]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/valops.c
User breakpoint ignored if software-single-step at same location
[thirdparty/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
ecd75fc8 3 Copyright (C) 1986-2014 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
e6ca34fc 38#include "tracepoint.h"
c906108c 39#include <errno.h>
0e9f083f 40#include <string.h>
4a1970e4 41#include "gdb_assert.h"
f4c5303c 42#include "observer.h"
3e3b026f 43#include "objfiles.h"
79afc5ef 44#include "exceptions.h"
c906108c 45
ccce17b0 46extern unsigned int overload_debug;
c906108c
SS
47/* Local functions. */
48
ad2f7632
DJ
49static int typecmp (int staticp, int varargs, int nargs,
50 struct field t1[], struct value *t2[]);
c906108c 51
714f19d5 52static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 53 int, struct type *, int);
c906108c 54
714f19d5
TT
55static struct value *search_struct_method (const char *, struct value **,
56 struct value **,
57 int, int *, struct type *);
c906108c 58
da096638 59static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
60 const char *, const char *,
61 struct symbol ***,
7322dca9
SW
62 struct badness_vector **,
63 const int no_adl);
8d577d32
DC
64
65static
da096638 66int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
67 const char *, const char *,
68 int, struct symbol ***,
7322dca9
SW
69 struct badness_vector **, int *,
70 const int no_adl);
ac3eeb49 71
9cf95373 72static int find_oload_champ (struct value **, int, int,
ac3eeb49
MS
73 struct fn_field *, struct symbol **,
74 struct badness_vector **);
75
2bca57ba 76static int oload_method_static_p (struct fn_field *, int);
8d577d32
DC
77
78enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
79
80static enum
ac3eeb49
MS
81oload_classification classify_oload_match (struct badness_vector *,
82 int, int);
8d577d32 83
ac3eeb49
MS
84static struct value *value_struct_elt_for_reference (struct type *,
85 int, struct type *,
c848d642 86 const char *,
ac3eeb49
MS
87 struct type *,
88 int, enum noside);
79c2c32d 89
ac3eeb49 90static struct value *value_namespace_elt (const struct type *,
c848d642 91 const char *, int , enum noside);
79c2c32d 92
ac3eeb49 93static struct value *value_maybe_namespace_elt (const struct type *,
c848d642 94 const char *, int,
ac3eeb49 95 enum noside);
63d06c5c 96
a14ed312 97static CORE_ADDR allocate_space_in_inferior (int);
c906108c 98
f23631e4 99static struct value *cast_into_complex (struct type *, struct value *);
c906108c 100
714f19d5 101static struct fn_field *find_method_list (struct value **, const char *,
ac3eeb49
MS
102 int, struct type *, int *,
103 struct type **, int *);
7a292a7a 104
a14ed312 105void _initialize_valops (void);
c906108c 106
c906108c 107#if 0
ac3eeb49
MS
108/* Flag for whether we want to abandon failed expression evals by
109 default. */
110
c906108c
SS
111static int auto_abandon = 0;
112#endif
113
114int overload_resolution = 0;
920d2a44
AC
115static void
116show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
117 struct cmd_list_element *c,
118 const char *value)
920d2a44 119{
3e43a32a
MS
120 fprintf_filtered (file, _("Overload resolution in evaluating "
121 "C++ functions is %s.\n"),
920d2a44
AC
122 value);
123}
242bfc55 124
3e3b026f
UW
125/* Find the address of function name NAME in the inferior. If OBJF_P
126 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
127 is defined. */
c906108c 128
f23631e4 129struct value *
3e3b026f 130find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 131{
52f0bd74 132 struct symbol *sym;
a109c7c1 133
2570f2b7 134 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
135 if (sym != NULL)
136 {
137 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
138 {
8a3fe4f8 139 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
140 name);
141 }
3e3b026f
UW
142
143 if (objf_p)
144 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
145
c906108c
SS
146 return value_of_variable (sym, NULL);
147 }
148 else
149 {
7c7b6655
TT
150 struct bound_minimal_symbol msymbol =
151 lookup_bound_minimal_symbol (name);
a109c7c1 152
7c7b6655 153 if (msymbol.minsym != NULL)
c906108c 154 {
7c7b6655 155 struct objfile *objfile = msymbol.objfile;
3e3b026f
UW
156 struct gdbarch *gdbarch = get_objfile_arch (objfile);
157
c906108c 158 struct type *type;
4478b372 159 CORE_ADDR maddr;
3e3b026f 160 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
161 type = lookup_function_type (type);
162 type = lookup_pointer_type (type);
77e371c0 163 maddr = BMSYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
164
165 if (objf_p)
166 *objf_p = objfile;
167
4478b372 168 return value_from_pointer (type, maddr);
c906108c
SS
169 }
170 else
171 {
c5aa993b 172 if (!target_has_execution)
3e43a32a
MS
173 error (_("evaluation of this expression "
174 "requires the target program to be active"));
c5aa993b 175 else
3e43a32a
MS
176 error (_("evaluation of this expression requires the "
177 "program to have a function \"%s\"."),
178 name);
c906108c
SS
179 }
180 }
181}
182
ac3eeb49
MS
183/* Allocate NBYTES of space in the inferior using the inferior's
184 malloc and return a value that is a pointer to the allocated
185 space. */
c906108c 186
f23631e4 187struct value *
fba45db2 188value_allocate_space_in_inferior (int len)
c906108c 189{
3e3b026f
UW
190 struct objfile *objf;
191 struct value *val = find_function_in_inferior ("malloc", &objf);
192 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 193 struct value *blocklen;
c906108c 194
3e3b026f 195 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
196 val = call_function_by_hand (val, 1, &blocklen);
197 if (value_logical_not (val))
198 {
199 if (!target_has_execution)
3e43a32a
MS
200 error (_("No memory available to program now: "
201 "you need to start the target first"));
c5aa993b 202 else
8a3fe4f8 203 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
204 }
205 return val;
206}
207
208static CORE_ADDR
fba45db2 209allocate_space_in_inferior (int len)
c906108c
SS
210{
211 return value_as_long (value_allocate_space_in_inferior (len));
212}
213
6af87b03
AR
214/* Cast struct value VAL to type TYPE and return as a value.
215 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
216 for this to work. Typedef to one of the codes is permitted.
217 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
218
219static struct value *
220value_cast_structs (struct type *type, struct value *v2)
221{
222 struct type *t1;
223 struct type *t2;
224 struct value *v;
225
226 gdb_assert (type != NULL && v2 != NULL);
227
228 t1 = check_typedef (type);
229 t2 = check_typedef (value_type (v2));
230
231 /* Check preconditions. */
232 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
233 || TYPE_CODE (t1) == TYPE_CODE_UNION)
234 && !!"Precondition is that type is of STRUCT or UNION kind.");
235 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
236 || TYPE_CODE (t2) == TYPE_CODE_UNION)
237 && !!"Precondition is that value is of STRUCT or UNION kind");
238
191ca0a1
CM
239 if (TYPE_NAME (t1) != NULL
240 && TYPE_NAME (t2) != NULL
241 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
242 return NULL;
243
6af87b03
AR
244 /* Upcasting: look in the type of the source to see if it contains the
245 type of the target as a superclass. If so, we'll need to
246 offset the pointer rather than just change its type. */
247 if (TYPE_NAME (t1) != NULL)
248 {
249 v = search_struct_field (type_name_no_tag (t1),
250 v2, 0, t2, 1);
251 if (v)
252 return v;
253 }
254
255 /* Downcasting: look in the type of the target to see if it contains the
256 type of the source as a superclass. If so, we'll need to
9c3c02fd 257 offset the pointer rather than just change its type. */
6af87b03
AR
258 if (TYPE_NAME (t2) != NULL)
259 {
9c3c02fd
TT
260 /* Try downcasting using the run-time type of the value. */
261 int full, top, using_enc;
262 struct type *real_type;
263
264 real_type = value_rtti_type (v2, &full, &top, &using_enc);
265 if (real_type)
266 {
267 v = value_full_object (v2, real_type, full, top, using_enc);
268 v = value_at_lazy (real_type, value_address (v));
9f1f738a 269 real_type = value_type (v);
9c3c02fd
TT
270
271 /* We might be trying to cast to the outermost enclosing
272 type, in which case search_struct_field won't work. */
273 if (TYPE_NAME (real_type) != NULL
274 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
275 return v;
276
277 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
278 if (v)
279 return v;
280 }
281
282 /* Try downcasting using information from the destination type
283 T2. This wouldn't work properly for classes with virtual
284 bases, but those were handled above. */
6af87b03
AR
285 v = search_struct_field (type_name_no_tag (t2),
286 value_zero (t1, not_lval), 0, t1, 1);
287 if (v)
288 {
289 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 290 CORE_ADDR addr2 = value_address (v2);
a109c7c1 291
42ae5230 292 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
293 return value_at (type, addr2);
294 }
295 }
694182d2
DJ
296
297 return NULL;
6af87b03
AR
298}
299
fb933624
DJ
300/* Cast one pointer or reference type to another. Both TYPE and
301 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
302 reference types. If SUBCLASS_CHECK is non-zero, this will force a
303 check to see whether TYPE is a superclass of ARG2's type. If
304 SUBCLASS_CHECK is zero, then the subclass check is done only when
305 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
306
307struct value *
b1af9e97
TT
308value_cast_pointers (struct type *type, struct value *arg2,
309 int subclass_check)
fb933624 310{
d160942f 311 struct type *type1 = check_typedef (type);
fb933624 312 struct type *type2 = check_typedef (value_type (arg2));
d160942f 313 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
314 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
315
316 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
317 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 318 && (subclass_check || !value_logical_not (arg2)))
fb933624 319 {
6af87b03 320 struct value *v2;
fb933624 321
6af87b03
AR
322 if (TYPE_CODE (type2) == TYPE_CODE_REF)
323 v2 = coerce_ref (arg2);
324 else
325 v2 = value_ind (arg2);
3e43a32a
MS
326 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
327 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
328 v2 = value_cast_structs (t1, v2);
329 /* At this point we have what we can have, un-dereference if needed. */
330 if (v2)
fb933624 331 {
6af87b03 332 struct value *v = value_addr (v2);
a109c7c1 333
6af87b03
AR
334 deprecated_set_value_type (v, type);
335 return v;
fb933624 336 }
6af87b03 337 }
fb933624
DJ
338
339 /* No superclass found, just change the pointer type. */
0d5de010 340 arg2 = value_copy (arg2);
fb933624 341 deprecated_set_value_type (arg2, type);
4dfea560 342 set_value_enclosing_type (arg2, type);
fb933624
DJ
343 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
344 return arg2;
345}
346
c906108c
SS
347/* Cast value ARG2 to type TYPE and return as a value.
348 More general than a C cast: accepts any two types of the same length,
349 and if ARG2 is an lvalue it can be cast into anything at all. */
350/* In C++, casts may change pointer or object representations. */
351
f23631e4
AC
352struct value *
353value_cast (struct type *type, struct value *arg2)
c906108c 354{
52f0bd74
AC
355 enum type_code code1;
356 enum type_code code2;
357 int scalar;
c906108c
SS
358 struct type *type2;
359
360 int convert_to_boolean = 0;
c5aa993b 361
df407dfe 362 if (value_type (arg2) == type)
c906108c
SS
363 return arg2;
364
6af87b03
AR
365 code1 = TYPE_CODE (check_typedef (type));
366
367 /* Check if we are casting struct reference to struct reference. */
368 if (code1 == TYPE_CODE_REF)
369 {
370 /* We dereference type; then we recurse and finally
581e13c1 371 we generate value of the given reference. Nothing wrong with
6af87b03
AR
372 that. */
373 struct type *t1 = check_typedef (type);
374 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
375 struct value *val = value_cast (dereftype, arg2);
a109c7c1 376
6af87b03
AR
377 return value_ref (val);
378 }
379
380 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
381
382 if (code2 == TYPE_CODE_REF)
383 /* We deref the value and then do the cast. */
384 return value_cast (type, coerce_ref (arg2));
385
c906108c
SS
386 CHECK_TYPEDEF (type);
387 code1 = TYPE_CODE (type);
994b9211 388 arg2 = coerce_ref (arg2);
df407dfe 389 type2 = check_typedef (value_type (arg2));
c906108c 390
fb933624
DJ
391 /* You can't cast to a reference type. See value_cast_pointers
392 instead. */
393 gdb_assert (code1 != TYPE_CODE_REF);
394
ac3eeb49
MS
395 /* A cast to an undetermined-length array_type, such as
396 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
397 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
398 if (code1 == TYPE_CODE_ARRAY)
399 {
400 struct type *element_type = TYPE_TARGET_TYPE (type);
401 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 402
d78df370 403 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
404 {
405 struct type *range_type = TYPE_INDEX_TYPE (type);
406 int val_length = TYPE_LENGTH (type2);
407 LONGEST low_bound, high_bound, new_length;
a109c7c1 408
c906108c
SS
409 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
410 low_bound = 0, high_bound = 0;
411 new_length = val_length / element_length;
412 if (val_length % element_length != 0)
3e43a32a
MS
413 warning (_("array element type size does not "
414 "divide object size in cast"));
ac3eeb49
MS
415 /* FIXME-type-allocation: need a way to free this type when
416 we are done with it. */
0c9c3474
SA
417 range_type = create_static_range_type ((struct type *) NULL,
418 TYPE_TARGET_TYPE (range_type),
419 low_bound,
420 new_length + low_bound - 1);
ac3eeb49
MS
421 deprecated_set_value_type (arg2,
422 create_array_type ((struct type *) NULL,
423 element_type,
424 range_type));
c906108c
SS
425 return arg2;
426 }
427 }
428
429 if (current_language->c_style_arrays
3bdf2bbd
KW
430 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
431 && !TYPE_VECTOR (type2))
c906108c
SS
432 arg2 = value_coerce_array (arg2);
433
434 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
435 arg2 = value_coerce_function (arg2);
436
df407dfe 437 type2 = check_typedef (value_type (arg2));
c906108c
SS
438 code2 = TYPE_CODE (type2);
439
440 if (code1 == TYPE_CODE_COMPLEX)
441 return cast_into_complex (type, arg2);
442 if (code1 == TYPE_CODE_BOOL)
443 {
444 code1 = TYPE_CODE_INT;
445 convert_to_boolean = 1;
446 }
447 if (code1 == TYPE_CODE_CHAR)
448 code1 = TYPE_CODE_INT;
449 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
450 code2 = TYPE_CODE_INT;
451
452 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
453 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
454 || code2 == TYPE_CODE_RANGE);
c906108c 455
6af87b03
AR
456 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
457 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 458 && TYPE_NAME (type) != 0)
694182d2
DJ
459 {
460 struct value *v = value_cast_structs (type, arg2);
a109c7c1 461
694182d2
DJ
462 if (v)
463 return v;
464 }
465
c906108c
SS
466 if (code1 == TYPE_CODE_FLT && scalar)
467 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
468 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
469 {
e17a4113 470 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
471 int dec_len = TYPE_LENGTH (type);
472 gdb_byte dec[16];
473
474 if (code2 == TYPE_CODE_FLT)
e17a4113 475 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
476 else if (code2 == TYPE_CODE_DECFLOAT)
477 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 478 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
479 else
480 /* The only option left is an integral type. */
e17a4113 481 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
482
483 return value_from_decfloat (type, dec);
484 }
c906108c
SS
485 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
486 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
487 && (scalar || code2 == TYPE_CODE_PTR
488 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
489 {
490 LONGEST longest;
c5aa993b 491
2bf1f4a1 492 /* When we cast pointers to integers, we mustn't use
76e71323 493 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
494 represents, as value_as_long would. GDB should evaluate
495 expressions just as the compiler would --- and the compiler
496 sees a cast as a simple reinterpretation of the pointer's
497 bits. */
498 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
499 longest = extract_unsigned_integer
500 (value_contents (arg2), TYPE_LENGTH (type2),
501 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
502 else
503 longest = value_as_long (arg2);
802db21b 504 return value_from_longest (type, convert_to_boolean ?
716c501e 505 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 506 }
ac3eeb49
MS
507 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
508 || code2 == TYPE_CODE_ENUM
509 || code2 == TYPE_CODE_RANGE))
634acd5f 510 {
4603e466
DT
511 /* TYPE_LENGTH (type) is the length of a pointer, but we really
512 want the length of an address! -- we are really dealing with
513 addresses (i.e., gdb representations) not pointers (i.e.,
514 target representations) here.
515
516 This allows things like "print *(int *)0x01000234" to work
517 without printing a misleading message -- which would
518 otherwise occur when dealing with a target having two byte
519 pointers and four byte addresses. */
520
50810684 521 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 522 LONGEST longest = value_as_long (arg2);
a109c7c1 523
4603e466 524 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 525 {
4603e466
DT
526 if (longest >= ((LONGEST) 1 << addr_bit)
527 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 528 warning (_("value truncated"));
634acd5f
AC
529 }
530 return value_from_longest (type, longest);
531 }
0d5de010
DJ
532 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
533 && value_as_long (arg2) == 0)
534 {
535 struct value *result = allocate_value (type);
a109c7c1 536
ad4820ab 537 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
538 return result;
539 }
540 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
541 && value_as_long (arg2) == 0)
542 {
543 /* The Itanium C++ ABI represents NULL pointers to members as
544 minus one, instead of biasing the normal case. */
545 return value_from_longest (type, -1);
546 }
8954db33
AB
547 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
548 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
549 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
550 error (_("Cannot convert between vector values of different sizes"));
551 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
552 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
553 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
554 else if (code1 == TYPE_CODE_VOID)
555 {
556 return value_zero (type, not_lval);
557 }
c906108c
SS
558 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
559 {
560 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 561 return value_cast_pointers (type, arg2, 0);
fb933624 562
0d5de010 563 arg2 = value_copy (arg2);
04624583 564 deprecated_set_value_type (arg2, type);
4dfea560 565 set_value_enclosing_type (arg2, type);
b44d461b 566 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
567 return arg2;
568 }
c906108c 569 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 570 return value_at_lazy (type, value_address (arg2));
c906108c
SS
571 else
572 {
8a3fe4f8 573 error (_("Invalid cast."));
c906108c
SS
574 return 0;
575 }
576}
577
4e8f195d
TT
578/* The C++ reinterpret_cast operator. */
579
580struct value *
581value_reinterpret_cast (struct type *type, struct value *arg)
582{
583 struct value *result;
584 struct type *real_type = check_typedef (type);
585 struct type *arg_type, *dest_type;
586 int is_ref = 0;
587 enum type_code dest_code, arg_code;
588
589 /* Do reference, function, and array conversion. */
590 arg = coerce_array (arg);
591
592 /* Attempt to preserve the type the user asked for. */
593 dest_type = type;
594
595 /* If we are casting to a reference type, transform
596 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
597 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
598 {
599 is_ref = 1;
600 arg = value_addr (arg);
601 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
602 real_type = lookup_pointer_type (real_type);
603 }
604
605 arg_type = value_type (arg);
606
607 dest_code = TYPE_CODE (real_type);
608 arg_code = TYPE_CODE (arg_type);
609
610 /* We can convert pointer types, or any pointer type to int, or int
611 type to pointer. */
612 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
613 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
614 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
616 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
617 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
618 || (dest_code == arg_code
619 && (dest_code == TYPE_CODE_PTR
620 || dest_code == TYPE_CODE_METHODPTR
621 || dest_code == TYPE_CODE_MEMBERPTR)))
622 result = value_cast (dest_type, arg);
623 else
624 error (_("Invalid reinterpret_cast"));
625
626 if (is_ref)
627 result = value_cast (type, value_ref (value_ind (result)));
628
629 return result;
630}
631
632/* A helper for value_dynamic_cast. This implements the first of two
633 runtime checks: we iterate over all the base classes of the value's
634 class which are equal to the desired class; if only one of these
635 holds the value, then it is the answer. */
636
637static int
638dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
639 const gdb_byte *valaddr,
640 int embedded_offset,
4e8f195d 641 CORE_ADDR address,
8af8e3bc 642 struct value *val,
4e8f195d
TT
643 struct type *search_type,
644 CORE_ADDR arg_addr,
645 struct type *arg_type,
646 struct value **result)
647{
648 int i, result_count = 0;
649
650 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
651 {
8af8e3bc
PA
652 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
653 address, val);
a109c7c1 654
4e8f195d
TT
655 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
656 {
8af8e3bc
PA
657 if (address + embedded_offset + offset >= arg_addr
658 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
659 {
660 ++result_count;
661 if (!*result)
662 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 663 address + embedded_offset + offset);
4e8f195d
TT
664 }
665 }
666 else
667 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
668 valaddr,
669 embedded_offset + offset,
670 address, val,
4e8f195d
TT
671 TYPE_BASECLASS (search_type, i),
672 arg_addr,
673 arg_type,
674 result);
675 }
676
677 return result_count;
678}
679
680/* A helper for value_dynamic_cast. This implements the second of two
681 runtime checks: we look for a unique public sibling class of the
682 argument's declared class. */
683
684static int
685dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
686 const gdb_byte *valaddr,
687 int embedded_offset,
4e8f195d 688 CORE_ADDR address,
8af8e3bc 689 struct value *val,
4e8f195d
TT
690 struct type *search_type,
691 struct value **result)
692{
693 int i, result_count = 0;
694
695 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
696 {
697 int offset;
698
699 if (! BASETYPE_VIA_PUBLIC (search_type, i))
700 continue;
701
8af8e3bc
PA
702 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
703 address, val);
4e8f195d
TT
704 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
705 {
706 ++result_count;
707 if (*result == NULL)
708 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 709 address + embedded_offset + offset);
4e8f195d
TT
710 }
711 else
712 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
713 valaddr,
714 embedded_offset + offset,
715 address, val,
4e8f195d
TT
716 TYPE_BASECLASS (search_type, i),
717 result);
718 }
719
720 return result_count;
721}
722
723/* The C++ dynamic_cast operator. */
724
725struct value *
726value_dynamic_cast (struct type *type, struct value *arg)
727{
8f78b329 728 int full, top, using_enc;
4e8f195d
TT
729 struct type *resolved_type = check_typedef (type);
730 struct type *arg_type = check_typedef (value_type (arg));
731 struct type *class_type, *rtti_type;
732 struct value *result, *tem, *original_arg = arg;
733 CORE_ADDR addr;
734 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
735
736 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
737 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
738 error (_("Argument to dynamic_cast must be a pointer or reference type"));
739 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
740 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
741 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
742
743 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
744 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
745 {
746 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
747 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
748 && value_as_long (arg) == 0))
749 error (_("Argument to dynamic_cast does not have pointer type"));
750 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
751 {
752 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
753 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
754 error (_("Argument to dynamic_cast does "
755 "not have pointer to class type"));
4e8f195d
TT
756 }
757
758 /* Handle NULL pointers. */
759 if (value_as_long (arg) == 0)
760 return value_zero (type, not_lval);
761
762 arg = value_ind (arg);
763 }
764 else
765 {
766 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
767 error (_("Argument to dynamic_cast does not have class type"));
768 }
769
770 /* If the classes are the same, just return the argument. */
771 if (class_types_same_p (class_type, arg_type))
772 return value_cast (type, arg);
773
774 /* If the target type is a unique base class of the argument's
775 declared type, just cast it. */
776 if (is_ancestor (class_type, arg_type))
777 {
778 if (is_unique_ancestor (class_type, arg))
779 return value_cast (type, original_arg);
780 error (_("Ambiguous dynamic_cast"));
781 }
782
783 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
784 if (! rtti_type)
785 error (_("Couldn't determine value's most derived type for dynamic_cast"));
786
787 /* Compute the most derived object's address. */
788 addr = value_address (arg);
789 if (full)
790 {
791 /* Done. */
792 }
793 else if (using_enc)
794 addr += top;
795 else
796 addr += top + value_embedded_offset (arg);
797
798 /* dynamic_cast<void *> means to return a pointer to the
799 most-derived object. */
800 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
801 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
802 return value_at_lazy (type, addr);
803
804 tem = value_at (type, addr);
9f1f738a 805 type = value_type (tem);
4e8f195d
TT
806
807 /* The first dynamic check specified in 5.2.7. */
808 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
809 {
810 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
811 return tem;
812 result = NULL;
813 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
814 value_contents_for_printing (tem),
815 value_embedded_offset (tem),
816 value_address (tem), tem,
4e8f195d
TT
817 rtti_type, addr,
818 arg_type,
819 &result) == 1)
820 return value_cast (type,
821 is_ref ? value_ref (result) : value_addr (result));
822 }
823
824 /* The second dynamic check specified in 5.2.7. */
825 result = NULL;
826 if (is_public_ancestor (arg_type, rtti_type)
827 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
828 value_contents_for_printing (tem),
829 value_embedded_offset (tem),
830 value_address (tem), tem,
4e8f195d
TT
831 rtti_type, &result) == 1)
832 return value_cast (type,
833 is_ref ? value_ref (result) : value_addr (result));
834
835 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
836 return value_zero (type, not_lval);
837
838 error (_("dynamic_cast failed"));
839}
840
c906108c
SS
841/* Create a value of type TYPE that is zero, and return it. */
842
f23631e4 843struct value *
fba45db2 844value_zero (struct type *type, enum lval_type lv)
c906108c 845{
f23631e4 846 struct value *val = allocate_value (type);
c906108c 847
bb7da2bf 848 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
849 return val;
850}
851
18a46dbe 852/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
853
854struct value *
18a46dbe 855value_one (struct type *type)
301f0ecf
DE
856{
857 struct type *type1 = check_typedef (type);
4e608b4f 858 struct value *val;
301f0ecf
DE
859
860 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
861 {
e17a4113 862 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 863 gdb_byte v[16];
a109c7c1 864
e17a4113 865 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
866 val = value_from_decfloat (type, v);
867 }
868 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
869 {
870 val = value_from_double (type, (DOUBLEST) 1);
871 }
872 else if (is_integral_type (type1))
873 {
874 val = value_from_longest (type, (LONGEST) 1);
875 }
120bd360
KW
876 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
877 {
878 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
879 int i;
880 LONGEST low_bound, high_bound;
120bd360
KW
881 struct value *tmp;
882
cfa6f054
KW
883 if (!get_array_bounds (type1, &low_bound, &high_bound))
884 error (_("Could not determine the vector bounds"));
885
120bd360 886 val = allocate_value (type);
cfa6f054 887 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 888 {
18a46dbe 889 tmp = value_one (eltype);
120bd360
KW
890 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
891 value_contents_all (tmp), TYPE_LENGTH (eltype));
892 }
893 }
301f0ecf
DE
894 else
895 {
896 error (_("Not a numeric type."));
897 }
898
18a46dbe
JK
899 /* value_one result is never used for assignments to. */
900 gdb_assert (VALUE_LVAL (val) == not_lval);
901
301f0ecf
DE
902 return val;
903}
904
80180f79
SA
905/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack.
906 The type of the created value may differ from the passed type TYPE.
907 Make sure to retrieve the returned values's new type after this call
908 e.g. in case the type is a variable length array. */
4e5d721f
DE
909
910static struct value *
911get_value_at (struct type *type, CORE_ADDR addr, int lazy)
912{
913 struct value *val;
914
915 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
916 error (_("Attempt to dereference a generic pointer."));
917
a3d34bf4 918 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 919
a3d34bf4
PA
920 if (!lazy)
921 value_fetch_lazy (val);
4e5d721f
DE
922
923 return val;
924}
925
070ad9f0 926/* Return a value with type TYPE located at ADDR.
c906108c
SS
927
928 Call value_at only if the data needs to be fetched immediately;
929 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
930 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 931 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 932 is tested in the value_contents macro, which is used if and when
80180f79
SA
933 the contents are actually required. The type of the created value
934 may differ from the passed type TYPE. Make sure to retrieve the
935 returned values's new type after this call e.g. in case the type
936 is a variable length array.
c906108c
SS
937
938 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 939 adjustments before or after calling it. */
c906108c 940
f23631e4 941struct value *
00a4c844 942value_at (struct type *type, CORE_ADDR addr)
c906108c 943{
4e5d721f 944 return get_value_at (type, addr, 0);
c906108c
SS
945}
946
80180f79
SA
947/* Return a lazy value with type TYPE located at ADDR (cf. value_at).
948 The type of the created value may differ from the passed type TYPE.
949 Make sure to retrieve the returned values's new type after this call
950 e.g. in case the type is a variable length array. */
c906108c 951
f23631e4 952struct value *
00a4c844 953value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 954{
4e5d721f 955 return get_value_at (type, addr, 1);
c906108c
SS
956}
957
e6ca34fc
PA
958void
959read_value_memory (struct value *val, int embedded_offset,
960 int stack, CORE_ADDR memaddr,
961 gdb_byte *buffer, size_t length)
962{
5a2eb0ef
YQ
963 ULONGEST xfered = 0;
964
965 while (xfered < length)
966 {
967 enum target_xfer_status status;
968 ULONGEST xfered_len;
969
970 status = target_xfer_partial (current_target.beneath,
971 TARGET_OBJECT_MEMORY, NULL,
972 buffer + xfered, NULL,
973 memaddr + xfered, length - xfered,
974 &xfered_len);
975
976 if (status == TARGET_XFER_OK)
977 /* nothing */;
bc113b4e 978 else if (status == TARGET_XFER_UNAVAILABLE)
5a2eb0ef
YQ
979 mark_value_bytes_unavailable (val, embedded_offset + xfered,
980 xfered_len);
981 else if (status == TARGET_XFER_EOF)
982 memory_error (TARGET_XFER_E_IO, memaddr + xfered);
e6ca34fc 983 else
5a2eb0ef 984 memory_error (status, memaddr + xfered);
e6ca34fc 985
5a2eb0ef
YQ
986 xfered += xfered_len;
987 QUIT;
e6ca34fc
PA
988 }
989}
c906108c
SS
990
991/* Store the contents of FROMVAL into the location of TOVAL.
992 Return a new value with the location of TOVAL and contents of FROMVAL. */
993
f23631e4
AC
994struct value *
995value_assign (struct value *toval, struct value *fromval)
c906108c 996{
52f0bd74 997 struct type *type;
f23631e4 998 struct value *val;
cb741690 999 struct frame_id old_frame;
c906108c 1000
88e3b34b 1001 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1002 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1003
994b9211 1004 toval = coerce_ref (toval);
c906108c 1005
df407dfe 1006 type = value_type (toval);
c906108c 1007 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1008 fromval = value_cast (type, fromval);
c906108c 1009 else
63092375
DJ
1010 {
1011 /* Coerce arrays and functions to pointers, except for arrays
1012 which only live in GDB's storage. */
1013 if (!value_must_coerce_to_target (fromval))
1014 fromval = coerce_array (fromval);
1015 }
1016
c906108c
SS
1017 CHECK_TYPEDEF (type);
1018
ac3eeb49
MS
1019 /* Since modifying a register can trash the frame chain, and
1020 modifying memory can trash the frame cache, we save the old frame
1021 and then restore the new frame afterwards. */
206415a3 1022 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1023
c906108c
SS
1024 switch (VALUE_LVAL (toval))
1025 {
1026 case lval_internalvar:
1027 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1028 return value_of_internalvar (get_type_arch (type),
1029 VALUE_INTERNALVAR (toval));
c906108c
SS
1030
1031 case lval_internalvar_component:
d9e98382
SDJ
1032 {
1033 int offset = value_offset (toval);
1034
1035 /* Are we dealing with a bitfield?
1036
1037 It is important to mention that `value_parent (toval)' is
1038 non-NULL iff `value_bitsize (toval)' is non-zero. */
1039 if (value_bitsize (toval))
1040 {
1041 /* VALUE_INTERNALVAR below refers to the parent value, while
1042 the offset is relative to this parent value. */
1043 gdb_assert (value_parent (value_parent (toval)) == NULL);
1044 offset += value_offset (value_parent (toval));
1045 }
1046
1047 set_internalvar_component (VALUE_INTERNALVAR (toval),
1048 offset,
1049 value_bitpos (toval),
1050 value_bitsize (toval),
1051 fromval);
1052 }
c906108c
SS
1053 break;
1054
1055 case lval_memory:
1056 {
fc1a4b47 1057 const gdb_byte *dest_buffer;
c5aa993b
JM
1058 CORE_ADDR changed_addr;
1059 int changed_len;
10c42a71 1060 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1061
df407dfe 1062 if (value_bitsize (toval))
c5aa993b 1063 {
2d88202a 1064 struct value *parent = value_parent (toval);
2d88202a 1065
a109c7c1 1066 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1067 changed_len = (value_bitpos (toval)
1068 + value_bitsize (toval)
c5aa993b
JM
1069 + HOST_CHAR_BIT - 1)
1070 / HOST_CHAR_BIT;
c906108c 1071
4ea48cc1
DJ
1072 /* If we can read-modify-write exactly the size of the
1073 containing type (e.g. short or int) then do so. This
1074 is safer for volatile bitfields mapped to hardware
1075 registers. */
1076 if (changed_len < TYPE_LENGTH (type)
1077 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1078 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1079 changed_len = TYPE_LENGTH (type);
1080
c906108c 1081 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1082 error (_("Can't handle bitfields which "
1083 "don't fit in a %d bit word."),
baa6f10b 1084 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1085
2d88202a 1086 read_memory (changed_addr, buffer, changed_len);
50810684 1087 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1088 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1089 dest_buffer = buffer;
1090 }
c906108c
SS
1091 else
1092 {
42ae5230 1093 changed_addr = value_address (toval);
c906108c 1094 changed_len = TYPE_LENGTH (type);
0fd88904 1095 dest_buffer = value_contents (fromval);
c906108c
SS
1096 }
1097
972daa01 1098 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1099 }
1100 break;
1101
492254e9 1102 case lval_register:
c906108c 1103 {
c906108c 1104 struct frame_info *frame;
d80b854b 1105 struct gdbarch *gdbarch;
ff2e87ac 1106 int value_reg;
c906108c
SS
1107
1108 /* Figure out which frame this is in currently. */
0c16dd26
AC
1109 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1110 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1111
1112 if (!frame)
8a3fe4f8 1113 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1114
1115 gdbarch = get_frame_arch (frame);
1116 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1117 {
ff2e87ac 1118 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1119 conversion of program values to a special raw
1120 format. */
d80b854b 1121 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1122 VALUE_REGNUM (toval), type,
1123 value_contents (fromval));
492254e9 1124 }
c906108c 1125 else
492254e9 1126 {
df407dfe 1127 if (value_bitsize (toval))
00fa51f6 1128 {
2d88202a
UW
1129 struct value *parent = value_parent (toval);
1130 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1131 int changed_len;
1132 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1133 int optim, unavail;
00fa51f6
UW
1134
1135 changed_len = (value_bitpos (toval)
1136 + value_bitsize (toval)
1137 + HOST_CHAR_BIT - 1)
1138 / HOST_CHAR_BIT;
1139
1140 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1141 error (_("Can't handle bitfields which "
1142 "don't fit in a %d bit word."),
00fa51f6
UW
1143 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1144
8dccd430
PA
1145 if (!get_frame_register_bytes (frame, value_reg, offset,
1146 changed_len, buffer,
1147 &optim, &unavail))
1148 {
1149 if (optim)
710409a2
PA
1150 throw_error (OPTIMIZED_OUT_ERROR,
1151 _("value has been optimized out"));
8dccd430
PA
1152 if (unavail)
1153 throw_error (NOT_AVAILABLE_ERROR,
1154 _("value is not available"));
1155 }
00fa51f6 1156
50810684
UW
1157 modify_field (type, buffer, value_as_long (fromval),
1158 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1159
2d88202a 1160 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1161 changed_len, buffer);
1162 }
c906108c 1163 else
00fa51f6
UW
1164 {
1165 put_frame_register_bytes (frame, value_reg,
1166 value_offset (toval),
1167 TYPE_LENGTH (type),
1168 value_contents (fromval));
1169 }
ff2e87ac 1170 }
00fa51f6 1171
9a4105ab
AC
1172 if (deprecated_register_changed_hook)
1173 deprecated_register_changed_hook (-1);
ff2e87ac 1174 break;
c906108c 1175 }
5f5233d4
PA
1176
1177 case lval_computed:
1178 {
c8f2448a 1179 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1180
ac71a68c
JK
1181 if (funcs->write != NULL)
1182 {
1183 funcs->write (toval, fromval);
1184 break;
1185 }
5f5233d4 1186 }
ac71a68c 1187 /* Fall through. */
5f5233d4 1188
c906108c 1189 default:
8a3fe4f8 1190 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1191 }
1192
cb741690
DJ
1193 /* Assigning to the stack pointer, frame pointer, and other
1194 (architecture and calling convention specific) registers may
d649a38e 1195 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1196 also can. We just do this on all assignments to registers or
1197 memory, for simplicity's sake; I doubt the slowdown matters. */
1198 switch (VALUE_LVAL (toval))
1199 {
1200 case lval_memory:
1201 case lval_register:
0e03807e 1202 case lval_computed:
cb741690 1203
d649a38e 1204 observer_notify_target_changed (&current_target);
cb741690 1205
ac3eeb49
MS
1206 /* Having destroyed the frame cache, restore the selected
1207 frame. */
cb741690
DJ
1208
1209 /* FIXME: cagney/2002-11-02: There has to be a better way of
1210 doing this. Instead of constantly saving/restoring the
1211 frame. Why not create a get_selected_frame() function that,
1212 having saved the selected frame's ID can automatically
1213 re-find the previously selected frame automatically. */
1214
1215 {
1216 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1217
cb741690
DJ
1218 if (fi != NULL)
1219 select_frame (fi);
1220 }
1221
1222 break;
1223 default:
1224 break;
1225 }
1226
ac3eeb49
MS
1227 /* If the field does not entirely fill a LONGEST, then zero the sign
1228 bits. If the field is signed, and is negative, then sign
1229 extend. */
df407dfe
AC
1230 if ((value_bitsize (toval) > 0)
1231 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1232 {
1233 LONGEST fieldval = value_as_long (fromval);
df407dfe 1234 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1235
1236 fieldval &= valmask;
ac3eeb49
MS
1237 if (!TYPE_UNSIGNED (type)
1238 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1239 fieldval |= ~valmask;
1240
1241 fromval = value_from_longest (type, fieldval);
1242 }
1243
4aac0db7
UW
1244 /* The return value is a copy of TOVAL so it shares its location
1245 information, but its contents are updated from FROMVAL. This
1246 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1247 val = value_copy (toval);
4aac0db7 1248 set_value_lazy (val, 0);
0fd88904 1249 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1250 TYPE_LENGTH (type));
4aac0db7
UW
1251
1252 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1253 in the case of pointer types. For object types, the enclosing type
1254 and embedded offset must *not* be copied: the target object refered
1255 to by TOVAL retains its original dynamic type after assignment. */
1256 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1257 {
1258 set_value_enclosing_type (val, value_enclosing_type (fromval));
1259 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1260 }
c5aa993b 1261
c906108c
SS
1262 return val;
1263}
1264
1265/* Extend a value VAL to COUNT repetitions of its type. */
1266
f23631e4
AC
1267struct value *
1268value_repeat (struct value *arg1, int count)
c906108c 1269{
f23631e4 1270 struct value *val;
c906108c
SS
1271
1272 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1273 error (_("Only values in memory can be extended with '@'."));
c906108c 1274 if (count < 1)
8a3fe4f8 1275 error (_("Invalid number %d of repetitions."), count);
c906108c 1276
4754a64e 1277 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1278
c906108c 1279 VALUE_LVAL (val) = lval_memory;
42ae5230 1280 set_value_address (val, value_address (arg1));
c906108c 1281
24e6bcee
PA
1282 read_value_memory (val, 0, value_stack (val), value_address (val),
1283 value_contents_all_raw (val),
1284 TYPE_LENGTH (value_enclosing_type (val)));
1285
c906108c
SS
1286 return val;
1287}
1288
f23631e4 1289struct value *
9df2fbc4 1290value_of_variable (struct symbol *var, const struct block *b)
c906108c 1291{
61212c0f 1292 struct frame_info *frame;
c906108c 1293
61212c0f
UW
1294 if (!symbol_read_needs_frame (var))
1295 frame = NULL;
1296 else if (!b)
1297 frame = get_selected_frame (_("No frame selected."));
1298 else
c906108c
SS
1299 {
1300 frame = block_innermost_frame (b);
1301 if (!frame)
c5aa993b 1302 {
edb3359d 1303 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1304 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1305 error (_("No frame is currently executing in block %s."),
de5ad195 1306 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1307 else
8a3fe4f8 1308 error (_("No frame is currently executing in specified block"));
c5aa993b 1309 }
c906108c
SS
1310 }
1311
8afd712c 1312 return read_var_value (var, frame);
c906108c
SS
1313}
1314
61212c0f 1315struct value *
270140bd 1316address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1317{
1318 struct type *type = SYMBOL_TYPE (var);
1319 struct value *val;
1320
1321 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1322 Lazy evaluation pays off here. */
61212c0f
UW
1323
1324 val = value_of_variable (var, b);
9f1f738a 1325 type = value_type (val);
61212c0f
UW
1326
1327 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1328 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1329 {
42ae5230 1330 CORE_ADDR addr = value_address (val);
a109c7c1 1331
61212c0f
UW
1332 return value_from_pointer (lookup_pointer_type (type), addr);
1333 }
1334
1335 /* Not a memory address; check what the problem was. */
1336 switch (VALUE_LVAL (val))
1337 {
1338 case lval_register:
1339 {
1340 struct frame_info *frame;
1341 const char *regname;
1342
1343 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1344 gdb_assert (frame);
1345
1346 regname = gdbarch_register_name (get_frame_arch (frame),
1347 VALUE_REGNUM (val));
1348 gdb_assert (regname && *regname);
1349
1350 error (_("Address requested for identifier "
1351 "\"%s\" which is in register $%s"),
1352 SYMBOL_PRINT_NAME (var), regname);
1353 break;
1354 }
1355
1356 default:
1357 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1358 SYMBOL_PRINT_NAME (var));
1359 break;
1360 }
1361
1362 return val;
1363}
1364
63092375
DJ
1365/* Return one if VAL does not live in target memory, but should in order
1366 to operate on it. Otherwise return zero. */
1367
1368int
1369value_must_coerce_to_target (struct value *val)
1370{
1371 struct type *valtype;
1372
1373 /* The only lval kinds which do not live in target memory. */
1374 if (VALUE_LVAL (val) != not_lval
1375 && VALUE_LVAL (val) != lval_internalvar)
1376 return 0;
1377
1378 valtype = check_typedef (value_type (val));
1379
1380 switch (TYPE_CODE (valtype))
1381 {
1382 case TYPE_CODE_ARRAY:
3cbaedff 1383 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1384 case TYPE_CODE_STRING:
1385 return 1;
1386 default:
1387 return 0;
1388 }
1389}
1390
3e43a32a
MS
1391/* Make sure that VAL lives in target memory if it's supposed to. For
1392 instance, strings are constructed as character arrays in GDB's
1393 storage, and this function copies them to the target. */
63092375
DJ
1394
1395struct value *
1396value_coerce_to_target (struct value *val)
1397{
1398 LONGEST length;
1399 CORE_ADDR addr;
1400
1401 if (!value_must_coerce_to_target (val))
1402 return val;
1403
1404 length = TYPE_LENGTH (check_typedef (value_type (val)));
1405 addr = allocate_space_in_inferior (length);
1406 write_memory (addr, value_contents (val), length);
1407 return value_at_lazy (value_type (val), addr);
1408}
1409
ac3eeb49
MS
1410/* Given a value which is an array, return a value which is a pointer
1411 to its first element, regardless of whether or not the array has a
1412 nonzero lower bound.
c906108c 1413
ac3eeb49
MS
1414 FIXME: A previous comment here indicated that this routine should
1415 be substracting the array's lower bound. It's not clear to me that
1416 this is correct. Given an array subscripting operation, it would
1417 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1418
1419 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1420
ac3eeb49
MS
1421 However I believe a more appropriate and logical place to account
1422 for the lower bound is to do so in value_subscript, essentially
1423 computing:
c906108c
SS
1424
1425 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1426
ac3eeb49
MS
1427 As further evidence consider what would happen with operations
1428 other than array subscripting, where the caller would get back a
1429 value that had an address somewhere before the actual first element
1430 of the array, and the information about the lower bound would be
581e13c1 1431 lost because of the coercion to pointer type. */
c906108c 1432
f23631e4
AC
1433struct value *
1434value_coerce_array (struct value *arg1)
c906108c 1435{
df407dfe 1436 struct type *type = check_typedef (value_type (arg1));
c906108c 1437
63092375
DJ
1438 /* If the user tries to do something requiring a pointer with an
1439 array that has not yet been pushed to the target, then this would
1440 be a good time to do so. */
1441 arg1 = value_coerce_to_target (arg1);
1442
c906108c 1443 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1444 error (_("Attempt to take address of value not located in memory."));
c906108c 1445
4478b372 1446 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1447 value_address (arg1));
c906108c
SS
1448}
1449
1450/* Given a value which is a function, return a value which is a pointer
1451 to it. */
1452
f23631e4
AC
1453struct value *
1454value_coerce_function (struct value *arg1)
c906108c 1455{
f23631e4 1456 struct value *retval;
c906108c
SS
1457
1458 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1459 error (_("Attempt to take address of value not located in memory."));
c906108c 1460
df407dfe 1461 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1462 value_address (arg1));
c906108c 1463 return retval;
c5aa993b 1464}
c906108c 1465
ac3eeb49
MS
1466/* Return a pointer value for the object for which ARG1 is the
1467 contents. */
c906108c 1468
f23631e4
AC
1469struct value *
1470value_addr (struct value *arg1)
c906108c 1471{
f23631e4 1472 struct value *arg2;
df407dfe 1473 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1474
c906108c
SS
1475 if (TYPE_CODE (type) == TYPE_CODE_REF)
1476 {
ac3eeb49
MS
1477 /* Copy the value, but change the type from (T&) to (T*). We
1478 keep the same location information, which is efficient, and
1479 allows &(&X) to get the location containing the reference. */
c906108c 1480 arg2 = value_copy (arg1);
ac3eeb49
MS
1481 deprecated_set_value_type (arg2,
1482 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1483 return arg2;
1484 }
1485 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1486 return value_coerce_function (arg1);
1487
63092375
DJ
1488 /* If this is an array that has not yet been pushed to the target,
1489 then this would be a good time to force it to memory. */
1490 arg1 = value_coerce_to_target (arg1);
1491
c906108c 1492 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1493 error (_("Attempt to take address of value not located in memory."));
c906108c 1494
581e13c1 1495 /* Get target memory address. */
df407dfe 1496 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1497 (value_address (arg1)
13c3b5f5 1498 + value_embedded_offset (arg1)));
c906108c
SS
1499
1500 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1501 full derived object's type ... */
4dfea560
DE
1502 set_value_enclosing_type (arg2,
1503 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1504 /* ... and also the relative position of the subobject in the full
1505 object. */
b44d461b 1506 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1507 return arg2;
1508}
1509
ac3eeb49
MS
1510/* Return a reference value for the object for which ARG1 is the
1511 contents. */
fb933624
DJ
1512
1513struct value *
1514value_ref (struct value *arg1)
1515{
1516 struct value *arg2;
fb933624 1517 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1518
fb933624
DJ
1519 if (TYPE_CODE (type) == TYPE_CODE_REF)
1520 return arg1;
1521
1522 arg2 = value_addr (arg1);
1523 deprecated_set_value_type (arg2, lookup_reference_type (type));
1524 return arg2;
1525}
1526
ac3eeb49
MS
1527/* Given a value of a pointer type, apply the C unary * operator to
1528 it. */
c906108c 1529
f23631e4
AC
1530struct value *
1531value_ind (struct value *arg1)
c906108c
SS
1532{
1533 struct type *base_type;
f23631e4 1534 struct value *arg2;
c906108c 1535
994b9211 1536 arg1 = coerce_array (arg1);
c906108c 1537
df407dfe 1538 base_type = check_typedef (value_type (arg1));
c906108c 1539
8cf6f0b1
TT
1540 if (VALUE_LVAL (arg1) == lval_computed)
1541 {
c8f2448a 1542 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1543
1544 if (funcs->indirect)
1545 {
1546 struct value *result = funcs->indirect (arg1);
1547
1548 if (result)
1549 return result;
1550 }
1551 }
1552
22fe0fbb 1553 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1554 {
1555 struct type *enc_type;
a109c7c1 1556
ac3eeb49
MS
1557 /* We may be pointing to something embedded in a larger object.
1558 Get the real type of the enclosing object. */
4754a64e 1559 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1560 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1561
1562 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1563 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1564 /* For functions, go through find_function_addr, which knows
1565 how to handle function descriptors. */
ac3eeb49
MS
1566 arg2 = value_at_lazy (enc_type,
1567 find_function_addr (arg1, NULL));
0d5de010 1568 else
581e13c1 1569 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1570 arg2 = value_at_lazy (enc_type,
1571 (value_as_address (arg1)
1572 - value_pointed_to_offset (arg1)));
0d5de010 1573
9f1f738a 1574 enc_type = value_type (arg2);
dfcee124 1575 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1576 }
1577
8a3fe4f8 1578 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1579 return 0; /* For lint -- never reached. */
c906108c
SS
1580}
1581\f
39d37385
PA
1582/* Create a value for an array by allocating space in GDB, copying the
1583 data into that space, and then setting up an array value.
c906108c 1584
ac3eeb49
MS
1585 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1586 is populated from the values passed in ELEMVEC.
c906108c
SS
1587
1588 The element type of the array is inherited from the type of the
1589 first element, and all elements must have the same size (though we
ac3eeb49 1590 don't currently enforce any restriction on their types). */
c906108c 1591
f23631e4
AC
1592struct value *
1593value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1594{
1595 int nelem;
1596 int idx;
1597 unsigned int typelength;
f23631e4 1598 struct value *val;
c906108c 1599 struct type *arraytype;
c906108c 1600
ac3eeb49
MS
1601 /* Validate that the bounds are reasonable and that each of the
1602 elements have the same size. */
c906108c
SS
1603
1604 nelem = highbound - lowbound + 1;
1605 if (nelem <= 0)
1606 {
8a3fe4f8 1607 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1608 }
4754a64e 1609 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1610 for (idx = 1; idx < nelem; idx++)
1611 {
4754a64e 1612 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1613 {
8a3fe4f8 1614 error (_("array elements must all be the same size"));
c906108c
SS
1615 }
1616 }
1617
e3506a9f
UW
1618 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1619 lowbound, highbound);
c906108c
SS
1620
1621 if (!current_language->c_style_arrays)
1622 {
1623 val = allocate_value (arraytype);
1624 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1625 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1626 typelength);
c906108c
SS
1627 return val;
1628 }
1629
63092375
DJ
1630 /* Allocate space to store the array, and then initialize it by
1631 copying in each element. */
c906108c 1632
63092375 1633 val = allocate_value (arraytype);
c906108c 1634 for (idx = 0; idx < nelem; idx++)
39d37385 1635 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1636 return val;
c906108c
SS
1637}
1638
6c7a06a3 1639struct value *
63375b74 1640value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1641{
1642 struct value *val;
1643 int lowbound = current_language->string_lower_bound;
63375b74 1644 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1645 struct type *stringtype
e3506a9f 1646 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1647
1648 val = allocate_value (stringtype);
1649 memcpy (value_contents_raw (val), ptr, len);
1650 return val;
1651}
1652
ac3eeb49
MS
1653/* Create a value for a string constant by allocating space in the
1654 inferior, copying the data into that space, and returning the
1655 address with type TYPE_CODE_STRING. PTR points to the string
1656 constant data; LEN is number of characters.
1657
1658 Note that string types are like array of char types with a lower
1659 bound of zero and an upper bound of LEN - 1. Also note that the
1660 string may contain embedded null bytes. */
c906108c 1661
f23631e4 1662struct value *
63375b74 1663value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1664{
f23631e4 1665 struct value *val;
c906108c 1666 int lowbound = current_language->string_lower_bound;
63375b74 1667 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1668 struct type *stringtype
e3506a9f 1669 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1670
3b7538c0
UW
1671 val = allocate_value (stringtype);
1672 memcpy (value_contents_raw (val), ptr, len);
1673 return val;
c906108c
SS
1674}
1675
c906108c 1676\f
ac3eeb49
MS
1677/* See if we can pass arguments in T2 to a function which takes
1678 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1679 a NULL-terminated vector. If some arguments need coercion of some
1680 sort, then the coerced values are written into T2. Return value is
1681 0 if the arguments could be matched, or the position at which they
1682 differ if not.
c906108c 1683
ac3eeb49
MS
1684 STATICP is nonzero if the T1 argument list came from a static
1685 member function. T2 will still include the ``this'' pointer, but
1686 it will be skipped.
c906108c
SS
1687
1688 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1689 which is the type of the instance variable. This is because we
1690 want to handle calls with objects from derived classes. This is
1691 not entirely correct: we should actually check to make sure that a
c906108c
SS
1692 requested operation is type secure, shouldn't we? FIXME. */
1693
1694static int
ad2f7632
DJ
1695typecmp (int staticp, int varargs, int nargs,
1696 struct field t1[], struct value *t2[])
c906108c
SS
1697{
1698 int i;
1699
1700 if (t2 == 0)
ac3eeb49
MS
1701 internal_error (__FILE__, __LINE__,
1702 _("typecmp: no argument list"));
ad2f7632 1703
ac3eeb49
MS
1704 /* Skip ``this'' argument if applicable. T2 will always include
1705 THIS. */
4a1970e4 1706 if (staticp)
ad2f7632
DJ
1707 t2 ++;
1708
1709 for (i = 0;
1710 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1711 i++)
c906108c 1712 {
c5aa993b 1713 struct type *tt1, *tt2;
ad2f7632 1714
c5aa993b
JM
1715 if (!t2[i])
1716 return i + 1;
ad2f7632
DJ
1717
1718 tt1 = check_typedef (t1[i].type);
df407dfe 1719 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1720
c906108c 1721 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1722 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1723 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1724 == TYPE_CODE (tt2)))
c906108c
SS
1725 {
1726 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1727 t2[i] = value_coerce_array (t2[i]);
1728 else
fb933624 1729 t2[i] = value_ref (t2[i]);
c906108c
SS
1730 continue;
1731 }
1732
802db21b
DB
1733 /* djb - 20000715 - Until the new type structure is in the
1734 place, and we can attempt things like implicit conversions,
1735 we need to do this so you can take something like a map<const
1736 char *>, and properly access map["hello"], because the
1737 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1738 and the argument will be a pointer to a char. */
1739 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1740 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1741 {
1742 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1743 }
ac3eeb49
MS
1744 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1745 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1746 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1747 {
ac3eeb49 1748 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1749 }
c5aa993b
JM
1750 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1751 continue;
ac3eeb49
MS
1752 /* Array to pointer is a `trivial conversion' according to the
1753 ARM. */
c906108c 1754
ac3eeb49
MS
1755 /* We should be doing much hairier argument matching (see
1756 section 13.2 of the ARM), but as a quick kludge, just check
1757 for the same type code. */
df407dfe 1758 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1759 return i + 1;
c906108c 1760 }
ad2f7632 1761 if (varargs || t2[i] == NULL)
c5aa993b 1762 return 0;
ad2f7632 1763 return i + 1;
c906108c
SS
1764}
1765
b1af9e97
TT
1766/* Helper class for do_search_struct_field that updates *RESULT_PTR
1767 and *LAST_BOFFSET, and possibly throws an exception if the field
1768 search has yielded ambiguous results. */
c906108c 1769
b1af9e97
TT
1770static void
1771update_search_result (struct value **result_ptr, struct value *v,
1772 int *last_boffset, int boffset,
1773 const char *name, struct type *type)
1774{
1775 if (v != NULL)
1776 {
1777 if (*result_ptr != NULL
1778 /* The result is not ambiguous if all the classes that are
1779 found occupy the same space. */
1780 && *last_boffset != boffset)
1781 error (_("base class '%s' is ambiguous in type '%s'"),
1782 name, TYPE_SAFE_NAME (type));
1783 *result_ptr = v;
1784 *last_boffset = boffset;
1785 }
1786}
c906108c 1787
b1af9e97
TT
1788/* A helper for search_struct_field. This does all the work; most
1789 arguments are as passed to search_struct_field. The result is
1790 stored in *RESULT_PTR, which must be initialized to NULL.
1791 OUTERMOST_TYPE is the type of the initial type passed to
1792 search_struct_field; this is used for error reporting when the
1793 lookup is ambiguous. */
1794
1795static void
1796do_search_struct_field (const char *name, struct value *arg1, int offset,
1797 struct type *type, int looking_for_baseclass,
1798 struct value **result_ptr,
1799 int *last_boffset,
1800 struct type *outermost_type)
c906108c
SS
1801{
1802 int i;
edf3d5f3 1803 int nbases;
c906108c
SS
1804
1805 CHECK_TYPEDEF (type);
edf3d5f3 1806 nbases = TYPE_N_BASECLASSES (type);
c906108c 1807
c5aa993b 1808 if (!looking_for_baseclass)
c906108c
SS
1809 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1810 {
0d5cff50 1811 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1812
db577aea 1813 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1814 {
f23631e4 1815 struct value *v;
a109c7c1 1816
d6a843b5 1817 if (field_is_static (&TYPE_FIELD (type, i)))
686d4def 1818 v = value_static_field (type, i);
c906108c 1819 else
b1af9e97
TT
1820 v = value_primitive_field (arg1, offset, i, type);
1821 *result_ptr = v;
1822 return;
c906108c
SS
1823 }
1824
1825 if (t_field_name
1826 && (t_field_name[0] == '\0'
1827 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 1828 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
1829 {
1830 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 1831
c906108c
SS
1832 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
1833 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
1834 {
ac3eeb49
MS
1835 /* Look for a match through the fields of an anonymous
1836 union, or anonymous struct. C++ provides anonymous
1837 unions.
c906108c 1838
1b831c93
AC
1839 In the GNU Chill (now deleted from GDB)
1840 implementation of variant record types, each
1841 <alternative field> has an (anonymous) union type,
1842 each member of the union represents a <variant
1843 alternative>. Each <variant alternative> is
1844 represented as a struct, with a member for each
1845 <variant field>. */
c5aa993b 1846
b1af9e97 1847 struct value *v = NULL;
c906108c
SS
1848 int new_offset = offset;
1849
db034ac5
AC
1850 /* This is pretty gross. In G++, the offset in an
1851 anonymous union is relative to the beginning of the
1b831c93
AC
1852 enclosing struct. In the GNU Chill (now deleted
1853 from GDB) implementation of variant records, the
1854 bitpos is zero in an anonymous union field, so we
ac3eeb49 1855 have to add the offset of the union here. */
c906108c
SS
1856 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
1857 || (TYPE_NFIELDS (field_type) > 0
1858 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
1859 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
1860
b1af9e97
TT
1861 do_search_struct_field (name, arg1, new_offset,
1862 field_type,
1863 looking_for_baseclass, &v,
1864 last_boffset,
1865 outermost_type);
c906108c 1866 if (v)
b1af9e97
TT
1867 {
1868 *result_ptr = v;
1869 return;
1870 }
c906108c
SS
1871 }
1872 }
1873 }
1874
c5aa993b 1875 for (i = 0; i < nbases; i++)
c906108c 1876 {
b1af9e97 1877 struct value *v = NULL;
c906108c 1878 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
1879 /* If we are looking for baseclasses, this is what we get when
1880 we hit them. But it could happen that the base part's member
1881 name is not yet filled in. */
c906108c
SS
1882 int found_baseclass = (looking_for_baseclass
1883 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
1884 && (strcmp_iw (name,
1885 TYPE_BASECLASS_NAME (type,
1886 i)) == 0));
b1af9e97 1887 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
1888
1889 if (BASETYPE_VIA_VIRTUAL (type, i))
1890 {
3e3d7139 1891 struct value *v2;
c906108c
SS
1892
1893 boffset = baseclass_offset (type, i,
8af8e3bc
PA
1894 value_contents_for_printing (arg1),
1895 value_embedded_offset (arg1) + offset,
1896 value_address (arg1),
1897 arg1);
c906108c 1898
ac3eeb49 1899 /* The virtual base class pointer might have been clobbered
581e13c1 1900 by the user program. Make sure that it still points to a
ac3eeb49 1901 valid memory location. */
c906108c 1902
1a334831
TT
1903 boffset += value_embedded_offset (arg1) + offset;
1904 if (boffset < 0
1905 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
1906 {
1907 CORE_ADDR base_addr;
c5aa993b 1908
42ae5230 1909 base_addr = value_address (arg1) + boffset;
08039c9e 1910 v2 = value_at_lazy (basetype, base_addr);
ac3eeb49
MS
1911 if (target_read_memory (base_addr,
1912 value_contents_raw (v2),
acc900c2 1913 TYPE_LENGTH (value_type (v2))) != 0)
8a3fe4f8 1914 error (_("virtual baseclass botch"));
c906108c
SS
1915 }
1916 else
1917 {
1a334831
TT
1918 v2 = value_copy (arg1);
1919 deprecated_set_value_type (v2, basetype);
1920 set_value_embedded_offset (v2, boffset);
c906108c
SS
1921 }
1922
1923 if (found_baseclass)
b1af9e97
TT
1924 v = v2;
1925 else
1926 {
1927 do_search_struct_field (name, v2, 0,
1928 TYPE_BASECLASS (type, i),
1929 looking_for_baseclass,
1930 result_ptr, last_boffset,
1931 outermost_type);
1932 }
c906108c
SS
1933 }
1934 else if (found_baseclass)
1935 v = value_primitive_field (arg1, offset, i, type);
1936 else
b1af9e97
TT
1937 {
1938 do_search_struct_field (name, arg1,
1939 offset + TYPE_BASECLASS_BITPOS (type,
1940 i) / 8,
1941 basetype, looking_for_baseclass,
1942 result_ptr, last_boffset,
1943 outermost_type);
1944 }
1945
1946 update_search_result (result_ptr, v, last_boffset,
1947 boffset, name, outermost_type);
c906108c 1948 }
b1af9e97
TT
1949}
1950
1951/* Helper function used by value_struct_elt to recurse through
1952 baseclasses. Look for a field NAME in ARG1. Adjust the address of
1953 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1954 TYPE. If found, return value, else return NULL.
1955
1956 If LOOKING_FOR_BASECLASS, then instead of looking for struct
1957 fields, look for a baseclass named NAME. */
1958
1959static struct value *
1960search_struct_field (const char *name, struct value *arg1, int offset,
1961 struct type *type, int looking_for_baseclass)
1962{
1963 struct value *result = NULL;
1964 int boffset = 0;
1965
1966 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
1967 &result, &boffset, type);
1968 return result;
c906108c
SS
1969}
1970
ac3eeb49 1971/* Helper function used by value_struct_elt to recurse through
581e13c1 1972 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
1973 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
1974 TYPE.
1975
1976 If found, return value, else if name matched and args not return
1977 (value) -1, else return NULL. */
c906108c 1978
f23631e4 1979static struct value *
714f19d5 1980search_struct_method (const char *name, struct value **arg1p,
f23631e4 1981 struct value **args, int offset,
aa1ee363 1982 int *static_memfuncp, struct type *type)
c906108c
SS
1983{
1984 int i;
f23631e4 1985 struct value *v;
c906108c
SS
1986 int name_matched = 0;
1987 char dem_opname[64];
1988
1989 CHECK_TYPEDEF (type);
1990 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
1991 {
0d5cff50 1992 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 1993
581e13c1 1994 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
1995 if (strncmp (t_field_name, "__", 2) == 0 ||
1996 strncmp (t_field_name, "op", 2) == 0 ||
1997 strncmp (t_field_name, "type", 4) == 0)
c906108c 1998 {
c5aa993b
JM
1999 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2000 t_field_name = dem_opname;
2001 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2002 t_field_name = dem_opname;
c906108c 2003 }
db577aea 2004 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2005 {
2006 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2007 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2008
a109c7c1 2009 name_matched = 1;
de17c821 2010 check_stub_method_group (type, i);
c906108c 2011 if (j > 0 && args == 0)
3e43a32a
MS
2012 error (_("cannot resolve overloaded method "
2013 "`%s': no arguments supplied"), name);
acf5ed49 2014 else if (j == 0 && args == 0)
c906108c 2015 {
acf5ed49
DJ
2016 v = value_fn_field (arg1p, f, j, type, offset);
2017 if (v != NULL)
2018 return v;
c906108c 2019 }
acf5ed49
DJ
2020 else
2021 while (j >= 0)
2022 {
acf5ed49 2023 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2024 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2025 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2026 TYPE_FN_FIELD_ARGS (f, j), args))
2027 {
2028 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2029 return value_virtual_fn_field (arg1p, f, j,
2030 type, offset);
2031 if (TYPE_FN_FIELD_STATIC_P (f, j)
2032 && static_memfuncp)
acf5ed49
DJ
2033 *static_memfuncp = 1;
2034 v = value_fn_field (arg1p, f, j, type, offset);
2035 if (v != NULL)
2036 return v;
2037 }
2038 j--;
2039 }
c906108c
SS
2040 }
2041 }
2042
2043 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2044 {
2045 int base_offset;
8af8e3bc 2046 int this_offset;
c906108c
SS
2047
2048 if (BASETYPE_VIA_VIRTUAL (type, i))
2049 {
086280be 2050 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2051 struct value *base_val;
086280be
UW
2052 const gdb_byte *base_valaddr;
2053
2054 /* The virtual base class pointer might have been
581e13c1 2055 clobbered by the user program. Make sure that it
086280be
UW
2056 still points to a valid memory location. */
2057
2058 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2059 {
6c18f3e0
SP
2060 gdb_byte *tmp;
2061 struct cleanup *back_to;
2062 CORE_ADDR address;
2063
2064 tmp = xmalloc (TYPE_LENGTH (baseclass));
2065 back_to = make_cleanup (xfree, tmp);
2066 address = value_address (*arg1p);
a109c7c1 2067
8af8e3bc 2068 if (target_read_memory (address + offset,
086280be
UW
2069 tmp, TYPE_LENGTH (baseclass)) != 0)
2070 error (_("virtual baseclass botch"));
8af8e3bc
PA
2071
2072 base_val = value_from_contents_and_address (baseclass,
2073 tmp,
2074 address + offset);
2075 base_valaddr = value_contents_for_printing (base_val);
2076 this_offset = 0;
6c18f3e0 2077 do_cleanups (back_to);
c5aa993b
JM
2078 }
2079 else
8af8e3bc
PA
2080 {
2081 base_val = *arg1p;
2082 base_valaddr = value_contents_for_printing (*arg1p);
2083 this_offset = offset;
2084 }
c5aa993b 2085
086280be 2086 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2087 this_offset, value_address (base_val),
2088 base_val);
c5aa993b 2089 }
c906108c
SS
2090 else
2091 {
2092 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2093 }
c906108c
SS
2094 v = search_struct_method (name, arg1p, args, base_offset + offset,
2095 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2096 if (v == (struct value *) - 1)
c906108c
SS
2097 {
2098 name_matched = 1;
2099 }
2100 else if (v)
2101 {
ac3eeb49
MS
2102 /* FIXME-bothner: Why is this commented out? Why is it here? */
2103 /* *arg1p = arg1_tmp; */
c906108c 2104 return v;
c5aa993b 2105 }
c906108c 2106 }
c5aa993b 2107 if (name_matched)
f23631e4 2108 return (struct value *) - 1;
c5aa993b
JM
2109 else
2110 return NULL;
c906108c
SS
2111}
2112
2113/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2114 extract the component named NAME from the ultimate target
2115 structure/union and return it as a value with its appropriate type.
c906108c
SS
2116 ERR is used in the error message if *ARGP's type is wrong.
2117
2118 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2119 an appropriate method. Also, handle derived types.
c906108c
SS
2120
2121 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2122 where the truthvalue of whether the function that was resolved was
2123 a static member function or not is stored.
2124
ac3eeb49
MS
2125 ERR is an error message to be printed in case the field is not
2126 found. */
c906108c 2127
f23631e4
AC
2128struct value *
2129value_struct_elt (struct value **argp, struct value **args,
714f19d5 2130 const char *name, int *static_memfuncp, const char *err)
c906108c 2131{
52f0bd74 2132 struct type *t;
f23631e4 2133 struct value *v;
c906108c 2134
994b9211 2135 *argp = coerce_array (*argp);
c906108c 2136
df407dfe 2137 t = check_typedef (value_type (*argp));
c906108c
SS
2138
2139 /* Follow pointers until we get to a non-pointer. */
2140
2141 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2142 {
2143 *argp = value_ind (*argp);
2144 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2145 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2146 *argp = coerce_array (*argp);
df407dfe 2147 t = check_typedef (value_type (*argp));
c906108c
SS
2148 }
2149
c5aa993b 2150 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2151 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2152 error (_("Attempt to extract a component of a value that is not a %s."),
2153 err);
c906108c
SS
2154
2155 /* Assume it's not, unless we see that it is. */
2156 if (static_memfuncp)
c5aa993b 2157 *static_memfuncp = 0;
c906108c
SS
2158
2159 if (!args)
2160 {
2161 /* if there are no arguments ...do this... */
2162
ac3eeb49
MS
2163 /* Try as a field first, because if we succeed, there is less
2164 work to be done. */
c906108c
SS
2165 v = search_struct_field (name, *argp, 0, t, 0);
2166 if (v)
2167 return v;
2168
2169 /* C++: If it was not found as a data field, then try to
7b83ea04 2170 return it as a pointer to a method. */
ac3eeb49
MS
2171 v = search_struct_method (name, argp, args, 0,
2172 static_memfuncp, t);
c906108c 2173
f23631e4 2174 if (v == (struct value *) - 1)
55b39184 2175 error (_("Cannot take address of method %s."), name);
c906108c
SS
2176 else if (v == 0)
2177 {
2178 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2179 error (_("There is no member or method named %s."), name);
c906108c 2180 else
8a3fe4f8 2181 error (_("There is no member named %s."), name);
c906108c
SS
2182 }
2183 return v;
2184 }
2185
ac3eeb49
MS
2186 v = search_struct_method (name, argp, args, 0,
2187 static_memfuncp, t);
7168a814 2188
f23631e4 2189 if (v == (struct value *) - 1)
c906108c 2190 {
3e43a32a
MS
2191 error (_("One of the arguments you tried to pass to %s could not "
2192 "be converted to what the function wants."), name);
c906108c
SS
2193 }
2194 else if (v == 0)
2195 {
ac3eeb49
MS
2196 /* See if user tried to invoke data as function. If so, hand it
2197 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2198 gdb should give an error. */
c906108c 2199 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2200 /* If we found an ordinary field, then it is not a method call.
2201 So, treat it as if it were a static member function. */
2202 if (v && static_memfuncp)
2203 *static_memfuncp = 1;
c906108c
SS
2204 }
2205
2206 if (!v)
79afc5ef
SW
2207 throw_error (NOT_FOUND_ERROR,
2208 _("Structure has no component named %s."), name);
c906108c
SS
2209 return v;
2210}
2211
b5b08fb4
SC
2212/* Given *ARGP, a value of type structure or union, or a pointer/reference
2213 to a structure or union, extract and return its component (field) of
2214 type FTYPE at the specified BITPOS.
2215 Throw an exception on error. */
2216
2217struct value *
2218value_struct_elt_bitpos (struct value **argp, int bitpos, struct type *ftype,
2219 const char *err)
2220{
2221 struct type *t;
2222 struct value *v;
2223 int i;
2224 int nbases;
2225
2226 *argp = coerce_array (*argp);
2227
2228 t = check_typedef (value_type (*argp));
2229
2230 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2231 {
2232 *argp = value_ind (*argp);
2233 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
2234 *argp = coerce_array (*argp);
2235 t = check_typedef (value_type (*argp));
2236 }
2237
2238 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2239 && TYPE_CODE (t) != TYPE_CODE_UNION)
2240 error (_("Attempt to extract a component of a value that is not a %s."),
2241 err);
2242
2243 for (i = TYPE_N_BASECLASSES (t); i < TYPE_NFIELDS (t); i++)
2244 {
2245 if (!field_is_static (&TYPE_FIELD (t, i))
2246 && bitpos == TYPE_FIELD_BITPOS (t, i)
2247 && types_equal (ftype, TYPE_FIELD_TYPE (t, i)))
2248 return value_primitive_field (*argp, 0, i, t);
2249 }
2250
2251 error (_("No field with matching bitpos and type."));
2252
2253 /* Never hit. */
2254 return NULL;
2255}
2256
ac3eeb49 2257/* Search through the methods of an object (and its bases) to find a
cfe9eade 2258 specified method. Return the pointer to the fn_field list of
ac3eeb49
MS
2259 overloaded instances.
2260
2261 Helper function for value_find_oload_list.
2262 ARGP is a pointer to a pointer to a value (the object).
2263 METHOD is a string containing the method name.
2264 OFFSET is the offset within the value.
2265 TYPE is the assumed type of the object.
2266 NUM_FNS is the number of overloaded instances.
2267 BASETYPE is set to the actual type of the subobject where the
2268 method is found.
581e13c1 2269 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2270
7a292a7a 2271static struct fn_field *
714f19d5 2272find_method_list (struct value **argp, const char *method,
ac3eeb49 2273 int offset, struct type *type, int *num_fns,
fba45db2 2274 struct type **basetype, int *boffset)
c906108c
SS
2275{
2276 int i;
c5aa993b 2277 struct fn_field *f;
c906108c
SS
2278 CHECK_TYPEDEF (type);
2279
2280 *num_fns = 0;
2281
ac3eeb49 2282 /* First check in object itself. */
c5aa993b 2283 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c906108c 2284 {
ac3eeb49 2285 /* pai: FIXME What about operators and type conversions? */
0d5cff50 2286 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2287
db577aea 2288 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
c5aa993b 2289 {
4a1970e4
DJ
2290 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2291 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
4a1970e4
DJ
2292
2293 *num_fns = len;
c5aa993b
JM
2294 *basetype = type;
2295 *boffset = offset;
4a1970e4 2296
de17c821
DJ
2297 /* Resolve any stub methods. */
2298 check_stub_method_group (type, i);
4a1970e4
DJ
2299
2300 return f;
c5aa993b
JM
2301 }
2302 }
2303
ac3eeb49 2304 /* Not found in object, check in base subobjects. */
c906108c
SS
2305 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2306 {
2307 int base_offset;
a109c7c1 2308
c906108c
SS
2309 if (BASETYPE_VIA_VIRTUAL (type, i))
2310 {
086280be 2311 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2312 value_contents_for_printing (*argp),
2313 value_offset (*argp) + offset,
2314 value_address (*argp), *argp);
c5aa993b 2315 }
ac3eeb49
MS
2316 else /* Non-virtual base, simply use bit position from debug
2317 info. */
c906108c
SS
2318 {
2319 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2320 }
c906108c 2321 f = find_method_list (argp, method, base_offset + offset,
ac3eeb49
MS
2322 TYPE_BASECLASS (type, i), num_fns,
2323 basetype, boffset);
c906108c 2324 if (f)
c5aa993b 2325 return f;
c906108c 2326 }
c5aa993b 2327 return NULL;
c906108c
SS
2328}
2329
2330/* Return the list of overloaded methods of a specified name.
ac3eeb49
MS
2331
2332 ARGP is a pointer to a pointer to a value (the object).
2333 METHOD is the method name.
2334 OFFSET is the offset within the value contents.
2335 NUM_FNS is the number of overloaded instances.
2336 BASETYPE is set to the type of the base subobject that defines the
2337 method.
581e13c1 2338 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2339
6598ed07 2340static struct fn_field *
714f19d5 2341value_find_oload_method_list (struct value **argp, const char *method,
ac3eeb49
MS
2342 int offset, int *num_fns,
2343 struct type **basetype, int *boffset)
c906108c 2344{
c5aa993b 2345 struct type *t;
c906108c 2346
df407dfe 2347 t = check_typedef (value_type (*argp));
c906108c 2348
ac3eeb49 2349 /* Code snarfed from value_struct_elt. */
c906108c
SS
2350 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2351 {
2352 *argp = value_ind (*argp);
2353 /* Don't coerce fn pointer to fn and then back again! */
b846d303 2354 if (TYPE_CODE (check_typedef (value_type (*argp))) != TYPE_CODE_FUNC)
994b9211 2355 *argp = coerce_array (*argp);
df407dfe 2356 t = check_typedef (value_type (*argp));
c906108c 2357 }
c5aa993b 2358
c5aa993b
JM
2359 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2360 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2361 error (_("Attempt to extract a component of a "
2362 "value that is not a struct or union"));
c5aa993b 2363
ac3eeb49
MS
2364 return find_method_list (argp, method, 0, t, num_fns,
2365 basetype, boffset);
c906108c
SS
2366}
2367
da096638 2368/* Given an array of arguments (ARGS) (which includes an
c906108c 2369 entry for "this" in the case of C++ methods), the number of
28c64fc2
SCR
2370 arguments NARGS, the NAME of a function, and whether it's a method or
2371 not (METHOD), find the best function that matches on the argument types
2372 according to the overload resolution rules.
c906108c 2373
4c3376c8
SW
2374 METHOD can be one of three values:
2375 NON_METHOD for non-member functions.
2376 METHOD: for member functions.
2377 BOTH: used for overload resolution of operators where the
2378 candidates are expected to be either member or non member
581e13c1 2379 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2380 (representing 'this') is expected to be a reference to the
2381 target object, and will be dereferenced when attempting the
2382 non-member search.
2383
c906108c
SS
2384 In the case of class methods, the parameter OBJ is an object value
2385 in which to search for overloaded methods.
2386
2387 In the case of non-method functions, the parameter FSYM is a symbol
2388 corresponding to one of the overloaded functions.
2389
2390 Return value is an integer: 0 -> good match, 10 -> debugger applied
2391 non-standard coercions, 100 -> incompatible.
2392
2393 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2394 If a non-method is being searched for, SYMP will hold the symbol
2395 for it.
c906108c
SS
2396
2397 If a method is being searched for, and it is a static method,
2398 then STATICP will point to a non-zero value.
2399
7322dca9
SW
2400 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2401 ADL overload candidates when performing overload resolution for a fully
2402 qualified name.
2403
c906108c
SS
2404 Note: This function does *not* check the value of
2405 overload_resolution. Caller must check it to see whether overload
581e13c1 2406 resolution is permitted. */
c906108c
SS
2407
2408int
da096638 2409find_overload_match (struct value **args, int nargs,
4c3376c8 2410 const char *name, enum oload_search_type method,
28c64fc2 2411 struct value **objp, struct symbol *fsym,
ac3eeb49 2412 struct value **valp, struct symbol **symp,
7322dca9 2413 int *staticp, const int no_adl)
c906108c 2414{
7f8c9282 2415 struct value *obj = (objp ? *objp : NULL);
da096638 2416 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2417 /* Index of best overloaded function. */
4c3376c8
SW
2418 int func_oload_champ = -1;
2419 int method_oload_champ = -1;
2420
ac3eeb49 2421 /* The measure for the current best match. */
4c3376c8
SW
2422 struct badness_vector *method_badness = NULL;
2423 struct badness_vector *func_badness = NULL;
2424
f23631e4 2425 struct value *temp = obj;
ac3eeb49
MS
2426 /* For methods, the list of overloaded methods. */
2427 struct fn_field *fns_ptr = NULL;
2428 /* For non-methods, the list of overloaded function symbols. */
2429 struct symbol **oload_syms = NULL;
2430 /* Number of overloaded instances being considered. */
2431 int num_fns = 0;
c5aa993b 2432 struct type *basetype = NULL;
c906108c 2433 int boffset;
7322dca9
SW
2434
2435 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2436
8d577d32 2437 const char *obj_type_name = NULL;
7322dca9 2438 const char *func_name = NULL;
8d577d32 2439 enum oload_classification match_quality;
4c3376c8
SW
2440 enum oload_classification method_match_quality = INCOMPATIBLE;
2441 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2442
ac3eeb49 2443 /* Get the list of overloaded methods or functions. */
4c3376c8 2444 if (method == METHOD || method == BOTH)
c906108c 2445 {
a2ca50ae 2446 gdb_assert (obj);
94af9270
KS
2447
2448 /* OBJ may be a pointer value rather than the object itself. */
2449 obj = coerce_ref (obj);
2450 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2451 obj = coerce_ref (value_ind (obj));
df407dfe 2452 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2453
2454 /* First check whether this is a data member, e.g. a pointer to
2455 a function. */
2456 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2457 {
2458 *valp = search_struct_field (name, obj, 0,
2459 check_typedef (value_type (obj)), 0);
2460 if (*valp)
2461 {
2462 *staticp = 1;
f748fb40 2463 do_cleanups (all_cleanups);
94af9270
KS
2464 return 0;
2465 }
2466 }
c906108c 2467
4c3376c8 2468 /* Retrieve the list of methods with the name NAME. */
ac3eeb49
MS
2469 fns_ptr = value_find_oload_method_list (&temp, name,
2470 0, &num_fns,
c5aa993b 2471 &basetype, &boffset);
4c3376c8
SW
2472 /* If this is a method only search, and no methods were found
2473 the search has faild. */
2474 if (method == METHOD && (!fns_ptr || !num_fns))
8a3fe4f8 2475 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2476 obj_type_name,
2477 (obj_type_name && *obj_type_name) ? "::" : "",
2478 name);
4a1970e4 2479 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2480 been resolved by find_method_list via
2481 value_find_oload_method_list above. */
4c3376c8
SW
2482 if (fns_ptr)
2483 {
2484 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
9cf95373 2485 method_oload_champ = find_oload_champ (args, nargs,
4c3376c8 2486 num_fns, fns_ptr,
9cf95373 2487 NULL, &method_badness);
4c3376c8
SW
2488
2489 method_match_quality =
2490 classify_oload_match (method_badness, nargs,
2bca57ba
SC
2491 oload_method_static_p (fns_ptr,
2492 method_oload_champ));
4c3376c8
SW
2493
2494 make_cleanup (xfree, method_badness);
2495 }
2496
c906108c 2497 }
4c3376c8
SW
2498
2499 if (method == NON_METHOD || method == BOTH)
c906108c 2500 {
7322dca9 2501 const char *qualified_name = NULL;
c906108c 2502
b021a221
MS
2503 /* If the overload match is being search for both as a method
2504 and non member function, the first argument must now be
2505 dereferenced. */
4c3376c8 2506 if (method == BOTH)
2b214ea6 2507 args[0] = value_ind (args[0]);
4c3376c8 2508
7322dca9
SW
2509 if (fsym)
2510 {
2511 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2512
2513 /* If we have a function with a C++ name, try to extract just
2514 the function part. Do not try this for non-functions (e.g.
2515 function pointers). */
2516 if (qualified_name
3e43a32a
MS
2517 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2518 == TYPE_CODE_FUNC)
7322dca9
SW
2519 {
2520 char *temp;
2521
2522 temp = cp_func_name (qualified_name);
2523
2524 /* If cp_func_name did not remove anything, the name of the
2525 symbol did not include scope or argument types - it was
2526 probably a C-style function. */
2527 if (temp)
2528 {
2529 make_cleanup (xfree, temp);
2530 if (strcmp (temp, qualified_name) == 0)
2531 func_name = NULL;
2532 else
2533 func_name = temp;
2534 }
2535 }
2536 }
2537 else
94af9270 2538 {
7322dca9
SW
2539 func_name = name;
2540 qualified_name = name;
94af9270 2541 }
d9639e13 2542
94af9270
KS
2543 /* If there was no C++ name, this must be a C-style function or
2544 not a function at all. Just return the same symbol. Do the
2545 same if cp_func_name fails for some reason. */
8d577d32 2546 if (func_name == NULL)
7b83ea04 2547 {
917317f4 2548 *symp = fsym;
5fe41fbf 2549 do_cleanups (all_cleanups);
7b83ea04
AC
2550 return 0;
2551 }
917317f4 2552
da096638 2553 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2554 func_name,
2555 qualified_name,
2556 &oload_syms,
2557 &func_badness,
2558 no_adl);
8d577d32 2559
4c3376c8
SW
2560 if (func_oload_champ >= 0)
2561 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2562
2563 make_cleanup (xfree, oload_syms);
2564 make_cleanup (xfree, func_badness);
8d577d32
DC
2565 }
2566
7322dca9 2567 /* Did we find a match ? */
4c3376c8 2568 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2569 throw_error (NOT_FOUND_ERROR,
2570 _("No symbol \"%s\" in current context."),
2571 name);
8d577d32 2572
4c3376c8
SW
2573 /* If we have found both a method match and a function
2574 match, find out which one is better, and calculate match
2575 quality. */
2576 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2577 {
2578 switch (compare_badness (func_badness, method_badness))
2579 {
2580 case 0: /* Top two contenders are equally good. */
b021a221
MS
2581 /* FIXME: GDB does not support the general ambiguous case.
2582 All candidates should be collected and presented the
2583 user. */
4c3376c8
SW
2584 error (_("Ambiguous overload resolution"));
2585 break;
2586 case 1: /* Incomparable top contenders. */
2587 /* This is an error incompatible candidates
2588 should not have been proposed. */
3e43a32a
MS
2589 error (_("Internal error: incompatible "
2590 "overload candidates proposed"));
4c3376c8
SW
2591 break;
2592 case 2: /* Function champion. */
2593 method_oload_champ = -1;
2594 match_quality = func_match_quality;
2595 break;
2596 case 3: /* Method champion. */
2597 func_oload_champ = -1;
2598 match_quality = method_match_quality;
2599 break;
2600 default:
2601 error (_("Internal error: unexpected overload comparison result"));
2602 break;
2603 }
2604 }
2605 else
2606 {
2607 /* We have either a method match or a function match. */
2608 if (method_oload_champ >= 0)
2609 match_quality = method_match_quality;
2610 else
2611 match_quality = func_match_quality;
2612 }
8d577d32
DC
2613
2614 if (match_quality == INCOMPATIBLE)
2615 {
4c3376c8 2616 if (method == METHOD)
8a3fe4f8 2617 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2618 obj_type_name,
2619 (obj_type_name && *obj_type_name) ? "::" : "",
2620 name);
2621 else
8a3fe4f8 2622 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2623 func_name);
2624 }
2625 else if (match_quality == NON_STANDARD)
2626 {
4c3376c8 2627 if (method == METHOD)
3e43a32a
MS
2628 warning (_("Using non-standard conversion to match "
2629 "method %s%s%s to supplied arguments"),
8d577d32
DC
2630 obj_type_name,
2631 (obj_type_name && *obj_type_name) ? "::" : "",
2632 name);
2633 else
3e43a32a
MS
2634 warning (_("Using non-standard conversion to match "
2635 "function %s to supplied arguments"),
8d577d32
DC
2636 func_name);
2637 }
2638
4c3376c8 2639 if (staticp != NULL)
2bca57ba 2640 *staticp = oload_method_static_p (fns_ptr, method_oload_champ);
4c3376c8
SW
2641
2642 if (method_oload_champ >= 0)
8d577d32 2643 {
4c3376c8
SW
2644 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2645 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2646 basetype, boffset);
8d577d32 2647 else
4c3376c8 2648 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2649 basetype, boffset);
8d577d32
DC
2650 }
2651 else
4c3376c8 2652 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2653
2654 if (objp)
2655 {
a4295225 2656 struct type *temp_type = check_typedef (value_type (temp));
da096638 2657 struct type *objtype = check_typedef (obj_type);
a109c7c1 2658
a4295225 2659 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2660 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2661 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2662 {
2663 temp = value_addr (temp);
2664 }
2665 *objp = temp;
2666 }
7322dca9
SW
2667
2668 do_cleanups (all_cleanups);
8d577d32
DC
2669
2670 switch (match_quality)
2671 {
2672 case INCOMPATIBLE:
2673 return 100;
2674 case NON_STANDARD:
2675 return 10;
2676 default: /* STANDARD */
2677 return 0;
2678 }
2679}
2680
2681/* Find the best overload match, searching for FUNC_NAME in namespaces
2682 contained in QUALIFIED_NAME until it either finds a good match or
2683 runs out of namespaces. It stores the overloaded functions in
2684 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2685 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2686 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2687 performned. */
8d577d32
DC
2688
2689static int
da096638 2690find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2691 const char *func_name,
2692 const char *qualified_name,
2693 struct symbol ***oload_syms,
7322dca9
SW
2694 struct badness_vector **oload_champ_bv,
2695 const int no_adl)
8d577d32
DC
2696{
2697 int oload_champ;
2698
da096638 2699 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2700 func_name,
2701 qualified_name, 0,
2702 oload_syms, oload_champ_bv,
7322dca9
SW
2703 &oload_champ,
2704 no_adl);
8d577d32
DC
2705
2706 return oload_champ;
2707}
2708
2709/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2710 how deep we've looked for namespaces, and the champ is stored in
2711 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2712 if it isn't. Other arguments are the same as in
2713 find_oload_champ_namespace
8d577d32
DC
2714
2715 It is the caller's responsibility to free *OLOAD_SYMS and
2716 *OLOAD_CHAMP_BV. */
2717
2718static int
da096638 2719find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2720 const char *func_name,
2721 const char *qualified_name,
2722 int namespace_len,
2723 struct symbol ***oload_syms,
2724 struct badness_vector **oload_champ_bv,
7322dca9
SW
2725 int *oload_champ,
2726 const int no_adl)
8d577d32
DC
2727{
2728 int next_namespace_len = namespace_len;
2729 int searched_deeper = 0;
2730 int num_fns = 0;
2731 struct cleanup *old_cleanups;
2732 int new_oload_champ;
2733 struct symbol **new_oload_syms;
2734 struct badness_vector *new_oload_champ_bv;
2735 char *new_namespace;
2736
2737 if (next_namespace_len != 0)
2738 {
2739 gdb_assert (qualified_name[next_namespace_len] == ':');
2740 next_namespace_len += 2;
c906108c 2741 }
ac3eeb49
MS
2742 next_namespace_len +=
2743 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2744
2745 /* Initialize these to values that can safely be xfree'd. */
2746 *oload_syms = NULL;
2747 *oload_champ_bv = NULL;
c5aa993b 2748
581e13c1 2749 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2750 If we get a good match there, use it. */
8d577d32
DC
2751
2752 if (qualified_name[next_namespace_len] == ':')
2753 {
2754 searched_deeper = 1;
2755
da096638 2756 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2757 func_name, qualified_name,
2758 next_namespace_len,
2759 oload_syms, oload_champ_bv,
7322dca9 2760 oload_champ, no_adl))
8d577d32
DC
2761 {
2762 return 1;
2763 }
2764 };
2765
2766 /* If we reach here, either we're in the deepest namespace or we
2767 didn't find a good match in a deeper namespace. But, in the
2768 latter case, we still have a bad match in a deeper namespace;
2769 note that we might not find any match at all in the current
2770 namespace. (There's always a match in the deepest namespace,
2771 because this overload mechanism only gets called if there's a
2772 function symbol to start off with.) */
2773
2774 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2775 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2776 new_namespace = alloca (namespace_len + 1);
2777 strncpy (new_namespace, qualified_name, namespace_len);
2778 new_namespace[namespace_len] = '\0';
2779 new_oload_syms = make_symbol_overload_list (func_name,
2780 new_namespace);
7322dca9
SW
2781
2782 /* If we have reached the deepest level perform argument
2783 determined lookup. */
2784 if (!searched_deeper && !no_adl)
da096638
KS
2785 {
2786 int ix;
2787 struct type **arg_types;
2788
2789 /* Prepare list of argument types for overload resolution. */
2790 arg_types = (struct type **)
2791 alloca (nargs * (sizeof (struct type *)));
2792 for (ix = 0; ix < nargs; ix++)
2793 arg_types[ix] = value_type (args[ix]);
2794 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2795 }
7322dca9 2796
8d577d32
DC
2797 while (new_oload_syms[num_fns])
2798 ++num_fns;
2799
9cf95373 2800 new_oload_champ = find_oload_champ (args, nargs, num_fns,
8d577d32
DC
2801 NULL, new_oload_syms,
2802 &new_oload_champ_bv);
2803
2804 /* Case 1: We found a good match. Free earlier matches (if any),
2805 and return it. Case 2: We didn't find a good match, but we're
2806 not the deepest function. Then go with the bad match that the
2807 deeper function found. Case 3: We found a bad match, and we're
2808 the deepest function. Then return what we found, even though
2809 it's a bad match. */
2810
2811 if (new_oload_champ != -1
2812 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2813 {
2814 *oload_syms = new_oload_syms;
2815 *oload_champ = new_oload_champ;
2816 *oload_champ_bv = new_oload_champ_bv;
2817 do_cleanups (old_cleanups);
2818 return 1;
2819 }
2820 else if (searched_deeper)
2821 {
2822 xfree (new_oload_syms);
2823 xfree (new_oload_champ_bv);
2824 discard_cleanups (old_cleanups);
2825 return 0;
2826 }
2827 else
2828 {
8d577d32
DC
2829 *oload_syms = new_oload_syms;
2830 *oload_champ = new_oload_champ;
2831 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2832 do_cleanups (old_cleanups);
8d577d32
DC
2833 return 0;
2834 }
2835}
2836
da096638 2837/* Look for a function to take NARGS args of ARGS. Find
8d577d32 2838 the best match from among the overloaded methods or functions
9cf95373
SC
2839 given by FNS_PTR or OLOAD_SYMS, respectively. One, and only one of
2840 FNS_PTR and OLOAD_SYMS can be non-NULL. The number of
2841 methods/functions in the non-NULL list is given by NUM_FNS.
8d577d32
DC
2842 Return the index of the best match; store an indication of the
2843 quality of the match in OLOAD_CHAMP_BV.
2844
2845 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2846
2847static int
9cf95373 2848find_oload_champ (struct value **args, int nargs,
8d577d32
DC
2849 int num_fns, struct fn_field *fns_ptr,
2850 struct symbol **oload_syms,
2851 struct badness_vector **oload_champ_bv)
2852{
2853 int ix;
ac3eeb49
MS
2854 /* A measure of how good an overloaded instance is. */
2855 struct badness_vector *bv;
2856 /* Index of best overloaded function. */
2857 int oload_champ = -1;
2858 /* Current ambiguity state for overload resolution. */
2859 int oload_ambiguous = 0;
2860 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32 2861
9cf95373
SC
2862 /* A champion can be found among methods alone, or among functions
2863 alone, but not both. */
2864 gdb_assert ((fns_ptr != NULL) + (oload_syms != NULL) == 1);
2865
8d577d32 2866 *oload_champ_bv = NULL;
c906108c 2867
ac3eeb49 2868 /* Consider each candidate in turn. */
c906108c
SS
2869 for (ix = 0; ix < num_fns; ix++)
2870 {
8d577d32 2871 int jj;
9cf95373 2872 int static_offset;
8d577d32
DC
2873 int nparms;
2874 struct type **parm_types;
2875
9cf95373 2876 if (fns_ptr != NULL)
db577aea 2877 {
ad2f7632 2878 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
2bca57ba 2879 static_offset = oload_method_static_p (fns_ptr, ix);
db577aea
AC
2880 }
2881 else
2882 {
ac3eeb49
MS
2883 /* If it's not a method, this is the proper place. */
2884 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
9cf95373 2885 static_offset = 0;
db577aea 2886 }
c906108c 2887
ac3eeb49
MS
2888 /* Prepare array of parameter types. */
2889 parm_types = (struct type **)
2890 xmalloc (nparms * (sizeof (struct type *)));
c906108c 2891 for (jj = 0; jj < nparms; jj++)
9cf95373 2892 parm_types[jj] = (fns_ptr != NULL
ad2f7632 2893 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
ac3eeb49
MS
2894 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
2895 jj));
c906108c 2896
ac3eeb49
MS
2897 /* Compare parameter types to supplied argument types. Skip
2898 THIS for static methods. */
2899 bv = rank_function (parm_types, nparms,
da096638 2900 args + static_offset,
4a1970e4 2901 nargs - static_offset);
c5aa993b 2902
8d577d32 2903 if (!*oload_champ_bv)
c5aa993b 2904 {
8d577d32 2905 *oload_champ_bv = bv;
c5aa993b 2906 oload_champ = 0;
c5aa993b 2907 }
ac3eeb49
MS
2908 else /* See whether current candidate is better or worse than
2909 previous best. */
8d577d32 2910 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 2911 {
ac3eeb49
MS
2912 case 0: /* Top two contenders are equally good. */
2913 oload_ambiguous = 1;
c5aa993b 2914 break;
ac3eeb49
MS
2915 case 1: /* Incomparable top contenders. */
2916 oload_ambiguous = 2;
c5aa993b 2917 break;
ac3eeb49
MS
2918 case 2: /* New champion, record details. */
2919 *oload_champ_bv = bv;
c5aa993b
JM
2920 oload_ambiguous = 0;
2921 oload_champ = ix;
c5aa993b
JM
2922 break;
2923 case 3:
2924 default:
2925 break;
2926 }
b8c9b27d 2927 xfree (parm_types);
6b1ba9a0
ND
2928 if (overload_debug)
2929 {
9cf95373 2930 if (fns_ptr)
ac3eeb49 2931 fprintf_filtered (gdb_stderr,
3e43a32a 2932 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 2933 fns_ptr[ix].physname, nparms);
6b1ba9a0 2934 else
ac3eeb49 2935 fprintf_filtered (gdb_stderr,
3e43a32a
MS
2936 "Overloaded function instance "
2937 "%s # of parms %d\n",
ac3eeb49
MS
2938 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
2939 nparms);
4a1970e4 2940 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
2941 fprintf_filtered (gdb_stderr,
2942 "...Badness @ %d : %d\n",
6403aeea 2943 jj, bv->rank[jj].rank);
3e43a32a
MS
2944 fprintf_filtered (gdb_stderr, "Overload resolution "
2945 "champion is %d, ambiguous? %d\n",
ac3eeb49 2946 oload_champ, oload_ambiguous);
6b1ba9a0 2947 }
c906108c
SS
2948 }
2949
8d577d32
DC
2950 return oload_champ;
2951}
6b1ba9a0 2952
8d577d32
DC
2953/* Return 1 if we're looking at a static method, 0 if we're looking at
2954 a non-static method or a function that isn't a method. */
c906108c 2955
8d577d32 2956static int
2bca57ba 2957oload_method_static_p (struct fn_field *fns_ptr, int index)
8d577d32 2958{
2bca57ba 2959 if (fns_ptr && index >= 0 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 2960 return 1;
c906108c 2961 else
8d577d32
DC
2962 return 0;
2963}
c906108c 2964
8d577d32
DC
2965/* Check how good an overload match OLOAD_CHAMP_BV represents. */
2966
2967static enum oload_classification
2968classify_oload_match (struct badness_vector *oload_champ_bv,
2969 int nargs,
2970 int static_offset)
2971{
2972 int ix;
da096638 2973 enum oload_classification worst = STANDARD;
8d577d32
DC
2974
2975 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 2976 {
6403aeea
SW
2977 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
2978 or worse return INCOMPATIBLE. */
2979 if (compare_ranks (oload_champ_bv->rank[ix],
2980 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 2981 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
2982 /* Otherwise If this conversion is as bad as
2983 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
2984 else if (compare_ranks (oload_champ_bv->rank[ix],
2985 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 2986 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 2987 needed. */
7f8c9282 2988 }
02f0d45d 2989
da096638
KS
2990 /* If no INCOMPATIBLE classification was found, return the worst one
2991 that was found (if any). */
2992 return worst;
c906108c
SS
2993}
2994
ac3eeb49
MS
2995/* C++: return 1 is NAME is a legitimate name for the destructor of
2996 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
2997 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
2998 have CHECK_TYPEDEF applied, this function will apply it itself. */
2999
c906108c 3000int
d8228535 3001destructor_name_p (const char *name, struct type *type)
c906108c 3002{
c906108c
SS
3003 if (name[0] == '~')
3004 {
d8228535
JK
3005 const char *dname = type_name_no_tag_or_error (type);
3006 const char *cp = strchr (dname, '<');
c906108c
SS
3007 unsigned int len;
3008
3009 /* Do not compare the template part for template classes. */
3010 if (cp == NULL)
3011 len = strlen (dname);
3012 else
3013 len = cp - dname;
bf896cb0 3014 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3015 error (_("name of destructor must equal name of class"));
c906108c
SS
3016 else
3017 return 1;
3018 }
3019 return 0;
3020}
3021
3d567982
TT
3022/* Find an enum constant named NAME in TYPE. TYPE must be an "enum
3023 class". If the name is found, return a value representing it;
3024 otherwise throw an exception. */
3025
3026static struct value *
3027enum_constant_from_type (struct type *type, const char *name)
3028{
3029 int i;
3030 int name_len = strlen (name);
3031
3032 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ENUM
3033 && TYPE_DECLARED_CLASS (type));
3034
3035 for (i = TYPE_N_BASECLASSES (type); i < TYPE_NFIELDS (type); ++i)
3036 {
3037 const char *fname = TYPE_FIELD_NAME (type, i);
3038 int len;
3039
3040 if (TYPE_FIELD_LOC_KIND (type, i) != FIELD_LOC_KIND_ENUMVAL
3041 || fname == NULL)
3042 continue;
3043
3044 /* Look for the trailing "::NAME", since enum class constant
3045 names are qualified here. */
3046 len = strlen (fname);
3047 if (len + 2 >= name_len
3048 && fname[len - name_len - 2] == ':'
3049 && fname[len - name_len - 1] == ':'
3050 && strcmp (&fname[len - name_len], name) == 0)
3051 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, i));
3052 }
3053
3054 error (_("no constant named \"%s\" in enum \"%s\""),
3055 name, TYPE_TAG_NAME (type));
3056}
3057
79c2c32d 3058/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3059 return the appropriate member (or the address of the member, if
3060 WANT_ADDRESS). This function is used to resolve user expressions
3061 of the form "DOMAIN::NAME". For more details on what happens, see
3062 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3063
3064struct value *
c848d642 3065value_aggregate_elt (struct type *curtype, const char *name,
072bba3b 3066 struct type *expect_type, int want_address,
79c2c32d
DC
3067 enum noside noside)
3068{
3069 switch (TYPE_CODE (curtype))
3070 {
3071 case TYPE_CODE_STRUCT:
3072 case TYPE_CODE_UNION:
ac3eeb49 3073 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3074 name, expect_type,
0d5de010 3075 want_address, noside);
79c2c32d 3076 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3077 return value_namespace_elt (curtype, name,
3078 want_address, noside);
3d567982
TT
3079
3080 case TYPE_CODE_ENUM:
3081 return enum_constant_from_type (curtype, name);
3082
79c2c32d
DC
3083 default:
3084 internal_error (__FILE__, __LINE__,
e2e0b3e5 3085 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3086 }
3087}
3088
072bba3b 3089/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3090 with respect to the methods' parameters. If the types of the
072bba3b
KS
3091 two parameter lists are the same, returns 1; 0 otherwise. This
3092 comparison may ignore any artificial parameters in T1 if
3093 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3094 the first artificial parameter in T1, assumed to be a 'this' pointer.
3095
3096 The type T2 is expected to have come from make_params (in eval.c). */
3097
3098static int
3099compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3100{
3101 int start = 0;
3102
80b23b6a 3103 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3104 ++start;
3105
3106 /* If skipping artificial fields, find the first real field
581e13c1 3107 in T1. */
072bba3b
KS
3108 if (skip_artificial)
3109 {
3110 while (start < TYPE_NFIELDS (t1)
3111 && TYPE_FIELD_ARTIFICIAL (t1, start))
3112 ++start;
3113 }
3114
581e13c1 3115 /* Now compare parameters. */
072bba3b
KS
3116
3117 /* Special case: a method taking void. T1 will contain no
3118 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3119 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3120 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3121 return 1;
3122
3123 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3124 {
3125 int i;
a109c7c1 3126
072bba3b
KS
3127 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3128 {
6403aeea 3129 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3130 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3131 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3132 return 0;
3133 }
3134
3135 return 1;
3136 }
3137
3138 return 0;
3139}
3140
c906108c 3141/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3142 return the address of this member as a "pointer to member" type.
3143 If INTYPE is non-null, then it will be the type of the member we
3144 are looking for. This will help us resolve "pointers to member
3145 functions". This function is used to resolve user expressions of
3146 the form "DOMAIN::NAME". */
c906108c 3147
63d06c5c 3148static struct value *
fba45db2 3149value_struct_elt_for_reference (struct type *domain, int offset,
c848d642 3150 struct type *curtype, const char *name,
ac3eeb49
MS
3151 struct type *intype,
3152 int want_address,
63d06c5c 3153 enum noside noside)
c906108c 3154{
52f0bd74
AC
3155 struct type *t = curtype;
3156 int i;
0d5de010 3157 struct value *v, *result;
c906108c 3158
c5aa993b 3159 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3160 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3161 error (_("Internal error: non-aggregate type "
3162 "to value_struct_elt_for_reference"));
c906108c
SS
3163
3164 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3165 {
0d5cff50 3166 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3167
6314a349 3168 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3169 {
d6a843b5 3170 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3171 {
3172 v = value_static_field (t, i);
0d5de010
DJ
3173 if (want_address)
3174 v = value_addr (v);
c906108c
SS
3175 return v;
3176 }
3177 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3178 error (_("pointers to bitfield members not allowed"));
c5aa993b 3179
0d5de010
DJ
3180 if (want_address)
3181 return value_from_longest
3182 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3183 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
f7e3ecae 3184 else if (noside != EVAL_NORMAL)
0d5de010
DJ
3185 return allocate_value (TYPE_FIELD_TYPE (t, i));
3186 else
f7e3ecae
KS
3187 {
3188 /* Try to evaluate NAME as a qualified name with implicit
3189 this pointer. In this case, attempt to return the
3190 equivalent to `this->*(&TYPE::NAME)'. */
3191 v = value_of_this_silent (current_language);
3192 if (v != NULL)
3193 {
3194 struct value *ptr;
3195 long mem_offset;
3196 struct type *type, *tmp;
3197
3198 ptr = value_aggregate_elt (domain, name, NULL, 1, noside);
3199 type = check_typedef (value_type (ptr));
3200 gdb_assert (type != NULL
3201 && TYPE_CODE (type) == TYPE_CODE_MEMBERPTR);
3202 tmp = lookup_pointer_type (TYPE_DOMAIN_TYPE (type));
3203 v = value_cast_pointers (tmp, v, 1);
3204 mem_offset = value_as_long (ptr);
3205 tmp = lookup_pointer_type (TYPE_TARGET_TYPE (type));
3206 result = value_from_pointer (tmp,
3207 value_as_long (v) + mem_offset);
3208 return value_ind (result);
3209 }
3210
3211 error (_("Cannot reference non-static field \"%s\""), name);
3212 }
c906108c
SS
3213 }
3214 }
3215
ac3eeb49
MS
3216 /* C++: If it was not found as a data field, then try to return it
3217 as a pointer to a method. */
c906108c 3218
c906108c
SS
3219 /* Perform all necessary dereferencing. */
3220 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3221 intype = TYPE_TARGET_TYPE (intype);
3222
3223 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3224 {
0d5cff50 3225 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3226 char dem_opname[64];
3227
ac3eeb49
MS
3228 if (strncmp (t_field_name, "__", 2) == 0
3229 || strncmp (t_field_name, "op", 2) == 0
3230 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3231 {
ac3eeb49
MS
3232 if (cplus_demangle_opname (t_field_name,
3233 dem_opname, DMGL_ANSI))
c5aa993b 3234 t_field_name = dem_opname;
ac3eeb49
MS
3235 else if (cplus_demangle_opname (t_field_name,
3236 dem_opname, 0))
c906108c 3237 t_field_name = dem_opname;
c906108c 3238 }
6314a349 3239 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3240 {
072bba3b
KS
3241 int j;
3242 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3243 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3244
de17c821
DJ
3245 check_stub_method_group (t, i);
3246
c906108c
SS
3247 if (intype)
3248 {
072bba3b
KS
3249 for (j = 0; j < len; ++j)
3250 {
3251 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3252 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3253 intype, 1))
072bba3b
KS
3254 break;
3255 }
3256
3257 if (j == len)
3e43a32a
MS
3258 error (_("no member function matches "
3259 "that type instantiation"));
7f79b1c5 3260 }
c906108c 3261 else
072bba3b
KS
3262 {
3263 int ii;
7f79b1c5
DJ
3264
3265 j = -1;
53832f31 3266 for (ii = 0; ii < len; ++ii)
072bba3b 3267 {
7f79b1c5
DJ
3268 /* Skip artificial methods. This is necessary if,
3269 for example, the user wants to "print
3270 subclass::subclass" with only one user-defined
53832f31
TT
3271 constructor. There is no ambiguity in this case.
3272 We are careful here to allow artificial methods
3273 if they are the unique result. */
072bba3b 3274 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3275 {
3276 if (j == -1)
3277 j = ii;
3278 continue;
3279 }
072bba3b 3280
7f79b1c5
DJ
3281 /* Desired method is ambiguous if more than one
3282 method is defined. */
53832f31 3283 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3284 error (_("non-unique member `%s' requires "
3285 "type instantiation"), name);
072bba3b 3286
7f79b1c5
DJ
3287 j = ii;
3288 }
53832f31
TT
3289
3290 if (j == -1)
3291 error (_("no matching member function"));
072bba3b 3292 }
c5aa993b 3293
0d5de010
DJ
3294 if (TYPE_FN_FIELD_STATIC_P (f, j))
3295 {
ac3eeb49
MS
3296 struct symbol *s =
3297 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3298 0, VAR_DOMAIN, 0);
a109c7c1 3299
0d5de010
DJ
3300 if (s == NULL)
3301 return NULL;
3302
3303 if (want_address)
3304 return value_addr (read_var_value (s, 0));
3305 else
3306 return read_var_value (s, 0);
3307 }
3308
c906108c
SS
3309 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3310 {
0d5de010
DJ
3311 if (want_address)
3312 {
3313 result = allocate_value
3314 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3315 cplus_make_method_ptr (value_type (result),
3316 value_contents_writeable (result),
0d5de010
DJ
3317 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3318 }
3319 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3320 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3321 else
3322 error (_("Cannot reference virtual member function \"%s\""),
3323 name);
c906108c
SS
3324 }
3325 else
3326 {
ac3eeb49
MS
3327 struct symbol *s =
3328 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3329 0, VAR_DOMAIN, 0);
a109c7c1 3330
c906108c 3331 if (s == NULL)
0d5de010
DJ
3332 return NULL;
3333
3334 v = read_var_value (s, 0);
3335 if (!want_address)
3336 result = v;
c906108c
SS
3337 else
3338 {
0d5de010 3339 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3340 cplus_make_method_ptr (value_type (result),
3341 value_contents_writeable (result),
42ae5230 3342 value_address (v), 0);
c906108c 3343 }
c906108c 3344 }
0d5de010 3345 return result;
c906108c
SS
3346 }
3347 }
3348 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3349 {
f23631e4 3350 struct value *v;
c906108c
SS
3351 int base_offset;
3352
3353 if (BASETYPE_VIA_VIRTUAL (t, i))
3354 base_offset = 0;
3355 else
3356 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3357 v = value_struct_elt_for_reference (domain,
3358 offset + base_offset,
3359 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3360 name, intype,
3361 want_address, noside);
c906108c
SS
3362 if (v)
3363 return v;
3364 }
63d06c5c
DC
3365
3366 /* As a last chance, pretend that CURTYPE is a namespace, and look
3367 it up that way; this (frequently) works for types nested inside
3368 classes. */
3369
ac3eeb49
MS
3370 return value_maybe_namespace_elt (curtype, name,
3371 want_address, noside);
c906108c
SS
3372}
3373
79c2c32d
DC
3374/* C++: Return the member NAME of the namespace given by the type
3375 CURTYPE. */
3376
3377static struct value *
3378value_namespace_elt (const struct type *curtype,
c848d642 3379 const char *name, int want_address,
79c2c32d 3380 enum noside noside)
63d06c5c
DC
3381{
3382 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3383 want_address,
3384 noside);
63d06c5c
DC
3385
3386 if (retval == NULL)
ac3eeb49
MS
3387 error (_("No symbol \"%s\" in namespace \"%s\"."),
3388 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3389
3390 return retval;
3391}
3392
3393/* A helper function used by value_namespace_elt and
3394 value_struct_elt_for_reference. It looks up NAME inside the
3395 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3396 is a class and NAME refers to a type in CURTYPE itself (as opposed
3397 to, say, some base class of CURTYPE). */
3398
3399static struct value *
3400value_maybe_namespace_elt (const struct type *curtype,
c848d642 3401 const char *name, int want_address,
63d06c5c 3402 enum noside noside)
79c2c32d
DC
3403{
3404 const char *namespace_name = TYPE_TAG_NAME (curtype);
3405 struct symbol *sym;
0d5de010 3406 struct value *result;
79c2c32d 3407
13387711 3408 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3409 get_selected_block (0), VAR_DOMAIN);
3410
3411 if (sym == NULL)
3412 {
3413 char *concatenated_name = alloca (strlen (namespace_name) + 2
3414 + strlen (name) + 1);
3415
3416 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3417 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3418 }
79c2c32d
DC
3419
3420 if (sym == NULL)
63d06c5c 3421 return NULL;
79c2c32d
DC
3422 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3423 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3424 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3425 else
0d5de010
DJ
3426 result = value_of_variable (sym, get_selected_block (0));
3427
3428 if (result && want_address)
3429 result = value_addr (result);
3430
3431 return result;
79c2c32d
DC
3432}
3433
dfcee124 3434/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3435
c906108c 3436 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3437 and refer to the values computed for the object pointed to. */
c906108c
SS
3438
3439struct type *
dfcee124
AG
3440value_rtti_indirect_type (struct value *v, int *full,
3441 int *top, int *using_enc)
c906108c 3442{
f23631e4 3443 struct value *target;
dfcee124
AG
3444 struct type *type, *real_type, *target_type;
3445
3446 type = value_type (v);
3447 type = check_typedef (type);
3448 if (TYPE_CODE (type) == TYPE_CODE_REF)
3449 target = coerce_ref (v);
3450 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3451 target = value_ind (v);
3452 else
3453 return NULL;
c906108c 3454
dfcee124
AG
3455 real_type = value_rtti_type (target, full, top, using_enc);
3456
3457 if (real_type)
3458 {
3459 /* Copy qualifiers to the referenced object. */
3460 target_type = value_type (target);
3461 real_type = make_cv_type (TYPE_CONST (target_type),
3462 TYPE_VOLATILE (target_type), real_type, NULL);
3463 if (TYPE_CODE (type) == TYPE_CODE_REF)
3464 real_type = lookup_reference_type (real_type);
3465 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3466 real_type = lookup_pointer_type (real_type);
3467 else
3468 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3469
3470 /* Copy qualifiers to the pointer/reference. */
3471 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3472 real_type, NULL);
3473 }
c906108c 3474
dfcee124 3475 return real_type;
c906108c
SS
3476}
3477
3478/* Given a value pointed to by ARGP, check its real run-time type, and
3479 if that is different from the enclosing type, create a new value
3480 using the real run-time type as the enclosing type (and of the same
3481 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3482 be the correct offset to the enclosed object. RTYPE is the type,
3483 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3484 by value_rtti_type(). If these are available, they can be supplied
3485 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3486 NULL if they're not available. */
c906108c 3487
f23631e4 3488struct value *
ac3eeb49
MS
3489value_full_object (struct value *argp,
3490 struct type *rtype,
3491 int xfull, int xtop,
fba45db2 3492 int xusing_enc)
c906108c 3493{
c5aa993b 3494 struct type *real_type;
c906108c
SS
3495 int full = 0;
3496 int top = -1;
3497 int using_enc = 0;
f23631e4 3498 struct value *new_val;
c906108c
SS
3499
3500 if (rtype)
3501 {
3502 real_type = rtype;
3503 full = xfull;
3504 top = xtop;
3505 using_enc = xusing_enc;
3506 }
3507 else
3508 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3509
ac3eeb49 3510 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3511 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3512 return argp;
3513
a7860e76
TT
3514 /* In a destructor we might see a real type that is a superclass of
3515 the object's type. In this case it is better to leave the object
3516 as-is. */
3517 if (full
3518 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3519 return argp;
3520
c906108c 3521 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3522 type is wrong, set it. */
3523 /* pai: FIXME -- sounds iffy */
c906108c
SS
3524 if (full)
3525 {
4dfea560
DE
3526 argp = value_copy (argp);
3527 set_value_enclosing_type (argp, real_type);
c906108c
SS
3528 return argp;
3529 }
3530
581e13c1 3531 /* Check if object is in memory. */
c906108c
SS
3532 if (VALUE_LVAL (argp) != lval_memory)
3533 {
3e43a32a
MS
3534 warning (_("Couldn't retrieve complete object of RTTI "
3535 "type %s; object may be in register(s)."),
ac3eeb49 3536 TYPE_NAME (real_type));
c5aa993b 3537
c906108c
SS
3538 return argp;
3539 }
c5aa993b 3540
ac3eeb49
MS
3541 /* All other cases -- retrieve the complete object. */
3542 /* Go back by the computed top_offset from the beginning of the
3543 object, adjusting for the embedded offset of argp if that's what
3544 value_rtti_type used for its computation. */
42ae5230 3545 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3546 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3547 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3548 set_value_embedded_offset (new_val, (using_enc
3549 ? top + value_embedded_offset (argp)
3550 : top));
c906108c
SS
3551 return new_val;
3552}
3553
389e51db 3554
85bc8cb7
JK
3555/* Return the value of the local variable, if one exists. Throw error
3556 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3557
f23631e4 3558struct value *
85bc8cb7 3559value_of_this (const struct language_defn *lang)
c906108c 3560{
66a17cb6 3561 struct symbol *sym;
c906108c 3562 struct block *b;
206415a3 3563 struct frame_info *frame;
c906108c 3564
66a17cb6 3565 if (!lang->la_name_of_this)
85bc8cb7 3566 error (_("no `this' in current language"));
aee28ec6 3567
85bc8cb7 3568 frame = get_selected_frame (_("no frame selected"));
c906108c 3569
66a17cb6 3570 b = get_frame_block (frame, NULL);
c906108c 3571
66a17cb6 3572 sym = lookup_language_this (lang, b);
c906108c 3573 if (sym == NULL)
85bc8cb7
JK
3574 error (_("current stack frame does not contain a variable named `%s'"),
3575 lang->la_name_of_this);
3576
3577 return read_var_value (sym, frame);
3578}
3579
3580/* Return the value of the local variable, if one exists. Return NULL
3581 otherwise. Never throw error. */
3582
3583struct value *
3584value_of_this_silent (const struct language_defn *lang)
3585{
3586 struct value *ret = NULL;
3587 volatile struct gdb_exception except;
3588
3589 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3590 {
85bc8cb7 3591 ret = value_of_this (lang);
c906108c
SS
3592 }
3593
d069f99d
AF
3594 return ret;
3595}
3596
ac3eeb49
MS
3597/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3598 elements long, starting at LOWBOUND. The result has the same lower
3599 bound as the original ARRAY. */
c906108c 3600
f23631e4
AC
3601struct value *
3602value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3603{
3604 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3605 LONGEST lowerbound, upperbound;
f23631e4 3606 struct value *slice;
c906108c 3607 struct type *array_type;
ac3eeb49 3608
df407dfe 3609 array_type = check_typedef (value_type (array));
c906108c 3610 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3611 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3612 error (_("cannot take slice of non-array"));
ac3eeb49 3613
c906108c
SS
3614 range_type = TYPE_INDEX_TYPE (array_type);
3615 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3616 error (_("slice from bad array or bitstring"));
ac3eeb49 3617
c906108c 3618 if (lowbound < lowerbound || length < 0
db034ac5 3619 || lowbound + length - 1 > upperbound)
8a3fe4f8 3620 error (_("slice out of range"));
ac3eeb49 3621
c906108c
SS
3622 /* FIXME-type-allocation: need a way to free this type when we are
3623 done with it. */
0c9c3474
SA
3624 slice_range_type = create_static_range_type ((struct type *) NULL,
3625 TYPE_TARGET_TYPE (range_type),
3626 lowbound,
3627 lowbound + length - 1);
ac3eeb49 3628
a7c88acd
JB
3629 {
3630 struct type *element_type = TYPE_TARGET_TYPE (array_type);
3631 LONGEST offset
3632 = (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
ac3eeb49 3633
a7c88acd
JB
3634 slice_type = create_array_type ((struct type *) NULL,
3635 element_type,
3636 slice_range_type);
3637 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3638
a7c88acd
JB
3639 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3640 slice = allocate_value_lazy (slice_type);
3641 else
3642 {
3643 slice = allocate_value (slice_type);
3644 value_contents_copy (slice, 0, array, offset,
3645 TYPE_LENGTH (slice_type));
3646 }
3647
3648 set_value_component_location (slice, array);
3649 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
3650 set_value_offset (slice, value_offset (array) + offset);
3651 }
ac3eeb49 3652
c906108c
SS
3653 return slice;
3654}
3655
ac3eeb49
MS
3656/* Create a value for a FORTRAN complex number. Currently most of the
3657 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3658 composed of 2 doubles. This really should be a smarter routine
3659 that figures out precision inteligently as opposed to assuming
ac3eeb49 3660 doubles. FIXME: fmb */
c906108c 3661
f23631e4 3662struct value *
ac3eeb49
MS
3663value_literal_complex (struct value *arg1,
3664 struct value *arg2,
3665 struct type *type)
c906108c 3666{
f23631e4 3667 struct value *val;
c906108c
SS
3668 struct type *real_type = TYPE_TARGET_TYPE (type);
3669
3670 val = allocate_value (type);
3671 arg1 = value_cast (real_type, arg1);
3672 arg2 = value_cast (real_type, arg2);
3673
990a07ab 3674 memcpy (value_contents_raw (val),
0fd88904 3675 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3676 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3677 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3678 return val;
3679}
3680
ac3eeb49 3681/* Cast a value into the appropriate complex data type. */
c906108c 3682
f23631e4
AC
3683static struct value *
3684cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3685{
3686 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3687
df407dfe 3688 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3689 {
df407dfe 3690 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3691 struct value *re_val = allocate_value (val_real_type);
3692 struct value *im_val = allocate_value (val_real_type);
c906108c 3693
990a07ab 3694 memcpy (value_contents_raw (re_val),
0fd88904 3695 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3696 memcpy (value_contents_raw (im_val),
0fd88904 3697 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3698 TYPE_LENGTH (val_real_type));
c906108c
SS
3699
3700 return value_literal_complex (re_val, im_val, type);
3701 }
df407dfe
AC
3702 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3703 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3704 return value_literal_complex (val,
3705 value_zero (real_type, not_lval),
3706 type);
c906108c 3707 else
8a3fe4f8 3708 error (_("cannot cast non-number to complex"));
c906108c
SS
3709}
3710
3711void
fba45db2 3712_initialize_valops (void)
c906108c 3713{
5bf193a2
AC
3714 add_setshow_boolean_cmd ("overload-resolution", class_support,
3715 &overload_resolution, _("\
3716Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3717Show overload resolution in evaluating C++ functions."),
3718 NULL, NULL,
920d2a44 3719 show_overload_resolution,
5bf193a2 3720 &setlist, &showlist);
c906108c 3721 overload_resolution = 1;
c906108c 3722}