* h8300-tdep.c (h8300_push_dummy_call): Replace unsafe alloca
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
c5a57081 3 Copyright (C) 1986-2012 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
029a67e4 38#include "user-regs.h"
e6ca34fc 39#include "tracepoint.h"
c906108c
SS
40#include <errno.h>
41#include "gdb_string.h"
4a1970e4 42#include "gdb_assert.h"
79c2c32d 43#include "cp-support.h"
f4c5303c 44#include "observer.h"
3e3b026f
UW
45#include "objfiles.h"
46#include "symtab.h"
79afc5ef 47#include "exceptions.h"
c906108c 48
ccce17b0 49extern unsigned int overload_debug;
c906108c
SS
50/* Local functions. */
51
ad2f7632
DJ
52static int typecmp (int staticp, int varargs, int nargs,
53 struct field t1[], struct value *t2[]);
c906108c 54
714f19d5 55static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 56 int, struct type *, int);
c906108c 57
714f19d5
TT
58static struct value *search_struct_method (const char *, struct value **,
59 struct value **,
60 int, int *, struct type *);
c906108c 61
da096638 62static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
63 const char *, const char *,
64 struct symbol ***,
7322dca9
SW
65 struct badness_vector **,
66 const int no_adl);
8d577d32
DC
67
68static
da096638 69int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
70 const char *, const char *,
71 int, struct symbol ***,
7322dca9
SW
72 struct badness_vector **, int *,
73 const int no_adl);
ac3eeb49 74
da096638 75static int find_oload_champ (struct value **, int, int, int,
ac3eeb49
MS
76 struct fn_field *, struct symbol **,
77 struct badness_vector **);
78
79static int oload_method_static (int, struct fn_field *, int);
8d577d32
DC
80
81enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
82
83static enum
ac3eeb49
MS
84oload_classification classify_oload_match (struct badness_vector *,
85 int, int);
8d577d32 86
ac3eeb49
MS
87static struct value *value_struct_elt_for_reference (struct type *,
88 int, struct type *,
89 char *,
90 struct type *,
91 int, enum noside);
79c2c32d 92
ac3eeb49
MS
93static struct value *value_namespace_elt (const struct type *,
94 char *, int , enum noside);
79c2c32d 95
ac3eeb49
MS
96static struct value *value_maybe_namespace_elt (const struct type *,
97 char *, int,
98 enum noside);
63d06c5c 99
a14ed312 100static CORE_ADDR allocate_space_in_inferior (int);
c906108c 101
f23631e4 102static struct value *cast_into_complex (struct type *, struct value *);
c906108c 103
714f19d5 104static struct fn_field *find_method_list (struct value **, const char *,
ac3eeb49
MS
105 int, struct type *, int *,
106 struct type **, int *);
7a292a7a 107
a14ed312 108void _initialize_valops (void);
c906108c 109
c906108c 110#if 0
ac3eeb49
MS
111/* Flag for whether we want to abandon failed expression evals by
112 default. */
113
c906108c
SS
114static int auto_abandon = 0;
115#endif
116
117int overload_resolution = 0;
920d2a44
AC
118static void
119show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
120 struct cmd_list_element *c,
121 const char *value)
920d2a44 122{
3e43a32a
MS
123 fprintf_filtered (file, _("Overload resolution in evaluating "
124 "C++ functions is %s.\n"),
920d2a44
AC
125 value);
126}
242bfc55 127
3e3b026f
UW
128/* Find the address of function name NAME in the inferior. If OBJF_P
129 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
130 is defined. */
c906108c 131
f23631e4 132struct value *
3e3b026f 133find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 134{
52f0bd74 135 struct symbol *sym;
a109c7c1 136
2570f2b7 137 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
138 if (sym != NULL)
139 {
140 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
141 {
8a3fe4f8 142 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
143 name);
144 }
3e3b026f
UW
145
146 if (objf_p)
147 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
148
c906108c
SS
149 return value_of_variable (sym, NULL);
150 }
151 else
152 {
ac3eeb49
MS
153 struct minimal_symbol *msymbol =
154 lookup_minimal_symbol (name, NULL, NULL);
a109c7c1 155
c906108c
SS
156 if (msymbol != NULL)
157 {
3e3b026f
UW
158 struct objfile *objfile = msymbol_objfile (msymbol);
159 struct gdbarch *gdbarch = get_objfile_arch (objfile);
160
c906108c 161 struct type *type;
4478b372 162 CORE_ADDR maddr;
3e3b026f 163 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
164 type = lookup_function_type (type);
165 type = lookup_pointer_type (type);
4478b372 166 maddr = SYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
167
168 if (objf_p)
169 *objf_p = objfile;
170
4478b372 171 return value_from_pointer (type, maddr);
c906108c
SS
172 }
173 else
174 {
c5aa993b 175 if (!target_has_execution)
3e43a32a
MS
176 error (_("evaluation of this expression "
177 "requires the target program to be active"));
c5aa993b 178 else
3e43a32a
MS
179 error (_("evaluation of this expression requires the "
180 "program to have a function \"%s\"."),
181 name);
c906108c
SS
182 }
183 }
184}
185
ac3eeb49
MS
186/* Allocate NBYTES of space in the inferior using the inferior's
187 malloc and return a value that is a pointer to the allocated
188 space. */
c906108c 189
f23631e4 190struct value *
fba45db2 191value_allocate_space_in_inferior (int len)
c906108c 192{
3e3b026f
UW
193 struct objfile *objf;
194 struct value *val = find_function_in_inferior ("malloc", &objf);
195 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 196 struct value *blocklen;
c906108c 197
3e3b026f 198 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
199 val = call_function_by_hand (val, 1, &blocklen);
200 if (value_logical_not (val))
201 {
202 if (!target_has_execution)
3e43a32a
MS
203 error (_("No memory available to program now: "
204 "you need to start the target first"));
c5aa993b 205 else
8a3fe4f8 206 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
207 }
208 return val;
209}
210
211static CORE_ADDR
fba45db2 212allocate_space_in_inferior (int len)
c906108c
SS
213{
214 return value_as_long (value_allocate_space_in_inferior (len));
215}
216
6af87b03
AR
217/* Cast struct value VAL to type TYPE and return as a value.
218 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
219 for this to work. Typedef to one of the codes is permitted.
220 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
221
222static struct value *
223value_cast_structs (struct type *type, struct value *v2)
224{
225 struct type *t1;
226 struct type *t2;
227 struct value *v;
228
229 gdb_assert (type != NULL && v2 != NULL);
230
231 t1 = check_typedef (type);
232 t2 = check_typedef (value_type (v2));
233
234 /* Check preconditions. */
235 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
236 || TYPE_CODE (t1) == TYPE_CODE_UNION)
237 && !!"Precondition is that type is of STRUCT or UNION kind.");
238 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
239 || TYPE_CODE (t2) == TYPE_CODE_UNION)
240 && !!"Precondition is that value is of STRUCT or UNION kind");
241
191ca0a1
CM
242 if (TYPE_NAME (t1) != NULL
243 && TYPE_NAME (t2) != NULL
244 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
245 return NULL;
246
6af87b03
AR
247 /* Upcasting: look in the type of the source to see if it contains the
248 type of the target as a superclass. If so, we'll need to
249 offset the pointer rather than just change its type. */
250 if (TYPE_NAME (t1) != NULL)
251 {
252 v = search_struct_field (type_name_no_tag (t1),
253 v2, 0, t2, 1);
254 if (v)
255 return v;
256 }
257
258 /* Downcasting: look in the type of the target to see if it contains the
259 type of the source as a superclass. If so, we'll need to
9c3c02fd 260 offset the pointer rather than just change its type. */
6af87b03
AR
261 if (TYPE_NAME (t2) != NULL)
262 {
9c3c02fd
TT
263 /* Try downcasting using the run-time type of the value. */
264 int full, top, using_enc;
265 struct type *real_type;
266
267 real_type = value_rtti_type (v2, &full, &top, &using_enc);
268 if (real_type)
269 {
270 v = value_full_object (v2, real_type, full, top, using_enc);
271 v = value_at_lazy (real_type, value_address (v));
272
273 /* We might be trying to cast to the outermost enclosing
274 type, in which case search_struct_field won't work. */
275 if (TYPE_NAME (real_type) != NULL
276 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
277 return v;
278
279 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
280 if (v)
281 return v;
282 }
283
284 /* Try downcasting using information from the destination type
285 T2. This wouldn't work properly for classes with virtual
286 bases, but those were handled above. */
6af87b03
AR
287 v = search_struct_field (type_name_no_tag (t2),
288 value_zero (t1, not_lval), 0, t1, 1);
289 if (v)
290 {
291 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 292 CORE_ADDR addr2 = value_address (v2);
a109c7c1 293
42ae5230 294 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
295 return value_at (type, addr2);
296 }
297 }
694182d2
DJ
298
299 return NULL;
6af87b03
AR
300}
301
fb933624
DJ
302/* Cast one pointer or reference type to another. Both TYPE and
303 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
304 reference types. If SUBCLASS_CHECK is non-zero, this will force a
305 check to see whether TYPE is a superclass of ARG2's type. If
306 SUBCLASS_CHECK is zero, then the subclass check is done only when
307 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
308
309struct value *
b1af9e97
TT
310value_cast_pointers (struct type *type, struct value *arg2,
311 int subclass_check)
fb933624 312{
d160942f 313 struct type *type1 = check_typedef (type);
fb933624 314 struct type *type2 = check_typedef (value_type (arg2));
d160942f 315 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
316 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
317
318 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
319 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 320 && (subclass_check || !value_logical_not (arg2)))
fb933624 321 {
6af87b03 322 struct value *v2;
fb933624 323
6af87b03
AR
324 if (TYPE_CODE (type2) == TYPE_CODE_REF)
325 v2 = coerce_ref (arg2);
326 else
327 v2 = value_ind (arg2);
3e43a32a
MS
328 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
329 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
330 v2 = value_cast_structs (t1, v2);
331 /* At this point we have what we can have, un-dereference if needed. */
332 if (v2)
fb933624 333 {
6af87b03 334 struct value *v = value_addr (v2);
a109c7c1 335
6af87b03
AR
336 deprecated_set_value_type (v, type);
337 return v;
fb933624 338 }
6af87b03 339 }
fb933624
DJ
340
341 /* No superclass found, just change the pointer type. */
0d5de010 342 arg2 = value_copy (arg2);
fb933624 343 deprecated_set_value_type (arg2, type);
4dfea560 344 set_value_enclosing_type (arg2, type);
fb933624
DJ
345 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
346 return arg2;
347}
348
c906108c
SS
349/* Cast value ARG2 to type TYPE and return as a value.
350 More general than a C cast: accepts any two types of the same length,
351 and if ARG2 is an lvalue it can be cast into anything at all. */
352/* In C++, casts may change pointer or object representations. */
353
f23631e4
AC
354struct value *
355value_cast (struct type *type, struct value *arg2)
c906108c 356{
52f0bd74
AC
357 enum type_code code1;
358 enum type_code code2;
359 int scalar;
c906108c
SS
360 struct type *type2;
361
362 int convert_to_boolean = 0;
c5aa993b 363
df407dfe 364 if (value_type (arg2) == type)
c906108c
SS
365 return arg2;
366
6af87b03
AR
367 code1 = TYPE_CODE (check_typedef (type));
368
369 /* Check if we are casting struct reference to struct reference. */
370 if (code1 == TYPE_CODE_REF)
371 {
372 /* We dereference type; then we recurse and finally
581e13c1 373 we generate value of the given reference. Nothing wrong with
6af87b03
AR
374 that. */
375 struct type *t1 = check_typedef (type);
376 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
377 struct value *val = value_cast (dereftype, arg2);
a109c7c1 378
6af87b03
AR
379 return value_ref (val);
380 }
381
382 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
383
384 if (code2 == TYPE_CODE_REF)
385 /* We deref the value and then do the cast. */
386 return value_cast (type, coerce_ref (arg2));
387
c906108c
SS
388 CHECK_TYPEDEF (type);
389 code1 = TYPE_CODE (type);
994b9211 390 arg2 = coerce_ref (arg2);
df407dfe 391 type2 = check_typedef (value_type (arg2));
c906108c 392
fb933624
DJ
393 /* You can't cast to a reference type. See value_cast_pointers
394 instead. */
395 gdb_assert (code1 != TYPE_CODE_REF);
396
ac3eeb49
MS
397 /* A cast to an undetermined-length array_type, such as
398 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
399 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
400 if (code1 == TYPE_CODE_ARRAY)
401 {
402 struct type *element_type = TYPE_TARGET_TYPE (type);
403 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 404
d78df370 405 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
406 {
407 struct type *range_type = TYPE_INDEX_TYPE (type);
408 int val_length = TYPE_LENGTH (type2);
409 LONGEST low_bound, high_bound, new_length;
a109c7c1 410
c906108c
SS
411 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
412 low_bound = 0, high_bound = 0;
413 new_length = val_length / element_length;
414 if (val_length % element_length != 0)
3e43a32a
MS
415 warning (_("array element type size does not "
416 "divide object size in cast"));
ac3eeb49
MS
417 /* FIXME-type-allocation: need a way to free this type when
418 we are done with it. */
c906108c
SS
419 range_type = create_range_type ((struct type *) NULL,
420 TYPE_TARGET_TYPE (range_type),
421 low_bound,
422 new_length + low_bound - 1);
ac3eeb49
MS
423 deprecated_set_value_type (arg2,
424 create_array_type ((struct type *) NULL,
425 element_type,
426 range_type));
c906108c
SS
427 return arg2;
428 }
429 }
430
431 if (current_language->c_style_arrays
3bdf2bbd
KW
432 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
433 && !TYPE_VECTOR (type2))
c906108c
SS
434 arg2 = value_coerce_array (arg2);
435
436 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
437 arg2 = value_coerce_function (arg2);
438
df407dfe 439 type2 = check_typedef (value_type (arg2));
c906108c
SS
440 code2 = TYPE_CODE (type2);
441
442 if (code1 == TYPE_CODE_COMPLEX)
443 return cast_into_complex (type, arg2);
444 if (code1 == TYPE_CODE_BOOL)
445 {
446 code1 = TYPE_CODE_INT;
447 convert_to_boolean = 1;
448 }
449 if (code1 == TYPE_CODE_CHAR)
450 code1 = TYPE_CODE_INT;
451 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
452 code2 = TYPE_CODE_INT;
453
454 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
455 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
456 || code2 == TYPE_CODE_RANGE);
c906108c 457
6af87b03
AR
458 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
459 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 460 && TYPE_NAME (type) != 0)
694182d2
DJ
461 {
462 struct value *v = value_cast_structs (type, arg2);
a109c7c1 463
694182d2
DJ
464 if (v)
465 return v;
466 }
467
c906108c
SS
468 if (code1 == TYPE_CODE_FLT && scalar)
469 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
470 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
471 {
e17a4113 472 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
473 int dec_len = TYPE_LENGTH (type);
474 gdb_byte dec[16];
475
476 if (code2 == TYPE_CODE_FLT)
e17a4113 477 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
478 else if (code2 == TYPE_CODE_DECFLOAT)
479 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 480 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
481 else
482 /* The only option left is an integral type. */
e17a4113 483 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
484
485 return value_from_decfloat (type, dec);
486 }
c906108c
SS
487 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
488 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
489 && (scalar || code2 == TYPE_CODE_PTR
490 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
491 {
492 LONGEST longest;
c5aa993b 493
2bf1f4a1 494 /* When we cast pointers to integers, we mustn't use
76e71323 495 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
496 represents, as value_as_long would. GDB should evaluate
497 expressions just as the compiler would --- and the compiler
498 sees a cast as a simple reinterpretation of the pointer's
499 bits. */
500 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
501 longest = extract_unsigned_integer
502 (value_contents (arg2), TYPE_LENGTH (type2),
503 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
504 else
505 longest = value_as_long (arg2);
802db21b 506 return value_from_longest (type, convert_to_boolean ?
716c501e 507 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 508 }
ac3eeb49
MS
509 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
510 || code2 == TYPE_CODE_ENUM
511 || code2 == TYPE_CODE_RANGE))
634acd5f 512 {
4603e466
DT
513 /* TYPE_LENGTH (type) is the length of a pointer, but we really
514 want the length of an address! -- we are really dealing with
515 addresses (i.e., gdb representations) not pointers (i.e.,
516 target representations) here.
517
518 This allows things like "print *(int *)0x01000234" to work
519 without printing a misleading message -- which would
520 otherwise occur when dealing with a target having two byte
521 pointers and four byte addresses. */
522
50810684 523 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 524 LONGEST longest = value_as_long (arg2);
a109c7c1 525
4603e466 526 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 527 {
4603e466
DT
528 if (longest >= ((LONGEST) 1 << addr_bit)
529 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 530 warning (_("value truncated"));
634acd5f
AC
531 }
532 return value_from_longest (type, longest);
533 }
0d5de010
DJ
534 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
535 && value_as_long (arg2) == 0)
536 {
537 struct value *result = allocate_value (type);
a109c7c1 538
ad4820ab 539 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
540 return result;
541 }
542 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
543 && value_as_long (arg2) == 0)
544 {
545 /* The Itanium C++ ABI represents NULL pointers to members as
546 minus one, instead of biasing the normal case. */
547 return value_from_longest (type, -1);
548 }
3bdf2bbd
KW
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar)
550 {
551 /* Widen the scalar to a vector. */
552 struct type *eltype;
553 struct value *val;
dbc98a8b
KW
554 LONGEST low_bound, high_bound;
555 int i;
556
557 if (!get_array_bounds (type, &low_bound, &high_bound))
558 error (_("Could not determine the vector bounds"));
3bdf2bbd
KW
559
560 eltype = check_typedef (TYPE_TARGET_TYPE (type));
561 arg2 = value_cast (eltype, arg2);
562 val = allocate_value (type);
3bdf2bbd 563
dbc98a8b 564 for (i = 0; i < high_bound - low_bound + 1; i++)
3bdf2bbd
KW
565 {
566 /* Duplicate the contents of arg2 into the destination vector. */
567 memcpy (value_contents_writeable (val) + (i * TYPE_LENGTH (eltype)),
568 value_contents_all (arg2), TYPE_LENGTH (eltype));
569 }
570 return val;
571 }
c906108c
SS
572 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
573 {
574 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 575 return value_cast_pointers (type, arg2, 0);
fb933624 576
0d5de010 577 arg2 = value_copy (arg2);
04624583 578 deprecated_set_value_type (arg2, type);
4dfea560 579 set_value_enclosing_type (arg2, type);
b44d461b 580 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
581 return arg2;
582 }
c906108c 583 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 584 return value_at_lazy (type, value_address (arg2));
c906108c
SS
585 else if (code1 == TYPE_CODE_VOID)
586 {
48319d1f 587 return value_zero (type, not_lval);
c906108c
SS
588 }
589 else
590 {
8a3fe4f8 591 error (_("Invalid cast."));
c906108c
SS
592 return 0;
593 }
594}
595
4e8f195d
TT
596/* The C++ reinterpret_cast operator. */
597
598struct value *
599value_reinterpret_cast (struct type *type, struct value *arg)
600{
601 struct value *result;
602 struct type *real_type = check_typedef (type);
603 struct type *arg_type, *dest_type;
604 int is_ref = 0;
605 enum type_code dest_code, arg_code;
606
607 /* Do reference, function, and array conversion. */
608 arg = coerce_array (arg);
609
610 /* Attempt to preserve the type the user asked for. */
611 dest_type = type;
612
613 /* If we are casting to a reference type, transform
614 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
615 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
616 {
617 is_ref = 1;
618 arg = value_addr (arg);
619 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
620 real_type = lookup_pointer_type (real_type);
621 }
622
623 arg_type = value_type (arg);
624
625 dest_code = TYPE_CODE (real_type);
626 arg_code = TYPE_CODE (arg_type);
627
628 /* We can convert pointer types, or any pointer type to int, or int
629 type to pointer. */
630 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
631 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
632 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
633 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
634 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
635 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
636 || (dest_code == arg_code
637 && (dest_code == TYPE_CODE_PTR
638 || dest_code == TYPE_CODE_METHODPTR
639 || dest_code == TYPE_CODE_MEMBERPTR)))
640 result = value_cast (dest_type, arg);
641 else
642 error (_("Invalid reinterpret_cast"));
643
644 if (is_ref)
645 result = value_cast (type, value_ref (value_ind (result)));
646
647 return result;
648}
649
650/* A helper for value_dynamic_cast. This implements the first of two
651 runtime checks: we iterate over all the base classes of the value's
652 class which are equal to the desired class; if only one of these
653 holds the value, then it is the answer. */
654
655static int
656dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
657 const gdb_byte *valaddr,
658 int embedded_offset,
4e8f195d 659 CORE_ADDR address,
8af8e3bc 660 struct value *val,
4e8f195d
TT
661 struct type *search_type,
662 CORE_ADDR arg_addr,
663 struct type *arg_type,
664 struct value **result)
665{
666 int i, result_count = 0;
667
668 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
669 {
8af8e3bc
PA
670 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
671 address, val);
a109c7c1 672
4e8f195d
TT
673 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
674 {
8af8e3bc
PA
675 if (address + embedded_offset + offset >= arg_addr
676 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
677 {
678 ++result_count;
679 if (!*result)
680 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 681 address + embedded_offset + offset);
4e8f195d
TT
682 }
683 }
684 else
685 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
686 valaddr,
687 embedded_offset + offset,
688 address, val,
4e8f195d
TT
689 TYPE_BASECLASS (search_type, i),
690 arg_addr,
691 arg_type,
692 result);
693 }
694
695 return result_count;
696}
697
698/* A helper for value_dynamic_cast. This implements the second of two
699 runtime checks: we look for a unique public sibling class of the
700 argument's declared class. */
701
702static int
703dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
704 const gdb_byte *valaddr,
705 int embedded_offset,
4e8f195d 706 CORE_ADDR address,
8af8e3bc 707 struct value *val,
4e8f195d
TT
708 struct type *search_type,
709 struct value **result)
710{
711 int i, result_count = 0;
712
713 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
714 {
715 int offset;
716
717 if (! BASETYPE_VIA_PUBLIC (search_type, i))
718 continue;
719
8af8e3bc
PA
720 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
721 address, val);
4e8f195d
TT
722 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
723 {
724 ++result_count;
725 if (*result == NULL)
726 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 727 address + embedded_offset + offset);
4e8f195d
TT
728 }
729 else
730 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
731 valaddr,
732 embedded_offset + offset,
733 address, val,
4e8f195d
TT
734 TYPE_BASECLASS (search_type, i),
735 result);
736 }
737
738 return result_count;
739}
740
741/* The C++ dynamic_cast operator. */
742
743struct value *
744value_dynamic_cast (struct type *type, struct value *arg)
745{
8f78b329 746 int full, top, using_enc;
4e8f195d
TT
747 struct type *resolved_type = check_typedef (type);
748 struct type *arg_type = check_typedef (value_type (arg));
749 struct type *class_type, *rtti_type;
750 struct value *result, *tem, *original_arg = arg;
751 CORE_ADDR addr;
752 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
753
754 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
755 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
756 error (_("Argument to dynamic_cast must be a pointer or reference type"));
757 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
758 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
759 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
760
761 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
762 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
763 {
764 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
765 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
766 && value_as_long (arg) == 0))
767 error (_("Argument to dynamic_cast does not have pointer type"));
768 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
769 {
770 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
771 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
772 error (_("Argument to dynamic_cast does "
773 "not have pointer to class type"));
4e8f195d
TT
774 }
775
776 /* Handle NULL pointers. */
777 if (value_as_long (arg) == 0)
778 return value_zero (type, not_lval);
779
780 arg = value_ind (arg);
781 }
782 else
783 {
784 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
785 error (_("Argument to dynamic_cast does not have class type"));
786 }
787
788 /* If the classes are the same, just return the argument. */
789 if (class_types_same_p (class_type, arg_type))
790 return value_cast (type, arg);
791
792 /* If the target type is a unique base class of the argument's
793 declared type, just cast it. */
794 if (is_ancestor (class_type, arg_type))
795 {
796 if (is_unique_ancestor (class_type, arg))
797 return value_cast (type, original_arg);
798 error (_("Ambiguous dynamic_cast"));
799 }
800
801 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
802 if (! rtti_type)
803 error (_("Couldn't determine value's most derived type for dynamic_cast"));
804
805 /* Compute the most derived object's address. */
806 addr = value_address (arg);
807 if (full)
808 {
809 /* Done. */
810 }
811 else if (using_enc)
812 addr += top;
813 else
814 addr += top + value_embedded_offset (arg);
815
816 /* dynamic_cast<void *> means to return a pointer to the
817 most-derived object. */
818 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
819 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
820 return value_at_lazy (type, addr);
821
822 tem = value_at (type, addr);
823
824 /* The first dynamic check specified in 5.2.7. */
825 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
826 {
827 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
828 return tem;
829 result = NULL;
830 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
831 value_contents_for_printing (tem),
832 value_embedded_offset (tem),
833 value_address (tem), tem,
4e8f195d
TT
834 rtti_type, addr,
835 arg_type,
836 &result) == 1)
837 return value_cast (type,
838 is_ref ? value_ref (result) : value_addr (result));
839 }
840
841 /* The second dynamic check specified in 5.2.7. */
842 result = NULL;
843 if (is_public_ancestor (arg_type, rtti_type)
844 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
845 value_contents_for_printing (tem),
846 value_embedded_offset (tem),
847 value_address (tem), tem,
4e8f195d
TT
848 rtti_type, &result) == 1)
849 return value_cast (type,
850 is_ref ? value_ref (result) : value_addr (result));
851
852 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
853 return value_zero (type, not_lval);
854
855 error (_("dynamic_cast failed"));
856}
857
c906108c
SS
858/* Create a value of type TYPE that is zero, and return it. */
859
f23631e4 860struct value *
fba45db2 861value_zero (struct type *type, enum lval_type lv)
c906108c 862{
f23631e4 863 struct value *val = allocate_value (type);
c906108c 864
bb7da2bf 865 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
866 return val;
867}
868
18a46dbe 869/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
870
871struct value *
18a46dbe 872value_one (struct type *type)
301f0ecf
DE
873{
874 struct type *type1 = check_typedef (type);
4e608b4f 875 struct value *val;
301f0ecf
DE
876
877 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
878 {
e17a4113 879 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 880 gdb_byte v[16];
a109c7c1 881
e17a4113 882 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
883 val = value_from_decfloat (type, v);
884 }
885 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
886 {
887 val = value_from_double (type, (DOUBLEST) 1);
888 }
889 else if (is_integral_type (type1))
890 {
891 val = value_from_longest (type, (LONGEST) 1);
892 }
120bd360
KW
893 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
894 {
895 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
896 int i;
897 LONGEST low_bound, high_bound;
120bd360
KW
898 struct value *tmp;
899
cfa6f054
KW
900 if (!get_array_bounds (type1, &low_bound, &high_bound))
901 error (_("Could not determine the vector bounds"));
902
120bd360 903 val = allocate_value (type);
cfa6f054 904 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 905 {
18a46dbe 906 tmp = value_one (eltype);
120bd360
KW
907 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
908 value_contents_all (tmp), TYPE_LENGTH (eltype));
909 }
910 }
301f0ecf
DE
911 else
912 {
913 error (_("Not a numeric type."));
914 }
915
18a46dbe
JK
916 /* value_one result is never used for assignments to. */
917 gdb_assert (VALUE_LVAL (val) == not_lval);
918
301f0ecf
DE
919 return val;
920}
921
4e5d721f
DE
922/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack. */
923
924static struct value *
925get_value_at (struct type *type, CORE_ADDR addr, int lazy)
926{
927 struct value *val;
928
929 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
930 error (_("Attempt to dereference a generic pointer."));
931
a3d34bf4 932 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 933
a3d34bf4
PA
934 if (!lazy)
935 value_fetch_lazy (val);
4e5d721f
DE
936
937 return val;
938}
939
070ad9f0 940/* Return a value with type TYPE located at ADDR.
c906108c
SS
941
942 Call value_at only if the data needs to be fetched immediately;
943 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
944 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 945 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 946 is tested in the value_contents macro, which is used if and when
070ad9f0 947 the contents are actually required.
c906108c
SS
948
949 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 950 adjustments before or after calling it. */
c906108c 951
f23631e4 952struct value *
00a4c844 953value_at (struct type *type, CORE_ADDR addr)
c906108c 954{
4e5d721f 955 return get_value_at (type, addr, 0);
c906108c
SS
956}
957
958/* Return a lazy value with type TYPE located at ADDR (cf. value_at). */
959
f23631e4 960struct value *
00a4c844 961value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 962{
4e5d721f 963 return get_value_at (type, addr, 1);
c906108c
SS
964}
965
0fd88904 966/* Called only from the value_contents and value_contents_all()
46615f07 967 macros, if the current data for a variable needs to be loaded into
0fd88904 968 value_contents(VAL). Fetches the data from the user's process, and
46615f07
AC
969 clears the lazy flag to indicate that the data in the buffer is
970 valid.
c906108c 971
ac3eeb49
MS
972 If the value is zero-length, we avoid calling read_memory, which
973 would abort. We mark the value as fetched anyway -- all 0 bytes of
974 it.
c906108c 975
ac3eeb49
MS
976 This function returns a value because it is used in the
977 value_contents macro as part of an expression, where a void would
978 not work. The value is ignored. */
c906108c
SS
979
980int
f23631e4 981value_fetch_lazy (struct value *val)
c906108c 982{
3e3d7139
JG
983 gdb_assert (value_lazy (val));
984 allocate_value_contents (val);
4ea48cc1
DJ
985 if (value_bitsize (val))
986 {
987 /* To read a lazy bitfield, read the entire enclosing value. This
988 prevents reading the same block of (possibly volatile) memory once
989 per bitfield. It would be even better to read only the containing
990 word, but we have no way to record that just specific bits of a
991 value have been fetched. */
992 struct type *type = check_typedef (value_type (val));
993 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
994 struct value *parent = value_parent (val);
995 LONGEST offset = value_offset (val);
5467c6c8 996 LONGEST num;
4ea48cc1 997 int length = TYPE_LENGTH (type);
a109c7c1 998
0e03807e
TT
999 if (!value_bits_valid (val,
1000 TARGET_CHAR_BIT * offset + value_bitpos (val),
1001 value_bitsize (val)))
1002 error (_("value has been optimized out"));
1003
5467c6c8
PA
1004 if (!unpack_value_bits_as_long (value_type (val),
1005 value_contents_for_printing (parent),
1006 offset,
1007 value_bitpos (val),
1008 value_bitsize (val), parent, &num))
1009 mark_value_bytes_unavailable (val,
1010 value_embedded_offset (val),
1011 length);
1012 else
1013 store_signed_integer (value_contents_raw (val), length,
1014 byte_order, num);
4ea48cc1
DJ
1015 }
1016 else if (VALUE_LVAL (val) == lval_memory)
9214ee5f 1017 {
42ae5230 1018 CORE_ADDR addr = value_address (val);
694182d2 1019 int length = TYPE_LENGTH (check_typedef (value_enclosing_type (val)));
9214ee5f 1020
9214ee5f 1021 if (length)
e6ca34fc
PA
1022 read_value_memory (val, 0, value_stack (val),
1023 addr, value_contents_all_raw (val), length);
9214ee5f
DJ
1024 }
1025 else if (VALUE_LVAL (val) == lval_register)
1026 {
669fac23
DJ
1027 struct frame_info *frame;
1028 int regnum;
9214ee5f 1029 struct type *type = check_typedef (value_type (val));
669fac23 1030 struct value *new_val = val, *mark = value_mark ();
c906108c 1031
669fac23
DJ
1032 /* Offsets are not supported here; lazy register values must
1033 refer to the entire register. */
1034 gdb_assert (value_offset (val) == 0);
9214ee5f 1035
669fac23
DJ
1036 while (VALUE_LVAL (new_val) == lval_register && value_lazy (new_val))
1037 {
1038 frame = frame_find_by_id (VALUE_FRAME_ID (new_val));
1039 regnum = VALUE_REGNUM (new_val);
1040
1041 gdb_assert (frame != NULL);
9214ee5f 1042
669fac23
DJ
1043 /* Convertible register routines are used for multi-register
1044 values and for interpretation in different types
1045 (e.g. float or int from a double register). Lazy
1046 register values should have the register's natural type,
1047 so they do not apply. */
1048 gdb_assert (!gdbarch_convert_register_p (get_frame_arch (frame),
1049 regnum, type));
1050
1051 new_val = get_frame_register_value (frame, regnum);
1052 }
1053
1054 /* If it's still lazy (for instance, a saved register on the
1055 stack), fetch it. */
1056 if (value_lazy (new_val))
1057 value_fetch_lazy (new_val);
1058
39d37385 1059 /* If the register was not saved, mark it optimized out. */
669fac23 1060 if (value_optimized_out (new_val))
9214ee5f 1061 set_value_optimized_out (val, 1);
669fac23 1062 else
39d37385
PA
1063 {
1064 set_value_lazy (val, 0);
1065 value_contents_copy (val, value_embedded_offset (val),
1066 new_val, value_embedded_offset (new_val),
1067 TYPE_LENGTH (type));
1068 }
669fac23
DJ
1069
1070 if (frame_debug)
1071 {
029a67e4 1072 struct gdbarch *gdbarch;
669fac23
DJ
1073 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1074 regnum = VALUE_REGNUM (val);
029a67e4 1075 gdbarch = get_frame_arch (frame);
669fac23 1076
3e43a32a
MS
1077 fprintf_unfiltered (gdb_stdlog,
1078 "{ value_fetch_lazy "
1079 "(frame=%d,regnum=%d(%s),...) ",
669fac23 1080 frame_relative_level (frame), regnum,
029a67e4 1081 user_reg_map_regnum_to_name (gdbarch, regnum));
669fac23
DJ
1082
1083 fprintf_unfiltered (gdb_stdlog, "->");
1084 if (value_optimized_out (new_val))
1085 fprintf_unfiltered (gdb_stdlog, " optimized out");
1086 else
1087 {
1088 int i;
1089 const gdb_byte *buf = value_contents (new_val);
1090
1091 if (VALUE_LVAL (new_val) == lval_register)
1092 fprintf_unfiltered (gdb_stdlog, " register=%d",
1093 VALUE_REGNUM (new_val));
1094 else if (VALUE_LVAL (new_val) == lval_memory)
5af949e3
UW
1095 fprintf_unfiltered (gdb_stdlog, " address=%s",
1096 paddress (gdbarch,
1097 value_address (new_val)));
669fac23
DJ
1098 else
1099 fprintf_unfiltered (gdb_stdlog, " computed");
1100
1101 fprintf_unfiltered (gdb_stdlog, " bytes=");
1102 fprintf_unfiltered (gdb_stdlog, "[");
029a67e4 1103 for (i = 0; i < register_size (gdbarch, regnum); i++)
669fac23
DJ
1104 fprintf_unfiltered (gdb_stdlog, "%02x", buf[i]);
1105 fprintf_unfiltered (gdb_stdlog, "]");
1106 }
1107
1108 fprintf_unfiltered (gdb_stdlog, " }\n");
1109 }
1110
1111 /* Dispose of the intermediate values. This prevents
1112 watchpoints from trying to watch the saved frame pointer. */
1113 value_free_to_mark (mark);
9214ee5f 1114 }
ac71a68c
JK
1115 else if (VALUE_LVAL (val) == lval_computed
1116 && value_computed_funcs (val)->read != NULL)
5f5233d4 1117 value_computed_funcs (val)->read (val);
41e8491f
JK
1118 else if (value_optimized_out (val))
1119 /* Keep it optimized out. */;
9214ee5f 1120 else
9b20d036 1121 internal_error (__FILE__, __LINE__, _("Unexpected lazy value type."));
802db21b 1122
dfa52d88 1123 set_value_lazy (val, 0);
c906108c
SS
1124 return 0;
1125}
1126
e6ca34fc
PA
1127void
1128read_value_memory (struct value *val, int embedded_offset,
1129 int stack, CORE_ADDR memaddr,
1130 gdb_byte *buffer, size_t length)
1131{
1132 if (length)
1133 {
1134 VEC(mem_range_s) *available_memory;
1135
1136 if (get_traceframe_number () < 0
1137 || !traceframe_available_memory (&available_memory, memaddr, length))
1138 {
1139 if (stack)
1140 read_stack (memaddr, buffer, length);
1141 else
1142 read_memory (memaddr, buffer, length);
1143 }
1144 else
1145 {
1146 struct target_section_table *table;
1147 struct cleanup *old_chain;
1148 CORE_ADDR unavail;
1149 mem_range_s *r;
1150 int i;
1151
1152 /* Fallback to reading from read-only sections. */
1153 table = target_get_section_table (&exec_ops);
1154 available_memory =
1155 section_table_available_memory (available_memory,
1156 memaddr, length,
1157 table->sections,
1158 table->sections_end);
1159
1160 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
1161 &available_memory);
1162
1163 normalize_mem_ranges (available_memory);
1164
1165 /* Mark which bytes are unavailable, and read those which
1166 are available. */
1167
1168 unavail = memaddr;
1169
1170 for (i = 0;
1171 VEC_iterate (mem_range_s, available_memory, i, r);
1172 i++)
1173 {
1174 if (mem_ranges_overlap (r->start, r->length,
1175 memaddr, length))
1176 {
1177 CORE_ADDR lo1, hi1, lo2, hi2;
1178 CORE_ADDR start, end;
1179
1180 /* Get the intersection window. */
1181 lo1 = memaddr;
1182 hi1 = memaddr + length;
1183 lo2 = r->start;
1184 hi2 = r->start + r->length;
1185 start = max (lo1, lo2);
1186 end = min (hi1, hi2);
1187
1188 gdb_assert (end - memaddr <= length);
1189
1190 if (start > unavail)
1191 mark_value_bytes_unavailable (val,
1192 (embedded_offset
1193 + unavail - memaddr),
1194 start - unavail);
1195 unavail = end;
1196
1197 read_memory (start, buffer + start - memaddr, end - start);
1198 }
1199 }
1200
1201 if (unavail != memaddr + length)
1202 mark_value_bytes_unavailable (val,
1203 embedded_offset + unavail - memaddr,
1204 (memaddr + length) - unavail);
1205
1206 do_cleanups (old_chain);
1207 }
1208 }
1209}
c906108c
SS
1210
1211/* Store the contents of FROMVAL into the location of TOVAL.
1212 Return a new value with the location of TOVAL and contents of FROMVAL. */
1213
f23631e4
AC
1214struct value *
1215value_assign (struct value *toval, struct value *fromval)
c906108c 1216{
52f0bd74 1217 struct type *type;
f23631e4 1218 struct value *val;
cb741690 1219 struct frame_id old_frame;
c906108c 1220
88e3b34b 1221 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1222 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1223
994b9211 1224 toval = coerce_ref (toval);
c906108c 1225
df407dfe 1226 type = value_type (toval);
c906108c 1227 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1228 fromval = value_cast (type, fromval);
c906108c 1229 else
63092375
DJ
1230 {
1231 /* Coerce arrays and functions to pointers, except for arrays
1232 which only live in GDB's storage. */
1233 if (!value_must_coerce_to_target (fromval))
1234 fromval = coerce_array (fromval);
1235 }
1236
c906108c
SS
1237 CHECK_TYPEDEF (type);
1238
ac3eeb49
MS
1239 /* Since modifying a register can trash the frame chain, and
1240 modifying memory can trash the frame cache, we save the old frame
1241 and then restore the new frame afterwards. */
206415a3 1242 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1243
c906108c
SS
1244 switch (VALUE_LVAL (toval))
1245 {
1246 case lval_internalvar:
1247 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1248 return value_of_internalvar (get_type_arch (type),
1249 VALUE_INTERNALVAR (toval));
c906108c
SS
1250
1251 case lval_internalvar_component:
1252 set_internalvar_component (VALUE_INTERNALVAR (toval),
df407dfe
AC
1253 value_offset (toval),
1254 value_bitpos (toval),
1255 value_bitsize (toval),
c906108c
SS
1256 fromval);
1257 break;
1258
1259 case lval_memory:
1260 {
fc1a4b47 1261 const gdb_byte *dest_buffer;
c5aa993b
JM
1262 CORE_ADDR changed_addr;
1263 int changed_len;
10c42a71 1264 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1265
df407dfe 1266 if (value_bitsize (toval))
c5aa993b 1267 {
2d88202a 1268 struct value *parent = value_parent (toval);
2d88202a 1269
a109c7c1 1270 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1271 changed_len = (value_bitpos (toval)
1272 + value_bitsize (toval)
c5aa993b
JM
1273 + HOST_CHAR_BIT - 1)
1274 / HOST_CHAR_BIT;
c906108c 1275
4ea48cc1
DJ
1276 /* If we can read-modify-write exactly the size of the
1277 containing type (e.g. short or int) then do so. This
1278 is safer for volatile bitfields mapped to hardware
1279 registers. */
1280 if (changed_len < TYPE_LENGTH (type)
1281 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1282 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1283 changed_len = TYPE_LENGTH (type);
1284
c906108c 1285 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1286 error (_("Can't handle bitfields which "
1287 "don't fit in a %d bit word."),
baa6f10b 1288 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1289
2d88202a 1290 read_memory (changed_addr, buffer, changed_len);
50810684 1291 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1292 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1293 dest_buffer = buffer;
1294 }
c906108c
SS
1295 else
1296 {
42ae5230 1297 changed_addr = value_address (toval);
c906108c 1298 changed_len = TYPE_LENGTH (type);
0fd88904 1299 dest_buffer = value_contents (fromval);
c906108c
SS
1300 }
1301
972daa01 1302 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1303 }
1304 break;
1305
492254e9 1306 case lval_register:
c906108c 1307 {
c906108c 1308 struct frame_info *frame;
d80b854b 1309 struct gdbarch *gdbarch;
ff2e87ac 1310 int value_reg;
c906108c
SS
1311
1312 /* Figure out which frame this is in currently. */
0c16dd26
AC
1313 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1314 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1315
1316 if (!frame)
8a3fe4f8 1317 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1318
1319 gdbarch = get_frame_arch (frame);
1320 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1321 {
ff2e87ac 1322 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1323 conversion of program values to a special raw
1324 format. */
d80b854b 1325 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1326 VALUE_REGNUM (toval), type,
1327 value_contents (fromval));
492254e9 1328 }
c906108c 1329 else
492254e9 1330 {
df407dfe 1331 if (value_bitsize (toval))
00fa51f6 1332 {
2d88202a
UW
1333 struct value *parent = value_parent (toval);
1334 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1335 int changed_len;
1336 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1337 int optim, unavail;
00fa51f6
UW
1338
1339 changed_len = (value_bitpos (toval)
1340 + value_bitsize (toval)
1341 + HOST_CHAR_BIT - 1)
1342 / HOST_CHAR_BIT;
1343
1344 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1345 error (_("Can't handle bitfields which "
1346 "don't fit in a %d bit word."),
00fa51f6
UW
1347 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1348
8dccd430
PA
1349 if (!get_frame_register_bytes (frame, value_reg, offset,
1350 changed_len, buffer,
1351 &optim, &unavail))
1352 {
1353 if (optim)
1354 error (_("value has been optimized out"));
1355 if (unavail)
1356 throw_error (NOT_AVAILABLE_ERROR,
1357 _("value is not available"));
1358 }
00fa51f6 1359
50810684
UW
1360 modify_field (type, buffer, value_as_long (fromval),
1361 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1362
2d88202a 1363 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1364 changed_len, buffer);
1365 }
c906108c 1366 else
00fa51f6
UW
1367 {
1368 put_frame_register_bytes (frame, value_reg,
1369 value_offset (toval),
1370 TYPE_LENGTH (type),
1371 value_contents (fromval));
1372 }
ff2e87ac 1373 }
00fa51f6 1374
9a4105ab
AC
1375 if (deprecated_register_changed_hook)
1376 deprecated_register_changed_hook (-1);
f4c5303c 1377 observer_notify_target_changed (&current_target);
ff2e87ac 1378 break;
c906108c 1379 }
5f5233d4
PA
1380
1381 case lval_computed:
1382 {
c8f2448a 1383 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1384
ac71a68c
JK
1385 if (funcs->write != NULL)
1386 {
1387 funcs->write (toval, fromval);
1388 break;
1389 }
5f5233d4 1390 }
ac71a68c 1391 /* Fall through. */
5f5233d4 1392
c906108c 1393 default:
8a3fe4f8 1394 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1395 }
1396
cb741690
DJ
1397 /* Assigning to the stack pointer, frame pointer, and other
1398 (architecture and calling convention specific) registers may
1399 cause the frame cache to be out of date. Assigning to memory
1400 also can. We just do this on all assignments to registers or
1401 memory, for simplicity's sake; I doubt the slowdown matters. */
1402 switch (VALUE_LVAL (toval))
1403 {
1404 case lval_memory:
1405 case lval_register:
0e03807e 1406 case lval_computed:
cb741690
DJ
1407
1408 reinit_frame_cache ();
1409
ac3eeb49
MS
1410 /* Having destroyed the frame cache, restore the selected
1411 frame. */
cb741690
DJ
1412
1413 /* FIXME: cagney/2002-11-02: There has to be a better way of
1414 doing this. Instead of constantly saving/restoring the
1415 frame. Why not create a get_selected_frame() function that,
1416 having saved the selected frame's ID can automatically
1417 re-find the previously selected frame automatically. */
1418
1419 {
1420 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1421
cb741690
DJ
1422 if (fi != NULL)
1423 select_frame (fi);
1424 }
1425
1426 break;
1427 default:
1428 break;
1429 }
1430
ac3eeb49
MS
1431 /* If the field does not entirely fill a LONGEST, then zero the sign
1432 bits. If the field is signed, and is negative, then sign
1433 extend. */
df407dfe
AC
1434 if ((value_bitsize (toval) > 0)
1435 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1436 {
1437 LONGEST fieldval = value_as_long (fromval);
df407dfe 1438 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1439
1440 fieldval &= valmask;
ac3eeb49
MS
1441 if (!TYPE_UNSIGNED (type)
1442 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1443 fieldval |= ~valmask;
1444
1445 fromval = value_from_longest (type, fieldval);
1446 }
1447
4aac0db7
UW
1448 /* The return value is a copy of TOVAL so it shares its location
1449 information, but its contents are updated from FROMVAL. This
1450 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1451 val = value_copy (toval);
4aac0db7 1452 set_value_lazy (val, 0);
0fd88904 1453 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1454 TYPE_LENGTH (type));
4aac0db7
UW
1455
1456 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1457 in the case of pointer types. For object types, the enclosing type
1458 and embedded offset must *not* be copied: the target object refered
1459 to by TOVAL retains its original dynamic type after assignment. */
1460 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1461 {
1462 set_value_enclosing_type (val, value_enclosing_type (fromval));
1463 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1464 }
c5aa993b 1465
c906108c
SS
1466 return val;
1467}
1468
1469/* Extend a value VAL to COUNT repetitions of its type. */
1470
f23631e4
AC
1471struct value *
1472value_repeat (struct value *arg1, int count)
c906108c 1473{
f23631e4 1474 struct value *val;
c906108c
SS
1475
1476 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1477 error (_("Only values in memory can be extended with '@'."));
c906108c 1478 if (count < 1)
8a3fe4f8 1479 error (_("Invalid number %d of repetitions."), count);
c906108c 1480
4754a64e 1481 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1482
c906108c 1483 VALUE_LVAL (val) = lval_memory;
42ae5230 1484 set_value_address (val, value_address (arg1));
c906108c 1485
24e6bcee
PA
1486 read_value_memory (val, 0, value_stack (val), value_address (val),
1487 value_contents_all_raw (val),
1488 TYPE_LENGTH (value_enclosing_type (val)));
1489
c906108c
SS
1490 return val;
1491}
1492
f23631e4 1493struct value *
9df2fbc4 1494value_of_variable (struct symbol *var, const struct block *b)
c906108c 1495{
61212c0f 1496 struct frame_info *frame;
c906108c 1497
61212c0f
UW
1498 if (!symbol_read_needs_frame (var))
1499 frame = NULL;
1500 else if (!b)
1501 frame = get_selected_frame (_("No frame selected."));
1502 else
c906108c
SS
1503 {
1504 frame = block_innermost_frame (b);
1505 if (!frame)
c5aa993b 1506 {
edb3359d 1507 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1508 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1509 error (_("No frame is currently executing in block %s."),
de5ad195 1510 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1511 else
8a3fe4f8 1512 error (_("No frame is currently executing in specified block"));
c5aa993b 1513 }
c906108c
SS
1514 }
1515
8afd712c 1516 return read_var_value (var, frame);
c906108c
SS
1517}
1518
61212c0f
UW
1519struct value *
1520address_of_variable (struct symbol *var, struct block *b)
1521{
1522 struct type *type = SYMBOL_TYPE (var);
1523 struct value *val;
1524
1525 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1526 Lazy evaluation pays off here. */
61212c0f
UW
1527
1528 val = value_of_variable (var, b);
1529
1530 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1531 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1532 {
42ae5230 1533 CORE_ADDR addr = value_address (val);
a109c7c1 1534
61212c0f
UW
1535 return value_from_pointer (lookup_pointer_type (type), addr);
1536 }
1537
1538 /* Not a memory address; check what the problem was. */
1539 switch (VALUE_LVAL (val))
1540 {
1541 case lval_register:
1542 {
1543 struct frame_info *frame;
1544 const char *regname;
1545
1546 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1547 gdb_assert (frame);
1548
1549 regname = gdbarch_register_name (get_frame_arch (frame),
1550 VALUE_REGNUM (val));
1551 gdb_assert (regname && *regname);
1552
1553 error (_("Address requested for identifier "
1554 "\"%s\" which is in register $%s"),
1555 SYMBOL_PRINT_NAME (var), regname);
1556 break;
1557 }
1558
1559 default:
1560 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1561 SYMBOL_PRINT_NAME (var));
1562 break;
1563 }
1564
1565 return val;
1566}
1567
63092375
DJ
1568/* Return one if VAL does not live in target memory, but should in order
1569 to operate on it. Otherwise return zero. */
1570
1571int
1572value_must_coerce_to_target (struct value *val)
1573{
1574 struct type *valtype;
1575
1576 /* The only lval kinds which do not live in target memory. */
1577 if (VALUE_LVAL (val) != not_lval
1578 && VALUE_LVAL (val) != lval_internalvar)
1579 return 0;
1580
1581 valtype = check_typedef (value_type (val));
1582
1583 switch (TYPE_CODE (valtype))
1584 {
1585 case TYPE_CODE_ARRAY:
3cbaedff 1586 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1587 case TYPE_CODE_STRING:
1588 return 1;
1589 default:
1590 return 0;
1591 }
1592}
1593
3e43a32a
MS
1594/* Make sure that VAL lives in target memory if it's supposed to. For
1595 instance, strings are constructed as character arrays in GDB's
1596 storage, and this function copies them to the target. */
63092375
DJ
1597
1598struct value *
1599value_coerce_to_target (struct value *val)
1600{
1601 LONGEST length;
1602 CORE_ADDR addr;
1603
1604 if (!value_must_coerce_to_target (val))
1605 return val;
1606
1607 length = TYPE_LENGTH (check_typedef (value_type (val)));
1608 addr = allocate_space_in_inferior (length);
1609 write_memory (addr, value_contents (val), length);
1610 return value_at_lazy (value_type (val), addr);
1611}
1612
ac3eeb49
MS
1613/* Given a value which is an array, return a value which is a pointer
1614 to its first element, regardless of whether or not the array has a
1615 nonzero lower bound.
c906108c 1616
ac3eeb49
MS
1617 FIXME: A previous comment here indicated that this routine should
1618 be substracting the array's lower bound. It's not clear to me that
1619 this is correct. Given an array subscripting operation, it would
1620 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1621
1622 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1623
ac3eeb49
MS
1624 However I believe a more appropriate and logical place to account
1625 for the lower bound is to do so in value_subscript, essentially
1626 computing:
c906108c
SS
1627
1628 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1629
ac3eeb49
MS
1630 As further evidence consider what would happen with operations
1631 other than array subscripting, where the caller would get back a
1632 value that had an address somewhere before the actual first element
1633 of the array, and the information about the lower bound would be
581e13c1 1634 lost because of the coercion to pointer type. */
c906108c 1635
f23631e4
AC
1636struct value *
1637value_coerce_array (struct value *arg1)
c906108c 1638{
df407dfe 1639 struct type *type = check_typedef (value_type (arg1));
c906108c 1640
63092375
DJ
1641 /* If the user tries to do something requiring a pointer with an
1642 array that has not yet been pushed to the target, then this would
1643 be a good time to do so. */
1644 arg1 = value_coerce_to_target (arg1);
1645
c906108c 1646 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1647 error (_("Attempt to take address of value not located in memory."));
c906108c 1648
4478b372 1649 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1650 value_address (arg1));
c906108c
SS
1651}
1652
1653/* Given a value which is a function, return a value which is a pointer
1654 to it. */
1655
f23631e4
AC
1656struct value *
1657value_coerce_function (struct value *arg1)
c906108c 1658{
f23631e4 1659 struct value *retval;
c906108c
SS
1660
1661 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1662 error (_("Attempt to take address of value not located in memory."));
c906108c 1663
df407dfe 1664 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1665 value_address (arg1));
c906108c 1666 return retval;
c5aa993b 1667}
c906108c 1668
ac3eeb49
MS
1669/* Return a pointer value for the object for which ARG1 is the
1670 contents. */
c906108c 1671
f23631e4
AC
1672struct value *
1673value_addr (struct value *arg1)
c906108c 1674{
f23631e4 1675 struct value *arg2;
df407dfe 1676 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1677
c906108c
SS
1678 if (TYPE_CODE (type) == TYPE_CODE_REF)
1679 {
ac3eeb49
MS
1680 /* Copy the value, but change the type from (T&) to (T*). We
1681 keep the same location information, which is efficient, and
1682 allows &(&X) to get the location containing the reference. */
c906108c 1683 arg2 = value_copy (arg1);
ac3eeb49
MS
1684 deprecated_set_value_type (arg2,
1685 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1686 return arg2;
1687 }
1688 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1689 return value_coerce_function (arg1);
1690
63092375
DJ
1691 /* If this is an array that has not yet been pushed to the target,
1692 then this would be a good time to force it to memory. */
1693 arg1 = value_coerce_to_target (arg1);
1694
c906108c 1695 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1696 error (_("Attempt to take address of value not located in memory."));
c906108c 1697
581e13c1 1698 /* Get target memory address. */
df407dfe 1699 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1700 (value_address (arg1)
13c3b5f5 1701 + value_embedded_offset (arg1)));
c906108c
SS
1702
1703 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1704 full derived object's type ... */
4dfea560
DE
1705 set_value_enclosing_type (arg2,
1706 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1707 /* ... and also the relative position of the subobject in the full
1708 object. */
b44d461b 1709 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1710 return arg2;
1711}
1712
ac3eeb49
MS
1713/* Return a reference value for the object for which ARG1 is the
1714 contents. */
fb933624
DJ
1715
1716struct value *
1717value_ref (struct value *arg1)
1718{
1719 struct value *arg2;
fb933624 1720 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1721
fb933624
DJ
1722 if (TYPE_CODE (type) == TYPE_CODE_REF)
1723 return arg1;
1724
1725 arg2 = value_addr (arg1);
1726 deprecated_set_value_type (arg2, lookup_reference_type (type));
1727 return arg2;
1728}
1729
ac3eeb49
MS
1730/* Given a value of a pointer type, apply the C unary * operator to
1731 it. */
c906108c 1732
f23631e4
AC
1733struct value *
1734value_ind (struct value *arg1)
c906108c
SS
1735{
1736 struct type *base_type;
f23631e4 1737 struct value *arg2;
c906108c 1738
994b9211 1739 arg1 = coerce_array (arg1);
c906108c 1740
df407dfe 1741 base_type = check_typedef (value_type (arg1));
c906108c 1742
8cf6f0b1
TT
1743 if (VALUE_LVAL (arg1) == lval_computed)
1744 {
c8f2448a 1745 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1746
1747 if (funcs->indirect)
1748 {
1749 struct value *result = funcs->indirect (arg1);
1750
1751 if (result)
1752 return result;
1753 }
1754 }
1755
22fe0fbb 1756 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1757 {
1758 struct type *enc_type;
a109c7c1 1759
ac3eeb49
MS
1760 /* We may be pointing to something embedded in a larger object.
1761 Get the real type of the enclosing object. */
4754a64e 1762 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1763 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1764
1765 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1766 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1767 /* For functions, go through find_function_addr, which knows
1768 how to handle function descriptors. */
ac3eeb49
MS
1769 arg2 = value_at_lazy (enc_type,
1770 find_function_addr (arg1, NULL));
0d5de010 1771 else
581e13c1 1772 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1773 arg2 = value_at_lazy (enc_type,
1774 (value_as_address (arg1)
1775 - value_pointed_to_offset (arg1)));
0d5de010 1776
dfcee124 1777 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1778 }
1779
8a3fe4f8 1780 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1781 return 0; /* For lint -- never reached. */
c906108c
SS
1782}
1783\f
39d37385
PA
1784/* Create a value for an array by allocating space in GDB, copying the
1785 data into that space, and then setting up an array value.
c906108c 1786
ac3eeb49
MS
1787 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1788 is populated from the values passed in ELEMVEC.
c906108c
SS
1789
1790 The element type of the array is inherited from the type of the
1791 first element, and all elements must have the same size (though we
ac3eeb49 1792 don't currently enforce any restriction on their types). */
c906108c 1793
f23631e4
AC
1794struct value *
1795value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1796{
1797 int nelem;
1798 int idx;
1799 unsigned int typelength;
f23631e4 1800 struct value *val;
c906108c 1801 struct type *arraytype;
c906108c 1802
ac3eeb49
MS
1803 /* Validate that the bounds are reasonable and that each of the
1804 elements have the same size. */
c906108c
SS
1805
1806 nelem = highbound - lowbound + 1;
1807 if (nelem <= 0)
1808 {
8a3fe4f8 1809 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1810 }
4754a64e 1811 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1812 for (idx = 1; idx < nelem; idx++)
1813 {
4754a64e 1814 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1815 {
8a3fe4f8 1816 error (_("array elements must all be the same size"));
c906108c
SS
1817 }
1818 }
1819
e3506a9f
UW
1820 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1821 lowbound, highbound);
c906108c
SS
1822
1823 if (!current_language->c_style_arrays)
1824 {
1825 val = allocate_value (arraytype);
1826 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1827 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1828 typelength);
c906108c
SS
1829 return val;
1830 }
1831
63092375
DJ
1832 /* Allocate space to store the array, and then initialize it by
1833 copying in each element. */
c906108c 1834
63092375 1835 val = allocate_value (arraytype);
c906108c 1836 for (idx = 0; idx < nelem; idx++)
39d37385 1837 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1838 return val;
c906108c
SS
1839}
1840
6c7a06a3 1841struct value *
3b7538c0 1842value_cstring (char *ptr, int len, struct type *char_type)
6c7a06a3
TT
1843{
1844 struct value *val;
1845 int lowbound = current_language->string_lower_bound;
1846 int highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1847 struct type *stringtype
e3506a9f 1848 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1849
1850 val = allocate_value (stringtype);
1851 memcpy (value_contents_raw (val), ptr, len);
1852 return val;
1853}
1854
ac3eeb49
MS
1855/* Create a value for a string constant by allocating space in the
1856 inferior, copying the data into that space, and returning the
1857 address with type TYPE_CODE_STRING. PTR points to the string
1858 constant data; LEN is number of characters.
1859
1860 Note that string types are like array of char types with a lower
1861 bound of zero and an upper bound of LEN - 1. Also note that the
1862 string may contain embedded null bytes. */
c906108c 1863
f23631e4 1864struct value *
3b7538c0 1865value_string (char *ptr, int len, struct type *char_type)
c906108c 1866{
f23631e4 1867 struct value *val;
c906108c 1868 int lowbound = current_language->string_lower_bound;
3b7538c0 1869 int highbound = len / TYPE_LENGTH (char_type);
c906108c 1870 struct type *stringtype
e3506a9f 1871 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1872
3b7538c0
UW
1873 val = allocate_value (stringtype);
1874 memcpy (value_contents_raw (val), ptr, len);
1875 return val;
c906108c
SS
1876}
1877
c906108c 1878\f
ac3eeb49
MS
1879/* See if we can pass arguments in T2 to a function which takes
1880 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1881 a NULL-terminated vector. If some arguments need coercion of some
1882 sort, then the coerced values are written into T2. Return value is
1883 0 if the arguments could be matched, or the position at which they
1884 differ if not.
c906108c 1885
ac3eeb49
MS
1886 STATICP is nonzero if the T1 argument list came from a static
1887 member function. T2 will still include the ``this'' pointer, but
1888 it will be skipped.
c906108c
SS
1889
1890 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1891 which is the type of the instance variable. This is because we
1892 want to handle calls with objects from derived classes. This is
1893 not entirely correct: we should actually check to make sure that a
c906108c
SS
1894 requested operation is type secure, shouldn't we? FIXME. */
1895
1896static int
ad2f7632
DJ
1897typecmp (int staticp, int varargs, int nargs,
1898 struct field t1[], struct value *t2[])
c906108c
SS
1899{
1900 int i;
1901
1902 if (t2 == 0)
ac3eeb49
MS
1903 internal_error (__FILE__, __LINE__,
1904 _("typecmp: no argument list"));
ad2f7632 1905
ac3eeb49
MS
1906 /* Skip ``this'' argument if applicable. T2 will always include
1907 THIS. */
4a1970e4 1908 if (staticp)
ad2f7632
DJ
1909 t2 ++;
1910
1911 for (i = 0;
1912 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1913 i++)
c906108c 1914 {
c5aa993b 1915 struct type *tt1, *tt2;
ad2f7632 1916
c5aa993b
JM
1917 if (!t2[i])
1918 return i + 1;
ad2f7632
DJ
1919
1920 tt1 = check_typedef (t1[i].type);
df407dfe 1921 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1922
c906108c 1923 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1924 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1925 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1926 == TYPE_CODE (tt2)))
c906108c
SS
1927 {
1928 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1929 t2[i] = value_coerce_array (t2[i]);
1930 else
fb933624 1931 t2[i] = value_ref (t2[i]);
c906108c
SS
1932 continue;
1933 }
1934
802db21b
DB
1935 /* djb - 20000715 - Until the new type structure is in the
1936 place, and we can attempt things like implicit conversions,
1937 we need to do this so you can take something like a map<const
1938 char *>, and properly access map["hello"], because the
1939 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1940 and the argument will be a pointer to a char. */
1941 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1942 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1943 {
1944 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1945 }
ac3eeb49
MS
1946 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1947 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1948 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1949 {
ac3eeb49 1950 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1951 }
c5aa993b
JM
1952 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1953 continue;
ac3eeb49
MS
1954 /* Array to pointer is a `trivial conversion' according to the
1955 ARM. */
c906108c 1956
ac3eeb49
MS
1957 /* We should be doing much hairier argument matching (see
1958 section 13.2 of the ARM), but as a quick kludge, just check
1959 for the same type code. */
df407dfe 1960 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1961 return i + 1;
c906108c 1962 }
ad2f7632 1963 if (varargs || t2[i] == NULL)
c5aa993b 1964 return 0;
ad2f7632 1965 return i + 1;
c906108c
SS
1966}
1967
b1af9e97
TT
1968/* Helper class for do_search_struct_field that updates *RESULT_PTR
1969 and *LAST_BOFFSET, and possibly throws an exception if the field
1970 search has yielded ambiguous results. */
c906108c 1971
b1af9e97
TT
1972static void
1973update_search_result (struct value **result_ptr, struct value *v,
1974 int *last_boffset, int boffset,
1975 const char *name, struct type *type)
1976{
1977 if (v != NULL)
1978 {
1979 if (*result_ptr != NULL
1980 /* The result is not ambiguous if all the classes that are
1981 found occupy the same space. */
1982 && *last_boffset != boffset)
1983 error (_("base class '%s' is ambiguous in type '%s'"),
1984 name, TYPE_SAFE_NAME (type));
1985 *result_ptr = v;
1986 *last_boffset = boffset;
1987 }
1988}
c906108c 1989
b1af9e97
TT
1990/* A helper for search_struct_field. This does all the work; most
1991 arguments are as passed to search_struct_field. The result is
1992 stored in *RESULT_PTR, which must be initialized to NULL.
1993 OUTERMOST_TYPE is the type of the initial type passed to
1994 search_struct_field; this is used for error reporting when the
1995 lookup is ambiguous. */
1996
1997static void
1998do_search_struct_field (const char *name, struct value *arg1, int offset,
1999 struct type *type, int looking_for_baseclass,
2000 struct value **result_ptr,
2001 int *last_boffset,
2002 struct type *outermost_type)
c906108c
SS
2003{
2004 int i;
edf3d5f3 2005 int nbases;
c906108c
SS
2006
2007 CHECK_TYPEDEF (type);
edf3d5f3 2008 nbases = TYPE_N_BASECLASSES (type);
c906108c 2009
c5aa993b 2010 if (!looking_for_baseclass)
c906108c
SS
2011 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
2012 {
0d5cff50 2013 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 2014
db577aea 2015 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 2016 {
f23631e4 2017 struct value *v;
a109c7c1 2018
d6a843b5 2019 if (field_is_static (&TYPE_FIELD (type, i)))
2c2738a0
DC
2020 {
2021 v = value_static_field (type, i);
2022 if (v == 0)
3e43a32a
MS
2023 error (_("field %s is nonexistent or "
2024 "has been optimized out"),
2c2738a0
DC
2025 name);
2026 }
c906108c 2027 else
b1af9e97
TT
2028 v = value_primitive_field (arg1, offset, i, type);
2029 *result_ptr = v;
2030 return;
c906108c
SS
2031 }
2032
2033 if (t_field_name
2034 && (t_field_name[0] == '\0'
2035 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 2036 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
2037 {
2038 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 2039
c906108c
SS
2040 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
2041 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
2042 {
ac3eeb49
MS
2043 /* Look for a match through the fields of an anonymous
2044 union, or anonymous struct. C++ provides anonymous
2045 unions.
c906108c 2046
1b831c93
AC
2047 In the GNU Chill (now deleted from GDB)
2048 implementation of variant record types, each
2049 <alternative field> has an (anonymous) union type,
2050 each member of the union represents a <variant
2051 alternative>. Each <variant alternative> is
2052 represented as a struct, with a member for each
2053 <variant field>. */
c5aa993b 2054
b1af9e97 2055 struct value *v = NULL;
c906108c
SS
2056 int new_offset = offset;
2057
db034ac5
AC
2058 /* This is pretty gross. In G++, the offset in an
2059 anonymous union is relative to the beginning of the
1b831c93
AC
2060 enclosing struct. In the GNU Chill (now deleted
2061 from GDB) implementation of variant records, the
2062 bitpos is zero in an anonymous union field, so we
ac3eeb49 2063 have to add the offset of the union here. */
c906108c
SS
2064 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
2065 || (TYPE_NFIELDS (field_type) > 0
2066 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
2067 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
2068
b1af9e97
TT
2069 do_search_struct_field (name, arg1, new_offset,
2070 field_type,
2071 looking_for_baseclass, &v,
2072 last_boffset,
2073 outermost_type);
c906108c 2074 if (v)
b1af9e97
TT
2075 {
2076 *result_ptr = v;
2077 return;
2078 }
c906108c
SS
2079 }
2080 }
2081 }
2082
c5aa993b 2083 for (i = 0; i < nbases; i++)
c906108c 2084 {
b1af9e97 2085 struct value *v = NULL;
c906108c 2086 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
2087 /* If we are looking for baseclasses, this is what we get when
2088 we hit them. But it could happen that the base part's member
2089 name is not yet filled in. */
c906108c
SS
2090 int found_baseclass = (looking_for_baseclass
2091 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
2092 && (strcmp_iw (name,
2093 TYPE_BASECLASS_NAME (type,
2094 i)) == 0));
b1af9e97 2095 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
2096
2097 if (BASETYPE_VIA_VIRTUAL (type, i))
2098 {
3e3d7139 2099 struct value *v2;
c906108c
SS
2100
2101 boffset = baseclass_offset (type, i,
8af8e3bc
PA
2102 value_contents_for_printing (arg1),
2103 value_embedded_offset (arg1) + offset,
2104 value_address (arg1),
2105 arg1);
c906108c 2106
ac3eeb49 2107 /* The virtual base class pointer might have been clobbered
581e13c1 2108 by the user program. Make sure that it still points to a
ac3eeb49 2109 valid memory location. */
c906108c 2110
1a334831
TT
2111 boffset += value_embedded_offset (arg1) + offset;
2112 if (boffset < 0
2113 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
2114 {
2115 CORE_ADDR base_addr;
c5aa993b 2116
3e3d7139 2117 v2 = allocate_value (basetype);
42ae5230 2118 base_addr = value_address (arg1) + boffset;
ac3eeb49
MS
2119 if (target_read_memory (base_addr,
2120 value_contents_raw (v2),
c906108c 2121 TYPE_LENGTH (basetype)) != 0)
8a3fe4f8 2122 error (_("virtual baseclass botch"));
c906108c 2123 VALUE_LVAL (v2) = lval_memory;
42ae5230 2124 set_value_address (v2, base_addr);
c906108c
SS
2125 }
2126 else
2127 {
1a334831
TT
2128 v2 = value_copy (arg1);
2129 deprecated_set_value_type (v2, basetype);
2130 set_value_embedded_offset (v2, boffset);
c906108c
SS
2131 }
2132
2133 if (found_baseclass)
b1af9e97
TT
2134 v = v2;
2135 else
2136 {
2137 do_search_struct_field (name, v2, 0,
2138 TYPE_BASECLASS (type, i),
2139 looking_for_baseclass,
2140 result_ptr, last_boffset,
2141 outermost_type);
2142 }
c906108c
SS
2143 }
2144 else if (found_baseclass)
2145 v = value_primitive_field (arg1, offset, i, type);
2146 else
b1af9e97
TT
2147 {
2148 do_search_struct_field (name, arg1,
2149 offset + TYPE_BASECLASS_BITPOS (type,
2150 i) / 8,
2151 basetype, looking_for_baseclass,
2152 result_ptr, last_boffset,
2153 outermost_type);
2154 }
2155
2156 update_search_result (result_ptr, v, last_boffset,
2157 boffset, name, outermost_type);
c906108c 2158 }
b1af9e97
TT
2159}
2160
2161/* Helper function used by value_struct_elt to recurse through
2162 baseclasses. Look for a field NAME in ARG1. Adjust the address of
2163 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2164 TYPE. If found, return value, else return NULL.
2165
2166 If LOOKING_FOR_BASECLASS, then instead of looking for struct
2167 fields, look for a baseclass named NAME. */
2168
2169static struct value *
2170search_struct_field (const char *name, struct value *arg1, int offset,
2171 struct type *type, int looking_for_baseclass)
2172{
2173 struct value *result = NULL;
2174 int boffset = 0;
2175
2176 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
2177 &result, &boffset, type);
2178 return result;
c906108c
SS
2179}
2180
ac3eeb49 2181/* Helper function used by value_struct_elt to recurse through
581e13c1 2182 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
2183 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2184 TYPE.
2185
2186 If found, return value, else if name matched and args not return
2187 (value) -1, else return NULL. */
c906108c 2188
f23631e4 2189static struct value *
714f19d5 2190search_struct_method (const char *name, struct value **arg1p,
f23631e4 2191 struct value **args, int offset,
aa1ee363 2192 int *static_memfuncp, struct type *type)
c906108c
SS
2193{
2194 int i;
f23631e4 2195 struct value *v;
c906108c
SS
2196 int name_matched = 0;
2197 char dem_opname[64];
2198
2199 CHECK_TYPEDEF (type);
2200 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
2201 {
0d5cff50 2202 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2203
581e13c1 2204 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
2205 if (strncmp (t_field_name, "__", 2) == 0 ||
2206 strncmp (t_field_name, "op", 2) == 0 ||
2207 strncmp (t_field_name, "type", 4) == 0)
c906108c 2208 {
c5aa993b
JM
2209 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2210 t_field_name = dem_opname;
2211 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2212 t_field_name = dem_opname;
c906108c 2213 }
db577aea 2214 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2215 {
2216 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2217 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2218
a109c7c1 2219 name_matched = 1;
de17c821 2220 check_stub_method_group (type, i);
c906108c 2221 if (j > 0 && args == 0)
3e43a32a
MS
2222 error (_("cannot resolve overloaded method "
2223 "`%s': no arguments supplied"), name);
acf5ed49 2224 else if (j == 0 && args == 0)
c906108c 2225 {
acf5ed49
DJ
2226 v = value_fn_field (arg1p, f, j, type, offset);
2227 if (v != NULL)
2228 return v;
c906108c 2229 }
acf5ed49
DJ
2230 else
2231 while (j >= 0)
2232 {
acf5ed49 2233 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2234 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2235 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2236 TYPE_FN_FIELD_ARGS (f, j), args))
2237 {
2238 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2239 return value_virtual_fn_field (arg1p, f, j,
2240 type, offset);
2241 if (TYPE_FN_FIELD_STATIC_P (f, j)
2242 && static_memfuncp)
acf5ed49
DJ
2243 *static_memfuncp = 1;
2244 v = value_fn_field (arg1p, f, j, type, offset);
2245 if (v != NULL)
2246 return v;
2247 }
2248 j--;
2249 }
c906108c
SS
2250 }
2251 }
2252
2253 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2254 {
2255 int base_offset;
8af8e3bc
PA
2256 int skip = 0;
2257 int this_offset;
c906108c
SS
2258
2259 if (BASETYPE_VIA_VIRTUAL (type, i))
2260 {
086280be 2261 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2262 struct value *base_val;
086280be
UW
2263 const gdb_byte *base_valaddr;
2264
2265 /* The virtual base class pointer might have been
581e13c1 2266 clobbered by the user program. Make sure that it
086280be
UW
2267 still points to a valid memory location. */
2268
2269 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2270 {
6c18f3e0
SP
2271 gdb_byte *tmp;
2272 struct cleanup *back_to;
2273 CORE_ADDR address;
2274
2275 tmp = xmalloc (TYPE_LENGTH (baseclass));
2276 back_to = make_cleanup (xfree, tmp);
2277 address = value_address (*arg1p);
a109c7c1 2278
8af8e3bc 2279 if (target_read_memory (address + offset,
086280be
UW
2280 tmp, TYPE_LENGTH (baseclass)) != 0)
2281 error (_("virtual baseclass botch"));
8af8e3bc
PA
2282
2283 base_val = value_from_contents_and_address (baseclass,
2284 tmp,
2285 address + offset);
2286 base_valaddr = value_contents_for_printing (base_val);
2287 this_offset = 0;
6c18f3e0 2288 do_cleanups (back_to);
c5aa993b
JM
2289 }
2290 else
8af8e3bc
PA
2291 {
2292 base_val = *arg1p;
2293 base_valaddr = value_contents_for_printing (*arg1p);
2294 this_offset = offset;
2295 }
c5aa993b 2296
086280be 2297 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2298 this_offset, value_address (base_val),
2299 base_val);
c5aa993b 2300 }
c906108c
SS
2301 else
2302 {
2303 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2304 }
c906108c
SS
2305 v = search_struct_method (name, arg1p, args, base_offset + offset,
2306 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2307 if (v == (struct value *) - 1)
c906108c
SS
2308 {
2309 name_matched = 1;
2310 }
2311 else if (v)
2312 {
ac3eeb49
MS
2313 /* FIXME-bothner: Why is this commented out? Why is it here? */
2314 /* *arg1p = arg1_tmp; */
c906108c 2315 return v;
c5aa993b 2316 }
c906108c 2317 }
c5aa993b 2318 if (name_matched)
f23631e4 2319 return (struct value *) - 1;
c5aa993b
JM
2320 else
2321 return NULL;
c906108c
SS
2322}
2323
2324/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2325 extract the component named NAME from the ultimate target
2326 structure/union and return it as a value with its appropriate type.
c906108c
SS
2327 ERR is used in the error message if *ARGP's type is wrong.
2328
2329 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2330 an appropriate method. Also, handle derived types.
c906108c
SS
2331
2332 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2333 where the truthvalue of whether the function that was resolved was
2334 a static member function or not is stored.
2335
ac3eeb49
MS
2336 ERR is an error message to be printed in case the field is not
2337 found. */
c906108c 2338
f23631e4
AC
2339struct value *
2340value_struct_elt (struct value **argp, struct value **args,
714f19d5 2341 const char *name, int *static_memfuncp, const char *err)
c906108c 2342{
52f0bd74 2343 struct type *t;
f23631e4 2344 struct value *v;
c906108c 2345
994b9211 2346 *argp = coerce_array (*argp);
c906108c 2347
df407dfe 2348 t = check_typedef (value_type (*argp));
c906108c
SS
2349
2350 /* Follow pointers until we get to a non-pointer. */
2351
2352 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2353 {
2354 *argp = value_ind (*argp);
2355 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2356 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2357 *argp = coerce_array (*argp);
df407dfe 2358 t = check_typedef (value_type (*argp));
c906108c
SS
2359 }
2360
c5aa993b 2361 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2362 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2363 error (_("Attempt to extract a component of a value that is not a %s."),
2364 err);
c906108c
SS
2365
2366 /* Assume it's not, unless we see that it is. */
2367 if (static_memfuncp)
c5aa993b 2368 *static_memfuncp = 0;
c906108c
SS
2369
2370 if (!args)
2371 {
2372 /* if there are no arguments ...do this... */
2373
ac3eeb49
MS
2374 /* Try as a field first, because if we succeed, there is less
2375 work to be done. */
c906108c
SS
2376 v = search_struct_field (name, *argp, 0, t, 0);
2377 if (v)
2378 return v;
2379
2380 /* C++: If it was not found as a data field, then try to
7b83ea04 2381 return it as a pointer to a method. */
ac3eeb49
MS
2382 v = search_struct_method (name, argp, args, 0,
2383 static_memfuncp, t);
c906108c 2384
f23631e4 2385 if (v == (struct value *) - 1)
55b39184 2386 error (_("Cannot take address of method %s."), name);
c906108c
SS
2387 else if (v == 0)
2388 {
2389 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2390 error (_("There is no member or method named %s."), name);
c906108c 2391 else
8a3fe4f8 2392 error (_("There is no member named %s."), name);
c906108c
SS
2393 }
2394 return v;
2395 }
2396
ac3eeb49
MS
2397 v = search_struct_method (name, argp, args, 0,
2398 static_memfuncp, t);
7168a814 2399
f23631e4 2400 if (v == (struct value *) - 1)
c906108c 2401 {
3e43a32a
MS
2402 error (_("One of the arguments you tried to pass to %s could not "
2403 "be converted to what the function wants."), name);
c906108c
SS
2404 }
2405 else if (v == 0)
2406 {
ac3eeb49
MS
2407 /* See if user tried to invoke data as function. If so, hand it
2408 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2409 gdb should give an error. */
c906108c 2410 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2411 /* If we found an ordinary field, then it is not a method call.
2412 So, treat it as if it were a static member function. */
2413 if (v && static_memfuncp)
2414 *static_memfuncp = 1;
c906108c
SS
2415 }
2416
2417 if (!v)
79afc5ef
SW
2418 throw_error (NOT_FOUND_ERROR,
2419 _("Structure has no component named %s."), name);
c906108c
SS
2420 return v;
2421}
2422
ac3eeb49 2423/* Search through the methods of an object (and its bases) to find a
cfe9eade 2424 specified method. Return the pointer to the fn_field list of
ac3eeb49
MS
2425 overloaded instances.
2426
2427 Helper function for value_find_oload_list.
2428 ARGP is a pointer to a pointer to a value (the object).
2429 METHOD is a string containing the method name.
2430 OFFSET is the offset within the value.
2431 TYPE is the assumed type of the object.
2432 NUM_FNS is the number of overloaded instances.
2433 BASETYPE is set to the actual type of the subobject where the
2434 method is found.
581e13c1 2435 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2436
7a292a7a 2437static struct fn_field *
714f19d5 2438find_method_list (struct value **argp, const char *method,
ac3eeb49 2439 int offset, struct type *type, int *num_fns,
fba45db2 2440 struct type **basetype, int *boffset)
c906108c
SS
2441{
2442 int i;
c5aa993b 2443 struct fn_field *f;
c906108c
SS
2444 CHECK_TYPEDEF (type);
2445
2446 *num_fns = 0;
2447
ac3eeb49 2448 /* First check in object itself. */
c5aa993b 2449 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c906108c 2450 {
ac3eeb49 2451 /* pai: FIXME What about operators and type conversions? */
0d5cff50 2452 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2453
db577aea 2454 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
c5aa993b 2455 {
4a1970e4
DJ
2456 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2457 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
4a1970e4
DJ
2458
2459 *num_fns = len;
c5aa993b
JM
2460 *basetype = type;
2461 *boffset = offset;
4a1970e4 2462
de17c821
DJ
2463 /* Resolve any stub methods. */
2464 check_stub_method_group (type, i);
4a1970e4
DJ
2465
2466 return f;
c5aa993b
JM
2467 }
2468 }
2469
ac3eeb49 2470 /* Not found in object, check in base subobjects. */
c906108c
SS
2471 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2472 {
2473 int base_offset;
a109c7c1 2474
c906108c
SS
2475 if (BASETYPE_VIA_VIRTUAL (type, i))
2476 {
086280be 2477 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2478 value_contents_for_printing (*argp),
2479 value_offset (*argp) + offset,
2480 value_address (*argp), *argp);
c5aa993b 2481 }
ac3eeb49
MS
2482 else /* Non-virtual base, simply use bit position from debug
2483 info. */
c906108c
SS
2484 {
2485 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2486 }
c906108c 2487 f = find_method_list (argp, method, base_offset + offset,
ac3eeb49
MS
2488 TYPE_BASECLASS (type, i), num_fns,
2489 basetype, boffset);
c906108c 2490 if (f)
c5aa993b 2491 return f;
c906108c 2492 }
c5aa993b 2493 return NULL;
c906108c
SS
2494}
2495
2496/* Return the list of overloaded methods of a specified name.
ac3eeb49
MS
2497
2498 ARGP is a pointer to a pointer to a value (the object).
2499 METHOD is the method name.
2500 OFFSET is the offset within the value contents.
2501 NUM_FNS is the number of overloaded instances.
2502 BASETYPE is set to the type of the base subobject that defines the
2503 method.
581e13c1 2504 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2505
6598ed07 2506static struct fn_field *
714f19d5 2507value_find_oload_method_list (struct value **argp, const char *method,
ac3eeb49
MS
2508 int offset, int *num_fns,
2509 struct type **basetype, int *boffset)
c906108c 2510{
c5aa993b 2511 struct type *t;
c906108c 2512
df407dfe 2513 t = check_typedef (value_type (*argp));
c906108c 2514
ac3eeb49 2515 /* Code snarfed from value_struct_elt. */
c906108c
SS
2516 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2517 {
2518 *argp = value_ind (*argp);
2519 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2520 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2521 *argp = coerce_array (*argp);
df407dfe 2522 t = check_typedef (value_type (*argp));
c906108c 2523 }
c5aa993b 2524
c5aa993b
JM
2525 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2526 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2527 error (_("Attempt to extract a component of a "
2528 "value that is not a struct or union"));
c5aa993b 2529
ac3eeb49
MS
2530 return find_method_list (argp, method, 0, t, num_fns,
2531 basetype, boffset);
c906108c
SS
2532}
2533
da096638 2534/* Given an array of arguments (ARGS) (which includes an
c906108c
SS
2535 entry for "this" in the case of C++ methods), the number of
2536 arguments NARGS, the NAME of a function whether it's a method or
2537 not (METHOD), and the degree of laxness (LAX) in conforming to
2538 overload resolution rules in ANSI C++, find the best function that
2539 matches on the argument types according to the overload resolution
2540 rules.
2541
4c3376c8
SW
2542 METHOD can be one of three values:
2543 NON_METHOD for non-member functions.
2544 METHOD: for member functions.
2545 BOTH: used for overload resolution of operators where the
2546 candidates are expected to be either member or non member
581e13c1 2547 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2548 (representing 'this') is expected to be a reference to the
2549 target object, and will be dereferenced when attempting the
2550 non-member search.
2551
c906108c
SS
2552 In the case of class methods, the parameter OBJ is an object value
2553 in which to search for overloaded methods.
2554
2555 In the case of non-method functions, the parameter FSYM is a symbol
2556 corresponding to one of the overloaded functions.
2557
2558 Return value is an integer: 0 -> good match, 10 -> debugger applied
2559 non-standard coercions, 100 -> incompatible.
2560
2561 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2562 If a non-method is being searched for, SYMP will hold the symbol
2563 for it.
c906108c
SS
2564
2565 If a method is being searched for, and it is a static method,
2566 then STATICP will point to a non-zero value.
2567
7322dca9
SW
2568 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2569 ADL overload candidates when performing overload resolution for a fully
2570 qualified name.
2571
c906108c
SS
2572 Note: This function does *not* check the value of
2573 overload_resolution. Caller must check it to see whether overload
581e13c1 2574 resolution is permitted. */
c906108c
SS
2575
2576int
da096638 2577find_overload_match (struct value **args, int nargs,
4c3376c8
SW
2578 const char *name, enum oload_search_type method,
2579 int lax, struct value **objp, struct symbol *fsym,
ac3eeb49 2580 struct value **valp, struct symbol **symp,
7322dca9 2581 int *staticp, const int no_adl)
c906108c 2582{
7f8c9282 2583 struct value *obj = (objp ? *objp : NULL);
da096638 2584 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2585 /* Index of best overloaded function. */
4c3376c8
SW
2586 int func_oload_champ = -1;
2587 int method_oload_champ = -1;
2588
ac3eeb49 2589 /* The measure for the current best match. */
4c3376c8
SW
2590 struct badness_vector *method_badness = NULL;
2591 struct badness_vector *func_badness = NULL;
2592
f23631e4 2593 struct value *temp = obj;
ac3eeb49
MS
2594 /* For methods, the list of overloaded methods. */
2595 struct fn_field *fns_ptr = NULL;
2596 /* For non-methods, the list of overloaded function symbols. */
2597 struct symbol **oload_syms = NULL;
2598 /* Number of overloaded instances being considered. */
2599 int num_fns = 0;
c5aa993b 2600 struct type *basetype = NULL;
c906108c 2601 int boffset;
7322dca9
SW
2602
2603 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2604
8d577d32 2605 const char *obj_type_name = NULL;
7322dca9 2606 const char *func_name = NULL;
8d577d32 2607 enum oload_classification match_quality;
4c3376c8
SW
2608 enum oload_classification method_match_quality = INCOMPATIBLE;
2609 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2610
ac3eeb49 2611 /* Get the list of overloaded methods or functions. */
4c3376c8 2612 if (method == METHOD || method == BOTH)
c906108c 2613 {
a2ca50ae 2614 gdb_assert (obj);
94af9270
KS
2615
2616 /* OBJ may be a pointer value rather than the object itself. */
2617 obj = coerce_ref (obj);
2618 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2619 obj = coerce_ref (value_ind (obj));
df407dfe 2620 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2621
2622 /* First check whether this is a data member, e.g. a pointer to
2623 a function. */
2624 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2625 {
2626 *valp = search_struct_field (name, obj, 0,
2627 check_typedef (value_type (obj)), 0);
2628 if (*valp)
2629 {
2630 *staticp = 1;
f748fb40 2631 do_cleanups (all_cleanups);
94af9270
KS
2632 return 0;
2633 }
2634 }
c906108c 2635
4c3376c8 2636 /* Retrieve the list of methods with the name NAME. */
ac3eeb49
MS
2637 fns_ptr = value_find_oload_method_list (&temp, name,
2638 0, &num_fns,
c5aa993b 2639 &basetype, &boffset);
4c3376c8
SW
2640 /* If this is a method only search, and no methods were found
2641 the search has faild. */
2642 if (method == METHOD && (!fns_ptr || !num_fns))
8a3fe4f8 2643 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2644 obj_type_name,
2645 (obj_type_name && *obj_type_name) ? "::" : "",
2646 name);
4a1970e4 2647 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2648 been resolved by find_method_list via
2649 value_find_oload_method_list above. */
4c3376c8
SW
2650 if (fns_ptr)
2651 {
2652 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
da096638 2653 method_oload_champ = find_oload_champ (args, nargs, method,
4c3376c8
SW
2654 num_fns, fns_ptr,
2655 oload_syms, &method_badness);
2656
2657 method_match_quality =
2658 classify_oload_match (method_badness, nargs,
2659 oload_method_static (method, fns_ptr,
2660 method_oload_champ));
2661
2662 make_cleanup (xfree, method_badness);
2663 }
2664
c906108c 2665 }
4c3376c8
SW
2666
2667 if (method == NON_METHOD || method == BOTH)
c906108c 2668 {
7322dca9 2669 const char *qualified_name = NULL;
c906108c 2670
b021a221
MS
2671 /* If the overload match is being search for both as a method
2672 and non member function, the first argument must now be
2673 dereferenced. */
4c3376c8 2674 if (method == BOTH)
2b214ea6 2675 args[0] = value_ind (args[0]);
4c3376c8 2676
7322dca9
SW
2677 if (fsym)
2678 {
2679 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2680
2681 /* If we have a function with a C++ name, try to extract just
2682 the function part. Do not try this for non-functions (e.g.
2683 function pointers). */
2684 if (qualified_name
3e43a32a
MS
2685 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2686 == TYPE_CODE_FUNC)
7322dca9
SW
2687 {
2688 char *temp;
2689
2690 temp = cp_func_name (qualified_name);
2691
2692 /* If cp_func_name did not remove anything, the name of the
2693 symbol did not include scope or argument types - it was
2694 probably a C-style function. */
2695 if (temp)
2696 {
2697 make_cleanup (xfree, temp);
2698 if (strcmp (temp, qualified_name) == 0)
2699 func_name = NULL;
2700 else
2701 func_name = temp;
2702 }
2703 }
2704 }
2705 else
94af9270 2706 {
7322dca9
SW
2707 func_name = name;
2708 qualified_name = name;
94af9270 2709 }
d9639e13 2710
94af9270
KS
2711 /* If there was no C++ name, this must be a C-style function or
2712 not a function at all. Just return the same symbol. Do the
2713 same if cp_func_name fails for some reason. */
8d577d32 2714 if (func_name == NULL)
7b83ea04 2715 {
917317f4 2716 *symp = fsym;
5fe41fbf 2717 do_cleanups (all_cleanups);
7b83ea04
AC
2718 return 0;
2719 }
917317f4 2720
da096638 2721 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2722 func_name,
2723 qualified_name,
2724 &oload_syms,
2725 &func_badness,
2726 no_adl);
8d577d32 2727
4c3376c8
SW
2728 if (func_oload_champ >= 0)
2729 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2730
2731 make_cleanup (xfree, oload_syms);
2732 make_cleanup (xfree, func_badness);
8d577d32
DC
2733 }
2734
7322dca9 2735 /* Did we find a match ? */
4c3376c8 2736 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2737 throw_error (NOT_FOUND_ERROR,
2738 _("No symbol \"%s\" in current context."),
2739 name);
8d577d32 2740
4c3376c8
SW
2741 /* If we have found both a method match and a function
2742 match, find out which one is better, and calculate match
2743 quality. */
2744 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2745 {
2746 switch (compare_badness (func_badness, method_badness))
2747 {
2748 case 0: /* Top two contenders are equally good. */
b021a221
MS
2749 /* FIXME: GDB does not support the general ambiguous case.
2750 All candidates should be collected and presented the
2751 user. */
4c3376c8
SW
2752 error (_("Ambiguous overload resolution"));
2753 break;
2754 case 1: /* Incomparable top contenders. */
2755 /* This is an error incompatible candidates
2756 should not have been proposed. */
3e43a32a
MS
2757 error (_("Internal error: incompatible "
2758 "overload candidates proposed"));
4c3376c8
SW
2759 break;
2760 case 2: /* Function champion. */
2761 method_oload_champ = -1;
2762 match_quality = func_match_quality;
2763 break;
2764 case 3: /* Method champion. */
2765 func_oload_champ = -1;
2766 match_quality = method_match_quality;
2767 break;
2768 default:
2769 error (_("Internal error: unexpected overload comparison result"));
2770 break;
2771 }
2772 }
2773 else
2774 {
2775 /* We have either a method match or a function match. */
2776 if (method_oload_champ >= 0)
2777 match_quality = method_match_quality;
2778 else
2779 match_quality = func_match_quality;
2780 }
8d577d32
DC
2781
2782 if (match_quality == INCOMPATIBLE)
2783 {
4c3376c8 2784 if (method == METHOD)
8a3fe4f8 2785 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2786 obj_type_name,
2787 (obj_type_name && *obj_type_name) ? "::" : "",
2788 name);
2789 else
8a3fe4f8 2790 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2791 func_name);
2792 }
2793 else if (match_quality == NON_STANDARD)
2794 {
4c3376c8 2795 if (method == METHOD)
3e43a32a
MS
2796 warning (_("Using non-standard conversion to match "
2797 "method %s%s%s to supplied arguments"),
8d577d32
DC
2798 obj_type_name,
2799 (obj_type_name && *obj_type_name) ? "::" : "",
2800 name);
2801 else
3e43a32a
MS
2802 warning (_("Using non-standard conversion to match "
2803 "function %s to supplied arguments"),
8d577d32
DC
2804 func_name);
2805 }
2806
4c3376c8
SW
2807 if (staticp != NULL)
2808 *staticp = oload_method_static (method, fns_ptr, method_oload_champ);
2809
2810 if (method_oload_champ >= 0)
8d577d32 2811 {
4c3376c8
SW
2812 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2813 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2814 basetype, boffset);
8d577d32 2815 else
4c3376c8 2816 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2817 basetype, boffset);
8d577d32
DC
2818 }
2819 else
4c3376c8 2820 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2821
2822 if (objp)
2823 {
a4295225 2824 struct type *temp_type = check_typedef (value_type (temp));
da096638 2825 struct type *objtype = check_typedef (obj_type);
a109c7c1 2826
a4295225 2827 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2828 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2829 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2830 {
2831 temp = value_addr (temp);
2832 }
2833 *objp = temp;
2834 }
7322dca9
SW
2835
2836 do_cleanups (all_cleanups);
8d577d32
DC
2837
2838 switch (match_quality)
2839 {
2840 case INCOMPATIBLE:
2841 return 100;
2842 case NON_STANDARD:
2843 return 10;
2844 default: /* STANDARD */
2845 return 0;
2846 }
2847}
2848
2849/* Find the best overload match, searching for FUNC_NAME in namespaces
2850 contained in QUALIFIED_NAME until it either finds a good match or
2851 runs out of namespaces. It stores the overloaded functions in
2852 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2853 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2854 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2855 performned. */
8d577d32
DC
2856
2857static int
da096638 2858find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2859 const char *func_name,
2860 const char *qualified_name,
2861 struct symbol ***oload_syms,
7322dca9
SW
2862 struct badness_vector **oload_champ_bv,
2863 const int no_adl)
8d577d32
DC
2864{
2865 int oload_champ;
2866
da096638 2867 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2868 func_name,
2869 qualified_name, 0,
2870 oload_syms, oload_champ_bv,
7322dca9
SW
2871 &oload_champ,
2872 no_adl);
8d577d32
DC
2873
2874 return oload_champ;
2875}
2876
2877/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2878 how deep we've looked for namespaces, and the champ is stored in
2879 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2880 if it isn't. Other arguments are the same as in
2881 find_oload_champ_namespace
8d577d32
DC
2882
2883 It is the caller's responsibility to free *OLOAD_SYMS and
2884 *OLOAD_CHAMP_BV. */
2885
2886static int
da096638 2887find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2888 const char *func_name,
2889 const char *qualified_name,
2890 int namespace_len,
2891 struct symbol ***oload_syms,
2892 struct badness_vector **oload_champ_bv,
7322dca9
SW
2893 int *oload_champ,
2894 const int no_adl)
8d577d32
DC
2895{
2896 int next_namespace_len = namespace_len;
2897 int searched_deeper = 0;
2898 int num_fns = 0;
2899 struct cleanup *old_cleanups;
2900 int new_oload_champ;
2901 struct symbol **new_oload_syms;
2902 struct badness_vector *new_oload_champ_bv;
2903 char *new_namespace;
2904
2905 if (next_namespace_len != 0)
2906 {
2907 gdb_assert (qualified_name[next_namespace_len] == ':');
2908 next_namespace_len += 2;
c906108c 2909 }
ac3eeb49
MS
2910 next_namespace_len +=
2911 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2912
2913 /* Initialize these to values that can safely be xfree'd. */
2914 *oload_syms = NULL;
2915 *oload_champ_bv = NULL;
c5aa993b 2916
581e13c1 2917 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2918 If we get a good match there, use it. */
8d577d32
DC
2919
2920 if (qualified_name[next_namespace_len] == ':')
2921 {
2922 searched_deeper = 1;
2923
da096638 2924 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2925 func_name, qualified_name,
2926 next_namespace_len,
2927 oload_syms, oload_champ_bv,
7322dca9 2928 oload_champ, no_adl))
8d577d32
DC
2929 {
2930 return 1;
2931 }
2932 };
2933
2934 /* If we reach here, either we're in the deepest namespace or we
2935 didn't find a good match in a deeper namespace. But, in the
2936 latter case, we still have a bad match in a deeper namespace;
2937 note that we might not find any match at all in the current
2938 namespace. (There's always a match in the deepest namespace,
2939 because this overload mechanism only gets called if there's a
2940 function symbol to start off with.) */
2941
2942 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2943 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2944 new_namespace = alloca (namespace_len + 1);
2945 strncpy (new_namespace, qualified_name, namespace_len);
2946 new_namespace[namespace_len] = '\0';
2947 new_oload_syms = make_symbol_overload_list (func_name,
2948 new_namespace);
7322dca9
SW
2949
2950 /* If we have reached the deepest level perform argument
2951 determined lookup. */
2952 if (!searched_deeper && !no_adl)
da096638
KS
2953 {
2954 int ix;
2955 struct type **arg_types;
2956
2957 /* Prepare list of argument types for overload resolution. */
2958 arg_types = (struct type **)
2959 alloca (nargs * (sizeof (struct type *)));
2960 for (ix = 0; ix < nargs; ix++)
2961 arg_types[ix] = value_type (args[ix]);
2962 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2963 }
7322dca9 2964
8d577d32
DC
2965 while (new_oload_syms[num_fns])
2966 ++num_fns;
2967
da096638 2968 new_oload_champ = find_oload_champ (args, nargs, 0, num_fns,
8d577d32
DC
2969 NULL, new_oload_syms,
2970 &new_oload_champ_bv);
2971
2972 /* Case 1: We found a good match. Free earlier matches (if any),
2973 and return it. Case 2: We didn't find a good match, but we're
2974 not the deepest function. Then go with the bad match that the
2975 deeper function found. Case 3: We found a bad match, and we're
2976 the deepest function. Then return what we found, even though
2977 it's a bad match. */
2978
2979 if (new_oload_champ != -1
2980 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2981 {
2982 *oload_syms = new_oload_syms;
2983 *oload_champ = new_oload_champ;
2984 *oload_champ_bv = new_oload_champ_bv;
2985 do_cleanups (old_cleanups);
2986 return 1;
2987 }
2988 else if (searched_deeper)
2989 {
2990 xfree (new_oload_syms);
2991 xfree (new_oload_champ_bv);
2992 discard_cleanups (old_cleanups);
2993 return 0;
2994 }
2995 else
2996 {
8d577d32
DC
2997 *oload_syms = new_oload_syms;
2998 *oload_champ = new_oload_champ;
2999 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 3000 do_cleanups (old_cleanups);
8d577d32
DC
3001 return 0;
3002 }
3003}
3004
da096638 3005/* Look for a function to take NARGS args of ARGS. Find
8d577d32
DC
3006 the best match from among the overloaded methods or functions
3007 (depending on METHOD) given by FNS_PTR or OLOAD_SYMS, respectively.
3008 The number of methods/functions in the list is given by NUM_FNS.
3009 Return the index of the best match; store an indication of the
3010 quality of the match in OLOAD_CHAMP_BV.
3011
3012 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
3013
3014static int
da096638 3015find_oload_champ (struct value **args, int nargs, int method,
8d577d32
DC
3016 int num_fns, struct fn_field *fns_ptr,
3017 struct symbol **oload_syms,
3018 struct badness_vector **oload_champ_bv)
3019{
3020 int ix;
ac3eeb49
MS
3021 /* A measure of how good an overloaded instance is. */
3022 struct badness_vector *bv;
3023 /* Index of best overloaded function. */
3024 int oload_champ = -1;
3025 /* Current ambiguity state for overload resolution. */
3026 int oload_ambiguous = 0;
3027 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32
DC
3028
3029 *oload_champ_bv = NULL;
c906108c 3030
ac3eeb49 3031 /* Consider each candidate in turn. */
c906108c
SS
3032 for (ix = 0; ix < num_fns; ix++)
3033 {
8d577d32
DC
3034 int jj;
3035 int static_offset = oload_method_static (method, fns_ptr, ix);
3036 int nparms;
3037 struct type **parm_types;
3038
db577aea
AC
3039 if (method)
3040 {
ad2f7632 3041 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
db577aea
AC
3042 }
3043 else
3044 {
ac3eeb49
MS
3045 /* If it's not a method, this is the proper place. */
3046 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
db577aea 3047 }
c906108c 3048
ac3eeb49
MS
3049 /* Prepare array of parameter types. */
3050 parm_types = (struct type **)
3051 xmalloc (nparms * (sizeof (struct type *)));
c906108c 3052 for (jj = 0; jj < nparms; jj++)
db577aea 3053 parm_types[jj] = (method
ad2f7632 3054 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
ac3eeb49
MS
3055 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
3056 jj));
c906108c 3057
ac3eeb49
MS
3058 /* Compare parameter types to supplied argument types. Skip
3059 THIS for static methods. */
3060 bv = rank_function (parm_types, nparms,
da096638 3061 args + static_offset,
4a1970e4 3062 nargs - static_offset);
c5aa993b 3063
8d577d32 3064 if (!*oload_champ_bv)
c5aa993b 3065 {
8d577d32 3066 *oload_champ_bv = bv;
c5aa993b 3067 oload_champ = 0;
c5aa993b 3068 }
ac3eeb49
MS
3069 else /* See whether current candidate is better or worse than
3070 previous best. */
8d577d32 3071 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3072 {
ac3eeb49
MS
3073 case 0: /* Top two contenders are equally good. */
3074 oload_ambiguous = 1;
c5aa993b 3075 break;
ac3eeb49
MS
3076 case 1: /* Incomparable top contenders. */
3077 oload_ambiguous = 2;
c5aa993b 3078 break;
ac3eeb49
MS
3079 case 2: /* New champion, record details. */
3080 *oload_champ_bv = bv;
c5aa993b
JM
3081 oload_ambiguous = 0;
3082 oload_champ = ix;
c5aa993b
JM
3083 break;
3084 case 3:
3085 default:
3086 break;
3087 }
b8c9b27d 3088 xfree (parm_types);
6b1ba9a0
ND
3089 if (overload_debug)
3090 {
3091 if (method)
ac3eeb49 3092 fprintf_filtered (gdb_stderr,
3e43a32a 3093 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3094 fns_ptr[ix].physname, nparms);
6b1ba9a0 3095 else
ac3eeb49 3096 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3097 "Overloaded function instance "
3098 "%s # of parms %d\n",
ac3eeb49
MS
3099 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3100 nparms);
4a1970e4 3101 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3102 fprintf_filtered (gdb_stderr,
3103 "...Badness @ %d : %d\n",
6403aeea 3104 jj, bv->rank[jj].rank);
3e43a32a
MS
3105 fprintf_filtered (gdb_stderr, "Overload resolution "
3106 "champion is %d, ambiguous? %d\n",
ac3eeb49 3107 oload_champ, oload_ambiguous);
6b1ba9a0 3108 }
c906108c
SS
3109 }
3110
8d577d32
DC
3111 return oload_champ;
3112}
6b1ba9a0 3113
8d577d32
DC
3114/* Return 1 if we're looking at a static method, 0 if we're looking at
3115 a non-static method or a function that isn't a method. */
c906108c 3116
8d577d32
DC
3117static int
3118oload_method_static (int method, struct fn_field *fns_ptr, int index)
3119{
4c3376c8
SW
3120 if (method && fns_ptr && index >= 0
3121 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3122 return 1;
c906108c 3123 else
8d577d32
DC
3124 return 0;
3125}
c906108c 3126
8d577d32
DC
3127/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3128
3129static enum oload_classification
3130classify_oload_match (struct badness_vector *oload_champ_bv,
3131 int nargs,
3132 int static_offset)
3133{
3134 int ix;
da096638 3135 enum oload_classification worst = STANDARD;
8d577d32
DC
3136
3137 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3138 {
6403aeea
SW
3139 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3140 or worse return INCOMPATIBLE. */
3141 if (compare_ranks (oload_champ_bv->rank[ix],
3142 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3143 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3144 /* Otherwise If this conversion is as bad as
3145 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3146 else if (compare_ranks (oload_champ_bv->rank[ix],
3147 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3148 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3149 needed. */
7f8c9282 3150 }
02f0d45d 3151
da096638
KS
3152 /* If no INCOMPATIBLE classification was found, return the worst one
3153 that was found (if any). */
3154 return worst;
c906108c
SS
3155}
3156
ac3eeb49
MS
3157/* C++: return 1 is NAME is a legitimate name for the destructor of
3158 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3159 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3160 have CHECK_TYPEDEF applied, this function will apply it itself. */
3161
c906108c 3162int
d8228535 3163destructor_name_p (const char *name, struct type *type)
c906108c 3164{
c906108c
SS
3165 if (name[0] == '~')
3166 {
d8228535
JK
3167 const char *dname = type_name_no_tag_or_error (type);
3168 const char *cp = strchr (dname, '<');
c906108c
SS
3169 unsigned int len;
3170
3171 /* Do not compare the template part for template classes. */
3172 if (cp == NULL)
3173 len = strlen (dname);
3174 else
3175 len = cp - dname;
bf896cb0 3176 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3177 error (_("name of destructor must equal name of class"));
c906108c
SS
3178 else
3179 return 1;
3180 }
3181 return 0;
3182}
3183
2b2d9e11 3184/* Given TYPE, a structure/union,
ac3eeb49
MS
3185 return 1 if the component named NAME from the ultimate target
3186 structure/union is defined, otherwise, return 0. */
c906108c 3187
2b2d9e11
VP
3188int
3189check_field (struct type *type, const char *name)
c906108c 3190{
52f0bd74 3191 int i;
c906108c 3192
edf3d5f3
TT
3193 /* The type may be a stub. */
3194 CHECK_TYPEDEF (type);
3195
c906108c
SS
3196 for (i = TYPE_NFIELDS (type) - 1; i >= TYPE_N_BASECLASSES (type); i--)
3197 {
0d5cff50 3198 const char *t_field_name = TYPE_FIELD_NAME (type, i);
a109c7c1 3199
db577aea 3200 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
3201 return 1;
3202 }
3203
ac3eeb49
MS
3204 /* C++: If it was not found as a data field, then try to return it
3205 as a pointer to a method. */
c906108c 3206
c906108c
SS
3207 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; --i)
3208 {
db577aea 3209 if (strcmp_iw (TYPE_FN_FIELDLIST_NAME (type, i), name) == 0)
c906108c
SS
3210 return 1;
3211 }
3212
3213 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2b2d9e11 3214 if (check_field (TYPE_BASECLASS (type, i), name))
c906108c 3215 return 1;
c5aa993b 3216
c906108c
SS
3217 return 0;
3218}
3219
79c2c32d 3220/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3221 return the appropriate member (or the address of the member, if
3222 WANT_ADDRESS). This function is used to resolve user expressions
3223 of the form "DOMAIN::NAME". For more details on what happens, see
3224 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3225
3226struct value *
072bba3b
KS
3227value_aggregate_elt (struct type *curtype, char *name,
3228 struct type *expect_type, int want_address,
79c2c32d
DC
3229 enum noside noside)
3230{
3231 switch (TYPE_CODE (curtype))
3232 {
3233 case TYPE_CODE_STRUCT:
3234 case TYPE_CODE_UNION:
ac3eeb49 3235 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3236 name, expect_type,
0d5de010 3237 want_address, noside);
79c2c32d 3238 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3239 return value_namespace_elt (curtype, name,
3240 want_address, noside);
79c2c32d
DC
3241 default:
3242 internal_error (__FILE__, __LINE__,
e2e0b3e5 3243 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3244 }
3245}
3246
072bba3b 3247/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3248 with respect to the methods' parameters. If the types of the
072bba3b
KS
3249 two parameter lists are the same, returns 1; 0 otherwise. This
3250 comparison may ignore any artificial parameters in T1 if
3251 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3252 the first artificial parameter in T1, assumed to be a 'this' pointer.
3253
3254 The type T2 is expected to have come from make_params (in eval.c). */
3255
3256static int
3257compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3258{
3259 int start = 0;
3260
80b23b6a 3261 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3262 ++start;
3263
3264 /* If skipping artificial fields, find the first real field
581e13c1 3265 in T1. */
072bba3b
KS
3266 if (skip_artificial)
3267 {
3268 while (start < TYPE_NFIELDS (t1)
3269 && TYPE_FIELD_ARTIFICIAL (t1, start))
3270 ++start;
3271 }
3272
581e13c1 3273 /* Now compare parameters. */
072bba3b
KS
3274
3275 /* Special case: a method taking void. T1 will contain no
3276 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3277 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3278 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3279 return 1;
3280
3281 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3282 {
3283 int i;
a109c7c1 3284
072bba3b
KS
3285 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3286 {
6403aeea 3287 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3288 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3289 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3290 return 0;
3291 }
3292
3293 return 1;
3294 }
3295
3296 return 0;
3297}
3298
c906108c 3299/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3300 return the address of this member as a "pointer to member" type.
3301 If INTYPE is non-null, then it will be the type of the member we
3302 are looking for. This will help us resolve "pointers to member
3303 functions". This function is used to resolve user expressions of
3304 the form "DOMAIN::NAME". */
c906108c 3305
63d06c5c 3306static struct value *
fba45db2
KB
3307value_struct_elt_for_reference (struct type *domain, int offset,
3308 struct type *curtype, char *name,
ac3eeb49
MS
3309 struct type *intype,
3310 int want_address,
63d06c5c 3311 enum noside noside)
c906108c 3312{
52f0bd74
AC
3313 struct type *t = curtype;
3314 int i;
0d5de010 3315 struct value *v, *result;
c906108c 3316
c5aa993b 3317 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3318 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3319 error (_("Internal error: non-aggregate type "
3320 "to value_struct_elt_for_reference"));
c906108c
SS
3321
3322 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3323 {
0d5cff50 3324 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3325
6314a349 3326 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3327 {
d6a843b5 3328 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3329 {
3330 v = value_static_field (t, i);
3331 if (v == NULL)
8a3fe4f8 3332 error (_("static field %s has been optimized out"),
c906108c 3333 name);
0d5de010
DJ
3334 if (want_address)
3335 v = value_addr (v);
c906108c
SS
3336 return v;
3337 }
3338 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3339 error (_("pointers to bitfield members not allowed"));
c5aa993b 3340
0d5de010
DJ
3341 if (want_address)
3342 return value_from_longest
3343 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3344 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
3345 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3346 return allocate_value (TYPE_FIELD_TYPE (t, i));
3347 else
3348 error (_("Cannot reference non-static field \"%s\""), name);
c906108c
SS
3349 }
3350 }
3351
ac3eeb49
MS
3352 /* C++: If it was not found as a data field, then try to return it
3353 as a pointer to a method. */
c906108c 3354
c906108c
SS
3355 /* Perform all necessary dereferencing. */
3356 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3357 intype = TYPE_TARGET_TYPE (intype);
3358
3359 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3360 {
0d5cff50 3361 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3362 char dem_opname[64];
3363
ac3eeb49
MS
3364 if (strncmp (t_field_name, "__", 2) == 0
3365 || strncmp (t_field_name, "op", 2) == 0
3366 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3367 {
ac3eeb49
MS
3368 if (cplus_demangle_opname (t_field_name,
3369 dem_opname, DMGL_ANSI))
c5aa993b 3370 t_field_name = dem_opname;
ac3eeb49
MS
3371 else if (cplus_demangle_opname (t_field_name,
3372 dem_opname, 0))
c906108c 3373 t_field_name = dem_opname;
c906108c 3374 }
6314a349 3375 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3376 {
072bba3b
KS
3377 int j;
3378 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3379 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3380
de17c821
DJ
3381 check_stub_method_group (t, i);
3382
c906108c
SS
3383 if (intype)
3384 {
072bba3b
KS
3385 for (j = 0; j < len; ++j)
3386 {
3387 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3388 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3389 intype, 1))
072bba3b
KS
3390 break;
3391 }
3392
3393 if (j == len)
3e43a32a
MS
3394 error (_("no member function matches "
3395 "that type instantiation"));
7f79b1c5 3396 }
c906108c 3397 else
072bba3b
KS
3398 {
3399 int ii;
7f79b1c5
DJ
3400
3401 j = -1;
53832f31 3402 for (ii = 0; ii < len; ++ii)
072bba3b 3403 {
7f79b1c5
DJ
3404 /* Skip artificial methods. This is necessary if,
3405 for example, the user wants to "print
3406 subclass::subclass" with only one user-defined
53832f31
TT
3407 constructor. There is no ambiguity in this case.
3408 We are careful here to allow artificial methods
3409 if they are the unique result. */
072bba3b 3410 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3411 {
3412 if (j == -1)
3413 j = ii;
3414 continue;
3415 }
072bba3b 3416
7f79b1c5
DJ
3417 /* Desired method is ambiguous if more than one
3418 method is defined. */
53832f31 3419 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3420 error (_("non-unique member `%s' requires "
3421 "type instantiation"), name);
072bba3b 3422
7f79b1c5
DJ
3423 j = ii;
3424 }
53832f31
TT
3425
3426 if (j == -1)
3427 error (_("no matching member function"));
072bba3b 3428 }
c5aa993b 3429
0d5de010
DJ
3430 if (TYPE_FN_FIELD_STATIC_P (f, j))
3431 {
ac3eeb49
MS
3432 struct symbol *s =
3433 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3434 0, VAR_DOMAIN, 0);
a109c7c1 3435
0d5de010
DJ
3436 if (s == NULL)
3437 return NULL;
3438
3439 if (want_address)
3440 return value_addr (read_var_value (s, 0));
3441 else
3442 return read_var_value (s, 0);
3443 }
3444
c906108c
SS
3445 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3446 {
0d5de010
DJ
3447 if (want_address)
3448 {
3449 result = allocate_value
3450 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3451 cplus_make_method_ptr (value_type (result),
3452 value_contents_writeable (result),
0d5de010
DJ
3453 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3454 }
3455 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3456 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3457 else
3458 error (_("Cannot reference virtual member function \"%s\""),
3459 name);
c906108c
SS
3460 }
3461 else
3462 {
ac3eeb49
MS
3463 struct symbol *s =
3464 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3465 0, VAR_DOMAIN, 0);
a109c7c1 3466
c906108c 3467 if (s == NULL)
0d5de010
DJ
3468 return NULL;
3469
3470 v = read_var_value (s, 0);
3471 if (!want_address)
3472 result = v;
c906108c
SS
3473 else
3474 {
0d5de010 3475 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3476 cplus_make_method_ptr (value_type (result),
3477 value_contents_writeable (result),
42ae5230 3478 value_address (v), 0);
c906108c 3479 }
c906108c 3480 }
0d5de010 3481 return result;
c906108c
SS
3482 }
3483 }
3484 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3485 {
f23631e4 3486 struct value *v;
c906108c
SS
3487 int base_offset;
3488
3489 if (BASETYPE_VIA_VIRTUAL (t, i))
3490 base_offset = 0;
3491 else
3492 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3493 v = value_struct_elt_for_reference (domain,
3494 offset + base_offset,
3495 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3496 name, intype,
3497 want_address, noside);
c906108c
SS
3498 if (v)
3499 return v;
3500 }
63d06c5c
DC
3501
3502 /* As a last chance, pretend that CURTYPE is a namespace, and look
3503 it up that way; this (frequently) works for types nested inside
3504 classes. */
3505
ac3eeb49
MS
3506 return value_maybe_namespace_elt (curtype, name,
3507 want_address, noside);
c906108c
SS
3508}
3509
79c2c32d
DC
3510/* C++: Return the member NAME of the namespace given by the type
3511 CURTYPE. */
3512
3513static struct value *
3514value_namespace_elt (const struct type *curtype,
0d5de010 3515 char *name, int want_address,
79c2c32d 3516 enum noside noside)
63d06c5c
DC
3517{
3518 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3519 want_address,
3520 noside);
63d06c5c
DC
3521
3522 if (retval == NULL)
ac3eeb49
MS
3523 error (_("No symbol \"%s\" in namespace \"%s\"."),
3524 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3525
3526 return retval;
3527}
3528
3529/* A helper function used by value_namespace_elt and
3530 value_struct_elt_for_reference. It looks up NAME inside the
3531 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3532 is a class and NAME refers to a type in CURTYPE itself (as opposed
3533 to, say, some base class of CURTYPE). */
3534
3535static struct value *
3536value_maybe_namespace_elt (const struct type *curtype,
0d5de010 3537 char *name, int want_address,
63d06c5c 3538 enum noside noside)
79c2c32d
DC
3539{
3540 const char *namespace_name = TYPE_TAG_NAME (curtype);
3541 struct symbol *sym;
0d5de010 3542 struct value *result;
79c2c32d 3543
13387711 3544 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3545 get_selected_block (0), VAR_DOMAIN);
3546
3547 if (sym == NULL)
3548 {
3549 char *concatenated_name = alloca (strlen (namespace_name) + 2
3550 + strlen (name) + 1);
3551
3552 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3553 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3554 }
79c2c32d
DC
3555
3556 if (sym == NULL)
63d06c5c 3557 return NULL;
79c2c32d
DC
3558 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3559 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3560 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3561 else
0d5de010
DJ
3562 result = value_of_variable (sym, get_selected_block (0));
3563
3564 if (result && want_address)
3565 result = value_addr (result);
3566
3567 return result;
79c2c32d
DC
3568}
3569
dfcee124 3570/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3571
c906108c 3572 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3573 and refer to the values computed for the object pointed to. */
c906108c
SS
3574
3575struct type *
dfcee124
AG
3576value_rtti_indirect_type (struct value *v, int *full,
3577 int *top, int *using_enc)
c906108c 3578{
f23631e4 3579 struct value *target;
dfcee124
AG
3580 struct type *type, *real_type, *target_type;
3581
3582 type = value_type (v);
3583 type = check_typedef (type);
3584 if (TYPE_CODE (type) == TYPE_CODE_REF)
3585 target = coerce_ref (v);
3586 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3587 target = value_ind (v);
3588 else
3589 return NULL;
c906108c 3590
dfcee124
AG
3591 real_type = value_rtti_type (target, full, top, using_enc);
3592
3593 if (real_type)
3594 {
3595 /* Copy qualifiers to the referenced object. */
3596 target_type = value_type (target);
3597 real_type = make_cv_type (TYPE_CONST (target_type),
3598 TYPE_VOLATILE (target_type), real_type, NULL);
3599 if (TYPE_CODE (type) == TYPE_CODE_REF)
3600 real_type = lookup_reference_type (real_type);
3601 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3602 real_type = lookup_pointer_type (real_type);
3603 else
3604 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3605
3606 /* Copy qualifiers to the pointer/reference. */
3607 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3608 real_type, NULL);
3609 }
c906108c 3610
dfcee124 3611 return real_type;
c906108c
SS
3612}
3613
3614/* Given a value pointed to by ARGP, check its real run-time type, and
3615 if that is different from the enclosing type, create a new value
3616 using the real run-time type as the enclosing type (and of the same
3617 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3618 be the correct offset to the enclosed object. RTYPE is the type,
3619 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3620 by value_rtti_type(). If these are available, they can be supplied
3621 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3622 NULL if they're not available. */
c906108c 3623
f23631e4 3624struct value *
ac3eeb49
MS
3625value_full_object (struct value *argp,
3626 struct type *rtype,
3627 int xfull, int xtop,
fba45db2 3628 int xusing_enc)
c906108c 3629{
c5aa993b 3630 struct type *real_type;
c906108c
SS
3631 int full = 0;
3632 int top = -1;
3633 int using_enc = 0;
f23631e4 3634 struct value *new_val;
c906108c
SS
3635
3636 if (rtype)
3637 {
3638 real_type = rtype;
3639 full = xfull;
3640 top = xtop;
3641 using_enc = xusing_enc;
3642 }
3643 else
3644 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3645
ac3eeb49 3646 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3647 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3648 return argp;
3649
a7860e76
TT
3650 /* In a destructor we might see a real type that is a superclass of
3651 the object's type. In this case it is better to leave the object
3652 as-is. */
3653 if (full
3654 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3655 return argp;
3656
c906108c 3657 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3658 type is wrong, set it. */
3659 /* pai: FIXME -- sounds iffy */
c906108c
SS
3660 if (full)
3661 {
4dfea560
DE
3662 argp = value_copy (argp);
3663 set_value_enclosing_type (argp, real_type);
c906108c
SS
3664 return argp;
3665 }
3666
581e13c1 3667 /* Check if object is in memory. */
c906108c
SS
3668 if (VALUE_LVAL (argp) != lval_memory)
3669 {
3e43a32a
MS
3670 warning (_("Couldn't retrieve complete object of RTTI "
3671 "type %s; object may be in register(s)."),
ac3eeb49 3672 TYPE_NAME (real_type));
c5aa993b 3673
c906108c
SS
3674 return argp;
3675 }
c5aa993b 3676
ac3eeb49
MS
3677 /* All other cases -- retrieve the complete object. */
3678 /* Go back by the computed top_offset from the beginning of the
3679 object, adjusting for the embedded offset of argp if that's what
3680 value_rtti_type used for its computation. */
42ae5230 3681 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3682 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3683 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3684 set_value_embedded_offset (new_val, (using_enc
3685 ? top + value_embedded_offset (argp)
3686 : top));
c906108c
SS
3687 return new_val;
3688}
3689
389e51db 3690
85bc8cb7
JK
3691/* Return the value of the local variable, if one exists. Throw error
3692 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3693
f23631e4 3694struct value *
85bc8cb7 3695value_of_this (const struct language_defn *lang)
c906108c 3696{
66a17cb6 3697 struct symbol *sym;
c906108c 3698 struct block *b;
206415a3 3699 struct frame_info *frame;
c906108c 3700
66a17cb6 3701 if (!lang->la_name_of_this)
85bc8cb7 3702 error (_("no `this' in current language"));
aee28ec6 3703
85bc8cb7 3704 frame = get_selected_frame (_("no frame selected"));
c906108c 3705
66a17cb6 3706 b = get_frame_block (frame, NULL);
c906108c 3707
66a17cb6 3708 sym = lookup_language_this (lang, b);
c906108c 3709 if (sym == NULL)
85bc8cb7
JK
3710 error (_("current stack frame does not contain a variable named `%s'"),
3711 lang->la_name_of_this);
3712
3713 return read_var_value (sym, frame);
3714}
3715
3716/* Return the value of the local variable, if one exists. Return NULL
3717 otherwise. Never throw error. */
3718
3719struct value *
3720value_of_this_silent (const struct language_defn *lang)
3721{
3722 struct value *ret = NULL;
3723 volatile struct gdb_exception except;
3724
3725 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3726 {
85bc8cb7 3727 ret = value_of_this (lang);
c906108c
SS
3728 }
3729
d069f99d
AF
3730 return ret;
3731}
3732
ac3eeb49
MS
3733/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3734 elements long, starting at LOWBOUND. The result has the same lower
3735 bound as the original ARRAY. */
c906108c 3736
f23631e4
AC
3737struct value *
3738value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3739{
3740 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3741 LONGEST lowerbound, upperbound;
f23631e4 3742 struct value *slice;
c906108c 3743 struct type *array_type;
ac3eeb49 3744
df407dfe 3745 array_type = check_typedef (value_type (array));
c906108c 3746 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3747 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3748 error (_("cannot take slice of non-array"));
ac3eeb49 3749
c906108c
SS
3750 range_type = TYPE_INDEX_TYPE (array_type);
3751 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3752 error (_("slice from bad array or bitstring"));
ac3eeb49 3753
c906108c 3754 if (lowbound < lowerbound || length < 0
db034ac5 3755 || lowbound + length - 1 > upperbound)
8a3fe4f8 3756 error (_("slice out of range"));
ac3eeb49 3757
c906108c
SS
3758 /* FIXME-type-allocation: need a way to free this type when we are
3759 done with it. */
c5aa993b 3760 slice_range_type = create_range_type ((struct type *) NULL,
c906108c 3761 TYPE_TARGET_TYPE (range_type),
ac3eeb49
MS
3762 lowbound,
3763 lowbound + length - 1);
ac3eeb49 3764
c906108c
SS
3765 {
3766 struct type *element_type = TYPE_TARGET_TYPE (array_type);
ac3eeb49
MS
3767 LONGEST offset =
3768 (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
3769
3770 slice_type = create_array_type ((struct type *) NULL,
3771 element_type,
c906108c
SS
3772 slice_range_type);
3773 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3774
9214ee5f 3775 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3e3d7139 3776 slice = allocate_value_lazy (slice_type);
c906108c 3777 else
3e3d7139
JG
3778 {
3779 slice = allocate_value (slice_type);
39d37385
PA
3780 value_contents_copy (slice, 0, array, offset,
3781 TYPE_LENGTH (slice_type));
3e3d7139 3782 }
ac3eeb49 3783
74bcbdf3 3784 set_value_component_location (slice, array);
65d3800a 3785 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
f5cf64a7 3786 set_value_offset (slice, value_offset (array) + offset);
c906108c
SS
3787 }
3788 return slice;
3789}
3790
ac3eeb49
MS
3791/* Create a value for a FORTRAN complex number. Currently most of the
3792 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3793 composed of 2 doubles. This really should be a smarter routine
3794 that figures out precision inteligently as opposed to assuming
ac3eeb49 3795 doubles. FIXME: fmb */
c906108c 3796
f23631e4 3797struct value *
ac3eeb49
MS
3798value_literal_complex (struct value *arg1,
3799 struct value *arg2,
3800 struct type *type)
c906108c 3801{
f23631e4 3802 struct value *val;
c906108c
SS
3803 struct type *real_type = TYPE_TARGET_TYPE (type);
3804
3805 val = allocate_value (type);
3806 arg1 = value_cast (real_type, arg1);
3807 arg2 = value_cast (real_type, arg2);
3808
990a07ab 3809 memcpy (value_contents_raw (val),
0fd88904 3810 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3811 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3812 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3813 return val;
3814}
3815
ac3eeb49 3816/* Cast a value into the appropriate complex data type. */
c906108c 3817
f23631e4
AC
3818static struct value *
3819cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3820{
3821 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3822
df407dfe 3823 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3824 {
df407dfe 3825 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3826 struct value *re_val = allocate_value (val_real_type);
3827 struct value *im_val = allocate_value (val_real_type);
c906108c 3828
990a07ab 3829 memcpy (value_contents_raw (re_val),
0fd88904 3830 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3831 memcpy (value_contents_raw (im_val),
0fd88904 3832 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3833 TYPE_LENGTH (val_real_type));
c906108c
SS
3834
3835 return value_literal_complex (re_val, im_val, type);
3836 }
df407dfe
AC
3837 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3838 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3839 return value_literal_complex (val,
3840 value_zero (real_type, not_lval),
3841 type);
c906108c 3842 else
8a3fe4f8 3843 error (_("cannot cast non-number to complex"));
c906108c
SS
3844}
3845
3846void
fba45db2 3847_initialize_valops (void)
c906108c 3848{
5bf193a2
AC
3849 add_setshow_boolean_cmd ("overload-resolution", class_support,
3850 &overload_resolution, _("\
3851Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3852Show overload resolution in evaluating C++ functions."),
3853 NULL, NULL,
920d2a44 3854 show_overload_resolution,
5bf193a2 3855 &setlist, &showlist);
c906108c 3856 overload_resolution = 1;
c906108c 3857}
This page took 1.578269 seconds and 4 git commands to generate.