PR cli/21688: Fix multi-line/inline command differentiation
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
61baf725 3 Copyright (C) 1986-2017 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
f4c5303c 39#include "observer.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
c906108c 42
ccce17b0 43extern unsigned int overload_debug;
c906108c
SS
44/* Local functions. */
45
ad2f7632
DJ
46static int typecmp (int staticp, int varargs, int nargs,
47 struct field t1[], struct value *t2[]);
c906108c 48
714f19d5 49static struct value *search_struct_field (const char *, struct value *,
8a13d42d 50 struct type *, int);
c906108c 51
714f19d5
TT
52static struct value *search_struct_method (const char *, struct value **,
53 struct value **,
6b850546 54 LONGEST, int *, struct type *);
c906108c 55
da096638 56static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
57 const char *, const char *,
58 struct symbol ***,
7322dca9
SW
59 struct badness_vector **,
60 const int no_adl);
8d577d32
DC
61
62static
da096638 63int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
64 const char *, const char *,
65 int, struct symbol ***,
7322dca9
SW
66 struct badness_vector **, int *,
67 const int no_adl);
ac3eeb49 68
9cf95373 69static int find_oload_champ (struct value **, int, int,
233e8b28
SC
70 struct fn_field *, VEC (xmethod_worker_ptr) *,
71 struct symbol **, struct badness_vector **);
ac3eeb49 72
2bca57ba 73static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
74
75enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
76
77static enum
ac3eeb49
MS
78oload_classification classify_oload_match (struct badness_vector *,
79 int, int);
8d577d32 80
ac3eeb49
MS
81static struct value *value_struct_elt_for_reference (struct type *,
82 int, struct type *,
c848d642 83 const char *,
ac3eeb49
MS
84 struct type *,
85 int, enum noside);
79c2c32d 86
ac3eeb49 87static struct value *value_namespace_elt (const struct type *,
c848d642 88 const char *, int , enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 91 const char *, int,
ac3eeb49 92 enum noside);
63d06c5c 93
a14ed312 94static CORE_ADDR allocate_space_in_inferior (int);
c906108c 95
f23631e4 96static struct value *cast_into_complex (struct type *, struct value *);
c906108c 97
233e8b28 98static void find_method_list (struct value **, const char *,
6b850546 99 LONGEST, struct type *, struct fn_field **, int *,
233e8b28 100 VEC (xmethod_worker_ptr) **,
6b850546 101 struct type **, LONGEST *);
7a292a7a 102
a14ed312 103void _initialize_valops (void);
c906108c 104
c906108c 105#if 0
ac3eeb49
MS
106/* Flag for whether we want to abandon failed expression evals by
107 default. */
108
c906108c
SS
109static int auto_abandon = 0;
110#endif
111
112int overload_resolution = 0;
920d2a44
AC
113static void
114show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
115 struct cmd_list_element *c,
116 const char *value)
920d2a44 117{
3e43a32a
MS
118 fprintf_filtered (file, _("Overload resolution in evaluating "
119 "C++ functions is %s.\n"),
920d2a44
AC
120 value);
121}
242bfc55 122
3e3b026f
UW
123/* Find the address of function name NAME in the inferior. If OBJF_P
124 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
125 is defined. */
c906108c 126
f23631e4 127struct value *
3e3b026f 128find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 129{
d12307c1 130 struct block_symbol sym;
a109c7c1 131
2570f2b7 132 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
d12307c1 133 if (sym.symbol != NULL)
c906108c 134 {
d12307c1 135 if (SYMBOL_CLASS (sym.symbol) != LOC_BLOCK)
c906108c 136 {
8a3fe4f8 137 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
138 name);
139 }
3e3b026f
UW
140
141 if (objf_p)
d12307c1 142 *objf_p = symbol_objfile (sym.symbol);
3e3b026f 143
d12307c1 144 return value_of_variable (sym.symbol, sym.block);
c906108c
SS
145 }
146 else
147 {
7c7b6655
TT
148 struct bound_minimal_symbol msymbol =
149 lookup_bound_minimal_symbol (name);
a109c7c1 150
7c7b6655 151 if (msymbol.minsym != NULL)
c906108c 152 {
7c7b6655 153 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
154 struct gdbarch *gdbarch = get_objfile_arch (objfile);
155
c906108c 156 struct type *type;
4478b372 157 CORE_ADDR maddr;
3e3b026f 158 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
159 type = lookup_function_type (type);
160 type = lookup_pointer_type (type);
77e371c0 161 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
162
163 if (objf_p)
164 *objf_p = objfile;
165
4478b372 166 return value_from_pointer (type, maddr);
c906108c
SS
167 }
168 else
169 {
c5aa993b 170 if (!target_has_execution)
3e43a32a
MS
171 error (_("evaluation of this expression "
172 "requires the target program to be active"));
c5aa993b 173 else
3e43a32a
MS
174 error (_("evaluation of this expression requires the "
175 "program to have a function \"%s\"."),
176 name);
c906108c
SS
177 }
178 }
179}
180
ac3eeb49
MS
181/* Allocate NBYTES of space in the inferior using the inferior's
182 malloc and return a value that is a pointer to the allocated
183 space. */
c906108c 184
f23631e4 185struct value *
fba45db2 186value_allocate_space_in_inferior (int len)
c906108c 187{
3e3b026f
UW
188 struct objfile *objf;
189 struct value *val = find_function_in_inferior ("malloc", &objf);
190 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 191 struct value *blocklen;
c906108c 192
3e3b026f 193 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
194 val = call_function_by_hand (val, 1, &blocklen);
195 if (value_logical_not (val))
196 {
197 if (!target_has_execution)
3e43a32a
MS
198 error (_("No memory available to program now: "
199 "you need to start the target first"));
c5aa993b 200 else
8a3fe4f8 201 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
202 }
203 return val;
204}
205
206static CORE_ADDR
fba45db2 207allocate_space_in_inferior (int len)
c906108c
SS
208{
209 return value_as_long (value_allocate_space_in_inferior (len));
210}
211
6af87b03
AR
212/* Cast struct value VAL to type TYPE and return as a value.
213 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
214 for this to work. Typedef to one of the codes is permitted.
215 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
216
217static struct value *
218value_cast_structs (struct type *type, struct value *v2)
219{
220 struct type *t1;
221 struct type *t2;
222 struct value *v;
223
224 gdb_assert (type != NULL && v2 != NULL);
225
226 t1 = check_typedef (type);
227 t2 = check_typedef (value_type (v2));
228
229 /* Check preconditions. */
230 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
231 || TYPE_CODE (t1) == TYPE_CODE_UNION)
232 && !!"Precondition is that type is of STRUCT or UNION kind.");
233 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
234 || TYPE_CODE (t2) == TYPE_CODE_UNION)
235 && !!"Precondition is that value is of STRUCT or UNION kind");
236
191ca0a1
CM
237 if (TYPE_NAME (t1) != NULL
238 && TYPE_NAME (t2) != NULL
239 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
240 return NULL;
241
6af87b03
AR
242 /* Upcasting: look in the type of the source to see if it contains the
243 type of the target as a superclass. If so, we'll need to
244 offset the pointer rather than just change its type. */
245 if (TYPE_NAME (t1) != NULL)
246 {
247 v = search_struct_field (type_name_no_tag (t1),
8a13d42d 248 v2, t2, 1);
6af87b03
AR
249 if (v)
250 return v;
251 }
252
253 /* Downcasting: look in the type of the target to see if it contains the
254 type of the source as a superclass. If so, we'll need to
9c3c02fd 255 offset the pointer rather than just change its type. */
6af87b03
AR
256 if (TYPE_NAME (t2) != NULL)
257 {
9c3c02fd 258 /* Try downcasting using the run-time type of the value. */
6b850546
DT
259 int full, using_enc;
260 LONGEST top;
9c3c02fd
TT
261 struct type *real_type;
262
263 real_type = value_rtti_type (v2, &full, &top, &using_enc);
264 if (real_type)
265 {
266 v = value_full_object (v2, real_type, full, top, using_enc);
267 v = value_at_lazy (real_type, value_address (v));
9f1f738a 268 real_type = value_type (v);
9c3c02fd
TT
269
270 /* We might be trying to cast to the outermost enclosing
271 type, in which case search_struct_field won't work. */
272 if (TYPE_NAME (real_type) != NULL
273 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
274 return v;
275
8a13d42d 276 v = search_struct_field (type_name_no_tag (t2), v, real_type, 1);
9c3c02fd
TT
277 if (v)
278 return v;
279 }
280
281 /* Try downcasting using information from the destination type
282 T2. This wouldn't work properly for classes with virtual
283 bases, but those were handled above. */
6af87b03 284 v = search_struct_field (type_name_no_tag (t2),
8a13d42d 285 value_zero (t1, not_lval), t1, 1);
6af87b03
AR
286 if (v)
287 {
288 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 289 CORE_ADDR addr2 = value_address (v2);
a109c7c1 290
42ae5230 291 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
292 return value_at (type, addr2);
293 }
294 }
694182d2
DJ
295
296 return NULL;
6af87b03
AR
297}
298
fb933624
DJ
299/* Cast one pointer or reference type to another. Both TYPE and
300 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
301 reference types. If SUBCLASS_CHECK is non-zero, this will force a
302 check to see whether TYPE is a superclass of ARG2's type. If
303 SUBCLASS_CHECK is zero, then the subclass check is done only when
304 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
305
306struct value *
b1af9e97
TT
307value_cast_pointers (struct type *type, struct value *arg2,
308 int subclass_check)
fb933624 309{
d160942f 310 struct type *type1 = check_typedef (type);
fb933624 311 struct type *type2 = check_typedef (value_type (arg2));
d160942f 312 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
313 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
314
315 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
316 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 317 && (subclass_check || !value_logical_not (arg2)))
fb933624 318 {
6af87b03 319 struct value *v2;
fb933624 320
aa006118 321 if (TYPE_IS_REFERENCE (type2))
6af87b03
AR
322 v2 = coerce_ref (arg2);
323 else
324 v2 = value_ind (arg2);
3e43a32a
MS
325 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
326 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
327 v2 = value_cast_structs (t1, v2);
328 /* At this point we have what we can have, un-dereference if needed. */
329 if (v2)
fb933624 330 {
6af87b03 331 struct value *v = value_addr (v2);
a109c7c1 332
6af87b03
AR
333 deprecated_set_value_type (v, type);
334 return v;
fb933624 335 }
8301c89e 336 }
fb933624
DJ
337
338 /* No superclass found, just change the pointer type. */
0d5de010 339 arg2 = value_copy (arg2);
fb933624 340 deprecated_set_value_type (arg2, type);
4dfea560 341 set_value_enclosing_type (arg2, type);
fb933624
DJ
342 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
343 return arg2;
344}
345
c906108c
SS
346/* Cast value ARG2 to type TYPE and return as a value.
347 More general than a C cast: accepts any two types of the same length,
348 and if ARG2 is an lvalue it can be cast into anything at all. */
349/* In C++, casts may change pointer or object representations. */
350
f23631e4
AC
351struct value *
352value_cast (struct type *type, struct value *arg2)
c906108c 353{
52f0bd74
AC
354 enum type_code code1;
355 enum type_code code2;
356 int scalar;
c906108c
SS
357 struct type *type2;
358
359 int convert_to_boolean = 0;
c5aa993b 360
df407dfe 361 if (value_type (arg2) == type)
c906108c
SS
362 return arg2;
363
6af87b03 364 /* Check if we are casting struct reference to struct reference. */
aa006118 365 if (TYPE_IS_REFERENCE (check_typedef (type)))
6af87b03
AR
366 {
367 /* We dereference type; then we recurse and finally
581e13c1 368 we generate value of the given reference. Nothing wrong with
6af87b03
AR
369 that. */
370 struct type *t1 = check_typedef (type);
371 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
aa006118 372 struct value *val = value_cast (dereftype, arg2);
a109c7c1 373
a65cfae5 374 return value_ref (val, TYPE_CODE (t1));
6af87b03
AR
375 }
376
aa006118 377 if (TYPE_IS_REFERENCE (check_typedef (value_type (arg2))))
6af87b03
AR
378 /* We deref the value and then do the cast. */
379 return value_cast (type, coerce_ref (arg2));
380
f168693b 381 type = check_typedef (type);
c906108c 382 code1 = TYPE_CODE (type);
994b9211 383 arg2 = coerce_ref (arg2);
df407dfe 384 type2 = check_typedef (value_type (arg2));
c906108c 385
fb933624
DJ
386 /* You can't cast to a reference type. See value_cast_pointers
387 instead. */
aa006118 388 gdb_assert (!TYPE_IS_REFERENCE (type));
fb933624 389
ac3eeb49
MS
390 /* A cast to an undetermined-length array_type, such as
391 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
392 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
393 if (code1 == TYPE_CODE_ARRAY)
394 {
395 struct type *element_type = TYPE_TARGET_TYPE (type);
396 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 397
d78df370 398 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
399 {
400 struct type *range_type = TYPE_INDEX_TYPE (type);
401 int val_length = TYPE_LENGTH (type2);
402 LONGEST low_bound, high_bound, new_length;
a109c7c1 403
c906108c
SS
404 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
405 low_bound = 0, high_bound = 0;
406 new_length = val_length / element_length;
407 if (val_length % element_length != 0)
3e43a32a
MS
408 warning (_("array element type size does not "
409 "divide object size in cast"));
ac3eeb49
MS
410 /* FIXME-type-allocation: need a way to free this type when
411 we are done with it. */
0c9c3474
SA
412 range_type = create_static_range_type ((struct type *) NULL,
413 TYPE_TARGET_TYPE (range_type),
414 low_bound,
415 new_length + low_bound - 1);
ac3eeb49
MS
416 deprecated_set_value_type (arg2,
417 create_array_type ((struct type *) NULL,
418 element_type,
419 range_type));
c906108c
SS
420 return arg2;
421 }
422 }
423
424 if (current_language->c_style_arrays
3bdf2bbd
KW
425 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
426 && !TYPE_VECTOR (type2))
c906108c
SS
427 arg2 = value_coerce_array (arg2);
428
429 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
430 arg2 = value_coerce_function (arg2);
431
df407dfe 432 type2 = check_typedef (value_type (arg2));
c906108c
SS
433 code2 = TYPE_CODE (type2);
434
435 if (code1 == TYPE_CODE_COMPLEX)
436 return cast_into_complex (type, arg2);
437 if (code1 == TYPE_CODE_BOOL)
438 {
439 code1 = TYPE_CODE_INT;
440 convert_to_boolean = 1;
441 }
442 if (code1 == TYPE_CODE_CHAR)
443 code1 = TYPE_CODE_INT;
444 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
445 code2 = TYPE_CODE_INT;
446
447 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
448 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
449 || code2 == TYPE_CODE_RANGE);
c906108c 450
6af87b03
AR
451 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
452 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 453 && TYPE_NAME (type) != 0)
694182d2
DJ
454 {
455 struct value *v = value_cast_structs (type, arg2);
a109c7c1 456
694182d2
DJ
457 if (v)
458 return v;
459 }
460
c906108c
SS
461 if (code1 == TYPE_CODE_FLT && scalar)
462 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
463 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
464 {
e17a4113 465 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
466 int dec_len = TYPE_LENGTH (type);
467 gdb_byte dec[16];
468
469 if (code2 == TYPE_CODE_FLT)
e17a4113 470 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
471 else if (code2 == TYPE_CODE_DECFLOAT)
472 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 473 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
474 else
475 /* The only option left is an integral type. */
e17a4113 476 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
477
478 return value_from_decfloat (type, dec);
479 }
c906108c
SS
480 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
481 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
482 && (scalar || code2 == TYPE_CODE_PTR
483 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
484 {
485 LONGEST longest;
c5aa993b 486
2bf1f4a1 487 /* When we cast pointers to integers, we mustn't use
76e71323 488 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
489 represents, as value_as_long would. GDB should evaluate
490 expressions just as the compiler would --- and the compiler
491 sees a cast as a simple reinterpretation of the pointer's
492 bits. */
493 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
494 longest = extract_unsigned_integer
495 (value_contents (arg2), TYPE_LENGTH (type2),
496 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
497 else
498 longest = value_as_long (arg2);
802db21b 499 return value_from_longest (type, convert_to_boolean ?
716c501e 500 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 501 }
ac3eeb49
MS
502 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
503 || code2 == TYPE_CODE_ENUM
504 || code2 == TYPE_CODE_RANGE))
634acd5f 505 {
4603e466
DT
506 /* TYPE_LENGTH (type) is the length of a pointer, but we really
507 want the length of an address! -- we are really dealing with
508 addresses (i.e., gdb representations) not pointers (i.e.,
509 target representations) here.
510
511 This allows things like "print *(int *)0x01000234" to work
512 without printing a misleading message -- which would
513 otherwise occur when dealing with a target having two byte
514 pointers and four byte addresses. */
515
50810684 516 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 517 LONGEST longest = value_as_long (arg2);
a109c7c1 518
4603e466 519 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 520 {
4603e466
DT
521 if (longest >= ((LONGEST) 1 << addr_bit)
522 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 523 warning (_("value truncated"));
634acd5f
AC
524 }
525 return value_from_longest (type, longest);
526 }
0d5de010
DJ
527 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
528 && value_as_long (arg2) == 0)
529 {
530 struct value *result = allocate_value (type);
a109c7c1 531
ad4820ab 532 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
533 return result;
534 }
535 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
536 && value_as_long (arg2) == 0)
537 {
538 /* The Itanium C++ ABI represents NULL pointers to members as
539 minus one, instead of biasing the normal case. */
540 return value_from_longest (type, -1);
541 }
8954db33
AB
542 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
543 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
544 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
545 error (_("Cannot convert between vector values of different sizes"));
546 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
547 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
548 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
549 else if (code1 == TYPE_CODE_VOID)
550 {
551 return value_zero (type, not_lval);
552 }
c906108c
SS
553 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
554 {
555 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 556 return value_cast_pointers (type, arg2, 0);
fb933624 557
0d5de010 558 arg2 = value_copy (arg2);
04624583 559 deprecated_set_value_type (arg2, type);
4dfea560 560 set_value_enclosing_type (arg2, type);
b44d461b 561 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
562 return arg2;
563 }
c906108c 564 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 565 return value_at_lazy (type, value_address (arg2));
c906108c
SS
566 else
567 {
8a3fe4f8 568 error (_("Invalid cast."));
c906108c
SS
569 return 0;
570 }
571}
572
4e8f195d
TT
573/* The C++ reinterpret_cast operator. */
574
575struct value *
576value_reinterpret_cast (struct type *type, struct value *arg)
577{
578 struct value *result;
579 struct type *real_type = check_typedef (type);
580 struct type *arg_type, *dest_type;
581 int is_ref = 0;
582 enum type_code dest_code, arg_code;
583
584 /* Do reference, function, and array conversion. */
585 arg = coerce_array (arg);
586
587 /* Attempt to preserve the type the user asked for. */
588 dest_type = type;
589
590 /* If we are casting to a reference type, transform
aa006118
AV
591 reinterpret_cast<T&[&]>(V) to *reinterpret_cast<T*>(&V). */
592 if (TYPE_IS_REFERENCE (real_type))
4e8f195d
TT
593 {
594 is_ref = 1;
595 arg = value_addr (arg);
596 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
597 real_type = lookup_pointer_type (real_type);
598 }
599
600 arg_type = value_type (arg);
601
602 dest_code = TYPE_CODE (real_type);
603 arg_code = TYPE_CODE (arg_type);
604
605 /* We can convert pointer types, or any pointer type to int, or int
606 type to pointer. */
607 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
608 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
609 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
610 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
611 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
612 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
613 || (dest_code == arg_code
614 && (dest_code == TYPE_CODE_PTR
615 || dest_code == TYPE_CODE_METHODPTR
616 || dest_code == TYPE_CODE_MEMBERPTR)))
617 result = value_cast (dest_type, arg);
618 else
619 error (_("Invalid reinterpret_cast"));
620
621 if (is_ref)
a65cfae5
AV
622 result = value_cast (type, value_ref (value_ind (result),
623 TYPE_CODE (type)));
4e8f195d
TT
624
625 return result;
626}
627
628/* A helper for value_dynamic_cast. This implements the first of two
629 runtime checks: we iterate over all the base classes of the value's
630 class which are equal to the desired class; if only one of these
631 holds the value, then it is the answer. */
632
633static int
634dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc 635 const gdb_byte *valaddr,
6b850546 636 LONGEST embedded_offset,
4e8f195d 637 CORE_ADDR address,
8af8e3bc 638 struct value *val,
4e8f195d
TT
639 struct type *search_type,
640 CORE_ADDR arg_addr,
641 struct type *arg_type,
642 struct value **result)
643{
644 int i, result_count = 0;
645
646 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
647 {
6b850546
DT
648 LONGEST offset = baseclass_offset (search_type, i, valaddr,
649 embedded_offset,
650 address, val);
a109c7c1 651
4e8f195d
TT
652 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
653 {
8af8e3bc
PA
654 if (address + embedded_offset + offset >= arg_addr
655 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
656 {
657 ++result_count;
658 if (!*result)
659 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 660 address + embedded_offset + offset);
4e8f195d
TT
661 }
662 }
663 else
664 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
665 valaddr,
666 embedded_offset + offset,
667 address, val,
4e8f195d
TT
668 TYPE_BASECLASS (search_type, i),
669 arg_addr,
670 arg_type,
671 result);
672 }
673
674 return result_count;
675}
676
677/* A helper for value_dynamic_cast. This implements the second of two
678 runtime checks: we look for a unique public sibling class of the
679 argument's declared class. */
680
681static int
682dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc 683 const gdb_byte *valaddr,
6b850546 684 LONGEST embedded_offset,
4e8f195d 685 CORE_ADDR address,
8af8e3bc 686 struct value *val,
4e8f195d
TT
687 struct type *search_type,
688 struct value **result)
689{
690 int i, result_count = 0;
691
692 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
693 {
6b850546 694 LONGEST offset;
4e8f195d
TT
695
696 if (! BASETYPE_VIA_PUBLIC (search_type, i))
697 continue;
698
8af8e3bc
PA
699 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
700 address, val);
4e8f195d
TT
701 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
702 {
703 ++result_count;
704 if (*result == NULL)
705 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 706 address + embedded_offset + offset);
4e8f195d
TT
707 }
708 else
709 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
710 valaddr,
711 embedded_offset + offset,
712 address, val,
4e8f195d
TT
713 TYPE_BASECLASS (search_type, i),
714 result);
715 }
716
717 return result_count;
718}
719
720/* The C++ dynamic_cast operator. */
721
722struct value *
723value_dynamic_cast (struct type *type, struct value *arg)
724{
6b850546
DT
725 int full, using_enc;
726 LONGEST top;
4e8f195d
TT
727 struct type *resolved_type = check_typedef (type);
728 struct type *arg_type = check_typedef (value_type (arg));
729 struct type *class_type, *rtti_type;
730 struct value *result, *tem, *original_arg = arg;
731 CORE_ADDR addr;
aa006118 732 int is_ref = TYPE_IS_REFERENCE (resolved_type);
4e8f195d
TT
733
734 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
aa006118 735 && !TYPE_IS_REFERENCE (resolved_type))
4e8f195d
TT
736 error (_("Argument to dynamic_cast must be a pointer or reference type"));
737 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 738 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
739 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
740
741 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
742 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
743 {
744 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
745 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
746 && value_as_long (arg) == 0))
747 error (_("Argument to dynamic_cast does not have pointer type"));
748 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
749 {
750 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 751 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
752 error (_("Argument to dynamic_cast does "
753 "not have pointer to class type"));
4e8f195d
TT
754 }
755
756 /* Handle NULL pointers. */
757 if (value_as_long (arg) == 0)
758 return value_zero (type, not_lval);
759
760 arg = value_ind (arg);
761 }
762 else
763 {
4753d33b 764 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
765 error (_("Argument to dynamic_cast does not have class type"));
766 }
767
768 /* If the classes are the same, just return the argument. */
769 if (class_types_same_p (class_type, arg_type))
770 return value_cast (type, arg);
771
772 /* If the target type is a unique base class of the argument's
773 declared type, just cast it. */
774 if (is_ancestor (class_type, arg_type))
775 {
776 if (is_unique_ancestor (class_type, arg))
777 return value_cast (type, original_arg);
778 error (_("Ambiguous dynamic_cast"));
779 }
780
781 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
782 if (! rtti_type)
783 error (_("Couldn't determine value's most derived type for dynamic_cast"));
784
785 /* Compute the most derived object's address. */
786 addr = value_address (arg);
787 if (full)
788 {
789 /* Done. */
790 }
791 else if (using_enc)
792 addr += top;
793 else
794 addr += top + value_embedded_offset (arg);
795
796 /* dynamic_cast<void *> means to return a pointer to the
797 most-derived object. */
798 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
799 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
800 return value_at_lazy (type, addr);
801
802 tem = value_at (type, addr);
9f1f738a 803 type = value_type (tem);
4e8f195d
TT
804
805 /* The first dynamic check specified in 5.2.7. */
806 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
807 {
808 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
809 return tem;
810 result = NULL;
811 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
812 value_contents_for_printing (tem),
813 value_embedded_offset (tem),
814 value_address (tem), tem,
4e8f195d
TT
815 rtti_type, addr,
816 arg_type,
817 &result) == 1)
818 return value_cast (type,
a65cfae5
AV
819 is_ref
820 ? value_ref (result, TYPE_CODE (resolved_type))
821 : value_addr (result));
4e8f195d
TT
822 }
823
824 /* The second dynamic check specified in 5.2.7. */
825 result = NULL;
826 if (is_public_ancestor (arg_type, rtti_type)
827 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
828 value_contents_for_printing (tem),
829 value_embedded_offset (tem),
830 value_address (tem), tem,
4e8f195d
TT
831 rtti_type, &result) == 1)
832 return value_cast (type,
a65cfae5
AV
833 is_ref
834 ? value_ref (result, TYPE_CODE (resolved_type))
835 : value_addr (result));
4e8f195d
TT
836
837 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
838 return value_zero (type, not_lval);
839
840 error (_("dynamic_cast failed"));
841}
842
c906108c
SS
843/* Create a value of type TYPE that is zero, and return it. */
844
f23631e4 845struct value *
fba45db2 846value_zero (struct type *type, enum lval_type lv)
c906108c 847{
f23631e4 848 struct value *val = allocate_value (type);
c906108c 849
bb7da2bf 850 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
851 return val;
852}
853
18a46dbe 854/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
855
856struct value *
18a46dbe 857value_one (struct type *type)
301f0ecf
DE
858{
859 struct type *type1 = check_typedef (type);
4e608b4f 860 struct value *val;
301f0ecf
DE
861
862 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
863 {
e17a4113 864 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 865 gdb_byte v[16];
a109c7c1 866
e17a4113 867 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
868 val = value_from_decfloat (type, v);
869 }
870 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
871 {
872 val = value_from_double (type, (DOUBLEST) 1);
873 }
874 else if (is_integral_type (type1))
875 {
876 val = value_from_longest (type, (LONGEST) 1);
877 }
120bd360
KW
878 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
879 {
880 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
881 int i;
882 LONGEST low_bound, high_bound;
120bd360
KW
883 struct value *tmp;
884
cfa6f054
KW
885 if (!get_array_bounds (type1, &low_bound, &high_bound))
886 error (_("Could not determine the vector bounds"));
887
120bd360 888 val = allocate_value (type);
cfa6f054 889 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 890 {
18a46dbe 891 tmp = value_one (eltype);
120bd360
KW
892 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
893 value_contents_all (tmp), TYPE_LENGTH (eltype));
894 }
895 }
301f0ecf
DE
896 else
897 {
898 error (_("Not a numeric type."));
899 }
900
18a46dbe
JK
901 /* value_one result is never used for assignments to. */
902 gdb_assert (VALUE_LVAL (val) == not_lval);
903
301f0ecf
DE
904 return val;
905}
906
80180f79
SA
907/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
908 The type of the created value may differ from the passed type TYPE.
909 Make sure to retrieve the returned values's new type after this call
910 e.g. in case the type is a variable length array. */
4e5d721f
DE
911
912static struct value *
913get_value_at (struct type *type, CORE_ADDR addr, int lazy)
914{
915 struct value *val;
916
917 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
918 error (_("Attempt to dereference a generic pointer."));
919
a3d34bf4 920 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 921
a3d34bf4
PA
922 if (!lazy)
923 value_fetch_lazy (val);
4e5d721f
DE
924
925 return val;
926}
927
070ad9f0 928/* Return a value with type TYPE located at ADDR.
c906108c
SS
929
930 Call value_at only if the data needs to be fetched immediately;
931 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
932 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 933 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 934 is tested in the value_contents macro, which is used if and when
80180f79
SA
935 the contents are actually required. The type of the created value
936 may differ from the passed type TYPE. Make sure to retrieve the
937 returned values's new type after this call e.g. in case the type
938 is a variable length array.
c906108c
SS
939
940 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 941 adjustments before or after calling it. */
c906108c 942
f23631e4 943struct value *
00a4c844 944value_at (struct type *type, CORE_ADDR addr)
c906108c 945{
4e5d721f 946 return get_value_at (type, addr, 0);
c906108c
SS
947}
948
80180f79
SA
949/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
950 The type of the created value may differ from the passed type TYPE.
951 Make sure to retrieve the returned values's new type after this call
952 e.g. in case the type is a variable length array. */
c906108c 953
f23631e4 954struct value *
00a4c844 955value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 956{
4e5d721f 957 return get_value_at (type, addr, 1);
c906108c
SS
958}
959
e6ca34fc 960void
23f945bf 961read_value_memory (struct value *val, LONGEST bit_offset,
e6ca34fc
PA
962 int stack, CORE_ADDR memaddr,
963 gdb_byte *buffer, size_t length)
964{
3ae385af
SM
965 ULONGEST xfered_total = 0;
966 struct gdbarch *arch = get_value_arch (val);
967 int unit_size = gdbarch_addressable_memory_unit_size (arch);
6d7e9d3b
YQ
968 enum target_object object;
969
970 object = stack ? TARGET_OBJECT_STACK_MEMORY : TARGET_OBJECT_MEMORY;
5a2eb0ef 971
3ae385af 972 while (xfered_total < length)
5a2eb0ef
YQ
973 {
974 enum target_xfer_status status;
3ae385af 975 ULONGEST xfered_partial;
5a2eb0ef
YQ
976
977 status = target_xfer_partial (current_target.beneath,
6d7e9d3b 978 object, NULL,
3ae385af
SM
979 buffer + xfered_total * unit_size, NULL,
980 memaddr + xfered_total,
981 length - xfered_total,
982 &xfered_partial);
5a2eb0ef
YQ
983
984 if (status == TARGET_XFER_OK)
985 /* nothing */;
bc113b4e 986 else if (status == TARGET_XFER_UNAVAILABLE)
23f945bf
AA
987 mark_value_bits_unavailable (val, (xfered_total * HOST_CHAR_BIT
988 + bit_offset),
989 xfered_partial * HOST_CHAR_BIT);
5a2eb0ef 990 else if (status == TARGET_XFER_EOF)
3ae385af 991 memory_error (TARGET_XFER_E_IO, memaddr + xfered_total);
e6ca34fc 992 else
3ae385af 993 memory_error (status, memaddr + xfered_total);
e6ca34fc 994
3ae385af 995 xfered_total += xfered_partial;
5a2eb0ef 996 QUIT;
e6ca34fc
PA
997 }
998}
c906108c
SS
999
1000/* Store the contents of FROMVAL into the location of TOVAL.
1001 Return a new value with the location of TOVAL and contents of FROMVAL. */
1002
f23631e4
AC
1003struct value *
1004value_assign (struct value *toval, struct value *fromval)
c906108c 1005{
52f0bd74 1006 struct type *type;
f23631e4 1007 struct value *val;
cb741690 1008 struct frame_id old_frame;
c906108c 1009
88e3b34b 1010 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1011 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1012
994b9211 1013 toval = coerce_ref (toval);
c906108c 1014
df407dfe 1015 type = value_type (toval);
c906108c 1016 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1017 fromval = value_cast (type, fromval);
c906108c 1018 else
63092375
DJ
1019 {
1020 /* Coerce arrays and functions to pointers, except for arrays
1021 which only live in GDB's storage. */
1022 if (!value_must_coerce_to_target (fromval))
1023 fromval = coerce_array (fromval);
1024 }
1025
f168693b 1026 type = check_typedef (type);
c906108c 1027
ac3eeb49
MS
1028 /* Since modifying a register can trash the frame chain, and
1029 modifying memory can trash the frame cache, we save the old frame
1030 and then restore the new frame afterwards. */
206415a3 1031 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1032
c906108c
SS
1033 switch (VALUE_LVAL (toval))
1034 {
1035 case lval_internalvar:
1036 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1037 return value_of_internalvar (get_type_arch (type),
1038 VALUE_INTERNALVAR (toval));
c906108c
SS
1039
1040 case lval_internalvar_component:
d9e98382 1041 {
6b850546 1042 LONGEST offset = value_offset (toval);
d9e98382
SDJ
1043
1044 /* Are we dealing with a bitfield?
1045
1046 It is important to mention that `value_parent (toval)' is
1047 non-NULL iff `value_bitsize (toval)' is non-zero. */
1048 if (value_bitsize (toval))
1049 {
1050 /* VALUE_INTERNALVAR below refers to the parent value, while
1051 the offset is relative to this parent value. */
1052 gdb_assert (value_parent (value_parent (toval)) == NULL);
1053 offset += value_offset (value_parent (toval));
1054 }
1055
1056 set_internalvar_component (VALUE_INTERNALVAR (toval),
1057 offset,
1058 value_bitpos (toval),
1059 value_bitsize (toval),
1060 fromval);
1061 }
c906108c
SS
1062 break;
1063
1064 case lval_memory:
1065 {
fc1a4b47 1066 const gdb_byte *dest_buffer;
c5aa993b
JM
1067 CORE_ADDR changed_addr;
1068 int changed_len;
10c42a71 1069 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1070
df407dfe 1071 if (value_bitsize (toval))
c5aa993b 1072 {
2d88202a 1073 struct value *parent = value_parent (toval);
2d88202a 1074
a109c7c1 1075 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1076 changed_len = (value_bitpos (toval)
1077 + value_bitsize (toval)
c5aa993b
JM
1078 + HOST_CHAR_BIT - 1)
1079 / HOST_CHAR_BIT;
c906108c 1080
4ea48cc1
DJ
1081 /* If we can read-modify-write exactly the size of the
1082 containing type (e.g. short or int) then do so. This
1083 is safer for volatile bitfields mapped to hardware
1084 registers. */
1085 if (changed_len < TYPE_LENGTH (type)
1086 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1087 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1088 changed_len = TYPE_LENGTH (type);
1089
c906108c 1090 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1091 error (_("Can't handle bitfields which "
1092 "don't fit in a %d bit word."),
baa6f10b 1093 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1094
2d88202a 1095 read_memory (changed_addr, buffer, changed_len);
50810684 1096 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1097 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1098 dest_buffer = buffer;
1099 }
c906108c
SS
1100 else
1101 {
42ae5230 1102 changed_addr = value_address (toval);
3ae385af 1103 changed_len = type_length_units (type);
0fd88904 1104 dest_buffer = value_contents (fromval);
c906108c
SS
1105 }
1106
972daa01 1107 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1108 }
1109 break;
1110
492254e9 1111 case lval_register:
c906108c 1112 {
c906108c 1113 struct frame_info *frame;
d80b854b 1114 struct gdbarch *gdbarch;
ff2e87ac 1115 int value_reg;
c906108c 1116
41b56feb
KB
1117 /* Figure out which frame this is in currently.
1118
1119 We use VALUE_FRAME_ID for obtaining the value's frame id instead of
1120 VALUE_NEXT_FRAME_ID due to requiring a frame which may be passed to
1121 put_frame_register_bytes() below. That function will (eventually)
1122 perform the necessary unwind operation by first obtaining the next
1123 frame. */
0c16dd26 1124 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
41b56feb 1125
0c16dd26 1126 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1127
1128 if (!frame)
8a3fe4f8 1129 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1130
1131 gdbarch = get_frame_arch (frame);
3e871532
LM
1132
1133 if (value_bitsize (toval))
492254e9 1134 {
3e871532 1135 struct value *parent = value_parent (toval);
6b850546 1136 LONGEST offset = value_offset (parent) + value_offset (toval);
3e871532
LM
1137 int changed_len;
1138 gdb_byte buffer[sizeof (LONGEST)];
1139 int optim, unavail;
1140
1141 changed_len = (value_bitpos (toval)
1142 + value_bitsize (toval)
1143 + HOST_CHAR_BIT - 1)
1144 / HOST_CHAR_BIT;
1145
1146 if (changed_len > (int) sizeof (LONGEST))
1147 error (_("Can't handle bitfields which "
1148 "don't fit in a %d bit word."),
1149 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1150
1151 if (!get_frame_register_bytes (frame, value_reg, offset,
1152 changed_len, buffer,
1153 &optim, &unavail))
1154 {
1155 if (optim)
1156 throw_error (OPTIMIZED_OUT_ERROR,
1157 _("value has been optimized out"));
1158 if (unavail)
1159 throw_error (NOT_AVAILABLE_ERROR,
1160 _("value is not available"));
1161 }
1162
1163 modify_field (type, buffer, value_as_long (fromval),
1164 value_bitpos (toval), value_bitsize (toval));
1165
1166 put_frame_register_bytes (frame, value_reg, offset,
1167 changed_len, buffer);
492254e9 1168 }
c906108c 1169 else
492254e9 1170 {
3e871532
LM
1171 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1172 type))
00fa51f6 1173 {
3e871532
LM
1174 /* If TOVAL is a special machine register requiring
1175 conversion of program values to a special raw
1176 format. */
1177 gdbarch_value_to_register (gdbarch, frame,
1178 VALUE_REGNUM (toval), type,
1179 value_contents (fromval));
00fa51f6 1180 }
c906108c 1181 else
00fa51f6
UW
1182 {
1183 put_frame_register_bytes (frame, value_reg,
1184 value_offset (toval),
1185 TYPE_LENGTH (type),
1186 value_contents (fromval));
1187 }
ff2e87ac 1188 }
00fa51f6 1189
162078c8 1190 observer_notify_register_changed (frame, value_reg);
ff2e87ac 1191 break;
c906108c 1192 }
5f5233d4
PA
1193
1194 case lval_computed:
1195 {
c8f2448a 1196 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1197
ac71a68c
JK
1198 if (funcs->write != NULL)
1199 {
1200 funcs->write (toval, fromval);
1201 break;
1202 }
5f5233d4 1203 }
ac71a68c 1204 /* Fall through. */
5f5233d4 1205
c906108c 1206 default:
8a3fe4f8 1207 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1208 }
1209
cb741690
DJ
1210 /* Assigning to the stack pointer, frame pointer, and other
1211 (architecture and calling convention specific) registers may
d649a38e 1212 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1213 also can. We just do this on all assignments to registers or
1214 memory, for simplicity's sake; I doubt the slowdown matters. */
1215 switch (VALUE_LVAL (toval))
1216 {
1217 case lval_memory:
1218 case lval_register:
0e03807e 1219 case lval_computed:
cb741690 1220
d649a38e 1221 observer_notify_target_changed (&current_target);
cb741690 1222
ac3eeb49
MS
1223 /* Having destroyed the frame cache, restore the selected
1224 frame. */
cb741690
DJ
1225
1226 /* FIXME: cagney/2002-11-02: There has to be a better way of
1227 doing this. Instead of constantly saving/restoring the
1228 frame. Why not create a get_selected_frame() function that,
1229 having saved the selected frame's ID can automatically
1230 re-find the previously selected frame automatically. */
1231
1232 {
1233 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1234
cb741690
DJ
1235 if (fi != NULL)
1236 select_frame (fi);
1237 }
1238
1239 break;
1240 default:
1241 break;
1242 }
1243
ac3eeb49
MS
1244 /* If the field does not entirely fill a LONGEST, then zero the sign
1245 bits. If the field is signed, and is negative, then sign
1246 extend. */
df407dfe
AC
1247 if ((value_bitsize (toval) > 0)
1248 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1249 {
1250 LONGEST fieldval = value_as_long (fromval);
df407dfe 1251 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1252
1253 fieldval &= valmask;
ac3eeb49
MS
1254 if (!TYPE_UNSIGNED (type)
1255 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1256 fieldval |= ~valmask;
1257
1258 fromval = value_from_longest (type, fieldval);
1259 }
1260
4aac0db7
UW
1261 /* The return value is a copy of TOVAL so it shares its location
1262 information, but its contents are updated from FROMVAL. This
1263 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1264 val = value_copy (toval);
4aac0db7 1265 set_value_lazy (val, 0);
0fd88904 1266 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1267 TYPE_LENGTH (type));
4aac0db7
UW
1268
1269 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1270 in the case of pointer types. For object types, the enclosing type
1271 and embedded offset must *not* be copied: the target object refered
1272 to by TOVAL retains its original dynamic type after assignment. */
1273 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1274 {
1275 set_value_enclosing_type (val, value_enclosing_type (fromval));
1276 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1277 }
c5aa993b 1278
c906108c
SS
1279 return val;
1280}
1281
1282/* Extend a value VAL to COUNT repetitions of its type. */
1283
f23631e4
AC
1284struct value *
1285value_repeat (struct value *arg1, int count)
c906108c 1286{
f23631e4 1287 struct value *val;
c906108c
SS
1288
1289 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1290 error (_("Only values in memory can be extended with '@'."));
c906108c 1291 if (count < 1)
8a3fe4f8 1292 error (_("Invalid number %d of repetitions."), count);
c906108c 1293
4754a64e 1294 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1295
c906108c 1296 VALUE_LVAL (val) = lval_memory;
42ae5230 1297 set_value_address (val, value_address (arg1));
c906108c 1298
24e6bcee
PA
1299 read_value_memory (val, 0, value_stack (val), value_address (val),
1300 value_contents_all_raw (val),
3ae385af 1301 type_length_units (value_enclosing_type (val)));
24e6bcee 1302
c906108c
SS
1303 return val;
1304}
1305
f23631e4 1306struct value *
9df2fbc4 1307value_of_variable (struct symbol *var, const struct block *b)
c906108c 1308{
63e43d3a 1309 struct frame_info *frame = NULL;
c906108c 1310
63e43d3a 1311 if (symbol_read_needs_frame (var))
61212c0f 1312 frame = get_selected_frame (_("No frame selected."));
c906108c 1313
63e43d3a 1314 return read_var_value (var, b, frame);
c906108c
SS
1315}
1316
61212c0f 1317struct value *
270140bd 1318address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1319{
1320 struct type *type = SYMBOL_TYPE (var);
1321 struct value *val;
1322
1323 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1324 Lazy evaluation pays off here. */
61212c0f
UW
1325
1326 val = value_of_variable (var, b);
9f1f738a 1327 type = value_type (val);
61212c0f
UW
1328
1329 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1330 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1331 {
42ae5230 1332 CORE_ADDR addr = value_address (val);
a109c7c1 1333
61212c0f
UW
1334 return value_from_pointer (lookup_pointer_type (type), addr);
1335 }
1336
1337 /* Not a memory address; check what the problem was. */
1338 switch (VALUE_LVAL (val))
1339 {
1340 case lval_register:
1341 {
1342 struct frame_info *frame;
1343 const char *regname;
1344
41b56feb 1345 frame = frame_find_by_id (VALUE_NEXT_FRAME_ID (val));
61212c0f
UW
1346 gdb_assert (frame);
1347
1348 regname = gdbarch_register_name (get_frame_arch (frame),
1349 VALUE_REGNUM (val));
1350 gdb_assert (regname && *regname);
1351
1352 error (_("Address requested for identifier "
1353 "\"%s\" which is in register $%s"),
1354 SYMBOL_PRINT_NAME (var), regname);
1355 break;
1356 }
1357
1358 default:
1359 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1360 SYMBOL_PRINT_NAME (var));
1361 break;
1362 }
1363
1364 return val;
1365}
1366
63092375
DJ
1367/* Return one if VAL does not live in target memory, but should in order
1368 to operate on it. Otherwise return zero. */
1369
1370int
1371value_must_coerce_to_target (struct value *val)
1372{
1373 struct type *valtype;
1374
1375 /* The only lval kinds which do not live in target memory. */
1376 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1377 && VALUE_LVAL (val) != lval_internalvar
1378 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1379 return 0;
1380
1381 valtype = check_typedef (value_type (val));
1382
1383 switch (TYPE_CODE (valtype))
1384 {
1385 case TYPE_CODE_ARRAY:
3cbaedff 1386 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1387 case TYPE_CODE_STRING:
1388 return 1;
1389 default:
1390 return 0;
1391 }
1392}
1393
3e43a32a
MS
1394/* Make sure that VAL lives in target memory if it's supposed to. For
1395 instance, strings are constructed as character arrays in GDB's
1396 storage, and this function copies them to the target. */
63092375
DJ
1397
1398struct value *
1399value_coerce_to_target (struct value *val)
1400{
1401 LONGEST length;
1402 CORE_ADDR addr;
1403
1404 if (!value_must_coerce_to_target (val))
1405 return val;
1406
1407 length = TYPE_LENGTH (check_typedef (value_type (val)));
1408 addr = allocate_space_in_inferior (length);
1409 write_memory (addr, value_contents (val), length);
1410 return value_at_lazy (value_type (val), addr);
1411}
1412
ac3eeb49
MS
1413/* Given a value which is an array, return a value which is a pointer
1414 to its first element, regardless of whether or not the array has a
1415 nonzero lower bound.
c906108c 1416
ac3eeb49
MS
1417 FIXME: A previous comment here indicated that this routine should
1418 be substracting the array's lower bound. It's not clear to me that
1419 this is correct. Given an array subscripting operation, it would
1420 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1421
1422 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1423
ac3eeb49
MS
1424 However I believe a more appropriate and logical place to account
1425 for the lower bound is to do so in value_subscript, essentially
1426 computing:
c906108c
SS
1427
1428 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1429
ac3eeb49
MS
1430 As further evidence consider what would happen with operations
1431 other than array subscripting, where the caller would get back a
1432 value that had an address somewhere before the actual first element
1433 of the array, and the information about the lower bound would be
581e13c1 1434 lost because of the coercion to pointer type. */
c906108c 1435
f23631e4
AC
1436struct value *
1437value_coerce_array (struct value *arg1)
c906108c 1438{
df407dfe 1439 struct type *type = check_typedef (value_type (arg1));
c906108c 1440
63092375
DJ
1441 /* If the user tries to do something requiring a pointer with an
1442 array that has not yet been pushed to the target, then this would
1443 be a good time to do so. */
1444 arg1 = value_coerce_to_target (arg1);
1445
c906108c 1446 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1447 error (_("Attempt to take address of value not located in memory."));
c906108c 1448
4478b372 1449 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1450 value_address (arg1));
c906108c
SS
1451}
1452
1453/* Given a value which is a function, return a value which is a pointer
1454 to it. */
1455
f23631e4
AC
1456struct value *
1457value_coerce_function (struct value *arg1)
c906108c 1458{
f23631e4 1459 struct value *retval;
c906108c
SS
1460
1461 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1462 error (_("Attempt to take address of value not located in memory."));
c906108c 1463
df407dfe 1464 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1465 value_address (arg1));
c906108c 1466 return retval;
c5aa993b 1467}
c906108c 1468
ac3eeb49
MS
1469/* Return a pointer value for the object for which ARG1 is the
1470 contents. */
c906108c 1471
f23631e4
AC
1472struct value *
1473value_addr (struct value *arg1)
c906108c 1474{
f23631e4 1475 struct value *arg2;
df407dfe 1476 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1477
aa006118 1478 if (TYPE_IS_REFERENCE (type))
c906108c 1479 {
3326303b
MG
1480 if (value_bits_synthetic_pointer (arg1, value_embedded_offset (arg1),
1481 TARGET_CHAR_BIT * TYPE_LENGTH (type)))
1482 arg1 = coerce_ref (arg1);
1483 else
1484 {
1485 /* Copy the value, but change the type from (T&) to (T*). We
1486 keep the same location information, which is efficient, and
1487 allows &(&X) to get the location containing the reference.
1488 Do the same to its enclosing type for consistency. */
1489 struct type *type_ptr
1490 = lookup_pointer_type (TYPE_TARGET_TYPE (type));
1491 struct type *enclosing_type
1492 = check_typedef (value_enclosing_type (arg1));
1493 struct type *enclosing_type_ptr
1494 = lookup_pointer_type (TYPE_TARGET_TYPE (enclosing_type));
1495
1496 arg2 = value_copy (arg1);
1497 deprecated_set_value_type (arg2, type_ptr);
1498 set_value_enclosing_type (arg2, enclosing_type_ptr);
a22df60a 1499
3326303b
MG
1500 return arg2;
1501 }
c906108c
SS
1502 }
1503 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1504 return value_coerce_function (arg1);
1505
63092375
DJ
1506 /* If this is an array that has not yet been pushed to the target,
1507 then this would be a good time to force it to memory. */
1508 arg1 = value_coerce_to_target (arg1);
1509
c906108c 1510 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1511 error (_("Attempt to take address of value not located in memory."));
c906108c 1512
581e13c1 1513 /* Get target memory address. */
df407dfe 1514 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1515 (value_address (arg1)
13c3b5f5 1516 + value_embedded_offset (arg1)));
c906108c
SS
1517
1518 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1519 full derived object's type ... */
4dfea560
DE
1520 set_value_enclosing_type (arg2,
1521 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1522 /* ... and also the relative position of the subobject in the full
1523 object. */
b44d461b 1524 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1525 return arg2;
1526}
1527
ac3eeb49
MS
1528/* Return a reference value for the object for which ARG1 is the
1529 contents. */
fb933624
DJ
1530
1531struct value *
a65cfae5 1532value_ref (struct value *arg1, enum type_code refcode)
fb933624
DJ
1533{
1534 struct value *arg2;
fb933624 1535 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1536
a65cfae5
AV
1537 gdb_assert (refcode == TYPE_CODE_REF || refcode == TYPE_CODE_RVALUE_REF);
1538
1539 if ((TYPE_CODE (type) == TYPE_CODE_REF
1540 || TYPE_CODE (type) == TYPE_CODE_RVALUE_REF)
1541 && TYPE_CODE (type) == refcode)
fb933624
DJ
1542 return arg1;
1543
1544 arg2 = value_addr (arg1);
a65cfae5 1545 deprecated_set_value_type (arg2, lookup_reference_type (type, refcode));
fb933624
DJ
1546 return arg2;
1547}
1548
ac3eeb49
MS
1549/* Given a value of a pointer type, apply the C unary * operator to
1550 it. */
c906108c 1551
f23631e4
AC
1552struct value *
1553value_ind (struct value *arg1)
c906108c
SS
1554{
1555 struct type *base_type;
f23631e4 1556 struct value *arg2;
c906108c 1557
994b9211 1558 arg1 = coerce_array (arg1);
c906108c 1559
df407dfe 1560 base_type = check_typedef (value_type (arg1));
c906108c 1561
8cf6f0b1
TT
1562 if (VALUE_LVAL (arg1) == lval_computed)
1563 {
c8f2448a 1564 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1565
1566 if (funcs->indirect)
1567 {
1568 struct value *result = funcs->indirect (arg1);
1569
1570 if (result)
1571 return result;
1572 }
1573 }
1574
22fe0fbb 1575 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1576 {
1577 struct type *enc_type;
a109c7c1 1578
ac3eeb49
MS
1579 /* We may be pointing to something embedded in a larger object.
1580 Get the real type of the enclosing object. */
4754a64e 1581 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1582 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1583
1584 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1585 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1586 /* For functions, go through find_function_addr, which knows
1587 how to handle function descriptors. */
ac3eeb49
MS
1588 arg2 = value_at_lazy (enc_type,
1589 find_function_addr (arg1, NULL));
0d5de010 1590 else
581e13c1 1591 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1592 arg2 = value_at_lazy (enc_type,
1593 (value_as_address (arg1)
1594 - value_pointed_to_offset (arg1)));
0d5de010 1595
9f1f738a 1596 enc_type = value_type (arg2);
dfcee124 1597 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1598 }
1599
8a3fe4f8 1600 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1601 return 0; /* For lint -- never reached. */
c906108c
SS
1602}
1603\f
39d37385
PA
1604/* Create a value for an array by allocating space in GDB, copying the
1605 data into that space, and then setting up an array value.
c906108c 1606
ac3eeb49
MS
1607 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1608 is populated from the values passed in ELEMVEC.
c906108c
SS
1609
1610 The element type of the array is inherited from the type of the
1611 first element, and all elements must have the same size (though we
ac3eeb49 1612 don't currently enforce any restriction on their types). */
c906108c 1613
f23631e4
AC
1614struct value *
1615value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1616{
1617 int nelem;
1618 int idx;
6b850546 1619 ULONGEST typelength;
f23631e4 1620 struct value *val;
c906108c 1621 struct type *arraytype;
c906108c 1622
ac3eeb49
MS
1623 /* Validate that the bounds are reasonable and that each of the
1624 elements have the same size. */
c906108c
SS
1625
1626 nelem = highbound - lowbound + 1;
1627 if (nelem <= 0)
1628 {
8a3fe4f8 1629 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1630 }
3ae385af 1631 typelength = type_length_units (value_enclosing_type (elemvec[0]));
c906108c
SS
1632 for (idx = 1; idx < nelem; idx++)
1633 {
3ae385af
SM
1634 if (type_length_units (value_enclosing_type (elemvec[idx]))
1635 != typelength)
c906108c 1636 {
8a3fe4f8 1637 error (_("array elements must all be the same size"));
c906108c
SS
1638 }
1639 }
1640
e3506a9f
UW
1641 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1642 lowbound, highbound);
c906108c
SS
1643
1644 if (!current_language->c_style_arrays)
1645 {
1646 val = allocate_value (arraytype);
1647 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1648 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1649 typelength);
c906108c
SS
1650 return val;
1651 }
1652
63092375
DJ
1653 /* Allocate space to store the array, and then initialize it by
1654 copying in each element. */
c906108c 1655
63092375 1656 val = allocate_value (arraytype);
c906108c 1657 for (idx = 0; idx < nelem; idx++)
39d37385 1658 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1659 return val;
c906108c
SS
1660}
1661
6c7a06a3 1662struct value *
e3a3797e 1663value_cstring (const char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1664{
1665 struct value *val;
1666 int lowbound = current_language->string_lower_bound;
63375b74 1667 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1668 struct type *stringtype
e3506a9f 1669 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1670
1671 val = allocate_value (stringtype);
1672 memcpy (value_contents_raw (val), ptr, len);
1673 return val;
1674}
1675
ac3eeb49
MS
1676/* Create a value for a string constant by allocating space in the
1677 inferior, copying the data into that space, and returning the
1678 address with type TYPE_CODE_STRING. PTR points to the string
1679 constant data; LEN is number of characters.
1680
1681 Note that string types are like array of char types with a lower
1682 bound of zero and an upper bound of LEN - 1. Also note that the
1683 string may contain embedded null bytes. */
c906108c 1684
f23631e4 1685struct value *
7cc3f8e2 1686value_string (const char *ptr, ssize_t len, struct type *char_type)
c906108c 1687{
f23631e4 1688 struct value *val;
c906108c 1689 int lowbound = current_language->string_lower_bound;
63375b74 1690 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1691 struct type *stringtype
e3506a9f 1692 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1693
3b7538c0
UW
1694 val = allocate_value (stringtype);
1695 memcpy (value_contents_raw (val), ptr, len);
1696 return val;
c906108c
SS
1697}
1698
c906108c 1699\f
ac3eeb49
MS
1700/* See if we can pass arguments in T2 to a function which takes
1701 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1702 a NULL-terminated vector. If some arguments need coercion of some
1703 sort, then the coerced values are written into T2. Return value is
1704 0 if the arguments could be matched, or the position at which they
1705 differ if not.
c906108c 1706
ac3eeb49
MS
1707 STATICP is nonzero if the T1 argument list came from a static
1708 member function. T2 will still include the ``this'' pointer, but
1709 it will be skipped.
c906108c
SS
1710
1711 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1712 which is the type of the instance variable. This is because we
1713 want to handle calls with objects from derived classes. This is
1714 not entirely correct: we should actually check to make sure that a
c906108c
SS
1715 requested operation is type secure, shouldn't we? FIXME. */
1716
1717static int
ad2f7632
DJ
1718typecmp (int staticp, int varargs, int nargs,
1719 struct field t1[], struct value *t2[])
c906108c
SS
1720{
1721 int i;
1722
1723 if (t2 == 0)
ac3eeb49
MS
1724 internal_error (__FILE__, __LINE__,
1725 _("typecmp: no argument list"));
ad2f7632 1726
ac3eeb49
MS
1727 /* Skip ``this'' argument if applicable. T2 will always include
1728 THIS. */
4a1970e4 1729 if (staticp)
ad2f7632
DJ
1730 t2 ++;
1731
1732 for (i = 0;
1733 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1734 i++)
c906108c 1735 {
c5aa993b 1736 struct type *tt1, *tt2;
ad2f7632 1737
c5aa993b
JM
1738 if (!t2[i])
1739 return i + 1;
ad2f7632
DJ
1740
1741 tt1 = check_typedef (t1[i].type);
df407dfe 1742 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1743
aa006118 1744 if (TYPE_IS_REFERENCE (tt1)
8301c89e 1745 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1746 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1747 == TYPE_CODE (tt2)))
c906108c
SS
1748 {
1749 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1750 t2[i] = value_coerce_array (t2[i]);
1751 else
a65cfae5 1752 t2[i] = value_ref (t2[i], TYPE_CODE (tt1));
c906108c
SS
1753 continue;
1754 }
1755
802db21b
DB
1756 /* djb - 20000715 - Until the new type structure is in the
1757 place, and we can attempt things like implicit conversions,
1758 we need to do this so you can take something like a map<const
1759 char *>, and properly access map["hello"], because the
1760 argument to [] will be a reference to a pointer to a char,
ac3eeb49 1761 and the argument will be a pointer to a char. */
aa006118 1762 while (TYPE_IS_REFERENCE (tt1) || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1763 {
1764 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1765 }
ac3eeb49
MS
1766 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1767 || TYPE_CODE(tt2) == TYPE_CODE_PTR
aa006118 1768 || TYPE_IS_REFERENCE (tt2))
c906108c 1769 {
ac3eeb49 1770 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1771 }
c5aa993b
JM
1772 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1773 continue;
ac3eeb49
MS
1774 /* Array to pointer is a `trivial conversion' according to the
1775 ARM. */
c906108c 1776
ac3eeb49
MS
1777 /* We should be doing much hairier argument matching (see
1778 section 13.2 of the ARM), but as a quick kludge, just check
1779 for the same type code. */
df407dfe 1780 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1781 return i + 1;
c906108c 1782 }
ad2f7632 1783 if (varargs || t2[i] == NULL)
c5aa993b 1784 return 0;
ad2f7632 1785 return i + 1;
c906108c
SS
1786}
1787
b1af9e97
TT
1788/* Helper class for do_search_struct_field that updates *RESULT_PTR
1789 and *LAST_BOFFSET, and possibly throws an exception if the field
1790 search has yielded ambiguous results. */
c906108c 1791
b1af9e97
TT
1792static void
1793update_search_result (struct value **result_ptr, struct value *v,
6b850546 1794 LONGEST *last_boffset, LONGEST boffset,
b1af9e97
TT
1795 const char *name, struct type *type)
1796{
1797 if (v != NULL)
1798 {
1799 if (*result_ptr != NULL
1800 /* The result is not ambiguous if all the classes that are
1801 found occupy the same space. */
1802 && *last_boffset != boffset)
1803 error (_("base class '%s' is ambiguous in type '%s'"),
1804 name, TYPE_SAFE_NAME (type));
1805 *result_ptr = v;
1806 *last_boffset = boffset;
1807 }
1808}
c906108c 1809
b1af9e97
TT
1810/* A helper for search_struct_field. This does all the work; most
1811 arguments are as passed to search_struct_field. The result is
1812 stored in *RESULT_PTR, which must be initialized to NULL.
1813 OUTERMOST_TYPE is the type of the initial type passed to
1814 search_struct_field; this is used for error reporting when the
1815 lookup is ambiguous. */
1816
1817static void
6b850546 1818do_search_struct_field (const char *name, struct value *arg1, LONGEST offset,
b1af9e97
TT
1819 struct type *type, int looking_for_baseclass,
1820 struct value **result_ptr,
6b850546 1821 LONGEST *last_boffset,
b1af9e97 1822 struct type *outermost_type)
c906108c
SS
1823{
1824 int i;
edf3d5f3 1825 int nbases;
c906108c 1826
f168693b 1827 type = check_typedef (type);
edf3d5f3 1828 nbases = TYPE_N_BASECLASSES (type);
c906108c 1829
c5aa993b 1830 if (!looking_for_baseclass)
c906108c
SS
1831 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1832 {
0d5cff50 1833 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1834
db577aea 1835 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1836 {
f23631e4 1837 struct value *v;
a109c7c1 1838
d6a843b5 1839 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1840 v = value_static_field (type, i);
c906108c 1841 else
b1af9e97
TT
1842 v = value_primitive_field (arg1, offset, i, type);
1843 *result_ptr = v;
1844 return;
c906108c
SS
1845 }
1846
1847 if (t_field_name
47c6ee49 1848 && t_field_name[0] == '\0')
c906108c
SS
1849 {
1850 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1851
c906108c
SS
1852 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1853 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1854 {
ac3eeb49
MS
1855 /* Look for a match through the fields of an anonymous
1856 union, or anonymous struct. C++ provides anonymous
1857 unions.
c906108c 1858
1b831c93
AC
1859 In the GNU Chill (now deleted from GDB)
1860 implementation of variant record types, each
1861 <alternative field> has an (anonymous) union type,
1862 each member of the union represents a <variant
1863 alternative>. Each <variant alternative> is
1864 represented as a struct, with a member for each
1865 <variant field>. */
c5aa993b 1866
b1af9e97 1867 struct value *v = NULL;
6b850546 1868 LONGEST new_offset = offset;
c906108c 1869
db034ac5
AC
1870 /* This is pretty gross. In G++, the offset in an
1871 anonymous union is relative to the beginning of the
1b831c93
AC
1872 enclosing struct. In the GNU Chill (now deleted
1873 from GDB) implementation of variant records, the
1874 bitpos is zero in an anonymous union field, so we
ac3eeb49 1875 have to add the offset of the union here. */
c906108c
SS
1876 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1877 || (TYPE_NFIELDS (field_type) > 0
1878 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1879 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1880
b1af9e97
TT
1881 do_search_struct_field (name, arg1, new_offset,
1882 field_type,
1883 looking_for_baseclass, &v,
1884 last_boffset,
1885 outermost_type);
c906108c 1886 if (v)
b1af9e97
TT
1887 {
1888 *result_ptr = v;
1889 return;
1890 }
c906108c
SS
1891 }
1892 }
1893 }
1894
c5aa993b 1895 for (i = 0; i < nbases; i++)
c906108c 1896 {
b1af9e97 1897 struct value *v = NULL;
c906108c 1898 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1899 /* If we are looking for baseclasses, this is what we get when
1900 we hit them. But it could happen that the base part's member
1901 name is not yet filled in. */
c906108c
SS
1902 int found_baseclass = (looking_for_baseclass
1903 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1904 && (strcmp_iw (name,
1905 TYPE_BASECLASS_NAME (type,
1906 i)) == 0));
6b850546 1907 LONGEST boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1908
1909 if (BASETYPE_VIA_VIRTUAL (type, i))
1910 {
3e3d7139 1911 struct value *v2;
c906108c
SS
1912
1913 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1914 value_contents_for_printing (arg1),
1915 value_embedded_offset (arg1) + offset,
1916 value_address (arg1),
1917 arg1);
c906108c 1918
ac3eeb49 1919 /* The virtual base class pointer might have been clobbered
581e13c1 1920 by the user program. Make sure that it still points to a
ac3eeb49 1921 valid memory location. */
c906108c 1922
1a334831
TT
1923 boffset += value_embedded_offset (arg1) + offset;
1924 if (boffset < 0
1925 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1926 {
1927 CORE_ADDR base_addr;
c5aa993b 1928
42ae5230 1929 base_addr = value_address (arg1) + boffset;
08039c9e 1930 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1931 if (target_read_memory (base_addr,
1932 value_contents_raw (v2),
acc900c2 1933 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1934 error (_("virtual baseclass botch"));
c906108c
SS
1935 }
1936 else
1937 {
1a334831
TT
1938 v2 = value_copy (arg1);
1939 deprecated_set_value_type (v2, basetype);
1940 set_value_embedded_offset (v2, boffset);
c906108c
SS
1941 }
1942
1943 if (found_baseclass)
b1af9e97
TT
1944 v = v2;
1945 else
1946 {
1947 do_search_struct_field (name, v2, 0,
1948 TYPE_BASECLASS (type, i),
1949 looking_for_baseclass,
1950 result_ptr, last_boffset,
1951 outermost_type);
1952 }
c906108c
SS
1953 }
1954 else if (found_baseclass)
1955 v = value_primitive_field (arg1, offset, i, type);
1956 else
b1af9e97
TT
1957 {
1958 do_search_struct_field (name, arg1,
1959 offset + TYPE_BASECLASS_BITPOS (type,
1960 i) / 8,
1961 basetype, looking_for_baseclass,
1962 result_ptr, last_boffset,
1963 outermost_type);
1964 }
1965
1966 update_search_result (result_ptr, v, last_boffset,
1967 boffset, name, outermost_type);
c906108c 1968 }
b1af9e97
TT
1969}
1970
1971/* Helper function used by value_struct_elt to recurse through
8a13d42d
SM
1972 baseclasses. Look for a field NAME in ARG1. Search in it assuming
1973 it has (class) type TYPE. If found, return value, else return NULL.
b1af9e97
TT
1974
1975 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1976 fields, look for a baseclass named NAME. */
1977
1978static struct value *
8a13d42d 1979search_struct_field (const char *name, struct value *arg1,
b1af9e97
TT
1980 struct type *type, int looking_for_baseclass)
1981{
1982 struct value *result = NULL;
6b850546 1983 LONGEST boffset = 0;
b1af9e97 1984
8a13d42d 1985 do_search_struct_field (name, arg1, 0, type, looking_for_baseclass,
b1af9e97
TT
1986 &result, &boffset, type);
1987 return result;
c906108c
SS
1988}
1989
ac3eeb49 1990/* Helper function used by value_struct_elt to recurse through
581e13c1 1991 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1992 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1993 TYPE.
1994
1995 If found, return value, else if name matched and args not return
1996 (value) -1, else return NULL. */
c906108c 1997
f23631e4 1998static struct value *
714f19d5 1999search_struct_method (const char *name, struct value **arg1p,
6b850546 2000 struct value **args, LONGEST offset,
aa1ee363 2001 int *static_memfuncp, struct type *type)
c906108c
SS
2002{
2003 int i;
f23631e4 2004 struct value *v;
c906108c
SS
2005 int name_matched = 0;
2006 char dem_opname[64];
2007
f168693b 2008 type = check_typedef (type);
c906108c
SS
2009 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
2010 {
0d5cff50 2011 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2012
581e13c1 2013 /* FIXME! May need to check for ARM demangling here. */
61012eef
GB
2014 if (startswith (t_field_name, "__") ||
2015 startswith (t_field_name, "op") ||
2016 startswith (t_field_name, "type"))
c906108c 2017 {
c5aa993b
JM
2018 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2019 t_field_name = dem_opname;
2020 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2021 t_field_name = dem_opname;
c906108c 2022 }
db577aea 2023 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2024 {
2025 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2026 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2027
a109c7c1 2028 name_matched = 1;
de17c821 2029 check_stub_method_group (type, i);
c906108c 2030 if (j > 0 && args == 0)
3e43a32a
MS
2031 error (_("cannot resolve overloaded method "
2032 "`%s': no arguments supplied"), name);
acf5ed49 2033 else if (j == 0 && args == 0)
c906108c 2034 {
acf5ed49
DJ
2035 v = value_fn_field (arg1p, f, j, type, offset);
2036 if (v != NULL)
2037 return v;
c906108c 2038 }
acf5ed49
DJ
2039 else
2040 while (j >= 0)
2041 {
acf5ed49 2042 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2043 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2044 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2045 TYPE_FN_FIELD_ARGS (f, j), args))
2046 {
2047 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2048 return value_virtual_fn_field (arg1p, f, j,
2049 type, offset);
2050 if (TYPE_FN_FIELD_STATIC_P (f, j)
2051 && static_memfuncp)
acf5ed49
DJ
2052 *static_memfuncp = 1;
2053 v = value_fn_field (arg1p, f, j, type, offset);
2054 if (v != NULL)
2055 return v;
2056 }
2057 j--;
2058 }
c906108c
SS
2059 }
2060 }
2061
2062 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2063 {
6b850546
DT
2064 LONGEST base_offset;
2065 LONGEST this_offset;
c906108c
SS
2066
2067 if (BASETYPE_VIA_VIRTUAL (type, i))
2068 {
086280be 2069 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2070 struct value *base_val;
086280be
UW
2071 const gdb_byte *base_valaddr;
2072
2073 /* The virtual base class pointer might have been
581e13c1 2074 clobbered by the user program. Make sure that it
8301c89e 2075 still points to a valid memory location. */
086280be
UW
2076
2077 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2078 {
6c18f3e0
SP
2079 gdb_byte *tmp;
2080 struct cleanup *back_to;
2081 CORE_ADDR address;
2082
224c3ddb 2083 tmp = (gdb_byte *) xmalloc (TYPE_LENGTH (baseclass));
6c18f3e0
SP
2084 back_to = make_cleanup (xfree, tmp);
2085 address = value_address (*arg1p);
a109c7c1 2086
8af8e3bc 2087 if (target_read_memory (address + offset,
086280be
UW
2088 tmp, TYPE_LENGTH (baseclass)) != 0)
2089 error (_("virtual baseclass botch"));
8af8e3bc
PA
2090
2091 base_val = value_from_contents_and_address (baseclass,
2092 tmp,
2093 address + offset);
2094 base_valaddr = value_contents_for_printing (base_val);
2095 this_offset = 0;
6c18f3e0 2096 do_cleanups (back_to);
c5aa993b
JM
2097 }
2098 else
8af8e3bc
PA
2099 {
2100 base_val = *arg1p;
2101 base_valaddr = value_contents_for_printing (*arg1p);
2102 this_offset = offset;
2103 }
c5aa993b 2104
086280be 2105 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2106 this_offset, value_address (base_val),
2107 base_val);
c5aa993b 2108 }
c906108c
SS
2109 else
2110 {
2111 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2112 }
c906108c
SS
2113 v = search_struct_method (name, arg1p, args, base_offset + offset,
2114 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2115 if (v == (struct value *) - 1)
c906108c
SS
2116 {
2117 name_matched = 1;
2118 }
2119 else if (v)
2120 {
ac3eeb49
MS
2121 /* FIXME-bothner: Why is this commented out? Why is it here? */
2122 /* *arg1p = arg1_tmp; */
c906108c 2123 return v;
c5aa993b 2124 }
c906108c 2125 }
c5aa993b 2126 if (name_matched)
f23631e4 2127 return (struct value *) - 1;
c5aa993b
JM
2128 else
2129 return NULL;
c906108c
SS
2130}
2131
2132/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2133 extract the component named NAME from the ultimate target
2134 structure/union and return it as a value with its appropriate type.
c906108c
SS
2135 ERR is used in the error message if *ARGP's type is wrong.
2136
2137 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2138 an appropriate method. Also, handle derived types.
c906108c
SS
2139
2140 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2141 where the truthvalue of whether the function that was resolved was
2142 a static member function or not is stored.
2143
ac3eeb49
MS
2144 ERR is an error message to be printed in case the field is not
2145 found. */
c906108c 2146
f23631e4
AC
2147struct value *
2148value_struct_elt (struct value **argp, struct value **args,
714f19d5 2149 const char *name, int *static_memfuncp, const char *err)
c906108c 2150{
52f0bd74 2151 struct type *t;
f23631e4 2152 struct value *v;
c906108c 2153
994b9211 2154 *argp = coerce_array (*argp);
c906108c 2155
df407dfe 2156 t = check_typedef (value_type (*argp));
c906108c
SS
2157
2158 /* Follow pointers until we get to a non-pointer. */
2159
aa006118 2160 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
c906108c
SS
2161 {
2162 *argp = value_ind (*argp);
2163 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2164 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2165 *argp = coerce_array (*argp);
df407dfe 2166 t = check_typedef (value_type (*argp));
c906108c
SS
2167 }
2168
c5aa993b 2169 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2170 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2171 error (_("Attempt to extract a component of a value that is not a %s."),
2172 err);
c906108c
SS
2173
2174 /* Assume it's not, unless we see that it is. */
2175 if (static_memfuncp)
c5aa993b 2176 *static_memfuncp = 0;
c906108c
SS
2177
2178 if (!args)
2179 {
2180 /* if there are no arguments ...do this... */
2181
ac3eeb49
MS
2182 /* Try as a field first, because if we succeed, there is less
2183 work to be done. */
8a13d42d 2184 v = search_struct_field (name, *argp, t, 0);
c906108c
SS
2185 if (v)
2186 return v;
2187
2188 /* C++: If it was not found as a data field, then try to
7b83ea04 2189 return it as a pointer to a method. */
ac3eeb49
MS
2190 v = search_struct_method (name, argp, args, 0,
2191 static_memfuncp, t);
c906108c 2192
f23631e4 2193 if (v == (struct value *) - 1)
55b39184 2194 error (_("Cannot take address of method %s."), name);
c906108c
SS
2195 else if (v == 0)
2196 {
2197 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2198 error (_("There is no member or method named %s."), name);
c906108c 2199 else
8a3fe4f8 2200 error (_("There is no member named %s."), name);
c906108c
SS
2201 }
2202 return v;
2203 }
2204
8301c89e
DE
2205 v = search_struct_method (name, argp, args, 0,
2206 static_memfuncp, t);
7168a814 2207
f23631e4 2208 if (v == (struct value *) - 1)
c906108c 2209 {
3e43a32a
MS
2210 error (_("One of the arguments you tried to pass to %s could not "
2211 "be converted to what the function wants."), name);
c906108c
SS
2212 }
2213 else if (v == 0)
2214 {
ac3eeb49
MS
2215 /* See if user tried to invoke data as function. If so, hand it
2216 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2217 gdb should give an error. */
8a13d42d 2218 v = search_struct_field (name, *argp, t, 0);
fa8de41e
TT
2219 /* If we found an ordinary field, then it is not a method call.
2220 So, treat it as if it were a static member function. */
2221 if (v && static_memfuncp)
2222 *static_memfuncp = 1;
c906108c
SS
2223 }
2224
2225 if (!v)
79afc5ef
SW
2226 throw_error (NOT_FOUND_ERROR,
2227 _("Structure has no component named %s."), name);
c906108c
SS
2228 return v;
2229}
2230
b5b08fb4
SC
2231/* Given *ARGP, a value of type structure or union, or a pointer/reference
2232 to a structure or union, extract and return its component (field) of
2233 type FTYPE at the specified BITPOS.
2234 Throw an exception on error. */
2235
2236struct value *
2237value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2238 const char *err)
2239{
2240 struct type *t;
b5b08fb4 2241 int i;
b5b08fb4
SC
2242
2243 *argp = coerce_array (*argp);
2244
2245 t = check_typedef (value_type (*argp));
2246
aa006118 2247 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
b5b08fb4
SC
2248 {
2249 *argp = value_ind (*argp);
2250 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2251 *argp = coerce_array (*argp);
2252 t = check_typedef (value_type (*argp));
2253 }
2254
2255 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2256 && TYPE_CODE (t) != TYPE_CODE_UNION)
2257 error (_("Attempt to extract a component of a value that is not a %s."),
2258 err);
2259
2260 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2261 {
2262 if (!field_is_static (&TYPE_FIELD (t, i))
2263 && bitpos == TYPE_FIELD_BITPOS (t, i)
2264 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2265 return value_primitive_field (*argp, 0, i, t);
2266 }
2267
2268 error (_("No field with matching bitpos and type."));
2269
2270 /* Never hit. */
2271 return NULL;
2272}
2273
ac3eeb49 2274/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2275 specified method. Return the pointer to the fn_field list FN_LIST of
2276 overloaded instances defined in the source language. If available
2277 and matching, a vector of matching xmethods defined in extension
2278 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2279
2280 Helper function for value_find_oload_list.
2281 ARGP is a pointer to a pointer to a value (the object).
2282 METHOD is a string containing the method name.
2283 OFFSET is the offset within the value.
2284 TYPE is the assumed type of the object.
233e8b28
SC
2285 FN_LIST is the pointer to matching overloaded instances defined in
2286 source language. Since this is a recursive function, *FN_LIST
2287 should be set to NULL when calling this function.
2288 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2289 0 when calling this function.
2290 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2291 should also be set to NULL when calling this function.
ac3eeb49
MS
2292 BASETYPE is set to the actual type of the subobject where the
2293 method is found.
581e13c1 2294 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2295
233e8b28 2296static void
714f19d5 2297find_method_list (struct value **argp, const char *method,
6b850546 2298 LONGEST offset, struct type *type,
233e8b28
SC
2299 struct fn_field **fn_list, int *num_fns,
2300 VEC (xmethod_worker_ptr) **xm_worker_vec,
6b850546 2301 struct type **basetype, LONGEST *boffset)
c906108c
SS
2302{
2303 int i;
233e8b28
SC
2304 struct fn_field *f = NULL;
2305 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2306
233e8b28 2307 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
f168693b 2308 type = check_typedef (type);
c906108c 2309
233e8b28
SC
2310 /* First check in object itself.
2311 This function is called recursively to search through base classes.
2312 If there is a source method match found at some stage, then we need not
2313 look for source methods in consequent recursive calls. */
2314 if ((*fn_list) == NULL)
c906108c 2315 {
233e8b28 2316 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2317 {
233e8b28
SC
2318 /* pai: FIXME What about operators and type conversions? */
2319 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2320
2321 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2322 {
2323 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2324 f = TYPE_FN_FIELDLIST1 (type, i);
2325 *fn_list = f;
4a1970e4 2326
233e8b28
SC
2327 *num_fns = len;
2328 *basetype = type;
2329 *boffset = offset;
4a1970e4 2330
233e8b28
SC
2331 /* Resolve any stub methods. */
2332 check_stub_method_group (type, i);
4a1970e4 2333
233e8b28
SC
2334 break;
2335 }
c5aa993b
JM
2336 }
2337 }
2338
233e8b28
SC
2339 /* Unlike source methods, xmethods can be accumulated over successive
2340 recursive calls. In other words, an xmethod named 'm' in a class
2341 will not hide an xmethod named 'm' in its base class(es). We want
2342 it to be this way because xmethods are after all convenience functions
2343 and hence there is no point restricting them with something like method
2344 hiding. Moreover, if hiding is done for xmethods as well, then we will
2345 have to provide a mechanism to un-hide (like the 'using' construct). */
2346 worker_vec = get_matching_xmethod_workers (type, method);
2347 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2348
2349 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2350 VEC_free (xmethod_worker_ptr, worker_vec);
2351 *xm_worker_vec = new_vec;
2352
2353 /* If source methods are not found in current class, look for them in the
2354 base classes. We also have to go through the base classes to gather
2355 extension methods. */
c906108c
SS
2356 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2357 {
6b850546 2358 LONGEST base_offset;
a109c7c1 2359
c906108c
SS
2360 if (BASETYPE_VIA_VIRTUAL (type, i))
2361 {
086280be 2362 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2363 value_contents_for_printing (*argp),
2364 value_offset (*argp) + offset,
2365 value_address (*argp), *argp);
c5aa993b 2366 }
ac3eeb49
MS
2367 else /* Non-virtual base, simply use bit position from debug
2368 info. */
c906108c
SS
2369 {
2370 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2371 }
233e8b28
SC
2372
2373 find_method_list (argp, method, base_offset + offset,
2374 TYPE_BASECLASS (type, i), fn_list, num_fns,
2375 xm_worker_vec, basetype, boffset);
c906108c 2376 }
c906108c
SS
2377}
2378
233e8b28
SC
2379/* Return the list of overloaded methods of a specified name. The methods
2380 could be those GDB finds in the binary, or xmethod. Methods found in
2381 the binary are returned in FN_LIST, and xmethods are returned in
2382 XM_WORKER_VEC.
ac3eeb49
MS
2383
2384 ARGP is a pointer to a pointer to a value (the object).
2385 METHOD is the method name.
2386 OFFSET is the offset within the value contents.
233e8b28
SC
2387 FN_LIST is the pointer to matching overloaded instances defined in
2388 source language.
ac3eeb49 2389 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2390 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2391 extension languages.
ac3eeb49
MS
2392 BASETYPE is set to the type of the base subobject that defines the
2393 method.
581e13c1 2394 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2395
233e8b28 2396static void
714f19d5 2397value_find_oload_method_list (struct value **argp, const char *method,
6b850546 2398 LONGEST offset, struct fn_field **fn_list,
233e8b28
SC
2399 int *num_fns,
2400 VEC (xmethod_worker_ptr) **xm_worker_vec,
6b850546 2401 struct type **basetype, LONGEST *boffset)
c906108c 2402{
c5aa993b 2403 struct type *t;
c906108c 2404
df407dfe 2405 t = check_typedef (value_type (*argp));
c906108c 2406
ac3eeb49 2407 /* Code snarfed from value_struct_elt. */
aa006118 2408 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_IS_REFERENCE (t))
c906108c
SS
2409 {
2410 *argp = value_ind (*argp);
2411 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2412 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2413 *argp = coerce_array (*argp);
df407dfe 2414 t = check_typedef (value_type (*argp));
c906108c 2415 }
c5aa993b 2416
c5aa993b
JM
2417 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2418 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2419 error (_("Attempt to extract a component of a "
2420 "value that is not a struct or union"));
c5aa993b 2421
233e8b28
SC
2422 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2423
2424 /* Clear the lists. */
2425 *fn_list = NULL;
2426 *num_fns = 0;
2427 *xm_worker_vec = NULL;
2428
2429 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2430 basetype, boffset);
c906108c
SS
2431}
2432
da096638 2433/* Given an array of arguments (ARGS) (which includes an
c906108c 2434 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2435 arguments NARGS, the NAME of a function, and whether it's a method or
2436 not (METHOD), find the best function that matches on the argument types
2437 according to the overload resolution rules.
c906108c 2438
4c3376c8
SW
2439 METHOD can be one of three values:
2440 NON_METHOD for non-member functions.
2441 METHOD: for member functions.
2442 BOTH: used for overload resolution of operators where the
2443 candidates are expected to be either member or non member
581e13c1 2444 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2445 (representing 'this') is expected to be a reference to the
2446 target object, and will be dereferenced when attempting the
2447 non-member search.
2448
c906108c
SS
2449 In the case of class methods, the parameter OBJ is an object value
2450 in which to search for overloaded methods.
2451
2452 In the case of non-method functions, the parameter FSYM is a symbol
2453 corresponding to one of the overloaded functions.
2454
2455 Return value is an integer: 0 -> good match, 10 -> debugger applied
2456 non-standard coercions, 100 -> incompatible.
2457
2458 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2459 If a non-method is being searched for, SYMP will hold the symbol
2460 for it.
c906108c
SS
2461
2462 If a method is being searched for, and it is a static method,
2463 then STATICP will point to a non-zero value.
2464
7322dca9
SW
2465 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2466 ADL overload candidates when performing overload resolution for a fully
2467 qualified name.
2468
e66d4446
SC
2469 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2470 read while picking the best overload match (it may be all zeroes and thus
2471 not have a vtable pointer), in which case skip virtual function lookup.
2472 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2473 the result type.
2474
c906108c
SS
2475 Note: This function does *not* check the value of
2476 overload_resolution. Caller must check it to see whether overload
581e13c1 2477 resolution is permitted. */
c906108c
SS
2478
2479int
da096638 2480find_overload_match (struct value **args, int nargs,
4c3376c8 2481 const char *name, enum oload_search_type method,
28c64fc2 2482 struct value **objp, struct symbol *fsym,
ac3eeb49 2483 struct value **valp, struct symbol **symp,
e66d4446
SC
2484 int *staticp, const int no_adl,
2485 const enum noside noside)
c906108c 2486{
7f8c9282 2487 struct value *obj = (objp ? *objp : NULL);
da096638 2488 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2489 /* Index of best overloaded function. */
4c3376c8
SW
2490 int func_oload_champ = -1;
2491 int method_oload_champ = -1;
233e8b28
SC
2492 int src_method_oload_champ = -1;
2493 int ext_method_oload_champ = -1;
4c3376c8 2494
ac3eeb49 2495 /* The measure for the current best match. */
4c3376c8
SW
2496 struct badness_vector *method_badness = NULL;
2497 struct badness_vector *func_badness = NULL;
233e8b28
SC
2498 struct badness_vector *ext_method_badness = NULL;
2499 struct badness_vector *src_method_badness = NULL;
4c3376c8 2500
f23631e4 2501 struct value *temp = obj;
ac3eeb49
MS
2502 /* For methods, the list of overloaded methods. */
2503 struct fn_field *fns_ptr = NULL;
2504 /* For non-methods, the list of overloaded function symbols. */
2505 struct symbol **oload_syms = NULL;
233e8b28
SC
2506 /* For xmethods, the VEC of xmethod workers. */
2507 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2508 /* Number of overloaded instances being considered. */
2509 int num_fns = 0;
c5aa993b 2510 struct type *basetype = NULL;
6b850546 2511 LONGEST boffset;
7322dca9
SW
2512
2513 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2514
8d577d32 2515 const char *obj_type_name = NULL;
7322dca9 2516 const char *func_name = NULL;
8d577d32 2517 enum oload_classification match_quality;
4c3376c8 2518 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2519 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2520 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2521 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2522
ac3eeb49 2523 /* Get the list of overloaded methods or functions. */
4c3376c8 2524 if (method == METHOD || method == BOTH)
c906108c 2525 {
a2ca50ae 2526 gdb_assert (obj);
94af9270
KS
2527
2528 /* OBJ may be a pointer value rather than the object itself. */
2529 obj = coerce_ref (obj);
2530 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2531 obj = coerce_ref (value_ind (obj));
df407dfe 2532 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2533
2534 /* First check whether this is a data member, e.g. a pointer to
2535 a function. */
2536 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2537 {
8a13d42d 2538 *valp = search_struct_field (name, obj,
94af9270
KS
2539 check_typedef (value_type (obj)), 0);
2540 if (*valp)
2541 {
2542 *staticp = 1;
f748fb40 2543 do_cleanups (all_cleanups);
94af9270
KS
2544 return 0;
2545 }
2546 }
c906108c 2547
4c3376c8 2548 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2549 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2550 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2551 /* If this is a method only search, and no methods were found
2552 the search has faild. */
233e8b28 2553 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2554 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2555 obj_type_name,
2556 (obj_type_name && *obj_type_name) ? "::" : "",
2557 name);
4a1970e4 2558 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2559 been resolved by find_method_list via
2560 value_find_oload_method_list above. */
4c3376c8
SW
2561 if (fns_ptr)
2562 {
4bfb94b8 2563 gdb_assert (TYPE_SELF_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2564
233e8b28
SC
2565 src_method_oload_champ = find_oload_champ (args, nargs,
2566 num_fns, fns_ptr, NULL,
2567 NULL, &src_method_badness);
2568
2569 src_method_match_quality = classify_oload_match
2570 (src_method_badness, nargs,
2571 oload_method_static_p (fns_ptr, src_method_oload_champ));
2572
2573 make_cleanup (xfree, src_method_badness);
2574 }
4c3376c8 2575
233e8b28
SC
2576 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2577 {
2578 ext_method_oload_champ = find_oload_champ (args, nargs,
2579 0, NULL, xm_worker_vec,
2580 NULL, &ext_method_badness);
2581 ext_method_match_quality = classify_oload_match (ext_method_badness,
2582 nargs, 0);
2583 make_cleanup (xfree, ext_method_badness);
2584 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2585 }
2586
233e8b28
SC
2587 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2588 {
2589 switch (compare_badness (ext_method_badness, src_method_badness))
2590 {
2591 case 0: /* Src method and xmethod are equally good. */
233e8b28
SC
2592 /* If src method and xmethod are equally good, then
2593 xmethod should be the winner. Hence, fall through to the
2594 case where a xmethod is better than the source
2595 method, except when the xmethod match quality is
2596 non-standard. */
2597 /* FALLTHROUGH */
2598 case 1: /* Src method and ext method are incompatible. */
2599 /* If ext method match is not standard, then let source method
2600 win. Otherwise, fallthrough to let xmethod win. */
2601 if (ext_method_match_quality != STANDARD)
2602 {
2603 method_oload_champ = src_method_oload_champ;
2604 method_badness = src_method_badness;
2605 ext_method_oload_champ = -1;
2606 method_match_quality = src_method_match_quality;
2607 break;
2608 }
2609 /* FALLTHROUGH */
2610 case 2: /* Ext method is champion. */
2611 method_oload_champ = ext_method_oload_champ;
2612 method_badness = ext_method_badness;
2613 src_method_oload_champ = -1;
2614 method_match_quality = ext_method_match_quality;
2615 break;
2616 case 3: /* Src method is champion. */
2617 method_oload_champ = src_method_oload_champ;
2618 method_badness = src_method_badness;
2619 ext_method_oload_champ = -1;
2620 method_match_quality = src_method_match_quality;
2621 break;
2622 default:
2623 gdb_assert_not_reached ("Unexpected overload comparison "
2624 "result");
2625 break;
2626 }
2627 }
2628 else if (src_method_oload_champ >= 0)
2629 {
2630 method_oload_champ = src_method_oload_champ;
2631 method_badness = src_method_badness;
2632 method_match_quality = src_method_match_quality;
2633 }
2634 else if (ext_method_oload_champ >= 0)
2635 {
2636 method_oload_champ = ext_method_oload_champ;
2637 method_badness = ext_method_badness;
2638 method_match_quality = ext_method_match_quality;
2639 }
c906108c 2640 }
4c3376c8
SW
2641
2642 if (method == NON_METHOD || method == BOTH)
c906108c 2643 {
7322dca9 2644 const char *qualified_name = NULL;
c906108c 2645
b021a221
MS
2646 /* If the overload match is being search for both as a method
2647 and non member function, the first argument must now be
2648 dereferenced. */
4c3376c8 2649 if (method == BOTH)
2b214ea6 2650 args[0] = value_ind (args[0]);
4c3376c8 2651
7322dca9
SW
2652 if (fsym)
2653 {
2654 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2655
2656 /* If we have a function with a C++ name, try to extract just
2657 the function part. Do not try this for non-functions (e.g.
2658 function pointers). */
2659 if (qualified_name
3e43a32a
MS
2660 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2661 == TYPE_CODE_FUNC)
7322dca9
SW
2662 {
2663 char *temp;
2664
2665 temp = cp_func_name (qualified_name);
2666
2667 /* If cp_func_name did not remove anything, the name of the
2668 symbol did not include scope or argument types - it was
2669 probably a C-style function. */
2670 if (temp)
2671 {
2672 make_cleanup (xfree, temp);
2673 if (strcmp (temp, qualified_name) == 0)
2674 func_name = NULL;
2675 else
2676 func_name = temp;
2677 }
2678 }
2679 }
2680 else
94af9270 2681 {
7322dca9
SW
2682 func_name = name;
2683 qualified_name = name;
94af9270 2684 }
d9639e13 2685
94af9270
KS
2686 /* If there was no C++ name, this must be a C-style function or
2687 not a function at all. Just return the same symbol. Do the
2688 same if cp_func_name fails for some reason. */
8d577d32 2689 if (func_name == NULL)
7b83ea04 2690 {
917317f4 2691 *symp = fsym;
5fe41fbf 2692 do_cleanups (all_cleanups);
7b83ea04
AC
2693 return 0;
2694 }
917317f4 2695
da096638 2696 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2697 func_name,
2698 qualified_name,
2699 &oload_syms,
2700 &func_badness,
2701 no_adl);
8d577d32 2702
4c3376c8
SW
2703 if (func_oload_champ >= 0)
2704 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2705
2706 make_cleanup (xfree, oload_syms);
2707 make_cleanup (xfree, func_badness);
8d577d32
DC
2708 }
2709
7322dca9 2710 /* Did we find a match ? */
4c3376c8 2711 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2712 throw_error (NOT_FOUND_ERROR,
2713 _("No symbol \"%s\" in current context."),
2714 name);
8d577d32 2715
4c3376c8
SW
2716 /* If we have found both a method match and a function
2717 match, find out which one is better, and calculate match
2718 quality. */
2719 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2720 {
2721 switch (compare_badness (func_badness, method_badness))
2722 {
2723 case 0: /* Top two contenders are equally good. */
b021a221
MS
2724 /* FIXME: GDB does not support the general ambiguous case.
2725 All candidates should be collected and presented the
2726 user. */
4c3376c8
SW
2727 error (_("Ambiguous overload resolution"));
2728 break;
2729 case 1: /* Incomparable top contenders. */
2730 /* This is an error incompatible candidates
2731 should not have been proposed. */
3e43a32a
MS
2732 error (_("Internal error: incompatible "
2733 "overload candidates proposed"));
4c3376c8
SW
2734 break;
2735 case 2: /* Function champion. */
2736 method_oload_champ = -1;
2737 match_quality = func_match_quality;
2738 break;
2739 case 3: /* Method champion. */
2740 func_oload_champ = -1;
2741 match_quality = method_match_quality;
2742 break;
2743 default:
2744 error (_("Internal error: unexpected overload comparison result"));
2745 break;
2746 }
2747 }
2748 else
2749 {
2750 /* We have either a method match or a function match. */
2751 if (method_oload_champ >= 0)
2752 match_quality = method_match_quality;
2753 else
2754 match_quality = func_match_quality;
2755 }
8d577d32
DC
2756
2757 if (match_quality == INCOMPATIBLE)
2758 {
4c3376c8 2759 if (method == METHOD)
8a3fe4f8 2760 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2761 obj_type_name,
2762 (obj_type_name && *obj_type_name) ? "::" : "",
2763 name);
2764 else
8a3fe4f8 2765 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2766 func_name);
2767 }
2768 else if (match_quality == NON_STANDARD)
2769 {
4c3376c8 2770 if (method == METHOD)
3e43a32a
MS
2771 warning (_("Using non-standard conversion to match "
2772 "method %s%s%s to supplied arguments"),
8d577d32
DC
2773 obj_type_name,
2774 (obj_type_name && *obj_type_name) ? "::" : "",
2775 name);
2776 else
3e43a32a
MS
2777 warning (_("Using non-standard conversion to match "
2778 "function %s to supplied arguments"),
8d577d32
DC
2779 func_name);
2780 }
2781
4c3376c8 2782 if (staticp != NULL)
2bca57ba 2783 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2784
2785 if (method_oload_champ >= 0)
8d577d32 2786 {
233e8b28
SC
2787 if (src_method_oload_champ >= 0)
2788 {
e66d4446
SC
2789 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ)
2790 && noside != EVAL_AVOID_SIDE_EFFECTS)
2791 {
2792 *valp = value_virtual_fn_field (&temp, fns_ptr,
2793 method_oload_champ, basetype,
2794 boffset);
2795 }
233e8b28
SC
2796 else
2797 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2798 basetype, boffset);
2799 }
8d577d32 2800 else
233e8b28
SC
2801 {
2802 *valp = value_of_xmethod (clone_xmethod_worker
2803 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2804 ext_method_oload_champ)));
2805 }
8d577d32
DC
2806 }
2807 else
4c3376c8 2808 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2809
2810 if (objp)
2811 {
a4295225 2812 struct type *temp_type = check_typedef (value_type (temp));
da096638 2813 struct type *objtype = check_typedef (obj_type);
a109c7c1 2814
a4295225 2815 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638 2816 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
aa006118 2817 || TYPE_IS_REFERENCE (objtype)))
8d577d32
DC
2818 {
2819 temp = value_addr (temp);
2820 }
2821 *objp = temp;
2822 }
7322dca9
SW
2823
2824 do_cleanups (all_cleanups);
8d577d32
DC
2825
2826 switch (match_quality)
2827 {
2828 case INCOMPATIBLE:
2829 return 100;
2830 case NON_STANDARD:
2831 return 10;
2832 default: /* STANDARD */
2833 return 0;
2834 }
2835}
2836
2837/* Find the best overload match, searching for FUNC_NAME in namespaces
2838 contained in QUALIFIED_NAME until it either finds a good match or
2839 runs out of namespaces. It stores the overloaded functions in
2840 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2841 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2842 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2843 performned. */
8d577d32
DC
2844
2845static int
da096638 2846find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2847 const char *func_name,
2848 const char *qualified_name,
2849 struct symbol ***oload_syms,
7322dca9
SW
2850 struct badness_vector **oload_champ_bv,
2851 const int no_adl)
8d577d32
DC
2852{
2853 int oload_champ;
2854
da096638 2855 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2856 func_name,
2857 qualified_name, 0,
2858 oload_syms, oload_champ_bv,
7322dca9
SW
2859 &oload_champ,
2860 no_adl);
8d577d32
DC
2861
2862 return oload_champ;
2863}
2864
2865/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2866 how deep we've looked for namespaces, and the champ is stored in
2867 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2868 if it isn't. Other arguments are the same as in
2869 find_oload_champ_namespace
8d577d32
DC
2870
2871 It is the caller's responsibility to free *OLOAD_SYMS and
2872 *OLOAD_CHAMP_BV. */
2873
2874static int
da096638 2875find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2876 const char *func_name,
2877 const char *qualified_name,
2878 int namespace_len,
2879 struct symbol ***oload_syms,
2880 struct badness_vector **oload_champ_bv,
7322dca9
SW
2881 int *oload_champ,
2882 const int no_adl)
8d577d32
DC
2883{
2884 int next_namespace_len = namespace_len;
2885 int searched_deeper = 0;
2886 int num_fns = 0;
2887 struct cleanup *old_cleanups;
2888 int new_oload_champ;
2889 struct symbol **new_oload_syms;
2890 struct badness_vector *new_oload_champ_bv;
2891 char *new_namespace;
2892
2893 if (next_namespace_len != 0)
2894 {
2895 gdb_assert (qualified_name[next_namespace_len] == ':');
2896 next_namespace_len += 2;
c906108c 2897 }
ac3eeb49
MS
2898 next_namespace_len +=
2899 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2900
2901 /* Initialize these to values that can safely be xfree'd. */
2902 *oload_syms = NULL;
2903 *oload_champ_bv = NULL;
c5aa993b 2904
581e13c1 2905 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2906 If we get a good match there, use it. */
8d577d32
DC
2907
2908 if (qualified_name[next_namespace_len] == ':')
2909 {
2910 searched_deeper = 1;
2911
da096638 2912 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2913 func_name, qualified_name,
2914 next_namespace_len,
2915 oload_syms, oload_champ_bv,
7322dca9 2916 oload_champ, no_adl))
8d577d32
DC
2917 {
2918 return 1;
2919 }
2920 };
2921
2922 /* If we reach here, either we're in the deepest namespace or we
2923 didn't find a good match in a deeper namespace. But, in the
2924 latter case, we still have a bad match in a deeper namespace;
2925 note that we might not find any match at all in the current
2926 namespace. (There's always a match in the deepest namespace,
2927 because this overload mechanism only gets called if there's a
2928 function symbol to start off with.) */
2929
2930 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2931 make_cleanup (xfree, *oload_champ_bv);
224c3ddb 2932 new_namespace = (char *) alloca (namespace_len + 1);
8d577d32
DC
2933 strncpy (new_namespace, qualified_name, namespace_len);
2934 new_namespace[namespace_len] = '\0';
2935 new_oload_syms = make_symbol_overload_list (func_name,
2936 new_namespace);
7322dca9
SW
2937
2938 /* If we have reached the deepest level perform argument
2939 determined lookup. */
2940 if (!searched_deeper && !no_adl)
da096638
KS
2941 {
2942 int ix;
2943 struct type **arg_types;
2944
2945 /* Prepare list of argument types for overload resolution. */
2946 arg_types = (struct type **)
2947 alloca (nargs * (sizeof (struct type *)));
2948 for (ix = 0; ix < nargs; ix++)
2949 arg_types[ix] = value_type (args[ix]);
2950 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2951 }
7322dca9 2952
8d577d32
DC
2953 while (new_oload_syms[num_fns])
2954 ++num_fns;
2955
9cf95373 2956 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2957 NULL, NULL, new_oload_syms,
8d577d32
DC
2958 &new_oload_champ_bv);
2959
2960 /* Case 1: We found a good match. Free earlier matches (if any),
2961 and return it. Case 2: We didn't find a good match, but we're
2962 not the deepest function. Then go with the bad match that the
2963 deeper function found. Case 3: We found a bad match, and we're
2964 the deepest function. Then return what we found, even though
2965 it's a bad match. */
2966
2967 if (new_oload_champ != -1
2968 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2969 {
2970 *oload_syms = new_oload_syms;
2971 *oload_champ = new_oload_champ;
2972 *oload_champ_bv = new_oload_champ_bv;
2973 do_cleanups (old_cleanups);
2974 return 1;
2975 }
2976 else if (searched_deeper)
2977 {
2978 xfree (new_oload_syms);
2979 xfree (new_oload_champ_bv);
2980 discard_cleanups (old_cleanups);
2981 return 0;
2982 }
2983 else
2984 {
8d577d32
DC
2985 *oload_syms = new_oload_syms;
2986 *oload_champ = new_oload_champ;
2987 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2988 do_cleanups (old_cleanups);
8d577d32
DC
2989 return 0;
2990 }
2991}
2992
da096638 2993/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2994 the best match from among the overloaded methods or functions
233e8b28
SC
2995 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
2996 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
2997 non-NULL.
2998
2999 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
3000 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
3001
8d577d32
DC
3002 Return the index of the best match; store an indication of the
3003 quality of the match in OLOAD_CHAMP_BV.
3004
3005 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
3006
3007static int
9cf95373 3008find_oload_champ (struct value **args, int nargs,
8d577d32 3009 int num_fns, struct fn_field *fns_ptr,
233e8b28 3010 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
3011 struct symbol **oload_syms,
3012 struct badness_vector **oload_champ_bv)
3013{
3014 int ix;
233e8b28 3015 int fn_count;
ac3eeb49
MS
3016 /* A measure of how good an overloaded instance is. */
3017 struct badness_vector *bv;
3018 /* Index of best overloaded function. */
3019 int oload_champ = -1;
3020 /* Current ambiguity state for overload resolution. */
3021 int oload_ambiguous = 0;
3022 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3023
9cf95373 3024 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3025 alone, or in xmethods alone, but not in more than one of these
3026 groups. */
3027 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3028 == 1);
9cf95373 3029
8d577d32 3030 *oload_champ_bv = NULL;
c906108c 3031
233e8b28
SC
3032 fn_count = (xm_worker_vec != NULL
3033 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3034 : num_fns);
ac3eeb49 3035 /* Consider each candidate in turn. */
233e8b28 3036 for (ix = 0; ix < fn_count; ix++)
c906108c 3037 {
8d577d32 3038 int jj;
233e8b28 3039 int static_offset = 0;
8d577d32
DC
3040 int nparms;
3041 struct type **parm_types;
233e8b28 3042 struct xmethod_worker *worker = NULL;
8d577d32 3043
233e8b28 3044 if (xm_worker_vec != NULL)
db577aea 3045 {
233e8b28
SC
3046 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3047 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3048 }
3049 else
3050 {
233e8b28
SC
3051 if (fns_ptr != NULL)
3052 {
3053 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3054 static_offset = oload_method_static_p (fns_ptr, ix);
3055 }
3056 else
3057 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3058
8d749320 3059 parm_types = XNEWVEC (struct type *, nparms);
233e8b28
SC
3060 for (jj = 0; jj < nparms; jj++)
3061 parm_types[jj] = (fns_ptr != NULL
3062 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3063 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
8301c89e 3064 jj));
db577aea 3065 }
c906108c 3066
ac3eeb49
MS
3067 /* Compare parameter types to supplied argument types. Skip
3068 THIS for static methods. */
3069 bv = rank_function (parm_types, nparms,
da096638 3070 args + static_offset,
4a1970e4 3071 nargs - static_offset);
c5aa993b 3072
8d577d32 3073 if (!*oload_champ_bv)
c5aa993b 3074 {
8d577d32 3075 *oload_champ_bv = bv;
c5aa993b 3076 oload_champ = 0;
c5aa993b 3077 }
ac3eeb49
MS
3078 else /* See whether current candidate is better or worse than
3079 previous best. */
8d577d32 3080 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3081 {
ac3eeb49
MS
3082 case 0: /* Top two contenders are equally good. */
3083 oload_ambiguous = 1;
c5aa993b 3084 break;
ac3eeb49
MS
3085 case 1: /* Incomparable top contenders. */
3086 oload_ambiguous = 2;
c5aa993b 3087 break;
ac3eeb49
MS
3088 case 2: /* New champion, record details. */
3089 *oload_champ_bv = bv;
c5aa993b
JM
3090 oload_ambiguous = 0;
3091 oload_champ = ix;
c5aa993b
JM
3092 break;
3093 case 3:
3094 default:
3095 break;
3096 }
b8c9b27d 3097 xfree (parm_types);
6b1ba9a0
ND
3098 if (overload_debug)
3099 {
233e8b28 3100 if (fns_ptr != NULL)
ac3eeb49 3101 fprintf_filtered (gdb_stderr,
3e43a32a 3102 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3103 fns_ptr[ix].physname, nparms);
233e8b28
SC
3104 else if (xm_worker_vec != NULL)
3105 fprintf_filtered (gdb_stderr,
3106 "Xmethod worker, # of parms %d\n",
3107 nparms);
6b1ba9a0 3108 else
ac3eeb49 3109 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3110 "Overloaded function instance "
3111 "%s # of parms %d\n",
ac3eeb49
MS
3112 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3113 nparms);
4a1970e4 3114 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3115 fprintf_filtered (gdb_stderr,
3116 "...Badness @ %d : %d\n",
6403aeea 3117 jj, bv->rank[jj].rank);
3e43a32a
MS
3118 fprintf_filtered (gdb_stderr, "Overload resolution "
3119 "champion is %d, ambiguous? %d\n",
ac3eeb49 3120 oload_champ, oload_ambiguous);
6b1ba9a0 3121 }
c906108c
SS
3122 }
3123
8d577d32
DC
3124 return oload_champ;
3125}
6b1ba9a0 3126
8d577d32
DC
3127/* Return 1 if we're looking at a static method, 0 if we're looking at
3128 a non-static method or a function that isn't a method. */
c906108c 3129
8d577d32 3130static int
2bca57ba 3131oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3132{
2bca57ba 3133 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3134 return 1;
c906108c 3135 else
8d577d32
DC
3136 return 0;
3137}
c906108c 3138
8d577d32
DC
3139/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3140
3141static enum oload_classification
3142classify_oload_match (struct badness_vector *oload_champ_bv,
3143 int nargs,
3144 int static_offset)
3145{
3146 int ix;
da096638 3147 enum oload_classification worst = STANDARD;
8d577d32
DC
3148
3149 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3150 {
6403aeea
SW
3151 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3152 or worse return INCOMPATIBLE. */
3153 if (compare_ranks (oload_champ_bv->rank[ix],
3154 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3155 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3156 /* Otherwise If this conversion is as bad as
3157 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3158 else if (compare_ranks (oload_champ_bv->rank[ix],
3159 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3160 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3161 needed. */
7f8c9282 3162 }
02f0d45d 3163
da096638
KS
3164 /* If no INCOMPATIBLE classification was found, return the worst one
3165 that was found (if any). */
3166 return worst;
c906108c
SS
3167}
3168
ac3eeb49
MS
3169/* C++: return 1 is NAME is a legitimate name for the destructor of
3170 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3171 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3172 have CHECK_TYPEDEF applied, this function will apply it itself. */
3173
c906108c 3174int
d8228535 3175destructor_name_p (const char *name, struct type *type)
c906108c 3176{
c906108c
SS
3177 if (name[0] == '~')
3178 {
d8228535
JK
3179 const char *dname = type_name_no_tag_or_error (type);
3180 const char *cp = strchr (dname, '<');
c906108c
SS
3181 unsigned int len;
3182
3183 /* Do not compare the template part for template classes. */
3184 if (cp == NULL)
3185 len = strlen (dname);
3186 else
3187 len = cp - dname;
bf896cb0 3188 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3189 error (_("name of destructor must equal name of class"));
c906108c
SS
3190 else
3191 return 1;
3192 }
3193 return 0;
3194}
3195
3d567982
TT
3196/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3197 class". If the name is found, return a value representing it;
3198 otherwise throw an exception. */
3199
3200static struct value *
3201enum_constant_from_type (struct type *type, const char *name)
3202{
3203 int i;
3204 int name_len = strlen (name);
3205
3206 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3207 && TYPE_DECLARED_CLASS (type));
3208
3209 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3210 {
3211 const char *fname = TYPE_FIELD_NAME (type, i);
3212 int len;
3213
3214 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3215 || fname == NULL)
3216 continue;
3217
3218 /* Look for the trailing "::NAME", since enum class constant
3219 names are qualified here. */
3220 len = strlen (fname);
3221 if (len + 2 >= name_len
3222 && fname[len - name_len - 2] == ':'
3223 && fname[len - name_len - 1] == ':'
3224 && strcmp (&fname[len - name_len], name) == 0)
3225 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3226 }
3227
3228 error (_("no constant named \"%s\" in enum \"%s\""),
3229 name, TYPE_TAG_NAME (type));
3230}
3231
79c2c32d 3232/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3233 return the appropriate member (or the address of the member, if
3234 WANT_ADDRESS). This function is used to resolve user expressions
3235 of the form "DOMAIN::NAME". For more details on what happens, see
3236 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3237
3238struct value *
c848d642 3239value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3240 struct type *expect_type, int want_address,
79c2c32d
DC
3241 enum noside noside)
3242{
3243 switch (TYPE_CODE (curtype))
3244 {
3245 case TYPE_CODE_STRUCT:
3246 case TYPE_CODE_UNION:
ac3eeb49 3247 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3248 name, expect_type,
0d5de010 3249 want_address, noside);
79c2c32d 3250 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3251 return value_namespace_elt (curtype, name,
3252 want_address, noside);
3d567982
TT
3253
3254 case TYPE_CODE_ENUM:
3255 return enum_constant_from_type (curtype, name);
3256
79c2c32d
DC
3257 default:
3258 internal_error (__FILE__, __LINE__,
e2e0b3e5 3259 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3260 }
3261}
3262
072bba3b 3263/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3264 with respect to the methods' parameters. If the types of the
072bba3b
KS
3265 two parameter lists are the same, returns 1; 0 otherwise. This
3266 comparison may ignore any artificial parameters in T1 if
3267 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3268 the first artificial parameter in T1, assumed to be a 'this' pointer.
3269
3270 The type T2 is expected to have come from make_params (in eval.c). */
3271
3272static int
3273compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3274{
3275 int start = 0;
3276
80b23b6a 3277 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3278 ++start;
3279
3280 /* If skipping artificial fields, find the first real field
581e13c1 3281 in T1. */
072bba3b
KS
3282 if (skip_artificial)
3283 {
3284 while (start < TYPE_NFIELDS (t1)
3285 && TYPE_FIELD_ARTIFICIAL (t1, start))
3286 ++start;
3287 }
3288
581e13c1 3289 /* Now compare parameters. */
072bba3b
KS
3290
3291 /* Special case: a method taking void. T1 will contain no
3292 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3293 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3294 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3295 return 1;
3296
3297 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3298 {
3299 int i;
a109c7c1 3300
072bba3b
KS
3301 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3302 {
6403aeea 3303 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3304 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3305 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3306 return 0;
3307 }
3308
3309 return 1;
3310 }
3311
3312 return 0;
3313}
3314
c906108c 3315/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3316 return the address of this member as a "pointer to member" type.
3317 If INTYPE is non-null, then it will be the type of the member we
3318 are looking for. This will help us resolve "pointers to member
3319 functions". This function is used to resolve user expressions of
3320 the form "DOMAIN::NAME". */
c906108c 3321
63d06c5c 3322static struct value *
fba45db2 3323value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3324 struct type *curtype, const char *name,
ac3eeb49
MS
3325 struct type *intype,
3326 int want_address,
63d06c5c 3327 enum noside noside)
c906108c 3328{
52f0bd74
AC
3329 struct type *t = curtype;
3330 int i;
0d5de010 3331 struct value *v, *result;
c906108c 3332
c5aa993b 3333 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3334 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3335 error (_("Internal error: non-aggregate type "
3336 "to value_struct_elt_for_reference"));
c906108c
SS
3337
3338 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3339 {
0d5cff50 3340 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3341
6314a349 3342 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3343 {
d6a843b5 3344 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3345 {
3346 v = value_static_field (t, i);
0d5de010
DJ
3347 if (want_address)
3348 v = value_addr (v);
c906108c
SS
3349 return v;
3350 }
3351 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3352 error (_("pointers to bitfield members not allowed"));
c5aa993b 3353
0d5de010
DJ
3354 if (want_address)
3355 return value_from_longest
3356 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3357 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3358 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3359 return allocate_value (TYPE_FIELD_TYPE (t, i));
3360 else
f7e3ecae
KS
3361 {
3362 /* Try to evaluate NAME as a qualified name with implicit
3363 this pointer. In this case, attempt to return the
3364 equivalent to `this->*(&TYPE::NAME)'. */
3365 v = value_of_this_silent (current_language);
3366 if (v != NULL)
3367 {
3368 struct value *ptr;
3369 long mem_offset;
3370 struct type *type, *tmp;
3371
3372 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3373 type = check_typedef (value_type (ptr));
3374 gdb_assert (type != NULL
3375 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
4bfb94b8 3376 tmp = lookup_pointer_type (TYPE_SELF_TYPE (type));
f7e3ecae
KS
3377 v = value_cast_pointers (tmp, v, 1);
3378 mem_offset = value_as_long (ptr);
3379 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3380 result = value_from_pointer (tmp,
3381 value_as_long (v) + mem_offset);
3382 return value_ind (result);
3383 }
3384
3385 error (_("Cannot reference non-static field \"%s\""), name);
3386 }
c906108c
SS
3387 }
3388 }
3389
ac3eeb49
MS
3390 /* C++: If it was not found as a data field, then try to return it
3391 as a pointer to a method. */
c906108c 3392
c906108c
SS
3393 /* Perform all necessary dereferencing. */
3394 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3395 intype = TYPE_TARGET_TYPE (intype);
3396
3397 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3398 {
0d5cff50 3399 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3400 char dem_opname[64];
3401
61012eef
GB
3402 if (startswith (t_field_name, "__")
3403 || startswith (t_field_name, "op")
3404 || startswith (t_field_name, "type"))
c906108c 3405 {
ac3eeb49
MS
3406 if (cplus_demangle_opname (t_field_name,
3407 dem_opname, DMGL_ANSI))
c5aa993b 3408 t_field_name = dem_opname;
ac3eeb49
MS
3409 else if (cplus_demangle_opname (t_field_name,
3410 dem_opname, 0))
c906108c 3411 t_field_name = dem_opname;
c906108c 3412 }
6314a349 3413 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3414 {
072bba3b
KS
3415 int j;
3416 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3417 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3418
de17c821
DJ
3419 check_stub_method_group (t, i);
3420
c906108c
SS
3421 if (intype)
3422 {
072bba3b
KS
3423 for (j = 0; j < len; ++j)
3424 {
3425 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3426 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3427 intype, 1))
072bba3b
KS
3428 break;
3429 }
3430
3431 if (j == len)
3e43a32a
MS
3432 error (_("no member function matches "
3433 "that type instantiation"));
7f79b1c5 3434 }
c906108c 3435 else
072bba3b
KS
3436 {
3437 int ii;
7f79b1c5
DJ
3438
3439 j = -1;
53832f31 3440 for (ii = 0; ii < len; ++ii)
072bba3b 3441 {
7f79b1c5
DJ
3442 /* Skip artificial methods. This is necessary if,
3443 for example, the user wants to "print
3444 subclass::subclass" with only one user-defined
53832f31
TT
3445 constructor. There is no ambiguity in this case.
3446 We are careful here to allow artificial methods
3447 if they are the unique result. */
072bba3b 3448 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3449 {
3450 if (j == -1)
3451 j = ii;
3452 continue;
3453 }
072bba3b 3454
7f79b1c5
DJ
3455 /* Desired method is ambiguous if more than one
3456 method is defined. */
53832f31 3457 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3458 error (_("non-unique member `%s' requires "
3459 "type instantiation"), name);
072bba3b 3460
7f79b1c5
DJ
3461 j = ii;
3462 }
53832f31
TT
3463
3464 if (j == -1)
3465 error (_("no matching member function"));
072bba3b 3466 }
c5aa993b 3467
0d5de010
DJ
3468 if (TYPE_FN_FIELD_STATIC_P (f, j))
3469 {
ac3eeb49
MS
3470 struct symbol *s =
3471 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3472 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3473
0d5de010
DJ
3474 if (s == NULL)
3475 return NULL;
3476
3477 if (want_address)
63e43d3a 3478 return value_addr (read_var_value (s, 0, 0));
0d5de010 3479 else
63e43d3a 3480 return read_var_value (s, 0, 0);
0d5de010
DJ
3481 }
3482
c906108c
SS
3483 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3484 {
0d5de010
DJ
3485 if (want_address)
3486 {
3487 result = allocate_value
3488 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3489 cplus_make_method_ptr (value_type (result),
3490 value_contents_writeable (result),
0d5de010
DJ
3491 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3492 }
3493 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3494 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3495 else
3496 error (_("Cannot reference virtual member function \"%s\""),
3497 name);
c906108c
SS
3498 }
3499 else
3500 {
ac3eeb49
MS
3501 struct symbol *s =
3502 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
d12307c1 3503 0, VAR_DOMAIN, 0).symbol;
a109c7c1 3504
c906108c 3505 if (s == NULL)
0d5de010
DJ
3506 return NULL;
3507
63e43d3a 3508 v = read_var_value (s, 0, 0);
0d5de010
DJ
3509 if (!want_address)
3510 result = v;
c906108c
SS
3511 else
3512 {
0d5de010 3513 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3514 cplus_make_method_ptr (value_type (result),
3515 value_contents_writeable (result),
42ae5230 3516 value_address (v), 0);
c906108c 3517 }
c906108c 3518 }
0d5de010 3519 return result;
c906108c
SS
3520 }
3521 }
3522 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3523 {
f23631e4 3524 struct value *v;
c906108c
SS
3525 int base_offset;
3526
3527 if (BASETYPE_VIA_VIRTUAL (t, i))
3528 base_offset = 0;
3529 else
3530 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3531 v = value_struct_elt_for_reference (domain,
3532 offset + base_offset,
3533 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3534 name, intype,
3535 want_address, noside);
c906108c
SS
3536 if (v)
3537 return v;
3538 }
63d06c5c
DC
3539
3540 /* As a last chance, pretend that CURTYPE is a namespace, and look
3541 it up that way; this (frequently) works for types nested inside
3542 classes. */
3543
ac3eeb49
MS
3544 return value_maybe_namespace_elt (curtype, name,
3545 want_address, noside);
c906108c
SS
3546}
3547
79c2c32d
DC
3548/* C++: Return the member NAME of the namespace given by the type
3549 CURTYPE. */
3550
3551static struct value *
3552value_namespace_elt (const struct type *curtype,
c848d642 3553 const char *name, int want_address,
79c2c32d 3554 enum noside noside)
63d06c5c
DC
3555{
3556 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3557 want_address,
3558 noside);
63d06c5c
DC
3559
3560 if (retval == NULL)
ac3eeb49
MS
3561 error (_("No symbol \"%s\" in namespace \"%s\"."),
3562 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3563
3564 return retval;
3565}
3566
3567/* A helper function used by value_namespace_elt and
3568 value_struct_elt_for_reference. It looks up NAME inside the
3569 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3570 is a class and NAME refers to a type in CURTYPE itself (as opposed
3571 to, say, some base class of CURTYPE). */
3572
3573static struct value *
3574value_maybe_namespace_elt (const struct type *curtype,
c848d642 3575 const char *name, int want_address,
63d06c5c 3576 enum noside noside)
79c2c32d
DC
3577{
3578 const char *namespace_name = TYPE_TAG_NAME (curtype);
d12307c1 3579 struct block_symbol sym;
0d5de010 3580 struct value *result;
79c2c32d 3581
13387711 3582 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3583 get_selected_block (0), VAR_DOMAIN);
3584
d12307c1 3585 if (sym.symbol == NULL)
63d06c5c 3586 return NULL;
79c2c32d 3587 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
d12307c1
PMR
3588 && (SYMBOL_CLASS (sym.symbol) == LOC_TYPEDEF))
3589 result = allocate_value (SYMBOL_TYPE (sym.symbol));
79c2c32d 3590 else
d12307c1 3591 result = value_of_variable (sym.symbol, sym.block);
0d5de010 3592
ae6a105d 3593 if (want_address)
0d5de010
DJ
3594 result = value_addr (result);
3595
3596 return result;
79c2c32d
DC
3597}
3598
dfcee124 3599/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3600
c906108c 3601 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3602 and refer to the values computed for the object pointed to. */
c906108c
SS
3603
3604struct type *
dfcee124 3605value_rtti_indirect_type (struct value *v, int *full,
6b850546 3606 LONGEST *top, int *using_enc)
c906108c 3607{
f7e5394d 3608 struct value *target = NULL;
dfcee124
AG
3609 struct type *type, *real_type, *target_type;
3610
3611 type = value_type (v);
3612 type = check_typedef (type);
aa006118 3613 if (TYPE_IS_REFERENCE (type))
dfcee124
AG
3614 target = coerce_ref (v);
3615 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
f7e5394d 3616 {
f7e5394d 3617
492d29ea 3618 TRY
f7e5394d
SM
3619 {
3620 target = value_ind (v);
3621 }
492d29ea 3622 CATCH (except, RETURN_MASK_ERROR)
f7e5394d
SM
3623 {
3624 if (except.error == MEMORY_ERROR)
3625 {
3626 /* value_ind threw a memory error. The pointer is NULL or
3627 contains an uninitialized value: we can't determine any
3628 type. */
3629 return NULL;
3630 }
3631 throw_exception (except);
3632 }
492d29ea 3633 END_CATCH
f7e5394d 3634 }
dfcee124
AG
3635 else
3636 return NULL;
c906108c 3637
dfcee124
AG
3638 real_type = value_rtti_type (target, full, top, using_enc);
3639
3640 if (real_type)
3641 {
3642 /* Copy qualifiers to the referenced object. */
3643 target_type = value_type (target);
3644 real_type = make_cv_type (TYPE_CONST (target_type),
3645 TYPE_VOLATILE (target_type), real_type, NULL);
aa006118
AV
3646 if (TYPE_IS_REFERENCE (type))
3647 real_type = lookup_reference_type (real_type, TYPE_CODE (type));
dfcee124
AG
3648 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3649 real_type = lookup_pointer_type (real_type);
3650 else
3651 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3652
3653 /* Copy qualifiers to the pointer/reference. */
3654 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3655 real_type, NULL);
3656 }
c906108c 3657
dfcee124 3658 return real_type;
c906108c
SS
3659}
3660
3661/* Given a value pointed to by ARGP, check its real run-time type, and
3662 if that is different from the enclosing type, create a new value
3663 using the real run-time type as the enclosing type (and of the same
3664 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3665 be the correct offset to the enclosed object. RTYPE is the type,
3666 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3667 by value_rtti_type(). If these are available, they can be supplied
3668 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3669 NULL if they're not available. */
c906108c 3670
f23631e4 3671struct value *
ac3eeb49
MS
3672value_full_object (struct value *argp,
3673 struct type *rtype,
3674 int xfull, int xtop,
fba45db2 3675 int xusing_enc)
c906108c 3676{
c5aa993b 3677 struct type *real_type;
c906108c 3678 int full = 0;
6b850546 3679 LONGEST top = -1;
c906108c 3680 int using_enc = 0;
f23631e4 3681 struct value *new_val;
c906108c
SS
3682
3683 if (rtype)
3684 {
3685 real_type = rtype;
3686 full = xfull;
3687 top = xtop;
3688 using_enc = xusing_enc;
3689 }
3690 else
3691 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3692
ac3eeb49 3693 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3694 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3695 return argp;
3696
a7860e76
TT
3697 /* In a destructor we might see a real type that is a superclass of
3698 the object's type. In this case it is better to leave the object
3699 as-is. */
3700 if (full
3701 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3702 return argp;
3703
c906108c 3704 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3705 type is wrong, set it. */
3706 /* pai: FIXME -- sounds iffy */
c906108c
SS
3707 if (full)
3708 {
4dfea560
DE
3709 argp = value_copy (argp);
3710 set_value_enclosing_type (argp, real_type);
c906108c
SS
3711 return argp;
3712 }
3713
581e13c1 3714 /* Check if object is in memory. */
c906108c
SS
3715 if (VALUE_LVAL (argp) != lval_memory)
3716 {
3e43a32a
MS
3717 warning (_("Couldn't retrieve complete object of RTTI "
3718 "type %s; object may be in register(s)."),
ac3eeb49 3719 TYPE_NAME (real_type));
c5aa993b 3720
c906108c
SS
3721 return argp;
3722 }
c5aa993b 3723
ac3eeb49
MS
3724 /* All other cases -- retrieve the complete object. */
3725 /* Go back by the computed top_offset from the beginning of the
3726 object, adjusting for the embedded offset of argp if that's what
3727 value_rtti_type used for its computation. */
42ae5230 3728 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3729 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3730 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3731 set_value_embedded_offset (new_val, (using_enc
3732 ? top + value_embedded_offset (argp)
3733 : top));
c906108c
SS
3734 return new_val;
3735}
3736
389e51db 3737
85bc8cb7
JK
3738/* Return the value of the local variable, if one exists. Throw error
3739 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3740
f23631e4 3741struct value *
85bc8cb7 3742value_of_this (const struct language_defn *lang)
c906108c 3743{
63e43d3a 3744 struct block_symbol sym;
3977b71f 3745 const struct block *b;
206415a3 3746 struct frame_info *frame;
c906108c 3747
66a17cb6 3748 if (!lang->la_name_of_this)
85bc8cb7 3749 error (_("no `this' in current language"));
aee28ec6 3750
85bc8cb7 3751 frame = get_selected_frame (_("no frame selected"));
c906108c 3752
66a17cb6 3753 b = get_frame_block (frame, NULL);
c906108c 3754
63e43d3a
PMR
3755 sym = lookup_language_this (lang, b);
3756 if (sym.symbol == NULL)
85bc8cb7
JK
3757 error (_("current stack frame does not contain a variable named `%s'"),
3758 lang->la_name_of_this);
3759
63e43d3a 3760 return read_var_value (sym.symbol, sym.block, frame);
85bc8cb7
JK
3761}
3762
3763/* Return the value of the local variable, if one exists. Return NULL
3764 otherwise. Never throw error. */
3765
3766struct value *
3767value_of_this_silent (const struct language_defn *lang)
3768{
3769 struct value *ret = NULL;
85bc8cb7 3770
492d29ea 3771 TRY
c906108c 3772 {
85bc8cb7 3773 ret = value_of_this (lang);
c906108c 3774 }
492d29ea
PA
3775 CATCH (except, RETURN_MASK_ERROR)
3776 {
3777 }
3778 END_CATCH
c906108c 3779
d069f99d
AF
3780 return ret;
3781}
3782
ac3eeb49
MS
3783/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3784 elements long, starting at LOWBOUND. The result has the same lower
3785 bound as the original ARRAY. */
c906108c 3786
f23631e4
AC
3787struct value *
3788value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3789{
3790 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3791 LONGEST lowerbound, upperbound;
f23631e4 3792 struct value *slice;
c906108c 3793 struct type *array_type;
ac3eeb49 3794
df407dfe 3795 array_type = check_typedef (value_type (array));
c906108c 3796 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3797 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3798 error (_("cannot take slice of non-array"));
ac3eeb49 3799
c906108c
SS
3800 range_type = TYPE_INDEX_TYPE (array_type);
3801 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3802 error (_("slice from bad array or bitstring"));
ac3eeb49 3803
c906108c 3804 if (lowbound < lowerbound || length < 0
db034ac5 3805 || lowbound + length - 1 > upperbound)
8a3fe4f8 3806 error (_("slice out of range"));
ac3eeb49 3807
c906108c
SS
3808 /* FIXME-type-allocation: need a way to free this type when we are
3809 done with it. */
0c9c3474
SA
3810 slice_range_type = create_static_range_type ((struct type *) NULL,
3811 TYPE_TARGET_TYPE (range_type),
3812 lowbound,
3813 lowbound + length - 1);
ac3eeb49 3814
a7c88acd
JB
3815 {
3816 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3817 LONGEST offset
3818 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3819
a7c88acd
JB
3820 slice_type = create_array_type ((struct type *) NULL,
3821 element_type,
3822 slice_range_type);
3823 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3824
a7c88acd
JB
3825 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3826 slice = allocate_value_lazy (slice_type);
3827 else
3828 {
3829 slice = allocate_value (slice_type);
3830 value_contents_copy (slice, 0, array, offset,
3ae385af 3831 type_length_units (slice_type));
a7c88acd
JB
3832 }
3833
3834 set_value_component_location (slice, array);
a7c88acd
JB
3835 set_value_offset (slice, value_offset (array) + offset);
3836 }
ac3eeb49 3837
c906108c
SS
3838 return slice;
3839}
3840
ac3eeb49
MS
3841/* Create a value for a FORTRAN complex number. Currently most of the
3842 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3843 composed of 2 doubles. This really should be a smarter routine
3844 that figures out precision inteligently as opposed to assuming
ac3eeb49 3845 doubles. FIXME: fmb */
c906108c 3846
f23631e4 3847struct value *
ac3eeb49
MS
3848value_literal_complex (struct value *arg1,
3849 struct value *arg2,
3850 struct type *type)
c906108c 3851{
f23631e4 3852 struct value *val;
c906108c
SS
3853 struct type *real_type = TYPE_TARGET_TYPE (type);
3854
3855 val = allocate_value (type);
3856 arg1 = value_cast (real_type, arg1);
3857 arg2 = value_cast (real_type, arg2);
3858
990a07ab 3859 memcpy (value_contents_raw (val),
0fd88904 3860 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3861 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3862 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3863 return val;
3864}
3865
ac3eeb49 3866/* Cast a value into the appropriate complex data type. */
c906108c 3867
f23631e4
AC
3868static struct value *
3869cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3870{
3871 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3872
df407dfe 3873 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3874 {
df407dfe 3875 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3876 struct value *re_val = allocate_value (val_real_type);
3877 struct value *im_val = allocate_value (val_real_type);
c906108c 3878
990a07ab 3879 memcpy (value_contents_raw (re_val),
0fd88904 3880 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3881 memcpy (value_contents_raw (im_val),
0fd88904 3882 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3883 TYPE_LENGTH (val_real_type));
c906108c
SS
3884
3885 return value_literal_complex (re_val, im_val, type);
3886 }
df407dfe
AC
3887 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3888 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3889 return value_literal_complex (val,
3890 value_zero (real_type, not_lval),
3891 type);
c906108c 3892 else
8a3fe4f8 3893 error (_("cannot cast non-number to complex"));
c906108c
SS
3894}
3895
3896void
fba45db2 3897_initialize_valops (void)
c906108c 3898{
5bf193a2
AC
3899 add_setshow_boolean_cmd ("overload-resolution", class_support,
3900 &overload_resolution, _("\
3901Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3902Show overload resolution in evaluating C++ functions."),
3903 NULL, NULL,
920d2a44 3904 show_overload_resolution,
5bf193a2 3905 &setlist, &showlist);
c906108c 3906 overload_resolution = 1;
c906108c 3907}
This page took 2.312829 seconds and 4 git commands to generate.