]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/ada-lang.c
Change pointers from char * to unsigned char *
[thirdparty/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
32d0add0 3 Copyright (C) 1992-2015 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
4c4b4cd2
PH
24#include "gdb_regex.h"
25#include "frame.h"
14f9c5c9
AS
26#include "symtab.h"
27#include "gdbtypes.h"
28#include "gdbcmd.h"
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
a53b64ea 32#include "varobj.h"
14f9c5c9
AS
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
38#include "gdbcore.h"
4c4b4cd2
PH
39#include "hashtab.h"
40#include "gdb_obstack.h"
14f9c5c9 41#include "ada-lang.h"
4c4b4cd2 42#include "completer.h"
53ce3c39 43#include <sys/stat.h>
14f9c5c9 44#include "ui-out.h"
fe898f56 45#include "block.h"
04714b91 46#include "infcall.h"
de4f826b 47#include "dictionary.h"
f7f9143b
JB
48#include "annotate.h"
49#include "valprint.h"
9bbc9174 50#include "source.h"
0259addd 51#include "observer.h"
2ba95b9b 52#include "vec.h"
692465f1 53#include "stack.h"
fa864999 54#include "gdb_vecs.h"
79d43c61 55#include "typeprint.h"
14f9c5c9 56
ccefe4c4 57#include "psymtab.h"
40bc484c 58#include "value.h"
956a9fb9 59#include "mi/mi-common.h"
9ac4176b 60#include "arch-utils.h"
0fcd72ba 61#include "cli/cli-utils.h"
ccefe4c4 62
4c4b4cd2 63/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 64 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
65 Copied from valarith.c. */
66
67#ifndef TRUNCATION_TOWARDS_ZERO
68#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
69#endif
70
d2e4a39e 71static struct type *desc_base_type (struct type *);
14f9c5c9 72
d2e4a39e 73static struct type *desc_bounds_type (struct type *);
14f9c5c9 74
d2e4a39e 75static struct value *desc_bounds (struct value *);
14f9c5c9 76
d2e4a39e 77static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 78
d2e4a39e 79static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 80
556bdfd4 81static struct type *desc_data_target_type (struct type *);
14f9c5c9 82
d2e4a39e 83static struct value *desc_data (struct value *);
14f9c5c9 84
d2e4a39e 85static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 86
d2e4a39e 87static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 88
d2e4a39e 89static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 90
d2e4a39e 91static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 92
d2e4a39e 93static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 94
d2e4a39e 95static struct type *desc_index_type (struct type *, int);
14f9c5c9 96
d2e4a39e 97static int desc_arity (struct type *);
14f9c5c9 98
d2e4a39e 99static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 100
d2e4a39e 101static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 102
40658b94
PH
103static int full_match (const char *, const char *);
104
40bc484c 105static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 106
4c4b4cd2 107static void ada_add_block_symbols (struct obstack *,
f0c5f9b2 108 const struct block *, const char *,
2570f2b7 109 domain_enum, struct objfile *, int);
14f9c5c9 110
4c4b4cd2 111static int is_nonfunction (struct ada_symbol_info *, int);
14f9c5c9 112
76a01679 113static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 114 const struct block *);
14f9c5c9 115
4c4b4cd2
PH
116static int num_defns_collected (struct obstack *);
117
118static struct ada_symbol_info *defns_collected (struct obstack *, int);
14f9c5c9 119
4c4b4cd2 120static struct value *resolve_subexp (struct expression **, int *, int,
76a01679 121 struct type *);
14f9c5c9 122
d2e4a39e 123static void replace_operator_with_call (struct expression **, int, int, int,
270140bd 124 struct symbol *, const struct block *);
14f9c5c9 125
d2e4a39e 126static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 127
4c4b4cd2
PH
128static char *ada_op_name (enum exp_opcode);
129
130static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 131
d2e4a39e 132static int numeric_type_p (struct type *);
14f9c5c9 133
d2e4a39e 134static int integer_type_p (struct type *);
14f9c5c9 135
d2e4a39e 136static int scalar_type_p (struct type *);
14f9c5c9 137
d2e4a39e 138static int discrete_type_p (struct type *);
14f9c5c9 139
aeb5907d
JB
140static enum ada_renaming_category parse_old_style_renaming (struct type *,
141 const char **,
142 int *,
143 const char **);
144
145static struct symbol *find_old_style_renaming_symbol (const char *,
270140bd 146 const struct block *);
aeb5907d 147
4c4b4cd2 148static struct type *ada_lookup_struct_elt_type (struct type *, char *,
76a01679 149 int, int, int *);
4c4b4cd2 150
d2e4a39e 151static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 152
b4ba55a1
JB
153static struct type *ada_find_parallel_type_with_name (struct type *,
154 const char *);
155
d2e4a39e 156static int is_dynamic_field (struct type *, int);
14f9c5c9 157
10a2c479 158static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 159 const gdb_byte *,
4c4b4cd2
PH
160 CORE_ADDR, struct value *);
161
162static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 163
28c85d6c 164static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 165
d2e4a39e 166static struct type *to_static_fixed_type (struct type *);
f192137b 167static struct type *static_unwrap_type (struct type *type);
14f9c5c9 168
d2e4a39e 169static struct value *unwrap_value (struct value *);
14f9c5c9 170
ad82864c 171static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 172
ad82864c 173static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 174
ad82864c
JB
175static long decode_packed_array_bitsize (struct type *);
176
177static struct value *decode_constrained_packed_array (struct value *);
178
179static int ada_is_packed_array_type (struct type *);
180
181static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 182
d2e4a39e 183static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 184 struct value **);
14f9c5c9 185
50810684 186static void move_bits (gdb_byte *, int, const gdb_byte *, int, int, int);
52ce6436 187
4c4b4cd2
PH
188static struct value *coerce_unspec_val_to_type (struct value *,
189 struct type *);
14f9c5c9 190
d2e4a39e 191static struct value *get_var_value (char *, char *);
14f9c5c9 192
d2e4a39e 193static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 194
d2e4a39e 195static int equiv_types (struct type *, struct type *);
14f9c5c9 196
d2e4a39e 197static int is_name_suffix (const char *);
14f9c5c9 198
73589123
PH
199static int advance_wild_match (const char **, const char *, int);
200
201static int wild_match (const char *, const char *);
14f9c5c9 202
d2e4a39e 203static struct value *ada_coerce_ref (struct value *);
14f9c5c9 204
4c4b4cd2
PH
205static LONGEST pos_atr (struct value *);
206
3cb382c9 207static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 208
d2e4a39e 209static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 210
4c4b4cd2
PH
211static struct symbol *standard_lookup (const char *, const struct block *,
212 domain_enum);
14f9c5c9 213
4c4b4cd2
PH
214static struct value *ada_search_struct_field (char *, struct value *, int,
215 struct type *);
216
217static struct value *ada_value_primitive_field (struct value *, int, int,
218 struct type *);
219
0d5cff50 220static int find_struct_field (const char *, struct type *, int,
52ce6436 221 struct type **, int *, int *, int *, int *);
4c4b4cd2
PH
222
223static struct value *ada_to_fixed_value_create (struct type *, CORE_ADDR,
224 struct value *);
225
4c4b4cd2
PH
226static int ada_resolve_function (struct ada_symbol_info *, int,
227 struct value **, int, const char *,
228 struct type *);
229
4c4b4cd2
PH
230static int ada_is_direct_array_type (struct type *);
231
72d5681a
PH
232static void ada_language_arch_info (struct gdbarch *,
233 struct language_arch_info *);
714e53ab 234
52ce6436
PH
235static struct value *ada_index_struct_field (int, struct value *, int,
236 struct type *);
237
238static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
239 struct expression *,
240 int *, enum noside);
52ce6436
PH
241
242static void aggregate_assign_from_choices (struct value *, struct value *,
243 struct expression *,
244 int *, LONGEST *, int *,
245 int, LONGEST, LONGEST);
246
247static void aggregate_assign_positional (struct value *, struct value *,
248 struct expression *,
249 int *, LONGEST *, int *, int,
250 LONGEST, LONGEST);
251
252
253static void aggregate_assign_others (struct value *, struct value *,
254 struct expression *,
255 int *, LONGEST *, int, LONGEST, LONGEST);
256
257
258static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
259
260
261static struct value *ada_evaluate_subexp (struct type *, struct expression *,
262 int *, enum noside);
263
264static void ada_forward_operator_length (struct expression *, int, int *,
265 int *);
852dff6c
JB
266
267static struct type *ada_find_any_type (const char *name);
4c4b4cd2
PH
268\f
269
ee01b665
JB
270/* The result of a symbol lookup to be stored in our symbol cache. */
271
272struct cache_entry
273{
274 /* The name used to perform the lookup. */
275 const char *name;
276 /* The namespace used during the lookup. */
fe978cb0 277 domain_enum domain;
ee01b665
JB
278 /* The symbol returned by the lookup, or NULL if no matching symbol
279 was found. */
280 struct symbol *sym;
281 /* The block where the symbol was found, or NULL if no matching
282 symbol was found. */
283 const struct block *block;
284 /* A pointer to the next entry with the same hash. */
285 struct cache_entry *next;
286};
287
288/* The Ada symbol cache, used to store the result of Ada-mode symbol
289 lookups in the course of executing the user's commands.
290
291 The cache is implemented using a simple, fixed-sized hash.
292 The size is fixed on the grounds that there are not likely to be
293 all that many symbols looked up during any given session, regardless
294 of the size of the symbol table. If we decide to go to a resizable
295 table, let's just use the stuff from libiberty instead. */
296
297#define HASH_SIZE 1009
298
299struct ada_symbol_cache
300{
301 /* An obstack used to store the entries in our cache. */
302 struct obstack cache_space;
303
304 /* The root of the hash table used to implement our symbol cache. */
305 struct cache_entry *root[HASH_SIZE];
306};
307
308static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 309
4c4b4cd2 310/* Maximum-sized dynamic type. */
14f9c5c9
AS
311static unsigned int varsize_limit;
312
4c4b4cd2
PH
313/* FIXME: brobecker/2003-09-17: No longer a const because it is
314 returned by a function that does not return a const char *. */
315static char *ada_completer_word_break_characters =
316#ifdef VMS
317 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
318#else
14f9c5c9 319 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 320#endif
14f9c5c9 321
4c4b4cd2 322/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 323static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 324 = "__gnat_ada_main_program_name";
14f9c5c9 325
4c4b4cd2
PH
326/* Limit on the number of warnings to raise per expression evaluation. */
327static int warning_limit = 2;
328
329/* Number of warning messages issued; reset to 0 by cleanups after
330 expression evaluation. */
331static int warnings_issued = 0;
332
333static const char *known_runtime_file_name_patterns[] = {
334 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
335};
336
337static const char *known_auxiliary_function_name_patterns[] = {
338 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
339};
340
341/* Space for allocating results of ada_lookup_symbol_list. */
342static struct obstack symbol_list_obstack;
343
c6044dd1
JB
344/* Maintenance-related settings for this module. */
345
346static struct cmd_list_element *maint_set_ada_cmdlist;
347static struct cmd_list_element *maint_show_ada_cmdlist;
348
349/* Implement the "maintenance set ada" (prefix) command. */
350
351static void
352maint_set_ada_cmd (char *args, int from_tty)
353{
635c7e8a
TT
354 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
355 gdb_stdout);
c6044dd1
JB
356}
357
358/* Implement the "maintenance show ada" (prefix) command. */
359
360static void
361maint_show_ada_cmd (char *args, int from_tty)
362{
363 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
364}
365
366/* The "maintenance ada set/show ignore-descriptive-type" value. */
367
368static int ada_ignore_descriptive_types_p = 0;
369
e802dbe0
JB
370 /* Inferior-specific data. */
371
372/* Per-inferior data for this module. */
373
374struct ada_inferior_data
375{
376 /* The ada__tags__type_specific_data type, which is used when decoding
377 tagged types. With older versions of GNAT, this type was directly
378 accessible through a component ("tsd") in the object tag. But this
379 is no longer the case, so we cache it for each inferior. */
380 struct type *tsd_type;
3eecfa55
JB
381
382 /* The exception_support_info data. This data is used to determine
383 how to implement support for Ada exception catchpoints in a given
384 inferior. */
385 const struct exception_support_info *exception_info;
e802dbe0
JB
386};
387
388/* Our key to this module's inferior data. */
389static const struct inferior_data *ada_inferior_data;
390
391/* A cleanup routine for our inferior data. */
392static void
393ada_inferior_data_cleanup (struct inferior *inf, void *arg)
394{
395 struct ada_inferior_data *data;
396
397 data = inferior_data (inf, ada_inferior_data);
398 if (data != NULL)
399 xfree (data);
400}
401
402/* Return our inferior data for the given inferior (INF).
403
404 This function always returns a valid pointer to an allocated
405 ada_inferior_data structure. If INF's inferior data has not
406 been previously set, this functions creates a new one with all
407 fields set to zero, sets INF's inferior to it, and then returns
408 a pointer to that newly allocated ada_inferior_data. */
409
410static struct ada_inferior_data *
411get_ada_inferior_data (struct inferior *inf)
412{
413 struct ada_inferior_data *data;
414
415 data = inferior_data (inf, ada_inferior_data);
416 if (data == NULL)
417 {
41bf6aca 418 data = XCNEW (struct ada_inferior_data);
e802dbe0
JB
419 set_inferior_data (inf, ada_inferior_data, data);
420 }
421
422 return data;
423}
424
425/* Perform all necessary cleanups regarding our module's inferior data
426 that is required after the inferior INF just exited. */
427
428static void
429ada_inferior_exit (struct inferior *inf)
430{
431 ada_inferior_data_cleanup (inf, NULL);
432 set_inferior_data (inf, ada_inferior_data, NULL);
433}
434
ee01b665
JB
435
436 /* program-space-specific data. */
437
438/* This module's per-program-space data. */
439struct ada_pspace_data
440{
441 /* The Ada symbol cache. */
442 struct ada_symbol_cache *sym_cache;
443};
444
445/* Key to our per-program-space data. */
446static const struct program_space_data *ada_pspace_data_handle;
447
448/* Return this module's data for the given program space (PSPACE).
449 If not is found, add a zero'ed one now.
450
451 This function always returns a valid object. */
452
453static struct ada_pspace_data *
454get_ada_pspace_data (struct program_space *pspace)
455{
456 struct ada_pspace_data *data;
457
458 data = program_space_data (pspace, ada_pspace_data_handle);
459 if (data == NULL)
460 {
461 data = XCNEW (struct ada_pspace_data);
462 set_program_space_data (pspace, ada_pspace_data_handle, data);
463 }
464
465 return data;
466}
467
468/* The cleanup callback for this module's per-program-space data. */
469
470static void
471ada_pspace_data_cleanup (struct program_space *pspace, void *data)
472{
473 struct ada_pspace_data *pspace_data = data;
474
475 if (pspace_data->sym_cache != NULL)
476 ada_free_symbol_cache (pspace_data->sym_cache);
477 xfree (pspace_data);
478}
479
4c4b4cd2
PH
480 /* Utilities */
481
720d1a40 482/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 483 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
484
485 Normally, we really expect a typedef type to only have 1 typedef layer.
486 In other words, we really expect the target type of a typedef type to be
487 a non-typedef type. This is particularly true for Ada units, because
488 the language does not have a typedef vs not-typedef distinction.
489 In that respect, the Ada compiler has been trying to eliminate as many
490 typedef definitions in the debugging information, since they generally
491 do not bring any extra information (we still use typedef under certain
492 circumstances related mostly to the GNAT encoding).
493
494 Unfortunately, we have seen situations where the debugging information
495 generated by the compiler leads to such multiple typedef layers. For
496 instance, consider the following example with stabs:
497
498 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
499 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
500
501 This is an error in the debugging information which causes type
502 pck__float_array___XUP to be defined twice, and the second time,
503 it is defined as a typedef of a typedef.
504
505 This is on the fringe of legality as far as debugging information is
506 concerned, and certainly unexpected. But it is easy to handle these
507 situations correctly, so we can afford to be lenient in this case. */
508
509static struct type *
510ada_typedef_target_type (struct type *type)
511{
512 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
513 type = TYPE_TARGET_TYPE (type);
514 return type;
515}
516
41d27058
JB
517/* Given DECODED_NAME a string holding a symbol name in its
518 decoded form (ie using the Ada dotted notation), returns
519 its unqualified name. */
520
521static const char *
522ada_unqualified_name (const char *decoded_name)
523{
2b0f535a
JB
524 const char *result;
525
526 /* If the decoded name starts with '<', it means that the encoded
527 name does not follow standard naming conventions, and thus that
528 it is not your typical Ada symbol name. Trying to unqualify it
529 is therefore pointless and possibly erroneous. */
530 if (decoded_name[0] == '<')
531 return decoded_name;
532
533 result = strrchr (decoded_name, '.');
41d27058
JB
534 if (result != NULL)
535 result++; /* Skip the dot... */
536 else
537 result = decoded_name;
538
539 return result;
540}
541
542/* Return a string starting with '<', followed by STR, and '>'.
543 The result is good until the next call. */
544
545static char *
546add_angle_brackets (const char *str)
547{
548 static char *result = NULL;
549
550 xfree (result);
88c15c34 551 result = xstrprintf ("<%s>", str);
41d27058
JB
552 return result;
553}
96d887e8 554
4c4b4cd2
PH
555static char *
556ada_get_gdb_completer_word_break_characters (void)
557{
558 return ada_completer_word_break_characters;
559}
560
e79af960
JB
561/* Print an array element index using the Ada syntax. */
562
563static void
564ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 565 const struct value_print_options *options)
e79af960 566{
79a45b7d 567 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
568 fprintf_filtered (stream, " => ");
569}
570
f27cf670 571/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 572 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 573 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 574
f27cf670
AS
575void *
576grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 577{
d2e4a39e
AS
578 if (*size < min_size)
579 {
580 *size *= 2;
581 if (*size < min_size)
4c4b4cd2 582 *size = min_size;
f27cf670 583 vect = xrealloc (vect, *size * element_size);
d2e4a39e 584 }
f27cf670 585 return vect;
14f9c5c9
AS
586}
587
588/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 589 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
590
591static int
ebf56fd3 592field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
593{
594 int len = strlen (target);
5b4ee69b 595
d2e4a39e 596 return
4c4b4cd2
PH
597 (strncmp (field_name, target, len) == 0
598 && (field_name[len] == '\0'
61012eef 599 || (startswith (field_name + len, "___")
76a01679
JB
600 && strcmp (field_name + strlen (field_name) - 6,
601 "___XVN") != 0)));
14f9c5c9
AS
602}
603
604
872c8b51
JB
605/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
606 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
607 and return its index. This function also handles fields whose name
608 have ___ suffixes because the compiler sometimes alters their name
609 by adding such a suffix to represent fields with certain constraints.
610 If the field could not be found, return a negative number if
611 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
612
613int
614ada_get_field_index (const struct type *type, const char *field_name,
615 int maybe_missing)
616{
617 int fieldno;
872c8b51
JB
618 struct type *struct_type = check_typedef ((struct type *) type);
619
620 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
621 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
622 return fieldno;
623
624 if (!maybe_missing)
323e0a4a 625 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 626 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
627
628 return -1;
629}
630
631/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
632
633int
d2e4a39e 634ada_name_prefix_len (const char *name)
14f9c5c9
AS
635{
636 if (name == NULL)
637 return 0;
d2e4a39e 638 else
14f9c5c9 639 {
d2e4a39e 640 const char *p = strstr (name, "___");
5b4ee69b 641
14f9c5c9 642 if (p == NULL)
4c4b4cd2 643 return strlen (name);
14f9c5c9 644 else
4c4b4cd2 645 return p - name;
14f9c5c9
AS
646 }
647}
648
4c4b4cd2
PH
649/* Return non-zero if SUFFIX is a suffix of STR.
650 Return zero if STR is null. */
651
14f9c5c9 652static int
d2e4a39e 653is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
654{
655 int len1, len2;
5b4ee69b 656
14f9c5c9
AS
657 if (str == NULL)
658 return 0;
659 len1 = strlen (str);
660 len2 = strlen (suffix);
4c4b4cd2 661 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
662}
663
4c4b4cd2
PH
664/* The contents of value VAL, treated as a value of type TYPE. The
665 result is an lval in memory if VAL is. */
14f9c5c9 666
d2e4a39e 667static struct value *
4c4b4cd2 668coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 669{
61ee279c 670 type = ada_check_typedef (type);
df407dfe 671 if (value_type (val) == type)
4c4b4cd2 672 return val;
d2e4a39e 673 else
14f9c5c9 674 {
4c4b4cd2
PH
675 struct value *result;
676
677 /* Make sure that the object size is not unreasonable before
678 trying to allocate some memory for it. */
c1b5a1a6 679 ada_ensure_varsize_limit (type);
4c4b4cd2 680
41e8491f
JK
681 if (value_lazy (val)
682 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
683 result = allocate_value_lazy (type);
684 else
685 {
686 result = allocate_value (type);
9a0dc9e3 687 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 688 }
74bcbdf3 689 set_value_component_location (result, val);
9bbda503
AC
690 set_value_bitsize (result, value_bitsize (val));
691 set_value_bitpos (result, value_bitpos (val));
42ae5230 692 set_value_address (result, value_address (val));
14f9c5c9
AS
693 return result;
694 }
695}
696
fc1a4b47
AC
697static const gdb_byte *
698cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
699{
700 if (valaddr == NULL)
701 return NULL;
702 else
703 return valaddr + offset;
704}
705
706static CORE_ADDR
ebf56fd3 707cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
708{
709 if (address == 0)
710 return 0;
d2e4a39e 711 else
14f9c5c9
AS
712 return address + offset;
713}
714
4c4b4cd2
PH
715/* Issue a warning (as for the definition of warning in utils.c, but
716 with exactly one argument rather than ...), unless the limit on the
717 number of warnings has passed during the evaluation of the current
718 expression. */
a2249542 719
77109804
AC
720/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
721 provided by "complaint". */
a0b31db1 722static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 723
14f9c5c9 724static void
a2249542 725lim_warning (const char *format, ...)
14f9c5c9 726{
a2249542 727 va_list args;
a2249542 728
5b4ee69b 729 va_start (args, format);
4c4b4cd2
PH
730 warnings_issued += 1;
731 if (warnings_issued <= warning_limit)
a2249542
MK
732 vwarning (format, args);
733
734 va_end (args);
4c4b4cd2
PH
735}
736
714e53ab
PH
737/* Issue an error if the size of an object of type T is unreasonable,
738 i.e. if it would be a bad idea to allocate a value of this type in
739 GDB. */
740
c1b5a1a6
JB
741void
742ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
743{
744 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 745 error (_("object size is larger than varsize-limit"));
714e53ab
PH
746}
747
0963b4bd 748/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 749static LONGEST
c3e5cd34 750max_of_size (int size)
4c4b4cd2 751{
76a01679 752 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 753
76a01679 754 return top_bit | (top_bit - 1);
4c4b4cd2
PH
755}
756
0963b4bd 757/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 758static LONGEST
c3e5cd34 759min_of_size (int size)
4c4b4cd2 760{
c3e5cd34 761 return -max_of_size (size) - 1;
4c4b4cd2
PH
762}
763
0963b4bd 764/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 765static ULONGEST
c3e5cd34 766umax_of_size (int size)
4c4b4cd2 767{
76a01679 768 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 769
76a01679 770 return top_bit | (top_bit - 1);
4c4b4cd2
PH
771}
772
0963b4bd 773/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
774static LONGEST
775max_of_type (struct type *t)
4c4b4cd2 776{
c3e5cd34
PH
777 if (TYPE_UNSIGNED (t))
778 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
779 else
780 return max_of_size (TYPE_LENGTH (t));
781}
782
0963b4bd 783/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
784static LONGEST
785min_of_type (struct type *t)
786{
787 if (TYPE_UNSIGNED (t))
788 return 0;
789 else
790 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
791}
792
793/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
794LONGEST
795ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 796{
c3345124 797 type = resolve_dynamic_type (type, NULL, 0);
76a01679 798 switch (TYPE_CODE (type))
4c4b4cd2
PH
799 {
800 case TYPE_CODE_RANGE:
690cc4eb 801 return TYPE_HIGH_BOUND (type);
4c4b4cd2 802 case TYPE_CODE_ENUM:
14e75d8e 803 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
804 case TYPE_CODE_BOOL:
805 return 1;
806 case TYPE_CODE_CHAR:
76a01679 807 case TYPE_CODE_INT:
690cc4eb 808 return max_of_type (type);
4c4b4cd2 809 default:
43bbcdc2 810 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
811 }
812}
813
14e75d8e 814/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
815LONGEST
816ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 817{
c3345124 818 type = resolve_dynamic_type (type, NULL, 0);
76a01679 819 switch (TYPE_CODE (type))
4c4b4cd2
PH
820 {
821 case TYPE_CODE_RANGE:
690cc4eb 822 return TYPE_LOW_BOUND (type);
4c4b4cd2 823 case TYPE_CODE_ENUM:
14e75d8e 824 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
825 case TYPE_CODE_BOOL:
826 return 0;
827 case TYPE_CODE_CHAR:
76a01679 828 case TYPE_CODE_INT:
690cc4eb 829 return min_of_type (type);
4c4b4cd2 830 default:
43bbcdc2 831 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
832 }
833}
834
835/* The identity on non-range types. For range types, the underlying
76a01679 836 non-range scalar type. */
4c4b4cd2
PH
837
838static struct type *
18af8284 839get_base_type (struct type *type)
4c4b4cd2
PH
840{
841 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
842 {
76a01679
JB
843 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
844 return type;
4c4b4cd2
PH
845 type = TYPE_TARGET_TYPE (type);
846 }
847 return type;
14f9c5c9 848}
41246937
JB
849
850/* Return a decoded version of the given VALUE. This means returning
851 a value whose type is obtained by applying all the GNAT-specific
852 encondings, making the resulting type a static but standard description
853 of the initial type. */
854
855struct value *
856ada_get_decoded_value (struct value *value)
857{
858 struct type *type = ada_check_typedef (value_type (value));
859
860 if (ada_is_array_descriptor_type (type)
861 || (ada_is_constrained_packed_array_type (type)
862 && TYPE_CODE (type) != TYPE_CODE_PTR))
863 {
864 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
865 value = ada_coerce_to_simple_array_ptr (value);
866 else
867 value = ada_coerce_to_simple_array (value);
868 }
869 else
870 value = ada_to_fixed_value (value);
871
872 return value;
873}
874
875/* Same as ada_get_decoded_value, but with the given TYPE.
876 Because there is no associated actual value for this type,
877 the resulting type might be a best-effort approximation in
878 the case of dynamic types. */
879
880struct type *
881ada_get_decoded_type (struct type *type)
882{
883 type = to_static_fixed_type (type);
884 if (ada_is_constrained_packed_array_type (type))
885 type = ada_coerce_to_simple_array_type (type);
886 return type;
887}
888
4c4b4cd2 889\f
76a01679 890
4c4b4cd2 891 /* Language Selection */
14f9c5c9
AS
892
893/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 894 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 895
14f9c5c9 896enum language
ccefe4c4 897ada_update_initial_language (enum language lang)
14f9c5c9 898{
d2e4a39e 899 if (lookup_minimal_symbol ("adainit", (const char *) NULL,
3b7344d5 900 (struct objfile *) NULL).minsym != NULL)
4c4b4cd2 901 return language_ada;
14f9c5c9
AS
902
903 return lang;
904}
96d887e8
PH
905
906/* If the main procedure is written in Ada, then return its name.
907 The result is good until the next call. Return NULL if the main
908 procedure doesn't appear to be in Ada. */
909
910char *
911ada_main_name (void)
912{
3b7344d5 913 struct bound_minimal_symbol msym;
f9bc20b9 914 static char *main_program_name = NULL;
6c038f32 915
96d887e8
PH
916 /* For Ada, the name of the main procedure is stored in a specific
917 string constant, generated by the binder. Look for that symbol,
918 extract its address, and then read that string. If we didn't find
919 that string, then most probably the main procedure is not written
920 in Ada. */
921 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
922
3b7344d5 923 if (msym.minsym != NULL)
96d887e8 924 {
f9bc20b9
JB
925 CORE_ADDR main_program_name_addr;
926 int err_code;
927
77e371c0 928 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 929 if (main_program_name_addr == 0)
323e0a4a 930 error (_("Invalid address for Ada main program name."));
96d887e8 931
f9bc20b9
JB
932 xfree (main_program_name);
933 target_read_string (main_program_name_addr, &main_program_name,
934 1024, &err_code);
935
936 if (err_code != 0)
937 return NULL;
96d887e8
PH
938 return main_program_name;
939 }
940
941 /* The main procedure doesn't seem to be in Ada. */
942 return NULL;
943}
14f9c5c9 944\f
4c4b4cd2 945 /* Symbols */
d2e4a39e 946
4c4b4cd2
PH
947/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
948 of NULLs. */
14f9c5c9 949
d2e4a39e
AS
950const struct ada_opname_map ada_opname_table[] = {
951 {"Oadd", "\"+\"", BINOP_ADD},
952 {"Osubtract", "\"-\"", BINOP_SUB},
953 {"Omultiply", "\"*\"", BINOP_MUL},
954 {"Odivide", "\"/\"", BINOP_DIV},
955 {"Omod", "\"mod\"", BINOP_MOD},
956 {"Orem", "\"rem\"", BINOP_REM},
957 {"Oexpon", "\"**\"", BINOP_EXP},
958 {"Olt", "\"<\"", BINOP_LESS},
959 {"Ole", "\"<=\"", BINOP_LEQ},
960 {"Ogt", "\">\"", BINOP_GTR},
961 {"Oge", "\">=\"", BINOP_GEQ},
962 {"Oeq", "\"=\"", BINOP_EQUAL},
963 {"One", "\"/=\"", BINOP_NOTEQUAL},
964 {"Oand", "\"and\"", BINOP_BITWISE_AND},
965 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
966 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
967 {"Oconcat", "\"&\"", BINOP_CONCAT},
968 {"Oabs", "\"abs\"", UNOP_ABS},
969 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
970 {"Oadd", "\"+\"", UNOP_PLUS},
971 {"Osubtract", "\"-\"", UNOP_NEG},
972 {NULL, NULL}
14f9c5c9
AS
973};
974
4c4b4cd2
PH
975/* The "encoded" form of DECODED, according to GNAT conventions.
976 The result is valid until the next call to ada_encode. */
977
14f9c5c9 978char *
4c4b4cd2 979ada_encode (const char *decoded)
14f9c5c9 980{
4c4b4cd2
PH
981 static char *encoding_buffer = NULL;
982 static size_t encoding_buffer_size = 0;
d2e4a39e 983 const char *p;
14f9c5c9 984 int k;
d2e4a39e 985
4c4b4cd2 986 if (decoded == NULL)
14f9c5c9
AS
987 return NULL;
988
4c4b4cd2
PH
989 GROW_VECT (encoding_buffer, encoding_buffer_size,
990 2 * strlen (decoded) + 10);
14f9c5c9
AS
991
992 k = 0;
4c4b4cd2 993 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 994 {
cdc7bb92 995 if (*p == '.')
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
998 k += 2;
999 }
14f9c5c9 1000 else if (*p == '"')
4c4b4cd2
PH
1001 {
1002 const struct ada_opname_map *mapping;
1003
1004 for (mapping = ada_opname_table;
1265e4aa 1005 mapping->encoded != NULL
61012eef 1006 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
1007 ;
1008 if (mapping->encoded == NULL)
323e0a4a 1009 error (_("invalid Ada operator name: %s"), p);
4c4b4cd2
PH
1010 strcpy (encoding_buffer + k, mapping->encoded);
1011 k += strlen (mapping->encoded);
1012 break;
1013 }
d2e4a39e 1014 else
4c4b4cd2
PH
1015 {
1016 encoding_buffer[k] = *p;
1017 k += 1;
1018 }
14f9c5c9
AS
1019 }
1020
4c4b4cd2
PH
1021 encoding_buffer[k] = '\0';
1022 return encoding_buffer;
14f9c5c9
AS
1023}
1024
1025/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1026 quotes, unfolded, but with the quotes stripped away. Result good
1027 to next call. */
1028
d2e4a39e
AS
1029char *
1030ada_fold_name (const char *name)
14f9c5c9 1031{
d2e4a39e 1032 static char *fold_buffer = NULL;
14f9c5c9
AS
1033 static size_t fold_buffer_size = 0;
1034
1035 int len = strlen (name);
d2e4a39e 1036 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1037
1038 if (name[0] == '\'')
1039 {
d2e4a39e
AS
1040 strncpy (fold_buffer, name + 1, len - 2);
1041 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1042 }
1043 else
1044 {
1045 int i;
5b4ee69b 1046
14f9c5c9 1047 for (i = 0; i <= len; i += 1)
4c4b4cd2 1048 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1049 }
1050
1051 return fold_buffer;
1052}
1053
529cad9c
PH
1054/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1055
1056static int
1057is_lower_alphanum (const char c)
1058{
1059 return (isdigit (c) || (isalpha (c) && islower (c)));
1060}
1061
c90092fe
JB
1062/* ENCODED is the linkage name of a symbol and LEN contains its length.
1063 This function saves in LEN the length of that same symbol name but
1064 without either of these suffixes:
29480c32
JB
1065 . .{DIGIT}+
1066 . ${DIGIT}+
1067 . ___{DIGIT}+
1068 . __{DIGIT}+.
c90092fe 1069
29480c32
JB
1070 These are suffixes introduced by the compiler for entities such as
1071 nested subprogram for instance, in order to avoid name clashes.
1072 They do not serve any purpose for the debugger. */
1073
1074static void
1075ada_remove_trailing_digits (const char *encoded, int *len)
1076{
1077 if (*len > 1 && isdigit (encoded[*len - 1]))
1078 {
1079 int i = *len - 2;
5b4ee69b 1080
29480c32
JB
1081 while (i > 0 && isdigit (encoded[i]))
1082 i--;
1083 if (i >= 0 && encoded[i] == '.')
1084 *len = i;
1085 else if (i >= 0 && encoded[i] == '$')
1086 *len = i;
61012eef 1087 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1088 *len = i - 2;
61012eef 1089 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1090 *len = i - 1;
1091 }
1092}
1093
1094/* Remove the suffix introduced by the compiler for protected object
1095 subprograms. */
1096
1097static void
1098ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1099{
1100 /* Remove trailing N. */
1101
1102 /* Protected entry subprograms are broken into two
1103 separate subprograms: The first one is unprotected, and has
1104 a 'N' suffix; the second is the protected version, and has
0963b4bd 1105 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1106 the protection. Since the P subprograms are internally generated,
1107 we leave these names undecoded, giving the user a clue that this
1108 entity is internal. */
1109
1110 if (*len > 1
1111 && encoded[*len - 1] == 'N'
1112 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1113 *len = *len - 1;
1114}
1115
69fadcdf
JB
1116/* Remove trailing X[bn]* suffixes (indicating names in package bodies). */
1117
1118static void
1119ada_remove_Xbn_suffix (const char *encoded, int *len)
1120{
1121 int i = *len - 1;
1122
1123 while (i > 0 && (encoded[i] == 'b' || encoded[i] == 'n'))
1124 i--;
1125
1126 if (encoded[i] != 'X')
1127 return;
1128
1129 if (i == 0)
1130 return;
1131
1132 if (isalnum (encoded[i-1]))
1133 *len = i;
1134}
1135
29480c32
JB
1136/* If ENCODED follows the GNAT entity encoding conventions, then return
1137 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1138 replaced by ENCODED.
14f9c5c9 1139
4c4b4cd2 1140 The resulting string is valid until the next call of ada_decode.
29480c32 1141 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1142 is returned. */
1143
1144const char *
1145ada_decode (const char *encoded)
14f9c5c9
AS
1146{
1147 int i, j;
1148 int len0;
d2e4a39e 1149 const char *p;
4c4b4cd2 1150 char *decoded;
14f9c5c9 1151 int at_start_name;
4c4b4cd2
PH
1152 static char *decoding_buffer = NULL;
1153 static size_t decoding_buffer_size = 0;
d2e4a39e 1154
29480c32
JB
1155 /* The name of the Ada main procedure starts with "_ada_".
1156 This prefix is not part of the decoded name, so skip this part
1157 if we see this prefix. */
61012eef 1158 if (startswith (encoded, "_ada_"))
4c4b4cd2 1159 encoded += 5;
14f9c5c9 1160
29480c32
JB
1161 /* If the name starts with '_', then it is not a properly encoded
1162 name, so do not attempt to decode it. Similarly, if the name
1163 starts with '<', the name should not be decoded. */
4c4b4cd2 1164 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1165 goto Suppress;
1166
4c4b4cd2 1167 len0 = strlen (encoded);
4c4b4cd2 1168
29480c32
JB
1169 ada_remove_trailing_digits (encoded, &len0);
1170 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1171
4c4b4cd2
PH
1172 /* Remove the ___X.* suffix if present. Do not forget to verify that
1173 the suffix is located before the current "end" of ENCODED. We want
1174 to avoid re-matching parts of ENCODED that have previously been
1175 marked as discarded (by decrementing LEN0). */
1176 p = strstr (encoded, "___");
1177 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1178 {
1179 if (p[3] == 'X')
4c4b4cd2 1180 len0 = p - encoded;
14f9c5c9 1181 else
4c4b4cd2 1182 goto Suppress;
14f9c5c9 1183 }
4c4b4cd2 1184
29480c32
JB
1185 /* Remove any trailing TKB suffix. It tells us that this symbol
1186 is for the body of a task, but that information does not actually
1187 appear in the decoded name. */
1188
61012eef 1189 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1190 len0 -= 3;
76a01679 1191
a10967fa
JB
1192 /* Remove any trailing TB suffix. The TB suffix is slightly different
1193 from the TKB suffix because it is used for non-anonymous task
1194 bodies. */
1195
61012eef 1196 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1197 len0 -= 2;
1198
29480c32
JB
1199 /* Remove trailing "B" suffixes. */
1200 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1201
61012eef 1202 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1203 len0 -= 1;
1204
4c4b4cd2 1205 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1206
4c4b4cd2
PH
1207 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1208 decoded = decoding_buffer;
14f9c5c9 1209
29480c32
JB
1210 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1211
4c4b4cd2 1212 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1213 {
4c4b4cd2
PH
1214 i = len0 - 2;
1215 while ((i >= 0 && isdigit (encoded[i]))
1216 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1217 i -= 1;
1218 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1219 len0 = i - 1;
1220 else if (encoded[i] == '$')
1221 len0 = i;
d2e4a39e 1222 }
14f9c5c9 1223
29480c32
JB
1224 /* The first few characters that are not alphabetic are not part
1225 of any encoding we use, so we can copy them over verbatim. */
1226
4c4b4cd2
PH
1227 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1228 decoded[j] = encoded[i];
14f9c5c9
AS
1229
1230 at_start_name = 1;
1231 while (i < len0)
1232 {
29480c32 1233 /* Is this a symbol function? */
4c4b4cd2
PH
1234 if (at_start_name && encoded[i] == 'O')
1235 {
1236 int k;
5b4ee69b 1237
4c4b4cd2
PH
1238 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1239 {
1240 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1241 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1242 op_len - 1) == 0)
1243 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1244 {
1245 strcpy (decoded + j, ada_opname_table[k].decoded);
1246 at_start_name = 0;
1247 i += op_len;
1248 j += strlen (ada_opname_table[k].decoded);
1249 break;
1250 }
1251 }
1252 if (ada_opname_table[k].encoded != NULL)
1253 continue;
1254 }
14f9c5c9
AS
1255 at_start_name = 0;
1256
529cad9c
PH
1257 /* Replace "TK__" with "__", which will eventually be translated
1258 into "." (just below). */
1259
61012eef 1260 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1261 i += 2;
529cad9c 1262
29480c32
JB
1263 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1264 be translated into "." (just below). These are internal names
1265 generated for anonymous blocks inside which our symbol is nested. */
1266
1267 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1268 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1269 && isdigit (encoded [i+4]))
1270 {
1271 int k = i + 5;
1272
1273 while (k < len0 && isdigit (encoded[k]))
1274 k++; /* Skip any extra digit. */
1275
1276 /* Double-check that the "__B_{DIGITS}+" sequence we found
1277 is indeed followed by "__". */
1278 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1279 i = k;
1280 }
1281
529cad9c
PH
1282 /* Remove _E{DIGITS}+[sb] */
1283
1284 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1285 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1286 one implements the actual entry code, and has a suffix following
1287 the convention above; the second one implements the barrier and
1288 uses the same convention as above, except that the 'E' is replaced
1289 by a 'B'.
1290
1291 Just as above, we do not decode the name of barrier functions
1292 to give the user a clue that the code he is debugging has been
1293 internally generated. */
1294
1295 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1296 && isdigit (encoded[i+2]))
1297 {
1298 int k = i + 3;
1299
1300 while (k < len0 && isdigit (encoded[k]))
1301 k++;
1302
1303 if (k < len0
1304 && (encoded[k] == 'b' || encoded[k] == 's'))
1305 {
1306 k++;
1307 /* Just as an extra precaution, make sure that if this
1308 suffix is followed by anything else, it is a '_'.
1309 Otherwise, we matched this sequence by accident. */
1310 if (k == len0
1311 || (k < len0 && encoded[k] == '_'))
1312 i = k;
1313 }
1314 }
1315
1316 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1317 the GNAT front-end in protected object subprograms. */
1318
1319 if (i < len0 + 3
1320 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1321 {
1322 /* Backtrack a bit up until we reach either the begining of
1323 the encoded name, or "__". Make sure that we only find
1324 digits or lowercase characters. */
1325 const char *ptr = encoded + i - 1;
1326
1327 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1328 ptr--;
1329 if (ptr < encoded
1330 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1331 i++;
1332 }
1333
4c4b4cd2
PH
1334 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1335 {
29480c32
JB
1336 /* This is a X[bn]* sequence not separated from the previous
1337 part of the name with a non-alpha-numeric character (in other
1338 words, immediately following an alpha-numeric character), then
1339 verify that it is placed at the end of the encoded name. If
1340 not, then the encoding is not valid and we should abort the
1341 decoding. Otherwise, just skip it, it is used in body-nested
1342 package names. */
4c4b4cd2
PH
1343 do
1344 i += 1;
1345 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1346 if (i < len0)
1347 goto Suppress;
1348 }
cdc7bb92 1349 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1350 {
29480c32 1351 /* Replace '__' by '.'. */
4c4b4cd2
PH
1352 decoded[j] = '.';
1353 at_start_name = 1;
1354 i += 2;
1355 j += 1;
1356 }
14f9c5c9 1357 else
4c4b4cd2 1358 {
29480c32
JB
1359 /* It's a character part of the decoded name, so just copy it
1360 over. */
4c4b4cd2
PH
1361 decoded[j] = encoded[i];
1362 i += 1;
1363 j += 1;
1364 }
14f9c5c9 1365 }
4c4b4cd2 1366 decoded[j] = '\000';
14f9c5c9 1367
29480c32
JB
1368 /* Decoded names should never contain any uppercase character.
1369 Double-check this, and abort the decoding if we find one. */
1370
4c4b4cd2
PH
1371 for (i = 0; decoded[i] != '\0'; i += 1)
1372 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1373 goto Suppress;
1374
4c4b4cd2
PH
1375 if (strcmp (decoded, encoded) == 0)
1376 return encoded;
1377 else
1378 return decoded;
14f9c5c9
AS
1379
1380Suppress:
4c4b4cd2
PH
1381 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1382 decoded = decoding_buffer;
1383 if (encoded[0] == '<')
1384 strcpy (decoded, encoded);
14f9c5c9 1385 else
88c15c34 1386 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1387 return decoded;
1388
1389}
1390
1391/* Table for keeping permanent unique copies of decoded names. Once
1392 allocated, names in this table are never released. While this is a
1393 storage leak, it should not be significant unless there are massive
1394 changes in the set of decoded names in successive versions of a
1395 symbol table loaded during a single session. */
1396static struct htab *decoded_names_store;
1397
1398/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1399 in the language-specific part of GSYMBOL, if it has not been
1400 previously computed. Tries to save the decoded name in the same
1401 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1402 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1403 GSYMBOL).
4c4b4cd2
PH
1404 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1405 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1406 when a decoded name is cached in it. */
4c4b4cd2 1407
45e6c716 1408const char *
f85f34ed 1409ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1410{
f85f34ed
TT
1411 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1412 const char **resultp =
1413 &gsymbol->language_specific.mangled_lang.demangled_name;
5b4ee69b 1414
f85f34ed 1415 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1416 {
1417 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1418 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1419
f85f34ed 1420 gsymbol->ada_mangled = 1;
5b4ee69b 1421
f85f34ed
TT
1422 if (obstack != NULL)
1423 *resultp = obstack_copy0 (obstack, decoded, strlen (decoded));
1424 else
76a01679 1425 {
f85f34ed
TT
1426 /* Sometimes, we can't find a corresponding objfile, in
1427 which case, we put the result on the heap. Since we only
1428 decode when needed, we hope this usually does not cause a
1429 significant memory leak (FIXME). */
1430
76a01679
JB
1431 char **slot = (char **) htab_find_slot (decoded_names_store,
1432 decoded, INSERT);
5b4ee69b 1433
76a01679
JB
1434 if (*slot == NULL)
1435 *slot = xstrdup (decoded);
1436 *resultp = *slot;
1437 }
4c4b4cd2 1438 }
14f9c5c9 1439
4c4b4cd2
PH
1440 return *resultp;
1441}
76a01679 1442
2c0b251b 1443static char *
76a01679 1444ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1445{
1446 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1447}
1448
1449/* Returns non-zero iff SYM_NAME matches NAME, ignoring any trailing
4c4b4cd2
PH
1450 suffixes that encode debugging information or leading _ada_ on
1451 SYM_NAME (see is_name_suffix commentary for the debugging
1452 information that is ignored). If WILD, then NAME need only match a
1453 suffix of SYM_NAME minus the same suffixes. Also returns 0 if
1454 either argument is NULL. */
14f9c5c9 1455
2c0b251b 1456static int
40658b94 1457match_name (const char *sym_name, const char *name, int wild)
14f9c5c9
AS
1458{
1459 if (sym_name == NULL || name == NULL)
1460 return 0;
1461 else if (wild)
73589123 1462 return wild_match (sym_name, name) == 0;
d2e4a39e
AS
1463 else
1464 {
1465 int len_name = strlen (name);
5b4ee69b 1466
4c4b4cd2
PH
1467 return (strncmp (sym_name, name, len_name) == 0
1468 && is_name_suffix (sym_name + len_name))
61012eef 1469 || (startswith (sym_name, "_ada_")
4c4b4cd2
PH
1470 && strncmp (sym_name + 5, name, len_name) == 0
1471 && is_name_suffix (sym_name + len_name + 5));
d2e4a39e 1472 }
14f9c5c9 1473}
14f9c5c9 1474\f
d2e4a39e 1475
4c4b4cd2 1476 /* Arrays */
14f9c5c9 1477
28c85d6c
JB
1478/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1479 generated by the GNAT compiler to describe the index type used
1480 for each dimension of an array, check whether it follows the latest
1481 known encoding. If not, fix it up to conform to the latest encoding.
1482 Otherwise, do nothing. This function also does nothing if
1483 INDEX_DESC_TYPE is NULL.
1484
1485 The GNAT encoding used to describle the array index type evolved a bit.
1486 Initially, the information would be provided through the name of each
1487 field of the structure type only, while the type of these fields was
1488 described as unspecified and irrelevant. The debugger was then expected
1489 to perform a global type lookup using the name of that field in order
1490 to get access to the full index type description. Because these global
1491 lookups can be very expensive, the encoding was later enhanced to make
1492 the global lookup unnecessary by defining the field type as being
1493 the full index type description.
1494
1495 The purpose of this routine is to allow us to support older versions
1496 of the compiler by detecting the use of the older encoding, and by
1497 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1498 we essentially replace each field's meaningless type by the associated
1499 index subtype). */
1500
1501void
1502ada_fixup_array_indexes_type (struct type *index_desc_type)
1503{
1504 int i;
1505
1506 if (index_desc_type == NULL)
1507 return;
1508 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1509
1510 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1511 to check one field only, no need to check them all). If not, return
1512 now.
1513
1514 If our INDEX_DESC_TYPE was generated using the older encoding,
1515 the field type should be a meaningless integer type whose name
1516 is not equal to the field name. */
1517 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1518 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1519 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1520 return;
1521
1522 /* Fixup each field of INDEX_DESC_TYPE. */
1523 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1524 {
0d5cff50 1525 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1526 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1527
1528 if (raw_type)
1529 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1530 }
1531}
1532
4c4b4cd2 1533/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1534
d2e4a39e
AS
1535static char *bound_name[] = {
1536 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1537 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1538};
1539
1540/* Maximum number of array dimensions we are prepared to handle. */
1541
4c4b4cd2 1542#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1543
14f9c5c9 1544
4c4b4cd2
PH
1545/* The desc_* routines return primitive portions of array descriptors
1546 (fat pointers). */
14f9c5c9
AS
1547
1548/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1549 level of indirection, if needed. */
1550
d2e4a39e
AS
1551static struct type *
1552desc_base_type (struct type *type)
14f9c5c9
AS
1553{
1554 if (type == NULL)
1555 return NULL;
61ee279c 1556 type = ada_check_typedef (type);
720d1a40
JB
1557 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1558 type = ada_typedef_target_type (type);
1559
1265e4aa
JB
1560 if (type != NULL
1561 && (TYPE_CODE (type) == TYPE_CODE_PTR
1562 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1563 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1564 else
1565 return type;
1566}
1567
4c4b4cd2
PH
1568/* True iff TYPE indicates a "thin" array pointer type. */
1569
14f9c5c9 1570static int
d2e4a39e 1571is_thin_pntr (struct type *type)
14f9c5c9 1572{
d2e4a39e 1573 return
14f9c5c9
AS
1574 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1575 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1576}
1577
4c4b4cd2
PH
1578/* The descriptor type for thin pointer type TYPE. */
1579
d2e4a39e
AS
1580static struct type *
1581thin_descriptor_type (struct type *type)
14f9c5c9 1582{
d2e4a39e 1583 struct type *base_type = desc_base_type (type);
5b4ee69b 1584
14f9c5c9
AS
1585 if (base_type == NULL)
1586 return NULL;
1587 if (is_suffix (ada_type_name (base_type), "___XVE"))
1588 return base_type;
d2e4a39e 1589 else
14f9c5c9 1590 {
d2e4a39e 1591 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1592
14f9c5c9 1593 if (alt_type == NULL)
4c4b4cd2 1594 return base_type;
14f9c5c9 1595 else
4c4b4cd2 1596 return alt_type;
14f9c5c9
AS
1597 }
1598}
1599
4c4b4cd2
PH
1600/* A pointer to the array data for thin-pointer value VAL. */
1601
d2e4a39e
AS
1602static struct value *
1603thin_data_pntr (struct value *val)
14f9c5c9 1604{
828292f2 1605 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1606 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1607
556bdfd4
UW
1608 data_type = lookup_pointer_type (data_type);
1609
14f9c5c9 1610 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1611 return value_cast (data_type, value_copy (val));
d2e4a39e 1612 else
42ae5230 1613 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1614}
1615
4c4b4cd2
PH
1616/* True iff TYPE indicates a "thick" array pointer type. */
1617
14f9c5c9 1618static int
d2e4a39e 1619is_thick_pntr (struct type *type)
14f9c5c9
AS
1620{
1621 type = desc_base_type (type);
1622 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1623 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1624}
1625
4c4b4cd2
PH
1626/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1627 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1628
d2e4a39e
AS
1629static struct type *
1630desc_bounds_type (struct type *type)
14f9c5c9 1631{
d2e4a39e 1632 struct type *r;
14f9c5c9
AS
1633
1634 type = desc_base_type (type);
1635
1636 if (type == NULL)
1637 return NULL;
1638 else if (is_thin_pntr (type))
1639 {
1640 type = thin_descriptor_type (type);
1641 if (type == NULL)
4c4b4cd2 1642 return NULL;
14f9c5c9
AS
1643 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1644 if (r != NULL)
61ee279c 1645 return ada_check_typedef (r);
14f9c5c9
AS
1646 }
1647 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1648 {
1649 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1650 if (r != NULL)
61ee279c 1651 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1652 }
1653 return NULL;
1654}
1655
1656/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1657 one, a pointer to its bounds data. Otherwise NULL. */
1658
d2e4a39e
AS
1659static struct value *
1660desc_bounds (struct value *arr)
14f9c5c9 1661{
df407dfe 1662 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1663
d2e4a39e 1664 if (is_thin_pntr (type))
14f9c5c9 1665 {
d2e4a39e 1666 struct type *bounds_type =
4c4b4cd2 1667 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1668 LONGEST addr;
1669
4cdfadb1 1670 if (bounds_type == NULL)
323e0a4a 1671 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1672
1673 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1674 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1675 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1676 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1677 addr = value_as_long (arr);
d2e4a39e 1678 else
42ae5230 1679 addr = value_address (arr);
14f9c5c9 1680
d2e4a39e 1681 return
4c4b4cd2
PH
1682 value_from_longest (lookup_pointer_type (bounds_type),
1683 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1684 }
1685
1686 else if (is_thick_pntr (type))
05e522ef
JB
1687 {
1688 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1689 _("Bad GNAT array descriptor"));
1690 struct type *p_bounds_type = value_type (p_bounds);
1691
1692 if (p_bounds_type
1693 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1694 {
1695 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1696
1697 if (TYPE_STUB (target_type))
1698 p_bounds = value_cast (lookup_pointer_type
1699 (ada_check_typedef (target_type)),
1700 p_bounds);
1701 }
1702 else
1703 error (_("Bad GNAT array descriptor"));
1704
1705 return p_bounds;
1706 }
14f9c5c9
AS
1707 else
1708 return NULL;
1709}
1710
4c4b4cd2
PH
1711/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1712 position of the field containing the address of the bounds data. */
1713
14f9c5c9 1714static int
d2e4a39e 1715fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1716{
1717 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1718}
1719
1720/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1721 size of the field containing the address of the bounds data. */
1722
14f9c5c9 1723static int
d2e4a39e 1724fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1725{
1726 type = desc_base_type (type);
1727
d2e4a39e 1728 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1729 return TYPE_FIELD_BITSIZE (type, 1);
1730 else
61ee279c 1731 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1732}
1733
4c4b4cd2 1734/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1735 pointer to one, the type of its array data (a array-with-no-bounds type);
1736 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1737 data. */
4c4b4cd2 1738
d2e4a39e 1739static struct type *
556bdfd4 1740desc_data_target_type (struct type *type)
14f9c5c9
AS
1741{
1742 type = desc_base_type (type);
1743
4c4b4cd2 1744 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1745 if (is_thin_pntr (type))
556bdfd4 1746 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1747 else if (is_thick_pntr (type))
556bdfd4
UW
1748 {
1749 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1750
1751 if (data_type
1752 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1753 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1754 }
1755
1756 return NULL;
14f9c5c9
AS
1757}
1758
1759/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1760 its array data. */
4c4b4cd2 1761
d2e4a39e
AS
1762static struct value *
1763desc_data (struct value *arr)
14f9c5c9 1764{
df407dfe 1765 struct type *type = value_type (arr);
5b4ee69b 1766
14f9c5c9
AS
1767 if (is_thin_pntr (type))
1768 return thin_data_pntr (arr);
1769 else if (is_thick_pntr (type))
d2e4a39e 1770 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1771 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1772 else
1773 return NULL;
1774}
1775
1776
1777/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1778 position of the field containing the address of the data. */
1779
14f9c5c9 1780static int
d2e4a39e 1781fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1782{
1783 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1784}
1785
1786/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1787 size of the field containing the address of the data. */
1788
14f9c5c9 1789static int
d2e4a39e 1790fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1791{
1792 type = desc_base_type (type);
1793
1794 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1795 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1796 else
14f9c5c9
AS
1797 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1798}
1799
4c4b4cd2 1800/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1801 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1802 bound, if WHICH is 1. The first bound is I=1. */
1803
d2e4a39e
AS
1804static struct value *
1805desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1806{
d2e4a39e 1807 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1808 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1809}
1810
1811/* If BOUNDS is an array-bounds structure type, return the bit position
1812 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1813 bound, if WHICH is 1. The first bound is I=1. */
1814
14f9c5c9 1815static int
d2e4a39e 1816desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1817{
d2e4a39e 1818 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1819}
1820
1821/* If BOUNDS is an array-bounds structure type, return the bit field size
1822 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1823 bound, if WHICH is 1. The first bound is I=1. */
1824
76a01679 1825static int
d2e4a39e 1826desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1827{
1828 type = desc_base_type (type);
1829
d2e4a39e
AS
1830 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1831 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1832 else
1833 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1834}
1835
1836/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1837 Ith bound (numbering from 1). Otherwise, NULL. */
1838
d2e4a39e
AS
1839static struct type *
1840desc_index_type (struct type *type, int i)
14f9c5c9
AS
1841{
1842 type = desc_base_type (type);
1843
1844 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1845 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1846 else
14f9c5c9
AS
1847 return NULL;
1848}
1849
4c4b4cd2
PH
1850/* The number of index positions in the array-bounds type TYPE.
1851 Return 0 if TYPE is NULL. */
1852
14f9c5c9 1853static int
d2e4a39e 1854desc_arity (struct type *type)
14f9c5c9
AS
1855{
1856 type = desc_base_type (type);
1857
1858 if (type != NULL)
1859 return TYPE_NFIELDS (type) / 2;
1860 return 0;
1861}
1862
4c4b4cd2
PH
1863/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1864 an array descriptor type (representing an unconstrained array
1865 type). */
1866
76a01679
JB
1867static int
1868ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1869{
1870 if (type == NULL)
1871 return 0;
61ee279c 1872 type = ada_check_typedef (type);
4c4b4cd2 1873 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1874 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1875}
1876
52ce6436 1877/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1878 * to one. */
52ce6436 1879
2c0b251b 1880static int
52ce6436
PH
1881ada_is_array_type (struct type *type)
1882{
1883 while (type != NULL
1884 && (TYPE_CODE (type) == TYPE_CODE_PTR
1885 || TYPE_CODE (type) == TYPE_CODE_REF))
1886 type = TYPE_TARGET_TYPE (type);
1887 return ada_is_direct_array_type (type);
1888}
1889
4c4b4cd2 1890/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1891
14f9c5c9 1892int
4c4b4cd2 1893ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1894{
1895 if (type == NULL)
1896 return 0;
61ee279c 1897 type = ada_check_typedef (type);
14f9c5c9 1898 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1899 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1900 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1901 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1902}
1903
4c4b4cd2
PH
1904/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1905
14f9c5c9 1906int
4c4b4cd2 1907ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1908{
556bdfd4 1909 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1910
1911 if (type == NULL)
1912 return 0;
61ee279c 1913 type = ada_check_typedef (type);
556bdfd4
UW
1914 return (data_type != NULL
1915 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1916 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1917}
1918
1919/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1920 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1921 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1922 is still needed. */
1923
14f9c5c9 1924int
ebf56fd3 1925ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1926{
d2e4a39e 1927 return
14f9c5c9
AS
1928 type != NULL
1929 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1930 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1931 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1932 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1933}
1934
1935
4c4b4cd2 1936/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1937 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1938 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1939 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1940 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1941 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1942 a descriptor. */
d2e4a39e
AS
1943struct type *
1944ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1945{
ad82864c
JB
1946 if (ada_is_constrained_packed_array_type (value_type (arr)))
1947 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1948
df407dfe
AC
1949 if (!ada_is_array_descriptor_type (value_type (arr)))
1950 return value_type (arr);
d2e4a39e
AS
1951
1952 if (!bounds)
ad82864c
JB
1953 {
1954 struct type *array_type =
1955 ada_check_typedef (desc_data_target_type (value_type (arr)));
1956
1957 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1958 TYPE_FIELD_BITSIZE (array_type, 0) =
1959 decode_packed_array_bitsize (value_type (arr));
1960
1961 return array_type;
1962 }
14f9c5c9
AS
1963 else
1964 {
d2e4a39e 1965 struct type *elt_type;
14f9c5c9 1966 int arity;
d2e4a39e 1967 struct value *descriptor;
14f9c5c9 1968
df407dfe
AC
1969 elt_type = ada_array_element_type (value_type (arr), -1);
1970 arity = ada_array_arity (value_type (arr));
14f9c5c9 1971
d2e4a39e 1972 if (elt_type == NULL || arity == 0)
df407dfe 1973 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1974
1975 descriptor = desc_bounds (arr);
d2e4a39e 1976 if (value_as_long (descriptor) == 0)
4c4b4cd2 1977 return NULL;
d2e4a39e 1978 while (arity > 0)
4c4b4cd2 1979 {
e9bb382b
UW
1980 struct type *range_type = alloc_type_copy (value_type (arr));
1981 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1982 struct value *low = desc_one_bound (descriptor, arity, 0);
1983 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1984
5b4ee69b 1985 arity -= 1;
0c9c3474
SA
1986 create_static_range_type (range_type, value_type (low),
1987 longest_to_int (value_as_long (low)),
1988 longest_to_int (value_as_long (high)));
4c4b4cd2 1989 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1990
1991 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1992 {
1993 /* We need to store the element packed bitsize, as well as
1994 recompute the array size, because it was previously
1995 computed based on the unpacked element size. */
1996 LONGEST lo = value_as_long (low);
1997 LONGEST hi = value_as_long (high);
1998
1999 TYPE_FIELD_BITSIZE (elt_type, 0) =
2000 decode_packed_array_bitsize (value_type (arr));
2001 /* If the array has no element, then the size is already
2002 zero, and does not need to be recomputed. */
2003 if (lo < hi)
2004 {
2005 int array_bitsize =
2006 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
2007
2008 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
2009 }
2010 }
4c4b4cd2 2011 }
14f9c5c9
AS
2012
2013 return lookup_pointer_type (elt_type);
2014 }
2015}
2016
2017/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2018 Otherwise, returns either a standard GDB array with bounds set
2019 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2020 GDB array. Returns NULL if ARR is a null fat pointer. */
2021
d2e4a39e
AS
2022struct value *
2023ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2024{
df407dfe 2025 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2026 {
d2e4a39e 2027 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2028
14f9c5c9 2029 if (arrType == NULL)
4c4b4cd2 2030 return NULL;
14f9c5c9
AS
2031 return value_cast (arrType, value_copy (desc_data (arr)));
2032 }
ad82864c
JB
2033 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2034 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2035 else
2036 return arr;
2037}
2038
2039/* If ARR does not represent an array, returns ARR unchanged.
2040 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2041 be ARR itself if it already is in the proper form). */
2042
720d1a40 2043struct value *
d2e4a39e 2044ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2045{
df407dfe 2046 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2047 {
d2e4a39e 2048 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2049
14f9c5c9 2050 if (arrVal == NULL)
323e0a4a 2051 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2052 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2053 return value_ind (arrVal);
2054 }
ad82864c
JB
2055 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2056 return decode_constrained_packed_array (arr);
d2e4a39e 2057 else
14f9c5c9
AS
2058 return arr;
2059}
2060
2061/* If TYPE represents a GNAT array type, return it translated to an
2062 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2063 packing). For other types, is the identity. */
2064
d2e4a39e
AS
2065struct type *
2066ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2067{
ad82864c
JB
2068 if (ada_is_constrained_packed_array_type (type))
2069 return decode_constrained_packed_array_type (type);
17280b9f
UW
2070
2071 if (ada_is_array_descriptor_type (type))
556bdfd4 2072 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2073
2074 return type;
14f9c5c9
AS
2075}
2076
4c4b4cd2
PH
2077/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2078
ad82864c
JB
2079static int
2080ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2081{
2082 if (type == NULL)
2083 return 0;
4c4b4cd2 2084 type = desc_base_type (type);
61ee279c 2085 type = ada_check_typedef (type);
d2e4a39e 2086 return
14f9c5c9
AS
2087 ada_type_name (type) != NULL
2088 && strstr (ada_type_name (type), "___XP") != NULL;
2089}
2090
ad82864c
JB
2091/* Non-zero iff TYPE represents a standard GNAT constrained
2092 packed-array type. */
2093
2094int
2095ada_is_constrained_packed_array_type (struct type *type)
2096{
2097 return ada_is_packed_array_type (type)
2098 && !ada_is_array_descriptor_type (type);
2099}
2100
2101/* Non-zero iff TYPE represents an array descriptor for a
2102 unconstrained packed-array type. */
2103
2104static int
2105ada_is_unconstrained_packed_array_type (struct type *type)
2106{
2107 return ada_is_packed_array_type (type)
2108 && ada_is_array_descriptor_type (type);
2109}
2110
2111/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2112 return the size of its elements in bits. */
2113
2114static long
2115decode_packed_array_bitsize (struct type *type)
2116{
0d5cff50
DE
2117 const char *raw_name;
2118 const char *tail;
ad82864c
JB
2119 long bits;
2120
720d1a40
JB
2121 /* Access to arrays implemented as fat pointers are encoded as a typedef
2122 of the fat pointer type. We need the name of the fat pointer type
2123 to do the decoding, so strip the typedef layer. */
2124 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2125 type = ada_typedef_target_type (type);
2126
2127 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2128 if (!raw_name)
2129 raw_name = ada_type_name (desc_base_type (type));
2130
2131 if (!raw_name)
2132 return 0;
2133
2134 tail = strstr (raw_name, "___XP");
720d1a40 2135 gdb_assert (tail != NULL);
ad82864c
JB
2136
2137 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2138 {
2139 lim_warning
2140 (_("could not understand bit size information on packed array"));
2141 return 0;
2142 }
2143
2144 return bits;
2145}
2146
14f9c5c9
AS
2147/* Given that TYPE is a standard GDB array type with all bounds filled
2148 in, and that the element size of its ultimate scalar constituents
2149 (that is, either its elements, or, if it is an array of arrays, its
2150 elements' elements, etc.) is *ELT_BITS, return an identical type,
2151 but with the bit sizes of its elements (and those of any
2152 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2153 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2154 in bits.
2155
2156 Note that, for arrays whose index type has an XA encoding where
2157 a bound references a record discriminant, getting that discriminant,
2158 and therefore the actual value of that bound, is not possible
2159 because none of the given parameters gives us access to the record.
2160 This function assumes that it is OK in the context where it is being
2161 used to return an array whose bounds are still dynamic and where
2162 the length is arbitrary. */
4c4b4cd2 2163
d2e4a39e 2164static struct type *
ad82864c 2165constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2166{
d2e4a39e
AS
2167 struct type *new_elt_type;
2168 struct type *new_type;
99b1c762
JB
2169 struct type *index_type_desc;
2170 struct type *index_type;
14f9c5c9
AS
2171 LONGEST low_bound, high_bound;
2172
61ee279c 2173 type = ada_check_typedef (type);
14f9c5c9
AS
2174 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2175 return type;
2176
99b1c762
JB
2177 index_type_desc = ada_find_parallel_type (type, "___XA");
2178 if (index_type_desc)
2179 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2180 NULL);
2181 else
2182 index_type = TYPE_INDEX_TYPE (type);
2183
e9bb382b 2184 new_type = alloc_type_copy (type);
ad82864c
JB
2185 new_elt_type =
2186 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2187 elt_bits);
99b1c762 2188 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2189 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2190 TYPE_NAME (new_type) = ada_type_name (type);
2191
4a46959e
JB
2192 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2193 && is_dynamic_type (check_typedef (index_type)))
2194 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2195 low_bound = high_bound = 0;
2196 if (high_bound < low_bound)
2197 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2198 else
14f9c5c9
AS
2199 {
2200 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2201 TYPE_LENGTH (new_type) =
4c4b4cd2 2202 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2203 }
2204
876cecd0 2205 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2206 return new_type;
2207}
2208
ad82864c
JB
2209/* The array type encoded by TYPE, where
2210 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2211
d2e4a39e 2212static struct type *
ad82864c 2213decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2214{
0d5cff50 2215 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2216 char *name;
0d5cff50 2217 const char *tail;
d2e4a39e 2218 struct type *shadow_type;
14f9c5c9 2219 long bits;
14f9c5c9 2220
727e3d2e
JB
2221 if (!raw_name)
2222 raw_name = ada_type_name (desc_base_type (type));
2223
2224 if (!raw_name)
2225 return NULL;
2226
2227 name = (char *) alloca (strlen (raw_name) + 1);
2228 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2229 type = desc_base_type (type);
2230
14f9c5c9
AS
2231 memcpy (name, raw_name, tail - raw_name);
2232 name[tail - raw_name] = '\000';
2233
b4ba55a1
JB
2234 shadow_type = ada_find_parallel_type_with_name (type, name);
2235
2236 if (shadow_type == NULL)
14f9c5c9 2237 {
323e0a4a 2238 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2239 return NULL;
2240 }
cb249c71 2241 CHECK_TYPEDEF (shadow_type);
14f9c5c9
AS
2242
2243 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2244 {
0963b4bd
MS
2245 lim_warning (_("could not understand bounds "
2246 "information on packed array"));
14f9c5c9
AS
2247 return NULL;
2248 }
d2e4a39e 2249
ad82864c
JB
2250 bits = decode_packed_array_bitsize (type);
2251 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2252}
2253
ad82864c
JB
2254/* Given that ARR is a struct value *indicating a GNAT constrained packed
2255 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2256 standard GDB array type except that the BITSIZEs of the array
2257 target types are set to the number of bits in each element, and the
4c4b4cd2 2258 type length is set appropriately. */
14f9c5c9 2259
d2e4a39e 2260static struct value *
ad82864c 2261decode_constrained_packed_array (struct value *arr)
14f9c5c9 2262{
4c4b4cd2 2263 struct type *type;
14f9c5c9 2264
11aa919a
PMR
2265 /* If our value is a pointer, then dereference it. Likewise if
2266 the value is a reference. Make sure that this operation does not
2267 cause the target type to be fixed, as this would indirectly cause
2268 this array to be decoded. The rest of the routine assumes that
2269 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2270 and "value_ind" routines to perform the dereferencing, as opposed
2271 to using "ada_coerce_ref" or "ada_value_ind". */
2272 arr = coerce_ref (arr);
828292f2 2273 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2274 arr = value_ind (arr);
4c4b4cd2 2275
ad82864c 2276 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2277 if (type == NULL)
2278 {
323e0a4a 2279 error (_("can't unpack array"));
14f9c5c9
AS
2280 return NULL;
2281 }
61ee279c 2282
50810684 2283 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2284 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2285 {
2286 /* This is a (right-justified) modular type representing a packed
2287 array with no wrapper. In order to interpret the value through
2288 the (left-justified) packed array type we just built, we must
2289 first left-justify it. */
2290 int bit_size, bit_pos;
2291 ULONGEST mod;
2292
df407dfe 2293 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2294 bit_size = 0;
2295 while (mod > 0)
2296 {
2297 bit_size += 1;
2298 mod >>= 1;
2299 }
df407dfe 2300 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2301 arr = ada_value_primitive_packed_val (arr, NULL,
2302 bit_pos / HOST_CHAR_BIT,
2303 bit_pos % HOST_CHAR_BIT,
2304 bit_size,
2305 type);
2306 }
2307
4c4b4cd2 2308 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2309}
2310
2311
2312/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2313 given in IND. ARR must be a simple array. */
14f9c5c9 2314
d2e4a39e
AS
2315static struct value *
2316value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2317{
2318 int i;
2319 int bits, elt_off, bit_off;
2320 long elt_total_bit_offset;
d2e4a39e
AS
2321 struct type *elt_type;
2322 struct value *v;
14f9c5c9
AS
2323
2324 bits = 0;
2325 elt_total_bit_offset = 0;
df407dfe 2326 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2327 for (i = 0; i < arity; i += 1)
14f9c5c9 2328 {
d2e4a39e 2329 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2330 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2331 error
0963b4bd
MS
2332 (_("attempt to do packed indexing of "
2333 "something other than a packed array"));
14f9c5c9 2334 else
4c4b4cd2
PH
2335 {
2336 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2337 LONGEST lowerbound, upperbound;
2338 LONGEST idx;
2339
2340 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2341 {
323e0a4a 2342 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2343 lowerbound = upperbound = 0;
2344 }
2345
3cb382c9 2346 idx = pos_atr (ind[i]);
4c4b4cd2 2347 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2348 lim_warning (_("packed array index %ld out of bounds"),
2349 (long) idx);
4c4b4cd2
PH
2350 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2351 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2352 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2353 }
14f9c5c9
AS
2354 }
2355 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2356 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2357
2358 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2359 bits, elt_type);
14f9c5c9
AS
2360 return v;
2361}
2362
4c4b4cd2 2363/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2364
2365static int
d2e4a39e 2366has_negatives (struct type *type)
14f9c5c9 2367{
d2e4a39e
AS
2368 switch (TYPE_CODE (type))
2369 {
2370 default:
2371 return 0;
2372 case TYPE_CODE_INT:
2373 return !TYPE_UNSIGNED (type);
2374 case TYPE_CODE_RANGE:
2375 return TYPE_LOW_BOUND (type) < 0;
2376 }
14f9c5c9 2377}
d2e4a39e 2378
14f9c5c9
AS
2379
2380/* Create a new value of type TYPE from the contents of OBJ starting
2381 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2382 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
0963b4bd 2383 assigning through the result will set the field fetched from.
4c4b4cd2
PH
2384 VALADDR is ignored unless OBJ is NULL, in which case,
2385 VALADDR+OFFSET must address the start of storage containing the
2386 packed value. The value returned in this case is never an lval.
2387 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
14f9c5c9 2388
d2e4a39e 2389struct value *
fc1a4b47 2390ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
a2bd3dcd 2391 long offset, int bit_offset, int bit_size,
4c4b4cd2 2392 struct type *type)
14f9c5c9 2393{
d2e4a39e 2394 struct value *v;
4c4b4cd2
PH
2395 int src, /* Index into the source area */
2396 targ, /* Index into the target area */
2397 srcBitsLeft, /* Number of source bits left to move */
2398 nsrc, ntarg, /* Number of source and target bytes */
2399 unusedLS, /* Number of bits in next significant
2400 byte of source that are unused */
2401 accumSize; /* Number of meaningful bits in accum */
2402 unsigned char *bytes; /* First byte containing data to unpack */
d2e4a39e 2403 unsigned char *unpacked;
4c4b4cd2 2404 unsigned long accum; /* Staging area for bits being transferred */
14f9c5c9
AS
2405 unsigned char sign;
2406 int len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
4c4b4cd2
PH
2407 /* Transmit bytes from least to most significant; delta is the direction
2408 the indices move. */
50810684 2409 int delta = gdbarch_bits_big_endian (get_type_arch (type)) ? -1 : 1;
14f9c5c9 2410
61ee279c 2411 type = ada_check_typedef (type);
14f9c5c9
AS
2412
2413 if (obj == NULL)
2414 {
2415 v = allocate_value (type);
d2e4a39e 2416 bytes = (unsigned char *) (valaddr + offset);
14f9c5c9 2417 }
9214ee5f 2418 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
14f9c5c9 2419 {
ca34b84f 2420 v = value_at (type, value_address (obj) + offset);
9f1f738a 2421 type = value_type (v);
fc958966
JB
2422 if (TYPE_LENGTH (type) * HOST_CHAR_BIT < bit_size)
2423 {
2424 /* This can happen in the case of an array of dynamic objects,
2425 where the size of each element changes from element to element.
2426 In that case, we're initially given the array stride, but
2427 after resolving the element type, we find that its size is
2428 less than this stride. In that case, adjust bit_size to
2429 match TYPE's length, and recompute LEN accordingly. */
2430 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2431 len = TYPE_LENGTH (type) + (bit_offset + HOST_CHAR_BIT - 1) / 8;
2432 }
d2e4a39e 2433 bytes = (unsigned char *) alloca (len);
ca34b84f 2434 read_memory (value_address (v), bytes, len);
14f9c5c9 2435 }
d2e4a39e 2436 else
14f9c5c9
AS
2437 {
2438 v = allocate_value (type);
0fd88904 2439 bytes = (unsigned char *) value_contents (obj) + offset;
14f9c5c9 2440 }
d2e4a39e
AS
2441
2442 if (obj != NULL)
14f9c5c9 2443 {
53ba8333 2444 long new_offset = offset;
5b4ee69b 2445
74bcbdf3 2446 set_value_component_location (v, obj);
9bbda503
AC
2447 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2448 set_value_bitsize (v, bit_size);
df407dfe 2449 if (value_bitpos (v) >= HOST_CHAR_BIT)
4c4b4cd2 2450 {
53ba8333 2451 ++new_offset;
9bbda503 2452 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
4c4b4cd2 2453 }
53ba8333
JB
2454 set_value_offset (v, new_offset);
2455
2456 /* Also set the parent value. This is needed when trying to
2457 assign a new value (in inferior memory). */
2458 set_value_parent (v, obj);
14f9c5c9
AS
2459 }
2460 else
9bbda503 2461 set_value_bitsize (v, bit_size);
0fd88904 2462 unpacked = (unsigned char *) value_contents (v);
14f9c5c9
AS
2463
2464 srcBitsLeft = bit_size;
2465 nsrc = len;
2466 ntarg = TYPE_LENGTH (type);
2467 sign = 0;
2468 if (bit_size == 0)
2469 {
2470 memset (unpacked, 0, TYPE_LENGTH (type));
2471 return v;
2472 }
50810684 2473 else if (gdbarch_bits_big_endian (get_type_arch (type)))
14f9c5c9 2474 {
d2e4a39e 2475 src = len - 1;
1265e4aa
JB
2476 if (has_negatives (type)
2477 && ((bytes[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2478 sign = ~0;
d2e4a39e
AS
2479
2480 unusedLS =
4c4b4cd2
PH
2481 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2482 % HOST_CHAR_BIT;
14f9c5c9
AS
2483
2484 switch (TYPE_CODE (type))
4c4b4cd2
PH
2485 {
2486 case TYPE_CODE_ARRAY:
2487 case TYPE_CODE_UNION:
2488 case TYPE_CODE_STRUCT:
2489 /* Non-scalar values must be aligned at a byte boundary... */
2490 accumSize =
2491 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2492 /* ... And are placed at the beginning (most-significant) bytes
2493 of the target. */
529cad9c 2494 targ = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
0056e4d5 2495 ntarg = targ + 1;
4c4b4cd2
PH
2496 break;
2497 default:
2498 accumSize = 0;
2499 targ = TYPE_LENGTH (type) - 1;
2500 break;
2501 }
14f9c5c9 2502 }
d2e4a39e 2503 else
14f9c5c9
AS
2504 {
2505 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2506
2507 src = targ = 0;
2508 unusedLS = bit_offset;
2509 accumSize = 0;
2510
d2e4a39e 2511 if (has_negatives (type) && (bytes[len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2512 sign = ~0;
14f9c5c9 2513 }
d2e4a39e 2514
14f9c5c9
AS
2515 accum = 0;
2516 while (nsrc > 0)
2517 {
2518 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2519 part of the value. */
d2e4a39e 2520 unsigned int unusedMSMask =
4c4b4cd2
PH
2521 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2522 1;
2523 /* Sign-extend bits for this byte. */
14f9c5c9 2524 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2525
d2e4a39e 2526 accum |=
4c4b4cd2 2527 (((bytes[src] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2528 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2529 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2
PH
2530 {
2531 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2532 accumSize -= HOST_CHAR_BIT;
2533 accum >>= HOST_CHAR_BIT;
2534 ntarg -= 1;
2535 targ += delta;
2536 }
14f9c5c9
AS
2537 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2538 unusedLS = 0;
2539 nsrc -= 1;
2540 src += delta;
2541 }
2542 while (ntarg > 0)
2543 {
2544 accum |= sign << accumSize;
2545 unpacked[targ] = accum & ~(~0L << HOST_CHAR_BIT);
2546 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2547 if (accumSize < 0)
2548 accumSize = 0;
14f9c5c9
AS
2549 accum >>= HOST_CHAR_BIT;
2550 ntarg -= 1;
2551 targ += delta;
2552 }
2553
2478d075
JB
2554 if (is_dynamic_type (value_type (v)))
2555 v = value_from_contents_and_address (value_type (v), value_contents (v),
2556 0);
14f9c5c9
AS
2557 return v;
2558}
d2e4a39e 2559
14f9c5c9
AS
2560/* Move N bits from SOURCE, starting at bit offset SRC_OFFSET to
2561 TARGET, starting at bit offset TARG_OFFSET. SOURCE and TARGET must
4c4b4cd2 2562 not overlap. */
14f9c5c9 2563static void
fc1a4b47 2564move_bits (gdb_byte *target, int targ_offset, const gdb_byte *source,
50810684 2565 int src_offset, int n, int bits_big_endian_p)
14f9c5c9
AS
2566{
2567 unsigned int accum, mask;
2568 int accum_bits, chunk_size;
2569
2570 target += targ_offset / HOST_CHAR_BIT;
2571 targ_offset %= HOST_CHAR_BIT;
2572 source += src_offset / HOST_CHAR_BIT;
2573 src_offset %= HOST_CHAR_BIT;
50810684 2574 if (bits_big_endian_p)
14f9c5c9
AS
2575 {
2576 accum = (unsigned char) *source;
2577 source += 1;
2578 accum_bits = HOST_CHAR_BIT - src_offset;
2579
d2e4a39e 2580 while (n > 0)
4c4b4cd2
PH
2581 {
2582 int unused_right;
5b4ee69b 2583
4c4b4cd2
PH
2584 accum = (accum << HOST_CHAR_BIT) + (unsigned char) *source;
2585 accum_bits += HOST_CHAR_BIT;
2586 source += 1;
2587 chunk_size = HOST_CHAR_BIT - targ_offset;
2588 if (chunk_size > n)
2589 chunk_size = n;
2590 unused_right = HOST_CHAR_BIT - (chunk_size + targ_offset);
2591 mask = ((1 << chunk_size) - 1) << unused_right;
2592 *target =
2593 (*target & ~mask)
2594 | ((accum >> (accum_bits - chunk_size - unused_right)) & mask);
2595 n -= chunk_size;
2596 accum_bits -= chunk_size;
2597 target += 1;
2598 targ_offset = 0;
2599 }
14f9c5c9
AS
2600 }
2601 else
2602 {
2603 accum = (unsigned char) *source >> src_offset;
2604 source += 1;
2605 accum_bits = HOST_CHAR_BIT - src_offset;
2606
d2e4a39e 2607 while (n > 0)
4c4b4cd2
PH
2608 {
2609 accum = accum + ((unsigned char) *source << accum_bits);
2610 accum_bits += HOST_CHAR_BIT;
2611 source += 1;
2612 chunk_size = HOST_CHAR_BIT - targ_offset;
2613 if (chunk_size > n)
2614 chunk_size = n;
2615 mask = ((1 << chunk_size) - 1) << targ_offset;
2616 *target = (*target & ~mask) | ((accum << targ_offset) & mask);
2617 n -= chunk_size;
2618 accum_bits -= chunk_size;
2619 accum >>= chunk_size;
2620 target += 1;
2621 targ_offset = 0;
2622 }
14f9c5c9
AS
2623 }
2624}
2625
14f9c5c9
AS
2626/* Store the contents of FROMVAL into the location of TOVAL.
2627 Return a new value with the location of TOVAL and contents of
2628 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2629 floating-point or non-scalar types. */
14f9c5c9 2630
d2e4a39e
AS
2631static struct value *
2632ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2633{
df407dfe
AC
2634 struct type *type = value_type (toval);
2635 int bits = value_bitsize (toval);
14f9c5c9 2636
52ce6436
PH
2637 toval = ada_coerce_ref (toval);
2638 fromval = ada_coerce_ref (fromval);
2639
2640 if (ada_is_direct_array_type (value_type (toval)))
2641 toval = ada_coerce_to_simple_array (toval);
2642 if (ada_is_direct_array_type (value_type (fromval)))
2643 fromval = ada_coerce_to_simple_array (fromval);
2644
88e3b34b 2645 if (!deprecated_value_modifiable (toval))
323e0a4a 2646 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2647
d2e4a39e 2648 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2649 && bits > 0
d2e4a39e 2650 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2651 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2652 {
df407dfe
AC
2653 int len = (value_bitpos (toval)
2654 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2655 int from_size;
948f8e3d 2656 gdb_byte *buffer = alloca (len);
d2e4a39e 2657 struct value *val;
42ae5230 2658 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2659
2660 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2661 fromval = value_cast (type, fromval);
14f9c5c9 2662
52ce6436 2663 read_memory (to_addr, buffer, len);
aced2898
PH
2664 from_size = value_bitsize (fromval);
2665 if (from_size == 0)
2666 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
50810684 2667 if (gdbarch_bits_big_endian (get_type_arch (type)))
df407dfe 2668 move_bits (buffer, value_bitpos (toval),
50810684 2669 value_contents (fromval), from_size - bits, bits, 1);
14f9c5c9 2670 else
50810684
UW
2671 move_bits (buffer, value_bitpos (toval),
2672 value_contents (fromval), 0, bits, 0);
972daa01 2673 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2674
14f9c5c9 2675 val = value_copy (toval);
0fd88904 2676 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2677 TYPE_LENGTH (type));
04624583 2678 deprecated_set_value_type (val, type);
d2e4a39e 2679
14f9c5c9
AS
2680 return val;
2681 }
2682
2683 return value_assign (toval, fromval);
2684}
2685
2686
7c512744
JB
2687/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2688 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2689 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2690 COMPONENT, and not the inferior's memory. The current contents
2691 of COMPONENT are ignored.
2692
2693 Although not part of the initial design, this function also works
2694 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2695 had a null address, and COMPONENT had an address which is equal to
2696 its offset inside CONTAINER. */
2697
52ce6436
PH
2698static void
2699value_assign_to_component (struct value *container, struct value *component,
2700 struct value *val)
2701{
2702 LONGEST offset_in_container =
42ae5230 2703 (LONGEST) (value_address (component) - value_address (container));
7c512744 2704 int bit_offset_in_container =
52ce6436
PH
2705 value_bitpos (component) - value_bitpos (container);
2706 int bits;
7c512744 2707
52ce6436
PH
2708 val = value_cast (value_type (component), val);
2709
2710 if (value_bitsize (component) == 0)
2711 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2712 else
2713 bits = value_bitsize (component);
2714
50810684 2715 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
7c512744 2716 move_bits (value_contents_writeable (container) + offset_in_container,
52ce6436
PH
2717 value_bitpos (container) + bit_offset_in_container,
2718 value_contents (val),
2719 TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits,
50810684 2720 bits, 1);
52ce6436 2721 else
7c512744 2722 move_bits (value_contents_writeable (container) + offset_in_container,
52ce6436 2723 value_bitpos (container) + bit_offset_in_container,
50810684 2724 value_contents (val), 0, bits, 0);
7c512744
JB
2725}
2726
4c4b4cd2
PH
2727/* The value of the element of array ARR at the ARITY indices given in IND.
2728 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2729 thereto. */
2730
d2e4a39e
AS
2731struct value *
2732ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2733{
2734 int k;
d2e4a39e
AS
2735 struct value *elt;
2736 struct type *elt_type;
14f9c5c9
AS
2737
2738 elt = ada_coerce_to_simple_array (arr);
2739
df407dfe 2740 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2741 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2742 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2743 return value_subscript_packed (elt, arity, ind);
2744
2745 for (k = 0; k < arity; k += 1)
2746 {
2747 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2748 error (_("too many subscripts (%d expected)"), k);
2497b498 2749 elt = value_subscript (elt, pos_atr (ind[k]));
14f9c5c9
AS
2750 }
2751 return elt;
2752}
2753
deede10c
JB
2754/* Assuming ARR is a pointer to a GDB array, the value of the element
2755 of *ARR at the ARITY indices given in IND.
2756 Does not read the entire array into memory. */
14f9c5c9 2757
2c0b251b 2758static struct value *
deede10c 2759ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2760{
2761 int k;
deede10c
JB
2762 struct type *type
2763 = check_typedef (value_enclosing_type (ada_value_ind (arr)));
14f9c5c9
AS
2764
2765 for (k = 0; k < arity; k += 1)
2766 {
2767 LONGEST lwb, upb;
14f9c5c9
AS
2768
2769 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2770 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2771 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2772 value_copy (arr));
14f9c5c9 2773 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
2497b498 2774 arr = value_ptradd (arr, pos_atr (ind[k]) - lwb);
14f9c5c9
AS
2775 type = TYPE_TARGET_TYPE (type);
2776 }
2777
2778 return value_ind (arr);
2779}
2780
0b5d8877 2781/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
f5938064
JG
2782 actual type of ARRAY_PTR is ignored), returns the Ada slice of HIGH-LOW+1
2783 elements starting at index LOW. The lower bound of this array is LOW, as
0963b4bd 2784 per Ada rules. */
0b5d8877 2785static struct value *
f5938064
JG
2786ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2787 int low, int high)
0b5d8877 2788{
b0dd7688 2789 struct type *type0 = ada_check_typedef (type);
6c038f32 2790 CORE_ADDR base = value_as_address (array_ptr)
b0dd7688
JB
2791 + ((low - ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0)))
2792 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
0c9c3474
SA
2793 struct type *index_type
2794 = create_static_range_type (NULL,
2795 TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0)),
2796 low, high);
6c038f32 2797 struct type *slice_type =
b0dd7688 2798 create_array_type (NULL, TYPE_TARGET_TYPE (type0), index_type);
5b4ee69b 2799
f5938064 2800 return value_at_lazy (slice_type, base);
0b5d8877
PH
2801}
2802
2803
2804static struct value *
2805ada_value_slice (struct value *array, int low, int high)
2806{
b0dd7688 2807 struct type *type = ada_check_typedef (value_type (array));
0c9c3474
SA
2808 struct type *index_type
2809 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
6c038f32 2810 struct type *slice_type =
0b5d8877 2811 create_array_type (NULL, TYPE_TARGET_TYPE (type), index_type);
5b4ee69b 2812
6c038f32 2813 return value_cast (slice_type, value_slice (array, low, high - low + 1));
0b5d8877
PH
2814}
2815
14f9c5c9
AS
2816/* If type is a record type in the form of a standard GNAT array
2817 descriptor, returns the number of dimensions for type. If arr is a
2818 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2819 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2820
2821int
d2e4a39e 2822ada_array_arity (struct type *type)
14f9c5c9
AS
2823{
2824 int arity;
2825
2826 if (type == NULL)
2827 return 0;
2828
2829 type = desc_base_type (type);
2830
2831 arity = 0;
d2e4a39e 2832 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2833 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2834 else
2835 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2836 {
4c4b4cd2 2837 arity += 1;
61ee279c 2838 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2839 }
d2e4a39e 2840
14f9c5c9
AS
2841 return arity;
2842}
2843
2844/* If TYPE is a record type in the form of a standard GNAT array
2845 descriptor or a simple array type, returns the element type for
2846 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2847 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2848
d2e4a39e
AS
2849struct type *
2850ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2851{
2852 type = desc_base_type (type);
2853
d2e4a39e 2854 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2855 {
2856 int k;
d2e4a39e 2857 struct type *p_array_type;
14f9c5c9 2858
556bdfd4 2859 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2860
2861 k = ada_array_arity (type);
2862 if (k == 0)
4c4b4cd2 2863 return NULL;
d2e4a39e 2864
4c4b4cd2 2865 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2866 if (nindices >= 0 && k > nindices)
4c4b4cd2 2867 k = nindices;
d2e4a39e 2868 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2869 {
61ee279c 2870 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2871 k -= 1;
2872 }
14f9c5c9
AS
2873 return p_array_type;
2874 }
2875 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2876 {
2877 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2878 {
2879 type = TYPE_TARGET_TYPE (type);
2880 nindices -= 1;
2881 }
14f9c5c9
AS
2882 return type;
2883 }
2884
2885 return NULL;
2886}
2887
4c4b4cd2 2888/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2889 Does not examine memory. Throws an error if N is invalid or TYPE
2890 is not an array type. NAME is the name of the Ada attribute being
2891 evaluated ('range, 'first, 'last, or 'length); it is used in building
2892 the error message. */
14f9c5c9 2893
1eea4ebd
UW
2894static struct type *
2895ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2896{
4c4b4cd2
PH
2897 struct type *result_type;
2898
14f9c5c9
AS
2899 type = desc_base_type (type);
2900
1eea4ebd
UW
2901 if (n < 0 || n > ada_array_arity (type))
2902 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2903
4c4b4cd2 2904 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2905 {
2906 int i;
2907
2908 for (i = 1; i < n; i += 1)
4c4b4cd2 2909 type = TYPE_TARGET_TYPE (type);
262452ec 2910 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2911 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2912 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2913 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2914 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2915 result_type = NULL;
14f9c5c9 2916 }
d2e4a39e 2917 else
1eea4ebd
UW
2918 {
2919 result_type = desc_index_type (desc_bounds_type (type), n);
2920 if (result_type == NULL)
2921 error (_("attempt to take bound of something that is not an array"));
2922 }
2923
2924 return result_type;
14f9c5c9
AS
2925}
2926
2927/* Given that arr is an array type, returns the lower bound of the
2928 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 2929 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
2930 array-descriptor type. It works for other arrays with bounds supplied
2931 by run-time quantities other than discriminants. */
14f9c5c9 2932
abb68b3e 2933static LONGEST
fb5e3d5c 2934ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 2935{
8a48ac95 2936 struct type *type, *index_type_desc, *index_type;
1ce677a4 2937 int i;
262452ec
JK
2938
2939 gdb_assert (which == 0 || which == 1);
14f9c5c9 2940
ad82864c
JB
2941 if (ada_is_constrained_packed_array_type (arr_type))
2942 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 2943
4c4b4cd2 2944 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 2945 return (LONGEST) - which;
14f9c5c9
AS
2946
2947 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
2948 type = TYPE_TARGET_TYPE (arr_type);
2949 else
2950 type = arr_type;
2951
bafffb51
JB
2952 if (TYPE_FIXED_INSTANCE (type))
2953 {
2954 /* The array has already been fixed, so we do not need to
2955 check the parallel ___XA type again. That encoding has
2956 already been applied, so ignore it now. */
2957 index_type_desc = NULL;
2958 }
2959 else
2960 {
2961 index_type_desc = ada_find_parallel_type (type, "___XA");
2962 ada_fixup_array_indexes_type (index_type_desc);
2963 }
2964
262452ec 2965 if (index_type_desc != NULL)
28c85d6c
JB
2966 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
2967 NULL);
262452ec 2968 else
8a48ac95
JB
2969 {
2970 struct type *elt_type = check_typedef (type);
2971
2972 for (i = 1; i < n; i++)
2973 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
2974
2975 index_type = TYPE_INDEX_TYPE (elt_type);
2976 }
262452ec 2977
43bbcdc2
PH
2978 return
2979 (LONGEST) (which == 0
2980 ? ada_discrete_type_low_bound (index_type)
2981 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
2982}
2983
2984/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
2985 nth index (numbering from 1) if WHICH is 0, and the upper bound if
2986 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 2987 supplied by run-time quantities other than discriminants. */
14f9c5c9 2988
1eea4ebd 2989static LONGEST
4dc81987 2990ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 2991{
eb479039
JB
2992 struct type *arr_type;
2993
2994 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
2995 arr = value_ind (arr);
2996 arr_type = value_enclosing_type (arr);
14f9c5c9 2997
ad82864c
JB
2998 if (ada_is_constrained_packed_array_type (arr_type))
2999 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3000 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3001 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3002 else
1eea4ebd 3003 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3004}
3005
3006/* Given that arr is an array value, returns the length of the
3007 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3008 supplied by run-time quantities other than discriminants.
3009 Does not work for arrays indexed by enumeration types with representation
3010 clauses at the moment. */
14f9c5c9 3011
1eea4ebd 3012static LONGEST
d2e4a39e 3013ada_array_length (struct value *arr, int n)
14f9c5c9 3014{
eb479039
JB
3015 struct type *arr_type;
3016
3017 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3018 arr = value_ind (arr);
3019 arr_type = value_enclosing_type (arr);
14f9c5c9 3020
ad82864c
JB
3021 if (ada_is_constrained_packed_array_type (arr_type))
3022 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3023
4c4b4cd2 3024 if (ada_is_simple_array_type (arr_type))
1eea4ebd
UW
3025 return (ada_array_bound_from_type (arr_type, n, 1)
3026 - ada_array_bound_from_type (arr_type, n, 0) + 1);
14f9c5c9 3027 else
1eea4ebd
UW
3028 return (value_as_long (desc_one_bound (desc_bounds (arr), n, 1))
3029 - value_as_long (desc_one_bound (desc_bounds (arr), n, 0)) + 1);
4c4b4cd2
PH
3030}
3031
3032/* An empty array whose type is that of ARR_TYPE (an array type),
3033 with bounds LOW to LOW-1. */
3034
3035static struct value *
3036empty_array (struct type *arr_type, int low)
3037{
b0dd7688 3038 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3039 struct type *index_type
3040 = create_static_range_type
3041 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low, low - 1);
b0dd7688 3042 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3043
0b5d8877 3044 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3045}
14f9c5c9 3046\f
d2e4a39e 3047
4c4b4cd2 3048 /* Name resolution */
14f9c5c9 3049
4c4b4cd2
PH
3050/* The "decoded" name for the user-definable Ada operator corresponding
3051 to OP. */
14f9c5c9 3052
d2e4a39e 3053static const char *
4c4b4cd2 3054ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3055{
3056 int i;
3057
4c4b4cd2 3058 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3059 {
3060 if (ada_opname_table[i].op == op)
4c4b4cd2 3061 return ada_opname_table[i].decoded;
14f9c5c9 3062 }
323e0a4a 3063 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3064}
3065
3066
4c4b4cd2
PH
3067/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3068 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3069 undefined namespace) and converts operators that are
3070 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3071 non-null, it provides a preferred result type [at the moment, only
3072 type void has any effect---causing procedures to be preferred over
3073 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3074 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3075
4c4b4cd2
PH
3076static void
3077resolve (struct expression **expp, int void_context_p)
14f9c5c9 3078{
30b15541
UW
3079 struct type *context_type = NULL;
3080 int pc = 0;
3081
3082 if (void_context_p)
3083 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3084
3085 resolve_subexp (expp, &pc, 1, context_type);
14f9c5c9
AS
3086}
3087
4c4b4cd2
PH
3088/* Resolve the operator of the subexpression beginning at
3089 position *POS of *EXPP. "Resolving" consists of replacing
3090 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3091 with their resolutions, replacing built-in operators with
3092 function calls to user-defined operators, where appropriate, and,
3093 when DEPROCEDURE_P is non-zero, converting function-valued variables
3094 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3095 are as in ada_resolve, above. */
14f9c5c9 3096
d2e4a39e 3097static struct value *
4c4b4cd2 3098resolve_subexp (struct expression **expp, int *pos, int deprocedure_p,
76a01679 3099 struct type *context_type)
14f9c5c9
AS
3100{
3101 int pc = *pos;
3102 int i;
4c4b4cd2 3103 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3104 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3105 struct value **argvec; /* Vector of operand types (alloca'ed). */
3106 int nargs; /* Number of operands. */
52ce6436 3107 int oplen;
14f9c5c9
AS
3108
3109 argvec = NULL;
3110 nargs = 0;
3111 exp = *expp;
3112
52ce6436
PH
3113 /* Pass one: resolve operands, saving their types and updating *pos,
3114 if needed. */
14f9c5c9
AS
3115 switch (op)
3116 {
4c4b4cd2
PH
3117 case OP_FUNCALL:
3118 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3119 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3120 *pos += 7;
4c4b4cd2
PH
3121 else
3122 {
3123 *pos += 3;
3124 resolve_subexp (expp, pos, 0, NULL);
3125 }
3126 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3127 break;
3128
14f9c5c9 3129 case UNOP_ADDR:
4c4b4cd2
PH
3130 *pos += 1;
3131 resolve_subexp (expp, pos, 0, NULL);
3132 break;
3133
52ce6436
PH
3134 case UNOP_QUAL:
3135 *pos += 3;
17466c1a 3136 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type));
4c4b4cd2
PH
3137 break;
3138
52ce6436 3139 case OP_ATR_MODULUS:
4c4b4cd2
PH
3140 case OP_ATR_SIZE:
3141 case OP_ATR_TAG:
4c4b4cd2
PH
3142 case OP_ATR_FIRST:
3143 case OP_ATR_LAST:
3144 case OP_ATR_LENGTH:
3145 case OP_ATR_POS:
3146 case OP_ATR_VAL:
4c4b4cd2
PH
3147 case OP_ATR_MIN:
3148 case OP_ATR_MAX:
52ce6436
PH
3149 case TERNOP_IN_RANGE:
3150 case BINOP_IN_BOUNDS:
3151 case UNOP_IN_RANGE:
3152 case OP_AGGREGATE:
3153 case OP_OTHERS:
3154 case OP_CHOICES:
3155 case OP_POSITIONAL:
3156 case OP_DISCRETE_RANGE:
3157 case OP_NAME:
3158 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3159 *pos += oplen;
14f9c5c9
AS
3160 break;
3161
3162 case BINOP_ASSIGN:
3163 {
4c4b4cd2
PH
3164 struct value *arg1;
3165
3166 *pos += 1;
3167 arg1 = resolve_subexp (expp, pos, 0, NULL);
3168 if (arg1 == NULL)
3169 resolve_subexp (expp, pos, 1, NULL);
3170 else
df407dfe 3171 resolve_subexp (expp, pos, 1, value_type (arg1));
4c4b4cd2 3172 break;
14f9c5c9
AS
3173 }
3174
4c4b4cd2 3175 case UNOP_CAST:
4c4b4cd2
PH
3176 *pos += 3;
3177 nargs = 1;
3178 break;
14f9c5c9 3179
4c4b4cd2
PH
3180 case BINOP_ADD:
3181 case BINOP_SUB:
3182 case BINOP_MUL:
3183 case BINOP_DIV:
3184 case BINOP_REM:
3185 case BINOP_MOD:
3186 case BINOP_EXP:
3187 case BINOP_CONCAT:
3188 case BINOP_LOGICAL_AND:
3189 case BINOP_LOGICAL_OR:
3190 case BINOP_BITWISE_AND:
3191 case BINOP_BITWISE_IOR:
3192 case BINOP_BITWISE_XOR:
14f9c5c9 3193
4c4b4cd2
PH
3194 case BINOP_EQUAL:
3195 case BINOP_NOTEQUAL:
3196 case BINOP_LESS:
3197 case BINOP_GTR:
3198 case BINOP_LEQ:
3199 case BINOP_GEQ:
14f9c5c9 3200
4c4b4cd2
PH
3201 case BINOP_REPEAT:
3202 case BINOP_SUBSCRIPT:
3203 case BINOP_COMMA:
40c8aaa9
JB
3204 *pos += 1;
3205 nargs = 2;
3206 break;
14f9c5c9 3207
4c4b4cd2
PH
3208 case UNOP_NEG:
3209 case UNOP_PLUS:
3210 case UNOP_LOGICAL_NOT:
3211 case UNOP_ABS:
3212 case UNOP_IND:
3213 *pos += 1;
3214 nargs = 1;
3215 break;
14f9c5c9 3216
4c4b4cd2
PH
3217 case OP_LONG:
3218 case OP_DOUBLE:
3219 case OP_VAR_VALUE:
3220 *pos += 4;
3221 break;
14f9c5c9 3222
4c4b4cd2
PH
3223 case OP_TYPE:
3224 case OP_BOOL:
3225 case OP_LAST:
4c4b4cd2
PH
3226 case OP_INTERNALVAR:
3227 *pos += 3;
3228 break;
14f9c5c9 3229
4c4b4cd2
PH
3230 case UNOP_MEMVAL:
3231 *pos += 3;
3232 nargs = 1;
3233 break;
3234
67f3407f
DJ
3235 case OP_REGISTER:
3236 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3237 break;
3238
4c4b4cd2
PH
3239 case STRUCTOP_STRUCT:
3240 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3241 nargs = 1;
3242 break;
3243
4c4b4cd2 3244 case TERNOP_SLICE:
4c4b4cd2
PH
3245 *pos += 1;
3246 nargs = 3;
3247 break;
3248
52ce6436 3249 case OP_STRING:
14f9c5c9 3250 break;
4c4b4cd2
PH
3251
3252 default:
323e0a4a 3253 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3254 }
3255
76a01679 3256 argvec = (struct value * *) alloca (sizeof (struct value *) * (nargs + 1));
4c4b4cd2
PH
3257 for (i = 0; i < nargs; i += 1)
3258 argvec[i] = resolve_subexp (expp, pos, 1, NULL);
3259 argvec[i] = NULL;
3260 exp = *expp;
3261
3262 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3263 switch (op)
3264 {
3265 default:
3266 break;
3267
14f9c5c9 3268 case OP_VAR_VALUE:
4c4b4cd2 3269 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
3270 {
3271 struct ada_symbol_info *candidates;
3272 int n_candidates;
3273
3274 n_candidates =
3275 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3276 (exp->elts[pc + 2].symbol),
3277 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3278 &candidates);
76a01679
JB
3279
3280 if (n_candidates > 1)
3281 {
3282 /* Types tend to get re-introduced locally, so if there
3283 are any local symbols that are not types, first filter
3284 out all types. */
3285 int j;
3286 for (j = 0; j < n_candidates; j += 1)
3287 switch (SYMBOL_CLASS (candidates[j].sym))
3288 {
3289 case LOC_REGISTER:
3290 case LOC_ARG:
3291 case LOC_REF_ARG:
76a01679
JB
3292 case LOC_REGPARM_ADDR:
3293 case LOC_LOCAL:
76a01679 3294 case LOC_COMPUTED:
76a01679
JB
3295 goto FoundNonType;
3296 default:
3297 break;
3298 }
3299 FoundNonType:
3300 if (j < n_candidates)
3301 {
3302 j = 0;
3303 while (j < n_candidates)
3304 {
3305 if (SYMBOL_CLASS (candidates[j].sym) == LOC_TYPEDEF)
3306 {
3307 candidates[j] = candidates[n_candidates - 1];
3308 n_candidates -= 1;
3309 }
3310 else
3311 j += 1;
3312 }
3313 }
3314 }
3315
3316 if (n_candidates == 0)
323e0a4a 3317 error (_("No definition found for %s"),
76a01679
JB
3318 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3319 else if (n_candidates == 1)
3320 i = 0;
3321 else if (deprocedure_p
3322 && !is_nonfunction (candidates, n_candidates))
3323 {
06d5cf63
JB
3324 i = ada_resolve_function
3325 (candidates, n_candidates, NULL, 0,
3326 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
3327 context_type);
76a01679 3328 if (i < 0)
323e0a4a 3329 error (_("Could not find a match for %s"),
76a01679
JB
3330 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3331 }
3332 else
3333 {
323e0a4a 3334 printf_filtered (_("Multiple matches for %s\n"),
76a01679
JB
3335 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3336 user_select_syms (candidates, n_candidates, 1);
3337 i = 0;
3338 }
3339
3340 exp->elts[pc + 1].block = candidates[i].block;
3341 exp->elts[pc + 2].symbol = candidates[i].sym;
1265e4aa
JB
3342 if (innermost_block == NULL
3343 || contained_in (candidates[i].block, innermost_block))
76a01679
JB
3344 innermost_block = candidates[i].block;
3345 }
3346
3347 if (deprocedure_p
3348 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3349 == TYPE_CODE_FUNC))
3350 {
3351 replace_operator_with_call (expp, pc, 0, 0,
3352 exp->elts[pc + 2].symbol,
3353 exp->elts[pc + 1].block);
3354 exp = *expp;
3355 }
14f9c5c9
AS
3356 break;
3357
3358 case OP_FUNCALL:
3359 {
4c4b4cd2 3360 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3361 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2
PH
3362 {
3363 struct ada_symbol_info *candidates;
3364 int n_candidates;
3365
3366 n_candidates =
76a01679
JB
3367 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3368 (exp->elts[pc + 5].symbol),
3369 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3370 &candidates);
4c4b4cd2
PH
3371 if (n_candidates == 1)
3372 i = 0;
3373 else
3374 {
06d5cf63
JB
3375 i = ada_resolve_function
3376 (candidates, n_candidates,
3377 argvec, nargs,
3378 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
3379 context_type);
4c4b4cd2 3380 if (i < 0)
323e0a4a 3381 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3382 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3383 }
3384
3385 exp->elts[pc + 4].block = candidates[i].block;
3386 exp->elts[pc + 5].symbol = candidates[i].sym;
1265e4aa
JB
3387 if (innermost_block == NULL
3388 || contained_in (candidates[i].block, innermost_block))
4c4b4cd2
PH
3389 innermost_block = candidates[i].block;
3390 }
14f9c5c9
AS
3391 }
3392 break;
3393 case BINOP_ADD:
3394 case BINOP_SUB:
3395 case BINOP_MUL:
3396 case BINOP_DIV:
3397 case BINOP_REM:
3398 case BINOP_MOD:
3399 case BINOP_CONCAT:
3400 case BINOP_BITWISE_AND:
3401 case BINOP_BITWISE_IOR:
3402 case BINOP_BITWISE_XOR:
3403 case BINOP_EQUAL:
3404 case BINOP_NOTEQUAL:
3405 case BINOP_LESS:
3406 case BINOP_GTR:
3407 case BINOP_LEQ:
3408 case BINOP_GEQ:
3409 case BINOP_EXP:
3410 case UNOP_NEG:
3411 case UNOP_PLUS:
3412 case UNOP_LOGICAL_NOT:
3413 case UNOP_ABS:
3414 if (possible_user_operator_p (op, argvec))
4c4b4cd2
PH
3415 {
3416 struct ada_symbol_info *candidates;
3417 int n_candidates;
3418
3419 n_candidates =
3420 ada_lookup_symbol_list (ada_encode (ada_decoded_op_name (op)),
3421 (struct block *) NULL, VAR_DOMAIN,
4eeaa230 3422 &candidates);
4c4b4cd2 3423 i = ada_resolve_function (candidates, n_candidates, argvec, nargs,
76a01679 3424 ada_decoded_op_name (op), NULL);
4c4b4cd2
PH
3425 if (i < 0)
3426 break;
3427
76a01679
JB
3428 replace_operator_with_call (expp, pc, nargs, 1,
3429 candidates[i].sym, candidates[i].block);
4c4b4cd2
PH
3430 exp = *expp;
3431 }
14f9c5c9 3432 break;
4c4b4cd2
PH
3433
3434 case OP_TYPE:
b3dbf008 3435 case OP_REGISTER:
4c4b4cd2 3436 return NULL;
14f9c5c9
AS
3437 }
3438
3439 *pos = pc;
3440 return evaluate_subexp_type (exp, pos);
3441}
3442
3443/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3444 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3445 a non-pointer. */
14f9c5c9 3446/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3447 liberal. */
14f9c5c9
AS
3448
3449static int
4dc81987 3450ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3451{
61ee279c
PH
3452 ftype = ada_check_typedef (ftype);
3453 atype = ada_check_typedef (atype);
14f9c5c9
AS
3454
3455 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3456 ftype = TYPE_TARGET_TYPE (ftype);
3457 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3458 atype = TYPE_TARGET_TYPE (atype);
3459
d2e4a39e 3460 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3461 {
3462 default:
5b3d5b7d 3463 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3464 case TYPE_CODE_PTR:
3465 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3466 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3467 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3468 else
1265e4aa
JB
3469 return (may_deref
3470 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3471 case TYPE_CODE_INT:
3472 case TYPE_CODE_ENUM:
3473 case TYPE_CODE_RANGE:
3474 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3475 {
3476 case TYPE_CODE_INT:
3477 case TYPE_CODE_ENUM:
3478 case TYPE_CODE_RANGE:
3479 return 1;
3480 default:
3481 return 0;
3482 }
14f9c5c9
AS
3483
3484 case TYPE_CODE_ARRAY:
d2e4a39e 3485 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3486 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3487
3488 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3489 if (ada_is_array_descriptor_type (ftype))
3490 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3491 || ada_is_array_descriptor_type (atype));
14f9c5c9 3492 else
4c4b4cd2
PH
3493 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3494 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3495
3496 case TYPE_CODE_UNION:
3497 case TYPE_CODE_FLT:
3498 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3499 }
3500}
3501
3502/* Return non-zero if the formals of FUNC "sufficiently match" the
3503 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3504 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3505 argument function. */
14f9c5c9
AS
3506
3507static int
d2e4a39e 3508ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3509{
3510 int i;
d2e4a39e 3511 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3512
1265e4aa
JB
3513 if (SYMBOL_CLASS (func) == LOC_CONST
3514 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3515 return (n_actuals == 0);
3516 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3517 return 0;
3518
3519 if (TYPE_NFIELDS (func_type) != n_actuals)
3520 return 0;
3521
3522 for (i = 0; i < n_actuals; i += 1)
3523 {
4c4b4cd2 3524 if (actuals[i] == NULL)
76a01679
JB
3525 return 0;
3526 else
3527 {
5b4ee69b
MS
3528 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3529 i));
df407dfe 3530 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3531
76a01679
JB
3532 if (!ada_type_match (ftype, atype, 1))
3533 return 0;
3534 }
14f9c5c9
AS
3535 }
3536 return 1;
3537}
3538
3539/* False iff function type FUNC_TYPE definitely does not produce a value
3540 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3541 FUNC_TYPE is not a valid function type with a non-null return type
3542 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3543
3544static int
d2e4a39e 3545return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3546{
d2e4a39e 3547 struct type *return_type;
14f9c5c9
AS
3548
3549 if (func_type == NULL)
3550 return 1;
3551
4c4b4cd2 3552 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3553 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3554 else
18af8284 3555 return_type = get_base_type (func_type);
14f9c5c9
AS
3556 if (return_type == NULL)
3557 return 1;
3558
18af8284 3559 context_type = get_base_type (context_type);
14f9c5c9
AS
3560
3561 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3562 return context_type == NULL || return_type == context_type;
3563 else if (context_type == NULL)
3564 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3565 else
3566 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3567}
3568
3569
4c4b4cd2 3570/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3571 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3572 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3573 that returns that type, then eliminate matches that don't. If
3574 CONTEXT_TYPE is void and there is at least one match that does not
3575 return void, eliminate all matches that do.
3576
14f9c5c9
AS
3577 Asks the user if there is more than one match remaining. Returns -1
3578 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3579 solely for messages. May re-arrange and modify SYMS in
3580 the process; the index returned is for the modified vector. */
14f9c5c9 3581
4c4b4cd2
PH
3582static int
3583ada_resolve_function (struct ada_symbol_info syms[],
3584 int nsyms, struct value **args, int nargs,
3585 const char *name, struct type *context_type)
14f9c5c9 3586{
30b15541 3587 int fallback;
14f9c5c9 3588 int k;
4c4b4cd2 3589 int m; /* Number of hits */
14f9c5c9 3590
d2e4a39e 3591 m = 0;
30b15541
UW
3592 /* In the first pass of the loop, we only accept functions matching
3593 context_type. If none are found, we add a second pass of the loop
3594 where every function is accepted. */
3595 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3596 {
3597 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3598 {
61ee279c 3599 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].sym));
4c4b4cd2
PH
3600
3601 if (ada_args_match (syms[k].sym, args, nargs)
30b15541 3602 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3603 {
3604 syms[m] = syms[k];
3605 m += 1;
3606 }
3607 }
14f9c5c9
AS
3608 }
3609
3610 if (m == 0)
3611 return -1;
3612 else if (m > 1)
3613 {
323e0a4a 3614 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3615 user_select_syms (syms, m, 1);
14f9c5c9
AS
3616 return 0;
3617 }
3618 return 0;
3619}
3620
4c4b4cd2
PH
3621/* Returns true (non-zero) iff decoded name N0 should appear before N1
3622 in a listing of choices during disambiguation (see sort_choices, below).
3623 The idea is that overloadings of a subprogram name from the
3624 same package should sort in their source order. We settle for ordering
3625 such symbols by their trailing number (__N or $N). */
3626
14f9c5c9 3627static int
0d5cff50 3628encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3629{
3630 if (N1 == NULL)
3631 return 0;
3632 else if (N0 == NULL)
3633 return 1;
3634 else
3635 {
3636 int k0, k1;
5b4ee69b 3637
d2e4a39e 3638 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3639 ;
d2e4a39e 3640 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3641 ;
d2e4a39e 3642 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3643 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3644 {
3645 int n0, n1;
5b4ee69b 3646
4c4b4cd2
PH
3647 n0 = k0;
3648 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3649 n0 -= 1;
3650 n1 = k1;
3651 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3652 n1 -= 1;
3653 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3654 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3655 }
14f9c5c9
AS
3656 return (strcmp (N0, N1) < 0);
3657 }
3658}
d2e4a39e 3659
4c4b4cd2
PH
3660/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3661 encoded names. */
3662
d2e4a39e 3663static void
4c4b4cd2 3664sort_choices (struct ada_symbol_info syms[], int nsyms)
14f9c5c9 3665{
4c4b4cd2 3666 int i;
5b4ee69b 3667
d2e4a39e 3668 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3669 {
4c4b4cd2 3670 struct ada_symbol_info sym = syms[i];
14f9c5c9
AS
3671 int j;
3672
d2e4a39e 3673 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2
PH
3674 {
3675 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].sym),
3676 SYMBOL_LINKAGE_NAME (sym.sym)))
3677 break;
3678 syms[j + 1] = syms[j];
3679 }
d2e4a39e 3680 syms[j + 1] = sym;
14f9c5c9
AS
3681 }
3682}
3683
4c4b4cd2
PH
3684/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3685 by asking the user (if necessary), returning the number selected,
3686 and setting the first elements of SYMS items. Error if no symbols
3687 selected. */
14f9c5c9
AS
3688
3689/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3690 to be re-integrated one of these days. */
14f9c5c9
AS
3691
3692int
4c4b4cd2 3693user_select_syms (struct ada_symbol_info *syms, int nsyms, int max_results)
14f9c5c9
AS
3694{
3695 int i;
d2e4a39e 3696 int *chosen = (int *) alloca (sizeof (int) * nsyms);
14f9c5c9
AS
3697 int n_chosen;
3698 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3699 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3700
3701 if (max_results < 1)
323e0a4a 3702 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3703 if (nsyms <= 1)
3704 return nsyms;
3705
717d2f5a
JB
3706 if (select_mode == multiple_symbols_cancel)
3707 error (_("\
3708canceled because the command is ambiguous\n\
3709See set/show multiple-symbol."));
3710
3711 /* If select_mode is "all", then return all possible symbols.
3712 Only do that if more than one symbol can be selected, of course.
3713 Otherwise, display the menu as usual. */
3714 if (select_mode == multiple_symbols_all && max_results > 1)
3715 return nsyms;
3716
323e0a4a 3717 printf_unfiltered (_("[0] cancel\n"));
14f9c5c9 3718 if (max_results > 1)
323e0a4a 3719 printf_unfiltered (_("[1] all\n"));
14f9c5c9 3720
4c4b4cd2 3721 sort_choices (syms, nsyms);
14f9c5c9
AS
3722
3723 for (i = 0; i < nsyms; i += 1)
3724 {
4c4b4cd2
PH
3725 if (syms[i].sym == NULL)
3726 continue;
3727
3728 if (SYMBOL_CLASS (syms[i].sym) == LOC_BLOCK)
3729 {
76a01679
JB
3730 struct symtab_and_line sal =
3731 find_function_start_sal (syms[i].sym, 1);
5b4ee69b 3732
323e0a4a
AC
3733 if (sal.symtab == NULL)
3734 printf_unfiltered (_("[%d] %s at <no source file available>:%d\n"),
3735 i + first_choice,
3736 SYMBOL_PRINT_NAME (syms[i].sym),
3737 sal.line);
3738 else
3739 printf_unfiltered (_("[%d] %s at %s:%d\n"), i + first_choice,
3740 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3741 symtab_to_filename_for_display (sal.symtab),
3742 sal.line);
4c4b4cd2
PH
3743 continue;
3744 }
d2e4a39e 3745 else
4c4b4cd2
PH
3746 {
3747 int is_enumeral =
3748 (SYMBOL_CLASS (syms[i].sym) == LOC_CONST
3749 && SYMBOL_TYPE (syms[i].sym) != NULL
3750 && TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) == TYPE_CODE_ENUM);
1994afbf
DE
3751 struct symtab *symtab = NULL;
3752
3753 if (SYMBOL_OBJFILE_OWNED (syms[i].sym))
3754 symtab = symbol_symtab (syms[i].sym);
4c4b4cd2
PH
3755
3756 if (SYMBOL_LINE (syms[i].sym) != 0 && symtab != NULL)
323e0a4a 3757 printf_unfiltered (_("[%d] %s at %s:%d\n"),
4c4b4cd2
PH
3758 i + first_choice,
3759 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821
JK
3760 symtab_to_filename_for_display (symtab),
3761 SYMBOL_LINE (syms[i].sym));
76a01679
JB
3762 else if (is_enumeral
3763 && TYPE_NAME (SYMBOL_TYPE (syms[i].sym)) != NULL)
4c4b4cd2 3764 {
a3f17187 3765 printf_unfiltered (("[%d] "), i + first_choice);
76a01679 3766 ada_print_type (SYMBOL_TYPE (syms[i].sym), NULL,
79d43c61 3767 gdb_stdout, -1, 0, &type_print_raw_options);
323e0a4a 3768 printf_unfiltered (_("'(%s) (enumeral)\n"),
4c4b4cd2
PH
3769 SYMBOL_PRINT_NAME (syms[i].sym));
3770 }
3771 else if (symtab != NULL)
3772 printf_unfiltered (is_enumeral
323e0a4a
AC
3773 ? _("[%d] %s in %s (enumeral)\n")
3774 : _("[%d] %s at %s:?\n"),
4c4b4cd2
PH
3775 i + first_choice,
3776 SYMBOL_PRINT_NAME (syms[i].sym),
05cba821 3777 symtab_to_filename_for_display (symtab));
4c4b4cd2
PH
3778 else
3779 printf_unfiltered (is_enumeral
323e0a4a
AC
3780 ? _("[%d] %s (enumeral)\n")
3781 : _("[%d] %s at ?\n"),
4c4b4cd2
PH
3782 i + first_choice,
3783 SYMBOL_PRINT_NAME (syms[i].sym));
3784 }
14f9c5c9 3785 }
d2e4a39e 3786
14f9c5c9 3787 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3788 "overload-choice");
14f9c5c9
AS
3789
3790 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3791 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3792
3793 return n_chosen;
3794}
3795
3796/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3797 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3798 order in CHOICES[0 .. N-1], and return N.
3799
3800 The user types choices as a sequence of numbers on one line
3801 separated by blanks, encoding them as follows:
3802
4c4b4cd2 3803 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3804 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3805 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3806
4c4b4cd2 3807 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3808
3809 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3810 prompts (for use with the -f switch). */
14f9c5c9
AS
3811
3812int
d2e4a39e 3813get_selections (int *choices, int n_choices, int max_results,
4c4b4cd2 3814 int is_all_choice, char *annotation_suffix)
14f9c5c9 3815{
d2e4a39e 3816 char *args;
0bcd0149 3817 char *prompt;
14f9c5c9
AS
3818 int n_chosen;
3819 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3820
14f9c5c9
AS
3821 prompt = getenv ("PS2");
3822 if (prompt == NULL)
0bcd0149 3823 prompt = "> ";
14f9c5c9 3824
0bcd0149 3825 args = command_line_input (prompt, 0, annotation_suffix);
d2e4a39e 3826
14f9c5c9 3827 if (args == NULL)
323e0a4a 3828 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3829
3830 n_chosen = 0;
76a01679 3831
4c4b4cd2
PH
3832 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3833 order, as given in args. Choices are validated. */
14f9c5c9
AS
3834 while (1)
3835 {
d2e4a39e 3836 char *args2;
14f9c5c9
AS
3837 int choice, j;
3838
0fcd72ba 3839 args = skip_spaces (args);
14f9c5c9 3840 if (*args == '\0' && n_chosen == 0)
323e0a4a 3841 error_no_arg (_("one or more choice numbers"));
14f9c5c9 3842 else if (*args == '\0')
4c4b4cd2 3843 break;
14f9c5c9
AS
3844
3845 choice = strtol (args, &args2, 10);
d2e4a39e 3846 if (args == args2 || choice < 0
4c4b4cd2 3847 || choice > n_choices + first_choice - 1)
323e0a4a 3848 error (_("Argument must be choice number"));
14f9c5c9
AS
3849 args = args2;
3850
d2e4a39e 3851 if (choice == 0)
323e0a4a 3852 error (_("cancelled"));
14f9c5c9
AS
3853
3854 if (choice < first_choice)
4c4b4cd2
PH
3855 {
3856 n_chosen = n_choices;
3857 for (j = 0; j < n_choices; j += 1)
3858 choices[j] = j;
3859 break;
3860 }
14f9c5c9
AS
3861 choice -= first_choice;
3862
d2e4a39e 3863 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
3864 {
3865 }
14f9c5c9
AS
3866
3867 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
3868 {
3869 int k;
5b4ee69b 3870
4c4b4cd2
PH
3871 for (k = n_chosen - 1; k > j; k -= 1)
3872 choices[k + 1] = choices[k];
3873 choices[j + 1] = choice;
3874 n_chosen += 1;
3875 }
14f9c5c9
AS
3876 }
3877
3878 if (n_chosen > max_results)
323e0a4a 3879 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 3880
14f9c5c9
AS
3881 return n_chosen;
3882}
3883
4c4b4cd2
PH
3884/* Replace the operator of length OPLEN at position PC in *EXPP with a call
3885 on the function identified by SYM and BLOCK, and taking NARGS
3886 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
3887
3888static void
d2e4a39e 3889replace_operator_with_call (struct expression **expp, int pc, int nargs,
4c4b4cd2 3890 int oplen, struct symbol *sym,
270140bd 3891 const struct block *block)
14f9c5c9
AS
3892{
3893 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 3894 symbol, -oplen for operator being replaced). */
d2e4a39e 3895 struct expression *newexp = (struct expression *)
8c1a34e7 3896 xzalloc (sizeof (struct expression)
4c4b4cd2 3897 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
d2e4a39e 3898 struct expression *exp = *expp;
14f9c5c9
AS
3899
3900 newexp->nelts = exp->nelts + 7 - oplen;
3901 newexp->language_defn = exp->language_defn;
3489610d 3902 newexp->gdbarch = exp->gdbarch;
14f9c5c9 3903 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 3904 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 3905 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
3906
3907 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
3908 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
3909
3910 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
3911 newexp->elts[pc + 4].block = block;
3912 newexp->elts[pc + 5].symbol = sym;
3913
3914 *expp = newexp;
aacb1f0a 3915 xfree (exp);
d2e4a39e 3916}
14f9c5c9
AS
3917
3918/* Type-class predicates */
3919
4c4b4cd2
PH
3920/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
3921 or FLOAT). */
14f9c5c9
AS
3922
3923static int
d2e4a39e 3924numeric_type_p (struct type *type)
14f9c5c9
AS
3925{
3926 if (type == NULL)
3927 return 0;
d2e4a39e
AS
3928 else
3929 {
3930 switch (TYPE_CODE (type))
4c4b4cd2
PH
3931 {
3932 case TYPE_CODE_INT:
3933 case TYPE_CODE_FLT:
3934 return 1;
3935 case TYPE_CODE_RANGE:
3936 return (type == TYPE_TARGET_TYPE (type)
3937 || numeric_type_p (TYPE_TARGET_TYPE (type)));
3938 default:
3939 return 0;
3940 }
d2e4a39e 3941 }
14f9c5c9
AS
3942}
3943
4c4b4cd2 3944/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
3945
3946static int
d2e4a39e 3947integer_type_p (struct type *type)
14f9c5c9
AS
3948{
3949 if (type == NULL)
3950 return 0;
d2e4a39e
AS
3951 else
3952 {
3953 switch (TYPE_CODE (type))
4c4b4cd2
PH
3954 {
3955 case TYPE_CODE_INT:
3956 return 1;
3957 case TYPE_CODE_RANGE:
3958 return (type == TYPE_TARGET_TYPE (type)
3959 || integer_type_p (TYPE_TARGET_TYPE (type)));
3960 default:
3961 return 0;
3962 }
d2e4a39e 3963 }
14f9c5c9
AS
3964}
3965
4c4b4cd2 3966/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
3967
3968static int
d2e4a39e 3969scalar_type_p (struct type *type)
14f9c5c9
AS
3970{
3971 if (type == NULL)
3972 return 0;
d2e4a39e
AS
3973 else
3974 {
3975 switch (TYPE_CODE (type))
4c4b4cd2
PH
3976 {
3977 case TYPE_CODE_INT:
3978 case TYPE_CODE_RANGE:
3979 case TYPE_CODE_ENUM:
3980 case TYPE_CODE_FLT:
3981 return 1;
3982 default:
3983 return 0;
3984 }
d2e4a39e 3985 }
14f9c5c9
AS
3986}
3987
4c4b4cd2 3988/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
3989
3990static int
d2e4a39e 3991discrete_type_p (struct type *type)
14f9c5c9
AS
3992{
3993 if (type == NULL)
3994 return 0;
d2e4a39e
AS
3995 else
3996 {
3997 switch (TYPE_CODE (type))
4c4b4cd2
PH
3998 {
3999 case TYPE_CODE_INT:
4000 case TYPE_CODE_RANGE:
4001 case TYPE_CODE_ENUM:
872f0337 4002 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4003 return 1;
4004 default:
4005 return 0;
4006 }
d2e4a39e 4007 }
14f9c5c9
AS
4008}
4009
4c4b4cd2
PH
4010/* Returns non-zero if OP with operands in the vector ARGS could be
4011 a user-defined function. Errs on the side of pre-defined operators
4012 (i.e., result 0). */
14f9c5c9
AS
4013
4014static int
d2e4a39e 4015possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4016{
76a01679 4017 struct type *type0 =
df407dfe 4018 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4019 struct type *type1 =
df407dfe 4020 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4021
4c4b4cd2
PH
4022 if (type0 == NULL)
4023 return 0;
4024
14f9c5c9
AS
4025 switch (op)
4026 {
4027 default:
4028 return 0;
4029
4030 case BINOP_ADD:
4031 case BINOP_SUB:
4032 case BINOP_MUL:
4033 case BINOP_DIV:
d2e4a39e 4034 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4035
4036 case BINOP_REM:
4037 case BINOP_MOD:
4038 case BINOP_BITWISE_AND:
4039 case BINOP_BITWISE_IOR:
4040 case BINOP_BITWISE_XOR:
d2e4a39e 4041 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4042
4043 case BINOP_EQUAL:
4044 case BINOP_NOTEQUAL:
4045 case BINOP_LESS:
4046 case BINOP_GTR:
4047 case BINOP_LEQ:
4048 case BINOP_GEQ:
d2e4a39e 4049 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4050
4051 case BINOP_CONCAT:
ee90b9ab 4052 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4053
4054 case BINOP_EXP:
d2e4a39e 4055 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4056
4057 case UNOP_NEG:
4058 case UNOP_PLUS:
4059 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4060 case UNOP_ABS:
4061 return (!numeric_type_p (type0));
14f9c5c9
AS
4062
4063 }
4064}
4065\f
4c4b4cd2 4066 /* Renaming */
14f9c5c9 4067
aeb5907d
JB
4068/* NOTES:
4069
4070 1. In the following, we assume that a renaming type's name may
4071 have an ___XD suffix. It would be nice if this went away at some
4072 point.
4073 2. We handle both the (old) purely type-based representation of
4074 renamings and the (new) variable-based encoding. At some point,
4075 it is devoutly to be hoped that the former goes away
4076 (FIXME: hilfinger-2007-07-09).
4077 3. Subprogram renamings are not implemented, although the XRS
4078 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4079
4080/* If SYM encodes a renaming,
4081
4082 <renaming> renames <renamed entity>,
4083
4084 sets *LEN to the length of the renamed entity's name,
4085 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4086 the string describing the subcomponent selected from the renamed
0963b4bd 4087 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4088 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4089 are undefined). Otherwise, returns a value indicating the category
4090 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4091 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4092 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4093 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4094 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4095 may be NULL, in which case they are not assigned.
4096
4097 [Currently, however, GCC does not generate subprogram renamings.] */
4098
4099enum ada_renaming_category
4100ada_parse_renaming (struct symbol *sym,
4101 const char **renamed_entity, int *len,
4102 const char **renaming_expr)
4103{
4104 enum ada_renaming_category kind;
4105 const char *info;
4106 const char *suffix;
4107
4108 if (sym == NULL)
4109 return ADA_NOT_RENAMING;
4110 switch (SYMBOL_CLASS (sym))
14f9c5c9 4111 {
aeb5907d
JB
4112 default:
4113 return ADA_NOT_RENAMING;
4114 case LOC_TYPEDEF:
4115 return parse_old_style_renaming (SYMBOL_TYPE (sym),
4116 renamed_entity, len, renaming_expr);
4117 case LOC_LOCAL:
4118 case LOC_STATIC:
4119 case LOC_COMPUTED:
4120 case LOC_OPTIMIZED_OUT:
4121 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4122 if (info == NULL)
4123 return ADA_NOT_RENAMING;
4124 switch (info[5])
4125 {
4126 case '_':
4127 kind = ADA_OBJECT_RENAMING;
4128 info += 6;
4129 break;
4130 case 'E':
4131 kind = ADA_EXCEPTION_RENAMING;
4132 info += 7;
4133 break;
4134 case 'P':
4135 kind = ADA_PACKAGE_RENAMING;
4136 info += 7;
4137 break;
4138 case 'S':
4139 kind = ADA_SUBPROGRAM_RENAMING;
4140 info += 7;
4141 break;
4142 default:
4143 return ADA_NOT_RENAMING;
4144 }
14f9c5c9 4145 }
4c4b4cd2 4146
aeb5907d
JB
4147 if (renamed_entity != NULL)
4148 *renamed_entity = info;
4149 suffix = strstr (info, "___XE");
4150 if (suffix == NULL || suffix == info)
4151 return ADA_NOT_RENAMING;
4152 if (len != NULL)
4153 *len = strlen (info) - strlen (suffix);
4154 suffix += 5;
4155 if (renaming_expr != NULL)
4156 *renaming_expr = suffix;
4157 return kind;
4158}
4159
4160/* Assuming TYPE encodes a renaming according to the old encoding in
4161 exp_dbug.ads, returns details of that renaming in *RENAMED_ENTITY,
4162 *LEN, and *RENAMING_EXPR, as for ada_parse_renaming, above. Returns
4163 ADA_NOT_RENAMING otherwise. */
4164static enum ada_renaming_category
4165parse_old_style_renaming (struct type *type,
4166 const char **renamed_entity, int *len,
4167 const char **renaming_expr)
4168{
4169 enum ada_renaming_category kind;
4170 const char *name;
4171 const char *info;
4172 const char *suffix;
14f9c5c9 4173
aeb5907d
JB
4174 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
4175 || TYPE_NFIELDS (type) != 1)
4176 return ADA_NOT_RENAMING;
14f9c5c9 4177
aeb5907d
JB
4178 name = type_name_no_tag (type);
4179 if (name == NULL)
4180 return ADA_NOT_RENAMING;
4181
4182 name = strstr (name, "___XR");
4183 if (name == NULL)
4184 return ADA_NOT_RENAMING;
4185 switch (name[5])
4186 {
4187 case '\0':
4188 case '_':
4189 kind = ADA_OBJECT_RENAMING;
4190 break;
4191 case 'E':
4192 kind = ADA_EXCEPTION_RENAMING;
4193 break;
4194 case 'P':
4195 kind = ADA_PACKAGE_RENAMING;
4196 break;
4197 case 'S':
4198 kind = ADA_SUBPROGRAM_RENAMING;
4199 break;
4200 default:
4201 return ADA_NOT_RENAMING;
4202 }
14f9c5c9 4203
aeb5907d
JB
4204 info = TYPE_FIELD_NAME (type, 0);
4205 if (info == NULL)
4206 return ADA_NOT_RENAMING;
4207 if (renamed_entity != NULL)
4208 *renamed_entity = info;
4209 suffix = strstr (info, "___XE");
4210 if (renaming_expr != NULL)
4211 *renaming_expr = suffix + 5;
4212 if (suffix == NULL || suffix == info)
4213 return ADA_NOT_RENAMING;
4214 if (len != NULL)
4215 *len = suffix - info;
4216 return kind;
a5ee536b
JB
4217}
4218
4219/* Compute the value of the given RENAMING_SYM, which is expected to
4220 be a symbol encoding a renaming expression. BLOCK is the block
4221 used to evaluate the renaming. */
52ce6436 4222
a5ee536b
JB
4223static struct value *
4224ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4225 const struct block *block)
a5ee536b 4226{
bbc13ae3 4227 const char *sym_name;
a5ee536b
JB
4228 struct expression *expr;
4229 struct value *value;
4230 struct cleanup *old_chain = NULL;
4231
bbc13ae3 4232 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
1bb9788d 4233 expr = parse_exp_1 (&sym_name, 0, block, 0);
bbc13ae3 4234 old_chain = make_cleanup (free_current_contents, &expr);
a5ee536b
JB
4235 value = evaluate_expression (expr);
4236
4237 do_cleanups (old_chain);
4238 return value;
4239}
14f9c5c9 4240\f
d2e4a39e 4241
4c4b4cd2 4242 /* Evaluation: Function Calls */
14f9c5c9 4243
4c4b4cd2 4244/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4245 lvalues, and otherwise has the side-effect of allocating memory
4246 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4247
d2e4a39e 4248static struct value *
40bc484c 4249ensure_lval (struct value *val)
14f9c5c9 4250{
40bc484c
JB
4251 if (VALUE_LVAL (val) == not_lval
4252 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4253 {
df407dfe 4254 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4255 const CORE_ADDR addr =
4256 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4257
40bc484c 4258 set_value_address (val, addr);
a84a8a0d 4259 VALUE_LVAL (val) = lval_memory;
40bc484c 4260 write_memory (addr, value_contents (val), len);
c3e5cd34 4261 }
14f9c5c9
AS
4262
4263 return val;
4264}
4265
4266/* Return the value ACTUAL, converted to be an appropriate value for a
4267 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4268 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4269 values not residing in memory, updating it as needed. */
14f9c5c9 4270
a93c0eb6 4271struct value *
40bc484c 4272ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4273{
df407dfe 4274 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4275 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4276 struct type *formal_target =
4277 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4278 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4279 struct type *actual_target =
4280 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4281 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4282
4c4b4cd2 4283 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4284 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4285 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4286 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4287 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4288 {
a84a8a0d 4289 struct value *result;
5b4ee69b 4290
14f9c5c9 4291 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4292 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4293 result = desc_data (actual);
14f9c5c9 4294 else if (TYPE_CODE (actual_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4295 {
4296 if (VALUE_LVAL (actual) != lval_memory)
4297 {
4298 struct value *val;
5b4ee69b 4299
df407dfe 4300 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4301 val = allocate_value (actual_type);
990a07ab 4302 memcpy ((char *) value_contents_raw (val),
0fd88904 4303 (char *) value_contents (actual),
4c4b4cd2 4304 TYPE_LENGTH (actual_type));
40bc484c 4305 actual = ensure_lval (val);
4c4b4cd2 4306 }
a84a8a0d 4307 result = value_addr (actual);
4c4b4cd2 4308 }
a84a8a0d
JB
4309 else
4310 return actual;
b1af9e97 4311 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4312 }
4313 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4314 return ada_value_ind (actual);
8344af1e
JB
4315 else if (ada_is_aligner_type (formal_type))
4316 {
4317 /* We need to turn this parameter into an aligner type
4318 as well. */
4319 struct value *aligner = allocate_value (formal_type);
4320 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4321
4322 value_assign_to_component (aligner, component, actual);
4323 return aligner;
4324 }
14f9c5c9
AS
4325
4326 return actual;
4327}
4328
438c98a1
JB
4329/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4330 type TYPE. This is usually an inefficient no-op except on some targets
4331 (such as AVR) where the representation of a pointer and an address
4332 differs. */
4333
4334static CORE_ADDR
4335value_pointer (struct value *value, struct type *type)
4336{
4337 struct gdbarch *gdbarch = get_type_arch (type);
4338 unsigned len = TYPE_LENGTH (type);
4339 gdb_byte *buf = alloca (len);
4340 CORE_ADDR addr;
4341
4342 addr = value_address (value);
4343 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4344 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4345 return addr;
4346}
4347
14f9c5c9 4348
4c4b4cd2
PH
4349/* Push a descriptor of type TYPE for array value ARR on the stack at
4350 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4351 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4352 to-descriptor type rather than a descriptor type), a struct value *
4353 representing a pointer to this descriptor. */
14f9c5c9 4354
d2e4a39e 4355static struct value *
40bc484c 4356make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4357{
d2e4a39e
AS
4358 struct type *bounds_type = desc_bounds_type (type);
4359 struct type *desc_type = desc_base_type (type);
4360 struct value *descriptor = allocate_value (desc_type);
4361 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4362 int i;
d2e4a39e 4363
0963b4bd
MS
4364 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4365 i > 0; i -= 1)
14f9c5c9 4366 {
19f220c3
JK
4367 modify_field (value_type (bounds), value_contents_writeable (bounds),
4368 ada_array_bound (arr, i, 0),
4369 desc_bound_bitpos (bounds_type, i, 0),
4370 desc_bound_bitsize (bounds_type, i, 0));
4371 modify_field (value_type (bounds), value_contents_writeable (bounds),
4372 ada_array_bound (arr, i, 1),
4373 desc_bound_bitpos (bounds_type, i, 1),
4374 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4375 }
d2e4a39e 4376
40bc484c 4377 bounds = ensure_lval (bounds);
d2e4a39e 4378
19f220c3
JK
4379 modify_field (value_type (descriptor),
4380 value_contents_writeable (descriptor),
4381 value_pointer (ensure_lval (arr),
4382 TYPE_FIELD_TYPE (desc_type, 0)),
4383 fat_pntr_data_bitpos (desc_type),
4384 fat_pntr_data_bitsize (desc_type));
4385
4386 modify_field (value_type (descriptor),
4387 value_contents_writeable (descriptor),
4388 value_pointer (bounds,
4389 TYPE_FIELD_TYPE (desc_type, 1)),
4390 fat_pntr_bounds_bitpos (desc_type),
4391 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4392
40bc484c 4393 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4394
4395 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4396 return value_addr (descriptor);
4397 else
4398 return descriptor;
4399}
14f9c5c9 4400\f
3d9434b5
JB
4401 /* Symbol Cache Module */
4402
3d9434b5 4403/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4404 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4405 on the type of entity being printed, the cache can make it as much
4406 as an order of magnitude faster than without it.
4407
4408 The descriptive type DWARF extension has significantly reduced
4409 the need for this cache, at least when DWARF is being used. However,
4410 even in this case, some expensive name-based symbol searches are still
4411 sometimes necessary - to find an XVZ variable, mostly. */
4412
ee01b665 4413/* Initialize the contents of SYM_CACHE. */
3d9434b5 4414
ee01b665
JB
4415static void
4416ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4417{
4418 obstack_init (&sym_cache->cache_space);
4419 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4420}
3d9434b5 4421
ee01b665
JB
4422/* Free the memory used by SYM_CACHE. */
4423
4424static void
4425ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4426{
ee01b665
JB
4427 obstack_free (&sym_cache->cache_space, NULL);
4428 xfree (sym_cache);
4429}
3d9434b5 4430
ee01b665
JB
4431/* Return the symbol cache associated to the given program space PSPACE.
4432 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4433
ee01b665
JB
4434static struct ada_symbol_cache *
4435ada_get_symbol_cache (struct program_space *pspace)
4436{
4437 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4438
66c168ae 4439 if (pspace_data->sym_cache == NULL)
ee01b665 4440 {
66c168ae
JB
4441 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4442 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4443 }
4444
66c168ae 4445 return pspace_data->sym_cache;
ee01b665 4446}
3d9434b5
JB
4447
4448/* Clear all entries from the symbol cache. */
4449
4450static void
4451ada_clear_symbol_cache (void)
4452{
ee01b665
JB
4453 struct ada_symbol_cache *sym_cache
4454 = ada_get_symbol_cache (current_program_space);
4455
4456 obstack_free (&sym_cache->cache_space, NULL);
4457 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4458}
4459
fe978cb0 4460/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4461 Return it if found, or NULL otherwise. */
4462
4463static struct cache_entry **
fe978cb0 4464find_entry (const char *name, domain_enum domain)
3d9434b5 4465{
ee01b665
JB
4466 struct ada_symbol_cache *sym_cache
4467 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4468 int h = msymbol_hash (name) % HASH_SIZE;
4469 struct cache_entry **e;
4470
ee01b665 4471 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4472 {
fe978cb0 4473 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4474 return e;
4475 }
4476 return NULL;
4477}
4478
fe978cb0 4479/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4480 Return 1 if found, 0 otherwise.
4481
4482 If an entry was found and SYM is not NULL, set *SYM to the entry's
4483 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4484
96d887e8 4485static int
fe978cb0 4486lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4487 struct symbol **sym, const struct block **block)
96d887e8 4488{
fe978cb0 4489 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4490
4491 if (e == NULL)
4492 return 0;
4493 if (sym != NULL)
4494 *sym = (*e)->sym;
4495 if (block != NULL)
4496 *block = (*e)->block;
4497 return 1;
96d887e8
PH
4498}
4499
3d9434b5 4500/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4501 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4502
96d887e8 4503static void
fe978cb0 4504cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4505 const struct block *block)
96d887e8 4506{
ee01b665
JB
4507 struct ada_symbol_cache *sym_cache
4508 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4509 int h;
4510 char *copy;
4511 struct cache_entry *e;
4512
1994afbf
DE
4513 /* Symbols for builtin types don't have a block.
4514 For now don't cache such symbols. */
4515 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4516 return;
4517
3d9434b5
JB
4518 /* If the symbol is a local symbol, then do not cache it, as a search
4519 for that symbol depends on the context. To determine whether
4520 the symbol is local or not, we check the block where we found it
4521 against the global and static blocks of its associated symtab. */
4522 if (sym
08be3fe3 4523 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4524 GLOBAL_BLOCK) != block
08be3fe3 4525 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4526 STATIC_BLOCK) != block)
3d9434b5
JB
4527 return;
4528
4529 h = msymbol_hash (name) % HASH_SIZE;
ee01b665
JB
4530 e = (struct cache_entry *) obstack_alloc (&sym_cache->cache_space,
4531 sizeof (*e));
4532 e->next = sym_cache->root[h];
4533 sym_cache->root[h] = e;
4534 e->name = copy = obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4535 strcpy (copy, name);
4536 e->sym = sym;
fe978cb0 4537 e->domain = domain;
3d9434b5 4538 e->block = block;
96d887e8 4539}
4c4b4cd2
PH
4540\f
4541 /* Symbol Lookup */
4542
c0431670
JB
4543/* Return nonzero if wild matching should be used when searching for
4544 all symbols matching LOOKUP_NAME.
4545
4546 LOOKUP_NAME is expected to be a symbol name after transformation
4547 for Ada lookups (see ada_name_for_lookup). */
4548
4549static int
4550should_use_wild_match (const char *lookup_name)
4551{
4552 return (strstr (lookup_name, "__") == NULL);
4553}
4554
4c4b4cd2
PH
4555/* Return the result of a standard (literal, C-like) lookup of NAME in
4556 given DOMAIN, visible from lexical block BLOCK. */
4557
4558static struct symbol *
4559standard_lookup (const char *name, const struct block *block,
4560 domain_enum domain)
4561{
acbd605d
MGD
4562 /* Initialize it just to avoid a GCC false warning. */
4563 struct symbol *sym = NULL;
4c4b4cd2 4564
2570f2b7 4565 if (lookup_cached_symbol (name, domain, &sym, NULL))
4c4b4cd2 4566 return sym;
2570f2b7
UW
4567 sym = lookup_symbol_in_language (name, block, domain, language_c, 0);
4568 cache_symbol (name, domain, sym, block_found);
4c4b4cd2
PH
4569 return sym;
4570}
4571
4572
4573/* Non-zero iff there is at least one non-function/non-enumeral symbol
4574 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4575 since they contend in overloading in the same way. */
4576static int
4577is_nonfunction (struct ada_symbol_info syms[], int n)
4578{
4579 int i;
4580
4581 for (i = 0; i < n; i += 1)
4582 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_FUNC
4583 && (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM
4584 || SYMBOL_CLASS (syms[i].sym) != LOC_CONST))
14f9c5c9
AS
4585 return 1;
4586
4587 return 0;
4588}
4589
4590/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4591 struct types. Otherwise, they may not. */
14f9c5c9
AS
4592
4593static int
d2e4a39e 4594equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4595{
d2e4a39e 4596 if (type0 == type1)
14f9c5c9 4597 return 1;
d2e4a39e 4598 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4599 || TYPE_CODE (type0) != TYPE_CODE (type1))
4600 return 0;
d2e4a39e 4601 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4602 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4603 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4604 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4605 return 1;
d2e4a39e 4606
14f9c5c9
AS
4607 return 0;
4608}
4609
4610/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4611 no more defined than that of SYM1. */
14f9c5c9
AS
4612
4613static int
d2e4a39e 4614lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4615{
4616 if (sym0 == sym1)
4617 return 1;
176620f1 4618 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4619 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4620 return 0;
4621
d2e4a39e 4622 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4623 {
4624 case LOC_UNDEF:
4625 return 1;
4626 case LOC_TYPEDEF:
4627 {
4c4b4cd2
PH
4628 struct type *type0 = SYMBOL_TYPE (sym0);
4629 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4630 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4631 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4632 int len0 = strlen (name0);
5b4ee69b 4633
4c4b4cd2
PH
4634 return
4635 TYPE_CODE (type0) == TYPE_CODE (type1)
4636 && (equiv_types (type0, type1)
4637 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4638 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4639 }
4640 case LOC_CONST:
4641 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4642 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4643 default:
4644 return 0;
14f9c5c9
AS
4645 }
4646}
4647
4c4b4cd2
PH
4648/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct ada_symbol_info
4649 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4650
4651static void
76a01679
JB
4652add_defn_to_vec (struct obstack *obstackp,
4653 struct symbol *sym,
f0c5f9b2 4654 const struct block *block)
14f9c5c9
AS
4655{
4656 int i;
4c4b4cd2 4657 struct ada_symbol_info *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4658
529cad9c
PH
4659 /* Do not try to complete stub types, as the debugger is probably
4660 already scanning all symbols matching a certain name at the
4661 time when this function is called. Trying to replace the stub
4662 type by its associated full type will cause us to restart a scan
4663 which may lead to an infinite recursion. Instead, the client
4664 collecting the matching symbols will end up collecting several
4665 matches, with at least one of them complete. It can then filter
4666 out the stub ones if needed. */
4667
4c4b4cd2
PH
4668 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4669 {
4670 if (lesseq_defined_than (sym, prevDefns[i].sym))
4671 return;
4672 else if (lesseq_defined_than (prevDefns[i].sym, sym))
4673 {
4674 prevDefns[i].sym = sym;
4675 prevDefns[i].block = block;
4c4b4cd2 4676 return;
76a01679 4677 }
4c4b4cd2
PH
4678 }
4679
4680 {
4681 struct ada_symbol_info info;
4682
4683 info.sym = sym;
4684 info.block = block;
4c4b4cd2
PH
4685 obstack_grow (obstackp, &info, sizeof (struct ada_symbol_info));
4686 }
4687}
4688
4689/* Number of ada_symbol_info structures currently collected in
4690 current vector in *OBSTACKP. */
4691
76a01679
JB
4692static int
4693num_defns_collected (struct obstack *obstackp)
4c4b4cd2
PH
4694{
4695 return obstack_object_size (obstackp) / sizeof (struct ada_symbol_info);
4696}
4697
4698/* Vector of ada_symbol_info structures currently collected in current
4699 vector in *OBSTACKP. If FINISH, close off the vector and return
4700 its final address. */
4701
76a01679 4702static struct ada_symbol_info *
4c4b4cd2
PH
4703defns_collected (struct obstack *obstackp, int finish)
4704{
4705 if (finish)
4706 return obstack_finish (obstackp);
4707 else
4708 return (struct ada_symbol_info *) obstack_base (obstackp);
4709}
4710
7c7b6655
TT
4711/* Return a bound minimal symbol matching NAME according to Ada
4712 decoding rules. Returns an invalid symbol if there is no such
4713 minimal symbol. Names prefixed with "standard__" are handled
4714 specially: "standard__" is first stripped off, and only static and
4715 global symbols are searched. */
4c4b4cd2 4716
7c7b6655 4717struct bound_minimal_symbol
96d887e8 4718ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4719{
7c7b6655 4720 struct bound_minimal_symbol result;
4c4b4cd2 4721 struct objfile *objfile;
96d887e8 4722 struct minimal_symbol *msymbol;
dc4024cd 4723 const int wild_match_p = should_use_wild_match (name);
4c4b4cd2 4724
7c7b6655
TT
4725 memset (&result, 0, sizeof (result));
4726
c0431670
JB
4727 /* Special case: If the user specifies a symbol name inside package
4728 Standard, do a non-wild matching of the symbol name without
4729 the "standard__" prefix. This was primarily introduced in order
4730 to allow the user to specifically access the standard exceptions
4731 using, for instance, Standard.Constraint_Error when Constraint_Error
4732 is ambiguous (due to the user defining its own Constraint_Error
4733 entity inside its program). */
61012eef 4734 if (startswith (name, "standard__"))
c0431670 4735 name += sizeof ("standard__") - 1;
4c4b4cd2 4736
96d887e8
PH
4737 ALL_MSYMBOLS (objfile, msymbol)
4738 {
efd66ac6 4739 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), name, wild_match_p)
96d887e8 4740 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
7c7b6655
TT
4741 {
4742 result.minsym = msymbol;
4743 result.objfile = objfile;
4744 break;
4745 }
96d887e8 4746 }
4c4b4cd2 4747
7c7b6655 4748 return result;
96d887e8 4749}
4c4b4cd2 4750
96d887e8
PH
4751/* For all subprograms that statically enclose the subprogram of the
4752 selected frame, add symbols matching identifier NAME in DOMAIN
4753 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4754 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4755 with a wildcard prefix. */
4c4b4cd2 4756
96d887e8
PH
4757static void
4758add_symbols_from_enclosing_procs (struct obstack *obstackp,
fe978cb0 4759 const char *name, domain_enum domain,
48b78332 4760 int wild_match_p)
96d887e8 4761{
96d887e8 4762}
14f9c5c9 4763
96d887e8
PH
4764/* True if TYPE is definitely an artificial type supplied to a symbol
4765 for which no debugging information was given in the symbol file. */
14f9c5c9 4766
96d887e8
PH
4767static int
4768is_nondebugging_type (struct type *type)
4769{
0d5cff50 4770 const char *name = ada_type_name (type);
5b4ee69b 4771
96d887e8
PH
4772 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4773}
4c4b4cd2 4774
8f17729f
JB
4775/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4776 that are deemed "identical" for practical purposes.
4777
4778 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4779 types and that their number of enumerals is identical (in other
4780 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4781
4782static int
4783ada_identical_enum_types_p (struct type *type1, struct type *type2)
4784{
4785 int i;
4786
4787 /* The heuristic we use here is fairly conservative. We consider
4788 that 2 enumerate types are identical if they have the same
4789 number of enumerals and that all enumerals have the same
4790 underlying value and name. */
4791
4792 /* All enums in the type should have an identical underlying value. */
4793 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4794 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4795 return 0;
4796
4797 /* All enumerals should also have the same name (modulo any numerical
4798 suffix). */
4799 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4800 {
0d5cff50
DE
4801 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4802 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4803 int len_1 = strlen (name_1);
4804 int len_2 = strlen (name_2);
4805
4806 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4807 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4808 if (len_1 != len_2
4809 || strncmp (TYPE_FIELD_NAME (type1, i),
4810 TYPE_FIELD_NAME (type2, i),
4811 len_1) != 0)
4812 return 0;
4813 }
4814
4815 return 1;
4816}
4817
4818/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4819 that are deemed "identical" for practical purposes. Sometimes,
4820 enumerals are not strictly identical, but their types are so similar
4821 that they can be considered identical.
4822
4823 For instance, consider the following code:
4824
4825 type Color is (Black, Red, Green, Blue, White);
4826 type RGB_Color is new Color range Red .. Blue;
4827
4828 Type RGB_Color is a subrange of an implicit type which is a copy
4829 of type Color. If we call that implicit type RGB_ColorB ("B" is
4830 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4831 As a result, when an expression references any of the enumeral
4832 by name (Eg. "print green"), the expression is technically
4833 ambiguous and the user should be asked to disambiguate. But
4834 doing so would only hinder the user, since it wouldn't matter
4835 what choice he makes, the outcome would always be the same.
4836 So, for practical purposes, we consider them as the same. */
4837
4838static int
4839symbols_are_identical_enums (struct ada_symbol_info *syms, int nsyms)
4840{
4841 int i;
4842
4843 /* Before performing a thorough comparison check of each type,
4844 we perform a series of inexpensive checks. We expect that these
4845 checks will quickly fail in the vast majority of cases, and thus
4846 help prevent the unnecessary use of a more expensive comparison.
4847 Said comparison also expects us to make some of these checks
4848 (see ada_identical_enum_types_p). */
4849
4850 /* Quick check: All symbols should have an enum type. */
4851 for (i = 0; i < nsyms; i++)
4852 if (TYPE_CODE (SYMBOL_TYPE (syms[i].sym)) != TYPE_CODE_ENUM)
4853 return 0;
4854
4855 /* Quick check: They should all have the same value. */
4856 for (i = 1; i < nsyms; i++)
4857 if (SYMBOL_VALUE (syms[i].sym) != SYMBOL_VALUE (syms[0].sym))
4858 return 0;
4859
4860 /* Quick check: They should all have the same number of enumerals. */
4861 for (i = 1; i < nsyms; i++)
4862 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].sym))
4863 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].sym)))
4864 return 0;
4865
4866 /* All the sanity checks passed, so we might have a set of
4867 identical enumeration types. Perform a more complete
4868 comparison of the type of each symbol. */
4869 for (i = 1; i < nsyms; i++)
4870 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].sym),
4871 SYMBOL_TYPE (syms[0].sym)))
4872 return 0;
4873
4874 return 1;
4875}
4876
96d887e8
PH
4877/* Remove any non-debugging symbols in SYMS[0 .. NSYMS-1] that definitely
4878 duplicate other symbols in the list (The only case I know of where
4879 this happens is when object files containing stabs-in-ecoff are
4880 linked with files containing ordinary ecoff debugging symbols (or no
4881 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
4882 Returns the number of items in the modified list. */
4c4b4cd2 4883
96d887e8
PH
4884static int
4885remove_extra_symbols (struct ada_symbol_info *syms, int nsyms)
4886{
4887 int i, j;
4c4b4cd2 4888
8f17729f
JB
4889 /* We should never be called with less than 2 symbols, as there
4890 cannot be any extra symbol in that case. But it's easy to
4891 handle, since we have nothing to do in that case. */
4892 if (nsyms < 2)
4893 return nsyms;
4894
96d887e8
PH
4895 i = 0;
4896 while (i < nsyms)
4897 {
a35ddb44 4898 int remove_p = 0;
339c13b6
JB
4899
4900 /* If two symbols have the same name and one of them is a stub type,
4901 the get rid of the stub. */
4902
4903 if (TYPE_STUB (SYMBOL_TYPE (syms[i].sym))
4904 && SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL)
4905 {
4906 for (j = 0; j < nsyms; j++)
4907 {
4908 if (j != i
4909 && !TYPE_STUB (SYMBOL_TYPE (syms[j].sym))
4910 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4911 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
4912 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0)
a35ddb44 4913 remove_p = 1;
339c13b6
JB
4914 }
4915 }
4916
4917 /* Two symbols with the same name, same class and same address
4918 should be identical. */
4919
4920 else if (SYMBOL_LINKAGE_NAME (syms[i].sym) != NULL
96d887e8
PH
4921 && SYMBOL_CLASS (syms[i].sym) == LOC_STATIC
4922 && is_nondebugging_type (SYMBOL_TYPE (syms[i].sym)))
4923 {
4924 for (j = 0; j < nsyms; j += 1)
4925 {
4926 if (i != j
4927 && SYMBOL_LINKAGE_NAME (syms[j].sym) != NULL
4928 && strcmp (SYMBOL_LINKAGE_NAME (syms[i].sym),
76a01679 4929 SYMBOL_LINKAGE_NAME (syms[j].sym)) == 0
96d887e8
PH
4930 && SYMBOL_CLASS (syms[i].sym) == SYMBOL_CLASS (syms[j].sym)
4931 && SYMBOL_VALUE_ADDRESS (syms[i].sym)
4932 == SYMBOL_VALUE_ADDRESS (syms[j].sym))
a35ddb44 4933 remove_p = 1;
4c4b4cd2 4934 }
4c4b4cd2 4935 }
339c13b6 4936
a35ddb44 4937 if (remove_p)
339c13b6
JB
4938 {
4939 for (j = i + 1; j < nsyms; j += 1)
4940 syms[j - 1] = syms[j];
4941 nsyms -= 1;
4942 }
4943
96d887e8 4944 i += 1;
14f9c5c9 4945 }
8f17729f
JB
4946
4947 /* If all the remaining symbols are identical enumerals, then
4948 just keep the first one and discard the rest.
4949
4950 Unlike what we did previously, we do not discard any entry
4951 unless they are ALL identical. This is because the symbol
4952 comparison is not a strict comparison, but rather a practical
4953 comparison. If all symbols are considered identical, then
4954 we can just go ahead and use the first one and discard the rest.
4955 But if we cannot reduce the list to a single element, we have
4956 to ask the user to disambiguate anyways. And if we have to
4957 present a multiple-choice menu, it's less confusing if the list
4958 isn't missing some choices that were identical and yet distinct. */
4959 if (symbols_are_identical_enums (syms, nsyms))
4960 nsyms = 1;
4961
96d887e8 4962 return nsyms;
14f9c5c9
AS
4963}
4964
96d887e8
PH
4965/* Given a type that corresponds to a renaming entity, use the type name
4966 to extract the scope (package name or function name, fully qualified,
4967 and following the GNAT encoding convention) where this renaming has been
4968 defined. The string returned needs to be deallocated after use. */
4c4b4cd2 4969
96d887e8
PH
4970static char *
4971xget_renaming_scope (struct type *renaming_type)
14f9c5c9 4972{
96d887e8 4973 /* The renaming types adhere to the following convention:
0963b4bd 4974 <scope>__<rename>___<XR extension>.
96d887e8
PH
4975 So, to extract the scope, we search for the "___XR" extension,
4976 and then backtrack until we find the first "__". */
76a01679 4977
96d887e8
PH
4978 const char *name = type_name_no_tag (renaming_type);
4979 char *suffix = strstr (name, "___XR");
4980 char *last;
4981 int scope_len;
4982 char *scope;
14f9c5c9 4983
96d887e8
PH
4984 /* Now, backtrack a bit until we find the first "__". Start looking
4985 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 4986
96d887e8
PH
4987 for (last = suffix - 3; last > name; last--)
4988 if (last[0] == '_' && last[1] == '_')
4989 break;
76a01679 4990
96d887e8 4991 /* Make a copy of scope and return it. */
14f9c5c9 4992
96d887e8
PH
4993 scope_len = last - name;
4994 scope = (char *) xmalloc ((scope_len + 1) * sizeof (char));
14f9c5c9 4995
96d887e8
PH
4996 strncpy (scope, name, scope_len);
4997 scope[scope_len] = '\0';
4c4b4cd2 4998
96d887e8 4999 return scope;
4c4b4cd2
PH
5000}
5001
96d887e8 5002/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5003
96d887e8
PH
5004static int
5005is_package_name (const char *name)
4c4b4cd2 5006{
96d887e8
PH
5007 /* Here, We take advantage of the fact that no symbols are generated
5008 for packages, while symbols are generated for each function.
5009 So the condition for NAME represent a package becomes equivalent
5010 to NAME not existing in our list of symbols. There is only one
5011 small complication with library-level functions (see below). */
4c4b4cd2 5012
96d887e8 5013 char *fun_name;
76a01679 5014
96d887e8
PH
5015 /* If it is a function that has not been defined at library level,
5016 then we should be able to look it up in the symbols. */
5017 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5018 return 0;
14f9c5c9 5019
96d887e8
PH
5020 /* Library-level function names start with "_ada_". See if function
5021 "_ada_" followed by NAME can be found. */
14f9c5c9 5022
96d887e8 5023 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5024 functions names cannot contain "__" in them. */
96d887e8
PH
5025 if (strstr (name, "__") != NULL)
5026 return 0;
4c4b4cd2 5027
b435e160 5028 fun_name = xstrprintf ("_ada_%s", name);
14f9c5c9 5029
96d887e8
PH
5030 return (standard_lookup (fun_name, NULL, VAR_DOMAIN) == NULL);
5031}
14f9c5c9 5032
96d887e8 5033/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5034 not visible from FUNCTION_NAME. */
14f9c5c9 5035
96d887e8 5036static int
0d5cff50 5037old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5038{
aeb5907d 5039 char *scope;
1509e573 5040 struct cleanup *old_chain;
aeb5907d
JB
5041
5042 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5043 return 0;
5044
5045 scope = xget_renaming_scope (SYMBOL_TYPE (sym));
1509e573 5046 old_chain = make_cleanup (xfree, scope);
14f9c5c9 5047
96d887e8
PH
5048 /* If the rename has been defined in a package, then it is visible. */
5049 if (is_package_name (scope))
1509e573
JB
5050 {
5051 do_cleanups (old_chain);
5052 return 0;
5053 }
14f9c5c9 5054
96d887e8
PH
5055 /* Check that the rename is in the current function scope by checking
5056 that its name starts with SCOPE. */
76a01679 5057
96d887e8
PH
5058 /* If the function name starts with "_ada_", it means that it is
5059 a library-level function. Strip this prefix before doing the
5060 comparison, as the encoding for the renaming does not contain
5061 this prefix. */
61012eef 5062 if (startswith (function_name, "_ada_"))
96d887e8 5063 function_name += 5;
f26caa11 5064
1509e573 5065 {
61012eef 5066 int is_invisible = !startswith (function_name, scope);
1509e573
JB
5067
5068 do_cleanups (old_chain);
5069 return is_invisible;
5070 }
f26caa11
PH
5071}
5072
aeb5907d
JB
5073/* Remove entries from SYMS that corresponds to a renaming entity that
5074 is not visible from the function associated with CURRENT_BLOCK or
5075 that is superfluous due to the presence of more specific renaming
5076 information. Places surviving symbols in the initial entries of
5077 SYMS and returns the number of surviving symbols.
96d887e8
PH
5078
5079 Rationale:
aeb5907d
JB
5080 First, in cases where an object renaming is implemented as a
5081 reference variable, GNAT may produce both the actual reference
5082 variable and the renaming encoding. In this case, we discard the
5083 latter.
5084
5085 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5086 entity. Unfortunately, STABS currently does not support the definition
5087 of types that are local to a given lexical block, so all renamings types
5088 are emitted at library level. As a consequence, if an application
5089 contains two renaming entities using the same name, and a user tries to
5090 print the value of one of these entities, the result of the ada symbol
5091 lookup will also contain the wrong renaming type.
f26caa11 5092
96d887e8
PH
5093 This function partially covers for this limitation by attempting to
5094 remove from the SYMS list renaming symbols that should be visible
5095 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5096 method with the current information available. The implementation
5097 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5098
5099 - When the user tries to print a rename in a function while there
5100 is another rename entity defined in a package: Normally, the
5101 rename in the function has precedence over the rename in the
5102 package, so the latter should be removed from the list. This is
5103 currently not the case.
5104
5105 - This function will incorrectly remove valid renames if
5106 the CURRENT_BLOCK corresponds to a function which symbol name
5107 has been changed by an "Export" pragma. As a consequence,
5108 the user will be unable to print such rename entities. */
4c4b4cd2 5109
14f9c5c9 5110static int
aeb5907d
JB
5111remove_irrelevant_renamings (struct ada_symbol_info *syms,
5112 int nsyms, const struct block *current_block)
4c4b4cd2
PH
5113{
5114 struct symbol *current_function;
0d5cff50 5115 const char *current_function_name;
4c4b4cd2 5116 int i;
aeb5907d
JB
5117 int is_new_style_renaming;
5118
5119 /* If there is both a renaming foo___XR... encoded as a variable and
5120 a simple variable foo in the same block, discard the latter.
0963b4bd 5121 First, zero out such symbols, then compress. */
aeb5907d
JB
5122 is_new_style_renaming = 0;
5123 for (i = 0; i < nsyms; i += 1)
5124 {
5125 struct symbol *sym = syms[i].sym;
270140bd 5126 const struct block *block = syms[i].block;
aeb5907d
JB
5127 const char *name;
5128 const char *suffix;
5129
5130 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5131 continue;
5132 name = SYMBOL_LINKAGE_NAME (sym);
5133 suffix = strstr (name, "___XR");
5134
5135 if (suffix != NULL)
5136 {
5137 int name_len = suffix - name;
5138 int j;
5b4ee69b 5139
aeb5907d
JB
5140 is_new_style_renaming = 1;
5141 for (j = 0; j < nsyms; j += 1)
5142 if (i != j && syms[j].sym != NULL
5143 && strncmp (name, SYMBOL_LINKAGE_NAME (syms[j].sym),
5144 name_len) == 0
5145 && block == syms[j].block)
5146 syms[j].sym = NULL;
5147 }
5148 }
5149 if (is_new_style_renaming)
5150 {
5151 int j, k;
5152
5153 for (j = k = 0; j < nsyms; j += 1)
5154 if (syms[j].sym != NULL)
5155 {
5156 syms[k] = syms[j];
5157 k += 1;
5158 }
5159 return k;
5160 }
4c4b4cd2
PH
5161
5162 /* Extract the function name associated to CURRENT_BLOCK.
5163 Abort if unable to do so. */
76a01679 5164
4c4b4cd2
PH
5165 if (current_block == NULL)
5166 return nsyms;
76a01679 5167
7f0df278 5168 current_function = block_linkage_function (current_block);
4c4b4cd2
PH
5169 if (current_function == NULL)
5170 return nsyms;
5171
5172 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5173 if (current_function_name == NULL)
5174 return nsyms;
5175
5176 /* Check each of the symbols, and remove it from the list if it is
5177 a type corresponding to a renaming that is out of the scope of
5178 the current block. */
5179
5180 i = 0;
5181 while (i < nsyms)
5182 {
aeb5907d
JB
5183 if (ada_parse_renaming (syms[i].sym, NULL, NULL, NULL)
5184 == ADA_OBJECT_RENAMING
5185 && old_renaming_is_invisible (syms[i].sym, current_function_name))
4c4b4cd2
PH
5186 {
5187 int j;
5b4ee69b 5188
aeb5907d 5189 for (j = i + 1; j < nsyms; j += 1)
76a01679 5190 syms[j - 1] = syms[j];
4c4b4cd2
PH
5191 nsyms -= 1;
5192 }
5193 else
5194 i += 1;
5195 }
5196
5197 return nsyms;
5198}
5199
339c13b6
JB
5200/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5201 whose name and domain match NAME and DOMAIN respectively.
5202 If no match was found, then extend the search to "enclosing"
5203 routines (in other words, if we're inside a nested function,
5204 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5205 If WILD_MATCH_P is nonzero, perform the naming matching in
5206 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5207
5208 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5209
5210static void
5211ada_add_local_symbols (struct obstack *obstackp, const char *name,
f0c5f9b2 5212 const struct block *block, domain_enum domain,
d0a8ab18 5213 int wild_match_p)
339c13b6
JB
5214{
5215 int block_depth = 0;
5216
5217 while (block != NULL)
5218 {
5219 block_depth += 1;
d0a8ab18
JB
5220 ada_add_block_symbols (obstackp, block, name, domain, NULL,
5221 wild_match_p);
339c13b6
JB
5222
5223 /* If we found a non-function match, assume that's the one. */
5224 if (is_nonfunction (defns_collected (obstackp, 0),
5225 num_defns_collected (obstackp)))
5226 return;
5227
5228 block = BLOCK_SUPERBLOCK (block);
5229 }
5230
5231 /* If no luck so far, try to find NAME as a local symbol in some lexically
5232 enclosing subprogram. */
5233 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
d0a8ab18 5234 add_symbols_from_enclosing_procs (obstackp, name, domain, wild_match_p);
339c13b6
JB
5235}
5236
ccefe4c4 5237/* An object of this type is used as the user_data argument when
40658b94 5238 calling the map_matching_symbols method. */
ccefe4c4 5239
40658b94 5240struct match_data
ccefe4c4 5241{
40658b94 5242 struct objfile *objfile;
ccefe4c4 5243 struct obstack *obstackp;
40658b94
PH
5244 struct symbol *arg_sym;
5245 int found_sym;
ccefe4c4
TT
5246};
5247
40658b94
PH
5248/* A callback for add_matching_symbols that adds SYM, found in BLOCK,
5249 to a list of symbols. DATA0 is a pointer to a struct match_data *
5250 containing the obstack that collects the symbol list, the file that SYM
5251 must come from, a flag indicating whether a non-argument symbol has
5252 been found in the current block, and the last argument symbol
5253 passed in SYM within the current block (if any). When SYM is null,
5254 marking the end of a block, the argument symbol is added if no
5255 other has been found. */
ccefe4c4 5256
40658b94
PH
5257static int
5258aux_add_nonlocal_symbols (struct block *block, struct symbol *sym, void *data0)
ccefe4c4 5259{
40658b94
PH
5260 struct match_data *data = (struct match_data *) data0;
5261
5262 if (sym == NULL)
5263 {
5264 if (!data->found_sym && data->arg_sym != NULL)
5265 add_defn_to_vec (data->obstackp,
5266 fixup_symbol_section (data->arg_sym, data->objfile),
5267 block);
5268 data->found_sym = 0;
5269 data->arg_sym = NULL;
5270 }
5271 else
5272 {
5273 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5274 return 0;
5275 else if (SYMBOL_IS_ARGUMENT (sym))
5276 data->arg_sym = sym;
5277 else
5278 {
5279 data->found_sym = 1;
5280 add_defn_to_vec (data->obstackp,
5281 fixup_symbol_section (sym, data->objfile),
5282 block);
5283 }
5284 }
5285 return 0;
5286}
5287
db230ce3
JB
5288/* Implements compare_names, but only applying the comparision using
5289 the given CASING. */
5b4ee69b 5290
40658b94 5291static int
db230ce3
JB
5292compare_names_with_case (const char *string1, const char *string2,
5293 enum case_sensitivity casing)
40658b94
PH
5294{
5295 while (*string1 != '\0' && *string2 != '\0')
5296 {
db230ce3
JB
5297 char c1, c2;
5298
40658b94
PH
5299 if (isspace (*string1) || isspace (*string2))
5300 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5301
5302 if (casing == case_sensitive_off)
5303 {
5304 c1 = tolower (*string1);
5305 c2 = tolower (*string2);
5306 }
5307 else
5308 {
5309 c1 = *string1;
5310 c2 = *string2;
5311 }
5312 if (c1 != c2)
40658b94 5313 break;
db230ce3 5314
40658b94
PH
5315 string1 += 1;
5316 string2 += 1;
5317 }
db230ce3 5318
40658b94
PH
5319 switch (*string1)
5320 {
5321 case '(':
5322 return strcmp_iw_ordered (string1, string2);
5323 case '_':
5324 if (*string2 == '\0')
5325 {
052874e8 5326 if (is_name_suffix (string1))
40658b94
PH
5327 return 0;
5328 else
1a1d5513 5329 return 1;
40658b94 5330 }
dbb8534f 5331 /* FALLTHROUGH */
40658b94
PH
5332 default:
5333 if (*string2 == '(')
5334 return strcmp_iw_ordered (string1, string2);
5335 else
db230ce3
JB
5336 {
5337 if (casing == case_sensitive_off)
5338 return tolower (*string1) - tolower (*string2);
5339 else
5340 return *string1 - *string2;
5341 }
40658b94 5342 }
ccefe4c4
TT
5343}
5344
db230ce3
JB
5345/* Compare STRING1 to STRING2, with results as for strcmp.
5346 Compatible with strcmp_iw_ordered in that...
5347
5348 strcmp_iw_ordered (STRING1, STRING2) <= 0
5349
5350 ... implies...
5351
5352 compare_names (STRING1, STRING2) <= 0
5353
5354 (they may differ as to what symbols compare equal). */
5355
5356static int
5357compare_names (const char *string1, const char *string2)
5358{
5359 int result;
5360
5361 /* Similar to what strcmp_iw_ordered does, we need to perform
5362 a case-insensitive comparison first, and only resort to
5363 a second, case-sensitive, comparison if the first one was
5364 not sufficient to differentiate the two strings. */
5365
5366 result = compare_names_with_case (string1, string2, case_sensitive_off);
5367 if (result == 0)
5368 result = compare_names_with_case (string1, string2, case_sensitive_on);
5369
5370 return result;
5371}
5372
339c13b6
JB
5373/* Add to OBSTACKP all non-local symbols whose name and domain match
5374 NAME and DOMAIN respectively. The search is performed on GLOBAL_BLOCK
5375 symbols if GLOBAL is non-zero, or on STATIC_BLOCK symbols otherwise. */
5376
5377static void
40658b94
PH
5378add_nonlocal_symbols (struct obstack *obstackp, const char *name,
5379 domain_enum domain, int global,
5380 int is_wild_match)
339c13b6
JB
5381{
5382 struct objfile *objfile;
40658b94 5383 struct match_data data;
339c13b6 5384
6475f2fe 5385 memset (&data, 0, sizeof data);
ccefe4c4 5386 data.obstackp = obstackp;
339c13b6 5387
ccefe4c4 5388 ALL_OBJFILES (objfile)
40658b94
PH
5389 {
5390 data.objfile = objfile;
5391
5392 if (is_wild_match)
4186eb54
KS
5393 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5394 aux_add_nonlocal_symbols, &data,
5395 wild_match, NULL);
40658b94 5396 else
4186eb54
KS
5397 objfile->sf->qf->map_matching_symbols (objfile, name, domain, global,
5398 aux_add_nonlocal_symbols, &data,
5399 full_match, compare_names);
40658b94
PH
5400 }
5401
5402 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5403 {
5404 ALL_OBJFILES (objfile)
5405 {
5406 char *name1 = alloca (strlen (name) + sizeof ("_ada_"));
5407 strcpy (name1, "_ada_");
5408 strcpy (name1 + sizeof ("_ada_") - 1, name);
5409 data.objfile = objfile;
ade7ed9e
DE
5410 objfile->sf->qf->map_matching_symbols (objfile, name1, domain,
5411 global,
0963b4bd
MS
5412 aux_add_nonlocal_symbols,
5413 &data,
40658b94
PH
5414 full_match, compare_names);
5415 }
5416 }
339c13b6
JB
5417}
5418
4eeaa230
DE
5419/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and, if full_search is
5420 non-zero, enclosing scope and in global scopes, returning the number of
5421 matches.
9f88c959 5422 Sets *RESULTS to point to a vector of (SYM,BLOCK) tuples,
4c4b4cd2 5423 indicating the symbols found and the blocks and symbol tables (if
4eeaa230
DE
5424 any) in which they were found. This vector is transient---good only to
5425 the next call of ada_lookup_symbol_list.
5426
5427 When full_search is non-zero, any non-function/non-enumeral
4c4b4cd2
PH
5428 symbol match within the nest of blocks whose innermost member is BLOCK0,
5429 is the one match returned (no other matches in that or
d9680e73 5430 enclosing blocks is returned). If there are any matches in or
4eeaa230
DE
5431 surrounding BLOCK0, then these alone are returned.
5432
9f88c959 5433 Names prefixed with "standard__" are handled specially: "standard__"
4c4b4cd2 5434 is first stripped off, and only static and global symbols are searched. */
14f9c5c9 5435
4eeaa230
DE
5436static int
5437ada_lookup_symbol_list_worker (const char *name0, const struct block *block0,
fe978cb0 5438 domain_enum domain,
4eeaa230
DE
5439 struct ada_symbol_info **results,
5440 int full_search)
14f9c5c9
AS
5441{
5442 struct symbol *sym;
f0c5f9b2 5443 const struct block *block;
4c4b4cd2 5444 const char *name;
82ccd55e 5445 const int wild_match_p = should_use_wild_match (name0);
b1eedac9 5446 int syms_from_global_search = 0;
4c4b4cd2 5447 int ndefns;
14f9c5c9 5448
4c4b4cd2
PH
5449 obstack_free (&symbol_list_obstack, NULL);
5450 obstack_init (&symbol_list_obstack);
14f9c5c9 5451
14f9c5c9
AS
5452 /* Search specified block and its superiors. */
5453
4c4b4cd2 5454 name = name0;
f0c5f9b2 5455 block = block0;
339c13b6
JB
5456
5457 /* Special case: If the user specifies a symbol name inside package
5458 Standard, do a non-wild matching of the symbol name without
5459 the "standard__" prefix. This was primarily introduced in order
5460 to allow the user to specifically access the standard exceptions
5461 using, for instance, Standard.Constraint_Error when Constraint_Error
5462 is ambiguous (due to the user defining its own Constraint_Error
5463 entity inside its program). */
61012eef 5464 if (startswith (name0, "standard__"))
4c4b4cd2 5465 {
4c4b4cd2
PH
5466 block = NULL;
5467 name = name0 + sizeof ("standard__") - 1;
5468 }
5469
339c13b6 5470 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5471
4eeaa230
DE
5472 if (block != NULL)
5473 {
5474 if (full_search)
5475 {
5476 ada_add_local_symbols (&symbol_list_obstack, name, block,
fe978cb0 5477 domain, wild_match_p);
4eeaa230
DE
5478 }
5479 else
5480 {
5481 /* In the !full_search case we're are being called by
5482 ada_iterate_over_symbols, and we don't want to search
5483 superblocks. */
5484 ada_add_block_symbols (&symbol_list_obstack, block, name,
fe978cb0 5485 domain, NULL, wild_match_p);
4eeaa230
DE
5486 }
5487 if (num_defns_collected (&symbol_list_obstack) > 0 || !full_search)
5488 goto done;
5489 }
d2e4a39e 5490
339c13b6
JB
5491 /* No non-global symbols found. Check our cache to see if we have
5492 already performed this search before. If we have, then return
5493 the same result. */
5494
fe978cb0 5495 if (lookup_cached_symbol (name0, domain, &sym, &block))
4c4b4cd2
PH
5496 {
5497 if (sym != NULL)
2570f2b7 5498 add_defn_to_vec (&symbol_list_obstack, sym, block);
4c4b4cd2
PH
5499 goto done;
5500 }
14f9c5c9 5501
b1eedac9
JB
5502 syms_from_global_search = 1;
5503
339c13b6
JB
5504 /* Search symbols from all global blocks. */
5505
fe978cb0 5506 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 1,
82ccd55e 5507 wild_match_p);
d2e4a39e 5508
4c4b4cd2 5509 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5510 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5511
4c4b4cd2 5512 if (num_defns_collected (&symbol_list_obstack) == 0)
fe978cb0 5513 add_nonlocal_symbols (&symbol_list_obstack, name, domain, 0,
82ccd55e 5514 wild_match_p);
14f9c5c9 5515
4c4b4cd2
PH
5516done:
5517 ndefns = num_defns_collected (&symbol_list_obstack);
5518 *results = defns_collected (&symbol_list_obstack, 1);
5519
5520 ndefns = remove_extra_symbols (*results, ndefns);
5521
b1eedac9 5522 if (ndefns == 0 && full_search && syms_from_global_search)
fe978cb0 5523 cache_symbol (name0, domain, NULL, NULL);
14f9c5c9 5524
b1eedac9 5525 if (ndefns == 1 && full_search && syms_from_global_search)
fe978cb0 5526 cache_symbol (name0, domain, (*results)[0].sym, (*results)[0].block);
14f9c5c9 5527
aeb5907d 5528 ndefns = remove_irrelevant_renamings (*results, ndefns, block0);
14f9c5c9 5529
14f9c5c9
AS
5530 return ndefns;
5531}
5532
4eeaa230
DE
5533/* Find symbols in DOMAIN matching NAME0, in BLOCK0 and enclosing scope and
5534 in global scopes, returning the number of matches, and setting *RESULTS
5535 to a vector of (SYM,BLOCK) tuples.
5536 See ada_lookup_symbol_list_worker for further details. */
5537
5538int
5539ada_lookup_symbol_list (const char *name0, const struct block *block0,
5540 domain_enum domain, struct ada_symbol_info **results)
5541{
5542 return ada_lookup_symbol_list_worker (name0, block0, domain, results, 1);
5543}
5544
5545/* Implementation of the la_iterate_over_symbols method. */
5546
5547static void
5548ada_iterate_over_symbols (const struct block *block,
5549 const char *name, domain_enum domain,
5550 symbol_found_callback_ftype *callback,
5551 void *data)
5552{
5553 int ndefs, i;
5554 struct ada_symbol_info *results;
5555
5556 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
5557 for (i = 0; i < ndefs; ++i)
5558 {
5559 if (! (*callback) (results[i].sym, data))
5560 break;
5561 }
5562}
5563
f8eba3c6
TT
5564/* If NAME is the name of an entity, return a string that should
5565 be used to look that entity up in Ada units. This string should
5566 be deallocated after use using xfree.
5567
5568 NAME can have any form that the "break" or "print" commands might
5569 recognize. In other words, it does not have to be the "natural"
5570 name, or the "encoded" name. */
5571
5572char *
5573ada_name_for_lookup (const char *name)
5574{
5575 char *canon;
5576 int nlen = strlen (name);
5577
5578 if (name[0] == '<' && name[nlen - 1] == '>')
5579 {
5580 canon = xmalloc (nlen - 1);
5581 memcpy (canon, name + 1, nlen - 2);
5582 canon[nlen - 2] = '\0';
5583 }
5584 else
5585 canon = xstrdup (ada_encode (ada_fold_name (name)));
5586 return canon;
5587}
5588
4e5c77fe
JB
5589/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5590 to 1, but choosing the first symbol found if there are multiple
5591 choices.
5592
5e2336be
JB
5593 The result is stored in *INFO, which must be non-NULL.
5594 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5595
5596void
5597ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5598 domain_enum domain,
5e2336be 5599 struct ada_symbol_info *info)
14f9c5c9 5600{
4c4b4cd2 5601 struct ada_symbol_info *candidates;
14f9c5c9
AS
5602 int n_candidates;
5603
5e2336be
JB
5604 gdb_assert (info != NULL);
5605 memset (info, 0, sizeof (struct ada_symbol_info));
4e5c77fe 5606
fe978cb0 5607 n_candidates = ada_lookup_symbol_list (name, block, domain, &candidates);
14f9c5c9 5608 if (n_candidates == 0)
4e5c77fe 5609 return;
4c4b4cd2 5610
5e2336be
JB
5611 *info = candidates[0];
5612 info->sym = fixup_symbol_section (info->sym, NULL);
4e5c77fe 5613}
aeb5907d
JB
5614
5615/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5616 scope and in global scopes, or NULL if none. NAME is folded and
5617 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
0963b4bd 5618 choosing the first symbol if there are multiple choices.
4e5c77fe
JB
5619 If IS_A_FIELD_OF_THIS is not NULL, it is set to zero. */
5620
aeb5907d
JB
5621struct symbol *
5622ada_lookup_symbol (const char *name, const struct block *block0,
fe978cb0 5623 domain_enum domain, int *is_a_field_of_this)
aeb5907d 5624{
5e2336be 5625 struct ada_symbol_info info;
4e5c77fe 5626
aeb5907d
JB
5627 if (is_a_field_of_this != NULL)
5628 *is_a_field_of_this = 0;
5629
4e5c77fe 5630 ada_lookup_encoded_symbol (ada_encode (ada_fold_name (name)),
fe978cb0 5631 block0, domain, &info);
5e2336be 5632 return info.sym;
4c4b4cd2 5633}
14f9c5c9 5634
4c4b4cd2 5635static struct symbol *
f606139a
DE
5636ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5637 const char *name,
76a01679 5638 const struct block *block,
21b556f4 5639 const domain_enum domain)
4c4b4cd2 5640{
04dccad0
JB
5641 struct symbol *sym;
5642
5643 sym = ada_lookup_symbol (name, block_static_block (block), domain, NULL);
5644 if (sym != NULL)
5645 return sym;
5646
5647 /* If we haven't found a match at this point, try the primitive
5648 types. In other languages, this search is performed before
5649 searching for global symbols in order to short-circuit that
5650 global-symbol search if it happens that the name corresponds
5651 to a primitive type. But we cannot do the same in Ada, because
5652 it is perfectly legitimate for a program to declare a type which
5653 has the same name as a standard type. If looking up a type in
5654 that situation, we have traditionally ignored the primitive type
5655 in favor of user-defined types. This is why, unlike most other
5656 languages, we search the primitive types this late and only after
5657 having searched the global symbols without success. */
5658
5659 if (domain == VAR_DOMAIN)
5660 {
5661 struct gdbarch *gdbarch;
5662
5663 if (block == NULL)
5664 gdbarch = target_gdbarch ();
5665 else
5666 gdbarch = block_gdbarch (block);
5667 sym = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5668 if (sym != NULL)
5669 return sym;
5670 }
5671
5672 return NULL;
14f9c5c9
AS
5673}
5674
5675
4c4b4cd2
PH
5676/* True iff STR is a possible encoded suffix of a normal Ada name
5677 that is to be ignored for matching purposes. Suffixes of parallel
5678 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5679 are given by any of the regular expressions:
4c4b4cd2 5680
babe1480
JB
5681 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5682 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5683 TKB [subprogram suffix for task bodies]
babe1480 5684 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5685 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5686
5687 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5688 match is performed. This sequence is used to differentiate homonyms,
5689 is an optional part of a valid name suffix. */
4c4b4cd2 5690
14f9c5c9 5691static int
d2e4a39e 5692is_name_suffix (const char *str)
14f9c5c9
AS
5693{
5694 int k;
4c4b4cd2
PH
5695 const char *matching;
5696 const int len = strlen (str);
5697
babe1480
JB
5698 /* Skip optional leading __[0-9]+. */
5699
4c4b4cd2
PH
5700 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5701 {
babe1480
JB
5702 str += 3;
5703 while (isdigit (str[0]))
5704 str += 1;
4c4b4cd2 5705 }
babe1480
JB
5706
5707 /* [.$][0-9]+ */
4c4b4cd2 5708
babe1480 5709 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5710 {
babe1480 5711 matching = str + 1;
4c4b4cd2
PH
5712 while (isdigit (matching[0]))
5713 matching += 1;
5714 if (matching[0] == '\0')
5715 return 1;
5716 }
5717
5718 /* ___[0-9]+ */
babe1480 5719
4c4b4cd2
PH
5720 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5721 {
5722 matching = str + 3;
5723 while (isdigit (matching[0]))
5724 matching += 1;
5725 if (matching[0] == '\0')
5726 return 1;
5727 }
5728
9ac7f98e
JB
5729 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5730
5731 if (strcmp (str, "TKB") == 0)
5732 return 1;
5733
529cad9c
PH
5734#if 0
5735 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5736 with a N at the end. Unfortunately, the compiler uses the same
5737 convention for other internal types it creates. So treating
529cad9c 5738 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5739 some regressions. For instance, consider the case of an enumerated
5740 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5741 name ends with N.
5742 Having a single character like this as a suffix carrying some
0963b4bd 5743 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5744 to be something like "_N" instead. In the meantime, do not do
5745 the following check. */
5746 /* Protected Object Subprograms */
5747 if (len == 1 && str [0] == 'N')
5748 return 1;
5749#endif
5750
5751 /* _E[0-9]+[bs]$ */
5752 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5753 {
5754 matching = str + 3;
5755 while (isdigit (matching[0]))
5756 matching += 1;
5757 if ((matching[0] == 'b' || matching[0] == 's')
5758 && matching [1] == '\0')
5759 return 1;
5760 }
5761
4c4b4cd2
PH
5762 /* ??? We should not modify STR directly, as we are doing below. This
5763 is fine in this case, but may become problematic later if we find
5764 that this alternative did not work, and want to try matching
5765 another one from the begining of STR. Since we modified it, we
5766 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5767 if (str[0] == 'X')
5768 {
5769 str += 1;
d2e4a39e 5770 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5771 {
5772 if (str[0] != 'n' && str[0] != 'b')
5773 return 0;
5774 str += 1;
5775 }
14f9c5c9 5776 }
babe1480 5777
14f9c5c9
AS
5778 if (str[0] == '\000')
5779 return 1;
babe1480 5780
d2e4a39e 5781 if (str[0] == '_')
14f9c5c9
AS
5782 {
5783 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5784 return 0;
d2e4a39e 5785 if (str[2] == '_')
4c4b4cd2 5786 {
61ee279c
PH
5787 if (strcmp (str + 3, "JM") == 0)
5788 return 1;
5789 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5790 the LJM suffix in favor of the JM one. But we will
5791 still accept LJM as a valid suffix for a reasonable
5792 amount of time, just to allow ourselves to debug programs
5793 compiled using an older version of GNAT. */
4c4b4cd2
PH
5794 if (strcmp (str + 3, "LJM") == 0)
5795 return 1;
5796 if (str[3] != 'X')
5797 return 0;
1265e4aa
JB
5798 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5799 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5800 return 1;
5801 if (str[4] == 'R' && str[5] != 'T')
5802 return 1;
5803 return 0;
5804 }
5805 if (!isdigit (str[2]))
5806 return 0;
5807 for (k = 3; str[k] != '\0'; k += 1)
5808 if (!isdigit (str[k]) && str[k] != '_')
5809 return 0;
14f9c5c9
AS
5810 return 1;
5811 }
4c4b4cd2 5812 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5813 {
4c4b4cd2
PH
5814 for (k = 2; str[k] != '\0'; k += 1)
5815 if (!isdigit (str[k]) && str[k] != '_')
5816 return 0;
14f9c5c9
AS
5817 return 1;
5818 }
5819 return 0;
5820}
d2e4a39e 5821
aeb5907d
JB
5822/* Return non-zero if the string starting at NAME and ending before
5823 NAME_END contains no capital letters. */
529cad9c
PH
5824
5825static int
5826is_valid_name_for_wild_match (const char *name0)
5827{
5828 const char *decoded_name = ada_decode (name0);
5829 int i;
5830
5823c3ef
JB
5831 /* If the decoded name starts with an angle bracket, it means that
5832 NAME0 does not follow the GNAT encoding format. It should then
5833 not be allowed as a possible wild match. */
5834 if (decoded_name[0] == '<')
5835 return 0;
5836
529cad9c
PH
5837 for (i=0; decoded_name[i] != '\0'; i++)
5838 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
5839 return 0;
5840
5841 return 1;
5842}
5843
73589123
PH
5844/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
5845 that could start a simple name. Assumes that *NAMEP points into
5846 the string beginning at NAME0. */
4c4b4cd2 5847
14f9c5c9 5848static int
73589123 5849advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 5850{
73589123 5851 const char *name = *namep;
5b4ee69b 5852
5823c3ef 5853 while (1)
14f9c5c9 5854 {
aa27d0b3 5855 int t0, t1;
73589123
PH
5856
5857 t0 = *name;
5858 if (t0 == '_')
5859 {
5860 t1 = name[1];
5861 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
5862 {
5863 name += 1;
61012eef 5864 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
5865 break;
5866 else
5867 name += 1;
5868 }
aa27d0b3
JB
5869 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
5870 || name[2] == target0))
73589123
PH
5871 {
5872 name += 2;
5873 break;
5874 }
5875 else
5876 return 0;
5877 }
5878 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
5879 name += 1;
5880 else
5823c3ef 5881 return 0;
73589123
PH
5882 }
5883
5884 *namep = name;
5885 return 1;
5886}
5887
5888/* Return 0 iff NAME encodes a name of the form prefix.PATN. Ignores any
5889 informational suffixes of NAME (i.e., for which is_name_suffix is
5890 true). Assumes that PATN is a lower-cased Ada simple name. */
5891
5892static int
5893wild_match (const char *name, const char *patn)
5894{
22e048c9 5895 const char *p;
73589123
PH
5896 const char *name0 = name;
5897
5898 while (1)
5899 {
5900 const char *match = name;
5901
5902 if (*name == *patn)
5903 {
5904 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
5905 if (*p != *name)
5906 break;
5907 if (*p == '\0' && is_name_suffix (name))
5908 return match != name0 && !is_valid_name_for_wild_match (name0);
5909
5910 if (name[-1] == '_')
5911 name -= 1;
5912 }
5913 if (!advance_wild_match (&name, name0, *patn))
5914 return 1;
96d887e8 5915 }
96d887e8
PH
5916}
5917
40658b94
PH
5918/* Returns 0 iff symbol name SYM_NAME matches SEARCH_NAME, apart from
5919 informational suffix. */
5920
c4d840bd
PH
5921static int
5922full_match (const char *sym_name, const char *search_name)
5923{
40658b94 5924 return !match_name (sym_name, search_name, 0);
c4d840bd
PH
5925}
5926
5927
96d887e8
PH
5928/* Add symbols from BLOCK matching identifier NAME in DOMAIN to
5929 vector *defn_symbols, updating the list of symbols in OBSTACKP
0963b4bd 5930 (if necessary). If WILD, treat as NAME with a wildcard prefix.
4eeaa230 5931 OBJFILE is the section containing BLOCK. */
96d887e8
PH
5932
5933static void
5934ada_add_block_symbols (struct obstack *obstackp,
f0c5f9b2 5935 const struct block *block, const char *name,
96d887e8 5936 domain_enum domain, struct objfile *objfile,
2570f2b7 5937 int wild)
96d887e8 5938{
8157b174 5939 struct block_iterator iter;
96d887e8
PH
5940 int name_len = strlen (name);
5941 /* A matching argument symbol, if any. */
5942 struct symbol *arg_sym;
5943 /* Set true when we find a matching non-argument symbol. */
5944 int found_sym;
5945 struct symbol *sym;
5946
5947 arg_sym = NULL;
5948 found_sym = 0;
5949 if (wild)
5950 {
8157b174
TT
5951 for (sym = block_iter_match_first (block, name, wild_match, &iter);
5952 sym != NULL; sym = block_iter_match_next (name, wild_match, &iter))
76a01679 5953 {
4186eb54
KS
5954 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5955 SYMBOL_DOMAIN (sym), domain)
73589123 5956 && wild_match (SYMBOL_LINKAGE_NAME (sym), name) == 0)
76a01679 5957 {
2a2d4dc3
AS
5958 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5959 continue;
5960 else if (SYMBOL_IS_ARGUMENT (sym))
5961 arg_sym = sym;
5962 else
5963 {
76a01679
JB
5964 found_sym = 1;
5965 add_defn_to_vec (obstackp,
5966 fixup_symbol_section (sym, objfile),
2570f2b7 5967 block);
76a01679
JB
5968 }
5969 }
5970 }
96d887e8
PH
5971 }
5972 else
5973 {
8157b174
TT
5974 for (sym = block_iter_match_first (block, name, full_match, &iter);
5975 sym != NULL; sym = block_iter_match_next (name, full_match, &iter))
76a01679 5976 {
4186eb54
KS
5977 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
5978 SYMBOL_DOMAIN (sym), domain))
76a01679 5979 {
c4d840bd
PH
5980 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
5981 {
5982 if (SYMBOL_IS_ARGUMENT (sym))
5983 arg_sym = sym;
5984 else
2a2d4dc3 5985 {
c4d840bd
PH
5986 found_sym = 1;
5987 add_defn_to_vec (obstackp,
5988 fixup_symbol_section (sym, objfile),
5989 block);
2a2d4dc3 5990 }
c4d840bd 5991 }
76a01679
JB
5992 }
5993 }
96d887e8
PH
5994 }
5995
5996 if (!found_sym && arg_sym != NULL)
5997 {
76a01679
JB
5998 add_defn_to_vec (obstackp,
5999 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6000 block);
96d887e8
PH
6001 }
6002
6003 if (!wild)
6004 {
6005 arg_sym = NULL;
6006 found_sym = 0;
6007
6008 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6009 {
4186eb54
KS
6010 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
6011 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6012 {
6013 int cmp;
6014
6015 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
6016 if (cmp == 0)
6017 {
61012eef 6018 cmp = !startswith (SYMBOL_LINKAGE_NAME (sym), "_ada_");
76a01679
JB
6019 if (cmp == 0)
6020 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
6021 name_len);
6022 }
6023
6024 if (cmp == 0
6025 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
6026 {
2a2d4dc3
AS
6027 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6028 {
6029 if (SYMBOL_IS_ARGUMENT (sym))
6030 arg_sym = sym;
6031 else
6032 {
6033 found_sym = 1;
6034 add_defn_to_vec (obstackp,
6035 fixup_symbol_section (sym, objfile),
6036 block);
6037 }
6038 }
76a01679
JB
6039 }
6040 }
76a01679 6041 }
96d887e8
PH
6042
6043 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6044 They aren't parameters, right? */
6045 if (!found_sym && arg_sym != NULL)
6046 {
6047 add_defn_to_vec (obstackp,
76a01679 6048 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6049 block);
96d887e8
PH
6050 }
6051 }
6052}
6053\f
41d27058
JB
6054
6055 /* Symbol Completion */
6056
6057/* If SYM_NAME is a completion candidate for TEXT, return this symbol
6058 name in a form that's appropriate for the completion. The result
6059 does not need to be deallocated, but is only good until the next call.
6060
6061 TEXT_LEN is equal to the length of TEXT.
e701b3c0 6062 Perform a wild match if WILD_MATCH_P is set.
6ea35997 6063 ENCODED_P should be set if TEXT represents the start of a symbol name
41d27058
JB
6064 in its encoded form. */
6065
6066static const char *
6067symbol_completion_match (const char *sym_name,
6068 const char *text, int text_len,
6ea35997 6069 int wild_match_p, int encoded_p)
41d27058 6070{
41d27058
JB
6071 const int verbatim_match = (text[0] == '<');
6072 int match = 0;
6073
6074 if (verbatim_match)
6075 {
6076 /* Strip the leading angle bracket. */
6077 text = text + 1;
6078 text_len--;
6079 }
6080
6081 /* First, test against the fully qualified name of the symbol. */
6082
6083 if (strncmp (sym_name, text, text_len) == 0)
6084 match = 1;
6085
6ea35997 6086 if (match && !encoded_p)
41d27058
JB
6087 {
6088 /* One needed check before declaring a positive match is to verify
6089 that iff we are doing a verbatim match, the decoded version
6090 of the symbol name starts with '<'. Otherwise, this symbol name
6091 is not a suitable completion. */
6092 const char *sym_name_copy = sym_name;
6093 int has_angle_bracket;
6094
6095 sym_name = ada_decode (sym_name);
6096 has_angle_bracket = (sym_name[0] == '<');
6097 match = (has_angle_bracket == verbatim_match);
6098 sym_name = sym_name_copy;
6099 }
6100
6101 if (match && !verbatim_match)
6102 {
6103 /* When doing non-verbatim match, another check that needs to
6104 be done is to verify that the potentially matching symbol name
6105 does not include capital letters, because the ada-mode would
6106 not be able to understand these symbol names without the
6107 angle bracket notation. */
6108 const char *tmp;
6109
6110 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6111 if (*tmp != '\0')
6112 match = 0;
6113 }
6114
6115 /* Second: Try wild matching... */
6116
e701b3c0 6117 if (!match && wild_match_p)
41d27058
JB
6118 {
6119 /* Since we are doing wild matching, this means that TEXT
6120 may represent an unqualified symbol name. We therefore must
6121 also compare TEXT against the unqualified name of the symbol. */
6122 sym_name = ada_unqualified_name (ada_decode (sym_name));
6123
6124 if (strncmp (sym_name, text, text_len) == 0)
6125 match = 1;
6126 }
6127
6128 /* Finally: If we found a mach, prepare the result to return. */
6129
6130 if (!match)
6131 return NULL;
6132
6133 if (verbatim_match)
6134 sym_name = add_angle_brackets (sym_name);
6135
6ea35997 6136 if (!encoded_p)
41d27058
JB
6137 sym_name = ada_decode (sym_name);
6138
6139 return sym_name;
6140}
6141
6142/* A companion function to ada_make_symbol_completion_list().
6143 Check if SYM_NAME represents a symbol which name would be suitable
6144 to complete TEXT (TEXT_LEN is the length of TEXT), in which case
6145 it is appended at the end of the given string vector SV.
6146
6147 ORIG_TEXT is the string original string from the user command
6148 that needs to be completed. WORD is the entire command on which
6149 completion should be performed. These two parameters are used to
6150 determine which part of the symbol name should be added to the
6151 completion vector.
c0af1706 6152 if WILD_MATCH_P is set, then wild matching is performed.
cb8e9b97 6153 ENCODED_P should be set if TEXT represents a symbol name in its
41d27058
JB
6154 encoded formed (in which case the completion should also be
6155 encoded). */
6156
6157static void
d6565258 6158symbol_completion_add (VEC(char_ptr) **sv,
41d27058
JB
6159 const char *sym_name,
6160 const char *text, int text_len,
6161 const char *orig_text, const char *word,
cb8e9b97 6162 int wild_match_p, int encoded_p)
41d27058
JB
6163{
6164 const char *match = symbol_completion_match (sym_name, text, text_len,
cb8e9b97 6165 wild_match_p, encoded_p);
41d27058
JB
6166 char *completion;
6167
6168 if (match == NULL)
6169 return;
6170
6171 /* We found a match, so add the appropriate completion to the given
6172 string vector. */
6173
6174 if (word == orig_text)
6175 {
6176 completion = xmalloc (strlen (match) + 5);
6177 strcpy (completion, match);
6178 }
6179 else if (word > orig_text)
6180 {
6181 /* Return some portion of sym_name. */
6182 completion = xmalloc (strlen (match) + 5);
6183 strcpy (completion, match + (word - orig_text));
6184 }
6185 else
6186 {
6187 /* Return some of ORIG_TEXT plus sym_name. */
6188 completion = xmalloc (strlen (match) + (orig_text - word) + 5);
6189 strncpy (completion, word, orig_text - word);
6190 completion[orig_text - word] = '\0';
6191 strcat (completion, match);
6192 }
6193
d6565258 6194 VEC_safe_push (char_ptr, *sv, completion);
41d27058
JB
6195}
6196
ccefe4c4 6197/* An object of this type is passed as the user_data argument to the
bb4142cf 6198 expand_symtabs_matching method. */
ccefe4c4
TT
6199struct add_partial_datum
6200{
6201 VEC(char_ptr) **completions;
6f937416 6202 const char *text;
ccefe4c4 6203 int text_len;
6f937416
PA
6204 const char *text0;
6205 const char *word;
ccefe4c4
TT
6206 int wild_match;
6207 int encoded;
6208};
6209
bb4142cf
DE
6210/* A callback for expand_symtabs_matching. */
6211
7b08b9eb 6212static int
bb4142cf 6213ada_complete_symbol_matcher (const char *name, void *user_data)
ccefe4c4
TT
6214{
6215 struct add_partial_datum *data = user_data;
7b08b9eb
JK
6216
6217 return symbol_completion_match (name, data->text, data->text_len,
6218 data->wild_match, data->encoded) != NULL;
ccefe4c4
TT
6219}
6220
49c4e619
TT
6221/* Return a list of possible symbol names completing TEXT0. WORD is
6222 the entire command on which completion is made. */
41d27058 6223
49c4e619 6224static VEC (char_ptr) *
6f937416
PA
6225ada_make_symbol_completion_list (const char *text0, const char *word,
6226 enum type_code code)
41d27058
JB
6227{
6228 char *text;
6229 int text_len;
b1ed564a
JB
6230 int wild_match_p;
6231 int encoded_p;
2ba95b9b 6232 VEC(char_ptr) *completions = VEC_alloc (char_ptr, 128);
41d27058 6233 struct symbol *sym;
43f3e411 6234 struct compunit_symtab *s;
41d27058
JB
6235 struct minimal_symbol *msymbol;
6236 struct objfile *objfile;
3977b71f 6237 const struct block *b, *surrounding_static_block = 0;
41d27058 6238 int i;
8157b174 6239 struct block_iterator iter;
b8fea896 6240 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
41d27058 6241
2f68a895
TT
6242 gdb_assert (code == TYPE_CODE_UNDEF);
6243
41d27058
JB
6244 if (text0[0] == '<')
6245 {
6246 text = xstrdup (text0);
6247 make_cleanup (xfree, text);
6248 text_len = strlen (text);
b1ed564a
JB
6249 wild_match_p = 0;
6250 encoded_p = 1;
41d27058
JB
6251 }
6252 else
6253 {
6254 text = xstrdup (ada_encode (text0));
6255 make_cleanup (xfree, text);
6256 text_len = strlen (text);
6257 for (i = 0; i < text_len; i++)
6258 text[i] = tolower (text[i]);
6259
b1ed564a 6260 encoded_p = (strstr (text0, "__") != NULL);
41d27058
JB
6261 /* If the name contains a ".", then the user is entering a fully
6262 qualified entity name, and the match must not be done in wild
6263 mode. Similarly, if the user wants to complete what looks like
6264 an encoded name, the match must not be done in wild mode. */
b1ed564a 6265 wild_match_p = (strchr (text0, '.') == NULL && !encoded_p);
41d27058
JB
6266 }
6267
6268 /* First, look at the partial symtab symbols. */
41d27058 6269 {
ccefe4c4
TT
6270 struct add_partial_datum data;
6271
6272 data.completions = &completions;
6273 data.text = text;
6274 data.text_len = text_len;
6275 data.text0 = text0;
6276 data.word = word;
b1ed564a
JB
6277 data.wild_match = wild_match_p;
6278 data.encoded = encoded_p;
276d885b
GB
6279 expand_symtabs_matching (NULL, ada_complete_symbol_matcher, NULL,
6280 ALL_DOMAIN, &data);
41d27058
JB
6281 }
6282
6283 /* At this point scan through the misc symbol vectors and add each
6284 symbol you find to the list. Eventually we want to ignore
6285 anything that isn't a text symbol (everything else will be
6286 handled by the psymtab code above). */
6287
6288 ALL_MSYMBOLS (objfile, msymbol)
6289 {
6290 QUIT;
efd66ac6 6291 symbol_completion_add (&completions, MSYMBOL_LINKAGE_NAME (msymbol),
b1ed564a
JB
6292 text, text_len, text0, word, wild_match_p,
6293 encoded_p);
41d27058
JB
6294 }
6295
6296 /* Search upwards from currently selected frame (so that we can
6297 complete on local vars. */
6298
6299 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6300 {
6301 if (!BLOCK_SUPERBLOCK (b))
6302 surrounding_static_block = b; /* For elmin of dups */
6303
6304 ALL_BLOCK_SYMBOLS (b, iter, sym)
6305 {
d6565258 6306 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6307 text, text_len, text0, word,
b1ed564a 6308 wild_match_p, encoded_p);
41d27058
JB
6309 }
6310 }
6311
6312 /* Go through the symtabs and check the externs and statics for
43f3e411 6313 symbols which match. */
41d27058 6314
43f3e411 6315 ALL_COMPUNITS (objfile, s)
41d27058
JB
6316 {
6317 QUIT;
43f3e411 6318 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
41d27058
JB
6319 ALL_BLOCK_SYMBOLS (b, iter, sym)
6320 {
d6565258 6321 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6322 text, text_len, text0, word,
b1ed564a 6323 wild_match_p, encoded_p);
41d27058
JB
6324 }
6325 }
6326
43f3e411 6327 ALL_COMPUNITS (objfile, s)
41d27058
JB
6328 {
6329 QUIT;
43f3e411 6330 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
41d27058
JB
6331 /* Don't do this block twice. */
6332 if (b == surrounding_static_block)
6333 continue;
6334 ALL_BLOCK_SYMBOLS (b, iter, sym)
6335 {
d6565258 6336 symbol_completion_add (&completions, SYMBOL_LINKAGE_NAME (sym),
41d27058 6337 text, text_len, text0, word,
b1ed564a 6338 wild_match_p, encoded_p);
41d27058
JB
6339 }
6340 }
6341
b8fea896 6342 do_cleanups (old_chain);
49c4e619 6343 return completions;
41d27058
JB
6344}
6345
963a6417 6346 /* Field Access */
96d887e8 6347
73fb9985
JB
6348/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6349 for tagged types. */
6350
6351static int
6352ada_is_dispatch_table_ptr_type (struct type *type)
6353{
0d5cff50 6354 const char *name;
73fb9985
JB
6355
6356 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6357 return 0;
6358
6359 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6360 if (name == NULL)
6361 return 0;
6362
6363 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6364}
6365
ac4a2da4
JG
6366/* Return non-zero if TYPE is an interface tag. */
6367
6368static int
6369ada_is_interface_tag (struct type *type)
6370{
6371 const char *name = TYPE_NAME (type);
6372
6373 if (name == NULL)
6374 return 0;
6375
6376 return (strcmp (name, "ada__tags__interface_tag") == 0);
6377}
6378
963a6417
PH
6379/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6380 to be invisible to users. */
96d887e8 6381
963a6417
PH
6382int
6383ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6384{
963a6417
PH
6385 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6386 return 1;
ffde82bf 6387
73fb9985
JB
6388 /* Check the name of that field. */
6389 {
6390 const char *name = TYPE_FIELD_NAME (type, field_num);
6391
6392 /* Anonymous field names should not be printed.
6393 brobecker/2007-02-20: I don't think this can actually happen
6394 but we don't want to print the value of annonymous fields anyway. */
6395 if (name == NULL)
6396 return 1;
6397
ffde82bf
JB
6398 /* Normally, fields whose name start with an underscore ("_")
6399 are fields that have been internally generated by the compiler,
6400 and thus should not be printed. The "_parent" field is special,
6401 however: This is a field internally generated by the compiler
6402 for tagged types, and it contains the components inherited from
6403 the parent type. This field should not be printed as is, but
6404 should not be ignored either. */
61012eef 6405 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6406 return 1;
6407 }
6408
ac4a2da4
JG
6409 /* If this is the dispatch table of a tagged type or an interface tag,
6410 then ignore. */
73fb9985 6411 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6412 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6413 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6414 return 1;
6415
6416 /* Not a special field, so it should not be ignored. */
6417 return 0;
963a6417 6418}
96d887e8 6419
963a6417 6420/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6421 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6422
963a6417
PH
6423int
6424ada_is_tagged_type (struct type *type, int refok)
6425{
6426 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1, NULL) != NULL);
6427}
96d887e8 6428
963a6417 6429/* True iff TYPE represents the type of X'Tag */
96d887e8 6430
963a6417
PH
6431int
6432ada_is_tag_type (struct type *type)
6433{
460efde1
JB
6434 type = ada_check_typedef (type);
6435
963a6417
PH
6436 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6437 return 0;
6438 else
96d887e8 6439 {
963a6417 6440 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6441
963a6417
PH
6442 return (name != NULL
6443 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6444 }
96d887e8
PH
6445}
6446
963a6417 6447/* The type of the tag on VAL. */
76a01679 6448
963a6417
PH
6449struct type *
6450ada_tag_type (struct value *val)
96d887e8 6451{
df407dfe 6452 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0, NULL);
963a6417 6453}
96d887e8 6454
b50d69b5
JG
6455/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6456 retired at Ada 05). */
6457
6458static int
6459is_ada95_tag (struct value *tag)
6460{
6461 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6462}
6463
963a6417 6464/* The value of the tag on VAL. */
96d887e8 6465
963a6417
PH
6466struct value *
6467ada_value_tag (struct value *val)
6468{
03ee6b2e 6469 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6470}
6471
963a6417
PH
6472/* The value of the tag on the object of type TYPE whose contents are
6473 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6474 ADDRESS. */
96d887e8 6475
963a6417 6476static struct value *
10a2c479 6477value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6478 const gdb_byte *valaddr,
963a6417 6479 CORE_ADDR address)
96d887e8 6480{
b5385fc0 6481 int tag_byte_offset;
963a6417 6482 struct type *tag_type;
5b4ee69b 6483
963a6417 6484 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6485 NULL, NULL, NULL))
96d887e8 6486 {
fc1a4b47 6487 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6488 ? NULL
6489 : valaddr + tag_byte_offset);
963a6417 6490 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6491
963a6417 6492 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6493 }
963a6417
PH
6494 return NULL;
6495}
96d887e8 6496
963a6417
PH
6497static struct type *
6498type_from_tag (struct value *tag)
6499{
6500 const char *type_name = ada_tag_name (tag);
5b4ee69b 6501
963a6417
PH
6502 if (type_name != NULL)
6503 return ada_find_any_type (ada_encode (type_name));
6504 return NULL;
6505}
96d887e8 6506
b50d69b5
JG
6507/* Given a value OBJ of a tagged type, return a value of this
6508 type at the base address of the object. The base address, as
6509 defined in Ada.Tags, it is the address of the primary tag of
6510 the object, and therefore where the field values of its full
6511 view can be fetched. */
6512
6513struct value *
6514ada_tag_value_at_base_address (struct value *obj)
6515{
b50d69b5
JG
6516 struct value *val;
6517 LONGEST offset_to_top = 0;
6518 struct type *ptr_type, *obj_type;
6519 struct value *tag;
6520 CORE_ADDR base_address;
6521
6522 obj_type = value_type (obj);
6523
6524 /* It is the responsability of the caller to deref pointers. */
6525
6526 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6527 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6528 return obj;
6529
6530 tag = ada_value_tag (obj);
6531 if (!tag)
6532 return obj;
6533
6534 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6535
6536 if (is_ada95_tag (tag))
6537 return obj;
6538
6539 ptr_type = builtin_type (target_gdbarch ())->builtin_data_ptr;
6540 ptr_type = lookup_pointer_type (ptr_type);
6541 val = value_cast (ptr_type, tag);
6542 if (!val)
6543 return obj;
6544
6545 /* It is perfectly possible that an exception be raised while
6546 trying to determine the base address, just like for the tag;
6547 see ada_tag_name for more details. We do not print the error
6548 message for the same reason. */
6549
492d29ea 6550 TRY
b50d69b5
JG
6551 {
6552 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6553 }
6554
492d29ea
PA
6555 CATCH (e, RETURN_MASK_ERROR)
6556 {
6557 return obj;
6558 }
6559 END_CATCH
b50d69b5
JG
6560
6561 /* If offset is null, nothing to do. */
6562
6563 if (offset_to_top == 0)
6564 return obj;
6565
6566 /* -1 is a special case in Ada.Tags; however, what should be done
6567 is not quite clear from the documentation. So do nothing for
6568 now. */
6569
6570 if (offset_to_top == -1)
6571 return obj;
6572
6573 base_address = value_address (obj) - offset_to_top;
6574 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6575
6576 /* Make sure that we have a proper tag at the new address.
6577 Otherwise, offset_to_top is bogus (which can happen when
6578 the object is not initialized yet). */
6579
6580 if (!tag)
6581 return obj;
6582
6583 obj_type = type_from_tag (tag);
6584
6585 if (!obj_type)
6586 return obj;
6587
6588 return value_from_contents_and_address (obj_type, NULL, base_address);
6589}
6590
1b611343
JB
6591/* Return the "ada__tags__type_specific_data" type. */
6592
6593static struct type *
6594ada_get_tsd_type (struct inferior *inf)
963a6417 6595{
1b611343 6596 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6597
1b611343
JB
6598 if (data->tsd_type == 0)
6599 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6600 return data->tsd_type;
6601}
529cad9c 6602
1b611343
JB
6603/* Return the TSD (type-specific data) associated to the given TAG.
6604 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6605
1b611343 6606 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6607
1b611343
JB
6608static struct value *
6609ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6610{
4c4b4cd2 6611 struct value *val;
1b611343 6612 struct type *type;
5b4ee69b 6613
1b611343
JB
6614 /* First option: The TSD is simply stored as a field of our TAG.
6615 Only older versions of GNAT would use this format, but we have
6616 to test it first, because there are no visible markers for
6617 the current approach except the absence of that field. */
529cad9c 6618
1b611343
JB
6619 val = ada_value_struct_elt (tag, "tsd", 1);
6620 if (val)
6621 return val;
e802dbe0 6622
1b611343
JB
6623 /* Try the second representation for the dispatch table (in which
6624 there is no explicit 'tsd' field in the referent of the tag pointer,
6625 and instead the tsd pointer is stored just before the dispatch
6626 table. */
e802dbe0 6627
1b611343
JB
6628 type = ada_get_tsd_type (current_inferior());
6629 if (type == NULL)
6630 return NULL;
6631 type = lookup_pointer_type (lookup_pointer_type (type));
6632 val = value_cast (type, tag);
6633 if (val == NULL)
6634 return NULL;
6635 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6636}
6637
1b611343
JB
6638/* Given the TSD of a tag (type-specific data), return a string
6639 containing the name of the associated type.
6640
6641 The returned value is good until the next call. May return NULL
6642 if we are unable to determine the tag name. */
6643
6644static char *
6645ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6646{
529cad9c
PH
6647 static char name[1024];
6648 char *p;
1b611343 6649 struct value *val;
529cad9c 6650
1b611343 6651 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6652 if (val == NULL)
1b611343 6653 return NULL;
4c4b4cd2
PH
6654 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6655 for (p = name; *p != '\0'; p += 1)
6656 if (isalpha (*p))
6657 *p = tolower (*p);
1b611343 6658 return name;
4c4b4cd2
PH
6659}
6660
6661/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6662 a C string.
6663
6664 Return NULL if the TAG is not an Ada tag, or if we were unable to
6665 determine the name of that tag. The result is good until the next
6666 call. */
4c4b4cd2
PH
6667
6668const char *
6669ada_tag_name (struct value *tag)
6670{
1b611343 6671 char *name = NULL;
5b4ee69b 6672
df407dfe 6673 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6674 return NULL;
1b611343
JB
6675
6676 /* It is perfectly possible that an exception be raised while trying
6677 to determine the TAG's name, even under normal circumstances:
6678 The associated variable may be uninitialized or corrupted, for
6679 instance. We do not let any exception propagate past this point.
6680 instead we return NULL.
6681
6682 We also do not print the error message either (which often is very
6683 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6684 the caller print a more meaningful message if necessary. */
492d29ea 6685 TRY
1b611343
JB
6686 {
6687 struct value *tsd = ada_get_tsd_from_tag (tag);
6688
6689 if (tsd != NULL)
6690 name = ada_tag_name_from_tsd (tsd);
6691 }
492d29ea
PA
6692 CATCH (e, RETURN_MASK_ERROR)
6693 {
6694 }
6695 END_CATCH
1b611343
JB
6696
6697 return name;
4c4b4cd2
PH
6698}
6699
6700/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6701
d2e4a39e 6702struct type *
ebf56fd3 6703ada_parent_type (struct type *type)
14f9c5c9
AS
6704{
6705 int i;
6706
61ee279c 6707 type = ada_check_typedef (type);
14f9c5c9
AS
6708
6709 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6710 return NULL;
6711
6712 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6713 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6714 {
6715 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6716
6717 /* If the _parent field is a pointer, then dereference it. */
6718 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6719 parent_type = TYPE_TARGET_TYPE (parent_type);
6720 /* If there is a parallel XVS type, get the actual base type. */
6721 parent_type = ada_get_base_type (parent_type);
6722
6723 return ada_check_typedef (parent_type);
6724 }
14f9c5c9
AS
6725
6726 return NULL;
6727}
6728
4c4b4cd2
PH
6729/* True iff field number FIELD_NUM of structure type TYPE contains the
6730 parent-type (inherited) fields of a derived type. Assumes TYPE is
6731 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6732
6733int
ebf56fd3 6734ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6735{
61ee279c 6736 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6737
4c4b4cd2 6738 return (name != NULL
61012eef
GB
6739 && (startswith (name, "PARENT")
6740 || startswith (name, "_parent")));
14f9c5c9
AS
6741}
6742
4c4b4cd2 6743/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6744 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6745 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6746 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6747 structures. */
14f9c5c9
AS
6748
6749int
ebf56fd3 6750ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6751{
d2e4a39e 6752 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6753
d2e4a39e 6754 return (name != NULL
61012eef 6755 && (startswith (name, "PARENT")
4c4b4cd2 6756 || strcmp (name, "REP") == 0
61012eef 6757 || startswith (name, "_parent")
4c4b4cd2 6758 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6759}
6760
4c4b4cd2
PH
6761/* True iff field number FIELD_NUM of structure or union type TYPE
6762 is a variant wrapper. Assumes TYPE is a structure type with at least
6763 FIELD_NUM+1 fields. */
14f9c5c9
AS
6764
6765int
ebf56fd3 6766ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6767{
d2e4a39e 6768 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6769
14f9c5c9 6770 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6771 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6772 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6773 == TYPE_CODE_UNION)));
14f9c5c9
AS
6774}
6775
6776/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6777 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6778 returns the type of the controlling discriminant for the variant.
6779 May return NULL if the type could not be found. */
14f9c5c9 6780
d2e4a39e 6781struct type *
ebf56fd3 6782ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6783{
d2e4a39e 6784 char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6785
7c964f07 6786 return ada_lookup_struct_elt_type (outer_type, name, 1, 1, NULL);
14f9c5c9
AS
6787}
6788
4c4b4cd2 6789/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6790 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6791 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6792
6793int
ebf56fd3 6794ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6795{
d2e4a39e 6796 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6797
14f9c5c9
AS
6798 return (name != NULL && name[0] == 'O');
6799}
6800
6801/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6802 returns the name of the discriminant controlling the variant.
6803 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6804
d2e4a39e 6805char *
ebf56fd3 6806ada_variant_discrim_name (struct type *type0)
14f9c5c9 6807{
d2e4a39e 6808 static char *result = NULL;
14f9c5c9 6809 static size_t result_len = 0;
d2e4a39e
AS
6810 struct type *type;
6811 const char *name;
6812 const char *discrim_end;
6813 const char *discrim_start;
14f9c5c9
AS
6814
6815 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6816 type = TYPE_TARGET_TYPE (type0);
6817 else
6818 type = type0;
6819
6820 name = ada_type_name (type);
6821
6822 if (name == NULL || name[0] == '\000')
6823 return "";
6824
6825 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6826 discrim_end -= 1)
6827 {
61012eef 6828 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6829 break;
14f9c5c9
AS
6830 }
6831 if (discrim_end == name)
6832 return "";
6833
d2e4a39e 6834 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6835 discrim_start -= 1)
6836 {
d2e4a39e 6837 if (discrim_start == name + 1)
4c4b4cd2 6838 return "";
76a01679 6839 if ((discrim_start > name + 3
61012eef 6840 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
6841 || discrim_start[-1] == '.')
6842 break;
14f9c5c9
AS
6843 }
6844
6845 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6846 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6847 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6848 return result;
6849}
6850
4c4b4cd2
PH
6851/* Scan STR for a subtype-encoded number, beginning at position K.
6852 Put the position of the character just past the number scanned in
6853 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6854 Return 1 if there was a valid number at the given position, and 0
6855 otherwise. A "subtype-encoded" number consists of the absolute value
6856 in decimal, followed by the letter 'm' to indicate a negative number.
6857 Assumes 0m does not occur. */
14f9c5c9
AS
6858
6859int
d2e4a39e 6860ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6861{
6862 ULONGEST RU;
6863
d2e4a39e 6864 if (!isdigit (str[k]))
14f9c5c9
AS
6865 return 0;
6866
4c4b4cd2 6867 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6868 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6869 LONGEST. */
14f9c5c9
AS
6870 RU = 0;
6871 while (isdigit (str[k]))
6872 {
d2e4a39e 6873 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6874 k += 1;
6875 }
6876
d2e4a39e 6877 if (str[k] == 'm')
14f9c5c9
AS
6878 {
6879 if (R != NULL)
4c4b4cd2 6880 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6881 k += 1;
6882 }
6883 else if (R != NULL)
6884 *R = (LONGEST) RU;
6885
4c4b4cd2 6886 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
6887 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
6888 number representable as a LONGEST (although either would probably work
6889 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 6890 above is always equivalent to the negative of RU. */
14f9c5c9
AS
6891
6892 if (new_k != NULL)
6893 *new_k = k;
6894 return 1;
6895}
6896
4c4b4cd2
PH
6897/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
6898 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
6899 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 6900
d2e4a39e 6901int
ebf56fd3 6902ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 6903{
d2e4a39e 6904 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
6905 int p;
6906
6907 p = 0;
6908 while (1)
6909 {
d2e4a39e 6910 switch (name[p])
4c4b4cd2
PH
6911 {
6912 case '\0':
6913 return 0;
6914 case 'S':
6915 {
6916 LONGEST W;
5b4ee69b 6917
4c4b4cd2
PH
6918 if (!ada_scan_number (name, p + 1, &W, &p))
6919 return 0;
6920 if (val == W)
6921 return 1;
6922 break;
6923 }
6924 case 'R':
6925 {
6926 LONGEST L, U;
5b4ee69b 6927
4c4b4cd2
PH
6928 if (!ada_scan_number (name, p + 1, &L, &p)
6929 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
6930 return 0;
6931 if (val >= L && val <= U)
6932 return 1;
6933 break;
6934 }
6935 case 'O':
6936 return 1;
6937 default:
6938 return 0;
6939 }
6940 }
6941}
6942
0963b4bd 6943/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
6944
6945/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
6946 ARG_TYPE, extract and return the value of one of its (non-static)
6947 fields. FIELDNO says which field. Differs from value_primitive_field
6948 only in that it can handle packed values of arbitrary type. */
14f9c5c9 6949
4c4b4cd2 6950static struct value *
d2e4a39e 6951ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 6952 struct type *arg_type)
14f9c5c9 6953{
14f9c5c9
AS
6954 struct type *type;
6955
61ee279c 6956 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
6957 type = TYPE_FIELD_TYPE (arg_type, fieldno);
6958
4c4b4cd2 6959 /* Handle packed fields. */
14f9c5c9
AS
6960
6961 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0)
6962 {
6963 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
6964 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 6965
0fd88904 6966 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
6967 offset + bit_pos / 8,
6968 bit_pos % 8, bit_size, type);
14f9c5c9
AS
6969 }
6970 else
6971 return value_primitive_field (arg1, offset, fieldno, arg_type);
6972}
6973
52ce6436
PH
6974/* Find field with name NAME in object of type TYPE. If found,
6975 set the following for each argument that is non-null:
6976 - *FIELD_TYPE_P to the field's type;
6977 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
6978 an object of that type;
6979 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
6980 - *BIT_SIZE_P to its size in bits if the field is packed, and
6981 0 otherwise;
6982 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
6983 fields up to but not including the desired field, or by the total
6984 number of fields if not found. A NULL value of NAME never
6985 matches; the function just counts visible fields in this case.
6986
0963b4bd 6987 Returns 1 if found, 0 otherwise. */
52ce6436 6988
4c4b4cd2 6989static int
0d5cff50 6990find_struct_field (const char *name, struct type *type, int offset,
76a01679 6991 struct type **field_type_p,
52ce6436
PH
6992 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
6993 int *index_p)
4c4b4cd2
PH
6994{
6995 int i;
6996
61ee279c 6997 type = ada_check_typedef (type);
76a01679 6998
52ce6436
PH
6999 if (field_type_p != NULL)
7000 *field_type_p = NULL;
7001 if (byte_offset_p != NULL)
d5d6fca5 7002 *byte_offset_p = 0;
52ce6436
PH
7003 if (bit_offset_p != NULL)
7004 *bit_offset_p = 0;
7005 if (bit_size_p != NULL)
7006 *bit_size_p = 0;
7007
7008 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
7009 {
7010 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7011 int fld_offset = offset + bit_pos / 8;
0d5cff50 7012 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7013
4c4b4cd2
PH
7014 if (t_field_name == NULL)
7015 continue;
7016
52ce6436 7017 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7018 {
7019 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7020
52ce6436
PH
7021 if (field_type_p != NULL)
7022 *field_type_p = TYPE_FIELD_TYPE (type, i);
7023 if (byte_offset_p != NULL)
7024 *byte_offset_p = fld_offset;
7025 if (bit_offset_p != NULL)
7026 *bit_offset_p = bit_pos % 8;
7027 if (bit_size_p != NULL)
7028 *bit_size_p = bit_size;
76a01679
JB
7029 return 1;
7030 }
4c4b4cd2
PH
7031 else if (ada_is_wrapper_field (type, i))
7032 {
52ce6436
PH
7033 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7034 field_type_p, byte_offset_p, bit_offset_p,
7035 bit_size_p, index_p))
76a01679
JB
7036 return 1;
7037 }
4c4b4cd2
PH
7038 else if (ada_is_variant_part (type, i))
7039 {
52ce6436
PH
7040 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7041 fixed type?? */
4c4b4cd2 7042 int j;
52ce6436
PH
7043 struct type *field_type
7044 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7045
52ce6436 7046 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7047 {
76a01679
JB
7048 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7049 fld_offset
7050 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7051 field_type_p, byte_offset_p,
52ce6436 7052 bit_offset_p, bit_size_p, index_p))
76a01679 7053 return 1;
4c4b4cd2
PH
7054 }
7055 }
52ce6436
PH
7056 else if (index_p != NULL)
7057 *index_p += 1;
4c4b4cd2
PH
7058 }
7059 return 0;
7060}
7061
0963b4bd 7062/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7063
52ce6436
PH
7064static int
7065num_visible_fields (struct type *type)
7066{
7067 int n;
5b4ee69b 7068
52ce6436
PH
7069 n = 0;
7070 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7071 return n;
7072}
14f9c5c9 7073
4c4b4cd2 7074/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7075 and search in it assuming it has (class) type TYPE.
7076 If found, return value, else return NULL.
7077
4c4b4cd2 7078 Searches recursively through wrapper fields (e.g., '_parent'). */
14f9c5c9 7079
4c4b4cd2 7080static struct value *
d2e4a39e 7081ada_search_struct_field (char *name, struct value *arg, int offset,
4c4b4cd2 7082 struct type *type)
14f9c5c9
AS
7083{
7084 int i;
14f9c5c9 7085
5b4ee69b 7086 type = ada_check_typedef (type);
52ce6436 7087 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7088 {
0d5cff50 7089 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7090
7091 if (t_field_name == NULL)
4c4b4cd2 7092 continue;
14f9c5c9
AS
7093
7094 else if (field_name_match (t_field_name, name))
4c4b4cd2 7095 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7096
7097 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7098 {
0963b4bd 7099 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7100 ada_search_struct_field (name, arg,
7101 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7102 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7103
4c4b4cd2
PH
7104 if (v != NULL)
7105 return v;
7106 }
14f9c5c9
AS
7107
7108 else if (ada_is_variant_part (type, i))
4c4b4cd2 7109 {
0963b4bd 7110 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7111 int j;
5b4ee69b
MS
7112 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7113 i));
4c4b4cd2
PH
7114 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7115
52ce6436 7116 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7117 {
0963b4bd
MS
7118 struct value *v = ada_search_struct_field /* Force line
7119 break. */
06d5cf63
JB
7120 (name, arg,
7121 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7122 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7123
4c4b4cd2
PH
7124 if (v != NULL)
7125 return v;
7126 }
7127 }
14f9c5c9
AS
7128 }
7129 return NULL;
7130}
d2e4a39e 7131
52ce6436
PH
7132static struct value *ada_index_struct_field_1 (int *, struct value *,
7133 int, struct type *);
7134
7135
7136/* Return field #INDEX in ARG, where the index is that returned by
7137 * find_struct_field through its INDEX_P argument. Adjust the address
7138 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7139 * If found, return value, else return NULL. */
52ce6436
PH
7140
7141static struct value *
7142ada_index_struct_field (int index, struct value *arg, int offset,
7143 struct type *type)
7144{
7145 return ada_index_struct_field_1 (&index, arg, offset, type);
7146}
7147
7148
7149/* Auxiliary function for ada_index_struct_field. Like
7150 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7151 * *INDEX_P. */
52ce6436
PH
7152
7153static struct value *
7154ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7155 struct type *type)
7156{
7157 int i;
7158 type = ada_check_typedef (type);
7159
7160 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7161 {
7162 if (TYPE_FIELD_NAME (type, i) == NULL)
7163 continue;
7164 else if (ada_is_wrapper_field (type, i))
7165 {
0963b4bd 7166 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7167 ada_index_struct_field_1 (index_p, arg,
7168 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7169 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7170
52ce6436
PH
7171 if (v != NULL)
7172 return v;
7173 }
7174
7175 else if (ada_is_variant_part (type, i))
7176 {
7177 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7178 find_struct_field. */
52ce6436
PH
7179 error (_("Cannot assign this kind of variant record"));
7180 }
7181 else if (*index_p == 0)
7182 return ada_value_primitive_field (arg, offset, i, type);
7183 else
7184 *index_p -= 1;
7185 }
7186 return NULL;
7187}
7188
4c4b4cd2
PH
7189/* Given ARG, a value of type (pointer or reference to a)*
7190 structure/union, extract the component named NAME from the ultimate
7191 target structure/union and return it as a value with its
f5938064 7192 appropriate type.
14f9c5c9 7193
4c4b4cd2
PH
7194 The routine searches for NAME among all members of the structure itself
7195 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7196 (e.g., '_parent').
7197
03ee6b2e
PH
7198 If NO_ERR, then simply return NULL in case of error, rather than
7199 calling error. */
14f9c5c9 7200
d2e4a39e 7201struct value *
03ee6b2e 7202ada_value_struct_elt (struct value *arg, char *name, int no_err)
14f9c5c9 7203{
4c4b4cd2 7204 struct type *t, *t1;
d2e4a39e 7205 struct value *v;
14f9c5c9 7206
4c4b4cd2 7207 v = NULL;
df407dfe 7208 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7209 if (TYPE_CODE (t) == TYPE_CODE_REF)
7210 {
7211 t1 = TYPE_TARGET_TYPE (t);
7212 if (t1 == NULL)
03ee6b2e 7213 goto BadValue;
61ee279c 7214 t1 = ada_check_typedef (t1);
4c4b4cd2 7215 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7216 {
994b9211 7217 arg = coerce_ref (arg);
76a01679
JB
7218 t = t1;
7219 }
4c4b4cd2 7220 }
14f9c5c9 7221
4c4b4cd2
PH
7222 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7223 {
7224 t1 = TYPE_TARGET_TYPE (t);
7225 if (t1 == NULL)
03ee6b2e 7226 goto BadValue;
61ee279c 7227 t1 = ada_check_typedef (t1);
4c4b4cd2 7228 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7229 {
7230 arg = value_ind (arg);
7231 t = t1;
7232 }
4c4b4cd2 7233 else
76a01679 7234 break;
4c4b4cd2 7235 }
14f9c5c9 7236
4c4b4cd2 7237 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7238 goto BadValue;
14f9c5c9 7239
4c4b4cd2
PH
7240 if (t1 == t)
7241 v = ada_search_struct_field (name, arg, 0, t);
7242 else
7243 {
7244 int bit_offset, bit_size, byte_offset;
7245 struct type *field_type;
7246 CORE_ADDR address;
7247
76a01679 7248 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7249 address = value_address (ada_value_ind (arg));
4c4b4cd2 7250 else
b50d69b5 7251 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7252
1ed6ede0 7253 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL, address, NULL, 1);
76a01679
JB
7254 if (find_struct_field (name, t1, 0,
7255 &field_type, &byte_offset, &bit_offset,
52ce6436 7256 &bit_size, NULL))
76a01679
JB
7257 {
7258 if (bit_size != 0)
7259 {
714e53ab
PH
7260 if (TYPE_CODE (t) == TYPE_CODE_REF)
7261 arg = ada_coerce_ref (arg);
7262 else
7263 arg = ada_value_ind (arg);
76a01679
JB
7264 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7265 bit_offset, bit_size,
7266 field_type);
7267 }
7268 else
f5938064 7269 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7270 }
7271 }
7272
03ee6b2e
PH
7273 if (v != NULL || no_err)
7274 return v;
7275 else
323e0a4a 7276 error (_("There is no member named %s."), name);
14f9c5c9 7277
03ee6b2e
PH
7278 BadValue:
7279 if (no_err)
7280 return NULL;
7281 else
0963b4bd
MS
7282 error (_("Attempt to extract a component of "
7283 "a value that is not a record."));
14f9c5c9
AS
7284}
7285
7286/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7287 If DISPP is non-null, add its byte displacement from the beginning of a
7288 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7289 work for packed fields).
7290
7291 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7292 followed by "___".
14f9c5c9 7293
0963b4bd 7294 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7295 be a (pointer or reference)+ to a struct or union, and the
7296 ultimate target type will be searched.
14f9c5c9
AS
7297
7298 Looks recursively into variant clauses and parent types.
7299
4c4b4cd2
PH
7300 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7301 TYPE is not a type of the right kind. */
14f9c5c9 7302
4c4b4cd2 7303static struct type *
76a01679
JB
7304ada_lookup_struct_elt_type (struct type *type, char *name, int refok,
7305 int noerr, int *dispp)
14f9c5c9
AS
7306{
7307 int i;
7308
7309 if (name == NULL)
7310 goto BadName;
7311
76a01679 7312 if (refok && type != NULL)
4c4b4cd2
PH
7313 while (1)
7314 {
61ee279c 7315 type = ada_check_typedef (type);
76a01679
JB
7316 if (TYPE_CODE (type) != TYPE_CODE_PTR
7317 && TYPE_CODE (type) != TYPE_CODE_REF)
7318 break;
7319 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7320 }
14f9c5c9 7321
76a01679 7322 if (type == NULL
1265e4aa
JB
7323 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7324 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7325 {
4c4b4cd2 7326 if (noerr)
76a01679 7327 return NULL;
4c4b4cd2 7328 else
76a01679
JB
7329 {
7330 target_terminal_ours ();
7331 gdb_flush (gdb_stdout);
323e0a4a
AC
7332 if (type == NULL)
7333 error (_("Type (null) is not a structure or union type"));
7334 else
7335 {
7336 /* XXX: type_sprint */
7337 fprintf_unfiltered (gdb_stderr, _("Type "));
7338 type_print (type, "", gdb_stderr, -1);
7339 error (_(" is not a structure or union type"));
7340 }
76a01679 7341 }
14f9c5c9
AS
7342 }
7343
7344 type = to_static_fixed_type (type);
7345
7346 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7347 {
0d5cff50 7348 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7349 struct type *t;
7350 int disp;
d2e4a39e 7351
14f9c5c9 7352 if (t_field_name == NULL)
4c4b4cd2 7353 continue;
14f9c5c9
AS
7354
7355 else if (field_name_match (t_field_name, name))
4c4b4cd2
PH
7356 {
7357 if (dispp != NULL)
7358 *dispp += TYPE_FIELD_BITPOS (type, i) / 8;
460efde1 7359 return TYPE_FIELD_TYPE (type, i);
4c4b4cd2 7360 }
14f9c5c9
AS
7361
7362 else if (ada_is_wrapper_field (type, i))
4c4b4cd2
PH
7363 {
7364 disp = 0;
7365 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
7366 0, 1, &disp);
7367 if (t != NULL)
7368 {
7369 if (dispp != NULL)
7370 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7371 return t;
7372 }
7373 }
14f9c5c9
AS
7374
7375 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7376 {
7377 int j;
5b4ee69b
MS
7378 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7379 i));
4c4b4cd2
PH
7380
7381 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7382 {
b1f33ddd
JB
7383 /* FIXME pnh 2008/01/26: We check for a field that is
7384 NOT wrapped in a struct, since the compiler sometimes
7385 generates these for unchecked variant types. Revisit
0963b4bd 7386 if the compiler changes this practice. */
0d5cff50 7387 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
4c4b4cd2 7388 disp = 0;
b1f33ddd
JB
7389 if (v_field_name != NULL
7390 && field_name_match (v_field_name, name))
460efde1 7391 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7392 else
0963b4bd
MS
7393 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7394 j),
b1f33ddd
JB
7395 name, 0, 1, &disp);
7396
4c4b4cd2
PH
7397 if (t != NULL)
7398 {
7399 if (dispp != NULL)
7400 *dispp += disp + TYPE_FIELD_BITPOS (type, i) / 8;
7401 return t;
7402 }
7403 }
7404 }
14f9c5c9
AS
7405
7406 }
7407
7408BadName:
d2e4a39e 7409 if (!noerr)
14f9c5c9
AS
7410 {
7411 target_terminal_ours ();
7412 gdb_flush (gdb_stdout);
323e0a4a
AC
7413 if (name == NULL)
7414 {
7415 /* XXX: type_sprint */
7416 fprintf_unfiltered (gdb_stderr, _("Type "));
7417 type_print (type, "", gdb_stderr, -1);
7418 error (_(" has no component named <null>"));
7419 }
7420 else
7421 {
7422 /* XXX: type_sprint */
7423 fprintf_unfiltered (gdb_stderr, _("Type "));
7424 type_print (type, "", gdb_stderr, -1);
7425 error (_(" has no component named %s"), name);
7426 }
14f9c5c9
AS
7427 }
7428
7429 return NULL;
7430}
7431
b1f33ddd
JB
7432/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7433 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7434 represents an unchecked union (that is, the variant part of a
0963b4bd 7435 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7436
7437static int
7438is_unchecked_variant (struct type *var_type, struct type *outer_type)
7439{
7440 char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7441
b1f33ddd
JB
7442 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1, NULL)
7443 == NULL);
7444}
7445
7446
14f9c5c9
AS
7447/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7448 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7449 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7450 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7451
d2e4a39e 7452int
ebf56fd3 7453ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7454 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7455{
7456 int others_clause;
7457 int i;
d2e4a39e 7458 char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7459 struct value *outer;
7460 struct value *discrim;
14f9c5c9
AS
7461 LONGEST discrim_val;
7462
012370f6
TT
7463 /* Using plain value_from_contents_and_address here causes problems
7464 because we will end up trying to resolve a type that is currently
7465 being constructed. */
7466 outer = value_from_contents_and_address_unresolved (outer_type,
7467 outer_valaddr, 0);
0c281816
JB
7468 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7469 if (discrim == NULL)
14f9c5c9 7470 return -1;
0c281816 7471 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7472
7473 others_clause = -1;
7474 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7475 {
7476 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7477 others_clause = i;
14f9c5c9 7478 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7479 return i;
14f9c5c9
AS
7480 }
7481
7482 return others_clause;
7483}
d2e4a39e 7484\f
14f9c5c9
AS
7485
7486
4c4b4cd2 7487 /* Dynamic-Sized Records */
14f9c5c9
AS
7488
7489/* Strategy: The type ostensibly attached to a value with dynamic size
7490 (i.e., a size that is not statically recorded in the debugging
7491 data) does not accurately reflect the size or layout of the value.
7492 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7493 conventional types that are constructed on the fly. */
14f9c5c9
AS
7494
7495/* There is a subtle and tricky problem here. In general, we cannot
7496 determine the size of dynamic records without its data. However,
7497 the 'struct value' data structure, which GDB uses to represent
7498 quantities in the inferior process (the target), requires the size
7499 of the type at the time of its allocation in order to reserve space
7500 for GDB's internal copy of the data. That's why the
7501 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7502 rather than struct value*s.
14f9c5c9
AS
7503
7504 However, GDB's internal history variables ($1, $2, etc.) are
7505 struct value*s containing internal copies of the data that are not, in
7506 general, the same as the data at their corresponding addresses in
7507 the target. Fortunately, the types we give to these values are all
7508 conventional, fixed-size types (as per the strategy described
7509 above), so that we don't usually have to perform the
7510 'to_fixed_xxx_type' conversions to look at their values.
7511 Unfortunately, there is one exception: if one of the internal
7512 history variables is an array whose elements are unconstrained
7513 records, then we will need to create distinct fixed types for each
7514 element selected. */
7515
7516/* The upshot of all of this is that many routines take a (type, host
7517 address, target address) triple as arguments to represent a value.
7518 The host address, if non-null, is supposed to contain an internal
7519 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7520 target at the target address. */
14f9c5c9
AS
7521
7522/* Assuming that VAL0 represents a pointer value, the result of
7523 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7524 dynamic-sized types. */
14f9c5c9 7525
d2e4a39e
AS
7526struct value *
7527ada_value_ind (struct value *val0)
14f9c5c9 7528{
c48db5ca 7529 struct value *val = value_ind (val0);
5b4ee69b 7530
b50d69b5
JG
7531 if (ada_is_tagged_type (value_type (val), 0))
7532 val = ada_tag_value_at_base_address (val);
7533
4c4b4cd2 7534 return ada_to_fixed_value (val);
14f9c5c9
AS
7535}
7536
7537/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7538 qualifiers on VAL0. */
7539
d2e4a39e
AS
7540static struct value *
7541ada_coerce_ref (struct value *val0)
7542{
df407dfe 7543 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7544 {
7545 struct value *val = val0;
5b4ee69b 7546
994b9211 7547 val = coerce_ref (val);
b50d69b5
JG
7548
7549 if (ada_is_tagged_type (value_type (val), 0))
7550 val = ada_tag_value_at_base_address (val);
7551
4c4b4cd2 7552 return ada_to_fixed_value (val);
d2e4a39e
AS
7553 }
7554 else
14f9c5c9
AS
7555 return val0;
7556}
7557
7558/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7559 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7560
7561static unsigned int
ebf56fd3 7562align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7563{
7564 return (off + alignment - 1) & ~(alignment - 1);
7565}
7566
4c4b4cd2 7567/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7568
7569static unsigned int
ebf56fd3 7570field_alignment (struct type *type, int f)
14f9c5c9 7571{
d2e4a39e 7572 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7573 int len;
14f9c5c9
AS
7574 int align_offset;
7575
64a1bf19
JB
7576 /* The field name should never be null, unless the debugging information
7577 is somehow malformed. In this case, we assume the field does not
7578 require any alignment. */
7579 if (name == NULL)
7580 return 1;
7581
7582 len = strlen (name);
7583
4c4b4cd2
PH
7584 if (!isdigit (name[len - 1]))
7585 return 1;
14f9c5c9 7586
d2e4a39e 7587 if (isdigit (name[len - 2]))
14f9c5c9
AS
7588 align_offset = len - 2;
7589 else
7590 align_offset = len - 1;
7591
61012eef 7592 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7593 return TARGET_CHAR_BIT;
7594
4c4b4cd2
PH
7595 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7596}
7597
852dff6c 7598/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7599
852dff6c
JB
7600static struct symbol *
7601ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7602{
7603 struct symbol *sym;
7604
7605 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7606 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7607 return sym;
7608
4186eb54
KS
7609 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7610 return sym;
14f9c5c9
AS
7611}
7612
dddfab26
UW
7613/* Find a type named NAME. Ignores ambiguity. This routine will look
7614 solely for types defined by debug info, it will not search the GDB
7615 primitive types. */
4c4b4cd2 7616
852dff6c 7617static struct type *
ebf56fd3 7618ada_find_any_type (const char *name)
14f9c5c9 7619{
852dff6c 7620 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7621
14f9c5c9 7622 if (sym != NULL)
dddfab26 7623 return SYMBOL_TYPE (sym);
14f9c5c9 7624
dddfab26 7625 return NULL;
14f9c5c9
AS
7626}
7627
739593e0
JB
7628/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7629 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7630 symbol, in which case it is returned. Otherwise, this looks for
7631 symbols whose name is that of NAME_SYM suffixed with "___XR".
7632 Return symbol if found, and NULL otherwise. */
4c4b4cd2
PH
7633
7634struct symbol *
270140bd 7635ada_find_renaming_symbol (struct symbol *name_sym, const struct block *block)
aeb5907d 7636{
739593e0 7637 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
aeb5907d
JB
7638 struct symbol *sym;
7639
739593e0
JB
7640 if (strstr (name, "___XR") != NULL)
7641 return name_sym;
7642
aeb5907d
JB
7643 sym = find_old_style_renaming_symbol (name, block);
7644
7645 if (sym != NULL)
7646 return sym;
7647
0963b4bd 7648 /* Not right yet. FIXME pnh 7/20/2007. */
852dff6c 7649 sym = ada_find_any_type_symbol (name);
aeb5907d
JB
7650 if (sym != NULL && strstr (SYMBOL_LINKAGE_NAME (sym), "___XR") != NULL)
7651 return sym;
7652 else
7653 return NULL;
7654}
7655
7656static struct symbol *
270140bd 7657find_old_style_renaming_symbol (const char *name, const struct block *block)
4c4b4cd2 7658{
7f0df278 7659 const struct symbol *function_sym = block_linkage_function (block);
4c4b4cd2
PH
7660 char *rename;
7661
7662 if (function_sym != NULL)
7663 {
7664 /* If the symbol is defined inside a function, NAME is not fully
7665 qualified. This means we need to prepend the function name
7666 as well as adding the ``___XR'' suffix to build the name of
7667 the associated renaming symbol. */
0d5cff50 7668 const char *function_name = SYMBOL_LINKAGE_NAME (function_sym);
529cad9c
PH
7669 /* Function names sometimes contain suffixes used
7670 for instance to qualify nested subprograms. When building
7671 the XR type name, we need to make sure that this suffix is
7672 not included. So do not include any suffix in the function
7673 name length below. */
69fadcdf 7674 int function_name_len = ada_name_prefix_len (function_name);
76a01679
JB
7675 const int rename_len = function_name_len + 2 /* "__" */
7676 + strlen (name) + 6 /* "___XR\0" */ ;
4c4b4cd2 7677
529cad9c 7678 /* Strip the suffix if necessary. */
69fadcdf
JB
7679 ada_remove_trailing_digits (function_name, &function_name_len);
7680 ada_remove_po_subprogram_suffix (function_name, &function_name_len);
7681 ada_remove_Xbn_suffix (function_name, &function_name_len);
529cad9c 7682
4c4b4cd2
PH
7683 /* Library-level functions are a special case, as GNAT adds
7684 a ``_ada_'' prefix to the function name to avoid namespace
aeb5907d 7685 pollution. However, the renaming symbols themselves do not
4c4b4cd2
PH
7686 have this prefix, so we need to skip this prefix if present. */
7687 if (function_name_len > 5 /* "_ada_" */
7688 && strstr (function_name, "_ada_") == function_name)
69fadcdf
JB
7689 {
7690 function_name += 5;
7691 function_name_len -= 5;
7692 }
4c4b4cd2
PH
7693
7694 rename = (char *) alloca (rename_len * sizeof (char));
69fadcdf
JB
7695 strncpy (rename, function_name, function_name_len);
7696 xsnprintf (rename + function_name_len, rename_len - function_name_len,
7697 "__%s___XR", name);
4c4b4cd2
PH
7698 }
7699 else
7700 {
7701 const int rename_len = strlen (name) + 6;
5b4ee69b 7702
4c4b4cd2 7703 rename = (char *) alloca (rename_len * sizeof (char));
88c15c34 7704 xsnprintf (rename, rename_len * sizeof (char), "%s___XR", name);
4c4b4cd2
PH
7705 }
7706
852dff6c 7707 return ada_find_any_type_symbol (rename);
4c4b4cd2
PH
7708}
7709
14f9c5c9 7710/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7711 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7712 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7713 otherwise return 0. */
7714
14f9c5c9 7715int
d2e4a39e 7716ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7717{
7718 if (type1 == NULL)
7719 return 1;
7720 else if (type0 == NULL)
7721 return 0;
7722 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7723 return 1;
7724 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7725 return 0;
4c4b4cd2
PH
7726 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7727 return 1;
ad82864c 7728 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7729 return 1;
4c4b4cd2
PH
7730 else if (ada_is_array_descriptor_type (type0)
7731 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7732 return 1;
aeb5907d
JB
7733 else
7734 {
7735 const char *type0_name = type_name_no_tag (type0);
7736 const char *type1_name = type_name_no_tag (type1);
7737
7738 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7739 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7740 return 1;
7741 }
14f9c5c9
AS
7742 return 0;
7743}
7744
7745/* The name of TYPE, which is either its TYPE_NAME, or, if that is
4c4b4cd2
PH
7746 null, its TYPE_TAG_NAME. Null if TYPE is null. */
7747
0d5cff50 7748const char *
d2e4a39e 7749ada_type_name (struct type *type)
14f9c5c9 7750{
d2e4a39e 7751 if (type == NULL)
14f9c5c9
AS
7752 return NULL;
7753 else if (TYPE_NAME (type) != NULL)
7754 return TYPE_NAME (type);
7755 else
7756 return TYPE_TAG_NAME (type);
7757}
7758
b4ba55a1
JB
7759/* Search the list of "descriptive" types associated to TYPE for a type
7760 whose name is NAME. */
7761
7762static struct type *
7763find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7764{
7765 struct type *result;
7766
c6044dd1
JB
7767 if (ada_ignore_descriptive_types_p)
7768 return NULL;
7769
b4ba55a1
JB
7770 /* If there no descriptive-type info, then there is no parallel type
7771 to be found. */
7772 if (!HAVE_GNAT_AUX_INFO (type))
7773 return NULL;
7774
7775 result = TYPE_DESCRIPTIVE_TYPE (type);
7776 while (result != NULL)
7777 {
0d5cff50 7778 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7779
7780 if (result_name == NULL)
7781 {
7782 warning (_("unexpected null name on descriptive type"));
7783 return NULL;
7784 }
7785
7786 /* If the names match, stop. */
7787 if (strcmp (result_name, name) == 0)
7788 break;
7789
7790 /* Otherwise, look at the next item on the list, if any. */
7791 if (HAVE_GNAT_AUX_INFO (result))
7792 result = TYPE_DESCRIPTIVE_TYPE (result);
7793 else
7794 result = NULL;
7795 }
7796
7797 /* If we didn't find a match, see whether this is a packed array. With
7798 older compilers, the descriptive type information is either absent or
7799 irrelevant when it comes to packed arrays so the above lookup fails.
7800 Fall back to using a parallel lookup by name in this case. */
12ab9e09 7801 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
7802 return ada_find_any_type (name);
7803
7804 return result;
7805}
7806
7807/* Find a parallel type to TYPE with the specified NAME, using the
7808 descriptive type taken from the debugging information, if available,
7809 and otherwise using the (slower) name-based method. */
7810
7811static struct type *
7812ada_find_parallel_type_with_name (struct type *type, const char *name)
7813{
7814 struct type *result = NULL;
7815
7816 if (HAVE_GNAT_AUX_INFO (type))
7817 result = find_parallel_type_by_descriptive_type (type, name);
7818 else
7819 result = ada_find_any_type (name);
7820
7821 return result;
7822}
7823
7824/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 7825 SUFFIX to the name of TYPE. */
14f9c5c9 7826
d2e4a39e 7827struct type *
ebf56fd3 7828ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 7829{
0d5cff50 7830 char *name;
fe978cb0 7831 const char *type_name = ada_type_name (type);
14f9c5c9 7832 int len;
d2e4a39e 7833
fe978cb0 7834 if (type_name == NULL)
14f9c5c9
AS
7835 return NULL;
7836
fe978cb0 7837 len = strlen (type_name);
14f9c5c9 7838
b4ba55a1 7839 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 7840
fe978cb0 7841 strcpy (name, type_name);
14f9c5c9
AS
7842 strcpy (name + len, suffix);
7843
b4ba55a1 7844 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
7845}
7846
14f9c5c9 7847/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 7848 type describing its fields. Otherwise, return NULL. */
14f9c5c9 7849
d2e4a39e
AS
7850static struct type *
7851dynamic_template_type (struct type *type)
14f9c5c9 7852{
61ee279c 7853 type = ada_check_typedef (type);
14f9c5c9
AS
7854
7855 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 7856 || ada_type_name (type) == NULL)
14f9c5c9 7857 return NULL;
d2e4a39e 7858 else
14f9c5c9
AS
7859 {
7860 int len = strlen (ada_type_name (type));
5b4ee69b 7861
4c4b4cd2
PH
7862 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
7863 return type;
14f9c5c9 7864 else
4c4b4cd2 7865 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
7866 }
7867}
7868
7869/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 7870 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 7871
d2e4a39e
AS
7872static int
7873is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
7874{
7875 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 7876
d2e4a39e 7877 return name != NULL
14f9c5c9
AS
7878 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
7879 && strstr (name, "___XVL") != NULL;
7880}
7881
4c4b4cd2
PH
7882/* The index of the variant field of TYPE, or -1 if TYPE does not
7883 represent a variant record type. */
14f9c5c9 7884
d2e4a39e 7885static int
4c4b4cd2 7886variant_field_index (struct type *type)
14f9c5c9
AS
7887{
7888 int f;
7889
4c4b4cd2
PH
7890 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
7891 return -1;
7892
7893 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
7894 {
7895 if (ada_is_variant_part (type, f))
7896 return f;
7897 }
7898 return -1;
14f9c5c9
AS
7899}
7900
4c4b4cd2
PH
7901/* A record type with no fields. */
7902
d2e4a39e 7903static struct type *
fe978cb0 7904empty_record (struct type *templ)
14f9c5c9 7905{
fe978cb0 7906 struct type *type = alloc_type_copy (templ);
5b4ee69b 7907
14f9c5c9
AS
7908 TYPE_CODE (type) = TYPE_CODE_STRUCT;
7909 TYPE_NFIELDS (type) = 0;
7910 TYPE_FIELDS (type) = NULL;
b1f33ddd 7911 INIT_CPLUS_SPECIFIC (type);
14f9c5c9
AS
7912 TYPE_NAME (type) = "<empty>";
7913 TYPE_TAG_NAME (type) = NULL;
14f9c5c9
AS
7914 TYPE_LENGTH (type) = 0;
7915 return type;
7916}
7917
7918/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
7919 the value of type TYPE at VALADDR or ADDRESS (see comments at
7920 the beginning of this section) VAL according to GNAT conventions.
7921 DVAL0 should describe the (portion of a) record that contains any
df407dfe 7922 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
7923 an outer-level type (i.e., as opposed to a branch of a variant.) A
7924 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 7925 of the variant.
14f9c5c9 7926
4c4b4cd2
PH
7927 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
7928 length are not statically known are discarded. As a consequence,
7929 VALADDR, ADDRESS and DVAL0 are ignored.
7930
7931 NOTE: Limitations: For now, we assume that dynamic fields and
7932 variants occupy whole numbers of bytes. However, they need not be
7933 byte-aligned. */
7934
7935struct type *
10a2c479 7936ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 7937 const gdb_byte *valaddr,
4c4b4cd2
PH
7938 CORE_ADDR address, struct value *dval0,
7939 int keep_dynamic_fields)
14f9c5c9 7940{
d2e4a39e
AS
7941 struct value *mark = value_mark ();
7942 struct value *dval;
7943 struct type *rtype;
14f9c5c9 7944 int nfields, bit_len;
4c4b4cd2 7945 int variant_field;
14f9c5c9 7946 long off;
d94e4f4f 7947 int fld_bit_len;
14f9c5c9
AS
7948 int f;
7949
4c4b4cd2
PH
7950 /* Compute the number of fields in this record type that are going
7951 to be processed: unless keep_dynamic_fields, this includes only
7952 fields whose position and length are static will be processed. */
7953 if (keep_dynamic_fields)
7954 nfields = TYPE_NFIELDS (type);
7955 else
7956 {
7957 nfields = 0;
76a01679 7958 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
7959 && !ada_is_variant_part (type, nfields)
7960 && !is_dynamic_field (type, nfields))
7961 nfields++;
7962 }
7963
e9bb382b 7964 rtype = alloc_type_copy (type);
14f9c5c9
AS
7965 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
7966 INIT_CPLUS_SPECIFIC (rtype);
7967 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 7968 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
7969 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
7970 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
7971 TYPE_NAME (rtype) = ada_type_name (type);
7972 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 7973 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 7974
d2e4a39e
AS
7975 off = 0;
7976 bit_len = 0;
4c4b4cd2
PH
7977 variant_field = -1;
7978
14f9c5c9
AS
7979 for (f = 0; f < nfields; f += 1)
7980 {
6c038f32
PH
7981 off = align_value (off, field_alignment (type, f))
7982 + TYPE_FIELD_BITPOS (type, f);
945b3a32 7983 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 7984 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 7985
d2e4a39e 7986 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
7987 {
7988 variant_field = f;
d94e4f4f 7989 fld_bit_len = 0;
4c4b4cd2 7990 }
14f9c5c9 7991 else if (is_dynamic_field (type, f))
4c4b4cd2 7992 {
284614f0
JB
7993 const gdb_byte *field_valaddr = valaddr;
7994 CORE_ADDR field_address = address;
7995 struct type *field_type =
7996 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
7997
4c4b4cd2 7998 if (dval0 == NULL)
b5304971
JG
7999 {
8000 /* rtype's length is computed based on the run-time
8001 value of discriminants. If the discriminants are not
8002 initialized, the type size may be completely bogus and
0963b4bd 8003 GDB may fail to allocate a value for it. So check the
b5304971 8004 size first before creating the value. */
c1b5a1a6 8005 ada_ensure_varsize_limit (rtype);
012370f6
TT
8006 /* Using plain value_from_contents_and_address here
8007 causes problems because we will end up trying to
8008 resolve a type that is currently being
8009 constructed. */
8010 dval = value_from_contents_and_address_unresolved (rtype,
8011 valaddr,
8012 address);
9f1f738a 8013 rtype = value_type (dval);
b5304971 8014 }
4c4b4cd2
PH
8015 else
8016 dval = dval0;
8017
284614f0
JB
8018 /* If the type referenced by this field is an aligner type, we need
8019 to unwrap that aligner type, because its size might not be set.
8020 Keeping the aligner type would cause us to compute the wrong
8021 size for this field, impacting the offset of the all the fields
8022 that follow this one. */
8023 if (ada_is_aligner_type (field_type))
8024 {
8025 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8026
8027 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8028 field_address = cond_offset_target (field_address, field_offset);
8029 field_type = ada_aligned_type (field_type);
8030 }
8031
8032 field_valaddr = cond_offset_host (field_valaddr,
8033 off / TARGET_CHAR_BIT);
8034 field_address = cond_offset_target (field_address,
8035 off / TARGET_CHAR_BIT);
8036
8037 /* Get the fixed type of the field. Note that, in this case,
8038 we do not want to get the real type out of the tag: if
8039 the current field is the parent part of a tagged record,
8040 we will get the tag of the object. Clearly wrong: the real
8041 type of the parent is not the real type of the child. We
8042 would end up in an infinite loop. */
8043 field_type = ada_get_base_type (field_type);
8044 field_type = ada_to_fixed_type (field_type, field_valaddr,
8045 field_address, dval, 0);
27f2a97b
JB
8046 /* If the field size is already larger than the maximum
8047 object size, then the record itself will necessarily
8048 be larger than the maximum object size. We need to make
8049 this check now, because the size might be so ridiculously
8050 large (due to an uninitialized variable in the inferior)
8051 that it would cause an overflow when adding it to the
8052 record size. */
c1b5a1a6 8053 ada_ensure_varsize_limit (field_type);
284614f0
JB
8054
8055 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8056 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8057 /* The multiplication can potentially overflow. But because
8058 the field length has been size-checked just above, and
8059 assuming that the maximum size is a reasonable value,
8060 an overflow should not happen in practice. So rather than
8061 adding overflow recovery code to this already complex code,
8062 we just assume that it's not going to happen. */
d94e4f4f 8063 fld_bit_len =
4c4b4cd2
PH
8064 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8065 }
14f9c5c9 8066 else
4c4b4cd2 8067 {
5ded5331
JB
8068 /* Note: If this field's type is a typedef, it is important
8069 to preserve the typedef layer.
8070
8071 Otherwise, we might be transforming a typedef to a fat
8072 pointer (encoding a pointer to an unconstrained array),
8073 into a basic fat pointer (encoding an unconstrained
8074 array). As both types are implemented using the same
8075 structure, the typedef is the only clue which allows us
8076 to distinguish between the two options. Stripping it
8077 would prevent us from printing this field appropriately. */
8078 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8079 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8080 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8081 fld_bit_len =
4c4b4cd2
PH
8082 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8083 else
5ded5331
JB
8084 {
8085 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8086
8087 /* We need to be careful of typedefs when computing
8088 the length of our field. If this is a typedef,
8089 get the length of the target type, not the length
8090 of the typedef. */
8091 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8092 field_type = ada_typedef_target_type (field_type);
8093
8094 fld_bit_len =
8095 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8096 }
4c4b4cd2 8097 }
14f9c5c9 8098 if (off + fld_bit_len > bit_len)
4c4b4cd2 8099 bit_len = off + fld_bit_len;
d94e4f4f 8100 off += fld_bit_len;
4c4b4cd2
PH
8101 TYPE_LENGTH (rtype) =
8102 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8103 }
4c4b4cd2
PH
8104
8105 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8106 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8107 the record. This can happen in the presence of representation
8108 clauses. */
8109 if (variant_field >= 0)
8110 {
8111 struct type *branch_type;
8112
8113 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8114
8115 if (dval0 == NULL)
9f1f738a 8116 {
012370f6
TT
8117 /* Using plain value_from_contents_and_address here causes
8118 problems because we will end up trying to resolve a type
8119 that is currently being constructed. */
8120 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8121 address);
9f1f738a
SA
8122 rtype = value_type (dval);
8123 }
4c4b4cd2
PH
8124 else
8125 dval = dval0;
8126
8127 branch_type =
8128 to_fixed_variant_branch_type
8129 (TYPE_FIELD_TYPE (type, variant_field),
8130 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8131 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8132 if (branch_type == NULL)
8133 {
8134 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8135 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8136 TYPE_NFIELDS (rtype) -= 1;
8137 }
8138 else
8139 {
8140 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8141 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8142 fld_bit_len =
8143 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8144 TARGET_CHAR_BIT;
8145 if (off + fld_bit_len > bit_len)
8146 bit_len = off + fld_bit_len;
8147 TYPE_LENGTH (rtype) =
8148 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8149 }
8150 }
8151
714e53ab
PH
8152 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8153 should contain the alignment of that record, which should be a strictly
8154 positive value. If null or negative, then something is wrong, most
8155 probably in the debug info. In that case, we don't round up the size
0963b4bd 8156 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8157 the current RTYPE length might be good enough for our purposes. */
8158 if (TYPE_LENGTH (type) <= 0)
8159 {
323e0a4a
AC
8160 if (TYPE_NAME (rtype))
8161 warning (_("Invalid type size for `%s' detected: %d."),
8162 TYPE_NAME (rtype), TYPE_LENGTH (type));
8163 else
8164 warning (_("Invalid type size for <unnamed> detected: %d."),
8165 TYPE_LENGTH (type));
714e53ab
PH
8166 }
8167 else
8168 {
8169 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8170 TYPE_LENGTH (type));
8171 }
14f9c5c9
AS
8172
8173 value_free_to_mark (mark);
d2e4a39e 8174 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8175 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8176 return rtype;
8177}
8178
4c4b4cd2
PH
8179/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8180 of 1. */
14f9c5c9 8181
d2e4a39e 8182static struct type *
fc1a4b47 8183template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8184 CORE_ADDR address, struct value *dval0)
8185{
8186 return ada_template_to_fixed_record_type_1 (type, valaddr,
8187 address, dval0, 1);
8188}
8189
8190/* An ordinary record type in which ___XVL-convention fields and
8191 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8192 static approximations, containing all possible fields. Uses
8193 no runtime values. Useless for use in values, but that's OK,
8194 since the results are used only for type determinations. Works on both
8195 structs and unions. Representation note: to save space, we memorize
8196 the result of this function in the TYPE_TARGET_TYPE of the
8197 template type. */
8198
8199static struct type *
8200template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8201{
8202 struct type *type;
8203 int nfields;
8204 int f;
8205
9e195661
PMR
8206 /* No need no do anything if the input type is already fixed. */
8207 if (TYPE_FIXED_INSTANCE (type0))
8208 return type0;
8209
8210 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8211 if (TYPE_TARGET_TYPE (type0) != NULL)
8212 return TYPE_TARGET_TYPE (type0);
8213
9e195661 8214 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8215 type = type0;
9e195661
PMR
8216 nfields = TYPE_NFIELDS (type0);
8217
8218 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8219 recompute all over next time. */
8220 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8221
8222 for (f = 0; f < nfields; f += 1)
8223 {
460efde1 8224 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8225 struct type *new_type;
14f9c5c9 8226
4c4b4cd2 8227 if (is_dynamic_field (type0, f))
460efde1
JB
8228 {
8229 field_type = ada_check_typedef (field_type);
8230 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8231 }
14f9c5c9 8232 else
f192137b 8233 new_type = static_unwrap_type (field_type);
9e195661
PMR
8234
8235 if (new_type != field_type)
8236 {
8237 /* Clone TYPE0 only the first time we get a new field type. */
8238 if (type == type0)
8239 {
8240 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
8241 TYPE_CODE (type) = TYPE_CODE (type0);
8242 INIT_CPLUS_SPECIFIC (type);
8243 TYPE_NFIELDS (type) = nfields;
8244 TYPE_FIELDS (type) = (struct field *)
8245 TYPE_ALLOC (type, nfields * sizeof (struct field));
8246 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8247 sizeof (struct field) * nfields);
8248 TYPE_NAME (type) = ada_type_name (type0);
8249 TYPE_TAG_NAME (type) = NULL;
8250 TYPE_FIXED_INSTANCE (type) = 1;
8251 TYPE_LENGTH (type) = 0;
8252 }
8253 TYPE_FIELD_TYPE (type, f) = new_type;
8254 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8255 }
14f9c5c9 8256 }
9e195661 8257
14f9c5c9
AS
8258 return type;
8259}
8260
4c4b4cd2 8261/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8262 whose address in memory is ADDRESS, returns a revision of TYPE,
8263 which should be a non-dynamic-sized record, in which the variant
8264 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8265 for discriminant values in DVAL0, which can be NULL if the record
8266 contains the necessary discriminant values. */
8267
d2e4a39e 8268static struct type *
fc1a4b47 8269to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8270 CORE_ADDR address, struct value *dval0)
14f9c5c9 8271{
d2e4a39e 8272 struct value *mark = value_mark ();
4c4b4cd2 8273 struct value *dval;
d2e4a39e 8274 struct type *rtype;
14f9c5c9
AS
8275 struct type *branch_type;
8276 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8277 int variant_field = variant_field_index (type);
14f9c5c9 8278
4c4b4cd2 8279 if (variant_field == -1)
14f9c5c9
AS
8280 return type;
8281
4c4b4cd2 8282 if (dval0 == NULL)
9f1f738a
SA
8283 {
8284 dval = value_from_contents_and_address (type, valaddr, address);
8285 type = value_type (dval);
8286 }
4c4b4cd2
PH
8287 else
8288 dval = dval0;
8289
e9bb382b 8290 rtype = alloc_type_copy (type);
14f9c5c9 8291 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
4c4b4cd2
PH
8292 INIT_CPLUS_SPECIFIC (rtype);
8293 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8294 TYPE_FIELDS (rtype) =
8295 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8296 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8297 sizeof (struct field) * nfields);
14f9c5c9
AS
8298 TYPE_NAME (rtype) = ada_type_name (type);
8299 TYPE_TAG_NAME (rtype) = NULL;
876cecd0 8300 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8301 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8302
4c4b4cd2
PH
8303 branch_type = to_fixed_variant_branch_type
8304 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8305 cond_offset_host (valaddr,
4c4b4cd2
PH
8306 TYPE_FIELD_BITPOS (type, variant_field)
8307 / TARGET_CHAR_BIT),
d2e4a39e 8308 cond_offset_target (address,
4c4b4cd2
PH
8309 TYPE_FIELD_BITPOS (type, variant_field)
8310 / TARGET_CHAR_BIT), dval);
d2e4a39e 8311 if (branch_type == NULL)
14f9c5c9 8312 {
4c4b4cd2 8313 int f;
5b4ee69b 8314
4c4b4cd2
PH
8315 for (f = variant_field + 1; f < nfields; f += 1)
8316 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8317 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8318 }
8319 else
8320 {
4c4b4cd2
PH
8321 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8322 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8323 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8324 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8325 }
4c4b4cd2 8326 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8327
4c4b4cd2 8328 value_free_to_mark (mark);
14f9c5c9
AS
8329 return rtype;
8330}
8331
8332/* An ordinary record type (with fixed-length fields) that describes
8333 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8334 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8335 should be in DVAL, a record value; it may be NULL if the object
8336 at ADDR itself contains any necessary discriminant values.
8337 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8338 values from the record are needed. Except in the case that DVAL,
8339 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8340 unchecked) is replaced by a particular branch of the variant.
8341
8342 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8343 is questionable and may be removed. It can arise during the
8344 processing of an unconstrained-array-of-record type where all the
8345 variant branches have exactly the same size. This is because in
8346 such cases, the compiler does not bother to use the XVS convention
8347 when encoding the record. I am currently dubious of this
8348 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8349
d2e4a39e 8350static struct type *
fc1a4b47 8351to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8352 CORE_ADDR address, struct value *dval)
14f9c5c9 8353{
d2e4a39e 8354 struct type *templ_type;
14f9c5c9 8355
876cecd0 8356 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8357 return type0;
8358
d2e4a39e 8359 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8360
8361 if (templ_type != NULL)
8362 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8363 else if (variant_field_index (type0) >= 0)
8364 {
8365 if (dval == NULL && valaddr == NULL && address == 0)
8366 return type0;
8367 return to_record_with_fixed_variant_part (type0, valaddr, address,
8368 dval);
8369 }
14f9c5c9
AS
8370 else
8371 {
876cecd0 8372 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8373 return type0;
8374 }
8375
8376}
8377
8378/* An ordinary record type (with fixed-length fields) that describes
8379 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8380 union type. Any necessary discriminants' values should be in DVAL,
8381 a record value. That is, this routine selects the appropriate
8382 branch of the union at ADDR according to the discriminant value
b1f33ddd 8383 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8384 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8385
d2e4a39e 8386static struct type *
fc1a4b47 8387to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8388 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8389{
8390 int which;
d2e4a39e
AS
8391 struct type *templ_type;
8392 struct type *var_type;
14f9c5c9
AS
8393
8394 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8395 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8396 else
14f9c5c9
AS
8397 var_type = var_type0;
8398
8399 templ_type = ada_find_parallel_type (var_type, "___XVU");
8400
8401 if (templ_type != NULL)
8402 var_type = templ_type;
8403
b1f33ddd
JB
8404 if (is_unchecked_variant (var_type, value_type (dval)))
8405 return var_type0;
d2e4a39e
AS
8406 which =
8407 ada_which_variant_applies (var_type,
0fd88904 8408 value_type (dval), value_contents (dval));
14f9c5c9
AS
8409
8410 if (which < 0)
e9bb382b 8411 return empty_record (var_type);
14f9c5c9 8412 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8413 return to_fixed_record_type
d2e4a39e
AS
8414 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8415 valaddr, address, dval);
4c4b4cd2 8416 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8417 return
8418 to_fixed_record_type
8419 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8420 else
8421 return TYPE_FIELD_TYPE (var_type, which);
8422}
8423
8908fca5
JB
8424/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8425 ENCODING_TYPE, a type following the GNAT conventions for discrete
8426 type encodings, only carries redundant information. */
8427
8428static int
8429ada_is_redundant_range_encoding (struct type *range_type,
8430 struct type *encoding_type)
8431{
8432 struct type *fixed_range_type;
8433 char *bounds_str;
8434 int n;
8435 LONGEST lo, hi;
8436
8437 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8438
005e2509
JB
8439 if (TYPE_CODE (get_base_type (range_type))
8440 != TYPE_CODE (get_base_type (encoding_type)))
8441 {
8442 /* The compiler probably used a simple base type to describe
8443 the range type instead of the range's actual base type,
8444 expecting us to get the real base type from the encoding
8445 anyway. In this situation, the encoding cannot be ignored
8446 as redundant. */
8447 return 0;
8448 }
8449
8908fca5
JB
8450 if (is_dynamic_type (range_type))
8451 return 0;
8452
8453 if (TYPE_NAME (encoding_type) == NULL)
8454 return 0;
8455
8456 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8457 if (bounds_str == NULL)
8458 return 0;
8459
8460 n = 8; /* Skip "___XDLU_". */
8461 if (!ada_scan_number (bounds_str, n, &lo, &n))
8462 return 0;
8463 if (TYPE_LOW_BOUND (range_type) != lo)
8464 return 0;
8465
8466 n += 2; /* Skip the "__" separator between the two bounds. */
8467 if (!ada_scan_number (bounds_str, n, &hi, &n))
8468 return 0;
8469 if (TYPE_HIGH_BOUND (range_type) != hi)
8470 return 0;
8471
8472 return 1;
8473}
8474
8475/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8476 a type following the GNAT encoding for describing array type
8477 indices, only carries redundant information. */
8478
8479static int
8480ada_is_redundant_index_type_desc (struct type *array_type,
8481 struct type *desc_type)
8482{
8483 struct type *this_layer = check_typedef (array_type);
8484 int i;
8485
8486 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8487 {
8488 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8489 TYPE_FIELD_TYPE (desc_type, i)))
8490 return 0;
8491 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8492 }
8493
8494 return 1;
8495}
8496
14f9c5c9
AS
8497/* Assuming that TYPE0 is an array type describing the type of a value
8498 at ADDR, and that DVAL describes a record containing any
8499 discriminants used in TYPE0, returns a type for the value that
8500 contains no dynamic components (that is, no components whose sizes
8501 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8502 true, gives an error message if the resulting type's size is over
4c4b4cd2 8503 varsize_limit. */
14f9c5c9 8504
d2e4a39e
AS
8505static struct type *
8506to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8507 int ignore_too_big)
14f9c5c9 8508{
d2e4a39e
AS
8509 struct type *index_type_desc;
8510 struct type *result;
ad82864c 8511 int constrained_packed_array_p;
14f9c5c9 8512
b0dd7688 8513 type0 = ada_check_typedef (type0);
284614f0 8514 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8515 return type0;
14f9c5c9 8516
ad82864c
JB
8517 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8518 if (constrained_packed_array_p)
8519 type0 = decode_constrained_packed_array_type (type0);
284614f0 8520
14f9c5c9 8521 index_type_desc = ada_find_parallel_type (type0, "___XA");
28c85d6c 8522 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8523 if (index_type_desc != NULL
8524 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8525 {
8526 /* Ignore this ___XA parallel type, as it does not bring any
8527 useful information. This allows us to avoid creating fixed
8528 versions of the array's index types, which would be identical
8529 to the original ones. This, in turn, can also help avoid
8530 the creation of fixed versions of the array itself. */
8531 index_type_desc = NULL;
8532 }
8533
14f9c5c9
AS
8534 if (index_type_desc == NULL)
8535 {
61ee279c 8536 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8537
14f9c5c9 8538 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8539 depend on the contents of the array in properly constructed
8540 debugging data. */
529cad9c
PH
8541 /* Create a fixed version of the array element type.
8542 We're not providing the address of an element here,
e1d5a0d2 8543 and thus the actual object value cannot be inspected to do
529cad9c
PH
8544 the conversion. This should not be a problem, since arrays of
8545 unconstrained objects are not allowed. In particular, all
8546 the elements of an array of a tagged type should all be of
8547 the same type specified in the debugging info. No need to
8548 consult the object tag. */
1ed6ede0 8549 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8550
284614f0
JB
8551 /* Make sure we always create a new array type when dealing with
8552 packed array types, since we're going to fix-up the array
8553 type length and element bitsize a little further down. */
ad82864c 8554 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8555 result = type0;
14f9c5c9 8556 else
e9bb382b 8557 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8558 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8559 }
8560 else
8561 {
8562 int i;
8563 struct type *elt_type0;
8564
8565 elt_type0 = type0;
8566 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8567 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8568
8569 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8570 depend on the contents of the array in properly constructed
8571 debugging data. */
529cad9c
PH
8572 /* Create a fixed version of the array element type.
8573 We're not providing the address of an element here,
e1d5a0d2 8574 and thus the actual object value cannot be inspected to do
529cad9c
PH
8575 the conversion. This should not be a problem, since arrays of
8576 unconstrained objects are not allowed. In particular, all
8577 the elements of an array of a tagged type should all be of
8578 the same type specified in the debugging info. No need to
8579 consult the object tag. */
1ed6ede0
JB
8580 result =
8581 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8582
8583 elt_type0 = type0;
14f9c5c9 8584 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8585 {
8586 struct type *range_type =
28c85d6c 8587 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8588
e9bb382b 8589 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8590 result, range_type);
1ce677a4 8591 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8592 }
d2e4a39e 8593 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8594 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8595 }
8596
2e6fda7d
JB
8597 /* We want to preserve the type name. This can be useful when
8598 trying to get the type name of a value that has already been
8599 printed (for instance, if the user did "print VAR; whatis $". */
8600 TYPE_NAME (result) = TYPE_NAME (type0);
8601
ad82864c 8602 if (constrained_packed_array_p)
284614f0
JB
8603 {
8604 /* So far, the resulting type has been created as if the original
8605 type was a regular (non-packed) array type. As a result, the
8606 bitsize of the array elements needs to be set again, and the array
8607 length needs to be recomputed based on that bitsize. */
8608 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8609 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8610
8611 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8612 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8613 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8614 TYPE_LENGTH (result)++;
8615 }
8616
876cecd0 8617 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8618 return result;
d2e4a39e 8619}
14f9c5c9
AS
8620
8621
8622/* A standard type (containing no dynamically sized components)
8623 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8624 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8625 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8626 ADDRESS or in VALADDR contains these discriminants.
8627
1ed6ede0
JB
8628 If CHECK_TAG is not null, in the case of tagged types, this function
8629 attempts to locate the object's tag and use it to compute the actual
8630 type. However, when ADDRESS is null, we cannot use it to determine the
8631 location of the tag, and therefore compute the tagged type's actual type.
8632 So we return the tagged type without consulting the tag. */
529cad9c 8633
f192137b
JB
8634static struct type *
8635ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8636 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8637{
61ee279c 8638 type = ada_check_typedef (type);
d2e4a39e
AS
8639 switch (TYPE_CODE (type))
8640 {
8641 default:
14f9c5c9 8642 return type;
d2e4a39e 8643 case TYPE_CODE_STRUCT:
4c4b4cd2 8644 {
76a01679 8645 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8646 struct type *fixed_record_type =
8647 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8648
529cad9c
PH
8649 /* If STATIC_TYPE is a tagged type and we know the object's address,
8650 then we can determine its tag, and compute the object's actual
0963b4bd 8651 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8652 type (the parent part of the record may have dynamic fields
8653 and the way the location of _tag is expressed may depend on
8654 them). */
529cad9c 8655
1ed6ede0 8656 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8657 {
b50d69b5
JG
8658 struct value *tag =
8659 value_tag_from_contents_and_address
8660 (fixed_record_type,
8661 valaddr,
8662 address);
8663 struct type *real_type = type_from_tag (tag);
8664 struct value *obj =
8665 value_from_contents_and_address (fixed_record_type,
8666 valaddr,
8667 address);
9f1f738a 8668 fixed_record_type = value_type (obj);
76a01679 8669 if (real_type != NULL)
b50d69b5
JG
8670 return to_fixed_record_type
8671 (real_type, NULL,
8672 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8673 }
4af88198
JB
8674
8675 /* Check to see if there is a parallel ___XVZ variable.
8676 If there is, then it provides the actual size of our type. */
8677 else if (ada_type_name (fixed_record_type) != NULL)
8678 {
0d5cff50 8679 const char *name = ada_type_name (fixed_record_type);
4af88198
JB
8680 char *xvz_name = alloca (strlen (name) + 7 /* "___XVZ\0" */);
8681 int xvz_found = 0;
8682 LONGEST size;
8683
88c15c34 8684 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
4af88198
JB
8685 size = get_int_var_value (xvz_name, &xvz_found);
8686 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
8687 {
8688 fixed_record_type = copy_type (fixed_record_type);
8689 TYPE_LENGTH (fixed_record_type) = size;
8690
8691 /* The FIXED_RECORD_TYPE may have be a stub. We have
8692 observed this when the debugging info is STABS, and
8693 apparently it is something that is hard to fix.
8694
8695 In practice, we don't need the actual type definition
8696 at all, because the presence of the XVZ variable allows us
8697 to assume that there must be a XVS type as well, which we
8698 should be able to use later, when we need the actual type
8699 definition.
8700
8701 In the meantime, pretend that the "fixed" type we are
8702 returning is NOT a stub, because this can cause trouble
8703 when using this type to create new types targeting it.
8704 Indeed, the associated creation routines often check
8705 whether the target type is a stub and will try to replace
0963b4bd 8706 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8707 might cause the new type to have the wrong size too.
8708 Consider the case of an array, for instance, where the size
8709 of the array is computed from the number of elements in
8710 our array multiplied by the size of its element. */
8711 TYPE_STUB (fixed_record_type) = 0;
8712 }
8713 }
1ed6ede0 8714 return fixed_record_type;
4c4b4cd2 8715 }
d2e4a39e 8716 case TYPE_CODE_ARRAY:
4c4b4cd2 8717 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8718 case TYPE_CODE_UNION:
8719 if (dval == NULL)
4c4b4cd2 8720 return type;
d2e4a39e 8721 else
4c4b4cd2 8722 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8723 }
14f9c5c9
AS
8724}
8725
f192137b
JB
8726/* The same as ada_to_fixed_type_1, except that it preserves the type
8727 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8728
8729 The typedef layer needs be preserved in order to differentiate between
8730 arrays and array pointers when both types are implemented using the same
8731 fat pointer. In the array pointer case, the pointer is encoded as
8732 a typedef of the pointer type. For instance, considering:
8733
8734 type String_Access is access String;
8735 S1 : String_Access := null;
8736
8737 To the debugger, S1 is defined as a typedef of type String. But
8738 to the user, it is a pointer. So if the user tries to print S1,
8739 we should not dereference the array, but print the array address
8740 instead.
8741
8742 If we didn't preserve the typedef layer, we would lose the fact that
8743 the type is to be presented as a pointer (needs de-reference before
8744 being printed). And we would also use the source-level type name. */
f192137b
JB
8745
8746struct type *
8747ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8748 CORE_ADDR address, struct value *dval, int check_tag)
8749
8750{
8751 struct type *fixed_type =
8752 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8753
96dbd2c1
JB
8754 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8755 then preserve the typedef layer.
8756
8757 Implementation note: We can only check the main-type portion of
8758 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8759 from TYPE now returns a type that has the same instance flags
8760 as TYPE. For instance, if TYPE is a "typedef const", and its
8761 target type is a "struct", then the typedef elimination will return
8762 a "const" version of the target type. See check_typedef for more
8763 details about how the typedef layer elimination is done.
8764
8765 brobecker/2010-11-19: It seems to me that the only case where it is
8766 useful to preserve the typedef layer is when dealing with fat pointers.
8767 Perhaps, we could add a check for that and preserve the typedef layer
8768 only in that situation. But this seems unecessary so far, probably
8769 because we call check_typedef/ada_check_typedef pretty much everywhere.
8770 */
f192137b 8771 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 8772 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 8773 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
8774 return type;
8775
8776 return fixed_type;
8777}
8778
14f9c5c9 8779/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 8780 TYPE0, but based on no runtime data. */
14f9c5c9 8781
d2e4a39e
AS
8782static struct type *
8783to_static_fixed_type (struct type *type0)
14f9c5c9 8784{
d2e4a39e 8785 struct type *type;
14f9c5c9
AS
8786
8787 if (type0 == NULL)
8788 return NULL;
8789
876cecd0 8790 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8791 return type0;
8792
61ee279c 8793 type0 = ada_check_typedef (type0);
d2e4a39e 8794
14f9c5c9
AS
8795 switch (TYPE_CODE (type0))
8796 {
8797 default:
8798 return type0;
8799 case TYPE_CODE_STRUCT:
8800 type = dynamic_template_type (type0);
d2e4a39e 8801 if (type != NULL)
4c4b4cd2
PH
8802 return template_to_static_fixed_type (type);
8803 else
8804 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8805 case TYPE_CODE_UNION:
8806 type = ada_find_parallel_type (type0, "___XVU");
8807 if (type != NULL)
4c4b4cd2
PH
8808 return template_to_static_fixed_type (type);
8809 else
8810 return template_to_static_fixed_type (type0);
14f9c5c9
AS
8811 }
8812}
8813
4c4b4cd2
PH
8814/* A static approximation of TYPE with all type wrappers removed. */
8815
d2e4a39e
AS
8816static struct type *
8817static_unwrap_type (struct type *type)
14f9c5c9
AS
8818{
8819 if (ada_is_aligner_type (type))
8820 {
61ee279c 8821 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 8822 if (ada_type_name (type1) == NULL)
4c4b4cd2 8823 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
8824
8825 return static_unwrap_type (type1);
8826 }
d2e4a39e 8827 else
14f9c5c9 8828 {
d2e4a39e 8829 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 8830
d2e4a39e 8831 if (raw_real_type == type)
4c4b4cd2 8832 return type;
14f9c5c9 8833 else
4c4b4cd2 8834 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
8835 }
8836}
8837
8838/* In some cases, incomplete and private types require
4c4b4cd2 8839 cross-references that are not resolved as records (for example,
14f9c5c9
AS
8840 type Foo;
8841 type FooP is access Foo;
8842 V: FooP;
8843 type Foo is array ...;
4c4b4cd2 8844 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
8845 cross-references to such types, we instead substitute for FooP a
8846 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 8847 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
8848
8849/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
8850 exists, otherwise TYPE. */
8851
d2e4a39e 8852struct type *
61ee279c 8853ada_check_typedef (struct type *type)
14f9c5c9 8854{
727e3d2e
JB
8855 if (type == NULL)
8856 return NULL;
8857
720d1a40
JB
8858 /* If our type is a typedef type of a fat pointer, then we're done.
8859 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
8860 what allows us to distinguish between fat pointers that represent
8861 array types, and fat pointers that represent array access types
8862 (in both cases, the compiler implements them as fat pointers). */
8863 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
8864 && is_thick_pntr (ada_typedef_target_type (type)))
8865 return type;
8866
14f9c5c9
AS
8867 CHECK_TYPEDEF (type);
8868 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 8869 || !TYPE_STUB (type)
14f9c5c9
AS
8870 || TYPE_TAG_NAME (type) == NULL)
8871 return type;
d2e4a39e 8872 else
14f9c5c9 8873 {
0d5cff50 8874 const char *name = TYPE_TAG_NAME (type);
d2e4a39e 8875 struct type *type1 = ada_find_any_type (name);
5b4ee69b 8876
05e522ef
JB
8877 if (type1 == NULL)
8878 return type;
8879
8880 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
8881 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
8882 types, only for the typedef-to-array types). If that's the case,
8883 strip the typedef layer. */
8884 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
8885 type1 = ada_check_typedef (type1);
8886
8887 return type1;
14f9c5c9
AS
8888 }
8889}
8890
8891/* A value representing the data at VALADDR/ADDRESS as described by
8892 type TYPE0, but with a standard (static-sized) type that correctly
8893 describes it. If VAL0 is not NULL and TYPE0 already is a standard
8894 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 8895 creation of struct values]. */
14f9c5c9 8896
4c4b4cd2
PH
8897static struct value *
8898ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
8899 struct value *val0)
14f9c5c9 8900{
1ed6ede0 8901 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 8902
14f9c5c9
AS
8903 if (type == type0 && val0 != NULL)
8904 return val0;
d2e4a39e 8905 else
4c4b4cd2
PH
8906 return value_from_contents_and_address (type, 0, address);
8907}
8908
8909/* A value representing VAL, but with a standard (static-sized) type
8910 that correctly describes it. Does not necessarily create a new
8911 value. */
8912
0c3acc09 8913struct value *
4c4b4cd2
PH
8914ada_to_fixed_value (struct value *val)
8915{
c48db5ca
JB
8916 val = unwrap_value (val);
8917 val = ada_to_fixed_value_create (value_type (val),
8918 value_address (val),
8919 val);
8920 return val;
14f9c5c9 8921}
d2e4a39e 8922\f
14f9c5c9 8923
14f9c5c9
AS
8924/* Attributes */
8925
4c4b4cd2
PH
8926/* Table mapping attribute numbers to names.
8927 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 8928
d2e4a39e 8929static const char *attribute_names[] = {
14f9c5c9
AS
8930 "<?>",
8931
d2e4a39e 8932 "first",
14f9c5c9
AS
8933 "last",
8934 "length",
8935 "image",
14f9c5c9
AS
8936 "max",
8937 "min",
4c4b4cd2
PH
8938 "modulus",
8939 "pos",
8940 "size",
8941 "tag",
14f9c5c9 8942 "val",
14f9c5c9
AS
8943 0
8944};
8945
d2e4a39e 8946const char *
4c4b4cd2 8947ada_attribute_name (enum exp_opcode n)
14f9c5c9 8948{
4c4b4cd2
PH
8949 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
8950 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
8951 else
8952 return attribute_names[0];
8953}
8954
4c4b4cd2 8955/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 8956
4c4b4cd2
PH
8957static LONGEST
8958pos_atr (struct value *arg)
14f9c5c9 8959{
24209737
PH
8960 struct value *val = coerce_ref (arg);
8961 struct type *type = value_type (val);
14f9c5c9 8962
d2e4a39e 8963 if (!discrete_type_p (type))
323e0a4a 8964 error (_("'POS only defined on discrete types"));
14f9c5c9
AS
8965
8966 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8967 {
8968 int i;
24209737 8969 LONGEST v = value_as_long (val);
14f9c5c9 8970
d2e4a39e 8971 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2 8972 {
14e75d8e 8973 if (v == TYPE_FIELD_ENUMVAL (type, i))
4c4b4cd2
PH
8974 return i;
8975 }
323e0a4a 8976 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9
AS
8977 }
8978 else
24209737 8979 return value_as_long (val);
4c4b4cd2
PH
8980}
8981
8982static struct value *
3cb382c9 8983value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 8984{
3cb382c9 8985 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
8986}
8987
4c4b4cd2 8988/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 8989
d2e4a39e
AS
8990static struct value *
8991value_val_atr (struct type *type, struct value *arg)
14f9c5c9 8992{
d2e4a39e 8993 if (!discrete_type_p (type))
323e0a4a 8994 error (_("'VAL only defined on discrete types"));
df407dfe 8995 if (!integer_type_p (value_type (arg)))
323e0a4a 8996 error (_("'VAL requires integral argument"));
14f9c5c9
AS
8997
8998 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
8999 {
9000 long pos = value_as_long (arg);
5b4ee69b 9001
14f9c5c9 9002 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 9003 error (_("argument to 'VAL out of range"));
14e75d8e 9004 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
9005 }
9006 else
9007 return value_from_longest (type, value_as_long (arg));
9008}
14f9c5c9 9009\f
d2e4a39e 9010
4c4b4cd2 9011 /* Evaluation */
14f9c5c9 9012
4c4b4cd2
PH
9013/* True if TYPE appears to be an Ada character type.
9014 [At the moment, this is true only for Character and Wide_Character;
9015 It is a heuristic test that could stand improvement]. */
14f9c5c9 9016
d2e4a39e
AS
9017int
9018ada_is_character_type (struct type *type)
14f9c5c9 9019{
7b9f71f2
JB
9020 const char *name;
9021
9022 /* If the type code says it's a character, then assume it really is,
9023 and don't check any further. */
9024 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
9025 return 1;
9026
9027 /* Otherwise, assume it's a character type iff it is a discrete type
9028 with a known character type name. */
9029 name = ada_type_name (type);
9030 return (name != NULL
9031 && (TYPE_CODE (type) == TYPE_CODE_INT
9032 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9033 && (strcmp (name, "character") == 0
9034 || strcmp (name, "wide_character") == 0
5a517ebd 9035 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9036 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9037}
9038
4c4b4cd2 9039/* True if TYPE appears to be an Ada string type. */
14f9c5c9
AS
9040
9041int
ebf56fd3 9042ada_is_string_type (struct type *type)
14f9c5c9 9043{
61ee279c 9044 type = ada_check_typedef (type);
d2e4a39e 9045 if (type != NULL
14f9c5c9 9046 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9047 && (ada_is_simple_array_type (type)
9048 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9049 && ada_array_arity (type) == 1)
9050 {
9051 struct type *elttype = ada_array_element_type (type, 1);
9052
9053 return ada_is_character_type (elttype);
9054 }
d2e4a39e 9055 else
14f9c5c9
AS
9056 return 0;
9057}
9058
5bf03f13
JB
9059/* The compiler sometimes provides a parallel XVS type for a given
9060 PAD type. Normally, it is safe to follow the PAD type directly,
9061 but older versions of the compiler have a bug that causes the offset
9062 of its "F" field to be wrong. Following that field in that case
9063 would lead to incorrect results, but this can be worked around
9064 by ignoring the PAD type and using the associated XVS type instead.
9065
9066 Set to True if the debugger should trust the contents of PAD types.
9067 Otherwise, ignore the PAD type if there is a parallel XVS type. */
9068static int trust_pad_over_xvs = 1;
14f9c5c9
AS
9069
9070/* True if TYPE is a struct type introduced by the compiler to force the
9071 alignment of a value. Such types have a single field with a
4c4b4cd2 9072 distinctive name. */
14f9c5c9
AS
9073
9074int
ebf56fd3 9075ada_is_aligner_type (struct type *type)
14f9c5c9 9076{
61ee279c 9077 type = ada_check_typedef (type);
714e53ab 9078
5bf03f13 9079 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9080 return 0;
9081
14f9c5c9 9082 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9083 && TYPE_NFIELDS (type) == 1
9084 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9085}
9086
9087/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9088 the parallel type. */
14f9c5c9 9089
d2e4a39e
AS
9090struct type *
9091ada_get_base_type (struct type *raw_type)
14f9c5c9 9092{
d2e4a39e
AS
9093 struct type *real_type_namer;
9094 struct type *raw_real_type;
14f9c5c9
AS
9095
9096 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9097 return raw_type;
9098
284614f0
JB
9099 if (ada_is_aligner_type (raw_type))
9100 /* The encoding specifies that we should always use the aligner type.
9101 So, even if this aligner type has an associated XVS type, we should
9102 simply ignore it.
9103
9104 According to the compiler gurus, an XVS type parallel to an aligner
9105 type may exist because of a stabs limitation. In stabs, aligner
9106 types are empty because the field has a variable-sized type, and
9107 thus cannot actually be used as an aligner type. As a result,
9108 we need the associated parallel XVS type to decode the type.
9109 Since the policy in the compiler is to not change the internal
9110 representation based on the debugging info format, we sometimes
9111 end up having a redundant XVS type parallel to the aligner type. */
9112 return raw_type;
9113
14f9c5c9 9114 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9115 if (real_type_namer == NULL
14f9c5c9
AS
9116 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9117 || TYPE_NFIELDS (real_type_namer) != 1)
9118 return raw_type;
9119
f80d3ff2
JB
9120 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9121 {
9122 /* This is an older encoding form where the base type needs to be
9123 looked up by name. We prefer the newer enconding because it is
9124 more efficient. */
9125 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9126 if (raw_real_type == NULL)
9127 return raw_type;
9128 else
9129 return raw_real_type;
9130 }
9131
9132 /* The field in our XVS type is a reference to the base type. */
9133 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9134}
14f9c5c9 9135
4c4b4cd2 9136/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9137
d2e4a39e
AS
9138struct type *
9139ada_aligned_type (struct type *type)
14f9c5c9
AS
9140{
9141 if (ada_is_aligner_type (type))
9142 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9143 else
9144 return ada_get_base_type (type);
9145}
9146
9147
9148/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9149 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9150
fc1a4b47
AC
9151const gdb_byte *
9152ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9153{
d2e4a39e 9154 if (ada_is_aligner_type (type))
14f9c5c9 9155 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9156 valaddr +
9157 TYPE_FIELD_BITPOS (type,
9158 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9159 else
9160 return valaddr;
9161}
9162
4c4b4cd2
PH
9163
9164
14f9c5c9 9165/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9166 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9167const char *
9168ada_enum_name (const char *name)
14f9c5c9 9169{
4c4b4cd2
PH
9170 static char *result;
9171 static size_t result_len = 0;
d2e4a39e 9172 char *tmp;
14f9c5c9 9173
4c4b4cd2
PH
9174 /* First, unqualify the enumeration name:
9175 1. Search for the last '.' character. If we find one, then skip
177b42fe 9176 all the preceding characters, the unqualified name starts
76a01679 9177 right after that dot.
4c4b4cd2 9178 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9179 translates dots into "__". Search forward for double underscores,
9180 but stop searching when we hit an overloading suffix, which is
9181 of the form "__" followed by digits. */
4c4b4cd2 9182
c3e5cd34
PH
9183 tmp = strrchr (name, '.');
9184 if (tmp != NULL)
4c4b4cd2
PH
9185 name = tmp + 1;
9186 else
14f9c5c9 9187 {
4c4b4cd2
PH
9188 while ((tmp = strstr (name, "__")) != NULL)
9189 {
9190 if (isdigit (tmp[2]))
9191 break;
9192 else
9193 name = tmp + 2;
9194 }
14f9c5c9
AS
9195 }
9196
9197 if (name[0] == 'Q')
9198 {
14f9c5c9 9199 int v;
5b4ee69b 9200
14f9c5c9 9201 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9202 {
9203 if (sscanf (name + 2, "%x", &v) != 1)
9204 return name;
9205 }
14f9c5c9 9206 else
4c4b4cd2 9207 return name;
14f9c5c9 9208
4c4b4cd2 9209 GROW_VECT (result, result_len, 16);
14f9c5c9 9210 if (isascii (v) && isprint (v))
88c15c34 9211 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9212 else if (name[1] == 'U')
88c15c34 9213 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9214 else
88c15c34 9215 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9216
9217 return result;
9218 }
d2e4a39e 9219 else
4c4b4cd2 9220 {
c3e5cd34
PH
9221 tmp = strstr (name, "__");
9222 if (tmp == NULL)
9223 tmp = strstr (name, "$");
9224 if (tmp != NULL)
4c4b4cd2
PH
9225 {
9226 GROW_VECT (result, result_len, tmp - name + 1);
9227 strncpy (result, name, tmp - name);
9228 result[tmp - name] = '\0';
9229 return result;
9230 }
9231
9232 return name;
9233 }
14f9c5c9
AS
9234}
9235
14f9c5c9
AS
9236/* Evaluate the subexpression of EXP starting at *POS as for
9237 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9238 expression. */
14f9c5c9 9239
d2e4a39e
AS
9240static struct value *
9241evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9242{
4b27a620 9243 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9244}
9245
9246/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9247 value it wraps. */
14f9c5c9 9248
d2e4a39e
AS
9249static struct value *
9250unwrap_value (struct value *val)
14f9c5c9 9251{
df407dfe 9252 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9253
14f9c5c9
AS
9254 if (ada_is_aligner_type (type))
9255 {
de4d072f 9256 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9257 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9258
14f9c5c9 9259 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9260 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9261
9262 return unwrap_value (v);
9263 }
d2e4a39e 9264 else
14f9c5c9 9265 {
d2e4a39e 9266 struct type *raw_real_type =
61ee279c 9267 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9268
5bf03f13
JB
9269 /* If there is no parallel XVS or XVE type, then the value is
9270 already unwrapped. Return it without further modification. */
9271 if ((type == raw_real_type)
9272 && ada_find_parallel_type (type, "___XVE") == NULL)
9273 return val;
14f9c5c9 9274
d2e4a39e 9275 return
4c4b4cd2
PH
9276 coerce_unspec_val_to_type
9277 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9278 value_address (val),
1ed6ede0 9279 NULL, 1));
14f9c5c9
AS
9280 }
9281}
d2e4a39e
AS
9282
9283static struct value *
9284cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9
AS
9285{
9286 LONGEST val;
9287
df407dfe 9288 if (type == value_type (arg))
14f9c5c9 9289 return arg;
df407dfe 9290 else if (ada_is_fixed_point_type (value_type (arg)))
d2e4a39e 9291 val = ada_float_to_fixed (type,
df407dfe 9292 ada_fixed_to_float (value_type (arg),
4c4b4cd2 9293 value_as_long (arg)));
d2e4a39e 9294 else
14f9c5c9 9295 {
a53b7a21 9296 DOUBLEST argd = value_as_double (arg);
5b4ee69b 9297
14f9c5c9
AS
9298 val = ada_float_to_fixed (type, argd);
9299 }
9300
9301 return value_from_longest (type, val);
9302}
9303
d2e4a39e 9304static struct value *
a53b7a21 9305cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9306{
df407dfe 9307 DOUBLEST val = ada_fixed_to_float (value_type (arg),
4c4b4cd2 9308 value_as_long (arg));
5b4ee69b 9309
a53b7a21 9310 return value_from_double (type, val);
14f9c5c9
AS
9311}
9312
d99dcf51
JB
9313/* Given two array types T1 and T2, return nonzero iff both arrays
9314 contain the same number of elements. */
9315
9316static int
9317ada_same_array_size_p (struct type *t1, struct type *t2)
9318{
9319 LONGEST lo1, hi1, lo2, hi2;
9320
9321 /* Get the array bounds in order to verify that the size of
9322 the two arrays match. */
9323 if (!get_array_bounds (t1, &lo1, &hi1)
9324 || !get_array_bounds (t2, &lo2, &hi2))
9325 error (_("unable to determine array bounds"));
9326
9327 /* To make things easier for size comparison, normalize a bit
9328 the case of empty arrays by making sure that the difference
9329 between upper bound and lower bound is always -1. */
9330 if (lo1 > hi1)
9331 hi1 = lo1 - 1;
9332 if (lo2 > hi2)
9333 hi2 = lo2 - 1;
9334
9335 return (hi1 - lo1 == hi2 - lo2);
9336}
9337
9338/* Assuming that VAL is an array of integrals, and TYPE represents
9339 an array with the same number of elements, but with wider integral
9340 elements, return an array "casted" to TYPE. In practice, this
9341 means that the returned array is built by casting each element
9342 of the original array into TYPE's (wider) element type. */
9343
9344static struct value *
9345ada_promote_array_of_integrals (struct type *type, struct value *val)
9346{
9347 struct type *elt_type = TYPE_TARGET_TYPE (type);
9348 LONGEST lo, hi;
9349 struct value *res;
9350 LONGEST i;
9351
9352 /* Verify that both val and type are arrays of scalars, and
9353 that the size of val's elements is smaller than the size
9354 of type's element. */
9355 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9356 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9357 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9358 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9359 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9360 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9361
9362 if (!get_array_bounds (type, &lo, &hi))
9363 error (_("unable to determine array bounds"));
9364
9365 res = allocate_value (type);
9366
9367 /* Promote each array element. */
9368 for (i = 0; i < hi - lo + 1; i++)
9369 {
9370 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9371
9372 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9373 value_contents_all (elt), TYPE_LENGTH (elt_type));
9374 }
9375
9376 return res;
9377}
9378
4c4b4cd2
PH
9379/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9380 return the converted value. */
9381
d2e4a39e
AS
9382static struct value *
9383coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9384{
df407dfe 9385 struct type *type2 = value_type (val);
5b4ee69b 9386
14f9c5c9
AS
9387 if (type == type2)
9388 return val;
9389
61ee279c
PH
9390 type2 = ada_check_typedef (type2);
9391 type = ada_check_typedef (type);
14f9c5c9 9392
d2e4a39e
AS
9393 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9394 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9395 {
9396 val = ada_value_ind (val);
df407dfe 9397 type2 = value_type (val);
14f9c5c9
AS
9398 }
9399
d2e4a39e 9400 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9401 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9402 {
d99dcf51
JB
9403 if (!ada_same_array_size_p (type, type2))
9404 error (_("cannot assign arrays of different length"));
9405
9406 if (is_integral_type (TYPE_TARGET_TYPE (type))
9407 && is_integral_type (TYPE_TARGET_TYPE (type2))
9408 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9409 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9410 {
9411 /* Allow implicit promotion of the array elements to
9412 a wider type. */
9413 return ada_promote_array_of_integrals (type, val);
9414 }
9415
9416 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9417 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9418 error (_("Incompatible types in assignment"));
04624583 9419 deprecated_set_value_type (val, type);
14f9c5c9 9420 }
d2e4a39e 9421 return val;
14f9c5c9
AS
9422}
9423
4c4b4cd2
PH
9424static struct value *
9425ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9426{
9427 struct value *val;
9428 struct type *type1, *type2;
9429 LONGEST v, v1, v2;
9430
994b9211
AC
9431 arg1 = coerce_ref (arg1);
9432 arg2 = coerce_ref (arg2);
18af8284
JB
9433 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9434 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9435
76a01679
JB
9436 if (TYPE_CODE (type1) != TYPE_CODE_INT
9437 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9438 return value_binop (arg1, arg2, op);
9439
76a01679 9440 switch (op)
4c4b4cd2
PH
9441 {
9442 case BINOP_MOD:
9443 case BINOP_DIV:
9444 case BINOP_REM:
9445 break;
9446 default:
9447 return value_binop (arg1, arg2, op);
9448 }
9449
9450 v2 = value_as_long (arg2);
9451 if (v2 == 0)
323e0a4a 9452 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9453
9454 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9455 return value_binop (arg1, arg2, op);
9456
9457 v1 = value_as_long (arg1);
9458 switch (op)
9459 {
9460 case BINOP_DIV:
9461 v = v1 / v2;
76a01679
JB
9462 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9463 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9464 break;
9465 case BINOP_REM:
9466 v = v1 % v2;
76a01679
JB
9467 if (v * v1 < 0)
9468 v -= v2;
4c4b4cd2
PH
9469 break;
9470 default:
9471 /* Should not reach this point. */
9472 v = 0;
9473 }
9474
9475 val = allocate_value (type1);
990a07ab 9476 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9477 TYPE_LENGTH (value_type (val)),
9478 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9479 return val;
9480}
9481
9482static int
9483ada_value_equal (struct value *arg1, struct value *arg2)
9484{
df407dfe
AC
9485 if (ada_is_direct_array_type (value_type (arg1))
9486 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9487 {
f58b38bf
JB
9488 /* Automatically dereference any array reference before
9489 we attempt to perform the comparison. */
9490 arg1 = ada_coerce_ref (arg1);
9491 arg2 = ada_coerce_ref (arg2);
9492
4c4b4cd2
PH
9493 arg1 = ada_coerce_to_simple_array (arg1);
9494 arg2 = ada_coerce_to_simple_array (arg2);
df407dfe
AC
9495 if (TYPE_CODE (value_type (arg1)) != TYPE_CODE_ARRAY
9496 || TYPE_CODE (value_type (arg2)) != TYPE_CODE_ARRAY)
323e0a4a 9497 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9498 /* FIXME: The following works only for types whose
76a01679
JB
9499 representations use all bits (no padding or undefined bits)
9500 and do not have user-defined equality. */
9501 return
df407dfe 9502 TYPE_LENGTH (value_type (arg1)) == TYPE_LENGTH (value_type (arg2))
0fd88904 9503 && memcmp (value_contents (arg1), value_contents (arg2),
df407dfe 9504 TYPE_LENGTH (value_type (arg1))) == 0;
4c4b4cd2
PH
9505 }
9506 return value_equal (arg1, arg2);
9507}
9508
52ce6436
PH
9509/* Total number of component associations in the aggregate starting at
9510 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9511 OP_AGGREGATE. */
52ce6436
PH
9512
9513static int
9514num_component_specs (struct expression *exp, int pc)
9515{
9516 int n, m, i;
5b4ee69b 9517
52ce6436
PH
9518 m = exp->elts[pc + 1].longconst;
9519 pc += 3;
9520 n = 0;
9521 for (i = 0; i < m; i += 1)
9522 {
9523 switch (exp->elts[pc].opcode)
9524 {
9525 default:
9526 n += 1;
9527 break;
9528 case OP_CHOICES:
9529 n += exp->elts[pc + 1].longconst;
9530 break;
9531 }
9532 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9533 }
9534 return n;
9535}
9536
9537/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9538 component of LHS (a simple array or a record), updating *POS past
9539 the expression, assuming that LHS is contained in CONTAINER. Does
9540 not modify the inferior's memory, nor does it modify LHS (unless
9541 LHS == CONTAINER). */
9542
9543static void
9544assign_component (struct value *container, struct value *lhs, LONGEST index,
9545 struct expression *exp, int *pos)
9546{
9547 struct value *mark = value_mark ();
9548 struct value *elt;
5b4ee69b 9549
52ce6436
PH
9550 if (TYPE_CODE (value_type (lhs)) == TYPE_CODE_ARRAY)
9551 {
22601c15
UW
9552 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9553 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9554
52ce6436
PH
9555 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9556 }
9557 else
9558 {
9559 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9560 elt = ada_to_fixed_value (elt);
52ce6436
PH
9561 }
9562
9563 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9564 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9565 else
9566 value_assign_to_component (container, elt,
9567 ada_evaluate_subexp (NULL, exp, pos,
9568 EVAL_NORMAL));
9569
9570 value_free_to_mark (mark);
9571}
9572
9573/* Assuming that LHS represents an lvalue having a record or array
9574 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9575 of that aggregate's value to LHS, advancing *POS past the
9576 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9577 lvalue containing LHS (possibly LHS itself). Does not modify
9578 the inferior's memory, nor does it modify the contents of
0963b4bd 9579 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9580
9581static struct value *
9582assign_aggregate (struct value *container,
9583 struct value *lhs, struct expression *exp,
9584 int *pos, enum noside noside)
9585{
9586 struct type *lhs_type;
9587 int n = exp->elts[*pos+1].longconst;
9588 LONGEST low_index, high_index;
9589 int num_specs;
9590 LONGEST *indices;
9591 int max_indices, num_indices;
52ce6436 9592 int i;
52ce6436
PH
9593
9594 *pos += 3;
9595 if (noside != EVAL_NORMAL)
9596 {
52ce6436
PH
9597 for (i = 0; i < n; i += 1)
9598 ada_evaluate_subexp (NULL, exp, pos, noside);
9599 return container;
9600 }
9601
9602 container = ada_coerce_ref (container);
9603 if (ada_is_direct_array_type (value_type (container)))
9604 container = ada_coerce_to_simple_array (container);
9605 lhs = ada_coerce_ref (lhs);
9606 if (!deprecated_value_modifiable (lhs))
9607 error (_("Left operand of assignment is not a modifiable lvalue."));
9608
9609 lhs_type = value_type (lhs);
9610 if (ada_is_direct_array_type (lhs_type))
9611 {
9612 lhs = ada_coerce_to_simple_array (lhs);
9613 lhs_type = value_type (lhs);
9614 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9615 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9616 }
9617 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9618 {
9619 low_index = 0;
9620 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9621 }
9622 else
9623 error (_("Left-hand side must be array or record."));
9624
9625 num_specs = num_component_specs (exp, *pos - 3);
9626 max_indices = 4 * num_specs + 4;
9627 indices = alloca (max_indices * sizeof (indices[0]));
9628 indices[0] = indices[1] = low_index - 1;
9629 indices[2] = indices[3] = high_index + 1;
9630 num_indices = 4;
9631
9632 for (i = 0; i < n; i += 1)
9633 {
9634 switch (exp->elts[*pos].opcode)
9635 {
1fbf5ada
JB
9636 case OP_CHOICES:
9637 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9638 &num_indices, max_indices,
9639 low_index, high_index);
9640 break;
9641 case OP_POSITIONAL:
9642 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9643 &num_indices, max_indices,
9644 low_index, high_index);
1fbf5ada
JB
9645 break;
9646 case OP_OTHERS:
9647 if (i != n-1)
9648 error (_("Misplaced 'others' clause"));
9649 aggregate_assign_others (container, lhs, exp, pos, indices,
9650 num_indices, low_index, high_index);
9651 break;
9652 default:
9653 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9654 }
9655 }
9656
9657 return container;
9658}
9659
9660/* Assign into the component of LHS indexed by the OP_POSITIONAL
9661 construct at *POS, updating *POS past the construct, given that
9662 the positions are relative to lower bound LOW, where HIGH is the
9663 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9664 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9665 assign_aggregate. */
52ce6436
PH
9666static void
9667aggregate_assign_positional (struct value *container,
9668 struct value *lhs, struct expression *exp,
9669 int *pos, LONGEST *indices, int *num_indices,
9670 int max_indices, LONGEST low, LONGEST high)
9671{
9672 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9673
9674 if (ind - 1 == high)
e1d5a0d2 9675 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9676 if (ind <= high)
9677 {
9678 add_component_interval (ind, ind, indices, num_indices, max_indices);
9679 *pos += 3;
9680 assign_component (container, lhs, ind, exp, pos);
9681 }
9682 else
9683 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9684}
9685
9686/* Assign into the components of LHS indexed by the OP_CHOICES
9687 construct at *POS, updating *POS past the construct, given that
9688 the allowable indices are LOW..HIGH. Record the indices assigned
9689 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9690 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9691static void
9692aggregate_assign_from_choices (struct value *container,
9693 struct value *lhs, struct expression *exp,
9694 int *pos, LONGEST *indices, int *num_indices,
9695 int max_indices, LONGEST low, LONGEST high)
9696{
9697 int j;
9698 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9699 int choice_pos, expr_pc;
9700 int is_array = ada_is_direct_array_type (value_type (lhs));
9701
9702 choice_pos = *pos += 3;
9703
9704 for (j = 0; j < n_choices; j += 1)
9705 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9706 expr_pc = *pos;
9707 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9708
9709 for (j = 0; j < n_choices; j += 1)
9710 {
9711 LONGEST lower, upper;
9712 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9713
52ce6436
PH
9714 if (op == OP_DISCRETE_RANGE)
9715 {
9716 choice_pos += 1;
9717 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9718 EVAL_NORMAL));
9719 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9720 EVAL_NORMAL));
9721 }
9722 else if (is_array)
9723 {
9724 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9725 EVAL_NORMAL));
9726 upper = lower;
9727 }
9728 else
9729 {
9730 int ind;
0d5cff50 9731 const char *name;
5b4ee69b 9732
52ce6436
PH
9733 switch (op)
9734 {
9735 case OP_NAME:
9736 name = &exp->elts[choice_pos + 2].string;
9737 break;
9738 case OP_VAR_VALUE:
9739 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9740 break;
9741 default:
9742 error (_("Invalid record component association."));
9743 }
9744 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9745 ind = 0;
9746 if (! find_struct_field (name, value_type (lhs), 0,
9747 NULL, NULL, NULL, NULL, &ind))
9748 error (_("Unknown component name: %s."), name);
9749 lower = upper = ind;
9750 }
9751
9752 if (lower <= upper && (lower < low || upper > high))
9753 error (_("Index in component association out of bounds."));
9754
9755 add_component_interval (lower, upper, indices, num_indices,
9756 max_indices);
9757 while (lower <= upper)
9758 {
9759 int pos1;
5b4ee69b 9760
52ce6436
PH
9761 pos1 = expr_pc;
9762 assign_component (container, lhs, lower, exp, &pos1);
9763 lower += 1;
9764 }
9765 }
9766}
9767
9768/* Assign the value of the expression in the OP_OTHERS construct in
9769 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
9770 have not been previously assigned. The index intervals already assigned
9771 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 9772 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9773static void
9774aggregate_assign_others (struct value *container,
9775 struct value *lhs, struct expression *exp,
9776 int *pos, LONGEST *indices, int num_indices,
9777 LONGEST low, LONGEST high)
9778{
9779 int i;
5ce64950 9780 int expr_pc = *pos + 1;
52ce6436
PH
9781
9782 for (i = 0; i < num_indices - 2; i += 2)
9783 {
9784 LONGEST ind;
5b4ee69b 9785
52ce6436
PH
9786 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
9787 {
5ce64950 9788 int localpos;
5b4ee69b 9789
5ce64950
MS
9790 localpos = expr_pc;
9791 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
9792 }
9793 }
9794 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9795}
9796
9797/* Add the interval [LOW .. HIGH] to the sorted set of intervals
9798 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
9799 modifying *SIZE as needed. It is an error if *SIZE exceeds
9800 MAX_SIZE. The resulting intervals do not overlap. */
9801static void
9802add_component_interval (LONGEST low, LONGEST high,
9803 LONGEST* indices, int *size, int max_size)
9804{
9805 int i, j;
5b4ee69b 9806
52ce6436
PH
9807 for (i = 0; i < *size; i += 2) {
9808 if (high >= indices[i] && low <= indices[i + 1])
9809 {
9810 int kh;
5b4ee69b 9811
52ce6436
PH
9812 for (kh = i + 2; kh < *size; kh += 2)
9813 if (high < indices[kh])
9814 break;
9815 if (low < indices[i])
9816 indices[i] = low;
9817 indices[i + 1] = indices[kh - 1];
9818 if (high > indices[i + 1])
9819 indices[i + 1] = high;
9820 memcpy (indices + i + 2, indices + kh, *size - kh);
9821 *size -= kh - i - 2;
9822 return;
9823 }
9824 else if (high < indices[i])
9825 break;
9826 }
9827
9828 if (*size == max_size)
9829 error (_("Internal error: miscounted aggregate components."));
9830 *size += 2;
9831 for (j = *size-1; j >= i+2; j -= 1)
9832 indices[j] = indices[j - 2];
9833 indices[i] = low;
9834 indices[i + 1] = high;
9835}
9836
6e48bd2c
JB
9837/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
9838 is different. */
9839
9840static struct value *
9841ada_value_cast (struct type *type, struct value *arg2, enum noside noside)
9842{
9843 if (type == ada_check_typedef (value_type (arg2)))
9844 return arg2;
9845
9846 if (ada_is_fixed_point_type (type))
9847 return (cast_to_fixed (type, arg2));
9848
9849 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 9850 return cast_from_fixed (type, arg2);
6e48bd2c
JB
9851
9852 return value_cast (type, arg2);
9853}
9854
284614f0
JB
9855/* Evaluating Ada expressions, and printing their result.
9856 ------------------------------------------------------
9857
21649b50
JB
9858 1. Introduction:
9859 ----------------
9860
284614f0
JB
9861 We usually evaluate an Ada expression in order to print its value.
9862 We also evaluate an expression in order to print its type, which
9863 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
9864 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
9865 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
9866 the evaluation compared to the EVAL_NORMAL, but is otherwise very
9867 similar.
9868
9869 Evaluating expressions is a little more complicated for Ada entities
9870 than it is for entities in languages such as C. The main reason for
9871 this is that Ada provides types whose definition might be dynamic.
9872 One example of such types is variant records. Or another example
9873 would be an array whose bounds can only be known at run time.
9874
9875 The following description is a general guide as to what should be
9876 done (and what should NOT be done) in order to evaluate an expression
9877 involving such types, and when. This does not cover how the semantic
9878 information is encoded by GNAT as this is covered separatly. For the
9879 document used as the reference for the GNAT encoding, see exp_dbug.ads
9880 in the GNAT sources.
9881
9882 Ideally, we should embed each part of this description next to its
9883 associated code. Unfortunately, the amount of code is so vast right
9884 now that it's hard to see whether the code handling a particular
9885 situation might be duplicated or not. One day, when the code is
9886 cleaned up, this guide might become redundant with the comments
9887 inserted in the code, and we might want to remove it.
9888
21649b50
JB
9889 2. ``Fixing'' an Entity, the Simple Case:
9890 -----------------------------------------
9891
284614f0
JB
9892 When evaluating Ada expressions, the tricky issue is that they may
9893 reference entities whose type contents and size are not statically
9894 known. Consider for instance a variant record:
9895
9896 type Rec (Empty : Boolean := True) is record
9897 case Empty is
9898 when True => null;
9899 when False => Value : Integer;
9900 end case;
9901 end record;
9902 Yes : Rec := (Empty => False, Value => 1);
9903 No : Rec := (empty => True);
9904
9905 The size and contents of that record depends on the value of the
9906 descriminant (Rec.Empty). At this point, neither the debugging
9907 information nor the associated type structure in GDB are able to
9908 express such dynamic types. So what the debugger does is to create
9909 "fixed" versions of the type that applies to the specific object.
9910 We also informally refer to this opperation as "fixing" an object,
9911 which means creating its associated fixed type.
9912
9913 Example: when printing the value of variable "Yes" above, its fixed
9914 type would look like this:
9915
9916 type Rec is record
9917 Empty : Boolean;
9918 Value : Integer;
9919 end record;
9920
9921 On the other hand, if we printed the value of "No", its fixed type
9922 would become:
9923
9924 type Rec is record
9925 Empty : Boolean;
9926 end record;
9927
9928 Things become a little more complicated when trying to fix an entity
9929 with a dynamic type that directly contains another dynamic type,
9930 such as an array of variant records, for instance. There are
9931 two possible cases: Arrays, and records.
9932
21649b50
JB
9933 3. ``Fixing'' Arrays:
9934 ---------------------
9935
9936 The type structure in GDB describes an array in terms of its bounds,
9937 and the type of its elements. By design, all elements in the array
9938 have the same type and we cannot represent an array of variant elements
9939 using the current type structure in GDB. When fixing an array,
9940 we cannot fix the array element, as we would potentially need one
9941 fixed type per element of the array. As a result, the best we can do
9942 when fixing an array is to produce an array whose bounds and size
9943 are correct (allowing us to read it from memory), but without having
9944 touched its element type. Fixing each element will be done later,
9945 when (if) necessary.
9946
9947 Arrays are a little simpler to handle than records, because the same
9948 amount of memory is allocated for each element of the array, even if
1b536f04 9949 the amount of space actually used by each element differs from element
21649b50 9950 to element. Consider for instance the following array of type Rec:
284614f0
JB
9951
9952 type Rec_Array is array (1 .. 2) of Rec;
9953
1b536f04
JB
9954 The actual amount of memory occupied by each element might be different
9955 from element to element, depending on the value of their discriminant.
21649b50 9956 But the amount of space reserved for each element in the array remains
1b536f04 9957 fixed regardless. So we simply need to compute that size using
21649b50
JB
9958 the debugging information available, from which we can then determine
9959 the array size (we multiply the number of elements of the array by
9960 the size of each element).
9961
9962 The simplest case is when we have an array of a constrained element
9963 type. For instance, consider the following type declarations:
9964
9965 type Bounded_String (Max_Size : Integer) is
9966 Length : Integer;
9967 Buffer : String (1 .. Max_Size);
9968 end record;
9969 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
9970
9971 In this case, the compiler describes the array as an array of
9972 variable-size elements (identified by its XVS suffix) for which
9973 the size can be read in the parallel XVZ variable.
9974
9975 In the case of an array of an unconstrained element type, the compiler
9976 wraps the array element inside a private PAD type. This type should not
9977 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
9978 that we also use the adjective "aligner" in our code to designate
9979 these wrapper types.
9980
1b536f04 9981 In some cases, the size allocated for each element is statically
21649b50
JB
9982 known. In that case, the PAD type already has the correct size,
9983 and the array element should remain unfixed.
9984
9985 But there are cases when this size is not statically known.
9986 For instance, assuming that "Five" is an integer variable:
284614f0
JB
9987
9988 type Dynamic is array (1 .. Five) of Integer;
9989 type Wrapper (Has_Length : Boolean := False) is record
9990 Data : Dynamic;
9991 case Has_Length is
9992 when True => Length : Integer;
9993 when False => null;
9994 end case;
9995 end record;
9996 type Wrapper_Array is array (1 .. 2) of Wrapper;
9997
9998 Hello : Wrapper_Array := (others => (Has_Length => True,
9999 Data => (others => 17),
10000 Length => 1));
10001
10002
10003 The debugging info would describe variable Hello as being an
10004 array of a PAD type. The size of that PAD type is not statically
10005 known, but can be determined using a parallel XVZ variable.
10006 In that case, a copy of the PAD type with the correct size should
10007 be used for the fixed array.
10008
21649b50
JB
10009 3. ``Fixing'' record type objects:
10010 ----------------------------------
10011
10012 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10013 record types. In this case, in order to compute the associated
10014 fixed type, we need to determine the size and offset of each of
10015 its components. This, in turn, requires us to compute the fixed
10016 type of each of these components.
10017
10018 Consider for instance the example:
10019
10020 type Bounded_String (Max_Size : Natural) is record
10021 Str : String (1 .. Max_Size);
10022 Length : Natural;
10023 end record;
10024 My_String : Bounded_String (Max_Size => 10);
10025
10026 In that case, the position of field "Length" depends on the size
10027 of field Str, which itself depends on the value of the Max_Size
21649b50 10028 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10029 we need to fix the type of field Str. Therefore, fixing a variant
10030 record requires us to fix each of its components.
10031
10032 However, if a component does not have a dynamic size, the component
10033 should not be fixed. In particular, fields that use a PAD type
10034 should not fixed. Here is an example where this might happen
10035 (assuming type Rec above):
10036
10037 type Container (Big : Boolean) is record
10038 First : Rec;
10039 After : Integer;
10040 case Big is
10041 when True => Another : Integer;
10042 when False => null;
10043 end case;
10044 end record;
10045 My_Container : Container := (Big => False,
10046 First => (Empty => True),
10047 After => 42);
10048
10049 In that example, the compiler creates a PAD type for component First,
10050 whose size is constant, and then positions the component After just
10051 right after it. The offset of component After is therefore constant
10052 in this case.
10053
10054 The debugger computes the position of each field based on an algorithm
10055 that uses, among other things, the actual position and size of the field
21649b50
JB
10056 preceding it. Let's now imagine that the user is trying to print
10057 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10058 end up computing the offset of field After based on the size of the
10059 fixed version of field First. And since in our example First has
10060 only one actual field, the size of the fixed type is actually smaller
10061 than the amount of space allocated to that field, and thus we would
10062 compute the wrong offset of field After.
10063
21649b50
JB
10064 To make things more complicated, we need to watch out for dynamic
10065 components of variant records (identified by the ___XVL suffix in
10066 the component name). Even if the target type is a PAD type, the size
10067 of that type might not be statically known. So the PAD type needs
10068 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10069 we might end up with the wrong size for our component. This can be
10070 observed with the following type declarations:
284614f0
JB
10071
10072 type Octal is new Integer range 0 .. 7;
10073 type Octal_Array is array (Positive range <>) of Octal;
10074 pragma Pack (Octal_Array);
10075
10076 type Octal_Buffer (Size : Positive) is record
10077 Buffer : Octal_Array (1 .. Size);
10078 Length : Integer;
10079 end record;
10080
10081 In that case, Buffer is a PAD type whose size is unset and needs
10082 to be computed by fixing the unwrapped type.
10083
21649b50
JB
10084 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10085 ----------------------------------------------------------
10086
10087 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10088 thus far, be actually fixed?
10089
10090 The answer is: Only when referencing that element. For instance
10091 when selecting one component of a record, this specific component
10092 should be fixed at that point in time. Or when printing the value
10093 of a record, each component should be fixed before its value gets
10094 printed. Similarly for arrays, the element of the array should be
10095 fixed when printing each element of the array, or when extracting
10096 one element out of that array. On the other hand, fixing should
10097 not be performed on the elements when taking a slice of an array!
10098
10099 Note that one of the side-effects of miscomputing the offset and
10100 size of each field is that we end up also miscomputing the size
10101 of the containing type. This can have adverse results when computing
10102 the value of an entity. GDB fetches the value of an entity based
10103 on the size of its type, and thus a wrong size causes GDB to fetch
10104 the wrong amount of memory. In the case where the computed size is
10105 too small, GDB fetches too little data to print the value of our
10106 entiry. Results in this case as unpredicatble, as we usually read
10107 past the buffer containing the data =:-o. */
10108
10109/* Implement the evaluate_exp routine in the exp_descriptor structure
10110 for the Ada language. */
10111
52ce6436 10112static struct value *
ebf56fd3 10113ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10114 int *pos, enum noside noside)
14f9c5c9
AS
10115{
10116 enum exp_opcode op;
b5385fc0 10117 int tem;
14f9c5c9 10118 int pc;
5ec18f2b 10119 int preeval_pos;
14f9c5c9
AS
10120 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10121 struct type *type;
52ce6436 10122 int nargs, oplen;
d2e4a39e 10123 struct value **argvec;
14f9c5c9 10124
d2e4a39e
AS
10125 pc = *pos;
10126 *pos += 1;
14f9c5c9
AS
10127 op = exp->elts[pc].opcode;
10128
d2e4a39e 10129 switch (op)
14f9c5c9
AS
10130 {
10131 default:
10132 *pos -= 1;
6e48bd2c 10133 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10134
10135 if (noside == EVAL_NORMAL)
10136 arg1 = unwrap_value (arg1);
6e48bd2c
JB
10137
10138 /* If evaluating an OP_DOUBLE and an EXPECT_TYPE was provided,
10139 then we need to perform the conversion manually, because
10140 evaluate_subexp_standard doesn't do it. This conversion is
10141 necessary in Ada because the different kinds of float/fixed
10142 types in Ada have different representations.
10143
10144 Similarly, we need to perform the conversion from OP_LONG
10145 ourselves. */
10146 if ((op == OP_DOUBLE || op == OP_LONG) && expect_type != NULL)
10147 arg1 = ada_value_cast (expect_type, arg1, noside);
10148
10149 return arg1;
4c4b4cd2
PH
10150
10151 case OP_STRING:
10152 {
76a01679 10153 struct value *result;
5b4ee69b 10154
76a01679
JB
10155 *pos -= 1;
10156 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10157 /* The result type will have code OP_STRING, bashed there from
10158 OP_ARRAY. Bash it back. */
df407dfe
AC
10159 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10160 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10161 return result;
4c4b4cd2 10162 }
14f9c5c9
AS
10163
10164 case UNOP_CAST:
10165 (*pos) += 2;
10166 type = exp->elts[pc + 1].type;
10167 arg1 = evaluate_subexp (type, exp, pos, noside);
10168 if (noside == EVAL_SKIP)
4c4b4cd2 10169 goto nosideret;
6e48bd2c 10170 arg1 = ada_value_cast (type, arg1, noside);
14f9c5c9
AS
10171 return arg1;
10172
4c4b4cd2
PH
10173 case UNOP_QUAL:
10174 (*pos) += 2;
10175 type = exp->elts[pc + 1].type;
10176 return ada_evaluate_subexp (type, exp, pos, noside);
10177
14f9c5c9
AS
10178 case BINOP_ASSIGN:
10179 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10180 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10181 {
10182 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10183 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10184 return arg1;
10185 return ada_value_assign (arg1, arg1);
10186 }
003f3813
JB
10187 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10188 except if the lhs of our assignment is a convenience variable.
10189 In the case of assigning to a convenience variable, the lhs
10190 should be exactly the result of the evaluation of the rhs. */
10191 type = value_type (arg1);
10192 if (VALUE_LVAL (arg1) == lval_internalvar)
10193 type = NULL;
10194 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10195 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10196 return arg1;
df407dfe
AC
10197 if (ada_is_fixed_point_type (value_type (arg1)))
10198 arg2 = cast_to_fixed (value_type (arg1), arg2);
10199 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10200 error
323e0a4a 10201 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10202 else
df407dfe 10203 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10204 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10205
10206 case BINOP_ADD:
10207 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10208 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10209 if (noside == EVAL_SKIP)
4c4b4cd2 10210 goto nosideret;
2ac8a782
JB
10211 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10212 return (value_from_longest
10213 (value_type (arg1),
10214 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10215 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10216 return (value_from_longest
10217 (value_type (arg2),
10218 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10219 if ((ada_is_fixed_point_type (value_type (arg1))
10220 || ada_is_fixed_point_type (value_type (arg2)))
10221 && value_type (arg1) != value_type (arg2))
323e0a4a 10222 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10223 /* Do the addition, and cast the result to the type of the first
10224 argument. We cannot cast the result to a reference type, so if
10225 ARG1 is a reference type, find its underlying type. */
10226 type = value_type (arg1);
10227 while (TYPE_CODE (type) == TYPE_CODE_REF)
10228 type = TYPE_TARGET_TYPE (type);
f44316fa 10229 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10230 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10231
10232 case BINOP_SUB:
10233 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10234 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10235 if (noside == EVAL_SKIP)
4c4b4cd2 10236 goto nosideret;
2ac8a782
JB
10237 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10238 return (value_from_longest
10239 (value_type (arg1),
10240 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10241 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10242 return (value_from_longest
10243 (value_type (arg2),
10244 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10245 if ((ada_is_fixed_point_type (value_type (arg1))
10246 || ada_is_fixed_point_type (value_type (arg2)))
10247 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10248 error (_("Operands of fixed-point subtraction "
10249 "must have the same type"));
b7789565
JB
10250 /* Do the substraction, and cast the result to the type of the first
10251 argument. We cannot cast the result to a reference type, so if
10252 ARG1 is a reference type, find its underlying type. */
10253 type = value_type (arg1);
10254 while (TYPE_CODE (type) == TYPE_CODE_REF)
10255 type = TYPE_TARGET_TYPE (type);
f44316fa 10256 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10257 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10258
10259 case BINOP_MUL:
10260 case BINOP_DIV:
e1578042
JB
10261 case BINOP_REM:
10262 case BINOP_MOD:
14f9c5c9
AS
10263 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10264 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10265 if (noside == EVAL_SKIP)
4c4b4cd2 10266 goto nosideret;
e1578042 10267 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10268 {
10269 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10270 return value_zero (value_type (arg1), not_lval);
10271 }
14f9c5c9 10272 else
4c4b4cd2 10273 {
a53b7a21 10274 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10275 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10276 arg1 = cast_from_fixed (type, arg1);
df407dfe 10277 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10278 arg2 = cast_from_fixed (type, arg2);
f44316fa 10279 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10280 return ada_value_binop (arg1, arg2, op);
10281 }
10282
4c4b4cd2
PH
10283 case BINOP_EQUAL:
10284 case BINOP_NOTEQUAL:
14f9c5c9 10285 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10286 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10287 if (noside == EVAL_SKIP)
76a01679 10288 goto nosideret;
4c4b4cd2 10289 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10290 tem = 0;
4c4b4cd2 10291 else
f44316fa
UW
10292 {
10293 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10294 tem = ada_value_equal (arg1, arg2);
10295 }
4c4b4cd2 10296 if (op == BINOP_NOTEQUAL)
76a01679 10297 tem = !tem;
fbb06eb1
UW
10298 type = language_bool_type (exp->language_defn, exp->gdbarch);
10299 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10300
10301 case UNOP_NEG:
10302 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10303 if (noside == EVAL_SKIP)
10304 goto nosideret;
df407dfe
AC
10305 else if (ada_is_fixed_point_type (value_type (arg1)))
10306 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10307 else
f44316fa
UW
10308 {
10309 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10310 return value_neg (arg1);
10311 }
4c4b4cd2 10312
2330c6c6
JB
10313 case BINOP_LOGICAL_AND:
10314 case BINOP_LOGICAL_OR:
10315 case UNOP_LOGICAL_NOT:
000d5124
JB
10316 {
10317 struct value *val;
10318
10319 *pos -= 1;
10320 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10321 type = language_bool_type (exp->language_defn, exp->gdbarch);
10322 return value_cast (type, val);
000d5124 10323 }
2330c6c6
JB
10324
10325 case BINOP_BITWISE_AND:
10326 case BINOP_BITWISE_IOR:
10327 case BINOP_BITWISE_XOR:
000d5124
JB
10328 {
10329 struct value *val;
10330
10331 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10332 *pos = pc;
10333 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10334
10335 return value_cast (value_type (arg1), val);
10336 }
2330c6c6 10337
14f9c5c9
AS
10338 case OP_VAR_VALUE:
10339 *pos -= 1;
6799def4 10340
14f9c5c9 10341 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10342 {
10343 *pos += 4;
10344 goto nosideret;
10345 }
da5c522f
JB
10346
10347 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10348 /* Only encountered when an unresolved symbol occurs in a
10349 context other than a function call, in which case, it is
52ce6436 10350 invalid. */
323e0a4a 10351 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10352 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10353
10354 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10355 {
0c1f74cf 10356 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10357 /* Check to see if this is a tagged type. We also need to handle
10358 the case where the type is a reference to a tagged type, but
10359 we have to be careful to exclude pointers to tagged types.
10360 The latter should be shown as usual (as a pointer), whereas
10361 a reference should mostly be transparent to the user. */
10362 if (ada_is_tagged_type (type, 0)
023db19c 10363 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10364 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10365 {
10366 /* Tagged types are a little special in the fact that the real
10367 type is dynamic and can only be determined by inspecting the
10368 object's tag. This means that we need to get the object's
10369 value first (EVAL_NORMAL) and then extract the actual object
10370 type from its tag.
10371
10372 Note that we cannot skip the final step where we extract
10373 the object type from its tag, because the EVAL_NORMAL phase
10374 results in dynamic components being resolved into fixed ones.
10375 This can cause problems when trying to print the type
10376 description of tagged types whose parent has a dynamic size:
10377 We use the type name of the "_parent" component in order
10378 to print the name of the ancestor type in the type description.
10379 If that component had a dynamic size, the resolution into
10380 a fixed type would result in the loss of that type name,
10381 thus preventing us from printing the name of the ancestor
10382 type in the type description. */
10383 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10384
10385 if (TYPE_CODE (type) != TYPE_CODE_REF)
10386 {
10387 struct type *actual_type;
10388
10389 actual_type = type_from_tag (ada_value_tag (arg1));
10390 if (actual_type == NULL)
10391 /* If, for some reason, we were unable to determine
10392 the actual type from the tag, then use the static
10393 approximation that we just computed as a fallback.
10394 This can happen if the debugging information is
10395 incomplete, for instance. */
10396 actual_type = type;
10397 return value_zero (actual_type, not_lval);
10398 }
10399 else
10400 {
10401 /* In the case of a ref, ada_coerce_ref takes care
10402 of determining the actual type. But the evaluation
10403 should return a ref as it should be valid to ask
10404 for its address; so rebuild a ref after coerce. */
10405 arg1 = ada_coerce_ref (arg1);
10406 return value_ref (arg1);
10407 }
10408 }
0c1f74cf 10409
84754697
JB
10410 /* Records and unions for which GNAT encodings have been
10411 generated need to be statically fixed as well.
10412 Otherwise, non-static fixing produces a type where
10413 all dynamic properties are removed, which prevents "ptype"
10414 from being able to completely describe the type.
10415 For instance, a case statement in a variant record would be
10416 replaced by the relevant components based on the actual
10417 value of the discriminants. */
10418 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10419 && dynamic_template_type (type) != NULL)
10420 || (TYPE_CODE (type) == TYPE_CODE_UNION
10421 && ada_find_parallel_type (type, "___XVU") != NULL))
10422 {
10423 *pos += 4;
10424 return value_zero (to_static_fixed_type (type), not_lval);
10425 }
4c4b4cd2 10426 }
da5c522f
JB
10427
10428 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10429 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10430
10431 case OP_FUNCALL:
10432 (*pos) += 2;
10433
10434 /* Allocate arg vector, including space for the function to be
10435 called in argvec[0] and a terminating NULL. */
10436 nargs = longest_to_int (exp->elts[pc + 1].longconst);
10437 argvec =
10438 (struct value **) alloca (sizeof (struct value *) * (nargs + 2));
10439
10440 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10441 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10442 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10443 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10444 else
10445 {
10446 for (tem = 0; tem <= nargs; tem += 1)
10447 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10448 argvec[tem] = 0;
10449
10450 if (noside == EVAL_SKIP)
10451 goto nosideret;
10452 }
10453
ad82864c
JB
10454 if (ada_is_constrained_packed_array_type
10455 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10456 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10457 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10458 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10459 /* This is a packed array that has already been fixed, and
10460 therefore already coerced to a simple array. Nothing further
10461 to do. */
10462 ;
df407dfe
AC
10463 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF
10464 || (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
76a01679 10465 && VALUE_LVAL (argvec[0]) == lval_memory))
4c4b4cd2
PH
10466 argvec[0] = value_addr (argvec[0]);
10467
df407dfe 10468 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10469
10470 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10471 them. So, if this is an array typedef (encoding use for array
10472 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10473 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10474 type = ada_typedef_target_type (type);
10475
4c4b4cd2
PH
10476 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10477 {
61ee279c 10478 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10479 {
10480 case TYPE_CODE_FUNC:
61ee279c 10481 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10482 break;
10483 case TYPE_CODE_ARRAY:
10484 break;
10485 case TYPE_CODE_STRUCT:
10486 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10487 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10488 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10489 break;
10490 default:
323e0a4a 10491 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10492 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10493 break;
10494 }
10495 }
10496
10497 switch (TYPE_CODE (type))
10498 {
10499 case TYPE_CODE_FUNC:
10500 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972
PH
10501 {
10502 struct type *rtype = TYPE_TARGET_TYPE (type);
10503
10504 if (TYPE_GNU_IFUNC (type))
10505 return allocate_value (TYPE_TARGET_TYPE (rtype));
10506 return allocate_value (rtype);
10507 }
4c4b4cd2 10508 return call_function_by_hand (argvec[0], nargs, argvec + 1);
c8ea1972
PH
10509 case TYPE_CODE_INTERNAL_FUNCTION:
10510 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10511 /* We don't know anything about what the internal
10512 function might return, but we have to return
10513 something. */
10514 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10515 not_lval);
10516 else
10517 return call_internal_function (exp->gdbarch, exp->language_defn,
10518 argvec[0], nargs, argvec + 1);
10519
4c4b4cd2
PH
10520 case TYPE_CODE_STRUCT:
10521 {
10522 int arity;
10523
4c4b4cd2
PH
10524 arity = ada_array_arity (type);
10525 type = ada_array_element_type (type, nargs);
10526 if (type == NULL)
323e0a4a 10527 error (_("cannot subscript or call a record"));
4c4b4cd2 10528 if (arity != nargs)
323e0a4a 10529 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10530 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10531 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10532 return
10533 unwrap_value (ada_value_subscript
10534 (argvec[0], nargs, argvec + 1));
10535 }
10536 case TYPE_CODE_ARRAY:
10537 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10538 {
10539 type = ada_array_element_type (type, nargs);
10540 if (type == NULL)
323e0a4a 10541 error (_("element type of array unknown"));
4c4b4cd2 10542 else
0a07e705 10543 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10544 }
10545 return
10546 unwrap_value (ada_value_subscript
10547 (ada_coerce_to_simple_array (argvec[0]),
10548 nargs, argvec + 1));
10549 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10550 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10551 {
deede10c 10552 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10553 type = ada_array_element_type (type, nargs);
10554 if (type == NULL)
323e0a4a 10555 error (_("element type of array unknown"));
4c4b4cd2 10556 else
0a07e705 10557 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10558 }
10559 return
deede10c
JB
10560 unwrap_value (ada_value_ptr_subscript (argvec[0],
10561 nargs, argvec + 1));
4c4b4cd2
PH
10562
10563 default:
e1d5a0d2
PH
10564 error (_("Attempt to index or call something other than an "
10565 "array or function"));
4c4b4cd2
PH
10566 }
10567
10568 case TERNOP_SLICE:
10569 {
10570 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10571 struct value *low_bound_val =
10572 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10573 struct value *high_bound_val =
10574 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10575 LONGEST low_bound;
10576 LONGEST high_bound;
5b4ee69b 10577
994b9211
AC
10578 low_bound_val = coerce_ref (low_bound_val);
10579 high_bound_val = coerce_ref (high_bound_val);
714e53ab
PH
10580 low_bound = pos_atr (low_bound_val);
10581 high_bound = pos_atr (high_bound_val);
963a6417 10582
4c4b4cd2
PH
10583 if (noside == EVAL_SKIP)
10584 goto nosideret;
10585
4c4b4cd2
PH
10586 /* If this is a reference to an aligner type, then remove all
10587 the aligners. */
df407dfe
AC
10588 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10589 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10590 TYPE_TARGET_TYPE (value_type (array)) =
10591 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10592
ad82864c 10593 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10594 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10595
10596 /* If this is a reference to an array or an array lvalue,
10597 convert to a pointer. */
df407dfe
AC
10598 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10599 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10600 && VALUE_LVAL (array) == lval_memory))
10601 array = value_addr (array);
10602
1265e4aa 10603 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10604 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10605 (value_type (array))))
0b5d8877 10606 return empty_array (ada_type_of_array (array, 0), low_bound);
4c4b4cd2
PH
10607
10608 array = ada_coerce_to_simple_array_ptr (array);
10609
714e53ab
PH
10610 /* If we have more than one level of pointer indirection,
10611 dereference the value until we get only one level. */
df407dfe
AC
10612 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10613 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10614 == TYPE_CODE_PTR))
10615 array = value_ind (array);
10616
10617 /* Make sure we really do have an array type before going further,
10618 to avoid a SEGV when trying to get the index type or the target
10619 type later down the road if the debug info generated by
10620 the compiler is incorrect or incomplete. */
df407dfe 10621 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10622 error (_("cannot take slice of non-array"));
714e53ab 10623
828292f2
JB
10624 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10625 == TYPE_CODE_PTR)
4c4b4cd2 10626 {
828292f2
JB
10627 struct type *type0 = ada_check_typedef (value_type (array));
10628
0b5d8877 10629 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
828292f2 10630 return empty_array (TYPE_TARGET_TYPE (type0), low_bound);
4c4b4cd2
PH
10631 else
10632 {
10633 struct type *arr_type0 =
828292f2 10634 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10635
f5938064
JG
10636 return ada_value_slice_from_ptr (array, arr_type0,
10637 longest_to_int (low_bound),
10638 longest_to_int (high_bound));
4c4b4cd2
PH
10639 }
10640 }
10641 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10642 return array;
10643 else if (high_bound < low_bound)
df407dfe 10644 return empty_array (value_type (array), low_bound);
4c4b4cd2 10645 else
529cad9c
PH
10646 return ada_value_slice (array, longest_to_int (low_bound),
10647 longest_to_int (high_bound));
4c4b4cd2 10648 }
14f9c5c9 10649
4c4b4cd2
PH
10650 case UNOP_IN_RANGE:
10651 (*pos) += 2;
10652 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10653 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10654
14f9c5c9 10655 if (noside == EVAL_SKIP)
4c4b4cd2 10656 goto nosideret;
14f9c5c9 10657
4c4b4cd2
PH
10658 switch (TYPE_CODE (type))
10659 {
10660 default:
e1d5a0d2
PH
10661 lim_warning (_("Membership test incompletely implemented; "
10662 "always returns true"));
fbb06eb1
UW
10663 type = language_bool_type (exp->language_defn, exp->gdbarch);
10664 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10665
10666 case TYPE_CODE_RANGE:
030b4912
UW
10667 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10668 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10669 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10670 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10671 type = language_bool_type (exp->language_defn, exp->gdbarch);
10672 return
10673 value_from_longest (type,
4c4b4cd2
PH
10674 (value_less (arg1, arg3)
10675 || value_equal (arg1, arg3))
10676 && (value_less (arg2, arg1)
10677 || value_equal (arg2, arg1)));
10678 }
10679
10680 case BINOP_IN_BOUNDS:
14f9c5c9 10681 (*pos) += 2;
4c4b4cd2
PH
10682 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10683 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10684
4c4b4cd2
PH
10685 if (noside == EVAL_SKIP)
10686 goto nosideret;
14f9c5c9 10687
4c4b4cd2 10688 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10689 {
10690 type = language_bool_type (exp->language_defn, exp->gdbarch);
10691 return value_zero (type, not_lval);
10692 }
14f9c5c9 10693
4c4b4cd2 10694 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10695
1eea4ebd
UW
10696 type = ada_index_type (value_type (arg2), tem, "range");
10697 if (!type)
10698 type = value_type (arg1);
14f9c5c9 10699
1eea4ebd
UW
10700 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10701 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 10702
f44316fa
UW
10703 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10704 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10705 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10706 return
fbb06eb1 10707 value_from_longest (type,
4c4b4cd2
PH
10708 (value_less (arg1, arg3)
10709 || value_equal (arg1, arg3))
10710 && (value_less (arg2, arg1)
10711 || value_equal (arg2, arg1)));
10712
10713 case TERNOP_IN_RANGE:
10714 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10715 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10716 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10717
10718 if (noside == EVAL_SKIP)
10719 goto nosideret;
10720
f44316fa
UW
10721 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10722 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 10723 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 10724 return
fbb06eb1 10725 value_from_longest (type,
4c4b4cd2
PH
10726 (value_less (arg1, arg3)
10727 || value_equal (arg1, arg3))
10728 && (value_less (arg2, arg1)
10729 || value_equal (arg2, arg1)));
10730
10731 case OP_ATR_FIRST:
10732 case OP_ATR_LAST:
10733 case OP_ATR_LENGTH:
10734 {
76a01679 10735 struct type *type_arg;
5b4ee69b 10736
76a01679
JB
10737 if (exp->elts[*pos].opcode == OP_TYPE)
10738 {
10739 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
10740 arg1 = NULL;
5bc23cb3 10741 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
10742 }
10743 else
10744 {
10745 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10746 type_arg = NULL;
10747 }
10748
10749 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 10750 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
10751 tem = longest_to_int (exp->elts[*pos + 2].longconst);
10752 *pos += 4;
10753
10754 if (noside == EVAL_SKIP)
10755 goto nosideret;
10756
10757 if (type_arg == NULL)
10758 {
10759 arg1 = ada_coerce_ref (arg1);
10760
ad82864c 10761 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
10762 arg1 = ada_coerce_to_simple_array (arg1);
10763
aa4fb036 10764 if (op == OP_ATR_LENGTH)
1eea4ebd 10765 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10766 else
10767 {
10768 type = ada_index_type (value_type (arg1), tem,
10769 ada_attribute_name (op));
10770 if (type == NULL)
10771 type = builtin_type (exp->gdbarch)->builtin_int;
10772 }
76a01679
JB
10773
10774 if (noside == EVAL_AVOID_SIDE_EFFECTS)
1eea4ebd 10775 return allocate_value (type);
76a01679
JB
10776
10777 switch (op)
10778 {
10779 default: /* Should never happen. */
323e0a4a 10780 error (_("unexpected attribute encountered"));
76a01679 10781 case OP_ATR_FIRST:
1eea4ebd
UW
10782 return value_from_longest
10783 (type, ada_array_bound (arg1, tem, 0));
76a01679 10784 case OP_ATR_LAST:
1eea4ebd
UW
10785 return value_from_longest
10786 (type, ada_array_bound (arg1, tem, 1));
76a01679 10787 case OP_ATR_LENGTH:
1eea4ebd
UW
10788 return value_from_longest
10789 (type, ada_array_length (arg1, tem));
76a01679
JB
10790 }
10791 }
10792 else if (discrete_type_p (type_arg))
10793 {
10794 struct type *range_type;
0d5cff50 10795 const char *name = ada_type_name (type_arg);
5b4ee69b 10796
76a01679
JB
10797 range_type = NULL;
10798 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 10799 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
10800 if (range_type == NULL)
10801 range_type = type_arg;
10802 switch (op)
10803 {
10804 default:
323e0a4a 10805 error (_("unexpected attribute encountered"));
76a01679 10806 case OP_ATR_FIRST:
690cc4eb 10807 return value_from_longest
43bbcdc2 10808 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 10809 case OP_ATR_LAST:
690cc4eb 10810 return value_from_longest
43bbcdc2 10811 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 10812 case OP_ATR_LENGTH:
323e0a4a 10813 error (_("the 'length attribute applies only to array types"));
76a01679
JB
10814 }
10815 }
10816 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 10817 error (_("unimplemented type attribute"));
76a01679
JB
10818 else
10819 {
10820 LONGEST low, high;
10821
ad82864c
JB
10822 if (ada_is_constrained_packed_array_type (type_arg))
10823 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 10824
aa4fb036 10825 if (op == OP_ATR_LENGTH)
1eea4ebd 10826 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
10827 else
10828 {
10829 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
10830 if (type == NULL)
10831 type = builtin_type (exp->gdbarch)->builtin_int;
10832 }
1eea4ebd 10833
76a01679
JB
10834 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10835 return allocate_value (type);
10836
10837 switch (op)
10838 {
10839 default:
323e0a4a 10840 error (_("unexpected attribute encountered"));
76a01679 10841 case OP_ATR_FIRST:
1eea4ebd 10842 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
10843 return value_from_longest (type, low);
10844 case OP_ATR_LAST:
1eea4ebd 10845 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10846 return value_from_longest (type, high);
10847 case OP_ATR_LENGTH:
1eea4ebd
UW
10848 low = ada_array_bound_from_type (type_arg, tem, 0);
10849 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
10850 return value_from_longest (type, high - low + 1);
10851 }
10852 }
14f9c5c9
AS
10853 }
10854
4c4b4cd2
PH
10855 case OP_ATR_TAG:
10856 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10857 if (noside == EVAL_SKIP)
76a01679 10858 goto nosideret;
4c4b4cd2
PH
10859
10860 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10861 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
10862
10863 return ada_value_tag (arg1);
10864
10865 case OP_ATR_MIN:
10866 case OP_ATR_MAX:
10867 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10868 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10869 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10870 if (noside == EVAL_SKIP)
76a01679 10871 goto nosideret;
d2e4a39e 10872 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10873 return value_zero (value_type (arg1), not_lval);
14f9c5c9 10874 else
f44316fa
UW
10875 {
10876 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10877 return value_binop (arg1, arg2,
10878 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
10879 }
14f9c5c9 10880
4c4b4cd2
PH
10881 case OP_ATR_MODULUS:
10882 {
31dedfee 10883 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 10884
5b4ee69b 10885 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
10886 if (noside == EVAL_SKIP)
10887 goto nosideret;
4c4b4cd2 10888
76a01679 10889 if (!ada_is_modular_type (type_arg))
323e0a4a 10890 error (_("'modulus must be applied to modular type"));
4c4b4cd2 10891
76a01679
JB
10892 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
10893 ada_modulus (type_arg));
4c4b4cd2
PH
10894 }
10895
10896
10897 case OP_ATR_POS:
10898 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
10899 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10900 if (noside == EVAL_SKIP)
76a01679 10901 goto nosideret;
3cb382c9
UW
10902 type = builtin_type (exp->gdbarch)->builtin_int;
10903 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10904 return value_zero (type, not_lval);
14f9c5c9 10905 else
3cb382c9 10906 return value_pos_atr (type, arg1);
14f9c5c9 10907
4c4b4cd2
PH
10908 case OP_ATR_SIZE:
10909 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
10910 type = value_type (arg1);
10911
10912 /* If the argument is a reference, then dereference its type, since
10913 the user is really asking for the size of the actual object,
10914 not the size of the pointer. */
10915 if (TYPE_CODE (type) == TYPE_CODE_REF)
10916 type = TYPE_TARGET_TYPE (type);
10917
4c4b4cd2 10918 if (noside == EVAL_SKIP)
76a01679 10919 goto nosideret;
4c4b4cd2 10920 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 10921 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 10922 else
22601c15 10923 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 10924 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
10925
10926 case OP_ATR_VAL:
10927 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 10928 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 10929 type = exp->elts[pc + 2].type;
14f9c5c9 10930 if (noside == EVAL_SKIP)
76a01679 10931 goto nosideret;
4c4b4cd2 10932 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10933 return value_zero (type, not_lval);
4c4b4cd2 10934 else
76a01679 10935 return value_val_atr (type, arg1);
4c4b4cd2
PH
10936
10937 case BINOP_EXP:
10938 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10939 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10940 if (noside == EVAL_SKIP)
10941 goto nosideret;
10942 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 10943 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 10944 else
f44316fa
UW
10945 {
10946 /* For integer exponentiation operations,
10947 only promote the first argument. */
10948 if (is_integral_type (value_type (arg2)))
10949 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10950 else
10951 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10952
10953 return value_binop (arg1, arg2, op);
10954 }
4c4b4cd2
PH
10955
10956 case UNOP_PLUS:
10957 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10958 if (noside == EVAL_SKIP)
10959 goto nosideret;
10960 else
10961 return arg1;
10962
10963 case UNOP_ABS:
10964 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10965 if (noside == EVAL_SKIP)
10966 goto nosideret;
f44316fa 10967 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 10968 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 10969 return value_neg (arg1);
14f9c5c9 10970 else
4c4b4cd2 10971 return arg1;
14f9c5c9
AS
10972
10973 case UNOP_IND:
5ec18f2b 10974 preeval_pos = *pos;
6b0d7253 10975 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10976 if (noside == EVAL_SKIP)
4c4b4cd2 10977 goto nosideret;
df407dfe 10978 type = ada_check_typedef (value_type (arg1));
14f9c5c9 10979 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
10980 {
10981 if (ada_is_array_descriptor_type (type))
10982 /* GDB allows dereferencing GNAT array descriptors. */
10983 {
10984 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 10985
4c4b4cd2 10986 if (arrType == NULL)
323e0a4a 10987 error (_("Attempt to dereference null array pointer."));
00a4c844 10988 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
10989 }
10990 else if (TYPE_CODE (type) == TYPE_CODE_PTR
10991 || TYPE_CODE (type) == TYPE_CODE_REF
10992 /* In C you can dereference an array to get the 1st elt. */
10993 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 10994 {
5ec18f2b
JG
10995 /* As mentioned in the OP_VAR_VALUE case, tagged types can
10996 only be determined by inspecting the object's tag.
10997 This means that we need to evaluate completely the
10998 expression in order to get its type. */
10999
023db19c
JB
11000 if ((TYPE_CODE (type) == TYPE_CODE_REF
11001 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
11002 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11003 {
11004 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11005 EVAL_NORMAL);
11006 type = value_type (ada_value_ind (arg1));
11007 }
11008 else
11009 {
11010 type = to_static_fixed_type
11011 (ada_aligned_type
11012 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11013 }
c1b5a1a6 11014 ada_ensure_varsize_limit (type);
714e53ab
PH
11015 return value_zero (type, lval_memory);
11016 }
4c4b4cd2 11017 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
11018 {
11019 /* GDB allows dereferencing an int. */
11020 if (expect_type == NULL)
11021 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11022 lval_memory);
11023 else
11024 {
11025 expect_type =
11026 to_static_fixed_type (ada_aligned_type (expect_type));
11027 return value_zero (expect_type, lval_memory);
11028 }
11029 }
4c4b4cd2 11030 else
323e0a4a 11031 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11032 }
0963b4bd 11033 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11034 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11035
96967637
JB
11036 if (TYPE_CODE (type) == TYPE_CODE_INT)
11037 /* GDB allows dereferencing an int. If we were given
11038 the expect_type, then use that as the target type.
11039 Otherwise, assume that the target type is an int. */
11040 {
11041 if (expect_type != NULL)
11042 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11043 arg1));
11044 else
11045 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11046 (CORE_ADDR) value_as_address (arg1));
11047 }
6b0d7253 11048
4c4b4cd2
PH
11049 if (ada_is_array_descriptor_type (type))
11050 /* GDB allows dereferencing GNAT array descriptors. */
11051 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11052 else
4c4b4cd2 11053 return ada_value_ind (arg1);
14f9c5c9
AS
11054
11055 case STRUCTOP_STRUCT:
11056 tem = longest_to_int (exp->elts[pc + 1].longconst);
11057 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11058 preeval_pos = *pos;
14f9c5c9
AS
11059 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11060 if (noside == EVAL_SKIP)
4c4b4cd2 11061 goto nosideret;
14f9c5c9 11062 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11063 {
df407dfe 11064 struct type *type1 = value_type (arg1);
5b4ee69b 11065
76a01679
JB
11066 if (ada_is_tagged_type (type1, 1))
11067 {
11068 type = ada_lookup_struct_elt_type (type1,
11069 &exp->elts[pc + 2].string,
11070 1, 1, NULL);
5ec18f2b
JG
11071
11072 /* If the field is not found, check if it exists in the
11073 extension of this object's type. This means that we
11074 need to evaluate completely the expression. */
11075
76a01679 11076 if (type == NULL)
5ec18f2b
JG
11077 {
11078 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11079 EVAL_NORMAL);
11080 arg1 = ada_value_struct_elt (arg1,
11081 &exp->elts[pc + 2].string,
11082 0);
11083 arg1 = unwrap_value (arg1);
11084 type = value_type (ada_to_fixed_value (arg1));
11085 }
76a01679
JB
11086 }
11087 else
11088 type =
11089 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
11090 0, NULL);
11091
11092 return value_zero (ada_aligned_type (type), lval_memory);
11093 }
14f9c5c9 11094 else
284614f0
JB
11095 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11096 arg1 = unwrap_value (arg1);
11097 return ada_to_fixed_value (arg1);
11098
14f9c5c9 11099 case OP_TYPE:
4c4b4cd2
PH
11100 /* The value is not supposed to be used. This is here to make it
11101 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11102 (*pos) += 2;
11103 if (noside == EVAL_SKIP)
4c4b4cd2 11104 goto nosideret;
14f9c5c9 11105 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11106 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11107 else
323e0a4a 11108 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11109
11110 case OP_AGGREGATE:
11111 case OP_CHOICES:
11112 case OP_OTHERS:
11113 case OP_DISCRETE_RANGE:
11114 case OP_POSITIONAL:
11115 case OP_NAME:
11116 if (noside == EVAL_NORMAL)
11117 switch (op)
11118 {
11119 case OP_NAME:
11120 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11121 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11122 case OP_AGGREGATE:
11123 error (_("Aggregates only allowed on the right of an assignment"));
11124 default:
0963b4bd
MS
11125 internal_error (__FILE__, __LINE__,
11126 _("aggregate apparently mangled"));
52ce6436
PH
11127 }
11128
11129 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11130 *pos += oplen - 1;
11131 for (tem = 0; tem < nargs; tem += 1)
11132 ada_evaluate_subexp (NULL, exp, pos, noside);
11133 goto nosideret;
14f9c5c9
AS
11134 }
11135
11136nosideret:
22601c15 11137 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int, 1);
14f9c5c9 11138}
14f9c5c9 11139\f
d2e4a39e 11140
4c4b4cd2 11141 /* Fixed point */
14f9c5c9
AS
11142
11143/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11144 type name that encodes the 'small and 'delta information.
4c4b4cd2 11145 Otherwise, return NULL. */
14f9c5c9 11146
d2e4a39e 11147static const char *
ebf56fd3 11148fixed_type_info (struct type *type)
14f9c5c9 11149{
d2e4a39e 11150 const char *name = ada_type_name (type);
14f9c5c9
AS
11151 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11152
d2e4a39e
AS
11153 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11154 {
14f9c5c9 11155 const char *tail = strstr (name, "___XF_");
5b4ee69b 11156
14f9c5c9 11157 if (tail == NULL)
4c4b4cd2 11158 return NULL;
d2e4a39e 11159 else
4c4b4cd2 11160 return tail + 5;
14f9c5c9
AS
11161 }
11162 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11163 return fixed_type_info (TYPE_TARGET_TYPE (type));
11164 else
11165 return NULL;
11166}
11167
4c4b4cd2 11168/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11169
11170int
ebf56fd3 11171ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11172{
11173 return fixed_type_info (type) != NULL;
11174}
11175
4c4b4cd2
PH
11176/* Return non-zero iff TYPE represents a System.Address type. */
11177
11178int
11179ada_is_system_address_type (struct type *type)
11180{
11181 return (TYPE_NAME (type)
11182 && strcmp (TYPE_NAME (type), "system__address") == 0);
11183}
11184
14f9c5c9
AS
11185/* Assuming that TYPE is the representation of an Ada fixed-point
11186 type, return its delta, or -1 if the type is malformed and the
4c4b4cd2 11187 delta cannot be determined. */
14f9c5c9
AS
11188
11189DOUBLEST
ebf56fd3 11190ada_delta (struct type *type)
14f9c5c9
AS
11191{
11192 const char *encoding = fixed_type_info (type);
facc390f 11193 DOUBLEST num, den;
14f9c5c9 11194
facc390f
JB
11195 /* Strictly speaking, num and den are encoded as integer. However,
11196 they may not fit into a long, and they will have to be converted
11197 to DOUBLEST anyway. So scan them as DOUBLEST. */
11198 if (sscanf (encoding, "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11199 &num, &den) < 2)
14f9c5c9 11200 return -1.0;
d2e4a39e 11201 else
facc390f 11202 return num / den;
14f9c5c9
AS
11203}
11204
11205/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11206 factor ('SMALL value) associated with the type. */
14f9c5c9
AS
11207
11208static DOUBLEST
ebf56fd3 11209scaling_factor (struct type *type)
14f9c5c9
AS
11210{
11211 const char *encoding = fixed_type_info (type);
facc390f 11212 DOUBLEST num0, den0, num1, den1;
14f9c5c9 11213 int n;
d2e4a39e 11214
facc390f
JB
11215 /* Strictly speaking, num's and den's are encoded as integer. However,
11216 they may not fit into a long, and they will have to be converted
11217 to DOUBLEST anyway. So scan them as DOUBLEST. */
11218 n = sscanf (encoding,
11219 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT
11220 "_%" DOUBLEST_SCAN_FORMAT "_%" DOUBLEST_SCAN_FORMAT,
11221 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11222
11223 if (n < 2)
11224 return 1.0;
11225 else if (n == 4)
facc390f 11226 return num1 / den1;
d2e4a39e 11227 else
facc390f 11228 return num0 / den0;
14f9c5c9
AS
11229}
11230
11231
11232/* Assuming that X is the representation of a value of fixed-point
4c4b4cd2 11233 type TYPE, return its floating-point equivalent. */
14f9c5c9
AS
11234
11235DOUBLEST
ebf56fd3 11236ada_fixed_to_float (struct type *type, LONGEST x)
14f9c5c9 11237{
d2e4a39e 11238 return (DOUBLEST) x *scaling_factor (type);
14f9c5c9
AS
11239}
11240
4c4b4cd2
PH
11241/* The representation of a fixed-point value of type TYPE
11242 corresponding to the value X. */
14f9c5c9
AS
11243
11244LONGEST
ebf56fd3 11245ada_float_to_fixed (struct type *type, DOUBLEST x)
14f9c5c9
AS
11246{
11247 return (LONGEST) (x / scaling_factor (type) + 0.5);
11248}
11249
14f9c5c9 11250\f
d2e4a39e 11251
4c4b4cd2 11252 /* Range types */
14f9c5c9
AS
11253
11254/* Scan STR beginning at position K for a discriminant name, and
11255 return the value of that discriminant field of DVAL in *PX. If
11256 PNEW_K is not null, put the position of the character beyond the
11257 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11258 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11259
11260static int
07d8f827 11261scan_discrim_bound (char *str, int k, struct value *dval, LONGEST * px,
76a01679 11262 int *pnew_k)
14f9c5c9
AS
11263{
11264 static char *bound_buffer = NULL;
11265 static size_t bound_buffer_len = 0;
11266 char *bound;
11267 char *pend;
d2e4a39e 11268 struct value *bound_val;
14f9c5c9
AS
11269
11270 if (dval == NULL || str == NULL || str[k] == '\0')
11271 return 0;
11272
d2e4a39e 11273 pend = strstr (str + k, "__");
14f9c5c9
AS
11274 if (pend == NULL)
11275 {
d2e4a39e 11276 bound = str + k;
14f9c5c9
AS
11277 k += strlen (bound);
11278 }
d2e4a39e 11279 else
14f9c5c9 11280 {
d2e4a39e 11281 GROW_VECT (bound_buffer, bound_buffer_len, pend - (str + k) + 1);
14f9c5c9 11282 bound = bound_buffer;
d2e4a39e
AS
11283 strncpy (bound_buffer, str + k, pend - (str + k));
11284 bound[pend - (str + k)] = '\0';
11285 k = pend - str;
14f9c5c9 11286 }
d2e4a39e 11287
df407dfe 11288 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11289 if (bound_val == NULL)
11290 return 0;
11291
11292 *px = value_as_long (bound_val);
11293 if (pnew_k != NULL)
11294 *pnew_k = k;
11295 return 1;
11296}
11297
11298/* Value of variable named NAME in the current environment. If
11299 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11300 otherwise causes an error with message ERR_MSG. */
11301
d2e4a39e
AS
11302static struct value *
11303get_var_value (char *name, char *err_msg)
14f9c5c9 11304{
4c4b4cd2 11305 struct ada_symbol_info *syms;
14f9c5c9
AS
11306 int nsyms;
11307
4c4b4cd2 11308 nsyms = ada_lookup_symbol_list (name, get_selected_block (0), VAR_DOMAIN,
4eeaa230 11309 &syms);
14f9c5c9
AS
11310
11311 if (nsyms != 1)
11312 {
11313 if (err_msg == NULL)
4c4b4cd2 11314 return 0;
14f9c5c9 11315 else
8a3fe4f8 11316 error (("%s"), err_msg);
14f9c5c9
AS
11317 }
11318
4c4b4cd2 11319 return value_of_variable (syms[0].sym, syms[0].block);
14f9c5c9 11320}
d2e4a39e 11321
14f9c5c9 11322/* Value of integer variable named NAME in the current environment. If
4c4b4cd2
PH
11323 no such variable found, returns 0, and sets *FLAG to 0. If
11324 successful, sets *FLAG to 1. */
11325
14f9c5c9 11326LONGEST
4c4b4cd2 11327get_int_var_value (char *name, int *flag)
14f9c5c9 11328{
4c4b4cd2 11329 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11330
14f9c5c9
AS
11331 if (var_val == 0)
11332 {
11333 if (flag != NULL)
4c4b4cd2 11334 *flag = 0;
14f9c5c9
AS
11335 return 0;
11336 }
11337 else
11338 {
11339 if (flag != NULL)
4c4b4cd2 11340 *flag = 1;
14f9c5c9
AS
11341 return value_as_long (var_val);
11342 }
11343}
d2e4a39e 11344
14f9c5c9
AS
11345
11346/* Return a range type whose base type is that of the range type named
11347 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11348 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11349 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11350 corresponding range type from debug information; fall back to using it
11351 if symbol lookup fails. If a new type must be created, allocate it
11352 like ORIG_TYPE was. The bounds information, in general, is encoded
11353 in NAME, the base type given in the named range type. */
14f9c5c9 11354
d2e4a39e 11355static struct type *
28c85d6c 11356to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11357{
0d5cff50 11358 const char *name;
14f9c5c9 11359 struct type *base_type;
d2e4a39e 11360 char *subtype_info;
14f9c5c9 11361
28c85d6c
JB
11362 gdb_assert (raw_type != NULL);
11363 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11364
1ce677a4 11365 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11366 base_type = TYPE_TARGET_TYPE (raw_type);
11367 else
11368 base_type = raw_type;
11369
28c85d6c 11370 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11371 subtype_info = strstr (name, "___XD");
11372 if (subtype_info == NULL)
690cc4eb 11373 {
43bbcdc2
PH
11374 LONGEST L = ada_discrete_type_low_bound (raw_type);
11375 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11376
690cc4eb
PH
11377 if (L < INT_MIN || U > INT_MAX)
11378 return raw_type;
11379 else
0c9c3474
SA
11380 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11381 L, U);
690cc4eb 11382 }
14f9c5c9
AS
11383 else
11384 {
11385 static char *name_buf = NULL;
11386 static size_t name_len = 0;
11387 int prefix_len = subtype_info - name;
11388 LONGEST L, U;
11389 struct type *type;
11390 char *bounds_str;
11391 int n;
11392
11393 GROW_VECT (name_buf, name_len, prefix_len + 5);
11394 strncpy (name_buf, name, prefix_len);
11395 name_buf[prefix_len] = '\0';
11396
11397 subtype_info += 5;
11398 bounds_str = strchr (subtype_info, '_');
11399 n = 1;
11400
d2e4a39e 11401 if (*subtype_info == 'L')
4c4b4cd2
PH
11402 {
11403 if (!ada_scan_number (bounds_str, n, &L, &n)
11404 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11405 return raw_type;
11406 if (bounds_str[n] == '_')
11407 n += 2;
0963b4bd 11408 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11409 n += 1;
11410 subtype_info += 1;
11411 }
d2e4a39e 11412 else
4c4b4cd2
PH
11413 {
11414 int ok;
5b4ee69b 11415
4c4b4cd2
PH
11416 strcpy (name_buf + prefix_len, "___L");
11417 L = get_int_var_value (name_buf, &ok);
11418 if (!ok)
11419 {
323e0a4a 11420 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11421 L = 1;
11422 }
11423 }
14f9c5c9 11424
d2e4a39e 11425 if (*subtype_info == 'U')
4c4b4cd2
PH
11426 {
11427 if (!ada_scan_number (bounds_str, n, &U, &n)
11428 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11429 return raw_type;
11430 }
d2e4a39e 11431 else
4c4b4cd2
PH
11432 {
11433 int ok;
5b4ee69b 11434
4c4b4cd2
PH
11435 strcpy (name_buf + prefix_len, "___U");
11436 U = get_int_var_value (name_buf, &ok);
11437 if (!ok)
11438 {
323e0a4a 11439 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11440 U = L;
11441 }
11442 }
14f9c5c9 11443
0c9c3474
SA
11444 type = create_static_range_type (alloc_type_copy (raw_type),
11445 base_type, L, U);
d2e4a39e 11446 TYPE_NAME (type) = name;
14f9c5c9
AS
11447 return type;
11448 }
11449}
11450
4c4b4cd2
PH
11451/* True iff NAME is the name of a range type. */
11452
14f9c5c9 11453int
d2e4a39e 11454ada_is_range_type_name (const char *name)
14f9c5c9
AS
11455{
11456 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11457}
14f9c5c9 11458\f
d2e4a39e 11459
4c4b4cd2
PH
11460 /* Modular types */
11461
11462/* True iff TYPE is an Ada modular type. */
14f9c5c9 11463
14f9c5c9 11464int
d2e4a39e 11465ada_is_modular_type (struct type *type)
14f9c5c9 11466{
18af8284 11467 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11468
11469 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11470 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11471 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11472}
11473
4c4b4cd2
PH
11474/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11475
61ee279c 11476ULONGEST
0056e4d5 11477ada_modulus (struct type *type)
14f9c5c9 11478{
43bbcdc2 11479 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11480}
d2e4a39e 11481\f
f7f9143b
JB
11482
11483/* Ada exception catchpoint support:
11484 ---------------------------------
11485
11486 We support 3 kinds of exception catchpoints:
11487 . catchpoints on Ada exceptions
11488 . catchpoints on unhandled Ada exceptions
11489 . catchpoints on failed assertions
11490
11491 Exceptions raised during failed assertions, or unhandled exceptions
11492 could perfectly be caught with the general catchpoint on Ada exceptions.
11493 However, we can easily differentiate these two special cases, and having
11494 the option to distinguish these two cases from the rest can be useful
11495 to zero-in on certain situations.
11496
11497 Exception catchpoints are a specialized form of breakpoint,
11498 since they rely on inserting breakpoints inside known routines
11499 of the GNAT runtime. The implementation therefore uses a standard
11500 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11501 of breakpoint_ops.
11502
0259addd
JB
11503 Support in the runtime for exception catchpoints have been changed
11504 a few times already, and these changes affect the implementation
11505 of these catchpoints. In order to be able to support several
11506 variants of the runtime, we use a sniffer that will determine
28010a5d 11507 the runtime variant used by the program being debugged. */
f7f9143b 11508
82eacd52
JB
11509/* Ada's standard exceptions.
11510
11511 The Ada 83 standard also defined Numeric_Error. But there so many
11512 situations where it was unclear from the Ada 83 Reference Manual
11513 (RM) whether Constraint_Error or Numeric_Error should be raised,
11514 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11515 Interpretation saying that anytime the RM says that Numeric_Error
11516 should be raised, the implementation may raise Constraint_Error.
11517 Ada 95 went one step further and pretty much removed Numeric_Error
11518 from the list of standard exceptions (it made it a renaming of
11519 Constraint_Error, to help preserve compatibility when compiling
11520 an Ada83 compiler). As such, we do not include Numeric_Error from
11521 this list of standard exceptions. */
3d0b0fa3
JB
11522
11523static char *standard_exc[] = {
11524 "constraint_error",
11525 "program_error",
11526 "storage_error",
11527 "tasking_error"
11528};
11529
0259addd
JB
11530typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11531
11532/* A structure that describes how to support exception catchpoints
11533 for a given executable. */
11534
11535struct exception_support_info
11536{
11537 /* The name of the symbol to break on in order to insert
11538 a catchpoint on exceptions. */
11539 const char *catch_exception_sym;
11540
11541 /* The name of the symbol to break on in order to insert
11542 a catchpoint on unhandled exceptions. */
11543 const char *catch_exception_unhandled_sym;
11544
11545 /* The name of the symbol to break on in order to insert
11546 a catchpoint on failed assertions. */
11547 const char *catch_assert_sym;
11548
11549 /* Assuming that the inferior just triggered an unhandled exception
11550 catchpoint, this function is responsible for returning the address
11551 in inferior memory where the name of that exception is stored.
11552 Return zero if the address could not be computed. */
11553 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11554};
11555
11556static CORE_ADDR ada_unhandled_exception_name_addr (void);
11557static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11558
11559/* The following exception support info structure describes how to
11560 implement exception catchpoints with the latest version of the
11561 Ada runtime (as of 2007-03-06). */
11562
11563static const struct exception_support_info default_exception_support_info =
11564{
11565 "__gnat_debug_raise_exception", /* catch_exception_sym */
11566 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11567 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
11568 ada_unhandled_exception_name_addr
11569};
11570
11571/* The following exception support info structure describes how to
11572 implement exception catchpoints with a slightly older version
11573 of the Ada runtime. */
11574
11575static const struct exception_support_info exception_support_info_fallback =
11576{
11577 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11578 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11579 "system__assertions__raise_assert_failure", /* catch_assert_sym */
11580 ada_unhandled_exception_name_addr_from_raise
11581};
11582
f17011e0
JB
11583/* Return nonzero if we can detect the exception support routines
11584 described in EINFO.
11585
11586 This function errors out if an abnormal situation is detected
11587 (for instance, if we find the exception support routines, but
11588 that support is found to be incomplete). */
11589
11590static int
11591ada_has_this_exception_support (const struct exception_support_info *einfo)
11592{
11593 struct symbol *sym;
11594
11595 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11596 that should be compiled with debugging information. As a result, we
11597 expect to find that symbol in the symtabs. */
11598
11599 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11600 if (sym == NULL)
a6af7abe
JB
11601 {
11602 /* Perhaps we did not find our symbol because the Ada runtime was
11603 compiled without debugging info, or simply stripped of it.
11604 It happens on some GNU/Linux distributions for instance, where
11605 users have to install a separate debug package in order to get
11606 the runtime's debugging info. In that situation, let the user
11607 know why we cannot insert an Ada exception catchpoint.
11608
11609 Note: Just for the purpose of inserting our Ada exception
11610 catchpoint, we could rely purely on the associated minimal symbol.
11611 But we would be operating in degraded mode anyway, since we are
11612 still lacking the debugging info needed later on to extract
11613 the name of the exception being raised (this name is printed in
11614 the catchpoint message, and is also used when trying to catch
11615 a specific exception). We do not handle this case for now. */
3b7344d5 11616 struct bound_minimal_symbol msym
1c8e84b0
JB
11617 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11618
3b7344d5 11619 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11620 error (_("Your Ada runtime appears to be missing some debugging "
11621 "information.\nCannot insert Ada exception catchpoint "
11622 "in this configuration."));
11623
11624 return 0;
11625 }
f17011e0
JB
11626
11627 /* Make sure that the symbol we found corresponds to a function. */
11628
11629 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11630 error (_("Symbol \"%s\" is not a function (class = %d)"),
11631 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11632
11633 return 1;
11634}
11635
0259addd
JB
11636/* Inspect the Ada runtime and determine which exception info structure
11637 should be used to provide support for exception catchpoints.
11638
3eecfa55
JB
11639 This function will always set the per-inferior exception_info,
11640 or raise an error. */
0259addd
JB
11641
11642static void
11643ada_exception_support_info_sniffer (void)
11644{
3eecfa55 11645 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11646
11647 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11648 if (data->exception_info != NULL)
0259addd
JB
11649 return;
11650
11651 /* Check the latest (default) exception support info. */
f17011e0 11652 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11653 {
3eecfa55 11654 data->exception_info = &default_exception_support_info;
0259addd
JB
11655 return;
11656 }
11657
11658 /* Try our fallback exception suport info. */
f17011e0 11659 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11660 {
3eecfa55 11661 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11662 return;
11663 }
11664
11665 /* Sometimes, it is normal for us to not be able to find the routine
11666 we are looking for. This happens when the program is linked with
11667 the shared version of the GNAT runtime, and the program has not been
11668 started yet. Inform the user of these two possible causes if
11669 applicable. */
11670
ccefe4c4 11671 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11672 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11673
11674 /* If the symbol does not exist, then check that the program is
11675 already started, to make sure that shared libraries have been
11676 loaded. If it is not started, this may mean that the symbol is
11677 in a shared library. */
11678
11679 if (ptid_get_pid (inferior_ptid) == 0)
11680 error (_("Unable to insert catchpoint. Try to start the program first."));
11681
11682 /* At this point, we know that we are debugging an Ada program and
11683 that the inferior has been started, but we still are not able to
0963b4bd 11684 find the run-time symbols. That can mean that we are in
0259addd
JB
11685 configurable run time mode, or that a-except as been optimized
11686 out by the linker... In any case, at this point it is not worth
11687 supporting this feature. */
11688
7dda8cff 11689 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
11690}
11691
f7f9143b
JB
11692/* True iff FRAME is very likely to be that of a function that is
11693 part of the runtime system. This is all very heuristic, but is
11694 intended to be used as advice as to what frames are uninteresting
11695 to most users. */
11696
11697static int
11698is_known_support_routine (struct frame_info *frame)
11699{
4ed6b5be 11700 struct symtab_and_line sal;
55b87a52 11701 char *func_name;
692465f1 11702 enum language func_lang;
f7f9143b 11703 int i;
f35a17b5 11704 const char *fullname;
f7f9143b 11705
4ed6b5be
JB
11706 /* If this code does not have any debugging information (no symtab),
11707 This cannot be any user code. */
f7f9143b 11708
4ed6b5be 11709 find_frame_sal (frame, &sal);
f7f9143b
JB
11710 if (sal.symtab == NULL)
11711 return 1;
11712
4ed6b5be
JB
11713 /* If there is a symtab, but the associated source file cannot be
11714 located, then assume this is not user code: Selecting a frame
11715 for which we cannot display the code would not be very helpful
11716 for the user. This should also take care of case such as VxWorks
11717 where the kernel has some debugging info provided for a few units. */
f7f9143b 11718
f35a17b5
JK
11719 fullname = symtab_to_fullname (sal.symtab);
11720 if (access (fullname, R_OK) != 0)
f7f9143b
JB
11721 return 1;
11722
4ed6b5be
JB
11723 /* Check the unit filename againt the Ada runtime file naming.
11724 We also check the name of the objfile against the name of some
11725 known system libraries that sometimes come with debugging info
11726 too. */
11727
f7f9143b
JB
11728 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
11729 {
11730 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 11731 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 11732 return 1;
eb822aa6
DE
11733 if (SYMTAB_OBJFILE (sal.symtab) != NULL
11734 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 11735 return 1;
f7f9143b
JB
11736 }
11737
4ed6b5be 11738 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 11739
e9e07ba6 11740 find_frame_funname (frame, &func_name, &func_lang, NULL);
f7f9143b
JB
11741 if (func_name == NULL)
11742 return 1;
11743
11744 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
11745 {
11746 re_comp (known_auxiliary_function_name_patterns[i]);
11747 if (re_exec (func_name))
55b87a52
KS
11748 {
11749 xfree (func_name);
11750 return 1;
11751 }
f7f9143b
JB
11752 }
11753
55b87a52 11754 xfree (func_name);
f7f9143b
JB
11755 return 0;
11756}
11757
11758/* Find the first frame that contains debugging information and that is not
11759 part of the Ada run-time, starting from FI and moving upward. */
11760
0ef643c8 11761void
f7f9143b
JB
11762ada_find_printable_frame (struct frame_info *fi)
11763{
11764 for (; fi != NULL; fi = get_prev_frame (fi))
11765 {
11766 if (!is_known_support_routine (fi))
11767 {
11768 select_frame (fi);
11769 break;
11770 }
11771 }
11772
11773}
11774
11775/* Assuming that the inferior just triggered an unhandled exception
11776 catchpoint, return the address in inferior memory where the name
11777 of the exception is stored.
11778
11779 Return zero if the address could not be computed. */
11780
11781static CORE_ADDR
11782ada_unhandled_exception_name_addr (void)
0259addd
JB
11783{
11784 return parse_and_eval_address ("e.full_name");
11785}
11786
11787/* Same as ada_unhandled_exception_name_addr, except that this function
11788 should be used when the inferior uses an older version of the runtime,
11789 where the exception name needs to be extracted from a specific frame
11790 several frames up in the callstack. */
11791
11792static CORE_ADDR
11793ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
11794{
11795 int frame_level;
11796 struct frame_info *fi;
3eecfa55 11797 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
55b87a52 11798 struct cleanup *old_chain;
f7f9143b
JB
11799
11800 /* To determine the name of this exception, we need to select
11801 the frame corresponding to RAISE_SYM_NAME. This frame is
11802 at least 3 levels up, so we simply skip the first 3 frames
11803 without checking the name of their associated function. */
11804 fi = get_current_frame ();
11805 for (frame_level = 0; frame_level < 3; frame_level += 1)
11806 if (fi != NULL)
11807 fi = get_prev_frame (fi);
11808
55b87a52 11809 old_chain = make_cleanup (null_cleanup, NULL);
f7f9143b
JB
11810 while (fi != NULL)
11811 {
55b87a52 11812 char *func_name;
692465f1
JB
11813 enum language func_lang;
11814
e9e07ba6 11815 find_frame_funname (fi, &func_name, &func_lang, NULL);
55b87a52
KS
11816 if (func_name != NULL)
11817 {
11818 make_cleanup (xfree, func_name);
11819
11820 if (strcmp (func_name,
11821 data->exception_info->catch_exception_sym) == 0)
11822 break; /* We found the frame we were looking for... */
11823 fi = get_prev_frame (fi);
11824 }
f7f9143b 11825 }
55b87a52 11826 do_cleanups (old_chain);
f7f9143b
JB
11827
11828 if (fi == NULL)
11829 return 0;
11830
11831 select_frame (fi);
11832 return parse_and_eval_address ("id.full_name");
11833}
11834
11835/* Assuming the inferior just triggered an Ada exception catchpoint
11836 (of any type), return the address in inferior memory where the name
11837 of the exception is stored, if applicable.
11838
11839 Return zero if the address could not be computed, or if not relevant. */
11840
11841static CORE_ADDR
761269c8 11842ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11843 struct breakpoint *b)
11844{
3eecfa55
JB
11845 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
11846
f7f9143b
JB
11847 switch (ex)
11848 {
761269c8 11849 case ada_catch_exception:
f7f9143b
JB
11850 return (parse_and_eval_address ("e.full_name"));
11851 break;
11852
761269c8 11853 case ada_catch_exception_unhandled:
3eecfa55 11854 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b
JB
11855 break;
11856
761269c8 11857 case ada_catch_assert:
f7f9143b
JB
11858 return 0; /* Exception name is not relevant in this case. */
11859 break;
11860
11861 default:
11862 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
11863 break;
11864 }
11865
11866 return 0; /* Should never be reached. */
11867}
11868
11869/* Same as ada_exception_name_addr_1, except that it intercepts and contains
11870 any error that ada_exception_name_addr_1 might cause to be thrown.
11871 When an error is intercepted, a warning with the error message is printed,
11872 and zero is returned. */
11873
11874static CORE_ADDR
761269c8 11875ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
11876 struct breakpoint *b)
11877{
f7f9143b
JB
11878 CORE_ADDR result = 0;
11879
492d29ea 11880 TRY
f7f9143b
JB
11881 {
11882 result = ada_exception_name_addr_1 (ex, b);
11883 }
11884
492d29ea 11885 CATCH (e, RETURN_MASK_ERROR)
f7f9143b
JB
11886 {
11887 warning (_("failed to get exception name: %s"), e.message);
11888 return 0;
11889 }
492d29ea 11890 END_CATCH
f7f9143b
JB
11891
11892 return result;
11893}
11894
28010a5d
PA
11895static char *ada_exception_catchpoint_cond_string (const char *excep_string);
11896
11897/* Ada catchpoints.
11898
11899 In the case of catchpoints on Ada exceptions, the catchpoint will
11900 stop the target on every exception the program throws. When a user
11901 specifies the name of a specific exception, we translate this
11902 request into a condition expression (in text form), and then parse
11903 it into an expression stored in each of the catchpoint's locations.
11904 We then use this condition to check whether the exception that was
11905 raised is the one the user is interested in. If not, then the
11906 target is resumed again. We store the name of the requested
11907 exception, in order to be able to re-set the condition expression
11908 when symbols change. */
11909
11910/* An instance of this type is used to represent an Ada catchpoint
11911 breakpoint location. It includes a "struct bp_location" as a kind
11912 of base class; users downcast to "struct bp_location *" when
11913 needed. */
11914
11915struct ada_catchpoint_location
11916{
11917 /* The base class. */
11918 struct bp_location base;
11919
11920 /* The condition that checks whether the exception that was raised
11921 is the specific exception the user specified on catchpoint
11922 creation. */
11923 struct expression *excep_cond_expr;
11924};
11925
11926/* Implement the DTOR method in the bp_location_ops structure for all
11927 Ada exception catchpoint kinds. */
11928
11929static void
11930ada_catchpoint_location_dtor (struct bp_location *bl)
11931{
11932 struct ada_catchpoint_location *al = (struct ada_catchpoint_location *) bl;
11933
11934 xfree (al->excep_cond_expr);
11935}
11936
11937/* The vtable to be used in Ada catchpoint locations. */
11938
11939static const struct bp_location_ops ada_catchpoint_location_ops =
11940{
11941 ada_catchpoint_location_dtor
11942};
11943
11944/* An instance of this type is used to represent an Ada catchpoint.
11945 It includes a "struct breakpoint" as a kind of base class; users
11946 downcast to "struct breakpoint *" when needed. */
11947
11948struct ada_catchpoint
11949{
11950 /* The base class. */
11951 struct breakpoint base;
11952
11953 /* The name of the specific exception the user specified. */
11954 char *excep_string;
11955};
11956
11957/* Parse the exception condition string in the context of each of the
11958 catchpoint's locations, and store them for later evaluation. */
11959
11960static void
11961create_excep_cond_exprs (struct ada_catchpoint *c)
11962{
11963 struct cleanup *old_chain;
11964 struct bp_location *bl;
11965 char *cond_string;
11966
11967 /* Nothing to do if there's no specific exception to catch. */
11968 if (c->excep_string == NULL)
11969 return;
11970
11971 /* Same if there are no locations... */
11972 if (c->base.loc == NULL)
11973 return;
11974
11975 /* Compute the condition expression in text form, from the specific
11976 expection we want to catch. */
11977 cond_string = ada_exception_catchpoint_cond_string (c->excep_string);
11978 old_chain = make_cleanup (xfree, cond_string);
11979
11980 /* Iterate over all the catchpoint's locations, and parse an
11981 expression for each. */
11982 for (bl = c->base.loc; bl != NULL; bl = bl->next)
11983 {
11984 struct ada_catchpoint_location *ada_loc
11985 = (struct ada_catchpoint_location *) bl;
11986 struct expression *exp = NULL;
11987
11988 if (!bl->shlib_disabled)
11989 {
bbc13ae3 11990 const char *s;
28010a5d
PA
11991
11992 s = cond_string;
492d29ea 11993 TRY
28010a5d 11994 {
1bb9788d
TT
11995 exp = parse_exp_1 (&s, bl->address,
11996 block_for_pc (bl->address), 0);
28010a5d 11997 }
492d29ea 11998 CATCH (e, RETURN_MASK_ERROR)
849f2b52
JB
11999 {
12000 warning (_("failed to reevaluate internal exception condition "
12001 "for catchpoint %d: %s"),
12002 c->base.number, e.message);
12003 /* There is a bug in GCC on sparc-solaris when building with
12004 optimization which causes EXP to change unexpectedly
12005 (http://gcc.gnu.org/bugzilla/show_bug.cgi?id=56982).
12006 The problem should be fixed starting with GCC 4.9.
12007 In the meantime, work around it by forcing EXP back
12008 to NULL. */
12009 exp = NULL;
12010 }
492d29ea 12011 END_CATCH
28010a5d
PA
12012 }
12013
12014 ada_loc->excep_cond_expr = exp;
12015 }
12016
12017 do_cleanups (old_chain);
12018}
12019
12020/* Implement the DTOR method in the breakpoint_ops structure for all
12021 exception catchpoint kinds. */
12022
12023static void
761269c8 12024dtor_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12025{
12026 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12027
12028 xfree (c->excep_string);
348d480f 12029
2060206e 12030 bkpt_breakpoint_ops.dtor (b);
28010a5d
PA
12031}
12032
12033/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12034 structure for all exception catchpoint kinds. */
12035
12036static struct bp_location *
761269c8 12037allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
12038 struct breakpoint *self)
12039{
12040 struct ada_catchpoint_location *loc;
12041
12042 loc = XNEW (struct ada_catchpoint_location);
12043 init_bp_location (&loc->base, &ada_catchpoint_location_ops, self);
12044 loc->excep_cond_expr = NULL;
12045 return &loc->base;
12046}
12047
12048/* Implement the RE_SET method in the breakpoint_ops structure for all
12049 exception catchpoint kinds. */
12050
12051static void
761269c8 12052re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12053{
12054 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12055
12056 /* Call the base class's method. This updates the catchpoint's
12057 locations. */
2060206e 12058 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12059
12060 /* Reparse the exception conditional expressions. One for each
12061 location. */
12062 create_excep_cond_exprs (c);
12063}
12064
12065/* Returns true if we should stop for this breakpoint hit. If the
12066 user specified a specific exception, we only want to cause a stop
12067 if the program thrown that exception. */
12068
12069static int
12070should_stop_exception (const struct bp_location *bl)
12071{
12072 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12073 const struct ada_catchpoint_location *ada_loc
12074 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12075 int stop;
12076
12077 /* With no specific exception, should always stop. */
12078 if (c->excep_string == NULL)
12079 return 1;
12080
12081 if (ada_loc->excep_cond_expr == NULL)
12082 {
12083 /* We will have a NULL expression if back when we were creating
12084 the expressions, this location's had failed to parse. */
12085 return 1;
12086 }
12087
12088 stop = 1;
492d29ea 12089 TRY
28010a5d
PA
12090 {
12091 struct value *mark;
12092
12093 mark = value_mark ();
12094 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr));
12095 value_free_to_mark (mark);
12096 }
492d29ea
PA
12097 CATCH (ex, RETURN_MASK_ALL)
12098 {
12099 exception_fprintf (gdb_stderr, ex,
12100 _("Error in testing exception condition:\n"));
12101 }
12102 END_CATCH
12103
28010a5d
PA
12104 return stop;
12105}
12106
12107/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12108 for all exception catchpoint kinds. */
12109
12110static void
761269c8 12111check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
12112{
12113 bs->stop = should_stop_exception (bs->bp_location_at);
12114}
12115
f7f9143b
JB
12116/* Implement the PRINT_IT method in the breakpoint_ops structure
12117 for all exception catchpoint kinds. */
12118
12119static enum print_stop_action
761269c8 12120print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 12121{
79a45e25 12122 struct ui_out *uiout = current_uiout;
348d480f
PA
12123 struct breakpoint *b = bs->breakpoint_at;
12124
956a9fb9 12125 annotate_catchpoint (b->number);
f7f9143b 12126
956a9fb9 12127 if (ui_out_is_mi_like_p (uiout))
f7f9143b 12128 {
956a9fb9
JB
12129 ui_out_field_string (uiout, "reason",
12130 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
12131 ui_out_field_string (uiout, "disp", bpdisp_text (b->disposition));
f7f9143b
JB
12132 }
12133
00eb2c4a
JB
12134 ui_out_text (uiout,
12135 b->disposition == disp_del ? "\nTemporary catchpoint "
12136 : "\nCatchpoint ");
956a9fb9
JB
12137 ui_out_field_int (uiout, "bkptno", b->number);
12138 ui_out_text (uiout, ", ");
f7f9143b 12139
f7f9143b
JB
12140 switch (ex)
12141 {
761269c8
JB
12142 case ada_catch_exception:
12143 case ada_catch_exception_unhandled:
956a9fb9
JB
12144 {
12145 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12146 char exception_name[256];
12147
12148 if (addr != 0)
12149 {
c714b426
PA
12150 read_memory (addr, (gdb_byte *) exception_name,
12151 sizeof (exception_name) - 1);
956a9fb9
JB
12152 exception_name [sizeof (exception_name) - 1] = '\0';
12153 }
12154 else
12155 {
12156 /* For some reason, we were unable to read the exception
12157 name. This could happen if the Runtime was compiled
12158 without debugging info, for instance. In that case,
12159 just replace the exception name by the generic string
12160 "exception" - it will read as "an exception" in the
12161 notification we are about to print. */
967cff16 12162 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12163 }
12164 /* In the case of unhandled exception breakpoints, we print
12165 the exception name as "unhandled EXCEPTION_NAME", to make
12166 it clearer to the user which kind of catchpoint just got
12167 hit. We used ui_out_text to make sure that this extra
12168 info does not pollute the exception name in the MI case. */
761269c8 12169 if (ex == ada_catch_exception_unhandled)
956a9fb9
JB
12170 ui_out_text (uiout, "unhandled ");
12171 ui_out_field_string (uiout, "exception-name", exception_name);
12172 }
12173 break;
761269c8 12174 case ada_catch_assert:
956a9fb9
JB
12175 /* In this case, the name of the exception is not really
12176 important. Just print "failed assertion" to make it clearer
12177 that his program just hit an assertion-failure catchpoint.
12178 We used ui_out_text because this info does not belong in
12179 the MI output. */
12180 ui_out_text (uiout, "failed assertion");
12181 break;
f7f9143b 12182 }
956a9fb9
JB
12183 ui_out_text (uiout, " at ");
12184 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12185
12186 return PRINT_SRC_AND_LOC;
12187}
12188
12189/* Implement the PRINT_ONE method in the breakpoint_ops structure
12190 for all exception catchpoint kinds. */
12191
12192static void
761269c8 12193print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12194 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12195{
79a45e25 12196 struct ui_out *uiout = current_uiout;
28010a5d 12197 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12198 struct value_print_options opts;
12199
12200 get_user_print_options (&opts);
12201 if (opts.addressprint)
f7f9143b
JB
12202 {
12203 annotate_field (4);
5af949e3 12204 ui_out_field_core_addr (uiout, "addr", b->loc->gdbarch, b->loc->address);
f7f9143b
JB
12205 }
12206
12207 annotate_field (5);
a6d9a66e 12208 *last_loc = b->loc;
f7f9143b
JB
12209 switch (ex)
12210 {
761269c8 12211 case ada_catch_exception:
28010a5d 12212 if (c->excep_string != NULL)
f7f9143b 12213 {
28010a5d
PA
12214 char *msg = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12215
f7f9143b
JB
12216 ui_out_field_string (uiout, "what", msg);
12217 xfree (msg);
12218 }
12219 else
12220 ui_out_field_string (uiout, "what", "all Ada exceptions");
12221
12222 break;
12223
761269c8 12224 case ada_catch_exception_unhandled:
f7f9143b
JB
12225 ui_out_field_string (uiout, "what", "unhandled Ada exceptions");
12226 break;
12227
761269c8 12228 case ada_catch_assert:
f7f9143b
JB
12229 ui_out_field_string (uiout, "what", "failed Ada assertions");
12230 break;
12231
12232 default:
12233 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12234 break;
12235 }
12236}
12237
12238/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12239 for all exception catchpoint kinds. */
12240
12241static void
761269c8 12242print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12243 struct breakpoint *b)
12244{
28010a5d 12245 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12246 struct ui_out *uiout = current_uiout;
28010a5d 12247
00eb2c4a
JB
12248 ui_out_text (uiout, b->disposition == disp_del ? _("Temporary catchpoint ")
12249 : _("Catchpoint "));
12250 ui_out_field_int (uiout, "bkptno", b->number);
12251 ui_out_text (uiout, ": ");
12252
f7f9143b
JB
12253 switch (ex)
12254 {
761269c8 12255 case ada_catch_exception:
28010a5d 12256 if (c->excep_string != NULL)
00eb2c4a
JB
12257 {
12258 char *info = xstrprintf (_("`%s' Ada exception"), c->excep_string);
12259 struct cleanup *old_chain = make_cleanup (xfree, info);
12260
12261 ui_out_text (uiout, info);
12262 do_cleanups (old_chain);
12263 }
f7f9143b 12264 else
00eb2c4a 12265 ui_out_text (uiout, _("all Ada exceptions"));
f7f9143b
JB
12266 break;
12267
761269c8 12268 case ada_catch_exception_unhandled:
00eb2c4a 12269 ui_out_text (uiout, _("unhandled Ada exceptions"));
f7f9143b
JB
12270 break;
12271
761269c8 12272 case ada_catch_assert:
00eb2c4a 12273 ui_out_text (uiout, _("failed Ada assertions"));
f7f9143b
JB
12274 break;
12275
12276 default:
12277 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12278 break;
12279 }
12280}
12281
6149aea9
PA
12282/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12283 for all exception catchpoint kinds. */
12284
12285static void
761269c8 12286print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12287 struct breakpoint *b, struct ui_file *fp)
12288{
28010a5d
PA
12289 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12290
6149aea9
PA
12291 switch (ex)
12292 {
761269c8 12293 case ada_catch_exception:
6149aea9 12294 fprintf_filtered (fp, "catch exception");
28010a5d
PA
12295 if (c->excep_string != NULL)
12296 fprintf_filtered (fp, " %s", c->excep_string);
6149aea9
PA
12297 break;
12298
761269c8 12299 case ada_catch_exception_unhandled:
78076abc 12300 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12301 break;
12302
761269c8 12303 case ada_catch_assert:
6149aea9
PA
12304 fprintf_filtered (fp, "catch assert");
12305 break;
12306
12307 default:
12308 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12309 }
d9b3f62e 12310 print_recreate_thread (b, fp);
6149aea9
PA
12311}
12312
f7f9143b
JB
12313/* Virtual table for "catch exception" breakpoints. */
12314
28010a5d
PA
12315static void
12316dtor_catch_exception (struct breakpoint *b)
12317{
761269c8 12318 dtor_exception (ada_catch_exception, b);
28010a5d
PA
12319}
12320
12321static struct bp_location *
12322allocate_location_catch_exception (struct breakpoint *self)
12323{
761269c8 12324 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12325}
12326
12327static void
12328re_set_catch_exception (struct breakpoint *b)
12329{
761269c8 12330 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12331}
12332
12333static void
12334check_status_catch_exception (bpstat bs)
12335{
761269c8 12336 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12337}
12338
f7f9143b 12339static enum print_stop_action
348d480f 12340print_it_catch_exception (bpstat bs)
f7f9143b 12341{
761269c8 12342 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12343}
12344
12345static void
a6d9a66e 12346print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12347{
761269c8 12348 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12349}
12350
12351static void
12352print_mention_catch_exception (struct breakpoint *b)
12353{
761269c8 12354 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12355}
12356
6149aea9
PA
12357static void
12358print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12359{
761269c8 12360 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12361}
12362
2060206e 12363static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12364
12365/* Virtual table for "catch exception unhandled" breakpoints. */
12366
28010a5d
PA
12367static void
12368dtor_catch_exception_unhandled (struct breakpoint *b)
12369{
761269c8 12370 dtor_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12371}
12372
12373static struct bp_location *
12374allocate_location_catch_exception_unhandled (struct breakpoint *self)
12375{
761269c8 12376 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12377}
12378
12379static void
12380re_set_catch_exception_unhandled (struct breakpoint *b)
12381{
761269c8 12382 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12383}
12384
12385static void
12386check_status_catch_exception_unhandled (bpstat bs)
12387{
761269c8 12388 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12389}
12390
f7f9143b 12391static enum print_stop_action
348d480f 12392print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12393{
761269c8 12394 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12395}
12396
12397static void
a6d9a66e
UW
12398print_one_catch_exception_unhandled (struct breakpoint *b,
12399 struct bp_location **last_loc)
f7f9143b 12400{
761269c8 12401 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12402}
12403
12404static void
12405print_mention_catch_exception_unhandled (struct breakpoint *b)
12406{
761269c8 12407 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12408}
12409
6149aea9
PA
12410static void
12411print_recreate_catch_exception_unhandled (struct breakpoint *b,
12412 struct ui_file *fp)
12413{
761269c8 12414 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12415}
12416
2060206e 12417static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12418
12419/* Virtual table for "catch assert" breakpoints. */
12420
28010a5d
PA
12421static void
12422dtor_catch_assert (struct breakpoint *b)
12423{
761269c8 12424 dtor_exception (ada_catch_assert, b);
28010a5d
PA
12425}
12426
12427static struct bp_location *
12428allocate_location_catch_assert (struct breakpoint *self)
12429{
761269c8 12430 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12431}
12432
12433static void
12434re_set_catch_assert (struct breakpoint *b)
12435{
761269c8 12436 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12437}
12438
12439static void
12440check_status_catch_assert (bpstat bs)
12441{
761269c8 12442 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12443}
12444
f7f9143b 12445static enum print_stop_action
348d480f 12446print_it_catch_assert (bpstat bs)
f7f9143b 12447{
761269c8 12448 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12449}
12450
12451static void
a6d9a66e 12452print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12453{
761269c8 12454 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12455}
12456
12457static void
12458print_mention_catch_assert (struct breakpoint *b)
12459{
761269c8 12460 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12461}
12462
6149aea9
PA
12463static void
12464print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12465{
761269c8 12466 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12467}
12468
2060206e 12469static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12470
f7f9143b
JB
12471/* Return a newly allocated copy of the first space-separated token
12472 in ARGSP, and then adjust ARGSP to point immediately after that
12473 token.
12474
12475 Return NULL if ARGPS does not contain any more tokens. */
12476
12477static char *
12478ada_get_next_arg (char **argsp)
12479{
12480 char *args = *argsp;
12481 char *end;
12482 char *result;
12483
0fcd72ba 12484 args = skip_spaces (args);
f7f9143b
JB
12485 if (args[0] == '\0')
12486 return NULL; /* No more arguments. */
12487
12488 /* Find the end of the current argument. */
12489
0fcd72ba 12490 end = skip_to_space (args);
f7f9143b
JB
12491
12492 /* Adjust ARGSP to point to the start of the next argument. */
12493
12494 *argsp = end;
12495
12496 /* Make a copy of the current argument and return it. */
12497
12498 result = xmalloc (end - args + 1);
12499 strncpy (result, args, end - args);
12500 result[end - args] = '\0';
12501
12502 return result;
12503}
12504
12505/* Split the arguments specified in a "catch exception" command.
12506 Set EX to the appropriate catchpoint type.
28010a5d 12507 Set EXCEP_STRING to the name of the specific exception if
5845583d
JB
12508 specified by the user.
12509 If a condition is found at the end of the arguments, the condition
12510 expression is stored in COND_STRING (memory must be deallocated
12511 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12512
12513static void
12514catch_ada_exception_command_split (char *args,
761269c8 12515 enum ada_exception_catchpoint_kind *ex,
5845583d
JB
12516 char **excep_string,
12517 char **cond_string)
f7f9143b
JB
12518{
12519 struct cleanup *old_chain = make_cleanup (null_cleanup, NULL);
12520 char *exception_name;
5845583d 12521 char *cond = NULL;
f7f9143b
JB
12522
12523 exception_name = ada_get_next_arg (&args);
5845583d
JB
12524 if (exception_name != NULL && strcmp (exception_name, "if") == 0)
12525 {
12526 /* This is not an exception name; this is the start of a condition
12527 expression for a catchpoint on all exceptions. So, "un-get"
12528 this token, and set exception_name to NULL. */
12529 xfree (exception_name);
12530 exception_name = NULL;
12531 args -= 2;
12532 }
f7f9143b
JB
12533 make_cleanup (xfree, exception_name);
12534
5845583d 12535 /* Check to see if we have a condition. */
f7f9143b 12536
0fcd72ba 12537 args = skip_spaces (args);
61012eef 12538 if (startswith (args, "if")
5845583d
JB
12539 && (isspace (args[2]) || args[2] == '\0'))
12540 {
12541 args += 2;
12542 args = skip_spaces (args);
12543
12544 if (args[0] == '\0')
12545 error (_("Condition missing after `if' keyword"));
12546 cond = xstrdup (args);
12547 make_cleanup (xfree, cond);
12548
12549 args += strlen (args);
12550 }
12551
12552 /* Check that we do not have any more arguments. Anything else
12553 is unexpected. */
f7f9143b
JB
12554
12555 if (args[0] != '\0')
12556 error (_("Junk at end of expression"));
12557
12558 discard_cleanups (old_chain);
12559
12560 if (exception_name == NULL)
12561 {
12562 /* Catch all exceptions. */
761269c8 12563 *ex = ada_catch_exception;
28010a5d 12564 *excep_string = NULL;
f7f9143b
JB
12565 }
12566 else if (strcmp (exception_name, "unhandled") == 0)
12567 {
12568 /* Catch unhandled exceptions. */
761269c8 12569 *ex = ada_catch_exception_unhandled;
28010a5d 12570 *excep_string = NULL;
f7f9143b
JB
12571 }
12572 else
12573 {
12574 /* Catch a specific exception. */
761269c8 12575 *ex = ada_catch_exception;
28010a5d 12576 *excep_string = exception_name;
f7f9143b 12577 }
5845583d 12578 *cond_string = cond;
f7f9143b
JB
12579}
12580
12581/* Return the name of the symbol on which we should break in order to
12582 implement a catchpoint of the EX kind. */
12583
12584static const char *
761269c8 12585ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12586{
3eecfa55
JB
12587 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12588
12589 gdb_assert (data->exception_info != NULL);
0259addd 12590
f7f9143b
JB
12591 switch (ex)
12592 {
761269c8 12593 case ada_catch_exception:
3eecfa55 12594 return (data->exception_info->catch_exception_sym);
f7f9143b 12595 break;
761269c8 12596 case ada_catch_exception_unhandled:
3eecfa55 12597 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12598 break;
761269c8 12599 case ada_catch_assert:
3eecfa55 12600 return (data->exception_info->catch_assert_sym);
f7f9143b
JB
12601 break;
12602 default:
12603 internal_error (__FILE__, __LINE__,
12604 _("unexpected catchpoint kind (%d)"), ex);
12605 }
12606}
12607
12608/* Return the breakpoint ops "virtual table" used for catchpoints
12609 of the EX kind. */
12610
c0a91b2b 12611static const struct breakpoint_ops *
761269c8 12612ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12613{
12614 switch (ex)
12615 {
761269c8 12616 case ada_catch_exception:
f7f9143b
JB
12617 return (&catch_exception_breakpoint_ops);
12618 break;
761269c8 12619 case ada_catch_exception_unhandled:
f7f9143b
JB
12620 return (&catch_exception_unhandled_breakpoint_ops);
12621 break;
761269c8 12622 case ada_catch_assert:
f7f9143b
JB
12623 return (&catch_assert_breakpoint_ops);
12624 break;
12625 default:
12626 internal_error (__FILE__, __LINE__,
12627 _("unexpected catchpoint kind (%d)"), ex);
12628 }
12629}
12630
12631/* Return the condition that will be used to match the current exception
12632 being raised with the exception that the user wants to catch. This
12633 assumes that this condition is used when the inferior just triggered
12634 an exception catchpoint.
12635
12636 The string returned is a newly allocated string that needs to be
12637 deallocated later. */
12638
12639static char *
28010a5d 12640ada_exception_catchpoint_cond_string (const char *excep_string)
f7f9143b 12641{
3d0b0fa3
JB
12642 int i;
12643
0963b4bd 12644 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 12645 runtime units that have been compiled without debugging info; if
28010a5d 12646 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
12647 exception (e.g. "constraint_error") then, during the evaluation
12648 of the condition expression, the symbol lookup on this name would
0963b4bd 12649 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
12650 may then be set only on user-defined exceptions which have the
12651 same not-fully-qualified name (e.g. my_package.constraint_error).
12652
12653 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 12654 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
12655 exception constraint_error" is rewritten into "catch exception
12656 standard.constraint_error".
12657
12658 If an exception named contraint_error is defined in another package of
12659 the inferior program, then the only way to specify this exception as a
12660 breakpoint condition is to use its fully-qualified named:
12661 e.g. my_package.constraint_error. */
12662
12663 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
12664 {
28010a5d 12665 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3
JB
12666 {
12667 return xstrprintf ("long_integer (e) = long_integer (&standard.%s)",
28010a5d 12668 excep_string);
3d0b0fa3
JB
12669 }
12670 }
28010a5d 12671 return xstrprintf ("long_integer (e) = long_integer (&%s)", excep_string);
f7f9143b
JB
12672}
12673
12674/* Return the symtab_and_line that should be used to insert an exception
12675 catchpoint of the TYPE kind.
12676
28010a5d
PA
12677 EXCEP_STRING should contain the name of a specific exception that
12678 the catchpoint should catch, or NULL otherwise.
f7f9143b 12679
28010a5d
PA
12680 ADDR_STRING returns the name of the function where the real
12681 breakpoint that implements the catchpoints is set, depending on the
12682 type of catchpoint we need to create. */
f7f9143b
JB
12683
12684static struct symtab_and_line
761269c8 12685ada_exception_sal (enum ada_exception_catchpoint_kind ex, char *excep_string,
c0a91b2b 12686 char **addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
12687{
12688 const char *sym_name;
12689 struct symbol *sym;
f7f9143b 12690
0259addd
JB
12691 /* First, find out which exception support info to use. */
12692 ada_exception_support_info_sniffer ();
12693
12694 /* Then lookup the function on which we will break in order to catch
f7f9143b 12695 the Ada exceptions requested by the user. */
f7f9143b
JB
12696 sym_name = ada_exception_sym_name (ex);
12697 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
12698
f17011e0
JB
12699 /* We can assume that SYM is not NULL at this stage. If the symbol
12700 did not exist, ada_exception_support_info_sniffer would have
12701 raised an exception.
f7f9143b 12702
f17011e0
JB
12703 Also, ada_exception_support_info_sniffer should have already
12704 verified that SYM is a function symbol. */
12705 gdb_assert (sym != NULL);
12706 gdb_assert (SYMBOL_CLASS (sym) == LOC_BLOCK);
f7f9143b
JB
12707
12708 /* Set ADDR_STRING. */
f7f9143b
JB
12709 *addr_string = xstrdup (sym_name);
12710
f7f9143b 12711 /* Set OPS. */
4b9eee8c 12712 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 12713
f17011e0 12714 return find_function_start_sal (sym, 1);
f7f9143b
JB
12715}
12716
b4a5b78b 12717/* Create an Ada exception catchpoint.
f7f9143b 12718
b4a5b78b 12719 EX_KIND is the kind of exception catchpoint to be created.
5845583d 12720
2df4d1d5
JB
12721 If EXCEPT_STRING is NULL, this catchpoint is expected to trigger
12722 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
12723 of the exception to which this catchpoint applies. When not NULL,
12724 the string must be allocated on the heap, and its deallocation
12725 is no longer the responsibility of the caller.
12726
12727 COND_STRING, if not NULL, is the catchpoint condition. This string
12728 must be allocated on the heap, and its deallocation is no longer
12729 the responsibility of the caller.
f7f9143b 12730
b4a5b78b
JB
12731 TEMPFLAG, if nonzero, means that the underlying breakpoint
12732 should be temporary.
28010a5d 12733
b4a5b78b 12734 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 12735
349774ef 12736void
28010a5d 12737create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 12738 enum ada_exception_catchpoint_kind ex_kind,
28010a5d 12739 char *excep_string,
5845583d 12740 char *cond_string,
28010a5d 12741 int tempflag,
349774ef 12742 int disabled,
28010a5d
PA
12743 int from_tty)
12744{
12745 struct ada_catchpoint *c;
b4a5b78b
JB
12746 char *addr_string = NULL;
12747 const struct breakpoint_ops *ops = NULL;
12748 struct symtab_and_line sal
12749 = ada_exception_sal (ex_kind, excep_string, &addr_string, &ops);
28010a5d
PA
12750
12751 c = XNEW (struct ada_catchpoint);
12752 init_ada_exception_breakpoint (&c->base, gdbarch, sal, addr_string,
349774ef 12753 ops, tempflag, disabled, from_tty);
28010a5d
PA
12754 c->excep_string = excep_string;
12755 create_excep_cond_exprs (c);
5845583d
JB
12756 if (cond_string != NULL)
12757 set_breakpoint_condition (&c->base, cond_string, from_tty);
3ea46bff 12758 install_breakpoint (0, &c->base, 1);
f7f9143b
JB
12759}
12760
9ac4176b
PA
12761/* Implement the "catch exception" command. */
12762
12763static void
12764catch_ada_exception_command (char *arg, int from_tty,
12765 struct cmd_list_element *command)
12766{
12767 struct gdbarch *gdbarch = get_current_arch ();
12768 int tempflag;
761269c8 12769 enum ada_exception_catchpoint_kind ex_kind;
28010a5d 12770 char *excep_string = NULL;
5845583d 12771 char *cond_string = NULL;
9ac4176b
PA
12772
12773 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12774
12775 if (!arg)
12776 arg = "";
b4a5b78b
JB
12777 catch_ada_exception_command_split (arg, &ex_kind, &excep_string,
12778 &cond_string);
12779 create_ada_exception_catchpoint (gdbarch, ex_kind,
12780 excep_string, cond_string,
349774ef
JB
12781 tempflag, 1 /* enabled */,
12782 from_tty);
9ac4176b
PA
12783}
12784
b4a5b78b 12785/* Split the arguments specified in a "catch assert" command.
5845583d 12786
b4a5b78b
JB
12787 ARGS contains the command's arguments (or the empty string if
12788 no arguments were passed).
5845583d
JB
12789
12790 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 12791 (the memory needs to be deallocated after use). */
5845583d 12792
b4a5b78b
JB
12793static void
12794catch_ada_assert_command_split (char *args, char **cond_string)
f7f9143b 12795{
5845583d 12796 args = skip_spaces (args);
f7f9143b 12797
5845583d 12798 /* Check whether a condition was provided. */
61012eef 12799 if (startswith (args, "if")
5845583d 12800 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 12801 {
5845583d 12802 args += 2;
0fcd72ba 12803 args = skip_spaces (args);
5845583d
JB
12804 if (args[0] == '\0')
12805 error (_("condition missing after `if' keyword"));
12806 *cond_string = xstrdup (args);
f7f9143b
JB
12807 }
12808
5845583d
JB
12809 /* Otherwise, there should be no other argument at the end of
12810 the command. */
12811 else if (args[0] != '\0')
12812 error (_("Junk at end of arguments."));
f7f9143b
JB
12813}
12814
9ac4176b
PA
12815/* Implement the "catch assert" command. */
12816
12817static void
12818catch_assert_command (char *arg, int from_tty,
12819 struct cmd_list_element *command)
12820{
12821 struct gdbarch *gdbarch = get_current_arch ();
12822 int tempflag;
5845583d 12823 char *cond_string = NULL;
9ac4176b
PA
12824
12825 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
12826
12827 if (!arg)
12828 arg = "";
b4a5b78b 12829 catch_ada_assert_command_split (arg, &cond_string);
761269c8 12830 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
b4a5b78b 12831 NULL, cond_string,
349774ef
JB
12832 tempflag, 1 /* enabled */,
12833 from_tty);
9ac4176b 12834}
778865d3
JB
12835
12836/* Return non-zero if the symbol SYM is an Ada exception object. */
12837
12838static int
12839ada_is_exception_sym (struct symbol *sym)
12840{
12841 const char *type_name = type_name_no_tag (SYMBOL_TYPE (sym));
12842
12843 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
12844 && SYMBOL_CLASS (sym) != LOC_BLOCK
12845 && SYMBOL_CLASS (sym) != LOC_CONST
12846 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
12847 && type_name != NULL && strcmp (type_name, "exception") == 0);
12848}
12849
12850/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
12851 Ada exception object. This matches all exceptions except the ones
12852 defined by the Ada language. */
12853
12854static int
12855ada_is_non_standard_exception_sym (struct symbol *sym)
12856{
12857 int i;
12858
12859 if (!ada_is_exception_sym (sym))
12860 return 0;
12861
12862 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12863 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
12864 return 0; /* A standard exception. */
12865
12866 /* Numeric_Error is also a standard exception, so exclude it.
12867 See the STANDARD_EXC description for more details as to why
12868 this exception is not listed in that array. */
12869 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
12870 return 0;
12871
12872 return 1;
12873}
12874
12875/* A helper function for qsort, comparing two struct ada_exc_info
12876 objects.
12877
12878 The comparison is determined first by exception name, and then
12879 by exception address. */
12880
12881static int
12882compare_ada_exception_info (const void *a, const void *b)
12883{
12884 const struct ada_exc_info *exc_a = (struct ada_exc_info *) a;
12885 const struct ada_exc_info *exc_b = (struct ada_exc_info *) b;
12886 int result;
12887
12888 result = strcmp (exc_a->name, exc_b->name);
12889 if (result != 0)
12890 return result;
12891
12892 if (exc_a->addr < exc_b->addr)
12893 return -1;
12894 if (exc_a->addr > exc_b->addr)
12895 return 1;
12896
12897 return 0;
12898}
12899
12900/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
12901 routine, but keeping the first SKIP elements untouched.
12902
12903 All duplicates are also removed. */
12904
12905static void
12906sort_remove_dups_ada_exceptions_list (VEC(ada_exc_info) **exceptions,
12907 int skip)
12908{
12909 struct ada_exc_info *to_sort
12910 = VEC_address (ada_exc_info, *exceptions) + skip;
12911 int to_sort_len
12912 = VEC_length (ada_exc_info, *exceptions) - skip;
12913 int i, j;
12914
12915 qsort (to_sort, to_sort_len, sizeof (struct ada_exc_info),
12916 compare_ada_exception_info);
12917
12918 for (i = 1, j = 1; i < to_sort_len; i++)
12919 if (compare_ada_exception_info (&to_sort[i], &to_sort[j - 1]) != 0)
12920 to_sort[j++] = to_sort[i];
12921 to_sort_len = j;
12922 VEC_truncate(ada_exc_info, *exceptions, skip + to_sort_len);
12923}
12924
12925/* A function intended as the "name_matcher" callback in the struct
12926 quick_symbol_functions' expand_symtabs_matching method.
12927
12928 SEARCH_NAME is the symbol's search name.
12929
12930 If USER_DATA is not NULL, it is a pointer to a regext_t object
12931 used to match the symbol (by natural name). Otherwise, when USER_DATA
12932 is null, no filtering is performed, and all symbols are a positive
12933 match. */
12934
12935static int
12936ada_exc_search_name_matches (const char *search_name, void *user_data)
12937{
12938 regex_t *preg = user_data;
12939
12940 if (preg == NULL)
12941 return 1;
12942
12943 /* In Ada, the symbol "search name" is a linkage name, whereas
12944 the regular expression used to do the matching refers to
12945 the natural name. So match against the decoded name. */
12946 return (regexec (preg, ada_decode (search_name), 0, NULL, 0) == 0);
12947}
12948
12949/* Add all exceptions defined by the Ada standard whose name match
12950 a regular expression.
12951
12952 If PREG is not NULL, then this regexp_t object is used to
12953 perform the symbol name matching. Otherwise, no name-based
12954 filtering is performed.
12955
12956 EXCEPTIONS is a vector of exceptions to which matching exceptions
12957 gets pushed. */
12958
12959static void
12960ada_add_standard_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
12961{
12962 int i;
12963
12964 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
12965 {
12966 if (preg == NULL
12967 || regexec (preg, standard_exc[i], 0, NULL, 0) == 0)
12968 {
12969 struct bound_minimal_symbol msymbol
12970 = ada_lookup_simple_minsym (standard_exc[i]);
12971
12972 if (msymbol.minsym != NULL)
12973 {
12974 struct ada_exc_info info
77e371c0 12975 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3
JB
12976
12977 VEC_safe_push (ada_exc_info, *exceptions, &info);
12978 }
12979 }
12980 }
12981}
12982
12983/* Add all Ada exceptions defined locally and accessible from the given
12984 FRAME.
12985
12986 If PREG is not NULL, then this regexp_t object is used to
12987 perform the symbol name matching. Otherwise, no name-based
12988 filtering is performed.
12989
12990 EXCEPTIONS is a vector of exceptions to which matching exceptions
12991 gets pushed. */
12992
12993static void
12994ada_add_exceptions_from_frame (regex_t *preg, struct frame_info *frame,
12995 VEC(ada_exc_info) **exceptions)
12996{
3977b71f 12997 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
12998
12999 while (block != 0)
13000 {
13001 struct block_iterator iter;
13002 struct symbol *sym;
13003
13004 ALL_BLOCK_SYMBOLS (block, iter, sym)
13005 {
13006 switch (SYMBOL_CLASS (sym))
13007 {
13008 case LOC_TYPEDEF:
13009 case LOC_BLOCK:
13010 case LOC_CONST:
13011 break;
13012 default:
13013 if (ada_is_exception_sym (sym))
13014 {
13015 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
13016 SYMBOL_VALUE_ADDRESS (sym)};
13017
13018 VEC_safe_push (ada_exc_info, *exceptions, &info);
13019 }
13020 }
13021 }
13022 if (BLOCK_FUNCTION (block) != NULL)
13023 break;
13024 block = BLOCK_SUPERBLOCK (block);
13025 }
13026}
13027
13028/* Add all exceptions defined globally whose name name match
13029 a regular expression, excluding standard exceptions.
13030
13031 The reason we exclude standard exceptions is that they need
13032 to be handled separately: Standard exceptions are defined inside
13033 a runtime unit which is normally not compiled with debugging info,
13034 and thus usually do not show up in our symbol search. However,
13035 if the unit was in fact built with debugging info, we need to
13036 exclude them because they would duplicate the entry we found
13037 during the special loop that specifically searches for those
13038 standard exceptions.
13039
13040 If PREG is not NULL, then this regexp_t object is used to
13041 perform the symbol name matching. Otherwise, no name-based
13042 filtering is performed.
13043
13044 EXCEPTIONS is a vector of exceptions to which matching exceptions
13045 gets pushed. */
13046
13047static void
13048ada_add_global_exceptions (regex_t *preg, VEC(ada_exc_info) **exceptions)
13049{
13050 struct objfile *objfile;
43f3e411 13051 struct compunit_symtab *s;
778865d3 13052
276d885b 13053 expand_symtabs_matching (NULL, ada_exc_search_name_matches, NULL,
bb4142cf 13054 VARIABLES_DOMAIN, preg);
778865d3 13055
43f3e411 13056 ALL_COMPUNITS (objfile, s)
778865d3 13057 {
43f3e411 13058 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
778865d3
JB
13059 int i;
13060
13061 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13062 {
13063 struct block *b = BLOCKVECTOR_BLOCK (bv, i);
13064 struct block_iterator iter;
13065 struct symbol *sym;
13066
13067 ALL_BLOCK_SYMBOLS (b, iter, sym)
13068 if (ada_is_non_standard_exception_sym (sym)
13069 && (preg == NULL
13070 || regexec (preg, SYMBOL_NATURAL_NAME (sym),
13071 0, NULL, 0) == 0))
13072 {
13073 struct ada_exc_info info
13074 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
13075
13076 VEC_safe_push (ada_exc_info, *exceptions, &info);
13077 }
13078 }
13079 }
13080}
13081
13082/* Implements ada_exceptions_list with the regular expression passed
13083 as a regex_t, rather than a string.
13084
13085 If not NULL, PREG is used to filter out exceptions whose names
13086 do not match. Otherwise, all exceptions are listed. */
13087
13088static VEC(ada_exc_info) *
13089ada_exceptions_list_1 (regex_t *preg)
13090{
13091 VEC(ada_exc_info) *result = NULL;
13092 struct cleanup *old_chain
13093 = make_cleanup (VEC_cleanup (ada_exc_info), &result);
13094 int prev_len;
13095
13096 /* First, list the known standard exceptions. These exceptions
13097 need to be handled separately, as they are usually defined in
13098 runtime units that have been compiled without debugging info. */
13099
13100 ada_add_standard_exceptions (preg, &result);
13101
13102 /* Next, find all exceptions whose scope is local and accessible
13103 from the currently selected frame. */
13104
13105 if (has_stack_frames ())
13106 {
13107 prev_len = VEC_length (ada_exc_info, result);
13108 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13109 &result);
13110 if (VEC_length (ada_exc_info, result) > prev_len)
13111 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13112 }
13113
13114 /* Add all exceptions whose scope is global. */
13115
13116 prev_len = VEC_length (ada_exc_info, result);
13117 ada_add_global_exceptions (preg, &result);
13118 if (VEC_length (ada_exc_info, result) > prev_len)
13119 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13120
13121 discard_cleanups (old_chain);
13122 return result;
13123}
13124
13125/* Return a vector of ada_exc_info.
13126
13127 If REGEXP is NULL, all exceptions are included in the result.
13128 Otherwise, it should contain a valid regular expression,
13129 and only the exceptions whose names match that regular expression
13130 are included in the result.
13131
13132 The exceptions are sorted in the following order:
13133 - Standard exceptions (defined by the Ada language), in
13134 alphabetical order;
13135 - Exceptions only visible from the current frame, in
13136 alphabetical order;
13137 - Exceptions whose scope is global, in alphabetical order. */
13138
13139VEC(ada_exc_info) *
13140ada_exceptions_list (const char *regexp)
13141{
13142 VEC(ada_exc_info) *result = NULL;
13143 struct cleanup *old_chain = NULL;
13144 regex_t reg;
13145
13146 if (regexp != NULL)
13147 old_chain = compile_rx_or_error (&reg, regexp,
13148 _("invalid regular expression"));
13149
13150 result = ada_exceptions_list_1 (regexp != NULL ? &reg : NULL);
13151
13152 if (old_chain != NULL)
13153 do_cleanups (old_chain);
13154 return result;
13155}
13156
13157/* Implement the "info exceptions" command. */
13158
13159static void
13160info_exceptions_command (char *regexp, int from_tty)
13161{
13162 VEC(ada_exc_info) *exceptions;
13163 struct cleanup *cleanup;
13164 struct gdbarch *gdbarch = get_current_arch ();
13165 int ix;
13166 struct ada_exc_info *info;
13167
13168 exceptions = ada_exceptions_list (regexp);
13169 cleanup = make_cleanup (VEC_cleanup (ada_exc_info), &exceptions);
13170
13171 if (regexp != NULL)
13172 printf_filtered
13173 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13174 else
13175 printf_filtered (_("All defined Ada exceptions:\n"));
13176
13177 for (ix = 0; VEC_iterate(ada_exc_info, exceptions, ix, info); ix++)
13178 printf_filtered ("%s: %s\n", info->name, paddress (gdbarch, info->addr));
13179
13180 do_cleanups (cleanup);
13181}
13182
4c4b4cd2
PH
13183 /* Operators */
13184/* Information about operators given special treatment in functions
13185 below. */
13186/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13187
13188#define ADA_OPERATORS \
13189 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13190 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13191 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13192 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13193 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13194 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13195 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13196 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13197 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13198 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13199 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13200 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13201 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13202 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13203 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13204 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13205 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13206 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13207 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13208
13209static void
554794dc
SDJ
13210ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13211 int *argsp)
4c4b4cd2
PH
13212{
13213 switch (exp->elts[pc - 1].opcode)
13214 {
76a01679 13215 default:
4c4b4cd2
PH
13216 operator_length_standard (exp, pc, oplenp, argsp);
13217 break;
13218
13219#define OP_DEFN(op, len, args, binop) \
13220 case op: *oplenp = len; *argsp = args; break;
13221 ADA_OPERATORS;
13222#undef OP_DEFN
52ce6436
PH
13223
13224 case OP_AGGREGATE:
13225 *oplenp = 3;
13226 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13227 break;
13228
13229 case OP_CHOICES:
13230 *oplenp = 3;
13231 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13232 break;
4c4b4cd2
PH
13233 }
13234}
13235
c0201579
JK
13236/* Implementation of the exp_descriptor method operator_check. */
13237
13238static int
13239ada_operator_check (struct expression *exp, int pos,
13240 int (*objfile_func) (struct objfile *objfile, void *data),
13241 void *data)
13242{
13243 const union exp_element *const elts = exp->elts;
13244 struct type *type = NULL;
13245
13246 switch (elts[pos].opcode)
13247 {
13248 case UNOP_IN_RANGE:
13249 case UNOP_QUAL:
13250 type = elts[pos + 1].type;
13251 break;
13252
13253 default:
13254 return operator_check_standard (exp, pos, objfile_func, data);
13255 }
13256
13257 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13258
13259 if (type && TYPE_OBJFILE (type)
13260 && (*objfile_func) (TYPE_OBJFILE (type), data))
13261 return 1;
13262
13263 return 0;
13264}
13265
4c4b4cd2
PH
13266static char *
13267ada_op_name (enum exp_opcode opcode)
13268{
13269 switch (opcode)
13270 {
76a01679 13271 default:
4c4b4cd2 13272 return op_name_standard (opcode);
52ce6436 13273
4c4b4cd2
PH
13274#define OP_DEFN(op, len, args, binop) case op: return #op;
13275 ADA_OPERATORS;
13276#undef OP_DEFN
52ce6436
PH
13277
13278 case OP_AGGREGATE:
13279 return "OP_AGGREGATE";
13280 case OP_CHOICES:
13281 return "OP_CHOICES";
13282 case OP_NAME:
13283 return "OP_NAME";
4c4b4cd2
PH
13284 }
13285}
13286
13287/* As for operator_length, but assumes PC is pointing at the first
13288 element of the operator, and gives meaningful results only for the
52ce6436 13289 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13290
13291static void
76a01679
JB
13292ada_forward_operator_length (struct expression *exp, int pc,
13293 int *oplenp, int *argsp)
4c4b4cd2 13294{
76a01679 13295 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13296 {
13297 default:
13298 *oplenp = *argsp = 0;
13299 break;
52ce6436 13300
4c4b4cd2
PH
13301#define OP_DEFN(op, len, args, binop) \
13302 case op: *oplenp = len; *argsp = args; break;
13303 ADA_OPERATORS;
13304#undef OP_DEFN
52ce6436
PH
13305
13306 case OP_AGGREGATE:
13307 *oplenp = 3;
13308 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13309 break;
13310
13311 case OP_CHOICES:
13312 *oplenp = 3;
13313 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13314 break;
13315
13316 case OP_STRING:
13317 case OP_NAME:
13318 {
13319 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13320
52ce6436
PH
13321 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13322 *argsp = 0;
13323 break;
13324 }
4c4b4cd2
PH
13325 }
13326}
13327
13328static int
13329ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13330{
13331 enum exp_opcode op = exp->elts[elt].opcode;
13332 int oplen, nargs;
13333 int pc = elt;
13334 int i;
76a01679 13335
4c4b4cd2
PH
13336 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13337
76a01679 13338 switch (op)
4c4b4cd2 13339 {
76a01679 13340 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13341 case OP_ATR_FIRST:
13342 case OP_ATR_LAST:
13343 case OP_ATR_LENGTH:
13344 case OP_ATR_IMAGE:
13345 case OP_ATR_MAX:
13346 case OP_ATR_MIN:
13347 case OP_ATR_MODULUS:
13348 case OP_ATR_POS:
13349 case OP_ATR_SIZE:
13350 case OP_ATR_TAG:
13351 case OP_ATR_VAL:
13352 break;
13353
13354 case UNOP_IN_RANGE:
13355 case UNOP_QUAL:
323e0a4a
AC
13356 /* XXX: gdb_sprint_host_address, type_sprint */
13357 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13358 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13359 fprintf_filtered (stream, " (");
13360 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13361 fprintf_filtered (stream, ")");
13362 break;
13363 case BINOP_IN_BOUNDS:
52ce6436
PH
13364 fprintf_filtered (stream, " (%d)",
13365 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13366 break;
13367 case TERNOP_IN_RANGE:
13368 break;
13369
52ce6436
PH
13370 case OP_AGGREGATE:
13371 case OP_OTHERS:
13372 case OP_DISCRETE_RANGE:
13373 case OP_POSITIONAL:
13374 case OP_CHOICES:
13375 break;
13376
13377 case OP_NAME:
13378 case OP_STRING:
13379 {
13380 char *name = &exp->elts[elt + 2].string;
13381 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13382
52ce6436
PH
13383 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13384 break;
13385 }
13386
4c4b4cd2
PH
13387 default:
13388 return dump_subexp_body_standard (exp, stream, elt);
13389 }
13390
13391 elt += oplen;
13392 for (i = 0; i < nargs; i += 1)
13393 elt = dump_subexp (exp, stream, elt);
13394
13395 return elt;
13396}
13397
13398/* The Ada extension of print_subexp (q.v.). */
13399
76a01679
JB
13400static void
13401ada_print_subexp (struct expression *exp, int *pos,
13402 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13403{
52ce6436 13404 int oplen, nargs, i;
4c4b4cd2
PH
13405 int pc = *pos;
13406 enum exp_opcode op = exp->elts[pc].opcode;
13407
13408 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13409
52ce6436 13410 *pos += oplen;
4c4b4cd2
PH
13411 switch (op)
13412 {
13413 default:
52ce6436 13414 *pos -= oplen;
4c4b4cd2
PH
13415 print_subexp_standard (exp, pos, stream, prec);
13416 return;
13417
13418 case OP_VAR_VALUE:
4c4b4cd2
PH
13419 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13420 return;
13421
13422 case BINOP_IN_BOUNDS:
323e0a4a 13423 /* XXX: sprint_subexp */
4c4b4cd2 13424 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13425 fputs_filtered (" in ", stream);
4c4b4cd2 13426 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13427 fputs_filtered ("'range", stream);
4c4b4cd2 13428 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13429 fprintf_filtered (stream, "(%ld)",
13430 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13431 return;
13432
13433 case TERNOP_IN_RANGE:
4c4b4cd2 13434 if (prec >= PREC_EQUAL)
76a01679 13435 fputs_filtered ("(", stream);
323e0a4a 13436 /* XXX: sprint_subexp */
4c4b4cd2 13437 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13438 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13439 print_subexp (exp, pos, stream, PREC_EQUAL);
13440 fputs_filtered (" .. ", stream);
13441 print_subexp (exp, pos, stream, PREC_EQUAL);
13442 if (prec >= PREC_EQUAL)
76a01679
JB
13443 fputs_filtered (")", stream);
13444 return;
4c4b4cd2
PH
13445
13446 case OP_ATR_FIRST:
13447 case OP_ATR_LAST:
13448 case OP_ATR_LENGTH:
13449 case OP_ATR_IMAGE:
13450 case OP_ATR_MAX:
13451 case OP_ATR_MIN:
13452 case OP_ATR_MODULUS:
13453 case OP_ATR_POS:
13454 case OP_ATR_SIZE:
13455 case OP_ATR_TAG:
13456 case OP_ATR_VAL:
4c4b4cd2 13457 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13458 {
13459 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13460 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13461 &type_print_raw_options);
76a01679
JB
13462 *pos += 3;
13463 }
4c4b4cd2 13464 else
76a01679 13465 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13466 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13467 if (nargs > 1)
76a01679
JB
13468 {
13469 int tem;
5b4ee69b 13470
76a01679
JB
13471 for (tem = 1; tem < nargs; tem += 1)
13472 {
13473 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13474 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13475 }
13476 fputs_filtered (")", stream);
13477 }
4c4b4cd2 13478 return;
14f9c5c9 13479
4c4b4cd2 13480 case UNOP_QUAL:
4c4b4cd2
PH
13481 type_print (exp->elts[pc + 1].type, "", stream, 0);
13482 fputs_filtered ("'(", stream);
13483 print_subexp (exp, pos, stream, PREC_PREFIX);
13484 fputs_filtered (")", stream);
13485 return;
14f9c5c9 13486
4c4b4cd2 13487 case UNOP_IN_RANGE:
323e0a4a 13488 /* XXX: sprint_subexp */
4c4b4cd2 13489 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13490 fputs_filtered (" in ", stream);
79d43c61
TT
13491 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13492 &type_print_raw_options);
4c4b4cd2 13493 return;
52ce6436
PH
13494
13495 case OP_DISCRETE_RANGE:
13496 print_subexp (exp, pos, stream, PREC_SUFFIX);
13497 fputs_filtered ("..", stream);
13498 print_subexp (exp, pos, stream, PREC_SUFFIX);
13499 return;
13500
13501 case OP_OTHERS:
13502 fputs_filtered ("others => ", stream);
13503 print_subexp (exp, pos, stream, PREC_SUFFIX);
13504 return;
13505
13506 case OP_CHOICES:
13507 for (i = 0; i < nargs-1; i += 1)
13508 {
13509 if (i > 0)
13510 fputs_filtered ("|", stream);
13511 print_subexp (exp, pos, stream, PREC_SUFFIX);
13512 }
13513 fputs_filtered (" => ", stream);
13514 print_subexp (exp, pos, stream, PREC_SUFFIX);
13515 return;
13516
13517 case OP_POSITIONAL:
13518 print_subexp (exp, pos, stream, PREC_SUFFIX);
13519 return;
13520
13521 case OP_AGGREGATE:
13522 fputs_filtered ("(", stream);
13523 for (i = 0; i < nargs; i += 1)
13524 {
13525 if (i > 0)
13526 fputs_filtered (", ", stream);
13527 print_subexp (exp, pos, stream, PREC_SUFFIX);
13528 }
13529 fputs_filtered (")", stream);
13530 return;
4c4b4cd2
PH
13531 }
13532}
14f9c5c9
AS
13533
13534/* Table mapping opcodes into strings for printing operators
13535 and precedences of the operators. */
13536
d2e4a39e
AS
13537static const struct op_print ada_op_print_tab[] = {
13538 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13539 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13540 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13541 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13542 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13543 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13544 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13545 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13546 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13547 {">=", BINOP_GEQ, PREC_ORDER, 0},
13548 {">", BINOP_GTR, PREC_ORDER, 0},
13549 {"<", BINOP_LESS, PREC_ORDER, 0},
13550 {">>", BINOP_RSH, PREC_SHIFT, 0},
13551 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13552 {"+", BINOP_ADD, PREC_ADD, 0},
13553 {"-", BINOP_SUB, PREC_ADD, 0},
13554 {"&", BINOP_CONCAT, PREC_ADD, 0},
13555 {"*", BINOP_MUL, PREC_MUL, 0},
13556 {"/", BINOP_DIV, PREC_MUL, 0},
13557 {"rem", BINOP_REM, PREC_MUL, 0},
13558 {"mod", BINOP_MOD, PREC_MUL, 0},
13559 {"**", BINOP_EXP, PREC_REPEAT, 0},
13560 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13561 {"-", UNOP_NEG, PREC_PREFIX, 0},
13562 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13563 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13564 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13565 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13566 {".all", UNOP_IND, PREC_SUFFIX, 1},
13567 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13568 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
d2e4a39e 13569 {NULL, 0, 0, 0}
14f9c5c9
AS
13570};
13571\f
72d5681a
PH
13572enum ada_primitive_types {
13573 ada_primitive_type_int,
13574 ada_primitive_type_long,
13575 ada_primitive_type_short,
13576 ada_primitive_type_char,
13577 ada_primitive_type_float,
13578 ada_primitive_type_double,
13579 ada_primitive_type_void,
13580 ada_primitive_type_long_long,
13581 ada_primitive_type_long_double,
13582 ada_primitive_type_natural,
13583 ada_primitive_type_positive,
13584 ada_primitive_type_system_address,
13585 nr_ada_primitive_types
13586};
6c038f32
PH
13587
13588static void
d4a9a881 13589ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
13590 struct language_arch_info *lai)
13591{
d4a9a881 13592 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 13593
72d5681a 13594 lai->primitive_type_vector
d4a9a881 13595 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 13596 struct type *);
e9bb382b
UW
13597
13598 lai->primitive_type_vector [ada_primitive_type_int]
13599 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13600 0, "integer");
13601 lai->primitive_type_vector [ada_primitive_type_long]
13602 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
13603 0, "long_integer");
13604 lai->primitive_type_vector [ada_primitive_type_short]
13605 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
13606 0, "short_integer");
13607 lai->string_char_type
13608 = lai->primitive_type_vector [ada_primitive_type_char]
13609 = arch_integer_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
13610 lai->primitive_type_vector [ada_primitive_type_float]
13611 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
13612 "float", NULL);
13613 lai->primitive_type_vector [ada_primitive_type_double]
13614 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13615 "long_float", NULL);
13616 lai->primitive_type_vector [ada_primitive_type_long_long]
13617 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
13618 0, "long_long_integer");
13619 lai->primitive_type_vector [ada_primitive_type_long_double]
13620 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
13621 "long_long_float", NULL);
13622 lai->primitive_type_vector [ada_primitive_type_natural]
13623 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13624 0, "natural");
13625 lai->primitive_type_vector [ada_primitive_type_positive]
13626 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
13627 0, "positive");
13628 lai->primitive_type_vector [ada_primitive_type_void]
13629 = builtin->builtin_void;
13630
13631 lai->primitive_type_vector [ada_primitive_type_system_address]
13632 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, 1, "void"));
72d5681a
PH
13633 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
13634 = "system__address";
fbb06eb1 13635
47e729a8 13636 lai->bool_type_symbol = NULL;
fbb06eb1 13637 lai->bool_type_default = builtin->builtin_bool;
6c038f32 13638}
6c038f32
PH
13639\f
13640 /* Language vector */
13641
13642/* Not really used, but needed in the ada_language_defn. */
13643
13644static void
6c7a06a3 13645emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 13646{
6c7a06a3 13647 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
13648}
13649
13650static int
410a0ff2 13651parse (struct parser_state *ps)
6c038f32
PH
13652{
13653 warnings_issued = 0;
410a0ff2 13654 return ada_parse (ps);
6c038f32
PH
13655}
13656
13657static const struct exp_descriptor ada_exp_descriptor = {
13658 ada_print_subexp,
13659 ada_operator_length,
c0201579 13660 ada_operator_check,
6c038f32
PH
13661 ada_op_name,
13662 ada_dump_subexp_body,
13663 ada_evaluate_subexp
13664};
13665
1a119f36 13666/* Implement the "la_get_symbol_name_cmp" language_defn method
74ccd7f5
JB
13667 for Ada. */
13668
1a119f36
JB
13669static symbol_name_cmp_ftype
13670ada_get_symbol_name_cmp (const char *lookup_name)
74ccd7f5
JB
13671{
13672 if (should_use_wild_match (lookup_name))
13673 return wild_match;
13674 else
13675 return compare_names;
13676}
13677
a5ee536b
JB
13678/* Implement the "la_read_var_value" language_defn method for Ada. */
13679
13680static struct value *
13681ada_read_var_value (struct symbol *var, struct frame_info *frame)
13682{
3977b71f 13683 const struct block *frame_block = NULL;
a5ee536b
JB
13684 struct symbol *renaming_sym = NULL;
13685
13686 /* The only case where default_read_var_value is not sufficient
13687 is when VAR is a renaming... */
13688 if (frame)
13689 frame_block = get_frame_block (frame, NULL);
13690 if (frame_block)
13691 renaming_sym = ada_find_renaming_symbol (var, frame_block);
13692 if (renaming_sym != NULL)
13693 return ada_read_renaming_var_value (renaming_sym, frame_block);
13694
13695 /* This is a typical case where we expect the default_read_var_value
13696 function to work. */
13697 return default_read_var_value (var, frame);
13698}
13699
6c038f32
PH
13700const struct language_defn ada_language_defn = {
13701 "ada", /* Language name */
6abde28f 13702 "Ada",
6c038f32 13703 language_ada,
6c038f32 13704 range_check_off,
6c038f32
PH
13705 case_sensitive_on, /* Yes, Ada is case-insensitive, but
13706 that's not quite what this means. */
6c038f32 13707 array_row_major,
9a044a89 13708 macro_expansion_no,
6c038f32
PH
13709 &ada_exp_descriptor,
13710 parse,
13711 ada_error,
13712 resolve,
13713 ada_printchar, /* Print a character constant */
13714 ada_printstr, /* Function to print string constant */
13715 emit_char, /* Function to print single char (not used) */
6c038f32 13716 ada_print_type, /* Print a type using appropriate syntax */
be942545 13717 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
13718 ada_val_print, /* Print a value using appropriate syntax */
13719 ada_value_print, /* Print a top-level value */
a5ee536b 13720 ada_read_var_value, /* la_read_var_value */
6c038f32 13721 NULL, /* Language specific skip_trampoline */
2b2d9e11 13722 NULL, /* name_of_this */
6c038f32
PH
13723 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
13724 basic_lookup_transparent_type, /* lookup_transparent_type */
13725 ada_la_decode, /* Language specific symbol demangler */
0963b4bd
MS
13726 NULL, /* Language specific
13727 class_name_from_physname */
6c038f32
PH
13728 ada_op_print_tab, /* expression operators for printing */
13729 0, /* c-style arrays */
13730 1, /* String lower bound */
6c038f32 13731 ada_get_gdb_completer_word_break_characters,
41d27058 13732 ada_make_symbol_completion_list,
72d5681a 13733 ada_language_arch_info,
e79af960 13734 ada_print_array_index,
41f1b697 13735 default_pass_by_reference,
ae6a3a4c 13736 c_get_string,
1a119f36 13737 ada_get_symbol_name_cmp, /* la_get_symbol_name_cmp */
f8eba3c6 13738 ada_iterate_over_symbols,
a53b64ea 13739 &ada_varobj_ops,
bb2ec1b3
TT
13740 NULL,
13741 NULL,
6c038f32
PH
13742 LANG_MAGIC
13743};
13744
2c0b251b
PA
13745/* Provide a prototype to silence -Wmissing-prototypes. */
13746extern initialize_file_ftype _initialize_ada_language;
13747
5bf03f13
JB
13748/* Command-list for the "set/show ada" prefix command. */
13749static struct cmd_list_element *set_ada_list;
13750static struct cmd_list_element *show_ada_list;
13751
13752/* Implement the "set ada" prefix command. */
13753
13754static void
13755set_ada_command (char *arg, int from_tty)
13756{
13757 printf_unfiltered (_(\
13758"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 13759 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
13760}
13761
13762/* Implement the "show ada" prefix command. */
13763
13764static void
13765show_ada_command (char *args, int from_tty)
13766{
13767 cmd_show_list (show_ada_list, from_tty, "");
13768}
13769
2060206e
PA
13770static void
13771initialize_ada_catchpoint_ops (void)
13772{
13773 struct breakpoint_ops *ops;
13774
13775 initialize_breakpoint_ops ();
13776
13777 ops = &catch_exception_breakpoint_ops;
13778 *ops = bkpt_breakpoint_ops;
13779 ops->dtor = dtor_catch_exception;
13780 ops->allocate_location = allocate_location_catch_exception;
13781 ops->re_set = re_set_catch_exception;
13782 ops->check_status = check_status_catch_exception;
13783 ops->print_it = print_it_catch_exception;
13784 ops->print_one = print_one_catch_exception;
13785 ops->print_mention = print_mention_catch_exception;
13786 ops->print_recreate = print_recreate_catch_exception;
13787
13788 ops = &catch_exception_unhandled_breakpoint_ops;
13789 *ops = bkpt_breakpoint_ops;
13790 ops->dtor = dtor_catch_exception_unhandled;
13791 ops->allocate_location = allocate_location_catch_exception_unhandled;
13792 ops->re_set = re_set_catch_exception_unhandled;
13793 ops->check_status = check_status_catch_exception_unhandled;
13794 ops->print_it = print_it_catch_exception_unhandled;
13795 ops->print_one = print_one_catch_exception_unhandled;
13796 ops->print_mention = print_mention_catch_exception_unhandled;
13797 ops->print_recreate = print_recreate_catch_exception_unhandled;
13798
13799 ops = &catch_assert_breakpoint_ops;
13800 *ops = bkpt_breakpoint_ops;
13801 ops->dtor = dtor_catch_assert;
13802 ops->allocate_location = allocate_location_catch_assert;
13803 ops->re_set = re_set_catch_assert;
13804 ops->check_status = check_status_catch_assert;
13805 ops->print_it = print_it_catch_assert;
13806 ops->print_one = print_one_catch_assert;
13807 ops->print_mention = print_mention_catch_assert;
13808 ops->print_recreate = print_recreate_catch_assert;
13809}
13810
3d9434b5
JB
13811/* This module's 'new_objfile' observer. */
13812
13813static void
13814ada_new_objfile_observer (struct objfile *objfile)
13815{
13816 ada_clear_symbol_cache ();
13817}
13818
13819/* This module's 'free_objfile' observer. */
13820
13821static void
13822ada_free_objfile_observer (struct objfile *objfile)
13823{
13824 ada_clear_symbol_cache ();
13825}
13826
d2e4a39e 13827void
6c038f32 13828_initialize_ada_language (void)
14f9c5c9 13829{
6c038f32
PH
13830 add_language (&ada_language_defn);
13831
2060206e
PA
13832 initialize_ada_catchpoint_ops ();
13833
5bf03f13
JB
13834 add_prefix_cmd ("ada", no_class, set_ada_command,
13835 _("Prefix command for changing Ada-specfic settings"),
13836 &set_ada_list, "set ada ", 0, &setlist);
13837
13838 add_prefix_cmd ("ada", no_class, show_ada_command,
13839 _("Generic command for showing Ada-specific settings."),
13840 &show_ada_list, "show ada ", 0, &showlist);
13841
13842 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
13843 &trust_pad_over_xvs, _("\
13844Enable or disable an optimization trusting PAD types over XVS types"), _("\
13845Show whether an optimization trusting PAD types over XVS types is activated"),
13846 _("\
13847This is related to the encoding used by the GNAT compiler. The debugger\n\
13848should normally trust the contents of PAD types, but certain older versions\n\
13849of GNAT have a bug that sometimes causes the information in the PAD type\n\
13850to be incorrect. Turning this setting \"off\" allows the debugger to\n\
13851work around this bug. It is always safe to turn this option \"off\", but\n\
13852this incurs a slight performance penalty, so it is recommended to NOT change\n\
13853this option to \"off\" unless necessary."),
13854 NULL, NULL, &set_ada_list, &show_ada_list);
13855
9ac4176b
PA
13856 add_catch_command ("exception", _("\
13857Catch Ada exceptions, when raised.\n\
13858With an argument, catch only exceptions with the given name."),
13859 catch_ada_exception_command,
13860 NULL,
13861 CATCH_PERMANENT,
13862 CATCH_TEMPORARY);
13863 add_catch_command ("assert", _("\
13864Catch failed Ada assertions, when raised.\n\
13865With an argument, catch only exceptions with the given name."),
13866 catch_assert_command,
13867 NULL,
13868 CATCH_PERMANENT,
13869 CATCH_TEMPORARY);
13870
6c038f32 13871 varsize_limit = 65536;
6c038f32 13872
778865d3
JB
13873 add_info ("exceptions", info_exceptions_command,
13874 _("\
13875List all Ada exception names.\n\
13876If a regular expression is passed as an argument, only those matching\n\
13877the regular expression are listed."));
13878
c6044dd1
JB
13879 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
13880 _("Set Ada maintenance-related variables."),
13881 &maint_set_ada_cmdlist, "maintenance set ada ",
13882 0/*allow-unknown*/, &maintenance_set_cmdlist);
13883
13884 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
13885 _("Show Ada maintenance-related variables"),
13886 &maint_show_ada_cmdlist, "maintenance show ada ",
13887 0/*allow-unknown*/, &maintenance_show_cmdlist);
13888
13889 add_setshow_boolean_cmd
13890 ("ignore-descriptive-types", class_maintenance,
13891 &ada_ignore_descriptive_types_p,
13892 _("Set whether descriptive types generated by GNAT should be ignored."),
13893 _("Show whether descriptive types generated by GNAT should be ignored."),
13894 _("\
13895When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
13896DWARF attribute."),
13897 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
13898
6c038f32
PH
13899 obstack_init (&symbol_list_obstack);
13900
13901 decoded_names_store = htab_create_alloc
13902 (256, htab_hash_string, (int (*)(const void *, const void *)) streq,
13903 NULL, xcalloc, xfree);
6b69afc4 13904
3d9434b5
JB
13905 /* The ada-lang observers. */
13906 observer_attach_new_objfile (ada_new_objfile_observer);
13907 observer_attach_free_objfile (ada_free_objfile_observer);
e802dbe0 13908 observer_attach_inferior_exit (ada_inferior_exit);
ee01b665
JB
13909
13910 /* Setup various context-specific data. */
e802dbe0 13911 ada_inferior_data
8e260fc0 13912 = register_inferior_data_with_cleanup (NULL, ada_inferior_data_cleanup);
ee01b665
JB
13913 ada_pspace_data_handle
13914 = register_program_space_data_with_cleanup (NULL, ada_pspace_data_cleanup);
14f9c5c9 13915}