]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/ada-lang.c
out of line functions nested inside inline functions.
[thirdparty/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
32d0add0 3 Copyright (C) 1992-2015 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
4c4b4cd2
PH
24#include "gdb_regex.h"
25#include "frame.h"
14f9c5c9
AS
26#include "symtab.h"
27#include "gdbtypes.h"
28#include "gdbcmd.h"
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
a53b64ea 32#include "varobj.h"
14f9c5c9
AS
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
38#include "gdbcore.h"
4c4b4cd2
PH
39#include "hashtab.h"
40#include "gdb_obstack.h"
14f9c5c9 41#include "ada-lang.h"
4c4b4cd2 42#include "completer.h"
53ce3c39 43#include <sys/stat.h>
14f9c5c9 44#include "ui-out.h"
fe898f56 45#include "block.h"
04714b91 46#include "infcall.h"
de4f826b 47#include "dictionary.h"
f7f9143b
JB
48#include "annotate.h"
49#include "valprint.h"
9bbc9174 50#include "source.h"
0259addd 51#include "observer.h"
2ba95b9b 52#include "vec.h"
692465f1 53#include "stack.h"
fa864999 54#include "gdb_vecs.h"
79d43c61 55#include "typeprint.h"
14f9c5c9 56
ccefe4c4 57#include "psymtab.h"
40bc484c 58#include "value.h"
956a9fb9 59#include "mi/mi-common.h"
9ac4176b 60#include "arch-utils.h"
0fcd72ba 61#include "cli/cli-utils.h"
ccefe4c4 62
4c4b4cd2 63/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 64 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
65 Copied from valarith.c. */
66
67#ifndef TRUNCATION_TOWARDS_ZERO
68#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
69#endif
70
d2e4a39e 71static struct type *desc_base_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct type *desc_bounds_type (struct type *);
14f9c5c9 74
d2e4a39e 75static struct value *desc_bounds (struct value *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 78
d2e4a39e 79static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 80
556bdfd4 81static struct type *desc_data_target_type (struct type *);
14f9c5c9 82
d2e4a39e 83static struct value *desc_data (struct value *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 86
d2e4a39e 87static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 88
d2e4a39e 89static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 94
d2e4a39e 95static struct type *desc_index_type (struct type *, int);
14f9c5c9 96
d2e4a39e 97static int desc_arity (struct type *);
14f9c5c9 98
d2e4a39e 99static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 100
d2e4a39e 101static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 102
40658b94
PH
103static int full_match (const char *, const char *);
104
40bc484c 105static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 106
4c4b4cd2 107static void ada_add_block_symbols (struct obstack *,
f0c5f9b2 108 const struct block *, const char *,
2570f2b7 109 domain_enum, struct objfile *, int);
14f9c5c9 110
4c4b4cd2 111static int is_nonfunction (struct ada_symbol_info *, int);
14f9c5c9 112
76a01679 113static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 114 const struct block *);
14f9c5c9 115
4c4b4cd2
PH
116static int num_defns_collected (struct obstack *);
117
118static struct ada_symbol_info *defns_collected (struct obstack *, int);
14f9c5c9 119
4c4b4cd2 120static struct value *resolve_subexp (struct expression **, int *, int,
76a01679 121 struct type *);
14f9c5c9 122
d2e4a39e 123static void replace_operator_with_call (struct expression **, int, int, int,
270140bd 124 struct symbol *, const struct block *);
14f9c5c9 125
d2e4a39e 126static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 127
4c4b4cd2
PH
128static char *ada_op_name (enum exp_opcode);
129
130static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 131
d2e4a39e 132static int numeric_type_p (struct type *);
14f9c5c9 133
d2e4a39e 134static int integer_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int scalar_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int discrete_type_p (struct type *);
14f9c5c9 139
aeb5907d
JB
140static enum ada_renaming_category parse_old_style_renaming (struct type *,
141 const char **,
142 int *,
143 const char **);
144
145static struct symbol *find_old_style_renaming_symbol (const char *,
270140bd 146 const struct block *);
aeb5907d 147
4c4b4cd2 148static struct type *ada_lookup_struct_elt_type (struct type *, char *,
76a01679 149 int, int, int *);
4c4b4cd2 150
d2e4a39e 151static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 152
b4ba55a1
JB
153static struct type *ada_find_parallel_type_with_name (struct type *,
154 const char *);
155
d2e4a39e 156static int is_dynamic_field (struct type *, int);
14f9c5c9 157
10a2c479 158static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 159 const gdb_byte *,
4c4b4cd2
PH
160 CORE_ADDR, struct value *);
161
162static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 163
28c85d6c 164static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 165
d2e4a39e 166static struct type *to_static_fixed_type (struct type *);
f192137b 167static struct type *static_unwrap_type (struct type *type);
14f9c5c9 168
d2e4a39e 169static struct value *unwrap_value (struct value *);
14f9c5c9 170
ad82864c 171static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 172
ad82864c 173static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 174
ad82864c
JB
175static long decode_packed_array_bitsize (struct type *);
176
177static struct value *decode_constrained_packed_array (struct value *);
178
179static int ada_is_packed_array_type (struct type *);
180
181static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 182
d2e4a39e 183static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 184 struct value **);
14f9c5c9 185
50810684 186static void move_bits (gdb_byte *, int, const gdb_byte *, int, int, int);
52ce6436 187
4c4b4cd2
PH
188static struct value *coerce_unspec_val_to_type (struct value *,
189 struct type *);
14f9c5c9 190
d2e4a39e 191static struct value *get_var_value (char *, char *);
14f9c5c9 192
d2e4a39e 193static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 194
d2e4a39e 195static int equiv_types (struct type *, struct type *);
14f9c5c9 196
d2e4a39e 197static int is_name_suffix (const char *);
14f9c5c9 198
73589123
PH
199static int advance_wild_match (const char **, const char *, int);
200
201static int wild_match (const char *, const char *);
14f9c5c9 202
d2e4a39e 203static struct value *ada_coerce_ref (struct value *);
14f9c5c9 204
4c4b4cd2
PH
205static LONGEST pos_atr (struct value *);
206
3cb382c9 207static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 208
d2e4a39e 209static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 210
4c4b4cd2
PH
211static struct symbol *standard_lookup (const char *, const struct block *,
212 domain_enum);
14f9c5c9 213
4c4b4cd2
PH
214static struct value *ada_search_struct_field (char *, struct value *, int,
215 struct type *);
216
217static struct value *ada_value_primitive_field (struct value *, int, int,
218 struct type *);
219
0d5cff50 220static int find_struct_field (const char *, struct type *, int,
52ce6436 221 struct type **, int *, int *, int *, int *);
4c4b4cd2
PH
222
223static struct value *ada_to_fixed_value_create (struct type *, CORE_ADDR,
224 struct value *);
225
4c4b4cd2
PH
226static int ada_resolve_function (struct ada_symbol_info *, int,
227 struct value **, int, const char *,
228 struct type *);
229
4c4b4cd2
PH
230static int ada_is_direct_array_type (struct type *);
231
72d5681a
PH
232static void ada_language_arch_info (struct gdbarch *,
233 struct language_arch_info *);
714e53ab 234
52ce6436
PH
235static struct value *ada_index_struct_field (int, struct value *, int,
236 struct type *);
237
238static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
239 struct expression *,
240 int *, enum noside);
52ce6436
PH
241
242static void aggregate_assign_from_choices (struct value *, struct value *,
243 struct expression *,
244 int *, LONGEST *, int *,
245 int, LONGEST, LONGEST);
246
247static void aggregate_assign_positional (struct value *, struct value *,
248 struct expression *,
249 int *, LONGEST *, int *, int,
250 LONGEST, LONGEST);
251
252
253static void aggregate_assign_others (struct value *, struct value *,
254 struct expression *,
255 int *, LONGEST *, int, LONGEST, LONGEST);
256
257
258static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
259
260
261static struct value *ada_evaluate_subexp (struct type *, struct expression *,
262 int *, enum noside);
263
264static void ada_forward_operator_length (struct expression *, int, int *,
265 int *);
852dff6c
JB
266
267static struct type *ada_find_any_type (const char *name);
4c4b4cd2
PH
268\f
269
ee01b665
JB
270/* The result of a symbol lookup to be stored in our symbol cache. */
271
272struct cache_entry
273{
274 /* The name used to perform the lookup. */
275 const char *name;
276 /* The namespace used during the lookup. */
fe978cb0 277 domain_enum domain;
ee01b665
JB
278 /* The symbol returned by the lookup, or NULL if no matching symbol
279 was found. */
280 struct symbol *sym;
281 /* The block where the symbol was found, or NULL if no matching
282 symbol was found. */
283 const struct block *block;
284 /* A pointer to the next entry with the same hash. */
285 struct cache_entry *next;
286};
287
288/* The Ada symbol cache, used to store the result of Ada-mode symbol
289 lookups in the course of executing the user's commands.
290
291 The cache is implemented using a simple, fixed-sized hash.
292 The size is fixed on the grounds that there are not likely to be
293 all that many symbols looked up during any given session, regardless
294 of the size of the symbol table. If we decide to go to a resizable
295 table, let's just use the stuff from libiberty instead. */
296
297#define HASH_SIZE 1009
298
299struct ada_symbol_cache
300{
301 /* An obstack used to store the entries in our cache. */
302 struct obstack cache_space;
303
304 /* The root of the hash table used to implement our symbol cache. */
305 struct cache_entry *root[HASH_SIZE];
306};
307
308static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 309
4c4b4cd2 310/* Maximum-sized dynamic type. */
14f9c5c9
AS
311static unsigned int varsize_limit;
312
4c4b4cd2
PH
313/* FIXME: brobecker/2003-09-17: No longer a const because it is
314 returned by a function that does not return a const char *. */
315static char *ada_completer_word_break_characters =
316#ifdef VMS
317 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
318#else
14f9c5c9 319 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 320#endif
14f9c5c9 321
4c4b4cd2 322/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 323static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 324 = "__gnat_ada_main_program_name";
14f9c5c9 325
4c4b4cd2
PH
326/* Limit on the number of warnings to raise per expression evaluation. */
327static int warning_limit = 2;
328
329/* Number of warning messages issued; reset to 0 by cleanups after
330 expression evaluation. */
331static int warnings_issued = 0;
332
333static const char *known_runtime_file_name_patterns[] = {
334 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
335};
336
337static const char *known_auxiliary_function_name_patterns[] = {
338 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
339};
340
341/* Space for allocating results of ada_lookup_symbol_list. */
342static struct obstack symbol_list_obstack;
343
c6044dd1
JB
344/* Maintenance-related settings for this module. */
345
346static struct cmd_list_element *maint_set_ada_cmdlist;
347static struct cmd_list_element *maint_show_ada_cmdlist;
348
349/* Implement the "maintenance set ada" (prefix) command. */
350
351static void
352maint_set_ada_cmd (char *args, int from_tty)
353{
635c7e8a
TT
354 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
355 gdb_stdout);
c6044dd1
JB
356}
357
358/* Implement the "maintenance show ada" (prefix) command. */
359
360static void
361maint_show_ada_cmd (char *args, int from_tty)
362{
363 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
364}
365
366/* The "maintenance ada set/show ignore-descriptive-type" value. */
367
368static int ada_ignore_descriptive_types_p = 0;
369
e802dbe0
JB
370 /* Inferior-specific data. */
371
372/* Per-inferior data for this module. */
373
374struct ada_inferior_data
375{
376 /* The ada__tags__type_specific_data type, which is used when decoding
377 tagged types. With older versions of GNAT, this type was directly
378 accessible through a component ("tsd") in the object tag. But this
379 is no longer the case, so we cache it for each inferior. */
380 struct type *tsd_type;
3eecfa55
JB
381
382 /* The exception_support_info data. This data is used to determine
383 how to implement support for Ada exception catchpoints in a given
384 inferior. */
385 const struct exception_support_info *exception_info;
e802dbe0
JB
386};
387
388/* Our key to this module's inferior data. */
389static const struct inferior_data *ada_inferior_data;
390
391/* A cleanup routine for our inferior data. */
392static void
393ada_inferior_data_cleanup (struct inferior *inf, void *arg)
394{
395 struct ada_inferior_data *data;
396
397 data = inferior_data (inf, ada_inferior_data);
398 if (data != NULL)
399 xfree (data);
400}
401
402/* Return our inferior data for the given inferior (INF).
403
404 This function always returns a valid pointer to an allocated
405 ada_inferior_data structure. If INF's inferior data has not
406 been previously set, this functions creates a new one with all
407 fields set to zero, sets INF's inferior to it, and then returns
408 a pointer to that newly allocated ada_inferior_data. */
409
410static struct ada_inferior_data *
411get_ada_inferior_data (struct inferior *inf)
412{
413 struct ada_inferior_data *data;
414
415 data = inferior_data (inf, ada_inferior_data);
416 if (data == NULL)
417 {
41bf6aca 418 data = XCNEW (struct ada_inferior_data);
e802dbe0
JB
419 set_inferior_data (inf, ada_inferior_data, data);
420 }
421
422 return data;
423}
424
425/* Perform all necessary cleanups regarding our module's inferior data
426 that is required after the inferior INF just exited. */
427
428static void
429ada_inferior_exit (struct inferior *inf)
430{
431 ada_inferior_data_cleanup (inf, NULL);
432 set_inferior_data (inf, ada_inferior_data, NULL);
433}
434
ee01b665
JB
435
436 /* program-space-specific data. */
437
438/* This module's per-program-space data. */
439struct ada_pspace_data
440{
441 /* The Ada symbol cache. */
442 struct ada_symbol_cache *sym_cache;
443};
444
445/* Key to our per-program-space data. */
446static const struct program_space_data *ada_pspace_data_handle;
447
448/* Return this module's data for the given program space (PSPACE).
449 If not is found, add a zero'ed one now.
450
451 This function always returns a valid object. */
452
453static struct ada_pspace_data *
454get_ada_pspace_data (struct program_space *pspace)
455{
456 struct ada_pspace_data *data;
457
458 data = program_space_data (pspace, ada_pspace_data_handle);
459 if (data == NULL)
460 {
461 data = XCNEW (struct ada_pspace_data);
462 set_program_space_data (pspace, ada_pspace_data_handle, data);
463 }
464
465 return data;
466}
467
468/* The cleanup callback for this module's per-program-space data. */
469
470static void
471ada_pspace_data_cleanup (struct program_space *pspace, void *data)
472{
473 struct ada_pspace_data *pspace_data = data;
474
475 if (pspace_data->sym_cache != NULL)
476 ada_free_symbol_cache (pspace_data->sym_cache);
477 xfree (pspace_data);
478}
479
4c4b4cd2
PH
480 /* Utilities */
481
720d1a40 482/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 483 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
484
485 Normally, we really expect a typedef type to only have 1 typedef layer.
486 In other words, we really expect the target type of a typedef type to be
487 a non-typedef type. This is particularly true for Ada units, because
488 the language does not have a typedef vs not-typedef distinction.
489 In that respect, the Ada compiler has been trying to eliminate as many
490 typedef definitions in the debugging information, since they generally
491 do not bring any extra information (we still use typedef under certain
492 circumstances related mostly to the GNAT encoding).
493
494 Unfortunately, we have seen situations where the debugging information
495 generated by the compiler leads to such multiple typedef layers. For
496 instance, consider the following example with stabs:
497
498 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
499 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
500
501 This is an error in the debugging information which causes type
502 pck__float_array___XUP to be defined twice, and the second time,
503 it is defined as a typedef of a typedef.
504
505 This is on the fringe of legality as far as debugging information is
506 concerned, and certainly unexpected. But it is easy to handle these
507 situations correctly, so we can afford to be lenient in this case. */
508
509static struct type *
510ada_typedef_target_type (struct type *type)
511{
512 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
513 type = TYPE_TARGET_TYPE (type);
514 return type;
515}
516
41d27058
JB
517/* Given DECODED_NAME a string holding a symbol name in its
518 decoded form (ie using the Ada dotted notation), returns
519 its unqualified name. */
520
521static const char *
522ada_unqualified_name (const char *decoded_name)
523{
2b0f535a
JB
524 const char *result;
525
526 /* If the decoded name starts with '<', it means that the encoded
527 name does not follow standard naming conventions, and thus that
528 it is not your typical Ada symbol name. Trying to unqualify it
529 is therefore pointless and possibly erroneous. */
530 if (decoded_name[0] == '<')
531 return decoded_name;
532
533 result = strrchr (decoded_name, '.');
41d27058
JB
534 if (result != NULL)
535 result++; /* Skip the dot... */
536 else
537 result = decoded_name;
538
539 return result;
540}
541
542/* Return a string starting with '<', followed by STR, and '>'.
543 The result is good until the next call. */
544
545static char *
546add_angle_brackets (const char *str)
547{
548 static char *result = NULL;
549
550 xfree (result);
88c15c34 551 result = xstrprintf ("<%s>", str);
41d27058
JB
552 return result;
553}
96d887e8 554
4c4b4cd2
PH
555static char *
556ada_get_gdb_completer_word_break_characters (void)
557{
558 return ada_completer_word_break_characters;
559}
560
e79af960
JB
561/* Print an array element index using the Ada syntax. */
562
563static void
564ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 565 const struct value_print_options *options)
e79af960 566{
79a45b7d 567 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
568 fprintf_filtered (stream, " => ");
569}
570
f27cf670 571/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 572 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 573 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 574
f27cf670
AS
575void *
576grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 577{
d2e4a39e
AS
578 if (*size < min_size)
579 {
580 *size *= 2;
581 if (*size < min_size)
4c4b4cd2 582 *size = min_size;
f27cf670 583 vect = xrealloc (vect, *size * element_size);
d2e4a39e 584 }
f27cf670 585 return vect;
14f9c5c9
AS
586}
587
588/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 589 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
590
591static int
ebf56fd3 592field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
593{
594 int len = strlen (target);
5b4ee69b 595
d2e4a39e 596 return
4c4b4cd2
PH
597 (strncmp (field_name, target, len) == 0
598 && (field_name[len] == '\0'
61012eef 599 || (startswith (field_name + len, "___")
76a01679
JB
600 && strcmp (field_name + strlen (field_name) - 6,
601 "___XVN") != 0)));
14f9c5c9
AS
602}
603
604
872c8b51
JB
605/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
606 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
607 and return its index. This function also handles fields whose name
608 have ___ suffixes because the compiler sometimes alters their name
609 by adding such a suffix to represent fields with certain constraints.
610 If the field could not be found, return a negative number if
611 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
612
613int
614ada_get_field_index (const struct type *type, const char *field_name,
615 int maybe_missing)
616{
617 int fieldno;
872c8b51
JB
618 struct type *struct_type = check_typedef ((struct type *) type);
619
620 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
621 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
622 return fieldno;
623
624 if (!maybe_missing)
323e0a4a 625 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 626 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
627
628 return -1;
629}
630
631/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
632
633int
d2e4a39e 634ada_name_prefix_len (const char *name)
14f9c5c9
AS
635{
636 if (name == NULL)
637 return 0;
d2e4a39e 638 else
14f9c5c9 639 {
d2e4a39e 640 const char *p = strstr (name, "___");
5b4ee69b 641
14f9c5c9 642 if (p == NULL)
4c4b4cd2 643 return strlen (name);
14f9c5c9 644 else
4c4b4cd2 645 return p - name;
14f9c5c9
AS
646 }
647}
648
4c4b4cd2
PH
649/* Return non-zero if SUFFIX is a suffix of STR.
650 Return zero if STR is null. */
651
14f9c5c9 652static int
d2e4a39e 653is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
654{
655 int len1, len2;
5b4ee69b 656
14f9c5c9
AS
657 if (str == NULL)
658 return 0;
659 len1 = strlen (str);
660 len2 = strlen (suffix);
4c4b4cd2 661 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
662}
663
4c4b4cd2
PH
664/* The contents of value VAL, treated as a value of type TYPE. The
665 result is an lval in memory if VAL is. */
14f9c5c9 666
d2e4a39e 667static struct value *
4c4b4cd2 668coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 669{
61ee279c 670 type = ada_check_typedef (type);
df407dfe 671 if (value_type (val) == type)
4c4b4cd2 672 return val;
d2e4a39e 673 else
14f9c5c9 674 {
4c4b4cd2
PH
675 struct value *result;
676
677 /* Make sure that the object size is not unreasonable before
678 trying to allocate some memory for it. */
c1b5a1a6 679 ada_ensure_varsize_limit (type);
4c4b4cd2 680
41e8491f
JK
681 if (value_lazy (val)
682 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
683 result = allocate_value_lazy (type);
684 else
685 {
686 result = allocate_value (type);
9a0dc9e3 687 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 688 }
74bcbdf3 689 set_value_component_location (result, val);
9bbda503
AC
690 set_value_bitsize (result, value_bitsize (val));
691 set_value_bitpos (result, value_bitpos (val));
42ae5230 692 set_value_address (result, value_address (val));
14f9c5c9
AS
693 return result;
694 }
695}
696
fc1a4b47
AC
697static const gdb_byte *
698cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
699{
700 if (valaddr == NULL)
701 return NULL;
702 else
703 return valaddr + offset;
704}
705
706static CORE_ADDR
ebf56fd3 707cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
708{
709 if (address == 0)
710 return 0;
d2e4a39e 711 else
14f9c5c9
AS
712 return address + offset;
713}
714
4c4b4cd2
PH
715/* Issue a warning (as for the definition of warning in utils.c, but
716 with exactly one argument rather than ...), unless the limit on the
717 number of warnings has passed during the evaluation of the current
718 expression. */
a2249542 719
77109804
AC
720/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
721 provided by "complaint". */
a0b31db1 722static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 723
14f9c5c9 724static void
a2249542 725lim_warning (const char *format, ...)
14f9c5c9 726{
a2249542 727 va_list args;
a2249542 728
5b4ee69b 729 va_start (args, format);
4c4b4cd2
PH
730 warnings_issued += 1;
731 if (warnings_issued <= warning_limit)
a2249542
MK
732 vwarning (format, args);
733
734 va_end (args);
4c4b4cd2
PH
735}
736
714e53ab
PH
737/* Issue an error if the size of an object of type T is unreasonable,
738 i.e. if it would be a bad idea to allocate a value of this type in
739 GDB. */
740
c1b5a1a6
JB
741void
742ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
743{
744 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 745 error (_("object size is larger than varsize-limit"));
714e53ab
PH
746}
747
0963b4bd 748/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 749static LONGEST
c3e5cd34 750max_of_size (int size)
4c4b4cd2 751{
76a01679 752 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 753
76a01679 754 return top_bit | (top_bit - 1);
4c4b4cd2
PH
755}
756
0963b4bd 757/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 758static LONGEST
c3e5cd34 759min_of_size (int size)
4c4b4cd2 760{
c3e5cd34 761 return -max_of_size (size) - 1;
4c4b4cd2
PH
762}
763
0963b4bd 764/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 765static ULONGEST
c3e5cd34 766umax_of_size (int size)
4c4b4cd2 767{
76a01679 768 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 769
76a01679 770 return top_bit | (top_bit - 1);
4c4b4cd2
PH
771}
772
0963b4bd 773/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
774static LONGEST
775max_of_type (struct type *t)
4c4b4cd2 776{
c3e5cd34
PH
777 if (TYPE_UNSIGNED (t))
778 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
779 else
780 return max_of_size (TYPE_LENGTH (t));
781}
782
0963b4bd 783/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
784static LONGEST
785min_of_type (struct type *t)
786{
787 if (TYPE_UNSIGNED (t))
788 return 0;
789 else
790 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
791}
792
793/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
794LONGEST
795ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 796{
c3345124 797 type = resolve_dynamic_type (type, NULL, 0);
76a01679 798 switch (TYPE_CODE (type))
4c4b4cd2
PH
799 {
800 case TYPE_CODE_RANGE:
690cc4eb 801 return TYPE_HIGH_BOUND (type);
4c4b4cd2 802 case TYPE_CODE_ENUM:
14e75d8e 803 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
804 case TYPE_CODE_BOOL:
805 return 1;
806 case TYPE_CODE_CHAR:
76a01679 807 case TYPE_CODE_INT:
690cc4eb 808 return max_of_type (type);
4c4b4cd2 809 default:
43bbcdc2 810 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
811 }
812}
813
14e75d8e 814/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
815LONGEST
816ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 817{
c3345124 818 type = resolve_dynamic_type (type, NULL, 0);
76a01679 819 switch (TYPE_CODE (type))
4c4b4cd2
PH
820 {
821 case TYPE_CODE_RANGE:
690cc4eb 822 return TYPE_LOW_BOUND (type);
4c4b4cd2 823 case TYPE_CODE_ENUM:
14e75d8e 824 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
825 case TYPE_CODE_BOOL:
826 return 0;
827 case TYPE_CODE_CHAR:
76a01679 828 case TYPE_CODE_INT:
690cc4eb 829 return min_of_type (type);
4c4b4cd2 830 default:
43bbcdc2 831 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
832 }
833}
834
835/* The identity on non-range types. For range types, the underlying
76a01679 836 non-range scalar type. */
4c4b4cd2
PH
837
838static struct type *
18af8284 839get_base_type (struct type *type)
4c4b4cd2
PH
840{
841 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
842 {
76a01679
JB
843 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
844 return type;
4c4b4cd2
PH
845 type = TYPE_TARGET_TYPE (type);
846 }
847 return type;
14f9c5c9 848}
41246937
JB
849
850/* Return a decoded version of the given VALUE. This means returning
851 a value whose type is obtained by applying all the GNAT-specific
852 encondings, making the resulting type a static but standard description
853 of the initial type. */
854
855struct value *
856ada_get_decoded_value (struct value *value)
857{
858 struct type *type = ada_check_typedef (value_type (value));
859
860 if (ada_is_array_descriptor_type (type)
861 || (ada_is_constrained_packed_array_type (type)
862 && TYPE_CODE (type) != TYPE_CODE_PTR))
863 {
864 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
865 value = ada_coerce_to_simple_array_ptr (value);
866 else
867 value = ada_coerce_to_simple_array (value);
868 }
869 else
870 value = ada_to_fixed_value (value);
871
872 return value;
873}
874
875/* Same as ada_get_decoded_value, but with the given TYPE.
876 Because there is no associated actual value for this type,
877 the resulting type might be a best-effort approximation in
878 the case of dynamic types. */
879
880struct type *
881ada_get_decoded_type (struct type *type)
882{
883 type = to_static_fixed_type (type);
884 if (ada_is_constrained_packed_array_type (type))
885 type = ada_coerce_to_simple_array_type (type);
886 return type;
887}
888
4c4b4cd2 889\f
76a01679 890
4c4b4cd2 891 /* Language Selection */
14f9c5c9
AS
892
893/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 894 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 895
14f9c5c9 896enum language
ccefe4c4 897ada_update_initial_language (enum language lang)
14f9c5c9 898{
d2e4a39e 899 if (lookup_minimal_symbol ("adainit", (const char *) NULL,
3b7344d5 900 (struct objfile *) NULL).minsym != NULL)
4c4b4cd2 901 return language_ada;
14f9c5c9
AS
902
903 return lang;
904}
96d887e8
PH
905
906/* If the main procedure is written in Ada, then return its name.
907 The result is good until the next call. Return NULL if the main
908 procedure doesn't appear to be in Ada. */
909
910char *
911ada_main_name (void)
912{
3b7344d5 913 struct bound_minimal_symbol msym;
f9bc20b9 914 static char *main_program_name = NULL;
6c038f32 915
96d887e8
PH
916 /* For Ada, the name of the main procedure is stored in a specific
917 string constant, generated by the binder. Look for that symbol,
918 extract its address, and then read that string. If we didn't find
919 that string, then most probably the main procedure is not written
920 in Ada. */
921 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
922
3b7344d5 923 if (msym.minsym != NULL)
96d887e8 924 {
f9bc20b9
JB
925 CORE_ADDR main_program_name_addr;
926 int err_code;
927
77e371c0 928 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 929 if (main_program_name_addr == 0)
323e0a4a 930 error (_("Invalid address for Ada main program name."));
96d887e8 931
f9bc20b9
JB
932 xfree (main_program_name);
933 target_read_string (main_program_name_addr, &main_program_name,
934 1024, &err_code);
935
936 if (err_code != 0)
937 return NULL;
96d887e8
PH
938 return main_program_name;
939 }
940
941 /* The main procedure doesn't seem to be in Ada. */
942 return NULL;
943}
14f9c5c9 944\f
4c4b4cd2 945 /* Symbols */
d2e4a39e 946
4c4b4cd2
PH
947/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
948 of NULLs. */
14f9c5c9 949
d2e4a39e
AS
950const struct ada_opname_map ada_opname_table[] = {
951 {"Oadd", "\"+\"", BINOP_ADD},
952 {"Osubtract", "\"-\"", BINOP_SUB},
953 {"Omultiply", "\"*\"", BINOP_MUL},
954 {"Odivide", "\"/\"", BINOP_DIV},
955 {"Omod", "\"mod\"", BINOP_MOD},
956 {"Orem", "\"rem\"", BINOP_REM},
957 {"Oexpon", "\"**\"", BINOP_EXP},
958 {"Olt", "\"<\"", BINOP_LESS},
959 {"Ole", "\"<=\"", BINOP_LEQ},
960 {"Ogt", "\">\"", BINOP_GTR},
961 {"Oge", "\">=\"", BINOP_GEQ},
962 {"Oeq", "\"=\"", BINOP_EQUAL},
963 {"One", "\"/=\"", BINOP_NOTEQUAL},
964 {"Oand", "\"and\"", BINOP_BITWISE_AND},
965 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
966 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
967 {"Oconcat", "\"&\"", BINOP_CONCAT},
968 {"Oabs", "\"abs\"", UNOP_ABS},
969 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
970 {"Oadd", "\"+\"", UNOP_PLUS},
971 {"Osubtract", "\"-\"", UNOP_NEG},
972 {NULL, NULL}
14f9c5c9
AS
973};
974
4c4b4cd2
PH
975/* The "encoded" form of DECODED, according to GNAT conventions.
976 The result is valid until the next call to ada_encode. */
977
14f9c5c9 978char *
4c4b4cd2 979ada_encode (const char *decoded)
14f9c5c9 980{
4c4b4cd2
PH
981 static char *encoding_buffer = NULL;
982 static size_t encoding_buffer_size = 0;
d2e4a39e 983 const char *p;
14f9c5c9 984 int k;
d2e4a39e 985
4c4b4cd2 986 if (decoded == NULL)
14f9c5c9
AS
987 return NULL;
988
4c4b4cd2
PH
989 GROW_VECT (encoding_buffer, encoding_buffer_size,
990 2 * strlen (decoded) + 10);
14f9c5c9
AS
991
992 k = 0;
4c4b4cd2 993 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 994 {
cdc7bb92 995 if (*p == '.')
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
998 k += 2;
999 }
14f9c5c9 1000 else if (*p == '"')
4c4b4cd2
PH
1001 {
1002 const struct ada_opname_map *mapping;
1003
1004 for (mapping = ada_opname_table;
1265e4aa 1005 mapping->encoded != NULL
61012eef 1006 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
1007 ;
1008 if (mapping->encoded == NULL)
323e0a4a 1009 error (_("invalid Ada operator name: %s"), p);
4c4b4cd2
PH
1010 strcpy (encoding_buffer + k, mapping->encoded);
1011 k += strlen (mapping->encoded);
1012 break;
1013 }
d2e4a39e 1014 else
4c4b4cd2
PH
1015 {
1016 encoding_buffer[k] = *p;
1017 k += 1;
1018 }
14f9c5c9
AS
1019 }
1020
4c4b4cd2
PH
1021 encoding_buffer[k] = '\0';
1022 return encoding_buffer;
14f9c5c9
AS
1023}
1024
1025/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1026 quotes, unfolded, but with the quotes stripped away. Result good
1027 to next call. */
1028
d2e4a39e
AS
1029char *
1030ada_fold_name (const char *name)
14f9c5c9 1031{
d2e4a39e 1032 static char *fold_buffer = NULL;
14f9c5c9
AS
1033 static size_t fold_buffer_size = 0;
1034
1035 int len = strlen (name);
d2e4a39e 1036 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1037
1038 if (name[0] == '\'')
1039 {
d2e4a39e
AS
1040 strncpy (fold_buffer, name + 1, len - 2);
1041 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1042 }
1043 else
1044 {
1045 int i;
5b4ee69b 1046
14f9c5c9 1047 for (i = 0; i <= len; i += 1)
4c4b4cd2 1048 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1049 }
1050
1051 return fold_buffer;
1052}
1053
529cad9c
PH
1054/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1055
1056static int
1057is_lower_alphanum (const char c)
1058{
1059 return (isdigit (c) || (isalpha (c) && islower (c)));
1060}
1061
c90092fe
JB
1062/* ENCODED is the linkage name of a symbol and LEN contains its length.
1063 This function saves in LEN the length of that same symbol name but
1064 without either of these suffixes:
29480c32
JB
1065 . .{DIGIT}+
1066 . ${DIGIT}+
1067 . ___{DIGIT}+
1068 . __{DIGIT}+.
c90092fe 1069
29480c32
JB
1070 These are suffixes introduced by the compiler for entities such as
1071 nested subprogram for instance, in order to avoid name clashes.
1072 They do not serve any purpose for the debugger. */
1073
1074static void
1075ada_remove_trailing_digits (const char *encoded, int *len)
1076{
1077 if (*len > 1 && isdigit (encoded[*len - 1]))
1078 {
1079 int i = *len - 2;
5b4ee69b 1080
29480c32
JB
1081 while (i > 0 && isdigit (encoded[i]))
1082 i--;
1083 if (i >= 0 && encoded[i] == '.')
1084 *len = i;
1085 else if (i >= 0 && encoded[i] == '$')
1086 *len = i;
61012eef 1087 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1088 *len = i - 2;
61012eef 1089 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1090 *len = i - 1;
1091 }
1092}
1093
1094/* Remove the suffix introduced by the compiler for protected object
1095 subprograms. */
1096
1097static void
1098ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1099{
1100 /* Remove trailing N. */
1101
1102 /* Protected entry subprograms are broken into two
1103 separate subprograms: The first one is unprotected, and has
1104 a 'N' suffix; the second is the protected version, and has
0963b4bd 1105 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1106 the protection. Since the P subprograms are internally generated,
1107 we leave these names undecoded, giving the user a clue that this
1108 entity is internal. */
1109
1110 if (*len > 1
1111 && encoded[*len - 1] == 'N'
1112 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1113 *len = *len - 1;
1114}
1115
69fadcdf
JB
1116/* Remove trailing X[bn]* suffixes (indicating names in package bodies). */
1117
1118static void
1119ada_remove_Xbn_suffix (const char *encoded, int *len)
1120{
1121 int i = *len - 1;
1122
1123 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n'))
1124 i--;
1125
1126 if (encoded[i] != 'X')
1127 return;
1128
1129 if (i == 0)
1130 return;
1131
1132 if (isalnum (encoded[i-1]))
1133 *len = i;
1134}
1135
29480c32
JB
1136/* If ENCODED follows the GNAT entity encoding conventions, then return
1137 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1138 replaced by ENCODED.
14f9c5c9 1139
4c4b4cd2 1140 The resulting string is valid until the next call of ada_decode.
29480c32 1141 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1142 is returned. */
1143
1144const char *
1145ada_decode (const char *encoded)
14f9c5c9
AS
1146{
1147 int i, j;
1148 int len0;
d2e4a39e 1149 const char *p;
4c4b4cd2 1150 char *decoded;
14f9c5c9 1151 int at_start_name;
4c4b4cd2
PH
1152 static char *decoding_buffer = NULL;
1153 static size_t decoding_buffer_size = 0;
d2e4a39e 1154
29480c32
JB
1155 /* The name of the Ada main procedure starts with "_ada_".
1156 This prefix is not part of the decoded name, so skip this part
1157 if we see this prefix. */
61012eef 1158 if (startswith (encoded, "_ada_"))
4c4b4cd2 1159 encoded += 5;
14f9c5c9 1160
29480c32
JB
1161 /* If the name starts with '_', then it is not a properly encoded
1162 name, so do not attempt to decode it. Similarly, if the name
1163 starts with '<', the name should not be decoded. */
4c4b4cd2 1164 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1165 goto Suppress;
1166
4c4b4cd2 1167 len0 = strlen (encoded);
4c4b4cd2 1168
29480c32
JB
1169 ada_remove_trailing_digits (encoded, &len0);
1170 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1171
4c4b4cd2
PH
1172 /* Remove the ___X.* suffix if present. Do not forget to verify that
1173 the suffix is located before the current "end" of ENCODED. We want
1174 to avoid re-matching parts of ENCODED that have previously been
1175 marked as discarded (by decrementing LEN0). */
1176 p = strstr (encoded, "___");
1177 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1178 {
1179 if (p[3] == 'X')
4c4b4cd2 1180 len0 = p - encoded;
14f9c5c9 1181 else
4c4b4cd2 1182 goto Suppress;
14f9c5c9 1183 }
4c4b4cd2 1184
29480c32
JB
1185 /* Remove any trailing TKB suffix. It tells us that this symbol
1186 is for the body of a task, but that information does not actually
1187 appear in the decoded name. */
1188
61012eef 1189 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1190 len0 -= 3;
76a01679 1191
a10967fa
JB
1192 /* Remove any trailing TB suffix. The TB suffix is slightly different
1193 from the TKB suffix because it is used for non-anonymous task
1194 bodies. */
1195
61012eef 1196 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1197 len0 -= 2;
1198
29480c32
JB
1199 /* Remove trailing "B" suffixes. */
1200 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1201
61012eef 1202 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1203 len0 -= 1;
1204
4c4b4cd2 1205 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1206
4c4b4cd2
PH
1207 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1208 decoded = decoding_buffer;
14f9c5c9 1209
29480c32
JB
1210 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1211
4c4b4cd2 1212 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1213 {
4c4b4cd2
PH
1214 i = len0 - 2;
1215 while ((i >= 0 && isdigit (encoded[i]))
1216 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1217 i -= 1;
1218 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1219 len0 = i - 1;
1220 else if (encoded[i] == '$')
1221 len0 = i;
d2e4a39e 1222 }
14f9c5c9 1223
29480c32
JB
1224 /* The first few characters that are not alphabetic are not part
1225 of any encoding we use, so we can copy them over verbatim. */
1226
4c4b4cd2
PH
1227 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1228 decoded[j] = encoded[i];
14f9c5c9
AS
1229
1230 at_start_name = 1;
1231 while (i < len0)
1232 {
29480c32 1233 /* Is this a symbol function? */
4c4b4cd2
PH
1234 if (at_start_name && encoded[i] == 'O')
1235 {
1236 int k;
5b4ee69b 1237
4c4b4cd2
PH
1238 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1239 {
1240 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1241 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1242 op_len - 1) == 0)
1243 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1244 {
1245 strcpy (decoded + j, ada_opname_table[k].decoded);
1246 at_start_name = 0;
1247 i += op_len;
1248 j += strlen (ada_opname_table[k].decoded);
1249 break;
1250 }
1251 }
1252 if (ada_opname_table[k].encoded != NULL)
1253 continue;
1254 }
14f9c5c9
AS
1255 at_start_name = 0;
1256
529cad9c
PH
1257 /* Replace "TK__" with "__", which will eventually be translated
1258 into "." (just below). */
1259
61012eef 1260 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1261 i += 2;
529cad9c 1262
29480c32
JB
1263 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1264 be translated into "." (just below). These are internal names
1265 generated for anonymous blocks inside which our symbol is nested. */
1266
1267 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1268 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1269 && isdigit (encoded [i+4]))
1270 {
1271 int k = i + 5;
1272
1273 while (k < len0 && isdigit (encoded[k]))
1274 k++; /* Skip any extra digit. */
1275
1276 /* Double-check that the "__B_{DIGITS}+" sequence we found
1277 is indeed followed by "__". */
1278 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1279 i = k;
1280 }
1281
529cad9c
PH
1282 /* Remove _E{DIGITS}+[sb] */
1283
1284 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1285 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1286 one implements the actual entry code, and has a suffix following
1287 the convention above; the second one implements the barrier and
1288 uses the same convention as above, except that the 'E' is replaced
1289 by a 'B'.
1290
1291 Just as above, we do not decode the name of barrier functions
1292 to give the user a clue that the code he is debugging has been
1293 internally generated. */
1294
1295 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1296 && isdigit (encoded[i+2]))
1297 {
1298 int k = i + 3;
1299
1300 while (k < len0 && isdigit (encoded[k]))
1301 k++;
1302
1303 if (k < len0
1304 && (encoded[k] == 'b' || encoded[k] == 's'))
1305 {
1306 k++;
1307 /* Just as an extra precaution, make sure that if this
1308 suffix is followed by anything else, it is a '_'.
1309 Otherwise, we matched this sequence by accident. */
1310 if (k == len0
1311 || (k < len0 && encoded[k] == '_'))
1312 i = k;
1313 }
1314 }
1315
1316 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1317 the GNAT front-end in protected object subprograms. */
1318
1319 if (i < len0 + 3
1320 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1321 {
1322 /* Backtrack a bit up until we reach either the begining of
1323 the encoded name, or "__". Make sure that we only find
1324 digits or lowercase characters. */
1325 const char *ptr = encoded + i - 1;
1326
1327 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1328 ptr--;
1329 if (ptr < encoded
1330 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1331 i++;
1332 }
1333
4c4b4cd2
PH
1334 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1335 {
29480c32
JB
1336 /* This is a X[bn]* sequence not separated from the previous
1337 part of the name with a non-alpha-numeric character (in other
1338 words, immediately following an alpha-numeric character), then
1339 verify that it is placed at the end of the encoded name. If
1340 not, then the encoding is not valid and we should abort the
1341 decoding. Otherwise, just skip it, it is used in body-nested
1342 package names. */
4c4b4cd2
PH
1343 do
1344 i += 1;
1345 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1346 if (i < len0)
1347 goto Suppress;
1348 }
cdc7bb92 1349 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1350 {
29480c32 1351 /* Replace '__' by '.'. */
4c4b4cd2
PH
1352 decoded[j] = '.';
1353 at_start_name = 1;
1354 i += 2;
1355 j += 1;
1356 }
14f9c5c9 1357 else
4c4b4cd2 1358 {
29480c32
JB
1359 /* It's a character part of the decoded name, so just copy it
1360 over. */
4c4b4cd2
PH
1361 decoded[j] = encoded[i];
1362 i += 1;
1363 j += 1;
1364 }
14f9c5c9 1365 }
4c4b4cd2 1366 decoded[j] = '\000';
14f9c5c9 1367
29480c32
JB
1368 /* Decoded names should never contain any uppercase character.
1369 Double-check this, and abort the decoding if we find one. */
1370
4c4b4cd2
PH
1371 for (i = 0; decoded[i] != '\0'; i += 1)
1372 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1373 goto Suppress;
1374
4c4b4cd2
PH
1375 if (strcmp (decoded, encoded) == 0)
1376 return encoded;
1377 else
1378 return decoded;
14f9c5c9
AS
1379
1380Suppress:
4c4b4cd2
PH
1381 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1382 decoded = decoding_buffer;
1383 if (encoded[0] == '<')
1384 strcpy (decoded, encoded);
14f9c5c9 1385 else
88c15c34 1386 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1387 return decoded;
1388
1389}
1390
1391/* Table for keeping permanent unique copies of decoded names. Once
1392 allocated, names in this table are never released. While this is a
1393 storage leak, it should not be significant unless there are massive
1394 changes in the set of decoded names in successive versions of a
1395 symbol table loaded during a single session. */
1396static struct htab *decoded_names_store;
1397
1398/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1399 in the language-specific part of GSYMBOL, if it has not been
1400 previously computed. Tries to save the decoded name in the same
1401 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1402 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1403 GSYMBOL).
4c4b4cd2
PH
1404 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1405 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1406 when a decoded name is cached in it. */
4c4b4cd2 1407
45e6c716 1408const char *
f85f34ed 1409ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1410{
f85f34ed
TT
1411 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1412 const char **resultp =
1413 &gsymbol->language_specific.mangled_lang.demangled_name;
5b4ee69b 1414
f85f34ed 1415 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1416 {
1417 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1418 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1419
f85f34ed 1420 gsymbol->ada_mangled = 1;
5b4ee69b 1421
f85f34ed
TT
1422 if (obstack != NULL)
1423 *resultp = obstack_copy0 (obstack, decoded, strlen (decoded));
1424 else
76a01679 1425 {
f85f34ed
TT
1426 /* Sometimes, we can't find a corresponding objfile, in
1427 which case, we put the result on the heap. Since we only
1428 decode when needed, we hope this usually does not cause a
1429 significant memory leak (FIXME). */
1430
76a01679
JB
1431 char **slot = (char **) htab_find_slot (decoded_names_store,
1432 decoded, INSERT);
5b4ee69b 1433
76a01679
JB
1434 if (*slot == NULL)
1435 *slot = xstrdup (decoded);
1436 *resultp = *slot;
1437 }
4c4b4cd2 1438 }
14f9c5c9 1439
4c4b4cd2
PH
1440 return *resultp;
1441}
76a01679 1442
2c0b251b 1443static char *
76a01679 1444ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1445{
1446 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1447}
1448
1449/* Returns non-zero iff SYM_NAME matches NAME, ignoring any trailing
4c4b4cd2
PH
1450 suffixes that encode debugging information or leading _ada_ on
1451 SYM_NAME (see is_name_suffix commentary for the debugging
1452 information that is ignored). If WILD, then NAME need only match a
1453 suffix of SYM_NAME minus the same suffixes. Also returns 0 if
1454 either argument is NULL. */
14f9c5c9 1455
2c0b251b 1456static int
40658b94 1457match_name (const char *sym_name, const char *name, int wild)
14f9c5c9
AS
1458{
1459 if (sym_name == NULL || name == NULL)
1460 return 0;
1461 else if (wild)
73589123 1462 return wild_match (sym_name, name) == 0;
d2e4a39e
AS
1463 else
1464 {
1465 int len_name = strlen (name);
5b4ee69b 1466
4c4b4cd2
PH
1467 return (strncmp (sym_name, name, len_name) == 0
1468 && is_name_suffix (sym_name + len_name))
61012eef 1469 || (startswith (sym_name, "_ada_")
4c4b4cd2
PH
1470 && strncmp (sym_name + 5, name, len_name) == 0
1471 && is_name_suffix (sym_name + len_name + 5));
d2e4a39e 1472 }
14f9c5c9 1473}
14f9c5c9 1474\f
d2e4a39e 1475
4c4b4cd2 1476 /* Arrays */
14f9c5c9 1477
28c85d6c
JB
1478/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1479 generated by the GNAT compiler to describe the index type used
1480 for each dimension of an array, check whether it follows the latest
1481 known encoding. If not, fix it up to conform to the latest encoding.
1482 Otherwise, do nothing. This function also does nothing if
1483 INDEX_DESC_TYPE is NULL.
1484
1485 The GNAT encoding used to describle the array index type evolved a bit.
1486 Initially, the information would be provided through the name of each
1487 field of the structure type only, while the type of these fields was
1488 described as unspecified and irrelevant. The debugger was then expected
1489 to perform a global type lookup using the name of that field in order
1490 to get access to the full index type description. Because these global
1491 lookups can be very expensive, the encoding was later enhanced to make
1492 the global lookup unnecessary by defining the field type as being
1493 the full index type description.
1494
1495 The purpose of this routine is to allow us to support older versions
1496 of the compiler by detecting the use of the older encoding, and by
1497 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1498 we essentially replace each field's meaningless type by the associated
1499 index subtype). */
1500
1501void
1502ada_fixup_array_indexes_type (struct type *index_desc_type)
1503{
1504 int i;
1505
1506 if (index_desc_type == NULL)
1507 return;
1508 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1509
1510 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1511 to check one field only, no need to check them all). If not, return
1512 now.
1513
1514 If our INDEX_DESC_TYPE was generated using the older encoding,
1515 the field type should be a meaningless integer type whose name
1516 is not equal to the field name. */
1517 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1518 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1519 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1520 return;
1521
1522 /* Fixup each field of INDEX_DESC_TYPE. */
1523 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1524 {
0d5cff50 1525 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1526 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1527
1528 if (raw_type)
1529 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1530 }
1531}
1532
4c4b4cd2 1533/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1534
d2e4a39e
AS
1535static char *bound_name[] = {
1536 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1537 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1538};
1539
1540/* Maximum number of array dimensions we are prepared to handle. */
1541
4c4b4cd2 1542#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1543
14f9c5c9 1544
4c4b4cd2
PH
1545/* The desc_* routines return primitive portions of array descriptors
1546 (fat pointers). */
14f9c5c9
AS
1547
1548/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1549 level of indirection, if needed. */
1550
d2e4a39e
AS
1551static struct type *
1552desc_base_type (struct type *type)
14f9c5c9
AS
1553{
1554 if (type == NULL)
1555 return NULL;
61ee279c 1556 type = ada_check_typedef (type);
720d1a40
JB
1557 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1558 type = ada_typedef_target_type (type);
1559
1265e4aa
JB
1560 if (type != NULL
1561 && (TYPE_CODE (type) == TYPE_CODE_PTR
1562 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1563 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1564 else
1565 return type;
1566}
1567
4c4b4cd2
PH
1568/* True iff TYPE indicates a "thin" array pointer type. */
1569
14f9c5c9 1570static int
d2e4a39e 1571is_thin_pntr (struct type *type)
14f9c5c9 1572{
d2e4a39e 1573 return
14f9c5c9
AS
1574 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1575 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1576}
1577
4c4b4cd2
PH
1578/* The descriptor type for thin pointer type TYPE. */
1579
d2e4a39e
AS
1580static struct type *
1581thin_descriptor_type (struct type *type)
14f9c5c9 1582{
d2e4a39e 1583 struct type *base_type = desc_base_type (type);
5b4ee69b 1584
14f9c5c9
AS
1585 if (base_type == NULL)
1586 return NULL;
1587 if (is_suffix (ada_type_name (base_type), "___XVE"))
1588 return base_type;
d2e4a39e 1589 else
14f9c5c9 1590 {
d2e4a39e 1591 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1592
14f9c5c9 1593 if (alt_type == NULL)
4c4b4cd2 1594 return base_type;
14f9c5c9 1595 else
4c4b4cd2 1596 return alt_type;
14f9c5c9
AS
1597 }
1598}
1599
4c4b4cd2
PH
1600/* A pointer to the array data for thin-pointer value VAL. */
1601
d2e4a39e
AS
1602static struct value *
1603thin_data_pntr (struct value *val)
14f9c5c9 1604{
828292f2 1605 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1606 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1607
556bdfd4
UW
1608 data_type = lookup_pointer_type (data_type);
1609
14f9c5c9 1610 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1611 return value_cast (data_type, value_copy (val));
d2e4a39e 1612 else
42ae5230 1613 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1614}
1615
4c4b4cd2
PH
1616/* True iff TYPE indicates a "thick" array pointer type. */
1617
14f9c5c9 1618static int
d2e4a39e 1619is_thick_pntr (struct type *type)
14f9c5c9
AS
1620{
1621 type = desc_base_type (type);
1622 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1623 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1624}
1625
4c4b4cd2
PH
1626/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1627 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1628
d2e4a39e
AS
1629static struct type *
1630desc_bounds_type (struct type *type)
14f9c5c9 1631{
d2e4a39e 1632 struct type *r;
14f9c5c9
AS
1633
1634 type = desc_base_type (type);
1635
1636 if (type == NULL)
1637 return NULL;
1638 else if (is_thin_pntr (type))
1639 {
1640 type = thin_descriptor_type (type);
1641 if (type == NULL)
4c4b4cd2 1642 return NULL;
14f9c5c9
AS
1643 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1644 if (r != NULL)
61ee279c 1645 return ada_check_typedef (r);
14f9c5c9
AS
1646 }
1647 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1648 {
1649 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1650 if (r != NULL)
61ee279c 1651 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1652 }
1653 return NULL;
1654}
1655
1656/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1657 one, a pointer to its bounds data. Otherwise NULL. */
1658
d2e4a39e
AS
1659static struct value *
1660desc_bounds (struct value *arr)
14f9c5c9 1661{
df407dfe 1662 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1663
d2e4a39e 1664 if (is_thin_pntr (type))
14f9c5c9 1665 {
d2e4a39e 1666 struct type *bounds_type =
4c4b4cd2 1667 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1668 LONGEST addr;
1669
4cdfadb1 1670 if (bounds_type == NULL)
323e0a4a 1671 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1672
1673 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1674 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1675 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1676 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1677 addr = value_as_long (arr);
d2e4a39e 1678 else
42ae5230 1679 addr = value_address (arr);
14f9c5c9 1680
d2e4a39e 1681 return
4c4b4cd2
PH
1682 value_from_longest (lookup_pointer_type (bounds_type),
1683 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1684 }
1685
1686 else if (is_thick_pntr (type))
05e522ef
JB
1687 {
1688 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1689 _("Bad GNAT array descriptor"));
1690 struct type *p_bounds_type = value_type (p_bounds);
1691
1692 if (p_bounds_type
1693 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1694 {
1695 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1696
1697 if (TYPE_STUB (target_type))
1698 p_bounds = value_cast (lookup_pointer_type
1699 (ada_check_typedef (target_type)),
1700 p_bounds);
1701 }
1702 else
1703 error (_("Bad GNAT array descriptor"));
1704
1705 return p_bounds;
1706 }
14f9c5c9
AS
1707 else
1708 return NULL;
1709}
1710
4c4b4cd2
PH
1711/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1712 position of the field containing the address of the bounds data. */
1713
14f9c5c9 1714static int
d2e4a39e 1715fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1716{
1717 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1718}
1719
1720/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1721 size of the field containing the address of the bounds data. */
1722
14f9c5c9 1723static int
d2e4a39e 1724fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1725{
1726 type = desc_base_type (type);
1727
d2e4a39e 1728 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1729 return TYPE_FIELD_BITSIZE (type, 1);
1730 else
61ee279c 1731 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1732}
1733
4c4b4cd2 1734/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1735 pointer to one, the type of its array data (a array-with-no-bounds type);
1736 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1737 data. */
4c4b4cd2 1738
d2e4a39e 1739static struct type *
556bdfd4 1740desc_data_target_type (struct type *type)
14f9c5c9
AS
1741{
1742 type = desc_base_type (type);
1743
4c4b4cd2 1744 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1745 if (is_thin_pntr (type))
556bdfd4 1746 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1747 else if (is_thick_pntr (type))
556bdfd4
UW
1748 {
1749 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1750
1751 if (data_type
1752 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1753 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1754 }
1755
1756 return NULL;
14f9c5c9
AS
1757}
1758
1759/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1760 its array data. */
4c4b4cd2 1761
d2e4a39e
AS
1762static struct value *
1763desc_data (struct value *arr)
14f9c5c9 1764{
df407dfe 1765 struct type *type = value_type (arr);
5b4ee69b 1766
14f9c5c9
AS
1767 if (is_thin_pntr (type))
1768 return thin_data_pntr (arr);
1769 else if (is_thick_pntr (type))
d2e4a39e 1770 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1771 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1772 else
1773 return NULL;
1774}
1775
1776
1777/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1778 position of the field containing the address of the data. */
1779
14f9c5c9 1780static int
d2e4a39e 1781fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1782{
1783 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1784}
1785
1786/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1787 size of the field containing the address of the data. */
1788
14f9c5c9 1789static int
d2e4a39e 1790fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1791{
1792 type = desc_base_type (type);
1793
1794 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1795 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1796 else
14f9c5c9
AS
1797 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1798}
1799
4c4b4cd2 1800/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1801 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1802 bound, if WHICH is 1. The first bound is I=1. */
1803
d2e4a39e
AS
1804static struct value *
1805desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1806{
d2e4a39e 1807 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1808 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1809}
1810
1811/* If BOUNDS is an array-bounds structure type, return the bit position
1812 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1813 bound, if WHICH is 1. The first bound is I=1. */
1814
14f9c5c9 1815static int
d2e4a39e 1816desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1817{
d2e4a39e 1818 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1819}
1820
1821/* If BOUNDS is an array-bounds structure type, return the bit field size
1822 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1823 bound, if WHICH is 1. The first bound is I=1. */
1824
76a01679 1825static int
d2e4a39e 1826desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1827{
1828 type = desc_base_type (type);
1829
d2e4a39e
AS
1830 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1831 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1832 else
1833 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1834}
1835
1836/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1837 Ith bound (numbering from 1). Otherwise, NULL. */
1838
d2e4a39e
AS
1839static struct type *
1840desc_index_type (struct type *type, int i)
14f9c5c9
AS
1841{
1842 type = desc_base_type (type);
1843
1844 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1845 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1846 else
14f9c5c9
AS
1847 return NULL;
1848}
1849
4c4b4cd2
PH
1850/* The number of index positions in the array-bounds type TYPE.
1851 Return 0 if TYPE is NULL. */
1852
14f9c5c9 1853static int
d2e4a39e 1854desc_arity (struct type *type)
14f9c5c9
AS
1855{
1856 type = desc_base_type (type);
1857
1858 if (type != NULL)
1859 return TYPE_NFIELDS (type) / 2;
1860 return 0;
1861}
1862
4c4b4cd2
PH
1863/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1864 an array descriptor type (representing an unconstrained array
1865 type). */
1866
76a01679
JB
1867static int
1868ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1869{
1870 if (type == NULL)
1871 return 0;
61ee279c 1872 type = ada_check_typedef (type);
4c4b4cd2 1873 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1874 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1875}
1876
52ce6436 1877/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1878 * to one. */
52ce6436 1879
2c0b251b 1880static int
52ce6436
PH
1881ada_is_array_type (struct type *type)
1882{
1883 while (type != NULL
1884 && (TYPE_CODE (type) == TYPE_CODE_PTR
1885 || TYPE_CODE (type) == TYPE_CODE_REF))
1886 type = TYPE_TARGET_TYPE (type);
1887 return ada_is_direct_array_type (type);
1888}
1889
4c4b4cd2 1890/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1891
14f9c5c9 1892int
4c4b4cd2 1893ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1894{
1895 if (type == NULL)
1896 return 0;
61ee279c 1897 type = ada_check_typedef (type);
14f9c5c9 1898 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1899 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1900 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1901 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1902}
1903
4c4b4cd2
PH
1904/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1905
14f9c5c9 1906int
4c4b4cd2 1907ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1908{
556bdfd4 1909 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1910
1911 if (type == NULL)
1912 return 0;
61ee279c 1913 type = ada_check_typedef (type);
556bdfd4
UW
1914 return (data_type != NULL
1915 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1916 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1917}
1918
1919/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1920 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1921 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1922 is still needed. */
1923
14f9c5c9 1924int
ebf56fd3 1925ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1926{
d2e4a39e 1927 return
14f9c5c9
AS
1928 type != NULL
1929 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1930 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1931 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1932 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1933}
1934
1935
4c4b4cd2 1936/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1937 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1938 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1939 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1940 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1941 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1942 a descriptor. */
d2e4a39e
AS
1943struct type *
1944ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1945{
ad82864c
JB
1946 if (ada_is_constrained_packed_array_type (value_type (arr)))
1947 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1948
df407dfe
AC
1949 if (!ada_is_array_descriptor_type (value_type (arr)))
1950 return value_type (arr);
d2e4a39e
AS
1951
1952 if (!bounds)
ad82864c
JB
1953 {
1954 struct type *array_type =
1955 ada_check_typedef (desc_data_target_type (value_type (arr)));
1956
1957 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1958 TYPE_FIELD_BITSIZE (array_type, 0) =
1959 decode_packed_array_bitsize (value_type (arr));
1960
1961 return array_type;
1962 }
14f9c5c9
AS
1963 else
1964 {
d2e4a39e 1965 struct type *elt_type;
14f9c5c9 1966 int arity;
d2e4a39e 1967 struct value *descriptor;
14f9c5c9 1968
df407dfe
AC
1969 elt_type = ada_array_element_type (value_type (arr), -1);
1970 arity = ada_array_arity (value_type (arr));
14f9c5c9 1971
d2e4a39e 1972 if (elt_type == NULL || arity == 0)
df407dfe 1973 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1974
1975 descriptor = desc_bounds (arr);
d2e4a39e 1976 if (value_as_long (descriptor) == 0)
4c4b4cd2 1977 return NULL;
d2e4a39e 1978 while (arity > 0)
4c4b4cd2 1979 {
e9bb382b
UW
1980 struct type *range_type = alloc_type_copy (value_type (arr));
1981 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1982 struct value *low = desc_one_bound (descriptor, arity, 0);
1983 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1984
5b4ee69b 1985 arity -= 1;
0c9c3474
SA
1986 create_static_range_type (range_type, value_type (low),
1987 longest_to_int (value_as_long (low)),
1988 longest_to_int (value_as_long (high)));
4c4b4cd2 1989 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1990
1991 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1992 {
1993 /* We need to store the element packed bitsize, as well as
1994 recompute the array size, because it was previously
1995 computed based on the unpacked element size. */
1996 LONGEST lo = value_as_long (low);
1997 LONGEST hi = value_as_long (high);
1998
1999 TYPE_FIELD_BITSIZE (elt_type, 0) =
2000 decode_packed_array_bitsize (value_type (arr));
2001 /* If the array has no element, then the size is already
2002 zero, and does not need to be recomputed. */
2003 if (lo < hi)
2004 {
2005 int array_bitsize =
2006 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
2007
2008 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
2009 }
2010 }
4c4b4cd2 2011 }
14f9c5c9
AS
2012
2013 return lookup_pointer_type (elt_type);
2014 }
2015}
2016
2017/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2018 Otherwise, returns either a standard GDB array with bounds set
2019 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2020 GDB array. Returns NULL if ARR is a null fat pointer. */
2021
d2e4a39e
AS
2022struct value *
2023ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2024{
df407dfe 2025 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2026 {
d2e4a39e 2027 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2028
14f9c5c9 2029 if (arrType == NULL)
4c4b4cd2 2030 return NULL;
14f9c5c9
AS
2031 return value_cast (arrType, value_copy (desc_data (arr)));
2032 }
ad82864c
JB
2033 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2034 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2035 else
2036 return arr;
2037}
2038
2039/* If ARR does not represent an array, returns ARR unchanged.
2040 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2041 be ARR itself if it already is in the proper form). */
2042
720d1a40 2043struct value *
d2e4a39e 2044ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2045{
df407dfe 2046 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2047 {
d2e4a39e 2048 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2049
14f9c5c9 2050 if (arrVal == NULL)
323e0a4a 2051 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2052 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2053 return value_ind (arrVal);
2054 }
ad82864c
JB
2055 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2056 return decode_constrained_packed_array (arr);
d2e4a39e 2057 else
14f9c5c9
AS
2058 return arr;
2059}
2060
2061/* If TYPE represents a GNAT array type, return it translated to an
2062 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2063 packing). For other types, is the identity. */
2064
d2e4a39e
AS
2065struct type *
2066ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2067{
ad82864c
JB
2068 if (ada_is_constrained_packed_array_type (type))
2069 return decode_constrained_packed_array_type (type);
17280b9f
UW
2070
2071 if (ada_is_array_descriptor_type (type))
556bdfd4 2072 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2073
2074 return type;
14f9c5c9
AS
2075}
2076
4c4b4cd2
PH
2077/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2078
ad82864c
JB
2079static int
2080ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2081{
2082 if (type == NULL)
2083 return 0;
4c4b4cd2 2084 type = desc_base_type (type);
61ee279c 2085 type = ada_check_typedef (type);
d2e4a39e 2086 return
14f9c5c9
AS
2087 ada_type_name (type) != NULL
2088 && strstr (ada_type_name (type), "___XP") != NULL;
2089}
2090
ad82864c
JB
2091/* Non-zero iff TYPE represents a standard GNAT constrained
2092 packed-array type. */
2093
2094int
2095ada_is_constrained_packed_array_type (struct type *type)
2096{
2097 return ada_is_packed_array_type (type)
2098 && !ada_is_array_descriptor_type (type);
2099}
2100
2101/* Non-zero iff TYPE represents an array descriptor for a
2102 unconstrained packed-array type. */
2103
2104static int
2105ada_is_unconstrained_packed_array_type (struct type *type)
2106{
2107 return ada_is_packed_array_type (type)
2108 && ada_is_array_descriptor_type (type);
2109}
2110
2111/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2112 return the size of its elements in bits. */
2113
2114static long
2115decode_packed_array_bitsize (struct type *type)
2116{
0d5cff50
DE
2117 const char *raw_name;
2118 const char *tail;
ad82864c
JB
2119 long bits;
2120
720d1a40
JB
2121 /* Access to arrays implemented as fat pointers are encoded as a typedef
2122 of the fat pointer type. We need the name of the fat pointer type
2123 to do the decoding, so strip the typedef layer. */
2124 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2125 type = ada_typedef_target_type (type);
2126
2127 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2128 if (!raw_name)
2129 raw_name = ada_type_name (desc_base_type (type));
2130
2131 if (!raw_name)
2132 return 0;
2133
2134 tail = strstr (raw_name, "___XP");
720d1a40 2135 gdb_assert (tail != NULL);
ad82864c
JB
2136
2137 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2138 {
2139 lim_warning
2140 (_("could not understand bit size information on packed array"));
2141 return 0;
2142 }
2143
2144 return bits;
2145}
2146
14f9c5c9
AS
2147/* Given that TYPE is a standard GDB array type with all bounds filled
2148 in, and that the element size of its ultimate scalar constituents
2149 (that is, either its elements, or, if it is an array of arrays, its
2150 elements' elements, etc.) is *ELT_BITS, return an identical type,
2151 but with the bit sizes of its elements (and those of any
2152 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2153 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2154 in bits.
2155
2156 Note that, for arrays whose index type has an XA encoding where
2157 a bound references a record discriminant, getting that discriminant,
2158 and therefore the actual value of that bound, is not possible
2159 because none of the given parameters gives us access to the record.
2160 This function assumes that it is OK in the context where it is being
2161 used to return an array whose bounds are still dynamic and where
2162 the length is arbitrary. */
4c4b4cd2 2163
d2e4a39e 2164static struct type *
ad82864c 2165constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2166{
d2e4a39e
AS
2167 struct type *new_elt_type;
2168 struct type *new_type;
99b1c762
JB
2169 struct type *index_type_desc;
2170 struct type *index_type;
14f9c5c9
AS
2171 LONGEST low_bound, high_bound;
2172
61ee279c 2173 type = ada_check_typedef (type);
14f9c5c9
AS
2174 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2175 return type;
2176
99b1c762
JB
2177 index_type_desc = ada_find_parallel_type (type, "___XA");
2178 if (index_type_desc)
2179 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2180 NULL);
2181 else
2182 index_type = TYPE_INDEX_TYPE (type);
2183
e9bb382b 2184 new_type = alloc_type_copy (type);
ad82864c
JB
2185 new_elt_type =
2186 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2187 elt_bits);
99b1c762 2188 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2189 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2190 TYPE_NAME (new_type) = ada_type_name (type);
2191
4a46959e
JB
2192 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2193 && is_dynamic_type (check_typedef (index_type)))
2194 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2195 low_bound = high_bound = 0;
2196 if (high_bound < low_bound)
2197 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2198 else
14f9c5c9
AS
2199 {
2200 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2201 TYPE_LENGTH (new_type) =
4c4b4cd2 2202 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2203 }
2204
876cecd0 2205 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2206 return new_type;
2207}
2208
ad82864c
JB
2209/* The array type encoded by TYPE, where
2210 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2211
d2e4a39e 2212static struct type *
ad82864c 2213decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2214{
0d5cff50 2215 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2216 char *name;
0d5cff50 2217 const char *tail;
d2e4a39e 2218 struct type *shadow_type;
14f9c5c9 2219 long bits;
14f9c5c9 2220
727e3d2e
JB
2221 if (!raw_name)
2222 raw_name = ada_type_name (desc_base_type (type));
2223
2224 if (!raw_name)
2225 return NULL;
2226
2227 name = (char *) alloca (strlen (raw_name) + 1);
2228 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2229 type = desc_base_type (type);
2230
14f9c5c9
AS
2231 memcpy (name, raw_name, tail - raw_name);
2232 name[tail - raw_name] = '\000';
2233
b4ba55a1
JB
2234 shadow_type = ada_find_parallel_type_with_name (type, name);
2235
2236 if (shadow_type == NULL)
14f9c5c9 2237 {
323e0a4a 2238 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2239 return NULL;
2240 }
cb249c71 2241 CHECK_TYPEDEF (shadow_type);
14f9c5c9
AS
2242
2243 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2244 {
0963b4bd
MS
2245 lim_warning (_("could not understand bounds "
2246 "information on packed array"));
14f9c5c9
AS
2247 return NULL;
2248 }
d2e4a39e 2249
ad82864c
JB
2250 bits = decode_packed_array_bitsize (type);
2251 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2252}
2253
ad82864c
JB
2254/* Given that ARR is a struct value *indicating a GNAT constrained packed
2255 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2256 standard GDB array type except that the BITSIZEs of the array
2257 target types are set to the number of bits in each element, and the
4c4b4cd2 2258 type length is set appropriately. */
14f9c5c9 2259
d2e4a39e 2260static struct value *
ad82864c 2261decode_constrained_packed_array (struct value *arr)
14f9c5c9 2262{
4c4b4cd2 2263 struct type *type;
14f9c5c9 2264
11aa919a
PMR
2265 /* If our value is a pointer, then dereference it. Likewise if
2266 the value is a reference. Make sure that this operation does not
2267 cause the target type to be fixed, as this would indirectly cause
2268 this array to be decoded. The rest of the routine assumes that
2269 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2270 and "value_ind" routines to perform the dereferencing, as opposed
2271 to using "ada_coerce_ref" or "ada_value_ind". */
2272 arr = coerce_ref (arr);
828292f2 2273 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2274 arr = value_ind (arr);
4c4b4cd2 2275
ad82864c 2276 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2277 if (type == NULL)
2278 {
323e0a4a 2279 error (_("can't unpack array"));
14f9c5c9
AS
2280 return NULL;
2281 }
61ee279c 2282
50810684 2283 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2284 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2285 {
2286 /* This is a (right-justified) modular type representing a packed
2287 array with no wrapper. In order to interpret the value through
2288 the (left-justified) packed array type we just built, we must
2289 first left-justify it. */
2290 int bit_size, bit_pos;
2291 ULONGEST mod;
2292
df407dfe 2293 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2294 bit_size = 0;
2295 while (mod > 0)
2296 {
2297 bit_size += 1;
2298 mod >>= 1;
2299 }
df407dfe 2300 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2301 arr = ada_value_primitive_packed_val (arr, NULL,
2302 bit_pos / HOST_CHAR_BIT,
2303 bit_pos % HOST_CHAR_BIT,
2304 bit_size,
2305 type);
2306 }
2307
4c4b4cd2 2308 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2309}
2310
2311
2312/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2313 given in IND. ARR must be a simple array. */
14f9c5c9 2314
d2e4a39e
AS
2315static struct value *
2316value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2317{
2318 int i;
2319 int bits, elt_off, bit_off;
2320 long elt_total_bit_offset;
d2e4a39e
AS
2321 struct type *elt_type;
2322 struct value *v;
14f9c5c9
AS
2323
2324 bits = 0;
2325 elt_total_bit_offset = 0;
df407dfe 2326 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2327 for (i = 0; i < arity; i += 1)
14f9c5c9 2328 {
d2e4a39e 2329 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2330 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2331 error
0963b4bd
MS
2332 (_("attempt to do packed indexing of "
2333 "something other than a packed array"));
14f9c5c9 2334 else
4c4b4cd2
PH
2335 {
2336 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2337 LONGEST lowerbound, upperbound;
2338 LONGEST idx;
2339
2340 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2341 {
323e0a4a 2342 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2343 lowerbound = upperbound = 0;
2344 }
2345
3cb382c9 2346 idx = pos_atr (ind[i]);
4c4b4cd2 2347 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2348 lim_warning (_("packed array index %ld out of bounds"),
2349 (long) idx);
4c4b4cd2
PH
2350 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2351 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2352 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2353 }
14f9c5c9
AS
2354 }
2355 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2356 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2357
2358 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2359 bits, elt_type);
14f9c5c9
AS
2360 return v;
2361}
2362
4c4b4cd2 2363/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2364
2365static int
d2e4a39e 2366has_negatives (struct type *type)
14f9c5c9 2367{
d2e4a39e
AS
2368 switch (TYPE_CODE (type))
2369 {
2370 default:
2371 return 0;
2372 case TYPE_CODE_INT:
2373 return !TYPE_UNSIGNED (type);
2374 case TYPE_CODE_RANGE:
2375 return TYPE_LOW_BOUND (type) < 0;
2376 }
14f9c5c9 2377}
d2e4a39e 2378
14f9c5c9
AS
2379
2380/* Create a new value of type TYPE from the contents of OBJ starting
2381 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2382 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
0963b4bd 2383 assigning through the result will set the field fetched from.
4c4b4cd2
PH
2384 VALADDR is ignored unless OBJ is NULL, in which case,
2385 VALADDR+OFFSET must address the start of storage containing the
2386 packed value. The value returned in this case is never an lval.
2387 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
14f9c5c9 2388
d2e4a39e 2389struct value *
fc1a4b47 2390ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
a2bd3dcd 2391 long offset, int bit_offset, int bit_size,
4c4b4cd2 2392 struct type *type)
14f9c5c9 2393{
d2e4a39e 2394 struct value *v;
4c4b4cd2
PH
2395 int src, /* Index into the source area */
2396 targ, /* Index into the target area */
2397 srcBitsLeft, /* Number of source bits left to move */
2398 nsrc, ntarg, /* Number of source and target bytes */
2399 unusedLS, /* Number of bits in next significant
2400 byte of source that are unused */
2401 accumSize; /* Number of meaningful bits in accum */
2402 unsigned char *bytes; /* First byte containing data to unpack */
d2e4a39e 2403 unsigned char *unpacked;
4c4b4cd2 2404 unsigned long accum; /* Staging area for bits being transferred */
14f9c5c9
AS
2405 unsigned char sign;
2406 int len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
4c4b4cd2
PH
2407 /* Transmit bytes from least to most significant; delta is the direction
2408 the indices move. */
50810684 2409 int delta = gdbarch_bits_big_endian (get_type_arch (type)) ? -1 : 1;
14f9c5c9 2410
61ee279c 2411 type = ada_check_typedef (type);
14f9c5c9
AS
2412
2413 if (obj == NULL)
2414 {
2415 v = allocate_value (type);
d2e4a39e 2416 bytes = (unsigned char *) (valaddr + offset);
14f9c5c9 2417 }
9214ee5f 2418 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
14f9c5c9 2419 {
ca34b84f 2420 v = value_at (type, value_address (obj) + offset);
9f1f738a 2421 type = value_type (v);
fc958966
JB
2422 if (TYPE_LENGTH (type) * HOST_CHAR_BIT < bit_size)
2423 {
2424 /* This can happen in the case of an array of dynamic objects,
2425 where the size of each element changes from element to element.
2426 In that case, we're initially given the array stride, but
2427 after resolving the element type, we find that its size is
2428 less than this stride. In that case, adjust bit_size to
2429 match TYPE's length, and recompute LEN accordingly. */
2430 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2431 len = TYPE_LENGTH (type) + (bit_offset + HOST_CHAR_BIT - 1) / 8;
2432 }
d2e4a39e 2433 bytes = (unsigned char *) alloca (len);
ca34b84f 2434 read_memory (value_address (v), bytes, len);
14f9c5c9 2435 }
d2e4a39e 2436 else
14f9c5c9
AS
2437 {
2438 v = allocate_value (type);
0fd88904 2439 bytes = (unsigned char *) value_contents (obj) + offset;
14f9c5c9 2440 }
d2e4a39e
AS
2441
2442 if (obj != NULL)
14f9c5c9 2443 {
53ba8333 2444 long new_offset = offset;
5b4ee69b 2445
74bcbdf3 2446 set_value_component_location (v, obj);
9bbda503
AC
2447 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2448 set_value_bitsize (v, bit_size);
df407dfe 2449 if (value_bitpos (v) >= HOST_CHAR_BIT)
4c4b4cd2 2450 {
53ba8333 2451 ++new_offset;
9bbda503 2452 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
4c4b4cd2 2453 }
53ba8333
JB
2454 set_value_offset (v, new_offset);
2455
2456 /* Also set the parent value. This is needed when trying to
2457 assign a new value (in inferior memory). */
2458 set_value_parent (v, obj);
14f9c5c9
AS
2459 }
2460 else
9bbda503 2461 set_value_bitsize (v, bit_size);
0fd88904 2462 unpacked = (unsigned char *) value_contents (v);
14f9c5c9
AS
2463
2464 srcBitsLeft = bit_size;
2465 nsrc = len;
2466 ntarg = TYPE_LENGTH (type);
2467 sign = 0;
2468 if (bit_size == 0)
2469 {
2470 memset (unpacked, 0, TYPE_LENGTH (type));
2471 return v;
2472 }
50810684 2473 else if (gdbarch_bits_big_endian (get_type_arch (type)))
14f9c5c9 2474 {
d2e4a39e 2475 src = len - 1;
1265e4aa
JB
2476 if (has_negatives (type)
2477 && ((bytes[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2478 sign = ~0;
d2e4a39e
AS
2479
2480 unusedLS =
4c4b4cd2
PH
2481 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2482 % HOST_CHAR_BIT;
14f9c5c9
AS
2483
2484 switch (TYPE_CODE (type))
4c4b4cd2
PH
2485 {
2486 case TYPE_CODE_ARRAY:
2487 case TYPE_CODE_UNION:
2488 case TYPE_CODE_STRUCT:
2489 /* Non-scalar values must be aligned at a byte boundary... */
2490 accumSize =
2491 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2492 /* ... And are placed at the beginning (most-significant) bytes
2493 of the target. */
529cad9c 2494 targ = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
0056e4d5 2495 ntarg = targ + 1;
4c4b4cd2
PH
2496 break;
2497 default:
2498 accumSize = 0;
2499 targ = TYPE_LENGTH (type) - 1;
2500 break;
2501 }
14f9c5c9 2502 }
d2e4a39e 2503 else
14f9c5c9
AS
2504 {
2505 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2506
2507 src = targ = 0;
2508 unusedLS = bit_offset;
2509 accumSize = 0;
2510
d2e4a39e 2511 if (has_negatives (type) && (bytes[len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2512 sign = ~0;
14f9c5c9 2513 }
d2e4a39e 2514
14f9c5c9
AS
2515 accum = 0;
2516 while (nsrc > 0)
2517 {
2518 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2519 part of the value. */
d2e4a39e 2520 unsigned int unusedMSMask =
4c4b4cd2
PH
2521 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2522 1;
2523 /* Sign-extend bits for this byte. */
14f9c5c9 2524 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2525
d2e4a39e 2526 accum |=
4c4b4cd2 2527 (((bytes[src] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2528 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2529 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2
PH
2530 {
2531 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2532 accumSize -= HOST_CHAR_BIT;
2533 accum >>= HOST_CHAR_BIT;
2534 ntarg -= 1;
2535 targ += delta;
2536 }
14f9c5c9
AS
2537 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2538 unusedLS = 0;
2539 nsrc -= 1;
2540 src += delta;
2541 }
2542 while (ntarg > 0)
2543 {
2544 accum |= sign << accumSize;
2545 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2546 accumSize -= HOST_CHAR_BIT;
2547 accum >>= HOST_CHAR_BIT;
2548 ntarg -= 1;
2549 targ += delta;
2550 }
2551
2478d075
JB
2552 if (is_dynamic_type (value_type (v)))
2553 v = value_from_contents_and_address (value_type (v), value_contents (v),
2554 0);
14f9c5c9
AS
2555 return v;
2556}
d2e4a39e 2557
14f9c5c9
AS
2558/* Move N bits from SOURCE, starting at bit offset SRC_OFFSET to
2559 TARGET, starting at bit offset TARG_OFFSET. SOURCE and TARGET must
4c4b4cd2 2560 not overlap. */
14f9c5c9 2561static void
fc1a4b47 2562move_bits (gdb_byte *target, int targ_offset, const gdb_byte *source,
50810684 2563 int src_offset, int n, int bits_big_endian_p)
14f9c5c9
AS
2564{
2565 unsigned int accum, mask;
2566 int accum_bits, chunk_size;
2567
2568 target += targ_offset / HOST_CHAR_BIT;
2569 targ_offset %= HOST_CHAR_BIT;
2570 source += src_offset / HOST_CHAR_BIT;
2571 src_offset %= HOST_CHAR_BIT;
50810684 2572 if (bits_big_endian_p)
14f9c5c9
AS
2573 {
2574 accum = (unsigned char) *source;
2575 source += 1;
2576 accum_bits = HOST_CHAR_BIT - src_offset;
2577
d2e4a39e 2578 while (n > 0)
4c4b4cd2
PH
2579 {
2580 int unused_right;
5b4ee69b 2581
4c4b4cd2
PH
2582 accum = (accum << HOST_CHAR_BIT) + (unsigned char) *source;
2583 accum_bits += HOST_CHAR_BIT;
2584 source += 1;
2585 chunk_size = HOST_CHAR_BIT - targ_offset;
2586 if (chunk_size > n)
2587 chunk_size = n;
2588 unused_right = HOST_CHAR_BIT - (chunk_size + targ_offset);
2589 mask = ((1 << chunk_size) - 1) << unused_right;
2590 *target =
2591 (*target & ~mask)
2592 | ((accum >> (accum_bits - chunk_size - unused_right)) & mask);
2593 n -= chunk_size;
2594 accum_bits -= chunk_size;
2595 target += 1;
2596 targ_offset = 0;
2597 }
14f9c5c9
AS
2598 }
2599 else
2600 {
2601 accum = (unsigned char) *source >> src_offset;
2602 source += 1;
2603 accum_bits = HOST_CHAR_BIT - src_offset;
2604
d2e4a39e 2605 while (n > 0)
4c4b4cd2
PH
2606 {
2607 accum = accum + ((unsigned char) *source << accum_bits);
2608 accum_bits += HOST_CHAR_BIT;
2609 source += 1;
2610 chunk_size = HOST_CHAR_BIT - targ_offset;
2611 if (chunk_size > n)
2612 chunk_size = n;
2613 mask = ((1 << chunk_size) - 1) << targ_offset;
2614 *target = (*target & ~mask) | ((accum << targ_offset) & mask);
2615 n -= chunk_size;
2616 accum_bits -= chunk_size;
2617 accum >>= chunk_size;
2618 target += 1;
2619 targ_offset = 0;
2620 }
14f9c5c9
AS
2621 }
2622}
2623
14f9c5c9
AS
2624/* Store the contents of FROMVAL into the location of TOVAL.
2625 Return a new value with the location of TOVAL and contents of
2626 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2627 floating-point or non-scalar types. */
14f9c5c9 2628
d2e4a39e
AS
2629static struct value *
2630ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2631{
df407dfe
AC
2632 struct type *type = value_type (toval);
2633 int bits = value_bitsize (toval);
14f9c5c9 2634
52ce6436
PH
2635 toval = ada_coerce_ref (toval);
2636 fromval = ada_coerce_ref (fromval);
2637
2638 if (ada_is_direct_array_type (value_type (toval)))
2639 toval = ada_coerce_to_simple_array (toval);
2640 if (ada_is_direct_array_type (value_type (fromval)))
2641 fromval = ada_coerce_to_simple_array (fromval);
2642
88e3b34b 2643 if (!deprecated_value_modifiable (toval))
323e0a4a 2644 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2645
d2e4a39e 2646 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2647 && bits > 0
d2e4a39e 2648 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2649 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2650 {
df407dfe
AC
2651 int len = (value_bitpos (toval)
2652 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2653 int from_size;
948f8e3d 2654 gdb_byte *buffer = alloca (len);
d2e4a39e 2655 struct value *val;
42ae5230 2656 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2657
2658 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2659 fromval = value_cast (type, fromval);
14f9c5c9 2660
52ce6436 2661 read_memory (to_addr, buffer, len);
aced2898
PH
2662 from_size = value_bitsize (fromval);
2663 if (from_size == 0)
2664 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
50810684 2665 if (gdbarch_bits_big_endian (get_type_arch (type)))
df407dfe 2666 move_bits (buffer, value_bitpos (toval),
50810684 2667 value_contents (fromval), from_size - bits, bits, 1);
14f9c5c9 2668 else
50810684
UW
2669 move_bits (buffer, value_bitpos (toval),
2670 value_contents (fromval), 0, bits, 0);
972daa01 2671 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2672
14f9c5c9 2673 val = value_copy (toval);
0fd88904 2674 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2675 TYPE_LENGTH (type));
04624583 2676 deprecated_set_value_type (val, type);
d2e4a39e 2677
14f9c5c9
AS
2678 return val;
2679 }
2680
2681 return value_assign (toval, fromval);
2682}
2683
2684
52ce6436
PH
2685/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2686 * CONTAINER, assign the contents of VAL to COMPONENTS's place in
2687 * CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2688 * COMPONENT, and not the inferior's memory. The current contents
2689 * of COMPONENT are ignored. */
2690static void
2691value_assign_to_component (struct value *container, struct value *component,
2692 struct value *val)
2693{
2694 LONGEST offset_in_container =
42ae5230 2695 (LONGEST) (value_address (component) - value_address (container));
52ce6436
PH
2696 int bit_offset_in_container =
2697 value_bitpos (component) - value_bitpos (container);
2698 int bits;
2699
2700 val = value_cast (value_type (component), val);
2701
2702 if (value_bitsize (component) == 0)
2703 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2704 else
2705 bits = value_bitsize (component);
2706
50810684 2707 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
52ce6436
PH
2708 move_bits (value_contents_writeable (container) + offset_in_container,
2709 value_bitpos (container) + bit_offset_in_container,
2710 value_contents (val),
2711 TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits,
50810684 2712 bits, 1);
52ce6436
PH
2713 else
2714 move_bits (value_contents_writeable (container) + offset_in_container,
2715 value_bitpos (container) + bit_offset_in_container,
50810684 2716 value_contents (val), 0, bits, 0);
52ce6436
PH
2717}
2718
4c4b4cd2
PH
2719/* The value of the element of array ARR at the ARITY indices given in IND.
2720 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2721 thereto. */
2722
d2e4a39e
AS
2723struct value *
2724ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2725{
2726 int k;
d2e4a39e
AS
2727 struct value *elt;
2728 struct type *elt_type;
14f9c5c9
AS
2729
2730 elt = ada_coerce_to_simple_array (arr);
2731
df407dfe 2732 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2733 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2734 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2735 return value_subscript_packed (elt, arity, ind);
2736
2737 for (k = 0; k < arity; k += 1)
2738 {
2739 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2740 error (_("too many subscripts (%d expected)"), k);
2497b498 2741 elt = value_subscript (elt, pos_atr (ind[k]));
14f9c5c9
AS
2742 }
2743 return elt;
2744}
2745
deede10c
JB
2746/* Assuming ARR is a pointer to a GDB array, the value of the element
2747 of *ARR at the ARITY indices given in IND.
2748 Does not read the entire array into memory. */
14f9c5c9 2749
2c0b251b 2750static struct value *
deede10c 2751ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2752{
2753 int k;
deede10c
JB
2754 struct type *type
2755 = check_typedef (value_enclosing_type (ada_value_ind (arr)));
14f9c5c9
AS
2756
2757 for (k = 0; k < arity; k += 1)
2758 {
2759 LONGEST lwb, upb;
14f9c5c9
AS
2760
2761 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2762 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2763 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2764 value_copy (arr));
14f9c5c9 2765 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
2497b498 2766 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2767 type = TYPE_TARGET_TYPE (type);
2768 }
2769
2770 return value_ind (arr);
2771}
2772
0b5d8877 2773/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
f5938064
JG
2774 actual type of ARRAY_PTR is ignored), returns the Ada slice of HIGH-LOW+1
2775 elements starting at index LOW. The lower bound of this array is LOW, as
0963b4bd 2776 per Ada rules. */
0b5d8877 2777static struct value *
f5938064
JG
2778ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2779 int low, int high)
0b5d8877 2780{
b0dd7688 2781 struct type *type0 = ada_check_typedef (type);
6c038f32 2782 CORE_ADDR base = value_as_address (array_ptr)
b0dd7688
JB
2783 + ((low - ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0)))
2784 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
0c9c3474
SA
2785 struct type *index_type
2786 = create_static_range_type (NULL,
2787 TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0)),
2788 low, high);
6c038f32 2789 struct type *slice_type =
b0dd7688 2790 create_array_type (NULL, TYPE_TARGET_TYPE (type0), index_type);
5b4ee69b 2791
f5938064 2792 return value_at_lazy (slice_type, base);
0b5d8877
PH
2793}
2794
2795
2796static struct value *
2797ada_value_slice (struct value *array, int low, int high)
2798{
b0dd7688 2799 struct type *type = ada_check_typedef (value_type (array));
0c9c3474
SA
2800 struct type *index_type
2801 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
6c038f32 2802 struct type *slice_type =
0b5d8877 2803 create_array_type (NULL, TYPE_TARGET_TYPE (type), index_type);
5b4ee69b 2804
6c038f32 2805 return value_cast (slice_type, value_slice (array, low, high - low + 1));
0b5d8877
PH
2806}
2807
14f9c5c9
AS
2808/* If type is a record type in the form of a standard GNAT array
2809 descriptor, returns the number of dimensions for type. If arr is a
2810 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2811 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2812
2813int
d2e4a39e 2814ada_array_arity (struct type *type)
14f9c5c9
AS
2815{
2816 int arity;
2817
2818 if (type == NULL)
2819 return 0;
2820
2821 type = desc_base_type (type);
2822
2823 arity = 0;
d2e4a39e 2824 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2825 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2826 else
2827 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2828 {
4c4b4cd2 2829 arity += 1;
61ee279c 2830 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2831 }
d2e4a39e 2832
14f9c5c9
AS
2833 return arity;
2834}
2835
2836/* If TYPE is a record type in the form of a standard GNAT array
2837 descriptor or a simple array type, returns the element type for
2838 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2839 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2840
d2e4a39e
AS
2841struct type *
2842ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2843{
2844 type = desc_base_type (type);
2845
d2e4a39e 2846 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2847 {
2848 int k;
d2e4a39e 2849 struct type *p_array_type;
14f9c5c9 2850
556bdfd4 2851 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2852
2853 k = ada_array_arity (type);
2854 if (k == 0)
4c4b4cd2 2855 return NULL;
d2e4a39e 2856
4c4b4cd2 2857 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2858 if (nindices >= 0 && k > nindices)
4c4b4cd2 2859 k = nindices;
d2e4a39e 2860 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2861 {
61ee279c 2862 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2863 k -= 1;
2864 }
14f9c5c9
AS
2865 return p_array_type;
2866 }
2867 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2868 {
2869 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2870 {
2871 type = TYPE_TARGET_TYPE (type);
2872 nindices -= 1;
2873 }
14f9c5c9
AS
2874 return type;
2875 }
2876
2877 return NULL;
2878}
2879
4c4b4cd2 2880/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2881 Does not examine memory. Throws an error if N is invalid or TYPE
2882 is not an array type. NAME is the name of the Ada attribute being
2883 evaluated ('range, 'first, 'last, or 'length); it is used in building
2884 the error message. */
14f9c5c9 2885
1eea4ebd
UW
2886static struct type *
2887ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2888{
4c4b4cd2
PH
2889 struct type *result_type;
2890
14f9c5c9
AS
2891 type = desc_base_type (type);
2892
1eea4ebd
UW
2893 if (n < 0 || n > ada_array_arity (type))
2894 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2895
4c4b4cd2 2896 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2897 {
2898 int i;
2899
2900 for (i = 1; i < n; i += 1)
4c4b4cd2 2901 type = TYPE_TARGET_TYPE (type);
262452ec 2902 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2903 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2904 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2905 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2906 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2907 result_type = NULL;
14f9c5c9 2908 }
d2e4a39e 2909 else
1eea4ebd
UW
2910 {
2911 result_type = desc_index_type (desc_bounds_type (type), n);
2912 if (result_type == NULL)
2913 error (_("attempt to take bound of something that is not an array"));
2914 }
2915
2916 return result_type;
14f9c5c9
AS
2917}
2918
2919/* Given that arr is an array type, returns the lower bound of the
2920 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2921 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2922 array-descriptor type. It works for other arrays with bounds supplied
2923 by run-time quantities other than discriminants. */
14f9c5c9 2924
abb68b3e 2925static LONGEST
fb5e3d5c 2926ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2927{
8a48ac95 2928 struct type *type, *index_type_desc, *index_type;
1ce677a4 2929 int i;
262452ec
JK
2930
2931 gdb_assert (which == 0 || which == 1);
14f9c5c9 2932
ad82864c
JB
2933 if (ada_is_constrained_packed_array_type (arr_type))
2934 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2935
4c4b4cd2 2936 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2937 return (LONGEST) - which;
14f9c5c9
AS
2938
2939 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2940 type = TYPE_TARGET_TYPE (arr_type);
2941 else
2942 type = arr_type;
2943
bafffb51
JB
2944 if (TYPE_FIXED_INSTANCE (type))
2945 {
2946 /* The array has already been fixed, so we do not need to
2947 check the parallel ___XA type again. That encoding has
2948 already been applied, so ignore it now. */
2949 index_type_desc = NULL;
2950 }
2951 else
2952 {
2953 index_type_desc = ada_find_parallel_type (type, "___XA");
2954 ada_fixup_array_indexes_type (index_type_desc);
2955 }
2956
262452ec 2957 if (index_type_desc != NULL)
28c85d6c
JB
2958 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2959 NULL);
262452ec 2960 else
8a48ac95
JB
2961 {
2962 struct type *elt_type = check_typedef (type);
2963
2964 for (i = 1; i < n; i++)
2965 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
2966
2967 index_type = TYPE_INDEX_TYPE (elt_type);
2968 }
262452ec 2969
43bbcdc2
PH
2970 return
2971 (LONGEST) (which == 0
2972 ? ada_discrete_type_low_bound (index_type)
2973 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
2974}
2975
2976/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
2977 nth index (numbering from 1) if WHICH is 0, and the upper bound if
2978 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 2979 supplied by run-time quantities other than discriminants. */
14f9c5c9 2980
1eea4ebd 2981static LONGEST
4dc81987 2982ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 2983{
eb479039
JB
2984 struct type *arr_type;
2985
2986 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
2987 arr = value_ind (arr);
2988 arr_type = value_enclosing_type (arr);
14f9c5c9 2989
ad82864c
JB
2990 if (ada_is_constrained_packed_array_type (arr_type))
2991 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 2992 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 2993 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 2994 else
1eea4ebd 2995 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
2996}
2997
2998/* Given that arr is an array value, returns the length of the
2999 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3000 supplied by run-time quantities other than discriminants.
3001 Does not work for arrays indexed by enumeration types with representation
3002 clauses at the moment. */
14f9c5c9 3003
1eea4ebd 3004static LONGEST
d2e4a39e 3005ada_array_length (struct value *arr, int n)
14f9c5c9 3006{
eb479039
JB
3007 struct type *arr_type;
3008
3009 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3010 arr = value_ind (arr);
3011 arr_type = value_enclosing_type (arr);
14f9c5c9 3012
ad82864c
JB
3013 if (ada_is_constrained_packed_array_type (arr_type))
3014 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3015
4c4b4cd2 3016 if (ada_is_simple_array_type (arr_type))
1eea4ebd
UW
3017 return (ada_array_bound_from_type (arr_type, n, 1)
3018 - ada_array_bound_from_type (arr_type, n, 0) + 1);
14f9c5c9 3019 else
1eea4ebd
UW
3020 return (value_as_long (desc_one_bound (desc_bounds (arr), n, 1))
3021 - value_as_long (desc_one_bound (desc_bounds (arr), n, 0)) + 1);
4c4b4cd2
PH
3022}
3023
3024/* An empty array whose type is that of ARR_TYPE (an array type),
3025 with bounds LOW to LOW-1. */
3026
3027static struct value *
3028empty_array (struct type *arr_type, int low)
3029{
b0dd7688 3030 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3031 struct type *index_type
3032 = create_static_range_type
3033 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low, low - 1);
b0dd7688 3034 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3035
0b5d8877 3036 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3037}
14f9c5c9 3038\f
d2e4a39e 3039
4c4b4cd2 3040 /* Name resolution */
14f9c5c9 3041
4c4b4cd2
PH
3042/* The "decoded" name for the user-definable Ada operator corresponding
3043 to OP. */
14f9c5c9 3044
d2e4a39e 3045static const char *
4c4b4cd2 3046ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3047{
3048 int i;
3049
4c4b4cd2 3050 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3051 {
3052 if (ada_opname_table[i].op == op)
4c4b4cd2 3053 return ada_opname_table[i].decoded;
14f9c5c9 3054 }
323e0a4a 3055 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3056}
3057
3058
4c4b4cd2
PH
3059/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3060 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3061 undefined namespace) and converts operators that are
3062 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3063 non-null, it provides a preferred result type [at the moment, only
3064 type void has any effect---causing procedures to be preferred over
3065 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3066 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3067
4c4b4cd2
PH
3068static void
3069resolve (struct expression **expp, int void_context_p)
14f9c5c9 3070{
30b15541
UW
3071 struct type *context_type = NULL;
3072 int pc = 0;
3073
3074 if (void_context_p)
3075 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3076
3077 resolve_subexp (expp, &pc, 1, context_type);
14f9c5c9
AS
3078}
3079
4c4b4cd2
PH
3080/* Resolve the operator of the subexpression beginning at
3081 position *POS of *EXPP. "Resolving" consists of replacing
3082 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3083 with their resolutions, replacing built-in operators with
3084 function calls to user-defined operators, where appropriate, and,
3085 when DEPROCEDURE_P is non-zero, converting function-valued variables
3086 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3087 are as in ada_resolve, above. */
14f9c5c9 3088
d2e4a39e 3089static struct value *
4c4b4cd2 3090resolve_subexp (struct expression **expp, int *pos, int deprocedure_p,
76a01679 3091 struct type *context_type)
14f9c5c9
AS
3092{
3093 int pc = *pos;
3094 int i;
4c4b4cd2 3095 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3096 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3097 struct value **argvec; /* Vector of operand types (alloca'ed). */
3098 int nargs; /* Number of operands. */
52ce6436 3099 int oplen;
14f9c5c9
AS
3100
3101 argvec = NULL;
3102 nargs = 0;
3103 exp = *expp;
3104
52ce6436
PH
3105 /* Pass one: resolve operands, saving their types and updating *pos,
3106 if needed. */
14f9c5c9
AS
3107 switch (op)
3108 {
4c4b4cd2
PH
3109 case OP_FUNCALL:
3110 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3111 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3112 *pos += 7;
4c4b4cd2
PH
3113 else
3114 {
3115 *pos += 3;
3116 resolve_subexp (expp, pos, 0, NULL);
3117 }
3118 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3119 break;
3120
14f9c5c9 3121 case UNOP_ADDR:
4c4b4cd2
PH
3122 *pos += 1;
3123 resolve_subexp (expp, pos, 0, NULL);
3124 break;
3125
52ce6436
PH
3126 case UNOP_QUAL:
3127 *pos += 3;
17466c1a 3128 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type));
4c4b4cd2
PH
3129 break;
3130
52ce6436 3131 case OP_ATR_MODULUS:
4c4b4cd2
PH
3132 case OP_ATR_SIZE:
3133 case OP_ATR_TAG:
4c4b4cd2
PH
3134 case OP_ATR_FIRST:
3135 case OP_ATR_LAST:
3136 case OP_ATR_LENGTH:
3137 case OP_ATR_POS:
3138 case OP_ATR_VAL:
4c4b4cd2
PH
3139 case OP_ATR_MIN:
3140 case OP_ATR_MAX:
52ce6436
PH
3141 case TERNOP_IN_RANGE:
3142 case BINOP_IN_BOUNDS:
3143 case UNOP_IN_RANGE:
3144 case OP_AGGREGATE:
3145 case OP_OTHERS:
3146 case OP_CHOICES:
3147 case OP_POSITIONAL:
3148 case OP_DISCRETE_RANGE:
3149 case OP_NAME:
3150 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3151 *pos += oplen;
14f9c5c9
AS
3152 break;
3153
3154 case BINOP_ASSIGN:
3155 {
4c4b4cd2
PH
3156 struct value *arg1;
3157
3158 *pos += 1;
3159 arg1 = resolve_subexp (expp, pos, 0, NULL);
3160 if (arg1 == NULL)
3161 resolve_subexp (expp, pos, 1, NULL);
3162 else
df407dfe 3163 resolve_subexp (expp, pos, 1, value_type (arg1));
4c4b4cd2 3164 break;
14f9c5c9
AS
3165 }
3166
4c4b4cd2 3167 case UNOP_CAST:
4c4b4cd2
PH
3168 *pos += 3;
3169 nargs = 1;
3170 break;
14f9c5c9 3171
4c4b4cd2
PH
3172 case BINOP_ADD:
3173 case BINOP_SUB:
3174 case BINOP_MUL:
3175 case BINOP_DIV:
3176 case BINOP_REM:
3177 case BINOP_MOD:
3178 case BINOP_EXP:
3179 case BINOP_CONCAT:
3180 case BINOP_LOGICAL_AND:
3181 case BINOP_LOGICAL_OR:
3182 case BINOP_BITWISE_AND:
3183 case BINOP_BITWISE_IOR:
3184 case BINOP_BITWISE_XOR:
14f9c5c9 3185
4c4b4cd2
PH
3186 case BINOP_EQUAL:
3187 case BINOP_NOTEQUAL:
3188 case BINOP_LESS:
3189 case BINOP_GTR:
3190 case BINOP_LEQ:
3191 case BINOP_GEQ:
14f9c5c9 3192
4c4b4cd2
PH
3193 case BINOP_REPEAT:
3194 case BINOP_SUBSCRIPT:
3195 case BINOP_COMMA:
40c8aaa9
JB
3196 *pos += 1;
3197 nargs = 2;
3198 break;
14f9c5c9 3199
4c4b4cd2
PH
3200 case UNOP_NEG:
3201 case UNOP_PLUS:
3202 case UNOP_LOGICAL_NOT:
3203 case UNOP_ABS:
3204 case UNOP_IND:
3205 *pos += 1;
3206 nargs = 1;
3207 break;
14f9c5c9 3208
4c4b4cd2
PH
3209 case OP_LONG:
3210 case OP_DOUBLE:
3211 case OP_VAR_VALUE:
3212 *pos += 4;
3213 break;
14f9c5c9 3214
4c4b4cd2
PH
3215 case OP_TYPE:
3216 case OP_BOOL:
3217 case OP_LAST:
4c4b4cd2
PH
3218 case OP_INTERNALVAR:
3219 *pos += 3;
3220 break;
14f9c5c9 3221
4c4b4cd2
PH
3222 case UNOP_MEMVAL:
3223 *pos += 3;
3224 nargs = 1;
3225 break;
3226
67f3407f
DJ
3227 case OP_REGISTER:
3228 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3229 break;
3230
4c4b4cd2
PH
3231 case STRUCTOP_STRUCT:
3232 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3233 nargs = 1;
3234 break;
3235
4c4b4cd2 3236 case TERNOP_SLICE:
4c4b4cd2
PH
3237 *pos += 1;
3238 nargs = 3;
3239 break;
3240
52ce6436 3241 case OP_STRING:
14f9c5c9 3242 break;
4c4b4cd2
PH
3243
3244 default:
323e0a4a 3245 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3246 }
3247
76a01679 3248 argvec = (struct value * *) alloca (sizeof (struct value *) * (nargs + 1));
4c4b4cd2
PH
3249 for (i = 0; i < nargs; i += 1)
3250 argvec[i] = resolve_subexp (expp, pos, 1, NULL);
3251 argvec[i] = NULL;
3252 exp = *expp;
3253
3254 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3255 switch (op)
3256 {
3257 default:
3258 break;
3259
14f9c5c9 3260 case OP_VAR_VALUE:
4c4b4cd2 3261 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
3262 {
3263 struct ada_symbol_info *candidates;
3264 int n_candidates;
3265
3266 n_candidates =
3267 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3268 (exp->elts[pc + 2].symbol),
3269 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3270 &candidates);
76a01679
JB
3271
3272 if (n_candidates > 1)
3273 {
3274 /* Types tend to get re-introduced locally, so if there
3275 are any local symbols that are not types, first filter
3276 out all types. */
3277 int j;
3278 for (j = 0; j < n_candidates; j += 1)
3279 switch (SYMBOL_CLASS (candidates[j].sym))
3280 {
3281 case LOC_REGISTER:
3282 case LOC_ARG:
3283 case LOC_REF_ARG:
76a01679
JB
3284 case LOC_REGPARM_ADDR:
3285 case LOC_LOCAL:
76a01679 3286 case LOC_COMPUTED:
76a01679
JB
3287 goto FoundNonType;
3288 default:
3289 break;
3290 }
3291 FoundNonType:
3292 if (j < n_candidates)
3293 {
3294 j = 0;
3295 while (j < n_candidates)
3296 {
3297 if (SYMBOL_CLASS (candidates[j].sym) == LOC_TYPEDEF)
3298 {
3299 candidates[j] = candidates[n_candidates - 1];
3300 n_candidates -= 1;
3301 }
3302 else
3303 j += 1;
3304 }
3305 }
3306 }
3307
3308 if (n_candidates == 0)
323e0a4a 3309 error (_("No definition found for %s"),
76a01679
JB
3310 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3311 else if (n_candidates == 1)
3312 i = 0;
3313 else if (deprocedure_p
3314 && !is_nonfunction (candidates, n_candidates))
3315 {
06d5cf63
JB
3316 i = ada_resolve_function
3317 (candidates, n_candidates, NULL, 0,
3318 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
3319 context_type);
76a01679 3320 if (i < 0)
323e0a4a 3321 error (_("Could not find a match for %s"),
76a01679
JB
3322 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3323 }
3324 else
3325 {
323e0a4a 3326 printf_filtered (_("Multiple matches for %s\n"),
76a01679
JB
3327 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3328 user_select_syms (candidates, n_candidates, 1);
3329 i = 0;
3330 }
3331
3332 exp->elts[pc + 1].block = candidates[i].block;
3333 exp->elts[pc + 2].symbol = candidates[i].sym;
1265e4aa
JB
3334 if (innermost_block == NULL
3335 || contained_in (candidates[i].block, innermost_block))
76a01679
JB
3336 innermost_block = candidates[i].block;
3337 }
3338
3339 if (deprocedure_p
3340 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3341 == TYPE_CODE_FUNC))
3342 {
3343 replace_operator_with_call (expp, pc, 0, 0,
3344 exp->elts[pc + 2].symbol,
3345 exp->elts[pc + 1].block);
3346 exp = *expp;
3347 }
14f9c5c9
AS
3348 break;
3349
3350 case OP_FUNCALL:
3351 {
4c4b4cd2 3352 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3353 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2
PH
3354 {
3355 struct ada_symbol_info *candidates;
3356 int n_candidates;
3357
3358 n_candidates =
76a01679
JB
3359 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3360 (exp->elts[pc + 5].symbol),
3361 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3362 &candidates);
4c4b4cd2
PH
3363 if (n_candidates == 1)
3364 i = 0;
3365 else
3366 {
06d5cf63
JB
3367 i = ada_resolve_function
3368 (candidates, n_candidates,
3369 argvec, nargs,
3370 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
3371 context_type);
4c4b4cd2 3372 if (i < 0)
323e0a4a 3373 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3374 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3375 }
3376
3377 exp->elts[pc + 4].block = candidates[i].block;
3378 exp->elts[pc + 5].symbol = candidates[i].sym;
1265e4aa
JB
3379 if (innermost_block == NULL
3380 || contained_in (candidates[i].block, innermost_block))
4c4b4cd2
PH
3381 innermost_block = candidates[i].block;
3382 }
14f9c5c9
AS
3383 }
3384 break;
3385 case BINOP_ADD:
3386 case BINOP_SUB:
3387 case BINOP_MUL:
3388 case BINOP_DIV:
3389 case BINOP_REM:
3390 case BINOP_MOD:
3391 case BINOP_CONCAT:
3392 case BINOP_BITWISE_AND:
3393 case BINOP_BITWISE_IOR:
3394 case BINOP_BITWISE_XOR:
3395 case BINOP_EQUAL:
3396 case BINOP_NOTEQUAL:
3397 case BINOP_LESS:
3398 case BINOP_GTR:
3399 case BINOP_LEQ:
3400 case BINOP_GEQ:
3401 case BINOP_EXP:
3402 case UNOP_NEG:
3403 case UNOP_PLUS:
3404 case UNOP_LOGICAL_NOT:
3405 case UNOP_ABS:
3406 if (possible_user_operator_p (op, argvec))
4c4b4cd2
PH
3407 {
3408 struct ada_symbol_info *candidates;
3409 int n_candidates;
3410
3411 n_candidates =
3412 ada_lookup_symbol_list (ada_encode (ada_decoded_op_name (op)),
3413 (struct block *) NULL, VAR_DOMAIN,
4eeaa230 3414 &candidates);
4c4b4cd2 3415 i = ada_resolve_function (candidates, n_candidates, argvec, nargs,
76a01679 3416 ada_decoded_op_name (op), NULL);
4c4b4cd2
PH
3417 if (i < 0)
3418 break;
3419
76a01679
JB
3420 replace_operator_with_call (expp, pc, nargs, 1,
3421 candidates[i].sym, candidates[i].block);
4c4b4cd2
PH
3422 exp = *expp;
3423 }
14f9c5c9 3424 break;
4c4b4cd2
PH
3425
3426 case OP_TYPE:
b3dbf008 3427 case OP_REGISTER:
4c4b4cd2 3428 return NULL;
14f9c5c9
AS
3429 }
3430
3431 *pos = pc;
3432 return evaluate_subexp_type (exp, pos);
3433}
3434
3435/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3436 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3437 a non-pointer. */
14f9c5c9 3438/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3439 liberal. */
14f9c5c9
AS
3440
3441static int
4dc81987 3442ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3443{
61ee279c
PH
3444 ftype = ada_check_typedef (ftype);
3445 atype = ada_check_typedef (atype);
14f9c5c9
AS
3446
3447 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3448 ftype = TYPE_TARGET_TYPE (ftype);
3449 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3450 atype = TYPE_TARGET_TYPE (atype);
3451
d2e4a39e 3452 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3453 {
3454 default:
5b3d5b7d 3455 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3456 case TYPE_CODE_PTR:
3457 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3458 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3459 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3460 else
1265e4aa
JB
3461 return (may_deref
3462 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3463 case TYPE_CODE_INT:
3464 case TYPE_CODE_ENUM:
3465 case TYPE_CODE_RANGE:
3466 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3467 {
3468 case TYPE_CODE_INT:
3469 case TYPE_CODE_ENUM:
3470 case TYPE_CODE_RANGE:
3471 return 1;
3472 default:
3473 return 0;
3474 }
14f9c5c9
AS
3475
3476 case TYPE_CODE_ARRAY:
d2e4a39e 3477 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3478 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3479
3480 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3481 if (ada_is_array_descriptor_type (ftype))
3482 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3483 || ada_is_array_descriptor_type (atype));
14f9c5c9 3484 else
4c4b4cd2
PH
3485 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3486 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3487
3488 case TYPE_CODE_UNION:
3489 case TYPE_CODE_FLT:
3490 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3491 }
3492}
3493
3494/* Return non-zero if the formals of FUNC "sufficiently match" the
3495 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3496 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3497 argument function. */
14f9c5c9
AS
3498
3499static int
d2e4a39e 3500ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3501{
3502 int i;
d2e4a39e 3503 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3504
1265e4aa
JB
3505 if (SYMBOL_CLASS (func) == LOC_CONST
3506 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3507 return (n_actuals == 0);
3508 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3509 return 0;
3510
3511 if (TYPE_NFIELDS (func_type) != n_actuals)
3512 return 0;
3513
3514 for (i = 0; i < n_actuals; i += 1)
3515 {
4c4b4cd2 3516 if (actuals[i] == NULL)
76a01679
JB
3517 return 0;
3518 else
3519 {
5b4ee69b
MS
3520 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3521 i));
df407dfe 3522 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3523
76a01679
JB
3524 if (!ada_type_match (ftype, atype, 1))
3525 return 0;
3526 }
14f9c5c9
AS
3527 }
3528 return 1;
3529}
3530
3531/* False iff function type FUNC_TYPE definitely does not produce a value
3532 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3533 FUNC_TYPE is not a valid function type with a non-null return type
3534 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3535
3536static int
d2e4a39e 3537return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3538{
d2e4a39e 3539 struct type *return_type;
14f9c5c9
AS
3540
3541 if (func_type == NULL)
3542 return 1;
3543
4c4b4cd2 3544 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3545 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3546 else
18af8284 3547 return_type = get_base_type (func_type);
14f9c5c9
AS
3548 if (return_type == NULL)
3549 return 1;
3550
18af8284 3551 context_type = get_base_type (context_type);
14f9c5c9
AS
3552
3553 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3554 return context_type == NULL || return_type == context_type;
3555 else if (context_type == NULL)
3556 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3557 else
3558 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3559}
3560
3561
4c4b4cd2 3562/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3563 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3564 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3565 that returns that type, then eliminate matches that don't. If
3566 CONTEXT_TYPE is void and there is at least one match that does not
3567 return void, eliminate all matches that do.
3568
14f9c5c9
AS
3569 Asks the user if there is more than one match remaining. Returns -1
3570 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3571 solely for messages. May re-arrange and modify SYMS in
3572 the process; the index returned is for the modified vector. */
14f9c5c9 3573
4c4b4cd2
PH
3574static int
3575ada_resolve_function (struct ada_symbol_info syms[],
3576 int nsyms, struct value **args, int nargs,
3577 const char *name, struct type *context_type)
14f9c5c9 3578{
30b15541 3579 int fallback;
14f9c5c9 3580 int k;
4c4b4cd2 3581 int m; /* Number of hits */
14f9c5c9 3582
d2e4a39e 3583 m = 0;
30b15541
UW
3584 /* In the first pass of the loop, we only accept functions matching
3585 context_type. If none are found, we add a second pass of the loop
3586 where every function is accepted. */
3587 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3588 {
3589 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3590 {
61ee279c 3591 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].sym));
4c4b4cd2
PH
3592
3593 if (ada_args_match (syms[k].sym, args, nargs)
30b15541 3594 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3595 {
3596 syms[m] = syms[k];
3597 m += 1;
3598 }
3599 }
14f9c5c9
AS
3600 }
3601
3602 if (m == 0)
3603 return -1;
3604 else if (m > 1)
3605 {
323e0a4a 3606 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3607 user_select_syms (syms, m, 1);
14f9c5c9
AS
3608 return 0;
3609 }
3610 return 0;
3611}
3612
4c4b4cd2
PH
3613/* Returns true (non-zero) iff decoded name N0 should appear before N1
3614 in a listing of choices during disambiguation (see sort_choices, below).
3615 The idea is that overloadings of a subprogram name from the
3616 same package should sort in their source order. We settle for ordering
3617 such symbols by their trailing number (__N or $N). */
3618
14f9c5c9 3619static int
0d5cff50 3620encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3621{
3622 if (N1 == NULL)
3623 return 0;
3624 else if (N0 == NULL)
3625 return 1;
3626 else
3627 {
3628 int k0, k1;
5b4ee69b 3629
d2e4a39e 3630 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3631 ;
d2e4a39e 3632 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3633 ;
d2e4a39e 3634 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3635 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3636 {
3637 int n0, n1;
5b4ee69b 3638
4c4b4cd2
PH
3639 n0 = k0;
3640 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3641 n0 -= 1;
3642 n1 = k1;
3643 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3644 n1 -= 1;
3645 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3646 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3647 }
14f9c5c9
AS
3648 return (strcmp (N0, N1) < 0);
3649 }
3650}
d2e4a39e 3651
4c4b4cd2
PH
3652/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3653 encoded names. */
3654
d2e4a39e 3655static void
4c4b4cd2 3656sort_choices (struct ada_symbol_info syms[], int nsyms)
14f9c5c9 3657{
4c4b4cd2 3658 int i;
5b4ee69b 3659
d2e4a39e 3660 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3661 {
4c4b4cd2 3662 struct ada_symbol_info sym = syms[i];
14f9c5c9
AS
3663 int j;
3664
d2e4a39e 3665 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2
PH
3666 {
3667 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].sym),
3668 SYMBOL_LINKAGE_NAME (sym.sym)))
3669 break;
3670 syms[j + 1] = syms[j];
3671 }
d2e4a39e 3672 syms[j + 1] = sym;
14f9c5c9
AS
3673 }
3674}
3675
4c4b4cd2
PH
3676/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3677 by asking the user (if necessary), returning the number selected,
3678 and setting the first elements of SYMS items. Error if no symbols
3679 selected. */
14f9c5c9
AS
3680
3681/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3682 to be re-integrated one of these days. */
14f9c5c9
AS
3683
3684int
4c4b4cd2 3685user_select_syms (struct ada_symbol_info *syms, int nsyms, int max_results)
14f9c5c9
AS
3686{
3687 int i;
d2e4a39e 3688 int *chosen = (int *) alloca (sizeof (int) * nsyms);
14f9c5c9
AS
3689 int n_chosen;
3690 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3691 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3692
3693 if (max_results < 1)
323e0a4a 3694 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3695 if (nsyms <= 1)
3696 return nsyms;
3697
717d2f5a
JB
3698 if (select_mode == multiple_symbols_cancel)
3699 error (_("\
3700canceled because the command is ambiguous\n\
3701See set/show multiple-symbol."));
3702
3703 /* If select_mode is "all", then return all possible symbols.
3704 Only do that if more than one symbol can be selected, of course.
3705 Otherwise, display the menu as usual. */
3706 if (select_mode == multiple_symbols_all && max_results > 1)
3707 return nsyms;
3708
323e0a4a 3709 printf_unfiltered (_("[0] cancel\n"));
14f9c5c9 3710 if (max_results > 1)
323e0a4a 3711 printf_unfiltered (_("[1] all\n"));
14f9c5c9 3712
4c4b4cd2 3713 sort_choices (syms, nsyms);
14f9c5c9
AS
3714
3715 for (i = 0; i < nsyms; i += 1)
3716 {
4c4b4cd2
PH
3717 if (syms[i].sym == NULL)
3718 continue;
3719
3720 if (SYMBOL_CLASS (syms[i].sym) == LOC_BLOCK)
3721 {
76a01679
JB
3722 struct symtab_and_line sal =
3723 find_function_start_sal (syms[i].sym, 1);
5b4ee69b 3724
323e0a4a
AC
3725 if (sal.symtab == NULL)
3726 printf_unfiltered (_("[%d] %s at <no source file available>:%d\n"),
3727 i + first_choice,
3728 SYMBOL_PRINT_NAME (syms[i].sym),
3729 sal.line);
3730 else
3731 printf_unfiltered (_("[%d] %s at %s:%d\n"), i + first_choice,
3732 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3733 symtab_to_filename_for_display (sal.symtab),
3734 sal.line);
4c4b4cd2
PH
3735 continue;
3736 }
d2e4a39e 3737 else
4c4b4cd2
PH
3738 {
3739 int is_enumeral =
3740 (SYMBOL_CLASS (syms[i].sym) == LOC_CONST
3741 && SYMBOL_TYPE (syms[i].sym) != NULL
3742 && TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) == TYPE_CODE_ENUM);
1994afbf
DE
3743 struct symtab *symtab = NULL;
3744
3745 if (SYMBOL_OBJFILE_OWNED (syms[i].sym))
3746 symtab = symbol_symtab (syms[i].sym);
4c4b4cd2
PH
3747
3748 if (SYMBOL_LINE (syms[i].sym) != 0 && symtab != NULL)
323e0a4a 3749 printf_unfiltered (_("[%d] %s at %s:%d\n"),
4c4b4cd2
PH
3750 i + first_choice,
3751 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3752 symtab_to_filename_for_display (symtab),
3753 SYMBOL_LINE (syms[i].sym));
76a01679
JB
3754 else if (is_enumeral
3755 && TYPE_NAME (SYMBOL_TYPE (syms[i].sym)) != NULL)
4c4b4cd2 3756 {
a3f17187 3757 printf_unfiltered (("[%d] "), i + first_choice);
76a01679 3758 ada_print_type (SYMBOL_TYPE (syms[i].sym), NULL,
79d43c61 3759 gdb_stdout, -1, 0, &type_print_raw_options);
323e0a4a 3760 printf_unfiltered (_("'(%s) (enumeral)\n"),
4c4b4cd2
PH
3761 SYMBOL_PRINT_NAME (syms[i].sym));
3762 }
3763 else if (symtab != NULL)
3764 printf_unfiltered (is_enumeral
323e0a4a
AC
3765 ? _("[%d] %s in %s (enumeral)\n")
3766 : _("[%d] %s at %s:?\n"),
4c4b4cd2
PH
3767 i + first_choice,
3768 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821 3769 symtab_to_filename_for_display (symtab));
4c4b4cd2
PH
3770 else
3771 printf_unfiltered (is_enumeral
323e0a4a
AC
3772 ? _("[%d] %s (enumeral)\n")
3773 : _("[%d] %s at ?\n"),
4c4b4cd2
PH
3774 i + first_choice,
3775 SYMBOL_PRINT_NAME (syms[i].sym));
3776 }
14f9c5c9 3777 }
d2e4a39e 3778
14f9c5c9 3779 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3780 "overload-choice");
14f9c5c9
AS
3781
3782 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3783 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3784
3785 return n_chosen;
3786}
3787
3788/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3789 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3790 order in CHOICES[0 .. N-1], and return N.
3791
3792 The user types choices as a sequence of numbers on one line
3793 separated by blanks, encoding them as follows:
3794
4c4b4cd2 3795 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3796 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3797 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3798
4c4b4cd2 3799 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3800
3801 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3802 prompts (for use with the -f switch). */
14f9c5c9
AS
3803
3804int
d2e4a39e 3805get_selections (int *choices, int n_choices, int max_results,
4c4b4cd2 3806 int is_all_choice, char *annotation_suffix)
14f9c5c9 3807{
d2e4a39e 3808 char *args;
0bcd0149 3809 char *prompt;
14f9c5c9
AS
3810 int n_chosen;
3811 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3812
14f9c5c9
AS
3813 prompt = getenv ("PS2");
3814 if (prompt == NULL)
0bcd0149 3815 prompt = "> ";
14f9c5c9 3816
0bcd0149 3817 args = command_line_input (prompt, 0, annotation_suffix);
d2e4a39e 3818
14f9c5c9 3819 if (args == NULL)
323e0a4a 3820 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3821
3822 n_chosen = 0;
76a01679 3823
4c4b4cd2
PH
3824 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3825 order, as given in args. Choices are validated. */
14f9c5c9
AS
3826 while (1)
3827 {
d2e4a39e 3828 char *args2;
14f9c5c9
AS
3829 int choice, j;
3830
0fcd72ba 3831 args = skip_spaces (args);
14f9c5c9 3832 if (*args == '\0' && n_chosen == 0)
323e0a4a 3833 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3834 else if (*args == '\0')
4c4b4cd2 3835 break;
14f9c5c9
AS
3836
3837 choice = strtol (args, &args2, 10);
d2e4a39e 3838 if (args == args2 || choice < 0
4c4b4cd2 3839 || choice > n_choices + first_choice - 1)
323e0a4a 3840 error (_("Argument must be choice number"));
14f9c5c9
AS
3841 args = args2;
3842
d2e4a39e 3843 if (choice == 0)
323e0a4a 3844 error (_("cancelled"));
14f9c5c9
AS
3845
3846 if (choice < first_choice)
4c4b4cd2
PH
3847 {
3848 n_chosen = n_choices;
3849 for (j = 0; j < n_choices; j += 1)
3850 choices[j] = j;
3851 break;
3852 }
14f9c5c9
AS
3853 choice -= first_choice;
3854
d2e4a39e 3855 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
3856 {
3857 }
14f9c5c9
AS
3858
3859 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
3860 {
3861 int k;
5b4ee69b 3862
4c4b4cd2
PH
3863 for (k = n_chosen - 1; k > j; k -= 1)
3864 choices[k + 1] = choices[k];
3865 choices[j + 1] = choice;
3866 n_chosen += 1;
3867 }
14f9c5c9
AS
3868 }
3869
3870 if (n_chosen > max_results)
323e0a4a 3871 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 3872
14f9c5c9
AS
3873 return n_chosen;
3874}
3875
4c4b4cd2
PH
3876/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3877 on the function identified by SYM and BLOCK, and taking NARGS
3878 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3879
3880static void
d2e4a39e 3881replace_operator_with_call (struct expression **expp, int pc, int nargs,
4c4b4cd2 3882 int oplen, struct symbol *sym,
270140bd 3883 const struct block *block)
14f9c5c9
AS
3884{
3885 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 3886 symbol, -oplen for operator being replaced). */
d2e4a39e 3887 struct expression *newexp = (struct expression *)
8c1a34e7 3888 xzalloc (sizeof (struct expression)
4c4b4cd2 3889 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
d2e4a39e 3890 struct expression *exp = *expp;
14f9c5c9
AS
3891
3892 newexp->nelts = exp->nelts + 7 - oplen;
3893 newexp->language_defn = exp->language_defn;
3489610d 3894 newexp->gdbarch = exp->gdbarch;
14f9c5c9 3895 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 3896 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 3897 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
3898
3899 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
3900 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
3901
3902 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
3903 newexp->elts[pc + 4].block = block;
3904 newexp->elts[pc + 5].symbol = sym;
3905
3906 *expp = newexp;
aacb1f0a 3907 xfree (exp);
d2e4a39e 3908}
14f9c5c9
AS
3909
3910/* Type-class predicates */
3911
4c4b4cd2
PH
3912/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
3913 or FLOAT). */
14f9c5c9
AS
3914
3915static int
d2e4a39e 3916numeric_type_p (struct type *type)
14f9c5c9
AS
3917{
3918 if (type == NULL)
3919 return 0;
d2e4a39e
AS
3920 else
3921 {
3922 switch (TYPE_CODE (type))
4c4b4cd2
PH
3923 {
3924 case TYPE_CODE_INT:
3925 case TYPE_CODE_FLT:
3926 return 1;
3927 case TYPE_CODE_RANGE:
3928 return (type == TYPE_TARGET_TYPE (type)
3929 || numeric_type_p (TYPE_TARGET_TYPE (type)));
3930 default:
3931 return 0;
3932 }
d2e4a39e 3933 }
14f9c5c9
AS
3934}
3935
4c4b4cd2 3936/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
3937
3938static int
d2e4a39e 3939integer_type_p (struct type *type)
14f9c5c9
AS
3940{
3941 if (type == NULL)
3942 return 0;
d2e4a39e
AS
3943 else
3944 {
3945 switch (TYPE_CODE (type))
4c4b4cd2
PH
3946 {
3947 case TYPE_CODE_INT:
3948 return 1;
3949 case TYPE_CODE_RANGE:
3950 return (type == TYPE_TARGET_TYPE (type)
3951 || integer_type_p (TYPE_TARGET_TYPE (type)));
3952 default:
3953 return 0;
3954 }
d2e4a39e 3955 }
14f9c5c9
AS
3956}
3957
4c4b4cd2 3958/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
3959
3960static int
d2e4a39e 3961scalar_type_p (struct type *type)
14f9c5c9
AS
3962{
3963 if (type == NULL)
3964 return 0;
d2e4a39e
AS
3965 else
3966 {
3967 switch (TYPE_CODE (type))
4c4b4cd2
PH
3968 {
3969 case TYPE_CODE_INT:
3970 case TYPE_CODE_RANGE:
3971 case TYPE_CODE_ENUM:
3972 case TYPE_CODE_FLT:
3973 return 1;
3974 default:
3975 return 0;
3976 }
d2e4a39e 3977 }
14f9c5c9
AS
3978}
3979
4c4b4cd2 3980/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
3981
3982static int
d2e4a39e 3983discrete_type_p (struct type *type)
14f9c5c9
AS
3984{
3985 if (type == NULL)
3986 return 0;
d2e4a39e
AS
3987 else
3988 {
3989 switch (TYPE_CODE (type))
4c4b4cd2
PH
3990 {
3991 case TYPE_CODE_INT:
3992 case TYPE_CODE_RANGE:
3993 case TYPE_CODE_ENUM:
872f0337 3994 case TYPE_CODE_BOOL:
4c4b4cd2
PH
3995 return 1;
3996 default:
3997 return 0;
3998 }
d2e4a39e 3999 }
14f9c5c9
AS
4000}
4001
4c4b4cd2
PH
4002/* Returns non-zero if OP with operands in the vector ARGS could be
4003 a user-defined function. Errs on the side of pre-defined operators
4004 (i.e., result 0). */
14f9c5c9
AS
4005
4006static int
d2e4a39e 4007possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4008{
76a01679 4009 struct type *type0 =
df407dfe 4010 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4011 struct type *type1 =
df407dfe 4012 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4013
4c4b4cd2
PH
4014 if (type0 == NULL)
4015 return 0;
4016
14f9c5c9
AS
4017 switch (op)
4018 {
4019 default:
4020 return 0;
4021
4022 case BINOP_ADD:
4023 case BINOP_SUB:
4024 case BINOP_MUL:
4025 case BINOP_DIV:
d2e4a39e 4026 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4027
4028 case BINOP_REM:
4029 case BINOP_MOD:
4030 case BINOP_BITWISE_AND:
4031 case BINOP_BITWISE_IOR:
4032 case BINOP_BITWISE_XOR:
d2e4a39e 4033 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4034
4035 case BINOP_EQUAL:
4036 case BINOP_NOTEQUAL:
4037 case BINOP_LESS:
4038 case BINOP_GTR:
4039 case BINOP_LEQ:
4040 case BINOP_GEQ:
d2e4a39e 4041 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4042
4043 case BINOP_CONCAT:
ee90b9ab 4044 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4045
4046 case BINOP_EXP:
d2e4a39e 4047 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4048
4049 case UNOP_NEG:
4050 case UNOP_PLUS:
4051 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4052 case UNOP_ABS:
4053 return (!numeric_type_p (type0));
14f9c5c9
AS
4054
4055 }
4056}
4057\f
4c4b4cd2 4058 /* Renaming */
14f9c5c9 4059
aeb5907d
JB
4060/* NOTES:
4061
4062 1. In the following, we assume that a renaming type's name may
4063 have an ___XD suffix. It would be nice if this went away at some
4064 point.
4065 2. We handle both the (old) purely type-based representation of
4066 renamings and the (new) variable-based encoding. At some point,
4067 it is devoutly to be hoped that the former goes away
4068 (FIXME: hilfinger-2007-07-09).
4069 3. Subprogram renamings are not implemented, although the XRS
4070 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4071
4072/* If SYM encodes a renaming,
4073
4074 <renaming> renames <renamed entity>,
4075
4076 sets *LEN to the length of the renamed entity's name,
4077 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4078 the string describing the subcomponent selected from the renamed
0963b4bd 4079 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4080 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4081 are undefined). Otherwise, returns a value indicating the category
4082 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4083 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4084 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4085 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4086 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4087 may be NULL, in which case they are not assigned.
4088
4089 [Currently, however, GCC does not generate subprogram renamings.] */
4090
4091enum ada_renaming_category
4092ada_parse_renaming (struct symbol *sym,
4093 const char **renamed_entity, int *len,
4094 const char **renaming_expr)
4095{
4096 enum ada_renaming_category kind;
4097 const char *info;
4098 const char *suffix;
4099
4100 if (sym == NULL)
4101 return ADA_NOT_RENAMING;
4102 switch (SYMBOL_CLASS (sym))
14f9c5c9 4103 {
aeb5907d
JB
4104 default:
4105 return ADA_NOT_RENAMING;
4106 case LOC_TYPEDEF:
4107 return parse_old_style_renaming (SYMBOL_TYPE (sym),
4108 renamed_entity, len, renaming_expr);
4109 case LOC_LOCAL:
4110 case LOC_STATIC:
4111 case LOC_COMPUTED:
4112 case LOC_OPTIMIZED_OUT:
4113 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4114 if (info == NULL)
4115 return ADA_NOT_RENAMING;
4116 switch (info[5])
4117 {
4118 case '_':
4119 kind = ADA_OBJECT_RENAMING;
4120 info += 6;
4121 break;
4122 case 'E':
4123 kind = ADA_EXCEPTION_RENAMING;
4124 info += 7;
4125 break;
4126 case 'P':
4127 kind = ADA_PACKAGE_RENAMING;
4128 info += 7;
4129 break;
4130 case 'S':
4131 kind = ADA_SUBPROGRAM_RENAMING;
4132 info += 7;
4133 break;
4134 default:
4135 return ADA_NOT_RENAMING;
4136 }
14f9c5c9 4137 }
4c4b4cd2 4138
aeb5907d
JB
4139 if (renamed_entity != NULL)
4140 *renamed_entity = info;
4141 suffix = strstr (info, "___XE");
4142 if (suffix == NULL || suffix == info)
4143 return ADA_NOT_RENAMING;
4144 if (len != NULL)
4145 *len = strlen (info) - strlen (suffix);
4146 suffix += 5;
4147 if (renaming_expr != NULL)
4148 *renaming_expr = suffix;
4149 return kind;
4150}
4151
4152/* Assuming TYPE encodes a renaming according to the old encoding in
4153 exp_dbug.ads, returns details of that renaming in *RENAMED_ENTITY,
4154 *LEN, and *RENAMING_EXPR, as for ada_parse_renaming, above. Returns
4155 ADA_NOT_RENAMING otherwise. */
4156static enum ada_renaming_category
4157parse_old_style_renaming (struct type *type,
4158 const char **renamed_entity, int *len,
4159 const char **renaming_expr)
4160{
4161 enum ada_renaming_category kind;
4162 const char *name;
4163 const char *info;
4164 const char *suffix;
14f9c5c9 4165
aeb5907d
JB
4166 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
4167 || TYPE_NFIELDS (type) != 1)
4168 return ADA_NOT_RENAMING;
14f9c5c9 4169
aeb5907d
JB
4170 name = type_name_no_tag (type);
4171 if (name == NULL)
4172 return ADA_NOT_RENAMING;
4173
4174 name = strstr (name, "___XR");
4175 if (name == NULL)
4176 return ADA_NOT_RENAMING;
4177 switch (name[5])
4178 {
4179 case '\0':
4180 case '_':
4181 kind = ADA_OBJECT_RENAMING;
4182 break;
4183 case 'E':
4184 kind = ADA_EXCEPTION_RENAMING;
4185 break;
4186 case 'P':
4187 kind = ADA_PACKAGE_RENAMING;
4188 break;
4189 case 'S':
4190 kind = ADA_SUBPROGRAM_RENAMING;
4191 break;
4192 default:
4193 return ADA_NOT_RENAMING;
4194 }
14f9c5c9 4195
aeb5907d
JB
4196 info = TYPE_FIELD_NAME (type, 0);
4197 if (info == NULL)
4198 return ADA_NOT_RENAMING;
4199 if (renamed_entity != NULL)
4200 *renamed_entity = info;
4201 suffix = strstr (info, "___XE");
4202 if (renaming_expr != NULL)
4203 *renaming_expr = suffix + 5;
4204 if (suffix == NULL || suffix == info)
4205 return ADA_NOT_RENAMING;
4206 if (len != NULL)
4207 *len = suffix - info;
4208 return kind;
a5ee536b
JB
4209}
4210
4211/* Compute the value of the given RENAMING_SYM, which is expected to
4212 be a symbol encoding a renaming expression. BLOCK is the block
4213 used to evaluate the renaming. */
52ce6436 4214
a5ee536b
JB
4215static struct value *
4216ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4217 const struct block *block)
a5ee536b 4218{
bbc13ae3 4219 const char *sym_name;
a5ee536b
JB
4220 struct expression *expr;
4221 struct value *value;
4222 struct cleanup *old_chain = NULL;
4223
bbc13ae3 4224 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
1bb9788d 4225 expr = parse_exp_1 (&sym_name, 0, block, 0);
bbc13ae3 4226 old_chain = make_cleanup (free_current_contents, &expr);
a5ee536b
JB
4227 value = evaluate_expression (expr);
4228
4229 do_cleanups (old_chain);
4230 return value;
4231}
14f9c5c9 4232\f
d2e4a39e 4233
4c4b4cd2 4234 /* Evaluation: Function Calls */
14f9c5c9 4235
4c4b4cd2 4236/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4237 lvalues, and otherwise has the side-effect of allocating memory
4238 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4239
d2e4a39e 4240static struct value *
40bc484c 4241ensure_lval (struct value *val)
14f9c5c9 4242{
40bc484c
JB
4243 if (VALUE_LVAL (val) == not_lval
4244 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4245 {
df407dfe 4246 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4247 const CORE_ADDR addr =
4248 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4249
40bc484c 4250 set_value_address (val, addr);
a84a8a0d 4251 VALUE_LVAL (val) = lval_memory;
40bc484c 4252 write_memory (addr, value_contents (val), len);
c3e5cd34 4253 }
14f9c5c9
AS
4254
4255 return val;
4256}
4257
4258/* Return the value ACTUAL, converted to be an appropriate value for a
4259 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4260 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4261 values not residing in memory, updating it as needed. */
14f9c5c9 4262
a93c0eb6 4263struct value *
40bc484c 4264ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4265{
df407dfe 4266 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4267 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4268 struct type *formal_target =
4269 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4270 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4271 struct type *actual_target =
4272 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4273 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4274
4c4b4cd2 4275 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4276 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4277 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4278 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4279 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4280 {
a84a8a0d 4281 struct value *result;
5b4ee69b 4282
14f9c5c9 4283 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4284 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4285 result = desc_data (actual);
14f9c5c9 4286 else if (TYPE_CODE (actual_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4287 {
4288 if (VALUE_LVAL (actual) != lval_memory)
4289 {
4290 struct value *val;
5b4ee69b 4291
df407dfe 4292 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4293 val = allocate_value (actual_type);
990a07ab 4294 memcpy ((char *) value_contents_raw (val),
0fd88904 4295 (char *) value_contents (actual),
4c4b4cd2 4296 TYPE_LENGTH (actual_type));
40bc484c 4297 actual = ensure_lval (val);
4c4b4cd2 4298 }
a84a8a0d 4299 result = value_addr (actual);
4c4b4cd2 4300 }
a84a8a0d
JB
4301 else
4302 return actual;
b1af9e97 4303 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4304 }
4305 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4306 return ada_value_ind (actual);
4307
4308 return actual;
4309}
4310
438c98a1
JB
4311/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4312 type TYPE. This is usually an inefficient no-op except on some targets
4313 (such as AVR) where the representation of a pointer and an address
4314 differs. */
4315
4316static CORE_ADDR
4317value_pointer (struct value *value, struct type *type)
4318{
4319 struct gdbarch *gdbarch = get_type_arch (type);
4320 unsigned len = TYPE_LENGTH (type);
4321 gdb_byte *buf = alloca (len);
4322 CORE_ADDR addr;
4323
4324 addr = value_address (value);
4325 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4326 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4327 return addr;
4328}
4329
14f9c5c9 4330
4c4b4cd2
PH
4331/* Push a descriptor of type TYPE for array value ARR on the stack at
4332 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4333 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4334 to-descriptor type rather than a descriptor type), a struct value *
4335 representing a pointer to this descriptor. */
14f9c5c9 4336
d2e4a39e 4337static struct value *
40bc484c 4338make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4339{
d2e4a39e
AS
4340 struct type *bounds_type = desc_bounds_type (type);
4341 struct type *desc_type = desc_base_type (type);
4342 struct value *descriptor = allocate_value (desc_type);
4343 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4344 int i;
d2e4a39e 4345
0963b4bd
MS
4346 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4347 i > 0; i -= 1)
14f9c5c9 4348 {
19f220c3
JK
4349 modify_field (value_type (bounds), value_contents_writeable (bounds),
4350 ada_array_bound (arr, i, 0),
4351 desc_bound_bitpos (bounds_type, i, 0),
4352 desc_bound_bitsize (bounds_type, i, 0));
4353 modify_field (value_type (bounds), value_contents_writeable (bounds),
4354 ada_array_bound (arr, i, 1),
4355 desc_bound_bitpos (bounds_type, i, 1),
4356 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4357 }
d2e4a39e 4358
40bc484c 4359 bounds = ensure_lval (bounds);
d2e4a39e 4360
19f220c3
JK
4361 modify_field (value_type (descriptor),
4362 value_contents_writeable (descriptor),
4363 value_pointer (ensure_lval (arr),
4364 TYPE_FIELD_TYPE (desc_type, 0)),
4365 fat_pntr_data_bitpos (desc_type),
4366 fat_pntr_data_bitsize (desc_type));
4367
4368 modify_field (value_type (descriptor),
4369 value_contents_writeable (descriptor),
4370 value_pointer (bounds,
4371 TYPE_FIELD_TYPE (desc_type, 1)),
4372 fat_pntr_bounds_bitpos (desc_type),
4373 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4374
40bc484c 4375 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4376
4377 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4378 return value_addr (descriptor);
4379 else
4380 return descriptor;
4381}
14f9c5c9 4382\f
3d9434b5
JB
4383 /* Symbol Cache Module */
4384
3d9434b5 4385/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4386 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4387 on the type of entity being printed, the cache can make it as much
4388 as an order of magnitude faster than without it.
4389
4390 The descriptive type DWARF extension has significantly reduced
4391 the need for this cache, at least when DWARF is being used. However,
4392 even in this case, some expensive name-based symbol searches are still
4393 sometimes necessary - to find an XVZ variable, mostly. */
4394
ee01b665 4395/* Initialize the contents of SYM_CACHE. */
3d9434b5 4396
ee01b665
JB
4397static void
4398ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4399{
4400 obstack_init (&sym_cache->cache_space);
4401 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4402}
3d9434b5 4403
ee01b665
JB
4404/* Free the memory used by SYM_CACHE. */
4405
4406static void
4407ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4408{
ee01b665
JB
4409 obstack_free (&sym_cache->cache_space, NULL);
4410 xfree (sym_cache);
4411}
3d9434b5 4412
ee01b665
JB
4413/* Return the symbol cache associated to the given program space PSPACE.
4414 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4415
ee01b665
JB
4416static struct ada_symbol_cache *
4417ada_get_symbol_cache (struct program_space *pspace)
4418{
4419 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4420
66c168ae 4421 if (pspace_data->sym_cache == NULL)
ee01b665 4422 {
66c168ae
JB
4423 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4424 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4425 }
4426
66c168ae 4427 return pspace_data->sym_cache;
ee01b665 4428}
3d9434b5
JB
4429
4430/* Clear all entries from the symbol cache. */
4431
4432static void
4433ada_clear_symbol_cache (void)
4434{
ee01b665
JB
4435 struct ada_symbol_cache *sym_cache
4436 = ada_get_symbol_cache (current_program_space);
4437
4438 obstack_free (&sym_cache->cache_space, NULL);
4439 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4440}
4441
fe978cb0 4442/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4443 Return it if found, or NULL otherwise. */
4444
4445static struct cache_entry **
fe978cb0 4446find_entry (const char *name, domain_enum domain)
3d9434b5 4447{
ee01b665
JB
4448 struct ada_symbol_cache *sym_cache
4449 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4450 int h = msymbol_hash (name) % HASH_SIZE;
4451 struct cache_entry **e;
4452
ee01b665 4453 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4454 {
fe978cb0 4455 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4456 return e;
4457 }
4458 return NULL;
4459}
4460
fe978cb0 4461/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4462 Return 1 if found, 0 otherwise.
4463
4464 If an entry was found and SYM is not NULL, set *SYM to the entry's
4465 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4466
96d887e8 4467static int
fe978cb0 4468lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4469 struct symbol **sym, const struct block **block)
96d887e8 4470{
fe978cb0 4471 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4472
4473 if (e == NULL)
4474 return 0;
4475 if (sym != NULL)
4476 *sym = (*e)->sym;
4477 if (block != NULL)
4478 *block = (*e)->block;
4479 return 1;
96d887e8
PH
4480}
4481
3d9434b5 4482/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4483 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4484
96d887e8 4485static void
fe978cb0 4486cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4487 const struct block *block)
96d887e8 4488{
ee01b665
JB
4489 struct ada_symbol_cache *sym_cache
4490 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4491 int h;
4492 char *copy;
4493 struct cache_entry *e;
4494
1994afbf
DE
4495 /* Symbols for builtin types don't have a block.
4496 For now don't cache such symbols. */
4497 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4498 return;
4499
3d9434b5
JB
4500 /* If the symbol is a local symbol, then do not cache it, as a search
4501 for that symbol depends on the context. To determine whether
4502 the symbol is local or not, we check the block where we found it
4503 against the global and static blocks of its associated symtab. */
4504 if (sym
08be3fe3 4505 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4506 GLOBAL_BLOCK) != block
08be3fe3 4507 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4508 STATIC_BLOCK) != block)
3d9434b5
JB
4509 return;
4510
4511 h = msymbol_hash (name) % HASH_SIZE;
ee01b665
JB
4512 e = (struct cache_entry *) obstack_alloc (&sym_cache->cache_space,
4513 sizeof (*e));
4514 e->next = sym_cache->root[h];
4515 sym_cache->root[h] = e;
4516 e->name = copy = obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4517 strcpy (copy, name);
4518 e->sym = sym;
fe978cb0 4519 e->domain = domain;
3d9434b5 4520 e->block = block;
96d887e8 4521}
4c4b4cd2
PH
4522\f
4523 /* Symbol Lookup */
4524
c0431670
JB
4525/* Return nonzero if wild matching should be used when searching for
4526 all symbols matching LOOKUP_NAME.
4527
4528 LOOKUP_NAME is expected to be a symbol name after transformation
4529 for Ada lookups (see ada_name_for_lookup). */
4530
4531static int
4532should_use_wild_match (const char *lookup_name)
4533{
4534 return (strstr (lookup_name, "__") == NULL);
4535}
4536
4c4b4cd2
PH
4537/* Return the result of a standard (literal, C-like) lookup of NAME in
4538 given DOMAIN, visible from lexical block BLOCK. */
4539
4540static struct symbol *
4541standard_lookup (const char *name, const struct block *block,
4542 domain_enum domain)
4543{
acbd605d
MGD
4544 /* Initialize it just to avoid a GCC false warning. */
4545 struct symbol *sym = NULL;
4c4b4cd2 4546
2570f2b7 4547 if (lookup_cached_symbol (name, domain, &sym, NULL))
4c4b4cd2 4548 return sym;
2570f2b7
UW
4549 sym = lookup_symbol_in_language (name, block, domain, language_c, 0);
4550 cache_symbol (name, domain, sym, block_found);
4c4b4cd2
PH
4551 return sym;
4552}
4553
4554
4555/* Non-zero iff there is at least one non-function/non-enumeral symbol
4556 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4557 since they contend in overloading in the same way. */
4558static int
4559is_nonfunction (struct ada_symbol_info syms[], int n)
4560{
4561 int i;
4562
4563 for (i = 0; i < n; i += 1)
4564 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_FUNC
4565 && (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM
4566 || SYMBOL_CLASS (syms[i].sym) != LOC_CONST))
14f9c5c9
AS
4567 return 1;
4568
4569 return 0;
4570}
4571
4572/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4573 struct types. Otherwise, they may not. */
14f9c5c9
AS
4574
4575static int
d2e4a39e 4576equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4577{
d2e4a39e 4578 if (type0 == type1)
14f9c5c9 4579 return 1;
d2e4a39e 4580 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4581 || TYPE_CODE (type0) != TYPE_CODE (type1))
4582 return 0;
d2e4a39e 4583 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4584 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4585 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4586 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4587 return 1;
d2e4a39e 4588
14f9c5c9
AS
4589 return 0;
4590}
4591
4592/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4593 no more defined than that of SYM1. */
14f9c5c9
AS
4594
4595static int
d2e4a39e 4596lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4597{
4598 if (sym0 == sym1)
4599 return 1;
176620f1 4600 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4601 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4602 return 0;
4603
d2e4a39e 4604 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4605 {
4606 case LOC_UNDEF:
4607 return 1;
4608 case LOC_TYPEDEF:
4609 {
4c4b4cd2
PH
4610 struct type *type0 = SYMBOL_TYPE (sym0);
4611 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4612 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4613 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4614 int len0 = strlen (name0);
5b4ee69b 4615
4c4b4cd2
PH
4616 return
4617 TYPE_CODE (type0) == TYPE_CODE (type1)
4618 && (equiv_types (type0, type1)
4619 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4620 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4621 }
4622 case LOC_CONST:
4623 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4624 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4625 default:
4626 return 0;
14f9c5c9
AS
4627 }
4628}
4629
4c4b4cd2
PH
4630/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct ada_symbol_info
4631 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4632
4633static void
76a01679
JB
4634add_defn_to_vec (struct obstack *obstackp,
4635 struct symbol *sym,
f0c5f9b2 4636 const struct block *block)
14f9c5c9
AS
4637{
4638 int i;
4c4b4cd2 4639 struct ada_symbol_info *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4640
529cad9c
PH
4641 /* Do not try to complete stub types, as the debugger is probably
4642 already scanning all symbols matching a certain name at the
4643 time when this function is called. Trying to replace the stub
4644 type by its associated full type will cause us to restart a scan
4645 which may lead to an infinite recursion. Instead, the client
4646 collecting the matching symbols will end up collecting several
4647 matches, with at least one of them complete. It can then filter
4648 out the stub ones if needed. */
4649
4c4b4cd2
PH
4650 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4651 {
4652 if (lesseq_defined_than (sym, prevDefns[i].sym))
4653 return;
4654 else if (lesseq_defined_than (prevDefns[i].sym, sym))
4655 {
4656 prevDefns[i].sym = sym;
4657 prevDefns[i].block = block;
4c4b4cd2 4658 return;
76a01679 4659 }
4c4b4cd2
PH
4660 }
4661
4662 {
4663 struct ada_symbol_info info;
4664
4665 info.sym = sym;
4666 info.block = block;
4c4b4cd2
PH
4667 obstack_grow (obstackp, &info, sizeof (struct ada_symbol_info));
4668 }
4669}
4670
4671/* Number of ada_symbol_info structures currently collected in
4672 current vector in *OBSTACKP. */
4673
76a01679
JB
4674static int
4675num_defns_collected (struct obstack *obstackp)
4c4b4cd2
PH
4676{
4677 return obstack_object_size (obstackp) / sizeof (struct ada_symbol_info);
4678}
4679
4680/* Vector of ada_symbol_info structures currently collected in current
4681 vector in *OBSTACKP. If FINISH, close off the vector and return
4682 its final address. */
4683
76a01679 4684static struct ada_symbol_info *
4c4b4cd2
PH
4685defns_collected (struct obstack *obstackp, int finish)
4686{
4687 if (finish)
4688 return obstack_finish (obstackp);
4689 else
4690 return (struct ada_symbol_info *) obstack_base (obstackp);
4691}
4692
7c7b6655
TT
4693/* Return a bound minimal symbol matching NAME according to Ada
4694 decoding rules. Returns an invalid symbol if there is no such
4695 minimal symbol. Names prefixed with "standard__" are handled
4696 specially: "standard__" is first stripped off, and only static and
4697 global symbols are searched. */
4c4b4cd2 4698
7c7b6655 4699struct bound_minimal_symbol
96d887e8 4700ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4701{
7c7b6655 4702 struct bound_minimal_symbol result;
4c4b4cd2 4703 struct objfile *objfile;
96d887e8 4704 struct minimal_symbol *msymbol;
dc4024cd 4705 const int wild_match_p = should_use_wild_match (name);
4c4b4cd2 4706
7c7b6655
TT
4707 memset (&result, 0, sizeof (result));
4708
c0431670
JB
4709 /* Special case: If the user specifies a symbol name inside package
4710 Standard, do a non-wild matching of the symbol name without
4711 the "standard__" prefix. This was primarily introduced in order
4712 to allow the user to specifically access the standard exceptions
4713 using, for instance, Standard.Constraint_Error when Constraint_Error
4714 is ambiguous (due to the user defining its own Constraint_Error
4715 entity inside its program). */
61012eef 4716 if (startswith (name, "standard__"))
c0431670 4717 name += sizeof ("standard__") - 1;
4c4b4cd2 4718
96d887e8
PH
4719 ALL_MSYMBOLS (objfile, msymbol)
4720 {
efd66ac6 4721 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), name, wild_match_p)
96d887e8 4722 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
7c7b6655
TT
4723 {
4724 result.minsym = msymbol;
4725 result.objfile = objfile;
4726 break;
4727 }
96d887e8 4728 }
4c4b4cd2 4729
7c7b6655 4730 return result;
96d887e8 4731}
4c4b4cd2 4732
96d887e8
PH
4733/* For all subprograms that statically enclose the subprogram of the
4734 selected frame, add symbols matching identifier NAME in DOMAIN
4735 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4736 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4737 with a wildcard prefix. */
4c4b4cd2 4738
96d887e8
PH
4739static void
4740add_symbols_from_enclosing_procs (struct obstack *obstackp,
fe978cb0 4741 const char *name, domain_enum domain,
48b78332 4742 int wild_match_p)
96d887e8 4743{
96d887e8 4744}
14f9c5c9 4745
96d887e8
PH
4746/* True if TYPE is definitely an artificial type supplied to a symbol
4747 for which no debugging information was given in the symbol file. */
14f9c5c9 4748
96d887e8
PH
4749static int
4750is_nondebugging_type (struct type *type)
4751{
0d5cff50 4752 const char *name = ada_type_name (type);
5b4ee69b 4753
96d887e8
PH
4754 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4755}
4c4b4cd2 4756
8f17729f
JB
4757/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4758 that are deemed "identical" for practical purposes.
4759
4760 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4761 types and that their number of enumerals is identical (in other
4762 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4763
4764static int
4765ada_identical_enum_types_p (struct type *type1, struct type *type2)
4766{
4767 int i;
4768
4769 /* The heuristic we use here is fairly conservative. We consider
4770 that 2 enumerate types are identical if they have the same
4771 number of enumerals and that all enumerals have the same
4772 underlying value and name. */
4773
4774 /* All enums in the type should have an identical underlying value. */
4775 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4776 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4777 return 0;
4778
4779 /* All enumerals should also have the same name (modulo any numerical
4780 suffix). */
4781 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4782 {
0d5cff50
DE
4783 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4784 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4785 int len_1 = strlen (name_1);
4786 int len_2 = strlen (name_2);
4787
4788 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4789 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4790 if (len_1 != len_2
4791 || strncmp (TYPE_FIELD_NAME (type1, i),
4792 TYPE_FIELD_NAME (type2, i),
4793 len_1) != 0)
4794 return 0;
4795 }
4796
4797 return 1;
4798}
4799
4800/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4801 that are deemed "identical" for practical purposes. Sometimes,
4802 enumerals are not strictly identical, but their types are so similar
4803 that they can be considered identical.
4804
4805 For instance, consider the following code:
4806
4807 type Color is (Black, Red, Green, Blue, White);
4808 type RGB_Color is new Color range Red .. Blue;
4809
4810 Type RGB_Color is a subrange of an implicit type which is a copy
4811 of type Color. If we call that implicit type RGB_ColorB ("B" is
4812 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4813 As a result, when an expression references any of the enumeral
4814 by name (Eg. "print green"), the expression is technically
4815 ambiguous and the user should be asked to disambiguate. But
4816 doing so would only hinder the user, since it wouldn't matter
4817 what choice he makes, the outcome would always be the same.
4818 So, for practical purposes, we consider them as the same. */
4819
4820static int
4821symbols_are_identical_enums (struct ada_symbol_info *syms, int nsyms)
4822{
4823 int i;
4824
4825 /* Before performing a thorough comparison check of each type,
4826 we perform a series of inexpensive checks. We expect that these
4827 checks will quickly fail in the vast majority of cases, and thus
4828 help prevent the unnecessary use of a more expensive comparison.
4829 Said comparison also expects us to make some of these checks
4830 (see ada_identical_enum_types_p). */
4831
4832 /* Quick check: All symbols should have an enum type. */
4833 for (i = 0; i < nsyms; i++)
4834 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM)
4835 return 0;
4836
4837 /* Quick check: They should all have the same value. */
4838 for (i = 1; i < nsyms; i++)
4839 if (SYMBOL_VALUE (syms[i].sym) != SYMBOL_VALUE (syms[0].sym))
4840 return 0;
4841
4842 /* Quick check: They should all have the same number of enumerals. */
4843 for (i = 1; i < nsyms; i++)
4844 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].sym))
4845 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].sym)))
4846 return 0;
4847
4848 /* All the sanity checks passed, so we might have a set of
4849 identical enumeration types. Perform a more complete
4850 comparison of the type of each symbol. */
4851 for (i = 1; i < nsyms; i++)
4852 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].sym),
4853 SYMBOL_TYPE (syms[0].sym)))
4854 return 0;
4855
4856 return 1;
4857}
4858
96d887e8
PH
4859/* Remove any non-debugging symbols in SYMS[0 .. NSYMS-1] that definitely
4860 duplicate other symbols in the list (The only case I know of where
4861 this happens is when object files containing stabs-in-ecoff are
4862 linked with files containing ordinary ecoff debugging symbols (or no
4863 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
4864 Returns the number of items in the modified list. */
4c4b4cd2 4865
96d887e8
PH
4866static int
4867remove_extra_symbols (struct ada_symbol_info *syms, int nsyms)
4868{
4869 int i, j;
4c4b4cd2 4870
8f17729f
JB
4871 /* We should never be called with less than 2 symbols, as there
4872 cannot be any extra symbol in that case. But it's easy to
4873 handle, since we have nothing to do in that case. */
4874 if (nsyms < 2)
4875 return nsyms;
4876
96d887e8
PH
4877 i = 0;
4878 while (i < nsyms)
4879 {
a35ddb44 4880 int remove_p = 0;
339c13b6
JB
4881
4882 /* If two symbols have the same name and one of them is a stub type,
4883 the get rid of the stub. */
4884
4885 if (TYPE_STUB (SYMBOL_TYPE (syms[i].sym))
4886 && SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL)
4887 {
4888 for (j = 0; j < nsyms; j++)
4889 {
4890 if (j != i
4891 && !TYPE_STUB (SYMBOL_TYPE (syms[j].sym))
4892 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4893 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
4894 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0)
a35ddb44 4895 remove_p = 1;
339c13b6
JB
4896 }
4897 }
4898
4899 /* Two symbols with the same name, same class and same address
4900 should be identical. */
4901
4902 else if (SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL
96d887e8
PH
4903 && SYMBOL_CLASS (syms[i].sym) == LOC_STATIC
4904 && is_nondebugging_type (SYMBOL_TYPE (syms[i].sym)))
4905 {
4906 for (j = 0; j < nsyms; j += 1)
4907 {
4908 if (i != j
4909 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4910 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
76a01679 4911 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0
96d887e8
PH
4912 && SYMBOL_CLASS (syms[i].sym) == SYMBOL_CLASS (syms[j].sym)
4913 && SYMBOL_VALUE_ADDRESS (syms[i].sym)
4914 == SYMBOL_VALUE_ADDRESS (syms[j].sym))
a35ddb44 4915 remove_p = 1;
4c4b4cd2 4916 }
4c4b4cd2 4917 }
339c13b6 4918
a35ddb44 4919 if (remove_p)
339c13b6
JB
4920 {
4921 for (j = i + 1; j < nsyms; j += 1)
4922 syms[j - 1] = syms[j];
4923 nsyms -= 1;
4924 }
4925
96d887e8 4926 i += 1;
14f9c5c9 4927 }
8f17729f
JB
4928
4929 /* If all the remaining symbols are identical enumerals, then
4930 just keep the first one and discard the rest.
4931
4932 Unlike what we did previously, we do not discard any entry
4933 unless they are ALL identical. This is because the symbol
4934 comparison is not a strict comparison, but rather a practical
4935 comparison. If all symbols are considered identical, then
4936 we can just go ahead and use the first one and discard the rest.
4937 But if we cannot reduce the list to a single element, we have
4938 to ask the user to disambiguate anyways. And if we have to
4939 present a multiple-choice menu, it's less confusing if the list
4940 isn't missing some choices that were identical and yet distinct. */
4941 if (symbols_are_identical_enums (syms, nsyms))
4942 nsyms = 1;
4943
96d887e8 4944 return nsyms;
14f9c5c9
AS
4945}
4946
96d887e8
PH
4947/* Given a type that corresponds to a renaming entity, use the type name
4948 to extract the scope (package name or function name, fully qualified,
4949 and following the GNAT encoding convention) where this renaming has been
4950 defined. The string returned needs to be deallocated after use. */
4c4b4cd2 4951
96d887e8
PH
4952static char *
4953xget_renaming_scope (struct type *renaming_type)
14f9c5c9 4954{
96d887e8 4955 /* The renaming types adhere to the following convention:
0963b4bd 4956 <scope>__<rename>___<XR extension>.
96d887e8
PH
4957 So, to extract the scope, we search for the "___XR" extension,
4958 and then backtrack until we find the first "__". */
76a01679 4959
96d887e8
PH
4960 const char *name = type_name_no_tag (renaming_type);
4961 char *suffix = strstr (name, "___XR");
4962 char *last;
4963 int scope_len;
4964 char *scope;
14f9c5c9 4965
96d887e8
PH
4966 /* Now, backtrack a bit until we find the first "__". Start looking
4967 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 4968
96d887e8
PH
4969 for (last = suffix - 3; last > name; last--)
4970 if (last[0] == '_' && last[1] == '_')
4971 break;
76a01679 4972
96d887e8 4973 /* Make a copy of scope and return it. */
14f9c5c9 4974
96d887e8
PH
4975 scope_len = last - name;
4976 scope = (char *) xmalloc ((scope_len + 1) * sizeof (char));
14f9c5c9 4977
96d887e8
PH
4978 strncpy (scope, name, scope_len);
4979 scope[scope_len] = '\0';
4c4b4cd2 4980
96d887e8 4981 return scope;
4c4b4cd2
PH
4982}
4983
96d887e8 4984/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 4985
96d887e8
PH
4986static int
4987is_package_name (const char *name)
4c4b4cd2 4988{
96d887e8
PH
4989 /* Here, We take advantage of the fact that no symbols are generated
4990 for packages, while symbols are generated for each function.
4991 So the condition for NAME represent a package becomes equivalent
4992 to NAME not existing in our list of symbols. There is only one
4993 small complication with library-level functions (see below). */
4c4b4cd2 4994
96d887e8 4995 char *fun_name;
76a01679 4996
96d887e8
PH
4997 /* If it is a function that has not been defined at library level,
4998 then we should be able to look it up in the symbols. */
4999 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5000 return 0;
14f9c5c9 5001
96d887e8
PH
5002 /* Library-level function names start with "_ada_". See if function
5003 "_ada_" followed by NAME can be found. */
14f9c5c9 5004
96d887e8 5005 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5006 functions names cannot contain "__" in them. */
96d887e8
PH
5007 if (strstr (name, "__") != NULL)
5008 return 0;
4c4b4cd2 5009
b435e160 5010 fun_name = xstrprintf ("_ada_%s", name);
14f9c5c9 5011
96d887e8
PH
5012 return (standard_lookup (fun_name, NULL, VAR_DOMAIN) == NULL);
5013}
14f9c5c9 5014
96d887e8 5015/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5016 not visible from FUNCTION_NAME. */
14f9c5c9 5017
96d887e8 5018static int
0d5cff50 5019old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5020{
aeb5907d 5021 char *scope;
1509e573 5022 struct cleanup *old_chain;
aeb5907d
JB
5023
5024 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5025 return 0;
5026
5027 scope = xget_renaming_scope (SYMBOL_TYPE (sym));
1509e573 5028 old_chain = make_cleanup (xfree, scope);
14f9c5c9 5029
96d887e8
PH
5030 /* If the rename has been defined in a package, then it is visible. */
5031 if (is_package_name (scope))
1509e573
JB
5032 {
5033 do_cleanups (old_chain);
5034 return 0;
5035 }
14f9c5c9 5036
96d887e8
PH
5037 /* Check that the rename is in the current function scope by checking
5038 that its name starts with SCOPE. */
76a01679 5039
96d887e8
PH
5040 /* If the function name starts with "_ada_", it means that it is
5041 a library-level function. Strip this prefix before doing the
5042 comparison, as the encoding for the renaming does not contain
5043 this prefix. */
61012eef 5044 if (startswith (function_name, "_ada_"))
96d887e8 5045 function_name += 5;
f26caa11 5046
1509e573 5047 {
61012eef 5048 int is_invisible = !startswith (function_name, scope);
1509e573
JB
5049
5050 do_cleanups (old_chain);
5051 return is_invisible;
5052 }
f26caa11
PH
5053}
5054
aeb5907d
JB
5055/* Remove entries from SYMS that corresponds to a renaming entity that
5056 is not visible from the function associated with CURRENT_BLOCK or
5057 that is superfluous due to the presence of more specific renaming
5058 information. Places surviving symbols in the initial entries of
5059 SYMS and returns the number of surviving symbols.
96d887e8
PH
5060
5061 Rationale:
aeb5907d
JB
5062 First, in cases where an object renaming is implemented as a
5063 reference variable, GNAT may produce both the actual reference
5064 variable and the renaming encoding. In this case, we discard the
5065 latter.
5066
5067 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5068 entity. Unfortunately, STABS currently does not support the definition
5069 of types that are local to a given lexical block, so all renamings types
5070 are emitted at library level. As a consequence, if an application
5071 contains two renaming entities using the same name, and a user tries to
5072 print the value of one of these entities, the result of the ada symbol
5073 lookup will also contain the wrong renaming type.
f26caa11 5074
96d887e8
PH
5075 This function partially covers for this limitation by attempting to
5076 remove from the SYMS list renaming symbols that should be visible
5077 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5078 method with the current information available. The implementation
5079 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5080
5081 - When the user tries to print a rename in a function while there
5082 is another rename entity defined in a package: Normally, the
5083 rename in the function has precedence over the rename in the
5084 package, so the latter should be removed from the list. This is
5085 currently not the case.
5086
5087 - This function will incorrectly remove valid renames if
5088 the CURRENT_BLOCK corresponds to a function which symbol name
5089 has been changed by an "Export" pragma. As a consequence,
5090 the user will be unable to print such rename entities. */
4c4b4cd2 5091
14f9c5c9 5092static int
aeb5907d
JB
5093remove_irrelevant_renamings (struct ada_symbol_info *syms,
5094 int nsyms, const struct block *current_block)
4c4b4cd2
PH
5095{
5096 struct symbol *current_function;
0d5cff50 5097 const char *current_function_name;
4c4b4cd2 5098 int i;
aeb5907d
JB
5099 int is_new_style_renaming;
5100
5101 /* If there is both a renaming foo___XR... encoded as a variable and
5102 a simple variable foo in the same block, discard the latter.
0963b4bd 5103 First, zero out such symbols, then compress. */
aeb5907d
JB
5104 is_new_style_renaming = 0;
5105 for (i = 0; i < nsyms; i += 1)
5106 {
5107 struct symbol *sym = syms[i].sym;
270140bd 5108 const struct block *block = syms[i].block;
aeb5907d
JB
5109 const char *name;
5110 const char *suffix;
5111
5112 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5113 continue;
5114 name = SYMBOL_LINKAGE_NAME (sym);
5115 suffix = strstr (name, "___XR");
5116
5117 if (suffix != NULL)
5118 {
5119 int name_len = suffix - name;
5120 int j;
5b4ee69b 5121
aeb5907d
JB
5122 is_new_style_renaming = 1;
5123 for (j = 0; j < nsyms; j += 1)
5124 if (i != j && syms[j].sym != NULL
5125 && strncmp (name, SYMBOL_LINKAGE_NAME (syms[j].sym),
5126 name_len) == 0
5127 && block == syms[j].block)
5128 syms[j].sym = NULL;
5129 }
5130 }
5131 if (is_new_style_renaming)
5132 {
5133 int j, k;
5134
5135 for (j = k = 0; j < nsyms; j += 1)
5136 if (syms[j].sym != NULL)
5137 {
5138 syms[k] = syms[j];
5139 k += 1;
5140 }
5141 return k;
5142 }
4c4b4cd2
PH
5143
5144 /* Extract the function name associated to CURRENT_BLOCK.
5145 Abort if unable to do so. */
76a01679 5146
4c4b4cd2
PH
5147 if (current_block == NULL)
5148 return nsyms;
76a01679 5149
7f0df278 5150 current_function = block_linkage_function (current_block);
4c4b4cd2
PH
5151 if (current_function == NULL)
5152 return nsyms;
5153
5154 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5155 if (current_function_name == NULL)
5156 return nsyms;
5157
5158 /* Check each of the symbols, and remove it from the list if it is
5159 a type corresponding to a renaming that is out of the scope of
5160 the current block. */
5161
5162 i = 0;
5163 while (i < nsyms)
5164 {
aeb5907d
JB
5165 if (ada_parse_renaming (syms[i].sym, NULL, NULL, NULL)
5166 == ADA_OBJECT_RENAMING
5167 && old_renaming_is_invisible (syms[i].sym, current_function_name))
4c4b4cd2
PH
5168 {
5169 int j;
5b4ee69b 5170
aeb5907d 5171 for (j = i + 1; j < nsyms; j += 1)
76a01679 5172 syms[j - 1] = syms[j];
4c4b4cd2
PH
5173 nsyms -= 1;
5174 }
5175 else
5176 i += 1;
5177 }
5178
5179 return nsyms;
5180}
5181
339c13b6
JB
5182/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5183 whose name and domain match NAME and DOMAIN respectively.
5184 If no match was found, then extend the search to "enclosing"
5185 routines (in other words, if we're inside a nested function,
5186 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5187 If WILD_MATCH_P is nonzero, perform the naming matching in
5188 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5189
5190 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5191
5192static void
5193ada_add_local_symbols (struct obstack *obstackp, const char *name,
f0c5f9b2 5194 const struct block *block, domain_enum domain,
d0a8ab18 5195 int wild_match_p)
339c13b6
JB
5196{
5197 int block_depth = 0;
5198
5199 while (block != NULL)
5200 {
5201 block_depth += 1;
d0a8ab18
JB
5202 ada_add_block_symbols (obstackp, block, name, domain, NULL,
5203 wild_match_p);
339c13b6
JB
5204
5205 /* If we found a non-function match, assume that's the one. */
5206 if (is_nonfunction (defns_collected (obstackp, 0),
5207 num_defns_collected (obstackp)))
5208 return;
5209
5210 block = BLOCK_SUPERBLOCK (block);
5211 }
5212
5213 /* If no luck so far, try to find NAME as a local symbol in some lexically
5214 enclosing subprogram. */
5215 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
d0a8ab18 5216 add_symbols_from_enclosing_procs (obstackp, name, domain, wild_match_p);
339c13b6
JB
5217}
5218
ccefe4c4 5219/* An object of this type is used as the user_data argument when
40658b94 5220 calling the map_matching_symbols method. */
ccefe4c4 5221
40658b94 5222struct match_data
ccefe4c4 5223{
40658b94 5224 struct objfile *objfile;
ccefe4c4 5225 struct obstack *obstackp;
40658b94
PH
5226 struct symbol *arg_sym;
5227 int found_sym;
ccefe4c4
TT
5228};
5229
40658b94
PH
5230/* A callback for add_matching_symbols that adds SYM, found in BLOCK,
5231 to a list of symbols. DATA0 is a pointer to a struct match_data *
5232 containing the obstack that collects the symbol list, the file that SYM
5233 must come from, a flag indicating whether a non-argument symbol has
5234 been found in the current block, and the last argument symbol
5235 passed in SYM within the current block (if any). When SYM is null,
5236 marking the end of a block, the argument symbol is added if no
5237 other has been found. */
ccefe4c4 5238
40658b94
PH
5239static int
5240aux_add_nonlocal_symbols (struct block *block, struct symbol *sym, void *data0)
ccefe4c4 5241{
40658b94
PH
5242 struct match_data *data = (struct match_data *) data0;
5243
5244 if (sym == NULL)
5245 {
5246 if (!data->found_sym && data->arg_sym != NULL)
5247 add_defn_to_vec (data->obstackp,
5248 fixup_symbol_section (data->arg_sym, data->objfile),
5249 block);
5250 data->found_sym = 0;
5251 data->arg_sym = NULL;
5252 }
5253 else
5254 {
5255 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5256 return 0;
5257 else if (SYMBOL_IS_ARGUMENT (sym))
5258 data->arg_sym = sym;
5259 else
5260 {
5261 data->found_sym = 1;
5262 add_defn_to_vec (data->obstackp,
5263 fixup_symbol_section (sym, data->objfile),
5264 block);
5265 }
5266 }
5267 return 0;
5268}
5269
db230ce3
JB
5270/* Implements compare_names, but only applying the comparision using
5271 the given CASING. */
5b4ee69b 5272
40658b94 5273static int
db230ce3
JB
5274compare_names_with_case (const char *string1, const char *string2,
5275 enum case_sensitivity casing)
40658b94
PH
5276{
5277 while (*string1 != '\0' && *string2 != '\0')
5278 {
db230ce3
JB
5279 char c1, c2;
5280
40658b94
PH
5281 if (isspace (*string1) || isspace (*string2))
5282 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5283
5284 if (casing == case_sensitive_off)
5285 {
5286 c1 = tolower (*string1);
5287 c2 = tolower (*string2);
5288 }
5289 else
5290 {
5291 c1 = *string1;
5292 c2 = *string2;
5293 }
5294 if (c1 != c2)
40658b94 5295 break;
db230ce3 5296
40658b94
PH
5297 string1 += 1;
5298 string2 += 1;
5299 }
db230ce3 5300
40658b94
PH
5301 switch (*string1)
5302 {
5303 case '(':
5304 return strcmp_iw_ordered (string1, string2);
5305 case '_':
5306 if (*string2 == '\0')
5307 {
052874e8 5308 if (is_name_suffix (string1))
40658b94
PH
5309 return 0;
5310 else
1a1d5513 5311 return 1;
40658b94 5312 }
dbb8534f 5313 /* FALLTHROUGH */
40658b94
PH
5314 default:
5315 if (*string2 == '(')
5316 return strcmp_iw_ordered (string1, string2);
5317 else
db230ce3
JB
5318 {
5319 if (casing == case_sensitive_off)
5320 return tolower (*string1) - tolower (*string2);
5321 else
5322 return *string1 - *string2;
5323 }
40658b94 5324 }
ccefe4c4
TT
5325}
5326
db230ce3
JB
5327/* Compare STRING1 to STRING2, with results as for strcmp.
5328 Compatible with strcmp_iw_ordered in that...
5329
5330 strcmp_iw_ordered (STRING1, STRING2) <= 0
5331
5332 ... implies...
5333
5334 compare_names (STRING1, STRING2) <= 0
5335
5336 (they may differ as to what symbols compare equal). */
5337
5338static int
5339compare_names (const char *string1, const char *string2)
5340{
5341 int result;
5342
5343 /* Similar to what strcmp_iw_ordered does, we need to perform
5344 a case-insensitive comparison first, and only resort to
5345 a second, case-sensitive, comparison if the first one was
5346 not sufficient to differentiate the two strings. */
5347
5348 result = compare_names_with_case (string1, string2, case_sensitive_off);
5349 if (result == 0)
5350 result = compare_names_with_case (string1, string2, case_sensitive_on);
5351
5352 return result;
5353}
5354
339c13b6
JB
5355/* Add to OBSTACKP all non-local symbols whose name and domain match
5356 NAME and DOMAIN respectively. The search is performed on GLOBAL_BLOCK
5357 symbols if GLOBAL is non-zero, or on STATIC_BLOCK symbols otherwise. */
5358
5359static void
40658b94
PH
5360add_nonlocal_symbols (struct obstack *obstackp, const char *name,
5361 domain_enum domain, int global,
5362 int is_wild_match)
339c13b6
JB
5363{
5364 struct objfile *objfile;
40658b94 5365 struct match_data data;
339c13b6 5366
6475f2fe 5367 memset (&data, 0, sizeof data);
ccefe4c4 5368 data.obstackp = obstackp;
339c13b6 5369
ccefe4c4 5370 ALL_OBJFILES (objfile)
40658b94
PH
5371 {
5372 data.objfile = objfile;
5373
5374 if (is_wild_match)
4186eb54
KS
5375 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5376 aux_add_nonlocal_symbols, &data,
5377 wild_match, NULL);
40658b94 5378 else
4186eb54
KS
5379 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5380 aux_add_nonlocal_symbols, &data,
5381 full_match, compare_names);
40658b94
PH
5382 }
5383
5384 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5385 {
5386 ALL_OBJFILES (objfile)
5387 {
5388 char *name1 = alloca (strlen (name) + sizeof ("_ada_"));
5389 strcpy (name1, "_ada_");
5390 strcpy (name1 + sizeof ("_ada_") - 1, name);
5391 data.objfile = objfile;
ade7ed9e
DE
5392 objfile->sf->qf->map_matching_symbols (objfile, name1, domain,
5393 global,
0963b4bd
MS
5394 aux_add_nonlocal_symbols,
5395 &data,
40658b94
PH
5396 full_match, compare_names);
5397 }
5398 }
339c13b6
JB
5399}
5400
4eeaa230
DE
5401/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and, if full_search is
5402 non-zero, enclosing scope and in global scopes, returning the number of
5403 matches.
9f88c959 5404 Sets *RESULTS to point to a vector of (SYM,BLOCK) tuples,
4c4b4cd2 5405 indicating the symbols found and the blocks and symbol tables (if
4eeaa230
DE
5406 any) in which they were found. This vector is transient---good only to
5407 the next call of ada_lookup_symbol_list.
5408
5409 When full_search is non-zero, any non-function/non-enumeral
4c4b4cd2
PH
5410 symbol match within the nest of blocks whose innermost member is BLOCK0,
5411 is the one match returned (no other matches in that or
d9680e73 5412 enclosing blocks is returned). If there are any matches in or
4eeaa230
DE
5413 surrounding BLOCK0, then these alone are returned.
5414
9f88c959 5415 Names prefixed with "standard__" are handled specially: "standard__"
4c4b4cd2 5416 is first stripped off, and only static and global symbols are searched. */
14f9c5c9 5417
4eeaa230
DE
5418static int
5419ada_lookup_symbol_list_worker (const char *name0, const struct block *block0,
fe978cb0 5420 domain_enum domain,
4eeaa230
DE
5421 struct ada_symbol_info **results,
5422 int full_search)
14f9c5c9
AS
5423{
5424 struct symbol *sym;
f0c5f9b2 5425 const struct block *block;
4c4b4cd2 5426 const char *name;
82ccd55e 5427 const int wild_match_p = should_use_wild_match (name0);
b1eedac9 5428 int syms_from_global_search = 0;
4c4b4cd2 5429 int ndefns;
14f9c5c9 5430
4c4b4cd2
PH
5431 obstack_free (&symbol_list_obstack, NULL);
5432 obstack_init (&symbol_list_obstack);
14f9c5c9 5433
14f9c5c9
AS
5434 /* Search specified block and its superiors. */
5435
4c4b4cd2 5436 name = name0;
f0c5f9b2 5437 block = block0;
339c13b6
JB
5438
5439 /* Special case: If the user specifies a symbol name inside package
5440 Standard, do a non-wild matching of the symbol name without
5441 the "standard__" prefix. This was primarily introduced in order
5442 to allow the user to specifically access the standard exceptions
5443 using, for instance, Standard.Constraint_Error when Constraint_Error
5444 is ambiguous (due to the user defining its own Constraint_Error
5445 entity inside its program). */
61012eef 5446 if (startswith (name0, "standard__"))
4c4b4cd2 5447 {
4c4b4cd2
PH
5448 block = NULL;
5449 name = name0 + sizeof ("standard__") - 1;
5450 }
5451
339c13b6 5452 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5453
4eeaa230
DE
5454 if (block != NULL)
5455 {
5456 if (full_search)
5457 {
5458 ada_add_local_symbols (&symbol_list_obstack, name, block,
fe978cb0 5459 domain, wild_match_p);
4eeaa230
DE
5460 }
5461 else
5462 {
5463 /* In the !full_search case we're are being called by
5464 ada_iterate_over_symbols, and we don't want to search
5465 superblocks. */
5466 ada_add_block_symbols (&symbol_list_obstack, block, name,
fe978cb0 5467 domain, NULL, wild_match_p);
4eeaa230
DE
5468 }
5469 if (num_defns_collected (&symbol_list_obstack) > 0 || !full_search)
5470 goto done;
5471 }
d2e4a39e 5472
339c13b6
JB
5473 /* No non-global symbols found. Check our cache to see if we have
5474 already performed this search before. If we have, then return
5475 the same result. */
5476
fe978cb0 5477 if (lookup_cached_symbol (name0, domain, &sym, &block))
4c4b4cd2
PH
5478 {
5479 if (sym != NULL)
2570f2b7 5480 add_defn_to_vec (&symbol_list_obstack, sym, block);
4c4b4cd2
PH
5481 goto done;
5482 }
14f9c5c9 5483
b1eedac9
JB
5484 syms_from_global_search = 1;
5485
339c13b6
JB
5486 /* Search symbols from all global blocks. */
5487
fe978cb0 5488 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 1,
82ccd55e 5489 wild_match_p);
d2e4a39e 5490
4c4b4cd2 5491 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5492 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5493
4c4b4cd2 5494 if (num_defns_collected (&symbol_list_obstack) == 0)
fe978cb0 5495 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 0,
82ccd55e 5496 wild_match_p);
14f9c5c9 5497
4c4b4cd2
PH
5498done:
5499 ndefns = num_defns_collected (&symbol_list_obstack);
5500 *results = defns_collected (&symbol_list_obstack, 1);
5501
5502 ndefns = remove_extra_symbols (*results, ndefns);
5503
b1eedac9 5504 if (ndefns == 0 && full_search && syms_from_global_search)
fe978cb0 5505 cache_symbol (name0, domain, NULL, NULL);
14f9c5c9 5506
b1eedac9 5507 if (ndefns == 1 && full_search && syms_from_global_search)
fe978cb0 5508 cache_symbol (name0, domain, (*results)[0].sym, (*results)[0].block);
14f9c5c9 5509
aeb5907d 5510 ndefns = remove_irrelevant_renamings (*results, ndefns, block0);
14f9c5c9 5511
14f9c5c9
AS
5512 return ndefns;
5513}
5514
4eeaa230
DE
5515/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and enclosing scope and
5516 in global scopes, returning the number of matches, and setting *RESULTS
5517 to a vector of (SYM,BLOCK) tuples.
5518 See ada_lookup_symbol_list_worker for further details. */
5519
5520int
5521ada_lookup_symbol_list (const char *name0, const struct block *block0,
5522 domain_enum domain, struct ada_symbol_info **results)
5523{
5524 return ada_lookup_symbol_list_worker (name0, block0, domain, results, 1);
5525}
5526
5527/* Implementation of the la_iterate_over_symbols method. */
5528
5529static void
5530ada_iterate_over_symbols (const struct block *block,
5531 const char *name, domain_enum domain,
5532 symbol_found_callback_ftype *callback,
5533 void *data)
5534{
5535 int ndefs, i;
5536 struct ada_symbol_info *results;
5537
5538 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
5539 for (i = 0; i < ndefs; ++i)
5540 {
5541 if (! (*callback) (results[i].sym, data))
5542 break;
5543 }
5544}
5545
f8eba3c6
TT
5546/* If NAME is the name of an entity, return a string that should
5547 be used to look that entity up in Ada units. This string should
5548 be deallocated after use using xfree.
5549
5550 NAME can have any form that the "break" or "print" commands might
5551 recognize. In other words, it does not have to be the "natural"
5552 name, or the "encoded" name. */
5553
5554char *
5555ada_name_for_lookup (const char *name)
5556{
5557 char *canon;
5558 int nlen = strlen (name);
5559
5560 if (name[0] == '<' && name[nlen - 1] == '>')
5561 {
5562 canon = xmalloc (nlen - 1);
5563 memcpy (canon, name + 1, nlen - 2);
5564 canon[nlen - 2] = '\0';
5565 }
5566 else
5567 canon = xstrdup (ada_encode (ada_fold_name (name)));
5568 return canon;
5569}
5570
4e5c77fe
JB
5571/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5572 to 1, but choosing the first symbol found if there are multiple
5573 choices.
5574
5e2336be
JB
5575 The result is stored in *INFO, which must be non-NULL.
5576 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5577
5578void
5579ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5580 domain_enum domain,
5e2336be 5581 struct ada_symbol_info *info)
14f9c5c9 5582{
4c4b4cd2 5583 struct ada_symbol_info *candidates;
14f9c5c9
AS
5584 int n_candidates;
5585
5e2336be
JB
5586 gdb_assert (info != NULL);
5587 memset (info, 0, sizeof (struct ada_symbol_info));
4e5c77fe 5588
fe978cb0 5589 n_candidates = ada_lookup_symbol_list (name, block, domain, &candidates);
14f9c5c9 5590 if (n_candidates == 0)
4e5c77fe 5591 return;
4c4b4cd2 5592
5e2336be
JB
5593 *info = candidates[0];
5594 info->sym = fixup_symbol_section (info->sym, NULL);
4e5c77fe 5595}
aeb5907d
JB
5596
5597/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5598 scope and in global scopes, or NULL if none. NAME is folded and
5599 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
0963b4bd 5600 choosing the first symbol if there are multiple choices.
4e5c77fe
JB
5601 If IS_A_FIELD_OF_THIS is not NULL, it is set to zero. */
5602
aeb5907d
JB
5603struct symbol *
5604ada_lookup_symbol (const char *name, const struct block *block0,
fe978cb0 5605 domain_enum domain, int *is_a_field_of_this)
aeb5907d 5606{
5e2336be 5607 struct ada_symbol_info info;
4e5c77fe 5608
aeb5907d
JB
5609 if (is_a_field_of_this != NULL)
5610 *is_a_field_of_this = 0;
5611
4e5c77fe 5612 ada_lookup_encoded_symbol (ada_encode (ada_fold_name (name)),
fe978cb0 5613 block0, domain, &info);
5e2336be 5614 return info.sym;
4c4b4cd2 5615}
14f9c5c9 5616
4c4b4cd2 5617static struct symbol *
f606139a
DE
5618ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5619 const char *name,
76a01679 5620 const struct block *block,
21b556f4 5621 const domain_enum domain)
4c4b4cd2 5622{
04dccad0
JB
5623 struct symbol *sym;
5624
5625 sym = ada_lookup_symbol (name, block_static_block (block), domain, NULL);
5626 if (sym != NULL)
5627 return sym;
5628
5629 /* If we haven't found a match at this point, try the primitive
5630 types. In other languages, this search is performed before
5631 searching for global symbols in order to short-circuit that
5632 global-symbol search if it happens that the name corresponds
5633 to a primitive type. But we cannot do the same in Ada, because
5634 it is perfectly legitimate for a program to declare a type which
5635 has the same name as a standard type. If looking up a type in
5636 that situation, we have traditionally ignored the primitive type
5637 in favor of user-defined types. This is why, unlike most other
5638 languages, we search the primitive types this late and only after
5639 having searched the global symbols without success. */
5640
5641 if (domain == VAR_DOMAIN)
5642 {
5643 struct gdbarch *gdbarch;
5644
5645 if (block == NULL)
5646 gdbarch = target_gdbarch ();
5647 else
5648 gdbarch = block_gdbarch (block);
5649 sym = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5650 if (sym != NULL)
5651 return sym;
5652 }
5653
5654 return NULL;
14f9c5c9
AS
5655}
5656
5657
4c4b4cd2
PH
5658/* True iff STR is a possible encoded suffix of a normal Ada name
5659 that is to be ignored for matching purposes. Suffixes of parallel
5660 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5661 are given by any of the regular expressions:
4c4b4cd2 5662
babe1480
JB
5663 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5664 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5665 TKB [subprogram suffix for task bodies]
babe1480 5666 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5667 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5668
5669 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5670 match is performed. This sequence is used to differentiate homonyms,
5671 is an optional part of a valid name suffix. */
4c4b4cd2 5672
14f9c5c9 5673static int
d2e4a39e 5674is_name_suffix (const char *str)
14f9c5c9
AS
5675{
5676 int k;
4c4b4cd2
PH
5677 const char *matching;
5678 const int len = strlen (str);
5679
babe1480
JB
5680 /* Skip optional leading __[0-9]+. */
5681
4c4b4cd2
PH
5682 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5683 {
babe1480
JB
5684 str += 3;
5685 while (isdigit (str[0]))
5686 str += 1;
4c4b4cd2 5687 }
babe1480
JB
5688
5689 /* [.$][0-9]+ */
4c4b4cd2 5690
babe1480 5691 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5692 {
babe1480 5693 matching = str + 1;
4c4b4cd2
PH
5694 while (isdigit (matching[0]))
5695 matching += 1;
5696 if (matching[0] == '\0')
5697 return 1;
5698 }
5699
5700 /* ___[0-9]+ */
babe1480 5701
4c4b4cd2
PH
5702 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5703 {
5704 matching = str + 3;
5705 while (isdigit (matching[0]))
5706 matching += 1;
5707 if (matching[0] == '\0')
5708 return 1;
5709 }
5710
9ac7f98e
JB
5711 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5712
5713 if (strcmp (str, "TKB") == 0)
5714 return 1;
5715
529cad9c
PH
5716#if 0
5717 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5718 with a N at the end. Unfortunately, the compiler uses the same
5719 convention for other internal types it creates. So treating
529cad9c 5720 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5721 some regressions. For instance, consider the case of an enumerated
5722 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5723 name ends with N.
5724 Having a single character like this as a suffix carrying some
0963b4bd 5725 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5726 to be something like "_N" instead. In the meantime, do not do
5727 the following check. */
5728 /* Protected Object Subprograms */
5729 if (len == 1 && str [0] == 'N')
5730 return 1;
5731#endif
5732
5733 /* _E[0-9]+[bs]$ */
5734 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5735 {
5736 matching = str + 3;
5737 while (isdigit (matching[0]))
5738 matching += 1;
5739 if ((matching[0] == 'b' || matching[0] == 's')
5740 && matching [1] == '\0')
5741 return 1;
5742 }
5743
4c4b4cd2
PH
5744 /* ??? We should not modify STR directly, as we are doing below. This
5745 is fine in this case, but may become problematic later if we find
5746 that this alternative did not work, and want to try matching
5747 another one from the begining of STR. Since we modified it, we
5748 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5749 if (str[0] == 'X')
5750 {
5751 str += 1;
d2e4a39e 5752 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5753 {
5754 if (str[0] != 'n' && str[0] != 'b')
5755 return 0;
5756 str += 1;
5757 }
14f9c5c9 5758 }
babe1480 5759
14f9c5c9
AS
5760 if (str[0] == '\000')
5761 return 1;
babe1480 5762
d2e4a39e 5763 if (str[0] == '_')
14f9c5c9
AS
5764 {
5765 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5766 return 0;
d2e4a39e 5767 if (str[2] == '_')
4c4b4cd2 5768 {
61ee279c
PH
5769 if (strcmp (str + 3, "JM") == 0)
5770 return 1;
5771 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5772 the LJM suffix in favor of the JM one. But we will
5773 still accept LJM as a valid suffix for a reasonable
5774 amount of time, just to allow ourselves to debug programs
5775 compiled using an older version of GNAT. */
4c4b4cd2
PH
5776 if (strcmp (str + 3, "LJM") == 0)
5777 return 1;
5778 if (str[3] != 'X')
5779 return 0;
1265e4aa
JB
5780 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5781 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5782 return 1;
5783 if (str[4] == 'R' && str[5] != 'T')
5784 return 1;
5785 return 0;
5786 }
5787 if (!isdigit (str[2]))
5788 return 0;
5789 for (k = 3; str[k] != '\0'; k += 1)
5790 if (!isdigit (str[k]) && str[k] != '_')
5791 return 0;
14f9c5c9
AS
5792 return 1;
5793 }
4c4b4cd2 5794 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5795 {
4c4b4cd2
PH
5796 for (k = 2; str[k] != '\0'; k += 1)
5797 if (!isdigit (str[k]) && str[k] != '_')
5798 return 0;
14f9c5c9
AS
5799 return 1;
5800 }
5801 return 0;
5802}
d2e4a39e 5803
aeb5907d
JB
5804/* Return non-zero if the string starting at NAME and ending before
5805 NAME_END contains no capital letters. */
529cad9c
PH
5806
5807static int
5808is_valid_name_for_wild_match (const char *name0)
5809{
5810 const char *decoded_name = ada_decode (name0);
5811 int i;
5812
5823c3ef
JB
5813 /* If the decoded name starts with an angle bracket, it means that
5814 NAME0 does not follow the GNAT encoding format. It should then
5815 not be allowed as a possible wild match. */
5816 if (decoded_name[0] == '<')
5817 return 0;
5818
529cad9c
PH
5819 for (i=0; decoded_name[i] != '\0'; i++)
5820 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5821 return 0;
5822
5823 return 1;
5824}
5825
73589123
PH
5826/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
5827 that could start a simple name. Assumes that *NAMEP points into
5828 the string beginning at NAME0. */
4c4b4cd2 5829
14f9c5c9 5830static int
73589123 5831advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 5832{
73589123 5833 const char *name = *namep;
5b4ee69b 5834
5823c3ef 5835 while (1)
14f9c5c9 5836 {
aa27d0b3 5837 int t0, t1;
73589123
PH
5838
5839 t0 = *name;
5840 if (t0 == '_')
5841 {
5842 t1 = name[1];
5843 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
5844 {
5845 name += 1;
61012eef 5846 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
5847 break;
5848 else
5849 name += 1;
5850 }
aa27d0b3
JB
5851 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
5852 || name[2] == target0))
73589123
PH
5853 {
5854 name += 2;
5855 break;
5856 }
5857 else
5858 return 0;
5859 }
5860 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
5861 name += 1;
5862 else
5823c3ef 5863 return 0;
73589123
PH
5864 }
5865
5866 *namep = name;
5867 return 1;
5868}
5869
5870/* Return 0 iff NAME encodes a name of the form prefix.PATN. Ignores any
5871 informational suffixes of NAME (i.e., for which is_name_suffix is
5872 true). Assumes that PATN is a lower-cased Ada simple name. */
5873
5874static int
5875wild_match (const char *name, const char *patn)
5876{
22e048c9 5877 const char *p;
73589123
PH
5878 const char *name0 = name;
5879
5880 while (1)
5881 {
5882 const char *match = name;
5883
5884 if (*name == *patn)
5885 {
5886 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
5887 if (*p != *name)
5888 break;
5889 if (*p == '\0' && is_name_suffix (name))
5890 return match != name0 && !is_valid_name_for_wild_match (name0);
5891
5892 if (name[-1] == '_')
5893 name -= 1;
5894 }
5895 if (!advance_wild_match (&name, name0, *patn))
5896 return 1;
96d887e8 5897 }
96d887e8
PH
5898}
5899
40658b94
PH
5900/* Returns 0 iff symbol name SYM_NAME matches SEARCH_NAME, apart from
5901 informational suffix. */
5902
c4d840bd
PH
5903static int
5904full_match (const char *sym_name, const char *search_name)
5905{
40658b94 5906 return !match_name (sym_name, search_name, 0);
c4d840bd
PH
5907}
5908
5909
96d887e8
PH
5910/* Add symbols from BLOCK matching identifier NAME in DOMAIN to
5911 vector *defn_symbols, updating the list of symbols in OBSTACKP
0963b4bd 5912 (if necessary). If WILD, treat as NAME with a wildcard prefix.
4eeaa230 5913 OBJFILE is the section containing BLOCK. */
96d887e8
PH
5914
5915static void
5916ada_add_block_symbols (struct obstack *obstackp,
f0c5f9b2 5917 const struct block *block, const char *name,
96d887e8 5918 domain_enum domain, struct objfile *objfile,
2570f2b7 5919 int wild)
96d887e8 5920{
8157b174 5921 struct block_iterator iter;
96d887e8
PH
5922 int name_len = strlen (name);
5923 /* A matching argument symbol, if any. */
5924 struct symbol *arg_sym;
5925 /* Set true when we find a matching non-argument symbol. */
5926 int found_sym;
5927 struct symbol *sym;
5928
5929 arg_sym = NULL;
5930 found_sym = 0;
5931 if (wild)
5932 {
8157b174
TT
5933 for (sym = block_iter_match_first (block, name, wild_match, &iter);
5934 sym != NULL; sym = block_iter_match_next (name, wild_match, &iter))
76a01679 5935 {
4186eb54
KS
5936 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5937 SYMBOL_DOMAIN (sym), domain)
73589123 5938 && wild_match (SYMBOL_LINKAGE_NAME (sym), name) == 0)
76a01679 5939 {
2a2d4dc3
AS
5940 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5941 continue;
5942 else if (SYMBOL_IS_ARGUMENT (sym))
5943 arg_sym = sym;
5944 else
5945 {
76a01679
JB
5946 found_sym = 1;
5947 add_defn_to_vec (obstackp,
5948 fixup_symbol_section (sym, objfile),
2570f2b7 5949 block);
76a01679
JB
5950 }
5951 }
5952 }
96d887e8
PH
5953 }
5954 else
5955 {
8157b174
TT
5956 for (sym = block_iter_match_first (block, name, full_match, &iter);
5957 sym != NULL; sym = block_iter_match_next (name, full_match, &iter))
76a01679 5958 {
4186eb54
KS
5959 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5960 SYMBOL_DOMAIN (sym), domain))
76a01679 5961 {
c4d840bd
PH
5962 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5963 {
5964 if (SYMBOL_IS_ARGUMENT (sym))
5965 arg_sym = sym;
5966 else
2a2d4dc3 5967 {
c4d840bd
PH
5968 found_sym = 1;
5969 add_defn_to_vec (obstackp,
5970 fixup_symbol_section (sym, objfile),
5971 block);
2a2d4dc3 5972 }
c4d840bd 5973 }
76a01679
JB
5974 }
5975 }
96d887e8
PH
5976 }
5977
5978 if (!found_sym && arg_sym != NULL)
5979 {
76a01679
JB
5980 add_defn_to_vec (obstackp,
5981 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5982 block);
96d887e8
PH
5983 }
5984
5985 if (!wild)
5986 {
5987 arg_sym = NULL;
5988 found_sym = 0;
5989
5990 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 5991 {
4186eb54
KS
5992 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5993 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
5994 {
5995 int cmp;
5996
5997 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
5998 if (cmp == 0)
5999 {
61012eef 6000 cmp = !startswith (SYMBOL_LINKAGE_NAME (sym), "_ada_");
76a01679
JB
6001 if (cmp == 0)
6002 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
6003 name_len);
6004 }
6005
6006 if (cmp == 0
6007 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
6008 {
2a2d4dc3
AS
6009 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6010 {
6011 if (SYMBOL_IS_ARGUMENT (sym))
6012 arg_sym = sym;
6013 else
6014 {
6015 found_sym = 1;
6016 add_defn_to_vec (obstackp,
6017 fixup_symbol_section (sym, objfile),
6018 block);
6019 }
6020 }
76a01679
JB
6021 }
6022 }
76a01679 6023 }
96d887e8
PH
6024
6025 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6026 They aren't parameters, right? */
6027 if (!found_sym && arg_sym != NULL)
6028 {
6029 add_defn_to_vec (obstackp,
76a01679 6030 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6031 block);
96d887e8
PH
6032 }
6033 }
6034}
6035\f
41d27058
JB
6036
6037 /* Symbol Completion */
6038
6039/* If SYM_NAME is a completion candidate for TEXT, return this symbol
6040 name in a form that's appropriate for the completion. The result
6041 does not need to be deallocated, but is only good until the next call.
6042
6043 TEXT_LEN is equal to the length of TEXT.
e701b3c0 6044 Perform a wild match if WILD_MATCH_P is set.
6ea35997 6045 ENCODED_P should be set if TEXT represents the start of a symbol name
41d27058
JB
6046 in its encoded form. */
6047
6048static const char *
6049symbol_completion_match (const char *sym_name,
6050 const char *text, int text_len,
6ea35997 6051 int wild_match_p, int encoded_p)
41d27058 6052{
41d27058
JB
6053 const int verbatim_match = (text[0] == '<');
6054 int match = 0;
6055
6056 if (verbatim_match)
6057 {
6058 /* Strip the leading angle bracket. */
6059 text = text + 1;
6060 text_len--;
6061 }
6062
6063 /* First, test against the fully qualified name of the symbol. */
6064
6065 if (strncmp (sym_name, text, text_len) == 0)
6066 match = 1;
6067
6ea35997 6068 if (match && !encoded_p)
41d27058
JB
6069 {
6070 /* One needed check before declaring a positive match is to verify
6071 that iff we are doing a verbatim match, the decoded version
6072 of the symbol name starts with '<'. Otherwise, this symbol name
6073 is not a suitable completion. */
6074 const char *sym_name_copy = sym_name;
6075 int has_angle_bracket;
6076
6077 sym_name = ada_decode (sym_name);
6078 has_angle_bracket = (sym_name[0] == '<');
6079 match = (has_angle_bracket == verbatim_match);
6080 sym_name = sym_name_copy;
6081 }
6082
6083 if (match && !verbatim_match)
6084 {
6085 /* When doing non-verbatim match, another check that needs to
6086 be done is to verify that the potentially matching symbol name
6087 does not include capital letters, because the ada-mode would
6088 not be able to understand these symbol names without the
6089 angle bracket notation. */
6090 const char *tmp;
6091
6092 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6093 if (*tmp != '\0')
6094 match = 0;
6095 }
6096
6097 /* Second: Try wild matching... */
6098
e701b3c0 6099 if (!match && wild_match_p)
41d27058
JB
6100 {
6101 /* Since we are doing wild matching, this means that TEXT
6102 may represent an unqualified symbol name. We therefore must
6103 also compare TEXT against the unqualified name of the symbol. */
6104 sym_name = ada_unqualified_name (ada_decode (sym_name));
6105
6106 if (strncmp (sym_name, text, text_len) == 0)
6107 match = 1;
6108 }
6109
6110 /* Finally: If we found a mach, prepare the result to return. */
6111
6112 if (!match)
6113 return NULL;
6114
6115 if (verbatim_match)
6116 sym_name = add_angle_brackets (sym_name);
6117
6ea35997 6118 if (!encoded_p)
41d27058
JB
6119 sym_name = ada_decode (sym_name);
6120
6121 return sym_name;
6122}
6123
6124/* A companion function to ada_make_symbol_completion_list().
6125 Check if SYM_NAME represents a symbol which name would be suitable
6126 to complete TEXT (TEXT_LEN is the length of TEXT), in which case
6127 it is appended at the end of the given string vector SV.
6128
6129 ORIG_TEXT is the string original string from the user command
6130 that needs to be completed. WORD is the entire command on which
6131 completion should be performed. These two parameters are used to
6132 determine which part of the symbol name should be added to the
6133 completion vector.
c0af1706 6134 if WILD_MATCH_P is set, then wild matching is performed.
cb8e9b97 6135 ENCODED_P should be set if TEXT represents a symbol name in its
41d27058
JB
6136 encoded formed (in which case the completion should also be
6137 encoded). */
6138
6139static void
d6565258 6140symbol_completion_add (VEC(char_ptr) **sv,
41d27058
JB
6141 const char *sym_name,
6142 const char *text, int text_len,
6143 const char *orig_text, const char *word,
cb8e9b97 6144 int wild_match_p, int encoded_p)
41d27058
JB
6145{
6146 const char *match = symbol_completion_match (sym_name, text, text_len,
cb8e9b97 6147 wild_match_p, encoded_p);
41d27058
JB
6148 char *completion;
6149
6150 if (match == NULL)
6151 return;
6152
6153 /* We found a match, so add the appropriate completion to the given
6154 string vector. */
6155
6156 if (word == orig_text)
6157 {
6158 completion = xmalloc (strlen (match) + 5);
6159 strcpy (completion, match);
6160 }
6161 else if (word > orig_text)
6162 {
6163 /* Return some portion of sym_name. */
6164 completion = xmalloc (strlen (match) + 5);
6165 strcpy (completion, match + (word - orig_text));
6166 }
6167 else
6168 {
6169 /* Return some of ORIG_TEXT plus sym_name. */
6170 completion = xmalloc (strlen (match) + (orig_text - word) + 5);
6171 strncpy (completion, word, orig_text - word);
6172 completion[orig_text - word] = '\0';
6173 strcat (completion, match);
6174 }
6175
d6565258 6176 VEC_safe_push (char_ptr, *sv, completion);
41d27058
JB
6177}
6178
ccefe4c4 6179/* An object of this type is passed as the user_data argument to the
bb4142cf 6180 expand_symtabs_matching method. */
ccefe4c4
TT
6181struct add_partial_datum
6182{
6183 VEC(char_ptr) **completions;
6f937416 6184 const char *text;
ccefe4c4 6185 int text_len;
6f937416
PA
6186 const char *text0;
6187 const char *word;
ccefe4c4
TT
6188 int wild_match;
6189 int encoded;
6190};
6191
bb4142cf
DE
6192/* A callback for expand_symtabs_matching. */
6193
7b08b9eb 6194static int
bb4142cf 6195ada_complete_symbol_matcher (const char *name, void *user_data)
ccefe4c4
TT
6196{
6197 struct add_partial_datum *data = user_data;
7b08b9eb
JK
6198
6199 return symbol_completion_match (name, data->text, data->text_len,
6200 data->wild_match, data->encoded) != NULL;
ccefe4c4
TT
6201}
6202
49c4e619
TT
6203/* Return a list of possible symbol names completing TEXT0. WORD is
6204 the entire command on which completion is made. */
41d27058 6205
49c4e619 6206static VEC (char_ptr) *
6f937416
PA
6207ada_make_symbol_completion_list (const char *text0, const char *word,
6208 enum type_code code)
41d27058
JB
6209{
6210 char *text;
6211 int text_len;
b1ed564a
JB
6212 int wild_match_p;
6213 int encoded_p;
2ba95b9b 6214 VEC(char_ptr) *completions = VEC_alloc (char_ptr, 128);
41d27058 6215 struct symbol *sym;
43f3e411 6216 struct compunit_symtab *s;
41d27058
JB
6217 struct minimal_symbol *msymbol;
6218 struct objfile *objfile;
3977b71f 6219 const struct block *b, *surrounding_static_block = 0;
41d27058 6220 int i;
8157b174 6221 struct block_iterator iter;
b8fea896 6222 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
41d27058 6223
2f68a895
TT
6224 gdb_assert (code == TYPE_CODE_UNDEF);
6225
41d27058
JB
6226 if (text0[0] == '<')
6227 {
6228 text = xstrdup (text0);
6229 make_cleanup (xfree, text);
6230 text_len = strlen (text);
b1ed564a
JB
6231 wild_match_p = 0;
6232 encoded_p = 1;
41d27058
JB
6233 }
6234 else
6235 {
6236 text = xstrdup (ada_encode (text0));
6237 make_cleanup (xfree, text);
6238 text_len = strlen (text);
6239 for (i = 0; i < text_len; i++)
6240 text[i] = tolower (text[i]);
6241
b1ed564a 6242 encoded_p = (strstr (text0, "__") != NULL);
41d27058
JB
6243 /* If the name contains a ".", then the user is entering a fully
6244 qualified entity name, and the match must not be done in wild
6245 mode. Similarly, if the user wants to complete what looks like
6246 an encoded name, the match must not be done in wild mode. */
b1ed564a 6247 wild_match_p = (strchr (text0, '.') == NULL && !encoded_p);
41d27058
JB
6248 }
6249
6250 /* First, look at the partial symtab symbols. */
41d27058 6251 {
ccefe4c4
TT
6252 struct add_partial_datum data;
6253
6254 data.completions = &completions;
6255 data.text = text;
6256 data.text_len = text_len;
6257 data.text0 = text0;
6258 data.word = word;
b1ed564a
JB
6259 data.wild_match = wild_match_p;
6260 data.encoded = encoded_p;
276d885b
GB
6261 expand_symtabs_matching (NULL, ada_complete_symbol_matcher, NULL,
6262 ALL_DOMAIN, &data);
41d27058
JB
6263 }
6264
6265 /* At this point scan through the misc symbol vectors and add each
6266 symbol you find to the list. Eventually we want to ignore
6267 anything that isn't a text symbol (everything else will be
6268 handled by the psymtab code above). */
6269
6270 ALL_MSYMBOLS (objfile, msymbol)
6271 {
6272 QUIT;
efd66ac6 6273 symbol_completion_add (&completions, MSYMBOL_LINKAGE_NAME (msymbol),
b1ed564a
JB
6274 text, text_len, text0, word, wild_match_p,
6275 encoded_p);
41d27058
JB
6276 }
6277
6278 /* Search upwards from currently selected frame (so that we can
6279 complete on local vars. */
6280
6281 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6282 {
6283 if (!BLOCK_SUPERBLOCK (b))
6284 surrounding_static_block = b; /* For elmin of dups */
6285
6286 ALL_BLOCK_SYMBOLS (b, iter, sym)
6287 {
d6565258 6288 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6289 text, text_len, text0, word,
b1ed564a 6290 wild_match_p, encoded_p);
41d27058
JB
6291 }
6292 }
6293
6294 /* Go through the symtabs and check the externs and statics for
43f3e411 6295 symbols which match. */
41d27058 6296
43f3e411 6297 ALL_COMPUNITS (objfile, s)
41d27058
JB
6298 {
6299 QUIT;
43f3e411 6300 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
41d27058
JB
6301 ALL_BLOCK_SYMBOLS (b, iter, sym)
6302 {
d6565258 6303 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6304 text, text_len, text0, word,
b1ed564a 6305 wild_match_p, encoded_p);
41d27058
JB
6306 }
6307 }
6308
43f3e411 6309 ALL_COMPUNITS (objfile, s)
41d27058
JB
6310 {
6311 QUIT;
43f3e411 6312 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
41d27058
JB
6313 /* Don't do this block twice. */
6314 if (b == surrounding_static_block)
6315 continue;
6316 ALL_BLOCK_SYMBOLS (b, iter, sym)
6317 {
d6565258 6318 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6319 text, text_len, text0, word,
b1ed564a 6320 wild_match_p, encoded_p);
41d27058
JB
6321 }
6322 }
6323
b8fea896 6324 do_cleanups (old_chain);
49c4e619 6325 return completions;
41d27058
JB
6326}
6327
963a6417 6328 /* Field Access */
96d887e8 6329
73fb9985
JB
6330/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6331 for tagged types. */
6332
6333static int
6334ada_is_dispatch_table_ptr_type (struct type *type)
6335{
0d5cff50 6336 const char *name;
73fb9985
JB
6337
6338 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6339 return 0;
6340
6341 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6342 if (name == NULL)
6343 return 0;
6344
6345 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6346}
6347
ac4a2da4
JG
6348/* Return non-zero if TYPE is an interface tag. */
6349
6350static int
6351ada_is_interface_tag (struct type *type)
6352{
6353 const char *name = TYPE_NAME (type);
6354
6355 if (name == NULL)
6356 return 0;
6357
6358 return (strcmp (name, "ada__tags__interface_tag") == 0);
6359}
6360
963a6417
PH
6361/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6362 to be invisible to users. */
96d887e8 6363
963a6417
PH
6364int
6365ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6366{
963a6417
PH
6367 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6368 return 1;
ffde82bf 6369
73fb9985
JB
6370 /* Check the name of that field. */
6371 {
6372 const char *name = TYPE_FIELD_NAME (type, field_num);
6373
6374 /* Anonymous field names should not be printed.
6375 brobecker/2007-02-20: I don't think this can actually happen
6376 but we don't want to print the value of annonymous fields anyway. */
6377 if (name == NULL)
6378 return 1;
6379
ffde82bf
JB
6380 /* Normally, fields whose name start with an underscore ("_")
6381 are fields that have been internally generated by the compiler,
6382 and thus should not be printed. The "_parent" field is special,
6383 however: This is a field internally generated by the compiler
6384 for tagged types, and it contains the components inherited from
6385 the parent type. This field should not be printed as is, but
6386 should not be ignored either. */
61012eef 6387 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6388 return 1;
6389 }
6390
ac4a2da4
JG
6391 /* If this is the dispatch table of a tagged type or an interface tag,
6392 then ignore. */
73fb9985 6393 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6394 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6395 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6396 return 1;
6397
6398 /* Not a special field, so it should not be ignored. */
6399 return 0;
963a6417 6400}
96d887e8 6401
963a6417 6402/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6403 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6404
963a6417
PH
6405int
6406ada_is_tagged_type (struct type *type, int refok)
6407{
6408 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1, NULL) != NULL);
6409}
96d887e8 6410
963a6417 6411/* True iff TYPE represents the type of X'Tag */
96d887e8 6412
963a6417
PH
6413int
6414ada_is_tag_type (struct type *type)
6415{
460efde1
JB
6416 type = ada_check_typedef (type);
6417
963a6417
PH
6418 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6419 return 0;
6420 else
96d887e8 6421 {
963a6417 6422 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6423
963a6417
PH
6424 return (name != NULL
6425 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6426 }
96d887e8
PH
6427}
6428
963a6417 6429/* The type of the tag on VAL. */
76a01679 6430
963a6417
PH
6431struct type *
6432ada_tag_type (struct value *val)
96d887e8 6433{
df407dfe 6434 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0, NULL);
963a6417 6435}
96d887e8 6436
b50d69b5
JG
6437/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6438 retired at Ada 05). */
6439
6440static int
6441is_ada95_tag (struct value *tag)
6442{
6443 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6444}
6445
963a6417 6446/* The value of the tag on VAL. */
96d887e8 6447
963a6417
PH
6448struct value *
6449ada_value_tag (struct value *val)
6450{
03ee6b2e 6451 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6452}
6453
963a6417
PH
6454/* The value of the tag on the object of type TYPE whose contents are
6455 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6456 ADDRESS. */
96d887e8 6457
963a6417 6458static struct value *
10a2c479 6459value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6460 const gdb_byte *valaddr,
963a6417 6461 CORE_ADDR address)
96d887e8 6462{
b5385fc0 6463 int tag_byte_offset;
963a6417 6464 struct type *tag_type;
5b4ee69b 6465
963a6417 6466 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6467 NULL, NULL, NULL))
96d887e8 6468 {
fc1a4b47 6469 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6470 ? NULL
6471 : valaddr + tag_byte_offset);
963a6417 6472 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6473
963a6417 6474 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6475 }
963a6417
PH
6476 return NULL;
6477}
96d887e8 6478
963a6417
PH
6479static struct type *
6480type_from_tag (struct value *tag)
6481{
6482 const char *type_name = ada_tag_name (tag);
5b4ee69b 6483
963a6417
PH
6484 if (type_name != NULL)
6485 return ada_find_any_type (ada_encode (type_name));
6486 return NULL;
6487}
96d887e8 6488
b50d69b5
JG
6489/* Given a value OBJ of a tagged type, return a value of this
6490 type at the base address of the object. The base address, as
6491 defined in Ada.Tags, it is the address of the primary tag of
6492 the object, and therefore where the field values of its full
6493 view can be fetched. */
6494
6495struct value *
6496ada_tag_value_at_base_address (struct value *obj)
6497{
b50d69b5
JG
6498 struct value *val;
6499 LONGEST offset_to_top = 0;
6500 struct type *ptr_type, *obj_type;
6501 struct value *tag;
6502 CORE_ADDR base_address;
6503
6504 obj_type = value_type (obj);
6505
6506 /* It is the responsability of the caller to deref pointers. */
6507
6508 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6509 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6510 return obj;
6511
6512 tag = ada_value_tag (obj);
6513 if (!tag)
6514 return obj;
6515
6516 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6517
6518 if (is_ada95_tag (tag))
6519 return obj;
6520
6521 ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
6522 ptr_type = lookup_pointer_type (ptr_type);
6523 val = value_cast (ptr_type, tag);
6524 if (!val)
6525 return obj;
6526
6527 /* It is perfectly possible that an exception be raised while
6528 trying to determine the base address, just like for the tag;
6529 see ada_tag_name for more details. We do not print the error
6530 message for the same reason. */
6531
492d29ea 6532 TRY
b50d69b5
JG
6533 {
6534 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6535 }
6536
492d29ea
PA
6537 CATCH (e, RETURN_MASK_ERROR)
6538 {
6539 return obj;
6540 }
6541 END_CATCH
b50d69b5
JG
6542
6543 /* If offset is null, nothing to do. */
6544
6545 if (offset_to_top == 0)
6546 return obj;
6547
6548 /* -1 is a special case in Ada.Tags; however, what should be done
6549 is not quite clear from the documentation. So do nothing for
6550 now. */
6551
6552 if (offset_to_top == -1)
6553 return obj;
6554
6555 base_address = value_address (obj) - offset_to_top;
6556 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6557
6558 /* Make sure that we have a proper tag at the new address.
6559 Otherwise, offset_to_top is bogus (which can happen when
6560 the object is not initialized yet). */
6561
6562 if (!tag)
6563 return obj;
6564
6565 obj_type = type_from_tag (tag);
6566
6567 if (!obj_type)
6568 return obj;
6569
6570 return value_from_contents_and_address (obj_type, NULL, base_address);
6571}
6572
1b611343
JB
6573/* Return the "ada__tags__type_specific_data" type. */
6574
6575static struct type *
6576ada_get_tsd_type (struct inferior *inf)
963a6417 6577{
1b611343 6578 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6579
1b611343
JB
6580 if (data->tsd_type == 0)
6581 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6582 return data->tsd_type;
6583}
529cad9c 6584
1b611343
JB
6585/* Return the TSD (type-specific data) associated to the given TAG.
6586 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6587
1b611343 6588 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6589
1b611343
JB
6590static struct value *
6591ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6592{
4c4b4cd2 6593 struct value *val;
1b611343 6594 struct type *type;
5b4ee69b 6595
1b611343
JB
6596 /* First option: The TSD is simply stored as a field of our TAG.
6597 Only older versions of GNAT would use this format, but we have
6598 to test it first, because there are no visible markers for
6599 the current approach except the absence of that field. */
529cad9c 6600
1b611343
JB
6601 val = ada_value_struct_elt (tag, "tsd", 1);
6602 if (val)
6603 return val;
e802dbe0 6604
1b611343
JB
6605 /* Try the second representation for the dispatch table (in which
6606 there is no explicit 'tsd' field in the referent of the tag pointer,
6607 and instead the tsd pointer is stored just before the dispatch
6608 table. */
e802dbe0 6609
1b611343
JB
6610 type = ada_get_tsd_type (current_inferior());
6611 if (type == NULL)
6612 return NULL;
6613 type = lookup_pointer_type (lookup_pointer_type (type));
6614 val = value_cast (type, tag);
6615 if (val == NULL)
6616 return NULL;
6617 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6618}
6619
1b611343
JB
6620/* Given the TSD of a tag (type-specific data), return a string
6621 containing the name of the associated type.
6622
6623 The returned value is good until the next call. May return NULL
6624 if we are unable to determine the tag name. */
6625
6626static char *
6627ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6628{
529cad9c
PH
6629 static char name[1024];
6630 char *p;
1b611343 6631 struct value *val;
529cad9c 6632
1b611343 6633 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6634 if (val == NULL)
1b611343 6635 return NULL;
4c4b4cd2
PH
6636 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6637 for (p = name; *p != '\0'; p += 1)
6638 if (isalpha (*p))
6639 *p = tolower (*p);
1b611343 6640 return name;
4c4b4cd2
PH
6641}
6642
6643/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6644 a C string.
6645
6646 Return NULL if the TAG is not an Ada tag, or if we were unable to
6647 determine the name of that tag. The result is good until the next
6648 call. */
4c4b4cd2
PH
6649
6650const char *
6651ada_tag_name (struct value *tag)
6652{
1b611343 6653 char *name = NULL;
5b4ee69b 6654
df407dfe 6655 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6656 return NULL;
1b611343
JB
6657
6658 /* It is perfectly possible that an exception be raised while trying
6659 to determine the TAG's name, even under normal circumstances:
6660 The associated variable may be uninitialized or corrupted, for
6661 instance. We do not let any exception propagate past this point.
6662 instead we return NULL.
6663
6664 We also do not print the error message either (which often is very
6665 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6666 the caller print a more meaningful message if necessary. */
492d29ea 6667 TRY
1b611343
JB
6668 {
6669 struct value *tsd = ada_get_tsd_from_tag (tag);
6670
6671 if (tsd != NULL)
6672 name = ada_tag_name_from_tsd (tsd);
6673 }
492d29ea
PA
6674 CATCH (e, RETURN_MASK_ERROR)
6675 {
6676 }
6677 END_CATCH
1b611343
JB
6678
6679 return name;
4c4b4cd2
PH
6680}
6681
6682/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6683
d2e4a39e 6684struct type *
ebf56fd3 6685ada_parent_type (struct type *type)
14f9c5c9
AS
6686{
6687 int i;
6688
61ee279c 6689 type = ada_check_typedef (type);
14f9c5c9
AS
6690
6691 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6692 return NULL;
6693
6694 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6695 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6696 {
6697 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6698
6699 /* If the _parent field is a pointer, then dereference it. */
6700 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6701 parent_type = TYPE_TARGET_TYPE (parent_type);
6702 /* If there is a parallel XVS type, get the actual base type. */
6703 parent_type = ada_get_base_type (parent_type);
6704
6705 return ada_check_typedef (parent_type);
6706 }
14f9c5c9
AS
6707
6708 return NULL;
6709}
6710
4c4b4cd2
PH
6711/* True iff field number FIELD_NUM of structure type TYPE contains the
6712 parent-type (inherited) fields of a derived type. Assumes TYPE is
6713 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6714
6715int
ebf56fd3 6716ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6717{
61ee279c 6718 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6719
4c4b4cd2 6720 return (name != NULL
61012eef
GB
6721 && (startswith (name, "PARENT")
6722 || startswith (name, "_parent")));
14f9c5c9
AS
6723}
6724
4c4b4cd2 6725/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6726 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6727 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6728 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6729 structures. */
14f9c5c9
AS
6730
6731int
ebf56fd3 6732ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6733{
d2e4a39e 6734 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6735
d2e4a39e 6736 return (name != NULL
61012eef 6737 && (startswith (name, "PARENT")
4c4b4cd2 6738 || strcmp (name, "REP") == 0
61012eef 6739 || startswith (name, "_parent")
4c4b4cd2 6740 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6741}
6742
4c4b4cd2
PH
6743/* True iff field number FIELD_NUM of structure or union type TYPE
6744 is a variant wrapper. Assumes TYPE is a structure type with at least
6745 FIELD_NUM+1 fields. */
14f9c5c9
AS
6746
6747int
ebf56fd3 6748ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6749{
d2e4a39e 6750 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6751
14f9c5c9 6752 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6753 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6754 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6755 == TYPE_CODE_UNION)));
14f9c5c9
AS
6756}
6757
6758/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6759 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6760 returns the type of the controlling discriminant for the variant.
6761 May return NULL if the type could not be found. */
14f9c5c9 6762
d2e4a39e 6763struct type *
ebf56fd3 6764ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6765{
d2e4a39e 6766 char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6767
7c964f07 6768 return ada_lookup_struct_elt_type (outer_type, name, 1, 1, NULL);
14f9c5c9
AS
6769}
6770
4c4b4cd2 6771/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6772 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6773 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6774
6775int
ebf56fd3 6776ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6777{
d2e4a39e 6778 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6779
14f9c5c9
AS
6780 return (name != NULL && name[0] == 'O');
6781}
6782
6783/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6784 returns the name of the discriminant controlling the variant.
6785 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6786
d2e4a39e 6787char *
ebf56fd3 6788ada_variant_discrim_name (struct type *type0)
14f9c5c9 6789{
d2e4a39e 6790 static char *result = NULL;
14f9c5c9 6791 static size_t result_len = 0;
d2e4a39e
AS
6792 struct type *type;
6793 const char *name;
6794 const char *discrim_end;
6795 const char *discrim_start;
14f9c5c9
AS
6796
6797 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6798 type = TYPE_TARGET_TYPE (type0);
6799 else
6800 type = type0;
6801
6802 name = ada_type_name (type);
6803
6804 if (name == NULL || name[0] == '\000')
6805 return "";
6806
6807 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6808 discrim_end -= 1)
6809 {
61012eef 6810 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6811 break;
14f9c5c9
AS
6812 }
6813 if (discrim_end == name)
6814 return "";
6815
d2e4a39e 6816 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6817 discrim_start -= 1)
6818 {
d2e4a39e 6819 if (discrim_start == name + 1)
4c4b4cd2 6820 return "";
76a01679 6821 if ((discrim_start > name + 3
61012eef 6822 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
6823 || discrim_start[-1] == '.')
6824 break;
14f9c5c9
AS
6825 }
6826
6827 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6828 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6829 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6830 return result;
6831}
6832
4c4b4cd2
PH
6833/* Scan STR for a subtype-encoded number, beginning at position K.
6834 Put the position of the character just past the number scanned in
6835 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6836 Return 1 if there was a valid number at the given position, and 0
6837 otherwise. A "subtype-encoded" number consists of the absolute value
6838 in decimal, followed by the letter 'm' to indicate a negative number.
6839 Assumes 0m does not occur. */
14f9c5c9
AS
6840
6841int
d2e4a39e 6842ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6843{
6844 ULONGEST RU;
6845
d2e4a39e 6846 if (!isdigit (str[k]))
14f9c5c9
AS
6847 return 0;
6848
4c4b4cd2 6849 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6850 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6851 LONGEST. */
14f9c5c9
AS
6852 RU = 0;
6853 while (isdigit (str[k]))
6854 {
d2e4a39e 6855 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6856 k += 1;
6857 }
6858
d2e4a39e 6859 if (str[k] == 'm')
14f9c5c9
AS
6860 {
6861 if (R != NULL)
4c4b4cd2 6862 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6863 k += 1;
6864 }
6865 else if (R != NULL)
6866 *R = (LONGEST) RU;
6867
4c4b4cd2 6868 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6869 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6870 number representable as a LONGEST (although either would probably work
6871 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6872 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6873
6874 if (new_k != NULL)
6875 *new_k = k;
6876 return 1;
6877}
6878
4c4b4cd2
PH
6879/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6880 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6881 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6882
d2e4a39e 6883int
ebf56fd3 6884ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6885{
d2e4a39e 6886 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6887 int p;
6888
6889 p = 0;
6890 while (1)
6891 {
d2e4a39e 6892 switch (name[p])
4c4b4cd2
PH
6893 {
6894 case '\0':
6895 return 0;
6896 case 'S':
6897 {
6898 LONGEST W;
5b4ee69b 6899
4c4b4cd2
PH
6900 if (!ada_scan_number (name, p + 1, &W, &p))
6901 return 0;
6902 if (val == W)
6903 return 1;
6904 break;
6905 }
6906 case 'R':
6907 {
6908 LONGEST L, U;
5b4ee69b 6909
4c4b4cd2
PH
6910 if (!ada_scan_number (name, p + 1, &L, &p)
6911 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6912 return 0;
6913 if (val >= L && val <= U)
6914 return 1;
6915 break;
6916 }
6917 case 'O':
6918 return 1;
6919 default:
6920 return 0;
6921 }
6922 }
6923}
6924
0963b4bd 6925/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6926
6927/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6928 ARG_TYPE, extract and return the value of one of its (non-static)
6929 fields. FIELDNO says which field. Differs from value_primitive_field
6930 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6931
4c4b4cd2 6932static struct value *
d2e4a39e 6933ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 6934 struct type *arg_type)
14f9c5c9 6935{
14f9c5c9
AS
6936 struct type *type;
6937
61ee279c 6938 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
6939 type = TYPE_FIELD_TYPE (arg_type, fieldno);
6940
4c4b4cd2 6941 /* Handle packed fields. */
14f9c5c9
AS
6942
6943 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0)
6944 {
6945 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6946 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6947
0fd88904 6948 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
6949 offset + bit_pos / 8,
6950 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6951 }
6952 else
6953 return value_primitive_field (arg1, offset, fieldno, arg_type);
6954}
6955
52ce6436
PH
6956/* Find field with name NAME in object of type TYPE. If found,
6957 set the following for each argument that is non-null:
6958 - *FIELD_TYPE_P to the field's type;
6959 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6960 an object of that type;
6961 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6962 - *BIT_SIZE_P to its size in bits if the field is packed, and
6963 0 otherwise;
6964 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6965 fields up to but not including the desired field, or by the total
6966 number of fields if not found. A NULL value of NAME never
6967 matches; the function just counts visible fields in this case.
6968
0963b4bd 6969 Returns 1 if found, 0 otherwise. */
52ce6436 6970
4c4b4cd2 6971static int
0d5cff50 6972find_struct_field (const char *name, struct type *type, int offset,
76a01679 6973 struct type **field_type_p,
52ce6436
PH
6974 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
6975 int *index_p)
4c4b4cd2
PH
6976{
6977 int i;
6978
61ee279c 6979 type = ada_check_typedef (type);
76a01679 6980
52ce6436
PH
6981 if (field_type_p != NULL)
6982 *field_type_p = NULL;
6983 if (byte_offset_p != NULL)
d5d6fca5 6984 *byte_offset_p = 0;
52ce6436
PH
6985 if (bit_offset_p != NULL)
6986 *bit_offset_p = 0;
6987 if (bit_size_p != NULL)
6988 *bit_size_p = 0;
6989
6990 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
6991 {
6992 int bit_pos = TYPE_FIELD_BITPOS (type, i);
6993 int fld_offset = offset + bit_pos / 8;
0d5cff50 6994 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 6995
4c4b4cd2
PH
6996 if (t_field_name == NULL)
6997 continue;
6998
52ce6436 6999 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7000 {
7001 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7002
52ce6436
PH
7003 if (field_type_p != NULL)
7004 *field_type_p = TYPE_FIELD_TYPE (type, i);
7005 if (byte_offset_p != NULL)
7006 *byte_offset_p = fld_offset;
7007 if (bit_offset_p != NULL)
7008 *bit_offset_p = bit_pos % 8;
7009 if (bit_size_p != NULL)
7010 *bit_size_p = bit_size;
76a01679
JB
7011 return 1;
7012 }
4c4b4cd2
PH
7013 else if (ada_is_wrapper_field (type, i))
7014 {
52ce6436
PH
7015 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7016 field_type_p, byte_offset_p, bit_offset_p,
7017 bit_size_p, index_p))
76a01679
JB
7018 return 1;
7019 }
4c4b4cd2
PH
7020 else if (ada_is_variant_part (type, i))
7021 {
52ce6436
PH
7022 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7023 fixed type?? */
4c4b4cd2 7024 int j;
52ce6436
PH
7025 struct type *field_type
7026 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7027
52ce6436 7028 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7029 {
76a01679
JB
7030 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7031 fld_offset
7032 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7033 field_type_p, byte_offset_p,
52ce6436 7034 bit_offset_p, bit_size_p, index_p))
76a01679 7035 return 1;
4c4b4cd2
PH
7036 }
7037 }
52ce6436
PH
7038 else if (index_p != NULL)
7039 *index_p += 1;
4c4b4cd2
PH
7040 }
7041 return 0;
7042}
7043
0963b4bd 7044/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7045
52ce6436
PH
7046static int
7047num_visible_fields (struct type *type)
7048{
7049 int n;
5b4ee69b 7050
52ce6436
PH
7051 n = 0;
7052 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7053 return n;
7054}
14f9c5c9 7055
4c4b4cd2 7056/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7057 and search in it assuming it has (class) type TYPE.
7058 If found, return value, else return NULL.
7059
4c4b4cd2 7060 Searches recursively through wrapper fields (e.g., '_parent'). */
14f9c5c9 7061
4c4b4cd2 7062static struct value *
d2e4a39e 7063ada_search_struct_field (char *name, struct value *arg, int offset,
4c4b4cd2 7064 struct type *type)
14f9c5c9
AS
7065{
7066 int i;
14f9c5c9 7067
5b4ee69b 7068 type = ada_check_typedef (type);
52ce6436 7069 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7070 {
0d5cff50 7071 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7072
7073 if (t_field_name == NULL)
4c4b4cd2 7074 continue;
14f9c5c9
AS
7075
7076 else if (field_name_match (t_field_name, name))
4c4b4cd2 7077 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7078
7079 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7080 {
0963b4bd 7081 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7082 ada_search_struct_field (name, arg,
7083 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7084 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7085
4c4b4cd2
PH
7086 if (v != NULL)
7087 return v;
7088 }
14f9c5c9
AS
7089
7090 else if (ada_is_variant_part (type, i))
4c4b4cd2 7091 {
0963b4bd 7092 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7093 int j;
5b4ee69b
MS
7094 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7095 i));
4c4b4cd2
PH
7096 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7097
52ce6436 7098 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7099 {
0963b4bd
MS
7100 struct value *v = ada_search_struct_field /* Force line
7101 break. */
06d5cf63
JB
7102 (name, arg,
7103 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7104 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7105
4c4b4cd2
PH
7106 if (v != NULL)
7107 return v;
7108 }
7109 }
14f9c5c9
AS
7110 }
7111 return NULL;
7112}
d2e4a39e 7113
52ce6436
PH
7114static struct value *ada_index_struct_field_1 (int *, struct value *,
7115 int, struct type *);
7116
7117
7118/* Return field #INDEX in ARG, where the index is that returned by
7119 * find_struct_field through its INDEX_P argument. Adjust the address
7120 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7121 * If found, return value, else return NULL. */
52ce6436
PH
7122
7123static struct value *
7124ada_index_struct_field (int index, struct value *arg, int offset,
7125 struct type *type)
7126{
7127 return ada_index_struct_field_1 (&index, arg, offset, type);
7128}
7129
7130
7131/* Auxiliary function for ada_index_struct_field. Like
7132 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7133 * *INDEX_P. */
52ce6436
PH
7134
7135static struct value *
7136ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7137 struct type *type)
7138{
7139 int i;
7140 type = ada_check_typedef (type);
7141
7142 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7143 {
7144 if (TYPE_FIELD_NAME (type, i) == NULL)
7145 continue;
7146 else if (ada_is_wrapper_field (type, i))
7147 {
0963b4bd 7148 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7149 ada_index_struct_field_1 (index_p, arg,
7150 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7151 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7152
52ce6436
PH
7153 if (v != NULL)
7154 return v;
7155 }
7156
7157 else if (ada_is_variant_part (type, i))
7158 {
7159 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7160 find_struct_field. */
52ce6436
PH
7161 error (_("Cannot assign this kind of variant record"));
7162 }
7163 else if (*index_p == 0)
7164 return ada_value_primitive_field (arg, offset, i, type);
7165 else
7166 *index_p -= 1;
7167 }
7168 return NULL;
7169}
7170
4c4b4cd2
PH
7171/* Given ARG, a value of type (pointer or reference to a)*
7172 structure/union, extract the component named NAME from the ultimate
7173 target structure/union and return it as a value with its
f5938064 7174 appropriate type.
14f9c5c9 7175
4c4b4cd2
PH
7176 The routine searches for NAME among all members of the structure itself
7177 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7178 (e.g., '_parent').
7179
03ee6b2e
PH
7180 If NO_ERR, then simply return NULL in case of error, rather than
7181 calling error. */
14f9c5c9 7182
d2e4a39e 7183struct value *
03ee6b2e 7184ada_value_struct_elt (struct value *arg, char *name, int no_err)
14f9c5c9 7185{
4c4b4cd2 7186 struct type *t, *t1;
d2e4a39e 7187 struct value *v;
14f9c5c9 7188
4c4b4cd2 7189 v = NULL;
df407dfe 7190 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7191 if (TYPE_CODE (t) == TYPE_CODE_REF)
7192 {
7193 t1 = TYPE_TARGET_TYPE (t);
7194 if (t1 == NULL)
03ee6b2e 7195 goto BadValue;
61ee279c 7196 t1 = ada_check_typedef (t1);
4c4b4cd2 7197 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7198 {
994b9211 7199 arg = coerce_ref (arg);
76a01679
JB
7200 t = t1;
7201 }
4c4b4cd2 7202 }
14f9c5c9 7203
4c4b4cd2
PH
7204 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7205 {
7206 t1 = TYPE_TARGET_TYPE (t);
7207 if (t1 == NULL)
03ee6b2e 7208 goto BadValue;
61ee279c 7209 t1 = ada_check_typedef (t1);
4c4b4cd2 7210 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7211 {
7212 arg = value_ind (arg);
7213 t = t1;
7214 }
4c4b4cd2 7215 else
76a01679 7216 break;
4c4b4cd2 7217 }
14f9c5c9 7218
4c4b4cd2 7219 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7220 goto BadValue;
14f9c5c9 7221
4c4b4cd2
PH
7222 if (t1 == t)
7223 v = ada_search_struct_field (name, arg, 0, t);
7224 else
7225 {
7226 int bit_offset, bit_size, byte_offset;
7227 struct type *field_type;
7228 CORE_ADDR address;
7229
76a01679 7230 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7231 address = value_address (ada_value_ind (arg));
4c4b4cd2 7232 else
b50d69b5 7233 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7234
1ed6ede0 7235 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL, address, NULL, 1);
76a01679
JB
7236 if (find_struct_field (name, t1, 0,
7237 &field_type, &byte_offset, &bit_offset,
52ce6436 7238 &bit_size, NULL))
76a01679
JB
7239 {
7240 if (bit_size != 0)
7241 {
714e53ab
PH
7242 if (TYPE_CODE (t) == TYPE_CODE_REF)
7243 arg = ada_coerce_ref (arg);
7244 else
7245 arg = ada_value_ind (arg);
76a01679
JB
7246 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7247 bit_offset, bit_size,
7248 field_type);
7249 }
7250 else
f5938064 7251 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7252 }
7253 }
7254
03ee6b2e
PH
7255 if (v != NULL || no_err)
7256 return v;
7257 else
323e0a4a 7258 error (_("There is no member named %s."), name);
14f9c5c9 7259
03ee6b2e
PH
7260 BadValue:
7261 if (no_err)
7262 return NULL;
7263 else
0963b4bd
MS
7264 error (_("Attempt to extract a component of "
7265 "a value that is not a record."));
14f9c5c9
AS
7266}
7267
7268/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7269 If DISPP is non-null, add its byte displacement from the beginning of a
7270 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7271 work for packed fields).
7272
7273 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7274 followed by "___".
14f9c5c9 7275
0963b4bd 7276 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7277 be a (pointer or reference)+ to a struct or union, and the
7278 ultimate target type will be searched.
14f9c5c9
AS
7279
7280 Looks recursively into variant clauses and parent types.
7281
4c4b4cd2
PH
7282 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7283 TYPE is not a type of the right kind. */
14f9c5c9 7284
4c4b4cd2 7285static struct type *
76a01679
JB
7286ada_lookup_struct_elt_type (struct type *type, char *name, int refok,
7287 int noerr, int *dispp)
14f9c5c9
AS
7288{
7289 int i;
7290
7291 if (name == NULL)
7292 goto BadName;
7293
76a01679 7294 if (refok && type != NULL)
4c4b4cd2
PH
7295 while (1)
7296 {
61ee279c 7297 type = ada_check_typedef (type);
76a01679
JB
7298 if (TYPE_CODE (type) != TYPE_CODE_PTR
7299 && TYPE_CODE (type) != TYPE_CODE_REF)
7300 break;
7301 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7302 }
14f9c5c9 7303
76a01679 7304 if (type == NULL
1265e4aa
JB
7305 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7306 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7307 {
4c4b4cd2 7308 if (noerr)
76a01679 7309 return NULL;
4c4b4cd2 7310 else
76a01679
JB
7311 {
7312 target_terminal_ours ();
7313 gdb_flush (gdb_stdout);
323e0a4a
AC
7314 if (type == NULL)
7315 error (_("Type (null) is not a structure or union type"));
7316 else
7317 {
7318 /* XXX: type_sprint */
7319 fprintf_unfiltered (gdb_stderr, _("Type "));
7320 type_print (type, "", gdb_stderr, -1);
7321 error (_(" is not a structure or union type"));
7322 }
76a01679 7323 }
14f9c5c9
AS
7324 }
7325
7326 type = to_static_fixed_type (type);
7327
7328 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7329 {
0d5cff50 7330 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7331 struct type *t;
7332 int disp;
d2e4a39e 7333
14f9c5c9 7334 if (t_field_name == NULL)
4c4b4cd2 7335 continue;
14f9c5c9
AS
7336
7337 else if (field_name_match (t_field_name, name))
4c4b4cd2
PH
7338 {
7339 if (dispp != NULL)
7340 *dispp += TYPE_FIELD_BITPOS (type, i) / 8;
460efde1 7341 return TYPE_FIELD_TYPE (type, i);
4c4b4cd2 7342 }
14f9c5c9
AS
7343
7344 else if (ada_is_wrapper_field (type, i))
4c4b4cd2
PH
7345 {
7346 disp = 0;
7347 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
7348 0, 1, &disp);
7349 if (t != NULL)
7350 {
7351 if (dispp != NULL)
7352 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7353 return t;
7354 }
7355 }
14f9c5c9
AS
7356
7357 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7358 {
7359 int j;
5b4ee69b
MS
7360 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7361 i));
4c4b4cd2
PH
7362
7363 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7364 {
b1f33ddd
JB
7365 /* FIXME pnh 2008/01/26: We check for a field that is
7366 NOT wrapped in a struct, since the compiler sometimes
7367 generates these for unchecked variant types. Revisit
0963b4bd 7368 if the compiler changes this practice. */
0d5cff50 7369 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
4c4b4cd2 7370 disp = 0;
b1f33ddd
JB
7371 if (v_field_name != NULL
7372 && field_name_match (v_field_name, name))
460efde1 7373 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7374 else
0963b4bd
MS
7375 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7376 j),
b1f33ddd
JB
7377 name, 0, 1, &disp);
7378
4c4b4cd2
PH
7379 if (t != NULL)
7380 {
7381 if (dispp != NULL)
7382 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7383 return t;
7384 }
7385 }
7386 }
14f9c5c9
AS
7387
7388 }
7389
7390BadName:
d2e4a39e 7391 if (!noerr)
14f9c5c9
AS
7392 {
7393 target_terminal_ours ();
7394 gdb_flush (gdb_stdout);
323e0a4a
AC
7395 if (name == NULL)
7396 {
7397 /* XXX: type_sprint */
7398 fprintf_unfiltered (gdb_stderr, _("Type "));
7399 type_print (type, "", gdb_stderr, -1);
7400 error (_(" has no component named <null>"));
7401 }
7402 else
7403 {
7404 /* XXX: type_sprint */
7405 fprintf_unfiltered (gdb_stderr, _("Type "));
7406 type_print (type, "", gdb_stderr, -1);
7407 error (_(" has no component named %s"), name);
7408 }
14f9c5c9
AS
7409 }
7410
7411 return NULL;
7412}
7413
b1f33ddd
JB
7414/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7415 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7416 represents an unchecked union (that is, the variant part of a
0963b4bd 7417 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7418
7419static int
7420is_unchecked_variant (struct type *var_type, struct type *outer_type)
7421{
7422 char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7423
b1f33ddd
JB
7424 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1, NULL)
7425 == NULL);
7426}
7427
7428
14f9c5c9
AS
7429/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7430 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7431 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7432 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7433
d2e4a39e 7434int
ebf56fd3 7435ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7436 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7437{
7438 int others_clause;
7439 int i;
d2e4a39e 7440 char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7441 struct value *outer;
7442 struct value *discrim;
14f9c5c9
AS
7443 LONGEST discrim_val;
7444
012370f6
TT
7445 /* Using plain value_from_contents_and_address here causes problems
7446 because we will end up trying to resolve a type that is currently
7447 being constructed. */
7448 outer = value_from_contents_and_address_unresolved (outer_type,
7449 outer_valaddr, 0);
0c281816
JB
7450 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7451 if (discrim == NULL)
14f9c5c9 7452 return -1;
0c281816 7453 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7454
7455 others_clause = -1;
7456 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7457 {
7458 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7459 others_clause = i;
14f9c5c9 7460 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7461 return i;
14f9c5c9
AS
7462 }
7463
7464 return others_clause;
7465}
d2e4a39e 7466\f
14f9c5c9
AS
7467
7468
4c4b4cd2 7469 /* Dynamic-Sized Records */
14f9c5c9
AS
7470
7471/* Strategy: The type ostensibly attached to a value with dynamic size
7472 (i.e., a size that is not statically recorded in the debugging
7473 data) does not accurately reflect the size or layout of the value.
7474 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7475 conventional types that are constructed on the fly. */
14f9c5c9
AS
7476
7477/* There is a subtle and tricky problem here. In general, we cannot
7478 determine the size of dynamic records without its data. However,
7479 the 'struct value' data structure, which GDB uses to represent
7480 quantities in the inferior process (the target), requires the size
7481 of the type at the time of its allocation in order to reserve space
7482 for GDB's internal copy of the data. That's why the
7483 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7484 rather than struct value*s.
14f9c5c9
AS
7485
7486 However, GDB's internal history variables ($1, $2, etc.) are
7487 struct value*s containing internal copies of the data that are not, in
7488 general, the same as the data at their corresponding addresses in
7489 the target. Fortunately, the types we give to these values are all
7490 conventional, fixed-size types (as per the strategy described
7491 above), so that we don't usually have to perform the
7492 'to_fixed_xxx_type' conversions to look at their values.
7493 Unfortunately, there is one exception: if one of the internal
7494 history variables is an array whose elements are unconstrained
7495 records, then we will need to create distinct fixed types for each
7496 element selected. */
7497
7498/* The upshot of all of this is that many routines take a (type, host
7499 address, target address) triple as arguments to represent a value.
7500 The host address, if non-null, is supposed to contain an internal
7501 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7502 target at the target address. */
14f9c5c9
AS
7503
7504/* Assuming that VAL0 represents a pointer value, the result of
7505 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7506 dynamic-sized types. */
14f9c5c9 7507
d2e4a39e
AS
7508struct value *
7509ada_value_ind (struct value *val0)
14f9c5c9 7510{
c48db5ca 7511 struct value *val = value_ind (val0);
5b4ee69b 7512
b50d69b5
JG
7513 if (ada_is_tagged_type (value_type (val), 0))
7514 val = ada_tag_value_at_base_address (val);
7515
4c4b4cd2 7516 return ada_to_fixed_value (val);
14f9c5c9
AS
7517}
7518
7519/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7520 qualifiers on VAL0. */
7521
d2e4a39e
AS
7522static struct value *
7523ada_coerce_ref (struct value *val0)
7524{
df407dfe 7525 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7526 {
7527 struct value *val = val0;
5b4ee69b 7528
994b9211 7529 val = coerce_ref (val);
b50d69b5
JG
7530
7531 if (ada_is_tagged_type (value_type (val), 0))
7532 val = ada_tag_value_at_base_address (val);
7533
4c4b4cd2 7534 return ada_to_fixed_value (val);
d2e4a39e
AS
7535 }
7536 else
14f9c5c9
AS
7537 return val0;
7538}
7539
7540/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7541 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7542
7543static unsigned int
ebf56fd3 7544align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7545{
7546 return (off + alignment - 1) & ~(alignment - 1);
7547}
7548
4c4b4cd2 7549/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7550
7551static unsigned int
ebf56fd3 7552field_alignment (struct type *type, int f)
14f9c5c9 7553{
d2e4a39e 7554 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7555 int len;
14f9c5c9
AS
7556 int align_offset;
7557
64a1bf19
JB
7558 /* The field name should never be null, unless the debugging information
7559 is somehow malformed. In this case, we assume the field does not
7560 require any alignment. */
7561 if (name == NULL)
7562 return 1;
7563
7564 len = strlen (name);
7565
4c4b4cd2
PH
7566 if (!isdigit (name[len - 1]))
7567 return 1;
14f9c5c9 7568
d2e4a39e 7569 if (isdigit (name[len - 2]))
14f9c5c9
AS
7570 align_offset = len - 2;
7571 else
7572 align_offset = len - 1;
7573
61012eef 7574 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7575 return TARGET_CHAR_BIT;
7576
4c4b4cd2
PH
7577 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7578}
7579
852dff6c 7580/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7581
852dff6c
JB
7582static struct symbol *
7583ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7584{
7585 struct symbol *sym;
7586
7587 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7588 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7589 return sym;
7590
4186eb54
KS
7591 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7592 return sym;
14f9c5c9
AS
7593}
7594
dddfab26
UW
7595/* Find a type named NAME. Ignores ambiguity. This routine will look
7596 solely for types defined by debug info, it will not search the GDB
7597 primitive types. */
4c4b4cd2 7598
852dff6c 7599static struct type *
ebf56fd3 7600ada_find_any_type (const char *name)
14f9c5c9 7601{
852dff6c 7602 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7603
14f9c5c9 7604 if (sym != NULL)
dddfab26 7605 return SYMBOL_TYPE (sym);
14f9c5c9 7606
dddfab26 7607 return NULL;
14f9c5c9
AS
7608}
7609
739593e0
JB
7610/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7611 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7612 symbol, in which case it is returned. Otherwise, this looks for
7613 symbols whose name is that of NAME_SYM suffixed with "___XR".
7614 Return symbol if found, and NULL otherwise. */
4c4b4cd2
PH
7615
7616struct symbol *
270140bd 7617ada_find_renaming_symbol (struct symbol *name_sym, const struct block *block)
aeb5907d 7618{
739593e0 7619 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
aeb5907d
JB
7620 struct symbol *sym;
7621
739593e0
JB
7622 if (strstr (name, "___XR") != NULL)
7623 return name_sym;
7624
aeb5907d
JB
7625 sym = find_old_style_renaming_symbol (name, block);
7626
7627 if (sym != NULL)
7628 return sym;
7629
0963b4bd 7630 /* Not right yet. FIXME pnh 7/20/2007. */
852dff6c 7631 sym = ada_find_any_type_symbol (name);
aeb5907d
JB
7632 if (sym != NULL && strstr (SYMBOL_LINKAGE_NAME (sym), "___XR") != NULL)
7633 return sym;
7634 else
7635 return NULL;
7636}
7637
7638static struct symbol *
270140bd 7639find_old_style_renaming_symbol (const char *name, const struct block *block)
4c4b4cd2 7640{
7f0df278 7641 const struct symbol *function_sym = block_linkage_function (block);
4c4b4cd2
PH
7642 char *rename;
7643
7644 if (function_sym != NULL)
7645 {
7646 /* If the symbol is defined inside a function, NAME is not fully
7647 qualified. This means we need to prepend the function name
7648 as well as adding the ``___XR'' suffix to build the name of
7649 the associated renaming symbol. */
0d5cff50 7650 const char *function_name = SYMBOL_LINKAGE_NAME (function_sym);
529cad9c
PH
7651 /* Function names sometimes contain suffixes used
7652 for instance to qualify nested subprograms. When building
7653 the XR type name, we need to make sure that this suffix is
7654 not included. So do not include any suffix in the function
7655 name length below. */
69fadcdf 7656 int function_name_len = ada_name_prefix_len (function_name);
76a01679
JB
7657 const int rename_len = function_name_len + 2 /* "__" */
7658 + strlen (name) + 6 /* "___XR\0" */ ;
4c4b4cd2 7659
529cad9c 7660 /* Strip the suffix if necessary. */
69fadcdf
JB
7661 ada_remove_trailing_digits (function_name, &function_name_len);
7662 ada_remove_po_subprogram_suffix (function_name, &function_name_len);
7663 ada_remove_Xbn_suffix (function_name, &function_name_len);
529cad9c 7664
4c4b4cd2
PH
7665 /* Library-level functions are a special case, as GNAT adds
7666 a ``_ada_'' prefix to the function name to avoid namespace
aeb5907d 7667 pollution. However, the renaming symbols themselves do not
4c4b4cd2
PH
7668 have this prefix, so we need to skip this prefix if present. */
7669 if (function_name_len > 5 /* "_ada_" */
7670 && strstr (function_name, "_ada_") == function_name)
69fadcdf
JB
7671 {
7672 function_name += 5;
7673 function_name_len -= 5;
7674 }
4c4b4cd2
PH
7675
7676 rename = (char *) alloca (rename_len * sizeof (char));
69fadcdf
JB
7677 strncpy (rename, function_name, function_name_len);
7678 xsnprintf (rename + function_name_len, rename_len - function_name_len,
7679 "__%s___XR", name);
4c4b4cd2
PH
7680 }
7681 else
7682 {
7683 const int rename_len = strlen (name) + 6;
5b4ee69b 7684
4c4b4cd2 7685 rename = (char *) alloca (rename_len * sizeof (char));
88c15c34 7686 xsnprintf (rename, rename_len * sizeof (char), "%s___XR", name);
4c4b4cd2
PH
7687 }
7688
852dff6c 7689 return ada_find_any_type_symbol (rename);
4c4b4cd2
PH
7690}
7691
14f9c5c9 7692/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7693 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7694 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7695 otherwise return 0. */
7696
14f9c5c9 7697int
d2e4a39e 7698ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7699{
7700 if (type1 == NULL)
7701 return 1;
7702 else if (type0 == NULL)
7703 return 0;
7704 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7705 return 1;
7706 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7707 return 0;
4c4b4cd2
PH
7708 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7709 return 1;
ad82864c 7710 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7711 return 1;
4c4b4cd2
PH
7712 else if (ada_is_array_descriptor_type (type0)
7713 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7714 return 1;
aeb5907d
JB
7715 else
7716 {
7717 const char *type0_name = type_name_no_tag (type0);
7718 const char *type1_name = type_name_no_tag (type1);
7719
7720 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7721 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7722 return 1;
7723 }
14f9c5c9
AS
7724 return 0;
7725}
7726
7727/* The name of TYPE, which is either its TYPE_NAME, or, if that is
4c4b4cd2
PH
7728 null, its TYPE_TAG_NAME. Null if TYPE is null. */
7729
0d5cff50 7730const char *
d2e4a39e 7731ada_type_name (struct type *type)
14f9c5c9 7732{
d2e4a39e 7733 if (type == NULL)
14f9c5c9
AS
7734 return NULL;
7735 else if (TYPE_NAME (type) != NULL)
7736 return TYPE_NAME (type);
7737 else
7738 return TYPE_TAG_NAME (type);
7739}
7740
b4ba55a1
JB
7741/* Search the list of "descriptive" types associated to TYPE for a type
7742 whose name is NAME. */
7743
7744static struct type *
7745find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7746{
7747 struct type *result;
7748
c6044dd1
JB
7749 if (ada_ignore_descriptive_types_p)
7750 return NULL;
7751
b4ba55a1
JB
7752 /* If there no descriptive-type info, then there is no parallel type
7753 to be found. */
7754 if (!HAVE_GNAT_AUX_INFO (type))
7755 return NULL;
7756
7757 result = TYPE_DESCRIPTIVE_TYPE (type);
7758 while (result != NULL)
7759 {
0d5cff50 7760 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7761
7762 if (result_name == NULL)
7763 {
7764 warning (_("unexpected null name on descriptive type"));
7765 return NULL;
7766 }
7767
7768 /* If the names match, stop. */
7769 if (strcmp (result_name, name) == 0)
7770 break;
7771
7772 /* Otherwise, look at the next item on the list, if any. */
7773 if (HAVE_GNAT_AUX_INFO (result))
7774 result = TYPE_DESCRIPTIVE_TYPE (result);
7775 else
7776 result = NULL;
7777 }
7778
7779 /* If we didn't find a match, see whether this is a packed array. With
7780 older compilers, the descriptive type information is either absent or
7781 irrelevant when it comes to packed arrays so the above lookup fails.
7782 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7783 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7784 return ada_find_any_type (name);
7785
7786 return result;
7787}
7788
7789/* Find a parallel type to TYPE with the specified NAME, using the
7790 descriptive type taken from the debugging information, if available,
7791 and otherwise using the (slower) name-based method. */
7792
7793static struct type *
7794ada_find_parallel_type_with_name (struct type *type, const char *name)
7795{
7796 struct type *result = NULL;
7797
7798 if (HAVE_GNAT_AUX_INFO (type))
7799 result = find_parallel_type_by_descriptive_type (type, name);
7800 else
7801 result = ada_find_any_type (name);
7802
7803 return result;
7804}
7805
7806/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7807 SUFFIX to the name of TYPE. */
14f9c5c9 7808
d2e4a39e 7809struct type *
ebf56fd3 7810ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7811{
0d5cff50 7812 char *name;
fe978cb0 7813 const char *type_name = ada_type_name (type);
14f9c5c9 7814 int len;
d2e4a39e 7815
fe978cb0 7816 if (type_name == NULL)
14f9c5c9
AS
7817 return NULL;
7818
fe978cb0 7819 len = strlen (type_name);
14f9c5c9 7820
b4ba55a1 7821 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7822
fe978cb0 7823 strcpy (name, type_name);
14f9c5c9
AS
7824 strcpy (name + len, suffix);
7825
b4ba55a1 7826 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7827}
7828
14f9c5c9 7829/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7830 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7831
d2e4a39e
AS
7832static struct type *
7833dynamic_template_type (struct type *type)
14f9c5c9 7834{
61ee279c 7835 type = ada_check_typedef (type);
14f9c5c9
AS
7836
7837 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7838 || ada_type_name (type) == NULL)
14f9c5c9 7839 return NULL;
d2e4a39e 7840 else
14f9c5c9
AS
7841 {
7842 int len = strlen (ada_type_name (type));
5b4ee69b 7843
4c4b4cd2
PH
7844 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7845 return type;
14f9c5c9 7846 else
4c4b4cd2 7847 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7848 }
7849}
7850
7851/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7852 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7853
d2e4a39e
AS
7854static int
7855is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7856{
7857 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7858
d2e4a39e 7859 return name != NULL
14f9c5c9
AS
7860 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
7861 && strstr (name, "___XVL") != NULL;
7862}
7863
4c4b4cd2
PH
7864/* The index of the variant field of TYPE, or -1 if TYPE does not
7865 represent a variant record type. */
14f9c5c9 7866
d2e4a39e 7867static int
4c4b4cd2 7868variant_field_index (struct type *type)
14f9c5c9
AS
7869{
7870 int f;
7871
4c4b4cd2
PH
7872 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
7873 return -1;
7874
7875 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
7876 {
7877 if (ada_is_variant_part (type, f))
7878 return f;
7879 }
7880 return -1;
14f9c5c9
AS
7881}
7882
4c4b4cd2
PH
7883/* A record type with no fields. */
7884
d2e4a39e 7885static struct type *
fe978cb0 7886empty_record (struct type *templ)
14f9c5c9 7887{
fe978cb0 7888 struct type *type = alloc_type_copy (templ);
5b4ee69b 7889
14f9c5c9
AS
7890 TYPE_CODE (type) = TYPE_CODE_STRUCT;
7891 TYPE_NFIELDS (type) = 0;
7892 TYPE_FIELDS (type) = NULL;
b1f33ddd 7893 INIT_CPLUS_SPECIFIC (type);
14f9c5c9
AS
7894 TYPE_NAME (type) = "<empty>";
7895 TYPE_TAG_NAME (type) = NULL;
14f9c5c9
AS
7896 TYPE_LENGTH (type) = 0;
7897 return type;
7898}
7899
7900/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7901 the value of type TYPE at VALADDR or ADDRESS (see comments at
7902 the beginning of this section) VAL according to GNAT conventions.
7903 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7904 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7905 an outer-level type (i.e., as opposed to a branch of a variant.) A
7906 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7907 of the variant.
14f9c5c9 7908
4c4b4cd2
PH
7909 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7910 length are not statically known are discarded. As a consequence,
7911 VALADDR, ADDRESS and DVAL0 are ignored.
7912
7913 NOTE: Limitations: For now, we assume that dynamic fields and
7914 variants occupy whole numbers of bytes. However, they need not be
7915 byte-aligned. */
7916
7917struct type *
10a2c479 7918ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7919 const gdb_byte *valaddr,
4c4b4cd2
PH
7920 CORE_ADDR address, struct value *dval0,
7921 int keep_dynamic_fields)
14f9c5c9 7922{
d2e4a39e
AS
7923 struct value *mark = value_mark ();
7924 struct value *dval;
7925 struct type *rtype;
14f9c5c9 7926 int nfields, bit_len;
4c4b4cd2 7927 int variant_field;
14f9c5c9 7928 long off;
d94e4f4f 7929 int fld_bit_len;
14f9c5c9
AS
7930 int f;
7931
4c4b4cd2
PH
7932 /* Compute the number of fields in this record type that are going
7933 to be processed: unless keep_dynamic_fields, this includes only
7934 fields whose position and length are static will be processed. */
7935 if (keep_dynamic_fields)
7936 nfields = TYPE_NFIELDS (type);
7937 else
7938 {
7939 nfields = 0;
76a01679 7940 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
7941 && !ada_is_variant_part (type, nfields)
7942 && !is_dynamic_field (type, nfields))
7943 nfields++;
7944 }
7945
e9bb382b 7946 rtype = alloc_type_copy (type);
14f9c5c9
AS
7947 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
7948 INIT_CPLUS_SPECIFIC (rtype);
7949 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 7950 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
7951 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
7952 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
7953 TYPE_NAME (rtype) = ada_type_name (type);
7954 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 7955 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 7956
d2e4a39e
AS
7957 off = 0;
7958 bit_len = 0;
4c4b4cd2
PH
7959 variant_field = -1;
7960
14f9c5c9
AS
7961 for (f = 0; f < nfields; f += 1)
7962 {
6c038f32
PH
7963 off = align_value (off, field_alignment (type, f))
7964 + TYPE_FIELD_BITPOS (type, f);
945b3a32 7965 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 7966 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7967
d2e4a39e 7968 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
7969 {
7970 variant_field = f;
d94e4f4f 7971 fld_bit_len = 0;
4c4b4cd2 7972 }
14f9c5c9 7973 else if (is_dynamic_field (type, f))
4c4b4cd2 7974 {
284614f0
JB
7975 const gdb_byte *field_valaddr = valaddr;
7976 CORE_ADDR field_address = address;
7977 struct type *field_type =
7978 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
7979
4c4b4cd2 7980 if (dval0 == NULL)
b5304971
JG
7981 {
7982 /* rtype's length is computed based on the run-time
7983 value of discriminants. If the discriminants are not
7984 initialized, the type size may be completely bogus and
0963b4bd 7985 GDB may fail to allocate a value for it. So check the
b5304971 7986 size first before creating the value. */
c1b5a1a6 7987 ada_ensure_varsize_limit (rtype);
012370f6
TT
7988 /* Using plain value_from_contents_and_address here
7989 causes problems because we will end up trying to
7990 resolve a type that is currently being
7991 constructed. */
7992 dval = value_from_contents_and_address_unresolved (rtype,
7993 valaddr,
7994 address);
9f1f738a 7995 rtype = value_type (dval);
b5304971 7996 }
4c4b4cd2
PH
7997 else
7998 dval = dval0;
7999
284614f0
JB
8000 /* If the type referenced by this field is an aligner type, we need
8001 to unwrap that aligner type, because its size might not be set.
8002 Keeping the aligner type would cause us to compute the wrong
8003 size for this field, impacting the offset of the all the fields
8004 that follow this one. */
8005 if (ada_is_aligner_type (field_type))
8006 {
8007 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8008
8009 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8010 field_address = cond_offset_target (field_address, field_offset);
8011 field_type = ada_aligned_type (field_type);
8012 }
8013
8014 field_valaddr = cond_offset_host (field_valaddr,
8015 off / TARGET_CHAR_BIT);
8016 field_address = cond_offset_target (field_address,
8017 off / TARGET_CHAR_BIT);
8018
8019 /* Get the fixed type of the field. Note that, in this case,
8020 we do not want to get the real type out of the tag: if
8021 the current field is the parent part of a tagged record,
8022 we will get the tag of the object. Clearly wrong: the real
8023 type of the parent is not the real type of the child. We
8024 would end up in an infinite loop. */
8025 field_type = ada_get_base_type (field_type);
8026 field_type = ada_to_fixed_type (field_type, field_valaddr,
8027 field_address, dval, 0);
27f2a97b
JB
8028 /* If the field size is already larger than the maximum
8029 object size, then the record itself will necessarily
8030 be larger than the maximum object size. We need to make
8031 this check now, because the size might be so ridiculously
8032 large (due to an uninitialized variable in the inferior)
8033 that it would cause an overflow when adding it to the
8034 record size. */
c1b5a1a6 8035 ada_ensure_varsize_limit (field_type);
284614f0
JB
8036
8037 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8038 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8039 /* The multiplication can potentially overflow. But because
8040 the field length has been size-checked just above, and
8041 assuming that the maximum size is a reasonable value,
8042 an overflow should not happen in practice. So rather than
8043 adding overflow recovery code to this already complex code,
8044 we just assume that it's not going to happen. */
d94e4f4f 8045 fld_bit_len =
4c4b4cd2
PH
8046 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8047 }
14f9c5c9 8048 else
4c4b4cd2 8049 {
5ded5331
JB
8050 /* Note: If this field's type is a typedef, it is important
8051 to preserve the typedef layer.
8052
8053 Otherwise, we might be transforming a typedef to a fat
8054 pointer (encoding a pointer to an unconstrained array),
8055 into a basic fat pointer (encoding an unconstrained
8056 array). As both types are implemented using the same
8057 structure, the typedef is the only clue which allows us
8058 to distinguish between the two options. Stripping it
8059 would prevent us from printing this field appropriately. */
8060 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8061 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8062 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8063 fld_bit_len =
4c4b4cd2
PH
8064 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8065 else
5ded5331
JB
8066 {
8067 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8068
8069 /* We need to be careful of typedefs when computing
8070 the length of our field. If this is a typedef,
8071 get the length of the target type, not the length
8072 of the typedef. */
8073 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8074 field_type = ada_typedef_target_type (field_type);
8075
8076 fld_bit_len =
8077 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8078 }
4c4b4cd2 8079 }
14f9c5c9 8080 if (off + fld_bit_len > bit_len)
4c4b4cd2 8081 bit_len = off + fld_bit_len;
d94e4f4f 8082 off += fld_bit_len;
4c4b4cd2
PH
8083 TYPE_LENGTH (rtype) =
8084 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8085 }
4c4b4cd2
PH
8086
8087 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8088 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8089 the record. This can happen in the presence of representation
8090 clauses. */
8091 if (variant_field >= 0)
8092 {
8093 struct type *branch_type;
8094
8095 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8096
8097 if (dval0 == NULL)
9f1f738a 8098 {
012370f6
TT
8099 /* Using plain value_from_contents_and_address here causes
8100 problems because we will end up trying to resolve a type
8101 that is currently being constructed. */
8102 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8103 address);
9f1f738a
SA
8104 rtype = value_type (dval);
8105 }
4c4b4cd2
PH
8106 else
8107 dval = dval0;
8108
8109 branch_type =
8110 to_fixed_variant_branch_type
8111 (TYPE_FIELD_TYPE (type, variant_field),
8112 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8113 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8114 if (branch_type == NULL)
8115 {
8116 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8117 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8118 TYPE_NFIELDS (rtype) -= 1;
8119 }
8120 else
8121 {
8122 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8123 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8124 fld_bit_len =
8125 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8126 TARGET_CHAR_BIT;
8127 if (off + fld_bit_len > bit_len)
8128 bit_len = off + fld_bit_len;
8129 TYPE_LENGTH (rtype) =
8130 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8131 }
8132 }
8133
714e53ab
PH
8134 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8135 should contain the alignment of that record, which should be a strictly
8136 positive value. If null or negative, then something is wrong, most
8137 probably in the debug info. In that case, we don't round up the size
0963b4bd 8138 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8139 the current RTYPE length might be good enough for our purposes. */
8140 if (TYPE_LENGTH (type) <= 0)
8141 {
323e0a4a
AC
8142 if (TYPE_NAME (rtype))
8143 warning (_("Invalid type size for `%s' detected: %d."),
8144 TYPE_NAME (rtype), TYPE_LENGTH (type));
8145 else
8146 warning (_("Invalid type size for <unnamed> detected: %d."),
8147 TYPE_LENGTH (type));
714e53ab
PH
8148 }
8149 else
8150 {
8151 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8152 TYPE_LENGTH (type));
8153 }
14f9c5c9
AS
8154
8155 value_free_to_mark (mark);
d2e4a39e 8156 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8157 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8158 return rtype;
8159}
8160
4c4b4cd2
PH
8161/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8162 of 1. */
14f9c5c9 8163
d2e4a39e 8164static struct type *
fc1a4b47 8165template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8166 CORE_ADDR address, struct value *dval0)
8167{
8168 return ada_template_to_fixed_record_type_1 (type, valaddr,
8169 address, dval0, 1);
8170}
8171
8172/* An ordinary record type in which ___XVL-convention fields and
8173 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8174 static approximations, containing all possible fields. Uses
8175 no runtime values. Useless for use in values, but that's OK,
8176 since the results are used only for type determinations. Works on both
8177 structs and unions. Representation note: to save space, we memorize
8178 the result of this function in the TYPE_TARGET_TYPE of the
8179 template type. */
8180
8181static struct type *
8182template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8183{
8184 struct type *type;
8185 int nfields;
8186 int f;
8187
9e195661
PMR
8188 /* No need no do anything if the input type is already fixed. */
8189 if (TYPE_FIXED_INSTANCE (type0))
8190 return type0;
8191
8192 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8193 if (TYPE_TARGET_TYPE (type0) != NULL)
8194 return TYPE_TARGET_TYPE (type0);
8195
9e195661 8196 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8197 type = type0;
9e195661
PMR
8198 nfields = TYPE_NFIELDS (type0);
8199
8200 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8201 recompute all over next time. */
8202 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8203
8204 for (f = 0; f < nfields; f += 1)
8205 {
460efde1 8206 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8207 struct type *new_type;
14f9c5c9 8208
4c4b4cd2 8209 if (is_dynamic_field (type0, f))
460efde1
JB
8210 {
8211 field_type = ada_check_typedef (field_type);
8212 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8213 }
14f9c5c9 8214 else
f192137b 8215 new_type = static_unwrap_type (field_type);
9e195661
PMR
8216
8217 if (new_type != field_type)
8218 {
8219 /* Clone TYPE0 only the first time we get a new field type. */
8220 if (type == type0)
8221 {
8222 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
8223 TYPE_CODE (type) = TYPE_CODE (type0);
8224 INIT_CPLUS_SPECIFIC (type);
8225 TYPE_NFIELDS (type) = nfields;
8226 TYPE_FIELDS (type) = (struct field *)
8227 TYPE_ALLOC (type, nfields * sizeof (struct field));
8228 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8229 sizeof (struct field) * nfields);
8230 TYPE_NAME (type) = ada_type_name (type0);
8231 TYPE_TAG_NAME (type) = NULL;
8232 TYPE_FIXED_INSTANCE (type) = 1;
8233 TYPE_LENGTH (type) = 0;
8234 }
8235 TYPE_FIELD_TYPE (type, f) = new_type;
8236 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8237 }
14f9c5c9 8238 }
9e195661 8239
14f9c5c9
AS
8240 return type;
8241}
8242
4c4b4cd2 8243/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8244 whose address in memory is ADDRESS, returns a revision of TYPE,
8245 which should be a non-dynamic-sized record, in which the variant
8246 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8247 for discriminant values in DVAL0, which can be NULL if the record
8248 contains the necessary discriminant values. */
8249
d2e4a39e 8250static struct type *
fc1a4b47 8251to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8252 CORE_ADDR address, struct value *dval0)
14f9c5c9 8253{
d2e4a39e 8254 struct value *mark = value_mark ();
4c4b4cd2 8255 struct value *dval;
d2e4a39e 8256 struct type *rtype;
14f9c5c9
AS
8257 struct type *branch_type;
8258 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8259 int variant_field = variant_field_index (type);
14f9c5c9 8260
4c4b4cd2 8261 if (variant_field == -1)
14f9c5c9
AS
8262 return type;
8263
4c4b4cd2 8264 if (dval0 == NULL)
9f1f738a
SA
8265 {
8266 dval = value_from_contents_and_address (type, valaddr, address);
8267 type = value_type (dval);
8268 }
4c4b4cd2
PH
8269 else
8270 dval = dval0;
8271
e9bb382b 8272 rtype = alloc_type_copy (type);
14f9c5c9 8273 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
4c4b4cd2
PH
8274 INIT_CPLUS_SPECIFIC (rtype);
8275 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8276 TYPE_FIELDS (rtype) =
8277 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8278 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8279 sizeof (struct field) * nfields);
14f9c5c9
AS
8280 TYPE_NAME (rtype) = ada_type_name (type);
8281 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 8282 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8283 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8284
4c4b4cd2
PH
8285 branch_type = to_fixed_variant_branch_type
8286 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8287 cond_offset_host (valaddr,
4c4b4cd2
PH
8288 TYPE_FIELD_BITPOS (type, variant_field)
8289 / TARGET_CHAR_BIT),
d2e4a39e 8290 cond_offset_target (address,
4c4b4cd2
PH
8291 TYPE_FIELD_BITPOS (type, variant_field)
8292 / TARGET_CHAR_BIT), dval);
d2e4a39e 8293 if (branch_type == NULL)
14f9c5c9 8294 {
4c4b4cd2 8295 int f;
5b4ee69b 8296
4c4b4cd2
PH
8297 for (f = variant_field + 1; f < nfields; f += 1)
8298 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8299 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8300 }
8301 else
8302 {
4c4b4cd2
PH
8303 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8304 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8305 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8306 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8307 }
4c4b4cd2 8308 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8309
4c4b4cd2 8310 value_free_to_mark (mark);
14f9c5c9
AS
8311 return rtype;
8312}
8313
8314/* An ordinary record type (with fixed-length fields) that describes
8315 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8316 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8317 should be in DVAL, a record value; it may be NULL if the object
8318 at ADDR itself contains any necessary discriminant values.
8319 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8320 values from the record are needed. Except in the case that DVAL,
8321 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8322 unchecked) is replaced by a particular branch of the variant.
8323
8324 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8325 is questionable and may be removed. It can arise during the
8326 processing of an unconstrained-array-of-record type where all the
8327 variant branches have exactly the same size. This is because in
8328 such cases, the compiler does not bother to use the XVS convention
8329 when encoding the record. I am currently dubious of this
8330 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8331
d2e4a39e 8332static struct type *
fc1a4b47 8333to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8334 CORE_ADDR address, struct value *dval)
14f9c5c9 8335{
d2e4a39e 8336 struct type *templ_type;
14f9c5c9 8337
876cecd0 8338 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8339 return type0;
8340
d2e4a39e 8341 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8342
8343 if (templ_type != NULL)
8344 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8345 else if (variant_field_index (type0) >= 0)
8346 {
8347 if (dval == NULL && valaddr == NULL && address == 0)
8348 return type0;
8349 return to_record_with_fixed_variant_part (type0, valaddr, address,
8350 dval);
8351 }
14f9c5c9
AS
8352 else
8353 {
876cecd0 8354 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8355 return type0;
8356 }
8357
8358}
8359
8360/* An ordinary record type (with fixed-length fields) that describes
8361 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8362 union type. Any necessary discriminants' values should be in DVAL,
8363 a record value. That is, this routine selects the appropriate
8364 branch of the union at ADDR according to the discriminant value
b1f33ddd 8365 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8366 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8367
d2e4a39e 8368static struct type *
fc1a4b47 8369to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8370 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8371{
8372 int which;
d2e4a39e
AS
8373 struct type *templ_type;
8374 struct type *var_type;
14f9c5c9
AS
8375
8376 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8377 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8378 else
14f9c5c9
AS
8379 var_type = var_type0;
8380
8381 templ_type = ada_find_parallel_type (var_type, "___XVU");
8382
8383 if (templ_type != NULL)
8384 var_type = templ_type;
8385
b1f33ddd
JB
8386 if (is_unchecked_variant (var_type, value_type (dval)))
8387 return var_type0;
d2e4a39e
AS
8388 which =
8389 ada_which_variant_applies (var_type,
0fd88904 8390 value_type (dval), value_contents (dval));
14f9c5c9
AS
8391
8392 if (which < 0)
e9bb382b 8393 return empty_record (var_type);
14f9c5c9 8394 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8395 return to_fixed_record_type
d2e4a39e
AS
8396 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8397 valaddr, address, dval);
4c4b4cd2 8398 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8399 return
8400 to_fixed_record_type
8401 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8402 else
8403 return TYPE_FIELD_TYPE (var_type, which);
8404}
8405
8908fca5
JB
8406/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8407 ENCODING_TYPE, a type following the GNAT conventions for discrete
8408 type encodings, only carries redundant information. */
8409
8410static int
8411ada_is_redundant_range_encoding (struct type *range_type,
8412 struct type *encoding_type)
8413{
8414 struct type *fixed_range_type;
8415 char *bounds_str;
8416 int n;
8417 LONGEST lo, hi;
8418
8419 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8420
005e2509
JB
8421 if (TYPE_CODE (get_base_type (range_type))
8422 != TYPE_CODE (get_base_type (encoding_type)))
8423 {
8424 /* The compiler probably used a simple base type to describe
8425 the range type instead of the range's actual base type,
8426 expecting us to get the real base type from the encoding
8427 anyway. In this situation, the encoding cannot be ignored
8428 as redundant. */
8429 return 0;
8430 }
8431
8908fca5
JB
8432 if (is_dynamic_type (range_type))
8433 return 0;
8434
8435 if (TYPE_NAME (encoding_type) == NULL)
8436 return 0;
8437
8438 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8439 if (bounds_str == NULL)
8440 return 0;
8441
8442 n = 8; /* Skip "___XDLU_". */
8443 if (!ada_scan_number (bounds_str, n, &lo, &n))
8444 return 0;
8445 if (TYPE_LOW_BOUND (range_type) != lo)
8446 return 0;
8447
8448 n += 2; /* Skip the "__" separator between the two bounds. */
8449 if (!ada_scan_number (bounds_str, n, &hi, &n))
8450 return 0;
8451 if (TYPE_HIGH_BOUND (range_type) != hi)
8452 return 0;
8453
8454 return 1;
8455}
8456
8457/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8458 a type following the GNAT encoding for describing array type
8459 indices, only carries redundant information. */
8460
8461static int
8462ada_is_redundant_index_type_desc (struct type *array_type,
8463 struct type *desc_type)
8464{
8465 struct type *this_layer = check_typedef (array_type);
8466 int i;
8467
8468 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8469 {
8470 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8471 TYPE_FIELD_TYPE (desc_type, i)))
8472 return 0;
8473 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8474 }
8475
8476 return 1;
8477}
8478
14f9c5c9
AS
8479/* Assuming that TYPE0 is an array type describing the type of a value
8480 at ADDR, and that DVAL describes a record containing any
8481 discriminants used in TYPE0, returns a type for the value that
8482 contains no dynamic components (that is, no components whose sizes
8483 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8484 true, gives an error message if the resulting type's size is over
4c4b4cd2 8485 varsize_limit. */
14f9c5c9 8486
d2e4a39e
AS
8487static struct type *
8488to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8489 int ignore_too_big)
14f9c5c9 8490{
d2e4a39e
AS
8491 struct type *index_type_desc;
8492 struct type *result;
ad82864c 8493 int constrained_packed_array_p;
14f9c5c9 8494
b0dd7688 8495 type0 = ada_check_typedef (type0);
284614f0 8496 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8497 return type0;
14f9c5c9 8498
ad82864c
JB
8499 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8500 if (constrained_packed_array_p)
8501 type0 = decode_constrained_packed_array_type (type0);
284614f0 8502
14f9c5c9 8503 index_type_desc = ada_find_parallel_type (type0, "___XA");
28c85d6c 8504 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8505 if (index_type_desc != NULL
8506 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8507 {
8508 /* Ignore this ___XA parallel type, as it does not bring any
8509 useful information. This allows us to avoid creating fixed
8510 versions of the array's index types, which would be identical
8511 to the original ones. This, in turn, can also help avoid
8512 the creation of fixed versions of the array itself. */
8513 index_type_desc = NULL;
8514 }
8515
14f9c5c9
AS
8516 if (index_type_desc == NULL)
8517 {
61ee279c 8518 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8519
14f9c5c9 8520 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8521 depend on the contents of the array in properly constructed
8522 debugging data. */
529cad9c
PH
8523 /* Create a fixed version of the array element type.
8524 We're not providing the address of an element here,
e1d5a0d2 8525 and thus the actual object value cannot be inspected to do
529cad9c
PH
8526 the conversion. This should not be a problem, since arrays of
8527 unconstrained objects are not allowed. In particular, all
8528 the elements of an array of a tagged type should all be of
8529 the same type specified in the debugging info. No need to
8530 consult the object tag. */
1ed6ede0 8531 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8532
284614f0
JB
8533 /* Make sure we always create a new array type when dealing with
8534 packed array types, since we're going to fix-up the array
8535 type length and element bitsize a little further down. */
ad82864c 8536 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8537 result = type0;
14f9c5c9 8538 else
e9bb382b 8539 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8540 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8541 }
8542 else
8543 {
8544 int i;
8545 struct type *elt_type0;
8546
8547 elt_type0 = type0;
8548 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8549 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8550
8551 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8552 depend on the contents of the array in properly constructed
8553 debugging data. */
529cad9c
PH
8554 /* Create a fixed version of the array element type.
8555 We're not providing the address of an element here,
e1d5a0d2 8556 and thus the actual object value cannot be inspected to do
529cad9c
PH
8557 the conversion. This should not be a problem, since arrays of
8558 unconstrained objects are not allowed. In particular, all
8559 the elements of an array of a tagged type should all be of
8560 the same type specified in the debugging info. No need to
8561 consult the object tag. */
1ed6ede0
JB
8562 result =
8563 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8564
8565 elt_type0 = type0;
14f9c5c9 8566 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8567 {
8568 struct type *range_type =
28c85d6c 8569 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8570
e9bb382b 8571 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8572 result, range_type);
1ce677a4 8573 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8574 }
d2e4a39e 8575 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8576 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8577 }
8578
2e6fda7d
JB
8579 /* We want to preserve the type name. This can be useful when
8580 trying to get the type name of a value that has already been
8581 printed (for instance, if the user did "print VAR; whatis $". */
8582 TYPE_NAME (result) = TYPE_NAME (type0);
8583
ad82864c 8584 if (constrained_packed_array_p)
284614f0
JB
8585 {
8586 /* So far, the resulting type has been created as if the original
8587 type was a regular (non-packed) array type. As a result, the
8588 bitsize of the array elements needs to be set again, and the array
8589 length needs to be recomputed based on that bitsize. */
8590 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8591 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8592
8593 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8594 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8595 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8596 TYPE_LENGTH (result)++;
8597 }
8598
876cecd0 8599 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8600 return result;
d2e4a39e 8601}
14f9c5c9
AS
8602
8603
8604/* A standard type (containing no dynamically sized components)
8605 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8606 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8607 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8608 ADDRESS or in VALADDR contains these discriminants.
8609
1ed6ede0
JB
8610 If CHECK_TAG is not null, in the case of tagged types, this function
8611 attempts to locate the object's tag and use it to compute the actual
8612 type. However, when ADDRESS is null, we cannot use it to determine the
8613 location of the tag, and therefore compute the tagged type's actual type.
8614 So we return the tagged type without consulting the tag. */
529cad9c 8615
f192137b
JB
8616static struct type *
8617ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8618 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8619{
61ee279c 8620 type = ada_check_typedef (type);
d2e4a39e
AS
8621 switch (TYPE_CODE (type))
8622 {
8623 default:
14f9c5c9 8624 return type;
d2e4a39e 8625 case TYPE_CODE_STRUCT:
4c4b4cd2 8626 {
76a01679 8627 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8628 struct type *fixed_record_type =
8629 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8630
529cad9c
PH
8631 /* If STATIC_TYPE is a tagged type and we know the object's address,
8632 then we can determine its tag, and compute the object's actual
0963b4bd 8633 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8634 type (the parent part of the record may have dynamic fields
8635 and the way the location of _tag is expressed may depend on
8636 them). */
529cad9c 8637
1ed6ede0 8638 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8639 {
b50d69b5
JG
8640 struct value *tag =
8641 value_tag_from_contents_and_address
8642 (fixed_record_type,
8643 valaddr,
8644 address);
8645 struct type *real_type = type_from_tag (tag);
8646 struct value *obj =
8647 value_from_contents_and_address (fixed_record_type,
8648 valaddr,
8649 address);
9f1f738a 8650 fixed_record_type = value_type (obj);
76a01679 8651 if (real_type != NULL)
b50d69b5
JG
8652 return to_fixed_record_type
8653 (real_type, NULL,
8654 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8655 }
4af88198
JB
8656
8657 /* Check to see if there is a parallel ___XVZ variable.
8658 If there is, then it provides the actual size of our type. */
8659 else if (ada_type_name (fixed_record_type) != NULL)
8660 {
0d5cff50 8661 const char *name = ada_type_name (fixed_record_type);
4af88198
JB
8662 char *xvz_name = alloca (strlen (name) + 7 /* "___XVZ\0" */);
8663 int xvz_found = 0;
8664 LONGEST size;
8665
88c15c34 8666 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
4af88198
JB
8667 size = get_int_var_value (xvz_name, &xvz_found);
8668 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8669 {
8670 fixed_record_type = copy_type (fixed_record_type);
8671 TYPE_LENGTH (fixed_record_type) = size;
8672
8673 /* The FIXED_RECORD_TYPE may have be a stub. We have
8674 observed this when the debugging info is STABS, and
8675 apparently it is something that is hard to fix.
8676
8677 In practice, we don't need the actual type definition
8678 at all, because the presence of the XVZ variable allows us
8679 to assume that there must be a XVS type as well, which we
8680 should be able to use later, when we need the actual type
8681 definition.
8682
8683 In the meantime, pretend that the "fixed" type we are
8684 returning is NOT a stub, because this can cause trouble
8685 when using this type to create new types targeting it.
8686 Indeed, the associated creation routines often check
8687 whether the target type is a stub and will try to replace
0963b4bd 8688 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8689 might cause the new type to have the wrong size too.
8690 Consider the case of an array, for instance, where the size
8691 of the array is computed from the number of elements in
8692 our array multiplied by the size of its element. */
8693 TYPE_STUB (fixed_record_type) = 0;
8694 }
8695 }
1ed6ede0 8696 return fixed_record_type;
4c4b4cd2 8697 }
d2e4a39e 8698 case TYPE_CODE_ARRAY:
4c4b4cd2 8699 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8700 case TYPE_CODE_UNION:
8701 if (dval == NULL)
4c4b4cd2 8702 return type;
d2e4a39e 8703 else
4c4b4cd2 8704 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8705 }
14f9c5c9
AS
8706}
8707
f192137b
JB
8708/* The same as ada_to_fixed_type_1, except that it preserves the type
8709 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8710
8711 The typedef layer needs be preserved in order to differentiate between
8712 arrays and array pointers when both types are implemented using the same
8713 fat pointer. In the array pointer case, the pointer is encoded as
8714 a typedef of the pointer type. For instance, considering:
8715
8716 type String_Access is access String;
8717 S1 : String_Access := null;
8718
8719 To the debugger, S1 is defined as a typedef of type String. But
8720 to the user, it is a pointer. So if the user tries to print S1,
8721 we should not dereference the array, but print the array address
8722 instead.
8723
8724 If we didn't preserve the typedef layer, we would lose the fact that
8725 the type is to be presented as a pointer (needs de-reference before
8726 being printed). And we would also use the source-level type name. */
f192137b
JB
8727
8728struct type *
8729ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8730 CORE_ADDR address, struct value *dval, int check_tag)
8731
8732{
8733 struct type *fixed_type =
8734 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8735
96dbd2c1
JB
8736 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8737 then preserve the typedef layer.
8738
8739 Implementation note: We can only check the main-type portion of
8740 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8741 from TYPE now returns a type that has the same instance flags
8742 as TYPE. For instance, if TYPE is a "typedef const", and its
8743 target type is a "struct", then the typedef elimination will return
8744 a "const" version of the target type. See check_typedef for more
8745 details about how the typedef layer elimination is done.
8746
8747 brobecker/2010-11-19: It seems to me that the only case where it is
8748 useful to preserve the typedef layer is when dealing with fat pointers.
8749 Perhaps, we could add a check for that and preserve the typedef layer
8750 only in that situation. But this seems unecessary so far, probably
8751 because we call check_typedef/ada_check_typedef pretty much everywhere.
8752 */
f192137b 8753 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8754 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8755 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8756 return type;
8757
8758 return fixed_type;
8759}
8760
14f9c5c9 8761/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8762 TYPE0, but based on no runtime data. */
14f9c5c9 8763
d2e4a39e
AS
8764static struct type *
8765to_static_fixed_type (struct type *type0)
14f9c5c9 8766{
d2e4a39e 8767 struct type *type;
14f9c5c9
AS
8768
8769 if (type0 == NULL)
8770 return NULL;
8771
876cecd0 8772 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8773 return type0;
8774
61ee279c 8775 type0 = ada_check_typedef (type0);
d2e4a39e 8776
14f9c5c9
AS
8777 switch (TYPE_CODE (type0))
8778 {
8779 default:
8780 return type0;
8781 case TYPE_CODE_STRUCT:
8782 type = dynamic_template_type (type0);
d2e4a39e 8783 if (type != NULL)
4c4b4cd2
PH
8784 return template_to_static_fixed_type (type);
8785 else
8786 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8787 case TYPE_CODE_UNION:
8788 type = ada_find_parallel_type (type0, "___XVU");
8789 if (type != NULL)
4c4b4cd2
PH
8790 return template_to_static_fixed_type (type);
8791 else
8792 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8793 }
8794}
8795
4c4b4cd2
PH
8796/* A static approximation of TYPE with all type wrappers removed. */
8797
d2e4a39e
AS
8798static struct type *
8799static_unwrap_type (struct type *type)
14f9c5c9
AS
8800{
8801 if (ada_is_aligner_type (type))
8802 {
61ee279c 8803 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8804 if (ada_type_name (type1) == NULL)
4c4b4cd2 8805 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8806
8807 return static_unwrap_type (type1);
8808 }
d2e4a39e 8809 else
14f9c5c9 8810 {
d2e4a39e 8811 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8812
d2e4a39e 8813 if (raw_real_type == type)
4c4b4cd2 8814 return type;
14f9c5c9 8815 else
4c4b4cd2 8816 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8817 }
8818}
8819
8820/* In some cases, incomplete and private types require
4c4b4cd2 8821 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8822 type Foo;
8823 type FooP is access Foo;
8824 V: FooP;
8825 type Foo is array ...;
4c4b4cd2 8826 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8827 cross-references to such types, we instead substitute for FooP a
8828 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8829 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8830
8831/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8832 exists, otherwise TYPE. */
8833
d2e4a39e 8834struct type *
61ee279c 8835ada_check_typedef (struct type *type)
14f9c5c9 8836{
727e3d2e
JB
8837 if (type == NULL)
8838 return NULL;
8839
720d1a40
JB
8840 /* If our type is a typedef type of a fat pointer, then we're done.
8841 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8842 what allows us to distinguish between fat pointers that represent
8843 array types, and fat pointers that represent array access types
8844 (in both cases, the compiler implements them as fat pointers). */
8845 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
8846 && is_thick_pntr (ada_typedef_target_type (type)))
8847 return type;
8848
14f9c5c9
AS
8849 CHECK_TYPEDEF (type);
8850 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 8851 || !TYPE_STUB (type)
14f9c5c9
AS
8852 || TYPE_TAG_NAME (type) == NULL)
8853 return type;
d2e4a39e 8854 else
14f9c5c9 8855 {
0d5cff50 8856 const char *name = TYPE_TAG_NAME (type);
d2e4a39e 8857 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8858
05e522ef
JB
8859 if (type1 == NULL)
8860 return type;
8861
8862 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8863 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8864 types, only for the typedef-to-array types). If that's the case,
8865 strip the typedef layer. */
8866 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
8867 type1 = ada_check_typedef (type1);
8868
8869 return type1;
14f9c5c9
AS
8870 }
8871}
8872
8873/* A value representing the data at VALADDR/ADDRESS as described by
8874 type TYPE0, but with a standard (static-sized) type that correctly
8875 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8876 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8877 creation of struct values]. */
14f9c5c9 8878
4c4b4cd2
PH
8879static struct value *
8880ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
8881 struct value *val0)
14f9c5c9 8882{
1ed6ede0 8883 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8884
14f9c5c9
AS
8885 if (type == type0 && val0 != NULL)
8886 return val0;
d2e4a39e 8887 else
4c4b4cd2
PH
8888 return value_from_contents_and_address (type, 0, address);
8889}
8890
8891/* A value representing VAL, but with a standard (static-sized) type
8892 that correctly describes it. Does not necessarily create a new
8893 value. */
8894
0c3acc09 8895struct value *
4c4b4cd2
PH
8896ada_to_fixed_value (struct value *val)
8897{
c48db5ca
JB
8898 val = unwrap_value (val);
8899 val = ada_to_fixed_value_create (value_type (val),
8900 value_address (val),
8901 val);
8902 return val;
14f9c5c9 8903}
d2e4a39e 8904\f
14f9c5c9 8905
14f9c5c9
AS
8906/* Attributes */
8907
4c4b4cd2
PH
8908/* Table mapping attribute numbers to names.
8909 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8910
d2e4a39e 8911static const char *attribute_names[] = {
14f9c5c9
AS
8912 "<?>",
8913
d2e4a39e 8914 "first",
14f9c5c9
AS
8915 "last",
8916 "length",
8917 "image",
14f9c5c9
AS
8918 "max",
8919 "min",
4c4b4cd2
PH
8920 "modulus",
8921 "pos",
8922 "size",
8923 "tag",
14f9c5c9 8924 "val",
14f9c5c9
AS
8925 0
8926};
8927
d2e4a39e 8928const char *
4c4b4cd2 8929ada_attribute_name (enum exp_opcode n)
14f9c5c9 8930{
4c4b4cd2
PH
8931 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8932 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8933 else
8934 return attribute_names[0];
8935}
8936
4c4b4cd2 8937/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8938
4c4b4cd2
PH
8939static LONGEST
8940pos_atr (struct value *arg)
14f9c5c9 8941{
24209737
PH
8942 struct value *val = coerce_ref (arg);
8943 struct type *type = value_type (val);
14f9c5c9 8944
d2e4a39e 8945 if (!discrete_type_p (type))
323e0a4a 8946 error (_("'POS only defined on discrete types"));
14f9c5c9
AS
8947
8948 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8949 {
8950 int i;
24209737 8951 LONGEST v = value_as_long (val);
14f9c5c9 8952
d2e4a39e 8953 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2 8954 {
14e75d8e 8955 if (v == TYPE_FIELD_ENUMVAL (type, i))
4c4b4cd2
PH
8956 return i;
8957 }
323e0a4a 8958 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9
AS
8959 }
8960 else
24209737 8961 return value_as_long (val);
4c4b4cd2
PH
8962}
8963
8964static struct value *
3cb382c9 8965value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8966{
3cb382c9 8967 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8968}
8969
4c4b4cd2 8970/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8971
d2e4a39e
AS
8972static struct value *
8973value_val_atr (struct type *type, struct value *arg)
14f9c5c9 8974{
d2e4a39e 8975 if (!discrete_type_p (type))
323e0a4a 8976 error (_("'VAL only defined on discrete types"));
df407dfe 8977 if (!integer_type_p (value_type (arg)))
323e0a4a 8978 error (_("'VAL requires integral argument"));
14f9c5c9
AS
8979
8980 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8981 {
8982 long pos = value_as_long (arg);
5b4ee69b 8983
14f9c5c9 8984 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 8985 error (_("argument to 'VAL out of range"));
14e75d8e 8986 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
8987 }
8988 else
8989 return value_from_longest (type, value_as_long (arg));
8990}
14f9c5c9 8991\f
d2e4a39e 8992
4c4b4cd2 8993 /* Evaluation */
14f9c5c9 8994
4c4b4cd2
PH
8995/* True if TYPE appears to be an Ada character type.
8996 [At the moment, this is true only for Character and Wide_Character;
8997 It is a heuristic test that could stand improvement]. */
14f9c5c9 8998
d2e4a39e
AS
8999int
9000ada_is_character_type (struct type *type)
14f9c5c9 9001{
7b9f71f2
JB
9002 const char *name;
9003
9004 /* If the type code says it's a character, then assume it really is,
9005 and don't check any further. */
9006 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
9007 return 1;
9008
9009 /* Otherwise, assume it's a character type iff it is a discrete type
9010 with a known character type name. */
9011 name = ada_type_name (type);
9012 return (name != NULL
9013 && (TYPE_CODE (type) == TYPE_CODE_INT
9014 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9015 && (strcmp (name, "character") == 0
9016 || strcmp (name, "wide_character") == 0
5a517ebd 9017 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9018 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9019}
9020
4c4b4cd2 9021/* True if TYPE appears to be an Ada string type. */
14f9c5c9
AS
9022
9023int
ebf56fd3 9024ada_is_string_type (struct type *type)
14f9c5c9 9025{
61ee279c 9026 type = ada_check_typedef (type);
d2e4a39e 9027 if (type != NULL
14f9c5c9 9028 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9029 && (ada_is_simple_array_type (type)
9030 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9031 && ada_array_arity (type) == 1)
9032 {
9033 struct type *elttype = ada_array_element_type (type, 1);
9034
9035 return ada_is_character_type (elttype);
9036 }
d2e4a39e 9037 else
14f9c5c9
AS
9038 return 0;
9039}
9040
5bf03f13
JB
9041/* The compiler sometimes provides a parallel XVS type for a given
9042 PAD type. Normally, it is safe to follow the PAD type directly,
9043 but older versions of the compiler have a bug that causes the offset
9044 of its "F" field to be wrong. Following that field in that case
9045 would lead to incorrect results, but this can be worked around
9046 by ignoring the PAD type and using the associated XVS type instead.
9047
9048 Set to True if the debugger should trust the contents of PAD types.
9049 Otherwise, ignore the PAD type if there is a parallel XVS type. */
9050static int trust_pad_over_xvs = 1;
14f9c5c9
AS
9051
9052/* True if TYPE is a struct type introduced by the compiler to force the
9053 alignment of a value. Such types have a single field with a
4c4b4cd2 9054 distinctive name. */
14f9c5c9
AS
9055
9056int
ebf56fd3 9057ada_is_aligner_type (struct type *type)
14f9c5c9 9058{
61ee279c 9059 type = ada_check_typedef (type);
714e53ab 9060
5bf03f13 9061 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9062 return 0;
9063
14f9c5c9 9064 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9065 && TYPE_NFIELDS (type) == 1
9066 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9067}
9068
9069/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9070 the parallel type. */
14f9c5c9 9071
d2e4a39e
AS
9072struct type *
9073ada_get_base_type (struct type *raw_type)
14f9c5c9 9074{
d2e4a39e
AS
9075 struct type *real_type_namer;
9076 struct type *raw_real_type;
14f9c5c9
AS
9077
9078 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9079 return raw_type;
9080
284614f0
JB
9081 if (ada_is_aligner_type (raw_type))
9082 /* The encoding specifies that we should always use the aligner type.
9083 So, even if this aligner type has an associated XVS type, we should
9084 simply ignore it.
9085
9086 According to the compiler gurus, an XVS type parallel to an aligner
9087 type may exist because of a stabs limitation. In stabs, aligner
9088 types are empty because the field has a variable-sized type, and
9089 thus cannot actually be used as an aligner type. As a result,
9090 we need the associated parallel XVS type to decode the type.
9091 Since the policy in the compiler is to not change the internal
9092 representation based on the debugging info format, we sometimes
9093 end up having a redundant XVS type parallel to the aligner type. */
9094 return raw_type;
9095
14f9c5c9 9096 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9097 if (real_type_namer == NULL
14f9c5c9
AS
9098 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9099 || TYPE_NFIELDS (real_type_namer) != 1)
9100 return raw_type;
9101
f80d3ff2
JB
9102 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9103 {
9104 /* This is an older encoding form where the base type needs to be
9105 looked up by name. We prefer the newer enconding because it is
9106 more efficient. */
9107 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9108 if (raw_real_type == NULL)
9109 return raw_type;
9110 else
9111 return raw_real_type;
9112 }
9113
9114 /* The field in our XVS type is a reference to the base type. */
9115 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9116}
14f9c5c9 9117
4c4b4cd2 9118/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9119
d2e4a39e
AS
9120struct type *
9121ada_aligned_type (struct type *type)
14f9c5c9
AS
9122{
9123 if (ada_is_aligner_type (type))
9124 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9125 else
9126 return ada_get_base_type (type);
9127}
9128
9129
9130/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9131 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9132
fc1a4b47
AC
9133const gdb_byte *
9134ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9135{
d2e4a39e 9136 if (ada_is_aligner_type (type))
14f9c5c9 9137 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9138 valaddr +
9139 TYPE_FIELD_BITPOS (type,
9140 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9141 else
9142 return valaddr;
9143}
9144
4c4b4cd2
PH
9145
9146
14f9c5c9 9147/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9148 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9149const char *
9150ada_enum_name (const char *name)
14f9c5c9 9151{
4c4b4cd2
PH
9152 static char *result;
9153 static size_t result_len = 0;
d2e4a39e 9154 char *tmp;
14f9c5c9 9155
4c4b4cd2
PH
9156 /* First, unqualify the enumeration name:
9157 1. Search for the last '.' character. If we find one, then skip
177b42fe 9158 all the preceding characters, the unqualified name starts
76a01679 9159 right after that dot.
4c4b4cd2 9160 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9161 translates dots into "__". Search forward for double underscores,
9162 but stop searching when we hit an overloading suffix, which is
9163 of the form "__" followed by digits. */
4c4b4cd2 9164
c3e5cd34
PH
9165 tmp = strrchr (name, '.');
9166 if (tmp != NULL)
4c4b4cd2
PH
9167 name = tmp + 1;
9168 else
14f9c5c9 9169 {
4c4b4cd2
PH
9170 while ((tmp = strstr (name, "__")) != NULL)
9171 {
9172 if (isdigit (tmp[2]))
9173 break;
9174 else
9175 name = tmp + 2;
9176 }
14f9c5c9
AS
9177 }
9178
9179 if (name[0] == 'Q')
9180 {
14f9c5c9 9181 int v;
5b4ee69b 9182
14f9c5c9 9183 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9184 {
9185 if (sscanf (name + 2, "%x", &v) != 1)
9186 return name;
9187 }
14f9c5c9 9188 else
4c4b4cd2 9189 return name;
14f9c5c9 9190
4c4b4cd2 9191 GROW_VECT (result, result_len, 16);
14f9c5c9 9192 if (isascii (v) && isprint (v))
88c15c34 9193 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9194 else if (name[1] == 'U')
88c15c34 9195 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9196 else
88c15c34 9197 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9198
9199 return result;
9200 }
d2e4a39e 9201 else
4c4b4cd2 9202 {
c3e5cd34
PH
9203 tmp = strstr (name, "__");
9204 if (tmp == NULL)
9205 tmp = strstr (name, "$");
9206 if (tmp != NULL)
4c4b4cd2
PH
9207 {
9208 GROW_VECT (result, result_len, tmp - name + 1);
9209 strncpy (result, name, tmp - name);
9210 result[tmp - name] = '\0';
9211 return result;
9212 }
9213
9214 return name;
9215 }
14f9c5c9
AS
9216}
9217
14f9c5c9
AS
9218/* Evaluate the subexpression of EXP starting at *POS as for
9219 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9220 expression. */
14f9c5c9 9221
d2e4a39e
AS
9222static struct value *
9223evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9224{
4b27a620 9225 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9226}
9227
9228/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9229 value it wraps. */
14f9c5c9 9230
d2e4a39e
AS
9231static struct value *
9232unwrap_value (struct value *val)
14f9c5c9 9233{
df407dfe 9234 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9235
14f9c5c9
AS
9236 if (ada_is_aligner_type (type))
9237 {
de4d072f 9238 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9239 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9240
14f9c5c9 9241 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9242 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9243
9244 return unwrap_value (v);
9245 }
d2e4a39e 9246 else
14f9c5c9 9247 {
d2e4a39e 9248 struct type *raw_real_type =
61ee279c 9249 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9250
5bf03f13
JB
9251 /* If there is no parallel XVS or XVE type, then the value is
9252 already unwrapped. Return it without further modification. */
9253 if ((type == raw_real_type)
9254 && ada_find_parallel_type (type, "___XVE") == NULL)
9255 return val;
14f9c5c9 9256
d2e4a39e 9257 return
4c4b4cd2
PH
9258 coerce_unspec_val_to_type
9259 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9260 value_address (val),
1ed6ede0 9261 NULL, 1));
14f9c5c9
AS
9262 }
9263}
d2e4a39e
AS
9264
9265static struct value *
9266cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9
AS
9267{
9268 LONGEST val;
9269
df407dfe 9270 if (type == value_type (arg))
14f9c5c9 9271 return arg;
df407dfe 9272 else if (ada_is_fixed_point_type (value_type (arg)))
d2e4a39e 9273 val = ada_float_to_fixed (type,
df407dfe 9274 ada_fixed_to_float (value_type (arg),
4c4b4cd2 9275 value_as_long (arg)));
d2e4a39e 9276 else
14f9c5c9 9277 {
a53b7a21 9278 DOUBLEST argd = value_as_double (arg);
5b4ee69b 9279
14f9c5c9
AS
9280 val = ada_float_to_fixed (type, argd);
9281 }
9282
9283 return value_from_longest (type, val);
9284}
9285
d2e4a39e 9286static struct value *
a53b7a21 9287cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9288{
df407dfe 9289 DOUBLEST val = ada_fixed_to_float (value_type (arg),
4c4b4cd2 9290 value_as_long (arg));
5b4ee69b 9291
a53b7a21 9292 return value_from_double (type, val);
14f9c5c9
AS
9293}
9294
d99dcf51
JB
9295/* Given two array types T1 and T2, return nonzero iff both arrays
9296 contain the same number of elements. */
9297
9298static int
9299ada_same_array_size_p (struct type *t1, struct type *t2)
9300{
9301 LONGEST lo1, hi1, lo2, hi2;
9302
9303 /* Get the array bounds in order to verify that the size of
9304 the two arrays match. */
9305 if (!get_array_bounds (t1, &lo1, &hi1)
9306 || !get_array_bounds (t2, &lo2, &hi2))
9307 error (_("unable to determine array bounds"));
9308
9309 /* To make things easier for size comparison, normalize a bit
9310 the case of empty arrays by making sure that the difference
9311 between upper bound and lower bound is always -1. */
9312 if (lo1 > hi1)
9313 hi1 = lo1 - 1;
9314 if (lo2 > hi2)
9315 hi2 = lo2 - 1;
9316
9317 return (hi1 - lo1 == hi2 - lo2);
9318}
9319
9320/* Assuming that VAL is an array of integrals, and TYPE represents
9321 an array with the same number of elements, but with wider integral
9322 elements, return an array "casted" to TYPE. In practice, this
9323 means that the returned array is built by casting each element
9324 of the original array into TYPE's (wider) element type. */
9325
9326static struct value *
9327ada_promote_array_of_integrals (struct type *type, struct value *val)
9328{
9329 struct type *elt_type = TYPE_TARGET_TYPE (type);
9330 LONGEST lo, hi;
9331 struct value *res;
9332 LONGEST i;
9333
9334 /* Verify that both val and type are arrays of scalars, and
9335 that the size of val's elements is smaller than the size
9336 of type's element. */
9337 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9338 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9339 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9340 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9341 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9342 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9343
9344 if (!get_array_bounds (type, &lo, &hi))
9345 error (_("unable to determine array bounds"));
9346
9347 res = allocate_value (type);
9348
9349 /* Promote each array element. */
9350 for (i = 0; i < hi - lo + 1; i++)
9351 {
9352 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9353
9354 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9355 value_contents_all (elt), TYPE_LENGTH (elt_type));
9356 }
9357
9358 return res;
9359}
9360
4c4b4cd2
PH
9361/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9362 return the converted value. */
9363
d2e4a39e
AS
9364static struct value *
9365coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9366{
df407dfe 9367 struct type *type2 = value_type (val);
5b4ee69b 9368
14f9c5c9
AS
9369 if (type == type2)
9370 return val;
9371
61ee279c
PH
9372 type2 = ada_check_typedef (type2);
9373 type = ada_check_typedef (type);
14f9c5c9 9374
d2e4a39e
AS
9375 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9376 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9377 {
9378 val = ada_value_ind (val);
df407dfe 9379 type2 = value_type (val);
14f9c5c9
AS
9380 }
9381
d2e4a39e 9382 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9383 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9384 {
d99dcf51
JB
9385 if (!ada_same_array_size_p (type, type2))
9386 error (_("cannot assign arrays of different length"));
9387
9388 if (is_integral_type (TYPE_TARGET_TYPE (type))
9389 && is_integral_type (TYPE_TARGET_TYPE (type2))
9390 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9391 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9392 {
9393 /* Allow implicit promotion of the array elements to
9394 a wider type. */
9395 return ada_promote_array_of_integrals (type, val);
9396 }
9397
9398 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9399 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9400 error (_("Incompatible types in assignment"));
04624583 9401 deprecated_set_value_type (val, type);
14f9c5c9 9402 }
d2e4a39e 9403 return val;
14f9c5c9
AS
9404}
9405
4c4b4cd2
PH
9406static struct value *
9407ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9408{
9409 struct value *val;
9410 struct type *type1, *type2;
9411 LONGEST v, v1, v2;
9412
994b9211
AC
9413 arg1 = coerce_ref (arg1);
9414 arg2 = coerce_ref (arg2);
18af8284
JB
9415 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9416 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9417
76a01679
JB
9418 if (TYPE_CODE (type1) != TYPE_CODE_INT
9419 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9420 return value_binop (arg1, arg2, op);
9421
76a01679 9422 switch (op)
4c4b4cd2
PH
9423 {
9424 case BINOP_MOD:
9425 case BINOP_DIV:
9426 case BINOP_REM:
9427 break;
9428 default:
9429 return value_binop (arg1, arg2, op);
9430 }
9431
9432 v2 = value_as_long (arg2);
9433 if (v2 == 0)
323e0a4a 9434 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9435
9436 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9437 return value_binop (arg1, arg2, op);
9438
9439 v1 = value_as_long (arg1);
9440 switch (op)
9441 {
9442 case BINOP_DIV:
9443 v = v1 / v2;
76a01679
JB
9444 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9445 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9446 break;
9447 case BINOP_REM:
9448 v = v1 % v2;
76a01679
JB
9449 if (v * v1 < 0)
9450 v -= v2;
4c4b4cd2
PH
9451 break;
9452 default:
9453 /* Should not reach this point. */
9454 v = 0;
9455 }
9456
9457 val = allocate_value (type1);
990a07ab 9458 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9459 TYPE_LENGTH (value_type (val)),
9460 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9461 return val;
9462}
9463
9464static int
9465ada_value_equal (struct value *arg1, struct value *arg2)
9466{
df407dfe
AC
9467 if (ada_is_direct_array_type (value_type (arg1))
9468 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9469 {
f58b38bf
JB
9470 /* Automatically dereference any array reference before
9471 we attempt to perform the comparison. */
9472 arg1 = ada_coerce_ref (arg1);
9473 arg2 = ada_coerce_ref (arg2);
9474
4c4b4cd2
PH
9475 arg1 = ada_coerce_to_simple_array (arg1);
9476 arg2 = ada_coerce_to_simple_array (arg2);
df407dfe
AC
9477 if (TYPE_CODE (value_type (arg1)) != TYPE_CODE_ARRAY
9478 || TYPE_CODE (value_type (arg2)) != TYPE_CODE_ARRAY)
323e0a4a 9479 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9480 /* FIXME: The following works only for types whose
76a01679
JB
9481 representations use all bits (no padding or undefined bits)
9482 and do not have user-defined equality. */
9483 return
df407dfe 9484 TYPE_LENGTH (value_type (arg1)) == TYPE_LENGTH (value_type (arg2))
0fd88904 9485 && memcmp (value_contents (arg1), value_contents (arg2),
df407dfe 9486 TYPE_LENGTH (value_type (arg1))) == 0;
4c4b4cd2
PH
9487 }
9488 return value_equal (arg1, arg2);
9489}
9490
52ce6436
PH
9491/* Total number of component associations in the aggregate starting at
9492 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9493 OP_AGGREGATE. */
52ce6436
PH
9494
9495static int
9496num_component_specs (struct expression *exp, int pc)
9497{
9498 int n, m, i;
5b4ee69b 9499
52ce6436
PH
9500 m = exp->elts[pc + 1].longconst;
9501 pc += 3;
9502 n = 0;
9503 for (i = 0; i < m; i += 1)
9504 {
9505 switch (exp->elts[pc].opcode)
9506 {
9507 default:
9508 n += 1;
9509 break;
9510 case OP_CHOICES:
9511 n += exp->elts[pc + 1].longconst;
9512 break;
9513 }
9514 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9515 }
9516 return n;
9517}
9518
9519/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9520 component of LHS (a simple array or a record), updating *POS past
9521 the expression, assuming that LHS is contained in CONTAINER. Does
9522 not modify the inferior's memory, nor does it modify LHS (unless
9523 LHS == CONTAINER). */
9524
9525static void
9526assign_component (struct value *container, struct value *lhs, LONGEST index,
9527 struct expression *exp, int *pos)
9528{
9529 struct value *mark = value_mark ();
9530 struct value *elt;
5b4ee69b 9531
52ce6436
PH
9532 if (TYPE_CODE (value_type (lhs)) == TYPE_CODE_ARRAY)
9533 {
22601c15
UW
9534 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9535 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9536
52ce6436
PH
9537 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9538 }
9539 else
9540 {
9541 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9542 elt = ada_to_fixed_value (elt);
52ce6436
PH
9543 }
9544
9545 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9546 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9547 else
9548 value_assign_to_component (container, elt,
9549 ada_evaluate_subexp (NULL, exp, pos,
9550 EVAL_NORMAL));
9551
9552 value_free_to_mark (mark);
9553}
9554
9555/* Assuming that LHS represents an lvalue having a record or array
9556 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9557 of that aggregate's value to LHS, advancing *POS past the
9558 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9559 lvalue containing LHS (possibly LHS itself). Does not modify
9560 the inferior's memory, nor does it modify the contents of
0963b4bd 9561 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9562
9563static struct value *
9564assign_aggregate (struct value *container,
9565 struct value *lhs, struct expression *exp,
9566 int *pos, enum noside noside)
9567{
9568 struct type *lhs_type;
9569 int n = exp->elts[*pos+1].longconst;
9570 LONGEST low_index, high_index;
9571 int num_specs;
9572 LONGEST *indices;
9573 int max_indices, num_indices;
52ce6436 9574 int i;
52ce6436
PH
9575
9576 *pos += 3;
9577 if (noside != EVAL_NORMAL)
9578 {
52ce6436
PH
9579 for (i = 0; i < n; i += 1)
9580 ada_evaluate_subexp (NULL, exp, pos, noside);
9581 return container;
9582 }
9583
9584 container = ada_coerce_ref (container);
9585 if (ada_is_direct_array_type (value_type (container)))
9586 container = ada_coerce_to_simple_array (container);
9587 lhs = ada_coerce_ref (lhs);
9588 if (!deprecated_value_modifiable (lhs))
9589 error (_("Left operand of assignment is not a modifiable lvalue."));
9590
9591 lhs_type = value_type (lhs);
9592 if (ada_is_direct_array_type (lhs_type))
9593 {
9594 lhs = ada_coerce_to_simple_array (lhs);
9595 lhs_type = value_type (lhs);
9596 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9597 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9598 }
9599 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9600 {
9601 low_index = 0;
9602 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9603 }
9604 else
9605 error (_("Left-hand side must be array or record."));
9606
9607 num_specs = num_component_specs (exp, *pos - 3);
9608 max_indices = 4 * num_specs + 4;
9609 indices = alloca (max_indices * sizeof (indices[0]));
9610 indices[0] = indices[1] = low_index - 1;
9611 indices[2] = indices[3] = high_index + 1;
9612 num_indices = 4;
9613
9614 for (i = 0; i < n; i += 1)
9615 {
9616 switch (exp->elts[*pos].opcode)
9617 {
1fbf5ada
JB
9618 case OP_CHOICES:
9619 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9620 &num_indices, max_indices,
9621 low_index, high_index);
9622 break;
9623 case OP_POSITIONAL:
9624 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9625 &num_indices, max_indices,
9626 low_index, high_index);
1fbf5ada
JB
9627 break;
9628 case OP_OTHERS:
9629 if (i != n-1)
9630 error (_("Misplaced 'others' clause"));
9631 aggregate_assign_others (container, lhs, exp, pos, indices,
9632 num_indices, low_index, high_index);
9633 break;
9634 default:
9635 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9636 }
9637 }
9638
9639 return container;
9640}
9641
9642/* Assign into the component of LHS indexed by the OP_POSITIONAL
9643 construct at *POS, updating *POS past the construct, given that
9644 the positions are relative to lower bound LOW, where HIGH is the
9645 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9646 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9647 assign_aggregate. */
52ce6436
PH
9648static void
9649aggregate_assign_positional (struct value *container,
9650 struct value *lhs, struct expression *exp,
9651 int *pos, LONGEST *indices, int *num_indices,
9652 int max_indices, LONGEST low, LONGEST high)
9653{
9654 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9655
9656 if (ind - 1 == high)
e1d5a0d2 9657 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9658 if (ind <= high)
9659 {
9660 add_component_interval (ind, ind, indices, num_indices, max_indices);
9661 *pos += 3;
9662 assign_component (container, lhs, ind, exp, pos);
9663 }
9664 else
9665 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9666}
9667
9668/* Assign into the components of LHS indexed by the OP_CHOICES
9669 construct at *POS, updating *POS past the construct, given that
9670 the allowable indices are LOW..HIGH. Record the indices assigned
9671 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9672 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9673static void
9674aggregate_assign_from_choices (struct value *container,
9675 struct value *lhs, struct expression *exp,
9676 int *pos, LONGEST *indices, int *num_indices,
9677 int max_indices, LONGEST low, LONGEST high)
9678{
9679 int j;
9680 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9681 int choice_pos, expr_pc;
9682 int is_array = ada_is_direct_array_type (value_type (lhs));
9683
9684 choice_pos = *pos += 3;
9685
9686 for (j = 0; j < n_choices; j += 1)
9687 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9688 expr_pc = *pos;
9689 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9690
9691 for (j = 0; j < n_choices; j += 1)
9692 {
9693 LONGEST lower, upper;
9694 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9695
52ce6436
PH
9696 if (op == OP_DISCRETE_RANGE)
9697 {
9698 choice_pos += 1;
9699 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9700 EVAL_NORMAL));
9701 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9702 EVAL_NORMAL));
9703 }
9704 else if (is_array)
9705 {
9706 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9707 EVAL_NORMAL));
9708 upper = lower;
9709 }
9710 else
9711 {
9712 int ind;
0d5cff50 9713 const char *name;
5b4ee69b 9714
52ce6436
PH
9715 switch (op)
9716 {
9717 case OP_NAME:
9718 name = &exp->elts[choice_pos + 2].string;
9719 break;
9720 case OP_VAR_VALUE:
9721 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9722 break;
9723 default:
9724 error (_("Invalid record component association."));
9725 }
9726 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9727 ind = 0;
9728 if (! find_struct_field (name, value_type (lhs), 0,
9729 NULL, NULL, NULL, NULL, &ind))
9730 error (_("Unknown component name: %s."), name);
9731 lower = upper = ind;
9732 }
9733
9734 if (lower <= upper && (lower < low || upper > high))
9735 error (_("Index in component association out of bounds."));
9736
9737 add_component_interval (lower, upper, indices, num_indices,
9738 max_indices);
9739 while (lower <= upper)
9740 {
9741 int pos1;
5b4ee69b 9742
52ce6436
PH
9743 pos1 = expr_pc;
9744 assign_component (container, lhs, lower, exp, &pos1);
9745 lower += 1;
9746 }
9747 }
9748}
9749
9750/* Assign the value of the expression in the OP_OTHERS construct in
9751 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9752 have not been previously assigned. The index intervals already assigned
9753 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9754 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9755static void
9756aggregate_assign_others (struct value *container,
9757 struct value *lhs, struct expression *exp,
9758 int *pos, LONGEST *indices, int num_indices,
9759 LONGEST low, LONGEST high)
9760{
9761 int i;
5ce64950 9762 int expr_pc = *pos + 1;
52ce6436
PH
9763
9764 for (i = 0; i < num_indices - 2; i += 2)
9765 {
9766 LONGEST ind;
5b4ee69b 9767
52ce6436
PH
9768 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9769 {
5ce64950 9770 int localpos;
5b4ee69b 9771
5ce64950
MS
9772 localpos = expr_pc;
9773 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9774 }
9775 }
9776 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9777}
9778
9779/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9780 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9781 modifying *SIZE as needed. It is an error if *SIZE exceeds
9782 MAX_SIZE. The resulting intervals do not overlap. */
9783static void
9784add_component_interval (LONGEST low, LONGEST high,
9785 LONGEST* indices, int *size, int max_size)
9786{
9787 int i, j;
5b4ee69b 9788
52ce6436
PH
9789 for (i = 0; i < *size; i += 2) {
9790 if (high >= indices[i] && low <= indices[i + 1])
9791 {
9792 int kh;
5b4ee69b 9793
52ce6436
PH
9794 for (kh = i + 2; kh < *size; kh += 2)
9795 if (high < indices[kh])
9796 break;
9797 if (low < indices[i])
9798 indices[i] = low;
9799 indices[i + 1] = indices[kh - 1];
9800 if (high > indices[i + 1])
9801 indices[i + 1] = high;
9802 memcpy (indices + i + 2, indices + kh, *size - kh);
9803 *size -= kh - i - 2;
9804 return;
9805 }
9806 else if (high < indices[i])
9807 break;
9808 }
9809
9810 if (*size == max_size)
9811 error (_("Internal error: miscounted aggregate components."));
9812 *size += 2;
9813 for (j = *size-1; j >= i+2; j -= 1)
9814 indices[j] = indices[j - 2];
9815 indices[i] = low;
9816 indices[i + 1] = high;
9817}
9818
6e48bd2c
JB
9819/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9820 is different. */
9821
9822static struct value *
9823ada_value_cast (struct type *type, struct value *arg2, enum noside noside)
9824{
9825 if (type == ada_check_typedef (value_type (arg2)))
9826 return arg2;
9827
9828 if (ada_is_fixed_point_type (type))
9829 return (cast_to_fixed (type, arg2));
9830
9831 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 9832 return cast_from_fixed (type, arg2);
6e48bd2c
JB
9833
9834 return value_cast (type, arg2);
9835}
9836
284614f0
JB
9837/* Evaluating Ada expressions, and printing their result.
9838 ------------------------------------------------------
9839
21649b50
JB
9840 1. Introduction:
9841 ----------------
9842
284614f0
JB
9843 We usually evaluate an Ada expression in order to print its value.
9844 We also evaluate an expression in order to print its type, which
9845 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9846 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9847 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9848 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9849 similar.
9850
9851 Evaluating expressions is a little more complicated for Ada entities
9852 than it is for entities in languages such as C. The main reason for
9853 this is that Ada provides types whose definition might be dynamic.
9854 One example of such types is variant records. Or another example
9855 would be an array whose bounds can only be known at run time.
9856
9857 The following description is a general guide as to what should be
9858 done (and what should NOT be done) in order to evaluate an expression
9859 involving such types, and when. This does not cover how the semantic
9860 information is encoded by GNAT as this is covered separatly. For the
9861 document used as the reference for the GNAT encoding, see exp_dbug.ads
9862 in the GNAT sources.
9863
9864 Ideally, we should embed each part of this description next to its
9865 associated code. Unfortunately, the amount of code is so vast right
9866 now that it's hard to see whether the code handling a particular
9867 situation might be duplicated or not. One day, when the code is
9868 cleaned up, this guide might become redundant with the comments
9869 inserted in the code, and we might want to remove it.
9870
21649b50
JB
9871 2. ``Fixing'' an Entity, the Simple Case:
9872 -----------------------------------------
9873
284614f0
JB
9874 When evaluating Ada expressions, the tricky issue is that they may
9875 reference entities whose type contents and size are not statically
9876 known. Consider for instance a variant record:
9877
9878 type Rec (Empty : Boolean := True) is record
9879 case Empty is
9880 when True => null;
9881 when False => Value : Integer;
9882 end case;
9883 end record;
9884 Yes : Rec := (Empty => False, Value => 1);
9885 No : Rec := (empty => True);
9886
9887 The size and contents of that record depends on the value of the
9888 descriminant (Rec.Empty). At this point, neither the debugging
9889 information nor the associated type structure in GDB are able to
9890 express such dynamic types. So what the debugger does is to create
9891 "fixed" versions of the type that applies to the specific object.
9892 We also informally refer to this opperation as "fixing" an object,
9893 which means creating its associated fixed type.
9894
9895 Example: when printing the value of variable "Yes" above, its fixed
9896 type would look like this:
9897
9898 type Rec is record
9899 Empty : Boolean;
9900 Value : Integer;
9901 end record;
9902
9903 On the other hand, if we printed the value of "No", its fixed type
9904 would become:
9905
9906 type Rec is record
9907 Empty : Boolean;
9908 end record;
9909
9910 Things become a little more complicated when trying to fix an entity
9911 with a dynamic type that directly contains another dynamic type,
9912 such as an array of variant records, for instance. There are
9913 two possible cases: Arrays, and records.
9914
21649b50
JB
9915 3. ``Fixing'' Arrays:
9916 ---------------------
9917
9918 The type structure in GDB describes an array in terms of its bounds,
9919 and the type of its elements. By design, all elements in the array
9920 have the same type and we cannot represent an array of variant elements
9921 using the current type structure in GDB. When fixing an array,
9922 we cannot fix the array element, as we would potentially need one
9923 fixed type per element of the array. As a result, the best we can do
9924 when fixing an array is to produce an array whose bounds and size
9925 are correct (allowing us to read it from memory), but without having
9926 touched its element type. Fixing each element will be done later,
9927 when (if) necessary.
9928
9929 Arrays are a little simpler to handle than records, because the same
9930 amount of memory is allocated for each element of the array, even if
1b536f04 9931 the amount of space actually used by each element differs from element
21649b50 9932 to element. Consider for instance the following array of type Rec:
284614f0
JB
9933
9934 type Rec_Array is array (1 .. 2) of Rec;
9935
1b536f04
JB
9936 The actual amount of memory occupied by each element might be different
9937 from element to element, depending on the value of their discriminant.
21649b50 9938 But the amount of space reserved for each element in the array remains
1b536f04 9939 fixed regardless. So we simply need to compute that size using
21649b50
JB
9940 the debugging information available, from which we can then determine
9941 the array size (we multiply the number of elements of the array by
9942 the size of each element).
9943
9944 The simplest case is when we have an array of a constrained element
9945 type. For instance, consider the following type declarations:
9946
9947 type Bounded_String (Max_Size : Integer) is
9948 Length : Integer;
9949 Buffer : String (1 .. Max_Size);
9950 end record;
9951 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
9952
9953 In this case, the compiler describes the array as an array of
9954 variable-size elements (identified by its XVS suffix) for which
9955 the size can be read in the parallel XVZ variable.
9956
9957 In the case of an array of an unconstrained element type, the compiler
9958 wraps the array element inside a private PAD type. This type should not
9959 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9960 that we also use the adjective "aligner" in our code to designate
9961 these wrapper types.
9962
1b536f04 9963 In some cases, the size allocated for each element is statically
21649b50
JB
9964 known. In that case, the PAD type already has the correct size,
9965 and the array element should remain unfixed.
9966
9967 But there are cases when this size is not statically known.
9968 For instance, assuming that "Five" is an integer variable:
284614f0
JB
9969
9970 type Dynamic is array (1 .. Five) of Integer;
9971 type Wrapper (Has_Length : Boolean := False) is record
9972 Data : Dynamic;
9973 case Has_Length is
9974 when True => Length : Integer;
9975 when False => null;
9976 end case;
9977 end record;
9978 type Wrapper_Array is array (1 .. 2) of Wrapper;
9979
9980 Hello : Wrapper_Array := (others => (Has_Length => True,
9981 Data => (others => 17),
9982 Length => 1));
9983
9984
9985 The debugging info would describe variable Hello as being an
9986 array of a PAD type. The size of that PAD type is not statically
9987 known, but can be determined using a parallel XVZ variable.
9988 In that case, a copy of the PAD type with the correct size should
9989 be used for the fixed array.
9990
21649b50
JB
9991 3. ``Fixing'' record type objects:
9992 ----------------------------------
9993
9994 Things are slightly different from arrays in the case of dynamic
284614f0
JB
9995 record types. In this case, in order to compute the associated
9996 fixed type, we need to determine the size and offset of each of
9997 its components. This, in turn, requires us to compute the fixed
9998 type of each of these components.
9999
10000 Consider for instance the example:
10001
10002 type Bounded_String (Max_Size : Natural) is record
10003 Str : String (1 .. Max_Size);
10004 Length : Natural;
10005 end record;
10006 My_String : Bounded_String (Max_Size => 10);
10007
10008 In that case, the position of field "Length" depends on the size
10009 of field Str, which itself depends on the value of the Max_Size
21649b50 10010 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10011 we need to fix the type of field Str. Therefore, fixing a variant
10012 record requires us to fix each of its components.
10013
10014 However, if a component does not have a dynamic size, the component
10015 should not be fixed. In particular, fields that use a PAD type
10016 should not fixed. Here is an example where this might happen
10017 (assuming type Rec above):
10018
10019 type Container (Big : Boolean) is record
10020 First : Rec;
10021 After : Integer;
10022 case Big is
10023 when True => Another : Integer;
10024 when False => null;
10025 end case;
10026 end record;
10027 My_Container : Container := (Big => False,
10028 First => (Empty => True),
10029 After => 42);
10030
10031 In that example, the compiler creates a PAD type for component First,
10032 whose size is constant, and then positions the component After just
10033 right after it. The offset of component After is therefore constant
10034 in this case.
10035
10036 The debugger computes the position of each field based on an algorithm
10037 that uses, among other things, the actual position and size of the field
21649b50
JB
10038 preceding it. Let's now imagine that the user is trying to print
10039 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10040 end up computing the offset of field After based on the size of the
10041 fixed version of field First. And since in our example First has
10042 only one actual field, the size of the fixed type is actually smaller
10043 than the amount of space allocated to that field, and thus we would
10044 compute the wrong offset of field After.
10045
21649b50
JB
10046 To make things more complicated, we need to watch out for dynamic
10047 components of variant records (identified by the ___XVL suffix in
10048 the component name). Even if the target type is a PAD type, the size
10049 of that type might not be statically known. So the PAD type needs
10050 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10051 we might end up with the wrong size for our component. This can be
10052 observed with the following type declarations:
284614f0
JB
10053
10054 type Octal is new Integer range 0 .. 7;
10055 type Octal_Array is array (Positive range <>) of Octal;
10056 pragma Pack (Octal_Array);
10057
10058 type Octal_Buffer (Size : Positive) is record
10059 Buffer : Octal_Array (1 .. Size);
10060 Length : Integer;
10061 end record;
10062
10063 In that case, Buffer is a PAD type whose size is unset and needs
10064 to be computed by fixing the unwrapped type.
10065
21649b50
JB
10066 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10067 ----------------------------------------------------------
10068
10069 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10070 thus far, be actually fixed?
10071
10072 The answer is: Only when referencing that element. For instance
10073 when selecting one component of a record, this specific component
10074 should be fixed at that point in time. Or when printing the value
10075 of a record, each component should be fixed before its value gets
10076 printed. Similarly for arrays, the element of the array should be
10077 fixed when printing each element of the array, or when extracting
10078 one element out of that array. On the other hand, fixing should
10079 not be performed on the elements when taking a slice of an array!
10080
10081 Note that one of the side-effects of miscomputing the offset and
10082 size of each field is that we end up also miscomputing the size
10083 of the containing type. This can have adverse results when computing
10084 the value of an entity. GDB fetches the value of an entity based
10085 on the size of its type, and thus a wrong size causes GDB to fetch
10086 the wrong amount of memory. In the case where the computed size is
10087 too small, GDB fetches too little data to print the value of our
10088 entiry. Results in this case as unpredicatble, as we usually read
10089 past the buffer containing the data =:-o. */
10090
10091/* Implement the evaluate_exp routine in the exp_descriptor structure
10092 for the Ada language. */
10093
52ce6436 10094static struct value *
ebf56fd3 10095ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10096 int *pos, enum noside noside)
14f9c5c9
AS
10097{
10098 enum exp_opcode op;
b5385fc0 10099 int tem;
14f9c5c9 10100 int pc;
5ec18f2b 10101 int preeval_pos;
14f9c5c9
AS
10102 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10103 struct type *type;
52ce6436 10104 int nargs, oplen;
d2e4a39e 10105 struct value **argvec;
14f9c5c9 10106
d2e4a39e
AS
10107 pc = *pos;
10108 *pos += 1;
14f9c5c9
AS
10109 op = exp->elts[pc].opcode;
10110
d2e4a39e 10111 switch (op)
14f9c5c9
AS
10112 {
10113 default:
10114 *pos -= 1;
6e48bd2c 10115 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10116
10117 if (noside == EVAL_NORMAL)
10118 arg1 = unwrap_value (arg1);
6e48bd2c
JB
10119
10120 /* If evaluating an OP_DOUBLE and an EXPECT_TYPE was provided,
10121 then we need to perform the conversion manually, because
10122 evaluate_subexp_standard doesn't do it. This conversion is
10123 necessary in Ada because the different kinds of float/fixed
10124 types in Ada have different representations.
10125
10126 Similarly, we need to perform the conversion from OP_LONG
10127 ourselves. */
10128 if ((op == OP_DOUBLE || op == OP_LONG) && expect_type != NULL)
10129 arg1 = ada_value_cast (expect_type, arg1, noside);
10130
10131 return arg1;
4c4b4cd2
PH
10132
10133 case OP_STRING:
10134 {
76a01679 10135 struct value *result;
5b4ee69b 10136
76a01679
JB
10137 *pos -= 1;
10138 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10139 /* The result type will have code OP_STRING, bashed there from
10140 OP_ARRAY. Bash it back. */
df407dfe
AC
10141 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10142 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10143 return result;
4c4b4cd2 10144 }
14f9c5c9
AS
10145
10146 case UNOP_CAST:
10147 (*pos) += 2;
10148 type = exp->elts[pc + 1].type;
10149 arg1 = evaluate_subexp (type, exp, pos, noside);
10150 if (noside == EVAL_SKIP)
4c4b4cd2 10151 goto nosideret;
6e48bd2c 10152 arg1 = ada_value_cast (type, arg1, noside);
14f9c5c9
AS
10153 return arg1;
10154
4c4b4cd2
PH
10155 case UNOP_QUAL:
10156 (*pos) += 2;
10157 type = exp->elts[pc + 1].type;
10158 return ada_evaluate_subexp (type, exp, pos, noside);
10159
14f9c5c9
AS
10160 case BINOP_ASSIGN:
10161 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10162 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10163 {
10164 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10165 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10166 return arg1;
10167 return ada_value_assign (arg1, arg1);
10168 }
003f3813
JB
10169 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10170 except if the lhs of our assignment is a convenience variable.
10171 In the case of assigning to a convenience variable, the lhs
10172 should be exactly the result of the evaluation of the rhs. */
10173 type = value_type (arg1);
10174 if (VALUE_LVAL (arg1) == lval_internalvar)
10175 type = NULL;
10176 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10177 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10178 return arg1;
df407dfe
AC
10179 if (ada_is_fixed_point_type (value_type (arg1)))
10180 arg2 = cast_to_fixed (value_type (arg1), arg2);
10181 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10182 error
323e0a4a 10183 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10184 else
df407dfe 10185 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10186 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10187
10188 case BINOP_ADD:
10189 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10190 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10191 if (noside == EVAL_SKIP)
4c4b4cd2 10192 goto nosideret;
2ac8a782
JB
10193 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10194 return (value_from_longest
10195 (value_type (arg1),
10196 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10197 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10198 return (value_from_longest
10199 (value_type (arg2),
10200 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10201 if ((ada_is_fixed_point_type (value_type (arg1))
10202 || ada_is_fixed_point_type (value_type (arg2)))
10203 && value_type (arg1) != value_type (arg2))
323e0a4a 10204 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10205 /* Do the addition, and cast the result to the type of the first
10206 argument. We cannot cast the result to a reference type, so if
10207 ARG1 is a reference type, find its underlying type. */
10208 type = value_type (arg1);
10209 while (TYPE_CODE (type) == TYPE_CODE_REF)
10210 type = TYPE_TARGET_TYPE (type);
f44316fa 10211 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10212 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10213
10214 case BINOP_SUB:
10215 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10216 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10217 if (noside == EVAL_SKIP)
4c4b4cd2 10218 goto nosideret;
2ac8a782
JB
10219 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10220 return (value_from_longest
10221 (value_type (arg1),
10222 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10223 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10224 return (value_from_longest
10225 (value_type (arg2),
10226 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10227 if ((ada_is_fixed_point_type (value_type (arg1))
10228 || ada_is_fixed_point_type (value_type (arg2)))
10229 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10230 error (_("Operands of fixed-point subtraction "
10231 "must have the same type"));
b7789565
JB
10232 /* Do the substraction, and cast the result to the type of the first
10233 argument. We cannot cast the result to a reference type, so if
10234 ARG1 is a reference type, find its underlying type. */
10235 type = value_type (arg1);
10236 while (TYPE_CODE (type) == TYPE_CODE_REF)
10237 type = TYPE_TARGET_TYPE (type);
f44316fa 10238 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10239 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10240
10241 case BINOP_MUL:
10242 case BINOP_DIV:
e1578042
JB
10243 case BINOP_REM:
10244 case BINOP_MOD:
14f9c5c9
AS
10245 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10246 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10247 if (noside == EVAL_SKIP)
4c4b4cd2 10248 goto nosideret;
e1578042 10249 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10250 {
10251 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10252 return value_zero (value_type (arg1), not_lval);
10253 }
14f9c5c9 10254 else
4c4b4cd2 10255 {
a53b7a21 10256 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10257 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10258 arg1 = cast_from_fixed (type, arg1);
df407dfe 10259 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10260 arg2 = cast_from_fixed (type, arg2);
f44316fa 10261 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10262 return ada_value_binop (arg1, arg2, op);
10263 }
10264
4c4b4cd2
PH
10265 case BINOP_EQUAL:
10266 case BINOP_NOTEQUAL:
14f9c5c9 10267 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10268 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10269 if (noside == EVAL_SKIP)
76a01679 10270 goto nosideret;
4c4b4cd2 10271 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10272 tem = 0;
4c4b4cd2 10273 else
f44316fa
UW
10274 {
10275 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10276 tem = ada_value_equal (arg1, arg2);
10277 }
4c4b4cd2 10278 if (op == BINOP_NOTEQUAL)
76a01679 10279 tem = !tem;
fbb06eb1
UW
10280 type = language_bool_type (exp->language_defn, exp->gdbarch);
10281 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10282
10283 case UNOP_NEG:
10284 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10285 if (noside == EVAL_SKIP)
10286 goto nosideret;
df407dfe
AC
10287 else if (ada_is_fixed_point_type (value_type (arg1)))
10288 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10289 else
f44316fa
UW
10290 {
10291 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10292 return value_neg (arg1);
10293 }
4c4b4cd2 10294
2330c6c6
JB
10295 case BINOP_LOGICAL_AND:
10296 case BINOP_LOGICAL_OR:
10297 case UNOP_LOGICAL_NOT:
000d5124
JB
10298 {
10299 struct value *val;
10300
10301 *pos -= 1;
10302 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10303 type = language_bool_type (exp->language_defn, exp->gdbarch);
10304 return value_cast (type, val);
000d5124 10305 }
2330c6c6
JB
10306
10307 case BINOP_BITWISE_AND:
10308 case BINOP_BITWISE_IOR:
10309 case BINOP_BITWISE_XOR:
000d5124
JB
10310 {
10311 struct value *val;
10312
10313 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10314 *pos = pc;
10315 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10316
10317 return value_cast (value_type (arg1), val);
10318 }
2330c6c6 10319
14f9c5c9
AS
10320 case OP_VAR_VALUE:
10321 *pos -= 1;
6799def4 10322
14f9c5c9 10323 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10324 {
10325 *pos += 4;
10326 goto nosideret;
10327 }
da5c522f
JB
10328
10329 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10330 /* Only encountered when an unresolved symbol occurs in a
10331 context other than a function call, in which case, it is
52ce6436 10332 invalid. */
323e0a4a 10333 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10334 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10335
10336 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10337 {
0c1f74cf 10338 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10339 /* Check to see if this is a tagged type. We also need to handle
10340 the case where the type is a reference to a tagged type, but
10341 we have to be careful to exclude pointers to tagged types.
10342 The latter should be shown as usual (as a pointer), whereas
10343 a reference should mostly be transparent to the user. */
10344 if (ada_is_tagged_type (type, 0)
023db19c 10345 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10346 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10347 {
10348 /* Tagged types are a little special in the fact that the real
10349 type is dynamic and can only be determined by inspecting the
10350 object's tag. This means that we need to get the object's
10351 value first (EVAL_NORMAL) and then extract the actual object
10352 type from its tag.
10353
10354 Note that we cannot skip the final step where we extract
10355 the object type from its tag, because the EVAL_NORMAL phase
10356 results in dynamic components being resolved into fixed ones.
10357 This can cause problems when trying to print the type
10358 description of tagged types whose parent has a dynamic size:
10359 We use the type name of the "_parent" component in order
10360 to print the name of the ancestor type in the type description.
10361 If that component had a dynamic size, the resolution into
10362 a fixed type would result in the loss of that type name,
10363 thus preventing us from printing the name of the ancestor
10364 type in the type description. */
10365 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10366
10367 if (TYPE_CODE (type) != TYPE_CODE_REF)
10368 {
10369 struct type *actual_type;
10370
10371 actual_type = type_from_tag (ada_value_tag (arg1));
10372 if (actual_type == NULL)
10373 /* If, for some reason, we were unable to determine
10374 the actual type from the tag, then use the static
10375 approximation that we just computed as a fallback.
10376 This can happen if the debugging information is
10377 incomplete, for instance. */
10378 actual_type = type;
10379 return value_zero (actual_type, not_lval);
10380 }
10381 else
10382 {
10383 /* In the case of a ref, ada_coerce_ref takes care
10384 of determining the actual type. But the evaluation
10385 should return a ref as it should be valid to ask
10386 for its address; so rebuild a ref after coerce. */
10387 arg1 = ada_coerce_ref (arg1);
10388 return value_ref (arg1);
10389 }
10390 }
0c1f74cf 10391
84754697
JB
10392 /* Records and unions for which GNAT encodings have been
10393 generated need to be statically fixed as well.
10394 Otherwise, non-static fixing produces a type where
10395 all dynamic properties are removed, which prevents "ptype"
10396 from being able to completely describe the type.
10397 For instance, a case statement in a variant record would be
10398 replaced by the relevant components based on the actual
10399 value of the discriminants. */
10400 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10401 && dynamic_template_type (type) != NULL)
10402 || (TYPE_CODE (type) == TYPE_CODE_UNION
10403 && ada_find_parallel_type (type, "___XVU") != NULL))
10404 {
10405 *pos += 4;
10406 return value_zero (to_static_fixed_type (type), not_lval);
10407 }
4c4b4cd2 10408 }
da5c522f
JB
10409
10410 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10411 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10412
10413 case OP_FUNCALL:
10414 (*pos) += 2;
10415
10416 /* Allocate arg vector, including space for the function to be
10417 called in argvec[0] and a terminating NULL. */
10418 nargs = longest_to_int (exp->elts[pc + 1].longconst);
10419 argvec =
10420 (struct value **) alloca (sizeof (struct value *) * (nargs + 2));
10421
10422 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10423 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10424 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10425 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10426 else
10427 {
10428 for (tem = 0; tem <= nargs; tem += 1)
10429 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10430 argvec[tem] = 0;
10431
10432 if (noside == EVAL_SKIP)
10433 goto nosideret;
10434 }
10435
ad82864c
JB
10436 if (ada_is_constrained_packed_array_type
10437 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10438 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10439 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10440 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10441 /* This is a packed array that has already been fixed, and
10442 therefore already coerced to a simple array. Nothing further
10443 to do. */
10444 ;
df407dfe
AC
10445 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF
10446 || (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
76a01679 10447 && VALUE_LVAL (argvec[0]) == lval_memory))
4c4b4cd2
PH
10448 argvec[0] = value_addr (argvec[0]);
10449
df407dfe 10450 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10451
10452 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10453 them. So, if this is an array typedef (encoding use for array
10454 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10455 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10456 type = ada_typedef_target_type (type);
10457
4c4b4cd2
PH
10458 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10459 {
61ee279c 10460 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10461 {
10462 case TYPE_CODE_FUNC:
61ee279c 10463 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10464 break;
10465 case TYPE_CODE_ARRAY:
10466 break;
10467 case TYPE_CODE_STRUCT:
10468 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10469 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10470 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10471 break;
10472 default:
323e0a4a 10473 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10474 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10475 break;
10476 }
10477 }
10478
10479 switch (TYPE_CODE (type))
10480 {
10481 case TYPE_CODE_FUNC:
10482 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972
PH
10483 {
10484 struct type *rtype = TYPE_TARGET_TYPE (type);
10485
10486 if (TYPE_GNU_IFUNC (type))
10487 return allocate_value (TYPE_TARGET_TYPE (rtype));
10488 return allocate_value (rtype);
10489 }
4c4b4cd2 10490 return call_function_by_hand (argvec[0], nargs, argvec + 1);
c8ea1972
PH
10491 case TYPE_CODE_INTERNAL_FUNCTION:
10492 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10493 /* We don't know anything about what the internal
10494 function might return, but we have to return
10495 something. */
10496 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10497 not_lval);
10498 else
10499 return call_internal_function (exp->gdbarch, exp->language_defn,
10500 argvec[0], nargs, argvec + 1);
10501
4c4b4cd2
PH
10502 case TYPE_CODE_STRUCT:
10503 {
10504 int arity;
10505
4c4b4cd2
PH
10506 arity = ada_array_arity (type);
10507 type = ada_array_element_type (type, nargs);
10508 if (type == NULL)
323e0a4a 10509 error (_("cannot subscript or call a record"));
4c4b4cd2 10510 if (arity != nargs)
323e0a4a 10511 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10512 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10513 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10514 return
10515 unwrap_value (ada_value_subscript
10516 (argvec[0], nargs, argvec + 1));
10517 }
10518 case TYPE_CODE_ARRAY:
10519 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10520 {
10521 type = ada_array_element_type (type, nargs);
10522 if (type == NULL)
323e0a4a 10523 error (_("element type of array unknown"));
4c4b4cd2 10524 else
0a07e705 10525 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10526 }
10527 return
10528 unwrap_value (ada_value_subscript
10529 (ada_coerce_to_simple_array (argvec[0]),
10530 nargs, argvec + 1));
10531 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10532 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10533 {
deede10c 10534 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10535 type = ada_array_element_type (type, nargs);
10536 if (type == NULL)
323e0a4a 10537 error (_("element type of array unknown"));
4c4b4cd2 10538 else
0a07e705 10539 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10540 }
10541 return
deede10c
JB
10542 unwrap_value (ada_value_ptr_subscript (argvec[0],
10543 nargs, argvec + 1));
4c4b4cd2
PH
10544
10545 default:
e1d5a0d2
PH
10546 error (_("Attempt to index or call something other than an "
10547 "array or function"));
4c4b4cd2
PH
10548 }
10549
10550 case TERNOP_SLICE:
10551 {
10552 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10553 struct value *low_bound_val =
10554 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10555 struct value *high_bound_val =
10556 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10557 LONGEST low_bound;
10558 LONGEST high_bound;
5b4ee69b 10559
994b9211
AC
10560 low_bound_val = coerce_ref (low_bound_val);
10561 high_bound_val = coerce_ref (high_bound_val);
714e53ab
PH
10562 low_bound = pos_atr (low_bound_val);
10563 high_bound = pos_atr (high_bound_val);
963a6417 10564
4c4b4cd2
PH
10565 if (noside == EVAL_SKIP)
10566 goto nosideret;
10567
4c4b4cd2
PH
10568 /* If this is a reference to an aligner type, then remove all
10569 the aligners. */
df407dfe
AC
10570 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10571 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10572 TYPE_TARGET_TYPE (value_type (array)) =
10573 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10574
ad82864c 10575 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10576 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10577
10578 /* If this is a reference to an array or an array lvalue,
10579 convert to a pointer. */
df407dfe
AC
10580 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10581 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10582 && VALUE_LVAL (array) == lval_memory))
10583 array = value_addr (array);
10584
1265e4aa 10585 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10586 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10587 (value_type (array))))
0b5d8877 10588 return empty_array (ada_type_of_array (array, 0), low_bound);
4c4b4cd2
PH
10589
10590 array = ada_coerce_to_simple_array_ptr (array);
10591
714e53ab
PH
10592 /* If we have more than one level of pointer indirection,
10593 dereference the value until we get only one level. */
df407dfe
AC
10594 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10595 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10596 == TYPE_CODE_PTR))
10597 array = value_ind (array);
10598
10599 /* Make sure we really do have an array type before going further,
10600 to avoid a SEGV when trying to get the index type or the target
10601 type later down the road if the debug info generated by
10602 the compiler is incorrect or incomplete. */
df407dfe 10603 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10604 error (_("cannot take slice of non-array"));
714e53ab 10605
828292f2
JB
10606 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10607 == TYPE_CODE_PTR)
4c4b4cd2 10608 {
828292f2
JB
10609 struct type *type0 = ada_check_typedef (value_type (array));
10610
0b5d8877 10611 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
828292f2 10612 return empty_array (TYPE_TARGET_TYPE (type0), low_bound);
4c4b4cd2
PH
10613 else
10614 {
10615 struct type *arr_type0 =
828292f2 10616 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10617
f5938064
JG
10618 return ada_value_slice_from_ptr (array, arr_type0,
10619 longest_to_int (low_bound),
10620 longest_to_int (high_bound));
4c4b4cd2
PH
10621 }
10622 }
10623 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10624 return array;
10625 else if (high_bound < low_bound)
df407dfe 10626 return empty_array (value_type (array), low_bound);
4c4b4cd2 10627 else
529cad9c
PH
10628 return ada_value_slice (array, longest_to_int (low_bound),
10629 longest_to_int (high_bound));
4c4b4cd2 10630 }
14f9c5c9 10631
4c4b4cd2
PH
10632 case UNOP_IN_RANGE:
10633 (*pos) += 2;
10634 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10635 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10636
14f9c5c9 10637 if (noside == EVAL_SKIP)
4c4b4cd2 10638 goto nosideret;
14f9c5c9 10639
4c4b4cd2
PH
10640 switch (TYPE_CODE (type))
10641 {
10642 default:
e1d5a0d2
PH
10643 lim_warning (_("Membership test incompletely implemented; "
10644 "always returns true"));
fbb06eb1
UW
10645 type = language_bool_type (exp->language_defn, exp->gdbarch);
10646 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10647
10648 case TYPE_CODE_RANGE:
030b4912
UW
10649 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10650 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10651 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10652 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10653 type = language_bool_type (exp->language_defn, exp->gdbarch);
10654 return
10655 value_from_longest (type,
4c4b4cd2
PH
10656 (value_less (arg1, arg3)
10657 || value_equal (arg1, arg3))
10658 && (value_less (arg2, arg1)
10659 || value_equal (arg2, arg1)));
10660 }
10661
10662 case BINOP_IN_BOUNDS:
14f9c5c9 10663 (*pos) += 2;
4c4b4cd2
PH
10664 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10665 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10666
4c4b4cd2
PH
10667 if (noside == EVAL_SKIP)
10668 goto nosideret;
14f9c5c9 10669
4c4b4cd2 10670 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10671 {
10672 type = language_bool_type (exp->language_defn, exp->gdbarch);
10673 return value_zero (type, not_lval);
10674 }
14f9c5c9 10675
4c4b4cd2 10676 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10677
1eea4ebd
UW
10678 type = ada_index_type (value_type (arg2), tem, "range");
10679 if (!type)
10680 type = value_type (arg1);
14f9c5c9 10681
1eea4ebd
UW
10682 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10683 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10684
f44316fa
UW
10685 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10686 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10687 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10688 return
fbb06eb1 10689 value_from_longest (type,
4c4b4cd2
PH
10690 (value_less (arg1, arg3)
10691 || value_equal (arg1, arg3))
10692 && (value_less (arg2, arg1)
10693 || value_equal (arg2, arg1)));
10694
10695 case TERNOP_IN_RANGE:
10696 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10697 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10698 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10699
10700 if (noside == EVAL_SKIP)
10701 goto nosideret;
10702
f44316fa
UW
10703 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10704 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10705 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10706 return
fbb06eb1 10707 value_from_longest (type,
4c4b4cd2
PH
10708 (value_less (arg1, arg3)
10709 || value_equal (arg1, arg3))
10710 && (value_less (arg2, arg1)
10711 || value_equal (arg2, arg1)));
10712
10713 case OP_ATR_FIRST:
10714 case OP_ATR_LAST:
10715 case OP_ATR_LENGTH:
10716 {
76a01679 10717 struct type *type_arg;
5b4ee69b 10718
76a01679
JB
10719 if (exp->elts[*pos].opcode == OP_TYPE)
10720 {
10721 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10722 arg1 = NULL;
5bc23cb3 10723 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10724 }
10725 else
10726 {
10727 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10728 type_arg = NULL;
10729 }
10730
10731 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10732 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10733 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10734 *pos += 4;
10735
10736 if (noside == EVAL_SKIP)
10737 goto nosideret;
10738
10739 if (type_arg == NULL)
10740 {
10741 arg1 = ada_coerce_ref (arg1);
10742
ad82864c 10743 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
10744 arg1 = ada_coerce_to_simple_array (arg1);
10745
aa4fb036 10746 if (op == OP_ATR_LENGTH)
1eea4ebd 10747 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10748 else
10749 {
10750 type = ada_index_type (value_type (arg1), tem,
10751 ada_attribute_name (op));
10752 if (type == NULL)
10753 type = builtin_type (exp->gdbarch)->builtin_int;
10754 }
76a01679
JB
10755
10756 if (noside == EVAL_AVOID_SIDE_EFFECTS)
1eea4ebd 10757 return allocate_value (type);
76a01679
JB
10758
10759 switch (op)
10760 {
10761 default: /* Should never happen. */
323e0a4a 10762 error (_("unexpected attribute encountered"));
76a01679 10763 case OP_ATR_FIRST:
1eea4ebd
UW
10764 return value_from_longest
10765 (type, ada_array_bound (arg1, tem, 0));
76a01679 10766 case OP_ATR_LAST:
1eea4ebd
UW
10767 return value_from_longest
10768 (type, ada_array_bound (arg1, tem, 1));
76a01679 10769 case OP_ATR_LENGTH:
1eea4ebd
UW
10770 return value_from_longest
10771 (type, ada_array_length (arg1, tem));
76a01679
JB
10772 }
10773 }
10774 else if (discrete_type_p (type_arg))
10775 {
10776 struct type *range_type;
0d5cff50 10777 const char *name = ada_type_name (type_arg);
5b4ee69b 10778
76a01679
JB
10779 range_type = NULL;
10780 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 10781 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
10782 if (range_type == NULL)
10783 range_type = type_arg;
10784 switch (op)
10785 {
10786 default:
323e0a4a 10787 error (_("unexpected attribute encountered"));
76a01679 10788 case OP_ATR_FIRST:
690cc4eb 10789 return value_from_longest
43bbcdc2 10790 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 10791 case OP_ATR_LAST:
690cc4eb 10792 return value_from_longest
43bbcdc2 10793 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 10794 case OP_ATR_LENGTH:
323e0a4a 10795 error (_("the 'length attribute applies only to array types"));
76a01679
JB
10796 }
10797 }
10798 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 10799 error (_("unimplemented type attribute"));
76a01679
JB
10800 else
10801 {
10802 LONGEST low, high;
10803
ad82864c
JB
10804 if (ada_is_constrained_packed_array_type (type_arg))
10805 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10806
aa4fb036 10807 if (op == OP_ATR_LENGTH)
1eea4ebd 10808 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10809 else
10810 {
10811 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10812 if (type == NULL)
10813 type = builtin_type (exp->gdbarch)->builtin_int;
10814 }
1eea4ebd 10815
76a01679
JB
10816 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10817 return allocate_value (type);
10818
10819 switch (op)
10820 {
10821 default:
323e0a4a 10822 error (_("unexpected attribute encountered"));
76a01679 10823 case OP_ATR_FIRST:
1eea4ebd 10824 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
10825 return value_from_longest (type, low);
10826 case OP_ATR_LAST:
1eea4ebd 10827 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10828 return value_from_longest (type, high);
10829 case OP_ATR_LENGTH:
1eea4ebd
UW
10830 low = ada_array_bound_from_type (type_arg, tem, 0);
10831 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10832 return value_from_longest (type, high - low + 1);
10833 }
10834 }
14f9c5c9
AS
10835 }
10836
4c4b4cd2
PH
10837 case OP_ATR_TAG:
10838 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10839 if (noside == EVAL_SKIP)
76a01679 10840 goto nosideret;
4c4b4cd2
PH
10841
10842 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10843 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10844
10845 return ada_value_tag (arg1);
10846
10847 case OP_ATR_MIN:
10848 case OP_ATR_MAX:
10849 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10850 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10851 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10852 if (noside == EVAL_SKIP)
76a01679 10853 goto nosideret;
d2e4a39e 10854 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10855 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10856 else
f44316fa
UW
10857 {
10858 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10859 return value_binop (arg1, arg2,
10860 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10861 }
14f9c5c9 10862
4c4b4cd2
PH
10863 case OP_ATR_MODULUS:
10864 {
31dedfee 10865 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10866
5b4ee69b 10867 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
10868 if (noside == EVAL_SKIP)
10869 goto nosideret;
4c4b4cd2 10870
76a01679 10871 if (!ada_is_modular_type (type_arg))
323e0a4a 10872 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10873
76a01679
JB
10874 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10875 ada_modulus (type_arg));
4c4b4cd2
PH
10876 }
10877
10878
10879 case OP_ATR_POS:
10880 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10881 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10882 if (noside == EVAL_SKIP)
76a01679 10883 goto nosideret;
3cb382c9
UW
10884 type = builtin_type (exp->gdbarch)->builtin_int;
10885 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10886 return value_zero (type, not_lval);
14f9c5c9 10887 else
3cb382c9 10888 return value_pos_atr (type, arg1);
14f9c5c9 10889
4c4b4cd2
PH
10890 case OP_ATR_SIZE:
10891 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
10892 type = value_type (arg1);
10893
10894 /* If the argument is a reference, then dereference its type, since
10895 the user is really asking for the size of the actual object,
10896 not the size of the pointer. */
10897 if (TYPE_CODE (type) == TYPE_CODE_REF)
10898 type = TYPE_TARGET_TYPE (type);
10899
4c4b4cd2 10900 if (noside == EVAL_SKIP)
76a01679 10901 goto nosideret;
4c4b4cd2 10902 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 10903 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10904 else
22601c15 10905 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 10906 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10907
10908 case OP_ATR_VAL:
10909 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 10910 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 10911 type = exp->elts[pc + 2].type;
14f9c5c9 10912 if (noside == EVAL_SKIP)
76a01679 10913 goto nosideret;
4c4b4cd2 10914 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10915 return value_zero (type, not_lval);
4c4b4cd2 10916 else
76a01679 10917 return value_val_atr (type, arg1);
4c4b4cd2
PH
10918
10919 case BINOP_EXP:
10920 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10921 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10922 if (noside == EVAL_SKIP)
10923 goto nosideret;
10924 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10925 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 10926 else
f44316fa
UW
10927 {
10928 /* For integer exponentiation operations,
10929 only promote the first argument. */
10930 if (is_integral_type (value_type (arg2)))
10931 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10932 else
10933 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10934
10935 return value_binop (arg1, arg2, op);
10936 }
4c4b4cd2
PH
10937
10938 case UNOP_PLUS:
10939 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10940 if (noside == EVAL_SKIP)
10941 goto nosideret;
10942 else
10943 return arg1;
10944
10945 case UNOP_ABS:
10946 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10947 if (noside == EVAL_SKIP)
10948 goto nosideret;
f44316fa 10949 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 10950 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 10951 return value_neg (arg1);
14f9c5c9 10952 else
4c4b4cd2 10953 return arg1;
14f9c5c9
AS
10954
10955 case UNOP_IND:
5ec18f2b 10956 preeval_pos = *pos;
6b0d7253 10957 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10958 if (noside == EVAL_SKIP)
4c4b4cd2 10959 goto nosideret;
df407dfe 10960 type = ada_check_typedef (value_type (arg1));
14f9c5c9 10961 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
10962 {
10963 if (ada_is_array_descriptor_type (type))
10964 /* GDB allows dereferencing GNAT array descriptors. */
10965 {
10966 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 10967
4c4b4cd2 10968 if (arrType == NULL)
323e0a4a 10969 error (_("Attempt to dereference null array pointer."));
00a4c844 10970 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
10971 }
10972 else if (TYPE_CODE (type) == TYPE_CODE_PTR
10973 || TYPE_CODE (type) == TYPE_CODE_REF
10974 /* In C you can dereference an array to get the 1st elt. */
10975 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 10976 {
5ec18f2b
JG
10977 /* As mentioned in the OP_VAR_VALUE case, tagged types can
10978 only be determined by inspecting the object's tag.
10979 This means that we need to evaluate completely the
10980 expression in order to get its type. */
10981
023db19c
JB
10982 if ((TYPE_CODE (type) == TYPE_CODE_REF
10983 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
10984 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
10985 {
10986 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10987 EVAL_NORMAL);
10988 type = value_type (ada_value_ind (arg1));
10989 }
10990 else
10991 {
10992 type = to_static_fixed_type
10993 (ada_aligned_type
10994 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
10995 }
c1b5a1a6 10996 ada_ensure_varsize_limit (type);
714e53ab
PH
10997 return value_zero (type, lval_memory);
10998 }
4c4b4cd2 10999 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
11000 {
11001 /* GDB allows dereferencing an int. */
11002 if (expect_type == NULL)
11003 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11004 lval_memory);
11005 else
11006 {
11007 expect_type =
11008 to_static_fixed_type (ada_aligned_type (expect_type));
11009 return value_zero (expect_type, lval_memory);
11010 }
11011 }
4c4b4cd2 11012 else
323e0a4a 11013 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11014 }
0963b4bd 11015 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11016 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11017
96967637
JB
11018 if (TYPE_CODE (type) == TYPE_CODE_INT)
11019 /* GDB allows dereferencing an int. If we were given
11020 the expect_type, then use that as the target type.
11021 Otherwise, assume that the target type is an int. */
11022 {
11023 if (expect_type != NULL)
11024 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11025 arg1));
11026 else
11027 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11028 (CORE_ADDR) value_as_address (arg1));
11029 }
6b0d7253 11030
4c4b4cd2
PH
11031 if (ada_is_array_descriptor_type (type))
11032 /* GDB allows dereferencing GNAT array descriptors. */
11033 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11034 else
4c4b4cd2 11035 return ada_value_ind (arg1);
14f9c5c9
AS
11036
11037 case STRUCTOP_STRUCT:
11038 tem = longest_to_int (exp->elts[pc + 1].longconst);
11039 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11040 preeval_pos = *pos;
14f9c5c9
AS
11041 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11042 if (noside == EVAL_SKIP)
4c4b4cd2 11043 goto nosideret;
14f9c5c9 11044 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11045 {
df407dfe 11046 struct type *type1 = value_type (arg1);
5b4ee69b 11047
76a01679
JB
11048 if (ada_is_tagged_type (type1, 1))
11049 {
11050 type = ada_lookup_struct_elt_type (type1,
11051 &exp->elts[pc + 2].string,
11052 1, 1, NULL);
5ec18f2b
JG
11053
11054 /* If the field is not found, check if it exists in the
11055 extension of this object's type. This means that we
11056 need to evaluate completely the expression. */
11057
76a01679 11058 if (type == NULL)
5ec18f2b
JG
11059 {
11060 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11061 EVAL_NORMAL);
11062 arg1 = ada_value_struct_elt (arg1,
11063 &exp->elts[pc + 2].string,
11064 0);
11065 arg1 = unwrap_value (arg1);
11066 type = value_type (ada_to_fixed_value (arg1));
11067 }
76a01679
JB
11068 }
11069 else
11070 type =
11071 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
11072 0, NULL);
11073
11074 return value_zero (ada_aligned_type (type), lval_memory);
11075 }
14f9c5c9 11076 else
284614f0
JB
11077 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11078 arg1 = unwrap_value (arg1);
11079 return ada_to_fixed_value (arg1);
11080
14f9c5c9 11081 case OP_TYPE:
4c4b4cd2
PH
11082 /* The value is not supposed to be used. This is here to make it
11083 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11084 (*pos) += 2;
11085 if (noside == EVAL_SKIP)
4c4b4cd2 11086 goto nosideret;
14f9c5c9 11087 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11088 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11089 else
323e0a4a 11090 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11091
11092 case OP_AGGREGATE:
11093 case OP_CHOICES:
11094 case OP_OTHERS:
11095 case OP_DISCRETE_RANGE:
11096 case OP_POSITIONAL:
11097 case OP_NAME:
11098 if (noside == EVAL_NORMAL)
11099 switch (op)
11100 {
11101 case OP_NAME:
11102 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11103 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11104 case OP_AGGREGATE:
11105 error (_("Aggregates only allowed on the right of an assignment"));
11106 default:
0963b4bd
MS
11107 internal_error (__FILE__, __LINE__,
11108 _("aggregate apparently mangled"));
52ce6436
PH
11109 }
11110
11111 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11112 *pos += oplen - 1;
11113 for (tem = 0; tem < nargs; tem += 1)
11114 ada_evaluate_subexp (NULL, exp, pos, noside);
11115 goto nosideret;
14f9c5c9
AS
11116 }
11117
11118nosideret:
22601c15 11119 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int, 1);
14f9c5c9 11120}
14f9c5c9 11121\f
d2e4a39e 11122
4c4b4cd2 11123 /* Fixed point */
14f9c5c9
AS
11124
11125/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11126 type name that encodes the 'small and 'delta information.
4c4b4cd2 11127 Otherwise, return NULL. */
14f9c5c9 11128
d2e4a39e 11129static const char *
ebf56fd3 11130fixed_type_info (struct type *type)
14f9c5c9 11131{
d2e4a39e 11132 const char *name = ada_type_name (type);
14f9c5c9
AS
11133 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11134
d2e4a39e
AS
11135 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11136 {
14f9c5c9 11137 const char *tail = strstr (name, "___XF_");
5b4ee69b 11138
14f9c5c9 11139 if (tail == NULL)
4c4b4cd2 11140 return NULL;
d2e4a39e 11141 else
4c4b4cd2 11142 return tail + 5;
14f9c5c9
AS
11143 }
11144 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11145 return fixed_type_info (TYPE_TARGET_TYPE (type));
11146 else
11147 return NULL;
11148}
11149
4c4b4cd2 11150/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11151
11152int
ebf56fd3 11153ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11154{
11155 return fixed_type_info (type) != NULL;
11156}
11157
4c4b4cd2
PH
11158/* Return non-zero iff TYPE represents a System.Address type. */
11159
11160int
11161ada_is_system_address_type (struct type *type)
11162{
11163 return (TYPE_NAME (type)
11164 && strcmp (TYPE_NAME (type), "system__address") == 0);
11165}
11166
14f9c5c9
AS
11167/* Assuming that TYPE is the representation of an Ada fixed-point
11168 type, return its delta, or -1 if the type is malformed and the
4c4b4cd2 11169 delta cannot be determined. */
14f9c5c9
AS
11170
11171DOUBLEST
ebf56fd3 11172ada_delta (struct type *type)
14f9c5c9
AS
11173{
11174 const char *encoding = fixed_type_info (type);
facc390f 11175 DOUBLEST num, den;
14f9c5c9 11176
facc390f
JB
11177 /* Strictly speaking, num and den are encoded as integer. However,
11178 they may not fit into a long, and they will have to be converted
11179 to DOUBLEST anyway. So scan them as DOUBLEST. */
11180 if (sscanf (encoding, "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11181 &num, &den) < 2)
14f9c5c9 11182 return -1.0;
d2e4a39e 11183 else
facc390f 11184 return num / den;
14f9c5c9
AS
11185}
11186
11187/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11188 factor ('SMALL value) associated with the type. */
14f9c5c9
AS
11189
11190static DOUBLEST
ebf56fd3 11191scaling_factor (struct type *type)
14f9c5c9
AS
11192{
11193 const char *encoding = fixed_type_info (type);
facc390f 11194 DOUBLEST num0, den0, num1, den1;
14f9c5c9 11195 int n;
d2e4a39e 11196
facc390f
JB
11197 /* Strictly speaking, num's and den's are encoded as integer. However,
11198 they may not fit into a long, and they will have to be converted
11199 to DOUBLEST anyway. So scan them as DOUBLEST. */
11200 n = sscanf (encoding,
11201 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT
11202 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11203 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11204
11205 if (n < 2)
11206 return 1.0;
11207 else if (n == 4)
facc390f 11208 return num1 / den1;
d2e4a39e 11209 else
facc390f 11210 return num0 / den0;
14f9c5c9
AS
11211}
11212
11213
11214/* Assuming that X is the representation of a value of fixed-point
4c4b4cd2 11215 type TYPE, return its floating-point equivalent. */
14f9c5c9
AS
11216
11217DOUBLEST
ebf56fd3 11218ada_fixed_to_float (struct type *type, LONGEST x)
14f9c5c9 11219{
d2e4a39e 11220 return (DOUBLEST) x *scaling_factor (type);
14f9c5c9
AS
11221}
11222
4c4b4cd2
PH
11223/* The representation of a fixed-point value of type TYPE
11224 corresponding to the value X. */
14f9c5c9
AS
11225
11226LONGEST
ebf56fd3 11227ada_float_to_fixed (struct type *type, DOUBLEST x)
14f9c5c9
AS
11228{
11229 return (LONGEST) (x / scaling_factor (type) + 0.5);
11230}
11231
14f9c5c9 11232\f
d2e4a39e 11233
4c4b4cd2 11234 /* Range types */
14f9c5c9
AS
11235
11236/* Scan STR beginning at position K for a discriminant name, and
11237 return the value of that discriminant field of DVAL in *PX. If
11238 PNEW_K is not null, put the position of the character beyond the
11239 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11240 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11241
11242static int
07d8f827 11243scan_discrim_bound (char *str, int k, struct value *dval, LONGEST * px,
76a01679 11244 int *pnew_k)
14f9c5c9
AS
11245{
11246 static char *bound_buffer = NULL;
11247 static size_t bound_buffer_len = 0;
11248 char *bound;
11249 char *pend;
d2e4a39e 11250 struct value *bound_val;
14f9c5c9
AS
11251
11252 if (dval == NULL || str == NULL || str[k] == '\0')
11253 return 0;
11254
d2e4a39e 11255 pend = strstr (str + k, "__");
14f9c5c9
AS
11256 if (pend == NULL)
11257 {
d2e4a39e 11258 bound = str + k;
14f9c5c9
AS
11259 k += strlen (bound);
11260 }
d2e4a39e 11261 else
14f9c5c9 11262 {
d2e4a39e 11263 GROW_VECT (bound_buffer, bound_buffer_len, pend - (str + k) + 1);
14f9c5c9 11264 bound = bound_buffer;
d2e4a39e
AS
11265 strncpy (bound_buffer, str + k, pend - (str + k));
11266 bound[pend - (str + k)] = '\0';
11267 k = pend - str;
14f9c5c9 11268 }
d2e4a39e 11269
df407dfe 11270 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11271 if (bound_val == NULL)
11272 return 0;
11273
11274 *px = value_as_long (bound_val);
11275 if (pnew_k != NULL)
11276 *pnew_k = k;
11277 return 1;
11278}
11279
11280/* Value of variable named NAME in the current environment. If
11281 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11282 otherwise causes an error with message ERR_MSG. */
11283
d2e4a39e
AS
11284static struct value *
11285get_var_value (char *name, char *err_msg)
14f9c5c9 11286{
4c4b4cd2 11287 struct ada_symbol_info *syms;
14f9c5c9
AS
11288 int nsyms;
11289
4c4b4cd2 11290 nsyms = ada_lookup_symbol_list (name, get_selected_block (0), VAR_DOMAIN,
4eeaa230 11291 &syms);
14f9c5c9
AS
11292
11293 if (nsyms != 1)
11294 {
11295 if (err_msg == NULL)
4c4b4cd2 11296 return 0;
14f9c5c9 11297 else
8a3fe4f8 11298 error (("%s"), err_msg);
14f9c5c9
AS
11299 }
11300
4c4b4cd2 11301 return value_of_variable (syms[0].sym, syms[0].block);
14f9c5c9 11302}
d2e4a39e 11303
14f9c5c9 11304/* Value of integer variable named NAME in the current environment. If
4c4b4cd2
PH
11305 no such variable found, returns 0, and sets *FLAG to 0. If
11306 successful, sets *FLAG to 1. */
11307
14f9c5c9 11308LONGEST
4c4b4cd2 11309get_int_var_value (char *name, int *flag)
14f9c5c9 11310{
4c4b4cd2 11311 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11312
14f9c5c9
AS
11313 if (var_val == 0)
11314 {
11315 if (flag != NULL)
4c4b4cd2 11316 *flag = 0;
14f9c5c9
AS
11317 return 0;
11318 }
11319 else
11320 {
11321 if (flag != NULL)
4c4b4cd2 11322 *flag = 1;
14f9c5c9
AS
11323 return value_as_long (var_val);
11324 }
11325}
d2e4a39e 11326
14f9c5c9
AS
11327
11328/* Return a range type whose base type is that of the range type named
11329 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11330 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11331 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11332 corresponding range type from debug information; fall back to using it
11333 if symbol lookup fails. If a new type must be created, allocate it
11334 like ORIG_TYPE was. The bounds information, in general, is encoded
11335 in NAME, the base type given in the named range type. */
14f9c5c9 11336
d2e4a39e 11337static struct type *
28c85d6c 11338to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11339{
0d5cff50 11340 const char *name;
14f9c5c9 11341 struct type *base_type;
d2e4a39e 11342 char *subtype_info;
14f9c5c9 11343
28c85d6c
JB
11344 gdb_assert (raw_type != NULL);
11345 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11346
1ce677a4 11347 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11348 base_type = TYPE_TARGET_TYPE (raw_type);
11349 else
11350 base_type = raw_type;
11351
28c85d6c 11352 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11353 subtype_info = strstr (name, "___XD");
11354 if (subtype_info == NULL)
690cc4eb 11355 {
43bbcdc2
PH
11356 LONGEST L = ada_discrete_type_low_bound (raw_type);
11357 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11358
690cc4eb
PH
11359 if (L < INT_MIN || U > INT_MAX)
11360 return raw_type;
11361 else
0c9c3474
SA
11362 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11363 L, U);
690cc4eb 11364 }
14f9c5c9
AS
11365 else
11366 {
11367 static char *name_buf = NULL;
11368 static size_t name_len = 0;
11369 int prefix_len = subtype_info - name;
11370 LONGEST L, U;
11371 struct type *type;
11372 char *bounds_str;
11373 int n;
11374
11375 GROW_VECT (name_buf, name_len, prefix_len + 5);
11376 strncpy (name_buf, name, prefix_len);
11377 name_buf[prefix_len] = '\0';
11378
11379 subtype_info += 5;
11380 bounds_str = strchr (subtype_info, '_');
11381 n = 1;
11382
d2e4a39e 11383 if (*subtype_info == 'L')
4c4b4cd2
PH
11384 {
11385 if (!ada_scan_number (bounds_str, n, &L, &n)
11386 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11387 return raw_type;
11388 if (bounds_str[n] == '_')
11389 n += 2;
0963b4bd 11390 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11391 n += 1;
11392 subtype_info += 1;
11393 }
d2e4a39e 11394 else
4c4b4cd2
PH
11395 {
11396 int ok;
5b4ee69b 11397
4c4b4cd2
PH
11398 strcpy (name_buf + prefix_len, "___L");
11399 L = get_int_var_value (name_buf, &ok);
11400 if (!ok)
11401 {
323e0a4a 11402 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11403 L = 1;
11404 }
11405 }
14f9c5c9 11406
d2e4a39e 11407 if (*subtype_info == 'U')
4c4b4cd2
PH
11408 {
11409 if (!ada_scan_number (bounds_str, n, &U, &n)
11410 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11411 return raw_type;
11412 }
d2e4a39e 11413 else
4c4b4cd2
PH
11414 {
11415 int ok;
5b4ee69b 11416
4c4b4cd2
PH
11417 strcpy (name_buf + prefix_len, "___U");
11418 U = get_int_var_value (name_buf, &ok);
11419 if (!ok)
11420 {
323e0a4a 11421 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11422 U = L;
11423 }
11424 }
14f9c5c9 11425
0c9c3474
SA
11426 type = create_static_range_type (alloc_type_copy (raw_type),
11427 base_type, L, U);
d2e4a39e 11428 TYPE_NAME (type) = name;
14f9c5c9
AS
11429 return type;
11430 }
11431}
11432
4c4b4cd2
PH
11433/* True iff NAME is the name of a range type. */
11434
14f9c5c9 11435int
d2e4a39e 11436ada_is_range_type_name (const char *name)
14f9c5c9
AS
11437{
11438 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11439}
14f9c5c9 11440\f
d2e4a39e 11441
4c4b4cd2
PH
11442 /* Modular types */
11443
11444/* True iff TYPE is an Ada modular type. */
14f9c5c9 11445
14f9c5c9 11446int
d2e4a39e 11447ada_is_modular_type (struct type *type)
14f9c5c9 11448{
18af8284 11449 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11450
11451 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11452 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11453 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11454}
11455
4c4b4cd2
PH
11456/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11457
61ee279c 11458ULONGEST
0056e4d5 11459ada_modulus (struct type *type)
14f9c5c9 11460{
43bbcdc2 11461 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11462}
d2e4a39e 11463\f
f7f9143b
JB
11464
11465/* Ada exception catchpoint support:
11466 ---------------------------------
11467
11468 We support 3 kinds of exception catchpoints:
11469 . catchpoints on Ada exceptions
11470 . catchpoints on unhandled Ada exceptions
11471 . catchpoints on failed assertions
11472
11473 Exceptions raised during failed assertions, or unhandled exceptions
11474 could perfectly be caught with the general catchpoint on Ada exceptions.
11475 However, we can easily differentiate these two special cases, and having
11476 the option to distinguish these two cases from the rest can be useful
11477 to zero-in on certain situations.
11478
11479 Exception catchpoints are a specialized form of breakpoint,
11480 since they rely on inserting breakpoints inside known routines
11481 of the GNAT runtime. The implementation therefore uses a standard
11482 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11483 of breakpoint_ops.
11484
0259addd
JB
11485 Support in the runtime for exception catchpoints have been changed
11486 a few times already, and these changes affect the implementation
11487 of these catchpoints. In order to be able to support several
11488 variants of the runtime, we use a sniffer that will determine
28010a5d 11489 the runtime variant used by the program being debugged. */
f7f9143b 11490
82eacd52
JB
11491/* Ada's standard exceptions.
11492
11493 The Ada 83 standard also defined Numeric_Error. But there so many
11494 situations where it was unclear from the Ada 83 Reference Manual
11495 (RM) whether Constraint_Error or Numeric_Error should be raised,
11496 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11497 Interpretation saying that anytime the RM says that Numeric_Error
11498 should be raised, the implementation may raise Constraint_Error.
11499 Ada 95 went one step further and pretty much removed Numeric_Error
11500 from the list of standard exceptions (it made it a renaming of
11501 Constraint_Error, to help preserve compatibility when compiling
11502 an Ada83 compiler). As such, we do not include Numeric_Error from
11503 this list of standard exceptions. */
3d0b0fa3
JB
11504
11505static char *standard_exc[] = {
11506 "constraint_error",
11507 "program_error",
11508 "storage_error",
11509 "tasking_error"
11510};
11511
0259addd
JB
11512typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11513
11514/* A structure that describes how to support exception catchpoints
11515 for a given executable. */
11516
11517struct exception_support_info
11518{
11519 /* The name of the symbol to break on in order to insert
11520 a catchpoint on exceptions. */
11521 const char *catch_exception_sym;
11522
11523 /* The name of the symbol to break on in order to insert
11524 a catchpoint on unhandled exceptions. */
11525 const char *catch_exception_unhandled_sym;
11526
11527 /* The name of the symbol to break on in order to insert
11528 a catchpoint on failed assertions. */
11529 const char *catch_assert_sym;
11530
11531 /* Assuming that the inferior just triggered an unhandled exception
11532 catchpoint, this function is responsible for returning the address
11533 in inferior memory where the name of that exception is stored.
11534 Return zero if the address could not be computed. */
11535 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11536};
11537
11538static CORE_ADDR ada_unhandled_exception_name_addr (void);
11539static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11540
11541/* The following exception support info structure describes how to
11542 implement exception catchpoints with the latest version of the
11543 Ada runtime (as of 2007-03-06). */
11544
11545static const struct exception_support_info default_exception_support_info =
11546{
11547 "__gnat_debug_raise_exception", /* catch_exception_sym */
11548 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11549 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11550 ada_unhandled_exception_name_addr
11551};
11552
11553/* The following exception support info structure describes how to
11554 implement exception catchpoints with a slightly older version
11555 of the Ada runtime. */
11556
11557static const struct exception_support_info exception_support_info_fallback =
11558{
11559 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11560 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11561 "system__assertions__raise_assert_failure", /* catch_assert_sym */
11562 ada_unhandled_exception_name_addr_from_raise
11563};
11564
f17011e0
JB
11565/* Return nonzero if we can detect the exception support routines
11566 described in EINFO.
11567
11568 This function errors out if an abnormal situation is detected
11569 (for instance, if we find the exception support routines, but
11570 that support is found to be incomplete). */
11571
11572static int
11573ada_has_this_exception_support (const struct exception_support_info *einfo)
11574{
11575 struct symbol *sym;
11576
11577 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11578 that should be compiled with debugging information. As a result, we
11579 expect to find that symbol in the symtabs. */
11580
11581 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11582 if (sym == NULL)
a6af7abe
JB
11583 {
11584 /* Perhaps we did not find our symbol because the Ada runtime was
11585 compiled without debugging info, or simply stripped of it.
11586 It happens on some GNU/Linux distributions for instance, where
11587 users have to install a separate debug package in order to get
11588 the runtime's debugging info. In that situation, let the user
11589 know why we cannot insert an Ada exception catchpoint.
11590
11591 Note: Just for the purpose of inserting our Ada exception
11592 catchpoint, we could rely purely on the associated minimal symbol.
11593 But we would be operating in degraded mode anyway, since we are
11594 still lacking the debugging info needed later on to extract
11595 the name of the exception being raised (this name is printed in
11596 the catchpoint message, and is also used when trying to catch
11597 a specific exception). We do not handle this case for now. */
3b7344d5 11598 struct bound_minimal_symbol msym
1c8e84b0
JB
11599 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11600
3b7344d5 11601 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11602 error (_("Your Ada runtime appears to be missing some debugging "
11603 "information.\nCannot insert Ada exception catchpoint "
11604 "in this configuration."));
11605
11606 return 0;
11607 }
f17011e0
JB
11608
11609 /* Make sure that the symbol we found corresponds to a function. */
11610
11611 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11612 error (_("Symbol \"%s\" is not a function (class = %d)"),
11613 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11614
11615 return 1;
11616}
11617
0259addd
JB
11618/* Inspect the Ada runtime and determine which exception info structure
11619 should be used to provide support for exception catchpoints.
11620
3eecfa55
JB
11621 This function will always set the per-inferior exception_info,
11622 or raise an error. */
0259addd
JB
11623
11624static void
11625ada_exception_support_info_sniffer (void)
11626{
3eecfa55 11627 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11628
11629 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11630 if (data->exception_info != NULL)
0259addd
JB
11631 return;
11632
11633 /* Check the latest (default) exception support info. */
f17011e0 11634 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11635 {
3eecfa55 11636 data->exception_info = &default_exception_support_info;
0259addd
JB
11637 return;
11638 }
11639
11640 /* Try our fallback exception suport info. */
f17011e0 11641 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11642 {
3eecfa55 11643 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11644 return;
11645 }
11646
11647 /* Sometimes, it is normal for us to not be able to find the routine
11648 we are looking for. This happens when the program is linked with
11649 the shared version of the GNAT runtime, and the program has not been
11650 started yet. Inform the user of these two possible causes if
11651 applicable. */
11652
ccefe4c4 11653 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11654 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11655
11656 /* If the symbol does not exist, then check that the program is
11657 already started, to make sure that shared libraries have been
11658 loaded. If it is not started, this may mean that the symbol is
11659 in a shared library. */
11660
11661 if (ptid_get_pid (inferior_ptid) == 0)
11662 error (_("Unable to insert catchpoint. Try to start the program first."));
11663
11664 /* At this point, we know that we are debugging an Ada program and
11665 that the inferior has been started, but we still are not able to
0963b4bd 11666 find the run-time symbols. That can mean that we are in
0259addd
JB
11667 configurable run time mode, or that a-except as been optimized
11668 out by the linker... In any case, at this point it is not worth
11669 supporting this feature. */
11670
7dda8cff 11671 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11672}
11673
f7f9143b
JB
11674/* True iff FRAME is very likely to be that of a function that is
11675 part of the runtime system. This is all very heuristic, but is
11676 intended to be used as advice as to what frames are uninteresting
11677 to most users. */
11678
11679static int
11680is_known_support_routine (struct frame_info *frame)
11681{
4ed6b5be 11682 struct symtab_and_line sal;
55b87a52 11683 char *func_name;
692465f1 11684 enum language func_lang;
f7f9143b 11685 int i;
f35a17b5 11686 const char *fullname;
f7f9143b 11687
4ed6b5be
JB
11688 /* If this code does not have any debugging information (no symtab),
11689 This cannot be any user code. */
f7f9143b 11690
4ed6b5be 11691 find_frame_sal (frame, &sal);
f7f9143b
JB
11692 if (sal.symtab == NULL)
11693 return 1;
11694
4ed6b5be
JB
11695 /* If there is a symtab, but the associated source file cannot be
11696 located, then assume this is not user code: Selecting a frame
11697 for which we cannot display the code would not be very helpful
11698 for the user. This should also take care of case such as VxWorks
11699 where the kernel has some debugging info provided for a few units. */
f7f9143b 11700
f35a17b5
JK
11701 fullname = symtab_to_fullname (sal.symtab);
11702 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11703 return 1;
11704
4ed6b5be
JB
11705 /* Check the unit filename againt the Ada runtime file naming.
11706 We also check the name of the objfile against the name of some
11707 known system libraries that sometimes come with debugging info
11708 too. */
11709
f7f9143b
JB
11710 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11711 {
11712 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11713 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 11714 return 1;
eb822aa6
DE
11715 if (SYMTAB_OBJFILE (sal.symtab) != NULL
11716 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 11717 return 1;
f7f9143b
JB
11718 }
11719
4ed6b5be 11720 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11721
e9e07ba6 11722 find_frame_funname (frame, &func_name, &func_lang, NULL);
f7f9143b
JB
11723 if (func_name == NULL)
11724 return 1;
11725
11726 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11727 {
11728 re_comp (known_auxiliary_function_name_patterns[i]);
11729 if (re_exec (func_name))
55b87a52
KS
11730 {
11731 xfree (func_name);
11732 return 1;
11733 }
f7f9143b
JB
11734 }
11735
55b87a52 11736 xfree (func_name);
f7f9143b
JB
11737 return 0;
11738}
11739
11740/* Find the first frame that contains debugging information and that is not
11741 part of the Ada run-time, starting from FI and moving upward. */
11742
0ef643c8 11743void
f7f9143b
JB
11744ada_find_printable_frame (struct frame_info *fi)
11745{
11746 for (; fi != NULL; fi = get_prev_frame (fi))
11747 {
11748 if (!is_known_support_routine (fi))
11749 {
11750 select_frame (fi);
11751 break;
11752 }
11753 }
11754
11755}
11756
11757/* Assuming that the inferior just triggered an unhandled exception
11758 catchpoint, return the address in inferior memory where the name
11759 of the exception is stored.
11760
11761 Return zero if the address could not be computed. */
11762
11763static CORE_ADDR
11764ada_unhandled_exception_name_addr (void)
0259addd
JB
11765{
11766 return parse_and_eval_address ("e.full_name");
11767}
11768
11769/* Same as ada_unhandled_exception_name_addr, except that this function
11770 should be used when the inferior uses an older version of the runtime,
11771 where the exception name needs to be extracted from a specific frame
11772 several frames up in the callstack. */
11773
11774static CORE_ADDR
11775ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11776{
11777 int frame_level;
11778 struct frame_info *fi;
3eecfa55 11779 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
55b87a52 11780 struct cleanup *old_chain;
f7f9143b
JB
11781
11782 /* To determine the name of this exception, we need to select
11783 the frame corresponding to RAISE_SYM_NAME. This frame is
11784 at least 3 levels up, so we simply skip the first 3 frames
11785 without checking the name of their associated function. */
11786 fi = get_current_frame ();
11787 for (frame_level = 0; frame_level < 3; frame_level += 1)
11788 if (fi != NULL)
11789 fi = get_prev_frame (fi);
11790
55b87a52 11791 old_chain = make_cleanup (null_cleanup, NULL);
f7f9143b
JB
11792 while (fi != NULL)
11793 {
55b87a52 11794 char *func_name;
692465f1
JB
11795 enum language func_lang;
11796
e9e07ba6 11797 find_frame_funname (fi, &func_name, &func_lang, NULL);
55b87a52
KS
11798 if (func_name != NULL)
11799 {
11800 make_cleanup (xfree, func_name);
11801
11802 if (strcmp (func_name,
11803 data->exception_info->catch_exception_sym) == 0)
11804 break; /* We found the frame we were looking for... */
11805 fi = get_prev_frame (fi);
11806 }
f7f9143b 11807 }
55b87a52 11808 do_cleanups (old_chain);
f7f9143b
JB
11809
11810 if (fi == NULL)
11811 return 0;
11812
11813 select_frame (fi);
11814 return parse_and_eval_address ("id.full_name");
11815}
11816
11817/* Assuming the inferior just triggered an Ada exception catchpoint
11818 (of any type), return the address in inferior memory where the name
11819 of the exception is stored, if applicable.
11820
11821 Return zero if the address could not be computed, or if not relevant. */
11822
11823static CORE_ADDR
761269c8 11824ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11825 struct breakpoint *b)
11826{
3eecfa55
JB
11827 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11828
f7f9143b
JB
11829 switch (ex)
11830 {
761269c8 11831 case ada_catch_exception:
f7f9143b
JB
11832 return (parse_and_eval_address ("e.full_name"));
11833 break;
11834
761269c8 11835 case ada_catch_exception_unhandled:
3eecfa55 11836 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b
JB
11837 break;
11838
761269c8 11839 case ada_catch_assert:
f7f9143b
JB
11840 return 0; /* Exception name is not relevant in this case. */
11841 break;
11842
11843 default:
11844 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11845 break;
11846 }
11847
11848 return 0; /* Should never be reached. */
11849}
11850
11851/* Same as ada_exception_name_addr_1, except that it intercepts and contains
11852 any error that ada_exception_name_addr_1 might cause to be thrown.
11853 When an error is intercepted, a warning with the error message is printed,
11854 and zero is returned. */
11855
11856static CORE_ADDR
761269c8 11857ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11858 struct breakpoint *b)
11859{
f7f9143b
JB
11860 CORE_ADDR result = 0;
11861
492d29ea 11862 TRY
f7f9143b
JB
11863 {
11864 result = ada_exception_name_addr_1 (ex, b);
11865 }
11866
492d29ea 11867 CATCH (e, RETURN_MASK_ERROR)
f7f9143b
JB
11868 {
11869 warning (_("failed to get exception name: %s"), e.message);
11870 return 0;
11871 }
492d29ea 11872 END_CATCH
f7f9143b
JB
11873
11874 return result;
11875}
11876
28010a5d
PA
11877static char *ada_exception_catchpoint_cond_string (const char *excep_string);
11878
11879/* Ada catchpoints.
11880
11881 In the case of catchpoints on Ada exceptions, the catchpoint will
11882 stop the target on every exception the program throws. When a user
11883 specifies the name of a specific exception, we translate this
11884 request into a condition expression (in text form), and then parse
11885 it into an expression stored in each of the catchpoint's locations.
11886 We then use this condition to check whether the exception that was
11887 raised is the one the user is interested in. If not, then the
11888 target is resumed again. We store the name of the requested
11889 exception, in order to be able to re-set the condition expression
11890 when symbols change. */
11891
11892/* An instance of this type is used to represent an Ada catchpoint
11893 breakpoint location. It includes a "struct bp_location" as a kind
11894 of base class; users downcast to "struct bp_location *" when
11895 needed. */
11896
11897struct ada_catchpoint_location
11898{
11899 /* The base class. */
11900 struct bp_location base;
11901
11902 /* The condition that checks whether the exception that was raised
11903 is the specific exception the user specified on catchpoint
11904 creation. */
11905 struct expression *excep_cond_expr;
11906};
11907
11908/* Implement the DTOR method in the bp_location_ops structure for all
11909 Ada exception catchpoint kinds. */
11910
11911static void
11912ada_catchpoint_location_dtor (struct bp_location *bl)
11913{
11914 struct ada_catchpoint_location *al = (struct ada_catchpoint_location *) bl;
11915
11916 xfree (al->excep_cond_expr);
11917}
11918
11919/* The vtable to be used in Ada catchpoint locations. */
11920
11921static const struct bp_location_ops ada_catchpoint_location_ops =
11922{
11923 ada_catchpoint_location_dtor
11924};
11925
11926/* An instance of this type is used to represent an Ada catchpoint.
11927 It includes a "struct breakpoint" as a kind of base class; users
11928 downcast to "struct breakpoint *" when needed. */
11929
11930struct ada_catchpoint
11931{
11932 /* The base class. */
11933 struct breakpoint base;
11934
11935 /* The name of the specific exception the user specified. */
11936 char *excep_string;
11937};
11938
11939/* Parse the exception condition string in the context of each of the
11940 catchpoint's locations, and store them for later evaluation. */
11941
11942static void
11943create_excep_cond_exprs (struct ada_catchpoint *c)
11944{
11945 struct cleanup *old_chain;
11946 struct bp_location *bl;
11947 char *cond_string;
11948
11949 /* Nothing to do if there's no specific exception to catch. */
11950 if (c->excep_string == NULL)
11951 return;
11952
11953 /* Same if there are no locations... */
11954 if (c->base.loc == NULL)
11955 return;
11956
11957 /* Compute the condition expression in text form, from the specific
11958 expection we want to catch. */
11959 cond_string = ada_exception_catchpoint_cond_string (c->excep_string);
11960 old_chain = make_cleanup (xfree, cond_string);
11961
11962 /* Iterate over all the catchpoint's locations, and parse an
11963 expression for each. */
11964 for (bl = c->base.loc; bl != NULL; bl = bl->next)
11965 {
11966 struct ada_catchpoint_location *ada_loc
11967 = (struct ada_catchpoint_location *) bl;
11968 struct expression *exp = NULL;
11969
11970 if (!bl->shlib_disabled)
11971 {
bbc13ae3 11972 const char *s;
28010a5d
PA
11973
11974 s = cond_string;
492d29ea 11975 TRY
28010a5d 11976 {
1bb9788d
TT
11977 exp = parse_exp_1 (&s, bl->address,
11978 block_for_pc (bl->address), 0);
28010a5d 11979 }
492d29ea 11980 CATCH (e, RETURN_MASK_ERROR)
849f2b52
JB
11981 {
11982 warning (_("failed to reevaluate internal exception condition "
11983 "for catchpoint %d: %s"),
11984 c->base.number, e.message);
11985 /* There is a bug in GCC on sparc-solaris when building with
11986 optimization which causes EXP to change unexpectedly
11987 (http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56982).
11988 The problem should be fixed starting with GCC 4.9.
11989 In the meantime, work around it by forcing EXP back
11990 to NULL. */
11991 exp = NULL;
11992 }
492d29ea 11993 END_CATCH
28010a5d
PA
11994 }
11995
11996 ada_loc->excep_cond_expr = exp;
11997 }
11998
11999 do_cleanups (old_chain);
12000}
12001
12002/* Implement the DTOR method in the breakpoint_ops structure for all
12003 exception catchpoint kinds. */
12004
12005static void
761269c8 12006dtor_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12007{
12008 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12009
12010 xfree (c->excep_string);
348d480f 12011
2060206e 12012 bkpt_breakpoint_ops.dtor (b);
28010a5d
PA
12013}
12014
12015/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12016 structure for all exception catchpoint kinds. */
12017
12018static struct bp_location *
761269c8 12019allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
12020 struct breakpoint *self)
12021{
12022 struct ada_catchpoint_location *loc;
12023
12024 loc = XNEW (struct ada_catchpoint_location);
12025 init_bp_location (&loc->base, &ada_catchpoint_location_ops, self);
12026 loc->excep_cond_expr = NULL;
12027 return &loc->base;
12028}
12029
12030/* Implement the RE_SET method in the breakpoint_ops structure for all
12031 exception catchpoint kinds. */
12032
12033static void
761269c8 12034re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12035{
12036 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12037
12038 /* Call the base class's method. This updates the catchpoint's
12039 locations. */
2060206e 12040 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12041
12042 /* Reparse the exception conditional expressions. One for each
12043 location. */
12044 create_excep_cond_exprs (c);
12045}
12046
12047/* Returns true if we should stop for this breakpoint hit. If the
12048 user specified a specific exception, we only want to cause a stop
12049 if the program thrown that exception. */
12050
12051static int
12052should_stop_exception (const struct bp_location *bl)
12053{
12054 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12055 const struct ada_catchpoint_location *ada_loc
12056 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12057 int stop;
12058
12059 /* With no specific exception, should always stop. */
12060 if (c->excep_string == NULL)
12061 return 1;
12062
12063 if (ada_loc->excep_cond_expr == NULL)
12064 {
12065 /* We will have a NULL expression if back when we were creating
12066 the expressions, this location's had failed to parse. */
12067 return 1;
12068 }
12069
12070 stop = 1;
492d29ea 12071 TRY
28010a5d
PA
12072 {
12073 struct value *mark;
12074
12075 mark = value_mark ();
12076 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr));
12077 value_free_to_mark (mark);
12078 }
492d29ea
PA
12079 CATCH (ex, RETURN_MASK_ALL)
12080 {
12081 exception_fprintf (gdb_stderr, ex,
12082 _("Error in testing exception condition:\n"));
12083 }
12084 END_CATCH
12085
28010a5d
PA
12086 return stop;
12087}
12088
12089/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12090 for all exception catchpoint kinds. */
12091
12092static void
761269c8 12093check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
12094{
12095 bs->stop = should_stop_exception (bs->bp_location_at);
12096}
12097
f7f9143b
JB
12098/* Implement the PRINT_IT method in the breakpoint_ops structure
12099 for all exception catchpoint kinds. */
12100
12101static enum print_stop_action
761269c8 12102print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 12103{
79a45e25 12104 struct ui_out *uiout = current_uiout;
348d480f
PA
12105 struct breakpoint *b = bs->breakpoint_at;
12106
956a9fb9 12107 annotate_catchpoint (b->number);
f7f9143b 12108
956a9fb9 12109 if (ui_out_is_mi_like_p (uiout))
f7f9143b 12110 {
956a9fb9
JB
12111 ui_out_field_string (uiout, "reason",
12112 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
12113 ui_out_field_string (uiout, "disp", bpdisp_text (b->disposition));
f7f9143b
JB
12114 }
12115
00eb2c4a
JB
12116 ui_out_text (uiout,
12117 b->disposition == disp_del ? "\nTemporary catchpoint "
12118 : "\nCatchpoint ");
956a9fb9
JB
12119 ui_out_field_int (uiout, "bkptno", b->number);
12120 ui_out_text (uiout, ", ");
f7f9143b 12121
f7f9143b
JB
12122 switch (ex)
12123 {
761269c8
JB
12124 case ada_catch_exception:
12125 case ada_catch_exception_unhandled:
956a9fb9
JB
12126 {
12127 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12128 char exception_name[256];
12129
12130 if (addr != 0)
12131 {
c714b426
PA
12132 read_memory (addr, (gdb_byte *) exception_name,
12133 sizeof (exception_name) - 1);
956a9fb9
JB
12134 exception_name [sizeof (exception_name) - 1] = '\0';
12135 }
12136 else
12137 {
12138 /* For some reason, we were unable to read the exception
12139 name. This could happen if the Runtime was compiled
12140 without debugging info, for instance. In that case,
12141 just replace the exception name by the generic string
12142 "exception" - it will read as "an exception" in the
12143 notification we are about to print. */
967cff16 12144 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12145 }
12146 /* In the case of unhandled exception breakpoints, we print
12147 the exception name as "unhandled EXCEPTION_NAME", to make
12148 it clearer to the user which kind of catchpoint just got
12149 hit. We used ui_out_text to make sure that this extra
12150 info does not pollute the exception name in the MI case. */
761269c8 12151 if (ex == ada_catch_exception_unhandled)
956a9fb9
JB
12152 ui_out_text (uiout, "unhandled ");
12153 ui_out_field_string (uiout, "exception-name", exception_name);
12154 }
12155 break;
761269c8 12156 case ada_catch_assert:
956a9fb9
JB
12157 /* In this case, the name of the exception is not really
12158 important. Just print "failed assertion" to make it clearer
12159 that his program just hit an assertion-failure catchpoint.
12160 We used ui_out_text because this info does not belong in
12161 the MI output. */
12162 ui_out_text (uiout, "failed assertion");
12163 break;
f7f9143b 12164 }
956a9fb9
JB
12165 ui_out_text (uiout, " at ");
12166 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12167
12168 return PRINT_SRC_AND_LOC;
12169}
12170
12171/* Implement the PRINT_ONE method in the breakpoint_ops structure
12172 for all exception catchpoint kinds. */
12173
12174static void
761269c8 12175print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12176 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12177{
79a45e25 12178 struct ui_out *uiout = current_uiout;
28010a5d 12179 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12180 struct value_print_options opts;
12181
12182 get_user_print_options (&opts);
12183 if (opts.addressprint)
f7f9143b
JB
12184 {
12185 annotate_field (4);
5af949e3 12186 ui_out_field_core_addr (uiout, "addr", b->loc->gdbarch, b->loc->address);
f7f9143b
JB
12187 }
12188
12189 annotate_field (5);
a6d9a66e 12190 *last_loc = b->loc;
f7f9143b
JB
12191 switch (ex)
12192 {
761269c8 12193 case ada_catch_exception:
28010a5d 12194 if (c->excep_string != NULL)
f7f9143b 12195 {
28010a5d
PA
12196 char *msg = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12197
f7f9143b
JB
12198 ui_out_field_string (uiout, "what", msg);
12199 xfree (msg);
12200 }
12201 else
12202 ui_out_field_string (uiout, "what", "all Ada exceptions");
12203
12204 break;
12205
761269c8 12206 case ada_catch_exception_unhandled:
f7f9143b
JB
12207 ui_out_field_string (uiout, "what", "unhandled Ada exceptions");
12208 break;
12209
761269c8 12210 case ada_catch_assert:
f7f9143b
JB
12211 ui_out_field_string (uiout, "what", "failed Ada assertions");
12212 break;
12213
12214 default:
12215 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12216 break;
12217 }
12218}
12219
12220/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12221 for all exception catchpoint kinds. */
12222
12223static void
761269c8 12224print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12225 struct breakpoint *b)
12226{
28010a5d 12227 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12228 struct ui_out *uiout = current_uiout;
28010a5d 12229
00eb2c4a
JB
12230 ui_out_text (uiout, b->disposition == disp_del ? _("Temporary catchpoint ")
12231 : _("Catchpoint "));
12232 ui_out_field_int (uiout, "bkptno", b->number);
12233 ui_out_text (uiout, ": ");
12234
f7f9143b
JB
12235 switch (ex)
12236 {
761269c8 12237 case ada_catch_exception:
28010a5d 12238 if (c->excep_string != NULL)
00eb2c4a
JB
12239 {
12240 char *info = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12241 struct cleanup *old_chain = make_cleanup (xfree, info);
12242
12243 ui_out_text (uiout, info);
12244 do_cleanups (old_chain);
12245 }
f7f9143b 12246 else
00eb2c4a 12247 ui_out_text (uiout, _("all Ada exceptions"));
f7f9143b
JB
12248 break;
12249
761269c8 12250 case ada_catch_exception_unhandled:
00eb2c4a 12251 ui_out_text (uiout, _("unhandled Ada exceptions"));
f7f9143b
JB
12252 break;
12253
761269c8 12254 case ada_catch_assert:
00eb2c4a 12255 ui_out_text (uiout, _("failed Ada assertions"));
f7f9143b
JB
12256 break;
12257
12258 default:
12259 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12260 break;
12261 }
12262}
12263
6149aea9
PA
12264/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12265 for all exception catchpoint kinds. */
12266
12267static void
761269c8 12268print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12269 struct breakpoint *b, struct ui_file *fp)
12270{
28010a5d
PA
12271 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12272
6149aea9
PA
12273 switch (ex)
12274 {
761269c8 12275 case ada_catch_exception:
6149aea9 12276 fprintf_filtered (fp, "catch exception");
28010a5d
PA
12277 if (c->excep_string != NULL)
12278 fprintf_filtered (fp, " %s", c->excep_string);
6149aea9
PA
12279 break;
12280
761269c8 12281 case ada_catch_exception_unhandled:
78076abc 12282 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12283 break;
12284
761269c8 12285 case ada_catch_assert:
6149aea9
PA
12286 fprintf_filtered (fp, "catch assert");
12287 break;
12288
12289 default:
12290 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12291 }
d9b3f62e 12292 print_recreate_thread (b, fp);
6149aea9
PA
12293}
12294
f7f9143b
JB
12295/* Virtual table for "catch exception" breakpoints. */
12296
28010a5d
PA
12297static void
12298dtor_catch_exception (struct breakpoint *b)
12299{
761269c8 12300 dtor_exception (ada_catch_exception, b);
28010a5d
PA
12301}
12302
12303static struct bp_location *
12304allocate_location_catch_exception (struct breakpoint *self)
12305{
761269c8 12306 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12307}
12308
12309static void
12310re_set_catch_exception (struct breakpoint *b)
12311{
761269c8 12312 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12313}
12314
12315static void
12316check_status_catch_exception (bpstat bs)
12317{
761269c8 12318 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12319}
12320
f7f9143b 12321static enum print_stop_action
348d480f 12322print_it_catch_exception (bpstat bs)
f7f9143b 12323{
761269c8 12324 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12325}
12326
12327static void
a6d9a66e 12328print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12329{
761269c8 12330 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12331}
12332
12333static void
12334print_mention_catch_exception (struct breakpoint *b)
12335{
761269c8 12336 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12337}
12338
6149aea9
PA
12339static void
12340print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12341{
761269c8 12342 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12343}
12344
2060206e 12345static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12346
12347/* Virtual table for "catch exception unhandled" breakpoints. */
12348
28010a5d
PA
12349static void
12350dtor_catch_exception_unhandled (struct breakpoint *b)
12351{
761269c8 12352 dtor_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12353}
12354
12355static struct bp_location *
12356allocate_location_catch_exception_unhandled (struct breakpoint *self)
12357{
761269c8 12358 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12359}
12360
12361static void
12362re_set_catch_exception_unhandled (struct breakpoint *b)
12363{
761269c8 12364 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12365}
12366
12367static void
12368check_status_catch_exception_unhandled (bpstat bs)
12369{
761269c8 12370 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12371}
12372
f7f9143b 12373static enum print_stop_action
348d480f 12374print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12375{
761269c8 12376 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12377}
12378
12379static void
a6d9a66e
UW
12380print_one_catch_exception_unhandled (struct breakpoint *b,
12381 struct bp_location **last_loc)
f7f9143b 12382{
761269c8 12383 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12384}
12385
12386static void
12387print_mention_catch_exception_unhandled (struct breakpoint *b)
12388{
761269c8 12389 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12390}
12391
6149aea9
PA
12392static void
12393print_recreate_catch_exception_unhandled (struct breakpoint *b,
12394 struct ui_file *fp)
12395{
761269c8 12396 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12397}
12398
2060206e 12399static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12400
12401/* Virtual table for "catch assert" breakpoints. */
12402
28010a5d
PA
12403static void
12404dtor_catch_assert (struct breakpoint *b)
12405{
761269c8 12406 dtor_exception (ada_catch_assert, b);
28010a5d
PA
12407}
12408
12409static struct bp_location *
12410allocate_location_catch_assert (struct breakpoint *self)
12411{
761269c8 12412 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12413}
12414
12415static void
12416re_set_catch_assert (struct breakpoint *b)
12417{
761269c8 12418 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12419}
12420
12421static void
12422check_status_catch_assert (bpstat bs)
12423{
761269c8 12424 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12425}
12426
f7f9143b 12427static enum print_stop_action
348d480f 12428print_it_catch_assert (bpstat bs)
f7f9143b 12429{
761269c8 12430 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12431}
12432
12433static void
a6d9a66e 12434print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12435{
761269c8 12436 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12437}
12438
12439static void
12440print_mention_catch_assert (struct breakpoint *b)
12441{
761269c8 12442 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12443}
12444
6149aea9
PA
12445static void
12446print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12447{
761269c8 12448 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12449}
12450
2060206e 12451static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12452
f7f9143b
JB
12453/* Return a newly allocated copy of the first space-separated token
12454 in ARGSP, and then adjust ARGSP to point immediately after that
12455 token.
12456
12457 Return NULL if ARGPS does not contain any more tokens. */
12458
12459static char *
12460ada_get_next_arg (char **argsp)
12461{
12462 char *args = *argsp;
12463 char *end;
12464 char *result;
12465
0fcd72ba 12466 args = skip_spaces (args);
f7f9143b
JB
12467 if (args[0] == '\0')
12468 return NULL; /* No more arguments. */
12469
12470 /* Find the end of the current argument. */
12471
0fcd72ba 12472 end = skip_to_space (args);
f7f9143b
JB
12473
12474 /* Adjust ARGSP to point to the start of the next argument. */
12475
12476 *argsp = end;
12477
12478 /* Make a copy of the current argument and return it. */
12479
12480 result = xmalloc (end - args + 1);
12481 strncpy (result, args, end - args);
12482 result[end - args] = '\0';
12483
12484 return result;
12485}
12486
12487/* Split the arguments specified in a "catch exception" command.
12488 Set EX to the appropriate catchpoint type.
28010a5d 12489 Set EXCEP_STRING to the name of the specific exception if
5845583d
JB
12490 specified by the user.
12491 If a condition is found at the end of the arguments, the condition
12492 expression is stored in COND_STRING (memory must be deallocated
12493 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12494
12495static void
12496catch_ada_exception_command_split (char *args,
761269c8 12497 enum ada_exception_catchpoint_kind *ex,
5845583d
JB
12498 char **excep_string,
12499 char **cond_string)
f7f9143b
JB
12500{
12501 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
12502 char *exception_name;
5845583d 12503 char *cond = NULL;
f7f9143b
JB
12504
12505 exception_name = ada_get_next_arg (&args);
5845583d
JB
12506 if (exception_name != NULL && strcmp (exception_name, "if") == 0)
12507 {
12508 /* This is not an exception name; this is the start of a condition
12509 expression for a catchpoint on all exceptions. So, "un-get"
12510 this token, and set exception_name to NULL. */
12511 xfree (exception_name);
12512 exception_name = NULL;
12513 args -= 2;
12514 }
f7f9143b
JB
12515 make_cleanup (xfree, exception_name);
12516
5845583d 12517 /* Check to see if we have a condition. */
f7f9143b 12518
0fcd72ba 12519 args = skip_spaces (args);
61012eef 12520 if (startswith (args, "if")
5845583d
JB
12521 && (isspace (args[2]) || args[2] == '\0'))
12522 {
12523 args += 2;
12524 args = skip_spaces (args);
12525
12526 if (args[0] == '\0')
12527 error (_("Condition missing after `if' keyword"));
12528 cond = xstrdup (args);
12529 make_cleanup (xfree, cond);
12530
12531 args += strlen (args);
12532 }
12533
12534 /* Check that we do not have any more arguments. Anything else
12535 is unexpected. */
f7f9143b
JB
12536
12537 if (args[0] != '\0')
12538 error (_("Junk at end of expression"));
12539
12540 discard_cleanups (old_chain);
12541
12542 if (exception_name == NULL)
12543 {
12544 /* Catch all exceptions. */
761269c8 12545 *ex = ada_catch_exception;
28010a5d 12546 *excep_string = NULL;
f7f9143b
JB
12547 }
12548 else if (strcmp (exception_name, "unhandled") == 0)
12549 {
12550 /* Catch unhandled exceptions. */
761269c8 12551 *ex = ada_catch_exception_unhandled;
28010a5d 12552 *excep_string = NULL;
f7f9143b
JB
12553 }
12554 else
12555 {
12556 /* Catch a specific exception. */
761269c8 12557 *ex = ada_catch_exception;
28010a5d 12558 *excep_string = exception_name;
f7f9143b 12559 }
5845583d 12560 *cond_string = cond;
f7f9143b
JB
12561}
12562
12563/* Return the name of the symbol on which we should break in order to
12564 implement a catchpoint of the EX kind. */
12565
12566static const char *
761269c8 12567ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12568{
3eecfa55
JB
12569 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12570
12571 gdb_assert (data->exception_info != NULL);
0259addd 12572
f7f9143b
JB
12573 switch (ex)
12574 {
761269c8 12575 case ada_catch_exception:
3eecfa55 12576 return (data->exception_info->catch_exception_sym);
f7f9143b 12577 break;
761269c8 12578 case ada_catch_exception_unhandled:
3eecfa55 12579 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12580 break;
761269c8 12581 case ada_catch_assert:
3eecfa55 12582 return (data->exception_info->catch_assert_sym);
f7f9143b
JB
12583 break;
12584 default:
12585 internal_error (__FILE__, __LINE__,
12586 _("unexpected catchpoint kind (%d)"), ex);
12587 }
12588}
12589
12590/* Return the breakpoint ops "virtual table" used for catchpoints
12591 of the EX kind. */
12592
c0a91b2b 12593static const struct breakpoint_ops *
761269c8 12594ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12595{
12596 switch (ex)
12597 {
761269c8 12598 case ada_catch_exception:
f7f9143b
JB
12599 return (&catch_exception_breakpoint_ops);
12600 break;
761269c8 12601 case ada_catch_exception_unhandled:
f7f9143b
JB
12602 return (&catch_exception_unhandled_breakpoint_ops);
12603 break;
761269c8 12604 case ada_catch_assert:
f7f9143b
JB
12605 return (&catch_assert_breakpoint_ops);
12606 break;
12607 default:
12608 internal_error (__FILE__, __LINE__,
12609 _("unexpected catchpoint kind (%d)"), ex);
12610 }
12611}
12612
12613/* Return the condition that will be used to match the current exception
12614 being raised with the exception that the user wants to catch. This
12615 assumes that this condition is used when the inferior just triggered
12616 an exception catchpoint.
12617
12618 The string returned is a newly allocated string that needs to be
12619 deallocated later. */
12620
12621static char *
28010a5d 12622ada_exception_catchpoint_cond_string (const char *excep_string)
f7f9143b 12623{
3d0b0fa3
JB
12624 int i;
12625
0963b4bd 12626 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12627 runtime units that have been compiled without debugging info; if
28010a5d 12628 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12629 exception (e.g. "constraint_error") then, during the evaluation
12630 of the condition expression, the symbol lookup on this name would
0963b4bd 12631 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12632 may then be set only on user-defined exceptions which have the
12633 same not-fully-qualified name (e.g. my_package.constraint_error).
12634
12635 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12636 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12637 exception constraint_error" is rewritten into "catch exception
12638 standard.constraint_error".
12639
12640 If an exception named contraint_error is defined in another package of
12641 the inferior program, then the only way to specify this exception as a
12642 breakpoint condition is to use its fully-qualified named:
12643 e.g. my_package.constraint_error. */
12644
12645 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12646 {
28010a5d 12647 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3
JB
12648 {
12649 return xstrprintf ("long_integer (e) = long_integer (&standard.%s)",
28010a5d 12650 excep_string);
3d0b0fa3
JB
12651 }
12652 }
28010a5d 12653 return xstrprintf ("long_integer (e) = long_integer (&%s)", excep_string);
f7f9143b
JB
12654}
12655
12656/* Return the symtab_and_line that should be used to insert an exception
12657 catchpoint of the TYPE kind.
12658
28010a5d
PA
12659 EXCEP_STRING should contain the name of a specific exception that
12660 the catchpoint should catch, or NULL otherwise.
f7f9143b 12661
28010a5d
PA
12662 ADDR_STRING returns the name of the function where the real
12663 breakpoint that implements the catchpoints is set, depending on the
12664 type of catchpoint we need to create. */
f7f9143b
JB
12665
12666static struct symtab_and_line
761269c8 12667ada_exception_sal (enum ada_exception_catchpoint_kind ex, char *excep_string,
c0a91b2b 12668 char **addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12669{
12670 const char *sym_name;
12671 struct symbol *sym;
f7f9143b 12672
0259addd
JB
12673 /* First, find out which exception support info to use. */
12674 ada_exception_support_info_sniffer ();
12675
12676 /* Then lookup the function on which we will break in order to catch
f7f9143b 12677 the Ada exceptions requested by the user. */
f7f9143b
JB
12678 sym_name = ada_exception_sym_name (ex);
12679 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12680
f17011e0
JB
12681 /* We can assume that SYM is not NULL at this stage. If the symbol
12682 did not exist, ada_exception_support_info_sniffer would have
12683 raised an exception.
f7f9143b 12684
f17011e0
JB
12685 Also, ada_exception_support_info_sniffer should have already
12686 verified that SYM is a function symbol. */
12687 gdb_assert (sym != NULL);
12688 gdb_assert (SYMBOL_CLASS (sym) == LOC_BLOCK);
f7f9143b
JB
12689
12690 /* Set ADDR_STRING. */
f7f9143b
JB
12691 *addr_string = xstrdup (sym_name);
12692
f7f9143b 12693 /* Set OPS. */
4b9eee8c 12694 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12695
f17011e0 12696 return find_function_start_sal (sym, 1);
f7f9143b
JB
12697}
12698
b4a5b78b 12699/* Create an Ada exception catchpoint.
f7f9143b 12700
b4a5b78b 12701 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12702
2df4d1d5
JB
12703 If EXCEPT_STRING is NULL, this catchpoint is expected to trigger
12704 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
12705 of the exception to which this catchpoint applies. When not NULL,
12706 the string must be allocated on the heap, and its deallocation
12707 is no longer the responsibility of the caller.
12708
12709 COND_STRING, if not NULL, is the catchpoint condition. This string
12710 must be allocated on the heap, and its deallocation is no longer
12711 the responsibility of the caller.
f7f9143b 12712
b4a5b78b
JB
12713 TEMPFLAG, if nonzero, means that the underlying breakpoint
12714 should be temporary.
28010a5d 12715
b4a5b78b 12716 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12717
349774ef 12718void
28010a5d 12719create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12720 enum ada_exception_catchpoint_kind ex_kind,
28010a5d 12721 char *excep_string,
5845583d 12722 char *cond_string,
28010a5d 12723 int tempflag,
349774ef 12724 int disabled,
28010a5d
PA
12725 int from_tty)
12726{
12727 struct ada_catchpoint *c;
b4a5b78b
JB
12728 char *addr_string = NULL;
12729 const struct breakpoint_ops *ops = NULL;
12730 struct symtab_and_line sal
12731 = ada_exception_sal (ex_kind, excep_string, &addr_string, &ops);
28010a5d
PA
12732
12733 c = XNEW (struct ada_catchpoint);
12734 init_ada_exception_breakpoint (&c->base, gdbarch, sal, addr_string,
349774ef 12735 ops, tempflag, disabled, from_tty);
28010a5d
PA
12736 c->excep_string = excep_string;
12737 create_excep_cond_exprs (c);
5845583d
JB
12738 if (cond_string != NULL)
12739 set_breakpoint_condition (&c->base, cond_string, from_tty);
3ea46bff 12740 install_breakpoint (0, &c->base, 1);
f7f9143b
JB
12741}
12742
9ac4176b
PA
12743/* Implement the "catch exception" command. */
12744
12745static void
12746catch_ada_exception_command (char *arg, int from_tty,
12747 struct cmd_list_element *command)
12748{
12749 struct gdbarch *gdbarch = get_current_arch ();
12750 int tempflag;
761269c8 12751 enum ada_exception_catchpoint_kind ex_kind;
28010a5d 12752 char *excep_string = NULL;
5845583d 12753 char *cond_string = NULL;
9ac4176b
PA
12754
12755 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12756
12757 if (!arg)
12758 arg = "";
b4a5b78b
JB
12759 catch_ada_exception_command_split (arg, &ex_kind, &excep_string,
12760 &cond_string);
12761 create_ada_exception_catchpoint (gdbarch, ex_kind,
12762 excep_string, cond_string,
349774ef
JB
12763 tempflag, 1 /* enabled */,
12764 from_tty);
9ac4176b
PA
12765}
12766
b4a5b78b 12767/* Split the arguments specified in a "catch assert" command.
5845583d 12768
b4a5b78b
JB
12769 ARGS contains the command's arguments (or the empty string if
12770 no arguments were passed).
5845583d
JB
12771
12772 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12773 (the memory needs to be deallocated after use). */
5845583d 12774
b4a5b78b
JB
12775static void
12776catch_ada_assert_command_split (char *args, char **cond_string)
f7f9143b 12777{
5845583d 12778 args = skip_spaces (args);
f7f9143b 12779
5845583d 12780 /* Check whether a condition was provided. */
61012eef 12781 if (startswith (args, "if")
5845583d 12782 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12783 {
5845583d 12784 args += 2;
0fcd72ba 12785 args = skip_spaces (args);
5845583d
JB
12786 if (args[0] == '\0')
12787 error (_("condition missing after `if' keyword"));
12788 *cond_string = xstrdup (args);
f7f9143b
JB
12789 }
12790
5845583d
JB
12791 /* Otherwise, there should be no other argument at the end of
12792 the command. */
12793 else if (args[0] != '\0')
12794 error (_("Junk at end of arguments."));
f7f9143b
JB
12795}
12796
9ac4176b
PA
12797/* Implement the "catch assert" command. */
12798
12799static void
12800catch_assert_command (char *arg, int from_tty,
12801 struct cmd_list_element *command)
12802{
12803 struct gdbarch *gdbarch = get_current_arch ();
12804 int tempflag;
5845583d 12805 char *cond_string = NULL;
9ac4176b
PA
12806
12807 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12808
12809 if (!arg)
12810 arg = "";
b4a5b78b 12811 catch_ada_assert_command_split (arg, &cond_string);
761269c8 12812 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
b4a5b78b 12813 NULL, cond_string,
349774ef
JB
12814 tempflag, 1 /* enabled */,
12815 from_tty);
9ac4176b 12816}
778865d3
JB
12817
12818/* Return non-zero if the symbol SYM is an Ada exception object. */
12819
12820static int
12821ada_is_exception_sym (struct symbol *sym)
12822{
12823 const char *type_name = type_name_no_tag (SYMBOL_TYPE (sym));
12824
12825 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
12826 && SYMBOL_CLASS (sym) != LOC_BLOCK
12827 && SYMBOL_CLASS (sym) != LOC_CONST
12828 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12829 && type_name != NULL && strcmp (type_name, "exception") == 0);
12830}
12831
12832/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12833 Ada exception object. This matches all exceptions except the ones
12834 defined by the Ada language. */
12835
12836static int
12837ada_is_non_standard_exception_sym (struct symbol *sym)
12838{
12839 int i;
12840
12841 if (!ada_is_exception_sym (sym))
12842 return 0;
12843
12844 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12845 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
12846 return 0; /* A standard exception. */
12847
12848 /* Numeric_Error is also a standard exception, so exclude it.
12849 See the STANDARD_EXC description for more details as to why
12850 this exception is not listed in that array. */
12851 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
12852 return 0;
12853
12854 return 1;
12855}
12856
12857/* A helper function for qsort, comparing two struct ada_exc_info
12858 objects.
12859
12860 The comparison is determined first by exception name, and then
12861 by exception address. */
12862
12863static int
12864compare_ada_exception_info (const void *a, const void *b)
12865{
12866 const struct ada_exc_info *exc_a = (struct ada_exc_info *) a;
12867 const struct ada_exc_info *exc_b = (struct ada_exc_info *) b;
12868 int result;
12869
12870 result = strcmp (exc_a->name, exc_b->name);
12871 if (result != 0)
12872 return result;
12873
12874 if (exc_a->addr < exc_b->addr)
12875 return -1;
12876 if (exc_a->addr > exc_b->addr)
12877 return 1;
12878
12879 return 0;
12880}
12881
12882/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12883 routine, but keeping the first SKIP elements untouched.
12884
12885 All duplicates are also removed. */
12886
12887static void
12888sort_remove_dups_ada_exceptions_list (VEC(ada_exc_info) **exceptions,
12889 int skip)
12890{
12891 struct ada_exc_info *to_sort
12892 = VEC_address (ada_exc_info, *exceptions) + skip;
12893 int to_sort_len
12894 = VEC_length (ada_exc_info, *exceptions) - skip;
12895 int i, j;
12896
12897 qsort (to_sort, to_sort_len, sizeof (struct ada_exc_info),
12898 compare_ada_exception_info);
12899
12900 for (i = 1, j = 1; i < to_sort_len; i++)
12901 if (compare_ada_exception_info (&to_sort[i], &to_sort[j - 1]) != 0)
12902 to_sort[j++] = to_sort[i];
12903 to_sort_len = j;
12904 VEC_truncate(ada_exc_info, *exceptions, skip + to_sort_len);
12905}
12906
12907/* A function intended as the "name_matcher" callback in the struct
12908 quick_symbol_functions' expand_symtabs_matching method.
12909
12910 SEARCH_NAME is the symbol's search name.
12911
12912 If USER_DATA is not NULL, it is a pointer to a regext_t object
12913 used to match the symbol (by natural name). Otherwise, when USER_DATA
12914 is null, no filtering is performed, and all symbols are a positive
12915 match. */
12916
12917static int
12918ada_exc_search_name_matches (const char *search_name, void *user_data)
12919{
12920 regex_t *preg = user_data;
12921
12922 if (preg == NULL)
12923 return 1;
12924
12925 /* In Ada, the symbol "search name" is a linkage name, whereas
12926 the regular expression used to do the matching refers to
12927 the natural name. So match against the decoded name. */
12928 return (regexec (preg, ada_decode (search_name), 0, NULL, 0) == 0);
12929}
12930
12931/* Add all exceptions defined by the Ada standard whose name match
12932 a regular expression.
12933
12934 If PREG is not NULL, then this regexp_t object is used to
12935 perform the symbol name matching. Otherwise, no name-based
12936 filtering is performed.
12937
12938 EXCEPTIONS is a vector of exceptions to which matching exceptions
12939 gets pushed. */
12940
12941static void
12942ada_add_standard_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12943{
12944 int i;
12945
12946 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12947 {
12948 if (preg == NULL
12949 || regexec (preg, standard_exc[i], 0, NULL, 0) == 0)
12950 {
12951 struct bound_minimal_symbol msymbol
12952 = ada_lookup_simple_minsym (standard_exc[i]);
12953
12954 if (msymbol.minsym != NULL)
12955 {
12956 struct ada_exc_info info
77e371c0 12957 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3
JB
12958
12959 VEC_safe_push (ada_exc_info, *exceptions, &info);
12960 }
12961 }
12962 }
12963}
12964
12965/* Add all Ada exceptions defined locally and accessible from the given
12966 FRAME.
12967
12968 If PREG is not NULL, then this regexp_t object is used to
12969 perform the symbol name matching. Otherwise, no name-based
12970 filtering is performed.
12971
12972 EXCEPTIONS is a vector of exceptions to which matching exceptions
12973 gets pushed. */
12974
12975static void
12976ada_add_exceptions_from_frame (regex_t *preg, struct frame_info *frame,
12977 VEC(ada_exc_info) **exceptions)
12978{
3977b71f 12979 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
12980
12981 while (block != 0)
12982 {
12983 struct block_iterator iter;
12984 struct symbol *sym;
12985
12986 ALL_BLOCK_SYMBOLS (block, iter, sym)
12987 {
12988 switch (SYMBOL_CLASS (sym))
12989 {
12990 case LOC_TYPEDEF:
12991 case LOC_BLOCK:
12992 case LOC_CONST:
12993 break;
12994 default:
12995 if (ada_is_exception_sym (sym))
12996 {
12997 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
12998 SYMBOL_VALUE_ADDRESS (sym)};
12999
13000 VEC_safe_push (ada_exc_info, *exceptions, &info);
13001 }
13002 }
13003 }
13004 if (BLOCK_FUNCTION (block) != NULL)
13005 break;
13006 block = BLOCK_SUPERBLOCK (block);
13007 }
13008}
13009
13010/* Add all exceptions defined globally whose name name match
13011 a regular expression, excluding standard exceptions.
13012
13013 The reason we exclude standard exceptions is that they need
13014 to be handled separately: Standard exceptions are defined inside
13015 a runtime unit which is normally not compiled with debugging info,
13016 and thus usually do not show up in our symbol search. However,
13017 if the unit was in fact built with debugging info, we need to
13018 exclude them because they would duplicate the entry we found
13019 during the special loop that specifically searches for those
13020 standard exceptions.
13021
13022 If PREG is not NULL, then this regexp_t object is used to
13023 perform the symbol name matching. Otherwise, no name-based
13024 filtering is performed.
13025
13026 EXCEPTIONS is a vector of exceptions to which matching exceptions
13027 gets pushed. */
13028
13029static void
13030ada_add_global_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
13031{
13032 struct objfile *objfile;
43f3e411 13033 struct compunit_symtab *s;
778865d3 13034
276d885b 13035 expand_symtabs_matching (NULL, ada_exc_search_name_matches, NULL,
bb4142cf 13036 VARIABLES_DOMAIN, preg);
778865d3 13037
43f3e411 13038 ALL_COMPUNITS (objfile, s)
778865d3 13039 {
43f3e411 13040 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
778865d3
JB
13041 int i;
13042
13043 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13044 {
13045 struct block *b = BLOCKVECTOR_BLOCK (bv, i);
13046 struct block_iterator iter;
13047 struct symbol *sym;
13048
13049 ALL_BLOCK_SYMBOLS (b, iter, sym)
13050 if (ada_is_non_standard_exception_sym (sym)
13051 && (preg == NULL
13052 || regexec (preg, SYMBOL_NATURAL_NAME (sym),
13053 0, NULL, 0) == 0))
13054 {
13055 struct ada_exc_info info
13056 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
13057
13058 VEC_safe_push (ada_exc_info, *exceptions, &info);
13059 }
13060 }
13061 }
13062}
13063
13064/* Implements ada_exceptions_list with the regular expression passed
13065 as a regex_t, rather than a string.
13066
13067 If not NULL, PREG is used to filter out exceptions whose names
13068 do not match. Otherwise, all exceptions are listed. */
13069
13070static VEC(ada_exc_info) *
13071ada_exceptions_list_1 (regex_t *preg)
13072{
13073 VEC(ada_exc_info) *result = NULL;
13074 struct cleanup *old_chain
13075 = make_cleanup (VEC_cleanup (ada_exc_info), &result);
13076 int prev_len;
13077
13078 /* First, list the known standard exceptions. These exceptions
13079 need to be handled separately, as they are usually defined in
13080 runtime units that have been compiled without debugging info. */
13081
13082 ada_add_standard_exceptions (preg, &result);
13083
13084 /* Next, find all exceptions whose scope is local and accessible
13085 from the currently selected frame. */
13086
13087 if (has_stack_frames ())
13088 {
13089 prev_len = VEC_length (ada_exc_info, result);
13090 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13091 &result);
13092 if (VEC_length (ada_exc_info, result) > prev_len)
13093 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13094 }
13095
13096 /* Add all exceptions whose scope is global. */
13097
13098 prev_len = VEC_length (ada_exc_info, result);
13099 ada_add_global_exceptions (preg, &result);
13100 if (VEC_length (ada_exc_info, result) > prev_len)
13101 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13102
13103 discard_cleanups (old_chain);
13104 return result;
13105}
13106
13107/* Return a vector of ada_exc_info.
13108
13109 If REGEXP is NULL, all exceptions are included in the result.
13110 Otherwise, it should contain a valid regular expression,
13111 and only the exceptions whose names match that regular expression
13112 are included in the result.
13113
13114 The exceptions are sorted in the following order:
13115 - Standard exceptions (defined by the Ada language), in
13116 alphabetical order;
13117 - Exceptions only visible from the current frame, in
13118 alphabetical order;
13119 - Exceptions whose scope is global, in alphabetical order. */
13120
13121VEC(ada_exc_info) *
13122ada_exceptions_list (const char *regexp)
13123{
13124 VEC(ada_exc_info) *result = NULL;
13125 struct cleanup *old_chain = NULL;
13126 regex_t reg;
13127
13128 if (regexp != NULL)
13129 old_chain = compile_rx_or_error (&reg, regexp,
13130 _("invalid regular expression"));
13131
13132 result = ada_exceptions_list_1 (regexp != NULL ? &reg : NULL);
13133
13134 if (old_chain != NULL)
13135 do_cleanups (old_chain);
13136 return result;
13137}
13138
13139/* Implement the "info exceptions" command. */
13140
13141static void
13142info_exceptions_command (char *regexp, int from_tty)
13143{
13144 VEC(ada_exc_info) *exceptions;
13145 struct cleanup *cleanup;
13146 struct gdbarch *gdbarch = get_current_arch ();
13147 int ix;
13148 struct ada_exc_info *info;
13149
13150 exceptions = ada_exceptions_list (regexp);
13151 cleanup = make_cleanup (VEC_cleanup (ada_exc_info), &exceptions);
13152
13153 if (regexp != NULL)
13154 printf_filtered
13155 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13156 else
13157 printf_filtered (_("All defined Ada exceptions:\n"));
13158
13159 for (ix = 0; VEC_iterate(ada_exc_info, exceptions, ix, info); ix++)
13160 printf_filtered ("%s: %s\n", info->name, paddress (gdbarch, info->addr));
13161
13162 do_cleanups (cleanup);
13163}
13164
4c4b4cd2
PH
13165 /* Operators */
13166/* Information about operators given special treatment in functions
13167 below. */
13168/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13169
13170#define ADA_OPERATORS \
13171 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13172 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13173 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13174 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13175 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13176 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13177 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13178 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13179 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13180 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13181 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13182 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13183 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13184 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13185 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13186 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13187 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13188 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13189 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13190
13191static void
554794dc
SDJ
13192ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13193 int *argsp)
4c4b4cd2
PH
13194{
13195 switch (exp->elts[pc - 1].opcode)
13196 {
76a01679 13197 default:
4c4b4cd2
PH
13198 operator_length_standard (exp, pc, oplenp, argsp);
13199 break;
13200
13201#define OP_DEFN(op, len, args, binop) \
13202 case op: *oplenp = len; *argsp = args; break;
13203 ADA_OPERATORS;
13204#undef OP_DEFN
52ce6436
PH
13205
13206 case OP_AGGREGATE:
13207 *oplenp = 3;
13208 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13209 break;
13210
13211 case OP_CHOICES:
13212 *oplenp = 3;
13213 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13214 break;
4c4b4cd2
PH
13215 }
13216}
13217
c0201579
JK
13218/* Implementation of the exp_descriptor method operator_check. */
13219
13220static int
13221ada_operator_check (struct expression *exp, int pos,
13222 int (*objfile_func) (struct objfile *objfile, void *data),
13223 void *data)
13224{
13225 const union exp_element *const elts = exp->elts;
13226 struct type *type = NULL;
13227
13228 switch (elts[pos].opcode)
13229 {
13230 case UNOP_IN_RANGE:
13231 case UNOP_QUAL:
13232 type = elts[pos + 1].type;
13233 break;
13234
13235 default:
13236 return operator_check_standard (exp, pos, objfile_func, data);
13237 }
13238
13239 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13240
13241 if (type && TYPE_OBJFILE (type)
13242 && (*objfile_func) (TYPE_OBJFILE (type), data))
13243 return 1;
13244
13245 return 0;
13246}
13247
4c4b4cd2
PH
13248static char *
13249ada_op_name (enum exp_opcode opcode)
13250{
13251 switch (opcode)
13252 {
76a01679 13253 default:
4c4b4cd2 13254 return op_name_standard (opcode);
52ce6436 13255
4c4b4cd2
PH
13256#define OP_DEFN(op, len, args, binop) case op: return #op;
13257 ADA_OPERATORS;
13258#undef OP_DEFN
52ce6436
PH
13259
13260 case OP_AGGREGATE:
13261 return "OP_AGGREGATE";
13262 case OP_CHOICES:
13263 return "OP_CHOICES";
13264 case OP_NAME:
13265 return "OP_NAME";
4c4b4cd2
PH
13266 }
13267}
13268
13269/* As for operator_length, but assumes PC is pointing at the first
13270 element of the operator, and gives meaningful results only for the
52ce6436 13271 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13272
13273static void
76a01679
JB
13274ada_forward_operator_length (struct expression *exp, int pc,
13275 int *oplenp, int *argsp)
4c4b4cd2 13276{
76a01679 13277 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13278 {
13279 default:
13280 *oplenp = *argsp = 0;
13281 break;
52ce6436 13282
4c4b4cd2
PH
13283#define OP_DEFN(op, len, args, binop) \
13284 case op: *oplenp = len; *argsp = args; break;
13285 ADA_OPERATORS;
13286#undef OP_DEFN
52ce6436
PH
13287
13288 case OP_AGGREGATE:
13289 *oplenp = 3;
13290 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13291 break;
13292
13293 case OP_CHOICES:
13294 *oplenp = 3;
13295 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13296 break;
13297
13298 case OP_STRING:
13299 case OP_NAME:
13300 {
13301 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13302
52ce6436
PH
13303 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13304 *argsp = 0;
13305 break;
13306 }
4c4b4cd2
PH
13307 }
13308}
13309
13310static int
13311ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13312{
13313 enum exp_opcode op = exp->elts[elt].opcode;
13314 int oplen, nargs;
13315 int pc = elt;
13316 int i;
76a01679 13317
4c4b4cd2
PH
13318 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13319
76a01679 13320 switch (op)
4c4b4cd2 13321 {
76a01679 13322 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13323 case OP_ATR_FIRST:
13324 case OP_ATR_LAST:
13325 case OP_ATR_LENGTH:
13326 case OP_ATR_IMAGE:
13327 case OP_ATR_MAX:
13328 case OP_ATR_MIN:
13329 case OP_ATR_MODULUS:
13330 case OP_ATR_POS:
13331 case OP_ATR_SIZE:
13332 case OP_ATR_TAG:
13333 case OP_ATR_VAL:
13334 break;
13335
13336 case UNOP_IN_RANGE:
13337 case UNOP_QUAL:
323e0a4a
AC
13338 /* XXX: gdb_sprint_host_address, type_sprint */
13339 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13340 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13341 fprintf_filtered (stream, " (");
13342 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13343 fprintf_filtered (stream, ")");
13344 break;
13345 case BINOP_IN_BOUNDS:
52ce6436
PH
13346 fprintf_filtered (stream, " (%d)",
13347 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13348 break;
13349 case TERNOP_IN_RANGE:
13350 break;
13351
52ce6436
PH
13352 case OP_AGGREGATE:
13353 case OP_OTHERS:
13354 case OP_DISCRETE_RANGE:
13355 case OP_POSITIONAL:
13356 case OP_CHOICES:
13357 break;
13358
13359 case OP_NAME:
13360 case OP_STRING:
13361 {
13362 char *name = &exp->elts[elt + 2].string;
13363 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13364
52ce6436
PH
13365 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13366 break;
13367 }
13368
4c4b4cd2
PH
13369 default:
13370 return dump_subexp_body_standard (exp, stream, elt);
13371 }
13372
13373 elt += oplen;
13374 for (i = 0; i < nargs; i += 1)
13375 elt = dump_subexp (exp, stream, elt);
13376
13377 return elt;
13378}
13379
13380/* The Ada extension of print_subexp (q.v.). */
13381
76a01679
JB
13382static void
13383ada_print_subexp (struct expression *exp, int *pos,
13384 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13385{
52ce6436 13386 int oplen, nargs, i;
4c4b4cd2
PH
13387 int pc = *pos;
13388 enum exp_opcode op = exp->elts[pc].opcode;
13389
13390 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13391
52ce6436 13392 *pos += oplen;
4c4b4cd2
PH
13393 switch (op)
13394 {
13395 default:
52ce6436 13396 *pos -= oplen;
4c4b4cd2
PH
13397 print_subexp_standard (exp, pos, stream, prec);
13398 return;
13399
13400 case OP_VAR_VALUE:
4c4b4cd2
PH
13401 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13402 return;
13403
13404 case BINOP_IN_BOUNDS:
323e0a4a 13405 /* XXX: sprint_subexp */
4c4b4cd2 13406 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13407 fputs_filtered (" in ", stream);
4c4b4cd2 13408 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13409 fputs_filtered ("'range", stream);
4c4b4cd2 13410 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13411 fprintf_filtered (stream, "(%ld)",
13412 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13413 return;
13414
13415 case TERNOP_IN_RANGE:
4c4b4cd2 13416 if (prec >= PREC_EQUAL)
76a01679 13417 fputs_filtered ("(", stream);
323e0a4a 13418 /* XXX: sprint_subexp */
4c4b4cd2 13419 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13420 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13421 print_subexp (exp, pos, stream, PREC_EQUAL);
13422 fputs_filtered (" .. ", stream);
13423 print_subexp (exp, pos, stream, PREC_EQUAL);
13424 if (prec >= PREC_EQUAL)
76a01679
JB
13425 fputs_filtered (")", stream);
13426 return;
4c4b4cd2
PH
13427
13428 case OP_ATR_FIRST:
13429 case OP_ATR_LAST:
13430 case OP_ATR_LENGTH:
13431 case OP_ATR_IMAGE:
13432 case OP_ATR_MAX:
13433 case OP_ATR_MIN:
13434 case OP_ATR_MODULUS:
13435 case OP_ATR_POS:
13436 case OP_ATR_SIZE:
13437 case OP_ATR_TAG:
13438 case OP_ATR_VAL:
4c4b4cd2 13439 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13440 {
13441 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13442 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13443 &type_print_raw_options);
76a01679
JB
13444 *pos += 3;
13445 }
4c4b4cd2 13446 else
76a01679 13447 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13448 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13449 if (nargs > 1)
76a01679
JB
13450 {
13451 int tem;
5b4ee69b 13452
76a01679
JB
13453 for (tem = 1; tem < nargs; tem += 1)
13454 {
13455 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13456 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13457 }
13458 fputs_filtered (")", stream);
13459 }
4c4b4cd2 13460 return;
14f9c5c9 13461
4c4b4cd2 13462 case UNOP_QUAL:
4c4b4cd2
PH
13463 type_print (exp->elts[pc + 1].type, "", stream, 0);
13464 fputs_filtered ("'(", stream);
13465 print_subexp (exp, pos, stream, PREC_PREFIX);
13466 fputs_filtered (")", stream);
13467 return;
14f9c5c9 13468
4c4b4cd2 13469 case UNOP_IN_RANGE:
323e0a4a 13470 /* XXX: sprint_subexp */
4c4b4cd2 13471 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13472 fputs_filtered (" in ", stream);
79d43c61
TT
13473 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13474 &type_print_raw_options);
4c4b4cd2 13475 return;
52ce6436
PH
13476
13477 case OP_DISCRETE_RANGE:
13478 print_subexp (exp, pos, stream, PREC_SUFFIX);
13479 fputs_filtered ("..", stream);
13480 print_subexp (exp, pos, stream, PREC_SUFFIX);
13481 return;
13482
13483 case OP_OTHERS:
13484 fputs_filtered ("others => ", stream);
13485 print_subexp (exp, pos, stream, PREC_SUFFIX);
13486 return;
13487
13488 case OP_CHOICES:
13489 for (i = 0; i < nargs-1; i += 1)
13490 {
13491 if (i > 0)
13492 fputs_filtered ("|", stream);
13493 print_subexp (exp, pos, stream, PREC_SUFFIX);
13494 }
13495 fputs_filtered (" => ", stream);
13496 print_subexp (exp, pos, stream, PREC_SUFFIX);
13497 return;
13498
13499 case OP_POSITIONAL:
13500 print_subexp (exp, pos, stream, PREC_SUFFIX);
13501 return;
13502
13503 case OP_AGGREGATE:
13504 fputs_filtered ("(", stream);
13505 for (i = 0; i < nargs; i += 1)
13506 {
13507 if (i > 0)
13508 fputs_filtered (", ", stream);
13509 print_subexp (exp, pos, stream, PREC_SUFFIX);
13510 }
13511 fputs_filtered (")", stream);
13512 return;
4c4b4cd2
PH
13513 }
13514}
14f9c5c9
AS
13515
13516/* Table mapping opcodes into strings for printing operators
13517 and precedences of the operators. */
13518
d2e4a39e
AS
13519static const struct op_print ada_op_print_tab[] = {
13520 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13521 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13522 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13523 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13524 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13525 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13526 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13527 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13528 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13529 {">=", BINOP_GEQ, PREC_ORDER, 0},
13530 {">", BINOP_GTR, PREC_ORDER, 0},
13531 {"<", BINOP_LESS, PREC_ORDER, 0},
13532 {">>", BINOP_RSH, PREC_SHIFT, 0},
13533 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13534 {"+", BINOP_ADD, PREC_ADD, 0},
13535 {"-", BINOP_SUB, PREC_ADD, 0},
13536 {"&", BINOP_CONCAT, PREC_ADD, 0},
13537 {"*", BINOP_MUL, PREC_MUL, 0},
13538 {"/", BINOP_DIV, PREC_MUL, 0},
13539 {"rem", BINOP_REM, PREC_MUL, 0},
13540 {"mod", BINOP_MOD, PREC_MUL, 0},
13541 {"**", BINOP_EXP, PREC_REPEAT, 0},
13542 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13543 {"-", UNOP_NEG, PREC_PREFIX, 0},
13544 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13545 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13546 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13547 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13548 {".all", UNOP_IND, PREC_SUFFIX, 1},
13549 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13550 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
d2e4a39e 13551 {NULL, 0, 0, 0}
14f9c5c9
AS
13552};
13553\f
72d5681a
PH
13554enum ada_primitive_types {
13555 ada_primitive_type_int,
13556 ada_primitive_type_long,
13557 ada_primitive_type_short,
13558 ada_primitive_type_char,
13559 ada_primitive_type_float,
13560 ada_primitive_type_double,
13561 ada_primitive_type_void,
13562 ada_primitive_type_long_long,
13563 ada_primitive_type_long_double,
13564 ada_primitive_type_natural,
13565 ada_primitive_type_positive,
13566 ada_primitive_type_system_address,
13567 nr_ada_primitive_types
13568};
6c038f32
PH
13569
13570static void
d4a9a881 13571ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13572 struct language_arch_info *lai)
13573{
d4a9a881 13574 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13575
72d5681a 13576 lai->primitive_type_vector
d4a9a881 13577 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13578 struct type *);
e9bb382b
UW
13579
13580 lai->primitive_type_vector [ada_primitive_type_int]
13581 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13582 0, "integer");
13583 lai->primitive_type_vector [ada_primitive_type_long]
13584 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13585 0, "long_integer");
13586 lai->primitive_type_vector [ada_primitive_type_short]
13587 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13588 0, "short_integer");
13589 lai->string_char_type
13590 = lai->primitive_type_vector [ada_primitive_type_char]
13591 = arch_integer_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
13592 lai->primitive_type_vector [ada_primitive_type_float]
13593 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13594 "float", NULL);
13595 lai->primitive_type_vector [ada_primitive_type_double]
13596 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13597 "long_float", NULL);
13598 lai->primitive_type_vector [ada_primitive_type_long_long]
13599 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13600 0, "long_long_integer");
13601 lai->primitive_type_vector [ada_primitive_type_long_double]
13602 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13603 "long_long_float", NULL);
13604 lai->primitive_type_vector [ada_primitive_type_natural]
13605 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13606 0, "natural");
13607 lai->primitive_type_vector [ada_primitive_type_positive]
13608 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13609 0, "positive");
13610 lai->primitive_type_vector [ada_primitive_type_void]
13611 = builtin->builtin_void;
13612
13613 lai->primitive_type_vector [ada_primitive_type_system_address]
13614 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, 1, "void"));
72d5681a
PH
13615 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13616 = "system__address";
fbb06eb1 13617
47e729a8 13618 lai->bool_type_symbol = NULL;
fbb06eb1 13619 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13620}
6c038f32
PH
13621\f
13622 /* Language vector */
13623
13624/* Not really used, but needed in the ada_language_defn. */
13625
13626static void
6c7a06a3 13627emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13628{
6c7a06a3 13629 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13630}
13631
13632static int
410a0ff2 13633parse (struct parser_state *ps)
6c038f32
PH
13634{
13635 warnings_issued = 0;
410a0ff2 13636 return ada_parse (ps);
6c038f32
PH
13637}
13638
13639static const struct exp_descriptor ada_exp_descriptor = {
13640 ada_print_subexp,
13641 ada_operator_length,
c0201579 13642 ada_operator_check,
6c038f32
PH
13643 ada_op_name,
13644 ada_dump_subexp_body,
13645 ada_evaluate_subexp
13646};
13647
1a119f36 13648/* Implement the "la_get_symbol_name_cmp" language_defn method
74ccd7f5
JB
13649 for Ada. */
13650
1a119f36
JB
13651static symbol_name_cmp_ftype
13652ada_get_symbol_name_cmp (const char *lookup_name)
74ccd7f5
JB
13653{
13654 if (should_use_wild_match (lookup_name))
13655 return wild_match;
13656 else
13657 return compare_names;
13658}
13659
a5ee536b
JB
13660/* Implement the "la_read_var_value" language_defn method for Ada. */
13661
13662static struct value *
13663ada_read_var_value (struct symbol *var, struct frame_info *frame)
13664{
3977b71f 13665 const struct block *frame_block = NULL;
a5ee536b
JB
13666 struct symbol *renaming_sym = NULL;
13667
13668 /* The only case where default_read_var_value is not sufficient
13669 is when VAR is a renaming... */
13670 if (frame)
13671 frame_block = get_frame_block (frame, NULL);
13672 if (frame_block)
13673 renaming_sym = ada_find_renaming_symbol (var, frame_block);
13674 if (renaming_sym != NULL)
13675 return ada_read_renaming_var_value (renaming_sym, frame_block);
13676
13677 /* This is a typical case where we expect the default_read_var_value
13678 function to work. */
13679 return default_read_var_value (var, frame);
13680}
13681
6c038f32
PH
13682const struct language_defn ada_language_defn = {
13683 "ada", /* Language name */
6abde28f 13684 "Ada",
6c038f32 13685 language_ada,
6c038f32 13686 range_check_off,
6c038f32
PH
13687 case_sensitive_on, /* Yes, Ada is case-insensitive, but
13688 that's not quite what this means. */
6c038f32 13689 array_row_major,
9a044a89 13690 macro_expansion_no,
6c038f32
PH
13691 &ada_exp_descriptor,
13692 parse,
13693 ada_error,
13694 resolve,
13695 ada_printchar, /* Print a character constant */
13696 ada_printstr, /* Function to print string constant */
13697 emit_char, /* Function to print single char (not used) */
6c038f32 13698 ada_print_type, /* Print a type using appropriate syntax */
be942545 13699 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
13700 ada_val_print, /* Print a value using appropriate syntax */
13701 ada_value_print, /* Print a top-level value */
a5ee536b 13702 ada_read_var_value, /* la_read_var_value */
6c038f32 13703 NULL, /* Language specific skip_trampoline */
2b2d9e11 13704 NULL, /* name_of_this */
6c038f32
PH
13705 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
13706 basic_lookup_transparent_type, /* lookup_transparent_type */
13707 ada_la_decode, /* Language specific symbol demangler */
0963b4bd
MS
13708 NULL, /* Language specific
13709 class_name_from_physname */
6c038f32
PH
13710 ada_op_print_tab, /* expression operators for printing */
13711 0, /* c-style arrays */
13712 1, /* String lower bound */
6c038f32 13713 ada_get_gdb_completer_word_break_characters,
41d27058 13714 ada_make_symbol_completion_list,
72d5681a 13715 ada_language_arch_info,
e79af960 13716 ada_print_array_index,
41f1b697 13717 default_pass_by_reference,
ae6a3a4c 13718 c_get_string,
1a119f36 13719 ada_get_symbol_name_cmp, /* la_get_symbol_name_cmp */
f8eba3c6 13720 ada_iterate_over_symbols,
a53b64ea 13721 &ada_varobj_ops,
bb2ec1b3
TT
13722 NULL,
13723 NULL,
6c038f32
PH
13724 LANG_MAGIC
13725};
13726
2c0b251b
PA
13727/* Provide a prototype to silence -Wmissing-prototypes. */
13728extern initialize_file_ftype _initialize_ada_language;
13729
5bf03f13
JB
13730/* Command-list for the "set/show ada" prefix command. */
13731static struct cmd_list_element *set_ada_list;
13732static struct cmd_list_element *show_ada_list;
13733
13734/* Implement the "set ada" prefix command. */
13735
13736static void
13737set_ada_command (char *arg, int from_tty)
13738{
13739 printf_unfiltered (_(\
13740"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 13741 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
13742}
13743
13744/* Implement the "show ada" prefix command. */
13745
13746static void
13747show_ada_command (char *args, int from_tty)
13748{
13749 cmd_show_list (show_ada_list, from_tty, "");
13750}
13751
2060206e
PA
13752static void
13753initialize_ada_catchpoint_ops (void)
13754{
13755 struct breakpoint_ops *ops;
13756
13757 initialize_breakpoint_ops ();
13758
13759 ops = &catch_exception_breakpoint_ops;
13760 *ops = bkpt_breakpoint_ops;
13761 ops->dtor = dtor_catch_exception;
13762 ops->allocate_location = allocate_location_catch_exception;
13763 ops->re_set = re_set_catch_exception;
13764 ops->check_status = check_status_catch_exception;
13765 ops->print_it = print_it_catch_exception;
13766 ops->print_one = print_one_catch_exception;
13767 ops->print_mention = print_mention_catch_exception;
13768 ops->print_recreate = print_recreate_catch_exception;
13769
13770 ops = &catch_exception_unhandled_breakpoint_ops;
13771 *ops = bkpt_breakpoint_ops;
13772 ops->dtor = dtor_catch_exception_unhandled;
13773 ops->allocate_location = allocate_location_catch_exception_unhandled;
13774 ops->re_set = re_set_catch_exception_unhandled;
13775 ops->check_status = check_status_catch_exception_unhandled;
13776 ops->print_it = print_it_catch_exception_unhandled;
13777 ops->print_one = print_one_catch_exception_unhandled;
13778 ops->print_mention = print_mention_catch_exception_unhandled;
13779 ops->print_recreate = print_recreate_catch_exception_unhandled;
13780
13781 ops = &catch_assert_breakpoint_ops;
13782 *ops = bkpt_breakpoint_ops;
13783 ops->dtor = dtor_catch_assert;
13784 ops->allocate_location = allocate_location_catch_assert;
13785 ops->re_set = re_set_catch_assert;
13786 ops->check_status = check_status_catch_assert;
13787 ops->print_it = print_it_catch_assert;
13788 ops->print_one = print_one_catch_assert;
13789 ops->print_mention = print_mention_catch_assert;
13790 ops->print_recreate = print_recreate_catch_assert;
13791}
13792
3d9434b5
JB
13793/* This module's 'new_objfile' observer. */
13794
13795static void
13796ada_new_objfile_observer (struct objfile *objfile)
13797{
13798 ada_clear_symbol_cache ();
13799}
13800
13801/* This module's 'free_objfile' observer. */
13802
13803static void
13804ada_free_objfile_observer (struct objfile *objfile)
13805{
13806 ada_clear_symbol_cache ();
13807}
13808
d2e4a39e 13809void
6c038f32 13810_initialize_ada_language (void)
14f9c5c9 13811{
6c038f32
PH
13812 add_language (&ada_language_defn);
13813
2060206e
PA
13814 initialize_ada_catchpoint_ops ();
13815
5bf03f13
JB
13816 add_prefix_cmd ("ada", no_class, set_ada_command,
13817 _("Prefix command for changing Ada-specfic settings"),
13818 &set_ada_list, "set ada ", 0, &setlist);
13819
13820 add_prefix_cmd ("ada", no_class, show_ada_command,
13821 _("Generic command for showing Ada-specific settings."),
13822 &show_ada_list, "show ada ", 0, &showlist);
13823
13824 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
13825 &trust_pad_over_xvs, _("\
13826Enable or disable an optimization trusting PAD types over XVS types"), _("\
13827Show whether an optimization trusting PAD types over XVS types is activated"),
13828 _("\
13829This is related to the encoding used by the GNAT compiler. The debugger\n\
13830should normally trust the contents of PAD types, but certain older versions\n\
13831of GNAT have a bug that sometimes causes the information in the PAD type\n\
13832to be incorrect. Turning this setting \"off\" allows the debugger to\n\
13833work around this bug. It is always safe to turn this option \"off\", but\n\
13834this incurs a slight performance penalty, so it is recommended to NOT change\n\
13835this option to \"off\" unless necessary."),
13836 NULL, NULL, &set_ada_list, &show_ada_list);
13837
9ac4176b
PA
13838 add_catch_command ("exception", _("\
13839Catch Ada exceptions, when raised.\n\
13840With an argument, catch only exceptions with the given name."),
13841 catch_ada_exception_command,
13842 NULL,
13843 CATCH_PERMANENT,
13844 CATCH_TEMPORARY);
13845 add_catch_command ("assert", _("\
13846Catch failed Ada assertions, when raised.\n\
13847With an argument, catch only exceptions with the given name."),
13848 catch_assert_command,
13849 NULL,
13850 CATCH_PERMANENT,
13851 CATCH_TEMPORARY);
13852
6c038f32 13853 varsize_limit = 65536;
6c038f32 13854
778865d3
JB
13855 add_info ("exceptions", info_exceptions_command,
13856 _("\
13857List all Ada exception names.\n\
13858If a regular expression is passed as an argument, only those matching\n\
13859the regular expression are listed."));
13860
c6044dd1
JB
13861 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
13862 _("Set Ada maintenance-related variables."),
13863 &maint_set_ada_cmdlist, "maintenance set ada ",
13864 0/*allow-unknown*/, &maintenance_set_cmdlist);
13865
13866 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
13867 _("Show Ada maintenance-related variables"),
13868 &maint_show_ada_cmdlist, "maintenance show ada ",
13869 0/*allow-unknown*/, &maintenance_show_cmdlist);
13870
13871 add_setshow_boolean_cmd
13872 ("ignore-descriptive-types", class_maintenance,
13873 &ada_ignore_descriptive_types_p,
13874 _("Set whether descriptive types generated by GNAT should be ignored."),
13875 _("Show whether descriptive types generated by GNAT should be ignored."),
13876 _("\
13877When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
13878DWARF attribute."),
13879 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
13880
6c038f32
PH
13881 obstack_init (&symbol_list_obstack);
13882
13883 decoded_names_store = htab_create_alloc
13884 (256, htab_hash_string, (int (*)(const void *, const void *)) streq,
13885 NULL, xcalloc, xfree);
6b69afc4 13886
3d9434b5
JB
13887 /* The ada-lang observers. */
13888 observer_attach_new_objfile (ada_new_objfile_observer);
13889 observer_attach_free_objfile (ada_free_objfile_observer);
e802dbe0 13890 observer_attach_inferior_exit (ada_inferior_exit);
ee01b665
JB
13891
13892 /* Setup various context-specific data. */
e802dbe0 13893 ada_inferior_data
8e260fc0 13894 = register_inferior_data_with_cleanup (NULL, ada_inferior_data_cleanup);
ee01b665
JB
13895 ada_pspace_data_handle
13896 = register_program_space_data_with_cleanup (NULL, ada_pspace_data_cleanup);
14f9c5c9 13897}