]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/ada-lang.c
[Ada] Ignore __XA types when redundant.
[thirdparty/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
ecd75fc8 3 Copyright (C) 1992-2014 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
4c4b4cd2
PH
24#include "gdb_regex.h"
25#include "frame.h"
14f9c5c9
AS
26#include "symtab.h"
27#include "gdbtypes.h"
28#include "gdbcmd.h"
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
a53b64ea 32#include "varobj.h"
14f9c5c9
AS
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
38#include "gdbcore.h"
4c4b4cd2
PH
39#include "hashtab.h"
40#include "gdb_obstack.h"
14f9c5c9 41#include "ada-lang.h"
4c4b4cd2 42#include "completer.h"
53ce3c39 43#include <sys/stat.h>
14f9c5c9 44#include "ui-out.h"
fe898f56 45#include "block.h"
04714b91 46#include "infcall.h"
de4f826b 47#include "dictionary.h"
f7f9143b
JB
48#include "annotate.h"
49#include "valprint.h"
9bbc9174 50#include "source.h"
0259addd 51#include "observer.h"
2ba95b9b 52#include "vec.h"
692465f1 53#include "stack.h"
fa864999 54#include "gdb_vecs.h"
79d43c61 55#include "typeprint.h"
14f9c5c9 56
ccefe4c4 57#include "psymtab.h"
40bc484c 58#include "value.h"
956a9fb9 59#include "mi/mi-common.h"
9ac4176b 60#include "arch-utils.h"
0fcd72ba 61#include "cli/cli-utils.h"
ccefe4c4 62
4c4b4cd2 63/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 64 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
65 Copied from valarith.c. */
66
67#ifndef TRUNCATION_TOWARDS_ZERO
68#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
69#endif
70
d2e4a39e 71static struct type *desc_base_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct type *desc_bounds_type (struct type *);
14f9c5c9 74
d2e4a39e 75static struct value *desc_bounds (struct value *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 78
d2e4a39e 79static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 80
556bdfd4 81static struct type *desc_data_target_type (struct type *);
14f9c5c9 82
d2e4a39e 83static struct value *desc_data (struct value *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 86
d2e4a39e 87static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 88
d2e4a39e 89static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 94
d2e4a39e 95static struct type *desc_index_type (struct type *, int);
14f9c5c9 96
d2e4a39e 97static int desc_arity (struct type *);
14f9c5c9 98
d2e4a39e 99static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 100
d2e4a39e 101static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 102
40658b94
PH
103static int full_match (const char *, const char *);
104
40bc484c 105static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 106
4c4b4cd2 107static void ada_add_block_symbols (struct obstack *,
f0c5f9b2 108 const struct block *, const char *,
2570f2b7 109 domain_enum, struct objfile *, int);
14f9c5c9 110
4c4b4cd2 111static int is_nonfunction (struct ada_symbol_info *, int);
14f9c5c9 112
76a01679 113static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 114 const struct block *);
14f9c5c9 115
4c4b4cd2
PH
116static int num_defns_collected (struct obstack *);
117
118static struct ada_symbol_info *defns_collected (struct obstack *, int);
14f9c5c9 119
4c4b4cd2 120static struct value *resolve_subexp (struct expression **, int *, int,
76a01679 121 struct type *);
14f9c5c9 122
d2e4a39e 123static void replace_operator_with_call (struct expression **, int, int, int,
270140bd 124 struct symbol *, const struct block *);
14f9c5c9 125
d2e4a39e 126static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 127
4c4b4cd2
PH
128static char *ada_op_name (enum exp_opcode);
129
130static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 131
d2e4a39e 132static int numeric_type_p (struct type *);
14f9c5c9 133
d2e4a39e 134static int integer_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int scalar_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int discrete_type_p (struct type *);
14f9c5c9 139
aeb5907d
JB
140static enum ada_renaming_category parse_old_style_renaming (struct type *,
141 const char **,
142 int *,
143 const char **);
144
145static struct symbol *find_old_style_renaming_symbol (const char *,
270140bd 146 const struct block *);
aeb5907d 147
4c4b4cd2 148static struct type *ada_lookup_struct_elt_type (struct type *, char *,
76a01679 149 int, int, int *);
4c4b4cd2 150
d2e4a39e 151static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 152
b4ba55a1
JB
153static struct type *ada_find_parallel_type_with_name (struct type *,
154 const char *);
155
d2e4a39e 156static int is_dynamic_field (struct type *, int);
14f9c5c9 157
10a2c479 158static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 159 const gdb_byte *,
4c4b4cd2
PH
160 CORE_ADDR, struct value *);
161
162static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 163
28c85d6c 164static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 165
d2e4a39e 166static struct type *to_static_fixed_type (struct type *);
f192137b 167static struct type *static_unwrap_type (struct type *type);
14f9c5c9 168
d2e4a39e 169static struct value *unwrap_value (struct value *);
14f9c5c9 170
ad82864c 171static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 172
ad82864c 173static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 174
ad82864c
JB
175static long decode_packed_array_bitsize (struct type *);
176
177static struct value *decode_constrained_packed_array (struct value *);
178
179static int ada_is_packed_array_type (struct type *);
180
181static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 182
d2e4a39e 183static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 184 struct value **);
14f9c5c9 185
50810684 186static void move_bits (gdb_byte *, int, const gdb_byte *, int, int, int);
52ce6436 187
4c4b4cd2
PH
188static struct value *coerce_unspec_val_to_type (struct value *,
189 struct type *);
14f9c5c9 190
d2e4a39e 191static struct value *get_var_value (char *, char *);
14f9c5c9 192
d2e4a39e 193static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 194
d2e4a39e 195static int equiv_types (struct type *, struct type *);
14f9c5c9 196
d2e4a39e 197static int is_name_suffix (const char *);
14f9c5c9 198
73589123
PH
199static int advance_wild_match (const char **, const char *, int);
200
201static int wild_match (const char *, const char *);
14f9c5c9 202
d2e4a39e 203static struct value *ada_coerce_ref (struct value *);
14f9c5c9 204
4c4b4cd2
PH
205static LONGEST pos_atr (struct value *);
206
3cb382c9 207static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 208
d2e4a39e 209static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 210
4c4b4cd2
PH
211static struct symbol *standard_lookup (const char *, const struct block *,
212 domain_enum);
14f9c5c9 213
4c4b4cd2
PH
214static struct value *ada_search_struct_field (char *, struct value *, int,
215 struct type *);
216
217static struct value *ada_value_primitive_field (struct value *, int, int,
218 struct type *);
219
0d5cff50 220static int find_struct_field (const char *, struct type *, int,
52ce6436 221 struct type **, int *, int *, int *, int *);
4c4b4cd2
PH
222
223static struct value *ada_to_fixed_value_create (struct type *, CORE_ADDR,
224 struct value *);
225
4c4b4cd2
PH
226static int ada_resolve_function (struct ada_symbol_info *, int,
227 struct value **, int, const char *,
228 struct type *);
229
4c4b4cd2
PH
230static int ada_is_direct_array_type (struct type *);
231
72d5681a
PH
232static void ada_language_arch_info (struct gdbarch *,
233 struct language_arch_info *);
714e53ab
PH
234
235static void check_size (const struct type *);
52ce6436
PH
236
237static struct value *ada_index_struct_field (int, struct value *, int,
238 struct type *);
239
240static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
241 struct expression *,
242 int *, enum noside);
52ce6436
PH
243
244static void aggregate_assign_from_choices (struct value *, struct value *,
245 struct expression *,
246 int *, LONGEST *, int *,
247 int, LONGEST, LONGEST);
248
249static void aggregate_assign_positional (struct value *, struct value *,
250 struct expression *,
251 int *, LONGEST *, int *, int,
252 LONGEST, LONGEST);
253
254
255static void aggregate_assign_others (struct value *, struct value *,
256 struct expression *,
257 int *, LONGEST *, int, LONGEST, LONGEST);
258
259
260static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
261
262
263static struct value *ada_evaluate_subexp (struct type *, struct expression *,
264 int *, enum noside);
265
266static void ada_forward_operator_length (struct expression *, int, int *,
267 int *);
852dff6c
JB
268
269static struct type *ada_find_any_type (const char *name);
4c4b4cd2
PH
270\f
271
ee01b665
JB
272/* The result of a symbol lookup to be stored in our symbol cache. */
273
274struct cache_entry
275{
276 /* The name used to perform the lookup. */
277 const char *name;
278 /* The namespace used during the lookup. */
279 domain_enum namespace;
280 /* The symbol returned by the lookup, or NULL if no matching symbol
281 was found. */
282 struct symbol *sym;
283 /* The block where the symbol was found, or NULL if no matching
284 symbol was found. */
285 const struct block *block;
286 /* A pointer to the next entry with the same hash. */
287 struct cache_entry *next;
288};
289
290/* The Ada symbol cache, used to store the result of Ada-mode symbol
291 lookups in the course of executing the user's commands.
292
293 The cache is implemented using a simple, fixed-sized hash.
294 The size is fixed on the grounds that there are not likely to be
295 all that many symbols looked up during any given session, regardless
296 of the size of the symbol table. If we decide to go to a resizable
297 table, let's just use the stuff from libiberty instead. */
298
299#define HASH_SIZE 1009
300
301struct ada_symbol_cache
302{
303 /* An obstack used to store the entries in our cache. */
304 struct obstack cache_space;
305
306 /* The root of the hash table used to implement our symbol cache. */
307 struct cache_entry *root[HASH_SIZE];
308};
309
310static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 311
4c4b4cd2 312/* Maximum-sized dynamic type. */
14f9c5c9
AS
313static unsigned int varsize_limit;
314
4c4b4cd2
PH
315/* FIXME: brobecker/2003-09-17: No longer a const because it is
316 returned by a function that does not return a const char *. */
317static char *ada_completer_word_break_characters =
318#ifdef VMS
319 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
320#else
14f9c5c9 321 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 322#endif
14f9c5c9 323
4c4b4cd2 324/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 325static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 326 = "__gnat_ada_main_program_name";
14f9c5c9 327
4c4b4cd2
PH
328/* Limit on the number of warnings to raise per expression evaluation. */
329static int warning_limit = 2;
330
331/* Number of warning messages issued; reset to 0 by cleanups after
332 expression evaluation. */
333static int warnings_issued = 0;
334
335static const char *known_runtime_file_name_patterns[] = {
336 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
337};
338
339static const char *known_auxiliary_function_name_patterns[] = {
340 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
341};
342
343/* Space for allocating results of ada_lookup_symbol_list. */
344static struct obstack symbol_list_obstack;
345
c6044dd1
JB
346/* Maintenance-related settings for this module. */
347
348static struct cmd_list_element *maint_set_ada_cmdlist;
349static struct cmd_list_element *maint_show_ada_cmdlist;
350
351/* Implement the "maintenance set ada" (prefix) command. */
352
353static void
354maint_set_ada_cmd (char *args, int from_tty)
355{
635c7e8a
TT
356 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
357 gdb_stdout);
c6044dd1
JB
358}
359
360/* Implement the "maintenance show ada" (prefix) command. */
361
362static void
363maint_show_ada_cmd (char *args, int from_tty)
364{
365 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
366}
367
368/* The "maintenance ada set/show ignore-descriptive-type" value. */
369
370static int ada_ignore_descriptive_types_p = 0;
371
e802dbe0
JB
372 /* Inferior-specific data. */
373
374/* Per-inferior data for this module. */
375
376struct ada_inferior_data
377{
378 /* The ada__tags__type_specific_data type, which is used when decoding
379 tagged types. With older versions of GNAT, this type was directly
380 accessible through a component ("tsd") in the object tag. But this
381 is no longer the case, so we cache it for each inferior. */
382 struct type *tsd_type;
3eecfa55
JB
383
384 /* The exception_support_info data. This data is used to determine
385 how to implement support for Ada exception catchpoints in a given
386 inferior. */
387 const struct exception_support_info *exception_info;
e802dbe0
JB
388};
389
390/* Our key to this module's inferior data. */
391static const struct inferior_data *ada_inferior_data;
392
393/* A cleanup routine for our inferior data. */
394static void
395ada_inferior_data_cleanup (struct inferior *inf, void *arg)
396{
397 struct ada_inferior_data *data;
398
399 data = inferior_data (inf, ada_inferior_data);
400 if (data != NULL)
401 xfree (data);
402}
403
404/* Return our inferior data for the given inferior (INF).
405
406 This function always returns a valid pointer to an allocated
407 ada_inferior_data structure. If INF's inferior data has not
408 been previously set, this functions creates a new one with all
409 fields set to zero, sets INF's inferior to it, and then returns
410 a pointer to that newly allocated ada_inferior_data. */
411
412static struct ada_inferior_data *
413get_ada_inferior_data (struct inferior *inf)
414{
415 struct ada_inferior_data *data;
416
417 data = inferior_data (inf, ada_inferior_data);
418 if (data == NULL)
419 {
41bf6aca 420 data = XCNEW (struct ada_inferior_data);
e802dbe0
JB
421 set_inferior_data (inf, ada_inferior_data, data);
422 }
423
424 return data;
425}
426
427/* Perform all necessary cleanups regarding our module's inferior data
428 that is required after the inferior INF just exited. */
429
430static void
431ada_inferior_exit (struct inferior *inf)
432{
433 ada_inferior_data_cleanup (inf, NULL);
434 set_inferior_data (inf, ada_inferior_data, NULL);
435}
436
ee01b665
JB
437
438 /* program-space-specific data. */
439
440/* This module's per-program-space data. */
441struct ada_pspace_data
442{
443 /* The Ada symbol cache. */
444 struct ada_symbol_cache *sym_cache;
445};
446
447/* Key to our per-program-space data. */
448static const struct program_space_data *ada_pspace_data_handle;
449
450/* Return this module's data for the given program space (PSPACE).
451 If not is found, add a zero'ed one now.
452
453 This function always returns a valid object. */
454
455static struct ada_pspace_data *
456get_ada_pspace_data (struct program_space *pspace)
457{
458 struct ada_pspace_data *data;
459
460 data = program_space_data (pspace, ada_pspace_data_handle);
461 if (data == NULL)
462 {
463 data = XCNEW (struct ada_pspace_data);
464 set_program_space_data (pspace, ada_pspace_data_handle, data);
465 }
466
467 return data;
468}
469
470/* The cleanup callback for this module's per-program-space data. */
471
472static void
473ada_pspace_data_cleanup (struct program_space *pspace, void *data)
474{
475 struct ada_pspace_data *pspace_data = data;
476
477 if (pspace_data->sym_cache != NULL)
478 ada_free_symbol_cache (pspace_data->sym_cache);
479 xfree (pspace_data);
480}
481
4c4b4cd2
PH
482 /* Utilities */
483
720d1a40 484/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 485 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
486
487 Normally, we really expect a typedef type to only have 1 typedef layer.
488 In other words, we really expect the target type of a typedef type to be
489 a non-typedef type. This is particularly true for Ada units, because
490 the language does not have a typedef vs not-typedef distinction.
491 In that respect, the Ada compiler has been trying to eliminate as many
492 typedef definitions in the debugging information, since they generally
493 do not bring any extra information (we still use typedef under certain
494 circumstances related mostly to the GNAT encoding).
495
496 Unfortunately, we have seen situations where the debugging information
497 generated by the compiler leads to such multiple typedef layers. For
498 instance, consider the following example with stabs:
499
500 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
501 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
502
503 This is an error in the debugging information which causes type
504 pck__float_array___XUP to be defined twice, and the second time,
505 it is defined as a typedef of a typedef.
506
507 This is on the fringe of legality as far as debugging information is
508 concerned, and certainly unexpected. But it is easy to handle these
509 situations correctly, so we can afford to be lenient in this case. */
510
511static struct type *
512ada_typedef_target_type (struct type *type)
513{
514 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
515 type = TYPE_TARGET_TYPE (type);
516 return type;
517}
518
41d27058
JB
519/* Given DECODED_NAME a string holding a symbol name in its
520 decoded form (ie using the Ada dotted notation), returns
521 its unqualified name. */
522
523static const char *
524ada_unqualified_name (const char *decoded_name)
525{
526 const char *result = strrchr (decoded_name, '.');
527
528 if (result != NULL)
529 result++; /* Skip the dot... */
530 else
531 result = decoded_name;
532
533 return result;
534}
535
536/* Return a string starting with '<', followed by STR, and '>'.
537 The result is good until the next call. */
538
539static char *
540add_angle_brackets (const char *str)
541{
542 static char *result = NULL;
543
544 xfree (result);
88c15c34 545 result = xstrprintf ("<%s>", str);
41d27058
JB
546 return result;
547}
96d887e8 548
4c4b4cd2
PH
549static char *
550ada_get_gdb_completer_word_break_characters (void)
551{
552 return ada_completer_word_break_characters;
553}
554
e79af960
JB
555/* Print an array element index using the Ada syntax. */
556
557static void
558ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 559 const struct value_print_options *options)
e79af960 560{
79a45b7d 561 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
562 fprintf_filtered (stream, " => ");
563}
564
f27cf670 565/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 566 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 567 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 568
f27cf670
AS
569void *
570grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 571{
d2e4a39e
AS
572 if (*size < min_size)
573 {
574 *size *= 2;
575 if (*size < min_size)
4c4b4cd2 576 *size = min_size;
f27cf670 577 vect = xrealloc (vect, *size * element_size);
d2e4a39e 578 }
f27cf670 579 return vect;
14f9c5c9
AS
580}
581
582/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 583 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
584
585static int
ebf56fd3 586field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
587{
588 int len = strlen (target);
5b4ee69b 589
d2e4a39e 590 return
4c4b4cd2
PH
591 (strncmp (field_name, target, len) == 0
592 && (field_name[len] == '\0'
593 || (strncmp (field_name + len, "___", 3) == 0
76a01679
JB
594 && strcmp (field_name + strlen (field_name) - 6,
595 "___XVN") != 0)));
14f9c5c9
AS
596}
597
598
872c8b51
JB
599/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
600 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
601 and return its index. This function also handles fields whose name
602 have ___ suffixes because the compiler sometimes alters their name
603 by adding such a suffix to represent fields with certain constraints.
604 If the field could not be found, return a negative number if
605 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
606
607int
608ada_get_field_index (const struct type *type, const char *field_name,
609 int maybe_missing)
610{
611 int fieldno;
872c8b51
JB
612 struct type *struct_type = check_typedef ((struct type *) type);
613
614 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
615 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
616 return fieldno;
617
618 if (!maybe_missing)
323e0a4a 619 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 620 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
621
622 return -1;
623}
624
625/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
626
627int
d2e4a39e 628ada_name_prefix_len (const char *name)
14f9c5c9
AS
629{
630 if (name == NULL)
631 return 0;
d2e4a39e 632 else
14f9c5c9 633 {
d2e4a39e 634 const char *p = strstr (name, "___");
5b4ee69b 635
14f9c5c9 636 if (p == NULL)
4c4b4cd2 637 return strlen (name);
14f9c5c9 638 else
4c4b4cd2 639 return p - name;
14f9c5c9
AS
640 }
641}
642
4c4b4cd2
PH
643/* Return non-zero if SUFFIX is a suffix of STR.
644 Return zero if STR is null. */
645
14f9c5c9 646static int
d2e4a39e 647is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
648{
649 int len1, len2;
5b4ee69b 650
14f9c5c9
AS
651 if (str == NULL)
652 return 0;
653 len1 = strlen (str);
654 len2 = strlen (suffix);
4c4b4cd2 655 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
656}
657
4c4b4cd2
PH
658/* The contents of value VAL, treated as a value of type TYPE. The
659 result is an lval in memory if VAL is. */
14f9c5c9 660
d2e4a39e 661static struct value *
4c4b4cd2 662coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 663{
61ee279c 664 type = ada_check_typedef (type);
df407dfe 665 if (value_type (val) == type)
4c4b4cd2 666 return val;
d2e4a39e 667 else
14f9c5c9 668 {
4c4b4cd2
PH
669 struct value *result;
670
671 /* Make sure that the object size is not unreasonable before
672 trying to allocate some memory for it. */
714e53ab 673 check_size (type);
4c4b4cd2 674
41e8491f
JK
675 if (value_lazy (val)
676 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
677 result = allocate_value_lazy (type);
678 else
679 {
680 result = allocate_value (type);
9a0dc9e3 681 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 682 }
74bcbdf3 683 set_value_component_location (result, val);
9bbda503
AC
684 set_value_bitsize (result, value_bitsize (val));
685 set_value_bitpos (result, value_bitpos (val));
42ae5230 686 set_value_address (result, value_address (val));
14f9c5c9
AS
687 return result;
688 }
689}
690
fc1a4b47
AC
691static const gdb_byte *
692cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
693{
694 if (valaddr == NULL)
695 return NULL;
696 else
697 return valaddr + offset;
698}
699
700static CORE_ADDR
ebf56fd3 701cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
702{
703 if (address == 0)
704 return 0;
d2e4a39e 705 else
14f9c5c9
AS
706 return address + offset;
707}
708
4c4b4cd2
PH
709/* Issue a warning (as for the definition of warning in utils.c, but
710 with exactly one argument rather than ...), unless the limit on the
711 number of warnings has passed during the evaluation of the current
712 expression. */
a2249542 713
77109804
AC
714/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
715 provided by "complaint". */
a0b31db1 716static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 717
14f9c5c9 718static void
a2249542 719lim_warning (const char *format, ...)
14f9c5c9 720{
a2249542 721 va_list args;
a2249542 722
5b4ee69b 723 va_start (args, format);
4c4b4cd2
PH
724 warnings_issued += 1;
725 if (warnings_issued <= warning_limit)
a2249542
MK
726 vwarning (format, args);
727
728 va_end (args);
4c4b4cd2
PH
729}
730
714e53ab
PH
731/* Issue an error if the size of an object of type T is unreasonable,
732 i.e. if it would be a bad idea to allocate a value of this type in
733 GDB. */
734
735static void
736check_size (const struct type *type)
737{
738 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 739 error (_("object size is larger than varsize-limit"));
714e53ab
PH
740}
741
0963b4bd 742/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 743static LONGEST
c3e5cd34 744max_of_size (int size)
4c4b4cd2 745{
76a01679 746 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 747
76a01679 748 return top_bit | (top_bit - 1);
4c4b4cd2
PH
749}
750
0963b4bd 751/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 752static LONGEST
c3e5cd34 753min_of_size (int size)
4c4b4cd2 754{
c3e5cd34 755 return -max_of_size (size) - 1;
4c4b4cd2
PH
756}
757
0963b4bd 758/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 759static ULONGEST
c3e5cd34 760umax_of_size (int size)
4c4b4cd2 761{
76a01679 762 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 763
76a01679 764 return top_bit | (top_bit - 1);
4c4b4cd2
PH
765}
766
0963b4bd 767/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
768static LONGEST
769max_of_type (struct type *t)
4c4b4cd2 770{
c3e5cd34
PH
771 if (TYPE_UNSIGNED (t))
772 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
773 else
774 return max_of_size (TYPE_LENGTH (t));
775}
776
0963b4bd 777/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
778static LONGEST
779min_of_type (struct type *t)
780{
781 if (TYPE_UNSIGNED (t))
782 return 0;
783 else
784 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
785}
786
787/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
788LONGEST
789ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 790{
8739bc53 791 type = resolve_dynamic_type (type, 0);
76a01679 792 switch (TYPE_CODE (type))
4c4b4cd2
PH
793 {
794 case TYPE_CODE_RANGE:
690cc4eb 795 return TYPE_HIGH_BOUND (type);
4c4b4cd2 796 case TYPE_CODE_ENUM:
14e75d8e 797 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
798 case TYPE_CODE_BOOL:
799 return 1;
800 case TYPE_CODE_CHAR:
76a01679 801 case TYPE_CODE_INT:
690cc4eb 802 return max_of_type (type);
4c4b4cd2 803 default:
43bbcdc2 804 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
805 }
806}
807
14e75d8e 808/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
809LONGEST
810ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 811{
8739bc53 812 type = resolve_dynamic_type (type, 0);
76a01679 813 switch (TYPE_CODE (type))
4c4b4cd2
PH
814 {
815 case TYPE_CODE_RANGE:
690cc4eb 816 return TYPE_LOW_BOUND (type);
4c4b4cd2 817 case TYPE_CODE_ENUM:
14e75d8e 818 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
819 case TYPE_CODE_BOOL:
820 return 0;
821 case TYPE_CODE_CHAR:
76a01679 822 case TYPE_CODE_INT:
690cc4eb 823 return min_of_type (type);
4c4b4cd2 824 default:
43bbcdc2 825 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
826 }
827}
828
829/* The identity on non-range types. For range types, the underlying
76a01679 830 non-range scalar type. */
4c4b4cd2
PH
831
832static struct type *
18af8284 833get_base_type (struct type *type)
4c4b4cd2
PH
834{
835 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
836 {
76a01679
JB
837 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
838 return type;
4c4b4cd2
PH
839 type = TYPE_TARGET_TYPE (type);
840 }
841 return type;
14f9c5c9 842}
41246937
JB
843
844/* Return a decoded version of the given VALUE. This means returning
845 a value whose type is obtained by applying all the GNAT-specific
846 encondings, making the resulting type a static but standard description
847 of the initial type. */
848
849struct value *
850ada_get_decoded_value (struct value *value)
851{
852 struct type *type = ada_check_typedef (value_type (value));
853
854 if (ada_is_array_descriptor_type (type)
855 || (ada_is_constrained_packed_array_type (type)
856 && TYPE_CODE (type) != TYPE_CODE_PTR))
857 {
858 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
859 value = ada_coerce_to_simple_array_ptr (value);
860 else
861 value = ada_coerce_to_simple_array (value);
862 }
863 else
864 value = ada_to_fixed_value (value);
865
866 return value;
867}
868
869/* Same as ada_get_decoded_value, but with the given TYPE.
870 Because there is no associated actual value for this type,
871 the resulting type might be a best-effort approximation in
872 the case of dynamic types. */
873
874struct type *
875ada_get_decoded_type (struct type *type)
876{
877 type = to_static_fixed_type (type);
878 if (ada_is_constrained_packed_array_type (type))
879 type = ada_coerce_to_simple_array_type (type);
880 return type;
881}
882
4c4b4cd2 883\f
76a01679 884
4c4b4cd2 885 /* Language Selection */
14f9c5c9
AS
886
887/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 888 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 889
14f9c5c9 890enum language
ccefe4c4 891ada_update_initial_language (enum language lang)
14f9c5c9 892{
d2e4a39e 893 if (lookup_minimal_symbol ("adainit", (const char *) NULL,
3b7344d5 894 (struct objfile *) NULL).minsym != NULL)
4c4b4cd2 895 return language_ada;
14f9c5c9
AS
896
897 return lang;
898}
96d887e8
PH
899
900/* If the main procedure is written in Ada, then return its name.
901 The result is good until the next call. Return NULL if the main
902 procedure doesn't appear to be in Ada. */
903
904char *
905ada_main_name (void)
906{
3b7344d5 907 struct bound_minimal_symbol msym;
f9bc20b9 908 static char *main_program_name = NULL;
6c038f32 909
96d887e8
PH
910 /* For Ada, the name of the main procedure is stored in a specific
911 string constant, generated by the binder. Look for that symbol,
912 extract its address, and then read that string. If we didn't find
913 that string, then most probably the main procedure is not written
914 in Ada. */
915 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
916
3b7344d5 917 if (msym.minsym != NULL)
96d887e8 918 {
f9bc20b9
JB
919 CORE_ADDR main_program_name_addr;
920 int err_code;
921
77e371c0 922 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 923 if (main_program_name_addr == 0)
323e0a4a 924 error (_("Invalid address for Ada main program name."));
96d887e8 925
f9bc20b9
JB
926 xfree (main_program_name);
927 target_read_string (main_program_name_addr, &main_program_name,
928 1024, &err_code);
929
930 if (err_code != 0)
931 return NULL;
96d887e8
PH
932 return main_program_name;
933 }
934
935 /* The main procedure doesn't seem to be in Ada. */
936 return NULL;
937}
14f9c5c9 938\f
4c4b4cd2 939 /* Symbols */
d2e4a39e 940
4c4b4cd2
PH
941/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
942 of NULLs. */
14f9c5c9 943
d2e4a39e
AS
944const struct ada_opname_map ada_opname_table[] = {
945 {"Oadd", "\"+\"", BINOP_ADD},
946 {"Osubtract", "\"-\"", BINOP_SUB},
947 {"Omultiply", "\"*\"", BINOP_MUL},
948 {"Odivide", "\"/\"", BINOP_DIV},
949 {"Omod", "\"mod\"", BINOP_MOD},
950 {"Orem", "\"rem\"", BINOP_REM},
951 {"Oexpon", "\"**\"", BINOP_EXP},
952 {"Olt", "\"<\"", BINOP_LESS},
953 {"Ole", "\"<=\"", BINOP_LEQ},
954 {"Ogt", "\">\"", BINOP_GTR},
955 {"Oge", "\">=\"", BINOP_GEQ},
956 {"Oeq", "\"=\"", BINOP_EQUAL},
957 {"One", "\"/=\"", BINOP_NOTEQUAL},
958 {"Oand", "\"and\"", BINOP_BITWISE_AND},
959 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
960 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
961 {"Oconcat", "\"&\"", BINOP_CONCAT},
962 {"Oabs", "\"abs\"", UNOP_ABS},
963 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
964 {"Oadd", "\"+\"", UNOP_PLUS},
965 {"Osubtract", "\"-\"", UNOP_NEG},
966 {NULL, NULL}
14f9c5c9
AS
967};
968
4c4b4cd2
PH
969/* The "encoded" form of DECODED, according to GNAT conventions.
970 The result is valid until the next call to ada_encode. */
971
14f9c5c9 972char *
4c4b4cd2 973ada_encode (const char *decoded)
14f9c5c9 974{
4c4b4cd2
PH
975 static char *encoding_buffer = NULL;
976 static size_t encoding_buffer_size = 0;
d2e4a39e 977 const char *p;
14f9c5c9 978 int k;
d2e4a39e 979
4c4b4cd2 980 if (decoded == NULL)
14f9c5c9
AS
981 return NULL;
982
4c4b4cd2
PH
983 GROW_VECT (encoding_buffer, encoding_buffer_size,
984 2 * strlen (decoded) + 10);
14f9c5c9
AS
985
986 k = 0;
4c4b4cd2 987 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 988 {
cdc7bb92 989 if (*p == '.')
4c4b4cd2
PH
990 {
991 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
992 k += 2;
993 }
14f9c5c9 994 else if (*p == '"')
4c4b4cd2
PH
995 {
996 const struct ada_opname_map *mapping;
997
998 for (mapping = ada_opname_table;
1265e4aa
JB
999 mapping->encoded != NULL
1000 && strncmp (mapping->decoded, p,
1001 strlen (mapping->decoded)) != 0; mapping += 1)
4c4b4cd2
PH
1002 ;
1003 if (mapping->encoded == NULL)
323e0a4a 1004 error (_("invalid Ada operator name: %s"), p);
4c4b4cd2
PH
1005 strcpy (encoding_buffer + k, mapping->encoded);
1006 k += strlen (mapping->encoded);
1007 break;
1008 }
d2e4a39e 1009 else
4c4b4cd2
PH
1010 {
1011 encoding_buffer[k] = *p;
1012 k += 1;
1013 }
14f9c5c9
AS
1014 }
1015
4c4b4cd2
PH
1016 encoding_buffer[k] = '\0';
1017 return encoding_buffer;
14f9c5c9
AS
1018}
1019
1020/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1021 quotes, unfolded, but with the quotes stripped away. Result good
1022 to next call. */
1023
d2e4a39e
AS
1024char *
1025ada_fold_name (const char *name)
14f9c5c9 1026{
d2e4a39e 1027 static char *fold_buffer = NULL;
14f9c5c9
AS
1028 static size_t fold_buffer_size = 0;
1029
1030 int len = strlen (name);
d2e4a39e 1031 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1032
1033 if (name[0] == '\'')
1034 {
d2e4a39e
AS
1035 strncpy (fold_buffer, name + 1, len - 2);
1036 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1037 }
1038 else
1039 {
1040 int i;
5b4ee69b 1041
14f9c5c9 1042 for (i = 0; i <= len; i += 1)
4c4b4cd2 1043 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1044 }
1045
1046 return fold_buffer;
1047}
1048
529cad9c
PH
1049/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1050
1051static int
1052is_lower_alphanum (const char c)
1053{
1054 return (isdigit (c) || (isalpha (c) && islower (c)));
1055}
1056
c90092fe
JB
1057/* ENCODED is the linkage name of a symbol and LEN contains its length.
1058 This function saves in LEN the length of that same symbol name but
1059 without either of these suffixes:
29480c32
JB
1060 . .{DIGIT}+
1061 . ${DIGIT}+
1062 . ___{DIGIT}+
1063 . __{DIGIT}+.
c90092fe 1064
29480c32
JB
1065 These are suffixes introduced by the compiler for entities such as
1066 nested subprogram for instance, in order to avoid name clashes.
1067 They do not serve any purpose for the debugger. */
1068
1069static void
1070ada_remove_trailing_digits (const char *encoded, int *len)
1071{
1072 if (*len > 1 && isdigit (encoded[*len - 1]))
1073 {
1074 int i = *len - 2;
5b4ee69b 1075
29480c32
JB
1076 while (i > 0 && isdigit (encoded[i]))
1077 i--;
1078 if (i >= 0 && encoded[i] == '.')
1079 *len = i;
1080 else if (i >= 0 && encoded[i] == '$')
1081 *len = i;
1082 else if (i >= 2 && strncmp (encoded + i - 2, "___", 3) == 0)
1083 *len = i - 2;
1084 else if (i >= 1 && strncmp (encoded + i - 1, "__", 2) == 0)
1085 *len = i - 1;
1086 }
1087}
1088
1089/* Remove the suffix introduced by the compiler for protected object
1090 subprograms. */
1091
1092static void
1093ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1094{
1095 /* Remove trailing N. */
1096
1097 /* Protected entry subprograms are broken into two
1098 separate subprograms: The first one is unprotected, and has
1099 a 'N' suffix; the second is the protected version, and has
0963b4bd 1100 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1101 the protection. Since the P subprograms are internally generated,
1102 we leave these names undecoded, giving the user a clue that this
1103 entity is internal. */
1104
1105 if (*len > 1
1106 && encoded[*len - 1] == 'N'
1107 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1108 *len = *len - 1;
1109}
1110
69fadcdf
JB
1111/* Remove trailing X[bn]* suffixes (indicating names in package bodies). */
1112
1113static void
1114ada_remove_Xbn_suffix (const char *encoded, int *len)
1115{
1116 int i = *len - 1;
1117
1118 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n'))
1119 i--;
1120
1121 if (encoded[i] != 'X')
1122 return;
1123
1124 if (i == 0)
1125 return;
1126
1127 if (isalnum (encoded[i-1]))
1128 *len = i;
1129}
1130
29480c32
JB
1131/* If ENCODED follows the GNAT entity encoding conventions, then return
1132 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1133 replaced by ENCODED.
14f9c5c9 1134
4c4b4cd2 1135 The resulting string is valid until the next call of ada_decode.
29480c32 1136 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1137 is returned. */
1138
1139const char *
1140ada_decode (const char *encoded)
14f9c5c9
AS
1141{
1142 int i, j;
1143 int len0;
d2e4a39e 1144 const char *p;
4c4b4cd2 1145 char *decoded;
14f9c5c9 1146 int at_start_name;
4c4b4cd2
PH
1147 static char *decoding_buffer = NULL;
1148 static size_t decoding_buffer_size = 0;
d2e4a39e 1149
29480c32
JB
1150 /* The name of the Ada main procedure starts with "_ada_".
1151 This prefix is not part of the decoded name, so skip this part
1152 if we see this prefix. */
4c4b4cd2
PH
1153 if (strncmp (encoded, "_ada_", 5) == 0)
1154 encoded += 5;
14f9c5c9 1155
29480c32
JB
1156 /* If the name starts with '_', then it is not a properly encoded
1157 name, so do not attempt to decode it. Similarly, if the name
1158 starts with '<', the name should not be decoded. */
4c4b4cd2 1159 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1160 goto Suppress;
1161
4c4b4cd2 1162 len0 = strlen (encoded);
4c4b4cd2 1163
29480c32
JB
1164 ada_remove_trailing_digits (encoded, &len0);
1165 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1166
4c4b4cd2
PH
1167 /* Remove the ___X.* suffix if present. Do not forget to verify that
1168 the suffix is located before the current "end" of ENCODED. We want
1169 to avoid re-matching parts of ENCODED that have previously been
1170 marked as discarded (by decrementing LEN0). */
1171 p = strstr (encoded, "___");
1172 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1173 {
1174 if (p[3] == 'X')
4c4b4cd2 1175 len0 = p - encoded;
14f9c5c9 1176 else
4c4b4cd2 1177 goto Suppress;
14f9c5c9 1178 }
4c4b4cd2 1179
29480c32
JB
1180 /* Remove any trailing TKB suffix. It tells us that this symbol
1181 is for the body of a task, but that information does not actually
1182 appear in the decoded name. */
1183
4c4b4cd2 1184 if (len0 > 3 && strncmp (encoded + len0 - 3, "TKB", 3) == 0)
14f9c5c9 1185 len0 -= 3;
76a01679 1186
a10967fa
JB
1187 /* Remove any trailing TB suffix. The TB suffix is slightly different
1188 from the TKB suffix because it is used for non-anonymous task
1189 bodies. */
1190
1191 if (len0 > 2 && strncmp (encoded + len0 - 2, "TB", 2) == 0)
1192 len0 -= 2;
1193
29480c32
JB
1194 /* Remove trailing "B" suffixes. */
1195 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1196
4c4b4cd2 1197 if (len0 > 1 && strncmp (encoded + len0 - 1, "B", 1) == 0)
14f9c5c9
AS
1198 len0 -= 1;
1199
4c4b4cd2 1200 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1201
4c4b4cd2
PH
1202 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1203 decoded = decoding_buffer;
14f9c5c9 1204
29480c32
JB
1205 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1206
4c4b4cd2 1207 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1208 {
4c4b4cd2
PH
1209 i = len0 - 2;
1210 while ((i >= 0 && isdigit (encoded[i]))
1211 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1212 i -= 1;
1213 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1214 len0 = i - 1;
1215 else if (encoded[i] == '$')
1216 len0 = i;
d2e4a39e 1217 }
14f9c5c9 1218
29480c32
JB
1219 /* The first few characters that are not alphabetic are not part
1220 of any encoding we use, so we can copy them over verbatim. */
1221
4c4b4cd2
PH
1222 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1223 decoded[j] = encoded[i];
14f9c5c9
AS
1224
1225 at_start_name = 1;
1226 while (i < len0)
1227 {
29480c32 1228 /* Is this a symbol function? */
4c4b4cd2
PH
1229 if (at_start_name && encoded[i] == 'O')
1230 {
1231 int k;
5b4ee69b 1232
4c4b4cd2
PH
1233 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1234 {
1235 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1236 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1237 op_len - 1) == 0)
1238 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1239 {
1240 strcpy (decoded + j, ada_opname_table[k].decoded);
1241 at_start_name = 0;
1242 i += op_len;
1243 j += strlen (ada_opname_table[k].decoded);
1244 break;
1245 }
1246 }
1247 if (ada_opname_table[k].encoded != NULL)
1248 continue;
1249 }
14f9c5c9
AS
1250 at_start_name = 0;
1251
529cad9c
PH
1252 /* Replace "TK__" with "__", which will eventually be translated
1253 into "." (just below). */
1254
4c4b4cd2
PH
1255 if (i < len0 - 4 && strncmp (encoded + i, "TK__", 4) == 0)
1256 i += 2;
529cad9c 1257
29480c32
JB
1258 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1259 be translated into "." (just below). These are internal names
1260 generated for anonymous blocks inside which our symbol is nested. */
1261
1262 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1263 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1264 && isdigit (encoded [i+4]))
1265 {
1266 int k = i + 5;
1267
1268 while (k < len0 && isdigit (encoded[k]))
1269 k++; /* Skip any extra digit. */
1270
1271 /* Double-check that the "__B_{DIGITS}+" sequence we found
1272 is indeed followed by "__". */
1273 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1274 i = k;
1275 }
1276
529cad9c
PH
1277 /* Remove _E{DIGITS}+[sb] */
1278
1279 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1280 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1281 one implements the actual entry code, and has a suffix following
1282 the convention above; the second one implements the barrier and
1283 uses the same convention as above, except that the 'E' is replaced
1284 by a 'B'.
1285
1286 Just as above, we do not decode the name of barrier functions
1287 to give the user a clue that the code he is debugging has been
1288 internally generated. */
1289
1290 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1291 && isdigit (encoded[i+2]))
1292 {
1293 int k = i + 3;
1294
1295 while (k < len0 && isdigit (encoded[k]))
1296 k++;
1297
1298 if (k < len0
1299 && (encoded[k] == 'b' || encoded[k] == 's'))
1300 {
1301 k++;
1302 /* Just as an extra precaution, make sure that if this
1303 suffix is followed by anything else, it is a '_'.
1304 Otherwise, we matched this sequence by accident. */
1305 if (k == len0
1306 || (k < len0 && encoded[k] == '_'))
1307 i = k;
1308 }
1309 }
1310
1311 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1312 the GNAT front-end in protected object subprograms. */
1313
1314 if (i < len0 + 3
1315 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1316 {
1317 /* Backtrack a bit up until we reach either the begining of
1318 the encoded name, or "__". Make sure that we only find
1319 digits or lowercase characters. */
1320 const char *ptr = encoded + i - 1;
1321
1322 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1323 ptr--;
1324 if (ptr < encoded
1325 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1326 i++;
1327 }
1328
4c4b4cd2
PH
1329 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1330 {
29480c32
JB
1331 /* This is a X[bn]* sequence not separated from the previous
1332 part of the name with a non-alpha-numeric character (in other
1333 words, immediately following an alpha-numeric character), then
1334 verify that it is placed at the end of the encoded name. If
1335 not, then the encoding is not valid and we should abort the
1336 decoding. Otherwise, just skip it, it is used in body-nested
1337 package names. */
4c4b4cd2
PH
1338 do
1339 i += 1;
1340 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1341 if (i < len0)
1342 goto Suppress;
1343 }
cdc7bb92 1344 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1345 {
29480c32 1346 /* Replace '__' by '.'. */
4c4b4cd2
PH
1347 decoded[j] = '.';
1348 at_start_name = 1;
1349 i += 2;
1350 j += 1;
1351 }
14f9c5c9 1352 else
4c4b4cd2 1353 {
29480c32
JB
1354 /* It's a character part of the decoded name, so just copy it
1355 over. */
4c4b4cd2
PH
1356 decoded[j] = encoded[i];
1357 i += 1;
1358 j += 1;
1359 }
14f9c5c9 1360 }
4c4b4cd2 1361 decoded[j] = '\000';
14f9c5c9 1362
29480c32
JB
1363 /* Decoded names should never contain any uppercase character.
1364 Double-check this, and abort the decoding if we find one. */
1365
4c4b4cd2
PH
1366 for (i = 0; decoded[i] != '\0'; i += 1)
1367 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1368 goto Suppress;
1369
4c4b4cd2
PH
1370 if (strcmp (decoded, encoded) == 0)
1371 return encoded;
1372 else
1373 return decoded;
14f9c5c9
AS
1374
1375Suppress:
4c4b4cd2
PH
1376 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1377 decoded = decoding_buffer;
1378 if (encoded[0] == '<')
1379 strcpy (decoded, encoded);
14f9c5c9 1380 else
88c15c34 1381 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1382 return decoded;
1383
1384}
1385
1386/* Table for keeping permanent unique copies of decoded names. Once
1387 allocated, names in this table are never released. While this is a
1388 storage leak, it should not be significant unless there are massive
1389 changes in the set of decoded names in successive versions of a
1390 symbol table loaded during a single session. */
1391static struct htab *decoded_names_store;
1392
1393/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1394 in the language-specific part of GSYMBOL, if it has not been
1395 previously computed. Tries to save the decoded name in the same
1396 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1397 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1398 GSYMBOL).
4c4b4cd2
PH
1399 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1400 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1401 when a decoded name is cached in it. */
4c4b4cd2 1402
45e6c716 1403const char *
f85f34ed 1404ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1405{
f85f34ed
TT
1406 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1407 const char **resultp =
1408 &gsymbol->language_specific.mangled_lang.demangled_name;
5b4ee69b 1409
f85f34ed 1410 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1411 {
1412 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1413 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1414
f85f34ed 1415 gsymbol->ada_mangled = 1;
5b4ee69b 1416
f85f34ed
TT
1417 if (obstack != NULL)
1418 *resultp = obstack_copy0 (obstack, decoded, strlen (decoded));
1419 else
76a01679 1420 {
f85f34ed
TT
1421 /* Sometimes, we can't find a corresponding objfile, in
1422 which case, we put the result on the heap. Since we only
1423 decode when needed, we hope this usually does not cause a
1424 significant memory leak (FIXME). */
1425
76a01679
JB
1426 char **slot = (char **) htab_find_slot (decoded_names_store,
1427 decoded, INSERT);
5b4ee69b 1428
76a01679
JB
1429 if (*slot == NULL)
1430 *slot = xstrdup (decoded);
1431 *resultp = *slot;
1432 }
4c4b4cd2 1433 }
14f9c5c9 1434
4c4b4cd2
PH
1435 return *resultp;
1436}
76a01679 1437
2c0b251b 1438static char *
76a01679 1439ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1440{
1441 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1442}
1443
1444/* Returns non-zero iff SYM_NAME matches NAME, ignoring any trailing
4c4b4cd2
PH
1445 suffixes that encode debugging information or leading _ada_ on
1446 SYM_NAME (see is_name_suffix commentary for the debugging
1447 information that is ignored). If WILD, then NAME need only match a
1448 suffix of SYM_NAME minus the same suffixes. Also returns 0 if
1449 either argument is NULL. */
14f9c5c9 1450
2c0b251b 1451static int
40658b94 1452match_name (const char *sym_name, const char *name, int wild)
14f9c5c9
AS
1453{
1454 if (sym_name == NULL || name == NULL)
1455 return 0;
1456 else if (wild)
73589123 1457 return wild_match (sym_name, name) == 0;
d2e4a39e
AS
1458 else
1459 {
1460 int len_name = strlen (name);
5b4ee69b 1461
4c4b4cd2
PH
1462 return (strncmp (sym_name, name, len_name) == 0
1463 && is_name_suffix (sym_name + len_name))
1464 || (strncmp (sym_name, "_ada_", 5) == 0
1465 && strncmp (sym_name + 5, name, len_name) == 0
1466 && is_name_suffix (sym_name + len_name + 5));
d2e4a39e 1467 }
14f9c5c9 1468}
14f9c5c9 1469\f
d2e4a39e 1470
4c4b4cd2 1471 /* Arrays */
14f9c5c9 1472
28c85d6c
JB
1473/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1474 generated by the GNAT compiler to describe the index type used
1475 for each dimension of an array, check whether it follows the latest
1476 known encoding. If not, fix it up to conform to the latest encoding.
1477 Otherwise, do nothing. This function also does nothing if
1478 INDEX_DESC_TYPE is NULL.
1479
1480 The GNAT encoding used to describle the array index type evolved a bit.
1481 Initially, the information would be provided through the name of each
1482 field of the structure type only, while the type of these fields was
1483 described as unspecified and irrelevant. The debugger was then expected
1484 to perform a global type lookup using the name of that field in order
1485 to get access to the full index type description. Because these global
1486 lookups can be very expensive, the encoding was later enhanced to make
1487 the global lookup unnecessary by defining the field type as being
1488 the full index type description.
1489
1490 The purpose of this routine is to allow us to support older versions
1491 of the compiler by detecting the use of the older encoding, and by
1492 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1493 we essentially replace each field's meaningless type by the associated
1494 index subtype). */
1495
1496void
1497ada_fixup_array_indexes_type (struct type *index_desc_type)
1498{
1499 int i;
1500
1501 if (index_desc_type == NULL)
1502 return;
1503 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1504
1505 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1506 to check one field only, no need to check them all). If not, return
1507 now.
1508
1509 If our INDEX_DESC_TYPE was generated using the older encoding,
1510 the field type should be a meaningless integer type whose name
1511 is not equal to the field name. */
1512 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1513 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1514 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1515 return;
1516
1517 /* Fixup each field of INDEX_DESC_TYPE. */
1518 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1519 {
0d5cff50 1520 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1521 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1522
1523 if (raw_type)
1524 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1525 }
1526}
1527
4c4b4cd2 1528/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1529
d2e4a39e
AS
1530static char *bound_name[] = {
1531 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1532 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1533};
1534
1535/* Maximum number of array dimensions we are prepared to handle. */
1536
4c4b4cd2 1537#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1538
14f9c5c9 1539
4c4b4cd2
PH
1540/* The desc_* routines return primitive portions of array descriptors
1541 (fat pointers). */
14f9c5c9
AS
1542
1543/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1544 level of indirection, if needed. */
1545
d2e4a39e
AS
1546static struct type *
1547desc_base_type (struct type *type)
14f9c5c9
AS
1548{
1549 if (type == NULL)
1550 return NULL;
61ee279c 1551 type = ada_check_typedef (type);
720d1a40
JB
1552 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1553 type = ada_typedef_target_type (type);
1554
1265e4aa
JB
1555 if (type != NULL
1556 && (TYPE_CODE (type) == TYPE_CODE_PTR
1557 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1558 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1559 else
1560 return type;
1561}
1562
4c4b4cd2
PH
1563/* True iff TYPE indicates a "thin" array pointer type. */
1564
14f9c5c9 1565static int
d2e4a39e 1566is_thin_pntr (struct type *type)
14f9c5c9 1567{
d2e4a39e 1568 return
14f9c5c9
AS
1569 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1570 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1571}
1572
4c4b4cd2
PH
1573/* The descriptor type for thin pointer type TYPE. */
1574
d2e4a39e
AS
1575static struct type *
1576thin_descriptor_type (struct type *type)
14f9c5c9 1577{
d2e4a39e 1578 struct type *base_type = desc_base_type (type);
5b4ee69b 1579
14f9c5c9
AS
1580 if (base_type == NULL)
1581 return NULL;
1582 if (is_suffix (ada_type_name (base_type), "___XVE"))
1583 return base_type;
d2e4a39e 1584 else
14f9c5c9 1585 {
d2e4a39e 1586 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1587
14f9c5c9 1588 if (alt_type == NULL)
4c4b4cd2 1589 return base_type;
14f9c5c9 1590 else
4c4b4cd2 1591 return alt_type;
14f9c5c9
AS
1592 }
1593}
1594
4c4b4cd2
PH
1595/* A pointer to the array data for thin-pointer value VAL. */
1596
d2e4a39e
AS
1597static struct value *
1598thin_data_pntr (struct value *val)
14f9c5c9 1599{
828292f2 1600 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1601 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1602
556bdfd4
UW
1603 data_type = lookup_pointer_type (data_type);
1604
14f9c5c9 1605 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1606 return value_cast (data_type, value_copy (val));
d2e4a39e 1607 else
42ae5230 1608 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1609}
1610
4c4b4cd2
PH
1611/* True iff TYPE indicates a "thick" array pointer type. */
1612
14f9c5c9 1613static int
d2e4a39e 1614is_thick_pntr (struct type *type)
14f9c5c9
AS
1615{
1616 type = desc_base_type (type);
1617 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1618 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1619}
1620
4c4b4cd2
PH
1621/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1622 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1623
d2e4a39e
AS
1624static struct type *
1625desc_bounds_type (struct type *type)
14f9c5c9 1626{
d2e4a39e 1627 struct type *r;
14f9c5c9
AS
1628
1629 type = desc_base_type (type);
1630
1631 if (type == NULL)
1632 return NULL;
1633 else if (is_thin_pntr (type))
1634 {
1635 type = thin_descriptor_type (type);
1636 if (type == NULL)
4c4b4cd2 1637 return NULL;
14f9c5c9
AS
1638 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1639 if (r != NULL)
61ee279c 1640 return ada_check_typedef (r);
14f9c5c9
AS
1641 }
1642 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1643 {
1644 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1645 if (r != NULL)
61ee279c 1646 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1647 }
1648 return NULL;
1649}
1650
1651/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1652 one, a pointer to its bounds data. Otherwise NULL. */
1653
d2e4a39e
AS
1654static struct value *
1655desc_bounds (struct value *arr)
14f9c5c9 1656{
df407dfe 1657 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1658
d2e4a39e 1659 if (is_thin_pntr (type))
14f9c5c9 1660 {
d2e4a39e 1661 struct type *bounds_type =
4c4b4cd2 1662 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1663 LONGEST addr;
1664
4cdfadb1 1665 if (bounds_type == NULL)
323e0a4a 1666 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1667
1668 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1669 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1670 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1671 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1672 addr = value_as_long (arr);
d2e4a39e 1673 else
42ae5230 1674 addr = value_address (arr);
14f9c5c9 1675
d2e4a39e 1676 return
4c4b4cd2
PH
1677 value_from_longest (lookup_pointer_type (bounds_type),
1678 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1679 }
1680
1681 else if (is_thick_pntr (type))
05e522ef
JB
1682 {
1683 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1684 _("Bad GNAT array descriptor"));
1685 struct type *p_bounds_type = value_type (p_bounds);
1686
1687 if (p_bounds_type
1688 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1689 {
1690 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1691
1692 if (TYPE_STUB (target_type))
1693 p_bounds = value_cast (lookup_pointer_type
1694 (ada_check_typedef (target_type)),
1695 p_bounds);
1696 }
1697 else
1698 error (_("Bad GNAT array descriptor"));
1699
1700 return p_bounds;
1701 }
14f9c5c9
AS
1702 else
1703 return NULL;
1704}
1705
4c4b4cd2
PH
1706/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1707 position of the field containing the address of the bounds data. */
1708
14f9c5c9 1709static int
d2e4a39e 1710fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1711{
1712 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1713}
1714
1715/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1716 size of the field containing the address of the bounds data. */
1717
14f9c5c9 1718static int
d2e4a39e 1719fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1720{
1721 type = desc_base_type (type);
1722
d2e4a39e 1723 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1724 return TYPE_FIELD_BITSIZE (type, 1);
1725 else
61ee279c 1726 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1727}
1728
4c4b4cd2 1729/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1730 pointer to one, the type of its array data (a array-with-no-bounds type);
1731 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1732 data. */
4c4b4cd2 1733
d2e4a39e 1734static struct type *
556bdfd4 1735desc_data_target_type (struct type *type)
14f9c5c9
AS
1736{
1737 type = desc_base_type (type);
1738
4c4b4cd2 1739 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1740 if (is_thin_pntr (type))
556bdfd4 1741 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1742 else if (is_thick_pntr (type))
556bdfd4
UW
1743 {
1744 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1745
1746 if (data_type
1747 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1748 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1749 }
1750
1751 return NULL;
14f9c5c9
AS
1752}
1753
1754/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1755 its array data. */
4c4b4cd2 1756
d2e4a39e
AS
1757static struct value *
1758desc_data (struct value *arr)
14f9c5c9 1759{
df407dfe 1760 struct type *type = value_type (arr);
5b4ee69b 1761
14f9c5c9
AS
1762 if (is_thin_pntr (type))
1763 return thin_data_pntr (arr);
1764 else if (is_thick_pntr (type))
d2e4a39e 1765 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1766 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1767 else
1768 return NULL;
1769}
1770
1771
1772/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1773 position of the field containing the address of the data. */
1774
14f9c5c9 1775static int
d2e4a39e 1776fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1777{
1778 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1779}
1780
1781/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1782 size of the field containing the address of the data. */
1783
14f9c5c9 1784static int
d2e4a39e 1785fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1786{
1787 type = desc_base_type (type);
1788
1789 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1790 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1791 else
14f9c5c9
AS
1792 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1793}
1794
4c4b4cd2 1795/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1796 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1797 bound, if WHICH is 1. The first bound is I=1. */
1798
d2e4a39e
AS
1799static struct value *
1800desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1801{
d2e4a39e 1802 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1803 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1804}
1805
1806/* If BOUNDS is an array-bounds structure type, return the bit position
1807 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1808 bound, if WHICH is 1. The first bound is I=1. */
1809
14f9c5c9 1810static int
d2e4a39e 1811desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1812{
d2e4a39e 1813 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1814}
1815
1816/* If BOUNDS is an array-bounds structure type, return the bit field size
1817 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1818 bound, if WHICH is 1. The first bound is I=1. */
1819
76a01679 1820static int
d2e4a39e 1821desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1822{
1823 type = desc_base_type (type);
1824
d2e4a39e
AS
1825 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1826 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1827 else
1828 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1829}
1830
1831/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1832 Ith bound (numbering from 1). Otherwise, NULL. */
1833
d2e4a39e
AS
1834static struct type *
1835desc_index_type (struct type *type, int i)
14f9c5c9
AS
1836{
1837 type = desc_base_type (type);
1838
1839 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1840 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1841 else
14f9c5c9
AS
1842 return NULL;
1843}
1844
4c4b4cd2
PH
1845/* The number of index positions in the array-bounds type TYPE.
1846 Return 0 if TYPE is NULL. */
1847
14f9c5c9 1848static int
d2e4a39e 1849desc_arity (struct type *type)
14f9c5c9
AS
1850{
1851 type = desc_base_type (type);
1852
1853 if (type != NULL)
1854 return TYPE_NFIELDS (type) / 2;
1855 return 0;
1856}
1857
4c4b4cd2
PH
1858/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1859 an array descriptor type (representing an unconstrained array
1860 type). */
1861
76a01679
JB
1862static int
1863ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1864{
1865 if (type == NULL)
1866 return 0;
61ee279c 1867 type = ada_check_typedef (type);
4c4b4cd2 1868 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1869 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1870}
1871
52ce6436 1872/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1873 * to one. */
52ce6436 1874
2c0b251b 1875static int
52ce6436
PH
1876ada_is_array_type (struct type *type)
1877{
1878 while (type != NULL
1879 && (TYPE_CODE (type) == TYPE_CODE_PTR
1880 || TYPE_CODE (type) == TYPE_CODE_REF))
1881 type = TYPE_TARGET_TYPE (type);
1882 return ada_is_direct_array_type (type);
1883}
1884
4c4b4cd2 1885/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1886
14f9c5c9 1887int
4c4b4cd2 1888ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1889{
1890 if (type == NULL)
1891 return 0;
61ee279c 1892 type = ada_check_typedef (type);
14f9c5c9 1893 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1894 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1895 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1896 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1897}
1898
4c4b4cd2
PH
1899/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1900
14f9c5c9 1901int
4c4b4cd2 1902ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1903{
556bdfd4 1904 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1905
1906 if (type == NULL)
1907 return 0;
61ee279c 1908 type = ada_check_typedef (type);
556bdfd4
UW
1909 return (data_type != NULL
1910 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1911 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1912}
1913
1914/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1915 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1916 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1917 is still needed. */
1918
14f9c5c9 1919int
ebf56fd3 1920ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1921{
d2e4a39e 1922 return
14f9c5c9
AS
1923 type != NULL
1924 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1925 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1926 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1927 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1928}
1929
1930
4c4b4cd2 1931/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1932 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1933 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1934 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1935 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1936 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1937 a descriptor. */
d2e4a39e
AS
1938struct type *
1939ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1940{
ad82864c
JB
1941 if (ada_is_constrained_packed_array_type (value_type (arr)))
1942 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1943
df407dfe
AC
1944 if (!ada_is_array_descriptor_type (value_type (arr)))
1945 return value_type (arr);
d2e4a39e
AS
1946
1947 if (!bounds)
ad82864c
JB
1948 {
1949 struct type *array_type =
1950 ada_check_typedef (desc_data_target_type (value_type (arr)));
1951
1952 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1953 TYPE_FIELD_BITSIZE (array_type, 0) =
1954 decode_packed_array_bitsize (value_type (arr));
1955
1956 return array_type;
1957 }
14f9c5c9
AS
1958 else
1959 {
d2e4a39e 1960 struct type *elt_type;
14f9c5c9 1961 int arity;
d2e4a39e 1962 struct value *descriptor;
14f9c5c9 1963
df407dfe
AC
1964 elt_type = ada_array_element_type (value_type (arr), -1);
1965 arity = ada_array_arity (value_type (arr));
14f9c5c9 1966
d2e4a39e 1967 if (elt_type == NULL || arity == 0)
df407dfe 1968 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1969
1970 descriptor = desc_bounds (arr);
d2e4a39e 1971 if (value_as_long (descriptor) == 0)
4c4b4cd2 1972 return NULL;
d2e4a39e 1973 while (arity > 0)
4c4b4cd2 1974 {
e9bb382b
UW
1975 struct type *range_type = alloc_type_copy (value_type (arr));
1976 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1977 struct value *low = desc_one_bound (descriptor, arity, 0);
1978 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1979
5b4ee69b 1980 arity -= 1;
0c9c3474
SA
1981 create_static_range_type (range_type, value_type (low),
1982 longest_to_int (value_as_long (low)),
1983 longest_to_int (value_as_long (high)));
4c4b4cd2 1984 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1985
1986 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1987 {
1988 /* We need to store the element packed bitsize, as well as
1989 recompute the array size, because it was previously
1990 computed based on the unpacked element size. */
1991 LONGEST lo = value_as_long (low);
1992 LONGEST hi = value_as_long (high);
1993
1994 TYPE_FIELD_BITSIZE (elt_type, 0) =
1995 decode_packed_array_bitsize (value_type (arr));
1996 /* If the array has no element, then the size is already
1997 zero, and does not need to be recomputed. */
1998 if (lo < hi)
1999 {
2000 int array_bitsize =
2001 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
2002
2003 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
2004 }
2005 }
4c4b4cd2 2006 }
14f9c5c9
AS
2007
2008 return lookup_pointer_type (elt_type);
2009 }
2010}
2011
2012/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2013 Otherwise, returns either a standard GDB array with bounds set
2014 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2015 GDB array. Returns NULL if ARR is a null fat pointer. */
2016
d2e4a39e
AS
2017struct value *
2018ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2019{
df407dfe 2020 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2021 {
d2e4a39e 2022 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2023
14f9c5c9 2024 if (arrType == NULL)
4c4b4cd2 2025 return NULL;
14f9c5c9
AS
2026 return value_cast (arrType, value_copy (desc_data (arr)));
2027 }
ad82864c
JB
2028 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2029 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2030 else
2031 return arr;
2032}
2033
2034/* If ARR does not represent an array, returns ARR unchanged.
2035 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2036 be ARR itself if it already is in the proper form). */
2037
720d1a40 2038struct value *
d2e4a39e 2039ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2040{
df407dfe 2041 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2042 {
d2e4a39e 2043 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2044
14f9c5c9 2045 if (arrVal == NULL)
323e0a4a 2046 error (_("Bounds unavailable for null array pointer."));
529cad9c 2047 check_size (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2048 return value_ind (arrVal);
2049 }
ad82864c
JB
2050 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2051 return decode_constrained_packed_array (arr);
d2e4a39e 2052 else
14f9c5c9
AS
2053 return arr;
2054}
2055
2056/* If TYPE represents a GNAT array type, return it translated to an
2057 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2058 packing). For other types, is the identity. */
2059
d2e4a39e
AS
2060struct type *
2061ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2062{
ad82864c
JB
2063 if (ada_is_constrained_packed_array_type (type))
2064 return decode_constrained_packed_array_type (type);
17280b9f
UW
2065
2066 if (ada_is_array_descriptor_type (type))
556bdfd4 2067 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2068
2069 return type;
14f9c5c9
AS
2070}
2071
4c4b4cd2
PH
2072/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2073
ad82864c
JB
2074static int
2075ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2076{
2077 if (type == NULL)
2078 return 0;
4c4b4cd2 2079 type = desc_base_type (type);
61ee279c 2080 type = ada_check_typedef (type);
d2e4a39e 2081 return
14f9c5c9
AS
2082 ada_type_name (type) != NULL
2083 && strstr (ada_type_name (type), "___XP") != NULL;
2084}
2085
ad82864c
JB
2086/* Non-zero iff TYPE represents a standard GNAT constrained
2087 packed-array type. */
2088
2089int
2090ada_is_constrained_packed_array_type (struct type *type)
2091{
2092 return ada_is_packed_array_type (type)
2093 && !ada_is_array_descriptor_type (type);
2094}
2095
2096/* Non-zero iff TYPE represents an array descriptor for a
2097 unconstrained packed-array type. */
2098
2099static int
2100ada_is_unconstrained_packed_array_type (struct type *type)
2101{
2102 return ada_is_packed_array_type (type)
2103 && ada_is_array_descriptor_type (type);
2104}
2105
2106/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2107 return the size of its elements in bits. */
2108
2109static long
2110decode_packed_array_bitsize (struct type *type)
2111{
0d5cff50
DE
2112 const char *raw_name;
2113 const char *tail;
ad82864c
JB
2114 long bits;
2115
720d1a40
JB
2116 /* Access to arrays implemented as fat pointers are encoded as a typedef
2117 of the fat pointer type. We need the name of the fat pointer type
2118 to do the decoding, so strip the typedef layer. */
2119 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2120 type = ada_typedef_target_type (type);
2121
2122 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2123 if (!raw_name)
2124 raw_name = ada_type_name (desc_base_type (type));
2125
2126 if (!raw_name)
2127 return 0;
2128
2129 tail = strstr (raw_name, "___XP");
720d1a40 2130 gdb_assert (tail != NULL);
ad82864c
JB
2131
2132 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2133 {
2134 lim_warning
2135 (_("could not understand bit size information on packed array"));
2136 return 0;
2137 }
2138
2139 return bits;
2140}
2141
14f9c5c9
AS
2142/* Given that TYPE is a standard GDB array type with all bounds filled
2143 in, and that the element size of its ultimate scalar constituents
2144 (that is, either its elements, or, if it is an array of arrays, its
2145 elements' elements, etc.) is *ELT_BITS, return an identical type,
2146 but with the bit sizes of its elements (and those of any
2147 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2148 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2149 in bits.
2150
2151 Note that, for arrays whose index type has an XA encoding where
2152 a bound references a record discriminant, getting that discriminant,
2153 and therefore the actual value of that bound, is not possible
2154 because none of the given parameters gives us access to the record.
2155 This function assumes that it is OK in the context where it is being
2156 used to return an array whose bounds are still dynamic and where
2157 the length is arbitrary. */
4c4b4cd2 2158
d2e4a39e 2159static struct type *
ad82864c 2160constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2161{
d2e4a39e
AS
2162 struct type *new_elt_type;
2163 struct type *new_type;
99b1c762
JB
2164 struct type *index_type_desc;
2165 struct type *index_type;
14f9c5c9
AS
2166 LONGEST low_bound, high_bound;
2167
61ee279c 2168 type = ada_check_typedef (type);
14f9c5c9
AS
2169 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2170 return type;
2171
99b1c762
JB
2172 index_type_desc = ada_find_parallel_type (type, "___XA");
2173 if (index_type_desc)
2174 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2175 NULL);
2176 else
2177 index_type = TYPE_INDEX_TYPE (type);
2178
e9bb382b 2179 new_type = alloc_type_copy (type);
ad82864c
JB
2180 new_elt_type =
2181 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2182 elt_bits);
99b1c762 2183 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2184 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2185 TYPE_NAME (new_type) = ada_type_name (type);
2186
4a46959e
JB
2187 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2188 && is_dynamic_type (check_typedef (index_type)))
2189 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2190 low_bound = high_bound = 0;
2191 if (high_bound < low_bound)
2192 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2193 else
14f9c5c9
AS
2194 {
2195 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2196 TYPE_LENGTH (new_type) =
4c4b4cd2 2197 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2198 }
2199
876cecd0 2200 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2201 return new_type;
2202}
2203
ad82864c
JB
2204/* The array type encoded by TYPE, where
2205 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2206
d2e4a39e 2207static struct type *
ad82864c 2208decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2209{
0d5cff50 2210 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2211 char *name;
0d5cff50 2212 const char *tail;
d2e4a39e 2213 struct type *shadow_type;
14f9c5c9 2214 long bits;
14f9c5c9 2215
727e3d2e
JB
2216 if (!raw_name)
2217 raw_name = ada_type_name (desc_base_type (type));
2218
2219 if (!raw_name)
2220 return NULL;
2221
2222 name = (char *) alloca (strlen (raw_name) + 1);
2223 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2224 type = desc_base_type (type);
2225
14f9c5c9
AS
2226 memcpy (name, raw_name, tail - raw_name);
2227 name[tail - raw_name] = '\000';
2228
b4ba55a1
JB
2229 shadow_type = ada_find_parallel_type_with_name (type, name);
2230
2231 if (shadow_type == NULL)
14f9c5c9 2232 {
323e0a4a 2233 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2234 return NULL;
2235 }
cb249c71 2236 CHECK_TYPEDEF (shadow_type);
14f9c5c9
AS
2237
2238 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2239 {
0963b4bd
MS
2240 lim_warning (_("could not understand bounds "
2241 "information on packed array"));
14f9c5c9
AS
2242 return NULL;
2243 }
d2e4a39e 2244
ad82864c
JB
2245 bits = decode_packed_array_bitsize (type);
2246 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2247}
2248
ad82864c
JB
2249/* Given that ARR is a struct value *indicating a GNAT constrained packed
2250 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2251 standard GDB array type except that the BITSIZEs of the array
2252 target types are set to the number of bits in each element, and the
4c4b4cd2 2253 type length is set appropriately. */
14f9c5c9 2254
d2e4a39e 2255static struct value *
ad82864c 2256decode_constrained_packed_array (struct value *arr)
14f9c5c9 2257{
4c4b4cd2 2258 struct type *type;
14f9c5c9 2259
11aa919a
PMR
2260 /* If our value is a pointer, then dereference it. Likewise if
2261 the value is a reference. Make sure that this operation does not
2262 cause the target type to be fixed, as this would indirectly cause
2263 this array to be decoded. The rest of the routine assumes that
2264 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2265 and "value_ind" routines to perform the dereferencing, as opposed
2266 to using "ada_coerce_ref" or "ada_value_ind". */
2267 arr = coerce_ref (arr);
828292f2 2268 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2269 arr = value_ind (arr);
4c4b4cd2 2270
ad82864c 2271 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2272 if (type == NULL)
2273 {
323e0a4a 2274 error (_("can't unpack array"));
14f9c5c9
AS
2275 return NULL;
2276 }
61ee279c 2277
50810684 2278 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2279 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2280 {
2281 /* This is a (right-justified) modular type representing a packed
2282 array with no wrapper. In order to interpret the value through
2283 the (left-justified) packed array type we just built, we must
2284 first left-justify it. */
2285 int bit_size, bit_pos;
2286 ULONGEST mod;
2287
df407dfe 2288 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2289 bit_size = 0;
2290 while (mod > 0)
2291 {
2292 bit_size += 1;
2293 mod >>= 1;
2294 }
df407dfe 2295 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2296 arr = ada_value_primitive_packed_val (arr, NULL,
2297 bit_pos / HOST_CHAR_BIT,
2298 bit_pos % HOST_CHAR_BIT,
2299 bit_size,
2300 type);
2301 }
2302
4c4b4cd2 2303 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2304}
2305
2306
2307/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2308 given in IND. ARR must be a simple array. */
14f9c5c9 2309
d2e4a39e
AS
2310static struct value *
2311value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2312{
2313 int i;
2314 int bits, elt_off, bit_off;
2315 long elt_total_bit_offset;
d2e4a39e
AS
2316 struct type *elt_type;
2317 struct value *v;
14f9c5c9
AS
2318
2319 bits = 0;
2320 elt_total_bit_offset = 0;
df407dfe 2321 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2322 for (i = 0; i < arity; i += 1)
14f9c5c9 2323 {
d2e4a39e 2324 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2325 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2326 error
0963b4bd
MS
2327 (_("attempt to do packed indexing of "
2328 "something other than a packed array"));
14f9c5c9 2329 else
4c4b4cd2
PH
2330 {
2331 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2332 LONGEST lowerbound, upperbound;
2333 LONGEST idx;
2334
2335 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2336 {
323e0a4a 2337 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2338 lowerbound = upperbound = 0;
2339 }
2340
3cb382c9 2341 idx = pos_atr (ind[i]);
4c4b4cd2 2342 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2343 lim_warning (_("packed array index %ld out of bounds"),
2344 (long) idx);
4c4b4cd2
PH
2345 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2346 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2347 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2348 }
14f9c5c9
AS
2349 }
2350 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2351 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2352
2353 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2354 bits, elt_type);
14f9c5c9
AS
2355 return v;
2356}
2357
4c4b4cd2 2358/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2359
2360static int
d2e4a39e 2361has_negatives (struct type *type)
14f9c5c9 2362{
d2e4a39e
AS
2363 switch (TYPE_CODE (type))
2364 {
2365 default:
2366 return 0;
2367 case TYPE_CODE_INT:
2368 return !TYPE_UNSIGNED (type);
2369 case TYPE_CODE_RANGE:
2370 return TYPE_LOW_BOUND (type) < 0;
2371 }
14f9c5c9 2372}
d2e4a39e 2373
14f9c5c9
AS
2374
2375/* Create a new value of type TYPE from the contents of OBJ starting
2376 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2377 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
0963b4bd 2378 assigning through the result will set the field fetched from.
4c4b4cd2
PH
2379 VALADDR is ignored unless OBJ is NULL, in which case,
2380 VALADDR+OFFSET must address the start of storage containing the
2381 packed value. The value returned in this case is never an lval.
2382 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
14f9c5c9 2383
d2e4a39e 2384struct value *
fc1a4b47 2385ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
a2bd3dcd 2386 long offset, int bit_offset, int bit_size,
4c4b4cd2 2387 struct type *type)
14f9c5c9 2388{
d2e4a39e 2389 struct value *v;
4c4b4cd2
PH
2390 int src, /* Index into the source area */
2391 targ, /* Index into the target area */
2392 srcBitsLeft, /* Number of source bits left to move */
2393 nsrc, ntarg, /* Number of source and target bytes */
2394 unusedLS, /* Number of bits in next significant
2395 byte of source that are unused */
2396 accumSize; /* Number of meaningful bits in accum */
2397 unsigned char *bytes; /* First byte containing data to unpack */
d2e4a39e 2398 unsigned char *unpacked;
4c4b4cd2 2399 unsigned long accum; /* Staging area for bits being transferred */
14f9c5c9
AS
2400 unsigned char sign;
2401 int len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
4c4b4cd2
PH
2402 /* Transmit bytes from least to most significant; delta is the direction
2403 the indices move. */
50810684 2404 int delta = gdbarch_bits_big_endian (get_type_arch (type)) ? -1 : 1;
14f9c5c9 2405
61ee279c 2406 type = ada_check_typedef (type);
14f9c5c9
AS
2407
2408 if (obj == NULL)
2409 {
2410 v = allocate_value (type);
d2e4a39e 2411 bytes = (unsigned char *) (valaddr + offset);
14f9c5c9 2412 }
9214ee5f 2413 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
14f9c5c9 2414 {
53ba8333 2415 v = value_at (type, value_address (obj));
9f1f738a 2416 type = value_type (v);
d2e4a39e 2417 bytes = (unsigned char *) alloca (len);
53ba8333 2418 read_memory (value_address (v) + offset, bytes, len);
14f9c5c9 2419 }
d2e4a39e 2420 else
14f9c5c9
AS
2421 {
2422 v = allocate_value (type);
0fd88904 2423 bytes = (unsigned char *) value_contents (obj) + offset;
14f9c5c9 2424 }
d2e4a39e
AS
2425
2426 if (obj != NULL)
14f9c5c9 2427 {
53ba8333 2428 long new_offset = offset;
5b4ee69b 2429
74bcbdf3 2430 set_value_component_location (v, obj);
9bbda503
AC
2431 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2432 set_value_bitsize (v, bit_size);
df407dfe 2433 if (value_bitpos (v) >= HOST_CHAR_BIT)
4c4b4cd2 2434 {
53ba8333 2435 ++new_offset;
9bbda503 2436 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
4c4b4cd2 2437 }
53ba8333
JB
2438 set_value_offset (v, new_offset);
2439
2440 /* Also set the parent value. This is needed when trying to
2441 assign a new value (in inferior memory). */
2442 set_value_parent (v, obj);
14f9c5c9
AS
2443 }
2444 else
9bbda503 2445 set_value_bitsize (v, bit_size);
0fd88904 2446 unpacked = (unsigned char *) value_contents (v);
14f9c5c9
AS
2447
2448 srcBitsLeft = bit_size;
2449 nsrc = len;
2450 ntarg = TYPE_LENGTH (type);
2451 sign = 0;
2452 if (bit_size == 0)
2453 {
2454 memset (unpacked, 0, TYPE_LENGTH (type));
2455 return v;
2456 }
50810684 2457 else if (gdbarch_bits_big_endian (get_type_arch (type)))
14f9c5c9 2458 {
d2e4a39e 2459 src = len - 1;
1265e4aa
JB
2460 if (has_negatives (type)
2461 && ((bytes[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2462 sign = ~0;
d2e4a39e
AS
2463
2464 unusedLS =
4c4b4cd2
PH
2465 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2466 % HOST_CHAR_BIT;
14f9c5c9
AS
2467
2468 switch (TYPE_CODE (type))
4c4b4cd2
PH
2469 {
2470 case TYPE_CODE_ARRAY:
2471 case TYPE_CODE_UNION:
2472 case TYPE_CODE_STRUCT:
2473 /* Non-scalar values must be aligned at a byte boundary... */
2474 accumSize =
2475 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2476 /* ... And are placed at the beginning (most-significant) bytes
2477 of the target. */
529cad9c 2478 targ = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
0056e4d5 2479 ntarg = targ + 1;
4c4b4cd2
PH
2480 break;
2481 default:
2482 accumSize = 0;
2483 targ = TYPE_LENGTH (type) - 1;
2484 break;
2485 }
14f9c5c9 2486 }
d2e4a39e 2487 else
14f9c5c9
AS
2488 {
2489 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2490
2491 src = targ = 0;
2492 unusedLS = bit_offset;
2493 accumSize = 0;
2494
d2e4a39e 2495 if (has_negatives (type) && (bytes[len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2496 sign = ~0;
14f9c5c9 2497 }
d2e4a39e 2498
14f9c5c9
AS
2499 accum = 0;
2500 while (nsrc > 0)
2501 {
2502 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2503 part of the value. */
d2e4a39e 2504 unsigned int unusedMSMask =
4c4b4cd2
PH
2505 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2506 1;
2507 /* Sign-extend bits for this byte. */
14f9c5c9 2508 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2509
d2e4a39e 2510 accum |=
4c4b4cd2 2511 (((bytes[src] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2512 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2513 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2
PH
2514 {
2515 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2516 accumSize -= HOST_CHAR_BIT;
2517 accum >>= HOST_CHAR_BIT;
2518 ntarg -= 1;
2519 targ += delta;
2520 }
14f9c5c9
AS
2521 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2522 unusedLS = 0;
2523 nsrc -= 1;
2524 src += delta;
2525 }
2526 while (ntarg > 0)
2527 {
2528 accum |= sign << accumSize;
2529 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2530 accumSize -= HOST_CHAR_BIT;
2531 accum >>= HOST_CHAR_BIT;
2532 ntarg -= 1;
2533 targ += delta;
2534 }
2535
2536 return v;
2537}
d2e4a39e 2538
14f9c5c9
AS
2539/* Move N bits from SOURCE, starting at bit offset SRC_OFFSET to
2540 TARGET, starting at bit offset TARG_OFFSET. SOURCE and TARGET must
4c4b4cd2 2541 not overlap. */
14f9c5c9 2542static void
fc1a4b47 2543move_bits (gdb_byte *target, int targ_offset, const gdb_byte *source,
50810684 2544 int src_offset, int n, int bits_big_endian_p)
14f9c5c9
AS
2545{
2546 unsigned int accum, mask;
2547 int accum_bits, chunk_size;
2548
2549 target += targ_offset / HOST_CHAR_BIT;
2550 targ_offset %= HOST_CHAR_BIT;
2551 source += src_offset / HOST_CHAR_BIT;
2552 src_offset %= HOST_CHAR_BIT;
50810684 2553 if (bits_big_endian_p)
14f9c5c9
AS
2554 {
2555 accum = (unsigned char) *source;
2556 source += 1;
2557 accum_bits = HOST_CHAR_BIT - src_offset;
2558
d2e4a39e 2559 while (n > 0)
4c4b4cd2
PH
2560 {
2561 int unused_right;
5b4ee69b 2562
4c4b4cd2
PH
2563 accum = (accum << HOST_CHAR_BIT) + (unsigned char) *source;
2564 accum_bits += HOST_CHAR_BIT;
2565 source += 1;
2566 chunk_size = HOST_CHAR_BIT - targ_offset;
2567 if (chunk_size > n)
2568 chunk_size = n;
2569 unused_right = HOST_CHAR_BIT - (chunk_size + targ_offset);
2570 mask = ((1 << chunk_size) - 1) << unused_right;
2571 *target =
2572 (*target & ~mask)
2573 | ((accum >> (accum_bits - chunk_size - unused_right)) & mask);
2574 n -= chunk_size;
2575 accum_bits -= chunk_size;
2576 target += 1;
2577 targ_offset = 0;
2578 }
14f9c5c9
AS
2579 }
2580 else
2581 {
2582 accum = (unsigned char) *source >> src_offset;
2583 source += 1;
2584 accum_bits = HOST_CHAR_BIT - src_offset;
2585
d2e4a39e 2586 while (n > 0)
4c4b4cd2
PH
2587 {
2588 accum = accum + ((unsigned char) *source << accum_bits);
2589 accum_bits += HOST_CHAR_BIT;
2590 source += 1;
2591 chunk_size = HOST_CHAR_BIT - targ_offset;
2592 if (chunk_size > n)
2593 chunk_size = n;
2594 mask = ((1 << chunk_size) - 1) << targ_offset;
2595 *target = (*target & ~mask) | ((accum << targ_offset) & mask);
2596 n -= chunk_size;
2597 accum_bits -= chunk_size;
2598 accum >>= chunk_size;
2599 target += 1;
2600 targ_offset = 0;
2601 }
14f9c5c9
AS
2602 }
2603}
2604
14f9c5c9
AS
2605/* Store the contents of FROMVAL into the location of TOVAL.
2606 Return a new value with the location of TOVAL and contents of
2607 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2608 floating-point or non-scalar types. */
14f9c5c9 2609
d2e4a39e
AS
2610static struct value *
2611ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2612{
df407dfe
AC
2613 struct type *type = value_type (toval);
2614 int bits = value_bitsize (toval);
14f9c5c9 2615
52ce6436
PH
2616 toval = ada_coerce_ref (toval);
2617 fromval = ada_coerce_ref (fromval);
2618
2619 if (ada_is_direct_array_type (value_type (toval)))
2620 toval = ada_coerce_to_simple_array (toval);
2621 if (ada_is_direct_array_type (value_type (fromval)))
2622 fromval = ada_coerce_to_simple_array (fromval);
2623
88e3b34b 2624 if (!deprecated_value_modifiable (toval))
323e0a4a 2625 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2626
d2e4a39e 2627 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2628 && bits > 0
d2e4a39e 2629 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2630 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2631 {
df407dfe
AC
2632 int len = (value_bitpos (toval)
2633 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2634 int from_size;
948f8e3d 2635 gdb_byte *buffer = alloca (len);
d2e4a39e 2636 struct value *val;
42ae5230 2637 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2638
2639 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2640 fromval = value_cast (type, fromval);
14f9c5c9 2641
52ce6436 2642 read_memory (to_addr, buffer, len);
aced2898
PH
2643 from_size = value_bitsize (fromval);
2644 if (from_size == 0)
2645 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
50810684 2646 if (gdbarch_bits_big_endian (get_type_arch (type)))
df407dfe 2647 move_bits (buffer, value_bitpos (toval),
50810684 2648 value_contents (fromval), from_size - bits, bits, 1);
14f9c5c9 2649 else
50810684
UW
2650 move_bits (buffer, value_bitpos (toval),
2651 value_contents (fromval), 0, bits, 0);
972daa01 2652 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2653
14f9c5c9 2654 val = value_copy (toval);
0fd88904 2655 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2656 TYPE_LENGTH (type));
04624583 2657 deprecated_set_value_type (val, type);
d2e4a39e 2658
14f9c5c9
AS
2659 return val;
2660 }
2661
2662 return value_assign (toval, fromval);
2663}
2664
2665
52ce6436
PH
2666/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2667 * CONTAINER, assign the contents of VAL to COMPONENTS's place in
2668 * CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2669 * COMPONENT, and not the inferior's memory. The current contents
2670 * of COMPONENT are ignored. */
2671static void
2672value_assign_to_component (struct value *container, struct value *component,
2673 struct value *val)
2674{
2675 LONGEST offset_in_container =
42ae5230 2676 (LONGEST) (value_address (component) - value_address (container));
52ce6436
PH
2677 int bit_offset_in_container =
2678 value_bitpos (component) - value_bitpos (container);
2679 int bits;
2680
2681 val = value_cast (value_type (component), val);
2682
2683 if (value_bitsize (component) == 0)
2684 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2685 else
2686 bits = value_bitsize (component);
2687
50810684 2688 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
52ce6436
PH
2689 move_bits (value_contents_writeable (container) + offset_in_container,
2690 value_bitpos (container) + bit_offset_in_container,
2691 value_contents (val),
2692 TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits,
50810684 2693 bits, 1);
52ce6436
PH
2694 else
2695 move_bits (value_contents_writeable (container) + offset_in_container,
2696 value_bitpos (container) + bit_offset_in_container,
50810684 2697 value_contents (val), 0, bits, 0);
52ce6436
PH
2698}
2699
4c4b4cd2
PH
2700/* The value of the element of array ARR at the ARITY indices given in IND.
2701 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2702 thereto. */
2703
d2e4a39e
AS
2704struct value *
2705ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2706{
2707 int k;
d2e4a39e
AS
2708 struct value *elt;
2709 struct type *elt_type;
14f9c5c9
AS
2710
2711 elt = ada_coerce_to_simple_array (arr);
2712
df407dfe 2713 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2714 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2715 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2716 return value_subscript_packed (elt, arity, ind);
2717
2718 for (k = 0; k < arity; k += 1)
2719 {
2720 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2721 error (_("too many subscripts (%d expected)"), k);
2497b498 2722 elt = value_subscript (elt, pos_atr (ind[k]));
14f9c5c9
AS
2723 }
2724 return elt;
2725}
2726
deede10c
JB
2727/* Assuming ARR is a pointer to a GDB array, the value of the element
2728 of *ARR at the ARITY indices given in IND.
2729 Does not read the entire array into memory. */
14f9c5c9 2730
2c0b251b 2731static struct value *
deede10c 2732ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2733{
2734 int k;
deede10c
JB
2735 struct type *type
2736 = check_typedef (value_enclosing_type (ada_value_ind (arr)));
14f9c5c9
AS
2737
2738 for (k = 0; k < arity; k += 1)
2739 {
2740 LONGEST lwb, upb;
14f9c5c9
AS
2741
2742 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2743 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2744 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2745 value_copy (arr));
14f9c5c9 2746 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
2497b498 2747 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2748 type = TYPE_TARGET_TYPE (type);
2749 }
2750
2751 return value_ind (arr);
2752}
2753
0b5d8877 2754/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
f5938064
JG
2755 actual type of ARRAY_PTR is ignored), returns the Ada slice of HIGH-LOW+1
2756 elements starting at index LOW. The lower bound of this array is LOW, as
0963b4bd 2757 per Ada rules. */
0b5d8877 2758static struct value *
f5938064
JG
2759ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2760 int low, int high)
0b5d8877 2761{
b0dd7688 2762 struct type *type0 = ada_check_typedef (type);
6c038f32 2763 CORE_ADDR base = value_as_address (array_ptr)
b0dd7688
JB
2764 + ((low - ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0)))
2765 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
0c9c3474
SA
2766 struct type *index_type
2767 = create_static_range_type (NULL,
2768 TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0)),
2769 low, high);
6c038f32 2770 struct type *slice_type =
b0dd7688 2771 create_array_type (NULL, TYPE_TARGET_TYPE (type0), index_type);
5b4ee69b 2772
f5938064 2773 return value_at_lazy (slice_type, base);
0b5d8877
PH
2774}
2775
2776
2777static struct value *
2778ada_value_slice (struct value *array, int low, int high)
2779{
b0dd7688 2780 struct type *type = ada_check_typedef (value_type (array));
0c9c3474
SA
2781 struct type *index_type
2782 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
6c038f32 2783 struct type *slice_type =
0b5d8877 2784 create_array_type (NULL, TYPE_TARGET_TYPE (type), index_type);
5b4ee69b 2785
6c038f32 2786 return value_cast (slice_type, value_slice (array, low, high - low + 1));
0b5d8877
PH
2787}
2788
14f9c5c9
AS
2789/* If type is a record type in the form of a standard GNAT array
2790 descriptor, returns the number of dimensions for type. If arr is a
2791 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2792 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2793
2794int
d2e4a39e 2795ada_array_arity (struct type *type)
14f9c5c9
AS
2796{
2797 int arity;
2798
2799 if (type == NULL)
2800 return 0;
2801
2802 type = desc_base_type (type);
2803
2804 arity = 0;
d2e4a39e 2805 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2806 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2807 else
2808 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2809 {
4c4b4cd2 2810 arity += 1;
61ee279c 2811 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2812 }
d2e4a39e 2813
14f9c5c9
AS
2814 return arity;
2815}
2816
2817/* If TYPE is a record type in the form of a standard GNAT array
2818 descriptor or a simple array type, returns the element type for
2819 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2820 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2821
d2e4a39e
AS
2822struct type *
2823ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2824{
2825 type = desc_base_type (type);
2826
d2e4a39e 2827 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2828 {
2829 int k;
d2e4a39e 2830 struct type *p_array_type;
14f9c5c9 2831
556bdfd4 2832 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2833
2834 k = ada_array_arity (type);
2835 if (k == 0)
4c4b4cd2 2836 return NULL;
d2e4a39e 2837
4c4b4cd2 2838 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2839 if (nindices >= 0 && k > nindices)
4c4b4cd2 2840 k = nindices;
d2e4a39e 2841 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2842 {
61ee279c 2843 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2844 k -= 1;
2845 }
14f9c5c9
AS
2846 return p_array_type;
2847 }
2848 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2849 {
2850 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2851 {
2852 type = TYPE_TARGET_TYPE (type);
2853 nindices -= 1;
2854 }
14f9c5c9
AS
2855 return type;
2856 }
2857
2858 return NULL;
2859}
2860
4c4b4cd2 2861/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2862 Does not examine memory. Throws an error if N is invalid or TYPE
2863 is not an array type. NAME is the name of the Ada attribute being
2864 evaluated ('range, 'first, 'last, or 'length); it is used in building
2865 the error message. */
14f9c5c9 2866
1eea4ebd
UW
2867static struct type *
2868ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2869{
4c4b4cd2
PH
2870 struct type *result_type;
2871
14f9c5c9
AS
2872 type = desc_base_type (type);
2873
1eea4ebd
UW
2874 if (n < 0 || n > ada_array_arity (type))
2875 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2876
4c4b4cd2 2877 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2878 {
2879 int i;
2880
2881 for (i = 1; i < n; i += 1)
4c4b4cd2 2882 type = TYPE_TARGET_TYPE (type);
262452ec 2883 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2884 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2885 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2886 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2887 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2888 result_type = NULL;
14f9c5c9 2889 }
d2e4a39e 2890 else
1eea4ebd
UW
2891 {
2892 result_type = desc_index_type (desc_bounds_type (type), n);
2893 if (result_type == NULL)
2894 error (_("attempt to take bound of something that is not an array"));
2895 }
2896
2897 return result_type;
14f9c5c9
AS
2898}
2899
2900/* Given that arr is an array type, returns the lower bound of the
2901 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2902 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2903 array-descriptor type. It works for other arrays with bounds supplied
2904 by run-time quantities other than discriminants. */
14f9c5c9 2905
abb68b3e 2906static LONGEST
fb5e3d5c 2907ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2908{
8a48ac95 2909 struct type *type, *index_type_desc, *index_type;
1ce677a4 2910 int i;
262452ec
JK
2911
2912 gdb_assert (which == 0 || which == 1);
14f9c5c9 2913
ad82864c
JB
2914 if (ada_is_constrained_packed_array_type (arr_type))
2915 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2916
4c4b4cd2 2917 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2918 return (LONGEST) - which;
14f9c5c9
AS
2919
2920 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2921 type = TYPE_TARGET_TYPE (arr_type);
2922 else
2923 type = arr_type;
2924
2925 index_type_desc = ada_find_parallel_type (type, "___XA");
28c85d6c 2926 ada_fixup_array_indexes_type (index_type_desc);
262452ec 2927 if (index_type_desc != NULL)
28c85d6c
JB
2928 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2929 NULL);
262452ec 2930 else
8a48ac95
JB
2931 {
2932 struct type *elt_type = check_typedef (type);
2933
2934 for (i = 1; i < n; i++)
2935 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
2936
2937 index_type = TYPE_INDEX_TYPE (elt_type);
2938 }
262452ec 2939
43bbcdc2
PH
2940 return
2941 (LONGEST) (which == 0
2942 ? ada_discrete_type_low_bound (index_type)
2943 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
2944}
2945
2946/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
2947 nth index (numbering from 1) if WHICH is 0, and the upper bound if
2948 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 2949 supplied by run-time quantities other than discriminants. */
14f9c5c9 2950
1eea4ebd 2951static LONGEST
4dc81987 2952ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 2953{
eb479039
JB
2954 struct type *arr_type;
2955
2956 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
2957 arr = value_ind (arr);
2958 arr_type = value_enclosing_type (arr);
14f9c5c9 2959
ad82864c
JB
2960 if (ada_is_constrained_packed_array_type (arr_type))
2961 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 2962 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 2963 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 2964 else
1eea4ebd 2965 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
2966}
2967
2968/* Given that arr is an array value, returns the length of the
2969 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
2970 supplied by run-time quantities other than discriminants.
2971 Does not work for arrays indexed by enumeration types with representation
2972 clauses at the moment. */
14f9c5c9 2973
1eea4ebd 2974static LONGEST
d2e4a39e 2975ada_array_length (struct value *arr, int n)
14f9c5c9 2976{
eb479039
JB
2977 struct type *arr_type;
2978
2979 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
2980 arr = value_ind (arr);
2981 arr_type = value_enclosing_type (arr);
14f9c5c9 2982
ad82864c
JB
2983 if (ada_is_constrained_packed_array_type (arr_type))
2984 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 2985
4c4b4cd2 2986 if (ada_is_simple_array_type (arr_type))
1eea4ebd
UW
2987 return (ada_array_bound_from_type (arr_type, n, 1)
2988 - ada_array_bound_from_type (arr_type, n, 0) + 1);
14f9c5c9 2989 else
1eea4ebd
UW
2990 return (value_as_long (desc_one_bound (desc_bounds (arr), n, 1))
2991 - value_as_long (desc_one_bound (desc_bounds (arr), n, 0)) + 1);
4c4b4cd2
PH
2992}
2993
2994/* An empty array whose type is that of ARR_TYPE (an array type),
2995 with bounds LOW to LOW-1. */
2996
2997static struct value *
2998empty_array (struct type *arr_type, int low)
2999{
b0dd7688 3000 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3001 struct type *index_type
3002 = create_static_range_type
3003 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low, low - 1);
b0dd7688 3004 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3005
0b5d8877 3006 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3007}
14f9c5c9 3008\f
d2e4a39e 3009
4c4b4cd2 3010 /* Name resolution */
14f9c5c9 3011
4c4b4cd2
PH
3012/* The "decoded" name for the user-definable Ada operator corresponding
3013 to OP. */
14f9c5c9 3014
d2e4a39e 3015static const char *
4c4b4cd2 3016ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3017{
3018 int i;
3019
4c4b4cd2 3020 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3021 {
3022 if (ada_opname_table[i].op == op)
4c4b4cd2 3023 return ada_opname_table[i].decoded;
14f9c5c9 3024 }
323e0a4a 3025 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3026}
3027
3028
4c4b4cd2
PH
3029/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3030 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3031 undefined namespace) and converts operators that are
3032 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3033 non-null, it provides a preferred result type [at the moment, only
3034 type void has any effect---causing procedures to be preferred over
3035 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3036 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3037
4c4b4cd2
PH
3038static void
3039resolve (struct expression **expp, int void_context_p)
14f9c5c9 3040{
30b15541
UW
3041 struct type *context_type = NULL;
3042 int pc = 0;
3043
3044 if (void_context_p)
3045 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3046
3047 resolve_subexp (expp, &pc, 1, context_type);
14f9c5c9
AS
3048}
3049
4c4b4cd2
PH
3050/* Resolve the operator of the subexpression beginning at
3051 position *POS of *EXPP. "Resolving" consists of replacing
3052 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3053 with their resolutions, replacing built-in operators with
3054 function calls to user-defined operators, where appropriate, and,
3055 when DEPROCEDURE_P is non-zero, converting function-valued variables
3056 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3057 are as in ada_resolve, above. */
14f9c5c9 3058
d2e4a39e 3059static struct value *
4c4b4cd2 3060resolve_subexp (struct expression **expp, int *pos, int deprocedure_p,
76a01679 3061 struct type *context_type)
14f9c5c9
AS
3062{
3063 int pc = *pos;
3064 int i;
4c4b4cd2 3065 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3066 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3067 struct value **argvec; /* Vector of operand types (alloca'ed). */
3068 int nargs; /* Number of operands. */
52ce6436 3069 int oplen;
14f9c5c9
AS
3070
3071 argvec = NULL;
3072 nargs = 0;
3073 exp = *expp;
3074
52ce6436
PH
3075 /* Pass one: resolve operands, saving their types and updating *pos,
3076 if needed. */
14f9c5c9
AS
3077 switch (op)
3078 {
4c4b4cd2
PH
3079 case OP_FUNCALL:
3080 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3081 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3082 *pos += 7;
4c4b4cd2
PH
3083 else
3084 {
3085 *pos += 3;
3086 resolve_subexp (expp, pos, 0, NULL);
3087 }
3088 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3089 break;
3090
14f9c5c9 3091 case UNOP_ADDR:
4c4b4cd2
PH
3092 *pos += 1;
3093 resolve_subexp (expp, pos, 0, NULL);
3094 break;
3095
52ce6436
PH
3096 case UNOP_QUAL:
3097 *pos += 3;
17466c1a 3098 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type));
4c4b4cd2
PH
3099 break;
3100
52ce6436 3101 case OP_ATR_MODULUS:
4c4b4cd2
PH
3102 case OP_ATR_SIZE:
3103 case OP_ATR_TAG:
4c4b4cd2
PH
3104 case OP_ATR_FIRST:
3105 case OP_ATR_LAST:
3106 case OP_ATR_LENGTH:
3107 case OP_ATR_POS:
3108 case OP_ATR_VAL:
4c4b4cd2
PH
3109 case OP_ATR_MIN:
3110 case OP_ATR_MAX:
52ce6436
PH
3111 case TERNOP_IN_RANGE:
3112 case BINOP_IN_BOUNDS:
3113 case UNOP_IN_RANGE:
3114 case OP_AGGREGATE:
3115 case OP_OTHERS:
3116 case OP_CHOICES:
3117 case OP_POSITIONAL:
3118 case OP_DISCRETE_RANGE:
3119 case OP_NAME:
3120 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3121 *pos += oplen;
14f9c5c9
AS
3122 break;
3123
3124 case BINOP_ASSIGN:
3125 {
4c4b4cd2
PH
3126 struct value *arg1;
3127
3128 *pos += 1;
3129 arg1 = resolve_subexp (expp, pos, 0, NULL);
3130 if (arg1 == NULL)
3131 resolve_subexp (expp, pos, 1, NULL);
3132 else
df407dfe 3133 resolve_subexp (expp, pos, 1, value_type (arg1));
4c4b4cd2 3134 break;
14f9c5c9
AS
3135 }
3136
4c4b4cd2 3137 case UNOP_CAST:
4c4b4cd2
PH
3138 *pos += 3;
3139 nargs = 1;
3140 break;
14f9c5c9 3141
4c4b4cd2
PH
3142 case BINOP_ADD:
3143 case BINOP_SUB:
3144 case BINOP_MUL:
3145 case BINOP_DIV:
3146 case BINOP_REM:
3147 case BINOP_MOD:
3148 case BINOP_EXP:
3149 case BINOP_CONCAT:
3150 case BINOP_LOGICAL_AND:
3151 case BINOP_LOGICAL_OR:
3152 case BINOP_BITWISE_AND:
3153 case BINOP_BITWISE_IOR:
3154 case BINOP_BITWISE_XOR:
14f9c5c9 3155
4c4b4cd2
PH
3156 case BINOP_EQUAL:
3157 case BINOP_NOTEQUAL:
3158 case BINOP_LESS:
3159 case BINOP_GTR:
3160 case BINOP_LEQ:
3161 case BINOP_GEQ:
14f9c5c9 3162
4c4b4cd2
PH
3163 case BINOP_REPEAT:
3164 case BINOP_SUBSCRIPT:
3165 case BINOP_COMMA:
40c8aaa9
JB
3166 *pos += 1;
3167 nargs = 2;
3168 break;
14f9c5c9 3169
4c4b4cd2
PH
3170 case UNOP_NEG:
3171 case UNOP_PLUS:
3172 case UNOP_LOGICAL_NOT:
3173 case UNOP_ABS:
3174 case UNOP_IND:
3175 *pos += 1;
3176 nargs = 1;
3177 break;
14f9c5c9 3178
4c4b4cd2
PH
3179 case OP_LONG:
3180 case OP_DOUBLE:
3181 case OP_VAR_VALUE:
3182 *pos += 4;
3183 break;
14f9c5c9 3184
4c4b4cd2
PH
3185 case OP_TYPE:
3186 case OP_BOOL:
3187 case OP_LAST:
4c4b4cd2
PH
3188 case OP_INTERNALVAR:
3189 *pos += 3;
3190 break;
14f9c5c9 3191
4c4b4cd2
PH
3192 case UNOP_MEMVAL:
3193 *pos += 3;
3194 nargs = 1;
3195 break;
3196
67f3407f
DJ
3197 case OP_REGISTER:
3198 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3199 break;
3200
4c4b4cd2
PH
3201 case STRUCTOP_STRUCT:
3202 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3203 nargs = 1;
3204 break;
3205
4c4b4cd2 3206 case TERNOP_SLICE:
4c4b4cd2
PH
3207 *pos += 1;
3208 nargs = 3;
3209 break;
3210
52ce6436 3211 case OP_STRING:
14f9c5c9 3212 break;
4c4b4cd2
PH
3213
3214 default:
323e0a4a 3215 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3216 }
3217
76a01679 3218 argvec = (struct value * *) alloca (sizeof (struct value *) * (nargs + 1));
4c4b4cd2
PH
3219 for (i = 0; i < nargs; i += 1)
3220 argvec[i] = resolve_subexp (expp, pos, 1, NULL);
3221 argvec[i] = NULL;
3222 exp = *expp;
3223
3224 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3225 switch (op)
3226 {
3227 default:
3228 break;
3229
14f9c5c9 3230 case OP_VAR_VALUE:
4c4b4cd2 3231 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
3232 {
3233 struct ada_symbol_info *candidates;
3234 int n_candidates;
3235
3236 n_candidates =
3237 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3238 (exp->elts[pc + 2].symbol),
3239 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3240 &candidates);
76a01679
JB
3241
3242 if (n_candidates > 1)
3243 {
3244 /* Types tend to get re-introduced locally, so if there
3245 are any local symbols that are not types, first filter
3246 out all types. */
3247 int j;
3248 for (j = 0; j < n_candidates; j += 1)
3249 switch (SYMBOL_CLASS (candidates[j].sym))
3250 {
3251 case LOC_REGISTER:
3252 case LOC_ARG:
3253 case LOC_REF_ARG:
76a01679
JB
3254 case LOC_REGPARM_ADDR:
3255 case LOC_LOCAL:
76a01679 3256 case LOC_COMPUTED:
76a01679
JB
3257 goto FoundNonType;
3258 default:
3259 break;
3260 }
3261 FoundNonType:
3262 if (j < n_candidates)
3263 {
3264 j = 0;
3265 while (j < n_candidates)
3266 {
3267 if (SYMBOL_CLASS (candidates[j].sym) == LOC_TYPEDEF)
3268 {
3269 candidates[j] = candidates[n_candidates - 1];
3270 n_candidates -= 1;
3271 }
3272 else
3273 j += 1;
3274 }
3275 }
3276 }
3277
3278 if (n_candidates == 0)
323e0a4a 3279 error (_("No definition found for %s"),
76a01679
JB
3280 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3281 else if (n_candidates == 1)
3282 i = 0;
3283 else if (deprocedure_p
3284 && !is_nonfunction (candidates, n_candidates))
3285 {
06d5cf63
JB
3286 i = ada_resolve_function
3287 (candidates, n_candidates, NULL, 0,
3288 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
3289 context_type);
76a01679 3290 if (i < 0)
323e0a4a 3291 error (_("Could not find a match for %s"),
76a01679
JB
3292 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3293 }
3294 else
3295 {
323e0a4a 3296 printf_filtered (_("Multiple matches for %s\n"),
76a01679
JB
3297 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3298 user_select_syms (candidates, n_candidates, 1);
3299 i = 0;
3300 }
3301
3302 exp->elts[pc + 1].block = candidates[i].block;
3303 exp->elts[pc + 2].symbol = candidates[i].sym;
1265e4aa
JB
3304 if (innermost_block == NULL
3305 || contained_in (candidates[i].block, innermost_block))
76a01679
JB
3306 innermost_block = candidates[i].block;
3307 }
3308
3309 if (deprocedure_p
3310 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3311 == TYPE_CODE_FUNC))
3312 {
3313 replace_operator_with_call (expp, pc, 0, 0,
3314 exp->elts[pc + 2].symbol,
3315 exp->elts[pc + 1].block);
3316 exp = *expp;
3317 }
14f9c5c9
AS
3318 break;
3319
3320 case OP_FUNCALL:
3321 {
4c4b4cd2 3322 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3323 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2
PH
3324 {
3325 struct ada_symbol_info *candidates;
3326 int n_candidates;
3327
3328 n_candidates =
76a01679
JB
3329 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3330 (exp->elts[pc + 5].symbol),
3331 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3332 &candidates);
4c4b4cd2
PH
3333 if (n_candidates == 1)
3334 i = 0;
3335 else
3336 {
06d5cf63
JB
3337 i = ada_resolve_function
3338 (candidates, n_candidates,
3339 argvec, nargs,
3340 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
3341 context_type);
4c4b4cd2 3342 if (i < 0)
323e0a4a 3343 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3344 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3345 }
3346
3347 exp->elts[pc + 4].block = candidates[i].block;
3348 exp->elts[pc + 5].symbol = candidates[i].sym;
1265e4aa
JB
3349 if (innermost_block == NULL
3350 || contained_in (candidates[i].block, innermost_block))
4c4b4cd2
PH
3351 innermost_block = candidates[i].block;
3352 }
14f9c5c9
AS
3353 }
3354 break;
3355 case BINOP_ADD:
3356 case BINOP_SUB:
3357 case BINOP_MUL:
3358 case BINOP_DIV:
3359 case BINOP_REM:
3360 case BINOP_MOD:
3361 case BINOP_CONCAT:
3362 case BINOP_BITWISE_AND:
3363 case BINOP_BITWISE_IOR:
3364 case BINOP_BITWISE_XOR:
3365 case BINOP_EQUAL:
3366 case BINOP_NOTEQUAL:
3367 case BINOP_LESS:
3368 case BINOP_GTR:
3369 case BINOP_LEQ:
3370 case BINOP_GEQ:
3371 case BINOP_EXP:
3372 case UNOP_NEG:
3373 case UNOP_PLUS:
3374 case UNOP_LOGICAL_NOT:
3375 case UNOP_ABS:
3376 if (possible_user_operator_p (op, argvec))
4c4b4cd2
PH
3377 {
3378 struct ada_symbol_info *candidates;
3379 int n_candidates;
3380
3381 n_candidates =
3382 ada_lookup_symbol_list (ada_encode (ada_decoded_op_name (op)),
3383 (struct block *) NULL, VAR_DOMAIN,
4eeaa230 3384 &candidates);
4c4b4cd2 3385 i = ada_resolve_function (candidates, n_candidates, argvec, nargs,
76a01679 3386 ada_decoded_op_name (op), NULL);
4c4b4cd2
PH
3387 if (i < 0)
3388 break;
3389
76a01679
JB
3390 replace_operator_with_call (expp, pc, nargs, 1,
3391 candidates[i].sym, candidates[i].block);
4c4b4cd2
PH
3392 exp = *expp;
3393 }
14f9c5c9 3394 break;
4c4b4cd2
PH
3395
3396 case OP_TYPE:
b3dbf008 3397 case OP_REGISTER:
4c4b4cd2 3398 return NULL;
14f9c5c9
AS
3399 }
3400
3401 *pos = pc;
3402 return evaluate_subexp_type (exp, pos);
3403}
3404
3405/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3406 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3407 a non-pointer. */
14f9c5c9 3408/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3409 liberal. */
14f9c5c9
AS
3410
3411static int
4dc81987 3412ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3413{
61ee279c
PH
3414 ftype = ada_check_typedef (ftype);
3415 atype = ada_check_typedef (atype);
14f9c5c9
AS
3416
3417 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3418 ftype = TYPE_TARGET_TYPE (ftype);
3419 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3420 atype = TYPE_TARGET_TYPE (atype);
3421
d2e4a39e 3422 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3423 {
3424 default:
5b3d5b7d 3425 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3426 case TYPE_CODE_PTR:
3427 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3428 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3429 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3430 else
1265e4aa
JB
3431 return (may_deref
3432 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3433 case TYPE_CODE_INT:
3434 case TYPE_CODE_ENUM:
3435 case TYPE_CODE_RANGE:
3436 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3437 {
3438 case TYPE_CODE_INT:
3439 case TYPE_CODE_ENUM:
3440 case TYPE_CODE_RANGE:
3441 return 1;
3442 default:
3443 return 0;
3444 }
14f9c5c9
AS
3445
3446 case TYPE_CODE_ARRAY:
d2e4a39e 3447 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3448 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3449
3450 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3451 if (ada_is_array_descriptor_type (ftype))
3452 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3453 || ada_is_array_descriptor_type (atype));
14f9c5c9 3454 else
4c4b4cd2
PH
3455 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3456 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3457
3458 case TYPE_CODE_UNION:
3459 case TYPE_CODE_FLT:
3460 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3461 }
3462}
3463
3464/* Return non-zero if the formals of FUNC "sufficiently match" the
3465 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3466 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3467 argument function. */
14f9c5c9
AS
3468
3469static int
d2e4a39e 3470ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3471{
3472 int i;
d2e4a39e 3473 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3474
1265e4aa
JB
3475 if (SYMBOL_CLASS (func) == LOC_CONST
3476 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3477 return (n_actuals == 0);
3478 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3479 return 0;
3480
3481 if (TYPE_NFIELDS (func_type) != n_actuals)
3482 return 0;
3483
3484 for (i = 0; i < n_actuals; i += 1)
3485 {
4c4b4cd2 3486 if (actuals[i] == NULL)
76a01679
JB
3487 return 0;
3488 else
3489 {
5b4ee69b
MS
3490 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3491 i));
df407dfe 3492 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3493
76a01679
JB
3494 if (!ada_type_match (ftype, atype, 1))
3495 return 0;
3496 }
14f9c5c9
AS
3497 }
3498 return 1;
3499}
3500
3501/* False iff function type FUNC_TYPE definitely does not produce a value
3502 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3503 FUNC_TYPE is not a valid function type with a non-null return type
3504 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3505
3506static int
d2e4a39e 3507return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3508{
d2e4a39e 3509 struct type *return_type;
14f9c5c9
AS
3510
3511 if (func_type == NULL)
3512 return 1;
3513
4c4b4cd2 3514 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3515 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3516 else
18af8284 3517 return_type = get_base_type (func_type);
14f9c5c9
AS
3518 if (return_type == NULL)
3519 return 1;
3520
18af8284 3521 context_type = get_base_type (context_type);
14f9c5c9
AS
3522
3523 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3524 return context_type == NULL || return_type == context_type;
3525 else if (context_type == NULL)
3526 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3527 else
3528 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3529}
3530
3531
4c4b4cd2 3532/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3533 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3534 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3535 that returns that type, then eliminate matches that don't. If
3536 CONTEXT_TYPE is void and there is at least one match that does not
3537 return void, eliminate all matches that do.
3538
14f9c5c9
AS
3539 Asks the user if there is more than one match remaining. Returns -1
3540 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3541 solely for messages. May re-arrange and modify SYMS in
3542 the process; the index returned is for the modified vector. */
14f9c5c9 3543
4c4b4cd2
PH
3544static int
3545ada_resolve_function (struct ada_symbol_info syms[],
3546 int nsyms, struct value **args, int nargs,
3547 const char *name, struct type *context_type)
14f9c5c9 3548{
30b15541 3549 int fallback;
14f9c5c9 3550 int k;
4c4b4cd2 3551 int m; /* Number of hits */
14f9c5c9 3552
d2e4a39e 3553 m = 0;
30b15541
UW
3554 /* In the first pass of the loop, we only accept functions matching
3555 context_type. If none are found, we add a second pass of the loop
3556 where every function is accepted. */
3557 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3558 {
3559 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3560 {
61ee279c 3561 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].sym));
4c4b4cd2
PH
3562
3563 if (ada_args_match (syms[k].sym, args, nargs)
30b15541 3564 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3565 {
3566 syms[m] = syms[k];
3567 m += 1;
3568 }
3569 }
14f9c5c9
AS
3570 }
3571
3572 if (m == 0)
3573 return -1;
3574 else if (m > 1)
3575 {
323e0a4a 3576 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3577 user_select_syms (syms, m, 1);
14f9c5c9
AS
3578 return 0;
3579 }
3580 return 0;
3581}
3582
4c4b4cd2
PH
3583/* Returns true (non-zero) iff decoded name N0 should appear before N1
3584 in a listing of choices during disambiguation (see sort_choices, below).
3585 The idea is that overloadings of a subprogram name from the
3586 same package should sort in their source order. We settle for ordering
3587 such symbols by their trailing number (__N or $N). */
3588
14f9c5c9 3589static int
0d5cff50 3590encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3591{
3592 if (N1 == NULL)
3593 return 0;
3594 else if (N0 == NULL)
3595 return 1;
3596 else
3597 {
3598 int k0, k1;
5b4ee69b 3599
d2e4a39e 3600 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3601 ;
d2e4a39e 3602 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3603 ;
d2e4a39e 3604 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3605 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3606 {
3607 int n0, n1;
5b4ee69b 3608
4c4b4cd2
PH
3609 n0 = k0;
3610 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3611 n0 -= 1;
3612 n1 = k1;
3613 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3614 n1 -= 1;
3615 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3616 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3617 }
14f9c5c9
AS
3618 return (strcmp (N0, N1) < 0);
3619 }
3620}
d2e4a39e 3621
4c4b4cd2
PH
3622/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3623 encoded names. */
3624
d2e4a39e 3625static void
4c4b4cd2 3626sort_choices (struct ada_symbol_info syms[], int nsyms)
14f9c5c9 3627{
4c4b4cd2 3628 int i;
5b4ee69b 3629
d2e4a39e 3630 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3631 {
4c4b4cd2 3632 struct ada_symbol_info sym = syms[i];
14f9c5c9
AS
3633 int j;
3634
d2e4a39e 3635 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2
PH
3636 {
3637 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].sym),
3638 SYMBOL_LINKAGE_NAME (sym.sym)))
3639 break;
3640 syms[j + 1] = syms[j];
3641 }
d2e4a39e 3642 syms[j + 1] = sym;
14f9c5c9
AS
3643 }
3644}
3645
4c4b4cd2
PH
3646/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3647 by asking the user (if necessary), returning the number selected,
3648 and setting the first elements of SYMS items. Error if no symbols
3649 selected. */
14f9c5c9
AS
3650
3651/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3652 to be re-integrated one of these days. */
14f9c5c9
AS
3653
3654int
4c4b4cd2 3655user_select_syms (struct ada_symbol_info *syms, int nsyms, int max_results)
14f9c5c9
AS
3656{
3657 int i;
d2e4a39e 3658 int *chosen = (int *) alloca (sizeof (int) * nsyms);
14f9c5c9
AS
3659 int n_chosen;
3660 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3661 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3662
3663 if (max_results < 1)
323e0a4a 3664 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3665 if (nsyms <= 1)
3666 return nsyms;
3667
717d2f5a
JB
3668 if (select_mode == multiple_symbols_cancel)
3669 error (_("\
3670canceled because the command is ambiguous\n\
3671See set/show multiple-symbol."));
3672
3673 /* If select_mode is "all", then return all possible symbols.
3674 Only do that if more than one symbol can be selected, of course.
3675 Otherwise, display the menu as usual. */
3676 if (select_mode == multiple_symbols_all && max_results > 1)
3677 return nsyms;
3678
323e0a4a 3679 printf_unfiltered (_("[0] cancel\n"));
14f9c5c9 3680 if (max_results > 1)
323e0a4a 3681 printf_unfiltered (_("[1] all\n"));
14f9c5c9 3682
4c4b4cd2 3683 sort_choices (syms, nsyms);
14f9c5c9
AS
3684
3685 for (i = 0; i < nsyms; i += 1)
3686 {
4c4b4cd2
PH
3687 if (syms[i].sym == NULL)
3688 continue;
3689
3690 if (SYMBOL_CLASS (syms[i].sym) == LOC_BLOCK)
3691 {
76a01679
JB
3692 struct symtab_and_line sal =
3693 find_function_start_sal (syms[i].sym, 1);
5b4ee69b 3694
323e0a4a
AC
3695 if (sal.symtab == NULL)
3696 printf_unfiltered (_("[%d] %s at <no source file available>:%d\n"),
3697 i + first_choice,
3698 SYMBOL_PRINT_NAME (syms[i].sym),
3699 sal.line);
3700 else
3701 printf_unfiltered (_("[%d] %s at %s:%d\n"), i + first_choice,
3702 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3703 symtab_to_filename_for_display (sal.symtab),
3704 sal.line);
4c4b4cd2
PH
3705 continue;
3706 }
d2e4a39e 3707 else
4c4b4cd2
PH
3708 {
3709 int is_enumeral =
3710 (SYMBOL_CLASS (syms[i].sym) == LOC_CONST
3711 && SYMBOL_TYPE (syms[i].sym) != NULL
3712 && TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) == TYPE_CODE_ENUM);
210bbc17 3713 struct symtab *symtab = SYMBOL_SYMTAB (syms[i].sym);
4c4b4cd2
PH
3714
3715 if (SYMBOL_LINE (syms[i].sym) != 0 && symtab != NULL)
323e0a4a 3716 printf_unfiltered (_("[%d] %s at %s:%d\n"),
4c4b4cd2
PH
3717 i + first_choice,
3718 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3719 symtab_to_filename_for_display (symtab),
3720 SYMBOL_LINE (syms[i].sym));
76a01679
JB
3721 else if (is_enumeral
3722 && TYPE_NAME (SYMBOL_TYPE (syms[i].sym)) != NULL)
4c4b4cd2 3723 {
a3f17187 3724 printf_unfiltered (("[%d] "), i + first_choice);
76a01679 3725 ada_print_type (SYMBOL_TYPE (syms[i].sym), NULL,
79d43c61 3726 gdb_stdout, -1, 0, &type_print_raw_options);
323e0a4a 3727 printf_unfiltered (_("'(%s) (enumeral)\n"),
4c4b4cd2
PH
3728 SYMBOL_PRINT_NAME (syms[i].sym));
3729 }
3730 else if (symtab != NULL)
3731 printf_unfiltered (is_enumeral
323e0a4a
AC
3732 ? _("[%d] %s in %s (enumeral)\n")
3733 : _("[%d] %s at %s:?\n"),
4c4b4cd2
PH
3734 i + first_choice,
3735 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821 3736 symtab_to_filename_for_display (symtab));
4c4b4cd2
PH
3737 else
3738 printf_unfiltered (is_enumeral
323e0a4a
AC
3739 ? _("[%d] %s (enumeral)\n")
3740 : _("[%d] %s at ?\n"),
4c4b4cd2
PH
3741 i + first_choice,
3742 SYMBOL_PRINT_NAME (syms[i].sym));
3743 }
14f9c5c9 3744 }
d2e4a39e 3745
14f9c5c9 3746 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3747 "overload-choice");
14f9c5c9
AS
3748
3749 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3750 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3751
3752 return n_chosen;
3753}
3754
3755/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3756 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3757 order in CHOICES[0 .. N-1], and return N.
3758
3759 The user types choices as a sequence of numbers on one line
3760 separated by blanks, encoding them as follows:
3761
4c4b4cd2 3762 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3763 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3764 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3765
4c4b4cd2 3766 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3767
3768 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3769 prompts (for use with the -f switch). */
14f9c5c9
AS
3770
3771int
d2e4a39e 3772get_selections (int *choices, int n_choices, int max_results,
4c4b4cd2 3773 int is_all_choice, char *annotation_suffix)
14f9c5c9 3774{
d2e4a39e 3775 char *args;
0bcd0149 3776 char *prompt;
14f9c5c9
AS
3777 int n_chosen;
3778 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3779
14f9c5c9
AS
3780 prompt = getenv ("PS2");
3781 if (prompt == NULL)
0bcd0149 3782 prompt = "> ";
14f9c5c9 3783
0bcd0149 3784 args = command_line_input (prompt, 0, annotation_suffix);
d2e4a39e 3785
14f9c5c9 3786 if (args == NULL)
323e0a4a 3787 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3788
3789 n_chosen = 0;
76a01679 3790
4c4b4cd2
PH
3791 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3792 order, as given in args. Choices are validated. */
14f9c5c9
AS
3793 while (1)
3794 {
d2e4a39e 3795 char *args2;
14f9c5c9
AS
3796 int choice, j;
3797
0fcd72ba 3798 args = skip_spaces (args);
14f9c5c9 3799 if (*args == '\0' && n_chosen == 0)
323e0a4a 3800 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3801 else if (*args == '\0')
4c4b4cd2 3802 break;
14f9c5c9
AS
3803
3804 choice = strtol (args, &args2, 10);
d2e4a39e 3805 if (args == args2 || choice < 0
4c4b4cd2 3806 || choice > n_choices + first_choice - 1)
323e0a4a 3807 error (_("Argument must be choice number"));
14f9c5c9
AS
3808 args = args2;
3809
d2e4a39e 3810 if (choice == 0)
323e0a4a 3811 error (_("cancelled"));
14f9c5c9
AS
3812
3813 if (choice < first_choice)
4c4b4cd2
PH
3814 {
3815 n_chosen = n_choices;
3816 for (j = 0; j < n_choices; j += 1)
3817 choices[j] = j;
3818 break;
3819 }
14f9c5c9
AS
3820 choice -= first_choice;
3821
d2e4a39e 3822 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
3823 {
3824 }
14f9c5c9
AS
3825
3826 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
3827 {
3828 int k;
5b4ee69b 3829
4c4b4cd2
PH
3830 for (k = n_chosen - 1; k > j; k -= 1)
3831 choices[k + 1] = choices[k];
3832 choices[j + 1] = choice;
3833 n_chosen += 1;
3834 }
14f9c5c9
AS
3835 }
3836
3837 if (n_chosen > max_results)
323e0a4a 3838 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 3839
14f9c5c9
AS
3840 return n_chosen;
3841}
3842
4c4b4cd2
PH
3843/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3844 on the function identified by SYM and BLOCK, and taking NARGS
3845 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3846
3847static void
d2e4a39e 3848replace_operator_with_call (struct expression **expp, int pc, int nargs,
4c4b4cd2 3849 int oplen, struct symbol *sym,
270140bd 3850 const struct block *block)
14f9c5c9
AS
3851{
3852 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 3853 symbol, -oplen for operator being replaced). */
d2e4a39e 3854 struct expression *newexp = (struct expression *)
8c1a34e7 3855 xzalloc (sizeof (struct expression)
4c4b4cd2 3856 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
d2e4a39e 3857 struct expression *exp = *expp;
14f9c5c9
AS
3858
3859 newexp->nelts = exp->nelts + 7 - oplen;
3860 newexp->language_defn = exp->language_defn;
3489610d 3861 newexp->gdbarch = exp->gdbarch;
14f9c5c9 3862 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 3863 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 3864 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
3865
3866 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
3867 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
3868
3869 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
3870 newexp->elts[pc + 4].block = block;
3871 newexp->elts[pc + 5].symbol = sym;
3872
3873 *expp = newexp;
aacb1f0a 3874 xfree (exp);
d2e4a39e 3875}
14f9c5c9
AS
3876
3877/* Type-class predicates */
3878
4c4b4cd2
PH
3879/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
3880 or FLOAT). */
14f9c5c9
AS
3881
3882static int
d2e4a39e 3883numeric_type_p (struct type *type)
14f9c5c9
AS
3884{
3885 if (type == NULL)
3886 return 0;
d2e4a39e
AS
3887 else
3888 {
3889 switch (TYPE_CODE (type))
4c4b4cd2
PH
3890 {
3891 case TYPE_CODE_INT:
3892 case TYPE_CODE_FLT:
3893 return 1;
3894 case TYPE_CODE_RANGE:
3895 return (type == TYPE_TARGET_TYPE (type)
3896 || numeric_type_p (TYPE_TARGET_TYPE (type)));
3897 default:
3898 return 0;
3899 }
d2e4a39e 3900 }
14f9c5c9
AS
3901}
3902
4c4b4cd2 3903/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
3904
3905static int
d2e4a39e 3906integer_type_p (struct type *type)
14f9c5c9
AS
3907{
3908 if (type == NULL)
3909 return 0;
d2e4a39e
AS
3910 else
3911 {
3912 switch (TYPE_CODE (type))
4c4b4cd2
PH
3913 {
3914 case TYPE_CODE_INT:
3915 return 1;
3916 case TYPE_CODE_RANGE:
3917 return (type == TYPE_TARGET_TYPE (type)
3918 || integer_type_p (TYPE_TARGET_TYPE (type)));
3919 default:
3920 return 0;
3921 }
d2e4a39e 3922 }
14f9c5c9
AS
3923}
3924
4c4b4cd2 3925/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
3926
3927static int
d2e4a39e 3928scalar_type_p (struct type *type)
14f9c5c9
AS
3929{
3930 if (type == NULL)
3931 return 0;
d2e4a39e
AS
3932 else
3933 {
3934 switch (TYPE_CODE (type))
4c4b4cd2
PH
3935 {
3936 case TYPE_CODE_INT:
3937 case TYPE_CODE_RANGE:
3938 case TYPE_CODE_ENUM:
3939 case TYPE_CODE_FLT:
3940 return 1;
3941 default:
3942 return 0;
3943 }
d2e4a39e 3944 }
14f9c5c9
AS
3945}
3946
4c4b4cd2 3947/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
3948
3949static int
d2e4a39e 3950discrete_type_p (struct type *type)
14f9c5c9
AS
3951{
3952 if (type == NULL)
3953 return 0;
d2e4a39e
AS
3954 else
3955 {
3956 switch (TYPE_CODE (type))
4c4b4cd2
PH
3957 {
3958 case TYPE_CODE_INT:
3959 case TYPE_CODE_RANGE:
3960 case TYPE_CODE_ENUM:
872f0337 3961 case TYPE_CODE_BOOL:
4c4b4cd2
PH
3962 return 1;
3963 default:
3964 return 0;
3965 }
d2e4a39e 3966 }
14f9c5c9
AS
3967}
3968
4c4b4cd2
PH
3969/* Returns non-zero if OP with operands in the vector ARGS could be
3970 a user-defined function. Errs on the side of pre-defined operators
3971 (i.e., result 0). */
14f9c5c9
AS
3972
3973static int
d2e4a39e 3974possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 3975{
76a01679 3976 struct type *type0 =
df407dfe 3977 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 3978 struct type *type1 =
df407dfe 3979 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 3980
4c4b4cd2
PH
3981 if (type0 == NULL)
3982 return 0;
3983
14f9c5c9
AS
3984 switch (op)
3985 {
3986 default:
3987 return 0;
3988
3989 case BINOP_ADD:
3990 case BINOP_SUB:
3991 case BINOP_MUL:
3992 case BINOP_DIV:
d2e4a39e 3993 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
3994
3995 case BINOP_REM:
3996 case BINOP_MOD:
3997 case BINOP_BITWISE_AND:
3998 case BINOP_BITWISE_IOR:
3999 case BINOP_BITWISE_XOR:
d2e4a39e 4000 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4001
4002 case BINOP_EQUAL:
4003 case BINOP_NOTEQUAL:
4004 case BINOP_LESS:
4005 case BINOP_GTR:
4006 case BINOP_LEQ:
4007 case BINOP_GEQ:
d2e4a39e 4008 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4009
4010 case BINOP_CONCAT:
ee90b9ab 4011 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4012
4013 case BINOP_EXP:
d2e4a39e 4014 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4015
4016 case UNOP_NEG:
4017 case UNOP_PLUS:
4018 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4019 case UNOP_ABS:
4020 return (!numeric_type_p (type0));
14f9c5c9
AS
4021
4022 }
4023}
4024\f
4c4b4cd2 4025 /* Renaming */
14f9c5c9 4026
aeb5907d
JB
4027/* NOTES:
4028
4029 1. In the following, we assume that a renaming type's name may
4030 have an ___XD suffix. It would be nice if this went away at some
4031 point.
4032 2. We handle both the (old) purely type-based representation of
4033 renamings and the (new) variable-based encoding. At some point,
4034 it is devoutly to be hoped that the former goes away
4035 (FIXME: hilfinger-2007-07-09).
4036 3. Subprogram renamings are not implemented, although the XRS
4037 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4038
4039/* If SYM encodes a renaming,
4040
4041 <renaming> renames <renamed entity>,
4042
4043 sets *LEN to the length of the renamed entity's name,
4044 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4045 the string describing the subcomponent selected from the renamed
0963b4bd 4046 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4047 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4048 are undefined). Otherwise, returns a value indicating the category
4049 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4050 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4051 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4052 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4053 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4054 may be NULL, in which case they are not assigned.
4055
4056 [Currently, however, GCC does not generate subprogram renamings.] */
4057
4058enum ada_renaming_category
4059ada_parse_renaming (struct symbol *sym,
4060 const char **renamed_entity, int *len,
4061 const char **renaming_expr)
4062{
4063 enum ada_renaming_category kind;
4064 const char *info;
4065 const char *suffix;
4066
4067 if (sym == NULL)
4068 return ADA_NOT_RENAMING;
4069 switch (SYMBOL_CLASS (sym))
14f9c5c9 4070 {
aeb5907d
JB
4071 default:
4072 return ADA_NOT_RENAMING;
4073 case LOC_TYPEDEF:
4074 return parse_old_style_renaming (SYMBOL_TYPE (sym),
4075 renamed_entity, len, renaming_expr);
4076 case LOC_LOCAL:
4077 case LOC_STATIC:
4078 case LOC_COMPUTED:
4079 case LOC_OPTIMIZED_OUT:
4080 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4081 if (info == NULL)
4082 return ADA_NOT_RENAMING;
4083 switch (info[5])
4084 {
4085 case '_':
4086 kind = ADA_OBJECT_RENAMING;
4087 info += 6;
4088 break;
4089 case 'E':
4090 kind = ADA_EXCEPTION_RENAMING;
4091 info += 7;
4092 break;
4093 case 'P':
4094 kind = ADA_PACKAGE_RENAMING;
4095 info += 7;
4096 break;
4097 case 'S':
4098 kind = ADA_SUBPROGRAM_RENAMING;
4099 info += 7;
4100 break;
4101 default:
4102 return ADA_NOT_RENAMING;
4103 }
14f9c5c9 4104 }
4c4b4cd2 4105
aeb5907d
JB
4106 if (renamed_entity != NULL)
4107 *renamed_entity = info;
4108 suffix = strstr (info, "___XE");
4109 if (suffix == NULL || suffix == info)
4110 return ADA_NOT_RENAMING;
4111 if (len != NULL)
4112 *len = strlen (info) - strlen (suffix);
4113 suffix += 5;
4114 if (renaming_expr != NULL)
4115 *renaming_expr = suffix;
4116 return kind;
4117}
4118
4119/* Assuming TYPE encodes a renaming according to the old encoding in
4120 exp_dbug.ads, returns details of that renaming in *RENAMED_ENTITY,
4121 *LEN, and *RENAMING_EXPR, as for ada_parse_renaming, above. Returns
4122 ADA_NOT_RENAMING otherwise. */
4123static enum ada_renaming_category
4124parse_old_style_renaming (struct type *type,
4125 const char **renamed_entity, int *len,
4126 const char **renaming_expr)
4127{
4128 enum ada_renaming_category kind;
4129 const char *name;
4130 const char *info;
4131 const char *suffix;
14f9c5c9 4132
aeb5907d
JB
4133 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
4134 || TYPE_NFIELDS (type) != 1)
4135 return ADA_NOT_RENAMING;
14f9c5c9 4136
aeb5907d
JB
4137 name = type_name_no_tag (type);
4138 if (name == NULL)
4139 return ADA_NOT_RENAMING;
4140
4141 name = strstr (name, "___XR");
4142 if (name == NULL)
4143 return ADA_NOT_RENAMING;
4144 switch (name[5])
4145 {
4146 case '\0':
4147 case '_':
4148 kind = ADA_OBJECT_RENAMING;
4149 break;
4150 case 'E':
4151 kind = ADA_EXCEPTION_RENAMING;
4152 break;
4153 case 'P':
4154 kind = ADA_PACKAGE_RENAMING;
4155 break;
4156 case 'S':
4157 kind = ADA_SUBPROGRAM_RENAMING;
4158 break;
4159 default:
4160 return ADA_NOT_RENAMING;
4161 }
14f9c5c9 4162
aeb5907d
JB
4163 info = TYPE_FIELD_NAME (type, 0);
4164 if (info == NULL)
4165 return ADA_NOT_RENAMING;
4166 if (renamed_entity != NULL)
4167 *renamed_entity = info;
4168 suffix = strstr (info, "___XE");
4169 if (renaming_expr != NULL)
4170 *renaming_expr = suffix + 5;
4171 if (suffix == NULL || suffix == info)
4172 return ADA_NOT_RENAMING;
4173 if (len != NULL)
4174 *len = suffix - info;
4175 return kind;
a5ee536b
JB
4176}
4177
4178/* Compute the value of the given RENAMING_SYM, which is expected to
4179 be a symbol encoding a renaming expression. BLOCK is the block
4180 used to evaluate the renaming. */
52ce6436 4181
a5ee536b
JB
4182static struct value *
4183ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4184 const struct block *block)
a5ee536b 4185{
bbc13ae3 4186 const char *sym_name;
a5ee536b
JB
4187 struct expression *expr;
4188 struct value *value;
4189 struct cleanup *old_chain = NULL;
4190
bbc13ae3 4191 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
1bb9788d 4192 expr = parse_exp_1 (&sym_name, 0, block, 0);
bbc13ae3 4193 old_chain = make_cleanup (free_current_contents, &expr);
a5ee536b
JB
4194 value = evaluate_expression (expr);
4195
4196 do_cleanups (old_chain);
4197 return value;
4198}
14f9c5c9 4199\f
d2e4a39e 4200
4c4b4cd2 4201 /* Evaluation: Function Calls */
14f9c5c9 4202
4c4b4cd2 4203/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4204 lvalues, and otherwise has the side-effect of allocating memory
4205 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4206
d2e4a39e 4207static struct value *
40bc484c 4208ensure_lval (struct value *val)
14f9c5c9 4209{
40bc484c
JB
4210 if (VALUE_LVAL (val) == not_lval
4211 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4212 {
df407dfe 4213 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4214 const CORE_ADDR addr =
4215 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4216
40bc484c 4217 set_value_address (val, addr);
a84a8a0d 4218 VALUE_LVAL (val) = lval_memory;
40bc484c 4219 write_memory (addr, value_contents (val), len);
c3e5cd34 4220 }
14f9c5c9
AS
4221
4222 return val;
4223}
4224
4225/* Return the value ACTUAL, converted to be an appropriate value for a
4226 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4227 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4228 values not residing in memory, updating it as needed. */
14f9c5c9 4229
a93c0eb6 4230struct value *
40bc484c 4231ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4232{
df407dfe 4233 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4234 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4235 struct type *formal_target =
4236 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4237 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4238 struct type *actual_target =
4239 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4240 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4241
4c4b4cd2 4242 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4243 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4244 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4245 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4246 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4247 {
a84a8a0d 4248 struct value *result;
5b4ee69b 4249
14f9c5c9 4250 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4251 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4252 result = desc_data (actual);
14f9c5c9 4253 else if (TYPE_CODE (actual_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4254 {
4255 if (VALUE_LVAL (actual) != lval_memory)
4256 {
4257 struct value *val;
5b4ee69b 4258
df407dfe 4259 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4260 val = allocate_value (actual_type);
990a07ab 4261 memcpy ((char *) value_contents_raw (val),
0fd88904 4262 (char *) value_contents (actual),
4c4b4cd2 4263 TYPE_LENGTH (actual_type));
40bc484c 4264 actual = ensure_lval (val);
4c4b4cd2 4265 }
a84a8a0d 4266 result = value_addr (actual);
4c4b4cd2 4267 }
a84a8a0d
JB
4268 else
4269 return actual;
b1af9e97 4270 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4271 }
4272 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4273 return ada_value_ind (actual);
4274
4275 return actual;
4276}
4277
438c98a1
JB
4278/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4279 type TYPE. This is usually an inefficient no-op except on some targets
4280 (such as AVR) where the representation of a pointer and an address
4281 differs. */
4282
4283static CORE_ADDR
4284value_pointer (struct value *value, struct type *type)
4285{
4286 struct gdbarch *gdbarch = get_type_arch (type);
4287 unsigned len = TYPE_LENGTH (type);
4288 gdb_byte *buf = alloca (len);
4289 CORE_ADDR addr;
4290
4291 addr = value_address (value);
4292 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4293 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4294 return addr;
4295}
4296
14f9c5c9 4297
4c4b4cd2
PH
4298/* Push a descriptor of type TYPE for array value ARR on the stack at
4299 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4300 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4301 to-descriptor type rather than a descriptor type), a struct value *
4302 representing a pointer to this descriptor. */
14f9c5c9 4303
d2e4a39e 4304static struct value *
40bc484c 4305make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4306{
d2e4a39e
AS
4307 struct type *bounds_type = desc_bounds_type (type);
4308 struct type *desc_type = desc_base_type (type);
4309 struct value *descriptor = allocate_value (desc_type);
4310 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4311 int i;
d2e4a39e 4312
0963b4bd
MS
4313 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4314 i > 0; i -= 1)
14f9c5c9 4315 {
19f220c3
JK
4316 modify_field (value_type (bounds), value_contents_writeable (bounds),
4317 ada_array_bound (arr, i, 0),
4318 desc_bound_bitpos (bounds_type, i, 0),
4319 desc_bound_bitsize (bounds_type, i, 0));
4320 modify_field (value_type (bounds), value_contents_writeable (bounds),
4321 ada_array_bound (arr, i, 1),
4322 desc_bound_bitpos (bounds_type, i, 1),
4323 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4324 }
d2e4a39e 4325
40bc484c 4326 bounds = ensure_lval (bounds);
d2e4a39e 4327
19f220c3
JK
4328 modify_field (value_type (descriptor),
4329 value_contents_writeable (descriptor),
4330 value_pointer (ensure_lval (arr),
4331 TYPE_FIELD_TYPE (desc_type, 0)),
4332 fat_pntr_data_bitpos (desc_type),
4333 fat_pntr_data_bitsize (desc_type));
4334
4335 modify_field (value_type (descriptor),
4336 value_contents_writeable (descriptor),
4337 value_pointer (bounds,
4338 TYPE_FIELD_TYPE (desc_type, 1)),
4339 fat_pntr_bounds_bitpos (desc_type),
4340 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4341
40bc484c 4342 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4343
4344 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4345 return value_addr (descriptor);
4346 else
4347 return descriptor;
4348}
14f9c5c9 4349\f
3d9434b5
JB
4350 /* Symbol Cache Module */
4351
3d9434b5 4352/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4353 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4354 on the type of entity being printed, the cache can make it as much
4355 as an order of magnitude faster than without it.
4356
4357 The descriptive type DWARF extension has significantly reduced
4358 the need for this cache, at least when DWARF is being used. However,
4359 even in this case, some expensive name-based symbol searches are still
4360 sometimes necessary - to find an XVZ variable, mostly. */
4361
ee01b665 4362/* Initialize the contents of SYM_CACHE. */
3d9434b5 4363
ee01b665
JB
4364static void
4365ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4366{
4367 obstack_init (&sym_cache->cache_space);
4368 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4369}
3d9434b5 4370
ee01b665
JB
4371/* Free the memory used by SYM_CACHE. */
4372
4373static void
4374ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4375{
ee01b665
JB
4376 obstack_free (&sym_cache->cache_space, NULL);
4377 xfree (sym_cache);
4378}
3d9434b5 4379
ee01b665
JB
4380/* Return the symbol cache associated to the given program space PSPACE.
4381 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4382
ee01b665
JB
4383static struct ada_symbol_cache *
4384ada_get_symbol_cache (struct program_space *pspace)
4385{
4386 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
4387 struct ada_symbol_cache *sym_cache = pspace_data->sym_cache;
4388
4389 if (sym_cache == NULL)
4390 {
4391 sym_cache = XCNEW (struct ada_symbol_cache);
4392 ada_init_symbol_cache (sym_cache);
4393 }
4394
4395 return sym_cache;
4396}
3d9434b5
JB
4397
4398/* Clear all entries from the symbol cache. */
4399
4400static void
4401ada_clear_symbol_cache (void)
4402{
ee01b665
JB
4403 struct ada_symbol_cache *sym_cache
4404 = ada_get_symbol_cache (current_program_space);
4405
4406 obstack_free (&sym_cache->cache_space, NULL);
4407 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4408}
4409
4410/* Search our cache for an entry matching NAME and NAMESPACE.
4411 Return it if found, or NULL otherwise. */
4412
4413static struct cache_entry **
4414find_entry (const char *name, domain_enum namespace)
4415{
ee01b665
JB
4416 struct ada_symbol_cache *sym_cache
4417 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4418 int h = msymbol_hash (name) % HASH_SIZE;
4419 struct cache_entry **e;
4420
ee01b665 4421 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5
JB
4422 {
4423 if (namespace == (*e)->namespace && strcmp (name, (*e)->name) == 0)
4424 return e;
4425 }
4426 return NULL;
4427}
4428
4429/* Search the symbol cache for an entry matching NAME and NAMESPACE.
4430 Return 1 if found, 0 otherwise.
4431
4432 If an entry was found and SYM is not NULL, set *SYM to the entry's
4433 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4434
96d887e8
PH
4435static int
4436lookup_cached_symbol (const char *name, domain_enum namespace,
f0c5f9b2 4437 struct symbol **sym, const struct block **block)
96d887e8 4438{
3d9434b5
JB
4439 struct cache_entry **e = find_entry (name, namespace);
4440
4441 if (e == NULL)
4442 return 0;
4443 if (sym != NULL)
4444 *sym = (*e)->sym;
4445 if (block != NULL)
4446 *block = (*e)->block;
4447 return 1;
96d887e8
PH
4448}
4449
3d9434b5
JB
4450/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
4451 in domain NAMESPACE, save this result in our symbol cache. */
4452
96d887e8
PH
4453static void
4454cache_symbol (const char *name, domain_enum namespace, struct symbol *sym,
270140bd 4455 const struct block *block)
96d887e8 4456{
ee01b665
JB
4457 struct ada_symbol_cache *sym_cache
4458 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4459 int h;
4460 char *copy;
4461 struct cache_entry *e;
4462
4463 /* If the symbol is a local symbol, then do not cache it, as a search
4464 for that symbol depends on the context. To determine whether
4465 the symbol is local or not, we check the block where we found it
4466 against the global and static blocks of its associated symtab. */
4467 if (sym
439247b6
DE
4468 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (sym->symtab),
4469 GLOBAL_BLOCK) != block
4470 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (sym->symtab),
4471 STATIC_BLOCK) != block)
3d9434b5
JB
4472 return;
4473
4474 h = msymbol_hash (name) % HASH_SIZE;
ee01b665
JB
4475 e = (struct cache_entry *) obstack_alloc (&sym_cache->cache_space,
4476 sizeof (*e));
4477 e->next = sym_cache->root[h];
4478 sym_cache->root[h] = e;
4479 e->name = copy = obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4480 strcpy (copy, name);
4481 e->sym = sym;
4482 e->namespace = namespace;
4483 e->block = block;
96d887e8 4484}
4c4b4cd2
PH
4485\f
4486 /* Symbol Lookup */
4487
c0431670
JB
4488/* Return nonzero if wild matching should be used when searching for
4489 all symbols matching LOOKUP_NAME.
4490
4491 LOOKUP_NAME is expected to be a symbol name after transformation
4492 for Ada lookups (see ada_name_for_lookup). */
4493
4494static int
4495should_use_wild_match (const char *lookup_name)
4496{
4497 return (strstr (lookup_name, "__") == NULL);
4498}
4499
4c4b4cd2
PH
4500/* Return the result of a standard (literal, C-like) lookup of NAME in
4501 given DOMAIN, visible from lexical block BLOCK. */
4502
4503static struct symbol *
4504standard_lookup (const char *name, const struct block *block,
4505 domain_enum domain)
4506{
acbd605d
MGD
4507 /* Initialize it just to avoid a GCC false warning. */
4508 struct symbol *sym = NULL;
4c4b4cd2 4509
2570f2b7 4510 if (lookup_cached_symbol (name, domain, &sym, NULL))
4c4b4cd2 4511 return sym;
2570f2b7
UW
4512 sym = lookup_symbol_in_language (name, block, domain, language_c, 0);
4513 cache_symbol (name, domain, sym, block_found);
4c4b4cd2
PH
4514 return sym;
4515}
4516
4517
4518/* Non-zero iff there is at least one non-function/non-enumeral symbol
4519 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4520 since they contend in overloading in the same way. */
4521static int
4522is_nonfunction (struct ada_symbol_info syms[], int n)
4523{
4524 int i;
4525
4526 for (i = 0; i < n; i += 1)
4527 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_FUNC
4528 && (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM
4529 || SYMBOL_CLASS (syms[i].sym) != LOC_CONST))
14f9c5c9
AS
4530 return 1;
4531
4532 return 0;
4533}
4534
4535/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4536 struct types. Otherwise, they may not. */
14f9c5c9
AS
4537
4538static int
d2e4a39e 4539equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4540{
d2e4a39e 4541 if (type0 == type1)
14f9c5c9 4542 return 1;
d2e4a39e 4543 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4544 || TYPE_CODE (type0) != TYPE_CODE (type1))
4545 return 0;
d2e4a39e 4546 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4547 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4548 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4549 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4550 return 1;
d2e4a39e 4551
14f9c5c9
AS
4552 return 0;
4553}
4554
4555/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4556 no more defined than that of SYM1. */
14f9c5c9
AS
4557
4558static int
d2e4a39e 4559lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4560{
4561 if (sym0 == sym1)
4562 return 1;
176620f1 4563 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4564 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4565 return 0;
4566
d2e4a39e 4567 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4568 {
4569 case LOC_UNDEF:
4570 return 1;
4571 case LOC_TYPEDEF:
4572 {
4c4b4cd2
PH
4573 struct type *type0 = SYMBOL_TYPE (sym0);
4574 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4575 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4576 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4577 int len0 = strlen (name0);
5b4ee69b 4578
4c4b4cd2
PH
4579 return
4580 TYPE_CODE (type0) == TYPE_CODE (type1)
4581 && (equiv_types (type0, type1)
4582 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
4583 && strncmp (name1 + len0, "___XV", 5) == 0));
14f9c5c9
AS
4584 }
4585 case LOC_CONST:
4586 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4587 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4588 default:
4589 return 0;
14f9c5c9
AS
4590 }
4591}
4592
4c4b4cd2
PH
4593/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct ada_symbol_info
4594 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4595
4596static void
76a01679
JB
4597add_defn_to_vec (struct obstack *obstackp,
4598 struct symbol *sym,
f0c5f9b2 4599 const struct block *block)
14f9c5c9
AS
4600{
4601 int i;
4c4b4cd2 4602 struct ada_symbol_info *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4603
529cad9c
PH
4604 /* Do not try to complete stub types, as the debugger is probably
4605 already scanning all symbols matching a certain name at the
4606 time when this function is called. Trying to replace the stub
4607 type by its associated full type will cause us to restart a scan
4608 which may lead to an infinite recursion. Instead, the client
4609 collecting the matching symbols will end up collecting several
4610 matches, with at least one of them complete. It can then filter
4611 out the stub ones if needed. */
4612
4c4b4cd2
PH
4613 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4614 {
4615 if (lesseq_defined_than (sym, prevDefns[i].sym))
4616 return;
4617 else if (lesseq_defined_than (prevDefns[i].sym, sym))
4618 {
4619 prevDefns[i].sym = sym;
4620 prevDefns[i].block = block;
4c4b4cd2 4621 return;
76a01679 4622 }
4c4b4cd2
PH
4623 }
4624
4625 {
4626 struct ada_symbol_info info;
4627
4628 info.sym = sym;
4629 info.block = block;
4c4b4cd2
PH
4630 obstack_grow (obstackp, &info, sizeof (struct ada_symbol_info));
4631 }
4632}
4633
4634/* Number of ada_symbol_info structures currently collected in
4635 current vector in *OBSTACKP. */
4636
76a01679
JB
4637static int
4638num_defns_collected (struct obstack *obstackp)
4c4b4cd2
PH
4639{
4640 return obstack_object_size (obstackp) / sizeof (struct ada_symbol_info);
4641}
4642
4643/* Vector of ada_symbol_info structures currently collected in current
4644 vector in *OBSTACKP. If FINISH, close off the vector and return
4645 its final address. */
4646
76a01679 4647static struct ada_symbol_info *
4c4b4cd2
PH
4648defns_collected (struct obstack *obstackp, int finish)
4649{
4650 if (finish)
4651 return obstack_finish (obstackp);
4652 else
4653 return (struct ada_symbol_info *) obstack_base (obstackp);
4654}
4655
7c7b6655
TT
4656/* Return a bound minimal symbol matching NAME according to Ada
4657 decoding rules. Returns an invalid symbol if there is no such
4658 minimal symbol. Names prefixed with "standard__" are handled
4659 specially: "standard__" is first stripped off, and only static and
4660 global symbols are searched. */
4c4b4cd2 4661
7c7b6655 4662struct bound_minimal_symbol
96d887e8 4663ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4664{
7c7b6655 4665 struct bound_minimal_symbol result;
4c4b4cd2 4666 struct objfile *objfile;
96d887e8 4667 struct minimal_symbol *msymbol;
dc4024cd 4668 const int wild_match_p = should_use_wild_match (name);
4c4b4cd2 4669
7c7b6655
TT
4670 memset (&result, 0, sizeof (result));
4671
c0431670
JB
4672 /* Special case: If the user specifies a symbol name inside package
4673 Standard, do a non-wild matching of the symbol name without
4674 the "standard__" prefix. This was primarily introduced in order
4675 to allow the user to specifically access the standard exceptions
4676 using, for instance, Standard.Constraint_Error when Constraint_Error
4677 is ambiguous (due to the user defining its own Constraint_Error
4678 entity inside its program). */
96d887e8 4679 if (strncmp (name, "standard__", sizeof ("standard__") - 1) == 0)
c0431670 4680 name += sizeof ("standard__") - 1;
4c4b4cd2 4681
96d887e8
PH
4682 ALL_MSYMBOLS (objfile, msymbol)
4683 {
efd66ac6 4684 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), name, wild_match_p)
96d887e8 4685 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
7c7b6655
TT
4686 {
4687 result.minsym = msymbol;
4688 result.objfile = objfile;
4689 break;
4690 }
96d887e8 4691 }
4c4b4cd2 4692
7c7b6655 4693 return result;
96d887e8 4694}
4c4b4cd2 4695
96d887e8
PH
4696/* For all subprograms that statically enclose the subprogram of the
4697 selected frame, add symbols matching identifier NAME in DOMAIN
4698 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4699 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4700 with a wildcard prefix. */
4c4b4cd2 4701
96d887e8
PH
4702static void
4703add_symbols_from_enclosing_procs (struct obstack *obstackp,
76a01679 4704 const char *name, domain_enum namespace,
48b78332 4705 int wild_match_p)
96d887e8 4706{
96d887e8 4707}
14f9c5c9 4708
96d887e8
PH
4709/* True if TYPE is definitely an artificial type supplied to a symbol
4710 for which no debugging information was given in the symbol file. */
14f9c5c9 4711
96d887e8
PH
4712static int
4713is_nondebugging_type (struct type *type)
4714{
0d5cff50 4715 const char *name = ada_type_name (type);
5b4ee69b 4716
96d887e8
PH
4717 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4718}
4c4b4cd2 4719
8f17729f
JB
4720/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4721 that are deemed "identical" for practical purposes.
4722
4723 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4724 types and that their number of enumerals is identical (in other
4725 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4726
4727static int
4728ada_identical_enum_types_p (struct type *type1, struct type *type2)
4729{
4730 int i;
4731
4732 /* The heuristic we use here is fairly conservative. We consider
4733 that 2 enumerate types are identical if they have the same
4734 number of enumerals and that all enumerals have the same
4735 underlying value and name. */
4736
4737 /* All enums in the type should have an identical underlying value. */
4738 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4739 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4740 return 0;
4741
4742 /* All enumerals should also have the same name (modulo any numerical
4743 suffix). */
4744 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4745 {
0d5cff50
DE
4746 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4747 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4748 int len_1 = strlen (name_1);
4749 int len_2 = strlen (name_2);
4750
4751 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4752 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4753 if (len_1 != len_2
4754 || strncmp (TYPE_FIELD_NAME (type1, i),
4755 TYPE_FIELD_NAME (type2, i),
4756 len_1) != 0)
4757 return 0;
4758 }
4759
4760 return 1;
4761}
4762
4763/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4764 that are deemed "identical" for practical purposes. Sometimes,
4765 enumerals are not strictly identical, but their types are so similar
4766 that they can be considered identical.
4767
4768 For instance, consider the following code:
4769
4770 type Color is (Black, Red, Green, Blue, White);
4771 type RGB_Color is new Color range Red .. Blue;
4772
4773 Type RGB_Color is a subrange of an implicit type which is a copy
4774 of type Color. If we call that implicit type RGB_ColorB ("B" is
4775 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4776 As a result, when an expression references any of the enumeral
4777 by name (Eg. "print green"), the expression is technically
4778 ambiguous and the user should be asked to disambiguate. But
4779 doing so would only hinder the user, since it wouldn't matter
4780 what choice he makes, the outcome would always be the same.
4781 So, for practical purposes, we consider them as the same. */
4782
4783static int
4784symbols_are_identical_enums (struct ada_symbol_info *syms, int nsyms)
4785{
4786 int i;
4787
4788 /* Before performing a thorough comparison check of each type,
4789 we perform a series of inexpensive checks. We expect that these
4790 checks will quickly fail in the vast majority of cases, and thus
4791 help prevent the unnecessary use of a more expensive comparison.
4792 Said comparison also expects us to make some of these checks
4793 (see ada_identical_enum_types_p). */
4794
4795 /* Quick check: All symbols should have an enum type. */
4796 for (i = 0; i < nsyms; i++)
4797 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM)
4798 return 0;
4799
4800 /* Quick check: They should all have the same value. */
4801 for (i = 1; i < nsyms; i++)
4802 if (SYMBOL_VALUE (syms[i].sym) != SYMBOL_VALUE (syms[0].sym))
4803 return 0;
4804
4805 /* Quick check: They should all have the same number of enumerals. */
4806 for (i = 1; i < nsyms; i++)
4807 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].sym))
4808 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].sym)))
4809 return 0;
4810
4811 /* All the sanity checks passed, so we might have a set of
4812 identical enumeration types. Perform a more complete
4813 comparison of the type of each symbol. */
4814 for (i = 1; i < nsyms; i++)
4815 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].sym),
4816 SYMBOL_TYPE (syms[0].sym)))
4817 return 0;
4818
4819 return 1;
4820}
4821
96d887e8
PH
4822/* Remove any non-debugging symbols in SYMS[0 .. NSYMS-1] that definitely
4823 duplicate other symbols in the list (The only case I know of where
4824 this happens is when object files containing stabs-in-ecoff are
4825 linked with files containing ordinary ecoff debugging symbols (or no
4826 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
4827 Returns the number of items in the modified list. */
4c4b4cd2 4828
96d887e8
PH
4829static int
4830remove_extra_symbols (struct ada_symbol_info *syms, int nsyms)
4831{
4832 int i, j;
4c4b4cd2 4833
8f17729f
JB
4834 /* We should never be called with less than 2 symbols, as there
4835 cannot be any extra symbol in that case. But it's easy to
4836 handle, since we have nothing to do in that case. */
4837 if (nsyms < 2)
4838 return nsyms;
4839
96d887e8
PH
4840 i = 0;
4841 while (i < nsyms)
4842 {
a35ddb44 4843 int remove_p = 0;
339c13b6
JB
4844
4845 /* If two symbols have the same name and one of them is a stub type,
4846 the get rid of the stub. */
4847
4848 if (TYPE_STUB (SYMBOL_TYPE (syms[i].sym))
4849 && SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL)
4850 {
4851 for (j = 0; j < nsyms; j++)
4852 {
4853 if (j != i
4854 && !TYPE_STUB (SYMBOL_TYPE (syms[j].sym))
4855 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4856 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
4857 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0)
a35ddb44 4858 remove_p = 1;
339c13b6
JB
4859 }
4860 }
4861
4862 /* Two symbols with the same name, same class and same address
4863 should be identical. */
4864
4865 else if (SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL
96d887e8
PH
4866 && SYMBOL_CLASS (syms[i].sym) == LOC_STATIC
4867 && is_nondebugging_type (SYMBOL_TYPE (syms[i].sym)))
4868 {
4869 for (j = 0; j < nsyms; j += 1)
4870 {
4871 if (i != j
4872 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4873 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
76a01679 4874 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0
96d887e8
PH
4875 && SYMBOL_CLASS (syms[i].sym) == SYMBOL_CLASS (syms[j].sym)
4876 && SYMBOL_VALUE_ADDRESS (syms[i].sym)
4877 == SYMBOL_VALUE_ADDRESS (syms[j].sym))
a35ddb44 4878 remove_p = 1;
4c4b4cd2 4879 }
4c4b4cd2 4880 }
339c13b6 4881
a35ddb44 4882 if (remove_p)
339c13b6
JB
4883 {
4884 for (j = i + 1; j < nsyms; j += 1)
4885 syms[j - 1] = syms[j];
4886 nsyms -= 1;
4887 }
4888
96d887e8 4889 i += 1;
14f9c5c9 4890 }
8f17729f
JB
4891
4892 /* If all the remaining symbols are identical enumerals, then
4893 just keep the first one and discard the rest.
4894
4895 Unlike what we did previously, we do not discard any entry
4896 unless they are ALL identical. This is because the symbol
4897 comparison is not a strict comparison, but rather a practical
4898 comparison. If all symbols are considered identical, then
4899 we can just go ahead and use the first one and discard the rest.
4900 But if we cannot reduce the list to a single element, we have
4901 to ask the user to disambiguate anyways. And if we have to
4902 present a multiple-choice menu, it's less confusing if the list
4903 isn't missing some choices that were identical and yet distinct. */
4904 if (symbols_are_identical_enums (syms, nsyms))
4905 nsyms = 1;
4906
96d887e8 4907 return nsyms;
14f9c5c9
AS
4908}
4909
96d887e8
PH
4910/* Given a type that corresponds to a renaming entity, use the type name
4911 to extract the scope (package name or function name, fully qualified,
4912 and following the GNAT encoding convention) where this renaming has been
4913 defined. The string returned needs to be deallocated after use. */
4c4b4cd2 4914
96d887e8
PH
4915static char *
4916xget_renaming_scope (struct type *renaming_type)
14f9c5c9 4917{
96d887e8 4918 /* The renaming types adhere to the following convention:
0963b4bd 4919 <scope>__<rename>___<XR extension>.
96d887e8
PH
4920 So, to extract the scope, we search for the "___XR" extension,
4921 and then backtrack until we find the first "__". */
76a01679 4922
96d887e8
PH
4923 const char *name = type_name_no_tag (renaming_type);
4924 char *suffix = strstr (name, "___XR");
4925 char *last;
4926 int scope_len;
4927 char *scope;
14f9c5c9 4928
96d887e8
PH
4929 /* Now, backtrack a bit until we find the first "__". Start looking
4930 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 4931
96d887e8
PH
4932 for (last = suffix - 3; last > name; last--)
4933 if (last[0] == '_' && last[1] == '_')
4934 break;
76a01679 4935
96d887e8 4936 /* Make a copy of scope and return it. */
14f9c5c9 4937
96d887e8
PH
4938 scope_len = last - name;
4939 scope = (char *) xmalloc ((scope_len + 1) * sizeof (char));
14f9c5c9 4940
96d887e8
PH
4941 strncpy (scope, name, scope_len);
4942 scope[scope_len] = '\0';
4c4b4cd2 4943
96d887e8 4944 return scope;
4c4b4cd2
PH
4945}
4946
96d887e8 4947/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 4948
96d887e8
PH
4949static int
4950is_package_name (const char *name)
4c4b4cd2 4951{
96d887e8
PH
4952 /* Here, We take advantage of the fact that no symbols are generated
4953 for packages, while symbols are generated for each function.
4954 So the condition for NAME represent a package becomes equivalent
4955 to NAME not existing in our list of symbols. There is only one
4956 small complication with library-level functions (see below). */
4c4b4cd2 4957
96d887e8 4958 char *fun_name;
76a01679 4959
96d887e8
PH
4960 /* If it is a function that has not been defined at library level,
4961 then we should be able to look it up in the symbols. */
4962 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
4963 return 0;
14f9c5c9 4964
96d887e8
PH
4965 /* Library-level function names start with "_ada_". See if function
4966 "_ada_" followed by NAME can be found. */
14f9c5c9 4967
96d887e8 4968 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 4969 functions names cannot contain "__" in them. */
96d887e8
PH
4970 if (strstr (name, "__") != NULL)
4971 return 0;
4c4b4cd2 4972
b435e160 4973 fun_name = xstrprintf ("_ada_%s", name);
14f9c5c9 4974
96d887e8
PH
4975 return (standard_lookup (fun_name, NULL, VAR_DOMAIN) == NULL);
4976}
14f9c5c9 4977
96d887e8 4978/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 4979 not visible from FUNCTION_NAME. */
14f9c5c9 4980
96d887e8 4981static int
0d5cff50 4982old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 4983{
aeb5907d 4984 char *scope;
1509e573 4985 struct cleanup *old_chain;
aeb5907d
JB
4986
4987 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
4988 return 0;
4989
4990 scope = xget_renaming_scope (SYMBOL_TYPE (sym));
1509e573 4991 old_chain = make_cleanup (xfree, scope);
14f9c5c9 4992
96d887e8
PH
4993 /* If the rename has been defined in a package, then it is visible. */
4994 if (is_package_name (scope))
1509e573
JB
4995 {
4996 do_cleanups (old_chain);
4997 return 0;
4998 }
14f9c5c9 4999
96d887e8
PH
5000 /* Check that the rename is in the current function scope by checking
5001 that its name starts with SCOPE. */
76a01679 5002
96d887e8
PH
5003 /* If the function name starts with "_ada_", it means that it is
5004 a library-level function. Strip this prefix before doing the
5005 comparison, as the encoding for the renaming does not contain
5006 this prefix. */
5007 if (strncmp (function_name, "_ada_", 5) == 0)
5008 function_name += 5;
f26caa11 5009
1509e573
JB
5010 {
5011 int is_invisible = strncmp (function_name, scope, strlen (scope)) != 0;
5012
5013 do_cleanups (old_chain);
5014 return is_invisible;
5015 }
f26caa11
PH
5016}
5017
aeb5907d
JB
5018/* Remove entries from SYMS that corresponds to a renaming entity that
5019 is not visible from the function associated with CURRENT_BLOCK or
5020 that is superfluous due to the presence of more specific renaming
5021 information. Places surviving symbols in the initial entries of
5022 SYMS and returns the number of surviving symbols.
96d887e8
PH
5023
5024 Rationale:
aeb5907d
JB
5025 First, in cases where an object renaming is implemented as a
5026 reference variable, GNAT may produce both the actual reference
5027 variable and the renaming encoding. In this case, we discard the
5028 latter.
5029
5030 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5031 entity. Unfortunately, STABS currently does not support the definition
5032 of types that are local to a given lexical block, so all renamings types
5033 are emitted at library level. As a consequence, if an application
5034 contains two renaming entities using the same name, and a user tries to
5035 print the value of one of these entities, the result of the ada symbol
5036 lookup will also contain the wrong renaming type.
f26caa11 5037
96d887e8
PH
5038 This function partially covers for this limitation by attempting to
5039 remove from the SYMS list renaming symbols that should be visible
5040 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5041 method with the current information available. The implementation
5042 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5043
5044 - When the user tries to print a rename in a function while there
5045 is another rename entity defined in a package: Normally, the
5046 rename in the function has precedence over the rename in the
5047 package, so the latter should be removed from the list. This is
5048 currently not the case.
5049
5050 - This function will incorrectly remove valid renames if
5051 the CURRENT_BLOCK corresponds to a function which symbol name
5052 has been changed by an "Export" pragma. As a consequence,
5053 the user will be unable to print such rename entities. */
4c4b4cd2 5054
14f9c5c9 5055static int
aeb5907d
JB
5056remove_irrelevant_renamings (struct ada_symbol_info *syms,
5057 int nsyms, const struct block *current_block)
4c4b4cd2
PH
5058{
5059 struct symbol *current_function;
0d5cff50 5060 const char *current_function_name;
4c4b4cd2 5061 int i;
aeb5907d
JB
5062 int is_new_style_renaming;
5063
5064 /* If there is both a renaming foo___XR... encoded as a variable and
5065 a simple variable foo in the same block, discard the latter.
0963b4bd 5066 First, zero out such symbols, then compress. */
aeb5907d
JB
5067 is_new_style_renaming = 0;
5068 for (i = 0; i < nsyms; i += 1)
5069 {
5070 struct symbol *sym = syms[i].sym;
270140bd 5071 const struct block *block = syms[i].block;
aeb5907d
JB
5072 const char *name;
5073 const char *suffix;
5074
5075 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5076 continue;
5077 name = SYMBOL_LINKAGE_NAME (sym);
5078 suffix = strstr (name, "___XR");
5079
5080 if (suffix != NULL)
5081 {
5082 int name_len = suffix - name;
5083 int j;
5b4ee69b 5084
aeb5907d
JB
5085 is_new_style_renaming = 1;
5086 for (j = 0; j < nsyms; j += 1)
5087 if (i != j && syms[j].sym != NULL
5088 && strncmp (name, SYMBOL_LINKAGE_NAME (syms[j].sym),
5089 name_len) == 0
5090 && block == syms[j].block)
5091 syms[j].sym = NULL;
5092 }
5093 }
5094 if (is_new_style_renaming)
5095 {
5096 int j, k;
5097
5098 for (j = k = 0; j < nsyms; j += 1)
5099 if (syms[j].sym != NULL)
5100 {
5101 syms[k] = syms[j];
5102 k += 1;
5103 }
5104 return k;
5105 }
4c4b4cd2
PH
5106
5107 /* Extract the function name associated to CURRENT_BLOCK.
5108 Abort if unable to do so. */
76a01679 5109
4c4b4cd2
PH
5110 if (current_block == NULL)
5111 return nsyms;
76a01679 5112
7f0df278 5113 current_function = block_linkage_function (current_block);
4c4b4cd2
PH
5114 if (current_function == NULL)
5115 return nsyms;
5116
5117 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5118 if (current_function_name == NULL)
5119 return nsyms;
5120
5121 /* Check each of the symbols, and remove it from the list if it is
5122 a type corresponding to a renaming that is out of the scope of
5123 the current block. */
5124
5125 i = 0;
5126 while (i < nsyms)
5127 {
aeb5907d
JB
5128 if (ada_parse_renaming (syms[i].sym, NULL, NULL, NULL)
5129 == ADA_OBJECT_RENAMING
5130 && old_renaming_is_invisible (syms[i].sym, current_function_name))
4c4b4cd2
PH
5131 {
5132 int j;
5b4ee69b 5133
aeb5907d 5134 for (j = i + 1; j < nsyms; j += 1)
76a01679 5135 syms[j - 1] = syms[j];
4c4b4cd2
PH
5136 nsyms -= 1;
5137 }
5138 else
5139 i += 1;
5140 }
5141
5142 return nsyms;
5143}
5144
339c13b6
JB
5145/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5146 whose name and domain match NAME and DOMAIN respectively.
5147 If no match was found, then extend the search to "enclosing"
5148 routines (in other words, if we're inside a nested function,
5149 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5150 If WILD_MATCH_P is nonzero, perform the naming matching in
5151 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5152
5153 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5154
5155static void
5156ada_add_local_symbols (struct obstack *obstackp, const char *name,
f0c5f9b2 5157 const struct block *block, domain_enum domain,
d0a8ab18 5158 int wild_match_p)
339c13b6
JB
5159{
5160 int block_depth = 0;
5161
5162 while (block != NULL)
5163 {
5164 block_depth += 1;
d0a8ab18
JB
5165 ada_add_block_symbols (obstackp, block, name, domain, NULL,
5166 wild_match_p);
339c13b6
JB
5167
5168 /* If we found a non-function match, assume that's the one. */
5169 if (is_nonfunction (defns_collected (obstackp, 0),
5170 num_defns_collected (obstackp)))
5171 return;
5172
5173 block = BLOCK_SUPERBLOCK (block);
5174 }
5175
5176 /* If no luck so far, try to find NAME as a local symbol in some lexically
5177 enclosing subprogram. */
5178 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
d0a8ab18 5179 add_symbols_from_enclosing_procs (obstackp, name, domain, wild_match_p);
339c13b6
JB
5180}
5181
ccefe4c4 5182/* An object of this type is used as the user_data argument when
40658b94 5183 calling the map_matching_symbols method. */
ccefe4c4 5184
40658b94 5185struct match_data
ccefe4c4 5186{
40658b94 5187 struct objfile *objfile;
ccefe4c4 5188 struct obstack *obstackp;
40658b94
PH
5189 struct symbol *arg_sym;
5190 int found_sym;
ccefe4c4
TT
5191};
5192
40658b94
PH
5193/* A callback for add_matching_symbols that adds SYM, found in BLOCK,
5194 to a list of symbols. DATA0 is a pointer to a struct match_data *
5195 containing the obstack that collects the symbol list, the file that SYM
5196 must come from, a flag indicating whether a non-argument symbol has
5197 been found in the current block, and the last argument symbol
5198 passed in SYM within the current block (if any). When SYM is null,
5199 marking the end of a block, the argument symbol is added if no
5200 other has been found. */
ccefe4c4 5201
40658b94
PH
5202static int
5203aux_add_nonlocal_symbols (struct block *block, struct symbol *sym, void *data0)
ccefe4c4 5204{
40658b94
PH
5205 struct match_data *data = (struct match_data *) data0;
5206
5207 if (sym == NULL)
5208 {
5209 if (!data->found_sym && data->arg_sym != NULL)
5210 add_defn_to_vec (data->obstackp,
5211 fixup_symbol_section (data->arg_sym, data->objfile),
5212 block);
5213 data->found_sym = 0;
5214 data->arg_sym = NULL;
5215 }
5216 else
5217 {
5218 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5219 return 0;
5220 else if (SYMBOL_IS_ARGUMENT (sym))
5221 data->arg_sym = sym;
5222 else
5223 {
5224 data->found_sym = 1;
5225 add_defn_to_vec (data->obstackp,
5226 fixup_symbol_section (sym, data->objfile),
5227 block);
5228 }
5229 }
5230 return 0;
5231}
5232
db230ce3
JB
5233/* Implements compare_names, but only applying the comparision using
5234 the given CASING. */
5b4ee69b 5235
40658b94 5236static int
db230ce3
JB
5237compare_names_with_case (const char *string1, const char *string2,
5238 enum case_sensitivity casing)
40658b94
PH
5239{
5240 while (*string1 != '\0' && *string2 != '\0')
5241 {
db230ce3
JB
5242 char c1, c2;
5243
40658b94
PH
5244 if (isspace (*string1) || isspace (*string2))
5245 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5246
5247 if (casing == case_sensitive_off)
5248 {
5249 c1 = tolower (*string1);
5250 c2 = tolower (*string2);
5251 }
5252 else
5253 {
5254 c1 = *string1;
5255 c2 = *string2;
5256 }
5257 if (c1 != c2)
40658b94 5258 break;
db230ce3 5259
40658b94
PH
5260 string1 += 1;
5261 string2 += 1;
5262 }
db230ce3 5263
40658b94
PH
5264 switch (*string1)
5265 {
5266 case '(':
5267 return strcmp_iw_ordered (string1, string2);
5268 case '_':
5269 if (*string2 == '\0')
5270 {
052874e8 5271 if (is_name_suffix (string1))
40658b94
PH
5272 return 0;
5273 else
1a1d5513 5274 return 1;
40658b94 5275 }
dbb8534f 5276 /* FALLTHROUGH */
40658b94
PH
5277 default:
5278 if (*string2 == '(')
5279 return strcmp_iw_ordered (string1, string2);
5280 else
db230ce3
JB
5281 {
5282 if (casing == case_sensitive_off)
5283 return tolower (*string1) - tolower (*string2);
5284 else
5285 return *string1 - *string2;
5286 }
40658b94 5287 }
ccefe4c4
TT
5288}
5289
db230ce3
JB
5290/* Compare STRING1 to STRING2, with results as for strcmp.
5291 Compatible with strcmp_iw_ordered in that...
5292
5293 strcmp_iw_ordered (STRING1, STRING2) <= 0
5294
5295 ... implies...
5296
5297 compare_names (STRING1, STRING2) <= 0
5298
5299 (they may differ as to what symbols compare equal). */
5300
5301static int
5302compare_names (const char *string1, const char *string2)
5303{
5304 int result;
5305
5306 /* Similar to what strcmp_iw_ordered does, we need to perform
5307 a case-insensitive comparison first, and only resort to
5308 a second, case-sensitive, comparison if the first one was
5309 not sufficient to differentiate the two strings. */
5310
5311 result = compare_names_with_case (string1, string2, case_sensitive_off);
5312 if (result == 0)
5313 result = compare_names_with_case (string1, string2, case_sensitive_on);
5314
5315 return result;
5316}
5317
339c13b6
JB
5318/* Add to OBSTACKP all non-local symbols whose name and domain match
5319 NAME and DOMAIN respectively. The search is performed on GLOBAL_BLOCK
5320 symbols if GLOBAL is non-zero, or on STATIC_BLOCK symbols otherwise. */
5321
5322static void
40658b94
PH
5323add_nonlocal_symbols (struct obstack *obstackp, const char *name,
5324 domain_enum domain, int global,
5325 int is_wild_match)
339c13b6
JB
5326{
5327 struct objfile *objfile;
40658b94 5328 struct match_data data;
339c13b6 5329
6475f2fe 5330 memset (&data, 0, sizeof data);
ccefe4c4 5331 data.obstackp = obstackp;
339c13b6 5332
ccefe4c4 5333 ALL_OBJFILES (objfile)
40658b94
PH
5334 {
5335 data.objfile = objfile;
5336
5337 if (is_wild_match)
4186eb54
KS
5338 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5339 aux_add_nonlocal_symbols, &data,
5340 wild_match, NULL);
40658b94 5341 else
4186eb54
KS
5342 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5343 aux_add_nonlocal_symbols, &data,
5344 full_match, compare_names);
40658b94
PH
5345 }
5346
5347 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5348 {
5349 ALL_OBJFILES (objfile)
5350 {
5351 char *name1 = alloca (strlen (name) + sizeof ("_ada_"));
5352 strcpy (name1, "_ada_");
5353 strcpy (name1 + sizeof ("_ada_") - 1, name);
5354 data.objfile = objfile;
ade7ed9e
DE
5355 objfile->sf->qf->map_matching_symbols (objfile, name1, domain,
5356 global,
0963b4bd
MS
5357 aux_add_nonlocal_symbols,
5358 &data,
40658b94
PH
5359 full_match, compare_names);
5360 }
5361 }
339c13b6
JB
5362}
5363
4eeaa230
DE
5364/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and, if full_search is
5365 non-zero, enclosing scope and in global scopes, returning the number of
5366 matches.
9f88c959 5367 Sets *RESULTS to point to a vector of (SYM,BLOCK) tuples,
4c4b4cd2 5368 indicating the symbols found and the blocks and symbol tables (if
4eeaa230
DE
5369 any) in which they were found. This vector is transient---good only to
5370 the next call of ada_lookup_symbol_list.
5371
5372 When full_search is non-zero, any non-function/non-enumeral
4c4b4cd2
PH
5373 symbol match within the nest of blocks whose innermost member is BLOCK0,
5374 is the one match returned (no other matches in that or
d9680e73 5375 enclosing blocks is returned). If there are any matches in or
4eeaa230
DE
5376 surrounding BLOCK0, then these alone are returned.
5377
9f88c959 5378 Names prefixed with "standard__" are handled specially: "standard__"
4c4b4cd2 5379 is first stripped off, and only static and global symbols are searched. */
14f9c5c9 5380
4eeaa230
DE
5381static int
5382ada_lookup_symbol_list_worker (const char *name0, const struct block *block0,
5383 domain_enum namespace,
5384 struct ada_symbol_info **results,
5385 int full_search)
14f9c5c9
AS
5386{
5387 struct symbol *sym;
f0c5f9b2 5388 const struct block *block;
4c4b4cd2 5389 const char *name;
82ccd55e 5390 const int wild_match_p = should_use_wild_match (name0);
14f9c5c9 5391 int cacheIfUnique;
4c4b4cd2 5392 int ndefns;
14f9c5c9 5393
4c4b4cd2
PH
5394 obstack_free (&symbol_list_obstack, NULL);
5395 obstack_init (&symbol_list_obstack);
14f9c5c9 5396
14f9c5c9
AS
5397 cacheIfUnique = 0;
5398
5399 /* Search specified block and its superiors. */
5400
4c4b4cd2 5401 name = name0;
f0c5f9b2 5402 block = block0;
339c13b6
JB
5403
5404 /* Special case: If the user specifies a symbol name inside package
5405 Standard, do a non-wild matching of the symbol name without
5406 the "standard__" prefix. This was primarily introduced in order
5407 to allow the user to specifically access the standard exceptions
5408 using, for instance, Standard.Constraint_Error when Constraint_Error
5409 is ambiguous (due to the user defining its own Constraint_Error
5410 entity inside its program). */
4c4b4cd2
PH
5411 if (strncmp (name0, "standard__", sizeof ("standard__") - 1) == 0)
5412 {
4c4b4cd2
PH
5413 block = NULL;
5414 name = name0 + sizeof ("standard__") - 1;
5415 }
5416
339c13b6 5417 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5418
4eeaa230
DE
5419 if (block != NULL)
5420 {
5421 if (full_search)
5422 {
5423 ada_add_local_symbols (&symbol_list_obstack, name, block,
5424 namespace, wild_match_p);
5425 }
5426 else
5427 {
5428 /* In the !full_search case we're are being called by
5429 ada_iterate_over_symbols, and we don't want to search
5430 superblocks. */
5431 ada_add_block_symbols (&symbol_list_obstack, block, name,
5432 namespace, NULL, wild_match_p);
5433 }
5434 if (num_defns_collected (&symbol_list_obstack) > 0 || !full_search)
5435 goto done;
5436 }
d2e4a39e 5437
339c13b6
JB
5438 /* No non-global symbols found. Check our cache to see if we have
5439 already performed this search before. If we have, then return
5440 the same result. */
5441
14f9c5c9 5442 cacheIfUnique = 1;
2570f2b7 5443 if (lookup_cached_symbol (name0, namespace, &sym, &block))
4c4b4cd2
PH
5444 {
5445 if (sym != NULL)
2570f2b7 5446 add_defn_to_vec (&symbol_list_obstack, sym, block);
4c4b4cd2
PH
5447 goto done;
5448 }
14f9c5c9 5449
339c13b6
JB
5450 /* Search symbols from all global blocks. */
5451
40658b94 5452 add_nonlocal_symbols (&symbol_list_obstack, name, namespace, 1,
82ccd55e 5453 wild_match_p);
d2e4a39e 5454
4c4b4cd2 5455 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5456 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5457
4c4b4cd2 5458 if (num_defns_collected (&symbol_list_obstack) == 0)
40658b94 5459 add_nonlocal_symbols (&symbol_list_obstack, name, namespace, 0,
82ccd55e 5460 wild_match_p);
14f9c5c9 5461
4c4b4cd2
PH
5462done:
5463 ndefns = num_defns_collected (&symbol_list_obstack);
5464 *results = defns_collected (&symbol_list_obstack, 1);
5465
5466 ndefns = remove_extra_symbols (*results, ndefns);
5467
2ad01556 5468 if (ndefns == 0 && full_search)
2570f2b7 5469 cache_symbol (name0, namespace, NULL, NULL);
14f9c5c9 5470
2ad01556 5471 if (ndefns == 1 && full_search && cacheIfUnique)
2570f2b7 5472 cache_symbol (name0, namespace, (*results)[0].sym, (*results)[0].block);
14f9c5c9 5473
aeb5907d 5474 ndefns = remove_irrelevant_renamings (*results, ndefns, block0);
14f9c5c9 5475
14f9c5c9
AS
5476 return ndefns;
5477}
5478
4eeaa230
DE
5479/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and enclosing scope and
5480 in global scopes, returning the number of matches, and setting *RESULTS
5481 to a vector of (SYM,BLOCK) tuples.
5482 See ada_lookup_symbol_list_worker for further details. */
5483
5484int
5485ada_lookup_symbol_list (const char *name0, const struct block *block0,
5486 domain_enum domain, struct ada_symbol_info **results)
5487{
5488 return ada_lookup_symbol_list_worker (name0, block0, domain, results, 1);
5489}
5490
5491/* Implementation of the la_iterate_over_symbols method. */
5492
5493static void
5494ada_iterate_over_symbols (const struct block *block,
5495 const char *name, domain_enum domain,
5496 symbol_found_callback_ftype *callback,
5497 void *data)
5498{
5499 int ndefs, i;
5500 struct ada_symbol_info *results;
5501
5502 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
5503 for (i = 0; i < ndefs; ++i)
5504 {
5505 if (! (*callback) (results[i].sym, data))
5506 break;
5507 }
5508}
5509
f8eba3c6
TT
5510/* If NAME is the name of an entity, return a string that should
5511 be used to look that entity up in Ada units. This string should
5512 be deallocated after use using xfree.
5513
5514 NAME can have any form that the "break" or "print" commands might
5515 recognize. In other words, it does not have to be the "natural"
5516 name, or the "encoded" name. */
5517
5518char *
5519ada_name_for_lookup (const char *name)
5520{
5521 char *canon;
5522 int nlen = strlen (name);
5523
5524 if (name[0] == '<' && name[nlen - 1] == '>')
5525 {
5526 canon = xmalloc (nlen - 1);
5527 memcpy (canon, name + 1, nlen - 2);
5528 canon[nlen - 2] = '\0';
5529 }
5530 else
5531 canon = xstrdup (ada_encode (ada_fold_name (name)));
5532 return canon;
5533}
5534
4e5c77fe
JB
5535/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5536 to 1, but choosing the first symbol found if there are multiple
5537 choices.
5538
5e2336be
JB
5539 The result is stored in *INFO, which must be non-NULL.
5540 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5541
5542void
5543ada_lookup_encoded_symbol (const char *name, const struct block *block,
5544 domain_enum namespace,
5e2336be 5545 struct ada_symbol_info *info)
14f9c5c9 5546{
4c4b4cd2 5547 struct ada_symbol_info *candidates;
14f9c5c9
AS
5548 int n_candidates;
5549
5e2336be
JB
5550 gdb_assert (info != NULL);
5551 memset (info, 0, sizeof (struct ada_symbol_info));
4e5c77fe 5552
4eeaa230 5553 n_candidates = ada_lookup_symbol_list (name, block, namespace, &candidates);
14f9c5c9 5554 if (n_candidates == 0)
4e5c77fe 5555 return;
4c4b4cd2 5556
5e2336be
JB
5557 *info = candidates[0];
5558 info->sym = fixup_symbol_section (info->sym, NULL);
4e5c77fe 5559}
aeb5907d
JB
5560
5561/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5562 scope and in global scopes, or NULL if none. NAME is folded and
5563 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
0963b4bd 5564 choosing the first symbol if there are multiple choices.
4e5c77fe
JB
5565 If IS_A_FIELD_OF_THIS is not NULL, it is set to zero. */
5566
aeb5907d
JB
5567struct symbol *
5568ada_lookup_symbol (const char *name, const struct block *block0,
21b556f4 5569 domain_enum namespace, int *is_a_field_of_this)
aeb5907d 5570{
5e2336be 5571 struct ada_symbol_info info;
4e5c77fe 5572
aeb5907d
JB
5573 if (is_a_field_of_this != NULL)
5574 *is_a_field_of_this = 0;
5575
4e5c77fe 5576 ada_lookup_encoded_symbol (ada_encode (ada_fold_name (name)),
5e2336be
JB
5577 block0, namespace, &info);
5578 return info.sym;
4c4b4cd2 5579}
14f9c5c9 5580
4c4b4cd2
PH
5581static struct symbol *
5582ada_lookup_symbol_nonlocal (const char *name,
76a01679 5583 const struct block *block,
21b556f4 5584 const domain_enum domain)
4c4b4cd2 5585{
94af9270 5586 return ada_lookup_symbol (name, block_static_block (block), domain, NULL);
14f9c5c9
AS
5587}
5588
5589
4c4b4cd2
PH
5590/* True iff STR is a possible encoded suffix of a normal Ada name
5591 that is to be ignored for matching purposes. Suffixes of parallel
5592 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5593 are given by any of the regular expressions:
4c4b4cd2 5594
babe1480
JB
5595 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5596 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5597 TKB [subprogram suffix for task bodies]
babe1480 5598 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5599 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5600
5601 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5602 match is performed. This sequence is used to differentiate homonyms,
5603 is an optional part of a valid name suffix. */
4c4b4cd2 5604
14f9c5c9 5605static int
d2e4a39e 5606is_name_suffix (const char *str)
14f9c5c9
AS
5607{
5608 int k;
4c4b4cd2
PH
5609 const char *matching;
5610 const int len = strlen (str);
5611
babe1480
JB
5612 /* Skip optional leading __[0-9]+. */
5613
4c4b4cd2
PH
5614 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5615 {
babe1480
JB
5616 str += 3;
5617 while (isdigit (str[0]))
5618 str += 1;
4c4b4cd2 5619 }
babe1480
JB
5620
5621 /* [.$][0-9]+ */
4c4b4cd2 5622
babe1480 5623 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5624 {
babe1480 5625 matching = str + 1;
4c4b4cd2
PH
5626 while (isdigit (matching[0]))
5627 matching += 1;
5628 if (matching[0] == '\0')
5629 return 1;
5630 }
5631
5632 /* ___[0-9]+ */
babe1480 5633
4c4b4cd2
PH
5634 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5635 {
5636 matching = str + 3;
5637 while (isdigit (matching[0]))
5638 matching += 1;
5639 if (matching[0] == '\0')
5640 return 1;
5641 }
5642
9ac7f98e
JB
5643 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5644
5645 if (strcmp (str, "TKB") == 0)
5646 return 1;
5647
529cad9c
PH
5648#if 0
5649 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5650 with a N at the end. Unfortunately, the compiler uses the same
5651 convention for other internal types it creates. So treating
529cad9c 5652 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5653 some regressions. For instance, consider the case of an enumerated
5654 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5655 name ends with N.
5656 Having a single character like this as a suffix carrying some
0963b4bd 5657 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5658 to be something like "_N" instead. In the meantime, do not do
5659 the following check. */
5660 /* Protected Object Subprograms */
5661 if (len == 1 && str [0] == 'N')
5662 return 1;
5663#endif
5664
5665 /* _E[0-9]+[bs]$ */
5666 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5667 {
5668 matching = str + 3;
5669 while (isdigit (matching[0]))
5670 matching += 1;
5671 if ((matching[0] == 'b' || matching[0] == 's')
5672 && matching [1] == '\0')
5673 return 1;
5674 }
5675
4c4b4cd2
PH
5676 /* ??? We should not modify STR directly, as we are doing below. This
5677 is fine in this case, but may become problematic later if we find
5678 that this alternative did not work, and want to try matching
5679 another one from the begining of STR. Since we modified it, we
5680 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5681 if (str[0] == 'X')
5682 {
5683 str += 1;
d2e4a39e 5684 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5685 {
5686 if (str[0] != 'n' && str[0] != 'b')
5687 return 0;
5688 str += 1;
5689 }
14f9c5c9 5690 }
babe1480 5691
14f9c5c9
AS
5692 if (str[0] == '\000')
5693 return 1;
babe1480 5694
d2e4a39e 5695 if (str[0] == '_')
14f9c5c9
AS
5696 {
5697 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5698 return 0;
d2e4a39e 5699 if (str[2] == '_')
4c4b4cd2 5700 {
61ee279c
PH
5701 if (strcmp (str + 3, "JM") == 0)
5702 return 1;
5703 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5704 the LJM suffix in favor of the JM one. But we will
5705 still accept LJM as a valid suffix for a reasonable
5706 amount of time, just to allow ourselves to debug programs
5707 compiled using an older version of GNAT. */
4c4b4cd2
PH
5708 if (strcmp (str + 3, "LJM") == 0)
5709 return 1;
5710 if (str[3] != 'X')
5711 return 0;
1265e4aa
JB
5712 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5713 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5714 return 1;
5715 if (str[4] == 'R' && str[5] != 'T')
5716 return 1;
5717 return 0;
5718 }
5719 if (!isdigit (str[2]))
5720 return 0;
5721 for (k = 3; str[k] != '\0'; k += 1)
5722 if (!isdigit (str[k]) && str[k] != '_')
5723 return 0;
14f9c5c9
AS
5724 return 1;
5725 }
4c4b4cd2 5726 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5727 {
4c4b4cd2
PH
5728 for (k = 2; str[k] != '\0'; k += 1)
5729 if (!isdigit (str[k]) && str[k] != '_')
5730 return 0;
14f9c5c9
AS
5731 return 1;
5732 }
5733 return 0;
5734}
d2e4a39e 5735
aeb5907d
JB
5736/* Return non-zero if the string starting at NAME and ending before
5737 NAME_END contains no capital letters. */
529cad9c
PH
5738
5739static int
5740is_valid_name_for_wild_match (const char *name0)
5741{
5742 const char *decoded_name = ada_decode (name0);
5743 int i;
5744
5823c3ef
JB
5745 /* If the decoded name starts with an angle bracket, it means that
5746 NAME0 does not follow the GNAT encoding format. It should then
5747 not be allowed as a possible wild match. */
5748 if (decoded_name[0] == '<')
5749 return 0;
5750
529cad9c
PH
5751 for (i=0; decoded_name[i] != '\0'; i++)
5752 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5753 return 0;
5754
5755 return 1;
5756}
5757
73589123
PH
5758/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
5759 that could start a simple name. Assumes that *NAMEP points into
5760 the string beginning at NAME0. */
4c4b4cd2 5761
14f9c5c9 5762static int
73589123 5763advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 5764{
73589123 5765 const char *name = *namep;
5b4ee69b 5766
5823c3ef 5767 while (1)
14f9c5c9 5768 {
aa27d0b3 5769 int t0, t1;
73589123
PH
5770
5771 t0 = *name;
5772 if (t0 == '_')
5773 {
5774 t1 = name[1];
5775 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
5776 {
5777 name += 1;
5778 if (name == name0 + 5 && strncmp (name0, "_ada", 4) == 0)
5779 break;
5780 else
5781 name += 1;
5782 }
aa27d0b3
JB
5783 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
5784 || name[2] == target0))
73589123
PH
5785 {
5786 name += 2;
5787 break;
5788 }
5789 else
5790 return 0;
5791 }
5792 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
5793 name += 1;
5794 else
5823c3ef 5795 return 0;
73589123
PH
5796 }
5797
5798 *namep = name;
5799 return 1;
5800}
5801
5802/* Return 0 iff NAME encodes a name of the form prefix.PATN. Ignores any
5803 informational suffixes of NAME (i.e., for which is_name_suffix is
5804 true). Assumes that PATN is a lower-cased Ada simple name. */
5805
5806static int
5807wild_match (const char *name, const char *patn)
5808{
22e048c9 5809 const char *p;
73589123
PH
5810 const char *name0 = name;
5811
5812 while (1)
5813 {
5814 const char *match = name;
5815
5816 if (*name == *patn)
5817 {
5818 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
5819 if (*p != *name)
5820 break;
5821 if (*p == '\0' && is_name_suffix (name))
5822 return match != name0 && !is_valid_name_for_wild_match (name0);
5823
5824 if (name[-1] == '_')
5825 name -= 1;
5826 }
5827 if (!advance_wild_match (&name, name0, *patn))
5828 return 1;
96d887e8 5829 }
96d887e8
PH
5830}
5831
40658b94
PH
5832/* Returns 0 iff symbol name SYM_NAME matches SEARCH_NAME, apart from
5833 informational suffix. */
5834
c4d840bd
PH
5835static int
5836full_match (const char *sym_name, const char *search_name)
5837{
40658b94 5838 return !match_name (sym_name, search_name, 0);
c4d840bd
PH
5839}
5840
5841
96d887e8
PH
5842/* Add symbols from BLOCK matching identifier NAME in DOMAIN to
5843 vector *defn_symbols, updating the list of symbols in OBSTACKP
0963b4bd 5844 (if necessary). If WILD, treat as NAME with a wildcard prefix.
4eeaa230 5845 OBJFILE is the section containing BLOCK. */
96d887e8
PH
5846
5847static void
5848ada_add_block_symbols (struct obstack *obstackp,
f0c5f9b2 5849 const struct block *block, const char *name,
96d887e8 5850 domain_enum domain, struct objfile *objfile,
2570f2b7 5851 int wild)
96d887e8 5852{
8157b174 5853 struct block_iterator iter;
96d887e8
PH
5854 int name_len = strlen (name);
5855 /* A matching argument symbol, if any. */
5856 struct symbol *arg_sym;
5857 /* Set true when we find a matching non-argument symbol. */
5858 int found_sym;
5859 struct symbol *sym;
5860
5861 arg_sym = NULL;
5862 found_sym = 0;
5863 if (wild)
5864 {
8157b174
TT
5865 for (sym = block_iter_match_first (block, name, wild_match, &iter);
5866 sym != NULL; sym = block_iter_match_next (name, wild_match, &iter))
76a01679 5867 {
4186eb54
KS
5868 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5869 SYMBOL_DOMAIN (sym), domain)
73589123 5870 && wild_match (SYMBOL_LINKAGE_NAME (sym), name) == 0)
76a01679 5871 {
2a2d4dc3
AS
5872 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5873 continue;
5874 else if (SYMBOL_IS_ARGUMENT (sym))
5875 arg_sym = sym;
5876 else
5877 {
76a01679
JB
5878 found_sym = 1;
5879 add_defn_to_vec (obstackp,
5880 fixup_symbol_section (sym, objfile),
2570f2b7 5881 block);
76a01679
JB
5882 }
5883 }
5884 }
96d887e8
PH
5885 }
5886 else
5887 {
8157b174
TT
5888 for (sym = block_iter_match_first (block, name, full_match, &iter);
5889 sym != NULL; sym = block_iter_match_next (name, full_match, &iter))
76a01679 5890 {
4186eb54
KS
5891 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5892 SYMBOL_DOMAIN (sym), domain))
76a01679 5893 {
c4d840bd
PH
5894 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5895 {
5896 if (SYMBOL_IS_ARGUMENT (sym))
5897 arg_sym = sym;
5898 else
2a2d4dc3 5899 {
c4d840bd
PH
5900 found_sym = 1;
5901 add_defn_to_vec (obstackp,
5902 fixup_symbol_section (sym, objfile),
5903 block);
2a2d4dc3 5904 }
c4d840bd 5905 }
76a01679
JB
5906 }
5907 }
96d887e8
PH
5908 }
5909
5910 if (!found_sym && arg_sym != NULL)
5911 {
76a01679
JB
5912 add_defn_to_vec (obstackp,
5913 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5914 block);
96d887e8
PH
5915 }
5916
5917 if (!wild)
5918 {
5919 arg_sym = NULL;
5920 found_sym = 0;
5921
5922 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 5923 {
4186eb54
KS
5924 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5925 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
5926 {
5927 int cmp;
5928
5929 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
5930 if (cmp == 0)
5931 {
5932 cmp = strncmp ("_ada_", SYMBOL_LINKAGE_NAME (sym), 5);
5933 if (cmp == 0)
5934 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
5935 name_len);
5936 }
5937
5938 if (cmp == 0
5939 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
5940 {
2a2d4dc3
AS
5941 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5942 {
5943 if (SYMBOL_IS_ARGUMENT (sym))
5944 arg_sym = sym;
5945 else
5946 {
5947 found_sym = 1;
5948 add_defn_to_vec (obstackp,
5949 fixup_symbol_section (sym, objfile),
5950 block);
5951 }
5952 }
76a01679
JB
5953 }
5954 }
76a01679 5955 }
96d887e8
PH
5956
5957 /* NOTE: This really shouldn't be needed for _ada_ symbols.
5958 They aren't parameters, right? */
5959 if (!found_sym && arg_sym != NULL)
5960 {
5961 add_defn_to_vec (obstackp,
76a01679 5962 fixup_symbol_section (arg_sym, objfile),
2570f2b7 5963 block);
96d887e8
PH
5964 }
5965 }
5966}
5967\f
41d27058
JB
5968
5969 /* Symbol Completion */
5970
5971/* If SYM_NAME is a completion candidate for TEXT, return this symbol
5972 name in a form that's appropriate for the completion. The result
5973 does not need to be deallocated, but is only good until the next call.
5974
5975 TEXT_LEN is equal to the length of TEXT.
e701b3c0 5976 Perform a wild match if WILD_MATCH_P is set.
6ea35997 5977 ENCODED_P should be set if TEXT represents the start of a symbol name
41d27058
JB
5978 in its encoded form. */
5979
5980static const char *
5981symbol_completion_match (const char *sym_name,
5982 const char *text, int text_len,
6ea35997 5983 int wild_match_p, int encoded_p)
41d27058 5984{
41d27058
JB
5985 const int verbatim_match = (text[0] == '<');
5986 int match = 0;
5987
5988 if (verbatim_match)
5989 {
5990 /* Strip the leading angle bracket. */
5991 text = text + 1;
5992 text_len--;
5993 }
5994
5995 /* First, test against the fully qualified name of the symbol. */
5996
5997 if (strncmp (sym_name, text, text_len) == 0)
5998 match = 1;
5999
6ea35997 6000 if (match && !encoded_p)
41d27058
JB
6001 {
6002 /* One needed check before declaring a positive match is to verify
6003 that iff we are doing a verbatim match, the decoded version
6004 of the symbol name starts with '<'. Otherwise, this symbol name
6005 is not a suitable completion. */
6006 const char *sym_name_copy = sym_name;
6007 int has_angle_bracket;
6008
6009 sym_name = ada_decode (sym_name);
6010 has_angle_bracket = (sym_name[0] == '<');
6011 match = (has_angle_bracket == verbatim_match);
6012 sym_name = sym_name_copy;
6013 }
6014
6015 if (match && !verbatim_match)
6016 {
6017 /* When doing non-verbatim match, another check that needs to
6018 be done is to verify that the potentially matching symbol name
6019 does not include capital letters, because the ada-mode would
6020 not be able to understand these symbol names without the
6021 angle bracket notation. */
6022 const char *tmp;
6023
6024 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6025 if (*tmp != '\0')
6026 match = 0;
6027 }
6028
6029 /* Second: Try wild matching... */
6030
e701b3c0 6031 if (!match && wild_match_p)
41d27058
JB
6032 {
6033 /* Since we are doing wild matching, this means that TEXT
6034 may represent an unqualified symbol name. We therefore must
6035 also compare TEXT against the unqualified name of the symbol. */
6036 sym_name = ada_unqualified_name (ada_decode (sym_name));
6037
6038 if (strncmp (sym_name, text, text_len) == 0)
6039 match = 1;
6040 }
6041
6042 /* Finally: If we found a mach, prepare the result to return. */
6043
6044 if (!match)
6045 return NULL;
6046
6047 if (verbatim_match)
6048 sym_name = add_angle_brackets (sym_name);
6049
6ea35997 6050 if (!encoded_p)
41d27058
JB
6051 sym_name = ada_decode (sym_name);
6052
6053 return sym_name;
6054}
6055
6056/* A companion function to ada_make_symbol_completion_list().
6057 Check if SYM_NAME represents a symbol which name would be suitable
6058 to complete TEXT (TEXT_LEN is the length of TEXT), in which case
6059 it is appended at the end of the given string vector SV.
6060
6061 ORIG_TEXT is the string original string from the user command
6062 that needs to be completed. WORD is the entire command on which
6063 completion should be performed. These two parameters are used to
6064 determine which part of the symbol name should be added to the
6065 completion vector.
c0af1706 6066 if WILD_MATCH_P is set, then wild matching is performed.
cb8e9b97 6067 ENCODED_P should be set if TEXT represents a symbol name in its
41d27058
JB
6068 encoded formed (in which case the completion should also be
6069 encoded). */
6070
6071static void
d6565258 6072symbol_completion_add (VEC(char_ptr) **sv,
41d27058
JB
6073 const char *sym_name,
6074 const char *text, int text_len,
6075 const char *orig_text, const char *word,
cb8e9b97 6076 int wild_match_p, int encoded_p)
41d27058
JB
6077{
6078 const char *match = symbol_completion_match (sym_name, text, text_len,
cb8e9b97 6079 wild_match_p, encoded_p);
41d27058
JB
6080 char *completion;
6081
6082 if (match == NULL)
6083 return;
6084
6085 /* We found a match, so add the appropriate completion to the given
6086 string vector. */
6087
6088 if (word == orig_text)
6089 {
6090 completion = xmalloc (strlen (match) + 5);
6091 strcpy (completion, match);
6092 }
6093 else if (word > orig_text)
6094 {
6095 /* Return some portion of sym_name. */
6096 completion = xmalloc (strlen (match) + 5);
6097 strcpy (completion, match + (word - orig_text));
6098 }
6099 else
6100 {
6101 /* Return some of ORIG_TEXT plus sym_name. */
6102 completion = xmalloc (strlen (match) + (orig_text - word) + 5);
6103 strncpy (completion, word, orig_text - word);
6104 completion[orig_text - word] = '\0';
6105 strcat (completion, match);
6106 }
6107
d6565258 6108 VEC_safe_push (char_ptr, *sv, completion);
41d27058
JB
6109}
6110
ccefe4c4 6111/* An object of this type is passed as the user_data argument to the
bb4142cf 6112 expand_symtabs_matching method. */
ccefe4c4
TT
6113struct add_partial_datum
6114{
6115 VEC(char_ptr) **completions;
6f937416 6116 const char *text;
ccefe4c4 6117 int text_len;
6f937416
PA
6118 const char *text0;
6119 const char *word;
ccefe4c4
TT
6120 int wild_match;
6121 int encoded;
6122};
6123
bb4142cf
DE
6124/* A callback for expand_symtabs_matching. */
6125
7b08b9eb 6126static int
bb4142cf 6127ada_complete_symbol_matcher (const char *name, void *user_data)
ccefe4c4
TT
6128{
6129 struct add_partial_datum *data = user_data;
7b08b9eb
JK
6130
6131 return symbol_completion_match (name, data->text, data->text_len,
6132 data->wild_match, data->encoded) != NULL;
ccefe4c4
TT
6133}
6134
49c4e619
TT
6135/* Return a list of possible symbol names completing TEXT0. WORD is
6136 the entire command on which completion is made. */
41d27058 6137
49c4e619 6138static VEC (char_ptr) *
6f937416
PA
6139ada_make_symbol_completion_list (const char *text0, const char *word,
6140 enum type_code code)
41d27058
JB
6141{
6142 char *text;
6143 int text_len;
b1ed564a
JB
6144 int wild_match_p;
6145 int encoded_p;
2ba95b9b 6146 VEC(char_ptr) *completions = VEC_alloc (char_ptr, 128);
41d27058
JB
6147 struct symbol *sym;
6148 struct symtab *s;
41d27058
JB
6149 struct minimal_symbol *msymbol;
6150 struct objfile *objfile;
3977b71f 6151 const struct block *b, *surrounding_static_block = 0;
41d27058 6152 int i;
8157b174 6153 struct block_iterator iter;
b8fea896 6154 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
41d27058 6155
2f68a895
TT
6156 gdb_assert (code == TYPE_CODE_UNDEF);
6157
41d27058
JB
6158 if (text0[0] == '<')
6159 {
6160 text = xstrdup (text0);
6161 make_cleanup (xfree, text);
6162 text_len = strlen (text);
b1ed564a
JB
6163 wild_match_p = 0;
6164 encoded_p = 1;
41d27058
JB
6165 }
6166 else
6167 {
6168 text = xstrdup (ada_encode (text0));
6169 make_cleanup (xfree, text);
6170 text_len = strlen (text);
6171 for (i = 0; i < text_len; i++)
6172 text[i] = tolower (text[i]);
6173
b1ed564a 6174 encoded_p = (strstr (text0, "__") != NULL);
41d27058
JB
6175 /* If the name contains a ".", then the user is entering a fully
6176 qualified entity name, and the match must not be done in wild
6177 mode. Similarly, if the user wants to complete what looks like
6178 an encoded name, the match must not be done in wild mode. */
b1ed564a 6179 wild_match_p = (strchr (text0, '.') == NULL && !encoded_p);
41d27058
JB
6180 }
6181
6182 /* First, look at the partial symtab symbols. */
41d27058 6183 {
ccefe4c4
TT
6184 struct add_partial_datum data;
6185
6186 data.completions = &completions;
6187 data.text = text;
6188 data.text_len = text_len;
6189 data.text0 = text0;
6190 data.word = word;
b1ed564a
JB
6191 data.wild_match = wild_match_p;
6192 data.encoded = encoded_p;
bb4142cf
DE
6193 expand_symtabs_matching (NULL, ada_complete_symbol_matcher, ALL_DOMAIN,
6194 &data);
41d27058
JB
6195 }
6196
6197 /* At this point scan through the misc symbol vectors and add each
6198 symbol you find to the list. Eventually we want to ignore
6199 anything that isn't a text symbol (everything else will be
6200 handled by the psymtab code above). */
6201
6202 ALL_MSYMBOLS (objfile, msymbol)
6203 {
6204 QUIT;
efd66ac6 6205 symbol_completion_add (&completions, MSYMBOL_LINKAGE_NAME (msymbol),
b1ed564a
JB
6206 text, text_len, text0, word, wild_match_p,
6207 encoded_p);
41d27058
JB
6208 }
6209
6210 /* Search upwards from currently selected frame (so that we can
6211 complete on local vars. */
6212
6213 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6214 {
6215 if (!BLOCK_SUPERBLOCK (b))
6216 surrounding_static_block = b; /* For elmin of dups */
6217
6218 ALL_BLOCK_SYMBOLS (b, iter, sym)
6219 {
d6565258 6220 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6221 text, text_len, text0, word,
b1ed564a 6222 wild_match_p, encoded_p);
41d27058
JB
6223 }
6224 }
6225
6226 /* Go through the symtabs and check the externs and statics for
2dd2cd1c
DE
6227 symbols which match.
6228 Non-primary symtabs share the block vector with their primary symtabs
6229 so we use ALL_PRIMARY_SYMTABS here instead of ALL_SYMTABS. */
41d27058 6230
2dd2cd1c 6231 ALL_PRIMARY_SYMTABS (objfile, s)
41d27058
JB
6232 {
6233 QUIT;
439247b6 6234 b = BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (s), GLOBAL_BLOCK);
41d27058
JB
6235 ALL_BLOCK_SYMBOLS (b, iter, sym)
6236 {
d6565258 6237 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6238 text, text_len, text0, word,
b1ed564a 6239 wild_match_p, encoded_p);
41d27058
JB
6240 }
6241 }
6242
2dd2cd1c 6243 ALL_PRIMARY_SYMTABS (objfile, s)
41d27058
JB
6244 {
6245 QUIT;
439247b6 6246 b = BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (s), STATIC_BLOCK);
41d27058
JB
6247 /* Don't do this block twice. */
6248 if (b == surrounding_static_block)
6249 continue;
6250 ALL_BLOCK_SYMBOLS (b, iter, sym)
6251 {
d6565258 6252 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6253 text, text_len, text0, word,
b1ed564a 6254 wild_match_p, encoded_p);
41d27058
JB
6255 }
6256 }
6257
b8fea896 6258 do_cleanups (old_chain);
49c4e619 6259 return completions;
41d27058
JB
6260}
6261
963a6417 6262 /* Field Access */
96d887e8 6263
73fb9985
JB
6264/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6265 for tagged types. */
6266
6267static int
6268ada_is_dispatch_table_ptr_type (struct type *type)
6269{
0d5cff50 6270 const char *name;
73fb9985
JB
6271
6272 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6273 return 0;
6274
6275 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6276 if (name == NULL)
6277 return 0;
6278
6279 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6280}
6281
ac4a2da4
JG
6282/* Return non-zero if TYPE is an interface tag. */
6283
6284static int
6285ada_is_interface_tag (struct type *type)
6286{
6287 const char *name = TYPE_NAME (type);
6288
6289 if (name == NULL)
6290 return 0;
6291
6292 return (strcmp (name, "ada__tags__interface_tag") == 0);
6293}
6294
963a6417
PH
6295/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6296 to be invisible to users. */
96d887e8 6297
963a6417
PH
6298int
6299ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6300{
963a6417
PH
6301 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6302 return 1;
ffde82bf 6303
73fb9985
JB
6304 /* Check the name of that field. */
6305 {
6306 const char *name = TYPE_FIELD_NAME (type, field_num);
6307
6308 /* Anonymous field names should not be printed.
6309 brobecker/2007-02-20: I don't think this can actually happen
6310 but we don't want to print the value of annonymous fields anyway. */
6311 if (name == NULL)
6312 return 1;
6313
ffde82bf
JB
6314 /* Normally, fields whose name start with an underscore ("_")
6315 are fields that have been internally generated by the compiler,
6316 and thus should not be printed. The "_parent" field is special,
6317 however: This is a field internally generated by the compiler
6318 for tagged types, and it contains the components inherited from
6319 the parent type. This field should not be printed as is, but
6320 should not be ignored either. */
73fb9985
JB
6321 if (name[0] == '_' && strncmp (name, "_parent", 7) != 0)
6322 return 1;
6323 }
6324
ac4a2da4
JG
6325 /* If this is the dispatch table of a tagged type or an interface tag,
6326 then ignore. */
73fb9985 6327 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6328 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6329 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6330 return 1;
6331
6332 /* Not a special field, so it should not be ignored. */
6333 return 0;
963a6417 6334}
96d887e8 6335
963a6417 6336/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6337 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6338
963a6417
PH
6339int
6340ada_is_tagged_type (struct type *type, int refok)
6341{
6342 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1, NULL) != NULL);
6343}
96d887e8 6344
963a6417 6345/* True iff TYPE represents the type of X'Tag */
96d887e8 6346
963a6417
PH
6347int
6348ada_is_tag_type (struct type *type)
6349{
6350 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6351 return 0;
6352 else
96d887e8 6353 {
963a6417 6354 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6355
963a6417
PH
6356 return (name != NULL
6357 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6358 }
96d887e8
PH
6359}
6360
963a6417 6361/* The type of the tag on VAL. */
76a01679 6362
963a6417
PH
6363struct type *
6364ada_tag_type (struct value *val)
96d887e8 6365{
df407dfe 6366 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0, NULL);
963a6417 6367}
96d887e8 6368
b50d69b5
JG
6369/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6370 retired at Ada 05). */
6371
6372static int
6373is_ada95_tag (struct value *tag)
6374{
6375 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6376}
6377
963a6417 6378/* The value of the tag on VAL. */
96d887e8 6379
963a6417
PH
6380struct value *
6381ada_value_tag (struct value *val)
6382{
03ee6b2e 6383 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6384}
6385
963a6417
PH
6386/* The value of the tag on the object of type TYPE whose contents are
6387 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6388 ADDRESS. */
96d887e8 6389
963a6417 6390static struct value *
10a2c479 6391value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6392 const gdb_byte *valaddr,
963a6417 6393 CORE_ADDR address)
96d887e8 6394{
b5385fc0 6395 int tag_byte_offset;
963a6417 6396 struct type *tag_type;
5b4ee69b 6397
963a6417 6398 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6399 NULL, NULL, NULL))
96d887e8 6400 {
fc1a4b47 6401 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6402 ? NULL
6403 : valaddr + tag_byte_offset);
963a6417 6404 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6405
963a6417 6406 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6407 }
963a6417
PH
6408 return NULL;
6409}
96d887e8 6410
963a6417
PH
6411static struct type *
6412type_from_tag (struct value *tag)
6413{
6414 const char *type_name = ada_tag_name (tag);
5b4ee69b 6415
963a6417
PH
6416 if (type_name != NULL)
6417 return ada_find_any_type (ada_encode (type_name));
6418 return NULL;
6419}
96d887e8 6420
b50d69b5
JG
6421/* Given a value OBJ of a tagged type, return a value of this
6422 type at the base address of the object. The base address, as
6423 defined in Ada.Tags, it is the address of the primary tag of
6424 the object, and therefore where the field values of its full
6425 view can be fetched. */
6426
6427struct value *
6428ada_tag_value_at_base_address (struct value *obj)
6429{
6430 volatile struct gdb_exception e;
6431 struct value *val;
6432 LONGEST offset_to_top = 0;
6433 struct type *ptr_type, *obj_type;
6434 struct value *tag;
6435 CORE_ADDR base_address;
6436
6437 obj_type = value_type (obj);
6438
6439 /* It is the responsability of the caller to deref pointers. */
6440
6441 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6442 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6443 return obj;
6444
6445 tag = ada_value_tag (obj);
6446 if (!tag)
6447 return obj;
6448
6449 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6450
6451 if (is_ada95_tag (tag))
6452 return obj;
6453
6454 ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
6455 ptr_type = lookup_pointer_type (ptr_type);
6456 val = value_cast (ptr_type, tag);
6457 if (!val)
6458 return obj;
6459
6460 /* It is perfectly possible that an exception be raised while
6461 trying to determine the base address, just like for the tag;
6462 see ada_tag_name for more details. We do not print the error
6463 message for the same reason. */
6464
6465 TRY_CATCH (e, RETURN_MASK_ERROR)
6466 {
6467 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6468 }
6469
6470 if (e.reason < 0)
6471 return obj;
6472
6473 /* If offset is null, nothing to do. */
6474
6475 if (offset_to_top == 0)
6476 return obj;
6477
6478 /* -1 is a special case in Ada.Tags; however, what should be done
6479 is not quite clear from the documentation. So do nothing for
6480 now. */
6481
6482 if (offset_to_top == -1)
6483 return obj;
6484
6485 base_address = value_address (obj) - offset_to_top;
6486 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6487
6488 /* Make sure that we have a proper tag at the new address.
6489 Otherwise, offset_to_top is bogus (which can happen when
6490 the object is not initialized yet). */
6491
6492 if (!tag)
6493 return obj;
6494
6495 obj_type = type_from_tag (tag);
6496
6497 if (!obj_type)
6498 return obj;
6499
6500 return value_from_contents_and_address (obj_type, NULL, base_address);
6501}
6502
1b611343
JB
6503/* Return the "ada__tags__type_specific_data" type. */
6504
6505static struct type *
6506ada_get_tsd_type (struct inferior *inf)
963a6417 6507{
1b611343 6508 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6509
1b611343
JB
6510 if (data->tsd_type == 0)
6511 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6512 return data->tsd_type;
6513}
529cad9c 6514
1b611343
JB
6515/* Return the TSD (type-specific data) associated to the given TAG.
6516 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6517
1b611343 6518 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6519
1b611343
JB
6520static struct value *
6521ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6522{
4c4b4cd2 6523 struct value *val;
1b611343 6524 struct type *type;
5b4ee69b 6525
1b611343
JB
6526 /* First option: The TSD is simply stored as a field of our TAG.
6527 Only older versions of GNAT would use this format, but we have
6528 to test it first, because there are no visible markers for
6529 the current approach except the absence of that field. */
529cad9c 6530
1b611343
JB
6531 val = ada_value_struct_elt (tag, "tsd", 1);
6532 if (val)
6533 return val;
e802dbe0 6534
1b611343
JB
6535 /* Try the second representation for the dispatch table (in which
6536 there is no explicit 'tsd' field in the referent of the tag pointer,
6537 and instead the tsd pointer is stored just before the dispatch
6538 table. */
e802dbe0 6539
1b611343
JB
6540 type = ada_get_tsd_type (current_inferior());
6541 if (type == NULL)
6542 return NULL;
6543 type = lookup_pointer_type (lookup_pointer_type (type));
6544 val = value_cast (type, tag);
6545 if (val == NULL)
6546 return NULL;
6547 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6548}
6549
1b611343
JB
6550/* Given the TSD of a tag (type-specific data), return a string
6551 containing the name of the associated type.
6552
6553 The returned value is good until the next call. May return NULL
6554 if we are unable to determine the tag name. */
6555
6556static char *
6557ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6558{
529cad9c
PH
6559 static char name[1024];
6560 char *p;
1b611343 6561 struct value *val;
529cad9c 6562
1b611343 6563 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6564 if (val == NULL)
1b611343 6565 return NULL;
4c4b4cd2
PH
6566 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6567 for (p = name; *p != '\0'; p += 1)
6568 if (isalpha (*p))
6569 *p = tolower (*p);
1b611343 6570 return name;
4c4b4cd2
PH
6571}
6572
6573/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6574 a C string.
6575
6576 Return NULL if the TAG is not an Ada tag, or if we were unable to
6577 determine the name of that tag. The result is good until the next
6578 call. */
4c4b4cd2
PH
6579
6580const char *
6581ada_tag_name (struct value *tag)
6582{
1b611343
JB
6583 volatile struct gdb_exception e;
6584 char *name = NULL;
5b4ee69b 6585
df407dfe 6586 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6587 return NULL;
1b611343
JB
6588
6589 /* It is perfectly possible that an exception be raised while trying
6590 to determine the TAG's name, even under normal circumstances:
6591 The associated variable may be uninitialized or corrupted, for
6592 instance. We do not let any exception propagate past this point.
6593 instead we return NULL.
6594
6595 We also do not print the error message either (which often is very
6596 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6597 the caller print a more meaningful message if necessary. */
6598 TRY_CATCH (e, RETURN_MASK_ERROR)
6599 {
6600 struct value *tsd = ada_get_tsd_from_tag (tag);
6601
6602 if (tsd != NULL)
6603 name = ada_tag_name_from_tsd (tsd);
6604 }
6605
6606 return name;
4c4b4cd2
PH
6607}
6608
6609/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6610
d2e4a39e 6611struct type *
ebf56fd3 6612ada_parent_type (struct type *type)
14f9c5c9
AS
6613{
6614 int i;
6615
61ee279c 6616 type = ada_check_typedef (type);
14f9c5c9
AS
6617
6618 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6619 return NULL;
6620
6621 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6622 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6623 {
6624 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6625
6626 /* If the _parent field is a pointer, then dereference it. */
6627 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6628 parent_type = TYPE_TARGET_TYPE (parent_type);
6629 /* If there is a parallel XVS type, get the actual base type. */
6630 parent_type = ada_get_base_type (parent_type);
6631
6632 return ada_check_typedef (parent_type);
6633 }
14f9c5c9
AS
6634
6635 return NULL;
6636}
6637
4c4b4cd2
PH
6638/* True iff field number FIELD_NUM of structure type TYPE contains the
6639 parent-type (inherited) fields of a derived type. Assumes TYPE is
6640 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6641
6642int
ebf56fd3 6643ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6644{
61ee279c 6645 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6646
4c4b4cd2
PH
6647 return (name != NULL
6648 && (strncmp (name, "PARENT", 6) == 0
6649 || strncmp (name, "_parent", 7) == 0));
14f9c5c9
AS
6650}
6651
4c4b4cd2 6652/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6653 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6654 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6655 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6656 structures. */
14f9c5c9
AS
6657
6658int
ebf56fd3 6659ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6660{
d2e4a39e 6661 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6662
d2e4a39e 6663 return (name != NULL
4c4b4cd2
PH
6664 && (strncmp (name, "PARENT", 6) == 0
6665 || strcmp (name, "REP") == 0
6666 || strncmp (name, "_parent", 7) == 0
6667 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6668}
6669
4c4b4cd2
PH
6670/* True iff field number FIELD_NUM of structure or union type TYPE
6671 is a variant wrapper. Assumes TYPE is a structure type with at least
6672 FIELD_NUM+1 fields. */
14f9c5c9
AS
6673
6674int
ebf56fd3 6675ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6676{
d2e4a39e 6677 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6678
14f9c5c9 6679 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6680 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6681 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6682 == TYPE_CODE_UNION)));
14f9c5c9
AS
6683}
6684
6685/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6686 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6687 returns the type of the controlling discriminant for the variant.
6688 May return NULL if the type could not be found. */
14f9c5c9 6689
d2e4a39e 6690struct type *
ebf56fd3 6691ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6692{
d2e4a39e 6693 char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6694
7c964f07 6695 return ada_lookup_struct_elt_type (outer_type, name, 1, 1, NULL);
14f9c5c9
AS
6696}
6697
4c4b4cd2 6698/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6699 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6700 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6701
6702int
ebf56fd3 6703ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6704{
d2e4a39e 6705 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6706
14f9c5c9
AS
6707 return (name != NULL && name[0] == 'O');
6708}
6709
6710/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6711 returns the name of the discriminant controlling the variant.
6712 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6713
d2e4a39e 6714char *
ebf56fd3 6715ada_variant_discrim_name (struct type *type0)
14f9c5c9 6716{
d2e4a39e 6717 static char *result = NULL;
14f9c5c9 6718 static size_t result_len = 0;
d2e4a39e
AS
6719 struct type *type;
6720 const char *name;
6721 const char *discrim_end;
6722 const char *discrim_start;
14f9c5c9
AS
6723
6724 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6725 type = TYPE_TARGET_TYPE (type0);
6726 else
6727 type = type0;
6728
6729 name = ada_type_name (type);
6730
6731 if (name == NULL || name[0] == '\000')
6732 return "";
6733
6734 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6735 discrim_end -= 1)
6736 {
4c4b4cd2
PH
6737 if (strncmp (discrim_end, "___XVN", 6) == 0)
6738 break;
14f9c5c9
AS
6739 }
6740 if (discrim_end == name)
6741 return "";
6742
d2e4a39e 6743 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6744 discrim_start -= 1)
6745 {
d2e4a39e 6746 if (discrim_start == name + 1)
4c4b4cd2 6747 return "";
76a01679 6748 if ((discrim_start > name + 3
4c4b4cd2
PH
6749 && strncmp (discrim_start - 3, "___", 3) == 0)
6750 || discrim_start[-1] == '.')
6751 break;
14f9c5c9
AS
6752 }
6753
6754 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6755 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6756 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6757 return result;
6758}
6759
4c4b4cd2
PH
6760/* Scan STR for a subtype-encoded number, beginning at position K.
6761 Put the position of the character just past the number scanned in
6762 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6763 Return 1 if there was a valid number at the given position, and 0
6764 otherwise. A "subtype-encoded" number consists of the absolute value
6765 in decimal, followed by the letter 'm' to indicate a negative number.
6766 Assumes 0m does not occur. */
14f9c5c9
AS
6767
6768int
d2e4a39e 6769ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6770{
6771 ULONGEST RU;
6772
d2e4a39e 6773 if (!isdigit (str[k]))
14f9c5c9
AS
6774 return 0;
6775
4c4b4cd2 6776 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6777 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6778 LONGEST. */
14f9c5c9
AS
6779 RU = 0;
6780 while (isdigit (str[k]))
6781 {
d2e4a39e 6782 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6783 k += 1;
6784 }
6785
d2e4a39e 6786 if (str[k] == 'm')
14f9c5c9
AS
6787 {
6788 if (R != NULL)
4c4b4cd2 6789 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6790 k += 1;
6791 }
6792 else if (R != NULL)
6793 *R = (LONGEST) RU;
6794
4c4b4cd2 6795 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6796 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6797 number representable as a LONGEST (although either would probably work
6798 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6799 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6800
6801 if (new_k != NULL)
6802 *new_k = k;
6803 return 1;
6804}
6805
4c4b4cd2
PH
6806/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6807 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6808 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6809
d2e4a39e 6810int
ebf56fd3 6811ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6812{
d2e4a39e 6813 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6814 int p;
6815
6816 p = 0;
6817 while (1)
6818 {
d2e4a39e 6819 switch (name[p])
4c4b4cd2
PH
6820 {
6821 case '\0':
6822 return 0;
6823 case 'S':
6824 {
6825 LONGEST W;
5b4ee69b 6826
4c4b4cd2
PH
6827 if (!ada_scan_number (name, p + 1, &W, &p))
6828 return 0;
6829 if (val == W)
6830 return 1;
6831 break;
6832 }
6833 case 'R':
6834 {
6835 LONGEST L, U;
5b4ee69b 6836
4c4b4cd2
PH
6837 if (!ada_scan_number (name, p + 1, &L, &p)
6838 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6839 return 0;
6840 if (val >= L && val <= U)
6841 return 1;
6842 break;
6843 }
6844 case 'O':
6845 return 1;
6846 default:
6847 return 0;
6848 }
6849 }
6850}
6851
0963b4bd 6852/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6853
6854/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6855 ARG_TYPE, extract and return the value of one of its (non-static)
6856 fields. FIELDNO says which field. Differs from value_primitive_field
6857 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6858
4c4b4cd2 6859static struct value *
d2e4a39e 6860ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 6861 struct type *arg_type)
14f9c5c9 6862{
14f9c5c9
AS
6863 struct type *type;
6864
61ee279c 6865 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
6866 type = TYPE_FIELD_TYPE (arg_type, fieldno);
6867
4c4b4cd2 6868 /* Handle packed fields. */
14f9c5c9
AS
6869
6870 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0)
6871 {
6872 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6873 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6874
0fd88904 6875 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
6876 offset + bit_pos / 8,
6877 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6878 }
6879 else
6880 return value_primitive_field (arg1, offset, fieldno, arg_type);
6881}
6882
52ce6436
PH
6883/* Find field with name NAME in object of type TYPE. If found,
6884 set the following for each argument that is non-null:
6885 - *FIELD_TYPE_P to the field's type;
6886 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6887 an object of that type;
6888 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6889 - *BIT_SIZE_P to its size in bits if the field is packed, and
6890 0 otherwise;
6891 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6892 fields up to but not including the desired field, or by the total
6893 number of fields if not found. A NULL value of NAME never
6894 matches; the function just counts visible fields in this case.
6895
0963b4bd 6896 Returns 1 if found, 0 otherwise. */
52ce6436 6897
4c4b4cd2 6898static int
0d5cff50 6899find_struct_field (const char *name, struct type *type, int offset,
76a01679 6900 struct type **field_type_p,
52ce6436
PH
6901 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
6902 int *index_p)
4c4b4cd2
PH
6903{
6904 int i;
6905
61ee279c 6906 type = ada_check_typedef (type);
76a01679 6907
52ce6436
PH
6908 if (field_type_p != NULL)
6909 *field_type_p = NULL;
6910 if (byte_offset_p != NULL)
d5d6fca5 6911 *byte_offset_p = 0;
52ce6436
PH
6912 if (bit_offset_p != NULL)
6913 *bit_offset_p = 0;
6914 if (bit_size_p != NULL)
6915 *bit_size_p = 0;
6916
6917 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
6918 {
6919 int bit_pos = TYPE_FIELD_BITPOS (type, i);
6920 int fld_offset = offset + bit_pos / 8;
0d5cff50 6921 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 6922
4c4b4cd2
PH
6923 if (t_field_name == NULL)
6924 continue;
6925
52ce6436 6926 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
6927 {
6928 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 6929
52ce6436
PH
6930 if (field_type_p != NULL)
6931 *field_type_p = TYPE_FIELD_TYPE (type, i);
6932 if (byte_offset_p != NULL)
6933 *byte_offset_p = fld_offset;
6934 if (bit_offset_p != NULL)
6935 *bit_offset_p = bit_pos % 8;
6936 if (bit_size_p != NULL)
6937 *bit_size_p = bit_size;
76a01679
JB
6938 return 1;
6939 }
4c4b4cd2
PH
6940 else if (ada_is_wrapper_field (type, i))
6941 {
52ce6436
PH
6942 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
6943 field_type_p, byte_offset_p, bit_offset_p,
6944 bit_size_p, index_p))
76a01679
JB
6945 return 1;
6946 }
4c4b4cd2
PH
6947 else if (ada_is_variant_part (type, i))
6948 {
52ce6436
PH
6949 /* PNH: Wait. Do we ever execute this section, or is ARG always of
6950 fixed type?? */
4c4b4cd2 6951 int j;
52ce6436
PH
6952 struct type *field_type
6953 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 6954
52ce6436 6955 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 6956 {
76a01679
JB
6957 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
6958 fld_offset
6959 + TYPE_FIELD_BITPOS (field_type, j) / 8,
6960 field_type_p, byte_offset_p,
52ce6436 6961 bit_offset_p, bit_size_p, index_p))
76a01679 6962 return 1;
4c4b4cd2
PH
6963 }
6964 }
52ce6436
PH
6965 else if (index_p != NULL)
6966 *index_p += 1;
4c4b4cd2
PH
6967 }
6968 return 0;
6969}
6970
0963b4bd 6971/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 6972
52ce6436
PH
6973static int
6974num_visible_fields (struct type *type)
6975{
6976 int n;
5b4ee69b 6977
52ce6436
PH
6978 n = 0;
6979 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
6980 return n;
6981}
14f9c5c9 6982
4c4b4cd2 6983/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
6984 and search in it assuming it has (class) type TYPE.
6985 If found, return value, else return NULL.
6986
4c4b4cd2 6987 Searches recursively through wrapper fields (e.g., '_parent'). */
14f9c5c9 6988
4c4b4cd2 6989static struct value *
d2e4a39e 6990ada_search_struct_field (char *name, struct value *arg, int offset,
4c4b4cd2 6991 struct type *type)
14f9c5c9
AS
6992{
6993 int i;
14f9c5c9 6994
5b4ee69b 6995 type = ada_check_typedef (type);
52ce6436 6996 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 6997 {
0d5cff50 6998 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
6999
7000 if (t_field_name == NULL)
4c4b4cd2 7001 continue;
14f9c5c9
AS
7002
7003 else if (field_name_match (t_field_name, name))
4c4b4cd2 7004 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7005
7006 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7007 {
0963b4bd 7008 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7009 ada_search_struct_field (name, arg,
7010 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7011 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7012
4c4b4cd2
PH
7013 if (v != NULL)
7014 return v;
7015 }
14f9c5c9
AS
7016
7017 else if (ada_is_variant_part (type, i))
4c4b4cd2 7018 {
0963b4bd 7019 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7020 int j;
5b4ee69b
MS
7021 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7022 i));
4c4b4cd2
PH
7023 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7024
52ce6436 7025 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7026 {
0963b4bd
MS
7027 struct value *v = ada_search_struct_field /* Force line
7028 break. */
06d5cf63
JB
7029 (name, arg,
7030 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7031 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7032
4c4b4cd2
PH
7033 if (v != NULL)
7034 return v;
7035 }
7036 }
14f9c5c9
AS
7037 }
7038 return NULL;
7039}
d2e4a39e 7040
52ce6436
PH
7041static struct value *ada_index_struct_field_1 (int *, struct value *,
7042 int, struct type *);
7043
7044
7045/* Return field #INDEX in ARG, where the index is that returned by
7046 * find_struct_field through its INDEX_P argument. Adjust the address
7047 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7048 * If found, return value, else return NULL. */
52ce6436
PH
7049
7050static struct value *
7051ada_index_struct_field (int index, struct value *arg, int offset,
7052 struct type *type)
7053{
7054 return ada_index_struct_field_1 (&index, arg, offset, type);
7055}
7056
7057
7058/* Auxiliary function for ada_index_struct_field. Like
7059 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7060 * *INDEX_P. */
52ce6436
PH
7061
7062static struct value *
7063ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7064 struct type *type)
7065{
7066 int i;
7067 type = ada_check_typedef (type);
7068
7069 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7070 {
7071 if (TYPE_FIELD_NAME (type, i) == NULL)
7072 continue;
7073 else if (ada_is_wrapper_field (type, i))
7074 {
0963b4bd 7075 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7076 ada_index_struct_field_1 (index_p, arg,
7077 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7078 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7079
52ce6436
PH
7080 if (v != NULL)
7081 return v;
7082 }
7083
7084 else if (ada_is_variant_part (type, i))
7085 {
7086 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7087 find_struct_field. */
52ce6436
PH
7088 error (_("Cannot assign this kind of variant record"));
7089 }
7090 else if (*index_p == 0)
7091 return ada_value_primitive_field (arg, offset, i, type);
7092 else
7093 *index_p -= 1;
7094 }
7095 return NULL;
7096}
7097
4c4b4cd2
PH
7098/* Given ARG, a value of type (pointer or reference to a)*
7099 structure/union, extract the component named NAME from the ultimate
7100 target structure/union and return it as a value with its
f5938064 7101 appropriate type.
14f9c5c9 7102
4c4b4cd2
PH
7103 The routine searches for NAME among all members of the structure itself
7104 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7105 (e.g., '_parent').
7106
03ee6b2e
PH
7107 If NO_ERR, then simply return NULL in case of error, rather than
7108 calling error. */
14f9c5c9 7109
d2e4a39e 7110struct value *
03ee6b2e 7111ada_value_struct_elt (struct value *arg, char *name, int no_err)
14f9c5c9 7112{
4c4b4cd2 7113 struct type *t, *t1;
d2e4a39e 7114 struct value *v;
14f9c5c9 7115
4c4b4cd2 7116 v = NULL;
df407dfe 7117 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7118 if (TYPE_CODE (t) == TYPE_CODE_REF)
7119 {
7120 t1 = TYPE_TARGET_TYPE (t);
7121 if (t1 == NULL)
03ee6b2e 7122 goto BadValue;
61ee279c 7123 t1 = ada_check_typedef (t1);
4c4b4cd2 7124 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7125 {
994b9211 7126 arg = coerce_ref (arg);
76a01679
JB
7127 t = t1;
7128 }
4c4b4cd2 7129 }
14f9c5c9 7130
4c4b4cd2
PH
7131 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7132 {
7133 t1 = TYPE_TARGET_TYPE (t);
7134 if (t1 == NULL)
03ee6b2e 7135 goto BadValue;
61ee279c 7136 t1 = ada_check_typedef (t1);
4c4b4cd2 7137 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7138 {
7139 arg = value_ind (arg);
7140 t = t1;
7141 }
4c4b4cd2 7142 else
76a01679 7143 break;
4c4b4cd2 7144 }
14f9c5c9 7145
4c4b4cd2 7146 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7147 goto BadValue;
14f9c5c9 7148
4c4b4cd2
PH
7149 if (t1 == t)
7150 v = ada_search_struct_field (name, arg, 0, t);
7151 else
7152 {
7153 int bit_offset, bit_size, byte_offset;
7154 struct type *field_type;
7155 CORE_ADDR address;
7156
76a01679 7157 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7158 address = value_address (ada_value_ind (arg));
4c4b4cd2 7159 else
b50d69b5 7160 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7161
1ed6ede0 7162 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL, address, NULL, 1);
76a01679
JB
7163 if (find_struct_field (name, t1, 0,
7164 &field_type, &byte_offset, &bit_offset,
52ce6436 7165 &bit_size, NULL))
76a01679
JB
7166 {
7167 if (bit_size != 0)
7168 {
714e53ab
PH
7169 if (TYPE_CODE (t) == TYPE_CODE_REF)
7170 arg = ada_coerce_ref (arg);
7171 else
7172 arg = ada_value_ind (arg);
76a01679
JB
7173 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7174 bit_offset, bit_size,
7175 field_type);
7176 }
7177 else
f5938064 7178 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7179 }
7180 }
7181
03ee6b2e
PH
7182 if (v != NULL || no_err)
7183 return v;
7184 else
323e0a4a 7185 error (_("There is no member named %s."), name);
14f9c5c9 7186
03ee6b2e
PH
7187 BadValue:
7188 if (no_err)
7189 return NULL;
7190 else
0963b4bd
MS
7191 error (_("Attempt to extract a component of "
7192 "a value that is not a record."));
14f9c5c9
AS
7193}
7194
7195/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7196 If DISPP is non-null, add its byte displacement from the beginning of a
7197 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7198 work for packed fields).
7199
7200 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7201 followed by "___".
14f9c5c9 7202
0963b4bd 7203 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7204 be a (pointer or reference)+ to a struct or union, and the
7205 ultimate target type will be searched.
14f9c5c9
AS
7206
7207 Looks recursively into variant clauses and parent types.
7208
4c4b4cd2
PH
7209 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7210 TYPE is not a type of the right kind. */
14f9c5c9 7211
4c4b4cd2 7212static struct type *
76a01679
JB
7213ada_lookup_struct_elt_type (struct type *type, char *name, int refok,
7214 int noerr, int *dispp)
14f9c5c9
AS
7215{
7216 int i;
7217
7218 if (name == NULL)
7219 goto BadName;
7220
76a01679 7221 if (refok && type != NULL)
4c4b4cd2
PH
7222 while (1)
7223 {
61ee279c 7224 type = ada_check_typedef (type);
76a01679
JB
7225 if (TYPE_CODE (type) != TYPE_CODE_PTR
7226 && TYPE_CODE (type) != TYPE_CODE_REF)
7227 break;
7228 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7229 }
14f9c5c9 7230
76a01679 7231 if (type == NULL
1265e4aa
JB
7232 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7233 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7234 {
4c4b4cd2 7235 if (noerr)
76a01679 7236 return NULL;
4c4b4cd2 7237 else
76a01679
JB
7238 {
7239 target_terminal_ours ();
7240 gdb_flush (gdb_stdout);
323e0a4a
AC
7241 if (type == NULL)
7242 error (_("Type (null) is not a structure or union type"));
7243 else
7244 {
7245 /* XXX: type_sprint */
7246 fprintf_unfiltered (gdb_stderr, _("Type "));
7247 type_print (type, "", gdb_stderr, -1);
7248 error (_(" is not a structure or union type"));
7249 }
76a01679 7250 }
14f9c5c9
AS
7251 }
7252
7253 type = to_static_fixed_type (type);
7254
7255 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7256 {
0d5cff50 7257 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7258 struct type *t;
7259 int disp;
d2e4a39e 7260
14f9c5c9 7261 if (t_field_name == NULL)
4c4b4cd2 7262 continue;
14f9c5c9
AS
7263
7264 else if (field_name_match (t_field_name, name))
4c4b4cd2
PH
7265 {
7266 if (dispp != NULL)
7267 *dispp += TYPE_FIELD_BITPOS (type, i) / 8;
61ee279c 7268 return ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7269 }
14f9c5c9
AS
7270
7271 else if (ada_is_wrapper_field (type, i))
4c4b4cd2
PH
7272 {
7273 disp = 0;
7274 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
7275 0, 1, &disp);
7276 if (t != NULL)
7277 {
7278 if (dispp != NULL)
7279 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7280 return t;
7281 }
7282 }
14f9c5c9
AS
7283
7284 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7285 {
7286 int j;
5b4ee69b
MS
7287 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7288 i));
4c4b4cd2
PH
7289
7290 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7291 {
b1f33ddd
JB
7292 /* FIXME pnh 2008/01/26: We check for a field that is
7293 NOT wrapped in a struct, since the compiler sometimes
7294 generates these for unchecked variant types. Revisit
0963b4bd 7295 if the compiler changes this practice. */
0d5cff50 7296 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
4c4b4cd2 7297 disp = 0;
b1f33ddd
JB
7298 if (v_field_name != NULL
7299 && field_name_match (v_field_name, name))
7300 t = ada_check_typedef (TYPE_FIELD_TYPE (field_type, j));
7301 else
0963b4bd
MS
7302 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7303 j),
b1f33ddd
JB
7304 name, 0, 1, &disp);
7305
4c4b4cd2
PH
7306 if (t != NULL)
7307 {
7308 if (dispp != NULL)
7309 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7310 return t;
7311 }
7312 }
7313 }
14f9c5c9
AS
7314
7315 }
7316
7317BadName:
d2e4a39e 7318 if (!noerr)
14f9c5c9
AS
7319 {
7320 target_terminal_ours ();
7321 gdb_flush (gdb_stdout);
323e0a4a
AC
7322 if (name == NULL)
7323 {
7324 /* XXX: type_sprint */
7325 fprintf_unfiltered (gdb_stderr, _("Type "));
7326 type_print (type, "", gdb_stderr, -1);
7327 error (_(" has no component named <null>"));
7328 }
7329 else
7330 {
7331 /* XXX: type_sprint */
7332 fprintf_unfiltered (gdb_stderr, _("Type "));
7333 type_print (type, "", gdb_stderr, -1);
7334 error (_(" has no component named %s"), name);
7335 }
14f9c5c9
AS
7336 }
7337
7338 return NULL;
7339}
7340
b1f33ddd
JB
7341/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7342 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7343 represents an unchecked union (that is, the variant part of a
0963b4bd 7344 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7345
7346static int
7347is_unchecked_variant (struct type *var_type, struct type *outer_type)
7348{
7349 char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7350
b1f33ddd
JB
7351 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1, NULL)
7352 == NULL);
7353}
7354
7355
14f9c5c9
AS
7356/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7357 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7358 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7359 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7360
d2e4a39e 7361int
ebf56fd3 7362ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7363 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7364{
7365 int others_clause;
7366 int i;
d2e4a39e 7367 char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7368 struct value *outer;
7369 struct value *discrim;
14f9c5c9
AS
7370 LONGEST discrim_val;
7371
012370f6
TT
7372 /* Using plain value_from_contents_and_address here causes problems
7373 because we will end up trying to resolve a type that is currently
7374 being constructed. */
7375 outer = value_from_contents_and_address_unresolved (outer_type,
7376 outer_valaddr, 0);
0c281816
JB
7377 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7378 if (discrim == NULL)
14f9c5c9 7379 return -1;
0c281816 7380 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7381
7382 others_clause = -1;
7383 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7384 {
7385 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7386 others_clause = i;
14f9c5c9 7387 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7388 return i;
14f9c5c9
AS
7389 }
7390
7391 return others_clause;
7392}
d2e4a39e 7393\f
14f9c5c9
AS
7394
7395
4c4b4cd2 7396 /* Dynamic-Sized Records */
14f9c5c9
AS
7397
7398/* Strategy: The type ostensibly attached to a value with dynamic size
7399 (i.e., a size that is not statically recorded in the debugging
7400 data) does not accurately reflect the size or layout of the value.
7401 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7402 conventional types that are constructed on the fly. */
14f9c5c9
AS
7403
7404/* There is a subtle and tricky problem here. In general, we cannot
7405 determine the size of dynamic records without its data. However,
7406 the 'struct value' data structure, which GDB uses to represent
7407 quantities in the inferior process (the target), requires the size
7408 of the type at the time of its allocation in order to reserve space
7409 for GDB's internal copy of the data. That's why the
7410 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7411 rather than struct value*s.
14f9c5c9
AS
7412
7413 However, GDB's internal history variables ($1, $2, etc.) are
7414 struct value*s containing internal copies of the data that are not, in
7415 general, the same as the data at their corresponding addresses in
7416 the target. Fortunately, the types we give to these values are all
7417 conventional, fixed-size types (as per the strategy described
7418 above), so that we don't usually have to perform the
7419 'to_fixed_xxx_type' conversions to look at their values.
7420 Unfortunately, there is one exception: if one of the internal
7421 history variables is an array whose elements are unconstrained
7422 records, then we will need to create distinct fixed types for each
7423 element selected. */
7424
7425/* The upshot of all of this is that many routines take a (type, host
7426 address, target address) triple as arguments to represent a value.
7427 The host address, if non-null, is supposed to contain an internal
7428 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7429 target at the target address. */
14f9c5c9
AS
7430
7431/* Assuming that VAL0 represents a pointer value, the result of
7432 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7433 dynamic-sized types. */
14f9c5c9 7434
d2e4a39e
AS
7435struct value *
7436ada_value_ind (struct value *val0)
14f9c5c9 7437{
c48db5ca 7438 struct value *val = value_ind (val0);
5b4ee69b 7439
b50d69b5
JG
7440 if (ada_is_tagged_type (value_type (val), 0))
7441 val = ada_tag_value_at_base_address (val);
7442
4c4b4cd2 7443 return ada_to_fixed_value (val);
14f9c5c9
AS
7444}
7445
7446/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7447 qualifiers on VAL0. */
7448
d2e4a39e
AS
7449static struct value *
7450ada_coerce_ref (struct value *val0)
7451{
df407dfe 7452 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7453 {
7454 struct value *val = val0;
5b4ee69b 7455
994b9211 7456 val = coerce_ref (val);
b50d69b5
JG
7457
7458 if (ada_is_tagged_type (value_type (val), 0))
7459 val = ada_tag_value_at_base_address (val);
7460
4c4b4cd2 7461 return ada_to_fixed_value (val);
d2e4a39e
AS
7462 }
7463 else
14f9c5c9
AS
7464 return val0;
7465}
7466
7467/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7468 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7469
7470static unsigned int
ebf56fd3 7471align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7472{
7473 return (off + alignment - 1) & ~(alignment - 1);
7474}
7475
4c4b4cd2 7476/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7477
7478static unsigned int
ebf56fd3 7479field_alignment (struct type *type, int f)
14f9c5c9 7480{
d2e4a39e 7481 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7482 int len;
14f9c5c9
AS
7483 int align_offset;
7484
64a1bf19
JB
7485 /* The field name should never be null, unless the debugging information
7486 is somehow malformed. In this case, we assume the field does not
7487 require any alignment. */
7488 if (name == NULL)
7489 return 1;
7490
7491 len = strlen (name);
7492
4c4b4cd2
PH
7493 if (!isdigit (name[len - 1]))
7494 return 1;
14f9c5c9 7495
d2e4a39e 7496 if (isdigit (name[len - 2]))
14f9c5c9
AS
7497 align_offset = len - 2;
7498 else
7499 align_offset = len - 1;
7500
4c4b4cd2 7501 if (align_offset < 7 || strncmp ("___XV", name + align_offset - 6, 5) != 0)
14f9c5c9
AS
7502 return TARGET_CHAR_BIT;
7503
4c4b4cd2
PH
7504 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7505}
7506
852dff6c 7507/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7508
852dff6c
JB
7509static struct symbol *
7510ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7511{
7512 struct symbol *sym;
7513
7514 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7515 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7516 return sym;
7517
4186eb54
KS
7518 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7519 return sym;
14f9c5c9
AS
7520}
7521
dddfab26
UW
7522/* Find a type named NAME. Ignores ambiguity. This routine will look
7523 solely for types defined by debug info, it will not search the GDB
7524 primitive types. */
4c4b4cd2 7525
852dff6c 7526static struct type *
ebf56fd3 7527ada_find_any_type (const char *name)
14f9c5c9 7528{
852dff6c 7529 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7530
14f9c5c9 7531 if (sym != NULL)
dddfab26 7532 return SYMBOL_TYPE (sym);
14f9c5c9 7533
dddfab26 7534 return NULL;
14f9c5c9
AS
7535}
7536
739593e0
JB
7537/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7538 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7539 symbol, in which case it is returned. Otherwise, this looks for
7540 symbols whose name is that of NAME_SYM suffixed with "___XR".
7541 Return symbol if found, and NULL otherwise. */
4c4b4cd2
PH
7542
7543struct symbol *
270140bd 7544ada_find_renaming_symbol (struct symbol *name_sym, const struct block *block)
aeb5907d 7545{
739593e0 7546 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
aeb5907d
JB
7547 struct symbol *sym;
7548
739593e0
JB
7549 if (strstr (name, "___XR") != NULL)
7550 return name_sym;
7551
aeb5907d
JB
7552 sym = find_old_style_renaming_symbol (name, block);
7553
7554 if (sym != NULL)
7555 return sym;
7556
0963b4bd 7557 /* Not right yet. FIXME pnh 7/20/2007. */
852dff6c 7558 sym = ada_find_any_type_symbol (name);
aeb5907d
JB
7559 if (sym != NULL && strstr (SYMBOL_LINKAGE_NAME (sym), "___XR") != NULL)
7560 return sym;
7561 else
7562 return NULL;
7563}
7564
7565static struct symbol *
270140bd 7566find_old_style_renaming_symbol (const char *name, const struct block *block)
4c4b4cd2 7567{
7f0df278 7568 const struct symbol *function_sym = block_linkage_function (block);
4c4b4cd2
PH
7569 char *rename;
7570
7571 if (function_sym != NULL)
7572 {
7573 /* If the symbol is defined inside a function, NAME is not fully
7574 qualified. This means we need to prepend the function name
7575 as well as adding the ``___XR'' suffix to build the name of
7576 the associated renaming symbol. */
0d5cff50 7577 const char *function_name = SYMBOL_LINKAGE_NAME (function_sym);
529cad9c
PH
7578 /* Function names sometimes contain suffixes used
7579 for instance to qualify nested subprograms. When building
7580 the XR type name, we need to make sure that this suffix is
7581 not included. So do not include any suffix in the function
7582 name length below. */
69fadcdf 7583 int function_name_len = ada_name_prefix_len (function_name);
76a01679
JB
7584 const int rename_len = function_name_len + 2 /* "__" */
7585 + strlen (name) + 6 /* "___XR\0" */ ;
4c4b4cd2 7586
529cad9c 7587 /* Strip the suffix if necessary. */
69fadcdf
JB
7588 ada_remove_trailing_digits (function_name, &function_name_len);
7589 ada_remove_po_subprogram_suffix (function_name, &function_name_len);
7590 ada_remove_Xbn_suffix (function_name, &function_name_len);
529cad9c 7591
4c4b4cd2
PH
7592 /* Library-level functions are a special case, as GNAT adds
7593 a ``_ada_'' prefix to the function name to avoid namespace
aeb5907d 7594 pollution. However, the renaming symbols themselves do not
4c4b4cd2
PH
7595 have this prefix, so we need to skip this prefix if present. */
7596 if (function_name_len > 5 /* "_ada_" */
7597 && strstr (function_name, "_ada_") == function_name)
69fadcdf
JB
7598 {
7599 function_name += 5;
7600 function_name_len -= 5;
7601 }
4c4b4cd2
PH
7602
7603 rename = (char *) alloca (rename_len * sizeof (char));
69fadcdf
JB
7604 strncpy (rename, function_name, function_name_len);
7605 xsnprintf (rename + function_name_len, rename_len - function_name_len,
7606 "__%s___XR", name);
4c4b4cd2
PH
7607 }
7608 else
7609 {
7610 const int rename_len = strlen (name) + 6;
5b4ee69b 7611
4c4b4cd2 7612 rename = (char *) alloca (rename_len * sizeof (char));
88c15c34 7613 xsnprintf (rename, rename_len * sizeof (char), "%s___XR", name);
4c4b4cd2
PH
7614 }
7615
852dff6c 7616 return ada_find_any_type_symbol (rename);
4c4b4cd2
PH
7617}
7618
14f9c5c9 7619/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7620 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7621 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7622 otherwise return 0. */
7623
14f9c5c9 7624int
d2e4a39e 7625ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7626{
7627 if (type1 == NULL)
7628 return 1;
7629 else if (type0 == NULL)
7630 return 0;
7631 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7632 return 1;
7633 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7634 return 0;
4c4b4cd2
PH
7635 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7636 return 1;
ad82864c 7637 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7638 return 1;
4c4b4cd2
PH
7639 else if (ada_is_array_descriptor_type (type0)
7640 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7641 return 1;
aeb5907d
JB
7642 else
7643 {
7644 const char *type0_name = type_name_no_tag (type0);
7645 const char *type1_name = type_name_no_tag (type1);
7646
7647 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7648 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7649 return 1;
7650 }
14f9c5c9
AS
7651 return 0;
7652}
7653
7654/* The name of TYPE, which is either its TYPE_NAME, or, if that is
4c4b4cd2
PH
7655 null, its TYPE_TAG_NAME. Null if TYPE is null. */
7656
0d5cff50 7657const char *
d2e4a39e 7658ada_type_name (struct type *type)
14f9c5c9 7659{
d2e4a39e 7660 if (type == NULL)
14f9c5c9
AS
7661 return NULL;
7662 else if (TYPE_NAME (type) != NULL)
7663 return TYPE_NAME (type);
7664 else
7665 return TYPE_TAG_NAME (type);
7666}
7667
b4ba55a1
JB
7668/* Search the list of "descriptive" types associated to TYPE for a type
7669 whose name is NAME. */
7670
7671static struct type *
7672find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7673{
7674 struct type *result;
7675
c6044dd1
JB
7676 if (ada_ignore_descriptive_types_p)
7677 return NULL;
7678
b4ba55a1
JB
7679 /* If there no descriptive-type info, then there is no parallel type
7680 to be found. */
7681 if (!HAVE_GNAT_AUX_INFO (type))
7682 return NULL;
7683
7684 result = TYPE_DESCRIPTIVE_TYPE (type);
7685 while (result != NULL)
7686 {
0d5cff50 7687 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7688
7689 if (result_name == NULL)
7690 {
7691 warning (_("unexpected null name on descriptive type"));
7692 return NULL;
7693 }
7694
7695 /* If the names match, stop. */
7696 if (strcmp (result_name, name) == 0)
7697 break;
7698
7699 /* Otherwise, look at the next item on the list, if any. */
7700 if (HAVE_GNAT_AUX_INFO (result))
7701 result = TYPE_DESCRIPTIVE_TYPE (result);
7702 else
7703 result = NULL;
7704 }
7705
7706 /* If we didn't find a match, see whether this is a packed array. With
7707 older compilers, the descriptive type information is either absent or
7708 irrelevant when it comes to packed arrays so the above lookup fails.
7709 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7710 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7711 return ada_find_any_type (name);
7712
7713 return result;
7714}
7715
7716/* Find a parallel type to TYPE with the specified NAME, using the
7717 descriptive type taken from the debugging information, if available,
7718 and otherwise using the (slower) name-based method. */
7719
7720static struct type *
7721ada_find_parallel_type_with_name (struct type *type, const char *name)
7722{
7723 struct type *result = NULL;
7724
7725 if (HAVE_GNAT_AUX_INFO (type))
7726 result = find_parallel_type_by_descriptive_type (type, name);
7727 else
7728 result = ada_find_any_type (name);
7729
7730 return result;
7731}
7732
7733/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7734 SUFFIX to the name of TYPE. */
14f9c5c9 7735
d2e4a39e 7736struct type *
ebf56fd3 7737ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7738{
0d5cff50
DE
7739 char *name;
7740 const char *typename = ada_type_name (type);
14f9c5c9 7741 int len;
d2e4a39e 7742
14f9c5c9
AS
7743 if (typename == NULL)
7744 return NULL;
7745
7746 len = strlen (typename);
7747
b4ba55a1 7748 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9
AS
7749
7750 strcpy (name, typename);
7751 strcpy (name + len, suffix);
7752
b4ba55a1 7753 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7754}
7755
14f9c5c9 7756/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7757 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7758
d2e4a39e
AS
7759static struct type *
7760dynamic_template_type (struct type *type)
14f9c5c9 7761{
61ee279c 7762 type = ada_check_typedef (type);
14f9c5c9
AS
7763
7764 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7765 || ada_type_name (type) == NULL)
14f9c5c9 7766 return NULL;
d2e4a39e 7767 else
14f9c5c9
AS
7768 {
7769 int len = strlen (ada_type_name (type));
5b4ee69b 7770
4c4b4cd2
PH
7771 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7772 return type;
14f9c5c9 7773 else
4c4b4cd2 7774 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7775 }
7776}
7777
7778/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7779 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7780
d2e4a39e
AS
7781static int
7782is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7783{
7784 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7785
d2e4a39e 7786 return name != NULL
14f9c5c9
AS
7787 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
7788 && strstr (name, "___XVL") != NULL;
7789}
7790
4c4b4cd2
PH
7791/* The index of the variant field of TYPE, or -1 if TYPE does not
7792 represent a variant record type. */
14f9c5c9 7793
d2e4a39e 7794static int
4c4b4cd2 7795variant_field_index (struct type *type)
14f9c5c9
AS
7796{
7797 int f;
7798
4c4b4cd2
PH
7799 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
7800 return -1;
7801
7802 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
7803 {
7804 if (ada_is_variant_part (type, f))
7805 return f;
7806 }
7807 return -1;
14f9c5c9
AS
7808}
7809
4c4b4cd2
PH
7810/* A record type with no fields. */
7811
d2e4a39e 7812static struct type *
e9bb382b 7813empty_record (struct type *template)
14f9c5c9 7814{
e9bb382b 7815 struct type *type = alloc_type_copy (template);
5b4ee69b 7816
14f9c5c9
AS
7817 TYPE_CODE (type) = TYPE_CODE_STRUCT;
7818 TYPE_NFIELDS (type) = 0;
7819 TYPE_FIELDS (type) = NULL;
b1f33ddd 7820 INIT_CPLUS_SPECIFIC (type);
14f9c5c9
AS
7821 TYPE_NAME (type) = "<empty>";
7822 TYPE_TAG_NAME (type) = NULL;
14f9c5c9
AS
7823 TYPE_LENGTH (type) = 0;
7824 return type;
7825}
7826
7827/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7828 the value of type TYPE at VALADDR or ADDRESS (see comments at
7829 the beginning of this section) VAL according to GNAT conventions.
7830 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7831 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7832 an outer-level type (i.e., as opposed to a branch of a variant.) A
7833 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7834 of the variant.
14f9c5c9 7835
4c4b4cd2
PH
7836 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7837 length are not statically known are discarded. As a consequence,
7838 VALADDR, ADDRESS and DVAL0 are ignored.
7839
7840 NOTE: Limitations: For now, we assume that dynamic fields and
7841 variants occupy whole numbers of bytes. However, they need not be
7842 byte-aligned. */
7843
7844struct type *
10a2c479 7845ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7846 const gdb_byte *valaddr,
4c4b4cd2
PH
7847 CORE_ADDR address, struct value *dval0,
7848 int keep_dynamic_fields)
14f9c5c9 7849{
d2e4a39e
AS
7850 struct value *mark = value_mark ();
7851 struct value *dval;
7852 struct type *rtype;
14f9c5c9 7853 int nfields, bit_len;
4c4b4cd2 7854 int variant_field;
14f9c5c9 7855 long off;
d94e4f4f 7856 int fld_bit_len;
14f9c5c9
AS
7857 int f;
7858
4c4b4cd2
PH
7859 /* Compute the number of fields in this record type that are going
7860 to be processed: unless keep_dynamic_fields, this includes only
7861 fields whose position and length are static will be processed. */
7862 if (keep_dynamic_fields)
7863 nfields = TYPE_NFIELDS (type);
7864 else
7865 {
7866 nfields = 0;
76a01679 7867 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
7868 && !ada_is_variant_part (type, nfields)
7869 && !is_dynamic_field (type, nfields))
7870 nfields++;
7871 }
7872
e9bb382b 7873 rtype = alloc_type_copy (type);
14f9c5c9
AS
7874 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
7875 INIT_CPLUS_SPECIFIC (rtype);
7876 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 7877 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
7878 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
7879 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
7880 TYPE_NAME (rtype) = ada_type_name (type);
7881 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 7882 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 7883
d2e4a39e
AS
7884 off = 0;
7885 bit_len = 0;
4c4b4cd2
PH
7886 variant_field = -1;
7887
14f9c5c9
AS
7888 for (f = 0; f < nfields; f += 1)
7889 {
6c038f32
PH
7890 off = align_value (off, field_alignment (type, f))
7891 + TYPE_FIELD_BITPOS (type, f);
945b3a32 7892 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 7893 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7894
d2e4a39e 7895 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
7896 {
7897 variant_field = f;
d94e4f4f 7898 fld_bit_len = 0;
4c4b4cd2 7899 }
14f9c5c9 7900 else if (is_dynamic_field (type, f))
4c4b4cd2 7901 {
284614f0
JB
7902 const gdb_byte *field_valaddr = valaddr;
7903 CORE_ADDR field_address = address;
7904 struct type *field_type =
7905 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
7906
4c4b4cd2 7907 if (dval0 == NULL)
b5304971
JG
7908 {
7909 /* rtype's length is computed based on the run-time
7910 value of discriminants. If the discriminants are not
7911 initialized, the type size may be completely bogus and
0963b4bd 7912 GDB may fail to allocate a value for it. So check the
b5304971
JG
7913 size first before creating the value. */
7914 check_size (rtype);
012370f6
TT
7915 /* Using plain value_from_contents_and_address here
7916 causes problems because we will end up trying to
7917 resolve a type that is currently being
7918 constructed. */
7919 dval = value_from_contents_and_address_unresolved (rtype,
7920 valaddr,
7921 address);
9f1f738a 7922 rtype = value_type (dval);
b5304971 7923 }
4c4b4cd2
PH
7924 else
7925 dval = dval0;
7926
284614f0
JB
7927 /* If the type referenced by this field is an aligner type, we need
7928 to unwrap that aligner type, because its size might not be set.
7929 Keeping the aligner type would cause us to compute the wrong
7930 size for this field, impacting the offset of the all the fields
7931 that follow this one. */
7932 if (ada_is_aligner_type (field_type))
7933 {
7934 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
7935
7936 field_valaddr = cond_offset_host (field_valaddr, field_offset);
7937 field_address = cond_offset_target (field_address, field_offset);
7938 field_type = ada_aligned_type (field_type);
7939 }
7940
7941 field_valaddr = cond_offset_host (field_valaddr,
7942 off / TARGET_CHAR_BIT);
7943 field_address = cond_offset_target (field_address,
7944 off / TARGET_CHAR_BIT);
7945
7946 /* Get the fixed type of the field. Note that, in this case,
7947 we do not want to get the real type out of the tag: if
7948 the current field is the parent part of a tagged record,
7949 we will get the tag of the object. Clearly wrong: the real
7950 type of the parent is not the real type of the child. We
7951 would end up in an infinite loop. */
7952 field_type = ada_get_base_type (field_type);
7953 field_type = ada_to_fixed_type (field_type, field_valaddr,
7954 field_address, dval, 0);
27f2a97b
JB
7955 /* If the field size is already larger than the maximum
7956 object size, then the record itself will necessarily
7957 be larger than the maximum object size. We need to make
7958 this check now, because the size might be so ridiculously
7959 large (due to an uninitialized variable in the inferior)
7960 that it would cause an overflow when adding it to the
7961 record size. */
7962 check_size (field_type);
284614f0
JB
7963
7964 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 7965 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
7966 /* The multiplication can potentially overflow. But because
7967 the field length has been size-checked just above, and
7968 assuming that the maximum size is a reasonable value,
7969 an overflow should not happen in practice. So rather than
7970 adding overflow recovery code to this already complex code,
7971 we just assume that it's not going to happen. */
d94e4f4f 7972 fld_bit_len =
4c4b4cd2
PH
7973 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
7974 }
14f9c5c9 7975 else
4c4b4cd2 7976 {
5ded5331
JB
7977 /* Note: If this field's type is a typedef, it is important
7978 to preserve the typedef layer.
7979
7980 Otherwise, we might be transforming a typedef to a fat
7981 pointer (encoding a pointer to an unconstrained array),
7982 into a basic fat pointer (encoding an unconstrained
7983 array). As both types are implemented using the same
7984 structure, the typedef is the only clue which allows us
7985 to distinguish between the two options. Stripping it
7986 would prevent us from printing this field appropriately. */
7987 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
7988 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
7989 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 7990 fld_bit_len =
4c4b4cd2
PH
7991 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
7992 else
5ded5331
JB
7993 {
7994 struct type *field_type = TYPE_FIELD_TYPE (type, f);
7995
7996 /* We need to be careful of typedefs when computing
7997 the length of our field. If this is a typedef,
7998 get the length of the target type, not the length
7999 of the typedef. */
8000 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8001 field_type = ada_typedef_target_type (field_type);
8002
8003 fld_bit_len =
8004 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8005 }
4c4b4cd2 8006 }
14f9c5c9 8007 if (off + fld_bit_len > bit_len)
4c4b4cd2 8008 bit_len = off + fld_bit_len;
d94e4f4f 8009 off += fld_bit_len;
4c4b4cd2
PH
8010 TYPE_LENGTH (rtype) =
8011 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8012 }
4c4b4cd2
PH
8013
8014 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8015 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8016 the record. This can happen in the presence of representation
8017 clauses. */
8018 if (variant_field >= 0)
8019 {
8020 struct type *branch_type;
8021
8022 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8023
8024 if (dval0 == NULL)
9f1f738a 8025 {
012370f6
TT
8026 /* Using plain value_from_contents_and_address here causes
8027 problems because we will end up trying to resolve a type
8028 that is currently being constructed. */
8029 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8030 address);
9f1f738a
SA
8031 rtype = value_type (dval);
8032 }
4c4b4cd2
PH
8033 else
8034 dval = dval0;
8035
8036 branch_type =
8037 to_fixed_variant_branch_type
8038 (TYPE_FIELD_TYPE (type, variant_field),
8039 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8040 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8041 if (branch_type == NULL)
8042 {
8043 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8044 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8045 TYPE_NFIELDS (rtype) -= 1;
8046 }
8047 else
8048 {
8049 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8050 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8051 fld_bit_len =
8052 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8053 TARGET_CHAR_BIT;
8054 if (off + fld_bit_len > bit_len)
8055 bit_len = off + fld_bit_len;
8056 TYPE_LENGTH (rtype) =
8057 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8058 }
8059 }
8060
714e53ab
PH
8061 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8062 should contain the alignment of that record, which should be a strictly
8063 positive value. If null or negative, then something is wrong, most
8064 probably in the debug info. In that case, we don't round up the size
0963b4bd 8065 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8066 the current RTYPE length might be good enough for our purposes. */
8067 if (TYPE_LENGTH (type) <= 0)
8068 {
323e0a4a
AC
8069 if (TYPE_NAME (rtype))
8070 warning (_("Invalid type size for `%s' detected: %d."),
8071 TYPE_NAME (rtype), TYPE_LENGTH (type));
8072 else
8073 warning (_("Invalid type size for <unnamed> detected: %d."),
8074 TYPE_LENGTH (type));
714e53ab
PH
8075 }
8076 else
8077 {
8078 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8079 TYPE_LENGTH (type));
8080 }
14f9c5c9
AS
8081
8082 value_free_to_mark (mark);
d2e4a39e 8083 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8084 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8085 return rtype;
8086}
8087
4c4b4cd2
PH
8088/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8089 of 1. */
14f9c5c9 8090
d2e4a39e 8091static struct type *
fc1a4b47 8092template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8093 CORE_ADDR address, struct value *dval0)
8094{
8095 return ada_template_to_fixed_record_type_1 (type, valaddr,
8096 address, dval0, 1);
8097}
8098
8099/* An ordinary record type in which ___XVL-convention fields and
8100 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8101 static approximations, containing all possible fields. Uses
8102 no runtime values. Useless for use in values, but that's OK,
8103 since the results are used only for type determinations. Works on both
8104 structs and unions. Representation note: to save space, we memorize
8105 the result of this function in the TYPE_TARGET_TYPE of the
8106 template type. */
8107
8108static struct type *
8109template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8110{
8111 struct type *type;
8112 int nfields;
8113 int f;
8114
4c4b4cd2
PH
8115 if (TYPE_TARGET_TYPE (type0) != NULL)
8116 return TYPE_TARGET_TYPE (type0);
8117
8118 nfields = TYPE_NFIELDS (type0);
8119 type = type0;
14f9c5c9
AS
8120
8121 for (f = 0; f < nfields; f += 1)
8122 {
61ee279c 8123 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type0, f));
4c4b4cd2 8124 struct type *new_type;
14f9c5c9 8125
4c4b4cd2
PH
8126 if (is_dynamic_field (type0, f))
8127 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
14f9c5c9 8128 else
f192137b 8129 new_type = static_unwrap_type (field_type);
4c4b4cd2
PH
8130 if (type == type0 && new_type != field_type)
8131 {
e9bb382b 8132 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
4c4b4cd2
PH
8133 TYPE_CODE (type) = TYPE_CODE (type0);
8134 INIT_CPLUS_SPECIFIC (type);
8135 TYPE_NFIELDS (type) = nfields;
8136 TYPE_FIELDS (type) = (struct field *)
8137 TYPE_ALLOC (type, nfields * sizeof (struct field));
8138 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8139 sizeof (struct field) * nfields);
8140 TYPE_NAME (type) = ada_type_name (type0);
8141 TYPE_TAG_NAME (type) = NULL;
876cecd0 8142 TYPE_FIXED_INSTANCE (type) = 1;
4c4b4cd2
PH
8143 TYPE_LENGTH (type) = 0;
8144 }
8145 TYPE_FIELD_TYPE (type, f) = new_type;
8146 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
14f9c5c9 8147 }
14f9c5c9
AS
8148 return type;
8149}
8150
4c4b4cd2 8151/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8152 whose address in memory is ADDRESS, returns a revision of TYPE,
8153 which should be a non-dynamic-sized record, in which the variant
8154 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8155 for discriminant values in DVAL0, which can be NULL if the record
8156 contains the necessary discriminant values. */
8157
d2e4a39e 8158static struct type *
fc1a4b47 8159to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8160 CORE_ADDR address, struct value *dval0)
14f9c5c9 8161{
d2e4a39e 8162 struct value *mark = value_mark ();
4c4b4cd2 8163 struct value *dval;
d2e4a39e 8164 struct type *rtype;
14f9c5c9
AS
8165 struct type *branch_type;
8166 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8167 int variant_field = variant_field_index (type);
14f9c5c9 8168
4c4b4cd2 8169 if (variant_field == -1)
14f9c5c9
AS
8170 return type;
8171
4c4b4cd2 8172 if (dval0 == NULL)
9f1f738a
SA
8173 {
8174 dval = value_from_contents_and_address (type, valaddr, address);
8175 type = value_type (dval);
8176 }
4c4b4cd2
PH
8177 else
8178 dval = dval0;
8179
e9bb382b 8180 rtype = alloc_type_copy (type);
14f9c5c9 8181 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
4c4b4cd2
PH
8182 INIT_CPLUS_SPECIFIC (rtype);
8183 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8184 TYPE_FIELDS (rtype) =
8185 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8186 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8187 sizeof (struct field) * nfields);
14f9c5c9
AS
8188 TYPE_NAME (rtype) = ada_type_name (type);
8189 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 8190 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8191 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8192
4c4b4cd2
PH
8193 branch_type = to_fixed_variant_branch_type
8194 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8195 cond_offset_host (valaddr,
4c4b4cd2
PH
8196 TYPE_FIELD_BITPOS (type, variant_field)
8197 / TARGET_CHAR_BIT),
d2e4a39e 8198 cond_offset_target (address,
4c4b4cd2
PH
8199 TYPE_FIELD_BITPOS (type, variant_field)
8200 / TARGET_CHAR_BIT), dval);
d2e4a39e 8201 if (branch_type == NULL)
14f9c5c9 8202 {
4c4b4cd2 8203 int f;
5b4ee69b 8204
4c4b4cd2
PH
8205 for (f = variant_field + 1; f < nfields; f += 1)
8206 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8207 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8208 }
8209 else
8210 {
4c4b4cd2
PH
8211 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8212 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8213 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8214 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8215 }
4c4b4cd2 8216 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8217
4c4b4cd2 8218 value_free_to_mark (mark);
14f9c5c9
AS
8219 return rtype;
8220}
8221
8222/* An ordinary record type (with fixed-length fields) that describes
8223 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8224 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8225 should be in DVAL, a record value; it may be NULL if the object
8226 at ADDR itself contains any necessary discriminant values.
8227 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8228 values from the record are needed. Except in the case that DVAL,
8229 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8230 unchecked) is replaced by a particular branch of the variant.
8231
8232 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8233 is questionable and may be removed. It can arise during the
8234 processing of an unconstrained-array-of-record type where all the
8235 variant branches have exactly the same size. This is because in
8236 such cases, the compiler does not bother to use the XVS convention
8237 when encoding the record. I am currently dubious of this
8238 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8239
d2e4a39e 8240static struct type *
fc1a4b47 8241to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8242 CORE_ADDR address, struct value *dval)
14f9c5c9 8243{
d2e4a39e 8244 struct type *templ_type;
14f9c5c9 8245
876cecd0 8246 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8247 return type0;
8248
d2e4a39e 8249 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8250
8251 if (templ_type != NULL)
8252 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8253 else if (variant_field_index (type0) >= 0)
8254 {
8255 if (dval == NULL && valaddr == NULL && address == 0)
8256 return type0;
8257 return to_record_with_fixed_variant_part (type0, valaddr, address,
8258 dval);
8259 }
14f9c5c9
AS
8260 else
8261 {
876cecd0 8262 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8263 return type0;
8264 }
8265
8266}
8267
8268/* An ordinary record type (with fixed-length fields) that describes
8269 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8270 union type. Any necessary discriminants' values should be in DVAL,
8271 a record value. That is, this routine selects the appropriate
8272 branch of the union at ADDR according to the discriminant value
b1f33ddd 8273 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8274 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8275
d2e4a39e 8276static struct type *
fc1a4b47 8277to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8278 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8279{
8280 int which;
d2e4a39e
AS
8281 struct type *templ_type;
8282 struct type *var_type;
14f9c5c9
AS
8283
8284 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8285 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8286 else
14f9c5c9
AS
8287 var_type = var_type0;
8288
8289 templ_type = ada_find_parallel_type (var_type, "___XVU");
8290
8291 if (templ_type != NULL)
8292 var_type = templ_type;
8293
b1f33ddd
JB
8294 if (is_unchecked_variant (var_type, value_type (dval)))
8295 return var_type0;
d2e4a39e
AS
8296 which =
8297 ada_which_variant_applies (var_type,
0fd88904 8298 value_type (dval), value_contents (dval));
14f9c5c9
AS
8299
8300 if (which < 0)
e9bb382b 8301 return empty_record (var_type);
14f9c5c9 8302 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8303 return to_fixed_record_type
d2e4a39e
AS
8304 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8305 valaddr, address, dval);
4c4b4cd2 8306 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8307 return
8308 to_fixed_record_type
8309 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8310 else
8311 return TYPE_FIELD_TYPE (var_type, which);
8312}
8313
8908fca5
JB
8314/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8315 ENCODING_TYPE, a type following the GNAT conventions for discrete
8316 type encodings, only carries redundant information. */
8317
8318static int
8319ada_is_redundant_range_encoding (struct type *range_type,
8320 struct type *encoding_type)
8321{
8322 struct type *fixed_range_type;
8323 char *bounds_str;
8324 int n;
8325 LONGEST lo, hi;
8326
8327 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8328
8329 if (is_dynamic_type (range_type))
8330 return 0;
8331
8332 if (TYPE_NAME (encoding_type) == NULL)
8333 return 0;
8334
8335 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8336 if (bounds_str == NULL)
8337 return 0;
8338
8339 n = 8; /* Skip "___XDLU_". */
8340 if (!ada_scan_number (bounds_str, n, &lo, &n))
8341 return 0;
8342 if (TYPE_LOW_BOUND (range_type) != lo)
8343 return 0;
8344
8345 n += 2; /* Skip the "__" separator between the two bounds. */
8346 if (!ada_scan_number (bounds_str, n, &hi, &n))
8347 return 0;
8348 if (TYPE_HIGH_BOUND (range_type) != hi)
8349 return 0;
8350
8351 return 1;
8352}
8353
8354/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8355 a type following the GNAT encoding for describing array type
8356 indices, only carries redundant information. */
8357
8358static int
8359ada_is_redundant_index_type_desc (struct type *array_type,
8360 struct type *desc_type)
8361{
8362 struct type *this_layer = check_typedef (array_type);
8363 int i;
8364
8365 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8366 {
8367 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8368 TYPE_FIELD_TYPE (desc_type, i)))
8369 return 0;
8370 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8371 }
8372
8373 return 1;
8374}
8375
14f9c5c9
AS
8376/* Assuming that TYPE0 is an array type describing the type of a value
8377 at ADDR, and that DVAL describes a record containing any
8378 discriminants used in TYPE0, returns a type for the value that
8379 contains no dynamic components (that is, no components whose sizes
8380 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8381 true, gives an error message if the resulting type's size is over
4c4b4cd2 8382 varsize_limit. */
14f9c5c9 8383
d2e4a39e
AS
8384static struct type *
8385to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8386 int ignore_too_big)
14f9c5c9 8387{
d2e4a39e
AS
8388 struct type *index_type_desc;
8389 struct type *result;
ad82864c 8390 int constrained_packed_array_p;
14f9c5c9 8391
b0dd7688 8392 type0 = ada_check_typedef (type0);
284614f0 8393 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8394 return type0;
14f9c5c9 8395
ad82864c
JB
8396 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8397 if (constrained_packed_array_p)
8398 type0 = decode_constrained_packed_array_type (type0);
284614f0 8399
14f9c5c9 8400 index_type_desc = ada_find_parallel_type (type0, "___XA");
28c85d6c 8401 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8402 if (index_type_desc != NULL
8403 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8404 {
8405 /* Ignore this ___XA parallel type, as it does not bring any
8406 useful information. This allows us to avoid creating fixed
8407 versions of the array's index types, which would be identical
8408 to the original ones. This, in turn, can also help avoid
8409 the creation of fixed versions of the array itself. */
8410 index_type_desc = NULL;
8411 }
8412
14f9c5c9
AS
8413 if (index_type_desc == NULL)
8414 {
61ee279c 8415 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8416
14f9c5c9 8417 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8418 depend on the contents of the array in properly constructed
8419 debugging data. */
529cad9c
PH
8420 /* Create a fixed version of the array element type.
8421 We're not providing the address of an element here,
e1d5a0d2 8422 and thus the actual object value cannot be inspected to do
529cad9c
PH
8423 the conversion. This should not be a problem, since arrays of
8424 unconstrained objects are not allowed. In particular, all
8425 the elements of an array of a tagged type should all be of
8426 the same type specified in the debugging info. No need to
8427 consult the object tag. */
1ed6ede0 8428 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8429
284614f0
JB
8430 /* Make sure we always create a new array type when dealing with
8431 packed array types, since we're going to fix-up the array
8432 type length and element bitsize a little further down. */
ad82864c 8433 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8434 result = type0;
14f9c5c9 8435 else
e9bb382b 8436 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8437 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8438 }
8439 else
8440 {
8441 int i;
8442 struct type *elt_type0;
8443
8444 elt_type0 = type0;
8445 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8446 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8447
8448 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8449 depend on the contents of the array in properly constructed
8450 debugging data. */
529cad9c
PH
8451 /* Create a fixed version of the array element type.
8452 We're not providing the address of an element here,
e1d5a0d2 8453 and thus the actual object value cannot be inspected to do
529cad9c
PH
8454 the conversion. This should not be a problem, since arrays of
8455 unconstrained objects are not allowed. In particular, all
8456 the elements of an array of a tagged type should all be of
8457 the same type specified in the debugging info. No need to
8458 consult the object tag. */
1ed6ede0
JB
8459 result =
8460 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8461
8462 elt_type0 = type0;
14f9c5c9 8463 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8464 {
8465 struct type *range_type =
28c85d6c 8466 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8467
e9bb382b 8468 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8469 result, range_type);
1ce677a4 8470 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8471 }
d2e4a39e 8472 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8473 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8474 }
8475
2e6fda7d
JB
8476 /* We want to preserve the type name. This can be useful when
8477 trying to get the type name of a value that has already been
8478 printed (for instance, if the user did "print VAR; whatis $". */
8479 TYPE_NAME (result) = TYPE_NAME (type0);
8480
ad82864c 8481 if (constrained_packed_array_p)
284614f0
JB
8482 {
8483 /* So far, the resulting type has been created as if the original
8484 type was a regular (non-packed) array type. As a result, the
8485 bitsize of the array elements needs to be set again, and the array
8486 length needs to be recomputed based on that bitsize. */
8487 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8488 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8489
8490 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8491 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8492 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8493 TYPE_LENGTH (result)++;
8494 }
8495
876cecd0 8496 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8497 return result;
d2e4a39e 8498}
14f9c5c9
AS
8499
8500
8501/* A standard type (containing no dynamically sized components)
8502 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8503 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8504 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8505 ADDRESS or in VALADDR contains these discriminants.
8506
1ed6ede0
JB
8507 If CHECK_TAG is not null, in the case of tagged types, this function
8508 attempts to locate the object's tag and use it to compute the actual
8509 type. However, when ADDRESS is null, we cannot use it to determine the
8510 location of the tag, and therefore compute the tagged type's actual type.
8511 So we return the tagged type without consulting the tag. */
529cad9c 8512
f192137b
JB
8513static struct type *
8514ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8515 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8516{
61ee279c 8517 type = ada_check_typedef (type);
d2e4a39e
AS
8518 switch (TYPE_CODE (type))
8519 {
8520 default:
14f9c5c9 8521 return type;
d2e4a39e 8522 case TYPE_CODE_STRUCT:
4c4b4cd2 8523 {
76a01679 8524 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8525 struct type *fixed_record_type =
8526 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8527
529cad9c
PH
8528 /* If STATIC_TYPE is a tagged type and we know the object's address,
8529 then we can determine its tag, and compute the object's actual
0963b4bd 8530 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8531 type (the parent part of the record may have dynamic fields
8532 and the way the location of _tag is expressed may depend on
8533 them). */
529cad9c 8534
1ed6ede0 8535 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8536 {
b50d69b5
JG
8537 struct value *tag =
8538 value_tag_from_contents_and_address
8539 (fixed_record_type,
8540 valaddr,
8541 address);
8542 struct type *real_type = type_from_tag (tag);
8543 struct value *obj =
8544 value_from_contents_and_address (fixed_record_type,
8545 valaddr,
8546 address);
9f1f738a 8547 fixed_record_type = value_type (obj);
76a01679 8548 if (real_type != NULL)
b50d69b5
JG
8549 return to_fixed_record_type
8550 (real_type, NULL,
8551 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8552 }
4af88198
JB
8553
8554 /* Check to see if there is a parallel ___XVZ variable.
8555 If there is, then it provides the actual size of our type. */
8556 else if (ada_type_name (fixed_record_type) != NULL)
8557 {
0d5cff50 8558 const char *name = ada_type_name (fixed_record_type);
4af88198
JB
8559 char *xvz_name = alloca (strlen (name) + 7 /* "___XVZ\0" */);
8560 int xvz_found = 0;
8561 LONGEST size;
8562
88c15c34 8563 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
4af88198
JB
8564 size = get_int_var_value (xvz_name, &xvz_found);
8565 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8566 {
8567 fixed_record_type = copy_type (fixed_record_type);
8568 TYPE_LENGTH (fixed_record_type) = size;
8569
8570 /* The FIXED_RECORD_TYPE may have be a stub. We have
8571 observed this when the debugging info is STABS, and
8572 apparently it is something that is hard to fix.
8573
8574 In practice, we don't need the actual type definition
8575 at all, because the presence of the XVZ variable allows us
8576 to assume that there must be a XVS type as well, which we
8577 should be able to use later, when we need the actual type
8578 definition.
8579
8580 In the meantime, pretend that the "fixed" type we are
8581 returning is NOT a stub, because this can cause trouble
8582 when using this type to create new types targeting it.
8583 Indeed, the associated creation routines often check
8584 whether the target type is a stub and will try to replace
0963b4bd 8585 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8586 might cause the new type to have the wrong size too.
8587 Consider the case of an array, for instance, where the size
8588 of the array is computed from the number of elements in
8589 our array multiplied by the size of its element. */
8590 TYPE_STUB (fixed_record_type) = 0;
8591 }
8592 }
1ed6ede0 8593 return fixed_record_type;
4c4b4cd2 8594 }
d2e4a39e 8595 case TYPE_CODE_ARRAY:
4c4b4cd2 8596 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8597 case TYPE_CODE_UNION:
8598 if (dval == NULL)
4c4b4cd2 8599 return type;
d2e4a39e 8600 else
4c4b4cd2 8601 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8602 }
14f9c5c9
AS
8603}
8604
f192137b
JB
8605/* The same as ada_to_fixed_type_1, except that it preserves the type
8606 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8607
8608 The typedef layer needs be preserved in order to differentiate between
8609 arrays and array pointers when both types are implemented using the same
8610 fat pointer. In the array pointer case, the pointer is encoded as
8611 a typedef of the pointer type. For instance, considering:
8612
8613 type String_Access is access String;
8614 S1 : String_Access := null;
8615
8616 To the debugger, S1 is defined as a typedef of type String. But
8617 to the user, it is a pointer. So if the user tries to print S1,
8618 we should not dereference the array, but print the array address
8619 instead.
8620
8621 If we didn't preserve the typedef layer, we would lose the fact that
8622 the type is to be presented as a pointer (needs de-reference before
8623 being printed). And we would also use the source-level type name. */
f192137b
JB
8624
8625struct type *
8626ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8627 CORE_ADDR address, struct value *dval, int check_tag)
8628
8629{
8630 struct type *fixed_type =
8631 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8632
96dbd2c1
JB
8633 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8634 then preserve the typedef layer.
8635
8636 Implementation note: We can only check the main-type portion of
8637 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8638 from TYPE now returns a type that has the same instance flags
8639 as TYPE. For instance, if TYPE is a "typedef const", and its
8640 target type is a "struct", then the typedef elimination will return
8641 a "const" version of the target type. See check_typedef for more
8642 details about how the typedef layer elimination is done.
8643
8644 brobecker/2010-11-19: It seems to me that the only case where it is
8645 useful to preserve the typedef layer is when dealing with fat pointers.
8646 Perhaps, we could add a check for that and preserve the typedef layer
8647 only in that situation. But this seems unecessary so far, probably
8648 because we call check_typedef/ada_check_typedef pretty much everywhere.
8649 */
f192137b 8650 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8651 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8652 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8653 return type;
8654
8655 return fixed_type;
8656}
8657
14f9c5c9 8658/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8659 TYPE0, but based on no runtime data. */
14f9c5c9 8660
d2e4a39e
AS
8661static struct type *
8662to_static_fixed_type (struct type *type0)
14f9c5c9 8663{
d2e4a39e 8664 struct type *type;
14f9c5c9
AS
8665
8666 if (type0 == NULL)
8667 return NULL;
8668
876cecd0 8669 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8670 return type0;
8671
61ee279c 8672 type0 = ada_check_typedef (type0);
d2e4a39e 8673
14f9c5c9
AS
8674 switch (TYPE_CODE (type0))
8675 {
8676 default:
8677 return type0;
8678 case TYPE_CODE_STRUCT:
8679 type = dynamic_template_type (type0);
d2e4a39e 8680 if (type != NULL)
4c4b4cd2
PH
8681 return template_to_static_fixed_type (type);
8682 else
8683 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8684 case TYPE_CODE_UNION:
8685 type = ada_find_parallel_type (type0, "___XVU");
8686 if (type != NULL)
4c4b4cd2
PH
8687 return template_to_static_fixed_type (type);
8688 else
8689 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8690 }
8691}
8692
4c4b4cd2
PH
8693/* A static approximation of TYPE with all type wrappers removed. */
8694
d2e4a39e
AS
8695static struct type *
8696static_unwrap_type (struct type *type)
14f9c5c9
AS
8697{
8698 if (ada_is_aligner_type (type))
8699 {
61ee279c 8700 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8701 if (ada_type_name (type1) == NULL)
4c4b4cd2 8702 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8703
8704 return static_unwrap_type (type1);
8705 }
d2e4a39e 8706 else
14f9c5c9 8707 {
d2e4a39e 8708 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8709
d2e4a39e 8710 if (raw_real_type == type)
4c4b4cd2 8711 return type;
14f9c5c9 8712 else
4c4b4cd2 8713 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8714 }
8715}
8716
8717/* In some cases, incomplete and private types require
4c4b4cd2 8718 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8719 type Foo;
8720 type FooP is access Foo;
8721 V: FooP;
8722 type Foo is array ...;
4c4b4cd2 8723 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8724 cross-references to such types, we instead substitute for FooP a
8725 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8726 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8727
8728/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8729 exists, otherwise TYPE. */
8730
d2e4a39e 8731struct type *
61ee279c 8732ada_check_typedef (struct type *type)
14f9c5c9 8733{
727e3d2e
JB
8734 if (type == NULL)
8735 return NULL;
8736
720d1a40
JB
8737 /* If our type is a typedef type of a fat pointer, then we're done.
8738 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8739 what allows us to distinguish between fat pointers that represent
8740 array types, and fat pointers that represent array access types
8741 (in both cases, the compiler implements them as fat pointers). */
8742 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
8743 && is_thick_pntr (ada_typedef_target_type (type)))
8744 return type;
8745
14f9c5c9
AS
8746 CHECK_TYPEDEF (type);
8747 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 8748 || !TYPE_STUB (type)
14f9c5c9
AS
8749 || TYPE_TAG_NAME (type) == NULL)
8750 return type;
d2e4a39e 8751 else
14f9c5c9 8752 {
0d5cff50 8753 const char *name = TYPE_TAG_NAME (type);
d2e4a39e 8754 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8755
05e522ef
JB
8756 if (type1 == NULL)
8757 return type;
8758
8759 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8760 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8761 types, only for the typedef-to-array types). If that's the case,
8762 strip the typedef layer. */
8763 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
8764 type1 = ada_check_typedef (type1);
8765
8766 return type1;
14f9c5c9
AS
8767 }
8768}
8769
8770/* A value representing the data at VALADDR/ADDRESS as described by
8771 type TYPE0, but with a standard (static-sized) type that correctly
8772 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8773 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8774 creation of struct values]. */
14f9c5c9 8775
4c4b4cd2
PH
8776static struct value *
8777ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
8778 struct value *val0)
14f9c5c9 8779{
1ed6ede0 8780 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8781
14f9c5c9
AS
8782 if (type == type0 && val0 != NULL)
8783 return val0;
d2e4a39e 8784 else
4c4b4cd2
PH
8785 return value_from_contents_and_address (type, 0, address);
8786}
8787
8788/* A value representing VAL, but with a standard (static-sized) type
8789 that correctly describes it. Does not necessarily create a new
8790 value. */
8791
0c3acc09 8792struct value *
4c4b4cd2
PH
8793ada_to_fixed_value (struct value *val)
8794{
c48db5ca
JB
8795 val = unwrap_value (val);
8796 val = ada_to_fixed_value_create (value_type (val),
8797 value_address (val),
8798 val);
8799 return val;
14f9c5c9 8800}
d2e4a39e 8801\f
14f9c5c9 8802
14f9c5c9
AS
8803/* Attributes */
8804
4c4b4cd2
PH
8805/* Table mapping attribute numbers to names.
8806 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8807
d2e4a39e 8808static const char *attribute_names[] = {
14f9c5c9
AS
8809 "<?>",
8810
d2e4a39e 8811 "first",
14f9c5c9
AS
8812 "last",
8813 "length",
8814 "image",
14f9c5c9
AS
8815 "max",
8816 "min",
4c4b4cd2
PH
8817 "modulus",
8818 "pos",
8819 "size",
8820 "tag",
14f9c5c9 8821 "val",
14f9c5c9
AS
8822 0
8823};
8824
d2e4a39e 8825const char *
4c4b4cd2 8826ada_attribute_name (enum exp_opcode n)
14f9c5c9 8827{
4c4b4cd2
PH
8828 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8829 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8830 else
8831 return attribute_names[0];
8832}
8833
4c4b4cd2 8834/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8835
4c4b4cd2
PH
8836static LONGEST
8837pos_atr (struct value *arg)
14f9c5c9 8838{
24209737
PH
8839 struct value *val = coerce_ref (arg);
8840 struct type *type = value_type (val);
14f9c5c9 8841
d2e4a39e 8842 if (!discrete_type_p (type))
323e0a4a 8843 error (_("'POS only defined on discrete types"));
14f9c5c9
AS
8844
8845 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8846 {
8847 int i;
24209737 8848 LONGEST v = value_as_long (val);
14f9c5c9 8849
d2e4a39e 8850 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2 8851 {
14e75d8e 8852 if (v == TYPE_FIELD_ENUMVAL (type, i))
4c4b4cd2
PH
8853 return i;
8854 }
323e0a4a 8855 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9
AS
8856 }
8857 else
24209737 8858 return value_as_long (val);
4c4b4cd2
PH
8859}
8860
8861static struct value *
3cb382c9 8862value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8863{
3cb382c9 8864 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8865}
8866
4c4b4cd2 8867/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8868
d2e4a39e
AS
8869static struct value *
8870value_val_atr (struct type *type, struct value *arg)
14f9c5c9 8871{
d2e4a39e 8872 if (!discrete_type_p (type))
323e0a4a 8873 error (_("'VAL only defined on discrete types"));
df407dfe 8874 if (!integer_type_p (value_type (arg)))
323e0a4a 8875 error (_("'VAL requires integral argument"));
14f9c5c9
AS
8876
8877 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8878 {
8879 long pos = value_as_long (arg);
5b4ee69b 8880
14f9c5c9 8881 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 8882 error (_("argument to 'VAL out of range"));
14e75d8e 8883 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
8884 }
8885 else
8886 return value_from_longest (type, value_as_long (arg));
8887}
14f9c5c9 8888\f
d2e4a39e 8889
4c4b4cd2 8890 /* Evaluation */
14f9c5c9 8891
4c4b4cd2
PH
8892/* True if TYPE appears to be an Ada character type.
8893 [At the moment, this is true only for Character and Wide_Character;
8894 It is a heuristic test that could stand improvement]. */
14f9c5c9 8895
d2e4a39e
AS
8896int
8897ada_is_character_type (struct type *type)
14f9c5c9 8898{
7b9f71f2
JB
8899 const char *name;
8900
8901 /* If the type code says it's a character, then assume it really is,
8902 and don't check any further. */
8903 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
8904 return 1;
8905
8906 /* Otherwise, assume it's a character type iff it is a discrete type
8907 with a known character type name. */
8908 name = ada_type_name (type);
8909 return (name != NULL
8910 && (TYPE_CODE (type) == TYPE_CODE_INT
8911 || TYPE_CODE (type) == TYPE_CODE_RANGE)
8912 && (strcmp (name, "character") == 0
8913 || strcmp (name, "wide_character") == 0
5a517ebd 8914 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 8915 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
8916}
8917
4c4b4cd2 8918/* True if TYPE appears to be an Ada string type. */
14f9c5c9
AS
8919
8920int
ebf56fd3 8921ada_is_string_type (struct type *type)
14f9c5c9 8922{
61ee279c 8923 type = ada_check_typedef (type);
d2e4a39e 8924 if (type != NULL
14f9c5c9 8925 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
8926 && (ada_is_simple_array_type (type)
8927 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
8928 && ada_array_arity (type) == 1)
8929 {
8930 struct type *elttype = ada_array_element_type (type, 1);
8931
8932 return ada_is_character_type (elttype);
8933 }
d2e4a39e 8934 else
14f9c5c9
AS
8935 return 0;
8936}
8937
5bf03f13
JB
8938/* The compiler sometimes provides a parallel XVS type for a given
8939 PAD type. Normally, it is safe to follow the PAD type directly,
8940 but older versions of the compiler have a bug that causes the offset
8941 of its "F" field to be wrong. Following that field in that case
8942 would lead to incorrect results, but this can be worked around
8943 by ignoring the PAD type and using the associated XVS type instead.
8944
8945 Set to True if the debugger should trust the contents of PAD types.
8946 Otherwise, ignore the PAD type if there is a parallel XVS type. */
8947static int trust_pad_over_xvs = 1;
14f9c5c9
AS
8948
8949/* True if TYPE is a struct type introduced by the compiler to force the
8950 alignment of a value. Such types have a single field with a
4c4b4cd2 8951 distinctive name. */
14f9c5c9
AS
8952
8953int
ebf56fd3 8954ada_is_aligner_type (struct type *type)
14f9c5c9 8955{
61ee279c 8956 type = ada_check_typedef (type);
714e53ab 8957
5bf03f13 8958 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
8959 return 0;
8960
14f9c5c9 8961 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
8962 && TYPE_NFIELDS (type) == 1
8963 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
8964}
8965
8966/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 8967 the parallel type. */
14f9c5c9 8968
d2e4a39e
AS
8969struct type *
8970ada_get_base_type (struct type *raw_type)
14f9c5c9 8971{
d2e4a39e
AS
8972 struct type *real_type_namer;
8973 struct type *raw_real_type;
14f9c5c9
AS
8974
8975 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
8976 return raw_type;
8977
284614f0
JB
8978 if (ada_is_aligner_type (raw_type))
8979 /* The encoding specifies that we should always use the aligner type.
8980 So, even if this aligner type has an associated XVS type, we should
8981 simply ignore it.
8982
8983 According to the compiler gurus, an XVS type parallel to an aligner
8984 type may exist because of a stabs limitation. In stabs, aligner
8985 types are empty because the field has a variable-sized type, and
8986 thus cannot actually be used as an aligner type. As a result,
8987 we need the associated parallel XVS type to decode the type.
8988 Since the policy in the compiler is to not change the internal
8989 representation based on the debugging info format, we sometimes
8990 end up having a redundant XVS type parallel to the aligner type. */
8991 return raw_type;
8992
14f9c5c9 8993 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 8994 if (real_type_namer == NULL
14f9c5c9
AS
8995 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
8996 || TYPE_NFIELDS (real_type_namer) != 1)
8997 return raw_type;
8998
f80d3ff2
JB
8999 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9000 {
9001 /* This is an older encoding form where the base type needs to be
9002 looked up by name. We prefer the newer enconding because it is
9003 more efficient. */
9004 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9005 if (raw_real_type == NULL)
9006 return raw_type;
9007 else
9008 return raw_real_type;
9009 }
9010
9011 /* The field in our XVS type is a reference to the base type. */
9012 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9013}
14f9c5c9 9014
4c4b4cd2 9015/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9016
d2e4a39e
AS
9017struct type *
9018ada_aligned_type (struct type *type)
14f9c5c9
AS
9019{
9020 if (ada_is_aligner_type (type))
9021 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9022 else
9023 return ada_get_base_type (type);
9024}
9025
9026
9027/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9028 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9029
fc1a4b47
AC
9030const gdb_byte *
9031ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9032{
d2e4a39e 9033 if (ada_is_aligner_type (type))
14f9c5c9 9034 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9035 valaddr +
9036 TYPE_FIELD_BITPOS (type,
9037 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9038 else
9039 return valaddr;
9040}
9041
4c4b4cd2
PH
9042
9043
14f9c5c9 9044/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9045 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9046const char *
9047ada_enum_name (const char *name)
14f9c5c9 9048{
4c4b4cd2
PH
9049 static char *result;
9050 static size_t result_len = 0;
d2e4a39e 9051 char *tmp;
14f9c5c9 9052
4c4b4cd2
PH
9053 /* First, unqualify the enumeration name:
9054 1. Search for the last '.' character. If we find one, then skip
177b42fe 9055 all the preceding characters, the unqualified name starts
76a01679 9056 right after that dot.
4c4b4cd2 9057 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9058 translates dots into "__". Search forward for double underscores,
9059 but stop searching when we hit an overloading suffix, which is
9060 of the form "__" followed by digits. */
4c4b4cd2 9061
c3e5cd34
PH
9062 tmp = strrchr (name, '.');
9063 if (tmp != NULL)
4c4b4cd2
PH
9064 name = tmp + 1;
9065 else
14f9c5c9 9066 {
4c4b4cd2
PH
9067 while ((tmp = strstr (name, "__")) != NULL)
9068 {
9069 if (isdigit (tmp[2]))
9070 break;
9071 else
9072 name = tmp + 2;
9073 }
14f9c5c9
AS
9074 }
9075
9076 if (name[0] == 'Q')
9077 {
14f9c5c9 9078 int v;
5b4ee69b 9079
14f9c5c9 9080 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9081 {
9082 if (sscanf (name + 2, "%x", &v) != 1)
9083 return name;
9084 }
14f9c5c9 9085 else
4c4b4cd2 9086 return name;
14f9c5c9 9087
4c4b4cd2 9088 GROW_VECT (result, result_len, 16);
14f9c5c9 9089 if (isascii (v) && isprint (v))
88c15c34 9090 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9091 else if (name[1] == 'U')
88c15c34 9092 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9093 else
88c15c34 9094 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9095
9096 return result;
9097 }
d2e4a39e 9098 else
4c4b4cd2 9099 {
c3e5cd34
PH
9100 tmp = strstr (name, "__");
9101 if (tmp == NULL)
9102 tmp = strstr (name, "$");
9103 if (tmp != NULL)
4c4b4cd2
PH
9104 {
9105 GROW_VECT (result, result_len, tmp - name + 1);
9106 strncpy (result, name, tmp - name);
9107 result[tmp - name] = '\0';
9108 return result;
9109 }
9110
9111 return name;
9112 }
14f9c5c9
AS
9113}
9114
14f9c5c9
AS
9115/* Evaluate the subexpression of EXP starting at *POS as for
9116 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9117 expression. */
14f9c5c9 9118
d2e4a39e
AS
9119static struct value *
9120evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9121{
4b27a620 9122 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9123}
9124
9125/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9126 value it wraps. */
14f9c5c9 9127
d2e4a39e
AS
9128static struct value *
9129unwrap_value (struct value *val)
14f9c5c9 9130{
df407dfe 9131 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9132
14f9c5c9
AS
9133 if (ada_is_aligner_type (type))
9134 {
de4d072f 9135 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9136 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9137
14f9c5c9 9138 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9139 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9140
9141 return unwrap_value (v);
9142 }
d2e4a39e 9143 else
14f9c5c9 9144 {
d2e4a39e 9145 struct type *raw_real_type =
61ee279c 9146 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9147
5bf03f13
JB
9148 /* If there is no parallel XVS or XVE type, then the value is
9149 already unwrapped. Return it without further modification. */
9150 if ((type == raw_real_type)
9151 && ada_find_parallel_type (type, "___XVE") == NULL)
9152 return val;
14f9c5c9 9153
d2e4a39e 9154 return
4c4b4cd2
PH
9155 coerce_unspec_val_to_type
9156 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9157 value_address (val),
1ed6ede0 9158 NULL, 1));
14f9c5c9
AS
9159 }
9160}
d2e4a39e
AS
9161
9162static struct value *
9163cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9
AS
9164{
9165 LONGEST val;
9166
df407dfe 9167 if (type == value_type (arg))
14f9c5c9 9168 return arg;
df407dfe 9169 else if (ada_is_fixed_point_type (value_type (arg)))
d2e4a39e 9170 val = ada_float_to_fixed (type,
df407dfe 9171 ada_fixed_to_float (value_type (arg),
4c4b4cd2 9172 value_as_long (arg)));
d2e4a39e 9173 else
14f9c5c9 9174 {
a53b7a21 9175 DOUBLEST argd = value_as_double (arg);
5b4ee69b 9176
14f9c5c9
AS
9177 val = ada_float_to_fixed (type, argd);
9178 }
9179
9180 return value_from_longest (type, val);
9181}
9182
d2e4a39e 9183static struct value *
a53b7a21 9184cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9185{
df407dfe 9186 DOUBLEST val = ada_fixed_to_float (value_type (arg),
4c4b4cd2 9187 value_as_long (arg));
5b4ee69b 9188
a53b7a21 9189 return value_from_double (type, val);
14f9c5c9
AS
9190}
9191
d99dcf51
JB
9192/* Given two array types T1 and T2, return nonzero iff both arrays
9193 contain the same number of elements. */
9194
9195static int
9196ada_same_array_size_p (struct type *t1, struct type *t2)
9197{
9198 LONGEST lo1, hi1, lo2, hi2;
9199
9200 /* Get the array bounds in order to verify that the size of
9201 the two arrays match. */
9202 if (!get_array_bounds (t1, &lo1, &hi1)
9203 || !get_array_bounds (t2, &lo2, &hi2))
9204 error (_("unable to determine array bounds"));
9205
9206 /* To make things easier for size comparison, normalize a bit
9207 the case of empty arrays by making sure that the difference
9208 between upper bound and lower bound is always -1. */
9209 if (lo1 > hi1)
9210 hi1 = lo1 - 1;
9211 if (lo2 > hi2)
9212 hi2 = lo2 - 1;
9213
9214 return (hi1 - lo1 == hi2 - lo2);
9215}
9216
9217/* Assuming that VAL is an array of integrals, and TYPE represents
9218 an array with the same number of elements, but with wider integral
9219 elements, return an array "casted" to TYPE. In practice, this
9220 means that the returned array is built by casting each element
9221 of the original array into TYPE's (wider) element type. */
9222
9223static struct value *
9224ada_promote_array_of_integrals (struct type *type, struct value *val)
9225{
9226 struct type *elt_type = TYPE_TARGET_TYPE (type);
9227 LONGEST lo, hi;
9228 struct value *res;
9229 LONGEST i;
9230
9231 /* Verify that both val and type are arrays of scalars, and
9232 that the size of val's elements is smaller than the size
9233 of type's element. */
9234 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9235 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9236 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9237 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9238 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9239 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9240
9241 if (!get_array_bounds (type, &lo, &hi))
9242 error (_("unable to determine array bounds"));
9243
9244 res = allocate_value (type);
9245
9246 /* Promote each array element. */
9247 for (i = 0; i < hi - lo + 1; i++)
9248 {
9249 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9250
9251 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9252 value_contents_all (elt), TYPE_LENGTH (elt_type));
9253 }
9254
9255 return res;
9256}
9257
4c4b4cd2
PH
9258/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9259 return the converted value. */
9260
d2e4a39e
AS
9261static struct value *
9262coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9263{
df407dfe 9264 struct type *type2 = value_type (val);
5b4ee69b 9265
14f9c5c9
AS
9266 if (type == type2)
9267 return val;
9268
61ee279c
PH
9269 type2 = ada_check_typedef (type2);
9270 type = ada_check_typedef (type);
14f9c5c9 9271
d2e4a39e
AS
9272 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9273 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9274 {
9275 val = ada_value_ind (val);
df407dfe 9276 type2 = value_type (val);
14f9c5c9
AS
9277 }
9278
d2e4a39e 9279 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9280 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9281 {
d99dcf51
JB
9282 if (!ada_same_array_size_p (type, type2))
9283 error (_("cannot assign arrays of different length"));
9284
9285 if (is_integral_type (TYPE_TARGET_TYPE (type))
9286 && is_integral_type (TYPE_TARGET_TYPE (type2))
9287 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9288 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9289 {
9290 /* Allow implicit promotion of the array elements to
9291 a wider type. */
9292 return ada_promote_array_of_integrals (type, val);
9293 }
9294
9295 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9296 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9297 error (_("Incompatible types in assignment"));
04624583 9298 deprecated_set_value_type (val, type);
14f9c5c9 9299 }
d2e4a39e 9300 return val;
14f9c5c9
AS
9301}
9302
4c4b4cd2
PH
9303static struct value *
9304ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9305{
9306 struct value *val;
9307 struct type *type1, *type2;
9308 LONGEST v, v1, v2;
9309
994b9211
AC
9310 arg1 = coerce_ref (arg1);
9311 arg2 = coerce_ref (arg2);
18af8284
JB
9312 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9313 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9314
76a01679
JB
9315 if (TYPE_CODE (type1) != TYPE_CODE_INT
9316 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9317 return value_binop (arg1, arg2, op);
9318
76a01679 9319 switch (op)
4c4b4cd2
PH
9320 {
9321 case BINOP_MOD:
9322 case BINOP_DIV:
9323 case BINOP_REM:
9324 break;
9325 default:
9326 return value_binop (arg1, arg2, op);
9327 }
9328
9329 v2 = value_as_long (arg2);
9330 if (v2 == 0)
323e0a4a 9331 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9332
9333 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9334 return value_binop (arg1, arg2, op);
9335
9336 v1 = value_as_long (arg1);
9337 switch (op)
9338 {
9339 case BINOP_DIV:
9340 v = v1 / v2;
76a01679
JB
9341 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9342 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9343 break;
9344 case BINOP_REM:
9345 v = v1 % v2;
76a01679
JB
9346 if (v * v1 < 0)
9347 v -= v2;
4c4b4cd2
PH
9348 break;
9349 default:
9350 /* Should not reach this point. */
9351 v = 0;
9352 }
9353
9354 val = allocate_value (type1);
990a07ab 9355 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9356 TYPE_LENGTH (value_type (val)),
9357 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9358 return val;
9359}
9360
9361static int
9362ada_value_equal (struct value *arg1, struct value *arg2)
9363{
df407dfe
AC
9364 if (ada_is_direct_array_type (value_type (arg1))
9365 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9366 {
f58b38bf
JB
9367 /* Automatically dereference any array reference before
9368 we attempt to perform the comparison. */
9369 arg1 = ada_coerce_ref (arg1);
9370 arg2 = ada_coerce_ref (arg2);
9371
4c4b4cd2
PH
9372 arg1 = ada_coerce_to_simple_array (arg1);
9373 arg2 = ada_coerce_to_simple_array (arg2);
df407dfe
AC
9374 if (TYPE_CODE (value_type (arg1)) != TYPE_CODE_ARRAY
9375 || TYPE_CODE (value_type (arg2)) != TYPE_CODE_ARRAY)
323e0a4a 9376 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9377 /* FIXME: The following works only for types whose
76a01679
JB
9378 representations use all bits (no padding or undefined bits)
9379 and do not have user-defined equality. */
9380 return
df407dfe 9381 TYPE_LENGTH (value_type (arg1)) == TYPE_LENGTH (value_type (arg2))
0fd88904 9382 && memcmp (value_contents (arg1), value_contents (arg2),
df407dfe 9383 TYPE_LENGTH (value_type (arg1))) == 0;
4c4b4cd2
PH
9384 }
9385 return value_equal (arg1, arg2);
9386}
9387
52ce6436
PH
9388/* Total number of component associations in the aggregate starting at
9389 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9390 OP_AGGREGATE. */
52ce6436
PH
9391
9392static int
9393num_component_specs (struct expression *exp, int pc)
9394{
9395 int n, m, i;
5b4ee69b 9396
52ce6436
PH
9397 m = exp->elts[pc + 1].longconst;
9398 pc += 3;
9399 n = 0;
9400 for (i = 0; i < m; i += 1)
9401 {
9402 switch (exp->elts[pc].opcode)
9403 {
9404 default:
9405 n += 1;
9406 break;
9407 case OP_CHOICES:
9408 n += exp->elts[pc + 1].longconst;
9409 break;
9410 }
9411 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9412 }
9413 return n;
9414}
9415
9416/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9417 component of LHS (a simple array or a record), updating *POS past
9418 the expression, assuming that LHS is contained in CONTAINER. Does
9419 not modify the inferior's memory, nor does it modify LHS (unless
9420 LHS == CONTAINER). */
9421
9422static void
9423assign_component (struct value *container, struct value *lhs, LONGEST index,
9424 struct expression *exp, int *pos)
9425{
9426 struct value *mark = value_mark ();
9427 struct value *elt;
5b4ee69b 9428
52ce6436
PH
9429 if (TYPE_CODE (value_type (lhs)) == TYPE_CODE_ARRAY)
9430 {
22601c15
UW
9431 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9432 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9433
52ce6436
PH
9434 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9435 }
9436 else
9437 {
9438 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9439 elt = ada_to_fixed_value (elt);
52ce6436
PH
9440 }
9441
9442 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9443 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9444 else
9445 value_assign_to_component (container, elt,
9446 ada_evaluate_subexp (NULL, exp, pos,
9447 EVAL_NORMAL));
9448
9449 value_free_to_mark (mark);
9450}
9451
9452/* Assuming that LHS represents an lvalue having a record or array
9453 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9454 of that aggregate's value to LHS, advancing *POS past the
9455 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9456 lvalue containing LHS (possibly LHS itself). Does not modify
9457 the inferior's memory, nor does it modify the contents of
0963b4bd 9458 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9459
9460static struct value *
9461assign_aggregate (struct value *container,
9462 struct value *lhs, struct expression *exp,
9463 int *pos, enum noside noside)
9464{
9465 struct type *lhs_type;
9466 int n = exp->elts[*pos+1].longconst;
9467 LONGEST low_index, high_index;
9468 int num_specs;
9469 LONGEST *indices;
9470 int max_indices, num_indices;
52ce6436 9471 int i;
52ce6436
PH
9472
9473 *pos += 3;
9474 if (noside != EVAL_NORMAL)
9475 {
52ce6436
PH
9476 for (i = 0; i < n; i += 1)
9477 ada_evaluate_subexp (NULL, exp, pos, noside);
9478 return container;
9479 }
9480
9481 container = ada_coerce_ref (container);
9482 if (ada_is_direct_array_type (value_type (container)))
9483 container = ada_coerce_to_simple_array (container);
9484 lhs = ada_coerce_ref (lhs);
9485 if (!deprecated_value_modifiable (lhs))
9486 error (_("Left operand of assignment is not a modifiable lvalue."));
9487
9488 lhs_type = value_type (lhs);
9489 if (ada_is_direct_array_type (lhs_type))
9490 {
9491 lhs = ada_coerce_to_simple_array (lhs);
9492 lhs_type = value_type (lhs);
9493 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9494 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9495 }
9496 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9497 {
9498 low_index = 0;
9499 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9500 }
9501 else
9502 error (_("Left-hand side must be array or record."));
9503
9504 num_specs = num_component_specs (exp, *pos - 3);
9505 max_indices = 4 * num_specs + 4;
9506 indices = alloca (max_indices * sizeof (indices[0]));
9507 indices[0] = indices[1] = low_index - 1;
9508 indices[2] = indices[3] = high_index + 1;
9509 num_indices = 4;
9510
9511 for (i = 0; i < n; i += 1)
9512 {
9513 switch (exp->elts[*pos].opcode)
9514 {
1fbf5ada
JB
9515 case OP_CHOICES:
9516 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9517 &num_indices, max_indices,
9518 low_index, high_index);
9519 break;
9520 case OP_POSITIONAL:
9521 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9522 &num_indices, max_indices,
9523 low_index, high_index);
1fbf5ada
JB
9524 break;
9525 case OP_OTHERS:
9526 if (i != n-1)
9527 error (_("Misplaced 'others' clause"));
9528 aggregate_assign_others (container, lhs, exp, pos, indices,
9529 num_indices, low_index, high_index);
9530 break;
9531 default:
9532 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9533 }
9534 }
9535
9536 return container;
9537}
9538
9539/* Assign into the component of LHS indexed by the OP_POSITIONAL
9540 construct at *POS, updating *POS past the construct, given that
9541 the positions are relative to lower bound LOW, where HIGH is the
9542 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9543 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9544 assign_aggregate. */
52ce6436
PH
9545static void
9546aggregate_assign_positional (struct value *container,
9547 struct value *lhs, struct expression *exp,
9548 int *pos, LONGEST *indices, int *num_indices,
9549 int max_indices, LONGEST low, LONGEST high)
9550{
9551 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9552
9553 if (ind - 1 == high)
e1d5a0d2 9554 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9555 if (ind <= high)
9556 {
9557 add_component_interval (ind, ind, indices, num_indices, max_indices);
9558 *pos += 3;
9559 assign_component (container, lhs, ind, exp, pos);
9560 }
9561 else
9562 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9563}
9564
9565/* Assign into the components of LHS indexed by the OP_CHOICES
9566 construct at *POS, updating *POS past the construct, given that
9567 the allowable indices are LOW..HIGH. Record the indices assigned
9568 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9569 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9570static void
9571aggregate_assign_from_choices (struct value *container,
9572 struct value *lhs, struct expression *exp,
9573 int *pos, LONGEST *indices, int *num_indices,
9574 int max_indices, LONGEST low, LONGEST high)
9575{
9576 int j;
9577 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9578 int choice_pos, expr_pc;
9579 int is_array = ada_is_direct_array_type (value_type (lhs));
9580
9581 choice_pos = *pos += 3;
9582
9583 for (j = 0; j < n_choices; j += 1)
9584 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9585 expr_pc = *pos;
9586 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9587
9588 for (j = 0; j < n_choices; j += 1)
9589 {
9590 LONGEST lower, upper;
9591 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9592
52ce6436
PH
9593 if (op == OP_DISCRETE_RANGE)
9594 {
9595 choice_pos += 1;
9596 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9597 EVAL_NORMAL));
9598 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9599 EVAL_NORMAL));
9600 }
9601 else if (is_array)
9602 {
9603 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9604 EVAL_NORMAL));
9605 upper = lower;
9606 }
9607 else
9608 {
9609 int ind;
0d5cff50 9610 const char *name;
5b4ee69b 9611
52ce6436
PH
9612 switch (op)
9613 {
9614 case OP_NAME:
9615 name = &exp->elts[choice_pos + 2].string;
9616 break;
9617 case OP_VAR_VALUE:
9618 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9619 break;
9620 default:
9621 error (_("Invalid record component association."));
9622 }
9623 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9624 ind = 0;
9625 if (! find_struct_field (name, value_type (lhs), 0,
9626 NULL, NULL, NULL, NULL, &ind))
9627 error (_("Unknown component name: %s."), name);
9628 lower = upper = ind;
9629 }
9630
9631 if (lower <= upper && (lower < low || upper > high))
9632 error (_("Index in component association out of bounds."));
9633
9634 add_component_interval (lower, upper, indices, num_indices,
9635 max_indices);
9636 while (lower <= upper)
9637 {
9638 int pos1;
5b4ee69b 9639
52ce6436
PH
9640 pos1 = expr_pc;
9641 assign_component (container, lhs, lower, exp, &pos1);
9642 lower += 1;
9643 }
9644 }
9645}
9646
9647/* Assign the value of the expression in the OP_OTHERS construct in
9648 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9649 have not been previously assigned. The index intervals already assigned
9650 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9651 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9652static void
9653aggregate_assign_others (struct value *container,
9654 struct value *lhs, struct expression *exp,
9655 int *pos, LONGEST *indices, int num_indices,
9656 LONGEST low, LONGEST high)
9657{
9658 int i;
5ce64950 9659 int expr_pc = *pos + 1;
52ce6436
PH
9660
9661 for (i = 0; i < num_indices - 2; i += 2)
9662 {
9663 LONGEST ind;
5b4ee69b 9664
52ce6436
PH
9665 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9666 {
5ce64950 9667 int localpos;
5b4ee69b 9668
5ce64950
MS
9669 localpos = expr_pc;
9670 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9671 }
9672 }
9673 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9674}
9675
9676/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9677 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9678 modifying *SIZE as needed. It is an error if *SIZE exceeds
9679 MAX_SIZE. The resulting intervals do not overlap. */
9680static void
9681add_component_interval (LONGEST low, LONGEST high,
9682 LONGEST* indices, int *size, int max_size)
9683{
9684 int i, j;
5b4ee69b 9685
52ce6436
PH
9686 for (i = 0; i < *size; i += 2) {
9687 if (high >= indices[i] && low <= indices[i + 1])
9688 {
9689 int kh;
5b4ee69b 9690
52ce6436
PH
9691 for (kh = i + 2; kh < *size; kh += 2)
9692 if (high < indices[kh])
9693 break;
9694 if (low < indices[i])
9695 indices[i] = low;
9696 indices[i + 1] = indices[kh - 1];
9697 if (high > indices[i + 1])
9698 indices[i + 1] = high;
9699 memcpy (indices + i + 2, indices + kh, *size - kh);
9700 *size -= kh - i - 2;
9701 return;
9702 }
9703 else if (high < indices[i])
9704 break;
9705 }
9706
9707 if (*size == max_size)
9708 error (_("Internal error: miscounted aggregate components."));
9709 *size += 2;
9710 for (j = *size-1; j >= i+2; j -= 1)
9711 indices[j] = indices[j - 2];
9712 indices[i] = low;
9713 indices[i + 1] = high;
9714}
9715
6e48bd2c
JB
9716/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9717 is different. */
9718
9719static struct value *
9720ada_value_cast (struct type *type, struct value *arg2, enum noside noside)
9721{
9722 if (type == ada_check_typedef (value_type (arg2)))
9723 return arg2;
9724
9725 if (ada_is_fixed_point_type (type))
9726 return (cast_to_fixed (type, arg2));
9727
9728 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 9729 return cast_from_fixed (type, arg2);
6e48bd2c
JB
9730
9731 return value_cast (type, arg2);
9732}
9733
284614f0
JB
9734/* Evaluating Ada expressions, and printing their result.
9735 ------------------------------------------------------
9736
21649b50
JB
9737 1. Introduction:
9738 ----------------
9739
284614f0
JB
9740 We usually evaluate an Ada expression in order to print its value.
9741 We also evaluate an expression in order to print its type, which
9742 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9743 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9744 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9745 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9746 similar.
9747
9748 Evaluating expressions is a little more complicated for Ada entities
9749 than it is for entities in languages such as C. The main reason for
9750 this is that Ada provides types whose definition might be dynamic.
9751 One example of such types is variant records. Or another example
9752 would be an array whose bounds can only be known at run time.
9753
9754 The following description is a general guide as to what should be
9755 done (and what should NOT be done) in order to evaluate an expression
9756 involving such types, and when. This does not cover how the semantic
9757 information is encoded by GNAT as this is covered separatly. For the
9758 document used as the reference for the GNAT encoding, see exp_dbug.ads
9759 in the GNAT sources.
9760
9761 Ideally, we should embed each part of this description next to its
9762 associated code. Unfortunately, the amount of code is so vast right
9763 now that it's hard to see whether the code handling a particular
9764 situation might be duplicated or not. One day, when the code is
9765 cleaned up, this guide might become redundant with the comments
9766 inserted in the code, and we might want to remove it.
9767
21649b50
JB
9768 2. ``Fixing'' an Entity, the Simple Case:
9769 -----------------------------------------
9770
284614f0
JB
9771 When evaluating Ada expressions, the tricky issue is that they may
9772 reference entities whose type contents and size are not statically
9773 known. Consider for instance a variant record:
9774
9775 type Rec (Empty : Boolean := True) is record
9776 case Empty is
9777 when True => null;
9778 when False => Value : Integer;
9779 end case;
9780 end record;
9781 Yes : Rec := (Empty => False, Value => 1);
9782 No : Rec := (empty => True);
9783
9784 The size and contents of that record depends on the value of the
9785 descriminant (Rec.Empty). At this point, neither the debugging
9786 information nor the associated type structure in GDB are able to
9787 express such dynamic types. So what the debugger does is to create
9788 "fixed" versions of the type that applies to the specific object.
9789 We also informally refer to this opperation as "fixing" an object,
9790 which means creating its associated fixed type.
9791
9792 Example: when printing the value of variable "Yes" above, its fixed
9793 type would look like this:
9794
9795 type Rec is record
9796 Empty : Boolean;
9797 Value : Integer;
9798 end record;
9799
9800 On the other hand, if we printed the value of "No", its fixed type
9801 would become:
9802
9803 type Rec is record
9804 Empty : Boolean;
9805 end record;
9806
9807 Things become a little more complicated when trying to fix an entity
9808 with a dynamic type that directly contains another dynamic type,
9809 such as an array of variant records, for instance. There are
9810 two possible cases: Arrays, and records.
9811
21649b50
JB
9812 3. ``Fixing'' Arrays:
9813 ---------------------
9814
9815 The type structure in GDB describes an array in terms of its bounds,
9816 and the type of its elements. By design, all elements in the array
9817 have the same type and we cannot represent an array of variant elements
9818 using the current type structure in GDB. When fixing an array,
9819 we cannot fix the array element, as we would potentially need one
9820 fixed type per element of the array. As a result, the best we can do
9821 when fixing an array is to produce an array whose bounds and size
9822 are correct (allowing us to read it from memory), but without having
9823 touched its element type. Fixing each element will be done later,
9824 when (if) necessary.
9825
9826 Arrays are a little simpler to handle than records, because the same
9827 amount of memory is allocated for each element of the array, even if
1b536f04 9828 the amount of space actually used by each element differs from element
21649b50 9829 to element. Consider for instance the following array of type Rec:
284614f0
JB
9830
9831 type Rec_Array is array (1 .. 2) of Rec;
9832
1b536f04
JB
9833 The actual amount of memory occupied by each element might be different
9834 from element to element, depending on the value of their discriminant.
21649b50 9835 But the amount of space reserved for each element in the array remains
1b536f04 9836 fixed regardless. So we simply need to compute that size using
21649b50
JB
9837 the debugging information available, from which we can then determine
9838 the array size (we multiply the number of elements of the array by
9839 the size of each element).
9840
9841 The simplest case is when we have an array of a constrained element
9842 type. For instance, consider the following type declarations:
9843
9844 type Bounded_String (Max_Size : Integer) is
9845 Length : Integer;
9846 Buffer : String (1 .. Max_Size);
9847 end record;
9848 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
9849
9850 In this case, the compiler describes the array as an array of
9851 variable-size elements (identified by its XVS suffix) for which
9852 the size can be read in the parallel XVZ variable.
9853
9854 In the case of an array of an unconstrained element type, the compiler
9855 wraps the array element inside a private PAD type. This type should not
9856 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9857 that we also use the adjective "aligner" in our code to designate
9858 these wrapper types.
9859
1b536f04 9860 In some cases, the size allocated for each element is statically
21649b50
JB
9861 known. In that case, the PAD type already has the correct size,
9862 and the array element should remain unfixed.
9863
9864 But there are cases when this size is not statically known.
9865 For instance, assuming that "Five" is an integer variable:
284614f0
JB
9866
9867 type Dynamic is array (1 .. Five) of Integer;
9868 type Wrapper (Has_Length : Boolean := False) is record
9869 Data : Dynamic;
9870 case Has_Length is
9871 when True => Length : Integer;
9872 when False => null;
9873 end case;
9874 end record;
9875 type Wrapper_Array is array (1 .. 2) of Wrapper;
9876
9877 Hello : Wrapper_Array := (others => (Has_Length => True,
9878 Data => (others => 17),
9879 Length => 1));
9880
9881
9882 The debugging info would describe variable Hello as being an
9883 array of a PAD type. The size of that PAD type is not statically
9884 known, but can be determined using a parallel XVZ variable.
9885 In that case, a copy of the PAD type with the correct size should
9886 be used for the fixed array.
9887
21649b50
JB
9888 3. ``Fixing'' record type objects:
9889 ----------------------------------
9890
9891 Things are slightly different from arrays in the case of dynamic
284614f0
JB
9892 record types. In this case, in order to compute the associated
9893 fixed type, we need to determine the size and offset of each of
9894 its components. This, in turn, requires us to compute the fixed
9895 type of each of these components.
9896
9897 Consider for instance the example:
9898
9899 type Bounded_String (Max_Size : Natural) is record
9900 Str : String (1 .. Max_Size);
9901 Length : Natural;
9902 end record;
9903 My_String : Bounded_String (Max_Size => 10);
9904
9905 In that case, the position of field "Length" depends on the size
9906 of field Str, which itself depends on the value of the Max_Size
21649b50 9907 discriminant. In order to fix the type of variable My_String,
284614f0
JB
9908 we need to fix the type of field Str. Therefore, fixing a variant
9909 record requires us to fix each of its components.
9910
9911 However, if a component does not have a dynamic size, the component
9912 should not be fixed. In particular, fields that use a PAD type
9913 should not fixed. Here is an example where this might happen
9914 (assuming type Rec above):
9915
9916 type Container (Big : Boolean) is record
9917 First : Rec;
9918 After : Integer;
9919 case Big is
9920 when True => Another : Integer;
9921 when False => null;
9922 end case;
9923 end record;
9924 My_Container : Container := (Big => False,
9925 First => (Empty => True),
9926 After => 42);
9927
9928 In that example, the compiler creates a PAD type for component First,
9929 whose size is constant, and then positions the component After just
9930 right after it. The offset of component After is therefore constant
9931 in this case.
9932
9933 The debugger computes the position of each field based on an algorithm
9934 that uses, among other things, the actual position and size of the field
21649b50
JB
9935 preceding it. Let's now imagine that the user is trying to print
9936 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
9937 end up computing the offset of field After based on the size of the
9938 fixed version of field First. And since in our example First has
9939 only one actual field, the size of the fixed type is actually smaller
9940 than the amount of space allocated to that field, and thus we would
9941 compute the wrong offset of field After.
9942
21649b50
JB
9943 To make things more complicated, we need to watch out for dynamic
9944 components of variant records (identified by the ___XVL suffix in
9945 the component name). Even if the target type is a PAD type, the size
9946 of that type might not be statically known. So the PAD type needs
9947 to be unwrapped and the resulting type needs to be fixed. Otherwise,
9948 we might end up with the wrong size for our component. This can be
9949 observed with the following type declarations:
284614f0
JB
9950
9951 type Octal is new Integer range 0 .. 7;
9952 type Octal_Array is array (Positive range <>) of Octal;
9953 pragma Pack (Octal_Array);
9954
9955 type Octal_Buffer (Size : Positive) is record
9956 Buffer : Octal_Array (1 .. Size);
9957 Length : Integer;
9958 end record;
9959
9960 In that case, Buffer is a PAD type whose size is unset and needs
9961 to be computed by fixing the unwrapped type.
9962
21649b50
JB
9963 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
9964 ----------------------------------------------------------
9965
9966 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
9967 thus far, be actually fixed?
9968
9969 The answer is: Only when referencing that element. For instance
9970 when selecting one component of a record, this specific component
9971 should be fixed at that point in time. Or when printing the value
9972 of a record, each component should be fixed before its value gets
9973 printed. Similarly for arrays, the element of the array should be
9974 fixed when printing each element of the array, or when extracting
9975 one element out of that array. On the other hand, fixing should
9976 not be performed on the elements when taking a slice of an array!
9977
9978 Note that one of the side-effects of miscomputing the offset and
9979 size of each field is that we end up also miscomputing the size
9980 of the containing type. This can have adverse results when computing
9981 the value of an entity. GDB fetches the value of an entity based
9982 on the size of its type, and thus a wrong size causes GDB to fetch
9983 the wrong amount of memory. In the case where the computed size is
9984 too small, GDB fetches too little data to print the value of our
9985 entiry. Results in this case as unpredicatble, as we usually read
9986 past the buffer containing the data =:-o. */
9987
9988/* Implement the evaluate_exp routine in the exp_descriptor structure
9989 for the Ada language. */
9990
52ce6436 9991static struct value *
ebf56fd3 9992ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 9993 int *pos, enum noside noside)
14f9c5c9
AS
9994{
9995 enum exp_opcode op;
b5385fc0 9996 int tem;
14f9c5c9 9997 int pc;
5ec18f2b 9998 int preeval_pos;
14f9c5c9
AS
9999 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10000 struct type *type;
52ce6436 10001 int nargs, oplen;
d2e4a39e 10002 struct value **argvec;
14f9c5c9 10003
d2e4a39e
AS
10004 pc = *pos;
10005 *pos += 1;
14f9c5c9
AS
10006 op = exp->elts[pc].opcode;
10007
d2e4a39e 10008 switch (op)
14f9c5c9
AS
10009 {
10010 default:
10011 *pos -= 1;
6e48bd2c 10012 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10013
10014 if (noside == EVAL_NORMAL)
10015 arg1 = unwrap_value (arg1);
6e48bd2c
JB
10016
10017 /* If evaluating an OP_DOUBLE and an EXPECT_TYPE was provided,
10018 then we need to perform the conversion manually, because
10019 evaluate_subexp_standard doesn't do it. This conversion is
10020 necessary in Ada because the different kinds of float/fixed
10021 types in Ada have different representations.
10022
10023 Similarly, we need to perform the conversion from OP_LONG
10024 ourselves. */
10025 if ((op == OP_DOUBLE || op == OP_LONG) && expect_type != NULL)
10026 arg1 = ada_value_cast (expect_type, arg1, noside);
10027
10028 return arg1;
4c4b4cd2
PH
10029
10030 case OP_STRING:
10031 {
76a01679 10032 struct value *result;
5b4ee69b 10033
76a01679
JB
10034 *pos -= 1;
10035 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10036 /* The result type will have code OP_STRING, bashed there from
10037 OP_ARRAY. Bash it back. */
df407dfe
AC
10038 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10039 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10040 return result;
4c4b4cd2 10041 }
14f9c5c9
AS
10042
10043 case UNOP_CAST:
10044 (*pos) += 2;
10045 type = exp->elts[pc + 1].type;
10046 arg1 = evaluate_subexp (type, exp, pos, noside);
10047 if (noside == EVAL_SKIP)
4c4b4cd2 10048 goto nosideret;
6e48bd2c 10049 arg1 = ada_value_cast (type, arg1, noside);
14f9c5c9
AS
10050 return arg1;
10051
4c4b4cd2
PH
10052 case UNOP_QUAL:
10053 (*pos) += 2;
10054 type = exp->elts[pc + 1].type;
10055 return ada_evaluate_subexp (type, exp, pos, noside);
10056
14f9c5c9
AS
10057 case BINOP_ASSIGN:
10058 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10059 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10060 {
10061 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10062 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10063 return arg1;
10064 return ada_value_assign (arg1, arg1);
10065 }
003f3813
JB
10066 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10067 except if the lhs of our assignment is a convenience variable.
10068 In the case of assigning to a convenience variable, the lhs
10069 should be exactly the result of the evaluation of the rhs. */
10070 type = value_type (arg1);
10071 if (VALUE_LVAL (arg1) == lval_internalvar)
10072 type = NULL;
10073 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10074 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10075 return arg1;
df407dfe
AC
10076 if (ada_is_fixed_point_type (value_type (arg1)))
10077 arg2 = cast_to_fixed (value_type (arg1), arg2);
10078 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10079 error
323e0a4a 10080 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10081 else
df407dfe 10082 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10083 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10084
10085 case BINOP_ADD:
10086 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10087 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10088 if (noside == EVAL_SKIP)
4c4b4cd2 10089 goto nosideret;
2ac8a782
JB
10090 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10091 return (value_from_longest
10092 (value_type (arg1),
10093 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10094 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10095 return (value_from_longest
10096 (value_type (arg2),
10097 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10098 if ((ada_is_fixed_point_type (value_type (arg1))
10099 || ada_is_fixed_point_type (value_type (arg2)))
10100 && value_type (arg1) != value_type (arg2))
323e0a4a 10101 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10102 /* Do the addition, and cast the result to the type of the first
10103 argument. We cannot cast the result to a reference type, so if
10104 ARG1 is a reference type, find its underlying type. */
10105 type = value_type (arg1);
10106 while (TYPE_CODE (type) == TYPE_CODE_REF)
10107 type = TYPE_TARGET_TYPE (type);
f44316fa 10108 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10109 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10110
10111 case BINOP_SUB:
10112 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10113 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10114 if (noside == EVAL_SKIP)
4c4b4cd2 10115 goto nosideret;
2ac8a782
JB
10116 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10117 return (value_from_longest
10118 (value_type (arg1),
10119 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10120 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10121 return (value_from_longest
10122 (value_type (arg2),
10123 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10124 if ((ada_is_fixed_point_type (value_type (arg1))
10125 || ada_is_fixed_point_type (value_type (arg2)))
10126 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10127 error (_("Operands of fixed-point subtraction "
10128 "must have the same type"));
b7789565
JB
10129 /* Do the substraction, and cast the result to the type of the first
10130 argument. We cannot cast the result to a reference type, so if
10131 ARG1 is a reference type, find its underlying type. */
10132 type = value_type (arg1);
10133 while (TYPE_CODE (type) == TYPE_CODE_REF)
10134 type = TYPE_TARGET_TYPE (type);
f44316fa 10135 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10136 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10137
10138 case BINOP_MUL:
10139 case BINOP_DIV:
e1578042
JB
10140 case BINOP_REM:
10141 case BINOP_MOD:
14f9c5c9
AS
10142 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10143 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10144 if (noside == EVAL_SKIP)
4c4b4cd2 10145 goto nosideret;
e1578042 10146 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10147 {
10148 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10149 return value_zero (value_type (arg1), not_lval);
10150 }
14f9c5c9 10151 else
4c4b4cd2 10152 {
a53b7a21 10153 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10154 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10155 arg1 = cast_from_fixed (type, arg1);
df407dfe 10156 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10157 arg2 = cast_from_fixed (type, arg2);
f44316fa 10158 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10159 return ada_value_binop (arg1, arg2, op);
10160 }
10161
4c4b4cd2
PH
10162 case BINOP_EQUAL:
10163 case BINOP_NOTEQUAL:
14f9c5c9 10164 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10165 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10166 if (noside == EVAL_SKIP)
76a01679 10167 goto nosideret;
4c4b4cd2 10168 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10169 tem = 0;
4c4b4cd2 10170 else
f44316fa
UW
10171 {
10172 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10173 tem = ada_value_equal (arg1, arg2);
10174 }
4c4b4cd2 10175 if (op == BINOP_NOTEQUAL)
76a01679 10176 tem = !tem;
fbb06eb1
UW
10177 type = language_bool_type (exp->language_defn, exp->gdbarch);
10178 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10179
10180 case UNOP_NEG:
10181 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10182 if (noside == EVAL_SKIP)
10183 goto nosideret;
df407dfe
AC
10184 else if (ada_is_fixed_point_type (value_type (arg1)))
10185 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10186 else
f44316fa
UW
10187 {
10188 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10189 return value_neg (arg1);
10190 }
4c4b4cd2 10191
2330c6c6
JB
10192 case BINOP_LOGICAL_AND:
10193 case BINOP_LOGICAL_OR:
10194 case UNOP_LOGICAL_NOT:
000d5124
JB
10195 {
10196 struct value *val;
10197
10198 *pos -= 1;
10199 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10200 type = language_bool_type (exp->language_defn, exp->gdbarch);
10201 return value_cast (type, val);
000d5124 10202 }
2330c6c6
JB
10203
10204 case BINOP_BITWISE_AND:
10205 case BINOP_BITWISE_IOR:
10206 case BINOP_BITWISE_XOR:
000d5124
JB
10207 {
10208 struct value *val;
10209
10210 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10211 *pos = pc;
10212 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10213
10214 return value_cast (value_type (arg1), val);
10215 }
2330c6c6 10216
14f9c5c9
AS
10217 case OP_VAR_VALUE:
10218 *pos -= 1;
6799def4 10219
14f9c5c9 10220 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10221 {
10222 *pos += 4;
10223 goto nosideret;
10224 }
da5c522f
JB
10225
10226 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10227 /* Only encountered when an unresolved symbol occurs in a
10228 context other than a function call, in which case, it is
52ce6436 10229 invalid. */
323e0a4a 10230 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10231 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10232
10233 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10234 {
0c1f74cf 10235 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10236 /* Check to see if this is a tagged type. We also need to handle
10237 the case where the type is a reference to a tagged type, but
10238 we have to be careful to exclude pointers to tagged types.
10239 The latter should be shown as usual (as a pointer), whereas
10240 a reference should mostly be transparent to the user. */
10241 if (ada_is_tagged_type (type, 0)
023db19c 10242 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10243 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10244 {
10245 /* Tagged types are a little special in the fact that the real
10246 type is dynamic and can only be determined by inspecting the
10247 object's tag. This means that we need to get the object's
10248 value first (EVAL_NORMAL) and then extract the actual object
10249 type from its tag.
10250
10251 Note that we cannot skip the final step where we extract
10252 the object type from its tag, because the EVAL_NORMAL phase
10253 results in dynamic components being resolved into fixed ones.
10254 This can cause problems when trying to print the type
10255 description of tagged types whose parent has a dynamic size:
10256 We use the type name of the "_parent" component in order
10257 to print the name of the ancestor type in the type description.
10258 If that component had a dynamic size, the resolution into
10259 a fixed type would result in the loss of that type name,
10260 thus preventing us from printing the name of the ancestor
10261 type in the type description. */
10262 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10263
10264 if (TYPE_CODE (type) != TYPE_CODE_REF)
10265 {
10266 struct type *actual_type;
10267
10268 actual_type = type_from_tag (ada_value_tag (arg1));
10269 if (actual_type == NULL)
10270 /* If, for some reason, we were unable to determine
10271 the actual type from the tag, then use the static
10272 approximation that we just computed as a fallback.
10273 This can happen if the debugging information is
10274 incomplete, for instance. */
10275 actual_type = type;
10276 return value_zero (actual_type, not_lval);
10277 }
10278 else
10279 {
10280 /* In the case of a ref, ada_coerce_ref takes care
10281 of determining the actual type. But the evaluation
10282 should return a ref as it should be valid to ask
10283 for its address; so rebuild a ref after coerce. */
10284 arg1 = ada_coerce_ref (arg1);
10285 return value_ref (arg1);
10286 }
10287 }
0c1f74cf 10288
84754697
JB
10289 /* Records and unions for which GNAT encodings have been
10290 generated need to be statically fixed as well.
10291 Otherwise, non-static fixing produces a type where
10292 all dynamic properties are removed, which prevents "ptype"
10293 from being able to completely describe the type.
10294 For instance, a case statement in a variant record would be
10295 replaced by the relevant components based on the actual
10296 value of the discriminants. */
10297 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10298 && dynamic_template_type (type) != NULL)
10299 || (TYPE_CODE (type) == TYPE_CODE_UNION
10300 && ada_find_parallel_type (type, "___XVU") != NULL))
10301 {
10302 *pos += 4;
10303 return value_zero (to_static_fixed_type (type), not_lval);
10304 }
4c4b4cd2 10305 }
da5c522f
JB
10306
10307 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10308 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10309
10310 case OP_FUNCALL:
10311 (*pos) += 2;
10312
10313 /* Allocate arg vector, including space for the function to be
10314 called in argvec[0] and a terminating NULL. */
10315 nargs = longest_to_int (exp->elts[pc + 1].longconst);
10316 argvec =
10317 (struct value **) alloca (sizeof (struct value *) * (nargs + 2));
10318
10319 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10320 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10321 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10322 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10323 else
10324 {
10325 for (tem = 0; tem <= nargs; tem += 1)
10326 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10327 argvec[tem] = 0;
10328
10329 if (noside == EVAL_SKIP)
10330 goto nosideret;
10331 }
10332
ad82864c
JB
10333 if (ada_is_constrained_packed_array_type
10334 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10335 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10336 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10337 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10338 /* This is a packed array that has already been fixed, and
10339 therefore already coerced to a simple array. Nothing further
10340 to do. */
10341 ;
df407dfe
AC
10342 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF
10343 || (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
76a01679 10344 && VALUE_LVAL (argvec[0]) == lval_memory))
4c4b4cd2
PH
10345 argvec[0] = value_addr (argvec[0]);
10346
df407dfe 10347 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10348
10349 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10350 them. So, if this is an array typedef (encoding use for array
10351 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10352 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10353 type = ada_typedef_target_type (type);
10354
4c4b4cd2
PH
10355 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10356 {
61ee279c 10357 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10358 {
10359 case TYPE_CODE_FUNC:
61ee279c 10360 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10361 break;
10362 case TYPE_CODE_ARRAY:
10363 break;
10364 case TYPE_CODE_STRUCT:
10365 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10366 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10367 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10368 break;
10369 default:
323e0a4a 10370 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10371 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10372 break;
10373 }
10374 }
10375
10376 switch (TYPE_CODE (type))
10377 {
10378 case TYPE_CODE_FUNC:
10379 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972
PH
10380 {
10381 struct type *rtype = TYPE_TARGET_TYPE (type);
10382
10383 if (TYPE_GNU_IFUNC (type))
10384 return allocate_value (TYPE_TARGET_TYPE (rtype));
10385 return allocate_value (rtype);
10386 }
4c4b4cd2 10387 return call_function_by_hand (argvec[0], nargs, argvec + 1);
c8ea1972
PH
10388 case TYPE_CODE_INTERNAL_FUNCTION:
10389 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10390 /* We don't know anything about what the internal
10391 function might return, but we have to return
10392 something. */
10393 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10394 not_lval);
10395 else
10396 return call_internal_function (exp->gdbarch, exp->language_defn,
10397 argvec[0], nargs, argvec + 1);
10398
4c4b4cd2
PH
10399 case TYPE_CODE_STRUCT:
10400 {
10401 int arity;
10402
4c4b4cd2
PH
10403 arity = ada_array_arity (type);
10404 type = ada_array_element_type (type, nargs);
10405 if (type == NULL)
323e0a4a 10406 error (_("cannot subscript or call a record"));
4c4b4cd2 10407 if (arity != nargs)
323e0a4a 10408 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10409 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10410 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10411 return
10412 unwrap_value (ada_value_subscript
10413 (argvec[0], nargs, argvec + 1));
10414 }
10415 case TYPE_CODE_ARRAY:
10416 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10417 {
10418 type = ada_array_element_type (type, nargs);
10419 if (type == NULL)
323e0a4a 10420 error (_("element type of array unknown"));
4c4b4cd2 10421 else
0a07e705 10422 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10423 }
10424 return
10425 unwrap_value (ada_value_subscript
10426 (ada_coerce_to_simple_array (argvec[0]),
10427 nargs, argvec + 1));
10428 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10429 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10430 {
deede10c 10431 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10432 type = ada_array_element_type (type, nargs);
10433 if (type == NULL)
323e0a4a 10434 error (_("element type of array unknown"));
4c4b4cd2 10435 else
0a07e705 10436 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10437 }
10438 return
deede10c
JB
10439 unwrap_value (ada_value_ptr_subscript (argvec[0],
10440 nargs, argvec + 1));
4c4b4cd2
PH
10441
10442 default:
e1d5a0d2
PH
10443 error (_("Attempt to index or call something other than an "
10444 "array or function"));
4c4b4cd2
PH
10445 }
10446
10447 case TERNOP_SLICE:
10448 {
10449 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10450 struct value *low_bound_val =
10451 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10452 struct value *high_bound_val =
10453 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10454 LONGEST low_bound;
10455 LONGEST high_bound;
5b4ee69b 10456
994b9211
AC
10457 low_bound_val = coerce_ref (low_bound_val);
10458 high_bound_val = coerce_ref (high_bound_val);
714e53ab
PH
10459 low_bound = pos_atr (low_bound_val);
10460 high_bound = pos_atr (high_bound_val);
963a6417 10461
4c4b4cd2
PH
10462 if (noside == EVAL_SKIP)
10463 goto nosideret;
10464
4c4b4cd2
PH
10465 /* If this is a reference to an aligner type, then remove all
10466 the aligners. */
df407dfe
AC
10467 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10468 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10469 TYPE_TARGET_TYPE (value_type (array)) =
10470 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10471
ad82864c 10472 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10473 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10474
10475 /* If this is a reference to an array or an array lvalue,
10476 convert to a pointer. */
df407dfe
AC
10477 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10478 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10479 && VALUE_LVAL (array) == lval_memory))
10480 array = value_addr (array);
10481
1265e4aa 10482 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10483 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10484 (value_type (array))))
0b5d8877 10485 return empty_array (ada_type_of_array (array, 0), low_bound);
4c4b4cd2
PH
10486
10487 array = ada_coerce_to_simple_array_ptr (array);
10488
714e53ab
PH
10489 /* If we have more than one level of pointer indirection,
10490 dereference the value until we get only one level. */
df407dfe
AC
10491 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10492 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10493 == TYPE_CODE_PTR))
10494 array = value_ind (array);
10495
10496 /* Make sure we really do have an array type before going further,
10497 to avoid a SEGV when trying to get the index type or the target
10498 type later down the road if the debug info generated by
10499 the compiler is incorrect or incomplete. */
df407dfe 10500 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10501 error (_("cannot take slice of non-array"));
714e53ab 10502
828292f2
JB
10503 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10504 == TYPE_CODE_PTR)
4c4b4cd2 10505 {
828292f2
JB
10506 struct type *type0 = ada_check_typedef (value_type (array));
10507
0b5d8877 10508 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
828292f2 10509 return empty_array (TYPE_TARGET_TYPE (type0), low_bound);
4c4b4cd2
PH
10510 else
10511 {
10512 struct type *arr_type0 =
828292f2 10513 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10514
f5938064
JG
10515 return ada_value_slice_from_ptr (array, arr_type0,
10516 longest_to_int (low_bound),
10517 longest_to_int (high_bound));
4c4b4cd2
PH
10518 }
10519 }
10520 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10521 return array;
10522 else if (high_bound < low_bound)
df407dfe 10523 return empty_array (value_type (array), low_bound);
4c4b4cd2 10524 else
529cad9c
PH
10525 return ada_value_slice (array, longest_to_int (low_bound),
10526 longest_to_int (high_bound));
4c4b4cd2 10527 }
14f9c5c9 10528
4c4b4cd2
PH
10529 case UNOP_IN_RANGE:
10530 (*pos) += 2;
10531 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10532 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10533
14f9c5c9 10534 if (noside == EVAL_SKIP)
4c4b4cd2 10535 goto nosideret;
14f9c5c9 10536
4c4b4cd2
PH
10537 switch (TYPE_CODE (type))
10538 {
10539 default:
e1d5a0d2
PH
10540 lim_warning (_("Membership test incompletely implemented; "
10541 "always returns true"));
fbb06eb1
UW
10542 type = language_bool_type (exp->language_defn, exp->gdbarch);
10543 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10544
10545 case TYPE_CODE_RANGE:
030b4912
UW
10546 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10547 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10548 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10549 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10550 type = language_bool_type (exp->language_defn, exp->gdbarch);
10551 return
10552 value_from_longest (type,
4c4b4cd2
PH
10553 (value_less (arg1, arg3)
10554 || value_equal (arg1, arg3))
10555 && (value_less (arg2, arg1)
10556 || value_equal (arg2, arg1)));
10557 }
10558
10559 case BINOP_IN_BOUNDS:
14f9c5c9 10560 (*pos) += 2;
4c4b4cd2
PH
10561 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10562 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10563
4c4b4cd2
PH
10564 if (noside == EVAL_SKIP)
10565 goto nosideret;
14f9c5c9 10566
4c4b4cd2 10567 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10568 {
10569 type = language_bool_type (exp->language_defn, exp->gdbarch);
10570 return value_zero (type, not_lval);
10571 }
14f9c5c9 10572
4c4b4cd2 10573 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10574
1eea4ebd
UW
10575 type = ada_index_type (value_type (arg2), tem, "range");
10576 if (!type)
10577 type = value_type (arg1);
14f9c5c9 10578
1eea4ebd
UW
10579 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10580 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10581
f44316fa
UW
10582 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10583 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10584 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10585 return
fbb06eb1 10586 value_from_longest (type,
4c4b4cd2
PH
10587 (value_less (arg1, arg3)
10588 || value_equal (arg1, arg3))
10589 && (value_less (arg2, arg1)
10590 || value_equal (arg2, arg1)));
10591
10592 case TERNOP_IN_RANGE:
10593 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10594 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10595 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10596
10597 if (noside == EVAL_SKIP)
10598 goto nosideret;
10599
f44316fa
UW
10600 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10601 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10602 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10603 return
fbb06eb1 10604 value_from_longest (type,
4c4b4cd2
PH
10605 (value_less (arg1, arg3)
10606 || value_equal (arg1, arg3))
10607 && (value_less (arg2, arg1)
10608 || value_equal (arg2, arg1)));
10609
10610 case OP_ATR_FIRST:
10611 case OP_ATR_LAST:
10612 case OP_ATR_LENGTH:
10613 {
76a01679 10614 struct type *type_arg;
5b4ee69b 10615
76a01679
JB
10616 if (exp->elts[*pos].opcode == OP_TYPE)
10617 {
10618 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10619 arg1 = NULL;
5bc23cb3 10620 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10621 }
10622 else
10623 {
10624 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10625 type_arg = NULL;
10626 }
10627
10628 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10629 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10630 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10631 *pos += 4;
10632
10633 if (noside == EVAL_SKIP)
10634 goto nosideret;
10635
10636 if (type_arg == NULL)
10637 {
10638 arg1 = ada_coerce_ref (arg1);
10639
ad82864c 10640 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
10641 arg1 = ada_coerce_to_simple_array (arg1);
10642
aa4fb036 10643 if (op == OP_ATR_LENGTH)
1eea4ebd 10644 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10645 else
10646 {
10647 type = ada_index_type (value_type (arg1), tem,
10648 ada_attribute_name (op));
10649 if (type == NULL)
10650 type = builtin_type (exp->gdbarch)->builtin_int;
10651 }
76a01679
JB
10652
10653 if (noside == EVAL_AVOID_SIDE_EFFECTS)
1eea4ebd 10654 return allocate_value (type);
76a01679
JB
10655
10656 switch (op)
10657 {
10658 default: /* Should never happen. */
323e0a4a 10659 error (_("unexpected attribute encountered"));
76a01679 10660 case OP_ATR_FIRST:
1eea4ebd
UW
10661 return value_from_longest
10662 (type, ada_array_bound (arg1, tem, 0));
76a01679 10663 case OP_ATR_LAST:
1eea4ebd
UW
10664 return value_from_longest
10665 (type, ada_array_bound (arg1, tem, 1));
76a01679 10666 case OP_ATR_LENGTH:
1eea4ebd
UW
10667 return value_from_longest
10668 (type, ada_array_length (arg1, tem));
76a01679
JB
10669 }
10670 }
10671 else if (discrete_type_p (type_arg))
10672 {
10673 struct type *range_type;
0d5cff50 10674 const char *name = ada_type_name (type_arg);
5b4ee69b 10675
76a01679
JB
10676 range_type = NULL;
10677 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 10678 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
10679 if (range_type == NULL)
10680 range_type = type_arg;
10681 switch (op)
10682 {
10683 default:
323e0a4a 10684 error (_("unexpected attribute encountered"));
76a01679 10685 case OP_ATR_FIRST:
690cc4eb 10686 return value_from_longest
43bbcdc2 10687 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 10688 case OP_ATR_LAST:
690cc4eb 10689 return value_from_longest
43bbcdc2 10690 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 10691 case OP_ATR_LENGTH:
323e0a4a 10692 error (_("the 'length attribute applies only to array types"));
76a01679
JB
10693 }
10694 }
10695 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 10696 error (_("unimplemented type attribute"));
76a01679
JB
10697 else
10698 {
10699 LONGEST low, high;
10700
ad82864c
JB
10701 if (ada_is_constrained_packed_array_type (type_arg))
10702 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10703
aa4fb036 10704 if (op == OP_ATR_LENGTH)
1eea4ebd 10705 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10706 else
10707 {
10708 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10709 if (type == NULL)
10710 type = builtin_type (exp->gdbarch)->builtin_int;
10711 }
1eea4ebd 10712
76a01679
JB
10713 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10714 return allocate_value (type);
10715
10716 switch (op)
10717 {
10718 default:
323e0a4a 10719 error (_("unexpected attribute encountered"));
76a01679 10720 case OP_ATR_FIRST:
1eea4ebd 10721 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
10722 return value_from_longest (type, low);
10723 case OP_ATR_LAST:
1eea4ebd 10724 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10725 return value_from_longest (type, high);
10726 case OP_ATR_LENGTH:
1eea4ebd
UW
10727 low = ada_array_bound_from_type (type_arg, tem, 0);
10728 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10729 return value_from_longest (type, high - low + 1);
10730 }
10731 }
14f9c5c9
AS
10732 }
10733
4c4b4cd2
PH
10734 case OP_ATR_TAG:
10735 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10736 if (noside == EVAL_SKIP)
76a01679 10737 goto nosideret;
4c4b4cd2
PH
10738
10739 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10740 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10741
10742 return ada_value_tag (arg1);
10743
10744 case OP_ATR_MIN:
10745 case OP_ATR_MAX:
10746 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10747 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10748 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10749 if (noside == EVAL_SKIP)
76a01679 10750 goto nosideret;
d2e4a39e 10751 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10752 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10753 else
f44316fa
UW
10754 {
10755 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10756 return value_binop (arg1, arg2,
10757 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10758 }
14f9c5c9 10759
4c4b4cd2
PH
10760 case OP_ATR_MODULUS:
10761 {
31dedfee 10762 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10763
5b4ee69b 10764 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
10765 if (noside == EVAL_SKIP)
10766 goto nosideret;
4c4b4cd2 10767
76a01679 10768 if (!ada_is_modular_type (type_arg))
323e0a4a 10769 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10770
76a01679
JB
10771 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10772 ada_modulus (type_arg));
4c4b4cd2
PH
10773 }
10774
10775
10776 case OP_ATR_POS:
10777 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10778 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10779 if (noside == EVAL_SKIP)
76a01679 10780 goto nosideret;
3cb382c9
UW
10781 type = builtin_type (exp->gdbarch)->builtin_int;
10782 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10783 return value_zero (type, not_lval);
14f9c5c9 10784 else
3cb382c9 10785 return value_pos_atr (type, arg1);
14f9c5c9 10786
4c4b4cd2
PH
10787 case OP_ATR_SIZE:
10788 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
10789 type = value_type (arg1);
10790
10791 /* If the argument is a reference, then dereference its type, since
10792 the user is really asking for the size of the actual object,
10793 not the size of the pointer. */
10794 if (TYPE_CODE (type) == TYPE_CODE_REF)
10795 type = TYPE_TARGET_TYPE (type);
10796
4c4b4cd2 10797 if (noside == EVAL_SKIP)
76a01679 10798 goto nosideret;
4c4b4cd2 10799 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 10800 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10801 else
22601c15 10802 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 10803 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10804
10805 case OP_ATR_VAL:
10806 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 10807 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 10808 type = exp->elts[pc + 2].type;
14f9c5c9 10809 if (noside == EVAL_SKIP)
76a01679 10810 goto nosideret;
4c4b4cd2 10811 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10812 return value_zero (type, not_lval);
4c4b4cd2 10813 else
76a01679 10814 return value_val_atr (type, arg1);
4c4b4cd2
PH
10815
10816 case BINOP_EXP:
10817 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10818 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10819 if (noside == EVAL_SKIP)
10820 goto nosideret;
10821 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10822 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 10823 else
f44316fa
UW
10824 {
10825 /* For integer exponentiation operations,
10826 only promote the first argument. */
10827 if (is_integral_type (value_type (arg2)))
10828 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10829 else
10830 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10831
10832 return value_binop (arg1, arg2, op);
10833 }
4c4b4cd2
PH
10834
10835 case UNOP_PLUS:
10836 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10837 if (noside == EVAL_SKIP)
10838 goto nosideret;
10839 else
10840 return arg1;
10841
10842 case UNOP_ABS:
10843 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10844 if (noside == EVAL_SKIP)
10845 goto nosideret;
f44316fa 10846 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 10847 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 10848 return value_neg (arg1);
14f9c5c9 10849 else
4c4b4cd2 10850 return arg1;
14f9c5c9
AS
10851
10852 case UNOP_IND:
5ec18f2b 10853 preeval_pos = *pos;
6b0d7253 10854 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10855 if (noside == EVAL_SKIP)
4c4b4cd2 10856 goto nosideret;
df407dfe 10857 type = ada_check_typedef (value_type (arg1));
14f9c5c9 10858 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
10859 {
10860 if (ada_is_array_descriptor_type (type))
10861 /* GDB allows dereferencing GNAT array descriptors. */
10862 {
10863 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 10864
4c4b4cd2 10865 if (arrType == NULL)
323e0a4a 10866 error (_("Attempt to dereference null array pointer."));
00a4c844 10867 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
10868 }
10869 else if (TYPE_CODE (type) == TYPE_CODE_PTR
10870 || TYPE_CODE (type) == TYPE_CODE_REF
10871 /* In C you can dereference an array to get the 1st elt. */
10872 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 10873 {
5ec18f2b
JG
10874 /* As mentioned in the OP_VAR_VALUE case, tagged types can
10875 only be determined by inspecting the object's tag.
10876 This means that we need to evaluate completely the
10877 expression in order to get its type. */
10878
023db19c
JB
10879 if ((TYPE_CODE (type) == TYPE_CODE_REF
10880 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
10881 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
10882 {
10883 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10884 EVAL_NORMAL);
10885 type = value_type (ada_value_ind (arg1));
10886 }
10887 else
10888 {
10889 type = to_static_fixed_type
10890 (ada_aligned_type
10891 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
10892 }
10893 check_size (type);
714e53ab
PH
10894 return value_zero (type, lval_memory);
10895 }
4c4b4cd2 10896 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
10897 {
10898 /* GDB allows dereferencing an int. */
10899 if (expect_type == NULL)
10900 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10901 lval_memory);
10902 else
10903 {
10904 expect_type =
10905 to_static_fixed_type (ada_aligned_type (expect_type));
10906 return value_zero (expect_type, lval_memory);
10907 }
10908 }
4c4b4cd2 10909 else
323e0a4a 10910 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 10911 }
0963b4bd 10912 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 10913 type = ada_check_typedef (value_type (arg1));
d2e4a39e 10914
96967637
JB
10915 if (TYPE_CODE (type) == TYPE_CODE_INT)
10916 /* GDB allows dereferencing an int. If we were given
10917 the expect_type, then use that as the target type.
10918 Otherwise, assume that the target type is an int. */
10919 {
10920 if (expect_type != NULL)
10921 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
10922 arg1));
10923 else
10924 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
10925 (CORE_ADDR) value_as_address (arg1));
10926 }
6b0d7253 10927
4c4b4cd2
PH
10928 if (ada_is_array_descriptor_type (type))
10929 /* GDB allows dereferencing GNAT array descriptors. */
10930 return ada_coerce_to_simple_array (arg1);
14f9c5c9 10931 else
4c4b4cd2 10932 return ada_value_ind (arg1);
14f9c5c9
AS
10933
10934 case STRUCTOP_STRUCT:
10935 tem = longest_to_int (exp->elts[pc + 1].longconst);
10936 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 10937 preeval_pos = *pos;
14f9c5c9
AS
10938 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10939 if (noside == EVAL_SKIP)
4c4b4cd2 10940 goto nosideret;
14f9c5c9 10941 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10942 {
df407dfe 10943 struct type *type1 = value_type (arg1);
5b4ee69b 10944
76a01679
JB
10945 if (ada_is_tagged_type (type1, 1))
10946 {
10947 type = ada_lookup_struct_elt_type (type1,
10948 &exp->elts[pc + 2].string,
10949 1, 1, NULL);
5ec18f2b
JG
10950
10951 /* If the field is not found, check if it exists in the
10952 extension of this object's type. This means that we
10953 need to evaluate completely the expression. */
10954
76a01679 10955 if (type == NULL)
5ec18f2b
JG
10956 {
10957 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
10958 EVAL_NORMAL);
10959 arg1 = ada_value_struct_elt (arg1,
10960 &exp->elts[pc + 2].string,
10961 0);
10962 arg1 = unwrap_value (arg1);
10963 type = value_type (ada_to_fixed_value (arg1));
10964 }
76a01679
JB
10965 }
10966 else
10967 type =
10968 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
10969 0, NULL);
10970
10971 return value_zero (ada_aligned_type (type), lval_memory);
10972 }
14f9c5c9 10973 else
284614f0
JB
10974 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
10975 arg1 = unwrap_value (arg1);
10976 return ada_to_fixed_value (arg1);
10977
14f9c5c9 10978 case OP_TYPE:
4c4b4cd2
PH
10979 /* The value is not supposed to be used. This is here to make it
10980 easier to accommodate expressions that contain types. */
14f9c5c9
AS
10981 (*pos) += 2;
10982 if (noside == EVAL_SKIP)
4c4b4cd2 10983 goto nosideret;
14f9c5c9 10984 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 10985 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 10986 else
323e0a4a 10987 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
10988
10989 case OP_AGGREGATE:
10990 case OP_CHOICES:
10991 case OP_OTHERS:
10992 case OP_DISCRETE_RANGE:
10993 case OP_POSITIONAL:
10994 case OP_NAME:
10995 if (noside == EVAL_NORMAL)
10996 switch (op)
10997 {
10998 case OP_NAME:
10999 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11000 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11001 case OP_AGGREGATE:
11002 error (_("Aggregates only allowed on the right of an assignment"));
11003 default:
0963b4bd
MS
11004 internal_error (__FILE__, __LINE__,
11005 _("aggregate apparently mangled"));
52ce6436
PH
11006 }
11007
11008 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11009 *pos += oplen - 1;
11010 for (tem = 0; tem < nargs; tem += 1)
11011 ada_evaluate_subexp (NULL, exp, pos, noside);
11012 goto nosideret;
14f9c5c9
AS
11013 }
11014
11015nosideret:
22601c15 11016 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int, 1);
14f9c5c9 11017}
14f9c5c9 11018\f
d2e4a39e 11019
4c4b4cd2 11020 /* Fixed point */
14f9c5c9
AS
11021
11022/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11023 type name that encodes the 'small and 'delta information.
4c4b4cd2 11024 Otherwise, return NULL. */
14f9c5c9 11025
d2e4a39e 11026static const char *
ebf56fd3 11027fixed_type_info (struct type *type)
14f9c5c9 11028{
d2e4a39e 11029 const char *name = ada_type_name (type);
14f9c5c9
AS
11030 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11031
d2e4a39e
AS
11032 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11033 {
14f9c5c9 11034 const char *tail = strstr (name, "___XF_");
5b4ee69b 11035
14f9c5c9 11036 if (tail == NULL)
4c4b4cd2 11037 return NULL;
d2e4a39e 11038 else
4c4b4cd2 11039 return tail + 5;
14f9c5c9
AS
11040 }
11041 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11042 return fixed_type_info (TYPE_TARGET_TYPE (type));
11043 else
11044 return NULL;
11045}
11046
4c4b4cd2 11047/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11048
11049int
ebf56fd3 11050ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11051{
11052 return fixed_type_info (type) != NULL;
11053}
11054
4c4b4cd2
PH
11055/* Return non-zero iff TYPE represents a System.Address type. */
11056
11057int
11058ada_is_system_address_type (struct type *type)
11059{
11060 return (TYPE_NAME (type)
11061 && strcmp (TYPE_NAME (type), "system__address") == 0);
11062}
11063
14f9c5c9
AS
11064/* Assuming that TYPE is the representation of an Ada fixed-point
11065 type, return its delta, or -1 if the type is malformed and the
4c4b4cd2 11066 delta cannot be determined. */
14f9c5c9
AS
11067
11068DOUBLEST
ebf56fd3 11069ada_delta (struct type *type)
14f9c5c9
AS
11070{
11071 const char *encoding = fixed_type_info (type);
facc390f 11072 DOUBLEST num, den;
14f9c5c9 11073
facc390f
JB
11074 /* Strictly speaking, num and den are encoded as integer. However,
11075 they may not fit into a long, and they will have to be converted
11076 to DOUBLEST anyway. So scan them as DOUBLEST. */
11077 if (sscanf (encoding, "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11078 &num, &den) < 2)
14f9c5c9 11079 return -1.0;
d2e4a39e 11080 else
facc390f 11081 return num / den;
14f9c5c9
AS
11082}
11083
11084/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11085 factor ('SMALL value) associated with the type. */
14f9c5c9
AS
11086
11087static DOUBLEST
ebf56fd3 11088scaling_factor (struct type *type)
14f9c5c9
AS
11089{
11090 const char *encoding = fixed_type_info (type);
facc390f 11091 DOUBLEST num0, den0, num1, den1;
14f9c5c9 11092 int n;
d2e4a39e 11093
facc390f
JB
11094 /* Strictly speaking, num's and den's are encoded as integer. However,
11095 they may not fit into a long, and they will have to be converted
11096 to DOUBLEST anyway. So scan them as DOUBLEST. */
11097 n = sscanf (encoding,
11098 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT
11099 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11100 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11101
11102 if (n < 2)
11103 return 1.0;
11104 else if (n == 4)
facc390f 11105 return num1 / den1;
d2e4a39e 11106 else
facc390f 11107 return num0 / den0;
14f9c5c9
AS
11108}
11109
11110
11111/* Assuming that X is the representation of a value of fixed-point
4c4b4cd2 11112 type TYPE, return its floating-point equivalent. */
14f9c5c9
AS
11113
11114DOUBLEST
ebf56fd3 11115ada_fixed_to_float (struct type *type, LONGEST x)
14f9c5c9 11116{
d2e4a39e 11117 return (DOUBLEST) x *scaling_factor (type);
14f9c5c9
AS
11118}
11119
4c4b4cd2
PH
11120/* The representation of a fixed-point value of type TYPE
11121 corresponding to the value X. */
14f9c5c9
AS
11122
11123LONGEST
ebf56fd3 11124ada_float_to_fixed (struct type *type, DOUBLEST x)
14f9c5c9
AS
11125{
11126 return (LONGEST) (x / scaling_factor (type) + 0.5);
11127}
11128
14f9c5c9 11129\f
d2e4a39e 11130
4c4b4cd2 11131 /* Range types */
14f9c5c9
AS
11132
11133/* Scan STR beginning at position K for a discriminant name, and
11134 return the value of that discriminant field of DVAL in *PX. If
11135 PNEW_K is not null, put the position of the character beyond the
11136 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11137 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11138
11139static int
07d8f827 11140scan_discrim_bound (char *str, int k, struct value *dval, LONGEST * px,
76a01679 11141 int *pnew_k)
14f9c5c9
AS
11142{
11143 static char *bound_buffer = NULL;
11144 static size_t bound_buffer_len = 0;
11145 char *bound;
11146 char *pend;
d2e4a39e 11147 struct value *bound_val;
14f9c5c9
AS
11148
11149 if (dval == NULL || str == NULL || str[k] == '\0')
11150 return 0;
11151
d2e4a39e 11152 pend = strstr (str + k, "__");
14f9c5c9
AS
11153 if (pend == NULL)
11154 {
d2e4a39e 11155 bound = str + k;
14f9c5c9
AS
11156 k += strlen (bound);
11157 }
d2e4a39e 11158 else
14f9c5c9 11159 {
d2e4a39e 11160 GROW_VECT (bound_buffer, bound_buffer_len, pend - (str + k) + 1);
14f9c5c9 11161 bound = bound_buffer;
d2e4a39e
AS
11162 strncpy (bound_buffer, str + k, pend - (str + k));
11163 bound[pend - (str + k)] = '\0';
11164 k = pend - str;
14f9c5c9 11165 }
d2e4a39e 11166
df407dfe 11167 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11168 if (bound_val == NULL)
11169 return 0;
11170
11171 *px = value_as_long (bound_val);
11172 if (pnew_k != NULL)
11173 *pnew_k = k;
11174 return 1;
11175}
11176
11177/* Value of variable named NAME in the current environment. If
11178 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11179 otherwise causes an error with message ERR_MSG. */
11180
d2e4a39e
AS
11181static struct value *
11182get_var_value (char *name, char *err_msg)
14f9c5c9 11183{
4c4b4cd2 11184 struct ada_symbol_info *syms;
14f9c5c9
AS
11185 int nsyms;
11186
4c4b4cd2 11187 nsyms = ada_lookup_symbol_list (name, get_selected_block (0), VAR_DOMAIN,
4eeaa230 11188 &syms);
14f9c5c9
AS
11189
11190 if (nsyms != 1)
11191 {
11192 if (err_msg == NULL)
4c4b4cd2 11193 return 0;
14f9c5c9 11194 else
8a3fe4f8 11195 error (("%s"), err_msg);
14f9c5c9
AS
11196 }
11197
4c4b4cd2 11198 return value_of_variable (syms[0].sym, syms[0].block);
14f9c5c9 11199}
d2e4a39e 11200
14f9c5c9 11201/* Value of integer variable named NAME in the current environment. If
4c4b4cd2
PH
11202 no such variable found, returns 0, and sets *FLAG to 0. If
11203 successful, sets *FLAG to 1. */
11204
14f9c5c9 11205LONGEST
4c4b4cd2 11206get_int_var_value (char *name, int *flag)
14f9c5c9 11207{
4c4b4cd2 11208 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11209
14f9c5c9
AS
11210 if (var_val == 0)
11211 {
11212 if (flag != NULL)
4c4b4cd2 11213 *flag = 0;
14f9c5c9
AS
11214 return 0;
11215 }
11216 else
11217 {
11218 if (flag != NULL)
4c4b4cd2 11219 *flag = 1;
14f9c5c9
AS
11220 return value_as_long (var_val);
11221 }
11222}
d2e4a39e 11223
14f9c5c9
AS
11224
11225/* Return a range type whose base type is that of the range type named
11226 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11227 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11228 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11229 corresponding range type from debug information; fall back to using it
11230 if symbol lookup fails. If a new type must be created, allocate it
11231 like ORIG_TYPE was. The bounds information, in general, is encoded
11232 in NAME, the base type given in the named range type. */
14f9c5c9 11233
d2e4a39e 11234static struct type *
28c85d6c 11235to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11236{
0d5cff50 11237 const char *name;
14f9c5c9 11238 struct type *base_type;
d2e4a39e 11239 char *subtype_info;
14f9c5c9 11240
28c85d6c
JB
11241 gdb_assert (raw_type != NULL);
11242 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11243
1ce677a4 11244 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11245 base_type = TYPE_TARGET_TYPE (raw_type);
11246 else
11247 base_type = raw_type;
11248
28c85d6c 11249 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11250 subtype_info = strstr (name, "___XD");
11251 if (subtype_info == NULL)
690cc4eb 11252 {
43bbcdc2
PH
11253 LONGEST L = ada_discrete_type_low_bound (raw_type);
11254 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11255
690cc4eb
PH
11256 if (L < INT_MIN || U > INT_MAX)
11257 return raw_type;
11258 else
0c9c3474
SA
11259 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11260 L, U);
690cc4eb 11261 }
14f9c5c9
AS
11262 else
11263 {
11264 static char *name_buf = NULL;
11265 static size_t name_len = 0;
11266 int prefix_len = subtype_info - name;
11267 LONGEST L, U;
11268 struct type *type;
11269 char *bounds_str;
11270 int n;
11271
11272 GROW_VECT (name_buf, name_len, prefix_len + 5);
11273 strncpy (name_buf, name, prefix_len);
11274 name_buf[prefix_len] = '\0';
11275
11276 subtype_info += 5;
11277 bounds_str = strchr (subtype_info, '_');
11278 n = 1;
11279
d2e4a39e 11280 if (*subtype_info == 'L')
4c4b4cd2
PH
11281 {
11282 if (!ada_scan_number (bounds_str, n, &L, &n)
11283 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11284 return raw_type;
11285 if (bounds_str[n] == '_')
11286 n += 2;
0963b4bd 11287 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11288 n += 1;
11289 subtype_info += 1;
11290 }
d2e4a39e 11291 else
4c4b4cd2
PH
11292 {
11293 int ok;
5b4ee69b 11294
4c4b4cd2
PH
11295 strcpy (name_buf + prefix_len, "___L");
11296 L = get_int_var_value (name_buf, &ok);
11297 if (!ok)
11298 {
323e0a4a 11299 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11300 L = 1;
11301 }
11302 }
14f9c5c9 11303
d2e4a39e 11304 if (*subtype_info == 'U')
4c4b4cd2
PH
11305 {
11306 if (!ada_scan_number (bounds_str, n, &U, &n)
11307 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11308 return raw_type;
11309 }
d2e4a39e 11310 else
4c4b4cd2
PH
11311 {
11312 int ok;
5b4ee69b 11313
4c4b4cd2
PH
11314 strcpy (name_buf + prefix_len, "___U");
11315 U = get_int_var_value (name_buf, &ok);
11316 if (!ok)
11317 {
323e0a4a 11318 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11319 U = L;
11320 }
11321 }
14f9c5c9 11322
0c9c3474
SA
11323 type = create_static_range_type (alloc_type_copy (raw_type),
11324 base_type, L, U);
d2e4a39e 11325 TYPE_NAME (type) = name;
14f9c5c9
AS
11326 return type;
11327 }
11328}
11329
4c4b4cd2
PH
11330/* True iff NAME is the name of a range type. */
11331
14f9c5c9 11332int
d2e4a39e 11333ada_is_range_type_name (const char *name)
14f9c5c9
AS
11334{
11335 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11336}
14f9c5c9 11337\f
d2e4a39e 11338
4c4b4cd2
PH
11339 /* Modular types */
11340
11341/* True iff TYPE is an Ada modular type. */
14f9c5c9 11342
14f9c5c9 11343int
d2e4a39e 11344ada_is_modular_type (struct type *type)
14f9c5c9 11345{
18af8284 11346 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11347
11348 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11349 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11350 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11351}
11352
4c4b4cd2
PH
11353/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11354
61ee279c 11355ULONGEST
0056e4d5 11356ada_modulus (struct type *type)
14f9c5c9 11357{
43bbcdc2 11358 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11359}
d2e4a39e 11360\f
f7f9143b
JB
11361
11362/* Ada exception catchpoint support:
11363 ---------------------------------
11364
11365 We support 3 kinds of exception catchpoints:
11366 . catchpoints on Ada exceptions
11367 . catchpoints on unhandled Ada exceptions
11368 . catchpoints on failed assertions
11369
11370 Exceptions raised during failed assertions, or unhandled exceptions
11371 could perfectly be caught with the general catchpoint on Ada exceptions.
11372 However, we can easily differentiate these two special cases, and having
11373 the option to distinguish these two cases from the rest can be useful
11374 to zero-in on certain situations.
11375
11376 Exception catchpoints are a specialized form of breakpoint,
11377 since they rely on inserting breakpoints inside known routines
11378 of the GNAT runtime. The implementation therefore uses a standard
11379 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11380 of breakpoint_ops.
11381
0259addd
JB
11382 Support in the runtime for exception catchpoints have been changed
11383 a few times already, and these changes affect the implementation
11384 of these catchpoints. In order to be able to support several
11385 variants of the runtime, we use a sniffer that will determine
28010a5d 11386 the runtime variant used by the program being debugged. */
f7f9143b 11387
82eacd52
JB
11388/* Ada's standard exceptions.
11389
11390 The Ada 83 standard also defined Numeric_Error. But there so many
11391 situations where it was unclear from the Ada 83 Reference Manual
11392 (RM) whether Constraint_Error or Numeric_Error should be raised,
11393 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11394 Interpretation saying that anytime the RM says that Numeric_Error
11395 should be raised, the implementation may raise Constraint_Error.
11396 Ada 95 went one step further and pretty much removed Numeric_Error
11397 from the list of standard exceptions (it made it a renaming of
11398 Constraint_Error, to help preserve compatibility when compiling
11399 an Ada83 compiler). As such, we do not include Numeric_Error from
11400 this list of standard exceptions. */
3d0b0fa3
JB
11401
11402static char *standard_exc[] = {
11403 "constraint_error",
11404 "program_error",
11405 "storage_error",
11406 "tasking_error"
11407};
11408
0259addd
JB
11409typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11410
11411/* A structure that describes how to support exception catchpoints
11412 for a given executable. */
11413
11414struct exception_support_info
11415{
11416 /* The name of the symbol to break on in order to insert
11417 a catchpoint on exceptions. */
11418 const char *catch_exception_sym;
11419
11420 /* The name of the symbol to break on in order to insert
11421 a catchpoint on unhandled exceptions. */
11422 const char *catch_exception_unhandled_sym;
11423
11424 /* The name of the symbol to break on in order to insert
11425 a catchpoint on failed assertions. */
11426 const char *catch_assert_sym;
11427
11428 /* Assuming that the inferior just triggered an unhandled exception
11429 catchpoint, this function is responsible for returning the address
11430 in inferior memory where the name of that exception is stored.
11431 Return zero if the address could not be computed. */
11432 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11433};
11434
11435static CORE_ADDR ada_unhandled_exception_name_addr (void);
11436static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11437
11438/* The following exception support info structure describes how to
11439 implement exception catchpoints with the latest version of the
11440 Ada runtime (as of 2007-03-06). */
11441
11442static const struct exception_support_info default_exception_support_info =
11443{
11444 "__gnat_debug_raise_exception", /* catch_exception_sym */
11445 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11446 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11447 ada_unhandled_exception_name_addr
11448};
11449
11450/* The following exception support info structure describes how to
11451 implement exception catchpoints with a slightly older version
11452 of the Ada runtime. */
11453
11454static const struct exception_support_info exception_support_info_fallback =
11455{
11456 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11457 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11458 "system__assertions__raise_assert_failure", /* catch_assert_sym */
11459 ada_unhandled_exception_name_addr_from_raise
11460};
11461
f17011e0
JB
11462/* Return nonzero if we can detect the exception support routines
11463 described in EINFO.
11464
11465 This function errors out if an abnormal situation is detected
11466 (for instance, if we find the exception support routines, but
11467 that support is found to be incomplete). */
11468
11469static int
11470ada_has_this_exception_support (const struct exception_support_info *einfo)
11471{
11472 struct symbol *sym;
11473
11474 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11475 that should be compiled with debugging information. As a result, we
11476 expect to find that symbol in the symtabs. */
11477
11478 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11479 if (sym == NULL)
a6af7abe
JB
11480 {
11481 /* Perhaps we did not find our symbol because the Ada runtime was
11482 compiled without debugging info, or simply stripped of it.
11483 It happens on some GNU/Linux distributions for instance, where
11484 users have to install a separate debug package in order to get
11485 the runtime's debugging info. In that situation, let the user
11486 know why we cannot insert an Ada exception catchpoint.
11487
11488 Note: Just for the purpose of inserting our Ada exception
11489 catchpoint, we could rely purely on the associated minimal symbol.
11490 But we would be operating in degraded mode anyway, since we are
11491 still lacking the debugging info needed later on to extract
11492 the name of the exception being raised (this name is printed in
11493 the catchpoint message, and is also used when trying to catch
11494 a specific exception). We do not handle this case for now. */
3b7344d5 11495 struct bound_minimal_symbol msym
1c8e84b0
JB
11496 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11497
3b7344d5 11498 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11499 error (_("Your Ada runtime appears to be missing some debugging "
11500 "information.\nCannot insert Ada exception catchpoint "
11501 "in this configuration."));
11502
11503 return 0;
11504 }
f17011e0
JB
11505
11506 /* Make sure that the symbol we found corresponds to a function. */
11507
11508 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11509 error (_("Symbol \"%s\" is not a function (class = %d)"),
11510 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11511
11512 return 1;
11513}
11514
0259addd
JB
11515/* Inspect the Ada runtime and determine which exception info structure
11516 should be used to provide support for exception catchpoints.
11517
3eecfa55
JB
11518 This function will always set the per-inferior exception_info,
11519 or raise an error. */
0259addd
JB
11520
11521static void
11522ada_exception_support_info_sniffer (void)
11523{
3eecfa55 11524 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11525
11526 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11527 if (data->exception_info != NULL)
0259addd
JB
11528 return;
11529
11530 /* Check the latest (default) exception support info. */
f17011e0 11531 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11532 {
3eecfa55 11533 data->exception_info = &default_exception_support_info;
0259addd
JB
11534 return;
11535 }
11536
11537 /* Try our fallback exception suport info. */
f17011e0 11538 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11539 {
3eecfa55 11540 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11541 return;
11542 }
11543
11544 /* Sometimes, it is normal for us to not be able to find the routine
11545 we are looking for. This happens when the program is linked with
11546 the shared version of the GNAT runtime, and the program has not been
11547 started yet. Inform the user of these two possible causes if
11548 applicable. */
11549
ccefe4c4 11550 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11551 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11552
11553 /* If the symbol does not exist, then check that the program is
11554 already started, to make sure that shared libraries have been
11555 loaded. If it is not started, this may mean that the symbol is
11556 in a shared library. */
11557
11558 if (ptid_get_pid (inferior_ptid) == 0)
11559 error (_("Unable to insert catchpoint. Try to start the program first."));
11560
11561 /* At this point, we know that we are debugging an Ada program and
11562 that the inferior has been started, but we still are not able to
0963b4bd 11563 find the run-time symbols. That can mean that we are in
0259addd
JB
11564 configurable run time mode, or that a-except as been optimized
11565 out by the linker... In any case, at this point it is not worth
11566 supporting this feature. */
11567
7dda8cff 11568 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11569}
11570
f7f9143b
JB
11571/* True iff FRAME is very likely to be that of a function that is
11572 part of the runtime system. This is all very heuristic, but is
11573 intended to be used as advice as to what frames are uninteresting
11574 to most users. */
11575
11576static int
11577is_known_support_routine (struct frame_info *frame)
11578{
4ed6b5be 11579 struct symtab_and_line sal;
55b87a52 11580 char *func_name;
692465f1 11581 enum language func_lang;
f7f9143b 11582 int i;
f35a17b5 11583 const char *fullname;
f7f9143b 11584
4ed6b5be
JB
11585 /* If this code does not have any debugging information (no symtab),
11586 This cannot be any user code. */
f7f9143b 11587
4ed6b5be 11588 find_frame_sal (frame, &sal);
f7f9143b
JB
11589 if (sal.symtab == NULL)
11590 return 1;
11591
4ed6b5be
JB
11592 /* If there is a symtab, but the associated source file cannot be
11593 located, then assume this is not user code: Selecting a frame
11594 for which we cannot display the code would not be very helpful
11595 for the user. This should also take care of case such as VxWorks
11596 where the kernel has some debugging info provided for a few units. */
f7f9143b 11597
f35a17b5
JK
11598 fullname = symtab_to_fullname (sal.symtab);
11599 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11600 return 1;
11601
4ed6b5be
JB
11602 /* Check the unit filename againt the Ada runtime file naming.
11603 We also check the name of the objfile against the name of some
11604 known system libraries that sometimes come with debugging info
11605 too. */
11606
f7f9143b
JB
11607 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11608 {
11609 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11610 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 11611 return 1;
eb822aa6
DE
11612 if (SYMTAB_OBJFILE (sal.symtab) != NULL
11613 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 11614 return 1;
f7f9143b
JB
11615 }
11616
4ed6b5be 11617 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11618
e9e07ba6 11619 find_frame_funname (frame, &func_name, &func_lang, NULL);
f7f9143b
JB
11620 if (func_name == NULL)
11621 return 1;
11622
11623 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11624 {
11625 re_comp (known_auxiliary_function_name_patterns[i]);
11626 if (re_exec (func_name))
55b87a52
KS
11627 {
11628 xfree (func_name);
11629 return 1;
11630 }
f7f9143b
JB
11631 }
11632
55b87a52 11633 xfree (func_name);
f7f9143b
JB
11634 return 0;
11635}
11636
11637/* Find the first frame that contains debugging information and that is not
11638 part of the Ada run-time, starting from FI and moving upward. */
11639
0ef643c8 11640void
f7f9143b
JB
11641ada_find_printable_frame (struct frame_info *fi)
11642{
11643 for (; fi != NULL; fi = get_prev_frame (fi))
11644 {
11645 if (!is_known_support_routine (fi))
11646 {
11647 select_frame (fi);
11648 break;
11649 }
11650 }
11651
11652}
11653
11654/* Assuming that the inferior just triggered an unhandled exception
11655 catchpoint, return the address in inferior memory where the name
11656 of the exception is stored.
11657
11658 Return zero if the address could not be computed. */
11659
11660static CORE_ADDR
11661ada_unhandled_exception_name_addr (void)
0259addd
JB
11662{
11663 return parse_and_eval_address ("e.full_name");
11664}
11665
11666/* Same as ada_unhandled_exception_name_addr, except that this function
11667 should be used when the inferior uses an older version of the runtime,
11668 where the exception name needs to be extracted from a specific frame
11669 several frames up in the callstack. */
11670
11671static CORE_ADDR
11672ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11673{
11674 int frame_level;
11675 struct frame_info *fi;
3eecfa55 11676 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
55b87a52 11677 struct cleanup *old_chain;
f7f9143b
JB
11678
11679 /* To determine the name of this exception, we need to select
11680 the frame corresponding to RAISE_SYM_NAME. This frame is
11681 at least 3 levels up, so we simply skip the first 3 frames
11682 without checking the name of their associated function. */
11683 fi = get_current_frame ();
11684 for (frame_level = 0; frame_level < 3; frame_level += 1)
11685 if (fi != NULL)
11686 fi = get_prev_frame (fi);
11687
55b87a52 11688 old_chain = make_cleanup (null_cleanup, NULL);
f7f9143b
JB
11689 while (fi != NULL)
11690 {
55b87a52 11691 char *func_name;
692465f1
JB
11692 enum language func_lang;
11693
e9e07ba6 11694 find_frame_funname (fi, &func_name, &func_lang, NULL);
55b87a52
KS
11695 if (func_name != NULL)
11696 {
11697 make_cleanup (xfree, func_name);
11698
11699 if (strcmp (func_name,
11700 data->exception_info->catch_exception_sym) == 0)
11701 break; /* We found the frame we were looking for... */
11702 fi = get_prev_frame (fi);
11703 }
f7f9143b 11704 }
55b87a52 11705 do_cleanups (old_chain);
f7f9143b
JB
11706
11707 if (fi == NULL)
11708 return 0;
11709
11710 select_frame (fi);
11711 return parse_and_eval_address ("id.full_name");
11712}
11713
11714/* Assuming the inferior just triggered an Ada exception catchpoint
11715 (of any type), return the address in inferior memory where the name
11716 of the exception is stored, if applicable.
11717
11718 Return zero if the address could not be computed, or if not relevant. */
11719
11720static CORE_ADDR
761269c8 11721ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11722 struct breakpoint *b)
11723{
3eecfa55
JB
11724 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11725
f7f9143b
JB
11726 switch (ex)
11727 {
761269c8 11728 case ada_catch_exception:
f7f9143b
JB
11729 return (parse_and_eval_address ("e.full_name"));
11730 break;
11731
761269c8 11732 case ada_catch_exception_unhandled:
3eecfa55 11733 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b
JB
11734 break;
11735
761269c8 11736 case ada_catch_assert:
f7f9143b
JB
11737 return 0; /* Exception name is not relevant in this case. */
11738 break;
11739
11740 default:
11741 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11742 break;
11743 }
11744
11745 return 0; /* Should never be reached. */
11746}
11747
11748/* Same as ada_exception_name_addr_1, except that it intercepts and contains
11749 any error that ada_exception_name_addr_1 might cause to be thrown.
11750 When an error is intercepted, a warning with the error message is printed,
11751 and zero is returned. */
11752
11753static CORE_ADDR
761269c8 11754ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11755 struct breakpoint *b)
11756{
bfd189b1 11757 volatile struct gdb_exception e;
f7f9143b
JB
11758 CORE_ADDR result = 0;
11759
11760 TRY_CATCH (e, RETURN_MASK_ERROR)
11761 {
11762 result = ada_exception_name_addr_1 (ex, b);
11763 }
11764
11765 if (e.reason < 0)
11766 {
11767 warning (_("failed to get exception name: %s"), e.message);
11768 return 0;
11769 }
11770
11771 return result;
11772}
11773
28010a5d
PA
11774static char *ada_exception_catchpoint_cond_string (const char *excep_string);
11775
11776/* Ada catchpoints.
11777
11778 In the case of catchpoints on Ada exceptions, the catchpoint will
11779 stop the target on every exception the program throws. When a user
11780 specifies the name of a specific exception, we translate this
11781 request into a condition expression (in text form), and then parse
11782 it into an expression stored in each of the catchpoint's locations.
11783 We then use this condition to check whether the exception that was
11784 raised is the one the user is interested in. If not, then the
11785 target is resumed again. We store the name of the requested
11786 exception, in order to be able to re-set the condition expression
11787 when symbols change. */
11788
11789/* An instance of this type is used to represent an Ada catchpoint
11790 breakpoint location. It includes a "struct bp_location" as a kind
11791 of base class; users downcast to "struct bp_location *" when
11792 needed. */
11793
11794struct ada_catchpoint_location
11795{
11796 /* The base class. */
11797 struct bp_location base;
11798
11799 /* The condition that checks whether the exception that was raised
11800 is the specific exception the user specified on catchpoint
11801 creation. */
11802 struct expression *excep_cond_expr;
11803};
11804
11805/* Implement the DTOR method in the bp_location_ops structure for all
11806 Ada exception catchpoint kinds. */
11807
11808static void
11809ada_catchpoint_location_dtor (struct bp_location *bl)
11810{
11811 struct ada_catchpoint_location *al = (struct ada_catchpoint_location *) bl;
11812
11813 xfree (al->excep_cond_expr);
11814}
11815
11816/* The vtable to be used in Ada catchpoint locations. */
11817
11818static const struct bp_location_ops ada_catchpoint_location_ops =
11819{
11820 ada_catchpoint_location_dtor
11821};
11822
11823/* An instance of this type is used to represent an Ada catchpoint.
11824 It includes a "struct breakpoint" as a kind of base class; users
11825 downcast to "struct breakpoint *" when needed. */
11826
11827struct ada_catchpoint
11828{
11829 /* The base class. */
11830 struct breakpoint base;
11831
11832 /* The name of the specific exception the user specified. */
11833 char *excep_string;
11834};
11835
11836/* Parse the exception condition string in the context of each of the
11837 catchpoint's locations, and store them for later evaluation. */
11838
11839static void
11840create_excep_cond_exprs (struct ada_catchpoint *c)
11841{
11842 struct cleanup *old_chain;
11843 struct bp_location *bl;
11844 char *cond_string;
11845
11846 /* Nothing to do if there's no specific exception to catch. */
11847 if (c->excep_string == NULL)
11848 return;
11849
11850 /* Same if there are no locations... */
11851 if (c->base.loc == NULL)
11852 return;
11853
11854 /* Compute the condition expression in text form, from the specific
11855 expection we want to catch. */
11856 cond_string = ada_exception_catchpoint_cond_string (c->excep_string);
11857 old_chain = make_cleanup (xfree, cond_string);
11858
11859 /* Iterate over all the catchpoint's locations, and parse an
11860 expression for each. */
11861 for (bl = c->base.loc; bl != NULL; bl = bl->next)
11862 {
11863 struct ada_catchpoint_location *ada_loc
11864 = (struct ada_catchpoint_location *) bl;
11865 struct expression *exp = NULL;
11866
11867 if (!bl->shlib_disabled)
11868 {
11869 volatile struct gdb_exception e;
bbc13ae3 11870 const char *s;
28010a5d
PA
11871
11872 s = cond_string;
11873 TRY_CATCH (e, RETURN_MASK_ERROR)
11874 {
1bb9788d
TT
11875 exp = parse_exp_1 (&s, bl->address,
11876 block_for_pc (bl->address), 0);
28010a5d
PA
11877 }
11878 if (e.reason < 0)
849f2b52
JB
11879 {
11880 warning (_("failed to reevaluate internal exception condition "
11881 "for catchpoint %d: %s"),
11882 c->base.number, e.message);
11883 /* There is a bug in GCC on sparc-solaris when building with
11884 optimization which causes EXP to change unexpectedly
11885 (http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56982).
11886 The problem should be fixed starting with GCC 4.9.
11887 In the meantime, work around it by forcing EXP back
11888 to NULL. */
11889 exp = NULL;
11890 }
28010a5d
PA
11891 }
11892
11893 ada_loc->excep_cond_expr = exp;
11894 }
11895
11896 do_cleanups (old_chain);
11897}
11898
11899/* Implement the DTOR method in the breakpoint_ops structure for all
11900 exception catchpoint kinds. */
11901
11902static void
761269c8 11903dtor_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
11904{
11905 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
11906
11907 xfree (c->excep_string);
348d480f 11908
2060206e 11909 bkpt_breakpoint_ops.dtor (b);
28010a5d
PA
11910}
11911
11912/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
11913 structure for all exception catchpoint kinds. */
11914
11915static struct bp_location *
761269c8 11916allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
11917 struct breakpoint *self)
11918{
11919 struct ada_catchpoint_location *loc;
11920
11921 loc = XNEW (struct ada_catchpoint_location);
11922 init_bp_location (&loc->base, &ada_catchpoint_location_ops, self);
11923 loc->excep_cond_expr = NULL;
11924 return &loc->base;
11925}
11926
11927/* Implement the RE_SET method in the breakpoint_ops structure for all
11928 exception catchpoint kinds. */
11929
11930static void
761269c8 11931re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
11932{
11933 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
11934
11935 /* Call the base class's method. This updates the catchpoint's
11936 locations. */
2060206e 11937 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
11938
11939 /* Reparse the exception conditional expressions. One for each
11940 location. */
11941 create_excep_cond_exprs (c);
11942}
11943
11944/* Returns true if we should stop for this breakpoint hit. If the
11945 user specified a specific exception, we only want to cause a stop
11946 if the program thrown that exception. */
11947
11948static int
11949should_stop_exception (const struct bp_location *bl)
11950{
11951 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
11952 const struct ada_catchpoint_location *ada_loc
11953 = (const struct ada_catchpoint_location *) bl;
11954 volatile struct gdb_exception ex;
11955 int stop;
11956
11957 /* With no specific exception, should always stop. */
11958 if (c->excep_string == NULL)
11959 return 1;
11960
11961 if (ada_loc->excep_cond_expr == NULL)
11962 {
11963 /* We will have a NULL expression if back when we were creating
11964 the expressions, this location's had failed to parse. */
11965 return 1;
11966 }
11967
11968 stop = 1;
11969 TRY_CATCH (ex, RETURN_MASK_ALL)
11970 {
11971 struct value *mark;
11972
11973 mark = value_mark ();
11974 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr));
11975 value_free_to_mark (mark);
11976 }
11977 if (ex.reason < 0)
11978 exception_fprintf (gdb_stderr, ex,
11979 _("Error in testing exception condition:\n"));
11980 return stop;
11981}
11982
11983/* Implement the CHECK_STATUS method in the breakpoint_ops structure
11984 for all exception catchpoint kinds. */
11985
11986static void
761269c8 11987check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
11988{
11989 bs->stop = should_stop_exception (bs->bp_location_at);
11990}
11991
f7f9143b
JB
11992/* Implement the PRINT_IT method in the breakpoint_ops structure
11993 for all exception catchpoint kinds. */
11994
11995static enum print_stop_action
761269c8 11996print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 11997{
79a45e25 11998 struct ui_out *uiout = current_uiout;
348d480f
PA
11999 struct breakpoint *b = bs->breakpoint_at;
12000
956a9fb9 12001 annotate_catchpoint (b->number);
f7f9143b 12002
956a9fb9 12003 if (ui_out_is_mi_like_p (uiout))
f7f9143b 12004 {
956a9fb9
JB
12005 ui_out_field_string (uiout, "reason",
12006 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
12007 ui_out_field_string (uiout, "disp", bpdisp_text (b->disposition));
f7f9143b
JB
12008 }
12009
00eb2c4a
JB
12010 ui_out_text (uiout,
12011 b->disposition == disp_del ? "\nTemporary catchpoint "
12012 : "\nCatchpoint ");
956a9fb9
JB
12013 ui_out_field_int (uiout, "bkptno", b->number);
12014 ui_out_text (uiout, ", ");
f7f9143b 12015
f7f9143b
JB
12016 switch (ex)
12017 {
761269c8
JB
12018 case ada_catch_exception:
12019 case ada_catch_exception_unhandled:
956a9fb9
JB
12020 {
12021 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12022 char exception_name[256];
12023
12024 if (addr != 0)
12025 {
c714b426
PA
12026 read_memory (addr, (gdb_byte *) exception_name,
12027 sizeof (exception_name) - 1);
956a9fb9
JB
12028 exception_name [sizeof (exception_name) - 1] = '\0';
12029 }
12030 else
12031 {
12032 /* For some reason, we were unable to read the exception
12033 name. This could happen if the Runtime was compiled
12034 without debugging info, for instance. In that case,
12035 just replace the exception name by the generic string
12036 "exception" - it will read as "an exception" in the
12037 notification we are about to print. */
967cff16 12038 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12039 }
12040 /* In the case of unhandled exception breakpoints, we print
12041 the exception name as "unhandled EXCEPTION_NAME", to make
12042 it clearer to the user which kind of catchpoint just got
12043 hit. We used ui_out_text to make sure that this extra
12044 info does not pollute the exception name in the MI case. */
761269c8 12045 if (ex == ada_catch_exception_unhandled)
956a9fb9
JB
12046 ui_out_text (uiout, "unhandled ");
12047 ui_out_field_string (uiout, "exception-name", exception_name);
12048 }
12049 break;
761269c8 12050 case ada_catch_assert:
956a9fb9
JB
12051 /* In this case, the name of the exception is not really
12052 important. Just print "failed assertion" to make it clearer
12053 that his program just hit an assertion-failure catchpoint.
12054 We used ui_out_text because this info does not belong in
12055 the MI output. */
12056 ui_out_text (uiout, "failed assertion");
12057 break;
f7f9143b 12058 }
956a9fb9
JB
12059 ui_out_text (uiout, " at ");
12060 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12061
12062 return PRINT_SRC_AND_LOC;
12063}
12064
12065/* Implement the PRINT_ONE method in the breakpoint_ops structure
12066 for all exception catchpoint kinds. */
12067
12068static void
761269c8 12069print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12070 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12071{
79a45e25 12072 struct ui_out *uiout = current_uiout;
28010a5d 12073 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12074 struct value_print_options opts;
12075
12076 get_user_print_options (&opts);
12077 if (opts.addressprint)
f7f9143b
JB
12078 {
12079 annotate_field (4);
5af949e3 12080 ui_out_field_core_addr (uiout, "addr", b->loc->gdbarch, b->loc->address);
f7f9143b
JB
12081 }
12082
12083 annotate_field (5);
a6d9a66e 12084 *last_loc = b->loc;
f7f9143b
JB
12085 switch (ex)
12086 {
761269c8 12087 case ada_catch_exception:
28010a5d 12088 if (c->excep_string != NULL)
f7f9143b 12089 {
28010a5d
PA
12090 char *msg = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12091
f7f9143b
JB
12092 ui_out_field_string (uiout, "what", msg);
12093 xfree (msg);
12094 }
12095 else
12096 ui_out_field_string (uiout, "what", "all Ada exceptions");
12097
12098 break;
12099
761269c8 12100 case ada_catch_exception_unhandled:
f7f9143b
JB
12101 ui_out_field_string (uiout, "what", "unhandled Ada exceptions");
12102 break;
12103
761269c8 12104 case ada_catch_assert:
f7f9143b
JB
12105 ui_out_field_string (uiout, "what", "failed Ada assertions");
12106 break;
12107
12108 default:
12109 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12110 break;
12111 }
12112}
12113
12114/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12115 for all exception catchpoint kinds. */
12116
12117static void
761269c8 12118print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12119 struct breakpoint *b)
12120{
28010a5d 12121 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12122 struct ui_out *uiout = current_uiout;
28010a5d 12123
00eb2c4a
JB
12124 ui_out_text (uiout, b->disposition == disp_del ? _("Temporary catchpoint ")
12125 : _("Catchpoint "));
12126 ui_out_field_int (uiout, "bkptno", b->number);
12127 ui_out_text (uiout, ": ");
12128
f7f9143b
JB
12129 switch (ex)
12130 {
761269c8 12131 case ada_catch_exception:
28010a5d 12132 if (c->excep_string != NULL)
00eb2c4a
JB
12133 {
12134 char *info = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12135 struct cleanup *old_chain = make_cleanup (xfree, info);
12136
12137 ui_out_text (uiout, info);
12138 do_cleanups (old_chain);
12139 }
f7f9143b 12140 else
00eb2c4a 12141 ui_out_text (uiout, _("all Ada exceptions"));
f7f9143b
JB
12142 break;
12143
761269c8 12144 case ada_catch_exception_unhandled:
00eb2c4a 12145 ui_out_text (uiout, _("unhandled Ada exceptions"));
f7f9143b
JB
12146 break;
12147
761269c8 12148 case ada_catch_assert:
00eb2c4a 12149 ui_out_text (uiout, _("failed Ada assertions"));
f7f9143b
JB
12150 break;
12151
12152 default:
12153 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12154 break;
12155 }
12156}
12157
6149aea9
PA
12158/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12159 for all exception catchpoint kinds. */
12160
12161static void
761269c8 12162print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12163 struct breakpoint *b, struct ui_file *fp)
12164{
28010a5d
PA
12165 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12166
6149aea9
PA
12167 switch (ex)
12168 {
761269c8 12169 case ada_catch_exception:
6149aea9 12170 fprintf_filtered (fp, "catch exception");
28010a5d
PA
12171 if (c->excep_string != NULL)
12172 fprintf_filtered (fp, " %s", c->excep_string);
6149aea9
PA
12173 break;
12174
761269c8 12175 case ada_catch_exception_unhandled:
78076abc 12176 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12177 break;
12178
761269c8 12179 case ada_catch_assert:
6149aea9
PA
12180 fprintf_filtered (fp, "catch assert");
12181 break;
12182
12183 default:
12184 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12185 }
d9b3f62e 12186 print_recreate_thread (b, fp);
6149aea9
PA
12187}
12188
f7f9143b
JB
12189/* Virtual table for "catch exception" breakpoints. */
12190
28010a5d
PA
12191static void
12192dtor_catch_exception (struct breakpoint *b)
12193{
761269c8 12194 dtor_exception (ada_catch_exception, b);
28010a5d
PA
12195}
12196
12197static struct bp_location *
12198allocate_location_catch_exception (struct breakpoint *self)
12199{
761269c8 12200 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12201}
12202
12203static void
12204re_set_catch_exception (struct breakpoint *b)
12205{
761269c8 12206 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12207}
12208
12209static void
12210check_status_catch_exception (bpstat bs)
12211{
761269c8 12212 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12213}
12214
f7f9143b 12215static enum print_stop_action
348d480f 12216print_it_catch_exception (bpstat bs)
f7f9143b 12217{
761269c8 12218 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12219}
12220
12221static void
a6d9a66e 12222print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12223{
761269c8 12224 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12225}
12226
12227static void
12228print_mention_catch_exception (struct breakpoint *b)
12229{
761269c8 12230 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12231}
12232
6149aea9
PA
12233static void
12234print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12235{
761269c8 12236 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12237}
12238
2060206e 12239static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12240
12241/* Virtual table for "catch exception unhandled" breakpoints. */
12242
28010a5d
PA
12243static void
12244dtor_catch_exception_unhandled (struct breakpoint *b)
12245{
761269c8 12246 dtor_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12247}
12248
12249static struct bp_location *
12250allocate_location_catch_exception_unhandled (struct breakpoint *self)
12251{
761269c8 12252 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12253}
12254
12255static void
12256re_set_catch_exception_unhandled (struct breakpoint *b)
12257{
761269c8 12258 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12259}
12260
12261static void
12262check_status_catch_exception_unhandled (bpstat bs)
12263{
761269c8 12264 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12265}
12266
f7f9143b 12267static enum print_stop_action
348d480f 12268print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12269{
761269c8 12270 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12271}
12272
12273static void
a6d9a66e
UW
12274print_one_catch_exception_unhandled (struct breakpoint *b,
12275 struct bp_location **last_loc)
f7f9143b 12276{
761269c8 12277 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12278}
12279
12280static void
12281print_mention_catch_exception_unhandled (struct breakpoint *b)
12282{
761269c8 12283 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12284}
12285
6149aea9
PA
12286static void
12287print_recreate_catch_exception_unhandled (struct breakpoint *b,
12288 struct ui_file *fp)
12289{
761269c8 12290 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12291}
12292
2060206e 12293static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12294
12295/* Virtual table for "catch assert" breakpoints. */
12296
28010a5d
PA
12297static void
12298dtor_catch_assert (struct breakpoint *b)
12299{
761269c8 12300 dtor_exception (ada_catch_assert, b);
28010a5d
PA
12301}
12302
12303static struct bp_location *
12304allocate_location_catch_assert (struct breakpoint *self)
12305{
761269c8 12306 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12307}
12308
12309static void
12310re_set_catch_assert (struct breakpoint *b)
12311{
761269c8 12312 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12313}
12314
12315static void
12316check_status_catch_assert (bpstat bs)
12317{
761269c8 12318 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12319}
12320
f7f9143b 12321static enum print_stop_action
348d480f 12322print_it_catch_assert (bpstat bs)
f7f9143b 12323{
761269c8 12324 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12325}
12326
12327static void
a6d9a66e 12328print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12329{
761269c8 12330 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12331}
12332
12333static void
12334print_mention_catch_assert (struct breakpoint *b)
12335{
761269c8 12336 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12337}
12338
6149aea9
PA
12339static void
12340print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12341{
761269c8 12342 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12343}
12344
2060206e 12345static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12346
f7f9143b
JB
12347/* Return a newly allocated copy of the first space-separated token
12348 in ARGSP, and then adjust ARGSP to point immediately after that
12349 token.
12350
12351 Return NULL if ARGPS does not contain any more tokens. */
12352
12353static char *
12354ada_get_next_arg (char **argsp)
12355{
12356 char *args = *argsp;
12357 char *end;
12358 char *result;
12359
0fcd72ba 12360 args = skip_spaces (args);
f7f9143b
JB
12361 if (args[0] == '\0')
12362 return NULL; /* No more arguments. */
12363
12364 /* Find the end of the current argument. */
12365
0fcd72ba 12366 end = skip_to_space (args);
f7f9143b
JB
12367
12368 /* Adjust ARGSP to point to the start of the next argument. */
12369
12370 *argsp = end;
12371
12372 /* Make a copy of the current argument and return it. */
12373
12374 result = xmalloc (end - args + 1);
12375 strncpy (result, args, end - args);
12376 result[end - args] = '\0';
12377
12378 return result;
12379}
12380
12381/* Split the arguments specified in a "catch exception" command.
12382 Set EX to the appropriate catchpoint type.
28010a5d 12383 Set EXCEP_STRING to the name of the specific exception if
5845583d
JB
12384 specified by the user.
12385 If a condition is found at the end of the arguments, the condition
12386 expression is stored in COND_STRING (memory must be deallocated
12387 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12388
12389static void
12390catch_ada_exception_command_split (char *args,
761269c8 12391 enum ada_exception_catchpoint_kind *ex,
5845583d
JB
12392 char **excep_string,
12393 char **cond_string)
f7f9143b
JB
12394{
12395 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
12396 char *exception_name;
5845583d 12397 char *cond = NULL;
f7f9143b
JB
12398
12399 exception_name = ada_get_next_arg (&args);
5845583d
JB
12400 if (exception_name != NULL && strcmp (exception_name, "if") == 0)
12401 {
12402 /* This is not an exception name; this is the start of a condition
12403 expression for a catchpoint on all exceptions. So, "un-get"
12404 this token, and set exception_name to NULL. */
12405 xfree (exception_name);
12406 exception_name = NULL;
12407 args -= 2;
12408 }
f7f9143b
JB
12409 make_cleanup (xfree, exception_name);
12410
5845583d 12411 /* Check to see if we have a condition. */
f7f9143b 12412
0fcd72ba 12413 args = skip_spaces (args);
5845583d
JB
12414 if (strncmp (args, "if", 2) == 0
12415 && (isspace (args[2]) || args[2] == '\0'))
12416 {
12417 args += 2;
12418 args = skip_spaces (args);
12419
12420 if (args[0] == '\0')
12421 error (_("Condition missing after `if' keyword"));
12422 cond = xstrdup (args);
12423 make_cleanup (xfree, cond);
12424
12425 args += strlen (args);
12426 }
12427
12428 /* Check that we do not have any more arguments. Anything else
12429 is unexpected. */
f7f9143b
JB
12430
12431 if (args[0] != '\0')
12432 error (_("Junk at end of expression"));
12433
12434 discard_cleanups (old_chain);
12435
12436 if (exception_name == NULL)
12437 {
12438 /* Catch all exceptions. */
761269c8 12439 *ex = ada_catch_exception;
28010a5d 12440 *excep_string = NULL;
f7f9143b
JB
12441 }
12442 else if (strcmp (exception_name, "unhandled") == 0)
12443 {
12444 /* Catch unhandled exceptions. */
761269c8 12445 *ex = ada_catch_exception_unhandled;
28010a5d 12446 *excep_string = NULL;
f7f9143b
JB
12447 }
12448 else
12449 {
12450 /* Catch a specific exception. */
761269c8 12451 *ex = ada_catch_exception;
28010a5d 12452 *excep_string = exception_name;
f7f9143b 12453 }
5845583d 12454 *cond_string = cond;
f7f9143b
JB
12455}
12456
12457/* Return the name of the symbol on which we should break in order to
12458 implement a catchpoint of the EX kind. */
12459
12460static const char *
761269c8 12461ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12462{
3eecfa55
JB
12463 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12464
12465 gdb_assert (data->exception_info != NULL);
0259addd 12466
f7f9143b
JB
12467 switch (ex)
12468 {
761269c8 12469 case ada_catch_exception:
3eecfa55 12470 return (data->exception_info->catch_exception_sym);
f7f9143b 12471 break;
761269c8 12472 case ada_catch_exception_unhandled:
3eecfa55 12473 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12474 break;
761269c8 12475 case ada_catch_assert:
3eecfa55 12476 return (data->exception_info->catch_assert_sym);
f7f9143b
JB
12477 break;
12478 default:
12479 internal_error (__FILE__, __LINE__,
12480 _("unexpected catchpoint kind (%d)"), ex);
12481 }
12482}
12483
12484/* Return the breakpoint ops "virtual table" used for catchpoints
12485 of the EX kind. */
12486
c0a91b2b 12487static const struct breakpoint_ops *
761269c8 12488ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12489{
12490 switch (ex)
12491 {
761269c8 12492 case ada_catch_exception:
f7f9143b
JB
12493 return (&catch_exception_breakpoint_ops);
12494 break;
761269c8 12495 case ada_catch_exception_unhandled:
f7f9143b
JB
12496 return (&catch_exception_unhandled_breakpoint_ops);
12497 break;
761269c8 12498 case ada_catch_assert:
f7f9143b
JB
12499 return (&catch_assert_breakpoint_ops);
12500 break;
12501 default:
12502 internal_error (__FILE__, __LINE__,
12503 _("unexpected catchpoint kind (%d)"), ex);
12504 }
12505}
12506
12507/* Return the condition that will be used to match the current exception
12508 being raised with the exception that the user wants to catch. This
12509 assumes that this condition is used when the inferior just triggered
12510 an exception catchpoint.
12511
12512 The string returned is a newly allocated string that needs to be
12513 deallocated later. */
12514
12515static char *
28010a5d 12516ada_exception_catchpoint_cond_string (const char *excep_string)
f7f9143b 12517{
3d0b0fa3
JB
12518 int i;
12519
0963b4bd 12520 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12521 runtime units that have been compiled without debugging info; if
28010a5d 12522 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12523 exception (e.g. "constraint_error") then, during the evaluation
12524 of the condition expression, the symbol lookup on this name would
0963b4bd 12525 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12526 may then be set only on user-defined exceptions which have the
12527 same not-fully-qualified name (e.g. my_package.constraint_error).
12528
12529 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12530 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12531 exception constraint_error" is rewritten into "catch exception
12532 standard.constraint_error".
12533
12534 If an exception named contraint_error is defined in another package of
12535 the inferior program, then the only way to specify this exception as a
12536 breakpoint condition is to use its fully-qualified named:
12537 e.g. my_package.constraint_error. */
12538
12539 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12540 {
28010a5d 12541 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3
JB
12542 {
12543 return xstrprintf ("long_integer (e) = long_integer (&standard.%s)",
28010a5d 12544 excep_string);
3d0b0fa3
JB
12545 }
12546 }
28010a5d 12547 return xstrprintf ("long_integer (e) = long_integer (&%s)", excep_string);
f7f9143b
JB
12548}
12549
12550/* Return the symtab_and_line that should be used to insert an exception
12551 catchpoint of the TYPE kind.
12552
28010a5d
PA
12553 EXCEP_STRING should contain the name of a specific exception that
12554 the catchpoint should catch, or NULL otherwise.
f7f9143b 12555
28010a5d
PA
12556 ADDR_STRING returns the name of the function where the real
12557 breakpoint that implements the catchpoints is set, depending on the
12558 type of catchpoint we need to create. */
f7f9143b
JB
12559
12560static struct symtab_and_line
761269c8 12561ada_exception_sal (enum ada_exception_catchpoint_kind ex, char *excep_string,
c0a91b2b 12562 char **addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12563{
12564 const char *sym_name;
12565 struct symbol *sym;
f7f9143b 12566
0259addd
JB
12567 /* First, find out which exception support info to use. */
12568 ada_exception_support_info_sniffer ();
12569
12570 /* Then lookup the function on which we will break in order to catch
f7f9143b 12571 the Ada exceptions requested by the user. */
f7f9143b
JB
12572 sym_name = ada_exception_sym_name (ex);
12573 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12574
f17011e0
JB
12575 /* We can assume that SYM is not NULL at this stage. If the symbol
12576 did not exist, ada_exception_support_info_sniffer would have
12577 raised an exception.
f7f9143b 12578
f17011e0
JB
12579 Also, ada_exception_support_info_sniffer should have already
12580 verified that SYM is a function symbol. */
12581 gdb_assert (sym != NULL);
12582 gdb_assert (SYMBOL_CLASS (sym) == LOC_BLOCK);
f7f9143b
JB
12583
12584 /* Set ADDR_STRING. */
f7f9143b
JB
12585 *addr_string = xstrdup (sym_name);
12586
f7f9143b 12587 /* Set OPS. */
4b9eee8c 12588 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12589
f17011e0 12590 return find_function_start_sal (sym, 1);
f7f9143b
JB
12591}
12592
b4a5b78b 12593/* Create an Ada exception catchpoint.
f7f9143b 12594
b4a5b78b 12595 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12596
2df4d1d5
JB
12597 If EXCEPT_STRING is NULL, this catchpoint is expected to trigger
12598 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
12599 of the exception to which this catchpoint applies. When not NULL,
12600 the string must be allocated on the heap, and its deallocation
12601 is no longer the responsibility of the caller.
12602
12603 COND_STRING, if not NULL, is the catchpoint condition. This string
12604 must be allocated on the heap, and its deallocation is no longer
12605 the responsibility of the caller.
f7f9143b 12606
b4a5b78b
JB
12607 TEMPFLAG, if nonzero, means that the underlying breakpoint
12608 should be temporary.
28010a5d 12609
b4a5b78b 12610 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12611
349774ef 12612void
28010a5d 12613create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12614 enum ada_exception_catchpoint_kind ex_kind,
28010a5d 12615 char *excep_string,
5845583d 12616 char *cond_string,
28010a5d 12617 int tempflag,
349774ef 12618 int disabled,
28010a5d
PA
12619 int from_tty)
12620{
12621 struct ada_catchpoint *c;
b4a5b78b
JB
12622 char *addr_string = NULL;
12623 const struct breakpoint_ops *ops = NULL;
12624 struct symtab_and_line sal
12625 = ada_exception_sal (ex_kind, excep_string, &addr_string, &ops);
28010a5d
PA
12626
12627 c = XNEW (struct ada_catchpoint);
12628 init_ada_exception_breakpoint (&c->base, gdbarch, sal, addr_string,
349774ef 12629 ops, tempflag, disabled, from_tty);
28010a5d
PA
12630 c->excep_string = excep_string;
12631 create_excep_cond_exprs (c);
5845583d
JB
12632 if (cond_string != NULL)
12633 set_breakpoint_condition (&c->base, cond_string, from_tty);
3ea46bff 12634 install_breakpoint (0, &c->base, 1);
f7f9143b
JB
12635}
12636
9ac4176b
PA
12637/* Implement the "catch exception" command. */
12638
12639static void
12640catch_ada_exception_command (char *arg, int from_tty,
12641 struct cmd_list_element *command)
12642{
12643 struct gdbarch *gdbarch = get_current_arch ();
12644 int tempflag;
761269c8 12645 enum ada_exception_catchpoint_kind ex_kind;
28010a5d 12646 char *excep_string = NULL;
5845583d 12647 char *cond_string = NULL;
9ac4176b
PA
12648
12649 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12650
12651 if (!arg)
12652 arg = "";
b4a5b78b
JB
12653 catch_ada_exception_command_split (arg, &ex_kind, &excep_string,
12654 &cond_string);
12655 create_ada_exception_catchpoint (gdbarch, ex_kind,
12656 excep_string, cond_string,
349774ef
JB
12657 tempflag, 1 /* enabled */,
12658 from_tty);
9ac4176b
PA
12659}
12660
b4a5b78b 12661/* Split the arguments specified in a "catch assert" command.
5845583d 12662
b4a5b78b
JB
12663 ARGS contains the command's arguments (or the empty string if
12664 no arguments were passed).
5845583d
JB
12665
12666 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12667 (the memory needs to be deallocated after use). */
5845583d 12668
b4a5b78b
JB
12669static void
12670catch_ada_assert_command_split (char *args, char **cond_string)
f7f9143b 12671{
5845583d 12672 args = skip_spaces (args);
f7f9143b 12673
5845583d
JB
12674 /* Check whether a condition was provided. */
12675 if (strncmp (args, "if", 2) == 0
12676 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12677 {
5845583d 12678 args += 2;
0fcd72ba 12679 args = skip_spaces (args);
5845583d
JB
12680 if (args[0] == '\0')
12681 error (_("condition missing after `if' keyword"));
12682 *cond_string = xstrdup (args);
f7f9143b
JB
12683 }
12684
5845583d
JB
12685 /* Otherwise, there should be no other argument at the end of
12686 the command. */
12687 else if (args[0] != '\0')
12688 error (_("Junk at end of arguments."));
f7f9143b
JB
12689}
12690
9ac4176b
PA
12691/* Implement the "catch assert" command. */
12692
12693static void
12694catch_assert_command (char *arg, int from_tty,
12695 struct cmd_list_element *command)
12696{
12697 struct gdbarch *gdbarch = get_current_arch ();
12698 int tempflag;
5845583d 12699 char *cond_string = NULL;
9ac4176b
PA
12700
12701 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12702
12703 if (!arg)
12704 arg = "";
b4a5b78b 12705 catch_ada_assert_command_split (arg, &cond_string);
761269c8 12706 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
b4a5b78b 12707 NULL, cond_string,
349774ef
JB
12708 tempflag, 1 /* enabled */,
12709 from_tty);
9ac4176b 12710}
778865d3
JB
12711
12712/* Return non-zero if the symbol SYM is an Ada exception object. */
12713
12714static int
12715ada_is_exception_sym (struct symbol *sym)
12716{
12717 const char *type_name = type_name_no_tag (SYMBOL_TYPE (sym));
12718
12719 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
12720 && SYMBOL_CLASS (sym) != LOC_BLOCK
12721 && SYMBOL_CLASS (sym) != LOC_CONST
12722 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12723 && type_name != NULL && strcmp (type_name, "exception") == 0);
12724}
12725
12726/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12727 Ada exception object. This matches all exceptions except the ones
12728 defined by the Ada language. */
12729
12730static int
12731ada_is_non_standard_exception_sym (struct symbol *sym)
12732{
12733 int i;
12734
12735 if (!ada_is_exception_sym (sym))
12736 return 0;
12737
12738 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12739 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
12740 return 0; /* A standard exception. */
12741
12742 /* Numeric_Error is also a standard exception, so exclude it.
12743 See the STANDARD_EXC description for more details as to why
12744 this exception is not listed in that array. */
12745 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
12746 return 0;
12747
12748 return 1;
12749}
12750
12751/* A helper function for qsort, comparing two struct ada_exc_info
12752 objects.
12753
12754 The comparison is determined first by exception name, and then
12755 by exception address. */
12756
12757static int
12758compare_ada_exception_info (const void *a, const void *b)
12759{
12760 const struct ada_exc_info *exc_a = (struct ada_exc_info *) a;
12761 const struct ada_exc_info *exc_b = (struct ada_exc_info *) b;
12762 int result;
12763
12764 result = strcmp (exc_a->name, exc_b->name);
12765 if (result != 0)
12766 return result;
12767
12768 if (exc_a->addr < exc_b->addr)
12769 return -1;
12770 if (exc_a->addr > exc_b->addr)
12771 return 1;
12772
12773 return 0;
12774}
12775
12776/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12777 routine, but keeping the first SKIP elements untouched.
12778
12779 All duplicates are also removed. */
12780
12781static void
12782sort_remove_dups_ada_exceptions_list (VEC(ada_exc_info) **exceptions,
12783 int skip)
12784{
12785 struct ada_exc_info *to_sort
12786 = VEC_address (ada_exc_info, *exceptions) + skip;
12787 int to_sort_len
12788 = VEC_length (ada_exc_info, *exceptions) - skip;
12789 int i, j;
12790
12791 qsort (to_sort, to_sort_len, sizeof (struct ada_exc_info),
12792 compare_ada_exception_info);
12793
12794 for (i = 1, j = 1; i < to_sort_len; i++)
12795 if (compare_ada_exception_info (&to_sort[i], &to_sort[j - 1]) != 0)
12796 to_sort[j++] = to_sort[i];
12797 to_sort_len = j;
12798 VEC_truncate(ada_exc_info, *exceptions, skip + to_sort_len);
12799}
12800
12801/* A function intended as the "name_matcher" callback in the struct
12802 quick_symbol_functions' expand_symtabs_matching method.
12803
12804 SEARCH_NAME is the symbol's search name.
12805
12806 If USER_DATA is not NULL, it is a pointer to a regext_t object
12807 used to match the symbol (by natural name). Otherwise, when USER_DATA
12808 is null, no filtering is performed, and all symbols are a positive
12809 match. */
12810
12811static int
12812ada_exc_search_name_matches (const char *search_name, void *user_data)
12813{
12814 regex_t *preg = user_data;
12815
12816 if (preg == NULL)
12817 return 1;
12818
12819 /* In Ada, the symbol "search name" is a linkage name, whereas
12820 the regular expression used to do the matching refers to
12821 the natural name. So match against the decoded name. */
12822 return (regexec (preg, ada_decode (search_name), 0, NULL, 0) == 0);
12823}
12824
12825/* Add all exceptions defined by the Ada standard whose name match
12826 a regular expression.
12827
12828 If PREG is not NULL, then this regexp_t object is used to
12829 perform the symbol name matching. Otherwise, no name-based
12830 filtering is performed.
12831
12832 EXCEPTIONS is a vector of exceptions to which matching exceptions
12833 gets pushed. */
12834
12835static void
12836ada_add_standard_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12837{
12838 int i;
12839
12840 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12841 {
12842 if (preg == NULL
12843 || regexec (preg, standard_exc[i], 0, NULL, 0) == 0)
12844 {
12845 struct bound_minimal_symbol msymbol
12846 = ada_lookup_simple_minsym (standard_exc[i]);
12847
12848 if (msymbol.minsym != NULL)
12849 {
12850 struct ada_exc_info info
77e371c0 12851 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3
JB
12852
12853 VEC_safe_push (ada_exc_info, *exceptions, &info);
12854 }
12855 }
12856 }
12857}
12858
12859/* Add all Ada exceptions defined locally and accessible from the given
12860 FRAME.
12861
12862 If PREG is not NULL, then this regexp_t object is used to
12863 perform the symbol name matching. Otherwise, no name-based
12864 filtering is performed.
12865
12866 EXCEPTIONS is a vector of exceptions to which matching exceptions
12867 gets pushed. */
12868
12869static void
12870ada_add_exceptions_from_frame (regex_t *preg, struct frame_info *frame,
12871 VEC(ada_exc_info) **exceptions)
12872{
3977b71f 12873 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
12874
12875 while (block != 0)
12876 {
12877 struct block_iterator iter;
12878 struct symbol *sym;
12879
12880 ALL_BLOCK_SYMBOLS (block, iter, sym)
12881 {
12882 switch (SYMBOL_CLASS (sym))
12883 {
12884 case LOC_TYPEDEF:
12885 case LOC_BLOCK:
12886 case LOC_CONST:
12887 break;
12888 default:
12889 if (ada_is_exception_sym (sym))
12890 {
12891 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
12892 SYMBOL_VALUE_ADDRESS (sym)};
12893
12894 VEC_safe_push (ada_exc_info, *exceptions, &info);
12895 }
12896 }
12897 }
12898 if (BLOCK_FUNCTION (block) != NULL)
12899 break;
12900 block = BLOCK_SUPERBLOCK (block);
12901 }
12902}
12903
12904/* Add all exceptions defined globally whose name name match
12905 a regular expression, excluding standard exceptions.
12906
12907 The reason we exclude standard exceptions is that they need
12908 to be handled separately: Standard exceptions are defined inside
12909 a runtime unit which is normally not compiled with debugging info,
12910 and thus usually do not show up in our symbol search. However,
12911 if the unit was in fact built with debugging info, we need to
12912 exclude them because they would duplicate the entry we found
12913 during the special loop that specifically searches for those
12914 standard exceptions.
12915
12916 If PREG is not NULL, then this regexp_t object is used to
12917 perform the symbol name matching. Otherwise, no name-based
12918 filtering is performed.
12919
12920 EXCEPTIONS is a vector of exceptions to which matching exceptions
12921 gets pushed. */
12922
12923static void
12924ada_add_global_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12925{
12926 struct objfile *objfile;
12927 struct symtab *s;
12928
bb4142cf
DE
12929 expand_symtabs_matching (NULL, ada_exc_search_name_matches,
12930 VARIABLES_DOMAIN, preg);
778865d3
JB
12931
12932 ALL_PRIMARY_SYMTABS (objfile, s)
12933 {
439247b6 12934 const struct blockvector *bv = SYMTAB_BLOCKVECTOR (s);
778865d3
JB
12935 int i;
12936
12937 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
12938 {
12939 struct block *b = BLOCKVECTOR_BLOCK (bv, i);
12940 struct block_iterator iter;
12941 struct symbol *sym;
12942
12943 ALL_BLOCK_SYMBOLS (b, iter, sym)
12944 if (ada_is_non_standard_exception_sym (sym)
12945 && (preg == NULL
12946 || regexec (preg, SYMBOL_NATURAL_NAME (sym),
12947 0, NULL, 0) == 0))
12948 {
12949 struct ada_exc_info info
12950 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
12951
12952 VEC_safe_push (ada_exc_info, *exceptions, &info);
12953 }
12954 }
12955 }
12956}
12957
12958/* Implements ada_exceptions_list with the regular expression passed
12959 as a regex_t, rather than a string.
12960
12961 If not NULL, PREG is used to filter out exceptions whose names
12962 do not match. Otherwise, all exceptions are listed. */
12963
12964static VEC(ada_exc_info) *
12965ada_exceptions_list_1 (regex_t *preg)
12966{
12967 VEC(ada_exc_info) *result = NULL;
12968 struct cleanup *old_chain
12969 = make_cleanup (VEC_cleanup (ada_exc_info), &result);
12970 int prev_len;
12971
12972 /* First, list the known standard exceptions. These exceptions
12973 need to be handled separately, as they are usually defined in
12974 runtime units that have been compiled without debugging info. */
12975
12976 ada_add_standard_exceptions (preg, &result);
12977
12978 /* Next, find all exceptions whose scope is local and accessible
12979 from the currently selected frame. */
12980
12981 if (has_stack_frames ())
12982 {
12983 prev_len = VEC_length (ada_exc_info, result);
12984 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
12985 &result);
12986 if (VEC_length (ada_exc_info, result) > prev_len)
12987 sort_remove_dups_ada_exceptions_list (&result, prev_len);
12988 }
12989
12990 /* Add all exceptions whose scope is global. */
12991
12992 prev_len = VEC_length (ada_exc_info, result);
12993 ada_add_global_exceptions (preg, &result);
12994 if (VEC_length (ada_exc_info, result) > prev_len)
12995 sort_remove_dups_ada_exceptions_list (&result, prev_len);
12996
12997 discard_cleanups (old_chain);
12998 return result;
12999}
13000
13001/* Return a vector of ada_exc_info.
13002
13003 If REGEXP is NULL, all exceptions are included in the result.
13004 Otherwise, it should contain a valid regular expression,
13005 and only the exceptions whose names match that regular expression
13006 are included in the result.
13007
13008 The exceptions are sorted in the following order:
13009 - Standard exceptions (defined by the Ada language), in
13010 alphabetical order;
13011 - Exceptions only visible from the current frame, in
13012 alphabetical order;
13013 - Exceptions whose scope is global, in alphabetical order. */
13014
13015VEC(ada_exc_info) *
13016ada_exceptions_list (const char *regexp)
13017{
13018 VEC(ada_exc_info) *result = NULL;
13019 struct cleanup *old_chain = NULL;
13020 regex_t reg;
13021
13022 if (regexp != NULL)
13023 old_chain = compile_rx_or_error (&reg, regexp,
13024 _("invalid regular expression"));
13025
13026 result = ada_exceptions_list_1 (regexp != NULL ? &reg : NULL);
13027
13028 if (old_chain != NULL)
13029 do_cleanups (old_chain);
13030 return result;
13031}
13032
13033/* Implement the "info exceptions" command. */
13034
13035static void
13036info_exceptions_command (char *regexp, int from_tty)
13037{
13038 VEC(ada_exc_info) *exceptions;
13039 struct cleanup *cleanup;
13040 struct gdbarch *gdbarch = get_current_arch ();
13041 int ix;
13042 struct ada_exc_info *info;
13043
13044 exceptions = ada_exceptions_list (regexp);
13045 cleanup = make_cleanup (VEC_cleanup (ada_exc_info), &exceptions);
13046
13047 if (regexp != NULL)
13048 printf_filtered
13049 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13050 else
13051 printf_filtered (_("All defined Ada exceptions:\n"));
13052
13053 for (ix = 0; VEC_iterate(ada_exc_info, exceptions, ix, info); ix++)
13054 printf_filtered ("%s: %s\n", info->name, paddress (gdbarch, info->addr));
13055
13056 do_cleanups (cleanup);
13057}
13058
4c4b4cd2
PH
13059 /* Operators */
13060/* Information about operators given special treatment in functions
13061 below. */
13062/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13063
13064#define ADA_OPERATORS \
13065 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13066 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13067 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13068 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13069 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13070 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13071 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13072 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13073 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13074 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13075 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13076 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13077 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13078 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13079 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13080 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13081 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13082 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13083 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13084
13085static void
554794dc
SDJ
13086ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13087 int *argsp)
4c4b4cd2
PH
13088{
13089 switch (exp->elts[pc - 1].opcode)
13090 {
76a01679 13091 default:
4c4b4cd2
PH
13092 operator_length_standard (exp, pc, oplenp, argsp);
13093 break;
13094
13095#define OP_DEFN(op, len, args, binop) \
13096 case op: *oplenp = len; *argsp = args; break;
13097 ADA_OPERATORS;
13098#undef OP_DEFN
52ce6436
PH
13099
13100 case OP_AGGREGATE:
13101 *oplenp = 3;
13102 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13103 break;
13104
13105 case OP_CHOICES:
13106 *oplenp = 3;
13107 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13108 break;
4c4b4cd2
PH
13109 }
13110}
13111
c0201579
JK
13112/* Implementation of the exp_descriptor method operator_check. */
13113
13114static int
13115ada_operator_check (struct expression *exp, int pos,
13116 int (*objfile_func) (struct objfile *objfile, void *data),
13117 void *data)
13118{
13119 const union exp_element *const elts = exp->elts;
13120 struct type *type = NULL;
13121
13122 switch (elts[pos].opcode)
13123 {
13124 case UNOP_IN_RANGE:
13125 case UNOP_QUAL:
13126 type = elts[pos + 1].type;
13127 break;
13128
13129 default:
13130 return operator_check_standard (exp, pos, objfile_func, data);
13131 }
13132
13133 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13134
13135 if (type && TYPE_OBJFILE (type)
13136 && (*objfile_func) (TYPE_OBJFILE (type), data))
13137 return 1;
13138
13139 return 0;
13140}
13141
4c4b4cd2
PH
13142static char *
13143ada_op_name (enum exp_opcode opcode)
13144{
13145 switch (opcode)
13146 {
76a01679 13147 default:
4c4b4cd2 13148 return op_name_standard (opcode);
52ce6436 13149
4c4b4cd2
PH
13150#define OP_DEFN(op, len, args, binop) case op: return #op;
13151 ADA_OPERATORS;
13152#undef OP_DEFN
52ce6436
PH
13153
13154 case OP_AGGREGATE:
13155 return "OP_AGGREGATE";
13156 case OP_CHOICES:
13157 return "OP_CHOICES";
13158 case OP_NAME:
13159 return "OP_NAME";
4c4b4cd2
PH
13160 }
13161}
13162
13163/* As for operator_length, but assumes PC is pointing at the first
13164 element of the operator, and gives meaningful results only for the
52ce6436 13165 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13166
13167static void
76a01679
JB
13168ada_forward_operator_length (struct expression *exp, int pc,
13169 int *oplenp, int *argsp)
4c4b4cd2 13170{
76a01679 13171 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13172 {
13173 default:
13174 *oplenp = *argsp = 0;
13175 break;
52ce6436 13176
4c4b4cd2
PH
13177#define OP_DEFN(op, len, args, binop) \
13178 case op: *oplenp = len; *argsp = args; break;
13179 ADA_OPERATORS;
13180#undef OP_DEFN
52ce6436
PH
13181
13182 case OP_AGGREGATE:
13183 *oplenp = 3;
13184 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13185 break;
13186
13187 case OP_CHOICES:
13188 *oplenp = 3;
13189 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13190 break;
13191
13192 case OP_STRING:
13193 case OP_NAME:
13194 {
13195 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13196
52ce6436
PH
13197 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13198 *argsp = 0;
13199 break;
13200 }
4c4b4cd2
PH
13201 }
13202}
13203
13204static int
13205ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13206{
13207 enum exp_opcode op = exp->elts[elt].opcode;
13208 int oplen, nargs;
13209 int pc = elt;
13210 int i;
76a01679 13211
4c4b4cd2
PH
13212 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13213
76a01679 13214 switch (op)
4c4b4cd2 13215 {
76a01679 13216 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13217 case OP_ATR_FIRST:
13218 case OP_ATR_LAST:
13219 case OP_ATR_LENGTH:
13220 case OP_ATR_IMAGE:
13221 case OP_ATR_MAX:
13222 case OP_ATR_MIN:
13223 case OP_ATR_MODULUS:
13224 case OP_ATR_POS:
13225 case OP_ATR_SIZE:
13226 case OP_ATR_TAG:
13227 case OP_ATR_VAL:
13228 break;
13229
13230 case UNOP_IN_RANGE:
13231 case UNOP_QUAL:
323e0a4a
AC
13232 /* XXX: gdb_sprint_host_address, type_sprint */
13233 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13234 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13235 fprintf_filtered (stream, " (");
13236 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13237 fprintf_filtered (stream, ")");
13238 break;
13239 case BINOP_IN_BOUNDS:
52ce6436
PH
13240 fprintf_filtered (stream, " (%d)",
13241 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13242 break;
13243 case TERNOP_IN_RANGE:
13244 break;
13245
52ce6436
PH
13246 case OP_AGGREGATE:
13247 case OP_OTHERS:
13248 case OP_DISCRETE_RANGE:
13249 case OP_POSITIONAL:
13250 case OP_CHOICES:
13251 break;
13252
13253 case OP_NAME:
13254 case OP_STRING:
13255 {
13256 char *name = &exp->elts[elt + 2].string;
13257 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13258
52ce6436
PH
13259 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13260 break;
13261 }
13262
4c4b4cd2
PH
13263 default:
13264 return dump_subexp_body_standard (exp, stream, elt);
13265 }
13266
13267 elt += oplen;
13268 for (i = 0; i < nargs; i += 1)
13269 elt = dump_subexp (exp, stream, elt);
13270
13271 return elt;
13272}
13273
13274/* The Ada extension of print_subexp (q.v.). */
13275
76a01679
JB
13276static void
13277ada_print_subexp (struct expression *exp, int *pos,
13278 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13279{
52ce6436 13280 int oplen, nargs, i;
4c4b4cd2
PH
13281 int pc = *pos;
13282 enum exp_opcode op = exp->elts[pc].opcode;
13283
13284 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13285
52ce6436 13286 *pos += oplen;
4c4b4cd2
PH
13287 switch (op)
13288 {
13289 default:
52ce6436 13290 *pos -= oplen;
4c4b4cd2
PH
13291 print_subexp_standard (exp, pos, stream, prec);
13292 return;
13293
13294 case OP_VAR_VALUE:
4c4b4cd2
PH
13295 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13296 return;
13297
13298 case BINOP_IN_BOUNDS:
323e0a4a 13299 /* XXX: sprint_subexp */
4c4b4cd2 13300 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13301 fputs_filtered (" in ", stream);
4c4b4cd2 13302 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13303 fputs_filtered ("'range", stream);
4c4b4cd2 13304 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13305 fprintf_filtered (stream, "(%ld)",
13306 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13307 return;
13308
13309 case TERNOP_IN_RANGE:
4c4b4cd2 13310 if (prec >= PREC_EQUAL)
76a01679 13311 fputs_filtered ("(", stream);
323e0a4a 13312 /* XXX: sprint_subexp */
4c4b4cd2 13313 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13314 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13315 print_subexp (exp, pos, stream, PREC_EQUAL);
13316 fputs_filtered (" .. ", stream);
13317 print_subexp (exp, pos, stream, PREC_EQUAL);
13318 if (prec >= PREC_EQUAL)
76a01679
JB
13319 fputs_filtered (")", stream);
13320 return;
4c4b4cd2
PH
13321
13322 case OP_ATR_FIRST:
13323 case OP_ATR_LAST:
13324 case OP_ATR_LENGTH:
13325 case OP_ATR_IMAGE:
13326 case OP_ATR_MAX:
13327 case OP_ATR_MIN:
13328 case OP_ATR_MODULUS:
13329 case OP_ATR_POS:
13330 case OP_ATR_SIZE:
13331 case OP_ATR_TAG:
13332 case OP_ATR_VAL:
4c4b4cd2 13333 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13334 {
13335 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13336 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13337 &type_print_raw_options);
76a01679
JB
13338 *pos += 3;
13339 }
4c4b4cd2 13340 else
76a01679 13341 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13342 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13343 if (nargs > 1)
76a01679
JB
13344 {
13345 int tem;
5b4ee69b 13346
76a01679
JB
13347 for (tem = 1; tem < nargs; tem += 1)
13348 {
13349 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13350 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13351 }
13352 fputs_filtered (")", stream);
13353 }
4c4b4cd2 13354 return;
14f9c5c9 13355
4c4b4cd2 13356 case UNOP_QUAL:
4c4b4cd2
PH
13357 type_print (exp->elts[pc + 1].type, "", stream, 0);
13358 fputs_filtered ("'(", stream);
13359 print_subexp (exp, pos, stream, PREC_PREFIX);
13360 fputs_filtered (")", stream);
13361 return;
14f9c5c9 13362
4c4b4cd2 13363 case UNOP_IN_RANGE:
323e0a4a 13364 /* XXX: sprint_subexp */
4c4b4cd2 13365 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13366 fputs_filtered (" in ", stream);
79d43c61
TT
13367 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13368 &type_print_raw_options);
4c4b4cd2 13369 return;
52ce6436
PH
13370
13371 case OP_DISCRETE_RANGE:
13372 print_subexp (exp, pos, stream, PREC_SUFFIX);
13373 fputs_filtered ("..", stream);
13374 print_subexp (exp, pos, stream, PREC_SUFFIX);
13375 return;
13376
13377 case OP_OTHERS:
13378 fputs_filtered ("others => ", stream);
13379 print_subexp (exp, pos, stream, PREC_SUFFIX);
13380 return;
13381
13382 case OP_CHOICES:
13383 for (i = 0; i < nargs-1; i += 1)
13384 {
13385 if (i > 0)
13386 fputs_filtered ("|", stream);
13387 print_subexp (exp, pos, stream, PREC_SUFFIX);
13388 }
13389 fputs_filtered (" => ", stream);
13390 print_subexp (exp, pos, stream, PREC_SUFFIX);
13391 return;
13392
13393 case OP_POSITIONAL:
13394 print_subexp (exp, pos, stream, PREC_SUFFIX);
13395 return;
13396
13397 case OP_AGGREGATE:
13398 fputs_filtered ("(", stream);
13399 for (i = 0; i < nargs; i += 1)
13400 {
13401 if (i > 0)
13402 fputs_filtered (", ", stream);
13403 print_subexp (exp, pos, stream, PREC_SUFFIX);
13404 }
13405 fputs_filtered (")", stream);
13406 return;
4c4b4cd2
PH
13407 }
13408}
14f9c5c9
AS
13409
13410/* Table mapping opcodes into strings for printing operators
13411 and precedences of the operators. */
13412
d2e4a39e
AS
13413static const struct op_print ada_op_print_tab[] = {
13414 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13415 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13416 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13417 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13418 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13419 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13420 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13421 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13422 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13423 {">=", BINOP_GEQ, PREC_ORDER, 0},
13424 {">", BINOP_GTR, PREC_ORDER, 0},
13425 {"<", BINOP_LESS, PREC_ORDER, 0},
13426 {">>", BINOP_RSH, PREC_SHIFT, 0},
13427 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13428 {"+", BINOP_ADD, PREC_ADD, 0},
13429 {"-", BINOP_SUB, PREC_ADD, 0},
13430 {"&", BINOP_CONCAT, PREC_ADD, 0},
13431 {"*", BINOP_MUL, PREC_MUL, 0},
13432 {"/", BINOP_DIV, PREC_MUL, 0},
13433 {"rem", BINOP_REM, PREC_MUL, 0},
13434 {"mod", BINOP_MOD, PREC_MUL, 0},
13435 {"**", BINOP_EXP, PREC_REPEAT, 0},
13436 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13437 {"-", UNOP_NEG, PREC_PREFIX, 0},
13438 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13439 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13440 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13441 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13442 {".all", UNOP_IND, PREC_SUFFIX, 1},
13443 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13444 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
d2e4a39e 13445 {NULL, 0, 0, 0}
14f9c5c9
AS
13446};
13447\f
72d5681a
PH
13448enum ada_primitive_types {
13449 ada_primitive_type_int,
13450 ada_primitive_type_long,
13451 ada_primitive_type_short,
13452 ada_primitive_type_char,
13453 ada_primitive_type_float,
13454 ada_primitive_type_double,
13455 ada_primitive_type_void,
13456 ada_primitive_type_long_long,
13457 ada_primitive_type_long_double,
13458 ada_primitive_type_natural,
13459 ada_primitive_type_positive,
13460 ada_primitive_type_system_address,
13461 nr_ada_primitive_types
13462};
6c038f32
PH
13463
13464static void
d4a9a881 13465ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13466 struct language_arch_info *lai)
13467{
d4a9a881 13468 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13469
72d5681a 13470 lai->primitive_type_vector
d4a9a881 13471 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13472 struct type *);
e9bb382b
UW
13473
13474 lai->primitive_type_vector [ada_primitive_type_int]
13475 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13476 0, "integer");
13477 lai->primitive_type_vector [ada_primitive_type_long]
13478 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13479 0, "long_integer");
13480 lai->primitive_type_vector [ada_primitive_type_short]
13481 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13482 0, "short_integer");
13483 lai->string_char_type
13484 = lai->primitive_type_vector [ada_primitive_type_char]
13485 = arch_integer_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
13486 lai->primitive_type_vector [ada_primitive_type_float]
13487 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13488 "float", NULL);
13489 lai->primitive_type_vector [ada_primitive_type_double]
13490 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13491 "long_float", NULL);
13492 lai->primitive_type_vector [ada_primitive_type_long_long]
13493 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13494 0, "long_long_integer");
13495 lai->primitive_type_vector [ada_primitive_type_long_double]
13496 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13497 "long_long_float", NULL);
13498 lai->primitive_type_vector [ada_primitive_type_natural]
13499 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13500 0, "natural");
13501 lai->primitive_type_vector [ada_primitive_type_positive]
13502 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13503 0, "positive");
13504 lai->primitive_type_vector [ada_primitive_type_void]
13505 = builtin->builtin_void;
13506
13507 lai->primitive_type_vector [ada_primitive_type_system_address]
13508 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, 1, "void"));
72d5681a
PH
13509 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13510 = "system__address";
fbb06eb1 13511
47e729a8 13512 lai->bool_type_symbol = NULL;
fbb06eb1 13513 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13514}
6c038f32
PH
13515\f
13516 /* Language vector */
13517
13518/* Not really used, but needed in the ada_language_defn. */
13519
13520static void
6c7a06a3 13521emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13522{
6c7a06a3 13523 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13524}
13525
13526static int
410a0ff2 13527parse (struct parser_state *ps)
6c038f32
PH
13528{
13529 warnings_issued = 0;
410a0ff2 13530 return ada_parse (ps);
6c038f32
PH
13531}
13532
13533static const struct exp_descriptor ada_exp_descriptor = {
13534 ada_print_subexp,
13535 ada_operator_length,
c0201579 13536 ada_operator_check,
6c038f32
PH
13537 ada_op_name,
13538 ada_dump_subexp_body,
13539 ada_evaluate_subexp
13540};
13541
1a119f36 13542/* Implement the "la_get_symbol_name_cmp" language_defn method
74ccd7f5
JB
13543 for Ada. */
13544
1a119f36
JB
13545static symbol_name_cmp_ftype
13546ada_get_symbol_name_cmp (const char *lookup_name)
74ccd7f5
JB
13547{
13548 if (should_use_wild_match (lookup_name))
13549 return wild_match;
13550 else
13551 return compare_names;
13552}
13553
a5ee536b
JB
13554/* Implement the "la_read_var_value" language_defn method for Ada. */
13555
13556static struct value *
13557ada_read_var_value (struct symbol *var, struct frame_info *frame)
13558{
3977b71f 13559 const struct block *frame_block = NULL;
a5ee536b
JB
13560 struct symbol *renaming_sym = NULL;
13561
13562 /* The only case where default_read_var_value is not sufficient
13563 is when VAR is a renaming... */
13564 if (frame)
13565 frame_block = get_frame_block (frame, NULL);
13566 if (frame_block)
13567 renaming_sym = ada_find_renaming_symbol (var, frame_block);
13568 if (renaming_sym != NULL)
13569 return ada_read_renaming_var_value (renaming_sym, frame_block);
13570
13571 /* This is a typical case where we expect the default_read_var_value
13572 function to work. */
13573 return default_read_var_value (var, frame);
13574}
13575
6c038f32
PH
13576const struct language_defn ada_language_defn = {
13577 "ada", /* Language name */
6abde28f 13578 "Ada",
6c038f32 13579 language_ada,
6c038f32 13580 range_check_off,
6c038f32
PH
13581 case_sensitive_on, /* Yes, Ada is case-insensitive, but
13582 that's not quite what this means. */
6c038f32 13583 array_row_major,
9a044a89 13584 macro_expansion_no,
6c038f32
PH
13585 &ada_exp_descriptor,
13586 parse,
13587 ada_error,
13588 resolve,
13589 ada_printchar, /* Print a character constant */
13590 ada_printstr, /* Function to print string constant */
13591 emit_char, /* Function to print single char (not used) */
6c038f32 13592 ada_print_type, /* Print a type using appropriate syntax */
be942545 13593 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
13594 ada_val_print, /* Print a value using appropriate syntax */
13595 ada_value_print, /* Print a top-level value */
a5ee536b 13596 ada_read_var_value, /* la_read_var_value */
6c038f32 13597 NULL, /* Language specific skip_trampoline */
2b2d9e11 13598 NULL, /* name_of_this */
6c038f32
PH
13599 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
13600 basic_lookup_transparent_type, /* lookup_transparent_type */
13601 ada_la_decode, /* Language specific symbol demangler */
0963b4bd
MS
13602 NULL, /* Language specific
13603 class_name_from_physname */
6c038f32
PH
13604 ada_op_print_tab, /* expression operators for printing */
13605 0, /* c-style arrays */
13606 1, /* String lower bound */
6c038f32 13607 ada_get_gdb_completer_word_break_characters,
41d27058 13608 ada_make_symbol_completion_list,
72d5681a 13609 ada_language_arch_info,
e79af960 13610 ada_print_array_index,
41f1b697 13611 default_pass_by_reference,
ae6a3a4c 13612 c_get_string,
1a119f36 13613 ada_get_symbol_name_cmp, /* la_get_symbol_name_cmp */
f8eba3c6 13614 ada_iterate_over_symbols,
a53b64ea 13615 &ada_varobj_ops,
6c038f32
PH
13616 LANG_MAGIC
13617};
13618
2c0b251b
PA
13619/* Provide a prototype to silence -Wmissing-prototypes. */
13620extern initialize_file_ftype _initialize_ada_language;
13621
5bf03f13
JB
13622/* Command-list for the "set/show ada" prefix command. */
13623static struct cmd_list_element *set_ada_list;
13624static struct cmd_list_element *show_ada_list;
13625
13626/* Implement the "set ada" prefix command. */
13627
13628static void
13629set_ada_command (char *arg, int from_tty)
13630{
13631 printf_unfiltered (_(\
13632"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 13633 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
13634}
13635
13636/* Implement the "show ada" prefix command. */
13637
13638static void
13639show_ada_command (char *args, int from_tty)
13640{
13641 cmd_show_list (show_ada_list, from_tty, "");
13642}
13643
2060206e
PA
13644static void
13645initialize_ada_catchpoint_ops (void)
13646{
13647 struct breakpoint_ops *ops;
13648
13649 initialize_breakpoint_ops ();
13650
13651 ops = &catch_exception_breakpoint_ops;
13652 *ops = bkpt_breakpoint_ops;
13653 ops->dtor = dtor_catch_exception;
13654 ops->allocate_location = allocate_location_catch_exception;
13655 ops->re_set = re_set_catch_exception;
13656 ops->check_status = check_status_catch_exception;
13657 ops->print_it = print_it_catch_exception;
13658 ops->print_one = print_one_catch_exception;
13659 ops->print_mention = print_mention_catch_exception;
13660 ops->print_recreate = print_recreate_catch_exception;
13661
13662 ops = &catch_exception_unhandled_breakpoint_ops;
13663 *ops = bkpt_breakpoint_ops;
13664 ops->dtor = dtor_catch_exception_unhandled;
13665 ops->allocate_location = allocate_location_catch_exception_unhandled;
13666 ops->re_set = re_set_catch_exception_unhandled;
13667 ops->check_status = check_status_catch_exception_unhandled;
13668 ops->print_it = print_it_catch_exception_unhandled;
13669 ops->print_one = print_one_catch_exception_unhandled;
13670 ops->print_mention = print_mention_catch_exception_unhandled;
13671 ops->print_recreate = print_recreate_catch_exception_unhandled;
13672
13673 ops = &catch_assert_breakpoint_ops;
13674 *ops = bkpt_breakpoint_ops;
13675 ops->dtor = dtor_catch_assert;
13676 ops->allocate_location = allocate_location_catch_assert;
13677 ops->re_set = re_set_catch_assert;
13678 ops->check_status = check_status_catch_assert;
13679 ops->print_it = print_it_catch_assert;
13680 ops->print_one = print_one_catch_assert;
13681 ops->print_mention = print_mention_catch_assert;
13682 ops->print_recreate = print_recreate_catch_assert;
13683}
13684
3d9434b5
JB
13685/* This module's 'new_objfile' observer. */
13686
13687static void
13688ada_new_objfile_observer (struct objfile *objfile)
13689{
13690 ada_clear_symbol_cache ();
13691}
13692
13693/* This module's 'free_objfile' observer. */
13694
13695static void
13696ada_free_objfile_observer (struct objfile *objfile)
13697{
13698 ada_clear_symbol_cache ();
13699}
13700
d2e4a39e 13701void
6c038f32 13702_initialize_ada_language (void)
14f9c5c9 13703{
6c038f32
PH
13704 add_language (&ada_language_defn);
13705
2060206e
PA
13706 initialize_ada_catchpoint_ops ();
13707
5bf03f13
JB
13708 add_prefix_cmd ("ada", no_class, set_ada_command,
13709 _("Prefix command for changing Ada-specfic settings"),
13710 &set_ada_list, "set ada ", 0, &setlist);
13711
13712 add_prefix_cmd ("ada", no_class, show_ada_command,
13713 _("Generic command for showing Ada-specific settings."),
13714 &show_ada_list, "show ada ", 0, &showlist);
13715
13716 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
13717 &trust_pad_over_xvs, _("\
13718Enable or disable an optimization trusting PAD types over XVS types"), _("\
13719Show whether an optimization trusting PAD types over XVS types is activated"),
13720 _("\
13721This is related to the encoding used by the GNAT compiler. The debugger\n\
13722should normally trust the contents of PAD types, but certain older versions\n\
13723of GNAT have a bug that sometimes causes the information in the PAD type\n\
13724to be incorrect. Turning this setting \"off\" allows the debugger to\n\
13725work around this bug. It is always safe to turn this option \"off\", but\n\
13726this incurs a slight performance penalty, so it is recommended to NOT change\n\
13727this option to \"off\" unless necessary."),
13728 NULL, NULL, &set_ada_list, &show_ada_list);
13729
9ac4176b
PA
13730 add_catch_command ("exception", _("\
13731Catch Ada exceptions, when raised.\n\
13732With an argument, catch only exceptions with the given name."),
13733 catch_ada_exception_command,
13734 NULL,
13735 CATCH_PERMANENT,
13736 CATCH_TEMPORARY);
13737 add_catch_command ("assert", _("\
13738Catch failed Ada assertions, when raised.\n\
13739With an argument, catch only exceptions with the given name."),
13740 catch_assert_command,
13741 NULL,
13742 CATCH_PERMANENT,
13743 CATCH_TEMPORARY);
13744
6c038f32 13745 varsize_limit = 65536;
6c038f32 13746
778865d3
JB
13747 add_info ("exceptions", info_exceptions_command,
13748 _("\
13749List all Ada exception names.\n\
13750If a regular expression is passed as an argument, only those matching\n\
13751the regular expression are listed."));
13752
c6044dd1
JB
13753 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
13754 _("Set Ada maintenance-related variables."),
13755 &maint_set_ada_cmdlist, "maintenance set ada ",
13756 0/*allow-unknown*/, &maintenance_set_cmdlist);
13757
13758 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
13759 _("Show Ada maintenance-related variables"),
13760 &maint_show_ada_cmdlist, "maintenance show ada ",
13761 0/*allow-unknown*/, &maintenance_show_cmdlist);
13762
13763 add_setshow_boolean_cmd
13764 ("ignore-descriptive-types", class_maintenance,
13765 &ada_ignore_descriptive_types_p,
13766 _("Set whether descriptive types generated by GNAT should be ignored."),
13767 _("Show whether descriptive types generated by GNAT should be ignored."),
13768 _("\
13769When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
13770DWARF attribute."),
13771 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
13772
6c038f32
PH
13773 obstack_init (&symbol_list_obstack);
13774
13775 decoded_names_store = htab_create_alloc
13776 (256, htab_hash_string, (int (*)(const void *, const void *)) streq,
13777 NULL, xcalloc, xfree);
6b69afc4 13778
3d9434b5
JB
13779 /* The ada-lang observers. */
13780 observer_attach_new_objfile (ada_new_objfile_observer);
13781 observer_attach_free_objfile (ada_free_objfile_observer);
e802dbe0 13782 observer_attach_inferior_exit (ada_inferior_exit);
ee01b665
JB
13783
13784 /* Setup various context-specific data. */
e802dbe0 13785 ada_inferior_data
8e260fc0 13786 = register_inferior_data_with_cleanup (NULL, ada_inferior_data_cleanup);
ee01b665
JB
13787 ada_pspace_data_handle
13788 = register_program_space_data_with_cleanup (NULL, ada_pspace_data_cleanup);
14f9c5c9 13789}