]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/ada-lang.c
gas: Generate a new section for SHF_GNU_RETAIN
[thirdparty/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
b811d2c2 3 Copyright (C) 1992-2020 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
d55e5aa6 23#include "gdb_regex.h"
4de283e4
TT
24#include "frame.h"
25#include "symtab.h"
26#include "gdbtypes.h"
14f9c5c9 27#include "gdbcmd.h"
4de283e4
TT
28#include "expression.h"
29#include "parser-defs.h"
30#include "language.h"
31#include "varobj.h"
4de283e4
TT
32#include "inferior.h"
33#include "symfile.h"
34#include "objfiles.h"
35#include "breakpoint.h"
14f9c5c9 36#include "gdbcore.h"
4c4b4cd2 37#include "hashtab.h"
4de283e4
TT
38#include "gdb_obstack.h"
39#include "ada-lang.h"
40#include "completer.h"
4de283e4
TT
41#include "ui-out.h"
42#include "block.h"
04714b91 43#include "infcall.h"
4de283e4
TT
44#include "annotate.h"
45#include "valprint.h"
d55e5aa6 46#include "source.h"
4de283e4 47#include "observable.h"
692465f1 48#include "stack.h"
79d43c61 49#include "typeprint.h"
4de283e4 50#include "namespace.h"
7f6aba03 51#include "cli/cli-style.h"
4de283e4 52
40bc484c 53#include "value.h"
4de283e4
TT
54#include "mi/mi-common.h"
55#include "arch-utils.h"
56#include "cli/cli-utils.h"
268a13a5
TT
57#include "gdbsupport/function-view.h"
58#include "gdbsupport/byte-vector.h"
4de283e4 59#include <algorithm>
ccefe4c4 60
4c4b4cd2 61/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 62 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
63 Copied from valarith.c. */
64
65#ifndef TRUNCATION_TOWARDS_ZERO
66#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
67#endif
68
d2e4a39e 69static struct type *desc_base_type (struct type *);
14f9c5c9 70
d2e4a39e 71static struct type *desc_bounds_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct value *desc_bounds (struct value *);
14f9c5c9 74
d2e4a39e 75static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 78
556bdfd4 79static struct type *desc_data_target_type (struct type *);
14f9c5c9 80
d2e4a39e 81static struct value *desc_data (struct value *);
14f9c5c9 82
d2e4a39e 83static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 86
d2e4a39e 87static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 88
d2e4a39e 89static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static struct type *desc_index_type (struct type *, int);
14f9c5c9 94
d2e4a39e 95static int desc_arity (struct type *);
14f9c5c9 96
d2e4a39e 97static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 98
d2e4a39e 99static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 100
40bc484c 101static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 102
4c4b4cd2 103static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
104 const struct block *,
105 const lookup_name_info &lookup_name,
106 domain_enum, struct objfile *);
14f9c5c9 107
22cee43f 108static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
109 const lookup_name_info &lookup_name,
110 domain_enum, int, int *);
22cee43f 111
d12307c1 112static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 113
76a01679 114static void add_defn_to_vec (struct obstack *, struct symbol *,
dda83cd7 115 const struct block *);
14f9c5c9 116
4c4b4cd2
PH
117static int num_defns_collected (struct obstack *);
118
d12307c1 119static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 120
e9d9f57e 121static struct value *resolve_subexp (expression_up *, int *, int,
dda83cd7 122 struct type *, int,
699bd4cf 123 innermost_block_tracker *);
14f9c5c9 124
e9d9f57e 125static void replace_operator_with_call (expression_up *, int, int, int,
dda83cd7 126 struct symbol *, const struct block *);
14f9c5c9 127
d2e4a39e 128static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 129
4c4b4cd2 130static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 131
d2e4a39e 132static int numeric_type_p (struct type *);
14f9c5c9 133
d2e4a39e 134static int integer_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int scalar_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int discrete_type_p (struct type *);
14f9c5c9 139
a121b7c1 140static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
dda83cd7 141 int, int);
4c4b4cd2 142
d2e4a39e 143static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 144
b4ba55a1 145static struct type *ada_find_parallel_type_with_name (struct type *,
dda83cd7 146 const char *);
b4ba55a1 147
d2e4a39e 148static int is_dynamic_field (struct type *, int);
14f9c5c9 149
10a2c479 150static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 151 const gdb_byte *,
dda83cd7 152 CORE_ADDR, struct value *);
4c4b4cd2
PH
153
154static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 155
28c85d6c 156static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 157
d2e4a39e 158static struct type *to_static_fixed_type (struct type *);
f192137b 159static struct type *static_unwrap_type (struct type *type);
14f9c5c9 160
d2e4a39e 161static struct value *unwrap_value (struct value *);
14f9c5c9 162
ad82864c 163static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 164
ad82864c 165static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 166
ad82864c
JB
167static long decode_packed_array_bitsize (struct type *);
168
169static struct value *decode_constrained_packed_array (struct value *);
170
ad82864c 171static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 172
d2e4a39e 173static struct value *value_subscript_packed (struct value *, int,
dda83cd7 174 struct value **);
14f9c5c9 175
4c4b4cd2 176static struct value *coerce_unspec_val_to_type (struct value *,
dda83cd7 177 struct type *);
14f9c5c9 178
d2e4a39e 179static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 180
d2e4a39e 181static int equiv_types (struct type *, struct type *);
14f9c5c9 182
d2e4a39e 183static int is_name_suffix (const char *);
14f9c5c9 184
59c8a30b 185static int advance_wild_match (const char **, const char *, char);
73589123 186
b5ec771e 187static bool wild_match (const char *name, const char *patn);
14f9c5c9 188
d2e4a39e 189static struct value *ada_coerce_ref (struct value *);
14f9c5c9 190
4c4b4cd2
PH
191static LONGEST pos_atr (struct value *);
192
3cb382c9 193static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 194
53a47a3e
TT
195static struct value *val_atr (struct type *, LONGEST);
196
d2e4a39e 197static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 198
4c4b4cd2 199static struct symbol *standard_lookup (const char *, const struct block *,
dda83cd7 200 domain_enum);
14f9c5c9 201
108d56a4 202static struct value *ada_search_struct_field (const char *, struct value *, int,
dda83cd7 203 struct type *);
4c4b4cd2 204
0d5cff50 205static int find_struct_field (const char *, struct type *, int,
dda83cd7 206 struct type **, int *, int *, int *, int *);
4c4b4cd2 207
d12307c1 208static int ada_resolve_function (struct block_symbol *, int,
dda83cd7
SM
209 struct value **, int, const char *,
210 struct type *, int);
4c4b4cd2 211
4c4b4cd2
PH
212static int ada_is_direct_array_type (struct type *);
213
52ce6436
PH
214static struct value *ada_index_struct_field (int, struct value *, int,
215 struct type *);
216
217static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
218 struct expression *,
219 int *, enum noside);
52ce6436
PH
220
221static void aggregate_assign_from_choices (struct value *, struct value *,
222 struct expression *,
223 int *, LONGEST *, int *,
224 int, LONGEST, LONGEST);
225
226static void aggregate_assign_positional (struct value *, struct value *,
227 struct expression *,
228 int *, LONGEST *, int *, int,
229 LONGEST, LONGEST);
230
231
232static void aggregate_assign_others (struct value *, struct value *,
233 struct expression *,
234 int *, LONGEST *, int, LONGEST, LONGEST);
235
236
237static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
238
239
240static struct value *ada_evaluate_subexp (struct type *, struct expression *,
241 int *, enum noside);
242
243static void ada_forward_operator_length (struct expression *, int, int *,
244 int *);
852dff6c
JB
245
246static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
247
248static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
249 (const lookup_name_info &lookup_name);
250
4c4b4cd2
PH
251\f
252
ee01b665
JB
253/* The result of a symbol lookup to be stored in our symbol cache. */
254
255struct cache_entry
256{
257 /* The name used to perform the lookup. */
258 const char *name;
259 /* The namespace used during the lookup. */
fe978cb0 260 domain_enum domain;
ee01b665
JB
261 /* The symbol returned by the lookup, or NULL if no matching symbol
262 was found. */
263 struct symbol *sym;
264 /* The block where the symbol was found, or NULL if no matching
265 symbol was found. */
266 const struct block *block;
267 /* A pointer to the next entry with the same hash. */
268 struct cache_entry *next;
269};
270
271/* The Ada symbol cache, used to store the result of Ada-mode symbol
272 lookups in the course of executing the user's commands.
273
274 The cache is implemented using a simple, fixed-sized hash.
275 The size is fixed on the grounds that there are not likely to be
276 all that many symbols looked up during any given session, regardless
277 of the size of the symbol table. If we decide to go to a resizable
278 table, let's just use the stuff from libiberty instead. */
279
280#define HASH_SIZE 1009
281
282struct ada_symbol_cache
283{
284 /* An obstack used to store the entries in our cache. */
285 struct obstack cache_space;
286
287 /* The root of the hash table used to implement our symbol cache. */
288 struct cache_entry *root[HASH_SIZE];
289};
290
291static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 292
4c4b4cd2 293/* Maximum-sized dynamic type. */
14f9c5c9
AS
294static unsigned int varsize_limit;
295
67cb5b2d 296static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
297#ifdef VMS
298 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
299#else
14f9c5c9 300 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 301#endif
14f9c5c9 302
4c4b4cd2 303/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 304static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 305 = "__gnat_ada_main_program_name";
14f9c5c9 306
4c4b4cd2
PH
307/* Limit on the number of warnings to raise per expression evaluation. */
308static int warning_limit = 2;
309
310/* Number of warning messages issued; reset to 0 by cleanups after
311 expression evaluation. */
312static int warnings_issued = 0;
313
27087b7f 314static const char * const known_runtime_file_name_patterns[] = {
4c4b4cd2
PH
315 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
316};
317
27087b7f 318static const char * const known_auxiliary_function_name_patterns[] = {
4c4b4cd2
PH
319 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
320};
321
c6044dd1
JB
322/* Maintenance-related settings for this module. */
323
324static struct cmd_list_element *maint_set_ada_cmdlist;
325static struct cmd_list_element *maint_show_ada_cmdlist;
326
c6044dd1
JB
327/* The "maintenance ada set/show ignore-descriptive-type" value. */
328
491144b5 329static bool ada_ignore_descriptive_types_p = false;
c6044dd1 330
e802dbe0
JB
331 /* Inferior-specific data. */
332
333/* Per-inferior data for this module. */
334
335struct ada_inferior_data
336{
337 /* The ada__tags__type_specific_data type, which is used when decoding
338 tagged types. With older versions of GNAT, this type was directly
339 accessible through a component ("tsd") in the object tag. But this
340 is no longer the case, so we cache it for each inferior. */
f37b313d 341 struct type *tsd_type = nullptr;
3eecfa55
JB
342
343 /* The exception_support_info data. This data is used to determine
344 how to implement support for Ada exception catchpoints in a given
345 inferior. */
f37b313d 346 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
347};
348
349/* Our key to this module's inferior data. */
f37b313d 350static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
351
352/* Return our inferior data for the given inferior (INF).
353
354 This function always returns a valid pointer to an allocated
355 ada_inferior_data structure. If INF's inferior data has not
356 been previously set, this functions creates a new one with all
357 fields set to zero, sets INF's inferior to it, and then returns
358 a pointer to that newly allocated ada_inferior_data. */
359
360static struct ada_inferior_data *
361get_ada_inferior_data (struct inferior *inf)
362{
363 struct ada_inferior_data *data;
364
f37b313d 365 data = ada_inferior_data.get (inf);
e802dbe0 366 if (data == NULL)
f37b313d 367 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
368
369 return data;
370}
371
372/* Perform all necessary cleanups regarding our module's inferior data
373 that is required after the inferior INF just exited. */
374
375static void
376ada_inferior_exit (struct inferior *inf)
377{
f37b313d 378 ada_inferior_data.clear (inf);
e802dbe0
JB
379}
380
ee01b665
JB
381
382 /* program-space-specific data. */
383
384/* This module's per-program-space data. */
385struct ada_pspace_data
386{
f37b313d
TT
387 ~ada_pspace_data ()
388 {
389 if (sym_cache != NULL)
390 ada_free_symbol_cache (sym_cache);
391 }
392
ee01b665 393 /* The Ada symbol cache. */
f37b313d 394 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
395};
396
397/* Key to our per-program-space data. */
f37b313d 398static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
399
400/* Return this module's data for the given program space (PSPACE).
401 If not is found, add a zero'ed one now.
402
403 This function always returns a valid object. */
404
405static struct ada_pspace_data *
406get_ada_pspace_data (struct program_space *pspace)
407{
408 struct ada_pspace_data *data;
409
f37b313d 410 data = ada_pspace_data_handle.get (pspace);
ee01b665 411 if (data == NULL)
f37b313d 412 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
413
414 return data;
415}
416
dda83cd7 417 /* Utilities */
4c4b4cd2 418
720d1a40 419/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 420 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
421
422 Normally, we really expect a typedef type to only have 1 typedef layer.
423 In other words, we really expect the target type of a typedef type to be
424 a non-typedef type. This is particularly true for Ada units, because
425 the language does not have a typedef vs not-typedef distinction.
426 In that respect, the Ada compiler has been trying to eliminate as many
427 typedef definitions in the debugging information, since they generally
428 do not bring any extra information (we still use typedef under certain
429 circumstances related mostly to the GNAT encoding).
430
431 Unfortunately, we have seen situations where the debugging information
432 generated by the compiler leads to such multiple typedef layers. For
433 instance, consider the following example with stabs:
434
435 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
436 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
437
438 This is an error in the debugging information which causes type
439 pck__float_array___XUP to be defined twice, and the second time,
440 it is defined as a typedef of a typedef.
441
442 This is on the fringe of legality as far as debugging information is
443 concerned, and certainly unexpected. But it is easy to handle these
444 situations correctly, so we can afford to be lenient in this case. */
445
446static struct type *
447ada_typedef_target_type (struct type *type)
448{
78134374 449 while (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
450 type = TYPE_TARGET_TYPE (type);
451 return type;
452}
453
41d27058
JB
454/* Given DECODED_NAME a string holding a symbol name in its
455 decoded form (ie using the Ada dotted notation), returns
456 its unqualified name. */
457
458static const char *
459ada_unqualified_name (const char *decoded_name)
460{
2b0f535a
JB
461 const char *result;
462
463 /* If the decoded name starts with '<', it means that the encoded
464 name does not follow standard naming conventions, and thus that
465 it is not your typical Ada symbol name. Trying to unqualify it
466 is therefore pointless and possibly erroneous. */
467 if (decoded_name[0] == '<')
468 return decoded_name;
469
470 result = strrchr (decoded_name, '.');
41d27058
JB
471 if (result != NULL)
472 result++; /* Skip the dot... */
473 else
474 result = decoded_name;
475
476 return result;
477}
478
39e7af3e 479/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 480
39e7af3e 481static std::string
41d27058
JB
482add_angle_brackets (const char *str)
483{
39e7af3e 484 return string_printf ("<%s>", str);
41d27058 485}
96d887e8 486
de93309a
SM
487/* Assuming V points to an array of S objects, make sure that it contains at
488 least M objects, updating V and S as necessary. */
489
490#define GROW_VECT(v, s, m) \
491 if ((s) < (m)) (v) = (char *) grow_vect (v, &(s), m, sizeof *(v));
492
f27cf670 493/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 494 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 495 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 496
de93309a 497static void *
f27cf670 498grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 499{
d2e4a39e
AS
500 if (*size < min_size)
501 {
502 *size *= 2;
503 if (*size < min_size)
dda83cd7 504 *size = min_size;
f27cf670 505 vect = xrealloc (vect, *size * element_size);
d2e4a39e 506 }
f27cf670 507 return vect;
14f9c5c9
AS
508}
509
510/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 511 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
512
513static int
ebf56fd3 514field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
515{
516 int len = strlen (target);
5b4ee69b 517
d2e4a39e 518 return
4c4b4cd2
PH
519 (strncmp (field_name, target, len) == 0
520 && (field_name[len] == '\0'
dda83cd7
SM
521 || (startswith (field_name + len, "___")
522 && strcmp (field_name + strlen (field_name) - 6,
523 "___XVN") != 0)));
14f9c5c9
AS
524}
525
526
872c8b51
JB
527/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
528 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
529 and return its index. This function also handles fields whose name
530 have ___ suffixes because the compiler sometimes alters their name
531 by adding such a suffix to represent fields with certain constraints.
532 If the field could not be found, return a negative number if
533 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
534
535int
536ada_get_field_index (const struct type *type, const char *field_name,
dda83cd7 537 int maybe_missing)
4c4b4cd2
PH
538{
539 int fieldno;
872c8b51
JB
540 struct type *struct_type = check_typedef ((struct type *) type);
541
1f704f76 542 for (fieldno = 0; fieldno < struct_type->num_fields (); fieldno++)
872c8b51 543 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
544 return fieldno;
545
546 if (!maybe_missing)
323e0a4a 547 error (_("Unable to find field %s in struct %s. Aborting"),
dda83cd7 548 field_name, struct_type->name ());
4c4b4cd2
PH
549
550 return -1;
551}
552
553/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
554
555int
d2e4a39e 556ada_name_prefix_len (const char *name)
14f9c5c9
AS
557{
558 if (name == NULL)
559 return 0;
d2e4a39e 560 else
14f9c5c9 561 {
d2e4a39e 562 const char *p = strstr (name, "___");
5b4ee69b 563
14f9c5c9 564 if (p == NULL)
dda83cd7 565 return strlen (name);
14f9c5c9 566 else
dda83cd7 567 return p - name;
14f9c5c9
AS
568 }
569}
570
4c4b4cd2
PH
571/* Return non-zero if SUFFIX is a suffix of STR.
572 Return zero if STR is null. */
573
14f9c5c9 574static int
d2e4a39e 575is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
576{
577 int len1, len2;
5b4ee69b 578
14f9c5c9
AS
579 if (str == NULL)
580 return 0;
581 len1 = strlen (str);
582 len2 = strlen (suffix);
4c4b4cd2 583 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
584}
585
4c4b4cd2
PH
586/* The contents of value VAL, treated as a value of type TYPE. The
587 result is an lval in memory if VAL is. */
14f9c5c9 588
d2e4a39e 589static struct value *
4c4b4cd2 590coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 591{
61ee279c 592 type = ada_check_typedef (type);
df407dfe 593 if (value_type (val) == type)
4c4b4cd2 594 return val;
d2e4a39e 595 else
14f9c5c9 596 {
4c4b4cd2
PH
597 struct value *result;
598
599 /* Make sure that the object size is not unreasonable before
dda83cd7 600 trying to allocate some memory for it. */
c1b5a1a6 601 ada_ensure_varsize_limit (type);
4c4b4cd2 602
41e8491f 603 if (value_lazy (val)
dda83cd7 604 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
41e8491f
JK
605 result = allocate_value_lazy (type);
606 else
607 {
608 result = allocate_value (type);
9a0dc9e3 609 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 610 }
74bcbdf3 611 set_value_component_location (result, val);
9bbda503
AC
612 set_value_bitsize (result, value_bitsize (val));
613 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
614 if (VALUE_LVAL (result) == lval_memory)
615 set_value_address (result, value_address (val));
14f9c5c9
AS
616 return result;
617 }
618}
619
fc1a4b47
AC
620static const gdb_byte *
621cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
622{
623 if (valaddr == NULL)
624 return NULL;
625 else
626 return valaddr + offset;
627}
628
629static CORE_ADDR
ebf56fd3 630cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
631{
632 if (address == 0)
633 return 0;
d2e4a39e 634 else
14f9c5c9
AS
635 return address + offset;
636}
637
4c4b4cd2
PH
638/* Issue a warning (as for the definition of warning in utils.c, but
639 with exactly one argument rather than ...), unless the limit on the
640 number of warnings has passed during the evaluation of the current
641 expression. */
a2249542 642
77109804
AC
643/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
644 provided by "complaint". */
a0b31db1 645static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 646
14f9c5c9 647static void
a2249542 648lim_warning (const char *format, ...)
14f9c5c9 649{
a2249542 650 va_list args;
a2249542 651
5b4ee69b 652 va_start (args, format);
4c4b4cd2
PH
653 warnings_issued += 1;
654 if (warnings_issued <= warning_limit)
a2249542
MK
655 vwarning (format, args);
656
657 va_end (args);
4c4b4cd2
PH
658}
659
714e53ab
PH
660/* Issue an error if the size of an object of type T is unreasonable,
661 i.e. if it would be a bad idea to allocate a value of this type in
662 GDB. */
663
c1b5a1a6
JB
664void
665ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
666{
667 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 668 error (_("object size is larger than varsize-limit"));
714e53ab
PH
669}
670
0963b4bd 671/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 672static LONGEST
c3e5cd34 673max_of_size (int size)
4c4b4cd2 674{
76a01679 675 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 676
76a01679 677 return top_bit | (top_bit - 1);
4c4b4cd2
PH
678}
679
0963b4bd 680/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 681static LONGEST
c3e5cd34 682min_of_size (int size)
4c4b4cd2 683{
c3e5cd34 684 return -max_of_size (size) - 1;
4c4b4cd2
PH
685}
686
0963b4bd 687/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 688static ULONGEST
c3e5cd34 689umax_of_size (int size)
4c4b4cd2 690{
76a01679 691 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 692
76a01679 693 return top_bit | (top_bit - 1);
4c4b4cd2
PH
694}
695
0963b4bd 696/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
697static LONGEST
698max_of_type (struct type *t)
4c4b4cd2 699{
c6d940a9 700 if (t->is_unsigned ())
c3e5cd34
PH
701 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
702 else
703 return max_of_size (TYPE_LENGTH (t));
704}
705
0963b4bd 706/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
707static LONGEST
708min_of_type (struct type *t)
709{
c6d940a9 710 if (t->is_unsigned ())
c3e5cd34
PH
711 return 0;
712 else
713 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
714}
715
716/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
717LONGEST
718ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 719{
b249d2c2 720 type = resolve_dynamic_type (type, {}, 0);
78134374 721 switch (type->code ())
4c4b4cd2
PH
722 {
723 case TYPE_CODE_RANGE:
d1fd641e
SM
724 {
725 const dynamic_prop &high = type->bounds ()->high;
726
727 if (high.kind () == PROP_CONST)
728 return high.const_val ();
729 else
730 {
731 gdb_assert (high.kind () == PROP_UNDEFINED);
732
733 /* This happens when trying to evaluate a type's dynamic bound
734 without a live target. There is nothing relevant for us to
735 return here, so return 0. */
736 return 0;
737 }
738 }
4c4b4cd2 739 case TYPE_CODE_ENUM:
1f704f76 740 return TYPE_FIELD_ENUMVAL (type, type->num_fields () - 1);
690cc4eb
PH
741 case TYPE_CODE_BOOL:
742 return 1;
743 case TYPE_CODE_CHAR:
76a01679 744 case TYPE_CODE_INT:
690cc4eb 745 return max_of_type (type);
4c4b4cd2 746 default:
43bbcdc2 747 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
748 }
749}
750
14e75d8e 751/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
752LONGEST
753ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 754{
b249d2c2 755 type = resolve_dynamic_type (type, {}, 0);
78134374 756 switch (type->code ())
4c4b4cd2
PH
757 {
758 case TYPE_CODE_RANGE:
d1fd641e
SM
759 {
760 const dynamic_prop &low = type->bounds ()->low;
761
762 if (low.kind () == PROP_CONST)
763 return low.const_val ();
764 else
765 {
766 gdb_assert (low.kind () == PROP_UNDEFINED);
767
768 /* This happens when trying to evaluate a type's dynamic bound
769 without a live target. There is nothing relevant for us to
770 return here, so return 0. */
771 return 0;
772 }
773 }
4c4b4cd2 774 case TYPE_CODE_ENUM:
14e75d8e 775 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
776 case TYPE_CODE_BOOL:
777 return 0;
778 case TYPE_CODE_CHAR:
76a01679 779 case TYPE_CODE_INT:
690cc4eb 780 return min_of_type (type);
4c4b4cd2 781 default:
43bbcdc2 782 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
783 }
784}
785
786/* The identity on non-range types. For range types, the underlying
76a01679 787 non-range scalar type. */
4c4b4cd2
PH
788
789static struct type *
18af8284 790get_base_type (struct type *type)
4c4b4cd2 791{
78134374 792 while (type != NULL && type->code () == TYPE_CODE_RANGE)
4c4b4cd2 793 {
76a01679 794 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
dda83cd7 795 return type;
4c4b4cd2
PH
796 type = TYPE_TARGET_TYPE (type);
797 }
798 return type;
14f9c5c9 799}
41246937
JB
800
801/* Return a decoded version of the given VALUE. This means returning
802 a value whose type is obtained by applying all the GNAT-specific
85102364 803 encodings, making the resulting type a static but standard description
41246937
JB
804 of the initial type. */
805
806struct value *
807ada_get_decoded_value (struct value *value)
808{
809 struct type *type = ada_check_typedef (value_type (value));
810
811 if (ada_is_array_descriptor_type (type)
812 || (ada_is_constrained_packed_array_type (type)
dda83cd7 813 && type->code () != TYPE_CODE_PTR))
41246937 814 {
78134374 815 if (type->code () == TYPE_CODE_TYPEDEF) /* array access type. */
dda83cd7 816 value = ada_coerce_to_simple_array_ptr (value);
41246937 817 else
dda83cd7 818 value = ada_coerce_to_simple_array (value);
41246937
JB
819 }
820 else
821 value = ada_to_fixed_value (value);
822
823 return value;
824}
825
826/* Same as ada_get_decoded_value, but with the given TYPE.
827 Because there is no associated actual value for this type,
828 the resulting type might be a best-effort approximation in
829 the case of dynamic types. */
830
831struct type *
832ada_get_decoded_type (struct type *type)
833{
834 type = to_static_fixed_type (type);
835 if (ada_is_constrained_packed_array_type (type))
836 type = ada_coerce_to_simple_array_type (type);
837 return type;
838}
839
4c4b4cd2 840\f
76a01679 841
dda83cd7 842 /* Language Selection */
14f9c5c9
AS
843
844/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 845 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 846
de93309a 847static enum language
ccefe4c4 848ada_update_initial_language (enum language lang)
14f9c5c9 849{
cafb3438 850 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 851 return language_ada;
14f9c5c9
AS
852
853 return lang;
854}
96d887e8
PH
855
856/* If the main procedure is written in Ada, then return its name.
857 The result is good until the next call. Return NULL if the main
858 procedure doesn't appear to be in Ada. */
859
860char *
861ada_main_name (void)
862{
3b7344d5 863 struct bound_minimal_symbol msym;
e83e4e24 864 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 865
96d887e8
PH
866 /* For Ada, the name of the main procedure is stored in a specific
867 string constant, generated by the binder. Look for that symbol,
868 extract its address, and then read that string. If we didn't find
869 that string, then most probably the main procedure is not written
870 in Ada. */
871 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
872
3b7344d5 873 if (msym.minsym != NULL)
96d887e8 874 {
66920317 875 CORE_ADDR main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 876 if (main_program_name_addr == 0)
dda83cd7 877 error (_("Invalid address for Ada main program name."));
96d887e8 878
66920317 879 main_program_name = target_read_string (main_program_name_addr, 1024);
e83e4e24 880 return main_program_name.get ();
96d887e8
PH
881 }
882
883 /* The main procedure doesn't seem to be in Ada. */
884 return NULL;
885}
14f9c5c9 886\f
dda83cd7 887 /* Symbols */
d2e4a39e 888
4c4b4cd2
PH
889/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
890 of NULLs. */
14f9c5c9 891
d2e4a39e
AS
892const struct ada_opname_map ada_opname_table[] = {
893 {"Oadd", "\"+\"", BINOP_ADD},
894 {"Osubtract", "\"-\"", BINOP_SUB},
895 {"Omultiply", "\"*\"", BINOP_MUL},
896 {"Odivide", "\"/\"", BINOP_DIV},
897 {"Omod", "\"mod\"", BINOP_MOD},
898 {"Orem", "\"rem\"", BINOP_REM},
899 {"Oexpon", "\"**\"", BINOP_EXP},
900 {"Olt", "\"<\"", BINOP_LESS},
901 {"Ole", "\"<=\"", BINOP_LEQ},
902 {"Ogt", "\">\"", BINOP_GTR},
903 {"Oge", "\">=\"", BINOP_GEQ},
904 {"Oeq", "\"=\"", BINOP_EQUAL},
905 {"One", "\"/=\"", BINOP_NOTEQUAL},
906 {"Oand", "\"and\"", BINOP_BITWISE_AND},
907 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
908 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
909 {"Oconcat", "\"&\"", BINOP_CONCAT},
910 {"Oabs", "\"abs\"", UNOP_ABS},
911 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
912 {"Oadd", "\"+\"", UNOP_PLUS},
913 {"Osubtract", "\"-\"", UNOP_NEG},
914 {NULL, NULL}
14f9c5c9
AS
915};
916
5c4258f4 917/* The "encoded" form of DECODED, according to GNAT conventions. If
b5ec771e 918 THROW_ERRORS, throw an error if invalid operator name is found.
5c4258f4 919 Otherwise, return the empty string in that case. */
4c4b4cd2 920
5c4258f4 921static std::string
b5ec771e 922ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 923{
4c4b4cd2 924 if (decoded == NULL)
5c4258f4 925 return {};
14f9c5c9 926
5c4258f4
TT
927 std::string encoding_buffer;
928 for (const char *p = decoded; *p != '\0'; p += 1)
14f9c5c9 929 {
cdc7bb92 930 if (*p == '.')
5c4258f4 931 encoding_buffer.append ("__");
14f9c5c9 932 else if (*p == '"')
dda83cd7
SM
933 {
934 const struct ada_opname_map *mapping;
935
936 for (mapping = ada_opname_table;
937 mapping->encoded != NULL
938 && !startswith (p, mapping->decoded); mapping += 1)
939 ;
940 if (mapping->encoded == NULL)
b5ec771e
PA
941 {
942 if (throw_errors)
943 error (_("invalid Ada operator name: %s"), p);
944 else
5c4258f4 945 return {};
b5ec771e 946 }
5c4258f4 947 encoding_buffer.append (mapping->encoded);
dda83cd7
SM
948 break;
949 }
d2e4a39e 950 else
5c4258f4 951 encoding_buffer.push_back (*p);
14f9c5c9
AS
952 }
953
4c4b4cd2 954 return encoding_buffer;
14f9c5c9
AS
955}
956
5c4258f4 957/* The "encoded" form of DECODED, according to GNAT conventions. */
b5ec771e 958
5c4258f4 959std::string
b5ec771e
PA
960ada_encode (const char *decoded)
961{
962 return ada_encode_1 (decoded, true);
963}
964
14f9c5c9 965/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
966 quotes, unfolded, but with the quotes stripped away. Result good
967 to next call. */
968
de93309a 969static char *
e0802d59 970ada_fold_name (gdb::string_view name)
14f9c5c9 971{
d2e4a39e 972 static char *fold_buffer = NULL;
14f9c5c9
AS
973 static size_t fold_buffer_size = 0;
974
e0802d59 975 int len = name.size ();
d2e4a39e 976 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
977
978 if (name[0] == '\'')
979 {
e0802d59 980 strncpy (fold_buffer, name.data () + 1, len - 2);
d2e4a39e 981 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
982 }
983 else
984 {
985 int i;
5b4ee69b 986
14f9c5c9 987 for (i = 0; i <= len; i += 1)
dda83cd7 988 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
989 }
990
991 return fold_buffer;
992}
993
529cad9c
PH
994/* Return nonzero if C is either a digit or a lowercase alphabet character. */
995
996static int
997is_lower_alphanum (const char c)
998{
999 return (isdigit (c) || (isalpha (c) && islower (c)));
1000}
1001
c90092fe
JB
1002/* ENCODED is the linkage name of a symbol and LEN contains its length.
1003 This function saves in LEN the length of that same symbol name but
1004 without either of these suffixes:
29480c32
JB
1005 . .{DIGIT}+
1006 . ${DIGIT}+
1007 . ___{DIGIT}+
1008 . __{DIGIT}+.
c90092fe 1009
29480c32
JB
1010 These are suffixes introduced by the compiler for entities such as
1011 nested subprogram for instance, in order to avoid name clashes.
1012 They do not serve any purpose for the debugger. */
1013
1014static void
1015ada_remove_trailing_digits (const char *encoded, int *len)
1016{
1017 if (*len > 1 && isdigit (encoded[*len - 1]))
1018 {
1019 int i = *len - 2;
5b4ee69b 1020
29480c32 1021 while (i > 0 && isdigit (encoded[i]))
dda83cd7 1022 i--;
29480c32 1023 if (i >= 0 && encoded[i] == '.')
dda83cd7 1024 *len = i;
29480c32 1025 else if (i >= 0 && encoded[i] == '$')
dda83cd7 1026 *len = i;
61012eef 1027 else if (i >= 2 && startswith (encoded + i - 2, "___"))
dda83cd7 1028 *len = i - 2;
61012eef 1029 else if (i >= 1 && startswith (encoded + i - 1, "__"))
dda83cd7 1030 *len = i - 1;
29480c32
JB
1031 }
1032}
1033
1034/* Remove the suffix introduced by the compiler for protected object
1035 subprograms. */
1036
1037static void
1038ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1039{
1040 /* Remove trailing N. */
1041
1042 /* Protected entry subprograms are broken into two
1043 separate subprograms: The first one is unprotected, and has
1044 a 'N' suffix; the second is the protected version, and has
0963b4bd 1045 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1046 the protection. Since the P subprograms are internally generated,
1047 we leave these names undecoded, giving the user a clue that this
1048 entity is internal. */
1049
1050 if (*len > 1
1051 && encoded[*len - 1] == 'N'
1052 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1053 *len = *len - 1;
1054}
1055
1056/* If ENCODED follows the GNAT entity encoding conventions, then return
1057 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
f945dedf 1058 replaced by ENCODED. */
14f9c5c9 1059
f945dedf 1060std::string
4c4b4cd2 1061ada_decode (const char *encoded)
14f9c5c9
AS
1062{
1063 int i, j;
1064 int len0;
d2e4a39e 1065 const char *p;
14f9c5c9 1066 int at_start_name;
f945dedf 1067 std::string decoded;
d2e4a39e 1068
0d81f350
JG
1069 /* With function descriptors on PPC64, the value of a symbol named
1070 ".FN", if it exists, is the entry point of the function "FN". */
1071 if (encoded[0] == '.')
1072 encoded += 1;
1073
29480c32
JB
1074 /* The name of the Ada main procedure starts with "_ada_".
1075 This prefix is not part of the decoded name, so skip this part
1076 if we see this prefix. */
61012eef 1077 if (startswith (encoded, "_ada_"))
4c4b4cd2 1078 encoded += 5;
14f9c5c9 1079
29480c32
JB
1080 /* If the name starts with '_', then it is not a properly encoded
1081 name, so do not attempt to decode it. Similarly, if the name
1082 starts with '<', the name should not be decoded. */
4c4b4cd2 1083 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1084 goto Suppress;
1085
4c4b4cd2 1086 len0 = strlen (encoded);
4c4b4cd2 1087
29480c32
JB
1088 ada_remove_trailing_digits (encoded, &len0);
1089 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1090
4c4b4cd2
PH
1091 /* Remove the ___X.* suffix if present. Do not forget to verify that
1092 the suffix is located before the current "end" of ENCODED. We want
1093 to avoid re-matching parts of ENCODED that have previously been
1094 marked as discarded (by decrementing LEN0). */
1095 p = strstr (encoded, "___");
1096 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1097 {
1098 if (p[3] == 'X')
dda83cd7 1099 len0 = p - encoded;
14f9c5c9 1100 else
dda83cd7 1101 goto Suppress;
14f9c5c9 1102 }
4c4b4cd2 1103
29480c32
JB
1104 /* Remove any trailing TKB suffix. It tells us that this symbol
1105 is for the body of a task, but that information does not actually
1106 appear in the decoded name. */
1107
61012eef 1108 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1109 len0 -= 3;
76a01679 1110
a10967fa
JB
1111 /* Remove any trailing TB suffix. The TB suffix is slightly different
1112 from the TKB suffix because it is used for non-anonymous task
1113 bodies. */
1114
61012eef 1115 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1116 len0 -= 2;
1117
29480c32
JB
1118 /* Remove trailing "B" suffixes. */
1119 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1120
61012eef 1121 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1122 len0 -= 1;
1123
4c4b4cd2 1124 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1125
f945dedf 1126 decoded.resize (2 * len0 + 1, 'X');
14f9c5c9 1127
29480c32
JB
1128 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1129
4c4b4cd2 1130 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1131 {
4c4b4cd2
PH
1132 i = len0 - 2;
1133 while ((i >= 0 && isdigit (encoded[i]))
dda83cd7
SM
1134 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1135 i -= 1;
4c4b4cd2 1136 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
dda83cd7 1137 len0 = i - 1;
4c4b4cd2 1138 else if (encoded[i] == '$')
dda83cd7 1139 len0 = i;
d2e4a39e 1140 }
14f9c5c9 1141
29480c32
JB
1142 /* The first few characters that are not alphabetic are not part
1143 of any encoding we use, so we can copy them over verbatim. */
1144
4c4b4cd2
PH
1145 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1146 decoded[j] = encoded[i];
14f9c5c9
AS
1147
1148 at_start_name = 1;
1149 while (i < len0)
1150 {
29480c32 1151 /* Is this a symbol function? */
4c4b4cd2 1152 if (at_start_name && encoded[i] == 'O')
dda83cd7
SM
1153 {
1154 int k;
1155
1156 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1157 {
1158 int op_len = strlen (ada_opname_table[k].encoded);
1159 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1160 op_len - 1) == 0)
1161 && !isalnum (encoded[i + op_len]))
1162 {
1163 strcpy (&decoded.front() + j, ada_opname_table[k].decoded);
1164 at_start_name = 0;
1165 i += op_len;
1166 j += strlen (ada_opname_table[k].decoded);
1167 break;
1168 }
1169 }
1170 if (ada_opname_table[k].encoded != NULL)
1171 continue;
1172 }
14f9c5c9
AS
1173 at_start_name = 0;
1174
529cad9c 1175 /* Replace "TK__" with "__", which will eventually be translated
dda83cd7 1176 into "." (just below). */
529cad9c 1177
61012eef 1178 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
dda83cd7 1179 i += 2;
529cad9c 1180
29480c32 1181 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
dda83cd7
SM
1182 be translated into "." (just below). These are internal names
1183 generated for anonymous blocks inside which our symbol is nested. */
29480c32
JB
1184
1185 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
dda83cd7
SM
1186 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1187 && isdigit (encoded [i+4]))
1188 {
1189 int k = i + 5;
1190
1191 while (k < len0 && isdigit (encoded[k]))
1192 k++; /* Skip any extra digit. */
1193
1194 /* Double-check that the "__B_{DIGITS}+" sequence we found
1195 is indeed followed by "__". */
1196 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1197 i = k;
1198 }
29480c32 1199
529cad9c
PH
1200 /* Remove _E{DIGITS}+[sb] */
1201
1202 /* Just as for protected object subprograms, there are 2 categories
dda83cd7
SM
1203 of subprograms created by the compiler for each entry. The first
1204 one implements the actual entry code, and has a suffix following
1205 the convention above; the second one implements the barrier and
1206 uses the same convention as above, except that the 'E' is replaced
1207 by a 'B'.
529cad9c 1208
dda83cd7
SM
1209 Just as above, we do not decode the name of barrier functions
1210 to give the user a clue that the code he is debugging has been
1211 internally generated. */
529cad9c
PH
1212
1213 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
dda83cd7
SM
1214 && isdigit (encoded[i+2]))
1215 {
1216 int k = i + 3;
1217
1218 while (k < len0 && isdigit (encoded[k]))
1219 k++;
1220
1221 if (k < len0
1222 && (encoded[k] == 'b' || encoded[k] == 's'))
1223 {
1224 k++;
1225 /* Just as an extra precaution, make sure that if this
1226 suffix is followed by anything else, it is a '_'.
1227 Otherwise, we matched this sequence by accident. */
1228 if (k == len0
1229 || (k < len0 && encoded[k] == '_'))
1230 i = k;
1231 }
1232 }
529cad9c
PH
1233
1234 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
dda83cd7 1235 the GNAT front-end in protected object subprograms. */
529cad9c
PH
1236
1237 if (i < len0 + 3
dda83cd7
SM
1238 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1239 {
1240 /* Backtrack a bit up until we reach either the begining of
1241 the encoded name, or "__". Make sure that we only find
1242 digits or lowercase characters. */
1243 const char *ptr = encoded + i - 1;
1244
1245 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1246 ptr--;
1247 if (ptr < encoded
1248 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1249 i++;
1250 }
529cad9c 1251
4c4b4cd2 1252 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
dda83cd7
SM
1253 {
1254 /* This is a X[bn]* sequence not separated from the previous
1255 part of the name with a non-alpha-numeric character (in other
1256 words, immediately following an alpha-numeric character), then
1257 verify that it is placed at the end of the encoded name. If
1258 not, then the encoding is not valid and we should abort the
1259 decoding. Otherwise, just skip it, it is used in body-nested
1260 package names. */
1261 do
1262 i += 1;
1263 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1264 if (i < len0)
1265 goto Suppress;
1266 }
cdc7bb92 1267 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
dda83cd7
SM
1268 {
1269 /* Replace '__' by '.'. */
1270 decoded[j] = '.';
1271 at_start_name = 1;
1272 i += 2;
1273 j += 1;
1274 }
14f9c5c9 1275 else
dda83cd7
SM
1276 {
1277 /* It's a character part of the decoded name, so just copy it
1278 over. */
1279 decoded[j] = encoded[i];
1280 i += 1;
1281 j += 1;
1282 }
14f9c5c9 1283 }
f945dedf 1284 decoded.resize (j);
14f9c5c9 1285
29480c32
JB
1286 /* Decoded names should never contain any uppercase character.
1287 Double-check this, and abort the decoding if we find one. */
1288
f945dedf 1289 for (i = 0; i < decoded.length(); ++i)
4c4b4cd2 1290 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1291 goto Suppress;
1292
f945dedf 1293 return decoded;
14f9c5c9
AS
1294
1295Suppress:
4c4b4cd2 1296 if (encoded[0] == '<')
f945dedf 1297 decoded = encoded;
14f9c5c9 1298 else
f945dedf 1299 decoded = '<' + std::string(encoded) + '>';
4c4b4cd2
PH
1300 return decoded;
1301
1302}
1303
1304/* Table for keeping permanent unique copies of decoded names. Once
1305 allocated, names in this table are never released. While this is a
1306 storage leak, it should not be significant unless there are massive
1307 changes in the set of decoded names in successive versions of a
1308 symbol table loaded during a single session. */
1309static struct htab *decoded_names_store;
1310
1311/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1312 in the language-specific part of GSYMBOL, if it has not been
1313 previously computed. Tries to save the decoded name in the same
1314 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1315 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1316 GSYMBOL).
4c4b4cd2
PH
1317 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1318 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1319 when a decoded name is cached in it. */
4c4b4cd2 1320
45e6c716 1321const char *
f85f34ed 1322ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1323{
f85f34ed
TT
1324 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1325 const char **resultp =
615b3f62 1326 &gsymbol->language_specific.demangled_name;
5b4ee69b 1327
f85f34ed 1328 if (!gsymbol->ada_mangled)
4c4b4cd2 1329 {
4d4eaa30 1330 std::string decoded = ada_decode (gsymbol->linkage_name ());
f85f34ed 1331 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1332
f85f34ed 1333 gsymbol->ada_mangled = 1;
5b4ee69b 1334
f85f34ed 1335 if (obstack != NULL)
f945dedf 1336 *resultp = obstack_strdup (obstack, decoded.c_str ());
f85f34ed 1337 else
dda83cd7 1338 {
f85f34ed
TT
1339 /* Sometimes, we can't find a corresponding objfile, in
1340 which case, we put the result on the heap. Since we only
1341 decode when needed, we hope this usually does not cause a
1342 significant memory leak (FIXME). */
1343
dda83cd7
SM
1344 char **slot = (char **) htab_find_slot (decoded_names_store,
1345 decoded.c_str (), INSERT);
5b4ee69b 1346
dda83cd7
SM
1347 if (*slot == NULL)
1348 *slot = xstrdup (decoded.c_str ());
1349 *resultp = *slot;
1350 }
4c4b4cd2 1351 }
14f9c5c9 1352
4c4b4cd2
PH
1353 return *resultp;
1354}
76a01679 1355
2c0b251b 1356static char *
76a01679 1357ada_la_decode (const char *encoded, int options)
4c4b4cd2 1358{
f945dedf 1359 return xstrdup (ada_decode (encoded).c_str ());
14f9c5c9
AS
1360}
1361
14f9c5c9 1362\f
d2e4a39e 1363
dda83cd7 1364 /* Arrays */
14f9c5c9 1365
28c85d6c
JB
1366/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1367 generated by the GNAT compiler to describe the index type used
1368 for each dimension of an array, check whether it follows the latest
1369 known encoding. If not, fix it up to conform to the latest encoding.
1370 Otherwise, do nothing. This function also does nothing if
1371 INDEX_DESC_TYPE is NULL.
1372
85102364 1373 The GNAT encoding used to describe the array index type evolved a bit.
28c85d6c
JB
1374 Initially, the information would be provided through the name of each
1375 field of the structure type only, while the type of these fields was
1376 described as unspecified and irrelevant. The debugger was then expected
1377 to perform a global type lookup using the name of that field in order
1378 to get access to the full index type description. Because these global
1379 lookups can be very expensive, the encoding was later enhanced to make
1380 the global lookup unnecessary by defining the field type as being
1381 the full index type description.
1382
1383 The purpose of this routine is to allow us to support older versions
1384 of the compiler by detecting the use of the older encoding, and by
1385 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1386 we essentially replace each field's meaningless type by the associated
1387 index subtype). */
1388
1389void
1390ada_fixup_array_indexes_type (struct type *index_desc_type)
1391{
1392 int i;
1393
1394 if (index_desc_type == NULL)
1395 return;
1f704f76 1396 gdb_assert (index_desc_type->num_fields () > 0);
28c85d6c
JB
1397
1398 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1399 to check one field only, no need to check them all). If not, return
1400 now.
1401
1402 If our INDEX_DESC_TYPE was generated using the older encoding,
1403 the field type should be a meaningless integer type whose name
1404 is not equal to the field name. */
940da03e
SM
1405 if (index_desc_type->field (0).type ()->name () != NULL
1406 && strcmp (index_desc_type->field (0).type ()->name (),
dda83cd7 1407 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
28c85d6c
JB
1408 return;
1409
1410 /* Fixup each field of INDEX_DESC_TYPE. */
1f704f76 1411 for (i = 0; i < index_desc_type->num_fields (); i++)
28c85d6c 1412 {
0d5cff50 1413 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1414 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1415
1416 if (raw_type)
5d14b6e5 1417 index_desc_type->field (i).set_type (raw_type);
28c85d6c
JB
1418 }
1419}
1420
4c4b4cd2
PH
1421/* The desc_* routines return primitive portions of array descriptors
1422 (fat pointers). */
14f9c5c9
AS
1423
1424/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1425 level of indirection, if needed. */
1426
d2e4a39e
AS
1427static struct type *
1428desc_base_type (struct type *type)
14f9c5c9
AS
1429{
1430 if (type == NULL)
1431 return NULL;
61ee279c 1432 type = ada_check_typedef (type);
78134374 1433 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
1434 type = ada_typedef_target_type (type);
1435
1265e4aa 1436 if (type != NULL
78134374 1437 && (type->code () == TYPE_CODE_PTR
dda83cd7 1438 || type->code () == TYPE_CODE_REF))
61ee279c 1439 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1440 else
1441 return type;
1442}
1443
4c4b4cd2
PH
1444/* True iff TYPE indicates a "thin" array pointer type. */
1445
14f9c5c9 1446static int
d2e4a39e 1447is_thin_pntr (struct type *type)
14f9c5c9 1448{
d2e4a39e 1449 return
14f9c5c9
AS
1450 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1451 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1452}
1453
4c4b4cd2
PH
1454/* The descriptor type for thin pointer type TYPE. */
1455
d2e4a39e
AS
1456static struct type *
1457thin_descriptor_type (struct type *type)
14f9c5c9 1458{
d2e4a39e 1459 struct type *base_type = desc_base_type (type);
5b4ee69b 1460
14f9c5c9
AS
1461 if (base_type == NULL)
1462 return NULL;
1463 if (is_suffix (ada_type_name (base_type), "___XVE"))
1464 return base_type;
d2e4a39e 1465 else
14f9c5c9 1466 {
d2e4a39e 1467 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1468
14f9c5c9 1469 if (alt_type == NULL)
dda83cd7 1470 return base_type;
14f9c5c9 1471 else
dda83cd7 1472 return alt_type;
14f9c5c9
AS
1473 }
1474}
1475
4c4b4cd2
PH
1476/* A pointer to the array data for thin-pointer value VAL. */
1477
d2e4a39e
AS
1478static struct value *
1479thin_data_pntr (struct value *val)
14f9c5c9 1480{
828292f2 1481 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1482 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1483
556bdfd4
UW
1484 data_type = lookup_pointer_type (data_type);
1485
78134374 1486 if (type->code () == TYPE_CODE_PTR)
556bdfd4 1487 return value_cast (data_type, value_copy (val));
d2e4a39e 1488 else
42ae5230 1489 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1490}
1491
4c4b4cd2
PH
1492/* True iff TYPE indicates a "thick" array pointer type. */
1493
14f9c5c9 1494static int
d2e4a39e 1495is_thick_pntr (struct type *type)
14f9c5c9
AS
1496{
1497 type = desc_base_type (type);
78134374 1498 return (type != NULL && type->code () == TYPE_CODE_STRUCT
dda83cd7 1499 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1500}
1501
4c4b4cd2
PH
1502/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1503 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1504
d2e4a39e
AS
1505static struct type *
1506desc_bounds_type (struct type *type)
14f9c5c9 1507{
d2e4a39e 1508 struct type *r;
14f9c5c9
AS
1509
1510 type = desc_base_type (type);
1511
1512 if (type == NULL)
1513 return NULL;
1514 else if (is_thin_pntr (type))
1515 {
1516 type = thin_descriptor_type (type);
1517 if (type == NULL)
dda83cd7 1518 return NULL;
14f9c5c9
AS
1519 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1520 if (r != NULL)
dda83cd7 1521 return ada_check_typedef (r);
14f9c5c9 1522 }
78134374 1523 else if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
1524 {
1525 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1526 if (r != NULL)
dda83cd7 1527 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1528 }
1529 return NULL;
1530}
1531
1532/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1533 one, a pointer to its bounds data. Otherwise NULL. */
1534
d2e4a39e
AS
1535static struct value *
1536desc_bounds (struct value *arr)
14f9c5c9 1537{
df407dfe 1538 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1539
d2e4a39e 1540 if (is_thin_pntr (type))
14f9c5c9 1541 {
d2e4a39e 1542 struct type *bounds_type =
dda83cd7 1543 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1544 LONGEST addr;
1545
4cdfadb1 1546 if (bounds_type == NULL)
dda83cd7 1547 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1548
1549 /* NOTE: The following calculation is not really kosher, but
dda83cd7
SM
1550 since desc_type is an XVE-encoded type (and shouldn't be),
1551 the correct calculation is a real pain. FIXME (and fix GCC). */
78134374 1552 if (type->code () == TYPE_CODE_PTR)
dda83cd7 1553 addr = value_as_long (arr);
d2e4a39e 1554 else
dda83cd7 1555 addr = value_address (arr);
14f9c5c9 1556
d2e4a39e 1557 return
dda83cd7
SM
1558 value_from_longest (lookup_pointer_type (bounds_type),
1559 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1560 }
1561
1562 else if (is_thick_pntr (type))
05e522ef
JB
1563 {
1564 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1565 _("Bad GNAT array descriptor"));
1566 struct type *p_bounds_type = value_type (p_bounds);
1567
1568 if (p_bounds_type
78134374 1569 && p_bounds_type->code () == TYPE_CODE_PTR)
05e522ef
JB
1570 {
1571 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1572
e46d3488 1573 if (target_type->is_stub ())
05e522ef
JB
1574 p_bounds = value_cast (lookup_pointer_type
1575 (ada_check_typedef (target_type)),
1576 p_bounds);
1577 }
1578 else
1579 error (_("Bad GNAT array descriptor"));
1580
1581 return p_bounds;
1582 }
14f9c5c9
AS
1583 else
1584 return NULL;
1585}
1586
4c4b4cd2
PH
1587/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1588 position of the field containing the address of the bounds data. */
1589
14f9c5c9 1590static int
d2e4a39e 1591fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1592{
1593 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1594}
1595
1596/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1597 size of the field containing the address of the bounds data. */
1598
14f9c5c9 1599static int
d2e4a39e 1600fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1601{
1602 type = desc_base_type (type);
1603
d2e4a39e 1604 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1605 return TYPE_FIELD_BITSIZE (type, 1);
1606 else
940da03e 1607 return 8 * TYPE_LENGTH (ada_check_typedef (type->field (1).type ()));
14f9c5c9
AS
1608}
1609
4c4b4cd2 1610/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1611 pointer to one, the type of its array data (a array-with-no-bounds type);
1612 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1613 data. */
4c4b4cd2 1614
d2e4a39e 1615static struct type *
556bdfd4 1616desc_data_target_type (struct type *type)
14f9c5c9
AS
1617{
1618 type = desc_base_type (type);
1619
4c4b4cd2 1620 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1621 if (is_thin_pntr (type))
940da03e 1622 return desc_base_type (thin_descriptor_type (type)->field (1).type ());
14f9c5c9 1623 else if (is_thick_pntr (type))
556bdfd4
UW
1624 {
1625 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1626
1627 if (data_type
78134374 1628 && ada_check_typedef (data_type)->code () == TYPE_CODE_PTR)
05e522ef 1629 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1630 }
1631
1632 return NULL;
14f9c5c9
AS
1633}
1634
1635/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1636 its array data. */
4c4b4cd2 1637
d2e4a39e
AS
1638static struct value *
1639desc_data (struct value *arr)
14f9c5c9 1640{
df407dfe 1641 struct type *type = value_type (arr);
5b4ee69b 1642
14f9c5c9
AS
1643 if (is_thin_pntr (type))
1644 return thin_data_pntr (arr);
1645 else if (is_thick_pntr (type))
d2e4a39e 1646 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
dda83cd7 1647 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1648 else
1649 return NULL;
1650}
1651
1652
1653/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1654 position of the field containing the address of the data. */
1655
14f9c5c9 1656static int
d2e4a39e 1657fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1658{
1659 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1660}
1661
1662/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1663 size of the field containing the address of the data. */
1664
14f9c5c9 1665static int
d2e4a39e 1666fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1667{
1668 type = desc_base_type (type);
1669
1670 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1671 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1672 else
940da03e 1673 return TARGET_CHAR_BIT * TYPE_LENGTH (type->field (0).type ());
14f9c5c9
AS
1674}
1675
4c4b4cd2 1676/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1677 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1678 bound, if WHICH is 1. The first bound is I=1. */
1679
d2e4a39e
AS
1680static struct value *
1681desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1682{
250106a7
TT
1683 char bound_name[20];
1684 xsnprintf (bound_name, sizeof (bound_name), "%cB%d",
1685 which ? 'U' : 'L', i - 1);
1686 return value_struct_elt (&bounds, NULL, bound_name, NULL,
dda83cd7 1687 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1688}
1689
1690/* If BOUNDS is an array-bounds structure type, return the bit position
1691 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1692 bound, if WHICH is 1. The first bound is I=1. */
1693
14f9c5c9 1694static int
d2e4a39e 1695desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1696{
d2e4a39e 1697 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1698}
1699
1700/* If BOUNDS is an array-bounds structure type, return the bit field size
1701 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1702 bound, if WHICH is 1. The first bound is I=1. */
1703
76a01679 1704static int
d2e4a39e 1705desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1706{
1707 type = desc_base_type (type);
1708
d2e4a39e
AS
1709 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1710 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1711 else
940da03e 1712 return 8 * TYPE_LENGTH (type->field (2 * i + which - 2).type ());
14f9c5c9
AS
1713}
1714
1715/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1716 Ith bound (numbering from 1). Otherwise, NULL. */
1717
d2e4a39e
AS
1718static struct type *
1719desc_index_type (struct type *type, int i)
14f9c5c9
AS
1720{
1721 type = desc_base_type (type);
1722
78134374 1723 if (type->code () == TYPE_CODE_STRUCT)
250106a7
TT
1724 {
1725 char bound_name[20];
1726 xsnprintf (bound_name, sizeof (bound_name), "LB%d", i - 1);
1727 return lookup_struct_elt_type (type, bound_name, 1);
1728 }
d2e4a39e 1729 else
14f9c5c9
AS
1730 return NULL;
1731}
1732
4c4b4cd2
PH
1733/* The number of index positions in the array-bounds type TYPE.
1734 Return 0 if TYPE is NULL. */
1735
14f9c5c9 1736static int
d2e4a39e 1737desc_arity (struct type *type)
14f9c5c9
AS
1738{
1739 type = desc_base_type (type);
1740
1741 if (type != NULL)
1f704f76 1742 return type->num_fields () / 2;
14f9c5c9
AS
1743 return 0;
1744}
1745
4c4b4cd2
PH
1746/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1747 an array descriptor type (representing an unconstrained array
1748 type). */
1749
76a01679
JB
1750static int
1751ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1752{
1753 if (type == NULL)
1754 return 0;
61ee279c 1755 type = ada_check_typedef (type);
78134374 1756 return (type->code () == TYPE_CODE_ARRAY
dda83cd7 1757 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1758}
1759
52ce6436 1760/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1761 * to one. */
52ce6436 1762
2c0b251b 1763static int
52ce6436
PH
1764ada_is_array_type (struct type *type)
1765{
78134374
SM
1766 while (type != NULL
1767 && (type->code () == TYPE_CODE_PTR
1768 || type->code () == TYPE_CODE_REF))
52ce6436
PH
1769 type = TYPE_TARGET_TYPE (type);
1770 return ada_is_direct_array_type (type);
1771}
1772
4c4b4cd2 1773/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1774
14f9c5c9 1775int
4c4b4cd2 1776ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1777{
1778 if (type == NULL)
1779 return 0;
61ee279c 1780 type = ada_check_typedef (type);
78134374
SM
1781 return (type->code () == TYPE_CODE_ARRAY
1782 || (type->code () == TYPE_CODE_PTR
1783 && (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ()
1784 == TYPE_CODE_ARRAY)));
14f9c5c9
AS
1785}
1786
4c4b4cd2
PH
1787/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1788
14f9c5c9 1789int
4c4b4cd2 1790ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1791{
556bdfd4 1792 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1793
1794 if (type == NULL)
1795 return 0;
61ee279c 1796 type = ada_check_typedef (type);
556bdfd4 1797 return (data_type != NULL
78134374 1798 && data_type->code () == TYPE_CODE_ARRAY
556bdfd4 1799 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1800}
1801
1802/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1803 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1804 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1805 is still needed. */
1806
14f9c5c9 1807int
ebf56fd3 1808ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1809{
d2e4a39e 1810 return
14f9c5c9 1811 type != NULL
78134374 1812 && type->code () == TYPE_CODE_STRUCT
14f9c5c9 1813 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
dda83cd7 1814 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
4c4b4cd2 1815 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1816}
1817
1818
4c4b4cd2 1819/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1820 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1821 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1822 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1823 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1824 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1825 a descriptor. */
de93309a
SM
1826
1827static struct type *
d2e4a39e 1828ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1829{
ad82864c
JB
1830 if (ada_is_constrained_packed_array_type (value_type (arr)))
1831 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1832
df407dfe
AC
1833 if (!ada_is_array_descriptor_type (value_type (arr)))
1834 return value_type (arr);
d2e4a39e
AS
1835
1836 if (!bounds)
ad82864c
JB
1837 {
1838 struct type *array_type =
1839 ada_check_typedef (desc_data_target_type (value_type (arr)));
1840
1841 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1842 TYPE_FIELD_BITSIZE (array_type, 0) =
1843 decode_packed_array_bitsize (value_type (arr));
1844
1845 return array_type;
1846 }
14f9c5c9
AS
1847 else
1848 {
d2e4a39e 1849 struct type *elt_type;
14f9c5c9 1850 int arity;
d2e4a39e 1851 struct value *descriptor;
14f9c5c9 1852
df407dfe
AC
1853 elt_type = ada_array_element_type (value_type (arr), -1);
1854 arity = ada_array_arity (value_type (arr));
14f9c5c9 1855
d2e4a39e 1856 if (elt_type == NULL || arity == 0)
dda83cd7 1857 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1858
1859 descriptor = desc_bounds (arr);
d2e4a39e 1860 if (value_as_long (descriptor) == 0)
dda83cd7 1861 return NULL;
d2e4a39e 1862 while (arity > 0)
dda83cd7
SM
1863 {
1864 struct type *range_type = alloc_type_copy (value_type (arr));
1865 struct type *array_type = alloc_type_copy (value_type (arr));
1866 struct value *low = desc_one_bound (descriptor, arity, 0);
1867 struct value *high = desc_one_bound (descriptor, arity, 1);
1868
1869 arity -= 1;
1870 create_static_range_type (range_type, value_type (low),
0c9c3474
SA
1871 longest_to_int (value_as_long (low)),
1872 longest_to_int (value_as_long (high)));
dda83cd7 1873 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1874
1875 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1876 {
1877 /* We need to store the element packed bitsize, as well as
dda83cd7 1878 recompute the array size, because it was previously
e67ad678
JB
1879 computed based on the unpacked element size. */
1880 LONGEST lo = value_as_long (low);
1881 LONGEST hi = value_as_long (high);
1882
1883 TYPE_FIELD_BITSIZE (elt_type, 0) =
1884 decode_packed_array_bitsize (value_type (arr));
1885 /* If the array has no element, then the size is already
dda83cd7 1886 zero, and does not need to be recomputed. */
e67ad678
JB
1887 if (lo < hi)
1888 {
1889 int array_bitsize =
dda83cd7 1890 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
e67ad678
JB
1891
1892 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1893 }
1894 }
dda83cd7 1895 }
14f9c5c9
AS
1896
1897 return lookup_pointer_type (elt_type);
1898 }
1899}
1900
1901/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
1902 Otherwise, returns either a standard GDB array with bounds set
1903 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
1904 GDB array. Returns NULL if ARR is a null fat pointer. */
1905
d2e4a39e
AS
1906struct value *
1907ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 1908{
df407dfe 1909 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1910 {
d2e4a39e 1911 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 1912
14f9c5c9 1913 if (arrType == NULL)
dda83cd7 1914 return NULL;
14f9c5c9
AS
1915 return value_cast (arrType, value_copy (desc_data (arr)));
1916 }
ad82864c
JB
1917 else if (ada_is_constrained_packed_array_type (value_type (arr)))
1918 return decode_constrained_packed_array (arr);
14f9c5c9
AS
1919 else
1920 return arr;
1921}
1922
1923/* If ARR does not represent an array, returns ARR unchanged.
1924 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
1925 be ARR itself if it already is in the proper form). */
1926
720d1a40 1927struct value *
d2e4a39e 1928ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 1929{
df407dfe 1930 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 1931 {
d2e4a39e 1932 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 1933
14f9c5c9 1934 if (arrVal == NULL)
dda83cd7 1935 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 1936 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
1937 return value_ind (arrVal);
1938 }
ad82864c
JB
1939 else if (ada_is_constrained_packed_array_type (value_type (arr)))
1940 return decode_constrained_packed_array (arr);
d2e4a39e 1941 else
14f9c5c9
AS
1942 return arr;
1943}
1944
1945/* If TYPE represents a GNAT array type, return it translated to an
1946 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
1947 packing). For other types, is the identity. */
1948
d2e4a39e
AS
1949struct type *
1950ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 1951{
ad82864c
JB
1952 if (ada_is_constrained_packed_array_type (type))
1953 return decode_constrained_packed_array_type (type);
17280b9f
UW
1954
1955 if (ada_is_array_descriptor_type (type))
556bdfd4 1956 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
1957
1958 return type;
14f9c5c9
AS
1959}
1960
4c4b4cd2
PH
1961/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
1962
ad82864c 1963static int
57567375 1964ada_is_gnat_encoded_packed_array_type (struct type *type)
14f9c5c9
AS
1965{
1966 if (type == NULL)
1967 return 0;
4c4b4cd2 1968 type = desc_base_type (type);
61ee279c 1969 type = ada_check_typedef (type);
d2e4a39e 1970 return
14f9c5c9
AS
1971 ada_type_name (type) != NULL
1972 && strstr (ada_type_name (type), "___XP") != NULL;
1973}
1974
ad82864c
JB
1975/* Non-zero iff TYPE represents a standard GNAT constrained
1976 packed-array type. */
1977
1978int
1979ada_is_constrained_packed_array_type (struct type *type)
1980{
57567375 1981 return ada_is_gnat_encoded_packed_array_type (type)
ad82864c
JB
1982 && !ada_is_array_descriptor_type (type);
1983}
1984
1985/* Non-zero iff TYPE represents an array descriptor for a
1986 unconstrained packed-array type. */
1987
1988static int
1989ada_is_unconstrained_packed_array_type (struct type *type)
1990{
57567375
TT
1991 if (!ada_is_array_descriptor_type (type))
1992 return 0;
1993
1994 if (ada_is_gnat_encoded_packed_array_type (type))
1995 return 1;
1996
1997 /* If we saw GNAT encodings, then the above code is sufficient.
1998 However, with minimal encodings, we will just have a thick
1999 pointer instead. */
2000 if (is_thick_pntr (type))
2001 {
2002 type = desc_base_type (type);
2003 /* The structure's first field is a pointer to an array, so this
2004 fetches the array type. */
2005 type = TYPE_TARGET_TYPE (type->field (0).type ());
2006 /* Now we can see if the array elements are packed. */
2007 return TYPE_FIELD_BITSIZE (type, 0) > 0;
2008 }
2009
2010 return 0;
ad82864c
JB
2011}
2012
c9a28cbe
TT
2013/* Return true if TYPE is a (Gnat-encoded) constrained packed array
2014 type, or if it is an ordinary (non-Gnat-encoded) packed array. */
2015
2016static bool
2017ada_is_any_packed_array_type (struct type *type)
2018{
2019 return (ada_is_constrained_packed_array_type (type)
2020 || (type->code () == TYPE_CODE_ARRAY
2021 && TYPE_FIELD_BITSIZE (type, 0) % 8 != 0));
2022}
2023
ad82864c
JB
2024/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2025 return the size of its elements in bits. */
2026
2027static long
2028decode_packed_array_bitsize (struct type *type)
2029{
0d5cff50
DE
2030 const char *raw_name;
2031 const char *tail;
ad82864c
JB
2032 long bits;
2033
720d1a40
JB
2034 /* Access to arrays implemented as fat pointers are encoded as a typedef
2035 of the fat pointer type. We need the name of the fat pointer type
2036 to do the decoding, so strip the typedef layer. */
78134374 2037 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
2038 type = ada_typedef_target_type (type);
2039
2040 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2041 if (!raw_name)
2042 raw_name = ada_type_name (desc_base_type (type));
2043
2044 if (!raw_name)
2045 return 0;
2046
2047 tail = strstr (raw_name, "___XP");
57567375
TT
2048 if (tail == nullptr)
2049 {
2050 gdb_assert (is_thick_pntr (type));
2051 /* The structure's first field is a pointer to an array, so this
2052 fetches the array type. */
2053 type = TYPE_TARGET_TYPE (type->field (0).type ());
2054 /* Now we can see if the array elements are packed. */
2055 return TYPE_FIELD_BITSIZE (type, 0);
2056 }
ad82864c
JB
2057
2058 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2059 {
2060 lim_warning
2061 (_("could not understand bit size information on packed array"));
2062 return 0;
2063 }
2064
2065 return bits;
2066}
2067
14f9c5c9
AS
2068/* Given that TYPE is a standard GDB array type with all bounds filled
2069 in, and that the element size of its ultimate scalar constituents
2070 (that is, either its elements, or, if it is an array of arrays, its
2071 elements' elements, etc.) is *ELT_BITS, return an identical type,
2072 but with the bit sizes of its elements (and those of any
2073 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2074 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2075 in bits.
2076
2077 Note that, for arrays whose index type has an XA encoding where
2078 a bound references a record discriminant, getting that discriminant,
2079 and therefore the actual value of that bound, is not possible
2080 because none of the given parameters gives us access to the record.
2081 This function assumes that it is OK in the context where it is being
2082 used to return an array whose bounds are still dynamic and where
2083 the length is arbitrary. */
4c4b4cd2 2084
d2e4a39e 2085static struct type *
ad82864c 2086constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2087{
d2e4a39e
AS
2088 struct type *new_elt_type;
2089 struct type *new_type;
99b1c762
JB
2090 struct type *index_type_desc;
2091 struct type *index_type;
14f9c5c9
AS
2092 LONGEST low_bound, high_bound;
2093
61ee279c 2094 type = ada_check_typedef (type);
78134374 2095 if (type->code () != TYPE_CODE_ARRAY)
14f9c5c9
AS
2096 return type;
2097
99b1c762
JB
2098 index_type_desc = ada_find_parallel_type (type, "___XA");
2099 if (index_type_desc)
940da03e 2100 index_type = to_fixed_range_type (index_type_desc->field (0).type (),
99b1c762
JB
2101 NULL);
2102 else
3d967001 2103 index_type = type->index_type ();
99b1c762 2104
e9bb382b 2105 new_type = alloc_type_copy (type);
ad82864c
JB
2106 new_elt_type =
2107 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2108 elt_bits);
99b1c762 2109 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9 2110 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
d0e39ea2 2111 new_type->set_name (ada_type_name (type));
14f9c5c9 2112
78134374 2113 if ((check_typedef (index_type)->code () == TYPE_CODE_RANGE
4a46959e
JB
2114 && is_dynamic_type (check_typedef (index_type)))
2115 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2116 low_bound = high_bound = 0;
2117 if (high_bound < low_bound)
2118 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2119 else
14f9c5c9
AS
2120 {
2121 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2122 TYPE_LENGTH (new_type) =
dda83cd7 2123 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2124 }
2125
9cdd0d12 2126 new_type->set_is_fixed_instance (true);
14f9c5c9
AS
2127 return new_type;
2128}
2129
ad82864c
JB
2130/* The array type encoded by TYPE, where
2131 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2132
d2e4a39e 2133static struct type *
ad82864c 2134decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2135{
0d5cff50 2136 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2137 char *name;
0d5cff50 2138 const char *tail;
d2e4a39e 2139 struct type *shadow_type;
14f9c5c9 2140 long bits;
14f9c5c9 2141
727e3d2e
JB
2142 if (!raw_name)
2143 raw_name = ada_type_name (desc_base_type (type));
2144
2145 if (!raw_name)
2146 return NULL;
2147
2148 name = (char *) alloca (strlen (raw_name) + 1);
2149 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2150 type = desc_base_type (type);
2151
14f9c5c9
AS
2152 memcpy (name, raw_name, tail - raw_name);
2153 name[tail - raw_name] = '\000';
2154
b4ba55a1
JB
2155 shadow_type = ada_find_parallel_type_with_name (type, name);
2156
2157 if (shadow_type == NULL)
14f9c5c9 2158 {
323e0a4a 2159 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2160 return NULL;
2161 }
f168693b 2162 shadow_type = check_typedef (shadow_type);
14f9c5c9 2163
78134374 2164 if (shadow_type->code () != TYPE_CODE_ARRAY)
14f9c5c9 2165 {
0963b4bd
MS
2166 lim_warning (_("could not understand bounds "
2167 "information on packed array"));
14f9c5c9
AS
2168 return NULL;
2169 }
d2e4a39e 2170
ad82864c
JB
2171 bits = decode_packed_array_bitsize (type);
2172 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2173}
2174
a7400e44
TT
2175/* Helper function for decode_constrained_packed_array. Set the field
2176 bitsize on a series of packed arrays. Returns the number of
2177 elements in TYPE. */
2178
2179static LONGEST
2180recursively_update_array_bitsize (struct type *type)
2181{
2182 gdb_assert (type->code () == TYPE_CODE_ARRAY);
2183
2184 LONGEST low, high;
2185 if (get_discrete_bounds (type->index_type (), &low, &high) < 0
2186 || low > high)
2187 return 0;
2188 LONGEST our_len = high - low + 1;
2189
2190 struct type *elt_type = TYPE_TARGET_TYPE (type);
2191 if (elt_type->code () == TYPE_CODE_ARRAY)
2192 {
2193 LONGEST elt_len = recursively_update_array_bitsize (elt_type);
2194 LONGEST elt_bitsize = elt_len * TYPE_FIELD_BITSIZE (elt_type, 0);
2195 TYPE_FIELD_BITSIZE (type, 0) = elt_bitsize;
2196
2197 TYPE_LENGTH (type) = ((our_len * elt_bitsize + HOST_CHAR_BIT - 1)
2198 / HOST_CHAR_BIT);
2199 }
2200
2201 return our_len;
2202}
2203
ad82864c
JB
2204/* Given that ARR is a struct value *indicating a GNAT constrained packed
2205 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2206 standard GDB array type except that the BITSIZEs of the array
2207 target types are set to the number of bits in each element, and the
4c4b4cd2 2208 type length is set appropriately. */
14f9c5c9 2209
d2e4a39e 2210static struct value *
ad82864c 2211decode_constrained_packed_array (struct value *arr)
14f9c5c9 2212{
4c4b4cd2 2213 struct type *type;
14f9c5c9 2214
11aa919a
PMR
2215 /* If our value is a pointer, then dereference it. Likewise if
2216 the value is a reference. Make sure that this operation does not
2217 cause the target type to be fixed, as this would indirectly cause
2218 this array to be decoded. The rest of the routine assumes that
2219 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2220 and "value_ind" routines to perform the dereferencing, as opposed
2221 to using "ada_coerce_ref" or "ada_value_ind". */
2222 arr = coerce_ref (arr);
78134374 2223 if (ada_check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
284614f0 2224 arr = value_ind (arr);
4c4b4cd2 2225
ad82864c 2226 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2227 if (type == NULL)
2228 {
323e0a4a 2229 error (_("can't unpack array"));
14f9c5c9
AS
2230 return NULL;
2231 }
61ee279c 2232
a7400e44
TT
2233 /* Decoding the packed array type could not correctly set the field
2234 bitsizes for any dimension except the innermost, because the
2235 bounds may be variable and were not passed to that function. So,
2236 we further resolve the array bounds here and then update the
2237 sizes. */
2238 const gdb_byte *valaddr = value_contents_for_printing (arr);
2239 CORE_ADDR address = value_address (arr);
2240 gdb::array_view<const gdb_byte> view
2241 = gdb::make_array_view (valaddr, TYPE_LENGTH (type));
2242 type = resolve_dynamic_type (type, view, address);
2243 recursively_update_array_bitsize (type);
2244
d5a22e77 2245 if (type_byte_order (value_type (arr)) == BFD_ENDIAN_BIG
32c9a795 2246 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2247 {
2248 /* This is a (right-justified) modular type representing a packed
2249 array with no wrapper. In order to interpret the value through
2250 the (left-justified) packed array type we just built, we must
2251 first left-justify it. */
2252 int bit_size, bit_pos;
2253 ULONGEST mod;
2254
df407dfe 2255 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2256 bit_size = 0;
2257 while (mod > 0)
2258 {
2259 bit_size += 1;
2260 mod >>= 1;
2261 }
df407dfe 2262 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2263 arr = ada_value_primitive_packed_val (arr, NULL,
2264 bit_pos / HOST_CHAR_BIT,
2265 bit_pos % HOST_CHAR_BIT,
2266 bit_size,
2267 type);
2268 }
2269
4c4b4cd2 2270 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2271}
2272
2273
2274/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2275 given in IND. ARR must be a simple array. */
14f9c5c9 2276
d2e4a39e
AS
2277static struct value *
2278value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2279{
2280 int i;
2281 int bits, elt_off, bit_off;
2282 long elt_total_bit_offset;
d2e4a39e
AS
2283 struct type *elt_type;
2284 struct value *v;
14f9c5c9
AS
2285
2286 bits = 0;
2287 elt_total_bit_offset = 0;
df407dfe 2288 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2289 for (i = 0; i < arity; i += 1)
14f9c5c9 2290 {
78134374 2291 if (elt_type->code () != TYPE_CODE_ARRAY
dda83cd7
SM
2292 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2293 error
2294 (_("attempt to do packed indexing of "
0963b4bd 2295 "something other than a packed array"));
14f9c5c9 2296 else
dda83cd7
SM
2297 {
2298 struct type *range_type = elt_type->index_type ();
2299 LONGEST lowerbound, upperbound;
2300 LONGEST idx;
2301
2302 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2303 {
2304 lim_warning (_("don't know bounds of array"));
2305 lowerbound = upperbound = 0;
2306 }
2307
2308 idx = pos_atr (ind[i]);
2309 if (idx < lowerbound || idx > upperbound)
2310 lim_warning (_("packed array index %ld out of bounds"),
0963b4bd 2311 (long) idx);
dda83cd7
SM
2312 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2313 elt_total_bit_offset += (idx - lowerbound) * bits;
2314 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
2315 }
14f9c5c9
AS
2316 }
2317 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2318 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2319
2320 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
dda83cd7 2321 bits, elt_type);
14f9c5c9
AS
2322 return v;
2323}
2324
4c4b4cd2 2325/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2326
2327static int
d2e4a39e 2328has_negatives (struct type *type)
14f9c5c9 2329{
78134374 2330 switch (type->code ())
d2e4a39e
AS
2331 {
2332 default:
2333 return 0;
2334 case TYPE_CODE_INT:
c6d940a9 2335 return !type->is_unsigned ();
d2e4a39e 2336 case TYPE_CODE_RANGE:
5537ddd0 2337 return type->bounds ()->low.const_val () - type->bounds ()->bias < 0;
d2e4a39e 2338 }
14f9c5c9 2339}
d2e4a39e 2340
f93fca70 2341/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2342 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2343 the unpacked buffer.
14f9c5c9 2344
5b639dea
JB
2345 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2346 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2347
f93fca70
JB
2348 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2349 zero otherwise.
14f9c5c9 2350
f93fca70 2351 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2352
f93fca70
JB
2353 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2354
2355static void
2356ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2357 gdb_byte *unpacked, int unpacked_len,
2358 int is_big_endian, int is_signed_type,
2359 int is_scalar)
2360{
a1c95e6b
JB
2361 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2362 int src_idx; /* Index into the source area */
2363 int src_bytes_left; /* Number of source bytes left to process. */
2364 int srcBitsLeft; /* Number of source bits left to move */
2365 int unusedLS; /* Number of bits in next significant
dda83cd7 2366 byte of source that are unused */
a1c95e6b 2367
a1c95e6b
JB
2368 int unpacked_idx; /* Index into the unpacked buffer */
2369 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2370
4c4b4cd2 2371 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2372 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2373 unsigned char sign;
a1c95e6b 2374
4c4b4cd2
PH
2375 /* Transmit bytes from least to most significant; delta is the direction
2376 the indices move. */
f93fca70 2377 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2378
5b639dea
JB
2379 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2380 bits from SRC. .*/
2381 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2382 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2383 bit_size, unpacked_len);
2384
14f9c5c9 2385 srcBitsLeft = bit_size;
086ca51f 2386 src_bytes_left = src_len;
f93fca70 2387 unpacked_bytes_left = unpacked_len;
14f9c5c9 2388 sign = 0;
f93fca70
JB
2389
2390 if (is_big_endian)
14f9c5c9 2391 {
086ca51f 2392 src_idx = src_len - 1;
f93fca70
JB
2393 if (is_signed_type
2394 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
dda83cd7 2395 sign = ~0;
d2e4a39e
AS
2396
2397 unusedLS =
dda83cd7
SM
2398 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2399 % HOST_CHAR_BIT;
14f9c5c9 2400
f93fca70
JB
2401 if (is_scalar)
2402 {
dda83cd7
SM
2403 accumSize = 0;
2404 unpacked_idx = unpacked_len - 1;
f93fca70
JB
2405 }
2406 else
2407 {
dda83cd7
SM
2408 /* Non-scalar values must be aligned at a byte boundary... */
2409 accumSize =
2410 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2411 /* ... And are placed at the beginning (most-significant) bytes
2412 of the target. */
2413 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2414 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2415 }
14f9c5c9 2416 }
d2e4a39e 2417 else
14f9c5c9
AS
2418 {
2419 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2420
086ca51f 2421 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2422 unusedLS = bit_offset;
2423 accumSize = 0;
2424
f93fca70 2425 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
dda83cd7 2426 sign = ~0;
14f9c5c9 2427 }
d2e4a39e 2428
14f9c5c9 2429 accum = 0;
086ca51f 2430 while (src_bytes_left > 0)
14f9c5c9
AS
2431 {
2432 /* Mask for removing bits of the next source byte that are not
dda83cd7 2433 part of the value. */
d2e4a39e 2434 unsigned int unusedMSMask =
dda83cd7
SM
2435 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2436 1;
4c4b4cd2 2437 /* Sign-extend bits for this byte. */
14f9c5c9 2438 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2439
d2e4a39e 2440 accum |=
dda83cd7 2441 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2442 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2443 if (accumSize >= HOST_CHAR_BIT)
dda83cd7
SM
2444 {
2445 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
2446 accumSize -= HOST_CHAR_BIT;
2447 accum >>= HOST_CHAR_BIT;
2448 unpacked_bytes_left -= 1;
2449 unpacked_idx += delta;
2450 }
14f9c5c9
AS
2451 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2452 unusedLS = 0;
086ca51f
JB
2453 src_bytes_left -= 1;
2454 src_idx += delta;
14f9c5c9 2455 }
086ca51f 2456 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2457 {
2458 accum |= sign << accumSize;
db297a65 2459 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2460 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2461 if (accumSize < 0)
2462 accumSize = 0;
14f9c5c9 2463 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2464 unpacked_bytes_left -= 1;
2465 unpacked_idx += delta;
14f9c5c9 2466 }
f93fca70
JB
2467}
2468
2469/* Create a new value of type TYPE from the contents of OBJ starting
2470 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2471 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2472 assigning through the result will set the field fetched from.
2473 VALADDR is ignored unless OBJ is NULL, in which case,
2474 VALADDR+OFFSET must address the start of storage containing the
2475 packed value. The value returned in this case is never an lval.
2476 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2477
2478struct value *
2479ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2480 long offset, int bit_offset, int bit_size,
dda83cd7 2481 struct type *type)
f93fca70
JB
2482{
2483 struct value *v;
bfb1c796 2484 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2485 gdb_byte *unpacked;
220475ed 2486 const int is_scalar = is_scalar_type (type);
d5a22e77 2487 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d5722aa2 2488 gdb::byte_vector staging;
f93fca70
JB
2489
2490 type = ada_check_typedef (type);
2491
d0a9e810 2492 if (obj == NULL)
bfb1c796 2493 src = valaddr + offset;
d0a9e810 2494 else
bfb1c796 2495 src = value_contents (obj) + offset;
d0a9e810
JB
2496
2497 if (is_dynamic_type (type))
2498 {
2499 /* The length of TYPE might by dynamic, so we need to resolve
2500 TYPE in order to know its actual size, which we then use
2501 to create the contents buffer of the value we return.
2502 The difficulty is that the data containing our object is
2503 packed, and therefore maybe not at a byte boundary. So, what
2504 we do, is unpack the data into a byte-aligned buffer, and then
2505 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2506 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2507 staging.resize (staging_len);
d0a9e810
JB
2508
2509 ada_unpack_from_contents (src, bit_offset, bit_size,
dda83cd7 2510 staging.data (), staging.size (),
d0a9e810
JB
2511 is_big_endian, has_negatives (type),
2512 is_scalar);
b249d2c2 2513 type = resolve_dynamic_type (type, staging, 0);
0cafa88c
JB
2514 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2515 {
2516 /* This happens when the length of the object is dynamic,
2517 and is actually smaller than the space reserved for it.
2518 For instance, in an array of variant records, the bit_size
2519 we're given is the array stride, which is constant and
2520 normally equal to the maximum size of its element.
2521 But, in reality, each element only actually spans a portion
2522 of that stride. */
2523 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2524 }
d0a9e810
JB
2525 }
2526
f93fca70
JB
2527 if (obj == NULL)
2528 {
2529 v = allocate_value (type);
bfb1c796 2530 src = valaddr + offset;
f93fca70
JB
2531 }
2532 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2533 {
0cafa88c 2534 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2535 gdb_byte *buf;
0cafa88c 2536
f93fca70 2537 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2538 buf = (gdb_byte *) alloca (src_len);
2539 read_memory (value_address (v), buf, src_len);
2540 src = buf;
f93fca70
JB
2541 }
2542 else
2543 {
2544 v = allocate_value (type);
bfb1c796 2545 src = value_contents (obj) + offset;
f93fca70
JB
2546 }
2547
2548 if (obj != NULL)
2549 {
2550 long new_offset = offset;
2551
2552 set_value_component_location (v, obj);
2553 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2554 set_value_bitsize (v, bit_size);
2555 if (value_bitpos (v) >= HOST_CHAR_BIT)
dda83cd7 2556 {
f93fca70 2557 ++new_offset;
dda83cd7
SM
2558 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2559 }
f93fca70
JB
2560 set_value_offset (v, new_offset);
2561
2562 /* Also set the parent value. This is needed when trying to
2563 assign a new value (in inferior memory). */
2564 set_value_parent (v, obj);
2565 }
2566 else
2567 set_value_bitsize (v, bit_size);
bfb1c796 2568 unpacked = value_contents_writeable (v);
f93fca70
JB
2569
2570 if (bit_size == 0)
2571 {
2572 memset (unpacked, 0, TYPE_LENGTH (type));
2573 return v;
2574 }
2575
d5722aa2 2576 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2577 {
d0a9e810
JB
2578 /* Small short-cut: If we've unpacked the data into a buffer
2579 of the same size as TYPE's length, then we can reuse that,
2580 instead of doing the unpacking again. */
d5722aa2 2581 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2582 }
d0a9e810
JB
2583 else
2584 ada_unpack_from_contents (src, bit_offset, bit_size,
2585 unpacked, TYPE_LENGTH (type),
2586 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2587
14f9c5c9
AS
2588 return v;
2589}
d2e4a39e 2590
14f9c5c9
AS
2591/* Store the contents of FROMVAL into the location of TOVAL.
2592 Return a new value with the location of TOVAL and contents of
2593 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2594 floating-point or non-scalar types. */
14f9c5c9 2595
d2e4a39e
AS
2596static struct value *
2597ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2598{
df407dfe
AC
2599 struct type *type = value_type (toval);
2600 int bits = value_bitsize (toval);
14f9c5c9 2601
52ce6436
PH
2602 toval = ada_coerce_ref (toval);
2603 fromval = ada_coerce_ref (fromval);
2604
2605 if (ada_is_direct_array_type (value_type (toval)))
2606 toval = ada_coerce_to_simple_array (toval);
2607 if (ada_is_direct_array_type (value_type (fromval)))
2608 fromval = ada_coerce_to_simple_array (fromval);
2609
88e3b34b 2610 if (!deprecated_value_modifiable (toval))
323e0a4a 2611 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2612
d2e4a39e 2613 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2614 && bits > 0
78134374 2615 && (type->code () == TYPE_CODE_FLT
dda83cd7 2616 || type->code () == TYPE_CODE_STRUCT))
14f9c5c9 2617 {
df407dfe
AC
2618 int len = (value_bitpos (toval)
2619 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2620 int from_size;
224c3ddb 2621 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2622 struct value *val;
42ae5230 2623 CORE_ADDR to_addr = value_address (toval);
14f9c5c9 2624
78134374 2625 if (type->code () == TYPE_CODE_FLT)
dda83cd7 2626 fromval = value_cast (type, fromval);
14f9c5c9 2627
52ce6436 2628 read_memory (to_addr, buffer, len);
aced2898
PH
2629 from_size = value_bitsize (fromval);
2630 if (from_size == 0)
2631 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4 2632
d5a22e77 2633 const int is_big_endian = type_byte_order (type) == BFD_ENDIAN_BIG;
d48e62f4
TT
2634 ULONGEST from_offset = 0;
2635 if (is_big_endian && is_scalar_type (value_type (fromval)))
2636 from_offset = from_size - bits;
2637 copy_bitwise (buffer, value_bitpos (toval),
2638 value_contents (fromval), from_offset,
2639 bits, is_big_endian);
972daa01 2640 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2641
14f9c5c9 2642 val = value_copy (toval);
0fd88904 2643 memcpy (value_contents_raw (val), value_contents (fromval),
dda83cd7 2644 TYPE_LENGTH (type));
04624583 2645 deprecated_set_value_type (val, type);
d2e4a39e 2646
14f9c5c9
AS
2647 return val;
2648 }
2649
2650 return value_assign (toval, fromval);
2651}
2652
2653
7c512744
JB
2654/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2655 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2656 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2657 COMPONENT, and not the inferior's memory. The current contents
2658 of COMPONENT are ignored.
2659
2660 Although not part of the initial design, this function also works
2661 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2662 had a null address, and COMPONENT had an address which is equal to
2663 its offset inside CONTAINER. */
2664
52ce6436
PH
2665static void
2666value_assign_to_component (struct value *container, struct value *component,
2667 struct value *val)
2668{
2669 LONGEST offset_in_container =
42ae5230 2670 (LONGEST) (value_address (component) - value_address (container));
7c512744 2671 int bit_offset_in_container =
52ce6436
PH
2672 value_bitpos (component) - value_bitpos (container);
2673 int bits;
7c512744 2674
52ce6436
PH
2675 val = value_cast (value_type (component), val);
2676
2677 if (value_bitsize (component) == 0)
2678 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2679 else
2680 bits = value_bitsize (component);
2681
d5a22e77 2682 if (type_byte_order (value_type (container)) == BFD_ENDIAN_BIG)
2a62dfa9
JB
2683 {
2684 int src_offset;
2685
2686 if (is_scalar_type (check_typedef (value_type (component))))
dda83cd7 2687 src_offset
2a62dfa9
JB
2688 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2689 else
2690 src_offset = 0;
a99bc3d2
JB
2691 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2692 value_bitpos (container) + bit_offset_in_container,
2693 value_contents (val), src_offset, bits, 1);
2a62dfa9 2694 }
52ce6436 2695 else
a99bc3d2
JB
2696 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2697 value_bitpos (container) + bit_offset_in_container,
2698 value_contents (val), 0, bits, 0);
7c512744
JB
2699}
2700
736ade86
XR
2701/* Determine if TYPE is an access to an unconstrained array. */
2702
d91e9ea8 2703bool
736ade86
XR
2704ada_is_access_to_unconstrained_array (struct type *type)
2705{
78134374 2706 return (type->code () == TYPE_CODE_TYPEDEF
736ade86
XR
2707 && is_thick_pntr (ada_typedef_target_type (type)));
2708}
2709
4c4b4cd2
PH
2710/* The value of the element of array ARR at the ARITY indices given in IND.
2711 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2712 thereto. */
2713
d2e4a39e
AS
2714struct value *
2715ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2716{
2717 int k;
d2e4a39e
AS
2718 struct value *elt;
2719 struct type *elt_type;
14f9c5c9
AS
2720
2721 elt = ada_coerce_to_simple_array (arr);
2722
df407dfe 2723 elt_type = ada_check_typedef (value_type (elt));
78134374 2724 if (elt_type->code () == TYPE_CODE_ARRAY
14f9c5c9
AS
2725 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2726 return value_subscript_packed (elt, arity, ind);
2727
2728 for (k = 0; k < arity; k += 1)
2729 {
b9c50e9a
XR
2730 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2731
78134374 2732 if (elt_type->code () != TYPE_CODE_ARRAY)
dda83cd7 2733 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2734
2497b498 2735 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2736
2737 if (ada_is_access_to_unconstrained_array (saved_elt_type)
78134374 2738 && value_type (elt)->code () != TYPE_CODE_TYPEDEF)
b9c50e9a
XR
2739 {
2740 /* The element is a typedef to an unconstrained array,
2741 except that the value_subscript call stripped the
2742 typedef layer. The typedef layer is GNAT's way to
2743 specify that the element is, at the source level, an
2744 access to the unconstrained array, rather than the
2745 unconstrained array. So, we need to restore that
2746 typedef layer, which we can do by forcing the element's
2747 type back to its original type. Otherwise, the returned
2748 value is going to be printed as the array, rather
2749 than as an access. Another symptom of the same issue
2750 would be that an expression trying to dereference the
2751 element would also be improperly rejected. */
2752 deprecated_set_value_type (elt, saved_elt_type);
2753 }
2754
2755 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2756 }
b9c50e9a 2757
14f9c5c9
AS
2758 return elt;
2759}
2760
deede10c
JB
2761/* Assuming ARR is a pointer to a GDB array, the value of the element
2762 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2763 Does not read the entire array into memory.
2764
2765 Note: Unlike what one would expect, this function is used instead of
2766 ada_value_subscript for basically all non-packed array types. The reason
2767 for this is that a side effect of doing our own pointer arithmetics instead
2768 of relying on value_subscript is that there is no implicit typedef peeling.
2769 This is important for arrays of array accesses, where it allows us to
2770 preserve the fact that the array's element is an array access, where the
2771 access part os encoded in a typedef layer. */
14f9c5c9 2772
2c0b251b 2773static struct value *
deede10c 2774ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2775{
2776 int k;
919e6dbe 2777 struct value *array_ind = ada_value_ind (arr);
deede10c 2778 struct type *type
919e6dbe
PMR
2779 = check_typedef (value_enclosing_type (array_ind));
2780
78134374 2781 if (type->code () == TYPE_CODE_ARRAY
919e6dbe
PMR
2782 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2783 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2784
2785 for (k = 0; k < arity; k += 1)
2786 {
2787 LONGEST lwb, upb;
14f9c5c9 2788
78134374 2789 if (type->code () != TYPE_CODE_ARRAY)
dda83cd7 2790 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2791 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
dda83cd7 2792 value_copy (arr));
3d967001 2793 get_discrete_bounds (type->index_type (), &lwb, &upb);
53a47a3e 2794 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2795 type = TYPE_TARGET_TYPE (type);
2796 }
2797
2798 return value_ind (arr);
2799}
2800
0b5d8877 2801/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2802 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2803 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2804 this array is LOW, as per Ada rules. */
0b5d8877 2805static struct value *
f5938064 2806ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
dda83cd7 2807 int low, int high)
0b5d8877 2808{
b0dd7688 2809 struct type *type0 = ada_check_typedef (type);
3d967001 2810 struct type *base_index_type = TYPE_TARGET_TYPE (type0->index_type ());
0c9c3474 2811 struct type *index_type
aa715135 2812 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2813 struct type *slice_type = create_array_type_with_stride
2814 (NULL, TYPE_TARGET_TYPE (type0), index_type,
24e99c6c 2815 type0->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2816 TYPE_FIELD_BITSIZE (type0, 0));
3d967001 2817 int base_low = ada_discrete_type_low_bound (type0->index_type ());
aa715135
JG
2818 LONGEST base_low_pos, low_pos;
2819 CORE_ADDR base;
2820
2821 if (!discrete_position (base_index_type, low, &low_pos)
2822 || !discrete_position (base_index_type, base_low, &base_low_pos))
2823 {
2824 warning (_("unable to get positions in slice, use bounds instead"));
2825 low_pos = low;
2826 base_low_pos = base_low;
2827 }
5b4ee69b 2828
7ff5b937
TT
2829 ULONGEST stride = TYPE_FIELD_BITSIZE (slice_type, 0) / 8;
2830 if (stride == 0)
2831 stride = TYPE_LENGTH (TYPE_TARGET_TYPE (type0));
2832
2833 base = value_as_address (array_ptr) + (low_pos - base_low_pos) * stride;
f5938064 2834 return value_at_lazy (slice_type, base);
0b5d8877
PH
2835}
2836
2837
2838static struct value *
2839ada_value_slice (struct value *array, int low, int high)
2840{
b0dd7688 2841 struct type *type = ada_check_typedef (value_type (array));
3d967001 2842 struct type *base_index_type = TYPE_TARGET_TYPE (type->index_type ());
0c9c3474 2843 struct type *index_type
3d967001 2844 = create_static_range_type (NULL, type->index_type (), low, high);
9fe561ab
JB
2845 struct type *slice_type = create_array_type_with_stride
2846 (NULL, TYPE_TARGET_TYPE (type), index_type,
24e99c6c 2847 type->dyn_prop (DYN_PROP_BYTE_STRIDE),
9fe561ab 2848 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2849 LONGEST low_pos, high_pos;
5b4ee69b 2850
aa715135
JG
2851 if (!discrete_position (base_index_type, low, &low_pos)
2852 || !discrete_position (base_index_type, high, &high_pos))
2853 {
2854 warning (_("unable to get positions in slice, use bounds instead"));
2855 low_pos = low;
2856 high_pos = high;
2857 }
2858
2859 return value_cast (slice_type,
2860 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2861}
2862
14f9c5c9
AS
2863/* If type is a record type in the form of a standard GNAT array
2864 descriptor, returns the number of dimensions for type. If arr is a
2865 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2866 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2867
2868int
d2e4a39e 2869ada_array_arity (struct type *type)
14f9c5c9
AS
2870{
2871 int arity;
2872
2873 if (type == NULL)
2874 return 0;
2875
2876 type = desc_base_type (type);
2877
2878 arity = 0;
78134374 2879 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9 2880 return desc_arity (desc_bounds_type (type));
d2e4a39e 2881 else
78134374 2882 while (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2883 {
dda83cd7
SM
2884 arity += 1;
2885 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2886 }
d2e4a39e 2887
14f9c5c9
AS
2888 return arity;
2889}
2890
2891/* If TYPE is a record type in the form of a standard GNAT array
2892 descriptor or a simple array type, returns the element type for
2893 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2894 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2895
d2e4a39e
AS
2896struct type *
2897ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2898{
2899 type = desc_base_type (type);
2900
78134374 2901 if (type->code () == TYPE_CODE_STRUCT)
14f9c5c9
AS
2902 {
2903 int k;
d2e4a39e 2904 struct type *p_array_type;
14f9c5c9 2905
556bdfd4 2906 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2907
2908 k = ada_array_arity (type);
2909 if (k == 0)
dda83cd7 2910 return NULL;
d2e4a39e 2911
4c4b4cd2 2912 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2913 if (nindices >= 0 && k > nindices)
dda83cd7 2914 k = nindices;
d2e4a39e 2915 while (k > 0 && p_array_type != NULL)
dda83cd7
SM
2916 {
2917 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
2918 k -= 1;
2919 }
14f9c5c9
AS
2920 return p_array_type;
2921 }
78134374 2922 else if (type->code () == TYPE_CODE_ARRAY)
14f9c5c9 2923 {
78134374 2924 while (nindices != 0 && type->code () == TYPE_CODE_ARRAY)
dda83cd7
SM
2925 {
2926 type = TYPE_TARGET_TYPE (type);
2927 nindices -= 1;
2928 }
14f9c5c9
AS
2929 return type;
2930 }
2931
2932 return NULL;
2933}
2934
4c4b4cd2 2935/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2936 Does not examine memory. Throws an error if N is invalid or TYPE
2937 is not an array type. NAME is the name of the Ada attribute being
2938 evaluated ('range, 'first, 'last, or 'length); it is used in building
2939 the error message. */
14f9c5c9 2940
1eea4ebd
UW
2941static struct type *
2942ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2943{
4c4b4cd2
PH
2944 struct type *result_type;
2945
14f9c5c9
AS
2946 type = desc_base_type (type);
2947
1eea4ebd
UW
2948 if (n < 0 || n > ada_array_arity (type))
2949 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2950
4c4b4cd2 2951 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2952 {
2953 int i;
2954
2955 for (i = 1; i < n; i += 1)
dda83cd7 2956 type = TYPE_TARGET_TYPE (type);
3d967001 2957 result_type = TYPE_TARGET_TYPE (type->index_type ());
4c4b4cd2 2958 /* FIXME: The stabs type r(0,0);bound;bound in an array type
dda83cd7
SM
2959 has a target type of TYPE_CODE_UNDEF. We compensate here, but
2960 perhaps stabsread.c would make more sense. */
78134374 2961 if (result_type && result_type->code () == TYPE_CODE_UNDEF)
dda83cd7 2962 result_type = NULL;
14f9c5c9 2963 }
d2e4a39e 2964 else
1eea4ebd
UW
2965 {
2966 result_type = desc_index_type (desc_bounds_type (type), n);
2967 if (result_type == NULL)
2968 error (_("attempt to take bound of something that is not an array"));
2969 }
2970
2971 return result_type;
14f9c5c9
AS
2972}
2973
2974/* Given that arr is an array type, returns the lower bound of the
2975 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2976 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2977 array-descriptor type. It works for other arrays with bounds supplied
2978 by run-time quantities other than discriminants. */
14f9c5c9 2979
abb68b3e 2980static LONGEST
fb5e3d5c 2981ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2982{
8a48ac95 2983 struct type *type, *index_type_desc, *index_type;
1ce677a4 2984 int i;
262452ec
JK
2985
2986 gdb_assert (which == 0 || which == 1);
14f9c5c9 2987
ad82864c
JB
2988 if (ada_is_constrained_packed_array_type (arr_type))
2989 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2990
4c4b4cd2 2991 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2992 return (LONGEST) - which;
14f9c5c9 2993
78134374 2994 if (arr_type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
2995 type = TYPE_TARGET_TYPE (arr_type);
2996 else
2997 type = arr_type;
2998
22c4c60c 2999 if (type->is_fixed_instance ())
bafffb51
JB
3000 {
3001 /* The array has already been fixed, so we do not need to
3002 check the parallel ___XA type again. That encoding has
3003 already been applied, so ignore it now. */
3004 index_type_desc = NULL;
3005 }
3006 else
3007 {
3008 index_type_desc = ada_find_parallel_type (type, "___XA");
3009 ada_fixup_array_indexes_type (index_type_desc);
3010 }
3011
262452ec 3012 if (index_type_desc != NULL)
940da03e 3013 index_type = to_fixed_range_type (index_type_desc->field (n - 1).type (),
28c85d6c 3014 NULL);
262452ec 3015 else
8a48ac95
JB
3016 {
3017 struct type *elt_type = check_typedef (type);
3018
3019 for (i = 1; i < n; i++)
3020 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3021
3d967001 3022 index_type = elt_type->index_type ();
8a48ac95 3023 }
262452ec 3024
43bbcdc2
PH
3025 return
3026 (LONGEST) (which == 0
dda83cd7
SM
3027 ? ada_discrete_type_low_bound (index_type)
3028 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3029}
3030
3031/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3032 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3033 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3034 supplied by run-time quantities other than discriminants. */
14f9c5c9 3035
1eea4ebd 3036static LONGEST
4dc81987 3037ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3038{
eb479039
JB
3039 struct type *arr_type;
3040
78134374 3041 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3042 arr = value_ind (arr);
3043 arr_type = value_enclosing_type (arr);
14f9c5c9 3044
ad82864c
JB
3045 if (ada_is_constrained_packed_array_type (arr_type))
3046 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3047 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3048 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3049 else
1eea4ebd 3050 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3051}
3052
3053/* Given that arr is an array value, returns the length of the
3054 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3055 supplied by run-time quantities other than discriminants.
3056 Does not work for arrays indexed by enumeration types with representation
3057 clauses at the moment. */
14f9c5c9 3058
1eea4ebd 3059static LONGEST
d2e4a39e 3060ada_array_length (struct value *arr, int n)
14f9c5c9 3061{
aa715135
JG
3062 struct type *arr_type, *index_type;
3063 int low, high;
eb479039 3064
78134374 3065 if (check_typedef (value_type (arr))->code () == TYPE_CODE_PTR)
eb479039
JB
3066 arr = value_ind (arr);
3067 arr_type = value_enclosing_type (arr);
14f9c5c9 3068
ad82864c
JB
3069 if (ada_is_constrained_packed_array_type (arr_type))
3070 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3071
4c4b4cd2 3072 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3073 {
3074 low = ada_array_bound_from_type (arr_type, n, 0);
3075 high = ada_array_bound_from_type (arr_type, n, 1);
3076 }
14f9c5c9 3077 else
aa715135
JG
3078 {
3079 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3080 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3081 }
3082
f168693b 3083 arr_type = check_typedef (arr_type);
7150d33c 3084 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3085 if (index_type != NULL)
3086 {
3087 struct type *base_type;
78134374 3088 if (index_type->code () == TYPE_CODE_RANGE)
aa715135
JG
3089 base_type = TYPE_TARGET_TYPE (index_type);
3090 else
3091 base_type = index_type;
3092
3093 low = pos_atr (value_from_longest (base_type, low));
3094 high = pos_atr (value_from_longest (base_type, high));
3095 }
3096 return high - low + 1;
4c4b4cd2
PH
3097}
3098
bff8c71f
TT
3099/* An array whose type is that of ARR_TYPE (an array type), with
3100 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3101 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3102
3103static struct value *
bff8c71f 3104empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3105{
b0dd7688 3106 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3107 struct type *index_type
3108 = create_static_range_type
dda83cd7 3109 (NULL, TYPE_TARGET_TYPE (arr_type0->index_type ()), low,
bff8c71f 3110 high < low ? low - 1 : high);
b0dd7688 3111 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3112
0b5d8877 3113 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3114}
14f9c5c9 3115\f
d2e4a39e 3116
dda83cd7 3117 /* Name resolution */
14f9c5c9 3118
4c4b4cd2
PH
3119/* The "decoded" name for the user-definable Ada operator corresponding
3120 to OP. */
14f9c5c9 3121
d2e4a39e 3122static const char *
4c4b4cd2 3123ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3124{
3125 int i;
3126
4c4b4cd2 3127 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3128 {
3129 if (ada_opname_table[i].op == op)
dda83cd7 3130 return ada_opname_table[i].decoded;
14f9c5c9 3131 }
323e0a4a 3132 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3133}
3134
de93309a
SM
3135/* Returns true (non-zero) iff decoded name N0 should appear before N1
3136 in a listing of choices during disambiguation (see sort_choices, below).
3137 The idea is that overloadings of a subprogram name from the
3138 same package should sort in their source order. We settle for ordering
3139 such symbols by their trailing number (__N or $N). */
14f9c5c9 3140
de93309a
SM
3141static int
3142encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9 3143{
de93309a
SM
3144 if (N1 == NULL)
3145 return 0;
3146 else if (N0 == NULL)
3147 return 1;
3148 else
3149 {
3150 int k0, k1;
30b15541 3151
de93309a 3152 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
dda83cd7 3153 ;
de93309a 3154 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
dda83cd7 3155 ;
de93309a 3156 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
dda83cd7
SM
3157 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3158 {
3159 int n0, n1;
3160
3161 n0 = k0;
3162 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3163 n0 -= 1;
3164 n1 = k1;
3165 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3166 n1 -= 1;
3167 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3168 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3169 }
de93309a
SM
3170 return (strcmp (N0, N1) < 0);
3171 }
14f9c5c9
AS
3172}
3173
de93309a
SM
3174/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3175 encoded names. */
14f9c5c9 3176
de93309a
SM
3177static void
3178sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3179{
14f9c5c9 3180 int i;
14f9c5c9 3181
de93309a 3182 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3183 {
de93309a
SM
3184 struct block_symbol sym = syms[i];
3185 int j;
3186
3187 for (j = i - 1; j >= 0; j -= 1)
dda83cd7
SM
3188 {
3189 if (encoded_ordered_before (syms[j].symbol->linkage_name (),
3190 sym.symbol->linkage_name ()))
3191 break;
3192 syms[j + 1] = syms[j];
3193 }
de93309a
SM
3194 syms[j + 1] = sym;
3195 }
3196}
14f9c5c9 3197
de93309a
SM
3198/* Whether GDB should display formals and return types for functions in the
3199 overloads selection menu. */
3200static bool print_signatures = true;
4c4b4cd2 3201
de93309a
SM
3202/* Print the signature for SYM on STREAM according to the FLAGS options. For
3203 all but functions, the signature is just the name of the symbol. For
3204 functions, this is the name of the function, the list of types for formals
3205 and the return type (if any). */
4c4b4cd2 3206
de93309a
SM
3207static void
3208ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3209 const struct type_print_options *flags)
3210{
3211 struct type *type = SYMBOL_TYPE (sym);
14f9c5c9 3212
987012b8 3213 fprintf_filtered (stream, "%s", sym->print_name ());
de93309a
SM
3214 if (!print_signatures
3215 || type == NULL
78134374 3216 || type->code () != TYPE_CODE_FUNC)
de93309a 3217 return;
4c4b4cd2 3218
1f704f76 3219 if (type->num_fields () > 0)
de93309a
SM
3220 {
3221 int i;
14f9c5c9 3222
de93309a 3223 fprintf_filtered (stream, " (");
1f704f76 3224 for (i = 0; i < type->num_fields (); ++i)
de93309a
SM
3225 {
3226 if (i > 0)
3227 fprintf_filtered (stream, "; ");
940da03e 3228 ada_print_type (type->field (i).type (), NULL, stream, -1, 0,
de93309a
SM
3229 flags);
3230 }
3231 fprintf_filtered (stream, ")");
3232 }
3233 if (TYPE_TARGET_TYPE (type) != NULL
78134374 3234 && TYPE_TARGET_TYPE (type)->code () != TYPE_CODE_VOID)
de93309a
SM
3235 {
3236 fprintf_filtered (stream, " return ");
3237 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3238 }
3239}
14f9c5c9 3240
de93309a
SM
3241/* Read and validate a set of numeric choices from the user in the
3242 range 0 .. N_CHOICES-1. Place the results in increasing
3243 order in CHOICES[0 .. N-1], and return N.
14f9c5c9 3244
de93309a
SM
3245 The user types choices as a sequence of numbers on one line
3246 separated by blanks, encoding them as follows:
14f9c5c9 3247
de93309a
SM
3248 + A choice of 0 means to cancel the selection, throwing an error.
3249 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3250 + The user chooses k by typing k+IS_ALL_CHOICE+1.
14f9c5c9 3251
de93309a 3252 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9 3253
de93309a
SM
3254 ANNOTATION_SUFFIX, if present, is used to annotate the input
3255 prompts (for use with the -f switch). */
14f9c5c9 3256
de93309a
SM
3257static int
3258get_selections (int *choices, int n_choices, int max_results,
dda83cd7 3259 int is_all_choice, const char *annotation_suffix)
de93309a 3260{
992a7040 3261 const char *args;
de93309a
SM
3262 const char *prompt;
3263 int n_chosen;
3264 int first_choice = is_all_choice ? 2 : 1;
14f9c5c9 3265
de93309a
SM
3266 prompt = getenv ("PS2");
3267 if (prompt == NULL)
3268 prompt = "> ";
4c4b4cd2 3269
de93309a 3270 args = command_line_input (prompt, annotation_suffix);
4c4b4cd2 3271
de93309a
SM
3272 if (args == NULL)
3273 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3274
de93309a 3275 n_chosen = 0;
4c4b4cd2 3276
de93309a
SM
3277 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3278 order, as given in args. Choices are validated. */
3279 while (1)
14f9c5c9 3280 {
de93309a
SM
3281 char *args2;
3282 int choice, j;
76a01679 3283
de93309a
SM
3284 args = skip_spaces (args);
3285 if (*args == '\0' && n_chosen == 0)
dda83cd7 3286 error_no_arg (_("one or more choice numbers"));
de93309a 3287 else if (*args == '\0')
dda83cd7 3288 break;
76a01679 3289
de93309a
SM
3290 choice = strtol (args, &args2, 10);
3291 if (args == args2 || choice < 0
dda83cd7
SM
3292 || choice > n_choices + first_choice - 1)
3293 error (_("Argument must be choice number"));
de93309a 3294 args = args2;
76a01679 3295
de93309a 3296 if (choice == 0)
dda83cd7 3297 error (_("cancelled"));
76a01679 3298
de93309a 3299 if (choice < first_choice)
dda83cd7
SM
3300 {
3301 n_chosen = n_choices;
3302 for (j = 0; j < n_choices; j += 1)
3303 choices[j] = j;
3304 break;
3305 }
de93309a 3306 choice -= first_choice;
76a01679 3307
de93309a 3308 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
dda83cd7
SM
3309 {
3310 }
4c4b4cd2 3311
de93309a 3312 if (j < 0 || choice != choices[j])
dda83cd7
SM
3313 {
3314 int k;
4c4b4cd2 3315
dda83cd7
SM
3316 for (k = n_chosen - 1; k > j; k -= 1)
3317 choices[k + 1] = choices[k];
3318 choices[j + 1] = choice;
3319 n_chosen += 1;
3320 }
14f9c5c9
AS
3321 }
3322
de93309a
SM
3323 if (n_chosen > max_results)
3324 error (_("Select no more than %d of the above"), max_results);
3325
3326 return n_chosen;
14f9c5c9
AS
3327}
3328
de93309a
SM
3329/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3330 by asking the user (if necessary), returning the number selected,
3331 and setting the first elements of SYMS items. Error if no symbols
3332 selected. */
3333
3334/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
3335 to be re-integrated one of these days. */
14f9c5c9
AS
3336
3337static int
de93309a 3338user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9 3339{
de93309a
SM
3340 int i;
3341 int *chosen = XALLOCAVEC (int , nsyms);
3342 int n_chosen;
3343 int first_choice = (max_results == 1) ? 1 : 2;
3344 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9 3345
de93309a
SM
3346 if (max_results < 1)
3347 error (_("Request to select 0 symbols!"));
3348 if (nsyms <= 1)
3349 return nsyms;
14f9c5c9 3350
de93309a
SM
3351 if (select_mode == multiple_symbols_cancel)
3352 error (_("\
3353canceled because the command is ambiguous\n\
3354See set/show multiple-symbol."));
14f9c5c9 3355
de93309a
SM
3356 /* If select_mode is "all", then return all possible symbols.
3357 Only do that if more than one symbol can be selected, of course.
3358 Otherwise, display the menu as usual. */
3359 if (select_mode == multiple_symbols_all && max_results > 1)
3360 return nsyms;
14f9c5c9 3361
de93309a
SM
3362 printf_filtered (_("[0] cancel\n"));
3363 if (max_results > 1)
3364 printf_filtered (_("[1] all\n"));
14f9c5c9 3365
de93309a 3366 sort_choices (syms, nsyms);
14f9c5c9 3367
de93309a
SM
3368 for (i = 0; i < nsyms; i += 1)
3369 {
3370 if (syms[i].symbol == NULL)
dda83cd7 3371 continue;
14f9c5c9 3372
de93309a 3373 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
dda83cd7
SM
3374 {
3375 struct symtab_and_line sal =
3376 find_function_start_sal (syms[i].symbol, 1);
14f9c5c9 3377
de93309a
SM
3378 printf_filtered ("[%d] ", i + first_choice);
3379 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3380 &type_print_raw_options);
3381 if (sal.symtab == NULL)
3382 printf_filtered (_(" at %p[<no source file available>%p]:%d\n"),
3383 metadata_style.style ().ptr (), nullptr, sal.line);
3384 else
3385 printf_filtered
3386 (_(" at %ps:%d\n"),
3387 styled_string (file_name_style.style (),
3388 symtab_to_filename_for_display (sal.symtab)),
3389 sal.line);
dda83cd7
SM
3390 continue;
3391 }
76a01679 3392 else
dda83cd7
SM
3393 {
3394 int is_enumeral =
3395 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3396 && SYMBOL_TYPE (syms[i].symbol) != NULL
3397 && SYMBOL_TYPE (syms[i].symbol)->code () == TYPE_CODE_ENUM);
de93309a 3398 struct symtab *symtab = NULL;
4c4b4cd2 3399
de93309a
SM
3400 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3401 symtab = symbol_symtab (syms[i].symbol);
3402
dda83cd7 3403 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
de93309a
SM
3404 {
3405 printf_filtered ("[%d] ", i + first_choice);
3406 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3407 &type_print_raw_options);
3408 printf_filtered (_(" at %s:%d\n"),
3409 symtab_to_filename_for_display (symtab),
3410 SYMBOL_LINE (syms[i].symbol));
3411 }
dda83cd7
SM
3412 else if (is_enumeral
3413 && SYMBOL_TYPE (syms[i].symbol)->name () != NULL)
3414 {
3415 printf_filtered (("[%d] "), i + first_choice);
3416 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
3417 gdb_stdout, -1, 0, &type_print_raw_options);
3418 printf_filtered (_("'(%s) (enumeral)\n"),
987012b8 3419 syms[i].symbol->print_name ());
dda83cd7 3420 }
de93309a
SM
3421 else
3422 {
3423 printf_filtered ("[%d] ", i + first_choice);
3424 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3425 &type_print_raw_options);
3426
3427 if (symtab != NULL)
3428 printf_filtered (is_enumeral
3429 ? _(" in %s (enumeral)\n")
3430 : _(" at %s:?\n"),
3431 symtab_to_filename_for_display (symtab));
3432 else
3433 printf_filtered (is_enumeral
3434 ? _(" (enumeral)\n")
3435 : _(" at ?\n"));
3436 }
dda83cd7 3437 }
14f9c5c9 3438 }
14f9c5c9 3439
de93309a 3440 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
dda83cd7 3441 "overload-choice");
14f9c5c9 3442
de93309a
SM
3443 for (i = 0; i < n_chosen; i += 1)
3444 syms[i] = syms[chosen[i]];
14f9c5c9 3445
de93309a
SM
3446 return n_chosen;
3447}
14f9c5c9 3448
de93309a
SM
3449/* Resolve the operator of the subexpression beginning at
3450 position *POS of *EXPP. "Resolving" consists of replacing
3451 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3452 with their resolutions, replacing built-in operators with
3453 function calls to user-defined operators, where appropriate, and,
3454 when DEPROCEDURE_P is non-zero, converting function-valued variables
3455 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3456 are as in ada_resolve, above. */
14f9c5c9 3457
de93309a
SM
3458static struct value *
3459resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
dda83cd7 3460 struct type *context_type, int parse_completion,
de93309a 3461 innermost_block_tracker *tracker)
14f9c5c9 3462{
de93309a
SM
3463 int pc = *pos;
3464 int i;
3465 struct expression *exp; /* Convenience: == *expp. */
3466 enum exp_opcode op = (*expp)->elts[pc].opcode;
3467 struct value **argvec; /* Vector of operand types (alloca'ed). */
3468 int nargs; /* Number of operands. */
3469 int oplen;
14f9c5c9 3470
de93309a
SM
3471 argvec = NULL;
3472 nargs = 0;
3473 exp = expp->get ();
4c4b4cd2 3474
de93309a
SM
3475 /* Pass one: resolve operands, saving their types and updating *pos,
3476 if needed. */
3477 switch (op)
3478 {
3479 case OP_FUNCALL:
3480 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
dda83cd7
SM
3481 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3482 *pos += 7;
de93309a 3483 else
dda83cd7
SM
3484 {
3485 *pos += 3;
3486 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3487 }
de93309a
SM
3488 nargs = longest_to_int (exp->elts[pc + 1].longconst);
3489 break;
14f9c5c9 3490
de93309a
SM
3491 case UNOP_ADDR:
3492 *pos += 1;
3493 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3494 break;
3495
3496 case UNOP_QUAL:
3497 *pos += 3;
3498 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
3499 parse_completion, tracker);
3500 break;
3501
3502 case OP_ATR_MODULUS:
3503 case OP_ATR_SIZE:
3504 case OP_ATR_TAG:
3505 case OP_ATR_FIRST:
3506 case OP_ATR_LAST:
3507 case OP_ATR_LENGTH:
3508 case OP_ATR_POS:
3509 case OP_ATR_VAL:
3510 case OP_ATR_MIN:
3511 case OP_ATR_MAX:
3512 case TERNOP_IN_RANGE:
3513 case BINOP_IN_BOUNDS:
3514 case UNOP_IN_RANGE:
3515 case OP_AGGREGATE:
3516 case OP_OTHERS:
3517 case OP_CHOICES:
3518 case OP_POSITIONAL:
3519 case OP_DISCRETE_RANGE:
3520 case OP_NAME:
3521 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3522 *pos += oplen;
3523 break;
3524
3525 case BINOP_ASSIGN:
3526 {
dda83cd7
SM
3527 struct value *arg1;
3528
3529 *pos += 1;
3530 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
3531 if (arg1 == NULL)
3532 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
3533 else
3534 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
de93309a 3535 tracker);
dda83cd7 3536 break;
de93309a
SM
3537 }
3538
3539 case UNOP_CAST:
3540 *pos += 3;
3541 nargs = 1;
3542 break;
3543
3544 case BINOP_ADD:
3545 case BINOP_SUB:
3546 case BINOP_MUL:
3547 case BINOP_DIV:
3548 case BINOP_REM:
3549 case BINOP_MOD:
3550 case BINOP_EXP:
3551 case BINOP_CONCAT:
3552 case BINOP_LOGICAL_AND:
3553 case BINOP_LOGICAL_OR:
3554 case BINOP_BITWISE_AND:
3555 case BINOP_BITWISE_IOR:
3556 case BINOP_BITWISE_XOR:
3557
3558 case BINOP_EQUAL:
3559 case BINOP_NOTEQUAL:
3560 case BINOP_LESS:
3561 case BINOP_GTR:
3562 case BINOP_LEQ:
3563 case BINOP_GEQ:
3564
3565 case BINOP_REPEAT:
3566 case BINOP_SUBSCRIPT:
3567 case BINOP_COMMA:
3568 *pos += 1;
3569 nargs = 2;
3570 break;
3571
3572 case UNOP_NEG:
3573 case UNOP_PLUS:
3574 case UNOP_LOGICAL_NOT:
3575 case UNOP_ABS:
3576 case UNOP_IND:
3577 *pos += 1;
3578 nargs = 1;
3579 break;
3580
3581 case OP_LONG:
3582 case OP_FLOAT:
3583 case OP_VAR_VALUE:
3584 case OP_VAR_MSYM_VALUE:
3585 *pos += 4;
3586 break;
3587
3588 case OP_TYPE:
3589 case OP_BOOL:
3590 case OP_LAST:
3591 case OP_INTERNALVAR:
3592 *pos += 3;
3593 break;
3594
3595 case UNOP_MEMVAL:
3596 *pos += 3;
3597 nargs = 1;
3598 break;
3599
3600 case OP_REGISTER:
3601 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3602 break;
3603
3604 case STRUCTOP_STRUCT:
3605 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3606 nargs = 1;
3607 break;
3608
3609 case TERNOP_SLICE:
3610 *pos += 1;
3611 nargs = 3;
3612 break;
3613
3614 case OP_STRING:
3615 break;
3616
3617 default:
3618 error (_("Unexpected operator during name resolution"));
14f9c5c9 3619 }
14f9c5c9 3620
de93309a
SM
3621 argvec = XALLOCAVEC (struct value *, nargs + 1);
3622 for (i = 0; i < nargs; i += 1)
3623 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3624 tracker);
3625 argvec[i] = NULL;
3626 exp = expp->get ();
4c4b4cd2 3627
de93309a
SM
3628 /* Pass two: perform any resolution on principal operator. */
3629 switch (op)
14f9c5c9 3630 {
de93309a
SM
3631 default:
3632 break;
5b4ee69b 3633
de93309a
SM
3634 case OP_VAR_VALUE:
3635 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
dda83cd7
SM
3636 {
3637 std::vector<struct block_symbol> candidates;
3638 int n_candidates;
3639
3640 n_candidates =
3641 ada_lookup_symbol_list (exp->elts[pc + 2].symbol->linkage_name (),
3642 exp->elts[pc + 1].block, VAR_DOMAIN,
3643 &candidates);
3644
3645 if (n_candidates > 1)
3646 {
3647 /* Types tend to get re-introduced locally, so if there
3648 are any local symbols that are not types, first filter
3649 out all types. */
3650 int j;
3651 for (j = 0; j < n_candidates; j += 1)
3652 switch (SYMBOL_CLASS (candidates[j].symbol))
3653 {
3654 case LOC_REGISTER:
3655 case LOC_ARG:
3656 case LOC_REF_ARG:
3657 case LOC_REGPARM_ADDR:
3658 case LOC_LOCAL:
3659 case LOC_COMPUTED:
3660 goto FoundNonType;
3661 default:
3662 break;
3663 }
3664 FoundNonType:
3665 if (j < n_candidates)
3666 {
3667 j = 0;
3668 while (j < n_candidates)
3669 {
3670 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
3671 {
3672 candidates[j] = candidates[n_candidates - 1];
3673 n_candidates -= 1;
3674 }
3675 else
3676 j += 1;
3677 }
3678 }
3679 }
3680
3681 if (n_candidates == 0)
3682 error (_("No definition found for %s"),
3683 exp->elts[pc + 2].symbol->print_name ());
3684 else if (n_candidates == 1)
3685 i = 0;
3686 else if (deprocedure_p
3687 && !is_nonfunction (candidates.data (), n_candidates))
3688 {
3689 i = ada_resolve_function
3690 (candidates.data (), n_candidates, NULL, 0,
3691 exp->elts[pc + 2].symbol->linkage_name (),
3692 context_type, parse_completion);
3693 if (i < 0)
3694 error (_("Could not find a match for %s"),
3695 exp->elts[pc + 2].symbol->print_name ());
3696 }
3697 else
3698 {
3699 printf_filtered (_("Multiple matches for %s\n"),
3700 exp->elts[pc + 2].symbol->print_name ());
3701 user_select_syms (candidates.data (), n_candidates, 1);
3702 i = 0;
3703 }
3704
3705 exp->elts[pc + 1].block = candidates[i].block;
3706 exp->elts[pc + 2].symbol = candidates[i].symbol;
de93309a 3707 tracker->update (candidates[i]);
dda83cd7 3708 }
14f9c5c9 3709
de93309a 3710 if (deprocedure_p
dda83cd7
SM
3711 && (SYMBOL_TYPE (exp->elts[pc + 2].symbol)->code ()
3712 == TYPE_CODE_FUNC))
3713 {
3714 replace_operator_with_call (expp, pc, 0, 4,
3715 exp->elts[pc + 2].symbol,
3716 exp->elts[pc + 1].block);
3717 exp = expp->get ();
3718 }
de93309a
SM
3719 break;
3720
3721 case OP_FUNCALL:
3722 {
dda83cd7
SM
3723 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
3724 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3725 {
de93309a 3726 std::vector<struct block_symbol> candidates;
dda83cd7
SM
3727 int n_candidates;
3728
3729 n_candidates =
3730 ada_lookup_symbol_list (exp->elts[pc + 5].symbol->linkage_name (),
3731 exp->elts[pc + 4].block, VAR_DOMAIN,
3732 &candidates);
3733
3734 if (n_candidates == 1)
3735 i = 0;
3736 else
3737 {
3738 i = ada_resolve_function
3739 (candidates.data (), n_candidates,
3740 argvec, nargs,
3741 exp->elts[pc + 5].symbol->linkage_name (),
3742 context_type, parse_completion);
3743 if (i < 0)
3744 error (_("Could not find a match for %s"),
3745 exp->elts[pc + 5].symbol->print_name ());
3746 }
3747
3748 exp->elts[pc + 4].block = candidates[i].block;
3749 exp->elts[pc + 5].symbol = candidates[i].symbol;
de93309a 3750 tracker->update (candidates[i]);
dda83cd7 3751 }
de93309a
SM
3752 }
3753 break;
3754 case BINOP_ADD:
3755 case BINOP_SUB:
3756 case BINOP_MUL:
3757 case BINOP_DIV:
3758 case BINOP_REM:
3759 case BINOP_MOD:
3760 case BINOP_CONCAT:
3761 case BINOP_BITWISE_AND:
3762 case BINOP_BITWISE_IOR:
3763 case BINOP_BITWISE_XOR:
3764 case BINOP_EQUAL:
3765 case BINOP_NOTEQUAL:
3766 case BINOP_LESS:
3767 case BINOP_GTR:
3768 case BINOP_LEQ:
3769 case BINOP_GEQ:
3770 case BINOP_EXP:
3771 case UNOP_NEG:
3772 case UNOP_PLUS:
3773 case UNOP_LOGICAL_NOT:
3774 case UNOP_ABS:
3775 if (possible_user_operator_p (op, argvec))
dda83cd7 3776 {
de93309a 3777 std::vector<struct block_symbol> candidates;
dda83cd7 3778 int n_candidates;
d72413e6 3779
dda83cd7
SM
3780 n_candidates =
3781 ada_lookup_symbol_list (ada_decoded_op_name (op),
de93309a 3782 NULL, VAR_DOMAIN,
dda83cd7 3783 &candidates);
d72413e6 3784
dda83cd7 3785 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
de93309a
SM
3786 nargs, ada_decoded_op_name (op), NULL,
3787 parse_completion);
dda83cd7
SM
3788 if (i < 0)
3789 break;
d72413e6 3790
de93309a
SM
3791 replace_operator_with_call (expp, pc, nargs, 1,
3792 candidates[i].symbol,
3793 candidates[i].block);
dda83cd7
SM
3794 exp = expp->get ();
3795 }
de93309a 3796 break;
d72413e6 3797
de93309a
SM
3798 case OP_TYPE:
3799 case OP_REGISTER:
3800 return NULL;
d72413e6 3801 }
d72413e6 3802
de93309a
SM
3803 *pos = pc;
3804 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3805 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3806 exp->elts[pc + 1].objfile,
3807 exp->elts[pc + 2].msymbol);
3808 else
3809 return evaluate_subexp_type (exp, pos);
3810}
14f9c5c9 3811
de93309a
SM
3812/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
3813 MAY_DEREF is non-zero, the formal may be a pointer and the actual
3814 a non-pointer. */
3815/* The term "match" here is rather loose. The match is heuristic and
3816 liberal. */
14f9c5c9 3817
de93309a
SM
3818static int
3819ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3820{
de93309a
SM
3821 ftype = ada_check_typedef (ftype);
3822 atype = ada_check_typedef (atype);
14f9c5c9 3823
78134374 3824 if (ftype->code () == TYPE_CODE_REF)
de93309a 3825 ftype = TYPE_TARGET_TYPE (ftype);
78134374 3826 if (atype->code () == TYPE_CODE_REF)
de93309a 3827 atype = TYPE_TARGET_TYPE (atype);
14f9c5c9 3828
78134374 3829 switch (ftype->code ())
14f9c5c9 3830 {
de93309a 3831 default:
78134374 3832 return ftype->code () == atype->code ();
de93309a 3833 case TYPE_CODE_PTR:
78134374 3834 if (atype->code () == TYPE_CODE_PTR)
dda83cd7
SM
3835 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3836 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3837 else
dda83cd7
SM
3838 return (may_deref
3839 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
de93309a
SM
3840 case TYPE_CODE_INT:
3841 case TYPE_CODE_ENUM:
3842 case TYPE_CODE_RANGE:
78134374 3843 switch (atype->code ())
dda83cd7
SM
3844 {
3845 case TYPE_CODE_INT:
3846 case TYPE_CODE_ENUM:
3847 case TYPE_CODE_RANGE:
3848 return 1;
3849 default:
3850 return 0;
3851 }
d2e4a39e 3852
de93309a 3853 case TYPE_CODE_ARRAY:
78134374 3854 return (atype->code () == TYPE_CODE_ARRAY
dda83cd7 3855 || ada_is_array_descriptor_type (atype));
14f9c5c9 3856
de93309a
SM
3857 case TYPE_CODE_STRUCT:
3858 if (ada_is_array_descriptor_type (ftype))
dda83cd7
SM
3859 return (atype->code () == TYPE_CODE_ARRAY
3860 || ada_is_array_descriptor_type (atype));
de93309a 3861 else
dda83cd7
SM
3862 return (atype->code () == TYPE_CODE_STRUCT
3863 && !ada_is_array_descriptor_type (atype));
14f9c5c9 3864
de93309a
SM
3865 case TYPE_CODE_UNION:
3866 case TYPE_CODE_FLT:
78134374 3867 return (atype->code () == ftype->code ());
de93309a 3868 }
14f9c5c9
AS
3869}
3870
de93309a
SM
3871/* Return non-zero if the formals of FUNC "sufficiently match" the
3872 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3873 may also be an enumeral, in which case it is treated as a 0-
3874 argument function. */
14f9c5c9 3875
de93309a
SM
3876static int
3877ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
3878{
3879 int i;
3880 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3881
de93309a 3882 if (SYMBOL_CLASS (func) == LOC_CONST
78134374 3883 && func_type->code () == TYPE_CODE_ENUM)
de93309a 3884 return (n_actuals == 0);
78134374 3885 else if (func_type == NULL || func_type->code () != TYPE_CODE_FUNC)
de93309a 3886 return 0;
14f9c5c9 3887
1f704f76 3888 if (func_type->num_fields () != n_actuals)
de93309a 3889 return 0;
14f9c5c9 3890
de93309a
SM
3891 for (i = 0; i < n_actuals; i += 1)
3892 {
3893 if (actuals[i] == NULL)
dda83cd7 3894 return 0;
de93309a 3895 else
dda83cd7
SM
3896 {
3897 struct type *ftype = ada_check_typedef (func_type->field (i).type ());
3898 struct type *atype = ada_check_typedef (value_type (actuals[i]));
14f9c5c9 3899
dda83cd7
SM
3900 if (!ada_type_match (ftype, atype, 1))
3901 return 0;
3902 }
de93309a
SM
3903 }
3904 return 1;
3905}
d2e4a39e 3906
de93309a
SM
3907/* False iff function type FUNC_TYPE definitely does not produce a value
3908 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3909 FUNC_TYPE is not a valid function type with a non-null return type
3910 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
14f9c5c9 3911
de93309a
SM
3912static int
3913return_match (struct type *func_type, struct type *context_type)
3914{
3915 struct type *return_type;
d2e4a39e 3916
de93309a
SM
3917 if (func_type == NULL)
3918 return 1;
14f9c5c9 3919
78134374 3920 if (func_type->code () == TYPE_CODE_FUNC)
de93309a
SM
3921 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
3922 else
3923 return_type = get_base_type (func_type);
3924 if (return_type == NULL)
3925 return 1;
76a01679 3926
de93309a 3927 context_type = get_base_type (context_type);
14f9c5c9 3928
78134374 3929 if (return_type->code () == TYPE_CODE_ENUM)
de93309a
SM
3930 return context_type == NULL || return_type == context_type;
3931 else if (context_type == NULL)
78134374 3932 return return_type->code () != TYPE_CODE_VOID;
de93309a 3933 else
78134374 3934 return return_type->code () == context_type->code ();
de93309a 3935}
14f9c5c9 3936
14f9c5c9 3937
de93309a
SM
3938/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
3939 function (if any) that matches the types of the NARGS arguments in
3940 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3941 that returns that type, then eliminate matches that don't. If
3942 CONTEXT_TYPE is void and there is at least one match that does not
3943 return void, eliminate all matches that do.
14f9c5c9 3944
de93309a
SM
3945 Asks the user if there is more than one match remaining. Returns -1
3946 if there is no such symbol or none is selected. NAME is used
3947 solely for messages. May re-arrange and modify SYMS in
3948 the process; the index returned is for the modified vector. */
14f9c5c9 3949
de93309a
SM
3950static int
3951ada_resolve_function (struct block_symbol syms[],
dda83cd7
SM
3952 int nsyms, struct value **args, int nargs,
3953 const char *name, struct type *context_type,
de93309a
SM
3954 int parse_completion)
3955{
3956 int fallback;
3957 int k;
3958 int m; /* Number of hits */
14f9c5c9 3959
de93309a
SM
3960 m = 0;
3961 /* In the first pass of the loop, we only accept functions matching
3962 context_type. If none are found, we add a second pass of the loop
3963 where every function is accepted. */
3964 for (fallback = 0; m == 0 && fallback < 2; fallback++)
3965 {
3966 for (k = 0; k < nsyms; k += 1)
dda83cd7
SM
3967 {
3968 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
5b4ee69b 3969
dda83cd7
SM
3970 if (ada_args_match (syms[k].symbol, args, nargs)
3971 && (fallback || return_match (type, context_type)))
3972 {
3973 syms[m] = syms[k];
3974 m += 1;
3975 }
3976 }
14f9c5c9
AS
3977 }
3978
de93309a
SM
3979 /* If we got multiple matches, ask the user which one to use. Don't do this
3980 interactive thing during completion, though, as the purpose of the
3981 completion is providing a list of all possible matches. Prompting the
3982 user to filter it down would be completely unexpected in this case. */
3983 if (m == 0)
3984 return -1;
3985 else if (m > 1 && !parse_completion)
3986 {
3987 printf_filtered (_("Multiple matches for %s\n"), name);
3988 user_select_syms (syms, m, 1);
3989 return 0;
3990 }
3991 return 0;
14f9c5c9
AS
3992}
3993
4c4b4cd2
PH
3994/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3995 on the function identified by SYM and BLOCK, and taking NARGS
3996 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3997
3998static void
e9d9f57e 3999replace_operator_with_call (expression_up *expp, int pc, int nargs,
dda83cd7
SM
4000 int oplen, struct symbol *sym,
4001 const struct block *block)
14f9c5c9 4002{
00158a68
TT
4003 /* We want to add 6 more elements (3 for funcall, 4 for function
4004 symbol, -OPLEN for operator being replaced) to the
4005 expression. */
e9d9f57e 4006 struct expression *exp = expp->get ();
00158a68 4007 int save_nelts = exp->nelts;
f51f9f1d
TV
4008 int extra_elts = 7 - oplen;
4009 exp->nelts += extra_elts;
14f9c5c9 4010
f51f9f1d
TV
4011 if (extra_elts > 0)
4012 exp->resize (exp->nelts);
00158a68
TT
4013 memmove (exp->elts + pc + 7, exp->elts + pc + oplen,
4014 EXP_ELEM_TO_BYTES (save_nelts - pc - oplen));
f51f9f1d
TV
4015 if (extra_elts < 0)
4016 exp->resize (exp->nelts);
14f9c5c9 4017
00158a68
TT
4018 exp->elts[pc].opcode = exp->elts[pc + 2].opcode = OP_FUNCALL;
4019 exp->elts[pc + 1].longconst = (LONGEST) nargs;
14f9c5c9 4020
00158a68
TT
4021 exp->elts[pc + 3].opcode = exp->elts[pc + 6].opcode = OP_VAR_VALUE;
4022 exp->elts[pc + 4].block = block;
4023 exp->elts[pc + 5].symbol = sym;
d2e4a39e 4024}
14f9c5c9
AS
4025
4026/* Type-class predicates */
4027
4c4b4cd2
PH
4028/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4029 or FLOAT). */
14f9c5c9
AS
4030
4031static int
d2e4a39e 4032numeric_type_p (struct type *type)
14f9c5c9
AS
4033{
4034 if (type == NULL)
4035 return 0;
d2e4a39e
AS
4036 else
4037 {
78134374 4038 switch (type->code ())
dda83cd7
SM
4039 {
4040 case TYPE_CODE_INT:
4041 case TYPE_CODE_FLT:
4042 return 1;
4043 case TYPE_CODE_RANGE:
4044 return (type == TYPE_TARGET_TYPE (type)
4045 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4046 default:
4047 return 0;
4048 }
d2e4a39e 4049 }
14f9c5c9
AS
4050}
4051
4c4b4cd2 4052/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4053
4054static int
d2e4a39e 4055integer_type_p (struct type *type)
14f9c5c9
AS
4056{
4057 if (type == NULL)
4058 return 0;
d2e4a39e
AS
4059 else
4060 {
78134374 4061 switch (type->code ())
dda83cd7
SM
4062 {
4063 case TYPE_CODE_INT:
4064 return 1;
4065 case TYPE_CODE_RANGE:
4066 return (type == TYPE_TARGET_TYPE (type)
4067 || integer_type_p (TYPE_TARGET_TYPE (type)));
4068 default:
4069 return 0;
4070 }
d2e4a39e 4071 }
14f9c5c9
AS
4072}
4073
4c4b4cd2 4074/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4075
4076static int
d2e4a39e 4077scalar_type_p (struct type *type)
14f9c5c9
AS
4078{
4079 if (type == NULL)
4080 return 0;
d2e4a39e
AS
4081 else
4082 {
78134374 4083 switch (type->code ())
dda83cd7
SM
4084 {
4085 case TYPE_CODE_INT:
4086 case TYPE_CODE_RANGE:
4087 case TYPE_CODE_ENUM:
4088 case TYPE_CODE_FLT:
4089 return 1;
4090 default:
4091 return 0;
4092 }
d2e4a39e 4093 }
14f9c5c9
AS
4094}
4095
4c4b4cd2 4096/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4097
4098static int
d2e4a39e 4099discrete_type_p (struct type *type)
14f9c5c9
AS
4100{
4101 if (type == NULL)
4102 return 0;
d2e4a39e
AS
4103 else
4104 {
78134374 4105 switch (type->code ())
dda83cd7
SM
4106 {
4107 case TYPE_CODE_INT:
4108 case TYPE_CODE_RANGE:
4109 case TYPE_CODE_ENUM:
4110 case TYPE_CODE_BOOL:
4111 return 1;
4112 default:
4113 return 0;
4114 }
d2e4a39e 4115 }
14f9c5c9
AS
4116}
4117
4c4b4cd2
PH
4118/* Returns non-zero if OP with operands in the vector ARGS could be
4119 a user-defined function. Errs on the side of pre-defined operators
4120 (i.e., result 0). */
14f9c5c9
AS
4121
4122static int
d2e4a39e 4123possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4124{
76a01679 4125 struct type *type0 =
df407dfe 4126 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4127 struct type *type1 =
df407dfe 4128 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4129
4c4b4cd2
PH
4130 if (type0 == NULL)
4131 return 0;
4132
14f9c5c9
AS
4133 switch (op)
4134 {
4135 default:
4136 return 0;
4137
4138 case BINOP_ADD:
4139 case BINOP_SUB:
4140 case BINOP_MUL:
4141 case BINOP_DIV:
d2e4a39e 4142 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4143
4144 case BINOP_REM:
4145 case BINOP_MOD:
4146 case BINOP_BITWISE_AND:
4147 case BINOP_BITWISE_IOR:
4148 case BINOP_BITWISE_XOR:
d2e4a39e 4149 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4150
4151 case BINOP_EQUAL:
4152 case BINOP_NOTEQUAL:
4153 case BINOP_LESS:
4154 case BINOP_GTR:
4155 case BINOP_LEQ:
4156 case BINOP_GEQ:
d2e4a39e 4157 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4158
4159 case BINOP_CONCAT:
ee90b9ab 4160 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4161
4162 case BINOP_EXP:
d2e4a39e 4163 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4164
4165 case UNOP_NEG:
4166 case UNOP_PLUS:
4167 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4168 case UNOP_ABS:
4169 return (!numeric_type_p (type0));
14f9c5c9
AS
4170
4171 }
4172}
4173\f
dda83cd7 4174 /* Renaming */
14f9c5c9 4175
aeb5907d
JB
4176/* NOTES:
4177
4178 1. In the following, we assume that a renaming type's name may
4179 have an ___XD suffix. It would be nice if this went away at some
4180 point.
4181 2. We handle both the (old) purely type-based representation of
4182 renamings and the (new) variable-based encoding. At some point,
4183 it is devoutly to be hoped that the former goes away
4184 (FIXME: hilfinger-2007-07-09).
4185 3. Subprogram renamings are not implemented, although the XRS
4186 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4187
4188/* If SYM encodes a renaming,
4189
4190 <renaming> renames <renamed entity>,
4191
4192 sets *LEN to the length of the renamed entity's name,
4193 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4194 the string describing the subcomponent selected from the renamed
0963b4bd 4195 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4196 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4197 are undefined). Otherwise, returns a value indicating the category
4198 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4199 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4200 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4201 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4202 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4203 may be NULL, in which case they are not assigned.
4204
4205 [Currently, however, GCC does not generate subprogram renamings.] */
4206
4207enum ada_renaming_category
4208ada_parse_renaming (struct symbol *sym,
4209 const char **renamed_entity, int *len,
4210 const char **renaming_expr)
4211{
4212 enum ada_renaming_category kind;
4213 const char *info;
4214 const char *suffix;
4215
4216 if (sym == NULL)
4217 return ADA_NOT_RENAMING;
4218 switch (SYMBOL_CLASS (sym))
14f9c5c9 4219 {
aeb5907d
JB
4220 default:
4221 return ADA_NOT_RENAMING;
aeb5907d
JB
4222 case LOC_LOCAL:
4223 case LOC_STATIC:
4224 case LOC_COMPUTED:
4225 case LOC_OPTIMIZED_OUT:
987012b8 4226 info = strstr (sym->linkage_name (), "___XR");
aeb5907d
JB
4227 if (info == NULL)
4228 return ADA_NOT_RENAMING;
4229 switch (info[5])
4230 {
4231 case '_':
4232 kind = ADA_OBJECT_RENAMING;
4233 info += 6;
4234 break;
4235 case 'E':
4236 kind = ADA_EXCEPTION_RENAMING;
4237 info += 7;
4238 break;
4239 case 'P':
4240 kind = ADA_PACKAGE_RENAMING;
4241 info += 7;
4242 break;
4243 case 'S':
4244 kind = ADA_SUBPROGRAM_RENAMING;
4245 info += 7;
4246 break;
4247 default:
4248 return ADA_NOT_RENAMING;
4249 }
14f9c5c9 4250 }
4c4b4cd2 4251
de93309a
SM
4252 if (renamed_entity != NULL)
4253 *renamed_entity = info;
4254 suffix = strstr (info, "___XE");
4255 if (suffix == NULL || suffix == info)
4256 return ADA_NOT_RENAMING;
4257 if (len != NULL)
4258 *len = strlen (info) - strlen (suffix);
4259 suffix += 5;
4260 if (renaming_expr != NULL)
4261 *renaming_expr = suffix;
4262 return kind;
4263}
4264
4265/* Compute the value of the given RENAMING_SYM, which is expected to
4266 be a symbol encoding a renaming expression. BLOCK is the block
4267 used to evaluate the renaming. */
4268
4269static struct value *
4270ada_read_renaming_var_value (struct symbol *renaming_sym,
4271 const struct block *block)
4272{
4273 const char *sym_name;
4274
987012b8 4275 sym_name = renaming_sym->linkage_name ();
de93309a
SM
4276 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4277 return evaluate_expression (expr.get ());
4278}
4279\f
4280
dda83cd7 4281 /* Evaluation: Function Calls */
de93309a
SM
4282
4283/* Return an lvalue containing the value VAL. This is the identity on
4284 lvalues, and otherwise has the side-effect of allocating memory
4285 in the inferior where a copy of the value contents is copied. */
4286
4287static struct value *
4288ensure_lval (struct value *val)
4289{
4290 if (VALUE_LVAL (val) == not_lval
4291 || VALUE_LVAL (val) == lval_internalvar)
4292 {
4293 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
4294 const CORE_ADDR addr =
dda83cd7 4295 value_as_long (value_allocate_space_in_inferior (len));
de93309a
SM
4296
4297 VALUE_LVAL (val) = lval_memory;
4298 set_value_address (val, addr);
4299 write_memory (addr, value_contents (val), len);
4300 }
4301
4302 return val;
4303}
4304
4305/* Given ARG, a value of type (pointer or reference to a)*
4306 structure/union, extract the component named NAME from the ultimate
4307 target structure/union and return it as a value with its
4308 appropriate type.
4309
4310 The routine searches for NAME among all members of the structure itself
4311 and (recursively) among all members of any wrapper members
4312 (e.g., '_parent').
4313
4314 If NO_ERR, then simply return NULL in case of error, rather than
4315 calling error. */
4316
4317static struct value *
4318ada_value_struct_elt (struct value *arg, const char *name, int no_err)
4319{
4320 struct type *t, *t1;
4321 struct value *v;
4322 int check_tag;
4323
4324 v = NULL;
4325 t1 = t = ada_check_typedef (value_type (arg));
78134374 4326 if (t->code () == TYPE_CODE_REF)
de93309a
SM
4327 {
4328 t1 = TYPE_TARGET_TYPE (t);
4329 if (t1 == NULL)
4330 goto BadValue;
4331 t1 = ada_check_typedef (t1);
78134374 4332 if (t1->code () == TYPE_CODE_PTR)
dda83cd7
SM
4333 {
4334 arg = coerce_ref (arg);
4335 t = t1;
4336 }
de93309a
SM
4337 }
4338
78134374 4339 while (t->code () == TYPE_CODE_PTR)
de93309a
SM
4340 {
4341 t1 = TYPE_TARGET_TYPE (t);
4342 if (t1 == NULL)
4343 goto BadValue;
4344 t1 = ada_check_typedef (t1);
78134374 4345 if (t1->code () == TYPE_CODE_PTR)
dda83cd7
SM
4346 {
4347 arg = value_ind (arg);
4348 t = t1;
4349 }
de93309a 4350 else
dda83cd7 4351 break;
de93309a 4352 }
aeb5907d 4353
78134374 4354 if (t1->code () != TYPE_CODE_STRUCT && t1->code () != TYPE_CODE_UNION)
de93309a 4355 goto BadValue;
52ce6436 4356
de93309a
SM
4357 if (t1 == t)
4358 v = ada_search_struct_field (name, arg, 0, t);
4359 else
4360 {
4361 int bit_offset, bit_size, byte_offset;
4362 struct type *field_type;
4363 CORE_ADDR address;
a5ee536b 4364
78134374 4365 if (t->code () == TYPE_CODE_PTR)
de93309a
SM
4366 address = value_address (ada_value_ind (arg));
4367 else
4368 address = value_address (ada_coerce_ref (arg));
d2e4a39e 4369
de93309a 4370 /* Check to see if this is a tagged type. We also need to handle
dda83cd7
SM
4371 the case where the type is a reference to a tagged type, but
4372 we have to be careful to exclude pointers to tagged types.
4373 The latter should be shown as usual (as a pointer), whereas
4374 a reference should mostly be transparent to the user. */
14f9c5c9 4375
de93309a 4376 if (ada_is_tagged_type (t1, 0)
dda83cd7
SM
4377 || (t1->code () == TYPE_CODE_REF
4378 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
4379 {
4380 /* We first try to find the searched field in the current type.
de93309a 4381 If not found then let's look in the fixed type. */
14f9c5c9 4382
dda83cd7
SM
4383 if (!find_struct_field (name, t1, 0,
4384 &field_type, &byte_offset, &bit_offset,
4385 &bit_size, NULL))
de93309a
SM
4386 check_tag = 1;
4387 else
4388 check_tag = 0;
dda83cd7 4389 }
de93309a
SM
4390 else
4391 check_tag = 0;
c3e5cd34 4392
de93309a
SM
4393 /* Convert to fixed type in all cases, so that we have proper
4394 offsets to each field in unconstrained record types. */
4395 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
4396 address, NULL, check_tag);
4397
24aa1b02
TT
4398 /* Resolve the dynamic type as well. */
4399 arg = value_from_contents_and_address (t1, nullptr, address);
4400 t1 = value_type (arg);
4401
de93309a 4402 if (find_struct_field (name, t1, 0,
dda83cd7
SM
4403 &field_type, &byte_offset, &bit_offset,
4404 &bit_size, NULL))
4405 {
4406 if (bit_size != 0)
4407 {
4408 if (t->code () == TYPE_CODE_REF)
4409 arg = ada_coerce_ref (arg);
4410 else
4411 arg = ada_value_ind (arg);
4412 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
4413 bit_offset, bit_size,
4414 field_type);
4415 }
4416 else
4417 v = value_at_lazy (field_type, address + byte_offset);
4418 }
c3e5cd34 4419 }
14f9c5c9 4420
de93309a
SM
4421 if (v != NULL || no_err)
4422 return v;
4423 else
4424 error (_("There is no member named %s."), name);
4425
4426 BadValue:
4427 if (no_err)
4428 return NULL;
4429 else
4430 error (_("Attempt to extract a component of "
4431 "a value that is not a record."));
14f9c5c9
AS
4432}
4433
4434/* Return the value ACTUAL, converted to be an appropriate value for a
4435 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4436 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4437 values not residing in memory, updating it as needed. */
14f9c5c9 4438
a93c0eb6 4439struct value *
40bc484c 4440ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4441{
df407dfe 4442 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4443 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e 4444 struct type *formal_target =
78134374 4445 formal_type->code () == TYPE_CODE_PTR
61ee279c 4446 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e 4447 struct type *actual_target =
78134374 4448 actual_type->code () == TYPE_CODE_PTR
61ee279c 4449 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4450
4c4b4cd2 4451 if (ada_is_array_descriptor_type (formal_target)
78134374 4452 && actual_target->code () == TYPE_CODE_ARRAY)
40bc484c 4453 return make_array_descriptor (formal_type, actual);
78134374
SM
4454 else if (formal_type->code () == TYPE_CODE_PTR
4455 || formal_type->code () == TYPE_CODE_REF)
14f9c5c9 4456 {
a84a8a0d 4457 struct value *result;
5b4ee69b 4458
78134374 4459 if (formal_target->code () == TYPE_CODE_ARRAY
dda83cd7 4460 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4461 result = desc_data (actual);
78134374 4462 else if (formal_type->code () != TYPE_CODE_PTR)
dda83cd7
SM
4463 {
4464 if (VALUE_LVAL (actual) != lval_memory)
4465 {
4466 struct value *val;
4467
4468 actual_type = ada_check_typedef (value_type (actual));
4469 val = allocate_value (actual_type);
4470 memcpy ((char *) value_contents_raw (val),
4471 (char *) value_contents (actual),
4472 TYPE_LENGTH (actual_type));
4473 actual = ensure_lval (val);
4474 }
4475 result = value_addr (actual);
4476 }
a84a8a0d
JB
4477 else
4478 return actual;
b1af9e97 4479 return value_cast_pointers (formal_type, result, 0);
14f9c5c9 4480 }
78134374 4481 else if (actual_type->code () == TYPE_CODE_PTR)
14f9c5c9 4482 return ada_value_ind (actual);
8344af1e
JB
4483 else if (ada_is_aligner_type (formal_type))
4484 {
4485 /* We need to turn this parameter into an aligner type
4486 as well. */
4487 struct value *aligner = allocate_value (formal_type);
4488 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4489
4490 value_assign_to_component (aligner, component, actual);
4491 return aligner;
4492 }
14f9c5c9
AS
4493
4494 return actual;
4495}
4496
438c98a1
JB
4497/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4498 type TYPE. This is usually an inefficient no-op except on some targets
4499 (such as AVR) where the representation of a pointer and an address
4500 differs. */
4501
4502static CORE_ADDR
4503value_pointer (struct value *value, struct type *type)
4504{
4505 struct gdbarch *gdbarch = get_type_arch (type);
4506 unsigned len = TYPE_LENGTH (type);
224c3ddb 4507 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4508 CORE_ADDR addr;
4509
4510 addr = value_address (value);
4511 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
34877895 4512 addr = extract_unsigned_integer (buf, len, type_byte_order (type));
438c98a1
JB
4513 return addr;
4514}
4515
14f9c5c9 4516
4c4b4cd2
PH
4517/* Push a descriptor of type TYPE for array value ARR on the stack at
4518 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4519 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4520 to-descriptor type rather than a descriptor type), a struct value *
4521 representing a pointer to this descriptor. */
14f9c5c9 4522
d2e4a39e 4523static struct value *
40bc484c 4524make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4525{
d2e4a39e
AS
4526 struct type *bounds_type = desc_bounds_type (type);
4527 struct type *desc_type = desc_base_type (type);
4528 struct value *descriptor = allocate_value (desc_type);
4529 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4530 int i;
d2e4a39e 4531
0963b4bd
MS
4532 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4533 i > 0; i -= 1)
14f9c5c9 4534 {
19f220c3
JK
4535 modify_field (value_type (bounds), value_contents_writeable (bounds),
4536 ada_array_bound (arr, i, 0),
4537 desc_bound_bitpos (bounds_type, i, 0),
4538 desc_bound_bitsize (bounds_type, i, 0));
4539 modify_field (value_type (bounds), value_contents_writeable (bounds),
4540 ada_array_bound (arr, i, 1),
4541 desc_bound_bitpos (bounds_type, i, 1),
4542 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4543 }
d2e4a39e 4544
40bc484c 4545 bounds = ensure_lval (bounds);
d2e4a39e 4546
19f220c3
JK
4547 modify_field (value_type (descriptor),
4548 value_contents_writeable (descriptor),
4549 value_pointer (ensure_lval (arr),
940da03e 4550 desc_type->field (0).type ()),
19f220c3
JK
4551 fat_pntr_data_bitpos (desc_type),
4552 fat_pntr_data_bitsize (desc_type));
4553
4554 modify_field (value_type (descriptor),
4555 value_contents_writeable (descriptor),
4556 value_pointer (bounds,
940da03e 4557 desc_type->field (1).type ()),
19f220c3
JK
4558 fat_pntr_bounds_bitpos (desc_type),
4559 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4560
40bc484c 4561 descriptor = ensure_lval (descriptor);
14f9c5c9 4562
78134374 4563 if (type->code () == TYPE_CODE_PTR)
14f9c5c9
AS
4564 return value_addr (descriptor);
4565 else
4566 return descriptor;
4567}
14f9c5c9 4568\f
dda83cd7 4569 /* Symbol Cache Module */
3d9434b5 4570
3d9434b5 4571/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4572 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4573 on the type of entity being printed, the cache can make it as much
4574 as an order of magnitude faster than without it.
4575
4576 The descriptive type DWARF extension has significantly reduced
4577 the need for this cache, at least when DWARF is being used. However,
4578 even in this case, some expensive name-based symbol searches are still
4579 sometimes necessary - to find an XVZ variable, mostly. */
4580
ee01b665 4581/* Initialize the contents of SYM_CACHE. */
3d9434b5 4582
ee01b665
JB
4583static void
4584ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4585{
4586 obstack_init (&sym_cache->cache_space);
4587 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4588}
3d9434b5 4589
ee01b665
JB
4590/* Free the memory used by SYM_CACHE. */
4591
4592static void
4593ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4594{
ee01b665
JB
4595 obstack_free (&sym_cache->cache_space, NULL);
4596 xfree (sym_cache);
4597}
3d9434b5 4598
ee01b665
JB
4599/* Return the symbol cache associated to the given program space PSPACE.
4600 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4601
ee01b665
JB
4602static struct ada_symbol_cache *
4603ada_get_symbol_cache (struct program_space *pspace)
4604{
4605 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4606
66c168ae 4607 if (pspace_data->sym_cache == NULL)
ee01b665 4608 {
66c168ae
JB
4609 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4610 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4611 }
4612
66c168ae 4613 return pspace_data->sym_cache;
ee01b665 4614}
3d9434b5
JB
4615
4616/* Clear all entries from the symbol cache. */
4617
4618static void
4619ada_clear_symbol_cache (void)
4620{
ee01b665
JB
4621 struct ada_symbol_cache *sym_cache
4622 = ada_get_symbol_cache (current_program_space);
4623
4624 obstack_free (&sym_cache->cache_space, NULL);
4625 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4626}
4627
fe978cb0 4628/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4629 Return it if found, or NULL otherwise. */
4630
4631static struct cache_entry **
fe978cb0 4632find_entry (const char *name, domain_enum domain)
3d9434b5 4633{
ee01b665
JB
4634 struct ada_symbol_cache *sym_cache
4635 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4636 int h = msymbol_hash (name) % HASH_SIZE;
4637 struct cache_entry **e;
4638
ee01b665 4639 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4640 {
fe978cb0 4641 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
dda83cd7 4642 return e;
3d9434b5
JB
4643 }
4644 return NULL;
4645}
4646
fe978cb0 4647/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4648 Return 1 if found, 0 otherwise.
4649
4650 If an entry was found and SYM is not NULL, set *SYM to the entry's
4651 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4652
96d887e8 4653static int
fe978cb0 4654lookup_cached_symbol (const char *name, domain_enum domain,
dda83cd7 4655 struct symbol **sym, const struct block **block)
96d887e8 4656{
fe978cb0 4657 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4658
4659 if (e == NULL)
4660 return 0;
4661 if (sym != NULL)
4662 *sym = (*e)->sym;
4663 if (block != NULL)
4664 *block = (*e)->block;
4665 return 1;
96d887e8
PH
4666}
4667
3d9434b5 4668/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4669 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4670
96d887e8 4671static void
fe978cb0 4672cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
dda83cd7 4673 const struct block *block)
96d887e8 4674{
ee01b665
JB
4675 struct ada_symbol_cache *sym_cache
4676 = ada_get_symbol_cache (current_program_space);
3d9434b5 4677 int h;
3d9434b5
JB
4678 struct cache_entry *e;
4679
1994afbf
DE
4680 /* Symbols for builtin types don't have a block.
4681 For now don't cache such symbols. */
4682 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4683 return;
4684
3d9434b5
JB
4685 /* If the symbol is a local symbol, then do not cache it, as a search
4686 for that symbol depends on the context. To determine whether
4687 the symbol is local or not, we check the block where we found it
4688 against the global and static blocks of its associated symtab. */
4689 if (sym
08be3fe3 4690 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4691 GLOBAL_BLOCK) != block
08be3fe3 4692 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4693 STATIC_BLOCK) != block)
3d9434b5
JB
4694 return;
4695
4696 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4697 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4698 e->next = sym_cache->root[h];
4699 sym_cache->root[h] = e;
2ef5453b 4700 e->name = obstack_strdup (&sym_cache->cache_space, name);
3d9434b5 4701 e->sym = sym;
fe978cb0 4702 e->domain = domain;
3d9434b5 4703 e->block = block;
96d887e8 4704}
4c4b4cd2 4705\f
dda83cd7 4706 /* Symbol Lookup */
4c4b4cd2 4707
b5ec771e
PA
4708/* Return the symbol name match type that should be used used when
4709 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4710
4711 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4712 for Ada lookups. */
c0431670 4713
b5ec771e
PA
4714static symbol_name_match_type
4715name_match_type_from_name (const char *lookup_name)
c0431670 4716{
b5ec771e
PA
4717 return (strstr (lookup_name, "__") == NULL
4718 ? symbol_name_match_type::WILD
4719 : symbol_name_match_type::FULL);
c0431670
JB
4720}
4721
4c4b4cd2
PH
4722/* Return the result of a standard (literal, C-like) lookup of NAME in
4723 given DOMAIN, visible from lexical block BLOCK. */
4724
4725static struct symbol *
4726standard_lookup (const char *name, const struct block *block,
dda83cd7 4727 domain_enum domain)
4c4b4cd2 4728{
acbd605d 4729 /* Initialize it just to avoid a GCC false warning. */
6640a367 4730 struct block_symbol sym = {};
4c4b4cd2 4731
d12307c1
PMR
4732 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4733 return sym.symbol;
a2cd4f14 4734 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4735 cache_symbol (name, domain, sym.symbol, sym.block);
4736 return sym.symbol;
4c4b4cd2
PH
4737}
4738
4739
4740/* Non-zero iff there is at least one non-function/non-enumeral symbol
4741 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4742 since they contend in overloading in the same way. */
4743static int
d12307c1 4744is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4745{
4746 int i;
4747
4748 for (i = 0; i < n; i += 1)
78134374 4749 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_FUNC
dda83cd7
SM
4750 && (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM
4751 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4752 return 1;
4753
4754 return 0;
4755}
4756
4757/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4758 struct types. Otherwise, they may not. */
14f9c5c9
AS
4759
4760static int
d2e4a39e 4761equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4762{
d2e4a39e 4763 if (type0 == type1)
14f9c5c9 4764 return 1;
d2e4a39e 4765 if (type0 == NULL || type1 == NULL
78134374 4766 || type0->code () != type1->code ())
14f9c5c9 4767 return 0;
78134374
SM
4768 if ((type0->code () == TYPE_CODE_STRUCT
4769 || type0->code () == TYPE_CODE_ENUM)
14f9c5c9 4770 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4771 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4772 return 1;
d2e4a39e 4773
14f9c5c9
AS
4774 return 0;
4775}
4776
4777/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4778 no more defined than that of SYM1. */
14f9c5c9
AS
4779
4780static int
d2e4a39e 4781lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4782{
4783 if (sym0 == sym1)
4784 return 1;
176620f1 4785 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4786 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4787 return 0;
4788
d2e4a39e 4789 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4790 {
4791 case LOC_UNDEF:
4792 return 1;
4793 case LOC_TYPEDEF:
4794 {
dda83cd7
SM
4795 struct type *type0 = SYMBOL_TYPE (sym0);
4796 struct type *type1 = SYMBOL_TYPE (sym1);
4797 const char *name0 = sym0->linkage_name ();
4798 const char *name1 = sym1->linkage_name ();
4799 int len0 = strlen (name0);
4800
4801 return
4802 type0->code () == type1->code ()
4803 && (equiv_types (type0, type1)
4804 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
4805 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4806 }
4807 case LOC_CONST:
4808 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
dda83cd7 4809 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
4b610737
TT
4810
4811 case LOC_STATIC:
4812 {
dda83cd7
SM
4813 const char *name0 = sym0->linkage_name ();
4814 const char *name1 = sym1->linkage_name ();
4815 return (strcmp (name0, name1) == 0
4816 && SYMBOL_VALUE_ADDRESS (sym0) == SYMBOL_VALUE_ADDRESS (sym1));
4b610737
TT
4817 }
4818
d2e4a39e
AS
4819 default:
4820 return 0;
14f9c5c9
AS
4821 }
4822}
4823
d12307c1 4824/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4825 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4826
4827static void
76a01679 4828add_defn_to_vec (struct obstack *obstackp,
dda83cd7
SM
4829 struct symbol *sym,
4830 const struct block *block)
14f9c5c9
AS
4831{
4832 int i;
d12307c1 4833 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4834
529cad9c
PH
4835 /* Do not try to complete stub types, as the debugger is probably
4836 already scanning all symbols matching a certain name at the
4837 time when this function is called. Trying to replace the stub
4838 type by its associated full type will cause us to restart a scan
4839 which may lead to an infinite recursion. Instead, the client
4840 collecting the matching symbols will end up collecting several
4841 matches, with at least one of them complete. It can then filter
4842 out the stub ones if needed. */
4843
4c4b4cd2
PH
4844 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4845 {
d12307c1 4846 if (lesseq_defined_than (sym, prevDefns[i].symbol))
dda83cd7 4847 return;
d12307c1 4848 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
dda83cd7
SM
4849 {
4850 prevDefns[i].symbol = sym;
4851 prevDefns[i].block = block;
4852 return;
4853 }
4c4b4cd2
PH
4854 }
4855
4856 {
d12307c1 4857 struct block_symbol info;
4c4b4cd2 4858
d12307c1 4859 info.symbol = sym;
4c4b4cd2 4860 info.block = block;
d12307c1 4861 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4862 }
4863}
4864
d12307c1
PMR
4865/* Number of block_symbol structures currently collected in current vector in
4866 OBSTACKP. */
4c4b4cd2 4867
76a01679
JB
4868static int
4869num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4870{
d12307c1 4871 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4872}
4873
d12307c1
PMR
4874/* Vector of block_symbol structures currently collected in current vector in
4875 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4876
d12307c1 4877static struct block_symbol *
4c4b4cd2
PH
4878defns_collected (struct obstack *obstackp, int finish)
4879{
4880 if (finish)
224c3ddb 4881 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4882 else
d12307c1 4883 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4884}
4885
7c7b6655
TT
4886/* Return a bound minimal symbol matching NAME according to Ada
4887 decoding rules. Returns an invalid symbol if there is no such
4888 minimal symbol. Names prefixed with "standard__" are handled
4889 specially: "standard__" is first stripped off, and only static and
4890 global symbols are searched. */
4c4b4cd2 4891
7c7b6655 4892struct bound_minimal_symbol
96d887e8 4893ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4894{
7c7b6655 4895 struct bound_minimal_symbol result;
4c4b4cd2 4896
7c7b6655
TT
4897 memset (&result, 0, sizeof (result));
4898
b5ec771e
PA
4899 symbol_name_match_type match_type = name_match_type_from_name (name);
4900 lookup_name_info lookup_name (name, match_type);
4901
4902 symbol_name_matcher_ftype *match_name
4903 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4904
2030c079 4905 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4906 {
7932255d 4907 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf 4908 {
c9d95fa3 4909 if (match_name (msymbol->linkage_name (), lookup_name, NULL)
5325b9bf
TT
4910 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4911 {
4912 result.minsym = msymbol;
4913 result.objfile = objfile;
4914 break;
4915 }
4916 }
4917 }
4c4b4cd2 4918
7c7b6655 4919 return result;
96d887e8 4920}
4c4b4cd2 4921
96d887e8
PH
4922/* For all subprograms that statically enclose the subprogram of the
4923 selected frame, add symbols matching identifier NAME in DOMAIN
4924 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4925 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4926 with a wildcard prefix. */
4c4b4cd2 4927
96d887e8
PH
4928static void
4929add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4930 const lookup_name_info &lookup_name,
4931 domain_enum domain)
96d887e8 4932{
96d887e8 4933}
14f9c5c9 4934
96d887e8
PH
4935/* True if TYPE is definitely an artificial type supplied to a symbol
4936 for which no debugging information was given in the symbol file. */
14f9c5c9 4937
96d887e8
PH
4938static int
4939is_nondebugging_type (struct type *type)
4940{
0d5cff50 4941 const char *name = ada_type_name (type);
5b4ee69b 4942
96d887e8
PH
4943 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4944}
4c4b4cd2 4945
8f17729f
JB
4946/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4947 that are deemed "identical" for practical purposes.
4948
4949 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4950 types and that their number of enumerals is identical (in other
1f704f76 4951 words, type1->num_fields () == type2->num_fields ()). */
8f17729f
JB
4952
4953static int
4954ada_identical_enum_types_p (struct type *type1, struct type *type2)
4955{
4956 int i;
4957
4958 /* The heuristic we use here is fairly conservative. We consider
4959 that 2 enumerate types are identical if they have the same
4960 number of enumerals and that all enumerals have the same
4961 underlying value and name. */
4962
4963 /* All enums in the type should have an identical underlying value. */
1f704f76 4964 for (i = 0; i < type1->num_fields (); i++)
14e75d8e 4965 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4966 return 0;
4967
4968 /* All enumerals should also have the same name (modulo any numerical
4969 suffix). */
1f704f76 4970 for (i = 0; i < type1->num_fields (); i++)
8f17729f 4971 {
0d5cff50
DE
4972 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4973 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4974 int len_1 = strlen (name_1);
4975 int len_2 = strlen (name_2);
4976
4977 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4978 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4979 if (len_1 != len_2
dda83cd7 4980 || strncmp (TYPE_FIELD_NAME (type1, i),
8f17729f
JB
4981 TYPE_FIELD_NAME (type2, i),
4982 len_1) != 0)
4983 return 0;
4984 }
4985
4986 return 1;
4987}
4988
4989/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4990 that are deemed "identical" for practical purposes. Sometimes,
4991 enumerals are not strictly identical, but their types are so similar
4992 that they can be considered identical.
4993
4994 For instance, consider the following code:
4995
4996 type Color is (Black, Red, Green, Blue, White);
4997 type RGB_Color is new Color range Red .. Blue;
4998
4999 Type RGB_Color is a subrange of an implicit type which is a copy
5000 of type Color. If we call that implicit type RGB_ColorB ("B" is
5001 for "Base Type"), then type RGB_ColorB is a copy of type Color.
5002 As a result, when an expression references any of the enumeral
5003 by name (Eg. "print green"), the expression is technically
5004 ambiguous and the user should be asked to disambiguate. But
5005 doing so would only hinder the user, since it wouldn't matter
5006 what choice he makes, the outcome would always be the same.
5007 So, for practical purposes, we consider them as the same. */
5008
5009static int
54d343a2 5010symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
5011{
5012 int i;
5013
5014 /* Before performing a thorough comparison check of each type,
5015 we perform a series of inexpensive checks. We expect that these
5016 checks will quickly fail in the vast majority of cases, and thus
5017 help prevent the unnecessary use of a more expensive comparison.
5018 Said comparison also expects us to make some of these checks
5019 (see ada_identical_enum_types_p). */
5020
5021 /* Quick check: All symbols should have an enum type. */
54d343a2 5022 for (i = 0; i < syms.size (); i++)
78134374 5023 if (SYMBOL_TYPE (syms[i].symbol)->code () != TYPE_CODE_ENUM)
8f17729f
JB
5024 return 0;
5025
5026 /* Quick check: They should all have the same value. */
54d343a2 5027 for (i = 1; i < syms.size (); i++)
d12307c1 5028 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
5029 return 0;
5030
5031 /* Quick check: They should all have the same number of enumerals. */
54d343a2 5032 for (i = 1; i < syms.size (); i++)
1f704f76 5033 if (SYMBOL_TYPE (syms[i].symbol)->num_fields ()
dda83cd7 5034 != SYMBOL_TYPE (syms[0].symbol)->num_fields ())
8f17729f
JB
5035 return 0;
5036
5037 /* All the sanity checks passed, so we might have a set of
5038 identical enumeration types. Perform a more complete
5039 comparison of the type of each symbol. */
54d343a2 5040 for (i = 1; i < syms.size (); i++)
d12307c1 5041 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
dda83cd7 5042 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
5043 return 0;
5044
5045 return 1;
5046}
5047
54d343a2 5048/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
5049 duplicate other symbols in the list (The only case I know of where
5050 this happens is when object files containing stabs-in-ecoff are
5051 linked with files containing ordinary ecoff debugging symbols (or no
5052 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5053 Returns the number of items in the modified list. */
4c4b4cd2 5054
96d887e8 5055static int
54d343a2 5056remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5057{
5058 int i, j;
4c4b4cd2 5059
8f17729f
JB
5060 /* We should never be called with less than 2 symbols, as there
5061 cannot be any extra symbol in that case. But it's easy to
5062 handle, since we have nothing to do in that case. */
54d343a2
TT
5063 if (syms->size () < 2)
5064 return syms->size ();
8f17729f 5065
96d887e8 5066 i = 0;
54d343a2 5067 while (i < syms->size ())
96d887e8 5068 {
a35ddb44 5069 int remove_p = 0;
339c13b6
JB
5070
5071 /* If two symbols have the same name and one of them is a stub type,
dda83cd7 5072 the get rid of the stub. */
339c13b6 5073
e46d3488 5074 if (SYMBOL_TYPE ((*syms)[i].symbol)->is_stub ()
dda83cd7
SM
5075 && (*syms)[i].symbol->linkage_name () != NULL)
5076 {
5077 for (j = 0; j < syms->size (); j++)
5078 {
5079 if (j != i
5080 && !SYMBOL_TYPE ((*syms)[j].symbol)->is_stub ()
5081 && (*syms)[j].symbol->linkage_name () != NULL
5082 && strcmp ((*syms)[i].symbol->linkage_name (),
5083 (*syms)[j].symbol->linkage_name ()) == 0)
5084 remove_p = 1;
5085 }
5086 }
339c13b6
JB
5087
5088 /* Two symbols with the same name, same class and same address
dda83cd7 5089 should be identical. */
339c13b6 5090
987012b8 5091 else if ((*syms)[i].symbol->linkage_name () != NULL
dda83cd7
SM
5092 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5093 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
5094 {
5095 for (j = 0; j < syms->size (); j += 1)
5096 {
5097 if (i != j
5098 && (*syms)[j].symbol->linkage_name () != NULL
5099 && strcmp ((*syms)[i].symbol->linkage_name (),
5100 (*syms)[j].symbol->linkage_name ()) == 0
5101 && SYMBOL_CLASS ((*syms)[i].symbol)
54d343a2 5102 == SYMBOL_CLASS ((*syms)[j].symbol)
dda83cd7
SM
5103 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5104 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
5105 remove_p = 1;
5106 }
5107 }
339c13b6 5108
a35ddb44 5109 if (remove_p)
54d343a2 5110 syms->erase (syms->begin () + i);
1b788fb6
TT
5111 else
5112 i += 1;
14f9c5c9 5113 }
8f17729f
JB
5114
5115 /* If all the remaining symbols are identical enumerals, then
5116 just keep the first one and discard the rest.
5117
5118 Unlike what we did previously, we do not discard any entry
5119 unless they are ALL identical. This is because the symbol
5120 comparison is not a strict comparison, but rather a practical
5121 comparison. If all symbols are considered identical, then
5122 we can just go ahead and use the first one and discard the rest.
5123 But if we cannot reduce the list to a single element, we have
5124 to ask the user to disambiguate anyways. And if we have to
5125 present a multiple-choice menu, it's less confusing if the list
5126 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5127 if (symbols_are_identical_enums (*syms))
5128 syms->resize (1);
8f17729f 5129
54d343a2 5130 return syms->size ();
14f9c5c9
AS
5131}
5132
96d887e8
PH
5133/* Given a type that corresponds to a renaming entity, use the type name
5134 to extract the scope (package name or function name, fully qualified,
5135 and following the GNAT encoding convention) where this renaming has been
49d83361 5136 defined. */
4c4b4cd2 5137
49d83361 5138static std::string
96d887e8 5139xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5140{
96d887e8 5141 /* The renaming types adhere to the following convention:
0963b4bd 5142 <scope>__<rename>___<XR extension>.
96d887e8
PH
5143 So, to extract the scope, we search for the "___XR" extension,
5144 and then backtrack until we find the first "__". */
76a01679 5145
7d93a1e0 5146 const char *name = renaming_type->name ();
108d56a4
SM
5147 const char *suffix = strstr (name, "___XR");
5148 const char *last;
14f9c5c9 5149
96d887e8
PH
5150 /* Now, backtrack a bit until we find the first "__". Start looking
5151 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5152
96d887e8
PH
5153 for (last = suffix - 3; last > name; last--)
5154 if (last[0] == '_' && last[1] == '_')
5155 break;
76a01679 5156
96d887e8 5157 /* Make a copy of scope and return it. */
49d83361 5158 return std::string (name, last);
4c4b4cd2
PH
5159}
5160
96d887e8 5161/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5162
96d887e8
PH
5163static int
5164is_package_name (const char *name)
4c4b4cd2 5165{
96d887e8
PH
5166 /* Here, We take advantage of the fact that no symbols are generated
5167 for packages, while symbols are generated for each function.
5168 So the condition for NAME represent a package becomes equivalent
5169 to NAME not existing in our list of symbols. There is only one
5170 small complication with library-level functions (see below). */
4c4b4cd2 5171
96d887e8
PH
5172 /* If it is a function that has not been defined at library level,
5173 then we should be able to look it up in the symbols. */
5174 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5175 return 0;
14f9c5c9 5176
96d887e8
PH
5177 /* Library-level function names start with "_ada_". See if function
5178 "_ada_" followed by NAME can be found. */
14f9c5c9 5179
96d887e8 5180 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5181 functions names cannot contain "__" in them. */
96d887e8
PH
5182 if (strstr (name, "__") != NULL)
5183 return 0;
4c4b4cd2 5184
528e1572 5185 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5186
528e1572 5187 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5188}
14f9c5c9 5189
96d887e8 5190/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5191 not visible from FUNCTION_NAME. */
14f9c5c9 5192
96d887e8 5193static int
0d5cff50 5194old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5195{
aeb5907d
JB
5196 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5197 return 0;
5198
49d83361 5199 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5200
96d887e8 5201 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5202 if (is_package_name (scope.c_str ()))
5203 return 0;
14f9c5c9 5204
96d887e8
PH
5205 /* Check that the rename is in the current function scope by checking
5206 that its name starts with SCOPE. */
76a01679 5207
96d887e8
PH
5208 /* If the function name starts with "_ada_", it means that it is
5209 a library-level function. Strip this prefix before doing the
5210 comparison, as the encoding for the renaming does not contain
5211 this prefix. */
61012eef 5212 if (startswith (function_name, "_ada_"))
96d887e8 5213 function_name += 5;
f26caa11 5214
49d83361 5215 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5216}
5217
aeb5907d
JB
5218/* Remove entries from SYMS that corresponds to a renaming entity that
5219 is not visible from the function associated with CURRENT_BLOCK or
5220 that is superfluous due to the presence of more specific renaming
5221 information. Places surviving symbols in the initial entries of
5222 SYMS and returns the number of surviving symbols.
96d887e8
PH
5223
5224 Rationale:
aeb5907d
JB
5225 First, in cases where an object renaming is implemented as a
5226 reference variable, GNAT may produce both the actual reference
5227 variable and the renaming encoding. In this case, we discard the
5228 latter.
5229
5230 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5231 entity. Unfortunately, STABS currently does not support the definition
5232 of types that are local to a given lexical block, so all renamings types
5233 are emitted at library level. As a consequence, if an application
5234 contains two renaming entities using the same name, and a user tries to
5235 print the value of one of these entities, the result of the ada symbol
5236 lookup will also contain the wrong renaming type.
f26caa11 5237
96d887e8
PH
5238 This function partially covers for this limitation by attempting to
5239 remove from the SYMS list renaming symbols that should be visible
5240 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5241 method with the current information available. The implementation
5242 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5243
5244 - When the user tries to print a rename in a function while there
dda83cd7
SM
5245 is another rename entity defined in a package: Normally, the
5246 rename in the function has precedence over the rename in the
5247 package, so the latter should be removed from the list. This is
5248 currently not the case.
5249
96d887e8 5250 - This function will incorrectly remove valid renames if
dda83cd7
SM
5251 the CURRENT_BLOCK corresponds to a function which symbol name
5252 has been changed by an "Export" pragma. As a consequence,
5253 the user will be unable to print such rename entities. */
4c4b4cd2 5254
14f9c5c9 5255static int
54d343a2
TT
5256remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5257 const struct block *current_block)
4c4b4cd2
PH
5258{
5259 struct symbol *current_function;
0d5cff50 5260 const char *current_function_name;
4c4b4cd2 5261 int i;
aeb5907d
JB
5262 int is_new_style_renaming;
5263
5264 /* If there is both a renaming foo___XR... encoded as a variable and
5265 a simple variable foo in the same block, discard the latter.
0963b4bd 5266 First, zero out such symbols, then compress. */
aeb5907d 5267 is_new_style_renaming = 0;
54d343a2 5268 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5269 {
54d343a2
TT
5270 struct symbol *sym = (*syms)[i].symbol;
5271 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5272 const char *name;
5273 const char *suffix;
5274
5275 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5276 continue;
987012b8 5277 name = sym->linkage_name ();
aeb5907d
JB
5278 suffix = strstr (name, "___XR");
5279
5280 if (suffix != NULL)
5281 {
5282 int name_len = suffix - name;
5283 int j;
5b4ee69b 5284
aeb5907d 5285 is_new_style_renaming = 1;
54d343a2
TT
5286 for (j = 0; j < syms->size (); j += 1)
5287 if (i != j && (*syms)[j].symbol != NULL
987012b8 5288 && strncmp (name, (*syms)[j].symbol->linkage_name (),
aeb5907d 5289 name_len) == 0
54d343a2
TT
5290 && block == (*syms)[j].block)
5291 (*syms)[j].symbol = NULL;
aeb5907d
JB
5292 }
5293 }
5294 if (is_new_style_renaming)
5295 {
5296 int j, k;
5297
54d343a2
TT
5298 for (j = k = 0; j < syms->size (); j += 1)
5299 if ((*syms)[j].symbol != NULL)
aeb5907d 5300 {
54d343a2 5301 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5302 k += 1;
5303 }
5304 return k;
5305 }
4c4b4cd2
PH
5306
5307 /* Extract the function name associated to CURRENT_BLOCK.
5308 Abort if unable to do so. */
76a01679 5309
4c4b4cd2 5310 if (current_block == NULL)
54d343a2 5311 return syms->size ();
76a01679 5312
7f0df278 5313 current_function = block_linkage_function (current_block);
4c4b4cd2 5314 if (current_function == NULL)
54d343a2 5315 return syms->size ();
4c4b4cd2 5316
987012b8 5317 current_function_name = current_function->linkage_name ();
4c4b4cd2 5318 if (current_function_name == NULL)
54d343a2 5319 return syms->size ();
4c4b4cd2
PH
5320
5321 /* Check each of the symbols, and remove it from the list if it is
5322 a type corresponding to a renaming that is out of the scope of
5323 the current block. */
5324
5325 i = 0;
54d343a2 5326 while (i < syms->size ())
4c4b4cd2 5327 {
54d343a2 5328 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
dda83cd7
SM
5329 == ADA_OBJECT_RENAMING
5330 && old_renaming_is_invisible ((*syms)[i].symbol,
54d343a2
TT
5331 current_function_name))
5332 syms->erase (syms->begin () + i);
4c4b4cd2 5333 else
dda83cd7 5334 i += 1;
4c4b4cd2
PH
5335 }
5336
54d343a2 5337 return syms->size ();
4c4b4cd2
PH
5338}
5339
339c13b6
JB
5340/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5341 whose name and domain match NAME and DOMAIN respectively.
5342 If no match was found, then extend the search to "enclosing"
5343 routines (in other words, if we're inside a nested function,
5344 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5345 If WILD_MATCH_P is nonzero, perform the naming matching in
5346 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5347
5348 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5349
5350static void
b5ec771e
PA
5351ada_add_local_symbols (struct obstack *obstackp,
5352 const lookup_name_info &lookup_name,
5353 const struct block *block, domain_enum domain)
339c13b6
JB
5354{
5355 int block_depth = 0;
5356
5357 while (block != NULL)
5358 {
5359 block_depth += 1;
b5ec771e 5360 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5361
5362 /* If we found a non-function match, assume that's the one. */
5363 if (is_nonfunction (defns_collected (obstackp, 0),
dda83cd7
SM
5364 num_defns_collected (obstackp)))
5365 return;
339c13b6
JB
5366
5367 block = BLOCK_SUPERBLOCK (block);
5368 }
5369
5370 /* If no luck so far, try to find NAME as a local symbol in some lexically
5371 enclosing subprogram. */
5372 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5373 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5374}
5375
ccefe4c4 5376/* An object of this type is used as the user_data argument when
40658b94 5377 calling the map_matching_symbols method. */
ccefe4c4 5378
40658b94 5379struct match_data
ccefe4c4 5380{
40658b94 5381 struct objfile *objfile;
ccefe4c4 5382 struct obstack *obstackp;
40658b94
PH
5383 struct symbol *arg_sym;
5384 int found_sym;
ccefe4c4
TT
5385};
5386
199b4314
TT
5387/* A callback for add_nonlocal_symbols that adds symbol, found in BSYM,
5388 to a list of symbols. DATA is a pointer to a struct match_data *
40658b94
PH
5389 containing the obstack that collects the symbol list, the file that SYM
5390 must come from, a flag indicating whether a non-argument symbol has
5391 been found in the current block, and the last argument symbol
5392 passed in SYM within the current block (if any). When SYM is null,
5393 marking the end of a block, the argument symbol is added if no
5394 other has been found. */
ccefe4c4 5395
199b4314
TT
5396static bool
5397aux_add_nonlocal_symbols (struct block_symbol *bsym,
5398 struct match_data *data)
ccefe4c4 5399{
199b4314
TT
5400 const struct block *block = bsym->block;
5401 struct symbol *sym = bsym->symbol;
5402
40658b94
PH
5403 if (sym == NULL)
5404 {
5405 if (!data->found_sym && data->arg_sym != NULL)
5406 add_defn_to_vec (data->obstackp,
5407 fixup_symbol_section (data->arg_sym, data->objfile),
5408 block);
5409 data->found_sym = 0;
5410 data->arg_sym = NULL;
5411 }
5412 else
5413 {
5414 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
199b4314 5415 return true;
40658b94
PH
5416 else if (SYMBOL_IS_ARGUMENT (sym))
5417 data->arg_sym = sym;
5418 else
5419 {
5420 data->found_sym = 1;
5421 add_defn_to_vec (data->obstackp,
5422 fixup_symbol_section (sym, data->objfile),
5423 block);
5424 }
5425 }
199b4314 5426 return true;
40658b94
PH
5427}
5428
b5ec771e
PA
5429/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5430 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5431 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5432
5433static int
5434ada_add_block_renamings (struct obstack *obstackp,
5435 const struct block *block,
b5ec771e
PA
5436 const lookup_name_info &lookup_name,
5437 domain_enum domain)
22cee43f
PMR
5438{
5439 struct using_direct *renaming;
5440 int defns_mark = num_defns_collected (obstackp);
5441
b5ec771e
PA
5442 symbol_name_matcher_ftype *name_match
5443 = ada_get_symbol_name_matcher (lookup_name);
5444
22cee43f
PMR
5445 for (renaming = block_using (block);
5446 renaming != NULL;
5447 renaming = renaming->next)
5448 {
5449 const char *r_name;
22cee43f
PMR
5450
5451 /* Avoid infinite recursions: skip this renaming if we are actually
5452 already traversing it.
5453
5454 Currently, symbol lookup in Ada don't use the namespace machinery from
5455 C++/Fortran support: skip namespace imports that use them. */
5456 if (renaming->searched
5457 || (renaming->import_src != NULL
5458 && renaming->import_src[0] != '\0')
5459 || (renaming->import_dest != NULL
5460 && renaming->import_dest[0] != '\0'))
5461 continue;
5462 renaming->searched = 1;
5463
5464 /* TODO: here, we perform another name-based symbol lookup, which can
5465 pull its own multiple overloads. In theory, we should be able to do
5466 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5467 not a simple name. But in order to do this, we would need to enhance
5468 the DWARF reader to associate a symbol to this renaming, instead of a
5469 name. So, for now, we do something simpler: re-use the C++/Fortran
5470 namespace machinery. */
5471 r_name = (renaming->alias != NULL
5472 ? renaming->alias
5473 : renaming->declaration);
b5ec771e
PA
5474 if (name_match (r_name, lookup_name, NULL))
5475 {
5476 lookup_name_info decl_lookup_name (renaming->declaration,
5477 lookup_name.match_type ());
5478 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5479 1, NULL);
5480 }
22cee43f
PMR
5481 renaming->searched = 0;
5482 }
5483 return num_defns_collected (obstackp) != defns_mark;
5484}
5485
db230ce3
JB
5486/* Implements compare_names, but only applying the comparision using
5487 the given CASING. */
5b4ee69b 5488
40658b94 5489static int
db230ce3
JB
5490compare_names_with_case (const char *string1, const char *string2,
5491 enum case_sensitivity casing)
40658b94
PH
5492{
5493 while (*string1 != '\0' && *string2 != '\0')
5494 {
db230ce3
JB
5495 char c1, c2;
5496
40658b94
PH
5497 if (isspace (*string1) || isspace (*string2))
5498 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5499
5500 if (casing == case_sensitive_off)
5501 {
5502 c1 = tolower (*string1);
5503 c2 = tolower (*string2);
5504 }
5505 else
5506 {
5507 c1 = *string1;
5508 c2 = *string2;
5509 }
5510 if (c1 != c2)
40658b94 5511 break;
db230ce3 5512
40658b94
PH
5513 string1 += 1;
5514 string2 += 1;
5515 }
db230ce3 5516
40658b94
PH
5517 switch (*string1)
5518 {
5519 case '(':
5520 return strcmp_iw_ordered (string1, string2);
5521 case '_':
5522 if (*string2 == '\0')
5523 {
052874e8 5524 if (is_name_suffix (string1))
40658b94
PH
5525 return 0;
5526 else
1a1d5513 5527 return 1;
40658b94 5528 }
dbb8534f 5529 /* FALLTHROUGH */
40658b94
PH
5530 default:
5531 if (*string2 == '(')
5532 return strcmp_iw_ordered (string1, string2);
5533 else
db230ce3
JB
5534 {
5535 if (casing == case_sensitive_off)
5536 return tolower (*string1) - tolower (*string2);
5537 else
5538 return *string1 - *string2;
5539 }
40658b94 5540 }
ccefe4c4
TT
5541}
5542
db230ce3
JB
5543/* Compare STRING1 to STRING2, with results as for strcmp.
5544 Compatible with strcmp_iw_ordered in that...
5545
5546 strcmp_iw_ordered (STRING1, STRING2) <= 0
5547
5548 ... implies...
5549
5550 compare_names (STRING1, STRING2) <= 0
5551
5552 (they may differ as to what symbols compare equal). */
5553
5554static int
5555compare_names (const char *string1, const char *string2)
5556{
5557 int result;
5558
5559 /* Similar to what strcmp_iw_ordered does, we need to perform
5560 a case-insensitive comparison first, and only resort to
5561 a second, case-sensitive, comparison if the first one was
5562 not sufficient to differentiate the two strings. */
5563
5564 result = compare_names_with_case (string1, string2, case_sensitive_off);
5565 if (result == 0)
5566 result = compare_names_with_case (string1, string2, case_sensitive_on);
5567
5568 return result;
5569}
5570
b5ec771e
PA
5571/* Convenience function to get at the Ada encoded lookup name for
5572 LOOKUP_NAME, as a C string. */
5573
5574static const char *
5575ada_lookup_name (const lookup_name_info &lookup_name)
5576{
5577 return lookup_name.ada ().lookup_name ().c_str ();
5578}
5579
339c13b6 5580/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5581 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5582 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5583 symbols otherwise. */
339c13b6
JB
5584
5585static void
b5ec771e
PA
5586add_nonlocal_symbols (struct obstack *obstackp,
5587 const lookup_name_info &lookup_name,
5588 domain_enum domain, int global)
339c13b6 5589{
40658b94 5590 struct match_data data;
339c13b6 5591
6475f2fe 5592 memset (&data, 0, sizeof data);
ccefe4c4 5593 data.obstackp = obstackp;
339c13b6 5594
b5ec771e
PA
5595 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5596
199b4314
TT
5597 auto callback = [&] (struct block_symbol *bsym)
5598 {
5599 return aux_add_nonlocal_symbols (bsym, &data);
5600 };
5601
2030c079 5602 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5603 {
5604 data.objfile = objfile;
5605
b054970d
TT
5606 objfile->sf->qf->map_matching_symbols (objfile, lookup_name,
5607 domain, global, callback,
5608 (is_wild_match
5609 ? NULL : compare_names));
22cee43f 5610
b669c953 5611 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5612 {
5613 const struct block *global_block
5614 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5615
b5ec771e
PA
5616 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5617 domain))
22cee43f
PMR
5618 data.found_sym = 1;
5619 }
40658b94
PH
5620 }
5621
5622 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5623 {
b5ec771e 5624 const char *name = ada_lookup_name (lookup_name);
e0802d59
TT
5625 std::string bracket_name = std::string ("<_ada_") + name + '>';
5626 lookup_name_info name1 (bracket_name, symbol_name_match_type::FULL);
b5ec771e 5627
2030c079 5628 for (objfile *objfile : current_program_space->objfiles ())
dda83cd7 5629 {
40658b94 5630 data.objfile = objfile;
b054970d 5631 objfile->sf->qf->map_matching_symbols (objfile, name1,
199b4314 5632 domain, global, callback,
b5ec771e 5633 compare_names);
40658b94
PH
5634 }
5635 }
339c13b6
JB
5636}
5637
b5ec771e
PA
5638/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5639 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5640 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5641
22cee43f
PMR
5642 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5643 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5644 is the one match returned (no other matches in that or
d9680e73 5645 enclosing blocks is returned). If there are any matches in or
22cee43f 5646 surrounding BLOCK, then these alone are returned.
4eeaa230 5647
b5ec771e
PA
5648 Names prefixed with "standard__" are handled specially:
5649 "standard__" is first stripped off (by the lookup_name
5650 constructor), and only static and global symbols are searched.
14f9c5c9 5651
22cee43f
PMR
5652 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5653 to lookup global symbols. */
5654
5655static void
5656ada_add_all_symbols (struct obstack *obstackp,
5657 const struct block *block,
b5ec771e 5658 const lookup_name_info &lookup_name,
22cee43f
PMR
5659 domain_enum domain,
5660 int full_search,
5661 int *made_global_lookup_p)
14f9c5c9
AS
5662{
5663 struct symbol *sym;
14f9c5c9 5664
22cee43f
PMR
5665 if (made_global_lookup_p)
5666 *made_global_lookup_p = 0;
339c13b6
JB
5667
5668 /* Special case: If the user specifies a symbol name inside package
5669 Standard, do a non-wild matching of the symbol name without
5670 the "standard__" prefix. This was primarily introduced in order
5671 to allow the user to specifically access the standard exceptions
5672 using, for instance, Standard.Constraint_Error when Constraint_Error
5673 is ambiguous (due to the user defining its own Constraint_Error
5674 entity inside its program). */
b5ec771e
PA
5675 if (lookup_name.ada ().standard_p ())
5676 block = NULL;
4c4b4cd2 5677
339c13b6 5678 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5679
4eeaa230
DE
5680 if (block != NULL)
5681 {
5682 if (full_search)
b5ec771e 5683 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5684 else
5685 {
5686 /* In the !full_search case we're are being called by
4009ee92 5687 iterate_over_symbols, and we don't want to search
4eeaa230 5688 superblocks. */
b5ec771e 5689 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5690 }
22cee43f
PMR
5691 if (num_defns_collected (obstackp) > 0 || !full_search)
5692 return;
4eeaa230 5693 }
d2e4a39e 5694
339c13b6
JB
5695 /* No non-global symbols found. Check our cache to see if we have
5696 already performed this search before. If we have, then return
5697 the same result. */
5698
b5ec771e
PA
5699 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5700 domain, &sym, &block))
4c4b4cd2
PH
5701 {
5702 if (sym != NULL)
b5ec771e 5703 add_defn_to_vec (obstackp, sym, block);
22cee43f 5704 return;
4c4b4cd2 5705 }
14f9c5c9 5706
22cee43f
PMR
5707 if (made_global_lookup_p)
5708 *made_global_lookup_p = 1;
b1eedac9 5709
339c13b6
JB
5710 /* Search symbols from all global blocks. */
5711
b5ec771e 5712 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5713
4c4b4cd2 5714 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5715 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5716
22cee43f 5717 if (num_defns_collected (obstackp) == 0)
b5ec771e 5718 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5719}
5720
b5ec771e
PA
5721/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5722 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5723 matches.
54d343a2
TT
5724 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5725 found and the blocks and symbol tables (if any) in which they were
5726 found.
22cee43f
PMR
5727
5728 When full_search is non-zero, any non-function/non-enumeral
5729 symbol match within the nest of blocks whose innermost member is BLOCK,
5730 is the one match returned (no other matches in that or
5731 enclosing blocks is returned). If there are any matches in or
5732 surrounding BLOCK, then these alone are returned.
5733
5734 Names prefixed with "standard__" are handled specially: "standard__"
5735 is first stripped off, and only static and global symbols are searched. */
5736
5737static int
b5ec771e
PA
5738ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5739 const struct block *block,
22cee43f 5740 domain_enum domain,
54d343a2 5741 std::vector<struct block_symbol> *results,
22cee43f
PMR
5742 int full_search)
5743{
22cee43f
PMR
5744 int syms_from_global_search;
5745 int ndefns;
ec6a20c2 5746 auto_obstack obstack;
22cee43f 5747
ec6a20c2 5748 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5749 domain, full_search, &syms_from_global_search);
14f9c5c9 5750
ec6a20c2
JB
5751 ndefns = num_defns_collected (&obstack);
5752
54d343a2
TT
5753 struct block_symbol *base = defns_collected (&obstack, 1);
5754 for (int i = 0; i < ndefns; ++i)
5755 results->push_back (base[i]);
4c4b4cd2 5756
54d343a2 5757 ndefns = remove_extra_symbols (results);
4c4b4cd2 5758
b1eedac9 5759 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5760 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5761
b1eedac9 5762 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5763 cache_symbol (ada_lookup_name (lookup_name), domain,
5764 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5765
54d343a2 5766 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5767
14f9c5c9
AS
5768 return ndefns;
5769}
5770
b5ec771e 5771/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5772 in global scopes, returning the number of matches, and filling *RESULTS
5773 with (SYM,BLOCK) tuples.
ec6a20c2 5774
4eeaa230
DE
5775 See ada_lookup_symbol_list_worker for further details. */
5776
5777int
b5ec771e 5778ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5779 domain_enum domain,
5780 std::vector<struct block_symbol> *results)
4eeaa230 5781{
b5ec771e
PA
5782 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5783 lookup_name_info lookup_name (name, name_match_type);
5784
5785 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5786}
5787
4e5c77fe
JB
5788/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5789 to 1, but choosing the first symbol found if there are multiple
5790 choices.
5791
5e2336be
JB
5792 The result is stored in *INFO, which must be non-NULL.
5793 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5794
5795void
5796ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5797 domain_enum domain,
d12307c1 5798 struct block_symbol *info)
14f9c5c9 5799{
b5ec771e
PA
5800 /* Since we already have an encoded name, wrap it in '<>' to force a
5801 verbatim match. Otherwise, if the name happens to not look like
5802 an encoded name (because it doesn't include a "__"),
5803 ada_lookup_name_info would re-encode/fold it again, and that
5804 would e.g., incorrectly lowercase object renaming names like
5805 "R28b" -> "r28b". */
5806 std::string verbatim = std::string ("<") + name + '>';
5807
5e2336be 5808 gdb_assert (info != NULL);
65392b3e 5809 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5810}
aeb5907d
JB
5811
5812/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5813 scope and in global scopes, or NULL if none. NAME is folded and
5814 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5815 choosing the first symbol if there are multiple choices. */
4e5c77fe 5816
d12307c1 5817struct block_symbol
aeb5907d 5818ada_lookup_symbol (const char *name, const struct block *block0,
dda83cd7 5819 domain_enum domain)
aeb5907d 5820{
54d343a2 5821 std::vector<struct block_symbol> candidates;
f98fc17b 5822 int n_candidates;
f98fc17b
PA
5823
5824 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5825
5826 if (n_candidates == 0)
54d343a2 5827 return {};
f98fc17b
PA
5828
5829 block_symbol info = candidates[0];
5830 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5831 return info;
4c4b4cd2 5832}
14f9c5c9 5833
14f9c5c9 5834
4c4b4cd2
PH
5835/* True iff STR is a possible encoded suffix of a normal Ada name
5836 that is to be ignored for matching purposes. Suffixes of parallel
5837 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5838 are given by any of the regular expressions:
4c4b4cd2 5839
babe1480
JB
5840 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5841 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5842 TKB [subprogram suffix for task bodies]
babe1480 5843 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5844 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5845
5846 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5847 match is performed. This sequence is used to differentiate homonyms,
5848 is an optional part of a valid name suffix. */
4c4b4cd2 5849
14f9c5c9 5850static int
d2e4a39e 5851is_name_suffix (const char *str)
14f9c5c9
AS
5852{
5853 int k;
4c4b4cd2
PH
5854 const char *matching;
5855 const int len = strlen (str);
5856
babe1480
JB
5857 /* Skip optional leading __[0-9]+. */
5858
4c4b4cd2
PH
5859 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5860 {
babe1480
JB
5861 str += 3;
5862 while (isdigit (str[0]))
dda83cd7 5863 str += 1;
4c4b4cd2 5864 }
babe1480
JB
5865
5866 /* [.$][0-9]+ */
4c4b4cd2 5867
babe1480 5868 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5869 {
babe1480 5870 matching = str + 1;
4c4b4cd2 5871 while (isdigit (matching[0]))
dda83cd7 5872 matching += 1;
4c4b4cd2 5873 if (matching[0] == '\0')
dda83cd7 5874 return 1;
4c4b4cd2
PH
5875 }
5876
5877 /* ___[0-9]+ */
babe1480 5878
4c4b4cd2
PH
5879 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5880 {
5881 matching = str + 3;
5882 while (isdigit (matching[0]))
dda83cd7 5883 matching += 1;
4c4b4cd2 5884 if (matching[0] == '\0')
dda83cd7 5885 return 1;
4c4b4cd2
PH
5886 }
5887
9ac7f98e
JB
5888 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5889
5890 if (strcmp (str, "TKB") == 0)
5891 return 1;
5892
529cad9c
PH
5893#if 0
5894 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5895 with a N at the end. Unfortunately, the compiler uses the same
5896 convention for other internal types it creates. So treating
529cad9c 5897 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5898 some regressions. For instance, consider the case of an enumerated
5899 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5900 name ends with N.
5901 Having a single character like this as a suffix carrying some
0963b4bd 5902 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5903 to be something like "_N" instead. In the meantime, do not do
5904 the following check. */
5905 /* Protected Object Subprograms */
5906 if (len == 1 && str [0] == 'N')
5907 return 1;
5908#endif
5909
5910 /* _E[0-9]+[bs]$ */
5911 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5912 {
5913 matching = str + 3;
5914 while (isdigit (matching[0]))
dda83cd7 5915 matching += 1;
529cad9c 5916 if ((matching[0] == 'b' || matching[0] == 's')
dda83cd7
SM
5917 && matching [1] == '\0')
5918 return 1;
529cad9c
PH
5919 }
5920
4c4b4cd2
PH
5921 /* ??? We should not modify STR directly, as we are doing below. This
5922 is fine in this case, but may become problematic later if we find
5923 that this alternative did not work, and want to try matching
5924 another one from the begining of STR. Since we modified it, we
5925 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5926 if (str[0] == 'X')
5927 {
5928 str += 1;
d2e4a39e 5929 while (str[0] != '_' && str[0] != '\0')
dda83cd7
SM
5930 {
5931 if (str[0] != 'n' && str[0] != 'b')
5932 return 0;
5933 str += 1;
5934 }
14f9c5c9 5935 }
babe1480 5936
14f9c5c9
AS
5937 if (str[0] == '\000')
5938 return 1;
babe1480 5939
d2e4a39e 5940 if (str[0] == '_')
14f9c5c9
AS
5941 {
5942 if (str[1] != '_' || str[2] == '\000')
dda83cd7 5943 return 0;
d2e4a39e 5944 if (str[2] == '_')
dda83cd7
SM
5945 {
5946 if (strcmp (str + 3, "JM") == 0)
5947 return 1;
5948 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5949 the LJM suffix in favor of the JM one. But we will
5950 still accept LJM as a valid suffix for a reasonable
5951 amount of time, just to allow ourselves to debug programs
5952 compiled using an older version of GNAT. */
5953 if (strcmp (str + 3, "LJM") == 0)
5954 return 1;
5955 if (str[3] != 'X')
5956 return 0;
5957 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5958 || str[4] == 'U' || str[4] == 'P')
5959 return 1;
5960 if (str[4] == 'R' && str[5] != 'T')
5961 return 1;
5962 return 0;
5963 }
4c4b4cd2 5964 if (!isdigit (str[2]))
dda83cd7 5965 return 0;
4c4b4cd2 5966 for (k = 3; str[k] != '\0'; k += 1)
dda83cd7
SM
5967 if (!isdigit (str[k]) && str[k] != '_')
5968 return 0;
14f9c5c9
AS
5969 return 1;
5970 }
4c4b4cd2 5971 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5972 {
4c4b4cd2 5973 for (k = 2; str[k] != '\0'; k += 1)
dda83cd7
SM
5974 if (!isdigit (str[k]) && str[k] != '_')
5975 return 0;
14f9c5c9
AS
5976 return 1;
5977 }
5978 return 0;
5979}
d2e4a39e 5980
aeb5907d
JB
5981/* Return non-zero if the string starting at NAME and ending before
5982 NAME_END contains no capital letters. */
529cad9c
PH
5983
5984static int
5985is_valid_name_for_wild_match (const char *name0)
5986{
f945dedf 5987 std::string decoded_name = ada_decode (name0);
529cad9c
PH
5988 int i;
5989
5823c3ef
JB
5990 /* If the decoded name starts with an angle bracket, it means that
5991 NAME0 does not follow the GNAT encoding format. It should then
5992 not be allowed as a possible wild match. */
5993 if (decoded_name[0] == '<')
5994 return 0;
5995
529cad9c
PH
5996 for (i=0; decoded_name[i] != '\0'; i++)
5997 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5998 return 0;
5999
6000 return 1;
6001}
6002
59c8a30b
JB
6003/* Advance *NAMEP to next occurrence in the string NAME0 of the TARGET0
6004 character which could start a simple name. Assumes that *NAMEP points
6005 somewhere inside the string beginning at NAME0. */
4c4b4cd2 6006
14f9c5c9 6007static int
59c8a30b 6008advance_wild_match (const char **namep, const char *name0, char target0)
14f9c5c9 6009{
73589123 6010 const char *name = *namep;
5b4ee69b 6011
5823c3ef 6012 while (1)
14f9c5c9 6013 {
59c8a30b 6014 char t0, t1;
73589123
PH
6015
6016 t0 = *name;
6017 if (t0 == '_')
6018 {
6019 t1 = name[1];
6020 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6021 {
6022 name += 1;
61012eef 6023 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6024 break;
6025 else
6026 name += 1;
6027 }
aa27d0b3
JB
6028 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6029 || name[2] == target0))
73589123
PH
6030 {
6031 name += 2;
6032 break;
6033 }
6034 else
6035 return 0;
6036 }
6037 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6038 name += 1;
6039 else
5823c3ef 6040 return 0;
73589123
PH
6041 }
6042
6043 *namep = name;
6044 return 1;
6045}
6046
b5ec771e
PA
6047/* Return true iff NAME encodes a name of the form prefix.PATN.
6048 Ignores any informational suffixes of NAME (i.e., for which
6049 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6050 simple name. */
73589123 6051
b5ec771e 6052static bool
73589123
PH
6053wild_match (const char *name, const char *patn)
6054{
22e048c9 6055 const char *p;
73589123
PH
6056 const char *name0 = name;
6057
6058 while (1)
6059 {
6060 const char *match = name;
6061
6062 if (*name == *patn)
6063 {
6064 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6065 if (*p != *name)
6066 break;
6067 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6068 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6069
6070 if (name[-1] == '_')
6071 name -= 1;
6072 }
6073 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6074 return false;
96d887e8 6075 }
96d887e8
PH
6076}
6077
b5ec771e
PA
6078/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6079 any trailing suffixes that encode debugging information or leading
6080 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6081 information that is ignored). */
40658b94 6082
b5ec771e 6083static bool
c4d840bd
PH
6084full_match (const char *sym_name, const char *search_name)
6085{
b5ec771e
PA
6086 size_t search_name_len = strlen (search_name);
6087
6088 if (strncmp (sym_name, search_name, search_name_len) == 0
6089 && is_name_suffix (sym_name + search_name_len))
6090 return true;
6091
6092 if (startswith (sym_name, "_ada_")
6093 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6094 && is_name_suffix (sym_name + search_name_len + 5))
6095 return true;
c4d840bd 6096
b5ec771e
PA
6097 return false;
6098}
c4d840bd 6099
b5ec771e
PA
6100/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6101 *defn_symbols, updating the list of symbols in OBSTACKP (if
6102 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6103
6104static void
6105ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6106 const struct block *block,
6107 const lookup_name_info &lookup_name,
6108 domain_enum domain, struct objfile *objfile)
96d887e8 6109{
8157b174 6110 struct block_iterator iter;
96d887e8
PH
6111 /* A matching argument symbol, if any. */
6112 struct symbol *arg_sym;
6113 /* Set true when we find a matching non-argument symbol. */
6114 int found_sym;
6115 struct symbol *sym;
6116
6117 arg_sym = NULL;
6118 found_sym = 0;
b5ec771e
PA
6119 for (sym = block_iter_match_first (block, lookup_name, &iter);
6120 sym != NULL;
6121 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6122 {
c1b5c1eb 6123 if (symbol_matches_domain (sym->language (), SYMBOL_DOMAIN (sym), domain))
b5ec771e
PA
6124 {
6125 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6126 {
6127 if (SYMBOL_IS_ARGUMENT (sym))
6128 arg_sym = sym;
6129 else
6130 {
6131 found_sym = 1;
6132 add_defn_to_vec (obstackp,
6133 fixup_symbol_section (sym, objfile),
6134 block);
6135 }
6136 }
6137 }
96d887e8
PH
6138 }
6139
22cee43f
PMR
6140 /* Handle renamings. */
6141
b5ec771e 6142 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6143 found_sym = 1;
6144
96d887e8
PH
6145 if (!found_sym && arg_sym != NULL)
6146 {
76a01679 6147 add_defn_to_vec (obstackp,
dda83cd7
SM
6148 fixup_symbol_section (arg_sym, objfile),
6149 block);
96d887e8
PH
6150 }
6151
b5ec771e 6152 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6153 {
6154 arg_sym = NULL;
6155 found_sym = 0;
b5ec771e
PA
6156 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6157 const char *name = ada_lookup_name.c_str ();
6158 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6159
6160 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6161 {
dda83cd7
SM
6162 if (symbol_matches_domain (sym->language (),
6163 SYMBOL_DOMAIN (sym), domain))
6164 {
6165 int cmp;
6166
6167 cmp = (int) '_' - (int) sym->linkage_name ()[0];
6168 if (cmp == 0)
6169 {
6170 cmp = !startswith (sym->linkage_name (), "_ada_");
6171 if (cmp == 0)
6172 cmp = strncmp (name, sym->linkage_name () + 5,
6173 name_len);
6174 }
6175
6176 if (cmp == 0
6177 && is_name_suffix (sym->linkage_name () + name_len + 5))
6178 {
2a2d4dc3
AS
6179 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6180 {
6181 if (SYMBOL_IS_ARGUMENT (sym))
6182 arg_sym = sym;
6183 else
6184 {
6185 found_sym = 1;
6186 add_defn_to_vec (obstackp,
6187 fixup_symbol_section (sym, objfile),
6188 block);
6189 }
6190 }
dda83cd7
SM
6191 }
6192 }
76a01679 6193 }
96d887e8
PH
6194
6195 /* NOTE: This really shouldn't be needed for _ada_ symbols.
dda83cd7 6196 They aren't parameters, right? */
96d887e8 6197 if (!found_sym && arg_sym != NULL)
dda83cd7
SM
6198 {
6199 add_defn_to_vec (obstackp,
6200 fixup_symbol_section (arg_sym, objfile),
6201 block);
6202 }
96d887e8
PH
6203 }
6204}
6205\f
41d27058 6206
dda83cd7 6207 /* Symbol Completion */
41d27058 6208
b5ec771e 6209/* See symtab.h. */
41d27058 6210
b5ec771e
PA
6211bool
6212ada_lookup_name_info::matches
6213 (const char *sym_name,
6214 symbol_name_match_type match_type,
a207cff2 6215 completion_match_result *comp_match_res) const
41d27058 6216{
b5ec771e
PA
6217 bool match = false;
6218 const char *text = m_encoded_name.c_str ();
6219 size_t text_len = m_encoded_name.size ();
41d27058
JB
6220
6221 /* First, test against the fully qualified name of the symbol. */
6222
6223 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6224 match = true;
41d27058 6225
f945dedf 6226 std::string decoded_name = ada_decode (sym_name);
b5ec771e 6227 if (match && !m_encoded_p)
41d27058
JB
6228 {
6229 /* One needed check before declaring a positive match is to verify
dda83cd7
SM
6230 that iff we are doing a verbatim match, the decoded version
6231 of the symbol name starts with '<'. Otherwise, this symbol name
6232 is not a suitable completion. */
41d27058 6233
f945dedf 6234 bool has_angle_bracket = (decoded_name[0] == '<');
b5ec771e 6235 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6236 }
6237
b5ec771e 6238 if (match && !m_verbatim_p)
41d27058
JB
6239 {
6240 /* When doing non-verbatim match, another check that needs to
dda83cd7
SM
6241 be done is to verify that the potentially matching symbol name
6242 does not include capital letters, because the ada-mode would
6243 not be able to understand these symbol names without the
6244 angle bracket notation. */
41d27058
JB
6245 const char *tmp;
6246
6247 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6248 if (*tmp != '\0')
b5ec771e 6249 match = false;
41d27058
JB
6250 }
6251
6252 /* Second: Try wild matching... */
6253
b5ec771e 6254 if (!match && m_wild_match_p)
41d27058
JB
6255 {
6256 /* Since we are doing wild matching, this means that TEXT
dda83cd7
SM
6257 may represent an unqualified symbol name. We therefore must
6258 also compare TEXT against the unqualified name of the symbol. */
f945dedf 6259 sym_name = ada_unqualified_name (decoded_name.c_str ());
41d27058
JB
6260
6261 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6262 match = true;
41d27058
JB
6263 }
6264
b5ec771e 6265 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6266
6267 if (!match)
b5ec771e 6268 return false;
41d27058 6269
a207cff2 6270 if (comp_match_res != NULL)
b5ec771e 6271 {
a207cff2 6272 std::string &match_str = comp_match_res->match.storage ();
41d27058 6273
b5ec771e 6274 if (!m_encoded_p)
a207cff2 6275 match_str = ada_decode (sym_name);
b5ec771e
PA
6276 else
6277 {
6278 if (m_verbatim_p)
6279 match_str = add_angle_brackets (sym_name);
6280 else
6281 match_str = sym_name;
41d27058 6282
b5ec771e 6283 }
a207cff2
PA
6284
6285 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6286 }
6287
b5ec771e 6288 return true;
41d27058
JB
6289}
6290
dda83cd7 6291 /* Field Access */
96d887e8 6292
73fb9985
JB
6293/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6294 for tagged types. */
6295
6296static int
6297ada_is_dispatch_table_ptr_type (struct type *type)
6298{
0d5cff50 6299 const char *name;
73fb9985 6300
78134374 6301 if (type->code () != TYPE_CODE_PTR)
73fb9985
JB
6302 return 0;
6303
7d93a1e0 6304 name = TYPE_TARGET_TYPE (type)->name ();
73fb9985
JB
6305 if (name == NULL)
6306 return 0;
6307
6308 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6309}
6310
ac4a2da4
JG
6311/* Return non-zero if TYPE is an interface tag. */
6312
6313static int
6314ada_is_interface_tag (struct type *type)
6315{
7d93a1e0 6316 const char *name = type->name ();
ac4a2da4
JG
6317
6318 if (name == NULL)
6319 return 0;
6320
6321 return (strcmp (name, "ada__tags__interface_tag") == 0);
6322}
6323
963a6417
PH
6324/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6325 to be invisible to users. */
96d887e8 6326
963a6417
PH
6327int
6328ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6329{
1f704f76 6330 if (field_num < 0 || field_num > type->num_fields ())
963a6417 6331 return 1;
ffde82bf 6332
73fb9985
JB
6333 /* Check the name of that field. */
6334 {
6335 const char *name = TYPE_FIELD_NAME (type, field_num);
6336
6337 /* Anonymous field names should not be printed.
6338 brobecker/2007-02-20: I don't think this can actually happen
30baf67b 6339 but we don't want to print the value of anonymous fields anyway. */
73fb9985
JB
6340 if (name == NULL)
6341 return 1;
6342
ffde82bf
JB
6343 /* Normally, fields whose name start with an underscore ("_")
6344 are fields that have been internally generated by the compiler,
6345 and thus should not be printed. The "_parent" field is special,
6346 however: This is a field internally generated by the compiler
6347 for tagged types, and it contains the components inherited from
6348 the parent type. This field should not be printed as is, but
6349 should not be ignored either. */
61012eef 6350 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6351 return 1;
6352 }
6353
ac4a2da4
JG
6354 /* If this is the dispatch table of a tagged type or an interface tag,
6355 then ignore. */
73fb9985 6356 if (ada_is_tagged_type (type, 1)
940da03e
SM
6357 && (ada_is_dispatch_table_ptr_type (type->field (field_num).type ())
6358 || ada_is_interface_tag (type->field (field_num).type ())))
73fb9985
JB
6359 return 1;
6360
6361 /* Not a special field, so it should not be ignored. */
6362 return 0;
963a6417 6363}
96d887e8 6364
963a6417 6365/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6366 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6367
963a6417
PH
6368int
6369ada_is_tagged_type (struct type *type, int refok)
6370{
988f6b3d 6371 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6372}
96d887e8 6373
963a6417 6374/* True iff TYPE represents the type of X'Tag */
96d887e8 6375
963a6417
PH
6376int
6377ada_is_tag_type (struct type *type)
6378{
460efde1
JB
6379 type = ada_check_typedef (type);
6380
78134374 6381 if (type == NULL || type->code () != TYPE_CODE_PTR)
963a6417
PH
6382 return 0;
6383 else
96d887e8 6384 {
963a6417 6385 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6386
963a6417 6387 return (name != NULL
dda83cd7 6388 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6389 }
96d887e8
PH
6390}
6391
963a6417 6392/* The type of the tag on VAL. */
76a01679 6393
de93309a 6394static struct type *
963a6417 6395ada_tag_type (struct value *val)
96d887e8 6396{
988f6b3d 6397 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6398}
96d887e8 6399
b50d69b5
JG
6400/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6401 retired at Ada 05). */
6402
6403static int
6404is_ada95_tag (struct value *tag)
6405{
6406 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6407}
6408
963a6417 6409/* The value of the tag on VAL. */
96d887e8 6410
de93309a 6411static struct value *
963a6417
PH
6412ada_value_tag (struct value *val)
6413{
03ee6b2e 6414 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6415}
6416
963a6417
PH
6417/* The value of the tag on the object of type TYPE whose contents are
6418 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6419 ADDRESS. */
96d887e8 6420
963a6417 6421static struct value *
10a2c479 6422value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6423 const gdb_byte *valaddr,
dda83cd7 6424 CORE_ADDR address)
96d887e8 6425{
b5385fc0 6426 int tag_byte_offset;
963a6417 6427 struct type *tag_type;
5b4ee69b 6428
963a6417 6429 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
dda83cd7 6430 NULL, NULL, NULL))
96d887e8 6431 {
fc1a4b47 6432 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6433 ? NULL
6434 : valaddr + tag_byte_offset);
963a6417 6435 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6436
963a6417 6437 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6438 }
963a6417
PH
6439 return NULL;
6440}
96d887e8 6441
963a6417
PH
6442static struct type *
6443type_from_tag (struct value *tag)
6444{
f5272a3b 6445 gdb::unique_xmalloc_ptr<char> type_name = ada_tag_name (tag);
5b4ee69b 6446
963a6417 6447 if (type_name != NULL)
5c4258f4 6448 return ada_find_any_type (ada_encode (type_name.get ()).c_str ());
963a6417
PH
6449 return NULL;
6450}
96d887e8 6451
b50d69b5
JG
6452/* Given a value OBJ of a tagged type, return a value of this
6453 type at the base address of the object. The base address, as
6454 defined in Ada.Tags, it is the address of the primary tag of
6455 the object, and therefore where the field values of its full
6456 view can be fetched. */
6457
6458struct value *
6459ada_tag_value_at_base_address (struct value *obj)
6460{
b50d69b5
JG
6461 struct value *val;
6462 LONGEST offset_to_top = 0;
6463 struct type *ptr_type, *obj_type;
6464 struct value *tag;
6465 CORE_ADDR base_address;
6466
6467 obj_type = value_type (obj);
6468
6469 /* It is the responsability of the caller to deref pointers. */
6470
78134374 6471 if (obj_type->code () == TYPE_CODE_PTR || obj_type->code () == TYPE_CODE_REF)
b50d69b5
JG
6472 return obj;
6473
6474 tag = ada_value_tag (obj);
6475 if (!tag)
6476 return obj;
6477
6478 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6479
6480 if (is_ada95_tag (tag))
6481 return obj;
6482
08f49010
XR
6483 ptr_type = language_lookup_primitive_type
6484 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6485 ptr_type = lookup_pointer_type (ptr_type);
6486 val = value_cast (ptr_type, tag);
6487 if (!val)
6488 return obj;
6489
6490 /* It is perfectly possible that an exception be raised while
6491 trying to determine the base address, just like for the tag;
6492 see ada_tag_name for more details. We do not print the error
6493 message for the same reason. */
6494
a70b8144 6495 try
b50d69b5
JG
6496 {
6497 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6498 }
6499
230d2906 6500 catch (const gdb_exception_error &e)
492d29ea
PA
6501 {
6502 return obj;
6503 }
b50d69b5
JG
6504
6505 /* If offset is null, nothing to do. */
6506
6507 if (offset_to_top == 0)
6508 return obj;
6509
6510 /* -1 is a special case in Ada.Tags; however, what should be done
6511 is not quite clear from the documentation. So do nothing for
6512 now. */
6513
6514 if (offset_to_top == -1)
6515 return obj;
6516
08f49010
XR
6517 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6518 from the base address. This was however incompatible with
6519 C++ dispatch table: C++ uses a *negative* value to *add*
6520 to the base address. Ada's convention has therefore been
6521 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6522 use the same convention. Here, we support both cases by
6523 checking the sign of OFFSET_TO_TOP. */
6524
6525 if (offset_to_top > 0)
6526 offset_to_top = -offset_to_top;
6527
6528 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6529 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6530
6531 /* Make sure that we have a proper tag at the new address.
6532 Otherwise, offset_to_top is bogus (which can happen when
6533 the object is not initialized yet). */
6534
6535 if (!tag)
6536 return obj;
6537
6538 obj_type = type_from_tag (tag);
6539
6540 if (!obj_type)
6541 return obj;
6542
6543 return value_from_contents_and_address (obj_type, NULL, base_address);
6544}
6545
1b611343
JB
6546/* Return the "ada__tags__type_specific_data" type. */
6547
6548static struct type *
6549ada_get_tsd_type (struct inferior *inf)
963a6417 6550{
1b611343 6551 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6552
1b611343
JB
6553 if (data->tsd_type == 0)
6554 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6555 return data->tsd_type;
6556}
529cad9c 6557
1b611343
JB
6558/* Return the TSD (type-specific data) associated to the given TAG.
6559 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6560
1b611343 6561 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6562
1b611343
JB
6563static struct value *
6564ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6565{
4c4b4cd2 6566 struct value *val;
1b611343 6567 struct type *type;
5b4ee69b 6568
1b611343
JB
6569 /* First option: The TSD is simply stored as a field of our TAG.
6570 Only older versions of GNAT would use this format, but we have
6571 to test it first, because there are no visible markers for
6572 the current approach except the absence of that field. */
529cad9c 6573
1b611343
JB
6574 val = ada_value_struct_elt (tag, "tsd", 1);
6575 if (val)
6576 return val;
e802dbe0 6577
1b611343
JB
6578 /* Try the second representation for the dispatch table (in which
6579 there is no explicit 'tsd' field in the referent of the tag pointer,
6580 and instead the tsd pointer is stored just before the dispatch
6581 table. */
e802dbe0 6582
1b611343
JB
6583 type = ada_get_tsd_type (current_inferior());
6584 if (type == NULL)
6585 return NULL;
6586 type = lookup_pointer_type (lookup_pointer_type (type));
6587 val = value_cast (type, tag);
6588 if (val == NULL)
6589 return NULL;
6590 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6591}
6592
1b611343
JB
6593/* Given the TSD of a tag (type-specific data), return a string
6594 containing the name of the associated type.
6595
f5272a3b 6596 May return NULL if we are unable to determine the tag name. */
1b611343 6597
f5272a3b 6598static gdb::unique_xmalloc_ptr<char>
1b611343 6599ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6600{
529cad9c 6601 char *p;
1b611343 6602 struct value *val;
529cad9c 6603
1b611343 6604 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6605 if (val == NULL)
1b611343 6606 return NULL;
66920317
TT
6607 gdb::unique_xmalloc_ptr<char> buffer
6608 = target_read_string (value_as_address (val), INT_MAX);
6609 if (buffer == nullptr)
f5272a3b
TT
6610 return nullptr;
6611
6612 for (p = buffer.get (); *p != '\0'; ++p)
6613 {
6614 if (isalpha (*p))
6615 *p = tolower (*p);
6616 }
6617
6618 return buffer;
4c4b4cd2
PH
6619}
6620
6621/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6622 a C string.
6623
6624 Return NULL if the TAG is not an Ada tag, or if we were unable to
f5272a3b 6625 determine the name of that tag. */
4c4b4cd2 6626
f5272a3b 6627gdb::unique_xmalloc_ptr<char>
4c4b4cd2
PH
6628ada_tag_name (struct value *tag)
6629{
f5272a3b 6630 gdb::unique_xmalloc_ptr<char> name;
5b4ee69b 6631
df407dfe 6632 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6633 return NULL;
1b611343
JB
6634
6635 /* It is perfectly possible that an exception be raised while trying
6636 to determine the TAG's name, even under normal circumstances:
6637 The associated variable may be uninitialized or corrupted, for
6638 instance. We do not let any exception propagate past this point.
6639 instead we return NULL.
6640
6641 We also do not print the error message either (which often is very
6642 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6643 the caller print a more meaningful message if necessary. */
a70b8144 6644 try
1b611343
JB
6645 {
6646 struct value *tsd = ada_get_tsd_from_tag (tag);
6647
6648 if (tsd != NULL)
6649 name = ada_tag_name_from_tsd (tsd);
6650 }
230d2906 6651 catch (const gdb_exception_error &e)
492d29ea
PA
6652 {
6653 }
1b611343
JB
6654
6655 return name;
4c4b4cd2
PH
6656}
6657
6658/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6659
d2e4a39e 6660struct type *
ebf56fd3 6661ada_parent_type (struct type *type)
14f9c5c9
AS
6662{
6663 int i;
6664
61ee279c 6665 type = ada_check_typedef (type);
14f9c5c9 6666
78134374 6667 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
6668 return NULL;
6669
1f704f76 6670 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 6671 if (ada_is_parent_field (type, i))
0c1f74cf 6672 {
dda83cd7 6673 struct type *parent_type = type->field (i).type ();
0c1f74cf 6674
dda83cd7
SM
6675 /* If the _parent field is a pointer, then dereference it. */
6676 if (parent_type->code () == TYPE_CODE_PTR)
6677 parent_type = TYPE_TARGET_TYPE (parent_type);
6678 /* If there is a parallel XVS type, get the actual base type. */
6679 parent_type = ada_get_base_type (parent_type);
0c1f74cf 6680
dda83cd7 6681 return ada_check_typedef (parent_type);
0c1f74cf 6682 }
14f9c5c9
AS
6683
6684 return NULL;
6685}
6686
4c4b4cd2
PH
6687/* True iff field number FIELD_NUM of structure type TYPE contains the
6688 parent-type (inherited) fields of a derived type. Assumes TYPE is
6689 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6690
6691int
ebf56fd3 6692ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6693{
61ee279c 6694 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6695
4c4b4cd2 6696 return (name != NULL
dda83cd7
SM
6697 && (startswith (name, "PARENT")
6698 || startswith (name, "_parent")));
14f9c5c9
AS
6699}
6700
4c4b4cd2 6701/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6702 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6703 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6704 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6705 structures. */
14f9c5c9
AS
6706
6707int
ebf56fd3 6708ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6709{
d2e4a39e 6710 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6711
dddc0e16
JB
6712 if (name != NULL && strcmp (name, "RETVAL") == 0)
6713 {
6714 /* This happens in functions with "out" or "in out" parameters
6715 which are passed by copy. For such functions, GNAT describes
6716 the function's return type as being a struct where the return
6717 value is in a field called RETVAL, and where the other "out"
6718 or "in out" parameters are fields of that struct. This is not
6719 a wrapper. */
6720 return 0;
6721 }
6722
d2e4a39e 6723 return (name != NULL
dda83cd7
SM
6724 && (startswith (name, "PARENT")
6725 || strcmp (name, "REP") == 0
6726 || startswith (name, "_parent")
6727 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6728}
6729
4c4b4cd2
PH
6730/* True iff field number FIELD_NUM of structure or union type TYPE
6731 is a variant wrapper. Assumes TYPE is a structure type with at least
6732 FIELD_NUM+1 fields. */
14f9c5c9
AS
6733
6734int
ebf56fd3 6735ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6736{
8ecb59f8
TT
6737 /* Only Ada types are eligible. */
6738 if (!ADA_TYPE_P (type))
6739 return 0;
6740
940da03e 6741 struct type *field_type = type->field (field_num).type ();
5b4ee69b 6742
78134374
SM
6743 return (field_type->code () == TYPE_CODE_UNION
6744 || (is_dynamic_field (type, field_num)
6745 && (TYPE_TARGET_TYPE (field_type)->code ()
c3e5cd34 6746 == TYPE_CODE_UNION)));
14f9c5c9
AS
6747}
6748
6749/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6750 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6751 returns the type of the controlling discriminant for the variant.
6752 May return NULL if the type could not be found. */
14f9c5c9 6753
d2e4a39e 6754struct type *
ebf56fd3 6755ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6756{
a121b7c1 6757 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6758
988f6b3d 6759 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6760}
6761
4c4b4cd2 6762/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6763 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6764 represents a 'when others' clause; otherwise 0. */
14f9c5c9 6765
de93309a 6766static int
ebf56fd3 6767ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6768{
d2e4a39e 6769 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6770
14f9c5c9
AS
6771 return (name != NULL && name[0] == 'O');
6772}
6773
6774/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6775 returns the name of the discriminant controlling the variant.
6776 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6777
a121b7c1 6778const char *
ebf56fd3 6779ada_variant_discrim_name (struct type *type0)
14f9c5c9 6780{
d2e4a39e 6781 static char *result = NULL;
14f9c5c9 6782 static size_t result_len = 0;
d2e4a39e
AS
6783 struct type *type;
6784 const char *name;
6785 const char *discrim_end;
6786 const char *discrim_start;
14f9c5c9 6787
78134374 6788 if (type0->code () == TYPE_CODE_PTR)
14f9c5c9
AS
6789 type = TYPE_TARGET_TYPE (type0);
6790 else
6791 type = type0;
6792
6793 name = ada_type_name (type);
6794
6795 if (name == NULL || name[0] == '\000')
6796 return "";
6797
6798 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6799 discrim_end -= 1)
6800 {
61012eef 6801 if (startswith (discrim_end, "___XVN"))
dda83cd7 6802 break;
14f9c5c9
AS
6803 }
6804 if (discrim_end == name)
6805 return "";
6806
d2e4a39e 6807 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6808 discrim_start -= 1)
6809 {
d2e4a39e 6810 if (discrim_start == name + 1)
dda83cd7 6811 return "";
76a01679 6812 if ((discrim_start > name + 3
dda83cd7
SM
6813 && startswith (discrim_start - 3, "___"))
6814 || discrim_start[-1] == '.')
6815 break;
14f9c5c9
AS
6816 }
6817
6818 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6819 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6820 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6821 return result;
6822}
6823
4c4b4cd2
PH
6824/* Scan STR for a subtype-encoded number, beginning at position K.
6825 Put the position of the character just past the number scanned in
6826 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6827 Return 1 if there was a valid number at the given position, and 0
6828 otherwise. A "subtype-encoded" number consists of the absolute value
6829 in decimal, followed by the letter 'm' to indicate a negative number.
6830 Assumes 0m does not occur. */
14f9c5c9
AS
6831
6832int
d2e4a39e 6833ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6834{
6835 ULONGEST RU;
6836
d2e4a39e 6837 if (!isdigit (str[k]))
14f9c5c9
AS
6838 return 0;
6839
4c4b4cd2 6840 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6841 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6842 LONGEST. */
14f9c5c9
AS
6843 RU = 0;
6844 while (isdigit (str[k]))
6845 {
d2e4a39e 6846 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6847 k += 1;
6848 }
6849
d2e4a39e 6850 if (str[k] == 'm')
14f9c5c9
AS
6851 {
6852 if (R != NULL)
dda83cd7 6853 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6854 k += 1;
6855 }
6856 else if (R != NULL)
6857 *R = (LONGEST) RU;
6858
4c4b4cd2 6859 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6860 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6861 number representable as a LONGEST (although either would probably work
6862 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6863 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6864
6865 if (new_k != NULL)
6866 *new_k = k;
6867 return 1;
6868}
6869
4c4b4cd2
PH
6870/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6871 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6872 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6873
de93309a 6874static int
ebf56fd3 6875ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6876{
d2e4a39e 6877 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6878 int p;
6879
6880 p = 0;
6881 while (1)
6882 {
d2e4a39e 6883 switch (name[p])
dda83cd7
SM
6884 {
6885 case '\0':
6886 return 0;
6887 case 'S':
6888 {
6889 LONGEST W;
6890
6891 if (!ada_scan_number (name, p + 1, &W, &p))
6892 return 0;
6893 if (val == W)
6894 return 1;
6895 break;
6896 }
6897 case 'R':
6898 {
6899 LONGEST L, U;
6900
6901 if (!ada_scan_number (name, p + 1, &L, &p)
6902 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6903 return 0;
6904 if (val >= L && val <= U)
6905 return 1;
6906 break;
6907 }
6908 case 'O':
6909 return 1;
6910 default:
6911 return 0;
6912 }
4c4b4cd2
PH
6913 }
6914}
6915
0963b4bd 6916/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6917
6918/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6919 ARG_TYPE, extract and return the value of one of its (non-static)
6920 fields. FIELDNO says which field. Differs from value_primitive_field
6921 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6922
5eb68a39 6923struct value *
d2e4a39e 6924ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
dda83cd7 6925 struct type *arg_type)
14f9c5c9 6926{
14f9c5c9
AS
6927 struct type *type;
6928
61ee279c 6929 arg_type = ada_check_typedef (arg_type);
940da03e 6930 type = arg_type->field (fieldno).type ();
14f9c5c9 6931
4504bbde
TT
6932 /* Handle packed fields. It might be that the field is not packed
6933 relative to its containing structure, but the structure itself is
6934 packed; in this case we must take the bit-field path. */
6935 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
6936 {
6937 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6938 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6939
0fd88904 6940 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
dda83cd7
SM
6941 offset + bit_pos / 8,
6942 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6943 }
6944 else
6945 return value_primitive_field (arg1, offset, fieldno, arg_type);
6946}
6947
52ce6436
PH
6948/* Find field with name NAME in object of type TYPE. If found,
6949 set the following for each argument that is non-null:
6950 - *FIELD_TYPE_P to the field's type;
6951 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6952 an object of that type;
6953 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6954 - *BIT_SIZE_P to its size in bits if the field is packed, and
6955 0 otherwise;
6956 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6957 fields up to but not including the desired field, or by the total
6958 number of fields if not found. A NULL value of NAME never
6959 matches; the function just counts visible fields in this case.
6960
828d5846
XR
6961 Notice that we need to handle when a tagged record hierarchy
6962 has some components with the same name, like in this scenario:
6963
6964 type Top_T is tagged record
dda83cd7
SM
6965 N : Integer := 1;
6966 U : Integer := 974;
6967 A : Integer := 48;
828d5846
XR
6968 end record;
6969
6970 type Middle_T is new Top.Top_T with record
dda83cd7
SM
6971 N : Character := 'a';
6972 C : Integer := 3;
828d5846
XR
6973 end record;
6974
6975 type Bottom_T is new Middle.Middle_T with record
dda83cd7
SM
6976 N : Float := 4.0;
6977 C : Character := '5';
6978 X : Integer := 6;
6979 A : Character := 'J';
828d5846
XR
6980 end record;
6981
6982 Let's say we now have a variable declared and initialized as follow:
6983
6984 TC : Top_A := new Bottom_T;
6985
6986 And then we use this variable to call this function
6987
6988 procedure Assign (Obj: in out Top_T; TV : Integer);
6989
6990 as follow:
6991
6992 Assign (Top_T (B), 12);
6993
6994 Now, we're in the debugger, and we're inside that procedure
6995 then and we want to print the value of obj.c:
6996
6997 Usually, the tagged record or one of the parent type owns the
6998 component to print and there's no issue but in this particular
6999 case, what does it mean to ask for Obj.C? Since the actual
7000 type for object is type Bottom_T, it could mean two things: type
7001 component C from the Middle_T view, but also component C from
7002 Bottom_T. So in that "undefined" case, when the component is
7003 not found in the non-resolved type (which includes all the
7004 components of the parent type), then resolve it and see if we
7005 get better luck once expanded.
7006
7007 In the case of homonyms in the derived tagged type, we don't
7008 guaranty anything, and pick the one that's easiest for us
7009 to program.
7010
0963b4bd 7011 Returns 1 if found, 0 otherwise. */
52ce6436 7012
4c4b4cd2 7013static int
0d5cff50 7014find_struct_field (const char *name, struct type *type, int offset,
dda83cd7
SM
7015 struct type **field_type_p,
7016 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
52ce6436 7017 int *index_p)
4c4b4cd2
PH
7018{
7019 int i;
828d5846 7020 int parent_offset = -1;
4c4b4cd2 7021
61ee279c 7022 type = ada_check_typedef (type);
76a01679 7023
52ce6436
PH
7024 if (field_type_p != NULL)
7025 *field_type_p = NULL;
7026 if (byte_offset_p != NULL)
d5d6fca5 7027 *byte_offset_p = 0;
52ce6436
PH
7028 if (bit_offset_p != NULL)
7029 *bit_offset_p = 0;
7030 if (bit_size_p != NULL)
7031 *bit_size_p = 0;
7032
1f704f76 7033 for (i = 0; i < type->num_fields (); i += 1)
4c4b4cd2
PH
7034 {
7035 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7036 int fld_offset = offset + bit_pos / 8;
0d5cff50 7037 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7038
4c4b4cd2 7039 if (t_field_name == NULL)
dda83cd7 7040 continue;
4c4b4cd2 7041
828d5846 7042 else if (ada_is_parent_field (type, i))
dda83cd7 7043 {
828d5846
XR
7044 /* This is a field pointing us to the parent type of a tagged
7045 type. As hinted in this function's documentation, we give
7046 preference to fields in the current record first, so what
7047 we do here is just record the index of this field before
7048 we skip it. If it turns out we couldn't find our field
7049 in the current record, then we'll get back to it and search
7050 inside it whether the field might exist in the parent. */
7051
dda83cd7
SM
7052 parent_offset = i;
7053 continue;
7054 }
828d5846 7055
52ce6436 7056 else if (name != NULL && field_name_match (t_field_name, name))
dda83cd7
SM
7057 {
7058 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7059
52ce6436 7060 if (field_type_p != NULL)
940da03e 7061 *field_type_p = type->field (i).type ();
52ce6436
PH
7062 if (byte_offset_p != NULL)
7063 *byte_offset_p = fld_offset;
7064 if (bit_offset_p != NULL)
7065 *bit_offset_p = bit_pos % 8;
7066 if (bit_size_p != NULL)
7067 *bit_size_p = bit_size;
dda83cd7
SM
7068 return 1;
7069 }
4c4b4cd2 7070 else if (ada_is_wrapper_field (type, i))
dda83cd7 7071 {
940da03e 7072 if (find_struct_field (name, type->field (i).type (), fld_offset,
52ce6436
PH
7073 field_type_p, byte_offset_p, bit_offset_p,
7074 bit_size_p, index_p))
dda83cd7
SM
7075 return 1;
7076 }
4c4b4cd2 7077 else if (ada_is_variant_part (type, i))
dda83cd7 7078 {
52ce6436
PH
7079 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7080 fixed type?? */
dda83cd7
SM
7081 int j;
7082 struct type *field_type
940da03e 7083 = ada_check_typedef (type->field (i).type ());
4c4b4cd2 7084
dda83cd7
SM
7085 for (j = 0; j < field_type->num_fields (); j += 1)
7086 {
7087 if (find_struct_field (name, field_type->field (j).type (),
7088 fld_offset
7089 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7090 field_type_p, byte_offset_p,
7091 bit_offset_p, bit_size_p, index_p))
7092 return 1;
7093 }
7094 }
52ce6436
PH
7095 else if (index_p != NULL)
7096 *index_p += 1;
4c4b4cd2 7097 }
828d5846
XR
7098
7099 /* Field not found so far. If this is a tagged type which
7100 has a parent, try finding that field in the parent now. */
7101
7102 if (parent_offset != -1)
7103 {
7104 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7105 int fld_offset = offset + bit_pos / 8;
7106
940da03e 7107 if (find_struct_field (name, type->field (parent_offset).type (),
dda83cd7
SM
7108 fld_offset, field_type_p, byte_offset_p,
7109 bit_offset_p, bit_size_p, index_p))
7110 return 1;
828d5846
XR
7111 }
7112
4c4b4cd2
PH
7113 return 0;
7114}
7115
0963b4bd 7116/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7117
52ce6436
PH
7118static int
7119num_visible_fields (struct type *type)
7120{
7121 int n;
5b4ee69b 7122
52ce6436
PH
7123 n = 0;
7124 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7125 return n;
7126}
14f9c5c9 7127
4c4b4cd2 7128/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7129 and search in it assuming it has (class) type TYPE.
7130 If found, return value, else return NULL.
7131
828d5846
XR
7132 Searches recursively through wrapper fields (e.g., '_parent').
7133
7134 In the case of homonyms in the tagged types, please refer to the
7135 long explanation in find_struct_field's function documentation. */
14f9c5c9 7136
4c4b4cd2 7137static struct value *
108d56a4 7138ada_search_struct_field (const char *name, struct value *arg, int offset,
dda83cd7 7139 struct type *type)
14f9c5c9
AS
7140{
7141 int i;
828d5846 7142 int parent_offset = -1;
14f9c5c9 7143
5b4ee69b 7144 type = ada_check_typedef (type);
1f704f76 7145 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 7146 {
0d5cff50 7147 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7148
7149 if (t_field_name == NULL)
dda83cd7 7150 continue;
14f9c5c9 7151
828d5846 7152 else if (ada_is_parent_field (type, i))
dda83cd7 7153 {
828d5846
XR
7154 /* This is a field pointing us to the parent type of a tagged
7155 type. As hinted in this function's documentation, we give
7156 preference to fields in the current record first, so what
7157 we do here is just record the index of this field before
7158 we skip it. If it turns out we couldn't find our field
7159 in the current record, then we'll get back to it and search
7160 inside it whether the field might exist in the parent. */
7161
dda83cd7
SM
7162 parent_offset = i;
7163 continue;
7164 }
828d5846 7165
14f9c5c9 7166 else if (field_name_match (t_field_name, name))
dda83cd7 7167 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7168
7169 else if (ada_is_wrapper_field (type, i))
dda83cd7
SM
7170 {
7171 struct value *v = /* Do not let indent join lines here. */
7172 ada_search_struct_field (name, arg,
7173 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7174 type->field (i).type ());
5b4ee69b 7175
dda83cd7
SM
7176 if (v != NULL)
7177 return v;
7178 }
14f9c5c9
AS
7179
7180 else if (ada_is_variant_part (type, i))
dda83cd7 7181 {
0963b4bd 7182 /* PNH: Do we ever get here? See find_struct_field. */
dda83cd7
SM
7183 int j;
7184 struct type *field_type = ada_check_typedef (type->field (i).type ());
7185 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
4c4b4cd2 7186
dda83cd7
SM
7187 for (j = 0; j < field_type->num_fields (); j += 1)
7188 {
7189 struct value *v = ada_search_struct_field /* Force line
0963b4bd 7190 break. */
dda83cd7
SM
7191 (name, arg,
7192 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7193 field_type->field (j).type ());
5b4ee69b 7194
dda83cd7
SM
7195 if (v != NULL)
7196 return v;
7197 }
7198 }
14f9c5c9 7199 }
828d5846
XR
7200
7201 /* Field not found so far. If this is a tagged type which
7202 has a parent, try finding that field in the parent now. */
7203
7204 if (parent_offset != -1)
7205 {
7206 struct value *v = ada_search_struct_field (
7207 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
940da03e 7208 type->field (parent_offset).type ());
828d5846
XR
7209
7210 if (v != NULL)
dda83cd7 7211 return v;
828d5846
XR
7212 }
7213
14f9c5c9
AS
7214 return NULL;
7215}
d2e4a39e 7216
52ce6436
PH
7217static struct value *ada_index_struct_field_1 (int *, struct value *,
7218 int, struct type *);
7219
7220
7221/* Return field #INDEX in ARG, where the index is that returned by
7222 * find_struct_field through its INDEX_P argument. Adjust the address
7223 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7224 * If found, return value, else return NULL. */
52ce6436
PH
7225
7226static struct value *
7227ada_index_struct_field (int index, struct value *arg, int offset,
7228 struct type *type)
7229{
7230 return ada_index_struct_field_1 (&index, arg, offset, type);
7231}
7232
7233
7234/* Auxiliary function for ada_index_struct_field. Like
7235 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7236 * *INDEX_P. */
52ce6436
PH
7237
7238static struct value *
7239ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7240 struct type *type)
7241{
7242 int i;
7243 type = ada_check_typedef (type);
7244
1f704f76 7245 for (i = 0; i < type->num_fields (); i += 1)
52ce6436
PH
7246 {
7247 if (TYPE_FIELD_NAME (type, i) == NULL)
dda83cd7 7248 continue;
52ce6436 7249 else if (ada_is_wrapper_field (type, i))
dda83cd7
SM
7250 {
7251 struct value *v = /* Do not let indent join lines here. */
7252 ada_index_struct_field_1 (index_p, arg,
52ce6436 7253 offset + TYPE_FIELD_BITPOS (type, i) / 8,
940da03e 7254 type->field (i).type ());
5b4ee69b 7255
dda83cd7
SM
7256 if (v != NULL)
7257 return v;
7258 }
52ce6436
PH
7259
7260 else if (ada_is_variant_part (type, i))
dda83cd7 7261 {
52ce6436 7262 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7263 find_struct_field. */
52ce6436 7264 error (_("Cannot assign this kind of variant record"));
dda83cd7 7265 }
52ce6436 7266 else if (*index_p == 0)
dda83cd7 7267 return ada_value_primitive_field (arg, offset, i, type);
52ce6436
PH
7268 else
7269 *index_p -= 1;
7270 }
7271 return NULL;
7272}
7273
3b4de39c 7274/* Return a string representation of type TYPE. */
99bbb428 7275
3b4de39c 7276static std::string
99bbb428
PA
7277type_as_string (struct type *type)
7278{
d7e74731 7279 string_file tmp_stream;
99bbb428 7280
d7e74731 7281 type_print (type, "", &tmp_stream, -1);
99bbb428 7282
d7e74731 7283 return std::move (tmp_stream.string ());
99bbb428
PA
7284}
7285
14f9c5c9 7286/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7287 If DISPP is non-null, add its byte displacement from the beginning of a
7288 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7289 work for packed fields).
7290
7291 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7292 followed by "___".
14f9c5c9 7293
0963b4bd 7294 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7295 be a (pointer or reference)+ to a struct or union, and the
7296 ultimate target type will be searched.
14f9c5c9
AS
7297
7298 Looks recursively into variant clauses and parent types.
7299
828d5846
XR
7300 In the case of homonyms in the tagged types, please refer to the
7301 long explanation in find_struct_field's function documentation.
7302
4c4b4cd2
PH
7303 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7304 TYPE is not a type of the right kind. */
14f9c5c9 7305
4c4b4cd2 7306static struct type *
a121b7c1 7307ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
dda83cd7 7308 int noerr)
14f9c5c9
AS
7309{
7310 int i;
828d5846 7311 int parent_offset = -1;
14f9c5c9
AS
7312
7313 if (name == NULL)
7314 goto BadName;
7315
76a01679 7316 if (refok && type != NULL)
4c4b4cd2
PH
7317 while (1)
7318 {
dda83cd7
SM
7319 type = ada_check_typedef (type);
7320 if (type->code () != TYPE_CODE_PTR && type->code () != TYPE_CODE_REF)
7321 break;
7322 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7323 }
14f9c5c9 7324
76a01679 7325 if (type == NULL
78134374
SM
7326 || (type->code () != TYPE_CODE_STRUCT
7327 && type->code () != TYPE_CODE_UNION))
14f9c5c9 7328 {
4c4b4cd2 7329 if (noerr)
dda83cd7 7330 return NULL;
99bbb428 7331
3b4de39c
PA
7332 error (_("Type %s is not a structure or union type"),
7333 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7334 }
7335
7336 type = to_static_fixed_type (type);
7337
1f704f76 7338 for (i = 0; i < type->num_fields (); i += 1)
14f9c5c9 7339 {
0d5cff50 7340 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7341 struct type *t;
d2e4a39e 7342
14f9c5c9 7343 if (t_field_name == NULL)
dda83cd7 7344 continue;
14f9c5c9 7345
828d5846 7346 else if (ada_is_parent_field (type, i))
dda83cd7 7347 {
828d5846
XR
7348 /* This is a field pointing us to the parent type of a tagged
7349 type. As hinted in this function's documentation, we give
7350 preference to fields in the current record first, so what
7351 we do here is just record the index of this field before
7352 we skip it. If it turns out we couldn't find our field
7353 in the current record, then we'll get back to it and search
7354 inside it whether the field might exist in the parent. */
7355
dda83cd7
SM
7356 parent_offset = i;
7357 continue;
7358 }
828d5846 7359
14f9c5c9 7360 else if (field_name_match (t_field_name, name))
940da03e 7361 return type->field (i).type ();
14f9c5c9
AS
7362
7363 else if (ada_is_wrapper_field (type, i))
dda83cd7
SM
7364 {
7365 t = ada_lookup_struct_elt_type (type->field (i).type (), name,
7366 0, 1);
7367 if (t != NULL)
988f6b3d 7368 return t;
dda83cd7 7369 }
14f9c5c9
AS
7370
7371 else if (ada_is_variant_part (type, i))
dda83cd7
SM
7372 {
7373 int j;
7374 struct type *field_type = ada_check_typedef (type->field (i).type ());
4c4b4cd2 7375
dda83cd7
SM
7376 for (j = field_type->num_fields () - 1; j >= 0; j -= 1)
7377 {
b1f33ddd 7378 /* FIXME pnh 2008/01/26: We check for a field that is
dda83cd7 7379 NOT wrapped in a struct, since the compiler sometimes
b1f33ddd 7380 generates these for unchecked variant types. Revisit
dda83cd7 7381 if the compiler changes this practice. */
0d5cff50 7382 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7383
b1f33ddd
JB
7384 if (v_field_name != NULL
7385 && field_name_match (v_field_name, name))
940da03e 7386 t = field_type->field (j).type ();
b1f33ddd 7387 else
940da03e 7388 t = ada_lookup_struct_elt_type (field_type->field (j).type (),
988f6b3d 7389 name, 0, 1);
b1f33ddd 7390
dda83cd7 7391 if (t != NULL)
988f6b3d 7392 return t;
dda83cd7
SM
7393 }
7394 }
14f9c5c9
AS
7395
7396 }
7397
828d5846
XR
7398 /* Field not found so far. If this is a tagged type which
7399 has a parent, try finding that field in the parent now. */
7400
7401 if (parent_offset != -1)
7402 {
dda83cd7 7403 struct type *t;
828d5846 7404
dda83cd7
SM
7405 t = ada_lookup_struct_elt_type (type->field (parent_offset).type (),
7406 name, 0, 1);
7407 if (t != NULL)
828d5846
XR
7408 return t;
7409 }
7410
14f9c5c9 7411BadName:
d2e4a39e 7412 if (!noerr)
14f9c5c9 7413 {
2b2798cc 7414 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7415
7416 error (_("Type %s has no component named %s"),
3b4de39c 7417 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7418 }
7419
7420 return NULL;
7421}
7422
b1f33ddd
JB
7423/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7424 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7425 represents an unchecked union (that is, the variant part of a
0963b4bd 7426 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7427
7428static int
7429is_unchecked_variant (struct type *var_type, struct type *outer_type)
7430{
a121b7c1 7431 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7432
988f6b3d 7433 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7434}
7435
7436
14f9c5c9 7437/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
d8af9068 7438 within OUTER, determine which variant clause (field number in VAR_TYPE,
4c4b4cd2 7439 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7440
d2e4a39e 7441int
d8af9068 7442ada_which_variant_applies (struct type *var_type, struct value *outer)
14f9c5c9
AS
7443{
7444 int others_clause;
7445 int i;
a121b7c1 7446 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816 7447 struct value *discrim;
14f9c5c9
AS
7448 LONGEST discrim_val;
7449
012370f6
TT
7450 /* Using plain value_from_contents_and_address here causes problems
7451 because we will end up trying to resolve a type that is currently
7452 being constructed. */
0c281816
JB
7453 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7454 if (discrim == NULL)
14f9c5c9 7455 return -1;
0c281816 7456 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7457
7458 others_clause = -1;
1f704f76 7459 for (i = 0; i < var_type->num_fields (); i += 1)
14f9c5c9
AS
7460 {
7461 if (ada_is_others_clause (var_type, i))
dda83cd7 7462 others_clause = i;
14f9c5c9 7463 else if (ada_in_variant (discrim_val, var_type, i))
dda83cd7 7464 return i;
14f9c5c9
AS
7465 }
7466
7467 return others_clause;
7468}
d2e4a39e 7469\f
14f9c5c9
AS
7470
7471
dda83cd7 7472 /* Dynamic-Sized Records */
14f9c5c9
AS
7473
7474/* Strategy: The type ostensibly attached to a value with dynamic size
7475 (i.e., a size that is not statically recorded in the debugging
7476 data) does not accurately reflect the size or layout of the value.
7477 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7478 conventional types that are constructed on the fly. */
14f9c5c9
AS
7479
7480/* There is a subtle and tricky problem here. In general, we cannot
7481 determine the size of dynamic records without its data. However,
7482 the 'struct value' data structure, which GDB uses to represent
7483 quantities in the inferior process (the target), requires the size
7484 of the type at the time of its allocation in order to reserve space
7485 for GDB's internal copy of the data. That's why the
7486 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7487 rather than struct value*s.
14f9c5c9
AS
7488
7489 However, GDB's internal history variables ($1, $2, etc.) are
7490 struct value*s containing internal copies of the data that are not, in
7491 general, the same as the data at their corresponding addresses in
7492 the target. Fortunately, the types we give to these values are all
7493 conventional, fixed-size types (as per the strategy described
7494 above), so that we don't usually have to perform the
7495 'to_fixed_xxx_type' conversions to look at their values.
7496 Unfortunately, there is one exception: if one of the internal
7497 history variables is an array whose elements are unconstrained
7498 records, then we will need to create distinct fixed types for each
7499 element selected. */
7500
7501/* The upshot of all of this is that many routines take a (type, host
7502 address, target address) triple as arguments to represent a value.
7503 The host address, if non-null, is supposed to contain an internal
7504 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7505 target at the target address. */
14f9c5c9
AS
7506
7507/* Assuming that VAL0 represents a pointer value, the result of
7508 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7509 dynamic-sized types. */
14f9c5c9 7510
d2e4a39e
AS
7511struct value *
7512ada_value_ind (struct value *val0)
14f9c5c9 7513{
c48db5ca 7514 struct value *val = value_ind (val0);
5b4ee69b 7515
b50d69b5
JG
7516 if (ada_is_tagged_type (value_type (val), 0))
7517 val = ada_tag_value_at_base_address (val);
7518
4c4b4cd2 7519 return ada_to_fixed_value (val);
14f9c5c9
AS
7520}
7521
7522/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7523 qualifiers on VAL0. */
7524
d2e4a39e
AS
7525static struct value *
7526ada_coerce_ref (struct value *val0)
7527{
78134374 7528 if (value_type (val0)->code () == TYPE_CODE_REF)
d2e4a39e
AS
7529 {
7530 struct value *val = val0;
5b4ee69b 7531
994b9211 7532 val = coerce_ref (val);
b50d69b5
JG
7533
7534 if (ada_is_tagged_type (value_type (val), 0))
7535 val = ada_tag_value_at_base_address (val);
7536
4c4b4cd2 7537 return ada_to_fixed_value (val);
d2e4a39e
AS
7538 }
7539 else
14f9c5c9
AS
7540 return val0;
7541}
7542
4c4b4cd2 7543/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7544
7545static unsigned int
ebf56fd3 7546field_alignment (struct type *type, int f)
14f9c5c9 7547{
d2e4a39e 7548 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7549 int len;
14f9c5c9
AS
7550 int align_offset;
7551
64a1bf19
JB
7552 /* The field name should never be null, unless the debugging information
7553 is somehow malformed. In this case, we assume the field does not
7554 require any alignment. */
7555 if (name == NULL)
7556 return 1;
7557
7558 len = strlen (name);
7559
4c4b4cd2
PH
7560 if (!isdigit (name[len - 1]))
7561 return 1;
14f9c5c9 7562
d2e4a39e 7563 if (isdigit (name[len - 2]))
14f9c5c9
AS
7564 align_offset = len - 2;
7565 else
7566 align_offset = len - 1;
7567
61012eef 7568 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7569 return TARGET_CHAR_BIT;
7570
4c4b4cd2
PH
7571 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7572}
7573
852dff6c 7574/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7575
852dff6c
JB
7576static struct symbol *
7577ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7578{
7579 struct symbol *sym;
7580
7581 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7582 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7583 return sym;
7584
4186eb54
KS
7585 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7586 return sym;
14f9c5c9
AS
7587}
7588
dddfab26
UW
7589/* Find a type named NAME. Ignores ambiguity. This routine will look
7590 solely for types defined by debug info, it will not search the GDB
7591 primitive types. */
4c4b4cd2 7592
852dff6c 7593static struct type *
ebf56fd3 7594ada_find_any_type (const char *name)
14f9c5c9 7595{
852dff6c 7596 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7597
14f9c5c9 7598 if (sym != NULL)
dddfab26 7599 return SYMBOL_TYPE (sym);
14f9c5c9 7600
dddfab26 7601 return NULL;
14f9c5c9
AS
7602}
7603
739593e0
JB
7604/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7605 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7606 symbol, in which case it is returned. Otherwise, this looks for
7607 symbols whose name is that of NAME_SYM suffixed with "___XR".
7608 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7609
c0e70c62
TT
7610static bool
7611ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7612{
987012b8 7613 const char *name = name_sym->linkage_name ();
c0e70c62 7614 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7615}
7616
14f9c5c9 7617/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7618 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7619 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7620 otherwise return 0. */
7621
14f9c5c9 7622int
d2e4a39e 7623ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7624{
7625 if (type1 == NULL)
7626 return 1;
7627 else if (type0 == NULL)
7628 return 0;
78134374 7629 else if (type1->code () == TYPE_CODE_VOID)
14f9c5c9 7630 return 1;
78134374 7631 else if (type0->code () == TYPE_CODE_VOID)
14f9c5c9 7632 return 0;
7d93a1e0 7633 else if (type1->name () == NULL && type0->name () != NULL)
4c4b4cd2 7634 return 1;
ad82864c 7635 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7636 return 1;
4c4b4cd2 7637 else if (ada_is_array_descriptor_type (type0)
dda83cd7 7638 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7639 return 1;
aeb5907d
JB
7640 else
7641 {
7d93a1e0
SM
7642 const char *type0_name = type0->name ();
7643 const char *type1_name = type1->name ();
aeb5907d
JB
7644
7645 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7646 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7647 return 1;
7648 }
14f9c5c9
AS
7649 return 0;
7650}
7651
e86ca25f
TT
7652/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7653 null. */
4c4b4cd2 7654
0d5cff50 7655const char *
d2e4a39e 7656ada_type_name (struct type *type)
14f9c5c9 7657{
d2e4a39e 7658 if (type == NULL)
14f9c5c9 7659 return NULL;
7d93a1e0 7660 return type->name ();
14f9c5c9
AS
7661}
7662
b4ba55a1
JB
7663/* Search the list of "descriptive" types associated to TYPE for a type
7664 whose name is NAME. */
7665
7666static struct type *
7667find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7668{
931e5bc3 7669 struct type *result, *tmp;
b4ba55a1 7670
c6044dd1
JB
7671 if (ada_ignore_descriptive_types_p)
7672 return NULL;
7673
b4ba55a1
JB
7674 /* If there no descriptive-type info, then there is no parallel type
7675 to be found. */
7676 if (!HAVE_GNAT_AUX_INFO (type))
7677 return NULL;
7678
7679 result = TYPE_DESCRIPTIVE_TYPE (type);
7680 while (result != NULL)
7681 {
0d5cff50 7682 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7683
7684 if (result_name == NULL)
dda83cd7
SM
7685 {
7686 warning (_("unexpected null name on descriptive type"));
7687 return NULL;
7688 }
b4ba55a1
JB
7689
7690 /* If the names match, stop. */
7691 if (strcmp (result_name, name) == 0)
7692 break;
7693
7694 /* Otherwise, look at the next item on the list, if any. */
7695 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7696 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7697 else
7698 tmp = NULL;
7699
7700 /* If not found either, try after having resolved the typedef. */
7701 if (tmp != NULL)
7702 result = tmp;
b4ba55a1 7703 else
931e5bc3 7704 {
f168693b 7705 result = check_typedef (result);
931e5bc3
JG
7706 if (HAVE_GNAT_AUX_INFO (result))
7707 result = TYPE_DESCRIPTIVE_TYPE (result);
7708 else
7709 result = NULL;
7710 }
b4ba55a1
JB
7711 }
7712
7713 /* If we didn't find a match, see whether this is a packed array. With
7714 older compilers, the descriptive type information is either absent or
7715 irrelevant when it comes to packed arrays so the above lookup fails.
7716 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7717 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7718 return ada_find_any_type (name);
7719
7720 return result;
7721}
7722
7723/* Find a parallel type to TYPE with the specified NAME, using the
7724 descriptive type taken from the debugging information, if available,
7725 and otherwise using the (slower) name-based method. */
7726
7727static struct type *
7728ada_find_parallel_type_with_name (struct type *type, const char *name)
7729{
7730 struct type *result = NULL;
7731
7732 if (HAVE_GNAT_AUX_INFO (type))
7733 result = find_parallel_type_by_descriptive_type (type, name);
7734 else
7735 result = ada_find_any_type (name);
7736
7737 return result;
7738}
7739
7740/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7741 SUFFIX to the name of TYPE. */
14f9c5c9 7742
d2e4a39e 7743struct type *
ebf56fd3 7744ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7745{
0d5cff50 7746 char *name;
fe978cb0 7747 const char *type_name = ada_type_name (type);
14f9c5c9 7748 int len;
d2e4a39e 7749
fe978cb0 7750 if (type_name == NULL)
14f9c5c9
AS
7751 return NULL;
7752
fe978cb0 7753 len = strlen (type_name);
14f9c5c9 7754
b4ba55a1 7755 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7756
fe978cb0 7757 strcpy (name, type_name);
14f9c5c9
AS
7758 strcpy (name + len, suffix);
7759
b4ba55a1 7760 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7761}
7762
14f9c5c9 7763/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7764 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7765
d2e4a39e
AS
7766static struct type *
7767dynamic_template_type (struct type *type)
14f9c5c9 7768{
61ee279c 7769 type = ada_check_typedef (type);
14f9c5c9 7770
78134374 7771 if (type == NULL || type->code () != TYPE_CODE_STRUCT
d2e4a39e 7772 || ada_type_name (type) == NULL)
14f9c5c9 7773 return NULL;
d2e4a39e 7774 else
14f9c5c9
AS
7775 {
7776 int len = strlen (ada_type_name (type));
5b4ee69b 7777
4c4b4cd2 7778 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
dda83cd7 7779 return type;
14f9c5c9 7780 else
dda83cd7 7781 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7782 }
7783}
7784
7785/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7786 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7787
d2e4a39e
AS
7788static int
7789is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7790{
7791 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7792
d2e4a39e 7793 return name != NULL
940da03e 7794 && templ_type->field (field_num).type ()->code () == TYPE_CODE_PTR
14f9c5c9
AS
7795 && strstr (name, "___XVL") != NULL;
7796}
7797
4c4b4cd2
PH
7798/* The index of the variant field of TYPE, or -1 if TYPE does not
7799 represent a variant record type. */
14f9c5c9 7800
d2e4a39e 7801static int
4c4b4cd2 7802variant_field_index (struct type *type)
14f9c5c9
AS
7803{
7804 int f;
7805
78134374 7806 if (type == NULL || type->code () != TYPE_CODE_STRUCT)
4c4b4cd2
PH
7807 return -1;
7808
1f704f76 7809 for (f = 0; f < type->num_fields (); f += 1)
4c4b4cd2
PH
7810 {
7811 if (ada_is_variant_part (type, f))
dda83cd7 7812 return f;
4c4b4cd2
PH
7813 }
7814 return -1;
14f9c5c9
AS
7815}
7816
4c4b4cd2
PH
7817/* A record type with no fields. */
7818
d2e4a39e 7819static struct type *
fe978cb0 7820empty_record (struct type *templ)
14f9c5c9 7821{
fe978cb0 7822 struct type *type = alloc_type_copy (templ);
5b4ee69b 7823
67607e24 7824 type->set_code (TYPE_CODE_STRUCT);
8ecb59f8 7825 INIT_NONE_SPECIFIC (type);
d0e39ea2 7826 type->set_name ("<empty>");
14f9c5c9
AS
7827 TYPE_LENGTH (type) = 0;
7828 return type;
7829}
7830
7831/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7832 the value of type TYPE at VALADDR or ADDRESS (see comments at
7833 the beginning of this section) VAL according to GNAT conventions.
7834 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7835 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7836 an outer-level type (i.e., as opposed to a branch of a variant.) A
7837 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7838 of the variant.
14f9c5c9 7839
4c4b4cd2
PH
7840 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7841 length are not statically known are discarded. As a consequence,
7842 VALADDR, ADDRESS and DVAL0 are ignored.
7843
7844 NOTE: Limitations: For now, we assume that dynamic fields and
7845 variants occupy whole numbers of bytes. However, they need not be
7846 byte-aligned. */
7847
7848struct type *
10a2c479 7849ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7850 const gdb_byte *valaddr,
dda83cd7
SM
7851 CORE_ADDR address, struct value *dval0,
7852 int keep_dynamic_fields)
14f9c5c9 7853{
d2e4a39e
AS
7854 struct value *mark = value_mark ();
7855 struct value *dval;
7856 struct type *rtype;
14f9c5c9 7857 int nfields, bit_len;
4c4b4cd2 7858 int variant_field;
14f9c5c9 7859 long off;
d94e4f4f 7860 int fld_bit_len;
14f9c5c9
AS
7861 int f;
7862
4c4b4cd2
PH
7863 /* Compute the number of fields in this record type that are going
7864 to be processed: unless keep_dynamic_fields, this includes only
7865 fields whose position and length are static will be processed. */
7866 if (keep_dynamic_fields)
1f704f76 7867 nfields = type->num_fields ();
4c4b4cd2
PH
7868 else
7869 {
7870 nfields = 0;
1f704f76 7871 while (nfields < type->num_fields ()
dda83cd7
SM
7872 && !ada_is_variant_part (type, nfields)
7873 && !is_dynamic_field (type, nfields))
7874 nfields++;
4c4b4cd2
PH
7875 }
7876
e9bb382b 7877 rtype = alloc_type_copy (type);
67607e24 7878 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 7879 INIT_NONE_SPECIFIC (rtype);
5e33d5f4 7880 rtype->set_num_fields (nfields);
3cabb6b0
SM
7881 rtype->set_fields
7882 ((struct field *) TYPE_ZALLOC (rtype, nfields * sizeof (struct field)));
d0e39ea2 7883 rtype->set_name (ada_type_name (type));
9cdd0d12 7884 rtype->set_is_fixed_instance (true);
14f9c5c9 7885
d2e4a39e
AS
7886 off = 0;
7887 bit_len = 0;
4c4b4cd2
PH
7888 variant_field = -1;
7889
14f9c5c9
AS
7890 for (f = 0; f < nfields; f += 1)
7891 {
a89febbd 7892 off = align_up (off, field_alignment (type, f))
6c038f32 7893 + TYPE_FIELD_BITPOS (type, f);
ceacbf6e 7894 SET_FIELD_BITPOS (rtype->field (f), off);
d2e4a39e 7895 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7896
d2e4a39e 7897 if (ada_is_variant_part (type, f))
dda83cd7
SM
7898 {
7899 variant_field = f;
7900 fld_bit_len = 0;
7901 }
14f9c5c9 7902 else if (is_dynamic_field (type, f))
dda83cd7 7903 {
284614f0
JB
7904 const gdb_byte *field_valaddr = valaddr;
7905 CORE_ADDR field_address = address;
7906 struct type *field_type =
940da03e 7907 TYPE_TARGET_TYPE (type->field (f).type ());
284614f0 7908
dda83cd7 7909 if (dval0 == NULL)
b5304971
JG
7910 {
7911 /* rtype's length is computed based on the run-time
7912 value of discriminants. If the discriminants are not
7913 initialized, the type size may be completely bogus and
0963b4bd 7914 GDB may fail to allocate a value for it. So check the
b5304971 7915 size first before creating the value. */
c1b5a1a6 7916 ada_ensure_varsize_limit (rtype);
012370f6
TT
7917 /* Using plain value_from_contents_and_address here
7918 causes problems because we will end up trying to
7919 resolve a type that is currently being
7920 constructed. */
7921 dval = value_from_contents_and_address_unresolved (rtype,
7922 valaddr,
7923 address);
9f1f738a 7924 rtype = value_type (dval);
b5304971 7925 }
dda83cd7
SM
7926 else
7927 dval = dval0;
4c4b4cd2 7928
284614f0
JB
7929 /* If the type referenced by this field is an aligner type, we need
7930 to unwrap that aligner type, because its size might not be set.
7931 Keeping the aligner type would cause us to compute the wrong
7932 size for this field, impacting the offset of the all the fields
7933 that follow this one. */
7934 if (ada_is_aligner_type (field_type))
7935 {
7936 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
7937
7938 field_valaddr = cond_offset_host (field_valaddr, field_offset);
7939 field_address = cond_offset_target (field_address, field_offset);
7940 field_type = ada_aligned_type (field_type);
7941 }
7942
7943 field_valaddr = cond_offset_host (field_valaddr,
7944 off / TARGET_CHAR_BIT);
7945 field_address = cond_offset_target (field_address,
7946 off / TARGET_CHAR_BIT);
7947
7948 /* Get the fixed type of the field. Note that, in this case,
7949 we do not want to get the real type out of the tag: if
7950 the current field is the parent part of a tagged record,
7951 we will get the tag of the object. Clearly wrong: the real
7952 type of the parent is not the real type of the child. We
7953 would end up in an infinite loop. */
7954 field_type = ada_get_base_type (field_type);
7955 field_type = ada_to_fixed_type (field_type, field_valaddr,
7956 field_address, dval, 0);
27f2a97b
JB
7957 /* If the field size is already larger than the maximum
7958 object size, then the record itself will necessarily
7959 be larger than the maximum object size. We need to make
7960 this check now, because the size might be so ridiculously
7961 large (due to an uninitialized variable in the inferior)
7962 that it would cause an overflow when adding it to the
7963 record size. */
c1b5a1a6 7964 ada_ensure_varsize_limit (field_type);
284614f0 7965
5d14b6e5 7966 rtype->field (f).set_type (field_type);
dda83cd7 7967 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
7968 /* The multiplication can potentially overflow. But because
7969 the field length has been size-checked just above, and
7970 assuming that the maximum size is a reasonable value,
7971 an overflow should not happen in practice. So rather than
7972 adding overflow recovery code to this already complex code,
7973 we just assume that it's not going to happen. */
dda83cd7
SM
7974 fld_bit_len =
7975 TYPE_LENGTH (rtype->field (f).type ()) * TARGET_CHAR_BIT;
7976 }
14f9c5c9 7977 else
dda83cd7 7978 {
5ded5331
JB
7979 /* Note: If this field's type is a typedef, it is important
7980 to preserve the typedef layer.
7981
7982 Otherwise, we might be transforming a typedef to a fat
7983 pointer (encoding a pointer to an unconstrained array),
7984 into a basic fat pointer (encoding an unconstrained
7985 array). As both types are implemented using the same
7986 structure, the typedef is the only clue which allows us
7987 to distinguish between the two options. Stripping it
7988 would prevent us from printing this field appropriately. */
dda83cd7
SM
7989 rtype->field (f).set_type (type->field (f).type ());
7990 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
7991 if (TYPE_FIELD_BITSIZE (type, f) > 0)
7992 fld_bit_len =
7993 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
7994 else
5ded5331 7995 {
940da03e 7996 struct type *field_type = type->field (f).type ();
5ded5331
JB
7997
7998 /* We need to be careful of typedefs when computing
7999 the length of our field. If this is a typedef,
8000 get the length of the target type, not the length
8001 of the typedef. */
78134374 8002 if (field_type->code () == TYPE_CODE_TYPEDEF)
5ded5331
JB
8003 field_type = ada_typedef_target_type (field_type);
8004
dda83cd7
SM
8005 fld_bit_len =
8006 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
5ded5331 8007 }
dda83cd7 8008 }
14f9c5c9 8009 if (off + fld_bit_len > bit_len)
dda83cd7 8010 bit_len = off + fld_bit_len;
d94e4f4f 8011 off += fld_bit_len;
4c4b4cd2 8012 TYPE_LENGTH (rtype) =
dda83cd7 8013 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8014 }
4c4b4cd2
PH
8015
8016 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8017 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8018 the record. This can happen in the presence of representation
8019 clauses. */
8020 if (variant_field >= 0)
8021 {
8022 struct type *branch_type;
8023
8024 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8025
8026 if (dval0 == NULL)
9f1f738a 8027 {
012370f6
TT
8028 /* Using plain value_from_contents_and_address here causes
8029 problems because we will end up trying to resolve a type
8030 that is currently being constructed. */
8031 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8032 address);
9f1f738a
SA
8033 rtype = value_type (dval);
8034 }
4c4b4cd2 8035 else
dda83cd7 8036 dval = dval0;
4c4b4cd2
PH
8037
8038 branch_type =
dda83cd7
SM
8039 to_fixed_variant_branch_type
8040 (type->field (variant_field).type (),
8041 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8042 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
4c4b4cd2 8043 if (branch_type == NULL)
dda83cd7
SM
8044 {
8045 for (f = variant_field + 1; f < rtype->num_fields (); f += 1)
8046 rtype->field (f - 1) = rtype->field (f);
5e33d5f4 8047 rtype->set_num_fields (rtype->num_fields () - 1);
dda83cd7 8048 }
4c4b4cd2 8049 else
dda83cd7
SM
8050 {
8051 rtype->field (variant_field).set_type (branch_type);
8052 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8053 fld_bit_len =
8054 TYPE_LENGTH (rtype->field (variant_field).type ()) *
8055 TARGET_CHAR_BIT;
8056 if (off + fld_bit_len > bit_len)
8057 bit_len = off + fld_bit_len;
8058 TYPE_LENGTH (rtype) =
8059 align_up (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8060 }
4c4b4cd2
PH
8061 }
8062
714e53ab
PH
8063 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8064 should contain the alignment of that record, which should be a strictly
8065 positive value. If null or negative, then something is wrong, most
8066 probably in the debug info. In that case, we don't round up the size
0963b4bd 8067 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8068 the current RTYPE length might be good enough for our purposes. */
8069 if (TYPE_LENGTH (type) <= 0)
8070 {
7d93a1e0 8071 if (rtype->name ())
cc1defb1 8072 warning (_("Invalid type size for `%s' detected: %s."),
7d93a1e0 8073 rtype->name (), pulongest (TYPE_LENGTH (type)));
323e0a4a 8074 else
cc1defb1
KS
8075 warning (_("Invalid type size for <unnamed> detected: %s."),
8076 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8077 }
8078 else
8079 {
a89febbd
TT
8080 TYPE_LENGTH (rtype) = align_up (TYPE_LENGTH (rtype),
8081 TYPE_LENGTH (type));
714e53ab 8082 }
14f9c5c9
AS
8083
8084 value_free_to_mark (mark);
d2e4a39e 8085 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8086 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8087 return rtype;
8088}
8089
4c4b4cd2
PH
8090/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8091 of 1. */
14f9c5c9 8092
d2e4a39e 8093static struct type *
fc1a4b47 8094template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
dda83cd7 8095 CORE_ADDR address, struct value *dval0)
4c4b4cd2
PH
8096{
8097 return ada_template_to_fixed_record_type_1 (type, valaddr,
dda83cd7 8098 address, dval0, 1);
4c4b4cd2
PH
8099}
8100
8101/* An ordinary record type in which ___XVL-convention fields and
8102 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8103 static approximations, containing all possible fields. Uses
8104 no runtime values. Useless for use in values, but that's OK,
8105 since the results are used only for type determinations. Works on both
8106 structs and unions. Representation note: to save space, we memorize
8107 the result of this function in the TYPE_TARGET_TYPE of the
8108 template type. */
8109
8110static struct type *
8111template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8112{
8113 struct type *type;
8114 int nfields;
8115 int f;
8116
9e195661 8117 /* No need no do anything if the input type is already fixed. */
22c4c60c 8118 if (type0->is_fixed_instance ())
9e195661
PMR
8119 return type0;
8120
8121 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8122 if (TYPE_TARGET_TYPE (type0) != NULL)
8123 return TYPE_TARGET_TYPE (type0);
8124
9e195661 8125 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8126 type = type0;
1f704f76 8127 nfields = type0->num_fields ();
9e195661
PMR
8128
8129 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8130 recompute all over next time. */
8131 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8132
8133 for (f = 0; f < nfields; f += 1)
8134 {
940da03e 8135 struct type *field_type = type0->field (f).type ();
4c4b4cd2 8136 struct type *new_type;
14f9c5c9 8137
4c4b4cd2 8138 if (is_dynamic_field (type0, f))
460efde1
JB
8139 {
8140 field_type = ada_check_typedef (field_type);
dda83cd7 8141 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
460efde1 8142 }
14f9c5c9 8143 else
dda83cd7 8144 new_type = static_unwrap_type (field_type);
9e195661
PMR
8145
8146 if (new_type != field_type)
8147 {
8148 /* Clone TYPE0 only the first time we get a new field type. */
8149 if (type == type0)
8150 {
8151 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
78134374 8152 type->set_code (type0->code ());
8ecb59f8 8153 INIT_NONE_SPECIFIC (type);
5e33d5f4 8154 type->set_num_fields (nfields);
3cabb6b0
SM
8155
8156 field *fields =
8157 ((struct field *)
8158 TYPE_ALLOC (type, nfields * sizeof (struct field)));
80fc5e77 8159 memcpy (fields, type0->fields (),
9e195661 8160 sizeof (struct field) * nfields);
3cabb6b0
SM
8161 type->set_fields (fields);
8162
d0e39ea2 8163 type->set_name (ada_type_name (type0));
9cdd0d12 8164 type->set_is_fixed_instance (true);
9e195661
PMR
8165 TYPE_LENGTH (type) = 0;
8166 }
5d14b6e5 8167 type->field (f).set_type (new_type);
9e195661
PMR
8168 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8169 }
14f9c5c9 8170 }
9e195661 8171
14f9c5c9
AS
8172 return type;
8173}
8174
4c4b4cd2 8175/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8176 whose address in memory is ADDRESS, returns a revision of TYPE,
8177 which should be a non-dynamic-sized record, in which the variant
8178 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8179 for discriminant values in DVAL0, which can be NULL if the record
8180 contains the necessary discriminant values. */
8181
d2e4a39e 8182static struct type *
fc1a4b47 8183to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
dda83cd7 8184 CORE_ADDR address, struct value *dval0)
14f9c5c9 8185{
d2e4a39e 8186 struct value *mark = value_mark ();
4c4b4cd2 8187 struct value *dval;
d2e4a39e 8188 struct type *rtype;
14f9c5c9 8189 struct type *branch_type;
1f704f76 8190 int nfields = type->num_fields ();
4c4b4cd2 8191 int variant_field = variant_field_index (type);
14f9c5c9 8192
4c4b4cd2 8193 if (variant_field == -1)
14f9c5c9
AS
8194 return type;
8195
4c4b4cd2 8196 if (dval0 == NULL)
9f1f738a
SA
8197 {
8198 dval = value_from_contents_and_address (type, valaddr, address);
8199 type = value_type (dval);
8200 }
4c4b4cd2
PH
8201 else
8202 dval = dval0;
8203
e9bb382b 8204 rtype = alloc_type_copy (type);
67607e24 8205 rtype->set_code (TYPE_CODE_STRUCT);
8ecb59f8 8206 INIT_NONE_SPECIFIC (rtype);
5e33d5f4 8207 rtype->set_num_fields (nfields);
3cabb6b0
SM
8208
8209 field *fields =
d2e4a39e 8210 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
80fc5e77 8211 memcpy (fields, type->fields (), sizeof (struct field) * nfields);
3cabb6b0
SM
8212 rtype->set_fields (fields);
8213
d0e39ea2 8214 rtype->set_name (ada_type_name (type));
9cdd0d12 8215 rtype->set_is_fixed_instance (true);
14f9c5c9
AS
8216 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8217
4c4b4cd2 8218 branch_type = to_fixed_variant_branch_type
940da03e 8219 (type->field (variant_field).type (),
d2e4a39e 8220 cond_offset_host (valaddr,
dda83cd7
SM
8221 TYPE_FIELD_BITPOS (type, variant_field)
8222 / TARGET_CHAR_BIT),
d2e4a39e 8223 cond_offset_target (address,
dda83cd7
SM
8224 TYPE_FIELD_BITPOS (type, variant_field)
8225 / TARGET_CHAR_BIT), dval);
d2e4a39e 8226 if (branch_type == NULL)
14f9c5c9 8227 {
4c4b4cd2 8228 int f;
5b4ee69b 8229
4c4b4cd2 8230 for (f = variant_field + 1; f < nfields; f += 1)
dda83cd7 8231 rtype->field (f - 1) = rtype->field (f);
5e33d5f4 8232 rtype->set_num_fields (rtype->num_fields () - 1);
14f9c5c9
AS
8233 }
8234 else
8235 {
5d14b6e5 8236 rtype->field (variant_field).set_type (branch_type);
4c4b4cd2
PH
8237 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8238 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8239 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8240 }
940da03e 8241 TYPE_LENGTH (rtype) -= TYPE_LENGTH (type->field (variant_field).type ());
d2e4a39e 8242
4c4b4cd2 8243 value_free_to_mark (mark);
14f9c5c9
AS
8244 return rtype;
8245}
8246
8247/* An ordinary record type (with fixed-length fields) that describes
8248 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8249 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8250 should be in DVAL, a record value; it may be NULL if the object
8251 at ADDR itself contains any necessary discriminant values.
8252 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8253 values from the record are needed. Except in the case that DVAL,
8254 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8255 unchecked) is replaced by a particular branch of the variant.
8256
8257 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8258 is questionable and may be removed. It can arise during the
8259 processing of an unconstrained-array-of-record type where all the
8260 variant branches have exactly the same size. This is because in
8261 such cases, the compiler does not bother to use the XVS convention
8262 when encoding the record. I am currently dubious of this
8263 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8264
d2e4a39e 8265static struct type *
fc1a4b47 8266to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
dda83cd7 8267 CORE_ADDR address, struct value *dval)
14f9c5c9 8268{
d2e4a39e 8269 struct type *templ_type;
14f9c5c9 8270
22c4c60c 8271 if (type0->is_fixed_instance ())
4c4b4cd2
PH
8272 return type0;
8273
d2e4a39e 8274 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8275
8276 if (templ_type != NULL)
8277 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8278 else if (variant_field_index (type0) >= 0)
8279 {
8280 if (dval == NULL && valaddr == NULL && address == 0)
dda83cd7 8281 return type0;
4c4b4cd2 8282 return to_record_with_fixed_variant_part (type0, valaddr, address,
dda83cd7 8283 dval);
4c4b4cd2 8284 }
14f9c5c9
AS
8285 else
8286 {
9cdd0d12 8287 type0->set_is_fixed_instance (true);
14f9c5c9
AS
8288 return type0;
8289 }
8290
8291}
8292
8293/* An ordinary record type (with fixed-length fields) that describes
8294 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8295 union type. Any necessary discriminants' values should be in DVAL,
8296 a record value. That is, this routine selects the appropriate
8297 branch of the union at ADDR according to the discriminant value
b1f33ddd 8298 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8299 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8300
d2e4a39e 8301static struct type *
fc1a4b47 8302to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
dda83cd7 8303 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8304{
8305 int which;
d2e4a39e
AS
8306 struct type *templ_type;
8307 struct type *var_type;
14f9c5c9 8308
78134374 8309 if (var_type0->code () == TYPE_CODE_PTR)
14f9c5c9 8310 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8311 else
14f9c5c9
AS
8312 var_type = var_type0;
8313
8314 templ_type = ada_find_parallel_type (var_type, "___XVU");
8315
8316 if (templ_type != NULL)
8317 var_type = templ_type;
8318
b1f33ddd
JB
8319 if (is_unchecked_variant (var_type, value_type (dval)))
8320 return var_type0;
d8af9068 8321 which = ada_which_variant_applies (var_type, dval);
14f9c5c9
AS
8322
8323 if (which < 0)
e9bb382b 8324 return empty_record (var_type);
14f9c5c9 8325 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8326 return to_fixed_record_type
940da03e 8327 (TYPE_TARGET_TYPE (var_type->field (which).type ()),
d2e4a39e 8328 valaddr, address, dval);
940da03e 8329 else if (variant_field_index (var_type->field (which).type ()) >= 0)
d2e4a39e
AS
8330 return
8331 to_fixed_record_type
940da03e 8332 (var_type->field (which).type (), valaddr, address, dval);
14f9c5c9 8333 else
940da03e 8334 return var_type->field (which).type ();
14f9c5c9
AS
8335}
8336
8908fca5
JB
8337/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8338 ENCODING_TYPE, a type following the GNAT conventions for discrete
8339 type encodings, only carries redundant information. */
8340
8341static int
8342ada_is_redundant_range_encoding (struct type *range_type,
8343 struct type *encoding_type)
8344{
108d56a4 8345 const char *bounds_str;
8908fca5
JB
8346 int n;
8347 LONGEST lo, hi;
8348
78134374 8349 gdb_assert (range_type->code () == TYPE_CODE_RANGE);
8908fca5 8350
78134374
SM
8351 if (get_base_type (range_type)->code ()
8352 != get_base_type (encoding_type)->code ())
005e2509
JB
8353 {
8354 /* The compiler probably used a simple base type to describe
8355 the range type instead of the range's actual base type,
8356 expecting us to get the real base type from the encoding
8357 anyway. In this situation, the encoding cannot be ignored
8358 as redundant. */
8359 return 0;
8360 }
8361
8908fca5
JB
8362 if (is_dynamic_type (range_type))
8363 return 0;
8364
7d93a1e0 8365 if (encoding_type->name () == NULL)
8908fca5
JB
8366 return 0;
8367
7d93a1e0 8368 bounds_str = strstr (encoding_type->name (), "___XDLU_");
8908fca5
JB
8369 if (bounds_str == NULL)
8370 return 0;
8371
8372 n = 8; /* Skip "___XDLU_". */
8373 if (!ada_scan_number (bounds_str, n, &lo, &n))
8374 return 0;
5537ddd0 8375 if (range_type->bounds ()->low.const_val () != lo)
8908fca5
JB
8376 return 0;
8377
8378 n += 2; /* Skip the "__" separator between the two bounds. */
8379 if (!ada_scan_number (bounds_str, n, &hi, &n))
8380 return 0;
5537ddd0 8381 if (range_type->bounds ()->high.const_val () != hi)
8908fca5
JB
8382 return 0;
8383
8384 return 1;
8385}
8386
8387/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8388 a type following the GNAT encoding for describing array type
8389 indices, only carries redundant information. */
8390
8391static int
8392ada_is_redundant_index_type_desc (struct type *array_type,
8393 struct type *desc_type)
8394{
8395 struct type *this_layer = check_typedef (array_type);
8396 int i;
8397
1f704f76 8398 for (i = 0; i < desc_type->num_fields (); i++)
8908fca5 8399 {
3d967001 8400 if (!ada_is_redundant_range_encoding (this_layer->index_type (),
940da03e 8401 desc_type->field (i).type ()))
8908fca5
JB
8402 return 0;
8403 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8404 }
8405
8406 return 1;
8407}
8408
14f9c5c9
AS
8409/* Assuming that TYPE0 is an array type describing the type of a value
8410 at ADDR, and that DVAL describes a record containing any
8411 discriminants used in TYPE0, returns a type for the value that
8412 contains no dynamic components (that is, no components whose sizes
8413 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8414 true, gives an error message if the resulting type's size is over
4c4b4cd2 8415 varsize_limit. */
14f9c5c9 8416
d2e4a39e
AS
8417static struct type *
8418to_fixed_array_type (struct type *type0, struct value *dval,
dda83cd7 8419 int ignore_too_big)
14f9c5c9 8420{
d2e4a39e
AS
8421 struct type *index_type_desc;
8422 struct type *result;
ad82864c 8423 int constrained_packed_array_p;
931e5bc3 8424 static const char *xa_suffix = "___XA";
14f9c5c9 8425
b0dd7688 8426 type0 = ada_check_typedef (type0);
22c4c60c 8427 if (type0->is_fixed_instance ())
4c4b4cd2 8428 return type0;
14f9c5c9 8429
ad82864c
JB
8430 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8431 if (constrained_packed_array_p)
75fd6a26
TT
8432 {
8433 type0 = decode_constrained_packed_array_type (type0);
8434 if (type0 == nullptr)
8435 error (_("could not decode constrained packed array type"));
8436 }
284614f0 8437
931e5bc3
JG
8438 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8439
8440 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8441 encoding suffixed with 'P' may still be generated. If so,
8442 it should be used to find the XA type. */
8443
8444 if (index_type_desc == NULL)
8445 {
1da0522e 8446 const char *type_name = ada_type_name (type0);
931e5bc3 8447
1da0522e 8448 if (type_name != NULL)
931e5bc3 8449 {
1da0522e 8450 const int len = strlen (type_name);
931e5bc3
JG
8451 char *name = (char *) alloca (len + strlen (xa_suffix));
8452
1da0522e 8453 if (type_name[len - 1] == 'P')
931e5bc3 8454 {
1da0522e 8455 strcpy (name, type_name);
931e5bc3
JG
8456 strcpy (name + len - 1, xa_suffix);
8457 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8458 }
8459 }
8460 }
8461
28c85d6c 8462 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8463 if (index_type_desc != NULL
8464 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8465 {
8466 /* Ignore this ___XA parallel type, as it does not bring any
8467 useful information. This allows us to avoid creating fixed
8468 versions of the array's index types, which would be identical
8469 to the original ones. This, in turn, can also help avoid
8470 the creation of fixed versions of the array itself. */
8471 index_type_desc = NULL;
8472 }
8473
14f9c5c9
AS
8474 if (index_type_desc == NULL)
8475 {
61ee279c 8476 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8477
14f9c5c9 8478 /* NOTE: elt_type---the fixed version of elt_type0---should never
dda83cd7
SM
8479 depend on the contents of the array in properly constructed
8480 debugging data. */
529cad9c 8481 /* Create a fixed version of the array element type.
dda83cd7
SM
8482 We're not providing the address of an element here,
8483 and thus the actual object value cannot be inspected to do
8484 the conversion. This should not be a problem, since arrays of
8485 unconstrained objects are not allowed. In particular, all
8486 the elements of an array of a tagged type should all be of
8487 the same type specified in the debugging info. No need to
8488 consult the object tag. */
1ed6ede0 8489 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8490
284614f0
JB
8491 /* Make sure we always create a new array type when dealing with
8492 packed array types, since we're going to fix-up the array
8493 type length and element bitsize a little further down. */
ad82864c 8494 if (elt_type0 == elt_type && !constrained_packed_array_p)
dda83cd7 8495 result = type0;
14f9c5c9 8496 else
dda83cd7
SM
8497 result = create_array_type (alloc_type_copy (type0),
8498 elt_type, type0->index_type ());
14f9c5c9
AS
8499 }
8500 else
8501 {
8502 int i;
8503 struct type *elt_type0;
8504
8505 elt_type0 = type0;
1f704f76 8506 for (i = index_type_desc->num_fields (); i > 0; i -= 1)
dda83cd7 8507 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8508
8509 /* NOTE: result---the fixed version of elt_type0---should never
dda83cd7
SM
8510 depend on the contents of the array in properly constructed
8511 debugging data. */
529cad9c 8512 /* Create a fixed version of the array element type.
dda83cd7
SM
8513 We're not providing the address of an element here,
8514 and thus the actual object value cannot be inspected to do
8515 the conversion. This should not be a problem, since arrays of
8516 unconstrained objects are not allowed. In particular, all
8517 the elements of an array of a tagged type should all be of
8518 the same type specified in the debugging info. No need to
8519 consult the object tag. */
1ed6ede0 8520 result =
dda83cd7 8521 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8522
8523 elt_type0 = type0;
1f704f76 8524 for (i = index_type_desc->num_fields () - 1; i >= 0; i -= 1)
dda83cd7
SM
8525 {
8526 struct type *range_type =
8527 to_fixed_range_type (index_type_desc->field (i).type (), dval);
5b4ee69b 8528
dda83cd7
SM
8529 result = create_array_type (alloc_type_copy (elt_type0),
8530 result, range_type);
1ce677a4 8531 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
dda83cd7 8532 }
d2e4a39e 8533 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
dda83cd7 8534 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8535 }
8536
2e6fda7d
JB
8537 /* We want to preserve the type name. This can be useful when
8538 trying to get the type name of a value that has already been
8539 printed (for instance, if the user did "print VAR; whatis $". */
7d93a1e0 8540 result->set_name (type0->name ());
2e6fda7d 8541
ad82864c 8542 if (constrained_packed_array_p)
284614f0
JB
8543 {
8544 /* So far, the resulting type has been created as if the original
8545 type was a regular (non-packed) array type. As a result, the
8546 bitsize of the array elements needs to be set again, and the array
8547 length needs to be recomputed based on that bitsize. */
8548 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8549 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8550
8551 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8552 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8553 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
dda83cd7 8554 TYPE_LENGTH (result)++;
284614f0
JB
8555 }
8556
9cdd0d12 8557 result->set_is_fixed_instance (true);
14f9c5c9 8558 return result;
d2e4a39e 8559}
14f9c5c9
AS
8560
8561
8562/* A standard type (containing no dynamically sized components)
8563 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8564 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8565 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8566 ADDRESS or in VALADDR contains these discriminants.
8567
1ed6ede0
JB
8568 If CHECK_TAG is not null, in the case of tagged types, this function
8569 attempts to locate the object's tag and use it to compute the actual
8570 type. However, when ADDRESS is null, we cannot use it to determine the
8571 location of the tag, and therefore compute the tagged type's actual type.
8572 So we return the tagged type without consulting the tag. */
529cad9c 8573
f192137b
JB
8574static struct type *
8575ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
dda83cd7 8576 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8577{
61ee279c 8578 type = ada_check_typedef (type);
8ecb59f8
TT
8579
8580 /* Only un-fixed types need to be handled here. */
8581 if (!HAVE_GNAT_AUX_INFO (type))
8582 return type;
8583
78134374 8584 switch (type->code ())
d2e4a39e
AS
8585 {
8586 default:
14f9c5c9 8587 return type;
d2e4a39e 8588 case TYPE_CODE_STRUCT:
4c4b4cd2 8589 {
dda83cd7
SM
8590 struct type *static_type = to_static_fixed_type (type);
8591 struct type *fixed_record_type =
8592 to_fixed_record_type (type, valaddr, address, NULL);
8593
8594 /* If STATIC_TYPE is a tagged type and we know the object's address,
8595 then we can determine its tag, and compute the object's actual
8596 type from there. Note that we have to use the fixed record
8597 type (the parent part of the record may have dynamic fields
8598 and the way the location of _tag is expressed may depend on
8599 them). */
8600
8601 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
8602 {
b50d69b5
JG
8603 struct value *tag =
8604 value_tag_from_contents_and_address
8605 (fixed_record_type,
8606 valaddr,
8607 address);
8608 struct type *real_type = type_from_tag (tag);
8609 struct value *obj =
8610 value_from_contents_and_address (fixed_record_type,
8611 valaddr,
8612 address);
dda83cd7
SM
8613 fixed_record_type = value_type (obj);
8614 if (real_type != NULL)
8615 return to_fixed_record_type
b50d69b5
JG
8616 (real_type, NULL,
8617 value_address (ada_tag_value_at_base_address (obj)), NULL);
dda83cd7
SM
8618 }
8619
8620 /* Check to see if there is a parallel ___XVZ variable.
8621 If there is, then it provides the actual size of our type. */
8622 else if (ada_type_name (fixed_record_type) != NULL)
8623 {
8624 const char *name = ada_type_name (fixed_record_type);
8625 char *xvz_name
224c3ddb 8626 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8627 bool xvz_found = false;
dda83cd7 8628 LONGEST size;
4af88198 8629
dda83cd7 8630 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8631 try
eccab96d
JB
8632 {
8633 xvz_found = get_int_var_value (xvz_name, size);
8634 }
230d2906 8635 catch (const gdb_exception_error &except)
eccab96d
JB
8636 {
8637 /* We found the variable, but somehow failed to read
8638 its value. Rethrow the same error, but with a little
8639 bit more information, to help the user understand
8640 what went wrong (Eg: the variable might have been
8641 optimized out). */
8642 throw_error (except.error,
8643 _("unable to read value of %s (%s)"),
3d6e9d23 8644 xvz_name, except.what ());
eccab96d 8645 }
eccab96d 8646
dda83cd7
SM
8647 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8648 {
8649 fixed_record_type = copy_type (fixed_record_type);
8650 TYPE_LENGTH (fixed_record_type) = size;
8651
8652 /* The FIXED_RECORD_TYPE may have be a stub. We have
8653 observed this when the debugging info is STABS, and
8654 apparently it is something that is hard to fix.
8655
8656 In practice, we don't need the actual type definition
8657 at all, because the presence of the XVZ variable allows us
8658 to assume that there must be a XVS type as well, which we
8659 should be able to use later, when we need the actual type
8660 definition.
8661
8662 In the meantime, pretend that the "fixed" type we are
8663 returning is NOT a stub, because this can cause trouble
8664 when using this type to create new types targeting it.
8665 Indeed, the associated creation routines often check
8666 whether the target type is a stub and will try to replace
8667 it, thus using a type with the wrong size. This, in turn,
8668 might cause the new type to have the wrong size too.
8669 Consider the case of an array, for instance, where the size
8670 of the array is computed from the number of elements in
8671 our array multiplied by the size of its element. */
b4b73759 8672 fixed_record_type->set_is_stub (false);
dda83cd7
SM
8673 }
8674 }
8675 return fixed_record_type;
4c4b4cd2 8676 }
d2e4a39e 8677 case TYPE_CODE_ARRAY:
4c4b4cd2 8678 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8679 case TYPE_CODE_UNION:
8680 if (dval == NULL)
dda83cd7 8681 return type;
d2e4a39e 8682 else
dda83cd7 8683 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8684 }
14f9c5c9
AS
8685}
8686
f192137b
JB
8687/* The same as ada_to_fixed_type_1, except that it preserves the type
8688 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8689
8690 The typedef layer needs be preserved in order to differentiate between
8691 arrays and array pointers when both types are implemented using the same
8692 fat pointer. In the array pointer case, the pointer is encoded as
8693 a typedef of the pointer type. For instance, considering:
8694
8695 type String_Access is access String;
8696 S1 : String_Access := null;
8697
8698 To the debugger, S1 is defined as a typedef of type String. But
8699 to the user, it is a pointer. So if the user tries to print S1,
8700 we should not dereference the array, but print the array address
8701 instead.
8702
8703 If we didn't preserve the typedef layer, we would lose the fact that
8704 the type is to be presented as a pointer (needs de-reference before
8705 being printed). And we would also use the source-level type name. */
f192137b
JB
8706
8707struct type *
8708ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
dda83cd7 8709 CORE_ADDR address, struct value *dval, int check_tag)
f192137b
JB
8710
8711{
8712 struct type *fixed_type =
8713 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8714
96dbd2c1
JB
8715 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8716 then preserve the typedef layer.
8717
8718 Implementation note: We can only check the main-type portion of
8719 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8720 from TYPE now returns a type that has the same instance flags
8721 as TYPE. For instance, if TYPE is a "typedef const", and its
8722 target type is a "struct", then the typedef elimination will return
8723 a "const" version of the target type. See check_typedef for more
8724 details about how the typedef layer elimination is done.
8725
8726 brobecker/2010-11-19: It seems to me that the only case where it is
8727 useful to preserve the typedef layer is when dealing with fat pointers.
8728 Perhaps, we could add a check for that and preserve the typedef layer
85102364 8729 only in that situation. But this seems unnecessary so far, probably
96dbd2c1
JB
8730 because we call check_typedef/ada_check_typedef pretty much everywhere.
8731 */
78134374 8732 if (type->code () == TYPE_CODE_TYPEDEF
720d1a40 8733 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8734 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8735 return type;
8736
8737 return fixed_type;
8738}
8739
14f9c5c9 8740/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8741 TYPE0, but based on no runtime data. */
14f9c5c9 8742
d2e4a39e
AS
8743static struct type *
8744to_static_fixed_type (struct type *type0)
14f9c5c9 8745{
d2e4a39e 8746 struct type *type;
14f9c5c9
AS
8747
8748 if (type0 == NULL)
8749 return NULL;
8750
22c4c60c 8751 if (type0->is_fixed_instance ())
4c4b4cd2
PH
8752 return type0;
8753
61ee279c 8754 type0 = ada_check_typedef (type0);
d2e4a39e 8755
78134374 8756 switch (type0->code ())
14f9c5c9
AS
8757 {
8758 default:
8759 return type0;
8760 case TYPE_CODE_STRUCT:
8761 type = dynamic_template_type (type0);
d2e4a39e 8762 if (type != NULL)
dda83cd7 8763 return template_to_static_fixed_type (type);
4c4b4cd2 8764 else
dda83cd7 8765 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8766 case TYPE_CODE_UNION:
8767 type = ada_find_parallel_type (type0, "___XVU");
8768 if (type != NULL)
dda83cd7 8769 return template_to_static_fixed_type (type);
4c4b4cd2 8770 else
dda83cd7 8771 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8772 }
8773}
8774
4c4b4cd2
PH
8775/* A static approximation of TYPE with all type wrappers removed. */
8776
d2e4a39e
AS
8777static struct type *
8778static_unwrap_type (struct type *type)
14f9c5c9
AS
8779{
8780 if (ada_is_aligner_type (type))
8781 {
940da03e 8782 struct type *type1 = ada_check_typedef (type)->field (0).type ();
14f9c5c9 8783 if (ada_type_name (type1) == NULL)
d0e39ea2 8784 type1->set_name (ada_type_name (type));
14f9c5c9
AS
8785
8786 return static_unwrap_type (type1);
8787 }
d2e4a39e 8788 else
14f9c5c9 8789 {
d2e4a39e 8790 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8791
d2e4a39e 8792 if (raw_real_type == type)
dda83cd7 8793 return type;
14f9c5c9 8794 else
dda83cd7 8795 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8796 }
8797}
8798
8799/* In some cases, incomplete and private types require
4c4b4cd2 8800 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8801 type Foo;
8802 type FooP is access Foo;
8803 V: FooP;
8804 type Foo is array ...;
4c4b4cd2 8805 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8806 cross-references to such types, we instead substitute for FooP a
8807 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8808 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8809
8810/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8811 exists, otherwise TYPE. */
8812
d2e4a39e 8813struct type *
61ee279c 8814ada_check_typedef (struct type *type)
14f9c5c9 8815{
727e3d2e
JB
8816 if (type == NULL)
8817 return NULL;
8818
736ade86
XR
8819 /* If our type is an access to an unconstrained array, which is encoded
8820 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
8821 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8822 what allows us to distinguish between fat pointers that represent
8823 array types, and fat pointers that represent array access types
8824 (in both cases, the compiler implements them as fat pointers). */
736ade86 8825 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
8826 return type;
8827
f168693b 8828 type = check_typedef (type);
78134374 8829 if (type == NULL || type->code () != TYPE_CODE_ENUM
e46d3488 8830 || !type->is_stub ()
7d93a1e0 8831 || type->name () == NULL)
14f9c5c9 8832 return type;
d2e4a39e 8833 else
14f9c5c9 8834 {
7d93a1e0 8835 const char *name = type->name ();
d2e4a39e 8836 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8837
05e522ef 8838 if (type1 == NULL)
dda83cd7 8839 return type;
05e522ef
JB
8840
8841 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8842 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8843 types, only for the typedef-to-array types). If that's the case,
8844 strip the typedef layer. */
78134374 8845 if (type1->code () == TYPE_CODE_TYPEDEF)
3a867c22
JB
8846 type1 = ada_check_typedef (type1);
8847
8848 return type1;
14f9c5c9
AS
8849 }
8850}
8851
8852/* A value representing the data at VALADDR/ADDRESS as described by
8853 type TYPE0, but with a standard (static-sized) type that correctly
8854 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8855 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8856 creation of struct values]. */
14f9c5c9 8857
4c4b4cd2
PH
8858static struct value *
8859ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
dda83cd7 8860 struct value *val0)
14f9c5c9 8861{
1ed6ede0 8862 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8863
14f9c5c9
AS
8864 if (type == type0 && val0 != NULL)
8865 return val0;
cc0e770c
JB
8866
8867 if (VALUE_LVAL (val0) != lval_memory)
8868 {
8869 /* Our value does not live in memory; it could be a convenience
8870 variable, for instance. Create a not_lval value using val0's
8871 contents. */
8872 return value_from_contents (type, value_contents (val0));
8873 }
8874
8875 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
8876}
8877
8878/* A value representing VAL, but with a standard (static-sized) type
8879 that correctly describes it. Does not necessarily create a new
8880 value. */
8881
0c3acc09 8882struct value *
4c4b4cd2
PH
8883ada_to_fixed_value (struct value *val)
8884{
c48db5ca 8885 val = unwrap_value (val);
d8ce9127 8886 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 8887 return val;
14f9c5c9 8888}
d2e4a39e 8889\f
14f9c5c9 8890
14f9c5c9
AS
8891/* Attributes */
8892
4c4b4cd2
PH
8893/* Table mapping attribute numbers to names.
8894 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8895
27087b7f 8896static const char * const attribute_names[] = {
14f9c5c9
AS
8897 "<?>",
8898
d2e4a39e 8899 "first",
14f9c5c9
AS
8900 "last",
8901 "length",
8902 "image",
14f9c5c9
AS
8903 "max",
8904 "min",
4c4b4cd2
PH
8905 "modulus",
8906 "pos",
8907 "size",
8908 "tag",
14f9c5c9 8909 "val",
14f9c5c9
AS
8910 0
8911};
8912
de93309a 8913static const char *
4c4b4cd2 8914ada_attribute_name (enum exp_opcode n)
14f9c5c9 8915{
4c4b4cd2
PH
8916 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8917 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8918 else
8919 return attribute_names[0];
8920}
8921
4c4b4cd2 8922/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8923
4c4b4cd2
PH
8924static LONGEST
8925pos_atr (struct value *arg)
14f9c5c9 8926{
24209737
PH
8927 struct value *val = coerce_ref (arg);
8928 struct type *type = value_type (val);
aa715135 8929 LONGEST result;
14f9c5c9 8930
d2e4a39e 8931 if (!discrete_type_p (type))
323e0a4a 8932 error (_("'POS only defined on discrete types"));
14f9c5c9 8933
aa715135
JG
8934 if (!discrete_position (type, value_as_long (val), &result))
8935 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 8936
aa715135 8937 return result;
4c4b4cd2
PH
8938}
8939
8940static struct value *
3cb382c9 8941value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8942{
3cb382c9 8943 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8944}
8945
4c4b4cd2 8946/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8947
d2e4a39e 8948static struct value *
53a47a3e 8949val_atr (struct type *type, LONGEST val)
14f9c5c9 8950{
53a47a3e 8951 gdb_assert (discrete_type_p (type));
0bc2354b
TT
8952 if (type->code () == TYPE_CODE_RANGE)
8953 type = TYPE_TARGET_TYPE (type);
78134374 8954 if (type->code () == TYPE_CODE_ENUM)
14f9c5c9 8955 {
53a47a3e 8956 if (val < 0 || val >= type->num_fields ())
dda83cd7 8957 error (_("argument to 'VAL out of range"));
53a47a3e 8958 val = TYPE_FIELD_ENUMVAL (type, val);
14f9c5c9 8959 }
53a47a3e
TT
8960 return value_from_longest (type, val);
8961}
8962
8963static struct value *
8964value_val_atr (struct type *type, struct value *arg)
8965{
8966 if (!discrete_type_p (type))
8967 error (_("'VAL only defined on discrete types"));
8968 if (!integer_type_p (value_type (arg)))
8969 error (_("'VAL requires integral argument"));
8970
8971 return val_atr (type, value_as_long (arg));
14f9c5c9 8972}
14f9c5c9 8973\f
d2e4a39e 8974
dda83cd7 8975 /* Evaluation */
14f9c5c9 8976
4c4b4cd2
PH
8977/* True if TYPE appears to be an Ada character type.
8978 [At the moment, this is true only for Character and Wide_Character;
8979 It is a heuristic test that could stand improvement]. */
14f9c5c9 8980
fc913e53 8981bool
d2e4a39e 8982ada_is_character_type (struct type *type)
14f9c5c9 8983{
7b9f71f2
JB
8984 const char *name;
8985
8986 /* If the type code says it's a character, then assume it really is,
8987 and don't check any further. */
78134374 8988 if (type->code () == TYPE_CODE_CHAR)
fc913e53 8989 return true;
7b9f71f2
JB
8990
8991 /* Otherwise, assume it's a character type iff it is a discrete type
8992 with a known character type name. */
8993 name = ada_type_name (type);
8994 return (name != NULL
dda83cd7
SM
8995 && (type->code () == TYPE_CODE_INT
8996 || type->code () == TYPE_CODE_RANGE)
8997 && (strcmp (name, "character") == 0
8998 || strcmp (name, "wide_character") == 0
8999 || strcmp (name, "wide_wide_character") == 0
9000 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9001}
9002
4c4b4cd2 9003/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9004
fc913e53 9005bool
ebf56fd3 9006ada_is_string_type (struct type *type)
14f9c5c9 9007{
61ee279c 9008 type = ada_check_typedef (type);
d2e4a39e 9009 if (type != NULL
78134374 9010 && type->code () != TYPE_CODE_PTR
76a01679 9011 && (ada_is_simple_array_type (type)
dda83cd7 9012 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9013 && ada_array_arity (type) == 1)
9014 {
9015 struct type *elttype = ada_array_element_type (type, 1);
9016
9017 return ada_is_character_type (elttype);
9018 }
d2e4a39e 9019 else
fc913e53 9020 return false;
14f9c5c9
AS
9021}
9022
5bf03f13
JB
9023/* The compiler sometimes provides a parallel XVS type for a given
9024 PAD type. Normally, it is safe to follow the PAD type directly,
9025 but older versions of the compiler have a bug that causes the offset
9026 of its "F" field to be wrong. Following that field in that case
9027 would lead to incorrect results, but this can be worked around
9028 by ignoring the PAD type and using the associated XVS type instead.
9029
9030 Set to True if the debugger should trust the contents of PAD types.
9031 Otherwise, ignore the PAD type if there is a parallel XVS type. */
491144b5 9032static bool trust_pad_over_xvs = true;
14f9c5c9
AS
9033
9034/* True if TYPE is a struct type introduced by the compiler to force the
9035 alignment of a value. Such types have a single field with a
4c4b4cd2 9036 distinctive name. */
14f9c5c9
AS
9037
9038int
ebf56fd3 9039ada_is_aligner_type (struct type *type)
14f9c5c9 9040{
61ee279c 9041 type = ada_check_typedef (type);
714e53ab 9042
5bf03f13 9043 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9044 return 0;
9045
78134374 9046 return (type->code () == TYPE_CODE_STRUCT
dda83cd7
SM
9047 && type->num_fields () == 1
9048 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9049}
9050
9051/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9052 the parallel type. */
14f9c5c9 9053
d2e4a39e
AS
9054struct type *
9055ada_get_base_type (struct type *raw_type)
14f9c5c9 9056{
d2e4a39e
AS
9057 struct type *real_type_namer;
9058 struct type *raw_real_type;
14f9c5c9 9059
78134374 9060 if (raw_type == NULL || raw_type->code () != TYPE_CODE_STRUCT)
14f9c5c9
AS
9061 return raw_type;
9062
284614f0
JB
9063 if (ada_is_aligner_type (raw_type))
9064 /* The encoding specifies that we should always use the aligner type.
9065 So, even if this aligner type has an associated XVS type, we should
9066 simply ignore it.
9067
9068 According to the compiler gurus, an XVS type parallel to an aligner
9069 type may exist because of a stabs limitation. In stabs, aligner
9070 types are empty because the field has a variable-sized type, and
9071 thus cannot actually be used as an aligner type. As a result,
9072 we need the associated parallel XVS type to decode the type.
9073 Since the policy in the compiler is to not change the internal
9074 representation based on the debugging info format, we sometimes
9075 end up having a redundant XVS type parallel to the aligner type. */
9076 return raw_type;
9077
14f9c5c9 9078 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9079 if (real_type_namer == NULL
78134374 9080 || real_type_namer->code () != TYPE_CODE_STRUCT
1f704f76 9081 || real_type_namer->num_fields () != 1)
14f9c5c9
AS
9082 return raw_type;
9083
940da03e 9084 if (real_type_namer->field (0).type ()->code () != TYPE_CODE_REF)
f80d3ff2
JB
9085 {
9086 /* This is an older encoding form where the base type needs to be
85102364 9087 looked up by name. We prefer the newer encoding because it is
f80d3ff2
JB
9088 more efficient. */
9089 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9090 if (raw_real_type == NULL)
9091 return raw_type;
9092 else
9093 return raw_real_type;
9094 }
9095
9096 /* The field in our XVS type is a reference to the base type. */
940da03e 9097 return TYPE_TARGET_TYPE (real_type_namer->field (0).type ());
d2e4a39e 9098}
14f9c5c9 9099
4c4b4cd2 9100/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9101
d2e4a39e
AS
9102struct type *
9103ada_aligned_type (struct type *type)
14f9c5c9
AS
9104{
9105 if (ada_is_aligner_type (type))
940da03e 9106 return ada_aligned_type (type->field (0).type ());
14f9c5c9
AS
9107 else
9108 return ada_get_base_type (type);
9109}
9110
9111
9112/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9113 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9114
fc1a4b47
AC
9115const gdb_byte *
9116ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9117{
d2e4a39e 9118 if (ada_is_aligner_type (type))
940da03e 9119 return ada_aligned_value_addr (type->field (0).type (),
dda83cd7
SM
9120 valaddr +
9121 TYPE_FIELD_BITPOS (type,
9122 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9123 else
9124 return valaddr;
9125}
9126
4c4b4cd2
PH
9127
9128
14f9c5c9 9129/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9130 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9131const char *
9132ada_enum_name (const char *name)
14f9c5c9 9133{
4c4b4cd2
PH
9134 static char *result;
9135 static size_t result_len = 0;
e6a959d6 9136 const char *tmp;
14f9c5c9 9137
4c4b4cd2
PH
9138 /* First, unqualify the enumeration name:
9139 1. Search for the last '.' character. If we find one, then skip
177b42fe 9140 all the preceding characters, the unqualified name starts
76a01679 9141 right after that dot.
4c4b4cd2 9142 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9143 translates dots into "__". Search forward for double underscores,
9144 but stop searching when we hit an overloading suffix, which is
9145 of the form "__" followed by digits. */
4c4b4cd2 9146
c3e5cd34
PH
9147 tmp = strrchr (name, '.');
9148 if (tmp != NULL)
4c4b4cd2
PH
9149 name = tmp + 1;
9150 else
14f9c5c9 9151 {
4c4b4cd2 9152 while ((tmp = strstr (name, "__")) != NULL)
dda83cd7
SM
9153 {
9154 if (isdigit (tmp[2]))
9155 break;
9156 else
9157 name = tmp + 2;
9158 }
14f9c5c9
AS
9159 }
9160
9161 if (name[0] == 'Q')
9162 {
14f9c5c9 9163 int v;
5b4ee69b 9164
14f9c5c9 9165 if (name[1] == 'U' || name[1] == 'W')
dda83cd7
SM
9166 {
9167 if (sscanf (name + 2, "%x", &v) != 1)
9168 return name;
9169 }
272560b5
TT
9170 else if (((name[1] >= '0' && name[1] <= '9')
9171 || (name[1] >= 'a' && name[1] <= 'z'))
9172 && name[2] == '\0')
9173 {
9174 GROW_VECT (result, result_len, 4);
9175 xsnprintf (result, result_len, "'%c'", name[1]);
9176 return result;
9177 }
14f9c5c9 9178 else
dda83cd7 9179 return name;
14f9c5c9 9180
4c4b4cd2 9181 GROW_VECT (result, result_len, 16);
14f9c5c9 9182 if (isascii (v) && isprint (v))
dda83cd7 9183 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9184 else if (name[1] == 'U')
dda83cd7 9185 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9186 else
dda83cd7 9187 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9188
9189 return result;
9190 }
d2e4a39e 9191 else
4c4b4cd2 9192 {
c3e5cd34
PH
9193 tmp = strstr (name, "__");
9194 if (tmp == NULL)
9195 tmp = strstr (name, "$");
9196 if (tmp != NULL)
dda83cd7
SM
9197 {
9198 GROW_VECT (result, result_len, tmp - name + 1);
9199 strncpy (result, name, tmp - name);
9200 result[tmp - name] = '\0';
9201 return result;
9202 }
4c4b4cd2
PH
9203
9204 return name;
9205 }
14f9c5c9
AS
9206}
9207
14f9c5c9
AS
9208/* Evaluate the subexpression of EXP starting at *POS as for
9209 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9210 expression. */
14f9c5c9 9211
d2e4a39e
AS
9212static struct value *
9213evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9214{
fe1fe7ea 9215 return evaluate_subexp (nullptr, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9216}
9217
9218/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9219 value it wraps. */
14f9c5c9 9220
d2e4a39e
AS
9221static struct value *
9222unwrap_value (struct value *val)
14f9c5c9 9223{
df407dfe 9224 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9225
14f9c5c9
AS
9226 if (ada_is_aligner_type (type))
9227 {
de4d072f 9228 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9229 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9230
14f9c5c9 9231 if (ada_type_name (val_type) == NULL)
d0e39ea2 9232 val_type->set_name (ada_type_name (type));
14f9c5c9
AS
9233
9234 return unwrap_value (v);
9235 }
d2e4a39e 9236 else
14f9c5c9 9237 {
d2e4a39e 9238 struct type *raw_real_type =
dda83cd7 9239 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9240
5bf03f13
JB
9241 /* If there is no parallel XVS or XVE type, then the value is
9242 already unwrapped. Return it without further modification. */
9243 if ((type == raw_real_type)
9244 && ada_find_parallel_type (type, "___XVE") == NULL)
9245 return val;
14f9c5c9 9246
d2e4a39e 9247 return
dda83cd7
SM
9248 coerce_unspec_val_to_type
9249 (val, ada_to_fixed_type (raw_real_type, 0,
9250 value_address (val),
9251 NULL, 1));
14f9c5c9
AS
9252 }
9253}
d2e4a39e
AS
9254
9255static struct value *
75f24e86 9256cast_from_gnat_encoded_fixed_point_type (struct type *type, struct value *arg)
14f9c5c9 9257{
db99d0d0
JB
9258 struct value *scale
9259 = gnat_encoded_fixed_point_scaling_factor (value_type (arg));
50eff16b 9260 arg = value_cast (value_type (scale), arg);
14f9c5c9 9261
50eff16b
UW
9262 arg = value_binop (arg, scale, BINOP_MUL);
9263 return value_cast (type, arg);
14f9c5c9
AS
9264}
9265
d2e4a39e 9266static struct value *
75f24e86 9267cast_to_gnat_encoded_fixed_point_type (struct type *type, struct value *arg)
14f9c5c9 9268{
50eff16b
UW
9269 if (type == value_type (arg))
9270 return arg;
5b4ee69b 9271
75f24e86 9272 struct value *scale = gnat_encoded_fixed_point_scaling_factor (type);
b2188a06 9273 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg)))
75f24e86 9274 arg = cast_from_gnat_encoded_fixed_point_type (value_type (scale), arg);
50eff16b
UW
9275 else
9276 arg = value_cast (value_type (scale), arg);
9277
9278 arg = value_binop (arg, scale, BINOP_DIV);
9279 return value_cast (type, arg);
14f9c5c9
AS
9280}
9281
d99dcf51
JB
9282/* Given two array types T1 and T2, return nonzero iff both arrays
9283 contain the same number of elements. */
9284
9285static int
9286ada_same_array_size_p (struct type *t1, struct type *t2)
9287{
9288 LONGEST lo1, hi1, lo2, hi2;
9289
9290 /* Get the array bounds in order to verify that the size of
9291 the two arrays match. */
9292 if (!get_array_bounds (t1, &lo1, &hi1)
9293 || !get_array_bounds (t2, &lo2, &hi2))
9294 error (_("unable to determine array bounds"));
9295
9296 /* To make things easier for size comparison, normalize a bit
9297 the case of empty arrays by making sure that the difference
9298 between upper bound and lower bound is always -1. */
9299 if (lo1 > hi1)
9300 hi1 = lo1 - 1;
9301 if (lo2 > hi2)
9302 hi2 = lo2 - 1;
9303
9304 return (hi1 - lo1 == hi2 - lo2);
9305}
9306
9307/* Assuming that VAL is an array of integrals, and TYPE represents
9308 an array with the same number of elements, but with wider integral
9309 elements, return an array "casted" to TYPE. In practice, this
9310 means that the returned array is built by casting each element
9311 of the original array into TYPE's (wider) element type. */
9312
9313static struct value *
9314ada_promote_array_of_integrals (struct type *type, struct value *val)
9315{
9316 struct type *elt_type = TYPE_TARGET_TYPE (type);
9317 LONGEST lo, hi;
9318 struct value *res;
9319 LONGEST i;
9320
9321 /* Verify that both val and type are arrays of scalars, and
9322 that the size of val's elements is smaller than the size
9323 of type's element. */
78134374 9324 gdb_assert (type->code () == TYPE_CODE_ARRAY);
d99dcf51 9325 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
78134374 9326 gdb_assert (value_type (val)->code () == TYPE_CODE_ARRAY);
d99dcf51
JB
9327 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9328 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9329 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9330
9331 if (!get_array_bounds (type, &lo, &hi))
9332 error (_("unable to determine array bounds"));
9333
9334 res = allocate_value (type);
9335
9336 /* Promote each array element. */
9337 for (i = 0; i < hi - lo + 1; i++)
9338 {
9339 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9340
9341 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9342 value_contents_all (elt), TYPE_LENGTH (elt_type));
9343 }
9344
9345 return res;
9346}
9347
4c4b4cd2
PH
9348/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9349 return the converted value. */
9350
d2e4a39e
AS
9351static struct value *
9352coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9353{
df407dfe 9354 struct type *type2 = value_type (val);
5b4ee69b 9355
14f9c5c9
AS
9356 if (type == type2)
9357 return val;
9358
61ee279c
PH
9359 type2 = ada_check_typedef (type2);
9360 type = ada_check_typedef (type);
14f9c5c9 9361
78134374
SM
9362 if (type2->code () == TYPE_CODE_PTR
9363 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9
AS
9364 {
9365 val = ada_value_ind (val);
df407dfe 9366 type2 = value_type (val);
14f9c5c9
AS
9367 }
9368
78134374
SM
9369 if (type2->code () == TYPE_CODE_ARRAY
9370 && type->code () == TYPE_CODE_ARRAY)
14f9c5c9 9371 {
d99dcf51
JB
9372 if (!ada_same_array_size_p (type, type2))
9373 error (_("cannot assign arrays of different length"));
9374
9375 if (is_integral_type (TYPE_TARGET_TYPE (type))
9376 && is_integral_type (TYPE_TARGET_TYPE (type2))
9377 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9378 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9379 {
9380 /* Allow implicit promotion of the array elements to
9381 a wider type. */
9382 return ada_promote_array_of_integrals (type, val);
9383 }
9384
9385 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
dda83cd7
SM
9386 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9387 error (_("Incompatible types in assignment"));
04624583 9388 deprecated_set_value_type (val, type);
14f9c5c9 9389 }
d2e4a39e 9390 return val;
14f9c5c9
AS
9391}
9392
4c4b4cd2
PH
9393static struct value *
9394ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9395{
9396 struct value *val;
9397 struct type *type1, *type2;
9398 LONGEST v, v1, v2;
9399
994b9211
AC
9400 arg1 = coerce_ref (arg1);
9401 arg2 = coerce_ref (arg2);
18af8284
JB
9402 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9403 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9404
78134374
SM
9405 if (type1->code () != TYPE_CODE_INT
9406 || type2->code () != TYPE_CODE_INT)
4c4b4cd2
PH
9407 return value_binop (arg1, arg2, op);
9408
76a01679 9409 switch (op)
4c4b4cd2
PH
9410 {
9411 case BINOP_MOD:
9412 case BINOP_DIV:
9413 case BINOP_REM:
9414 break;
9415 default:
9416 return value_binop (arg1, arg2, op);
9417 }
9418
9419 v2 = value_as_long (arg2);
9420 if (v2 == 0)
323e0a4a 9421 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2 9422
c6d940a9 9423 if (type1->is_unsigned () || op == BINOP_MOD)
4c4b4cd2
PH
9424 return value_binop (arg1, arg2, op);
9425
9426 v1 = value_as_long (arg1);
9427 switch (op)
9428 {
9429 case BINOP_DIV:
9430 v = v1 / v2;
76a01679 9431 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
dda83cd7 9432 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9433 break;
9434 case BINOP_REM:
9435 v = v1 % v2;
76a01679 9436 if (v * v1 < 0)
dda83cd7 9437 v -= v2;
4c4b4cd2
PH
9438 break;
9439 default:
9440 /* Should not reach this point. */
9441 v = 0;
9442 }
9443
9444 val = allocate_value (type1);
990a07ab 9445 store_unsigned_integer (value_contents_raw (val),
dda83cd7 9446 TYPE_LENGTH (value_type (val)),
34877895 9447 type_byte_order (type1), v);
4c4b4cd2
PH
9448 return val;
9449}
9450
9451static int
9452ada_value_equal (struct value *arg1, struct value *arg2)
9453{
df407dfe
AC
9454 if (ada_is_direct_array_type (value_type (arg1))
9455 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9456 {
79e8fcaa
JB
9457 struct type *arg1_type, *arg2_type;
9458
f58b38bf 9459 /* Automatically dereference any array reference before
dda83cd7 9460 we attempt to perform the comparison. */
f58b38bf
JB
9461 arg1 = ada_coerce_ref (arg1);
9462 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9463
4c4b4cd2
PH
9464 arg1 = ada_coerce_to_simple_array (arg1);
9465 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9466
9467 arg1_type = ada_check_typedef (value_type (arg1));
9468 arg2_type = ada_check_typedef (value_type (arg2));
9469
78134374 9470 if (arg1_type->code () != TYPE_CODE_ARRAY
dda83cd7
SM
9471 || arg2_type->code () != TYPE_CODE_ARRAY)
9472 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9473 /* FIXME: The following works only for types whose
dda83cd7
SM
9474 representations use all bits (no padding or undefined bits)
9475 and do not have user-defined equality. */
79e8fcaa
JB
9476 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9477 && memcmp (value_contents (arg1), value_contents (arg2),
9478 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9479 }
9480 return value_equal (arg1, arg2);
9481}
9482
52ce6436
PH
9483/* Total number of component associations in the aggregate starting at
9484 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9485 OP_AGGREGATE. */
52ce6436
PH
9486
9487static int
9488num_component_specs (struct expression *exp, int pc)
9489{
9490 int n, m, i;
5b4ee69b 9491
52ce6436
PH
9492 m = exp->elts[pc + 1].longconst;
9493 pc += 3;
9494 n = 0;
9495 for (i = 0; i < m; i += 1)
9496 {
9497 switch (exp->elts[pc].opcode)
9498 {
9499 default:
9500 n += 1;
9501 break;
9502 case OP_CHOICES:
9503 n += exp->elts[pc + 1].longconst;
9504 break;
9505 }
9506 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9507 }
9508 return n;
9509}
9510
9511/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9512 component of LHS (a simple array or a record), updating *POS past
9513 the expression, assuming that LHS is contained in CONTAINER. Does
9514 not modify the inferior's memory, nor does it modify LHS (unless
9515 LHS == CONTAINER). */
9516
9517static void
9518assign_component (struct value *container, struct value *lhs, LONGEST index,
9519 struct expression *exp, int *pos)
9520{
9521 struct value *mark = value_mark ();
9522 struct value *elt;
0e2da9f0 9523 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9524
78134374 9525 if (lhs_type->code () == TYPE_CODE_ARRAY)
52ce6436 9526 {
22601c15
UW
9527 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9528 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9529
52ce6436
PH
9530 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9531 }
9532 else
9533 {
9534 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9535 elt = ada_to_fixed_value (elt);
52ce6436
PH
9536 }
9537
9538 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9539 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9540 else
9541 value_assign_to_component (container, elt,
9542 ada_evaluate_subexp (NULL, exp, pos,
9543 EVAL_NORMAL));
9544
9545 value_free_to_mark (mark);
9546}
9547
9548/* Assuming that LHS represents an lvalue having a record or array
9549 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9550 of that aggregate's value to LHS, advancing *POS past the
9551 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9552 lvalue containing LHS (possibly LHS itself). Does not modify
9553 the inferior's memory, nor does it modify the contents of
0963b4bd 9554 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9555
9556static struct value *
9557assign_aggregate (struct value *container,
9558 struct value *lhs, struct expression *exp,
9559 int *pos, enum noside noside)
9560{
9561 struct type *lhs_type;
9562 int n = exp->elts[*pos+1].longconst;
9563 LONGEST low_index, high_index;
9564 int num_specs;
9565 LONGEST *indices;
9566 int max_indices, num_indices;
52ce6436 9567 int i;
52ce6436
PH
9568
9569 *pos += 3;
9570 if (noside != EVAL_NORMAL)
9571 {
52ce6436
PH
9572 for (i = 0; i < n; i += 1)
9573 ada_evaluate_subexp (NULL, exp, pos, noside);
9574 return container;
9575 }
9576
9577 container = ada_coerce_ref (container);
9578 if (ada_is_direct_array_type (value_type (container)))
9579 container = ada_coerce_to_simple_array (container);
9580 lhs = ada_coerce_ref (lhs);
9581 if (!deprecated_value_modifiable (lhs))
9582 error (_("Left operand of assignment is not a modifiable lvalue."));
9583
0e2da9f0 9584 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9585 if (ada_is_direct_array_type (lhs_type))
9586 {
9587 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9588 lhs_type = check_typedef (value_type (lhs));
cf88be68
SM
9589 low_index = lhs_type->bounds ()->low.const_val ();
9590 high_index = lhs_type->bounds ()->high.const_val ();
52ce6436 9591 }
78134374 9592 else if (lhs_type->code () == TYPE_CODE_STRUCT)
52ce6436
PH
9593 {
9594 low_index = 0;
9595 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9596 }
9597 else
9598 error (_("Left-hand side must be array or record."));
9599
9600 num_specs = num_component_specs (exp, *pos - 3);
9601 max_indices = 4 * num_specs + 4;
8d749320 9602 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9603 indices[0] = indices[1] = low_index - 1;
9604 indices[2] = indices[3] = high_index + 1;
9605 num_indices = 4;
9606
9607 for (i = 0; i < n; i += 1)
9608 {
9609 switch (exp->elts[*pos].opcode)
9610 {
1fbf5ada
JB
9611 case OP_CHOICES:
9612 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9613 &num_indices, max_indices,
9614 low_index, high_index);
9615 break;
9616 case OP_POSITIONAL:
9617 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9618 &num_indices, max_indices,
9619 low_index, high_index);
1fbf5ada
JB
9620 break;
9621 case OP_OTHERS:
9622 if (i != n-1)
9623 error (_("Misplaced 'others' clause"));
9624 aggregate_assign_others (container, lhs, exp, pos, indices,
9625 num_indices, low_index, high_index);
9626 break;
9627 default:
9628 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9629 }
9630 }
9631
9632 return container;
9633}
9634
9635/* Assign into the component of LHS indexed by the OP_POSITIONAL
9636 construct at *POS, updating *POS past the construct, given that
9637 the positions are relative to lower bound LOW, where HIGH is the
9638 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9639 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9640 assign_aggregate. */
52ce6436
PH
9641static void
9642aggregate_assign_positional (struct value *container,
9643 struct value *lhs, struct expression *exp,
9644 int *pos, LONGEST *indices, int *num_indices,
9645 int max_indices, LONGEST low, LONGEST high)
9646{
9647 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9648
9649 if (ind - 1 == high)
e1d5a0d2 9650 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9651 if (ind <= high)
9652 {
9653 add_component_interval (ind, ind, indices, num_indices, max_indices);
9654 *pos += 3;
9655 assign_component (container, lhs, ind, exp, pos);
9656 }
9657 else
9658 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9659}
9660
9661/* Assign into the components of LHS indexed by the OP_CHOICES
9662 construct at *POS, updating *POS past the construct, given that
9663 the allowable indices are LOW..HIGH. Record the indices assigned
9664 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9665 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9666static void
9667aggregate_assign_from_choices (struct value *container,
9668 struct value *lhs, struct expression *exp,
9669 int *pos, LONGEST *indices, int *num_indices,
9670 int max_indices, LONGEST low, LONGEST high)
9671{
9672 int j;
9673 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9674 int choice_pos, expr_pc;
9675 int is_array = ada_is_direct_array_type (value_type (lhs));
9676
9677 choice_pos = *pos += 3;
9678
9679 for (j = 0; j < n_choices; j += 1)
9680 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9681 expr_pc = *pos;
9682 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9683
9684 for (j = 0; j < n_choices; j += 1)
9685 {
9686 LONGEST lower, upper;
9687 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9688
52ce6436
PH
9689 if (op == OP_DISCRETE_RANGE)
9690 {
9691 choice_pos += 1;
9692 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9693 EVAL_NORMAL));
9694 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9695 EVAL_NORMAL));
9696 }
9697 else if (is_array)
9698 {
9699 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9700 EVAL_NORMAL));
9701 upper = lower;
9702 }
9703 else
9704 {
9705 int ind;
0d5cff50 9706 const char *name;
5b4ee69b 9707
52ce6436
PH
9708 switch (op)
9709 {
9710 case OP_NAME:
9711 name = &exp->elts[choice_pos + 2].string;
9712 break;
9713 case OP_VAR_VALUE:
987012b8 9714 name = exp->elts[choice_pos + 2].symbol->natural_name ();
52ce6436
PH
9715 break;
9716 default:
9717 error (_("Invalid record component association."));
9718 }
9719 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9720 ind = 0;
9721 if (! find_struct_field (name, value_type (lhs), 0,
9722 NULL, NULL, NULL, NULL, &ind))
9723 error (_("Unknown component name: %s."), name);
9724 lower = upper = ind;
9725 }
9726
9727 if (lower <= upper && (lower < low || upper > high))
9728 error (_("Index in component association out of bounds."));
9729
9730 add_component_interval (lower, upper, indices, num_indices,
9731 max_indices);
9732 while (lower <= upper)
9733 {
9734 int pos1;
5b4ee69b 9735
52ce6436
PH
9736 pos1 = expr_pc;
9737 assign_component (container, lhs, lower, exp, &pos1);
9738 lower += 1;
9739 }
9740 }
9741}
9742
9743/* Assign the value of the expression in the OP_OTHERS construct in
9744 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9745 have not been previously assigned. The index intervals already assigned
9746 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9747 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9748static void
9749aggregate_assign_others (struct value *container,
9750 struct value *lhs, struct expression *exp,
9751 int *pos, LONGEST *indices, int num_indices,
9752 LONGEST low, LONGEST high)
9753{
9754 int i;
5ce64950 9755 int expr_pc = *pos + 1;
52ce6436
PH
9756
9757 for (i = 0; i < num_indices - 2; i += 2)
9758 {
9759 LONGEST ind;
5b4ee69b 9760
52ce6436
PH
9761 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9762 {
5ce64950 9763 int localpos;
5b4ee69b 9764
5ce64950
MS
9765 localpos = expr_pc;
9766 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9767 }
9768 }
9769 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9770}
9771
9772/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9773 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9774 modifying *SIZE as needed. It is an error if *SIZE exceeds
9775 MAX_SIZE. The resulting intervals do not overlap. */
9776static void
9777add_component_interval (LONGEST low, LONGEST high,
9778 LONGEST* indices, int *size, int max_size)
9779{
9780 int i, j;
5b4ee69b 9781
52ce6436
PH
9782 for (i = 0; i < *size; i += 2) {
9783 if (high >= indices[i] && low <= indices[i + 1])
9784 {
9785 int kh;
5b4ee69b 9786
52ce6436
PH
9787 for (kh = i + 2; kh < *size; kh += 2)
9788 if (high < indices[kh])
9789 break;
9790 if (low < indices[i])
9791 indices[i] = low;
9792 indices[i + 1] = indices[kh - 1];
9793 if (high > indices[i + 1])
9794 indices[i + 1] = high;
9795 memcpy (indices + i + 2, indices + kh, *size - kh);
9796 *size -= kh - i - 2;
9797 return;
9798 }
9799 else if (high < indices[i])
9800 break;
9801 }
9802
9803 if (*size == max_size)
9804 error (_("Internal error: miscounted aggregate components."));
9805 *size += 2;
9806 for (j = *size-1; j >= i+2; j -= 1)
9807 indices[j] = indices[j - 2];
9808 indices[i] = low;
9809 indices[i + 1] = high;
9810}
9811
6e48bd2c
JB
9812/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9813 is different. */
9814
9815static struct value *
b7e22850 9816ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
9817{
9818 if (type == ada_check_typedef (value_type (arg2)))
9819 return arg2;
9820
b2188a06 9821 if (ada_is_gnat_encoded_fixed_point_type (type))
75f24e86 9822 return cast_to_gnat_encoded_fixed_point_type (type, arg2);
6e48bd2c 9823
b2188a06 9824 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
75f24e86 9825 return cast_from_gnat_encoded_fixed_point_type (type, arg2);
6e48bd2c
JB
9826
9827 return value_cast (type, arg2);
9828}
9829
284614f0
JB
9830/* Evaluating Ada expressions, and printing their result.
9831 ------------------------------------------------------
9832
21649b50
JB
9833 1. Introduction:
9834 ----------------
9835
284614f0
JB
9836 We usually evaluate an Ada expression in order to print its value.
9837 We also evaluate an expression in order to print its type, which
9838 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9839 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9840 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9841 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9842 similar.
9843
9844 Evaluating expressions is a little more complicated for Ada entities
9845 than it is for entities in languages such as C. The main reason for
9846 this is that Ada provides types whose definition might be dynamic.
9847 One example of such types is variant records. Or another example
9848 would be an array whose bounds can only be known at run time.
9849
9850 The following description is a general guide as to what should be
9851 done (and what should NOT be done) in order to evaluate an expression
9852 involving such types, and when. This does not cover how the semantic
9853 information is encoded by GNAT as this is covered separatly. For the
9854 document used as the reference for the GNAT encoding, see exp_dbug.ads
9855 in the GNAT sources.
9856
9857 Ideally, we should embed each part of this description next to its
9858 associated code. Unfortunately, the amount of code is so vast right
9859 now that it's hard to see whether the code handling a particular
9860 situation might be duplicated or not. One day, when the code is
9861 cleaned up, this guide might become redundant with the comments
9862 inserted in the code, and we might want to remove it.
9863
21649b50
JB
9864 2. ``Fixing'' an Entity, the Simple Case:
9865 -----------------------------------------
9866
284614f0
JB
9867 When evaluating Ada expressions, the tricky issue is that they may
9868 reference entities whose type contents and size are not statically
9869 known. Consider for instance a variant record:
9870
9871 type Rec (Empty : Boolean := True) is record
dda83cd7
SM
9872 case Empty is
9873 when True => null;
9874 when False => Value : Integer;
9875 end case;
284614f0
JB
9876 end record;
9877 Yes : Rec := (Empty => False, Value => 1);
9878 No : Rec := (empty => True);
9879
9880 The size and contents of that record depends on the value of the
9881 descriminant (Rec.Empty). At this point, neither the debugging
9882 information nor the associated type structure in GDB are able to
9883 express such dynamic types. So what the debugger does is to create
9884 "fixed" versions of the type that applies to the specific object.
30baf67b 9885 We also informally refer to this operation as "fixing" an object,
284614f0
JB
9886 which means creating its associated fixed type.
9887
9888 Example: when printing the value of variable "Yes" above, its fixed
9889 type would look like this:
9890
9891 type Rec is record
dda83cd7
SM
9892 Empty : Boolean;
9893 Value : Integer;
284614f0
JB
9894 end record;
9895
9896 On the other hand, if we printed the value of "No", its fixed type
9897 would become:
9898
9899 type Rec is record
dda83cd7 9900 Empty : Boolean;
284614f0
JB
9901 end record;
9902
9903 Things become a little more complicated when trying to fix an entity
9904 with a dynamic type that directly contains another dynamic type,
9905 such as an array of variant records, for instance. There are
9906 two possible cases: Arrays, and records.
9907
21649b50
JB
9908 3. ``Fixing'' Arrays:
9909 ---------------------
9910
9911 The type structure in GDB describes an array in terms of its bounds,
9912 and the type of its elements. By design, all elements in the array
9913 have the same type and we cannot represent an array of variant elements
9914 using the current type structure in GDB. When fixing an array,
9915 we cannot fix the array element, as we would potentially need one
9916 fixed type per element of the array. As a result, the best we can do
9917 when fixing an array is to produce an array whose bounds and size
9918 are correct (allowing us to read it from memory), but without having
9919 touched its element type. Fixing each element will be done later,
9920 when (if) necessary.
9921
9922 Arrays are a little simpler to handle than records, because the same
9923 amount of memory is allocated for each element of the array, even if
1b536f04 9924 the amount of space actually used by each element differs from element
21649b50 9925 to element. Consider for instance the following array of type Rec:
284614f0
JB
9926
9927 type Rec_Array is array (1 .. 2) of Rec;
9928
1b536f04
JB
9929 The actual amount of memory occupied by each element might be different
9930 from element to element, depending on the value of their discriminant.
21649b50 9931 But the amount of space reserved for each element in the array remains
1b536f04 9932 fixed regardless. So we simply need to compute that size using
21649b50
JB
9933 the debugging information available, from which we can then determine
9934 the array size (we multiply the number of elements of the array by
9935 the size of each element).
9936
9937 The simplest case is when we have an array of a constrained element
9938 type. For instance, consider the following type declarations:
9939
dda83cd7
SM
9940 type Bounded_String (Max_Size : Integer) is
9941 Length : Integer;
9942 Buffer : String (1 .. Max_Size);
9943 end record;
9944 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
21649b50
JB
9945
9946 In this case, the compiler describes the array as an array of
9947 variable-size elements (identified by its XVS suffix) for which
9948 the size can be read in the parallel XVZ variable.
9949
9950 In the case of an array of an unconstrained element type, the compiler
9951 wraps the array element inside a private PAD type. This type should not
9952 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9953 that we also use the adjective "aligner" in our code to designate
9954 these wrapper types.
9955
1b536f04 9956 In some cases, the size allocated for each element is statically
21649b50
JB
9957 known. In that case, the PAD type already has the correct size,
9958 and the array element should remain unfixed.
9959
9960 But there are cases when this size is not statically known.
9961 For instance, assuming that "Five" is an integer variable:
284614f0 9962
dda83cd7
SM
9963 type Dynamic is array (1 .. Five) of Integer;
9964 type Wrapper (Has_Length : Boolean := False) is record
9965 Data : Dynamic;
9966 case Has_Length is
9967 when True => Length : Integer;
9968 when False => null;
9969 end case;
9970 end record;
9971 type Wrapper_Array is array (1 .. 2) of Wrapper;
284614f0 9972
dda83cd7
SM
9973 Hello : Wrapper_Array := (others => (Has_Length => True,
9974 Data => (others => 17),
9975 Length => 1));
284614f0
JB
9976
9977
9978 The debugging info would describe variable Hello as being an
9979 array of a PAD type. The size of that PAD type is not statically
9980 known, but can be determined using a parallel XVZ variable.
9981 In that case, a copy of the PAD type with the correct size should
9982 be used for the fixed array.
9983
21649b50
JB
9984 3. ``Fixing'' record type objects:
9985 ----------------------------------
9986
9987 Things are slightly different from arrays in the case of dynamic
284614f0
JB
9988 record types. In this case, in order to compute the associated
9989 fixed type, we need to determine the size and offset of each of
9990 its components. This, in turn, requires us to compute the fixed
9991 type of each of these components.
9992
9993 Consider for instance the example:
9994
dda83cd7
SM
9995 type Bounded_String (Max_Size : Natural) is record
9996 Str : String (1 .. Max_Size);
9997 Length : Natural;
9998 end record;
9999 My_String : Bounded_String (Max_Size => 10);
284614f0
JB
10000
10001 In that case, the position of field "Length" depends on the size
10002 of field Str, which itself depends on the value of the Max_Size
21649b50 10003 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10004 we need to fix the type of field Str. Therefore, fixing a variant
10005 record requires us to fix each of its components.
10006
10007 However, if a component does not have a dynamic size, the component
10008 should not be fixed. In particular, fields that use a PAD type
10009 should not fixed. Here is an example where this might happen
10010 (assuming type Rec above):
10011
10012 type Container (Big : Boolean) is record
dda83cd7
SM
10013 First : Rec;
10014 After : Integer;
10015 case Big is
10016 when True => Another : Integer;
10017 when False => null;
10018 end case;
284614f0
JB
10019 end record;
10020 My_Container : Container := (Big => False,
dda83cd7
SM
10021 First => (Empty => True),
10022 After => 42);
284614f0
JB
10023
10024 In that example, the compiler creates a PAD type for component First,
10025 whose size is constant, and then positions the component After just
10026 right after it. The offset of component After is therefore constant
10027 in this case.
10028
10029 The debugger computes the position of each field based on an algorithm
10030 that uses, among other things, the actual position and size of the field
21649b50
JB
10031 preceding it. Let's now imagine that the user is trying to print
10032 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10033 end up computing the offset of field After based on the size of the
10034 fixed version of field First. And since in our example First has
10035 only one actual field, the size of the fixed type is actually smaller
10036 than the amount of space allocated to that field, and thus we would
10037 compute the wrong offset of field After.
10038
21649b50
JB
10039 To make things more complicated, we need to watch out for dynamic
10040 components of variant records (identified by the ___XVL suffix in
10041 the component name). Even if the target type is a PAD type, the size
10042 of that type might not be statically known. So the PAD type needs
10043 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10044 we might end up with the wrong size for our component. This can be
10045 observed with the following type declarations:
284614f0 10046
dda83cd7
SM
10047 type Octal is new Integer range 0 .. 7;
10048 type Octal_Array is array (Positive range <>) of Octal;
10049 pragma Pack (Octal_Array);
284614f0 10050
dda83cd7
SM
10051 type Octal_Buffer (Size : Positive) is record
10052 Buffer : Octal_Array (1 .. Size);
10053 Length : Integer;
10054 end record;
284614f0
JB
10055
10056 In that case, Buffer is a PAD type whose size is unset and needs
10057 to be computed by fixing the unwrapped type.
10058
21649b50
JB
10059 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10060 ----------------------------------------------------------
10061
10062 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10063 thus far, be actually fixed?
10064
10065 The answer is: Only when referencing that element. For instance
10066 when selecting one component of a record, this specific component
10067 should be fixed at that point in time. Or when printing the value
10068 of a record, each component should be fixed before its value gets
10069 printed. Similarly for arrays, the element of the array should be
10070 fixed when printing each element of the array, or when extracting
10071 one element out of that array. On the other hand, fixing should
10072 not be performed on the elements when taking a slice of an array!
10073
31432a67 10074 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10075 size of each field is that we end up also miscomputing the size
10076 of the containing type. This can have adverse results when computing
10077 the value of an entity. GDB fetches the value of an entity based
10078 on the size of its type, and thus a wrong size causes GDB to fetch
10079 the wrong amount of memory. In the case where the computed size is
10080 too small, GDB fetches too little data to print the value of our
31432a67 10081 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10082 past the buffer containing the data =:-o. */
10083
ced9779b
JB
10084/* Evaluate a subexpression of EXP, at index *POS, and return a value
10085 for that subexpression cast to TO_TYPE. Advance *POS over the
10086 subexpression. */
10087
10088static value *
10089ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10090 enum noside noside, struct type *to_type)
10091{
10092 int pc = *pos;
10093
10094 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10095 || exp->elts[pc].opcode == OP_VAR_VALUE)
10096 {
10097 (*pos) += 4;
10098
10099 value *val;
10100 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
dda83cd7
SM
10101 {
10102 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10103 return value_zero (to_type, not_lval);
10104
10105 val = evaluate_var_msym_value (noside,
10106 exp->elts[pc + 1].objfile,
10107 exp->elts[pc + 2].msymbol);
10108 }
ced9779b 10109 else
dda83cd7
SM
10110 val = evaluate_var_value (noside,
10111 exp->elts[pc + 1].block,
10112 exp->elts[pc + 2].symbol);
ced9779b
JB
10113
10114 if (noside == EVAL_SKIP)
dda83cd7 10115 return eval_skip_value (exp);
ced9779b
JB
10116
10117 val = ada_value_cast (to_type, val);
10118
10119 /* Follow the Ada language semantics that do not allow taking
10120 an address of the result of a cast (view conversion in Ada). */
10121 if (VALUE_LVAL (val) == lval_memory)
dda83cd7
SM
10122 {
10123 if (value_lazy (val))
10124 value_fetch_lazy (val);
10125 VALUE_LVAL (val) = not_lval;
10126 }
ced9779b
JB
10127 return val;
10128 }
10129
10130 value *val = evaluate_subexp (to_type, exp, pos, noside);
10131 if (noside == EVAL_SKIP)
10132 return eval_skip_value (exp);
10133 return ada_value_cast (to_type, val);
10134}
10135
284614f0
JB
10136/* Implement the evaluate_exp routine in the exp_descriptor structure
10137 for the Ada language. */
10138
52ce6436 10139static struct value *
ebf56fd3 10140ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
dda83cd7 10141 int *pos, enum noside noside)
14f9c5c9
AS
10142{
10143 enum exp_opcode op;
b5385fc0 10144 int tem;
14f9c5c9 10145 int pc;
5ec18f2b 10146 int preeval_pos;
14f9c5c9
AS
10147 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10148 struct type *type;
52ce6436 10149 int nargs, oplen;
d2e4a39e 10150 struct value **argvec;
14f9c5c9 10151
d2e4a39e
AS
10152 pc = *pos;
10153 *pos += 1;
14f9c5c9
AS
10154 op = exp->elts[pc].opcode;
10155
d2e4a39e 10156 switch (op)
14f9c5c9
AS
10157 {
10158 default:
10159 *pos -= 1;
6e48bd2c 10160 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10161
10162 if (noside == EVAL_NORMAL)
10163 arg1 = unwrap_value (arg1);
6e48bd2c 10164
edd079d9 10165 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
dda83cd7
SM
10166 then we need to perform the conversion manually, because
10167 evaluate_subexp_standard doesn't do it. This conversion is
10168 necessary in Ada because the different kinds of float/fixed
10169 types in Ada have different representations.
6e48bd2c 10170
dda83cd7
SM
10171 Similarly, we need to perform the conversion from OP_LONG
10172 ourselves. */
edd079d9 10173 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
dda83cd7 10174 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10175
10176 return arg1;
4c4b4cd2
PH
10177
10178 case OP_STRING:
10179 {
dda83cd7
SM
10180 struct value *result;
10181
10182 *pos -= 1;
10183 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10184 /* The result type will have code OP_STRING, bashed there from
10185 OP_ARRAY. Bash it back. */
10186 if (value_type (result)->code () == TYPE_CODE_STRING)
10187 value_type (result)->set_code (TYPE_CODE_ARRAY);
10188 return result;
4c4b4cd2 10189 }
14f9c5c9
AS
10190
10191 case UNOP_CAST:
10192 (*pos) += 2;
10193 type = exp->elts[pc + 1].type;
ced9779b 10194 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10195
4c4b4cd2
PH
10196 case UNOP_QUAL:
10197 (*pos) += 2;
10198 type = exp->elts[pc + 1].type;
10199 return ada_evaluate_subexp (type, exp, pos, noside);
10200
14f9c5c9 10201 case BINOP_ASSIGN:
fe1fe7ea 10202 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
52ce6436
PH
10203 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10204 {
10205 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10206 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10207 return arg1;
10208 return ada_value_assign (arg1, arg1);
10209 }
003f3813 10210 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
dda83cd7
SM
10211 except if the lhs of our assignment is a convenience variable.
10212 In the case of assigning to a convenience variable, the lhs
10213 should be exactly the result of the evaluation of the rhs. */
003f3813
JB
10214 type = value_type (arg1);
10215 if (VALUE_LVAL (arg1) == lval_internalvar)
dda83cd7 10216 type = NULL;
003f3813 10217 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10218 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10219 return arg1;
f411722c
TT
10220 if (VALUE_LVAL (arg1) == lval_internalvar)
10221 {
10222 /* Nothing. */
10223 }
b2188a06 10224 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
dda83cd7 10225 arg2 = cast_to_gnat_encoded_fixed_point_type (value_type (arg1), arg2);
b2188a06 10226 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
dda83cd7
SM
10227 error
10228 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10229 else
dda83cd7 10230 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10231 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10232
10233 case BINOP_ADD:
10234 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10235 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10236 if (noside == EVAL_SKIP)
dda83cd7 10237 goto nosideret;
78134374 10238 if (value_type (arg1)->code () == TYPE_CODE_PTR)
dda83cd7
SM
10239 return (value_from_longest
10240 (value_type (arg1),
10241 value_as_long (arg1) + value_as_long (arg2)));
78134374 10242 if (value_type (arg2)->code () == TYPE_CODE_PTR)
dda83cd7
SM
10243 return (value_from_longest
10244 (value_type (arg2),
10245 value_as_long (arg1) + value_as_long (arg2)));
b2188a06 10246 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
dda83cd7
SM
10247 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
10248 && value_type (arg1) != value_type (arg2))
10249 error (_("Operands of fixed-point addition must have the same type"));
b7789565 10250 /* Do the addition, and cast the result to the type of the first
dda83cd7
SM
10251 argument. We cannot cast the result to a reference type, so if
10252 ARG1 is a reference type, find its underlying type. */
b7789565 10253 type = value_type (arg1);
78134374 10254 while (type->code () == TYPE_CODE_REF)
dda83cd7 10255 type = TYPE_TARGET_TYPE (type);
f44316fa 10256 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10257 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10258
10259 case BINOP_SUB:
10260 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10261 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10262 if (noside == EVAL_SKIP)
dda83cd7 10263 goto nosideret;
78134374 10264 if (value_type (arg1)->code () == TYPE_CODE_PTR)
dda83cd7
SM
10265 return (value_from_longest
10266 (value_type (arg1),
10267 value_as_long (arg1) - value_as_long (arg2)));
78134374 10268 if (value_type (arg2)->code () == TYPE_CODE_PTR)
dda83cd7
SM
10269 return (value_from_longest
10270 (value_type (arg2),
10271 value_as_long (arg1) - value_as_long (arg2)));
b2188a06 10272 if ((ada_is_gnat_encoded_fixed_point_type (value_type (arg1))
dda83cd7
SM
10273 || ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
10274 && value_type (arg1) != value_type (arg2))
10275 error (_("Operands of fixed-point subtraction "
0963b4bd 10276 "must have the same type"));
b7789565 10277 /* Do the substraction, and cast the result to the type of the first
dda83cd7
SM
10278 argument. We cannot cast the result to a reference type, so if
10279 ARG1 is a reference type, find its underlying type. */
b7789565 10280 type = value_type (arg1);
78134374 10281 while (type->code () == TYPE_CODE_REF)
dda83cd7 10282 type = TYPE_TARGET_TYPE (type);
f44316fa 10283 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10284 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10285
10286 case BINOP_MUL:
10287 case BINOP_DIV:
e1578042
JB
10288 case BINOP_REM:
10289 case BINOP_MOD:
fe1fe7ea
SM
10290 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10291 arg2 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 10292 if (noside == EVAL_SKIP)
dda83cd7 10293 goto nosideret;
e1578042 10294 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7
SM
10295 {
10296 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10297 return value_zero (value_type (arg1), not_lval);
10298 }
14f9c5c9 10299 else
dda83cd7
SM
10300 {
10301 type = builtin_type (exp->gdbarch)->builtin_double;
10302 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
10303 arg1 = cast_from_gnat_encoded_fixed_point_type (type, arg1);
10304 if (ada_is_gnat_encoded_fixed_point_type (value_type (arg2)))
10305 arg2 = cast_from_gnat_encoded_fixed_point_type (type, arg2);
10306 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10307 return ada_value_binop (arg1, arg2, op);
10308 }
4c4b4cd2 10309
4c4b4cd2
PH
10310 case BINOP_EQUAL:
10311 case BINOP_NOTEQUAL:
fe1fe7ea 10312 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
df407dfe 10313 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10314 if (noside == EVAL_SKIP)
dda83cd7 10315 goto nosideret;
4c4b4cd2 10316 if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10317 tem = 0;
4c4b4cd2 10318 else
f44316fa
UW
10319 {
10320 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10321 tem = ada_value_equal (arg1, arg2);
10322 }
4c4b4cd2 10323 if (op == BINOP_NOTEQUAL)
dda83cd7 10324 tem = !tem;
fbb06eb1
UW
10325 type = language_bool_type (exp->language_defn, exp->gdbarch);
10326 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10327
10328 case UNOP_NEG:
fe1fe7ea 10329 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 10330 if (noside == EVAL_SKIP)
dda83cd7 10331 goto nosideret;
b2188a06 10332 else if (ada_is_gnat_encoded_fixed_point_type (value_type (arg1)))
dda83cd7 10333 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10334 else
f44316fa
UW
10335 {
10336 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10337 return value_neg (arg1);
10338 }
4c4b4cd2 10339
2330c6c6
JB
10340 case BINOP_LOGICAL_AND:
10341 case BINOP_LOGICAL_OR:
10342 case UNOP_LOGICAL_NOT:
000d5124 10343 {
dda83cd7 10344 struct value *val;
000d5124 10345
dda83cd7
SM
10346 *pos -= 1;
10347 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1 10348 type = language_bool_type (exp->language_defn, exp->gdbarch);
dda83cd7 10349 return value_cast (type, val);
000d5124 10350 }
2330c6c6
JB
10351
10352 case BINOP_BITWISE_AND:
10353 case BINOP_BITWISE_IOR:
10354 case BINOP_BITWISE_XOR:
000d5124 10355 {
dda83cd7 10356 struct value *val;
000d5124 10357
fe1fe7ea
SM
10358 arg1 = evaluate_subexp (nullptr, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10359 *pos = pc;
dda83cd7 10360 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
000d5124 10361
dda83cd7 10362 return value_cast (value_type (arg1), val);
000d5124 10363 }
2330c6c6 10364
14f9c5c9
AS
10365 case OP_VAR_VALUE:
10366 *pos -= 1;
6799def4 10367
14f9c5c9 10368 if (noside == EVAL_SKIP)
dda83cd7
SM
10369 {
10370 *pos += 4;
10371 goto nosideret;
10372 }
da5c522f
JB
10373
10374 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
dda83cd7
SM
10375 /* Only encountered when an unresolved symbol occurs in a
10376 context other than a function call, in which case, it is
10377 invalid. */
10378 error (_("Unexpected unresolved symbol, %s, during evaluation"),
10379 exp->elts[pc + 2].symbol->print_name ());
da5c522f
JB
10380
10381 if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7
SM
10382 {
10383 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
10384 /* Check to see if this is a tagged type. We also need to handle
10385 the case where the type is a reference to a tagged type, but
10386 we have to be careful to exclude pointers to tagged types.
10387 The latter should be shown as usual (as a pointer), whereas
10388 a reference should mostly be transparent to the user. */
10389 if (ada_is_tagged_type (type, 0)
10390 || (type->code () == TYPE_CODE_REF
10391 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10392 {
10393 /* Tagged types are a little special in the fact that the real
10394 type is dynamic and can only be determined by inspecting the
10395 object's tag. This means that we need to get the object's
10396 value first (EVAL_NORMAL) and then extract the actual object
10397 type from its tag.
10398
10399 Note that we cannot skip the final step where we extract
10400 the object type from its tag, because the EVAL_NORMAL phase
10401 results in dynamic components being resolved into fixed ones.
10402 This can cause problems when trying to print the type
10403 description of tagged types whose parent has a dynamic size:
10404 We use the type name of the "_parent" component in order
10405 to print the name of the ancestor type in the type description.
10406 If that component had a dynamic size, the resolution into
10407 a fixed type would result in the loss of that type name,
10408 thus preventing us from printing the name of the ancestor
10409 type in the type description. */
fe1fe7ea 10410 arg1 = evaluate_subexp (nullptr, exp, pos, EVAL_NORMAL);
0d72a7c3 10411
78134374 10412 if (type->code () != TYPE_CODE_REF)
0d72a7c3
JB
10413 {
10414 struct type *actual_type;
10415
10416 actual_type = type_from_tag (ada_value_tag (arg1));
10417 if (actual_type == NULL)
10418 /* If, for some reason, we were unable to determine
10419 the actual type from the tag, then use the static
10420 approximation that we just computed as a fallback.
10421 This can happen if the debugging information is
10422 incomplete, for instance. */
10423 actual_type = type;
10424 return value_zero (actual_type, not_lval);
10425 }
10426 else
10427 {
10428 /* In the case of a ref, ada_coerce_ref takes care
10429 of determining the actual type. But the evaluation
10430 should return a ref as it should be valid to ask
10431 for its address; so rebuild a ref after coerce. */
10432 arg1 = ada_coerce_ref (arg1);
a65cfae5 10433 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10434 }
10435 }
0c1f74cf 10436
84754697
JB
10437 /* Records and unions for which GNAT encodings have been
10438 generated need to be statically fixed as well.
10439 Otherwise, non-static fixing produces a type where
10440 all dynamic properties are removed, which prevents "ptype"
10441 from being able to completely describe the type.
10442 For instance, a case statement in a variant record would be
10443 replaced by the relevant components based on the actual
10444 value of the discriminants. */
78134374 10445 if ((type->code () == TYPE_CODE_STRUCT
84754697 10446 && dynamic_template_type (type) != NULL)
78134374 10447 || (type->code () == TYPE_CODE_UNION
84754697
JB
10448 && ada_find_parallel_type (type, "___XVU") != NULL))
10449 {
10450 *pos += 4;
10451 return value_zero (to_static_fixed_type (type), not_lval);
10452 }
dda83cd7 10453 }
da5c522f
JB
10454
10455 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10456 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10457
10458 case OP_FUNCALL:
10459 (*pos) += 2;
10460
10461 /* Allocate arg vector, including space for the function to be
dda83cd7 10462 called in argvec[0] and a terminating NULL. */
4c4b4cd2 10463 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10464 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10465
10466 if (exp->elts[*pos].opcode == OP_VAR_VALUE
dda83cd7
SM
10467 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
10468 error (_("Unexpected unresolved symbol, %s, during evaluation"),
10469 exp->elts[pc + 5].symbol->print_name ());
4c4b4cd2 10470 else
dda83cd7
SM
10471 {
10472 for (tem = 0; tem <= nargs; tem += 1)
fe1fe7ea
SM
10473 argvec[tem] = evaluate_subexp (nullptr, exp, pos, noside);
10474 argvec[tem] = 0;
4c4b4cd2 10475
dda83cd7
SM
10476 if (noside == EVAL_SKIP)
10477 goto nosideret;
10478 }
4c4b4cd2 10479
ad82864c
JB
10480 if (ada_is_constrained_packed_array_type
10481 (desc_base_type (value_type (argvec[0]))))
dda83cd7 10482 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
78134374 10483 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
dda83cd7
SM
10484 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10485 /* This is a packed array that has already been fixed, and
284614f0
JB
10486 therefore already coerced to a simple array. Nothing further
10487 to do. */
dda83cd7 10488 ;
78134374 10489 else if (value_type (argvec[0])->code () == TYPE_CODE_REF)
e6c2c623
PMR
10490 {
10491 /* Make sure we dereference references so that all the code below
10492 feels like it's really handling the referenced value. Wrapping
10493 types (for alignment) may be there, so make sure we strip them as
10494 well. */
10495 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10496 }
78134374 10497 else if (value_type (argvec[0])->code () == TYPE_CODE_ARRAY
e6c2c623
PMR
10498 && VALUE_LVAL (argvec[0]) == lval_memory)
10499 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10500
df407dfe 10501 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10502
10503 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10504 them. So, if this is an array typedef (encoding use for array
10505 access types encoded as fat pointers), strip it now. */
78134374 10506 if (type->code () == TYPE_CODE_TYPEDEF)
720d1a40
JB
10507 type = ada_typedef_target_type (type);
10508
78134374 10509 if (type->code () == TYPE_CODE_PTR)
dda83cd7
SM
10510 {
10511 switch (ada_check_typedef (TYPE_TARGET_TYPE (type))->code ())
10512 {
10513 case TYPE_CODE_FUNC:
10514 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
10515 break;
10516 case TYPE_CODE_ARRAY:
10517 break;
10518 case TYPE_CODE_STRUCT:
10519 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10520 argvec[0] = ada_value_ind (argvec[0]);
10521 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
10522 break;
10523 default:
10524 error (_("cannot subscript or call something of type `%s'"),
10525 ada_type_name (value_type (argvec[0])));
10526 break;
10527 }
10528 }
4c4b4cd2 10529
78134374 10530 switch (type->code ())
dda83cd7
SM
10531 {
10532 case TYPE_CODE_FUNC:
10533 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10534 {
7022349d
PA
10535 if (TYPE_TARGET_TYPE (type) == NULL)
10536 error_call_unknown_return_type (NULL);
10537 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10538 }
e71585ff
PA
10539 return call_function_by_hand (argvec[0], NULL,
10540 gdb::make_array_view (argvec + 1,
10541 nargs));
c8ea1972
PH
10542 case TYPE_CODE_INTERNAL_FUNCTION:
10543 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10544 /* We don't know anything about what the internal
10545 function might return, but we have to return
10546 something. */
10547 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10548 not_lval);
10549 else
10550 return call_internal_function (exp->gdbarch, exp->language_defn,
10551 argvec[0], nargs, argvec + 1);
10552
dda83cd7
SM
10553 case TYPE_CODE_STRUCT:
10554 {
10555 int arity;
10556
10557 arity = ada_array_arity (type);
10558 type = ada_array_element_type (type, nargs);
10559 if (type == NULL)
10560 error (_("cannot subscript or call a record"));
10561 if (arity != nargs)
10562 error (_("wrong number of subscripts; expecting %d"), arity);
10563 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10564 return value_zero (ada_aligned_type (type), lval_memory);
10565 return
10566 unwrap_value (ada_value_subscript
10567 (argvec[0], nargs, argvec + 1));
10568 }
10569 case TYPE_CODE_ARRAY:
10570 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10571 {
10572 type = ada_array_element_type (type, nargs);
10573 if (type == NULL)
10574 error (_("element type of array unknown"));
10575 else
10576 return value_zero (ada_aligned_type (type), lval_memory);
10577 }
10578 return
10579 unwrap_value (ada_value_subscript
10580 (ada_coerce_to_simple_array (argvec[0]),
10581 nargs, argvec + 1));
10582 case TYPE_CODE_PTR: /* Pointer to array */
10583 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10584 {
deede10c 10585 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
dda83cd7
SM
10586 type = ada_array_element_type (type, nargs);
10587 if (type == NULL)
10588 error (_("element type of array unknown"));
10589 else
10590 return value_zero (ada_aligned_type (type), lval_memory);
10591 }
10592 return
10593 unwrap_value (ada_value_ptr_subscript (argvec[0],
deede10c 10594 nargs, argvec + 1));
4c4b4cd2 10595
dda83cd7
SM
10596 default:
10597 error (_("Attempt to index or call something other than an "
e1d5a0d2 10598 "array or function"));
dda83cd7 10599 }
4c4b4cd2
PH
10600
10601 case TERNOP_SLICE:
10602 {
fe1fe7ea
SM
10603 struct value *array = evaluate_subexp (nullptr, exp, pos, noside);
10604 struct value *low_bound_val
10605 = evaluate_subexp (nullptr, exp, pos, noside);
10606 struct value *high_bound_val
10607 = evaluate_subexp (nullptr, exp, pos, noside);
10608 LONGEST low_bound;
dda83cd7
SM
10609 LONGEST high_bound;
10610
10611 low_bound_val = coerce_ref (low_bound_val);
10612 high_bound_val = coerce_ref (high_bound_val);
10613 low_bound = value_as_long (low_bound_val);
10614 high_bound = value_as_long (high_bound_val);
10615
10616 if (noside == EVAL_SKIP)
10617 goto nosideret;
10618
10619 /* If this is a reference to an aligner type, then remove all
10620 the aligners. */
10621 if (value_type (array)->code () == TYPE_CODE_REF
10622 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10623 TYPE_TARGET_TYPE (value_type (array)) =
10624 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
10625
c9a28cbe 10626 if (ada_is_any_packed_array_type (value_type (array)))
dda83cd7
SM
10627 error (_("cannot slice a packed array"));
10628
10629 /* If this is a reference to an array or an array lvalue,
10630 convert to a pointer. */
10631 if (value_type (array)->code () == TYPE_CODE_REF
10632 || (value_type (array)->code () == TYPE_CODE_ARRAY
10633 && VALUE_LVAL (array) == lval_memory))
10634 array = value_addr (array);
10635
10636 if (noside == EVAL_AVOID_SIDE_EFFECTS
10637 && ada_is_array_descriptor_type (ada_check_typedef
10638 (value_type (array))))
10639 return empty_array (ada_type_of_array (array, 0), low_bound,
bff8c71f 10640 high_bound);
4c4b4cd2 10641
dda83cd7
SM
10642 array = ada_coerce_to_simple_array_ptr (array);
10643
10644 /* If we have more than one level of pointer indirection,
10645 dereference the value until we get only one level. */
10646 while (value_type (array)->code () == TYPE_CODE_PTR
10647 && (TYPE_TARGET_TYPE (value_type (array))->code ()
10648 == TYPE_CODE_PTR))
10649 array = value_ind (array);
10650
10651 /* Make sure we really do have an array type before going further,
10652 to avoid a SEGV when trying to get the index type or the target
10653 type later down the road if the debug info generated by
10654 the compiler is incorrect or incomplete. */
10655 if (!ada_is_simple_array_type (value_type (array)))
10656 error (_("cannot take slice of non-array"));
10657
10658 if (ada_check_typedef (value_type (array))->code ()
10659 == TYPE_CODE_PTR)
10660 {
10661 struct type *type0 = ada_check_typedef (value_type (array));
10662
10663 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
10664 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
10665 else
10666 {
10667 struct type *arr_type0 =
10668 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
10669
10670 return ada_value_slice_from_ptr (array, arr_type0,
10671 longest_to_int (low_bound),
10672 longest_to_int (high_bound));
10673 }
10674 }
10675 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10676 return array;
10677 else if (high_bound < low_bound)
10678 return empty_array (value_type (array), low_bound, high_bound);
10679 else
10680 return ada_value_slice (array, longest_to_int (low_bound),
529cad9c 10681 longest_to_int (high_bound));
4c4b4cd2 10682 }
14f9c5c9 10683
4c4b4cd2
PH
10684 case UNOP_IN_RANGE:
10685 (*pos) += 2;
fe1fe7ea 10686 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
8008e265 10687 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10688
14f9c5c9 10689 if (noside == EVAL_SKIP)
dda83cd7 10690 goto nosideret;
14f9c5c9 10691
78134374 10692 switch (type->code ())
dda83cd7
SM
10693 {
10694 default:
10695 lim_warning (_("Membership test incompletely implemented; "
e1d5a0d2 10696 "always returns true"));
fbb06eb1
UW
10697 type = language_bool_type (exp->language_defn, exp->gdbarch);
10698 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2 10699
dda83cd7 10700 case TYPE_CODE_RANGE:
5537ddd0
SM
10701 arg2 = value_from_longest (type,
10702 type->bounds ()->low.const_val ());
10703 arg3 = value_from_longest (type,
10704 type->bounds ()->high.const_val ());
f44316fa
UW
10705 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10706 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10707 type = language_bool_type (exp->language_defn, exp->gdbarch);
10708 return
10709 value_from_longest (type,
dda83cd7
SM
10710 (value_less (arg1, arg3)
10711 || value_equal (arg1, arg3))
10712 && (value_less (arg2, arg1)
10713 || value_equal (arg2, arg1)));
10714 }
4c4b4cd2
PH
10715
10716 case BINOP_IN_BOUNDS:
14f9c5c9 10717 (*pos) += 2;
fe1fe7ea
SM
10718 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10719 arg2 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 10720
4c4b4cd2 10721 if (noside == EVAL_SKIP)
dda83cd7 10722 goto nosideret;
14f9c5c9 10723
4c4b4cd2 10724 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10725 {
10726 type = language_bool_type (exp->language_defn, exp->gdbarch);
10727 return value_zero (type, not_lval);
10728 }
14f9c5c9 10729
4c4b4cd2 10730 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10731
1eea4ebd
UW
10732 type = ada_index_type (value_type (arg2), tem, "range");
10733 if (!type)
10734 type = value_type (arg1);
14f9c5c9 10735
1eea4ebd
UW
10736 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10737 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10738
f44316fa
UW
10739 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10740 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10741 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10742 return
dda83cd7
SM
10743 value_from_longest (type,
10744 (value_less (arg1, arg3)
10745 || value_equal (arg1, arg3))
10746 && (value_less (arg2, arg1)
10747 || value_equal (arg2, arg1)));
4c4b4cd2
PH
10748
10749 case TERNOP_IN_RANGE:
fe1fe7ea
SM
10750 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10751 arg2 = evaluate_subexp (nullptr, exp, pos, noside);
10752 arg3 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2
PH
10753
10754 if (noside == EVAL_SKIP)
dda83cd7 10755 goto nosideret;
4c4b4cd2 10756
f44316fa
UW
10757 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10758 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10759 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10760 return
dda83cd7
SM
10761 value_from_longest (type,
10762 (value_less (arg1, arg3)
10763 || value_equal (arg1, arg3))
10764 && (value_less (arg2, arg1)
10765 || value_equal (arg2, arg1)));
4c4b4cd2
PH
10766
10767 case OP_ATR_FIRST:
10768 case OP_ATR_LAST:
10769 case OP_ATR_LENGTH:
10770 {
dda83cd7 10771 struct type *type_arg;
5b4ee69b 10772
dda83cd7
SM
10773 if (exp->elts[*pos].opcode == OP_TYPE)
10774 {
fe1fe7ea
SM
10775 evaluate_subexp (nullptr, exp, pos, EVAL_SKIP);
10776 arg1 = NULL;
dda83cd7
SM
10777 type_arg = check_typedef (exp->elts[pc + 2].type);
10778 }
10779 else
10780 {
fe1fe7ea
SM
10781 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10782 type_arg = NULL;
dda83cd7 10783 }
76a01679 10784
dda83cd7
SM
10785 if (exp->elts[*pos].opcode != OP_LONG)
10786 error (_("Invalid operand to '%s"), ada_attribute_name (op));
10787 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10788 *pos += 4;
76a01679 10789
dda83cd7
SM
10790 if (noside == EVAL_SKIP)
10791 goto nosideret;
680e1bee
TT
10792 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10793 {
10794 if (type_arg == NULL)
10795 type_arg = value_type (arg1);
76a01679 10796
dda83cd7 10797 if (ada_is_constrained_packed_array_type (type_arg))
680e1bee
TT
10798 type_arg = decode_constrained_packed_array_type (type_arg);
10799
10800 if (!discrete_type_p (type_arg))
10801 {
10802 switch (op)
10803 {
10804 default: /* Should never happen. */
10805 error (_("unexpected attribute encountered"));
10806 case OP_ATR_FIRST:
10807 case OP_ATR_LAST:
10808 type_arg = ada_index_type (type_arg, tem,
10809 ada_attribute_name (op));
10810 break;
10811 case OP_ATR_LENGTH:
10812 type_arg = builtin_type (exp->gdbarch)->builtin_int;
10813 break;
10814 }
10815 }
10816
10817 return value_zero (type_arg, not_lval);
10818 }
dda83cd7
SM
10819 else if (type_arg == NULL)
10820 {
10821 arg1 = ada_coerce_ref (arg1);
76a01679 10822
dda83cd7
SM
10823 if (ada_is_constrained_packed_array_type (value_type (arg1)))
10824 arg1 = ada_coerce_to_simple_array (arg1);
76a01679 10825
dda83cd7 10826 if (op == OP_ATR_LENGTH)
1eea4ebd 10827 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10828 else
10829 {
10830 type = ada_index_type (value_type (arg1), tem,
10831 ada_attribute_name (op));
10832 if (type == NULL)
10833 type = builtin_type (exp->gdbarch)->builtin_int;
10834 }
76a01679 10835
dda83cd7
SM
10836 switch (op)
10837 {
10838 default: /* Should never happen. */
10839 error (_("unexpected attribute encountered"));
10840 case OP_ATR_FIRST:
10841 return value_from_longest
1eea4ebd 10842 (type, ada_array_bound (arg1, tem, 0));
dda83cd7
SM
10843 case OP_ATR_LAST:
10844 return value_from_longest
1eea4ebd 10845 (type, ada_array_bound (arg1, tem, 1));
dda83cd7
SM
10846 case OP_ATR_LENGTH:
10847 return value_from_longest
1eea4ebd 10848 (type, ada_array_length (arg1, tem));
dda83cd7
SM
10849 }
10850 }
10851 else if (discrete_type_p (type_arg))
10852 {
10853 struct type *range_type;
10854 const char *name = ada_type_name (type_arg);
10855
10856 range_type = NULL;
10857 if (name != NULL && type_arg->code () != TYPE_CODE_ENUM)
10858 range_type = to_fixed_range_type (type_arg, NULL);
10859 if (range_type == NULL)
10860 range_type = type_arg;
10861 switch (op)
10862 {
10863 default:
10864 error (_("unexpected attribute encountered"));
10865 case OP_ATR_FIRST:
690cc4eb 10866 return value_from_longest
43bbcdc2 10867 (range_type, ada_discrete_type_low_bound (range_type));
dda83cd7
SM
10868 case OP_ATR_LAST:
10869 return value_from_longest
43bbcdc2 10870 (range_type, ada_discrete_type_high_bound (range_type));
dda83cd7
SM
10871 case OP_ATR_LENGTH:
10872 error (_("the 'length attribute applies only to array types"));
10873 }
10874 }
10875 else if (type_arg->code () == TYPE_CODE_FLT)
10876 error (_("unimplemented type attribute"));
10877 else
10878 {
10879 LONGEST low, high;
10880
10881 if (ada_is_constrained_packed_array_type (type_arg))
10882 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10883
aa4fb036 10884 if (op == OP_ATR_LENGTH)
1eea4ebd 10885 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10886 else
10887 {
10888 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10889 if (type == NULL)
10890 type = builtin_type (exp->gdbarch)->builtin_int;
10891 }
1eea4ebd 10892
dda83cd7
SM
10893 switch (op)
10894 {
10895 default:
10896 error (_("unexpected attribute encountered"));
10897 case OP_ATR_FIRST:
10898 low = ada_array_bound_from_type (type_arg, tem, 0);
10899 return value_from_longest (type, low);
10900 case OP_ATR_LAST:
10901 high = ada_array_bound_from_type (type_arg, tem, 1);
10902 return value_from_longest (type, high);
10903 case OP_ATR_LENGTH:
10904 low = ada_array_bound_from_type (type_arg, tem, 0);
10905 high = ada_array_bound_from_type (type_arg, tem, 1);
10906 return value_from_longest (type, high - low + 1);
10907 }
10908 }
14f9c5c9
AS
10909 }
10910
4c4b4cd2 10911 case OP_ATR_TAG:
fe1fe7ea 10912 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 10913 if (noside == EVAL_SKIP)
dda83cd7 10914 goto nosideret;
4c4b4cd2
PH
10915
10916 if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10917 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10918
10919 return ada_value_tag (arg1);
10920
10921 case OP_ATR_MIN:
10922 case OP_ATR_MAX:
fe1fe7ea
SM
10923 evaluate_subexp (nullptr, exp, pos, EVAL_SKIP);
10924 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10925 arg2 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 10926 if (noside == EVAL_SKIP)
dda83cd7 10927 goto nosideret;
d2e4a39e 10928 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10929 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10930 else
f44316fa
UW
10931 {
10932 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10933 return value_binop (arg1, arg2,
10934 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10935 }
14f9c5c9 10936
4c4b4cd2
PH
10937 case OP_ATR_MODULUS:
10938 {
dda83cd7 10939 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10940
fe1fe7ea
SM
10941 evaluate_subexp (nullptr, exp, pos, EVAL_SKIP);
10942 if (noside == EVAL_SKIP)
dda83cd7 10943 goto nosideret;
4c4b4cd2 10944
dda83cd7
SM
10945 if (!ada_is_modular_type (type_arg))
10946 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10947
dda83cd7
SM
10948 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10949 ada_modulus (type_arg));
4c4b4cd2
PH
10950 }
10951
10952
10953 case OP_ATR_POS:
fe1fe7ea
SM
10954 evaluate_subexp (nullptr, exp, pos, EVAL_SKIP);
10955 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 10956 if (noside == EVAL_SKIP)
dda83cd7 10957 goto nosideret;
3cb382c9
UW
10958 type = builtin_type (exp->gdbarch)->builtin_int;
10959 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10960 return value_zero (type, not_lval);
14f9c5c9 10961 else
3cb382c9 10962 return value_pos_atr (type, arg1);
14f9c5c9 10963
4c4b4cd2 10964 case OP_ATR_SIZE:
fe1fe7ea 10965 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
8c1c099f
JB
10966 type = value_type (arg1);
10967
10968 /* If the argument is a reference, then dereference its type, since
dda83cd7
SM
10969 the user is really asking for the size of the actual object,
10970 not the size of the pointer. */
78134374 10971 if (type->code () == TYPE_CODE_REF)
dda83cd7 10972 type = TYPE_TARGET_TYPE (type);
8c1c099f 10973
4c4b4cd2 10974 if (noside == EVAL_SKIP)
dda83cd7 10975 goto nosideret;
4c4b4cd2 10976 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10977 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10978 else
dda83cd7
SM
10979 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
10980 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10981
10982 case OP_ATR_VAL:
fe1fe7ea
SM
10983 evaluate_subexp (nullptr, exp, pos, EVAL_SKIP);
10984 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 10985 type = exp->elts[pc + 2].type;
14f9c5c9 10986 if (noside == EVAL_SKIP)
dda83cd7 10987 goto nosideret;
4c4b4cd2 10988 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10989 return value_zero (type, not_lval);
4c4b4cd2 10990 else
dda83cd7 10991 return value_val_atr (type, arg1);
4c4b4cd2
PH
10992
10993 case BINOP_EXP:
fe1fe7ea
SM
10994 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
10995 arg2 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 10996 if (noside == EVAL_SKIP)
dda83cd7 10997 goto nosideret;
4c4b4cd2 10998 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 10999 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11000 else
f44316fa
UW
11001 {
11002 /* For integer exponentiation operations,
11003 only promote the first argument. */
11004 if (is_integral_type (value_type (arg2)))
11005 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11006 else
11007 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11008
11009 return value_binop (arg1, arg2, op);
11010 }
4c4b4cd2
PH
11011
11012 case UNOP_PLUS:
fe1fe7ea 11013 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 11014 if (noside == EVAL_SKIP)
dda83cd7 11015 goto nosideret;
4c4b4cd2 11016 else
dda83cd7 11017 return arg1;
4c4b4cd2
PH
11018
11019 case UNOP_ABS:
fe1fe7ea 11020 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
4c4b4cd2 11021 if (noside == EVAL_SKIP)
dda83cd7 11022 goto nosideret;
f44316fa 11023 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11024 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
dda83cd7 11025 return value_neg (arg1);
14f9c5c9 11026 else
dda83cd7 11027 return arg1;
14f9c5c9
AS
11028
11029 case UNOP_IND:
5ec18f2b 11030 preeval_pos = *pos;
fe1fe7ea 11031 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 11032 if (noside == EVAL_SKIP)
dda83cd7 11033 goto nosideret;
df407dfe 11034 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11035 if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7
SM
11036 {
11037 if (ada_is_array_descriptor_type (type))
11038 /* GDB allows dereferencing GNAT array descriptors. */
11039 {
11040 struct type *arrType = ada_type_of_array (arg1, 0);
11041
11042 if (arrType == NULL)
11043 error (_("Attempt to dereference null array pointer."));
11044 return value_at_lazy (arrType, 0);
11045 }
11046 else if (type->code () == TYPE_CODE_PTR
11047 || type->code () == TYPE_CODE_REF
11048 /* In C you can dereference an array to get the 1st elt. */
11049 || type->code () == TYPE_CODE_ARRAY)
11050 {
11051 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11052 only be determined by inspecting the object's tag.
11053 This means that we need to evaluate completely the
11054 expression in order to get its type. */
5ec18f2b 11055
78134374
SM
11056 if ((type->code () == TYPE_CODE_REF
11057 || type->code () == TYPE_CODE_PTR)
5ec18f2b
JG
11058 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11059 {
fe1fe7ea
SM
11060 arg1
11061 = evaluate_subexp (nullptr, exp, &preeval_pos, EVAL_NORMAL);
5ec18f2b
JG
11062 type = value_type (ada_value_ind (arg1));
11063 }
11064 else
11065 {
11066 type = to_static_fixed_type
11067 (ada_aligned_type
11068 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11069 }
c1b5a1a6 11070 ada_ensure_varsize_limit (type);
dda83cd7
SM
11071 return value_zero (type, lval_memory);
11072 }
11073 else if (type->code () == TYPE_CODE_INT)
6b0d7253
JB
11074 {
11075 /* GDB allows dereferencing an int. */
11076 if (expect_type == NULL)
11077 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11078 lval_memory);
11079 else
11080 {
11081 expect_type =
11082 to_static_fixed_type (ada_aligned_type (expect_type));
11083 return value_zero (expect_type, lval_memory);
11084 }
11085 }
dda83cd7
SM
11086 else
11087 error (_("Attempt to take contents of a non-pointer value."));
11088 }
0963b4bd 11089 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11090 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11091
78134374 11092 if (type->code () == TYPE_CODE_INT)
dda83cd7
SM
11093 /* GDB allows dereferencing an int. If we were given
11094 the expect_type, then use that as the target type.
11095 Otherwise, assume that the target type is an int. */
11096 {
11097 if (expect_type != NULL)
96967637
JB
11098 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11099 arg1));
11100 else
11101 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11102 (CORE_ADDR) value_as_address (arg1));
dda83cd7 11103 }
6b0d7253 11104
4c4b4cd2 11105 if (ada_is_array_descriptor_type (type))
dda83cd7
SM
11106 /* GDB allows dereferencing GNAT array descriptors. */
11107 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11108 else
dda83cd7 11109 return ada_value_ind (arg1);
14f9c5c9
AS
11110
11111 case STRUCTOP_STRUCT:
11112 tem = longest_to_int (exp->elts[pc + 1].longconst);
11113 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11114 preeval_pos = *pos;
fe1fe7ea 11115 arg1 = evaluate_subexp (nullptr, exp, pos, noside);
14f9c5c9 11116 if (noside == EVAL_SKIP)
dda83cd7 11117 goto nosideret;
14f9c5c9 11118 if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7
SM
11119 {
11120 struct type *type1 = value_type (arg1);
5b4ee69b 11121
dda83cd7
SM
11122 if (ada_is_tagged_type (type1, 1))
11123 {
11124 type = ada_lookup_struct_elt_type (type1,
11125 &exp->elts[pc + 2].string,
11126 1, 1);
5ec18f2b
JG
11127
11128 /* If the field is not found, check if it exists in the
11129 extension of this object's type. This means that we
11130 need to evaluate completely the expression. */
11131
dda83cd7 11132 if (type == NULL)
5ec18f2b 11133 {
fe1fe7ea
SM
11134 arg1
11135 = evaluate_subexp (nullptr, exp, &preeval_pos, EVAL_NORMAL);
5ec18f2b
JG
11136 arg1 = ada_value_struct_elt (arg1,
11137 &exp->elts[pc + 2].string,
11138 0);
11139 arg1 = unwrap_value (arg1);
11140 type = value_type (ada_to_fixed_value (arg1));
11141 }
dda83cd7
SM
11142 }
11143 else
11144 type =
11145 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
11146 0);
11147
11148 return value_zero (ada_aligned_type (type), lval_memory);
11149 }
14f9c5c9 11150 else
a579cd9a
MW
11151 {
11152 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11153 arg1 = unwrap_value (arg1);
11154 return ada_to_fixed_value (arg1);
11155 }
284614f0 11156
14f9c5c9 11157 case OP_TYPE:
4c4b4cd2 11158 /* The value is not supposed to be used. This is here to make it
dda83cd7 11159 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11160 (*pos) += 2;
11161 if (noside == EVAL_SKIP)
dda83cd7 11162 goto nosideret;
14f9c5c9 11163 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
dda83cd7 11164 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11165 else
dda83cd7 11166 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11167
11168 case OP_AGGREGATE:
11169 case OP_CHOICES:
11170 case OP_OTHERS:
11171 case OP_DISCRETE_RANGE:
11172 case OP_POSITIONAL:
11173 case OP_NAME:
11174 if (noside == EVAL_NORMAL)
11175 switch (op)
11176 {
11177 case OP_NAME:
11178 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11179 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11180 case OP_AGGREGATE:
11181 error (_("Aggregates only allowed on the right of an assignment"));
11182 default:
0963b4bd
MS
11183 internal_error (__FILE__, __LINE__,
11184 _("aggregate apparently mangled"));
52ce6436
PH
11185 }
11186
11187 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11188 *pos += oplen - 1;
11189 for (tem = 0; tem < nargs; tem += 1)
11190 ada_evaluate_subexp (NULL, exp, pos, noside);
11191 goto nosideret;
14f9c5c9
AS
11192 }
11193
11194nosideret:
ced9779b 11195 return eval_skip_value (exp);
14f9c5c9 11196}
14f9c5c9 11197\f
d2e4a39e 11198
dda83cd7 11199 /* Fixed point */
14f9c5c9
AS
11200
11201/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11202 type name that encodes the 'small and 'delta information.
4c4b4cd2 11203 Otherwise, return NULL. */
14f9c5c9 11204
d2e4a39e 11205static const char *
60bd1d53 11206gnat_encoded_fixed_point_type_info (struct type *type)
14f9c5c9 11207{
d2e4a39e 11208 const char *name = ada_type_name (type);
78134374 11209 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : type->code ();
14f9c5c9 11210
d2e4a39e
AS
11211 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11212 {
14f9c5c9 11213 const char *tail = strstr (name, "___XF_");
5b4ee69b 11214
14f9c5c9 11215 if (tail == NULL)
dda83cd7 11216 return NULL;
d2e4a39e 11217 else
dda83cd7 11218 return tail + 5;
14f9c5c9
AS
11219 }
11220 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
60bd1d53 11221 return gnat_encoded_fixed_point_type_info (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
11222 else
11223 return NULL;
11224}
11225
4c4b4cd2 11226/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11227
11228int
b2188a06 11229ada_is_gnat_encoded_fixed_point_type (struct type *type)
14f9c5c9 11230{
60bd1d53 11231 return gnat_encoded_fixed_point_type_info (type) != NULL;
14f9c5c9
AS
11232}
11233
4c4b4cd2
PH
11234/* Return non-zero iff TYPE represents a System.Address type. */
11235
11236int
11237ada_is_system_address_type (struct type *type)
11238{
7d93a1e0 11239 return (type->name () && strcmp (type->name (), "system__address") == 0);
4c4b4cd2
PH
11240}
11241
14f9c5c9 11242/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11243 type, return the target floating-point type to be used to represent
11244 of this type during internal computation. */
11245
11246static struct type *
11247ada_scaling_type (struct type *type)
11248{
11249 return builtin_type (get_type_arch (type))->builtin_long_double;
11250}
11251
11252/* Assuming that TYPE is the representation of an Ada fixed-point
11253 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11254 delta cannot be determined. */
14f9c5c9 11255
50eff16b 11256struct value *
b2188a06 11257gnat_encoded_fixed_point_delta (struct type *type)
14f9c5c9 11258{
60bd1d53 11259 const char *encoding = gnat_encoded_fixed_point_type_info (type);
50eff16b
UW
11260 struct type *scale_type = ada_scaling_type (type);
11261
11262 long long num, den;
11263
11264 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11265 return nullptr;
d2e4a39e 11266 else
50eff16b
UW
11267 return value_binop (value_from_longest (scale_type, num),
11268 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11269}
11270
b2188a06
JB
11271/* Assuming that ada_is_gnat_encoded_fixed_point_type (TYPE), return
11272 the scaling factor ('SMALL value) associated with the type. */
14f9c5c9 11273
50eff16b 11274struct value *
75f24e86 11275gnat_encoded_fixed_point_scaling_factor (struct type *type)
14f9c5c9 11276{
60bd1d53 11277 const char *encoding = gnat_encoded_fixed_point_type_info (type);
50eff16b
UW
11278 struct type *scale_type = ada_scaling_type (type);
11279
11280 long long num0, den0, num1, den1;
14f9c5c9 11281 int n;
d2e4a39e 11282
50eff16b 11283 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11284 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11285
11286 if (n < 2)
50eff16b 11287 return value_from_longest (scale_type, 1);
14f9c5c9 11288 else if (n == 4)
50eff16b
UW
11289 return value_binop (value_from_longest (scale_type, num1),
11290 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11291 else
50eff16b
UW
11292 return value_binop (value_from_longest (scale_type, num0),
11293 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11294}
11295
14f9c5c9 11296\f
d2e4a39e 11297
dda83cd7 11298 /* Range types */
14f9c5c9
AS
11299
11300/* Scan STR beginning at position K for a discriminant name, and
11301 return the value of that discriminant field of DVAL in *PX. If
11302 PNEW_K is not null, put the position of the character beyond the
11303 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11304 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11305
11306static int
108d56a4 11307scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
dda83cd7 11308 int *pnew_k)
14f9c5c9
AS
11309{
11310 static char *bound_buffer = NULL;
11311 static size_t bound_buffer_len = 0;
5da1a4d3 11312 const char *pstart, *pend, *bound;
d2e4a39e 11313 struct value *bound_val;
14f9c5c9
AS
11314
11315 if (dval == NULL || str == NULL || str[k] == '\0')
11316 return 0;
11317
5da1a4d3
SM
11318 pstart = str + k;
11319 pend = strstr (pstart, "__");
14f9c5c9
AS
11320 if (pend == NULL)
11321 {
5da1a4d3 11322 bound = pstart;
14f9c5c9
AS
11323 k += strlen (bound);
11324 }
d2e4a39e 11325 else
14f9c5c9 11326 {
5da1a4d3
SM
11327 int len = pend - pstart;
11328
11329 /* Strip __ and beyond. */
11330 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11331 strncpy (bound_buffer, pstart, len);
11332 bound_buffer[len] = '\0';
11333
14f9c5c9 11334 bound = bound_buffer;
d2e4a39e 11335 k = pend - str;
14f9c5c9 11336 }
d2e4a39e 11337
df407dfe 11338 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11339 if (bound_val == NULL)
11340 return 0;
11341
11342 *px = value_as_long (bound_val);
11343 if (pnew_k != NULL)
11344 *pnew_k = k;
11345 return 1;
11346}
11347
11348/* Value of variable named NAME in the current environment. If
11349 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11350 otherwise causes an error with message ERR_MSG. */
11351
d2e4a39e 11352static struct value *
edb0c9cb 11353get_var_value (const char *name, const char *err_msg)
14f9c5c9 11354{
b5ec771e 11355 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11356
54d343a2 11357 std::vector<struct block_symbol> syms;
b5ec771e
PA
11358 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11359 get_selected_block (0),
11360 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11361
11362 if (nsyms != 1)
11363 {
11364 if (err_msg == NULL)
dda83cd7 11365 return 0;
14f9c5c9 11366 else
dda83cd7 11367 error (("%s"), err_msg);
14f9c5c9
AS
11368 }
11369
54d343a2 11370 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11371}
d2e4a39e 11372
edb0c9cb
PA
11373/* Value of integer variable named NAME in the current environment.
11374 If no such variable is found, returns false. Otherwise, sets VALUE
11375 to the variable's value and returns true. */
4c4b4cd2 11376
edb0c9cb
PA
11377bool
11378get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11379{
4c4b4cd2 11380 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11381
14f9c5c9 11382 if (var_val == 0)
edb0c9cb
PA
11383 return false;
11384
11385 value = value_as_long (var_val);
11386 return true;
14f9c5c9 11387}
d2e4a39e 11388
14f9c5c9
AS
11389
11390/* Return a range type whose base type is that of the range type named
11391 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11392 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11393 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11394 corresponding range type from debug information; fall back to using it
11395 if symbol lookup fails. If a new type must be created, allocate it
11396 like ORIG_TYPE was. The bounds information, in general, is encoded
11397 in NAME, the base type given in the named range type. */
14f9c5c9 11398
d2e4a39e 11399static struct type *
28c85d6c 11400to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11401{
0d5cff50 11402 const char *name;
14f9c5c9 11403 struct type *base_type;
108d56a4 11404 const char *subtype_info;
14f9c5c9 11405
28c85d6c 11406 gdb_assert (raw_type != NULL);
7d93a1e0 11407 gdb_assert (raw_type->name () != NULL);
dddfab26 11408
78134374 11409 if (raw_type->code () == TYPE_CODE_RANGE)
14f9c5c9
AS
11410 base_type = TYPE_TARGET_TYPE (raw_type);
11411 else
11412 base_type = raw_type;
11413
7d93a1e0 11414 name = raw_type->name ();
14f9c5c9
AS
11415 subtype_info = strstr (name, "___XD");
11416 if (subtype_info == NULL)
690cc4eb 11417 {
43bbcdc2
PH
11418 LONGEST L = ada_discrete_type_low_bound (raw_type);
11419 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11420
690cc4eb
PH
11421 if (L < INT_MIN || U > INT_MAX)
11422 return raw_type;
11423 else
0c9c3474
SA
11424 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11425 L, U);
690cc4eb 11426 }
14f9c5c9
AS
11427 else
11428 {
11429 static char *name_buf = NULL;
11430 static size_t name_len = 0;
11431 int prefix_len = subtype_info - name;
11432 LONGEST L, U;
11433 struct type *type;
108d56a4 11434 const char *bounds_str;
14f9c5c9
AS
11435 int n;
11436
11437 GROW_VECT (name_buf, name_len, prefix_len + 5);
11438 strncpy (name_buf, name, prefix_len);
11439 name_buf[prefix_len] = '\0';
11440
11441 subtype_info += 5;
11442 bounds_str = strchr (subtype_info, '_');
11443 n = 1;
11444
d2e4a39e 11445 if (*subtype_info == 'L')
dda83cd7
SM
11446 {
11447 if (!ada_scan_number (bounds_str, n, &L, &n)
11448 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11449 return raw_type;
11450 if (bounds_str[n] == '_')
11451 n += 2;
11452 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
11453 n += 1;
11454 subtype_info += 1;
11455 }
d2e4a39e 11456 else
dda83cd7
SM
11457 {
11458 strcpy (name_buf + prefix_len, "___L");
11459 if (!get_int_var_value (name_buf, L))
11460 {
11461 lim_warning (_("Unknown lower bound, using 1."));
11462 L = 1;
11463 }
11464 }
14f9c5c9 11465
d2e4a39e 11466 if (*subtype_info == 'U')
dda83cd7
SM
11467 {
11468 if (!ada_scan_number (bounds_str, n, &U, &n)
11469 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11470 return raw_type;
11471 }
d2e4a39e 11472 else
dda83cd7
SM
11473 {
11474 strcpy (name_buf + prefix_len, "___U");
11475 if (!get_int_var_value (name_buf, U))
11476 {
11477 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
11478 U = L;
11479 }
11480 }
14f9c5c9 11481
0c9c3474
SA
11482 type = create_static_range_type (alloc_type_copy (raw_type),
11483 base_type, L, U);
f5a91472 11484 /* create_static_range_type alters the resulting type's length
dda83cd7
SM
11485 to match the size of the base_type, which is not what we want.
11486 Set it back to the original range type's length. */
f5a91472 11487 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d0e39ea2 11488 type->set_name (name);
14f9c5c9
AS
11489 return type;
11490 }
11491}
11492
4c4b4cd2
PH
11493/* True iff NAME is the name of a range type. */
11494
14f9c5c9 11495int
d2e4a39e 11496ada_is_range_type_name (const char *name)
14f9c5c9
AS
11497{
11498 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11499}
14f9c5c9 11500\f
d2e4a39e 11501
dda83cd7 11502 /* Modular types */
4c4b4cd2
PH
11503
11504/* True iff TYPE is an Ada modular type. */
14f9c5c9 11505
14f9c5c9 11506int
d2e4a39e 11507ada_is_modular_type (struct type *type)
14f9c5c9 11508{
18af8284 11509 struct type *subranged_type = get_base_type (type);
14f9c5c9 11510
78134374 11511 return (subranged_type != NULL && type->code () == TYPE_CODE_RANGE
dda83cd7
SM
11512 && subranged_type->code () == TYPE_CODE_INT
11513 && subranged_type->is_unsigned ());
14f9c5c9
AS
11514}
11515
4c4b4cd2
PH
11516/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11517
61ee279c 11518ULONGEST
0056e4d5 11519ada_modulus (struct type *type)
14f9c5c9 11520{
5e500d33
SM
11521 const dynamic_prop &high = type->bounds ()->high;
11522
11523 if (high.kind () == PROP_CONST)
11524 return (ULONGEST) high.const_val () + 1;
11525
11526 /* If TYPE is unresolved, the high bound might be a location list. Return
11527 0, for lack of a better value to return. */
11528 return 0;
14f9c5c9 11529}
d2e4a39e 11530\f
f7f9143b
JB
11531
11532/* Ada exception catchpoint support:
11533 ---------------------------------
11534
11535 We support 3 kinds of exception catchpoints:
11536 . catchpoints on Ada exceptions
11537 . catchpoints on unhandled Ada exceptions
11538 . catchpoints on failed assertions
11539
11540 Exceptions raised during failed assertions, or unhandled exceptions
11541 could perfectly be caught with the general catchpoint on Ada exceptions.
11542 However, we can easily differentiate these two special cases, and having
11543 the option to distinguish these two cases from the rest can be useful
11544 to zero-in on certain situations.
11545
11546 Exception catchpoints are a specialized form of breakpoint,
11547 since they rely on inserting breakpoints inside known routines
11548 of the GNAT runtime. The implementation therefore uses a standard
11549 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11550 of breakpoint_ops.
11551
0259addd
JB
11552 Support in the runtime for exception catchpoints have been changed
11553 a few times already, and these changes affect the implementation
11554 of these catchpoints. In order to be able to support several
11555 variants of the runtime, we use a sniffer that will determine
28010a5d 11556 the runtime variant used by the program being debugged. */
f7f9143b 11557
82eacd52
JB
11558/* Ada's standard exceptions.
11559
11560 The Ada 83 standard also defined Numeric_Error. But there so many
11561 situations where it was unclear from the Ada 83 Reference Manual
11562 (RM) whether Constraint_Error or Numeric_Error should be raised,
11563 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11564 Interpretation saying that anytime the RM says that Numeric_Error
11565 should be raised, the implementation may raise Constraint_Error.
11566 Ada 95 went one step further and pretty much removed Numeric_Error
11567 from the list of standard exceptions (it made it a renaming of
11568 Constraint_Error, to help preserve compatibility when compiling
11569 an Ada83 compiler). As such, we do not include Numeric_Error from
11570 this list of standard exceptions. */
3d0b0fa3 11571
27087b7f 11572static const char * const standard_exc[] = {
3d0b0fa3
JB
11573 "constraint_error",
11574 "program_error",
11575 "storage_error",
11576 "tasking_error"
11577};
11578
0259addd
JB
11579typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11580
11581/* A structure that describes how to support exception catchpoints
11582 for a given executable. */
11583
11584struct exception_support_info
11585{
11586 /* The name of the symbol to break on in order to insert
11587 a catchpoint on exceptions. */
11588 const char *catch_exception_sym;
11589
11590 /* The name of the symbol to break on in order to insert
11591 a catchpoint on unhandled exceptions. */
11592 const char *catch_exception_unhandled_sym;
11593
11594 /* The name of the symbol to break on in order to insert
11595 a catchpoint on failed assertions. */
11596 const char *catch_assert_sym;
11597
9f757bf7
XR
11598 /* The name of the symbol to break on in order to insert
11599 a catchpoint on exception handling. */
11600 const char *catch_handlers_sym;
11601
0259addd
JB
11602 /* Assuming that the inferior just triggered an unhandled exception
11603 catchpoint, this function is responsible for returning the address
11604 in inferior memory where the name of that exception is stored.
11605 Return zero if the address could not be computed. */
11606 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11607};
11608
11609static CORE_ADDR ada_unhandled_exception_name_addr (void);
11610static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11611
11612/* The following exception support info structure describes how to
11613 implement exception catchpoints with the latest version of the
ca683e3a 11614 Ada runtime (as of 2019-08-??). */
0259addd
JB
11615
11616static const struct exception_support_info default_exception_support_info =
ca683e3a
AO
11617{
11618 "__gnat_debug_raise_exception", /* catch_exception_sym */
11619 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11620 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11621 "__gnat_begin_handler_v1", /* catch_handlers_sym */
11622 ada_unhandled_exception_name_addr
11623};
11624
11625/* The following exception support info structure describes how to
11626 implement exception catchpoints with an earlier version of the
11627 Ada runtime (as of 2007-03-06) using v0 of the EH ABI. */
11628
11629static const struct exception_support_info exception_support_info_v0 =
0259addd
JB
11630{
11631 "__gnat_debug_raise_exception", /* catch_exception_sym */
11632 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11633 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11634 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11635 ada_unhandled_exception_name_addr
11636};
11637
11638/* The following exception support info structure describes how to
11639 implement exception catchpoints with a slightly older version
11640 of the Ada runtime. */
11641
11642static const struct exception_support_info exception_support_info_fallback =
11643{
11644 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11645 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11646 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11647 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11648 ada_unhandled_exception_name_addr_from_raise
11649};
11650
f17011e0
JB
11651/* Return nonzero if we can detect the exception support routines
11652 described in EINFO.
11653
11654 This function errors out if an abnormal situation is detected
11655 (for instance, if we find the exception support routines, but
11656 that support is found to be incomplete). */
11657
11658static int
11659ada_has_this_exception_support (const struct exception_support_info *einfo)
11660{
11661 struct symbol *sym;
11662
11663 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11664 that should be compiled with debugging information. As a result, we
11665 expect to find that symbol in the symtabs. */
11666
11667 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11668 if (sym == NULL)
a6af7abe
JB
11669 {
11670 /* Perhaps we did not find our symbol because the Ada runtime was
11671 compiled without debugging info, or simply stripped of it.
11672 It happens on some GNU/Linux distributions for instance, where
11673 users have to install a separate debug package in order to get
11674 the runtime's debugging info. In that situation, let the user
11675 know why we cannot insert an Ada exception catchpoint.
11676
11677 Note: Just for the purpose of inserting our Ada exception
11678 catchpoint, we could rely purely on the associated minimal symbol.
11679 But we would be operating in degraded mode anyway, since we are
11680 still lacking the debugging info needed later on to extract
11681 the name of the exception being raised (this name is printed in
11682 the catchpoint message, and is also used when trying to catch
11683 a specific exception). We do not handle this case for now. */
3b7344d5 11684 struct bound_minimal_symbol msym
1c8e84b0
JB
11685 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11686
3b7344d5 11687 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11688 error (_("Your Ada runtime appears to be missing some debugging "
11689 "information.\nCannot insert Ada exception catchpoint "
11690 "in this configuration."));
11691
11692 return 0;
11693 }
f17011e0
JB
11694
11695 /* Make sure that the symbol we found corresponds to a function. */
11696
11697 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
ca683e3a
AO
11698 {
11699 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11700 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11701 return 0;
11702 }
11703
11704 sym = standard_lookup (einfo->catch_handlers_sym, NULL, VAR_DOMAIN);
11705 if (sym == NULL)
11706 {
11707 struct bound_minimal_symbol msym
11708 = lookup_minimal_symbol (einfo->catch_handlers_sym, NULL, NULL);
11709
11710 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
11711 error (_("Your Ada runtime appears to be missing some debugging "
11712 "information.\nCannot insert Ada exception catchpoint "
11713 "in this configuration."));
11714
11715 return 0;
11716 }
11717
11718 /* Make sure that the symbol we found corresponds to a function. */
11719
11720 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11721 {
11722 error (_("Symbol \"%s\" is not a function (class = %d)"),
987012b8 11723 sym->linkage_name (), SYMBOL_CLASS (sym));
ca683e3a
AO
11724 return 0;
11725 }
f17011e0
JB
11726
11727 return 1;
11728}
11729
0259addd
JB
11730/* Inspect the Ada runtime and determine which exception info structure
11731 should be used to provide support for exception catchpoints.
11732
3eecfa55
JB
11733 This function will always set the per-inferior exception_info,
11734 or raise an error. */
0259addd
JB
11735
11736static void
11737ada_exception_support_info_sniffer (void)
11738{
3eecfa55 11739 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11740
11741 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11742 if (data->exception_info != NULL)
0259addd
JB
11743 return;
11744
11745 /* Check the latest (default) exception support info. */
f17011e0 11746 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11747 {
3eecfa55 11748 data->exception_info = &default_exception_support_info;
0259addd
JB
11749 return;
11750 }
11751
ca683e3a
AO
11752 /* Try the v0 exception suport info. */
11753 if (ada_has_this_exception_support (&exception_support_info_v0))
11754 {
11755 data->exception_info = &exception_support_info_v0;
11756 return;
11757 }
11758
0259addd 11759 /* Try our fallback exception suport info. */
f17011e0 11760 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11761 {
3eecfa55 11762 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11763 return;
11764 }
11765
11766 /* Sometimes, it is normal for us to not be able to find the routine
11767 we are looking for. This happens when the program is linked with
11768 the shared version of the GNAT runtime, and the program has not been
11769 started yet. Inform the user of these two possible causes if
11770 applicable. */
11771
ccefe4c4 11772 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11773 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11774
11775 /* If the symbol does not exist, then check that the program is
11776 already started, to make sure that shared libraries have been
11777 loaded. If it is not started, this may mean that the symbol is
11778 in a shared library. */
11779
e99b03dc 11780 if (inferior_ptid.pid () == 0)
0259addd
JB
11781 error (_("Unable to insert catchpoint. Try to start the program first."));
11782
11783 /* At this point, we know that we are debugging an Ada program and
11784 that the inferior has been started, but we still are not able to
0963b4bd 11785 find the run-time symbols. That can mean that we are in
0259addd
JB
11786 configurable run time mode, or that a-except as been optimized
11787 out by the linker... In any case, at this point it is not worth
11788 supporting this feature. */
11789
7dda8cff 11790 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11791}
11792
f7f9143b
JB
11793/* True iff FRAME is very likely to be that of a function that is
11794 part of the runtime system. This is all very heuristic, but is
11795 intended to be used as advice as to what frames are uninteresting
11796 to most users. */
11797
11798static int
11799is_known_support_routine (struct frame_info *frame)
11800{
692465f1 11801 enum language func_lang;
f7f9143b 11802 int i;
f35a17b5 11803 const char *fullname;
f7f9143b 11804
4ed6b5be
JB
11805 /* If this code does not have any debugging information (no symtab),
11806 This cannot be any user code. */
f7f9143b 11807
51abb421 11808 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
11809 if (sal.symtab == NULL)
11810 return 1;
11811
4ed6b5be
JB
11812 /* If there is a symtab, but the associated source file cannot be
11813 located, then assume this is not user code: Selecting a frame
11814 for which we cannot display the code would not be very helpful
11815 for the user. This should also take care of case such as VxWorks
11816 where the kernel has some debugging info provided for a few units. */
f7f9143b 11817
f35a17b5
JK
11818 fullname = symtab_to_fullname (sal.symtab);
11819 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11820 return 1;
11821
85102364 11822 /* Check the unit filename against the Ada runtime file naming.
4ed6b5be
JB
11823 We also check the name of the objfile against the name of some
11824 known system libraries that sometimes come with debugging info
11825 too. */
11826
f7f9143b
JB
11827 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11828 {
11829 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11830 if (re_exec (lbasename (sal.symtab->filename)))
dda83cd7 11831 return 1;
eb822aa6 11832 if (SYMTAB_OBJFILE (sal.symtab) != NULL
dda83cd7
SM
11833 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
11834 return 1;
f7f9143b
JB
11835 }
11836
4ed6b5be 11837 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11838
c6dc63a1
TT
11839 gdb::unique_xmalloc_ptr<char> func_name
11840 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
11841 if (func_name == NULL)
11842 return 1;
11843
11844 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11845 {
11846 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
11847 if (re_exec (func_name.get ()))
11848 return 1;
f7f9143b
JB
11849 }
11850
11851 return 0;
11852}
11853
11854/* Find the first frame that contains debugging information and that is not
11855 part of the Ada run-time, starting from FI and moving upward. */
11856
0ef643c8 11857void
f7f9143b
JB
11858ada_find_printable_frame (struct frame_info *fi)
11859{
11860 for (; fi != NULL; fi = get_prev_frame (fi))
11861 {
11862 if (!is_known_support_routine (fi))
dda83cd7
SM
11863 {
11864 select_frame (fi);
11865 break;
11866 }
f7f9143b
JB
11867 }
11868
11869}
11870
11871/* Assuming that the inferior just triggered an unhandled exception
11872 catchpoint, return the address in inferior memory where the name
11873 of the exception is stored.
11874
11875 Return zero if the address could not be computed. */
11876
11877static CORE_ADDR
11878ada_unhandled_exception_name_addr (void)
0259addd
JB
11879{
11880 return parse_and_eval_address ("e.full_name");
11881}
11882
11883/* Same as ada_unhandled_exception_name_addr, except that this function
11884 should be used when the inferior uses an older version of the runtime,
11885 where the exception name needs to be extracted from a specific frame
11886 several frames up in the callstack. */
11887
11888static CORE_ADDR
11889ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11890{
11891 int frame_level;
11892 struct frame_info *fi;
3eecfa55 11893 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
11894
11895 /* To determine the name of this exception, we need to select
11896 the frame corresponding to RAISE_SYM_NAME. This frame is
11897 at least 3 levels up, so we simply skip the first 3 frames
11898 without checking the name of their associated function. */
11899 fi = get_current_frame ();
11900 for (frame_level = 0; frame_level < 3; frame_level += 1)
11901 if (fi != NULL)
11902 fi = get_prev_frame (fi);
11903
11904 while (fi != NULL)
11905 {
692465f1
JB
11906 enum language func_lang;
11907
c6dc63a1
TT
11908 gdb::unique_xmalloc_ptr<char> func_name
11909 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
11910 if (func_name != NULL)
11911 {
dda83cd7 11912 if (strcmp (func_name.get (),
55b87a52
KS
11913 data->exception_info->catch_exception_sym) == 0)
11914 break; /* We found the frame we were looking for... */
55b87a52 11915 }
fb44b1a7 11916 fi = get_prev_frame (fi);
f7f9143b
JB
11917 }
11918
11919 if (fi == NULL)
11920 return 0;
11921
11922 select_frame (fi);
11923 return parse_and_eval_address ("id.full_name");
11924}
11925
11926/* Assuming the inferior just triggered an Ada exception catchpoint
11927 (of any type), return the address in inferior memory where the name
11928 of the exception is stored, if applicable.
11929
45db7c09
PA
11930 Assumes the selected frame is the current frame.
11931
f7f9143b
JB
11932 Return zero if the address could not be computed, or if not relevant. */
11933
11934static CORE_ADDR
761269c8 11935ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
dda83cd7 11936 struct breakpoint *b)
f7f9143b 11937{
3eecfa55
JB
11938 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11939
f7f9143b
JB
11940 switch (ex)
11941 {
761269c8 11942 case ada_catch_exception:
dda83cd7
SM
11943 return (parse_and_eval_address ("e.full_name"));
11944 break;
f7f9143b 11945
761269c8 11946 case ada_catch_exception_unhandled:
dda83cd7
SM
11947 return data->exception_info->unhandled_exception_name_addr ();
11948 break;
9f757bf7
XR
11949
11950 case ada_catch_handlers:
dda83cd7 11951 return 0; /* The runtimes does not provide access to the exception
9f757bf7 11952 name. */
dda83cd7 11953 break;
9f757bf7 11954
761269c8 11955 case ada_catch_assert:
dda83cd7
SM
11956 return 0; /* Exception name is not relevant in this case. */
11957 break;
f7f9143b
JB
11958
11959 default:
dda83cd7
SM
11960 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11961 break;
f7f9143b
JB
11962 }
11963
11964 return 0; /* Should never be reached. */
11965}
11966
e547c119
JB
11967/* Assuming the inferior is stopped at an exception catchpoint,
11968 return the message which was associated to the exception, if
11969 available. Return NULL if the message could not be retrieved.
11970
e547c119
JB
11971 Note: The exception message can be associated to an exception
11972 either through the use of the Raise_Exception function, or
11973 more simply (Ada 2005 and later), via:
11974
11975 raise Exception_Name with "exception message";
11976
11977 */
11978
6f46ac85 11979static gdb::unique_xmalloc_ptr<char>
e547c119
JB
11980ada_exception_message_1 (void)
11981{
11982 struct value *e_msg_val;
e547c119 11983 int e_msg_len;
e547c119
JB
11984
11985 /* For runtimes that support this feature, the exception message
11986 is passed as an unbounded string argument called "message". */
11987 e_msg_val = parse_and_eval ("message");
11988 if (e_msg_val == NULL)
11989 return NULL; /* Exception message not supported. */
11990
11991 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
11992 gdb_assert (e_msg_val != NULL);
11993 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
11994
11995 /* If the message string is empty, then treat it as if there was
11996 no exception message. */
11997 if (e_msg_len <= 0)
11998 return NULL;
11999
15f3b077
TT
12000 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12001 read_memory (value_address (e_msg_val), (gdb_byte *) e_msg.get (),
12002 e_msg_len);
12003 e_msg.get ()[e_msg_len] = '\0';
12004
12005 return e_msg;
e547c119
JB
12006}
12007
12008/* Same as ada_exception_message_1, except that all exceptions are
12009 contained here (returning NULL instead). */
12010
6f46ac85 12011static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12012ada_exception_message (void)
12013{
6f46ac85 12014 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12015
a70b8144 12016 try
e547c119
JB
12017 {
12018 e_msg = ada_exception_message_1 ();
12019 }
230d2906 12020 catch (const gdb_exception_error &e)
e547c119 12021 {
6f46ac85 12022 e_msg.reset (nullptr);
e547c119 12023 }
e547c119
JB
12024
12025 return e_msg;
12026}
12027
f7f9143b
JB
12028/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12029 any error that ada_exception_name_addr_1 might cause to be thrown.
12030 When an error is intercepted, a warning with the error message is printed,
12031 and zero is returned. */
12032
12033static CORE_ADDR
761269c8 12034ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
dda83cd7 12035 struct breakpoint *b)
f7f9143b 12036{
f7f9143b
JB
12037 CORE_ADDR result = 0;
12038
a70b8144 12039 try
f7f9143b
JB
12040 {
12041 result = ada_exception_name_addr_1 (ex, b);
12042 }
12043
230d2906 12044 catch (const gdb_exception_error &e)
f7f9143b 12045 {
3d6e9d23 12046 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12047 return 0;
12048 }
12049
12050 return result;
12051}
12052
cb7de75e 12053static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12054 (const char *excep_string,
12055 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12056
12057/* Ada catchpoints.
12058
12059 In the case of catchpoints on Ada exceptions, the catchpoint will
12060 stop the target on every exception the program throws. When a user
12061 specifies the name of a specific exception, we translate this
12062 request into a condition expression (in text form), and then parse
12063 it into an expression stored in each of the catchpoint's locations.
12064 We then use this condition to check whether the exception that was
12065 raised is the one the user is interested in. If not, then the
12066 target is resumed again. We store the name of the requested
12067 exception, in order to be able to re-set the condition expression
12068 when symbols change. */
12069
12070/* An instance of this type is used to represent an Ada catchpoint
5625a286 12071 breakpoint location. */
28010a5d 12072
5625a286 12073class ada_catchpoint_location : public bp_location
28010a5d 12074{
5625a286 12075public:
5f486660 12076 ada_catchpoint_location (breakpoint *owner)
f06f1252 12077 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12078 {}
28010a5d
PA
12079
12080 /* The condition that checks whether the exception that was raised
12081 is the specific exception the user specified on catchpoint
12082 creation. */
4d01a485 12083 expression_up excep_cond_expr;
28010a5d
PA
12084};
12085
c1fc2657 12086/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12087
c1fc2657 12088struct ada_catchpoint : public breakpoint
28010a5d 12089{
37f6a7f4
TT
12090 explicit ada_catchpoint (enum ada_exception_catchpoint_kind kind)
12091 : m_kind (kind)
12092 {
12093 }
12094
28010a5d 12095 /* The name of the specific exception the user specified. */
bc18fbb5 12096 std::string excep_string;
37f6a7f4
TT
12097
12098 /* What kind of catchpoint this is. */
12099 enum ada_exception_catchpoint_kind m_kind;
28010a5d
PA
12100};
12101
12102/* Parse the exception condition string in the context of each of the
12103 catchpoint's locations, and store them for later evaluation. */
12104
12105static void
9f757bf7 12106create_excep_cond_exprs (struct ada_catchpoint *c,
dda83cd7 12107 enum ada_exception_catchpoint_kind ex)
28010a5d 12108{
fccf9de1
TT
12109 struct bp_location *bl;
12110
28010a5d 12111 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12112 if (c->excep_string.empty ())
28010a5d
PA
12113 return;
12114
12115 /* Same if there are no locations... */
c1fc2657 12116 if (c->loc == NULL)
28010a5d
PA
12117 return;
12118
fccf9de1
TT
12119 /* Compute the condition expression in text form, from the specific
12120 expection we want to catch. */
12121 std::string cond_string
12122 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (), ex);
28010a5d 12123
fccf9de1
TT
12124 /* Iterate over all the catchpoint's locations, and parse an
12125 expression for each. */
12126 for (bl = c->loc; bl != NULL; bl = bl->next)
28010a5d
PA
12127 {
12128 struct ada_catchpoint_location *ada_loc
fccf9de1 12129 = (struct ada_catchpoint_location *) bl;
4d01a485 12130 expression_up exp;
28010a5d 12131
fccf9de1 12132 if (!bl->shlib_disabled)
28010a5d 12133 {
bbc13ae3 12134 const char *s;
28010a5d 12135
cb7de75e 12136 s = cond_string.c_str ();
a70b8144 12137 try
28010a5d 12138 {
fccf9de1
TT
12139 exp = parse_exp_1 (&s, bl->address,
12140 block_for_pc (bl->address),
036e657b 12141 0);
28010a5d 12142 }
230d2906 12143 catch (const gdb_exception_error &e)
849f2b52
JB
12144 {
12145 warning (_("failed to reevaluate internal exception condition "
12146 "for catchpoint %d: %s"),
3d6e9d23 12147 c->number, e.what ());
849f2b52 12148 }
28010a5d
PA
12149 }
12150
b22e99fd 12151 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12152 }
28010a5d
PA
12153}
12154
28010a5d
PA
12155/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12156 structure for all exception catchpoint kinds. */
12157
12158static struct bp_location *
37f6a7f4 12159allocate_location_exception (struct breakpoint *self)
28010a5d 12160{
5f486660 12161 return new ada_catchpoint_location (self);
28010a5d
PA
12162}
12163
12164/* Implement the RE_SET method in the breakpoint_ops structure for all
12165 exception catchpoint kinds. */
12166
12167static void
37f6a7f4 12168re_set_exception (struct breakpoint *b)
28010a5d
PA
12169{
12170 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12171
12172 /* Call the base class's method. This updates the catchpoint's
12173 locations. */
2060206e 12174 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12175
12176 /* Reparse the exception conditional expressions. One for each
12177 location. */
37f6a7f4 12178 create_excep_cond_exprs (c, c->m_kind);
28010a5d
PA
12179}
12180
12181/* Returns true if we should stop for this breakpoint hit. If the
12182 user specified a specific exception, we only want to cause a stop
12183 if the program thrown that exception. */
12184
12185static int
12186should_stop_exception (const struct bp_location *bl)
12187{
12188 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12189 const struct ada_catchpoint_location *ada_loc
12190 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12191 int stop;
12192
37f6a7f4
TT
12193 struct internalvar *var = lookup_internalvar ("_ada_exception");
12194 if (c->m_kind == ada_catch_assert)
12195 clear_internalvar (var);
12196 else
12197 {
12198 try
12199 {
12200 const char *expr;
12201
12202 if (c->m_kind == ada_catch_handlers)
12203 expr = ("GNAT_GCC_exception_Access(gcc_exception)"
12204 ".all.occurrence.id");
12205 else
12206 expr = "e";
12207
12208 struct value *exc = parse_and_eval (expr);
12209 set_internalvar (var, exc);
12210 }
12211 catch (const gdb_exception_error &ex)
12212 {
12213 clear_internalvar (var);
12214 }
12215 }
12216
28010a5d 12217 /* With no specific exception, should always stop. */
bc18fbb5 12218 if (c->excep_string.empty ())
28010a5d
PA
12219 return 1;
12220
12221 if (ada_loc->excep_cond_expr == NULL)
12222 {
12223 /* We will have a NULL expression if back when we were creating
12224 the expressions, this location's had failed to parse. */
12225 return 1;
12226 }
12227
12228 stop = 1;
a70b8144 12229 try
28010a5d
PA
12230 {
12231 struct value *mark;
12232
12233 mark = value_mark ();
4d01a485 12234 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12235 value_free_to_mark (mark);
12236 }
230d2906 12237 catch (const gdb_exception &ex)
492d29ea
PA
12238 {
12239 exception_fprintf (gdb_stderr, ex,
12240 _("Error in testing exception condition:\n"));
12241 }
492d29ea 12242
28010a5d
PA
12243 return stop;
12244}
12245
12246/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12247 for all exception catchpoint kinds. */
12248
12249static void
37f6a7f4 12250check_status_exception (bpstat bs)
28010a5d
PA
12251{
12252 bs->stop = should_stop_exception (bs->bp_location_at);
12253}
12254
f7f9143b
JB
12255/* Implement the PRINT_IT method in the breakpoint_ops structure
12256 for all exception catchpoint kinds. */
12257
12258static enum print_stop_action
37f6a7f4 12259print_it_exception (bpstat bs)
f7f9143b 12260{
79a45e25 12261 struct ui_out *uiout = current_uiout;
348d480f
PA
12262 struct breakpoint *b = bs->breakpoint_at;
12263
956a9fb9 12264 annotate_catchpoint (b->number);
f7f9143b 12265
112e8700 12266 if (uiout->is_mi_like_p ())
f7f9143b 12267 {
112e8700 12268 uiout->field_string ("reason",
956a9fb9 12269 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12270 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12271 }
12272
112e8700
SM
12273 uiout->text (b->disposition == disp_del
12274 ? "\nTemporary catchpoint " : "\nCatchpoint ");
381befee 12275 uiout->field_signed ("bkptno", b->number);
112e8700 12276 uiout->text (", ");
f7f9143b 12277
45db7c09
PA
12278 /* ada_exception_name_addr relies on the selected frame being the
12279 current frame. Need to do this here because this function may be
12280 called more than once when printing a stop, and below, we'll
12281 select the first frame past the Ada run-time (see
12282 ada_find_printable_frame). */
12283 select_frame (get_current_frame ());
12284
37f6a7f4
TT
12285 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12286 switch (c->m_kind)
f7f9143b 12287 {
761269c8
JB
12288 case ada_catch_exception:
12289 case ada_catch_exception_unhandled:
9f757bf7 12290 case ada_catch_handlers:
956a9fb9 12291 {
37f6a7f4 12292 const CORE_ADDR addr = ada_exception_name_addr (c->m_kind, b);
956a9fb9
JB
12293 char exception_name[256];
12294
12295 if (addr != 0)
12296 {
c714b426
PA
12297 read_memory (addr, (gdb_byte *) exception_name,
12298 sizeof (exception_name) - 1);
956a9fb9
JB
12299 exception_name [sizeof (exception_name) - 1] = '\0';
12300 }
12301 else
12302 {
12303 /* For some reason, we were unable to read the exception
12304 name. This could happen if the Runtime was compiled
12305 without debugging info, for instance. In that case,
12306 just replace the exception name by the generic string
12307 "exception" - it will read as "an exception" in the
12308 notification we are about to print. */
967cff16 12309 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12310 }
12311 /* In the case of unhandled exception breakpoints, we print
12312 the exception name as "unhandled EXCEPTION_NAME", to make
12313 it clearer to the user which kind of catchpoint just got
12314 hit. We used ui_out_text to make sure that this extra
12315 info does not pollute the exception name in the MI case. */
37f6a7f4 12316 if (c->m_kind == ada_catch_exception_unhandled)
112e8700
SM
12317 uiout->text ("unhandled ");
12318 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12319 }
12320 break;
761269c8 12321 case ada_catch_assert:
956a9fb9
JB
12322 /* In this case, the name of the exception is not really
12323 important. Just print "failed assertion" to make it clearer
12324 that his program just hit an assertion-failure catchpoint.
12325 We used ui_out_text because this info does not belong in
12326 the MI output. */
112e8700 12327 uiout->text ("failed assertion");
956a9fb9 12328 break;
f7f9143b 12329 }
e547c119 12330
6f46ac85 12331 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12332 if (exception_message != NULL)
12333 {
e547c119 12334 uiout->text (" (");
6f46ac85 12335 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12336 uiout->text (")");
e547c119
JB
12337 }
12338
112e8700 12339 uiout->text (" at ");
956a9fb9 12340 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12341
12342 return PRINT_SRC_AND_LOC;
12343}
12344
12345/* Implement the PRINT_ONE method in the breakpoint_ops structure
12346 for all exception catchpoint kinds. */
12347
12348static void
37f6a7f4 12349print_one_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12350{
79a45e25 12351 struct ui_out *uiout = current_uiout;
28010a5d 12352 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12353 struct value_print_options opts;
12354
12355 get_user_print_options (&opts);
f06f1252 12356
79a45b7d 12357 if (opts.addressprint)
f06f1252 12358 uiout->field_skip ("addr");
f7f9143b
JB
12359
12360 annotate_field (5);
37f6a7f4 12361 switch (c->m_kind)
f7f9143b 12362 {
761269c8 12363 case ada_catch_exception:
dda83cd7
SM
12364 if (!c->excep_string.empty ())
12365 {
bc18fbb5
TT
12366 std::string msg = string_printf (_("`%s' Ada exception"),
12367 c->excep_string.c_str ());
28010a5d 12368
dda83cd7
SM
12369 uiout->field_string ("what", msg);
12370 }
12371 else
12372 uiout->field_string ("what", "all Ada exceptions");
12373
12374 break;
f7f9143b 12375
761269c8 12376 case ada_catch_exception_unhandled:
dda83cd7
SM
12377 uiout->field_string ("what", "unhandled Ada exceptions");
12378 break;
f7f9143b 12379
9f757bf7 12380 case ada_catch_handlers:
dda83cd7
SM
12381 if (!c->excep_string.empty ())
12382 {
9f757bf7
XR
12383 uiout->field_fmt ("what",
12384 _("`%s' Ada exception handlers"),
bc18fbb5 12385 c->excep_string.c_str ());
dda83cd7
SM
12386 }
12387 else
9f757bf7 12388 uiout->field_string ("what", "all Ada exceptions handlers");
dda83cd7 12389 break;
9f757bf7 12390
761269c8 12391 case ada_catch_assert:
dda83cd7
SM
12392 uiout->field_string ("what", "failed Ada assertions");
12393 break;
f7f9143b
JB
12394
12395 default:
dda83cd7
SM
12396 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12397 break;
f7f9143b
JB
12398 }
12399}
12400
12401/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12402 for all exception catchpoint kinds. */
12403
12404static void
37f6a7f4 12405print_mention_exception (struct breakpoint *b)
f7f9143b 12406{
28010a5d 12407 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12408 struct ui_out *uiout = current_uiout;
28010a5d 12409
112e8700 12410 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
dda83cd7 12411 : _("Catchpoint "));
381befee 12412 uiout->field_signed ("bkptno", b->number);
112e8700 12413 uiout->text (": ");
00eb2c4a 12414
37f6a7f4 12415 switch (c->m_kind)
f7f9143b 12416 {
761269c8 12417 case ada_catch_exception:
dda83cd7 12418 if (!c->excep_string.empty ())
00eb2c4a 12419 {
862d101a 12420 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12421 c->excep_string.c_str ());
862d101a 12422 uiout->text (info.c_str ());
00eb2c4a 12423 }
dda83cd7
SM
12424 else
12425 uiout->text (_("all Ada exceptions"));
12426 break;
f7f9143b 12427
761269c8 12428 case ada_catch_exception_unhandled:
dda83cd7
SM
12429 uiout->text (_("unhandled Ada exceptions"));
12430 break;
9f757bf7
XR
12431
12432 case ada_catch_handlers:
dda83cd7 12433 if (!c->excep_string.empty ())
9f757bf7
XR
12434 {
12435 std::string info
12436 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12437 c->excep_string.c_str ());
9f757bf7
XR
12438 uiout->text (info.c_str ());
12439 }
dda83cd7
SM
12440 else
12441 uiout->text (_("all Ada exceptions handlers"));
12442 break;
9f757bf7 12443
761269c8 12444 case ada_catch_assert:
dda83cd7
SM
12445 uiout->text (_("failed Ada assertions"));
12446 break;
f7f9143b
JB
12447
12448 default:
dda83cd7
SM
12449 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12450 break;
f7f9143b
JB
12451 }
12452}
12453
6149aea9
PA
12454/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12455 for all exception catchpoint kinds. */
12456
12457static void
37f6a7f4 12458print_recreate_exception (struct breakpoint *b, struct ui_file *fp)
6149aea9 12459{
28010a5d
PA
12460 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12461
37f6a7f4 12462 switch (c->m_kind)
6149aea9 12463 {
761269c8 12464 case ada_catch_exception:
6149aea9 12465 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12466 if (!c->excep_string.empty ())
12467 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12468 break;
12469
761269c8 12470 case ada_catch_exception_unhandled:
78076abc 12471 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12472 break;
12473
9f757bf7
XR
12474 case ada_catch_handlers:
12475 fprintf_filtered (fp, "catch handlers");
12476 break;
12477
761269c8 12478 case ada_catch_assert:
6149aea9
PA
12479 fprintf_filtered (fp, "catch assert");
12480 break;
12481
12482 default:
12483 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12484 }
d9b3f62e 12485 print_recreate_thread (b, fp);
6149aea9
PA
12486}
12487
37f6a7f4 12488/* Virtual tables for various breakpoint types. */
2060206e 12489static struct breakpoint_ops catch_exception_breakpoint_ops;
2060206e 12490static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
2060206e 12491static struct breakpoint_ops catch_assert_breakpoint_ops;
9f757bf7
XR
12492static struct breakpoint_ops catch_handlers_breakpoint_ops;
12493
f06f1252
TT
12494/* See ada-lang.h. */
12495
12496bool
12497is_ada_exception_catchpoint (breakpoint *bp)
12498{
12499 return (bp->ops == &catch_exception_breakpoint_ops
12500 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12501 || bp->ops == &catch_assert_breakpoint_ops
12502 || bp->ops == &catch_handlers_breakpoint_ops);
12503}
12504
f7f9143b
JB
12505/* Split the arguments specified in a "catch exception" command.
12506 Set EX to the appropriate catchpoint type.
28010a5d 12507 Set EXCEP_STRING to the name of the specific exception if
5845583d 12508 specified by the user.
9f757bf7
XR
12509 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12510 "catch handlers" command. False otherwise.
5845583d
JB
12511 If a condition is found at the end of the arguments, the condition
12512 expression is stored in COND_STRING (memory must be deallocated
12513 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12514
12515static void
a121b7c1 12516catch_ada_exception_command_split (const char *args,
9f757bf7 12517 bool is_catch_handlers_cmd,
dda83cd7 12518 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12519 std::string *excep_string,
12520 std::string *cond_string)
f7f9143b 12521{
bc18fbb5 12522 std::string exception_name;
f7f9143b 12523
bc18fbb5
TT
12524 exception_name = extract_arg (&args);
12525 if (exception_name == "if")
5845583d
JB
12526 {
12527 /* This is not an exception name; this is the start of a condition
12528 expression for a catchpoint on all exceptions. So, "un-get"
12529 this token, and set exception_name to NULL. */
bc18fbb5 12530 exception_name.clear ();
5845583d
JB
12531 args -= 2;
12532 }
f7f9143b 12533
5845583d 12534 /* Check to see if we have a condition. */
f7f9143b 12535
f1735a53 12536 args = skip_spaces (args);
61012eef 12537 if (startswith (args, "if")
5845583d
JB
12538 && (isspace (args[2]) || args[2] == '\0'))
12539 {
12540 args += 2;
f1735a53 12541 args = skip_spaces (args);
5845583d
JB
12542
12543 if (args[0] == '\0')
dda83cd7 12544 error (_("Condition missing after `if' keyword"));
bc18fbb5 12545 *cond_string = args;
5845583d
JB
12546
12547 args += strlen (args);
12548 }
12549
12550 /* Check that we do not have any more arguments. Anything else
12551 is unexpected. */
f7f9143b
JB
12552
12553 if (args[0] != '\0')
12554 error (_("Junk at end of expression"));
12555
9f757bf7
XR
12556 if (is_catch_handlers_cmd)
12557 {
12558 /* Catch handling of exceptions. */
12559 *ex = ada_catch_handlers;
12560 *excep_string = exception_name;
12561 }
bc18fbb5 12562 else if (exception_name.empty ())
f7f9143b
JB
12563 {
12564 /* Catch all exceptions. */
761269c8 12565 *ex = ada_catch_exception;
bc18fbb5 12566 excep_string->clear ();
f7f9143b 12567 }
bc18fbb5 12568 else if (exception_name == "unhandled")
f7f9143b
JB
12569 {
12570 /* Catch unhandled exceptions. */
761269c8 12571 *ex = ada_catch_exception_unhandled;
bc18fbb5 12572 excep_string->clear ();
f7f9143b
JB
12573 }
12574 else
12575 {
12576 /* Catch a specific exception. */
761269c8 12577 *ex = ada_catch_exception;
28010a5d 12578 *excep_string = exception_name;
f7f9143b
JB
12579 }
12580}
12581
12582/* Return the name of the symbol on which we should break in order to
12583 implement a catchpoint of the EX kind. */
12584
12585static const char *
761269c8 12586ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12587{
3eecfa55
JB
12588 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12589
12590 gdb_assert (data->exception_info != NULL);
0259addd 12591
f7f9143b
JB
12592 switch (ex)
12593 {
761269c8 12594 case ada_catch_exception:
dda83cd7
SM
12595 return (data->exception_info->catch_exception_sym);
12596 break;
761269c8 12597 case ada_catch_exception_unhandled:
dda83cd7
SM
12598 return (data->exception_info->catch_exception_unhandled_sym);
12599 break;
761269c8 12600 case ada_catch_assert:
dda83cd7
SM
12601 return (data->exception_info->catch_assert_sym);
12602 break;
9f757bf7 12603 case ada_catch_handlers:
dda83cd7
SM
12604 return (data->exception_info->catch_handlers_sym);
12605 break;
f7f9143b 12606 default:
dda83cd7
SM
12607 internal_error (__FILE__, __LINE__,
12608 _("unexpected catchpoint kind (%d)"), ex);
f7f9143b
JB
12609 }
12610}
12611
12612/* Return the breakpoint ops "virtual table" used for catchpoints
12613 of the EX kind. */
12614
c0a91b2b 12615static const struct breakpoint_ops *
761269c8 12616ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12617{
12618 switch (ex)
12619 {
761269c8 12620 case ada_catch_exception:
dda83cd7
SM
12621 return (&catch_exception_breakpoint_ops);
12622 break;
761269c8 12623 case ada_catch_exception_unhandled:
dda83cd7
SM
12624 return (&catch_exception_unhandled_breakpoint_ops);
12625 break;
761269c8 12626 case ada_catch_assert:
dda83cd7
SM
12627 return (&catch_assert_breakpoint_ops);
12628 break;
9f757bf7 12629 case ada_catch_handlers:
dda83cd7
SM
12630 return (&catch_handlers_breakpoint_ops);
12631 break;
f7f9143b 12632 default:
dda83cd7
SM
12633 internal_error (__FILE__, __LINE__,
12634 _("unexpected catchpoint kind (%d)"), ex);
f7f9143b
JB
12635 }
12636}
12637
12638/* Return the condition that will be used to match the current exception
12639 being raised with the exception that the user wants to catch. This
12640 assumes that this condition is used when the inferior just triggered
12641 an exception catchpoint.
cb7de75e 12642 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 12643
cb7de75e 12644static std::string
9f757bf7 12645ada_exception_catchpoint_cond_string (const char *excep_string,
dda83cd7 12646 enum ada_exception_catchpoint_kind ex)
f7f9143b 12647{
3d0b0fa3 12648 int i;
fccf9de1 12649 bool is_standard_exc = false;
cb7de75e 12650 std::string result;
9f757bf7
XR
12651
12652 if (ex == ada_catch_handlers)
12653 {
12654 /* For exception handlers catchpoints, the condition string does
dda83cd7 12655 not use the same parameter as for the other exceptions. */
fccf9de1
TT
12656 result = ("long_integer (GNAT_GCC_exception_Access"
12657 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
12658 }
12659 else
fccf9de1 12660 result = "long_integer (e)";
3d0b0fa3 12661
0963b4bd 12662 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12663 runtime units that have been compiled without debugging info; if
28010a5d 12664 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12665 exception (e.g. "constraint_error") then, during the evaluation
12666 of the condition expression, the symbol lookup on this name would
0963b4bd 12667 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12668 may then be set only on user-defined exceptions which have the
12669 same not-fully-qualified name (e.g. my_package.constraint_error).
12670
12671 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12672 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12673 exception constraint_error" is rewritten into "catch exception
12674 standard.constraint_error".
12675
85102364 12676 If an exception named constraint_error is defined in another package of
3d0b0fa3
JB
12677 the inferior program, then the only way to specify this exception as a
12678 breakpoint condition is to use its fully-qualified named:
fccf9de1 12679 e.g. my_package.constraint_error. */
3d0b0fa3
JB
12680
12681 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12682 {
28010a5d 12683 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 12684 {
fccf9de1 12685 is_standard_exc = true;
9f757bf7 12686 break;
3d0b0fa3
JB
12687 }
12688 }
9f757bf7 12689
fccf9de1
TT
12690 result += " = ";
12691
12692 if (is_standard_exc)
12693 string_appendf (result, "long_integer (&standard.%s)", excep_string);
12694 else
12695 string_appendf (result, "long_integer (&%s)", excep_string);
9f757bf7 12696
9f757bf7 12697 return result;
f7f9143b
JB
12698}
12699
12700/* Return the symtab_and_line that should be used to insert an exception
12701 catchpoint of the TYPE kind.
12702
28010a5d
PA
12703 ADDR_STRING returns the name of the function where the real
12704 breakpoint that implements the catchpoints is set, depending on the
12705 type of catchpoint we need to create. */
f7f9143b
JB
12706
12707static struct symtab_and_line
bc18fbb5 12708ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 12709 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12710{
12711 const char *sym_name;
12712 struct symbol *sym;
f7f9143b 12713
0259addd
JB
12714 /* First, find out which exception support info to use. */
12715 ada_exception_support_info_sniffer ();
12716
12717 /* Then lookup the function on which we will break in order to catch
f7f9143b 12718 the Ada exceptions requested by the user. */
f7f9143b
JB
12719 sym_name = ada_exception_sym_name (ex);
12720 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12721
57aff202
JB
12722 if (sym == NULL)
12723 error (_("Catchpoint symbol not found: %s"), sym_name);
12724
12725 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
12726 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
12727
12728 /* Set ADDR_STRING. */
cc12f4a8 12729 *addr_string = sym_name;
f7f9143b 12730
f7f9143b 12731 /* Set OPS. */
4b9eee8c 12732 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12733
f17011e0 12734 return find_function_start_sal (sym, 1);
f7f9143b
JB
12735}
12736
b4a5b78b 12737/* Create an Ada exception catchpoint.
f7f9143b 12738
b4a5b78b 12739 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12740
bc18fbb5 12741 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 12742 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 12743 of the exception to which this catchpoint applies.
2df4d1d5 12744
bc18fbb5 12745 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 12746
b4a5b78b
JB
12747 TEMPFLAG, if nonzero, means that the underlying breakpoint
12748 should be temporary.
28010a5d 12749
b4a5b78b 12750 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12751
349774ef 12752void
28010a5d 12753create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12754 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 12755 const std::string &excep_string,
56ecd069 12756 const std::string &cond_string,
28010a5d 12757 int tempflag,
349774ef 12758 int disabled,
28010a5d
PA
12759 int from_tty)
12760{
cc12f4a8 12761 std::string addr_string;
b4a5b78b 12762 const struct breakpoint_ops *ops = NULL;
bc18fbb5 12763 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 12764
37f6a7f4 12765 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint (ex_kind));
cc12f4a8 12766 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 12767 ops, tempflag, disabled, from_tty);
28010a5d 12768 c->excep_string = excep_string;
9f757bf7 12769 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069 12770 if (!cond_string.empty ())
733d554a 12771 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty, false);
b270e6f9 12772 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
12773}
12774
9ac4176b
PA
12775/* Implement the "catch exception" command. */
12776
12777static void
eb4c3f4a 12778catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
12779 struct cmd_list_element *command)
12780{
a121b7c1 12781 const char *arg = arg_entry;
9ac4176b
PA
12782 struct gdbarch *gdbarch = get_current_arch ();
12783 int tempflag;
761269c8 12784 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12785 std::string excep_string;
56ecd069 12786 std::string cond_string;
9ac4176b
PA
12787
12788 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12789
12790 if (!arg)
12791 arg = "";
9f757bf7 12792 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 12793 &cond_string);
9f757bf7
XR
12794 create_ada_exception_catchpoint (gdbarch, ex_kind,
12795 excep_string, cond_string,
12796 tempflag, 1 /* enabled */,
12797 from_tty);
12798}
12799
12800/* Implement the "catch handlers" command. */
12801
12802static void
12803catch_ada_handlers_command (const char *arg_entry, int from_tty,
12804 struct cmd_list_element *command)
12805{
12806 const char *arg = arg_entry;
12807 struct gdbarch *gdbarch = get_current_arch ();
12808 int tempflag;
12809 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 12810 std::string excep_string;
56ecd069 12811 std::string cond_string;
9f757bf7
XR
12812
12813 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12814
12815 if (!arg)
12816 arg = "";
12817 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 12818 &cond_string);
b4a5b78b
JB
12819 create_ada_exception_catchpoint (gdbarch, ex_kind,
12820 excep_string, cond_string,
349774ef
JB
12821 tempflag, 1 /* enabled */,
12822 from_tty);
9ac4176b
PA
12823}
12824
71bed2db
TT
12825/* Completion function for the Ada "catch" commands. */
12826
12827static void
12828catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
12829 const char *text, const char *word)
12830{
12831 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
12832
12833 for (const ada_exc_info &info : exceptions)
12834 {
12835 if (startswith (info.name, word))
b02f78f9 12836 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
12837 }
12838}
12839
b4a5b78b 12840/* Split the arguments specified in a "catch assert" command.
5845583d 12841
b4a5b78b
JB
12842 ARGS contains the command's arguments (or the empty string if
12843 no arguments were passed).
5845583d
JB
12844
12845 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12846 (the memory needs to be deallocated after use). */
5845583d 12847
b4a5b78b 12848static void
56ecd069 12849catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 12850{
f1735a53 12851 args = skip_spaces (args);
f7f9143b 12852
5845583d 12853 /* Check whether a condition was provided. */
61012eef 12854 if (startswith (args, "if")
5845583d 12855 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12856 {
5845583d 12857 args += 2;
f1735a53 12858 args = skip_spaces (args);
5845583d 12859 if (args[0] == '\0')
dda83cd7 12860 error (_("condition missing after `if' keyword"));
56ecd069 12861 cond_string.assign (args);
f7f9143b
JB
12862 }
12863
5845583d
JB
12864 /* Otherwise, there should be no other argument at the end of
12865 the command. */
12866 else if (args[0] != '\0')
12867 error (_("Junk at end of arguments."));
f7f9143b
JB
12868}
12869
9ac4176b
PA
12870/* Implement the "catch assert" command. */
12871
12872static void
eb4c3f4a 12873catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
12874 struct cmd_list_element *command)
12875{
a121b7c1 12876 const char *arg = arg_entry;
9ac4176b
PA
12877 struct gdbarch *gdbarch = get_current_arch ();
12878 int tempflag;
56ecd069 12879 std::string cond_string;
9ac4176b
PA
12880
12881 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12882
12883 if (!arg)
12884 arg = "";
56ecd069 12885 catch_ada_assert_command_split (arg, cond_string);
761269c8 12886 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 12887 "", cond_string,
349774ef
JB
12888 tempflag, 1 /* enabled */,
12889 from_tty);
9ac4176b 12890}
778865d3
JB
12891
12892/* Return non-zero if the symbol SYM is an Ada exception object. */
12893
12894static int
12895ada_is_exception_sym (struct symbol *sym)
12896{
7d93a1e0 12897 const char *type_name = SYMBOL_TYPE (sym)->name ();
778865d3
JB
12898
12899 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
dda83cd7
SM
12900 && SYMBOL_CLASS (sym) != LOC_BLOCK
12901 && SYMBOL_CLASS (sym) != LOC_CONST
12902 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12903 && type_name != NULL && strcmp (type_name, "exception") == 0);
778865d3
JB
12904}
12905
12906/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12907 Ada exception object. This matches all exceptions except the ones
12908 defined by the Ada language. */
12909
12910static int
12911ada_is_non_standard_exception_sym (struct symbol *sym)
12912{
12913 int i;
12914
12915 if (!ada_is_exception_sym (sym))
12916 return 0;
12917
12918 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
987012b8 12919 if (strcmp (sym->linkage_name (), standard_exc[i]) == 0)
778865d3
JB
12920 return 0; /* A standard exception. */
12921
12922 /* Numeric_Error is also a standard exception, so exclude it.
12923 See the STANDARD_EXC description for more details as to why
12924 this exception is not listed in that array. */
987012b8 12925 if (strcmp (sym->linkage_name (), "numeric_error") == 0)
778865d3
JB
12926 return 0;
12927
12928 return 1;
12929}
12930
ab816a27 12931/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
12932 objects.
12933
12934 The comparison is determined first by exception name, and then
12935 by exception address. */
12936
ab816a27 12937bool
cc536b21 12938ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 12939{
778865d3
JB
12940 int result;
12941
ab816a27
TT
12942 result = strcmp (name, other.name);
12943 if (result < 0)
12944 return true;
12945 if (result == 0 && addr < other.addr)
12946 return true;
12947 return false;
12948}
778865d3 12949
ab816a27 12950bool
cc536b21 12951ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
12952{
12953 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
12954}
12955
12956/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12957 routine, but keeping the first SKIP elements untouched.
12958
12959 All duplicates are also removed. */
12960
12961static void
ab816a27 12962sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
12963 int skip)
12964{
ab816a27
TT
12965 std::sort (exceptions->begin () + skip, exceptions->end ());
12966 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
12967 exceptions->end ());
778865d3
JB
12968}
12969
778865d3
JB
12970/* Add all exceptions defined by the Ada standard whose name match
12971 a regular expression.
12972
12973 If PREG is not NULL, then this regexp_t object is used to
12974 perform the symbol name matching. Otherwise, no name-based
12975 filtering is performed.
12976
12977 EXCEPTIONS is a vector of exceptions to which matching exceptions
12978 gets pushed. */
12979
12980static void
2d7cc5c7 12981ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 12982 std::vector<ada_exc_info> *exceptions)
778865d3
JB
12983{
12984 int i;
12985
12986 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12987 {
12988 if (preg == NULL
2d7cc5c7 12989 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
12990 {
12991 struct bound_minimal_symbol msymbol
12992 = ada_lookup_simple_minsym (standard_exc[i]);
12993
12994 if (msymbol.minsym != NULL)
12995 {
12996 struct ada_exc_info info
77e371c0 12997 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 12998
ab816a27 12999 exceptions->push_back (info);
778865d3
JB
13000 }
13001 }
13002 }
13003}
13004
13005/* Add all Ada exceptions defined locally and accessible from the given
13006 FRAME.
13007
13008 If PREG is not NULL, then this regexp_t object is used to
13009 perform the symbol name matching. Otherwise, no name-based
13010 filtering is performed.
13011
13012 EXCEPTIONS is a vector of exceptions to which matching exceptions
13013 gets pushed. */
13014
13015static void
2d7cc5c7
PA
13016ada_add_exceptions_from_frame (compiled_regex *preg,
13017 struct frame_info *frame,
ab816a27 13018 std::vector<ada_exc_info> *exceptions)
778865d3 13019{
3977b71f 13020 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13021
13022 while (block != 0)
13023 {
13024 struct block_iterator iter;
13025 struct symbol *sym;
13026
13027 ALL_BLOCK_SYMBOLS (block, iter, sym)
13028 {
13029 switch (SYMBOL_CLASS (sym))
13030 {
13031 case LOC_TYPEDEF:
13032 case LOC_BLOCK:
13033 case LOC_CONST:
13034 break;
13035 default:
13036 if (ada_is_exception_sym (sym))
13037 {
987012b8 13038 struct ada_exc_info info = {sym->print_name (),
778865d3
JB
13039 SYMBOL_VALUE_ADDRESS (sym)};
13040
ab816a27 13041 exceptions->push_back (info);
778865d3
JB
13042 }
13043 }
13044 }
13045 if (BLOCK_FUNCTION (block) != NULL)
13046 break;
13047 block = BLOCK_SUPERBLOCK (block);
13048 }
13049}
13050
14bc53a8
PA
13051/* Return true if NAME matches PREG or if PREG is NULL. */
13052
13053static bool
2d7cc5c7 13054name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13055{
13056 return (preg == NULL
f945dedf 13057 || preg->exec (ada_decode (name).c_str (), 0, NULL, 0) == 0);
14bc53a8
PA
13058}
13059
778865d3
JB
13060/* Add all exceptions defined globally whose name name match
13061 a regular expression, excluding standard exceptions.
13062
13063 The reason we exclude standard exceptions is that they need
13064 to be handled separately: Standard exceptions are defined inside
13065 a runtime unit which is normally not compiled with debugging info,
13066 and thus usually do not show up in our symbol search. However,
13067 if the unit was in fact built with debugging info, we need to
13068 exclude them because they would duplicate the entry we found
13069 during the special loop that specifically searches for those
13070 standard exceptions.
13071
13072 If PREG is not NULL, then this regexp_t object is used to
13073 perform the symbol name matching. Otherwise, no name-based
13074 filtering is performed.
13075
13076 EXCEPTIONS is a vector of exceptions to which matching exceptions
13077 gets pushed. */
13078
13079static void
2d7cc5c7 13080ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13081 std::vector<ada_exc_info> *exceptions)
778865d3 13082{
14bc53a8
PA
13083 /* In Ada, the symbol "search name" is a linkage name, whereas the
13084 regular expression used to do the matching refers to the natural
13085 name. So match against the decoded name. */
13086 expand_symtabs_matching (NULL,
b5ec771e 13087 lookup_name_info::match_any (),
14bc53a8
PA
13088 [&] (const char *search_name)
13089 {
f945dedf
CB
13090 std::string decoded = ada_decode (search_name);
13091 return name_matches_regex (decoded.c_str (), preg);
14bc53a8
PA
13092 },
13093 NULL,
13094 VARIABLES_DOMAIN);
778865d3 13095
2030c079 13096 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13097 {
b669c953 13098 for (compunit_symtab *s : objfile->compunits ())
778865d3 13099 {
d8aeb77f
TT
13100 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13101 int i;
778865d3 13102
d8aeb77f
TT
13103 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13104 {
582942f4 13105 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13106 struct block_iterator iter;
13107 struct symbol *sym;
778865d3 13108
d8aeb77f
TT
13109 ALL_BLOCK_SYMBOLS (b, iter, sym)
13110 if (ada_is_non_standard_exception_sym (sym)
987012b8 13111 && name_matches_regex (sym->natural_name (), preg))
d8aeb77f
TT
13112 {
13113 struct ada_exc_info info
987012b8 13114 = {sym->print_name (), SYMBOL_VALUE_ADDRESS (sym)};
d8aeb77f
TT
13115
13116 exceptions->push_back (info);
13117 }
13118 }
778865d3
JB
13119 }
13120 }
13121}
13122
13123/* Implements ada_exceptions_list with the regular expression passed
13124 as a regex_t, rather than a string.
13125
13126 If not NULL, PREG is used to filter out exceptions whose names
13127 do not match. Otherwise, all exceptions are listed. */
13128
ab816a27 13129static std::vector<ada_exc_info>
2d7cc5c7 13130ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13131{
ab816a27 13132 std::vector<ada_exc_info> result;
778865d3
JB
13133 int prev_len;
13134
13135 /* First, list the known standard exceptions. These exceptions
13136 need to be handled separately, as they are usually defined in
13137 runtime units that have been compiled without debugging info. */
13138
13139 ada_add_standard_exceptions (preg, &result);
13140
13141 /* Next, find all exceptions whose scope is local and accessible
13142 from the currently selected frame. */
13143
13144 if (has_stack_frames ())
13145 {
ab816a27 13146 prev_len = result.size ();
778865d3
JB
13147 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13148 &result);
ab816a27 13149 if (result.size () > prev_len)
778865d3
JB
13150 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13151 }
13152
13153 /* Add all exceptions whose scope is global. */
13154
ab816a27 13155 prev_len = result.size ();
778865d3 13156 ada_add_global_exceptions (preg, &result);
ab816a27 13157 if (result.size () > prev_len)
778865d3
JB
13158 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13159
778865d3
JB
13160 return result;
13161}
13162
13163/* Return a vector of ada_exc_info.
13164
13165 If REGEXP is NULL, all exceptions are included in the result.
13166 Otherwise, it should contain a valid regular expression,
13167 and only the exceptions whose names match that regular expression
13168 are included in the result.
13169
13170 The exceptions are sorted in the following order:
13171 - Standard exceptions (defined by the Ada language), in
13172 alphabetical order;
13173 - Exceptions only visible from the current frame, in
13174 alphabetical order;
13175 - Exceptions whose scope is global, in alphabetical order. */
13176
ab816a27 13177std::vector<ada_exc_info>
778865d3
JB
13178ada_exceptions_list (const char *regexp)
13179{
2d7cc5c7
PA
13180 if (regexp == NULL)
13181 return ada_exceptions_list_1 (NULL);
778865d3 13182
2d7cc5c7
PA
13183 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13184 return ada_exceptions_list_1 (&reg);
778865d3
JB
13185}
13186
13187/* Implement the "info exceptions" command. */
13188
13189static void
1d12d88f 13190info_exceptions_command (const char *regexp, int from_tty)
778865d3 13191{
778865d3 13192 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13193
ab816a27 13194 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13195
13196 if (regexp != NULL)
13197 printf_filtered
13198 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13199 else
13200 printf_filtered (_("All defined Ada exceptions:\n"));
13201
ab816a27
TT
13202 for (const ada_exc_info &info : exceptions)
13203 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13204}
13205
dda83cd7 13206 /* Operators */
4c4b4cd2
PH
13207/* Information about operators given special treatment in functions
13208 below. */
13209/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13210
13211#define ADA_OPERATORS \
13212 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13213 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13214 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13215 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13216 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13217 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13218 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13219 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13220 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13221 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13222 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13223 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13224 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13225 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13226 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13227 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13228 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13229 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13230 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13231
13232static void
554794dc
SDJ
13233ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13234 int *argsp)
4c4b4cd2
PH
13235{
13236 switch (exp->elts[pc - 1].opcode)
13237 {
76a01679 13238 default:
4c4b4cd2
PH
13239 operator_length_standard (exp, pc, oplenp, argsp);
13240 break;
13241
13242#define OP_DEFN(op, len, args, binop) \
13243 case op: *oplenp = len; *argsp = args; break;
13244 ADA_OPERATORS;
13245#undef OP_DEFN
52ce6436
PH
13246
13247 case OP_AGGREGATE:
13248 *oplenp = 3;
13249 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13250 break;
13251
13252 case OP_CHOICES:
13253 *oplenp = 3;
13254 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13255 break;
4c4b4cd2
PH
13256 }
13257}
13258
c0201579
JK
13259/* Implementation of the exp_descriptor method operator_check. */
13260
13261static int
13262ada_operator_check (struct expression *exp, int pos,
13263 int (*objfile_func) (struct objfile *objfile, void *data),
13264 void *data)
13265{
13266 const union exp_element *const elts = exp->elts;
13267 struct type *type = NULL;
13268
13269 switch (elts[pos].opcode)
13270 {
13271 case UNOP_IN_RANGE:
13272 case UNOP_QUAL:
13273 type = elts[pos + 1].type;
13274 break;
13275
13276 default:
13277 return operator_check_standard (exp, pos, objfile_func, data);
13278 }
13279
13280 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13281
13282 if (type && TYPE_OBJFILE (type)
13283 && (*objfile_func) (TYPE_OBJFILE (type), data))
13284 return 1;
13285
13286 return 0;
13287}
13288
4c4b4cd2
PH
13289/* As for operator_length, but assumes PC is pointing at the first
13290 element of the operator, and gives meaningful results only for the
52ce6436 13291 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13292
13293static void
76a01679 13294ada_forward_operator_length (struct expression *exp, int pc,
dda83cd7 13295 int *oplenp, int *argsp)
4c4b4cd2 13296{
76a01679 13297 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13298 {
13299 default:
13300 *oplenp = *argsp = 0;
13301 break;
52ce6436 13302
4c4b4cd2
PH
13303#define OP_DEFN(op, len, args, binop) \
13304 case op: *oplenp = len; *argsp = args; break;
13305 ADA_OPERATORS;
13306#undef OP_DEFN
52ce6436
PH
13307
13308 case OP_AGGREGATE:
13309 *oplenp = 3;
13310 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13311 break;
13312
13313 case OP_CHOICES:
13314 *oplenp = 3;
13315 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13316 break;
13317
13318 case OP_STRING:
13319 case OP_NAME:
13320 {
13321 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13322
52ce6436
PH
13323 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13324 *argsp = 0;
13325 break;
13326 }
4c4b4cd2
PH
13327 }
13328}
13329
13330static int
13331ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13332{
13333 enum exp_opcode op = exp->elts[elt].opcode;
13334 int oplen, nargs;
13335 int pc = elt;
13336 int i;
76a01679 13337
4c4b4cd2
PH
13338 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13339
76a01679 13340 switch (op)
4c4b4cd2 13341 {
76a01679 13342 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13343 case OP_ATR_FIRST:
13344 case OP_ATR_LAST:
13345 case OP_ATR_LENGTH:
13346 case OP_ATR_IMAGE:
13347 case OP_ATR_MAX:
13348 case OP_ATR_MIN:
13349 case OP_ATR_MODULUS:
13350 case OP_ATR_POS:
13351 case OP_ATR_SIZE:
13352 case OP_ATR_TAG:
13353 case OP_ATR_VAL:
13354 break;
13355
13356 case UNOP_IN_RANGE:
13357 case UNOP_QUAL:
323e0a4a
AC
13358 /* XXX: gdb_sprint_host_address, type_sprint */
13359 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13360 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13361 fprintf_filtered (stream, " (");
13362 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13363 fprintf_filtered (stream, ")");
13364 break;
13365 case BINOP_IN_BOUNDS:
52ce6436
PH
13366 fprintf_filtered (stream, " (%d)",
13367 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13368 break;
13369 case TERNOP_IN_RANGE:
13370 break;
13371
52ce6436
PH
13372 case OP_AGGREGATE:
13373 case OP_OTHERS:
13374 case OP_DISCRETE_RANGE:
13375 case OP_POSITIONAL:
13376 case OP_CHOICES:
13377 break;
13378
13379 case OP_NAME:
13380 case OP_STRING:
13381 {
13382 char *name = &exp->elts[elt + 2].string;
13383 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13384
52ce6436
PH
13385 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13386 break;
13387 }
13388
4c4b4cd2
PH
13389 default:
13390 return dump_subexp_body_standard (exp, stream, elt);
13391 }
13392
13393 elt += oplen;
13394 for (i = 0; i < nargs; i += 1)
13395 elt = dump_subexp (exp, stream, elt);
13396
13397 return elt;
13398}
13399
13400/* The Ada extension of print_subexp (q.v.). */
13401
76a01679
JB
13402static void
13403ada_print_subexp (struct expression *exp, int *pos,
dda83cd7 13404 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13405{
52ce6436 13406 int oplen, nargs, i;
4c4b4cd2
PH
13407 int pc = *pos;
13408 enum exp_opcode op = exp->elts[pc].opcode;
13409
13410 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13411
52ce6436 13412 *pos += oplen;
4c4b4cd2
PH
13413 switch (op)
13414 {
13415 default:
52ce6436 13416 *pos -= oplen;
4c4b4cd2
PH
13417 print_subexp_standard (exp, pos, stream, prec);
13418 return;
13419
13420 case OP_VAR_VALUE:
987012b8 13421 fputs_filtered (exp->elts[pc + 2].symbol->natural_name (), stream);
4c4b4cd2
PH
13422 return;
13423
13424 case BINOP_IN_BOUNDS:
323e0a4a 13425 /* XXX: sprint_subexp */
4c4b4cd2 13426 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13427 fputs_filtered (" in ", stream);
4c4b4cd2 13428 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13429 fputs_filtered ("'range", stream);
4c4b4cd2 13430 if (exp->elts[pc + 1].longconst > 1)
dda83cd7
SM
13431 fprintf_filtered (stream, "(%ld)",
13432 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13433 return;
13434
13435 case TERNOP_IN_RANGE:
4c4b4cd2 13436 if (prec >= PREC_EQUAL)
dda83cd7 13437 fputs_filtered ("(", stream);
323e0a4a 13438 /* XXX: sprint_subexp */
4c4b4cd2 13439 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13440 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13441 print_subexp (exp, pos, stream, PREC_EQUAL);
13442 fputs_filtered (" .. ", stream);
13443 print_subexp (exp, pos, stream, PREC_EQUAL);
13444 if (prec >= PREC_EQUAL)
dda83cd7 13445 fputs_filtered (")", stream);
76a01679 13446 return;
4c4b4cd2
PH
13447
13448 case OP_ATR_FIRST:
13449 case OP_ATR_LAST:
13450 case OP_ATR_LENGTH:
13451 case OP_ATR_IMAGE:
13452 case OP_ATR_MAX:
13453 case OP_ATR_MIN:
13454 case OP_ATR_MODULUS:
13455 case OP_ATR_POS:
13456 case OP_ATR_SIZE:
13457 case OP_ATR_TAG:
13458 case OP_ATR_VAL:
4c4b4cd2 13459 if (exp->elts[*pos].opcode == OP_TYPE)
dda83cd7
SM
13460 {
13461 if (exp->elts[*pos + 1].type->code () != TYPE_CODE_VOID)
13462 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
79d43c61 13463 &type_print_raw_options);
dda83cd7
SM
13464 *pos += 3;
13465 }
4c4b4cd2 13466 else
dda83cd7 13467 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13468 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13469 if (nargs > 1)
dda83cd7
SM
13470 {
13471 int tem;
13472
13473 for (tem = 1; tem < nargs; tem += 1)
13474 {
13475 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13476 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13477 }
13478 fputs_filtered (")", stream);
13479 }
4c4b4cd2 13480 return;
14f9c5c9 13481
4c4b4cd2 13482 case UNOP_QUAL:
4c4b4cd2
PH
13483 type_print (exp->elts[pc + 1].type, "", stream, 0);
13484 fputs_filtered ("'(", stream);
13485 print_subexp (exp, pos, stream, PREC_PREFIX);
13486 fputs_filtered (")", stream);
13487 return;
14f9c5c9 13488
4c4b4cd2 13489 case UNOP_IN_RANGE:
323e0a4a 13490 /* XXX: sprint_subexp */
4c4b4cd2 13491 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13492 fputs_filtered (" in ", stream);
79d43c61
TT
13493 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13494 &type_print_raw_options);
4c4b4cd2 13495 return;
52ce6436
PH
13496
13497 case OP_DISCRETE_RANGE:
13498 print_subexp (exp, pos, stream, PREC_SUFFIX);
13499 fputs_filtered ("..", stream);
13500 print_subexp (exp, pos, stream, PREC_SUFFIX);
13501 return;
13502
13503 case OP_OTHERS:
13504 fputs_filtered ("others => ", stream);
13505 print_subexp (exp, pos, stream, PREC_SUFFIX);
13506 return;
13507
13508 case OP_CHOICES:
13509 for (i = 0; i < nargs-1; i += 1)
13510 {
13511 if (i > 0)
13512 fputs_filtered ("|", stream);
13513 print_subexp (exp, pos, stream, PREC_SUFFIX);
13514 }
13515 fputs_filtered (" => ", stream);
13516 print_subexp (exp, pos, stream, PREC_SUFFIX);
13517 return;
13518
13519 case OP_POSITIONAL:
13520 print_subexp (exp, pos, stream, PREC_SUFFIX);
13521 return;
13522
13523 case OP_AGGREGATE:
13524 fputs_filtered ("(", stream);
13525 for (i = 0; i < nargs; i += 1)
13526 {
13527 if (i > 0)
13528 fputs_filtered (", ", stream);
13529 print_subexp (exp, pos, stream, PREC_SUFFIX);
13530 }
13531 fputs_filtered (")", stream);
13532 return;
4c4b4cd2
PH
13533 }
13534}
14f9c5c9
AS
13535
13536/* Table mapping opcodes into strings for printing operators
13537 and precedences of the operators. */
13538
d2e4a39e
AS
13539static const struct op_print ada_op_print_tab[] = {
13540 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13541 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13542 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13543 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13544 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13545 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13546 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13547 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13548 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13549 {">=", BINOP_GEQ, PREC_ORDER, 0},
13550 {">", BINOP_GTR, PREC_ORDER, 0},
13551 {"<", BINOP_LESS, PREC_ORDER, 0},
13552 {">>", BINOP_RSH, PREC_SHIFT, 0},
13553 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13554 {"+", BINOP_ADD, PREC_ADD, 0},
13555 {"-", BINOP_SUB, PREC_ADD, 0},
13556 {"&", BINOP_CONCAT, PREC_ADD, 0},
13557 {"*", BINOP_MUL, PREC_MUL, 0},
13558 {"/", BINOP_DIV, PREC_MUL, 0},
13559 {"rem", BINOP_REM, PREC_MUL, 0},
13560 {"mod", BINOP_MOD, PREC_MUL, 0},
13561 {"**", BINOP_EXP, PREC_REPEAT, 0},
13562 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13563 {"-", UNOP_NEG, PREC_PREFIX, 0},
13564 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13565 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13566 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13567 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13568 {".all", UNOP_IND, PREC_SUFFIX, 1},
13569 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13570 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 13571 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9 13572};
6c038f32
PH
13573\f
13574 /* Language vector */
13575
6c038f32
PH
13576static const struct exp_descriptor ada_exp_descriptor = {
13577 ada_print_subexp,
13578 ada_operator_length,
c0201579 13579 ada_operator_check,
6c038f32
PH
13580 ada_dump_subexp_body,
13581 ada_evaluate_subexp
13582};
13583
b5ec771e
PA
13584/* symbol_name_matcher_ftype adapter for wild_match. */
13585
13586static bool
13587do_wild_match (const char *symbol_search_name,
13588 const lookup_name_info &lookup_name,
a207cff2 13589 completion_match_result *comp_match_res)
b5ec771e
PA
13590{
13591 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
13592}
13593
13594/* symbol_name_matcher_ftype adapter for full_match. */
13595
13596static bool
13597do_full_match (const char *symbol_search_name,
13598 const lookup_name_info &lookup_name,
a207cff2 13599 completion_match_result *comp_match_res)
b5ec771e
PA
13600{
13601 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
13602}
13603
a2cd4f14
JB
13604/* symbol_name_matcher_ftype for exact (verbatim) matches. */
13605
13606static bool
13607do_exact_match (const char *symbol_search_name,
13608 const lookup_name_info &lookup_name,
13609 completion_match_result *comp_match_res)
13610{
13611 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
13612}
13613
b5ec771e
PA
13614/* Build the Ada lookup name for LOOKUP_NAME. */
13615
13616ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
13617{
e0802d59 13618 gdb::string_view user_name = lookup_name.name ();
b5ec771e
PA
13619
13620 if (user_name[0] == '<')
13621 {
13622 if (user_name.back () == '>')
e0802d59 13623 m_encoded_name
5ac58899 13624 = gdb::to_string (user_name.substr (1, user_name.size () - 2));
b5ec771e 13625 else
e0802d59 13626 m_encoded_name
5ac58899 13627 = gdb::to_string (user_name.substr (1, user_name.size () - 1));
b5ec771e
PA
13628 m_encoded_p = true;
13629 m_verbatim_p = true;
13630 m_wild_match_p = false;
13631 m_standard_p = false;
13632 }
13633 else
13634 {
13635 m_verbatim_p = false;
13636
e0802d59 13637 m_encoded_p = user_name.find ("__") != gdb::string_view::npos;
b5ec771e
PA
13638
13639 if (!m_encoded_p)
13640 {
e0802d59 13641 const char *folded = ada_fold_name (user_name);
5c4258f4
TT
13642 m_encoded_name = ada_encode_1 (folded, false);
13643 if (m_encoded_name.empty ())
5ac58899 13644 m_encoded_name = gdb::to_string (user_name);
b5ec771e
PA
13645 }
13646 else
5ac58899 13647 m_encoded_name = gdb::to_string (user_name);
b5ec771e
PA
13648
13649 /* Handle the 'package Standard' special case. See description
13650 of m_standard_p. */
13651 if (startswith (m_encoded_name.c_str (), "standard__"))
13652 {
13653 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
13654 m_standard_p = true;
13655 }
13656 else
13657 m_standard_p = false;
74ccd7f5 13658
b5ec771e
PA
13659 /* If the name contains a ".", then the user is entering a fully
13660 qualified entity name, and the match must not be done in wild
13661 mode. Similarly, if the user wants to complete what looks
13662 like an encoded name, the match must not be done in wild
13663 mode. Also, in the standard__ special case always do
13664 non-wild matching. */
13665 m_wild_match_p
13666 = (lookup_name.match_type () != symbol_name_match_type::FULL
13667 && !m_encoded_p
13668 && !m_standard_p
13669 && user_name.find ('.') == std::string::npos);
13670 }
13671}
13672
13673/* symbol_name_matcher_ftype method for Ada. This only handles
13674 completion mode. */
13675
13676static bool
13677ada_symbol_name_matches (const char *symbol_search_name,
13678 const lookup_name_info &lookup_name,
a207cff2 13679 completion_match_result *comp_match_res)
74ccd7f5 13680{
b5ec771e
PA
13681 return lookup_name.ada ().matches (symbol_search_name,
13682 lookup_name.match_type (),
a207cff2 13683 comp_match_res);
b5ec771e
PA
13684}
13685
de63c46b
PA
13686/* A name matcher that matches the symbol name exactly, with
13687 strcmp. */
13688
13689static bool
13690literal_symbol_name_matcher (const char *symbol_search_name,
13691 const lookup_name_info &lookup_name,
13692 completion_match_result *comp_match_res)
13693{
e0802d59 13694 gdb::string_view name_view = lookup_name.name ();
de63c46b 13695
e0802d59
TT
13696 if (lookup_name.completion_mode ()
13697 ? (strncmp (symbol_search_name, name_view.data (),
13698 name_view.size ()) == 0)
13699 : symbol_search_name == name_view)
de63c46b
PA
13700 {
13701 if (comp_match_res != NULL)
13702 comp_match_res->set_match (symbol_search_name);
13703 return true;
13704 }
13705 else
13706 return false;
13707}
13708
c9debfb9 13709/* Implement the "get_symbol_name_matcher" language_defn method for
b5ec771e
PA
13710 Ada. */
13711
13712static symbol_name_matcher_ftype *
13713ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
13714{
de63c46b
PA
13715 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
13716 return literal_symbol_name_matcher;
13717
b5ec771e
PA
13718 if (lookup_name.completion_mode ())
13719 return ada_symbol_name_matches;
74ccd7f5 13720 else
b5ec771e
PA
13721 {
13722 if (lookup_name.ada ().wild_match_p ())
13723 return do_wild_match;
a2cd4f14
JB
13724 else if (lookup_name.ada ().verbatim_p ())
13725 return do_exact_match;
b5ec771e
PA
13726 else
13727 return do_full_match;
13728 }
74ccd7f5
JB
13729}
13730
0874fd07
AB
13731/* Class representing the Ada language. */
13732
13733class ada_language : public language_defn
13734{
13735public:
13736 ada_language ()
0e25e767 13737 : language_defn (language_ada)
0874fd07 13738 { /* Nothing. */ }
5bd40f2a 13739
6f7664a9
AB
13740 /* See language.h. */
13741
13742 const char *name () const override
13743 { return "ada"; }
13744
13745 /* See language.h. */
13746
13747 const char *natural_name () const override
13748 { return "Ada"; }
13749
e171d6f1
AB
13750 /* See language.h. */
13751
13752 const std::vector<const char *> &filename_extensions () const override
13753 {
13754 static const std::vector<const char *> extensions
13755 = { ".adb", ".ads", ".a", ".ada", ".dg" };
13756 return extensions;
13757 }
13758
5bd40f2a
AB
13759 /* Print an array element index using the Ada syntax. */
13760
13761 void print_array_index (struct type *index_type,
13762 LONGEST index,
13763 struct ui_file *stream,
13764 const value_print_options *options) const override
13765 {
13766 struct value *index_value = val_atr (index_type, index);
13767
00c696a6 13768 value_print (index_value, stream, options);
5bd40f2a
AB
13769 fprintf_filtered (stream, " => ");
13770 }
15e5fd35
AB
13771
13772 /* Implement the "read_var_value" language_defn method for Ada. */
13773
13774 struct value *read_var_value (struct symbol *var,
13775 const struct block *var_block,
13776 struct frame_info *frame) const override
13777 {
13778 /* The only case where default_read_var_value is not sufficient
13779 is when VAR is a renaming... */
13780 if (frame != nullptr)
13781 {
13782 const struct block *frame_block = get_frame_block (frame, NULL);
13783 if (frame_block != nullptr && ada_is_renaming_symbol (var))
13784 return ada_read_renaming_var_value (var, frame_block);
13785 }
13786
13787 /* This is a typical case where we expect the default_read_var_value
13788 function to work. */
13789 return language_defn::read_var_value (var, var_block, frame);
13790 }
1fb314aa
AB
13791
13792 /* See language.h. */
13793 void language_arch_info (struct gdbarch *gdbarch,
13794 struct language_arch_info *lai) const override
13795 {
13796 const struct builtin_type *builtin = builtin_type (gdbarch);
13797
7bea47f0
AB
13798 /* Helper function to allow shorter lines below. */
13799 auto add = [&] (struct type *t)
13800 {
13801 lai->add_primitive_type (t);
13802 };
13803
13804 add (arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13805 0, "integer"));
13806 add (arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13807 0, "long_integer"));
13808 add (arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13809 0, "short_integer"));
13810 struct type *char_type = arch_character_type (gdbarch, TARGET_CHAR_BIT,
13811 0, "character");
13812 lai->set_string_char_type (char_type);
13813 add (char_type);
13814 add (arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13815 "float", gdbarch_float_format (gdbarch)));
13816 add (arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13817 "long_float", gdbarch_double_format (gdbarch)));
13818 add (arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13819 0, "long_long_integer"));
13820 add (arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
13821 "long_long_float",
13822 gdbarch_long_double_format (gdbarch)));
13823 add (arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13824 0, "natural"));
13825 add (arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13826 0, "positive"));
13827 add (builtin->builtin_void);
13828
13829 struct type *system_addr_ptr
1fb314aa
AB
13830 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
13831 "void"));
7bea47f0
AB
13832 system_addr_ptr->set_name ("system__address");
13833 add (system_addr_ptr);
1fb314aa
AB
13834
13835 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
13836 type. This is a signed integral type whose size is the same as
13837 the size of addresses. */
7bea47f0
AB
13838 unsigned int addr_length = TYPE_LENGTH (system_addr_ptr);
13839 add (arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
13840 "storage_offset"));
1fb314aa 13841
7bea47f0 13842 lai->set_bool_type (builtin->builtin_bool);
1fb314aa 13843 }
4009ee92
AB
13844
13845 /* See language.h. */
13846
13847 bool iterate_over_symbols
13848 (const struct block *block, const lookup_name_info &name,
13849 domain_enum domain,
13850 gdb::function_view<symbol_found_callback_ftype> callback) const override
13851 {
13852 std::vector<struct block_symbol> results;
13853
13854 ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
13855 for (block_symbol &sym : results)
13856 {
13857 if (!callback (&sym))
13858 return false;
13859 }
13860
13861 return true;
13862 }
6f827019
AB
13863
13864 /* See language.h. */
13865 bool sniff_from_mangled_name (const char *mangled,
13866 char **out) const override
13867 {
13868 std::string demangled = ada_decode (mangled);
13869
13870 *out = NULL;
13871
13872 if (demangled != mangled && demangled[0] != '<')
13873 {
13874 /* Set the gsymbol language to Ada, but still return 0.
13875 Two reasons for that:
13876
13877 1. For Ada, we prefer computing the symbol's decoded name
13878 on the fly rather than pre-compute it, in order to save
13879 memory (Ada projects are typically very large).
13880
13881 2. There are some areas in the definition of the GNAT
13882 encoding where, with a bit of bad luck, we might be able
13883 to decode a non-Ada symbol, generating an incorrect
13884 demangled name (Eg: names ending with "TB" for instance
13885 are identified as task bodies and so stripped from
13886 the decoded name returned).
13887
13888 Returning true, here, but not setting *DEMANGLED, helps us get
13889 a little bit of the best of both worlds. Because we're last,
13890 we should not affect any of the other languages that were
13891 able to demangle the symbol before us; we get to correctly
13892 tag Ada symbols as such; and even if we incorrectly tagged a
13893 non-Ada symbol, which should be rare, any routing through the
13894 Ada language should be transparent (Ada tries to behave much
13895 like C/C++ with non-Ada symbols). */
13896 return true;
13897 }
13898
13899 return false;
13900 }
fbfb0a46
AB
13901
13902 /* See language.h. */
13903
5399db93 13904 char *demangle_symbol (const char *mangled, int options) const override
0a50df5d
AB
13905 {
13906 return ada_la_decode (mangled, options);
13907 }
13908
13909 /* See language.h. */
13910
fbfb0a46
AB
13911 void print_type (struct type *type, const char *varstring,
13912 struct ui_file *stream, int show, int level,
13913 const struct type_print_options *flags) const override
13914 {
13915 ada_print_type (type, varstring, stream, show, level, flags);
13916 }
c9debfb9 13917
53fc67f8
AB
13918 /* See language.h. */
13919
13920 const char *word_break_characters (void) const override
13921 {
13922 return ada_completer_word_break_characters;
13923 }
13924
7e56227d
AB
13925 /* See language.h. */
13926
13927 void collect_symbol_completion_matches (completion_tracker &tracker,
13928 complete_symbol_mode mode,
13929 symbol_name_match_type name_match_type,
13930 const char *text, const char *word,
13931 enum type_code code) const override
13932 {
13933 struct symbol *sym;
13934 const struct block *b, *surrounding_static_block = 0;
13935 struct block_iterator iter;
13936
13937 gdb_assert (code == TYPE_CODE_UNDEF);
13938
13939 lookup_name_info lookup_name (text, name_match_type, true);
13940
13941 /* First, look at the partial symtab symbols. */
13942 expand_symtabs_matching (NULL,
13943 lookup_name,
13944 NULL,
13945 NULL,
13946 ALL_DOMAIN);
13947
13948 /* At this point scan through the misc symbol vectors and add each
13949 symbol you find to the list. Eventually we want to ignore
13950 anything that isn't a text symbol (everything else will be
13951 handled by the psymtab code above). */
13952
13953 for (objfile *objfile : current_program_space->objfiles ())
13954 {
13955 for (minimal_symbol *msymbol : objfile->msymbols ())
13956 {
13957 QUIT;
13958
13959 if (completion_skip_symbol (mode, msymbol))
13960 continue;
13961
13962 language symbol_language = msymbol->language ();
13963
13964 /* Ada minimal symbols won't have their language set to Ada. If
13965 we let completion_list_add_name compare using the
13966 default/C-like matcher, then when completing e.g., symbols in a
13967 package named "pck", we'd match internal Ada symbols like
13968 "pckS", which are invalid in an Ada expression, unless you wrap
13969 them in '<' '>' to request a verbatim match.
13970
13971 Unfortunately, some Ada encoded names successfully demangle as
13972 C++ symbols (using an old mangling scheme), such as "name__2Xn"
13973 -> "Xn::name(void)" and thus some Ada minimal symbols end up
13974 with the wrong language set. Paper over that issue here. */
13975 if (symbol_language == language_auto
13976 || symbol_language == language_cplus)
13977 symbol_language = language_ada;
13978
13979 completion_list_add_name (tracker,
13980 symbol_language,
13981 msymbol->linkage_name (),
13982 lookup_name, text, word);
13983 }
13984 }
13985
13986 /* Search upwards from currently selected frame (so that we can
13987 complete on local vars. */
13988
13989 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
13990 {
13991 if (!BLOCK_SUPERBLOCK (b))
13992 surrounding_static_block = b; /* For elmin of dups */
13993
13994 ALL_BLOCK_SYMBOLS (b, iter, sym)
13995 {
13996 if (completion_skip_symbol (mode, sym))
13997 continue;
13998
13999 completion_list_add_name (tracker,
14000 sym->language (),
14001 sym->linkage_name (),
14002 lookup_name, text, word);
14003 }
14004 }
14005
14006 /* Go through the symtabs and check the externs and statics for
14007 symbols which match. */
14008
14009 for (objfile *objfile : current_program_space->objfiles ())
14010 {
14011 for (compunit_symtab *s : objfile->compunits ())
14012 {
14013 QUIT;
14014 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
14015 ALL_BLOCK_SYMBOLS (b, iter, sym)
14016 {
14017 if (completion_skip_symbol (mode, sym))
14018 continue;
14019
14020 completion_list_add_name (tracker,
14021 sym->language (),
14022 sym->linkage_name (),
14023 lookup_name, text, word);
14024 }
14025 }
14026 }
14027
14028 for (objfile *objfile : current_program_space->objfiles ())
14029 {
14030 for (compunit_symtab *s : objfile->compunits ())
14031 {
14032 QUIT;
14033 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
14034 /* Don't do this block twice. */
14035 if (b == surrounding_static_block)
14036 continue;
14037 ALL_BLOCK_SYMBOLS (b, iter, sym)
14038 {
14039 if (completion_skip_symbol (mode, sym))
14040 continue;
14041
14042 completion_list_add_name (tracker,
14043 sym->language (),
14044 sym->linkage_name (),
14045 lookup_name, text, word);
14046 }
14047 }
14048 }
14049 }
14050
f16a9f57
AB
14051 /* See language.h. */
14052
14053 gdb::unique_xmalloc_ptr<char> watch_location_expression
14054 (struct type *type, CORE_ADDR addr) const override
14055 {
14056 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
14057 std::string name = type_to_string (type);
14058 return gdb::unique_xmalloc_ptr<char>
14059 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
14060 }
14061
a1d1fa3e
AB
14062 /* See language.h. */
14063
14064 void value_print (struct value *val, struct ui_file *stream,
14065 const struct value_print_options *options) const override
14066 {
14067 return ada_value_print (val, stream, options);
14068 }
14069
ebe2334e
AB
14070 /* See language.h. */
14071
14072 void value_print_inner
14073 (struct value *val, struct ui_file *stream, int recurse,
14074 const struct value_print_options *options) const override
14075 {
14076 return ada_value_print_inner (val, stream, recurse, options);
14077 }
14078
a78a19b1
AB
14079 /* See language.h. */
14080
14081 struct block_symbol lookup_symbol_nonlocal
14082 (const char *name, const struct block *block,
14083 const domain_enum domain) const override
14084 {
14085 struct block_symbol sym;
14086
14087 sym = ada_lookup_symbol (name, block_static_block (block), domain);
14088 if (sym.symbol != NULL)
14089 return sym;
14090
14091 /* If we haven't found a match at this point, try the primitive
14092 types. In other languages, this search is performed before
14093 searching for global symbols in order to short-circuit that
14094 global-symbol search if it happens that the name corresponds
14095 to a primitive type. But we cannot do the same in Ada, because
14096 it is perfectly legitimate for a program to declare a type which
14097 has the same name as a standard type. If looking up a type in
14098 that situation, we have traditionally ignored the primitive type
14099 in favor of user-defined types. This is why, unlike most other
14100 languages, we search the primitive types this late and only after
14101 having searched the global symbols without success. */
14102
14103 if (domain == VAR_DOMAIN)
14104 {
14105 struct gdbarch *gdbarch;
14106
14107 if (block == NULL)
14108 gdbarch = target_gdbarch ();
14109 else
14110 gdbarch = block_gdbarch (block);
14111 sym.symbol
14112 = language_lookup_primitive_type_as_symbol (this, gdbarch, name);
14113 if (sym.symbol != NULL)
14114 return sym;
14115 }
14116
14117 return {};
14118 }
14119
87afa652
AB
14120 /* See language.h. */
14121
14122 int parser (struct parser_state *ps) const override
14123 {
14124 warnings_issued = 0;
14125 return ada_parse (ps);
14126 }
14127
1bf9c363
AB
14128 /* See language.h.
14129
14130 Same as evaluate_type (*EXP), but resolves ambiguous symbol references
14131 (marked by OP_VAR_VALUE nodes in which the symbol has an undefined
14132 namespace) and converts operators that are user-defined into
14133 appropriate function calls. If CONTEXT_TYPE is non-null, it provides
14134 a preferred result type [at the moment, only type void has any
14135 effect---causing procedures to be preferred over functions in calls].
14136 A null CONTEXT_TYPE indicates that a non-void return type is
14137 preferred. May change (expand) *EXP. */
14138
14139 void post_parser (expression_up *expp, int void_context_p, int completing,
14140 innermost_block_tracker *tracker) const override
14141 {
14142 struct type *context_type = NULL;
14143 int pc = 0;
14144
14145 if (void_context_p)
14146 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
14147
14148 resolve_subexp (expp, &pc, 1, context_type, completing, tracker);
14149 }
14150
ec8cec5b
AB
14151 /* See language.h. */
14152
14153 void emitchar (int ch, struct type *chtype,
14154 struct ui_file *stream, int quoter) const override
14155 {
14156 ada_emit_char (ch, chtype, stream, quoter, 1);
14157 }
14158
52b50f2c
AB
14159 /* See language.h. */
14160
14161 void printchar (int ch, struct type *chtype,
14162 struct ui_file *stream) const override
14163 {
14164 ada_printchar (ch, chtype, stream);
14165 }
14166
d711ee67
AB
14167 /* See language.h. */
14168
14169 void printstr (struct ui_file *stream, struct type *elttype,
14170 const gdb_byte *string, unsigned int length,
14171 const char *encoding, int force_ellipses,
14172 const struct value_print_options *options) const override
14173 {
14174 ada_printstr (stream, elttype, string, length, encoding,
14175 force_ellipses, options);
14176 }
14177
4ffc13fb
AB
14178 /* See language.h. */
14179
14180 void print_typedef (struct type *type, struct symbol *new_symbol,
14181 struct ui_file *stream) const override
14182 {
14183 ada_print_typedef (type, new_symbol, stream);
14184 }
14185
39e7ecca
AB
14186 /* See language.h. */
14187
14188 bool is_string_type_p (struct type *type) const override
14189 {
14190 return ada_is_string_type (type);
14191 }
14192
22e3f3ed
AB
14193 /* See language.h. */
14194
14195 const char *struct_too_deep_ellipsis () const override
14196 { return "(...)"; }
39e7ecca 14197
67bd3fd5
AB
14198 /* See language.h. */
14199
14200 bool c_style_arrays_p () const override
14201 { return false; }
14202
d3355e4d
AB
14203 /* See language.h. */
14204
14205 bool store_sym_names_in_linkage_form_p () const override
14206 { return true; }
14207
b63a3f3f
AB
14208 /* See language.h. */
14209
14210 const struct lang_varobj_ops *varobj_ops () const override
14211 { return &ada_varobj_ops; }
14212
5aba6ebe
AB
14213 /* See language.h. */
14214
14215 const struct exp_descriptor *expression_ops () const override
14216 { return &ada_exp_descriptor; }
14217
b7c6e27d
AB
14218 /* See language.h. */
14219
14220 const struct op_print *opcode_print_table () const override
14221 { return ada_op_print_tab; }
14222
c9debfb9
AB
14223protected:
14224 /* See language.h. */
14225
14226 symbol_name_matcher_ftype *get_symbol_name_matcher_inner
14227 (const lookup_name_info &lookup_name) const override
14228 {
14229 return ada_get_symbol_name_matcher (lookup_name);
14230 }
0874fd07
AB
14231};
14232
14233/* Single instance of the Ada language class. */
14234
14235static ada_language ada_language_defn;
14236
5bf03f13
JB
14237/* Command-list for the "set/show ada" prefix command. */
14238static struct cmd_list_element *set_ada_list;
14239static struct cmd_list_element *show_ada_list;
14240
2060206e
PA
14241static void
14242initialize_ada_catchpoint_ops (void)
14243{
14244 struct breakpoint_ops *ops;
14245
14246 initialize_breakpoint_ops ();
14247
14248 ops = &catch_exception_breakpoint_ops;
14249 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14250 ops->allocate_location = allocate_location_exception;
14251 ops->re_set = re_set_exception;
14252 ops->check_status = check_status_exception;
14253 ops->print_it = print_it_exception;
14254 ops->print_one = print_one_exception;
14255 ops->print_mention = print_mention_exception;
14256 ops->print_recreate = print_recreate_exception;
2060206e
PA
14257
14258 ops = &catch_exception_unhandled_breakpoint_ops;
14259 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14260 ops->allocate_location = allocate_location_exception;
14261 ops->re_set = re_set_exception;
14262 ops->check_status = check_status_exception;
14263 ops->print_it = print_it_exception;
14264 ops->print_one = print_one_exception;
14265 ops->print_mention = print_mention_exception;
14266 ops->print_recreate = print_recreate_exception;
2060206e
PA
14267
14268 ops = &catch_assert_breakpoint_ops;
14269 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14270 ops->allocate_location = allocate_location_exception;
14271 ops->re_set = re_set_exception;
14272 ops->check_status = check_status_exception;
14273 ops->print_it = print_it_exception;
14274 ops->print_one = print_one_exception;
14275 ops->print_mention = print_mention_exception;
14276 ops->print_recreate = print_recreate_exception;
9f757bf7
XR
14277
14278 ops = &catch_handlers_breakpoint_ops;
14279 *ops = bkpt_breakpoint_ops;
37f6a7f4
TT
14280 ops->allocate_location = allocate_location_exception;
14281 ops->re_set = re_set_exception;
14282 ops->check_status = check_status_exception;
14283 ops->print_it = print_it_exception;
14284 ops->print_one = print_one_exception;
14285 ops->print_mention = print_mention_exception;
14286 ops->print_recreate = print_recreate_exception;
2060206e
PA
14287}
14288
3d9434b5
JB
14289/* This module's 'new_objfile' observer. */
14290
14291static void
14292ada_new_objfile_observer (struct objfile *objfile)
14293{
14294 ada_clear_symbol_cache ();
14295}
14296
14297/* This module's 'free_objfile' observer. */
14298
14299static void
14300ada_free_objfile_observer (struct objfile *objfile)
14301{
14302 ada_clear_symbol_cache ();
14303}
14304
6c265988 14305void _initialize_ada_language ();
d2e4a39e 14306void
6c265988 14307_initialize_ada_language ()
14f9c5c9 14308{
2060206e
PA
14309 initialize_ada_catchpoint_ops ();
14310
0743fc83
TT
14311 add_basic_prefix_cmd ("ada", no_class,
14312 _("Prefix command for changing Ada-specific settings."),
14313 &set_ada_list, "set ada ", 0, &setlist);
5bf03f13 14314
0743fc83
TT
14315 add_show_prefix_cmd ("ada", no_class,
14316 _("Generic command for showing Ada-specific settings."),
14317 &show_ada_list, "show ada ", 0, &showlist);
5bf03f13
JB
14318
14319 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
dda83cd7 14320 &trust_pad_over_xvs, _("\
590042fc
PW
14321Enable or disable an optimization trusting PAD types over XVS types."), _("\
14322Show whether an optimization trusting PAD types over XVS types is activated."),
dda83cd7 14323 _("\
5bf03f13
JB
14324This is related to the encoding used by the GNAT compiler. The debugger\n\
14325should normally trust the contents of PAD types, but certain older versions\n\
14326of GNAT have a bug that sometimes causes the information in the PAD type\n\
14327to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14328work around this bug. It is always safe to turn this option \"off\", but\n\
14329this incurs a slight performance penalty, so it is recommended to NOT change\n\
14330this option to \"off\" unless necessary."),
dda83cd7 14331 NULL, NULL, &set_ada_list, &show_ada_list);
5bf03f13 14332
d72413e6
PMR
14333 add_setshow_boolean_cmd ("print-signatures", class_vars,
14334 &print_signatures, _("\
14335Enable or disable the output of formal and return types for functions in the \
590042fc 14336overloads selection menu."), _("\
d72413e6 14337Show whether the output of formal and return types for functions in the \
590042fc 14338overloads selection menu is activated."),
d72413e6
PMR
14339 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14340
9ac4176b
PA
14341 add_catch_command ("exception", _("\
14342Catch Ada exceptions, when raised.\n\
9bf7038b 14343Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14344Without any argument, stop when any Ada exception is raised.\n\
14345If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14346being raised does not have a handler (and will therefore lead to the task's\n\
14347termination).\n\
14348Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14349raised is the same as ARG.\n\
14350CONDITION is a boolean expression that is evaluated to see whether the\n\
14351exception should cause a stop."),
9ac4176b 14352 catch_ada_exception_command,
71bed2db 14353 catch_ada_completer,
9ac4176b
PA
14354 CATCH_PERMANENT,
14355 CATCH_TEMPORARY);
9f757bf7
XR
14356
14357 add_catch_command ("handlers", _("\
14358Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14359Usage: catch handlers [ARG] [if CONDITION]\n\
14360Without any argument, stop when any Ada exception is handled.\n\
14361With an argument, catch only exceptions with the given name.\n\
14362CONDITION is a boolean expression that is evaluated to see whether the\n\
14363exception should cause a stop."),
9f757bf7 14364 catch_ada_handlers_command,
dda83cd7 14365 catch_ada_completer,
9f757bf7
XR
14366 CATCH_PERMANENT,
14367 CATCH_TEMPORARY);
9ac4176b
PA
14368 add_catch_command ("assert", _("\
14369Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14370Usage: catch assert [if CONDITION]\n\
14371CONDITION is a boolean expression that is evaluated to see whether the\n\
14372exception should cause a stop."),
9ac4176b 14373 catch_assert_command,
dda83cd7 14374 NULL,
9ac4176b
PA
14375 CATCH_PERMANENT,
14376 CATCH_TEMPORARY);
14377
6c038f32 14378 varsize_limit = 65536;
3fcded8f
JB
14379 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14380 &varsize_limit, _("\
14381Set the maximum number of bytes allowed in a variable-size object."), _("\
14382Show the maximum number of bytes allowed in a variable-size object."), _("\
14383Attempts to access an object whose size is not a compile-time constant\n\
14384and exceeds this limit will cause an error."),
14385 NULL, NULL, &setlist, &showlist);
6c038f32 14386
778865d3
JB
14387 add_info ("exceptions", info_exceptions_command,
14388 _("\
14389List all Ada exception names.\n\
9bf7038b 14390Usage: info exceptions [REGEXP]\n\
778865d3
JB
14391If a regular expression is passed as an argument, only those matching\n\
14392the regular expression are listed."));
14393
0743fc83
TT
14394 add_basic_prefix_cmd ("ada", class_maintenance,
14395 _("Set Ada maintenance-related variables."),
14396 &maint_set_ada_cmdlist, "maintenance set ada ",
14397 0/*allow-unknown*/, &maintenance_set_cmdlist);
c6044dd1 14398
0743fc83
TT
14399 add_show_prefix_cmd ("ada", class_maintenance,
14400 _("Show Ada maintenance-related variables."),
14401 &maint_show_ada_cmdlist, "maintenance show ada ",
14402 0/*allow-unknown*/, &maintenance_show_cmdlist);
c6044dd1
JB
14403
14404 add_setshow_boolean_cmd
14405 ("ignore-descriptive-types", class_maintenance,
14406 &ada_ignore_descriptive_types_p,
14407 _("Set whether descriptive types generated by GNAT should be ignored."),
14408 _("Show whether descriptive types generated by GNAT should be ignored."),
14409 _("\
14410When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14411DWARF attribute."),
14412 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14413
459a2e4c
TT
14414 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14415 NULL, xcalloc, xfree);
6b69afc4 14416
3d9434b5 14417 /* The ada-lang observers. */
76727919
TT
14418 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14419 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14420 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14421}