedef pretty much everywhere.
8749 */
f192137b 8750 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8751 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8752 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8753 return type;
8754
8755 return fixed_type;
8756}
8757
14f9c5c9 8758/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8759 TYPE0, but based on no runtime data. */
14f9c5c9 8760
d2e4a39e
AS
8761static struct type *
8762to_static_fixed_type (struct type *type0)
14f9c5c9 8763{
d2e4a39e 8764 struct type *type;
14f9c5c9
AS
8765
8766 if (type0 == NULL)
8767 return NULL;
8768
876cecd0 8769 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8770 return type0;
8771
61ee279c 8772 type0 = ada_check_typedef (type0);
d2e4a39e 8773
14f9c5c9
AS
8774 switch (TYPE_CODE (type0))
8775 {
8776 default:
8777 return type0;
8778 case TYPE_CODE_STRUCT:
8779 type = dynamic_template_type (type0);
d2e4a39e 8780 if (type != NULL)
4c4b4cd2
PH
8781 return template_to_static_fixed_type (type);
8782 else
8783 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8784 case TYPE_CODE_UNION:
8785 type = ada_find_parallel_type (type0, "___XVU");
8786 if (type != NULL)
4c4b4cd2
PH
8787 return template_to_static_fixed_type (type);
8788 else
8789 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8790 }
8791}
8792
4c4b4cd2
PH
8793/* A static approximation of TYPE with all type wrappers removed. */
8794
d2e4a39e
AS
8795static struct type *
8796static_unwrap_type (struct type *type)
14f9c5c9
AS
8797{
8798 if (ada_is_aligner_type (type))
8799 {
61ee279c 8800 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8801 if (ada_type_name (type1) == NULL)
4c4b4cd2 8802 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8803
8804 return static_unwrap_type (type1);
8805 }
d2e4a39e 8806 else
14f9c5c9 8807 {
d2e4a39e 8808 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8809
d2e4a39e 8810 if (raw_real_type == type)
4c4b4cd2 8811 return type;
14f9c5c9 8812 else
4c4b4cd2 8813 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8814 }
8815}
8816
8817/* In some cases, incomplete and private types require
4c4b4cd2 8818 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8819 type Foo;
8820 type FooP is access Foo;
8821 V: FooP;
8822 type Foo is array ...;
4c4b4cd2 8823 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8824 cross-references to such types, we instead substitute for FooP a
8825 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8826 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8827
8828/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8829 exists, otherwise TYPE. */
8830
d2e4a39e 8831struct type *
61ee279c 8832ada_check_typedef (struct type *type)
14f9c5c9 8833{
727e3d2e
JB
8834 if (type == NULL)
8835 return NULL;
8836
720d1a40
JB
8837 /* If our type is a typedef type of a fat pointer, then we're done.
8838 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8839 what allows us to distinguish between fat pointers that represent
8840 array types, and fat pointers that represent array access types
8841 (in both cases, the compiler implements them as fat pointers). */
8842 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
8843 && is_thick_pntr (ada_typedef_target_type (type)))
8844 return type;
8845
14f9c5c9
AS
8846 CHECK_TYPEDEF (type);
8847 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 8848 || !TYPE_STUB (type)
14f9c5c9
AS
8849 || TYPE_TAG_NAME (type) == NULL)
8850 return type;
d2e4a39e 8851 else
14f9c5c9 8852 {
0d5cff50 8853 const char *name = TYPE_TAG_NAME (type);
d2e4a39e 8854 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8855
05e522ef
JB
8856 if (type1 == NULL)
8857 return type;
8858
8859 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8860 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8861 types, only for the typedef-to-array types). If that's the case,
8862 strip the typedef layer. */
8863 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
8864 type1 = ada_check_typedef (type1);
8865
8866 return type1;
14f9c5c9
AS
8867 }
8868}
8869
8870/* A value representing the data at VALADDR/ADDRESS as described by
8871 type TYPE0, but with a standard (static-sized) type that correctly
8872 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8873 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8874 creation of struct values]. */
14f9c5c9 8875
4c4b4cd2
PH
8876static struct value *
8877ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
8878 struct value *val0)
14f9c5c9 8879{
1ed6ede0 8880 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8881
14f9c5c9
AS
8882 if (type == type0 && val0 != NULL)
8883 return val0;
d2e4a39e 8884 else
4c4b4cd2
PH
8885 return value_from_contents_and_address (type, 0, address);
8886}
8887
8888/* A value representing VAL, but with a standard (static-sized) type
8889 that correctly describes it. Does not necessarily create a new
8890 value. */
8891
0c3acc09 8892struct value *
4c4b4cd2
PH
8893ada_to_fixed_value (struct value *val)
8894{
c48db5ca
JB
8895 val = unwrap_value (val);
8896 val = ada_to_fixed_value_create (value_type (val),
8897 value_address (val),
8898 val);
8899 return val;
14f9c5c9 8900}
d2e4a39e 8901\f
14f9c5c9 8902
14f9c5c9
AS
8903/* Attributes */
8904
4c4b4cd2
PH
8905/* Table mapping attribute numbers to names.
8906 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8907
d2e4a39e 8908static const char *attribute_names[] = {
14f9c5c9
AS
8909 "<?>",
8910
d2e4a39e 8911 "first",
14f9c5c9
AS
8912 "last",
8913 "length",
8914 "image",
14f9c5c9
AS
8915 "max",
8916 "min",
4c4b4cd2
PH
8917 "modulus",
8918 "pos",
8919 "size",
8920 "tag",
14f9c5c9 8921 "val",
14f9c5c9
AS
8922 0
8923};
8924
d2e4a39e 8925const char *
4c4b4cd2 8926ada_attribute_name (enum exp_opcode n)
14f9c5c9 8927{
4c4b4cd2
PH
8928 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8929 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8930 else
8931 return attribute_names[0];
8932}
8933
4c4b4cd2 8934/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8935
4c4b4cd2
PH
8936static LONGEST
8937pos_atr (struct value *arg)
14f9c5c9 8938{
24209737
PH
8939 struct value *val = coerce_ref (arg);
8940 struct type *type = value_type (val);
14f9c5c9 8941
d2e4a39e 8942 if (!discrete_type_p (type))
323e0a4a 8943 error (_("'POS only defined on discrete types"));
14f9c5c9
AS
8944
8945 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8946 {
8947 int i;
24209737 8948 LONGEST v = value_as_long (val);
14f9c5c9 8949
d2e4a39e 8950 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2 8951 {
14e75d8e 8952 if (v == TYPE_FIELD_ENUMVAL (type, i))
4c4b4cd2
PH
8953 return i;
8954 }
323e0a4a 8955 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9
AS
8956 }
8957 else
24209737 8958 return value_as_long (val);
4c4b4cd2
PH
8959}
8960
8961static struct value *
3cb382c9 8962value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8963{
3cb382c9 8964 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8965}
8966
4c4b4cd2 8967/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8968
d2e4a39e
AS
8969static struct value *
8970value_val_atr (struct type *type, struct value *arg)
14f9c5c9 8971{
d2e4a39e 8972 if (!discrete_type_p (type))
323e0a4a 8973 error (_("'VAL only defined on discrete types"));
df407dfe 8974 if (!integer_type_p (value_type (arg)))
323e0a4a 8975 error (_("'VAL requires integral argument"));
14f9c5c9
AS
8976
8977 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8978 {
8979 long pos = value_as_long (arg);
5b4ee69b 8980
14f9c5c9 8981 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 8982 error (_("argument to 'VAL out of range"));
14e75d8e 8983 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
8984 }
8985 else
8986 return value_from_longest (type, value_as_long (arg));
8987}
14f9c5c9 8988\f
d2e4a39e 8989
4c4b4cd2 8990 /* Evaluation */
14f9c5c9 8991
4c4b4cd2
PH
8992/* True if TYPE appears to be an Ada character type.
8993 [At the moment, this is true only for Character and Wide_Character;
8994 It is a heuristic test that could stand improvement]. */
14f9c5c9 8995
d2e4a39e
AS
8996int
8997ada_is_character_type (struct type *type)
14f9c5c9 8998{
7b9f71f2
JB
8999 const char *name;
9000
9001 /* If the type code says it's a character, then assume it really is,
9002 and don't check any further. */
9003 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
9004 return 1;
9005
9006 /* Otherwise, assume it's a character type iff it is a discrete type
9007 with a known character type name. */
9008 name = ada_type_name (type);
9009 return (name != NULL
9010 && (TYPE_CODE (type) == TYPE_CODE_INT
9011 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9012 && (strcmp (name, "character") == 0
9013 || strcmp (name, "wide_character") == 0
5a517ebd 9014 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9015 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9016}
9017
4c4b4cd2 9018/* True if TYPE appears to be an Ada string type. */
14f9c5c9
AS
9019
9020int
ebf56fd3 9021ada_is_string_type (struct type *type)
14f9c5c9 9022{
61ee279c 9023 type = ada_check_typedef (type);
d2e4a39e 9024 if (type != NULL
14f9c5c9 9025 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9026 && (ada_is_simple_array_type (type)
9027 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9028 && ada_array_arity (type) == 1)
9029 {
9030 struct type *elttype = ada_array_element_type (type, 1);
9031
9032 return ada_is_character_type (elttype);
9033 }
d2e4a39e 9034 else
14f9c5c9
AS
9035 return 0;
9036}
9037
5bf03f13
JB
9038/* The compiler sometimes provides a parallel XVS type for a given
9039 PAD type. Normally, it is safe to follow the PAD type directly,
9040 but older versions of the compiler have a bug that causes the offset
9041 of its "F" field to be wrong. Following that field in that case
9042 would lead to incorrect results, but this can be worked around
9043 by ignoring the PAD type and using the associated XVS type instead.
9044
9045 Set to True if the debugger should trust the contents of PAD types.
9046 Otherwise, ignore the PAD type if there is a parallel XVS type. */
9047static int trust_pad_over_xvs = 1;
14f9c5c9
AS
9048
9049/* True if TYPE is a struct type introduced by the compiler to force the
9050 alignment of a value. Such types have a single field with a
4c4b4cd2 9051 distinctive name. */
14f9c5c9
AS
9052
9053int
ebf56fd3 9054ada_is_aligner_type (struct type *type)
14f9c5c9 9055{
61ee279c 9056 type = ada_check_typedef (type);
714e53ab 9057
5bf03f13 9058 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9059 return 0;
9060
14f9c5c9 9061 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9062 && TYPE_NFIELDS (type) == 1
9063 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9064}
9065
9066/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9067 the parallel type. */
14f9c5c9 9068
d2e4a39e
AS
9069struct type *
9070ada_get_base_type (struct type *raw_type)
14f9c5c9 9071{
d2e4a39e
AS
9072 struct type *real_type_namer;
9073 struct type *raw_real_type;
14f9c5c9
AS
9074
9075 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9076 return raw_type;
9077
284614f0
JB
9078 if (ada_is_aligner_type (raw_type))
9079 /* The encoding specifies that we should always use the aligner type.
9080 So, even if this aligner type has an associated XVS type, we should
9081 simply ignore it.
9082
9083 According to the compiler gurus, an XVS type parallel to an aligner
9084 type may exist because of a stabs limitation. In stabs, aligner
9085 types are empty because the field has a variable-sized type, and
9086 thus cannot actually be used as an aligner type. As a result,
9087 we need the associated parallel XVS type to decode the type.
9088 Since the policy in the compiler is to not change the internal
9089 representation based on the debugging info format, we sometimes
9090 end up having a redundant XVS type parallel to the aligner type. */
9091 return raw_type;
9092
14f9c5c9 9093 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9094 if (real_type_namer == NULL
14f9c5c9
AS
9095 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9096 || TYPE_NFIELDS (real_type_namer) != 1)
9097 return raw_type;
9098
f80d3ff2
JB
9099 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9100 {
9101 /* This is an older encoding form where the base type needs to be
9102 looked up by name. We prefer the newer enconding because it is
9103 more efficient. */
9104 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9105 if (raw_real_type == NULL)
9106 return raw_type;
9107 else
9108 return raw_real_type;
9109 }
9110
9111 /* The field in our XVS type is a reference to the base type. */
9112 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9113}
14f9c5c9 9114
4c4b4cd2 9115/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9116
d2e4a39e
AS
9117struct type *
9118ada_aligned_type (struct type *type)
14f9c5c9
AS
9119{
9120 if (ada_is_aligner_type (type))
9121 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9122 else
9123 return ada_get_base_type (type);
9124}
9125
9126
9127/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9128 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9129
fc1a4b47
AC
9130const gdb_byte *
9131ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9132{
d2e4a39e 9133 if (ada_is_aligner_type (type))
14f9c5c9 9134 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9135 valaddr +
9136 TYPE_FIELD_BITPOS (type,
9137 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9138 else
9139 return valaddr;
9140}
9141
4c4b4cd2
PH
9142
9143
14f9c5c9 9144/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9145 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9146const char *
9147ada_enum_name (const char *name)
14f9c5c9 9148{
4c4b4cd2
PH
9149 static char *result;
9150 static size_t result_len = 0;
d2e4a39e 9151 char *tmp;
14f9c5c9 9152
4c4b4cd2
PH
9153 /* First, unqualify the enumeration name:
9154 1. Search for the last '.' character. If we find one, then skip
177b42fe 9155 all the preceding characters, the unqualified name starts
76a01679 9156 right after that dot.
4c4b4cd2 9157 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9158 translates dots into "__". Search forward for double underscores,
9159 but stop searching when we hit an overloading suffix, which is
9160 of the form "__" followed by digits. */
4c4b4cd2 9161
c3e5cd34
PH
9162 tmp = strrchr (name, '.');
9163 if (tmp != NULL)
4c4b4cd2
PH
9164 name = tmp + 1;
9165 else
14f9c5c9 9166 {
4c4b4cd2
PH
9167 while ((tmp = strstr (name, "__")) != NULL)
9168 {
9169 if (isdigit (tmp[2]))
9170 break;
9171 else
9172 name = tmp + 2;
9173 }
14f9c5c9
AS
9174 }
9175
9176 if (name[0] == 'Q')
9177 {
14f9c5c9 9178 int v;
5b4ee69b 9179
14f9c5c9 9180 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9181 {
9182 if (sscanf (name + 2, "%x", &v) != 1)
9183 return name;
9184 }
14f9c5c9 9185 else
4c4b4cd2 9186 return name;
14f9c5c9 9187
4c4b4cd2 9188 GROW_VECT (result, result_len, 16);
14f9c5c9 9189 if (isascii (v) && isprint (v))
88c15c34 9190 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9191 else if (name[1] == 'U')
88c15c34 9192 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9193 else
88c15c34 9194 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9195
9196 return result;
9197 }
d2e4a39e 9198 else
4c4b4cd2 9199 {
c3e5cd34
PH
9200 tmp = strstr (name, "__");
9201 if (tmp == NULL)
9202 tmp = strstr (name, "$");
9203 if (tmp != NULL)
4c4b4cd2
PH
9204 {
9205 GROW_VECT (result, result_len, tmp - name + 1);
9206 strncpy (result, name, tmp - name);
9207 result[tmp - name] = '\0';
9208 return result;
9209 }
9210
9211 return name;
9212 }
14f9c5c9
AS
9213}
9214
14f9c5c9
AS
9215/* Evaluate the subexpression of EXP starting at *POS as for
9216 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9217 expression. */
14f9c5c9 9218
d2e4a39e
AS
9219static struct value *
9220evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9221{
4b27a620 9222 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9223}
9224
9225/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9226 value it wraps. */
14f9c5c9 9227
d2e4a39e
AS
9228static struct value *
9229unwrap_value (struct value *val)
14f9c5c9 9230{
df407dfe 9231 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9232
14f9c5c9
AS
9233 if (ada_is_aligner_type (type))
9234 {
de4d072f 9235 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9236 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9237
14f9c5c9 9238 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9239 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9240
9241 return unwrap_value (v);
9242 }
d2e4a39e 9243 else
14f9c5c9 9244 {
d2e4a39e 9245 struct type *raw_real_type =
61ee279c 9246 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9247
5bf03f13
JB
9248 /* If there is no parallel XVS or XVE type, then the value is
9249 already unwrapped. Return it without further modification. */
9250 if ((type == raw_real_type)
9251 && ada_find_parallel_type (type, "___XVE") == NULL)
9252 return val;
14f9c5c9 9253
d2e4a39e 9254 return
4c4b4cd2
PH
9255 coerce_unspec_val_to_type
9256 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9257 value_address (val),
1ed6ede0 9258 NULL, 1));
14f9c5c9
AS
9259 }
9260}
d2e4a39e
AS
9261
9262static struct value *
9263cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9
AS
9264{
9265 LONGEST val;
9266
df407dfe 9267 if (type == value_type (arg))
14f9c5c9 9268 return arg;
df407dfe 9269 else if (ada_is_fixed_point_type (value_type (arg)))
d2e4a39e 9270 val = ada_float_to_fixed (type,
df407dfe 9271 ada_fixed_to_float (value_type (arg),
4c4b4cd2 9272 value_as_long (arg)));
d2e4a39e 9273 else
14f9c5c9 9274 {
a53b7a21 9275 DOUBLEST argd = value_as_double (arg);
5b4ee69b 9276
14f9c5c9
AS
9277 val = ada_float_to_fixed (type, argd);
9278 }
9279
9280 return value_from_longest (type, val);
9281}
9282
d2e4a39e 9283static struct value *
a53b7a21 9284cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9285{
df407dfe 9286 DOUBLEST val = ada_fixed_to_float (value_type (arg),
4c4b4cd2 9287 value_as_long (arg));
5b4ee69b 9288
a53b7a21 9289 return value_from_double (type, val);
14f9c5c9
AS
9290}
9291
d99dcf51
JB
9292/* Given two array types T1 and T2, return nonzero iff both arrays
9293 contain the same number of elements. */
9294
9295static int
9296ada_same_array_size_p (struct type *t1, struct type *t2)
9297{
9298 LONGEST lo1, hi1, lo2, hi2;
9299
9300 /* Get the array bounds in order to verify that the size of
9301 the two arrays match. */
9302 if (!get_array_bounds (t1, &lo1, &hi1)
9303 || !get_array_bounds (t2, &lo2, &hi2))
9304 error (_("unable to determine array bounds"));
9305
9306 /* To make things easier for size comparison, normalize a bit
9307 the case of empty arrays by making sure that the difference
9308 between upper bound and lower bound is always -1. */
9309 if (lo1 > hi1)
9310 hi1 = lo1 - 1;
9311 if (lo2 > hi2)
9312 hi2 = lo2 - 1;
9313
9314 return (hi1 - lo1 == hi2 - lo2);
9315}
9316
9317/* Assuming that VAL is an array of integrals, and TYPE represents
9318 an array with the same number of elements, but with wider integral
9319 elements, return an array "casted" to TYPE. In practice, this
9320 means that the returned array is built by casting each element
9321 of the original array into TYPE's (wider) element type. */
9322
9323static struct value *
9324ada_promote_array_of_integrals (struct type *type, struct value *val)
9325{
9326 struct type *elt_type = TYPE_TARGET_TYPE (type);
9327 LONGEST lo, hi;
9328 struct value *res;
9329 LONGEST i;
9330
9331 /* Verify that both val and type are arrays of scalars, and
9332 that the size of val's elements is smaller than the size
9333 of type's element. */
9334 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9335 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9336 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9337 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9338 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9339 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9340
9341 if (!get_array_bounds (type, &lo, &hi))
9342 error (_("unable to determine array bounds"));
9343
9344 res = allocate_value (type);
9345
9346 /* Promote each array element. */
9347 for (i = 0; i < hi - lo + 1; i++)
9348 {
9349 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9350
9351 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9352 value_contents_all (elt), TYPE_LENGTH (elt_type));
9353 }
9354
9355 return res;
9356}
9357
4c4b4cd2
PH
9358/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9359 return the converted value. */
9360
d2e4a39e
AS
9361static struct value *
9362coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9363{
df407dfe 9364 struct type *type2 = value_type (val);
5b4ee69b 9365
14f9c5c9
AS
9366 if (type == type2)
9367 return val;
9368
61ee279c
PH
9369 type2 = ada_check_typedef (type2);
9370 type = ada_check_typedef (type);
14f9c5c9 9371
d2e4a39e
AS
9372 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9373 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9374 {
9375 val = ada_value_ind (val);
df407dfe 9376 type2 = value_type (val);
14f9c5c9
AS
9377 }
9378
d2e4a39e 9379 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9380 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9381 {
d99dcf51
JB
9382 if (!ada_same_array_size_p (type, type2))
9383 error (_("cannot assign arrays of different length"));
9384
9385 if (is_integral_type (TYPE_TARGET_TYPE (type))
9386 && is_integral_type (TYPE_TARGET_TYPE (type2))
9387 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9388 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9389 {
9390 /* Allow implicit promotion of the array elements to
9391 a wider type. */
9392 return ada_promote_array_of_integrals (type, val);
9393 }
9394
9395 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9396 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9397 error (_("Incompatible types in assignment"));
04624583 9398 deprecated_set_value_type (val, type);
14f9c5c9 9399 }
d2e4a39e 9400 return val;
14f9c5c9
AS
9401}
9402
4c4b4cd2
PH
9403static struct value *
9404ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9405{
9406 struct value *val;
9407 struct type *type1, *type2;
9408 LONGEST v, v1, v2;
9409
994b9211
AC
9410 arg1 = coerce_ref (arg1);
9411 arg2 = coerce_ref (arg2);
18af8284
JB
9412 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9413 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9414
76a01679
JB
9415 if (TYPE_CODE (type1) != TYPE_CODE_INT
9416 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9417 return value_binop (arg1, arg2, op);
9418
76a01679 9419 switch (op)
4c4b4cd2
PH
9420 {
9421 case BINOP_MOD:
9422 case BINOP_DIV:
9423 case BINOP_REM:
9424 break;
9425 default:
9426 return value_binop (arg1, arg2, op);
9427 }
9428
9429 v2 = value_as_long (arg2);
9430 if (v2 == 0)
323e0a4a 9431 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9432
9433 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9434 return value_binop (arg1, arg2, op);
9435
9436 v1 = value_as_long (arg1);
9437 switch (op)
9438 {
9439 case BINOP_DIV:
9440 v = v1 / v2;
76a01679
JB
9441 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9442 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9443 break;
9444 case BINOP_REM:
9445 v = v1 % v2;
76a01679
JB
9446 if (v * v1 < 0)
9447 v -= v2;
4c4b4cd2
PH
9448 break;
9449 default:
9450 /* Should not reach this point. */
9451 v = 0;
9452 }
9453
9454 val = allocate_value (type1);
990a07ab 9455 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9456 TYPE_LENGTH (value_type (val)),
9457 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9458 return val;
9459}
9460
9461static int
9462ada_value_equal (struct value *arg1, struct value *arg2)
9463{
df407dfe
AC
9464 if (ada_is_direct_array_type (value_type (arg1))
9465 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9466 {
f58b38bf
JB
9467 /* Automatically dereference any array reference before
9468 we attempt to perform the comparison. */
9469 arg1 = ada_coerce_ref (arg1);
9470 arg2 = ada_coerce_ref (arg2);
9471
4c4b4cd2
PH
9472 arg1 = ada_coerce_to_simple_array (arg1);
9473 arg2 = ada_coerce_to_simple_array (arg2);
df407dfe
AC
9474 if (TYPE_CODE (value_type (arg1)) != TYPE_CODE_ARRAY
9475 || TYPE_CODE (value_type (arg2)) != TYPE_CODE_ARRAY)
323e0a4a 9476 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9477 /* FIXME: The following works only for types whose
76a01679
JB
9478 representations use all bits (no padding or undefined bits)
9479 and do not have user-defined equality. */
9480 return
df407dfe 9481 TYPE_LENGTH (value_type (arg1)) == TYPE_LENGTH (value_type (arg2))
0fd88904 9482 && memcmp (value_contents (arg1), value_contents (arg2),
df407dfe 9483 TYPE_LENGTH (value_type (arg1))) == 0;
4c4b4cd2
PH
9484 }
9485 return value_equal (arg1, arg2);
9486}
9487
52ce6436
PH
9488/* Total number of component associations in the aggregate starting at
9489 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9490 OP_AGGREGATE. */
52ce6436
PH
9491
9492static int
9493num_component_specs (struct expression *exp, int pc)
9494{
9495 int n, m, i;
5b4ee69b 9496
52ce6436
PH
9497 m = exp->elts[pc + 1].longconst;
9498 pc += 3;
9499 n = 0;
9500 for (i = 0; i < m; i += 1)
9501 {
9502 switch (exp->elts[pc].opcode)
9503 {
9504 default:
9505 n += 1;
9506 break;
9507 case OP_CHOICES:
9508 n += exp->elts[pc + 1].longconst;
9509 break;
9510 }
9511 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9512 }
9513 return n;
9514}
9515
9516/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9517 component of LHS (a simple array or a record), updating *POS past
9518 the expression, assuming that LHS is contained in CONTAINER. Does
9519 not modify the inferior's memory, nor does it modify LHS (unless
9520 LHS == CONTAINER). */
9521
9522static void
9523assign_component (struct value *container, struct value *lhs, LONGEST index,
9524 struct expression *exp, int *pos)
9525{
9526 struct value *mark = value_mark ();
9527 struct value *elt;
5b4ee69b 9528
52ce6436
PH
9529 if (TYPE_CODE (value_type (lhs)) == TYPE_CODE_ARRAY)
9530 {
22601c15
UW
9531 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9532 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9533
52ce6436
PH
9534 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9535 }
9536 else
9537 {
9538 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9539 elt = ada_to_fixed_value (elt);
52ce6436
PH
9540 }
9541
9542 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9543 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9544 else
9545 value_assign_to_component (container, elt,
9546 ada_evaluate_subexp (NULL, exp, pos,
9547 EVAL_NORMAL));
9548
9549 value_free_to_mark (mark);
9550}
9551
9552/* Assuming that LHS represents an lvalue having a record or array
9553 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9554 of that aggregate's value to LHS, advancing *POS past the
9555 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9556 lvalue containing LHS (possibly LHS itself). Does not modify
9557 the inferior's memory, nor does it modify the contents of
0963b4bd 9558 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9559
9560static struct value *
9561assign_aggregate (struct value *container,
9562 struct value *lhs, struct expression *exp,
9563 int *pos, enum noside noside)
9564{
9565 struct type *lhs_type;
9566 int n = exp->elts[*pos+1].longconst;
9567 LONGEST low_index, high_index;
9568 int num_specs;
9569 LONGEST *indices;
9570 int max_indices, num_indices;
52ce6436 9571 int i;
52ce6436
PH
9572
9573 *pos += 3;
9574 if (noside != EVAL_NORMAL)
9575 {
52ce6436
PH
9576 for (i = 0; i < n; i += 1)
9577 ada_evaluate_subexp (NULL, exp, pos, noside);
9578 return container;
9579 }
9580
9581 container = ada_coerce_ref (container);
9582 if (ada_is_direct_array_type (value_type (container)))
9583 container = ada_coerce_to_simple_array (container);
9584 lhs = ada_coerce_ref (lhs);
9585 if (!deprecated_value_modifiable (lhs))
9586 error (_("Left operand of assignment is not a modifiable lvalue."));
9587
9588 lhs_type = value_type (lhs);
9589 if (ada_is_direct_array_type (lhs_type))
9590 {
9591 lhs = ada_coerce_to_simple_array (lhs);
9592 lhs_type = value_type (lhs);
9593 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9594 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9595 }
9596 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9597 {
9598 low_index = 0;
9599 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9600 }
9601 else
9602 error (_("Left-hand side must be array or record."));
9603
9604 num_specs = num_component_specs (exp, *pos - 3);
9605 max_indices = 4 * num_specs + 4;
9606 indices = alloca (max_indices * sizeof (indices[0]));
9607 indices[0] = indices[1] = low_index - 1;
9608 indices[2] = indices[3] = high_index + 1;
9609 num_indices = 4;
9610
9611 for (i = 0; i < n; i += 1)
9612 {
9613 switch (exp->elts[*pos].opcode)
9614 {
1fbf5ada
JB
9615 case OP_CHOICES:
9616 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9617 &num_indices, max_indices,
9618 low_index, high_index);
9619 break;
9620 case OP_POSITIONAL:
9621 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9622 &num_indices, max_indices,
9623 low_index, high_index);
1fbf5ada
JB
9624 break;
9625 case OP_OTHERS:
9626 if (i != n-1)
9627 error (_("Misplaced 'others' clause"));
9628 aggregate_assign_others (container, lhs, exp, pos, indices,
9629 num_indices, low_index, high_index);
9630 break;
9631 default:
9632 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9633 }
9634 }
9635
9636 return container;
9637}
9638
9639/* Assign into the component of LHS indexed by the OP_POSITIONAL
9640 construct at *POS, updating *POS past the construct, given that
9641 the positions are relative to lower bound LOW, where HIGH is the
9642 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9643 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9644 assign_aggregate. */
52ce6436
PH
9645static void
9646aggregate_assign_positional (struct value *container,
9647 struct value *lhs, struct expression *exp,
9648 int *pos, LONGEST *indices, int *num_indices,
9649 int max_indices, LONGEST low, LONGEST high)
9650{
9651 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9652
9653 if (ind - 1 == high)
e1d5a0d2 9654 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9655 if (ind <= high)
9656 {
9657 add_component_interval (ind, ind, indices, num_indices, max_indices);
9658 *pos += 3;
9659 assign_component (container, lhs, ind, exp, pos);
9660 }
9661 else
9662 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9663}
9664
9665/* Assign into the components of LHS indexed by the OP_CHOICES
9666 construct at *POS, updating *POS past the construct, given that
9667 the allowable indices are LOW..HIGH. Record the indices assigned
9668 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9669 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9670static void
9671aggregate_assign_from_choices (struct value *container,
9672 struct value *lhs, struct expression *exp,
9673 int *pos, LONGEST *indices, int *num_indices,
9674 int max_indices, LONGEST low, LONGEST high)
9675{
9676 int j;
9677 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9678 int choice_pos, expr_pc;
9679 int is_array = ada_is_direct_array_type (value_type (lhs));
9680
9681 choice_pos = *pos += 3;
9682
9683 for (j = 0; j < n_choices; j += 1)
9684 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9685 expr_pc = *pos;
9686 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9687
9688 for (j = 0; j < n_choices; j += 1)
9689 {
9690 LONGEST lower, upper;
9691 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9692
52ce6436
PH
9693 if (op == OP_DISCRETE_RANGE)
9694 {
9695 choice_pos += 1;
9696 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9697 EVAL_NORMAL));
9698 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9699 EVAL_NORMAL));
9700 }
9701 else if (is_array)
9702 {
9703 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9704 EVAL_NORMAL));
9705 upper = lower;
9706 }
9707 else
9708 {
9709 int ind;
0d5cff50 9710 const char *name;
5b4ee69b 9711
52ce6436
PH
9712 switch (op)
9713 {
9714 case OP_NAME:
9715 name = &exp->elts[choice_pos + 2].string;
9716 break;
9717 case OP_VAR_VALUE:
9718 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9719 break;
9720 default:
9721 error (_("Invalid record component association."));
9722 }
9723 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9724 ind = 0;
9725 if (! find_struct_field (name, value_type (lhs), 0,
9726 NULL, NULL, NULL, NULL, &ind))
9727 error (_("Unknown component name: %s."), name);
9728 lower = upper = ind;
9729 }
9730
9731 if (lower <= upper && (lower < low || upper > high))
9732 error (_("Index in component association out of bounds."));
9733
9734 add_component_interval (lower, upper, indices, num_indices,
9735 max_indices);
9736 while (lower <= upper)
9737 {
9738 int pos1;
5b4ee69b 9739
52ce6436
PH
9740 pos1 = expr_pc;
9741 assign_component (container, lhs, lower, exp, &pos1);
9742 lower += 1;
9743 }
9744 }
9745}
9746
9747/* Assign the value of the expression in the OP_OTHERS construct in
9748 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9749 have not been previously assigned. The index intervals already assigned
9750 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9751 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9752static void
9753aggregate_assign_others (struct value *container,
9754 struct value *lhs, struct expression *exp,
9755 int *pos, LONGEST *indices, int num_indices,
9756 LONGEST low, LONGEST high)
9757{
9758 int i;
5ce64950 9759 int expr_pc = *pos + 1;
52ce6436
PH
9760
9761 for (i = 0; i < num_indices - 2; i += 2)
9762 {
9763 LONGEST ind;
5b4ee69b 9764
52ce6436
PH
9765 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9766 {
5ce64950 9767 int localpos;
5b4ee69b 9768
5ce64950
MS
9769 localpos = expr_pc;
9770 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9771 }
9772 }
9773 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9774}
9775
9776/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9777 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9778 modifying *SIZE as needed. It is an error if *SIZE exceeds
9779 MAX_SIZE. The resulting intervals do not overlap. */
9780static void
9781add_component_interval (LONGEST low, LONGEST high,
9782 LONGEST* indices, int *size, int max_size)
9783{
9784 int i, j;
5b4ee69b 9785
52ce6436
PH
9786 for (i = 0; i < *size; i += 2) {
9787 if (high >= indices[i] && low <= indices[i + 1])
9788 {
9789 int kh;
5b4ee69b 9790
52ce6436
PH
9791 for (kh = i + 2; kh < *size; kh += 2)
9792 if (high < indices[kh])
9793 break;
9794 if (low < indices[i])
9795 indices[i] = low;
9796 indices[i + 1] = indices[kh - 1];
9797 if (high > indices[i + 1])
9798 indices[i + 1] = high;
9799 memcpy (indices + i + 2, indices + kh, *size - kh);
9800 *size -= kh - i - 2;
9801 return;
9802 }
9803 else if (high < indices[i])
9804 break;
9805 }
9806
9807 if (*size == max_size)
9808 error (_("Internal error: miscounted aggregate components."));
9809 *size += 2;
9810 for (j = *size-1; j >= i+2; j -= 1)
9811 indices[j] = indices[j - 2];
9812 indices[i] = low;
9813 indices[i + 1] = high;
9814}
9815
6e48bd2c
JB
9816/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9817 is different. */
9818
9819static struct value *
9820ada_value_cast (struct type *type, struct value *arg2, enum noside noside)
9821{
9822 if (type == ada_check_typedef (value_type (arg2)))
9823 return arg2;
9824
9825 if (ada_is_fixed_point_type (type))
9826 return (cast_to_fixed (type, arg2));
9827
9828 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 9829 return cast_from_fixed (type, arg2);
6e48bd2c
JB
9830
9831 return value_cast (type, arg2);
9832}
9833
284614f0
JB
9834/* Evaluating Ada expressions, and printing their result.
9835 ------------------------------------------------------
9836
21649b50
JB
9837 1. Introduction:
9838 ----------------
9839
284614f0
JB
9840 We usually evaluate an Ada expression in order to print its value.
9841 We also evaluate an expression in order to print its type, which
9842 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9843 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9844 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9845 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9846 similar.
9847
9848 Evaluating expressions is a little more complicated for Ada entities
9849 than it is for entities in languages such as C. The main reason for
9850 this is that Ada provides types whose definition might be dynamic.
9851 One example of such types is variant records. Or another example
9852 would be an array whose bounds can only be known at run time.
9853
9854 The following description is a general guide as to what should be
9855 done (and what should NOT be done) in order to evaluate an expression
9856 involving such types, and when. This does not cover how the semantic
9857 information is encoded by GNAT as this is covered separatly. For the
9858 document used as the reference for the GNAT encoding, see exp_dbug.ads
9859 in the GNAT sources.
9860
9861 Ideally, we should embed each part of this description next to its
9862 associated code. Unfortunately, the amount of code is so vast right
9863 now that it's hard to see whether the code handling a particular
9864 situation might be duplicated or not. One day, when the code is
9865 cleaned up, this guide might become redundant with the comments
9866 inserted in the code, and we might want to remove it.
9867
21649b50
JB
9868 2. ``Fixing'' an Entity, the Simple Case:
9869 -----------------------------------------
9870
284614f0
JB
9871 When evaluating Ada expressions, the tricky issue is that they may
9872 reference entities whose type contents and size are not statically
9873 known. Consider for instance a variant record:
9874
9875 type Rec (Empty : Boolean := True) is record
9876 case Empty is
9877 when True => null;
9878 when False => Value : Integer;
9879 end case;
9880 end record;
9881 Yes : Rec := (Empty => False, Value => 1);
9882 No : Rec := (empty => True);
9883
9884 The size and contents of that record depends on the value of the
9885 descriminant (Rec.Empty). At this point, neither the debugging
9886 information nor the associated type structure in GDB are able to
9887 express such dynamic types. So what the debugger does is to create
9888 "fixed" versions of the type that applies to the specific object.
9889 We also informally refer to this opperation as "fixing" an object,
9890 which means creating its associated fixed type.
9891
9892 Example: when printing the value of variable "Yes" above, its fixed
9893 type would look like this:
9894
9895 type Rec is record
9896 Empty : Boolean;
9897 Value : Integer;
9898 end record;
9899
9900 On the other hand, if we printed the value of "No", its fixed type
9901 would become:
9902
9903 type Rec is record
9904 Empty : Boolean;
9905 end record;
9906
9907 Things become a little more complicated when trying to fix an entity
9908 with a dynamic type that directly contains another dynamic type,
9909 such as an array of variant records, for instance. There are
9910 two possible cases: Arrays, and records.
9911
21649b50
JB
9912 3. ``Fixing'' Arrays:
9913 ---------------------
9914
9915 The type structure in GDB describes an array in terms of its bounds,
9916 and the type of its elements. By design, all elements in the array
9917 have the same type and we cannot represent an array of variant elements
9918 using the current type structure in GDB. When fixing an array,
9919 we cannot fix the array element, as we would potentially need one
9920 fixed type per element of the array. As a result, the best we can do
9921 when fixing an array is to produce an array whose bounds and size
9922 are correct (allowing us to read it from memory), but without having
9923 touched its element type. Fixing each element will be done later,
9924 when (if) necessary.
9925
9926 Arrays are a little simpler to handle than records, because the same
9927 amount of memory is allocated for each element of the array, even if
1b536f04 9928 the amount of space actually used by each element differs from element
21649b50 9929 to element. Consider for instance the following array of type Rec:
284614f0
JB
9930
9931 type Rec_Array is array (1 .. 2) of Rec;
9932
1b536f04
JB
9933 The actual amount of memory occupied by each element might be different
9934 from element to element, depending on the value of their discriminant.
21649b50 9935 But the amount of space reserved for each element in the array remains
1b536f04 9936 fixed regardless. So we simply need to compute that size using
21649b50
JB
9937 the debugging information available, from which we can then determine
9938 the array size (we multiply the number of elements of the array by
9939 the size of each element).
9940
9941 The simplest case is when we have an array of a constrained element
9942 type. For instance, consider the following type declarations:
9943
9944 type Bounded_String (Max_Size : Integer) is
9945 Length : Integer;
9946 Buffer : String (1 .. Max_Size);
9947 end record;
9948 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
9949
9950 In this case, the compiler describes the array as an array of
9951 variable-size elements (identified by its XVS suffix) for which
9952 the size can be read in the parallel XVZ variable.
9953
9954 In the case of an array of an unconstrained element type, the compiler
9955 wraps the array element inside a private PAD type. This type should not
9956 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9957 that we also use the adjective "aligner" in our code to designate
9958 these wrapper types.
9959
1b536f04 9960 In some cases, the size allocated for each element is statically
21649b50
JB
9961 known. In that case, the PAD type already has the correct size,
9962 and the array element should remain unfixed.
9963
9964 But there are cases when this size is not statically known.
9965 For instance, assuming that "Five" is an integer variable:
284614f0
JB
9966
9967 type Dynamic is array (1 .. Five) of Integer;
9968 type Wrapper (Has_Length : Boolean := False) is record
9969 Data : Dynamic;
9970 case Has_Length is
9971 when True => Length : Integer;
9972 when False => null;
9973 end case;
9974 end record;
9975 type Wrapper_Array is array (1 .. 2) of Wrapper;
9976
9977 Hello : Wrapper_Array := (others => (Has_Length => True,
9978 Data => (others => 17),
9979 Length => 1));
9980
9981
9982 The debugging info would describe variable Hello as being an
9983 array of a PAD type. The size of that PAD type is not statically
9984 known, but can be determined using a parallel XVZ variable.
9985 In that case, a copy of the PAD type with the correct size should
9986 be used for the fixed array.
9987
21649b50
JB
9988 3. ``Fixing'' record type objects:
9989 ----------------------------------
9990
9991 Things are slightly different from arrays in the case of dynamic
284614f0
JB
9992 record types. In this case, in order to compute the associated
9993 fixed type, we need to determine the size and offset of each of
9994 its components. This, in turn, requires us to compute the fixed
9995 type of each of these components.
9996
9997 Consider for instance the example:
9998
9999 type Bounded_String (Max_Size : Natural) is record
10000 Str : String (1 .. Max_Size);
10001 Length : Natural;
10002 end record;
10003 My_String : Bounded_String (Max_Size => 10);
10004
10005 In that case, the position of field "Length" depends on the size
10006 of field Str, which itself depends on the value of the Max_Size
21649b50 10007 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10008 we need to fix the type of field Str. Therefore, fixing a variant
10009 record requires us to fix each of its components.
10010
10011 However, if a component does not have a dynamic size, the component
10012 should not be fixed. In particular, fields that use a PAD type
10013 should not fixed. Here is an example where this might happen
10014 (assuming type Rec above):
10015
10016 type Container (Big : Boolean) is record
10017 First : Rec;
10018 After : Integer;
10019 case Big is
10020 when True => Another : Integer;
10021 when False => null;
10022 end case;
10023 end record;
10024 My_Container : Container := (Big => False,
10025 First => (Empty => True),
10026 After => 42);
10027
10028 In that example, the compiler creates a PAD type for component First,
10029 whose size is constant, and then positions the component After just
10030 right after it. The offset of component After is therefore constant
10031 in this case.
10032
10033 The debugger computes the position of each field based on an algorithm
10034 that uses, among other things, the actual position and size of the field
21649b50
JB
10035 preceding it. Let's now imagine that the user is trying to print
10036 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10037 end up computing the offset of field After based on the size of the
10038 fixed version of field First. And since in our example First has
10039 only one actual field, the size of the fixed type is actually smaller
10040 than the amount of space allocated to that field, and thus we would
10041 compute the wrong offset of field After.
10042
21649b50
JB
10043 To make things more complicated, we need to watch out for dynamic
10044 components of variant records (identified by the ___XVL suffix in
10045 the component name). Even if the target type is a PAD type, the size
10046 of that type might not be statically known. So the PAD type needs
10047 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10048 we might end up with the wrong size for our component. This can be
10049 observed with the following type declarations:
284614f0
JB
10050
10051 type Octal is new Integer range 0 .. 7;
10052 type Octal_Array is array (Positive range <>) of Octal;
10053 pragma Pack (Octal_Array);
10054
10055 type Octal_Buffer (Size : Positive) is record
10056 Buffer : Octal_Array (1 .. Size);
10057 Length : Integer;
10058 end record;
10059
10060 In that case, Buffer is a PAD type whose size is unset and needs
10061 to be computed by fixing the unwrapped type.
10062
21649b50
JB
10063 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10064 ----------------------------------------------------------
10065
10066 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10067 thus far, be actually fixed?
10068
10069 The answer is: Only when referencing that element. For instance
10070 when selecting one component of a record, this specific component
10071 should be fixed at that point in time. Or when printing the value
10072 of a record, each component should be fixed before its value gets
10073 printed. Similarly for arrays, the element of the array should be
10074 fixed when printing each element of the array, or when extracting
10075 one element out of that array. On the other hand, fixing should
10076 not be performed on the elements when taking a slice of an array!
10077
10078 Note that one of the side-effects of miscomputing the offset and
10079 size of each field is that we end up also miscomputing the size
10080 of the containing type. This can have adverse results when computing
10081 the value of an entity. GDB fetches the value of an entity based
10082 on the size of its type, and thus a wrong size causes GDB to fetch
10083 the wrong amount of memory. In the case where the computed size is
10084 too small, GDB fetches too little data to print the value of our
10085 entiry. Results in this case as unpredicatble, as we usually read
10086 past the buffer containing the data =:-o. */
10087
10088/* Implement the evaluate_exp routine in the exp_descriptor structure
10089 for the Ada language. */
10090
52ce6436 10091static struct value *
ebf56fd3 10092ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10093 int *pos, enum noside noside)
14f9c5c9
AS
10094{
10095 enum exp_opcode op;
b5385fc0 10096 int tem;
14f9c5c9 10097 int pc;
5ec18f2b 10098 int preeval_pos;
14f9c5c9
AS
10099 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10100 struct type *type;
52ce6436 10101 int nargs, oplen;
d2e4a39e 10102 struct value **argvec;
14f9c5c9 10103
d2e4a39e
AS
10104 pc = *pos;
10105 *pos += 1;
14f9c5c9
AS
10106 op = exp->elts[pc].opcode;
10107
d2e4a39e 10108 switch (op)
14f9c5c9
AS
10109 {
10110 default:
10111 *pos -= 1;
6e48bd2c 10112 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10113
10114 if (noside == EVAL_NORMAL)
10115 arg1 = unwrap_value (arg1);
6e48bd2c
JB
10116
10117 /* If evaluating an OP_DOUBLE and an EXPECT_TYPE was provided,
10118 then we need to perform the conversion manually, because
10119 evaluate_subexp_standard doesn't do it. This conversion is
10120 necessary in Ada because the different kinds of float/fixed
10121 types in Ada have different representations.
10122
10123 Similarly, we need to perform the conversion from OP_LONG
10124 ourselves. */
10125 if ((op == OP_DOUBLE || op == OP_LONG) && expect_type != NULL)
10126 arg1 = ada_value_cast (expect_type, arg1, noside);
10127
10128 return arg1;
4c4b4cd2
PH
10129
10130 case OP_STRING:
10131 {
76a01679 10132 struct value *result;
5b4ee69b 10133
76a01679
JB
10134 *pos -= 1;
10135 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10136 /* The result type will have code OP_STRING, bashed there from
10137 OP_ARRAY. Bash it back. */
df407dfe
AC
10138 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10139 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10140 return result;
4c4b4cd2 10141 }
14f9c5c9
AS
10142
10143 case UNOP_CAST:
10144 (*pos) += 2;
10145 type = exp->elts[pc + 1].type;
10146 arg1 = evaluate_subexp (type, exp, pos, noside);
10147 if (noside == EVAL_SKIP)
4c4b4cd2 10148 goto nosideret;
6e48bd2c 10149 arg1 = ada_value_cast (type, arg1, noside);
14f9c5c9
AS
10150 return arg1;
10151
4c4b4cd2
PH
10152 case UNOP_QUAL:
10153 (*pos) += 2;
10154 type = exp->elts[pc + 1].type;
10155 return ada_evaluate_subexp (type, exp, pos, noside);
10156
14f9c5c9
AS
10157 case BINOP_ASSIGN:
10158 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10159 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10160 {
10161 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10162 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10163 return arg1;
10164 return ada_value_assign (arg1, arg1);
10165 }
003f3813
JB
10166 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10167 except if the lhs of our assignment is a convenience variable.
10168 In the case of assigning to a convenience variable, the lhs
10169 should be exactly the result of the evaluation of the rhs. */
10170 type = value_type (arg1);
10171 if (VALUE_LVAL (arg1) == lval_internalvar)
10172 type = NULL;
10173 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10174 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10175 return arg1;
df407dfe
AC
10176 if (ada_is_fixed_point_type (value_type (arg1)))
10177 arg2 = cast_to_fixed (value_type (arg1), arg2);
10178 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10179 error
323e0a4a 10180 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10181 else
df407dfe 10182 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10183 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10184
10185 case BINOP_ADD:
10186 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10187 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10188 if (noside == EVAL_SKIP)
4c4b4cd2 10189 goto nosideret;
2ac8a782
JB
10190 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10191 return (value_from_longest
10192 (value_type (arg1),
10193 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10194 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10195 return (value_from_longest
10196 (value_type (arg2),
10197 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10198 if ((ada_is_fixed_point_type (value_type (arg1))
10199 || ada_is_fixed_point_type (value_type (arg2)))
10200 && value_type (arg1) != value_type (arg2))
323e0a4a 10201 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10202 /* Do the addition, and cast the result to the type of the first
10203 argument. We cannot cast the result to a reference type, so if
10204 ARG1 is a reference type, find its underlying type. */
10205 type = value_type (arg1);
10206 while (TYPE_CODE (type) == TYPE_CODE_REF)
10207 type = TYPE_TARGET_TYPE (type);
f44316fa 10208 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10209 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10210
10211 case BINOP_SUB:
10212 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10213 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10214 if (noside == EVAL_SKIP)
4c4b4cd2 10215 goto nosideret;
2ac8a782
JB
10216 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10217 return (value_from_longest
10218 (value_type (arg1),
10219 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10220 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10221 return (value_from_longest
10222 (value_type (arg2),
10223 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10224 if ((ada_is_fixed_point_type (value_type (arg1))
10225 || ada_is_fixed_point_type (value_type (arg2)))
10226 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10227 error (_("Operands of fixed-point subtraction "
10228 "must have the same type"));
b7789565
JB
10229 /* Do the substraction, and cast the result to the type of the first
10230 argument. We cannot cast the result to a reference type, so if
10231 ARG1 is a reference type, find its underlying type. */
10232 type = value_type (arg1);
10233 while (TYPE_CODE (type) == TYPE_CODE_REF)
10234 type = TYPE_TARGET_TYPE (type);
f44316fa 10235 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10236 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10237
10238 case BINOP_MUL:
10239 case BINOP_DIV:
e1578042
JB
10240 case BINOP_REM:
10241 case BINOP_MOD:
14f9c5c9
AS
10242 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10243 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10244 if (noside == EVAL_SKIP)
4c4b4cd2 10245 goto nosideret;
e1578042 10246 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10247 {
10248 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10249 return value_zero (value_type (arg1), not_lval);
10250 }
14f9c5c9 10251 else
4c4b4cd2 10252 {
a53b7a21 10253 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10254 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10255 arg1 = cast_from_fixed (type, arg1);
df407dfe 10256 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10257 arg2 = cast_from_fixed (type, arg2);
f44316fa 10258 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10259 return ada_value_binop (arg1, arg2, op);
10260 }
10261
4c4b4cd2
PH
10262 case BINOP_EQUAL:
10263 case BINOP_NOTEQUAL:
14f9c5c9 10264 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10265 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10266 if (noside == EVAL_SKIP)
76a01679 10267 goto nosideret;
4c4b4cd2 10268 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10269 tem = 0;
4c4b4cd2 10270 else
f44316fa
UW
10271 {
10272 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10273 tem = ada_value_equal (arg1, arg2);
10274 }
4c4b4cd2 10275 if (op == BINOP_NOTEQUAL)
76a01679 10276 tem = !tem;
fbb06eb1
UW
10277 type = language_bool_type (exp->language_defn, exp->gdbarch);
10278 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10279
10280 case UNOP_NEG:
10281 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10282 if (noside == EVAL_SKIP)
10283 goto nosideret;
df407dfe
AC
10284 else if (ada_is_fixed_point_type (value_type (arg1)))
10285 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10286 else
f44316fa
UW
10287 {
10288 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10289 return value_neg (arg1);
10290 }
4c4b4cd2 10291
2330c6c6
JB
10292 case BINOP_LOGICAL_AND:
10293 case BINOP_LOGICAL_OR:
10294 case UNOP_LOGICAL_NOT:
000d5124
JB
10295 {
10296 struct value *val;
10297
10298 *pos -= 1;
10299 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10300 type = language_bool_type (exp->language_defn, exp->gdbarch);
10301 return value_cast (type, val);
000d5124 10302 }
2330c6c6
JB
10303
10304 case BINOP_BITWISE_AND:
10305 case BINOP_BITWISE_IOR:
10306 case BINOP_BITWISE_XOR:
000d5124
JB
10307 {
10308 struct value *val;
10309
10310 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10311 *pos = pc;
10312 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10313
10314 return value_cast (value_type (arg1), val);
10315 }
2330c6c6 10316
14f9c5c9
AS
10317 case OP_VAR_VALUE:
10318 *pos -= 1;
6799def4 10319
14f9c5c9 10320 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10321 {
10322 *pos += 4;
10323 goto nosideret;
10324 }
da5c522f
JB
10325
10326 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10327 /* Only encountered when an unresolved symbol occurs in a
10328 context other than a function call, in which case, it is
52ce6436 10329 invalid. */
323e0a4a 10330 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10331 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10332
10333 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10334 {
0c1f74cf 10335 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10336 /* Check to see if this is a tagged type. We also need to handle
10337 the case where the type is a reference to a tagged type, but
10338 we have to be careful to exclude pointers to tagged types.
10339 The latter should be shown as usual (as a pointer), whereas
10340 a reference should mostly be transparent to the user. */
10341 if (ada_is_tagged_type (type, 0)
023db19c 10342 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10343 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10344 {
10345 /* Tagged types are a little special in the fact that the real
10346 type is dynamic and can only be determined by inspecting the
10347 object's tag. This means that we need to get the object's
10348 value first (EVAL_NORMAL) and then extract the actual object
10349 type from its tag.
10350
10351 Note that we cannot skip the final step where we extract
10352 the object type from its tag, because the EVAL_NORMAL phase
10353 results in dynamic components being resolved into fixed ones.
10354 This can cause problems when trying to print the type
10355 description of tagged types whose parent has a dynamic size:
10356 We use the type name of the "_parent" component in order
10357 to print the name of the ancestor type in the type description.
10358 If that component had a dynamic size, the resolution into
10359 a fixed type would result in the loss of that type name,
10360 thus preventing us from printing the name of the ancestor
10361 type in the type description. */
10362 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10363
10364 if (TYPE_CODE (type) != TYPE_CODE_REF)
10365 {
10366 struct type *actual_type;
10367
10368 actual_type = type_from_tag (ada_value_tag (arg1));
10369 if (actual_type == NULL)
10370 /* If, for some reason, we were unable to determine
10371 the actual type from the tag, then use the static
10372 approximation that we just computed as a fallback.
10373 This can happen if the debugging information is
10374 incomplete, for instance. */
10375 actual_type = type;
10376 return value_zero (actual_type, not_lval);
10377 }
10378 else
10379 {
10380 /* In the case of a ref, ada_coerce_ref takes care
10381 of determining the actual type. But the evaluation
10382 should return a ref as it should be valid to ask
10383 for its address; so rebuild a ref after coerce. */
10384 arg1 = ada_coerce_ref (arg1);
10385 return value_ref (arg1);
10386 }
10387 }
0c1f74cf 10388
84754697
JB
10389 /* Records and unions for which GNAT encodings have been
10390 generated need to be statically fixed as well.
10391 Otherwise, non-static fixing produces a type where
10392 all dynamic properties are removed, which prevents "ptype"
10393 from being able to completely describe the type.
10394 For instance, a case statement in a variant record would be
10395 replaced by the relevant components based on the actual
10396 value of the discriminants. */
10397 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10398 && dynamic_template_type (type) != NULL)
10399 || (TYPE_CODE (type) == TYPE_CODE_UNION
10400 && ada_find_parallel_type (type, "___XVU") != NULL))
10401 {
10402 *pos += 4;
10403 return value_zero (to_static_fixed_type (type), not_lval);
10404 }
4c4b4cd2 10405 }
da5c522f
JB
10406
10407 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10408 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10409
10410 case OP_FUNCALL:
10411 (*pos) += 2;
10412
10413 /* Allocate arg vector, including space for the function to be
10414 called in argvec[0] and a terminating NULL. */
10415 nargs = longest_to_int (exp->elts[pc + 1].longconst);
10416 argvec =
10417 (struct value **) alloca (sizeof (struct value *) * (nargs + 2));
10418
10419 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10420 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10421 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10422 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10423 else
10424 {
10425 for (tem = 0; tem <= nargs; tem += 1)
10426 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10427 argvec[tem] = 0;
10428
10429 if (noside == EVAL_SKIP)
10430 goto nosideret;
10431 }
10432
ad82864c
JB
10433 if (ada_is_constrained_packed_array_type
10434 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10435 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10436 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10437 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10438 /* This is a packed array that has already been fixed, and
10439 therefore already coerced to a simple array. Nothing further
10440 to do. */
10441 ;
df407dfe
AC
10442 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF
10443 || (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
76a01679 10444 && VALUE_LVAL (argvec[0]) == lval_memory))
4c4b4cd2
PH
10445 argvec[0] = value_addr (argvec[0]);
10446
df407dfe 10447 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10448
10449 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10450 them. So, if this is an array typedef (encoding use for array
10451 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10452 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10453 type = ada_typedef_target_type (type);
10454
4c4b4cd2
PH
10455 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10456 {
61ee279c 10457 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10458 {
10459 case TYPE_CODE_FUNC:
61ee279c 10460 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10461 break;
10462 case TYPE_CODE_ARRAY:
10463 break;
10464 case TYPE_CODE_STRUCT:
10465 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10466 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10467 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10468 break;
10469 default:
323e0a4a 10470 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10471 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10472 break;
10473 }
10474 }
10475
10476 switch (TYPE_CODE (type))
10477 {
10478 case TYPE_CODE_FUNC:
10479 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972
PH
10480 {
10481 struct type *rtype = TYPE_TARGET_TYPE (type);
10482
10483 if (TYPE_GNU_IFUNC (type))
10484 return allocate_value (TYPE_TARGET_TYPE (rtype));
10485 return allocate_value (rtype);
10486 }
4c4b4cd2 10487 return call_function_by_hand (argvec[0], nargs, argvec + 1);
c8ea1972
PH
10488 case TYPE_CODE_INTERNAL_FUNCTION:
10489 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10490 /* We don't know anything about what the internal
10491 function might return, but we have to return
10492 something. */
10493 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10494 not_lval);
10495 else
10496 return call_internal_function (exp->gdbarch, exp->language_defn,
10497 argvec[0], nargs, argvec + 1);
10498
4c4b4cd2
PH
10499 case TYPE_CODE_STRUCT:
10500 {
10501 int arity;
10502
4c4b4cd2
PH
10503 arity = ada_array_arity (type);
10504 type = ada_array_element_type (type, nargs);
10505 if (type == NULL)
323e0a4a 10506 error (_("cannot subscript or call a record"));
4c4b4cd2 10507 if (arity != nargs)
323e0a4a 10508 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10509 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10510 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10511 return
10512 unwrap_value (ada_value_subscript
10513 (argvec[0], nargs, argvec + 1));
10514 }
10515 case TYPE_CODE_ARRAY:
10516 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10517 {
10518 type = ada_array_element_type (type, nargs);
10519 if (type == NULL)
323e0a4a 10520 error (_("element type of array unknown"));
4c4b4cd2 10521 else
0a07e705 10522 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10523 }
10524 return
10525 unwrap_value (ada_value_subscript
10526 (ada_coerce_to_simple_array (argvec[0]),
10527 nargs, argvec + 1));
10528 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10529 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10530 {
deede10c 10531 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10532 type = ada_array_element_type (type, nargs);
10533 if (type == NULL)
323e0a4a 10534 error (_("element type of array unknown"));
4c4b4cd2 10535 else
0a07e705 10536 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10537 }
10538 return
deede10c
JB
10539 unwrap_value (ada_value_ptr_subscript (argvec[0],
10540 nargs, argvec + 1));
4c4b4cd2
PH
10541
10542 default:
e1d5a0d2
PH
10543 error (_("Attempt to index or call something other than an "
10544 "array or function"));
4c4b4cd2
PH
10545 }
10546
10547 case TERNOP_SLICE:
10548 {
10549 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10550 struct value *low_bound_val =
10551 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10552 struct value *high_bound_val =
10553 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10554 LONGEST low_bound;
10555 LONGEST high_bound;
5b4ee69b 10556
994b9211
AC
10557 low_bound_val = coerce_ref (low_bound_val);
10558 high_bound_val = coerce_ref (high_bound_val);
714e53ab
PH
10559 low_bound = pos_atr (low_bound_val);
10560 high_bound = pos_atr (high_bound_val);
963a6417 10561
4c4b4cd2
PH
10562 if (noside == EVAL_SKIP)
10563 goto nosideret;
10564
4c4b4cd2
PH
10565 /* If this is a reference to an aligner type, then remove all
10566 the aligners. */
df407dfe
AC
10567 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10568 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10569 TYPE_TARGET_TYPE (value_type (array)) =
10570 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10571
ad82864c 10572 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10573 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10574
10575 /* If this is a reference to an array or an array lvalue,
10576 convert to a pointer. */
df407dfe
AC
10577 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10578 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10579 && VALUE_LVAL (array) == lval_memory))
10580 array = value_addr (array);
10581
1265e4aa 10582 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10583 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10584 (value_type (array))))
0b5d8877 10585 return empty_array (ada_type_of_array (array, 0), low_bound);
4c4b4cd2
PH
10586
10587 array = ada_coerce_to_simple_array_ptr (array);
10588
714e53ab
PH
10589 /* If we have more than one level of pointer indirection,
10590 dereference the value until we get only one level. */
df407dfe
AC
10591 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10592 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10593 == TYPE_CODE_PTR))
10594 array = value_ind (array);
10595
10596 /* Make sure we really do have an array type before going further,
10597 to avoid a SEGV when trying to get the index type or the target
10598 type later down the road if the debug info generated by
10599 the compiler is incorrect or incomplete. */
df407dfe 10600 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10601 error (_("cannot take slice of non-array"));
714e53ab 10602
828292f2
JB
10603 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10604 == TYPE_CODE_PTR)
4c4b4cd2 10605 {
828292f2
JB
10606 struct type *type0 = ada_check_typedef (value_type (array));
10607
0b5d8877 10608 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
828292f2 10609 return empty_array (TYPE_TARGET_TYPE (type0), low_bound);
4c4b4cd2
PH
10610 else
10611 {
10612 struct type *arr_type0 =
828292f2 10613 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10614
f5938064
JG
10615 return ada_value_slice_from_ptr (array, arr_type0,
10616 longest_to_int (low_bound),
10617 longest_to_int (high_bound));
4c4b4cd2
PH
10618 }
10619 }
10620 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10621 return array;
10622 else if (high_bound < low_bound)
df407dfe 10623 return empty_array (value_type (array), low_bound);
4c4b4cd2 10624 else
529cad9c
PH
10625 return ada_value_slice (array, longest_to_int (low_bound),
10626 longest_to_int (high_bound));
4c4b4cd2 10627 }
14f9c5c9 10628
4c4b4cd2
PH
10629 case UNOP_IN_RANGE:
10630 (*pos) += 2;
10631 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10632 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10633
14f9c5c9 10634 if (noside == EVAL_SKIP)
4c4b4cd2 10635 goto nosideret;
14f9c5c9 10636
4c4b4cd2
PH
10637 switch (TYPE_CODE (type))
10638 {
10639 default:
e1d5a0d2
PH
10640 lim_warning (_("Membership test incompletely implemented; "
10641 "always returns true"));
fbb06eb1
UW
10642 type = language_bool_type (exp->language_defn, exp->gdbarch);
10643 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10644
10645 case TYPE_CODE_RANGE:
030b4912
UW
10646 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10647 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10648 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10649 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10650 type = language_bool_type (exp->language_defn, exp->gdbarch);
10651 return
10652 value_from_longest (type,
4c4b4cd2
PH
10653 (value_less (arg1, arg3)
10654 || value_equal (arg1, arg3))
10655 && (value_less (arg2, arg1)
10656 || value_equal (arg2, arg1)));
10657 }
10658
10659 case BINOP_IN_BOUNDS:
14f9c5c9 10660 (*pos) += 2;
4c4b4cd2
PH
10661 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10662 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10663
4c4b4cd2
PH
10664 if (noside == EVAL_SKIP)
10665 goto nosideret;
14f9c5c9 10666
4c4b4cd2 10667 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10668 {
10669 type = language_bool_type (exp->language_defn, exp->gdbarch);
10670 return value_zero (type, not_lval);
10671 }
14f9c5c9 10672
4c4b4cd2 10673 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10674
1eea4ebd
UW
10675 type = ada_index_type (value_type (arg2), tem, "range");
10676 if (!type)
10677 type = value_type (arg1);
14f9c5c9 10678
1eea4ebd
UW
10679 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10680 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10681
f44316fa
UW
10682 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10683 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10684 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10685 return
fbb06eb1 10686 value_from_longest (type,
4c4b4cd2
PH
10687 (value_less (arg1, arg3)
10688 || value_equal (arg1, arg3))
10689 && (value_less (arg2, arg1)
10690 || value_equal (arg2, arg1)));
10691
10692 case TERNOP_IN_RANGE:
10693 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10694 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10695 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10696
10697 if (noside == EVAL_SKIP)
10698 goto nosideret;
10699
f44316fa
UW
10700 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10701 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10702 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10703 return
fbb06eb1 10704 value_from_longest (type,
4c4b4cd2
PH
10705 (value_less (arg1, arg3)
10706 || value_equal (arg1, arg3))
10707 && (value_less (arg2, arg1)
10708 || value_equal (arg2, arg1)));
10709
10710 case OP_ATR_FIRST:
10711 case OP_ATR_LAST:
10712 case OP_ATR_LENGTH:
10713 {
76a01679 10714 struct type *type_arg;
5b4ee69b 10715
76a01679
JB
10716 if (exp->elts[*pos].opcode == OP_TYPE)
10717 {
10718 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10719 arg1 = NULL;
5bc23cb3 10720 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10721 }
10722 else
10723 {
10724 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10725 type_arg = NULL;
10726 }
10727
10728 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10729 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10730 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10731 *pos += 4;
10732
10733 if (noside == EVAL_SKIP)
10734 goto nosideret;
10735
10736 if (type_arg == NULL)
10737 {
10738 arg1 = ada_coerce_ref (arg1);
10739
ad82864c 10740 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
10741 arg1 = ada_coerce_to_simple_array (arg1);
10742
aa4fb036 10743 if (op == OP_ATR_LENGTH)
1eea4ebd 10744 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10745 else
10746 {
10747 type = ada_index_type (value_type (arg1), tem,
10748 ada_attribute_name (op));
10749 if (type == NULL)
10750 type = builtin_type (exp->gdbarch)->builtin_int;
10751 }
76a01679
JB
10752
10753 if (noside == EVAL_AVOID_SIDE_EFFECTS)
1eea4ebd 10754 return allocate_value (type);
76a01679
JB
10755
10756 switch (op)
10757 {
10758 default: /* Should never happen. */
323e0a4a 10759 error (_("unexpected attribute encountered"));
76a01679 10760 case OP_ATR_FIRST:
1eea4ebd
UW
10761 return value_from_longest
10762 (type, ada_array_bound (arg1, tem, 0));
76a01679 10763 case OP_ATR_LAST:
1eea4ebd
UW
10764 return value_from_longest
10765 (type, ada_array_bound (arg1, tem, 1));
76a01679 10766 case OP_ATR_LENGTH:
1eea4ebd
UW
10767 return value_from_longest
10768 (type, ada_array_length (arg1, tem));
76a01679
JB
10769 }
10770 }
10771 else if (discrete_type_p (type_arg))
10772 {
10773 struct type *range_type;
0d5cff50 10774 const char *name = ada_type_name (type_arg);
5b4ee69b 10775
76a01679
JB
10776 range_type = NULL;
10777 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 10778 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
10779 if (range_type == NULL)
10780 range_type = type_arg;
10781 switch (op)
10782 {
10783 default:
323e0a4a 10784 error (_("unexpected attribute encountered"));
76a01679 10785 case OP_ATR_FIRST:
690cc4eb 10786 return value_from_longest
43bbcdc2 10787 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 10788 case OP_ATR_LAST:
690cc4eb 10789 return value_from_longest
43bbcdc2 10790 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 10791 case OP_ATR_LENGTH:
323e0a4a 10792 error (_("the 'length attribute applies only to array types"));
76a01679
JB
10793 }
10794 }
10795 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 10796 error (_("unimplemented type attribute"));
76a01679
JB
10797 else
10798 {
10799 LONGEST low, high;
10800
ad82864c
JB
10801 if (ada_is_constrained_packed_array_type (type_arg))
10802 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10803
aa4fb036 10804 if (op == OP_ATR_LENGTH)
1eea4ebd 10805 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10806 else
10807 {
10808 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10809 if (type == NULL)
10810 type = builtin_type (exp->gdbarch)->builtin_int;
10811 }
1eea4ebd 10812
76a01679
JB
10813 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10814 return allocate_value (type);
10815
10816 switch (op)
10817 {
10818 default:
323e0a4a 10819 error (_("unexpected attribute encountered"));
76a01679 10820 case OP_ATR_FIRST:
1eea4ebd 10821 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
10822 return value_from_longest (type, low);
10823 case OP_ATR_LAST:
1eea4ebd 10824 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10825 return value_from_longest (type, high);
10826 case OP_ATR_LENGTH:
1eea4ebd
UW
10827 low = ada_array_bound_from_type (type_arg, tem, 0);
10828 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10829 return value_from_longest (type, high - low + 1);
10830 }
10831 }
14f9c5c9
AS
10832 }
10833
4c4b4cd2
PH
10834 case OP_ATR_TAG:
10835 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10836 if (noside == EVAL_SKIP)
76a01679 10837 goto nosideret;
4c4b4cd2
PH
10838
10839 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10840 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10841
10842 return ada_value_tag (arg1);
10843
10844 case OP_ATR_MIN:
10845 case OP_ATR_MAX:
10846 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10847 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10848 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10849 if (noside == EVAL_SKIP)
76a01679 10850 goto nosideret;
d2e4a39e 10851 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10852 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10853 else
f44316fa
UW
10854 {
10855 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10856 return value_binop (arg1, arg2,
10857 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10858 }
14f9c5c9 10859
4c4b4cd2
PH
10860 case OP_ATR_MODULUS:
10861 {
31dedfee 10862 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10863
5b4ee69b 10864 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
10865 if (noside == EVAL_SKIP)
10866 goto nosideret;
4c4b4cd2 10867
76a01679 10868 if (!ada_is_modular_type (type_arg))
323e0a4a 10869 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10870
76a01679
JB
10871 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10872 ada_modulus (type_arg));
4c4b4cd2
PH
10873 }
10874
10875
10876 case OP_ATR_POS:
10877 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10878 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10879 if (noside == EVAL_SKIP)
76a01679 10880 goto nosideret;
3cb382c9
UW
10881 type = builtin_type (exp->gdbarch)->builtin_int;
10882 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10883 return value_zero (type, not_lval);
14f9c5c9 10884 else
3cb382c9 10885 return value_pos_atr (type, arg1);
14f9c5c9 10886
4c4b4cd2
PH
10887 case OP_ATR_SIZE:
10888 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
10889 type = value_type (arg1);
10890
10891 /* If the argument is a reference, then dereference its type, since
10892 the user is really asking for the size of the actual object,
10893 not the size of the pointer. */
10894 if (TYPE_CODE (type) == TYPE_CODE_REF)
10895 type = TYPE_TARGET_TYPE (type);
10896
4c4b4cd2 10897 if (noside == EVAL_SKIP)
76a01679 10898 goto nosideret;
4c4b4cd2 10899 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 10900 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10901 else
22601c15 10902 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 10903 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10904
10905 case OP_ATR_VAL:
10906 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 10907 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 10908 type = exp->elts[pc + 2].type;
14f9c5c9 10909 if (noside == EVAL_SKIP)
76a01679 10910 goto nosideret;
4c4b4cd2 10911 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10912 return value_zero (type, not_lval);
4c4b4cd2 10913 else
76a01679 10914 return value_val_atr (type, arg1);
4c4b4cd2
PH
10915
10916 case BINOP_EXP:
10917 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10918 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10919 if (noside == EVAL_SKIP)
10920 goto nosideret;
10921 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10922 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 10923 else
f44316fa
UW
10924 {
10925 /* For integer exponentiation operations,
10926 only promote the first argument. */
10927 if (is_integral_type (value_type (arg2)))
10928 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10929 else
10930 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10931
10932 return value_binop (arg1, arg2, op);
10933 }
4c4b4cd2
PH
10934
10935 case UNOP_PLUS:
10936 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10937 if (noside == EVAL_SKIP)
10938 goto nosideret;
10939 else
10940 return arg1;
10941
10942 case UNOP_ABS:
10943 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10944 if (noside == EVAL_SKIP)
10945 goto nosideret;
f44316fa 10946 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 10947 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 10948 return value_neg (arg1);
14f9c5c9 10949 else
4c4b4cd2 10950 return arg1;
14f9c5c9
AS
10951
10952 case UNOP_IND:
5ec18f2b 10953 preeval_pos = *pos;
6b0d7253 10954 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10955 if (noside == EVAL_SKIP)
4c4b4cd2 10956 goto nosideret;
df407dfe 10957 type = ada_check_typedef (value_type (arg1));
14f9c5c9 10958 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
10959 {
10960 if (ada_is_array_descriptor_type (type))
10961 /* GDB allows dereferencing GNAT array descriptors. */
10962 {
10963 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 10964
4c4b4cd2 10965 if (arrType == NULL)
323e0a4a 10966 error (_("Attempt to dereference null array pointer."));
00a4c844 10967 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
10968 }
10969 else if (TYPE_CODE (type) == TYPE_CODE_PTR
10970 || TYPE_CODE (type) == TYPE_CODE_REF
10971 /* In C you can dereference an array to get the 1st elt. */
10972 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 10973 {
5ec18f2b
JG
10974 /* As mentioned in the OP_VAR_VALUE case, tagged types can
10975 only be determined by inspecting the object's tag.
10976 This means that we need to evaluate completely the
10977 expression in order to get its type. */
10978
023db19c
JB
10979 if ((TYPE_CODE (type) == TYPE_CODE_REF
10980 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
10981 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
10982 {
10983 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10984 EVAL_NORMAL);
10985 type = value_type (ada_value_ind (arg1));
10986 }
10987 else
10988 {
10989 type = to_static_fixed_type
10990 (ada_aligned_type
10991 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
10992 }
c1b5a1a6 10993 ada_ensure_varsize_limit (type);
714e53ab
PH
10994 return value_zero (type, lval_memory);
10995 }
4c4b4cd2 10996 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
10997 {
10998 /* GDB allows dereferencing an int. */
10999 if (expect_type == NULL)
11000 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11001 lval_memory);
11002 else
11003 {
11004 expect_type =
11005 to_static_fixed_type (ada_aligned_type (expect_type));
11006 return value_zero (expect_type, lval_memory);
11007 }
11008 }
4c4b4cd2 11009 else
323e0a4a 11010 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11011 }
0963b4bd 11012 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11013 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11014
96967637
JB
11015 if (TYPE_CODE (type) == TYPE_CODE_INT)
11016 /* GDB allows dereferencing an int. If we were given
11017 the expect_type, then use that as the target type.
11018 Otherwise, assume that the target type is an int. */
11019 {
11020 if (expect_type != NULL)
11021 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11022 arg1));
11023 else
11024 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11025 (CORE_ADDR) value_as_address (arg1));
11026 }
6b0d7253 11027
4c4b4cd2
PH
11028 if (ada_is_array_descriptor_type (type))
11029 /* GDB allows dereferencing GNAT array descriptors. */
11030 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11031 else
4c4b4cd2 11032 return ada_value_ind (arg1);
14f9c5c9
AS
11033
11034 case STRUCTOP_STRUCT:
11035 tem = longest_to_int (exp->elts[pc + 1].longconst);
11036 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11037 preeval_pos = *pos;
14f9c5c9
AS
11038 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11039 if (noside == EVAL_SKIP)
4c4b4cd2 11040 goto nosideret;
14f9c5c9 11041 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11042 {
df407dfe 11043 struct type *type1 = value_type (arg1);
5b4ee69b 11044
76a01679
JB
11045 if (ada_is_tagged_type (type1, 1))
11046 {
11047 type = ada_lookup_struct_elt_type (type1,
11048 &exp->elts[pc + 2].string,
11049 1, 1, NULL);
5ec18f2b
JG
11050
11051 /* If the field is not found, check if it exists in the
11052 extension of this object's type. This means that we
11053 need to evaluate completely the expression. */
11054
76a01679 11055 if (type == NULL)
5ec18f2b
JG
11056 {
11057 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11058 EVAL_NORMAL);
11059 arg1 = ada_value_struct_elt (arg1,
11060 &exp->elts[pc + 2].string,
11061 0);
11062 arg1 = unwrap_value (arg1);
11063 type = value_type (ada_to_fixed_value (arg1));
11064 }
76a01679
JB
11065 }
11066 else
11067 type =
11068 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
11069 0, NULL);
11070
11071 return value_zero (ada_aligned_type (type), lval_memory);
11072 }
14f9c5c9 11073 else
284614f0
JB
11074 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11075 arg1 = unwrap_value (arg1);
11076 return ada_to_fixed_value (arg1);
11077
14f9c5c9 11078 case OP_TYPE:
4c4b4cd2
PH
11079 /* The value is not supposed to be used. This is here to make it
11080 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11081 (*pos) += 2;
11082 if (noside == EVAL_SKIP)
4c4b4cd2 11083 goto nosideret;
14f9c5c9 11084 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11085 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11086 else
323e0a4a 11087 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11088
11089 case OP_AGGREGATE:
11090 case OP_CHOICES:
11091 case OP_OTHERS:
11092 case OP_DISCRETE_RANGE:
11093 case OP_POSITIONAL:
11094 case OP_NAME:
11095 if (noside == EVAL_NORMAL)
11096 switch (op)
11097 {
11098 case OP_NAME:
11099 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11100 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11101 case OP_AGGREGATE:
11102 error (_("Aggregates only allowed on the right of an assignment"));
11103 default:
0963b4bd
MS
11104 internal_error (__FILE__, __LINE__,
11105 _("aggregate apparently mangled"));
52ce6436
PH
11106 }
11107
11108 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11109 *pos += oplen - 1;
11110 for (tem = 0; tem < nargs; tem += 1)
11111 ada_evaluate_subexp (NULL, exp, pos, noside);
11112 goto nosideret;
14f9c5c9
AS
11113 }
11114
11115nosideret:
22601c15 11116 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int, 1);
14f9c5c9 11117}
14f9c5c9 11118\f
d2e4a39e 11119
4c4b4cd2 11120 /* Fixed point */
14f9c5c9
AS
11121
11122/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11123 type name that encodes the 'small and 'delta information.
4c4b4cd2 11124 Otherwise, return NULL. */
14f9c5c9 11125
d2e4a39e 11126static const char *
ebf56fd3 11127fixed_type_info (struct type *type)
14f9c5c9 11128{
d2e4a39e 11129 const char *name = ada_type_name (type);
14f9c5c9
AS
11130 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11131
d2e4a39e
AS
11132 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11133 {
14f9c5c9 11134 const char *tail = strstr (name, "___XF_");
5b4ee69b 11135
14f9c5c9 11136 if (tail == NULL)
4c4b4cd2 11137 return NULL;
d2e4a39e 11138 else
4c4b4cd2 11139 return tail + 5;
14f9c5c9
AS
11140 }
11141 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11142 return fixed_type_info (TYPE_TARGET_TYPE (type));
11143 else
11144 return NULL;
11145}
11146
4c4b4cd2 11147/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11148
11149int
ebf56fd3 11150ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11151{
11152 return fixed_type_info (type) != NULL;
11153}
11154
4c4b4cd2
PH
11155/* Return non-zero iff TYPE represents a System.Address type. */
11156
11157int
11158ada_is_system_address_type (struct type *type)
11159{
11160 return (TYPE_NAME (type)
11161 && strcmp (TYPE_NAME (type), "system__address") == 0);
11162}
11163
14f9c5c9
AS
11164/* Assuming that TYPE is the representation of an Ada fixed-point
11165 type, return its delta, or -1 if the type is malformed and the
4c4b4cd2 11166 delta cannot be determined. */
14f9c5c9
AS
11167
11168DOUBLEST
ebf56fd3 11169ada_delta (struct type *type)
14f9c5c9
AS
11170{
11171 const char *encoding = fixed_type_info (type);
facc390f 11172 DOUBLEST num, den;
14f9c5c9 11173
facc390f
JB
11174 /* Strictly speaking, num and den are encoded as integer. However,
11175 they may not fit into a long, and they will have to be converted
11176 to DOUBLEST anyway. So scan them as DOUBLEST. */
11177 if (sscanf (encoding, "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11178 &num, &den) < 2)
14f9c5c9 11179 return -1.0;
d2e4a39e 11180 else
facc390f 11181 return num / den;
14f9c5c9
AS
11182}
11183
11184/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11185 factor ('SMALL value) associated with the type. */
14f9c5c9
AS
11186
11187static DOUBLEST
ebf56fd3 11188scaling_factor (struct type *type)
14f9c5c9
AS
11189{
11190 const char *encoding = fixed_type_info (type);
facc390f 11191 DOUBLEST num0, den0, num1, den1;
14f9c5c9 11192 int n;
d2e4a39e 11193
facc390f
JB
11194 /* Strictly speaking, num's and den's are encoded as integer. However,
11195 they may not fit into a long, and they will have to be converted
11196 to DOUBLEST anyway. So scan them as DOUBLEST. */
11197 n = sscanf (encoding,
11198 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT
11199 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11200 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11201
11202 if (n < 2)
11203 return 1.0;
11204 else if (n == 4)
facc390f 11205 return num1 / den1;
d2e4a39e 11206 else
facc390f 11207 return num0 / den0;
14f9c5c9
AS
11208}
11209
11210
11211/* Assuming that X is the representation of a value of fixed-point
4c4b4cd2 11212 type TYPE, return its floating-point equivalent. */
14f9c5c9
AS
11213
11214DOUBLEST
ebf56fd3 11215ada_fixed_to_float (struct type *type, LONGEST x)
14f9c5c9 11216{
d2e4a39e 11217 return (DOUBLEST) x *scaling_factor (type);
14f9c5c9
AS
11218}
11219
4c4b4cd2
PH
11220/* The representation of a fixed-point value of type TYPE
11221 corresponding to the value X. */
14f9c5c9
AS
11222
11223LONGEST
ebf56fd3 11224ada_float_to_fixed (struct type *type, DOUBLEST x)
14f9c5c9
AS
11225{
11226 return (LONGEST) (x / scaling_factor (type) + 0.5);
11227}
11228
14f9c5c9 11229\f
d2e4a39e 11230
4c4b4cd2 11231 /* Range types */
14f9c5c9
AS
11232
11233/* Scan STR beginning at position K for a discriminant name, and
11234 return the value of that discriminant field of DVAL in *PX. If
11235 PNEW_K is not null, put the position of the character beyond the
11236 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11237 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11238
11239static int
07d8f827 11240scan_discrim_bound (char *str, int k, struct value *dval, LONGEST * px,
76a01679 11241 int *pnew_k)
14f9c5c9
AS
11242{
11243 static char *bound_buffer = NULL;
11244 static size_t bound_buffer_len = 0;
11245 char *bound;
11246 char *pend;
d2e4a39e 11247 struct value *bound_val;
14f9c5c9
AS
11248
11249 if (dval == NULL || str == NULL || str[k] == '\0')
11250 return 0;
11251
d2e4a39e 11252 pend = strstr (str + k, "__");
14f9c5c9
AS
11253 if (pend == NULL)
11254 {
d2e4a39e 11255 bound = str + k;
14f9c5c9
AS
11256 k += strlen (bound);
11257 }
d2e4a39e 11258 else
14f9c5c9 11259 {
d2e4a39e 11260 GROW_VECT (bound_buffer, bound_buffer_len, pend - (str + k) + 1);
14f9c5c9 11261 bound = bound_buffer;
d2e4a39e
AS
11262 strncpy (bound_buffer, str + k, pend - (str + k));
11263 bound[pend - (str + k)] = '\0';
11264 k = pend - str;
14f9c5c9 11265 }
d2e4a39e 11266
df407dfe 11267 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11268 if (bound_val == NULL)
11269 return 0;
11270
11271 *px = value_as_long (bound_val);
11272 if (pnew_k != NULL)
11273 *pnew_k = k;
11274 return 1;
11275}
11276
11277/* Value of variable named NAME in the current environment. If
11278 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11279 otherwise causes an error with message ERR_MSG. */
11280
d2e4a39e
AS
11281static struct value *
11282get_var_value (char *name, char *err_msg)
14f9c5c9 11283{
4c4b4cd2 11284 struct ada_symbol_info *syms;
14f9c5c9
AS
11285 int nsyms;
11286
4c4b4cd2 11287 nsyms = ada_lookup_symbol_list (name, get_selected_block (0), VAR_DOMAIN,
4eeaa230 11288 &syms);
14f9c5c9
AS
11289
11290 if (nsyms != 1)
11291 {
11292 if (err_msg == NULL)
4c4b4cd2 11293 return 0;
14f9c5c9 11294 else
8a3fe4f8 11295 error (("%s"), err_msg);
14f9c5c9
AS
11296 }
11297
4c4b4cd2 11298 return value_of_variable (syms[0].sym, syms[0].block);
14f9c5c9 11299}
d2e4a39e 11300
14f9c5c9 11301/* Value of integer variable named NAME in the current environment. If
4c4b4cd2
PH
11302 no such variable found, returns 0, and sets *FLAG to 0. If
11303 successful, sets *FLAG to 1. */
11304
14f9c5c9 11305LONGEST
4c4b4cd2 11306get_int_var_value (char *name, int *flag)
14f9c5c9 11307{
4c4b4cd2 11308 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11309
14f9c5c9
AS
11310 if (var_val == 0)
11311 {
11312 if (flag != NULL)
4c4b4cd2 11313 *flag = 0;
14f9c5c9
AS
11314 return 0;
11315 }
11316 else
11317 {
11318 if (flag != NULL)
4c4b4cd2 11319 *flag = 1;
14f9c5c9
AS
11320 return value_as_long (var_val);
11321 }
11322}
d2e4a39e 11323
14f9c5c9
AS
11324
11325/* Return a range type whose base type is that of the range type named
11326 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11327 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11328 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11329 corresponding range type from debug information; fall back to using it
11330 if symbol lookup fails. If a new type must be created, allocate it
11331 like ORIG_TYPE was. The bounds information, in general, is encoded
11332 in NAME, the base type given in the named range type. */
14f9c5c9 11333
d2e4a39e 11334static struct type *
28c85d6c 11335to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11336{
0d5cff50 11337 const char *name;
14f9c5c9 11338 struct type *base_type;
d2e4a39e 11339 char *subtype_info;
14f9c5c9 11340
28c85d6c
JB
11341 gdb_assert (raw_type != NULL);
11342 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11343
1ce677a4 11344 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11345 base_type = TYPE_TARGET_TYPE (raw_type);
11346 else
11347 base_type = raw_type;
11348
28c85d6c 11349 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11350 subtype_info = strstr (name, "___XD");
11351 if (subtype_info == NULL)
690cc4eb 11352 {
43bbcdc2
PH
11353 LONGEST L = ada_discrete_type_low_bound (raw_type);
11354 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11355
690cc4eb
PH
11356 if (L < INT_MIN || U > INT_MAX)
11357 return raw_type;
11358 else
0c9c3474
SA
11359 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11360 L, U);
690cc4eb 11361 }
14f9c5c9
AS
11362 else
11363 {
11364 static char *name_buf = NULL;
11365 static size_t name_len = 0;
11366 int prefix_len = subtype_info - name;
11367 LONGEST L, U;
11368 struct type *type;
11369 char *bounds_str;
11370 int n;
11371
11372 GROW_VECT (name_buf, name_len, prefix_len + 5);
11373 strncpy (name_buf, name, prefix_len);
11374 name_buf[prefix_len] = '\0';
11375
11376 subtype_info += 5;
11377 bounds_str = strchr (subtype_info, '_');
11378 n = 1;
11379
d2e4a39e 11380 if (*subtype_info == 'L')
4c4b4cd2
PH
11381 {
11382 if (!ada_scan_number (bounds_str, n, &L, &n)
11383 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11384 return raw_type;
11385 if (bounds_str[n] == '_')
11386 n += 2;
0963b4bd 11387 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11388 n += 1;
11389 subtype_info += 1;
11390 }
d2e4a39e 11391 else
4c4b4cd2
PH
11392 {
11393 int ok;
5b4ee69b 11394
4c4b4cd2
PH
11395 strcpy (name_buf + prefix_len, "___L");
11396 L = get_int_var_value (name_buf, &ok);
11397 if (!ok)
11398 {
323e0a4a 11399 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11400 L = 1;
11401 }
11402 }
14f9c5c9 11403
d2e4a39e 11404 if (*subtype_info == 'U')
4c4b4cd2
PH
11405 {
11406 if (!ada_scan_number (bounds_str, n, &U, &n)
11407 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11408 return raw_type;
11409 }
d2e4a39e 11410 else
4c4b4cd2
PH
11411 {
11412 int ok;
5b4ee69b 11413
4c4b4cd2
PH
11414 strcpy (name_buf + prefix_len, "___U");
11415 U = get_int_var_value (name_buf, &ok);
11416 if (!ok)
11417 {
323e0a4a 11418 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11419 U = L;
11420 }
11421 }
14f9c5c9 11422
0c9c3474
SA
11423 type = create_static_range_type (alloc_type_copy (raw_type),
11424 base_type, L, U);
d2e4a39e 11425 TYPE_NAME (type) = name;
14f9c5c9
AS
11426 return type;
11427 }
11428}
11429
4c4b4cd2
PH
11430/* True iff NAME is the name of a range type. */
11431
14f9c5c9 11432int
d2e4a39e 11433ada_is_range_type_name (const char *name)
14f9c5c9
AS
11434{
11435 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11436}
14f9c5c9 11437\f
d2e4a39e 11438
4c4b4cd2
PH
11439 /* Modular types */
11440
11441/* True iff TYPE is an Ada modular type. */
14f9c5c9 11442
14f9c5c9 11443int
d2e4a39e 11444ada_is_modular_type (struct type *type)
14f9c5c9 11445{
18af8284 11446 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11447
11448 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11449 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11450 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11451}
11452
4c4b4cd2
PH
11453/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11454
61ee279c 11455ULONGEST
0056e4d5 11456ada_modulus (struct type *type)
14f9c5c9 11457{
43bbcdc2 11458 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11459}
d2e4a39e 11460\f
f7f9143b
JB
11461
11462/* Ada exception catchpoint support:
11463 ---------------------------------
11464
11465 We support 3 kinds of exception catchpoints:
11466 . catchpoints on Ada exceptions
11467 . catchpoints on unhandled Ada exceptions
11468 . catchpoints on failed assertions
11469
11470 Exceptions raised during failed assertions, or unhandled exceptions
11471 could perfectly be caught with the general catchpoint on Ada exceptions.
11472 However, we can easily differentiate these two special cases, and having
11473 the option to distinguish these two cases from the rest can be useful
11474 to zero-in on certain situations.
11475
11476 Exception catchpoints are a specialized form of breakpoint,
11477 since they rely on inserting breakpoints inside known routines
11478 of the GNAT runtime. The implementation therefore uses a standard
11479 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11480 of breakpoint_ops.
11481
0259addd
JB
11482 Support in the runtime for exception catchpoints have been changed
11483 a few times already, and these changes affect the implementation
11484 of these catchpoints. In order to be able to support several
11485 variants of the runtime, we use a sniffer that will determine
28010a5d 11486 the runtime variant used by the program being debugged. */
f7f9143b 11487
82eacd52
JB
11488/* Ada's standard exceptions.
11489
11490 The Ada 83 standard also defined Numeric_Error. But there so many
11491 situations where it was unclear from the Ada 83 Reference Manual
11492 (RM) whether Constraint_Error or Numeric_Error should be raised,
11493 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11494 Interpretation saying that anytime the RM says that Numeric_Error
11495 should be raised, the implementation may raise Constraint_Error.
11496 Ada 95 went one step further and pretty much removed Numeric_Error
11497 from the list of standard exceptions (it made it a renaming of
11498 Constraint_Error, to help preserve compatibility when compiling
11499 an Ada83 compiler). As such, we do not include Numeric_Error from
11500 this list of standard exceptions. */
3d0b0fa3
JB
11501
11502static char *standard_exc[] = {
11503 "constraint_error",
11504 "program_error",
11505 "storage_error",
11506 "tasking_error"
11507};
11508
0259addd
JB
11509typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11510
11511/* A structure that describes how to support exception catchpoints
11512 for a given executable. */
11513
11514struct exception_support_info
11515{
11516 /* The name of the symbol to break on in order to insert
11517 a catchpoint on exceptions. */
11518 const char *catch_exception_sym;
11519
11520 /* The name of the symbol to break on in order to insert
11521 a catchpoint on unhandled exceptions. */
11522 const char *catch_exception_unhandled_sym;
11523
11524 /* The name of the symbol to break on in order to insert
11525 a catchpoint on failed assertions. */
11526 const char *catch_assert_sym;
11527
11528 /* Assuming that the inferior just triggered an unhandled exception
11529 catchpoint, this function is responsible for returning the address
11530 in inferior memory where the name of that exception is stored.
11531 Return zero if the address could not be computed. */
11532 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11533};
11534
11535static CORE_ADDR ada_unhandled_exception_name_addr (void);
11536static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11537
11538/* The following exception support info structure describes how to
11539 implement exception catchpoints with the latest version of the
11540 Ada runtime (as of 2007-03-06). */
11541
11542static const struct exception_support_info default_exception_support_info =
11543{
11544 "__gnat_debug_raise_exception", /* catch_exception_sym */
11545 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11546 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11547 ada_unhandled_exception_name_addr
11548};
11549
11550/* The following exception support info structure describes how to
11551 implement exception catchpoints with a slightly older version
11552 of the Ada runtime. */
11553
11554static const struct exception_support_info exception_support_info_fallback =
11555{
11556 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11557 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11558 "system__assertions__raise_assert_failure", /* catch_assert_sym */
11559 ada_unhandled_exception_name_addr_from_raise
11560};
11561
f17011e0
JB
11562/* Return nonzero if we can detect the exception support routines
11563 described in EINFO.
11564
11565 This function errors out if an abnormal situation is detected
11566 (for instance, if we find the exception support routines, but
11567 that support is found to be incomplete). */
11568
11569static int
11570ada_has_this_exception_support (const struct exception_support_info *einfo)
11571{
11572 struct symbol *sym;
11573
11574 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11575 that should be compiled with debugging information. As a result, we
11576 expect to find that symbol in the symtabs. */
11577
11578 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11579 if (sym == NULL)
a6af7abe
JB
11580 {
11581 /* Perhaps we did not find our symbol because the Ada runtime was
11582 compiled without debugging info, or simply stripped of it.
11583 It happens on some GNU/Linux distributions for instance, where
11584 users have to install a separate debug package in order to get
11585 the runtime's debugging info. In that situation, let the user
11586 know why we cannot insert an Ada exception catchpoint.
11587
11588 Note: Just for the purpose of inserting our Ada exception
11589 catchpoint, we could rely purely on the associated minimal symbol.
11590 But we would be operating in degraded mode anyway, since we are
11591 still lacking the debugging info needed later on to extract
11592 the name of the exception being raised (this name is printed in
11593 the catchpoint message, and is also used when trying to catch
11594 a specific exception). We do not handle this case for now. */
3b7344d5 11595 struct bound_minimal_symbol msym
1c8e84b0
JB
11596 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11597
3b7344d5 11598 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11599 error (_("Your Ada runtime appears to be missing some debugging "
11600 "information.\nCannot insert Ada exception catchpoint "
11601 "in this configuration."));
11602
11603 return 0;
11604 }
f17011e0
JB
11605
11606 /* Make sure that the symbol we found corresponds to a function. */
11607
11608 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11609 error (_("Symbol \"%s\" is not a function (class = %d)"),
11610 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11611
11612 return 1;
11613}
11614
0259addd
JB
11615/* Inspect the Ada runtime and determine which exception info structure
11616 should be used to provide support for exception catchpoints.
11617
3eecfa55
JB
11618 This function will always set the per-inferior exception_info,
11619 or raise an error. */
0259addd
JB
11620
11621static void
11622ada_exception_support_info_sniffer (void)
11623{
3eecfa55 11624 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11625
11626 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11627 if (data->exception_info != NULL)
0259addd
JB
11628 return;
11629
11630 /* Check the latest (default) exception support info. */
f17011e0 11631 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11632 {
3eecfa55 11633 data->exception_info = &default_exception_support_info;
0259addd
JB
11634 return;
11635 }
11636
11637 /* Try our fallback exception suport info. */
f17011e0 11638 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11639 {
3eecfa55 11640 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11641 return;
11642 }
11643
11644 /* Sometimes, it is normal for us to not be able to find the routine
11645 we are looking for. This happens when the program is linked with
11646 the shared version of the GNAT runtime, and the program has not been
11647 started yet. Inform the user of these two possible causes if
11648 applicable. */
11649
ccefe4c4 11650 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11651 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11652
11653 /* If the symbol does not exist, then check that the program is
11654 already started, to make sure that shared libraries have been
11655 loaded. If it is not started, this may mean that the symbol is
11656 in a shared library. */
11657
11658 if (ptid_get_pid (inferior_ptid) == 0)
11659 error (_("Unable to insert catchpoint. Try to start the program first."));
11660
11661 /* At this point, we know that we are debugging an Ada program and
11662 that the inferior has been started, but we still are not able to
0963b4bd 11663 find the run-time symbols. That can mean that we are in
0259addd
JB
11664 configurable run time mode, or that a-except as been optimized
11665 out by the linker... In any case, at this point it is not worth
11666 supporting this feature. */
11667
7dda8cff 11668 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11669}
11670
f7f9143b
JB
11671/* True iff FRAME is very likely to be that of a function that is
11672 part of the runtime system. This is all very heuristic, but is
11673 intended to be used as advice as to what frames are uninteresting
11674 to most users. */
11675
11676static int
11677is_known_support_routine (struct frame_info *frame)
11678{
4ed6b5be 11679 struct symtab_and_line sal;
55b87a52 11680 char *func_name;
692465f1 11681 enum language func_lang;
f7f9143b 11682 int i;
f35a17b5 11683 const char *fullname;
f7f9143b 11684
4ed6b5be
JB
11685 /* If this code does not have any debugging information (no symtab),
11686 This cannot be any user code. */
f7f9143b 11687
4ed6b5be 11688 find_frame_sal (frame, &sal);
f7f9143b
JB
11689 if (sal.symtab == NULL)
11690 return 1;
11691
4ed6b5be
JB
11692 /* If there is a symtab, but the associated source file cannot be
11693 located, then assume this is not user code: Selecting a frame
11694 for which we cannot display the code would not be very helpful
11695 for the user. This should also take care of case such as VxWorks
11696 where the kernel has some debugging info provided for a few units. */
f7f9143b 11697
f35a17b5
JK
11698 fullname = symtab_to_fullname (sal.symtab);
11699 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11700 return 1;
11701
4ed6b5be
JB
11702 /* Check the unit filename againt the Ada runtime file naming.
11703 We also check the name of the objfile against the name of some
11704 known system libraries that sometimes come with debugging info
11705 too. */
11706
f7f9143b
JB
11707 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11708 {
11709 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11710 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 11711 return 1;
eb822aa6
DE
11712 if (SYMTAB_OBJFILE (sal.symtab) != NULL
11713 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 11714 return 1;
f7f9143b
JB
11715 }
11716
4ed6b5be 11717 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11718
e9e07ba6 11719 find_frame_funname (frame, &func_name, &func_lang, NULL);
f7f9143b
JB
11720 if (func_name == NULL)
11721 return 1;
11722
11723 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11724 {
11725 re_comp (known_auxiliary_function_name_patterns[i]);
11726 if (re_exec (func_name))
55b87a52
KS
11727 {
11728 xfree (func_name);
11729 return 1;
11730 }
f7f9143b
JB
11731 }
11732
55b87a52 11733 xfree (func_name);
f7f9143b
JB
11734 return 0;
11735}
11736
11737/* Find the first frame that contains debugging information and that is not
11738 part of the Ada run-time, starting from FI and moving upward. */
11739
0ef643c8 11740void
f7f9143b
JB
11741ada_find_printable_frame (struct frame_info *fi)
11742{
11743 for (; fi != NULL; fi = get_prev_frame (fi))
11744 {
11745 if (!is_known_support_routine (fi))
11746 {
11747 select_frame (fi);
11748 break;
11749 }
11750 }
11751
11752}
11753
11754/* Assuming that the inferior just triggered an unhandled exception
11755 catchpoint, return the address in inferior memory where the name
11756 of the exception is stored.
11757
11758 Return zero if the address could not be computed. */
11759
11760static CORE_ADDR
11761ada_unhandled_exception_name_addr (void)
0259addd
JB
11762{
11763 return parse_and_eval_address ("e.full_name");
11764}
11765
11766/* Same as ada_unhandled_exception_name_addr, except that this function
11767 should be used when the inferior uses an older version of the runtime,
11768 where the exception name needs to be extracted from a specific frame
11769 several frames up in the callstack. */
11770
11771static CORE_ADDR
11772ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11773{
11774 int frame_level;
11775 struct frame_info *fi;
3eecfa55 11776 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
55b87a52 11777 struct cleanup *old_chain;
f7f9143b
JB
11778
11779 /* To determine the name of this exception, we need to select
11780 the frame corresponding to RAISE_SYM_NAME. This frame is
11781 at least 3 levels up, so we simply skip the first 3 frames
11782 without checking the name of their associated function. */
11783 fi = get_current_frame ();
11784 for (frame_level = 0; frame_level < 3; frame_level += 1)
11785 if (fi != NULL)
11786 fi = get_prev_frame (fi);
11787
55b87a52 11788 old_chain = make_cleanup (null_cleanup, NULL);
f7f9143b
JB
11789 while (fi != NULL)
11790 {
55b87a52 11791 char *func_name;
692465f1
JB
11792 enum language func_lang;
11793
e9e07ba6 11794 find_frame_funname (fi, &func_name, &func_lang, NULL);
55b87a52
KS
11795 if (func_name != NULL)
11796 {
11797 make_cleanup (xfree, func_name);
11798
11799 if (strcmp (func_name,
11800 data->exception_info->catch_exception_sym) == 0)
11801 break; /* We found the frame we were looking for... */
11802 fi = get_prev_frame (fi);
11803 }
f7f9143b 11804 }
55b87a52 11805 do_cleanups (old_chain);
f7f9143b
JB
11806
11807 if (fi == NULL)
11808 return 0;
11809
11810 select_frame (fi);
11811 return parse_and_eval_address ("id.full_name");
11812}
11813
11814/* Assuming the inferior just triggered an Ada exception catchpoint
11815 (of any type), return the address in inferior memory where the name
11816 of the exception is stored, if applicable.
11817
11818 Return zero if the address could not be computed, or if not relevant. */
11819
11820static CORE_ADDR
761269c8 11821ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11822 struct breakpoint *b)
11823{
3eecfa55
JB
11824 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11825
f7f9143b
JB
11826 switch (ex)
11827 {
761269c8 11828 case ada_catch_exception:
f7f9143b
JB
11829 return (parse_and_eval_address ("e.full_name"));
11830 break;
11831
761269c8 11832 case ada_catch_exception_unhandled:
3eecfa55 11833 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b
JB
11834 break;
11835
761269c8 11836 case ada_catch_assert:
f7f9143b
JB
11837 return 0; /* Exception name is not relevant in this case. */
11838 break;
11839
11840 default:
11841 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11842 break;
11843 }
11844
11845 return 0; /* Should never be reached. */
11846}
11847
11848/* Same as ada_exception_name_addr_1, except that it intercepts and contains
11849 any error that ada_exception_name_addr_1 might cause to be thrown.
11850 When an error is intercepted, a warning with the error message is printed,
11851 and zero is returned. */
11852
11853static CORE_ADDR
761269c8 11854ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11855 struct breakpoint *b)
11856{
f7f9143b
JB
11857 CORE_ADDR result = 0;
11858
492d29ea 11859 TRY
f7f9143b
JB
11860 {
11861 result = ada_exception_name_addr_1 (ex, b);
11862 }
11863
492d29ea 11864 CATCH (e, RETURN_MASK_ERROR)
f7f9143b
JB
11865 {
11866 warning (_("failed to get exception name: %s"), e.message);
11867 return 0;
11868 }
492d29ea 11869 END_CATCH
f7f9143b
JB
11870
11871 return result;
11872}
11873
28010a5d
PA
11874static char *ada_exception_catchpoint_cond_string (const char *excep_string);
11875
11876/* Ada catchpoints.
11877
11878 In the case of catchpoints on Ada exceptions, the catchpoint will
11879 stop the target on every exception the program throws. When a user
11880 specifies the name of a specific exception, we translate this
11881 request into a condition expression (in text form), and then parse
11882 it into an expression stored in each of the catchpoint's locations.
11883 We then use this condition to check whether the exception that was
11884 raised is the one the user is interested in. If not, then the
11885 target is resumed again. We store the name of the requested
11886 exception, in order to be able to re-set the condition expression
11887 when symbols change. */
11888
11889/* An instance of this type is used to represent an Ada catchpoint
11890 breakpoint location. It includes a "struct bp_location" as a kind
11891 of base class; users downcast to "struct bp_location *" when
11892 needed. */
11893
11894struct ada_catchpoint_location
11895{
11896 /* The base class. */
11897 struct bp_location base;
11898
11899 /* The condition that checks whether the exception that was raised
11900 is the specific exception the user specified on catchpoint
11901 creation. */
11902 struct expression *excep_cond_expr;
11903};
11904
11905/* Implement the DTOR method in the bp_location_ops structure for all
11906 Ada exception catchpoint kinds. */
11907
11908static void
11909ada_catchpoint_location_dtor (struct bp_location *bl)
11910{
11911 struct ada_catchpoint_location *al = (struct ada_catchpoint_location *) bl;
11912
11913 xfree (al->excep_cond_expr);
11914}
11915
11916/* The vtable to be used in Ada catchpoint locations. */
11917
11918static const struct bp_location_ops ada_catchpoint_location_ops =
11919{
11920 ada_catchpoint_location_dtor
11921};
11922
11923/* An instance of this type is used to represent an Ada catchpoint.
11924 It includes a "struct breakpoint" as a kind of base class; users
11925 downcast to "struct breakpoint *" when needed. */
11926
11927struct ada_catchpoint
11928{
11929 /* The base class. */
11930 struct breakpoint base;
11931
11932 /* The name of the specific exception the user specified. */
11933 char *excep_string;
11934};
11935
11936/* Parse the exception condition string in the context of each of the
11937 catchpoint's locations, and store them for later evaluation. */
11938
11939static void
11940create_excep_cond_exprs (struct ada_catchpoint *c)
11941{
11942 struct cleanup *old_chain;
11943 struct bp_location *bl;
11944 char *cond_string;
11945
11946 /* Nothing to do if there's no specific exception to catch. */
11947 if (c->excep_string == NULL)
11948 return;
11949
11950 /* Same if there are no locations... */
11951 if (c->base.loc == NULL)
11952 return;
11953
11954 /* Compute the condition expression in text form, from the specific
11955 expection we want to catch. */
11956 cond_string = ada_exception_catchpoint_cond_string (c->excep_string);
11957 old_chain = make_cleanup (xfree, cond_string);
11958
11959 /* Iterate over all the catchpoint's locations, and parse an
11960 expression for each. */
11961 for (bl = c->base.loc; bl != NULL; bl = bl->next)
11962 {
11963 struct ada_catchpoint_location *ada_loc
11964 = (struct ada_catchpoint_location *) bl;
11965 struct expression *exp = NULL;
11966
11967 if (!bl->shlib_disabled)
11968 {
bbc13ae3 11969 const char *s;
28010a5d
PA
11970
11971 s = cond_string;
492d29ea 11972 TRY
28010a5d 11973 {
1bb9788d
TT
11974 exp = parse_exp_1 (&s, bl->address,
11975 block_for_pc (bl->address), 0);
28010a5d 11976 }
492d29ea 11977 CATCH (e, RETURN_MASK_ERROR)
849f2b52
JB
11978 {
11979 warning (_("failed to reevaluate internal exception condition "
11980 "for catchpoint %d: %s"),
11981 c->base.number, e.message);
11982 /* There is a bug in GCC on sparc-solaris when building with
11983 optimization which causes EXP to change unexpectedly
11984 (http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56982).
11985 The problem should be fixed starting with GCC 4.9.
11986 In the meantime, work around it by forcing EXP back
11987 to NULL. */
11988 exp = NULL;
11989 }
492d29ea 11990 END_CATCH
28010a5d
PA
11991 }
11992
11993 ada_loc->excep_cond_expr = exp;
11994 }
11995
11996 do_cleanups (old_chain);
11997}
11998
11999/* Implement the DTOR method in the breakpoint_ops structure for all
12000 exception catchpoint kinds. */
12001
12002static void
761269c8 12003dtor_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12004{
12005 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12006
12007 xfree (c->excep_string);
348d480f 12008
2060206e 12009 bkpt_breakpoint_ops.dtor (b);
28010a5d
PA
12010}
12011
12012/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12013 structure for all exception catchpoint kinds. */
12014
12015static struct bp_location *
761269c8 12016allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
12017 struct breakpoint *self)
12018{
12019 struct ada_catchpoint_location *loc;
12020
12021 loc = XNEW (struct ada_catchpoint_location);
12022 init_bp_location (&loc->base, &ada_catchpoint_location_ops, self);
12023 loc->excep_cond_expr = NULL;
12024 return &loc->base;
12025}
12026
12027/* Implement the RE_SET method in the breakpoint_ops structure for all
12028 exception catchpoint kinds. */
12029
12030static void
761269c8 12031re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12032{
12033 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12034
12035 /* Call the base class's method. This updates the catchpoint's
12036 locations. */
2060206e 12037 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12038
12039 /* Reparse the exception conditional expressions. One for each
12040 location. */
12041 create_excep_cond_exprs (c);
12042}
12043
12044/* Returns true if we should stop for this breakpoint hit. If the
12045 user specified a specific exception, we only want to cause a stop
12046 if the program thrown that exception. */
12047
12048static int
12049should_stop_exception (const struct bp_location *bl)
12050{
12051 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12052 const struct ada_catchpoint_location *ada_loc
12053 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12054 int stop;
12055
12056 /* With no specific exception, should always stop. */
12057 if (c->excep_string == NULL)
12058 return 1;
12059
12060 if (ada_loc->excep_cond_expr == NULL)
12061 {
12062 /* We will have a NULL expression if back when we were creating
12063 the expressions, this location's had failed to parse. */
12064 return 1;
12065 }
12066
12067 stop = 1;
492d29ea 12068 TRY
28010a5d
PA
12069 {
12070 struct value *mark;
12071
12072 mark = value_mark ();
12073 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr));
12074 value_free_to_mark (mark);
12075 }
492d29ea
PA
12076 CATCH (ex, RETURN_MASK_ALL)
12077 {
12078 exception_fprintf (gdb_stderr, ex,
12079 _("Error in testing exception condition:\n"));
12080 }
12081 END_CATCH
12082
28010a5d
PA
12083 return stop;
12084}
12085
12086/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12087 for all exception catchpoint kinds. */
12088
12089static void
761269c8 12090check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
12091{
12092 bs->stop = should_stop_exception (bs->bp_location_at);
12093}
12094
f7f9143b
JB
12095/* Implement the PRINT_IT method in the breakpoint_ops structure
12096 for all exception catchpoint kinds. */
12097
12098static enum print_stop_action
761269c8 12099print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 12100{
79a45e25 12101 struct ui_out *uiout = current_uiout;
348d480f
PA
12102 struct breakpoint *b = bs->breakpoint_at;
12103
956a9fb9 12104 annotate_catchpoint (b->number);
f7f9143b 12105
956a9fb9 12106 if (ui_out_is_mi_like_p (uiout))
f7f9143b 12107 {
956a9fb9
JB
12108 ui_out_field_string (uiout, "reason",
12109 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
12110 ui_out_field_string (uiout, "disp", bpdisp_text (b->disposition));
f7f9143b
JB
12111 }
12112
00eb2c4a
JB
12113 ui_out_text (uiout,
12114 b->disposition == disp_del ? "\nTemporary catchpoint "
12115 : "\nCatchpoint ");
956a9fb9
JB
12116 ui_out_field_int (uiout, "bkptno", b->number);
12117 ui_out_text (uiout, ", ");
f7f9143b 12118
f7f9143b
JB
12119 switch (ex)
12120 {
761269c8
JB
12121 case ada_catch_exception:
12122 case ada_catch_exception_unhandled:
956a9fb9
JB
12123 {
12124 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12125 char exception_name[256];
12126
12127 if (addr != 0)
12128 {
c714b426
PA
12129 read_memory (addr, (gdb_byte *) exception_name,
12130 sizeof (exception_name) - 1);
956a9fb9
JB
12131 exception_name [sizeof (exception_name) - 1] = '\0';
12132 }
12133 else
12134 {
12135 /* For some reason, we were unable to read the exception
12136 name. This could happen if the Runtime was compiled
12137 without debugging info, for instance. In that case,
12138 just replace the exception name by the generic string
12139 "exception" - it will read as "an exception" in the
12140 notification we are about to print. */
967cff16 12141 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12142 }
12143 /* In the case of unhandled exception breakpoints, we print
12144 the exception name as "unhandled EXCEPTION_NAME", to make
12145 it clearer to the user which kind of catchpoint just got
12146 hit. We used ui_out_text to make sure that this extra
12147 info does not pollute the exception name in the MI case. */
761269c8 12148 if (ex == ada_catch_exception_unhandled)
956a9fb9
JB
12149 ui_out_text (uiout, "unhandled ");
12150 ui_out_field_string (uiout, "exception-name", exception_name);
12151 }
12152 break;
761269c8 12153 case ada_catch_assert:
956a9fb9
JB
12154 /* In this case, the name of the exception is not really
12155 important. Just print "failed assertion" to make it clearer
12156 that his program just hit an assertion-failure catchpoint.
12157 We used ui_out_text because this info does not belong in
12158 the MI output. */
12159 ui_out_text (uiout, "failed assertion");
12160 break;
f7f9143b 12161 }
956a9fb9
JB
12162 ui_out_text (uiout, " at ");
12163 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12164
12165 return PRINT_SRC_AND_LOC;
12166}
12167
12168/* Implement the PRINT_ONE method in the breakpoint_ops structure
12169 for all exception catchpoint kinds. */
12170
12171static void
761269c8 12172print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12173 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12174{
79a45e25 12175 struct ui_out *uiout = current_uiout;
28010a5d 12176 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12177 struct value_print_options opts;
12178
12179 get_user_print_options (&opts);
12180 if (opts.addressprint)
f7f9143b
JB
12181 {
12182 annotate_field (4);
5af949e3 12183 ui_out_field_core_addr (uiout, "addr", b->loc->gdbarch, b->loc->address);
f7f9143b
JB
12184 }
12185
12186 annotate_field (5);
a6d9a66e 12187 *last_loc = b->loc;
f7f9143b
JB
12188 switch (ex)
12189 {
761269c8 12190 case ada_catch_exception:
28010a5d 12191 if (c->excep_string != NULL)
f7f9143b 12192 {
28010a5d
PA
12193 char *msg = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12194
f7f9143b
JB
12195 ui_out_field_string (uiout, "what", msg);
12196 xfree (msg);
12197 }
12198 else
12199 ui_out_field_string (uiout, "what", "all Ada exceptions");
12200
12201 break;
12202
761269c8 12203 case ada_catch_exception_unhandled:
f7f9143b
JB
12204 ui_out_field_string (uiout, "what", "unhandled Ada exceptions");
12205 break;
12206
761269c8 12207 case ada_catch_assert:
f7f9143b
JB
12208 ui_out_field_string (uiout, "what", "failed Ada assertions");
12209 break;
12210
12211 default:
12212 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12213 break;
12214 }
12215}
12216
12217/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12218 for all exception catchpoint kinds. */
12219
12220static void
761269c8 12221print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12222 struct breakpoint *b)
12223{
28010a5d 12224 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12225 struct ui_out *uiout = current_uiout;
28010a5d 12226
00eb2c4a
JB
12227 ui_out_text (uiout, b->disposition == disp_del ? _("Temporary catchpoint ")
12228 : _("Catchpoint "));
12229 ui_out_field_int (uiout, "bkptno", b->number);
12230 ui_out_text (uiout, ": ");
12231
f7f9143b
JB
12232 switch (ex)
12233 {
761269c8 12234 case ada_catch_exception:
28010a5d 12235 if (c->excep_string != NULL)
00eb2c4a
JB
12236 {
12237 char *info = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12238 struct cleanup *old_chain = make_cleanup (xfree, info);
12239
12240 ui_out_text (uiout, info);
12241 do_cleanups (old_chain);
12242 }
f7f9143b 12243 else
00eb2c4a 12244 ui_out_text (uiout, _("all Ada exceptions"));
f7f9143b
JB
12245 break;
12246
761269c8 12247 case ada_catch_exception_unhandled:
00eb2c4a 12248 ui_out_text (uiout, _("unhandled Ada exceptions"));
f7f9143b
JB
12249 break;
12250
761269c8 12251 case ada_catch_assert:
00eb2c4a 12252 ui_out_text (uiout, _("failed Ada assertions"));
f7f9143b
JB
12253 break;
12254
12255 default:
12256 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12257 break;
12258 }
12259}
12260
6149aea9
PA
12261/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12262 for all exception catchpoint kinds. */
12263
12264static void
761269c8 12265print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12266 struct breakpoint *b, struct ui_file *fp)
12267{
28010a5d
PA
12268 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12269
6149aea9
PA
12270 switch (ex)
12271 {
761269c8 12272 case ada_catch_exception:
6149aea9 12273 fprintf_filtered (fp, "catch exception");
28010a5d
PA
12274 if (c->excep_string != NULL)
12275 fprintf_filtered (fp, " %s", c->excep_string);
6149aea9
PA
12276 break;
12277
761269c8 12278 case ada_catch_exception_unhandled:
78076abc 12279 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12280 break;
12281
761269c8 12282 case ada_catch_assert:
6149aea9
PA
12283 fprintf_filtered (fp, "catch assert");
12284 break;
12285
12286 default:
12287 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12288 }
d9b3f62e 12289 print_recreate_thread (b, fp);
6149aea9
PA
12290}
12291
f7f9143b
JB
12292/* Virtual table for "catch exception" breakpoints. */
12293
28010a5d
PA
12294static void
12295dtor_catch_exception (struct breakpoint *b)
12296{
761269c8 12297 dtor_exception (ada_catch_exception, b);
28010a5d
PA
12298}
12299
12300static struct bp_location *
12301allocate_location_catch_exception (struct breakpoint *self)
12302{
761269c8 12303 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12304}
12305
12306static void
12307re_set_catch_exception (struct breakpoint *b)
12308{
761269c8 12309 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12310}
12311
12312static void
12313check_status_catch_exception (bpstat bs)
12314{
761269c8 12315 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12316}
12317
f7f9143b 12318static enum print_stop_action
348d480f 12319print_it_catch_exception (bpstat bs)
f7f9143b 12320{
761269c8 12321 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12322}
12323
12324static void
a6d9a66e 12325print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12326{
761269c8 12327 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12328}
12329
12330static void
12331print_mention_catch_exception (struct breakpoint *b)
12332{
761269c8 12333 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12334}
12335
6149aea9
PA
12336static void
12337print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12338{
761269c8 12339 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12340}
12341
2060206e 12342static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12343
12344/* Virtual table for "catch exception unhandled" breakpoints. */
12345
28010a5d
PA
12346static void
12347dtor_catch_exception_unhandled (struct breakpoint *b)
12348{
761269c8 12349 dtor_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12350}
12351
12352static struct bp_location *
12353allocate_location_catch_exception_unhandled (struct breakpoint *self)
12354{
761269c8 12355 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12356}
12357
12358static void
12359re_set_catch_exception_unhandled (struct breakpoint *b)
12360{
761269c8 12361 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12362}
12363
12364static void
12365check_status_catch_exception_unhandled (bpstat bs)
12366{
761269c8 12367 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12368}
12369
f7f9143b 12370static enum print_stop_action
348d480f 12371print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12372{
761269c8 12373 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12374}
12375
12376static void
a6d9a66e
UW
12377print_one_catch_exception_unhandled (struct breakpoint *b,
12378 struct bp_location **last_loc)
f7f9143b 12379{
761269c8 12380 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12381}
12382
12383static void
12384print_mention_catch_exception_unhandled (struct breakpoint *b)
12385{
761269c8 12386 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12387}
12388
6149aea9
PA
12389static void
12390print_recreate_catch_exception_unhandled (struct breakpoint *b,
12391 struct ui_file *fp)
12392{
761269c8 12393 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12394}
12395
2060206e 12396static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12397
12398/* Virtual table for "catch assert" breakpoints. */
12399
28010a5d
PA
12400static void
12401dtor_catch_assert (struct breakpoint *b)
12402{
761269c8 12403 dtor_exception (ada_catch_assert, b);
28010a5d
PA
12404}
12405
12406static struct bp_location *
12407allocate_location_catch_assert (struct breakpoint *self)
12408{
761269c8 12409 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12410}
12411
12412static void
12413re_set_catch_assert (struct breakpoint *b)
12414{
761269c8 12415 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12416}
12417
12418static void
12419check_status_catch_assert (bpstat bs)
12420{
761269c8 12421 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12422}
12423
f7f9143b 12424static enum print_stop_action
348d480f 12425print_it_catch_assert (bpstat bs)
f7f9143b 12426{
761269c8 12427 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12428}
12429
12430static void
a6d9a66e 12431print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12432{
761269c8 12433 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12434}
12435
12436static void
12437print_mention_catch_assert (struct breakpoint *b)
12438{
761269c8 12439 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12440}
12441
6149aea9
PA
12442static void
12443print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12444{
761269c8 12445 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12446}
12447
2060206e 12448static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12449
f7f9143b
JB
12450/* Return a newly allocated copy of the first space-separated token
12451 in ARGSP, and then adjust ARGSP to point immediately after that
12452 token.
12453
12454 Return NULL if ARGPS does not contain any more tokens. */
12455
12456static char *
12457ada_get_next_arg (char **argsp)
12458{
12459 char *args = *argsp;
12460 char *end;
12461 char *result;
12462
0fcd72ba 12463 args = skip_spaces (args);
f7f9143b
JB
12464 if (args[0] == '\0')
12465 return NULL; /* No more arguments. */
12466
12467 /* Find the end of the current argument. */
12468
0fcd72ba 12469 end = skip_to_space (args);
f7f9143b
JB
12470
12471 /* Adjust ARGSP to point to the start of the next argument. */
12472
12473 *argsp = end;
12474
12475 /* Make a copy of the current argument and return it. */
12476
12477 result = xmalloc (end - args + 1);
12478 strncpy (result, args, end - args);
12479 result[end - args] = '\0';
12480
12481 return result;
12482}
12483
12484/* Split the arguments specified in a "catch exception" command.
12485 Set EX to the appropriate catchpoint type.
28010a5d 12486 Set EXCEP_STRING to the name of the specific exception if
5845583d
JB
12487 specified by the user.
12488 If a condition is found at the end of the arguments, the condition
12489 expression is stored in COND_STRING (memory must be deallocated
12490 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12491
12492static void
12493catch_ada_exception_command_split (char *args,
761269c8 12494 enum ada_exception_catchpoint_kind *ex,
5845583d
JB
12495 char **excep_string,
12496 char **cond_string)
f7f9143b
JB
12497{
12498 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
12499 char *exception_name;
5845583d 12500 char *cond = NULL;
f7f9143b
JB
12501
12502 exception_name = ada_get_next_arg (&args);
5845583d
JB
12503 if (exception_name != NULL && strcmp (exception_name, "if") == 0)
12504 {
12505 /* This is not an exception name; this is the start of a condition
12506 expression for a catchpoint on all exceptions. So, "un-get"
12507 this token, and set exception_name to NULL. */
12508 xfree (exception_name);
12509 exception_name = NULL;
12510 args -= 2;
12511 }
f7f9143b
JB
12512 make_cleanup (xfree, exception_name);
12513
5845583d 12514 /* Check to see if we have a condition. */
f7f9143b 12515
0fcd72ba 12516 args = skip_spaces (args);
61012eef 12517 if (startswith (args, "if")
5845583d
JB
12518 && (isspace (args[2]) || args[2] == '\0'))
12519 {
12520 args += 2;
12521 args = skip_spaces (args);
12522
12523 if (args[0] == '\0')
12524 error (_("Condition missing after `if' keyword"));
12525 cond = xstrdup (args);
12526 make_cleanup (xfree, cond);
12527
12528 args += strlen (args);
12529 }
12530
12531 /* Check that we do not have any more arguments. Anything else
12532 is unexpected. */
f7f9143b
JB
12533
12534 if (args[0] != '\0')
12535 error (_("Junk at end of expression"));
12536
12537 discard_cleanups (old_chain);
12538
12539 if (exception_name == NULL)
12540 {
12541 /* Catch all exceptions. */
761269c8 12542 *ex = ada_catch_exception;
28010a5d 12543 *excep_string = NULL;
f7f9143b
JB
12544 }
12545 else if (strcmp (exception_name, "unhandled") == 0)
12546 {
12547 /* Catch unhandled exceptions. */
761269c8 12548 *ex = ada_catch_exception_unhandled;
28010a5d 12549 *excep_string = NULL;
f7f9143b
JB
12550 }
12551 else
12552 {
12553 /* Catch a specific exception. */
761269c8 12554 *ex = ada_catch_exception;
28010a5d 12555 *excep_string = exception_name;
f7f9143b 12556 }
5845583d 12557 *cond_string = cond;
f7f9143b
JB
12558}
12559
12560/* Return the name of the symbol on which we should break in order to
12561 implement a catchpoint of the EX kind. */
12562
12563static const char *
761269c8 12564ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12565{
3eecfa55
JB
12566 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12567
12568 gdb_assert (data->exception_info != NULL);
0259addd 12569
f7f9143b
JB
12570 switch (ex)
12571 {
761269c8 12572 case ada_catch_exception:
3eecfa55 12573 return (data->exception_info->catch_exception_sym);
f7f9143b 12574 break;
761269c8 12575 case ada_catch_exception_unhandled:
3eecfa55 12576 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12577 break;
761269c8 12578 case ada_catch_assert:
3eecfa55 12579 return (data->exception_info->catch_assert_sym);
f7f9143b
JB
12580 break;
12581 default:
12582 internal_error (__FILE__, __LINE__,
12583 _("unexpected catchpoint kind (%d)"), ex);
12584 }
12585}
12586
12587/* Return the breakpoint ops "virtual table" used for catchpoints
12588 of the EX kind. */
12589
c0a91b2b 12590static const struct breakpoint_ops *
761269c8 12591ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12592{
12593 switch (ex)
12594 {
761269c8 12595 case ada_catch_exception:
f7f9143b
JB
12596 return (&catch_exception_breakpoint_ops);
12597 break;
761269c8 12598 case ada_catch_exception_unhandled:
f7f9143b
JB
12599 return (&catch_exception_unhandled_breakpoint_ops);
12600 break;
761269c8 12601 case ada_catch_assert:
f7f9143b
JB
12602 return (&catch_assert_breakpoint_ops);
12603 break;
12604 default:
12605 internal_error (__FILE__, __LINE__,
12606 _("unexpected catchpoint kind (%d)"), ex);
12607 }
12608}
12609
12610/* Return the condition that will be used to match the current exception
12611 being raised with the exception that the user wants to catch. This
12612 assumes that this condition is used when the inferior just triggered
12613 an exception catchpoint.
12614
12615 The string returned is a newly allocated string that needs to be
12616 deallocated later. */
12617
12618static char *
28010a5d 12619ada_exception_catchpoint_cond_string (const char *excep_string)
f7f9143b 12620{
3d0b0fa3
JB
12621 int i;
12622
0963b4bd 12623 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12624 runtime units that have been compiled without debugging info; if
28010a5d 12625 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12626 exception (e.g. "constraint_error") then, during the evaluation
12627 of the condition expression, the symbol lookup on this name would
0963b4bd 12628 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12629 may then be set only on user-defined exceptions which have the
12630 same not-fully-qualified name (e.g. my_package.constraint_error).
12631
12632 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12633 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12634 exception constraint_error" is rewritten into "catch exception
12635 standard.constraint_error".
12636
12637 If an exception named contraint_error is defined in another package of
12638 the inferior program, then the only way to specify this exception as a
12639 breakpoint condition is to use its fully-qualified named:
12640 e.g. my_package.constraint_error. */
12641
12642 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12643 {
28010a5d 12644 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3
JB
12645 {
12646 return xstrprintf ("long_integer (e) = long_integer (&standard.%s)",
28010a5d 12647 excep_string);
3d0b0fa3
JB
12648 }
12649 }
28010a5d 12650 return xstrprintf ("long_integer (e) = long_integer (&%s)", excep_string);
f7f9143b
JB
12651}
12652
12653/* Return the symtab_and_line that should be used to insert an exception
12654 catchpoint of the TYPE kind.
12655
28010a5d
PA
12656 EXCEP_STRING should contain the name of a specific exception that
12657 the catchpoint should catch, or NULL otherwise.
f7f9143b 12658
28010a5d
PA
12659 ADDR_STRING returns the name of the function where the real
12660 breakpoint that implements the catchpoints is set, depending on the
12661 type of catchpoint we need to create. */
f7f9143b
JB
12662
12663static struct symtab_and_line
761269c8 12664ada_exception_sal (enum ada_exception_catchpoint_kind ex, char *excep_string,
c0a91b2b 12665 char **addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12666{
12667 const char *sym_name;
12668 struct symbol *sym;
f7f9143b 12669
0259addd
JB
12670 /* First, find out which exception support info to use. */
12671 ada_exception_support_info_sniffer ();
12672
12673 /* Then lookup the function on which we will break in order to catch
f7f9143b 12674 the Ada exceptions requested by the user. */
f7f9143b
JB
12675 sym_name = ada_exception_sym_name (ex);
12676 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12677
f17011e0
JB
12678 /* We can assume that SYM is not NULL at this stage. If the symbol
12679 did not exist, ada_exception_support_info_sniffer would have
12680 raised an exception.
f7f9143b 12681
f17011e0
JB
12682 Also, ada_exception_support_info_sniffer should have already
12683 verified that SYM is a function symbol. */
12684 gdb_assert (sym != NULL);
12685 gdb_assert (SYMBOL_CLASS (sym) == LOC_BLOCK);
f7f9143b
JB
12686
12687 /* Set ADDR_STRING. */
f7f9143b
JB
12688 *addr_string = xstrdup (sym_name);
12689
f7f9143b 12690 /* Set OPS. */
4b9eee8c 12691 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12692
f17011e0 12693 return find_function_start_sal (sym, 1);
f7f9143b
JB
12694}
12695
b4a5b78b 12696/* Create an Ada exception catchpoint.
f7f9143b 12697
b4a5b78b 12698 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12699
2df4d1d5
JB
12700 If EXCEPT_STRING is NULL, this catchpoint is expected to trigger
12701 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
12702 of the exception to which this catchpoint applies. When not NULL,
12703 the string must be allocated on the heap, and its deallocation
12704 is no longer the responsibility of the caller.
12705
12706 COND_STRING, if not NULL, is the catchpoint condition. This string
12707 must be allocated on the heap, and its deallocation is no longer
12708 the responsibility of the caller.
f7f9143b 12709
b4a5b78b
JB
12710 TEMPFLAG, if nonzero, means that the underlying breakpoint
12711 should be temporary.
28010a5d 12712
b4a5b78b 12713 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12714
349774ef 12715void
28010a5d 12716create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12717 enum ada_exception_catchpoint_kind ex_kind,
28010a5d 12718 char *excep_string,
5845583d 12719 char *cond_string,
28010a5d 12720 int tempflag,
349774ef 12721 int disabled,
28010a5d
PA
12722 int from_tty)
12723{
12724 struct ada_catchpoint *c;
b4a5b78b
JB
12725 char *addr_string = NULL;
12726 const struct breakpoint_ops *ops = NULL;
12727 struct symtab_and_line sal
12728 = ada_exception_sal (ex_kind, excep_string, &addr_string, &ops);
28010a5d
PA
12729
12730 c = XNEW (struct ada_catchpoint);
12731 init_ada_exception_breakpoint (&c->base, gdbarch, sal, addr_string,
349774ef 12732 ops, tempflag, disabled, from_tty);
28010a5d
PA
12733 c->excep_string = excep_string;
12734 create_excep_cond_exprs (c);
5845583d
JB
12735 if (cond_string != NULL)
12736 set_breakpoint_condition (&c->base, cond_string, from_tty);
3ea46bff 12737 install_breakpoint (0, &c->base, 1);
f7f9143b
JB
12738}
12739
9ac4176b
PA
12740/* Implement the "catch exception" command. */
12741
12742static void
12743catch_ada_exception_command (char *arg, int from_tty,
12744 struct cmd_list_element *command)
12745{
12746 struct gdbarch *gdbarch = get_current_arch ();
12747 int tempflag;
761269c8 12748 enum ada_exception_catchpoint_kind ex_kind;
28010a5d 12749 char *excep_string = NULL;
5845583d 12750 char *cond_string = NULL;
9ac4176b
PA
12751
12752 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12753
12754 if (!arg)
12755 arg = "";
b4a5b78b
JB
12756 catch_ada_exception_command_split (arg, &ex_kind, &excep_string,
12757 &cond_string);
12758 create_ada_exception_catchpoint (gdbarch, ex_kind,
12759 excep_string, cond_string,
349774ef
JB
12760 tempflag, 1 /* enabled */,
12761 from_tty);
9ac4176b
PA
12762}
12763
b4a5b78b 12764/* Split the arguments specified in a "catch assert" command.
5845583d 12765
b4a5b78b
JB
12766 ARGS contains the command's arguments (or the empty string if
12767 no arguments were passed).
5845583d
JB
12768
12769 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12770 (the memory needs to be deallocated after use). */
5845583d 12771
b4a5b78b
JB
12772static void
12773catch_ada_assert_command_split (char *args, char **cond_string)
f7f9143b 12774{
5845583d 12775 args = skip_spaces (args);
f7f9143b 12776
5845583d 12777 /* Check whether a condition was provided. */
61012eef 12778 if (startswith (args, "if")
5845583d 12779 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12780 {
5845583d 12781 args += 2;
0fcd72ba 12782 args = skip_spaces (args);
5845583d
JB
12783 if (args[0] == '\0')
12784 error (_("condition missing after `if' keyword"));
12785 *cond_string = xstrdup (args);
f7f9143b
JB
12786 }
12787
5845583d
JB
12788 /* Otherwise, there should be no other argument at the end of
12789 the command. */
12790 else if (args[0] != '\0')
12791 error (_("Junk at end of arguments."));
f7f9143b
JB
12792}
12793
9ac4176b
PA
12794/* Implement the "catch assert" command. */
12795
12796static void
12797catch_assert_command (char *arg, int from_tty,
12798 struct cmd_list_element *command)
12799{
12800 struct gdbarch *gdbarch = get_current_arch ();
12801 int tempflag;
5845583d 12802 char *cond_string = NULL;
9ac4176b
PA
12803
12804 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12805
12806 if (!arg)
12807 arg = "";
b4a5b78b 12808 catch_ada_assert_command_split (arg, &cond_string);
761269c8 12809 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
b4a5b78b 12810 NULL, cond_string,
349774ef
JB
12811 tempflag, 1 /* enabled */,
12812 from_tty);
9ac4176b 12813}
778865d3
JB
12814
12815/* Return non-zero if the symbol SYM is an Ada exception object. */
12816
12817static int
12818ada_is_exception_sym (struct symbol *sym)
12819{
12820 const char *type_name = type_name_no_tag (SYMBOL_TYPE (sym));
12821
12822 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
12823 && SYMBOL_CLASS (sym) != LOC_BLOCK
12824 && SYMBOL_CLASS (sym) != LOC_CONST
12825 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12826 && type_name != NULL && strcmp (type_name, "exception") == 0);
12827}
12828
12829/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12830 Ada exception object. This matches all exceptions except the ones
12831 defined by the Ada language. */
12832
12833static int
12834ada_is_non_standard_exception_sym (struct symbol *sym)
12835{
12836 int i;
12837
12838 if (!ada_is_exception_sym (sym))
12839 return 0;
12840
12841 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12842 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
12843 return 0; /* A standard exception. */
12844
12845 /* Numeric_Error is also a standard exception, so exclude it.
12846 See the STANDARD_EXC description for more details as to why
12847 this exception is not listed in that array. */
12848 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
12849 return 0;
12850
12851 return 1;
12852}
12853
12854/* A helper function for qsort, comparing two struct ada_exc_info
12855 objects.
12856
12857 The comparison is determined first by exception name, and then
12858 by exception address. */
12859
12860static int
12861compare_ada_exception_info (const void *a, const void *b)
12862{
12863 const struct ada_exc_info *exc_a = (struct ada_exc_info *) a;
12864 const struct ada_exc_info *exc_b = (struct ada_exc_info *) b;
12865 int result;
12866
12867 result = strcmp (exc_a->name, exc_b->name);
12868 if (result != 0)
12869 return result;
12870
12871 if (exc_a->addr < exc_b->addr)
12872 return -1;
12873 if (exc_a->addr > exc_b->addr)
12874 return 1;
12875
12876 return 0;
12877}
12878
12879/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12880 routine, but keeping the first SKIP elements untouched.
12881
12882 All duplicates are also removed. */
12883
12884static void
12885sort_remove_dups_ada_exceptions_list (VEC(ada_exc_info) **exceptions,
12886 int skip)
12887{
12888 struct ada_exc_info *to_sort
12889 = VEC_address (ada_exc_info, *exceptions) + skip;
12890 int to_sort_len
12891 = VEC_length (ada_exc_info, *exceptions) - skip;
12892 int i, j;
12893
12894 qsort (to_sort, to_sort_len, sizeof (struct ada_exc_info),
12895 compare_ada_exception_info);
12896
12897 for (i = 1, j = 1; i < to_sort_len; i++)
12898 if (compare_ada_exception_info (&to_sort[i], &to_sort[j - 1]) != 0)
12899 to_sort[j++] = to_sort[i];
12900 to_sort_len = j;
12901 VEC_truncate(ada_exc_info, *exceptions, skip + to_sort_len);
12902}
12903
12904/* A function intended as the "name_matcher" callback in the struct
12905 quick_symbol_functions' expand_symtabs_matching method.
12906
12907 SEARCH_NAME is the symbol's search name.
12908
12909 If USER_DATA is not NULL, it is a pointer to a regext_t object
12910 used to match the symbol (by natural name). Otherwise, when USER_DATA
12911 is null, no filtering is performed, and all symbols are a positive
12912 match. */
12913
12914static int
12915ada_exc_search_name_matches (const char *search_name, void *user_data)
12916{
12917 regex_t *preg = user_data;
12918
12919 if (preg == NULL)
12920 return 1;
12921
12922 /* In Ada, the symbol "search name" is a linkage name, whereas
12923 the regular expression used to do the matching refers to
12924 the natural name. So match against the decoded name. */
12925 return (regexec (preg, ada_decode (search_name), 0, NULL, 0) == 0);
12926}
12927
12928/* Add all exceptions defined by the Ada standard whose name match
12929 a regular expression.
12930
12931 If PREG is not NULL, then this regexp_t object is used to
12932 perform the symbol name matching. Otherwise, no name-based
12933 filtering is performed.
12934
12935 EXCEPTIONS is a vector of exceptions to which matching exceptions
12936 gets pushed. */
12937
12938static void
12939ada_add_standard_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12940{
12941 int i;
12942
12943 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12944 {
12945 if (preg == NULL
12946 || regexec (preg, standard_exc[i], 0, NULL, 0) == 0)
12947 {
12948 struct bound_minimal_symbol msymbol
12949 = ada_lookup_simple_minsym (standard_exc[i]);
12950
12951 if (msymbol.minsym != NULL)
12952 {
12953 struct ada_exc_info info
77e371c0 12954 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3
JB
12955
12956 VEC_safe_push (ada_exc_info, *exceptions, &info);
12957 }
12958 }
12959 }
12960}
12961
12962/* Add all Ada exceptions defined locally and accessible from the given
12963 FRAME.
12964
12965 If PREG is not NULL, then this regexp_t object is used to
12966 perform the symbol name matching. Otherwise, no name-based
12967 filtering is performed.
12968
12969 EXCEPTIONS is a vector of exceptions to which matching exceptions
12970 gets pushed. */
12971
12972static void
12973ada_add_exceptions_from_frame (regex_t *preg, struct frame_info *frame,
12974 VEC(ada_exc_info) **exceptions)
12975{
3977b71f 12976 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
12977
12978 while (block != 0)
12979 {
12980 struct block_iterator iter;
12981 struct symbol *sym;
12982
12983 ALL_BLOCK_SYMBOLS (block, iter, sym)
12984 {
12985 switch (SYMBOL_CLASS (sym))
12986 {
12987 case LOC_TYPEDEF:
12988 case LOC_BLOCK:
12989 case LOC_CONST:
12990 break;
12991 default:
12992 if (ada_is_exception_sym (sym))
12993 {
12994 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
12995 SYMBOL_VALUE_ADDRESS (sym)};
12996
12997 VEC_safe_push (ada_exc_info, *exceptions, &info);
12998 }
12999 }
13000 }
13001 if (BLOCK_FUNCTION (block) != NULL)
13002 break;
13003 block = BLOCK_SUPERBLOCK (block);
13004 }
13005}
13006
13007/* Add all exceptions defined globally whose name name match
13008 a regular expression, excluding standard exceptions.
13009
13010 The reason we exclude standard exceptions is that they need
13011 to be handled separately: Standard exceptions are defined inside
13012 a runtime unit which is normally not compiled with debugging info,
13013 and thus usually do not show up in our symbol search. However,
13014 if the unit was in fact built with debugging info, we need to
13015 exclude them because they would duplicate the entry we found
13016 during the special loop that specifically searches for those
13017 standard exceptions.
13018
13019 If PREG is not NULL, then this regexp_t object is used to
13020 perform the symbol name matching. Otherwise, no name-based
13021 filtering is performed.
13022
13023 EXCEPTIONS is a vector of exceptions to which matching exceptions
13024 gets pushed. */
13025
13026static void
13027ada_add_global_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
13028{
13029 struct objfile *objfile;
43f3e411 13030 struct compunit_symtab *s;
778865d3 13031
276d885b 13032 expand_symtabs_matching (NULL, ada_exc_search_name_matches, NULL,
bb4142cf 13033 VARIABLES_DOMAIN, preg);
778865d3 13034
43f3e411 13035 ALL_COMPUNITS (objfile, s)
778865d3 13036 {
43f3e411 13037 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
778865d3
JB
13038 int i;
13039
13040 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13041 {
13042 struct block *b = BLOCKVECTOR_BLOCK (bv, i);
13043 struct block_iterator iter;
13044 struct symbol *sym;
13045
13046 ALL_BLOCK_SYMBOLS (b, iter, sym)
13047 if (ada_is_non_standard_exception_sym (sym)
13048 && (preg == NULL
13049 || regexec (preg, SYMBOL_NATURAL_NAME (sym),
13050 0, NULL, 0) == 0))
13051 {
13052 struct ada_exc_info info
13053 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
13054
13055 VEC_safe_push (ada_exc_info, *exceptions, &info);
13056 }
13057 }
13058 }
13059}
13060
13061/* Implements ada_exceptions_list with the regular expression passed
13062 as a regex_t, rather than a string.
13063
13064 If not NULL, PREG is used to filter out exceptions whose names
13065 do not match. Otherwise, all exceptions are listed. */
13066
13067static VEC(ada_exc_info) *
13068ada_exceptions_list_1 (regex_t *preg)
13069{
13070 VEC(ada_exc_info) *result = NULL;
13071 struct cleanup *old_chain
13072 = make_cleanup (VEC_cleanup (ada_exc_info), &result);
13073 int prev_len;
13074
13075 /* First, list the known standard exceptions. These exceptions
13076 need to be handled separately, as they are usually defined in
13077 runtime units that have been compiled without debugging info. */
13078
13079 ada_add_standard_exceptions (preg, &result);
13080
13081 /* Next, find all exceptions whose scope is local and accessible
13082 from the currently selected frame. */
13083
13084 if (has_stack_frames ())
13085 {
13086 prev_len = VEC_length (ada_exc_info, result);
13087 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13088 &result);
13089 if (VEC_length (ada_exc_info, result) > prev_len)
13090 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13091 }
13092
13093 /* Add all exceptions whose scope is global. */
13094
13095 prev_len = VEC_length (ada_exc_info, result);
13096 ada_add_global_exceptions (preg, &result);
13097 if (VEC_length (ada_exc_info, result) > prev_len)
13098 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13099
13100 discard_cleanups (old_chain);
13101 return result;
13102}
13103
13104/* Return a vector of ada_exc_info.
13105
13106 If REGEXP is NULL, all exceptions are included in the result.
13107 Otherwise, it should contain a valid regular expression,
13108 and only the exceptions whose names match that regular expression
13109 are included in the result.
13110
13111 The exceptions are sorted in the following order:
13112 - Standard exceptions (defined by the Ada language), in
13113 alphabetical order;
13114 - Exceptions only visible from the current frame, in
13115 alphabetical order;
13116 - Exceptions whose scope is global, in alphabetical order. */
13117
13118VEC(ada_exc_info) *
13119ada_exceptions_list (const char *regexp)
13120{
13121 VEC(ada_exc_info) *result = NULL;
13122 struct cleanup *old_chain = NULL;
13123 regex_t reg;
13124
13125 if (regexp != NULL)
13126 old_chain = compile_rx_or_error (&reg, regexp,
13127 _("invalid regular expression"));
13128
13129 result = ada_exceptions_list_1 (regexp != NULL ? &reg : NULL);
13130
13131 if (old_chain != NULL)
13132 do_cleanups (old_chain);
13133 return result;
13134}
13135
13136/* Implement the "info exceptions" command. */
13137
13138static void
13139info_exceptions_command (char *regexp, int from_tty)
13140{
13141 VEC(ada_exc_info) *exceptions;
13142 struct cleanup *cleanup;
13143 struct gdbarch *gdbarch = get_current_arch ();
13144 int ix;
13145 struct ada_exc_info *info;
13146
13147 exceptions = ada_exceptions_list (regexp);
13148 cleanup = make_cleanup (VEC_cleanup (ada_exc_info), &exceptions);
13149
13150 if (regexp != NULL)
13151 printf_filtered
13152 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13153 else
13154 printf_filtered (_("All defined Ada exceptions:\n"));
13155
13156 for (ix = 0; VEC_iterate(ada_exc_info, exceptions, ix, info); ix++)
13157 printf_filtered ("%s: %s\n", info->name, paddress (gdbarch, info->addr));
13158
13159 do_cleanups (cleanup);
13160}
13161
4c4b4cd2
PH
13162 /* Operators */
13163/* Information about operators given special treatment in functions
13164 below. */
13165/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13166
13167#define ADA_OPERATORS \
13168 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13169 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13170 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13171 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13172 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13173 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13174 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13175 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13176 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13177 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13178 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13179 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13180 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13181 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13182 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13183 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13184 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13185 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13186 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13187
13188static void
554794dc
SDJ
13189ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13190 int *argsp)
4c4b4cd2
PH
13191{
13192 switch (exp->elts[pc - 1].opcode)
13193 {
76a01679 13194 default:
4c4b4cd2
PH
13195 operator_length_standard (exp, pc, oplenp, argsp);
13196 break;
13197
13198#define OP_DEFN(op, len, args, binop) \
13199 case op: *oplenp = len; *argsp = args; break;
13200 ADA_OPERATORS;
13201#undef OP_DEFN
52ce6436
PH
13202
13203 case OP_AGGREGATE:
13204 *oplenp = 3;
13205 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13206 break;
13207
13208 case OP_CHOICES:
13209 *oplenp = 3;
13210 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13211 break;
4c4b4cd2
PH
13212 }
13213}
13214
c0201579
JK
13215/* Implementation of the exp_descriptor method operator_check. */
13216
13217static int
13218ada_operator_check (struct expression *exp, int pos,
13219 int (*objfile_func) (struct objfile *objfile, void *data),
13220 void *data)
13221{
13222 const union exp_element *const elts = exp->elts;
13223 struct type *type = NULL;
13224
13225 switch (elts[pos].opcode)
13226 {
13227 case UNOP_IN_RANGE:
13228 case UNOP_QUAL:
13229 type = elts[pos + 1].type;
13230 break;
13231
13232 default:
13233 return operator_check_standard (exp, pos, objfile_func, data);
13234 }
13235
13236 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13237
13238 if (type && TYPE_OBJFILE (type)
13239 && (*objfile_func) (TYPE_OBJFILE (type), data))
13240 return 1;
13241
13242 return 0;
13243}
13244
4c4b4cd2
PH
13245static char *
13246ada_op_name (enum exp_opcode opcode)
13247{
13248 switch (opcode)
13249 {
76a01679 13250 default:
4c4b4cd2 13251 return op_name_standard (opcode);
52ce6436 13252
4c4b4cd2
PH
13253#define OP_DEFN(op, len, args, binop) case op: return #op;
13254 ADA_OPERATORS;
13255#undef OP_DEFN
52ce6436
PH
13256
13257 case OP_AGGREGATE:
13258 return "OP_AGGREGATE";
13259 case OP_CHOICES:
13260 return "OP_CHOICES";
13261 case OP_NAME:
13262 return "OP_NAME";
4c4b4cd2
PH
13263 }
13264}
13265
13266/* As for operator_length, but assumes PC is pointing at the first
13267 element of the operator, and gives meaningful results only for the
52ce6436 13268 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13269
13270static void
76a01679
JB
13271ada_forward_operator_length (struct expression *exp, int pc,
13272 int *oplenp, int *argsp)
4c4b4cd2 13273{
76a01679 13274 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13275 {
13276 default:
13277 *oplenp = *argsp = 0;
13278 break;
52ce6436 13279
4c4b4cd2
PH
13280#define OP_DEFN(op, len, args, binop) \
13281 case op: *oplenp = len; *argsp = args; break;
13282 ADA_OPERATORS;
13283#undef OP_DEFN
52ce6436
PH
13284
13285 case OP_AGGREGATE:
13286 *oplenp = 3;
13287 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13288 break;
13289
13290 case OP_CHOICES:
13291 *oplenp = 3;
13292 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13293 break;
13294
13295 case OP_STRING:
13296 case OP_NAME:
13297 {
13298 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13299
52ce6436
PH
13300 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13301 *argsp = 0;
13302 break;
13303 }
4c4b4cd2
PH
13304 }
13305}
13306
13307static int
13308ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13309{
13310 enum exp_opcode op = exp->elts[elt].opcode;
13311 int oplen, nargs;
13312 int pc = elt;
13313 int i;
76a01679 13314
4c4b4cd2
PH
13315 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13316
76a01679 13317 switch (op)
4c4b4cd2 13318 {
76a01679 13319 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13320 case OP_ATR_FIRST:
13321 case OP_ATR_LAST:
13322 case OP_ATR_LENGTH:
13323 case OP_ATR_IMAGE:
13324 case OP_ATR_MAX:
13325 case OP_ATR_MIN:
13326 case OP_ATR_MODULUS:
13327 case OP_ATR_POS:
13328 case OP_ATR_SIZE:
13329 case OP_ATR_TAG:
13330 case OP_ATR_VAL:
13331 break;
13332
13333 case UNOP_IN_RANGE:
13334 case UNOP_QUAL:
323e0a4a
AC
13335 /* XXX: gdb_sprint_host_address, type_sprint */
13336 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13337 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13338 fprintf_filtered (stream, " (");
13339 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13340 fprintf_filtered (stream, ")");
13341 break;
13342 case BINOP_IN_BOUNDS:
52ce6436
PH
13343 fprintf_filtered (stream, " (%d)",
13344 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13345 break;
13346 case TERNOP_IN_RANGE:
13347 break;
13348
52ce6436
PH
13349 case OP_AGGREGATE:
13350 case OP_OTHERS:
13351 case OP_DISCRETE_RANGE:
13352 case OP_POSITIONAL:
13353 case OP_CHOICES:
13354 break;
13355
13356 case OP_NAME:
13357 case OP_STRING:
13358 {
13359 char *name = &exp->elts[elt + 2].string;
13360 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13361
52ce6436
PH
13362 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13363 break;
13364 }
13365
4c4b4cd2
PH
13366 default:
13367 return dump_subexp_body_standard (exp, stream, elt);
13368 }
13369
13370 elt += oplen;
13371 for (i = 0; i < nargs; i += 1)
13372 elt = dump_subexp (exp, stream, elt);
13373
13374 return elt;
13375}
13376
13377/* The Ada extension of print_subexp (q.v.). */
13378
76a01679
JB
13379static void
13380ada_print_subexp (struct expression *exp, int *pos,
13381 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13382{
52ce6436 13383 int oplen, nargs, i;
4c4b4cd2
PH
13384 int pc = *pos;
13385 enum exp_opcode op = exp->elts[pc].opcode;
13386
13387 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13388
52ce6436 13389 *pos += oplen;
4c4b4cd2
PH
13390 switch (op)
13391 {
13392 default:
52ce6436 13393 *pos -= oplen;
4c4b4cd2
PH
13394 print_subexp_standard (exp, pos, stream, prec);
13395 return;
13396
13397 case OP_VAR_VALUE:
4c4b4cd2
PH
13398 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13399 return;
13400
13401 case BINOP_IN_BOUNDS:
323e0a4a 13402 /* XXX: sprint_subexp */
4c4b4cd2 13403 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13404 fputs_filtered (" in ", stream);
4c4b4cd2 13405 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13406 fputs_filtered ("'range", stream);
4c4b4cd2 13407 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13408 fprintf_filtered (stream, "(%ld)",
13409 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13410 return;
13411
13412 case TERNOP_IN_RANGE:
4c4b4cd2 13413 if (prec >= PREC_EQUAL)
76a01679 13414 fputs_filtered ("(", stream);
323e0a4a 13415 /* XXX: sprint_subexp */
4c4b4cd2 13416 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13417 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13418 print_subexp (exp, pos, stream, PREC_EQUAL);
13419 fputs_filtered (" .. ", stream);
13420 print_subexp (exp, pos, stream, PREC_EQUAL);
13421 if (prec >= PREC_EQUAL)
76a01679
JB
13422 fputs_filtered (")", stream);
13423 return;
4c4b4cd2
PH
13424
13425 case OP_ATR_FIRST:
13426 case OP_ATR_LAST:
13427 case OP_ATR_LENGTH:
13428 case OP_ATR_IMAGE:
13429 case OP_ATR_MAX:
13430 case OP_ATR_MIN:
13431 case OP_ATR_MODULUS:
13432 case OP_ATR_POS:
13433 case OP_ATR_SIZE:
13434 case OP_ATR_TAG:
13435 case OP_ATR_VAL:
4c4b4cd2 13436 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13437 {
13438 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13439 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13440 &type_print_raw_options);
76a01679
JB
13441 *pos += 3;
13442 }
4c4b4cd2 13443 else
76a01679 13444 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13445 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13446 if (nargs > 1)
76a01679
JB
13447 {
13448 int tem;
5b4ee69b 13449
76a01679
JB
13450 for (tem = 1; tem < nargs; tem += 1)
13451 {
13452 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13453 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13454 }
13455 fputs_filtered (")", stream);
13456 }
4c4b4cd2 13457 return;
14f9c5c9 13458
4c4b4cd2 13459 case UNOP_QUAL:
4c4b4cd2
PH
13460 type_print (exp->elts[pc + 1].type, "", stream, 0);
13461 fputs_filtered ("'(", stream);
13462 print_subexp (exp, pos, stream, PREC_PREFIX);
13463 fputs_filtered (")", stream);
13464 return;
14f9c5c9 13465
4c4b4cd2 13466 case UNOP_IN_RANGE:
323e0a4a 13467 /* XXX: sprint_subexp */
4c4b4cd2 13468 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13469 fputs_filtered (" in ", stream);
79d43c61
TT
13470 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13471 &type_print_raw_options);
4c4b4cd2 13472 return;
52ce6436
PH
13473
13474 case OP_DISCRETE_RANGE:
13475 print_subexp (exp, pos, stream, PREC_SUFFIX);
13476 fputs_filtered ("..", stream);
13477 print_subexp (exp, pos, stream, PREC_SUFFIX);
13478 return;
13479
13480 case OP_OTHERS:
13481 fputs_filtered ("others => ", stream);
13482 print_subexp (exp, pos, stream, PREC_SUFFIX);
13483 return;
13484
13485 case OP_CHOICES:
13486 for (i = 0; i < nargs-1; i += 1)
13487 {
13488 if (i > 0)
13489 fputs_filtered ("|", stream);
13490 print_subexp (exp, pos, stream, PREC_SUFFIX);
13491 }
13492 fputs_filtered (" => ", stream);
13493 print_subexp (exp, pos, stream, PREC_SUFFIX);
13494 return;
13495
13496 case OP_POSITIONAL:
13497 print_subexp (exp, pos, stream, PREC_SUFFIX);
13498 return;
13499
13500 case OP_AGGREGATE:
13501 fputs_filtered ("(", stream);
13502 for (i = 0; i < nargs; i += 1)
13503 {
13504 if (i > 0)
13505 fputs_filtered (", ", stream);
13506 print_subexp (exp, pos, stream, PREC_SUFFIX);
13507 }
13508 fputs_filtered (")", stream);
13509 return;
4c4b4cd2
PH
13510 }
13511}
14f9c5c9
AS
13512
13513/* Table mapping opcodes into strings for printing operators
13514 and precedences of the operators. */
13515
d2e4a39e
AS
13516static const struct op_print ada_op_print_tab[] = {
13517 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13518 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13519 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13520 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13521 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13522 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13523 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13524 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13525 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13526 {">=", BINOP_GEQ, PREC_ORDER, 0},
13527 {">", BINOP_GTR, PREC_ORDER, 0},
13528 {"<", BINOP_LESS, PREC_ORDER, 0},
13529 {">>", BINOP_RSH, PREC_SHIFT, 0},
13530 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13531 {"+", BINOP_ADD, PREC_ADD, 0},
13532 {"-", BINOP_SUB, PREC_ADD, 0},
13533 {"&", BINOP_CONCAT, PREC_ADD, 0},
13534 {"*", BINOP_MUL, PREC_MUL, 0},
13535 {"/", BINOP_DIV, PREC_MUL, 0},
13536 {"rem", BINOP_REM, PREC_MUL, 0},
13537 {"mod", BINOP_MOD, PREC_MUL, 0},
13538 {"**", BINOP_EXP, PREC_REPEAT, 0},
13539 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13540 {"-", UNOP_NEG, PREC_PREFIX, 0},
13541 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13542 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13543 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13544 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13545 {".all", UNOP_IND, PREC_SUFFIX, 1},
13546 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13547 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
d2e4a39e 13548 {NULL, 0, 0, 0}
14f9c5c9
AS
13549};
13550\f
72d5681a
PH
13551enum ada_primitive_types {
13552 ada_primitive_type_int,
13553 ada_primitive_type_long,
13554 ada_primitive_type_short,
13555 ada_primitive_type_char,
13556 ada_primitive_type_float,
13557 ada_primitive_type_double,
13558 ada_primitive_type_void,
13559 ada_primitive_type_long_long,
13560 ada_primitive_type_long_double,
13561 ada_primitive_type_natural,
13562 ada_primitive_type_positive,
13563 ada_primitive_type_system_address,
13564 nr_ada_primitive_types
13565};
6c038f32
PH
13566
13567static void
d4a9a881 13568ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13569 struct language_arch_info *lai)
13570{
d4a9a881 13571 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13572
72d5681a 13573 lai->primitive_type_vector
d4a9a881 13574 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13575 struct type *);
e9bb382b
UW
13576
13577 lai->primitive_type_vector [ada_primitive_type_int]
13578 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13579 0, "integer");
13580 lai->primitive_type_vector [ada_primitive_type_long]
13581 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13582 0, "long_integer");
13583 lai->primitive_type_vector [ada_primitive_type_short]
13584 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13585 0, "short_integer");
13586 lai->string_char_type
13587 = lai->primitive_type_vector [ada_primitive_type_char]
13588 = arch_integer_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
13589 lai->primitive_type_vector [ada_primitive_type_float]
13590 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13591 "float", NULL);
13592 lai->primitive_type_vector [ada_primitive_type_double]
13593 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13594 "long_float", NULL);
13595 lai->primitive_type_vector [ada_primitive_type_long_long]
13596 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13597 0, "long_long_integer");
13598 lai->primitive_type_vector [ada_primitive_type_long_double]
13599 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13600 "long_long_float", NULL);
13601 lai->primitive_type_vector [ada_primitive_type_natural]
13602 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13603 0, "natural");
13604 lai->primitive_type_vector [ada_primitive_type_positive]
13605 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13606 0, "positive");
13607 lai->primitive_type_vector [ada_primitive_type_void]
13608 = builtin->builtin_void;
13609
13610 lai->primitive_type_vector [ada_primitive_type_system_address]
13611 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, 1, "void"));
72d5681a
PH
13612 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13613 = "system__address";
fbb06eb1 13614
47e729a8 13615 lai->bool_type_symbol = NULL;
fbb06eb1 13616 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13617}
6c038f32
PH
13618\f
13619 /* Language vector */
13620
13621/* Not really used, but needed in the ada_language_defn. */
13622
13623static void
6c7a06a3 13624emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13625{
6c7a06a3 13626 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13627}
13628
13629static int
410a0ff2 13630parse (struct parser_state *ps)
6c038f32
PH
13631{
13632 warnings_issued = 0;
410a0ff2 13633 return ada_parse (ps);
6c038f32
PH
13634}
13635
13636static const struct exp_descriptor ada_exp_descriptor = {
13637 ada_print_subexp,
13638 ada_operator_length,
c0201579 13639 ada_operator_check,
6c038f32
PH
13640 ada_op_name,
13641 ada_dump_subexp_body,
13642 ada_evaluate_subexp
13643};
13644
1a119f36 13645/* Implement the "la_get_symbol_name_cmp" language_defn method
74ccd7f5
JB
13646 for Ada. */
13647
1a119f36
JB
13648static symbol_name_cmp_ftype
13649ada_get_symbol_name_cmp (const char *lookup_name)
74ccd7f5
JB
13650{
13651 if (should_use_wild_match (lookup_name))
13652 return wild_match;
13653 else
13654 return compare_names;
13655}
13656
a5ee536b
JB
13657/* Implement the "la_read_var_value" language_defn method for Ada. */
13658
13659static struct value *
13660ada_read_var_value (struct symbol *var, struct frame_info *frame)
13661{
3977b71f 13662 const struct block *frame_block = NULL;
a5ee536b
JB
13663 struct symbol *renaming_sym = NULL;
13664
13665 /* The only case where default_read_var_value is not sufficient
13666 is when VAR is a renaming... */
13667 if (frame)
13668 frame_block = get_frame_block (frame, NULL);
13669 if (frame_block)
13670 renaming_sym = ada_find_renaming_symbol (var, frame_block);
13671 if (renaming_sym != NULL)
13672 return ada_read_renaming_var_value (renaming_sym, frame_block);
13673
13674 /* This is a typical case where we expect the default_read_var_value
13675 function to work. */
13676 return default_read_var_value (var, frame);
13677}
13678
6c038f32
PH
13679const struct language_defn ada_language_defn = {
13680 "ada", /* Language name */
6abde28f 13681 "Ada",
6c038f32 13682 language_ada,
6c038f32 13683 range_check_off,
6c038f32
PH
13684 case_sensitive_on, /* Yes, Ada is case-insensitive, but
13685 that's not quite what this means. */
6c038f32 13686 array_row_major,
9a044a89 13687 macro_expansion_no,
6c038f32
PH
13688 &ada_exp_descriptor,
13689 parse,
13690 ada_error,
13691 resolve,
13692 ada_printchar, /* Print a character constant */
13693 ada_printstr, /* Function to print string constant */
13694 emit_char, /* Function to print single char (not used) */
6c038f32 13695 ada_print_type, /* Print a type using appropriate syntax */
be942545 13696 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
13697 ada_val_print, /* Print a value using appropriate syntax */
13698 ada_value_print, /* Print a top-level value */
a5ee536b 13699 ada_read_var_value, /* la_read_var_value */
6c038f32 13700 NULL, /* Language specific skip_trampoline */
2b2d9e11 13701 NULL, /* name_of_this */
6c038f32
PH
13702 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
13703 basic_lookup_transparent_type, /* lookup_transparent_type */
13704 ada_la_decode, /* Language specific symbol demangler */
0963b4bd
MS
13705 NULL, /* Language specific
13706 class_name_from_physname */
6c038f32
PH
13707 ada_op_print_tab, /* expression operators for printing */
13708 0, /* c-style arrays */
13709 1, /* String lower bound */
6c038f32 13710 ada_get_gdb_completer_word_break_characters,
41d27058 13711 ada_make_symbol_completion_list,
72d5681a 13712 ada_language_arch_info,
e79af960 13713 ada_print_array_index,
41f1b697 13714 default_pass_by_reference,
ae6a3a4c 13715 c_get_string,
1a119f36 13716 ada_get_symbol_name_cmp, /* la_get_symbol_name_cmp */
f8eba3c6 13717 ada_iterate_over_symbols,
a53b64ea 13718 &ada_varobj_ops,
bb2ec1b3
TT
13719 NULL,
13720 NULL,
6c038f32
PH
13721 LANG_MAGIC
13722};
13723
2c0b251b
PA
13724/* Provide a prototype to silence -Wmissing-prototypes. */
13725extern initialize_file_ftype _initialize_ada_language;
13726
5bf03f13
JB
13727/* Command-list for the "set/show ada" prefix command. */
13728static struct cmd_list_element *set_ada_list;
13729static struct cmd_list_element *show_ada_list;
13730
13731/* Implement the "set ada" prefix command. */
13732
13733static void
13734set_ada_command (char *arg, int from_tty)
13735{
13736 printf_unfiltered (_(\
13737"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 13738 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
13739}
13740
13741/* Implement the "show ada" prefix command. */
13742
13743static void
13744show_ada_command (char *args, int from_tty)
13745{
13746 cmd_show_list (show_ada_list, from_tty, "");
13747}
13748
2060206e
PA
13749static void
13750initialize_ada_catchpoint_ops (void)
13751{
13752 struct breakpoint_ops *ops;
13753
13754 initialize_breakpoint_ops ();
13755
13756 ops = &catch_exception_breakpoint_ops;
13757 *ops = bkpt_breakpoint_ops;
13758 ops->dtor = dtor_catch_exception;
13759 ops->allocate_location = allocate_location_catch_exception;
13760 ops->re_set = re_set_catch_exception;
13761 ops->check_status = check_status_catch_exception;
13762 ops->print_it = print_it_catch_exception;
13763 ops->print_one = print_one_catch_exception;
13764 ops->print_mention = print_mention_catch_exception;
13765 ops->print_recreate = print_recreate_catch_exception;
13766
13767 ops = &catch_exception_unhandled_breakpoint_ops;
13768 *ops = bkpt_breakpoint_ops;
13769 ops->dtor = dtor_catch_exception_unhandled;
13770 ops->allocate_location = allocate_location_catch_exception_unhandled;
13771 ops->re_set = re_set_catch_exception_unhandled;
13772 ops->check_status = check_status_catch_exception_unhandled;
13773 ops->print_it = print_it_catch_exception_unhandled;
13774 ops->print_one = print_one_catch_exception_unhandled;
13775 ops->print_mention = print_mention_catch_exception_unhandled;
13776 ops->print_recreate = print_recreate_catch_exception_unhandled;
13777
13778 ops = &catch_assert_breakpoint_ops;
13779 *ops = bkpt_breakpoint_ops;
13780 ops->dtor = dtor_catch_assert;
13781 ops->allocate_location = allocate_location_catch_assert;
13782 ops->re_set = re_set_catch_assert;
13783 ops->check_status = check_status_catch_assert;
13784 ops->print_it = print_it_catch_assert;
13785 ops->print_one = print_one_catch_assert;
13786 ops->print_mention = print_mention_catch_assert;
13787 ops->print_recreate = print_recreate_catch_assert;
13788}
13789
3d9434b5
JB
13790/* This module's 'new_objfile' observer. */
13791
13792static void
13793ada_new_objfile_observer (struct objfile *objfile)
13794{
13795 ada_clear_symbol_cache ();
13796}
13797
13798/* This module's 'free_objfile' observer. */
13799
13800static void
13801ada_free_objfile_observer (struct objfile *objfile)
13802{
13803 ada_clear_symbol_cache ();
13804}
13805
d2e4a39e 13806void
6c038f32 13807_initialize_ada_language (void)
14f9c5c9 13808{
6c038f32
PH
13809 add_language (&ada_language_defn);
13810
2060206e
PA
13811 initialize_ada_catchpoint_ops ();
13812
5bf03f13
JB
13813 add_prefix_cmd ("ada", no_class, set_ada_command,
13814 _("Prefix command for changing Ada-specfic settings"),
13815 &set_ada_list, "set ada ", 0, &setlist);
13816
13817 add_prefix_cmd ("ada", no_class, show_ada_command,
13818 _("Generic command for showing Ada-specific settings."),
13819 &show_ada_list, "show ada ", 0, &showlist);
13820
13821 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
13822 &trust_pad_over_xvs, _("\
13823Enable or disable an optimization trusting PAD types over XVS types"), _("\
13824Show whether an optimization trusting PAD types over XVS types is activated"),
13825 _("\
13826This is related to the encoding used by the GNAT compiler. The debugger\n\
13827should normally trust the contents of PAD types, but certain older versions\n\
13828of GNAT have a bug that sometimes causes the information in the PAD type\n\
13829to be incorrect. Turning this setting \"off\" allows the debugger to\n\
13830work around this bug. It is always safe to turn this option \"off\", but\n\
13831this incurs a slight performance penalty, so it is recommended to NOT change\n\
13832this option to \"off\" unless necessary."),
13833 NULL, NULL, &set_ada_list, &show_ada_list);
13834
9ac4176b
PA
13835 add_catch_command ("exception", _("\
13836Catch Ada exceptions, when raised.\n\
13837With an argument, catch only exceptions with the given name."),
13838 catch_ada_exception_command,
13839 NULL,
13840 CATCH_PERMANENT,
13841 CATCH_TEMPORARY);
13842 add_catch_command ("assert", _("\
13843Catch failed Ada assertions, when raised.\n\
13844With an argument, catch only exceptions with the given name."),
13845 catch_assert_command,
13846 NULL,
13847 CATCH_PERMANENT,
13848 CATCH_TEMPORARY);
13849
6c038f32 13850 varsize_limit = 65536;
6c038f32 13851
778865d3
JB
13852 add_info ("exceptions", info_exceptions_command,
13853 _("\
13854List all Ada exception names.\n\
13855If a regular expression is passed as an argument, only those matching\n\
13856the regular expression are listed."));
13857
c6044dd1
JB
13858 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
13859 _("Set Ada maintenance-related variables."),
13860 &maint_set_ada_cmdlist, "maintenance set ada ",
13861 0/*allow-unknown*/, &maintenance_set_cmdlist);
13862
13863 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
13864 _("Show Ada maintenance-related variables"),
13865 &maint_show_ada_cmdlist, "maintenance show ada ",
13866 0/*allow-unknown*/, &maintenance_show_cmdlist);
13867
13868 add_setshow_boolean_cmd
13869 ("ignore-descriptive-types", class_maintenance,
13870 &ada_ignore_descriptive_types_p,
13871 _("Set whether descriptive types generated by GNAT should be ignored."),
13872 _("Show whether descriptive types generated by GNAT should be ignored."),
13873 _("\
13874When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
13875DWARF attribute."),
13876 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
13877
6c038f32
PH
13878 obstack_init (&symbol_list_obstack);
13879
13880 decoded_names_store = htab_create_alloc
13881 (256, htab_hash_string, (int (*)(const void *, const void *)) streq,
13882 NULL, xcalloc, xfree);
6b69afc4 13883
3d9434b5
JB
13884 /* The ada-lang observers. */
13885 observer_attach_new_objfile (ada_new_objfile_observer);
13886 observer_attach_free_objfile (ada_free_objfile_observer);
e802dbe0 13887 observer_attach_inferior_exit (ada_inferior_exit);
ee01b665
JB
13888
13889 /* Setup various context-specific data. */
e802dbe0 13890 ada_inferior_data
8e260fc0 13891 = register_inferior_data_with_cleanup (NULL, ada_inferior_data_cleanup);
ee01b665
JB
13892 ada_pspace_data_handle
13893 = register_program_space_data_with_cleanup (NULL, ada_pspace_data_cleanup);
14f9c5c9 13894}
This page took 2.312952 seconds and 4 git commands to generate.