]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/valops.c
constify struct block in some places
[thirdparty/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
ecd75fc8 3 Copyright (C) 1986-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
c906108c 39#include <errno.h>
0e9f083f 40#include <string.h>
4a1970e4 41#include "gdb_assert.h"
f4c5303c 42#include "observer.h"
3e3b026f 43#include "objfiles.h"
79afc5ef 44#include "exceptions.h"
233e8b28 45#include "extension.h"
c906108c 46
ccce17b0 47extern unsigned int overload_debug;
c906108c
SS
48/* Local functions. */
49
ad2f7632
DJ
50static int typecmp (int staticp, int varargs, int nargs,
51 struct field t1[], struct value *t2[]);
c906108c 52
714f19d5 53static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 54 int, struct type *, int);
c906108c 55
714f19d5
TT
56static struct value *search_struct_method (const char *, struct value **,
57 struct value **,
58 int, int *, struct type *);
c906108c 59
da096638 60static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
61 const char *, const char *,
62 struct symbol ***,
7322dca9
SW
63 struct badness_vector **,
64 const int no_adl);
8d577d32
DC
65
66static
da096638 67int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
68 const char *, const char *,
69 int, struct symbol ***,
7322dca9
SW
70 struct badness_vector **, int *,
71 const int no_adl);
ac3eeb49 72
9cf95373 73static int find_oload_champ (struct value **, int, int,
233e8b28
SC
74 struct fn_field *, VEC (xmethod_worker_ptr) *,
75 struct symbol **, struct badness_vector **);
ac3eeb49 76
2bca57ba 77static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
78
79enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
80
81static enum
ac3eeb49
MS
82oload_classification classify_oload_match (struct badness_vector *,
83 int, int);
8d577d32 84
ac3eeb49
MS
85static struct value *value_struct_elt_for_reference (struct type *,
86 int, struct type *,
c848d642 87 const char *,
ac3eeb49
MS
88 struct type *,
89 int, enum noside);
79c2c32d 90
ac3eeb49 91static struct value *value_namespace_elt (const struct type *,
c848d642 92 const char *, int , enum noside);
79c2c32d 93
ac3eeb49 94static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 95 const char *, int,
ac3eeb49 96 enum noside);
63d06c5c 97
a14ed312 98static CORE_ADDR allocate_space_in_inferior (int);
c906108c 99
f23631e4 100static struct value *cast_into_complex (struct type *, struct value *);
c906108c 101
233e8b28
SC
102static void find_method_list (struct value **, const char *,
103 int, struct type *, struct fn_field **, int *,
104 VEC (xmethod_worker_ptr) **,
105 struct type **, int *);
7a292a7a 106
a14ed312 107void _initialize_valops (void);
c906108c 108
c906108c 109#if 0
ac3eeb49
MS
110/* Flag for whether we want to abandon failed expression evals by
111 default. */
112
c906108c
SS
113static int auto_abandon = 0;
114#endif
115
116int overload_resolution = 0;
920d2a44
AC
117static void
118show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
119 struct cmd_list_element *c,
120 const char *value)
920d2a44 121{
3e43a32a
MS
122 fprintf_filtered (file, _("Overload resolution in evaluating "
123 "C++ functions is %s.\n"),
920d2a44
AC
124 value);
125}
242bfc55 126
3e3b026f
UW
127/* Find the address of function name NAME in the inferior. If OBJF_P
128 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
129 is defined. */
c906108c 130
f23631e4 131struct value *
3e3b026f 132find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 133{
52f0bd74 134 struct symbol *sym;
a109c7c1 135
2570f2b7 136 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
137 if (sym != NULL)
138 {
139 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
140 {
8a3fe4f8 141 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
142 name);
143 }
3e3b026f
UW
144
145 if (objf_p)
146 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
147
c906108c
SS
148 return value_of_variable (sym, NULL);
149 }
150 else
151 {
7c7b6655
TT
152 struct bound_minimal_symbol msymbol =
153 lookup_bound_minimal_symbol (name);
a109c7c1 154
7c7b6655 155 if (msymbol.minsym != NULL)
c906108c 156 {
7c7b6655 157 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
158 struct gdbarch *gdbarch = get_objfile_arch (objfile);
159
c906108c 160 struct type *type;
4478b372 161 CORE_ADDR maddr;
3e3b026f 162 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
163 type = lookup_function_type (type);
164 type = lookup_pointer_type (type);
77e371c0 165 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
166
167 if (objf_p)
168 *objf_p = objfile;
169
4478b372 170 return value_from_pointer (type, maddr);
c906108c
SS
171 }
172 else
173 {
c5aa993b 174 if (!target_has_execution)
3e43a32a
MS
175 error (_("evaluation of this expression "
176 "requires the target program to be active"));
c5aa993b 177 else
3e43a32a
MS
178 error (_("evaluation of this expression requires the "
179 "program to have a function \"%s\"."),
180 name);
c906108c
SS
181 }
182 }
183}
184
ac3eeb49
MS
185/* Allocate NBYTES of space in the inferior using the inferior's
186 malloc and return a value that is a pointer to the allocated
187 space. */
c906108c 188
f23631e4 189struct value *
fba45db2 190value_allocate_space_in_inferior (int len)
c906108c 191{
3e3b026f
UW
192 struct objfile *objf;
193 struct value *val = find_function_in_inferior ("malloc", &objf);
194 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 195 struct value *blocklen;
c906108c 196
3e3b026f 197 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
198 val = call_function_by_hand (val, 1, &blocklen);
199 if (value_logical_not (val))
200 {
201 if (!target_has_execution)
3e43a32a
MS
202 error (_("No memory available to program now: "
203 "you need to start the target first"));
c5aa993b 204 else
8a3fe4f8 205 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
206 }
207 return val;
208}
209
210static CORE_ADDR
fba45db2 211allocate_space_in_inferior (int len)
c906108c
SS
212{
213 return value_as_long (value_allocate_space_in_inferior (len));
214}
215
6af87b03
AR
216/* Cast struct value VAL to type TYPE and return as a value.
217 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
218 for this to work. Typedef to one of the codes is permitted.
219 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
220
221static struct value *
222value_cast_structs (struct type *type, struct value *v2)
223{
224 struct type *t1;
225 struct type *t2;
226 struct value *v;
227
228 gdb_assert (type != NULL && v2 != NULL);
229
230 t1 = check_typedef (type);
231 t2 = check_typedef (value_type (v2));
232
233 /* Check preconditions. */
234 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
235 || TYPE_CODE (t1) == TYPE_CODE_UNION)
236 && !!"Precondition is that type is of STRUCT or UNION kind.");
237 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
238 || TYPE_CODE (t2) == TYPE_CODE_UNION)
239 && !!"Precondition is that value is of STRUCT or UNION kind");
240
191ca0a1
CM
241 if (TYPE_NAME (t1) != NULL
242 && TYPE_NAME (t2) != NULL
243 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
244 return NULL;
245
6af87b03
AR
246 /* Upcasting: look in the type of the source to see if it contains the
247 type of the target as a superclass. If so, we'll need to
248 offset the pointer rather than just change its type. */
249 if (TYPE_NAME (t1) != NULL)
250 {
251 v = search_struct_field (type_name_no_tag (t1),
252 v2, 0, t2, 1);
253 if (v)
254 return v;
255 }
256
257 /* Downcasting: look in the type of the target to see if it contains the
258 type of the source as a superclass. If so, we'll need to
9c3c02fd 259 offset the pointer rather than just change its type. */
6af87b03
AR
260 if (TYPE_NAME (t2) != NULL)
261 {
9c3c02fd
TT
262 /* Try downcasting using the run-time type of the value. */
263 int full, top, using_enc;
264 struct type *real_type;
265
266 real_type = value_rtti_type (v2, &full, &top, &using_enc);
267 if (real_type)
268 {
269 v = value_full_object (v2, real_type, full, top, using_enc);
270 v = value_at_lazy (real_type, value_address (v));
9f1f738a 271 real_type = value_type (v);
9c3c02fd
TT
272
273 /* We might be trying to cast to the outermost enclosing
274 type, in which case search_struct_field won't work. */
275 if (TYPE_NAME (real_type) != NULL
276 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
277 return v;
278
279 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
280 if (v)
281 return v;
282 }
283
284 /* Try downcasting using information from the destination type
285 T2. This wouldn't work properly for classes with virtual
286 bases, but those were handled above. */
6af87b03
AR
287 v = search_struct_field (type_name_no_tag (t2),
288 value_zero (t1, not_lval), 0, t1, 1);
289 if (v)
290 {
291 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 292 CORE_ADDR addr2 = value_address (v2);
a109c7c1 293
42ae5230 294 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
295 return value_at (type, addr2);
296 }
297 }
694182d2
DJ
298
299 return NULL;
6af87b03
AR
300}
301
fb933624
DJ
302/* Cast one pointer or reference type to another. Both TYPE and
303 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
304 reference types. If SUBCLASS_CHECK is non-zero, this will force a
305 check to see whether TYPE is a superclass of ARG2's type. If
306 SUBCLASS_CHECK is zero, then the subclass check is done only when
307 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
308
309struct value *
b1af9e97
TT
310value_cast_pointers (struct type *type, struct value *arg2,
311 int subclass_check)
fb933624 312{
d160942f 313 struct type *type1 = check_typedef (type);
fb933624 314 struct type *type2 = check_typedef (value_type (arg2));
d160942f 315 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
316 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
317
318 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
319 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 320 && (subclass_check || !value_logical_not (arg2)))
fb933624 321 {
6af87b03 322 struct value *v2;
fb933624 323
6af87b03
AR
324 if (TYPE_CODE (type2) == TYPE_CODE_REF)
325 v2 = coerce_ref (arg2);
326 else
327 v2 = value_ind (arg2);
3e43a32a
MS
328 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
329 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
330 v2 = value_cast_structs (t1, v2);
331 /* At this point we have what we can have, un-dereference if needed. */
332 if (v2)
fb933624 333 {
6af87b03 334 struct value *v = value_addr (v2);
a109c7c1 335
6af87b03
AR
336 deprecated_set_value_type (v, type);
337 return v;
fb933624 338 }
6af87b03 339 }
fb933624
DJ
340
341 /* No superclass found, just change the pointer type. */
0d5de010 342 arg2 = value_copy (arg2);
fb933624 343 deprecated_set_value_type (arg2, type);
4dfea560 344 set_value_enclosing_type (arg2, type);
fb933624
DJ
345 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
346 return arg2;
347}
348
c906108c
SS
349/* Cast value ARG2 to type TYPE and return as a value.
350 More general than a C cast: accepts any two types of the same length,
351 and if ARG2 is an lvalue it can be cast into anything at all. */
352/* In C++, casts may change pointer or object representations. */
353
f23631e4
AC
354struct value *
355value_cast (struct type *type, struct value *arg2)
c906108c 356{
52f0bd74
AC
357 enum type_code code1;
358 enum type_code code2;
359 int scalar;
c906108c
SS
360 struct type *type2;
361
362 int convert_to_boolean = 0;
c5aa993b 363
df407dfe 364 if (value_type (arg2) == type)
c906108c
SS
365 return arg2;
366
6af87b03
AR
367 code1 = TYPE_CODE (check_typedef (type));
368
369 /* Check if we are casting struct reference to struct reference. */
370 if (code1 == TYPE_CODE_REF)
371 {
372 /* We dereference type; then we recurse and finally
581e13c1 373 we generate value of the given reference. Nothing wrong with
6af87b03
AR
374 that. */
375 struct type *t1 = check_typedef (type);
376 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
377 struct value *val = value_cast (dereftype, arg2);
a109c7c1 378
6af87b03
AR
379 return value_ref (val);
380 }
381
382 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
383
384 if (code2 == TYPE_CODE_REF)
385 /* We deref the value and then do the cast. */
386 return value_cast (type, coerce_ref (arg2));
387
c906108c
SS
388 CHECK_TYPEDEF (type);
389 code1 = TYPE_CODE (type);
994b9211 390 arg2 = coerce_ref (arg2);
df407dfe 391 type2 = check_typedef (value_type (arg2));
c906108c 392
fb933624
DJ
393 /* You can't cast to a reference type. See value_cast_pointers
394 instead. */
395 gdb_assert (code1 != TYPE_CODE_REF);
396
ac3eeb49
MS
397 /* A cast to an undetermined-length array_type, such as
398 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
399 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
400 if (code1 == TYPE_CODE_ARRAY)
401 {
402 struct type *element_type = TYPE_TARGET_TYPE (type);
403 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 404
d78df370 405 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
406 {
407 struct type *range_type = TYPE_INDEX_TYPE (type);
408 int val_length = TYPE_LENGTH (type2);
409 LONGEST low_bound, high_bound, new_length;
a109c7c1 410
c906108c
SS
411 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
412 low_bound = 0, high_bound = 0;
413 new_length = val_length / element_length;
414 if (val_length % element_length != 0)
3e43a32a
MS
415 warning (_("array element type size does not "
416 "divide object size in cast"));
ac3eeb49
MS
417 /* FIXME-type-allocation: need a way to free this type when
418 we are done with it. */
0c9c3474
SA
419 range_type = create_static_range_type ((struct type *) NULL,
420 TYPE_TARGET_TYPE (range_type),
421 low_bound,
422 new_length + low_bound - 1);
ac3eeb49
MS
423 deprecated_set_value_type (arg2,
424 create_array_type ((struct type *) NULL,
425 element_type,
426 range_type));
c906108c
SS
427 return arg2;
428 }
429 }
430
431 if (current_language->c_style_arrays
3bdf2bbd
KW
432 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
433 && !TYPE_VECTOR (type2))
c906108c
SS
434 arg2 = value_coerce_array (arg2);
435
436 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
437 arg2 = value_coerce_function (arg2);
438
df407dfe 439 type2 = check_typedef (value_type (arg2));
c906108c
SS
440 code2 = TYPE_CODE (type2);
441
442 if (code1 == TYPE_CODE_COMPLEX)
443 return cast_into_complex (type, arg2);
444 if (code1 == TYPE_CODE_BOOL)
445 {
446 code1 = TYPE_CODE_INT;
447 convert_to_boolean = 1;
448 }
449 if (code1 == TYPE_CODE_CHAR)
450 code1 = TYPE_CODE_INT;
451 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
452 code2 = TYPE_CODE_INT;
453
454 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
455 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
456 || code2 == TYPE_CODE_RANGE);
c906108c 457
6af87b03
AR
458 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
459 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 460 && TYPE_NAME (type) != 0)
694182d2
DJ
461 {
462 struct value *v = value_cast_structs (type, arg2);
a109c7c1 463
694182d2
DJ
464 if (v)
465 return v;
466 }
467
c906108c
SS
468 if (code1 == TYPE_CODE_FLT && scalar)
469 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
470 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
471 {
e17a4113 472 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
473 int dec_len = TYPE_LENGTH (type);
474 gdb_byte dec[16];
475
476 if (code2 == TYPE_CODE_FLT)
e17a4113 477 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
478 else if (code2 == TYPE_CODE_DECFLOAT)
479 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 480 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
481 else
482 /* The only option left is an integral type. */
e17a4113 483 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
484
485 return value_from_decfloat (type, dec);
486 }
c906108c
SS
487 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
488 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
489 && (scalar || code2 == TYPE_CODE_PTR
490 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
491 {
492 LONGEST longest;
c5aa993b 493
2bf1f4a1 494 /* When we cast pointers to integers, we mustn't use
76e71323 495 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
496 represents, as value_as_long would. GDB should evaluate
497 expressions just as the compiler would --- and the compiler
498 sees a cast as a simple reinterpretation of the pointer's
499 bits. */
500 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
501 longest = extract_unsigned_integer
502 (value_contents (arg2), TYPE_LENGTH (type2),
503 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
504 else
505 longest = value_as_long (arg2);
802db21b 506 return value_from_longest (type, convert_to_boolean ?
716c501e 507 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 508 }
ac3eeb49
MS
509 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
510 || code2 == TYPE_CODE_ENUM
511 || code2 == TYPE_CODE_RANGE))
634acd5f 512 {
4603e466
DT
513 /* TYPE_LENGTH (type) is the length of a pointer, but we really
514 want the length of an address! -- we are really dealing with
515 addresses (i.e., gdb representations) not pointers (i.e.,
516 target representations) here.
517
518 This allows things like "print *(int *)0x01000234" to work
519 without printing a misleading message -- which would
520 otherwise occur when dealing with a target having two byte
521 pointers and four byte addresses. */
522
50810684 523 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 524 LONGEST longest = value_as_long (arg2);
a109c7c1 525
4603e466 526 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 527 {
4603e466
DT
528 if (longest >= ((LONGEST) 1 << addr_bit)
529 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 530 warning (_("value truncated"));
634acd5f
AC
531 }
532 return value_from_longest (type, longest);
533 }
0d5de010
DJ
534 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
535 && value_as_long (arg2) == 0)
536 {
537 struct value *result = allocate_value (type);
a109c7c1 538
ad4820ab 539 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
540 return result;
541 }
542 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
543 && value_as_long (arg2) == 0)
544 {
545 /* The Itanium C++ ABI represents NULL pointers to members as
546 minus one, instead of biasing the normal case. */
547 return value_from_longest (type, -1);
548 }
8954db33
AB
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
550 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
551 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
552 error (_("Cannot convert between vector values of different sizes"));
553 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
554 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
555 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
556 else if (code1 == TYPE_CODE_VOID)
557 {
558 return value_zero (type, not_lval);
559 }
c906108c
SS
560 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
561 {
562 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 563 return value_cast_pointers (type, arg2, 0);
fb933624 564
0d5de010 565 arg2 = value_copy (arg2);
04624583 566 deprecated_set_value_type (arg2, type);
4dfea560 567 set_value_enclosing_type (arg2, type);
b44d461b 568 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
569 return arg2;
570 }
c906108c 571 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 572 return value_at_lazy (type, value_address (arg2));
c906108c
SS
573 else
574 {
8a3fe4f8 575 error (_("Invalid cast."));
c906108c
SS
576 return 0;
577 }
578}
579
4e8f195d
TT
580/* The C++ reinterpret_cast operator. */
581
582struct value *
583value_reinterpret_cast (struct type *type, struct value *arg)
584{
585 struct value *result;
586 struct type *real_type = check_typedef (type);
587 struct type *arg_type, *dest_type;
588 int is_ref = 0;
589 enum type_code dest_code, arg_code;
590
591 /* Do reference, function, and array conversion. */
592 arg = coerce_array (arg);
593
594 /* Attempt to preserve the type the user asked for. */
595 dest_type = type;
596
597 /* If we are casting to a reference type, transform
598 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
599 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
600 {
601 is_ref = 1;
602 arg = value_addr (arg);
603 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
604 real_type = lookup_pointer_type (real_type);
605 }
606
607 arg_type = value_type (arg);
608
609 dest_code = TYPE_CODE (real_type);
610 arg_code = TYPE_CODE (arg_type);
611
612 /* We can convert pointer types, or any pointer type to int, or int
613 type to pointer. */
614 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
616 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
617 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
618 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
619 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
620 || (dest_code == arg_code
621 && (dest_code == TYPE_CODE_PTR
622 || dest_code == TYPE_CODE_METHODPTR
623 || dest_code == TYPE_CODE_MEMBERPTR)))
624 result = value_cast (dest_type, arg);
625 else
626 error (_("Invalid reinterpret_cast"));
627
628 if (is_ref)
629 result = value_cast (type, value_ref (value_ind (result)));
630
631 return result;
632}
633
634/* A helper for value_dynamic_cast. This implements the first of two
635 runtime checks: we iterate over all the base classes of the value's
636 class which are equal to the desired class; if only one of these
637 holds the value, then it is the answer. */
638
639static int
640dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
641 const gdb_byte *valaddr,
642 int embedded_offset,
4e8f195d 643 CORE_ADDR address,
8af8e3bc 644 struct value *val,
4e8f195d
TT
645 struct type *search_type,
646 CORE_ADDR arg_addr,
647 struct type *arg_type,
648 struct value **result)
649{
650 int i, result_count = 0;
651
652 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
653 {
8af8e3bc
PA
654 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
655 address, val);
a109c7c1 656
4e8f195d
TT
657 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
658 {
8af8e3bc
PA
659 if (address + embedded_offset + offset >= arg_addr
660 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
661 {
662 ++result_count;
663 if (!*result)
664 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 665 address + embedded_offset + offset);
4e8f195d
TT
666 }
667 }
668 else
669 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
670 valaddr,
671 embedded_offset + offset,
672 address, val,
4e8f195d
TT
673 TYPE_BASECLASS (search_type, i),
674 arg_addr,
675 arg_type,
676 result);
677 }
678
679 return result_count;
680}
681
682/* A helper for value_dynamic_cast. This implements the second of two
683 runtime checks: we look for a unique public sibling class of the
684 argument's declared class. */
685
686static int
687dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
688 const gdb_byte *valaddr,
689 int embedded_offset,
4e8f195d 690 CORE_ADDR address,
8af8e3bc 691 struct value *val,
4e8f195d
TT
692 struct type *search_type,
693 struct value **result)
694{
695 int i, result_count = 0;
696
697 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
698 {
699 int offset;
700
701 if (! BASETYPE_VIA_PUBLIC (search_type, i))
702 continue;
703
8af8e3bc
PA
704 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
705 address, val);
4e8f195d
TT
706 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
707 {
708 ++result_count;
709 if (*result == NULL)
710 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 711 address + embedded_offset + offset);
4e8f195d
TT
712 }
713 else
714 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
715 valaddr,
716 embedded_offset + offset,
717 address, val,
4e8f195d
TT
718 TYPE_BASECLASS (search_type, i),
719 result);
720 }
721
722 return result_count;
723}
724
725/* The C++ dynamic_cast operator. */
726
727struct value *
728value_dynamic_cast (struct type *type, struct value *arg)
729{
8f78b329 730 int full, top, using_enc;
4e8f195d
TT
731 struct type *resolved_type = check_typedef (type);
732 struct type *arg_type = check_typedef (value_type (arg));
733 struct type *class_type, *rtti_type;
734 struct value *result, *tem, *original_arg = arg;
735 CORE_ADDR addr;
736 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
737
738 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
739 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
740 error (_("Argument to dynamic_cast must be a pointer or reference type"));
741 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
742 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
743 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
744
745 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
746 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
747 {
748 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
749 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
750 && value_as_long (arg) == 0))
751 error (_("Argument to dynamic_cast does not have pointer type"));
752 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
753 {
754 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
755 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
756 error (_("Argument to dynamic_cast does "
757 "not have pointer to class type"));
4e8f195d
TT
758 }
759
760 /* Handle NULL pointers. */
761 if (value_as_long (arg) == 0)
762 return value_zero (type, not_lval);
763
764 arg = value_ind (arg);
765 }
766 else
767 {
768 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
769 error (_("Argument to dynamic_cast does not have class type"));
770 }
771
772 /* If the classes are the same, just return the argument. */
773 if (class_types_same_p (class_type, arg_type))
774 return value_cast (type, arg);
775
776 /* If the target type is a unique base class of the argument's
777 declared type, just cast it. */
778 if (is_ancestor (class_type, arg_type))
779 {
780 if (is_unique_ancestor (class_type, arg))
781 return value_cast (type, original_arg);
782 error (_("Ambiguous dynamic_cast"));
783 }
784
785 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
786 if (! rtti_type)
787 error (_("Couldn't determine value's most derived type for dynamic_cast"));
788
789 /* Compute the most derived object's address. */
790 addr = value_address (arg);
791 if (full)
792 {
793 /* Done. */
794 }
795 else if (using_enc)
796 addr += top;
797 else
798 addr += top + value_embedded_offset (arg);
799
800 /* dynamic_cast<void *> means to return a pointer to the
801 most-derived object. */
802 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
803 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
804 return value_at_lazy (type, addr);
805
806 tem = value_at (type, addr);
9f1f738a 807 type = value_type (tem);
4e8f195d
TT
808
809 /* The first dynamic check specified in 5.2.7. */
810 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
811 {
812 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
813 return tem;
814 result = NULL;
815 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
816 value_contents_for_printing (tem),
817 value_embedded_offset (tem),
818 value_address (tem), tem,
4e8f195d
TT
819 rtti_type, addr,
820 arg_type,
821 &result) == 1)
822 return value_cast (type,
823 is_ref ? value_ref (result) : value_addr (result));
824 }
825
826 /* The second dynamic check specified in 5.2.7. */
827 result = NULL;
828 if (is_public_ancestor (arg_type, rtti_type)
829 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
830 value_contents_for_printing (tem),
831 value_embedded_offset (tem),
832 value_address (tem), tem,
4e8f195d
TT
833 rtti_type, &result) == 1)
834 return value_cast (type,
835 is_ref ? value_ref (result) : value_addr (result));
836
837 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
838 return value_zero (type, not_lval);
839
840 error (_("dynamic_cast failed"));
841}
842
c906108c
SS
843/* Create a value of type TYPE that is zero, and return it. */
844
f23631e4 845struct value *
fba45db2 846value_zero (struct type *type, enum lval_type lv)
c906108c 847{
f23631e4 848 struct value *val = allocate_value (type);
c906108c 849
bb7da2bf 850 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
851 return val;
852}
853
18a46dbe 854/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
855
856struct value *
18a46dbe 857value_one (struct type *type)
301f0ecf
DE
858{
859 struct type *type1 = check_typedef (type);
4e608b4f 860 struct value *val;
301f0ecf
DE
861
862 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
863 {
e17a4113 864 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 865 gdb_byte v[16];
a109c7c1 866
e17a4113 867 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
868 val = value_from_decfloat (type, v);
869 }
870 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
871 {
872 val = value_from_double (type, (DOUBLEST) 1);
873 }
874 else if (is_integral_type (type1))
875 {
876 val = value_from_longest (type, (LONGEST) 1);
877 }
120bd360
KW
878 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
879 {
880 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
881 int i;
882 LONGEST low_bound, high_bound;
120bd360
KW
883 struct value *tmp;
884
cfa6f054
KW
885 if (!get_array_bounds (type1, &low_bound, &high_bound))
886 error (_("Could not determine the vector bounds"));
887
120bd360 888 val = allocate_value (type);
cfa6f054 889 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 890 {
18a46dbe 891 tmp = value_one (eltype);
120bd360
KW
892 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
893 value_contents_all (tmp), TYPE_LENGTH (eltype));
894 }
895 }
301f0ecf
DE
896 else
897 {
898 error (_("Not a numeric type."));
899 }
900
18a46dbe
JK
901 /* value_one result is never used for assignments to. */
902 gdb_assert (VALUE_LVAL (val) == not_lval);
903
301f0ecf
DE
904 return val;
905}
906
80180f79
SA
907/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
908 The type of the created value may differ from the passed type TYPE.
909 Make sure to retrieve the returned values's new type after this call
910 e.g. in case the type is a variable length array. */
4e5d721f
DE
911
912static struct value *
913get_value_at (struct type *type, CORE_ADDR addr, int lazy)
914{
915 struct value *val;
916
917 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
918 error (_("Attempt to dereference a generic pointer."));
919
a3d34bf4 920 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 921
a3d34bf4
PA
922 if (!lazy)
923 value_fetch_lazy (val);
4e5d721f
DE
924
925 return val;
926}
927
070ad9f0 928/* Return a value with type TYPE located at ADDR.
c906108c
SS
929
930 Call value_at only if the data needs to be fetched immediately;
931 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
932 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 933 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 934 is tested in the value_contents macro, which is used if and when
80180f79
SA
935 the contents are actually required. The type of the created value
936 may differ from the passed type TYPE. Make sure to retrieve the
937 returned values's new type after this call e.g. in case the type
938 is a variable length array.
c906108c
SS
939
940 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 941 adjustments before or after calling it. */
c906108c 942
f23631e4 943struct value *
00a4c844 944value_at (struct type *type, CORE_ADDR addr)
c906108c 945{
4e5d721f 946 return get_value_at (type, addr, 0);
c906108c
SS
947}
948
80180f79
SA
949/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
950 The type of the created value may differ from the passed type TYPE.
951 Make sure to retrieve the returned values's new type after this call
952 e.g. in case the type is a variable length array. */
c906108c 953
f23631e4 954struct value *
00a4c844 955value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 956{
4e5d721f 957 return get_value_at (type, addr, 1);
c906108c
SS
958}
959
e6ca34fc
PA
960void
961read_value_memory (struct value *val, int embedded_offset,
962 int stack, CORE_ADDR memaddr,
963 gdb_byte *buffer, size_t length)
964{
5a2eb0ef
YQ
965 ULONGEST xfered = 0;
966
967 while (xfered < length)
968 {
969 enum target_xfer_status status;
970 ULONGEST xfered_len;
971
972 status = target_xfer_partial (current_target.beneath,
973 TARGET_OBJECT_MEMORY, NULL,
974 buffer + xfered, NULL,
975 memaddr + xfered, length - xfered,
976 &xfered_len);
977
978 if (status == TARGET_XFER_OK)
979 /* nothing */;
bc113b4e 980 else if (status == TARGET_XFER_UNAVAILABLE)
5a2eb0ef
YQ
981 mark_value_bytes_unavailable (val, embedded_offset + xfered,
982 xfered_len);
983 else if (status == TARGET_XFER_EOF)
984 memory_error (TARGET_XFER_E_IO, memaddr + xfered);
e6ca34fc 985 else
5a2eb0ef 986 memory_error (status, memaddr + xfered);
e6ca34fc 987
5a2eb0ef
YQ
988 xfered += xfered_len;
989 QUIT;
e6ca34fc
PA
990 }
991}
c906108c
SS
992
993/* Store the contents of FROMVAL into the location of TOVAL.
994 Return a new value with the location of TOVAL and contents of FROMVAL. */
995
f23631e4
AC
996struct value *
997value_assign (struct value *toval, struct value *fromval)
c906108c 998{
52f0bd74 999 struct type *type;
f23631e4 1000 struct value *val;
cb741690 1001 struct frame_id old_frame;
c906108c 1002
88e3b34b 1003 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1004 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1005
994b9211 1006 toval = coerce_ref (toval);
c906108c 1007
df407dfe 1008 type = value_type (toval);
c906108c 1009 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1010 fromval = value_cast (type, fromval);
c906108c 1011 else
63092375
DJ
1012 {
1013 /* Coerce arrays and functions to pointers, except for arrays
1014 which only live in GDB's storage. */
1015 if (!value_must_coerce_to_target (fromval))
1016 fromval = coerce_array (fromval);
1017 }
1018
c906108c
SS
1019 CHECK_TYPEDEF (type);
1020
ac3eeb49
MS
1021 /* Since modifying a register can trash the frame chain, and
1022 modifying memory can trash the frame cache, we save the old frame
1023 and then restore the new frame afterwards. */
206415a3 1024 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1025
c906108c
SS
1026 switch (VALUE_LVAL (toval))
1027 {
1028 case lval_internalvar:
1029 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1030 return value_of_internalvar (get_type_arch (type),
1031 VALUE_INTERNALVAR (toval));
c906108c
SS
1032
1033 case lval_internalvar_component:
d9e98382
SDJ
1034 {
1035 int offset = value_offset (toval);
1036
1037 /* Are we dealing with a bitfield?
1038
1039 It is important to mention that `value_parent (toval)' is
1040 non-NULL iff `value_bitsize (toval)' is non-zero. */
1041 if (value_bitsize (toval))
1042 {
1043 /* VALUE_INTERNALVAR below refers to the parent value, while
1044 the offset is relative to this parent value. */
1045 gdb_assert (value_parent (value_parent (toval)) == NULL);
1046 offset += value_offset (value_parent (toval));
1047 }
1048
1049 set_internalvar_component (VALUE_INTERNALVAR (toval),
1050 offset,
1051 value_bitpos (toval),
1052 value_bitsize (toval),
1053 fromval);
1054 }
c906108c
SS
1055 break;
1056
1057 case lval_memory:
1058 {
fc1a4b47 1059 const gdb_byte *dest_buffer;
c5aa993b
JM
1060 CORE_ADDR changed_addr;
1061 int changed_len;
10c42a71 1062 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1063
df407dfe 1064 if (value_bitsize (toval))
c5aa993b 1065 {
2d88202a 1066 struct value *parent = value_parent (toval);
2d88202a 1067
a109c7c1 1068 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1069 changed_len = (value_bitpos (toval)
1070 + value_bitsize (toval)
c5aa993b
JM
1071 + HOST_CHAR_BIT - 1)
1072 / HOST_CHAR_BIT;
c906108c 1073
4ea48cc1
DJ
1074 /* If we can read-modify-write exactly the size of the
1075 containing type (e.g. short or int) then do so. This
1076 is safer for volatile bitfields mapped to hardware
1077 registers. */
1078 if (changed_len < TYPE_LENGTH (type)
1079 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1080 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1081 changed_len = TYPE_LENGTH (type);
1082
c906108c 1083 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1084 error (_("Can't handle bitfields which "
1085 "don't fit in a %d bit word."),
baa6f10b 1086 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1087
2d88202a 1088 read_memory (changed_addr, buffer, changed_len);
50810684 1089 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1090 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1091 dest_buffer = buffer;
1092 }
c906108c
SS
1093 else
1094 {
42ae5230 1095 changed_addr = value_address (toval);
c906108c 1096 changed_len = TYPE_LENGTH (type);
0fd88904 1097 dest_buffer = value_contents (fromval);
c906108c
SS
1098 }
1099
972daa01 1100 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1101 }
1102 break;
1103
492254e9 1104 case lval_register:
c906108c 1105 {
c906108c 1106 struct frame_info *frame;
d80b854b 1107 struct gdbarch *gdbarch;
ff2e87ac 1108 int value_reg;
c906108c
SS
1109
1110 /* Figure out which frame this is in currently. */
0c16dd26
AC
1111 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1112 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1113
1114 if (!frame)
8a3fe4f8 1115 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1116
1117 gdbarch = get_frame_arch (frame);
1118 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1119 {
ff2e87ac 1120 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1121 conversion of program values to a special raw
1122 format. */
d80b854b 1123 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1124 VALUE_REGNUM (toval), type,
1125 value_contents (fromval));
492254e9 1126 }
c906108c 1127 else
492254e9 1128 {
df407dfe 1129 if (value_bitsize (toval))
00fa51f6 1130 {
2d88202a
UW
1131 struct value *parent = value_parent (toval);
1132 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1133 int changed_len;
1134 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1135 int optim, unavail;
00fa51f6
UW
1136
1137 changed_len = (value_bitpos (toval)
1138 + value_bitsize (toval)
1139 + HOST_CHAR_BIT - 1)
1140 / HOST_CHAR_BIT;
1141
1142 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1143 error (_("Can't handle bitfields which "
1144 "don't fit in a %d bit word."),
00fa51f6
UW
1145 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1146
8dccd430
PA
1147 if (!get_frame_register_bytes (frame, value_reg, offset,
1148 changed_len, buffer,
1149 &optim, &unavail))
1150 {
1151 if (optim)
710409a2
PA
1152 throw_error (OPTIMIZED_OUT_ERROR,
1153 _("value has been optimized out"));
8dccd430
PA
1154 if (unavail)
1155 throw_error (NOT_AVAILABLE_ERROR,
1156 _("value is not available"));
1157 }
00fa51f6 1158
50810684
UW
1159 modify_field (type, buffer, value_as_long (fromval),
1160 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1161
2d88202a 1162 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1163 changed_len, buffer);
1164 }
c906108c 1165 else
00fa51f6
UW
1166 {
1167 put_frame_register_bytes (frame, value_reg,
1168 value_offset (toval),
1169 TYPE_LENGTH (type),
1170 value_contents (fromval));
1171 }
ff2e87ac 1172 }
00fa51f6 1173
9a4105ab
AC
1174 if (deprecated_register_changed_hook)
1175 deprecated_register_changed_hook (-1);
ff2e87ac 1176 break;
c906108c 1177 }
5f5233d4
PA
1178
1179 case lval_computed:
1180 {
c8f2448a 1181 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1182
ac71a68c
JK
1183 if (funcs->write != NULL)
1184 {
1185 funcs->write (toval, fromval);
1186 break;
1187 }
5f5233d4 1188 }
ac71a68c 1189 /* Fall through. */
5f5233d4 1190
c906108c 1191 default:
8a3fe4f8 1192 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1193 }
1194
cb741690
DJ
1195 /* Assigning to the stack pointer, frame pointer, and other
1196 (architecture and calling convention specific) registers may
d649a38e 1197 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1198 also can. We just do this on all assignments to registers or
1199 memory, for simplicity's sake; I doubt the slowdown matters. */
1200 switch (VALUE_LVAL (toval))
1201 {
1202 case lval_memory:
1203 case lval_register:
0e03807e 1204 case lval_computed:
cb741690 1205
d649a38e 1206 observer_notify_target_changed (&current_target);
cb741690 1207
ac3eeb49
MS
1208 /* Having destroyed the frame cache, restore the selected
1209 frame. */
cb741690
DJ
1210
1211 /* FIXME: cagney/2002-11-02: There has to be a better way of
1212 doing this. Instead of constantly saving/restoring the
1213 frame. Why not create a get_selected_frame() function that,
1214 having saved the selected frame's ID can automatically
1215 re-find the previously selected frame automatically. */
1216
1217 {
1218 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1219
cb741690
DJ
1220 if (fi != NULL)
1221 select_frame (fi);
1222 }
1223
1224 break;
1225 default:
1226 break;
1227 }
1228
ac3eeb49
MS
1229 /* If the field does not entirely fill a LONGEST, then zero the sign
1230 bits. If the field is signed, and is negative, then sign
1231 extend. */
df407dfe
AC
1232 if ((value_bitsize (toval) > 0)
1233 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1234 {
1235 LONGEST fieldval = value_as_long (fromval);
df407dfe 1236 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1237
1238 fieldval &= valmask;
ac3eeb49
MS
1239 if (!TYPE_UNSIGNED (type)
1240 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1241 fieldval |= ~valmask;
1242
1243 fromval = value_from_longest (type, fieldval);
1244 }
1245
4aac0db7
UW
1246 /* The return value is a copy of TOVAL so it shares its location
1247 information, but its contents are updated from FROMVAL. This
1248 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1249 val = value_copy (toval);
4aac0db7 1250 set_value_lazy (val, 0);
0fd88904 1251 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1252 TYPE_LENGTH (type));
4aac0db7
UW
1253
1254 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1255 in the case of pointer types. For object types, the enclosing type
1256 and embedded offset must *not* be copied: the target object refered
1257 to by TOVAL retains its original dynamic type after assignment. */
1258 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1259 {
1260 set_value_enclosing_type (val, value_enclosing_type (fromval));
1261 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1262 }
c5aa993b 1263
c906108c
SS
1264 return val;
1265}
1266
1267/* Extend a value VAL to COUNT repetitions of its type. */
1268
f23631e4
AC
1269struct value *
1270value_repeat (struct value *arg1, int count)
c906108c 1271{
f23631e4 1272 struct value *val;
c906108c
SS
1273
1274 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1275 error (_("Only values in memory can be extended with '@'."));
c906108c 1276 if (count < 1)
8a3fe4f8 1277 error (_("Invalid number %d of repetitions."), count);
c906108c 1278
4754a64e 1279 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1280
c906108c 1281 VALUE_LVAL (val) = lval_memory;
42ae5230 1282 set_value_address (val, value_address (arg1));
c906108c 1283
24e6bcee
PA
1284 read_value_memory (val, 0, value_stack (val), value_address (val),
1285 value_contents_all_raw (val),
1286 TYPE_LENGTH (value_enclosing_type (val)));
1287
c906108c
SS
1288 return val;
1289}
1290
f23631e4 1291struct value *
9df2fbc4 1292value_of_variable (struct symbol *var, const struct block *b)
c906108c 1293{
61212c0f 1294 struct frame_info *frame;
c906108c 1295
61212c0f
UW
1296 if (!symbol_read_needs_frame (var))
1297 frame = NULL;
1298 else if (!b)
1299 frame = get_selected_frame (_("No frame selected."));
1300 else
c906108c
SS
1301 {
1302 frame = block_innermost_frame (b);
1303 if (!frame)
c5aa993b 1304 {
edb3359d 1305 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1306 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1307 error (_("No frame is currently executing in block %s."),
de5ad195 1308 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1309 else
8a3fe4f8 1310 error (_("No frame is currently executing in specified block"));
c5aa993b 1311 }
c906108c
SS
1312 }
1313
8afd712c 1314 return read_var_value (var, frame);
c906108c
SS
1315}
1316
61212c0f 1317struct value *
270140bd 1318address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1319{
1320 struct type *type = SYMBOL_TYPE (var);
1321 struct value *val;
1322
1323 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1324 Lazy evaluation pays off here. */
61212c0f
UW
1325
1326 val = value_of_variable (var, b);
9f1f738a 1327 type = value_type (val);
61212c0f
UW
1328
1329 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1330 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1331 {
42ae5230 1332 CORE_ADDR addr = value_address (val);
a109c7c1 1333
61212c0f
UW
1334 return value_from_pointer (lookup_pointer_type (type), addr);
1335 }
1336
1337 /* Not a memory address; check what the problem was. */
1338 switch (VALUE_LVAL (val))
1339 {
1340 case lval_register:
1341 {
1342 struct frame_info *frame;
1343 const char *regname;
1344
1345 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1346 gdb_assert (frame);
1347
1348 regname = gdbarch_register_name (get_frame_arch (frame),
1349 VALUE_REGNUM (val));
1350 gdb_assert (regname && *regname);
1351
1352 error (_("Address requested for identifier "
1353 "\"%s\" which is in register $%s"),
1354 SYMBOL_PRINT_NAME (var), regname);
1355 break;
1356 }
1357
1358 default:
1359 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1360 SYMBOL_PRINT_NAME (var));
1361 break;
1362 }
1363
1364 return val;
1365}
1366
63092375
DJ
1367/* Return one if VAL does not live in target memory, but should in order
1368 to operate on it. Otherwise return zero. */
1369
1370int
1371value_must_coerce_to_target (struct value *val)
1372{
1373 struct type *valtype;
1374
1375 /* The only lval kinds which do not live in target memory. */
1376 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1377 && VALUE_LVAL (val) != lval_internalvar
1378 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1379 return 0;
1380
1381 valtype = check_typedef (value_type (val));
1382
1383 switch (TYPE_CODE (valtype))
1384 {
1385 case TYPE_CODE_ARRAY:
3cbaedff 1386 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1387 case TYPE_CODE_STRING:
1388 return 1;
1389 default:
1390 return 0;
1391 }
1392}
1393
3e43a32a
MS
1394/* Make sure that VAL lives in target memory if it's supposed to. For
1395 instance, strings are constructed as character arrays in GDB's
1396 storage, and this function copies them to the target. */
63092375
DJ
1397
1398struct value *
1399value_coerce_to_target (struct value *val)
1400{
1401 LONGEST length;
1402 CORE_ADDR addr;
1403
1404 if (!value_must_coerce_to_target (val))
1405 return val;
1406
1407 length = TYPE_LENGTH (check_typedef (value_type (val)));
1408 addr = allocate_space_in_inferior (length);
1409 write_memory (addr, value_contents (val), length);
1410 return value_at_lazy (value_type (val), addr);
1411}
1412
ac3eeb49
MS
1413/* Given a value which is an array, return a value which is a pointer
1414 to its first element, regardless of whether or not the array has a
1415 nonzero lower bound.
c906108c 1416
ac3eeb49
MS
1417 FIXME: A previous comment here indicated that this routine should
1418 be substracting the array's lower bound. It's not clear to me that
1419 this is correct. Given an array subscripting operation, it would
1420 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1421
1422 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1423
ac3eeb49
MS
1424 However I believe a more appropriate and logical place to account
1425 for the lower bound is to do so in value_subscript, essentially
1426 computing:
c906108c
SS
1427
1428 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1429
ac3eeb49
MS
1430 As further evidence consider what would happen with operations
1431 other than array subscripting, where the caller would get back a
1432 value that had an address somewhere before the actual first element
1433 of the array, and the information about the lower bound would be
581e13c1 1434 lost because of the coercion to pointer type. */
c906108c 1435
f23631e4
AC
1436struct value *
1437value_coerce_array (struct value *arg1)
c906108c 1438{
df407dfe 1439 struct type *type = check_typedef (value_type (arg1));
c906108c 1440
63092375
DJ
1441 /* If the user tries to do something requiring a pointer with an
1442 array that has not yet been pushed to the target, then this would
1443 be a good time to do so. */
1444 arg1 = value_coerce_to_target (arg1);
1445
c906108c 1446 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1447 error (_("Attempt to take address of value not located in memory."));
c906108c 1448
4478b372 1449 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1450 value_address (arg1));
c906108c
SS
1451}
1452
1453/* Given a value which is a function, return a value which is a pointer
1454 to it. */
1455
f23631e4
AC
1456struct value *
1457value_coerce_function (struct value *arg1)
c906108c 1458{
f23631e4 1459 struct value *retval;
c906108c
SS
1460
1461 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1462 error (_("Attempt to take address of value not located in memory."));
c906108c 1463
df407dfe 1464 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1465 value_address (arg1));
c906108c 1466 return retval;
c5aa993b 1467}
c906108c 1468
ac3eeb49
MS
1469/* Return a pointer value for the object for which ARG1 is the
1470 contents. */
c906108c 1471
f23631e4
AC
1472struct value *
1473value_addr (struct value *arg1)
c906108c 1474{
f23631e4 1475 struct value *arg2;
df407dfe 1476 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1477
c906108c
SS
1478 if (TYPE_CODE (type) == TYPE_CODE_REF)
1479 {
ac3eeb49
MS
1480 /* Copy the value, but change the type from (T&) to (T*). We
1481 keep the same location information, which is efficient, and
1482 allows &(&X) to get the location containing the reference. */
c906108c 1483 arg2 = value_copy (arg1);
ac3eeb49
MS
1484 deprecated_set_value_type (arg2,
1485 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1486 return arg2;
1487 }
1488 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1489 return value_coerce_function (arg1);
1490
63092375
DJ
1491 /* If this is an array that has not yet been pushed to the target,
1492 then this would be a good time to force it to memory. */
1493 arg1 = value_coerce_to_target (arg1);
1494
c906108c 1495 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1496 error (_("Attempt to take address of value not located in memory."));
c906108c 1497
581e13c1 1498 /* Get target memory address. */
df407dfe 1499 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1500 (value_address (arg1)
13c3b5f5 1501 + value_embedded_offset (arg1)));
c906108c
SS
1502
1503 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1504 full derived object's type ... */
4dfea560
DE
1505 set_value_enclosing_type (arg2,
1506 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1507 /* ... and also the relative position of the subobject in the full
1508 object. */
b44d461b 1509 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1510 return arg2;
1511}
1512
ac3eeb49
MS
1513/* Return a reference value for the object for which ARG1 is the
1514 contents. */
fb933624
DJ
1515
1516struct value *
1517value_ref (struct value *arg1)
1518{
1519 struct value *arg2;
fb933624 1520 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1521
fb933624
DJ
1522 if (TYPE_CODE (type) == TYPE_CODE_REF)
1523 return arg1;
1524
1525 arg2 = value_addr (arg1);
1526 deprecated_set_value_type (arg2, lookup_reference_type (type));
1527 return arg2;
1528}
1529
ac3eeb49
MS
1530/* Given a value of a pointer type, apply the C unary * operator to
1531 it. */
c906108c 1532
f23631e4
AC
1533struct value *
1534value_ind (struct value *arg1)
c906108c
SS
1535{
1536 struct type *base_type;
f23631e4 1537 struct value *arg2;
c906108c 1538
994b9211 1539 arg1 = coerce_array (arg1);
c906108c 1540
df407dfe 1541 base_type = check_typedef (value_type (arg1));
c906108c 1542
8cf6f0b1
TT
1543 if (VALUE_LVAL (arg1) == lval_computed)
1544 {
c8f2448a 1545 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1546
1547 if (funcs->indirect)
1548 {
1549 struct value *result = funcs->indirect (arg1);
1550
1551 if (result)
1552 return result;
1553 }
1554 }
1555
22fe0fbb 1556 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1557 {
1558 struct type *enc_type;
a109c7c1 1559
ac3eeb49
MS
1560 /* We may be pointing to something embedded in a larger object.
1561 Get the real type of the enclosing object. */
4754a64e 1562 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1563 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1564
1565 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1566 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1567 /* For functions, go through find_function_addr, which knows
1568 how to handle function descriptors. */
ac3eeb49
MS
1569 arg2 = value_at_lazy (enc_type,
1570 find_function_addr (arg1, NULL));
0d5de010 1571 else
581e13c1 1572 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1573 arg2 = value_at_lazy (enc_type,
1574 (value_as_address (arg1)
1575 - value_pointed_to_offset (arg1)));
0d5de010 1576
9f1f738a 1577 enc_type = value_type (arg2);
dfcee124 1578 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1579 }
1580
8a3fe4f8 1581 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1582 return 0; /* For lint -- never reached. */
c906108c
SS
1583}
1584\f
39d37385
PA
1585/* Create a value for an array by allocating space in GDB, copying the
1586 data into that space, and then setting up an array value.
c906108c 1587
ac3eeb49
MS
1588 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1589 is populated from the values passed in ELEMVEC.
c906108c
SS
1590
1591 The element type of the array is inherited from the type of the
1592 first element, and all elements must have the same size (though we
ac3eeb49 1593 don't currently enforce any restriction on their types). */
c906108c 1594
f23631e4
AC
1595struct value *
1596value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1597{
1598 int nelem;
1599 int idx;
1600 unsigned int typelength;
f23631e4 1601 struct value *val;
c906108c 1602 struct type *arraytype;
c906108c 1603
ac3eeb49
MS
1604 /* Validate that the bounds are reasonable and that each of the
1605 elements have the same size. */
c906108c
SS
1606
1607 nelem = highbound - lowbound + 1;
1608 if (nelem <= 0)
1609 {
8a3fe4f8 1610 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1611 }
4754a64e 1612 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1613 for (idx = 1; idx < nelem; idx++)
1614 {
4754a64e 1615 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1616 {
8a3fe4f8 1617 error (_("array elements must all be the same size"));
c906108c
SS
1618 }
1619 }
1620
e3506a9f
UW
1621 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1622 lowbound, highbound);
c906108c
SS
1623
1624 if (!current_language->c_style_arrays)
1625 {
1626 val = allocate_value (arraytype);
1627 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1628 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1629 typelength);
c906108c
SS
1630 return val;
1631 }
1632
63092375
DJ
1633 /* Allocate space to store the array, and then initialize it by
1634 copying in each element. */
c906108c 1635
63092375 1636 val = allocate_value (arraytype);
c906108c 1637 for (idx = 0; idx < nelem; idx++)
39d37385 1638 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1639 return val;
c906108c
SS
1640}
1641
6c7a06a3 1642struct value *
63375b74 1643value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1644{
1645 struct value *val;
1646 int lowbound = current_language->string_lower_bound;
63375b74 1647 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1648 struct type *stringtype
e3506a9f 1649 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1650
1651 val = allocate_value (stringtype);
1652 memcpy (value_contents_raw (val), ptr, len);
1653 return val;
1654}
1655
ac3eeb49
MS
1656/* Create a value for a string constant by allocating space in the
1657 inferior, copying the data into that space, and returning the
1658 address with type TYPE_CODE_STRING. PTR points to the string
1659 constant data; LEN is number of characters.
1660
1661 Note that string types are like array of char types with a lower
1662 bound of zero and an upper bound of LEN - 1. Also note that the
1663 string may contain embedded null bytes. */
c906108c 1664
f23631e4 1665struct value *
63375b74 1666value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1667{
f23631e4 1668 struct value *val;
c906108c 1669 int lowbound = current_language->string_lower_bound;
63375b74 1670 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1671 struct type *stringtype
e3506a9f 1672 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1673
3b7538c0
UW
1674 val = allocate_value (stringtype);
1675 memcpy (value_contents_raw (val), ptr, len);
1676 return val;
c906108c
SS
1677}
1678
c906108c 1679\f
ac3eeb49
MS
1680/* See if we can pass arguments in T2 to a function which takes
1681 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1682 a NULL-terminated vector. If some arguments need coercion of some
1683 sort, then the coerced values are written into T2. Return value is
1684 0 if the arguments could be matched, or the position at which they
1685 differ if not.
c906108c 1686
ac3eeb49
MS
1687 STATICP is nonzero if the T1 argument list came from a static
1688 member function. T2 will still include the ``this'' pointer, but
1689 it will be skipped.
c906108c
SS
1690
1691 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1692 which is the type of the instance variable. This is because we
1693 want to handle calls with objects from derived classes. This is
1694 not entirely correct: we should actually check to make sure that a
c906108c
SS
1695 requested operation is type secure, shouldn't we? FIXME. */
1696
1697static int
ad2f7632
DJ
1698typecmp (int staticp, int varargs, int nargs,
1699 struct field t1[], struct value *t2[])
c906108c
SS
1700{
1701 int i;
1702
1703 if (t2 == 0)
ac3eeb49
MS
1704 internal_error (__FILE__, __LINE__,
1705 _("typecmp: no argument list"));
ad2f7632 1706
ac3eeb49
MS
1707 /* Skip ``this'' argument if applicable. T2 will always include
1708 THIS. */
4a1970e4 1709 if (staticp)
ad2f7632
DJ
1710 t2 ++;
1711
1712 for (i = 0;
1713 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1714 i++)
c906108c 1715 {
c5aa993b 1716 struct type *tt1, *tt2;
ad2f7632 1717
c5aa993b
JM
1718 if (!t2[i])
1719 return i + 1;
ad2f7632
DJ
1720
1721 tt1 = check_typedef (t1[i].type);
df407dfe 1722 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1723
c906108c 1724 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1725 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1726 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1727 == TYPE_CODE (tt2)))
c906108c
SS
1728 {
1729 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1730 t2[i] = value_coerce_array (t2[i]);
1731 else
fb933624 1732 t2[i] = value_ref (t2[i]);
c906108c
SS
1733 continue;
1734 }
1735
802db21b
DB
1736 /* djb - 20000715 - Until the new type structure is in the
1737 place, and we can attempt things like implicit conversions,
1738 we need to do this so you can take something like a map<const
1739 char *>, and properly access map["hello"], because the
1740 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1741 and the argument will be a pointer to a char. */
1742 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1743 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1744 {
1745 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1746 }
ac3eeb49
MS
1747 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1748 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1749 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1750 {
ac3eeb49 1751 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1752 }
c5aa993b
JM
1753 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1754 continue;
ac3eeb49
MS
1755 /* Array to pointer is a `trivial conversion' according to the
1756 ARM. */
c906108c 1757
ac3eeb49
MS
1758 /* We should be doing much hairier argument matching (see
1759 section 13.2 of the ARM), but as a quick kludge, just check
1760 for the same type code. */
df407dfe 1761 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1762 return i + 1;
c906108c 1763 }
ad2f7632 1764 if (varargs || t2[i] == NULL)
c5aa993b 1765 return 0;
ad2f7632 1766 return i + 1;
c906108c
SS
1767}
1768
b1af9e97
TT
1769/* Helper class for do_search_struct_field that updates *RESULT_PTR
1770 and *LAST_BOFFSET, and possibly throws an exception if the field
1771 search has yielded ambiguous results. */
c906108c 1772
b1af9e97
TT
1773static void
1774update_search_result (struct value **result_ptr, struct value *v,
1775 int *last_boffset, int boffset,
1776 const char *name, struct type *type)
1777{
1778 if (v != NULL)
1779 {
1780 if (*result_ptr != NULL
1781 /* The result is not ambiguous if all the classes that are
1782 found occupy the same space. */
1783 && *last_boffset != boffset)
1784 error (_("base class '%s' is ambiguous in type '%s'"),
1785 name, TYPE_SAFE_NAME (type));
1786 *result_ptr = v;
1787 *last_boffset = boffset;
1788 }
1789}
c906108c 1790
b1af9e97
TT
1791/* A helper for search_struct_field. This does all the work; most
1792 arguments are as passed to search_struct_field. The result is
1793 stored in *RESULT_PTR, which must be initialized to NULL.
1794 OUTERMOST_TYPE is the type of the initial type passed to
1795 search_struct_field; this is used for error reporting when the
1796 lookup is ambiguous. */
1797
1798static void
1799do_search_struct_field (const char *name, struct value *arg1, int offset,
1800 struct type *type, int looking_for_baseclass,
1801 struct value **result_ptr,
1802 int *last_boffset,
1803 struct type *outermost_type)
c906108c
SS
1804{
1805 int i;
edf3d5f3 1806 int nbases;
c906108c
SS
1807
1808 CHECK_TYPEDEF (type);
edf3d5f3 1809 nbases = TYPE_N_BASECLASSES (type);
c906108c 1810
c5aa993b 1811 if (!looking_for_baseclass)
c906108c
SS
1812 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1813 {
0d5cff50 1814 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1815
db577aea 1816 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1817 {
f23631e4 1818 struct value *v;
a109c7c1 1819
d6a843b5 1820 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1821 v = value_static_field (type, i);
c906108c 1822 else
b1af9e97
TT
1823 v = value_primitive_field (arg1, offset, i, type);
1824 *result_ptr = v;
1825 return;
c906108c
SS
1826 }
1827
1828 if (t_field_name
1829 && (t_field_name[0] == '\0'
1830 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 1831 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
1832 {
1833 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1834
c906108c
SS
1835 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1836 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1837 {
ac3eeb49
MS
1838 /* Look for a match through the fields of an anonymous
1839 union, or anonymous struct. C++ provides anonymous
1840 unions.
c906108c 1841
1b831c93
AC
1842 In the GNU Chill (now deleted from GDB)
1843 implementation of variant record types, each
1844 <alternative field> has an (anonymous) union type,
1845 each member of the union represents a <variant
1846 alternative>. Each <variant alternative> is
1847 represented as a struct, with a member for each
1848 <variant field>. */
c5aa993b 1849
b1af9e97 1850 struct value *v = NULL;
c906108c
SS
1851 int new_offset = offset;
1852
db034ac5
AC
1853 /* This is pretty gross. In G++, the offset in an
1854 anonymous union is relative to the beginning of the
1b831c93
AC
1855 enclosing struct. In the GNU Chill (now deleted
1856 from GDB) implementation of variant records, the
1857 bitpos is zero in an anonymous union field, so we
ac3eeb49 1858 have to add the offset of the union here. */
c906108c
SS
1859 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1860 || (TYPE_NFIELDS (field_type) > 0
1861 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1862 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1863
b1af9e97
TT
1864 do_search_struct_field (name, arg1, new_offset,
1865 field_type,
1866 looking_for_baseclass, &v,
1867 last_boffset,
1868 outermost_type);
c906108c 1869 if (v)
b1af9e97
TT
1870 {
1871 *result_ptr = v;
1872 return;
1873 }
c906108c
SS
1874 }
1875 }
1876 }
1877
c5aa993b 1878 for (i = 0; i < nbases; i++)
c906108c 1879 {
b1af9e97 1880 struct value *v = NULL;
c906108c 1881 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1882 /* If we are looking for baseclasses, this is what we get when
1883 we hit them. But it could happen that the base part's member
1884 name is not yet filled in. */
c906108c
SS
1885 int found_baseclass = (looking_for_baseclass
1886 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1887 && (strcmp_iw (name,
1888 TYPE_BASECLASS_NAME (type,
1889 i)) == 0));
b1af9e97 1890 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1891
1892 if (BASETYPE_VIA_VIRTUAL (type, i))
1893 {
3e3d7139 1894 struct value *v2;
c906108c
SS
1895
1896 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1897 value_contents_for_printing (arg1),
1898 value_embedded_offset (arg1) + offset,
1899 value_address (arg1),
1900 arg1);
c906108c 1901
ac3eeb49 1902 /* The virtual base class pointer might have been clobbered
581e13c1 1903 by the user program. Make sure that it still points to a
ac3eeb49 1904 valid memory location. */
c906108c 1905
1a334831
TT
1906 boffset += value_embedded_offset (arg1) + offset;
1907 if (boffset < 0
1908 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1909 {
1910 CORE_ADDR base_addr;
c5aa993b 1911
42ae5230 1912 base_addr = value_address (arg1) + boffset;
08039c9e 1913 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1914 if (target_read_memory (base_addr,
1915 value_contents_raw (v2),
acc900c2 1916 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1917 error (_("virtual baseclass botch"));
c906108c
SS
1918 }
1919 else
1920 {
1a334831
TT
1921 v2 = value_copy (arg1);
1922 deprecated_set_value_type (v2, basetype);
1923 set_value_embedded_offset (v2, boffset);
c906108c
SS
1924 }
1925
1926 if (found_baseclass)
b1af9e97
TT
1927 v = v2;
1928 else
1929 {
1930 do_search_struct_field (name, v2, 0,
1931 TYPE_BASECLASS (type, i),
1932 looking_for_baseclass,
1933 result_ptr, last_boffset,
1934 outermost_type);
1935 }
c906108c
SS
1936 }
1937 else if (found_baseclass)
1938 v = value_primitive_field (arg1, offset, i, type);
1939 else
b1af9e97
TT
1940 {
1941 do_search_struct_field (name, arg1,
1942 offset + TYPE_BASECLASS_BITPOS (type,
1943 i) / 8,
1944 basetype, looking_for_baseclass,
1945 result_ptr, last_boffset,
1946 outermost_type);
1947 }
1948
1949 update_search_result (result_ptr, v, last_boffset,
1950 boffset, name, outermost_type);
c906108c 1951 }
b1af9e97
TT
1952}
1953
1954/* Helper function used by value_struct_elt to recurse through
1955 baseclasses. Look for a field NAME in ARG1. Adjust the address of
1956 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1957 TYPE. If found, return value, else return NULL.
1958
1959 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1960 fields, look for a baseclass named NAME. */
1961
1962static struct value *
1963search_struct_field (const char *name, struct value *arg1, int offset,
1964 struct type *type, int looking_for_baseclass)
1965{
1966 struct value *result = NULL;
1967 int boffset = 0;
1968
1969 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
1970 &result, &boffset, type);
1971 return result;
c906108c
SS
1972}
1973
ac3eeb49 1974/* Helper function used by value_struct_elt to recurse through
581e13c1 1975 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1976 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1977 TYPE.
1978
1979 If found, return value, else if name matched and args not return
1980 (value) -1, else return NULL. */
c906108c 1981
f23631e4 1982static struct value *
714f19d5 1983search_struct_method (const char *name, struct value **arg1p,
f23631e4 1984 struct value **args, int offset,
aa1ee363 1985 int *static_memfuncp, struct type *type)
c906108c
SS
1986{
1987 int i;
f23631e4 1988 struct value *v;
c906108c
SS
1989 int name_matched = 0;
1990 char dem_opname[64];
1991
1992 CHECK_TYPEDEF (type);
1993 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1994 {
0d5cff50 1995 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1996
581e13c1 1997 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
1998 if (strncmp (t_field_name, "__", 2) == 0 ||
1999 strncmp (t_field_name, "op", 2) == 0 ||
2000 strncmp (t_field_name, "type", 4) == 0)
c906108c 2001 {
c5aa993b
JM
2002 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2003 t_field_name = dem_opname;
2004 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2005 t_field_name = dem_opname;
c906108c 2006 }
db577aea 2007 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2008 {
2009 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2010 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2011
a109c7c1 2012 name_matched = 1;
de17c821 2013 check_stub_method_group (type, i);
c906108c 2014 if (j > 0 && args == 0)
3e43a32a
MS
2015 error (_("cannot resolve overloaded method "
2016 "`%s': no arguments supplied"), name);
acf5ed49 2017 else if (j == 0 && args == 0)
c906108c 2018 {
acf5ed49
DJ
2019 v = value_fn_field (arg1p, f, j, type, offset);
2020 if (v != NULL)
2021 return v;
c906108c 2022 }
acf5ed49
DJ
2023 else
2024 while (j >= 0)
2025 {
acf5ed49 2026 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2027 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2028 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2029 TYPE_FN_FIELD_ARGS (f, j), args))
2030 {
2031 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2032 return value_virtual_fn_field (arg1p, f, j,
2033 type, offset);
2034 if (TYPE_FN_FIELD_STATIC_P (f, j)
2035 && static_memfuncp)
acf5ed49
DJ
2036 *static_memfuncp = 1;
2037 v = value_fn_field (arg1p, f, j, type, offset);
2038 if (v != NULL)
2039 return v;
2040 }
2041 j--;
2042 }
c906108c
SS
2043 }
2044 }
2045
2046 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2047 {
2048 int base_offset;
8af8e3bc 2049 int this_offset;
c906108c
SS
2050
2051 if (BASETYPE_VIA_VIRTUAL (type, i))
2052 {
086280be 2053 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2054 struct value *base_val;
086280be
UW
2055 const gdb_byte *base_valaddr;
2056
2057 /* The virtual base class pointer might have been
581e13c1 2058 clobbered by the user program. Make sure that it
086280be
UW
2059 still points to a valid memory location. */
2060
2061 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2062 {
6c18f3e0
SP
2063 gdb_byte *tmp;
2064 struct cleanup *back_to;
2065 CORE_ADDR address;
2066
2067 tmp = xmalloc (TYPE_LENGTH (baseclass));
2068 back_to = make_cleanup (xfree, tmp);
2069 address = value_address (*arg1p);
a109c7c1 2070
8af8e3bc 2071 if (target_read_memory (address + offset,
086280be
UW
2072 tmp, TYPE_LENGTH (baseclass)) != 0)
2073 error (_("virtual baseclass botch"));
8af8e3bc
PA
2074
2075 base_val = value_from_contents_and_address (baseclass,
2076 tmp,
2077 address + offset);
2078 base_valaddr = value_contents_for_printing (base_val);
2079 this_offset = 0;
6c18f3e0 2080 do_cleanups (back_to);
c5aa993b
JM
2081 }
2082 else
8af8e3bc
PA
2083 {
2084 base_val = *arg1p;
2085 base_valaddr = value_contents_for_printing (*arg1p);
2086 this_offset = offset;
2087 }
c5aa993b 2088
086280be 2089 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2090 this_offset, value_address (base_val),
2091 base_val);
c5aa993b 2092 }
c906108c
SS
2093 else
2094 {
2095 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2096 }
c906108c
SS
2097 v = search_struct_method (name, arg1p, args, base_offset + offset,
2098 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2099 if (v == (struct value *) - 1)
c906108c
SS
2100 {
2101 name_matched = 1;
2102 }
2103 else if (v)
2104 {
ac3eeb49
MS
2105 /* FIXME-bothner: Why is this commented out? Why is it here? */
2106 /* *arg1p = arg1_tmp; */
c906108c 2107 return v;
c5aa993b 2108 }
c906108c 2109 }
c5aa993b 2110 if (name_matched)
f23631e4 2111 return (struct value *) - 1;
c5aa993b
JM
2112 else
2113 return NULL;
c906108c
SS
2114}
2115
2116/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2117 extract the component named NAME from the ultimate target
2118 structure/union and return it as a value with its appropriate type.
c906108c
SS
2119 ERR is used in the error message if *ARGP's type is wrong.
2120
2121 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2122 an appropriate method. Also, handle derived types.
c906108c
SS
2123
2124 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2125 where the truthvalue of whether the function that was resolved was
2126 a static member function or not is stored.
2127
ac3eeb49
MS
2128 ERR is an error message to be printed in case the field is not
2129 found. */
c906108c 2130
f23631e4
AC
2131struct value *
2132value_struct_elt (struct value **argp, struct value **args,
714f19d5 2133 const char *name, int *static_memfuncp, const char *err)
c906108c 2134{
52f0bd74 2135 struct type *t;
f23631e4 2136 struct value *v;
c906108c 2137
994b9211 2138 *argp = coerce_array (*argp);
c906108c 2139
df407dfe 2140 t = check_typedef (value_type (*argp));
c906108c
SS
2141
2142 /* Follow pointers until we get to a non-pointer. */
2143
2144 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2145 {
2146 *argp = value_ind (*argp);
2147 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2148 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2149 *argp = coerce_array (*argp);
df407dfe 2150 t = check_typedef (value_type (*argp));
c906108c
SS
2151 }
2152
c5aa993b 2153 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2154 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2155 error (_("Attempt to extract a component of a value that is not a %s."),
2156 err);
c906108c
SS
2157
2158 /* Assume it's not, unless we see that it is. */
2159 if (static_memfuncp)
c5aa993b 2160 *static_memfuncp = 0;
c906108c
SS
2161
2162 if (!args)
2163 {
2164 /* if there are no arguments ...do this... */
2165
ac3eeb49
MS
2166 /* Try as a field first, because if we succeed, there is less
2167 work to be done. */
c906108c
SS
2168 v = search_struct_field (name, *argp, 0, t, 0);
2169 if (v)
2170 return v;
2171
2172 /* C++: If it was not found as a data field, then try to
7b83ea04 2173 return it as a pointer to a method. */
ac3eeb49
MS
2174 v = search_struct_method (name, argp, args, 0,
2175 static_memfuncp, t);
c906108c 2176
f23631e4 2177 if (v == (struct value *) - 1)
55b39184 2178 error (_("Cannot take address of method %s."), name);
c906108c
SS
2179 else if (v == 0)
2180 {
2181 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2182 error (_("There is no member or method named %s."), name);
c906108c 2183 else
8a3fe4f8 2184 error (_("There is no member named %s."), name);
c906108c
SS
2185 }
2186 return v;
2187 }
2188
ac3eeb49
MS
2189 v = search_struct_method (name, argp, args, 0,
2190 static_memfuncp, t);
7168a814 2191
f23631e4 2192 if (v == (struct value *) - 1)
c906108c 2193 {
3e43a32a
MS
2194 error (_("One of the arguments you tried to pass to %s could not "
2195 "be converted to what the function wants."), name);
c906108c
SS
2196 }
2197 else if (v == 0)
2198 {
ac3eeb49
MS
2199 /* See if user tried to invoke data as function. If so, hand it
2200 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2201 gdb should give an error. */
c906108c 2202 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2203 /* If we found an ordinary field, then it is not a method call.
2204 So, treat it as if it were a static member function. */
2205 if (v && static_memfuncp)
2206 *static_memfuncp = 1;
c906108c
SS
2207 }
2208
2209 if (!v)
79afc5ef
SW
2210 throw_error (NOT_FOUND_ERROR,
2211 _("Structure has no component named %s."), name);
c906108c
SS
2212 return v;
2213}
2214
b5b08fb4
SC
2215/* Given *ARGP, a value of type structure or union, or a pointer/reference
2216 to a structure or union, extract and return its component (field) of
2217 type FTYPE at the specified BITPOS.
2218 Throw an exception on error. */
2219
2220struct value *
2221value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2222 const char *err)
2223{
2224 struct type *t;
2225 struct value *v;
2226 int i;
2227 int nbases;
2228
2229 *argp = coerce_array (*argp);
2230
2231 t = check_typedef (value_type (*argp));
2232
2233 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2234 {
2235 *argp = value_ind (*argp);
2236 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2237 *argp = coerce_array (*argp);
2238 t = check_typedef (value_type (*argp));
2239 }
2240
2241 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2242 && TYPE_CODE (t) != TYPE_CODE_UNION)
2243 error (_("Attempt to extract a component of a value that is not a %s."),
2244 err);
2245
2246 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2247 {
2248 if (!field_is_static (&TYPE_FIELD (t, i))
2249 && bitpos == TYPE_FIELD_BITPOS (t, i)
2250 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2251 return value_primitive_field (*argp, 0, i, t);
2252 }
2253
2254 error (_("No field with matching bitpos and type."));
2255
2256 /* Never hit. */
2257 return NULL;
2258}
2259
ac3eeb49 2260/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2261 specified method. Return the pointer to the fn_field list FN_LIST of
2262 overloaded instances defined in the source language. If available
2263 and matching, a vector of matching xmethods defined in extension
2264 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2265
2266 Helper function for value_find_oload_list.
2267 ARGP is a pointer to a pointer to a value (the object).
2268 METHOD is a string containing the method name.
2269 OFFSET is the offset within the value.
2270 TYPE is the assumed type of the object.
233e8b28
SC
2271 FN_LIST is the pointer to matching overloaded instances defined in
2272 source language. Since this is a recursive function, *FN_LIST
2273 should be set to NULL when calling this function.
2274 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2275 0 when calling this function.
2276 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2277 should also be set to NULL when calling this function.
ac3eeb49
MS
2278 BASETYPE is set to the actual type of the subobject where the
2279 method is found.
581e13c1 2280 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2281
233e8b28 2282static void
714f19d5 2283find_method_list (struct value **argp, const char *method,
233e8b28
SC
2284 int offset, struct type *type,
2285 struct fn_field **fn_list, int *num_fns,
2286 VEC (xmethod_worker_ptr) **xm_worker_vec,
fba45db2 2287 struct type **basetype, int *boffset)
c906108c
SS
2288{
2289 int i;
233e8b28
SC
2290 struct fn_field *f = NULL;
2291 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2292
233e8b28
SC
2293 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2294 CHECK_TYPEDEF (type);
c906108c 2295
233e8b28
SC
2296 /* First check in object itself.
2297 This function is called recursively to search through base classes.
2298 If there is a source method match found at some stage, then we need not
2299 look for source methods in consequent recursive calls. */
2300 if ((*fn_list) == NULL)
c906108c 2301 {
233e8b28 2302 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2303 {
233e8b28
SC
2304 /* pai: FIXME What about operators and type conversions? */
2305 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2306
2307 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2308 {
2309 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2310 f = TYPE_FN_FIELDLIST1 (type, i);
2311 *fn_list = f;
4a1970e4 2312
233e8b28
SC
2313 *num_fns = len;
2314 *basetype = type;
2315 *boffset = offset;
4a1970e4 2316
233e8b28
SC
2317 /* Resolve any stub methods. */
2318 check_stub_method_group (type, i);
4a1970e4 2319
233e8b28
SC
2320 break;
2321 }
c5aa993b
JM
2322 }
2323 }
2324
233e8b28
SC
2325 /* Unlike source methods, xmethods can be accumulated over successive
2326 recursive calls. In other words, an xmethod named 'm' in a class
2327 will not hide an xmethod named 'm' in its base class(es). We want
2328 it to be this way because xmethods are after all convenience functions
2329 and hence there is no point restricting them with something like method
2330 hiding. Moreover, if hiding is done for xmethods as well, then we will
2331 have to provide a mechanism to un-hide (like the 'using' construct). */
2332 worker_vec = get_matching_xmethod_workers (type, method);
2333 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2334
2335 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2336 VEC_free (xmethod_worker_ptr, worker_vec);
2337 *xm_worker_vec = new_vec;
2338
2339 /* If source methods are not found in current class, look for them in the
2340 base classes. We also have to go through the base classes to gather
2341 extension methods. */
c906108c
SS
2342 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2343 {
2344 int base_offset;
a109c7c1 2345
c906108c
SS
2346 if (BASETYPE_VIA_VIRTUAL (type, i))
2347 {
086280be 2348 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2349 value_contents_for_printing (*argp),
2350 value_offset (*argp) + offset,
2351 value_address (*argp), *argp);
c5aa993b 2352 }
ac3eeb49
MS
2353 else /* Non-virtual base, simply use bit position from debug
2354 info. */
c906108c
SS
2355 {
2356 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2357 }
233e8b28
SC
2358
2359 find_method_list (argp, method, base_offset + offset,
2360 TYPE_BASECLASS (type, i), fn_list, num_fns,
2361 xm_worker_vec, basetype, boffset);
c906108c 2362 }
c906108c
SS
2363}
2364
233e8b28
SC
2365/* Return the list of overloaded methods of a specified name. The methods
2366 could be those GDB finds in the binary, or xmethod. Methods found in
2367 the binary are returned in FN_LIST, and xmethods are returned in
2368 XM_WORKER_VEC.
ac3eeb49
MS
2369
2370 ARGP is a pointer to a pointer to a value (the object).
2371 METHOD is the method name.
2372 OFFSET is the offset within the value contents.
233e8b28
SC
2373 FN_LIST is the pointer to matching overloaded instances defined in
2374 source language.
ac3eeb49 2375 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2376 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2377 extension languages.
ac3eeb49
MS
2378 BASETYPE is set to the type of the base subobject that defines the
2379 method.
581e13c1 2380 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2381
233e8b28 2382static void
714f19d5 2383value_find_oload_method_list (struct value **argp, const char *method,
233e8b28
SC
2384 int offset, struct fn_field **fn_list,
2385 int *num_fns,
2386 VEC (xmethod_worker_ptr) **xm_worker_vec,
ac3eeb49 2387 struct type **basetype, int *boffset)
c906108c 2388{
c5aa993b 2389 struct type *t;
c906108c 2390
df407dfe 2391 t = check_typedef (value_type (*argp));
c906108c 2392
ac3eeb49 2393 /* Code snarfed from value_struct_elt. */
c906108c
SS
2394 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2395 {
2396 *argp = value_ind (*argp);
2397 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2398 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2399 *argp = coerce_array (*argp);
df407dfe 2400 t = check_typedef (value_type (*argp));
c906108c 2401 }
c5aa993b 2402
c5aa993b
JM
2403 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2404 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2405 error (_("Attempt to extract a component of a "
2406 "value that is not a struct or union"));
c5aa993b 2407
233e8b28
SC
2408 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2409
2410 /* Clear the lists. */
2411 *fn_list = NULL;
2412 *num_fns = 0;
2413 *xm_worker_vec = NULL;
2414
2415 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2416 basetype, boffset);
c906108c
SS
2417}
2418
da096638 2419/* Given an array of arguments (ARGS) (which includes an
c906108c 2420 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2421 arguments NARGS, the NAME of a function, and whether it's a method or
2422 not (METHOD), find the best function that matches on the argument types
2423 according to the overload resolution rules.
c906108c 2424
4c3376c8
SW
2425 METHOD can be one of three values:
2426 NON_METHOD for non-member functions.
2427 METHOD: for member functions.
2428 BOTH: used for overload resolution of operators where the
2429 candidates are expected to be either member or non member
581e13c1 2430 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2431 (representing 'this') is expected to be a reference to the
2432 target object, and will be dereferenced when attempting the
2433 non-member search.
2434
c906108c
SS
2435 In the case of class methods, the parameter OBJ is an object value
2436 in which to search for overloaded methods.
2437
2438 In the case of non-method functions, the parameter FSYM is a symbol
2439 corresponding to one of the overloaded functions.
2440
2441 Return value is an integer: 0 -> good match, 10 -> debugger applied
2442 non-standard coercions, 100 -> incompatible.
2443
2444 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2445 If a non-method is being searched for, SYMP will hold the symbol
2446 for it.
c906108c
SS
2447
2448 If a method is being searched for, and it is a static method,
2449 then STATICP will point to a non-zero value.
2450
7322dca9
SW
2451 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2452 ADL overload candidates when performing overload resolution for a fully
2453 qualified name.
2454
c906108c
SS
2455 Note: This function does *not* check the value of
2456 overload_resolution. Caller must check it to see whether overload
581e13c1 2457 resolution is permitted. */
c906108c
SS
2458
2459int
da096638 2460find_overload_match (struct value **args, int nargs,
4c3376c8 2461 const char *name, enum oload_search_type method,
28c64fc2 2462 struct value **objp, struct symbol *fsym,
ac3eeb49 2463 struct value **valp, struct symbol **symp,
7322dca9 2464 int *staticp, const int no_adl)
c906108c 2465{
7f8c9282 2466 struct value *obj = (objp ? *objp : NULL);
da096638 2467 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2468 /* Index of best overloaded function. */
4c3376c8
SW
2469 int func_oload_champ = -1;
2470 int method_oload_champ = -1;
233e8b28
SC
2471 int src_method_oload_champ = -1;
2472 int ext_method_oload_champ = -1;
2473 int src_and_ext_equal = 0;
4c3376c8 2474
ac3eeb49 2475 /* The measure for the current best match. */
4c3376c8
SW
2476 struct badness_vector *method_badness = NULL;
2477 struct badness_vector *func_badness = NULL;
233e8b28
SC
2478 struct badness_vector *ext_method_badness = NULL;
2479 struct badness_vector *src_method_badness = NULL;
4c3376c8 2480
f23631e4 2481 struct value *temp = obj;
ac3eeb49
MS
2482 /* For methods, the list of overloaded methods. */
2483 struct fn_field *fns_ptr = NULL;
2484 /* For non-methods, the list of overloaded function symbols. */
2485 struct symbol **oload_syms = NULL;
233e8b28
SC
2486 /* For xmethods, the VEC of xmethod workers. */
2487 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2488 /* Number of overloaded instances being considered. */
2489 int num_fns = 0;
c5aa993b 2490 struct type *basetype = NULL;
c906108c 2491 int boffset;
7322dca9
SW
2492
2493 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2494
8d577d32 2495 const char *obj_type_name = NULL;
7322dca9 2496 const char *func_name = NULL;
8d577d32 2497 enum oload_classification match_quality;
4c3376c8 2498 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2499 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2500 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2501 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2502
ac3eeb49 2503 /* Get the list of overloaded methods or functions. */
4c3376c8 2504 if (method == METHOD || method == BOTH)
c906108c 2505 {
a2ca50ae 2506 gdb_assert (obj);
94af9270
KS
2507
2508 /* OBJ may be a pointer value rather than the object itself. */
2509 obj = coerce_ref (obj);
2510 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2511 obj = coerce_ref (value_ind (obj));
df407dfe 2512 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2513
2514 /* First check whether this is a data member, e.g. a pointer to
2515 a function. */
2516 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2517 {
2518 *valp = search_struct_field (name, obj, 0,
2519 check_typedef (value_type (obj)), 0);
2520 if (*valp)
2521 {
2522 *staticp = 1;
f748fb40 2523 do_cleanups (all_cleanups);
94af9270
KS
2524 return 0;
2525 }
2526 }
c906108c 2527
4c3376c8 2528 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2529 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2530 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2531 /* If this is a method only search, and no methods were found
2532 the search has faild. */
233e8b28 2533 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2534 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2535 obj_type_name,
2536 (obj_type_name && *obj_type_name) ? "::" : "",
2537 name);
4a1970e4 2538 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2539 been resolved by find_method_list via
2540 value_find_oload_method_list above. */
4c3376c8
SW
2541 if (fns_ptr)
2542 {
2543 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2544
233e8b28
SC
2545 src_method_oload_champ = find_oload_champ (args, nargs,
2546 num_fns, fns_ptr, NULL,
2547 NULL, &src_method_badness);
2548
2549 src_method_match_quality = classify_oload_match
2550 (src_method_badness, nargs,
2551 oload_method_static_p (fns_ptr, src_method_oload_champ));
2552
2553 make_cleanup (xfree, src_method_badness);
2554 }
4c3376c8 2555
233e8b28
SC
2556 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2557 {
2558 ext_method_oload_champ = find_oload_champ (args, nargs,
2559 0, NULL, xm_worker_vec,
2560 NULL, &ext_method_badness);
2561 ext_method_match_quality = classify_oload_match (ext_method_badness,
2562 nargs, 0);
2563 make_cleanup (xfree, ext_method_badness);
2564 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2565 }
2566
233e8b28
SC
2567 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2568 {
2569 switch (compare_badness (ext_method_badness, src_method_badness))
2570 {
2571 case 0: /* Src method and xmethod are equally good. */
2572 src_and_ext_equal = 1;
2573 /* If src method and xmethod are equally good, then
2574 xmethod should be the winner. Hence, fall through to the
2575 case where a xmethod is better than the source
2576 method, except when the xmethod match quality is
2577 non-standard. */
2578 /* FALLTHROUGH */
2579 case 1: /* Src method and ext method are incompatible. */
2580 /* If ext method match is not standard, then let source method
2581 win. Otherwise, fallthrough to let xmethod win. */
2582 if (ext_method_match_quality != STANDARD)
2583 {
2584 method_oload_champ = src_method_oload_champ;
2585 method_badness = src_method_badness;
2586 ext_method_oload_champ = -1;
2587 method_match_quality = src_method_match_quality;
2588 break;
2589 }
2590 /* FALLTHROUGH */
2591 case 2: /* Ext method is champion. */
2592 method_oload_champ = ext_method_oload_champ;
2593 method_badness = ext_method_badness;
2594 src_method_oload_champ = -1;
2595 method_match_quality = ext_method_match_quality;
2596 break;
2597 case 3: /* Src method is champion. */
2598 method_oload_champ = src_method_oload_champ;
2599 method_badness = src_method_badness;
2600 ext_method_oload_champ = -1;
2601 method_match_quality = src_method_match_quality;
2602 break;
2603 default:
2604 gdb_assert_not_reached ("Unexpected overload comparison "
2605 "result");
2606 break;
2607 }
2608 }
2609 else if (src_method_oload_champ >= 0)
2610 {
2611 method_oload_champ = src_method_oload_champ;
2612 method_badness = src_method_badness;
2613 method_match_quality = src_method_match_quality;
2614 }
2615 else if (ext_method_oload_champ >= 0)
2616 {
2617 method_oload_champ = ext_method_oload_champ;
2618 method_badness = ext_method_badness;
2619 method_match_quality = ext_method_match_quality;
2620 }
c906108c 2621 }
4c3376c8
SW
2622
2623 if (method == NON_METHOD || method == BOTH)
c906108c 2624 {
7322dca9 2625 const char *qualified_name = NULL;
c906108c 2626
b021a221
MS
2627 /* If the overload match is being search for both as a method
2628 and non member function, the first argument must now be
2629 dereferenced. */
4c3376c8 2630 if (method == BOTH)
2b214ea6 2631 args[0] = value_ind (args[0]);
4c3376c8 2632
7322dca9
SW
2633 if (fsym)
2634 {
2635 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2636
2637 /* If we have a function with a C++ name, try to extract just
2638 the function part. Do not try this for non-functions (e.g.
2639 function pointers). */
2640 if (qualified_name
3e43a32a
MS
2641 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2642 == TYPE_CODE_FUNC)
7322dca9
SW
2643 {
2644 char *temp;
2645
2646 temp = cp_func_name (qualified_name);
2647
2648 /* If cp_func_name did not remove anything, the name of the
2649 symbol did not include scope or argument types - it was
2650 probably a C-style function. */
2651 if (temp)
2652 {
2653 make_cleanup (xfree, temp);
2654 if (strcmp (temp, qualified_name) == 0)
2655 func_name = NULL;
2656 else
2657 func_name = temp;
2658 }
2659 }
2660 }
2661 else
94af9270 2662 {
7322dca9
SW
2663 func_name = name;
2664 qualified_name = name;
94af9270 2665 }
d9639e13 2666
94af9270
KS
2667 /* If there was no C++ name, this must be a C-style function or
2668 not a function at all. Just return the same symbol. Do the
2669 same if cp_func_name fails for some reason. */
8d577d32 2670 if (func_name == NULL)
7b83ea04 2671 {
917317f4 2672 *symp = fsym;
5fe41fbf 2673 do_cleanups (all_cleanups);
7b83ea04
AC
2674 return 0;
2675 }
917317f4 2676
da096638 2677 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2678 func_name,
2679 qualified_name,
2680 &oload_syms,
2681 &func_badness,
2682 no_adl);
8d577d32 2683
4c3376c8
SW
2684 if (func_oload_champ >= 0)
2685 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2686
2687 make_cleanup (xfree, oload_syms);
2688 make_cleanup (xfree, func_badness);
8d577d32
DC
2689 }
2690
7322dca9 2691 /* Did we find a match ? */
4c3376c8 2692 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2693 throw_error (NOT_FOUND_ERROR,
2694 _("No symbol \"%s\" in current context."),
2695 name);
8d577d32 2696
4c3376c8
SW
2697 /* If we have found both a method match and a function
2698 match, find out which one is better, and calculate match
2699 quality. */
2700 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2701 {
2702 switch (compare_badness (func_badness, method_badness))
2703 {
2704 case 0: /* Top two contenders are equally good. */
b021a221
MS
2705 /* FIXME: GDB does not support the general ambiguous case.
2706 All candidates should be collected and presented the
2707 user. */
4c3376c8
SW
2708 error (_("Ambiguous overload resolution"));
2709 break;
2710 case 1: /* Incomparable top contenders. */
2711 /* This is an error incompatible candidates
2712 should not have been proposed. */
3e43a32a
MS
2713 error (_("Internal error: incompatible "
2714 "overload candidates proposed"));
4c3376c8
SW
2715 break;
2716 case 2: /* Function champion. */
2717 method_oload_champ = -1;
2718 match_quality = func_match_quality;
2719 break;
2720 case 3: /* Method champion. */
2721 func_oload_champ = -1;
2722 match_quality = method_match_quality;
2723 break;
2724 default:
2725 error (_("Internal error: unexpected overload comparison result"));
2726 break;
2727 }
2728 }
2729 else
2730 {
2731 /* We have either a method match or a function match. */
2732 if (method_oload_champ >= 0)
2733 match_quality = method_match_quality;
2734 else
2735 match_quality = func_match_quality;
2736 }
8d577d32
DC
2737
2738 if (match_quality == INCOMPATIBLE)
2739 {
4c3376c8 2740 if (method == METHOD)
8a3fe4f8 2741 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2742 obj_type_name,
2743 (obj_type_name && *obj_type_name) ? "::" : "",
2744 name);
2745 else
8a3fe4f8 2746 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2747 func_name);
2748 }
2749 else if (match_quality == NON_STANDARD)
2750 {
4c3376c8 2751 if (method == METHOD)
3e43a32a
MS
2752 warning (_("Using non-standard conversion to match "
2753 "method %s%s%s to supplied arguments"),
8d577d32
DC
2754 obj_type_name,
2755 (obj_type_name && *obj_type_name) ? "::" : "",
2756 name);
2757 else
3e43a32a
MS
2758 warning (_("Using non-standard conversion to match "
2759 "function %s to supplied arguments"),
8d577d32
DC
2760 func_name);
2761 }
2762
4c3376c8 2763 if (staticp != NULL)
2bca57ba 2764 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2765
2766 if (method_oload_champ >= 0)
8d577d32 2767 {
233e8b28
SC
2768 if (src_method_oload_champ >= 0)
2769 {
2770 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2771 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
2772 basetype, boffset);
2773 else
2774 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2775 basetype, boffset);
2776 }
8d577d32 2777 else
233e8b28
SC
2778 {
2779 *valp = value_of_xmethod (clone_xmethod_worker
2780 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2781 ext_method_oload_champ)));
2782 }
8d577d32
DC
2783 }
2784 else
4c3376c8 2785 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2786
2787 if (objp)
2788 {
a4295225 2789 struct type *temp_type = check_typedef (value_type (temp));
da096638 2790 struct type *objtype = check_typedef (obj_type);
a109c7c1 2791
a4295225 2792 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2793 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2794 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2795 {
2796 temp = value_addr (temp);
2797 }
2798 *objp = temp;
2799 }
7322dca9
SW
2800
2801 do_cleanups (all_cleanups);
8d577d32
DC
2802
2803 switch (match_quality)
2804 {
2805 case INCOMPATIBLE:
2806 return 100;
2807 case NON_STANDARD:
2808 return 10;
2809 default: /* STANDARD */
2810 return 0;
2811 }
2812}
2813
2814/* Find the best overload match, searching for FUNC_NAME in namespaces
2815 contained in QUALIFIED_NAME until it either finds a good match or
2816 runs out of namespaces. It stores the overloaded functions in
2817 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2818 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2819 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2820 performned. */
8d577d32
DC
2821
2822static int
da096638 2823find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2824 const char *func_name,
2825 const char *qualified_name,
2826 struct symbol ***oload_syms,
7322dca9
SW
2827 struct badness_vector **oload_champ_bv,
2828 const int no_adl)
8d577d32
DC
2829{
2830 int oload_champ;
2831
da096638 2832 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2833 func_name,
2834 qualified_name, 0,
2835 oload_syms, oload_champ_bv,
7322dca9
SW
2836 &oload_champ,
2837 no_adl);
8d577d32
DC
2838
2839 return oload_champ;
2840}
2841
2842/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2843 how deep we've looked for namespaces, and the champ is stored in
2844 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2845 if it isn't. Other arguments are the same as in
2846 find_oload_champ_namespace
8d577d32
DC
2847
2848 It is the caller's responsibility to free *OLOAD_SYMS and
2849 *OLOAD_CHAMP_BV. */
2850
2851static int
da096638 2852find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2853 const char *func_name,
2854 const char *qualified_name,
2855 int namespace_len,
2856 struct symbol ***oload_syms,
2857 struct badness_vector **oload_champ_bv,
7322dca9
SW
2858 int *oload_champ,
2859 const int no_adl)
8d577d32
DC
2860{
2861 int next_namespace_len = namespace_len;
2862 int searched_deeper = 0;
2863 int num_fns = 0;
2864 struct cleanup *old_cleanups;
2865 int new_oload_champ;
2866 struct symbol **new_oload_syms;
2867 struct badness_vector *new_oload_champ_bv;
2868 char *new_namespace;
2869
2870 if (next_namespace_len != 0)
2871 {
2872 gdb_assert (qualified_name[next_namespace_len] == ':');
2873 next_namespace_len += 2;
c906108c 2874 }
ac3eeb49
MS
2875 next_namespace_len +=
2876 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2877
2878 /* Initialize these to values that can safely be xfree'd. */
2879 *oload_syms = NULL;
2880 *oload_champ_bv = NULL;
c5aa993b 2881
581e13c1 2882 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2883 If we get a good match there, use it. */
8d577d32
DC
2884
2885 if (qualified_name[next_namespace_len] == ':')
2886 {
2887 searched_deeper = 1;
2888
da096638 2889 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2890 func_name, qualified_name,
2891 next_namespace_len,
2892 oload_syms, oload_champ_bv,
7322dca9 2893 oload_champ, no_adl))
8d577d32
DC
2894 {
2895 return 1;
2896 }
2897 };
2898
2899 /* If we reach here, either we're in the deepest namespace or we
2900 didn't find a good match in a deeper namespace. But, in the
2901 latter case, we still have a bad match in a deeper namespace;
2902 note that we might not find any match at all in the current
2903 namespace. (There's always a match in the deepest namespace,
2904 because this overload mechanism only gets called if there's a
2905 function symbol to start off with.) */
2906
2907 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2908 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2909 new_namespace = alloca (namespace_len + 1);
2910 strncpy (new_namespace, qualified_name, namespace_len);
2911 new_namespace[namespace_len] = '\0';
2912 new_oload_syms = make_symbol_overload_list (func_name,
2913 new_namespace);
7322dca9
SW
2914
2915 /* If we have reached the deepest level perform argument
2916 determined lookup. */
2917 if (!searched_deeper && !no_adl)
da096638
KS
2918 {
2919 int ix;
2920 struct type **arg_types;
2921
2922 /* Prepare list of argument types for overload resolution. */
2923 arg_types = (struct type **)
2924 alloca (nargs * (sizeof (struct type *)));
2925 for (ix = 0; ix < nargs; ix++)
2926 arg_types[ix] = value_type (args[ix]);
2927 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2928 }
7322dca9 2929
8d577d32
DC
2930 while (new_oload_syms[num_fns])
2931 ++num_fns;
2932
9cf95373 2933 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2934 NULL, NULL, new_oload_syms,
8d577d32
DC
2935 &new_oload_champ_bv);
2936
2937 /* Case 1: We found a good match. Free earlier matches (if any),
2938 and return it. Case 2: We didn't find a good match, but we're
2939 not the deepest function. Then go with the bad match that the
2940 deeper function found. Case 3: We found a bad match, and we're
2941 the deepest function. Then return what we found, even though
2942 it's a bad match. */
2943
2944 if (new_oload_champ != -1
2945 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2946 {
2947 *oload_syms = new_oload_syms;
2948 *oload_champ = new_oload_champ;
2949 *oload_champ_bv = new_oload_champ_bv;
2950 do_cleanups (old_cleanups);
2951 return 1;
2952 }
2953 else if (searched_deeper)
2954 {
2955 xfree (new_oload_syms);
2956 xfree (new_oload_champ_bv);
2957 discard_cleanups (old_cleanups);
2958 return 0;
2959 }
2960 else
2961 {
8d577d32
DC
2962 *oload_syms = new_oload_syms;
2963 *oload_champ = new_oload_champ;
2964 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2965 do_cleanups (old_cleanups);
8d577d32
DC
2966 return 0;
2967 }
2968}
2969
da096638 2970/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2971 the best match from among the overloaded methods or functions
233e8b28
SC
2972 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
2973 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
2974 non-NULL.
2975
2976 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
2977 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
2978
8d577d32
DC
2979 Return the index of the best match; store an indication of the
2980 quality of the match in OLOAD_CHAMP_BV.
2981
2982 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2983
2984static int
9cf95373 2985find_oload_champ (struct value **args, int nargs,
8d577d32 2986 int num_fns, struct fn_field *fns_ptr,
233e8b28 2987 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
2988 struct symbol **oload_syms,
2989 struct badness_vector **oload_champ_bv)
2990{
2991 int ix;
233e8b28
SC
2992 int fn_count;
2993 int xm_worker_vec_n = VEC_length (xmethod_worker_ptr, xm_worker_vec);
ac3eeb49
MS
2994 /* A measure of how good an overloaded instance is. */
2995 struct badness_vector *bv;
2996 /* Index of best overloaded function. */
2997 int oload_champ = -1;
2998 /* Current ambiguity state for overload resolution. */
2999 int oload_ambiguous = 0;
3000 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3001
9cf95373 3002 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3003 alone, or in xmethods alone, but not in more than one of these
3004 groups. */
3005 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3006 == 1);
9cf95373 3007
8d577d32 3008 *oload_champ_bv = NULL;
c906108c 3009
233e8b28
SC
3010 fn_count = (xm_worker_vec != NULL
3011 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3012 : num_fns);
ac3eeb49 3013 /* Consider each candidate in turn. */
233e8b28 3014 for (ix = 0; ix < fn_count; ix++)
c906108c 3015 {
8d577d32 3016 int jj;
233e8b28 3017 int static_offset = 0;
8d577d32
DC
3018 int nparms;
3019 struct type **parm_types;
233e8b28 3020 struct xmethod_worker *worker = NULL;
8d577d32 3021
233e8b28 3022 if (xm_worker_vec != NULL)
db577aea 3023 {
233e8b28
SC
3024 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3025 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3026 }
3027 else
3028 {
233e8b28
SC
3029 if (fns_ptr != NULL)
3030 {
3031 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3032 static_offset = oload_method_static_p (fns_ptr, ix);
3033 }
3034 else
3035 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3036
3037 parm_types = (struct type **)
3038 xmalloc (nparms * (sizeof (struct type *)));
3039 for (jj = 0; jj < nparms; jj++)
3040 parm_types[jj] = (fns_ptr != NULL
3041 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3042 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
3043 jj));
db577aea 3044 }
c906108c 3045
ac3eeb49
MS
3046 /* Compare parameter types to supplied argument types. Skip
3047 THIS for static methods. */
3048 bv = rank_function (parm_types, nparms,
da096638 3049 args + static_offset,
4a1970e4 3050 nargs - static_offset);
c5aa993b 3051
8d577d32 3052 if (!*oload_champ_bv)
c5aa993b 3053 {
8d577d32 3054 *oload_champ_bv = bv;
c5aa993b 3055 oload_champ = 0;
c5aa993b 3056 }
ac3eeb49
MS
3057 else /* See whether current candidate is better or worse than
3058 previous best. */
8d577d32 3059 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3060 {
ac3eeb49
MS
3061 case 0: /* Top two contenders are equally good. */
3062 oload_ambiguous = 1;
c5aa993b 3063 break;
ac3eeb49
MS
3064 case 1: /* Incomparable top contenders. */
3065 oload_ambiguous = 2;
c5aa993b 3066 break;
ac3eeb49
MS
3067 case 2: /* New champion, record details. */
3068 *oload_champ_bv = bv;
c5aa993b
JM
3069 oload_ambiguous = 0;
3070 oload_champ = ix;
c5aa993b
JM
3071 break;
3072 case 3:
3073 default:
3074 break;
3075 }
b8c9b27d 3076 xfree (parm_types);
6b1ba9a0
ND
3077 if (overload_debug)
3078 {
233e8b28 3079 if (fns_ptr != NULL)
ac3eeb49 3080 fprintf_filtered (gdb_stderr,
3e43a32a 3081 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3082 fns_ptr[ix].physname, nparms);
233e8b28
SC
3083 else if (xm_worker_vec != NULL)
3084 fprintf_filtered (gdb_stderr,
3085 "Xmethod worker, # of parms %d\n",
3086 nparms);
6b1ba9a0 3087 else
ac3eeb49 3088 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3089 "Overloaded function instance "
3090 "%s # of parms %d\n",
ac3eeb49
MS
3091 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3092 nparms);
4a1970e4 3093 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3094 fprintf_filtered (gdb_stderr,
3095 "...Badness @ %d : %d\n",
6403aeea 3096 jj, bv->rank[jj].rank);
3e43a32a
MS
3097 fprintf_filtered (gdb_stderr, "Overload resolution "
3098 "champion is %d, ambiguous? %d\n",
ac3eeb49 3099 oload_champ, oload_ambiguous);
6b1ba9a0 3100 }
c906108c
SS
3101 }
3102
8d577d32
DC
3103 return oload_champ;
3104}
6b1ba9a0 3105
8d577d32
DC
3106/* Return 1 if we're looking at a static method, 0 if we're looking at
3107 a non-static method or a function that isn't a method. */
c906108c 3108
8d577d32 3109static int
2bca57ba 3110oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3111{
2bca57ba 3112 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3113 return 1;
c906108c 3114 else
8d577d32
DC
3115 return 0;
3116}
c906108c 3117
8d577d32
DC
3118/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3119
3120static enum oload_classification
3121classify_oload_match (struct badness_vector *oload_champ_bv,
3122 int nargs,
3123 int static_offset)
3124{
3125 int ix;
da096638 3126 enum oload_classification worst = STANDARD;
8d577d32
DC
3127
3128 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3129 {
6403aeea
SW
3130 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3131 or worse return INCOMPATIBLE. */
3132 if (compare_ranks (oload_champ_bv->rank[ix],
3133 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3134 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3135 /* Otherwise If this conversion is as bad as
3136 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3137 else if (compare_ranks (oload_champ_bv->rank[ix],
3138 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3139 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3140 needed. */
7f8c9282 3141 }
02f0d45d 3142
da096638
KS
3143 /* If no INCOMPATIBLE classification was found, return the worst one
3144 that was found (if any). */
3145 return worst;
c906108c
SS
3146}
3147
ac3eeb49
MS
3148/* C++: return 1 is NAME is a legitimate name for the destructor of
3149 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3150 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3151 have CHECK_TYPEDEF applied, this function will apply it itself. */
3152
c906108c 3153int
d8228535 3154destructor_name_p (const char *name, struct type *type)
c906108c 3155{
c906108c
SS
3156 if (name[0] == '~')
3157 {
d8228535
JK
3158 const char *dname = type_name_no_tag_or_error (type);
3159 const char *cp = strchr (dname, '<');
c906108c
SS
3160 unsigned int len;
3161
3162 /* Do not compare the template part for template classes. */
3163 if (cp == NULL)
3164 len = strlen (dname);
3165 else
3166 len = cp - dname;
bf896cb0 3167 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3168 error (_("name of destructor must equal name of class"));
c906108c
SS
3169 else
3170 return 1;
3171 }
3172 return 0;
3173}
3174
3d567982
TT
3175/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3176 class". If the name is found, return a value representing it;
3177 otherwise throw an exception. */
3178
3179static struct value *
3180enum_constant_from_type (struct type *type, const char *name)
3181{
3182 int i;
3183 int name_len = strlen (name);
3184
3185 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3186 && TYPE_DECLARED_CLASS (type));
3187
3188 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3189 {
3190 const char *fname = TYPE_FIELD_NAME (type, i);
3191 int len;
3192
3193 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3194 || fname == NULL)
3195 continue;
3196
3197 /* Look for the trailing "::NAME", since enum class constant
3198 names are qualified here. */
3199 len = strlen (fname);
3200 if (len + 2 >= name_len
3201 && fname[len - name_len - 2] == ':'
3202 && fname[len - name_len - 1] == ':'
3203 && strcmp (&fname[len - name_len], name) == 0)
3204 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3205 }
3206
3207 error (_("no constant named \"%s\" in enum \"%s\""),
3208 name, TYPE_TAG_NAME (type));
3209}
3210
79c2c32d 3211/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3212 return the appropriate member (or the address of the member, if
3213 WANT_ADDRESS). This function is used to resolve user expressions
3214 of the form "DOMAIN::NAME". For more details on what happens, see
3215 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3216
3217struct value *
c848d642 3218value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3219 struct type *expect_type, int want_address,
79c2c32d
DC
3220 enum noside noside)
3221{
3222 switch (TYPE_CODE (curtype))
3223 {
3224 case TYPE_CODE_STRUCT:
3225 case TYPE_CODE_UNION:
ac3eeb49 3226 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3227 name, expect_type,
0d5de010 3228 want_address, noside);
79c2c32d 3229 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3230 return value_namespace_elt (curtype, name,
3231 want_address, noside);
3d567982
TT
3232
3233 case TYPE_CODE_ENUM:
3234 return enum_constant_from_type (curtype, name);
3235
79c2c32d
DC
3236 default:
3237 internal_error (__FILE__, __LINE__,
e2e0b3e5 3238 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3239 }
3240}
3241
072bba3b 3242/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3243 with respect to the methods' parameters. If the types of the
072bba3b
KS
3244 two parameter lists are the same, returns 1; 0 otherwise. This
3245 comparison may ignore any artificial parameters in T1 if
3246 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3247 the first artificial parameter in T1, assumed to be a 'this' pointer.
3248
3249 The type T2 is expected to have come from make_params (in eval.c). */
3250
3251static int
3252compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3253{
3254 int start = 0;
3255
80b23b6a 3256 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3257 ++start;
3258
3259 /* If skipping artificial fields, find the first real field
581e13c1 3260 in T1. */
072bba3b
KS
3261 if (skip_artificial)
3262 {
3263 while (start < TYPE_NFIELDS (t1)
3264 && TYPE_FIELD_ARTIFICIAL (t1, start))
3265 ++start;
3266 }
3267
581e13c1 3268 /* Now compare parameters. */
072bba3b
KS
3269
3270 /* Special case: a method taking void. T1 will contain no
3271 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3272 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3273 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3274 return 1;
3275
3276 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3277 {
3278 int i;
a109c7c1 3279
072bba3b
KS
3280 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3281 {
6403aeea 3282 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3283 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3284 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3285 return 0;
3286 }
3287
3288 return 1;
3289 }
3290
3291 return 0;
3292}
3293
c906108c 3294/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3295 return the address of this member as a "pointer to member" type.
3296 If INTYPE is non-null, then it will be the type of the member we
3297 are looking for. This will help us resolve "pointers to member
3298 functions". This function is used to resolve user expressions of
3299 the form "DOMAIN::NAME". */
c906108c 3300
63d06c5c 3301static struct value *
fba45db2 3302value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3303 struct type *curtype, const char *name,
ac3eeb49
MS
3304 struct type *intype,
3305 int want_address,
63d06c5c 3306 enum noside noside)
c906108c 3307{
52f0bd74
AC
3308 struct type *t = curtype;
3309 int i;
0d5de010 3310 struct value *v, *result;
c906108c 3311
c5aa993b 3312 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3313 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3314 error (_("Internal error: non-aggregate type "
3315 "to value_struct_elt_for_reference"));
c906108c
SS
3316
3317 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3318 {
0d5cff50 3319 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3320
6314a349 3321 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3322 {
d6a843b5 3323 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3324 {
3325 v = value_static_field (t, i);
0d5de010
DJ
3326 if (want_address)
3327 v = value_addr (v);
c906108c
SS
3328 return v;
3329 }
3330 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3331 error (_("pointers to bitfield members not allowed"));
c5aa993b 3332
0d5de010
DJ
3333 if (want_address)
3334 return value_from_longest
3335 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3336 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3337 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3338 return allocate_value (TYPE_FIELD_TYPE (t, i));
3339 else
f7e3ecae
KS
3340 {
3341 /* Try to evaluate NAME as a qualified name with implicit
3342 this pointer. In this case, attempt to return the
3343 equivalent to `this->*(&TYPE::NAME)'. */
3344 v = value_of_this_silent (current_language);
3345 if (v != NULL)
3346 {
3347 struct value *ptr;
3348 long mem_offset;
3349 struct type *type, *tmp;
3350
3351 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3352 type = check_typedef (value_type (ptr));
3353 gdb_assert (type != NULL
3354 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
3355 tmp = lookup_pointer_type (TYPE_DOMAIN_TYPE (type));
3356 v = value_cast_pointers (tmp, v, 1);
3357 mem_offset = value_as_long (ptr);
3358 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3359 result = value_from_pointer (tmp,
3360 value_as_long (v) + mem_offset);
3361 return value_ind (result);
3362 }
3363
3364 error (_("Cannot reference non-static field \"%s\""), name);
3365 }
c906108c
SS
3366 }
3367 }
3368
ac3eeb49
MS
3369 /* C++: If it was not found as a data field, then try to return it
3370 as a pointer to a method. */
c906108c 3371
c906108c
SS
3372 /* Perform all necessary dereferencing. */
3373 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3374 intype = TYPE_TARGET_TYPE (intype);
3375
3376 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3377 {
0d5cff50 3378 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3379 char dem_opname[64];
3380
ac3eeb49
MS
3381 if (strncmp (t_field_name, "__", 2) == 0
3382 || strncmp (t_field_name, "op", 2) == 0
3383 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3384 {
ac3eeb49
MS
3385 if (cplus_demangle_opname (t_field_name,
3386 dem_opname, DMGL_ANSI))
c5aa993b 3387 t_field_name = dem_opname;
ac3eeb49
MS
3388 else if (cplus_demangle_opname (t_field_name,
3389 dem_opname, 0))
c906108c 3390 t_field_name = dem_opname;
c906108c 3391 }
6314a349 3392 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3393 {
072bba3b
KS
3394 int j;
3395 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3396 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3397
de17c821
DJ
3398 check_stub_method_group (t, i);
3399
c906108c
SS
3400 if (intype)
3401 {
072bba3b
KS
3402 for (j = 0; j < len; ++j)
3403 {
3404 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3405 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3406 intype, 1))
072bba3b
KS
3407 break;
3408 }
3409
3410 if (j == len)
3e43a32a
MS
3411 error (_("no member function matches "
3412 "that type instantiation"));
7f79b1c5 3413 }
c906108c 3414 else
072bba3b
KS
3415 {
3416 int ii;
7f79b1c5
DJ
3417
3418 j = -1;
53832f31 3419 for (ii = 0; ii < len; ++ii)
072bba3b 3420 {
7f79b1c5
DJ
3421 /* Skip artificial methods. This is necessary if,
3422 for example, the user wants to "print
3423 subclass::subclass" with only one user-defined
53832f31
TT
3424 constructor. There is no ambiguity in this case.
3425 We are careful here to allow artificial methods
3426 if they are the unique result. */
072bba3b 3427 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3428 {
3429 if (j == -1)
3430 j = ii;
3431 continue;
3432 }
072bba3b 3433
7f79b1c5
DJ
3434 /* Desired method is ambiguous if more than one
3435 method is defined. */
53832f31 3436 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3437 error (_("non-unique member `%s' requires "
3438 "type instantiation"), name);
072bba3b 3439
7f79b1c5
DJ
3440 j = ii;
3441 }
53832f31
TT
3442
3443 if (j == -1)
3444 error (_("no matching member function"));
072bba3b 3445 }
c5aa993b 3446
0d5de010
DJ
3447 if (TYPE_FN_FIELD_STATIC_P (f, j))
3448 {
ac3eeb49
MS
3449 struct symbol *s =
3450 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3451 0, VAR_DOMAIN, 0);
a109c7c1 3452
0d5de010
DJ
3453 if (s == NULL)
3454 return NULL;
3455
3456 if (want_address)
3457 return value_addr (read_var_value (s, 0));
3458 else
3459 return read_var_value (s, 0);
3460 }
3461
c906108c
SS
3462 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3463 {
0d5de010
DJ
3464 if (want_address)
3465 {
3466 result = allocate_value
3467 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3468 cplus_make_method_ptr (value_type (result),
3469 value_contents_writeable (result),
0d5de010
DJ
3470 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3471 }
3472 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3473 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3474 else
3475 error (_("Cannot reference virtual member function \"%s\""),
3476 name);
c906108c
SS
3477 }
3478 else
3479 {
ac3eeb49
MS
3480 struct symbol *s =
3481 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3482 0, VAR_DOMAIN, 0);
a109c7c1 3483
c906108c 3484 if (s == NULL)
0d5de010
DJ
3485 return NULL;
3486
3487 v = read_var_value (s, 0);
3488 if (!want_address)
3489 result = v;
c906108c
SS
3490 else
3491 {
0d5de010 3492 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3493 cplus_make_method_ptr (value_type (result),
3494 value_contents_writeable (result),
42ae5230 3495 value_address (v), 0);
c906108c 3496 }
c906108c 3497 }
0d5de010 3498 return result;
c906108c
SS
3499 }
3500 }
3501 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3502 {
f23631e4 3503 struct value *v;
c906108c
SS
3504 int base_offset;
3505
3506 if (BASETYPE_VIA_VIRTUAL (t, i))
3507 base_offset = 0;
3508 else
3509 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3510 v = value_struct_elt_for_reference (domain,
3511 offset + base_offset,
3512 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3513 name, intype,
3514 want_address, noside);
c906108c
SS
3515 if (v)
3516 return v;
3517 }
63d06c5c
DC
3518
3519 /* As a last chance, pretend that CURTYPE is a namespace, and look
3520 it up that way; this (frequently) works for types nested inside
3521 classes. */
3522
ac3eeb49
MS
3523 return value_maybe_namespace_elt (curtype, name,
3524 want_address, noside);
c906108c
SS
3525}
3526
79c2c32d
DC
3527/* C++: Return the member NAME of the namespace given by the type
3528 CURTYPE. */
3529
3530static struct value *
3531value_namespace_elt (const struct type *curtype,
c848d642 3532 const char *name, int want_address,
79c2c32d 3533 enum noside noside)
63d06c5c
DC
3534{
3535 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3536 want_address,
3537 noside);
63d06c5c
DC
3538
3539 if (retval == NULL)
ac3eeb49
MS
3540 error (_("No symbol \"%s\" in namespace \"%s\"."),
3541 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3542
3543 return retval;
3544}
3545
3546/* A helper function used by value_namespace_elt and
3547 value_struct_elt_for_reference. It looks up NAME inside the
3548 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3549 is a class and NAME refers to a type in CURTYPE itself (as opposed
3550 to, say, some base class of CURTYPE). */
3551
3552static struct value *
3553value_maybe_namespace_elt (const struct type *curtype,
c848d642 3554 const char *name, int want_address,
63d06c5c 3555 enum noside noside)
79c2c32d
DC
3556{
3557 const char *namespace_name = TYPE_TAG_NAME (curtype);
3558 struct symbol *sym;
0d5de010 3559 struct value *result;
79c2c32d 3560
13387711 3561 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3562 get_selected_block (0), VAR_DOMAIN);
3563
3564 if (sym == NULL)
3565 {
3566 char *concatenated_name = alloca (strlen (namespace_name) + 2
3567 + strlen (name) + 1);
3568
3569 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3570 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3571 }
79c2c32d
DC
3572
3573 if (sym == NULL)
63d06c5c 3574 return NULL;
79c2c32d
DC
3575 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3576 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3577 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3578 else
0d5de010
DJ
3579 result = value_of_variable (sym, get_selected_block (0));
3580
3581 if (result && want_address)
3582 result = value_addr (result);
3583
3584 return result;
79c2c32d
DC
3585}
3586
dfcee124 3587/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3588
c906108c 3589 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3590 and refer to the values computed for the object pointed to. */
c906108c
SS
3591
3592struct type *
dfcee124
AG
3593value_rtti_indirect_type (struct value *v, int *full,
3594 int *top, int *using_enc)
c906108c 3595{
f23631e4 3596 struct value *target;
dfcee124
AG
3597 struct type *type, *real_type, *target_type;
3598
3599 type = value_type (v);
3600 type = check_typedef (type);
3601 if (TYPE_CODE (type) == TYPE_CODE_REF)
3602 target = coerce_ref (v);
3603 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3604 target = value_ind (v);
3605 else
3606 return NULL;
c906108c 3607
dfcee124
AG
3608 real_type = value_rtti_type (target, full, top, using_enc);
3609
3610 if (real_type)
3611 {
3612 /* Copy qualifiers to the referenced object. */
3613 target_type = value_type (target);
3614 real_type = make_cv_type (TYPE_CONST (target_type),
3615 TYPE_VOLATILE (target_type), real_type, NULL);
3616 if (TYPE_CODE (type) == TYPE_CODE_REF)
3617 real_type = lookup_reference_type (real_type);
3618 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3619 real_type = lookup_pointer_type (real_type);
3620 else
3621 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3622
3623 /* Copy qualifiers to the pointer/reference. */
3624 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3625 real_type, NULL);
3626 }
c906108c 3627
dfcee124 3628 return real_type;
c906108c
SS
3629}
3630
3631/* Given a value pointed to by ARGP, check its real run-time type, and
3632 if that is different from the enclosing type, create a new value
3633 using the real run-time type as the enclosing type (and of the same
3634 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3635 be the correct offset to the enclosed object. RTYPE is the type,
3636 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3637 by value_rtti_type(). If these are available, they can be supplied
3638 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3639 NULL if they're not available. */
c906108c 3640
f23631e4 3641struct value *
ac3eeb49
MS
3642value_full_object (struct value *argp,
3643 struct type *rtype,
3644 int xfull, int xtop,
fba45db2 3645 int xusing_enc)
c906108c 3646{
c5aa993b 3647 struct type *real_type;
c906108c
SS
3648 int full = 0;
3649 int top = -1;
3650 int using_enc = 0;
f23631e4 3651 struct value *new_val;
c906108c
SS
3652
3653 if (rtype)
3654 {
3655 real_type = rtype;
3656 full = xfull;
3657 top = xtop;
3658 using_enc = xusing_enc;
3659 }
3660 else
3661 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3662
ac3eeb49 3663 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3664 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3665 return argp;
3666
a7860e76
TT
3667 /* In a destructor we might see a real type that is a superclass of
3668 the object's type. In this case it is better to leave the object
3669 as-is. */
3670 if (full
3671 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3672 return argp;
3673
c906108c 3674 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3675 type is wrong, set it. */
3676 /* pai: FIXME -- sounds iffy */
c906108c
SS
3677 if (full)
3678 {
4dfea560
DE
3679 argp = value_copy (argp);
3680 set_value_enclosing_type (argp, real_type);
c906108c
SS
3681 return argp;
3682 }
3683
581e13c1 3684 /* Check if object is in memory. */
c906108c
SS
3685 if (VALUE_LVAL (argp) != lval_memory)
3686 {
3e43a32a
MS
3687 warning (_("Couldn't retrieve complete object of RTTI "
3688 "type %s; object may be in register(s)."),
ac3eeb49 3689 TYPE_NAME (real_type));
c5aa993b 3690
c906108c
SS
3691 return argp;
3692 }
c5aa993b 3693
ac3eeb49
MS
3694 /* All other cases -- retrieve the complete object. */
3695 /* Go back by the computed top_offset from the beginning of the
3696 object, adjusting for the embedded offset of argp if that's what
3697 value_rtti_type used for its computation. */
42ae5230 3698 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3699 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3700 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3701 set_value_embedded_offset (new_val, (using_enc
3702 ? top + value_embedded_offset (argp)
3703 : top));
c906108c
SS
3704 return new_val;
3705}
3706
389e51db 3707
85bc8cb7
JK
3708/* Return the value of the local variable, if one exists. Throw error
3709 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3710
f23631e4 3711struct value *
85bc8cb7 3712value_of_this (const struct language_defn *lang)
c906108c 3713{
66a17cb6 3714 struct symbol *sym;
3977b71f 3715 const struct block *b;
206415a3 3716 struct frame_info *frame;
c906108c 3717
66a17cb6 3718 if (!lang->la_name_of_this)
85bc8cb7 3719 error (_("no `this' in current language"));
aee28ec6 3720
85bc8cb7 3721 frame = get_selected_frame (_("no frame selected"));
c906108c 3722
66a17cb6 3723 b = get_frame_block (frame, NULL);
c906108c 3724
66a17cb6 3725 sym = lookup_language_this (lang, b);
c906108c 3726 if (sym == NULL)
85bc8cb7
JK
3727 error (_("current stack frame does not contain a variable named `%s'"),
3728 lang->la_name_of_this);
3729
3730 return read_var_value (sym, frame);
3731}
3732
3733/* Return the value of the local variable, if one exists. Return NULL
3734 otherwise. Never throw error. */
3735
3736struct value *
3737value_of_this_silent (const struct language_defn *lang)
3738{
3739 struct value *ret = NULL;
3740 volatile struct gdb_exception except;
3741
3742 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3743 {
85bc8cb7 3744 ret = value_of_this (lang);
c906108c
SS
3745 }
3746
d069f99d
AF
3747 return ret;
3748}
3749
ac3eeb49
MS
3750/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3751 elements long, starting at LOWBOUND. The result has the same lower
3752 bound as the original ARRAY. */
c906108c 3753
f23631e4
AC
3754struct value *
3755value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3756{
3757 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3758 LONGEST lowerbound, upperbound;
f23631e4 3759 struct value *slice;
c906108c 3760 struct type *array_type;
ac3eeb49 3761
df407dfe 3762 array_type = check_typedef (value_type (array));
c906108c 3763 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3764 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3765 error (_("cannot take slice of non-array"));
ac3eeb49 3766
c906108c
SS
3767 range_type = TYPE_INDEX_TYPE (array_type);
3768 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3769 error (_("slice from bad array or bitstring"));
ac3eeb49 3770
c906108c 3771 if (lowbound < lowerbound || length < 0
db034ac5 3772 || lowbound + length - 1 > upperbound)
8a3fe4f8 3773 error (_("slice out of range"));
ac3eeb49 3774
c906108c
SS
3775 /* FIXME-type-allocation: need a way to free this type when we are
3776 done with it. */
0c9c3474
SA
3777 slice_range_type = create_static_range_type ((struct type *) NULL,
3778 TYPE_TARGET_TYPE (range_type),
3779 lowbound,
3780 lowbound + length - 1);
ac3eeb49 3781
a7c88acd
JB
3782 {
3783 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3784 LONGEST offset
3785 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3786
a7c88acd
JB
3787 slice_type = create_array_type ((struct type *) NULL,
3788 element_type,
3789 slice_range_type);
3790 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3791
a7c88acd
JB
3792 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3793 slice = allocate_value_lazy (slice_type);
3794 else
3795 {
3796 slice = allocate_value (slice_type);
3797 value_contents_copy (slice, 0, array, offset,
3798 TYPE_LENGTH (slice_type));
3799 }
3800
3801 set_value_component_location (slice, array);
3802 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3803 set_value_offset (slice, value_offset (array) + offset);
3804 }
ac3eeb49 3805
c906108c
SS
3806 return slice;
3807}
3808
ac3eeb49
MS
3809/* Create a value for a FORTRAN complex number. Currently most of the
3810 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3811 composed of 2 doubles. This really should be a smarter routine
3812 that figures out precision inteligently as opposed to assuming
ac3eeb49 3813 doubles. FIXME: fmb */
c906108c 3814
f23631e4 3815struct value *
ac3eeb49
MS
3816value_literal_complex (struct value *arg1,
3817 struct value *arg2,
3818 struct type *type)
c906108c 3819{
f23631e4 3820 struct value *val;
c906108c
SS
3821 struct type *real_type = TYPE_TARGET_TYPE (type);
3822
3823 val = allocate_value (type);
3824 arg1 = value_cast (real_type, arg1);
3825 arg2 = value_cast (real_type, arg2);
3826
990a07ab 3827 memcpy (value_contents_raw (val),
0fd88904 3828 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3829 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3830 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3831 return val;
3832}
3833
ac3eeb49 3834/* Cast a value into the appropriate complex data type. */
c906108c 3835
f23631e4
AC
3836static struct value *
3837cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3838{
3839 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3840
df407dfe 3841 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3842 {
df407dfe 3843 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3844 struct value *re_val = allocate_value (val_real_type);
3845 struct value *im_val = allocate_value (val_real_type);
c906108c 3846
990a07ab 3847 memcpy (value_contents_raw (re_val),
0fd88904 3848 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3849 memcpy (value_contents_raw (im_val),
0fd88904 3850 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3851 TYPE_LENGTH (val_real_type));
c906108c
SS
3852
3853 return value_literal_complex (re_val, im_val, type);
3854 }
df407dfe
AC
3855 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3856 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3857 return value_literal_complex (val,
3858 value_zero (real_type, not_lval),
3859 type);
c906108c 3860 else
8a3fe4f8 3861 error (_("cannot cast non-number to complex"));
c906108c
SS
3862}
3863
3864void
fba45db2 3865_initialize_valops (void)
c906108c 3866{
5bf193a2
AC
3867 add_setshow_boolean_cmd ("overload-resolution", class_support,
3868 &overload_resolution, _("\
3869Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3870Show overload resolution in evaluating C++ functions."),
3871 NULL, NULL,
920d2a44 3872 show_overload_resolution,
5bf193a2 3873 &setlist, &showlist);
c906108c 3874 overload_resolution = 1;
c906108c 3875}