]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/valops.c
Add support reading D modules from DWARF
[thirdparty/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
32d0add0 3 Copyright (C) 1986-2015 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
f4c5303c 39#include "observer.h"
3e3b026f 40#include "objfiles.h"
233e8b28 41#include "extension.h"
c906108c 42
ccce17b0 43extern unsigned int overload_debug;
c906108c
SS
44/* Local functions. */
45
ad2f7632
DJ
46static int typecmp (int staticp, int varargs, int nargs,
47 struct field t1[], struct value *t2[]);
c906108c 48
714f19d5 49static struct value *search_struct_field (const char *, struct value *,
8a13d42d 50 struct type *, int);
c906108c 51
714f19d5
TT
52static struct value *search_struct_method (const char *, struct value **,
53 struct value **,
54 int, int *, struct type *);
c906108c 55
da096638 56static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
57 const char *, const char *,
58 struct symbol ***,
7322dca9
SW
59 struct badness_vector **,
60 const int no_adl);
8d577d32
DC
61
62static
da096638 63int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
64 const char *, const char *,
65 int, struct symbol ***,
7322dca9
SW
66 struct badness_vector **, int *,
67 const int no_adl);
ac3eeb49 68
9cf95373 69static int find_oload_champ (struct value **, int, int,
233e8b28
SC
70 struct fn_field *, VEC (xmethod_worker_ptr) *,
71 struct symbol **, struct badness_vector **);
ac3eeb49 72
2bca57ba 73static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
74
75enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
76
77static enum
ac3eeb49
MS
78oload_classification classify_oload_match (struct badness_vector *,
79 int, int);
8d577d32 80
ac3eeb49
MS
81static struct value *value_struct_elt_for_reference (struct type *,
82 int, struct type *,
c848d642 83 const char *,
ac3eeb49
MS
84 struct type *,
85 int, enum noside);
79c2c32d 86
ac3eeb49 87static struct value *value_namespace_elt (const struct type *,
c848d642 88 const char *, int , enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 91 const char *, int,
ac3eeb49 92 enum noside);
63d06c5c 93
a14ed312 94static CORE_ADDR allocate_space_in_inferior (int);
c906108c 95
f23631e4 96static struct value *cast_into_complex (struct type *, struct value *);
c906108c 97
233e8b28
SC
98static void find_method_list (struct value **, const char *,
99 int, struct type *, struct fn_field **, int *,
100 VEC (xmethod_worker_ptr) **,
101 struct type **, int *);
7a292a7a 102
a14ed312 103void _initialize_valops (void);
c906108c 104
c906108c 105#if 0
ac3eeb49
MS
106/* Flag for whether we want to abandon failed expression evals by
107 default. */
108
c906108c
SS
109static int auto_abandon = 0;
110#endif
111
112int overload_resolution = 0;
920d2a44
AC
113static void
114show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
115 struct cmd_list_element *c,
116 const char *value)
920d2a44 117{
3e43a32a
MS
118 fprintf_filtered (file, _("Overload resolution in evaluating "
119 "C++ functions is %s.\n"),
920d2a44
AC
120 value);
121}
242bfc55 122
3e3b026f
UW
123/* Find the address of function name NAME in the inferior. If OBJF_P
124 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
125 is defined. */
c906108c 126
f23631e4 127struct value *
3e3b026f 128find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 129{
52f0bd74 130 struct symbol *sym;
a109c7c1 131
2570f2b7 132 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
133 if (sym != NULL)
134 {
135 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
136 {
8a3fe4f8 137 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
138 name);
139 }
3e3b026f
UW
140
141 if (objf_p)
08be3fe3 142 *objf_p = symbol_objfile (sym);
3e3b026f 143
c906108c
SS
144 return value_of_variable (sym, NULL);
145 }
146 else
147 {
7c7b6655
TT
148 struct bound_minimal_symbol msymbol =
149 lookup_bound_minimal_symbol (name);
a109c7c1 150
7c7b6655 151 if (msymbol.minsym != NULL)
c906108c 152 {
7c7b6655 153 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
154 struct gdbarch *gdbarch = get_objfile_arch (objfile);
155
c906108c 156 struct type *type;
4478b372 157 CORE_ADDR maddr;
3e3b026f 158 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
159 type = lookup_function_type (type);
160 type = lookup_pointer_type (type);
77e371c0 161 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
162
163 if (objf_p)
164 *objf_p = objfile;
165
4478b372 166 return value_from_pointer (type, maddr);
c906108c
SS
167 }
168 else
169 {
c5aa993b 170 if (!target_has_execution)
3e43a32a
MS
171 error (_("evaluation of this expression "
172 "requires the target program to be active"));
c5aa993b 173 else
3e43a32a
MS
174 error (_("evaluation of this expression requires the "
175 "program to have a function \"%s\"."),
176 name);
c906108c
SS
177 }
178 }
179}
180
ac3eeb49
MS
181/* Allocate NBYTES of space in the inferior using the inferior's
182 malloc and return a value that is a pointer to the allocated
183 space. */
c906108c 184
f23631e4 185struct value *
fba45db2 186value_allocate_space_in_inferior (int len)
c906108c 187{
3e3b026f
UW
188 struct objfile *objf;
189 struct value *val = find_function_in_inferior ("malloc", &objf);
190 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 191 struct value *blocklen;
c906108c 192
3e3b026f 193 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
194 val = call_function_by_hand (val, 1, &blocklen);
195 if (value_logical_not (val))
196 {
197 if (!target_has_execution)
3e43a32a
MS
198 error (_("No memory available to program now: "
199 "you need to start the target first"));
c5aa993b 200 else
8a3fe4f8 201 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
202 }
203 return val;
204}
205
206static CORE_ADDR
fba45db2 207allocate_space_in_inferior (int len)
c906108c
SS
208{
209 return value_as_long (value_allocate_space_in_inferior (len));
210}
211
6af87b03
AR
212/* Cast struct value VAL to type TYPE and return as a value.
213 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
214 for this to work. Typedef to one of the codes is permitted.
215 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
216
217static struct value *
218value_cast_structs (struct type *type, struct value *v2)
219{
220 struct type *t1;
221 struct type *t2;
222 struct value *v;
223
224 gdb_assert (type != NULL && v2 != NULL);
225
226 t1 = check_typedef (type);
227 t2 = check_typedef (value_type (v2));
228
229 /* Check preconditions. */
230 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
231 || TYPE_CODE (t1) == TYPE_CODE_UNION)
232 && !!"Precondition is that type is of STRUCT or UNION kind.");
233 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
234 || TYPE_CODE (t2) == TYPE_CODE_UNION)
235 && !!"Precondition is that value is of STRUCT or UNION kind");
236
191ca0a1
CM
237 if (TYPE_NAME (t1) != NULL
238 && TYPE_NAME (t2) != NULL
239 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
240 return NULL;
241
6af87b03
AR
242 /* Upcasting: look in the type of the source to see if it contains the
243 type of the target as a superclass. If so, we'll need to
244 offset the pointer rather than just change its type. */
245 if (TYPE_NAME (t1) != NULL)
246 {
247 v = search_struct_field (type_name_no_tag (t1),
8a13d42d 248 v2, t2, 1);
6af87b03
AR
249 if (v)
250 return v;
251 }
252
253 /* Downcasting: look in the type of the target to see if it contains the
254 type of the source as a superclass. If so, we'll need to
9c3c02fd 255 offset the pointer rather than just change its type. */
6af87b03
AR
256 if (TYPE_NAME (t2) != NULL)
257 {
9c3c02fd
TT
258 /* Try downcasting using the run-time type of the value. */
259 int full, top, using_enc;
260 struct type *real_type;
261
262 real_type = value_rtti_type (v2, &full, &top, &using_enc);
263 if (real_type)
264 {
265 v = value_full_object (v2, real_type, full, top, using_enc);
266 v = value_at_lazy (real_type, value_address (v));
9f1f738a 267 real_type = value_type (v);
9c3c02fd
TT
268
269 /* We might be trying to cast to the outermost enclosing
270 type, in which case search_struct_field won't work. */
271 if (TYPE_NAME (real_type) != NULL
272 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
273 return v;
274
8a13d42d 275 v = search_struct_field (type_name_no_tag (t2), v, real_type, 1);
9c3c02fd
TT
276 if (v)
277 return v;
278 }
279
280 /* Try downcasting using information from the destination type
281 T2. This wouldn't work properly for classes with virtual
282 bases, but those were handled above. */
6af87b03 283 v = search_struct_field (type_name_no_tag (t2),
8a13d42d 284 value_zero (t1, not_lval), t1, 1);
6af87b03
AR
285 if (v)
286 {
287 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 288 CORE_ADDR addr2 = value_address (v2);
a109c7c1 289
42ae5230 290 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
291 return value_at (type, addr2);
292 }
293 }
694182d2
DJ
294
295 return NULL;
6af87b03
AR
296}
297
fb933624
DJ
298/* Cast one pointer or reference type to another. Both TYPE and
299 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
300 reference types. If SUBCLASS_CHECK is non-zero, this will force a
301 check to see whether TYPE is a superclass of ARG2's type. If
302 SUBCLASS_CHECK is zero, then the subclass check is done only when
303 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
304
305struct value *
b1af9e97
TT
306value_cast_pointers (struct type *type, struct value *arg2,
307 int subclass_check)
fb933624 308{
d160942f 309 struct type *type1 = check_typedef (type);
fb933624 310 struct type *type2 = check_typedef (value_type (arg2));
d160942f 311 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
312 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
313
314 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
315 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 316 && (subclass_check || !value_logical_not (arg2)))
fb933624 317 {
6af87b03 318 struct value *v2;
fb933624 319
6af87b03
AR
320 if (TYPE_CODE (type2) == TYPE_CODE_REF)
321 v2 = coerce_ref (arg2);
322 else
323 v2 = value_ind (arg2);
3e43a32a
MS
324 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
325 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
326 v2 = value_cast_structs (t1, v2);
327 /* At this point we have what we can have, un-dereference if needed. */
328 if (v2)
fb933624 329 {
6af87b03 330 struct value *v = value_addr (v2);
a109c7c1 331
6af87b03
AR
332 deprecated_set_value_type (v, type);
333 return v;
fb933624 334 }
8301c89e 335 }
fb933624
DJ
336
337 /* No superclass found, just change the pointer type. */
0d5de010 338 arg2 = value_copy (arg2);
fb933624 339 deprecated_set_value_type (arg2, type);
4dfea560 340 set_value_enclosing_type (arg2, type);
fb933624
DJ
341 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
342 return arg2;
343}
344
c906108c
SS
345/* Cast value ARG2 to type TYPE and return as a value.
346 More general than a C cast: accepts any two types of the same length,
347 and if ARG2 is an lvalue it can be cast into anything at all. */
348/* In C++, casts may change pointer or object representations. */
349
f23631e4
AC
350struct value *
351value_cast (struct type *type, struct value *arg2)
c906108c 352{
52f0bd74
AC
353 enum type_code code1;
354 enum type_code code2;
355 int scalar;
c906108c
SS
356 struct type *type2;
357
358 int convert_to_boolean = 0;
c5aa993b 359
df407dfe 360 if (value_type (arg2) == type)
c906108c
SS
361 return arg2;
362
6af87b03
AR
363 code1 = TYPE_CODE (check_typedef (type));
364
365 /* Check if we are casting struct reference to struct reference. */
366 if (code1 == TYPE_CODE_REF)
367 {
368 /* We dereference type; then we recurse and finally
581e13c1 369 we generate value of the given reference. Nothing wrong with
6af87b03
AR
370 that. */
371 struct type *t1 = check_typedef (type);
372 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
373 struct value *val = value_cast (dereftype, arg2);
a109c7c1 374
6af87b03
AR
375 return value_ref (val);
376 }
377
378 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
379
380 if (code2 == TYPE_CODE_REF)
381 /* We deref the value and then do the cast. */
382 return value_cast (type, coerce_ref (arg2));
383
c906108c
SS
384 CHECK_TYPEDEF (type);
385 code1 = TYPE_CODE (type);
994b9211 386 arg2 = coerce_ref (arg2);
df407dfe 387 type2 = check_typedef (value_type (arg2));
c906108c 388
fb933624
DJ
389 /* You can't cast to a reference type. See value_cast_pointers
390 instead. */
391 gdb_assert (code1 != TYPE_CODE_REF);
392
ac3eeb49
MS
393 /* A cast to an undetermined-length array_type, such as
394 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
395 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
396 if (code1 == TYPE_CODE_ARRAY)
397 {
398 struct type *element_type = TYPE_TARGET_TYPE (type);
399 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 400
d78df370 401 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
402 {
403 struct type *range_type = TYPE_INDEX_TYPE (type);
404 int val_length = TYPE_LENGTH (type2);
405 LONGEST low_bound, high_bound, new_length;
a109c7c1 406
c906108c
SS
407 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
408 low_bound = 0, high_bound = 0;
409 new_length = val_length / element_length;
410 if (val_length % element_length != 0)
3e43a32a
MS
411 warning (_("array element type size does not "
412 "divide object size in cast"));
ac3eeb49
MS
413 /* FIXME-type-allocation: need a way to free this type when
414 we are done with it. */
0c9c3474
SA
415 range_type = create_static_range_type ((struct type *) NULL,
416 TYPE_TARGET_TYPE (range_type),
417 low_bound,
418 new_length + low_bound - 1);
ac3eeb49
MS
419 deprecated_set_value_type (arg2,
420 create_array_type ((struct type *) NULL,
421 element_type,
422 range_type));
c906108c
SS
423 return arg2;
424 }
425 }
426
427 if (current_language->c_style_arrays
3bdf2bbd
KW
428 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
429 && !TYPE_VECTOR (type2))
c906108c
SS
430 arg2 = value_coerce_array (arg2);
431
432 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
433 arg2 = value_coerce_function (arg2);
434
df407dfe 435 type2 = check_typedef (value_type (arg2));
c906108c
SS
436 code2 = TYPE_CODE (type2);
437
438 if (code1 == TYPE_CODE_COMPLEX)
439 return cast_into_complex (type, arg2);
440 if (code1 == TYPE_CODE_BOOL)
441 {
442 code1 = TYPE_CODE_INT;
443 convert_to_boolean = 1;
444 }
445 if (code1 == TYPE_CODE_CHAR)
446 code1 = TYPE_CODE_INT;
447 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
448 code2 = TYPE_CODE_INT;
449
450 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
451 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
452 || code2 == TYPE_CODE_RANGE);
c906108c 453
6af87b03
AR
454 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
455 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 456 && TYPE_NAME (type) != 0)
694182d2
DJ
457 {
458 struct value *v = value_cast_structs (type, arg2);
a109c7c1 459
694182d2
DJ
460 if (v)
461 return v;
462 }
463
c906108c
SS
464 if (code1 == TYPE_CODE_FLT && scalar)
465 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
466 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
467 {
e17a4113 468 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
469 int dec_len = TYPE_LENGTH (type);
470 gdb_byte dec[16];
471
472 if (code2 == TYPE_CODE_FLT)
e17a4113 473 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
474 else if (code2 == TYPE_CODE_DECFLOAT)
475 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 476 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
477 else
478 /* The only option left is an integral type. */
e17a4113 479 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
480
481 return value_from_decfloat (type, dec);
482 }
c906108c
SS
483 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
484 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
485 && (scalar || code2 == TYPE_CODE_PTR
486 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
487 {
488 LONGEST longest;
c5aa993b 489
2bf1f4a1 490 /* When we cast pointers to integers, we mustn't use
76e71323 491 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
492 represents, as value_as_long would. GDB should evaluate
493 expressions just as the compiler would --- and the compiler
494 sees a cast as a simple reinterpretation of the pointer's
495 bits. */
496 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
497 longest = extract_unsigned_integer
498 (value_contents (arg2), TYPE_LENGTH (type2),
499 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
500 else
501 longest = value_as_long (arg2);
802db21b 502 return value_from_longest (type, convert_to_boolean ?
716c501e 503 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 504 }
ac3eeb49
MS
505 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
506 || code2 == TYPE_CODE_ENUM
507 || code2 == TYPE_CODE_RANGE))
634acd5f 508 {
4603e466
DT
509 /* TYPE_LENGTH (type) is the length of a pointer, but we really
510 want the length of an address! -- we are really dealing with
511 addresses (i.e., gdb representations) not pointers (i.e.,
512 target representations) here.
513
514 This allows things like "print *(int *)0x01000234" to work
515 without printing a misleading message -- which would
516 otherwise occur when dealing with a target having two byte
517 pointers and four byte addresses. */
518
50810684 519 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 520 LONGEST longest = value_as_long (arg2);
a109c7c1 521
4603e466 522 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 523 {
4603e466
DT
524 if (longest >= ((LONGEST) 1 << addr_bit)
525 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 526 warning (_("value truncated"));
634acd5f
AC
527 }
528 return value_from_longest (type, longest);
529 }
0d5de010
DJ
530 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
531 && value_as_long (arg2) == 0)
532 {
533 struct value *result = allocate_value (type);
a109c7c1 534
ad4820ab 535 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
536 return result;
537 }
538 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
539 && value_as_long (arg2) == 0)
540 {
541 /* The Itanium C++ ABI represents NULL pointers to members as
542 minus one, instead of biasing the normal case. */
543 return value_from_longest (type, -1);
544 }
8954db33
AB
545 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
546 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
547 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
548 error (_("Cannot convert between vector values of different sizes"));
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
550 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
551 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
552 else if (code1 == TYPE_CODE_VOID)
553 {
554 return value_zero (type, not_lval);
555 }
c906108c
SS
556 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
557 {
558 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 559 return value_cast_pointers (type, arg2, 0);
fb933624 560
0d5de010 561 arg2 = value_copy (arg2);
04624583 562 deprecated_set_value_type (arg2, type);
4dfea560 563 set_value_enclosing_type (arg2, type);
b44d461b 564 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
565 return arg2;
566 }
c906108c 567 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 568 return value_at_lazy (type, value_address (arg2));
c906108c
SS
569 else
570 {
8a3fe4f8 571 error (_("Invalid cast."));
c906108c
SS
572 return 0;
573 }
574}
575
4e8f195d
TT
576/* The C++ reinterpret_cast operator. */
577
578struct value *
579value_reinterpret_cast (struct type *type, struct value *arg)
580{
581 struct value *result;
582 struct type *real_type = check_typedef (type);
583 struct type *arg_type, *dest_type;
584 int is_ref = 0;
585 enum type_code dest_code, arg_code;
586
587 /* Do reference, function, and array conversion. */
588 arg = coerce_array (arg);
589
590 /* Attempt to preserve the type the user asked for. */
591 dest_type = type;
592
593 /* If we are casting to a reference type, transform
594 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
595 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
596 {
597 is_ref = 1;
598 arg = value_addr (arg);
599 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
600 real_type = lookup_pointer_type (real_type);
601 }
602
603 arg_type = value_type (arg);
604
605 dest_code = TYPE_CODE (real_type);
606 arg_code = TYPE_CODE (arg_type);
607
608 /* We can convert pointer types, or any pointer type to int, or int
609 type to pointer. */
610 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
611 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
612 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
613 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
614 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
616 || (dest_code == arg_code
617 && (dest_code == TYPE_CODE_PTR
618 || dest_code == TYPE_CODE_METHODPTR
619 || dest_code == TYPE_CODE_MEMBERPTR)))
620 result = value_cast (dest_type, arg);
621 else
622 error (_("Invalid reinterpret_cast"));
623
624 if (is_ref)
625 result = value_cast (type, value_ref (value_ind (result)));
626
627 return result;
628}
629
630/* A helper for value_dynamic_cast. This implements the first of two
631 runtime checks: we iterate over all the base classes of the value's
632 class which are equal to the desired class; if only one of these
633 holds the value, then it is the answer. */
634
635static int
636dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
637 const gdb_byte *valaddr,
638 int embedded_offset,
4e8f195d 639 CORE_ADDR address,
8af8e3bc 640 struct value *val,
4e8f195d
TT
641 struct type *search_type,
642 CORE_ADDR arg_addr,
643 struct type *arg_type,
644 struct value **result)
645{
646 int i, result_count = 0;
647
648 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
649 {
8af8e3bc
PA
650 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
651 address, val);
a109c7c1 652
4e8f195d
TT
653 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
654 {
8af8e3bc
PA
655 if (address + embedded_offset + offset >= arg_addr
656 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
657 {
658 ++result_count;
659 if (!*result)
660 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 661 address + embedded_offset + offset);
4e8f195d
TT
662 }
663 }
664 else
665 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
666 valaddr,
667 embedded_offset + offset,
668 address, val,
4e8f195d
TT
669 TYPE_BASECLASS (search_type, i),
670 arg_addr,
671 arg_type,
672 result);
673 }
674
675 return result_count;
676}
677
678/* A helper for value_dynamic_cast. This implements the second of two
679 runtime checks: we look for a unique public sibling class of the
680 argument's declared class. */
681
682static int
683dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
684 const gdb_byte *valaddr,
685 int embedded_offset,
4e8f195d 686 CORE_ADDR address,
8af8e3bc 687 struct value *val,
4e8f195d
TT
688 struct type *search_type,
689 struct value **result)
690{
691 int i, result_count = 0;
692
693 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
694 {
695 int offset;
696
697 if (! BASETYPE_VIA_PUBLIC (search_type, i))
698 continue;
699
8af8e3bc
PA
700 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
701 address, val);
4e8f195d
TT
702 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
703 {
704 ++result_count;
705 if (*result == NULL)
706 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 707 address + embedded_offset + offset);
4e8f195d
TT
708 }
709 else
710 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
711 valaddr,
712 embedded_offset + offset,
713 address, val,
4e8f195d
TT
714 TYPE_BASECLASS (search_type, i),
715 result);
716 }
717
718 return result_count;
719}
720
721/* The C++ dynamic_cast operator. */
722
723struct value *
724value_dynamic_cast (struct type *type, struct value *arg)
725{
8f78b329 726 int full, top, using_enc;
4e8f195d
TT
727 struct type *resolved_type = check_typedef (type);
728 struct type *arg_type = check_typedef (value_type (arg));
729 struct type *class_type, *rtti_type;
730 struct value *result, *tem, *original_arg = arg;
731 CORE_ADDR addr;
732 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
733
734 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
735 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
736 error (_("Argument to dynamic_cast must be a pointer or reference type"));
737 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
4753d33b 738 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_STRUCT)
4e8f195d
TT
739 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
740
741 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
742 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
743 {
744 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
745 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
746 && value_as_long (arg) == 0))
747 error (_("Argument to dynamic_cast does not have pointer type"));
748 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
749 {
750 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
4753d33b 751 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
3e43a32a
MS
752 error (_("Argument to dynamic_cast does "
753 "not have pointer to class type"));
4e8f195d
TT
754 }
755
756 /* Handle NULL pointers. */
757 if (value_as_long (arg) == 0)
758 return value_zero (type, not_lval);
759
760 arg = value_ind (arg);
761 }
762 else
763 {
4753d33b 764 if (TYPE_CODE (arg_type) != TYPE_CODE_STRUCT)
4e8f195d
TT
765 error (_("Argument to dynamic_cast does not have class type"));
766 }
767
768 /* If the classes are the same, just return the argument. */
769 if (class_types_same_p (class_type, arg_type))
770 return value_cast (type, arg);
771
772 /* If the target type is a unique base class of the argument's
773 declared type, just cast it. */
774 if (is_ancestor (class_type, arg_type))
775 {
776 if (is_unique_ancestor (class_type, arg))
777 return value_cast (type, original_arg);
778 error (_("Ambiguous dynamic_cast"));
779 }
780
781 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
782 if (! rtti_type)
783 error (_("Couldn't determine value's most derived type for dynamic_cast"));
784
785 /* Compute the most derived object's address. */
786 addr = value_address (arg);
787 if (full)
788 {
789 /* Done. */
790 }
791 else if (using_enc)
792 addr += top;
793 else
794 addr += top + value_embedded_offset (arg);
795
796 /* dynamic_cast<void *> means to return a pointer to the
797 most-derived object. */
798 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
799 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
800 return value_at_lazy (type, addr);
801
802 tem = value_at (type, addr);
9f1f738a 803 type = value_type (tem);
4e8f195d
TT
804
805 /* The first dynamic check specified in 5.2.7. */
806 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
807 {
808 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
809 return tem;
810 result = NULL;
811 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
812 value_contents_for_printing (tem),
813 value_embedded_offset (tem),
814 value_address (tem), tem,
4e8f195d
TT
815 rtti_type, addr,
816 arg_type,
817 &result) == 1)
818 return value_cast (type,
819 is_ref ? value_ref (result) : value_addr (result));
820 }
821
822 /* The second dynamic check specified in 5.2.7. */
823 result = NULL;
824 if (is_public_ancestor (arg_type, rtti_type)
825 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
826 value_contents_for_printing (tem),
827 value_embedded_offset (tem),
828 value_address (tem), tem,
4e8f195d
TT
829 rtti_type, &result) == 1)
830 return value_cast (type,
831 is_ref ? value_ref (result) : value_addr (result));
832
833 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
834 return value_zero (type, not_lval);
835
836 error (_("dynamic_cast failed"));
837}
838
c906108c
SS
839/* Create a value of type TYPE that is zero, and return it. */
840
f23631e4 841struct value *
fba45db2 842value_zero (struct type *type, enum lval_type lv)
c906108c 843{
f23631e4 844 struct value *val = allocate_value (type);
c906108c 845
bb7da2bf 846 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
847 return val;
848}
849
18a46dbe 850/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
851
852struct value *
18a46dbe 853value_one (struct type *type)
301f0ecf
DE
854{
855 struct type *type1 = check_typedef (type);
4e608b4f 856 struct value *val;
301f0ecf
DE
857
858 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
859 {
e17a4113 860 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 861 gdb_byte v[16];
a109c7c1 862
e17a4113 863 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
864 val = value_from_decfloat (type, v);
865 }
866 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
867 {
868 val = value_from_double (type, (DOUBLEST) 1);
869 }
870 else if (is_integral_type (type1))
871 {
872 val = value_from_longest (type, (LONGEST) 1);
873 }
120bd360
KW
874 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
875 {
876 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
877 int i;
878 LONGEST low_bound, high_bound;
120bd360
KW
879 struct value *tmp;
880
cfa6f054
KW
881 if (!get_array_bounds (type1, &low_bound, &high_bound))
882 error (_("Could not determine the vector bounds"));
883
120bd360 884 val = allocate_value (type);
cfa6f054 885 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 886 {
18a46dbe 887 tmp = value_one (eltype);
120bd360
KW
888 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
889 value_contents_all (tmp), TYPE_LENGTH (eltype));
890 }
891 }
301f0ecf
DE
892 else
893 {
894 error (_("Not a numeric type."));
895 }
896
18a46dbe
JK
897 /* value_one result is never used for assignments to. */
898 gdb_assert (VALUE_LVAL (val) == not_lval);
899
301f0ecf
DE
900 return val;
901}
902
80180f79
SA
903/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
904 The type of the created value may differ from the passed type TYPE.
905 Make sure to retrieve the returned values's new type after this call
906 e.g. in case the type is a variable length array. */
4e5d721f
DE
907
908static struct value *
909get_value_at (struct type *type, CORE_ADDR addr, int lazy)
910{
911 struct value *val;
912
913 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
914 error (_("Attempt to dereference a generic pointer."));
915
a3d34bf4 916 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 917
a3d34bf4
PA
918 if (!lazy)
919 value_fetch_lazy (val);
4e5d721f
DE
920
921 return val;
922}
923
070ad9f0 924/* Return a value with type TYPE located at ADDR.
c906108c
SS
925
926 Call value_at only if the data needs to be fetched immediately;
927 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
928 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 929 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 930 is tested in the value_contents macro, which is used if and when
80180f79
SA
931 the contents are actually required. The type of the created value
932 may differ from the passed type TYPE. Make sure to retrieve the
933 returned values's new type after this call e.g. in case the type
934 is a variable length array.
c906108c
SS
935
936 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 937 adjustments before or after calling it. */
c906108c 938
f23631e4 939struct value *
00a4c844 940value_at (struct type *type, CORE_ADDR addr)
c906108c 941{
4e5d721f 942 return get_value_at (type, addr, 0);
c906108c
SS
943}
944
80180f79
SA
945/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
946 The type of the created value may differ from the passed type TYPE.
947 Make sure to retrieve the returned values's new type after this call
948 e.g. in case the type is a variable length array. */
c906108c 949
f23631e4 950struct value *
00a4c844 951value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 952{
4e5d721f 953 return get_value_at (type, addr, 1);
c906108c
SS
954}
955
e6ca34fc
PA
956void
957read_value_memory (struct value *val, int embedded_offset,
958 int stack, CORE_ADDR memaddr,
959 gdb_byte *buffer, size_t length)
960{
5a2eb0ef
YQ
961 ULONGEST xfered = 0;
962
963 while (xfered < length)
964 {
965 enum target_xfer_status status;
966 ULONGEST xfered_len;
967
968 status = target_xfer_partial (current_target.beneath,
969 TARGET_OBJECT_MEMORY, NULL,
970 buffer + xfered, NULL,
971 memaddr + xfered, length - xfered,
972 &xfered_len);
973
974 if (status == TARGET_XFER_OK)
975 /* nothing */;
bc113b4e 976 else if (status == TARGET_XFER_UNAVAILABLE)
5a2eb0ef
YQ
977 mark_value_bytes_unavailable (val, embedded_offset + xfered,
978 xfered_len);
979 else if (status == TARGET_XFER_EOF)
980 memory_error (TARGET_XFER_E_IO, memaddr + xfered);
e6ca34fc 981 else
5a2eb0ef 982 memory_error (status, memaddr + xfered);
e6ca34fc 983
5a2eb0ef
YQ
984 xfered += xfered_len;
985 QUIT;
e6ca34fc
PA
986 }
987}
c906108c
SS
988
989/* Store the contents of FROMVAL into the location of TOVAL.
990 Return a new value with the location of TOVAL and contents of FROMVAL. */
991
f23631e4
AC
992struct value *
993value_assign (struct value *toval, struct value *fromval)
c906108c 994{
52f0bd74 995 struct type *type;
f23631e4 996 struct value *val;
cb741690 997 struct frame_id old_frame;
c906108c 998
88e3b34b 999 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1000 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1001
994b9211 1002 toval = coerce_ref (toval);
c906108c 1003
df407dfe 1004 type = value_type (toval);
c906108c 1005 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1006 fromval = value_cast (type, fromval);
c906108c 1007 else
63092375
DJ
1008 {
1009 /* Coerce arrays and functions to pointers, except for arrays
1010 which only live in GDB's storage. */
1011 if (!value_must_coerce_to_target (fromval))
1012 fromval = coerce_array (fromval);
1013 }
1014
c906108c
SS
1015 CHECK_TYPEDEF (type);
1016
ac3eeb49
MS
1017 /* Since modifying a register can trash the frame chain, and
1018 modifying memory can trash the frame cache, we save the old frame
1019 and then restore the new frame afterwards. */
206415a3 1020 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1021
c906108c
SS
1022 switch (VALUE_LVAL (toval))
1023 {
1024 case lval_internalvar:
1025 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1026 return value_of_internalvar (get_type_arch (type),
1027 VALUE_INTERNALVAR (toval));
c906108c
SS
1028
1029 case lval_internalvar_component:
d9e98382
SDJ
1030 {
1031 int offset = value_offset (toval);
1032
1033 /* Are we dealing with a bitfield?
1034
1035 It is important to mention that `value_parent (toval)' is
1036 non-NULL iff `value_bitsize (toval)' is non-zero. */
1037 if (value_bitsize (toval))
1038 {
1039 /* VALUE_INTERNALVAR below refers to the parent value, while
1040 the offset is relative to this parent value. */
1041 gdb_assert (value_parent (value_parent (toval)) == NULL);
1042 offset += value_offset (value_parent (toval));
1043 }
1044
1045 set_internalvar_component (VALUE_INTERNALVAR (toval),
1046 offset,
1047 value_bitpos (toval),
1048 value_bitsize (toval),
1049 fromval);
1050 }
c906108c
SS
1051 break;
1052
1053 case lval_memory:
1054 {
fc1a4b47 1055 const gdb_byte *dest_buffer;
c5aa993b
JM
1056 CORE_ADDR changed_addr;
1057 int changed_len;
10c42a71 1058 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1059
df407dfe 1060 if (value_bitsize (toval))
c5aa993b 1061 {
2d88202a 1062 struct value *parent = value_parent (toval);
2d88202a 1063
a109c7c1 1064 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1065 changed_len = (value_bitpos (toval)
1066 + value_bitsize (toval)
c5aa993b
JM
1067 + HOST_CHAR_BIT - 1)
1068 / HOST_CHAR_BIT;
c906108c 1069
4ea48cc1
DJ
1070 /* If we can read-modify-write exactly the size of the
1071 containing type (e.g. short or int) then do so. This
1072 is safer for volatile bitfields mapped to hardware
1073 registers. */
1074 if (changed_len < TYPE_LENGTH (type)
1075 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1076 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1077 changed_len = TYPE_LENGTH (type);
1078
c906108c 1079 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1080 error (_("Can't handle bitfields which "
1081 "don't fit in a %d bit word."),
baa6f10b 1082 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1083
2d88202a 1084 read_memory (changed_addr, buffer, changed_len);
50810684 1085 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1086 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1087 dest_buffer = buffer;
1088 }
c906108c
SS
1089 else
1090 {
42ae5230 1091 changed_addr = value_address (toval);
c906108c 1092 changed_len = TYPE_LENGTH (type);
0fd88904 1093 dest_buffer = value_contents (fromval);
c906108c
SS
1094 }
1095
972daa01 1096 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1097 }
1098 break;
1099
492254e9 1100 case lval_register:
c906108c 1101 {
c906108c 1102 struct frame_info *frame;
d80b854b 1103 struct gdbarch *gdbarch;
ff2e87ac 1104 int value_reg;
c906108c
SS
1105
1106 /* Figure out which frame this is in currently. */
0c16dd26
AC
1107 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1108 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1109
1110 if (!frame)
8a3fe4f8 1111 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1112
1113 gdbarch = get_frame_arch (frame);
3e871532
LM
1114
1115 if (value_bitsize (toval))
492254e9 1116 {
3e871532
LM
1117 struct value *parent = value_parent (toval);
1118 int offset = value_offset (parent) + value_offset (toval);
1119 int changed_len;
1120 gdb_byte buffer[sizeof (LONGEST)];
1121 int optim, unavail;
1122
1123 changed_len = (value_bitpos (toval)
1124 + value_bitsize (toval)
1125 + HOST_CHAR_BIT - 1)
1126 / HOST_CHAR_BIT;
1127
1128 if (changed_len > (int) sizeof (LONGEST))
1129 error (_("Can't handle bitfields which "
1130 "don't fit in a %d bit word."),
1131 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1132
1133 if (!get_frame_register_bytes (frame, value_reg, offset,
1134 changed_len, buffer,
1135 &optim, &unavail))
1136 {
1137 if (optim)
1138 throw_error (OPTIMIZED_OUT_ERROR,
1139 _("value has been optimized out"));
1140 if (unavail)
1141 throw_error (NOT_AVAILABLE_ERROR,
1142 _("value is not available"));
1143 }
1144
1145 modify_field (type, buffer, value_as_long (fromval),
1146 value_bitpos (toval), value_bitsize (toval));
1147
1148 put_frame_register_bytes (frame, value_reg, offset,
1149 changed_len, buffer);
492254e9 1150 }
c906108c 1151 else
492254e9 1152 {
3e871532
LM
1153 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval),
1154 type))
00fa51f6 1155 {
3e871532
LM
1156 /* If TOVAL is a special machine register requiring
1157 conversion of program values to a special raw
1158 format. */
1159 gdbarch_value_to_register (gdbarch, frame,
1160 VALUE_REGNUM (toval), type,
1161 value_contents (fromval));
00fa51f6 1162 }
c906108c 1163 else
00fa51f6
UW
1164 {
1165 put_frame_register_bytes (frame, value_reg,
1166 value_offset (toval),
1167 TYPE_LENGTH (type),
1168 value_contents (fromval));
1169 }
ff2e87ac 1170 }
00fa51f6 1171
162078c8 1172 observer_notify_register_changed (frame, value_reg);
ff2e87ac 1173 break;
c906108c 1174 }
5f5233d4
PA
1175
1176 case lval_computed:
1177 {
c8f2448a 1178 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1179
ac71a68c
JK
1180 if (funcs->write != NULL)
1181 {
1182 funcs->write (toval, fromval);
1183 break;
1184 }
5f5233d4 1185 }
ac71a68c 1186 /* Fall through. */
5f5233d4 1187
c906108c 1188 default:
8a3fe4f8 1189 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1190 }
1191
cb741690
DJ
1192 /* Assigning to the stack pointer, frame pointer, and other
1193 (architecture and calling convention specific) registers may
d649a38e 1194 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1195 also can. We just do this on all assignments to registers or
1196 memory, for simplicity's sake; I doubt the slowdown matters. */
1197 switch (VALUE_LVAL (toval))
1198 {
1199 case lval_memory:
1200 case lval_register:
0e03807e 1201 case lval_computed:
cb741690 1202
d649a38e 1203 observer_notify_target_changed (&current_target);
cb741690 1204
ac3eeb49
MS
1205 /* Having destroyed the frame cache, restore the selected
1206 frame. */
cb741690
DJ
1207
1208 /* FIXME: cagney/2002-11-02: There has to be a better way of
1209 doing this. Instead of constantly saving/restoring the
1210 frame. Why not create a get_selected_frame() function that,
1211 having saved the selected frame's ID can automatically
1212 re-find the previously selected frame automatically. */
1213
1214 {
1215 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1216
cb741690
DJ
1217 if (fi != NULL)
1218 select_frame (fi);
1219 }
1220
1221 break;
1222 default:
1223 break;
1224 }
1225
ac3eeb49
MS
1226 /* If the field does not entirely fill a LONGEST, then zero the sign
1227 bits. If the field is signed, and is negative, then sign
1228 extend. */
df407dfe
AC
1229 if ((value_bitsize (toval) > 0)
1230 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1231 {
1232 LONGEST fieldval = value_as_long (fromval);
df407dfe 1233 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1234
1235 fieldval &= valmask;
ac3eeb49
MS
1236 if (!TYPE_UNSIGNED (type)
1237 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1238 fieldval |= ~valmask;
1239
1240 fromval = value_from_longest (type, fieldval);
1241 }
1242
4aac0db7
UW
1243 /* The return value is a copy of TOVAL so it shares its location
1244 information, but its contents are updated from FROMVAL. This
1245 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1246 val = value_copy (toval);
4aac0db7 1247 set_value_lazy (val, 0);
0fd88904 1248 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1249 TYPE_LENGTH (type));
4aac0db7
UW
1250
1251 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1252 in the case of pointer types. For object types, the enclosing type
1253 and embedded offset must *not* be copied: the target object refered
1254 to by TOVAL retains its original dynamic type after assignment. */
1255 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1256 {
1257 set_value_enclosing_type (val, value_enclosing_type (fromval));
1258 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1259 }
c5aa993b 1260
c906108c
SS
1261 return val;
1262}
1263
1264/* Extend a value VAL to COUNT repetitions of its type. */
1265
f23631e4
AC
1266struct value *
1267value_repeat (struct value *arg1, int count)
c906108c 1268{
f23631e4 1269 struct value *val;
c906108c
SS
1270
1271 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1272 error (_("Only values in memory can be extended with '@'."));
c906108c 1273 if (count < 1)
8a3fe4f8 1274 error (_("Invalid number %d of repetitions."), count);
c906108c 1275
4754a64e 1276 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1277
c906108c 1278 VALUE_LVAL (val) = lval_memory;
42ae5230 1279 set_value_address (val, value_address (arg1));
c906108c 1280
24e6bcee
PA
1281 read_value_memory (val, 0, value_stack (val), value_address (val),
1282 value_contents_all_raw (val),
1283 TYPE_LENGTH (value_enclosing_type (val)));
1284
c906108c
SS
1285 return val;
1286}
1287
f23631e4 1288struct value *
9df2fbc4 1289value_of_variable (struct symbol *var, const struct block *b)
c906108c 1290{
61212c0f 1291 struct frame_info *frame;
c906108c 1292
61212c0f
UW
1293 if (!symbol_read_needs_frame (var))
1294 frame = NULL;
1295 else if (!b)
1296 frame = get_selected_frame (_("No frame selected."));
1297 else
c906108c
SS
1298 {
1299 frame = block_innermost_frame (b);
1300 if (!frame)
c5aa993b 1301 {
edb3359d 1302 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1303 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1304 error (_("No frame is currently executing in block %s."),
de5ad195 1305 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1306 else
8a3fe4f8 1307 error (_("No frame is currently executing in specified block"));
c5aa993b 1308 }
c906108c
SS
1309 }
1310
8afd712c 1311 return read_var_value (var, frame);
c906108c
SS
1312}
1313
61212c0f 1314struct value *
270140bd 1315address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1316{
1317 struct type *type = SYMBOL_TYPE (var);
1318 struct value *val;
1319
1320 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1321 Lazy evaluation pays off here. */
61212c0f
UW
1322
1323 val = value_of_variable (var, b);
9f1f738a 1324 type = value_type (val);
61212c0f
UW
1325
1326 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1327 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1328 {
42ae5230 1329 CORE_ADDR addr = value_address (val);
a109c7c1 1330
61212c0f
UW
1331 return value_from_pointer (lookup_pointer_type (type), addr);
1332 }
1333
1334 /* Not a memory address; check what the problem was. */
1335 switch (VALUE_LVAL (val))
1336 {
1337 case lval_register:
1338 {
1339 struct frame_info *frame;
1340 const char *regname;
1341
1342 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1343 gdb_assert (frame);
1344
1345 regname = gdbarch_register_name (get_frame_arch (frame),
1346 VALUE_REGNUM (val));
1347 gdb_assert (regname && *regname);
1348
1349 error (_("Address requested for identifier "
1350 "\"%s\" which is in register $%s"),
1351 SYMBOL_PRINT_NAME (var), regname);
1352 break;
1353 }
1354
1355 default:
1356 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1357 SYMBOL_PRINT_NAME (var));
1358 break;
1359 }
1360
1361 return val;
1362}
1363
63092375
DJ
1364/* Return one if VAL does not live in target memory, but should in order
1365 to operate on it. Otherwise return zero. */
1366
1367int
1368value_must_coerce_to_target (struct value *val)
1369{
1370 struct type *valtype;
1371
1372 /* The only lval kinds which do not live in target memory. */
1373 if (VALUE_LVAL (val) != not_lval
e81e7f5e
SC
1374 && VALUE_LVAL (val) != lval_internalvar
1375 && VALUE_LVAL (val) != lval_xcallable)
63092375
DJ
1376 return 0;
1377
1378 valtype = check_typedef (value_type (val));
1379
1380 switch (TYPE_CODE (valtype))
1381 {
1382 case TYPE_CODE_ARRAY:
3cbaedff 1383 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1384 case TYPE_CODE_STRING:
1385 return 1;
1386 default:
1387 return 0;
1388 }
1389}
1390
3e43a32a
MS
1391/* Make sure that VAL lives in target memory if it's supposed to. For
1392 instance, strings are constructed as character arrays in GDB's
1393 storage, and this function copies them to the target. */
63092375
DJ
1394
1395struct value *
1396value_coerce_to_target (struct value *val)
1397{
1398 LONGEST length;
1399 CORE_ADDR addr;
1400
1401 if (!value_must_coerce_to_target (val))
1402 return val;
1403
1404 length = TYPE_LENGTH (check_typedef (value_type (val)));
1405 addr = allocate_space_in_inferior (length);
1406 write_memory (addr, value_contents (val), length);
1407 return value_at_lazy (value_type (val), addr);
1408}
1409
ac3eeb49
MS
1410/* Given a value which is an array, return a value which is a pointer
1411 to its first element, regardless of whether or not the array has a
1412 nonzero lower bound.
c906108c 1413
ac3eeb49
MS
1414 FIXME: A previous comment here indicated that this routine should
1415 be substracting the array's lower bound. It's not clear to me that
1416 this is correct. Given an array subscripting operation, it would
1417 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1418
1419 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1420
ac3eeb49
MS
1421 However I believe a more appropriate and logical place to account
1422 for the lower bound is to do so in value_subscript, essentially
1423 computing:
c906108c
SS
1424
1425 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1426
ac3eeb49
MS
1427 As further evidence consider what would happen with operations
1428 other than array subscripting, where the caller would get back a
1429 value that had an address somewhere before the actual first element
1430 of the array, and the information about the lower bound would be
581e13c1 1431 lost because of the coercion to pointer type. */
c906108c 1432
f23631e4
AC
1433struct value *
1434value_coerce_array (struct value *arg1)
c906108c 1435{
df407dfe 1436 struct type *type = check_typedef (value_type (arg1));
c906108c 1437
63092375
DJ
1438 /* If the user tries to do something requiring a pointer with an
1439 array that has not yet been pushed to the target, then this would
1440 be a good time to do so. */
1441 arg1 = value_coerce_to_target (arg1);
1442
c906108c 1443 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1444 error (_("Attempt to take address of value not located in memory."));
c906108c 1445
4478b372 1446 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1447 value_address (arg1));
c906108c
SS
1448}
1449
1450/* Given a value which is a function, return a value which is a pointer
1451 to it. */
1452
f23631e4
AC
1453struct value *
1454value_coerce_function (struct value *arg1)
c906108c 1455{
f23631e4 1456 struct value *retval;
c906108c
SS
1457
1458 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1459 error (_("Attempt to take address of value not located in memory."));
c906108c 1460
df407dfe 1461 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1462 value_address (arg1));
c906108c 1463 return retval;
c5aa993b 1464}
c906108c 1465
ac3eeb49
MS
1466/* Return a pointer value for the object for which ARG1 is the
1467 contents. */
c906108c 1468
f23631e4
AC
1469struct value *
1470value_addr (struct value *arg1)
c906108c 1471{
f23631e4 1472 struct value *arg2;
df407dfe 1473 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1474
c906108c
SS
1475 if (TYPE_CODE (type) == TYPE_CODE_REF)
1476 {
ac3eeb49
MS
1477 /* Copy the value, but change the type from (T&) to (T*). We
1478 keep the same location information, which is efficient, and
1479 allows &(&X) to get the location containing the reference. */
c906108c 1480 arg2 = value_copy (arg1);
ac3eeb49
MS
1481 deprecated_set_value_type (arg2,
1482 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1483 return arg2;
1484 }
1485 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1486 return value_coerce_function (arg1);
1487
63092375
DJ
1488 /* If this is an array that has not yet been pushed to the target,
1489 then this would be a good time to force it to memory. */
1490 arg1 = value_coerce_to_target (arg1);
1491
c906108c 1492 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1493 error (_("Attempt to take address of value not located in memory."));
c906108c 1494
581e13c1 1495 /* Get target memory address. */
df407dfe 1496 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1497 (value_address (arg1)
13c3b5f5 1498 + value_embedded_offset (arg1)));
c906108c
SS
1499
1500 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1501 full derived object's type ... */
4dfea560
DE
1502 set_value_enclosing_type (arg2,
1503 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1504 /* ... and also the relative position of the subobject in the full
1505 object. */
b44d461b 1506 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1507 return arg2;
1508}
1509
ac3eeb49
MS
1510/* Return a reference value for the object for which ARG1 is the
1511 contents. */
fb933624
DJ
1512
1513struct value *
1514value_ref (struct value *arg1)
1515{
1516 struct value *arg2;
fb933624 1517 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1518
fb933624
DJ
1519 if (TYPE_CODE (type) == TYPE_CODE_REF)
1520 return arg1;
1521
1522 arg2 = value_addr (arg1);
1523 deprecated_set_value_type (arg2, lookup_reference_type (type));
1524 return arg2;
1525}
1526
ac3eeb49
MS
1527/* Given a value of a pointer type, apply the C unary * operator to
1528 it. */
c906108c 1529
f23631e4
AC
1530struct value *
1531value_ind (struct value *arg1)
c906108c
SS
1532{
1533 struct type *base_type;
f23631e4 1534 struct value *arg2;
c906108c 1535
994b9211 1536 arg1 = coerce_array (arg1);
c906108c 1537
df407dfe 1538 base_type = check_typedef (value_type (arg1));
c906108c 1539
8cf6f0b1
TT
1540 if (VALUE_LVAL (arg1) == lval_computed)
1541 {
c8f2448a 1542 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1543
1544 if (funcs->indirect)
1545 {
1546 struct value *result = funcs->indirect (arg1);
1547
1548 if (result)
1549 return result;
1550 }
1551 }
1552
22fe0fbb 1553 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1554 {
1555 struct type *enc_type;
a109c7c1 1556
ac3eeb49
MS
1557 /* We may be pointing to something embedded in a larger object.
1558 Get the real type of the enclosing object. */
4754a64e 1559 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1560 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1561
1562 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1563 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1564 /* For functions, go through find_function_addr, which knows
1565 how to handle function descriptors. */
ac3eeb49
MS
1566 arg2 = value_at_lazy (enc_type,
1567 find_function_addr (arg1, NULL));
0d5de010 1568 else
581e13c1 1569 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1570 arg2 = value_at_lazy (enc_type,
1571 (value_as_address (arg1)
1572 - value_pointed_to_offset (arg1)));
0d5de010 1573
9f1f738a 1574 enc_type = value_type (arg2);
dfcee124 1575 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1576 }
1577
8a3fe4f8 1578 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1579 return 0; /* For lint -- never reached. */
c906108c
SS
1580}
1581\f
39d37385
PA
1582/* Create a value for an array by allocating space in GDB, copying the
1583 data into that space, and then setting up an array value.
c906108c 1584
ac3eeb49
MS
1585 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1586 is populated from the values passed in ELEMVEC.
c906108c
SS
1587
1588 The element type of the array is inherited from the type of the
1589 first element, and all elements must have the same size (though we
ac3eeb49 1590 don't currently enforce any restriction on their types). */
c906108c 1591
f23631e4
AC
1592struct value *
1593value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1594{
1595 int nelem;
1596 int idx;
1597 unsigned int typelength;
f23631e4 1598 struct value *val;
c906108c 1599 struct type *arraytype;
c906108c 1600
ac3eeb49
MS
1601 /* Validate that the bounds are reasonable and that each of the
1602 elements have the same size. */
c906108c
SS
1603
1604 nelem = highbound - lowbound + 1;
1605 if (nelem <= 0)
1606 {
8a3fe4f8 1607 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1608 }
4754a64e 1609 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1610 for (idx = 1; idx < nelem; idx++)
1611 {
4754a64e 1612 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1613 {
8a3fe4f8 1614 error (_("array elements must all be the same size"));
c906108c
SS
1615 }
1616 }
1617
e3506a9f
UW
1618 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1619 lowbound, highbound);
c906108c
SS
1620
1621 if (!current_language->c_style_arrays)
1622 {
1623 val = allocate_value (arraytype);
1624 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1625 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1626 typelength);
c906108c
SS
1627 return val;
1628 }
1629
63092375
DJ
1630 /* Allocate space to store the array, and then initialize it by
1631 copying in each element. */
c906108c 1632
63092375 1633 val = allocate_value (arraytype);
c906108c 1634 for (idx = 0; idx < nelem; idx++)
39d37385 1635 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1636 return val;
c906108c
SS
1637}
1638
6c7a06a3 1639struct value *
63375b74 1640value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1641{
1642 struct value *val;
1643 int lowbound = current_language->string_lower_bound;
63375b74 1644 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1645 struct type *stringtype
e3506a9f 1646 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1647
1648 val = allocate_value (stringtype);
1649 memcpy (value_contents_raw (val), ptr, len);
1650 return val;
1651}
1652
ac3eeb49
MS
1653/* Create a value for a string constant by allocating space in the
1654 inferior, copying the data into that space, and returning the
1655 address with type TYPE_CODE_STRING. PTR points to the string
1656 constant data; LEN is number of characters.
1657
1658 Note that string types are like array of char types with a lower
1659 bound of zero and an upper bound of LEN - 1. Also note that the
1660 string may contain embedded null bytes. */
c906108c 1661
f23631e4 1662struct value *
63375b74 1663value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1664{
f23631e4 1665 struct value *val;
c906108c 1666 int lowbound = current_language->string_lower_bound;
63375b74 1667 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1668 struct type *stringtype
e3506a9f 1669 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1670
3b7538c0
UW
1671 val = allocate_value (stringtype);
1672 memcpy (value_contents_raw (val), ptr, len);
1673 return val;
c906108c
SS
1674}
1675
c906108c 1676\f
ac3eeb49
MS
1677/* See if we can pass arguments in T2 to a function which takes
1678 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1679 a NULL-terminated vector. If some arguments need coercion of some
1680 sort, then the coerced values are written into T2. Return value is
1681 0 if the arguments could be matched, or the position at which they
1682 differ if not.
c906108c 1683
ac3eeb49
MS
1684 STATICP is nonzero if the T1 argument list came from a static
1685 member function. T2 will still include the ``this'' pointer, but
1686 it will be skipped.
c906108c
SS
1687
1688 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1689 which is the type of the instance variable. This is because we
1690 want to handle calls with objects from derived classes. This is
1691 not entirely correct: we should actually check to make sure that a
c906108c
SS
1692 requested operation is type secure, shouldn't we? FIXME. */
1693
1694static int
ad2f7632
DJ
1695typecmp (int staticp, int varargs, int nargs,
1696 struct field t1[], struct value *t2[])
c906108c
SS
1697{
1698 int i;
1699
1700 if (t2 == 0)
ac3eeb49
MS
1701 internal_error (__FILE__, __LINE__,
1702 _("typecmp: no argument list"));
ad2f7632 1703
ac3eeb49
MS
1704 /* Skip ``this'' argument if applicable. T2 will always include
1705 THIS. */
4a1970e4 1706 if (staticp)
ad2f7632
DJ
1707 t2 ++;
1708
1709 for (i = 0;
1710 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1711 i++)
c906108c 1712 {
c5aa993b 1713 struct type *tt1, *tt2;
ad2f7632 1714
c5aa993b
JM
1715 if (!t2[i])
1716 return i + 1;
ad2f7632
DJ
1717
1718 tt1 = check_typedef (t1[i].type);
df407dfe 1719 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1720
c906108c 1721 if (TYPE_CODE (tt1) == TYPE_CODE_REF
8301c89e 1722 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1723 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1724 == TYPE_CODE (tt2)))
c906108c
SS
1725 {
1726 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1727 t2[i] = value_coerce_array (t2[i]);
1728 else
fb933624 1729 t2[i] = value_ref (t2[i]);
c906108c
SS
1730 continue;
1731 }
1732
802db21b
DB
1733 /* djb - 20000715 - Until the new type structure is in the
1734 place, and we can attempt things like implicit conversions,
1735 we need to do this so you can take something like a map<const
1736 char *>, and properly access map["hello"], because the
1737 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1738 and the argument will be a pointer to a char. */
1739 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1740 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1741 {
1742 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1743 }
ac3eeb49
MS
1744 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1745 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1746 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1747 {
ac3eeb49 1748 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1749 }
c5aa993b
JM
1750 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1751 continue;
ac3eeb49
MS
1752 /* Array to pointer is a `trivial conversion' according to the
1753 ARM. */
c906108c 1754
ac3eeb49
MS
1755 /* We should be doing much hairier argument matching (see
1756 section 13.2 of the ARM), but as a quick kludge, just check
1757 for the same type code. */
df407dfe 1758 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1759 return i + 1;
c906108c 1760 }
ad2f7632 1761 if (varargs || t2[i] == NULL)
c5aa993b 1762 return 0;
ad2f7632 1763 return i + 1;
c906108c
SS
1764}
1765
b1af9e97
TT
1766/* Helper class for do_search_struct_field that updates *RESULT_PTR
1767 and *LAST_BOFFSET, and possibly throws an exception if the field
1768 search has yielded ambiguous results. */
c906108c 1769
b1af9e97
TT
1770static void
1771update_search_result (struct value **result_ptr, struct value *v,
1772 int *last_boffset, int boffset,
1773 const char *name, struct type *type)
1774{
1775 if (v != NULL)
1776 {
1777 if (*result_ptr != NULL
1778 /* The result is not ambiguous if all the classes that are
1779 found occupy the same space. */
1780 && *last_boffset != boffset)
1781 error (_("base class '%s' is ambiguous in type '%s'"),
1782 name, TYPE_SAFE_NAME (type));
1783 *result_ptr = v;
1784 *last_boffset = boffset;
1785 }
1786}
c906108c 1787
b1af9e97
TT
1788/* A helper for search_struct_field. This does all the work; most
1789 arguments are as passed to search_struct_field. The result is
1790 stored in *RESULT_PTR, which must be initialized to NULL.
1791 OUTERMOST_TYPE is the type of the initial type passed to
1792 search_struct_field; this is used for error reporting when the
1793 lookup is ambiguous. */
1794
1795static void
1796do_search_struct_field (const char *name, struct value *arg1, int offset,
1797 struct type *type, int looking_for_baseclass,
1798 struct value **result_ptr,
1799 int *last_boffset,
1800 struct type *outermost_type)
c906108c
SS
1801{
1802 int i;
edf3d5f3 1803 int nbases;
c906108c
SS
1804
1805 CHECK_TYPEDEF (type);
edf3d5f3 1806 nbases = TYPE_N_BASECLASSES (type);
c906108c 1807
c5aa993b 1808 if (!looking_for_baseclass)
c906108c
SS
1809 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1810 {
0d5cff50 1811 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1812
db577aea 1813 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1814 {
f23631e4 1815 struct value *v;
a109c7c1 1816
d6a843b5 1817 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1818 v = value_static_field (type, i);
c906108c 1819 else
b1af9e97
TT
1820 v = value_primitive_field (arg1, offset, i, type);
1821 *result_ptr = v;
1822 return;
c906108c
SS
1823 }
1824
1825 if (t_field_name
47c6ee49 1826 && t_field_name[0] == '\0')
c906108c
SS
1827 {
1828 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1829
c906108c
SS
1830 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1831 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1832 {
ac3eeb49
MS
1833 /* Look for a match through the fields of an anonymous
1834 union, or anonymous struct. C++ provides anonymous
1835 unions.
c906108c 1836
1b831c93
AC
1837 In the GNU Chill (now deleted from GDB)
1838 implementation of variant record types, each
1839 <alternative field> has an (anonymous) union type,
1840 each member of the union represents a <variant
1841 alternative>. Each <variant alternative> is
1842 represented as a struct, with a member for each
1843 <variant field>. */
c5aa993b 1844
b1af9e97 1845 struct value *v = NULL;
c906108c
SS
1846 int new_offset = offset;
1847
db034ac5
AC
1848 /* This is pretty gross. In G++, the offset in an
1849 anonymous union is relative to the beginning of the
1b831c93
AC
1850 enclosing struct. In the GNU Chill (now deleted
1851 from GDB) implementation of variant records, the
1852 bitpos is zero in an anonymous union field, so we
ac3eeb49 1853 have to add the offset of the union here. */
c906108c
SS
1854 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1855 || (TYPE_NFIELDS (field_type) > 0
1856 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1857 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1858
b1af9e97
TT
1859 do_search_struct_field (name, arg1, new_offset,
1860 field_type,
1861 looking_for_baseclass, &v,
1862 last_boffset,
1863 outermost_type);
c906108c 1864 if (v)
b1af9e97
TT
1865 {
1866 *result_ptr = v;
1867 return;
1868 }
c906108c
SS
1869 }
1870 }
1871 }
1872
c5aa993b 1873 for (i = 0; i < nbases; i++)
c906108c 1874 {
b1af9e97 1875 struct value *v = NULL;
c906108c 1876 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1877 /* If we are looking for baseclasses, this is what we get when
1878 we hit them. But it could happen that the base part's member
1879 name is not yet filled in. */
c906108c
SS
1880 int found_baseclass = (looking_for_baseclass
1881 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1882 && (strcmp_iw (name,
1883 TYPE_BASECLASS_NAME (type,
1884 i)) == 0));
b1af9e97 1885 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1886
1887 if (BASETYPE_VIA_VIRTUAL (type, i))
1888 {
3e3d7139 1889 struct value *v2;
c906108c
SS
1890
1891 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1892 value_contents_for_printing (arg1),
1893 value_embedded_offset (arg1) + offset,
1894 value_address (arg1),
1895 arg1);
c906108c 1896
ac3eeb49 1897 /* The virtual base class pointer might have been clobbered
581e13c1 1898 by the user program. Make sure that it still points to a
ac3eeb49 1899 valid memory location. */
c906108c 1900
1a334831
TT
1901 boffset += value_embedded_offset (arg1) + offset;
1902 if (boffset < 0
1903 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1904 {
1905 CORE_ADDR base_addr;
c5aa993b 1906
42ae5230 1907 base_addr = value_address (arg1) + boffset;
08039c9e 1908 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1909 if (target_read_memory (base_addr,
1910 value_contents_raw (v2),
acc900c2 1911 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1912 error (_("virtual baseclass botch"));
c906108c
SS
1913 }
1914 else
1915 {
1a334831
TT
1916 v2 = value_copy (arg1);
1917 deprecated_set_value_type (v2, basetype);
1918 set_value_embedded_offset (v2, boffset);
c906108c
SS
1919 }
1920
1921 if (found_baseclass)
b1af9e97
TT
1922 v = v2;
1923 else
1924 {
1925 do_search_struct_field (name, v2, 0,
1926 TYPE_BASECLASS (type, i),
1927 looking_for_baseclass,
1928 result_ptr, last_boffset,
1929 outermost_type);
1930 }
c906108c
SS
1931 }
1932 else if (found_baseclass)
1933 v = value_primitive_field (arg1, offset, i, type);
1934 else
b1af9e97
TT
1935 {
1936 do_search_struct_field (name, arg1,
1937 offset + TYPE_BASECLASS_BITPOS (type,
1938 i) / 8,
1939 basetype, looking_for_baseclass,
1940 result_ptr, last_boffset,
1941 outermost_type);
1942 }
1943
1944 update_search_result (result_ptr, v, last_boffset,
1945 boffset, name, outermost_type);
c906108c 1946 }
b1af9e97
TT
1947}
1948
1949/* Helper function used by value_struct_elt to recurse through
8a13d42d
SM
1950 baseclasses. Look for a field NAME in ARG1. Search in it assuming
1951 it has (class) type TYPE. If found, return value, else return NULL.
b1af9e97
TT
1952
1953 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1954 fields, look for a baseclass named NAME. */
1955
1956static struct value *
8a13d42d 1957search_struct_field (const char *name, struct value *arg1,
b1af9e97
TT
1958 struct type *type, int looking_for_baseclass)
1959{
1960 struct value *result = NULL;
1961 int boffset = 0;
1962
8a13d42d 1963 do_search_struct_field (name, arg1, 0, type, looking_for_baseclass,
b1af9e97
TT
1964 &result, &boffset, type);
1965 return result;
c906108c
SS
1966}
1967
ac3eeb49 1968/* Helper function used by value_struct_elt to recurse through
581e13c1 1969 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1970 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1971 TYPE.
1972
1973 If found, return value, else if name matched and args not return
1974 (value) -1, else return NULL. */
c906108c 1975
f23631e4 1976static struct value *
714f19d5 1977search_struct_method (const char *name, struct value **arg1p,
f23631e4 1978 struct value **args, int offset,
aa1ee363 1979 int *static_memfuncp, struct type *type)
c906108c
SS
1980{
1981 int i;
f23631e4 1982 struct value *v;
c906108c
SS
1983 int name_matched = 0;
1984 char dem_opname[64];
1985
1986 CHECK_TYPEDEF (type);
1987 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1988 {
0d5cff50 1989 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1990
581e13c1 1991 /* FIXME! May need to check for ARM demangling here. */
61012eef
GB
1992 if (startswith (t_field_name, "__") ||
1993 startswith (t_field_name, "op") ||
1994 startswith (t_field_name, "type"))
c906108c 1995 {
c5aa993b
JM
1996 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
1997 t_field_name = dem_opname;
1998 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 1999 t_field_name = dem_opname;
c906108c 2000 }
db577aea 2001 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2002 {
2003 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2004 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2005
a109c7c1 2006 name_matched = 1;
de17c821 2007 check_stub_method_group (type, i);
c906108c 2008 if (j > 0 && args == 0)
3e43a32a
MS
2009 error (_("cannot resolve overloaded method "
2010 "`%s': no arguments supplied"), name);
acf5ed49 2011 else if (j == 0 && args == 0)
c906108c 2012 {
acf5ed49
DJ
2013 v = value_fn_field (arg1p, f, j, type, offset);
2014 if (v != NULL)
2015 return v;
c906108c 2016 }
acf5ed49
DJ
2017 else
2018 while (j >= 0)
2019 {
acf5ed49 2020 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2021 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2022 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2023 TYPE_FN_FIELD_ARGS (f, j), args))
2024 {
2025 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2026 return value_virtual_fn_field (arg1p, f, j,
2027 type, offset);
2028 if (TYPE_FN_FIELD_STATIC_P (f, j)
2029 && static_memfuncp)
acf5ed49
DJ
2030 *static_memfuncp = 1;
2031 v = value_fn_field (arg1p, f, j, type, offset);
2032 if (v != NULL)
2033 return v;
2034 }
2035 j--;
2036 }
c906108c
SS
2037 }
2038 }
2039
2040 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2041 {
2042 int base_offset;
8af8e3bc 2043 int this_offset;
c906108c
SS
2044
2045 if (BASETYPE_VIA_VIRTUAL (type, i))
2046 {
086280be 2047 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2048 struct value *base_val;
086280be
UW
2049 const gdb_byte *base_valaddr;
2050
2051 /* The virtual base class pointer might have been
581e13c1 2052 clobbered by the user program. Make sure that it
8301c89e 2053 still points to a valid memory location. */
086280be
UW
2054
2055 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2056 {
6c18f3e0
SP
2057 gdb_byte *tmp;
2058 struct cleanup *back_to;
2059 CORE_ADDR address;
2060
2061 tmp = xmalloc (TYPE_LENGTH (baseclass));
2062 back_to = make_cleanup (xfree, tmp);
2063 address = value_address (*arg1p);
a109c7c1 2064
8af8e3bc 2065 if (target_read_memory (address + offset,
086280be
UW
2066 tmp, TYPE_LENGTH (baseclass)) != 0)
2067 error (_("virtual baseclass botch"));
8af8e3bc
PA
2068
2069 base_val = value_from_contents_and_address (baseclass,
2070 tmp,
2071 address + offset);
2072 base_valaddr = value_contents_for_printing (base_val);
2073 this_offset = 0;
6c18f3e0 2074 do_cleanups (back_to);
c5aa993b
JM
2075 }
2076 else
8af8e3bc
PA
2077 {
2078 base_val = *arg1p;
2079 base_valaddr = value_contents_for_printing (*arg1p);
2080 this_offset = offset;
2081 }
c5aa993b 2082
086280be 2083 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2084 this_offset, value_address (base_val),
2085 base_val);
c5aa993b 2086 }
c906108c
SS
2087 else
2088 {
2089 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2090 }
c906108c
SS
2091 v = search_struct_method (name, arg1p, args, base_offset + offset,
2092 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2093 if (v == (struct value *) - 1)
c906108c
SS
2094 {
2095 name_matched = 1;
2096 }
2097 else if (v)
2098 {
ac3eeb49
MS
2099 /* FIXME-bothner: Why is this commented out? Why is it here? */
2100 /* *arg1p = arg1_tmp; */
c906108c 2101 return v;
c5aa993b 2102 }
c906108c 2103 }
c5aa993b 2104 if (name_matched)
f23631e4 2105 return (struct value *) - 1;
c5aa993b
JM
2106 else
2107 return NULL;
c906108c
SS
2108}
2109
2110/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2111 extract the component named NAME from the ultimate target
2112 structure/union and return it as a value with its appropriate type.
c906108c
SS
2113 ERR is used in the error message if *ARGP's type is wrong.
2114
2115 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2116 an appropriate method. Also, handle derived types.
c906108c
SS
2117
2118 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2119 where the truthvalue of whether the function that was resolved was
2120 a static member function or not is stored.
2121
ac3eeb49
MS
2122 ERR is an error message to be printed in case the field is not
2123 found. */
c906108c 2124
f23631e4
AC
2125struct value *
2126value_struct_elt (struct value **argp, struct value **args,
714f19d5 2127 const char *name, int *static_memfuncp, const char *err)
c906108c 2128{
52f0bd74 2129 struct type *t;
f23631e4 2130 struct value *v;
c906108c 2131
994b9211 2132 *argp = coerce_array (*argp);
c906108c 2133
df407dfe 2134 t = check_typedef (value_type (*argp));
c906108c
SS
2135
2136 /* Follow pointers until we get to a non-pointer. */
2137
2138 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2139 {
2140 *argp = value_ind (*argp);
2141 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2142 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2143 *argp = coerce_array (*argp);
df407dfe 2144 t = check_typedef (value_type (*argp));
c906108c
SS
2145 }
2146
c5aa993b 2147 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2148 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2149 error (_("Attempt to extract a component of a value that is not a %s."),
2150 err);
c906108c
SS
2151
2152 /* Assume it's not, unless we see that it is. */
2153 if (static_memfuncp)
c5aa993b 2154 *static_memfuncp = 0;
c906108c
SS
2155
2156 if (!args)
2157 {
2158 /* if there are no arguments ...do this... */
2159
ac3eeb49
MS
2160 /* Try as a field first, because if we succeed, there is less
2161 work to be done. */
8a13d42d 2162 v = search_struct_field (name, *argp, t, 0);
c906108c
SS
2163 if (v)
2164 return v;
2165
2166 /* C++: If it was not found as a data field, then try to
7b83ea04 2167 return it as a pointer to a method. */
ac3eeb49
MS
2168 v = search_struct_method (name, argp, args, 0,
2169 static_memfuncp, t);
c906108c 2170
f23631e4 2171 if (v == (struct value *) - 1)
55b39184 2172 error (_("Cannot take address of method %s."), name);
c906108c
SS
2173 else if (v == 0)
2174 {
2175 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2176 error (_("There is no member or method named %s."), name);
c906108c 2177 else
8a3fe4f8 2178 error (_("There is no member named %s."), name);
c906108c
SS
2179 }
2180 return v;
2181 }
2182
8301c89e
DE
2183 v = search_struct_method (name, argp, args, 0,
2184 static_memfuncp, t);
7168a814 2185
f23631e4 2186 if (v == (struct value *) - 1)
c906108c 2187 {
3e43a32a
MS
2188 error (_("One of the arguments you tried to pass to %s could not "
2189 "be converted to what the function wants."), name);
c906108c
SS
2190 }
2191 else if (v == 0)
2192 {
ac3eeb49
MS
2193 /* See if user tried to invoke data as function. If so, hand it
2194 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2195 gdb should give an error. */
8a13d42d 2196 v = search_struct_field (name, *argp, t, 0);
fa8de41e
TT
2197 /* If we found an ordinary field, then it is not a method call.
2198 So, treat it as if it were a static member function. */
2199 if (v && static_memfuncp)
2200 *static_memfuncp = 1;
c906108c
SS
2201 }
2202
2203 if (!v)
79afc5ef
SW
2204 throw_error (NOT_FOUND_ERROR,
2205 _("Structure has no component named %s."), name);
c906108c
SS
2206 return v;
2207}
2208
b5b08fb4
SC
2209/* Given *ARGP, a value of type structure or union, or a pointer/reference
2210 to a structure or union, extract and return its component (field) of
2211 type FTYPE at the specified BITPOS.
2212 Throw an exception on error. */
2213
2214struct value *
2215value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2216 const char *err)
2217{
2218 struct type *t;
2219 struct value *v;
2220 int i;
2221 int nbases;
2222
2223 *argp = coerce_array (*argp);
2224
2225 t = check_typedef (value_type (*argp));
2226
2227 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2228 {
2229 *argp = value_ind (*argp);
2230 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2231 *argp = coerce_array (*argp);
2232 t = check_typedef (value_type (*argp));
2233 }
2234
2235 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2236 && TYPE_CODE (t) != TYPE_CODE_UNION)
2237 error (_("Attempt to extract a component of a value that is not a %s."),
2238 err);
2239
2240 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2241 {
2242 if (!field_is_static (&TYPE_FIELD (t, i))
2243 && bitpos == TYPE_FIELD_BITPOS (t, i)
2244 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2245 return value_primitive_field (*argp, 0, i, t);
2246 }
2247
2248 error (_("No field with matching bitpos and type."));
2249
2250 /* Never hit. */
2251 return NULL;
2252}
2253
ac3eeb49 2254/* Search through the methods of an object (and its bases) to find a
233e8b28
SC
2255 specified method. Return the pointer to the fn_field list FN_LIST of
2256 overloaded instances defined in the source language. If available
2257 and matching, a vector of matching xmethods defined in extension
2258 languages are also returned in XM_WORKER_VEC
ac3eeb49
MS
2259
2260 Helper function for value_find_oload_list.
2261 ARGP is a pointer to a pointer to a value (the object).
2262 METHOD is a string containing the method name.
2263 OFFSET is the offset within the value.
2264 TYPE is the assumed type of the object.
233e8b28
SC
2265 FN_LIST is the pointer to matching overloaded instances defined in
2266 source language. Since this is a recursive function, *FN_LIST
2267 should be set to NULL when calling this function.
2268 NUM_FNS is the number of overloaded instances. *NUM_FNS should be set to
2269 0 when calling this function.
2270 XM_WORKER_VEC is the vector of matching xmethod workers. *XM_WORKER_VEC
2271 should also be set to NULL when calling this function.
ac3eeb49
MS
2272 BASETYPE is set to the actual type of the subobject where the
2273 method is found.
581e13c1 2274 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2275
233e8b28 2276static void
714f19d5 2277find_method_list (struct value **argp, const char *method,
233e8b28
SC
2278 int offset, struct type *type,
2279 struct fn_field **fn_list, int *num_fns,
2280 VEC (xmethod_worker_ptr) **xm_worker_vec,
fba45db2 2281 struct type **basetype, int *boffset)
c906108c
SS
2282{
2283 int i;
233e8b28
SC
2284 struct fn_field *f = NULL;
2285 VEC (xmethod_worker_ptr) *worker_vec = NULL, *new_vec = NULL;
c906108c 2286
233e8b28
SC
2287 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2288 CHECK_TYPEDEF (type);
c906108c 2289
233e8b28
SC
2290 /* First check in object itself.
2291 This function is called recursively to search through base classes.
2292 If there is a source method match found at some stage, then we need not
2293 look for source methods in consequent recursive calls. */
2294 if ((*fn_list) == NULL)
c906108c 2295 {
233e8b28 2296 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c5aa993b 2297 {
233e8b28
SC
2298 /* pai: FIXME What about operators and type conversions? */
2299 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
2300
2301 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
2302 {
2303 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2304 f = TYPE_FN_FIELDLIST1 (type, i);
2305 *fn_list = f;
4a1970e4 2306
233e8b28
SC
2307 *num_fns = len;
2308 *basetype = type;
2309 *boffset = offset;
4a1970e4 2310
233e8b28
SC
2311 /* Resolve any stub methods. */
2312 check_stub_method_group (type, i);
4a1970e4 2313
233e8b28
SC
2314 break;
2315 }
c5aa993b
JM
2316 }
2317 }
2318
233e8b28
SC
2319 /* Unlike source methods, xmethods can be accumulated over successive
2320 recursive calls. In other words, an xmethod named 'm' in a class
2321 will not hide an xmethod named 'm' in its base class(es). We want
2322 it to be this way because xmethods are after all convenience functions
2323 and hence there is no point restricting them with something like method
2324 hiding. Moreover, if hiding is done for xmethods as well, then we will
2325 have to provide a mechanism to un-hide (like the 'using' construct). */
2326 worker_vec = get_matching_xmethod_workers (type, method);
2327 new_vec = VEC_merge (xmethod_worker_ptr, *xm_worker_vec, worker_vec);
2328
2329 VEC_free (xmethod_worker_ptr, *xm_worker_vec);
2330 VEC_free (xmethod_worker_ptr, worker_vec);
2331 *xm_worker_vec = new_vec;
2332
2333 /* If source methods are not found in current class, look for them in the
2334 base classes. We also have to go through the base classes to gather
2335 extension methods. */
c906108c
SS
2336 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2337 {
2338 int base_offset;
a109c7c1 2339
c906108c
SS
2340 if (BASETYPE_VIA_VIRTUAL (type, i))
2341 {
086280be 2342 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2343 value_contents_for_printing (*argp),
2344 value_offset (*argp) + offset,
2345 value_address (*argp), *argp);
c5aa993b 2346 }
ac3eeb49
MS
2347 else /* Non-virtual base, simply use bit position from debug
2348 info. */
c906108c
SS
2349 {
2350 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2351 }
233e8b28
SC
2352
2353 find_method_list (argp, method, base_offset + offset,
2354 TYPE_BASECLASS (type, i), fn_list, num_fns,
2355 xm_worker_vec, basetype, boffset);
c906108c 2356 }
c906108c
SS
2357}
2358
233e8b28
SC
2359/* Return the list of overloaded methods of a specified name. The methods
2360 could be those GDB finds in the binary, or xmethod. Methods found in
2361 the binary are returned in FN_LIST, and xmethods are returned in
2362 XM_WORKER_VEC.
ac3eeb49
MS
2363
2364 ARGP is a pointer to a pointer to a value (the object).
2365 METHOD is the method name.
2366 OFFSET is the offset within the value contents.
233e8b28
SC
2367 FN_LIST is the pointer to matching overloaded instances defined in
2368 source language.
ac3eeb49 2369 NUM_FNS is the number of overloaded instances.
233e8b28
SC
2370 XM_WORKER_VEC is the vector of matching xmethod workers defined in
2371 extension languages.
ac3eeb49
MS
2372 BASETYPE is set to the type of the base subobject that defines the
2373 method.
581e13c1 2374 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2375
233e8b28 2376static void
714f19d5 2377value_find_oload_method_list (struct value **argp, const char *method,
233e8b28
SC
2378 int offset, struct fn_field **fn_list,
2379 int *num_fns,
2380 VEC (xmethod_worker_ptr) **xm_worker_vec,
ac3eeb49 2381 struct type **basetype, int *boffset)
c906108c 2382{
c5aa993b 2383 struct type *t;
c906108c 2384
df407dfe 2385 t = check_typedef (value_type (*argp));
c906108c 2386
ac3eeb49 2387 /* Code snarfed from value_struct_elt. */
c906108c
SS
2388 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2389 {
2390 *argp = value_ind (*argp);
2391 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2392 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2393 *argp = coerce_array (*argp);
df407dfe 2394 t = check_typedef (value_type (*argp));
c906108c 2395 }
c5aa993b 2396
c5aa993b
JM
2397 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2398 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2399 error (_("Attempt to extract a component of a "
2400 "value that is not a struct or union"));
c5aa993b 2401
233e8b28
SC
2402 gdb_assert (fn_list != NULL && xm_worker_vec != NULL);
2403
2404 /* Clear the lists. */
2405 *fn_list = NULL;
2406 *num_fns = 0;
2407 *xm_worker_vec = NULL;
2408
2409 find_method_list (argp, method, 0, t, fn_list, num_fns, xm_worker_vec,
2410 basetype, boffset);
c906108c
SS
2411}
2412
da096638 2413/* Given an array of arguments (ARGS) (which includes an
c906108c 2414 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2415 arguments NARGS, the NAME of a function, and whether it's a method or
2416 not (METHOD), find the best function that matches on the argument types
2417 according to the overload resolution rules.
c906108c 2418
4c3376c8
SW
2419 METHOD can be one of three values:
2420 NON_METHOD for non-member functions.
2421 METHOD: for member functions.
2422 BOTH: used for overload resolution of operators where the
2423 candidates are expected to be either member or non member
581e13c1 2424 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2425 (representing 'this') is expected to be a reference to the
2426 target object, and will be dereferenced when attempting the
2427 non-member search.
2428
c906108c
SS
2429 In the case of class methods, the parameter OBJ is an object value
2430 in which to search for overloaded methods.
2431
2432 In the case of non-method functions, the parameter FSYM is a symbol
2433 corresponding to one of the overloaded functions.
2434
2435 Return value is an integer: 0 -> good match, 10 -> debugger applied
2436 non-standard coercions, 100 -> incompatible.
2437
2438 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2439 If a non-method is being searched for, SYMP will hold the symbol
2440 for it.
c906108c
SS
2441
2442 If a method is being searched for, and it is a static method,
2443 then STATICP will point to a non-zero value.
2444
7322dca9
SW
2445 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2446 ADL overload candidates when performing overload resolution for a fully
2447 qualified name.
2448
e66d4446
SC
2449 If NOSIDE is EVAL_AVOID_SIDE_EFFECTS, then OBJP's memory cannot be
2450 read while picking the best overload match (it may be all zeroes and thus
2451 not have a vtable pointer), in which case skip virtual function lookup.
2452 This is ok as typically EVAL_AVOID_SIDE_EFFECTS is only used to determine
2453 the result type.
2454
c906108c
SS
2455 Note: This function does *not* check the value of
2456 overload_resolution. Caller must check it to see whether overload
581e13c1 2457 resolution is permitted. */
c906108c
SS
2458
2459int
da096638 2460find_overload_match (struct value **args, int nargs,
4c3376c8 2461 const char *name, enum oload_search_type method,
28c64fc2 2462 struct value **objp, struct symbol *fsym,
ac3eeb49 2463 struct value **valp, struct symbol **symp,
e66d4446
SC
2464 int *staticp, const int no_adl,
2465 const enum noside noside)
c906108c 2466{
7f8c9282 2467 struct value *obj = (objp ? *objp : NULL);
da096638 2468 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2469 /* Index of best overloaded function. */
4c3376c8
SW
2470 int func_oload_champ = -1;
2471 int method_oload_champ = -1;
233e8b28
SC
2472 int src_method_oload_champ = -1;
2473 int ext_method_oload_champ = -1;
2474 int src_and_ext_equal = 0;
4c3376c8 2475
ac3eeb49 2476 /* The measure for the current best match. */
4c3376c8
SW
2477 struct badness_vector *method_badness = NULL;
2478 struct badness_vector *func_badness = NULL;
233e8b28
SC
2479 struct badness_vector *ext_method_badness = NULL;
2480 struct badness_vector *src_method_badness = NULL;
4c3376c8 2481
f23631e4 2482 struct value *temp = obj;
ac3eeb49
MS
2483 /* For methods, the list of overloaded methods. */
2484 struct fn_field *fns_ptr = NULL;
2485 /* For non-methods, the list of overloaded function symbols. */
2486 struct symbol **oload_syms = NULL;
233e8b28
SC
2487 /* For xmethods, the VEC of xmethod workers. */
2488 VEC (xmethod_worker_ptr) *xm_worker_vec = NULL;
ac3eeb49
MS
2489 /* Number of overloaded instances being considered. */
2490 int num_fns = 0;
c5aa993b 2491 struct type *basetype = NULL;
c906108c 2492 int boffset;
7322dca9
SW
2493
2494 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2495
8d577d32 2496 const char *obj_type_name = NULL;
7322dca9 2497 const char *func_name = NULL;
8d577d32 2498 enum oload_classification match_quality;
4c3376c8 2499 enum oload_classification method_match_quality = INCOMPATIBLE;
233e8b28
SC
2500 enum oload_classification src_method_match_quality = INCOMPATIBLE;
2501 enum oload_classification ext_method_match_quality = INCOMPATIBLE;
4c3376c8 2502 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2503
ac3eeb49 2504 /* Get the list of overloaded methods or functions. */
4c3376c8 2505 if (method == METHOD || method == BOTH)
c906108c 2506 {
a2ca50ae 2507 gdb_assert (obj);
94af9270
KS
2508
2509 /* OBJ may be a pointer value rather than the object itself. */
2510 obj = coerce_ref (obj);
2511 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2512 obj = coerce_ref (value_ind (obj));
df407dfe 2513 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2514
2515 /* First check whether this is a data member, e.g. a pointer to
2516 a function. */
2517 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2518 {
8a13d42d 2519 *valp = search_struct_field (name, obj,
94af9270
KS
2520 check_typedef (value_type (obj)), 0);
2521 if (*valp)
2522 {
2523 *staticp = 1;
f748fb40 2524 do_cleanups (all_cleanups);
94af9270
KS
2525 return 0;
2526 }
2527 }
c906108c 2528
4c3376c8 2529 /* Retrieve the list of methods with the name NAME. */
233e8b28
SC
2530 value_find_oload_method_list (&temp, name, 0, &fns_ptr, &num_fns,
2531 &xm_worker_vec, &basetype, &boffset);
4c3376c8
SW
2532 /* If this is a method only search, and no methods were found
2533 the search has faild. */
233e8b28 2534 if (method == METHOD && (!fns_ptr || !num_fns) && !xm_worker_vec)
8a3fe4f8 2535 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2536 obj_type_name,
2537 (obj_type_name && *obj_type_name) ? "::" : "",
2538 name);
4a1970e4 2539 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2540 been resolved by find_method_list via
2541 value_find_oload_method_list above. */
4c3376c8
SW
2542 if (fns_ptr)
2543 {
4bfb94b8 2544 gdb_assert (TYPE_SELF_TYPE (fns_ptr[0].type) != NULL);
4c3376c8 2545
233e8b28
SC
2546 src_method_oload_champ = find_oload_champ (args, nargs,
2547 num_fns, fns_ptr, NULL,
2548 NULL, &src_method_badness);
2549
2550 src_method_match_quality = classify_oload_match
2551 (src_method_badness, nargs,
2552 oload_method_static_p (fns_ptr, src_method_oload_champ));
2553
2554 make_cleanup (xfree, src_method_badness);
2555 }
4c3376c8 2556
233e8b28
SC
2557 if (VEC_length (xmethod_worker_ptr, xm_worker_vec) > 0)
2558 {
2559 ext_method_oload_champ = find_oload_champ (args, nargs,
2560 0, NULL, xm_worker_vec,
2561 NULL, &ext_method_badness);
2562 ext_method_match_quality = classify_oload_match (ext_method_badness,
2563 nargs, 0);
2564 make_cleanup (xfree, ext_method_badness);
2565 make_cleanup (free_xmethod_worker_vec, xm_worker_vec);
4c3376c8
SW
2566 }
2567
233e8b28
SC
2568 if (src_method_oload_champ >= 0 && ext_method_oload_champ >= 0)
2569 {
2570 switch (compare_badness (ext_method_badness, src_method_badness))
2571 {
2572 case 0: /* Src method and xmethod are equally good. */
2573 src_and_ext_equal = 1;
2574 /* If src method and xmethod are equally good, then
2575 xmethod should be the winner. Hence, fall through to the
2576 case where a xmethod is better than the source
2577 method, except when the xmethod match quality is
2578 non-standard. */
2579 /* FALLTHROUGH */
2580 case 1: /* Src method and ext method are incompatible. */
2581 /* If ext method match is not standard, then let source method
2582 win. Otherwise, fallthrough to let xmethod win. */
2583 if (ext_method_match_quality != STANDARD)
2584 {
2585 method_oload_champ = src_method_oload_champ;
2586 method_badness = src_method_badness;
2587 ext_method_oload_champ = -1;
2588 method_match_quality = src_method_match_quality;
2589 break;
2590 }
2591 /* FALLTHROUGH */
2592 case 2: /* Ext method is champion. */
2593 method_oload_champ = ext_method_oload_champ;
2594 method_badness = ext_method_badness;
2595 src_method_oload_champ = -1;
2596 method_match_quality = ext_method_match_quality;
2597 break;
2598 case 3: /* Src method is champion. */
2599 method_oload_champ = src_method_oload_champ;
2600 method_badness = src_method_badness;
2601 ext_method_oload_champ = -1;
2602 method_match_quality = src_method_match_quality;
2603 break;
2604 default:
2605 gdb_assert_not_reached ("Unexpected overload comparison "
2606 "result");
2607 break;
2608 }
2609 }
2610 else if (src_method_oload_champ >= 0)
2611 {
2612 method_oload_champ = src_method_oload_champ;
2613 method_badness = src_method_badness;
2614 method_match_quality = src_method_match_quality;
2615 }
2616 else if (ext_method_oload_champ >= 0)
2617 {
2618 method_oload_champ = ext_method_oload_champ;
2619 method_badness = ext_method_badness;
2620 method_match_quality = ext_method_match_quality;
2621 }
c906108c 2622 }
4c3376c8
SW
2623
2624 if (method == NON_METHOD || method == BOTH)
c906108c 2625 {
7322dca9 2626 const char *qualified_name = NULL;
c906108c 2627
b021a221
MS
2628 /* If the overload match is being search for both as a method
2629 and non member function, the first argument must now be
2630 dereferenced. */
4c3376c8 2631 if (method == BOTH)
2b214ea6 2632 args[0] = value_ind (args[0]);
4c3376c8 2633
7322dca9
SW
2634 if (fsym)
2635 {
2636 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2637
2638 /* If we have a function with a C++ name, try to extract just
2639 the function part. Do not try this for non-functions (e.g.
2640 function pointers). */
2641 if (qualified_name
3e43a32a
MS
2642 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2643 == TYPE_CODE_FUNC)
7322dca9
SW
2644 {
2645 char *temp;
2646
2647 temp = cp_func_name (qualified_name);
2648
2649 /* If cp_func_name did not remove anything, the name of the
2650 symbol did not include scope or argument types - it was
2651 probably a C-style function. */
2652 if (temp)
2653 {
2654 make_cleanup (xfree, temp);
2655 if (strcmp (temp, qualified_name) == 0)
2656 func_name = NULL;
2657 else
2658 func_name = temp;
2659 }
2660 }
2661 }
2662 else
94af9270 2663 {
7322dca9
SW
2664 func_name = name;
2665 qualified_name = name;
94af9270 2666 }
d9639e13 2667
94af9270
KS
2668 /* If there was no C++ name, this must be a C-style function or
2669 not a function at all. Just return the same symbol. Do the
2670 same if cp_func_name fails for some reason. */
8d577d32 2671 if (func_name == NULL)
7b83ea04 2672 {
917317f4 2673 *symp = fsym;
5fe41fbf 2674 do_cleanups (all_cleanups);
7b83ea04
AC
2675 return 0;
2676 }
917317f4 2677
da096638 2678 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2679 func_name,
2680 qualified_name,
2681 &oload_syms,
2682 &func_badness,
2683 no_adl);
8d577d32 2684
4c3376c8
SW
2685 if (func_oload_champ >= 0)
2686 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2687
2688 make_cleanup (xfree, oload_syms);
2689 make_cleanup (xfree, func_badness);
8d577d32
DC
2690 }
2691
7322dca9 2692 /* Did we find a match ? */
4c3376c8 2693 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2694 throw_error (NOT_FOUND_ERROR,
2695 _("No symbol \"%s\" in current context."),
2696 name);
8d577d32 2697
4c3376c8
SW
2698 /* If we have found both a method match and a function
2699 match, find out which one is better, and calculate match
2700 quality. */
2701 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2702 {
2703 switch (compare_badness (func_badness, method_badness))
2704 {
2705 case 0: /* Top two contenders are equally good. */
b021a221
MS
2706 /* FIXME: GDB does not support the general ambiguous case.
2707 All candidates should be collected and presented the
2708 user. */
4c3376c8
SW
2709 error (_("Ambiguous overload resolution"));
2710 break;
2711 case 1: /* Incomparable top contenders. */
2712 /* This is an error incompatible candidates
2713 should not have been proposed. */
3e43a32a
MS
2714 error (_("Internal error: incompatible "
2715 "overload candidates proposed"));
4c3376c8
SW
2716 break;
2717 case 2: /* Function champion. */
2718 method_oload_champ = -1;
2719 match_quality = func_match_quality;
2720 break;
2721 case 3: /* Method champion. */
2722 func_oload_champ = -1;
2723 match_quality = method_match_quality;
2724 break;
2725 default:
2726 error (_("Internal error: unexpected overload comparison result"));
2727 break;
2728 }
2729 }
2730 else
2731 {
2732 /* We have either a method match or a function match. */
2733 if (method_oload_champ >= 0)
2734 match_quality = method_match_quality;
2735 else
2736 match_quality = func_match_quality;
2737 }
8d577d32
DC
2738
2739 if (match_quality == INCOMPATIBLE)
2740 {
4c3376c8 2741 if (method == METHOD)
8a3fe4f8 2742 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2743 obj_type_name,
2744 (obj_type_name && *obj_type_name) ? "::" : "",
2745 name);
2746 else
8a3fe4f8 2747 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2748 func_name);
2749 }
2750 else if (match_quality == NON_STANDARD)
2751 {
4c3376c8 2752 if (method == METHOD)
3e43a32a
MS
2753 warning (_("Using non-standard conversion to match "
2754 "method %s%s%s to supplied arguments"),
8d577d32
DC
2755 obj_type_name,
2756 (obj_type_name && *obj_type_name) ? "::" : "",
2757 name);
2758 else
3e43a32a
MS
2759 warning (_("Using non-standard conversion to match "
2760 "function %s to supplied arguments"),
8d577d32
DC
2761 func_name);
2762 }
2763
4c3376c8 2764 if (staticp != NULL)
2bca57ba 2765 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2766
2767 if (method_oload_champ >= 0)
8d577d32 2768 {
233e8b28
SC
2769 if (src_method_oload_champ >= 0)
2770 {
e66d4446
SC
2771 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ)
2772 && noside != EVAL_AVOID_SIDE_EFFECTS)
2773 {
2774 *valp = value_virtual_fn_field (&temp, fns_ptr,
2775 method_oload_champ, basetype,
2776 boffset);
2777 }
233e8b28
SC
2778 else
2779 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
2780 basetype, boffset);
2781 }
8d577d32 2782 else
233e8b28
SC
2783 {
2784 *valp = value_of_xmethod (clone_xmethod_worker
2785 (VEC_index (xmethod_worker_ptr, xm_worker_vec,
2786 ext_method_oload_champ)));
2787 }
8d577d32
DC
2788 }
2789 else
4c3376c8 2790 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2791
2792 if (objp)
2793 {
a4295225 2794 struct type *temp_type = check_typedef (value_type (temp));
da096638 2795 struct type *objtype = check_typedef (obj_type);
a109c7c1 2796
a4295225 2797 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2798 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2799 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2800 {
2801 temp = value_addr (temp);
2802 }
2803 *objp = temp;
2804 }
7322dca9
SW
2805
2806 do_cleanups (all_cleanups);
8d577d32
DC
2807
2808 switch (match_quality)
2809 {
2810 case INCOMPATIBLE:
2811 return 100;
2812 case NON_STANDARD:
2813 return 10;
2814 default: /* STANDARD */
2815 return 0;
2816 }
2817}
2818
2819/* Find the best overload match, searching for FUNC_NAME in namespaces
2820 contained in QUALIFIED_NAME until it either finds a good match or
2821 runs out of namespaces. It stores the overloaded functions in
2822 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2823 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2824 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2825 performned. */
8d577d32
DC
2826
2827static int
da096638 2828find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2829 const char *func_name,
2830 const char *qualified_name,
2831 struct symbol ***oload_syms,
7322dca9
SW
2832 struct badness_vector **oload_champ_bv,
2833 const int no_adl)
8d577d32
DC
2834{
2835 int oload_champ;
2836
da096638 2837 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2838 func_name,
2839 qualified_name, 0,
2840 oload_syms, oload_champ_bv,
7322dca9
SW
2841 &oload_champ,
2842 no_adl);
8d577d32
DC
2843
2844 return oload_champ;
2845}
2846
2847/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2848 how deep we've looked for namespaces, and the champ is stored in
2849 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2850 if it isn't. Other arguments are the same as in
2851 find_oload_champ_namespace
8d577d32
DC
2852
2853 It is the caller's responsibility to free *OLOAD_SYMS and
2854 *OLOAD_CHAMP_BV. */
2855
2856static int
da096638 2857find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2858 const char *func_name,
2859 const char *qualified_name,
2860 int namespace_len,
2861 struct symbol ***oload_syms,
2862 struct badness_vector **oload_champ_bv,
7322dca9
SW
2863 int *oload_champ,
2864 const int no_adl)
8d577d32
DC
2865{
2866 int next_namespace_len = namespace_len;
2867 int searched_deeper = 0;
2868 int num_fns = 0;
2869 struct cleanup *old_cleanups;
2870 int new_oload_champ;
2871 struct symbol **new_oload_syms;
2872 struct badness_vector *new_oload_champ_bv;
2873 char *new_namespace;
2874
2875 if (next_namespace_len != 0)
2876 {
2877 gdb_assert (qualified_name[next_namespace_len] == ':');
2878 next_namespace_len += 2;
c906108c 2879 }
ac3eeb49
MS
2880 next_namespace_len +=
2881 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2882
2883 /* Initialize these to values that can safely be xfree'd. */
2884 *oload_syms = NULL;
2885 *oload_champ_bv = NULL;
c5aa993b 2886
581e13c1 2887 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2888 If we get a good match there, use it. */
8d577d32
DC
2889
2890 if (qualified_name[next_namespace_len] == ':')
2891 {
2892 searched_deeper = 1;
2893
da096638 2894 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2895 func_name, qualified_name,
2896 next_namespace_len,
2897 oload_syms, oload_champ_bv,
7322dca9 2898 oload_champ, no_adl))
8d577d32
DC
2899 {
2900 return 1;
2901 }
2902 };
2903
2904 /* If we reach here, either we're in the deepest namespace or we
2905 didn't find a good match in a deeper namespace. But, in the
2906 latter case, we still have a bad match in a deeper namespace;
2907 note that we might not find any match at all in the current
2908 namespace. (There's always a match in the deepest namespace,
2909 because this overload mechanism only gets called if there's a
2910 function symbol to start off with.) */
2911
2912 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2913 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2914 new_namespace = alloca (namespace_len + 1);
2915 strncpy (new_namespace, qualified_name, namespace_len);
2916 new_namespace[namespace_len] = '\0';
2917 new_oload_syms = make_symbol_overload_list (func_name,
2918 new_namespace);
7322dca9
SW
2919
2920 /* If we have reached the deepest level perform argument
2921 determined lookup. */
2922 if (!searched_deeper && !no_adl)
da096638
KS
2923 {
2924 int ix;
2925 struct type **arg_types;
2926
2927 /* Prepare list of argument types for overload resolution. */
2928 arg_types = (struct type **)
2929 alloca (nargs * (sizeof (struct type *)));
2930 for (ix = 0; ix < nargs; ix++)
2931 arg_types[ix] = value_type (args[ix]);
2932 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2933 }
7322dca9 2934
8d577d32
DC
2935 while (new_oload_syms[num_fns])
2936 ++num_fns;
2937
9cf95373 2938 new_oload_champ = find_oload_champ (args, nargs, num_fns,
233e8b28 2939 NULL, NULL, new_oload_syms,
8d577d32
DC
2940 &new_oload_champ_bv);
2941
2942 /* Case 1: We found a good match. Free earlier matches (if any),
2943 and return it. Case 2: We didn't find a good match, but we're
2944 not the deepest function. Then go with the bad match that the
2945 deeper function found. Case 3: We found a bad match, and we're
2946 the deepest function. Then return what we found, even though
2947 it's a bad match. */
2948
2949 if (new_oload_champ != -1
2950 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2951 {
2952 *oload_syms = new_oload_syms;
2953 *oload_champ = new_oload_champ;
2954 *oload_champ_bv = new_oload_champ_bv;
2955 do_cleanups (old_cleanups);
2956 return 1;
2957 }
2958 else if (searched_deeper)
2959 {
2960 xfree (new_oload_syms);
2961 xfree (new_oload_champ_bv);
2962 discard_cleanups (old_cleanups);
2963 return 0;
2964 }
2965 else
2966 {
8d577d32
DC
2967 *oload_syms = new_oload_syms;
2968 *oload_champ = new_oload_champ;
2969 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2970 do_cleanups (old_cleanups);
8d577d32
DC
2971 return 0;
2972 }
2973}
2974
da096638 2975/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2976 the best match from among the overloaded methods or functions
233e8b28
SC
2977 given by FNS_PTR or OLOAD_SYMS or XM_WORKER_VEC, respectively.
2978 One, and only one of FNS_PTR, OLOAD_SYMS and XM_WORKER_VEC can be
2979 non-NULL.
2980
2981 If XM_WORKER_VEC is NULL, then the length of the arrays FNS_PTR
2982 or OLOAD_SYMS (whichever is non-NULL) is specified in NUM_FNS.
2983
8d577d32
DC
2984 Return the index of the best match; store an indication of the
2985 quality of the match in OLOAD_CHAMP_BV.
2986
2987 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2988
2989static int
9cf95373 2990find_oload_champ (struct value **args, int nargs,
8d577d32 2991 int num_fns, struct fn_field *fns_ptr,
233e8b28 2992 VEC (xmethod_worker_ptr) *xm_worker_vec,
8d577d32
DC
2993 struct symbol **oload_syms,
2994 struct badness_vector **oload_champ_bv)
2995{
2996 int ix;
233e8b28
SC
2997 int fn_count;
2998 int xm_worker_vec_n = VEC_length (xmethod_worker_ptr, xm_worker_vec);
ac3eeb49
MS
2999 /* A measure of how good an overloaded instance is. */
3000 struct badness_vector *bv;
3001 /* Index of best overloaded function. */
3002 int oload_champ = -1;
3003 /* Current ambiguity state for overload resolution. */
3004 int oload_ambiguous = 0;
3005 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 3006
9cf95373 3007 /* A champion can be found among methods alone, or among functions
233e8b28
SC
3008 alone, or in xmethods alone, but not in more than one of these
3009 groups. */
3010 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) + (xm_worker_vec != NULL)
3011 == 1);
9cf95373 3012
8d577d32 3013 *oload_champ_bv = NULL;
c906108c 3014
233e8b28
SC
3015 fn_count = (xm_worker_vec != NULL
3016 ? VEC_length (xmethod_worker_ptr, xm_worker_vec)
3017 : num_fns);
ac3eeb49 3018 /* Consider each candidate in turn. */
233e8b28 3019 for (ix = 0; ix < fn_count; ix++)
c906108c 3020 {
8d577d32 3021 int jj;
233e8b28 3022 int static_offset = 0;
8d577d32
DC
3023 int nparms;
3024 struct type **parm_types;
233e8b28 3025 struct xmethod_worker *worker = NULL;
8d577d32 3026
233e8b28 3027 if (xm_worker_vec != NULL)
db577aea 3028 {
233e8b28
SC
3029 worker = VEC_index (xmethod_worker_ptr, xm_worker_vec, ix);
3030 parm_types = get_xmethod_arg_types (worker, &nparms);
db577aea
AC
3031 }
3032 else
3033 {
233e8b28
SC
3034 if (fns_ptr != NULL)
3035 {
3036 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
3037 static_offset = oload_method_static_p (fns_ptr, ix);
3038 }
3039 else
3040 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
3041
3042 parm_types = (struct type **)
3043 xmalloc (nparms * (sizeof (struct type *)));
3044 for (jj = 0; jj < nparms; jj++)
3045 parm_types[jj] = (fns_ptr != NULL
3046 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
3047 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
8301c89e 3048 jj));
db577aea 3049 }
c906108c 3050
ac3eeb49
MS
3051 /* Compare parameter types to supplied argument types. Skip
3052 THIS for static methods. */
3053 bv = rank_function (parm_types, nparms,
da096638 3054 args + static_offset,
4a1970e4 3055 nargs - static_offset);
c5aa993b 3056
8d577d32 3057 if (!*oload_champ_bv)
c5aa993b 3058 {
8d577d32 3059 *oload_champ_bv = bv;
c5aa993b 3060 oload_champ = 0;
c5aa993b 3061 }
ac3eeb49
MS
3062 else /* See whether current candidate is better or worse than
3063 previous best. */
8d577d32 3064 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3065 {
ac3eeb49
MS
3066 case 0: /* Top two contenders are equally good. */
3067 oload_ambiguous = 1;
c5aa993b 3068 break;
ac3eeb49
MS
3069 case 1: /* Incomparable top contenders. */
3070 oload_ambiguous = 2;
c5aa993b 3071 break;
ac3eeb49
MS
3072 case 2: /* New champion, record details. */
3073 *oload_champ_bv = bv;
c5aa993b
JM
3074 oload_ambiguous = 0;
3075 oload_champ = ix;
c5aa993b
JM
3076 break;
3077 case 3:
3078 default:
3079 break;
3080 }
b8c9b27d 3081 xfree (parm_types);
6b1ba9a0
ND
3082 if (overload_debug)
3083 {
233e8b28 3084 if (fns_ptr != NULL)
ac3eeb49 3085 fprintf_filtered (gdb_stderr,
3e43a32a 3086 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3087 fns_ptr[ix].physname, nparms);
233e8b28
SC
3088 else if (xm_worker_vec != NULL)
3089 fprintf_filtered (gdb_stderr,
3090 "Xmethod worker, # of parms %d\n",
3091 nparms);
6b1ba9a0 3092 else
ac3eeb49 3093 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3094 "Overloaded function instance "
3095 "%s # of parms %d\n",
ac3eeb49
MS
3096 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3097 nparms);
4a1970e4 3098 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3099 fprintf_filtered (gdb_stderr,
3100 "...Badness @ %d : %d\n",
6403aeea 3101 jj, bv->rank[jj].rank);
3e43a32a
MS
3102 fprintf_filtered (gdb_stderr, "Overload resolution "
3103 "champion is %d, ambiguous? %d\n",
ac3eeb49 3104 oload_champ, oload_ambiguous);
6b1ba9a0 3105 }
c906108c
SS
3106 }
3107
8d577d32
DC
3108 return oload_champ;
3109}
6b1ba9a0 3110
8d577d32
DC
3111/* Return 1 if we're looking at a static method, 0 if we're looking at
3112 a non-static method or a function that isn't a method. */
c906108c 3113
8d577d32 3114static int
2bca57ba 3115oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 3116{
2bca57ba 3117 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3118 return 1;
c906108c 3119 else
8d577d32
DC
3120 return 0;
3121}
c906108c 3122
8d577d32
DC
3123/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3124
3125static enum oload_classification
3126classify_oload_match (struct badness_vector *oload_champ_bv,
3127 int nargs,
3128 int static_offset)
3129{
3130 int ix;
da096638 3131 enum oload_classification worst = STANDARD;
8d577d32
DC
3132
3133 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3134 {
6403aeea
SW
3135 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3136 or worse return INCOMPATIBLE. */
3137 if (compare_ranks (oload_champ_bv->rank[ix],
3138 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3139 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3140 /* Otherwise If this conversion is as bad as
3141 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3142 else if (compare_ranks (oload_champ_bv->rank[ix],
3143 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3144 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3145 needed. */
7f8c9282 3146 }
02f0d45d 3147
da096638
KS
3148 /* If no INCOMPATIBLE classification was found, return the worst one
3149 that was found (if any). */
3150 return worst;
c906108c
SS
3151}
3152
ac3eeb49
MS
3153/* C++: return 1 is NAME is a legitimate name for the destructor of
3154 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3155 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3156 have CHECK_TYPEDEF applied, this function will apply it itself. */
3157
c906108c 3158int
d8228535 3159destructor_name_p (const char *name, struct type *type)
c906108c 3160{
c906108c
SS
3161 if (name[0] == '~')
3162 {
d8228535
JK
3163 const char *dname = type_name_no_tag_or_error (type);
3164 const char *cp = strchr (dname, '<');
c906108c
SS
3165 unsigned int len;
3166
3167 /* Do not compare the template part for template classes. */
3168 if (cp == NULL)
3169 len = strlen (dname);
3170 else
3171 len = cp - dname;
bf896cb0 3172 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3173 error (_("name of destructor must equal name of class"));
c906108c
SS
3174 else
3175 return 1;
3176 }
3177 return 0;
3178}
3179
3d567982
TT
3180/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3181 class". If the name is found, return a value representing it;
3182 otherwise throw an exception. */
3183
3184static struct value *
3185enum_constant_from_type (struct type *type, const char *name)
3186{
3187 int i;
3188 int name_len = strlen (name);
3189
3190 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3191 && TYPE_DECLARED_CLASS (type));
3192
3193 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3194 {
3195 const char *fname = TYPE_FIELD_NAME (type, i);
3196 int len;
3197
3198 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3199 || fname == NULL)
3200 continue;
3201
3202 /* Look for the trailing "::NAME", since enum class constant
3203 names are qualified here. */
3204 len = strlen (fname);
3205 if (len + 2 >= name_len
3206 && fname[len - name_len - 2] == ':'
3207 && fname[len - name_len - 1] == ':'
3208 && strcmp (&fname[len - name_len], name) == 0)
3209 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3210 }
3211
3212 error (_("no constant named \"%s\" in enum \"%s\""),
3213 name, TYPE_TAG_NAME (type));
3214}
3215
79c2c32d 3216/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3217 return the appropriate member (or the address of the member, if
3218 WANT_ADDRESS). This function is used to resolve user expressions
3219 of the form "DOMAIN::NAME". For more details on what happens, see
3220 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3221
3222struct value *
c848d642 3223value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3224 struct type *expect_type, int want_address,
79c2c32d
DC
3225 enum noside noside)
3226{
3227 switch (TYPE_CODE (curtype))
3228 {
3229 case TYPE_CODE_STRUCT:
3230 case TYPE_CODE_UNION:
ac3eeb49 3231 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3232 name, expect_type,
0d5de010 3233 want_address, noside);
79c2c32d 3234 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3235 return value_namespace_elt (curtype, name,
3236 want_address, noside);
3d567982
TT
3237
3238 case TYPE_CODE_ENUM:
3239 return enum_constant_from_type (curtype, name);
3240
79c2c32d
DC
3241 default:
3242 internal_error (__FILE__, __LINE__,
e2e0b3e5 3243 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3244 }
3245}
3246
072bba3b 3247/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3248 with respect to the methods' parameters. If the types of the
072bba3b
KS
3249 two parameter lists are the same, returns 1; 0 otherwise. This
3250 comparison may ignore any artificial parameters in T1 if
3251 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3252 the first artificial parameter in T1, assumed to be a 'this' pointer.
3253
3254 The type T2 is expected to have come from make_params (in eval.c). */
3255
3256static int
3257compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3258{
3259 int start = 0;
3260
80b23b6a 3261 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3262 ++start;
3263
3264 /* If skipping artificial fields, find the first real field
581e13c1 3265 in T1. */
072bba3b
KS
3266 if (skip_artificial)
3267 {
3268 while (start < TYPE_NFIELDS (t1)
3269 && TYPE_FIELD_ARTIFICIAL (t1, start))
3270 ++start;
3271 }
3272
581e13c1 3273 /* Now compare parameters. */
072bba3b
KS
3274
3275 /* Special case: a method taking void. T1 will contain no
3276 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3277 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3278 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3279 return 1;
3280
3281 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3282 {
3283 int i;
a109c7c1 3284
072bba3b
KS
3285 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3286 {
6403aeea 3287 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3288 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3289 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3290 return 0;
3291 }
3292
3293 return 1;
3294 }
3295
3296 return 0;
3297}
3298
c906108c 3299/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3300 return the address of this member as a "pointer to member" type.
3301 If INTYPE is non-null, then it will be the type of the member we
3302 are looking for. This will help us resolve "pointers to member
3303 functions". This function is used to resolve user expressions of
3304 the form "DOMAIN::NAME". */
c906108c 3305
63d06c5c 3306static struct value *
fba45db2 3307value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3308 struct type *curtype, const char *name,
ac3eeb49
MS
3309 struct type *intype,
3310 int want_address,
63d06c5c 3311 enum noside noside)
c906108c 3312{
52f0bd74
AC
3313 struct type *t = curtype;
3314 int i;
0d5de010 3315 struct value *v, *result;
c906108c 3316
c5aa993b 3317 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3318 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3319 error (_("Internal error: non-aggregate type "
3320 "to value_struct_elt_for_reference"));
c906108c
SS
3321
3322 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3323 {
0d5cff50 3324 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3325
6314a349 3326 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3327 {
d6a843b5 3328 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3329 {
3330 v = value_static_field (t, i);
0d5de010
DJ
3331 if (want_address)
3332 v = value_addr (v);
c906108c
SS
3333 return v;
3334 }
3335 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3336 error (_("pointers to bitfield members not allowed"));
c5aa993b 3337
0d5de010
DJ
3338 if (want_address)
3339 return value_from_longest
3340 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3341 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3342 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3343 return allocate_value (TYPE_FIELD_TYPE (t, i));
3344 else
f7e3ecae
KS
3345 {
3346 /* Try to evaluate NAME as a qualified name with implicit
3347 this pointer. In this case, attempt to return the
3348 equivalent to `this->*(&TYPE::NAME)'. */
3349 v = value_of_this_silent (current_language);
3350 if (v != NULL)
3351 {
3352 struct value *ptr;
3353 long mem_offset;
3354 struct type *type, *tmp;
3355
3356 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3357 type = check_typedef (value_type (ptr));
3358 gdb_assert (type != NULL
3359 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
4bfb94b8 3360 tmp = lookup_pointer_type (TYPE_SELF_TYPE (type));
f7e3ecae
KS
3361 v = value_cast_pointers (tmp, v, 1);
3362 mem_offset = value_as_long (ptr);
3363 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3364 result = value_from_pointer (tmp,
3365 value_as_long (v) + mem_offset);
3366 return value_ind (result);
3367 }
3368
3369 error (_("Cannot reference non-static field \"%s\""), name);
3370 }
c906108c
SS
3371 }
3372 }
3373
ac3eeb49
MS
3374 /* C++: If it was not found as a data field, then try to return it
3375 as a pointer to a method. */
c906108c 3376
c906108c
SS
3377 /* Perform all necessary dereferencing. */
3378 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3379 intype = TYPE_TARGET_TYPE (intype);
3380
3381 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3382 {
0d5cff50 3383 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3384 char dem_opname[64];
3385
61012eef
GB
3386 if (startswith (t_field_name, "__")
3387 || startswith (t_field_name, "op")
3388 || startswith (t_field_name, "type"))
c906108c 3389 {
ac3eeb49
MS
3390 if (cplus_demangle_opname (t_field_name,
3391 dem_opname, DMGL_ANSI))
c5aa993b 3392 t_field_name = dem_opname;
ac3eeb49
MS
3393 else if (cplus_demangle_opname (t_field_name,
3394 dem_opname, 0))
c906108c 3395 t_field_name = dem_opname;
c906108c 3396 }
6314a349 3397 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3398 {
072bba3b
KS
3399 int j;
3400 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3401 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3402
de17c821
DJ
3403 check_stub_method_group (t, i);
3404
c906108c
SS
3405 if (intype)
3406 {
072bba3b
KS
3407 for (j = 0; j < len; ++j)
3408 {
3409 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3410 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3411 intype, 1))
072bba3b
KS
3412 break;
3413 }
3414
3415 if (j == len)
3e43a32a
MS
3416 error (_("no member function matches "
3417 "that type instantiation"));
7f79b1c5 3418 }
c906108c 3419 else
072bba3b
KS
3420 {
3421 int ii;
7f79b1c5
DJ
3422
3423 j = -1;
53832f31 3424 for (ii = 0; ii < len; ++ii)
072bba3b 3425 {
7f79b1c5
DJ
3426 /* Skip artificial methods. This is necessary if,
3427 for example, the user wants to "print
3428 subclass::subclass" with only one user-defined
53832f31
TT
3429 constructor. There is no ambiguity in this case.
3430 We are careful here to allow artificial methods
3431 if they are the unique result. */
072bba3b 3432 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3433 {
3434 if (j == -1)
3435 j = ii;
3436 continue;
3437 }
072bba3b 3438
7f79b1c5
DJ
3439 /* Desired method is ambiguous if more than one
3440 method is defined. */
53832f31 3441 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3442 error (_("non-unique member `%s' requires "
3443 "type instantiation"), name);
072bba3b 3444
7f79b1c5
DJ
3445 j = ii;
3446 }
53832f31
TT
3447
3448 if (j == -1)
3449 error (_("no matching member function"));
072bba3b 3450 }
c5aa993b 3451
0d5de010
DJ
3452 if (TYPE_FN_FIELD_STATIC_P (f, j))
3453 {
ac3eeb49
MS
3454 struct symbol *s =
3455 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3456 0, VAR_DOMAIN, 0);
a109c7c1 3457
0d5de010
DJ
3458 if (s == NULL)
3459 return NULL;
3460
3461 if (want_address)
3462 return value_addr (read_var_value (s, 0));
3463 else
3464 return read_var_value (s, 0);
3465 }
3466
c906108c
SS
3467 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3468 {
0d5de010
DJ
3469 if (want_address)
3470 {
3471 result = allocate_value
3472 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3473 cplus_make_method_ptr (value_type (result),
3474 value_contents_writeable (result),
0d5de010
DJ
3475 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3476 }
3477 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3478 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3479 else
3480 error (_("Cannot reference virtual member function \"%s\""),
3481 name);
c906108c
SS
3482 }
3483 else
3484 {
ac3eeb49
MS
3485 struct symbol *s =
3486 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3487 0, VAR_DOMAIN, 0);
a109c7c1 3488
c906108c 3489 if (s == NULL)
0d5de010
DJ
3490 return NULL;
3491
3492 v = read_var_value (s, 0);
3493 if (!want_address)
3494 result = v;
c906108c
SS
3495 else
3496 {
0d5de010 3497 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3498 cplus_make_method_ptr (value_type (result),
3499 value_contents_writeable (result),
42ae5230 3500 value_address (v), 0);
c906108c 3501 }
c906108c 3502 }
0d5de010 3503 return result;
c906108c
SS
3504 }
3505 }
3506 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3507 {
f23631e4 3508 struct value *v;
c906108c
SS
3509 int base_offset;
3510
3511 if (BASETYPE_VIA_VIRTUAL (t, i))
3512 base_offset = 0;
3513 else
3514 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3515 v = value_struct_elt_for_reference (domain,
3516 offset + base_offset,
3517 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3518 name, intype,
3519 want_address, noside);
c906108c
SS
3520 if (v)
3521 return v;
3522 }
63d06c5c
DC
3523
3524 /* As a last chance, pretend that CURTYPE is a namespace, and look
3525 it up that way; this (frequently) works for types nested inside
3526 classes. */
3527
ac3eeb49
MS
3528 return value_maybe_namespace_elt (curtype, name,
3529 want_address, noside);
c906108c
SS
3530}
3531
79c2c32d
DC
3532/* C++: Return the member NAME of the namespace given by the type
3533 CURTYPE. */
3534
3535static struct value *
3536value_namespace_elt (const struct type *curtype,
c848d642 3537 const char *name, int want_address,
79c2c32d 3538 enum noside noside)
63d06c5c
DC
3539{
3540 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3541 want_address,
3542 noside);
63d06c5c
DC
3543
3544 if (retval == NULL)
ac3eeb49
MS
3545 error (_("No symbol \"%s\" in namespace \"%s\"."),
3546 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3547
3548 return retval;
3549}
3550
3551/* A helper function used by value_namespace_elt and
3552 value_struct_elt_for_reference. It looks up NAME inside the
3553 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3554 is a class and NAME refers to a type in CURTYPE itself (as opposed
3555 to, say, some base class of CURTYPE). */
3556
3557static struct value *
3558value_maybe_namespace_elt (const struct type *curtype,
c848d642 3559 const char *name, int want_address,
63d06c5c 3560 enum noside noside)
79c2c32d
DC
3561{
3562 const char *namespace_name = TYPE_TAG_NAME (curtype);
3563 struct symbol *sym;
0d5de010 3564 struct value *result;
79c2c32d 3565
13387711 3566 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3567 get_selected_block (0), VAR_DOMAIN);
3568
79c2c32d 3569 if (sym == NULL)
63d06c5c 3570 return NULL;
79c2c32d
DC
3571 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3572 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3573 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3574 else
0d5de010
DJ
3575 result = value_of_variable (sym, get_selected_block (0));
3576
ae6a105d 3577 if (want_address)
0d5de010
DJ
3578 result = value_addr (result);
3579
3580 return result;
79c2c32d
DC
3581}
3582
dfcee124 3583/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3584
c906108c 3585 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3586 and refer to the values computed for the object pointed to. */
c906108c
SS
3587
3588struct type *
dfcee124
AG
3589value_rtti_indirect_type (struct value *v, int *full,
3590 int *top, int *using_enc)
c906108c 3591{
f7e5394d 3592 struct value *target = NULL;
dfcee124
AG
3593 struct type *type, *real_type, *target_type;
3594
3595 type = value_type (v);
3596 type = check_typedef (type);
3597 if (TYPE_CODE (type) == TYPE_CODE_REF)
3598 target = coerce_ref (v);
3599 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
f7e5394d 3600 {
f7e5394d 3601
492d29ea 3602 TRY
f7e5394d
SM
3603 {
3604 target = value_ind (v);
3605 }
492d29ea 3606 CATCH (except, RETURN_MASK_ERROR)
f7e5394d
SM
3607 {
3608 if (except.error == MEMORY_ERROR)
3609 {
3610 /* value_ind threw a memory error. The pointer is NULL or
3611 contains an uninitialized value: we can't determine any
3612 type. */
3613 return NULL;
3614 }
3615 throw_exception (except);
3616 }
492d29ea 3617 END_CATCH
f7e5394d 3618 }
dfcee124
AG
3619 else
3620 return NULL;
c906108c 3621
dfcee124
AG
3622 real_type = value_rtti_type (target, full, top, using_enc);
3623
3624 if (real_type)
3625 {
3626 /* Copy qualifiers to the referenced object. */
3627 target_type = value_type (target);
3628 real_type = make_cv_type (TYPE_CONST (target_type),
3629 TYPE_VOLATILE (target_type), real_type, NULL);
3630 if (TYPE_CODE (type) == TYPE_CODE_REF)
3631 real_type = lookup_reference_type (real_type);
3632 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3633 real_type = lookup_pointer_type (real_type);
3634 else
3635 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3636
3637 /* Copy qualifiers to the pointer/reference. */
3638 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3639 real_type, NULL);
3640 }
c906108c 3641
dfcee124 3642 return real_type;
c906108c
SS
3643}
3644
3645/* Given a value pointed to by ARGP, check its real run-time type, and
3646 if that is different from the enclosing type, create a new value
3647 using the real run-time type as the enclosing type (and of the same
3648 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3649 be the correct offset to the enclosed object. RTYPE is the type,
3650 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3651 by value_rtti_type(). If these are available, they can be supplied
3652 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3653 NULL if they're not available. */
c906108c 3654
f23631e4 3655struct value *
ac3eeb49
MS
3656value_full_object (struct value *argp,
3657 struct type *rtype,
3658 int xfull, int xtop,
fba45db2 3659 int xusing_enc)
c906108c 3660{
c5aa993b 3661 struct type *real_type;
c906108c
SS
3662 int full = 0;
3663 int top = -1;
3664 int using_enc = 0;
f23631e4 3665 struct value *new_val;
c906108c
SS
3666
3667 if (rtype)
3668 {
3669 real_type = rtype;
3670 full = xfull;
3671 top = xtop;
3672 using_enc = xusing_enc;
3673 }
3674 else
3675 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3676
ac3eeb49 3677 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3678 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3679 return argp;
3680
a7860e76
TT
3681 /* In a destructor we might see a real type that is a superclass of
3682 the object's type. In this case it is better to leave the object
3683 as-is. */
3684 if (full
3685 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3686 return argp;
3687
c906108c 3688 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3689 type is wrong, set it. */
3690 /* pai: FIXME -- sounds iffy */
c906108c
SS
3691 if (full)
3692 {
4dfea560
DE
3693 argp = value_copy (argp);
3694 set_value_enclosing_type (argp, real_type);
c906108c
SS
3695 return argp;
3696 }
3697
581e13c1 3698 /* Check if object is in memory. */
c906108c
SS
3699 if (VALUE_LVAL (argp) != lval_memory)
3700 {
3e43a32a
MS
3701 warning (_("Couldn't retrieve complete object of RTTI "
3702 "type %s; object may be in register(s)."),
ac3eeb49 3703 TYPE_NAME (real_type));
c5aa993b 3704
c906108c
SS
3705 return argp;
3706 }
c5aa993b 3707
ac3eeb49
MS
3708 /* All other cases -- retrieve the complete object. */
3709 /* Go back by the computed top_offset from the beginning of the
3710 object, adjusting for the embedded offset of argp if that's what
3711 value_rtti_type used for its computation. */
42ae5230 3712 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3713 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3714 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3715 set_value_embedded_offset (new_val, (using_enc
3716 ? top + value_embedded_offset (argp)
3717 : top));
c906108c
SS
3718 return new_val;
3719}
3720
389e51db 3721
85bc8cb7
JK
3722/* Return the value of the local variable, if one exists. Throw error
3723 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3724
f23631e4 3725struct value *
85bc8cb7 3726value_of_this (const struct language_defn *lang)
c906108c 3727{
66a17cb6 3728 struct symbol *sym;
3977b71f 3729 const struct block *b;
206415a3 3730 struct frame_info *frame;
c906108c 3731
66a17cb6 3732 if (!lang->la_name_of_this)
85bc8cb7 3733 error (_("no `this' in current language"));
aee28ec6 3734
85bc8cb7 3735 frame = get_selected_frame (_("no frame selected"));
c906108c 3736
66a17cb6 3737 b = get_frame_block (frame, NULL);
c906108c 3738
66a17cb6 3739 sym = lookup_language_this (lang, b);
c906108c 3740 if (sym == NULL)
85bc8cb7
JK
3741 error (_("current stack frame does not contain a variable named `%s'"),
3742 lang->la_name_of_this);
3743
3744 return read_var_value (sym, frame);
3745}
3746
3747/* Return the value of the local variable, if one exists. Return NULL
3748 otherwise. Never throw error. */
3749
3750struct value *
3751value_of_this_silent (const struct language_defn *lang)
3752{
3753 struct value *ret = NULL;
85bc8cb7 3754
492d29ea 3755 TRY
c906108c 3756 {
85bc8cb7 3757 ret = value_of_this (lang);
c906108c 3758 }
492d29ea
PA
3759 CATCH (except, RETURN_MASK_ERROR)
3760 {
3761 }
3762 END_CATCH
c906108c 3763
d069f99d
AF
3764 return ret;
3765}
3766
ac3eeb49
MS
3767/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3768 elements long, starting at LOWBOUND. The result has the same lower
3769 bound as the original ARRAY. */
c906108c 3770
f23631e4
AC
3771struct value *
3772value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3773{
3774 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3775 LONGEST lowerbound, upperbound;
f23631e4 3776 struct value *slice;
c906108c 3777 struct type *array_type;
ac3eeb49 3778
df407dfe 3779 array_type = check_typedef (value_type (array));
c906108c 3780 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3781 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3782 error (_("cannot take slice of non-array"));
ac3eeb49 3783
c906108c
SS
3784 range_type = TYPE_INDEX_TYPE (array_type);
3785 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3786 error (_("slice from bad array or bitstring"));
ac3eeb49 3787
c906108c 3788 if (lowbound < lowerbound || length < 0
db034ac5 3789 || lowbound + length - 1 > upperbound)
8a3fe4f8 3790 error (_("slice out of range"));
ac3eeb49 3791
c906108c
SS
3792 /* FIXME-type-allocation: need a way to free this type when we are
3793 done with it. */
0c9c3474
SA
3794 slice_range_type = create_static_range_type ((struct type *) NULL,
3795 TYPE_TARGET_TYPE (range_type),
3796 lowbound,
3797 lowbound + length - 1);
ac3eeb49 3798
a7c88acd
JB
3799 {
3800 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3801 LONGEST offset
3802 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3803
a7c88acd
JB
3804 slice_type = create_array_type ((struct type *) NULL,
3805 element_type,
3806 slice_range_type);
3807 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3808
a7c88acd
JB
3809 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3810 slice = allocate_value_lazy (slice_type);
3811 else
3812 {
3813 slice = allocate_value (slice_type);
3814 value_contents_copy (slice, 0, array, offset,
3815 TYPE_LENGTH (slice_type));
3816 }
3817
3818 set_value_component_location (slice, array);
3819 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3820 set_value_offset (slice, value_offset (array) + offset);
3821 }
ac3eeb49 3822
c906108c
SS
3823 return slice;
3824}
3825
ac3eeb49
MS
3826/* Create a value for a FORTRAN complex number. Currently most of the
3827 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3828 composed of 2 doubles. This really should be a smarter routine
3829 that figures out precision inteligently as opposed to assuming
ac3eeb49 3830 doubles. FIXME: fmb */
c906108c 3831
f23631e4 3832struct value *
ac3eeb49
MS
3833value_literal_complex (struct value *arg1,
3834 struct value *arg2,
3835 struct type *type)
c906108c 3836{
f23631e4 3837 struct value *val;
c906108c
SS
3838 struct type *real_type = TYPE_TARGET_TYPE (type);
3839
3840 val = allocate_value (type);
3841 arg1 = value_cast (real_type, arg1);
3842 arg2 = value_cast (real_type, arg2);
3843
990a07ab 3844 memcpy (value_contents_raw (val),
0fd88904 3845 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3846 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3847 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3848 return val;
3849}
3850
ac3eeb49 3851/* Cast a value into the appropriate complex data type. */
c906108c 3852
f23631e4
AC
3853static struct value *
3854cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3855{
3856 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3857
df407dfe 3858 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3859 {
df407dfe 3860 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3861 struct value *re_val = allocate_value (val_real_type);
3862 struct value *im_val = allocate_value (val_real_type);
c906108c 3863
990a07ab 3864 memcpy (value_contents_raw (re_val),
0fd88904 3865 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3866 memcpy (value_contents_raw (im_val),
0fd88904 3867 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3868 TYPE_LENGTH (val_real_type));
c906108c
SS
3869
3870 return value_literal_complex (re_val, im_val, type);
3871 }
df407dfe
AC
3872 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3873 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3874 return value_literal_complex (val,
3875 value_zero (real_type, not_lval),
3876 type);
c906108c 3877 else
8a3fe4f8 3878 error (_("cannot cast non-number to complex"));
c906108c
SS
3879}
3880
3881void
fba45db2 3882_initialize_valops (void)
c906108c 3883{
5bf193a2
AC
3884 add_setshow_boolean_cmd ("overload-resolution", class_support,
3885 &overload_resolution, _("\
3886Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3887Show overload resolution in evaluating C++ functions."),
3888 NULL, NULL,
920d2a44 3889 show_overload_resolution,
5bf193a2 3890 &setlist, &showlist);
c906108c 3891 overload_resolution = 1;
c906108c 3892}