]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/valops.c
binutils/
[thirdparty/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
8acc9f48 3 Copyright (C) 1986-2013 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
029a67e4 38#include "user-regs.h"
e6ca34fc 39#include "tracepoint.h"
c906108c
SS
40#include <errno.h>
41#include "gdb_string.h"
4a1970e4 42#include "gdb_assert.h"
79c2c32d 43#include "cp-support.h"
f4c5303c 44#include "observer.h"
3e3b026f
UW
45#include "objfiles.h"
46#include "symtab.h"
79afc5ef 47#include "exceptions.h"
c906108c 48
ccce17b0 49extern unsigned int overload_debug;
c906108c
SS
50/* Local functions. */
51
ad2f7632
DJ
52static int typecmp (int staticp, int varargs, int nargs,
53 struct field t1[], struct value *t2[]);
c906108c 54
714f19d5 55static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 56 int, struct type *, int);
c906108c 57
714f19d5
TT
58static struct value *search_struct_method (const char *, struct value **,
59 struct value **,
60 int, int *, struct type *);
c906108c 61
da096638 62static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
63 const char *, const char *,
64 struct symbol ***,
7322dca9
SW
65 struct badness_vector **,
66 const int no_adl);
8d577d32
DC
67
68static
da096638 69int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
70 const char *, const char *,
71 int, struct symbol ***,
7322dca9
SW
72 struct badness_vector **, int *,
73 const int no_adl);
ac3eeb49 74
da096638 75static int find_oload_champ (struct value **, int, int, int,
ac3eeb49
MS
76 struct fn_field *, struct symbol **,
77 struct badness_vector **);
78
79static int oload_method_static (int, struct fn_field *, int);
8d577d32
DC
80
81enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
82
83static enum
ac3eeb49
MS
84oload_classification classify_oload_match (struct badness_vector *,
85 int, int);
8d577d32 86
ac3eeb49
MS
87static struct value *value_struct_elt_for_reference (struct type *,
88 int, struct type *,
89 char *,
90 struct type *,
91 int, enum noside);
79c2c32d 92
ac3eeb49
MS
93static struct value *value_namespace_elt (const struct type *,
94 char *, int , enum noside);
79c2c32d 95
ac3eeb49
MS
96static struct value *value_maybe_namespace_elt (const struct type *,
97 char *, int,
98 enum noside);
63d06c5c 99
a14ed312 100static CORE_ADDR allocate_space_in_inferior (int);
c906108c 101
f23631e4 102static struct value *cast_into_complex (struct type *, struct value *);
c906108c 103
714f19d5 104static struct fn_field *find_method_list (struct value **, const char *,
ac3eeb49
MS
105 int, struct type *, int *,
106 struct type **, int *);
7a292a7a 107
a14ed312 108void _initialize_valops (void);
c906108c 109
c906108c 110#if 0
ac3eeb49
MS
111/* Flag for whether we want to abandon failed expression evals by
112 default. */
113
c906108c
SS
114static int auto_abandon = 0;
115#endif
116
117int overload_resolution = 0;
920d2a44
AC
118static void
119show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
120 struct cmd_list_element *c,
121 const char *value)
920d2a44 122{
3e43a32a
MS
123 fprintf_filtered (file, _("Overload resolution in evaluating "
124 "C++ functions is %s.\n"),
920d2a44
AC
125 value);
126}
242bfc55 127
3e3b026f
UW
128/* Find the address of function name NAME in the inferior. If OBJF_P
129 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
130 is defined. */
c906108c 131
f23631e4 132struct value *
3e3b026f 133find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 134{
52f0bd74 135 struct symbol *sym;
a109c7c1 136
2570f2b7 137 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
138 if (sym != NULL)
139 {
140 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
141 {
8a3fe4f8 142 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
143 name);
144 }
3e3b026f
UW
145
146 if (objf_p)
147 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
148
c906108c
SS
149 return value_of_variable (sym, NULL);
150 }
151 else
152 {
ac3eeb49
MS
153 struct minimal_symbol *msymbol =
154 lookup_minimal_symbol (name, NULL, NULL);
a109c7c1 155
c906108c
SS
156 if (msymbol != NULL)
157 {
3e3b026f
UW
158 struct objfile *objfile = msymbol_objfile (msymbol);
159 struct gdbarch *gdbarch = get_objfile_arch (objfile);
160
c906108c 161 struct type *type;
4478b372 162 CORE_ADDR maddr;
3e3b026f 163 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
164 type = lookup_function_type (type);
165 type = lookup_pointer_type (type);
4478b372 166 maddr = SYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
167
168 if (objf_p)
169 *objf_p = objfile;
170
4478b372 171 return value_from_pointer (type, maddr);
c906108c
SS
172 }
173 else
174 {
c5aa993b 175 if (!target_has_execution)
3e43a32a
MS
176 error (_("evaluation of this expression "
177 "requires the target program to be active"));
c5aa993b 178 else
3e43a32a
MS
179 error (_("evaluation of this expression requires the "
180 "program to have a function \"%s\"."),
181 name);
c906108c
SS
182 }
183 }
184}
185
ac3eeb49
MS
186/* Allocate NBYTES of space in the inferior using the inferior's
187 malloc and return a value that is a pointer to the allocated
188 space. */
c906108c 189
f23631e4 190struct value *
fba45db2 191value_allocate_space_in_inferior (int len)
c906108c 192{
3e3b026f
UW
193 struct objfile *objf;
194 struct value *val = find_function_in_inferior ("malloc", &objf);
195 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 196 struct value *blocklen;
c906108c 197
3e3b026f 198 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
199 val = call_function_by_hand (val, 1, &blocklen);
200 if (value_logical_not (val))
201 {
202 if (!target_has_execution)
3e43a32a
MS
203 error (_("No memory available to program now: "
204 "you need to start the target first"));
c5aa993b 205 else
8a3fe4f8 206 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
207 }
208 return val;
209}
210
211static CORE_ADDR
fba45db2 212allocate_space_in_inferior (int len)
c906108c
SS
213{
214 return value_as_long (value_allocate_space_in_inferior (len));
215}
216
6af87b03
AR
217/* Cast struct value VAL to type TYPE and return as a value.
218 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
219 for this to work. Typedef to one of the codes is permitted.
220 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
221
222static struct value *
223value_cast_structs (struct type *type, struct value *v2)
224{
225 struct type *t1;
226 struct type *t2;
227 struct value *v;
228
229 gdb_assert (type != NULL && v2 != NULL);
230
231 t1 = check_typedef (type);
232 t2 = check_typedef (value_type (v2));
233
234 /* Check preconditions. */
235 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
236 || TYPE_CODE (t1) == TYPE_CODE_UNION)
237 && !!"Precondition is that type is of STRUCT or UNION kind.");
238 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
239 || TYPE_CODE (t2) == TYPE_CODE_UNION)
240 && !!"Precondition is that value is of STRUCT or UNION kind");
241
191ca0a1
CM
242 if (TYPE_NAME (t1) != NULL
243 && TYPE_NAME (t2) != NULL
244 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
245 return NULL;
246
6af87b03
AR
247 /* Upcasting: look in the type of the source to see if it contains the
248 type of the target as a superclass. If so, we'll need to
249 offset the pointer rather than just change its type. */
250 if (TYPE_NAME (t1) != NULL)
251 {
252 v = search_struct_field (type_name_no_tag (t1),
253 v2, 0, t2, 1);
254 if (v)
255 return v;
256 }
257
258 /* Downcasting: look in the type of the target to see if it contains the
259 type of the source as a superclass. If so, we'll need to
9c3c02fd 260 offset the pointer rather than just change its type. */
6af87b03
AR
261 if (TYPE_NAME (t2) != NULL)
262 {
9c3c02fd
TT
263 /* Try downcasting using the run-time type of the value. */
264 int full, top, using_enc;
265 struct type *real_type;
266
267 real_type = value_rtti_type (v2, &full, &top, &using_enc);
268 if (real_type)
269 {
270 v = value_full_object (v2, real_type, full, top, using_enc);
271 v = value_at_lazy (real_type, value_address (v));
272
273 /* We might be trying to cast to the outermost enclosing
274 type, in which case search_struct_field won't work. */
275 if (TYPE_NAME (real_type) != NULL
276 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
277 return v;
278
279 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
280 if (v)
281 return v;
282 }
283
284 /* Try downcasting using information from the destination type
285 T2. This wouldn't work properly for classes with virtual
286 bases, but those were handled above. */
6af87b03
AR
287 v = search_struct_field (type_name_no_tag (t2),
288 value_zero (t1, not_lval), 0, t1, 1);
289 if (v)
290 {
291 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 292 CORE_ADDR addr2 = value_address (v2);
a109c7c1 293
42ae5230 294 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
295 return value_at (type, addr2);
296 }
297 }
694182d2
DJ
298
299 return NULL;
6af87b03
AR
300}
301
fb933624
DJ
302/* Cast one pointer or reference type to another. Both TYPE and
303 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
304 reference types. If SUBCLASS_CHECK is non-zero, this will force a
305 check to see whether TYPE is a superclass of ARG2's type. If
306 SUBCLASS_CHECK is zero, then the subclass check is done only when
307 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
308
309struct value *
b1af9e97
TT
310value_cast_pointers (struct type *type, struct value *arg2,
311 int subclass_check)
fb933624 312{
d160942f 313 struct type *type1 = check_typedef (type);
fb933624 314 struct type *type2 = check_typedef (value_type (arg2));
d160942f 315 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
316 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
317
318 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
319 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 320 && (subclass_check || !value_logical_not (arg2)))
fb933624 321 {
6af87b03 322 struct value *v2;
fb933624 323
6af87b03
AR
324 if (TYPE_CODE (type2) == TYPE_CODE_REF)
325 v2 = coerce_ref (arg2);
326 else
327 v2 = value_ind (arg2);
3e43a32a
MS
328 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
329 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
330 v2 = value_cast_structs (t1, v2);
331 /* At this point we have what we can have, un-dereference if needed. */
332 if (v2)
fb933624 333 {
6af87b03 334 struct value *v = value_addr (v2);
a109c7c1 335
6af87b03
AR
336 deprecated_set_value_type (v, type);
337 return v;
fb933624 338 }
6af87b03 339 }
fb933624
DJ
340
341 /* No superclass found, just change the pointer type. */
0d5de010 342 arg2 = value_copy (arg2);
fb933624 343 deprecated_set_value_type (arg2, type);
4dfea560 344 set_value_enclosing_type (arg2, type);
fb933624
DJ
345 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
346 return arg2;
347}
348
c906108c
SS
349/* Cast value ARG2 to type TYPE and return as a value.
350 More general than a C cast: accepts any two types of the same length,
351 and if ARG2 is an lvalue it can be cast into anything at all. */
352/* In C++, casts may change pointer or object representations. */
353
f23631e4
AC
354struct value *
355value_cast (struct type *type, struct value *arg2)
c906108c 356{
52f0bd74
AC
357 enum type_code code1;
358 enum type_code code2;
359 int scalar;
c906108c
SS
360 struct type *type2;
361
362 int convert_to_boolean = 0;
c5aa993b 363
df407dfe 364 if (value_type (arg2) == type)
c906108c
SS
365 return arg2;
366
6af87b03
AR
367 code1 = TYPE_CODE (check_typedef (type));
368
369 /* Check if we are casting struct reference to struct reference. */
370 if (code1 == TYPE_CODE_REF)
371 {
372 /* We dereference type; then we recurse and finally
581e13c1 373 we generate value of the given reference. Nothing wrong with
6af87b03
AR
374 that. */
375 struct type *t1 = check_typedef (type);
376 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
377 struct value *val = value_cast (dereftype, arg2);
a109c7c1 378
6af87b03
AR
379 return value_ref (val);
380 }
381
382 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
383
384 if (code2 == TYPE_CODE_REF)
385 /* We deref the value and then do the cast. */
386 return value_cast (type, coerce_ref (arg2));
387
c906108c
SS
388 CHECK_TYPEDEF (type);
389 code1 = TYPE_CODE (type);
994b9211 390 arg2 = coerce_ref (arg2);
df407dfe 391 type2 = check_typedef (value_type (arg2));
c906108c 392
fb933624
DJ
393 /* You can't cast to a reference type. See value_cast_pointers
394 instead. */
395 gdb_assert (code1 != TYPE_CODE_REF);
396
ac3eeb49
MS
397 /* A cast to an undetermined-length array_type, such as
398 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
399 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
400 if (code1 == TYPE_CODE_ARRAY)
401 {
402 struct type *element_type = TYPE_TARGET_TYPE (type);
403 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 404
d78df370 405 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
406 {
407 struct type *range_type = TYPE_INDEX_TYPE (type);
408 int val_length = TYPE_LENGTH (type2);
409 LONGEST low_bound, high_bound, new_length;
a109c7c1 410
c906108c
SS
411 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
412 low_bound = 0, high_bound = 0;
413 new_length = val_length / element_length;
414 if (val_length % element_length != 0)
3e43a32a
MS
415 warning (_("array element type size does not "
416 "divide object size in cast"));
ac3eeb49
MS
417 /* FIXME-type-allocation: need a way to free this type when
418 we are done with it. */
c906108c
SS
419 range_type = create_range_type ((struct type *) NULL,
420 TYPE_TARGET_TYPE (range_type),
421 low_bound,
422 new_length + low_bound - 1);
ac3eeb49
MS
423 deprecated_set_value_type (arg2,
424 create_array_type ((struct type *) NULL,
425 element_type,
426 range_type));
c906108c
SS
427 return arg2;
428 }
429 }
430
431 if (current_language->c_style_arrays
3bdf2bbd
KW
432 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
433 && !TYPE_VECTOR (type2))
c906108c
SS
434 arg2 = value_coerce_array (arg2);
435
436 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
437 arg2 = value_coerce_function (arg2);
438
df407dfe 439 type2 = check_typedef (value_type (arg2));
c906108c
SS
440 code2 = TYPE_CODE (type2);
441
442 if (code1 == TYPE_CODE_COMPLEX)
443 return cast_into_complex (type, arg2);
444 if (code1 == TYPE_CODE_BOOL)
445 {
446 code1 = TYPE_CODE_INT;
447 convert_to_boolean = 1;
448 }
449 if (code1 == TYPE_CODE_CHAR)
450 code1 = TYPE_CODE_INT;
451 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
452 code2 = TYPE_CODE_INT;
453
454 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
455 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
456 || code2 == TYPE_CODE_RANGE);
c906108c 457
6af87b03
AR
458 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
459 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 460 && TYPE_NAME (type) != 0)
694182d2
DJ
461 {
462 struct value *v = value_cast_structs (type, arg2);
a109c7c1 463
694182d2
DJ
464 if (v)
465 return v;
466 }
467
c906108c
SS
468 if (code1 == TYPE_CODE_FLT && scalar)
469 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
470 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
471 {
e17a4113 472 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
473 int dec_len = TYPE_LENGTH (type);
474 gdb_byte dec[16];
475
476 if (code2 == TYPE_CODE_FLT)
e17a4113 477 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
478 else if (code2 == TYPE_CODE_DECFLOAT)
479 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 480 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
481 else
482 /* The only option left is an integral type. */
e17a4113 483 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
484
485 return value_from_decfloat (type, dec);
486 }
c906108c
SS
487 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
488 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
489 && (scalar || code2 == TYPE_CODE_PTR
490 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
491 {
492 LONGEST longest;
c5aa993b 493
2bf1f4a1 494 /* When we cast pointers to integers, we mustn't use
76e71323 495 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
496 represents, as value_as_long would. GDB should evaluate
497 expressions just as the compiler would --- and the compiler
498 sees a cast as a simple reinterpretation of the pointer's
499 bits. */
500 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
501 longest = extract_unsigned_integer
502 (value_contents (arg2), TYPE_LENGTH (type2),
503 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
504 else
505 longest = value_as_long (arg2);
802db21b 506 return value_from_longest (type, convert_to_boolean ?
716c501e 507 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 508 }
ac3eeb49
MS
509 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
510 || code2 == TYPE_CODE_ENUM
511 || code2 == TYPE_CODE_RANGE))
634acd5f 512 {
4603e466
DT
513 /* TYPE_LENGTH (type) is the length of a pointer, but we really
514 want the length of an address! -- we are really dealing with
515 addresses (i.e., gdb representations) not pointers (i.e.,
516 target representations) here.
517
518 This allows things like "print *(int *)0x01000234" to work
519 without printing a misleading message -- which would
520 otherwise occur when dealing with a target having two byte
521 pointers and four byte addresses. */
522
50810684 523 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 524 LONGEST longest = value_as_long (arg2);
a109c7c1 525
4603e466 526 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 527 {
4603e466
DT
528 if (longest >= ((LONGEST) 1 << addr_bit)
529 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 530 warning (_("value truncated"));
634acd5f
AC
531 }
532 return value_from_longest (type, longest);
533 }
0d5de010
DJ
534 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
535 && value_as_long (arg2) == 0)
536 {
537 struct value *result = allocate_value (type);
a109c7c1 538
ad4820ab 539 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
540 return result;
541 }
542 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
543 && value_as_long (arg2) == 0)
544 {
545 /* The Itanium C++ ABI represents NULL pointers to members as
546 minus one, instead of biasing the normal case. */
547 return value_from_longest (type, -1);
548 }
8954db33
AB
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type)
550 && code2 == TYPE_CODE_ARRAY && TYPE_VECTOR (type2)
551 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
552 error (_("Cannot convert between vector values of different sizes"));
553 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar
554 && TYPE_LENGTH (type) != TYPE_LENGTH (type2))
555 error (_("can only cast scalar to vector of same size"));
0ba2eb0f
TT
556 else if (code1 == TYPE_CODE_VOID)
557 {
558 return value_zero (type, not_lval);
559 }
c906108c
SS
560 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
561 {
562 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 563 return value_cast_pointers (type, arg2, 0);
fb933624 564
0d5de010 565 arg2 = value_copy (arg2);
04624583 566 deprecated_set_value_type (arg2, type);
4dfea560 567 set_value_enclosing_type (arg2, type);
b44d461b 568 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
569 return arg2;
570 }
c906108c 571 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 572 return value_at_lazy (type, value_address (arg2));
c906108c
SS
573 else
574 {
8a3fe4f8 575 error (_("Invalid cast."));
c906108c
SS
576 return 0;
577 }
578}
579
4e8f195d
TT
580/* The C++ reinterpret_cast operator. */
581
582struct value *
583value_reinterpret_cast (struct type *type, struct value *arg)
584{
585 struct value *result;
586 struct type *real_type = check_typedef (type);
587 struct type *arg_type, *dest_type;
588 int is_ref = 0;
589 enum type_code dest_code, arg_code;
590
591 /* Do reference, function, and array conversion. */
592 arg = coerce_array (arg);
593
594 /* Attempt to preserve the type the user asked for. */
595 dest_type = type;
596
597 /* If we are casting to a reference type, transform
598 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
599 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
600 {
601 is_ref = 1;
602 arg = value_addr (arg);
603 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
604 real_type = lookup_pointer_type (real_type);
605 }
606
607 arg_type = value_type (arg);
608
609 dest_code = TYPE_CODE (real_type);
610 arg_code = TYPE_CODE (arg_type);
611
612 /* We can convert pointer types, or any pointer type to int, or int
613 type to pointer. */
614 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
615 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
616 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
617 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
618 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
619 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
620 || (dest_code == arg_code
621 && (dest_code == TYPE_CODE_PTR
622 || dest_code == TYPE_CODE_METHODPTR
623 || dest_code == TYPE_CODE_MEMBERPTR)))
624 result = value_cast (dest_type, arg);
625 else
626 error (_("Invalid reinterpret_cast"));
627
628 if (is_ref)
629 result = value_cast (type, value_ref (value_ind (result)));
630
631 return result;
632}
633
634/* A helper for value_dynamic_cast. This implements the first of two
635 runtime checks: we iterate over all the base classes of the value's
636 class which are equal to the desired class; if only one of these
637 holds the value, then it is the answer. */
638
639static int
640dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
641 const gdb_byte *valaddr,
642 int embedded_offset,
4e8f195d 643 CORE_ADDR address,
8af8e3bc 644 struct value *val,
4e8f195d
TT
645 struct type *search_type,
646 CORE_ADDR arg_addr,
647 struct type *arg_type,
648 struct value **result)
649{
650 int i, result_count = 0;
651
652 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
653 {
8af8e3bc
PA
654 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
655 address, val);
a109c7c1 656
4e8f195d
TT
657 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
658 {
8af8e3bc
PA
659 if (address + embedded_offset + offset >= arg_addr
660 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
661 {
662 ++result_count;
663 if (!*result)
664 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 665 address + embedded_offset + offset);
4e8f195d
TT
666 }
667 }
668 else
669 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
670 valaddr,
671 embedded_offset + offset,
672 address, val,
4e8f195d
TT
673 TYPE_BASECLASS (search_type, i),
674 arg_addr,
675 arg_type,
676 result);
677 }
678
679 return result_count;
680}
681
682/* A helper for value_dynamic_cast. This implements the second of two
683 runtime checks: we look for a unique public sibling class of the
684 argument's declared class. */
685
686static int
687dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
688 const gdb_byte *valaddr,
689 int embedded_offset,
4e8f195d 690 CORE_ADDR address,
8af8e3bc 691 struct value *val,
4e8f195d
TT
692 struct type *search_type,
693 struct value **result)
694{
695 int i, result_count = 0;
696
697 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
698 {
699 int offset;
700
701 if (! BASETYPE_VIA_PUBLIC (search_type, i))
702 continue;
703
8af8e3bc
PA
704 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
705 address, val);
4e8f195d
TT
706 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
707 {
708 ++result_count;
709 if (*result == NULL)
710 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 711 address + embedded_offset + offset);
4e8f195d
TT
712 }
713 else
714 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
715 valaddr,
716 embedded_offset + offset,
717 address, val,
4e8f195d
TT
718 TYPE_BASECLASS (search_type, i),
719 result);
720 }
721
722 return result_count;
723}
724
725/* The C++ dynamic_cast operator. */
726
727struct value *
728value_dynamic_cast (struct type *type, struct value *arg)
729{
8f78b329 730 int full, top, using_enc;
4e8f195d
TT
731 struct type *resolved_type = check_typedef (type);
732 struct type *arg_type = check_typedef (value_type (arg));
733 struct type *class_type, *rtti_type;
734 struct value *result, *tem, *original_arg = arg;
735 CORE_ADDR addr;
736 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
737
738 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
739 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
740 error (_("Argument to dynamic_cast must be a pointer or reference type"));
741 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
742 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
743 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
744
745 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
746 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
747 {
748 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
749 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
750 && value_as_long (arg) == 0))
751 error (_("Argument to dynamic_cast does not have pointer type"));
752 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
753 {
754 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
755 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
756 error (_("Argument to dynamic_cast does "
757 "not have pointer to class type"));
4e8f195d
TT
758 }
759
760 /* Handle NULL pointers. */
761 if (value_as_long (arg) == 0)
762 return value_zero (type, not_lval);
763
764 arg = value_ind (arg);
765 }
766 else
767 {
768 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
769 error (_("Argument to dynamic_cast does not have class type"));
770 }
771
772 /* If the classes are the same, just return the argument. */
773 if (class_types_same_p (class_type, arg_type))
774 return value_cast (type, arg);
775
776 /* If the target type is a unique base class of the argument's
777 declared type, just cast it. */
778 if (is_ancestor (class_type, arg_type))
779 {
780 if (is_unique_ancestor (class_type, arg))
781 return value_cast (type, original_arg);
782 error (_("Ambiguous dynamic_cast"));
783 }
784
785 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
786 if (! rtti_type)
787 error (_("Couldn't determine value's most derived type for dynamic_cast"));
788
789 /* Compute the most derived object's address. */
790 addr = value_address (arg);
791 if (full)
792 {
793 /* Done. */
794 }
795 else if (using_enc)
796 addr += top;
797 else
798 addr += top + value_embedded_offset (arg);
799
800 /* dynamic_cast<void *> means to return a pointer to the
801 most-derived object. */
802 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
803 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
804 return value_at_lazy (type, addr);
805
806 tem = value_at (type, addr);
807
808 /* The first dynamic check specified in 5.2.7. */
809 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
810 {
811 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
812 return tem;
813 result = NULL;
814 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
815 value_contents_for_printing (tem),
816 value_embedded_offset (tem),
817 value_address (tem), tem,
4e8f195d
TT
818 rtti_type, addr,
819 arg_type,
820 &result) == 1)
821 return value_cast (type,
822 is_ref ? value_ref (result) : value_addr (result));
823 }
824
825 /* The second dynamic check specified in 5.2.7. */
826 result = NULL;
827 if (is_public_ancestor (arg_type, rtti_type)
828 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
829 value_contents_for_printing (tem),
830 value_embedded_offset (tem),
831 value_address (tem), tem,
4e8f195d
TT
832 rtti_type, &result) == 1)
833 return value_cast (type,
834 is_ref ? value_ref (result) : value_addr (result));
835
836 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
837 return value_zero (type, not_lval);
838
839 error (_("dynamic_cast failed"));
840}
841
c906108c
SS
842/* Create a value of type TYPE that is zero, and return it. */
843
f23631e4 844struct value *
fba45db2 845value_zero (struct type *type, enum lval_type lv)
c906108c 846{
f23631e4 847 struct value *val = allocate_value (type);
c906108c 848
bb7da2bf 849 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
850 return val;
851}
852
18a46dbe 853/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
854
855struct value *
18a46dbe 856value_one (struct type *type)
301f0ecf
DE
857{
858 struct type *type1 = check_typedef (type);
4e608b4f 859 struct value *val;
301f0ecf
DE
860
861 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
862 {
e17a4113 863 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 864 gdb_byte v[16];
a109c7c1 865
e17a4113 866 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
867 val = value_from_decfloat (type, v);
868 }
869 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
870 {
871 val = value_from_double (type, (DOUBLEST) 1);
872 }
873 else if (is_integral_type (type1))
874 {
875 val = value_from_longest (type, (LONGEST) 1);
876 }
120bd360
KW
877 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
878 {
879 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
880 int i;
881 LONGEST low_bound, high_bound;
120bd360
KW
882 struct value *tmp;
883
cfa6f054
KW
884 if (!get_array_bounds (type1, &low_bound, &high_bound))
885 error (_("Could not determine the vector bounds"));
886
120bd360 887 val = allocate_value (type);
cfa6f054 888 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 889 {
18a46dbe 890 tmp = value_one (eltype);
120bd360
KW
891 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
892 value_contents_all (tmp), TYPE_LENGTH (eltype));
893 }
894 }
301f0ecf
DE
895 else
896 {
897 error (_("Not a numeric type."));
898 }
899
18a46dbe
JK
900 /* value_one result is never used for assignments to. */
901 gdb_assert (VALUE_LVAL (val) == not_lval);
902
301f0ecf
DE
903 return val;
904}
905
4e5d721f
DE
906/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack. */
907
908static struct value *
909get_value_at (struct type *type, CORE_ADDR addr, int lazy)
910{
911 struct value *val;
912
913 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
914 error (_("Attempt to dereference a generic pointer."));
915
a3d34bf4 916 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 917
a3d34bf4
PA
918 if (!lazy)
919 value_fetch_lazy (val);
4e5d721f
DE
920
921 return val;
922}
923
070ad9f0 924/* Return a value with type TYPE located at ADDR.
c906108c
SS
925
926 Call value_at only if the data needs to be fetched immediately;
927 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
928 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 929 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 930 is tested in the value_contents macro, which is used if and when
070ad9f0 931 the contents are actually required.
c906108c
SS
932
933 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 934 adjustments before or after calling it. */
c906108c 935
f23631e4 936struct value *
00a4c844 937value_at (struct type *type, CORE_ADDR addr)
c906108c 938{
4e5d721f 939 return get_value_at (type, addr, 0);
c906108c
SS
940}
941
942/* Return a lazy value with type TYPE located at ADDR (cf. value_at). */
943
f23631e4 944struct value *
00a4c844 945value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 946{
4e5d721f 947 return get_value_at (type, addr, 1);
c906108c
SS
948}
949
0fd88904 950/* Called only from the value_contents and value_contents_all()
46615f07 951 macros, if the current data for a variable needs to be loaded into
0fd88904 952 value_contents(VAL). Fetches the data from the user's process, and
46615f07
AC
953 clears the lazy flag to indicate that the data in the buffer is
954 valid.
c906108c 955
ac3eeb49
MS
956 If the value is zero-length, we avoid calling read_memory, which
957 would abort. We mark the value as fetched anyway -- all 0 bytes of
958 it.
c906108c 959
ac3eeb49
MS
960 This function returns a value because it is used in the
961 value_contents macro as part of an expression, where a void would
962 not work. The value is ignored. */
c906108c
SS
963
964int
f23631e4 965value_fetch_lazy (struct value *val)
c906108c 966{
3e3d7139
JG
967 gdb_assert (value_lazy (val));
968 allocate_value_contents (val);
4ea48cc1
DJ
969 if (value_bitsize (val))
970 {
971 /* To read a lazy bitfield, read the entire enclosing value. This
972 prevents reading the same block of (possibly volatile) memory once
973 per bitfield. It would be even better to read only the containing
974 word, but we have no way to record that just specific bits of a
975 value have been fetched. */
976 struct type *type = check_typedef (value_type (val));
977 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
978 struct value *parent = value_parent (val);
979 LONGEST offset = value_offset (val);
5467c6c8 980 LONGEST num;
a109c7c1 981
0e03807e
TT
982 if (!value_bits_valid (val,
983 TARGET_CHAR_BIT * offset + value_bitpos (val),
984 value_bitsize (val)))
985 error (_("value has been optimized out"));
986
5467c6c8
PA
987 if (!unpack_value_bits_as_long (value_type (val),
988 value_contents_for_printing (parent),
989 offset,
990 value_bitpos (val),
991 value_bitsize (val), parent, &num))
992 mark_value_bytes_unavailable (val,
993 value_embedded_offset (val),
744a8059 994 TYPE_LENGTH (type));
5467c6c8 995 else
744a8059 996 store_signed_integer (value_contents_raw (val), TYPE_LENGTH (type),
5467c6c8 997 byte_order, num);
4ea48cc1
DJ
998 }
999 else if (VALUE_LVAL (val) == lval_memory)
9214ee5f 1000 {
42ae5230 1001 CORE_ADDR addr = value_address (val);
744a8059 1002 struct type *type = check_typedef (value_enclosing_type (val));
9214ee5f 1003
744a8059 1004 if (TYPE_LENGTH (type))
e6ca34fc 1005 read_value_memory (val, 0, value_stack (val),
744a8059
SP
1006 addr, value_contents_all_raw (val),
1007 TYPE_LENGTH (type));
9214ee5f
DJ
1008 }
1009 else if (VALUE_LVAL (val) == lval_register)
1010 {
669fac23
DJ
1011 struct frame_info *frame;
1012 int regnum;
9214ee5f 1013 struct type *type = check_typedef (value_type (val));
669fac23 1014 struct value *new_val = val, *mark = value_mark ();
c906108c 1015
669fac23
DJ
1016 /* Offsets are not supported here; lazy register values must
1017 refer to the entire register. */
1018 gdb_assert (value_offset (val) == 0);
9214ee5f 1019
669fac23
DJ
1020 while (VALUE_LVAL (new_val) == lval_register && value_lazy (new_val))
1021 {
1022 frame = frame_find_by_id (VALUE_FRAME_ID (new_val));
1023 regnum = VALUE_REGNUM (new_val);
1024
1025 gdb_assert (frame != NULL);
9214ee5f 1026
669fac23
DJ
1027 /* Convertible register routines are used for multi-register
1028 values and for interpretation in different types
1029 (e.g. float or int from a double register). Lazy
1030 register values should have the register's natural type,
1031 so they do not apply. */
1032 gdb_assert (!gdbarch_convert_register_p (get_frame_arch (frame),
1033 regnum, type));
1034
1035 new_val = get_frame_register_value (frame, regnum);
1036 }
1037
1038 /* If it's still lazy (for instance, a saved register on the
1039 stack), fetch it. */
1040 if (value_lazy (new_val))
1041 value_fetch_lazy (new_val);
1042
39d37385 1043 /* If the register was not saved, mark it optimized out. */
669fac23 1044 if (value_optimized_out (new_val))
9214ee5f 1045 set_value_optimized_out (val, 1);
669fac23 1046 else
39d37385
PA
1047 {
1048 set_value_lazy (val, 0);
1049 value_contents_copy (val, value_embedded_offset (val),
1050 new_val, value_embedded_offset (new_val),
1051 TYPE_LENGTH (type));
1052 }
669fac23
DJ
1053
1054 if (frame_debug)
1055 {
029a67e4 1056 struct gdbarch *gdbarch;
669fac23
DJ
1057 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1058 regnum = VALUE_REGNUM (val);
029a67e4 1059 gdbarch = get_frame_arch (frame);
669fac23 1060
3e43a32a
MS
1061 fprintf_unfiltered (gdb_stdlog,
1062 "{ value_fetch_lazy "
1063 "(frame=%d,regnum=%d(%s),...) ",
669fac23 1064 frame_relative_level (frame), regnum,
029a67e4 1065 user_reg_map_regnum_to_name (gdbarch, regnum));
669fac23
DJ
1066
1067 fprintf_unfiltered (gdb_stdlog, "->");
1068 if (value_optimized_out (new_val))
1069 fprintf_unfiltered (gdb_stdlog, " optimized out");
1070 else
1071 {
1072 int i;
1073 const gdb_byte *buf = value_contents (new_val);
1074
1075 if (VALUE_LVAL (new_val) == lval_register)
1076 fprintf_unfiltered (gdb_stdlog, " register=%d",
1077 VALUE_REGNUM (new_val));
1078 else if (VALUE_LVAL (new_val) == lval_memory)
5af949e3
UW
1079 fprintf_unfiltered (gdb_stdlog, " address=%s",
1080 paddress (gdbarch,
1081 value_address (new_val)));
669fac23
DJ
1082 else
1083 fprintf_unfiltered (gdb_stdlog, " computed");
1084
1085 fprintf_unfiltered (gdb_stdlog, " bytes=");
1086 fprintf_unfiltered (gdb_stdlog, "[");
029a67e4 1087 for (i = 0; i < register_size (gdbarch, regnum); i++)
669fac23
DJ
1088 fprintf_unfiltered (gdb_stdlog, "%02x", buf[i]);
1089 fprintf_unfiltered (gdb_stdlog, "]");
1090 }
1091
1092 fprintf_unfiltered (gdb_stdlog, " }\n");
1093 }
1094
1095 /* Dispose of the intermediate values. This prevents
1096 watchpoints from trying to watch the saved frame pointer. */
1097 value_free_to_mark (mark);
9214ee5f 1098 }
ac71a68c
JK
1099 else if (VALUE_LVAL (val) == lval_computed
1100 && value_computed_funcs (val)->read != NULL)
5f5233d4 1101 value_computed_funcs (val)->read (val);
41e8491f
JK
1102 else if (value_optimized_out (val))
1103 /* Keep it optimized out. */;
9214ee5f 1104 else
9b20d036 1105 internal_error (__FILE__, __LINE__, _("Unexpected lazy value type."));
802db21b 1106
dfa52d88 1107 set_value_lazy (val, 0);
c906108c
SS
1108 return 0;
1109}
1110
e6ca34fc
PA
1111void
1112read_value_memory (struct value *val, int embedded_offset,
1113 int stack, CORE_ADDR memaddr,
1114 gdb_byte *buffer, size_t length)
1115{
1116 if (length)
1117 {
1118 VEC(mem_range_s) *available_memory;
1119
1120 if (get_traceframe_number () < 0
1121 || !traceframe_available_memory (&available_memory, memaddr, length))
1122 {
1123 if (stack)
1124 read_stack (memaddr, buffer, length);
1125 else
1126 read_memory (memaddr, buffer, length);
1127 }
1128 else
1129 {
1130 struct target_section_table *table;
1131 struct cleanup *old_chain;
1132 CORE_ADDR unavail;
1133 mem_range_s *r;
1134 int i;
1135
1136 /* Fallback to reading from read-only sections. */
1137 table = target_get_section_table (&exec_ops);
1138 available_memory =
1139 section_table_available_memory (available_memory,
1140 memaddr, length,
1141 table->sections,
1142 table->sections_end);
1143
1144 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
1145 &available_memory);
1146
1147 normalize_mem_ranges (available_memory);
1148
1149 /* Mark which bytes are unavailable, and read those which
1150 are available. */
1151
1152 unavail = memaddr;
1153
1154 for (i = 0;
1155 VEC_iterate (mem_range_s, available_memory, i, r);
1156 i++)
1157 {
1158 if (mem_ranges_overlap (r->start, r->length,
1159 memaddr, length))
1160 {
1161 CORE_ADDR lo1, hi1, lo2, hi2;
1162 CORE_ADDR start, end;
1163
1164 /* Get the intersection window. */
1165 lo1 = memaddr;
1166 hi1 = memaddr + length;
1167 lo2 = r->start;
1168 hi2 = r->start + r->length;
1169 start = max (lo1, lo2);
1170 end = min (hi1, hi2);
1171
1172 gdb_assert (end - memaddr <= length);
1173
1174 if (start > unavail)
1175 mark_value_bytes_unavailable (val,
1176 (embedded_offset
1177 + unavail - memaddr),
1178 start - unavail);
1179 unavail = end;
1180
1181 read_memory (start, buffer + start - memaddr, end - start);
1182 }
1183 }
1184
1185 if (unavail != memaddr + length)
1186 mark_value_bytes_unavailable (val,
1187 embedded_offset + unavail - memaddr,
1188 (memaddr + length) - unavail);
1189
1190 do_cleanups (old_chain);
1191 }
1192 }
1193}
c906108c
SS
1194
1195/* Store the contents of FROMVAL into the location of TOVAL.
1196 Return a new value with the location of TOVAL and contents of FROMVAL. */
1197
f23631e4
AC
1198struct value *
1199value_assign (struct value *toval, struct value *fromval)
c906108c 1200{
52f0bd74 1201 struct type *type;
f23631e4 1202 struct value *val;
cb741690 1203 struct frame_id old_frame;
c906108c 1204
88e3b34b 1205 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1206 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1207
994b9211 1208 toval = coerce_ref (toval);
c906108c 1209
df407dfe 1210 type = value_type (toval);
c906108c 1211 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1212 fromval = value_cast (type, fromval);
c906108c 1213 else
63092375
DJ
1214 {
1215 /* Coerce arrays and functions to pointers, except for arrays
1216 which only live in GDB's storage. */
1217 if (!value_must_coerce_to_target (fromval))
1218 fromval = coerce_array (fromval);
1219 }
1220
c906108c
SS
1221 CHECK_TYPEDEF (type);
1222
ac3eeb49
MS
1223 /* Since modifying a register can trash the frame chain, and
1224 modifying memory can trash the frame cache, we save the old frame
1225 and then restore the new frame afterwards. */
206415a3 1226 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1227
c906108c
SS
1228 switch (VALUE_LVAL (toval))
1229 {
1230 case lval_internalvar:
1231 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1232 return value_of_internalvar (get_type_arch (type),
1233 VALUE_INTERNALVAR (toval));
c906108c
SS
1234
1235 case lval_internalvar_component:
1236 set_internalvar_component (VALUE_INTERNALVAR (toval),
df407dfe
AC
1237 value_offset (toval),
1238 value_bitpos (toval),
1239 value_bitsize (toval),
c906108c
SS
1240 fromval);
1241 break;
1242
1243 case lval_memory:
1244 {
fc1a4b47 1245 const gdb_byte *dest_buffer;
c5aa993b
JM
1246 CORE_ADDR changed_addr;
1247 int changed_len;
10c42a71 1248 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1249
df407dfe 1250 if (value_bitsize (toval))
c5aa993b 1251 {
2d88202a 1252 struct value *parent = value_parent (toval);
2d88202a 1253
a109c7c1 1254 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1255 changed_len = (value_bitpos (toval)
1256 + value_bitsize (toval)
c5aa993b
JM
1257 + HOST_CHAR_BIT - 1)
1258 / HOST_CHAR_BIT;
c906108c 1259
4ea48cc1
DJ
1260 /* If we can read-modify-write exactly the size of the
1261 containing type (e.g. short or int) then do so. This
1262 is safer for volatile bitfields mapped to hardware
1263 registers. */
1264 if (changed_len < TYPE_LENGTH (type)
1265 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1266 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1267 changed_len = TYPE_LENGTH (type);
1268
c906108c 1269 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1270 error (_("Can't handle bitfields which "
1271 "don't fit in a %d bit word."),
baa6f10b 1272 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1273
2d88202a 1274 read_memory (changed_addr, buffer, changed_len);
50810684 1275 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1276 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1277 dest_buffer = buffer;
1278 }
c906108c
SS
1279 else
1280 {
42ae5230 1281 changed_addr = value_address (toval);
c906108c 1282 changed_len = TYPE_LENGTH (type);
0fd88904 1283 dest_buffer = value_contents (fromval);
c906108c
SS
1284 }
1285
972daa01 1286 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1287 }
1288 break;
1289
492254e9 1290 case lval_register:
c906108c 1291 {
c906108c 1292 struct frame_info *frame;
d80b854b 1293 struct gdbarch *gdbarch;
ff2e87ac 1294 int value_reg;
c906108c
SS
1295
1296 /* Figure out which frame this is in currently. */
0c16dd26
AC
1297 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1298 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1299
1300 if (!frame)
8a3fe4f8 1301 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1302
1303 gdbarch = get_frame_arch (frame);
1304 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1305 {
ff2e87ac 1306 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1307 conversion of program values to a special raw
1308 format. */
d80b854b 1309 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1310 VALUE_REGNUM (toval), type,
1311 value_contents (fromval));
492254e9 1312 }
c906108c 1313 else
492254e9 1314 {
df407dfe 1315 if (value_bitsize (toval))
00fa51f6 1316 {
2d88202a
UW
1317 struct value *parent = value_parent (toval);
1318 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1319 int changed_len;
1320 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1321 int optim, unavail;
00fa51f6
UW
1322
1323 changed_len = (value_bitpos (toval)
1324 + value_bitsize (toval)
1325 + HOST_CHAR_BIT - 1)
1326 / HOST_CHAR_BIT;
1327
1328 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1329 error (_("Can't handle bitfields which "
1330 "don't fit in a %d bit word."),
00fa51f6
UW
1331 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1332
8dccd430
PA
1333 if (!get_frame_register_bytes (frame, value_reg, offset,
1334 changed_len, buffer,
1335 &optim, &unavail))
1336 {
1337 if (optim)
1338 error (_("value has been optimized out"));
1339 if (unavail)
1340 throw_error (NOT_AVAILABLE_ERROR,
1341 _("value is not available"));
1342 }
00fa51f6 1343
50810684
UW
1344 modify_field (type, buffer, value_as_long (fromval),
1345 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1346
2d88202a 1347 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1348 changed_len, buffer);
1349 }
c906108c 1350 else
00fa51f6
UW
1351 {
1352 put_frame_register_bytes (frame, value_reg,
1353 value_offset (toval),
1354 TYPE_LENGTH (type),
1355 value_contents (fromval));
1356 }
ff2e87ac 1357 }
00fa51f6 1358
9a4105ab
AC
1359 if (deprecated_register_changed_hook)
1360 deprecated_register_changed_hook (-1);
ff2e87ac 1361 break;
c906108c 1362 }
5f5233d4
PA
1363
1364 case lval_computed:
1365 {
c8f2448a 1366 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1367
ac71a68c
JK
1368 if (funcs->write != NULL)
1369 {
1370 funcs->write (toval, fromval);
1371 break;
1372 }
5f5233d4 1373 }
ac71a68c 1374 /* Fall through. */
5f5233d4 1375
c906108c 1376 default:
8a3fe4f8 1377 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1378 }
1379
cb741690
DJ
1380 /* Assigning to the stack pointer, frame pointer, and other
1381 (architecture and calling convention specific) registers may
d649a38e 1382 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1383 also can. We just do this on all assignments to registers or
1384 memory, for simplicity's sake; I doubt the slowdown matters. */
1385 switch (VALUE_LVAL (toval))
1386 {
1387 case lval_memory:
1388 case lval_register:
0e03807e 1389 case lval_computed:
cb741690 1390
d649a38e 1391 observer_notify_target_changed (&current_target);
cb741690 1392
ac3eeb49
MS
1393 /* Having destroyed the frame cache, restore the selected
1394 frame. */
cb741690
DJ
1395
1396 /* FIXME: cagney/2002-11-02: There has to be a better way of
1397 doing this. Instead of constantly saving/restoring the
1398 frame. Why not create a get_selected_frame() function that,
1399 having saved the selected frame's ID can automatically
1400 re-find the previously selected frame automatically. */
1401
1402 {
1403 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1404
cb741690
DJ
1405 if (fi != NULL)
1406 select_frame (fi);
1407 }
1408
1409 break;
1410 default:
1411 break;
1412 }
1413
ac3eeb49
MS
1414 /* If the field does not entirely fill a LONGEST, then zero the sign
1415 bits. If the field is signed, and is negative, then sign
1416 extend. */
df407dfe
AC
1417 if ((value_bitsize (toval) > 0)
1418 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1419 {
1420 LONGEST fieldval = value_as_long (fromval);
df407dfe 1421 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1422
1423 fieldval &= valmask;
ac3eeb49
MS
1424 if (!TYPE_UNSIGNED (type)
1425 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1426 fieldval |= ~valmask;
1427
1428 fromval = value_from_longest (type, fieldval);
1429 }
1430
4aac0db7
UW
1431 /* The return value is a copy of TOVAL so it shares its location
1432 information, but its contents are updated from FROMVAL. This
1433 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1434 val = value_copy (toval);
4aac0db7 1435 set_value_lazy (val, 0);
0fd88904 1436 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1437 TYPE_LENGTH (type));
4aac0db7
UW
1438
1439 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1440 in the case of pointer types. For object types, the enclosing type
1441 and embedded offset must *not* be copied: the target object refered
1442 to by TOVAL retains its original dynamic type after assignment. */
1443 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1444 {
1445 set_value_enclosing_type (val, value_enclosing_type (fromval));
1446 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1447 }
c5aa993b 1448
c906108c
SS
1449 return val;
1450}
1451
1452/* Extend a value VAL to COUNT repetitions of its type. */
1453
f23631e4
AC
1454struct value *
1455value_repeat (struct value *arg1, int count)
c906108c 1456{
f23631e4 1457 struct value *val;
c906108c
SS
1458
1459 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1460 error (_("Only values in memory can be extended with '@'."));
c906108c 1461 if (count < 1)
8a3fe4f8 1462 error (_("Invalid number %d of repetitions."), count);
c906108c 1463
4754a64e 1464 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1465
c906108c 1466 VALUE_LVAL (val) = lval_memory;
42ae5230 1467 set_value_address (val, value_address (arg1));
c906108c 1468
24e6bcee
PA
1469 read_value_memory (val, 0, value_stack (val), value_address (val),
1470 value_contents_all_raw (val),
1471 TYPE_LENGTH (value_enclosing_type (val)));
1472
c906108c
SS
1473 return val;
1474}
1475
f23631e4 1476struct value *
9df2fbc4 1477value_of_variable (struct symbol *var, const struct block *b)
c906108c 1478{
61212c0f 1479 struct frame_info *frame;
c906108c 1480
61212c0f
UW
1481 if (!symbol_read_needs_frame (var))
1482 frame = NULL;
1483 else if (!b)
1484 frame = get_selected_frame (_("No frame selected."));
1485 else
c906108c
SS
1486 {
1487 frame = block_innermost_frame (b);
1488 if (!frame)
c5aa993b 1489 {
edb3359d 1490 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1491 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1492 error (_("No frame is currently executing in block %s."),
de5ad195 1493 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1494 else
8a3fe4f8 1495 error (_("No frame is currently executing in specified block"));
c5aa993b 1496 }
c906108c
SS
1497 }
1498
8afd712c 1499 return read_var_value (var, frame);
c906108c
SS
1500}
1501
61212c0f 1502struct value *
270140bd 1503address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1504{
1505 struct type *type = SYMBOL_TYPE (var);
1506 struct value *val;
1507
1508 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1509 Lazy evaluation pays off here. */
61212c0f
UW
1510
1511 val = value_of_variable (var, b);
1512
1513 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1514 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1515 {
42ae5230 1516 CORE_ADDR addr = value_address (val);
a109c7c1 1517
61212c0f
UW
1518 return value_from_pointer (lookup_pointer_type (type), addr);
1519 }
1520
1521 /* Not a memory address; check what the problem was. */
1522 switch (VALUE_LVAL (val))
1523 {
1524 case lval_register:
1525 {
1526 struct frame_info *frame;
1527 const char *regname;
1528
1529 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1530 gdb_assert (frame);
1531
1532 regname = gdbarch_register_name (get_frame_arch (frame),
1533 VALUE_REGNUM (val));
1534 gdb_assert (regname && *regname);
1535
1536 error (_("Address requested for identifier "
1537 "\"%s\" which is in register $%s"),
1538 SYMBOL_PRINT_NAME (var), regname);
1539 break;
1540 }
1541
1542 default:
1543 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1544 SYMBOL_PRINT_NAME (var));
1545 break;
1546 }
1547
1548 return val;
1549}
1550
63092375
DJ
1551/* Return one if VAL does not live in target memory, but should in order
1552 to operate on it. Otherwise return zero. */
1553
1554int
1555value_must_coerce_to_target (struct value *val)
1556{
1557 struct type *valtype;
1558
1559 /* The only lval kinds which do not live in target memory. */
1560 if (VALUE_LVAL (val) != not_lval
1561 && VALUE_LVAL (val) != lval_internalvar)
1562 return 0;
1563
1564 valtype = check_typedef (value_type (val));
1565
1566 switch (TYPE_CODE (valtype))
1567 {
1568 case TYPE_CODE_ARRAY:
3cbaedff 1569 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1570 case TYPE_CODE_STRING:
1571 return 1;
1572 default:
1573 return 0;
1574 }
1575}
1576
3e43a32a
MS
1577/* Make sure that VAL lives in target memory if it's supposed to. For
1578 instance, strings are constructed as character arrays in GDB's
1579 storage, and this function copies them to the target. */
63092375
DJ
1580
1581struct value *
1582value_coerce_to_target (struct value *val)
1583{
1584 LONGEST length;
1585 CORE_ADDR addr;
1586
1587 if (!value_must_coerce_to_target (val))
1588 return val;
1589
1590 length = TYPE_LENGTH (check_typedef (value_type (val)));
1591 addr = allocate_space_in_inferior (length);
1592 write_memory (addr, value_contents (val), length);
1593 return value_at_lazy (value_type (val), addr);
1594}
1595
ac3eeb49
MS
1596/* Given a value which is an array, return a value which is a pointer
1597 to its first element, regardless of whether or not the array has a
1598 nonzero lower bound.
c906108c 1599
ac3eeb49
MS
1600 FIXME: A previous comment here indicated that this routine should
1601 be substracting the array's lower bound. It's not clear to me that
1602 this is correct. Given an array subscripting operation, it would
1603 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1604
1605 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1606
ac3eeb49
MS
1607 However I believe a more appropriate and logical place to account
1608 for the lower bound is to do so in value_subscript, essentially
1609 computing:
c906108c
SS
1610
1611 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1612
ac3eeb49
MS
1613 As further evidence consider what would happen with operations
1614 other than array subscripting, where the caller would get back a
1615 value that had an address somewhere before the actual first element
1616 of the array, and the information about the lower bound would be
581e13c1 1617 lost because of the coercion to pointer type. */
c906108c 1618
f23631e4
AC
1619struct value *
1620value_coerce_array (struct value *arg1)
c906108c 1621{
df407dfe 1622 struct type *type = check_typedef (value_type (arg1));
c906108c 1623
63092375
DJ
1624 /* If the user tries to do something requiring a pointer with an
1625 array that has not yet been pushed to the target, then this would
1626 be a good time to do so. */
1627 arg1 = value_coerce_to_target (arg1);
1628
c906108c 1629 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1630 error (_("Attempt to take address of value not located in memory."));
c906108c 1631
4478b372 1632 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1633 value_address (arg1));
c906108c
SS
1634}
1635
1636/* Given a value which is a function, return a value which is a pointer
1637 to it. */
1638
f23631e4
AC
1639struct value *
1640value_coerce_function (struct value *arg1)
c906108c 1641{
f23631e4 1642 struct value *retval;
c906108c
SS
1643
1644 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1645 error (_("Attempt to take address of value not located in memory."));
c906108c 1646
df407dfe 1647 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1648 value_address (arg1));
c906108c 1649 return retval;
c5aa993b 1650}
c906108c 1651
ac3eeb49
MS
1652/* Return a pointer value for the object for which ARG1 is the
1653 contents. */
c906108c 1654
f23631e4
AC
1655struct value *
1656value_addr (struct value *arg1)
c906108c 1657{
f23631e4 1658 struct value *arg2;
df407dfe 1659 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1660
c906108c
SS
1661 if (TYPE_CODE (type) == TYPE_CODE_REF)
1662 {
ac3eeb49
MS
1663 /* Copy the value, but change the type from (T&) to (T*). We
1664 keep the same location information, which is efficient, and
1665 allows &(&X) to get the location containing the reference. */
c906108c 1666 arg2 = value_copy (arg1);
ac3eeb49
MS
1667 deprecated_set_value_type (arg2,
1668 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1669 return arg2;
1670 }
1671 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1672 return value_coerce_function (arg1);
1673
63092375
DJ
1674 /* If this is an array that has not yet been pushed to the target,
1675 then this would be a good time to force it to memory. */
1676 arg1 = value_coerce_to_target (arg1);
1677
c906108c 1678 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1679 error (_("Attempt to take address of value not located in memory."));
c906108c 1680
581e13c1 1681 /* Get target memory address. */
df407dfe 1682 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1683 (value_address (arg1)
13c3b5f5 1684 + value_embedded_offset (arg1)));
c906108c
SS
1685
1686 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1687 full derived object's type ... */
4dfea560
DE
1688 set_value_enclosing_type (arg2,
1689 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1690 /* ... and also the relative position of the subobject in the full
1691 object. */
b44d461b 1692 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1693 return arg2;
1694}
1695
ac3eeb49
MS
1696/* Return a reference value for the object for which ARG1 is the
1697 contents. */
fb933624
DJ
1698
1699struct value *
1700value_ref (struct value *arg1)
1701{
1702 struct value *arg2;
fb933624 1703 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1704
fb933624
DJ
1705 if (TYPE_CODE (type) == TYPE_CODE_REF)
1706 return arg1;
1707
1708 arg2 = value_addr (arg1);
1709 deprecated_set_value_type (arg2, lookup_reference_type (type));
1710 return arg2;
1711}
1712
ac3eeb49
MS
1713/* Given a value of a pointer type, apply the C unary * operator to
1714 it. */
c906108c 1715
f23631e4
AC
1716struct value *
1717value_ind (struct value *arg1)
c906108c
SS
1718{
1719 struct type *base_type;
f23631e4 1720 struct value *arg2;
c906108c 1721
994b9211 1722 arg1 = coerce_array (arg1);
c906108c 1723
df407dfe 1724 base_type = check_typedef (value_type (arg1));
c906108c 1725
8cf6f0b1
TT
1726 if (VALUE_LVAL (arg1) == lval_computed)
1727 {
c8f2448a 1728 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1729
1730 if (funcs->indirect)
1731 {
1732 struct value *result = funcs->indirect (arg1);
1733
1734 if (result)
1735 return result;
1736 }
1737 }
1738
22fe0fbb 1739 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1740 {
1741 struct type *enc_type;
a109c7c1 1742
ac3eeb49
MS
1743 /* We may be pointing to something embedded in a larger object.
1744 Get the real type of the enclosing object. */
4754a64e 1745 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1746 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1747
1748 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1749 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1750 /* For functions, go through find_function_addr, which knows
1751 how to handle function descriptors. */
ac3eeb49
MS
1752 arg2 = value_at_lazy (enc_type,
1753 find_function_addr (arg1, NULL));
0d5de010 1754 else
581e13c1 1755 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1756 arg2 = value_at_lazy (enc_type,
1757 (value_as_address (arg1)
1758 - value_pointed_to_offset (arg1)));
0d5de010 1759
dfcee124 1760 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1761 }
1762
8a3fe4f8 1763 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1764 return 0; /* For lint -- never reached. */
c906108c
SS
1765}
1766\f
39d37385
PA
1767/* Create a value for an array by allocating space in GDB, copying the
1768 data into that space, and then setting up an array value.
c906108c 1769
ac3eeb49
MS
1770 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1771 is populated from the values passed in ELEMVEC.
c906108c
SS
1772
1773 The element type of the array is inherited from the type of the
1774 first element, and all elements must have the same size (though we
ac3eeb49 1775 don't currently enforce any restriction on their types). */
c906108c 1776
f23631e4
AC
1777struct value *
1778value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1779{
1780 int nelem;
1781 int idx;
1782 unsigned int typelength;
f23631e4 1783 struct value *val;
c906108c 1784 struct type *arraytype;
c906108c 1785
ac3eeb49
MS
1786 /* Validate that the bounds are reasonable and that each of the
1787 elements have the same size. */
c906108c
SS
1788
1789 nelem = highbound - lowbound + 1;
1790 if (nelem <= 0)
1791 {
8a3fe4f8 1792 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1793 }
4754a64e 1794 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1795 for (idx = 1; idx < nelem; idx++)
1796 {
4754a64e 1797 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1798 {
8a3fe4f8 1799 error (_("array elements must all be the same size"));
c906108c
SS
1800 }
1801 }
1802
e3506a9f
UW
1803 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1804 lowbound, highbound);
c906108c
SS
1805
1806 if (!current_language->c_style_arrays)
1807 {
1808 val = allocate_value (arraytype);
1809 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1810 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1811 typelength);
c906108c
SS
1812 return val;
1813 }
1814
63092375
DJ
1815 /* Allocate space to store the array, and then initialize it by
1816 copying in each element. */
c906108c 1817
63092375 1818 val = allocate_value (arraytype);
c906108c 1819 for (idx = 0; idx < nelem; idx++)
39d37385 1820 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1821 return val;
c906108c
SS
1822}
1823
6c7a06a3 1824struct value *
63375b74 1825value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1826{
1827 struct value *val;
1828 int lowbound = current_language->string_lower_bound;
63375b74 1829 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1830 struct type *stringtype
e3506a9f 1831 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1832
1833 val = allocate_value (stringtype);
1834 memcpy (value_contents_raw (val), ptr, len);
1835 return val;
1836}
1837
ac3eeb49
MS
1838/* Create a value for a string constant by allocating space in the
1839 inferior, copying the data into that space, and returning the
1840 address with type TYPE_CODE_STRING. PTR points to the string
1841 constant data; LEN is number of characters.
1842
1843 Note that string types are like array of char types with a lower
1844 bound of zero and an upper bound of LEN - 1. Also note that the
1845 string may contain embedded null bytes. */
c906108c 1846
f23631e4 1847struct value *
63375b74 1848value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1849{
f23631e4 1850 struct value *val;
c906108c 1851 int lowbound = current_language->string_lower_bound;
63375b74 1852 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1853 struct type *stringtype
e3506a9f 1854 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1855
3b7538c0
UW
1856 val = allocate_value (stringtype);
1857 memcpy (value_contents_raw (val), ptr, len);
1858 return val;
c906108c
SS
1859}
1860
c906108c 1861\f
ac3eeb49
MS
1862/* See if we can pass arguments in T2 to a function which takes
1863 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1864 a NULL-terminated vector. If some arguments need coercion of some
1865 sort, then the coerced values are written into T2. Return value is
1866 0 if the arguments could be matched, or the position at which they
1867 differ if not.
c906108c 1868
ac3eeb49
MS
1869 STATICP is nonzero if the T1 argument list came from a static
1870 member function. T2 will still include the ``this'' pointer, but
1871 it will be skipped.
c906108c
SS
1872
1873 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1874 which is the type of the instance variable. This is because we
1875 want to handle calls with objects from derived classes. This is
1876 not entirely correct: we should actually check to make sure that a
c906108c
SS
1877 requested operation is type secure, shouldn't we? FIXME. */
1878
1879static int
ad2f7632
DJ
1880typecmp (int staticp, int varargs, int nargs,
1881 struct field t1[], struct value *t2[])
c906108c
SS
1882{
1883 int i;
1884
1885 if (t2 == 0)
ac3eeb49
MS
1886 internal_error (__FILE__, __LINE__,
1887 _("typecmp: no argument list"));
ad2f7632 1888
ac3eeb49
MS
1889 /* Skip ``this'' argument if applicable. T2 will always include
1890 THIS. */
4a1970e4 1891 if (staticp)
ad2f7632
DJ
1892 t2 ++;
1893
1894 for (i = 0;
1895 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1896 i++)
c906108c 1897 {
c5aa993b 1898 struct type *tt1, *tt2;
ad2f7632 1899
c5aa993b
JM
1900 if (!t2[i])
1901 return i + 1;
ad2f7632
DJ
1902
1903 tt1 = check_typedef (t1[i].type);
df407dfe 1904 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1905
c906108c 1906 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1907 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1908 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1909 == TYPE_CODE (tt2)))
c906108c
SS
1910 {
1911 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1912 t2[i] = value_coerce_array (t2[i]);
1913 else
fb933624 1914 t2[i] = value_ref (t2[i]);
c906108c
SS
1915 continue;
1916 }
1917
802db21b
DB
1918 /* djb - 20000715 - Until the new type structure is in the
1919 place, and we can attempt things like implicit conversions,
1920 we need to do this so you can take something like a map<const
1921 char *>, and properly access map["hello"], because the
1922 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1923 and the argument will be a pointer to a char. */
1924 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1925 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1926 {
1927 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1928 }
ac3eeb49
MS
1929 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1930 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1931 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1932 {
ac3eeb49 1933 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1934 }
c5aa993b
JM
1935 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1936 continue;
ac3eeb49
MS
1937 /* Array to pointer is a `trivial conversion' according to the
1938 ARM. */
c906108c 1939
ac3eeb49
MS
1940 /* We should be doing much hairier argument matching (see
1941 section 13.2 of the ARM), but as a quick kludge, just check
1942 for the same type code. */
df407dfe 1943 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1944 return i + 1;
c906108c 1945 }
ad2f7632 1946 if (varargs || t2[i] == NULL)
c5aa993b 1947 return 0;
ad2f7632 1948 return i + 1;
c906108c
SS
1949}
1950
b1af9e97
TT
1951/* Helper class for do_search_struct_field that updates *RESULT_PTR
1952 and *LAST_BOFFSET, and possibly throws an exception if the field
1953 search has yielded ambiguous results. */
c906108c 1954
b1af9e97
TT
1955static void
1956update_search_result (struct value **result_ptr, struct value *v,
1957 int *last_boffset, int boffset,
1958 const char *name, struct type *type)
1959{
1960 if (v != NULL)
1961 {
1962 if (*result_ptr != NULL
1963 /* The result is not ambiguous if all the classes that are
1964 found occupy the same space. */
1965 && *last_boffset != boffset)
1966 error (_("base class '%s' is ambiguous in type '%s'"),
1967 name, TYPE_SAFE_NAME (type));
1968 *result_ptr = v;
1969 *last_boffset = boffset;
1970 }
1971}
c906108c 1972
b1af9e97
TT
1973/* A helper for search_struct_field. This does all the work; most
1974 arguments are as passed to search_struct_field. The result is
1975 stored in *RESULT_PTR, which must be initialized to NULL.
1976 OUTERMOST_TYPE is the type of the initial type passed to
1977 search_struct_field; this is used for error reporting when the
1978 lookup is ambiguous. */
1979
1980static void
1981do_search_struct_field (const char *name, struct value *arg1, int offset,
1982 struct type *type, int looking_for_baseclass,
1983 struct value **result_ptr,
1984 int *last_boffset,
1985 struct type *outermost_type)
c906108c
SS
1986{
1987 int i;
edf3d5f3 1988 int nbases;
c906108c
SS
1989
1990 CHECK_TYPEDEF (type);
edf3d5f3 1991 nbases = TYPE_N_BASECLASSES (type);
c906108c 1992
c5aa993b 1993 if (!looking_for_baseclass)
c906108c
SS
1994 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
1995 {
0d5cff50 1996 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 1997
db577aea 1998 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 1999 {
f23631e4 2000 struct value *v;
a109c7c1 2001
d6a843b5 2002 if (field_is_static (&TYPE_FIELD (type, i)))
2c2738a0
DC
2003 {
2004 v = value_static_field (type, i);
2005 if (v == 0)
3e43a32a
MS
2006 error (_("field %s is nonexistent or "
2007 "has been optimized out"),
2c2738a0
DC
2008 name);
2009 }
c906108c 2010 else
b1af9e97
TT
2011 v = value_primitive_field (arg1, offset, i, type);
2012 *result_ptr = v;
2013 return;
c906108c
SS
2014 }
2015
2016 if (t_field_name
2017 && (t_field_name[0] == '\0'
2018 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 2019 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
2020 {
2021 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 2022
c906108c
SS
2023 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
2024 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
2025 {
ac3eeb49
MS
2026 /* Look for a match through the fields of an anonymous
2027 union, or anonymous struct. C++ provides anonymous
2028 unions.
c906108c 2029
1b831c93
AC
2030 In the GNU Chill (now deleted from GDB)
2031 implementation of variant record types, each
2032 <alternative field> has an (anonymous) union type,
2033 each member of the union represents a <variant
2034 alternative>. Each <variant alternative> is
2035 represented as a struct, with a member for each
2036 <variant field>. */
c5aa993b 2037
b1af9e97 2038 struct value *v = NULL;
c906108c
SS
2039 int new_offset = offset;
2040
db034ac5
AC
2041 /* This is pretty gross. In G++, the offset in an
2042 anonymous union is relative to the beginning of the
1b831c93
AC
2043 enclosing struct. In the GNU Chill (now deleted
2044 from GDB) implementation of variant records, the
2045 bitpos is zero in an anonymous union field, so we
ac3eeb49 2046 have to add the offset of the union here. */
c906108c
SS
2047 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
2048 || (TYPE_NFIELDS (field_type) > 0
2049 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
2050 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
2051
b1af9e97
TT
2052 do_search_struct_field (name, arg1, new_offset,
2053 field_type,
2054 looking_for_baseclass, &v,
2055 last_boffset,
2056 outermost_type);
c906108c 2057 if (v)
b1af9e97
TT
2058 {
2059 *result_ptr = v;
2060 return;
2061 }
c906108c
SS
2062 }
2063 }
2064 }
2065
c5aa993b 2066 for (i = 0; i < nbases; i++)
c906108c 2067 {
b1af9e97 2068 struct value *v = NULL;
c906108c 2069 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
2070 /* If we are looking for baseclasses, this is what we get when
2071 we hit them. But it could happen that the base part's member
2072 name is not yet filled in. */
c906108c
SS
2073 int found_baseclass = (looking_for_baseclass
2074 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
2075 && (strcmp_iw (name,
2076 TYPE_BASECLASS_NAME (type,
2077 i)) == 0));
b1af9e97 2078 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
2079
2080 if (BASETYPE_VIA_VIRTUAL (type, i))
2081 {
3e3d7139 2082 struct value *v2;
c906108c
SS
2083
2084 boffset = baseclass_offset (type, i,
8af8e3bc
PA
2085 value_contents_for_printing (arg1),
2086 value_embedded_offset (arg1) + offset,
2087 value_address (arg1),
2088 arg1);
c906108c 2089
ac3eeb49 2090 /* The virtual base class pointer might have been clobbered
581e13c1 2091 by the user program. Make sure that it still points to a
ac3eeb49 2092 valid memory location. */
c906108c 2093
1a334831
TT
2094 boffset += value_embedded_offset (arg1) + offset;
2095 if (boffset < 0
2096 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
2097 {
2098 CORE_ADDR base_addr;
c5aa993b 2099
3e3d7139 2100 v2 = allocate_value (basetype);
42ae5230 2101 base_addr = value_address (arg1) + boffset;
ac3eeb49
MS
2102 if (target_read_memory (base_addr,
2103 value_contents_raw (v2),
c906108c 2104 TYPE_LENGTH (basetype)) != 0)
8a3fe4f8 2105 error (_("virtual baseclass botch"));
c906108c 2106 VALUE_LVAL (v2) = lval_memory;
42ae5230 2107 set_value_address (v2, base_addr);
c906108c
SS
2108 }
2109 else
2110 {
1a334831
TT
2111 v2 = value_copy (arg1);
2112 deprecated_set_value_type (v2, basetype);
2113 set_value_embedded_offset (v2, boffset);
c906108c
SS
2114 }
2115
2116 if (found_baseclass)
b1af9e97
TT
2117 v = v2;
2118 else
2119 {
2120 do_search_struct_field (name, v2, 0,
2121 TYPE_BASECLASS (type, i),
2122 looking_for_baseclass,
2123 result_ptr, last_boffset,
2124 outermost_type);
2125 }
c906108c
SS
2126 }
2127 else if (found_baseclass)
2128 v = value_primitive_field (arg1, offset, i, type);
2129 else
b1af9e97
TT
2130 {
2131 do_search_struct_field (name, arg1,
2132 offset + TYPE_BASECLASS_BITPOS (type,
2133 i) / 8,
2134 basetype, looking_for_baseclass,
2135 result_ptr, last_boffset,
2136 outermost_type);
2137 }
2138
2139 update_search_result (result_ptr, v, last_boffset,
2140 boffset, name, outermost_type);
c906108c 2141 }
b1af9e97
TT
2142}
2143
2144/* Helper function used by value_struct_elt to recurse through
2145 baseclasses. Look for a field NAME in ARG1. Adjust the address of
2146 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2147 TYPE. If found, return value, else return NULL.
2148
2149 If LOOKING_FOR_BASECLASS, then instead of looking for struct
2150 fields, look for a baseclass named NAME. */
2151
2152static struct value *
2153search_struct_field (const char *name, struct value *arg1, int offset,
2154 struct type *type, int looking_for_baseclass)
2155{
2156 struct value *result = NULL;
2157 int boffset = 0;
2158
2159 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
2160 &result, &boffset, type);
2161 return result;
c906108c
SS
2162}
2163
ac3eeb49 2164/* Helper function used by value_struct_elt to recurse through
581e13c1 2165 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
2166 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2167 TYPE.
2168
2169 If found, return value, else if name matched and args not return
2170 (value) -1, else return NULL. */
c906108c 2171
f23631e4 2172static struct value *
714f19d5 2173search_struct_method (const char *name, struct value **arg1p,
f23631e4 2174 struct value **args, int offset,
aa1ee363 2175 int *static_memfuncp, struct type *type)
c906108c
SS
2176{
2177 int i;
f23631e4 2178 struct value *v;
c906108c
SS
2179 int name_matched = 0;
2180 char dem_opname[64];
2181
2182 CHECK_TYPEDEF (type);
2183 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
2184 {
0d5cff50 2185 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2186
581e13c1 2187 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
2188 if (strncmp (t_field_name, "__", 2) == 0 ||
2189 strncmp (t_field_name, "op", 2) == 0 ||
2190 strncmp (t_field_name, "type", 4) == 0)
c906108c 2191 {
c5aa993b
JM
2192 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2193 t_field_name = dem_opname;
2194 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2195 t_field_name = dem_opname;
c906108c 2196 }
db577aea 2197 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2198 {
2199 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2200 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2201
a109c7c1 2202 name_matched = 1;
de17c821 2203 check_stub_method_group (type, i);
c906108c 2204 if (j > 0 && args == 0)
3e43a32a
MS
2205 error (_("cannot resolve overloaded method "
2206 "`%s': no arguments supplied"), name);
acf5ed49 2207 else if (j == 0 && args == 0)
c906108c 2208 {
acf5ed49
DJ
2209 v = value_fn_field (arg1p, f, j, type, offset);
2210 if (v != NULL)
2211 return v;
c906108c 2212 }
acf5ed49
DJ
2213 else
2214 while (j >= 0)
2215 {
acf5ed49 2216 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2217 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2218 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2219 TYPE_FN_FIELD_ARGS (f, j), args))
2220 {
2221 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2222 return value_virtual_fn_field (arg1p, f, j,
2223 type, offset);
2224 if (TYPE_FN_FIELD_STATIC_P (f, j)
2225 && static_memfuncp)
acf5ed49
DJ
2226 *static_memfuncp = 1;
2227 v = value_fn_field (arg1p, f, j, type, offset);
2228 if (v != NULL)
2229 return v;
2230 }
2231 j--;
2232 }
c906108c
SS
2233 }
2234 }
2235
2236 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2237 {
2238 int base_offset;
8af8e3bc
PA
2239 int skip = 0;
2240 int this_offset;
c906108c
SS
2241
2242 if (BASETYPE_VIA_VIRTUAL (type, i))
2243 {
086280be 2244 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2245 struct value *base_val;
086280be
UW
2246 const gdb_byte *base_valaddr;
2247
2248 /* The virtual base class pointer might have been
581e13c1 2249 clobbered by the user program. Make sure that it
086280be
UW
2250 still points to a valid memory location. */
2251
2252 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2253 {
6c18f3e0
SP
2254 gdb_byte *tmp;
2255 struct cleanup *back_to;
2256 CORE_ADDR address;
2257
2258 tmp = xmalloc (TYPE_LENGTH (baseclass));
2259 back_to = make_cleanup (xfree, tmp);
2260 address = value_address (*arg1p);
a109c7c1 2261
8af8e3bc 2262 if (target_read_memory (address + offset,
086280be
UW
2263 tmp, TYPE_LENGTH (baseclass)) != 0)
2264 error (_("virtual baseclass botch"));
8af8e3bc
PA
2265
2266 base_val = value_from_contents_and_address (baseclass,
2267 tmp,
2268 address + offset);
2269 base_valaddr = value_contents_for_printing (base_val);
2270 this_offset = 0;
6c18f3e0 2271 do_cleanups (back_to);
c5aa993b
JM
2272 }
2273 else
8af8e3bc
PA
2274 {
2275 base_val = *arg1p;
2276 base_valaddr = value_contents_for_printing (*arg1p);
2277 this_offset = offset;
2278 }
c5aa993b 2279
086280be 2280 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2281 this_offset, value_address (base_val),
2282 base_val);
c5aa993b 2283 }
c906108c
SS
2284 else
2285 {
2286 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2287 }
c906108c
SS
2288 v = search_struct_method (name, arg1p, args, base_offset + offset,
2289 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2290 if (v == (struct value *) - 1)
c906108c
SS
2291 {
2292 name_matched = 1;
2293 }
2294 else if (v)
2295 {
ac3eeb49
MS
2296 /* FIXME-bothner: Why is this commented out? Why is it here? */
2297 /* *arg1p = arg1_tmp; */
c906108c 2298 return v;
c5aa993b 2299 }
c906108c 2300 }
c5aa993b 2301 if (name_matched)
f23631e4 2302 return (struct value *) - 1;
c5aa993b
JM
2303 else
2304 return NULL;
c906108c
SS
2305}
2306
2307/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2308 extract the component named NAME from the ultimate target
2309 structure/union and return it as a value with its appropriate type.
c906108c
SS
2310 ERR is used in the error message if *ARGP's type is wrong.
2311
2312 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2313 an appropriate method. Also, handle derived types.
c906108c
SS
2314
2315 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2316 where the truthvalue of whether the function that was resolved was
2317 a static member function or not is stored.
2318
ac3eeb49
MS
2319 ERR is an error message to be printed in case the field is not
2320 found. */
c906108c 2321
f23631e4
AC
2322struct value *
2323value_struct_elt (struct value **argp, struct value **args,
714f19d5 2324 const char *name, int *static_memfuncp, const char *err)
c906108c 2325{
52f0bd74 2326 struct type *t;
f23631e4 2327 struct value *v;
c906108c 2328
994b9211 2329 *argp = coerce_array (*argp);
c906108c 2330
df407dfe 2331 t = check_typedef (value_type (*argp));
c906108c
SS
2332
2333 /* Follow pointers until we get to a non-pointer. */
2334
2335 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2336 {
2337 *argp = value_ind (*argp);
2338 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2339 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2340 *argp = coerce_array (*argp);
df407dfe 2341 t = check_typedef (value_type (*argp));
c906108c
SS
2342 }
2343
c5aa993b 2344 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2345 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2346 error (_("Attempt to extract a component of a value that is not a %s."),
2347 err);
c906108c
SS
2348
2349 /* Assume it's not, unless we see that it is. */
2350 if (static_memfuncp)
c5aa993b 2351 *static_memfuncp = 0;
c906108c
SS
2352
2353 if (!args)
2354 {
2355 /* if there are no arguments ...do this... */
2356
ac3eeb49
MS
2357 /* Try as a field first, because if we succeed, there is less
2358 work to be done. */
c906108c
SS
2359 v = search_struct_field (name, *argp, 0, t, 0);
2360 if (v)
2361 return v;
2362
2363 /* C++: If it was not found as a data field, then try to
7b83ea04 2364 return it as a pointer to a method. */
ac3eeb49
MS
2365 v = search_struct_method (name, argp, args, 0,
2366 static_memfuncp, t);
c906108c 2367
f23631e4 2368 if (v == (struct value *) - 1)
55b39184 2369 error (_("Cannot take address of method %s."), name);
c906108c
SS
2370 else if (v == 0)
2371 {
2372 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2373 error (_("There is no member or method named %s."), name);
c906108c 2374 else
8a3fe4f8 2375 error (_("There is no member named %s."), name);
c906108c
SS
2376 }
2377 return v;
2378 }
2379
ac3eeb49
MS
2380 v = search_struct_method (name, argp, args, 0,
2381 static_memfuncp, t);
7168a814 2382
f23631e4 2383 if (v == (struct value *) - 1)
c906108c 2384 {
3e43a32a
MS
2385 error (_("One of the arguments you tried to pass to %s could not "
2386 "be converted to what the function wants."), name);
c906108c
SS
2387 }
2388 else if (v == 0)
2389 {
ac3eeb49
MS
2390 /* See if user tried to invoke data as function. If so, hand it
2391 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2392 gdb should give an error. */
c906108c 2393 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2394 /* If we found an ordinary field, then it is not a method call.
2395 So, treat it as if it were a static member function. */
2396 if (v && static_memfuncp)
2397 *static_memfuncp = 1;
c906108c
SS
2398 }
2399
2400 if (!v)
79afc5ef
SW
2401 throw_error (NOT_FOUND_ERROR,
2402 _("Structure has no component named %s."), name);
c906108c
SS
2403 return v;
2404}
2405
ac3eeb49 2406/* Search through the methods of an object (and its bases) to find a
cfe9eade 2407 specified method. Return the pointer to the fn_field list of
ac3eeb49
MS
2408 overloaded instances.
2409
2410 Helper function for value_find_oload_list.
2411 ARGP is a pointer to a pointer to a value (the object).
2412 METHOD is a string containing the method name.
2413 OFFSET is the offset within the value.
2414 TYPE is the assumed type of the object.
2415 NUM_FNS is the number of overloaded instances.
2416 BASETYPE is set to the actual type of the subobject where the
2417 method is found.
581e13c1 2418 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2419
7a292a7a 2420static struct fn_field *
714f19d5 2421find_method_list (struct value **argp, const char *method,
ac3eeb49 2422 int offset, struct type *type, int *num_fns,
fba45db2 2423 struct type **basetype, int *boffset)
c906108c
SS
2424{
2425 int i;
c5aa993b 2426 struct fn_field *f;
c906108c
SS
2427 CHECK_TYPEDEF (type);
2428
2429 *num_fns = 0;
2430
ac3eeb49 2431 /* First check in object itself. */
c5aa993b 2432 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c906108c 2433 {
ac3eeb49 2434 /* pai: FIXME What about operators and type conversions? */
0d5cff50 2435 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2436
db577aea 2437 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
c5aa993b 2438 {
4a1970e4
DJ
2439 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2440 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
4a1970e4
DJ
2441
2442 *num_fns = len;
c5aa993b
JM
2443 *basetype = type;
2444 *boffset = offset;
4a1970e4 2445
de17c821
DJ
2446 /* Resolve any stub methods. */
2447 check_stub_method_group (type, i);
4a1970e4
DJ
2448
2449 return f;
c5aa993b
JM
2450 }
2451 }
2452
ac3eeb49 2453 /* Not found in object, check in base subobjects. */
c906108c
SS
2454 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2455 {
2456 int base_offset;
a109c7c1 2457
c906108c
SS
2458 if (BASETYPE_VIA_VIRTUAL (type, i))
2459 {
086280be 2460 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2461 value_contents_for_printing (*argp),
2462 value_offset (*argp) + offset,
2463 value_address (*argp), *argp);
c5aa993b 2464 }
ac3eeb49
MS
2465 else /* Non-virtual base, simply use bit position from debug
2466 info. */
c906108c
SS
2467 {
2468 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2469 }
c906108c 2470 f = find_method_list (argp, method, base_offset + offset,
ac3eeb49
MS
2471 TYPE_BASECLASS (type, i), num_fns,
2472 basetype, boffset);
c906108c 2473 if (f)
c5aa993b 2474 return f;
c906108c 2475 }
c5aa993b 2476 return NULL;
c906108c
SS
2477}
2478
2479/* Return the list of overloaded methods of a specified name.
ac3eeb49
MS
2480
2481 ARGP is a pointer to a pointer to a value (the object).
2482 METHOD is the method name.
2483 OFFSET is the offset within the value contents.
2484 NUM_FNS is the number of overloaded instances.
2485 BASETYPE is set to the type of the base subobject that defines the
2486 method.
581e13c1 2487 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2488
6598ed07 2489static struct fn_field *
714f19d5 2490value_find_oload_method_list (struct value **argp, const char *method,
ac3eeb49
MS
2491 int offset, int *num_fns,
2492 struct type **basetype, int *boffset)
c906108c 2493{
c5aa993b 2494 struct type *t;
c906108c 2495
df407dfe 2496 t = check_typedef (value_type (*argp));
c906108c 2497
ac3eeb49 2498 /* Code snarfed from value_struct_elt. */
c906108c
SS
2499 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2500 {
2501 *argp = value_ind (*argp);
2502 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2503 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2504 *argp = coerce_array (*argp);
df407dfe 2505 t = check_typedef (value_type (*argp));
c906108c 2506 }
c5aa993b 2507
c5aa993b
JM
2508 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2509 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2510 error (_("Attempt to extract a component of a "
2511 "value that is not a struct or union"));
c5aa993b 2512
ac3eeb49
MS
2513 return find_method_list (argp, method, 0, t, num_fns,
2514 basetype, boffset);
c906108c
SS
2515}
2516
da096638 2517/* Given an array of arguments (ARGS) (which includes an
c906108c
SS
2518 entry for "this" in the case of C++ methods), the number of
2519 arguments NARGS, the NAME of a function whether it's a method or
2520 not (METHOD), and the degree of laxness (LAX) in conforming to
2521 overload resolution rules in ANSI C++, find the best function that
2522 matches on the argument types according to the overload resolution
2523 rules.
2524
4c3376c8
SW
2525 METHOD can be one of three values:
2526 NON_METHOD for non-member functions.
2527 METHOD: for member functions.
2528 BOTH: used for overload resolution of operators where the
2529 candidates are expected to be either member or non member
581e13c1 2530 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2531 (representing 'this') is expected to be a reference to the
2532 target object, and will be dereferenced when attempting the
2533 non-member search.
2534
c906108c
SS
2535 In the case of class methods, the parameter OBJ is an object value
2536 in which to search for overloaded methods.
2537
2538 In the case of non-method functions, the parameter FSYM is a symbol
2539 corresponding to one of the overloaded functions.
2540
2541 Return value is an integer: 0 -> good match, 10 -> debugger applied
2542 non-standard coercions, 100 -> incompatible.
2543
2544 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2545 If a non-method is being searched for, SYMP will hold the symbol
2546 for it.
c906108c
SS
2547
2548 If a method is being searched for, and it is a static method,
2549 then STATICP will point to a non-zero value.
2550
7322dca9
SW
2551 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2552 ADL overload candidates when performing overload resolution for a fully
2553 qualified name.
2554
c906108c
SS
2555 Note: This function does *not* check the value of
2556 overload_resolution. Caller must check it to see whether overload
581e13c1 2557 resolution is permitted. */
c906108c
SS
2558
2559int
da096638 2560find_overload_match (struct value **args, int nargs,
4c3376c8
SW
2561 const char *name, enum oload_search_type method,
2562 int lax, struct value **objp, struct symbol *fsym,
ac3eeb49 2563 struct value **valp, struct symbol **symp,
7322dca9 2564 int *staticp, const int no_adl)
c906108c 2565{
7f8c9282 2566 struct value *obj = (objp ? *objp : NULL);
da096638 2567 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2568 /* Index of best overloaded function. */
4c3376c8
SW
2569 int func_oload_champ = -1;
2570 int method_oload_champ = -1;
2571
ac3eeb49 2572 /* The measure for the current best match. */
4c3376c8
SW
2573 struct badness_vector *method_badness = NULL;
2574 struct badness_vector *func_badness = NULL;
2575
f23631e4 2576 struct value *temp = obj;
ac3eeb49
MS
2577 /* For methods, the list of overloaded methods. */
2578 struct fn_field *fns_ptr = NULL;
2579 /* For non-methods, the list of overloaded function symbols. */
2580 struct symbol **oload_syms = NULL;
2581 /* Number of overloaded instances being considered. */
2582 int num_fns = 0;
c5aa993b 2583 struct type *basetype = NULL;
c906108c 2584 int boffset;
7322dca9
SW
2585
2586 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2587
8d577d32 2588 const char *obj_type_name = NULL;
7322dca9 2589 const char *func_name = NULL;
8d577d32 2590 enum oload_classification match_quality;
4c3376c8
SW
2591 enum oload_classification method_match_quality = INCOMPATIBLE;
2592 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2593
ac3eeb49 2594 /* Get the list of overloaded methods or functions. */
4c3376c8 2595 if (method == METHOD || method == BOTH)
c906108c 2596 {
a2ca50ae 2597 gdb_assert (obj);
94af9270
KS
2598
2599 /* OBJ may be a pointer value rather than the object itself. */
2600 obj = coerce_ref (obj);
2601 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2602 obj = coerce_ref (value_ind (obj));
df407dfe 2603 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2604
2605 /* First check whether this is a data member, e.g. a pointer to
2606 a function. */
2607 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2608 {
2609 *valp = search_struct_field (name, obj, 0,
2610 check_typedef (value_type (obj)), 0);
2611 if (*valp)
2612 {
2613 *staticp = 1;
f748fb40 2614 do_cleanups (all_cleanups);
94af9270
KS
2615 return 0;
2616 }
2617 }
c906108c 2618
4c3376c8 2619 /* Retrieve the list of methods with the name NAME. */
ac3eeb49
MS
2620 fns_ptr = value_find_oload_method_list (&temp, name,
2621 0, &num_fns,
c5aa993b 2622 &basetype, &boffset);
4c3376c8
SW
2623 /* If this is a method only search, and no methods were found
2624 the search has faild. */
2625 if (method == METHOD && (!fns_ptr || !num_fns))
8a3fe4f8 2626 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2627 obj_type_name,
2628 (obj_type_name && *obj_type_name) ? "::" : "",
2629 name);
4a1970e4 2630 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2631 been resolved by find_method_list via
2632 value_find_oload_method_list above. */
4c3376c8
SW
2633 if (fns_ptr)
2634 {
2635 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
da096638 2636 method_oload_champ = find_oload_champ (args, nargs, method,
4c3376c8
SW
2637 num_fns, fns_ptr,
2638 oload_syms, &method_badness);
2639
2640 method_match_quality =
2641 classify_oload_match (method_badness, nargs,
2642 oload_method_static (method, fns_ptr,
2643 method_oload_champ));
2644
2645 make_cleanup (xfree, method_badness);
2646 }
2647
c906108c 2648 }
4c3376c8
SW
2649
2650 if (method == NON_METHOD || method == BOTH)
c906108c 2651 {
7322dca9 2652 const char *qualified_name = NULL;
c906108c 2653
b021a221
MS
2654 /* If the overload match is being search for both as a method
2655 and non member function, the first argument must now be
2656 dereferenced. */
4c3376c8 2657 if (method == BOTH)
2b214ea6 2658 args[0] = value_ind (args[0]);
4c3376c8 2659
7322dca9
SW
2660 if (fsym)
2661 {
2662 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2663
2664 /* If we have a function with a C++ name, try to extract just
2665 the function part. Do not try this for non-functions (e.g.
2666 function pointers). */
2667 if (qualified_name
3e43a32a
MS
2668 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2669 == TYPE_CODE_FUNC)
7322dca9
SW
2670 {
2671 char *temp;
2672
2673 temp = cp_func_name (qualified_name);
2674
2675 /* If cp_func_name did not remove anything, the name of the
2676 symbol did not include scope or argument types - it was
2677 probably a C-style function. */
2678 if (temp)
2679 {
2680 make_cleanup (xfree, temp);
2681 if (strcmp (temp, qualified_name) == 0)
2682 func_name = NULL;
2683 else
2684 func_name = temp;
2685 }
2686 }
2687 }
2688 else
94af9270 2689 {
7322dca9
SW
2690 func_name = name;
2691 qualified_name = name;
94af9270 2692 }
d9639e13 2693
94af9270
KS
2694 /* If there was no C++ name, this must be a C-style function or
2695 not a function at all. Just return the same symbol. Do the
2696 same if cp_func_name fails for some reason. */
8d577d32 2697 if (func_name == NULL)
7b83ea04 2698 {
917317f4 2699 *symp = fsym;
5fe41fbf 2700 do_cleanups (all_cleanups);
7b83ea04
AC
2701 return 0;
2702 }
917317f4 2703
da096638 2704 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2705 func_name,
2706 qualified_name,
2707 &oload_syms,
2708 &func_badness,
2709 no_adl);
8d577d32 2710
4c3376c8
SW
2711 if (func_oload_champ >= 0)
2712 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2713
2714 make_cleanup (xfree, oload_syms);
2715 make_cleanup (xfree, func_badness);
8d577d32
DC
2716 }
2717
7322dca9 2718 /* Did we find a match ? */
4c3376c8 2719 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2720 throw_error (NOT_FOUND_ERROR,
2721 _("No symbol \"%s\" in current context."),
2722 name);
8d577d32 2723
4c3376c8
SW
2724 /* If we have found both a method match and a function
2725 match, find out which one is better, and calculate match
2726 quality. */
2727 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2728 {
2729 switch (compare_badness (func_badness, method_badness))
2730 {
2731 case 0: /* Top two contenders are equally good. */
b021a221
MS
2732 /* FIXME: GDB does not support the general ambiguous case.
2733 All candidates should be collected and presented the
2734 user. */
4c3376c8
SW
2735 error (_("Ambiguous overload resolution"));
2736 break;
2737 case 1: /* Incomparable top contenders. */
2738 /* This is an error incompatible candidates
2739 should not have been proposed. */
3e43a32a
MS
2740 error (_("Internal error: incompatible "
2741 "overload candidates proposed"));
4c3376c8
SW
2742 break;
2743 case 2: /* Function champion. */
2744 method_oload_champ = -1;
2745 match_quality = func_match_quality;
2746 break;
2747 case 3: /* Method champion. */
2748 func_oload_champ = -1;
2749 match_quality = method_match_quality;
2750 break;
2751 default:
2752 error (_("Internal error: unexpected overload comparison result"));
2753 break;
2754 }
2755 }
2756 else
2757 {
2758 /* We have either a method match or a function match. */
2759 if (method_oload_champ >= 0)
2760 match_quality = method_match_quality;
2761 else
2762 match_quality = func_match_quality;
2763 }
8d577d32
DC
2764
2765 if (match_quality == INCOMPATIBLE)
2766 {
4c3376c8 2767 if (method == METHOD)
8a3fe4f8 2768 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2769 obj_type_name,
2770 (obj_type_name && *obj_type_name) ? "::" : "",
2771 name);
2772 else
8a3fe4f8 2773 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2774 func_name);
2775 }
2776 else if (match_quality == NON_STANDARD)
2777 {
4c3376c8 2778 if (method == METHOD)
3e43a32a
MS
2779 warning (_("Using non-standard conversion to match "
2780 "method %s%s%s to supplied arguments"),
8d577d32
DC
2781 obj_type_name,
2782 (obj_type_name && *obj_type_name) ? "::" : "",
2783 name);
2784 else
3e43a32a
MS
2785 warning (_("Using non-standard conversion to match "
2786 "function %s to supplied arguments"),
8d577d32
DC
2787 func_name);
2788 }
2789
4c3376c8
SW
2790 if (staticp != NULL)
2791 *staticp = oload_method_static (method, fns_ptr, method_oload_champ);
2792
2793 if (method_oload_champ >= 0)
8d577d32 2794 {
4c3376c8
SW
2795 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2796 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2797 basetype, boffset);
8d577d32 2798 else
4c3376c8 2799 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2800 basetype, boffset);
8d577d32
DC
2801 }
2802 else
4c3376c8 2803 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2804
2805 if (objp)
2806 {
a4295225 2807 struct type *temp_type = check_typedef (value_type (temp));
da096638 2808 struct type *objtype = check_typedef (obj_type);
a109c7c1 2809
a4295225 2810 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2811 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2812 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2813 {
2814 temp = value_addr (temp);
2815 }
2816 *objp = temp;
2817 }
7322dca9
SW
2818
2819 do_cleanups (all_cleanups);
8d577d32
DC
2820
2821 switch (match_quality)
2822 {
2823 case INCOMPATIBLE:
2824 return 100;
2825 case NON_STANDARD:
2826 return 10;
2827 default: /* STANDARD */
2828 return 0;
2829 }
2830}
2831
2832/* Find the best overload match, searching for FUNC_NAME in namespaces
2833 contained in QUALIFIED_NAME until it either finds a good match or
2834 runs out of namespaces. It stores the overloaded functions in
2835 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2836 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2837 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2838 performned. */
8d577d32
DC
2839
2840static int
da096638 2841find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2842 const char *func_name,
2843 const char *qualified_name,
2844 struct symbol ***oload_syms,
7322dca9
SW
2845 struct badness_vector **oload_champ_bv,
2846 const int no_adl)
8d577d32
DC
2847{
2848 int oload_champ;
2849
da096638 2850 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2851 func_name,
2852 qualified_name, 0,
2853 oload_syms, oload_champ_bv,
7322dca9
SW
2854 &oload_champ,
2855 no_adl);
8d577d32
DC
2856
2857 return oload_champ;
2858}
2859
2860/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2861 how deep we've looked for namespaces, and the champ is stored in
2862 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2863 if it isn't. Other arguments are the same as in
2864 find_oload_champ_namespace
8d577d32
DC
2865
2866 It is the caller's responsibility to free *OLOAD_SYMS and
2867 *OLOAD_CHAMP_BV. */
2868
2869static int
da096638 2870find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2871 const char *func_name,
2872 const char *qualified_name,
2873 int namespace_len,
2874 struct symbol ***oload_syms,
2875 struct badness_vector **oload_champ_bv,
7322dca9
SW
2876 int *oload_champ,
2877 const int no_adl)
8d577d32
DC
2878{
2879 int next_namespace_len = namespace_len;
2880 int searched_deeper = 0;
2881 int num_fns = 0;
2882 struct cleanup *old_cleanups;
2883 int new_oload_champ;
2884 struct symbol **new_oload_syms;
2885 struct badness_vector *new_oload_champ_bv;
2886 char *new_namespace;
2887
2888 if (next_namespace_len != 0)
2889 {
2890 gdb_assert (qualified_name[next_namespace_len] == ':');
2891 next_namespace_len += 2;
c906108c 2892 }
ac3eeb49
MS
2893 next_namespace_len +=
2894 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2895
2896 /* Initialize these to values that can safely be xfree'd. */
2897 *oload_syms = NULL;
2898 *oload_champ_bv = NULL;
c5aa993b 2899
581e13c1 2900 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2901 If we get a good match there, use it. */
8d577d32
DC
2902
2903 if (qualified_name[next_namespace_len] == ':')
2904 {
2905 searched_deeper = 1;
2906
da096638 2907 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2908 func_name, qualified_name,
2909 next_namespace_len,
2910 oload_syms, oload_champ_bv,
7322dca9 2911 oload_champ, no_adl))
8d577d32
DC
2912 {
2913 return 1;
2914 }
2915 };
2916
2917 /* If we reach here, either we're in the deepest namespace or we
2918 didn't find a good match in a deeper namespace. But, in the
2919 latter case, we still have a bad match in a deeper namespace;
2920 note that we might not find any match at all in the current
2921 namespace. (There's always a match in the deepest namespace,
2922 because this overload mechanism only gets called if there's a
2923 function symbol to start off with.) */
2924
2925 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2926 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2927 new_namespace = alloca (namespace_len + 1);
2928 strncpy (new_namespace, qualified_name, namespace_len);
2929 new_namespace[namespace_len] = '\0';
2930 new_oload_syms = make_symbol_overload_list (func_name,
2931 new_namespace);
7322dca9
SW
2932
2933 /* If we have reached the deepest level perform argument
2934 determined lookup. */
2935 if (!searched_deeper && !no_adl)
da096638
KS
2936 {
2937 int ix;
2938 struct type **arg_types;
2939
2940 /* Prepare list of argument types for overload resolution. */
2941 arg_types = (struct type **)
2942 alloca (nargs * (sizeof (struct type *)));
2943 for (ix = 0; ix < nargs; ix++)
2944 arg_types[ix] = value_type (args[ix]);
2945 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2946 }
7322dca9 2947
8d577d32
DC
2948 while (new_oload_syms[num_fns])
2949 ++num_fns;
2950
da096638 2951 new_oload_champ = find_oload_champ (args, nargs, 0, num_fns,
8d577d32
DC
2952 NULL, new_oload_syms,
2953 &new_oload_champ_bv);
2954
2955 /* Case 1: We found a good match. Free earlier matches (if any),
2956 and return it. Case 2: We didn't find a good match, but we're
2957 not the deepest function. Then go with the bad match that the
2958 deeper function found. Case 3: We found a bad match, and we're
2959 the deepest function. Then return what we found, even though
2960 it's a bad match. */
2961
2962 if (new_oload_champ != -1
2963 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2964 {
2965 *oload_syms = new_oload_syms;
2966 *oload_champ = new_oload_champ;
2967 *oload_champ_bv = new_oload_champ_bv;
2968 do_cleanups (old_cleanups);
2969 return 1;
2970 }
2971 else if (searched_deeper)
2972 {
2973 xfree (new_oload_syms);
2974 xfree (new_oload_champ_bv);
2975 discard_cleanups (old_cleanups);
2976 return 0;
2977 }
2978 else
2979 {
8d577d32
DC
2980 *oload_syms = new_oload_syms;
2981 *oload_champ = new_oload_champ;
2982 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2983 do_cleanups (old_cleanups);
8d577d32
DC
2984 return 0;
2985 }
2986}
2987
da096638 2988/* Look for a function to take NARGS args of ARGS. Find
8d577d32
DC
2989 the best match from among the overloaded methods or functions
2990 (depending on METHOD) given by FNS_PTR or OLOAD_SYMS, respectively.
2991 The number of methods/functions in the list is given by NUM_FNS.
2992 Return the index of the best match; store an indication of the
2993 quality of the match in OLOAD_CHAMP_BV.
2994
2995 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
2996
2997static int
da096638 2998find_oload_champ (struct value **args, int nargs, int method,
8d577d32
DC
2999 int num_fns, struct fn_field *fns_ptr,
3000 struct symbol **oload_syms,
3001 struct badness_vector **oload_champ_bv)
3002{
3003 int ix;
ac3eeb49
MS
3004 /* A measure of how good an overloaded instance is. */
3005 struct badness_vector *bv;
3006 /* Index of best overloaded function. */
3007 int oload_champ = -1;
3008 /* Current ambiguity state for overload resolution. */
3009 int oload_ambiguous = 0;
3010 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32
DC
3011
3012 *oload_champ_bv = NULL;
c906108c 3013
ac3eeb49 3014 /* Consider each candidate in turn. */
c906108c
SS
3015 for (ix = 0; ix < num_fns; ix++)
3016 {
8d577d32
DC
3017 int jj;
3018 int static_offset = oload_method_static (method, fns_ptr, ix);
3019 int nparms;
3020 struct type **parm_types;
3021
db577aea
AC
3022 if (method)
3023 {
ad2f7632 3024 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
db577aea
AC
3025 }
3026 else
3027 {
ac3eeb49
MS
3028 /* If it's not a method, this is the proper place. */
3029 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
db577aea 3030 }
c906108c 3031
ac3eeb49
MS
3032 /* Prepare array of parameter types. */
3033 parm_types = (struct type **)
3034 xmalloc (nparms * (sizeof (struct type *)));
c906108c 3035 for (jj = 0; jj < nparms; jj++)
db577aea 3036 parm_types[jj] = (method
ad2f7632 3037 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
ac3eeb49
MS
3038 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
3039 jj));
c906108c 3040
ac3eeb49
MS
3041 /* Compare parameter types to supplied argument types. Skip
3042 THIS for static methods. */
3043 bv = rank_function (parm_types, nparms,
da096638 3044 args + static_offset,
4a1970e4 3045 nargs - static_offset);
c5aa993b 3046
8d577d32 3047 if (!*oload_champ_bv)
c5aa993b 3048 {
8d577d32 3049 *oload_champ_bv = bv;
c5aa993b 3050 oload_champ = 0;
c5aa993b 3051 }
ac3eeb49
MS
3052 else /* See whether current candidate is better or worse than
3053 previous best. */
8d577d32 3054 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3055 {
ac3eeb49
MS
3056 case 0: /* Top two contenders are equally good. */
3057 oload_ambiguous = 1;
c5aa993b 3058 break;
ac3eeb49
MS
3059 case 1: /* Incomparable top contenders. */
3060 oload_ambiguous = 2;
c5aa993b 3061 break;
ac3eeb49
MS
3062 case 2: /* New champion, record details. */
3063 *oload_champ_bv = bv;
c5aa993b
JM
3064 oload_ambiguous = 0;
3065 oload_champ = ix;
c5aa993b
JM
3066 break;
3067 case 3:
3068 default:
3069 break;
3070 }
b8c9b27d 3071 xfree (parm_types);
6b1ba9a0
ND
3072 if (overload_debug)
3073 {
3074 if (method)
ac3eeb49 3075 fprintf_filtered (gdb_stderr,
3e43a32a 3076 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3077 fns_ptr[ix].physname, nparms);
6b1ba9a0 3078 else
ac3eeb49 3079 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3080 "Overloaded function instance "
3081 "%s # of parms %d\n",
ac3eeb49
MS
3082 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3083 nparms);
4a1970e4 3084 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3085 fprintf_filtered (gdb_stderr,
3086 "...Badness @ %d : %d\n",
6403aeea 3087 jj, bv->rank[jj].rank);
3e43a32a
MS
3088 fprintf_filtered (gdb_stderr, "Overload resolution "
3089 "champion is %d, ambiguous? %d\n",
ac3eeb49 3090 oload_champ, oload_ambiguous);
6b1ba9a0 3091 }
c906108c
SS
3092 }
3093
8d577d32
DC
3094 return oload_champ;
3095}
6b1ba9a0 3096
8d577d32
DC
3097/* Return 1 if we're looking at a static method, 0 if we're looking at
3098 a non-static method or a function that isn't a method. */
c906108c 3099
8d577d32
DC
3100static int
3101oload_method_static (int method, struct fn_field *fns_ptr, int index)
3102{
4c3376c8
SW
3103 if (method && fns_ptr && index >= 0
3104 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3105 return 1;
c906108c 3106 else
8d577d32
DC
3107 return 0;
3108}
c906108c 3109
8d577d32
DC
3110/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3111
3112static enum oload_classification
3113classify_oload_match (struct badness_vector *oload_champ_bv,
3114 int nargs,
3115 int static_offset)
3116{
3117 int ix;
da096638 3118 enum oload_classification worst = STANDARD;
8d577d32
DC
3119
3120 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3121 {
6403aeea
SW
3122 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3123 or worse return INCOMPATIBLE. */
3124 if (compare_ranks (oload_champ_bv->rank[ix],
3125 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3126 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3127 /* Otherwise If this conversion is as bad as
3128 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3129 else if (compare_ranks (oload_champ_bv->rank[ix],
3130 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3131 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3132 needed. */
7f8c9282 3133 }
02f0d45d 3134
da096638
KS
3135 /* If no INCOMPATIBLE classification was found, return the worst one
3136 that was found (if any). */
3137 return worst;
c906108c
SS
3138}
3139
ac3eeb49
MS
3140/* C++: return 1 is NAME is a legitimate name for the destructor of
3141 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3142 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3143 have CHECK_TYPEDEF applied, this function will apply it itself. */
3144
c906108c 3145int
d8228535 3146destructor_name_p (const char *name, struct type *type)
c906108c 3147{
c906108c
SS
3148 if (name[0] == '~')
3149 {
d8228535
JK
3150 const char *dname = type_name_no_tag_or_error (type);
3151 const char *cp = strchr (dname, '<');
c906108c
SS
3152 unsigned int len;
3153
3154 /* Do not compare the template part for template classes. */
3155 if (cp == NULL)
3156 len = strlen (dname);
3157 else
3158 len = cp - dname;
bf896cb0 3159 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3160 error (_("name of destructor must equal name of class"));
c906108c
SS
3161 else
3162 return 1;
3163 }
3164 return 0;
3165}
3166
79c2c32d 3167/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3168 return the appropriate member (or the address of the member, if
3169 WANT_ADDRESS). This function is used to resolve user expressions
3170 of the form "DOMAIN::NAME". For more details on what happens, see
3171 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3172
3173struct value *
072bba3b
KS
3174value_aggregate_elt (struct type *curtype, char *name,
3175 struct type *expect_type, int want_address,
79c2c32d
DC
3176 enum noside noside)
3177{
3178 switch (TYPE_CODE (curtype))
3179 {
3180 case TYPE_CODE_STRUCT:
3181 case TYPE_CODE_UNION:
ac3eeb49 3182 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3183 name, expect_type,
0d5de010 3184 want_address, noside);
79c2c32d 3185 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3186 return value_namespace_elt (curtype, name,
3187 want_address, noside);
79c2c32d
DC
3188 default:
3189 internal_error (__FILE__, __LINE__,
e2e0b3e5 3190 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3191 }
3192}
3193
072bba3b 3194/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3195 with respect to the methods' parameters. If the types of the
072bba3b
KS
3196 two parameter lists are the same, returns 1; 0 otherwise. This
3197 comparison may ignore any artificial parameters in T1 if
3198 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3199 the first artificial parameter in T1, assumed to be a 'this' pointer.
3200
3201 The type T2 is expected to have come from make_params (in eval.c). */
3202
3203static int
3204compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3205{
3206 int start = 0;
3207
80b23b6a 3208 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3209 ++start;
3210
3211 /* If skipping artificial fields, find the first real field
581e13c1 3212 in T1. */
072bba3b
KS
3213 if (skip_artificial)
3214 {
3215 while (start < TYPE_NFIELDS (t1)
3216 && TYPE_FIELD_ARTIFICIAL (t1, start))
3217 ++start;
3218 }
3219
581e13c1 3220 /* Now compare parameters. */
072bba3b
KS
3221
3222 /* Special case: a method taking void. T1 will contain no
3223 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3224 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3225 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3226 return 1;
3227
3228 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3229 {
3230 int i;
a109c7c1 3231
072bba3b
KS
3232 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3233 {
6403aeea 3234 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3235 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3236 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3237 return 0;
3238 }
3239
3240 return 1;
3241 }
3242
3243 return 0;
3244}
3245
c906108c 3246/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3247 return the address of this member as a "pointer to member" type.
3248 If INTYPE is non-null, then it will be the type of the member we
3249 are looking for. This will help us resolve "pointers to member
3250 functions". This function is used to resolve user expressions of
3251 the form "DOMAIN::NAME". */
c906108c 3252
63d06c5c 3253static struct value *
fba45db2
KB
3254value_struct_elt_for_reference (struct type *domain, int offset,
3255 struct type *curtype, char *name,
ac3eeb49
MS
3256 struct type *intype,
3257 int want_address,
63d06c5c 3258 enum noside noside)
c906108c 3259{
52f0bd74
AC
3260 struct type *t = curtype;
3261 int i;
0d5de010 3262 struct value *v, *result;
c906108c 3263
c5aa993b 3264 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3265 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3266 error (_("Internal error: non-aggregate type "
3267 "to value_struct_elt_for_reference"));
c906108c
SS
3268
3269 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3270 {
0d5cff50 3271 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3272
6314a349 3273 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3274 {
d6a843b5 3275 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3276 {
3277 v = value_static_field (t, i);
3278 if (v == NULL)
8a3fe4f8 3279 error (_("static field %s has been optimized out"),
c906108c 3280 name);
0d5de010
DJ
3281 if (want_address)
3282 v = value_addr (v);
c906108c
SS
3283 return v;
3284 }
3285 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3286 error (_("pointers to bitfield members not allowed"));
c5aa993b 3287
0d5de010
DJ
3288 if (want_address)
3289 return value_from_longest
3290 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3291 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
3292 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3293 return allocate_value (TYPE_FIELD_TYPE (t, i));
3294 else
3295 error (_("Cannot reference non-static field \"%s\""), name);
c906108c
SS
3296 }
3297 }
3298
ac3eeb49
MS
3299 /* C++: If it was not found as a data field, then try to return it
3300 as a pointer to a method. */
c906108c 3301
c906108c
SS
3302 /* Perform all necessary dereferencing. */
3303 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3304 intype = TYPE_TARGET_TYPE (intype);
3305
3306 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3307 {
0d5cff50 3308 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3309 char dem_opname[64];
3310
ac3eeb49
MS
3311 if (strncmp (t_field_name, "__", 2) == 0
3312 || strncmp (t_field_name, "op", 2) == 0
3313 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3314 {
ac3eeb49
MS
3315 if (cplus_demangle_opname (t_field_name,
3316 dem_opname, DMGL_ANSI))
c5aa993b 3317 t_field_name = dem_opname;
ac3eeb49
MS
3318 else if (cplus_demangle_opname (t_field_name,
3319 dem_opname, 0))
c906108c 3320 t_field_name = dem_opname;
c906108c 3321 }
6314a349 3322 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3323 {
072bba3b
KS
3324 int j;
3325 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3326 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3327
de17c821
DJ
3328 check_stub_method_group (t, i);
3329
c906108c
SS
3330 if (intype)
3331 {
072bba3b
KS
3332 for (j = 0; j < len; ++j)
3333 {
3334 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3335 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3336 intype, 1))
072bba3b
KS
3337 break;
3338 }
3339
3340 if (j == len)
3e43a32a
MS
3341 error (_("no member function matches "
3342 "that type instantiation"));
7f79b1c5 3343 }
c906108c 3344 else
072bba3b
KS
3345 {
3346 int ii;
7f79b1c5
DJ
3347
3348 j = -1;
53832f31 3349 for (ii = 0; ii < len; ++ii)
072bba3b 3350 {
7f79b1c5
DJ
3351 /* Skip artificial methods. This is necessary if,
3352 for example, the user wants to "print
3353 subclass::subclass" with only one user-defined
53832f31
TT
3354 constructor. There is no ambiguity in this case.
3355 We are careful here to allow artificial methods
3356 if they are the unique result. */
072bba3b 3357 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3358 {
3359 if (j == -1)
3360 j = ii;
3361 continue;
3362 }
072bba3b 3363
7f79b1c5
DJ
3364 /* Desired method is ambiguous if more than one
3365 method is defined. */
53832f31 3366 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3367 error (_("non-unique member `%s' requires "
3368 "type instantiation"), name);
072bba3b 3369
7f79b1c5
DJ
3370 j = ii;
3371 }
53832f31
TT
3372
3373 if (j == -1)
3374 error (_("no matching member function"));
072bba3b 3375 }
c5aa993b 3376
0d5de010
DJ
3377 if (TYPE_FN_FIELD_STATIC_P (f, j))
3378 {
ac3eeb49
MS
3379 struct symbol *s =
3380 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3381 0, VAR_DOMAIN, 0);
a109c7c1 3382
0d5de010
DJ
3383 if (s == NULL)
3384 return NULL;
3385
3386 if (want_address)
3387 return value_addr (read_var_value (s, 0));
3388 else
3389 return read_var_value (s, 0);
3390 }
3391
c906108c
SS
3392 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3393 {
0d5de010
DJ
3394 if (want_address)
3395 {
3396 result = allocate_value
3397 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3398 cplus_make_method_ptr (value_type (result),
3399 value_contents_writeable (result),
0d5de010
DJ
3400 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3401 }
3402 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3403 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3404 else
3405 error (_("Cannot reference virtual member function \"%s\""),
3406 name);
c906108c
SS
3407 }
3408 else
3409 {
ac3eeb49
MS
3410 struct symbol *s =
3411 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3412 0, VAR_DOMAIN, 0);
a109c7c1 3413
c906108c 3414 if (s == NULL)
0d5de010
DJ
3415 return NULL;
3416
3417 v = read_var_value (s, 0);
3418 if (!want_address)
3419 result = v;
c906108c
SS
3420 else
3421 {
0d5de010 3422 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3423 cplus_make_method_ptr (value_type (result),
3424 value_contents_writeable (result),
42ae5230 3425 value_address (v), 0);
c906108c 3426 }
c906108c 3427 }
0d5de010 3428 return result;
c906108c
SS
3429 }
3430 }
3431 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3432 {
f23631e4 3433 struct value *v;
c906108c
SS
3434 int base_offset;
3435
3436 if (BASETYPE_VIA_VIRTUAL (t, i))
3437 base_offset = 0;
3438 else
3439 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3440 v = value_struct_elt_for_reference (domain,
3441 offset + base_offset,
3442 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3443 name, intype,
3444 want_address, noside);
c906108c
SS
3445 if (v)
3446 return v;
3447 }
63d06c5c
DC
3448
3449 /* As a last chance, pretend that CURTYPE is a namespace, and look
3450 it up that way; this (frequently) works for types nested inside
3451 classes. */
3452
ac3eeb49
MS
3453 return value_maybe_namespace_elt (curtype, name,
3454 want_address, noside);
c906108c
SS
3455}
3456
79c2c32d
DC
3457/* C++: Return the member NAME of the namespace given by the type
3458 CURTYPE. */
3459
3460static struct value *
3461value_namespace_elt (const struct type *curtype,
0d5de010 3462 char *name, int want_address,
79c2c32d 3463 enum noside noside)
63d06c5c
DC
3464{
3465 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3466 want_address,
3467 noside);
63d06c5c
DC
3468
3469 if (retval == NULL)
ac3eeb49
MS
3470 error (_("No symbol \"%s\" in namespace \"%s\"."),
3471 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3472
3473 return retval;
3474}
3475
3476/* A helper function used by value_namespace_elt and
3477 value_struct_elt_for_reference. It looks up NAME inside the
3478 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3479 is a class and NAME refers to a type in CURTYPE itself (as opposed
3480 to, say, some base class of CURTYPE). */
3481
3482static struct value *
3483value_maybe_namespace_elt (const struct type *curtype,
0d5de010 3484 char *name, int want_address,
63d06c5c 3485 enum noside noside)
79c2c32d
DC
3486{
3487 const char *namespace_name = TYPE_TAG_NAME (curtype);
3488 struct symbol *sym;
0d5de010 3489 struct value *result;
79c2c32d 3490
13387711 3491 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3492 get_selected_block (0), VAR_DOMAIN);
3493
3494 if (sym == NULL)
3495 {
3496 char *concatenated_name = alloca (strlen (namespace_name) + 2
3497 + strlen (name) + 1);
3498
3499 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3500 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3501 }
79c2c32d
DC
3502
3503 if (sym == NULL)
63d06c5c 3504 return NULL;
79c2c32d
DC
3505 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3506 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3507 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3508 else
0d5de010
DJ
3509 result = value_of_variable (sym, get_selected_block (0));
3510
3511 if (result && want_address)
3512 result = value_addr (result);
3513
3514 return result;
79c2c32d
DC
3515}
3516
dfcee124 3517/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3518
c906108c 3519 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3520 and refer to the values computed for the object pointed to. */
c906108c
SS
3521
3522struct type *
dfcee124
AG
3523value_rtti_indirect_type (struct value *v, int *full,
3524 int *top, int *using_enc)
c906108c 3525{
f23631e4 3526 struct value *target;
dfcee124
AG
3527 struct type *type, *real_type, *target_type;
3528
3529 type = value_type (v);
3530 type = check_typedef (type);
3531 if (TYPE_CODE (type) == TYPE_CODE_REF)
3532 target = coerce_ref (v);
3533 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3534 target = value_ind (v);
3535 else
3536 return NULL;
c906108c 3537
dfcee124
AG
3538 real_type = value_rtti_type (target, full, top, using_enc);
3539
3540 if (real_type)
3541 {
3542 /* Copy qualifiers to the referenced object. */
3543 target_type = value_type (target);
3544 real_type = make_cv_type (TYPE_CONST (target_type),
3545 TYPE_VOLATILE (target_type), real_type, NULL);
3546 if (TYPE_CODE (type) == TYPE_CODE_REF)
3547 real_type = lookup_reference_type (real_type);
3548 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3549 real_type = lookup_pointer_type (real_type);
3550 else
3551 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3552
3553 /* Copy qualifiers to the pointer/reference. */
3554 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3555 real_type, NULL);
3556 }
c906108c 3557
dfcee124 3558 return real_type;
c906108c
SS
3559}
3560
3561/* Given a value pointed to by ARGP, check its real run-time type, and
3562 if that is different from the enclosing type, create a new value
3563 using the real run-time type as the enclosing type (and of the same
3564 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3565 be the correct offset to the enclosed object. RTYPE is the type,
3566 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3567 by value_rtti_type(). If these are available, they can be supplied
3568 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3569 NULL if they're not available. */
c906108c 3570
f23631e4 3571struct value *
ac3eeb49
MS
3572value_full_object (struct value *argp,
3573 struct type *rtype,
3574 int xfull, int xtop,
fba45db2 3575 int xusing_enc)
c906108c 3576{
c5aa993b 3577 struct type *real_type;
c906108c
SS
3578 int full = 0;
3579 int top = -1;
3580 int using_enc = 0;
f23631e4 3581 struct value *new_val;
c906108c
SS
3582
3583 if (rtype)
3584 {
3585 real_type = rtype;
3586 full = xfull;
3587 top = xtop;
3588 using_enc = xusing_enc;
3589 }
3590 else
3591 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3592
ac3eeb49 3593 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3594 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3595 return argp;
3596
a7860e76
TT
3597 /* In a destructor we might see a real type that is a superclass of
3598 the object's type. In this case it is better to leave the object
3599 as-is. */
3600 if (full
3601 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3602 return argp;
3603
c906108c 3604 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3605 type is wrong, set it. */
3606 /* pai: FIXME -- sounds iffy */
c906108c
SS
3607 if (full)
3608 {
4dfea560
DE
3609 argp = value_copy (argp);
3610 set_value_enclosing_type (argp, real_type);
c906108c
SS
3611 return argp;
3612 }
3613
581e13c1 3614 /* Check if object is in memory. */
c906108c
SS
3615 if (VALUE_LVAL (argp) != lval_memory)
3616 {
3e43a32a
MS
3617 warning (_("Couldn't retrieve complete object of RTTI "
3618 "type %s; object may be in register(s)."),
ac3eeb49 3619 TYPE_NAME (real_type));
c5aa993b 3620
c906108c
SS
3621 return argp;
3622 }
c5aa993b 3623
ac3eeb49
MS
3624 /* All other cases -- retrieve the complete object. */
3625 /* Go back by the computed top_offset from the beginning of the
3626 object, adjusting for the embedded offset of argp if that's what
3627 value_rtti_type used for its computation. */
42ae5230 3628 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3629 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3630 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3631 set_value_embedded_offset (new_val, (using_enc
3632 ? top + value_embedded_offset (argp)
3633 : top));
c906108c
SS
3634 return new_val;
3635}
3636
389e51db 3637
85bc8cb7
JK
3638/* Return the value of the local variable, if one exists. Throw error
3639 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3640
f23631e4 3641struct value *
85bc8cb7 3642value_of_this (const struct language_defn *lang)
c906108c 3643{
66a17cb6 3644 struct symbol *sym;
c906108c 3645 struct block *b;
206415a3 3646 struct frame_info *frame;
c906108c 3647
66a17cb6 3648 if (!lang->la_name_of_this)
85bc8cb7 3649 error (_("no `this' in current language"));
aee28ec6 3650
85bc8cb7 3651 frame = get_selected_frame (_("no frame selected"));
c906108c 3652
66a17cb6 3653 b = get_frame_block (frame, NULL);
c906108c 3654
66a17cb6 3655 sym = lookup_language_this (lang, b);
c906108c 3656 if (sym == NULL)
85bc8cb7
JK
3657 error (_("current stack frame does not contain a variable named `%s'"),
3658 lang->la_name_of_this);
3659
3660 return read_var_value (sym, frame);
3661}
3662
3663/* Return the value of the local variable, if one exists. Return NULL
3664 otherwise. Never throw error. */
3665
3666struct value *
3667value_of_this_silent (const struct language_defn *lang)
3668{
3669 struct value *ret = NULL;
3670 volatile struct gdb_exception except;
3671
3672 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3673 {
85bc8cb7 3674 ret = value_of_this (lang);
c906108c
SS
3675 }
3676
d069f99d
AF
3677 return ret;
3678}
3679
ac3eeb49
MS
3680/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3681 elements long, starting at LOWBOUND. The result has the same lower
3682 bound as the original ARRAY. */
c906108c 3683
f23631e4
AC
3684struct value *
3685value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3686{
3687 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3688 LONGEST lowerbound, upperbound;
f23631e4 3689 struct value *slice;
c906108c 3690 struct type *array_type;
ac3eeb49 3691
df407dfe 3692 array_type = check_typedef (value_type (array));
c906108c 3693 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3694 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3695 error (_("cannot take slice of non-array"));
ac3eeb49 3696
c906108c
SS
3697 range_type = TYPE_INDEX_TYPE (array_type);
3698 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3699 error (_("slice from bad array or bitstring"));
ac3eeb49 3700
c906108c 3701 if (lowbound < lowerbound || length < 0
db034ac5 3702 || lowbound + length - 1 > upperbound)
8a3fe4f8 3703 error (_("slice out of range"));
ac3eeb49 3704
c906108c
SS
3705 /* FIXME-type-allocation: need a way to free this type when we are
3706 done with it. */
c5aa993b 3707 slice_range_type = create_range_type ((struct type *) NULL,
c906108c 3708 TYPE_TARGET_TYPE (range_type),
ac3eeb49
MS
3709 lowbound,
3710 lowbound + length - 1);
ac3eeb49 3711
c906108c
SS
3712 {
3713 struct type *element_type = TYPE_TARGET_TYPE (array_type);
ac3eeb49
MS
3714 LONGEST offset =
3715 (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
3716
3717 slice_type = create_array_type ((struct type *) NULL,
3718 element_type,
c906108c
SS
3719 slice_range_type);
3720 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3721
9214ee5f 3722 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3e3d7139 3723 slice = allocate_value_lazy (slice_type);
c906108c 3724 else
3e3d7139
JG
3725 {
3726 slice = allocate_value (slice_type);
39d37385
PA
3727 value_contents_copy (slice, 0, array, offset,
3728 TYPE_LENGTH (slice_type));
3e3d7139 3729 }
ac3eeb49 3730
74bcbdf3 3731 set_value_component_location (slice, array);
65d3800a 3732 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
f5cf64a7 3733 set_value_offset (slice, value_offset (array) + offset);
c906108c
SS
3734 }
3735 return slice;
3736}
3737
ac3eeb49
MS
3738/* Create a value for a FORTRAN complex number. Currently most of the
3739 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3740 composed of 2 doubles. This really should be a smarter routine
3741 that figures out precision inteligently as opposed to assuming
ac3eeb49 3742 doubles. FIXME: fmb */
c906108c 3743
f23631e4 3744struct value *
ac3eeb49
MS
3745value_literal_complex (struct value *arg1,
3746 struct value *arg2,
3747 struct type *type)
c906108c 3748{
f23631e4 3749 struct value *val;
c906108c
SS
3750 struct type *real_type = TYPE_TARGET_TYPE (type);
3751
3752 val = allocate_value (type);
3753 arg1 = value_cast (real_type, arg1);
3754 arg2 = value_cast (real_type, arg2);
3755
990a07ab 3756 memcpy (value_contents_raw (val),
0fd88904 3757 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3758 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3759 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3760 return val;
3761}
3762
ac3eeb49 3763/* Cast a value into the appropriate complex data type. */
c906108c 3764
f23631e4
AC
3765static struct value *
3766cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3767{
3768 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3769
df407dfe 3770 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3771 {
df407dfe 3772 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3773 struct value *re_val = allocate_value (val_real_type);
3774 struct value *im_val = allocate_value (val_real_type);
c906108c 3775
990a07ab 3776 memcpy (value_contents_raw (re_val),
0fd88904 3777 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3778 memcpy (value_contents_raw (im_val),
0fd88904 3779 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3780 TYPE_LENGTH (val_real_type));
c906108c
SS
3781
3782 return value_literal_complex (re_val, im_val, type);
3783 }
df407dfe
AC
3784 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3785 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3786 return value_literal_complex (val,
3787 value_zero (real_type, not_lval),
3788 type);
c906108c 3789 else
8a3fe4f8 3790 error (_("cannot cast non-number to complex"));
c906108c
SS
3791}
3792
3793void
fba45db2 3794_initialize_valops (void)
c906108c 3795{
5bf193a2
AC
3796 add_setshow_boolean_cmd ("overload-resolution", class_support,
3797 &overload_resolution, _("\
3798Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3799Show overload resolution in evaluating C++ functions."),
3800 NULL, NULL,
920d2a44 3801 show_overload_resolution,
5bf193a2 3802 &setlist, &showlist);
c906108c 3803 overload_resolution = 1;
c906108c 3804}