New macro ALL_BLOCK_SYMBOLS_WITH_NAME.
[deliverable/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
ecd75fc8 3 Copyright (C) 1986-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
f4c5303c 39#include "observer.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
c906108c 42
ccce17b0 43extern unsigned int overload_debug;
c906108c
SS
44/* Local functions. */
45
ad2f7632
DJ
46static int typecmp (int staticp, int varargs, int nargs,
47 struct field t1[], struct value *t2[]);
c906108c 48
714f19d5 49static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 50 int, struct type *, int);
c906108c 51
714f19d5
TT
52static struct value *search_struct_method (const char *, struct value **,
53 struct value **,
54 int, int *, struct type *);
c906108c 55
da096638 56static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
57 const char *, const char *,
58 struct symbol ***,
7322dca9
SW
59 struct badness_vector **,
60 const int no_adl);
8d577d32
DC
61
62static
da096638 63int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
64 const char *, const char *,
65 int, struct symbol ***,
7322dca9
SW
66 struct badness_vector **, int *,
67 const int no_adl);
ac3eeb49 68
9cf95373 69static int find_oload_champ (struct value **, int, int,
233e8b28
SC
70 struct fn_field *, VEC (xmethod_worker_ptr) *,
71 struct symbol **, struct badness_vector **);
ac3eeb49 72
2bca57ba 73static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
74
75enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
76
77static enum
ac3eeb49
MS
78oload_classification classify_oload_match (struct badness_vector *,
79 int, int);
8d577d32 80
ac3eeb49
MS
81static struct value *value_struct_elt_for_reference (struct type *,
82 int, struct type *,
c848d642 83 const char *,
ac3eeb49
MS
84 struct type *,
85 int, enum noside);
79c2c32d 86
ac3eeb49 87static struct value *value_namespace_elt (const struct type *,
c848d642 88 const char *, int , enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 91 const char *, int,
ac3eeb49 92 enum noside);
63d06c5c 93
a14ed312 94static CORE_ADDR allocate_space_in_inferior (int);
c906108c 95
f23631e4 96static struct value *cast_into_complex (struct type *, struct value *);
c906108c 97
233e8b28
SC
98static void find_method_list (struct value **, const char *,
99 int, struct type *, struct fn_field **, int *,
100 VEC (xmethod_worker_ptr) **,
101 struct type **, int *);
7a292a7a 102
a14ed312 103void _initialize_valops (void);
c906108c 104
c906108c 105#if 0
ac3eeb49
MS
106/* Flag for whether we want to abandon failed expression evals by
107 default. */
108
c906108c
SS
109static int auto_abandon = 0;
110#endif
111
112int overload_resolution = 0;
920d2a44
AC
113static void
114show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
115 struct cmd_list_element *c,
116 const char *value)
920d2a44 117{
3e43a32a
MS
118 fprintf_filtered (file, _("Overload resolution in evaluating "
119 "C++ functions is %s.\n"),
920d2a44
AC
120 value);
121}
242bfc55 122
3e3b026f
UW
123/* Find the address of function name NAME in the inferior. If OBJF_P
124 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
125 is defined. */
c906108c 126
f23631e4 127struct value *
3e3b026f 128find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 129{
52f0bd74 130 struct symbol *sym;
a109c7c1 131
2570f2b7 132 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
133 if (sym != NULL)
134 {
135 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
136 {
8a3fe4f8 137 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
138 name);
139 }
3e3b026f
UW
140
141 if (objf_p)
142 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
143
c906108c
SS
144 return value_of_variable (sym, NULL);
145 }
146 else
147 {
7c7b6655
TT
148 struct bound_minimal_symbol msymbol =
149 lookup_bound_minimal_symbol (name);
a109c7c1 150
7c7b6655 151 if (msymbol.minsym != NULL)
c906108c 152 {
7c7b6655 153 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
154 struct gdbarch *gdbarch = get_objfile_arch (objfile);
155
c906108c 156 struct type *type;
4478b372 157 CORE_ADDR maddr;
3e3b026f 158 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
159 type = lookup_function_type (type);
160 type = lookup_pointer_type (type);
77e371c0 161 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
162
163 if (objf_p)
164 *objf_p = objfile;
165
4478b372 166 return value_from_pointer (type, maddr);
c906108c
SS
167 }
168 else
169 {
c5aa993b 170 if (!target_has_execution)
3e43a32a
MS
171 error (_("evaluation of this expression "
172 "requires the target program to be active"));
c5aa993b 173 else
3e43a32a
MS
174 error (_("evaluation of this expression requires the "
175 "program to have a function \"%s\"."),
176 name);
c906108c
SS
177 }
178 }
179}
180
ac3eeb49
MS
181/* Allocate NBYTES of space in the inferior using the inferior's
182 malloc and return a value that is a pointer to the allocated
183 space. */
c906108c 184
f23631e4 185struct value *
fba45db2 186value_allocate_space_in_inferior (int len)
c906108c 187{
3e3b026f
UW
188 struct objfile *objf;
189 struct value *val = find_function_in_inferior ("malloc", &objf);
190 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 191 struct value *blocklen;
c906108c 192
3e3b026f 193 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
194 val = call_function_by_hand (val, 1, &blocklen);
195 if (value_logical_not (val))
196 {
197 if (!target_has_execution)
3e43a32a
MS
198 error (_("No memory available to program now: "
199 "you need to start the target first"));
c5aa993b 200 else
8a3fe4f8 201 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
202 }
203 return val;
204}
205
206static CORE_ADDR
fba45db2 207allocate_space_in_inferior (int len)
c906108c
SS
208{
209 return value_as_long (value_allocate_space_in_inferior (len));
210}
211
6af87b03
AR
212/* Cast struct value VAL to type TYPE and return as a value.
213 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
214 for this to work. Typedef to one of the codes is permitted.
215 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
216
217static struct value *
218value_cast_structs (struct type *type, struct value *v2)
219{
220 struct type *t1;
221 struct type *t2;
222 struct value *v;
223
224 gdb_assert (type != NULL && v2 != NULL);
225
226 t1 = check_typedef (type);
227 t2 = check_typedef (value_type (v2));
228
229 /* Check preconditions. */
230 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
231 || TYPE_CODE (t1) == TYPE_CODE_UNION)
232 && !!"Precondition is that type is of STRUCT or UNION kind.");
233 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
234 || TYPE_CODE (t2) == TYPE_CODE_UNION)
235 && !!"Precondition is that value is of STRUCT or UNION kind");
236
191ca0a1
CM
237 if (TYPE_NAME (t1) != NULL
238 && TYPE_NAME (t2) != NULL
239 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
240 return NULL;
241
6af87b03
AR
242 /* Upcasting: look in the type of the source to see if it contains the
243 type of the target as a superclass. If so, we'll need to
244 offset the pointer rather than just change its type. */
245 if (TYPE_NAME (t1) != NULL)
246 {
247 v = search_struct_field (type_name_no_tag (t1),
248 v2, 0, t2, 1);
249 if (v)
250 return v;
251 }
252
253 /* Downcasting: look in the type of the target to see if it contains the
254 type of the source as a superclass. If so, we'll need to
9c3c02fd 255 offset the pointer rather than just change its type. */
6af87b03
AR
256 if (TYPE_NAME (t2) != NULL)
257 {
9c3c02fd
TT
258 /* Try downcasting using the run-time type of the value. */
259 int full, top, using_enc;
260 struct type *real_type;
261
262 real_type = value_rtti_type (v2, &full, &top, &using_enc);
263 if (real_type)
264 {
265 v = value_full_object (v2, real_type, full, top, using_enc);
266 v = value_at_lazy (real_type, value_address (v));
9f1f738a 267 real_type = value_type (v);
9c3c02fd
TT
268
269 /* We might be trying to cast to the outermost enclosing
270 type, in which case search_struct_field won't work. */
271 if (TYPE_NAME (real_type) != NULL
272 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
273 return v;
274
275 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
276 if (v)
277 return v;
278 }
279
280 /* Try downcasting using information from the destination type
281 T2. This wouldn't work properly for classes with virtual
282 bases, but those were handled above. */
6af87b03
AR
283 v = search_struct_field (type_name_no_tag (t2),
284 value_zero (t1, not_lval), 0, t1, 1);
285 if (v)
286 {
287 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 288 CORE_ADDR addr2 = value_address (v2);
a109c7c1 289
42ae5230 290 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
291 return value_at (type, addr2);
292 }
293 }
694182d2
DJ
294
295 return NULL;
6af87b03
AR
296}
297
fb933624
DJ
298/* Cast one pointer or reference type to another. Both TYPE and
299 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
300 reference types. If SUBCLASS_CHECK is non-zero, this will force a
301 check to see whether TYPE is a superclass of ARG2's type. If
302 SUBCLASS_CHECK is zero, then the subclass check is done only when
303 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
304
305struct value *
b1af9e97
TT
306value_cast_pointers (struct type *type, struct value *arg2,
307 int subclass_check)
fb933624 308{
d160942f 309 struct type *type1 = check_typedef (type);
fb933624 310 struct type *type2 = check_typedef (value_type (arg2));
d160942f 311 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
312 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
313
314 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
315 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 316 && (subclass_check || !value_logical_not (arg2)))
fb933624 317 {
6af87b03 318 struct value *v2;
fb933624 319
6af87b03
AR
320 if (TYPE_CODE (type2) == TYPE_CODE_REF)
321 v2 = coerce_ref (arg2);
322 else
323 v2 = value_ind (arg2);
3e43a32a
MS
324 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
325 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
326 v2 = value_cast_structs (t1, v2);
327 /* At this point we have what we can have, un-dereference if needed. */
328 if (v2)
fb933624 329 {
6af87b03 330 struct value *v = value_addr (v2);
a109c7c1 331
6af87b03
AR
332 deprecated_set_value_type (v, type);
333 return v;
fb933624 334 }
8301c89e 335 }
fb933624
DJ
336
337 /* No superclass found, just change the pointer type. */
0d5de010 338 arg2 = value_copy (arg2);
fb933624 339 deprecated_set_value_type (arg2, type);
4dfea560 340 set_value_enclosing_type (arg2, type);
fb933624
DJ
341 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
342 return arg2;
343}
344
c906108c
SS
345/* Cast value ARG2 to type TYPE and return as a value.
346 More general than a C cast: accepts any two types of the same length,
347 and if ARG2 is an lvalue it can be cast into anything at all. */
348/* In C++, casts may change pointer or object representations. */
349
f23631e4
AC
350struct value *
351value_cast (struct type *type, struct value *arg2)
c906108c 352{
52f0bd74
AC
353 enum type_code code1;
354 enum type_code code2;
355 int scalar;
c906108c
SS
356 struct type *type2;
357
358 int convert_to_boolean = 0;
c5aa993b 359
df407dfe 360 if (value_type (arg2) == type)
c906108c
SS
361 return arg2;
362
6af87b03
AR
363 code1 = TYPE_CODE (check_typedef (type));
364
365 /* Check if we are casting struct reference to struct reference. */
366 if (code1 == TYPE_CODE_REF)
367 {
368 /* We dereference type; then we recurse and finally
581e13c1 369 we generate value of the given reference. Nothing wrong with
6af87b03
AR
370 that. */
371 struct type *t1 = check_typedef (type);
372 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
373 struct value *val = value_cast (dereftype, arg2);
a109c7c1 374
6af87b03
AR
375 return value_ref (val);
376 }
377
378 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
379
380 if (code2 == TYPE_CODE_REF)
381 /* We deref the value and then do the cast. */
382 return value_cast (type, coerce_ref (arg2));
383
c906108c
SS
384 CHECK_TYPEDEF (type);
385 code1 = TYPE_CODE (type);
994b9211 386 arg2 = coerce_ref (arg2);
df407dfe 387 type2 = check_typedef (value_type (arg2));
c906108c 388
fb933624
DJ
389 /* You can't cast to a reference type. See value_cast_pointers
390 instead. */
391 gdb_assert (code1 != TYPE_CODE_REF);
392
ac3eeb49
MS
393 /* A cast to an undetermined-length array_type, such as
394 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
395 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
396 if (code1 == TYPE_CODE_ARRAY)
397 {
398 struct type *element_type = TYPE_TARGET_TYPE (type);
399 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 400
d78df370 401 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
402 {
403 struct type *range_type = TYPE_INDEX_TYPE (type);
404 int val_length = TYPE_LENGTH (type2);
405 LONGEST low_bound, high_bound, new_length;
a109c7c1 406
c906108c
SS
407 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
408 low_bound = 0, high_bound = 0;
409 new_length = val_length / element_length;
410 if (val_length % element_length != 0)
3e43a32a
MS
411 warning (_("array element type size does not "
412 "divide object size in cast"));
ac3eeb49
MS
413 /* FIXME-type-allocation: need a way to free this type when
414 we are done with it. */
0c9c3474
SA
415 range_type = create_static_range_type ((struct type *) NULL,
416 TYPE_TARGET_TYPE (range_type),
417 low_bound,
418 new_length + low_bound - 1);
ac3eeb49
MS
419 deprecated_set_value_type (arg2,
420 create_array_type ((struct type *) NULL,
421 element_type,
422 range_type));
c906108c
SS
423 return arg2;
424 }
425 }
426
427 if (current_language->c_style_arrays
3bdf2bbd
KW
428 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
429 && !TYPE_VECTOR (type2))
c906108c
SS
430 arg2 = value_coerce_array (arg2);
431
432 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
433 arg2 = value_coerce_function (arg2);
434
df407dfe 435 type2 = check_typedef (value_type (arg2));
c906108c
SS
436 code2 = TYPE_CODE (type2);
437
438 if (code1 == TYPE_CODE_COMPLEX)
439 return cast_into_complex (type, arg2);
440 if (code1 == TYPE_CODE_BOOL)
441 {
442 code1 = TYPE_CODE_INT;
443 convert_to_boolean = 1;
444 }
445 if (code1 == TYPE_CODE_CHAR)
446 code1 = TYPE_CODE_INT;
447 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
448 code2 = TYPE_CODE_INT;
449
450 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
451 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
452 || code2 == TYPE_CODE_RANGE);
c906108c 453
6af87b03
AR
454 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
455 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 456 && TYPE_NAME (type) != 0)
694182d2
DJ
457 {
458 struct value *v = value_cast_structs (type, arg2);
a109c7c1 459
694182d2
DJ
460 if (v)
461 return v;
462 }
463
c906108c
SS
464 if (code1 == TYPE_CODE_FLT && scalar)
465 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
466 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
467 {
e17a4113 468 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
469 int dec_len = TYPE_LENGTH (type);
470 gdb_byte dec[16];
471
472 if (code2 == TYPE_CODE_FLT)
e17a4113 473 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
474 else if (code2 == TYPE_CODE_DECFLOAT)
475 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 476 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
477 else
478 /* The only option left is an integral type. */
e17a4113 479 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
480
481 return value_from_decfloat (type, dec);
482 }
c906108c
SS
483 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
484 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
485 && (scalar || code2 == TYPE_CODE_PTR
486 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
487 {
488 LONGEST longest;
c5aa993b 489
2bf1f4a1 490 /* When we cast pointers to integers, we mustn't use
76e71323 491 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
492 represents, as value_as_long would. GDB should evaluate
493 expressions just as the compiler would --- and the compiler
494 sees a cast as a simple reinterpretation of the pointer's
495 bits. */
496 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
497 longest = extract_unsigned_integer
498 (value_contents (arg2), TYPE_LENGTH (type2),
499 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
500 else
501 longest = value_as_long (arg2);
802db21b 502 return value_from_longest (type, convert_to_boolean ?
716c501e 503 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 504 }
ac3eeb49
MS
505 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
506 || code2 == TYPE_CODE_ENUM
507 || code2 == TYPE_CODE_RANGE))
634acd5f 508 {
4603e466
DT
509 /* TYPE_LENGTH (type) is the length of a pointer, but we really
510 want the length of an address! -- we are really dealing with
511 addresses (i.e., gdb representations) not pointers (i.e.,
512 target representations) here.
513
514 This allows things like "print *(int *)0x01000234" to work
515 without printing a misleading message -- which would
516 otherwise occur when dealing with a target having two byte
517 pointers and four byte addresses. */
518
50810684 519 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 520 LONGEST longest = value_as_long (arg2);
a109c7c1 521
4603e466 522 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 523 {
4603e466
DT
524 if (longest >= ((LONGEST) 1 << addr_bit)
525 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 526 warning (_("value truncated"));
634acd5f
AC
527 }
528 return value_from_longest (type, longest);
529 }
0d5de010
DJ
530 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
531 && value_as_long (arg2) == 0)
532 {
533 struct value *result = allocate_value (type);
a109c7c1 534
ad4820ab 535 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
536 return result;
537 }
538 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
539 && value_as_long (arg2) == 0)
540 {
541 /* The Itanium C++ ABI represents NULL pointers to members as
542 minus one, instead of biasing the normal case. */
543 return value_from_longest (type, -1);
544 }
8954db33
AB
545 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
546 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
547 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
548 error (_("Cannot convert between vector values of different sizes"));
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
550 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
551 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
552 else if (code1 == TYPE_CODE_VOID)
553 {
554 return value_zero (type, not_lval);
555 }
c906108c
SS
556 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
557 {
558 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 559 return value_cast_pointers (type, arg2, 0);
fb933624 560
0d5de010 561 arg2 = value_copy (arg2);
04624583 562 deprecated_set_value_type (arg2, type);
4dfea560 563 set_value_enclosing_type (arg2, type);
b44d461b 564 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
565 return arg2;
566 }
c906108c 567 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 568 return value_at_lazy (type, value_address (arg2));
c906108c
SS
569 else
570 {
8a3fe4f8 571 error (_("Invalid cast."));
c906108c
SS
572 return 0;
573 }
574}
575
4e8f195d
TT
576/* The C++ reinterpret_cast operator. */
577
578struct value *
579value_reinterpret_cast (struct type *type, struct value *arg)
580{
581 struct value *result;
582 struct type *real_type = check_typedef (type);
583 struct type *arg_type, *dest_type;
584 int is_ref = 0;
585 enum type_code dest_code, arg_code;
586
587 /* Do reference, function, and array conversion. */
588 arg = coerce_array (arg);
589
590 /* Attempt to preserve the type the user asked for. */
591 dest_type = type;
592
593 /* If we are casting to a reference type, transform
594 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
595 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
596 {
597 is_ref = 1;
598 arg = value_addr (arg);
599 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
600 real_type = lookup_pointer_type (real_type);
601 }
602
603 arg_type = value_type (arg);
604
605 dest_code = TYPE_CODE (real_type);
606 arg_code = TYPE_CODE (arg_type);
607
608 /* We can convert pointer types, or any pointer type to int, or int
609 type to pointer. */
610 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
611 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
612 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
613 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
614 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
616 || (dest_code == arg_code
617 && (dest_code == TYPE_CODE_PTR
618 || dest_code == TYPE_CODE_METHODPTR
619 || dest_code == TYPE_CODE_MEMBERPTR)))
620 result = value_cast (dest_type, arg);
621 else
622 error (_("Invalid reinterpret_cast"));
623
624 if (is_ref)
625 result = value_cast (type, value_ref (value_ind (result)));
626
627 return result;
628}
629
630/* A helper for value_dynamic_cast. This implements the first of two
631 runtime checks: we iterate over all the base classes of the value's
632 class which are equal to the desired class; if only one of these
633 holds the value, then it is the answer. */
634
635static int
636dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
637 const gdb_byte *valaddr,
638 int embedded_offset,
4e8f195d 639 CORE_ADDR address,
8af8e3bc 640 struct value *val,
4e8f195d
TT
641 struct type *search_type,
642 CORE_ADDR arg_addr,
643 struct type *arg_type,
644 struct value **result)
645{
646 int i, result_count = 0;
647
648 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
649 {
8af8e3bc
PA
650 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
651 address, val);
a109c7c1 652
4e8f195d
TT
653 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
654 {
8af8e3bc
PA
655 if (address + embedded_offset + offset >= arg_addr
656 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
657 {
658 ++result_count;
659 if (!*result)
660 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 661 address + embedded_offset + offset);
4e8f195d
TT
662 }
663 }
664 else
665 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
666 valaddr,
667 embedded_offset + offset,
668 address, val,
4e8f195d
TT
669 TYPE_BASECLASS (search_type, i),
670 arg_addr,
671 arg_type,
672 result);
673 }
674
675 return result_count;
676}
677
678/* A helper for value_dynamic_cast. This implements the second of two
679 runtime checks: we look for a unique public sibling class of the
680 argument's declared class. */
681
682static int
683dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
684 const gdb_byte *valaddr,
685 int embedded_offset,
4e8f195d 686 CORE_ADDR address,
8af8e3bc 687 struct value *val,
4e8f195d
TT
688 struct type *search_type,
689 struct value **result)
690{
691 int i, result_count = 0;
692
693 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
694 {
695 int offset;
696
697 if (! BASETYPE_VIA_PUBLIC (search_type, i))
698 continue;
699
8af8e3bc
PA
700 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
701 address, val);
4e8f195d
TT
702 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
703 {
704 ++result_count;
705 if (*result == NULL)
706 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 707 address + embedded_offset + offset);
4e8f195d
TT
708 }
709 else
710 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
711 valaddr,
712 embedded_offset + offset,
713 address, val,
4e8f195d
TT
714 TYPE_BASECLASS (search_type, i),
715 result);
716 }
717
718 return result_count;
719}
720
721/* The C++ dynamic_cast operator. */
722
723struct value *
724value_dynamic_cast (struct type *type, struct value *arg)
725{
8f78b329 726 int full, top, using_enc;
4e8f195d
TT
727 struct type *resolved_type = check_typedef (type);
728 struct type *arg_type = check_typedef (value_type (arg));
729 struct type *class_type, *rtti_type;
730 struct value *result, *tem, *original_arg = arg;
731 CORE_ADDR addr;
732 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
733
734 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
735 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
736 error (_("Argument to dynamic_cast must be a pointer or reference type"));
737 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 738 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
739 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
740
741 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
742 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
743 {
744 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
745 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
746 && value_as_long (arg) == 0))
747 error (_("Argument to dynamic_cast does not have pointer type"));
748 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
749 {
750 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 751 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
752 error (_("Argument to dynamic_cast does "
753 "not have pointer to class type"));
4e8f195d
TT
754 }
755
756 /* Handle NULL pointers. */
757 if (value_as_long (arg) == 0)
758 return value_zero (type, not_lval);
759
760 arg = value_ind (arg);
761 }
762 else
763 {
4753d33b 764 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
765 error (_("Argument to dynamic_cast does not have class type"));
766 }
767
768 /* If the classes are the same, just return the argument. */
769 if (class_types_same_p (class_type, arg_type))
770 return value_cast (type, arg);
771
772 /* If the target type is a unique base class of the argument's
773 declared type, just cast it. */
774 if (is_ancestor (class_type, arg_type))
775 {
776 if (is_unique_ancestor (class_type, arg))
777 return value_cast (type, original_arg);
778 error (_("Ambiguous dynamic_cast"));
779 }
780
781 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
782 if (! rtti_type)
783 error (_("Couldn't determine value's most derived type for dynamic_cast"));
784
785 /* Compute the most derived object's address. */
786 addr = value_address (arg);
787 if (full)
788 {
789 /* Done. */
790 }
791 else if (using_enc)
792 addr += top;
793 else
794 addr += top + value_embedded_offset (arg);
795
796 /* dynamic_cast<void *> means to return a pointer to the
797 most-derived object. */
798 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
799 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
800 return value_at_lazy (type, addr);
801
802 tem = value_at (type, addr);
9f1f738a 803 type = value_type (tem);
4e8f195d
TT
804
805 /* The first dynamic check specified in 5.2.7. */
806 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
807 {
808 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
809 return tem;
810 result = NULL;
811 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
812 value_contents_for_printing (tem),
813 value_embedded_offset (tem),
814 value_address (tem), tem,
4e8f195d
TT
815 rtti_type, addr,
816 arg_type,
817 &result) == 1)
818 return value_cast (type,
819 is_ref ? value_ref (result) : value_addr (result));
820 }
821
822 /* The second dynamic check specified in 5.2.7. */
823 result = NULL;
824 if (is_public_ancestor (arg_type, rtti_type)
825 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
826 value_contents_for_printing (tem),
827 value_embedded_offset (tem),
828 value_address (tem), tem,
4e8f195d
TT
829 rtti_type, &result) == 1)
830 return value_cast (type,
831 is_ref ? value_ref (result) : value_addr (result));
832
833 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
834 return value_zero (type, not_lval);
835
836 error (_("dynamic_cast failed"));
837}
838
c906108c
SS
839/* Create a value of type TYPE that is zero, and return it. */
840
f23631e4 841struct value *
fba45db2 842value_zero (struct type *type, enum lval_type lv)
c906108c 843{
f23631e4 844 struct value *val = allocate_value (type);
c906108c 845
bb7da2bf 846 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
847 return val;
848}
849
18a46dbe 850/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
851
852struct value *
18a46dbe 853value_one (struct type *type)
301f0ecf
DE
854{
855 struct type *type1 = check_typedef (type);
4e608b4f 856 struct value *val;
301f0ecf
DE
857
858 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
859 {
e17a4113 860 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 861 gdb_byte v[16];
a109c7c1 862
e17a4113 863 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
864 val = value_from_decfloat (type, v);
865 }
866 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
867 {
868 val = value_from_double (type, (DOUBLEST) 1);
869 }
870 else if (is_integral_type (type1))
871 {
872 val = value_from_longest (type, (LONGEST) 1);
873 }
120bd360
KW
874 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
875 {
876 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
877 int i;
878 LONGEST low_bound, high_bound;
120bd360
KW
879 struct value *tmp;
880
cfa6f054
KW
881 if (!get_array_bounds (type1, &low_bound, &high_bound))
882 error (_("Could not determine the vector bounds"));
883
120bd360 884 val = allocate_value (type);
cfa6f054 885 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 886 {
18a46dbe 887 tmp = value_one (eltype);
120bd360
KW
888 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
889 value_contents_all (tmp), TYPE_LENGTH (eltype));
890 }
891 }
301f0ecf
DE
892 else
893 {
894 error (_("Not a numeric type."));
895 }
896
18a46dbe
JK
897 /* value_one result is never used for assignments to. */
898 gdb_assert (VALUE_LVAL (val) == not_lval);
899
301f0ecf
DE
900 return val;
901}
902
80180f79
SA
903/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
904 The type of the created value may differ from the passed type TYPE.
905 Make sure to retrieve the returned values's new type after this call
906 e.g. in case the type is a variable length array. */
4e5d721f
DE
907
908static struct value *
909get_value_at (struct type *type, CORE_ADDR addr, int lazy)
910{
911 struct value *val;
912
913 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
914 error (_("Attempt to dereference a generic pointer."));
915
a3d34bf4 916 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 917
a3d34bf4
PA
918 if (!lazy)
919 value_fetch_lazy (val);
4e5d721f
DE
920
921 return val;
922}
923
070ad9f0 924/* Return a value with type TYPE located at ADDR.
c906108c
SS
925
926 Call value_at only if the data needs to be fetched immediately;
927 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
928 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 929 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 930 is tested in the value_contents macro, which is used if and when
80180f79
SA
931 the contents are actually required. The type of the created value
932 may differ from the passed type TYPE. Make sure to retrieve the
933 returned values's new type after this call e.g. in case the type
934 is a variable length array.
c906108c
SS
935
936 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 937 adjustments before or after calling it. */
c906108c 938
f23631e4 939struct value *
00a4c844 940value_at (struct type *type, CORE_ADDR addr)
c906108c 941{
4e5d721f 942 return get_value_at (type, addr, 0);
c906108c
SS
943}
944
80180f79
SA
945/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
946 The type of the created value may differ from the passed type TYPE.
947 Make sure to retrieve the returned values's new type after this call
948 e.g. in case the type is a variable length array. */
c906108c 949
f23631e4 950struct value *
00a4c844 951value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 952{
4e5d721f 953 return get_value_at (type, addr, 1);
c906108c
SS
954}
955
e6ca34fc
PA
956void
957read_value_memory (struct value *val, int embedded_offset,
958 int stack, CORE_ADDR memaddr,
959 gdb_byte *buffer, size_t length)
960{
5a2eb0ef
YQ
961 ULONGEST xfered = 0;
962
963 while (xfered < length)
964 {
965 enum target_xfer_status status;
966 ULONGEST xfered_len;
967
968 status = target_xfer_partial (current_target.beneath,
969 TARGET_OBJECT_MEMORY, NULL,
970 buffer + xfered, NULL,
971 memaddr + xfered, length - xfered,
972 &xfered_len);
973
974 if (status == TARGET_XFER_OK)
975 /* nothing */;
bc113b4e 976 else if (status == TARGET_XFER_UNAVAILABLE)
5a2eb0ef
YQ
977 mark_value_bytes_unavailable (val, embedded_offset + xfered,
978 xfered_len);
979 else if (status == TARGET_XFER_EOF)
980 memory_error (TARGET_XFER_E_IO, memaddr + xfered);
e6ca34fc 981 else
5a2eb0ef 982 memory_error (status, memaddr + xfered);
e6ca34fc 983
5a2eb0ef
YQ
984 xfered += xfered_len;
985 QUIT;
e6ca34fc
PA
986 }
987}
c906108c
SS
988
989/* Store the contents of FROMVAL into the location of TOVAL.
990 Return a new value with the location of TOVAL and contents of FROMVAL. */
991
f23631e4
AC
992struct value *
993value_assign (struct value *toval, struct value *fromval)
c906108c 994{
52f0bd74 995 struct type *type;
f23631e4 996 struct value *val;
cb741690 997 struct frame_id old_frame;
c906108c 998
88e3b34b 999 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1000 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1001
994b9211 1002 toval = coerce_ref (toval);
c906108c 1003
df407dfe 1004 type = value_type (toval);
c906108c 1005 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1006 fromval = value_cast (type, fromval);
c906108c 1007 else
63092375
DJ
1008 {
1009 /* Coerce arrays and functions to pointers, except for arrays
1010 which only live in GDB's storage. */
1011 if (!value_must_coerce_to_target (fromval))
1012 fromval = coerce_array (fromval);
1013 }
1014
c906108c
SS
1015 CHECK_TYPEDEF (type);
1016
ac3eeb49
MS
1017 /* Since modifying a register can trash the frame chain, and
1018 modifying memory can trash the frame cache, we save the old frame
1019 and then restore the new frame afterwards. */
206415a3 1020 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1021
c906108c
SS
1022 switch (VALUE_LVAL (toval))
1023 {
1024 case lval_internalvar:
1025 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1026 return value_of_internalvar (get_type_arch (type),
1027 VALUE_INTERNALVAR (toval));
c906108c
SS
1028
1029 case lval_internalvar_component:
d9e98382
SDJ
1030 {
1031 int offset = value_offset (toval);
1032
1033 /* Are we dealing with a bitfield?
1034
1035 It is important to mention that `value_parent (toval)' is
1036 non-NULL iff `value_bitsize (toval)' is non-zero. */
1037 if (value_bitsize (toval))
1038 {
1039 /* VALUE_INTERNALVAR below refers to the parent value, while
1040 the offset is relative to this parent value. */
1041 gdb_assert (value_parent (value_parent (toval)) == NULL);
1042 offset += value_offset (value_parent (toval));
1043 }
1044
1045 set_internalvar_component (VALUE_INTERNALVAR (toval),
1046 offset,
1047 value_bitpos (toval),
1048 value_bitsize (toval),
1049 fromval);
1050 }
c906108c
SS
1051 break;
1052
1053 case lval_memory:
1054 {
fc1a4b47 1055 const gdb_byte *dest_buffer;
c5aa993b
JM
1056 CORE_ADDR changed_addr;
1057 int changed_len;
10c42a71 1058 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1059
df407dfe 1060 if (value_bitsize (toval))
c5aa993b 1061 {
2d88202a 1062 struct value *parent = value_parent (toval);
2d88202a 1063
a109c7c1 1064 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1065 changed_len = (value_bitpos (toval)
1066 + value_bitsize (toval)
c5aa993b
JM
1067 + HOST_CHAR_BIT - 1)
1068 / HOST_CHAR_BIT;
c906108c 1069
4ea48cc1
DJ
1070 /* If we can read-modify-write exactly the size of the
1071 containing type (e.g. short or int) then do so. This
1072 is safer for volatile bitfields mapped to hardware
1073 registers. */
1074 if (changed_len < TYPE_LENGTH (type)
1075 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1076 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1077 changed_len = TYPE_LENGTH (type);
1078
c906108c 1079 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1080 error (_("Can't handle bitfields which "
1081 "don't fit in a %d bit word."),
baa6f10b 1082 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1083
2d88202a 1084 read_memory (changed_addr, buffer, changed_len);
50810684 1085 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1086 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1087 dest_buffer = buffer;
1088 }
c906108c
SS
1089 else
1090 {
42ae5230 1091 changed_addr = value_address (toval);
c906108c 1092 changed_len = TYPE_LENGTH (type);
0fd88904 1093 dest_buffer = value_contents (fromval);
c906108c
SS
1094 }
1095
972daa01 1096 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1097 }
1098 break;
1099
492254e9 1100 case lval_register:
c906108c 1101 {
c906108c 1102 struct frame_info *frame;
d80b854b 1103 struct gdbarch *gdbarch;
ff2e87ac 1104 int value_reg;
c906108c
SS
1105
1106 /* Figure out which frame this is in currently. */
0c16dd26
AC
1107 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1108 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1109
1110 if (!frame)
8a3fe4f8 1111 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1112
1113 gdbarch = get_frame_arch (frame);
3e871532
LM
1114
1115 if (value_bitsize (toval))
492254e9 1116 {
3e871532
LM
1117 struct value *parent = value_parent (toval);
1118 int offset = value_offset (parent) + value_offset (toval);
1119 int changed_len;
1120 gdb_byte buffer[sizeof (LONGEST)];
1121 int optim, unavail;
1122
1123 changed_len = (value_bitpos (toval)
1124 + value_bitsize (toval)
1125 + HOST_CHAR_BIT - 1)
1126 / HOST_CHAR_BIT;
1127
1128 if (changed_len > (int) sizeof (LONGEST))
1129 error (_("Can't handle bitfields which "
1130 "don't fit in a %d bit word."),
1131 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1132
1133 if (!get_frame_register_bytes (frame, value_reg, offset,
1134 changed_len, buffer,
1135 &optim, &unavail))
1136 {
1137 if (optim)
1138 throw_error (OPTIMIZED_OUT_ERROR,
1139 _("value has been optimized out"));
1140 if (unavail)
1141 throw_error (NOT_AVAILABLE_ERROR,
1142 _("value is not available"));
1143 }
1144
1145 modify_field (type, buffer, value_as_long (fromval),
1146 value_bitpos (toval), value_bitsize (toval));
1147
1148 put_frame_register_bytes (frame, value_reg, offset,
1149 changed_len, buffer);
492254e9 1150 }
c906108c 1151 else
492254e9 1152 {
3e871532
LM
1153 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1154 type))
00fa51f6 1155 {
3e871532
LM
1156 /* If TOVAL is a special machine register requiring
1157 conversion of program values to a special raw
1158 format. */
1159 gdbarch_value_to_register (gdbarch, frame,
1160 VALUE_REGNUM (toval), type,
1161 value_contents (fromval));
00fa51f6 1162 }
c906108c 1163 else
00fa51f6
UW
1164 {
1165 put_frame_register_bytes (frame, value_reg,
1166 value_offset (toval),
1167 TYPE_LENGTH (type),
1168 value_contents (fromval));
1169 }
ff2e87ac 1170 }
00fa51f6 1171
9a4105ab
AC
1172 if (deprecated_register_changed_hook)
1173 deprecated_register_changed_hook (-1);
ff2e87ac 1174 break;
c906108c 1175 }
5f5233d4
PA
1176
1177 case lval_computed:
1178 {
c8f2448a 1179 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1180
ac71a68c
JK
1181 if (funcs->write != NULL)
1182 {
1183 funcs->write (toval, fromval);
1184 break;
1185 }
5f5233d4 1186 }
ac71a68c 1187 /* Fall through. */
5f5233d4 1188
c906108c 1189 default:
8a3fe4f8 1190 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1191 }
1192
cb741690
DJ
1193 /* Assigning to the stack pointer, frame pointer, and other
1194 (architecture and calling convention specific) registers may
d649a38e 1195 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1196 also can. We just do this on all assignments to registers or
1197 memory, for simplicity's sake; I doubt the slowdown matters. */
1198 switch (VALUE_LVAL (toval))
1199 {
1200 case lval_memory:
1201 case lval_register:
0e03807e 1202 case lval_computed:
cb741690 1203
d649a38e 1204 observer_notify_target_changed (&current_target);
cb741690 1205
ac3eeb49
MS
1206 /* Having destroyed the frame cache, restore the selected
1207 frame. */
cb741690
DJ
1208
1209 /* FIXME: cagney/2002-11-02: There has to be a better way of
1210 doing this. Instead of constantly saving/restoring the
1211 frame. Why not create a get_selected_frame() function that,
1212 having saved the selected frame's ID can automatically
1213 re-find the previously selected frame automatically. */
1214
1215 {
1216 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1217
cb741690
DJ
1218 if (fi != NULL)
1219 select_frame (fi);
1220 }
1221
1222 break;
1223 default:
1224 break;
1225 }
1226
ac3eeb49
MS
1227 /* If the field does not entirely fill a LONGEST, then zero the sign
1228 bits. If the field is signed, and is negative, then sign
1229 extend. */
df407dfe
AC
1230 if ((value_bitsize (toval) > 0)
1231 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1232 {
1233 LONGEST fieldval = value_as_long (fromval);
df407dfe 1234 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1235
1236 fieldval &= valmask;
ac3eeb49
MS
1237 if (!TYPE_UNSIGNED (type)
1238 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1239 fieldval |= ~valmask;
1240
1241 fromval = value_from_longest (type, fieldval);
1242 }
1243
4aac0db7
UW
1244 /* The return value is a copy of TOVAL so it shares its location
1245 information, but its contents are updated from FROMVAL. This
1246 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1247 val = value_copy (toval);
4aac0db7 1248 set_value_lazy (val, 0);
0fd88904 1249 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1250 TYPE_LENGTH (type));
4aac0db7
UW
1251
1252 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1253 in the case of pointer types. For object types, the enclosing type
1254 and embedded offset must *not* be copied: the target object refered
1255 to by TOVAL retains its original dynamic type after assignment. */
1256 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1257 {
1258 set_value_enclosing_type (val, value_enclosing_type (fromval));
1259 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1260 }
c5aa993b 1261
c906108c
SS
1262 return val;
1263}
1264
1265/* Extend a value VAL to COUNT repetitions of its type. */
1266
f23631e4
AC
1267struct value *
1268value_repeat (struct value *arg1, int count)
c906108c 1269{
f23631e4 1270 struct value *val;
c906108c
SS
1271
1272 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1273 error (_("Only values in memory can be extended with '@'."));
c906108c 1274 if (count < 1)
8a3fe4f8 1275 error (_("Invalid number %d of repetitions."), count);
c906108c 1276
4754a64e 1277 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1278
c906108c 1279 VALUE_LVAL (val) = lval_memory;
42ae5230 1280 set_value_address (val, value_address (arg1));
c906108c 1281
24e6bcee
PA
1282 read_value_memory (val, 0, value_stack (val), value_address (val),
1283 value_contents_all_raw (val),
1284 TYPE_LENGTH (value_enclosing_type (val)));
1285
c906108c
SS
1286 return val;
1287}
1288
f23631e4 1289struct value *
9df2fbc4 1290value_of_variable (struct symbol *var, const struct block *b)
c906108c 1291{
61212c0f 1292 struct frame_info *frame;
c906108c 1293
61212c0f
UW
1294 if (!symbol_read_needs_frame (var))
1295 frame = NULL;
1296 else if (!b)
1297 frame = get_selected_frame (_("No frame selected."));
1298 else
c906108c
SS
1299 {
1300 frame = block_innermost_frame (b);
1301 if (!frame)
c5aa993b 1302 {
edb3359d 1303 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1304 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1305 error (_("No frame is currently executing in block %s."),
de5ad195 1306 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1307 else
8a3fe4f8 1308 error (_("No frame is currently executing in specified block"));
c5aa993b 1309 }
c906108c
SS
1310 }
1311
8afd712c 1312 return read_var_value (var, frame);
c906108c
SS
1313}
1314
61212c0f 1315struct value *
270140bd 1316address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1317{
1318 struct type *type = SYMBOL_TYPE (var);
1319 struct value *val;
1320
1321 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1322 Lazy evaluation pays off here. */
61212c0f
UW
1323
1324 val = value_of_variable (var, b);
9f1f738a 1325 type = value_type (val);
61212c0f
UW
1326
1327 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1328 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1329 {
42ae5230 1330 CORE_ADDR addr = value_address (val);
a109c7c1 1331
61212c0f
UW
1332 return value_from_pointer (lookup_pointer_type (type), addr);
1333 }
1334
1335 /* Not a memory address; check what the problem was. */
1336 switch (VALUE_LVAL (val))
1337 {
1338 case lval_register:
1339 {
1340 struct frame_info *frame;
1341 const char *regname;
1342
1343 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1344 gdb_assert (frame);
1345
1346 regname = gdbarch_register_name (get_frame_arch (frame),
1347 VALUE_REGNUM (val));
1348 gdb_assert (regname && *regname);
1349
1350 error (_("Address requested for identifier "
1351 "\"%s\" which is in register $%s"),
1352 SYMBOL_PRINT_NAME (var), regname);
1353 break;
1354 }
1355
1356 default:
1357 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1358 SYMBOL_PRINT_NAME (var));
1359 break;
1360 }
1361
1362 return val;
1363}
1364
63092375
DJ
1365/* Return one if VAL does not live in target memory, but should in order
1366 to operate on it. Otherwise return zero. */
1367
1368int
1369value_must_coerce_to_target (struct value *val)
1370{
1371 struct type *valtype;
1372
1373 /* The only lval kinds which do not live in target memory. */
1374 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1375 && VALUE_LVAL (val) != lval_internalvar
1376 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1377 return 0;
1378
1379 valtype = check_typedef (value_type (val));
1380
1381 switch (TYPE_CODE (valtype))
1382 {
1383 case TYPE_CODE_ARRAY:
3cbaedff 1384 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1385 case TYPE_CODE_STRING:
1386 return 1;
1387 default:
1388 return 0;
1389 }
1390}
1391
3e43a32a
MS
1392/* Make sure that VAL lives in target memory if it's supposed to. For
1393 instance, strings are constructed as character arrays in GDB's
1394 storage, and this function copies them to the target. */
63092375
DJ
1395
1396struct value *
1397value_coerce_to_target (struct value *val)
1398{
1399 LONGEST length;
1400 CORE_ADDR addr;
1401
1402 if (!value_must_coerce_to_target (val))
1403 return val;
1404
1405 length = TYPE_LENGTH (check_typedef (value_type (val)));
1406 addr = allocate_space_in_inferior (length);
1407 write_memory (addr, value_contents (val), length);
1408 return value_at_lazy (value_type (val), addr);
1409}
1410
ac3eeb49
MS
1411/* Given a value which is an array, return a value which is a pointer
1412 to its first element, regardless of whether or not the array has a
1413 nonzero lower bound.
c906108c 1414
ac3eeb49
MS
1415 FIXME: A previous comment here indicated that this routine should
1416 be substracting the array's lower bound. It's not clear to me that
1417 this is correct. Given an array subscripting operation, it would
1418 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1419
1420 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1421
ac3eeb49
MS
1422 However I believe a more appropriate and logical place to account
1423 for the lower bound is to do so in value_subscript, essentially
1424 computing:
c906108c
SS
1425
1426 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1427
ac3eeb49
MS
1428 As further evidence consider what would happen with operations
1429 other than array subscripting, where the caller would get back a
1430 value that had an address somewhere before the actual first element
1431 of the array, and the information about the lower bound would be
581e13c1 1432 lost because of the coercion to pointer type. */
c906108c 1433
f23631e4
AC
1434struct value *
1435value_coerce_array (struct value *arg1)
c906108c 1436{
df407dfe 1437 struct type *type = check_typedef (value_type (arg1));
c906108c 1438
63092375
DJ
1439 /* If the user tries to do something requiring a pointer with an
1440 array that has not yet been pushed to the target, then this would
1441 be a good time to do so. */
1442 arg1 = value_coerce_to_target (arg1);
1443
c906108c 1444 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1445 error (_("Attempt to take address of value not located in memory."));
c906108c 1446
4478b372 1447 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1448 value_address (arg1));
c906108c
SS
1449}
1450
1451/* Given a value which is a function, return a value which is a pointer
1452 to it. */
1453
f23631e4
AC
1454struct value *
1455value_coerce_function (struct value *arg1)
c906108c 1456{
f23631e4 1457 struct value *retval;
c906108c
SS
1458
1459 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1460 error (_("Attempt to take address of value not located in memory."));
c906108c 1461
df407dfe 1462 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1463 value_address (arg1));
c906108c 1464 return retval;
c5aa993b 1465}
c906108c 1466
ac3eeb49
MS
1467/* Return a pointer value for the object for which ARG1 is the
1468 contents. */
c906108c 1469
f23631e4
AC
1470struct value *
1471value_addr (struct value *arg1)
c906108c 1472{
f23631e4 1473 struct value *arg2;
df407dfe 1474 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1475
c906108c
SS
1476 if (TYPE_CODE (type) == TYPE_CODE_REF)
1477 {
ac3eeb49
MS
1478 /* Copy the value, but change the type from (T&) to (T*). We
1479 keep the same location information, which is efficient, and
1480 allows &(&X) to get the location containing the reference. */
c906108c 1481 arg2 = value_copy (arg1);
ac3eeb49
MS
1482 deprecated_set_value_type (arg2,
1483 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1484 return arg2;
1485 }
1486 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1487 return value_coerce_function (arg1);
1488
63092375
DJ
1489 /* If this is an array that has not yet been pushed to the target,
1490 then this would be a good time to force it to memory. */
1491 arg1 = value_coerce_to_target (arg1);
1492
c906108c 1493 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1494 error (_("Attempt to take address of value not located in memory."));
c906108c 1495
581e13c1 1496 /* Get target memory address. */
df407dfe 1497 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1498 (value_address (arg1)
13c3b5f5 1499 + value_embedded_offset (arg1)));
c906108c
SS
1500
1501 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1502 full derived object's type ... */
4dfea560
DE
1503 set_value_enclosing_type (arg2,
1504 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1505 /* ... and also the relative position of the subobject in the full
1506 object. */
b44d461b 1507 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1508 return arg2;
1509}
1510
ac3eeb49
MS
1511/* Return a reference value for the object for which ARG1 is the
1512 contents. */
fb933624
DJ
1513
1514struct value *
1515value_ref (struct value *arg1)
1516{
1517 struct value *arg2;
fb933624 1518 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1519
fb933624
DJ
1520 if (TYPE_CODE (type) == TYPE_CODE_REF)
1521 return arg1;
1522
1523 arg2 = value_addr (arg1);
1524 deprecated_set_value_type (arg2, lookup_reference_type (type));
1525 return arg2;
1526}
1527
ac3eeb49
MS
1528/* Given a value of a pointer type, apply the C unary * operator to
1529 it. */
c906108c 1530
f23631e4
AC
1531struct value *
1532value_ind (struct value *arg1)
c906108c
SS
1533{
1534 struct type *base_type;
f23631e4 1535 struct value *arg2;
c906108c 1536
994b9211 1537 arg1 = coerce_array (arg1);
c906108c 1538
df407dfe 1539 base_type = check_typedef (value_type (arg1));
c906108c 1540
8cf6f0b1
TT
1541 if (VALUE_LVAL (arg1) == lval_computed)
1542 {
c8f2448a 1543 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1544
1545 if (funcs->indirect)
1546 {
1547 struct value *result = funcs->indirect (arg1);
1548
1549 if (result)
1550 return result;
1551 }
1552 }
1553
22fe0fbb 1554 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1555 {
1556 struct type *enc_type;
a109c7c1 1557
ac3eeb49
MS
1558 /* We may be pointing to something embedded in a larger object.
1559 Get the real type of the enclosing object. */
4754a64e 1560 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1561 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1562
1563 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1564 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1565 /* For functions, go through find_function_addr, which knows
1566 how to handle function descriptors. */
ac3eeb49
MS
1567 arg2 = value_at_lazy (enc_type,
1568 find_function_addr (arg1, NULL));
0d5de010 1569 else
581e13c1 1570 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1571 arg2 = value_at_lazy (enc_type,
1572 (value_as_address (arg1)
1573 - value_pointed_to_offset (arg1)));
0d5de010 1574
9f1f738a 1575 enc_type = value_type (arg2);
dfcee124 1576 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1577 }
1578
8a3fe4f8 1579 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1580 return 0; /* For lint -- never reached. */
c906108c
SS
1581}
1582\f
39d37385
PA
1583/* Create a value for an array by allocating space in GDB, copying the
1584 data into that space, and then setting up an array value.
c906108c 1585
ac3eeb49
MS
1586 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1587 is populated from the values passed in ELEMVEC.
c906108c
SS
1588
1589 The element type of the array is inherited from the type of the
1590 first element, and all elements must have the same size (though we
ac3eeb49 1591 don't currently enforce any restriction on their types). */
c906108c 1592
f23631e4
AC
1593struct value *
1594value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1595{
1596 int nelem;
1597 int idx;
1598 unsigned int typelength;
f23631e4 1599 struct value *val;
c906108c 1600 struct type *arraytype;
c906108c 1601
ac3eeb49
MS
1602 /* Validate that the bounds are reasonable and that each of the
1603 elements have the same size. */
c906108c
SS
1604
1605 nelem = highbound - lowbound + 1;
1606 if (nelem <= 0)
1607 {
8a3fe4f8 1608 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1609 }
4754a64e 1610 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1611 for (idx = 1; idx < nelem; idx++)
1612 {
4754a64e 1613 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1614 {
8a3fe4f8 1615 error (_("array elements must all be the same size"));
c906108c
SS
1616 }
1617 }
1618
e3506a9f
UW
1619 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1620 lowbound, highbound);
c906108c
SS
1621
1622 if (!current_language->c_style_arrays)
1623 {
1624 val = allocate_value (arraytype);
1625 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1626 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1627 typelength);
c906108c
SS
1628 return val;
1629 }
1630
63092375
DJ
1631 /* Allocate space to store the array, and then initialize it by
1632 copying in each element. */
c906108c 1633
63092375 1634 val = allocate_value (arraytype);
c906108c 1635 for (idx = 0; idx < nelem; idx++)
39d37385 1636 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1637 return val;
c906108c
SS
1638}
1639
6c7a06a3 1640struct value *
63375b74 1641value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1642{
1643 struct value *val;
1644 int lowbound = current_language->string_lower_bound;
63375b74 1645 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1646 struct type *stringtype
e3506a9f 1647 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1648
1649 val = allocate_value (stringtype);
1650 memcpy (value_contents_raw (val), ptr, len);
1651 return val;
1652}
1653
ac3eeb49
MS
1654/* Create a value for a string constant by allocating space in the
1655 inferior, copying the data into that space, and returning the
1656 address with type TYPE_CODE_STRING. PTR points to the string
1657 constant data; LEN is number of characters.
1658
1659 Note that string types are like array of char types with a lower
1660 bound of zero and an upper bound of LEN - 1. Also note that the
1661 string may contain embedded null bytes. */
c906108c 1662
f23631e4 1663struct value *
63375b74 1664value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1665{
f23631e4 1666 struct value *val;
c906108c 1667 int lowbound = current_language->string_lower_bound;
63375b74 1668 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1669 struct type *stringtype
e3506a9f 1670 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1671
3b7538c0
UW
1672 val = allocate_value (stringtype);
1673 memcpy (value_contents_raw (val), ptr, len);
1674 return val;
c906108c
SS
1675}
1676
c906108c 1677\f
ac3eeb49
MS
1678/* See if we can pass arguments in T2 to a function which takes
1679 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1680 a NULL-terminated vector. If some arguments need coercion of some
1681 sort, then the coerced values are written into T2. Return value is
1682 0 if the arguments could be matched, or the position at which they
1683 differ if not.
c906108c 1684
ac3eeb49
MS
1685 STATICP is nonzero if the T1 argument list came from a static
1686 member function. T2 will still include the ``this'' pointer, but
1687 it will be skipped.
c906108c
SS
1688
1689 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1690 which is the type of the instance variable. This is because we
1691 want to handle calls with objects from derived classes. This is
1692 not entirely correct: we should actually check to make sure that a
c906108c
SS
1693 requested operation is type secure, shouldn't we? FIXME. */
1694
1695static int
ad2f7632
DJ
1696typecmp (int staticp, int varargs, int nargs,
1697 struct field t1[], struct value *t2[])
c906108c
SS
1698{
1699 int i;
1700
1701 if (t2 == 0)
ac3eeb49
MS
1702 internal_error (__FILE__, __LINE__,
1703 _("typecmp: no argument list"));
ad2f7632 1704
ac3eeb49
MS
1705 /* Skip ``this'' argument if applicable. T2 will always include
1706 THIS. */
4a1970e4 1707 if (staticp)
ad2f7632
DJ
1708 t2 ++;
1709
1710 for (i = 0;
1711 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1712 i++)
c906108c 1713 {
c5aa993b 1714 struct type *tt1, *tt2;
ad2f7632 1715
c5aa993b
JM
1716 if (!t2[i])
1717 return i + 1;
ad2f7632
DJ
1718
1719 tt1 = check_typedef (t1[i].type);
df407dfe 1720 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1721
c906108c 1722 if (TYPE_CODE (tt1) == TYPE_CODE_REF
8301c89e 1723 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1724 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1725 == TYPE_CODE (tt2)))
c906108c
SS
1726 {
1727 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1728 t2[i] = value_coerce_array (t2[i]);
1729 else
fb933624 1730 t2[i] = value_ref (t2[i]);
c906108c
SS
1731 continue;
1732 }
1733
802db21b
DB
1734 /* djb - 20000715 - Until the new type structure is in the
1735 place, and we can attempt things like implicit conversions,
1736 we need to do this so you can take something like a map<const
1737 char *>, and properly access map["hello"], because the
1738 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1739 and the argument will be a pointer to a char. */
1740 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1741 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1742 {
1743 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1744 }
ac3eeb49
MS
1745 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1746 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1747 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1748 {
ac3eeb49 1749 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1750 }
c5aa993b
JM
1751 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1752 continue;
ac3eeb49
MS
1753 /* Array to pointer is a `trivial conversion' according to the
1754 ARM. */
c906108c 1755
ac3eeb49
MS
1756 /* We should be doing much hairier argument matching (see
1757 section 13.2 of the ARM), but as a quick kludge, just check
1758 for the same type code. */
df407dfe 1759 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1760 return i + 1;
c906108c 1761 }
ad2f7632 1762 if (varargs || t2[i] == NULL)
c5aa993b 1763 return 0;
ad2f7632 1764 return i + 1;
c906108c
SS
1765}
1766
b1af9e97
TT
1767/* Helper class for do_search_struct_field that updates *RESULT_PTR
1768 and *LAST_BOFFSET, and possibly throws an exception if the field
1769 search has yielded ambiguous results. */
c906108c 1770
b1af9e97
TT
1771static void
1772update_search_result (struct value **result_ptr, struct value *v,
1773 int *last_boffset, int boffset,
1774 const char *name, struct type *type)
1775{
1776 if (v != NULL)
1777 {
1778 if (*result_ptr != NULL
1779 /* The result is not ambiguous if all the classes that are
1780 found occupy the same space. */
1781 && *last_boffset != boffset)
1782 error (_("base class '%s' is ambiguous in type '%s'"),
1783 name, TYPE_SAFE_NAME (type));
1784 *result_ptr = v;
1785 *last_boffset = boffset;
1786 }
1787}
c906108c 1788
b1af9e97
TT
1789/* A helper for search_struct_field. This does all the work; most
1790 arguments are as passed to search_struct_field. The result is
1791 stored in *RESULT_PTR, which must be initialized to NULL.
1792 OUTERMOST_TYPE is the type of the initial type passed to
1793 search_struct_field; this is used for error reporting when the
1794 lookup is ambiguous. */
1795
1796static void
1797do_search_struct_field (const char *name, struct value *arg1, int offset,
1798 struct type *type, int looking_for_baseclass,
1799 struct value **result_ptr,
1800 int *last_boffset,
1801 struct type *outermost_type)
c906108c
SS
1802{
1803 int i;
edf3d5f3 1804 int nbases;
c906108c
SS
1805
1806 CHECK_TYPEDEF (type);
edf3d5f3 1807 nbases = TYPE_N_BASECLASSES (type);
c906108c 1808
c5aa993b 1809 if (!looking_for_baseclass)
c906108c
SS
1810 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1811 {
0d5cff50 1812 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1813
db577aea 1814 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1815 {
f23631e4 1816 struct value *v;
a109c7c1 1817
d6a843b5 1818 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1819 v = value_static_field (type, i);
c906108c 1820 else
b1af9e97
TT
1821 v = value_primitive_field (arg1, offset, i, type);
1822 *result_ptr = v;
1823 return;
c906108c
SS
1824 }
1825
1826 if (t_field_name
1827 && (t_field_name[0] == '\0'
1828 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 1829 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
1830 {
1831 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1832
c906108c
SS
1833 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1834 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1835 {
ac3eeb49
MS
1836 /* Look for a match through the fields of an anonymous
1837 union, or anonymous struct. C++ provides anonymous
1838 unions.
c906108c 1839
1b831c93
AC
1840 In the GNU Chill (now deleted from GDB)
1841 implementation of variant record types, each
1842 <alternative field> has an (anonymous) union type,
1843 each member of the union represents a <variant
1844 alternative>. Each <variant alternative> is
1845 represented as a struct, with a member for each
1846 <variant field>. */
c5aa993b 1847
b1af9e97 1848 struct value *v = NULL;
c906108c
SS
1849 int new_offset = offset;
1850
db034ac5
AC
1851 /* This is pretty gross. In G++, the offset in an
1852 anonymous union is relative to the beginning of the
1b831c93
AC
1853 enclosing struct. In the GNU Chill (now deleted
1854 from GDB) implementation of variant records, the
1855 bitpos is zero in an anonymous union field, so we
ac3eeb49 1856 have to add the offset of the union here. */
c906108c
SS
1857 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1858 || (TYPE_NFIELDS (field_type) > 0
1859 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1860 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1861
b1af9e97
TT
1862 do_search_struct_field (name, arg1, new_offset,
1863 field_type,
1864 looking_for_baseclass, &v,
1865 last_boffset,
1866 outermost_type);
c906108c 1867 if (v)
b1af9e97
TT
1868 {
1869 *result_ptr = v;
1870 return;
1871 }
c906108c
SS
1872 }
1873 }
1874 }
1875
c5aa993b 1876 for (i = 0; i < nbases; i++)
c906108c 1877 {
b1af9e97 1878 struct value *v = NULL;
c906108c 1879 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1880 /* If we are looking for baseclasses, this is what we get when
1881 we hit them. But it could happen that the base part's member
1882 name is not yet filled in. */
c906108c
SS
1883 int found_baseclass = (looking_for_baseclass
1884 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1885 && (strcmp_iw (name,
1886 TYPE_BASECLASS_NAME (type,
1887 i)) == 0));
b1af9e97 1888 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1889
1890 if (BASETYPE_VIA_VIRTUAL (type, i))
1891 {
3e3d7139 1892 struct value *v2;
c906108c
SS
1893
1894 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1895 value_contents_for_printing (arg1),
1896 value_embedded_offset (arg1) + offset,
1897 value_address (arg1),
1898 arg1);
c906108c 1899
ac3eeb49 1900 /* The virtual base class pointer might have been clobbered
581e13c1 1901 by the user program. Make sure that it still points to a
ac3eeb49 1902 valid memory location. */
c906108c 1903
1a334831
TT
1904 boffset += value_embedded_offset (arg1) + offset;
1905 if (boffset < 0
1906 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1907 {
1908 CORE_ADDR base_addr;
c5aa993b 1909
42ae5230 1910 base_addr = value_address (arg1) + boffset;
08039c9e 1911 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1912 if (target_read_memory (base_addr,
1913 value_contents_raw (v2),
acc900c2 1914 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1915 error (_("virtual baseclass botch"));
c906108c
SS
1916 }
1917 else
1918 {
1a334831
TT
1919 v2 = value_copy (arg1);
1920 deprecated_set_value_type (v2, basetype);
1921 set_value_embedded_offset (v2, boffset);
c906108c
SS
1922 }
1923
1924 if (found_baseclass)
b1af9e97
TT
1925 v = v2;
1926 else
1927 {
1928 do_search_struct_field (name, v2, 0,
1929 TYPE_BASECLASS (type, i),
1930 looking_for_baseclass,
1931 result_ptr, last_boffset,
1932 outermost_type);
1933 }
c906108c
SS
1934 }
1935 else if (found_baseclass)
1936 v = value_primitive_field (arg1, offset, i, type);
1937 else
b1af9e97
TT
1938 {
1939 do_search_struct_field (name, arg1,
1940 offset + TYPE_BASECLASS_BITPOS (type,
1941 i) / 8,
1942 basetype, looking_for_baseclass,
1943 result_ptr, last_boffset,
1944 outermost_type);
1945 }
1946
1947 update_search_result (result_ptr, v, last_boffset,
1948 boffset, name, outermost_type);
c906108c 1949 }
b1af9e97
TT
1950}
1951
1952/* Helper function used by value_struct_elt to recurse through
1953 baseclasses. Look for a field NAME in ARG1. Adjust the address of
1954 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1955 TYPE. If found, return value, else return NULL.
1956
1957 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1958 fields, look for a baseclass named NAME. */
1959
1960static struct value *
1961search_struct_field (const char *name, struct value *arg1, int offset,
1962 struct type *type, int looking_for_baseclass)
1963{
1964 struct value *result = NULL;
1965 int boffset = 0;
1966
1967 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
1968 &result, &boffset, type);
1969 return result;
c906108c
SS
1970}
1971
ac3eeb49 1972/* Helper function used by value_struct_elt to recurse through
581e13c1 1973 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1974 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1975 TYPE.
1976
1977 If found, return value, else if name matched and args not return
1978 (value) -1, else return NULL. */
c906108c 1979
f23631e4 1980static struct value *
714f19d5 1981search_struct_method (const char *name, struct value **arg1p,
f23631e4 1982 struct value **args, int offset,
aa1ee363 1983 int *static_memfuncp, struct type *type)
c906108c
SS
1984{
1985 int i;
f23631e4 1986 struct value *v;
c906108c
SS
1987 int name_matched = 0;
1988 char dem_opname[64];
1989
1990 CHECK_TYPEDEF (type);
1991 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1992 {
0d5cff50 1993 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1994
581e13c1 1995 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
1996 if (strncmp (t_field_name, "__", 2) == 0 ||
1997 strncmp (t_field_name, "op", 2) == 0 ||
1998 strncmp (t_field_name, "type", 4) == 0)
c906108c 1999 {
c5aa993b
JM
2000 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2001 t_field_name = dem_opname;
2002 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2003 t_field_name = dem_opname;
c906108c 2004 }
db577aea 2005 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2006 {
2007 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2008 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2009
a109c7c1 2010 name_matched = 1;
de17c821 2011 check_stub_method_group (type, i);
c906108c 2012 if (j > 0 && args == 0)
3e43a32a
MS
2013 error (_("cannot resolve overloaded method "
2014 "`%s': no arguments supplied"), name);
acf5ed49 2015 else if (j == 0 && args == 0)
c906108c 2016 {
acf5ed49
DJ
2017 v = value_fn_field (arg1p, f, j, type, offset);
2018 if (v != NULL)
2019 return v;
c906108c 2020 }
acf5ed49
DJ
2021 else
2022 while (j >= 0)
2023 {
acf5ed49 2024 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2025 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2026 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2027 TYPE_FN_FIELD_ARGS (f, j), args))
2028 {
2029 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2030 return value_virtual_fn_field (arg1p, f, j,
2031 type, offset);
2032 if (TYPE_FN_FIELD_STATIC_P (f, j)
2033 && static_memfuncp)
acf5ed49
DJ
2034 *static_memfuncp = 1;
2035 v = value_fn_field (arg1p, f, j, type, offset);
2036 if (v != NULL)
2037 return v;
2038 }
2039 j--;
2040 }
c906108c
SS
2041 }
2042 }
2043
2044 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2045 {
2046 int base_offset;
8af8e3bc 2047 int this_offset;
c906108c
SS
2048
2049 if (BASETYPE_VIA_VIRTUAL (type, i))
2050 {
086280be 2051 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2052 struct value *base_val;
086280be
UW
2053 const gdb_byte *base_valaddr;
2054
2055 /* The virtual base class pointer might have been
581e13c1 2056 clobbered by the user program. Make sure that it
8301c89e 2057 still points to a valid memory location. */
086280be
UW
2058
2059 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2060 {
6c18f3e0
SP
2061 gdb_byte *tmp;
2062 struct cleanup *back_to;
2063 CORE_ADDR address;
2064
2065 tmp = xmalloc (TYPE_LENGTH (baseclass));
2066 back_to = make_cleanup (xfree, tmp);
2067 address = value_address (*arg1p);
a109c7c1 2068
8af8e3bc 2069 if (target_read_memory (address + offset,
086280be
UW
2070 tmp, TYPE_LENGTH (baseclass)) != 0)
2071 error (_("virtual baseclass botch"));
8af8e3bc
PA
2072
2073 base_val = value_from_contents_and_address (baseclass,
2074 tmp,
2075 address + offset);
2076 base_valaddr = value_contents_for_printing (base_val);
2077 this_offset = 0;
6c18f3e0 2078 do_cleanups (back_to);
c5aa993b
JM
2079 }
2080 else
8af8e3bc
PA
2081 {
2082 base_val = *arg1p;
2083 base_valaddr = value_contents_for_printing (*arg1p);
2084 this_offset = offset;
2085 }
c5aa993b 2086
086280be 2087 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2088 this_offset, value_address (base_val),
2089 base_val);
c5aa993b 2090 }
c906108c
SS
2091 else
2092 {
2093 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2094 }
c906108c
SS
2095 v = search_struct_method (name, arg1p, args, base_offset + offset,
2096 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2097 if (v == (struct value *) - 1)
c906108c
SS
2098 {
2099 name_matched = 1;
2100 }
2101 else if (v)
2102 {
ac3eeb49
MS
2103 /* FIXME-bothner: Why is this commented out? Why is it here? */
2104 /* *arg1p = arg1_tmp; */
c906108c 2105 return v;
c5aa993b 2106 }
c906108c 2107 }
c5aa993b 2108 if (name_matched)
f23631e4 2109 return (struct value *) - 1;
c5aa993b
JM
2110 else
2111 return NULL;
c906108c
SS
2112}
2113
2114/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2115 extract the component named NAME from the ultimate target
2116 structure/union and return it as a value with its appropriate type.
c906108c
SS
2117 ERR is used in the error message if *ARGP's type is wrong.
2118
2119 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2120 an appropriate method. Also, handle derived types.
c906108c
SS
2121
2122 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2123 where the truthvalue of whether the function that was resolved was
2124 a static member function or not is stored.
2125
ac3eeb49
MS
2126 ERR is an error message to be printed in case the field is not
2127 found. */
c906108c 2128
f23631e4
AC
2129struct value *
2130value_struct_elt (struct value **argp, struct value **args,
714f19d5 2131 const char *name, int *static_memfuncp, const char *err)
c906108c 2132{
52f0bd74 2133 struct type *t;
f23631e4 2134 struct value *v;
c906108c 2135
994b9211 2136 *argp = coerce_array (*argp);
c906108c 2137
df407dfe 2138 t = check_typedef (value_type (*argp));
c906108c
SS
2139
2140 /* Follow pointers until we get to a non-pointer. */
2141
2142 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2143 {
2144 *argp = value_ind (*argp);
2145 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2146 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2147 *argp = coerce_array (*argp);
df407dfe 2148 t = check_typedef (value_type (*argp));
c906108c
SS
2149 }
2150
c5aa993b 2151 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2152 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2153 error (_("Attempt to extract a component of a value that is not a %s."),
2154 err);
c906108c
SS
2155
2156 /* Assume it's not, unless we see that it is. */
2157 if (static_memfuncp)
c5aa993b 2158 *static_memfuncp = 0;
c906108c
SS
2159
2160 if (!args)
2161 {
2162 /* if there are no arguments ...do this... */
2163
ac3eeb49
MS
2164 /* Try as a field first, because if we succeed, there is less
2165 work to be done. */
c906108c
SS
2166 v = search_struct_field (name, *argp, 0, t, 0);
2167 if (v)
2168 return v;
2169
2170 /* C++: If it was not found as a data field, then try to
7b83ea04 2171 return it as a pointer to a method. */
ac3eeb49
MS
2172 v = search_struct_method (name, argp, args, 0,
2173 static_memfuncp, t);
c906108c 2174
f23631e4 2175 if (v == (struct value *) - 1)
55b39184 2176 error (_("Cannot take address of method %s."), name);
c906108c
SS
2177 else if (v == 0)
2178 {
2179 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2180 error (_("There is no member or method named %s."), name);
c906108c 2181 else
8a3fe4f8 2182 error (_("There is no member named %s."), name);
c906108c
SS
2183 }
2184 return v;
2185 }
2186
8301c89e
DE
2187 v = search_struct_method (name, argp, args, 0,
2188 static_memfuncp, t);
7168a814 2189
f23631e4 2190 if (v == (struct value *) - 1)
c906108c 2191 {
3e43a32a
MS
2192 error (_("One of the arguments you tried to pass to %s could not "
2193 "be converted to what the function wants."), name);
c906108c
SS
2194 }
2195 else if (v == 0)
2196 {
ac3eeb49
MS
2197 /* See if user tried to invoke data as function. If so, hand it
2198 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2199 gdb should give an error. */
c906108c 2200 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2201 /* If we found an ordinary field, then it is not a method call.
2202 So, treat it as if it were a static member function. */
2203 if (v && static_memfuncp)
2204 *static_memfuncp = 1;
c906108c
SS
2205 }
2206
2207 if (!v)
79afc5ef
SW
2208 throw_error (NOT_FOUND_ERROR,
2209 _("Structure has no component named %s."), name);
c906108c
SS
2210 return v;
2211}
2212
b5b08fb4
SC
2213/* Given *ARGP, a value of type structure or union, or a pointer/reference
2214 to a structure or union, extract and return its component (field) of
2215 type FTYPE at the specified BITPOS.
2216 Throw an exception on error. */
2217
2218struct value *
2219value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2220 const char *err)
2221{
2222 struct type *t;
2223 struct value *v;
2224 int i;
2225 int nbases;
2226
2227 *argp = coerce_array (*argp);
2228
2229 t = check_typedef (value_type (*argp));
2230
2231 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2232 {
2233 *argp = value_ind (*argp);
2234 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2235 *argp = coerce_array (*argp);
2236 t = check_typedef (value_type (*argp));
2237 }
2238
2239 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2240 && TYPE_CODE (t) != TYPE_CODE_UNION)
2241 error (_("Attempt to extract a component of a value that is not a %s."),
2242 err);
2243
2244 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2245 {
2246 if (!field_is_static (&TYPE_FIELD (t, i))
2247 && bitpos == TYPE_FIELD_BITPOS (t, i)
2248 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2249 return value_primitive_field (*argp, 0, i, t);
2250 }
2251
2252 error (_("No field with matching bitpos and type."));
2253
2254 /* Never hit. */
2255 return NULL;
2256}
2257
ac3eeb49 2258/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2259 specified method. Return the pointer to the fn_field list FN_LIST of
2260 overloaded instances defined in the source language. If available
2261 and matching, a vector of matching xmethods defined in extension
2262 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2263
2264 Helper function for value_find_oload_list.
2265 ARGP is a pointer to a pointer to a value (the object).
2266 METHOD is a string containing the method name.
2267 OFFSET is the offset within the value.
2268 TYPE is the assumed type of the object.
233e8b28
SC
2269 FN_LIST is the pointer to matching overloaded instances defined in
2270 source language. Since this is a recursive function, *FN_LIST
2271 should be set to NULL when calling this function.
2272 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2273 0 when calling this function.
2274 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2275 should also be set to NULL when calling this function.
ac3eeb49
MS
2276 BASETYPE is set to the actual type of the subobject where the
2277 method is found.
581e13c1 2278 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2279
233e8b28 2280static void
714f19d5 2281find_method_list (struct value **argp, const char *method,
233e8b28
SC
2282 int offset, struct type *type,
2283 struct fn_field **fn_list, int *num_fns,
2284 VEC (xmethod_worker_ptr) **xm_worker_vec,
fba45db2 2285 struct type **basetype, int *boffset)
c906108c
SS
2286{
2287 int i;
233e8b28
SC
2288 struct fn_field *f = NULL;
2289 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2290
233e8b28
SC
2291 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2292 CHECK_TYPEDEF (type);
c906108c 2293
233e8b28
SC
2294 /* First check in object itself.
2295 This function is called recursively to search through base classes.
2296 If there is a source method match found at some stage, then we need not
2297 look for source methods in consequent recursive calls. */
2298 if ((*fn_list) == NULL)
c906108c 2299 {
233e8b28 2300 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2301 {
233e8b28
SC
2302 /* pai: FIXME What about operators and type conversions? */
2303 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2304
2305 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2306 {
2307 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2308 f = TYPE_FN_FIELDLIST1 (type, i);
2309 *fn_list = f;
4a1970e4 2310
233e8b28
SC
2311 *num_fns = len;
2312 *basetype = type;
2313 *boffset = offset;
4a1970e4 2314
233e8b28
SC
2315 /* Resolve any stub methods. */
2316 check_stub_method_group (type, i);
4a1970e4 2317
233e8b28
SC
2318 break;
2319 }
c5aa993b
JM
2320 }
2321 }
2322
233e8b28
SC
2323 /* Unlike source methods, xmethods can be accumulated over successive
2324 recursive calls. In other words, an xmethod named 'm' in a class
2325 will not hide an xmethod named 'm' in its base class(es). We want
2326 it to be this way because xmethods are after all convenience functions
2327 and hence there is no point restricting them with something like method
2328 hiding. Moreover, if hiding is done for xmethods as well, then we will
2329 have to provide a mechanism to un-hide (like the 'using' construct). */
2330 worker_vec = get_matching_xmethod_workers (type, method);
2331 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2332
2333 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2334 VEC_free (xmethod_worker_ptr, worker_vec);
2335 *xm_worker_vec = new_vec;
2336
2337 /* If source methods are not found in current class, look for them in the
2338 base classes. We also have to go through the base classes to gather
2339 extension methods. */
c906108c
SS
2340 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2341 {
2342 int base_offset;
a109c7c1 2343
c906108c
SS
2344 if (BASETYPE_VIA_VIRTUAL (type, i))
2345 {
086280be 2346 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2347 value_contents_for_printing (*argp),
2348 value_offset (*argp) + offset,
2349 value_address (*argp), *argp);
c5aa993b 2350 }
ac3eeb49
MS
2351 else /* Non-virtual base, simply use bit position from debug
2352 info. */
c906108c
SS
2353 {
2354 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2355 }
233e8b28
SC
2356
2357 find_method_list (argp, method, base_offset + offset,
2358 TYPE_BASECLASS (type, i), fn_list, num_fns,
2359 xm_worker_vec, basetype, boffset);
c906108c 2360 }
c906108c
SS
2361}
2362
233e8b28
SC
2363/* Return the list of overloaded methods of a specified name. The methods
2364 could be those GDB finds in the binary, or xmethod. Methods found in
2365 the binary are returned in FN_LIST, and xmethods are returned in
2366 XM_WORKER_VEC.
ac3eeb49
MS
2367
2368 ARGP is a pointer to a pointer to a value (the object).
2369 METHOD is the method name.
2370 OFFSET is the offset within the value contents.
233e8b28
SC
2371 FN_LIST is the pointer to matching overloaded instances defined in
2372 source language.
ac3eeb49 2373 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2374 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2375 extension languages.
ac3eeb49
MS
2376 BASETYPE is set to the type of the base subobject that defines the
2377 method.
581e13c1 2378 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2379
233e8b28 2380static void
714f19d5 2381value_find_oload_method_list (struct value **argp, const char *method,
233e8b28
SC
2382 int offset, struct fn_field **fn_list,
2383 int *num_fns,
2384 VEC (xmethod_worker_ptr) **xm_worker_vec,
ac3eeb49 2385 struct type **basetype, int *boffset)
c906108c 2386{
c5aa993b 2387 struct type *t;
c906108c 2388
df407dfe 2389 t = check_typedef (value_type (*argp));
c906108c 2390
ac3eeb49 2391 /* Code snarfed from value_struct_elt. */
c906108c
SS
2392 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2393 {
2394 *argp = value_ind (*argp);
2395 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2396 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2397 *argp = coerce_array (*argp);
df407dfe 2398 t = check_typedef (value_type (*argp));
c906108c 2399 }
c5aa993b 2400
c5aa993b
JM
2401 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2402 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2403 error (_("Attempt to extract a component of a "
2404 "value that is not a struct or union"));
c5aa993b 2405
233e8b28
SC
2406 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2407
2408 /* Clear the lists. */
2409 *fn_list = NULL;
2410 *num_fns = 0;
2411 *xm_worker_vec = NULL;
2412
2413 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2414 basetype, boffset);
c906108c
SS
2415}
2416
da096638 2417/* Given an array of arguments (ARGS) (which includes an
c906108c 2418 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2419 arguments NARGS, the NAME of a function, and whether it's a method or
2420 not (METHOD), find the best function that matches on the argument types
2421 according to the overload resolution rules.
c906108c 2422
4c3376c8
SW
2423 METHOD can be one of three values:
2424 NON_METHOD for non-member functions.
2425 METHOD: for member functions.
2426 BOTH: used for overload resolution of operators where the
2427 candidates are expected to be either member or non member
581e13c1 2428 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2429 (representing 'this') is expected to be a reference to the
2430 target object, and will be dereferenced when attempting the
2431 non-member search.
2432
c906108c
SS
2433 In the case of class methods, the parameter OBJ is an object value
2434 in which to search for overloaded methods.
2435
2436 In the case of non-method functions, the parameter FSYM is a symbol
2437 corresponding to one of the overloaded functions.
2438
2439 Return value is an integer: 0 -> good match, 10 -> debugger applied
2440 non-standard coercions, 100 -> incompatible.
2441
2442 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2443 If a non-method is being searched for, SYMP will hold the symbol
2444 for it.
c906108c
SS
2445
2446 If a method is being searched for, and it is a static method,
2447 then STATICP will point to a non-zero value.
2448
7322dca9
SW
2449 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2450 ADL overload candidates when performing overload resolution for a fully
2451 qualified name.
2452
e66d4446
SC
2453 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2454 read while picking the best overload match (it may be all zeroes and thus
2455 not have a vtable pointer), in which case skip virtual function lookup.
2456 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2457 the result type.
2458
c906108c
SS
2459 Note: This function does *not* check the value of
2460 overload_resolution. Caller must check it to see whether overload
581e13c1 2461 resolution is permitted. */
c906108c
SS
2462
2463int
da096638 2464find_overload_match (struct value **args, int nargs,
4c3376c8 2465 const char *name, enum oload_search_type method,
28c64fc2 2466 struct value **objp, struct symbol *fsym,
ac3eeb49 2467 struct value **valp, struct symbol **symp,
e66d4446
SC
2468 int *staticp, const int no_adl,
2469 const enum noside noside)
c906108c 2470{
7f8c9282 2471 struct value *obj = (objp ? *objp : NULL);
da096638 2472 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2473 /* Index of best overloaded function. */
4c3376c8
SW
2474 int func_oload_champ = -1;
2475 int method_oload_champ = -1;
233e8b28
SC
2476 int src_method_oload_champ = -1;
2477 int ext_method_oload_champ = -1;
2478 int src_and_ext_equal = 0;
4c3376c8 2479
ac3eeb49 2480 /* The measure for the current best match. */
4c3376c8
SW
2481 struct badness_vector *method_badness = NULL;
2482 struct badness_vector *func_badness = NULL;
233e8b28
SC
2483 struct badness_vector *ext_method_badness = NULL;
2484 struct badness_vector *src_method_badness = NULL;
4c3376c8 2485
f23631e4 2486 struct value *temp = obj;
ac3eeb49
MS
2487 /* For methods, the list of overloaded methods. */
2488 struct fn_field *fns_ptr = NULL;
2489 /* For non-methods, the list of overloaded function symbols. */
2490 struct symbol **oload_syms = NULL;
233e8b28
SC
2491 /* For xmethods, the VEC of xmethod workers. */
2492 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2493 /* Number of overloaded instances being considered. */
2494 int num_fns = 0;
c5aa993b 2495 struct type *basetype = NULL;
c906108c 2496 int boffset;
7322dca9
SW
2497
2498 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2499
8d577d32 2500 const char *obj_type_name = NULL;
7322dca9 2501 const char *func_name = NULL;
8d577d32 2502 enum oload_classification match_quality;
4c3376c8 2503 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2504 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2505 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2506 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2507
ac3eeb49 2508 /* Get the list of overloaded methods or functions. */
4c3376c8 2509 if (method == METHOD || method == BOTH)
c906108c 2510 {
a2ca50ae 2511 gdb_assert (obj);
94af9270
KS
2512
2513 /* OBJ may be a pointer value rather than the object itself. */
2514 obj = coerce_ref (obj);
2515 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2516 obj = coerce_ref (value_ind (obj));
df407dfe 2517 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2518
2519 /* First check whether this is a data member, e.g. a pointer to
2520 a function. */
2521 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2522 {
2523 *valp = search_struct_field (name, obj, 0,
2524 check_typedef (value_type (obj)), 0);
2525 if (*valp)
2526 {
2527 *staticp = 1;
f748fb40 2528 do_cleanups (all_cleanups);
94af9270
KS
2529 return 0;
2530 }
2531 }
c906108c 2532
4c3376c8 2533 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2534 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2535 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2536 /* If this is a method only search, and no methods were found
2537 the search has faild. */
233e8b28 2538 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2539 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2540 obj_type_name,
2541 (obj_type_name && *obj_type_name) ? "::" : "",
2542 name);
4a1970e4 2543 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2544 been resolved by find_method_list via
2545 value_find_oload_method_list above. */
4c3376c8
SW
2546 if (fns_ptr)
2547 {
2548 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2549
233e8b28
SC
2550 src_method_oload_champ = find_oload_champ (args, nargs,
2551 num_fns, fns_ptr, NULL,
2552 NULL, &src_method_badness);
2553
2554 src_method_match_quality = classify_oload_match
2555 (src_method_badness, nargs,
2556 oload_method_static_p (fns_ptr, src_method_oload_champ));
2557
2558 make_cleanup (xfree, src_method_badness);
2559 }
4c3376c8 2560
233e8b28
SC
2561 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2562 {
2563 ext_method_oload_champ = find_oload_champ (args, nargs,
2564 0, NULL, xm_worker_vec,
2565 NULL, &ext_method_badness);
2566 ext_method_match_quality = classify_oload_match (ext_method_badness,
2567 nargs, 0);
2568 make_cleanup (xfree, ext_method_badness);
2569 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2570 }
2571
233e8b28
SC
2572 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2573 {
2574 switch (compare_badness (ext_method_badness, src_method_badness))
2575 {
2576 case 0: /* Src method and xmethod are equally good. */
2577 src_and_ext_equal = 1;
2578 /* If src method and xmethod are equally good, then
2579 xmethod should be the winner. Hence, fall through to the
2580 case where a xmethod is better than the source
2581 method, except when the xmethod match quality is
2582 non-standard. */
2583 /* FALLTHROUGH */
2584 case 1: /* Src method and ext method are incompatible. */
2585 /* If ext method match is not standard, then let source method
2586 win. Otherwise, fallthrough to let xmethod win. */
2587 if (ext_method_match_quality != STANDARD)
2588 {
2589 method_oload_champ = src_method_oload_champ;
2590 method_badness = src_method_badness;
2591 ext_method_oload_champ = -1;
2592 method_match_quality = src_method_match_quality;
2593 break;
2594 }
2595 /* FALLTHROUGH */
2596 case 2: /* Ext method is champion. */
2597 method_oload_champ = ext_method_oload_champ;
2598 method_badness = ext_method_badness;
2599 src_method_oload_champ = -1;
2600 method_match_quality = ext_method_match_quality;
2601 break;
2602 case 3: /* Src method is champion. */
2603 method_oload_champ = src_method_oload_champ;
2604 method_badness = src_method_badness;
2605 ext_method_oload_champ = -1;
2606 method_match_quality = src_method_match_quality;
2607 break;
2608 default:
2609 gdb_assert_not_reached ("Unexpected overload comparison "
2610 "result");
2611 break;
2612 }
2613 }
2614 else if (src_method_oload_champ >= 0)
2615 {
2616 method_oload_champ = src_method_oload_champ;
2617 method_badness = src_method_badness;
2618 method_match_quality = src_method_match_quality;
2619 }
2620 else if (ext_method_oload_champ >= 0)
2621 {
2622 method_oload_champ = ext_method_oload_champ;
2623 method_badness = ext_method_badness;
2624 method_match_quality = ext_method_match_quality;
2625 }
c906108c 2626 }
4c3376c8
SW
2627
2628 if (method == NON_METHOD || method == BOTH)
c906108c 2629 {
7322dca9 2630 const char *qualified_name = NULL;
c906108c 2631
b021a221
MS
2632 /* If the overload match is being search for both as a method
2633 and non member function, the first argument must now be
2634 dereferenced. */
4c3376c8 2635 if (method == BOTH)
2b214ea6 2636 args[0] = value_ind (args[0]);
4c3376c8 2637
7322dca9
SW
2638 if (fsym)
2639 {
2640 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2641
2642 /* If we have a function with a C++ name, try to extract just
2643 the function part. Do not try this for non-functions (e.g.
2644 function pointers). */
2645 if (qualified_name
3e43a32a
MS
2646 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2647 == TYPE_CODE_FUNC)
7322dca9
SW
2648 {
2649 char *temp;
2650
2651 temp = cp_func_name (qualified_name);
2652
2653 /* If cp_func_name did not remove anything, the name of the
2654 symbol did not include scope or argument types - it was
2655 probably a C-style function. */
2656 if (temp)
2657 {
2658 make_cleanup (xfree, temp);
2659 if (strcmp (temp, qualified_name) == 0)
2660 func_name = NULL;
2661 else
2662 func_name = temp;
2663 }
2664 }
2665 }
2666 else
94af9270 2667 {
7322dca9
SW
2668 func_name = name;
2669 qualified_name = name;
94af9270 2670 }
d9639e13 2671
94af9270
KS
2672 /* If there was no C++ name, this must be a C-style function or
2673 not a function at all. Just return the same symbol. Do the
2674 same if cp_func_name fails for some reason. */
8d577d32 2675 if (func_name == NULL)
7b83ea04 2676 {
917317f4 2677 *symp = fsym;
5fe41fbf 2678 do_cleanups (all_cleanups);
7b83ea04
AC
2679 return 0;
2680 }
917317f4 2681
da096638 2682 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2683 func_name,
2684 qualified_name,
2685 &oload_syms,
2686 &func_badness,
2687 no_adl);
8d577d32 2688
4c3376c8
SW
2689 if (func_oload_champ >= 0)
2690 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2691
2692 make_cleanup (xfree, oload_syms);
2693 make_cleanup (xfree, func_badness);
8d577d32
DC
2694 }
2695
7322dca9 2696 /* Did we find a match ? */
4c3376c8 2697 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2698 throw_error (NOT_FOUND_ERROR,
2699 _("No symbol \"%s\" in current context."),
2700 name);
8d577d32 2701
4c3376c8
SW
2702 /* If we have found both a method match and a function
2703 match, find out which one is better, and calculate match
2704 quality. */
2705 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2706 {
2707 switch (compare_badness (func_badness, method_badness))
2708 {
2709 case 0: /* Top two contenders are equally good. */
b021a221
MS
2710 /* FIXME: GDB does not support the general ambiguous case.
2711 All candidates should be collected and presented the
2712 user. */
4c3376c8
SW
2713 error (_("Ambiguous overload resolution"));
2714 break;
2715 case 1: /* Incomparable top contenders. */
2716 /* This is an error incompatible candidates
2717 should not have been proposed. */
3e43a32a
MS
2718 error (_("Internal error: incompatible "
2719 "overload candidates proposed"));
4c3376c8
SW
2720 break;
2721 case 2: /* Function champion. */
2722 method_oload_champ = -1;
2723 match_quality = func_match_quality;
2724 break;
2725 case 3: /* Method champion. */
2726 func_oload_champ = -1;
2727 match_quality = method_match_quality;
2728 break;
2729 default:
2730 error (_("Internal error: unexpected overload comparison result"));
2731 break;
2732 }
2733 }
2734 else
2735 {
2736 /* We have either a method match or a function match. */
2737 if (method_oload_champ >= 0)
2738 match_quality = method_match_quality;
2739 else
2740 match_quality = func_match_quality;
2741 }
8d577d32
DC
2742
2743 if (match_quality == INCOMPATIBLE)
2744 {
4c3376c8 2745 if (method == METHOD)
8a3fe4f8 2746 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2747 obj_type_name,
2748 (obj_type_name && *obj_type_name) ? "::" : "",
2749 name);
2750 else
8a3fe4f8 2751 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2752 func_name);
2753 }
2754 else if (match_quality == NON_STANDARD)
2755 {
4c3376c8 2756 if (method == METHOD)
3e43a32a
MS
2757 warning (_("Using non-standard conversion to match "
2758 "method %s%s%s to supplied arguments"),
8d577d32
DC
2759 obj_type_name,
2760 (obj_type_name && *obj_type_name) ? "::" : "",
2761 name);
2762 else
3e43a32a
MS
2763 warning (_("Using non-standard conversion to match "
2764 "function %s to supplied arguments"),
8d577d32
DC
2765 func_name);
2766 }
2767
4c3376c8 2768 if (staticp != NULL)
2bca57ba 2769 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2770
2771 if (method_oload_champ >= 0)
8d577d32 2772 {
233e8b28
SC
2773 if (src_method_oload_champ >= 0)
2774 {
e66d4446
SC
2775 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ)
2776 && noside != EVAL_AVOID_SIDE_EFFECTS)
2777 {
2778 *valp = value_virtual_fn_field (&temp, fns_ptr,
2779 method_oload_champ, basetype,
2780 boffset);
2781 }
233e8b28
SC
2782 else
2783 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2784 basetype, boffset);
2785 }
8d577d32 2786 else
233e8b28
SC
2787 {
2788 *valp = value_of_xmethod (clone_xmethod_worker
2789 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2790 ext_method_oload_champ)));
2791 }
8d577d32
DC
2792 }
2793 else
4c3376c8 2794 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2795
2796 if (objp)
2797 {
a4295225 2798 struct type *temp_type = check_typedef (value_type (temp));
da096638 2799 struct type *objtype = check_typedef (obj_type);
a109c7c1 2800
a4295225 2801 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2802 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2803 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2804 {
2805 temp = value_addr (temp);
2806 }
2807 *objp = temp;
2808 }
7322dca9
SW
2809
2810 do_cleanups (all_cleanups);
8d577d32
DC
2811
2812 switch (match_quality)
2813 {
2814 case INCOMPATIBLE:
2815 return 100;
2816 case NON_STANDARD:
2817 return 10;
2818 default: /* STANDARD */
2819 return 0;
2820 }
2821}
2822
2823/* Find the best overload match, searching for FUNC_NAME in namespaces
2824 contained in QUALIFIED_NAME until it either finds a good match or
2825 runs out of namespaces. It stores the overloaded functions in
2826 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2827 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2828 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2829 performned. */
8d577d32
DC
2830
2831static int
da096638 2832find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2833 const char *func_name,
2834 const char *qualified_name,
2835 struct symbol ***oload_syms,
7322dca9
SW
2836 struct badness_vector **oload_champ_bv,
2837 const int no_adl)
8d577d32
DC
2838{
2839 int oload_champ;
2840
da096638 2841 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2842 func_name,
2843 qualified_name, 0,
2844 oload_syms, oload_champ_bv,
7322dca9
SW
2845 &oload_champ,
2846 no_adl);
8d577d32
DC
2847
2848 return oload_champ;
2849}
2850
2851/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2852 how deep we've looked for namespaces, and the champ is stored in
2853 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2854 if it isn't. Other arguments are the same as in
2855 find_oload_champ_namespace
8d577d32
DC
2856
2857 It is the caller's responsibility to free *OLOAD_SYMS and
2858 *OLOAD_CHAMP_BV. */
2859
2860static int
da096638 2861find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2862 const char *func_name,
2863 const char *qualified_name,
2864 int namespace_len,
2865 struct symbol ***oload_syms,
2866 struct badness_vector **oload_champ_bv,
7322dca9
SW
2867 int *oload_champ,
2868 const int no_adl)
8d577d32
DC
2869{
2870 int next_namespace_len = namespace_len;
2871 int searched_deeper = 0;
2872 int num_fns = 0;
2873 struct cleanup *old_cleanups;
2874 int new_oload_champ;
2875 struct symbol **new_oload_syms;
2876 struct badness_vector *new_oload_champ_bv;
2877 char *new_namespace;
2878
2879 if (next_namespace_len != 0)
2880 {
2881 gdb_assert (qualified_name[next_namespace_len] == ':');
2882 next_namespace_len += 2;
c906108c 2883 }
ac3eeb49
MS
2884 next_namespace_len +=
2885 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2886
2887 /* Initialize these to values that can safely be xfree'd. */
2888 *oload_syms = NULL;
2889 *oload_champ_bv = NULL;
c5aa993b 2890
581e13c1 2891 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2892 If we get a good match there, use it. */
8d577d32
DC
2893
2894 if (qualified_name[next_namespace_len] == ':')
2895 {
2896 searched_deeper = 1;
2897
da096638 2898 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2899 func_name, qualified_name,
2900 next_namespace_len,
2901 oload_syms, oload_champ_bv,
7322dca9 2902 oload_champ, no_adl))
8d577d32
DC
2903 {
2904 return 1;
2905 }
2906 };
2907
2908 /* If we reach here, either we're in the deepest namespace or we
2909 didn't find a good match in a deeper namespace. But, in the
2910 latter case, we still have a bad match in a deeper namespace;
2911 note that we might not find any match at all in the current
2912 namespace. (There's always a match in the deepest namespace,
2913 because this overload mechanism only gets called if there's a
2914 function symbol to start off with.) */
2915
2916 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2917 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2918 new_namespace = alloca (namespace_len + 1);
2919 strncpy (new_namespace, qualified_name, namespace_len);
2920 new_namespace[namespace_len] = '\0';
2921 new_oload_syms = make_symbol_overload_list (func_name,
2922 new_namespace);
7322dca9
SW
2923
2924 /* If we have reached the deepest level perform argument
2925 determined lookup. */
2926 if (!searched_deeper && !no_adl)
da096638
KS
2927 {
2928 int ix;
2929 struct type **arg_types;
2930
2931 /* Prepare list of argument types for overload resolution. */
2932 arg_types = (struct type **)
2933 alloca (nargs * (sizeof (struct type *)));
2934 for (ix = 0; ix < nargs; ix++)
2935 arg_types[ix] = value_type (args[ix]);
2936 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2937 }
7322dca9 2938
8d577d32
DC
2939 while (new_oload_syms[num_fns])
2940 ++num_fns;
2941
9cf95373 2942 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2943 NULL, NULL, new_oload_syms,
8d577d32
DC
2944 &new_oload_champ_bv);
2945
2946 /* Case 1: We found a good match. Free earlier matches (if any),
2947 and return it. Case 2: We didn't find a good match, but we're
2948 not the deepest function. Then go with the bad match that the
2949 deeper function found. Case 3: We found a bad match, and we're
2950 the deepest function. Then return what we found, even though
2951 it's a bad match. */
2952
2953 if (new_oload_champ != -1
2954 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2955 {
2956 *oload_syms = new_oload_syms;
2957 *oload_champ = new_oload_champ;
2958 *oload_champ_bv = new_oload_champ_bv;
2959 do_cleanups (old_cleanups);
2960 return 1;
2961 }
2962 else if (searched_deeper)
2963 {
2964 xfree (new_oload_syms);
2965 xfree (new_oload_champ_bv);
2966 discard_cleanups (old_cleanups);
2967 return 0;
2968 }
2969 else
2970 {
8d577d32
DC
2971 *oload_syms = new_oload_syms;
2972 *oload_champ = new_oload_champ;
2973 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2974 do_cleanups (old_cleanups);
8d577d32
DC
2975 return 0;
2976 }
2977}
2978
da096638 2979/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2980 the best match from among the overloaded methods or functions
233e8b28
SC
2981 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
2982 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
2983 non-NULL.
2984
2985 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
2986 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
2987
8d577d32
DC
2988 Return the index of the best match; store an indication of the
2989 quality of the match in OLOAD_CHAMP_BV.
2990
2991 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2992
2993static int
9cf95373 2994find_oload_champ (struct value **args, int nargs,
8d577d32 2995 int num_fns, struct fn_field *fns_ptr,
233e8b28 2996 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
2997 struct symbol **oload_syms,
2998 struct badness_vector **oload_champ_bv)
2999{
3000 int ix;
233e8b28
SC
3001 int fn_count;
3002 int xm_worker_vec_n = VEC_length (xmethod_worker_ptr, xm_worker_vec);
ac3eeb49
MS
3003 /* A measure of how good an overloaded instance is. */
3004 struct badness_vector *bv;
3005 /* Index of best overloaded function. */
3006 int oload_champ = -1;
3007 /* Current ambiguity state for overload resolution. */
3008 int oload_ambiguous = 0;
3009 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3010
9cf95373 3011 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3012 alone, or in xmethods alone, but not in more than one of these
3013 groups. */
3014 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3015 == 1);
9cf95373 3016
8d577d32 3017 *oload_champ_bv = NULL;
c906108c 3018
233e8b28
SC
3019 fn_count = (xm_worker_vec != NULL
3020 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3021 : num_fns);
ac3eeb49 3022 /* Consider each candidate in turn. */
233e8b28 3023 for (ix = 0; ix < fn_count; ix++)
c906108c 3024 {
8d577d32 3025 int jj;
233e8b28 3026 int static_offset = 0;
8d577d32
DC
3027 int nparms;
3028 struct type **parm_types;
233e8b28 3029 struct xmethod_worker *worker = NULL;
8d577d32 3030
233e8b28 3031 if (xm_worker_vec != NULL)
db577aea 3032 {
233e8b28
SC
3033 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3034 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3035 }
3036 else
3037 {
233e8b28
SC
3038 if (fns_ptr != NULL)
3039 {
3040 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3041 static_offset = oload_method_static_p (fns_ptr, ix);
3042 }
3043 else
3044 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3045
3046 parm_types = (struct type **)
3047 xmalloc (nparms * (sizeof (struct type *)));
3048 for (jj = 0; jj < nparms; jj++)
3049 parm_types[jj] = (fns_ptr != NULL
3050 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3051 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
8301c89e 3052 jj));
db577aea 3053 }
c906108c 3054
ac3eeb49
MS
3055 /* Compare parameter types to supplied argument types. Skip
3056 THIS for static methods. */
3057 bv = rank_function (parm_types, nparms,
da096638 3058 args + static_offset,
4a1970e4 3059 nargs - static_offset);
c5aa993b 3060
8d577d32 3061 if (!*oload_champ_bv)
c5aa993b 3062 {
8d577d32 3063 *oload_champ_bv = bv;
c5aa993b 3064 oload_champ = 0;
c5aa993b 3065 }
ac3eeb49
MS
3066 else /* See whether current candidate is better or worse than
3067 previous best. */
8d577d32 3068 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3069 {
ac3eeb49
MS
3070 case 0: /* Top two contenders are equally good. */
3071 oload_ambiguous = 1;
c5aa993b 3072 break;
ac3eeb49
MS
3073 case 1: /* Incomparable top contenders. */
3074 oload_ambiguous = 2;
c5aa993b 3075 break;
ac3eeb49
MS
3076 case 2: /* New champion, record details. */
3077 *oload_champ_bv = bv;
c5aa993b
JM
3078 oload_ambiguous = 0;
3079 oload_champ = ix;
c5aa993b
JM
3080 break;
3081 case 3:
3082 default:
3083 break;
3084 }
b8c9b27d 3085 xfree (parm_types);
6b1ba9a0
ND
3086 if (overload_debug)
3087 {
233e8b28 3088 if (fns_ptr != NULL)
ac3eeb49 3089 fprintf_filtered (gdb_stderr,
3e43a32a 3090 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3091 fns_ptr[ix].physname, nparms);
233e8b28
SC
3092 else if (xm_worker_vec != NULL)
3093 fprintf_filtered (gdb_stderr,
3094 "Xmethod worker, # of parms %d\n",
3095 nparms);
6b1ba9a0 3096 else
ac3eeb49 3097 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3098 "Overloaded function instance "
3099 "%s # of parms %d\n",
ac3eeb49
MS
3100 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3101 nparms);
4a1970e4 3102 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3103 fprintf_filtered (gdb_stderr,
3104 "...Badness @ %d : %d\n",
6403aeea 3105 jj, bv->rank[jj].rank);
3e43a32a
MS
3106 fprintf_filtered (gdb_stderr, "Overload resolution "
3107 "champion is %d, ambiguous? %d\n",
ac3eeb49 3108 oload_champ, oload_ambiguous);
6b1ba9a0 3109 }
c906108c
SS
3110 }
3111
8d577d32
DC
3112 return oload_champ;
3113}
6b1ba9a0 3114
8d577d32
DC
3115/* Return 1 if we're looking at a static method, 0 if we're looking at
3116 a non-static method or a function that isn't a method. */
c906108c 3117
8d577d32 3118static int
2bca57ba 3119oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3120{
2bca57ba 3121 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3122 return 1;
c906108c 3123 else
8d577d32
DC
3124 return 0;
3125}
c906108c 3126
8d577d32
DC
3127/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3128
3129static enum oload_classification
3130classify_oload_match (struct badness_vector *oload_champ_bv,
3131 int nargs,
3132 int static_offset)
3133{
3134 int ix;
da096638 3135 enum oload_classification worst = STANDARD;
8d577d32
DC
3136
3137 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3138 {
6403aeea
SW
3139 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3140 or worse return INCOMPATIBLE. */
3141 if (compare_ranks (oload_champ_bv->rank[ix],
3142 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3143 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3144 /* Otherwise If this conversion is as bad as
3145 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3146 else if (compare_ranks (oload_champ_bv->rank[ix],
3147 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3148 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3149 needed. */
7f8c9282 3150 }
02f0d45d 3151
da096638
KS
3152 /* If no INCOMPATIBLE classification was found, return the worst one
3153 that was found (if any). */
3154 return worst;
c906108c
SS
3155}
3156
ac3eeb49
MS
3157/* C++: return 1 is NAME is a legitimate name for the destructor of
3158 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3159 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3160 have CHECK_TYPEDEF applied, this function will apply it itself. */
3161
c906108c 3162int
d8228535 3163destructor_name_p (const char *name, struct type *type)
c906108c 3164{
c906108c
SS
3165 if (name[0] == '~')
3166 {
d8228535
JK
3167 const char *dname = type_name_no_tag_or_error (type);
3168 const char *cp = strchr (dname, '<');
c906108c
SS
3169 unsigned int len;
3170
3171 /* Do not compare the template part for template classes. */
3172 if (cp == NULL)
3173 len = strlen (dname);
3174 else
3175 len = cp - dname;
bf896cb0 3176 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3177 error (_("name of destructor must equal name of class"));
c906108c
SS
3178 else
3179 return 1;
3180 }
3181 return 0;
3182}
3183
3d567982
TT
3184/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3185 class". If the name is found, return a value representing it;
3186 otherwise throw an exception. */
3187
3188static struct value *
3189enum_constant_from_type (struct type *type, const char *name)
3190{
3191 int i;
3192 int name_len = strlen (name);
3193
3194 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3195 && TYPE_DECLARED_CLASS (type));
3196
3197 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3198 {
3199 const char *fname = TYPE_FIELD_NAME (type, i);
3200 int len;
3201
3202 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3203 || fname == NULL)
3204 continue;
3205
3206 /* Look for the trailing "::NAME", since enum class constant
3207 names are qualified here. */
3208 len = strlen (fname);
3209 if (len + 2 >= name_len
3210 && fname[len - name_len - 2] == ':'
3211 && fname[len - name_len - 1] == ':'
3212 && strcmp (&fname[len - name_len], name) == 0)
3213 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3214 }
3215
3216 error (_("no constant named \"%s\" in enum \"%s\""),
3217 name, TYPE_TAG_NAME (type));
3218}
3219
79c2c32d 3220/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3221 return the appropriate member (or the address of the member, if
3222 WANT_ADDRESS). This function is used to resolve user expressions
3223 of the form "DOMAIN::NAME". For more details on what happens, see
3224 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3225
3226struct value *
c848d642 3227value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3228 struct type *expect_type, int want_address,
79c2c32d
DC
3229 enum noside noside)
3230{
3231 switch (TYPE_CODE (curtype))
3232 {
3233 case TYPE_CODE_STRUCT:
3234 case TYPE_CODE_UNION:
ac3eeb49 3235 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3236 name, expect_type,
0d5de010 3237 want_address, noside);
79c2c32d 3238 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3239 return value_namespace_elt (curtype, name,
3240 want_address, noside);
3d567982
TT
3241
3242 case TYPE_CODE_ENUM:
3243 return enum_constant_from_type (curtype, name);
3244
79c2c32d
DC
3245 default:
3246 internal_error (__FILE__, __LINE__,
e2e0b3e5 3247 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3248 }
3249}
3250
072bba3b 3251/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3252 with respect to the methods' parameters. If the types of the
072bba3b
KS
3253 two parameter lists are the same, returns 1; 0 otherwise. This
3254 comparison may ignore any artificial parameters in T1 if
3255 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3256 the first artificial parameter in T1, assumed to be a 'this' pointer.
3257
3258 The type T2 is expected to have come from make_params (in eval.c). */
3259
3260static int
3261compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3262{
3263 int start = 0;
3264
80b23b6a 3265 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3266 ++start;
3267
3268 /* If skipping artificial fields, find the first real field
581e13c1 3269 in T1. */
072bba3b
KS
3270 if (skip_artificial)
3271 {
3272 while (start < TYPE_NFIELDS (t1)
3273 && TYPE_FIELD_ARTIFICIAL (t1, start))
3274 ++start;
3275 }
3276
581e13c1 3277 /* Now compare parameters. */
072bba3b
KS
3278
3279 /* Special case: a method taking void. T1 will contain no
3280 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3281 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3282 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3283 return 1;
3284
3285 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3286 {
3287 int i;
a109c7c1 3288
072bba3b
KS
3289 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3290 {
6403aeea 3291 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3292 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3293 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3294 return 0;
3295 }
3296
3297 return 1;
3298 }
3299
3300 return 0;
3301}
3302
c906108c 3303/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3304 return the address of this member as a "pointer to member" type.
3305 If INTYPE is non-null, then it will be the type of the member we
3306 are looking for. This will help us resolve "pointers to member
3307 functions". This function is used to resolve user expressions of
3308 the form "DOMAIN::NAME". */
c906108c 3309
63d06c5c 3310static struct value *
fba45db2 3311value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3312 struct type *curtype, const char *name,
ac3eeb49
MS
3313 struct type *intype,
3314 int want_address,
63d06c5c 3315 enum noside noside)
c906108c 3316{
52f0bd74
AC
3317 struct type *t = curtype;
3318 int i;
0d5de010 3319 struct value *v, *result;
c906108c 3320
c5aa993b 3321 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3322 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3323 error (_("Internal error: non-aggregate type "
3324 "to value_struct_elt_for_reference"));
c906108c
SS
3325
3326 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3327 {
0d5cff50 3328 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3329
6314a349 3330 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3331 {
d6a843b5 3332 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3333 {
3334 v = value_static_field (t, i);
0d5de010
DJ
3335 if (want_address)
3336 v = value_addr (v);
c906108c
SS
3337 return v;
3338 }
3339 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3340 error (_("pointers to bitfield members not allowed"));
c5aa993b 3341
0d5de010
DJ
3342 if (want_address)
3343 return value_from_longest
3344 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3345 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3346 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3347 return allocate_value (TYPE_FIELD_TYPE (t, i));
3348 else
f7e3ecae
KS
3349 {
3350 /* Try to evaluate NAME as a qualified name with implicit
3351 this pointer. In this case, attempt to return the
3352 equivalent to `this->*(&TYPE::NAME)'. */
3353 v = value_of_this_silent (current_language);
3354 if (v != NULL)
3355 {
3356 struct value *ptr;
3357 long mem_offset;
3358 struct type *type, *tmp;
3359
3360 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3361 type = check_typedef (value_type (ptr));
3362 gdb_assert (type != NULL
3363 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
3364 tmp = lookup_pointer_type (TYPE_DOMAIN_TYPE (type));
3365 v = value_cast_pointers (tmp, v, 1);
3366 mem_offset = value_as_long (ptr);
3367 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3368 result = value_from_pointer (tmp,
3369 value_as_long (v) + mem_offset);
3370 return value_ind (result);
3371 }
3372
3373 error (_("Cannot reference non-static field \"%s\""), name);
3374 }
c906108c
SS
3375 }
3376 }
3377
ac3eeb49
MS
3378 /* C++: If it was not found as a data field, then try to return it
3379 as a pointer to a method. */
c906108c 3380
c906108c
SS
3381 /* Perform all necessary dereferencing. */
3382 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3383 intype = TYPE_TARGET_TYPE (intype);
3384
3385 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3386 {
0d5cff50 3387 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3388 char dem_opname[64];
3389
ac3eeb49
MS
3390 if (strncmp (t_field_name, "__", 2) == 0
3391 || strncmp (t_field_name, "op", 2) == 0
3392 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3393 {
ac3eeb49
MS
3394 if (cplus_demangle_opname (t_field_name,
3395 dem_opname, DMGL_ANSI))
c5aa993b 3396 t_field_name = dem_opname;
ac3eeb49
MS
3397 else if (cplus_demangle_opname (t_field_name,
3398 dem_opname, 0))
c906108c 3399 t_field_name = dem_opname;
c906108c 3400 }
6314a349 3401 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3402 {
072bba3b
KS
3403 int j;
3404 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3405 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3406
de17c821
DJ
3407 check_stub_method_group (t, i);
3408
c906108c
SS
3409 if (intype)
3410 {
072bba3b
KS
3411 for (j = 0; j < len; ++j)
3412 {
3413 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3414 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3415 intype, 1))
072bba3b
KS
3416 break;
3417 }
3418
3419 if (j == len)
3e43a32a
MS
3420 error (_("no member function matches "
3421 "that type instantiation"));
7f79b1c5 3422 }
c906108c 3423 else
072bba3b
KS
3424 {
3425 int ii;
7f79b1c5
DJ
3426
3427 j = -1;
53832f31 3428 for (ii = 0; ii < len; ++ii)
072bba3b 3429 {
7f79b1c5
DJ
3430 /* Skip artificial methods. This is necessary if,
3431 for example, the user wants to "print
3432 subclass::subclass" with only one user-defined
53832f31
TT
3433 constructor. There is no ambiguity in this case.
3434 We are careful here to allow artificial methods
3435 if they are the unique result. */
072bba3b 3436 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3437 {
3438 if (j == -1)
3439 j = ii;
3440 continue;
3441 }
072bba3b 3442
7f79b1c5
DJ
3443 /* Desired method is ambiguous if more than one
3444 method is defined. */
53832f31 3445 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3446 error (_("non-unique member `%s' requires "
3447 "type instantiation"), name);
072bba3b 3448
7f79b1c5
DJ
3449 j = ii;
3450 }
53832f31
TT
3451
3452 if (j == -1)
3453 error (_("no matching member function"));
072bba3b 3454 }
c5aa993b 3455
0d5de010
DJ
3456 if (TYPE_FN_FIELD_STATIC_P (f, j))
3457 {
ac3eeb49
MS
3458 struct symbol *s =
3459 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3460 0, VAR_DOMAIN, 0);
a109c7c1 3461
0d5de010
DJ
3462 if (s == NULL)
3463 return NULL;
3464
3465 if (want_address)
3466 return value_addr (read_var_value (s, 0));
3467 else
3468 return read_var_value (s, 0);
3469 }
3470
c906108c
SS
3471 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3472 {
0d5de010
DJ
3473 if (want_address)
3474 {
3475 result = allocate_value
3476 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3477 cplus_make_method_ptr (value_type (result),
3478 value_contents_writeable (result),
0d5de010
DJ
3479 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3480 }
3481 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3482 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3483 else
3484 error (_("Cannot reference virtual member function \"%s\""),
3485 name);
c906108c
SS
3486 }
3487 else
3488 {
ac3eeb49
MS
3489 struct symbol *s =
3490 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3491 0, VAR_DOMAIN, 0);
a109c7c1 3492
c906108c 3493 if (s == NULL)
0d5de010
DJ
3494 return NULL;
3495
3496 v = read_var_value (s, 0);
3497 if (!want_address)
3498 result = v;
c906108c
SS
3499 else
3500 {
0d5de010 3501 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3502 cplus_make_method_ptr (value_type (result),
3503 value_contents_writeable (result),
42ae5230 3504 value_address (v), 0);
c906108c 3505 }
c906108c 3506 }
0d5de010 3507 return result;
c906108c
SS
3508 }
3509 }
3510 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3511 {
f23631e4 3512 struct value *v;
c906108c
SS
3513 int base_offset;
3514
3515 if (BASETYPE_VIA_VIRTUAL (t, i))
3516 base_offset = 0;
3517 else
3518 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3519 v = value_struct_elt_for_reference (domain,
3520 offset + base_offset,
3521 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3522 name, intype,
3523 want_address, noside);
c906108c
SS
3524 if (v)
3525 return v;
3526 }
63d06c5c
DC
3527
3528 /* As a last chance, pretend that CURTYPE is a namespace, and look
3529 it up that way; this (frequently) works for types nested inside
3530 classes. */
3531
ac3eeb49
MS
3532 return value_maybe_namespace_elt (curtype, name,
3533 want_address, noside);
c906108c
SS
3534}
3535
79c2c32d
DC
3536/* C++: Return the member NAME of the namespace given by the type
3537 CURTYPE. */
3538
3539static struct value *
3540value_namespace_elt (const struct type *curtype,
c848d642 3541 const char *name, int want_address,
79c2c32d 3542 enum noside noside)
63d06c5c
DC
3543{
3544 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3545 want_address,
3546 noside);
63d06c5c
DC
3547
3548 if (retval == NULL)
ac3eeb49
MS
3549 error (_("No symbol \"%s\" in namespace \"%s\"."),
3550 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3551
3552 return retval;
3553}
3554
3555/* A helper function used by value_namespace_elt and
3556 value_struct_elt_for_reference. It looks up NAME inside the
3557 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3558 is a class and NAME refers to a type in CURTYPE itself (as opposed
3559 to, say, some base class of CURTYPE). */
3560
3561static struct value *
3562value_maybe_namespace_elt (const struct type *curtype,
c848d642 3563 const char *name, int want_address,
63d06c5c 3564 enum noside noside)
79c2c32d
DC
3565{
3566 const char *namespace_name = TYPE_TAG_NAME (curtype);
3567 struct symbol *sym;
0d5de010 3568 struct value *result;
79c2c32d 3569
13387711 3570 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3571 get_selected_block (0), VAR_DOMAIN);
3572
3573 if (sym == NULL)
3574 {
3575 char *concatenated_name = alloca (strlen (namespace_name) + 2
3576 + strlen (name) + 1);
3577
3578 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3579 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3580 }
79c2c32d
DC
3581
3582 if (sym == NULL)
63d06c5c 3583 return NULL;
79c2c32d
DC
3584 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3585 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3586 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3587 else
0d5de010
DJ
3588 result = value_of_variable (sym, get_selected_block (0));
3589
3590 if (result && want_address)
3591 result = value_addr (result);
3592
3593 return result;
79c2c32d
DC
3594}
3595
dfcee124 3596/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3597
c906108c 3598 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3599 and refer to the values computed for the object pointed to. */
c906108c
SS
3600
3601struct type *
dfcee124
AG
3602value_rtti_indirect_type (struct value *v, int *full,
3603 int *top, int *using_enc)
c906108c 3604{
f23631e4 3605 struct value *target;
dfcee124
AG
3606 struct type *type, *real_type, *target_type;
3607
3608 type = value_type (v);
3609 type = check_typedef (type);
3610 if (TYPE_CODE (type) == TYPE_CODE_REF)
3611 target = coerce_ref (v);
3612 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3613 target = value_ind (v);
3614 else
3615 return NULL;
c906108c 3616
dfcee124
AG
3617 real_type = value_rtti_type (target, full, top, using_enc);
3618
3619 if (real_type)
3620 {
3621 /* Copy qualifiers to the referenced object. */
3622 target_type = value_type (target);
3623 real_type = make_cv_type (TYPE_CONST (target_type),
3624 TYPE_VOLATILE (target_type), real_type, NULL);
3625 if (TYPE_CODE (type) == TYPE_CODE_REF)
3626 real_type = lookup_reference_type (real_type);
3627 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3628 real_type = lookup_pointer_type (real_type);
3629 else
3630 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3631
3632 /* Copy qualifiers to the pointer/reference. */
3633 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3634 real_type, NULL);
3635 }
c906108c 3636
dfcee124 3637 return real_type;
c906108c
SS
3638}
3639
3640/* Given a value pointed to by ARGP, check its real run-time type, and
3641 if that is different from the enclosing type, create a new value
3642 using the real run-time type as the enclosing type (and of the same
3643 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3644 be the correct offset to the enclosed object. RTYPE is the type,
3645 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3646 by value_rtti_type(). If these are available, they can be supplied
3647 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3648 NULL if they're not available. */
c906108c 3649
f23631e4 3650struct value *
ac3eeb49
MS
3651value_full_object (struct value *argp,
3652 struct type *rtype,
3653 int xfull, int xtop,
fba45db2 3654 int xusing_enc)
c906108c 3655{
c5aa993b 3656 struct type *real_type;
c906108c
SS
3657 int full = 0;
3658 int top = -1;
3659 int using_enc = 0;
f23631e4 3660 struct value *new_val;
c906108c
SS
3661
3662 if (rtype)
3663 {
3664 real_type = rtype;
3665 full = xfull;
3666 top = xtop;
3667 using_enc = xusing_enc;
3668 }
3669 else
3670 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3671
ac3eeb49 3672 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3673 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3674 return argp;
3675
a7860e76
TT
3676 /* In a destructor we might see a real type that is a superclass of
3677 the object's type. In this case it is better to leave the object
3678 as-is. */
3679 if (full
3680 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3681 return argp;
3682
c906108c 3683 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3684 type is wrong, set it. */
3685 /* pai: FIXME -- sounds iffy */
c906108c
SS
3686 if (full)
3687 {
4dfea560
DE
3688 argp = value_copy (argp);
3689 set_value_enclosing_type (argp, real_type);
c906108c
SS
3690 return argp;
3691 }
3692
581e13c1 3693 /* Check if object is in memory. */
c906108c
SS
3694 if (VALUE_LVAL (argp) != lval_memory)
3695 {
3e43a32a
MS
3696 warning (_("Couldn't retrieve complete object of RTTI "
3697 "type %s; object may be in register(s)."),
ac3eeb49 3698 TYPE_NAME (real_type));
c5aa993b 3699
c906108c
SS
3700 return argp;
3701 }
c5aa993b 3702
ac3eeb49
MS
3703 /* All other cases -- retrieve the complete object. */
3704 /* Go back by the computed top_offset from the beginning of the
3705 object, adjusting for the embedded offset of argp if that's what
3706 value_rtti_type used for its computation. */
42ae5230 3707 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3708 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3709 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3710 set_value_embedded_offset (new_val, (using_enc
3711 ? top + value_embedded_offset (argp)
3712 : top));
c906108c
SS
3713 return new_val;
3714}
3715
389e51db 3716
85bc8cb7
JK
3717/* Return the value of the local variable, if one exists. Throw error
3718 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3719
f23631e4 3720struct value *
85bc8cb7 3721value_of_this (const struct language_defn *lang)
c906108c 3722{
66a17cb6 3723 struct symbol *sym;
3977b71f 3724 const struct block *b;
206415a3 3725 struct frame_info *frame;
c906108c 3726
66a17cb6 3727 if (!lang->la_name_of_this)
85bc8cb7 3728 error (_("no `this' in current language"));
aee28ec6 3729
85bc8cb7 3730 frame = get_selected_frame (_("no frame selected"));
c906108c 3731
66a17cb6 3732 b = get_frame_block (frame, NULL);
c906108c 3733
66a17cb6 3734 sym = lookup_language_this (lang, b);
c906108c 3735 if (sym == NULL)
85bc8cb7
JK
3736 error (_("current stack frame does not contain a variable named `%s'"),
3737 lang->la_name_of_this);
3738
3739 return read_var_value (sym, frame);
3740}
3741
3742/* Return the value of the local variable, if one exists. Return NULL
3743 otherwise. Never throw error. */
3744
3745struct value *
3746value_of_this_silent (const struct language_defn *lang)
3747{
3748 struct value *ret = NULL;
3749 volatile struct gdb_exception except;
3750
3751 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3752 {
85bc8cb7 3753 ret = value_of_this (lang);
c906108c
SS
3754 }
3755
d069f99d
AF
3756 return ret;
3757}
3758
ac3eeb49
MS
3759/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3760 elements long, starting at LOWBOUND. The result has the same lower
3761 bound as the original ARRAY. */
c906108c 3762
f23631e4
AC
3763struct value *
3764value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3765{
3766 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3767 LONGEST lowerbound, upperbound;
f23631e4 3768 struct value *slice;
c906108c 3769 struct type *array_type;
ac3eeb49 3770
df407dfe 3771 array_type = check_typedef (value_type (array));
c906108c 3772 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3773 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3774 error (_("cannot take slice of non-array"));
ac3eeb49 3775
c906108c
SS
3776 range_type = TYPE_INDEX_TYPE (array_type);
3777 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3778 error (_("slice from bad array or bitstring"));
ac3eeb49 3779
c906108c 3780 if (lowbound < lowerbound || length < 0
db034ac5 3781 || lowbound + length - 1 > upperbound)
8a3fe4f8 3782 error (_("slice out of range"));
ac3eeb49 3783
c906108c
SS
3784 /* FIXME-type-allocation: need a way to free this type when we are
3785 done with it. */
0c9c3474
SA
3786 slice_range_type = create_static_range_type ((struct type *) NULL,
3787 TYPE_TARGET_TYPE (range_type),
3788 lowbound,
3789 lowbound + length - 1);
ac3eeb49 3790
a7c88acd
JB
3791 {
3792 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3793 LONGEST offset
3794 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3795
a7c88acd
JB
3796 slice_type = create_array_type ((struct type *) NULL,
3797 element_type,
3798 slice_range_type);
3799 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3800
a7c88acd
JB
3801 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3802 slice = allocate_value_lazy (slice_type);
3803 else
3804 {
3805 slice = allocate_value (slice_type);
3806 value_contents_copy (slice, 0, array, offset,
3807 TYPE_LENGTH (slice_type));
3808 }
3809
3810 set_value_component_location (slice, array);
3811 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3812 set_value_offset (slice, value_offset (array) + offset);
3813 }
ac3eeb49 3814
c906108c
SS
3815 return slice;
3816}
3817
ac3eeb49
MS
3818/* Create a value for a FORTRAN complex number. Currently most of the
3819 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3820 composed of 2 doubles. This really should be a smarter routine
3821 that figures out precision inteligently as opposed to assuming
ac3eeb49 3822 doubles. FIXME: fmb */
c906108c 3823
f23631e4 3824struct value *
ac3eeb49
MS
3825value_literal_complex (struct value *arg1,
3826 struct value *arg2,
3827 struct type *type)
c906108c 3828{
f23631e4 3829 struct value *val;
c906108c
SS
3830 struct type *real_type = TYPE_TARGET_TYPE (type);
3831
3832 val = allocate_value (type);
3833 arg1 = value_cast (real_type, arg1);
3834 arg2 = value_cast (real_type, arg2);
3835
990a07ab 3836 memcpy (value_contents_raw (val),
0fd88904 3837 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3838 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3839 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3840 return val;
3841}
3842
ac3eeb49 3843/* Cast a value into the appropriate complex data type. */
c906108c 3844
f23631e4
AC
3845static struct value *
3846cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3847{
3848 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3849
df407dfe 3850 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3851 {
df407dfe 3852 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3853 struct value *re_val = allocate_value (val_real_type);
3854 struct value *im_val = allocate_value (val_real_type);
c906108c 3855
990a07ab 3856 memcpy (value_contents_raw (re_val),
0fd88904 3857 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3858 memcpy (value_contents_raw (im_val),
0fd88904 3859 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3860 TYPE_LENGTH (val_real_type));
c906108c
SS
3861
3862 return value_literal_complex (re_val, im_val, type);
3863 }
df407dfe
AC
3864 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3865 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3866 return value_literal_complex (val,
3867 value_zero (real_type, not_lval),
3868 type);
c906108c 3869 else
8a3fe4f8 3870 error (_("cannot cast non-number to complex"));
c906108c
SS
3871}
3872
3873void
fba45db2 3874_initialize_valops (void)
c906108c 3875{
5bf193a2
AC
3876 add_setshow_boolean_cmd ("overload-resolution", class_support,
3877 &overload_resolution, _("\
3878Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3879Show overload resolution in evaluating C++ functions."),
3880 NULL, NULL,
920d2a44 3881 show_overload_resolution,
5bf193a2 3882 &setlist, &showlist);
c906108c 3883 overload_resolution = 1;
c906108c 3884}
This page took 1.975867 seconds and 4 git commands to generate.