]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/valops.c
Update years in copyright notice for the GDB files.
[thirdparty/binutils-gdb.git] / gdb / valops.c
CommitLineData
c906108c 1/* Perform non-arithmetic operations on values, for GDB.
990a07ab 2
8acc9f48 3 Copyright (C) 1986-2013 Free Software Foundation, Inc.
c906108c 4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
a9762ec7 9 the Free Software Foundation; either version 3 of the License, or
c5aa993b 10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b 17 You should have received a copy of the GNU General Public License
a9762ec7 18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
19
20#include "defs.h"
21#include "symtab.h"
22#include "gdbtypes.h"
23#include "value.h"
24#include "frame.h"
25#include "inferior.h"
26#include "gdbcore.h"
27#include "target.h"
28#include "demangle.h"
29#include "language.h"
30#include "gdbcmd.h"
4e052eda 31#include "regcache.h"
015a42b4 32#include "cp-abi.h"
fe898f56 33#include "block.h"
04714b91 34#include "infcall.h"
de4f826b 35#include "dictionary.h"
b6429628 36#include "cp-support.h"
4ef30785 37#include "dfp.h"
029a67e4 38#include "user-regs.h"
e6ca34fc 39#include "tracepoint.h"
c906108c
SS
40#include <errno.h>
41#include "gdb_string.h"
4a1970e4 42#include "gdb_assert.h"
79c2c32d 43#include "cp-support.h"
f4c5303c 44#include "observer.h"
3e3b026f
UW
45#include "objfiles.h"
46#include "symtab.h"
79afc5ef 47#include "exceptions.h"
c906108c 48
ccce17b0 49extern unsigned int overload_debug;
c906108c
SS
50/* Local functions. */
51
ad2f7632
DJ
52static int typecmp (int staticp, int varargs, int nargs,
53 struct field t1[], struct value *t2[]);
c906108c 54
714f19d5 55static struct value *search_struct_field (const char *, struct value *,
ac3eeb49 56 int, struct type *, int);
c906108c 57
714f19d5
TT
58static struct value *search_struct_method (const char *, struct value **,
59 struct value **,
60 int, int *, struct type *);
c906108c 61
da096638 62static int find_oload_champ_namespace (struct value **, int,
ac3eeb49
MS
63 const char *, const char *,
64 struct symbol ***,
7322dca9
SW
65 struct badness_vector **,
66 const int no_adl);
8d577d32
DC
67
68static
da096638 69int find_oload_champ_namespace_loop (struct value **, int,
ac3eeb49
MS
70 const char *, const char *,
71 int, struct symbol ***,
7322dca9
SW
72 struct badness_vector **, int *,
73 const int no_adl);
ac3eeb49 74
da096638 75static int find_oload_champ (struct value **, int, int, int,
ac3eeb49
MS
76 struct fn_field *, struct symbol **,
77 struct badness_vector **);
78
79static int oload_method_static (int, struct fn_field *, int);
8d577d32
DC
80
81enum oload_classification { STANDARD, NON_STANDARD, INCOMPATIBLE };
82
83static enum
ac3eeb49
MS
84oload_classification classify_oload_match (struct badness_vector *,
85 int, int);
8d577d32 86
ac3eeb49
MS
87static struct value *value_struct_elt_for_reference (struct type *,
88 int, struct type *,
89 char *,
90 struct type *,
91 int, enum noside);
79c2c32d 92
ac3eeb49
MS
93static struct value *value_namespace_elt (const struct type *,
94 char *, int , enum noside);
79c2c32d 95
ac3eeb49
MS
96static struct value *value_maybe_namespace_elt (const struct type *,
97 char *, int,
98 enum noside);
63d06c5c 99
a14ed312 100static CORE_ADDR allocate_space_in_inferior (int);
c906108c 101
f23631e4 102static struct value *cast_into_complex (struct type *, struct value *);
c906108c 103
714f19d5 104static struct fn_field *find_method_list (struct value **, const char *,
ac3eeb49
MS
105 int, struct type *, int *,
106 struct type **, int *);
7a292a7a 107
a14ed312 108void _initialize_valops (void);
c906108c 109
c906108c 110#if 0
ac3eeb49
MS
111/* Flag for whether we want to abandon failed expression evals by
112 default. */
113
c906108c
SS
114static int auto_abandon = 0;
115#endif
116
117int overload_resolution = 0;
920d2a44
AC
118static void
119show_overload_resolution (struct ui_file *file, int from_tty,
ac3eeb49
MS
120 struct cmd_list_element *c,
121 const char *value)
920d2a44 122{
3e43a32a
MS
123 fprintf_filtered (file, _("Overload resolution in evaluating "
124 "C++ functions is %s.\n"),
920d2a44
AC
125 value);
126}
242bfc55 127
3e3b026f
UW
128/* Find the address of function name NAME in the inferior. If OBJF_P
129 is non-NULL, *OBJF_P will be set to the OBJFILE where the function
130 is defined. */
c906108c 131
f23631e4 132struct value *
3e3b026f 133find_function_in_inferior (const char *name, struct objfile **objf_p)
c906108c 134{
52f0bd74 135 struct symbol *sym;
a109c7c1 136
2570f2b7 137 sym = lookup_symbol (name, 0, VAR_DOMAIN, 0);
c906108c
SS
138 if (sym != NULL)
139 {
140 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
141 {
8a3fe4f8 142 error (_("\"%s\" exists in this program but is not a function."),
c906108c
SS
143 name);
144 }
3e3b026f
UW
145
146 if (objf_p)
147 *objf_p = SYMBOL_SYMTAB (sym)->objfile;
148
c906108c
SS
149 return value_of_variable (sym, NULL);
150 }
151 else
152 {
ac3eeb49
MS
153 struct minimal_symbol *msymbol =
154 lookup_minimal_symbol (name, NULL, NULL);
a109c7c1 155
c906108c
SS
156 if (msymbol != NULL)
157 {
3e3b026f
UW
158 struct objfile *objfile = msymbol_objfile (msymbol);
159 struct gdbarch *gdbarch = get_objfile_arch (objfile);
160
c906108c 161 struct type *type;
4478b372 162 CORE_ADDR maddr;
3e3b026f 163 type = lookup_pointer_type (builtin_type (gdbarch)->builtin_char);
c906108c
SS
164 type = lookup_function_type (type);
165 type = lookup_pointer_type (type);
4478b372 166 maddr = SYMBOL_VALUE_ADDRESS (msymbol);
3e3b026f
UW
167
168 if (objf_p)
169 *objf_p = objfile;
170
4478b372 171 return value_from_pointer (type, maddr);
c906108c
SS
172 }
173 else
174 {
c5aa993b 175 if (!target_has_execution)
3e43a32a
MS
176 error (_("evaluation of this expression "
177 "requires the target program to be active"));
c5aa993b 178 else
3e43a32a
MS
179 error (_("evaluation of this expression requires the "
180 "program to have a function \"%s\"."),
181 name);
c906108c
SS
182 }
183 }
184}
185
ac3eeb49
MS
186/* Allocate NBYTES of space in the inferior using the inferior's
187 malloc and return a value that is a pointer to the allocated
188 space. */
c906108c 189
f23631e4 190struct value *
fba45db2 191value_allocate_space_in_inferior (int len)
c906108c 192{
3e3b026f
UW
193 struct objfile *objf;
194 struct value *val = find_function_in_inferior ("malloc", &objf);
195 struct gdbarch *gdbarch = get_objfile_arch (objf);
f23631e4 196 struct value *blocklen;
c906108c 197
3e3b026f 198 blocklen = value_from_longest (builtin_type (gdbarch)->builtin_int, len);
c906108c
SS
199 val = call_function_by_hand (val, 1, &blocklen);
200 if (value_logical_not (val))
201 {
202 if (!target_has_execution)
3e43a32a
MS
203 error (_("No memory available to program now: "
204 "you need to start the target first"));
c5aa993b 205 else
8a3fe4f8 206 error (_("No memory available to program: call to malloc failed"));
c906108c
SS
207 }
208 return val;
209}
210
211static CORE_ADDR
fba45db2 212allocate_space_in_inferior (int len)
c906108c
SS
213{
214 return value_as_long (value_allocate_space_in_inferior (len));
215}
216
6af87b03
AR
217/* Cast struct value VAL to type TYPE and return as a value.
218 Both type and val must be of TYPE_CODE_STRUCT or TYPE_CODE_UNION
694182d2
DJ
219 for this to work. Typedef to one of the codes is permitted.
220 Returns NULL if the cast is neither an upcast nor a downcast. */
6af87b03
AR
221
222static struct value *
223value_cast_structs (struct type *type, struct value *v2)
224{
225 struct type *t1;
226 struct type *t2;
227 struct value *v;
228
229 gdb_assert (type != NULL && v2 != NULL);
230
231 t1 = check_typedef (type);
232 t2 = check_typedef (value_type (v2));
233
234 /* Check preconditions. */
235 gdb_assert ((TYPE_CODE (t1) == TYPE_CODE_STRUCT
236 || TYPE_CODE (t1) == TYPE_CODE_UNION)
237 && !!"Precondition is that type is of STRUCT or UNION kind.");
238 gdb_assert ((TYPE_CODE (t2) == TYPE_CODE_STRUCT
239 || TYPE_CODE (t2) == TYPE_CODE_UNION)
240 && !!"Precondition is that value is of STRUCT or UNION kind");
241
191ca0a1
CM
242 if (TYPE_NAME (t1) != NULL
243 && TYPE_NAME (t2) != NULL
244 && !strcmp (TYPE_NAME (t1), TYPE_NAME (t2)))
245 return NULL;
246
6af87b03
AR
247 /* Upcasting: look in the type of the source to see if it contains the
248 type of the target as a superclass. If so, we'll need to
249 offset the pointer rather than just change its type. */
250 if (TYPE_NAME (t1) != NULL)
251 {
252 v = search_struct_field (type_name_no_tag (t1),
253 v2, 0, t2, 1);
254 if (v)
255 return v;
256 }
257
258 /* Downcasting: look in the type of the target to see if it contains the
259 type of the source as a superclass. If so, we'll need to
9c3c02fd 260 offset the pointer rather than just change its type. */
6af87b03
AR
261 if (TYPE_NAME (t2) != NULL)
262 {
9c3c02fd
TT
263 /* Try downcasting using the run-time type of the value. */
264 int full, top, using_enc;
265 struct type *real_type;
266
267 real_type = value_rtti_type (v2, &full, &top, &using_enc);
268 if (real_type)
269 {
270 v = value_full_object (v2, real_type, full, top, using_enc);
271 v = value_at_lazy (real_type, value_address (v));
272
273 /* We might be trying to cast to the outermost enclosing
274 type, in which case search_struct_field won't work. */
275 if (TYPE_NAME (real_type) != NULL
276 && !strcmp (TYPE_NAME (real_type), TYPE_NAME (t1)))
277 return v;
278
279 v = search_struct_field (type_name_no_tag (t2), v, 0, real_type, 1);
280 if (v)
281 return v;
282 }
283
284 /* Try downcasting using information from the destination type
285 T2. This wouldn't work properly for classes with virtual
286 bases, but those were handled above. */
6af87b03
AR
287 v = search_struct_field (type_name_no_tag (t2),
288 value_zero (t1, not_lval), 0, t1, 1);
289 if (v)
290 {
291 /* Downcasting is possible (t1 is superclass of v2). */
42ae5230 292 CORE_ADDR addr2 = value_address (v2);
a109c7c1 293
42ae5230 294 addr2 -= value_address (v) + value_embedded_offset (v);
6af87b03
AR
295 return value_at (type, addr2);
296 }
297 }
694182d2
DJ
298
299 return NULL;
6af87b03
AR
300}
301
fb933624
DJ
302/* Cast one pointer or reference type to another. Both TYPE and
303 the type of ARG2 should be pointer types, or else both should be
b1af9e97
TT
304 reference types. If SUBCLASS_CHECK is non-zero, this will force a
305 check to see whether TYPE is a superclass of ARG2's type. If
306 SUBCLASS_CHECK is zero, then the subclass check is done only when
307 ARG2 is itself non-zero. Returns the new pointer or reference. */
fb933624
DJ
308
309struct value *
b1af9e97
TT
310value_cast_pointers (struct type *type, struct value *arg2,
311 int subclass_check)
fb933624 312{
d160942f 313 struct type *type1 = check_typedef (type);
fb933624 314 struct type *type2 = check_typedef (value_type (arg2));
d160942f 315 struct type *t1 = check_typedef (TYPE_TARGET_TYPE (type1));
fb933624
DJ
316 struct type *t2 = check_typedef (TYPE_TARGET_TYPE (type2));
317
318 if (TYPE_CODE (t1) == TYPE_CODE_STRUCT
319 && TYPE_CODE (t2) == TYPE_CODE_STRUCT
b1af9e97 320 && (subclass_check || !value_logical_not (arg2)))
fb933624 321 {
6af87b03 322 struct value *v2;
fb933624 323
6af87b03
AR
324 if (TYPE_CODE (type2) == TYPE_CODE_REF)
325 v2 = coerce_ref (arg2);
326 else
327 v2 = value_ind (arg2);
3e43a32a
MS
328 gdb_assert (TYPE_CODE (check_typedef (value_type (v2)))
329 == TYPE_CODE_STRUCT && !!"Why did coercion fail?");
6af87b03
AR
330 v2 = value_cast_structs (t1, v2);
331 /* At this point we have what we can have, un-dereference if needed. */
332 if (v2)
fb933624 333 {
6af87b03 334 struct value *v = value_addr (v2);
a109c7c1 335
6af87b03
AR
336 deprecated_set_value_type (v, type);
337 return v;
fb933624 338 }
6af87b03 339 }
fb933624
DJ
340
341 /* No superclass found, just change the pointer type. */
0d5de010 342 arg2 = value_copy (arg2);
fb933624 343 deprecated_set_value_type (arg2, type);
4dfea560 344 set_value_enclosing_type (arg2, type);
fb933624
DJ
345 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
346 return arg2;
347}
348
c906108c
SS
349/* Cast value ARG2 to type TYPE and return as a value.
350 More general than a C cast: accepts any two types of the same length,
351 and if ARG2 is an lvalue it can be cast into anything at all. */
352/* In C++, casts may change pointer or object representations. */
353
f23631e4
AC
354struct value *
355value_cast (struct type *type, struct value *arg2)
c906108c 356{
52f0bd74
AC
357 enum type_code code1;
358 enum type_code code2;
359 int scalar;
c906108c
SS
360 struct type *type2;
361
362 int convert_to_boolean = 0;
c5aa993b 363
df407dfe 364 if (value_type (arg2) == type)
c906108c
SS
365 return arg2;
366
6af87b03
AR
367 code1 = TYPE_CODE (check_typedef (type));
368
369 /* Check if we are casting struct reference to struct reference. */
370 if (code1 == TYPE_CODE_REF)
371 {
372 /* We dereference type; then we recurse and finally
581e13c1 373 we generate value of the given reference. Nothing wrong with
6af87b03
AR
374 that. */
375 struct type *t1 = check_typedef (type);
376 struct type *dereftype = check_typedef (TYPE_TARGET_TYPE (t1));
377 struct value *val = value_cast (dereftype, arg2);
a109c7c1 378
6af87b03
AR
379 return value_ref (val);
380 }
381
382 code2 = TYPE_CODE (check_typedef (value_type (arg2)));
383
384 if (code2 == TYPE_CODE_REF)
385 /* We deref the value and then do the cast. */
386 return value_cast (type, coerce_ref (arg2));
387
c906108c
SS
388 CHECK_TYPEDEF (type);
389 code1 = TYPE_CODE (type);
994b9211 390 arg2 = coerce_ref (arg2);
df407dfe 391 type2 = check_typedef (value_type (arg2));
c906108c 392
fb933624
DJ
393 /* You can't cast to a reference type. See value_cast_pointers
394 instead. */
395 gdb_assert (code1 != TYPE_CODE_REF);
396
ac3eeb49
MS
397 /* A cast to an undetermined-length array_type, such as
398 (TYPE [])OBJECT, is treated like a cast to (TYPE [N])OBJECT,
399 where N is sizeof(OBJECT)/sizeof(TYPE). */
c906108c
SS
400 if (code1 == TYPE_CODE_ARRAY)
401 {
402 struct type *element_type = TYPE_TARGET_TYPE (type);
403 unsigned element_length = TYPE_LENGTH (check_typedef (element_type));
a109c7c1 404
d78df370 405 if (element_length > 0 && TYPE_ARRAY_UPPER_BOUND_IS_UNDEFINED (type))
c906108c
SS
406 {
407 struct type *range_type = TYPE_INDEX_TYPE (type);
408 int val_length = TYPE_LENGTH (type2);
409 LONGEST low_bound, high_bound, new_length;
a109c7c1 410
c906108c
SS
411 if (get_discrete_bounds (range_type, &low_bound, &high_bound) < 0)
412 low_bound = 0, high_bound = 0;
413 new_length = val_length / element_length;
414 if (val_length % element_length != 0)
3e43a32a
MS
415 warning (_("array element type size does not "
416 "divide object size in cast"));
ac3eeb49
MS
417 /* FIXME-type-allocation: need a way to free this type when
418 we are done with it. */
c906108c
SS
419 range_type = create_range_type ((struct type *) NULL,
420 TYPE_TARGET_TYPE (range_type),
421 low_bound,
422 new_length + low_bound - 1);
ac3eeb49
MS
423 deprecated_set_value_type (arg2,
424 create_array_type ((struct type *) NULL,
425 element_type,
426 range_type));
c906108c
SS
427 return arg2;
428 }
429 }
430
431 if (current_language->c_style_arrays
3bdf2bbd
KW
432 && TYPE_CODE (type2) == TYPE_CODE_ARRAY
433 && !TYPE_VECTOR (type2))
c906108c
SS
434 arg2 = value_coerce_array (arg2);
435
436 if (TYPE_CODE (type2) == TYPE_CODE_FUNC)
437 arg2 = value_coerce_function (arg2);
438
df407dfe 439 type2 = check_typedef (value_type (arg2));
c906108c
SS
440 code2 = TYPE_CODE (type2);
441
442 if (code1 == TYPE_CODE_COMPLEX)
443 return cast_into_complex (type, arg2);
444 if (code1 == TYPE_CODE_BOOL)
445 {
446 code1 = TYPE_CODE_INT;
447 convert_to_boolean = 1;
448 }
449 if (code1 == TYPE_CODE_CHAR)
450 code1 = TYPE_CODE_INT;
451 if (code2 == TYPE_CODE_BOOL || code2 == TYPE_CODE_CHAR)
452 code2 = TYPE_CODE_INT;
453
454 scalar = (code2 == TYPE_CODE_INT || code2 == TYPE_CODE_FLT
4ef30785
TJB
455 || code2 == TYPE_CODE_DECFLOAT || code2 == TYPE_CODE_ENUM
456 || code2 == TYPE_CODE_RANGE);
c906108c 457
6af87b03
AR
458 if ((code1 == TYPE_CODE_STRUCT || code1 == TYPE_CODE_UNION)
459 && (code2 == TYPE_CODE_STRUCT || code2 == TYPE_CODE_UNION)
c906108c 460 && TYPE_NAME (type) != 0)
694182d2
DJ
461 {
462 struct value *v = value_cast_structs (type, arg2);
a109c7c1 463
694182d2
DJ
464 if (v)
465 return v;
466 }
467
c906108c
SS
468 if (code1 == TYPE_CODE_FLT && scalar)
469 return value_from_double (type, value_as_double (arg2));
4ef30785
TJB
470 else if (code1 == TYPE_CODE_DECFLOAT && scalar)
471 {
e17a4113 472 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
4ef30785
TJB
473 int dec_len = TYPE_LENGTH (type);
474 gdb_byte dec[16];
475
476 if (code2 == TYPE_CODE_FLT)
e17a4113 477 decimal_from_floating (arg2, dec, dec_len, byte_order);
4ef30785
TJB
478 else if (code2 == TYPE_CODE_DECFLOAT)
479 decimal_convert (value_contents (arg2), TYPE_LENGTH (type2),
e17a4113 480 byte_order, dec, dec_len, byte_order);
4ef30785
TJB
481 else
482 /* The only option left is an integral type. */
e17a4113 483 decimal_from_integral (arg2, dec, dec_len, byte_order);
4ef30785
TJB
484
485 return value_from_decfloat (type, dec);
486 }
c906108c
SS
487 else if ((code1 == TYPE_CODE_INT || code1 == TYPE_CODE_ENUM
488 || code1 == TYPE_CODE_RANGE)
0d5de010
DJ
489 && (scalar || code2 == TYPE_CODE_PTR
490 || code2 == TYPE_CODE_MEMBERPTR))
c906108c
SS
491 {
492 LONGEST longest;
c5aa993b 493
2bf1f4a1 494 /* When we cast pointers to integers, we mustn't use
76e71323 495 gdbarch_pointer_to_address to find the address the pointer
2bf1f4a1
JB
496 represents, as value_as_long would. GDB should evaluate
497 expressions just as the compiler would --- and the compiler
498 sees a cast as a simple reinterpretation of the pointer's
499 bits. */
500 if (code2 == TYPE_CODE_PTR)
e17a4113
UW
501 longest = extract_unsigned_integer
502 (value_contents (arg2), TYPE_LENGTH (type2),
503 gdbarch_byte_order (get_type_arch (type2)));
2bf1f4a1
JB
504 else
505 longest = value_as_long (arg2);
802db21b 506 return value_from_longest (type, convert_to_boolean ?
716c501e 507 (LONGEST) (longest ? 1 : 0) : longest);
c906108c 508 }
ac3eeb49
MS
509 else if (code1 == TYPE_CODE_PTR && (code2 == TYPE_CODE_INT
510 || code2 == TYPE_CODE_ENUM
511 || code2 == TYPE_CODE_RANGE))
634acd5f 512 {
4603e466
DT
513 /* TYPE_LENGTH (type) is the length of a pointer, but we really
514 want the length of an address! -- we are really dealing with
515 addresses (i.e., gdb representations) not pointers (i.e.,
516 target representations) here.
517
518 This allows things like "print *(int *)0x01000234" to work
519 without printing a misleading message -- which would
520 otherwise occur when dealing with a target having two byte
521 pointers and four byte addresses. */
522
50810684 523 int addr_bit = gdbarch_addr_bit (get_type_arch (type2));
634acd5f 524 LONGEST longest = value_as_long (arg2);
a109c7c1 525
4603e466 526 if (addr_bit < sizeof (LONGEST) * HOST_CHAR_BIT)
634acd5f 527 {
4603e466
DT
528 if (longest >= ((LONGEST) 1 << addr_bit)
529 || longest <= -((LONGEST) 1 << addr_bit))
8a3fe4f8 530 warning (_("value truncated"));
634acd5f
AC
531 }
532 return value_from_longest (type, longest);
533 }
0d5de010
DJ
534 else if (code1 == TYPE_CODE_METHODPTR && code2 == TYPE_CODE_INT
535 && value_as_long (arg2) == 0)
536 {
537 struct value *result = allocate_value (type);
a109c7c1 538
ad4820ab 539 cplus_make_method_ptr (type, value_contents_writeable (result), 0, 0);
0d5de010
DJ
540 return result;
541 }
542 else if (code1 == TYPE_CODE_MEMBERPTR && code2 == TYPE_CODE_INT
543 && value_as_long (arg2) == 0)
544 {
545 /* The Itanium C++ ABI represents NULL pointers to members as
546 minus one, instead of biasing the normal case. */
547 return value_from_longest (type, -1);
548 }
3bdf2bbd
KW
549 else if (code1 == TYPE_CODE_ARRAY && TYPE_VECTOR (type) && scalar)
550 {
551 /* Widen the scalar to a vector. */
552 struct type *eltype;
553 struct value *val;
dbc98a8b
KW
554 LONGEST low_bound, high_bound;
555 int i;
556
557 if (!get_array_bounds (type, &low_bound, &high_bound))
558 error (_("Could not determine the vector bounds"));
3bdf2bbd
KW
559
560 eltype = check_typedef (TYPE_TARGET_TYPE (type));
561 arg2 = value_cast (eltype, arg2);
562 val = allocate_value (type);
3bdf2bbd 563
dbc98a8b 564 for (i = 0; i < high_bound - low_bound + 1; i++)
3bdf2bbd
KW
565 {
566 /* Duplicate the contents of arg2 into the destination vector. */
567 memcpy (value_contents_writeable (val) + (i * TYPE_LENGTH (eltype)),
568 value_contents_all (arg2), TYPE_LENGTH (eltype));
569 }
570 return val;
571 }
0ba2eb0f
TT
572 else if (code1 == TYPE_CODE_VOID)
573 {
574 return value_zero (type, not_lval);
575 }
c906108c
SS
576 else if (TYPE_LENGTH (type) == TYPE_LENGTH (type2))
577 {
578 if (code1 == TYPE_CODE_PTR && code2 == TYPE_CODE_PTR)
b1af9e97 579 return value_cast_pointers (type, arg2, 0);
fb933624 580
0d5de010 581 arg2 = value_copy (arg2);
04624583 582 deprecated_set_value_type (arg2, type);
4dfea560 583 set_value_enclosing_type (arg2, type);
b44d461b 584 set_value_pointed_to_offset (arg2, 0); /* pai: chk_val */
c906108c
SS
585 return arg2;
586 }
c906108c 587 else if (VALUE_LVAL (arg2) == lval_memory)
42ae5230 588 return value_at_lazy (type, value_address (arg2));
c906108c
SS
589 else
590 {
8a3fe4f8 591 error (_("Invalid cast."));
c906108c
SS
592 return 0;
593 }
594}
595
4e8f195d
TT
596/* The C++ reinterpret_cast operator. */
597
598struct value *
599value_reinterpret_cast (struct type *type, struct value *arg)
600{
601 struct value *result;
602 struct type *real_type = check_typedef (type);
603 struct type *arg_type, *dest_type;
604 int is_ref = 0;
605 enum type_code dest_code, arg_code;
606
607 /* Do reference, function, and array conversion. */
608 arg = coerce_array (arg);
609
610 /* Attempt to preserve the type the user asked for. */
611 dest_type = type;
612
613 /* If we are casting to a reference type, transform
614 reinterpret_cast<T&>(V) to *reinterpret_cast<T*>(&V). */
615 if (TYPE_CODE (real_type) == TYPE_CODE_REF)
616 {
617 is_ref = 1;
618 arg = value_addr (arg);
619 dest_type = lookup_pointer_type (TYPE_TARGET_TYPE (dest_type));
620 real_type = lookup_pointer_type (real_type);
621 }
622
623 arg_type = value_type (arg);
624
625 dest_code = TYPE_CODE (real_type);
626 arg_code = TYPE_CODE (arg_type);
627
628 /* We can convert pointer types, or any pointer type to int, or int
629 type to pointer. */
630 if ((dest_code == TYPE_CODE_PTR && arg_code == TYPE_CODE_INT)
631 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_PTR)
632 || (dest_code == TYPE_CODE_METHODPTR && arg_code == TYPE_CODE_INT)
633 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_METHODPTR)
634 || (dest_code == TYPE_CODE_MEMBERPTR && arg_code == TYPE_CODE_INT)
635 || (dest_code == TYPE_CODE_INT && arg_code == TYPE_CODE_MEMBERPTR)
636 || (dest_code == arg_code
637 && (dest_code == TYPE_CODE_PTR
638 || dest_code == TYPE_CODE_METHODPTR
639 || dest_code == TYPE_CODE_MEMBERPTR)))
640 result = value_cast (dest_type, arg);
641 else
642 error (_("Invalid reinterpret_cast"));
643
644 if (is_ref)
645 result = value_cast (type, value_ref (value_ind (result)));
646
647 return result;
648}
649
650/* A helper for value_dynamic_cast. This implements the first of two
651 runtime checks: we iterate over all the base classes of the value's
652 class which are equal to the desired class; if only one of these
653 holds the value, then it is the answer. */
654
655static int
656dynamic_cast_check_1 (struct type *desired_type,
8af8e3bc
PA
657 const gdb_byte *valaddr,
658 int embedded_offset,
4e8f195d 659 CORE_ADDR address,
8af8e3bc 660 struct value *val,
4e8f195d
TT
661 struct type *search_type,
662 CORE_ADDR arg_addr,
663 struct type *arg_type,
664 struct value **result)
665{
666 int i, result_count = 0;
667
668 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
669 {
8af8e3bc
PA
670 int offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
671 address, val);
a109c7c1 672
4e8f195d
TT
673 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
674 {
8af8e3bc
PA
675 if (address + embedded_offset + offset >= arg_addr
676 && address + embedded_offset + offset < arg_addr + TYPE_LENGTH (arg_type))
4e8f195d
TT
677 {
678 ++result_count;
679 if (!*result)
680 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 681 address + embedded_offset + offset);
4e8f195d
TT
682 }
683 }
684 else
685 result_count += dynamic_cast_check_1 (desired_type,
8af8e3bc
PA
686 valaddr,
687 embedded_offset + offset,
688 address, val,
4e8f195d
TT
689 TYPE_BASECLASS (search_type, i),
690 arg_addr,
691 arg_type,
692 result);
693 }
694
695 return result_count;
696}
697
698/* A helper for value_dynamic_cast. This implements the second of two
699 runtime checks: we look for a unique public sibling class of the
700 argument's declared class. */
701
702static int
703dynamic_cast_check_2 (struct type *desired_type,
8af8e3bc
PA
704 const gdb_byte *valaddr,
705 int embedded_offset,
4e8f195d 706 CORE_ADDR address,
8af8e3bc 707 struct value *val,
4e8f195d
TT
708 struct type *search_type,
709 struct value **result)
710{
711 int i, result_count = 0;
712
713 for (i = 0; i < TYPE_N_BASECLASSES (search_type) && result_count < 2; ++i)
714 {
715 int offset;
716
717 if (! BASETYPE_VIA_PUBLIC (search_type, i))
718 continue;
719
8af8e3bc
PA
720 offset = baseclass_offset (search_type, i, valaddr, embedded_offset,
721 address, val);
4e8f195d
TT
722 if (class_types_same_p (desired_type, TYPE_BASECLASS (search_type, i)))
723 {
724 ++result_count;
725 if (*result == NULL)
726 *result = value_at_lazy (TYPE_BASECLASS (search_type, i),
8af8e3bc 727 address + embedded_offset + offset);
4e8f195d
TT
728 }
729 else
730 result_count += dynamic_cast_check_2 (desired_type,
8af8e3bc
PA
731 valaddr,
732 embedded_offset + offset,
733 address, val,
4e8f195d
TT
734 TYPE_BASECLASS (search_type, i),
735 result);
736 }
737
738 return result_count;
739}
740
741/* The C++ dynamic_cast operator. */
742
743struct value *
744value_dynamic_cast (struct type *type, struct value *arg)
745{
8f78b329 746 int full, top, using_enc;
4e8f195d
TT
747 struct type *resolved_type = check_typedef (type);
748 struct type *arg_type = check_typedef (value_type (arg));
749 struct type *class_type, *rtti_type;
750 struct value *result, *tem, *original_arg = arg;
751 CORE_ADDR addr;
752 int is_ref = TYPE_CODE (resolved_type) == TYPE_CODE_REF;
753
754 if (TYPE_CODE (resolved_type) != TYPE_CODE_PTR
755 && TYPE_CODE (resolved_type) != TYPE_CODE_REF)
756 error (_("Argument to dynamic_cast must be a pointer or reference type"));
757 if (TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_VOID
758 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) != TYPE_CODE_CLASS)
759 error (_("Argument to dynamic_cast must be pointer to class or `void *'"));
760
761 class_type = check_typedef (TYPE_TARGET_TYPE (resolved_type));
762 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
763 {
764 if (TYPE_CODE (arg_type) != TYPE_CODE_PTR
765 && ! (TYPE_CODE (arg_type) == TYPE_CODE_INT
766 && value_as_long (arg) == 0))
767 error (_("Argument to dynamic_cast does not have pointer type"));
768 if (TYPE_CODE (arg_type) == TYPE_CODE_PTR)
769 {
770 arg_type = check_typedef (TYPE_TARGET_TYPE (arg_type));
771 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
3e43a32a
MS
772 error (_("Argument to dynamic_cast does "
773 "not have pointer to class type"));
4e8f195d
TT
774 }
775
776 /* Handle NULL pointers. */
777 if (value_as_long (arg) == 0)
778 return value_zero (type, not_lval);
779
780 arg = value_ind (arg);
781 }
782 else
783 {
784 if (TYPE_CODE (arg_type) != TYPE_CODE_CLASS)
785 error (_("Argument to dynamic_cast does not have class type"));
786 }
787
788 /* If the classes are the same, just return the argument. */
789 if (class_types_same_p (class_type, arg_type))
790 return value_cast (type, arg);
791
792 /* If the target type is a unique base class of the argument's
793 declared type, just cast it. */
794 if (is_ancestor (class_type, arg_type))
795 {
796 if (is_unique_ancestor (class_type, arg))
797 return value_cast (type, original_arg);
798 error (_("Ambiguous dynamic_cast"));
799 }
800
801 rtti_type = value_rtti_type (arg, &full, &top, &using_enc);
802 if (! rtti_type)
803 error (_("Couldn't determine value's most derived type for dynamic_cast"));
804
805 /* Compute the most derived object's address. */
806 addr = value_address (arg);
807 if (full)
808 {
809 /* Done. */
810 }
811 else if (using_enc)
812 addr += top;
813 else
814 addr += top + value_embedded_offset (arg);
815
816 /* dynamic_cast<void *> means to return a pointer to the
817 most-derived object. */
818 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR
819 && TYPE_CODE (TYPE_TARGET_TYPE (resolved_type)) == TYPE_CODE_VOID)
820 return value_at_lazy (type, addr);
821
822 tem = value_at (type, addr);
823
824 /* The first dynamic check specified in 5.2.7. */
825 if (is_public_ancestor (arg_type, TYPE_TARGET_TYPE (resolved_type)))
826 {
827 if (class_types_same_p (rtti_type, TYPE_TARGET_TYPE (resolved_type)))
828 return tem;
829 result = NULL;
830 if (dynamic_cast_check_1 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
831 value_contents_for_printing (tem),
832 value_embedded_offset (tem),
833 value_address (tem), tem,
4e8f195d
TT
834 rtti_type, addr,
835 arg_type,
836 &result) == 1)
837 return value_cast (type,
838 is_ref ? value_ref (result) : value_addr (result));
839 }
840
841 /* The second dynamic check specified in 5.2.7. */
842 result = NULL;
843 if (is_public_ancestor (arg_type, rtti_type)
844 && dynamic_cast_check_2 (TYPE_TARGET_TYPE (resolved_type),
8af8e3bc
PA
845 value_contents_for_printing (tem),
846 value_embedded_offset (tem),
847 value_address (tem), tem,
4e8f195d
TT
848 rtti_type, &result) == 1)
849 return value_cast (type,
850 is_ref ? value_ref (result) : value_addr (result));
851
852 if (TYPE_CODE (resolved_type) == TYPE_CODE_PTR)
853 return value_zero (type, not_lval);
854
855 error (_("dynamic_cast failed"));
856}
857
c906108c
SS
858/* Create a value of type TYPE that is zero, and return it. */
859
f23631e4 860struct value *
fba45db2 861value_zero (struct type *type, enum lval_type lv)
c906108c 862{
f23631e4 863 struct value *val = allocate_value (type);
c906108c 864
bb7da2bf 865 VALUE_LVAL (val) = (lv == lval_computed ? not_lval : lv);
c906108c
SS
866 return val;
867}
868
18a46dbe 869/* Create a not_lval value of numeric type TYPE that is one, and return it. */
301f0ecf
DE
870
871struct value *
18a46dbe 872value_one (struct type *type)
301f0ecf
DE
873{
874 struct type *type1 = check_typedef (type);
4e608b4f 875 struct value *val;
301f0ecf
DE
876
877 if (TYPE_CODE (type1) == TYPE_CODE_DECFLOAT)
878 {
e17a4113 879 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
301f0ecf 880 gdb_byte v[16];
a109c7c1 881
e17a4113 882 decimal_from_string (v, TYPE_LENGTH (type), byte_order, "1");
301f0ecf
DE
883 val = value_from_decfloat (type, v);
884 }
885 else if (TYPE_CODE (type1) == TYPE_CODE_FLT)
886 {
887 val = value_from_double (type, (DOUBLEST) 1);
888 }
889 else if (is_integral_type (type1))
890 {
891 val = value_from_longest (type, (LONGEST) 1);
892 }
120bd360
KW
893 else if (TYPE_CODE (type1) == TYPE_CODE_ARRAY && TYPE_VECTOR (type1))
894 {
895 struct type *eltype = check_typedef (TYPE_TARGET_TYPE (type1));
cfa6f054
KW
896 int i;
897 LONGEST low_bound, high_bound;
120bd360
KW
898 struct value *tmp;
899
cfa6f054
KW
900 if (!get_array_bounds (type1, &low_bound, &high_bound))
901 error (_("Could not determine the vector bounds"));
902
120bd360 903 val = allocate_value (type);
cfa6f054 904 for (i = 0; i < high_bound - low_bound + 1; i++)
120bd360 905 {
18a46dbe 906 tmp = value_one (eltype);
120bd360
KW
907 memcpy (value_contents_writeable (val) + i * TYPE_LENGTH (eltype),
908 value_contents_all (tmp), TYPE_LENGTH (eltype));
909 }
910 }
301f0ecf
DE
911 else
912 {
913 error (_("Not a numeric type."));
914 }
915
18a46dbe
JK
916 /* value_one result is never used for assignments to. */
917 gdb_assert (VALUE_LVAL (val) == not_lval);
918
301f0ecf
DE
919 return val;
920}
921
4e5d721f
DE
922/* Helper function for value_at, value_at_lazy, and value_at_lazy_stack. */
923
924static struct value *
925get_value_at (struct type *type, CORE_ADDR addr, int lazy)
926{
927 struct value *val;
928
929 if (TYPE_CODE (check_typedef (type)) == TYPE_CODE_VOID)
930 error (_("Attempt to dereference a generic pointer."));
931
a3d34bf4 932 val = value_from_contents_and_address (type, NULL, addr);
4e5d721f 933
a3d34bf4
PA
934 if (!lazy)
935 value_fetch_lazy (val);
4e5d721f
DE
936
937 return val;
938}
939
070ad9f0 940/* Return a value with type TYPE located at ADDR.
c906108c
SS
941
942 Call value_at only if the data needs to be fetched immediately;
943 if we can be 'lazy' and defer the fetch, perhaps indefinately, call
944 value_at_lazy instead. value_at_lazy simply records the address of
070ad9f0 945 the data and sets the lazy-evaluation-required flag. The lazy flag
0fd88904 946 is tested in the value_contents macro, which is used if and when
070ad9f0 947 the contents are actually required.
c906108c
SS
948
949 Note: value_at does *NOT* handle embedded offsets; perform such
ac3eeb49 950 adjustments before or after calling it. */
c906108c 951
f23631e4 952struct value *
00a4c844 953value_at (struct type *type, CORE_ADDR addr)
c906108c 954{
4e5d721f 955 return get_value_at (type, addr, 0);
c906108c
SS
956}
957
958/* Return a lazy value with type TYPE located at ADDR (cf. value_at). */
959
f23631e4 960struct value *
00a4c844 961value_at_lazy (struct type *type, CORE_ADDR addr)
c906108c 962{
4e5d721f 963 return get_value_at (type, addr, 1);
c906108c
SS
964}
965
0fd88904 966/* Called only from the value_contents and value_contents_all()
46615f07 967 macros, if the current data for a variable needs to be loaded into
0fd88904 968 value_contents(VAL). Fetches the data from the user's process, and
46615f07
AC
969 clears the lazy flag to indicate that the data in the buffer is
970 valid.
c906108c 971
ac3eeb49
MS
972 If the value is zero-length, we avoid calling read_memory, which
973 would abort. We mark the value as fetched anyway -- all 0 bytes of
974 it.
c906108c 975
ac3eeb49
MS
976 This function returns a value because it is used in the
977 value_contents macro as part of an expression, where a void would
978 not work. The value is ignored. */
c906108c
SS
979
980int
f23631e4 981value_fetch_lazy (struct value *val)
c906108c 982{
3e3d7139
JG
983 gdb_assert (value_lazy (val));
984 allocate_value_contents (val);
4ea48cc1
DJ
985 if (value_bitsize (val))
986 {
987 /* To read a lazy bitfield, read the entire enclosing value. This
988 prevents reading the same block of (possibly volatile) memory once
989 per bitfield. It would be even better to read only the containing
990 word, but we have no way to record that just specific bits of a
991 value have been fetched. */
992 struct type *type = check_typedef (value_type (val));
993 enum bfd_endian byte_order = gdbarch_byte_order (get_type_arch (type));
994 struct value *parent = value_parent (val);
995 LONGEST offset = value_offset (val);
5467c6c8 996 LONGEST num;
a109c7c1 997
0e03807e
TT
998 if (!value_bits_valid (val,
999 TARGET_CHAR_BIT * offset + value_bitpos (val),
1000 value_bitsize (val)))
1001 error (_("value has been optimized out"));
1002
5467c6c8
PA
1003 if (!unpack_value_bits_as_long (value_type (val),
1004 value_contents_for_printing (parent),
1005 offset,
1006 value_bitpos (val),
1007 value_bitsize (val), parent, &num))
1008 mark_value_bytes_unavailable (val,
1009 value_embedded_offset (val),
744a8059 1010 TYPE_LENGTH (type));
5467c6c8 1011 else
744a8059 1012 store_signed_integer (value_contents_raw (val), TYPE_LENGTH (type),
5467c6c8 1013 byte_order, num);
4ea48cc1
DJ
1014 }
1015 else if (VALUE_LVAL (val) == lval_memory)
9214ee5f 1016 {
42ae5230 1017 CORE_ADDR addr = value_address (val);
744a8059 1018 struct type *type = check_typedef (value_enclosing_type (val));
9214ee5f 1019
744a8059 1020 if (TYPE_LENGTH (type))
e6ca34fc 1021 read_value_memory (val, 0, value_stack (val),
744a8059
SP
1022 addr, value_contents_all_raw (val),
1023 TYPE_LENGTH (type));
9214ee5f
DJ
1024 }
1025 else if (VALUE_LVAL (val) == lval_register)
1026 {
669fac23
DJ
1027 struct frame_info *frame;
1028 int regnum;
9214ee5f 1029 struct type *type = check_typedef (value_type (val));
669fac23 1030 struct value *new_val = val, *mark = value_mark ();
c906108c 1031
669fac23
DJ
1032 /* Offsets are not supported here; lazy register values must
1033 refer to the entire register. */
1034 gdb_assert (value_offset (val) == 0);
9214ee5f 1035
669fac23
DJ
1036 while (VALUE_LVAL (new_val) == lval_register && value_lazy (new_val))
1037 {
1038 frame = frame_find_by_id (VALUE_FRAME_ID (new_val));
1039 regnum = VALUE_REGNUM (new_val);
1040
1041 gdb_assert (frame != NULL);
9214ee5f 1042
669fac23
DJ
1043 /* Convertible register routines are used for multi-register
1044 values and for interpretation in different types
1045 (e.g. float or int from a double register). Lazy
1046 register values should have the register's natural type,
1047 so they do not apply. */
1048 gdb_assert (!gdbarch_convert_register_p (get_frame_arch (frame),
1049 regnum, type));
1050
1051 new_val = get_frame_register_value (frame, regnum);
1052 }
1053
1054 /* If it's still lazy (for instance, a saved register on the
1055 stack), fetch it. */
1056 if (value_lazy (new_val))
1057 value_fetch_lazy (new_val);
1058
39d37385 1059 /* If the register was not saved, mark it optimized out. */
669fac23 1060 if (value_optimized_out (new_val))
9214ee5f 1061 set_value_optimized_out (val, 1);
669fac23 1062 else
39d37385
PA
1063 {
1064 set_value_lazy (val, 0);
1065 value_contents_copy (val, value_embedded_offset (val),
1066 new_val, value_embedded_offset (new_val),
1067 TYPE_LENGTH (type));
1068 }
669fac23
DJ
1069
1070 if (frame_debug)
1071 {
029a67e4 1072 struct gdbarch *gdbarch;
669fac23
DJ
1073 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1074 regnum = VALUE_REGNUM (val);
029a67e4 1075 gdbarch = get_frame_arch (frame);
669fac23 1076
3e43a32a
MS
1077 fprintf_unfiltered (gdb_stdlog,
1078 "{ value_fetch_lazy "
1079 "(frame=%d,regnum=%d(%s),...) ",
669fac23 1080 frame_relative_level (frame), regnum,
029a67e4 1081 user_reg_map_regnum_to_name (gdbarch, regnum));
669fac23
DJ
1082
1083 fprintf_unfiltered (gdb_stdlog, "->");
1084 if (value_optimized_out (new_val))
1085 fprintf_unfiltered (gdb_stdlog, " optimized out");
1086 else
1087 {
1088 int i;
1089 const gdb_byte *buf = value_contents (new_val);
1090
1091 if (VALUE_LVAL (new_val) == lval_register)
1092 fprintf_unfiltered (gdb_stdlog, " register=%d",
1093 VALUE_REGNUM (new_val));
1094 else if (VALUE_LVAL (new_val) == lval_memory)
5af949e3
UW
1095 fprintf_unfiltered (gdb_stdlog, " address=%s",
1096 paddress (gdbarch,
1097 value_address (new_val)));
669fac23
DJ
1098 else
1099 fprintf_unfiltered (gdb_stdlog, " computed");
1100
1101 fprintf_unfiltered (gdb_stdlog, " bytes=");
1102 fprintf_unfiltered (gdb_stdlog, "[");
029a67e4 1103 for (i = 0; i < register_size (gdbarch, regnum); i++)
669fac23
DJ
1104 fprintf_unfiltered (gdb_stdlog, "%02x", buf[i]);
1105 fprintf_unfiltered (gdb_stdlog, "]");
1106 }
1107
1108 fprintf_unfiltered (gdb_stdlog, " }\n");
1109 }
1110
1111 /* Dispose of the intermediate values. This prevents
1112 watchpoints from trying to watch the saved frame pointer. */
1113 value_free_to_mark (mark);
9214ee5f 1114 }
ac71a68c
JK
1115 else if (VALUE_LVAL (val) == lval_computed
1116 && value_computed_funcs (val)->read != NULL)
5f5233d4 1117 value_computed_funcs (val)->read (val);
41e8491f
JK
1118 else if (value_optimized_out (val))
1119 /* Keep it optimized out. */;
9214ee5f 1120 else
9b20d036 1121 internal_error (__FILE__, __LINE__, _("Unexpected lazy value type."));
802db21b 1122
dfa52d88 1123 set_value_lazy (val, 0);
c906108c
SS
1124 return 0;
1125}
1126
e6ca34fc
PA
1127void
1128read_value_memory (struct value *val, int embedded_offset,
1129 int stack, CORE_ADDR memaddr,
1130 gdb_byte *buffer, size_t length)
1131{
1132 if (length)
1133 {
1134 VEC(mem_range_s) *available_memory;
1135
1136 if (get_traceframe_number () < 0
1137 || !traceframe_available_memory (&available_memory, memaddr, length))
1138 {
1139 if (stack)
1140 read_stack (memaddr, buffer, length);
1141 else
1142 read_memory (memaddr, buffer, length);
1143 }
1144 else
1145 {
1146 struct target_section_table *table;
1147 struct cleanup *old_chain;
1148 CORE_ADDR unavail;
1149 mem_range_s *r;
1150 int i;
1151
1152 /* Fallback to reading from read-only sections. */
1153 table = target_get_section_table (&exec_ops);
1154 available_memory =
1155 section_table_available_memory (available_memory,
1156 memaddr, length,
1157 table->sections,
1158 table->sections_end);
1159
1160 old_chain = make_cleanup (VEC_cleanup(mem_range_s),
1161 &available_memory);
1162
1163 normalize_mem_ranges (available_memory);
1164
1165 /* Mark which bytes are unavailable, and read those which
1166 are available. */
1167
1168 unavail = memaddr;
1169
1170 for (i = 0;
1171 VEC_iterate (mem_range_s, available_memory, i, r);
1172 i++)
1173 {
1174 if (mem_ranges_overlap (r->start, r->length,
1175 memaddr, length))
1176 {
1177 CORE_ADDR lo1, hi1, lo2, hi2;
1178 CORE_ADDR start, end;
1179
1180 /* Get the intersection window. */
1181 lo1 = memaddr;
1182 hi1 = memaddr + length;
1183 lo2 = r->start;
1184 hi2 = r->start + r->length;
1185 start = max (lo1, lo2);
1186 end = min (hi1, hi2);
1187
1188 gdb_assert (end - memaddr <= length);
1189
1190 if (start > unavail)
1191 mark_value_bytes_unavailable (val,
1192 (embedded_offset
1193 + unavail - memaddr),
1194 start - unavail);
1195 unavail = end;
1196
1197 read_memory (start, buffer + start - memaddr, end - start);
1198 }
1199 }
1200
1201 if (unavail != memaddr + length)
1202 mark_value_bytes_unavailable (val,
1203 embedded_offset + unavail - memaddr,
1204 (memaddr + length) - unavail);
1205
1206 do_cleanups (old_chain);
1207 }
1208 }
1209}
c906108c
SS
1210
1211/* Store the contents of FROMVAL into the location of TOVAL.
1212 Return a new value with the location of TOVAL and contents of FROMVAL. */
1213
f23631e4
AC
1214struct value *
1215value_assign (struct value *toval, struct value *fromval)
c906108c 1216{
52f0bd74 1217 struct type *type;
f23631e4 1218 struct value *val;
cb741690 1219 struct frame_id old_frame;
c906108c 1220
88e3b34b 1221 if (!deprecated_value_modifiable (toval))
8a3fe4f8 1222 error (_("Left operand of assignment is not a modifiable lvalue."));
c906108c 1223
994b9211 1224 toval = coerce_ref (toval);
c906108c 1225
df407dfe 1226 type = value_type (toval);
c906108c 1227 if (VALUE_LVAL (toval) != lval_internalvar)
3cbaedff 1228 fromval = value_cast (type, fromval);
c906108c 1229 else
63092375
DJ
1230 {
1231 /* Coerce arrays and functions to pointers, except for arrays
1232 which only live in GDB's storage. */
1233 if (!value_must_coerce_to_target (fromval))
1234 fromval = coerce_array (fromval);
1235 }
1236
c906108c
SS
1237 CHECK_TYPEDEF (type);
1238
ac3eeb49
MS
1239 /* Since modifying a register can trash the frame chain, and
1240 modifying memory can trash the frame cache, we save the old frame
1241 and then restore the new frame afterwards. */
206415a3 1242 old_frame = get_frame_id (deprecated_safe_get_selected_frame ());
cb741690 1243
c906108c
SS
1244 switch (VALUE_LVAL (toval))
1245 {
1246 case lval_internalvar:
1247 set_internalvar (VALUE_INTERNALVAR (toval), fromval);
4aac0db7
UW
1248 return value_of_internalvar (get_type_arch (type),
1249 VALUE_INTERNALVAR (toval));
c906108c
SS
1250
1251 case lval_internalvar_component:
1252 set_internalvar_component (VALUE_INTERNALVAR (toval),
df407dfe
AC
1253 value_offset (toval),
1254 value_bitpos (toval),
1255 value_bitsize (toval),
c906108c
SS
1256 fromval);
1257 break;
1258
1259 case lval_memory:
1260 {
fc1a4b47 1261 const gdb_byte *dest_buffer;
c5aa993b
JM
1262 CORE_ADDR changed_addr;
1263 int changed_len;
10c42a71 1264 gdb_byte buffer[sizeof (LONGEST)];
c906108c 1265
df407dfe 1266 if (value_bitsize (toval))
c5aa993b 1267 {
2d88202a 1268 struct value *parent = value_parent (toval);
2d88202a 1269
a109c7c1 1270 changed_addr = value_address (parent) + value_offset (toval);
df407dfe
AC
1271 changed_len = (value_bitpos (toval)
1272 + value_bitsize (toval)
c5aa993b
JM
1273 + HOST_CHAR_BIT - 1)
1274 / HOST_CHAR_BIT;
c906108c 1275
4ea48cc1
DJ
1276 /* If we can read-modify-write exactly the size of the
1277 containing type (e.g. short or int) then do so. This
1278 is safer for volatile bitfields mapped to hardware
1279 registers. */
1280 if (changed_len < TYPE_LENGTH (type)
1281 && TYPE_LENGTH (type) <= (int) sizeof (LONGEST)
2d88202a 1282 && ((LONGEST) changed_addr % TYPE_LENGTH (type)) == 0)
4ea48cc1
DJ
1283 changed_len = TYPE_LENGTH (type);
1284
c906108c 1285 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1286 error (_("Can't handle bitfields which "
1287 "don't fit in a %d bit word."),
baa6f10b 1288 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
c906108c 1289
2d88202a 1290 read_memory (changed_addr, buffer, changed_len);
50810684 1291 modify_field (type, buffer, value_as_long (fromval),
df407dfe 1292 value_bitpos (toval), value_bitsize (toval));
c906108c
SS
1293 dest_buffer = buffer;
1294 }
c906108c
SS
1295 else
1296 {
42ae5230 1297 changed_addr = value_address (toval);
c906108c 1298 changed_len = TYPE_LENGTH (type);
0fd88904 1299 dest_buffer = value_contents (fromval);
c906108c
SS
1300 }
1301
972daa01 1302 write_memory_with_notification (changed_addr, dest_buffer, changed_len);
c906108c
SS
1303 }
1304 break;
1305
492254e9 1306 case lval_register:
c906108c 1307 {
c906108c 1308 struct frame_info *frame;
d80b854b 1309 struct gdbarch *gdbarch;
ff2e87ac 1310 int value_reg;
c906108c
SS
1311
1312 /* Figure out which frame this is in currently. */
0c16dd26
AC
1313 frame = frame_find_by_id (VALUE_FRAME_ID (toval));
1314 value_reg = VALUE_REGNUM (toval);
c906108c
SS
1315
1316 if (!frame)
8a3fe4f8 1317 error (_("Value being assigned to is no longer active."));
d80b854b
UW
1318
1319 gdbarch = get_frame_arch (frame);
1320 if (gdbarch_convert_register_p (gdbarch, VALUE_REGNUM (toval), type))
492254e9 1321 {
ff2e87ac 1322 /* If TOVAL is a special machine register requiring
ac3eeb49
MS
1323 conversion of program values to a special raw
1324 format. */
d80b854b 1325 gdbarch_value_to_register (gdbarch, frame,
ac3eeb49
MS
1326 VALUE_REGNUM (toval), type,
1327 value_contents (fromval));
492254e9 1328 }
c906108c 1329 else
492254e9 1330 {
df407dfe 1331 if (value_bitsize (toval))
00fa51f6 1332 {
2d88202a
UW
1333 struct value *parent = value_parent (toval);
1334 int offset = value_offset (parent) + value_offset (toval);
00fa51f6
UW
1335 int changed_len;
1336 gdb_byte buffer[sizeof (LONGEST)];
8af8e3bc 1337 int optim, unavail;
00fa51f6
UW
1338
1339 changed_len = (value_bitpos (toval)
1340 + value_bitsize (toval)
1341 + HOST_CHAR_BIT - 1)
1342 / HOST_CHAR_BIT;
1343
1344 if (changed_len > (int) sizeof (LONGEST))
3e43a32a
MS
1345 error (_("Can't handle bitfields which "
1346 "don't fit in a %d bit word."),
00fa51f6
UW
1347 (int) sizeof (LONGEST) * HOST_CHAR_BIT);
1348
8dccd430
PA
1349 if (!get_frame_register_bytes (frame, value_reg, offset,
1350 changed_len, buffer,
1351 &optim, &unavail))
1352 {
1353 if (optim)
1354 error (_("value has been optimized out"));
1355 if (unavail)
1356 throw_error (NOT_AVAILABLE_ERROR,
1357 _("value is not available"));
1358 }
00fa51f6 1359
50810684
UW
1360 modify_field (type, buffer, value_as_long (fromval),
1361 value_bitpos (toval), value_bitsize (toval));
00fa51f6 1362
2d88202a 1363 put_frame_register_bytes (frame, value_reg, offset,
00fa51f6
UW
1364 changed_len, buffer);
1365 }
c906108c 1366 else
00fa51f6
UW
1367 {
1368 put_frame_register_bytes (frame, value_reg,
1369 value_offset (toval),
1370 TYPE_LENGTH (type),
1371 value_contents (fromval));
1372 }
ff2e87ac 1373 }
00fa51f6 1374
9a4105ab
AC
1375 if (deprecated_register_changed_hook)
1376 deprecated_register_changed_hook (-1);
ff2e87ac 1377 break;
c906108c 1378 }
5f5233d4
PA
1379
1380 case lval_computed:
1381 {
c8f2448a 1382 const struct lval_funcs *funcs = value_computed_funcs (toval);
5f5233d4 1383
ac71a68c
JK
1384 if (funcs->write != NULL)
1385 {
1386 funcs->write (toval, fromval);
1387 break;
1388 }
5f5233d4 1389 }
ac71a68c 1390 /* Fall through. */
5f5233d4 1391
c906108c 1392 default:
8a3fe4f8 1393 error (_("Left operand of assignment is not an lvalue."));
c906108c
SS
1394 }
1395
cb741690
DJ
1396 /* Assigning to the stack pointer, frame pointer, and other
1397 (architecture and calling convention specific) registers may
d649a38e 1398 cause the frame cache and regcache to be out of date. Assigning to memory
cb741690
DJ
1399 also can. We just do this on all assignments to registers or
1400 memory, for simplicity's sake; I doubt the slowdown matters. */
1401 switch (VALUE_LVAL (toval))
1402 {
1403 case lval_memory:
1404 case lval_register:
0e03807e 1405 case lval_computed:
cb741690 1406
d649a38e 1407 observer_notify_target_changed (&current_target);
cb741690 1408
ac3eeb49
MS
1409 /* Having destroyed the frame cache, restore the selected
1410 frame. */
cb741690
DJ
1411
1412 /* FIXME: cagney/2002-11-02: There has to be a better way of
1413 doing this. Instead of constantly saving/restoring the
1414 frame. Why not create a get_selected_frame() function that,
1415 having saved the selected frame's ID can automatically
1416 re-find the previously selected frame automatically. */
1417
1418 {
1419 struct frame_info *fi = frame_find_by_id (old_frame);
a109c7c1 1420
cb741690
DJ
1421 if (fi != NULL)
1422 select_frame (fi);
1423 }
1424
1425 break;
1426 default:
1427 break;
1428 }
1429
ac3eeb49
MS
1430 /* If the field does not entirely fill a LONGEST, then zero the sign
1431 bits. If the field is signed, and is negative, then sign
1432 extend. */
df407dfe
AC
1433 if ((value_bitsize (toval) > 0)
1434 && (value_bitsize (toval) < 8 * (int) sizeof (LONGEST)))
c906108c
SS
1435 {
1436 LONGEST fieldval = value_as_long (fromval);
df407dfe 1437 LONGEST valmask = (((ULONGEST) 1) << value_bitsize (toval)) - 1;
c906108c
SS
1438
1439 fieldval &= valmask;
ac3eeb49
MS
1440 if (!TYPE_UNSIGNED (type)
1441 && (fieldval & (valmask ^ (valmask >> 1))))
c906108c
SS
1442 fieldval |= ~valmask;
1443
1444 fromval = value_from_longest (type, fieldval);
1445 }
1446
4aac0db7
UW
1447 /* The return value is a copy of TOVAL so it shares its location
1448 information, but its contents are updated from FROMVAL. This
1449 implies the returned value is not lazy, even if TOVAL was. */
c906108c 1450 val = value_copy (toval);
4aac0db7 1451 set_value_lazy (val, 0);
0fd88904 1452 memcpy (value_contents_raw (val), value_contents (fromval),
c906108c 1453 TYPE_LENGTH (type));
4aac0db7
UW
1454
1455 /* We copy over the enclosing type and pointed-to offset from FROMVAL
1456 in the case of pointer types. For object types, the enclosing type
1457 and embedded offset must *not* be copied: the target object refered
1458 to by TOVAL retains its original dynamic type after assignment. */
1459 if (TYPE_CODE (type) == TYPE_CODE_PTR)
1460 {
1461 set_value_enclosing_type (val, value_enclosing_type (fromval));
1462 set_value_pointed_to_offset (val, value_pointed_to_offset (fromval));
1463 }
c5aa993b 1464
c906108c
SS
1465 return val;
1466}
1467
1468/* Extend a value VAL to COUNT repetitions of its type. */
1469
f23631e4
AC
1470struct value *
1471value_repeat (struct value *arg1, int count)
c906108c 1472{
f23631e4 1473 struct value *val;
c906108c
SS
1474
1475 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1476 error (_("Only values in memory can be extended with '@'."));
c906108c 1477 if (count < 1)
8a3fe4f8 1478 error (_("Invalid number %d of repetitions."), count);
c906108c 1479
4754a64e 1480 val = allocate_repeat_value (value_enclosing_type (arg1), count);
c906108c 1481
c906108c 1482 VALUE_LVAL (val) = lval_memory;
42ae5230 1483 set_value_address (val, value_address (arg1));
c906108c 1484
24e6bcee
PA
1485 read_value_memory (val, 0, value_stack (val), value_address (val),
1486 value_contents_all_raw (val),
1487 TYPE_LENGTH (value_enclosing_type (val)));
1488
c906108c
SS
1489 return val;
1490}
1491
f23631e4 1492struct value *
9df2fbc4 1493value_of_variable (struct symbol *var, const struct block *b)
c906108c 1494{
61212c0f 1495 struct frame_info *frame;
c906108c 1496
61212c0f
UW
1497 if (!symbol_read_needs_frame (var))
1498 frame = NULL;
1499 else if (!b)
1500 frame = get_selected_frame (_("No frame selected."));
1501 else
c906108c
SS
1502 {
1503 frame = block_innermost_frame (b);
1504 if (!frame)
c5aa993b 1505 {
edb3359d 1506 if (BLOCK_FUNCTION (b) && !block_inlined_p (b)
de5ad195 1507 && SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)))
8a3fe4f8 1508 error (_("No frame is currently executing in block %s."),
de5ad195 1509 SYMBOL_PRINT_NAME (BLOCK_FUNCTION (b)));
c906108c 1510 else
8a3fe4f8 1511 error (_("No frame is currently executing in specified block"));
c5aa993b 1512 }
c906108c
SS
1513 }
1514
8afd712c 1515 return read_var_value (var, frame);
c906108c
SS
1516}
1517
61212c0f 1518struct value *
270140bd 1519address_of_variable (struct symbol *var, const struct block *b)
61212c0f
UW
1520{
1521 struct type *type = SYMBOL_TYPE (var);
1522 struct value *val;
1523
1524 /* Evaluate it first; if the result is a memory address, we're fine.
581e13c1 1525 Lazy evaluation pays off here. */
61212c0f
UW
1526
1527 val = value_of_variable (var, b);
1528
1529 if ((VALUE_LVAL (val) == lval_memory && value_lazy (val))
1530 || TYPE_CODE (type) == TYPE_CODE_FUNC)
1531 {
42ae5230 1532 CORE_ADDR addr = value_address (val);
a109c7c1 1533
61212c0f
UW
1534 return value_from_pointer (lookup_pointer_type (type), addr);
1535 }
1536
1537 /* Not a memory address; check what the problem was. */
1538 switch (VALUE_LVAL (val))
1539 {
1540 case lval_register:
1541 {
1542 struct frame_info *frame;
1543 const char *regname;
1544
1545 frame = frame_find_by_id (VALUE_FRAME_ID (val));
1546 gdb_assert (frame);
1547
1548 regname = gdbarch_register_name (get_frame_arch (frame),
1549 VALUE_REGNUM (val));
1550 gdb_assert (regname && *regname);
1551
1552 error (_("Address requested for identifier "
1553 "\"%s\" which is in register $%s"),
1554 SYMBOL_PRINT_NAME (var), regname);
1555 break;
1556 }
1557
1558 default:
1559 error (_("Can't take address of \"%s\" which isn't an lvalue."),
1560 SYMBOL_PRINT_NAME (var));
1561 break;
1562 }
1563
1564 return val;
1565}
1566
63092375
DJ
1567/* Return one if VAL does not live in target memory, but should in order
1568 to operate on it. Otherwise return zero. */
1569
1570int
1571value_must_coerce_to_target (struct value *val)
1572{
1573 struct type *valtype;
1574
1575 /* The only lval kinds which do not live in target memory. */
1576 if (VALUE_LVAL (val) != not_lval
1577 && VALUE_LVAL (val) != lval_internalvar)
1578 return 0;
1579
1580 valtype = check_typedef (value_type (val));
1581
1582 switch (TYPE_CODE (valtype))
1583 {
1584 case TYPE_CODE_ARRAY:
3cbaedff 1585 return TYPE_VECTOR (valtype) ? 0 : 1;
63092375
DJ
1586 case TYPE_CODE_STRING:
1587 return 1;
1588 default:
1589 return 0;
1590 }
1591}
1592
3e43a32a
MS
1593/* Make sure that VAL lives in target memory if it's supposed to. For
1594 instance, strings are constructed as character arrays in GDB's
1595 storage, and this function copies them to the target. */
63092375
DJ
1596
1597struct value *
1598value_coerce_to_target (struct value *val)
1599{
1600 LONGEST length;
1601 CORE_ADDR addr;
1602
1603 if (!value_must_coerce_to_target (val))
1604 return val;
1605
1606 length = TYPE_LENGTH (check_typedef (value_type (val)));
1607 addr = allocate_space_in_inferior (length);
1608 write_memory (addr, value_contents (val), length);
1609 return value_at_lazy (value_type (val), addr);
1610}
1611
ac3eeb49
MS
1612/* Given a value which is an array, return a value which is a pointer
1613 to its first element, regardless of whether or not the array has a
1614 nonzero lower bound.
c906108c 1615
ac3eeb49
MS
1616 FIXME: A previous comment here indicated that this routine should
1617 be substracting the array's lower bound. It's not clear to me that
1618 this is correct. Given an array subscripting operation, it would
1619 certainly work to do the adjustment here, essentially computing:
c906108c
SS
1620
1621 (&array[0] - (lowerbound * sizeof array[0])) + (index * sizeof array[0])
1622
ac3eeb49
MS
1623 However I believe a more appropriate and logical place to account
1624 for the lower bound is to do so in value_subscript, essentially
1625 computing:
c906108c
SS
1626
1627 (&array[0] + ((index - lowerbound) * sizeof array[0]))
1628
ac3eeb49
MS
1629 As further evidence consider what would happen with operations
1630 other than array subscripting, where the caller would get back a
1631 value that had an address somewhere before the actual first element
1632 of the array, and the information about the lower bound would be
581e13c1 1633 lost because of the coercion to pointer type. */
c906108c 1634
f23631e4
AC
1635struct value *
1636value_coerce_array (struct value *arg1)
c906108c 1637{
df407dfe 1638 struct type *type = check_typedef (value_type (arg1));
c906108c 1639
63092375
DJ
1640 /* If the user tries to do something requiring a pointer with an
1641 array that has not yet been pushed to the target, then this would
1642 be a good time to do so. */
1643 arg1 = value_coerce_to_target (arg1);
1644
c906108c 1645 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1646 error (_("Attempt to take address of value not located in memory."));
c906108c 1647
4478b372 1648 return value_from_pointer (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
42ae5230 1649 value_address (arg1));
c906108c
SS
1650}
1651
1652/* Given a value which is a function, return a value which is a pointer
1653 to it. */
1654
f23631e4
AC
1655struct value *
1656value_coerce_function (struct value *arg1)
c906108c 1657{
f23631e4 1658 struct value *retval;
c906108c
SS
1659
1660 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1661 error (_("Attempt to take address of value not located in memory."));
c906108c 1662
df407dfe 1663 retval = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1664 value_address (arg1));
c906108c 1665 return retval;
c5aa993b 1666}
c906108c 1667
ac3eeb49
MS
1668/* Return a pointer value for the object for which ARG1 is the
1669 contents. */
c906108c 1670
f23631e4
AC
1671struct value *
1672value_addr (struct value *arg1)
c906108c 1673{
f23631e4 1674 struct value *arg2;
df407dfe 1675 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1676
c906108c
SS
1677 if (TYPE_CODE (type) == TYPE_CODE_REF)
1678 {
ac3eeb49
MS
1679 /* Copy the value, but change the type from (T&) to (T*). We
1680 keep the same location information, which is efficient, and
1681 allows &(&X) to get the location containing the reference. */
c906108c 1682 arg2 = value_copy (arg1);
ac3eeb49
MS
1683 deprecated_set_value_type (arg2,
1684 lookup_pointer_type (TYPE_TARGET_TYPE (type)));
c906108c
SS
1685 return arg2;
1686 }
1687 if (TYPE_CODE (type) == TYPE_CODE_FUNC)
1688 return value_coerce_function (arg1);
1689
63092375
DJ
1690 /* If this is an array that has not yet been pushed to the target,
1691 then this would be a good time to force it to memory. */
1692 arg1 = value_coerce_to_target (arg1);
1693
c906108c 1694 if (VALUE_LVAL (arg1) != lval_memory)
8a3fe4f8 1695 error (_("Attempt to take address of value not located in memory."));
c906108c 1696
581e13c1 1697 /* Get target memory address. */
df407dfe 1698 arg2 = value_from_pointer (lookup_pointer_type (value_type (arg1)),
42ae5230 1699 (value_address (arg1)
13c3b5f5 1700 + value_embedded_offset (arg1)));
c906108c
SS
1701
1702 /* This may be a pointer to a base subobject; so remember the
ac3eeb49 1703 full derived object's type ... */
4dfea560
DE
1704 set_value_enclosing_type (arg2,
1705 lookup_pointer_type (value_enclosing_type (arg1)));
ac3eeb49
MS
1706 /* ... and also the relative position of the subobject in the full
1707 object. */
b44d461b 1708 set_value_pointed_to_offset (arg2, value_embedded_offset (arg1));
c906108c
SS
1709 return arg2;
1710}
1711
ac3eeb49
MS
1712/* Return a reference value for the object for which ARG1 is the
1713 contents. */
fb933624
DJ
1714
1715struct value *
1716value_ref (struct value *arg1)
1717{
1718 struct value *arg2;
fb933624 1719 struct type *type = check_typedef (value_type (arg1));
a109c7c1 1720
fb933624
DJ
1721 if (TYPE_CODE (type) == TYPE_CODE_REF)
1722 return arg1;
1723
1724 arg2 = value_addr (arg1);
1725 deprecated_set_value_type (arg2, lookup_reference_type (type));
1726 return arg2;
1727}
1728
ac3eeb49
MS
1729/* Given a value of a pointer type, apply the C unary * operator to
1730 it. */
c906108c 1731
f23631e4
AC
1732struct value *
1733value_ind (struct value *arg1)
c906108c
SS
1734{
1735 struct type *base_type;
f23631e4 1736 struct value *arg2;
c906108c 1737
994b9211 1738 arg1 = coerce_array (arg1);
c906108c 1739
df407dfe 1740 base_type = check_typedef (value_type (arg1));
c906108c 1741
8cf6f0b1
TT
1742 if (VALUE_LVAL (arg1) == lval_computed)
1743 {
c8f2448a 1744 const struct lval_funcs *funcs = value_computed_funcs (arg1);
8cf6f0b1
TT
1745
1746 if (funcs->indirect)
1747 {
1748 struct value *result = funcs->indirect (arg1);
1749
1750 if (result)
1751 return result;
1752 }
1753 }
1754
22fe0fbb 1755 if (TYPE_CODE (base_type) == TYPE_CODE_PTR)
c906108c
SS
1756 {
1757 struct type *enc_type;
a109c7c1 1758
ac3eeb49
MS
1759 /* We may be pointing to something embedded in a larger object.
1760 Get the real type of the enclosing object. */
4754a64e 1761 enc_type = check_typedef (value_enclosing_type (arg1));
c906108c 1762 enc_type = TYPE_TARGET_TYPE (enc_type);
0d5de010
DJ
1763
1764 if (TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_FUNC
1765 || TYPE_CODE (check_typedef (enc_type)) == TYPE_CODE_METHOD)
1766 /* For functions, go through find_function_addr, which knows
1767 how to handle function descriptors. */
ac3eeb49
MS
1768 arg2 = value_at_lazy (enc_type,
1769 find_function_addr (arg1, NULL));
0d5de010 1770 else
581e13c1 1771 /* Retrieve the enclosing object pointed to. */
ac3eeb49
MS
1772 arg2 = value_at_lazy (enc_type,
1773 (value_as_address (arg1)
1774 - value_pointed_to_offset (arg1)));
0d5de010 1775
dfcee124 1776 return readjust_indirect_value_type (arg2, enc_type, base_type, arg1);
c906108c
SS
1777 }
1778
8a3fe4f8 1779 error (_("Attempt to take contents of a non-pointer value."));
ac3eeb49 1780 return 0; /* For lint -- never reached. */
c906108c
SS
1781}
1782\f
39d37385
PA
1783/* Create a value for an array by allocating space in GDB, copying the
1784 data into that space, and then setting up an array value.
c906108c 1785
ac3eeb49
MS
1786 The array bounds are set from LOWBOUND and HIGHBOUND, and the array
1787 is populated from the values passed in ELEMVEC.
c906108c
SS
1788
1789 The element type of the array is inherited from the type of the
1790 first element, and all elements must have the same size (though we
ac3eeb49 1791 don't currently enforce any restriction on their types). */
c906108c 1792
f23631e4
AC
1793struct value *
1794value_array (int lowbound, int highbound, struct value **elemvec)
c906108c
SS
1795{
1796 int nelem;
1797 int idx;
1798 unsigned int typelength;
f23631e4 1799 struct value *val;
c906108c 1800 struct type *arraytype;
c906108c 1801
ac3eeb49
MS
1802 /* Validate that the bounds are reasonable and that each of the
1803 elements have the same size. */
c906108c
SS
1804
1805 nelem = highbound - lowbound + 1;
1806 if (nelem <= 0)
1807 {
8a3fe4f8 1808 error (_("bad array bounds (%d, %d)"), lowbound, highbound);
c906108c 1809 }
4754a64e 1810 typelength = TYPE_LENGTH (value_enclosing_type (elemvec[0]));
c906108c
SS
1811 for (idx = 1; idx < nelem; idx++)
1812 {
4754a64e 1813 if (TYPE_LENGTH (value_enclosing_type (elemvec[idx])) != typelength)
c906108c 1814 {
8a3fe4f8 1815 error (_("array elements must all be the same size"));
c906108c
SS
1816 }
1817 }
1818
e3506a9f
UW
1819 arraytype = lookup_array_range_type (value_enclosing_type (elemvec[0]),
1820 lowbound, highbound);
c906108c
SS
1821
1822 if (!current_language->c_style_arrays)
1823 {
1824 val = allocate_value (arraytype);
1825 for (idx = 0; idx < nelem; idx++)
39d37385
PA
1826 value_contents_copy (val, idx * typelength, elemvec[idx], 0,
1827 typelength);
c906108c
SS
1828 return val;
1829 }
1830
63092375
DJ
1831 /* Allocate space to store the array, and then initialize it by
1832 copying in each element. */
c906108c 1833
63092375 1834 val = allocate_value (arraytype);
c906108c 1835 for (idx = 0; idx < nelem; idx++)
39d37385 1836 value_contents_copy (val, idx * typelength, elemvec[idx], 0, typelength);
63092375 1837 return val;
c906108c
SS
1838}
1839
6c7a06a3 1840struct value *
63375b74 1841value_cstring (char *ptr, ssize_t len, struct type *char_type)
6c7a06a3
TT
1842{
1843 struct value *val;
1844 int lowbound = current_language->string_lower_bound;
63375b74 1845 ssize_t highbound = len / TYPE_LENGTH (char_type);
6c7a06a3 1846 struct type *stringtype
e3506a9f 1847 = lookup_array_range_type (char_type, lowbound, highbound + lowbound - 1);
6c7a06a3
TT
1848
1849 val = allocate_value (stringtype);
1850 memcpy (value_contents_raw (val), ptr, len);
1851 return val;
1852}
1853
ac3eeb49
MS
1854/* Create a value for a string constant by allocating space in the
1855 inferior, copying the data into that space, and returning the
1856 address with type TYPE_CODE_STRING. PTR points to the string
1857 constant data; LEN is number of characters.
1858
1859 Note that string types are like array of char types with a lower
1860 bound of zero and an upper bound of LEN - 1. Also note that the
1861 string may contain embedded null bytes. */
c906108c 1862
f23631e4 1863struct value *
63375b74 1864value_string (char *ptr, ssize_t len, struct type *char_type)
c906108c 1865{
f23631e4 1866 struct value *val;
c906108c 1867 int lowbound = current_language->string_lower_bound;
63375b74 1868 ssize_t highbound = len / TYPE_LENGTH (char_type);
c906108c 1869 struct type *stringtype
e3506a9f 1870 = lookup_string_range_type (char_type, lowbound, highbound + lowbound - 1);
c906108c 1871
3b7538c0
UW
1872 val = allocate_value (stringtype);
1873 memcpy (value_contents_raw (val), ptr, len);
1874 return val;
c906108c
SS
1875}
1876
c906108c 1877\f
ac3eeb49
MS
1878/* See if we can pass arguments in T2 to a function which takes
1879 arguments of types T1. T1 is a list of NARGS arguments, and T2 is
1880 a NULL-terminated vector. If some arguments need coercion of some
1881 sort, then the coerced values are written into T2. Return value is
1882 0 if the arguments could be matched, or the position at which they
1883 differ if not.
c906108c 1884
ac3eeb49
MS
1885 STATICP is nonzero if the T1 argument list came from a static
1886 member function. T2 will still include the ``this'' pointer, but
1887 it will be skipped.
c906108c
SS
1888
1889 For non-static member functions, we ignore the first argument,
ac3eeb49
MS
1890 which is the type of the instance variable. This is because we
1891 want to handle calls with objects from derived classes. This is
1892 not entirely correct: we should actually check to make sure that a
c906108c
SS
1893 requested operation is type secure, shouldn't we? FIXME. */
1894
1895static int
ad2f7632
DJ
1896typecmp (int staticp, int varargs, int nargs,
1897 struct field t1[], struct value *t2[])
c906108c
SS
1898{
1899 int i;
1900
1901 if (t2 == 0)
ac3eeb49
MS
1902 internal_error (__FILE__, __LINE__,
1903 _("typecmp: no argument list"));
ad2f7632 1904
ac3eeb49
MS
1905 /* Skip ``this'' argument if applicable. T2 will always include
1906 THIS. */
4a1970e4 1907 if (staticp)
ad2f7632
DJ
1908 t2 ++;
1909
1910 for (i = 0;
1911 (i < nargs) && TYPE_CODE (t1[i].type) != TYPE_CODE_VOID;
1912 i++)
c906108c 1913 {
c5aa993b 1914 struct type *tt1, *tt2;
ad2f7632 1915
c5aa993b
JM
1916 if (!t2[i])
1917 return i + 1;
ad2f7632
DJ
1918
1919 tt1 = check_typedef (t1[i].type);
df407dfe 1920 tt2 = check_typedef (value_type (t2[i]));
ad2f7632 1921
c906108c 1922 if (TYPE_CODE (tt1) == TYPE_CODE_REF
c5aa993b 1923 /* We should be doing hairy argument matching, as below. */
3e43a32a
MS
1924 && (TYPE_CODE (check_typedef (TYPE_TARGET_TYPE (tt1)))
1925 == TYPE_CODE (tt2)))
c906108c
SS
1926 {
1927 if (TYPE_CODE (tt2) == TYPE_CODE_ARRAY)
1928 t2[i] = value_coerce_array (t2[i]);
1929 else
fb933624 1930 t2[i] = value_ref (t2[i]);
c906108c
SS
1931 continue;
1932 }
1933
802db21b
DB
1934 /* djb - 20000715 - Until the new type structure is in the
1935 place, and we can attempt things like implicit conversions,
1936 we need to do this so you can take something like a map<const
1937 char *>, and properly access map["hello"], because the
1938 argument to [] will be a reference to a pointer to a char,
ac3eeb49
MS
1939 and the argument will be a pointer to a char. */
1940 while (TYPE_CODE(tt1) == TYPE_CODE_REF
1941 || TYPE_CODE (tt1) == TYPE_CODE_PTR)
802db21b
DB
1942 {
1943 tt1 = check_typedef( TYPE_TARGET_TYPE(tt1) );
1944 }
ac3eeb49
MS
1945 while (TYPE_CODE(tt2) == TYPE_CODE_ARRAY
1946 || TYPE_CODE(tt2) == TYPE_CODE_PTR
1947 || TYPE_CODE(tt2) == TYPE_CODE_REF)
c906108c 1948 {
ac3eeb49 1949 tt2 = check_typedef (TYPE_TARGET_TYPE(tt2));
c906108c 1950 }
c5aa993b
JM
1951 if (TYPE_CODE (tt1) == TYPE_CODE (tt2))
1952 continue;
ac3eeb49
MS
1953 /* Array to pointer is a `trivial conversion' according to the
1954 ARM. */
c906108c 1955
ac3eeb49
MS
1956 /* We should be doing much hairier argument matching (see
1957 section 13.2 of the ARM), but as a quick kludge, just check
1958 for the same type code. */
df407dfe 1959 if (TYPE_CODE (t1[i].type) != TYPE_CODE (value_type (t2[i])))
c5aa993b 1960 return i + 1;
c906108c 1961 }
ad2f7632 1962 if (varargs || t2[i] == NULL)
c5aa993b 1963 return 0;
ad2f7632 1964 return i + 1;
c906108c
SS
1965}
1966
b1af9e97
TT
1967/* Helper class for do_search_struct_field that updates *RESULT_PTR
1968 and *LAST_BOFFSET, and possibly throws an exception if the field
1969 search has yielded ambiguous results. */
c906108c 1970
b1af9e97
TT
1971static void
1972update_search_result (struct value **result_ptr, struct value *v,
1973 int *last_boffset, int boffset,
1974 const char *name, struct type *type)
1975{
1976 if (v != NULL)
1977 {
1978 if (*result_ptr != NULL
1979 /* The result is not ambiguous if all the classes that are
1980 found occupy the same space. */
1981 && *last_boffset != boffset)
1982 error (_("base class '%s' is ambiguous in type '%s'"),
1983 name, TYPE_SAFE_NAME (type));
1984 *result_ptr = v;
1985 *last_boffset = boffset;
1986 }
1987}
c906108c 1988
b1af9e97
TT
1989/* A helper for search_struct_field. This does all the work; most
1990 arguments are as passed to search_struct_field. The result is
1991 stored in *RESULT_PTR, which must be initialized to NULL.
1992 OUTERMOST_TYPE is the type of the initial type passed to
1993 search_struct_field; this is used for error reporting when the
1994 lookup is ambiguous. */
1995
1996static void
1997do_search_struct_field (const char *name, struct value *arg1, int offset,
1998 struct type *type, int looking_for_baseclass,
1999 struct value **result_ptr,
2000 int *last_boffset,
2001 struct type *outermost_type)
c906108c
SS
2002{
2003 int i;
edf3d5f3 2004 int nbases;
c906108c
SS
2005
2006 CHECK_TYPEDEF (type);
edf3d5f3 2007 nbases = TYPE_N_BASECLASSES (type);
c906108c 2008
c5aa993b 2009 if (!looking_for_baseclass)
c906108c
SS
2010 for (i = TYPE_NFIELDS (type) - 1; i >= nbases; i--)
2011 {
0d5cff50 2012 const char *t_field_name = TYPE_FIELD_NAME (type, i);
c906108c 2013
db577aea 2014 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c 2015 {
f23631e4 2016 struct value *v;
a109c7c1 2017
d6a843b5 2018 if (field_is_static (&TYPE_FIELD (type, i)))
2c2738a0
DC
2019 {
2020 v = value_static_field (type, i);
2021 if (v == 0)
3e43a32a
MS
2022 error (_("field %s is nonexistent or "
2023 "has been optimized out"),
2c2738a0
DC
2024 name);
2025 }
c906108c 2026 else
b1af9e97
TT
2027 v = value_primitive_field (arg1, offset, i, type);
2028 *result_ptr = v;
2029 return;
c906108c
SS
2030 }
2031
2032 if (t_field_name
2033 && (t_field_name[0] == '\0'
2034 || (TYPE_CODE (type) == TYPE_CODE_UNION
db577aea 2035 && (strcmp_iw (t_field_name, "else") == 0))))
c906108c
SS
2036 {
2037 struct type *field_type = TYPE_FIELD_TYPE (type, i);
a109c7c1 2038
c906108c
SS
2039 if (TYPE_CODE (field_type) == TYPE_CODE_UNION
2040 || TYPE_CODE (field_type) == TYPE_CODE_STRUCT)
2041 {
ac3eeb49
MS
2042 /* Look for a match through the fields of an anonymous
2043 union, or anonymous struct. C++ provides anonymous
2044 unions.
c906108c 2045
1b831c93
AC
2046 In the GNU Chill (now deleted from GDB)
2047 implementation of variant record types, each
2048 <alternative field> has an (anonymous) union type,
2049 each member of the union represents a <variant
2050 alternative>. Each <variant alternative> is
2051 represented as a struct, with a member for each
2052 <variant field>. */
c5aa993b 2053
b1af9e97 2054 struct value *v = NULL;
c906108c
SS
2055 int new_offset = offset;
2056
db034ac5
AC
2057 /* This is pretty gross. In G++, the offset in an
2058 anonymous union is relative to the beginning of the
1b831c93
AC
2059 enclosing struct. In the GNU Chill (now deleted
2060 from GDB) implementation of variant records, the
2061 bitpos is zero in an anonymous union field, so we
ac3eeb49 2062 have to add the offset of the union here. */
c906108c
SS
2063 if (TYPE_CODE (field_type) == TYPE_CODE_STRUCT
2064 || (TYPE_NFIELDS (field_type) > 0
2065 && TYPE_FIELD_BITPOS (field_type, 0) == 0))
2066 new_offset += TYPE_FIELD_BITPOS (type, i) / 8;
2067
b1af9e97
TT
2068 do_search_struct_field (name, arg1, new_offset,
2069 field_type,
2070 looking_for_baseclass, &v,
2071 last_boffset,
2072 outermost_type);
c906108c 2073 if (v)
b1af9e97
TT
2074 {
2075 *result_ptr = v;
2076 return;
2077 }
c906108c
SS
2078 }
2079 }
2080 }
2081
c5aa993b 2082 for (i = 0; i < nbases; i++)
c906108c 2083 {
b1af9e97 2084 struct value *v = NULL;
c906108c 2085 struct type *basetype = check_typedef (TYPE_BASECLASS (type, i));
ac3eeb49
MS
2086 /* If we are looking for baseclasses, this is what we get when
2087 we hit them. But it could happen that the base part's member
2088 name is not yet filled in. */
c906108c
SS
2089 int found_baseclass = (looking_for_baseclass
2090 && TYPE_BASECLASS_NAME (type, i) != NULL
ac3eeb49
MS
2091 && (strcmp_iw (name,
2092 TYPE_BASECLASS_NAME (type,
2093 i)) == 0));
b1af9e97 2094 int boffset = value_embedded_offset (arg1) + offset;
c906108c
SS
2095
2096 if (BASETYPE_VIA_VIRTUAL (type, i))
2097 {
3e3d7139 2098 struct value *v2;
c906108c
SS
2099
2100 boffset = baseclass_offset (type, i,
8af8e3bc
PA
2101 value_contents_for_printing (arg1),
2102 value_embedded_offset (arg1) + offset,
2103 value_address (arg1),
2104 arg1);
c906108c 2105
ac3eeb49 2106 /* The virtual base class pointer might have been clobbered
581e13c1 2107 by the user program. Make sure that it still points to a
ac3eeb49 2108 valid memory location. */
c906108c 2109
1a334831
TT
2110 boffset += value_embedded_offset (arg1) + offset;
2111 if (boffset < 0
2112 || boffset >= TYPE_LENGTH (value_enclosing_type (arg1)))
c906108c
SS
2113 {
2114 CORE_ADDR base_addr;
c5aa993b 2115
3e3d7139 2116 v2 = allocate_value (basetype);
42ae5230 2117 base_addr = value_address (arg1) + boffset;
ac3eeb49
MS
2118 if (target_read_memory (base_addr,
2119 value_contents_raw (v2),
c906108c 2120 TYPE_LENGTH (basetype)) != 0)
8a3fe4f8 2121 error (_("virtual baseclass botch"));
c906108c 2122 VALUE_LVAL (v2) = lval_memory;
42ae5230 2123 set_value_address (v2, base_addr);
c906108c
SS
2124 }
2125 else
2126 {
1a334831
TT
2127 v2 = value_copy (arg1);
2128 deprecated_set_value_type (v2, basetype);
2129 set_value_embedded_offset (v2, boffset);
c906108c
SS
2130 }
2131
2132 if (found_baseclass)
b1af9e97
TT
2133 v = v2;
2134 else
2135 {
2136 do_search_struct_field (name, v2, 0,
2137 TYPE_BASECLASS (type, i),
2138 looking_for_baseclass,
2139 result_ptr, last_boffset,
2140 outermost_type);
2141 }
c906108c
SS
2142 }
2143 else if (found_baseclass)
2144 v = value_primitive_field (arg1, offset, i, type);
2145 else
b1af9e97
TT
2146 {
2147 do_search_struct_field (name, arg1,
2148 offset + TYPE_BASECLASS_BITPOS (type,
2149 i) / 8,
2150 basetype, looking_for_baseclass,
2151 result_ptr, last_boffset,
2152 outermost_type);
2153 }
2154
2155 update_search_result (result_ptr, v, last_boffset,
2156 boffset, name, outermost_type);
c906108c 2157 }
b1af9e97
TT
2158}
2159
2160/* Helper function used by value_struct_elt to recurse through
2161 baseclasses. Look for a field NAME in ARG1. Adjust the address of
2162 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2163 TYPE. If found, return value, else return NULL.
2164
2165 If LOOKING_FOR_BASECLASS, then instead of looking for struct
2166 fields, look for a baseclass named NAME. */
2167
2168static struct value *
2169search_struct_field (const char *name, struct value *arg1, int offset,
2170 struct type *type, int looking_for_baseclass)
2171{
2172 struct value *result = NULL;
2173 int boffset = 0;
2174
2175 do_search_struct_field (name, arg1, offset, type, looking_for_baseclass,
2176 &result, &boffset, type);
2177 return result;
c906108c
SS
2178}
2179
ac3eeb49 2180/* Helper function used by value_struct_elt to recurse through
581e13c1 2181 baseclasses. Look for a field NAME in ARG1. Adjust the address of
ac3eeb49
MS
2182 ARG1 by OFFSET bytes, and search in it assuming it has (class) type
2183 TYPE.
2184
2185 If found, return value, else if name matched and args not return
2186 (value) -1, else return NULL. */
c906108c 2187
f23631e4 2188static struct value *
714f19d5 2189search_struct_method (const char *name, struct value **arg1p,
f23631e4 2190 struct value **args, int offset,
aa1ee363 2191 int *static_memfuncp, struct type *type)
c906108c
SS
2192{
2193 int i;
f23631e4 2194 struct value *v;
c906108c
SS
2195 int name_matched = 0;
2196 char dem_opname[64];
2197
2198 CHECK_TYPEDEF (type);
2199 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
2200 {
0d5cff50 2201 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2202
581e13c1 2203 /* FIXME! May need to check for ARM demangling here. */
c5aa993b
JM
2204 if (strncmp (t_field_name, "__", 2) == 0 ||
2205 strncmp (t_field_name, "op", 2) == 0 ||
2206 strncmp (t_field_name, "type", 4) == 0)
c906108c 2207 {
c5aa993b
JM
2208 if (cplus_demangle_opname (t_field_name, dem_opname, DMGL_ANSI))
2209 t_field_name = dem_opname;
2210 else if (cplus_demangle_opname (t_field_name, dem_opname, 0))
c906108c 2211 t_field_name = dem_opname;
c906108c 2212 }
db577aea 2213 if (t_field_name && (strcmp_iw (t_field_name, name) == 0))
c906108c
SS
2214 {
2215 int j = TYPE_FN_FIELDLIST_LENGTH (type, i) - 1;
2216 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
c906108c 2217
a109c7c1 2218 name_matched = 1;
de17c821 2219 check_stub_method_group (type, i);
c906108c 2220 if (j > 0 && args == 0)
3e43a32a
MS
2221 error (_("cannot resolve overloaded method "
2222 "`%s': no arguments supplied"), name);
acf5ed49 2223 else if (j == 0 && args == 0)
c906108c 2224 {
acf5ed49
DJ
2225 v = value_fn_field (arg1p, f, j, type, offset);
2226 if (v != NULL)
2227 return v;
c906108c 2228 }
acf5ed49
DJ
2229 else
2230 while (j >= 0)
2231 {
acf5ed49 2232 if (!typecmp (TYPE_FN_FIELD_STATIC_P (f, j),
ad2f7632
DJ
2233 TYPE_VARARGS (TYPE_FN_FIELD_TYPE (f, j)),
2234 TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (f, j)),
acf5ed49
DJ
2235 TYPE_FN_FIELD_ARGS (f, j), args))
2236 {
2237 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
ac3eeb49
MS
2238 return value_virtual_fn_field (arg1p, f, j,
2239 type, offset);
2240 if (TYPE_FN_FIELD_STATIC_P (f, j)
2241 && static_memfuncp)
acf5ed49
DJ
2242 *static_memfuncp = 1;
2243 v = value_fn_field (arg1p, f, j, type, offset);
2244 if (v != NULL)
2245 return v;
2246 }
2247 j--;
2248 }
c906108c
SS
2249 }
2250 }
2251
2252 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2253 {
2254 int base_offset;
8af8e3bc
PA
2255 int skip = 0;
2256 int this_offset;
c906108c
SS
2257
2258 if (BASETYPE_VIA_VIRTUAL (type, i))
2259 {
086280be 2260 struct type *baseclass = check_typedef (TYPE_BASECLASS (type, i));
8af8e3bc 2261 struct value *base_val;
086280be
UW
2262 const gdb_byte *base_valaddr;
2263
2264 /* The virtual base class pointer might have been
581e13c1 2265 clobbered by the user program. Make sure that it
086280be
UW
2266 still points to a valid memory location. */
2267
2268 if (offset < 0 || offset >= TYPE_LENGTH (type))
c5aa993b 2269 {
6c18f3e0
SP
2270 gdb_byte *tmp;
2271 struct cleanup *back_to;
2272 CORE_ADDR address;
2273
2274 tmp = xmalloc (TYPE_LENGTH (baseclass));
2275 back_to = make_cleanup (xfree, tmp);
2276 address = value_address (*arg1p);
a109c7c1 2277
8af8e3bc 2278 if (target_read_memory (address + offset,
086280be
UW
2279 tmp, TYPE_LENGTH (baseclass)) != 0)
2280 error (_("virtual baseclass botch"));
8af8e3bc
PA
2281
2282 base_val = value_from_contents_and_address (baseclass,
2283 tmp,
2284 address + offset);
2285 base_valaddr = value_contents_for_printing (base_val);
2286 this_offset = 0;
6c18f3e0 2287 do_cleanups (back_to);
c5aa993b
JM
2288 }
2289 else
8af8e3bc
PA
2290 {
2291 base_val = *arg1p;
2292 base_valaddr = value_contents_for_printing (*arg1p);
2293 this_offset = offset;
2294 }
c5aa993b 2295
086280be 2296 base_offset = baseclass_offset (type, i, base_valaddr,
8af8e3bc
PA
2297 this_offset, value_address (base_val),
2298 base_val);
c5aa993b 2299 }
c906108c
SS
2300 else
2301 {
2302 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2303 }
c906108c
SS
2304 v = search_struct_method (name, arg1p, args, base_offset + offset,
2305 static_memfuncp, TYPE_BASECLASS (type, i));
f23631e4 2306 if (v == (struct value *) - 1)
c906108c
SS
2307 {
2308 name_matched = 1;
2309 }
2310 else if (v)
2311 {
ac3eeb49
MS
2312 /* FIXME-bothner: Why is this commented out? Why is it here? */
2313 /* *arg1p = arg1_tmp; */
c906108c 2314 return v;
c5aa993b 2315 }
c906108c 2316 }
c5aa993b 2317 if (name_matched)
f23631e4 2318 return (struct value *) - 1;
c5aa993b
JM
2319 else
2320 return NULL;
c906108c
SS
2321}
2322
2323/* Given *ARGP, a value of type (pointer to a)* structure/union,
ac3eeb49
MS
2324 extract the component named NAME from the ultimate target
2325 structure/union and return it as a value with its appropriate type.
c906108c
SS
2326 ERR is used in the error message if *ARGP's type is wrong.
2327
2328 C++: ARGS is a list of argument types to aid in the selection of
581e13c1 2329 an appropriate method. Also, handle derived types.
c906108c
SS
2330
2331 STATIC_MEMFUNCP, if non-NULL, points to a caller-supplied location
2332 where the truthvalue of whether the function that was resolved was
2333 a static member function or not is stored.
2334
ac3eeb49
MS
2335 ERR is an error message to be printed in case the field is not
2336 found. */
c906108c 2337
f23631e4
AC
2338struct value *
2339value_struct_elt (struct value **argp, struct value **args,
714f19d5 2340 const char *name, int *static_memfuncp, const char *err)
c906108c 2341{
52f0bd74 2342 struct type *t;
f23631e4 2343 struct value *v;
c906108c 2344
994b9211 2345 *argp = coerce_array (*argp);
c906108c 2346
df407dfe 2347 t = check_typedef (value_type (*argp));
c906108c
SS
2348
2349 /* Follow pointers until we get to a non-pointer. */
2350
2351 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2352 {
2353 *argp = value_ind (*argp);
2354 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2355 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2356 *argp = coerce_array (*argp);
df407dfe 2357 t = check_typedef (value_type (*argp));
c906108c
SS
2358 }
2359
c5aa993b 2360 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 2361 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2362 error (_("Attempt to extract a component of a value that is not a %s."),
2363 err);
c906108c
SS
2364
2365 /* Assume it's not, unless we see that it is. */
2366 if (static_memfuncp)
c5aa993b 2367 *static_memfuncp = 0;
c906108c
SS
2368
2369 if (!args)
2370 {
2371 /* if there are no arguments ...do this... */
2372
ac3eeb49
MS
2373 /* Try as a field first, because if we succeed, there is less
2374 work to be done. */
c906108c
SS
2375 v = search_struct_field (name, *argp, 0, t, 0);
2376 if (v)
2377 return v;
2378
2379 /* C++: If it was not found as a data field, then try to
7b83ea04 2380 return it as a pointer to a method. */
ac3eeb49
MS
2381 v = search_struct_method (name, argp, args, 0,
2382 static_memfuncp, t);
c906108c 2383
f23631e4 2384 if (v == (struct value *) - 1)
55b39184 2385 error (_("Cannot take address of method %s."), name);
c906108c
SS
2386 else if (v == 0)
2387 {
2388 if (TYPE_NFN_FIELDS (t))
8a3fe4f8 2389 error (_("There is no member or method named %s."), name);
c906108c 2390 else
8a3fe4f8 2391 error (_("There is no member named %s."), name);
c906108c
SS
2392 }
2393 return v;
2394 }
2395
ac3eeb49
MS
2396 v = search_struct_method (name, argp, args, 0,
2397 static_memfuncp, t);
7168a814 2398
f23631e4 2399 if (v == (struct value *) - 1)
c906108c 2400 {
3e43a32a
MS
2401 error (_("One of the arguments you tried to pass to %s could not "
2402 "be converted to what the function wants."), name);
c906108c
SS
2403 }
2404 else if (v == 0)
2405 {
ac3eeb49
MS
2406 /* See if user tried to invoke data as function. If so, hand it
2407 back. If it's not callable (i.e., a pointer to function),
7b83ea04 2408 gdb should give an error. */
c906108c 2409 v = search_struct_field (name, *argp, 0, t, 0);
fa8de41e
TT
2410 /* If we found an ordinary field, then it is not a method call.
2411 So, treat it as if it were a static member function. */
2412 if (v && static_memfuncp)
2413 *static_memfuncp = 1;
c906108c
SS
2414 }
2415
2416 if (!v)
79afc5ef
SW
2417 throw_error (NOT_FOUND_ERROR,
2418 _("Structure has no component named %s."), name);
c906108c
SS
2419 return v;
2420}
2421
ac3eeb49 2422/* Search through the methods of an object (and its bases) to find a
cfe9eade 2423 specified method. Return the pointer to the fn_field list of
ac3eeb49
MS
2424 overloaded instances.
2425
2426 Helper function for value_find_oload_list.
2427 ARGP is a pointer to a pointer to a value (the object).
2428 METHOD is a string containing the method name.
2429 OFFSET is the offset within the value.
2430 TYPE is the assumed type of the object.
2431 NUM_FNS is the number of overloaded instances.
2432 BASETYPE is set to the actual type of the subobject where the
2433 method is found.
581e13c1 2434 BOFFSET is the offset of the base subobject where the method is found. */
c906108c 2435
7a292a7a 2436static struct fn_field *
714f19d5 2437find_method_list (struct value **argp, const char *method,
ac3eeb49 2438 int offset, struct type *type, int *num_fns,
fba45db2 2439 struct type **basetype, int *boffset)
c906108c
SS
2440{
2441 int i;
c5aa993b 2442 struct fn_field *f;
c906108c
SS
2443 CHECK_TYPEDEF (type);
2444
2445 *num_fns = 0;
2446
ac3eeb49 2447 /* First check in object itself. */
c5aa993b 2448 for (i = TYPE_NFN_FIELDS (type) - 1; i >= 0; i--)
c906108c 2449 {
ac3eeb49 2450 /* pai: FIXME What about operators and type conversions? */
0d5cff50 2451 const char *fn_field_name = TYPE_FN_FIELDLIST_NAME (type, i);
a109c7c1 2452
db577aea 2453 if (fn_field_name && (strcmp_iw (fn_field_name, method) == 0))
c5aa993b 2454 {
4a1970e4
DJ
2455 int len = TYPE_FN_FIELDLIST_LENGTH (type, i);
2456 struct fn_field *f = TYPE_FN_FIELDLIST1 (type, i);
4a1970e4
DJ
2457
2458 *num_fns = len;
c5aa993b
JM
2459 *basetype = type;
2460 *boffset = offset;
4a1970e4 2461
de17c821
DJ
2462 /* Resolve any stub methods. */
2463 check_stub_method_group (type, i);
4a1970e4
DJ
2464
2465 return f;
c5aa993b
JM
2466 }
2467 }
2468
ac3eeb49 2469 /* Not found in object, check in base subobjects. */
c906108c
SS
2470 for (i = TYPE_N_BASECLASSES (type) - 1; i >= 0; i--)
2471 {
2472 int base_offset;
a109c7c1 2473
c906108c
SS
2474 if (BASETYPE_VIA_VIRTUAL (type, i))
2475 {
086280be 2476 base_offset = baseclass_offset (type, i,
8af8e3bc
PA
2477 value_contents_for_printing (*argp),
2478 value_offset (*argp) + offset,
2479 value_address (*argp), *argp);
c5aa993b 2480 }
ac3eeb49
MS
2481 else /* Non-virtual base, simply use bit position from debug
2482 info. */
c906108c
SS
2483 {
2484 base_offset = TYPE_BASECLASS_BITPOS (type, i) / 8;
c5aa993b 2485 }
c906108c 2486 f = find_method_list (argp, method, base_offset + offset,
ac3eeb49
MS
2487 TYPE_BASECLASS (type, i), num_fns,
2488 basetype, boffset);
c906108c 2489 if (f)
c5aa993b 2490 return f;
c906108c 2491 }
c5aa993b 2492 return NULL;
c906108c
SS
2493}
2494
2495/* Return the list of overloaded methods of a specified name.
ac3eeb49
MS
2496
2497 ARGP is a pointer to a pointer to a value (the object).
2498 METHOD is the method name.
2499 OFFSET is the offset within the value contents.
2500 NUM_FNS is the number of overloaded instances.
2501 BASETYPE is set to the type of the base subobject that defines the
2502 method.
581e13c1 2503 BOFFSET is the offset of the base subobject which defines the method. */
c906108c 2504
6598ed07 2505static struct fn_field *
714f19d5 2506value_find_oload_method_list (struct value **argp, const char *method,
ac3eeb49
MS
2507 int offset, int *num_fns,
2508 struct type **basetype, int *boffset)
c906108c 2509{
c5aa993b 2510 struct type *t;
c906108c 2511
df407dfe 2512 t = check_typedef (value_type (*argp));
c906108c 2513
ac3eeb49 2514 /* Code snarfed from value_struct_elt. */
c906108c
SS
2515 while (TYPE_CODE (t) == TYPE_CODE_PTR || TYPE_CODE (t) == TYPE_CODE_REF)
2516 {
2517 *argp = value_ind (*argp);
2518 /* Don't coerce fn pointer to fn and then back again! */
df407dfe 2519 if (TYPE_CODE (value_type (*argp)) != TYPE_CODE_FUNC)
994b9211 2520 *argp = coerce_array (*argp);
df407dfe 2521 t = check_typedef (value_type (*argp));
c906108c 2522 }
c5aa993b 2523
c5aa993b
JM
2524 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
2525 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
2526 error (_("Attempt to extract a component of a "
2527 "value that is not a struct or union"));
c5aa993b 2528
ac3eeb49
MS
2529 return find_method_list (argp, method, 0, t, num_fns,
2530 basetype, boffset);
c906108c
SS
2531}
2532
da096638 2533/* Given an array of arguments (ARGS) (which includes an
c906108c
SS
2534 entry for "this" in the case of C++ methods), the number of
2535 arguments NARGS, the NAME of a function whether it's a method or
2536 not (METHOD), and the degree of laxness (LAX) in conforming to
2537 overload resolution rules in ANSI C++, find the best function that
2538 matches on the argument types according to the overload resolution
2539 rules.
2540
4c3376c8
SW
2541 METHOD can be one of three values:
2542 NON_METHOD for non-member functions.
2543 METHOD: for member functions.
2544 BOTH: used for overload resolution of operators where the
2545 candidates are expected to be either member or non member
581e13c1 2546 functions. In this case the first argument ARGTYPES
4c3376c8
SW
2547 (representing 'this') is expected to be a reference to the
2548 target object, and will be dereferenced when attempting the
2549 non-member search.
2550
c906108c
SS
2551 In the case of class methods, the parameter OBJ is an object value
2552 in which to search for overloaded methods.
2553
2554 In the case of non-method functions, the parameter FSYM is a symbol
2555 corresponding to one of the overloaded functions.
2556
2557 Return value is an integer: 0 -> good match, 10 -> debugger applied
2558 non-standard coercions, 100 -> incompatible.
2559
2560 If a method is being searched for, VALP will hold the value.
ac3eeb49
MS
2561 If a non-method is being searched for, SYMP will hold the symbol
2562 for it.
c906108c
SS
2563
2564 If a method is being searched for, and it is a static method,
2565 then STATICP will point to a non-zero value.
2566
7322dca9
SW
2567 If NO_ADL argument dependent lookup is disabled. This is used to prevent
2568 ADL overload candidates when performing overload resolution for a fully
2569 qualified name.
2570
c906108c
SS
2571 Note: This function does *not* check the value of
2572 overload_resolution. Caller must check it to see whether overload
581e13c1 2573 resolution is permitted. */
c906108c
SS
2574
2575int
da096638 2576find_overload_match (struct value **args, int nargs,
4c3376c8
SW
2577 const char *name, enum oload_search_type method,
2578 int lax, struct value **objp, struct symbol *fsym,
ac3eeb49 2579 struct value **valp, struct symbol **symp,
7322dca9 2580 int *staticp, const int no_adl)
c906108c 2581{
7f8c9282 2582 struct value *obj = (objp ? *objp : NULL);
da096638 2583 struct type *obj_type = obj ? value_type (obj) : NULL;
ac3eeb49 2584 /* Index of best overloaded function. */
4c3376c8
SW
2585 int func_oload_champ = -1;
2586 int method_oload_champ = -1;
2587
ac3eeb49 2588 /* The measure for the current best match. */
4c3376c8
SW
2589 struct badness_vector *method_badness = NULL;
2590 struct badness_vector *func_badness = NULL;
2591
f23631e4 2592 struct value *temp = obj;
ac3eeb49
MS
2593 /* For methods, the list of overloaded methods. */
2594 struct fn_field *fns_ptr = NULL;
2595 /* For non-methods, the list of overloaded function symbols. */
2596 struct symbol **oload_syms = NULL;
2597 /* Number of overloaded instances being considered. */
2598 int num_fns = 0;
c5aa993b 2599 struct type *basetype = NULL;
c906108c 2600 int boffset;
7322dca9
SW
2601
2602 struct cleanup *all_cleanups = make_cleanup (null_cleanup, NULL);
c906108c 2603
8d577d32 2604 const char *obj_type_name = NULL;
7322dca9 2605 const char *func_name = NULL;
8d577d32 2606 enum oload_classification match_quality;
4c3376c8
SW
2607 enum oload_classification method_match_quality = INCOMPATIBLE;
2608 enum oload_classification func_match_quality = INCOMPATIBLE;
c906108c 2609
ac3eeb49 2610 /* Get the list of overloaded methods or functions. */
4c3376c8 2611 if (method == METHOD || method == BOTH)
c906108c 2612 {
a2ca50ae 2613 gdb_assert (obj);
94af9270
KS
2614
2615 /* OBJ may be a pointer value rather than the object itself. */
2616 obj = coerce_ref (obj);
2617 while (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_PTR)
2618 obj = coerce_ref (value_ind (obj));
df407dfe 2619 obj_type_name = TYPE_NAME (value_type (obj));
94af9270
KS
2620
2621 /* First check whether this is a data member, e.g. a pointer to
2622 a function. */
2623 if (TYPE_CODE (check_typedef (value_type (obj))) == TYPE_CODE_STRUCT)
2624 {
2625 *valp = search_struct_field (name, obj, 0,
2626 check_typedef (value_type (obj)), 0);
2627 if (*valp)
2628 {
2629 *staticp = 1;
f748fb40 2630 do_cleanups (all_cleanups);
94af9270
KS
2631 return 0;
2632 }
2633 }
c906108c 2634
4c3376c8 2635 /* Retrieve the list of methods with the name NAME. */
ac3eeb49
MS
2636 fns_ptr = value_find_oload_method_list (&temp, name,
2637 0, &num_fns,
c5aa993b 2638 &basetype, &boffset);
4c3376c8
SW
2639 /* If this is a method only search, and no methods were found
2640 the search has faild. */
2641 if (method == METHOD && (!fns_ptr || !num_fns))
8a3fe4f8 2642 error (_("Couldn't find method %s%s%s"),
c5aa993b
JM
2643 obj_type_name,
2644 (obj_type_name && *obj_type_name) ? "::" : "",
2645 name);
4a1970e4 2646 /* If we are dealing with stub method types, they should have
ac3eeb49
MS
2647 been resolved by find_method_list via
2648 value_find_oload_method_list above. */
4c3376c8
SW
2649 if (fns_ptr)
2650 {
2651 gdb_assert (TYPE_DOMAIN_TYPE (fns_ptr[0].type) != NULL);
da096638 2652 method_oload_champ = find_oload_champ (args, nargs, method,
4c3376c8
SW
2653 num_fns, fns_ptr,
2654 oload_syms, &method_badness);
2655
2656 method_match_quality =
2657 classify_oload_match (method_badness, nargs,
2658 oload_method_static (method, fns_ptr,
2659 method_oload_champ));
2660
2661 make_cleanup (xfree, method_badness);
2662 }
2663
c906108c 2664 }
4c3376c8
SW
2665
2666 if (method == NON_METHOD || method == BOTH)
c906108c 2667 {
7322dca9 2668 const char *qualified_name = NULL;
c906108c 2669
b021a221
MS
2670 /* If the overload match is being search for both as a method
2671 and non member function, the first argument must now be
2672 dereferenced. */
4c3376c8 2673 if (method == BOTH)
2b214ea6 2674 args[0] = value_ind (args[0]);
4c3376c8 2675
7322dca9
SW
2676 if (fsym)
2677 {
2678 qualified_name = SYMBOL_NATURAL_NAME (fsym);
2679
2680 /* If we have a function with a C++ name, try to extract just
2681 the function part. Do not try this for non-functions (e.g.
2682 function pointers). */
2683 if (qualified_name
3e43a32a
MS
2684 && TYPE_CODE (check_typedef (SYMBOL_TYPE (fsym)))
2685 == TYPE_CODE_FUNC)
7322dca9
SW
2686 {
2687 char *temp;
2688
2689 temp = cp_func_name (qualified_name);
2690
2691 /* If cp_func_name did not remove anything, the name of the
2692 symbol did not include scope or argument types - it was
2693 probably a C-style function. */
2694 if (temp)
2695 {
2696 make_cleanup (xfree, temp);
2697 if (strcmp (temp, qualified_name) == 0)
2698 func_name = NULL;
2699 else
2700 func_name = temp;
2701 }
2702 }
2703 }
2704 else
94af9270 2705 {
7322dca9
SW
2706 func_name = name;
2707 qualified_name = name;
94af9270 2708 }
d9639e13 2709
94af9270
KS
2710 /* If there was no C++ name, this must be a C-style function or
2711 not a function at all. Just return the same symbol. Do the
2712 same if cp_func_name fails for some reason. */
8d577d32 2713 if (func_name == NULL)
7b83ea04 2714 {
917317f4 2715 *symp = fsym;
5fe41fbf 2716 do_cleanups (all_cleanups);
7b83ea04
AC
2717 return 0;
2718 }
917317f4 2719
da096638 2720 func_oload_champ = find_oload_champ_namespace (args, nargs,
4c3376c8
SW
2721 func_name,
2722 qualified_name,
2723 &oload_syms,
2724 &func_badness,
2725 no_adl);
8d577d32 2726
4c3376c8
SW
2727 if (func_oload_champ >= 0)
2728 func_match_quality = classify_oload_match (func_badness, nargs, 0);
2729
2730 make_cleanup (xfree, oload_syms);
2731 make_cleanup (xfree, func_badness);
8d577d32
DC
2732 }
2733
7322dca9 2734 /* Did we find a match ? */
4c3376c8 2735 if (method_oload_champ == -1 && func_oload_champ == -1)
79afc5ef
SW
2736 throw_error (NOT_FOUND_ERROR,
2737 _("No symbol \"%s\" in current context."),
2738 name);
8d577d32 2739
4c3376c8
SW
2740 /* If we have found both a method match and a function
2741 match, find out which one is better, and calculate match
2742 quality. */
2743 if (method_oload_champ >= 0 && func_oload_champ >= 0)
2744 {
2745 switch (compare_badness (func_badness, method_badness))
2746 {
2747 case 0: /* Top two contenders are equally good. */
b021a221
MS
2748 /* FIXME: GDB does not support the general ambiguous case.
2749 All candidates should be collected and presented the
2750 user. */
4c3376c8
SW
2751 error (_("Ambiguous overload resolution"));
2752 break;
2753 case 1: /* Incomparable top contenders. */
2754 /* This is an error incompatible candidates
2755 should not have been proposed. */
3e43a32a
MS
2756 error (_("Internal error: incompatible "
2757 "overload candidates proposed"));
4c3376c8
SW
2758 break;
2759 case 2: /* Function champion. */
2760 method_oload_champ = -1;
2761 match_quality = func_match_quality;
2762 break;
2763 case 3: /* Method champion. */
2764 func_oload_champ = -1;
2765 match_quality = method_match_quality;
2766 break;
2767 default:
2768 error (_("Internal error: unexpected overload comparison result"));
2769 break;
2770 }
2771 }
2772 else
2773 {
2774 /* We have either a method match or a function match. */
2775 if (method_oload_champ >= 0)
2776 match_quality = method_match_quality;
2777 else
2778 match_quality = func_match_quality;
2779 }
8d577d32
DC
2780
2781 if (match_quality == INCOMPATIBLE)
2782 {
4c3376c8 2783 if (method == METHOD)
8a3fe4f8 2784 error (_("Cannot resolve method %s%s%s to any overloaded instance"),
8d577d32
DC
2785 obj_type_name,
2786 (obj_type_name && *obj_type_name) ? "::" : "",
2787 name);
2788 else
8a3fe4f8 2789 error (_("Cannot resolve function %s to any overloaded instance"),
8d577d32
DC
2790 func_name);
2791 }
2792 else if (match_quality == NON_STANDARD)
2793 {
4c3376c8 2794 if (method == METHOD)
3e43a32a
MS
2795 warning (_("Using non-standard conversion to match "
2796 "method %s%s%s to supplied arguments"),
8d577d32
DC
2797 obj_type_name,
2798 (obj_type_name && *obj_type_name) ? "::" : "",
2799 name);
2800 else
3e43a32a
MS
2801 warning (_("Using non-standard conversion to match "
2802 "function %s to supplied arguments"),
8d577d32
DC
2803 func_name);
2804 }
2805
4c3376c8
SW
2806 if (staticp != NULL)
2807 *staticp = oload_method_static (method, fns_ptr, method_oload_champ);
2808
2809 if (method_oload_champ >= 0)
8d577d32 2810 {
4c3376c8
SW
2811 if (TYPE_FN_FIELD_VIRTUAL_P (fns_ptr, method_oload_champ))
2812 *valp = value_virtual_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2813 basetype, boffset);
8d577d32 2814 else
4c3376c8 2815 *valp = value_fn_field (&temp, fns_ptr, method_oload_champ,
ac3eeb49 2816 basetype, boffset);
8d577d32
DC
2817 }
2818 else
4c3376c8 2819 *symp = oload_syms[func_oload_champ];
8d577d32
DC
2820
2821 if (objp)
2822 {
a4295225 2823 struct type *temp_type = check_typedef (value_type (temp));
da096638 2824 struct type *objtype = check_typedef (obj_type);
a109c7c1 2825
a4295225 2826 if (TYPE_CODE (temp_type) != TYPE_CODE_PTR
da096638
KS
2827 && (TYPE_CODE (objtype) == TYPE_CODE_PTR
2828 || TYPE_CODE (objtype) == TYPE_CODE_REF))
8d577d32
DC
2829 {
2830 temp = value_addr (temp);
2831 }
2832 *objp = temp;
2833 }
7322dca9
SW
2834
2835 do_cleanups (all_cleanups);
8d577d32
DC
2836
2837 switch (match_quality)
2838 {
2839 case INCOMPATIBLE:
2840 return 100;
2841 case NON_STANDARD:
2842 return 10;
2843 default: /* STANDARD */
2844 return 0;
2845 }
2846}
2847
2848/* Find the best overload match, searching for FUNC_NAME in namespaces
2849 contained in QUALIFIED_NAME until it either finds a good match or
2850 runs out of namespaces. It stores the overloaded functions in
2851 *OLOAD_SYMS, and the badness vector in *OLOAD_CHAMP_BV. The
2852 calling function is responsible for freeing *OLOAD_SYMS and
7322dca9
SW
2853 *OLOAD_CHAMP_BV. If NO_ADL, argument dependent lookup is not
2854 performned. */
8d577d32
DC
2855
2856static int
da096638 2857find_oload_champ_namespace (struct value **args, int nargs,
8d577d32
DC
2858 const char *func_name,
2859 const char *qualified_name,
2860 struct symbol ***oload_syms,
7322dca9
SW
2861 struct badness_vector **oload_champ_bv,
2862 const int no_adl)
8d577d32
DC
2863{
2864 int oload_champ;
2865
da096638 2866 find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2867 func_name,
2868 qualified_name, 0,
2869 oload_syms, oload_champ_bv,
7322dca9
SW
2870 &oload_champ,
2871 no_adl);
8d577d32
DC
2872
2873 return oload_champ;
2874}
2875
2876/* Helper function for find_oload_champ_namespace; NAMESPACE_LEN is
2877 how deep we've looked for namespaces, and the champ is stored in
2878 OLOAD_CHAMP. The return value is 1 if the champ is a good one, 0
7322dca9
SW
2879 if it isn't. Other arguments are the same as in
2880 find_oload_champ_namespace
8d577d32
DC
2881
2882 It is the caller's responsibility to free *OLOAD_SYMS and
2883 *OLOAD_CHAMP_BV. */
2884
2885static int
da096638 2886find_oload_champ_namespace_loop (struct value **args, int nargs,
8d577d32
DC
2887 const char *func_name,
2888 const char *qualified_name,
2889 int namespace_len,
2890 struct symbol ***oload_syms,
2891 struct badness_vector **oload_champ_bv,
7322dca9
SW
2892 int *oload_champ,
2893 const int no_adl)
8d577d32
DC
2894{
2895 int next_namespace_len = namespace_len;
2896 int searched_deeper = 0;
2897 int num_fns = 0;
2898 struct cleanup *old_cleanups;
2899 int new_oload_champ;
2900 struct symbol **new_oload_syms;
2901 struct badness_vector *new_oload_champ_bv;
2902 char *new_namespace;
2903
2904 if (next_namespace_len != 0)
2905 {
2906 gdb_assert (qualified_name[next_namespace_len] == ':');
2907 next_namespace_len += 2;
c906108c 2908 }
ac3eeb49
MS
2909 next_namespace_len +=
2910 cp_find_first_component (qualified_name + next_namespace_len);
8d577d32
DC
2911
2912 /* Initialize these to values that can safely be xfree'd. */
2913 *oload_syms = NULL;
2914 *oload_champ_bv = NULL;
c5aa993b 2915
581e13c1 2916 /* First, see if we have a deeper namespace we can search in.
ac3eeb49 2917 If we get a good match there, use it. */
8d577d32
DC
2918
2919 if (qualified_name[next_namespace_len] == ':')
2920 {
2921 searched_deeper = 1;
2922
da096638 2923 if (find_oload_champ_namespace_loop (args, nargs,
8d577d32
DC
2924 func_name, qualified_name,
2925 next_namespace_len,
2926 oload_syms, oload_champ_bv,
7322dca9 2927 oload_champ, no_adl))
8d577d32
DC
2928 {
2929 return 1;
2930 }
2931 };
2932
2933 /* If we reach here, either we're in the deepest namespace or we
2934 didn't find a good match in a deeper namespace. But, in the
2935 latter case, we still have a bad match in a deeper namespace;
2936 note that we might not find any match at all in the current
2937 namespace. (There's always a match in the deepest namespace,
2938 because this overload mechanism only gets called if there's a
2939 function symbol to start off with.) */
2940
2941 old_cleanups = make_cleanup (xfree, *oload_syms);
ec322823 2942 make_cleanup (xfree, *oload_champ_bv);
8d577d32
DC
2943 new_namespace = alloca (namespace_len + 1);
2944 strncpy (new_namespace, qualified_name, namespace_len);
2945 new_namespace[namespace_len] = '\0';
2946 new_oload_syms = make_symbol_overload_list (func_name,
2947 new_namespace);
7322dca9
SW
2948
2949 /* If we have reached the deepest level perform argument
2950 determined lookup. */
2951 if (!searched_deeper && !no_adl)
da096638
KS
2952 {
2953 int ix;
2954 struct type **arg_types;
2955
2956 /* Prepare list of argument types for overload resolution. */
2957 arg_types = (struct type **)
2958 alloca (nargs * (sizeof (struct type *)));
2959 for (ix = 0; ix < nargs; ix++)
2960 arg_types[ix] = value_type (args[ix]);
2961 make_symbol_overload_list_adl (arg_types, nargs, func_name);
2962 }
7322dca9 2963
8d577d32
DC
2964 while (new_oload_syms[num_fns])
2965 ++num_fns;
2966
da096638 2967 new_oload_champ = find_oload_champ (args, nargs, 0, num_fns,
8d577d32
DC
2968 NULL, new_oload_syms,
2969 &new_oload_champ_bv);
2970
2971 /* Case 1: We found a good match. Free earlier matches (if any),
2972 and return it. Case 2: We didn't find a good match, but we're
2973 not the deepest function. Then go with the bad match that the
2974 deeper function found. Case 3: We found a bad match, and we're
2975 the deepest function. Then return what we found, even though
2976 it's a bad match. */
2977
2978 if (new_oload_champ != -1
2979 && classify_oload_match (new_oload_champ_bv, nargs, 0) == STANDARD)
2980 {
2981 *oload_syms = new_oload_syms;
2982 *oload_champ = new_oload_champ;
2983 *oload_champ_bv = new_oload_champ_bv;
2984 do_cleanups (old_cleanups);
2985 return 1;
2986 }
2987 else if (searched_deeper)
2988 {
2989 xfree (new_oload_syms);
2990 xfree (new_oload_champ_bv);
2991 discard_cleanups (old_cleanups);
2992 return 0;
2993 }
2994 else
2995 {
8d577d32
DC
2996 *oload_syms = new_oload_syms;
2997 *oload_champ = new_oload_champ;
2998 *oload_champ_bv = new_oload_champ_bv;
2a7d6a25 2999 do_cleanups (old_cleanups);
8d577d32
DC
3000 return 0;
3001 }
3002}
3003
da096638 3004/* Look for a function to take NARGS args of ARGS. Find
8d577d32
DC
3005 the best match from among the overloaded methods or functions
3006 (depending on METHOD) given by FNS_PTR or OLOAD_SYMS, respectively.
3007 The number of methods/functions in the list is given by NUM_FNS.
3008 Return the index of the best match; store an indication of the
3009 quality of the match in OLOAD_CHAMP_BV.
3010
3011 It is the caller's responsibility to free *OLOAD_CHAMP_BV. */
3012
3013static int
da096638 3014find_oload_champ (struct value **args, int nargs, int method,
8d577d32
DC
3015 int num_fns, struct fn_field *fns_ptr,
3016 struct symbol **oload_syms,
3017 struct badness_vector **oload_champ_bv)
3018{
3019 int ix;
ac3eeb49
MS
3020 /* A measure of how good an overloaded instance is. */
3021 struct badness_vector *bv;
3022 /* Index of best overloaded function. */
3023 int oload_champ = -1;
3024 /* Current ambiguity state for overload resolution. */
3025 int oload_ambiguous = 0;
3026 /* 0 => no ambiguity, 1 => two good funcs, 2 => incomparable funcs. */
8d577d32
DC
3027
3028 *oload_champ_bv = NULL;
c906108c 3029
ac3eeb49 3030 /* Consider each candidate in turn. */
c906108c
SS
3031 for (ix = 0; ix < num_fns; ix++)
3032 {
8d577d32
DC
3033 int jj;
3034 int static_offset = oload_method_static (method, fns_ptr, ix);
3035 int nparms;
3036 struct type **parm_types;
3037
db577aea
AC
3038 if (method)
3039 {
ad2f7632 3040 nparms = TYPE_NFIELDS (TYPE_FN_FIELD_TYPE (fns_ptr, ix));
db577aea
AC
3041 }
3042 else
3043 {
ac3eeb49
MS
3044 /* If it's not a method, this is the proper place. */
3045 nparms = TYPE_NFIELDS (SYMBOL_TYPE (oload_syms[ix]));
db577aea 3046 }
c906108c 3047
ac3eeb49
MS
3048 /* Prepare array of parameter types. */
3049 parm_types = (struct type **)
3050 xmalloc (nparms * (sizeof (struct type *)));
c906108c 3051 for (jj = 0; jj < nparms; jj++)
db577aea 3052 parm_types[jj] = (method
ad2f7632 3053 ? (TYPE_FN_FIELD_ARGS (fns_ptr, ix)[jj].type)
ac3eeb49
MS
3054 : TYPE_FIELD_TYPE (SYMBOL_TYPE (oload_syms[ix]),
3055 jj));
c906108c 3056
ac3eeb49
MS
3057 /* Compare parameter types to supplied argument types. Skip
3058 THIS for static methods. */
3059 bv = rank_function (parm_types, nparms,
da096638 3060 args + static_offset,
4a1970e4 3061 nargs - static_offset);
c5aa993b 3062
8d577d32 3063 if (!*oload_champ_bv)
c5aa993b 3064 {
8d577d32 3065 *oload_champ_bv = bv;
c5aa993b 3066 oload_champ = 0;
c5aa993b 3067 }
ac3eeb49
MS
3068 else /* See whether current candidate is better or worse than
3069 previous best. */
8d577d32 3070 switch (compare_badness (bv, *oload_champ_bv))
c5aa993b 3071 {
ac3eeb49
MS
3072 case 0: /* Top two contenders are equally good. */
3073 oload_ambiguous = 1;
c5aa993b 3074 break;
ac3eeb49
MS
3075 case 1: /* Incomparable top contenders. */
3076 oload_ambiguous = 2;
c5aa993b 3077 break;
ac3eeb49
MS
3078 case 2: /* New champion, record details. */
3079 *oload_champ_bv = bv;
c5aa993b
JM
3080 oload_ambiguous = 0;
3081 oload_champ = ix;
c5aa993b
JM
3082 break;
3083 case 3:
3084 default:
3085 break;
3086 }
b8c9b27d 3087 xfree (parm_types);
6b1ba9a0
ND
3088 if (overload_debug)
3089 {
3090 if (method)
ac3eeb49 3091 fprintf_filtered (gdb_stderr,
3e43a32a 3092 "Overloaded method instance %s, # of parms %d\n",
ac3eeb49 3093 fns_ptr[ix].physname, nparms);
6b1ba9a0 3094 else
ac3eeb49 3095 fprintf_filtered (gdb_stderr,
3e43a32a
MS
3096 "Overloaded function instance "
3097 "%s # of parms %d\n",
ac3eeb49
MS
3098 SYMBOL_DEMANGLED_NAME (oload_syms[ix]),
3099 nparms);
4a1970e4 3100 for (jj = 0; jj < nargs - static_offset; jj++)
ac3eeb49
MS
3101 fprintf_filtered (gdb_stderr,
3102 "...Badness @ %d : %d\n",
6403aeea 3103 jj, bv->rank[jj].rank);
3e43a32a
MS
3104 fprintf_filtered (gdb_stderr, "Overload resolution "
3105 "champion is %d, ambiguous? %d\n",
ac3eeb49 3106 oload_champ, oload_ambiguous);
6b1ba9a0 3107 }
c906108c
SS
3108 }
3109
8d577d32
DC
3110 return oload_champ;
3111}
6b1ba9a0 3112
8d577d32
DC
3113/* Return 1 if we're looking at a static method, 0 if we're looking at
3114 a non-static method or a function that isn't a method. */
c906108c 3115
8d577d32
DC
3116static int
3117oload_method_static (int method, struct fn_field *fns_ptr, int index)
3118{
4c3376c8
SW
3119 if (method && fns_ptr && index >= 0
3120 && TYPE_FN_FIELD_STATIC_P (fns_ptr, index))
8d577d32 3121 return 1;
c906108c 3122 else
8d577d32
DC
3123 return 0;
3124}
c906108c 3125
8d577d32
DC
3126/* Check how good an overload match OLOAD_CHAMP_BV represents. */
3127
3128static enum oload_classification
3129classify_oload_match (struct badness_vector *oload_champ_bv,
3130 int nargs,
3131 int static_offset)
3132{
3133 int ix;
da096638 3134 enum oload_classification worst = STANDARD;
8d577d32
DC
3135
3136 for (ix = 1; ix <= nargs - static_offset; ix++)
7f8c9282 3137 {
6403aeea
SW
3138 /* If this conversion is as bad as INCOMPATIBLE_TYPE_BADNESS
3139 or worse return INCOMPATIBLE. */
3140 if (compare_ranks (oload_champ_bv->rank[ix],
3141 INCOMPATIBLE_TYPE_BADNESS) <= 0)
ac3eeb49 3142 return INCOMPATIBLE; /* Truly mismatched types. */
6403aeea
SW
3143 /* Otherwise If this conversion is as bad as
3144 NS_POINTER_CONVERSION_BADNESS or worse return NON_STANDARD. */
3145 else if (compare_ranks (oload_champ_bv->rank[ix],
3146 NS_POINTER_CONVERSION_BADNESS) <= 0)
da096638 3147 worst = NON_STANDARD; /* Non-standard type conversions
ac3eeb49 3148 needed. */
7f8c9282 3149 }
02f0d45d 3150
da096638
KS
3151 /* If no INCOMPATIBLE classification was found, return the worst one
3152 that was found (if any). */
3153 return worst;
c906108c
SS
3154}
3155
ac3eeb49
MS
3156/* C++: return 1 is NAME is a legitimate name for the destructor of
3157 type TYPE. If TYPE does not have a destructor, or if NAME is
d8228535
JK
3158 inappropriate for TYPE, an error is signaled. Parameter TYPE should not yet
3159 have CHECK_TYPEDEF applied, this function will apply it itself. */
3160
c906108c 3161int
d8228535 3162destructor_name_p (const char *name, struct type *type)
c906108c 3163{
c906108c
SS
3164 if (name[0] == '~')
3165 {
d8228535
JK
3166 const char *dname = type_name_no_tag_or_error (type);
3167 const char *cp = strchr (dname, '<');
c906108c
SS
3168 unsigned int len;
3169
3170 /* Do not compare the template part for template classes. */
3171 if (cp == NULL)
3172 len = strlen (dname);
3173 else
3174 len = cp - dname;
bf896cb0 3175 if (strlen (name + 1) != len || strncmp (dname, name + 1, len) != 0)
8a3fe4f8 3176 error (_("name of destructor must equal name of class"));
c906108c
SS
3177 else
3178 return 1;
3179 }
3180 return 0;
3181}
3182
79c2c32d 3183/* C++: Given an aggregate type CURTYPE, and a member name NAME,
0d5de010
DJ
3184 return the appropriate member (or the address of the member, if
3185 WANT_ADDRESS). This function is used to resolve user expressions
3186 of the form "DOMAIN::NAME". For more details on what happens, see
3187 the comment before value_struct_elt_for_reference. */
79c2c32d
DC
3188
3189struct value *
072bba3b
KS
3190value_aggregate_elt (struct type *curtype, char *name,
3191 struct type *expect_type, int want_address,
79c2c32d
DC
3192 enum noside noside)
3193{
3194 switch (TYPE_CODE (curtype))
3195 {
3196 case TYPE_CODE_STRUCT:
3197 case TYPE_CODE_UNION:
ac3eeb49 3198 return value_struct_elt_for_reference (curtype, 0, curtype,
072bba3b 3199 name, expect_type,
0d5de010 3200 want_address, noside);
79c2c32d 3201 case TYPE_CODE_NAMESPACE:
ac3eeb49
MS
3202 return value_namespace_elt (curtype, name,
3203 want_address, noside);
79c2c32d
DC
3204 default:
3205 internal_error (__FILE__, __LINE__,
e2e0b3e5 3206 _("non-aggregate type in value_aggregate_elt"));
79c2c32d
DC
3207 }
3208}
3209
072bba3b 3210/* Compares the two method/function types T1 and T2 for "equality"
b021a221 3211 with respect to the methods' parameters. If the types of the
072bba3b
KS
3212 two parameter lists are the same, returns 1; 0 otherwise. This
3213 comparison may ignore any artificial parameters in T1 if
3214 SKIP_ARTIFICIAL is non-zero. This function will ALWAYS skip
3215 the first artificial parameter in T1, assumed to be a 'this' pointer.
3216
3217 The type T2 is expected to have come from make_params (in eval.c). */
3218
3219static int
3220compare_parameters (struct type *t1, struct type *t2, int skip_artificial)
3221{
3222 int start = 0;
3223
80b23b6a 3224 if (TYPE_NFIELDS (t1) > 0 && TYPE_FIELD_ARTIFICIAL (t1, 0))
072bba3b
KS
3225 ++start;
3226
3227 /* If skipping artificial fields, find the first real field
581e13c1 3228 in T1. */
072bba3b
KS
3229 if (skip_artificial)
3230 {
3231 while (start < TYPE_NFIELDS (t1)
3232 && TYPE_FIELD_ARTIFICIAL (t1, start))
3233 ++start;
3234 }
3235
581e13c1 3236 /* Now compare parameters. */
072bba3b
KS
3237
3238 /* Special case: a method taking void. T1 will contain no
3239 non-artificial fields, and T2 will contain TYPE_CODE_VOID. */
3240 if ((TYPE_NFIELDS (t1) - start) == 0 && TYPE_NFIELDS (t2) == 1
3241 && TYPE_CODE (TYPE_FIELD_TYPE (t2, 0)) == TYPE_CODE_VOID)
3242 return 1;
3243
3244 if ((TYPE_NFIELDS (t1) - start) == TYPE_NFIELDS (t2))
3245 {
3246 int i;
a109c7c1 3247
072bba3b
KS
3248 for (i = 0; i < TYPE_NFIELDS (t2); ++i)
3249 {
6403aeea 3250 if (compare_ranks (rank_one_type (TYPE_FIELD_TYPE (t1, start + i),
da096638 3251 TYPE_FIELD_TYPE (t2, i), NULL),
6403aeea 3252 EXACT_MATCH_BADNESS) != 0)
072bba3b
KS
3253 return 0;
3254 }
3255
3256 return 1;
3257 }
3258
3259 return 0;
3260}
3261
c906108c 3262/* C++: Given an aggregate type CURTYPE, and a member name NAME,
ac3eeb49
MS
3263 return the address of this member as a "pointer to member" type.
3264 If INTYPE is non-null, then it will be the type of the member we
3265 are looking for. This will help us resolve "pointers to member
3266 functions". This function is used to resolve user expressions of
3267 the form "DOMAIN::NAME". */
c906108c 3268
63d06c5c 3269static struct value *
fba45db2
KB
3270value_struct_elt_for_reference (struct type *domain, int offset,
3271 struct type *curtype, char *name,
ac3eeb49
MS
3272 struct type *intype,
3273 int want_address,
63d06c5c 3274 enum noside noside)
c906108c 3275{
52f0bd74
AC
3276 struct type *t = curtype;
3277 int i;
0d5de010 3278 struct value *v, *result;
c906108c 3279
c5aa993b 3280 if (TYPE_CODE (t) != TYPE_CODE_STRUCT
c906108c 3281 && TYPE_CODE (t) != TYPE_CODE_UNION)
3e43a32a
MS
3282 error (_("Internal error: non-aggregate type "
3283 "to value_struct_elt_for_reference"));
c906108c
SS
3284
3285 for (i = TYPE_NFIELDS (t) - 1; i >= TYPE_N_BASECLASSES (t); i--)
3286 {
0d5cff50 3287 const char *t_field_name = TYPE_FIELD_NAME (t, i);
c5aa993b 3288
6314a349 3289 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3290 {
d6a843b5 3291 if (field_is_static (&TYPE_FIELD (t, i)))
c906108c
SS
3292 {
3293 v = value_static_field (t, i);
3294 if (v == NULL)
8a3fe4f8 3295 error (_("static field %s has been optimized out"),
c906108c 3296 name);
0d5de010
DJ
3297 if (want_address)
3298 v = value_addr (v);
c906108c
SS
3299 return v;
3300 }
3301 if (TYPE_FIELD_PACKED (t, i))
8a3fe4f8 3302 error (_("pointers to bitfield members not allowed"));
c5aa993b 3303
0d5de010
DJ
3304 if (want_address)
3305 return value_from_longest
3306 (lookup_memberptr_type (TYPE_FIELD_TYPE (t, i), domain),
3307 offset + (LONGEST) (TYPE_FIELD_BITPOS (t, i) >> 3));
3308 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3309 return allocate_value (TYPE_FIELD_TYPE (t, i));
3310 else
3311 error (_("Cannot reference non-static field \"%s\""), name);
c906108c
SS
3312 }
3313 }
3314
ac3eeb49
MS
3315 /* C++: If it was not found as a data field, then try to return it
3316 as a pointer to a method. */
c906108c 3317
c906108c
SS
3318 /* Perform all necessary dereferencing. */
3319 while (intype && TYPE_CODE (intype) == TYPE_CODE_PTR)
3320 intype = TYPE_TARGET_TYPE (intype);
3321
3322 for (i = TYPE_NFN_FIELDS (t) - 1; i >= 0; --i)
3323 {
0d5cff50 3324 const char *t_field_name = TYPE_FN_FIELDLIST_NAME (t, i);
c906108c
SS
3325 char dem_opname[64];
3326
ac3eeb49
MS
3327 if (strncmp (t_field_name, "__", 2) == 0
3328 || strncmp (t_field_name, "op", 2) == 0
3329 || strncmp (t_field_name, "type", 4) == 0)
c906108c 3330 {
ac3eeb49
MS
3331 if (cplus_demangle_opname (t_field_name,
3332 dem_opname, DMGL_ANSI))
c5aa993b 3333 t_field_name = dem_opname;
ac3eeb49
MS
3334 else if (cplus_demangle_opname (t_field_name,
3335 dem_opname, 0))
c906108c 3336 t_field_name = dem_opname;
c906108c 3337 }
6314a349 3338 if (t_field_name && strcmp (t_field_name, name) == 0)
c906108c 3339 {
072bba3b
KS
3340 int j;
3341 int len = TYPE_FN_FIELDLIST_LENGTH (t, i);
c906108c 3342 struct fn_field *f = TYPE_FN_FIELDLIST1 (t, i);
c5aa993b 3343
de17c821
DJ
3344 check_stub_method_group (t, i);
3345
c906108c
SS
3346 if (intype)
3347 {
072bba3b
KS
3348 for (j = 0; j < len; ++j)
3349 {
3350 if (compare_parameters (TYPE_FN_FIELD_TYPE (f, j), intype, 0)
3e43a32a
MS
3351 || compare_parameters (TYPE_FN_FIELD_TYPE (f, j),
3352 intype, 1))
072bba3b
KS
3353 break;
3354 }
3355
3356 if (j == len)
3e43a32a
MS
3357 error (_("no member function matches "
3358 "that type instantiation"));
7f79b1c5 3359 }
c906108c 3360 else
072bba3b
KS
3361 {
3362 int ii;
7f79b1c5
DJ
3363
3364 j = -1;
53832f31 3365 for (ii = 0; ii < len; ++ii)
072bba3b 3366 {
7f79b1c5
DJ
3367 /* Skip artificial methods. This is necessary if,
3368 for example, the user wants to "print
3369 subclass::subclass" with only one user-defined
53832f31
TT
3370 constructor. There is no ambiguity in this case.
3371 We are careful here to allow artificial methods
3372 if they are the unique result. */
072bba3b 3373 if (TYPE_FN_FIELD_ARTIFICIAL (f, ii))
53832f31
TT
3374 {
3375 if (j == -1)
3376 j = ii;
3377 continue;
3378 }
072bba3b 3379
7f79b1c5
DJ
3380 /* Desired method is ambiguous if more than one
3381 method is defined. */
53832f31 3382 if (j != -1 && !TYPE_FN_FIELD_ARTIFICIAL (f, j))
3e43a32a
MS
3383 error (_("non-unique member `%s' requires "
3384 "type instantiation"), name);
072bba3b 3385
7f79b1c5
DJ
3386 j = ii;
3387 }
53832f31
TT
3388
3389 if (j == -1)
3390 error (_("no matching member function"));
072bba3b 3391 }
c5aa993b 3392
0d5de010
DJ
3393 if (TYPE_FN_FIELD_STATIC_P (f, j))
3394 {
ac3eeb49
MS
3395 struct symbol *s =
3396 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3397 0, VAR_DOMAIN, 0);
a109c7c1 3398
0d5de010
DJ
3399 if (s == NULL)
3400 return NULL;
3401
3402 if (want_address)
3403 return value_addr (read_var_value (s, 0));
3404 else
3405 return read_var_value (s, 0);
3406 }
3407
c906108c
SS
3408 if (TYPE_FN_FIELD_VIRTUAL_P (f, j))
3409 {
0d5de010
DJ
3410 if (want_address)
3411 {
3412 result = allocate_value
3413 (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3414 cplus_make_method_ptr (value_type (result),
3415 value_contents_writeable (result),
0d5de010
DJ
3416 TYPE_FN_FIELD_VOFFSET (f, j), 1);
3417 }
3418 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
3419 return allocate_value (TYPE_FN_FIELD_TYPE (f, j));
3420 else
3421 error (_("Cannot reference virtual member function \"%s\""),
3422 name);
c906108c
SS
3423 }
3424 else
3425 {
ac3eeb49
MS
3426 struct symbol *s =
3427 lookup_symbol (TYPE_FN_FIELD_PHYSNAME (f, j),
2570f2b7 3428 0, VAR_DOMAIN, 0);
a109c7c1 3429
c906108c 3430 if (s == NULL)
0d5de010
DJ
3431 return NULL;
3432
3433 v = read_var_value (s, 0);
3434 if (!want_address)
3435 result = v;
c906108c
SS
3436 else
3437 {
0d5de010 3438 result = allocate_value (lookup_methodptr_type (TYPE_FN_FIELD_TYPE (f, j)));
ad4820ab
UW
3439 cplus_make_method_ptr (value_type (result),
3440 value_contents_writeable (result),
42ae5230 3441 value_address (v), 0);
c906108c 3442 }
c906108c 3443 }
0d5de010 3444 return result;
c906108c
SS
3445 }
3446 }
3447 for (i = TYPE_N_BASECLASSES (t) - 1; i >= 0; i--)
3448 {
f23631e4 3449 struct value *v;
c906108c
SS
3450 int base_offset;
3451
3452 if (BASETYPE_VIA_VIRTUAL (t, i))
3453 base_offset = 0;
3454 else
3455 base_offset = TYPE_BASECLASS_BITPOS (t, i) / 8;
3456 v = value_struct_elt_for_reference (domain,
3457 offset + base_offset,
3458 TYPE_BASECLASS (t, i),
ac3eeb49
MS
3459 name, intype,
3460 want_address, noside);
c906108c
SS
3461 if (v)
3462 return v;
3463 }
63d06c5c
DC
3464
3465 /* As a last chance, pretend that CURTYPE is a namespace, and look
3466 it up that way; this (frequently) works for types nested inside
3467 classes. */
3468
ac3eeb49
MS
3469 return value_maybe_namespace_elt (curtype, name,
3470 want_address, noside);
c906108c
SS
3471}
3472
79c2c32d
DC
3473/* C++: Return the member NAME of the namespace given by the type
3474 CURTYPE. */
3475
3476static struct value *
3477value_namespace_elt (const struct type *curtype,
0d5de010 3478 char *name, int want_address,
79c2c32d 3479 enum noside noside)
63d06c5c
DC
3480{
3481 struct value *retval = value_maybe_namespace_elt (curtype, name,
ac3eeb49
MS
3482 want_address,
3483 noside);
63d06c5c
DC
3484
3485 if (retval == NULL)
ac3eeb49
MS
3486 error (_("No symbol \"%s\" in namespace \"%s\"."),
3487 name, TYPE_TAG_NAME (curtype));
63d06c5c
DC
3488
3489 return retval;
3490}
3491
3492/* A helper function used by value_namespace_elt and
3493 value_struct_elt_for_reference. It looks up NAME inside the
3494 context CURTYPE; this works if CURTYPE is a namespace or if CURTYPE
3495 is a class and NAME refers to a type in CURTYPE itself (as opposed
3496 to, say, some base class of CURTYPE). */
3497
3498static struct value *
3499value_maybe_namespace_elt (const struct type *curtype,
0d5de010 3500 char *name, int want_address,
63d06c5c 3501 enum noside noside)
79c2c32d
DC
3502{
3503 const char *namespace_name = TYPE_TAG_NAME (curtype);
3504 struct symbol *sym;
0d5de010 3505 struct value *result;
79c2c32d 3506
13387711 3507 sym = cp_lookup_symbol_namespace (namespace_name, name,
41f62f39
JK
3508 get_selected_block (0), VAR_DOMAIN);
3509
3510 if (sym == NULL)
3511 {
3512 char *concatenated_name = alloca (strlen (namespace_name) + 2
3513 + strlen (name) + 1);
3514
3515 sprintf (concatenated_name, "%s::%s", namespace_name, name);
3516 sym = lookup_static_symbol_aux (concatenated_name, VAR_DOMAIN);
3517 }
79c2c32d
DC
3518
3519 if (sym == NULL)
63d06c5c 3520 return NULL;
79c2c32d
DC
3521 else if ((noside == EVAL_AVOID_SIDE_EFFECTS)
3522 && (SYMBOL_CLASS (sym) == LOC_TYPEDEF))
0d5de010 3523 result = allocate_value (SYMBOL_TYPE (sym));
79c2c32d 3524 else
0d5de010
DJ
3525 result = value_of_variable (sym, get_selected_block (0));
3526
3527 if (result && want_address)
3528 result = value_addr (result);
3529
3530 return result;
79c2c32d
DC
3531}
3532
dfcee124 3533/* Given a pointer or a reference value V, find its real (RTTI) type.
ac3eeb49 3534
c906108c 3535 Other parameters FULL, TOP, USING_ENC as with value_rtti_type()
ac3eeb49 3536 and refer to the values computed for the object pointed to. */
c906108c
SS
3537
3538struct type *
dfcee124
AG
3539value_rtti_indirect_type (struct value *v, int *full,
3540 int *top, int *using_enc)
c906108c 3541{
f23631e4 3542 struct value *target;
dfcee124
AG
3543 struct type *type, *real_type, *target_type;
3544
3545 type = value_type (v);
3546 type = check_typedef (type);
3547 if (TYPE_CODE (type) == TYPE_CODE_REF)
3548 target = coerce_ref (v);
3549 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3550 target = value_ind (v);
3551 else
3552 return NULL;
c906108c 3553
dfcee124
AG
3554 real_type = value_rtti_type (target, full, top, using_enc);
3555
3556 if (real_type)
3557 {
3558 /* Copy qualifiers to the referenced object. */
3559 target_type = value_type (target);
3560 real_type = make_cv_type (TYPE_CONST (target_type),
3561 TYPE_VOLATILE (target_type), real_type, NULL);
3562 if (TYPE_CODE (type) == TYPE_CODE_REF)
3563 real_type = lookup_reference_type (real_type);
3564 else if (TYPE_CODE (type) == TYPE_CODE_PTR)
3565 real_type = lookup_pointer_type (real_type);
3566 else
3567 internal_error (__FILE__, __LINE__, _("Unexpected value type."));
3568
3569 /* Copy qualifiers to the pointer/reference. */
3570 real_type = make_cv_type (TYPE_CONST (type), TYPE_VOLATILE (type),
3571 real_type, NULL);
3572 }
c906108c 3573
dfcee124 3574 return real_type;
c906108c
SS
3575}
3576
3577/* Given a value pointed to by ARGP, check its real run-time type, and
3578 if that is different from the enclosing type, create a new value
3579 using the real run-time type as the enclosing type (and of the same
3580 type as ARGP) and return it, with the embedded offset adjusted to
ac3eeb49
MS
3581 be the correct offset to the enclosed object. RTYPE is the type,
3582 and XFULL, XTOP, and XUSING_ENC are the other parameters, computed
3583 by value_rtti_type(). If these are available, they can be supplied
3584 and a second call to value_rtti_type() is avoided. (Pass RTYPE ==
3585 NULL if they're not available. */
c906108c 3586
f23631e4 3587struct value *
ac3eeb49
MS
3588value_full_object (struct value *argp,
3589 struct type *rtype,
3590 int xfull, int xtop,
fba45db2 3591 int xusing_enc)
c906108c 3592{
c5aa993b 3593 struct type *real_type;
c906108c
SS
3594 int full = 0;
3595 int top = -1;
3596 int using_enc = 0;
f23631e4 3597 struct value *new_val;
c906108c
SS
3598
3599 if (rtype)
3600 {
3601 real_type = rtype;
3602 full = xfull;
3603 top = xtop;
3604 using_enc = xusing_enc;
3605 }
3606 else
3607 real_type = value_rtti_type (argp, &full, &top, &using_enc);
3608
ac3eeb49 3609 /* If no RTTI data, or if object is already complete, do nothing. */
4754a64e 3610 if (!real_type || real_type == value_enclosing_type (argp))
c906108c
SS
3611 return argp;
3612
a7860e76
TT
3613 /* In a destructor we might see a real type that is a superclass of
3614 the object's type. In this case it is better to leave the object
3615 as-is. */
3616 if (full
3617 && TYPE_LENGTH (real_type) < TYPE_LENGTH (value_enclosing_type (argp)))
3618 return argp;
3619
c906108c 3620 /* If we have the full object, but for some reason the enclosing
ac3eeb49
MS
3621 type is wrong, set it. */
3622 /* pai: FIXME -- sounds iffy */
c906108c
SS
3623 if (full)
3624 {
4dfea560
DE
3625 argp = value_copy (argp);
3626 set_value_enclosing_type (argp, real_type);
c906108c
SS
3627 return argp;
3628 }
3629
581e13c1 3630 /* Check if object is in memory. */
c906108c
SS
3631 if (VALUE_LVAL (argp) != lval_memory)
3632 {
3e43a32a
MS
3633 warning (_("Couldn't retrieve complete object of RTTI "
3634 "type %s; object may be in register(s)."),
ac3eeb49 3635 TYPE_NAME (real_type));
c5aa993b 3636
c906108c
SS
3637 return argp;
3638 }
c5aa993b 3639
ac3eeb49
MS
3640 /* All other cases -- retrieve the complete object. */
3641 /* Go back by the computed top_offset from the beginning of the
3642 object, adjusting for the embedded offset of argp if that's what
3643 value_rtti_type used for its computation. */
42ae5230 3644 new_val = value_at_lazy (real_type, value_address (argp) - top +
13c3b5f5 3645 (using_enc ? 0 : value_embedded_offset (argp)));
04624583 3646 deprecated_set_value_type (new_val, value_type (argp));
13c3b5f5
AC
3647 set_value_embedded_offset (new_val, (using_enc
3648 ? top + value_embedded_offset (argp)
3649 : top));
c906108c
SS
3650 return new_val;
3651}
3652
389e51db 3653
85bc8cb7
JK
3654/* Return the value of the local variable, if one exists. Throw error
3655 otherwise, such as if the request is made in an inappropriate context. */
c906108c 3656
f23631e4 3657struct value *
85bc8cb7 3658value_of_this (const struct language_defn *lang)
c906108c 3659{
66a17cb6 3660 struct symbol *sym;
c906108c 3661 struct block *b;
206415a3 3662 struct frame_info *frame;
c906108c 3663
66a17cb6 3664 if (!lang->la_name_of_this)
85bc8cb7 3665 error (_("no `this' in current language"));
aee28ec6 3666
85bc8cb7 3667 frame = get_selected_frame (_("no frame selected"));
c906108c 3668
66a17cb6 3669 b = get_frame_block (frame, NULL);
c906108c 3670
66a17cb6 3671 sym = lookup_language_this (lang, b);
c906108c 3672 if (sym == NULL)
85bc8cb7
JK
3673 error (_("current stack frame does not contain a variable named `%s'"),
3674 lang->la_name_of_this);
3675
3676 return read_var_value (sym, frame);
3677}
3678
3679/* Return the value of the local variable, if one exists. Return NULL
3680 otherwise. Never throw error. */
3681
3682struct value *
3683value_of_this_silent (const struct language_defn *lang)
3684{
3685 struct value *ret = NULL;
3686 volatile struct gdb_exception except;
3687
3688 TRY_CATCH (except, RETURN_MASK_ERROR)
c906108c 3689 {
85bc8cb7 3690 ret = value_of_this (lang);
c906108c
SS
3691 }
3692
d069f99d
AF
3693 return ret;
3694}
3695
ac3eeb49
MS
3696/* Create a slice (sub-string, sub-array) of ARRAY, that is LENGTH
3697 elements long, starting at LOWBOUND. The result has the same lower
3698 bound as the original ARRAY. */
c906108c 3699
f23631e4
AC
3700struct value *
3701value_slice (struct value *array, int lowbound, int length)
c906108c
SS
3702{
3703 struct type *slice_range_type, *slice_type, *range_type;
7a67d0fe 3704 LONGEST lowerbound, upperbound;
f23631e4 3705 struct value *slice;
c906108c 3706 struct type *array_type;
ac3eeb49 3707
df407dfe 3708 array_type = check_typedef (value_type (array));
c906108c 3709 if (TYPE_CODE (array_type) != TYPE_CODE_ARRAY
6b1755ce 3710 && TYPE_CODE (array_type) != TYPE_CODE_STRING)
8a3fe4f8 3711 error (_("cannot take slice of non-array"));
ac3eeb49 3712
c906108c
SS
3713 range_type = TYPE_INDEX_TYPE (array_type);
3714 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
8a3fe4f8 3715 error (_("slice from bad array or bitstring"));
ac3eeb49 3716
c906108c 3717 if (lowbound < lowerbound || length < 0
db034ac5 3718 || lowbound + length - 1 > upperbound)
8a3fe4f8 3719 error (_("slice out of range"));
ac3eeb49 3720
c906108c
SS
3721 /* FIXME-type-allocation: need a way to free this type when we are
3722 done with it. */
c5aa993b 3723 slice_range_type = create_range_type ((struct type *) NULL,
c906108c 3724 TYPE_TARGET_TYPE (range_type),
ac3eeb49
MS
3725 lowbound,
3726 lowbound + length - 1);
ac3eeb49 3727
c906108c
SS
3728 {
3729 struct type *element_type = TYPE_TARGET_TYPE (array_type);
ac3eeb49
MS
3730 LONGEST offset =
3731 (lowbound - lowerbound) * TYPE_LENGTH (check_typedef (element_type));
3732
3733 slice_type = create_array_type ((struct type *) NULL,
3734 element_type,
c906108c
SS
3735 slice_range_type);
3736 TYPE_CODE (slice_type) = TYPE_CODE (array_type);
ac3eeb49 3737
9214ee5f 3738 if (VALUE_LVAL (array) == lval_memory && value_lazy (array))
3e3d7139 3739 slice = allocate_value_lazy (slice_type);
c906108c 3740 else
3e3d7139
JG
3741 {
3742 slice = allocate_value (slice_type);
39d37385
PA
3743 value_contents_copy (slice, 0, array, offset,
3744 TYPE_LENGTH (slice_type));
3e3d7139 3745 }
ac3eeb49 3746
74bcbdf3 3747 set_value_component_location (slice, array);
65d3800a 3748 VALUE_FRAME_ID (slice) = VALUE_FRAME_ID (array);
f5cf64a7 3749 set_value_offset (slice, value_offset (array) + offset);
c906108c
SS
3750 }
3751 return slice;
3752}
3753
ac3eeb49
MS
3754/* Create a value for a FORTRAN complex number. Currently most of the
3755 time values are coerced to COMPLEX*16 (i.e. a complex number
070ad9f0
DB
3756 composed of 2 doubles. This really should be a smarter routine
3757 that figures out precision inteligently as opposed to assuming
ac3eeb49 3758 doubles. FIXME: fmb */
c906108c 3759
f23631e4 3760struct value *
ac3eeb49
MS
3761value_literal_complex (struct value *arg1,
3762 struct value *arg2,
3763 struct type *type)
c906108c 3764{
f23631e4 3765 struct value *val;
c906108c
SS
3766 struct type *real_type = TYPE_TARGET_TYPE (type);
3767
3768 val = allocate_value (type);
3769 arg1 = value_cast (real_type, arg1);
3770 arg2 = value_cast (real_type, arg2);
3771
990a07ab 3772 memcpy (value_contents_raw (val),
0fd88904 3773 value_contents (arg1), TYPE_LENGTH (real_type));
990a07ab 3774 memcpy (value_contents_raw (val) + TYPE_LENGTH (real_type),
0fd88904 3775 value_contents (arg2), TYPE_LENGTH (real_type));
c906108c
SS
3776 return val;
3777}
3778
ac3eeb49 3779/* Cast a value into the appropriate complex data type. */
c906108c 3780
f23631e4
AC
3781static struct value *
3782cast_into_complex (struct type *type, struct value *val)
c906108c
SS
3783{
3784 struct type *real_type = TYPE_TARGET_TYPE (type);
ac3eeb49 3785
df407dfe 3786 if (TYPE_CODE (value_type (val)) == TYPE_CODE_COMPLEX)
c906108c 3787 {
df407dfe 3788 struct type *val_real_type = TYPE_TARGET_TYPE (value_type (val));
f23631e4
AC
3789 struct value *re_val = allocate_value (val_real_type);
3790 struct value *im_val = allocate_value (val_real_type);
c906108c 3791
990a07ab 3792 memcpy (value_contents_raw (re_val),
0fd88904 3793 value_contents (val), TYPE_LENGTH (val_real_type));
990a07ab 3794 memcpy (value_contents_raw (im_val),
0fd88904 3795 value_contents (val) + TYPE_LENGTH (val_real_type),
c5aa993b 3796 TYPE_LENGTH (val_real_type));
c906108c
SS
3797
3798 return value_literal_complex (re_val, im_val, type);
3799 }
df407dfe
AC
3800 else if (TYPE_CODE (value_type (val)) == TYPE_CODE_FLT
3801 || TYPE_CODE (value_type (val)) == TYPE_CODE_INT)
ac3eeb49
MS
3802 return value_literal_complex (val,
3803 value_zero (real_type, not_lval),
3804 type);
c906108c 3805 else
8a3fe4f8 3806 error (_("cannot cast non-number to complex"));
c906108c
SS
3807}
3808
3809void
fba45db2 3810_initialize_valops (void)
c906108c 3811{
5bf193a2
AC
3812 add_setshow_boolean_cmd ("overload-resolution", class_support,
3813 &overload_resolution, _("\
3814Set overload resolution in evaluating C++ functions."), _("\
ac3eeb49
MS
3815Show overload resolution in evaluating C++ functions."),
3816 NULL, NULL,
920d2a44 3817 show_overload_resolution,
5bf193a2 3818 &setlist, &showlist);
c906108c 3819 overload_resolution = 1;
c906108c 3820}