]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - gdb/ada-lang.c
gdb: Remove a non-const reference parameter
[thirdparty/binutils-gdb.git] / gdb / ada-lang.c
CommitLineData
6e681866 1/* Ada language support routines for GDB, the GNU debugger.
10a2c479 2
42a4f53d 3 Copyright (C) 1992-2019 Free Software Foundation, Inc.
14f9c5c9 4
a9762ec7 5 This file is part of GDB.
14f9c5c9 6
a9762ec7
JB
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
14f9c5c9 11
a9762ec7
JB
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
14f9c5c9 16
a9762ec7
JB
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>. */
14f9c5c9 19
96d887e8 20
4c4b4cd2 21#include "defs.h"
14f9c5c9 22#include <ctype.h>
14f9c5c9 23#include "demangle.h"
d55e5aa6 24#include "gdb_regex.h"
4de283e4
TT
25#include "frame.h"
26#include "symtab.h"
27#include "gdbtypes.h"
14f9c5c9 28#include "gdbcmd.h"
4de283e4
TT
29#include "expression.h"
30#include "parser-defs.h"
31#include "language.h"
32#include "varobj.h"
33#include "c-lang.h"
34#include "inferior.h"
35#include "symfile.h"
36#include "objfiles.h"
37#include "breakpoint.h"
14f9c5c9 38#include "gdbcore.h"
4c4b4cd2 39#include "hashtab.h"
4de283e4
TT
40#include "gdb_obstack.h"
41#include "ada-lang.h"
42#include "completer.h"
43#include <sys/stat.h>
44#include "ui-out.h"
45#include "block.h"
04714b91 46#include "infcall.h"
4de283e4
TT
47#include "dictionary.h"
48#include "annotate.h"
49#include "valprint.h"
d55e5aa6 50#include "source.h"
4de283e4 51#include "observable.h"
268a13a5 52#include "gdbsupport/vec.h"
692465f1 53#include "stack.h"
268a13a5 54#include "gdbsupport/gdb_vecs.h"
79d43c61 55#include "typeprint.h"
4de283e4
TT
56#include "namespace.h"
57
58#include "psymtab.h"
40bc484c 59#include "value.h"
4de283e4
TT
60#include "mi/mi-common.h"
61#include "arch-utils.h"
62#include "cli/cli-utils.h"
268a13a5
TT
63#include "gdbsupport/function-view.h"
64#include "gdbsupport/byte-vector.h"
4de283e4 65#include <algorithm>
2ff0a947 66#include <map>
ccefe4c4 67
4c4b4cd2 68/* Define whether or not the C operator '/' truncates towards zero for
0963b4bd 69 differently signed operands (truncation direction is undefined in C).
4c4b4cd2
PH
70 Copied from valarith.c. */
71
72#ifndef TRUNCATION_TOWARDS_ZERO
73#define TRUNCATION_TOWARDS_ZERO ((-5 / 2) == -2)
74#endif
75
d2e4a39e 76static struct type *desc_base_type (struct type *);
14f9c5c9 77
d2e4a39e 78static struct type *desc_bounds_type (struct type *);
14f9c5c9 79
d2e4a39e 80static struct value *desc_bounds (struct value *);
14f9c5c9 81
d2e4a39e 82static int fat_pntr_bounds_bitpos (struct type *);
14f9c5c9 83
d2e4a39e 84static int fat_pntr_bounds_bitsize (struct type *);
14f9c5c9 85
556bdfd4 86static struct type *desc_data_target_type (struct type *);
14f9c5c9 87
d2e4a39e 88static struct value *desc_data (struct value *);
14f9c5c9 89
d2e4a39e 90static int fat_pntr_data_bitpos (struct type *);
14f9c5c9 91
d2e4a39e 92static int fat_pntr_data_bitsize (struct type *);
14f9c5c9 93
d2e4a39e 94static struct value *desc_one_bound (struct value *, int, int);
14f9c5c9 95
d2e4a39e 96static int desc_bound_bitpos (struct type *, int, int);
14f9c5c9 97
d2e4a39e 98static int desc_bound_bitsize (struct type *, int, int);
14f9c5c9 99
d2e4a39e 100static struct type *desc_index_type (struct type *, int);
14f9c5c9 101
d2e4a39e 102static int desc_arity (struct type *);
14f9c5c9 103
d2e4a39e 104static int ada_type_match (struct type *, struct type *, int);
14f9c5c9 105
d2e4a39e 106static int ada_args_match (struct symbol *, struct value **, int);
14f9c5c9 107
40bc484c 108static struct value *make_array_descriptor (struct type *, struct value *);
14f9c5c9 109
4c4b4cd2 110static void ada_add_block_symbols (struct obstack *,
b5ec771e
PA
111 const struct block *,
112 const lookup_name_info &lookup_name,
113 domain_enum, struct objfile *);
14f9c5c9 114
22cee43f 115static void ada_add_all_symbols (struct obstack *, const struct block *,
b5ec771e
PA
116 const lookup_name_info &lookup_name,
117 domain_enum, int, int *);
22cee43f 118
d12307c1 119static int is_nonfunction (struct block_symbol *, int);
14f9c5c9 120
76a01679 121static void add_defn_to_vec (struct obstack *, struct symbol *,
f0c5f9b2 122 const struct block *);
14f9c5c9 123
4c4b4cd2
PH
124static int num_defns_collected (struct obstack *);
125
d12307c1 126static struct block_symbol *defns_collected (struct obstack *, int);
14f9c5c9 127
e9d9f57e 128static struct value *resolve_subexp (expression_up *, int *, int,
699bd4cf
TT
129 struct type *, int,
130 innermost_block_tracker *);
14f9c5c9 131
e9d9f57e 132static void replace_operator_with_call (expression_up *, int, int, int,
270140bd 133 struct symbol *, const struct block *);
14f9c5c9 134
d2e4a39e 135static int possible_user_operator_p (enum exp_opcode, struct value **);
14f9c5c9 136
a121b7c1 137static const char *ada_op_name (enum exp_opcode);
4c4b4cd2
PH
138
139static const char *ada_decoded_op_name (enum exp_opcode);
14f9c5c9 140
d2e4a39e 141static int numeric_type_p (struct type *);
14f9c5c9 142
d2e4a39e 143static int integer_type_p (struct type *);
14f9c5c9 144
d2e4a39e 145static int scalar_type_p (struct type *);
14f9c5c9 146
d2e4a39e 147static int discrete_type_p (struct type *);
14f9c5c9 148
a121b7c1 149static struct type *ada_lookup_struct_elt_type (struct type *, const char *,
988f6b3d 150 int, int);
4c4b4cd2 151
d2e4a39e 152static struct value *evaluate_subexp_type (struct expression *, int *);
14f9c5c9 153
b4ba55a1
JB
154static struct type *ada_find_parallel_type_with_name (struct type *,
155 const char *);
156
d2e4a39e 157static int is_dynamic_field (struct type *, int);
14f9c5c9 158
10a2c479 159static struct type *to_fixed_variant_branch_type (struct type *,
fc1a4b47 160 const gdb_byte *,
4c4b4cd2
PH
161 CORE_ADDR, struct value *);
162
163static struct type *to_fixed_array_type (struct type *, struct value *, int);
14f9c5c9 164
28c85d6c 165static struct type *to_fixed_range_type (struct type *, struct value *);
14f9c5c9 166
d2e4a39e 167static struct type *to_static_fixed_type (struct type *);
f192137b 168static struct type *static_unwrap_type (struct type *type);
14f9c5c9 169
d2e4a39e 170static struct value *unwrap_value (struct value *);
14f9c5c9 171
ad82864c 172static struct type *constrained_packed_array_type (struct type *, long *);
14f9c5c9 173
ad82864c 174static struct type *decode_constrained_packed_array_type (struct type *);
14f9c5c9 175
ad82864c
JB
176static long decode_packed_array_bitsize (struct type *);
177
178static struct value *decode_constrained_packed_array (struct value *);
179
180static int ada_is_packed_array_type (struct type *);
181
182static int ada_is_unconstrained_packed_array_type (struct type *);
14f9c5c9 183
d2e4a39e 184static struct value *value_subscript_packed (struct value *, int,
4c4b4cd2 185 struct value **);
14f9c5c9 186
4c4b4cd2
PH
187static struct value *coerce_unspec_val_to_type (struct value *,
188 struct type *);
14f9c5c9 189
d2e4a39e 190static int lesseq_defined_than (struct symbol *, struct symbol *);
14f9c5c9 191
d2e4a39e 192static int equiv_types (struct type *, struct type *);
14f9c5c9 193
d2e4a39e 194static int is_name_suffix (const char *);
14f9c5c9 195
73589123
PH
196static int advance_wild_match (const char **, const char *, int);
197
b5ec771e 198static bool wild_match (const char *name, const char *patn);
14f9c5c9 199
d2e4a39e 200static struct value *ada_coerce_ref (struct value *);
14f9c5c9 201
4c4b4cd2
PH
202static LONGEST pos_atr (struct value *);
203
3cb382c9 204static struct value *value_pos_atr (struct type *, struct value *);
14f9c5c9 205
d2e4a39e 206static struct value *value_val_atr (struct type *, struct value *);
14f9c5c9 207
4c4b4cd2
PH
208static struct symbol *standard_lookup (const char *, const struct block *,
209 domain_enum);
14f9c5c9 210
108d56a4 211static struct value *ada_search_struct_field (const char *, struct value *, int,
4c4b4cd2
PH
212 struct type *);
213
214static struct value *ada_value_primitive_field (struct value *, int, int,
215 struct type *);
216
0d5cff50 217static int find_struct_field (const char *, struct type *, int,
52ce6436 218 struct type **, int *, int *, int *, int *);
4c4b4cd2 219
d12307c1 220static int ada_resolve_function (struct block_symbol *, int,
4c4b4cd2 221 struct value **, int, const char *,
2a612529 222 struct type *, int);
4c4b4cd2 223
4c4b4cd2
PH
224static int ada_is_direct_array_type (struct type *);
225
72d5681a
PH
226static void ada_language_arch_info (struct gdbarch *,
227 struct language_arch_info *);
714e53ab 228
52ce6436
PH
229static struct value *ada_index_struct_field (int, struct value *, int,
230 struct type *);
231
232static struct value *assign_aggregate (struct value *, struct value *,
0963b4bd
MS
233 struct expression *,
234 int *, enum noside);
52ce6436
PH
235
236static void aggregate_assign_from_choices (struct value *, struct value *,
237 struct expression *,
238 int *, LONGEST *, int *,
239 int, LONGEST, LONGEST);
240
241static void aggregate_assign_positional (struct value *, struct value *,
242 struct expression *,
243 int *, LONGEST *, int *, int,
244 LONGEST, LONGEST);
245
246
247static void aggregate_assign_others (struct value *, struct value *,
248 struct expression *,
249 int *, LONGEST *, int, LONGEST, LONGEST);
250
251
252static void add_component_interval (LONGEST, LONGEST, LONGEST *, int *, int);
253
254
255static struct value *ada_evaluate_subexp (struct type *, struct expression *,
256 int *, enum noside);
257
258static void ada_forward_operator_length (struct expression *, int, int *,
259 int *);
852dff6c
JB
260
261static struct type *ada_find_any_type (const char *name);
b5ec771e
PA
262
263static symbol_name_matcher_ftype *ada_get_symbol_name_matcher
264 (const lookup_name_info &lookup_name);
265
4c4b4cd2
PH
266\f
267
ee01b665
JB
268/* The result of a symbol lookup to be stored in our symbol cache. */
269
270struct cache_entry
271{
272 /* The name used to perform the lookup. */
273 const char *name;
274 /* The namespace used during the lookup. */
fe978cb0 275 domain_enum domain;
ee01b665
JB
276 /* The symbol returned by the lookup, or NULL if no matching symbol
277 was found. */
278 struct symbol *sym;
279 /* The block where the symbol was found, or NULL if no matching
280 symbol was found. */
281 const struct block *block;
282 /* A pointer to the next entry with the same hash. */
283 struct cache_entry *next;
284};
285
286/* The Ada symbol cache, used to store the result of Ada-mode symbol
287 lookups in the course of executing the user's commands.
288
289 The cache is implemented using a simple, fixed-sized hash.
290 The size is fixed on the grounds that there are not likely to be
291 all that many symbols looked up during any given session, regardless
292 of the size of the symbol table. If we decide to go to a resizable
293 table, let's just use the stuff from libiberty instead. */
294
295#define HASH_SIZE 1009
296
297struct ada_symbol_cache
298{
299 /* An obstack used to store the entries in our cache. */
300 struct obstack cache_space;
301
302 /* The root of the hash table used to implement our symbol cache. */
303 struct cache_entry *root[HASH_SIZE];
304};
305
306static void ada_free_symbol_cache (struct ada_symbol_cache *sym_cache);
76a01679 307
4c4b4cd2 308/* Maximum-sized dynamic type. */
14f9c5c9
AS
309static unsigned int varsize_limit;
310
67cb5b2d 311static const char ada_completer_word_break_characters[] =
4c4b4cd2
PH
312#ifdef VMS
313 " \t\n!@#%^&*()+=|~`}{[]\";:?/,-";
314#else
14f9c5c9 315 " \t\n!@#$%^&*()+=|~`}{[]\";:?/,-";
4c4b4cd2 316#endif
14f9c5c9 317
4c4b4cd2 318/* The name of the symbol to use to get the name of the main subprogram. */
76a01679 319static const char ADA_MAIN_PROGRAM_SYMBOL_NAME[]
4c4b4cd2 320 = "__gnat_ada_main_program_name";
14f9c5c9 321
4c4b4cd2
PH
322/* Limit on the number of warnings to raise per expression evaluation. */
323static int warning_limit = 2;
324
325/* Number of warning messages issued; reset to 0 by cleanups after
326 expression evaluation. */
327static int warnings_issued = 0;
328
329static const char *known_runtime_file_name_patterns[] = {
330 ADA_KNOWN_RUNTIME_FILE_NAME_PATTERNS NULL
331};
332
333static const char *known_auxiliary_function_name_patterns[] = {
334 ADA_KNOWN_AUXILIARY_FUNCTION_NAME_PATTERNS NULL
335};
336
c6044dd1
JB
337/* Maintenance-related settings for this module. */
338
339static struct cmd_list_element *maint_set_ada_cmdlist;
340static struct cmd_list_element *maint_show_ada_cmdlist;
341
342/* Implement the "maintenance set ada" (prefix) command. */
343
344static void
981a3fb3 345maint_set_ada_cmd (const char *args, int from_tty)
c6044dd1 346{
635c7e8a
TT
347 help_list (maint_set_ada_cmdlist, "maintenance set ada ", all_commands,
348 gdb_stdout);
c6044dd1
JB
349}
350
351/* Implement the "maintenance show ada" (prefix) command. */
352
353static void
981a3fb3 354maint_show_ada_cmd (const char *args, int from_tty)
c6044dd1
JB
355{
356 cmd_show_list (maint_show_ada_cmdlist, from_tty, "");
357}
358
359/* The "maintenance ada set/show ignore-descriptive-type" value. */
360
361static int ada_ignore_descriptive_types_p = 0;
362
e802dbe0
JB
363 /* Inferior-specific data. */
364
365/* Per-inferior data for this module. */
366
367struct ada_inferior_data
368{
369 /* The ada__tags__type_specific_data type, which is used when decoding
370 tagged types. With older versions of GNAT, this type was directly
371 accessible through a component ("tsd") in the object tag. But this
372 is no longer the case, so we cache it for each inferior. */
f37b313d 373 struct type *tsd_type = nullptr;
3eecfa55
JB
374
375 /* The exception_support_info data. This data is used to determine
376 how to implement support for Ada exception catchpoints in a given
377 inferior. */
f37b313d 378 const struct exception_support_info *exception_info = nullptr;
e802dbe0
JB
379};
380
381/* Our key to this module's inferior data. */
f37b313d 382static const struct inferior_key<ada_inferior_data> ada_inferior_data;
e802dbe0
JB
383
384/* Return our inferior data for the given inferior (INF).
385
386 This function always returns a valid pointer to an allocated
387 ada_inferior_data structure. If INF's inferior data has not
388 been previously set, this functions creates a new one with all
389 fields set to zero, sets INF's inferior to it, and then returns
390 a pointer to that newly allocated ada_inferior_data. */
391
392static struct ada_inferior_data *
393get_ada_inferior_data (struct inferior *inf)
394{
395 struct ada_inferior_data *data;
396
f37b313d 397 data = ada_inferior_data.get (inf);
e802dbe0 398 if (data == NULL)
f37b313d 399 data = ada_inferior_data.emplace (inf);
e802dbe0
JB
400
401 return data;
402}
403
404/* Perform all necessary cleanups regarding our module's inferior data
405 that is required after the inferior INF just exited. */
406
407static void
408ada_inferior_exit (struct inferior *inf)
409{
f37b313d 410 ada_inferior_data.clear (inf);
e802dbe0
JB
411}
412
ee01b665
JB
413
414 /* program-space-specific data. */
415
416/* This module's per-program-space data. */
417struct ada_pspace_data
418{
f37b313d
TT
419 ~ada_pspace_data ()
420 {
421 if (sym_cache != NULL)
422 ada_free_symbol_cache (sym_cache);
423 }
424
ee01b665 425 /* The Ada symbol cache. */
f37b313d 426 struct ada_symbol_cache *sym_cache = nullptr;
ee01b665
JB
427};
428
429/* Key to our per-program-space data. */
f37b313d 430static const struct program_space_key<ada_pspace_data> ada_pspace_data_handle;
ee01b665
JB
431
432/* Return this module's data for the given program space (PSPACE).
433 If not is found, add a zero'ed one now.
434
435 This function always returns a valid object. */
436
437static struct ada_pspace_data *
438get_ada_pspace_data (struct program_space *pspace)
439{
440 struct ada_pspace_data *data;
441
f37b313d 442 data = ada_pspace_data_handle.get (pspace);
ee01b665 443 if (data == NULL)
f37b313d 444 data = ada_pspace_data_handle.emplace (pspace);
ee01b665
JB
445
446 return data;
447}
448
4c4b4cd2
PH
449 /* Utilities */
450
720d1a40 451/* If TYPE is a TYPE_CODE_TYPEDEF type, return the target type after
eed9788b 452 all typedef layers have been peeled. Otherwise, return TYPE.
720d1a40
JB
453
454 Normally, we really expect a typedef type to only have 1 typedef layer.
455 In other words, we really expect the target type of a typedef type to be
456 a non-typedef type. This is particularly true for Ada units, because
457 the language does not have a typedef vs not-typedef distinction.
458 In that respect, the Ada compiler has been trying to eliminate as many
459 typedef definitions in the debugging information, since they generally
460 do not bring any extra information (we still use typedef under certain
461 circumstances related mostly to the GNAT encoding).
462
463 Unfortunately, we have seen situations where the debugging information
464 generated by the compiler leads to such multiple typedef layers. For
465 instance, consider the following example with stabs:
466
467 .stabs "pck__float_array___XUP:Tt(0,46)=s16P_ARRAY:(0,47)=[...]"[...]
468 .stabs "pck__float_array___XUP:t(0,36)=(0,46)",128,0,6,0
469
470 This is an error in the debugging information which causes type
471 pck__float_array___XUP to be defined twice, and the second time,
472 it is defined as a typedef of a typedef.
473
474 This is on the fringe of legality as far as debugging information is
475 concerned, and certainly unexpected. But it is easy to handle these
476 situations correctly, so we can afford to be lenient in this case. */
477
478static struct type *
479ada_typedef_target_type (struct type *type)
480{
481 while (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
482 type = TYPE_TARGET_TYPE (type);
483 return type;
484}
485
41d27058
JB
486/* Given DECODED_NAME a string holding a symbol name in its
487 decoded form (ie using the Ada dotted notation), returns
488 its unqualified name. */
489
490static const char *
491ada_unqualified_name (const char *decoded_name)
492{
2b0f535a
JB
493 const char *result;
494
495 /* If the decoded name starts with '<', it means that the encoded
496 name does not follow standard naming conventions, and thus that
497 it is not your typical Ada symbol name. Trying to unqualify it
498 is therefore pointless and possibly erroneous. */
499 if (decoded_name[0] == '<')
500 return decoded_name;
501
502 result = strrchr (decoded_name, '.');
41d27058
JB
503 if (result != NULL)
504 result++; /* Skip the dot... */
505 else
506 result = decoded_name;
507
508 return result;
509}
510
39e7af3e 511/* Return a string starting with '<', followed by STR, and '>'. */
41d27058 512
39e7af3e 513static std::string
41d27058
JB
514add_angle_brackets (const char *str)
515{
39e7af3e 516 return string_printf ("<%s>", str);
41d27058 517}
96d887e8 518
67cb5b2d 519static const char *
4c4b4cd2
PH
520ada_get_gdb_completer_word_break_characters (void)
521{
522 return ada_completer_word_break_characters;
523}
524
e79af960
JB
525/* Print an array element index using the Ada syntax. */
526
527static void
528ada_print_array_index (struct value *index_value, struct ui_file *stream,
79a45b7d 529 const struct value_print_options *options)
e79af960 530{
79a45b7d 531 LA_VALUE_PRINT (index_value, stream, options);
e79af960
JB
532 fprintf_filtered (stream, " => ");
533}
534
e2b7af72
JB
535/* la_watch_location_expression for Ada. */
536
537gdb::unique_xmalloc_ptr<char>
538ada_watch_location_expression (struct type *type, CORE_ADDR addr)
539{
540 type = check_typedef (TYPE_TARGET_TYPE (check_typedef (type)));
541 std::string name = type_to_string (type);
542 return gdb::unique_xmalloc_ptr<char>
543 (xstrprintf ("{%s} %s", name.c_str (), core_addr_to_string (addr)));
544}
545
f27cf670 546/* Assuming VECT points to an array of *SIZE objects of size
14f9c5c9 547 ELEMENT_SIZE, grow it to contain at least MIN_SIZE objects,
f27cf670 548 updating *SIZE as necessary and returning the (new) array. */
14f9c5c9 549
f27cf670
AS
550void *
551grow_vect (void *vect, size_t *size, size_t min_size, int element_size)
14f9c5c9 552{
d2e4a39e
AS
553 if (*size < min_size)
554 {
555 *size *= 2;
556 if (*size < min_size)
4c4b4cd2 557 *size = min_size;
f27cf670 558 vect = xrealloc (vect, *size * element_size);
d2e4a39e 559 }
f27cf670 560 return vect;
14f9c5c9
AS
561}
562
563/* True (non-zero) iff TARGET matches FIELD_NAME up to any trailing
4c4b4cd2 564 suffix of FIELD_NAME beginning "___". */
14f9c5c9
AS
565
566static int
ebf56fd3 567field_name_match (const char *field_name, const char *target)
14f9c5c9
AS
568{
569 int len = strlen (target);
5b4ee69b 570
d2e4a39e 571 return
4c4b4cd2
PH
572 (strncmp (field_name, target, len) == 0
573 && (field_name[len] == '\0'
61012eef 574 || (startswith (field_name + len, "___")
76a01679
JB
575 && strcmp (field_name + strlen (field_name) - 6,
576 "___XVN") != 0)));
14f9c5c9
AS
577}
578
579
872c8b51
JB
580/* Assuming TYPE is a TYPE_CODE_STRUCT or a TYPE_CODE_TYPDEF to
581 a TYPE_CODE_STRUCT, find the field whose name matches FIELD_NAME,
582 and return its index. This function also handles fields whose name
583 have ___ suffixes because the compiler sometimes alters their name
584 by adding such a suffix to represent fields with certain constraints.
585 If the field could not be found, return a negative number if
586 MAYBE_MISSING is set. Otherwise raise an error. */
4c4b4cd2
PH
587
588int
589ada_get_field_index (const struct type *type, const char *field_name,
590 int maybe_missing)
591{
592 int fieldno;
872c8b51
JB
593 struct type *struct_type = check_typedef ((struct type *) type);
594
595 for (fieldno = 0; fieldno < TYPE_NFIELDS (struct_type); fieldno++)
596 if (field_name_match (TYPE_FIELD_NAME (struct_type, fieldno), field_name))
4c4b4cd2
PH
597 return fieldno;
598
599 if (!maybe_missing)
323e0a4a 600 error (_("Unable to find field %s in struct %s. Aborting"),
872c8b51 601 field_name, TYPE_NAME (struct_type));
4c4b4cd2
PH
602
603 return -1;
604}
605
606/* The length of the prefix of NAME prior to any "___" suffix. */
14f9c5c9
AS
607
608int
d2e4a39e 609ada_name_prefix_len (const char *name)
14f9c5c9
AS
610{
611 if (name == NULL)
612 return 0;
d2e4a39e 613 else
14f9c5c9 614 {
d2e4a39e 615 const char *p = strstr (name, "___");
5b4ee69b 616
14f9c5c9 617 if (p == NULL)
4c4b4cd2 618 return strlen (name);
14f9c5c9 619 else
4c4b4cd2 620 return p - name;
14f9c5c9
AS
621 }
622}
623
4c4b4cd2
PH
624/* Return non-zero if SUFFIX is a suffix of STR.
625 Return zero if STR is null. */
626
14f9c5c9 627static int
d2e4a39e 628is_suffix (const char *str, const char *suffix)
14f9c5c9
AS
629{
630 int len1, len2;
5b4ee69b 631
14f9c5c9
AS
632 if (str == NULL)
633 return 0;
634 len1 = strlen (str);
635 len2 = strlen (suffix);
4c4b4cd2 636 return (len1 >= len2 && strcmp (str + len1 - len2, suffix) == 0);
14f9c5c9
AS
637}
638
4c4b4cd2
PH
639/* The contents of value VAL, treated as a value of type TYPE. The
640 result is an lval in memory if VAL is. */
14f9c5c9 641
d2e4a39e 642static struct value *
4c4b4cd2 643coerce_unspec_val_to_type (struct value *val, struct type *type)
14f9c5c9 644{
61ee279c 645 type = ada_check_typedef (type);
df407dfe 646 if (value_type (val) == type)
4c4b4cd2 647 return val;
d2e4a39e 648 else
14f9c5c9 649 {
4c4b4cd2
PH
650 struct value *result;
651
652 /* Make sure that the object size is not unreasonable before
653 trying to allocate some memory for it. */
c1b5a1a6 654 ada_ensure_varsize_limit (type);
4c4b4cd2 655
41e8491f
JK
656 if (value_lazy (val)
657 || TYPE_LENGTH (type) > TYPE_LENGTH (value_type (val)))
658 result = allocate_value_lazy (type);
659 else
660 {
661 result = allocate_value (type);
9a0dc9e3 662 value_contents_copy_raw (result, 0, val, 0, TYPE_LENGTH (type));
41e8491f 663 }
74bcbdf3 664 set_value_component_location (result, val);
9bbda503
AC
665 set_value_bitsize (result, value_bitsize (val));
666 set_value_bitpos (result, value_bitpos (val));
c408a94f
TT
667 if (VALUE_LVAL (result) == lval_memory)
668 set_value_address (result, value_address (val));
14f9c5c9
AS
669 return result;
670 }
671}
672
fc1a4b47
AC
673static const gdb_byte *
674cond_offset_host (const gdb_byte *valaddr, long offset)
14f9c5c9
AS
675{
676 if (valaddr == NULL)
677 return NULL;
678 else
679 return valaddr + offset;
680}
681
682static CORE_ADDR
ebf56fd3 683cond_offset_target (CORE_ADDR address, long offset)
14f9c5c9
AS
684{
685 if (address == 0)
686 return 0;
d2e4a39e 687 else
14f9c5c9
AS
688 return address + offset;
689}
690
4c4b4cd2
PH
691/* Issue a warning (as for the definition of warning in utils.c, but
692 with exactly one argument rather than ...), unless the limit on the
693 number of warnings has passed during the evaluation of the current
694 expression. */
a2249542 695
77109804
AC
696/* FIXME: cagney/2004-10-10: This function is mimicking the behavior
697 provided by "complaint". */
a0b31db1 698static void lim_warning (const char *format, ...) ATTRIBUTE_PRINTF (1, 2);
77109804 699
14f9c5c9 700static void
a2249542 701lim_warning (const char *format, ...)
14f9c5c9 702{
a2249542 703 va_list args;
a2249542 704
5b4ee69b 705 va_start (args, format);
4c4b4cd2
PH
706 warnings_issued += 1;
707 if (warnings_issued <= warning_limit)
a2249542
MK
708 vwarning (format, args);
709
710 va_end (args);
4c4b4cd2
PH
711}
712
714e53ab
PH
713/* Issue an error if the size of an object of type T is unreasonable,
714 i.e. if it would be a bad idea to allocate a value of this type in
715 GDB. */
716
c1b5a1a6
JB
717void
718ada_ensure_varsize_limit (const struct type *type)
714e53ab
PH
719{
720 if (TYPE_LENGTH (type) > varsize_limit)
323e0a4a 721 error (_("object size is larger than varsize-limit"));
714e53ab
PH
722}
723
0963b4bd 724/* Maximum value of a SIZE-byte signed integer type. */
4c4b4cd2 725static LONGEST
c3e5cd34 726max_of_size (int size)
4c4b4cd2 727{
76a01679 728 LONGEST top_bit = (LONGEST) 1 << (size * 8 - 2);
5b4ee69b 729
76a01679 730 return top_bit | (top_bit - 1);
4c4b4cd2
PH
731}
732
0963b4bd 733/* Minimum value of a SIZE-byte signed integer type. */
4c4b4cd2 734static LONGEST
c3e5cd34 735min_of_size (int size)
4c4b4cd2 736{
c3e5cd34 737 return -max_of_size (size) - 1;
4c4b4cd2
PH
738}
739
0963b4bd 740/* Maximum value of a SIZE-byte unsigned integer type. */
4c4b4cd2 741static ULONGEST
c3e5cd34 742umax_of_size (int size)
4c4b4cd2 743{
76a01679 744 ULONGEST top_bit = (ULONGEST) 1 << (size * 8 - 1);
5b4ee69b 745
76a01679 746 return top_bit | (top_bit - 1);
4c4b4cd2
PH
747}
748
0963b4bd 749/* Maximum value of integral type T, as a signed quantity. */
c3e5cd34
PH
750static LONGEST
751max_of_type (struct type *t)
4c4b4cd2 752{
c3e5cd34
PH
753 if (TYPE_UNSIGNED (t))
754 return (LONGEST) umax_of_size (TYPE_LENGTH (t));
755 else
756 return max_of_size (TYPE_LENGTH (t));
757}
758
0963b4bd 759/* Minimum value of integral type T, as a signed quantity. */
c3e5cd34
PH
760static LONGEST
761min_of_type (struct type *t)
762{
763 if (TYPE_UNSIGNED (t))
764 return 0;
765 else
766 return min_of_size (TYPE_LENGTH (t));
4c4b4cd2
PH
767}
768
769/* The largest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
770LONGEST
771ada_discrete_type_high_bound (struct type *type)
4c4b4cd2 772{
c3345124 773 type = resolve_dynamic_type (type, NULL, 0);
76a01679 774 switch (TYPE_CODE (type))
4c4b4cd2
PH
775 {
776 case TYPE_CODE_RANGE:
690cc4eb 777 return TYPE_HIGH_BOUND (type);
4c4b4cd2 778 case TYPE_CODE_ENUM:
14e75d8e 779 return TYPE_FIELD_ENUMVAL (type, TYPE_NFIELDS (type) - 1);
690cc4eb
PH
780 case TYPE_CODE_BOOL:
781 return 1;
782 case TYPE_CODE_CHAR:
76a01679 783 case TYPE_CODE_INT:
690cc4eb 784 return max_of_type (type);
4c4b4cd2 785 default:
43bbcdc2 786 error (_("Unexpected type in ada_discrete_type_high_bound."));
4c4b4cd2
PH
787 }
788}
789
14e75d8e 790/* The smallest value in the domain of TYPE, a discrete type, as an integer. */
43bbcdc2
PH
791LONGEST
792ada_discrete_type_low_bound (struct type *type)
4c4b4cd2 793{
c3345124 794 type = resolve_dynamic_type (type, NULL, 0);
76a01679 795 switch (TYPE_CODE (type))
4c4b4cd2
PH
796 {
797 case TYPE_CODE_RANGE:
690cc4eb 798 return TYPE_LOW_BOUND (type);
4c4b4cd2 799 case TYPE_CODE_ENUM:
14e75d8e 800 return TYPE_FIELD_ENUMVAL (type, 0);
690cc4eb
PH
801 case TYPE_CODE_BOOL:
802 return 0;
803 case TYPE_CODE_CHAR:
76a01679 804 case TYPE_CODE_INT:
690cc4eb 805 return min_of_type (type);
4c4b4cd2 806 default:
43bbcdc2 807 error (_("Unexpected type in ada_discrete_type_low_bound."));
4c4b4cd2
PH
808 }
809}
810
811/* The identity on non-range types. For range types, the underlying
76a01679 812 non-range scalar type. */
4c4b4cd2
PH
813
814static struct type *
18af8284 815get_base_type (struct type *type)
4c4b4cd2
PH
816{
817 while (type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE)
818 {
76a01679
JB
819 if (type == TYPE_TARGET_TYPE (type) || TYPE_TARGET_TYPE (type) == NULL)
820 return type;
4c4b4cd2
PH
821 type = TYPE_TARGET_TYPE (type);
822 }
823 return type;
14f9c5c9 824}
41246937
JB
825
826/* Return a decoded version of the given VALUE. This means returning
827 a value whose type is obtained by applying all the GNAT-specific
828 encondings, making the resulting type a static but standard description
829 of the initial type. */
830
831struct value *
832ada_get_decoded_value (struct value *value)
833{
834 struct type *type = ada_check_typedef (value_type (value));
835
836 if (ada_is_array_descriptor_type (type)
837 || (ada_is_constrained_packed_array_type (type)
838 && TYPE_CODE (type) != TYPE_CODE_PTR))
839 {
840 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF) /* array access type. */
841 value = ada_coerce_to_simple_array_ptr (value);
842 else
843 value = ada_coerce_to_simple_array (value);
844 }
845 else
846 value = ada_to_fixed_value (value);
847
848 return value;
849}
850
851/* Same as ada_get_decoded_value, but with the given TYPE.
852 Because there is no associated actual value for this type,
853 the resulting type might be a best-effort approximation in
854 the case of dynamic types. */
855
856struct type *
857ada_get_decoded_type (struct type *type)
858{
859 type = to_static_fixed_type (type);
860 if (ada_is_constrained_packed_array_type (type))
861 type = ada_coerce_to_simple_array_type (type);
862 return type;
863}
864
4c4b4cd2 865\f
76a01679 866
4c4b4cd2 867 /* Language Selection */
14f9c5c9
AS
868
869/* If the main program is in Ada, return language_ada, otherwise return LANG
ccefe4c4 870 (the main program is in Ada iif the adainit symbol is found). */
d2e4a39e 871
14f9c5c9 872enum language
ccefe4c4 873ada_update_initial_language (enum language lang)
14f9c5c9 874{
cafb3438 875 if (lookup_minimal_symbol ("adainit", NULL, NULL).minsym != NULL)
4c4b4cd2 876 return language_ada;
14f9c5c9
AS
877
878 return lang;
879}
96d887e8
PH
880
881/* If the main procedure is written in Ada, then return its name.
882 The result is good until the next call. Return NULL if the main
883 procedure doesn't appear to be in Ada. */
884
885char *
886ada_main_name (void)
887{
3b7344d5 888 struct bound_minimal_symbol msym;
e83e4e24 889 static gdb::unique_xmalloc_ptr<char> main_program_name;
6c038f32 890
96d887e8
PH
891 /* For Ada, the name of the main procedure is stored in a specific
892 string constant, generated by the binder. Look for that symbol,
893 extract its address, and then read that string. If we didn't find
894 that string, then most probably the main procedure is not written
895 in Ada. */
896 msym = lookup_minimal_symbol (ADA_MAIN_PROGRAM_SYMBOL_NAME, NULL, NULL);
897
3b7344d5 898 if (msym.minsym != NULL)
96d887e8 899 {
f9bc20b9
JB
900 CORE_ADDR main_program_name_addr;
901 int err_code;
902
77e371c0 903 main_program_name_addr = BMSYMBOL_VALUE_ADDRESS (msym);
96d887e8 904 if (main_program_name_addr == 0)
323e0a4a 905 error (_("Invalid address for Ada main program name."));
96d887e8 906
f9bc20b9
JB
907 target_read_string (main_program_name_addr, &main_program_name,
908 1024, &err_code);
909
910 if (err_code != 0)
911 return NULL;
e83e4e24 912 return main_program_name.get ();
96d887e8
PH
913 }
914
915 /* The main procedure doesn't seem to be in Ada. */
916 return NULL;
917}
14f9c5c9 918\f
4c4b4cd2 919 /* Symbols */
d2e4a39e 920
4c4b4cd2
PH
921/* Table of Ada operators and their GNAT-encoded names. Last entry is pair
922 of NULLs. */
14f9c5c9 923
d2e4a39e
AS
924const struct ada_opname_map ada_opname_table[] = {
925 {"Oadd", "\"+\"", BINOP_ADD},
926 {"Osubtract", "\"-\"", BINOP_SUB},
927 {"Omultiply", "\"*\"", BINOP_MUL},
928 {"Odivide", "\"/\"", BINOP_DIV},
929 {"Omod", "\"mod\"", BINOP_MOD},
930 {"Orem", "\"rem\"", BINOP_REM},
931 {"Oexpon", "\"**\"", BINOP_EXP},
932 {"Olt", "\"<\"", BINOP_LESS},
933 {"Ole", "\"<=\"", BINOP_LEQ},
934 {"Ogt", "\">\"", BINOP_GTR},
935 {"Oge", "\">=\"", BINOP_GEQ},
936 {"Oeq", "\"=\"", BINOP_EQUAL},
937 {"One", "\"/=\"", BINOP_NOTEQUAL},
938 {"Oand", "\"and\"", BINOP_BITWISE_AND},
939 {"Oor", "\"or\"", BINOP_BITWISE_IOR},
940 {"Oxor", "\"xor\"", BINOP_BITWISE_XOR},
941 {"Oconcat", "\"&\"", BINOP_CONCAT},
942 {"Oabs", "\"abs\"", UNOP_ABS},
943 {"Onot", "\"not\"", UNOP_LOGICAL_NOT},
944 {"Oadd", "\"+\"", UNOP_PLUS},
945 {"Osubtract", "\"-\"", UNOP_NEG},
946 {NULL, NULL}
14f9c5c9
AS
947};
948
b5ec771e
PA
949/* The "encoded" form of DECODED, according to GNAT conventions. The
950 result is valid until the next call to ada_encode. If
951 THROW_ERRORS, throw an error if invalid operator name is found.
952 Otherwise, return NULL in that case. */
4c4b4cd2 953
b5ec771e
PA
954static char *
955ada_encode_1 (const char *decoded, bool throw_errors)
14f9c5c9 956{
4c4b4cd2
PH
957 static char *encoding_buffer = NULL;
958 static size_t encoding_buffer_size = 0;
d2e4a39e 959 const char *p;
14f9c5c9 960 int k;
d2e4a39e 961
4c4b4cd2 962 if (decoded == NULL)
14f9c5c9
AS
963 return NULL;
964
4c4b4cd2
PH
965 GROW_VECT (encoding_buffer, encoding_buffer_size,
966 2 * strlen (decoded) + 10);
14f9c5c9
AS
967
968 k = 0;
4c4b4cd2 969 for (p = decoded; *p != '\0'; p += 1)
14f9c5c9 970 {
cdc7bb92 971 if (*p == '.')
4c4b4cd2
PH
972 {
973 encoding_buffer[k] = encoding_buffer[k + 1] = '_';
974 k += 2;
975 }
14f9c5c9 976 else if (*p == '"')
4c4b4cd2
PH
977 {
978 const struct ada_opname_map *mapping;
979
980 for (mapping = ada_opname_table;
1265e4aa 981 mapping->encoded != NULL
61012eef 982 && !startswith (p, mapping->decoded); mapping += 1)
4c4b4cd2
PH
983 ;
984 if (mapping->encoded == NULL)
b5ec771e
PA
985 {
986 if (throw_errors)
987 error (_("invalid Ada operator name: %s"), p);
988 else
989 return NULL;
990 }
4c4b4cd2
PH
991 strcpy (encoding_buffer + k, mapping->encoded);
992 k += strlen (mapping->encoded);
993 break;
994 }
d2e4a39e 995 else
4c4b4cd2
PH
996 {
997 encoding_buffer[k] = *p;
998 k += 1;
999 }
14f9c5c9
AS
1000 }
1001
4c4b4cd2
PH
1002 encoding_buffer[k] = '\0';
1003 return encoding_buffer;
14f9c5c9
AS
1004}
1005
b5ec771e
PA
1006/* The "encoded" form of DECODED, according to GNAT conventions.
1007 The result is valid until the next call to ada_encode. */
1008
1009char *
1010ada_encode (const char *decoded)
1011{
1012 return ada_encode_1 (decoded, true);
1013}
1014
14f9c5c9 1015/* Return NAME folded to lower case, or, if surrounded by single
4c4b4cd2
PH
1016 quotes, unfolded, but with the quotes stripped away. Result good
1017 to next call. */
1018
d2e4a39e
AS
1019char *
1020ada_fold_name (const char *name)
14f9c5c9 1021{
d2e4a39e 1022 static char *fold_buffer = NULL;
14f9c5c9
AS
1023 static size_t fold_buffer_size = 0;
1024
1025 int len = strlen (name);
d2e4a39e 1026 GROW_VECT (fold_buffer, fold_buffer_size, len + 1);
14f9c5c9
AS
1027
1028 if (name[0] == '\'')
1029 {
d2e4a39e
AS
1030 strncpy (fold_buffer, name + 1, len - 2);
1031 fold_buffer[len - 2] = '\000';
14f9c5c9
AS
1032 }
1033 else
1034 {
1035 int i;
5b4ee69b 1036
14f9c5c9 1037 for (i = 0; i <= len; i += 1)
4c4b4cd2 1038 fold_buffer[i] = tolower (name[i]);
14f9c5c9
AS
1039 }
1040
1041 return fold_buffer;
1042}
1043
529cad9c
PH
1044/* Return nonzero if C is either a digit or a lowercase alphabet character. */
1045
1046static int
1047is_lower_alphanum (const char c)
1048{
1049 return (isdigit (c) || (isalpha (c) && islower (c)));
1050}
1051
c90092fe
JB
1052/* ENCODED is the linkage name of a symbol and LEN contains its length.
1053 This function saves in LEN the length of that same symbol name but
1054 without either of these suffixes:
29480c32
JB
1055 . .{DIGIT}+
1056 . ${DIGIT}+
1057 . ___{DIGIT}+
1058 . __{DIGIT}+.
c90092fe 1059
29480c32
JB
1060 These are suffixes introduced by the compiler for entities such as
1061 nested subprogram for instance, in order to avoid name clashes.
1062 They do not serve any purpose for the debugger. */
1063
1064static void
1065ada_remove_trailing_digits (const char *encoded, int *len)
1066{
1067 if (*len > 1 && isdigit (encoded[*len - 1]))
1068 {
1069 int i = *len - 2;
5b4ee69b 1070
29480c32
JB
1071 while (i > 0 && isdigit (encoded[i]))
1072 i--;
1073 if (i >= 0 && encoded[i] == '.')
1074 *len = i;
1075 else if (i >= 0 && encoded[i] == '$')
1076 *len = i;
61012eef 1077 else if (i >= 2 && startswith (encoded + i - 2, "___"))
29480c32 1078 *len = i - 2;
61012eef 1079 else if (i >= 1 && startswith (encoded + i - 1, "__"))
29480c32
JB
1080 *len = i - 1;
1081 }
1082}
1083
1084/* Remove the suffix introduced by the compiler for protected object
1085 subprograms. */
1086
1087static void
1088ada_remove_po_subprogram_suffix (const char *encoded, int *len)
1089{
1090 /* Remove trailing N. */
1091
1092 /* Protected entry subprograms are broken into two
1093 separate subprograms: The first one is unprotected, and has
1094 a 'N' suffix; the second is the protected version, and has
0963b4bd 1095 the 'P' suffix. The second calls the first one after handling
29480c32
JB
1096 the protection. Since the P subprograms are internally generated,
1097 we leave these names undecoded, giving the user a clue that this
1098 entity is internal. */
1099
1100 if (*len > 1
1101 && encoded[*len - 1] == 'N'
1102 && (isdigit (encoded[*len - 2]) || islower (encoded[*len - 2])))
1103 *len = *len - 1;
1104}
1105
1106/* If ENCODED follows the GNAT entity encoding conventions, then return
1107 the decoded form of ENCODED. Otherwise, return "<%s>" where "%s" is
1108 replaced by ENCODED.
14f9c5c9 1109
4c4b4cd2 1110 The resulting string is valid until the next call of ada_decode.
29480c32 1111 If the string is unchanged by decoding, the original string pointer
4c4b4cd2
PH
1112 is returned. */
1113
1114const char *
1115ada_decode (const char *encoded)
14f9c5c9
AS
1116{
1117 int i, j;
1118 int len0;
d2e4a39e 1119 const char *p;
4c4b4cd2 1120 char *decoded;
14f9c5c9 1121 int at_start_name;
4c4b4cd2
PH
1122 static char *decoding_buffer = NULL;
1123 static size_t decoding_buffer_size = 0;
d2e4a39e 1124
0d81f350
JG
1125 /* With function descriptors on PPC64, the value of a symbol named
1126 ".FN", if it exists, is the entry point of the function "FN". */
1127 if (encoded[0] == '.')
1128 encoded += 1;
1129
29480c32
JB
1130 /* The name of the Ada main procedure starts with "_ada_".
1131 This prefix is not part of the decoded name, so skip this part
1132 if we see this prefix. */
61012eef 1133 if (startswith (encoded, "_ada_"))
4c4b4cd2 1134 encoded += 5;
14f9c5c9 1135
29480c32
JB
1136 /* If the name starts with '_', then it is not a properly encoded
1137 name, so do not attempt to decode it. Similarly, if the name
1138 starts with '<', the name should not be decoded. */
4c4b4cd2 1139 if (encoded[0] == '_' || encoded[0] == '<')
14f9c5c9
AS
1140 goto Suppress;
1141
4c4b4cd2 1142 len0 = strlen (encoded);
4c4b4cd2 1143
29480c32
JB
1144 ada_remove_trailing_digits (encoded, &len0);
1145 ada_remove_po_subprogram_suffix (encoded, &len0);
529cad9c 1146
4c4b4cd2
PH
1147 /* Remove the ___X.* suffix if present. Do not forget to verify that
1148 the suffix is located before the current "end" of ENCODED. We want
1149 to avoid re-matching parts of ENCODED that have previously been
1150 marked as discarded (by decrementing LEN0). */
1151 p = strstr (encoded, "___");
1152 if (p != NULL && p - encoded < len0 - 3)
14f9c5c9
AS
1153 {
1154 if (p[3] == 'X')
4c4b4cd2 1155 len0 = p - encoded;
14f9c5c9 1156 else
4c4b4cd2 1157 goto Suppress;
14f9c5c9 1158 }
4c4b4cd2 1159
29480c32
JB
1160 /* Remove any trailing TKB suffix. It tells us that this symbol
1161 is for the body of a task, but that information does not actually
1162 appear in the decoded name. */
1163
61012eef 1164 if (len0 > 3 && startswith (encoded + len0 - 3, "TKB"))
14f9c5c9 1165 len0 -= 3;
76a01679 1166
a10967fa
JB
1167 /* Remove any trailing TB suffix. The TB suffix is slightly different
1168 from the TKB suffix because it is used for non-anonymous task
1169 bodies. */
1170
61012eef 1171 if (len0 > 2 && startswith (encoded + len0 - 2, "TB"))
a10967fa
JB
1172 len0 -= 2;
1173
29480c32
JB
1174 /* Remove trailing "B" suffixes. */
1175 /* FIXME: brobecker/2006-04-19: Not sure what this are used for... */
1176
61012eef 1177 if (len0 > 1 && startswith (encoded + len0 - 1, "B"))
14f9c5c9
AS
1178 len0 -= 1;
1179
4c4b4cd2 1180 /* Make decoded big enough for possible expansion by operator name. */
29480c32 1181
4c4b4cd2
PH
1182 GROW_VECT (decoding_buffer, decoding_buffer_size, 2 * len0 + 1);
1183 decoded = decoding_buffer;
14f9c5c9 1184
29480c32
JB
1185 /* Remove trailing __{digit}+ or trailing ${digit}+. */
1186
4c4b4cd2 1187 if (len0 > 1 && isdigit (encoded[len0 - 1]))
d2e4a39e 1188 {
4c4b4cd2
PH
1189 i = len0 - 2;
1190 while ((i >= 0 && isdigit (encoded[i]))
1191 || (i >= 1 && encoded[i] == '_' && isdigit (encoded[i - 1])))
1192 i -= 1;
1193 if (i > 1 && encoded[i] == '_' && encoded[i - 1] == '_')
1194 len0 = i - 1;
1195 else if (encoded[i] == '$')
1196 len0 = i;
d2e4a39e 1197 }
14f9c5c9 1198
29480c32
JB
1199 /* The first few characters that are not alphabetic are not part
1200 of any encoding we use, so we can copy them over verbatim. */
1201
4c4b4cd2
PH
1202 for (i = 0, j = 0; i < len0 && !isalpha (encoded[i]); i += 1, j += 1)
1203 decoded[j] = encoded[i];
14f9c5c9
AS
1204
1205 at_start_name = 1;
1206 while (i < len0)
1207 {
29480c32 1208 /* Is this a symbol function? */
4c4b4cd2
PH
1209 if (at_start_name && encoded[i] == 'O')
1210 {
1211 int k;
5b4ee69b 1212
4c4b4cd2
PH
1213 for (k = 0; ada_opname_table[k].encoded != NULL; k += 1)
1214 {
1215 int op_len = strlen (ada_opname_table[k].encoded);
06d5cf63
JB
1216 if ((strncmp (ada_opname_table[k].encoded + 1, encoded + i + 1,
1217 op_len - 1) == 0)
1218 && !isalnum (encoded[i + op_len]))
4c4b4cd2
PH
1219 {
1220 strcpy (decoded + j, ada_opname_table[k].decoded);
1221 at_start_name = 0;
1222 i += op_len;
1223 j += strlen (ada_opname_table[k].decoded);
1224 break;
1225 }
1226 }
1227 if (ada_opname_table[k].encoded != NULL)
1228 continue;
1229 }
14f9c5c9
AS
1230 at_start_name = 0;
1231
529cad9c
PH
1232 /* Replace "TK__" with "__", which will eventually be translated
1233 into "." (just below). */
1234
61012eef 1235 if (i < len0 - 4 && startswith (encoded + i, "TK__"))
4c4b4cd2 1236 i += 2;
529cad9c 1237
29480c32
JB
1238 /* Replace "__B_{DIGITS}+__" sequences by "__", which will eventually
1239 be translated into "." (just below). These are internal names
1240 generated for anonymous blocks inside which our symbol is nested. */
1241
1242 if (len0 - i > 5 && encoded [i] == '_' && encoded [i+1] == '_'
1243 && encoded [i+2] == 'B' && encoded [i+3] == '_'
1244 && isdigit (encoded [i+4]))
1245 {
1246 int k = i + 5;
1247
1248 while (k < len0 && isdigit (encoded[k]))
1249 k++; /* Skip any extra digit. */
1250
1251 /* Double-check that the "__B_{DIGITS}+" sequence we found
1252 is indeed followed by "__". */
1253 if (len0 - k > 2 && encoded [k] == '_' && encoded [k+1] == '_')
1254 i = k;
1255 }
1256
529cad9c
PH
1257 /* Remove _E{DIGITS}+[sb] */
1258
1259 /* Just as for protected object subprograms, there are 2 categories
0963b4bd 1260 of subprograms created by the compiler for each entry. The first
529cad9c
PH
1261 one implements the actual entry code, and has a suffix following
1262 the convention above; the second one implements the barrier and
1263 uses the same convention as above, except that the 'E' is replaced
1264 by a 'B'.
1265
1266 Just as above, we do not decode the name of barrier functions
1267 to give the user a clue that the code he is debugging has been
1268 internally generated. */
1269
1270 if (len0 - i > 3 && encoded [i] == '_' && encoded[i+1] == 'E'
1271 && isdigit (encoded[i+2]))
1272 {
1273 int k = i + 3;
1274
1275 while (k < len0 && isdigit (encoded[k]))
1276 k++;
1277
1278 if (k < len0
1279 && (encoded[k] == 'b' || encoded[k] == 's'))
1280 {
1281 k++;
1282 /* Just as an extra precaution, make sure that if this
1283 suffix is followed by anything else, it is a '_'.
1284 Otherwise, we matched this sequence by accident. */
1285 if (k == len0
1286 || (k < len0 && encoded[k] == '_'))
1287 i = k;
1288 }
1289 }
1290
1291 /* Remove trailing "N" in [a-z0-9]+N__. The N is added by
1292 the GNAT front-end in protected object subprograms. */
1293
1294 if (i < len0 + 3
1295 && encoded[i] == 'N' && encoded[i+1] == '_' && encoded[i+2] == '_')
1296 {
1297 /* Backtrack a bit up until we reach either the begining of
1298 the encoded name, or "__". Make sure that we only find
1299 digits or lowercase characters. */
1300 const char *ptr = encoded + i - 1;
1301
1302 while (ptr >= encoded && is_lower_alphanum (ptr[0]))
1303 ptr--;
1304 if (ptr < encoded
1305 || (ptr > encoded && ptr[0] == '_' && ptr[-1] == '_'))
1306 i++;
1307 }
1308
4c4b4cd2
PH
1309 if (encoded[i] == 'X' && i != 0 && isalnum (encoded[i - 1]))
1310 {
29480c32
JB
1311 /* This is a X[bn]* sequence not separated from the previous
1312 part of the name with a non-alpha-numeric character (in other
1313 words, immediately following an alpha-numeric character), then
1314 verify that it is placed at the end of the encoded name. If
1315 not, then the encoding is not valid and we should abort the
1316 decoding. Otherwise, just skip it, it is used in body-nested
1317 package names. */
4c4b4cd2
PH
1318 do
1319 i += 1;
1320 while (i < len0 && (encoded[i] == 'b' || encoded[i] == 'n'));
1321 if (i < len0)
1322 goto Suppress;
1323 }
cdc7bb92 1324 else if (i < len0 - 2 && encoded[i] == '_' && encoded[i + 1] == '_')
4c4b4cd2 1325 {
29480c32 1326 /* Replace '__' by '.'. */
4c4b4cd2
PH
1327 decoded[j] = '.';
1328 at_start_name = 1;
1329 i += 2;
1330 j += 1;
1331 }
14f9c5c9 1332 else
4c4b4cd2 1333 {
29480c32
JB
1334 /* It's a character part of the decoded name, so just copy it
1335 over. */
4c4b4cd2
PH
1336 decoded[j] = encoded[i];
1337 i += 1;
1338 j += 1;
1339 }
14f9c5c9 1340 }
4c4b4cd2 1341 decoded[j] = '\000';
14f9c5c9 1342
29480c32
JB
1343 /* Decoded names should never contain any uppercase character.
1344 Double-check this, and abort the decoding if we find one. */
1345
4c4b4cd2
PH
1346 for (i = 0; decoded[i] != '\0'; i += 1)
1347 if (isupper (decoded[i]) || decoded[i] == ' ')
14f9c5c9
AS
1348 goto Suppress;
1349
4c4b4cd2
PH
1350 if (strcmp (decoded, encoded) == 0)
1351 return encoded;
1352 else
1353 return decoded;
14f9c5c9
AS
1354
1355Suppress:
4c4b4cd2
PH
1356 GROW_VECT (decoding_buffer, decoding_buffer_size, strlen (encoded) + 3);
1357 decoded = decoding_buffer;
1358 if (encoded[0] == '<')
1359 strcpy (decoded, encoded);
14f9c5c9 1360 else
88c15c34 1361 xsnprintf (decoded, decoding_buffer_size, "<%s>", encoded);
4c4b4cd2
PH
1362 return decoded;
1363
1364}
1365
1366/* Table for keeping permanent unique copies of decoded names. Once
1367 allocated, names in this table are never released. While this is a
1368 storage leak, it should not be significant unless there are massive
1369 changes in the set of decoded names in successive versions of a
1370 symbol table loaded during a single session. */
1371static struct htab *decoded_names_store;
1372
1373/* Returns the decoded name of GSYMBOL, as for ada_decode, caching it
1374 in the language-specific part of GSYMBOL, if it has not been
1375 previously computed. Tries to save the decoded name in the same
1376 obstack as GSYMBOL, if possible, and otherwise on the heap (so that,
1377 in any case, the decoded symbol has a lifetime at least that of
0963b4bd 1378 GSYMBOL).
4c4b4cd2
PH
1379 The GSYMBOL parameter is "mutable" in the C++ sense: logically
1380 const, but nevertheless modified to a semantically equivalent form
0963b4bd 1381 when a decoded name is cached in it. */
4c4b4cd2 1382
45e6c716 1383const char *
f85f34ed 1384ada_decode_symbol (const struct general_symbol_info *arg)
4c4b4cd2 1385{
f85f34ed
TT
1386 struct general_symbol_info *gsymbol = (struct general_symbol_info *) arg;
1387 const char **resultp =
615b3f62 1388 &gsymbol->language_specific.demangled_name;
5b4ee69b 1389
f85f34ed 1390 if (!gsymbol->ada_mangled)
4c4b4cd2
PH
1391 {
1392 const char *decoded = ada_decode (gsymbol->name);
f85f34ed 1393 struct obstack *obstack = gsymbol->language_specific.obstack;
5b4ee69b 1394
f85f34ed 1395 gsymbol->ada_mangled = 1;
5b4ee69b 1396
f85f34ed 1397 if (obstack != NULL)
224c3ddb
SM
1398 *resultp
1399 = (const char *) obstack_copy0 (obstack, decoded, strlen (decoded));
f85f34ed 1400 else
76a01679 1401 {
f85f34ed
TT
1402 /* Sometimes, we can't find a corresponding objfile, in
1403 which case, we put the result on the heap. Since we only
1404 decode when needed, we hope this usually does not cause a
1405 significant memory leak (FIXME). */
1406
76a01679
JB
1407 char **slot = (char **) htab_find_slot (decoded_names_store,
1408 decoded, INSERT);
5b4ee69b 1409
76a01679
JB
1410 if (*slot == NULL)
1411 *slot = xstrdup (decoded);
1412 *resultp = *slot;
1413 }
4c4b4cd2 1414 }
14f9c5c9 1415
4c4b4cd2
PH
1416 return *resultp;
1417}
76a01679 1418
2c0b251b 1419static char *
76a01679 1420ada_la_decode (const char *encoded, int options)
4c4b4cd2
PH
1421{
1422 return xstrdup (ada_decode (encoded));
14f9c5c9
AS
1423}
1424
8b302db8
TT
1425/* Implement la_sniff_from_mangled_name for Ada. */
1426
1427static int
1428ada_sniff_from_mangled_name (const char *mangled, char **out)
1429{
1430 const char *demangled = ada_decode (mangled);
1431
1432 *out = NULL;
1433
1434 if (demangled != mangled && demangled != NULL && demangled[0] != '<')
1435 {
1436 /* Set the gsymbol language to Ada, but still return 0.
1437 Two reasons for that:
1438
1439 1. For Ada, we prefer computing the symbol's decoded name
1440 on the fly rather than pre-compute it, in order to save
1441 memory (Ada projects are typically very large).
1442
1443 2. There are some areas in the definition of the GNAT
1444 encoding where, with a bit of bad luck, we might be able
1445 to decode a non-Ada symbol, generating an incorrect
1446 demangled name (Eg: names ending with "TB" for instance
1447 are identified as task bodies and so stripped from
1448 the decoded name returned).
1449
1450 Returning 1, here, but not setting *DEMANGLED, helps us get a
1451 little bit of the best of both worlds. Because we're last,
1452 we should not affect any of the other languages that were
1453 able to demangle the symbol before us; we get to correctly
1454 tag Ada symbols as such; and even if we incorrectly tagged a
1455 non-Ada symbol, which should be rare, any routing through the
1456 Ada language should be transparent (Ada tries to behave much
1457 like C/C++ with non-Ada symbols). */
1458 return 1;
1459 }
1460
1461 return 0;
1462}
1463
14f9c5c9 1464\f
d2e4a39e 1465
4c4b4cd2 1466 /* Arrays */
14f9c5c9 1467
28c85d6c
JB
1468/* Assuming that INDEX_DESC_TYPE is an ___XA structure, a structure
1469 generated by the GNAT compiler to describe the index type used
1470 for each dimension of an array, check whether it follows the latest
1471 known encoding. If not, fix it up to conform to the latest encoding.
1472 Otherwise, do nothing. This function also does nothing if
1473 INDEX_DESC_TYPE is NULL.
1474
1475 The GNAT encoding used to describle the array index type evolved a bit.
1476 Initially, the information would be provided through the name of each
1477 field of the structure type only, while the type of these fields was
1478 described as unspecified and irrelevant. The debugger was then expected
1479 to perform a global type lookup using the name of that field in order
1480 to get access to the full index type description. Because these global
1481 lookups can be very expensive, the encoding was later enhanced to make
1482 the global lookup unnecessary by defining the field type as being
1483 the full index type description.
1484
1485 The purpose of this routine is to allow us to support older versions
1486 of the compiler by detecting the use of the older encoding, and by
1487 fixing up the INDEX_DESC_TYPE to follow the new one (at this point,
1488 we essentially replace each field's meaningless type by the associated
1489 index subtype). */
1490
1491void
1492ada_fixup_array_indexes_type (struct type *index_desc_type)
1493{
1494 int i;
1495
1496 if (index_desc_type == NULL)
1497 return;
1498 gdb_assert (TYPE_NFIELDS (index_desc_type) > 0);
1499
1500 /* Check if INDEX_DESC_TYPE follows the older encoding (it is sufficient
1501 to check one field only, no need to check them all). If not, return
1502 now.
1503
1504 If our INDEX_DESC_TYPE was generated using the older encoding,
1505 the field type should be a meaningless integer type whose name
1506 is not equal to the field name. */
1507 if (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)) != NULL
1508 && strcmp (TYPE_NAME (TYPE_FIELD_TYPE (index_desc_type, 0)),
1509 TYPE_FIELD_NAME (index_desc_type, 0)) == 0)
1510 return;
1511
1512 /* Fixup each field of INDEX_DESC_TYPE. */
1513 for (i = 0; i < TYPE_NFIELDS (index_desc_type); i++)
1514 {
0d5cff50 1515 const char *name = TYPE_FIELD_NAME (index_desc_type, i);
28c85d6c
JB
1516 struct type *raw_type = ada_check_typedef (ada_find_any_type (name));
1517
1518 if (raw_type)
1519 TYPE_FIELD_TYPE (index_desc_type, i) = raw_type;
1520 }
1521}
1522
4c4b4cd2 1523/* Names of MAX_ADA_DIMENS bounds in P_BOUNDS fields of array descriptors. */
14f9c5c9 1524
a121b7c1 1525static const char *bound_name[] = {
d2e4a39e 1526 "LB0", "UB0", "LB1", "UB1", "LB2", "UB2", "LB3", "UB3",
14f9c5c9
AS
1527 "LB4", "UB4", "LB5", "UB5", "LB6", "UB6", "LB7", "UB7"
1528};
1529
1530/* Maximum number of array dimensions we are prepared to handle. */
1531
4c4b4cd2 1532#define MAX_ADA_DIMENS (sizeof(bound_name) / (2*sizeof(char *)))
14f9c5c9 1533
14f9c5c9 1534
4c4b4cd2
PH
1535/* The desc_* routines return primitive portions of array descriptors
1536 (fat pointers). */
14f9c5c9
AS
1537
1538/* The descriptor or array type, if any, indicated by TYPE; removes
4c4b4cd2
PH
1539 level of indirection, if needed. */
1540
d2e4a39e
AS
1541static struct type *
1542desc_base_type (struct type *type)
14f9c5c9
AS
1543{
1544 if (type == NULL)
1545 return NULL;
61ee279c 1546 type = ada_check_typedef (type);
720d1a40
JB
1547 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
1548 type = ada_typedef_target_type (type);
1549
1265e4aa
JB
1550 if (type != NULL
1551 && (TYPE_CODE (type) == TYPE_CODE_PTR
1552 || TYPE_CODE (type) == TYPE_CODE_REF))
61ee279c 1553 return ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9
AS
1554 else
1555 return type;
1556}
1557
4c4b4cd2
PH
1558/* True iff TYPE indicates a "thin" array pointer type. */
1559
14f9c5c9 1560static int
d2e4a39e 1561is_thin_pntr (struct type *type)
14f9c5c9 1562{
d2e4a39e 1563 return
14f9c5c9
AS
1564 is_suffix (ada_type_name (desc_base_type (type)), "___XUT")
1565 || is_suffix (ada_type_name (desc_base_type (type)), "___XUT___XVE");
1566}
1567
4c4b4cd2
PH
1568/* The descriptor type for thin pointer type TYPE. */
1569
d2e4a39e
AS
1570static struct type *
1571thin_descriptor_type (struct type *type)
14f9c5c9 1572{
d2e4a39e 1573 struct type *base_type = desc_base_type (type);
5b4ee69b 1574
14f9c5c9
AS
1575 if (base_type == NULL)
1576 return NULL;
1577 if (is_suffix (ada_type_name (base_type), "___XVE"))
1578 return base_type;
d2e4a39e 1579 else
14f9c5c9 1580 {
d2e4a39e 1581 struct type *alt_type = ada_find_parallel_type (base_type, "___XVE");
5b4ee69b 1582
14f9c5c9 1583 if (alt_type == NULL)
4c4b4cd2 1584 return base_type;
14f9c5c9 1585 else
4c4b4cd2 1586 return alt_type;
14f9c5c9
AS
1587 }
1588}
1589
4c4b4cd2
PH
1590/* A pointer to the array data for thin-pointer value VAL. */
1591
d2e4a39e
AS
1592static struct value *
1593thin_data_pntr (struct value *val)
14f9c5c9 1594{
828292f2 1595 struct type *type = ada_check_typedef (value_type (val));
556bdfd4 1596 struct type *data_type = desc_data_target_type (thin_descriptor_type (type));
5b4ee69b 1597
556bdfd4
UW
1598 data_type = lookup_pointer_type (data_type);
1599
14f9c5c9 1600 if (TYPE_CODE (type) == TYPE_CODE_PTR)
556bdfd4 1601 return value_cast (data_type, value_copy (val));
d2e4a39e 1602 else
42ae5230 1603 return value_from_longest (data_type, value_address (val));
14f9c5c9
AS
1604}
1605
4c4b4cd2
PH
1606/* True iff TYPE indicates a "thick" array pointer type. */
1607
14f9c5c9 1608static int
d2e4a39e 1609is_thick_pntr (struct type *type)
14f9c5c9
AS
1610{
1611 type = desc_base_type (type);
1612 return (type != NULL && TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2 1613 && lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL);
14f9c5c9
AS
1614}
1615
4c4b4cd2
PH
1616/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
1617 pointer to one, the type of its bounds data; otherwise, NULL. */
76a01679 1618
d2e4a39e
AS
1619static struct type *
1620desc_bounds_type (struct type *type)
14f9c5c9 1621{
d2e4a39e 1622 struct type *r;
14f9c5c9
AS
1623
1624 type = desc_base_type (type);
1625
1626 if (type == NULL)
1627 return NULL;
1628 else if (is_thin_pntr (type))
1629 {
1630 type = thin_descriptor_type (type);
1631 if (type == NULL)
4c4b4cd2 1632 return NULL;
14f9c5c9
AS
1633 r = lookup_struct_elt_type (type, "BOUNDS", 1);
1634 if (r != NULL)
61ee279c 1635 return ada_check_typedef (r);
14f9c5c9
AS
1636 }
1637 else if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
1638 {
1639 r = lookup_struct_elt_type (type, "P_BOUNDS", 1);
1640 if (r != NULL)
61ee279c 1641 return ada_check_typedef (TYPE_TARGET_TYPE (ada_check_typedef (r)));
14f9c5c9
AS
1642 }
1643 return NULL;
1644}
1645
1646/* If ARR is an array descriptor (fat or thin pointer), or pointer to
4c4b4cd2
PH
1647 one, a pointer to its bounds data. Otherwise NULL. */
1648
d2e4a39e
AS
1649static struct value *
1650desc_bounds (struct value *arr)
14f9c5c9 1651{
df407dfe 1652 struct type *type = ada_check_typedef (value_type (arr));
5b4ee69b 1653
d2e4a39e 1654 if (is_thin_pntr (type))
14f9c5c9 1655 {
d2e4a39e 1656 struct type *bounds_type =
4c4b4cd2 1657 desc_bounds_type (thin_descriptor_type (type));
14f9c5c9
AS
1658 LONGEST addr;
1659
4cdfadb1 1660 if (bounds_type == NULL)
323e0a4a 1661 error (_("Bad GNAT array descriptor"));
14f9c5c9
AS
1662
1663 /* NOTE: The following calculation is not really kosher, but
d2e4a39e 1664 since desc_type is an XVE-encoded type (and shouldn't be),
4c4b4cd2 1665 the correct calculation is a real pain. FIXME (and fix GCC). */
14f9c5c9 1666 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4c4b4cd2 1667 addr = value_as_long (arr);
d2e4a39e 1668 else
42ae5230 1669 addr = value_address (arr);
14f9c5c9 1670
d2e4a39e 1671 return
4c4b4cd2
PH
1672 value_from_longest (lookup_pointer_type (bounds_type),
1673 addr - TYPE_LENGTH (bounds_type));
14f9c5c9
AS
1674 }
1675
1676 else if (is_thick_pntr (type))
05e522ef
JB
1677 {
1678 struct value *p_bounds = value_struct_elt (&arr, NULL, "P_BOUNDS", NULL,
1679 _("Bad GNAT array descriptor"));
1680 struct type *p_bounds_type = value_type (p_bounds);
1681
1682 if (p_bounds_type
1683 && TYPE_CODE (p_bounds_type) == TYPE_CODE_PTR)
1684 {
1685 struct type *target_type = TYPE_TARGET_TYPE (p_bounds_type);
1686
1687 if (TYPE_STUB (target_type))
1688 p_bounds = value_cast (lookup_pointer_type
1689 (ada_check_typedef (target_type)),
1690 p_bounds);
1691 }
1692 else
1693 error (_("Bad GNAT array descriptor"));
1694
1695 return p_bounds;
1696 }
14f9c5c9
AS
1697 else
1698 return NULL;
1699}
1700
4c4b4cd2
PH
1701/* If TYPE is the type of an array-descriptor (fat pointer), the bit
1702 position of the field containing the address of the bounds data. */
1703
14f9c5c9 1704static int
d2e4a39e 1705fat_pntr_bounds_bitpos (struct type *type)
14f9c5c9
AS
1706{
1707 return TYPE_FIELD_BITPOS (desc_base_type (type), 1);
1708}
1709
1710/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1711 size of the field containing the address of the bounds data. */
1712
14f9c5c9 1713static int
d2e4a39e 1714fat_pntr_bounds_bitsize (struct type *type)
14f9c5c9
AS
1715{
1716 type = desc_base_type (type);
1717
d2e4a39e 1718 if (TYPE_FIELD_BITSIZE (type, 1) > 0)
14f9c5c9
AS
1719 return TYPE_FIELD_BITSIZE (type, 1);
1720 else
61ee279c 1721 return 8 * TYPE_LENGTH (ada_check_typedef (TYPE_FIELD_TYPE (type, 1)));
14f9c5c9
AS
1722}
1723
4c4b4cd2 1724/* If TYPE is the type of an array descriptor (fat or thin pointer) or a
556bdfd4
UW
1725 pointer to one, the type of its array data (a array-with-no-bounds type);
1726 otherwise, NULL. Use ada_type_of_array to get an array type with bounds
1727 data. */
4c4b4cd2 1728
d2e4a39e 1729static struct type *
556bdfd4 1730desc_data_target_type (struct type *type)
14f9c5c9
AS
1731{
1732 type = desc_base_type (type);
1733
4c4b4cd2 1734 /* NOTE: The following is bogus; see comment in desc_bounds. */
14f9c5c9 1735 if (is_thin_pntr (type))
556bdfd4 1736 return desc_base_type (TYPE_FIELD_TYPE (thin_descriptor_type (type), 1));
14f9c5c9 1737 else if (is_thick_pntr (type))
556bdfd4
UW
1738 {
1739 struct type *data_type = lookup_struct_elt_type (type, "P_ARRAY", 1);
1740
1741 if (data_type
1742 && TYPE_CODE (ada_check_typedef (data_type)) == TYPE_CODE_PTR)
05e522ef 1743 return ada_check_typedef (TYPE_TARGET_TYPE (data_type));
556bdfd4
UW
1744 }
1745
1746 return NULL;
14f9c5c9
AS
1747}
1748
1749/* If ARR is an array descriptor (fat or thin pointer), a pointer to
1750 its array data. */
4c4b4cd2 1751
d2e4a39e
AS
1752static struct value *
1753desc_data (struct value *arr)
14f9c5c9 1754{
df407dfe 1755 struct type *type = value_type (arr);
5b4ee69b 1756
14f9c5c9
AS
1757 if (is_thin_pntr (type))
1758 return thin_data_pntr (arr);
1759 else if (is_thick_pntr (type))
d2e4a39e 1760 return value_struct_elt (&arr, NULL, "P_ARRAY", NULL,
323e0a4a 1761 _("Bad GNAT array descriptor"));
14f9c5c9
AS
1762 else
1763 return NULL;
1764}
1765
1766
1767/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1768 position of the field containing the address of the data. */
1769
14f9c5c9 1770static int
d2e4a39e 1771fat_pntr_data_bitpos (struct type *type)
14f9c5c9
AS
1772{
1773 return TYPE_FIELD_BITPOS (desc_base_type (type), 0);
1774}
1775
1776/* If TYPE is the type of an array-descriptor (fat pointer), the bit
4c4b4cd2
PH
1777 size of the field containing the address of the data. */
1778
14f9c5c9 1779static int
d2e4a39e 1780fat_pntr_data_bitsize (struct type *type)
14f9c5c9
AS
1781{
1782 type = desc_base_type (type);
1783
1784 if (TYPE_FIELD_BITSIZE (type, 0) > 0)
1785 return TYPE_FIELD_BITSIZE (type, 0);
d2e4a39e 1786 else
14f9c5c9
AS
1787 return TARGET_CHAR_BIT * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 0));
1788}
1789
4c4b4cd2 1790/* If BOUNDS is an array-bounds structure (or pointer to one), return
14f9c5c9 1791 the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1792 bound, if WHICH is 1. The first bound is I=1. */
1793
d2e4a39e
AS
1794static struct value *
1795desc_one_bound (struct value *bounds, int i, int which)
14f9c5c9 1796{
d2e4a39e 1797 return value_struct_elt (&bounds, NULL, bound_name[2 * i + which - 2], NULL,
323e0a4a 1798 _("Bad GNAT array descriptor bounds"));
14f9c5c9
AS
1799}
1800
1801/* If BOUNDS is an array-bounds structure type, return the bit position
1802 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1803 bound, if WHICH is 1. The first bound is I=1. */
1804
14f9c5c9 1805static int
d2e4a39e 1806desc_bound_bitpos (struct type *type, int i, int which)
14f9c5c9 1807{
d2e4a39e 1808 return TYPE_FIELD_BITPOS (desc_base_type (type), 2 * i + which - 2);
14f9c5c9
AS
1809}
1810
1811/* If BOUNDS is an array-bounds structure type, return the bit field size
1812 of the Ith lower bound stored in it, if WHICH is 0, and the Ith upper
4c4b4cd2
PH
1813 bound, if WHICH is 1. The first bound is I=1. */
1814
76a01679 1815static int
d2e4a39e 1816desc_bound_bitsize (struct type *type, int i, int which)
14f9c5c9
AS
1817{
1818 type = desc_base_type (type);
1819
d2e4a39e
AS
1820 if (TYPE_FIELD_BITSIZE (type, 2 * i + which - 2) > 0)
1821 return TYPE_FIELD_BITSIZE (type, 2 * i + which - 2);
1822 else
1823 return 8 * TYPE_LENGTH (TYPE_FIELD_TYPE (type, 2 * i + which - 2));
14f9c5c9
AS
1824}
1825
1826/* If TYPE is the type of an array-bounds structure, the type of its
4c4b4cd2
PH
1827 Ith bound (numbering from 1). Otherwise, NULL. */
1828
d2e4a39e
AS
1829static struct type *
1830desc_index_type (struct type *type, int i)
14f9c5c9
AS
1831{
1832 type = desc_base_type (type);
1833
1834 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
d2e4a39e
AS
1835 return lookup_struct_elt_type (type, bound_name[2 * i - 2], 1);
1836 else
14f9c5c9
AS
1837 return NULL;
1838}
1839
4c4b4cd2
PH
1840/* The number of index positions in the array-bounds type TYPE.
1841 Return 0 if TYPE is NULL. */
1842
14f9c5c9 1843static int
d2e4a39e 1844desc_arity (struct type *type)
14f9c5c9
AS
1845{
1846 type = desc_base_type (type);
1847
1848 if (type != NULL)
1849 return TYPE_NFIELDS (type) / 2;
1850 return 0;
1851}
1852
4c4b4cd2
PH
1853/* Non-zero iff TYPE is a simple array type (not a pointer to one) or
1854 an array descriptor type (representing an unconstrained array
1855 type). */
1856
76a01679
JB
1857static int
1858ada_is_direct_array_type (struct type *type)
4c4b4cd2
PH
1859{
1860 if (type == NULL)
1861 return 0;
61ee279c 1862 type = ada_check_typedef (type);
4c4b4cd2 1863 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
76a01679 1864 || ada_is_array_descriptor_type (type));
4c4b4cd2
PH
1865}
1866
52ce6436 1867/* Non-zero iff TYPE represents any kind of array in Ada, or a pointer
0963b4bd 1868 * to one. */
52ce6436 1869
2c0b251b 1870static int
52ce6436
PH
1871ada_is_array_type (struct type *type)
1872{
1873 while (type != NULL
1874 && (TYPE_CODE (type) == TYPE_CODE_PTR
1875 || TYPE_CODE (type) == TYPE_CODE_REF))
1876 type = TYPE_TARGET_TYPE (type);
1877 return ada_is_direct_array_type (type);
1878}
1879
4c4b4cd2 1880/* Non-zero iff TYPE is a simple array type or pointer to one. */
14f9c5c9 1881
14f9c5c9 1882int
4c4b4cd2 1883ada_is_simple_array_type (struct type *type)
14f9c5c9
AS
1884{
1885 if (type == NULL)
1886 return 0;
61ee279c 1887 type = ada_check_typedef (type);
14f9c5c9 1888 return (TYPE_CODE (type) == TYPE_CODE_ARRAY
4c4b4cd2 1889 || (TYPE_CODE (type) == TYPE_CODE_PTR
b0dd7688
JB
1890 && TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type)))
1891 == TYPE_CODE_ARRAY));
14f9c5c9
AS
1892}
1893
4c4b4cd2
PH
1894/* Non-zero iff TYPE belongs to a GNAT array descriptor. */
1895
14f9c5c9 1896int
4c4b4cd2 1897ada_is_array_descriptor_type (struct type *type)
14f9c5c9 1898{
556bdfd4 1899 struct type *data_type = desc_data_target_type (type);
14f9c5c9
AS
1900
1901 if (type == NULL)
1902 return 0;
61ee279c 1903 type = ada_check_typedef (type);
556bdfd4
UW
1904 return (data_type != NULL
1905 && TYPE_CODE (data_type) == TYPE_CODE_ARRAY
1906 && desc_arity (desc_bounds_type (type)) > 0);
14f9c5c9
AS
1907}
1908
1909/* Non-zero iff type is a partially mal-formed GNAT array
4c4b4cd2 1910 descriptor. FIXME: This is to compensate for some problems with
14f9c5c9 1911 debugging output from GNAT. Re-examine periodically to see if it
4c4b4cd2
PH
1912 is still needed. */
1913
14f9c5c9 1914int
ebf56fd3 1915ada_is_bogus_array_descriptor (struct type *type)
14f9c5c9 1916{
d2e4a39e 1917 return
14f9c5c9
AS
1918 type != NULL
1919 && TYPE_CODE (type) == TYPE_CODE_STRUCT
1920 && (lookup_struct_elt_type (type, "P_BOUNDS", 1) != NULL
4c4b4cd2
PH
1921 || lookup_struct_elt_type (type, "P_ARRAY", 1) != NULL)
1922 && !ada_is_array_descriptor_type (type);
14f9c5c9
AS
1923}
1924
1925
4c4b4cd2 1926/* If ARR has a record type in the form of a standard GNAT array descriptor,
14f9c5c9 1927 (fat pointer) returns the type of the array data described---specifically,
4c4b4cd2 1928 a pointer-to-array type. If BOUNDS is non-zero, the bounds data are filled
14f9c5c9 1929 in from the descriptor; otherwise, they are left unspecified. If
4c4b4cd2
PH
1930 the ARR denotes a null array descriptor and BOUNDS is non-zero,
1931 returns NULL. The result is simply the type of ARR if ARR is not
14f9c5c9 1932 a descriptor. */
d2e4a39e
AS
1933struct type *
1934ada_type_of_array (struct value *arr, int bounds)
14f9c5c9 1935{
ad82864c
JB
1936 if (ada_is_constrained_packed_array_type (value_type (arr)))
1937 return decode_constrained_packed_array_type (value_type (arr));
14f9c5c9 1938
df407dfe
AC
1939 if (!ada_is_array_descriptor_type (value_type (arr)))
1940 return value_type (arr);
d2e4a39e
AS
1941
1942 if (!bounds)
ad82864c
JB
1943 {
1944 struct type *array_type =
1945 ada_check_typedef (desc_data_target_type (value_type (arr)));
1946
1947 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
1948 TYPE_FIELD_BITSIZE (array_type, 0) =
1949 decode_packed_array_bitsize (value_type (arr));
1950
1951 return array_type;
1952 }
14f9c5c9
AS
1953 else
1954 {
d2e4a39e 1955 struct type *elt_type;
14f9c5c9 1956 int arity;
d2e4a39e 1957 struct value *descriptor;
14f9c5c9 1958
df407dfe
AC
1959 elt_type = ada_array_element_type (value_type (arr), -1);
1960 arity = ada_array_arity (value_type (arr));
14f9c5c9 1961
d2e4a39e 1962 if (elt_type == NULL || arity == 0)
df407dfe 1963 return ada_check_typedef (value_type (arr));
14f9c5c9
AS
1964
1965 descriptor = desc_bounds (arr);
d2e4a39e 1966 if (value_as_long (descriptor) == 0)
4c4b4cd2 1967 return NULL;
d2e4a39e 1968 while (arity > 0)
4c4b4cd2 1969 {
e9bb382b
UW
1970 struct type *range_type = alloc_type_copy (value_type (arr));
1971 struct type *array_type = alloc_type_copy (value_type (arr));
4c4b4cd2
PH
1972 struct value *low = desc_one_bound (descriptor, arity, 0);
1973 struct value *high = desc_one_bound (descriptor, arity, 1);
4c4b4cd2 1974
5b4ee69b 1975 arity -= 1;
0c9c3474
SA
1976 create_static_range_type (range_type, value_type (low),
1977 longest_to_int (value_as_long (low)),
1978 longest_to_int (value_as_long (high)));
4c4b4cd2 1979 elt_type = create_array_type (array_type, elt_type, range_type);
ad82864c
JB
1980
1981 if (ada_is_unconstrained_packed_array_type (value_type (arr)))
e67ad678
JB
1982 {
1983 /* We need to store the element packed bitsize, as well as
1984 recompute the array size, because it was previously
1985 computed based on the unpacked element size. */
1986 LONGEST lo = value_as_long (low);
1987 LONGEST hi = value_as_long (high);
1988
1989 TYPE_FIELD_BITSIZE (elt_type, 0) =
1990 decode_packed_array_bitsize (value_type (arr));
1991 /* If the array has no element, then the size is already
1992 zero, and does not need to be recomputed. */
1993 if (lo < hi)
1994 {
1995 int array_bitsize =
1996 (hi - lo + 1) * TYPE_FIELD_BITSIZE (elt_type, 0);
1997
1998 TYPE_LENGTH (array_type) = (array_bitsize + 7) / 8;
1999 }
2000 }
4c4b4cd2 2001 }
14f9c5c9
AS
2002
2003 return lookup_pointer_type (elt_type);
2004 }
2005}
2006
2007/* If ARR does not represent an array, returns ARR unchanged.
4c4b4cd2
PH
2008 Otherwise, returns either a standard GDB array with bounds set
2009 appropriately or, if ARR is a non-null fat pointer, a pointer to a standard
2010 GDB array. Returns NULL if ARR is a null fat pointer. */
2011
d2e4a39e
AS
2012struct value *
2013ada_coerce_to_simple_array_ptr (struct value *arr)
14f9c5c9 2014{
df407dfe 2015 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2016 {
d2e4a39e 2017 struct type *arrType = ada_type_of_array (arr, 1);
5b4ee69b 2018
14f9c5c9 2019 if (arrType == NULL)
4c4b4cd2 2020 return NULL;
14f9c5c9
AS
2021 return value_cast (arrType, value_copy (desc_data (arr)));
2022 }
ad82864c
JB
2023 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2024 return decode_constrained_packed_array (arr);
14f9c5c9
AS
2025 else
2026 return arr;
2027}
2028
2029/* If ARR does not represent an array, returns ARR unchanged.
2030 Otherwise, returns a standard GDB array describing ARR (which may
4c4b4cd2
PH
2031 be ARR itself if it already is in the proper form). */
2032
720d1a40 2033struct value *
d2e4a39e 2034ada_coerce_to_simple_array (struct value *arr)
14f9c5c9 2035{
df407dfe 2036 if (ada_is_array_descriptor_type (value_type (arr)))
14f9c5c9 2037 {
d2e4a39e 2038 struct value *arrVal = ada_coerce_to_simple_array_ptr (arr);
5b4ee69b 2039
14f9c5c9 2040 if (arrVal == NULL)
323e0a4a 2041 error (_("Bounds unavailable for null array pointer."));
c1b5a1a6 2042 ada_ensure_varsize_limit (TYPE_TARGET_TYPE (value_type (arrVal)));
14f9c5c9
AS
2043 return value_ind (arrVal);
2044 }
ad82864c
JB
2045 else if (ada_is_constrained_packed_array_type (value_type (arr)))
2046 return decode_constrained_packed_array (arr);
d2e4a39e 2047 else
14f9c5c9
AS
2048 return arr;
2049}
2050
2051/* If TYPE represents a GNAT array type, return it translated to an
2052 ordinary GDB array type (possibly with BITSIZE fields indicating
4c4b4cd2
PH
2053 packing). For other types, is the identity. */
2054
d2e4a39e
AS
2055struct type *
2056ada_coerce_to_simple_array_type (struct type *type)
14f9c5c9 2057{
ad82864c
JB
2058 if (ada_is_constrained_packed_array_type (type))
2059 return decode_constrained_packed_array_type (type);
17280b9f
UW
2060
2061 if (ada_is_array_descriptor_type (type))
556bdfd4 2062 return ada_check_typedef (desc_data_target_type (type));
17280b9f
UW
2063
2064 return type;
14f9c5c9
AS
2065}
2066
4c4b4cd2
PH
2067/* Non-zero iff TYPE represents a standard GNAT packed-array type. */
2068
ad82864c
JB
2069static int
2070ada_is_packed_array_type (struct type *type)
14f9c5c9
AS
2071{
2072 if (type == NULL)
2073 return 0;
4c4b4cd2 2074 type = desc_base_type (type);
61ee279c 2075 type = ada_check_typedef (type);
d2e4a39e 2076 return
14f9c5c9
AS
2077 ada_type_name (type) != NULL
2078 && strstr (ada_type_name (type), "___XP") != NULL;
2079}
2080
ad82864c
JB
2081/* Non-zero iff TYPE represents a standard GNAT constrained
2082 packed-array type. */
2083
2084int
2085ada_is_constrained_packed_array_type (struct type *type)
2086{
2087 return ada_is_packed_array_type (type)
2088 && !ada_is_array_descriptor_type (type);
2089}
2090
2091/* Non-zero iff TYPE represents an array descriptor for a
2092 unconstrained packed-array type. */
2093
2094static int
2095ada_is_unconstrained_packed_array_type (struct type *type)
2096{
2097 return ada_is_packed_array_type (type)
2098 && ada_is_array_descriptor_type (type);
2099}
2100
2101/* Given that TYPE encodes a packed array type (constrained or unconstrained),
2102 return the size of its elements in bits. */
2103
2104static long
2105decode_packed_array_bitsize (struct type *type)
2106{
0d5cff50
DE
2107 const char *raw_name;
2108 const char *tail;
ad82864c
JB
2109 long bits;
2110
720d1a40
JB
2111 /* Access to arrays implemented as fat pointers are encoded as a typedef
2112 of the fat pointer type. We need the name of the fat pointer type
2113 to do the decoding, so strip the typedef layer. */
2114 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
2115 type = ada_typedef_target_type (type);
2116
2117 raw_name = ada_type_name (ada_check_typedef (type));
ad82864c
JB
2118 if (!raw_name)
2119 raw_name = ada_type_name (desc_base_type (type));
2120
2121 if (!raw_name)
2122 return 0;
2123
2124 tail = strstr (raw_name, "___XP");
720d1a40 2125 gdb_assert (tail != NULL);
ad82864c
JB
2126
2127 if (sscanf (tail + sizeof ("___XP") - 1, "%ld", &bits) != 1)
2128 {
2129 lim_warning
2130 (_("could not understand bit size information on packed array"));
2131 return 0;
2132 }
2133
2134 return bits;
2135}
2136
14f9c5c9
AS
2137/* Given that TYPE is a standard GDB array type with all bounds filled
2138 in, and that the element size of its ultimate scalar constituents
2139 (that is, either its elements, or, if it is an array of arrays, its
2140 elements' elements, etc.) is *ELT_BITS, return an identical type,
2141 but with the bit sizes of its elements (and those of any
2142 constituent arrays) recorded in the BITSIZE components of its
4c4b4cd2 2143 TYPE_FIELD_BITSIZE values, and with *ELT_BITS set to its total size
4a46959e
JB
2144 in bits.
2145
2146 Note that, for arrays whose index type has an XA encoding where
2147 a bound references a record discriminant, getting that discriminant,
2148 and therefore the actual value of that bound, is not possible
2149 because none of the given parameters gives us access to the record.
2150 This function assumes that it is OK in the context where it is being
2151 used to return an array whose bounds are still dynamic and where
2152 the length is arbitrary. */
4c4b4cd2 2153
d2e4a39e 2154static struct type *
ad82864c 2155constrained_packed_array_type (struct type *type, long *elt_bits)
14f9c5c9 2156{
d2e4a39e
AS
2157 struct type *new_elt_type;
2158 struct type *new_type;
99b1c762
JB
2159 struct type *index_type_desc;
2160 struct type *index_type;
14f9c5c9
AS
2161 LONGEST low_bound, high_bound;
2162
61ee279c 2163 type = ada_check_typedef (type);
14f9c5c9
AS
2164 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
2165 return type;
2166
99b1c762
JB
2167 index_type_desc = ada_find_parallel_type (type, "___XA");
2168 if (index_type_desc)
2169 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, 0),
2170 NULL);
2171 else
2172 index_type = TYPE_INDEX_TYPE (type);
2173
e9bb382b 2174 new_type = alloc_type_copy (type);
ad82864c
JB
2175 new_elt_type =
2176 constrained_packed_array_type (ada_check_typedef (TYPE_TARGET_TYPE (type)),
2177 elt_bits);
99b1c762 2178 create_array_type (new_type, new_elt_type, index_type);
14f9c5c9
AS
2179 TYPE_FIELD_BITSIZE (new_type, 0) = *elt_bits;
2180 TYPE_NAME (new_type) = ada_type_name (type);
2181
4a46959e
JB
2182 if ((TYPE_CODE (check_typedef (index_type)) == TYPE_CODE_RANGE
2183 && is_dynamic_type (check_typedef (index_type)))
2184 || get_discrete_bounds (index_type, &low_bound, &high_bound) < 0)
14f9c5c9
AS
2185 low_bound = high_bound = 0;
2186 if (high_bound < low_bound)
2187 *elt_bits = TYPE_LENGTH (new_type) = 0;
d2e4a39e 2188 else
14f9c5c9
AS
2189 {
2190 *elt_bits *= (high_bound - low_bound + 1);
d2e4a39e 2191 TYPE_LENGTH (new_type) =
4c4b4cd2 2192 (*elt_bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
14f9c5c9
AS
2193 }
2194
876cecd0 2195 TYPE_FIXED_INSTANCE (new_type) = 1;
14f9c5c9
AS
2196 return new_type;
2197}
2198
ad82864c
JB
2199/* The array type encoded by TYPE, where
2200 ada_is_constrained_packed_array_type (TYPE). */
4c4b4cd2 2201
d2e4a39e 2202static struct type *
ad82864c 2203decode_constrained_packed_array_type (struct type *type)
d2e4a39e 2204{
0d5cff50 2205 const char *raw_name = ada_type_name (ada_check_typedef (type));
727e3d2e 2206 char *name;
0d5cff50 2207 const char *tail;
d2e4a39e 2208 struct type *shadow_type;
14f9c5c9 2209 long bits;
14f9c5c9 2210
727e3d2e
JB
2211 if (!raw_name)
2212 raw_name = ada_type_name (desc_base_type (type));
2213
2214 if (!raw_name)
2215 return NULL;
2216
2217 name = (char *) alloca (strlen (raw_name) + 1);
2218 tail = strstr (raw_name, "___XP");
4c4b4cd2
PH
2219 type = desc_base_type (type);
2220
14f9c5c9
AS
2221 memcpy (name, raw_name, tail - raw_name);
2222 name[tail - raw_name] = '\000';
2223
b4ba55a1
JB
2224 shadow_type = ada_find_parallel_type_with_name (type, name);
2225
2226 if (shadow_type == NULL)
14f9c5c9 2227 {
323e0a4a 2228 lim_warning (_("could not find bounds information on packed array"));
14f9c5c9
AS
2229 return NULL;
2230 }
f168693b 2231 shadow_type = check_typedef (shadow_type);
14f9c5c9
AS
2232
2233 if (TYPE_CODE (shadow_type) != TYPE_CODE_ARRAY)
2234 {
0963b4bd
MS
2235 lim_warning (_("could not understand bounds "
2236 "information on packed array"));
14f9c5c9
AS
2237 return NULL;
2238 }
d2e4a39e 2239
ad82864c
JB
2240 bits = decode_packed_array_bitsize (type);
2241 return constrained_packed_array_type (shadow_type, &bits);
14f9c5c9
AS
2242}
2243
ad82864c
JB
2244/* Given that ARR is a struct value *indicating a GNAT constrained packed
2245 array, returns a simple array that denotes that array. Its type is a
14f9c5c9
AS
2246 standard GDB array type except that the BITSIZEs of the array
2247 target types are set to the number of bits in each element, and the
4c4b4cd2 2248 type length is set appropriately. */
14f9c5c9 2249
d2e4a39e 2250static struct value *
ad82864c 2251decode_constrained_packed_array (struct value *arr)
14f9c5c9 2252{
4c4b4cd2 2253 struct type *type;
14f9c5c9 2254
11aa919a
PMR
2255 /* If our value is a pointer, then dereference it. Likewise if
2256 the value is a reference. Make sure that this operation does not
2257 cause the target type to be fixed, as this would indirectly cause
2258 this array to be decoded. The rest of the routine assumes that
2259 the array hasn't been decoded yet, so we use the basic "coerce_ref"
2260 and "value_ind" routines to perform the dereferencing, as opposed
2261 to using "ada_coerce_ref" or "ada_value_ind". */
2262 arr = coerce_ref (arr);
828292f2 2263 if (TYPE_CODE (ada_check_typedef (value_type (arr))) == TYPE_CODE_PTR)
284614f0 2264 arr = value_ind (arr);
4c4b4cd2 2265
ad82864c 2266 type = decode_constrained_packed_array_type (value_type (arr));
14f9c5c9
AS
2267 if (type == NULL)
2268 {
323e0a4a 2269 error (_("can't unpack array"));
14f9c5c9
AS
2270 return NULL;
2271 }
61ee279c 2272
50810684 2273 if (gdbarch_bits_big_endian (get_type_arch (value_type (arr)))
32c9a795 2274 && ada_is_modular_type (value_type (arr)))
61ee279c
PH
2275 {
2276 /* This is a (right-justified) modular type representing a packed
2277 array with no wrapper. In order to interpret the value through
2278 the (left-justified) packed array type we just built, we must
2279 first left-justify it. */
2280 int bit_size, bit_pos;
2281 ULONGEST mod;
2282
df407dfe 2283 mod = ada_modulus (value_type (arr)) - 1;
61ee279c
PH
2284 bit_size = 0;
2285 while (mod > 0)
2286 {
2287 bit_size += 1;
2288 mod >>= 1;
2289 }
df407dfe 2290 bit_pos = HOST_CHAR_BIT * TYPE_LENGTH (value_type (arr)) - bit_size;
61ee279c
PH
2291 arr = ada_value_primitive_packed_val (arr, NULL,
2292 bit_pos / HOST_CHAR_BIT,
2293 bit_pos % HOST_CHAR_BIT,
2294 bit_size,
2295 type);
2296 }
2297
4c4b4cd2 2298 return coerce_unspec_val_to_type (arr, type);
14f9c5c9
AS
2299}
2300
2301
2302/* The value of the element of packed array ARR at the ARITY indices
4c4b4cd2 2303 given in IND. ARR must be a simple array. */
14f9c5c9 2304
d2e4a39e
AS
2305static struct value *
2306value_subscript_packed (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2307{
2308 int i;
2309 int bits, elt_off, bit_off;
2310 long elt_total_bit_offset;
d2e4a39e
AS
2311 struct type *elt_type;
2312 struct value *v;
14f9c5c9
AS
2313
2314 bits = 0;
2315 elt_total_bit_offset = 0;
df407dfe 2316 elt_type = ada_check_typedef (value_type (arr));
d2e4a39e 2317 for (i = 0; i < arity; i += 1)
14f9c5c9 2318 {
d2e4a39e 2319 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY
4c4b4cd2
PH
2320 || TYPE_FIELD_BITSIZE (elt_type, 0) == 0)
2321 error
0963b4bd
MS
2322 (_("attempt to do packed indexing of "
2323 "something other than a packed array"));
14f9c5c9 2324 else
4c4b4cd2
PH
2325 {
2326 struct type *range_type = TYPE_INDEX_TYPE (elt_type);
2327 LONGEST lowerbound, upperbound;
2328 LONGEST idx;
2329
2330 if (get_discrete_bounds (range_type, &lowerbound, &upperbound) < 0)
2331 {
323e0a4a 2332 lim_warning (_("don't know bounds of array"));
4c4b4cd2
PH
2333 lowerbound = upperbound = 0;
2334 }
2335
3cb382c9 2336 idx = pos_atr (ind[i]);
4c4b4cd2 2337 if (idx < lowerbound || idx > upperbound)
0963b4bd
MS
2338 lim_warning (_("packed array index %ld out of bounds"),
2339 (long) idx);
4c4b4cd2
PH
2340 bits = TYPE_FIELD_BITSIZE (elt_type, 0);
2341 elt_total_bit_offset += (idx - lowerbound) * bits;
61ee279c 2342 elt_type = ada_check_typedef (TYPE_TARGET_TYPE (elt_type));
4c4b4cd2 2343 }
14f9c5c9
AS
2344 }
2345 elt_off = elt_total_bit_offset / HOST_CHAR_BIT;
2346 bit_off = elt_total_bit_offset % HOST_CHAR_BIT;
d2e4a39e
AS
2347
2348 v = ada_value_primitive_packed_val (arr, NULL, elt_off, bit_off,
4c4b4cd2 2349 bits, elt_type);
14f9c5c9
AS
2350 return v;
2351}
2352
4c4b4cd2 2353/* Non-zero iff TYPE includes negative integer values. */
14f9c5c9
AS
2354
2355static int
d2e4a39e 2356has_negatives (struct type *type)
14f9c5c9 2357{
d2e4a39e
AS
2358 switch (TYPE_CODE (type))
2359 {
2360 default:
2361 return 0;
2362 case TYPE_CODE_INT:
2363 return !TYPE_UNSIGNED (type);
2364 case TYPE_CODE_RANGE:
2365 return TYPE_LOW_BOUND (type) < 0;
2366 }
14f9c5c9 2367}
d2e4a39e 2368
f93fca70 2369/* With SRC being a buffer containing BIT_SIZE bits of data at BIT_OFFSET,
5b639dea 2370 unpack that data into UNPACKED. UNPACKED_LEN is the size in bytes of
f93fca70 2371 the unpacked buffer.
14f9c5c9 2372
5b639dea
JB
2373 The size of the unpacked buffer (UNPACKED_LEN) is expected to be large
2374 enough to contain at least BIT_OFFSET bits. If not, an error is raised.
2375
f93fca70
JB
2376 IS_BIG_ENDIAN is nonzero if the data is stored in big endian mode,
2377 zero otherwise.
14f9c5c9 2378
f93fca70 2379 IS_SIGNED_TYPE is nonzero if the data corresponds to a signed type.
a1c95e6b 2380
f93fca70
JB
2381 IS_SCALAR is nonzero if the data corresponds to a signed type. */
2382
2383static void
2384ada_unpack_from_contents (const gdb_byte *src, int bit_offset, int bit_size,
2385 gdb_byte *unpacked, int unpacked_len,
2386 int is_big_endian, int is_signed_type,
2387 int is_scalar)
2388{
a1c95e6b
JB
2389 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
2390 int src_idx; /* Index into the source area */
2391 int src_bytes_left; /* Number of source bytes left to process. */
2392 int srcBitsLeft; /* Number of source bits left to move */
2393 int unusedLS; /* Number of bits in next significant
2394 byte of source that are unused */
2395
a1c95e6b
JB
2396 int unpacked_idx; /* Index into the unpacked buffer */
2397 int unpacked_bytes_left; /* Number of bytes left to set in unpacked. */
2398
4c4b4cd2 2399 unsigned long accum; /* Staging area for bits being transferred */
a1c95e6b 2400 int accumSize; /* Number of meaningful bits in accum */
14f9c5c9 2401 unsigned char sign;
a1c95e6b 2402
4c4b4cd2
PH
2403 /* Transmit bytes from least to most significant; delta is the direction
2404 the indices move. */
f93fca70 2405 int delta = is_big_endian ? -1 : 1;
14f9c5c9 2406
5b639dea
JB
2407 /* Make sure that unpacked is large enough to receive the BIT_SIZE
2408 bits from SRC. .*/
2409 if ((bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT > unpacked_len)
2410 error (_("Cannot unpack %d bits into buffer of %d bytes"),
2411 bit_size, unpacked_len);
2412
14f9c5c9 2413 srcBitsLeft = bit_size;
086ca51f 2414 src_bytes_left = src_len;
f93fca70 2415 unpacked_bytes_left = unpacked_len;
14f9c5c9 2416 sign = 0;
f93fca70
JB
2417
2418 if (is_big_endian)
14f9c5c9 2419 {
086ca51f 2420 src_idx = src_len - 1;
f93fca70
JB
2421 if (is_signed_type
2422 && ((src[0] << bit_offset) & (1 << (HOST_CHAR_BIT - 1))))
4c4b4cd2 2423 sign = ~0;
d2e4a39e
AS
2424
2425 unusedLS =
4c4b4cd2
PH
2426 (HOST_CHAR_BIT - (bit_size + bit_offset) % HOST_CHAR_BIT)
2427 % HOST_CHAR_BIT;
14f9c5c9 2428
f93fca70
JB
2429 if (is_scalar)
2430 {
2431 accumSize = 0;
2432 unpacked_idx = unpacked_len - 1;
2433 }
2434 else
2435 {
4c4b4cd2
PH
2436 /* Non-scalar values must be aligned at a byte boundary... */
2437 accumSize =
2438 (HOST_CHAR_BIT - bit_size % HOST_CHAR_BIT) % HOST_CHAR_BIT;
2439 /* ... And are placed at the beginning (most-significant) bytes
2440 of the target. */
086ca51f
JB
2441 unpacked_idx = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT - 1;
2442 unpacked_bytes_left = unpacked_idx + 1;
f93fca70 2443 }
14f9c5c9 2444 }
d2e4a39e 2445 else
14f9c5c9
AS
2446 {
2447 int sign_bit_offset = (bit_size + bit_offset - 1) % 8;
2448
086ca51f 2449 src_idx = unpacked_idx = 0;
14f9c5c9
AS
2450 unusedLS = bit_offset;
2451 accumSize = 0;
2452
f93fca70 2453 if (is_signed_type && (src[src_len - 1] & (1 << sign_bit_offset)))
4c4b4cd2 2454 sign = ~0;
14f9c5c9 2455 }
d2e4a39e 2456
14f9c5c9 2457 accum = 0;
086ca51f 2458 while (src_bytes_left > 0)
14f9c5c9
AS
2459 {
2460 /* Mask for removing bits of the next source byte that are not
4c4b4cd2 2461 part of the value. */
d2e4a39e 2462 unsigned int unusedMSMask =
4c4b4cd2
PH
2463 (1 << (srcBitsLeft >= HOST_CHAR_BIT ? HOST_CHAR_BIT : srcBitsLeft)) -
2464 1;
2465 /* Sign-extend bits for this byte. */
14f9c5c9 2466 unsigned int signMask = sign & ~unusedMSMask;
5b4ee69b 2467
d2e4a39e 2468 accum |=
086ca51f 2469 (((src[src_idx] >> unusedLS) & unusedMSMask) | signMask) << accumSize;
14f9c5c9 2470 accumSize += HOST_CHAR_BIT - unusedLS;
d2e4a39e 2471 if (accumSize >= HOST_CHAR_BIT)
4c4b4cd2 2472 {
db297a65 2473 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
4c4b4cd2
PH
2474 accumSize -= HOST_CHAR_BIT;
2475 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2476 unpacked_bytes_left -= 1;
2477 unpacked_idx += delta;
4c4b4cd2 2478 }
14f9c5c9
AS
2479 srcBitsLeft -= HOST_CHAR_BIT - unusedLS;
2480 unusedLS = 0;
086ca51f
JB
2481 src_bytes_left -= 1;
2482 src_idx += delta;
14f9c5c9 2483 }
086ca51f 2484 while (unpacked_bytes_left > 0)
14f9c5c9
AS
2485 {
2486 accum |= sign << accumSize;
db297a65 2487 unpacked[unpacked_idx] = accum & ~(~0UL << HOST_CHAR_BIT);
14f9c5c9 2488 accumSize -= HOST_CHAR_BIT;
9cd4d857
JB
2489 if (accumSize < 0)
2490 accumSize = 0;
14f9c5c9 2491 accum >>= HOST_CHAR_BIT;
086ca51f
JB
2492 unpacked_bytes_left -= 1;
2493 unpacked_idx += delta;
14f9c5c9 2494 }
f93fca70
JB
2495}
2496
2497/* Create a new value of type TYPE from the contents of OBJ starting
2498 at byte OFFSET, and bit offset BIT_OFFSET within that byte,
2499 proceeding for BIT_SIZE bits. If OBJ is an lval in memory, then
2500 assigning through the result will set the field fetched from.
2501 VALADDR is ignored unless OBJ is NULL, in which case,
2502 VALADDR+OFFSET must address the start of storage containing the
2503 packed value. The value returned in this case is never an lval.
2504 Assumes 0 <= BIT_OFFSET < HOST_CHAR_BIT. */
2505
2506struct value *
2507ada_value_primitive_packed_val (struct value *obj, const gdb_byte *valaddr,
2508 long offset, int bit_offset, int bit_size,
2509 struct type *type)
2510{
2511 struct value *v;
bfb1c796 2512 const gdb_byte *src; /* First byte containing data to unpack */
f93fca70 2513 gdb_byte *unpacked;
220475ed 2514 const int is_scalar = is_scalar_type (type);
d0a9e810 2515 const int is_big_endian = gdbarch_bits_big_endian (get_type_arch (type));
d5722aa2 2516 gdb::byte_vector staging;
f93fca70
JB
2517
2518 type = ada_check_typedef (type);
2519
d0a9e810 2520 if (obj == NULL)
bfb1c796 2521 src = valaddr + offset;
d0a9e810 2522 else
bfb1c796 2523 src = value_contents (obj) + offset;
d0a9e810
JB
2524
2525 if (is_dynamic_type (type))
2526 {
2527 /* The length of TYPE might by dynamic, so we need to resolve
2528 TYPE in order to know its actual size, which we then use
2529 to create the contents buffer of the value we return.
2530 The difficulty is that the data containing our object is
2531 packed, and therefore maybe not at a byte boundary. So, what
2532 we do, is unpack the data into a byte-aligned buffer, and then
2533 use that buffer as our object's value for resolving the type. */
d5722aa2
PA
2534 int staging_len = (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
2535 staging.resize (staging_len);
d0a9e810
JB
2536
2537 ada_unpack_from_contents (src, bit_offset, bit_size,
d5722aa2 2538 staging.data (), staging.size (),
d0a9e810
JB
2539 is_big_endian, has_negatives (type),
2540 is_scalar);
d5722aa2 2541 type = resolve_dynamic_type (type, staging.data (), 0);
0cafa88c
JB
2542 if (TYPE_LENGTH (type) < (bit_size + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT)
2543 {
2544 /* This happens when the length of the object is dynamic,
2545 and is actually smaller than the space reserved for it.
2546 For instance, in an array of variant records, the bit_size
2547 we're given is the array stride, which is constant and
2548 normally equal to the maximum size of its element.
2549 But, in reality, each element only actually spans a portion
2550 of that stride. */
2551 bit_size = TYPE_LENGTH (type) * HOST_CHAR_BIT;
2552 }
d0a9e810
JB
2553 }
2554
f93fca70
JB
2555 if (obj == NULL)
2556 {
2557 v = allocate_value (type);
bfb1c796 2558 src = valaddr + offset;
f93fca70
JB
2559 }
2560 else if (VALUE_LVAL (obj) == lval_memory && value_lazy (obj))
2561 {
0cafa88c 2562 int src_len = (bit_size + bit_offset + HOST_CHAR_BIT - 1) / 8;
bfb1c796 2563 gdb_byte *buf;
0cafa88c 2564
f93fca70 2565 v = value_at (type, value_address (obj) + offset);
bfb1c796
PA
2566 buf = (gdb_byte *) alloca (src_len);
2567 read_memory (value_address (v), buf, src_len);
2568 src = buf;
f93fca70
JB
2569 }
2570 else
2571 {
2572 v = allocate_value (type);
bfb1c796 2573 src = value_contents (obj) + offset;
f93fca70
JB
2574 }
2575
2576 if (obj != NULL)
2577 {
2578 long new_offset = offset;
2579
2580 set_value_component_location (v, obj);
2581 set_value_bitpos (v, bit_offset + value_bitpos (obj));
2582 set_value_bitsize (v, bit_size);
2583 if (value_bitpos (v) >= HOST_CHAR_BIT)
2584 {
2585 ++new_offset;
2586 set_value_bitpos (v, value_bitpos (v) - HOST_CHAR_BIT);
2587 }
2588 set_value_offset (v, new_offset);
2589
2590 /* Also set the parent value. This is needed when trying to
2591 assign a new value (in inferior memory). */
2592 set_value_parent (v, obj);
2593 }
2594 else
2595 set_value_bitsize (v, bit_size);
bfb1c796 2596 unpacked = value_contents_writeable (v);
f93fca70
JB
2597
2598 if (bit_size == 0)
2599 {
2600 memset (unpacked, 0, TYPE_LENGTH (type));
2601 return v;
2602 }
2603
d5722aa2 2604 if (staging.size () == TYPE_LENGTH (type))
f93fca70 2605 {
d0a9e810
JB
2606 /* Small short-cut: If we've unpacked the data into a buffer
2607 of the same size as TYPE's length, then we can reuse that,
2608 instead of doing the unpacking again. */
d5722aa2 2609 memcpy (unpacked, staging.data (), staging.size ());
f93fca70 2610 }
d0a9e810
JB
2611 else
2612 ada_unpack_from_contents (src, bit_offset, bit_size,
2613 unpacked, TYPE_LENGTH (type),
2614 is_big_endian, has_negatives (type), is_scalar);
f93fca70 2615
14f9c5c9
AS
2616 return v;
2617}
d2e4a39e 2618
14f9c5c9
AS
2619/* Store the contents of FROMVAL into the location of TOVAL.
2620 Return a new value with the location of TOVAL and contents of
2621 FROMVAL. Handles assignment into packed fields that have
4c4b4cd2 2622 floating-point or non-scalar types. */
14f9c5c9 2623
d2e4a39e
AS
2624static struct value *
2625ada_value_assign (struct value *toval, struct value *fromval)
14f9c5c9 2626{
df407dfe
AC
2627 struct type *type = value_type (toval);
2628 int bits = value_bitsize (toval);
14f9c5c9 2629
52ce6436
PH
2630 toval = ada_coerce_ref (toval);
2631 fromval = ada_coerce_ref (fromval);
2632
2633 if (ada_is_direct_array_type (value_type (toval)))
2634 toval = ada_coerce_to_simple_array (toval);
2635 if (ada_is_direct_array_type (value_type (fromval)))
2636 fromval = ada_coerce_to_simple_array (fromval);
2637
88e3b34b 2638 if (!deprecated_value_modifiable (toval))
323e0a4a 2639 error (_("Left operand of assignment is not a modifiable lvalue."));
14f9c5c9 2640
d2e4a39e 2641 if (VALUE_LVAL (toval) == lval_memory
14f9c5c9 2642 && bits > 0
d2e4a39e 2643 && (TYPE_CODE (type) == TYPE_CODE_FLT
4c4b4cd2 2644 || TYPE_CODE (type) == TYPE_CODE_STRUCT))
14f9c5c9 2645 {
df407dfe
AC
2646 int len = (value_bitpos (toval)
2647 + bits + HOST_CHAR_BIT - 1) / HOST_CHAR_BIT;
aced2898 2648 int from_size;
224c3ddb 2649 gdb_byte *buffer = (gdb_byte *) alloca (len);
d2e4a39e 2650 struct value *val;
42ae5230 2651 CORE_ADDR to_addr = value_address (toval);
14f9c5c9
AS
2652
2653 if (TYPE_CODE (type) == TYPE_CODE_FLT)
4c4b4cd2 2654 fromval = value_cast (type, fromval);
14f9c5c9 2655
52ce6436 2656 read_memory (to_addr, buffer, len);
aced2898
PH
2657 from_size = value_bitsize (fromval);
2658 if (from_size == 0)
2659 from_size = TYPE_LENGTH (value_type (fromval)) * TARGET_CHAR_BIT;
d48e62f4
TT
2660
2661 const int is_big_endian = gdbarch_bits_big_endian (get_type_arch (type));
2662 ULONGEST from_offset = 0;
2663 if (is_big_endian && is_scalar_type (value_type (fromval)))
2664 from_offset = from_size - bits;
2665 copy_bitwise (buffer, value_bitpos (toval),
2666 value_contents (fromval), from_offset,
2667 bits, is_big_endian);
972daa01 2668 write_memory_with_notification (to_addr, buffer, len);
8cebebb9 2669
14f9c5c9 2670 val = value_copy (toval);
0fd88904 2671 memcpy (value_contents_raw (val), value_contents (fromval),
4c4b4cd2 2672 TYPE_LENGTH (type));
04624583 2673 deprecated_set_value_type (val, type);
d2e4a39e 2674
14f9c5c9
AS
2675 return val;
2676 }
2677
2678 return value_assign (toval, fromval);
2679}
2680
2681
7c512744
JB
2682/* Given that COMPONENT is a memory lvalue that is part of the lvalue
2683 CONTAINER, assign the contents of VAL to COMPONENTS's place in
2684 CONTAINER. Modifies the VALUE_CONTENTS of CONTAINER only, not
2685 COMPONENT, and not the inferior's memory. The current contents
2686 of COMPONENT are ignored.
2687
2688 Although not part of the initial design, this function also works
2689 when CONTAINER and COMPONENT are not_lval's: it works as if CONTAINER
2690 had a null address, and COMPONENT had an address which is equal to
2691 its offset inside CONTAINER. */
2692
52ce6436
PH
2693static void
2694value_assign_to_component (struct value *container, struct value *component,
2695 struct value *val)
2696{
2697 LONGEST offset_in_container =
42ae5230 2698 (LONGEST) (value_address (component) - value_address (container));
7c512744 2699 int bit_offset_in_container =
52ce6436
PH
2700 value_bitpos (component) - value_bitpos (container);
2701 int bits;
7c512744 2702
52ce6436
PH
2703 val = value_cast (value_type (component), val);
2704
2705 if (value_bitsize (component) == 0)
2706 bits = TARGET_CHAR_BIT * TYPE_LENGTH (value_type (component));
2707 else
2708 bits = value_bitsize (component);
2709
50810684 2710 if (gdbarch_bits_big_endian (get_type_arch (value_type (container))))
2a62dfa9
JB
2711 {
2712 int src_offset;
2713
2714 if (is_scalar_type (check_typedef (value_type (component))))
2715 src_offset
2716 = TYPE_LENGTH (value_type (component)) * TARGET_CHAR_BIT - bits;
2717 else
2718 src_offset = 0;
a99bc3d2
JB
2719 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2720 value_bitpos (container) + bit_offset_in_container,
2721 value_contents (val), src_offset, bits, 1);
2a62dfa9 2722 }
52ce6436 2723 else
a99bc3d2
JB
2724 copy_bitwise (value_contents_writeable (container) + offset_in_container,
2725 value_bitpos (container) + bit_offset_in_container,
2726 value_contents (val), 0, bits, 0);
7c512744
JB
2727}
2728
736ade86
XR
2729/* Determine if TYPE is an access to an unconstrained array. */
2730
d91e9ea8 2731bool
736ade86
XR
2732ada_is_access_to_unconstrained_array (struct type *type)
2733{
2734 return (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
2735 && is_thick_pntr (ada_typedef_target_type (type)));
2736}
2737
4c4b4cd2
PH
2738/* The value of the element of array ARR at the ARITY indices given in IND.
2739 ARR may be either a simple array, GNAT array descriptor, or pointer
14f9c5c9
AS
2740 thereto. */
2741
d2e4a39e
AS
2742struct value *
2743ada_value_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2744{
2745 int k;
d2e4a39e
AS
2746 struct value *elt;
2747 struct type *elt_type;
14f9c5c9
AS
2748
2749 elt = ada_coerce_to_simple_array (arr);
2750
df407dfe 2751 elt_type = ada_check_typedef (value_type (elt));
d2e4a39e 2752 if (TYPE_CODE (elt_type) == TYPE_CODE_ARRAY
14f9c5c9
AS
2753 && TYPE_FIELD_BITSIZE (elt_type, 0) > 0)
2754 return value_subscript_packed (elt, arity, ind);
2755
2756 for (k = 0; k < arity; k += 1)
2757 {
b9c50e9a
XR
2758 struct type *saved_elt_type = TYPE_TARGET_TYPE (elt_type);
2759
14f9c5c9 2760 if (TYPE_CODE (elt_type) != TYPE_CODE_ARRAY)
323e0a4a 2761 error (_("too many subscripts (%d expected)"), k);
b9c50e9a 2762
2497b498 2763 elt = value_subscript (elt, pos_atr (ind[k]));
b9c50e9a
XR
2764
2765 if (ada_is_access_to_unconstrained_array (saved_elt_type)
2766 && TYPE_CODE (value_type (elt)) != TYPE_CODE_TYPEDEF)
2767 {
2768 /* The element is a typedef to an unconstrained array,
2769 except that the value_subscript call stripped the
2770 typedef layer. The typedef layer is GNAT's way to
2771 specify that the element is, at the source level, an
2772 access to the unconstrained array, rather than the
2773 unconstrained array. So, we need to restore that
2774 typedef layer, which we can do by forcing the element's
2775 type back to its original type. Otherwise, the returned
2776 value is going to be printed as the array, rather
2777 than as an access. Another symptom of the same issue
2778 would be that an expression trying to dereference the
2779 element would also be improperly rejected. */
2780 deprecated_set_value_type (elt, saved_elt_type);
2781 }
2782
2783 elt_type = ada_check_typedef (value_type (elt));
14f9c5c9 2784 }
b9c50e9a 2785
14f9c5c9
AS
2786 return elt;
2787}
2788
deede10c
JB
2789/* Assuming ARR is a pointer to a GDB array, the value of the element
2790 of *ARR at the ARITY indices given in IND.
919e6dbe
PMR
2791 Does not read the entire array into memory.
2792
2793 Note: Unlike what one would expect, this function is used instead of
2794 ada_value_subscript for basically all non-packed array types. The reason
2795 for this is that a side effect of doing our own pointer arithmetics instead
2796 of relying on value_subscript is that there is no implicit typedef peeling.
2797 This is important for arrays of array accesses, where it allows us to
2798 preserve the fact that the array's element is an array access, where the
2799 access part os encoded in a typedef layer. */
14f9c5c9 2800
2c0b251b 2801static struct value *
deede10c 2802ada_value_ptr_subscript (struct value *arr, int arity, struct value **ind)
14f9c5c9
AS
2803{
2804 int k;
919e6dbe 2805 struct value *array_ind = ada_value_ind (arr);
deede10c 2806 struct type *type
919e6dbe
PMR
2807 = check_typedef (value_enclosing_type (array_ind));
2808
2809 if (TYPE_CODE (type) == TYPE_CODE_ARRAY
2810 && TYPE_FIELD_BITSIZE (type, 0) > 0)
2811 return value_subscript_packed (array_ind, arity, ind);
14f9c5c9
AS
2812
2813 for (k = 0; k < arity; k += 1)
2814 {
2815 LONGEST lwb, upb;
aa715135 2816 struct value *lwb_value;
14f9c5c9
AS
2817
2818 if (TYPE_CODE (type) != TYPE_CODE_ARRAY)
323e0a4a 2819 error (_("too many subscripts (%d expected)"), k);
d2e4a39e 2820 arr = value_cast (lookup_pointer_type (TYPE_TARGET_TYPE (type)),
4c4b4cd2 2821 value_copy (arr));
14f9c5c9 2822 get_discrete_bounds (TYPE_INDEX_TYPE (type), &lwb, &upb);
aa715135
JG
2823 lwb_value = value_from_longest (value_type(ind[k]), lwb);
2824 arr = value_ptradd (arr, pos_atr (ind[k]) - pos_atr (lwb_value));
14f9c5c9
AS
2825 type = TYPE_TARGET_TYPE (type);
2826 }
2827
2828 return value_ind (arr);
2829}
2830
0b5d8877 2831/* Given that ARRAY_PTR is a pointer or reference to an array of type TYPE (the
aa715135
JG
2832 actual type of ARRAY_PTR is ignored), returns the Ada slice of
2833 HIGH'Pos-LOW'Pos+1 elements starting at index LOW. The lower bound of
2834 this array is LOW, as per Ada rules. */
0b5d8877 2835static struct value *
f5938064
JG
2836ada_value_slice_from_ptr (struct value *array_ptr, struct type *type,
2837 int low, int high)
0b5d8877 2838{
b0dd7688 2839 struct type *type0 = ada_check_typedef (type);
aa715135 2840 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type0));
0c9c3474 2841 struct type *index_type
aa715135 2842 = create_static_range_type (NULL, base_index_type, low, high);
9fe561ab
JB
2843 struct type *slice_type = create_array_type_with_stride
2844 (NULL, TYPE_TARGET_TYPE (type0), index_type,
2845 get_dyn_prop (DYN_PROP_BYTE_STRIDE, type0),
2846 TYPE_FIELD_BITSIZE (type0, 0));
aa715135
JG
2847 int base_low = ada_discrete_type_low_bound (TYPE_INDEX_TYPE (type0));
2848 LONGEST base_low_pos, low_pos;
2849 CORE_ADDR base;
2850
2851 if (!discrete_position (base_index_type, low, &low_pos)
2852 || !discrete_position (base_index_type, base_low, &base_low_pos))
2853 {
2854 warning (_("unable to get positions in slice, use bounds instead"));
2855 low_pos = low;
2856 base_low_pos = base_low;
2857 }
5b4ee69b 2858
aa715135
JG
2859 base = value_as_address (array_ptr)
2860 + ((low_pos - base_low_pos)
2861 * TYPE_LENGTH (TYPE_TARGET_TYPE (type0)));
f5938064 2862 return value_at_lazy (slice_type, base);
0b5d8877
PH
2863}
2864
2865
2866static struct value *
2867ada_value_slice (struct value *array, int low, int high)
2868{
b0dd7688 2869 struct type *type = ada_check_typedef (value_type (array));
aa715135 2870 struct type *base_index_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
0c9c3474
SA
2871 struct type *index_type
2872 = create_static_range_type (NULL, TYPE_INDEX_TYPE (type), low, high);
9fe561ab
JB
2873 struct type *slice_type = create_array_type_with_stride
2874 (NULL, TYPE_TARGET_TYPE (type), index_type,
2875 get_dyn_prop (DYN_PROP_BYTE_STRIDE, type),
2876 TYPE_FIELD_BITSIZE (type, 0));
aa715135 2877 LONGEST low_pos, high_pos;
5b4ee69b 2878
aa715135
JG
2879 if (!discrete_position (base_index_type, low, &low_pos)
2880 || !discrete_position (base_index_type, high, &high_pos))
2881 {
2882 warning (_("unable to get positions in slice, use bounds instead"));
2883 low_pos = low;
2884 high_pos = high;
2885 }
2886
2887 return value_cast (slice_type,
2888 value_slice (array, low, high_pos - low_pos + 1));
0b5d8877
PH
2889}
2890
14f9c5c9
AS
2891/* If type is a record type in the form of a standard GNAT array
2892 descriptor, returns the number of dimensions for type. If arr is a
2893 simple array, returns the number of "array of"s that prefix its
4c4b4cd2 2894 type designation. Otherwise, returns 0. */
14f9c5c9
AS
2895
2896int
d2e4a39e 2897ada_array_arity (struct type *type)
14f9c5c9
AS
2898{
2899 int arity;
2900
2901 if (type == NULL)
2902 return 0;
2903
2904 type = desc_base_type (type);
2905
2906 arity = 0;
d2e4a39e 2907 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9 2908 return desc_arity (desc_bounds_type (type));
d2e4a39e
AS
2909 else
2910 while (TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9 2911 {
4c4b4cd2 2912 arity += 1;
61ee279c 2913 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
14f9c5c9 2914 }
d2e4a39e 2915
14f9c5c9
AS
2916 return arity;
2917}
2918
2919/* If TYPE is a record type in the form of a standard GNAT array
2920 descriptor or a simple array type, returns the element type for
2921 TYPE after indexing by NINDICES indices, or by all indices if
4c4b4cd2 2922 NINDICES is -1. Otherwise, returns NULL. */
14f9c5c9 2923
d2e4a39e
AS
2924struct type *
2925ada_array_element_type (struct type *type, int nindices)
14f9c5c9
AS
2926{
2927 type = desc_base_type (type);
2928
d2e4a39e 2929 if (TYPE_CODE (type) == TYPE_CODE_STRUCT)
14f9c5c9
AS
2930 {
2931 int k;
d2e4a39e 2932 struct type *p_array_type;
14f9c5c9 2933
556bdfd4 2934 p_array_type = desc_data_target_type (type);
14f9c5c9
AS
2935
2936 k = ada_array_arity (type);
2937 if (k == 0)
4c4b4cd2 2938 return NULL;
d2e4a39e 2939
4c4b4cd2 2940 /* Initially p_array_type = elt_type(*)[]...(k times)...[]. */
14f9c5c9 2941 if (nindices >= 0 && k > nindices)
4c4b4cd2 2942 k = nindices;
d2e4a39e 2943 while (k > 0 && p_array_type != NULL)
4c4b4cd2 2944 {
61ee279c 2945 p_array_type = ada_check_typedef (TYPE_TARGET_TYPE (p_array_type));
4c4b4cd2
PH
2946 k -= 1;
2947 }
14f9c5c9
AS
2948 return p_array_type;
2949 }
2950 else if (TYPE_CODE (type) == TYPE_CODE_ARRAY)
2951 {
2952 while (nindices != 0 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
4c4b4cd2
PH
2953 {
2954 type = TYPE_TARGET_TYPE (type);
2955 nindices -= 1;
2956 }
14f9c5c9
AS
2957 return type;
2958 }
2959
2960 return NULL;
2961}
2962
4c4b4cd2 2963/* The type of nth index in arrays of given type (n numbering from 1).
dd19d49e
UW
2964 Does not examine memory. Throws an error if N is invalid or TYPE
2965 is not an array type. NAME is the name of the Ada attribute being
2966 evaluated ('range, 'first, 'last, or 'length); it is used in building
2967 the error message. */
14f9c5c9 2968
1eea4ebd
UW
2969static struct type *
2970ada_index_type (struct type *type, int n, const char *name)
14f9c5c9 2971{
4c4b4cd2
PH
2972 struct type *result_type;
2973
14f9c5c9
AS
2974 type = desc_base_type (type);
2975
1eea4ebd
UW
2976 if (n < 0 || n > ada_array_arity (type))
2977 error (_("invalid dimension number to '%s"), name);
14f9c5c9 2978
4c4b4cd2 2979 if (ada_is_simple_array_type (type))
14f9c5c9
AS
2980 {
2981 int i;
2982
2983 for (i = 1; i < n; i += 1)
4c4b4cd2 2984 type = TYPE_TARGET_TYPE (type);
262452ec 2985 result_type = TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (type));
4c4b4cd2
PH
2986 /* FIXME: The stabs type r(0,0);bound;bound in an array type
2987 has a target type of TYPE_CODE_UNDEF. We compensate here, but
76a01679 2988 perhaps stabsread.c would make more sense. */
1eea4ebd
UW
2989 if (result_type && TYPE_CODE (result_type) == TYPE_CODE_UNDEF)
2990 result_type = NULL;
14f9c5c9 2991 }
d2e4a39e 2992 else
1eea4ebd
UW
2993 {
2994 result_type = desc_index_type (desc_bounds_type (type), n);
2995 if (result_type == NULL)
2996 error (_("attempt to take bound of something that is not an array"));
2997 }
2998
2999 return result_type;
14f9c5c9
AS
3000}
3001
3002/* Given that arr is an array type, returns the lower bound of the
3003 Nth index (numbering from 1) if WHICH is 0, and the upper bound if
4c4b4cd2 3004 WHICH is 1. This returns bounds 0 .. -1 if ARR_TYPE is an
1eea4ebd
UW
3005 array-descriptor type. It works for other arrays with bounds supplied
3006 by run-time quantities other than discriminants. */
14f9c5c9 3007
abb68b3e 3008static LONGEST
fb5e3d5c 3009ada_array_bound_from_type (struct type *arr_type, int n, int which)
14f9c5c9 3010{
8a48ac95 3011 struct type *type, *index_type_desc, *index_type;
1ce677a4 3012 int i;
262452ec
JK
3013
3014 gdb_assert (which == 0 || which == 1);
14f9c5c9 3015
ad82864c
JB
3016 if (ada_is_constrained_packed_array_type (arr_type))
3017 arr_type = decode_constrained_packed_array_type (arr_type);
14f9c5c9 3018
4c4b4cd2 3019 if (arr_type == NULL || !ada_is_simple_array_type (arr_type))
1eea4ebd 3020 return (LONGEST) - which;
14f9c5c9
AS
3021
3022 if (TYPE_CODE (arr_type) == TYPE_CODE_PTR)
3023 type = TYPE_TARGET_TYPE (arr_type);
3024 else
3025 type = arr_type;
3026
bafffb51
JB
3027 if (TYPE_FIXED_INSTANCE (type))
3028 {
3029 /* The array has already been fixed, so we do not need to
3030 check the parallel ___XA type again. That encoding has
3031 already been applied, so ignore it now. */
3032 index_type_desc = NULL;
3033 }
3034 else
3035 {
3036 index_type_desc = ada_find_parallel_type (type, "___XA");
3037 ada_fixup_array_indexes_type (index_type_desc);
3038 }
3039
262452ec 3040 if (index_type_desc != NULL)
28c85d6c
JB
3041 index_type = to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, n - 1),
3042 NULL);
262452ec 3043 else
8a48ac95
JB
3044 {
3045 struct type *elt_type = check_typedef (type);
3046
3047 for (i = 1; i < n; i++)
3048 elt_type = check_typedef (TYPE_TARGET_TYPE (elt_type));
3049
3050 index_type = TYPE_INDEX_TYPE (elt_type);
3051 }
262452ec 3052
43bbcdc2
PH
3053 return
3054 (LONGEST) (which == 0
3055 ? ada_discrete_type_low_bound (index_type)
3056 : ada_discrete_type_high_bound (index_type));
14f9c5c9
AS
3057}
3058
3059/* Given that arr is an array value, returns the lower bound of the
abb68b3e
JB
3060 nth index (numbering from 1) if WHICH is 0, and the upper bound if
3061 WHICH is 1. This routine will also work for arrays with bounds
4c4b4cd2 3062 supplied by run-time quantities other than discriminants. */
14f9c5c9 3063
1eea4ebd 3064static LONGEST
4dc81987 3065ada_array_bound (struct value *arr, int n, int which)
14f9c5c9 3066{
eb479039
JB
3067 struct type *arr_type;
3068
3069 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3070 arr = value_ind (arr);
3071 arr_type = value_enclosing_type (arr);
14f9c5c9 3072
ad82864c
JB
3073 if (ada_is_constrained_packed_array_type (arr_type))
3074 return ada_array_bound (decode_constrained_packed_array (arr), n, which);
4c4b4cd2 3075 else if (ada_is_simple_array_type (arr_type))
1eea4ebd 3076 return ada_array_bound_from_type (arr_type, n, which);
14f9c5c9 3077 else
1eea4ebd 3078 return value_as_long (desc_one_bound (desc_bounds (arr), n, which));
14f9c5c9
AS
3079}
3080
3081/* Given that arr is an array value, returns the length of the
3082 nth index. This routine will also work for arrays with bounds
4c4b4cd2
PH
3083 supplied by run-time quantities other than discriminants.
3084 Does not work for arrays indexed by enumeration types with representation
3085 clauses at the moment. */
14f9c5c9 3086
1eea4ebd 3087static LONGEST
d2e4a39e 3088ada_array_length (struct value *arr, int n)
14f9c5c9 3089{
aa715135
JG
3090 struct type *arr_type, *index_type;
3091 int low, high;
eb479039
JB
3092
3093 if (TYPE_CODE (check_typedef (value_type (arr))) == TYPE_CODE_PTR)
3094 arr = value_ind (arr);
3095 arr_type = value_enclosing_type (arr);
14f9c5c9 3096
ad82864c
JB
3097 if (ada_is_constrained_packed_array_type (arr_type))
3098 return ada_array_length (decode_constrained_packed_array (arr), n);
14f9c5c9 3099
4c4b4cd2 3100 if (ada_is_simple_array_type (arr_type))
aa715135
JG
3101 {
3102 low = ada_array_bound_from_type (arr_type, n, 0);
3103 high = ada_array_bound_from_type (arr_type, n, 1);
3104 }
14f9c5c9 3105 else
aa715135
JG
3106 {
3107 low = value_as_long (desc_one_bound (desc_bounds (arr), n, 0));
3108 high = value_as_long (desc_one_bound (desc_bounds (arr), n, 1));
3109 }
3110
f168693b 3111 arr_type = check_typedef (arr_type);
7150d33c 3112 index_type = ada_index_type (arr_type, n, "length");
aa715135
JG
3113 if (index_type != NULL)
3114 {
3115 struct type *base_type;
3116 if (TYPE_CODE (index_type) == TYPE_CODE_RANGE)
3117 base_type = TYPE_TARGET_TYPE (index_type);
3118 else
3119 base_type = index_type;
3120
3121 low = pos_atr (value_from_longest (base_type, low));
3122 high = pos_atr (value_from_longest (base_type, high));
3123 }
3124 return high - low + 1;
4c4b4cd2
PH
3125}
3126
bff8c71f
TT
3127/* An array whose type is that of ARR_TYPE (an array type), with
3128 bounds LOW to HIGH, but whose contents are unimportant. If HIGH is
3129 less than LOW, then LOW-1 is used. */
4c4b4cd2
PH
3130
3131static struct value *
bff8c71f 3132empty_array (struct type *arr_type, int low, int high)
4c4b4cd2 3133{
b0dd7688 3134 struct type *arr_type0 = ada_check_typedef (arr_type);
0c9c3474
SA
3135 struct type *index_type
3136 = create_static_range_type
bff8c71f
TT
3137 (NULL, TYPE_TARGET_TYPE (TYPE_INDEX_TYPE (arr_type0)), low,
3138 high < low ? low - 1 : high);
b0dd7688 3139 struct type *elt_type = ada_array_element_type (arr_type0, 1);
5b4ee69b 3140
0b5d8877 3141 return allocate_value (create_array_type (NULL, elt_type, index_type));
14f9c5c9 3142}
14f9c5c9 3143\f
d2e4a39e 3144
4c4b4cd2 3145 /* Name resolution */
14f9c5c9 3146
4c4b4cd2
PH
3147/* The "decoded" name for the user-definable Ada operator corresponding
3148 to OP. */
14f9c5c9 3149
d2e4a39e 3150static const char *
4c4b4cd2 3151ada_decoded_op_name (enum exp_opcode op)
14f9c5c9
AS
3152{
3153 int i;
3154
4c4b4cd2 3155 for (i = 0; ada_opname_table[i].encoded != NULL; i += 1)
14f9c5c9
AS
3156 {
3157 if (ada_opname_table[i].op == op)
4c4b4cd2 3158 return ada_opname_table[i].decoded;
14f9c5c9 3159 }
323e0a4a 3160 error (_("Could not find operator name for opcode"));
14f9c5c9
AS
3161}
3162
3163
4c4b4cd2
PH
3164/* Same as evaluate_type (*EXP), but resolves ambiguous symbol
3165 references (marked by OP_VAR_VALUE nodes in which the symbol has an
3166 undefined namespace) and converts operators that are
3167 user-defined into appropriate function calls. If CONTEXT_TYPE is
14f9c5c9
AS
3168 non-null, it provides a preferred result type [at the moment, only
3169 type void has any effect---causing procedures to be preferred over
3170 functions in calls]. A null CONTEXT_TYPE indicates that a non-void
4c4b4cd2 3171 return type is preferred. May change (expand) *EXP. */
14f9c5c9 3172
4c4b4cd2 3173static void
699bd4cf
TT
3174resolve (expression_up *expp, int void_context_p, int parse_completion,
3175 innermost_block_tracker *tracker)
14f9c5c9 3176{
30b15541
UW
3177 struct type *context_type = NULL;
3178 int pc = 0;
3179
3180 if (void_context_p)
3181 context_type = builtin_type ((*expp)->gdbarch)->builtin_void;
3182
699bd4cf 3183 resolve_subexp (expp, &pc, 1, context_type, parse_completion, tracker);
14f9c5c9
AS
3184}
3185
4c4b4cd2
PH
3186/* Resolve the operator of the subexpression beginning at
3187 position *POS of *EXPP. "Resolving" consists of replacing
3188 the symbols that have undefined namespaces in OP_VAR_VALUE nodes
3189 with their resolutions, replacing built-in operators with
3190 function calls to user-defined operators, where appropriate, and,
3191 when DEPROCEDURE_P is non-zero, converting function-valued variables
3192 into parameterless calls. May expand *EXPP. The CONTEXT_TYPE functions
3193 are as in ada_resolve, above. */
14f9c5c9 3194
d2e4a39e 3195static struct value *
e9d9f57e 3196resolve_subexp (expression_up *expp, int *pos, int deprocedure_p,
699bd4cf
TT
3197 struct type *context_type, int parse_completion,
3198 innermost_block_tracker *tracker)
14f9c5c9
AS
3199{
3200 int pc = *pos;
3201 int i;
4c4b4cd2 3202 struct expression *exp; /* Convenience: == *expp. */
14f9c5c9 3203 enum exp_opcode op = (*expp)->elts[pc].opcode;
4c4b4cd2
PH
3204 struct value **argvec; /* Vector of operand types (alloca'ed). */
3205 int nargs; /* Number of operands. */
52ce6436 3206 int oplen;
14f9c5c9
AS
3207
3208 argvec = NULL;
3209 nargs = 0;
e9d9f57e 3210 exp = expp->get ();
14f9c5c9 3211
52ce6436
PH
3212 /* Pass one: resolve operands, saving their types and updating *pos,
3213 if needed. */
14f9c5c9
AS
3214 switch (op)
3215 {
4c4b4cd2
PH
3216 case OP_FUNCALL:
3217 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679
JB
3218 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
3219 *pos += 7;
4c4b4cd2
PH
3220 else
3221 {
3222 *pos += 3;
699bd4cf 3223 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2
PH
3224 }
3225 nargs = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9
AS
3226 break;
3227
14f9c5c9 3228 case UNOP_ADDR:
4c4b4cd2 3229 *pos += 1;
699bd4cf 3230 resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2
PH
3231 break;
3232
52ce6436
PH
3233 case UNOP_QUAL:
3234 *pos += 3;
2a612529 3235 resolve_subexp (expp, pos, 1, check_typedef (exp->elts[pc + 1].type),
699bd4cf 3236 parse_completion, tracker);
4c4b4cd2
PH
3237 break;
3238
52ce6436 3239 case OP_ATR_MODULUS:
4c4b4cd2
PH
3240 case OP_ATR_SIZE:
3241 case OP_ATR_TAG:
4c4b4cd2
PH
3242 case OP_ATR_FIRST:
3243 case OP_ATR_LAST:
3244 case OP_ATR_LENGTH:
3245 case OP_ATR_POS:
3246 case OP_ATR_VAL:
4c4b4cd2
PH
3247 case OP_ATR_MIN:
3248 case OP_ATR_MAX:
52ce6436
PH
3249 case TERNOP_IN_RANGE:
3250 case BINOP_IN_BOUNDS:
3251 case UNOP_IN_RANGE:
3252 case OP_AGGREGATE:
3253 case OP_OTHERS:
3254 case OP_CHOICES:
3255 case OP_POSITIONAL:
3256 case OP_DISCRETE_RANGE:
3257 case OP_NAME:
3258 ada_forward_operator_length (exp, pc, &oplen, &nargs);
3259 *pos += oplen;
14f9c5c9
AS
3260 break;
3261
3262 case BINOP_ASSIGN:
3263 {
4c4b4cd2
PH
3264 struct value *arg1;
3265
3266 *pos += 1;
699bd4cf 3267 arg1 = resolve_subexp (expp, pos, 0, NULL, parse_completion, tracker);
4c4b4cd2 3268 if (arg1 == NULL)
699bd4cf 3269 resolve_subexp (expp, pos, 1, NULL, parse_completion, tracker);
4c4b4cd2 3270 else
699bd4cf
TT
3271 resolve_subexp (expp, pos, 1, value_type (arg1), parse_completion,
3272 tracker);
4c4b4cd2 3273 break;
14f9c5c9
AS
3274 }
3275
4c4b4cd2 3276 case UNOP_CAST:
4c4b4cd2
PH
3277 *pos += 3;
3278 nargs = 1;
3279 break;
14f9c5c9 3280
4c4b4cd2
PH
3281 case BINOP_ADD:
3282 case BINOP_SUB:
3283 case BINOP_MUL:
3284 case BINOP_DIV:
3285 case BINOP_REM:
3286 case BINOP_MOD:
3287 case BINOP_EXP:
3288 case BINOP_CONCAT:
3289 case BINOP_LOGICAL_AND:
3290 case BINOP_LOGICAL_OR:
3291 case BINOP_BITWISE_AND:
3292 case BINOP_BITWISE_IOR:
3293 case BINOP_BITWISE_XOR:
14f9c5c9 3294
4c4b4cd2
PH
3295 case BINOP_EQUAL:
3296 case BINOP_NOTEQUAL:
3297 case BINOP_LESS:
3298 case BINOP_GTR:
3299 case BINOP_LEQ:
3300 case BINOP_GEQ:
14f9c5c9 3301
4c4b4cd2
PH
3302 case BINOP_REPEAT:
3303 case BINOP_SUBSCRIPT:
3304 case BINOP_COMMA:
40c8aaa9
JB
3305 *pos += 1;
3306 nargs = 2;
3307 break;
14f9c5c9 3308
4c4b4cd2
PH
3309 case UNOP_NEG:
3310 case UNOP_PLUS:
3311 case UNOP_LOGICAL_NOT:
3312 case UNOP_ABS:
3313 case UNOP_IND:
3314 *pos += 1;
3315 nargs = 1;
3316 break;
14f9c5c9 3317
4c4b4cd2 3318 case OP_LONG:
edd079d9 3319 case OP_FLOAT:
4c4b4cd2 3320 case OP_VAR_VALUE:
74ea4be4 3321 case OP_VAR_MSYM_VALUE:
4c4b4cd2
PH
3322 *pos += 4;
3323 break;
14f9c5c9 3324
4c4b4cd2
PH
3325 case OP_TYPE:
3326 case OP_BOOL:
3327 case OP_LAST:
4c4b4cd2
PH
3328 case OP_INTERNALVAR:
3329 *pos += 3;
3330 break;
14f9c5c9 3331
4c4b4cd2
PH
3332 case UNOP_MEMVAL:
3333 *pos += 3;
3334 nargs = 1;
3335 break;
3336
67f3407f
DJ
3337 case OP_REGISTER:
3338 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3339 break;
3340
4c4b4cd2
PH
3341 case STRUCTOP_STRUCT:
3342 *pos += 4 + BYTES_TO_EXP_ELEM (exp->elts[pc + 1].longconst + 1);
3343 nargs = 1;
3344 break;
3345
4c4b4cd2 3346 case TERNOP_SLICE:
4c4b4cd2
PH
3347 *pos += 1;
3348 nargs = 3;
3349 break;
3350
52ce6436 3351 case OP_STRING:
14f9c5c9 3352 break;
4c4b4cd2
PH
3353
3354 default:
323e0a4a 3355 error (_("Unexpected operator during name resolution"));
14f9c5c9
AS
3356 }
3357
8d749320 3358 argvec = XALLOCAVEC (struct value *, nargs + 1);
4c4b4cd2 3359 for (i = 0; i < nargs; i += 1)
699bd4cf
TT
3360 argvec[i] = resolve_subexp (expp, pos, 1, NULL, parse_completion,
3361 tracker);
4c4b4cd2 3362 argvec[i] = NULL;
e9d9f57e 3363 exp = expp->get ();
4c4b4cd2
PH
3364
3365 /* Pass two: perform any resolution on principal operator. */
14f9c5c9
AS
3366 switch (op)
3367 {
3368 default:
3369 break;
3370
14f9c5c9 3371 case OP_VAR_VALUE:
4c4b4cd2 3372 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679 3373 {
54d343a2 3374 std::vector<struct block_symbol> candidates;
76a01679
JB
3375 int n_candidates;
3376
3377 n_candidates =
3378 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3379 (exp->elts[pc + 2].symbol),
3380 exp->elts[pc + 1].block, VAR_DOMAIN,
4eeaa230 3381 &candidates);
76a01679
JB
3382
3383 if (n_candidates > 1)
3384 {
3385 /* Types tend to get re-introduced locally, so if there
3386 are any local symbols that are not types, first filter
3387 out all types. */
3388 int j;
3389 for (j = 0; j < n_candidates; j += 1)
d12307c1 3390 switch (SYMBOL_CLASS (candidates[j].symbol))
76a01679
JB
3391 {
3392 case LOC_REGISTER:
3393 case LOC_ARG:
3394 case LOC_REF_ARG:
76a01679
JB
3395 case LOC_REGPARM_ADDR:
3396 case LOC_LOCAL:
76a01679 3397 case LOC_COMPUTED:
76a01679
JB
3398 goto FoundNonType;
3399 default:
3400 break;
3401 }
3402 FoundNonType:
3403 if (j < n_candidates)
3404 {
3405 j = 0;
3406 while (j < n_candidates)
3407 {
d12307c1 3408 if (SYMBOL_CLASS (candidates[j].symbol) == LOC_TYPEDEF)
76a01679
JB
3409 {
3410 candidates[j] = candidates[n_candidates - 1];
3411 n_candidates -= 1;
3412 }
3413 else
3414 j += 1;
3415 }
3416 }
3417 }
3418
3419 if (n_candidates == 0)
323e0a4a 3420 error (_("No definition found for %s"),
76a01679
JB
3421 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3422 else if (n_candidates == 1)
3423 i = 0;
3424 else if (deprocedure_p
54d343a2 3425 && !is_nonfunction (candidates.data (), n_candidates))
76a01679 3426 {
06d5cf63 3427 i = ada_resolve_function
54d343a2 3428 (candidates.data (), n_candidates, NULL, 0,
06d5cf63 3429 SYMBOL_LINKAGE_NAME (exp->elts[pc + 2].symbol),
2a612529 3430 context_type, parse_completion);
76a01679 3431 if (i < 0)
323e0a4a 3432 error (_("Could not find a match for %s"),
76a01679
JB
3433 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
3434 }
3435 else
3436 {
323e0a4a 3437 printf_filtered (_("Multiple matches for %s\n"),
76a01679 3438 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
54d343a2 3439 user_select_syms (candidates.data (), n_candidates, 1);
76a01679
JB
3440 i = 0;
3441 }
3442
3443 exp->elts[pc + 1].block = candidates[i].block;
d12307c1 3444 exp->elts[pc + 2].symbol = candidates[i].symbol;
699bd4cf 3445 tracker->update (candidates[i]);
76a01679
JB
3446 }
3447
3448 if (deprocedure_p
3449 && (TYPE_CODE (SYMBOL_TYPE (exp->elts[pc + 2].symbol))
3450 == TYPE_CODE_FUNC))
3451 {
424da6cf 3452 replace_operator_with_call (expp, pc, 0, 4,
76a01679
JB
3453 exp->elts[pc + 2].symbol,
3454 exp->elts[pc + 1].block);
e9d9f57e 3455 exp = expp->get ();
76a01679 3456 }
14f9c5c9
AS
3457 break;
3458
3459 case OP_FUNCALL:
3460 {
4c4b4cd2 3461 if (exp->elts[pc + 3].opcode == OP_VAR_VALUE
76a01679 3462 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
4c4b4cd2 3463 {
54d343a2 3464 std::vector<struct block_symbol> candidates;
4c4b4cd2
PH
3465 int n_candidates;
3466
3467 n_candidates =
76a01679
JB
3468 ada_lookup_symbol_list (SYMBOL_LINKAGE_NAME
3469 (exp->elts[pc + 5].symbol),
3470 exp->elts[pc + 4].block, VAR_DOMAIN,
4eeaa230 3471 &candidates);
ec6a20c2 3472
4c4b4cd2
PH
3473 if (n_candidates == 1)
3474 i = 0;
3475 else
3476 {
06d5cf63 3477 i = ada_resolve_function
54d343a2 3478 (candidates.data (), n_candidates,
06d5cf63
JB
3479 argvec, nargs,
3480 SYMBOL_LINKAGE_NAME (exp->elts[pc + 5].symbol),
2a612529 3481 context_type, parse_completion);
4c4b4cd2 3482 if (i < 0)
323e0a4a 3483 error (_("Could not find a match for %s"),
4c4b4cd2
PH
3484 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
3485 }
3486
3487 exp->elts[pc + 4].block = candidates[i].block;
d12307c1 3488 exp->elts[pc + 5].symbol = candidates[i].symbol;
699bd4cf 3489 tracker->update (candidates[i]);
4c4b4cd2 3490 }
14f9c5c9
AS
3491 }
3492 break;
3493 case BINOP_ADD:
3494 case BINOP_SUB:
3495 case BINOP_MUL:
3496 case BINOP_DIV:
3497 case BINOP_REM:
3498 case BINOP_MOD:
3499 case BINOP_CONCAT:
3500 case BINOP_BITWISE_AND:
3501 case BINOP_BITWISE_IOR:
3502 case BINOP_BITWISE_XOR:
3503 case BINOP_EQUAL:
3504 case BINOP_NOTEQUAL:
3505 case BINOP_LESS:
3506 case BINOP_GTR:
3507 case BINOP_LEQ:
3508 case BINOP_GEQ:
3509 case BINOP_EXP:
3510 case UNOP_NEG:
3511 case UNOP_PLUS:
3512 case UNOP_LOGICAL_NOT:
3513 case UNOP_ABS:
3514 if (possible_user_operator_p (op, argvec))
4c4b4cd2 3515 {
54d343a2 3516 std::vector<struct block_symbol> candidates;
4c4b4cd2
PH
3517 int n_candidates;
3518
3519 n_candidates =
b5ec771e 3520 ada_lookup_symbol_list (ada_decoded_op_name (op),
582942f4 3521 NULL, VAR_DOMAIN,
4eeaa230 3522 &candidates);
ec6a20c2 3523
54d343a2 3524 i = ada_resolve_function (candidates.data (), n_candidates, argvec,
2a612529
TT
3525 nargs, ada_decoded_op_name (op), NULL,
3526 parse_completion);
4c4b4cd2
PH
3527 if (i < 0)
3528 break;
3529
d12307c1
PMR
3530 replace_operator_with_call (expp, pc, nargs, 1,
3531 candidates[i].symbol,
3532 candidates[i].block);
e9d9f57e 3533 exp = expp->get ();
4c4b4cd2 3534 }
14f9c5c9 3535 break;
4c4b4cd2
PH
3536
3537 case OP_TYPE:
b3dbf008 3538 case OP_REGISTER:
4c4b4cd2 3539 return NULL;
14f9c5c9
AS
3540 }
3541
3542 *pos = pc;
ced9779b
JB
3543 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
3544 return evaluate_var_msym_value (EVAL_AVOID_SIDE_EFFECTS,
3545 exp->elts[pc + 1].objfile,
3546 exp->elts[pc + 2].msymbol);
3547 else
3548 return evaluate_subexp_type (exp, pos);
14f9c5c9
AS
3549}
3550
3551/* Return non-zero if formal type FTYPE matches actual type ATYPE. If
4c4b4cd2 3552 MAY_DEREF is non-zero, the formal may be a pointer and the actual
5b3d5b7d 3553 a non-pointer. */
14f9c5c9 3554/* The term "match" here is rather loose. The match is heuristic and
5b3d5b7d 3555 liberal. */
14f9c5c9
AS
3556
3557static int
4dc81987 3558ada_type_match (struct type *ftype, struct type *atype, int may_deref)
14f9c5c9 3559{
61ee279c
PH
3560 ftype = ada_check_typedef (ftype);
3561 atype = ada_check_typedef (atype);
14f9c5c9
AS
3562
3563 if (TYPE_CODE (ftype) == TYPE_CODE_REF)
3564 ftype = TYPE_TARGET_TYPE (ftype);
3565 if (TYPE_CODE (atype) == TYPE_CODE_REF)
3566 atype = TYPE_TARGET_TYPE (atype);
3567
d2e4a39e 3568 switch (TYPE_CODE (ftype))
14f9c5c9
AS
3569 {
3570 default:
5b3d5b7d 3571 return TYPE_CODE (ftype) == TYPE_CODE (atype);
14f9c5c9
AS
3572 case TYPE_CODE_PTR:
3573 if (TYPE_CODE (atype) == TYPE_CODE_PTR)
4c4b4cd2
PH
3574 return ada_type_match (TYPE_TARGET_TYPE (ftype),
3575 TYPE_TARGET_TYPE (atype), 0);
d2e4a39e 3576 else
1265e4aa
JB
3577 return (may_deref
3578 && ada_type_match (TYPE_TARGET_TYPE (ftype), atype, 0));
14f9c5c9
AS
3579 case TYPE_CODE_INT:
3580 case TYPE_CODE_ENUM:
3581 case TYPE_CODE_RANGE:
3582 switch (TYPE_CODE (atype))
4c4b4cd2
PH
3583 {
3584 case TYPE_CODE_INT:
3585 case TYPE_CODE_ENUM:
3586 case TYPE_CODE_RANGE:
3587 return 1;
3588 default:
3589 return 0;
3590 }
14f9c5c9
AS
3591
3592 case TYPE_CODE_ARRAY:
d2e4a39e 3593 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
4c4b4cd2 3594 || ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3595
3596 case TYPE_CODE_STRUCT:
4c4b4cd2
PH
3597 if (ada_is_array_descriptor_type (ftype))
3598 return (TYPE_CODE (atype) == TYPE_CODE_ARRAY
3599 || ada_is_array_descriptor_type (atype));
14f9c5c9 3600 else
4c4b4cd2
PH
3601 return (TYPE_CODE (atype) == TYPE_CODE_STRUCT
3602 && !ada_is_array_descriptor_type (atype));
14f9c5c9
AS
3603
3604 case TYPE_CODE_UNION:
3605 case TYPE_CODE_FLT:
3606 return (TYPE_CODE (atype) == TYPE_CODE (ftype));
3607 }
3608}
3609
3610/* Return non-zero if the formals of FUNC "sufficiently match" the
3611 vector of actual argument types ACTUALS of size N_ACTUALS. FUNC
3612 may also be an enumeral, in which case it is treated as a 0-
4c4b4cd2 3613 argument function. */
14f9c5c9
AS
3614
3615static int
d2e4a39e 3616ada_args_match (struct symbol *func, struct value **actuals, int n_actuals)
14f9c5c9
AS
3617{
3618 int i;
d2e4a39e 3619 struct type *func_type = SYMBOL_TYPE (func);
14f9c5c9 3620
1265e4aa
JB
3621 if (SYMBOL_CLASS (func) == LOC_CONST
3622 && TYPE_CODE (func_type) == TYPE_CODE_ENUM)
14f9c5c9
AS
3623 return (n_actuals == 0);
3624 else if (func_type == NULL || TYPE_CODE (func_type) != TYPE_CODE_FUNC)
3625 return 0;
3626
3627 if (TYPE_NFIELDS (func_type) != n_actuals)
3628 return 0;
3629
3630 for (i = 0; i < n_actuals; i += 1)
3631 {
4c4b4cd2 3632 if (actuals[i] == NULL)
76a01679
JB
3633 return 0;
3634 else
3635 {
5b4ee69b
MS
3636 struct type *ftype = ada_check_typedef (TYPE_FIELD_TYPE (func_type,
3637 i));
df407dfe 3638 struct type *atype = ada_check_typedef (value_type (actuals[i]));
4c4b4cd2 3639
76a01679
JB
3640 if (!ada_type_match (ftype, atype, 1))
3641 return 0;
3642 }
14f9c5c9
AS
3643 }
3644 return 1;
3645}
3646
3647/* False iff function type FUNC_TYPE definitely does not produce a value
3648 compatible with type CONTEXT_TYPE. Conservatively returns 1 if
3649 FUNC_TYPE is not a valid function type with a non-null return type
3650 or an enumerated type. A null CONTEXT_TYPE indicates any non-void type. */
3651
3652static int
d2e4a39e 3653return_match (struct type *func_type, struct type *context_type)
14f9c5c9 3654{
d2e4a39e 3655 struct type *return_type;
14f9c5c9
AS
3656
3657 if (func_type == NULL)
3658 return 1;
3659
4c4b4cd2 3660 if (TYPE_CODE (func_type) == TYPE_CODE_FUNC)
18af8284 3661 return_type = get_base_type (TYPE_TARGET_TYPE (func_type));
4c4b4cd2 3662 else
18af8284 3663 return_type = get_base_type (func_type);
14f9c5c9
AS
3664 if (return_type == NULL)
3665 return 1;
3666
18af8284 3667 context_type = get_base_type (context_type);
14f9c5c9
AS
3668
3669 if (TYPE_CODE (return_type) == TYPE_CODE_ENUM)
3670 return context_type == NULL || return_type == context_type;
3671 else if (context_type == NULL)
3672 return TYPE_CODE (return_type) != TYPE_CODE_VOID;
3673 else
3674 return TYPE_CODE (return_type) == TYPE_CODE (context_type);
3675}
3676
3677
4c4b4cd2 3678/* Returns the index in SYMS[0..NSYMS-1] that contains the symbol for the
14f9c5c9 3679 function (if any) that matches the types of the NARGS arguments in
4c4b4cd2
PH
3680 ARGS. If CONTEXT_TYPE is non-null and there is at least one match
3681 that returns that type, then eliminate matches that don't. If
3682 CONTEXT_TYPE is void and there is at least one match that does not
3683 return void, eliminate all matches that do.
3684
14f9c5c9
AS
3685 Asks the user if there is more than one match remaining. Returns -1
3686 if there is no such symbol or none is selected. NAME is used
4c4b4cd2
PH
3687 solely for messages. May re-arrange and modify SYMS in
3688 the process; the index returned is for the modified vector. */
14f9c5c9 3689
4c4b4cd2 3690static int
d12307c1 3691ada_resolve_function (struct block_symbol syms[],
4c4b4cd2 3692 int nsyms, struct value **args, int nargs,
2a612529
TT
3693 const char *name, struct type *context_type,
3694 int parse_completion)
14f9c5c9 3695{
30b15541 3696 int fallback;
14f9c5c9 3697 int k;
4c4b4cd2 3698 int m; /* Number of hits */
14f9c5c9 3699
d2e4a39e 3700 m = 0;
30b15541
UW
3701 /* In the first pass of the loop, we only accept functions matching
3702 context_type. If none are found, we add a second pass of the loop
3703 where every function is accepted. */
3704 for (fallback = 0; m == 0 && fallback < 2; fallback++)
14f9c5c9
AS
3705 {
3706 for (k = 0; k < nsyms; k += 1)
4c4b4cd2 3707 {
d12307c1 3708 struct type *type = ada_check_typedef (SYMBOL_TYPE (syms[k].symbol));
4c4b4cd2 3709
d12307c1 3710 if (ada_args_match (syms[k].symbol, args, nargs)
30b15541 3711 && (fallback || return_match (type, context_type)))
4c4b4cd2
PH
3712 {
3713 syms[m] = syms[k];
3714 m += 1;
3715 }
3716 }
14f9c5c9
AS
3717 }
3718
dc5c8746
PMR
3719 /* If we got multiple matches, ask the user which one to use. Don't do this
3720 interactive thing during completion, though, as the purpose of the
3721 completion is providing a list of all possible matches. Prompting the
3722 user to filter it down would be completely unexpected in this case. */
14f9c5c9
AS
3723 if (m == 0)
3724 return -1;
dc5c8746 3725 else if (m > 1 && !parse_completion)
14f9c5c9 3726 {
323e0a4a 3727 printf_filtered (_("Multiple matches for %s\n"), name);
4c4b4cd2 3728 user_select_syms (syms, m, 1);
14f9c5c9
AS
3729 return 0;
3730 }
3731 return 0;
3732}
3733
4c4b4cd2
PH
3734/* Returns true (non-zero) iff decoded name N0 should appear before N1
3735 in a listing of choices during disambiguation (see sort_choices, below).
3736 The idea is that overloadings of a subprogram name from the
3737 same package should sort in their source order. We settle for ordering
3738 such symbols by their trailing number (__N or $N). */
3739
14f9c5c9 3740static int
0d5cff50 3741encoded_ordered_before (const char *N0, const char *N1)
14f9c5c9
AS
3742{
3743 if (N1 == NULL)
3744 return 0;
3745 else if (N0 == NULL)
3746 return 1;
3747 else
3748 {
3749 int k0, k1;
5b4ee69b 3750
d2e4a39e 3751 for (k0 = strlen (N0) - 1; k0 > 0 && isdigit (N0[k0]); k0 -= 1)
4c4b4cd2 3752 ;
d2e4a39e 3753 for (k1 = strlen (N1) - 1; k1 > 0 && isdigit (N1[k1]); k1 -= 1)
4c4b4cd2 3754 ;
d2e4a39e 3755 if ((N0[k0] == '_' || N0[k0] == '$') && N0[k0 + 1] != '\000'
4c4b4cd2
PH
3756 && (N1[k1] == '_' || N1[k1] == '$') && N1[k1 + 1] != '\000')
3757 {
3758 int n0, n1;
5b4ee69b 3759
4c4b4cd2
PH
3760 n0 = k0;
3761 while (N0[n0] == '_' && n0 > 0 && N0[n0 - 1] == '_')
3762 n0 -= 1;
3763 n1 = k1;
3764 while (N1[n1] == '_' && n1 > 0 && N1[n1 - 1] == '_')
3765 n1 -= 1;
3766 if (n0 == n1 && strncmp (N0, N1, n0) == 0)
3767 return (atoi (N0 + k0 + 1) < atoi (N1 + k1 + 1));
3768 }
14f9c5c9
AS
3769 return (strcmp (N0, N1) < 0);
3770 }
3771}
d2e4a39e 3772
4c4b4cd2
PH
3773/* Sort SYMS[0..NSYMS-1] to put the choices in a canonical order by the
3774 encoded names. */
3775
d2e4a39e 3776static void
d12307c1 3777sort_choices (struct block_symbol syms[], int nsyms)
14f9c5c9 3778{
4c4b4cd2 3779 int i;
5b4ee69b 3780
d2e4a39e 3781 for (i = 1; i < nsyms; i += 1)
14f9c5c9 3782 {
d12307c1 3783 struct block_symbol sym = syms[i];
14f9c5c9
AS
3784 int j;
3785
d2e4a39e 3786 for (j = i - 1; j >= 0; j -= 1)
4c4b4cd2 3787 {
d12307c1
PMR
3788 if (encoded_ordered_before (SYMBOL_LINKAGE_NAME (syms[j].symbol),
3789 SYMBOL_LINKAGE_NAME (sym.symbol)))
4c4b4cd2
PH
3790 break;
3791 syms[j + 1] = syms[j];
3792 }
d2e4a39e 3793 syms[j + 1] = sym;
14f9c5c9
AS
3794 }
3795}
3796
d72413e6
PMR
3797/* Whether GDB should display formals and return types for functions in the
3798 overloads selection menu. */
3799static int print_signatures = 1;
3800
3801/* Print the signature for SYM on STREAM according to the FLAGS options. For
3802 all but functions, the signature is just the name of the symbol. For
3803 functions, this is the name of the function, the list of types for formals
3804 and the return type (if any). */
3805
3806static void
3807ada_print_symbol_signature (struct ui_file *stream, struct symbol *sym,
3808 const struct type_print_options *flags)
3809{
3810 struct type *type = SYMBOL_TYPE (sym);
3811
3812 fprintf_filtered (stream, "%s", SYMBOL_PRINT_NAME (sym));
3813 if (!print_signatures
3814 || type == NULL
3815 || TYPE_CODE (type) != TYPE_CODE_FUNC)
3816 return;
3817
3818 if (TYPE_NFIELDS (type) > 0)
3819 {
3820 int i;
3821
3822 fprintf_filtered (stream, " (");
3823 for (i = 0; i < TYPE_NFIELDS (type); ++i)
3824 {
3825 if (i > 0)
3826 fprintf_filtered (stream, "; ");
3827 ada_print_type (TYPE_FIELD_TYPE (type, i), NULL, stream, -1, 0,
3828 flags);
3829 }
3830 fprintf_filtered (stream, ")");
3831 }
3832 if (TYPE_TARGET_TYPE (type) != NULL
3833 && TYPE_CODE (TYPE_TARGET_TYPE (type)) != TYPE_CODE_VOID)
3834 {
3835 fprintf_filtered (stream, " return ");
3836 ada_print_type (TYPE_TARGET_TYPE (type), NULL, stream, -1, 0, flags);
3837 }
3838}
3839
4c4b4cd2
PH
3840/* Given a list of NSYMS symbols in SYMS, select up to MAX_RESULTS>0
3841 by asking the user (if necessary), returning the number selected,
3842 and setting the first elements of SYMS items. Error if no symbols
3843 selected. */
14f9c5c9
AS
3844
3845/* NOTE: Adapted from decode_line_2 in symtab.c, with which it ought
4c4b4cd2 3846 to be re-integrated one of these days. */
14f9c5c9
AS
3847
3848int
d12307c1 3849user_select_syms (struct block_symbol *syms, int nsyms, int max_results)
14f9c5c9
AS
3850{
3851 int i;
8d749320 3852 int *chosen = XALLOCAVEC (int , nsyms);
14f9c5c9
AS
3853 int n_chosen;
3854 int first_choice = (max_results == 1) ? 1 : 2;
717d2f5a 3855 const char *select_mode = multiple_symbols_select_mode ();
14f9c5c9
AS
3856
3857 if (max_results < 1)
323e0a4a 3858 error (_("Request to select 0 symbols!"));
14f9c5c9
AS
3859 if (nsyms <= 1)
3860 return nsyms;
3861
717d2f5a
JB
3862 if (select_mode == multiple_symbols_cancel)
3863 error (_("\
3864canceled because the command is ambiguous\n\
3865See set/show multiple-symbol."));
a0087920 3866
717d2f5a
JB
3867 /* If select_mode is "all", then return all possible symbols.
3868 Only do that if more than one symbol can be selected, of course.
3869 Otherwise, display the menu as usual. */
3870 if (select_mode == multiple_symbols_all && max_results > 1)
3871 return nsyms;
3872
a0087920 3873 printf_filtered (_("[0] cancel\n"));
14f9c5c9 3874 if (max_results > 1)
a0087920 3875 printf_filtered (_("[1] all\n"));
14f9c5c9 3876
4c4b4cd2 3877 sort_choices (syms, nsyms);
14f9c5c9
AS
3878
3879 for (i = 0; i < nsyms; i += 1)
3880 {
d12307c1 3881 if (syms[i].symbol == NULL)
4c4b4cd2
PH
3882 continue;
3883
d12307c1 3884 if (SYMBOL_CLASS (syms[i].symbol) == LOC_BLOCK)
4c4b4cd2 3885 {
76a01679 3886 struct symtab_and_line sal =
d12307c1 3887 find_function_start_sal (syms[i].symbol, 1);
5b4ee69b 3888
a0087920 3889 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3890 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3891 &type_print_raw_options);
323e0a4a 3892 if (sal.symtab == NULL)
a0087920
TT
3893 printf_filtered (_(" at <no source file available>:%d\n"),
3894 sal.line);
323e0a4a 3895 else
a0087920
TT
3896 printf_filtered (_(" at %s:%d\n"),
3897 symtab_to_filename_for_display (sal.symtab),
3898 sal.line);
4c4b4cd2
PH
3899 continue;
3900 }
d2e4a39e 3901 else
4c4b4cd2
PH
3902 {
3903 int is_enumeral =
d12307c1
PMR
3904 (SYMBOL_CLASS (syms[i].symbol) == LOC_CONST
3905 && SYMBOL_TYPE (syms[i].symbol) != NULL
3906 && TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) == TYPE_CODE_ENUM);
1994afbf
DE
3907 struct symtab *symtab = NULL;
3908
d12307c1
PMR
3909 if (SYMBOL_OBJFILE_OWNED (syms[i].symbol))
3910 symtab = symbol_symtab (syms[i].symbol);
4c4b4cd2 3911
d12307c1 3912 if (SYMBOL_LINE (syms[i].symbol) != 0 && symtab != NULL)
d72413e6 3913 {
a0087920 3914 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3915 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3916 &type_print_raw_options);
a0087920
TT
3917 printf_filtered (_(" at %s:%d\n"),
3918 symtab_to_filename_for_display (symtab),
3919 SYMBOL_LINE (syms[i].symbol));
d72413e6 3920 }
76a01679 3921 else if (is_enumeral
d12307c1 3922 && TYPE_NAME (SYMBOL_TYPE (syms[i].symbol)) != NULL)
4c4b4cd2 3923 {
a0087920 3924 printf_filtered (("[%d] "), i + first_choice);
d12307c1 3925 ada_print_type (SYMBOL_TYPE (syms[i].symbol), NULL,
79d43c61 3926 gdb_stdout, -1, 0, &type_print_raw_options);
a0087920
TT
3927 printf_filtered (_("'(%s) (enumeral)\n"),
3928 SYMBOL_PRINT_NAME (syms[i].symbol));
4c4b4cd2 3929 }
d72413e6
PMR
3930 else
3931 {
a0087920 3932 printf_filtered ("[%d] ", i + first_choice);
d72413e6
PMR
3933 ada_print_symbol_signature (gdb_stdout, syms[i].symbol,
3934 &type_print_raw_options);
3935
3936 if (symtab != NULL)
a0087920
TT
3937 printf_filtered (is_enumeral
3938 ? _(" in %s (enumeral)\n")
3939 : _(" at %s:?\n"),
3940 symtab_to_filename_for_display (symtab));
d72413e6 3941 else
a0087920
TT
3942 printf_filtered (is_enumeral
3943 ? _(" (enumeral)\n")
3944 : _(" at ?\n"));
d72413e6 3945 }
4c4b4cd2 3946 }
14f9c5c9 3947 }
d2e4a39e 3948
14f9c5c9 3949 n_chosen = get_selections (chosen, nsyms, max_results, max_results > 1,
4c4b4cd2 3950 "overload-choice");
14f9c5c9
AS
3951
3952 for (i = 0; i < n_chosen; i += 1)
4c4b4cd2 3953 syms[i] = syms[chosen[i]];
14f9c5c9
AS
3954
3955 return n_chosen;
3956}
3957
3958/* Read and validate a set of numeric choices from the user in the
4c4b4cd2 3959 range 0 .. N_CHOICES-1. Place the results in increasing
14f9c5c9
AS
3960 order in CHOICES[0 .. N-1], and return N.
3961
3962 The user types choices as a sequence of numbers on one line
3963 separated by blanks, encoding them as follows:
3964
4c4b4cd2 3965 + A choice of 0 means to cancel the selection, throwing an error.
14f9c5c9
AS
3966 + If IS_ALL_CHOICE, a choice of 1 selects the entire set 0 .. N_CHOICES-1.
3967 + The user chooses k by typing k+IS_ALL_CHOICE+1.
3968
4c4b4cd2 3969 The user is not allowed to choose more than MAX_RESULTS values.
14f9c5c9
AS
3970
3971 ANNOTATION_SUFFIX, if present, is used to annotate the input
4c4b4cd2 3972 prompts (for use with the -f switch). */
14f9c5c9
AS
3973
3974int
d2e4a39e 3975get_selections (int *choices, int n_choices, int max_results,
a121b7c1 3976 int is_all_choice, const char *annotation_suffix)
14f9c5c9 3977{
d2e4a39e 3978 char *args;
a121b7c1 3979 const char *prompt;
14f9c5c9
AS
3980 int n_chosen;
3981 int first_choice = is_all_choice ? 2 : 1;
d2e4a39e 3982
14f9c5c9
AS
3983 prompt = getenv ("PS2");
3984 if (prompt == NULL)
0bcd0149 3985 prompt = "> ";
14f9c5c9 3986
89fbedf3 3987 args = command_line_input (prompt, annotation_suffix);
d2e4a39e 3988
14f9c5c9 3989 if (args == NULL)
323e0a4a 3990 error_no_arg (_("one or more choice numbers"));
14f9c5c9
AS
3991
3992 n_chosen = 0;
76a01679 3993
4c4b4cd2
PH
3994 /* Set choices[0 .. n_chosen-1] to the users' choices in ascending
3995 order, as given in args. Choices are validated. */
14f9c5c9
AS
3996 while (1)
3997 {
d2e4a39e 3998 char *args2;
14f9c5c9
AS
3999 int choice, j;
4000
0fcd72ba 4001 args = skip_spaces (args);
14f9c5c9 4002 if (*args == '\0' && n_chosen == 0)
323e0a4a 4003 error_no_arg (_("one or more choice numbers"));
14f9c5c9 4004 else if (*args == '\0')
4c4b4cd2 4005 break;
14f9c5c9
AS
4006
4007 choice = strtol (args, &args2, 10);
d2e4a39e 4008 if (args == args2 || choice < 0
4c4b4cd2 4009 || choice > n_choices + first_choice - 1)
323e0a4a 4010 error (_("Argument must be choice number"));
14f9c5c9
AS
4011 args = args2;
4012
d2e4a39e 4013 if (choice == 0)
323e0a4a 4014 error (_("cancelled"));
14f9c5c9
AS
4015
4016 if (choice < first_choice)
4c4b4cd2
PH
4017 {
4018 n_chosen = n_choices;
4019 for (j = 0; j < n_choices; j += 1)
4020 choices[j] = j;
4021 break;
4022 }
14f9c5c9
AS
4023 choice -= first_choice;
4024
d2e4a39e 4025 for (j = n_chosen - 1; j >= 0 && choice < choices[j]; j -= 1)
4c4b4cd2
PH
4026 {
4027 }
14f9c5c9
AS
4028
4029 if (j < 0 || choice != choices[j])
4c4b4cd2
PH
4030 {
4031 int k;
5b4ee69b 4032
4c4b4cd2
PH
4033 for (k = n_chosen - 1; k > j; k -= 1)
4034 choices[k + 1] = choices[k];
4035 choices[j + 1] = choice;
4036 n_chosen += 1;
4037 }
14f9c5c9
AS
4038 }
4039
4040 if (n_chosen > max_results)
323e0a4a 4041 error (_("Select no more than %d of the above"), max_results);
d2e4a39e 4042
14f9c5c9
AS
4043 return n_chosen;
4044}
4045
4c4b4cd2
PH
4046/* Replace the operator of length OPLEN at position PC in *EXPP with a call
4047 on the function identified by SYM and BLOCK, and taking NARGS
4048 arguments. Update *EXPP as needed to hold more space. */
14f9c5c9
AS
4049
4050static void
e9d9f57e 4051replace_operator_with_call (expression_up *expp, int pc, int nargs,
4c4b4cd2 4052 int oplen, struct symbol *sym,
270140bd 4053 const struct block *block)
14f9c5c9
AS
4054{
4055 /* A new expression, with 6 more elements (3 for funcall, 4 for function
4c4b4cd2 4056 symbol, -oplen for operator being replaced). */
d2e4a39e 4057 struct expression *newexp = (struct expression *)
8c1a34e7 4058 xzalloc (sizeof (struct expression)
4c4b4cd2 4059 + EXP_ELEM_TO_BYTES ((*expp)->nelts + 7 - oplen));
e9d9f57e 4060 struct expression *exp = expp->get ();
14f9c5c9
AS
4061
4062 newexp->nelts = exp->nelts + 7 - oplen;
4063 newexp->language_defn = exp->language_defn;
3489610d 4064 newexp->gdbarch = exp->gdbarch;
14f9c5c9 4065 memcpy (newexp->elts, exp->elts, EXP_ELEM_TO_BYTES (pc));
d2e4a39e 4066 memcpy (newexp->elts + pc + 7, exp->elts + pc + oplen,
4c4b4cd2 4067 EXP_ELEM_TO_BYTES (exp->nelts - pc - oplen));
14f9c5c9
AS
4068
4069 newexp->elts[pc].opcode = newexp->elts[pc + 2].opcode = OP_FUNCALL;
4070 newexp->elts[pc + 1].longconst = (LONGEST) nargs;
4071
4072 newexp->elts[pc + 3].opcode = newexp->elts[pc + 6].opcode = OP_VAR_VALUE;
4073 newexp->elts[pc + 4].block = block;
4074 newexp->elts[pc + 5].symbol = sym;
4075
e9d9f57e 4076 expp->reset (newexp);
d2e4a39e 4077}
14f9c5c9
AS
4078
4079/* Type-class predicates */
4080
4c4b4cd2
PH
4081/* True iff TYPE is numeric (i.e., an INT, RANGE (of numeric type),
4082 or FLOAT). */
14f9c5c9
AS
4083
4084static int
d2e4a39e 4085numeric_type_p (struct type *type)
14f9c5c9
AS
4086{
4087 if (type == NULL)
4088 return 0;
d2e4a39e
AS
4089 else
4090 {
4091 switch (TYPE_CODE (type))
4c4b4cd2
PH
4092 {
4093 case TYPE_CODE_INT:
4094 case TYPE_CODE_FLT:
4095 return 1;
4096 case TYPE_CODE_RANGE:
4097 return (type == TYPE_TARGET_TYPE (type)
4098 || numeric_type_p (TYPE_TARGET_TYPE (type)));
4099 default:
4100 return 0;
4101 }
d2e4a39e 4102 }
14f9c5c9
AS
4103}
4104
4c4b4cd2 4105/* True iff TYPE is integral (an INT or RANGE of INTs). */
14f9c5c9
AS
4106
4107static int
d2e4a39e 4108integer_type_p (struct type *type)
14f9c5c9
AS
4109{
4110 if (type == NULL)
4111 return 0;
d2e4a39e
AS
4112 else
4113 {
4114 switch (TYPE_CODE (type))
4c4b4cd2
PH
4115 {
4116 case TYPE_CODE_INT:
4117 return 1;
4118 case TYPE_CODE_RANGE:
4119 return (type == TYPE_TARGET_TYPE (type)
4120 || integer_type_p (TYPE_TARGET_TYPE (type)));
4121 default:
4122 return 0;
4123 }
d2e4a39e 4124 }
14f9c5c9
AS
4125}
4126
4c4b4cd2 4127/* True iff TYPE is scalar (INT, RANGE, FLOAT, ENUM). */
14f9c5c9
AS
4128
4129static int
d2e4a39e 4130scalar_type_p (struct type *type)
14f9c5c9
AS
4131{
4132 if (type == NULL)
4133 return 0;
d2e4a39e
AS
4134 else
4135 {
4136 switch (TYPE_CODE (type))
4c4b4cd2
PH
4137 {
4138 case TYPE_CODE_INT:
4139 case TYPE_CODE_RANGE:
4140 case TYPE_CODE_ENUM:
4141 case TYPE_CODE_FLT:
4142 return 1;
4143 default:
4144 return 0;
4145 }
d2e4a39e 4146 }
14f9c5c9
AS
4147}
4148
4c4b4cd2 4149/* True iff TYPE is discrete (INT, RANGE, ENUM). */
14f9c5c9
AS
4150
4151static int
d2e4a39e 4152discrete_type_p (struct type *type)
14f9c5c9
AS
4153{
4154 if (type == NULL)
4155 return 0;
d2e4a39e
AS
4156 else
4157 {
4158 switch (TYPE_CODE (type))
4c4b4cd2
PH
4159 {
4160 case TYPE_CODE_INT:
4161 case TYPE_CODE_RANGE:
4162 case TYPE_CODE_ENUM:
872f0337 4163 case TYPE_CODE_BOOL:
4c4b4cd2
PH
4164 return 1;
4165 default:
4166 return 0;
4167 }
d2e4a39e 4168 }
14f9c5c9
AS
4169}
4170
4c4b4cd2
PH
4171/* Returns non-zero if OP with operands in the vector ARGS could be
4172 a user-defined function. Errs on the side of pre-defined operators
4173 (i.e., result 0). */
14f9c5c9
AS
4174
4175static int
d2e4a39e 4176possible_user_operator_p (enum exp_opcode op, struct value *args[])
14f9c5c9 4177{
76a01679 4178 struct type *type0 =
df407dfe 4179 (args[0] == NULL) ? NULL : ada_check_typedef (value_type (args[0]));
d2e4a39e 4180 struct type *type1 =
df407dfe 4181 (args[1] == NULL) ? NULL : ada_check_typedef (value_type (args[1]));
d2e4a39e 4182
4c4b4cd2
PH
4183 if (type0 == NULL)
4184 return 0;
4185
14f9c5c9
AS
4186 switch (op)
4187 {
4188 default:
4189 return 0;
4190
4191 case BINOP_ADD:
4192 case BINOP_SUB:
4193 case BINOP_MUL:
4194 case BINOP_DIV:
d2e4a39e 4195 return (!(numeric_type_p (type0) && numeric_type_p (type1)));
14f9c5c9
AS
4196
4197 case BINOP_REM:
4198 case BINOP_MOD:
4199 case BINOP_BITWISE_AND:
4200 case BINOP_BITWISE_IOR:
4201 case BINOP_BITWISE_XOR:
d2e4a39e 4202 return (!(integer_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4203
4204 case BINOP_EQUAL:
4205 case BINOP_NOTEQUAL:
4206 case BINOP_LESS:
4207 case BINOP_GTR:
4208 case BINOP_LEQ:
4209 case BINOP_GEQ:
d2e4a39e 4210 return (!(scalar_type_p (type0) && scalar_type_p (type1)));
14f9c5c9
AS
4211
4212 case BINOP_CONCAT:
ee90b9ab 4213 return !ada_is_array_type (type0) || !ada_is_array_type (type1);
14f9c5c9
AS
4214
4215 case BINOP_EXP:
d2e4a39e 4216 return (!(numeric_type_p (type0) && integer_type_p (type1)));
14f9c5c9
AS
4217
4218 case UNOP_NEG:
4219 case UNOP_PLUS:
4220 case UNOP_LOGICAL_NOT:
d2e4a39e
AS
4221 case UNOP_ABS:
4222 return (!numeric_type_p (type0));
14f9c5c9
AS
4223
4224 }
4225}
4226\f
4c4b4cd2 4227 /* Renaming */
14f9c5c9 4228
aeb5907d
JB
4229/* NOTES:
4230
4231 1. In the following, we assume that a renaming type's name may
4232 have an ___XD suffix. It would be nice if this went away at some
4233 point.
4234 2. We handle both the (old) purely type-based representation of
4235 renamings and the (new) variable-based encoding. At some point,
4236 it is devoutly to be hoped that the former goes away
4237 (FIXME: hilfinger-2007-07-09).
4238 3. Subprogram renamings are not implemented, although the XRS
4239 suffix is recognized (FIXME: hilfinger-2007-07-09). */
4240
4241/* If SYM encodes a renaming,
4242
4243 <renaming> renames <renamed entity>,
4244
4245 sets *LEN to the length of the renamed entity's name,
4246 *RENAMED_ENTITY to that name (not null-terminated), and *RENAMING_EXPR to
4247 the string describing the subcomponent selected from the renamed
0963b4bd 4248 entity. Returns ADA_NOT_RENAMING if SYM does not encode a renaming
aeb5907d
JB
4249 (in which case, the values of *RENAMED_ENTITY, *LEN, and *RENAMING_EXPR
4250 are undefined). Otherwise, returns a value indicating the category
4251 of entity renamed: an object (ADA_OBJECT_RENAMING), exception
4252 (ADA_EXCEPTION_RENAMING), package (ADA_PACKAGE_RENAMING), or
4253 subprogram (ADA_SUBPROGRAM_RENAMING). Does no allocation; the
4254 strings returned in *RENAMED_ENTITY and *RENAMING_EXPR should not be
4255 deallocated. The values of RENAMED_ENTITY, LEN, or RENAMING_EXPR
4256 may be NULL, in which case they are not assigned.
4257
4258 [Currently, however, GCC does not generate subprogram renamings.] */
4259
4260enum ada_renaming_category
4261ada_parse_renaming (struct symbol *sym,
4262 const char **renamed_entity, int *len,
4263 const char **renaming_expr)
4264{
4265 enum ada_renaming_category kind;
4266 const char *info;
4267 const char *suffix;
4268
4269 if (sym == NULL)
4270 return ADA_NOT_RENAMING;
4271 switch (SYMBOL_CLASS (sym))
14f9c5c9 4272 {
aeb5907d
JB
4273 default:
4274 return ADA_NOT_RENAMING;
aeb5907d
JB
4275 case LOC_LOCAL:
4276 case LOC_STATIC:
4277 case LOC_COMPUTED:
4278 case LOC_OPTIMIZED_OUT:
4279 info = strstr (SYMBOL_LINKAGE_NAME (sym), "___XR");
4280 if (info == NULL)
4281 return ADA_NOT_RENAMING;
4282 switch (info[5])
4283 {
4284 case '_':
4285 kind = ADA_OBJECT_RENAMING;
4286 info += 6;
4287 break;
4288 case 'E':
4289 kind = ADA_EXCEPTION_RENAMING;
4290 info += 7;
4291 break;
4292 case 'P':
4293 kind = ADA_PACKAGE_RENAMING;
4294 info += 7;
4295 break;
4296 case 'S':
4297 kind = ADA_SUBPROGRAM_RENAMING;
4298 info += 7;
4299 break;
4300 default:
4301 return ADA_NOT_RENAMING;
4302 }
14f9c5c9 4303 }
4c4b4cd2 4304
aeb5907d
JB
4305 if (renamed_entity != NULL)
4306 *renamed_entity = info;
4307 suffix = strstr (info, "___XE");
4308 if (suffix == NULL || suffix == info)
4309 return ADA_NOT_RENAMING;
4310 if (len != NULL)
4311 *len = strlen (info) - strlen (suffix);
4312 suffix += 5;
4313 if (renaming_expr != NULL)
4314 *renaming_expr = suffix;
4315 return kind;
4316}
4317
a5ee536b
JB
4318/* Compute the value of the given RENAMING_SYM, which is expected to
4319 be a symbol encoding a renaming expression. BLOCK is the block
4320 used to evaluate the renaming. */
52ce6436 4321
a5ee536b
JB
4322static struct value *
4323ada_read_renaming_var_value (struct symbol *renaming_sym,
3977b71f 4324 const struct block *block)
a5ee536b 4325{
bbc13ae3 4326 const char *sym_name;
a5ee536b 4327
bbc13ae3 4328 sym_name = SYMBOL_LINKAGE_NAME (renaming_sym);
4d01a485
PA
4329 expression_up expr = parse_exp_1 (&sym_name, 0, block, 0);
4330 return evaluate_expression (expr.get ());
a5ee536b 4331}
14f9c5c9 4332\f
d2e4a39e 4333
4c4b4cd2 4334 /* Evaluation: Function Calls */
14f9c5c9 4335
4c4b4cd2 4336/* Return an lvalue containing the value VAL. This is the identity on
40bc484c
JB
4337 lvalues, and otherwise has the side-effect of allocating memory
4338 in the inferior where a copy of the value contents is copied. */
14f9c5c9 4339
d2e4a39e 4340static struct value *
40bc484c 4341ensure_lval (struct value *val)
14f9c5c9 4342{
40bc484c
JB
4343 if (VALUE_LVAL (val) == not_lval
4344 || VALUE_LVAL (val) == lval_internalvar)
c3e5cd34 4345 {
df407dfe 4346 int len = TYPE_LENGTH (ada_check_typedef (value_type (val)));
40bc484c
JB
4347 const CORE_ADDR addr =
4348 value_as_long (value_allocate_space_in_inferior (len));
c3e5cd34 4349
a84a8a0d 4350 VALUE_LVAL (val) = lval_memory;
1a088441 4351 set_value_address (val, addr);
40bc484c 4352 write_memory (addr, value_contents (val), len);
c3e5cd34 4353 }
14f9c5c9
AS
4354
4355 return val;
4356}
4357
4358/* Return the value ACTUAL, converted to be an appropriate value for a
4359 formal of type FORMAL_TYPE. Use *SP as a stack pointer for
4360 allocating any necessary descriptors (fat pointers), or copies of
4c4b4cd2 4361 values not residing in memory, updating it as needed. */
14f9c5c9 4362
a93c0eb6 4363struct value *
40bc484c 4364ada_convert_actual (struct value *actual, struct type *formal_type0)
14f9c5c9 4365{
df407dfe 4366 struct type *actual_type = ada_check_typedef (value_type (actual));
61ee279c 4367 struct type *formal_type = ada_check_typedef (formal_type0);
d2e4a39e
AS
4368 struct type *formal_target =
4369 TYPE_CODE (formal_type) == TYPE_CODE_PTR
61ee279c 4370 ? ada_check_typedef (TYPE_TARGET_TYPE (formal_type)) : formal_type;
d2e4a39e
AS
4371 struct type *actual_target =
4372 TYPE_CODE (actual_type) == TYPE_CODE_PTR
61ee279c 4373 ? ada_check_typedef (TYPE_TARGET_TYPE (actual_type)) : actual_type;
14f9c5c9 4374
4c4b4cd2 4375 if (ada_is_array_descriptor_type (formal_target)
14f9c5c9 4376 && TYPE_CODE (actual_target) == TYPE_CODE_ARRAY)
40bc484c 4377 return make_array_descriptor (formal_type, actual);
a84a8a0d
JB
4378 else if (TYPE_CODE (formal_type) == TYPE_CODE_PTR
4379 || TYPE_CODE (formal_type) == TYPE_CODE_REF)
14f9c5c9 4380 {
a84a8a0d 4381 struct value *result;
5b4ee69b 4382
14f9c5c9 4383 if (TYPE_CODE (formal_target) == TYPE_CODE_ARRAY
4c4b4cd2 4384 && ada_is_array_descriptor_type (actual_target))
a84a8a0d 4385 result = desc_data (actual);
cb923fcc 4386 else if (TYPE_CODE (formal_type) != TYPE_CODE_PTR)
4c4b4cd2
PH
4387 {
4388 if (VALUE_LVAL (actual) != lval_memory)
4389 {
4390 struct value *val;
5b4ee69b 4391
df407dfe 4392 actual_type = ada_check_typedef (value_type (actual));
4c4b4cd2 4393 val = allocate_value (actual_type);
990a07ab 4394 memcpy ((char *) value_contents_raw (val),
0fd88904 4395 (char *) value_contents (actual),
4c4b4cd2 4396 TYPE_LENGTH (actual_type));
40bc484c 4397 actual = ensure_lval (val);
4c4b4cd2 4398 }
a84a8a0d 4399 result = value_addr (actual);
4c4b4cd2 4400 }
a84a8a0d
JB
4401 else
4402 return actual;
b1af9e97 4403 return value_cast_pointers (formal_type, result, 0);
14f9c5c9
AS
4404 }
4405 else if (TYPE_CODE (actual_type) == TYPE_CODE_PTR)
4406 return ada_value_ind (actual);
8344af1e
JB
4407 else if (ada_is_aligner_type (formal_type))
4408 {
4409 /* We need to turn this parameter into an aligner type
4410 as well. */
4411 struct value *aligner = allocate_value (formal_type);
4412 struct value *component = ada_value_struct_elt (aligner, "F", 0);
4413
4414 value_assign_to_component (aligner, component, actual);
4415 return aligner;
4416 }
14f9c5c9
AS
4417
4418 return actual;
4419}
4420
438c98a1
JB
4421/* Convert VALUE (which must be an address) to a CORE_ADDR that is a pointer of
4422 type TYPE. This is usually an inefficient no-op except on some targets
4423 (such as AVR) where the representation of a pointer and an address
4424 differs. */
4425
4426static CORE_ADDR
4427value_pointer (struct value *value, struct type *type)
4428{
4429 struct gdbarch *gdbarch = get_type_arch (type);
4430 unsigned len = TYPE_LENGTH (type);
224c3ddb 4431 gdb_byte *buf = (gdb_byte *) alloca (len);
438c98a1
JB
4432 CORE_ADDR addr;
4433
4434 addr = value_address (value);
4435 gdbarch_address_to_pointer (gdbarch, type, buf, addr);
4436 addr = extract_unsigned_integer (buf, len, gdbarch_byte_order (gdbarch));
4437 return addr;
4438}
4439
14f9c5c9 4440
4c4b4cd2
PH
4441/* Push a descriptor of type TYPE for array value ARR on the stack at
4442 *SP, updating *SP to reflect the new descriptor. Return either
14f9c5c9 4443 an lvalue representing the new descriptor, or (if TYPE is a pointer-
4c4b4cd2
PH
4444 to-descriptor type rather than a descriptor type), a struct value *
4445 representing a pointer to this descriptor. */
14f9c5c9 4446
d2e4a39e 4447static struct value *
40bc484c 4448make_array_descriptor (struct type *type, struct value *arr)
14f9c5c9 4449{
d2e4a39e
AS
4450 struct type *bounds_type = desc_bounds_type (type);
4451 struct type *desc_type = desc_base_type (type);
4452 struct value *descriptor = allocate_value (desc_type);
4453 struct value *bounds = allocate_value (bounds_type);
14f9c5c9 4454 int i;
d2e4a39e 4455
0963b4bd
MS
4456 for (i = ada_array_arity (ada_check_typedef (value_type (arr)));
4457 i > 0; i -= 1)
14f9c5c9 4458 {
19f220c3
JK
4459 modify_field (value_type (bounds), value_contents_writeable (bounds),
4460 ada_array_bound (arr, i, 0),
4461 desc_bound_bitpos (bounds_type, i, 0),
4462 desc_bound_bitsize (bounds_type, i, 0));
4463 modify_field (value_type (bounds), value_contents_writeable (bounds),
4464 ada_array_bound (arr, i, 1),
4465 desc_bound_bitpos (bounds_type, i, 1),
4466 desc_bound_bitsize (bounds_type, i, 1));
14f9c5c9 4467 }
d2e4a39e 4468
40bc484c 4469 bounds = ensure_lval (bounds);
d2e4a39e 4470
19f220c3
JK
4471 modify_field (value_type (descriptor),
4472 value_contents_writeable (descriptor),
4473 value_pointer (ensure_lval (arr),
4474 TYPE_FIELD_TYPE (desc_type, 0)),
4475 fat_pntr_data_bitpos (desc_type),
4476 fat_pntr_data_bitsize (desc_type));
4477
4478 modify_field (value_type (descriptor),
4479 value_contents_writeable (descriptor),
4480 value_pointer (bounds,
4481 TYPE_FIELD_TYPE (desc_type, 1)),
4482 fat_pntr_bounds_bitpos (desc_type),
4483 fat_pntr_bounds_bitsize (desc_type));
14f9c5c9 4484
40bc484c 4485 descriptor = ensure_lval (descriptor);
14f9c5c9
AS
4486
4487 if (TYPE_CODE (type) == TYPE_CODE_PTR)
4488 return value_addr (descriptor);
4489 else
4490 return descriptor;
4491}
14f9c5c9 4492\f
3d9434b5
JB
4493 /* Symbol Cache Module */
4494
3d9434b5 4495/* Performance measurements made as of 2010-01-15 indicate that
ee01b665 4496 this cache does bring some noticeable improvements. Depending
3d9434b5
JB
4497 on the type of entity being printed, the cache can make it as much
4498 as an order of magnitude faster than without it.
4499
4500 The descriptive type DWARF extension has significantly reduced
4501 the need for this cache, at least when DWARF is being used. However,
4502 even in this case, some expensive name-based symbol searches are still
4503 sometimes necessary - to find an XVZ variable, mostly. */
4504
ee01b665 4505/* Initialize the contents of SYM_CACHE. */
3d9434b5 4506
ee01b665
JB
4507static void
4508ada_init_symbol_cache (struct ada_symbol_cache *sym_cache)
4509{
4510 obstack_init (&sym_cache->cache_space);
4511 memset (sym_cache->root, '\000', sizeof (sym_cache->root));
4512}
3d9434b5 4513
ee01b665
JB
4514/* Free the memory used by SYM_CACHE. */
4515
4516static void
4517ada_free_symbol_cache (struct ada_symbol_cache *sym_cache)
3d9434b5 4518{
ee01b665
JB
4519 obstack_free (&sym_cache->cache_space, NULL);
4520 xfree (sym_cache);
4521}
3d9434b5 4522
ee01b665
JB
4523/* Return the symbol cache associated to the given program space PSPACE.
4524 If not allocated for this PSPACE yet, allocate and initialize one. */
3d9434b5 4525
ee01b665
JB
4526static struct ada_symbol_cache *
4527ada_get_symbol_cache (struct program_space *pspace)
4528{
4529 struct ada_pspace_data *pspace_data = get_ada_pspace_data (pspace);
ee01b665 4530
66c168ae 4531 if (pspace_data->sym_cache == NULL)
ee01b665 4532 {
66c168ae
JB
4533 pspace_data->sym_cache = XCNEW (struct ada_symbol_cache);
4534 ada_init_symbol_cache (pspace_data->sym_cache);
ee01b665
JB
4535 }
4536
66c168ae 4537 return pspace_data->sym_cache;
ee01b665 4538}
3d9434b5
JB
4539
4540/* Clear all entries from the symbol cache. */
4541
4542static void
4543ada_clear_symbol_cache (void)
4544{
ee01b665
JB
4545 struct ada_symbol_cache *sym_cache
4546 = ada_get_symbol_cache (current_program_space);
4547
4548 obstack_free (&sym_cache->cache_space, NULL);
4549 ada_init_symbol_cache (sym_cache);
3d9434b5
JB
4550}
4551
fe978cb0 4552/* Search our cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4553 Return it if found, or NULL otherwise. */
4554
4555static struct cache_entry **
fe978cb0 4556find_entry (const char *name, domain_enum domain)
3d9434b5 4557{
ee01b665
JB
4558 struct ada_symbol_cache *sym_cache
4559 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4560 int h = msymbol_hash (name) % HASH_SIZE;
4561 struct cache_entry **e;
4562
ee01b665 4563 for (e = &sym_cache->root[h]; *e != NULL; e = &(*e)->next)
3d9434b5 4564 {
fe978cb0 4565 if (domain == (*e)->domain && strcmp (name, (*e)->name) == 0)
3d9434b5
JB
4566 return e;
4567 }
4568 return NULL;
4569}
4570
fe978cb0 4571/* Search the symbol cache for an entry matching NAME and DOMAIN.
3d9434b5
JB
4572 Return 1 if found, 0 otherwise.
4573
4574 If an entry was found and SYM is not NULL, set *SYM to the entry's
4575 SYM. Same principle for BLOCK if not NULL. */
96d887e8 4576
96d887e8 4577static int
fe978cb0 4578lookup_cached_symbol (const char *name, domain_enum domain,
f0c5f9b2 4579 struct symbol **sym, const struct block **block)
96d887e8 4580{
fe978cb0 4581 struct cache_entry **e = find_entry (name, domain);
3d9434b5
JB
4582
4583 if (e == NULL)
4584 return 0;
4585 if (sym != NULL)
4586 *sym = (*e)->sym;
4587 if (block != NULL)
4588 *block = (*e)->block;
4589 return 1;
96d887e8
PH
4590}
4591
3d9434b5 4592/* Assuming that (SYM, BLOCK) is the result of the lookup of NAME
fe978cb0 4593 in domain DOMAIN, save this result in our symbol cache. */
3d9434b5 4594
96d887e8 4595static void
fe978cb0 4596cache_symbol (const char *name, domain_enum domain, struct symbol *sym,
270140bd 4597 const struct block *block)
96d887e8 4598{
ee01b665
JB
4599 struct ada_symbol_cache *sym_cache
4600 = ada_get_symbol_cache (current_program_space);
3d9434b5
JB
4601 int h;
4602 char *copy;
4603 struct cache_entry *e;
4604
1994afbf
DE
4605 /* Symbols for builtin types don't have a block.
4606 For now don't cache such symbols. */
4607 if (sym != NULL && !SYMBOL_OBJFILE_OWNED (sym))
4608 return;
4609
3d9434b5
JB
4610 /* If the symbol is a local symbol, then do not cache it, as a search
4611 for that symbol depends on the context. To determine whether
4612 the symbol is local or not, we check the block where we found it
4613 against the global and static blocks of its associated symtab. */
4614 if (sym
08be3fe3 4615 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4616 GLOBAL_BLOCK) != block
08be3fe3 4617 && BLOCKVECTOR_BLOCK (SYMTAB_BLOCKVECTOR (symbol_symtab (sym)),
439247b6 4618 STATIC_BLOCK) != block)
3d9434b5
JB
4619 return;
4620
4621 h = msymbol_hash (name) % HASH_SIZE;
e39db4db 4622 e = XOBNEW (&sym_cache->cache_space, cache_entry);
ee01b665
JB
4623 e->next = sym_cache->root[h];
4624 sym_cache->root[h] = e;
224c3ddb
SM
4625 e->name = copy
4626 = (char *) obstack_alloc (&sym_cache->cache_space, strlen (name) + 1);
3d9434b5
JB
4627 strcpy (copy, name);
4628 e->sym = sym;
fe978cb0 4629 e->domain = domain;
3d9434b5 4630 e->block = block;
96d887e8 4631}
4c4b4cd2
PH
4632\f
4633 /* Symbol Lookup */
4634
b5ec771e
PA
4635/* Return the symbol name match type that should be used used when
4636 searching for all symbols matching LOOKUP_NAME.
c0431670
JB
4637
4638 LOOKUP_NAME is expected to be a symbol name after transformation
f98b2e33 4639 for Ada lookups. */
c0431670 4640
b5ec771e
PA
4641static symbol_name_match_type
4642name_match_type_from_name (const char *lookup_name)
c0431670 4643{
b5ec771e
PA
4644 return (strstr (lookup_name, "__") == NULL
4645 ? symbol_name_match_type::WILD
4646 : symbol_name_match_type::FULL);
c0431670
JB
4647}
4648
4c4b4cd2
PH
4649/* Return the result of a standard (literal, C-like) lookup of NAME in
4650 given DOMAIN, visible from lexical block BLOCK. */
4651
4652static struct symbol *
4653standard_lookup (const char *name, const struct block *block,
4654 domain_enum domain)
4655{
acbd605d 4656 /* Initialize it just to avoid a GCC false warning. */
6640a367 4657 struct block_symbol sym = {};
4c4b4cd2 4658
d12307c1
PMR
4659 if (lookup_cached_symbol (name, domain, &sym.symbol, NULL))
4660 return sym.symbol;
a2cd4f14 4661 ada_lookup_encoded_symbol (name, block, domain, &sym);
d12307c1
PMR
4662 cache_symbol (name, domain, sym.symbol, sym.block);
4663 return sym.symbol;
4c4b4cd2
PH
4664}
4665
4666
4667/* Non-zero iff there is at least one non-function/non-enumeral symbol
4668 in the symbol fields of SYMS[0..N-1]. We treat enumerals as functions,
4669 since they contend in overloading in the same way. */
4670static int
d12307c1 4671is_nonfunction (struct block_symbol syms[], int n)
4c4b4cd2
PH
4672{
4673 int i;
4674
4675 for (i = 0; i < n; i += 1)
d12307c1
PMR
4676 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_FUNC
4677 && (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM
4678 || SYMBOL_CLASS (syms[i].symbol) != LOC_CONST))
14f9c5c9
AS
4679 return 1;
4680
4681 return 0;
4682}
4683
4684/* If true (non-zero), then TYPE0 and TYPE1 represent equivalent
4c4b4cd2 4685 struct types. Otherwise, they may not. */
14f9c5c9
AS
4686
4687static int
d2e4a39e 4688equiv_types (struct type *type0, struct type *type1)
14f9c5c9 4689{
d2e4a39e 4690 if (type0 == type1)
14f9c5c9 4691 return 1;
d2e4a39e 4692 if (type0 == NULL || type1 == NULL
14f9c5c9
AS
4693 || TYPE_CODE (type0) != TYPE_CODE (type1))
4694 return 0;
d2e4a39e 4695 if ((TYPE_CODE (type0) == TYPE_CODE_STRUCT
14f9c5c9
AS
4696 || TYPE_CODE (type0) == TYPE_CODE_ENUM)
4697 && ada_type_name (type0) != NULL && ada_type_name (type1) != NULL
4c4b4cd2 4698 && strcmp (ada_type_name (type0), ada_type_name (type1)) == 0)
14f9c5c9 4699 return 1;
d2e4a39e 4700
14f9c5c9
AS
4701 return 0;
4702}
4703
4704/* True iff SYM0 represents the same entity as SYM1, or one that is
4c4b4cd2 4705 no more defined than that of SYM1. */
14f9c5c9
AS
4706
4707static int
d2e4a39e 4708lesseq_defined_than (struct symbol *sym0, struct symbol *sym1)
14f9c5c9
AS
4709{
4710 if (sym0 == sym1)
4711 return 1;
176620f1 4712 if (SYMBOL_DOMAIN (sym0) != SYMBOL_DOMAIN (sym1)
14f9c5c9
AS
4713 || SYMBOL_CLASS (sym0) != SYMBOL_CLASS (sym1))
4714 return 0;
4715
d2e4a39e 4716 switch (SYMBOL_CLASS (sym0))
14f9c5c9
AS
4717 {
4718 case LOC_UNDEF:
4719 return 1;
4720 case LOC_TYPEDEF:
4721 {
4c4b4cd2
PH
4722 struct type *type0 = SYMBOL_TYPE (sym0);
4723 struct type *type1 = SYMBOL_TYPE (sym1);
0d5cff50
DE
4724 const char *name0 = SYMBOL_LINKAGE_NAME (sym0);
4725 const char *name1 = SYMBOL_LINKAGE_NAME (sym1);
4c4b4cd2 4726 int len0 = strlen (name0);
5b4ee69b 4727
4c4b4cd2
PH
4728 return
4729 TYPE_CODE (type0) == TYPE_CODE (type1)
4730 && (equiv_types (type0, type1)
4731 || (len0 < strlen (name1) && strncmp (name0, name1, len0) == 0
61012eef 4732 && startswith (name1 + len0, "___XV")));
14f9c5c9
AS
4733 }
4734 case LOC_CONST:
4735 return SYMBOL_VALUE (sym0) == SYMBOL_VALUE (sym1)
4c4b4cd2 4736 && equiv_types (SYMBOL_TYPE (sym0), SYMBOL_TYPE (sym1));
d2e4a39e
AS
4737 default:
4738 return 0;
14f9c5c9
AS
4739 }
4740}
4741
d12307c1 4742/* Append (SYM,BLOCK,SYMTAB) to the end of the array of struct block_symbol
4c4b4cd2 4743 records in OBSTACKP. Do nothing if SYM is a duplicate. */
14f9c5c9
AS
4744
4745static void
76a01679
JB
4746add_defn_to_vec (struct obstack *obstackp,
4747 struct symbol *sym,
f0c5f9b2 4748 const struct block *block)
14f9c5c9
AS
4749{
4750 int i;
d12307c1 4751 struct block_symbol *prevDefns = defns_collected (obstackp, 0);
14f9c5c9 4752
529cad9c
PH
4753 /* Do not try to complete stub types, as the debugger is probably
4754 already scanning all symbols matching a certain name at the
4755 time when this function is called. Trying to replace the stub
4756 type by its associated full type will cause us to restart a scan
4757 which may lead to an infinite recursion. Instead, the client
4758 collecting the matching symbols will end up collecting several
4759 matches, with at least one of them complete. It can then filter
4760 out the stub ones if needed. */
4761
4c4b4cd2
PH
4762 for (i = num_defns_collected (obstackp) - 1; i >= 0; i -= 1)
4763 {
d12307c1 4764 if (lesseq_defined_than (sym, prevDefns[i].symbol))
4c4b4cd2 4765 return;
d12307c1 4766 else if (lesseq_defined_than (prevDefns[i].symbol, sym))
4c4b4cd2 4767 {
d12307c1 4768 prevDefns[i].symbol = sym;
4c4b4cd2 4769 prevDefns[i].block = block;
4c4b4cd2 4770 return;
76a01679 4771 }
4c4b4cd2
PH
4772 }
4773
4774 {
d12307c1 4775 struct block_symbol info;
4c4b4cd2 4776
d12307c1 4777 info.symbol = sym;
4c4b4cd2 4778 info.block = block;
d12307c1 4779 obstack_grow (obstackp, &info, sizeof (struct block_symbol));
4c4b4cd2
PH
4780 }
4781}
4782
d12307c1
PMR
4783/* Number of block_symbol structures currently collected in current vector in
4784 OBSTACKP. */
4c4b4cd2 4785
76a01679
JB
4786static int
4787num_defns_collected (struct obstack *obstackp)
4c4b4cd2 4788{
d12307c1 4789 return obstack_object_size (obstackp) / sizeof (struct block_symbol);
4c4b4cd2
PH
4790}
4791
d12307c1
PMR
4792/* Vector of block_symbol structures currently collected in current vector in
4793 OBSTACKP. If FINISH, close off the vector and return its final address. */
4c4b4cd2 4794
d12307c1 4795static struct block_symbol *
4c4b4cd2
PH
4796defns_collected (struct obstack *obstackp, int finish)
4797{
4798 if (finish)
224c3ddb 4799 return (struct block_symbol *) obstack_finish (obstackp);
4c4b4cd2 4800 else
d12307c1 4801 return (struct block_symbol *) obstack_base (obstackp);
4c4b4cd2
PH
4802}
4803
7c7b6655
TT
4804/* Return a bound minimal symbol matching NAME according to Ada
4805 decoding rules. Returns an invalid symbol if there is no such
4806 minimal symbol. Names prefixed with "standard__" are handled
4807 specially: "standard__" is first stripped off, and only static and
4808 global symbols are searched. */
4c4b4cd2 4809
7c7b6655 4810struct bound_minimal_symbol
96d887e8 4811ada_lookup_simple_minsym (const char *name)
4c4b4cd2 4812{
7c7b6655 4813 struct bound_minimal_symbol result;
4c4b4cd2 4814
7c7b6655
TT
4815 memset (&result, 0, sizeof (result));
4816
b5ec771e
PA
4817 symbol_name_match_type match_type = name_match_type_from_name (name);
4818 lookup_name_info lookup_name (name, match_type);
4819
4820 symbol_name_matcher_ftype *match_name
4821 = ada_get_symbol_name_matcher (lookup_name);
4c4b4cd2 4822
2030c079 4823 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 4824 {
7932255d 4825 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
4826 {
4827 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), lookup_name, NULL)
4828 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4829 {
4830 result.minsym = msymbol;
4831 result.objfile = objfile;
4832 break;
4833 }
4834 }
4835 }
4c4b4cd2 4836
7c7b6655 4837 return result;
96d887e8 4838}
4c4b4cd2 4839
2ff0a947
TT
4840/* Return all the bound minimal symbols matching NAME according to Ada
4841 decoding rules. Returns an empty vector if there is no such
4842 minimal symbol. Names prefixed with "standard__" are handled
4843 specially: "standard__" is first stripped off, and only static and
4844 global symbols are searched. */
4845
4846static std::vector<struct bound_minimal_symbol>
4847ada_lookup_simple_minsyms (const char *name)
4848{
4849 std::vector<struct bound_minimal_symbol> result;
4850
4851 symbol_name_match_type match_type = name_match_type_from_name (name);
4852 lookup_name_info lookup_name (name, match_type);
4853
4854 symbol_name_matcher_ftype *match_name
4855 = ada_get_symbol_name_matcher (lookup_name);
4856
4857 for (objfile *objfile : current_program_space->objfiles ())
4858 {
4859 for (minimal_symbol *msymbol : objfile->msymbols ())
4860 {
4861 if (match_name (MSYMBOL_LINKAGE_NAME (msymbol), lookup_name, NULL)
4862 && MSYMBOL_TYPE (msymbol) != mst_solib_trampoline)
4863 result.push_back ({msymbol, objfile});
4864 }
4865 }
4866
4867 return result;
4868}
4869
96d887e8
PH
4870/* For all subprograms that statically enclose the subprogram of the
4871 selected frame, add symbols matching identifier NAME in DOMAIN
4872 and their blocks to the list of data in OBSTACKP, as for
48b78332
JB
4873 ada_add_block_symbols (q.v.). If WILD_MATCH_P, treat as NAME
4874 with a wildcard prefix. */
4c4b4cd2 4875
96d887e8
PH
4876static void
4877add_symbols_from_enclosing_procs (struct obstack *obstackp,
b5ec771e
PA
4878 const lookup_name_info &lookup_name,
4879 domain_enum domain)
96d887e8 4880{
96d887e8 4881}
14f9c5c9 4882
96d887e8
PH
4883/* True if TYPE is definitely an artificial type supplied to a symbol
4884 for which no debugging information was given in the symbol file. */
14f9c5c9 4885
96d887e8
PH
4886static int
4887is_nondebugging_type (struct type *type)
4888{
0d5cff50 4889 const char *name = ada_type_name (type);
5b4ee69b 4890
96d887e8
PH
4891 return (name != NULL && strcmp (name, "<variable, no debug info>") == 0);
4892}
4c4b4cd2 4893
8f17729f
JB
4894/* Return nonzero if TYPE1 and TYPE2 are two enumeration types
4895 that are deemed "identical" for practical purposes.
4896
4897 This function assumes that TYPE1 and TYPE2 are both TYPE_CODE_ENUM
4898 types and that their number of enumerals is identical (in other
4899 words, TYPE_NFIELDS (type1) == TYPE_NFIELDS (type2)). */
4900
4901static int
4902ada_identical_enum_types_p (struct type *type1, struct type *type2)
4903{
4904 int i;
4905
4906 /* The heuristic we use here is fairly conservative. We consider
4907 that 2 enumerate types are identical if they have the same
4908 number of enumerals and that all enumerals have the same
4909 underlying value and name. */
4910
4911 /* All enums in the type should have an identical underlying value. */
4912 for (i = 0; i < TYPE_NFIELDS (type1); i++)
14e75d8e 4913 if (TYPE_FIELD_ENUMVAL (type1, i) != TYPE_FIELD_ENUMVAL (type2, i))
8f17729f
JB
4914 return 0;
4915
4916 /* All enumerals should also have the same name (modulo any numerical
4917 suffix). */
4918 for (i = 0; i < TYPE_NFIELDS (type1); i++)
4919 {
0d5cff50
DE
4920 const char *name_1 = TYPE_FIELD_NAME (type1, i);
4921 const char *name_2 = TYPE_FIELD_NAME (type2, i);
8f17729f
JB
4922 int len_1 = strlen (name_1);
4923 int len_2 = strlen (name_2);
4924
4925 ada_remove_trailing_digits (TYPE_FIELD_NAME (type1, i), &len_1);
4926 ada_remove_trailing_digits (TYPE_FIELD_NAME (type2, i), &len_2);
4927 if (len_1 != len_2
4928 || strncmp (TYPE_FIELD_NAME (type1, i),
4929 TYPE_FIELD_NAME (type2, i),
4930 len_1) != 0)
4931 return 0;
4932 }
4933
4934 return 1;
4935}
4936
4937/* Return nonzero if all the symbols in SYMS are all enumeral symbols
4938 that are deemed "identical" for practical purposes. Sometimes,
4939 enumerals are not strictly identical, but their types are so similar
4940 that they can be considered identical.
4941
4942 For instance, consider the following code:
4943
4944 type Color is (Black, Red, Green, Blue, White);
4945 type RGB_Color is new Color range Red .. Blue;
4946
4947 Type RGB_Color is a subrange of an implicit type which is a copy
4948 of type Color. If we call that implicit type RGB_ColorB ("B" is
4949 for "Base Type"), then type RGB_ColorB is a copy of type Color.
4950 As a result, when an expression references any of the enumeral
4951 by name (Eg. "print green"), the expression is technically
4952 ambiguous and the user should be asked to disambiguate. But
4953 doing so would only hinder the user, since it wouldn't matter
4954 what choice he makes, the outcome would always be the same.
4955 So, for practical purposes, we consider them as the same. */
4956
4957static int
54d343a2 4958symbols_are_identical_enums (const std::vector<struct block_symbol> &syms)
8f17729f
JB
4959{
4960 int i;
4961
4962 /* Before performing a thorough comparison check of each type,
4963 we perform a series of inexpensive checks. We expect that these
4964 checks will quickly fail in the vast majority of cases, and thus
4965 help prevent the unnecessary use of a more expensive comparison.
4966 Said comparison also expects us to make some of these checks
4967 (see ada_identical_enum_types_p). */
4968
4969 /* Quick check: All symbols should have an enum type. */
54d343a2 4970 for (i = 0; i < syms.size (); i++)
d12307c1 4971 if (TYPE_CODE (SYMBOL_TYPE (syms[i].symbol)) != TYPE_CODE_ENUM)
8f17729f
JB
4972 return 0;
4973
4974 /* Quick check: They should all have the same value. */
54d343a2 4975 for (i = 1; i < syms.size (); i++)
d12307c1 4976 if (SYMBOL_VALUE (syms[i].symbol) != SYMBOL_VALUE (syms[0].symbol))
8f17729f
JB
4977 return 0;
4978
4979 /* Quick check: They should all have the same number of enumerals. */
54d343a2 4980 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
4981 if (TYPE_NFIELDS (SYMBOL_TYPE (syms[i].symbol))
4982 != TYPE_NFIELDS (SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
4983 return 0;
4984
4985 /* All the sanity checks passed, so we might have a set of
4986 identical enumeration types. Perform a more complete
4987 comparison of the type of each symbol. */
54d343a2 4988 for (i = 1; i < syms.size (); i++)
d12307c1
PMR
4989 if (!ada_identical_enum_types_p (SYMBOL_TYPE (syms[i].symbol),
4990 SYMBOL_TYPE (syms[0].symbol)))
8f17729f
JB
4991 return 0;
4992
4993 return 1;
4994}
4995
54d343a2 4996/* Remove any non-debugging symbols in SYMS that definitely
96d887e8
PH
4997 duplicate other symbols in the list (The only case I know of where
4998 this happens is when object files containing stabs-in-ecoff are
4999 linked with files containing ordinary ecoff debugging symbols (or no
5000 debugging symbols)). Modifies SYMS to squeeze out deleted entries.
5001 Returns the number of items in the modified list. */
4c4b4cd2 5002
96d887e8 5003static int
54d343a2 5004remove_extra_symbols (std::vector<struct block_symbol> *syms)
96d887e8
PH
5005{
5006 int i, j;
4c4b4cd2 5007
8f17729f
JB
5008 /* We should never be called with less than 2 symbols, as there
5009 cannot be any extra symbol in that case. But it's easy to
5010 handle, since we have nothing to do in that case. */
54d343a2
TT
5011 if (syms->size () < 2)
5012 return syms->size ();
8f17729f 5013
96d887e8 5014 i = 0;
54d343a2 5015 while (i < syms->size ())
96d887e8 5016 {
a35ddb44 5017 int remove_p = 0;
339c13b6
JB
5018
5019 /* If two symbols have the same name and one of them is a stub type,
5020 the get rid of the stub. */
5021
54d343a2
TT
5022 if (TYPE_STUB (SYMBOL_TYPE ((*syms)[i].symbol))
5023 && SYMBOL_LINKAGE_NAME ((*syms)[i].symbol) != NULL)
339c13b6 5024 {
54d343a2 5025 for (j = 0; j < syms->size (); j++)
339c13b6
JB
5026 {
5027 if (j != i
54d343a2
TT
5028 && !TYPE_STUB (SYMBOL_TYPE ((*syms)[j].symbol))
5029 && SYMBOL_LINKAGE_NAME ((*syms)[j].symbol) != NULL
5030 && strcmp (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol),
5031 SYMBOL_LINKAGE_NAME ((*syms)[j].symbol)) == 0)
a35ddb44 5032 remove_p = 1;
339c13b6
JB
5033 }
5034 }
5035
5036 /* Two symbols with the same name, same class and same address
5037 should be identical. */
5038
54d343a2
TT
5039 else if (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol) != NULL
5040 && SYMBOL_CLASS ((*syms)[i].symbol) == LOC_STATIC
5041 && is_nondebugging_type (SYMBOL_TYPE ((*syms)[i].symbol)))
96d887e8 5042 {
54d343a2 5043 for (j = 0; j < syms->size (); j += 1)
96d887e8
PH
5044 {
5045 if (i != j
54d343a2
TT
5046 && SYMBOL_LINKAGE_NAME ((*syms)[j].symbol) != NULL
5047 && strcmp (SYMBOL_LINKAGE_NAME ((*syms)[i].symbol),
5048 SYMBOL_LINKAGE_NAME ((*syms)[j].symbol)) == 0
5049 && SYMBOL_CLASS ((*syms)[i].symbol)
5050 == SYMBOL_CLASS ((*syms)[j].symbol)
5051 && SYMBOL_VALUE_ADDRESS ((*syms)[i].symbol)
5052 == SYMBOL_VALUE_ADDRESS ((*syms)[j].symbol))
a35ddb44 5053 remove_p = 1;
4c4b4cd2 5054 }
4c4b4cd2 5055 }
339c13b6 5056
a35ddb44 5057 if (remove_p)
54d343a2 5058 syms->erase (syms->begin () + i);
339c13b6 5059
96d887e8 5060 i += 1;
14f9c5c9 5061 }
8f17729f
JB
5062
5063 /* If all the remaining symbols are identical enumerals, then
5064 just keep the first one and discard the rest.
5065
5066 Unlike what we did previously, we do not discard any entry
5067 unless they are ALL identical. This is because the symbol
5068 comparison is not a strict comparison, but rather a practical
5069 comparison. If all symbols are considered identical, then
5070 we can just go ahead and use the first one and discard the rest.
5071 But if we cannot reduce the list to a single element, we have
5072 to ask the user to disambiguate anyways. And if we have to
5073 present a multiple-choice menu, it's less confusing if the list
5074 isn't missing some choices that were identical and yet distinct. */
54d343a2
TT
5075 if (symbols_are_identical_enums (*syms))
5076 syms->resize (1);
8f17729f 5077
54d343a2 5078 return syms->size ();
14f9c5c9
AS
5079}
5080
96d887e8
PH
5081/* Given a type that corresponds to a renaming entity, use the type name
5082 to extract the scope (package name or function name, fully qualified,
5083 and following the GNAT encoding convention) where this renaming has been
49d83361 5084 defined. */
4c4b4cd2 5085
49d83361 5086static std::string
96d887e8 5087xget_renaming_scope (struct type *renaming_type)
14f9c5c9 5088{
96d887e8 5089 /* The renaming types adhere to the following convention:
0963b4bd 5090 <scope>__<rename>___<XR extension>.
96d887e8
PH
5091 So, to extract the scope, we search for the "___XR" extension,
5092 and then backtrack until we find the first "__". */
76a01679 5093
a737d952 5094 const char *name = TYPE_NAME (renaming_type);
108d56a4
SM
5095 const char *suffix = strstr (name, "___XR");
5096 const char *last;
14f9c5c9 5097
96d887e8
PH
5098 /* Now, backtrack a bit until we find the first "__". Start looking
5099 at suffix - 3, as the <rename> part is at least one character long. */
14f9c5c9 5100
96d887e8
PH
5101 for (last = suffix - 3; last > name; last--)
5102 if (last[0] == '_' && last[1] == '_')
5103 break;
76a01679 5104
96d887e8 5105 /* Make a copy of scope and return it. */
49d83361 5106 return std::string (name, last);
4c4b4cd2
PH
5107}
5108
96d887e8 5109/* Return nonzero if NAME corresponds to a package name. */
4c4b4cd2 5110
96d887e8
PH
5111static int
5112is_package_name (const char *name)
4c4b4cd2 5113{
96d887e8
PH
5114 /* Here, We take advantage of the fact that no symbols are generated
5115 for packages, while symbols are generated for each function.
5116 So the condition for NAME represent a package becomes equivalent
5117 to NAME not existing in our list of symbols. There is only one
5118 small complication with library-level functions (see below). */
4c4b4cd2 5119
96d887e8
PH
5120 /* If it is a function that has not been defined at library level,
5121 then we should be able to look it up in the symbols. */
5122 if (standard_lookup (name, NULL, VAR_DOMAIN) != NULL)
5123 return 0;
14f9c5c9 5124
96d887e8
PH
5125 /* Library-level function names start with "_ada_". See if function
5126 "_ada_" followed by NAME can be found. */
14f9c5c9 5127
96d887e8 5128 /* Do a quick check that NAME does not contain "__", since library-level
e1d5a0d2 5129 functions names cannot contain "__" in them. */
96d887e8
PH
5130 if (strstr (name, "__") != NULL)
5131 return 0;
4c4b4cd2 5132
528e1572 5133 std::string fun_name = string_printf ("_ada_%s", name);
14f9c5c9 5134
528e1572 5135 return (standard_lookup (fun_name.c_str (), NULL, VAR_DOMAIN) == NULL);
96d887e8 5136}
14f9c5c9 5137
96d887e8 5138/* Return nonzero if SYM corresponds to a renaming entity that is
aeb5907d 5139 not visible from FUNCTION_NAME. */
14f9c5c9 5140
96d887e8 5141static int
0d5cff50 5142old_renaming_is_invisible (const struct symbol *sym, const char *function_name)
96d887e8 5143{
aeb5907d
JB
5144 if (SYMBOL_CLASS (sym) != LOC_TYPEDEF)
5145 return 0;
5146
49d83361 5147 std::string scope = xget_renaming_scope (SYMBOL_TYPE (sym));
14f9c5c9 5148
96d887e8 5149 /* If the rename has been defined in a package, then it is visible. */
49d83361
TT
5150 if (is_package_name (scope.c_str ()))
5151 return 0;
14f9c5c9 5152
96d887e8
PH
5153 /* Check that the rename is in the current function scope by checking
5154 that its name starts with SCOPE. */
76a01679 5155
96d887e8
PH
5156 /* If the function name starts with "_ada_", it means that it is
5157 a library-level function. Strip this prefix before doing the
5158 comparison, as the encoding for the renaming does not contain
5159 this prefix. */
61012eef 5160 if (startswith (function_name, "_ada_"))
96d887e8 5161 function_name += 5;
f26caa11 5162
49d83361 5163 return !startswith (function_name, scope.c_str ());
f26caa11
PH
5164}
5165
aeb5907d
JB
5166/* Remove entries from SYMS that corresponds to a renaming entity that
5167 is not visible from the function associated with CURRENT_BLOCK or
5168 that is superfluous due to the presence of more specific renaming
5169 information. Places surviving symbols in the initial entries of
5170 SYMS and returns the number of surviving symbols.
96d887e8
PH
5171
5172 Rationale:
aeb5907d
JB
5173 First, in cases where an object renaming is implemented as a
5174 reference variable, GNAT may produce both the actual reference
5175 variable and the renaming encoding. In this case, we discard the
5176 latter.
5177
5178 Second, GNAT emits a type following a specified encoding for each renaming
96d887e8
PH
5179 entity. Unfortunately, STABS currently does not support the definition
5180 of types that are local to a given lexical block, so all renamings types
5181 are emitted at library level. As a consequence, if an application
5182 contains two renaming entities using the same name, and a user tries to
5183 print the value of one of these entities, the result of the ada symbol
5184 lookup will also contain the wrong renaming type.
f26caa11 5185
96d887e8
PH
5186 This function partially covers for this limitation by attempting to
5187 remove from the SYMS list renaming symbols that should be visible
5188 from CURRENT_BLOCK. However, there does not seem be a 100% reliable
5189 method with the current information available. The implementation
5190 below has a couple of limitations (FIXME: brobecker-2003-05-12):
5191
5192 - When the user tries to print a rename in a function while there
5193 is another rename entity defined in a package: Normally, the
5194 rename in the function has precedence over the rename in the
5195 package, so the latter should be removed from the list. This is
5196 currently not the case.
5197
5198 - This function will incorrectly remove valid renames if
5199 the CURRENT_BLOCK corresponds to a function which symbol name
5200 has been changed by an "Export" pragma. As a consequence,
5201 the user will be unable to print such rename entities. */
4c4b4cd2 5202
14f9c5c9 5203static int
54d343a2
TT
5204remove_irrelevant_renamings (std::vector<struct block_symbol> *syms,
5205 const struct block *current_block)
4c4b4cd2
PH
5206{
5207 struct symbol *current_function;
0d5cff50 5208 const char *current_function_name;
4c4b4cd2 5209 int i;
aeb5907d
JB
5210 int is_new_style_renaming;
5211
5212 /* If there is both a renaming foo___XR... encoded as a variable and
5213 a simple variable foo in the same block, discard the latter.
0963b4bd 5214 First, zero out such symbols, then compress. */
aeb5907d 5215 is_new_style_renaming = 0;
54d343a2 5216 for (i = 0; i < syms->size (); i += 1)
aeb5907d 5217 {
54d343a2
TT
5218 struct symbol *sym = (*syms)[i].symbol;
5219 const struct block *block = (*syms)[i].block;
aeb5907d
JB
5220 const char *name;
5221 const char *suffix;
5222
5223 if (sym == NULL || SYMBOL_CLASS (sym) == LOC_TYPEDEF)
5224 continue;
5225 name = SYMBOL_LINKAGE_NAME (sym);
5226 suffix = strstr (name, "___XR");
5227
5228 if (suffix != NULL)
5229 {
5230 int name_len = suffix - name;
5231 int j;
5b4ee69b 5232
aeb5907d 5233 is_new_style_renaming = 1;
54d343a2
TT
5234 for (j = 0; j < syms->size (); j += 1)
5235 if (i != j && (*syms)[j].symbol != NULL
5236 && strncmp (name, SYMBOL_LINKAGE_NAME ((*syms)[j].symbol),
aeb5907d 5237 name_len) == 0
54d343a2
TT
5238 && block == (*syms)[j].block)
5239 (*syms)[j].symbol = NULL;
aeb5907d
JB
5240 }
5241 }
5242 if (is_new_style_renaming)
5243 {
5244 int j, k;
5245
54d343a2
TT
5246 for (j = k = 0; j < syms->size (); j += 1)
5247 if ((*syms)[j].symbol != NULL)
aeb5907d 5248 {
54d343a2 5249 (*syms)[k] = (*syms)[j];
aeb5907d
JB
5250 k += 1;
5251 }
5252 return k;
5253 }
4c4b4cd2
PH
5254
5255 /* Extract the function name associated to CURRENT_BLOCK.
5256 Abort if unable to do so. */
76a01679 5257
4c4b4cd2 5258 if (current_block == NULL)
54d343a2 5259 return syms->size ();
76a01679 5260
7f0df278 5261 current_function = block_linkage_function (current_block);
4c4b4cd2 5262 if (current_function == NULL)
54d343a2 5263 return syms->size ();
4c4b4cd2
PH
5264
5265 current_function_name = SYMBOL_LINKAGE_NAME (current_function);
5266 if (current_function_name == NULL)
54d343a2 5267 return syms->size ();
4c4b4cd2
PH
5268
5269 /* Check each of the symbols, and remove it from the list if it is
5270 a type corresponding to a renaming that is out of the scope of
5271 the current block. */
5272
5273 i = 0;
54d343a2 5274 while (i < syms->size ())
4c4b4cd2 5275 {
54d343a2 5276 if (ada_parse_renaming ((*syms)[i].symbol, NULL, NULL, NULL)
aeb5907d 5277 == ADA_OBJECT_RENAMING
54d343a2
TT
5278 && old_renaming_is_invisible ((*syms)[i].symbol,
5279 current_function_name))
5280 syms->erase (syms->begin () + i);
4c4b4cd2
PH
5281 else
5282 i += 1;
5283 }
5284
54d343a2 5285 return syms->size ();
4c4b4cd2
PH
5286}
5287
339c13b6
JB
5288/* Add to OBSTACKP all symbols from BLOCK (and its super-blocks)
5289 whose name and domain match NAME and DOMAIN respectively.
5290 If no match was found, then extend the search to "enclosing"
5291 routines (in other words, if we're inside a nested function,
5292 search the symbols defined inside the enclosing functions).
d0a8ab18
JB
5293 If WILD_MATCH_P is nonzero, perform the naming matching in
5294 "wild" mode (see function "wild_match" for more info).
339c13b6
JB
5295
5296 Note: This function assumes that OBSTACKP has 0 (zero) element in it. */
5297
5298static void
b5ec771e
PA
5299ada_add_local_symbols (struct obstack *obstackp,
5300 const lookup_name_info &lookup_name,
5301 const struct block *block, domain_enum domain)
339c13b6
JB
5302{
5303 int block_depth = 0;
5304
5305 while (block != NULL)
5306 {
5307 block_depth += 1;
b5ec771e 5308 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
339c13b6
JB
5309
5310 /* If we found a non-function match, assume that's the one. */
5311 if (is_nonfunction (defns_collected (obstackp, 0),
5312 num_defns_collected (obstackp)))
5313 return;
5314
5315 block = BLOCK_SUPERBLOCK (block);
5316 }
5317
5318 /* If no luck so far, try to find NAME as a local symbol in some lexically
5319 enclosing subprogram. */
5320 if (num_defns_collected (obstackp) == 0 && block_depth > 2)
b5ec771e 5321 add_symbols_from_enclosing_procs (obstackp, lookup_name, domain);
339c13b6
JB
5322}
5323
ccefe4c4 5324/* An object of this type is used as the user_data argument when
40658b94 5325 calling the map_matching_symbols method. */
ccefe4c4 5326
40658b94 5327struct match_data
ccefe4c4 5328{
40658b94 5329 struct objfile *objfile;
ccefe4c4 5330 struct obstack *obstackp;
40658b94
PH
5331 struct symbol *arg_sym;
5332 int found_sym;
ccefe4c4
TT
5333};
5334
22cee43f 5335/* A callback for add_nonlocal_symbols that adds SYM, found in BLOCK,
40658b94
PH
5336 to a list of symbols. DATA0 is a pointer to a struct match_data *
5337 containing the obstack that collects the symbol list, the file that SYM
5338 must come from, a flag indicating whether a non-argument symbol has
5339 been found in the current block, and the last argument symbol
5340 passed in SYM within the current block (if any). When SYM is null,
5341 marking the end of a block, the argument symbol is added if no
5342 other has been found. */
ccefe4c4 5343
40658b94 5344static int
582942f4
TT
5345aux_add_nonlocal_symbols (const struct block *block, struct symbol *sym,
5346 void *data0)
ccefe4c4 5347{
40658b94
PH
5348 struct match_data *data = (struct match_data *) data0;
5349
5350 if (sym == NULL)
5351 {
5352 if (!data->found_sym && data->arg_sym != NULL)
5353 add_defn_to_vec (data->obstackp,
5354 fixup_symbol_section (data->arg_sym, data->objfile),
5355 block);
5356 data->found_sym = 0;
5357 data->arg_sym = NULL;
5358 }
5359 else
5360 {
5361 if (SYMBOL_CLASS (sym) == LOC_UNRESOLVED)
5362 return 0;
5363 else if (SYMBOL_IS_ARGUMENT (sym))
5364 data->arg_sym = sym;
5365 else
5366 {
5367 data->found_sym = 1;
5368 add_defn_to_vec (data->obstackp,
5369 fixup_symbol_section (sym, data->objfile),
5370 block);
5371 }
5372 }
5373 return 0;
5374}
5375
b5ec771e
PA
5376/* Helper for add_nonlocal_symbols. Find symbols in DOMAIN which are
5377 targeted by renamings matching LOOKUP_NAME in BLOCK. Add these
5378 symbols to OBSTACKP. Return whether we found such symbols. */
22cee43f
PMR
5379
5380static int
5381ada_add_block_renamings (struct obstack *obstackp,
5382 const struct block *block,
b5ec771e
PA
5383 const lookup_name_info &lookup_name,
5384 domain_enum domain)
22cee43f
PMR
5385{
5386 struct using_direct *renaming;
5387 int defns_mark = num_defns_collected (obstackp);
5388
b5ec771e
PA
5389 symbol_name_matcher_ftype *name_match
5390 = ada_get_symbol_name_matcher (lookup_name);
5391
22cee43f
PMR
5392 for (renaming = block_using (block);
5393 renaming != NULL;
5394 renaming = renaming->next)
5395 {
5396 const char *r_name;
22cee43f
PMR
5397
5398 /* Avoid infinite recursions: skip this renaming if we are actually
5399 already traversing it.
5400
5401 Currently, symbol lookup in Ada don't use the namespace machinery from
5402 C++/Fortran support: skip namespace imports that use them. */
5403 if (renaming->searched
5404 || (renaming->import_src != NULL
5405 && renaming->import_src[0] != '\0')
5406 || (renaming->import_dest != NULL
5407 && renaming->import_dest[0] != '\0'))
5408 continue;
5409 renaming->searched = 1;
5410
5411 /* TODO: here, we perform another name-based symbol lookup, which can
5412 pull its own multiple overloads. In theory, we should be able to do
5413 better in this case since, in DWARF, DW_AT_import is a DIE reference,
5414 not a simple name. But in order to do this, we would need to enhance
5415 the DWARF reader to associate a symbol to this renaming, instead of a
5416 name. So, for now, we do something simpler: re-use the C++/Fortran
5417 namespace machinery. */
5418 r_name = (renaming->alias != NULL
5419 ? renaming->alias
5420 : renaming->declaration);
b5ec771e
PA
5421 if (name_match (r_name, lookup_name, NULL))
5422 {
5423 lookup_name_info decl_lookup_name (renaming->declaration,
5424 lookup_name.match_type ());
5425 ada_add_all_symbols (obstackp, block, decl_lookup_name, domain,
5426 1, NULL);
5427 }
22cee43f
PMR
5428 renaming->searched = 0;
5429 }
5430 return num_defns_collected (obstackp) != defns_mark;
5431}
5432
db230ce3
JB
5433/* Implements compare_names, but only applying the comparision using
5434 the given CASING. */
5b4ee69b 5435
40658b94 5436static int
db230ce3
JB
5437compare_names_with_case (const char *string1, const char *string2,
5438 enum case_sensitivity casing)
40658b94
PH
5439{
5440 while (*string1 != '\0' && *string2 != '\0')
5441 {
db230ce3
JB
5442 char c1, c2;
5443
40658b94
PH
5444 if (isspace (*string1) || isspace (*string2))
5445 return strcmp_iw_ordered (string1, string2);
db230ce3
JB
5446
5447 if (casing == case_sensitive_off)
5448 {
5449 c1 = tolower (*string1);
5450 c2 = tolower (*string2);
5451 }
5452 else
5453 {
5454 c1 = *string1;
5455 c2 = *string2;
5456 }
5457 if (c1 != c2)
40658b94 5458 break;
db230ce3 5459
40658b94
PH
5460 string1 += 1;
5461 string2 += 1;
5462 }
db230ce3 5463
40658b94
PH
5464 switch (*string1)
5465 {
5466 case '(':
5467 return strcmp_iw_ordered (string1, string2);
5468 case '_':
5469 if (*string2 == '\0')
5470 {
052874e8 5471 if (is_name_suffix (string1))
40658b94
PH
5472 return 0;
5473 else
1a1d5513 5474 return 1;
40658b94 5475 }
dbb8534f 5476 /* FALLTHROUGH */
40658b94
PH
5477 default:
5478 if (*string2 == '(')
5479 return strcmp_iw_ordered (string1, string2);
5480 else
db230ce3
JB
5481 {
5482 if (casing == case_sensitive_off)
5483 return tolower (*string1) - tolower (*string2);
5484 else
5485 return *string1 - *string2;
5486 }
40658b94 5487 }
ccefe4c4
TT
5488}
5489
db230ce3
JB
5490/* Compare STRING1 to STRING2, with results as for strcmp.
5491 Compatible with strcmp_iw_ordered in that...
5492
5493 strcmp_iw_ordered (STRING1, STRING2) <= 0
5494
5495 ... implies...
5496
5497 compare_names (STRING1, STRING2) <= 0
5498
5499 (they may differ as to what symbols compare equal). */
5500
5501static int
5502compare_names (const char *string1, const char *string2)
5503{
5504 int result;
5505
5506 /* Similar to what strcmp_iw_ordered does, we need to perform
5507 a case-insensitive comparison first, and only resort to
5508 a second, case-sensitive, comparison if the first one was
5509 not sufficient to differentiate the two strings. */
5510
5511 result = compare_names_with_case (string1, string2, case_sensitive_off);
5512 if (result == 0)
5513 result = compare_names_with_case (string1, string2, case_sensitive_on);
5514
5515 return result;
5516}
5517
b5ec771e
PA
5518/* Convenience function to get at the Ada encoded lookup name for
5519 LOOKUP_NAME, as a C string. */
5520
5521static const char *
5522ada_lookup_name (const lookup_name_info &lookup_name)
5523{
5524 return lookup_name.ada ().lookup_name ().c_str ();
5525}
5526
339c13b6 5527/* Add to OBSTACKP all non-local symbols whose name and domain match
b5ec771e
PA
5528 LOOKUP_NAME and DOMAIN respectively. The search is performed on
5529 GLOBAL_BLOCK symbols if GLOBAL is non-zero, or on STATIC_BLOCK
5530 symbols otherwise. */
339c13b6
JB
5531
5532static void
b5ec771e
PA
5533add_nonlocal_symbols (struct obstack *obstackp,
5534 const lookup_name_info &lookup_name,
5535 domain_enum domain, int global)
339c13b6 5536{
40658b94 5537 struct match_data data;
339c13b6 5538
6475f2fe 5539 memset (&data, 0, sizeof data);
ccefe4c4 5540 data.obstackp = obstackp;
339c13b6 5541
b5ec771e
PA
5542 bool is_wild_match = lookup_name.ada ().wild_match_p ();
5543
2030c079 5544 for (objfile *objfile : current_program_space->objfiles ())
40658b94
PH
5545 {
5546 data.objfile = objfile;
5547
5548 if (is_wild_match)
b5ec771e
PA
5549 objfile->sf->qf->map_matching_symbols (objfile, lookup_name.name ().c_str (),
5550 domain, global,
4186eb54 5551 aux_add_nonlocal_symbols, &data,
b5ec771e
PA
5552 symbol_name_match_type::WILD,
5553 NULL);
40658b94 5554 else
b5ec771e
PA
5555 objfile->sf->qf->map_matching_symbols (objfile, lookup_name.name ().c_str (),
5556 domain, global,
4186eb54 5557 aux_add_nonlocal_symbols, &data,
b5ec771e
PA
5558 symbol_name_match_type::FULL,
5559 compare_names);
22cee43f 5560
b669c953 5561 for (compunit_symtab *cu : objfile->compunits ())
22cee43f
PMR
5562 {
5563 const struct block *global_block
5564 = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (cu), GLOBAL_BLOCK);
5565
b5ec771e
PA
5566 if (ada_add_block_renamings (obstackp, global_block, lookup_name,
5567 domain))
22cee43f
PMR
5568 data.found_sym = 1;
5569 }
40658b94
PH
5570 }
5571
5572 if (num_defns_collected (obstackp) == 0 && global && !is_wild_match)
5573 {
b5ec771e
PA
5574 const char *name = ada_lookup_name (lookup_name);
5575 std::string name1 = std::string ("<_ada_") + name + '>';
5576
2030c079 5577 for (objfile *objfile : current_program_space->objfiles ())
40658b94 5578 {
40658b94 5579 data.objfile = objfile;
b5ec771e
PA
5580 objfile->sf->qf->map_matching_symbols (objfile, name1.c_str (),
5581 domain, global,
0963b4bd
MS
5582 aux_add_nonlocal_symbols,
5583 &data,
b5ec771e
PA
5584 symbol_name_match_type::FULL,
5585 compare_names);
40658b94
PH
5586 }
5587 }
339c13b6
JB
5588}
5589
b5ec771e
PA
5590/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if
5591 FULL_SEARCH is non-zero, enclosing scope and in global scopes,
5592 returning the number of matches. Add these to OBSTACKP.
4eeaa230 5593
22cee43f
PMR
5594 When FULL_SEARCH is non-zero, any non-function/non-enumeral
5595 symbol match within the nest of blocks whose innermost member is BLOCK,
4c4b4cd2 5596 is the one match returned (no other matches in that or
d9680e73 5597 enclosing blocks is returned). If there are any matches in or
22cee43f 5598 surrounding BLOCK, then these alone are returned.
4eeaa230 5599
b5ec771e
PA
5600 Names prefixed with "standard__" are handled specially:
5601 "standard__" is first stripped off (by the lookup_name
5602 constructor), and only static and global symbols are searched.
14f9c5c9 5603
22cee43f
PMR
5604 If MADE_GLOBAL_LOOKUP_P is non-null, set it before return to whether we had
5605 to lookup global symbols. */
5606
5607static void
5608ada_add_all_symbols (struct obstack *obstackp,
5609 const struct block *block,
b5ec771e 5610 const lookup_name_info &lookup_name,
22cee43f
PMR
5611 domain_enum domain,
5612 int full_search,
5613 int *made_global_lookup_p)
14f9c5c9
AS
5614{
5615 struct symbol *sym;
14f9c5c9 5616
22cee43f
PMR
5617 if (made_global_lookup_p)
5618 *made_global_lookup_p = 0;
339c13b6
JB
5619
5620 /* Special case: If the user specifies a symbol name inside package
5621 Standard, do a non-wild matching of the symbol name without
5622 the "standard__" prefix. This was primarily introduced in order
5623 to allow the user to specifically access the standard exceptions
5624 using, for instance, Standard.Constraint_Error when Constraint_Error
5625 is ambiguous (due to the user defining its own Constraint_Error
5626 entity inside its program). */
b5ec771e
PA
5627 if (lookup_name.ada ().standard_p ())
5628 block = NULL;
4c4b4cd2 5629
339c13b6 5630 /* Check the non-global symbols. If we have ANY match, then we're done. */
14f9c5c9 5631
4eeaa230
DE
5632 if (block != NULL)
5633 {
5634 if (full_search)
b5ec771e 5635 ada_add_local_symbols (obstackp, lookup_name, block, domain);
4eeaa230
DE
5636 else
5637 {
5638 /* In the !full_search case we're are being called by
5639 ada_iterate_over_symbols, and we don't want to search
5640 superblocks. */
b5ec771e 5641 ada_add_block_symbols (obstackp, block, lookup_name, domain, NULL);
4eeaa230 5642 }
22cee43f
PMR
5643 if (num_defns_collected (obstackp) > 0 || !full_search)
5644 return;
4eeaa230 5645 }
d2e4a39e 5646
339c13b6
JB
5647 /* No non-global symbols found. Check our cache to see if we have
5648 already performed this search before. If we have, then return
5649 the same result. */
5650
b5ec771e
PA
5651 if (lookup_cached_symbol (ada_lookup_name (lookup_name),
5652 domain, &sym, &block))
4c4b4cd2
PH
5653 {
5654 if (sym != NULL)
b5ec771e 5655 add_defn_to_vec (obstackp, sym, block);
22cee43f 5656 return;
4c4b4cd2 5657 }
14f9c5c9 5658
22cee43f
PMR
5659 if (made_global_lookup_p)
5660 *made_global_lookup_p = 1;
b1eedac9 5661
339c13b6
JB
5662 /* Search symbols from all global blocks. */
5663
b5ec771e 5664 add_nonlocal_symbols (obstackp, lookup_name, domain, 1);
d2e4a39e 5665
4c4b4cd2 5666 /* Now add symbols from all per-file blocks if we've gotten no hits
339c13b6 5667 (not strictly correct, but perhaps better than an error). */
d2e4a39e 5668
22cee43f 5669 if (num_defns_collected (obstackp) == 0)
b5ec771e 5670 add_nonlocal_symbols (obstackp, lookup_name, domain, 0);
22cee43f
PMR
5671}
5672
b5ec771e
PA
5673/* Find symbols in DOMAIN matching LOOKUP_NAME, in BLOCK and, if FULL_SEARCH
5674 is non-zero, enclosing scope and in global scopes, returning the number of
22cee43f 5675 matches.
54d343a2
TT
5676 Fills *RESULTS with (SYM,BLOCK) tuples, indicating the symbols
5677 found and the blocks and symbol tables (if any) in which they were
5678 found.
22cee43f
PMR
5679
5680 When full_search is non-zero, any non-function/non-enumeral
5681 symbol match within the nest of blocks whose innermost member is BLOCK,
5682 is the one match returned (no other matches in that or
5683 enclosing blocks is returned). If there are any matches in or
5684 surrounding BLOCK, then these alone are returned.
5685
5686 Names prefixed with "standard__" are handled specially: "standard__"
5687 is first stripped off, and only static and global symbols are searched. */
5688
5689static int
b5ec771e
PA
5690ada_lookup_symbol_list_worker (const lookup_name_info &lookup_name,
5691 const struct block *block,
22cee43f 5692 domain_enum domain,
54d343a2 5693 std::vector<struct block_symbol> *results,
22cee43f
PMR
5694 int full_search)
5695{
22cee43f
PMR
5696 int syms_from_global_search;
5697 int ndefns;
ec6a20c2 5698 auto_obstack obstack;
22cee43f 5699
ec6a20c2 5700 ada_add_all_symbols (&obstack, block, lookup_name,
b5ec771e 5701 domain, full_search, &syms_from_global_search);
14f9c5c9 5702
ec6a20c2
JB
5703 ndefns = num_defns_collected (&obstack);
5704
54d343a2
TT
5705 struct block_symbol *base = defns_collected (&obstack, 1);
5706 for (int i = 0; i < ndefns; ++i)
5707 results->push_back (base[i]);
4c4b4cd2 5708
54d343a2 5709 ndefns = remove_extra_symbols (results);
4c4b4cd2 5710
b1eedac9 5711 if (ndefns == 0 && full_search && syms_from_global_search)
b5ec771e 5712 cache_symbol (ada_lookup_name (lookup_name), domain, NULL, NULL);
14f9c5c9 5713
b1eedac9 5714 if (ndefns == 1 && full_search && syms_from_global_search)
b5ec771e
PA
5715 cache_symbol (ada_lookup_name (lookup_name), domain,
5716 (*results)[0].symbol, (*results)[0].block);
14f9c5c9 5717
54d343a2 5718 ndefns = remove_irrelevant_renamings (results, block);
ec6a20c2 5719
14f9c5c9
AS
5720 return ndefns;
5721}
5722
b5ec771e 5723/* Find symbols in DOMAIN matching NAME, in BLOCK and enclosing scope and
54d343a2
TT
5724 in global scopes, returning the number of matches, and filling *RESULTS
5725 with (SYM,BLOCK) tuples.
ec6a20c2 5726
4eeaa230
DE
5727 See ada_lookup_symbol_list_worker for further details. */
5728
5729int
b5ec771e 5730ada_lookup_symbol_list (const char *name, const struct block *block,
54d343a2
TT
5731 domain_enum domain,
5732 std::vector<struct block_symbol> *results)
4eeaa230 5733{
b5ec771e
PA
5734 symbol_name_match_type name_match_type = name_match_type_from_name (name);
5735 lookup_name_info lookup_name (name, name_match_type);
5736
5737 return ada_lookup_symbol_list_worker (lookup_name, block, domain, results, 1);
4eeaa230
DE
5738}
5739
5740/* Implementation of the la_iterate_over_symbols method. */
5741
5742static void
14bc53a8 5743ada_iterate_over_symbols
b5ec771e
PA
5744 (const struct block *block, const lookup_name_info &name,
5745 domain_enum domain,
14bc53a8 5746 gdb::function_view<symbol_found_callback_ftype> callback)
4eeaa230
DE
5747{
5748 int ndefs, i;
54d343a2 5749 std::vector<struct block_symbol> results;
4eeaa230
DE
5750
5751 ndefs = ada_lookup_symbol_list_worker (name, block, domain, &results, 0);
ec6a20c2 5752
4eeaa230
DE
5753 for (i = 0; i < ndefs; ++i)
5754 {
7e41c8db 5755 if (!callback (&results[i]))
4eeaa230
DE
5756 break;
5757 }
5758}
5759
4e5c77fe
JB
5760/* The result is as for ada_lookup_symbol_list with FULL_SEARCH set
5761 to 1, but choosing the first symbol found if there are multiple
5762 choices.
5763
5e2336be
JB
5764 The result is stored in *INFO, which must be non-NULL.
5765 If no match is found, INFO->SYM is set to NULL. */
4e5c77fe
JB
5766
5767void
5768ada_lookup_encoded_symbol (const char *name, const struct block *block,
fe978cb0 5769 domain_enum domain,
d12307c1 5770 struct block_symbol *info)
14f9c5c9 5771{
b5ec771e
PA
5772 /* Since we already have an encoded name, wrap it in '<>' to force a
5773 verbatim match. Otherwise, if the name happens to not look like
5774 an encoded name (because it doesn't include a "__"),
5775 ada_lookup_name_info would re-encode/fold it again, and that
5776 would e.g., incorrectly lowercase object renaming names like
5777 "R28b" -> "r28b". */
5778 std::string verbatim = std::string ("<") + name + '>';
5779
5e2336be 5780 gdb_assert (info != NULL);
65392b3e 5781 *info = ada_lookup_symbol (verbatim.c_str (), block, domain);
4e5c77fe 5782}
aeb5907d
JB
5783
5784/* Return a symbol in DOMAIN matching NAME, in BLOCK0 and enclosing
5785 scope and in global scopes, or NULL if none. NAME is folded and
5786 encoded first. Otherwise, the result is as for ada_lookup_symbol_list,
65392b3e 5787 choosing the first symbol if there are multiple choices. */
4e5c77fe 5788
d12307c1 5789struct block_symbol
aeb5907d 5790ada_lookup_symbol (const char *name, const struct block *block0,
65392b3e 5791 domain_enum domain)
aeb5907d 5792{
54d343a2 5793 std::vector<struct block_symbol> candidates;
f98fc17b 5794 int n_candidates;
f98fc17b
PA
5795
5796 n_candidates = ada_lookup_symbol_list (name, block0, domain, &candidates);
f98fc17b
PA
5797
5798 if (n_candidates == 0)
54d343a2 5799 return {};
f98fc17b
PA
5800
5801 block_symbol info = candidates[0];
5802 info.symbol = fixup_symbol_section (info.symbol, NULL);
d12307c1 5803 return info;
4c4b4cd2 5804}
14f9c5c9 5805
d12307c1 5806static struct block_symbol
f606139a
DE
5807ada_lookup_symbol_nonlocal (const struct language_defn *langdef,
5808 const char *name,
76a01679 5809 const struct block *block,
21b556f4 5810 const domain_enum domain)
4c4b4cd2 5811{
d12307c1 5812 struct block_symbol sym;
04dccad0 5813
65392b3e 5814 sym = ada_lookup_symbol (name, block_static_block (block), domain);
d12307c1 5815 if (sym.symbol != NULL)
04dccad0
JB
5816 return sym;
5817
5818 /* If we haven't found a match at this point, try the primitive
5819 types. In other languages, this search is performed before
5820 searching for global symbols in order to short-circuit that
5821 global-symbol search if it happens that the name corresponds
5822 to a primitive type. But we cannot do the same in Ada, because
5823 it is perfectly legitimate for a program to declare a type which
5824 has the same name as a standard type. If looking up a type in
5825 that situation, we have traditionally ignored the primitive type
5826 in favor of user-defined types. This is why, unlike most other
5827 languages, we search the primitive types this late and only after
5828 having searched the global symbols without success. */
5829
5830 if (domain == VAR_DOMAIN)
5831 {
5832 struct gdbarch *gdbarch;
5833
5834 if (block == NULL)
5835 gdbarch = target_gdbarch ();
5836 else
5837 gdbarch = block_gdbarch (block);
d12307c1
PMR
5838 sym.symbol = language_lookup_primitive_type_as_symbol (langdef, gdbarch, name);
5839 if (sym.symbol != NULL)
04dccad0
JB
5840 return sym;
5841 }
5842
6640a367 5843 return {};
14f9c5c9
AS
5844}
5845
5846
4c4b4cd2
PH
5847/* True iff STR is a possible encoded suffix of a normal Ada name
5848 that is to be ignored for matching purposes. Suffixes of parallel
5849 names (e.g., XVE) are not included here. Currently, the possible suffixes
5823c3ef 5850 are given by any of the regular expressions:
4c4b4cd2 5851
babe1480
JB
5852 [.$][0-9]+ [nested subprogram suffix, on platforms such as GNU/Linux]
5853 ___[0-9]+ [nested subprogram suffix, on platforms such as HP/UX]
9ac7f98e 5854 TKB [subprogram suffix for task bodies]
babe1480 5855 _E[0-9]+[bs]$ [protected object entry suffixes]
61ee279c 5856 (X[nb]*)?((\$|__)[0-9](_?[0-9]+)|___(JM|LJM|X([FDBUP].*|R[^T]?)))?$
babe1480
JB
5857
5858 Also, any leading "__[0-9]+" sequence is skipped before the suffix
5859 match is performed. This sequence is used to differentiate homonyms,
5860 is an optional part of a valid name suffix. */
4c4b4cd2 5861
14f9c5c9 5862static int
d2e4a39e 5863is_name_suffix (const char *str)
14f9c5c9
AS
5864{
5865 int k;
4c4b4cd2
PH
5866 const char *matching;
5867 const int len = strlen (str);
5868
babe1480
JB
5869 /* Skip optional leading __[0-9]+. */
5870
4c4b4cd2
PH
5871 if (len > 3 && str[0] == '_' && str[1] == '_' && isdigit (str[2]))
5872 {
babe1480
JB
5873 str += 3;
5874 while (isdigit (str[0]))
5875 str += 1;
4c4b4cd2 5876 }
babe1480
JB
5877
5878 /* [.$][0-9]+ */
4c4b4cd2 5879
babe1480 5880 if (str[0] == '.' || str[0] == '$')
4c4b4cd2 5881 {
babe1480 5882 matching = str + 1;
4c4b4cd2
PH
5883 while (isdigit (matching[0]))
5884 matching += 1;
5885 if (matching[0] == '\0')
5886 return 1;
5887 }
5888
5889 /* ___[0-9]+ */
babe1480 5890
4c4b4cd2
PH
5891 if (len > 3 && str[0] == '_' && str[1] == '_' && str[2] == '_')
5892 {
5893 matching = str + 3;
5894 while (isdigit (matching[0]))
5895 matching += 1;
5896 if (matching[0] == '\0')
5897 return 1;
5898 }
5899
9ac7f98e
JB
5900 /* "TKB" suffixes are used for subprograms implementing task bodies. */
5901
5902 if (strcmp (str, "TKB") == 0)
5903 return 1;
5904
529cad9c
PH
5905#if 0
5906 /* FIXME: brobecker/2005-09-23: Protected Object subprograms end
0963b4bd
MS
5907 with a N at the end. Unfortunately, the compiler uses the same
5908 convention for other internal types it creates. So treating
529cad9c 5909 all entity names that end with an "N" as a name suffix causes
0963b4bd
MS
5910 some regressions. For instance, consider the case of an enumerated
5911 type. To support the 'Image attribute, it creates an array whose
529cad9c
PH
5912 name ends with N.
5913 Having a single character like this as a suffix carrying some
0963b4bd 5914 information is a bit risky. Perhaps we should change the encoding
529cad9c
PH
5915 to be something like "_N" instead. In the meantime, do not do
5916 the following check. */
5917 /* Protected Object Subprograms */
5918 if (len == 1 && str [0] == 'N')
5919 return 1;
5920#endif
5921
5922 /* _E[0-9]+[bs]$ */
5923 if (len > 3 && str[0] == '_' && str [1] == 'E' && isdigit (str[2]))
5924 {
5925 matching = str + 3;
5926 while (isdigit (matching[0]))
5927 matching += 1;
5928 if ((matching[0] == 'b' || matching[0] == 's')
5929 && matching [1] == '\0')
5930 return 1;
5931 }
5932
4c4b4cd2
PH
5933 /* ??? We should not modify STR directly, as we are doing below. This
5934 is fine in this case, but may become problematic later if we find
5935 that this alternative did not work, and want to try matching
5936 another one from the begining of STR. Since we modified it, we
5937 won't be able to find the begining of the string anymore! */
14f9c5c9
AS
5938 if (str[0] == 'X')
5939 {
5940 str += 1;
d2e4a39e 5941 while (str[0] != '_' && str[0] != '\0')
4c4b4cd2
PH
5942 {
5943 if (str[0] != 'n' && str[0] != 'b')
5944 return 0;
5945 str += 1;
5946 }
14f9c5c9 5947 }
babe1480 5948
14f9c5c9
AS
5949 if (str[0] == '\000')
5950 return 1;
babe1480 5951
d2e4a39e 5952 if (str[0] == '_')
14f9c5c9
AS
5953 {
5954 if (str[1] != '_' || str[2] == '\000')
4c4b4cd2 5955 return 0;
d2e4a39e 5956 if (str[2] == '_')
4c4b4cd2 5957 {
61ee279c
PH
5958 if (strcmp (str + 3, "JM") == 0)
5959 return 1;
5960 /* FIXME: brobecker/2004-09-30: GNAT will soon stop using
5961 the LJM suffix in favor of the JM one. But we will
5962 still accept LJM as a valid suffix for a reasonable
5963 amount of time, just to allow ourselves to debug programs
5964 compiled using an older version of GNAT. */
4c4b4cd2
PH
5965 if (strcmp (str + 3, "LJM") == 0)
5966 return 1;
5967 if (str[3] != 'X')
5968 return 0;
1265e4aa
JB
5969 if (str[4] == 'F' || str[4] == 'D' || str[4] == 'B'
5970 || str[4] == 'U' || str[4] == 'P')
4c4b4cd2
PH
5971 return 1;
5972 if (str[4] == 'R' && str[5] != 'T')
5973 return 1;
5974 return 0;
5975 }
5976 if (!isdigit (str[2]))
5977 return 0;
5978 for (k = 3; str[k] != '\0'; k += 1)
5979 if (!isdigit (str[k]) && str[k] != '_')
5980 return 0;
14f9c5c9
AS
5981 return 1;
5982 }
4c4b4cd2 5983 if (str[0] == '$' && isdigit (str[1]))
14f9c5c9 5984 {
4c4b4cd2
PH
5985 for (k = 2; str[k] != '\0'; k += 1)
5986 if (!isdigit (str[k]) && str[k] != '_')
5987 return 0;
14f9c5c9
AS
5988 return 1;
5989 }
5990 return 0;
5991}
d2e4a39e 5992
aeb5907d
JB
5993/* Return non-zero if the string starting at NAME and ending before
5994 NAME_END contains no capital letters. */
529cad9c
PH
5995
5996static int
5997is_valid_name_for_wild_match (const char *name0)
5998{
5999 const char *decoded_name = ada_decode (name0);
6000 int i;
6001
5823c3ef
JB
6002 /* If the decoded name starts with an angle bracket, it means that
6003 NAME0 does not follow the GNAT encoding format. It should then
6004 not be allowed as a possible wild match. */
6005 if (decoded_name[0] == '<')
6006 return 0;
6007
529cad9c
PH
6008 for (i=0; decoded_name[i] != '\0'; i++)
6009 if (isalpha (decoded_name[i]) && !islower (decoded_name[i]))
6010 return 0;
6011
6012 return 1;
6013}
6014
73589123
PH
6015/* Advance *NAMEP to next occurrence of TARGET0 in the string NAME0
6016 that could start a simple name. Assumes that *NAMEP points into
6017 the string beginning at NAME0. */
4c4b4cd2 6018
14f9c5c9 6019static int
73589123 6020advance_wild_match (const char **namep, const char *name0, int target0)
14f9c5c9 6021{
73589123 6022 const char *name = *namep;
5b4ee69b 6023
5823c3ef 6024 while (1)
14f9c5c9 6025 {
aa27d0b3 6026 int t0, t1;
73589123
PH
6027
6028 t0 = *name;
6029 if (t0 == '_')
6030 {
6031 t1 = name[1];
6032 if ((t1 >= 'a' && t1 <= 'z') || (t1 >= '0' && t1 <= '9'))
6033 {
6034 name += 1;
61012eef 6035 if (name == name0 + 5 && startswith (name0, "_ada"))
73589123
PH
6036 break;
6037 else
6038 name += 1;
6039 }
aa27d0b3
JB
6040 else if (t1 == '_' && ((name[2] >= 'a' && name[2] <= 'z')
6041 || name[2] == target0))
73589123
PH
6042 {
6043 name += 2;
6044 break;
6045 }
6046 else
6047 return 0;
6048 }
6049 else if ((t0 >= 'a' && t0 <= 'z') || (t0 >= '0' && t0 <= '9'))
6050 name += 1;
6051 else
5823c3ef 6052 return 0;
73589123
PH
6053 }
6054
6055 *namep = name;
6056 return 1;
6057}
6058
b5ec771e
PA
6059/* Return true iff NAME encodes a name of the form prefix.PATN.
6060 Ignores any informational suffixes of NAME (i.e., for which
6061 is_name_suffix is true). Assumes that PATN is a lower-cased Ada
6062 simple name. */
73589123 6063
b5ec771e 6064static bool
73589123
PH
6065wild_match (const char *name, const char *patn)
6066{
22e048c9 6067 const char *p;
73589123
PH
6068 const char *name0 = name;
6069
6070 while (1)
6071 {
6072 const char *match = name;
6073
6074 if (*name == *patn)
6075 {
6076 for (name += 1, p = patn + 1; *p != '\0'; name += 1, p += 1)
6077 if (*p != *name)
6078 break;
6079 if (*p == '\0' && is_name_suffix (name))
b5ec771e 6080 return match == name0 || is_valid_name_for_wild_match (name0);
73589123
PH
6081
6082 if (name[-1] == '_')
6083 name -= 1;
6084 }
6085 if (!advance_wild_match (&name, name0, *patn))
b5ec771e 6086 return false;
96d887e8 6087 }
96d887e8
PH
6088}
6089
b5ec771e
PA
6090/* Returns true iff symbol name SYM_NAME matches SEARCH_NAME, ignoring
6091 any trailing suffixes that encode debugging information or leading
6092 _ada_ on SYM_NAME (see is_name_suffix commentary for the debugging
6093 information that is ignored). */
40658b94 6094
b5ec771e 6095static bool
c4d840bd
PH
6096full_match (const char *sym_name, const char *search_name)
6097{
b5ec771e
PA
6098 size_t search_name_len = strlen (search_name);
6099
6100 if (strncmp (sym_name, search_name, search_name_len) == 0
6101 && is_name_suffix (sym_name + search_name_len))
6102 return true;
6103
6104 if (startswith (sym_name, "_ada_")
6105 && strncmp (sym_name + 5, search_name, search_name_len) == 0
6106 && is_name_suffix (sym_name + search_name_len + 5))
6107 return true;
c4d840bd 6108
b5ec771e
PA
6109 return false;
6110}
c4d840bd 6111
b5ec771e
PA
6112/* Add symbols from BLOCK matching LOOKUP_NAME in DOMAIN to vector
6113 *defn_symbols, updating the list of symbols in OBSTACKP (if
6114 necessary). OBJFILE is the section containing BLOCK. */
96d887e8
PH
6115
6116static void
6117ada_add_block_symbols (struct obstack *obstackp,
b5ec771e
PA
6118 const struct block *block,
6119 const lookup_name_info &lookup_name,
6120 domain_enum domain, struct objfile *objfile)
96d887e8 6121{
8157b174 6122 struct block_iterator iter;
96d887e8
PH
6123 /* A matching argument symbol, if any. */
6124 struct symbol *arg_sym;
6125 /* Set true when we find a matching non-argument symbol. */
6126 int found_sym;
6127 struct symbol *sym;
6128
6129 arg_sym = NULL;
6130 found_sym = 0;
b5ec771e
PA
6131 for (sym = block_iter_match_first (block, lookup_name, &iter);
6132 sym != NULL;
6133 sym = block_iter_match_next (lookup_name, &iter))
96d887e8 6134 {
b5ec771e
PA
6135 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
6136 SYMBOL_DOMAIN (sym), domain))
6137 {
6138 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6139 {
6140 if (SYMBOL_IS_ARGUMENT (sym))
6141 arg_sym = sym;
6142 else
6143 {
6144 found_sym = 1;
6145 add_defn_to_vec (obstackp,
6146 fixup_symbol_section (sym, objfile),
6147 block);
6148 }
6149 }
6150 }
96d887e8
PH
6151 }
6152
22cee43f
PMR
6153 /* Handle renamings. */
6154
b5ec771e 6155 if (ada_add_block_renamings (obstackp, block, lookup_name, domain))
22cee43f
PMR
6156 found_sym = 1;
6157
96d887e8
PH
6158 if (!found_sym && arg_sym != NULL)
6159 {
76a01679
JB
6160 add_defn_to_vec (obstackp,
6161 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6162 block);
96d887e8
PH
6163 }
6164
b5ec771e 6165 if (!lookup_name.ada ().wild_match_p ())
96d887e8
PH
6166 {
6167 arg_sym = NULL;
6168 found_sym = 0;
b5ec771e
PA
6169 const std::string &ada_lookup_name = lookup_name.ada ().lookup_name ();
6170 const char *name = ada_lookup_name.c_str ();
6171 size_t name_len = ada_lookup_name.size ();
96d887e8
PH
6172
6173 ALL_BLOCK_SYMBOLS (block, iter, sym)
76a01679 6174 {
4186eb54
KS
6175 if (symbol_matches_domain (SYMBOL_LANGUAGE (sym),
6176 SYMBOL_DOMAIN (sym), domain))
76a01679
JB
6177 {
6178 int cmp;
6179
6180 cmp = (int) '_' - (int) SYMBOL_LINKAGE_NAME (sym)[0];
6181 if (cmp == 0)
6182 {
61012eef 6183 cmp = !startswith (SYMBOL_LINKAGE_NAME (sym), "_ada_");
76a01679
JB
6184 if (cmp == 0)
6185 cmp = strncmp (name, SYMBOL_LINKAGE_NAME (sym) + 5,
6186 name_len);
6187 }
6188
6189 if (cmp == 0
6190 && is_name_suffix (SYMBOL_LINKAGE_NAME (sym) + name_len + 5))
6191 {
2a2d4dc3
AS
6192 if (SYMBOL_CLASS (sym) != LOC_UNRESOLVED)
6193 {
6194 if (SYMBOL_IS_ARGUMENT (sym))
6195 arg_sym = sym;
6196 else
6197 {
6198 found_sym = 1;
6199 add_defn_to_vec (obstackp,
6200 fixup_symbol_section (sym, objfile),
6201 block);
6202 }
6203 }
76a01679
JB
6204 }
6205 }
76a01679 6206 }
96d887e8
PH
6207
6208 /* NOTE: This really shouldn't be needed for _ada_ symbols.
6209 They aren't parameters, right? */
6210 if (!found_sym && arg_sym != NULL)
6211 {
6212 add_defn_to_vec (obstackp,
76a01679 6213 fixup_symbol_section (arg_sym, objfile),
2570f2b7 6214 block);
96d887e8
PH
6215 }
6216 }
6217}
6218\f
41d27058
JB
6219
6220 /* Symbol Completion */
6221
b5ec771e 6222/* See symtab.h. */
41d27058 6223
b5ec771e
PA
6224bool
6225ada_lookup_name_info::matches
6226 (const char *sym_name,
6227 symbol_name_match_type match_type,
a207cff2 6228 completion_match_result *comp_match_res) const
41d27058 6229{
b5ec771e
PA
6230 bool match = false;
6231 const char *text = m_encoded_name.c_str ();
6232 size_t text_len = m_encoded_name.size ();
41d27058
JB
6233
6234 /* First, test against the fully qualified name of the symbol. */
6235
6236 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6237 match = true;
41d27058 6238
b5ec771e 6239 if (match && !m_encoded_p)
41d27058
JB
6240 {
6241 /* One needed check before declaring a positive match is to verify
6242 that iff we are doing a verbatim match, the decoded version
6243 of the symbol name starts with '<'. Otherwise, this symbol name
6244 is not a suitable completion. */
6245 const char *sym_name_copy = sym_name;
b5ec771e 6246 bool has_angle_bracket;
41d27058
JB
6247
6248 sym_name = ada_decode (sym_name);
6249 has_angle_bracket = (sym_name[0] == '<');
b5ec771e 6250 match = (has_angle_bracket == m_verbatim_p);
41d27058
JB
6251 sym_name = sym_name_copy;
6252 }
6253
b5ec771e 6254 if (match && !m_verbatim_p)
41d27058
JB
6255 {
6256 /* When doing non-verbatim match, another check that needs to
6257 be done is to verify that the potentially matching symbol name
6258 does not include capital letters, because the ada-mode would
6259 not be able to understand these symbol names without the
6260 angle bracket notation. */
6261 const char *tmp;
6262
6263 for (tmp = sym_name; *tmp != '\0' && !isupper (*tmp); tmp++);
6264 if (*tmp != '\0')
b5ec771e 6265 match = false;
41d27058
JB
6266 }
6267
6268 /* Second: Try wild matching... */
6269
b5ec771e 6270 if (!match && m_wild_match_p)
41d27058
JB
6271 {
6272 /* Since we are doing wild matching, this means that TEXT
6273 may represent an unqualified symbol name. We therefore must
6274 also compare TEXT against the unqualified name of the symbol. */
6275 sym_name = ada_unqualified_name (ada_decode (sym_name));
6276
6277 if (strncmp (sym_name, text, text_len) == 0)
b5ec771e 6278 match = true;
41d27058
JB
6279 }
6280
b5ec771e 6281 /* Finally: If we found a match, prepare the result to return. */
41d27058
JB
6282
6283 if (!match)
b5ec771e 6284 return false;
41d27058 6285
a207cff2 6286 if (comp_match_res != NULL)
b5ec771e 6287 {
a207cff2 6288 std::string &match_str = comp_match_res->match.storage ();
41d27058 6289
b5ec771e 6290 if (!m_encoded_p)
a207cff2 6291 match_str = ada_decode (sym_name);
b5ec771e
PA
6292 else
6293 {
6294 if (m_verbatim_p)
6295 match_str = add_angle_brackets (sym_name);
6296 else
6297 match_str = sym_name;
41d27058 6298
b5ec771e 6299 }
a207cff2
PA
6300
6301 comp_match_res->set_match (match_str.c_str ());
41d27058
JB
6302 }
6303
b5ec771e 6304 return true;
41d27058
JB
6305}
6306
b5ec771e 6307/* Add the list of possible symbol names completing TEXT to TRACKER.
eb3ff9a5 6308 WORD is the entire command on which completion is made. */
41d27058 6309
eb3ff9a5
PA
6310static void
6311ada_collect_symbol_completion_matches (completion_tracker &tracker,
c6756f62 6312 complete_symbol_mode mode,
b5ec771e
PA
6313 symbol_name_match_type name_match_type,
6314 const char *text, const char *word,
eb3ff9a5 6315 enum type_code code)
41d27058 6316{
41d27058 6317 struct symbol *sym;
3977b71f 6318 const struct block *b, *surrounding_static_block = 0;
8157b174 6319 struct block_iterator iter;
41d27058 6320
2f68a895
TT
6321 gdb_assert (code == TYPE_CODE_UNDEF);
6322
1b026119 6323 lookup_name_info lookup_name (text, name_match_type, true);
41d27058
JB
6324
6325 /* First, look at the partial symtab symbols. */
14bc53a8 6326 expand_symtabs_matching (NULL,
b5ec771e
PA
6327 lookup_name,
6328 NULL,
14bc53a8
PA
6329 NULL,
6330 ALL_DOMAIN);
41d27058
JB
6331
6332 /* At this point scan through the misc symbol vectors and add each
6333 symbol you find to the list. Eventually we want to ignore
6334 anything that isn't a text symbol (everything else will be
6335 handled by the psymtab code above). */
6336
2030c079 6337 for (objfile *objfile : current_program_space->objfiles ())
5325b9bf 6338 {
7932255d 6339 for (minimal_symbol *msymbol : objfile->msymbols ())
5325b9bf
TT
6340 {
6341 QUIT;
6342
6343 if (completion_skip_symbol (mode, msymbol))
6344 continue;
6345
6346 language symbol_language = MSYMBOL_LANGUAGE (msymbol);
6347
6348 /* Ada minimal symbols won't have their language set to Ada. If
6349 we let completion_list_add_name compare using the
6350 default/C-like matcher, then when completing e.g., symbols in a
6351 package named "pck", we'd match internal Ada symbols like
6352 "pckS", which are invalid in an Ada expression, unless you wrap
6353 them in '<' '>' to request a verbatim match.
6354
6355 Unfortunately, some Ada encoded names successfully demangle as
6356 C++ symbols (using an old mangling scheme), such as "name__2Xn"
6357 -> "Xn::name(void)" and thus some Ada minimal symbols end up
6358 with the wrong language set. Paper over that issue here. */
6359 if (symbol_language == language_auto
6360 || symbol_language == language_cplus)
6361 symbol_language = language_ada;
6362
6363 completion_list_add_name (tracker,
6364 symbol_language,
6365 MSYMBOL_LINKAGE_NAME (msymbol),
6366 lookup_name, text, word);
6367 }
6368 }
41d27058
JB
6369
6370 /* Search upwards from currently selected frame (so that we can
6371 complete on local vars. */
6372
6373 for (b = get_selected_block (0); b != NULL; b = BLOCK_SUPERBLOCK (b))
6374 {
6375 if (!BLOCK_SUPERBLOCK (b))
6376 surrounding_static_block = b; /* For elmin of dups */
6377
6378 ALL_BLOCK_SYMBOLS (b, iter, sym)
6379 {
f9d67a22
PA
6380 if (completion_skip_symbol (mode, sym))
6381 continue;
6382
b5ec771e
PA
6383 completion_list_add_name (tracker,
6384 SYMBOL_LANGUAGE (sym),
6385 SYMBOL_LINKAGE_NAME (sym),
1b026119 6386 lookup_name, text, word);
41d27058
JB
6387 }
6388 }
6389
6390 /* Go through the symtabs and check the externs and statics for
43f3e411 6391 symbols which match. */
41d27058 6392
2030c079 6393 for (objfile *objfile : current_program_space->objfiles ())
41d27058 6394 {
b669c953 6395 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6396 {
6397 QUIT;
6398 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), GLOBAL_BLOCK);
6399 ALL_BLOCK_SYMBOLS (b, iter, sym)
6400 {
6401 if (completion_skip_symbol (mode, sym))
6402 continue;
f9d67a22 6403
d8aeb77f
TT
6404 completion_list_add_name (tracker,
6405 SYMBOL_LANGUAGE (sym),
6406 SYMBOL_LINKAGE_NAME (sym),
6407 lookup_name, text, word);
6408 }
6409 }
41d27058 6410 }
41d27058 6411
2030c079 6412 for (objfile *objfile : current_program_space->objfiles ())
d8aeb77f 6413 {
b669c953 6414 for (compunit_symtab *s : objfile->compunits ())
d8aeb77f
TT
6415 {
6416 QUIT;
6417 b = BLOCKVECTOR_BLOCK (COMPUNIT_BLOCKVECTOR (s), STATIC_BLOCK);
6418 /* Don't do this block twice. */
6419 if (b == surrounding_static_block)
6420 continue;
6421 ALL_BLOCK_SYMBOLS (b, iter, sym)
6422 {
6423 if (completion_skip_symbol (mode, sym))
6424 continue;
f9d67a22 6425
d8aeb77f
TT
6426 completion_list_add_name (tracker,
6427 SYMBOL_LANGUAGE (sym),
6428 SYMBOL_LINKAGE_NAME (sym),
6429 lookup_name, text, word);
6430 }
6431 }
41d27058 6432 }
41d27058
JB
6433}
6434
963a6417 6435 /* Field Access */
96d887e8 6436
73fb9985
JB
6437/* Return non-zero if TYPE is a pointer to the GNAT dispatch table used
6438 for tagged types. */
6439
6440static int
6441ada_is_dispatch_table_ptr_type (struct type *type)
6442{
0d5cff50 6443 const char *name;
73fb9985
JB
6444
6445 if (TYPE_CODE (type) != TYPE_CODE_PTR)
6446 return 0;
6447
6448 name = TYPE_NAME (TYPE_TARGET_TYPE (type));
6449 if (name == NULL)
6450 return 0;
6451
6452 return (strcmp (name, "ada__tags__dispatch_table") == 0);
6453}
6454
ac4a2da4
JG
6455/* Return non-zero if TYPE is an interface tag. */
6456
6457static int
6458ada_is_interface_tag (struct type *type)
6459{
6460 const char *name = TYPE_NAME (type);
6461
6462 if (name == NULL)
6463 return 0;
6464
6465 return (strcmp (name, "ada__tags__interface_tag") == 0);
6466}
6467
963a6417
PH
6468/* True if field number FIELD_NUM in struct or union type TYPE is supposed
6469 to be invisible to users. */
96d887e8 6470
963a6417
PH
6471int
6472ada_is_ignored_field (struct type *type, int field_num)
96d887e8 6473{
963a6417
PH
6474 if (field_num < 0 || field_num > TYPE_NFIELDS (type))
6475 return 1;
ffde82bf 6476
73fb9985
JB
6477 /* Check the name of that field. */
6478 {
6479 const char *name = TYPE_FIELD_NAME (type, field_num);
6480
6481 /* Anonymous field names should not be printed.
6482 brobecker/2007-02-20: I don't think this can actually happen
6483 but we don't want to print the value of annonymous fields anyway. */
6484 if (name == NULL)
6485 return 1;
6486
ffde82bf
JB
6487 /* Normally, fields whose name start with an underscore ("_")
6488 are fields that have been internally generated by the compiler,
6489 and thus should not be printed. The "_parent" field is special,
6490 however: This is a field internally generated by the compiler
6491 for tagged types, and it contains the components inherited from
6492 the parent type. This field should not be printed as is, but
6493 should not be ignored either. */
61012eef 6494 if (name[0] == '_' && !startswith (name, "_parent"))
73fb9985
JB
6495 return 1;
6496 }
6497
ac4a2da4
JG
6498 /* If this is the dispatch table of a tagged type or an interface tag,
6499 then ignore. */
73fb9985 6500 if (ada_is_tagged_type (type, 1)
ac4a2da4
JG
6501 && (ada_is_dispatch_table_ptr_type (TYPE_FIELD_TYPE (type, field_num))
6502 || ada_is_interface_tag (TYPE_FIELD_TYPE (type, field_num))))
73fb9985
JB
6503 return 1;
6504
6505 /* Not a special field, so it should not be ignored. */
6506 return 0;
963a6417 6507}
96d887e8 6508
963a6417 6509/* True iff TYPE has a tag field. If REFOK, then TYPE may also be a
0963b4bd 6510 pointer or reference type whose ultimate target has a tag field. */
96d887e8 6511
963a6417
PH
6512int
6513ada_is_tagged_type (struct type *type, int refok)
6514{
988f6b3d 6515 return (ada_lookup_struct_elt_type (type, "_tag", refok, 1) != NULL);
963a6417 6516}
96d887e8 6517
963a6417 6518/* True iff TYPE represents the type of X'Tag */
96d887e8 6519
963a6417
PH
6520int
6521ada_is_tag_type (struct type *type)
6522{
460efde1
JB
6523 type = ada_check_typedef (type);
6524
963a6417
PH
6525 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_PTR)
6526 return 0;
6527 else
96d887e8 6528 {
963a6417 6529 const char *name = ada_type_name (TYPE_TARGET_TYPE (type));
5b4ee69b 6530
963a6417
PH
6531 return (name != NULL
6532 && strcmp (name, "ada__tags__dispatch_table") == 0);
96d887e8 6533 }
96d887e8
PH
6534}
6535
963a6417 6536/* The type of the tag on VAL. */
76a01679 6537
963a6417
PH
6538struct type *
6539ada_tag_type (struct value *val)
96d887e8 6540{
988f6b3d 6541 return ada_lookup_struct_elt_type (value_type (val), "_tag", 1, 0);
963a6417 6542}
96d887e8 6543
b50d69b5
JG
6544/* Return 1 if TAG follows the old scheme for Ada tags (used for Ada 95,
6545 retired at Ada 05). */
6546
6547static int
6548is_ada95_tag (struct value *tag)
6549{
6550 return ada_value_struct_elt (tag, "tsd", 1) != NULL;
6551}
6552
963a6417 6553/* The value of the tag on VAL. */
96d887e8 6554
963a6417
PH
6555struct value *
6556ada_value_tag (struct value *val)
6557{
03ee6b2e 6558 return ada_value_struct_elt (val, "_tag", 0);
96d887e8
PH
6559}
6560
963a6417
PH
6561/* The value of the tag on the object of type TYPE whose contents are
6562 saved at VALADDR, if it is non-null, or is at memory address
0963b4bd 6563 ADDRESS. */
96d887e8 6564
963a6417 6565static struct value *
10a2c479 6566value_tag_from_contents_and_address (struct type *type,
fc1a4b47 6567 const gdb_byte *valaddr,
963a6417 6568 CORE_ADDR address)
96d887e8 6569{
b5385fc0 6570 int tag_byte_offset;
963a6417 6571 struct type *tag_type;
5b4ee69b 6572
963a6417 6573 if (find_struct_field ("_tag", type, 0, &tag_type, &tag_byte_offset,
52ce6436 6574 NULL, NULL, NULL))
96d887e8 6575 {
fc1a4b47 6576 const gdb_byte *valaddr1 = ((valaddr == NULL)
10a2c479
AC
6577 ? NULL
6578 : valaddr + tag_byte_offset);
963a6417 6579 CORE_ADDR address1 = (address == 0) ? 0 : address + tag_byte_offset;
96d887e8 6580
963a6417 6581 return value_from_contents_and_address (tag_type, valaddr1, address1);
96d887e8 6582 }
963a6417
PH
6583 return NULL;
6584}
96d887e8 6585
963a6417
PH
6586static struct type *
6587type_from_tag (struct value *tag)
6588{
6589 const char *type_name = ada_tag_name (tag);
5b4ee69b 6590
963a6417
PH
6591 if (type_name != NULL)
6592 return ada_find_any_type (ada_encode (type_name));
6593 return NULL;
6594}
96d887e8 6595
b50d69b5
JG
6596/* Given a value OBJ of a tagged type, return a value of this
6597 type at the base address of the object. The base address, as
6598 defined in Ada.Tags, it is the address of the primary tag of
6599 the object, and therefore where the field values of its full
6600 view can be fetched. */
6601
6602struct value *
6603ada_tag_value_at_base_address (struct value *obj)
6604{
b50d69b5
JG
6605 struct value *val;
6606 LONGEST offset_to_top = 0;
6607 struct type *ptr_type, *obj_type;
6608 struct value *tag;
6609 CORE_ADDR base_address;
6610
6611 obj_type = value_type (obj);
6612
6613 /* It is the responsability of the caller to deref pointers. */
6614
6615 if (TYPE_CODE (obj_type) == TYPE_CODE_PTR
6616 || TYPE_CODE (obj_type) == TYPE_CODE_REF)
6617 return obj;
6618
6619 tag = ada_value_tag (obj);
6620 if (!tag)
6621 return obj;
6622
6623 /* Base addresses only appeared with Ada 05 and multiple inheritance. */
6624
6625 if (is_ada95_tag (tag))
6626 return obj;
6627
08f49010
XR
6628 ptr_type = language_lookup_primitive_type
6629 (language_def (language_ada), target_gdbarch(), "storage_offset");
b50d69b5
JG
6630 ptr_type = lookup_pointer_type (ptr_type);
6631 val = value_cast (ptr_type, tag);
6632 if (!val)
6633 return obj;
6634
6635 /* It is perfectly possible that an exception be raised while
6636 trying to determine the base address, just like for the tag;
6637 see ada_tag_name for more details. We do not print the error
6638 message for the same reason. */
6639
a70b8144 6640 try
b50d69b5
JG
6641 {
6642 offset_to_top = value_as_long (value_ind (value_ptradd (val, -2)));
6643 }
6644
230d2906 6645 catch (const gdb_exception_error &e)
492d29ea
PA
6646 {
6647 return obj;
6648 }
b50d69b5
JG
6649
6650 /* If offset is null, nothing to do. */
6651
6652 if (offset_to_top == 0)
6653 return obj;
6654
6655 /* -1 is a special case in Ada.Tags; however, what should be done
6656 is not quite clear from the documentation. So do nothing for
6657 now. */
6658
6659 if (offset_to_top == -1)
6660 return obj;
6661
08f49010
XR
6662 /* OFFSET_TO_TOP used to be a positive value to be subtracted
6663 from the base address. This was however incompatible with
6664 C++ dispatch table: C++ uses a *negative* value to *add*
6665 to the base address. Ada's convention has therefore been
6666 changed in GNAT 19.0w 20171023: since then, C++ and Ada
6667 use the same convention. Here, we support both cases by
6668 checking the sign of OFFSET_TO_TOP. */
6669
6670 if (offset_to_top > 0)
6671 offset_to_top = -offset_to_top;
6672
6673 base_address = value_address (obj) + offset_to_top;
b50d69b5
JG
6674 tag = value_tag_from_contents_and_address (obj_type, NULL, base_address);
6675
6676 /* Make sure that we have a proper tag at the new address.
6677 Otherwise, offset_to_top is bogus (which can happen when
6678 the object is not initialized yet). */
6679
6680 if (!tag)
6681 return obj;
6682
6683 obj_type = type_from_tag (tag);
6684
6685 if (!obj_type)
6686 return obj;
6687
6688 return value_from_contents_and_address (obj_type, NULL, base_address);
6689}
6690
1b611343
JB
6691/* Return the "ada__tags__type_specific_data" type. */
6692
6693static struct type *
6694ada_get_tsd_type (struct inferior *inf)
963a6417 6695{
1b611343 6696 struct ada_inferior_data *data = get_ada_inferior_data (inf);
4c4b4cd2 6697
1b611343
JB
6698 if (data->tsd_type == 0)
6699 data->tsd_type = ada_find_any_type ("ada__tags__type_specific_data");
6700 return data->tsd_type;
6701}
529cad9c 6702
1b611343
JB
6703/* Return the TSD (type-specific data) associated to the given TAG.
6704 TAG is assumed to be the tag of a tagged-type entity.
529cad9c 6705
1b611343 6706 May return NULL if we are unable to get the TSD. */
4c4b4cd2 6707
1b611343
JB
6708static struct value *
6709ada_get_tsd_from_tag (struct value *tag)
4c4b4cd2 6710{
4c4b4cd2 6711 struct value *val;
1b611343 6712 struct type *type;
5b4ee69b 6713
1b611343
JB
6714 /* First option: The TSD is simply stored as a field of our TAG.
6715 Only older versions of GNAT would use this format, but we have
6716 to test it first, because there are no visible markers for
6717 the current approach except the absence of that field. */
529cad9c 6718
1b611343
JB
6719 val = ada_value_struct_elt (tag, "tsd", 1);
6720 if (val)
6721 return val;
e802dbe0 6722
1b611343
JB
6723 /* Try the second representation for the dispatch table (in which
6724 there is no explicit 'tsd' field in the referent of the tag pointer,
6725 and instead the tsd pointer is stored just before the dispatch
6726 table. */
e802dbe0 6727
1b611343
JB
6728 type = ada_get_tsd_type (current_inferior());
6729 if (type == NULL)
6730 return NULL;
6731 type = lookup_pointer_type (lookup_pointer_type (type));
6732 val = value_cast (type, tag);
6733 if (val == NULL)
6734 return NULL;
6735 return value_ind (value_ptradd (val, -1));
e802dbe0
JB
6736}
6737
1b611343
JB
6738/* Given the TSD of a tag (type-specific data), return a string
6739 containing the name of the associated type.
6740
6741 The returned value is good until the next call. May return NULL
6742 if we are unable to determine the tag name. */
6743
6744static char *
6745ada_tag_name_from_tsd (struct value *tsd)
529cad9c 6746{
529cad9c
PH
6747 static char name[1024];
6748 char *p;
1b611343 6749 struct value *val;
529cad9c 6750
1b611343 6751 val = ada_value_struct_elt (tsd, "expanded_name", 1);
4c4b4cd2 6752 if (val == NULL)
1b611343 6753 return NULL;
4c4b4cd2
PH
6754 read_memory_string (value_as_address (val), name, sizeof (name) - 1);
6755 for (p = name; *p != '\0'; p += 1)
6756 if (isalpha (*p))
6757 *p = tolower (*p);
1b611343 6758 return name;
4c4b4cd2
PH
6759}
6760
6761/* The type name of the dynamic type denoted by the 'tag value TAG, as
1b611343
JB
6762 a C string.
6763
6764 Return NULL if the TAG is not an Ada tag, or if we were unable to
6765 determine the name of that tag. The result is good until the next
6766 call. */
4c4b4cd2
PH
6767
6768const char *
6769ada_tag_name (struct value *tag)
6770{
1b611343 6771 char *name = NULL;
5b4ee69b 6772
df407dfe 6773 if (!ada_is_tag_type (value_type (tag)))
4c4b4cd2 6774 return NULL;
1b611343
JB
6775
6776 /* It is perfectly possible that an exception be raised while trying
6777 to determine the TAG's name, even under normal circumstances:
6778 The associated variable may be uninitialized or corrupted, for
6779 instance. We do not let any exception propagate past this point.
6780 instead we return NULL.
6781
6782 We also do not print the error message either (which often is very
6783 low-level (Eg: "Cannot read memory at 0x[...]"), but instead let
6784 the caller print a more meaningful message if necessary. */
a70b8144 6785 try
1b611343
JB
6786 {
6787 struct value *tsd = ada_get_tsd_from_tag (tag);
6788
6789 if (tsd != NULL)
6790 name = ada_tag_name_from_tsd (tsd);
6791 }
230d2906 6792 catch (const gdb_exception_error &e)
492d29ea
PA
6793 {
6794 }
1b611343
JB
6795
6796 return name;
4c4b4cd2
PH
6797}
6798
6799/* The parent type of TYPE, or NULL if none. */
14f9c5c9 6800
d2e4a39e 6801struct type *
ebf56fd3 6802ada_parent_type (struct type *type)
14f9c5c9
AS
6803{
6804 int i;
6805
61ee279c 6806 type = ada_check_typedef (type);
14f9c5c9
AS
6807
6808 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
6809 return NULL;
6810
6811 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
6812 if (ada_is_parent_field (type, i))
0c1f74cf
JB
6813 {
6814 struct type *parent_type = TYPE_FIELD_TYPE (type, i);
6815
6816 /* If the _parent field is a pointer, then dereference it. */
6817 if (TYPE_CODE (parent_type) == TYPE_CODE_PTR)
6818 parent_type = TYPE_TARGET_TYPE (parent_type);
6819 /* If there is a parallel XVS type, get the actual base type. */
6820 parent_type = ada_get_base_type (parent_type);
6821
6822 return ada_check_typedef (parent_type);
6823 }
14f9c5c9
AS
6824
6825 return NULL;
6826}
6827
4c4b4cd2
PH
6828/* True iff field number FIELD_NUM of structure type TYPE contains the
6829 parent-type (inherited) fields of a derived type. Assumes TYPE is
6830 a structure type with at least FIELD_NUM+1 fields. */
14f9c5c9
AS
6831
6832int
ebf56fd3 6833ada_is_parent_field (struct type *type, int field_num)
14f9c5c9 6834{
61ee279c 6835 const char *name = TYPE_FIELD_NAME (ada_check_typedef (type), field_num);
5b4ee69b 6836
4c4b4cd2 6837 return (name != NULL
61012eef
GB
6838 && (startswith (name, "PARENT")
6839 || startswith (name, "_parent")));
14f9c5c9
AS
6840}
6841
4c4b4cd2 6842/* True iff field number FIELD_NUM of structure type TYPE is a
14f9c5c9 6843 transparent wrapper field (which should be silently traversed when doing
4c4b4cd2 6844 field selection and flattened when printing). Assumes TYPE is a
14f9c5c9 6845 structure type with at least FIELD_NUM+1 fields. Such fields are always
4c4b4cd2 6846 structures. */
14f9c5c9
AS
6847
6848int
ebf56fd3 6849ada_is_wrapper_field (struct type *type, int field_num)
14f9c5c9 6850{
d2e4a39e 6851 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6852
dddc0e16
JB
6853 if (name != NULL && strcmp (name, "RETVAL") == 0)
6854 {
6855 /* This happens in functions with "out" or "in out" parameters
6856 which are passed by copy. For such functions, GNAT describes
6857 the function's return type as being a struct where the return
6858 value is in a field called RETVAL, and where the other "out"
6859 or "in out" parameters are fields of that struct. This is not
6860 a wrapper. */
6861 return 0;
6862 }
6863
d2e4a39e 6864 return (name != NULL
61012eef 6865 && (startswith (name, "PARENT")
4c4b4cd2 6866 || strcmp (name, "REP") == 0
61012eef 6867 || startswith (name, "_parent")
4c4b4cd2 6868 || name[0] == 'S' || name[0] == 'R' || name[0] == 'O'));
14f9c5c9
AS
6869}
6870
4c4b4cd2
PH
6871/* True iff field number FIELD_NUM of structure or union type TYPE
6872 is a variant wrapper. Assumes TYPE is a structure type with at least
6873 FIELD_NUM+1 fields. */
14f9c5c9
AS
6874
6875int
ebf56fd3 6876ada_is_variant_part (struct type *type, int field_num)
14f9c5c9 6877{
8ecb59f8
TT
6878 /* Only Ada types are eligible. */
6879 if (!ADA_TYPE_P (type))
6880 return 0;
6881
d2e4a39e 6882 struct type *field_type = TYPE_FIELD_TYPE (type, field_num);
5b4ee69b 6883
14f9c5c9 6884 return (TYPE_CODE (field_type) == TYPE_CODE_UNION
4c4b4cd2 6885 || (is_dynamic_field (type, field_num)
c3e5cd34
PH
6886 && (TYPE_CODE (TYPE_TARGET_TYPE (field_type))
6887 == TYPE_CODE_UNION)));
14f9c5c9
AS
6888}
6889
6890/* Assuming that VAR_TYPE is a variant wrapper (type of the variant part)
4c4b4cd2 6891 whose discriminants are contained in the record type OUTER_TYPE,
7c964f07
UW
6892 returns the type of the controlling discriminant for the variant.
6893 May return NULL if the type could not be found. */
14f9c5c9 6894
d2e4a39e 6895struct type *
ebf56fd3 6896ada_variant_discrim_type (struct type *var_type, struct type *outer_type)
14f9c5c9 6897{
a121b7c1 6898 const char *name = ada_variant_discrim_name (var_type);
5b4ee69b 6899
988f6b3d 6900 return ada_lookup_struct_elt_type (outer_type, name, 1, 1);
14f9c5c9
AS
6901}
6902
4c4b4cd2 6903/* Assuming that TYPE is the type of a variant wrapper, and FIELD_NUM is a
14f9c5c9 6904 valid field number within it, returns 1 iff field FIELD_NUM of TYPE
4c4b4cd2 6905 represents a 'when others' clause; otherwise 0. */
14f9c5c9
AS
6906
6907int
ebf56fd3 6908ada_is_others_clause (struct type *type, int field_num)
14f9c5c9 6909{
d2e4a39e 6910 const char *name = TYPE_FIELD_NAME (type, field_num);
5b4ee69b 6911
14f9c5c9
AS
6912 return (name != NULL && name[0] == 'O');
6913}
6914
6915/* Assuming that TYPE0 is the type of the variant part of a record,
4c4b4cd2
PH
6916 returns the name of the discriminant controlling the variant.
6917 The value is valid until the next call to ada_variant_discrim_name. */
14f9c5c9 6918
a121b7c1 6919const char *
ebf56fd3 6920ada_variant_discrim_name (struct type *type0)
14f9c5c9 6921{
d2e4a39e 6922 static char *result = NULL;
14f9c5c9 6923 static size_t result_len = 0;
d2e4a39e
AS
6924 struct type *type;
6925 const char *name;
6926 const char *discrim_end;
6927 const char *discrim_start;
14f9c5c9
AS
6928
6929 if (TYPE_CODE (type0) == TYPE_CODE_PTR)
6930 type = TYPE_TARGET_TYPE (type0);
6931 else
6932 type = type0;
6933
6934 name = ada_type_name (type);
6935
6936 if (name == NULL || name[0] == '\000')
6937 return "";
6938
6939 for (discrim_end = name + strlen (name) - 6; discrim_end != name;
6940 discrim_end -= 1)
6941 {
61012eef 6942 if (startswith (discrim_end, "___XVN"))
4c4b4cd2 6943 break;
14f9c5c9
AS
6944 }
6945 if (discrim_end == name)
6946 return "";
6947
d2e4a39e 6948 for (discrim_start = discrim_end; discrim_start != name + 3;
14f9c5c9
AS
6949 discrim_start -= 1)
6950 {
d2e4a39e 6951 if (discrim_start == name + 1)
4c4b4cd2 6952 return "";
76a01679 6953 if ((discrim_start > name + 3
61012eef 6954 && startswith (discrim_start - 3, "___"))
4c4b4cd2
PH
6955 || discrim_start[-1] == '.')
6956 break;
14f9c5c9
AS
6957 }
6958
6959 GROW_VECT (result, result_len, discrim_end - discrim_start + 1);
6960 strncpy (result, discrim_start, discrim_end - discrim_start);
d2e4a39e 6961 result[discrim_end - discrim_start] = '\0';
14f9c5c9
AS
6962 return result;
6963}
6964
4c4b4cd2
PH
6965/* Scan STR for a subtype-encoded number, beginning at position K.
6966 Put the position of the character just past the number scanned in
6967 *NEW_K, if NEW_K!=NULL. Put the scanned number in *R, if R!=NULL.
6968 Return 1 if there was a valid number at the given position, and 0
6969 otherwise. A "subtype-encoded" number consists of the absolute value
6970 in decimal, followed by the letter 'm' to indicate a negative number.
6971 Assumes 0m does not occur. */
14f9c5c9
AS
6972
6973int
d2e4a39e 6974ada_scan_number (const char str[], int k, LONGEST * R, int *new_k)
14f9c5c9
AS
6975{
6976 ULONGEST RU;
6977
d2e4a39e 6978 if (!isdigit (str[k]))
14f9c5c9
AS
6979 return 0;
6980
4c4b4cd2 6981 /* Do it the hard way so as not to make any assumption about
14f9c5c9 6982 the relationship of unsigned long (%lu scan format code) and
4c4b4cd2 6983 LONGEST. */
14f9c5c9
AS
6984 RU = 0;
6985 while (isdigit (str[k]))
6986 {
d2e4a39e 6987 RU = RU * 10 + (str[k] - '0');
14f9c5c9
AS
6988 k += 1;
6989 }
6990
d2e4a39e 6991 if (str[k] == 'm')
14f9c5c9
AS
6992 {
6993 if (R != NULL)
4c4b4cd2 6994 *R = (-(LONGEST) (RU - 1)) - 1;
14f9c5c9
AS
6995 k += 1;
6996 }
6997 else if (R != NULL)
6998 *R = (LONGEST) RU;
6999
4c4b4cd2 7000 /* NOTE on the above: Technically, C does not say what the results of
14f9c5c9
AS
7001 - (LONGEST) RU or (LONGEST) -RU are for RU == largest positive
7002 number representable as a LONGEST (although either would probably work
7003 in most implementations). When RU>0, the locution in the then branch
4c4b4cd2 7004 above is always equivalent to the negative of RU. */
14f9c5c9
AS
7005
7006 if (new_k != NULL)
7007 *new_k = k;
7008 return 1;
7009}
7010
4c4b4cd2
PH
7011/* Assuming that TYPE is a variant part wrapper type (a VARIANTS field),
7012 and FIELD_NUM is a valid field number within it, returns 1 iff VAL is
7013 in the range encoded by field FIELD_NUM of TYPE; otherwise 0. */
14f9c5c9 7014
d2e4a39e 7015int
ebf56fd3 7016ada_in_variant (LONGEST val, struct type *type, int field_num)
14f9c5c9 7017{
d2e4a39e 7018 const char *name = TYPE_FIELD_NAME (type, field_num);
14f9c5c9
AS
7019 int p;
7020
7021 p = 0;
7022 while (1)
7023 {
d2e4a39e 7024 switch (name[p])
4c4b4cd2
PH
7025 {
7026 case '\0':
7027 return 0;
7028 case 'S':
7029 {
7030 LONGEST W;
5b4ee69b 7031
4c4b4cd2
PH
7032 if (!ada_scan_number (name, p + 1, &W, &p))
7033 return 0;
7034 if (val == W)
7035 return 1;
7036 break;
7037 }
7038 case 'R':
7039 {
7040 LONGEST L, U;
5b4ee69b 7041
4c4b4cd2
PH
7042 if (!ada_scan_number (name, p + 1, &L, &p)
7043 || name[p] != 'T' || !ada_scan_number (name, p + 1, &U, &p))
7044 return 0;
7045 if (val >= L && val <= U)
7046 return 1;
7047 break;
7048 }
7049 case 'O':
7050 return 1;
7051 default:
7052 return 0;
7053 }
7054 }
7055}
7056
0963b4bd 7057/* FIXME: Lots of redundancy below. Try to consolidate. */
4c4b4cd2
PH
7058
7059/* Given a value ARG1 (offset by OFFSET bytes) of a struct or union type
7060 ARG_TYPE, extract and return the value of one of its (non-static)
7061 fields. FIELDNO says which field. Differs from value_primitive_field
7062 only in that it can handle packed values of arbitrary type. */
14f9c5c9 7063
4c4b4cd2 7064static struct value *
d2e4a39e 7065ada_value_primitive_field (struct value *arg1, int offset, int fieldno,
4c4b4cd2 7066 struct type *arg_type)
14f9c5c9 7067{
14f9c5c9
AS
7068 struct type *type;
7069
61ee279c 7070 arg_type = ada_check_typedef (arg_type);
14f9c5c9
AS
7071 type = TYPE_FIELD_TYPE (arg_type, fieldno);
7072
4504bbde
TT
7073 /* Handle packed fields. It might be that the field is not packed
7074 relative to its containing structure, but the structure itself is
7075 packed; in this case we must take the bit-field path. */
7076 if (TYPE_FIELD_BITSIZE (arg_type, fieldno) != 0 || value_bitpos (arg1) != 0)
14f9c5c9
AS
7077 {
7078 int bit_pos = TYPE_FIELD_BITPOS (arg_type, fieldno);
7079 int bit_size = TYPE_FIELD_BITSIZE (arg_type, fieldno);
d2e4a39e 7080
0fd88904 7081 return ada_value_primitive_packed_val (arg1, value_contents (arg1),
4c4b4cd2
PH
7082 offset + bit_pos / 8,
7083 bit_pos % 8, bit_size, type);
14f9c5c9
AS
7084 }
7085 else
7086 return value_primitive_field (arg1, offset, fieldno, arg_type);
7087}
7088
52ce6436
PH
7089/* Find field with name NAME in object of type TYPE. If found,
7090 set the following for each argument that is non-null:
7091 - *FIELD_TYPE_P to the field's type;
7092 - *BYTE_OFFSET_P to OFFSET + the byte offset of the field within
7093 an object of that type;
7094 - *BIT_OFFSET_P to the bit offset modulo byte size of the field;
7095 - *BIT_SIZE_P to its size in bits if the field is packed, and
7096 0 otherwise;
7097 If INDEX_P is non-null, increment *INDEX_P by the number of source-visible
7098 fields up to but not including the desired field, or by the total
7099 number of fields if not found. A NULL value of NAME never
7100 matches; the function just counts visible fields in this case.
7101
828d5846
XR
7102 Notice that we need to handle when a tagged record hierarchy
7103 has some components with the same name, like in this scenario:
7104
7105 type Top_T is tagged record
7106 N : Integer := 1;
7107 U : Integer := 974;
7108 A : Integer := 48;
7109 end record;
7110
7111 type Middle_T is new Top.Top_T with record
7112 N : Character := 'a';
7113 C : Integer := 3;
7114 end record;
7115
7116 type Bottom_T is new Middle.Middle_T with record
7117 N : Float := 4.0;
7118 C : Character := '5';
7119 X : Integer := 6;
7120 A : Character := 'J';
7121 end record;
7122
7123 Let's say we now have a variable declared and initialized as follow:
7124
7125 TC : Top_A := new Bottom_T;
7126
7127 And then we use this variable to call this function
7128
7129 procedure Assign (Obj: in out Top_T; TV : Integer);
7130
7131 as follow:
7132
7133 Assign (Top_T (B), 12);
7134
7135 Now, we're in the debugger, and we're inside that procedure
7136 then and we want to print the value of obj.c:
7137
7138 Usually, the tagged record or one of the parent type owns the
7139 component to print and there's no issue but in this particular
7140 case, what does it mean to ask for Obj.C? Since the actual
7141 type for object is type Bottom_T, it could mean two things: type
7142 component C from the Middle_T view, but also component C from
7143 Bottom_T. So in that "undefined" case, when the component is
7144 not found in the non-resolved type (which includes all the
7145 components of the parent type), then resolve it and see if we
7146 get better luck once expanded.
7147
7148 In the case of homonyms in the derived tagged type, we don't
7149 guaranty anything, and pick the one that's easiest for us
7150 to program.
7151
0963b4bd 7152 Returns 1 if found, 0 otherwise. */
52ce6436 7153
4c4b4cd2 7154static int
0d5cff50 7155find_struct_field (const char *name, struct type *type, int offset,
76a01679 7156 struct type **field_type_p,
52ce6436
PH
7157 int *byte_offset_p, int *bit_offset_p, int *bit_size_p,
7158 int *index_p)
4c4b4cd2
PH
7159{
7160 int i;
828d5846 7161 int parent_offset = -1;
4c4b4cd2 7162
61ee279c 7163 type = ada_check_typedef (type);
76a01679 7164
52ce6436
PH
7165 if (field_type_p != NULL)
7166 *field_type_p = NULL;
7167 if (byte_offset_p != NULL)
d5d6fca5 7168 *byte_offset_p = 0;
52ce6436
PH
7169 if (bit_offset_p != NULL)
7170 *bit_offset_p = 0;
7171 if (bit_size_p != NULL)
7172 *bit_size_p = 0;
7173
7174 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
4c4b4cd2
PH
7175 {
7176 int bit_pos = TYPE_FIELD_BITPOS (type, i);
7177 int fld_offset = offset + bit_pos / 8;
0d5cff50 7178 const char *t_field_name = TYPE_FIELD_NAME (type, i);
76a01679 7179
4c4b4cd2
PH
7180 if (t_field_name == NULL)
7181 continue;
7182
828d5846
XR
7183 else if (ada_is_parent_field (type, i))
7184 {
7185 /* This is a field pointing us to the parent type of a tagged
7186 type. As hinted in this function's documentation, we give
7187 preference to fields in the current record first, so what
7188 we do here is just record the index of this field before
7189 we skip it. If it turns out we couldn't find our field
7190 in the current record, then we'll get back to it and search
7191 inside it whether the field might exist in the parent. */
7192
7193 parent_offset = i;
7194 continue;
7195 }
7196
52ce6436 7197 else if (name != NULL && field_name_match (t_field_name, name))
76a01679
JB
7198 {
7199 int bit_size = TYPE_FIELD_BITSIZE (type, i);
5b4ee69b 7200
52ce6436
PH
7201 if (field_type_p != NULL)
7202 *field_type_p = TYPE_FIELD_TYPE (type, i);
7203 if (byte_offset_p != NULL)
7204 *byte_offset_p = fld_offset;
7205 if (bit_offset_p != NULL)
7206 *bit_offset_p = bit_pos % 8;
7207 if (bit_size_p != NULL)
7208 *bit_size_p = bit_size;
76a01679
JB
7209 return 1;
7210 }
4c4b4cd2
PH
7211 else if (ada_is_wrapper_field (type, i))
7212 {
52ce6436
PH
7213 if (find_struct_field (name, TYPE_FIELD_TYPE (type, i), fld_offset,
7214 field_type_p, byte_offset_p, bit_offset_p,
7215 bit_size_p, index_p))
76a01679
JB
7216 return 1;
7217 }
4c4b4cd2
PH
7218 else if (ada_is_variant_part (type, i))
7219 {
52ce6436
PH
7220 /* PNH: Wait. Do we ever execute this section, or is ARG always of
7221 fixed type?? */
4c4b4cd2 7222 int j;
52ce6436
PH
7223 struct type *field_type
7224 = ada_check_typedef (TYPE_FIELD_TYPE (type, i));
4c4b4cd2 7225
52ce6436 7226 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7227 {
76a01679
JB
7228 if (find_struct_field (name, TYPE_FIELD_TYPE (field_type, j),
7229 fld_offset
7230 + TYPE_FIELD_BITPOS (field_type, j) / 8,
7231 field_type_p, byte_offset_p,
52ce6436 7232 bit_offset_p, bit_size_p, index_p))
76a01679 7233 return 1;
4c4b4cd2
PH
7234 }
7235 }
52ce6436
PH
7236 else if (index_p != NULL)
7237 *index_p += 1;
4c4b4cd2 7238 }
828d5846
XR
7239
7240 /* Field not found so far. If this is a tagged type which
7241 has a parent, try finding that field in the parent now. */
7242
7243 if (parent_offset != -1)
7244 {
7245 int bit_pos = TYPE_FIELD_BITPOS (type, parent_offset);
7246 int fld_offset = offset + bit_pos / 8;
7247
7248 if (find_struct_field (name, TYPE_FIELD_TYPE (type, parent_offset),
7249 fld_offset, field_type_p, byte_offset_p,
7250 bit_offset_p, bit_size_p, index_p))
7251 return 1;
7252 }
7253
4c4b4cd2
PH
7254 return 0;
7255}
7256
0963b4bd 7257/* Number of user-visible fields in record type TYPE. */
4c4b4cd2 7258
52ce6436
PH
7259static int
7260num_visible_fields (struct type *type)
7261{
7262 int n;
5b4ee69b 7263
52ce6436
PH
7264 n = 0;
7265 find_struct_field (NULL, type, 0, NULL, NULL, NULL, NULL, &n);
7266 return n;
7267}
14f9c5c9 7268
4c4b4cd2 7269/* Look for a field NAME in ARG. Adjust the address of ARG by OFFSET bytes,
14f9c5c9
AS
7270 and search in it assuming it has (class) type TYPE.
7271 If found, return value, else return NULL.
7272
828d5846
XR
7273 Searches recursively through wrapper fields (e.g., '_parent').
7274
7275 In the case of homonyms in the tagged types, please refer to the
7276 long explanation in find_struct_field's function documentation. */
14f9c5c9 7277
4c4b4cd2 7278static struct value *
108d56a4 7279ada_search_struct_field (const char *name, struct value *arg, int offset,
4c4b4cd2 7280 struct type *type)
14f9c5c9
AS
7281{
7282 int i;
828d5846 7283 int parent_offset = -1;
14f9c5c9 7284
5b4ee69b 7285 type = ada_check_typedef (type);
52ce6436 7286 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
14f9c5c9 7287 {
0d5cff50 7288 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9
AS
7289
7290 if (t_field_name == NULL)
4c4b4cd2 7291 continue;
14f9c5c9 7292
828d5846
XR
7293 else if (ada_is_parent_field (type, i))
7294 {
7295 /* This is a field pointing us to the parent type of a tagged
7296 type. As hinted in this function's documentation, we give
7297 preference to fields in the current record first, so what
7298 we do here is just record the index of this field before
7299 we skip it. If it turns out we couldn't find our field
7300 in the current record, then we'll get back to it and search
7301 inside it whether the field might exist in the parent. */
7302
7303 parent_offset = i;
7304 continue;
7305 }
7306
14f9c5c9 7307 else if (field_name_match (t_field_name, name))
4c4b4cd2 7308 return ada_value_primitive_field (arg, offset, i, type);
14f9c5c9
AS
7309
7310 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7311 {
0963b4bd 7312 struct value *v = /* Do not let indent join lines here. */
06d5cf63
JB
7313 ada_search_struct_field (name, arg,
7314 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7315 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7316
4c4b4cd2
PH
7317 if (v != NULL)
7318 return v;
7319 }
14f9c5c9
AS
7320
7321 else if (ada_is_variant_part (type, i))
4c4b4cd2 7322 {
0963b4bd 7323 /* PNH: Do we ever get here? See find_struct_field. */
4c4b4cd2 7324 int j;
5b4ee69b
MS
7325 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7326 i));
4c4b4cd2
PH
7327 int var_offset = offset + TYPE_FIELD_BITPOS (type, i) / 8;
7328
52ce6436 7329 for (j = 0; j < TYPE_NFIELDS (field_type); j += 1)
4c4b4cd2 7330 {
0963b4bd
MS
7331 struct value *v = ada_search_struct_field /* Force line
7332 break. */
06d5cf63
JB
7333 (name, arg,
7334 var_offset + TYPE_FIELD_BITPOS (field_type, j) / 8,
7335 TYPE_FIELD_TYPE (field_type, j));
5b4ee69b 7336
4c4b4cd2
PH
7337 if (v != NULL)
7338 return v;
7339 }
7340 }
14f9c5c9 7341 }
828d5846
XR
7342
7343 /* Field not found so far. If this is a tagged type which
7344 has a parent, try finding that field in the parent now. */
7345
7346 if (parent_offset != -1)
7347 {
7348 struct value *v = ada_search_struct_field (
7349 name, arg, offset + TYPE_FIELD_BITPOS (type, parent_offset) / 8,
7350 TYPE_FIELD_TYPE (type, parent_offset));
7351
7352 if (v != NULL)
7353 return v;
7354 }
7355
14f9c5c9
AS
7356 return NULL;
7357}
d2e4a39e 7358
52ce6436
PH
7359static struct value *ada_index_struct_field_1 (int *, struct value *,
7360 int, struct type *);
7361
7362
7363/* Return field #INDEX in ARG, where the index is that returned by
7364 * find_struct_field through its INDEX_P argument. Adjust the address
7365 * of ARG by OFFSET bytes, and search in it assuming it has (class) type TYPE.
0963b4bd 7366 * If found, return value, else return NULL. */
52ce6436
PH
7367
7368static struct value *
7369ada_index_struct_field (int index, struct value *arg, int offset,
7370 struct type *type)
7371{
7372 return ada_index_struct_field_1 (&index, arg, offset, type);
7373}
7374
7375
7376/* Auxiliary function for ada_index_struct_field. Like
7377 * ada_index_struct_field, but takes index from *INDEX_P and modifies
0963b4bd 7378 * *INDEX_P. */
52ce6436
PH
7379
7380static struct value *
7381ada_index_struct_field_1 (int *index_p, struct value *arg, int offset,
7382 struct type *type)
7383{
7384 int i;
7385 type = ada_check_typedef (type);
7386
7387 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7388 {
7389 if (TYPE_FIELD_NAME (type, i) == NULL)
7390 continue;
7391 else if (ada_is_wrapper_field (type, i))
7392 {
0963b4bd 7393 struct value *v = /* Do not let indent join lines here. */
52ce6436
PH
7394 ada_index_struct_field_1 (index_p, arg,
7395 offset + TYPE_FIELD_BITPOS (type, i) / 8,
7396 TYPE_FIELD_TYPE (type, i));
5b4ee69b 7397
52ce6436
PH
7398 if (v != NULL)
7399 return v;
7400 }
7401
7402 else if (ada_is_variant_part (type, i))
7403 {
7404 /* PNH: Do we ever get here? See ada_search_struct_field,
0963b4bd 7405 find_struct_field. */
52ce6436
PH
7406 error (_("Cannot assign this kind of variant record"));
7407 }
7408 else if (*index_p == 0)
7409 return ada_value_primitive_field (arg, offset, i, type);
7410 else
7411 *index_p -= 1;
7412 }
7413 return NULL;
7414}
7415
4c4b4cd2
PH
7416/* Given ARG, a value of type (pointer or reference to a)*
7417 structure/union, extract the component named NAME from the ultimate
7418 target structure/union and return it as a value with its
f5938064 7419 appropriate type.
14f9c5c9 7420
4c4b4cd2
PH
7421 The routine searches for NAME among all members of the structure itself
7422 and (recursively) among all members of any wrapper members
14f9c5c9
AS
7423 (e.g., '_parent').
7424
03ee6b2e
PH
7425 If NO_ERR, then simply return NULL in case of error, rather than
7426 calling error. */
14f9c5c9 7427
d2e4a39e 7428struct value *
a121b7c1 7429ada_value_struct_elt (struct value *arg, const char *name, int no_err)
14f9c5c9 7430{
4c4b4cd2 7431 struct type *t, *t1;
d2e4a39e 7432 struct value *v;
1f5d1570 7433 int check_tag;
14f9c5c9 7434
4c4b4cd2 7435 v = NULL;
df407dfe 7436 t1 = t = ada_check_typedef (value_type (arg));
4c4b4cd2
PH
7437 if (TYPE_CODE (t) == TYPE_CODE_REF)
7438 {
7439 t1 = TYPE_TARGET_TYPE (t);
7440 if (t1 == NULL)
03ee6b2e 7441 goto BadValue;
61ee279c 7442 t1 = ada_check_typedef (t1);
4c4b4cd2 7443 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679 7444 {
994b9211 7445 arg = coerce_ref (arg);
76a01679
JB
7446 t = t1;
7447 }
4c4b4cd2 7448 }
14f9c5c9 7449
4c4b4cd2
PH
7450 while (TYPE_CODE (t) == TYPE_CODE_PTR)
7451 {
7452 t1 = TYPE_TARGET_TYPE (t);
7453 if (t1 == NULL)
03ee6b2e 7454 goto BadValue;
61ee279c 7455 t1 = ada_check_typedef (t1);
4c4b4cd2 7456 if (TYPE_CODE (t1) == TYPE_CODE_PTR)
76a01679
JB
7457 {
7458 arg = value_ind (arg);
7459 t = t1;
7460 }
4c4b4cd2 7461 else
76a01679 7462 break;
4c4b4cd2 7463 }
14f9c5c9 7464
4c4b4cd2 7465 if (TYPE_CODE (t1) != TYPE_CODE_STRUCT && TYPE_CODE (t1) != TYPE_CODE_UNION)
03ee6b2e 7466 goto BadValue;
14f9c5c9 7467
4c4b4cd2
PH
7468 if (t1 == t)
7469 v = ada_search_struct_field (name, arg, 0, t);
7470 else
7471 {
7472 int bit_offset, bit_size, byte_offset;
7473 struct type *field_type;
7474 CORE_ADDR address;
7475
76a01679 7476 if (TYPE_CODE (t) == TYPE_CODE_PTR)
b50d69b5 7477 address = value_address (ada_value_ind (arg));
4c4b4cd2 7478 else
b50d69b5 7479 address = value_address (ada_coerce_ref (arg));
14f9c5c9 7480
828d5846
XR
7481 /* Check to see if this is a tagged type. We also need to handle
7482 the case where the type is a reference to a tagged type, but
7483 we have to be careful to exclude pointers to tagged types.
7484 The latter should be shown as usual (as a pointer), whereas
7485 a reference should mostly be transparent to the user. */
7486
7487 if (ada_is_tagged_type (t1, 0)
7488 || (TYPE_CODE (t1) == TYPE_CODE_REF
7489 && ada_is_tagged_type (TYPE_TARGET_TYPE (t1), 0)))
7490 {
7491 /* We first try to find the searched field in the current type.
7492 If not found then let's look in the fixed type. */
7493
7494 if (!find_struct_field (name, t1, 0,
7495 &field_type, &byte_offset, &bit_offset,
7496 &bit_size, NULL))
1f5d1570
JG
7497 check_tag = 1;
7498 else
7499 check_tag = 0;
828d5846
XR
7500 }
7501 else
1f5d1570
JG
7502 check_tag = 0;
7503
7504 /* Convert to fixed type in all cases, so that we have proper
7505 offsets to each field in unconstrained record types. */
7506 t1 = ada_to_fixed_type (ada_get_base_type (t1), NULL,
7507 address, NULL, check_tag);
828d5846 7508
76a01679
JB
7509 if (find_struct_field (name, t1, 0,
7510 &field_type, &byte_offset, &bit_offset,
52ce6436 7511 &bit_size, NULL))
76a01679
JB
7512 {
7513 if (bit_size != 0)
7514 {
714e53ab
PH
7515 if (TYPE_CODE (t) == TYPE_CODE_REF)
7516 arg = ada_coerce_ref (arg);
7517 else
7518 arg = ada_value_ind (arg);
76a01679
JB
7519 v = ada_value_primitive_packed_val (arg, NULL, byte_offset,
7520 bit_offset, bit_size,
7521 field_type);
7522 }
7523 else
f5938064 7524 v = value_at_lazy (field_type, address + byte_offset);
76a01679
JB
7525 }
7526 }
7527
03ee6b2e
PH
7528 if (v != NULL || no_err)
7529 return v;
7530 else
323e0a4a 7531 error (_("There is no member named %s."), name);
14f9c5c9 7532
03ee6b2e
PH
7533 BadValue:
7534 if (no_err)
7535 return NULL;
7536 else
0963b4bd
MS
7537 error (_("Attempt to extract a component of "
7538 "a value that is not a record."));
14f9c5c9
AS
7539}
7540
3b4de39c 7541/* Return a string representation of type TYPE. */
99bbb428 7542
3b4de39c 7543static std::string
99bbb428
PA
7544type_as_string (struct type *type)
7545{
d7e74731 7546 string_file tmp_stream;
99bbb428 7547
d7e74731 7548 type_print (type, "", &tmp_stream, -1);
99bbb428 7549
d7e74731 7550 return std::move (tmp_stream.string ());
99bbb428
PA
7551}
7552
14f9c5c9 7553/* Given a type TYPE, look up the type of the component of type named NAME.
4c4b4cd2
PH
7554 If DISPP is non-null, add its byte displacement from the beginning of a
7555 structure (pointed to by a value) of type TYPE to *DISPP (does not
14f9c5c9
AS
7556 work for packed fields).
7557
7558 Matches any field whose name has NAME as a prefix, possibly
4c4b4cd2 7559 followed by "___".
14f9c5c9 7560
0963b4bd 7561 TYPE can be either a struct or union. If REFOK, TYPE may also
4c4b4cd2
PH
7562 be a (pointer or reference)+ to a struct or union, and the
7563 ultimate target type will be searched.
14f9c5c9
AS
7564
7565 Looks recursively into variant clauses and parent types.
7566
828d5846
XR
7567 In the case of homonyms in the tagged types, please refer to the
7568 long explanation in find_struct_field's function documentation.
7569
4c4b4cd2
PH
7570 If NOERR is nonzero, return NULL if NAME is not suitably defined or
7571 TYPE is not a type of the right kind. */
14f9c5c9 7572
4c4b4cd2 7573static struct type *
a121b7c1 7574ada_lookup_struct_elt_type (struct type *type, const char *name, int refok,
988f6b3d 7575 int noerr)
14f9c5c9
AS
7576{
7577 int i;
828d5846 7578 int parent_offset = -1;
14f9c5c9
AS
7579
7580 if (name == NULL)
7581 goto BadName;
7582
76a01679 7583 if (refok && type != NULL)
4c4b4cd2
PH
7584 while (1)
7585 {
61ee279c 7586 type = ada_check_typedef (type);
76a01679
JB
7587 if (TYPE_CODE (type) != TYPE_CODE_PTR
7588 && TYPE_CODE (type) != TYPE_CODE_REF)
7589 break;
7590 type = TYPE_TARGET_TYPE (type);
4c4b4cd2 7591 }
14f9c5c9 7592
76a01679 7593 if (type == NULL
1265e4aa
JB
7594 || (TYPE_CODE (type) != TYPE_CODE_STRUCT
7595 && TYPE_CODE (type) != TYPE_CODE_UNION))
14f9c5c9 7596 {
4c4b4cd2 7597 if (noerr)
76a01679 7598 return NULL;
99bbb428 7599
3b4de39c
PA
7600 error (_("Type %s is not a structure or union type"),
7601 type != NULL ? type_as_string (type).c_str () : _("(null)"));
14f9c5c9
AS
7602 }
7603
7604 type = to_static_fixed_type (type);
7605
7606 for (i = 0; i < TYPE_NFIELDS (type); i += 1)
7607 {
0d5cff50 7608 const char *t_field_name = TYPE_FIELD_NAME (type, i);
14f9c5c9 7609 struct type *t;
d2e4a39e 7610
14f9c5c9 7611 if (t_field_name == NULL)
4c4b4cd2 7612 continue;
14f9c5c9 7613
828d5846
XR
7614 else if (ada_is_parent_field (type, i))
7615 {
7616 /* This is a field pointing us to the parent type of a tagged
7617 type. As hinted in this function's documentation, we give
7618 preference to fields in the current record first, so what
7619 we do here is just record the index of this field before
7620 we skip it. If it turns out we couldn't find our field
7621 in the current record, then we'll get back to it and search
7622 inside it whether the field might exist in the parent. */
7623
7624 parent_offset = i;
7625 continue;
7626 }
7627
14f9c5c9 7628 else if (field_name_match (t_field_name, name))
988f6b3d 7629 return TYPE_FIELD_TYPE (type, i);
14f9c5c9
AS
7630
7631 else if (ada_is_wrapper_field (type, i))
4c4b4cd2 7632 {
4c4b4cd2 7633 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, i), name,
988f6b3d 7634 0, 1);
4c4b4cd2 7635 if (t != NULL)
988f6b3d 7636 return t;
4c4b4cd2 7637 }
14f9c5c9
AS
7638
7639 else if (ada_is_variant_part (type, i))
4c4b4cd2
PH
7640 {
7641 int j;
5b4ee69b
MS
7642 struct type *field_type = ada_check_typedef (TYPE_FIELD_TYPE (type,
7643 i));
4c4b4cd2
PH
7644
7645 for (j = TYPE_NFIELDS (field_type) - 1; j >= 0; j -= 1)
7646 {
b1f33ddd
JB
7647 /* FIXME pnh 2008/01/26: We check for a field that is
7648 NOT wrapped in a struct, since the compiler sometimes
7649 generates these for unchecked variant types. Revisit
0963b4bd 7650 if the compiler changes this practice. */
0d5cff50 7651 const char *v_field_name = TYPE_FIELD_NAME (field_type, j);
988f6b3d 7652
b1f33ddd
JB
7653 if (v_field_name != NULL
7654 && field_name_match (v_field_name, name))
460efde1 7655 t = TYPE_FIELD_TYPE (field_type, j);
b1f33ddd 7656 else
0963b4bd
MS
7657 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (field_type,
7658 j),
988f6b3d 7659 name, 0, 1);
b1f33ddd 7660
4c4b4cd2 7661 if (t != NULL)
988f6b3d 7662 return t;
4c4b4cd2
PH
7663 }
7664 }
14f9c5c9
AS
7665
7666 }
7667
828d5846
XR
7668 /* Field not found so far. If this is a tagged type which
7669 has a parent, try finding that field in the parent now. */
7670
7671 if (parent_offset != -1)
7672 {
7673 struct type *t;
7674
7675 t = ada_lookup_struct_elt_type (TYPE_FIELD_TYPE (type, parent_offset),
7676 name, 0, 1);
7677 if (t != NULL)
7678 return t;
7679 }
7680
14f9c5c9 7681BadName:
d2e4a39e 7682 if (!noerr)
14f9c5c9 7683 {
2b2798cc 7684 const char *name_str = name != NULL ? name : _("<null>");
99bbb428
PA
7685
7686 error (_("Type %s has no component named %s"),
3b4de39c 7687 type_as_string (type).c_str (), name_str);
14f9c5c9
AS
7688 }
7689
7690 return NULL;
7691}
7692
b1f33ddd
JB
7693/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7694 within a value of type OUTER_TYPE, return true iff VAR_TYPE
7695 represents an unchecked union (that is, the variant part of a
0963b4bd 7696 record that is named in an Unchecked_Union pragma). */
b1f33ddd
JB
7697
7698static int
7699is_unchecked_variant (struct type *var_type, struct type *outer_type)
7700{
a121b7c1 7701 const char *discrim_name = ada_variant_discrim_name (var_type);
5b4ee69b 7702
988f6b3d 7703 return (ada_lookup_struct_elt_type (outer_type, discrim_name, 0, 1) == NULL);
b1f33ddd
JB
7704}
7705
7706
14f9c5c9
AS
7707/* Assuming that VAR_TYPE is the type of a variant part of a record (a union),
7708 within a value of type OUTER_TYPE that is stored in GDB at
4c4b4cd2
PH
7709 OUTER_VALADDR, determine which variant clause (field number in VAR_TYPE,
7710 numbering from 0) is applicable. Returns -1 if none are. */
14f9c5c9 7711
d2e4a39e 7712int
ebf56fd3 7713ada_which_variant_applies (struct type *var_type, struct type *outer_type,
fc1a4b47 7714 const gdb_byte *outer_valaddr)
14f9c5c9
AS
7715{
7716 int others_clause;
7717 int i;
a121b7c1 7718 const char *discrim_name = ada_variant_discrim_name (var_type);
0c281816
JB
7719 struct value *outer;
7720 struct value *discrim;
14f9c5c9
AS
7721 LONGEST discrim_val;
7722
012370f6
TT
7723 /* Using plain value_from_contents_and_address here causes problems
7724 because we will end up trying to resolve a type that is currently
7725 being constructed. */
7726 outer = value_from_contents_and_address_unresolved (outer_type,
7727 outer_valaddr, 0);
0c281816
JB
7728 discrim = ada_value_struct_elt (outer, discrim_name, 1);
7729 if (discrim == NULL)
14f9c5c9 7730 return -1;
0c281816 7731 discrim_val = value_as_long (discrim);
14f9c5c9
AS
7732
7733 others_clause = -1;
7734 for (i = 0; i < TYPE_NFIELDS (var_type); i += 1)
7735 {
7736 if (ada_is_others_clause (var_type, i))
4c4b4cd2 7737 others_clause = i;
14f9c5c9 7738 else if (ada_in_variant (discrim_val, var_type, i))
4c4b4cd2 7739 return i;
14f9c5c9
AS
7740 }
7741
7742 return others_clause;
7743}
d2e4a39e 7744\f
14f9c5c9
AS
7745
7746
4c4b4cd2 7747 /* Dynamic-Sized Records */
14f9c5c9
AS
7748
7749/* Strategy: The type ostensibly attached to a value with dynamic size
7750 (i.e., a size that is not statically recorded in the debugging
7751 data) does not accurately reflect the size or layout of the value.
7752 Our strategy is to convert these values to values with accurate,
4c4b4cd2 7753 conventional types that are constructed on the fly. */
14f9c5c9
AS
7754
7755/* There is a subtle and tricky problem here. In general, we cannot
7756 determine the size of dynamic records without its data. However,
7757 the 'struct value' data structure, which GDB uses to represent
7758 quantities in the inferior process (the target), requires the size
7759 of the type at the time of its allocation in order to reserve space
7760 for GDB's internal copy of the data. That's why the
7761 'to_fixed_xxx_type' routines take (target) addresses as parameters,
4c4b4cd2 7762 rather than struct value*s.
14f9c5c9
AS
7763
7764 However, GDB's internal history variables ($1, $2, etc.) are
7765 struct value*s containing internal copies of the data that are not, in
7766 general, the same as the data at their corresponding addresses in
7767 the target. Fortunately, the types we give to these values are all
7768 conventional, fixed-size types (as per the strategy described
7769 above), so that we don't usually have to perform the
7770 'to_fixed_xxx_type' conversions to look at their values.
7771 Unfortunately, there is one exception: if one of the internal
7772 history variables is an array whose elements are unconstrained
7773 records, then we will need to create distinct fixed types for each
7774 element selected. */
7775
7776/* The upshot of all of this is that many routines take a (type, host
7777 address, target address) triple as arguments to represent a value.
7778 The host address, if non-null, is supposed to contain an internal
7779 copy of the relevant data; otherwise, the program is to consult the
4c4b4cd2 7780 target at the target address. */
14f9c5c9
AS
7781
7782/* Assuming that VAL0 represents a pointer value, the result of
7783 dereferencing it. Differs from value_ind in its treatment of
4c4b4cd2 7784 dynamic-sized types. */
14f9c5c9 7785
d2e4a39e
AS
7786struct value *
7787ada_value_ind (struct value *val0)
14f9c5c9 7788{
c48db5ca 7789 struct value *val = value_ind (val0);
5b4ee69b 7790
b50d69b5
JG
7791 if (ada_is_tagged_type (value_type (val), 0))
7792 val = ada_tag_value_at_base_address (val);
7793
4c4b4cd2 7794 return ada_to_fixed_value (val);
14f9c5c9
AS
7795}
7796
7797/* The value resulting from dereferencing any "reference to"
4c4b4cd2
PH
7798 qualifiers on VAL0. */
7799
d2e4a39e
AS
7800static struct value *
7801ada_coerce_ref (struct value *val0)
7802{
df407dfe 7803 if (TYPE_CODE (value_type (val0)) == TYPE_CODE_REF)
d2e4a39e
AS
7804 {
7805 struct value *val = val0;
5b4ee69b 7806
994b9211 7807 val = coerce_ref (val);
b50d69b5
JG
7808
7809 if (ada_is_tagged_type (value_type (val), 0))
7810 val = ada_tag_value_at_base_address (val);
7811
4c4b4cd2 7812 return ada_to_fixed_value (val);
d2e4a39e
AS
7813 }
7814 else
14f9c5c9
AS
7815 return val0;
7816}
7817
7818/* Return OFF rounded upward if necessary to a multiple of
4c4b4cd2 7819 ALIGNMENT (a power of 2). */
14f9c5c9
AS
7820
7821static unsigned int
ebf56fd3 7822align_value (unsigned int off, unsigned int alignment)
14f9c5c9
AS
7823{
7824 return (off + alignment - 1) & ~(alignment - 1);
7825}
7826
4c4b4cd2 7827/* Return the bit alignment required for field #F of template type TYPE. */
14f9c5c9
AS
7828
7829static unsigned int
ebf56fd3 7830field_alignment (struct type *type, int f)
14f9c5c9 7831{
d2e4a39e 7832 const char *name = TYPE_FIELD_NAME (type, f);
64a1bf19 7833 int len;
14f9c5c9
AS
7834 int align_offset;
7835
64a1bf19
JB
7836 /* The field name should never be null, unless the debugging information
7837 is somehow malformed. In this case, we assume the field does not
7838 require any alignment. */
7839 if (name == NULL)
7840 return 1;
7841
7842 len = strlen (name);
7843
4c4b4cd2
PH
7844 if (!isdigit (name[len - 1]))
7845 return 1;
14f9c5c9 7846
d2e4a39e 7847 if (isdigit (name[len - 2]))
14f9c5c9
AS
7848 align_offset = len - 2;
7849 else
7850 align_offset = len - 1;
7851
61012eef 7852 if (align_offset < 7 || !startswith (name + align_offset - 6, "___XV"))
14f9c5c9
AS
7853 return TARGET_CHAR_BIT;
7854
4c4b4cd2
PH
7855 return atoi (name + align_offset) * TARGET_CHAR_BIT;
7856}
7857
852dff6c 7858/* Find a typedef or tag symbol named NAME. Ignores ambiguity. */
4c4b4cd2 7859
852dff6c
JB
7860static struct symbol *
7861ada_find_any_type_symbol (const char *name)
4c4b4cd2
PH
7862{
7863 struct symbol *sym;
7864
7865 sym = standard_lookup (name, get_selected_block (NULL), VAR_DOMAIN);
4186eb54 7866 if (sym != NULL && SYMBOL_CLASS (sym) == LOC_TYPEDEF)
4c4b4cd2
PH
7867 return sym;
7868
4186eb54
KS
7869 sym = standard_lookup (name, NULL, STRUCT_DOMAIN);
7870 return sym;
14f9c5c9
AS
7871}
7872
dddfab26
UW
7873/* Find a type named NAME. Ignores ambiguity. This routine will look
7874 solely for types defined by debug info, it will not search the GDB
7875 primitive types. */
4c4b4cd2 7876
852dff6c 7877static struct type *
ebf56fd3 7878ada_find_any_type (const char *name)
14f9c5c9 7879{
852dff6c 7880 struct symbol *sym = ada_find_any_type_symbol (name);
14f9c5c9 7881
14f9c5c9 7882 if (sym != NULL)
dddfab26 7883 return SYMBOL_TYPE (sym);
14f9c5c9 7884
dddfab26 7885 return NULL;
14f9c5c9
AS
7886}
7887
739593e0
JB
7888/* Given NAME_SYM and an associated BLOCK, find a "renaming" symbol
7889 associated with NAME_SYM's name. NAME_SYM may itself be a renaming
7890 symbol, in which case it is returned. Otherwise, this looks for
7891 symbols whose name is that of NAME_SYM suffixed with "___XR".
7892 Return symbol if found, and NULL otherwise. */
4c4b4cd2 7893
c0e70c62
TT
7894static bool
7895ada_is_renaming_symbol (struct symbol *name_sym)
aeb5907d 7896{
739593e0 7897 const char *name = SYMBOL_LINKAGE_NAME (name_sym);
c0e70c62 7898 return strstr (name, "___XR") != NULL;
4c4b4cd2
PH
7899}
7900
14f9c5c9 7901/* Because of GNAT encoding conventions, several GDB symbols may match a
4c4b4cd2 7902 given type name. If the type denoted by TYPE0 is to be preferred to
14f9c5c9 7903 that of TYPE1 for purposes of type printing, return non-zero;
4c4b4cd2
PH
7904 otherwise return 0. */
7905
14f9c5c9 7906int
d2e4a39e 7907ada_prefer_type (struct type *type0, struct type *type1)
14f9c5c9
AS
7908{
7909 if (type1 == NULL)
7910 return 1;
7911 else if (type0 == NULL)
7912 return 0;
7913 else if (TYPE_CODE (type1) == TYPE_CODE_VOID)
7914 return 1;
7915 else if (TYPE_CODE (type0) == TYPE_CODE_VOID)
7916 return 0;
4c4b4cd2
PH
7917 else if (TYPE_NAME (type1) == NULL && TYPE_NAME (type0) != NULL)
7918 return 1;
ad82864c 7919 else if (ada_is_constrained_packed_array_type (type0))
14f9c5c9 7920 return 1;
4c4b4cd2
PH
7921 else if (ada_is_array_descriptor_type (type0)
7922 && !ada_is_array_descriptor_type (type1))
14f9c5c9 7923 return 1;
aeb5907d
JB
7924 else
7925 {
a737d952
TT
7926 const char *type0_name = TYPE_NAME (type0);
7927 const char *type1_name = TYPE_NAME (type1);
aeb5907d
JB
7928
7929 if (type0_name != NULL && strstr (type0_name, "___XR") != NULL
7930 && (type1_name == NULL || strstr (type1_name, "___XR") == NULL))
7931 return 1;
7932 }
14f9c5c9
AS
7933 return 0;
7934}
7935
e86ca25f
TT
7936/* The name of TYPE, which is its TYPE_NAME. Null if TYPE is
7937 null. */
4c4b4cd2 7938
0d5cff50 7939const char *
d2e4a39e 7940ada_type_name (struct type *type)
14f9c5c9 7941{
d2e4a39e 7942 if (type == NULL)
14f9c5c9 7943 return NULL;
e86ca25f 7944 return TYPE_NAME (type);
14f9c5c9
AS
7945}
7946
b4ba55a1
JB
7947/* Search the list of "descriptive" types associated to TYPE for a type
7948 whose name is NAME. */
7949
7950static struct type *
7951find_parallel_type_by_descriptive_type (struct type *type, const char *name)
7952{
931e5bc3 7953 struct type *result, *tmp;
b4ba55a1 7954
c6044dd1
JB
7955 if (ada_ignore_descriptive_types_p)
7956 return NULL;
7957
b4ba55a1
JB
7958 /* If there no descriptive-type info, then there is no parallel type
7959 to be found. */
7960 if (!HAVE_GNAT_AUX_INFO (type))
7961 return NULL;
7962
7963 result = TYPE_DESCRIPTIVE_TYPE (type);
7964 while (result != NULL)
7965 {
0d5cff50 7966 const char *result_name = ada_type_name (result);
b4ba55a1
JB
7967
7968 if (result_name == NULL)
7969 {
7970 warning (_("unexpected null name on descriptive type"));
7971 return NULL;
7972 }
7973
7974 /* If the names match, stop. */
7975 if (strcmp (result_name, name) == 0)
7976 break;
7977
7978 /* Otherwise, look at the next item on the list, if any. */
7979 if (HAVE_GNAT_AUX_INFO (result))
931e5bc3
JG
7980 tmp = TYPE_DESCRIPTIVE_TYPE (result);
7981 else
7982 tmp = NULL;
7983
7984 /* If not found either, try after having resolved the typedef. */
7985 if (tmp != NULL)
7986 result = tmp;
b4ba55a1 7987 else
931e5bc3 7988 {
f168693b 7989 result = check_typedef (result);
931e5bc3
JG
7990 if (HAVE_GNAT_AUX_INFO (result))
7991 result = TYPE_DESCRIPTIVE_TYPE (result);
7992 else
7993 result = NULL;
7994 }
b4ba55a1
JB
7995 }
7996
7997 /* If we didn't find a match, see whether this is a packed array. With
7998 older compilers, the descriptive type information is either absent or
7999 irrelevant when it comes to packed arrays so the above lookup fails.
8000 Fall back to using a parallel lookup by name in this case. */
12ab9e09 8001 if (result == NULL && ada_is_constrained_packed_array_type (type))
b4ba55a1
JB
8002 return ada_find_any_type (name);
8003
8004 return result;
8005}
8006
8007/* Find a parallel type to TYPE with the specified NAME, using the
8008 descriptive type taken from the debugging information, if available,
8009 and otherwise using the (slower) name-based method. */
8010
8011static struct type *
8012ada_find_parallel_type_with_name (struct type *type, const char *name)
8013{
8014 struct type *result = NULL;
8015
8016 if (HAVE_GNAT_AUX_INFO (type))
8017 result = find_parallel_type_by_descriptive_type (type, name);
8018 else
8019 result = ada_find_any_type (name);
8020
8021 return result;
8022}
8023
8024/* Same as above, but specify the name of the parallel type by appending
4c4b4cd2 8025 SUFFIX to the name of TYPE. */
14f9c5c9 8026
d2e4a39e 8027struct type *
ebf56fd3 8028ada_find_parallel_type (struct type *type, const char *suffix)
14f9c5c9 8029{
0d5cff50 8030 char *name;
fe978cb0 8031 const char *type_name = ada_type_name (type);
14f9c5c9 8032 int len;
d2e4a39e 8033
fe978cb0 8034 if (type_name == NULL)
14f9c5c9
AS
8035 return NULL;
8036
fe978cb0 8037 len = strlen (type_name);
14f9c5c9 8038
b4ba55a1 8039 name = (char *) alloca (len + strlen (suffix) + 1);
14f9c5c9 8040
fe978cb0 8041 strcpy (name, type_name);
14f9c5c9
AS
8042 strcpy (name + len, suffix);
8043
b4ba55a1 8044 return ada_find_parallel_type_with_name (type, name);
14f9c5c9
AS
8045}
8046
14f9c5c9 8047/* If TYPE is a variable-size record type, return the corresponding template
4c4b4cd2 8048 type describing its fields. Otherwise, return NULL. */
14f9c5c9 8049
d2e4a39e
AS
8050static struct type *
8051dynamic_template_type (struct type *type)
14f9c5c9 8052{
61ee279c 8053 type = ada_check_typedef (type);
14f9c5c9
AS
8054
8055 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT
d2e4a39e 8056 || ada_type_name (type) == NULL)
14f9c5c9 8057 return NULL;
d2e4a39e 8058 else
14f9c5c9
AS
8059 {
8060 int len = strlen (ada_type_name (type));
5b4ee69b 8061
4c4b4cd2
PH
8062 if (len > 6 && strcmp (ada_type_name (type) + len - 6, "___XVE") == 0)
8063 return type;
14f9c5c9 8064 else
4c4b4cd2 8065 return ada_find_parallel_type (type, "___XVE");
14f9c5c9
AS
8066 }
8067}
8068
8069/* Assuming that TEMPL_TYPE is a union or struct type, returns
4c4b4cd2 8070 non-zero iff field FIELD_NUM of TEMPL_TYPE has dynamic size. */
14f9c5c9 8071
d2e4a39e
AS
8072static int
8073is_dynamic_field (struct type *templ_type, int field_num)
14f9c5c9
AS
8074{
8075 const char *name = TYPE_FIELD_NAME (templ_type, field_num);
5b4ee69b 8076
d2e4a39e 8077 return name != NULL
14f9c5c9
AS
8078 && TYPE_CODE (TYPE_FIELD_TYPE (templ_type, field_num)) == TYPE_CODE_PTR
8079 && strstr (name, "___XVL") != NULL;
8080}
8081
4c4b4cd2
PH
8082/* The index of the variant field of TYPE, or -1 if TYPE does not
8083 represent a variant record type. */
14f9c5c9 8084
d2e4a39e 8085static int
4c4b4cd2 8086variant_field_index (struct type *type)
14f9c5c9
AS
8087{
8088 int f;
8089
4c4b4cd2
PH
8090 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_STRUCT)
8091 return -1;
8092
8093 for (f = 0; f < TYPE_NFIELDS (type); f += 1)
8094 {
8095 if (ada_is_variant_part (type, f))
8096 return f;
8097 }
8098 return -1;
14f9c5c9
AS
8099}
8100
4c4b4cd2
PH
8101/* A record type with no fields. */
8102
d2e4a39e 8103static struct type *
fe978cb0 8104empty_record (struct type *templ)
14f9c5c9 8105{
fe978cb0 8106 struct type *type = alloc_type_copy (templ);
5b4ee69b 8107
14f9c5c9
AS
8108 TYPE_CODE (type) = TYPE_CODE_STRUCT;
8109 TYPE_NFIELDS (type) = 0;
8110 TYPE_FIELDS (type) = NULL;
8ecb59f8 8111 INIT_NONE_SPECIFIC (type);
14f9c5c9 8112 TYPE_NAME (type) = "<empty>";
14f9c5c9
AS
8113 TYPE_LENGTH (type) = 0;
8114 return type;
8115}
8116
8117/* An ordinary record type (with fixed-length fields) that describes
4c4b4cd2
PH
8118 the value of type TYPE at VALADDR or ADDRESS (see comments at
8119 the beginning of this section) VAL according to GNAT conventions.
8120 DVAL0 should describe the (portion of a) record that contains any
df407dfe 8121 necessary discriminants. It should be NULL if value_type (VAL) is
14f9c5c9
AS
8122 an outer-level type (i.e., as opposed to a branch of a variant.) A
8123 variant field (unless unchecked) is replaced by a particular branch
4c4b4cd2 8124 of the variant.
14f9c5c9 8125
4c4b4cd2
PH
8126 If not KEEP_DYNAMIC_FIELDS, then all fields whose position or
8127 length are not statically known are discarded. As a consequence,
8128 VALADDR, ADDRESS and DVAL0 are ignored.
8129
8130 NOTE: Limitations: For now, we assume that dynamic fields and
8131 variants occupy whole numbers of bytes. However, they need not be
8132 byte-aligned. */
8133
8134struct type *
10a2c479 8135ada_template_to_fixed_record_type_1 (struct type *type,
fc1a4b47 8136 const gdb_byte *valaddr,
4c4b4cd2
PH
8137 CORE_ADDR address, struct value *dval0,
8138 int keep_dynamic_fields)
14f9c5c9 8139{
d2e4a39e
AS
8140 struct value *mark = value_mark ();
8141 struct value *dval;
8142 struct type *rtype;
14f9c5c9 8143 int nfields, bit_len;
4c4b4cd2 8144 int variant_field;
14f9c5c9 8145 long off;
d94e4f4f 8146 int fld_bit_len;
14f9c5c9
AS
8147 int f;
8148
4c4b4cd2
PH
8149 /* Compute the number of fields in this record type that are going
8150 to be processed: unless keep_dynamic_fields, this includes only
8151 fields whose position and length are static will be processed. */
8152 if (keep_dynamic_fields)
8153 nfields = TYPE_NFIELDS (type);
8154 else
8155 {
8156 nfields = 0;
76a01679 8157 while (nfields < TYPE_NFIELDS (type)
4c4b4cd2
PH
8158 && !ada_is_variant_part (type, nfields)
8159 && !is_dynamic_field (type, nfields))
8160 nfields++;
8161 }
8162
e9bb382b 8163 rtype = alloc_type_copy (type);
14f9c5c9 8164 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
8ecb59f8 8165 INIT_NONE_SPECIFIC (rtype);
14f9c5c9 8166 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e 8167 TYPE_FIELDS (rtype) = (struct field *)
14f9c5c9
AS
8168 TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8169 memset (TYPE_FIELDS (rtype), 0, sizeof (struct field) * nfields);
8170 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8171 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9 8172
d2e4a39e
AS
8173 off = 0;
8174 bit_len = 0;
4c4b4cd2
PH
8175 variant_field = -1;
8176
14f9c5c9
AS
8177 for (f = 0; f < nfields; f += 1)
8178 {
6c038f32
PH
8179 off = align_value (off, field_alignment (type, f))
8180 + TYPE_FIELD_BITPOS (type, f);
945b3a32 8181 SET_FIELD_BITPOS (TYPE_FIELD (rtype, f), off);
d2e4a39e 8182 TYPE_FIELD_BITSIZE (rtype, f) = 0;
14f9c5c9 8183
d2e4a39e 8184 if (ada_is_variant_part (type, f))
4c4b4cd2
PH
8185 {
8186 variant_field = f;
d94e4f4f 8187 fld_bit_len = 0;
4c4b4cd2 8188 }
14f9c5c9 8189 else if (is_dynamic_field (type, f))
4c4b4cd2 8190 {
284614f0
JB
8191 const gdb_byte *field_valaddr = valaddr;
8192 CORE_ADDR field_address = address;
8193 struct type *field_type =
8194 TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (type, f));
8195
4c4b4cd2 8196 if (dval0 == NULL)
b5304971
JG
8197 {
8198 /* rtype's length is computed based on the run-time
8199 value of discriminants. If the discriminants are not
8200 initialized, the type size may be completely bogus and
0963b4bd 8201 GDB may fail to allocate a value for it. So check the
b5304971 8202 size first before creating the value. */
c1b5a1a6 8203 ada_ensure_varsize_limit (rtype);
012370f6
TT
8204 /* Using plain value_from_contents_and_address here
8205 causes problems because we will end up trying to
8206 resolve a type that is currently being
8207 constructed. */
8208 dval = value_from_contents_and_address_unresolved (rtype,
8209 valaddr,
8210 address);
9f1f738a 8211 rtype = value_type (dval);
b5304971 8212 }
4c4b4cd2
PH
8213 else
8214 dval = dval0;
8215
284614f0
JB
8216 /* If the type referenced by this field is an aligner type, we need
8217 to unwrap that aligner type, because its size might not be set.
8218 Keeping the aligner type would cause us to compute the wrong
8219 size for this field, impacting the offset of the all the fields
8220 that follow this one. */
8221 if (ada_is_aligner_type (field_type))
8222 {
8223 long field_offset = TYPE_FIELD_BITPOS (field_type, f);
8224
8225 field_valaddr = cond_offset_host (field_valaddr, field_offset);
8226 field_address = cond_offset_target (field_address, field_offset);
8227 field_type = ada_aligned_type (field_type);
8228 }
8229
8230 field_valaddr = cond_offset_host (field_valaddr,
8231 off / TARGET_CHAR_BIT);
8232 field_address = cond_offset_target (field_address,
8233 off / TARGET_CHAR_BIT);
8234
8235 /* Get the fixed type of the field. Note that, in this case,
8236 we do not want to get the real type out of the tag: if
8237 the current field is the parent part of a tagged record,
8238 we will get the tag of the object. Clearly wrong: the real
8239 type of the parent is not the real type of the child. We
8240 would end up in an infinite loop. */
8241 field_type = ada_get_base_type (field_type);
8242 field_type = ada_to_fixed_type (field_type, field_valaddr,
8243 field_address, dval, 0);
27f2a97b
JB
8244 /* If the field size is already larger than the maximum
8245 object size, then the record itself will necessarily
8246 be larger than the maximum object size. We need to make
8247 this check now, because the size might be so ridiculously
8248 large (due to an uninitialized variable in the inferior)
8249 that it would cause an overflow when adding it to the
8250 record size. */
c1b5a1a6 8251 ada_ensure_varsize_limit (field_type);
284614f0
JB
8252
8253 TYPE_FIELD_TYPE (rtype, f) = field_type;
4c4b4cd2 8254 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
27f2a97b
JB
8255 /* The multiplication can potentially overflow. But because
8256 the field length has been size-checked just above, and
8257 assuming that the maximum size is a reasonable value,
8258 an overflow should not happen in practice. So rather than
8259 adding overflow recovery code to this already complex code,
8260 we just assume that it's not going to happen. */
d94e4f4f 8261 fld_bit_len =
4c4b4cd2
PH
8262 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, f)) * TARGET_CHAR_BIT;
8263 }
14f9c5c9 8264 else
4c4b4cd2 8265 {
5ded5331
JB
8266 /* Note: If this field's type is a typedef, it is important
8267 to preserve the typedef layer.
8268
8269 Otherwise, we might be transforming a typedef to a fat
8270 pointer (encoding a pointer to an unconstrained array),
8271 into a basic fat pointer (encoding an unconstrained
8272 array). As both types are implemented using the same
8273 structure, the typedef is the only clue which allows us
8274 to distinguish between the two options. Stripping it
8275 would prevent us from printing this field appropriately. */
8276 TYPE_FIELD_TYPE (rtype, f) = TYPE_FIELD_TYPE (type, f);
4c4b4cd2
PH
8277 TYPE_FIELD_NAME (rtype, f) = TYPE_FIELD_NAME (type, f);
8278 if (TYPE_FIELD_BITSIZE (type, f) > 0)
d94e4f4f 8279 fld_bit_len =
4c4b4cd2
PH
8280 TYPE_FIELD_BITSIZE (rtype, f) = TYPE_FIELD_BITSIZE (type, f);
8281 else
5ded5331
JB
8282 {
8283 struct type *field_type = TYPE_FIELD_TYPE (type, f);
8284
8285 /* We need to be careful of typedefs when computing
8286 the length of our field. If this is a typedef,
8287 get the length of the target type, not the length
8288 of the typedef. */
8289 if (TYPE_CODE (field_type) == TYPE_CODE_TYPEDEF)
8290 field_type = ada_typedef_target_type (field_type);
8291
8292 fld_bit_len =
8293 TYPE_LENGTH (ada_check_typedef (field_type)) * TARGET_CHAR_BIT;
8294 }
4c4b4cd2 8295 }
14f9c5c9 8296 if (off + fld_bit_len > bit_len)
4c4b4cd2 8297 bit_len = off + fld_bit_len;
d94e4f4f 8298 off += fld_bit_len;
4c4b4cd2
PH
8299 TYPE_LENGTH (rtype) =
8300 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
14f9c5c9 8301 }
4c4b4cd2
PH
8302
8303 /* We handle the variant part, if any, at the end because of certain
b1f33ddd 8304 odd cases in which it is re-ordered so as NOT to be the last field of
4c4b4cd2
PH
8305 the record. This can happen in the presence of representation
8306 clauses. */
8307 if (variant_field >= 0)
8308 {
8309 struct type *branch_type;
8310
8311 off = TYPE_FIELD_BITPOS (rtype, variant_field);
8312
8313 if (dval0 == NULL)
9f1f738a 8314 {
012370f6
TT
8315 /* Using plain value_from_contents_and_address here causes
8316 problems because we will end up trying to resolve a type
8317 that is currently being constructed. */
8318 dval = value_from_contents_and_address_unresolved (rtype, valaddr,
8319 address);
9f1f738a
SA
8320 rtype = value_type (dval);
8321 }
4c4b4cd2
PH
8322 else
8323 dval = dval0;
8324
8325 branch_type =
8326 to_fixed_variant_branch_type
8327 (TYPE_FIELD_TYPE (type, variant_field),
8328 cond_offset_host (valaddr, off / TARGET_CHAR_BIT),
8329 cond_offset_target (address, off / TARGET_CHAR_BIT), dval);
8330 if (branch_type == NULL)
8331 {
8332 for (f = variant_field + 1; f < TYPE_NFIELDS (rtype); f += 1)
8333 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
8334 TYPE_NFIELDS (rtype) -= 1;
8335 }
8336 else
8337 {
8338 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8339 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8340 fld_bit_len =
8341 TYPE_LENGTH (TYPE_FIELD_TYPE (rtype, variant_field)) *
8342 TARGET_CHAR_BIT;
8343 if (off + fld_bit_len > bit_len)
8344 bit_len = off + fld_bit_len;
8345 TYPE_LENGTH (rtype) =
8346 align_value (bit_len, TARGET_CHAR_BIT) / TARGET_CHAR_BIT;
8347 }
8348 }
8349
714e53ab
PH
8350 /* According to exp_dbug.ads, the size of TYPE for variable-size records
8351 should contain the alignment of that record, which should be a strictly
8352 positive value. If null or negative, then something is wrong, most
8353 probably in the debug info. In that case, we don't round up the size
0963b4bd 8354 of the resulting type. If this record is not part of another structure,
714e53ab
PH
8355 the current RTYPE length might be good enough for our purposes. */
8356 if (TYPE_LENGTH (type) <= 0)
8357 {
323e0a4a 8358 if (TYPE_NAME (rtype))
cc1defb1
KS
8359 warning (_("Invalid type size for `%s' detected: %s."),
8360 TYPE_NAME (rtype), pulongest (TYPE_LENGTH (type)));
323e0a4a 8361 else
cc1defb1
KS
8362 warning (_("Invalid type size for <unnamed> detected: %s."),
8363 pulongest (TYPE_LENGTH (type)));
714e53ab
PH
8364 }
8365 else
8366 {
8367 TYPE_LENGTH (rtype) = align_value (TYPE_LENGTH (rtype),
8368 TYPE_LENGTH (type));
8369 }
14f9c5c9
AS
8370
8371 value_free_to_mark (mark);
d2e4a39e 8372 if (TYPE_LENGTH (rtype) > varsize_limit)
323e0a4a 8373 error (_("record type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8374 return rtype;
8375}
8376
4c4b4cd2
PH
8377/* As for ada_template_to_fixed_record_type_1 with KEEP_DYNAMIC_FIELDS
8378 of 1. */
14f9c5c9 8379
d2e4a39e 8380static struct type *
fc1a4b47 8381template_to_fixed_record_type (struct type *type, const gdb_byte *valaddr,
4c4b4cd2
PH
8382 CORE_ADDR address, struct value *dval0)
8383{
8384 return ada_template_to_fixed_record_type_1 (type, valaddr,
8385 address, dval0, 1);
8386}
8387
8388/* An ordinary record type in which ___XVL-convention fields and
8389 ___XVU- and ___XVN-convention field types in TYPE0 are replaced with
8390 static approximations, containing all possible fields. Uses
8391 no runtime values. Useless for use in values, but that's OK,
8392 since the results are used only for type determinations. Works on both
8393 structs and unions. Representation note: to save space, we memorize
8394 the result of this function in the TYPE_TARGET_TYPE of the
8395 template type. */
8396
8397static struct type *
8398template_to_static_fixed_type (struct type *type0)
14f9c5c9
AS
8399{
8400 struct type *type;
8401 int nfields;
8402 int f;
8403
9e195661
PMR
8404 /* No need no do anything if the input type is already fixed. */
8405 if (TYPE_FIXED_INSTANCE (type0))
8406 return type0;
8407
8408 /* Likewise if we already have computed the static approximation. */
4c4b4cd2
PH
8409 if (TYPE_TARGET_TYPE (type0) != NULL)
8410 return TYPE_TARGET_TYPE (type0);
8411
9e195661 8412 /* Don't clone TYPE0 until we are sure we are going to need a copy. */
4c4b4cd2 8413 type = type0;
9e195661
PMR
8414 nfields = TYPE_NFIELDS (type0);
8415
8416 /* Whether or not we cloned TYPE0, cache the result so that we don't do
8417 recompute all over next time. */
8418 TYPE_TARGET_TYPE (type0) = type;
14f9c5c9
AS
8419
8420 for (f = 0; f < nfields; f += 1)
8421 {
460efde1 8422 struct type *field_type = TYPE_FIELD_TYPE (type0, f);
4c4b4cd2 8423 struct type *new_type;
14f9c5c9 8424
4c4b4cd2 8425 if (is_dynamic_field (type0, f))
460efde1
JB
8426 {
8427 field_type = ada_check_typedef (field_type);
8428 new_type = to_static_fixed_type (TYPE_TARGET_TYPE (field_type));
8429 }
14f9c5c9 8430 else
f192137b 8431 new_type = static_unwrap_type (field_type);
9e195661
PMR
8432
8433 if (new_type != field_type)
8434 {
8435 /* Clone TYPE0 only the first time we get a new field type. */
8436 if (type == type0)
8437 {
8438 TYPE_TARGET_TYPE (type0) = type = alloc_type_copy (type0);
8439 TYPE_CODE (type) = TYPE_CODE (type0);
8ecb59f8 8440 INIT_NONE_SPECIFIC (type);
9e195661
PMR
8441 TYPE_NFIELDS (type) = nfields;
8442 TYPE_FIELDS (type) = (struct field *)
8443 TYPE_ALLOC (type, nfields * sizeof (struct field));
8444 memcpy (TYPE_FIELDS (type), TYPE_FIELDS (type0),
8445 sizeof (struct field) * nfields);
8446 TYPE_NAME (type) = ada_type_name (type0);
9e195661
PMR
8447 TYPE_FIXED_INSTANCE (type) = 1;
8448 TYPE_LENGTH (type) = 0;
8449 }
8450 TYPE_FIELD_TYPE (type, f) = new_type;
8451 TYPE_FIELD_NAME (type, f) = TYPE_FIELD_NAME (type0, f);
8452 }
14f9c5c9 8453 }
9e195661 8454
14f9c5c9
AS
8455 return type;
8456}
8457
4c4b4cd2 8458/* Given an object of type TYPE whose contents are at VALADDR and
5823c3ef
JB
8459 whose address in memory is ADDRESS, returns a revision of TYPE,
8460 which should be a non-dynamic-sized record, in which the variant
8461 part, if any, is replaced with the appropriate branch. Looks
4c4b4cd2
PH
8462 for discriminant values in DVAL0, which can be NULL if the record
8463 contains the necessary discriminant values. */
8464
d2e4a39e 8465static struct type *
fc1a4b47 8466to_record_with_fixed_variant_part (struct type *type, const gdb_byte *valaddr,
4c4b4cd2 8467 CORE_ADDR address, struct value *dval0)
14f9c5c9 8468{
d2e4a39e 8469 struct value *mark = value_mark ();
4c4b4cd2 8470 struct value *dval;
d2e4a39e 8471 struct type *rtype;
14f9c5c9
AS
8472 struct type *branch_type;
8473 int nfields = TYPE_NFIELDS (type);
4c4b4cd2 8474 int variant_field = variant_field_index (type);
14f9c5c9 8475
4c4b4cd2 8476 if (variant_field == -1)
14f9c5c9
AS
8477 return type;
8478
4c4b4cd2 8479 if (dval0 == NULL)
9f1f738a
SA
8480 {
8481 dval = value_from_contents_and_address (type, valaddr, address);
8482 type = value_type (dval);
8483 }
4c4b4cd2
PH
8484 else
8485 dval = dval0;
8486
e9bb382b 8487 rtype = alloc_type_copy (type);
14f9c5c9 8488 TYPE_CODE (rtype) = TYPE_CODE_STRUCT;
8ecb59f8 8489 INIT_NONE_SPECIFIC (rtype);
4c4b4cd2 8490 TYPE_NFIELDS (rtype) = nfields;
d2e4a39e
AS
8491 TYPE_FIELDS (rtype) =
8492 (struct field *) TYPE_ALLOC (rtype, nfields * sizeof (struct field));
8493 memcpy (TYPE_FIELDS (rtype), TYPE_FIELDS (type),
4c4b4cd2 8494 sizeof (struct field) * nfields);
14f9c5c9 8495 TYPE_NAME (rtype) = ada_type_name (type);
876cecd0 8496 TYPE_FIXED_INSTANCE (rtype) = 1;
14f9c5c9
AS
8497 TYPE_LENGTH (rtype) = TYPE_LENGTH (type);
8498
4c4b4cd2
PH
8499 branch_type = to_fixed_variant_branch_type
8500 (TYPE_FIELD_TYPE (type, variant_field),
d2e4a39e 8501 cond_offset_host (valaddr,
4c4b4cd2
PH
8502 TYPE_FIELD_BITPOS (type, variant_field)
8503 / TARGET_CHAR_BIT),
d2e4a39e 8504 cond_offset_target (address,
4c4b4cd2
PH
8505 TYPE_FIELD_BITPOS (type, variant_field)
8506 / TARGET_CHAR_BIT), dval);
d2e4a39e 8507 if (branch_type == NULL)
14f9c5c9 8508 {
4c4b4cd2 8509 int f;
5b4ee69b 8510
4c4b4cd2
PH
8511 for (f = variant_field + 1; f < nfields; f += 1)
8512 TYPE_FIELDS (rtype)[f - 1] = TYPE_FIELDS (rtype)[f];
14f9c5c9 8513 TYPE_NFIELDS (rtype) -= 1;
14f9c5c9
AS
8514 }
8515 else
8516 {
4c4b4cd2
PH
8517 TYPE_FIELD_TYPE (rtype, variant_field) = branch_type;
8518 TYPE_FIELD_NAME (rtype, variant_field) = "S";
8519 TYPE_FIELD_BITSIZE (rtype, variant_field) = 0;
14f9c5c9 8520 TYPE_LENGTH (rtype) += TYPE_LENGTH (branch_type);
14f9c5c9 8521 }
4c4b4cd2 8522 TYPE_LENGTH (rtype) -= TYPE_LENGTH (TYPE_FIELD_TYPE (type, variant_field));
d2e4a39e 8523
4c4b4cd2 8524 value_free_to_mark (mark);
14f9c5c9
AS
8525 return rtype;
8526}
8527
8528/* An ordinary record type (with fixed-length fields) that describes
8529 the value at (TYPE0, VALADDR, ADDRESS) [see explanation at
8530 beginning of this section]. Any necessary discriminants' values
4c4b4cd2
PH
8531 should be in DVAL, a record value; it may be NULL if the object
8532 at ADDR itself contains any necessary discriminant values.
8533 Additionally, VALADDR and ADDRESS may also be NULL if no discriminant
8534 values from the record are needed. Except in the case that DVAL,
8535 VALADDR, and ADDRESS are all 0 or NULL, a variant field (unless
8536 unchecked) is replaced by a particular branch of the variant.
8537
8538 NOTE: the case in which DVAL and VALADDR are NULL and ADDRESS is 0
8539 is questionable and may be removed. It can arise during the
8540 processing of an unconstrained-array-of-record type where all the
8541 variant branches have exactly the same size. This is because in
8542 such cases, the compiler does not bother to use the XVS convention
8543 when encoding the record. I am currently dubious of this
8544 shortcut and suspect the compiler should be altered. FIXME. */
14f9c5c9 8545
d2e4a39e 8546static struct type *
fc1a4b47 8547to_fixed_record_type (struct type *type0, const gdb_byte *valaddr,
4c4b4cd2 8548 CORE_ADDR address, struct value *dval)
14f9c5c9 8549{
d2e4a39e 8550 struct type *templ_type;
14f9c5c9 8551
876cecd0 8552 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
8553 return type0;
8554
d2e4a39e 8555 templ_type = dynamic_template_type (type0);
14f9c5c9
AS
8556
8557 if (templ_type != NULL)
8558 return template_to_fixed_record_type (templ_type, valaddr, address, dval);
4c4b4cd2
PH
8559 else if (variant_field_index (type0) >= 0)
8560 {
8561 if (dval == NULL && valaddr == NULL && address == 0)
8562 return type0;
8563 return to_record_with_fixed_variant_part (type0, valaddr, address,
8564 dval);
8565 }
14f9c5c9
AS
8566 else
8567 {
876cecd0 8568 TYPE_FIXED_INSTANCE (type0) = 1;
14f9c5c9
AS
8569 return type0;
8570 }
8571
8572}
8573
8574/* An ordinary record type (with fixed-length fields) that describes
8575 the value at (VAR_TYPE0, VALADDR, ADDRESS), where VAR_TYPE0 is a
8576 union type. Any necessary discriminants' values should be in DVAL,
8577 a record value. That is, this routine selects the appropriate
8578 branch of the union at ADDR according to the discriminant value
b1f33ddd 8579 indicated in the union's type name. Returns VAR_TYPE0 itself if
0963b4bd 8580 it represents a variant subject to a pragma Unchecked_Union. */
14f9c5c9 8581
d2e4a39e 8582static struct type *
fc1a4b47 8583to_fixed_variant_branch_type (struct type *var_type0, const gdb_byte *valaddr,
4c4b4cd2 8584 CORE_ADDR address, struct value *dval)
14f9c5c9
AS
8585{
8586 int which;
d2e4a39e
AS
8587 struct type *templ_type;
8588 struct type *var_type;
14f9c5c9
AS
8589
8590 if (TYPE_CODE (var_type0) == TYPE_CODE_PTR)
8591 var_type = TYPE_TARGET_TYPE (var_type0);
d2e4a39e 8592 else
14f9c5c9
AS
8593 var_type = var_type0;
8594
8595 templ_type = ada_find_parallel_type (var_type, "___XVU");
8596
8597 if (templ_type != NULL)
8598 var_type = templ_type;
8599
b1f33ddd
JB
8600 if (is_unchecked_variant (var_type, value_type (dval)))
8601 return var_type0;
d2e4a39e
AS
8602 which =
8603 ada_which_variant_applies (var_type,
0fd88904 8604 value_type (dval), value_contents (dval));
14f9c5c9
AS
8605
8606 if (which < 0)
e9bb382b 8607 return empty_record (var_type);
14f9c5c9 8608 else if (is_dynamic_field (var_type, which))
4c4b4cd2 8609 return to_fixed_record_type
d2e4a39e
AS
8610 (TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (var_type, which)),
8611 valaddr, address, dval);
4c4b4cd2 8612 else if (variant_field_index (TYPE_FIELD_TYPE (var_type, which)) >= 0)
d2e4a39e
AS
8613 return
8614 to_fixed_record_type
8615 (TYPE_FIELD_TYPE (var_type, which), valaddr, address, dval);
14f9c5c9
AS
8616 else
8617 return TYPE_FIELD_TYPE (var_type, which);
8618}
8619
8908fca5
JB
8620/* Assuming RANGE_TYPE is a TYPE_CODE_RANGE, return nonzero if
8621 ENCODING_TYPE, a type following the GNAT conventions for discrete
8622 type encodings, only carries redundant information. */
8623
8624static int
8625ada_is_redundant_range_encoding (struct type *range_type,
8626 struct type *encoding_type)
8627{
108d56a4 8628 const char *bounds_str;
8908fca5
JB
8629 int n;
8630 LONGEST lo, hi;
8631
8632 gdb_assert (TYPE_CODE (range_type) == TYPE_CODE_RANGE);
8633
005e2509
JB
8634 if (TYPE_CODE (get_base_type (range_type))
8635 != TYPE_CODE (get_base_type (encoding_type)))
8636 {
8637 /* The compiler probably used a simple base type to describe
8638 the range type instead of the range's actual base type,
8639 expecting us to get the real base type from the encoding
8640 anyway. In this situation, the encoding cannot be ignored
8641 as redundant. */
8642 return 0;
8643 }
8644
8908fca5
JB
8645 if (is_dynamic_type (range_type))
8646 return 0;
8647
8648 if (TYPE_NAME (encoding_type) == NULL)
8649 return 0;
8650
8651 bounds_str = strstr (TYPE_NAME (encoding_type), "___XDLU_");
8652 if (bounds_str == NULL)
8653 return 0;
8654
8655 n = 8; /* Skip "___XDLU_". */
8656 if (!ada_scan_number (bounds_str, n, &lo, &n))
8657 return 0;
8658 if (TYPE_LOW_BOUND (range_type) != lo)
8659 return 0;
8660
8661 n += 2; /* Skip the "__" separator between the two bounds. */
8662 if (!ada_scan_number (bounds_str, n, &hi, &n))
8663 return 0;
8664 if (TYPE_HIGH_BOUND (range_type) != hi)
8665 return 0;
8666
8667 return 1;
8668}
8669
8670/* Given the array type ARRAY_TYPE, return nonzero if DESC_TYPE,
8671 a type following the GNAT encoding for describing array type
8672 indices, only carries redundant information. */
8673
8674static int
8675ada_is_redundant_index_type_desc (struct type *array_type,
8676 struct type *desc_type)
8677{
8678 struct type *this_layer = check_typedef (array_type);
8679 int i;
8680
8681 for (i = 0; i < TYPE_NFIELDS (desc_type); i++)
8682 {
8683 if (!ada_is_redundant_range_encoding (TYPE_INDEX_TYPE (this_layer),
8684 TYPE_FIELD_TYPE (desc_type, i)))
8685 return 0;
8686 this_layer = check_typedef (TYPE_TARGET_TYPE (this_layer));
8687 }
8688
8689 return 1;
8690}
8691
14f9c5c9
AS
8692/* Assuming that TYPE0 is an array type describing the type of a value
8693 at ADDR, and that DVAL describes a record containing any
8694 discriminants used in TYPE0, returns a type for the value that
8695 contains no dynamic components (that is, no components whose sizes
8696 are determined by run-time quantities). Unless IGNORE_TOO_BIG is
8697 true, gives an error message if the resulting type's size is over
4c4b4cd2 8698 varsize_limit. */
14f9c5c9 8699
d2e4a39e
AS
8700static struct type *
8701to_fixed_array_type (struct type *type0, struct value *dval,
4c4b4cd2 8702 int ignore_too_big)
14f9c5c9 8703{
d2e4a39e
AS
8704 struct type *index_type_desc;
8705 struct type *result;
ad82864c 8706 int constrained_packed_array_p;
931e5bc3 8707 static const char *xa_suffix = "___XA";
14f9c5c9 8708
b0dd7688 8709 type0 = ada_check_typedef (type0);
284614f0 8710 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2 8711 return type0;
14f9c5c9 8712
ad82864c
JB
8713 constrained_packed_array_p = ada_is_constrained_packed_array_type (type0);
8714 if (constrained_packed_array_p)
8715 type0 = decode_constrained_packed_array_type (type0);
284614f0 8716
931e5bc3
JG
8717 index_type_desc = ada_find_parallel_type (type0, xa_suffix);
8718
8719 /* As mentioned in exp_dbug.ads, for non bit-packed arrays an
8720 encoding suffixed with 'P' may still be generated. If so,
8721 it should be used to find the XA type. */
8722
8723 if (index_type_desc == NULL)
8724 {
1da0522e 8725 const char *type_name = ada_type_name (type0);
931e5bc3 8726
1da0522e 8727 if (type_name != NULL)
931e5bc3 8728 {
1da0522e 8729 const int len = strlen (type_name);
931e5bc3
JG
8730 char *name = (char *) alloca (len + strlen (xa_suffix));
8731
1da0522e 8732 if (type_name[len - 1] == 'P')
931e5bc3 8733 {
1da0522e 8734 strcpy (name, type_name);
931e5bc3
JG
8735 strcpy (name + len - 1, xa_suffix);
8736 index_type_desc = ada_find_parallel_type_with_name (type0, name);
8737 }
8738 }
8739 }
8740
28c85d6c 8741 ada_fixup_array_indexes_type (index_type_desc);
8908fca5
JB
8742 if (index_type_desc != NULL
8743 && ada_is_redundant_index_type_desc (type0, index_type_desc))
8744 {
8745 /* Ignore this ___XA parallel type, as it does not bring any
8746 useful information. This allows us to avoid creating fixed
8747 versions of the array's index types, which would be identical
8748 to the original ones. This, in turn, can also help avoid
8749 the creation of fixed versions of the array itself. */
8750 index_type_desc = NULL;
8751 }
8752
14f9c5c9
AS
8753 if (index_type_desc == NULL)
8754 {
61ee279c 8755 struct type *elt_type0 = ada_check_typedef (TYPE_TARGET_TYPE (type0));
5b4ee69b 8756
14f9c5c9 8757 /* NOTE: elt_type---the fixed version of elt_type0---should never
4c4b4cd2
PH
8758 depend on the contents of the array in properly constructed
8759 debugging data. */
529cad9c
PH
8760 /* Create a fixed version of the array element type.
8761 We're not providing the address of an element here,
e1d5a0d2 8762 and thus the actual object value cannot be inspected to do
529cad9c
PH
8763 the conversion. This should not be a problem, since arrays of
8764 unconstrained objects are not allowed. In particular, all
8765 the elements of an array of a tagged type should all be of
8766 the same type specified in the debugging info. No need to
8767 consult the object tag. */
1ed6ede0 8768 struct type *elt_type = ada_to_fixed_type (elt_type0, 0, 0, dval, 1);
14f9c5c9 8769
284614f0
JB
8770 /* Make sure we always create a new array type when dealing with
8771 packed array types, since we're going to fix-up the array
8772 type length and element bitsize a little further down. */
ad82864c 8773 if (elt_type0 == elt_type && !constrained_packed_array_p)
4c4b4cd2 8774 result = type0;
14f9c5c9 8775 else
e9bb382b 8776 result = create_array_type (alloc_type_copy (type0),
4c4b4cd2 8777 elt_type, TYPE_INDEX_TYPE (type0));
14f9c5c9
AS
8778 }
8779 else
8780 {
8781 int i;
8782 struct type *elt_type0;
8783
8784 elt_type0 = type0;
8785 for (i = TYPE_NFIELDS (index_type_desc); i > 0; i -= 1)
4c4b4cd2 8786 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
14f9c5c9
AS
8787
8788 /* NOTE: result---the fixed version of elt_type0---should never
4c4b4cd2
PH
8789 depend on the contents of the array in properly constructed
8790 debugging data. */
529cad9c
PH
8791 /* Create a fixed version of the array element type.
8792 We're not providing the address of an element here,
e1d5a0d2 8793 and thus the actual object value cannot be inspected to do
529cad9c
PH
8794 the conversion. This should not be a problem, since arrays of
8795 unconstrained objects are not allowed. In particular, all
8796 the elements of an array of a tagged type should all be of
8797 the same type specified in the debugging info. No need to
8798 consult the object tag. */
1ed6ede0
JB
8799 result =
8800 ada_to_fixed_type (ada_check_typedef (elt_type0), 0, 0, dval, 1);
1ce677a4
UW
8801
8802 elt_type0 = type0;
14f9c5c9 8803 for (i = TYPE_NFIELDS (index_type_desc) - 1; i >= 0; i -= 1)
4c4b4cd2
PH
8804 {
8805 struct type *range_type =
28c85d6c 8806 to_fixed_range_type (TYPE_FIELD_TYPE (index_type_desc, i), dval);
5b4ee69b 8807
e9bb382b 8808 result = create_array_type (alloc_type_copy (elt_type0),
4c4b4cd2 8809 result, range_type);
1ce677a4 8810 elt_type0 = TYPE_TARGET_TYPE (elt_type0);
4c4b4cd2 8811 }
d2e4a39e 8812 if (!ignore_too_big && TYPE_LENGTH (result) > varsize_limit)
323e0a4a 8813 error (_("array type with dynamic size is larger than varsize-limit"));
14f9c5c9
AS
8814 }
8815
2e6fda7d
JB
8816 /* We want to preserve the type name. This can be useful when
8817 trying to get the type name of a value that has already been
8818 printed (for instance, if the user did "print VAR; whatis $". */
8819 TYPE_NAME (result) = TYPE_NAME (type0);
8820
ad82864c 8821 if (constrained_packed_array_p)
284614f0
JB
8822 {
8823 /* So far, the resulting type has been created as if the original
8824 type was a regular (non-packed) array type. As a result, the
8825 bitsize of the array elements needs to be set again, and the array
8826 length needs to be recomputed based on that bitsize. */
8827 int len = TYPE_LENGTH (result) / TYPE_LENGTH (TYPE_TARGET_TYPE (result));
8828 int elt_bitsize = TYPE_FIELD_BITSIZE (type0, 0);
8829
8830 TYPE_FIELD_BITSIZE (result, 0) = TYPE_FIELD_BITSIZE (type0, 0);
8831 TYPE_LENGTH (result) = len * elt_bitsize / HOST_CHAR_BIT;
8832 if (TYPE_LENGTH (result) * HOST_CHAR_BIT < len * elt_bitsize)
8833 TYPE_LENGTH (result)++;
8834 }
8835
876cecd0 8836 TYPE_FIXED_INSTANCE (result) = 1;
14f9c5c9 8837 return result;
d2e4a39e 8838}
14f9c5c9
AS
8839
8840
8841/* A standard type (containing no dynamically sized components)
8842 corresponding to TYPE for the value (TYPE, VALADDR, ADDRESS)
8843 DVAL describes a record containing any discriminants used in TYPE0,
4c4b4cd2 8844 and may be NULL if there are none, or if the object of type TYPE at
529cad9c
PH
8845 ADDRESS or in VALADDR contains these discriminants.
8846
1ed6ede0
JB
8847 If CHECK_TAG is not null, in the case of tagged types, this function
8848 attempts to locate the object's tag and use it to compute the actual
8849 type. However, when ADDRESS is null, we cannot use it to determine the
8850 location of the tag, and therefore compute the tagged type's actual type.
8851 So we return the tagged type without consulting the tag. */
529cad9c 8852
f192137b
JB
8853static struct type *
8854ada_to_fixed_type_1 (struct type *type, const gdb_byte *valaddr,
1ed6ede0 8855 CORE_ADDR address, struct value *dval, int check_tag)
14f9c5c9 8856{
61ee279c 8857 type = ada_check_typedef (type);
8ecb59f8
TT
8858
8859 /* Only un-fixed types need to be handled here. */
8860 if (!HAVE_GNAT_AUX_INFO (type))
8861 return type;
8862
d2e4a39e
AS
8863 switch (TYPE_CODE (type))
8864 {
8865 default:
14f9c5c9 8866 return type;
d2e4a39e 8867 case TYPE_CODE_STRUCT:
4c4b4cd2 8868 {
76a01679 8869 struct type *static_type = to_static_fixed_type (type);
1ed6ede0
JB
8870 struct type *fixed_record_type =
8871 to_fixed_record_type (type, valaddr, address, NULL);
5b4ee69b 8872
529cad9c
PH
8873 /* If STATIC_TYPE is a tagged type and we know the object's address,
8874 then we can determine its tag, and compute the object's actual
0963b4bd 8875 type from there. Note that we have to use the fixed record
1ed6ede0
JB
8876 type (the parent part of the record may have dynamic fields
8877 and the way the location of _tag is expressed may depend on
8878 them). */
529cad9c 8879
1ed6ede0 8880 if (check_tag && address != 0 && ada_is_tagged_type (static_type, 0))
76a01679 8881 {
b50d69b5
JG
8882 struct value *tag =
8883 value_tag_from_contents_and_address
8884 (fixed_record_type,
8885 valaddr,
8886 address);
8887 struct type *real_type = type_from_tag (tag);
8888 struct value *obj =
8889 value_from_contents_and_address (fixed_record_type,
8890 valaddr,
8891 address);
9f1f738a 8892 fixed_record_type = value_type (obj);
76a01679 8893 if (real_type != NULL)
b50d69b5
JG
8894 return to_fixed_record_type
8895 (real_type, NULL,
8896 value_address (ada_tag_value_at_base_address (obj)), NULL);
76a01679 8897 }
4af88198
JB
8898
8899 /* Check to see if there is a parallel ___XVZ variable.
8900 If there is, then it provides the actual size of our type. */
8901 else if (ada_type_name (fixed_record_type) != NULL)
8902 {
0d5cff50 8903 const char *name = ada_type_name (fixed_record_type);
224c3ddb
SM
8904 char *xvz_name
8905 = (char *) alloca (strlen (name) + 7 /* "___XVZ\0" */);
eccab96d 8906 bool xvz_found = false;
4af88198
JB
8907 LONGEST size;
8908
88c15c34 8909 xsnprintf (xvz_name, strlen (name) + 7, "%s___XVZ", name);
a70b8144 8910 try
eccab96d
JB
8911 {
8912 xvz_found = get_int_var_value (xvz_name, size);
8913 }
230d2906 8914 catch (const gdb_exception_error &except)
eccab96d
JB
8915 {
8916 /* We found the variable, but somehow failed to read
8917 its value. Rethrow the same error, but with a little
8918 bit more information, to help the user understand
8919 what went wrong (Eg: the variable might have been
8920 optimized out). */
8921 throw_error (except.error,
8922 _("unable to read value of %s (%s)"),
3d6e9d23 8923 xvz_name, except.what ());
eccab96d 8924 }
eccab96d
JB
8925
8926 if (xvz_found && TYPE_LENGTH (fixed_record_type) != size)
4af88198
JB
8927 {
8928 fixed_record_type = copy_type (fixed_record_type);
8929 TYPE_LENGTH (fixed_record_type) = size;
8930
8931 /* The FIXED_RECORD_TYPE may have be a stub. We have
8932 observed this when the debugging info is STABS, and
8933 apparently it is something that is hard to fix.
8934
8935 In practice, we don't need the actual type definition
8936 at all, because the presence of the XVZ variable allows us
8937 to assume that there must be a XVS type as well, which we
8938 should be able to use later, when we need the actual type
8939 definition.
8940
8941 In the meantime, pretend that the "fixed" type we are
8942 returning is NOT a stub, because this can cause trouble
8943 when using this type to create new types targeting it.
8944 Indeed, the associated creation routines often check
8945 whether the target type is a stub and will try to replace
0963b4bd 8946 it, thus using a type with the wrong size. This, in turn,
4af88198
JB
8947 might cause the new type to have the wrong size too.
8948 Consider the case of an array, for instance, where the size
8949 of the array is computed from the number of elements in
8950 our array multiplied by the size of its element. */
8951 TYPE_STUB (fixed_record_type) = 0;
8952 }
8953 }
1ed6ede0 8954 return fixed_record_type;
4c4b4cd2 8955 }
d2e4a39e 8956 case TYPE_CODE_ARRAY:
4c4b4cd2 8957 return to_fixed_array_type (type, dval, 1);
d2e4a39e
AS
8958 case TYPE_CODE_UNION:
8959 if (dval == NULL)
4c4b4cd2 8960 return type;
d2e4a39e 8961 else
4c4b4cd2 8962 return to_fixed_variant_branch_type (type, valaddr, address, dval);
d2e4a39e 8963 }
14f9c5c9
AS
8964}
8965
f192137b
JB
8966/* The same as ada_to_fixed_type_1, except that it preserves the type
8967 if it is a TYPE_CODE_TYPEDEF of a type that is already fixed.
96dbd2c1
JB
8968
8969 The typedef layer needs be preserved in order to differentiate between
8970 arrays and array pointers when both types are implemented using the same
8971 fat pointer. In the array pointer case, the pointer is encoded as
8972 a typedef of the pointer type. For instance, considering:
8973
8974 type String_Access is access String;
8975 S1 : String_Access := null;
8976
8977 To the debugger, S1 is defined as a typedef of type String. But
8978 to the user, it is a pointer. So if the user tries to print S1,
8979 we should not dereference the array, but print the array address
8980 instead.
8981
8982 If we didn't preserve the typedef layer, we would lose the fact that
8983 the type is to be presented as a pointer (needs de-reference before
8984 being printed). And we would also use the source-level type name. */
f192137b
JB
8985
8986struct type *
8987ada_to_fixed_type (struct type *type, const gdb_byte *valaddr,
8988 CORE_ADDR address, struct value *dval, int check_tag)
8989
8990{
8991 struct type *fixed_type =
8992 ada_to_fixed_type_1 (type, valaddr, address, dval, check_tag);
8993
96dbd2c1
JB
8994 /* If TYPE is a typedef and its target type is the same as the FIXED_TYPE,
8995 then preserve the typedef layer.
8996
8997 Implementation note: We can only check the main-type portion of
8998 the TYPE and FIXED_TYPE, because eliminating the typedef layer
8999 from TYPE now returns a type that has the same instance flags
9000 as TYPE. For instance, if TYPE is a "typedef const", and its
9001 target type is a "struct", then the typedef elimination will return
9002 a "const" version of the target type. See check_typedef for more
9003 details about how the typedef layer elimination is done.
9004
9005 brobecker/2010-11-19: It seems to me that the only case where it is
9006 useful to preserve the typedef layer is when dealing with fat pointers.
9007 Perhaps, we could add a check for that and preserve the typedef layer
9008 only in that situation. But this seems unecessary so far, probably
9009 because we call check_typedef/ada_check_typedef pretty much everywhere.
9010 */
f192137b 9011 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF
720d1a40 9012 && (TYPE_MAIN_TYPE (ada_typedef_target_type (type))
96dbd2c1 9013 == TYPE_MAIN_TYPE (fixed_type)))
f192137b
JB
9014 return type;
9015
9016 return fixed_type;
9017}
9018
14f9c5c9 9019/* A standard (static-sized) type corresponding as well as possible to
4c4b4cd2 9020 TYPE0, but based on no runtime data. */
14f9c5c9 9021
d2e4a39e
AS
9022static struct type *
9023to_static_fixed_type (struct type *type0)
14f9c5c9 9024{
d2e4a39e 9025 struct type *type;
14f9c5c9
AS
9026
9027 if (type0 == NULL)
9028 return NULL;
9029
876cecd0 9030 if (TYPE_FIXED_INSTANCE (type0))
4c4b4cd2
PH
9031 return type0;
9032
61ee279c 9033 type0 = ada_check_typedef (type0);
d2e4a39e 9034
14f9c5c9
AS
9035 switch (TYPE_CODE (type0))
9036 {
9037 default:
9038 return type0;
9039 case TYPE_CODE_STRUCT:
9040 type = dynamic_template_type (type0);
d2e4a39e 9041 if (type != NULL)
4c4b4cd2
PH
9042 return template_to_static_fixed_type (type);
9043 else
9044 return template_to_static_fixed_type (type0);
14f9c5c9
AS
9045 case TYPE_CODE_UNION:
9046 type = ada_find_parallel_type (type0, "___XVU");
9047 if (type != NULL)
4c4b4cd2
PH
9048 return template_to_static_fixed_type (type);
9049 else
9050 return template_to_static_fixed_type (type0);
14f9c5c9
AS
9051 }
9052}
9053
4c4b4cd2
PH
9054/* A static approximation of TYPE with all type wrappers removed. */
9055
d2e4a39e
AS
9056static struct type *
9057static_unwrap_type (struct type *type)
14f9c5c9
AS
9058{
9059 if (ada_is_aligner_type (type))
9060 {
61ee279c 9061 struct type *type1 = TYPE_FIELD_TYPE (ada_check_typedef (type), 0);
14f9c5c9 9062 if (ada_type_name (type1) == NULL)
4c4b4cd2 9063 TYPE_NAME (type1) = ada_type_name (type);
14f9c5c9
AS
9064
9065 return static_unwrap_type (type1);
9066 }
d2e4a39e 9067 else
14f9c5c9 9068 {
d2e4a39e 9069 struct type *raw_real_type = ada_get_base_type (type);
5b4ee69b 9070
d2e4a39e 9071 if (raw_real_type == type)
4c4b4cd2 9072 return type;
14f9c5c9 9073 else
4c4b4cd2 9074 return to_static_fixed_type (raw_real_type);
14f9c5c9
AS
9075 }
9076}
9077
9078/* In some cases, incomplete and private types require
4c4b4cd2 9079 cross-references that are not resolved as records (for example,
14f9c5c9
AS
9080 type Foo;
9081 type FooP is access Foo;
9082 V: FooP;
9083 type Foo is array ...;
4c4b4cd2 9084 ). In these cases, since there is no mechanism for producing
14f9c5c9
AS
9085 cross-references to such types, we instead substitute for FooP a
9086 stub enumeration type that is nowhere resolved, and whose tag is
4c4b4cd2 9087 the name of the actual type. Call these types "non-record stubs". */
14f9c5c9
AS
9088
9089/* A type equivalent to TYPE that is not a non-record stub, if one
4c4b4cd2
PH
9090 exists, otherwise TYPE. */
9091
d2e4a39e 9092struct type *
61ee279c 9093ada_check_typedef (struct type *type)
14f9c5c9 9094{
727e3d2e
JB
9095 if (type == NULL)
9096 return NULL;
9097
736ade86
XR
9098 /* If our type is an access to an unconstrained array, which is encoded
9099 as a TYPE_CODE_TYPEDEF of a fat pointer, then we're done.
720d1a40
JB
9100 We don't want to strip the TYPE_CODE_TYPDEF layer, because this is
9101 what allows us to distinguish between fat pointers that represent
9102 array types, and fat pointers that represent array access types
9103 (in both cases, the compiler implements them as fat pointers). */
736ade86 9104 if (ada_is_access_to_unconstrained_array (type))
720d1a40
JB
9105 return type;
9106
f168693b 9107 type = check_typedef (type);
14f9c5c9 9108 if (type == NULL || TYPE_CODE (type) != TYPE_CODE_ENUM
529cad9c 9109 || !TYPE_STUB (type)
e86ca25f 9110 || TYPE_NAME (type) == NULL)
14f9c5c9 9111 return type;
d2e4a39e 9112 else
14f9c5c9 9113 {
e86ca25f 9114 const char *name = TYPE_NAME (type);
d2e4a39e 9115 struct type *type1 = ada_find_any_type (name);
5b4ee69b 9116
05e522ef
JB
9117 if (type1 == NULL)
9118 return type;
9119
9120 /* TYPE1 might itself be a TYPE_CODE_TYPEDEF (this can happen with
9121 stubs pointing to arrays, as we don't create symbols for array
3a867c22
JB
9122 types, only for the typedef-to-array types). If that's the case,
9123 strip the typedef layer. */
9124 if (TYPE_CODE (type1) == TYPE_CODE_TYPEDEF)
9125 type1 = ada_check_typedef (type1);
9126
9127 return type1;
14f9c5c9
AS
9128 }
9129}
9130
9131/* A value representing the data at VALADDR/ADDRESS as described by
9132 type TYPE0, but with a standard (static-sized) type that correctly
9133 describes it. If VAL0 is not NULL and TYPE0 already is a standard
9134 type, then return VAL0 [this feature is simply to avoid redundant
4c4b4cd2 9135 creation of struct values]. */
14f9c5c9 9136
4c4b4cd2
PH
9137static struct value *
9138ada_to_fixed_value_create (struct type *type0, CORE_ADDR address,
9139 struct value *val0)
14f9c5c9 9140{
1ed6ede0 9141 struct type *type = ada_to_fixed_type (type0, 0, address, NULL, 1);
5b4ee69b 9142
14f9c5c9
AS
9143 if (type == type0 && val0 != NULL)
9144 return val0;
cc0e770c
JB
9145
9146 if (VALUE_LVAL (val0) != lval_memory)
9147 {
9148 /* Our value does not live in memory; it could be a convenience
9149 variable, for instance. Create a not_lval value using val0's
9150 contents. */
9151 return value_from_contents (type, value_contents (val0));
9152 }
9153
9154 return value_from_contents_and_address (type, 0, address);
4c4b4cd2
PH
9155}
9156
9157/* A value representing VAL, but with a standard (static-sized) type
9158 that correctly describes it. Does not necessarily create a new
9159 value. */
9160
0c3acc09 9161struct value *
4c4b4cd2
PH
9162ada_to_fixed_value (struct value *val)
9163{
c48db5ca 9164 val = unwrap_value (val);
d8ce9127 9165 val = ada_to_fixed_value_create (value_type (val), value_address (val), val);
c48db5ca 9166 return val;
14f9c5c9 9167}
d2e4a39e 9168\f
14f9c5c9 9169
14f9c5c9
AS
9170/* Attributes */
9171
4c4b4cd2
PH
9172/* Table mapping attribute numbers to names.
9173 NOTE: Keep up to date with enum ada_attribute definition in ada-lang.h. */
14f9c5c9 9174
d2e4a39e 9175static const char *attribute_names[] = {
14f9c5c9
AS
9176 "<?>",
9177
d2e4a39e 9178 "first",
14f9c5c9
AS
9179 "last",
9180 "length",
9181 "image",
14f9c5c9
AS
9182 "max",
9183 "min",
4c4b4cd2
PH
9184 "modulus",
9185 "pos",
9186 "size",
9187 "tag",
14f9c5c9 9188 "val",
14f9c5c9
AS
9189 0
9190};
9191
d2e4a39e 9192const char *
4c4b4cd2 9193ada_attribute_name (enum exp_opcode n)
14f9c5c9 9194{
4c4b4cd2
PH
9195 if (n >= OP_ATR_FIRST && n <= (int) OP_ATR_VAL)
9196 return attribute_names[n - OP_ATR_FIRST + 1];
14f9c5c9
AS
9197 else
9198 return attribute_names[0];
9199}
9200
4c4b4cd2 9201/* Evaluate the 'POS attribute applied to ARG. */
14f9c5c9 9202
4c4b4cd2
PH
9203static LONGEST
9204pos_atr (struct value *arg)
14f9c5c9 9205{
24209737
PH
9206 struct value *val = coerce_ref (arg);
9207 struct type *type = value_type (val);
aa715135 9208 LONGEST result;
14f9c5c9 9209
d2e4a39e 9210 if (!discrete_type_p (type))
323e0a4a 9211 error (_("'POS only defined on discrete types"));
14f9c5c9 9212
aa715135
JG
9213 if (!discrete_position (type, value_as_long (val), &result))
9214 error (_("enumeration value is invalid: can't find 'POS"));
14f9c5c9 9215
aa715135 9216 return result;
4c4b4cd2
PH
9217}
9218
9219static struct value *
3cb382c9 9220value_pos_atr (struct type *type, struct value *arg)
4c4b4cd2 9221{
3cb382c9 9222 return value_from_longest (type, pos_atr (arg));
14f9c5c9
AS
9223}
9224
4c4b4cd2 9225/* Evaluate the TYPE'VAL attribute applied to ARG. */
14f9c5c9 9226
d2e4a39e
AS
9227static struct value *
9228value_val_atr (struct type *type, struct value *arg)
14f9c5c9 9229{
d2e4a39e 9230 if (!discrete_type_p (type))
323e0a4a 9231 error (_("'VAL only defined on discrete types"));
df407dfe 9232 if (!integer_type_p (value_type (arg)))
323e0a4a 9233 error (_("'VAL requires integral argument"));
14f9c5c9
AS
9234
9235 if (TYPE_CODE (type) == TYPE_CODE_ENUM)
9236 {
9237 long pos = value_as_long (arg);
5b4ee69b 9238
14f9c5c9 9239 if (pos < 0 || pos >= TYPE_NFIELDS (type))
323e0a4a 9240 error (_("argument to 'VAL out of range"));
14e75d8e 9241 return value_from_longest (type, TYPE_FIELD_ENUMVAL (type, pos));
14f9c5c9
AS
9242 }
9243 else
9244 return value_from_longest (type, value_as_long (arg));
9245}
14f9c5c9 9246\f
d2e4a39e 9247
4c4b4cd2 9248 /* Evaluation */
14f9c5c9 9249
4c4b4cd2
PH
9250/* True if TYPE appears to be an Ada character type.
9251 [At the moment, this is true only for Character and Wide_Character;
9252 It is a heuristic test that could stand improvement]. */
14f9c5c9 9253
fc913e53 9254bool
d2e4a39e 9255ada_is_character_type (struct type *type)
14f9c5c9 9256{
7b9f71f2
JB
9257 const char *name;
9258
9259 /* If the type code says it's a character, then assume it really is,
9260 and don't check any further. */
9261 if (TYPE_CODE (type) == TYPE_CODE_CHAR)
fc913e53 9262 return true;
7b9f71f2
JB
9263
9264 /* Otherwise, assume it's a character type iff it is a discrete type
9265 with a known character type name. */
9266 name = ada_type_name (type);
9267 return (name != NULL
9268 && (TYPE_CODE (type) == TYPE_CODE_INT
9269 || TYPE_CODE (type) == TYPE_CODE_RANGE)
9270 && (strcmp (name, "character") == 0
9271 || strcmp (name, "wide_character") == 0
5a517ebd 9272 || strcmp (name, "wide_wide_character") == 0
7b9f71f2 9273 || strcmp (name, "unsigned char") == 0));
14f9c5c9
AS
9274}
9275
4c4b4cd2 9276/* True if TYPE appears to be an Ada string type. */
14f9c5c9 9277
fc913e53 9278bool
ebf56fd3 9279ada_is_string_type (struct type *type)
14f9c5c9 9280{
61ee279c 9281 type = ada_check_typedef (type);
d2e4a39e 9282 if (type != NULL
14f9c5c9 9283 && TYPE_CODE (type) != TYPE_CODE_PTR
76a01679
JB
9284 && (ada_is_simple_array_type (type)
9285 || ada_is_array_descriptor_type (type))
14f9c5c9
AS
9286 && ada_array_arity (type) == 1)
9287 {
9288 struct type *elttype = ada_array_element_type (type, 1);
9289
9290 return ada_is_character_type (elttype);
9291 }
d2e4a39e 9292 else
fc913e53 9293 return false;
14f9c5c9
AS
9294}
9295
5bf03f13
JB
9296/* The compiler sometimes provides a parallel XVS type for a given
9297 PAD type. Normally, it is safe to follow the PAD type directly,
9298 but older versions of the compiler have a bug that causes the offset
9299 of its "F" field to be wrong. Following that field in that case
9300 would lead to incorrect results, but this can be worked around
9301 by ignoring the PAD type and using the associated XVS type instead.
9302
9303 Set to True if the debugger should trust the contents of PAD types.
9304 Otherwise, ignore the PAD type if there is a parallel XVS type. */
9305static int trust_pad_over_xvs = 1;
14f9c5c9
AS
9306
9307/* True if TYPE is a struct type introduced by the compiler to force the
9308 alignment of a value. Such types have a single field with a
4c4b4cd2 9309 distinctive name. */
14f9c5c9
AS
9310
9311int
ebf56fd3 9312ada_is_aligner_type (struct type *type)
14f9c5c9 9313{
61ee279c 9314 type = ada_check_typedef (type);
714e53ab 9315
5bf03f13 9316 if (!trust_pad_over_xvs && ada_find_parallel_type (type, "___XVS") != NULL)
714e53ab
PH
9317 return 0;
9318
14f9c5c9 9319 return (TYPE_CODE (type) == TYPE_CODE_STRUCT
4c4b4cd2
PH
9320 && TYPE_NFIELDS (type) == 1
9321 && strcmp (TYPE_FIELD_NAME (type, 0), "F") == 0);
14f9c5c9
AS
9322}
9323
9324/* If there is an ___XVS-convention type parallel to SUBTYPE, return
4c4b4cd2 9325 the parallel type. */
14f9c5c9 9326
d2e4a39e
AS
9327struct type *
9328ada_get_base_type (struct type *raw_type)
14f9c5c9 9329{
d2e4a39e
AS
9330 struct type *real_type_namer;
9331 struct type *raw_real_type;
14f9c5c9
AS
9332
9333 if (raw_type == NULL || TYPE_CODE (raw_type) != TYPE_CODE_STRUCT)
9334 return raw_type;
9335
284614f0
JB
9336 if (ada_is_aligner_type (raw_type))
9337 /* The encoding specifies that we should always use the aligner type.
9338 So, even if this aligner type has an associated XVS type, we should
9339 simply ignore it.
9340
9341 According to the compiler gurus, an XVS type parallel to an aligner
9342 type may exist because of a stabs limitation. In stabs, aligner
9343 types are empty because the field has a variable-sized type, and
9344 thus cannot actually be used as an aligner type. As a result,
9345 we need the associated parallel XVS type to decode the type.
9346 Since the policy in the compiler is to not change the internal
9347 representation based on the debugging info format, we sometimes
9348 end up having a redundant XVS type parallel to the aligner type. */
9349 return raw_type;
9350
14f9c5c9 9351 real_type_namer = ada_find_parallel_type (raw_type, "___XVS");
d2e4a39e 9352 if (real_type_namer == NULL
14f9c5c9
AS
9353 || TYPE_CODE (real_type_namer) != TYPE_CODE_STRUCT
9354 || TYPE_NFIELDS (real_type_namer) != 1)
9355 return raw_type;
9356
f80d3ff2
JB
9357 if (TYPE_CODE (TYPE_FIELD_TYPE (real_type_namer, 0)) != TYPE_CODE_REF)
9358 {
9359 /* This is an older encoding form where the base type needs to be
9360 looked up by name. We prefer the newer enconding because it is
9361 more efficient. */
9362 raw_real_type = ada_find_any_type (TYPE_FIELD_NAME (real_type_namer, 0));
9363 if (raw_real_type == NULL)
9364 return raw_type;
9365 else
9366 return raw_real_type;
9367 }
9368
9369 /* The field in our XVS type is a reference to the base type. */
9370 return TYPE_TARGET_TYPE (TYPE_FIELD_TYPE (real_type_namer, 0));
d2e4a39e 9371}
14f9c5c9 9372
4c4b4cd2 9373/* The type of value designated by TYPE, with all aligners removed. */
14f9c5c9 9374
d2e4a39e
AS
9375struct type *
9376ada_aligned_type (struct type *type)
14f9c5c9
AS
9377{
9378 if (ada_is_aligner_type (type))
9379 return ada_aligned_type (TYPE_FIELD_TYPE (type, 0));
9380 else
9381 return ada_get_base_type (type);
9382}
9383
9384
9385/* The address of the aligned value in an object at address VALADDR
4c4b4cd2 9386 having type TYPE. Assumes ada_is_aligner_type (TYPE). */
14f9c5c9 9387
fc1a4b47
AC
9388const gdb_byte *
9389ada_aligned_value_addr (struct type *type, const gdb_byte *valaddr)
14f9c5c9 9390{
d2e4a39e 9391 if (ada_is_aligner_type (type))
14f9c5c9 9392 return ada_aligned_value_addr (TYPE_FIELD_TYPE (type, 0),
4c4b4cd2
PH
9393 valaddr +
9394 TYPE_FIELD_BITPOS (type,
9395 0) / TARGET_CHAR_BIT);
14f9c5c9
AS
9396 else
9397 return valaddr;
9398}
9399
4c4b4cd2
PH
9400
9401
14f9c5c9 9402/* The printed representation of an enumeration literal with encoded
4c4b4cd2 9403 name NAME. The value is good to the next call of ada_enum_name. */
d2e4a39e
AS
9404const char *
9405ada_enum_name (const char *name)
14f9c5c9 9406{
4c4b4cd2
PH
9407 static char *result;
9408 static size_t result_len = 0;
e6a959d6 9409 const char *tmp;
14f9c5c9 9410
4c4b4cd2
PH
9411 /* First, unqualify the enumeration name:
9412 1. Search for the last '.' character. If we find one, then skip
177b42fe 9413 all the preceding characters, the unqualified name starts
76a01679 9414 right after that dot.
4c4b4cd2 9415 2. Otherwise, we may be debugging on a target where the compiler
76a01679
JB
9416 translates dots into "__". Search forward for double underscores,
9417 but stop searching when we hit an overloading suffix, which is
9418 of the form "__" followed by digits. */
4c4b4cd2 9419
c3e5cd34
PH
9420 tmp = strrchr (name, '.');
9421 if (tmp != NULL)
4c4b4cd2
PH
9422 name = tmp + 1;
9423 else
14f9c5c9 9424 {
4c4b4cd2
PH
9425 while ((tmp = strstr (name, "__")) != NULL)
9426 {
9427 if (isdigit (tmp[2]))
9428 break;
9429 else
9430 name = tmp + 2;
9431 }
14f9c5c9
AS
9432 }
9433
9434 if (name[0] == 'Q')
9435 {
14f9c5c9 9436 int v;
5b4ee69b 9437
14f9c5c9 9438 if (name[1] == 'U' || name[1] == 'W')
4c4b4cd2
PH
9439 {
9440 if (sscanf (name + 2, "%x", &v) != 1)
9441 return name;
9442 }
14f9c5c9 9443 else
4c4b4cd2 9444 return name;
14f9c5c9 9445
4c4b4cd2 9446 GROW_VECT (result, result_len, 16);
14f9c5c9 9447 if (isascii (v) && isprint (v))
88c15c34 9448 xsnprintf (result, result_len, "'%c'", v);
14f9c5c9 9449 else if (name[1] == 'U')
88c15c34 9450 xsnprintf (result, result_len, "[\"%02x\"]", v);
14f9c5c9 9451 else
88c15c34 9452 xsnprintf (result, result_len, "[\"%04x\"]", v);
14f9c5c9
AS
9453
9454 return result;
9455 }
d2e4a39e 9456 else
4c4b4cd2 9457 {
c3e5cd34
PH
9458 tmp = strstr (name, "__");
9459 if (tmp == NULL)
9460 tmp = strstr (name, "$");
9461 if (tmp != NULL)
4c4b4cd2
PH
9462 {
9463 GROW_VECT (result, result_len, tmp - name + 1);
9464 strncpy (result, name, tmp - name);
9465 result[tmp - name] = '\0';
9466 return result;
9467 }
9468
9469 return name;
9470 }
14f9c5c9
AS
9471}
9472
14f9c5c9
AS
9473/* Evaluate the subexpression of EXP starting at *POS as for
9474 evaluate_type, updating *POS to point just past the evaluated
4c4b4cd2 9475 expression. */
14f9c5c9 9476
d2e4a39e
AS
9477static struct value *
9478evaluate_subexp_type (struct expression *exp, int *pos)
14f9c5c9 9479{
4b27a620 9480 return evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
14f9c5c9
AS
9481}
9482
9483/* If VAL is wrapped in an aligner or subtype wrapper, return the
4c4b4cd2 9484 value it wraps. */
14f9c5c9 9485
d2e4a39e
AS
9486static struct value *
9487unwrap_value (struct value *val)
14f9c5c9 9488{
df407dfe 9489 struct type *type = ada_check_typedef (value_type (val));
5b4ee69b 9490
14f9c5c9
AS
9491 if (ada_is_aligner_type (type))
9492 {
de4d072f 9493 struct value *v = ada_value_struct_elt (val, "F", 0);
df407dfe 9494 struct type *val_type = ada_check_typedef (value_type (v));
5b4ee69b 9495
14f9c5c9 9496 if (ada_type_name (val_type) == NULL)
4c4b4cd2 9497 TYPE_NAME (val_type) = ada_type_name (type);
14f9c5c9
AS
9498
9499 return unwrap_value (v);
9500 }
d2e4a39e 9501 else
14f9c5c9 9502 {
d2e4a39e 9503 struct type *raw_real_type =
61ee279c 9504 ada_check_typedef (ada_get_base_type (type));
d2e4a39e 9505
5bf03f13
JB
9506 /* If there is no parallel XVS or XVE type, then the value is
9507 already unwrapped. Return it without further modification. */
9508 if ((type == raw_real_type)
9509 && ada_find_parallel_type (type, "___XVE") == NULL)
9510 return val;
14f9c5c9 9511
d2e4a39e 9512 return
4c4b4cd2
PH
9513 coerce_unspec_val_to_type
9514 (val, ada_to_fixed_type (raw_real_type, 0,
42ae5230 9515 value_address (val),
1ed6ede0 9516 NULL, 1));
14f9c5c9
AS
9517 }
9518}
d2e4a39e
AS
9519
9520static struct value *
50eff16b 9521cast_from_fixed (struct type *type, struct value *arg)
14f9c5c9 9522{
50eff16b
UW
9523 struct value *scale = ada_scaling_factor (value_type (arg));
9524 arg = value_cast (value_type (scale), arg);
14f9c5c9 9525
50eff16b
UW
9526 arg = value_binop (arg, scale, BINOP_MUL);
9527 return value_cast (type, arg);
14f9c5c9
AS
9528}
9529
d2e4a39e 9530static struct value *
50eff16b 9531cast_to_fixed (struct type *type, struct value *arg)
14f9c5c9 9532{
50eff16b
UW
9533 if (type == value_type (arg))
9534 return arg;
5b4ee69b 9535
50eff16b
UW
9536 struct value *scale = ada_scaling_factor (type);
9537 if (ada_is_fixed_point_type (value_type (arg)))
9538 arg = cast_from_fixed (value_type (scale), arg);
9539 else
9540 arg = value_cast (value_type (scale), arg);
9541
9542 arg = value_binop (arg, scale, BINOP_DIV);
9543 return value_cast (type, arg);
14f9c5c9
AS
9544}
9545
d99dcf51
JB
9546/* Given two array types T1 and T2, return nonzero iff both arrays
9547 contain the same number of elements. */
9548
9549static int
9550ada_same_array_size_p (struct type *t1, struct type *t2)
9551{
9552 LONGEST lo1, hi1, lo2, hi2;
9553
9554 /* Get the array bounds in order to verify that the size of
9555 the two arrays match. */
9556 if (!get_array_bounds (t1, &lo1, &hi1)
9557 || !get_array_bounds (t2, &lo2, &hi2))
9558 error (_("unable to determine array bounds"));
9559
9560 /* To make things easier for size comparison, normalize a bit
9561 the case of empty arrays by making sure that the difference
9562 between upper bound and lower bound is always -1. */
9563 if (lo1 > hi1)
9564 hi1 = lo1 - 1;
9565 if (lo2 > hi2)
9566 hi2 = lo2 - 1;
9567
9568 return (hi1 - lo1 == hi2 - lo2);
9569}
9570
9571/* Assuming that VAL is an array of integrals, and TYPE represents
9572 an array with the same number of elements, but with wider integral
9573 elements, return an array "casted" to TYPE. In practice, this
9574 means that the returned array is built by casting each element
9575 of the original array into TYPE's (wider) element type. */
9576
9577static struct value *
9578ada_promote_array_of_integrals (struct type *type, struct value *val)
9579{
9580 struct type *elt_type = TYPE_TARGET_TYPE (type);
9581 LONGEST lo, hi;
9582 struct value *res;
9583 LONGEST i;
9584
9585 /* Verify that both val and type are arrays of scalars, and
9586 that the size of val's elements is smaller than the size
9587 of type's element. */
9588 gdb_assert (TYPE_CODE (type) == TYPE_CODE_ARRAY);
9589 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (type)));
9590 gdb_assert (TYPE_CODE (value_type (val)) == TYPE_CODE_ARRAY);
9591 gdb_assert (is_integral_type (TYPE_TARGET_TYPE (value_type (val))));
9592 gdb_assert (TYPE_LENGTH (TYPE_TARGET_TYPE (type))
9593 > TYPE_LENGTH (TYPE_TARGET_TYPE (value_type (val))));
9594
9595 if (!get_array_bounds (type, &lo, &hi))
9596 error (_("unable to determine array bounds"));
9597
9598 res = allocate_value (type);
9599
9600 /* Promote each array element. */
9601 for (i = 0; i < hi - lo + 1; i++)
9602 {
9603 struct value *elt = value_cast (elt_type, value_subscript (val, lo + i));
9604
9605 memcpy (value_contents_writeable (res) + (i * TYPE_LENGTH (elt_type)),
9606 value_contents_all (elt), TYPE_LENGTH (elt_type));
9607 }
9608
9609 return res;
9610}
9611
4c4b4cd2
PH
9612/* Coerce VAL as necessary for assignment to an lval of type TYPE, and
9613 return the converted value. */
9614
d2e4a39e
AS
9615static struct value *
9616coerce_for_assign (struct type *type, struct value *val)
14f9c5c9 9617{
df407dfe 9618 struct type *type2 = value_type (val);
5b4ee69b 9619
14f9c5c9
AS
9620 if (type == type2)
9621 return val;
9622
61ee279c
PH
9623 type2 = ada_check_typedef (type2);
9624 type = ada_check_typedef (type);
14f9c5c9 9625
d2e4a39e
AS
9626 if (TYPE_CODE (type2) == TYPE_CODE_PTR
9627 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
14f9c5c9
AS
9628 {
9629 val = ada_value_ind (val);
df407dfe 9630 type2 = value_type (val);
14f9c5c9
AS
9631 }
9632
d2e4a39e 9633 if (TYPE_CODE (type2) == TYPE_CODE_ARRAY
14f9c5c9
AS
9634 && TYPE_CODE (type) == TYPE_CODE_ARRAY)
9635 {
d99dcf51
JB
9636 if (!ada_same_array_size_p (type, type2))
9637 error (_("cannot assign arrays of different length"));
9638
9639 if (is_integral_type (TYPE_TARGET_TYPE (type))
9640 && is_integral_type (TYPE_TARGET_TYPE (type2))
9641 && TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9642 < TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
9643 {
9644 /* Allow implicit promotion of the array elements to
9645 a wider type. */
9646 return ada_promote_array_of_integrals (type, val);
9647 }
9648
9649 if (TYPE_LENGTH (TYPE_TARGET_TYPE (type2))
9650 != TYPE_LENGTH (TYPE_TARGET_TYPE (type)))
323e0a4a 9651 error (_("Incompatible types in assignment"));
04624583 9652 deprecated_set_value_type (val, type);
14f9c5c9 9653 }
d2e4a39e 9654 return val;
14f9c5c9
AS
9655}
9656
4c4b4cd2
PH
9657static struct value *
9658ada_value_binop (struct value *arg1, struct value *arg2, enum exp_opcode op)
9659{
9660 struct value *val;
9661 struct type *type1, *type2;
9662 LONGEST v, v1, v2;
9663
994b9211
AC
9664 arg1 = coerce_ref (arg1);
9665 arg2 = coerce_ref (arg2);
18af8284
JB
9666 type1 = get_base_type (ada_check_typedef (value_type (arg1)));
9667 type2 = get_base_type (ada_check_typedef (value_type (arg2)));
4c4b4cd2 9668
76a01679
JB
9669 if (TYPE_CODE (type1) != TYPE_CODE_INT
9670 || TYPE_CODE (type2) != TYPE_CODE_INT)
4c4b4cd2
PH
9671 return value_binop (arg1, arg2, op);
9672
76a01679 9673 switch (op)
4c4b4cd2
PH
9674 {
9675 case BINOP_MOD:
9676 case BINOP_DIV:
9677 case BINOP_REM:
9678 break;
9679 default:
9680 return value_binop (arg1, arg2, op);
9681 }
9682
9683 v2 = value_as_long (arg2);
9684 if (v2 == 0)
323e0a4a 9685 error (_("second operand of %s must not be zero."), op_string (op));
4c4b4cd2
PH
9686
9687 if (TYPE_UNSIGNED (type1) || op == BINOP_MOD)
9688 return value_binop (arg1, arg2, op);
9689
9690 v1 = value_as_long (arg1);
9691 switch (op)
9692 {
9693 case BINOP_DIV:
9694 v = v1 / v2;
76a01679
JB
9695 if (!TRUNCATION_TOWARDS_ZERO && v1 * (v1 % v2) < 0)
9696 v += v > 0 ? -1 : 1;
4c4b4cd2
PH
9697 break;
9698 case BINOP_REM:
9699 v = v1 % v2;
76a01679
JB
9700 if (v * v1 < 0)
9701 v -= v2;
4c4b4cd2
PH
9702 break;
9703 default:
9704 /* Should not reach this point. */
9705 v = 0;
9706 }
9707
9708 val = allocate_value (type1);
990a07ab 9709 store_unsigned_integer (value_contents_raw (val),
e17a4113
UW
9710 TYPE_LENGTH (value_type (val)),
9711 gdbarch_byte_order (get_type_arch (type1)), v);
4c4b4cd2
PH
9712 return val;
9713}
9714
9715static int
9716ada_value_equal (struct value *arg1, struct value *arg2)
9717{
df407dfe
AC
9718 if (ada_is_direct_array_type (value_type (arg1))
9719 || ada_is_direct_array_type (value_type (arg2)))
4c4b4cd2 9720 {
79e8fcaa
JB
9721 struct type *arg1_type, *arg2_type;
9722
f58b38bf
JB
9723 /* Automatically dereference any array reference before
9724 we attempt to perform the comparison. */
9725 arg1 = ada_coerce_ref (arg1);
9726 arg2 = ada_coerce_ref (arg2);
79e8fcaa 9727
4c4b4cd2
PH
9728 arg1 = ada_coerce_to_simple_array (arg1);
9729 arg2 = ada_coerce_to_simple_array (arg2);
79e8fcaa
JB
9730
9731 arg1_type = ada_check_typedef (value_type (arg1));
9732 arg2_type = ada_check_typedef (value_type (arg2));
9733
9734 if (TYPE_CODE (arg1_type) != TYPE_CODE_ARRAY
9735 || TYPE_CODE (arg2_type) != TYPE_CODE_ARRAY)
323e0a4a 9736 error (_("Attempt to compare array with non-array"));
4c4b4cd2 9737 /* FIXME: The following works only for types whose
76a01679
JB
9738 representations use all bits (no padding or undefined bits)
9739 and do not have user-defined equality. */
79e8fcaa
JB
9740 return (TYPE_LENGTH (arg1_type) == TYPE_LENGTH (arg2_type)
9741 && memcmp (value_contents (arg1), value_contents (arg2),
9742 TYPE_LENGTH (arg1_type)) == 0);
4c4b4cd2
PH
9743 }
9744 return value_equal (arg1, arg2);
9745}
9746
52ce6436
PH
9747/* Total number of component associations in the aggregate starting at
9748 index PC in EXP. Assumes that index PC is the start of an
0963b4bd 9749 OP_AGGREGATE. */
52ce6436
PH
9750
9751static int
9752num_component_specs (struct expression *exp, int pc)
9753{
9754 int n, m, i;
5b4ee69b 9755
52ce6436
PH
9756 m = exp->elts[pc + 1].longconst;
9757 pc += 3;
9758 n = 0;
9759 for (i = 0; i < m; i += 1)
9760 {
9761 switch (exp->elts[pc].opcode)
9762 {
9763 default:
9764 n += 1;
9765 break;
9766 case OP_CHOICES:
9767 n += exp->elts[pc + 1].longconst;
9768 break;
9769 }
9770 ada_evaluate_subexp (NULL, exp, &pc, EVAL_SKIP);
9771 }
9772 return n;
9773}
9774
9775/* Assign the result of evaluating EXP starting at *POS to the INDEXth
9776 component of LHS (a simple array or a record), updating *POS past
9777 the expression, assuming that LHS is contained in CONTAINER. Does
9778 not modify the inferior's memory, nor does it modify LHS (unless
9779 LHS == CONTAINER). */
9780
9781static void
9782assign_component (struct value *container, struct value *lhs, LONGEST index,
9783 struct expression *exp, int *pos)
9784{
9785 struct value *mark = value_mark ();
9786 struct value *elt;
0e2da9f0 9787 struct type *lhs_type = check_typedef (value_type (lhs));
5b4ee69b 9788
0e2da9f0 9789 if (TYPE_CODE (lhs_type) == TYPE_CODE_ARRAY)
52ce6436 9790 {
22601c15
UW
9791 struct type *index_type = builtin_type (exp->gdbarch)->builtin_int;
9792 struct value *index_val = value_from_longest (index_type, index);
5b4ee69b 9793
52ce6436
PH
9794 elt = unwrap_value (ada_value_subscript (lhs, 1, &index_val));
9795 }
9796 else
9797 {
9798 elt = ada_index_struct_field (index, lhs, 0, value_type (lhs));
c48db5ca 9799 elt = ada_to_fixed_value (elt);
52ce6436
PH
9800 }
9801
9802 if (exp->elts[*pos].opcode == OP_AGGREGATE)
9803 assign_aggregate (container, elt, exp, pos, EVAL_NORMAL);
9804 else
9805 value_assign_to_component (container, elt,
9806 ada_evaluate_subexp (NULL, exp, pos,
9807 EVAL_NORMAL));
9808
9809 value_free_to_mark (mark);
9810}
9811
9812/* Assuming that LHS represents an lvalue having a record or array
9813 type, and EXP->ELTS[*POS] is an OP_AGGREGATE, evaluate an assignment
9814 of that aggregate's value to LHS, advancing *POS past the
9815 aggregate. NOSIDE is as for evaluate_subexp. CONTAINER is an
9816 lvalue containing LHS (possibly LHS itself). Does not modify
9817 the inferior's memory, nor does it modify the contents of
0963b4bd 9818 LHS (unless == CONTAINER). Returns the modified CONTAINER. */
52ce6436
PH
9819
9820static struct value *
9821assign_aggregate (struct value *container,
9822 struct value *lhs, struct expression *exp,
9823 int *pos, enum noside noside)
9824{
9825 struct type *lhs_type;
9826 int n = exp->elts[*pos+1].longconst;
9827 LONGEST low_index, high_index;
9828 int num_specs;
9829 LONGEST *indices;
9830 int max_indices, num_indices;
52ce6436 9831 int i;
52ce6436
PH
9832
9833 *pos += 3;
9834 if (noside != EVAL_NORMAL)
9835 {
52ce6436
PH
9836 for (i = 0; i < n; i += 1)
9837 ada_evaluate_subexp (NULL, exp, pos, noside);
9838 return container;
9839 }
9840
9841 container = ada_coerce_ref (container);
9842 if (ada_is_direct_array_type (value_type (container)))
9843 container = ada_coerce_to_simple_array (container);
9844 lhs = ada_coerce_ref (lhs);
9845 if (!deprecated_value_modifiable (lhs))
9846 error (_("Left operand of assignment is not a modifiable lvalue."));
9847
0e2da9f0 9848 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9849 if (ada_is_direct_array_type (lhs_type))
9850 {
9851 lhs = ada_coerce_to_simple_array (lhs);
0e2da9f0 9852 lhs_type = check_typedef (value_type (lhs));
52ce6436
PH
9853 low_index = TYPE_ARRAY_LOWER_BOUND_VALUE (lhs_type);
9854 high_index = TYPE_ARRAY_UPPER_BOUND_VALUE (lhs_type);
52ce6436
PH
9855 }
9856 else if (TYPE_CODE (lhs_type) == TYPE_CODE_STRUCT)
9857 {
9858 low_index = 0;
9859 high_index = num_visible_fields (lhs_type) - 1;
52ce6436
PH
9860 }
9861 else
9862 error (_("Left-hand side must be array or record."));
9863
9864 num_specs = num_component_specs (exp, *pos - 3);
9865 max_indices = 4 * num_specs + 4;
8d749320 9866 indices = XALLOCAVEC (LONGEST, max_indices);
52ce6436
PH
9867 indices[0] = indices[1] = low_index - 1;
9868 indices[2] = indices[3] = high_index + 1;
9869 num_indices = 4;
9870
9871 for (i = 0; i < n; i += 1)
9872 {
9873 switch (exp->elts[*pos].opcode)
9874 {
1fbf5ada
JB
9875 case OP_CHOICES:
9876 aggregate_assign_from_choices (container, lhs, exp, pos, indices,
9877 &num_indices, max_indices,
9878 low_index, high_index);
9879 break;
9880 case OP_POSITIONAL:
9881 aggregate_assign_positional (container, lhs, exp, pos, indices,
52ce6436
PH
9882 &num_indices, max_indices,
9883 low_index, high_index);
1fbf5ada
JB
9884 break;
9885 case OP_OTHERS:
9886 if (i != n-1)
9887 error (_("Misplaced 'others' clause"));
9888 aggregate_assign_others (container, lhs, exp, pos, indices,
9889 num_indices, low_index, high_index);
9890 break;
9891 default:
9892 error (_("Internal error: bad aggregate clause"));
52ce6436
PH
9893 }
9894 }
9895
9896 return container;
9897}
9898
9899/* Assign into the component of LHS indexed by the OP_POSITIONAL
9900 construct at *POS, updating *POS past the construct, given that
9901 the positions are relative to lower bound LOW, where HIGH is the
9902 upper bound. Record the position in INDICES[0 .. MAX_INDICES-1]
9903 updating *NUM_INDICES as needed. CONTAINER is as for
0963b4bd 9904 assign_aggregate. */
52ce6436
PH
9905static void
9906aggregate_assign_positional (struct value *container,
9907 struct value *lhs, struct expression *exp,
9908 int *pos, LONGEST *indices, int *num_indices,
9909 int max_indices, LONGEST low, LONGEST high)
9910{
9911 LONGEST ind = longest_to_int (exp->elts[*pos + 1].longconst) + low;
9912
9913 if (ind - 1 == high)
e1d5a0d2 9914 warning (_("Extra components in aggregate ignored."));
52ce6436
PH
9915 if (ind <= high)
9916 {
9917 add_component_interval (ind, ind, indices, num_indices, max_indices);
9918 *pos += 3;
9919 assign_component (container, lhs, ind, exp, pos);
9920 }
9921 else
9922 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9923}
9924
9925/* Assign into the components of LHS indexed by the OP_CHOICES
9926 construct at *POS, updating *POS past the construct, given that
9927 the allowable indices are LOW..HIGH. Record the indices assigned
9928 to in INDICES[0 .. MAX_INDICES-1], updating *NUM_INDICES as
0963b4bd 9929 needed. CONTAINER is as for assign_aggregate. */
52ce6436
PH
9930static void
9931aggregate_assign_from_choices (struct value *container,
9932 struct value *lhs, struct expression *exp,
9933 int *pos, LONGEST *indices, int *num_indices,
9934 int max_indices, LONGEST low, LONGEST high)
9935{
9936 int j;
9937 int n_choices = longest_to_int (exp->elts[*pos+1].longconst);
9938 int choice_pos, expr_pc;
9939 int is_array = ada_is_direct_array_type (value_type (lhs));
9940
9941 choice_pos = *pos += 3;
9942
9943 for (j = 0; j < n_choices; j += 1)
9944 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9945 expr_pc = *pos;
9946 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
9947
9948 for (j = 0; j < n_choices; j += 1)
9949 {
9950 LONGEST lower, upper;
9951 enum exp_opcode op = exp->elts[choice_pos].opcode;
5b4ee69b 9952
52ce6436
PH
9953 if (op == OP_DISCRETE_RANGE)
9954 {
9955 choice_pos += 1;
9956 lower = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9957 EVAL_NORMAL));
9958 upper = value_as_long (ada_evaluate_subexp (NULL, exp, pos,
9959 EVAL_NORMAL));
9960 }
9961 else if (is_array)
9962 {
9963 lower = value_as_long (ada_evaluate_subexp (NULL, exp, &choice_pos,
9964 EVAL_NORMAL));
9965 upper = lower;
9966 }
9967 else
9968 {
9969 int ind;
0d5cff50 9970 const char *name;
5b4ee69b 9971
52ce6436
PH
9972 switch (op)
9973 {
9974 case OP_NAME:
9975 name = &exp->elts[choice_pos + 2].string;
9976 break;
9977 case OP_VAR_VALUE:
9978 name = SYMBOL_NATURAL_NAME (exp->elts[choice_pos + 2].symbol);
9979 break;
9980 default:
9981 error (_("Invalid record component association."));
9982 }
9983 ada_evaluate_subexp (NULL, exp, &choice_pos, EVAL_SKIP);
9984 ind = 0;
9985 if (! find_struct_field (name, value_type (lhs), 0,
9986 NULL, NULL, NULL, NULL, &ind))
9987 error (_("Unknown component name: %s."), name);
9988 lower = upper = ind;
9989 }
9990
9991 if (lower <= upper && (lower < low || upper > high))
9992 error (_("Index in component association out of bounds."));
9993
9994 add_component_interval (lower, upper, indices, num_indices,
9995 max_indices);
9996 while (lower <= upper)
9997 {
9998 int pos1;
5b4ee69b 9999
52ce6436
PH
10000 pos1 = expr_pc;
10001 assign_component (container, lhs, lower, exp, &pos1);
10002 lower += 1;
10003 }
10004 }
10005}
10006
10007/* Assign the value of the expression in the OP_OTHERS construct in
10008 EXP at *POS into the components of LHS indexed from LOW .. HIGH that
10009 have not been previously assigned. The index intervals already assigned
10010 are in INDICES[0 .. NUM_INDICES-1]. Updates *POS to after the
0963b4bd 10011 OP_OTHERS clause. CONTAINER is as for assign_aggregate. */
52ce6436
PH
10012static void
10013aggregate_assign_others (struct value *container,
10014 struct value *lhs, struct expression *exp,
10015 int *pos, LONGEST *indices, int num_indices,
10016 LONGEST low, LONGEST high)
10017{
10018 int i;
5ce64950 10019 int expr_pc = *pos + 1;
52ce6436
PH
10020
10021 for (i = 0; i < num_indices - 2; i += 2)
10022 {
10023 LONGEST ind;
5b4ee69b 10024
52ce6436
PH
10025 for (ind = indices[i + 1] + 1; ind < indices[i + 2]; ind += 1)
10026 {
5ce64950 10027 int localpos;
5b4ee69b 10028
5ce64950
MS
10029 localpos = expr_pc;
10030 assign_component (container, lhs, ind, exp, &localpos);
52ce6436
PH
10031 }
10032 }
10033 ada_evaluate_subexp (NULL, exp, pos, EVAL_SKIP);
10034}
10035
10036/* Add the interval [LOW .. HIGH] to the sorted set of intervals
10037 [ INDICES[0] .. INDICES[1] ],..., [ INDICES[*SIZE-2] .. INDICES[*SIZE-1] ],
10038 modifying *SIZE as needed. It is an error if *SIZE exceeds
10039 MAX_SIZE. The resulting intervals do not overlap. */
10040static void
10041add_component_interval (LONGEST low, LONGEST high,
10042 LONGEST* indices, int *size, int max_size)
10043{
10044 int i, j;
5b4ee69b 10045
52ce6436
PH
10046 for (i = 0; i < *size; i += 2) {
10047 if (high >= indices[i] && low <= indices[i + 1])
10048 {
10049 int kh;
5b4ee69b 10050
52ce6436
PH
10051 for (kh = i + 2; kh < *size; kh += 2)
10052 if (high < indices[kh])
10053 break;
10054 if (low < indices[i])
10055 indices[i] = low;
10056 indices[i + 1] = indices[kh - 1];
10057 if (high > indices[i + 1])
10058 indices[i + 1] = high;
10059 memcpy (indices + i + 2, indices + kh, *size - kh);
10060 *size -= kh - i - 2;
10061 return;
10062 }
10063 else if (high < indices[i])
10064 break;
10065 }
10066
10067 if (*size == max_size)
10068 error (_("Internal error: miscounted aggregate components."));
10069 *size += 2;
10070 for (j = *size-1; j >= i+2; j -= 1)
10071 indices[j] = indices[j - 2];
10072 indices[i] = low;
10073 indices[i + 1] = high;
10074}
10075
6e48bd2c
JB
10076/* Perform and Ada cast of ARG2 to type TYPE if the type of ARG2
10077 is different. */
10078
10079static struct value *
b7e22850 10080ada_value_cast (struct type *type, struct value *arg2)
6e48bd2c
JB
10081{
10082 if (type == ada_check_typedef (value_type (arg2)))
10083 return arg2;
10084
10085 if (ada_is_fixed_point_type (type))
95f39a5b 10086 return cast_to_fixed (type, arg2);
6e48bd2c
JB
10087
10088 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10089 return cast_from_fixed (type, arg2);
6e48bd2c
JB
10090
10091 return value_cast (type, arg2);
10092}
10093
284614f0
JB
10094/* Evaluating Ada expressions, and printing their result.
10095 ------------------------------------------------------
10096
21649b50
JB
10097 1. Introduction:
10098 ----------------
10099
284614f0
JB
10100 We usually evaluate an Ada expression in order to print its value.
10101 We also evaluate an expression in order to print its type, which
10102 happens during the EVAL_AVOID_SIDE_EFFECTS phase of the evaluation,
10103 but we'll focus mostly on the EVAL_NORMAL phase. In practice, the
10104 EVAL_AVOID_SIDE_EFFECTS phase allows us to simplify certain aspects of
10105 the evaluation compared to the EVAL_NORMAL, but is otherwise very
10106 similar.
10107
10108 Evaluating expressions is a little more complicated for Ada entities
10109 than it is for entities in languages such as C. The main reason for
10110 this is that Ada provides types whose definition might be dynamic.
10111 One example of such types is variant records. Or another example
10112 would be an array whose bounds can only be known at run time.
10113
10114 The following description is a general guide as to what should be
10115 done (and what should NOT be done) in order to evaluate an expression
10116 involving such types, and when. This does not cover how the semantic
10117 information is encoded by GNAT as this is covered separatly. For the
10118 document used as the reference for the GNAT encoding, see exp_dbug.ads
10119 in the GNAT sources.
10120
10121 Ideally, we should embed each part of this description next to its
10122 associated code. Unfortunately, the amount of code is so vast right
10123 now that it's hard to see whether the code handling a particular
10124 situation might be duplicated or not. One day, when the code is
10125 cleaned up, this guide might become redundant with the comments
10126 inserted in the code, and we might want to remove it.
10127
21649b50
JB
10128 2. ``Fixing'' an Entity, the Simple Case:
10129 -----------------------------------------
10130
284614f0
JB
10131 When evaluating Ada expressions, the tricky issue is that they may
10132 reference entities whose type contents and size are not statically
10133 known. Consider for instance a variant record:
10134
10135 type Rec (Empty : Boolean := True) is record
10136 case Empty is
10137 when True => null;
10138 when False => Value : Integer;
10139 end case;
10140 end record;
10141 Yes : Rec := (Empty => False, Value => 1);
10142 No : Rec := (empty => True);
10143
10144 The size and contents of that record depends on the value of the
10145 descriminant (Rec.Empty). At this point, neither the debugging
10146 information nor the associated type structure in GDB are able to
10147 express such dynamic types. So what the debugger does is to create
10148 "fixed" versions of the type that applies to the specific object.
10149 We also informally refer to this opperation as "fixing" an object,
10150 which means creating its associated fixed type.
10151
10152 Example: when printing the value of variable "Yes" above, its fixed
10153 type would look like this:
10154
10155 type Rec is record
10156 Empty : Boolean;
10157 Value : Integer;
10158 end record;
10159
10160 On the other hand, if we printed the value of "No", its fixed type
10161 would become:
10162
10163 type Rec is record
10164 Empty : Boolean;
10165 end record;
10166
10167 Things become a little more complicated when trying to fix an entity
10168 with a dynamic type that directly contains another dynamic type,
10169 such as an array of variant records, for instance. There are
10170 two possible cases: Arrays, and records.
10171
21649b50
JB
10172 3. ``Fixing'' Arrays:
10173 ---------------------
10174
10175 The type structure in GDB describes an array in terms of its bounds,
10176 and the type of its elements. By design, all elements in the array
10177 have the same type and we cannot represent an array of variant elements
10178 using the current type structure in GDB. When fixing an array,
10179 we cannot fix the array element, as we would potentially need one
10180 fixed type per element of the array. As a result, the best we can do
10181 when fixing an array is to produce an array whose bounds and size
10182 are correct (allowing us to read it from memory), but without having
10183 touched its element type. Fixing each element will be done later,
10184 when (if) necessary.
10185
10186 Arrays are a little simpler to handle than records, because the same
10187 amount of memory is allocated for each element of the array, even if
1b536f04 10188 the amount of space actually used by each element differs from element
21649b50 10189 to element. Consider for instance the following array of type Rec:
284614f0
JB
10190
10191 type Rec_Array is array (1 .. 2) of Rec;
10192
1b536f04
JB
10193 The actual amount of memory occupied by each element might be different
10194 from element to element, depending on the value of their discriminant.
21649b50 10195 But the amount of space reserved for each element in the array remains
1b536f04 10196 fixed regardless. So we simply need to compute that size using
21649b50
JB
10197 the debugging information available, from which we can then determine
10198 the array size (we multiply the number of elements of the array by
10199 the size of each element).
10200
10201 The simplest case is when we have an array of a constrained element
10202 type. For instance, consider the following type declarations:
10203
10204 type Bounded_String (Max_Size : Integer) is
10205 Length : Integer;
10206 Buffer : String (1 .. Max_Size);
10207 end record;
10208 type Bounded_String_Array is array (1 ..2) of Bounded_String (80);
10209
10210 In this case, the compiler describes the array as an array of
10211 variable-size elements (identified by its XVS suffix) for which
10212 the size can be read in the parallel XVZ variable.
10213
10214 In the case of an array of an unconstrained element type, the compiler
10215 wraps the array element inside a private PAD type. This type should not
10216 be shown to the user, and must be "unwrap"'ed before printing. Note
284614f0
JB
10217 that we also use the adjective "aligner" in our code to designate
10218 these wrapper types.
10219
1b536f04 10220 In some cases, the size allocated for each element is statically
21649b50
JB
10221 known. In that case, the PAD type already has the correct size,
10222 and the array element should remain unfixed.
10223
10224 But there are cases when this size is not statically known.
10225 For instance, assuming that "Five" is an integer variable:
284614f0
JB
10226
10227 type Dynamic is array (1 .. Five) of Integer;
10228 type Wrapper (Has_Length : Boolean := False) is record
10229 Data : Dynamic;
10230 case Has_Length is
10231 when True => Length : Integer;
10232 when False => null;
10233 end case;
10234 end record;
10235 type Wrapper_Array is array (1 .. 2) of Wrapper;
10236
10237 Hello : Wrapper_Array := (others => (Has_Length => True,
10238 Data => (others => 17),
10239 Length => 1));
10240
10241
10242 The debugging info would describe variable Hello as being an
10243 array of a PAD type. The size of that PAD type is not statically
10244 known, but can be determined using a parallel XVZ variable.
10245 In that case, a copy of the PAD type with the correct size should
10246 be used for the fixed array.
10247
21649b50
JB
10248 3. ``Fixing'' record type objects:
10249 ----------------------------------
10250
10251 Things are slightly different from arrays in the case of dynamic
284614f0
JB
10252 record types. In this case, in order to compute the associated
10253 fixed type, we need to determine the size and offset of each of
10254 its components. This, in turn, requires us to compute the fixed
10255 type of each of these components.
10256
10257 Consider for instance the example:
10258
10259 type Bounded_String (Max_Size : Natural) is record
10260 Str : String (1 .. Max_Size);
10261 Length : Natural;
10262 end record;
10263 My_String : Bounded_String (Max_Size => 10);
10264
10265 In that case, the position of field "Length" depends on the size
10266 of field Str, which itself depends on the value of the Max_Size
21649b50 10267 discriminant. In order to fix the type of variable My_String,
284614f0
JB
10268 we need to fix the type of field Str. Therefore, fixing a variant
10269 record requires us to fix each of its components.
10270
10271 However, if a component does not have a dynamic size, the component
10272 should not be fixed. In particular, fields that use a PAD type
10273 should not fixed. Here is an example where this might happen
10274 (assuming type Rec above):
10275
10276 type Container (Big : Boolean) is record
10277 First : Rec;
10278 After : Integer;
10279 case Big is
10280 when True => Another : Integer;
10281 when False => null;
10282 end case;
10283 end record;
10284 My_Container : Container := (Big => False,
10285 First => (Empty => True),
10286 After => 42);
10287
10288 In that example, the compiler creates a PAD type for component First,
10289 whose size is constant, and then positions the component After just
10290 right after it. The offset of component After is therefore constant
10291 in this case.
10292
10293 The debugger computes the position of each field based on an algorithm
10294 that uses, among other things, the actual position and size of the field
21649b50
JB
10295 preceding it. Let's now imagine that the user is trying to print
10296 the value of My_Container. If the type fixing was recursive, we would
284614f0
JB
10297 end up computing the offset of field After based on the size of the
10298 fixed version of field First. And since in our example First has
10299 only one actual field, the size of the fixed type is actually smaller
10300 than the amount of space allocated to that field, and thus we would
10301 compute the wrong offset of field After.
10302
21649b50
JB
10303 To make things more complicated, we need to watch out for dynamic
10304 components of variant records (identified by the ___XVL suffix in
10305 the component name). Even if the target type is a PAD type, the size
10306 of that type might not be statically known. So the PAD type needs
10307 to be unwrapped and the resulting type needs to be fixed. Otherwise,
10308 we might end up with the wrong size for our component. This can be
10309 observed with the following type declarations:
284614f0
JB
10310
10311 type Octal is new Integer range 0 .. 7;
10312 type Octal_Array is array (Positive range <>) of Octal;
10313 pragma Pack (Octal_Array);
10314
10315 type Octal_Buffer (Size : Positive) is record
10316 Buffer : Octal_Array (1 .. Size);
10317 Length : Integer;
10318 end record;
10319
10320 In that case, Buffer is a PAD type whose size is unset and needs
10321 to be computed by fixing the unwrapped type.
10322
21649b50
JB
10323 4. When to ``Fix'' un-``Fixed'' sub-elements of an entity:
10324 ----------------------------------------------------------
10325
10326 Lastly, when should the sub-elements of an entity that remained unfixed
284614f0
JB
10327 thus far, be actually fixed?
10328
10329 The answer is: Only when referencing that element. For instance
10330 when selecting one component of a record, this specific component
10331 should be fixed at that point in time. Or when printing the value
10332 of a record, each component should be fixed before its value gets
10333 printed. Similarly for arrays, the element of the array should be
10334 fixed when printing each element of the array, or when extracting
10335 one element out of that array. On the other hand, fixing should
10336 not be performed on the elements when taking a slice of an array!
10337
31432a67 10338 Note that one of the side effects of miscomputing the offset and
284614f0
JB
10339 size of each field is that we end up also miscomputing the size
10340 of the containing type. This can have adverse results when computing
10341 the value of an entity. GDB fetches the value of an entity based
10342 on the size of its type, and thus a wrong size causes GDB to fetch
10343 the wrong amount of memory. In the case where the computed size is
10344 too small, GDB fetches too little data to print the value of our
31432a67 10345 entity. Results in this case are unpredictable, as we usually read
284614f0
JB
10346 past the buffer containing the data =:-o. */
10347
ced9779b
JB
10348/* Evaluate a subexpression of EXP, at index *POS, and return a value
10349 for that subexpression cast to TO_TYPE. Advance *POS over the
10350 subexpression. */
10351
10352static value *
10353ada_evaluate_subexp_for_cast (expression *exp, int *pos,
10354 enum noside noside, struct type *to_type)
10355{
10356 int pc = *pos;
10357
10358 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE
10359 || exp->elts[pc].opcode == OP_VAR_VALUE)
10360 {
10361 (*pos) += 4;
10362
10363 value *val;
10364 if (exp->elts[pc].opcode == OP_VAR_MSYM_VALUE)
10365 {
10366 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10367 return value_zero (to_type, not_lval);
10368
10369 val = evaluate_var_msym_value (noside,
10370 exp->elts[pc + 1].objfile,
10371 exp->elts[pc + 2].msymbol);
10372 }
10373 else
10374 val = evaluate_var_value (noside,
10375 exp->elts[pc + 1].block,
10376 exp->elts[pc + 2].symbol);
10377
10378 if (noside == EVAL_SKIP)
10379 return eval_skip_value (exp);
10380
10381 val = ada_value_cast (to_type, val);
10382
10383 /* Follow the Ada language semantics that do not allow taking
10384 an address of the result of a cast (view conversion in Ada). */
10385 if (VALUE_LVAL (val) == lval_memory)
10386 {
10387 if (value_lazy (val))
10388 value_fetch_lazy (val);
10389 VALUE_LVAL (val) = not_lval;
10390 }
10391 return val;
10392 }
10393
10394 value *val = evaluate_subexp (to_type, exp, pos, noside);
10395 if (noside == EVAL_SKIP)
10396 return eval_skip_value (exp);
10397 return ada_value_cast (to_type, val);
10398}
10399
284614f0
JB
10400/* Implement the evaluate_exp routine in the exp_descriptor structure
10401 for the Ada language. */
10402
52ce6436 10403static struct value *
ebf56fd3 10404ada_evaluate_subexp (struct type *expect_type, struct expression *exp,
4c4b4cd2 10405 int *pos, enum noside noside)
14f9c5c9
AS
10406{
10407 enum exp_opcode op;
b5385fc0 10408 int tem;
14f9c5c9 10409 int pc;
5ec18f2b 10410 int preeval_pos;
14f9c5c9
AS
10411 struct value *arg1 = NULL, *arg2 = NULL, *arg3;
10412 struct type *type;
52ce6436 10413 int nargs, oplen;
d2e4a39e 10414 struct value **argvec;
14f9c5c9 10415
d2e4a39e
AS
10416 pc = *pos;
10417 *pos += 1;
14f9c5c9
AS
10418 op = exp->elts[pc].opcode;
10419
d2e4a39e 10420 switch (op)
14f9c5c9
AS
10421 {
10422 default:
10423 *pos -= 1;
6e48bd2c 10424 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
ca1f964d
JG
10425
10426 if (noside == EVAL_NORMAL)
10427 arg1 = unwrap_value (arg1);
6e48bd2c 10428
edd079d9 10429 /* If evaluating an OP_FLOAT and an EXPECT_TYPE was provided,
6e48bd2c
JB
10430 then we need to perform the conversion manually, because
10431 evaluate_subexp_standard doesn't do it. This conversion is
10432 necessary in Ada because the different kinds of float/fixed
10433 types in Ada have different representations.
10434
10435 Similarly, we need to perform the conversion from OP_LONG
10436 ourselves. */
edd079d9 10437 if ((op == OP_FLOAT || op == OP_LONG) && expect_type != NULL)
b7e22850 10438 arg1 = ada_value_cast (expect_type, arg1);
6e48bd2c
JB
10439
10440 return arg1;
4c4b4cd2
PH
10441
10442 case OP_STRING:
10443 {
76a01679 10444 struct value *result;
5b4ee69b 10445
76a01679
JB
10446 *pos -= 1;
10447 result = evaluate_subexp_standard (expect_type, exp, pos, noside);
10448 /* The result type will have code OP_STRING, bashed there from
10449 OP_ARRAY. Bash it back. */
df407dfe
AC
10450 if (TYPE_CODE (value_type (result)) == TYPE_CODE_STRING)
10451 TYPE_CODE (value_type (result)) = TYPE_CODE_ARRAY;
76a01679 10452 return result;
4c4b4cd2 10453 }
14f9c5c9
AS
10454
10455 case UNOP_CAST:
10456 (*pos) += 2;
10457 type = exp->elts[pc + 1].type;
ced9779b 10458 return ada_evaluate_subexp_for_cast (exp, pos, noside, type);
14f9c5c9 10459
4c4b4cd2
PH
10460 case UNOP_QUAL:
10461 (*pos) += 2;
10462 type = exp->elts[pc + 1].type;
10463 return ada_evaluate_subexp (type, exp, pos, noside);
10464
14f9c5c9
AS
10465 case BINOP_ASSIGN:
10466 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
52ce6436
PH
10467 if (exp->elts[*pos].opcode == OP_AGGREGATE)
10468 {
10469 arg1 = assign_aggregate (arg1, arg1, exp, pos, noside);
10470 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
10471 return arg1;
10472 return ada_value_assign (arg1, arg1);
10473 }
003f3813
JB
10474 /* Force the evaluation of the rhs ARG2 to the type of the lhs ARG1,
10475 except if the lhs of our assignment is a convenience variable.
10476 In the case of assigning to a convenience variable, the lhs
10477 should be exactly the result of the evaluation of the rhs. */
10478 type = value_type (arg1);
10479 if (VALUE_LVAL (arg1) == lval_internalvar)
10480 type = NULL;
10481 arg2 = evaluate_subexp (type, exp, pos, noside);
14f9c5c9 10482 if (noside == EVAL_SKIP || noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10483 return arg1;
f411722c
TT
10484 if (VALUE_LVAL (arg1) == lval_internalvar)
10485 {
10486 /* Nothing. */
10487 }
10488 else if (ada_is_fixed_point_type (value_type (arg1)))
df407dfe
AC
10489 arg2 = cast_to_fixed (value_type (arg1), arg2);
10490 else if (ada_is_fixed_point_type (value_type (arg2)))
76a01679 10491 error
323e0a4a 10492 (_("Fixed-point values must be assigned to fixed-point variables"));
d2e4a39e 10493 else
df407dfe 10494 arg2 = coerce_for_assign (value_type (arg1), arg2);
4c4b4cd2 10495 return ada_value_assign (arg1, arg2);
14f9c5c9
AS
10496
10497 case BINOP_ADD:
10498 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10499 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10500 if (noside == EVAL_SKIP)
4c4b4cd2 10501 goto nosideret;
2ac8a782
JB
10502 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10503 return (value_from_longest
10504 (value_type (arg1),
10505 value_as_long (arg1) + value_as_long (arg2)));
c40cc657
JB
10506 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10507 return (value_from_longest
10508 (value_type (arg2),
10509 value_as_long (arg1) + value_as_long (arg2)));
df407dfe
AC
10510 if ((ada_is_fixed_point_type (value_type (arg1))
10511 || ada_is_fixed_point_type (value_type (arg2)))
10512 && value_type (arg1) != value_type (arg2))
323e0a4a 10513 error (_("Operands of fixed-point addition must have the same type"));
b7789565
JB
10514 /* Do the addition, and cast the result to the type of the first
10515 argument. We cannot cast the result to a reference type, so if
10516 ARG1 is a reference type, find its underlying type. */
10517 type = value_type (arg1);
10518 while (TYPE_CODE (type) == TYPE_CODE_REF)
10519 type = TYPE_TARGET_TYPE (type);
f44316fa 10520 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10521 return value_cast (type, value_binop (arg1, arg2, BINOP_ADD));
14f9c5c9
AS
10522
10523 case BINOP_SUB:
10524 arg1 = evaluate_subexp_with_coercion (exp, pos, noside);
10525 arg2 = evaluate_subexp_with_coercion (exp, pos, noside);
10526 if (noside == EVAL_SKIP)
4c4b4cd2 10527 goto nosideret;
2ac8a782
JB
10528 if (TYPE_CODE (value_type (arg1)) == TYPE_CODE_PTR)
10529 return (value_from_longest
10530 (value_type (arg1),
10531 value_as_long (arg1) - value_as_long (arg2)));
c40cc657
JB
10532 if (TYPE_CODE (value_type (arg2)) == TYPE_CODE_PTR)
10533 return (value_from_longest
10534 (value_type (arg2),
10535 value_as_long (arg1) - value_as_long (arg2)));
df407dfe
AC
10536 if ((ada_is_fixed_point_type (value_type (arg1))
10537 || ada_is_fixed_point_type (value_type (arg2)))
10538 && value_type (arg1) != value_type (arg2))
0963b4bd
MS
10539 error (_("Operands of fixed-point subtraction "
10540 "must have the same type"));
b7789565
JB
10541 /* Do the substraction, and cast the result to the type of the first
10542 argument. We cannot cast the result to a reference type, so if
10543 ARG1 is a reference type, find its underlying type. */
10544 type = value_type (arg1);
10545 while (TYPE_CODE (type) == TYPE_CODE_REF)
10546 type = TYPE_TARGET_TYPE (type);
f44316fa 10547 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
89eef114 10548 return value_cast (type, value_binop (arg1, arg2, BINOP_SUB));
14f9c5c9
AS
10549
10550 case BINOP_MUL:
10551 case BINOP_DIV:
e1578042
JB
10552 case BINOP_REM:
10553 case BINOP_MOD:
14f9c5c9
AS
10554 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10555 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10556 if (noside == EVAL_SKIP)
4c4b4cd2 10557 goto nosideret;
e1578042 10558 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
9c2be529
JB
10559 {
10560 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10561 return value_zero (value_type (arg1), not_lval);
10562 }
14f9c5c9 10563 else
4c4b4cd2 10564 {
a53b7a21 10565 type = builtin_type (exp->gdbarch)->builtin_double;
df407dfe 10566 if (ada_is_fixed_point_type (value_type (arg1)))
a53b7a21 10567 arg1 = cast_from_fixed (type, arg1);
df407dfe 10568 if (ada_is_fixed_point_type (value_type (arg2)))
a53b7a21 10569 arg2 = cast_from_fixed (type, arg2);
f44316fa 10570 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
4c4b4cd2
PH
10571 return ada_value_binop (arg1, arg2, op);
10572 }
10573
4c4b4cd2
PH
10574 case BINOP_EQUAL:
10575 case BINOP_NOTEQUAL:
14f9c5c9 10576 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
df407dfe 10577 arg2 = evaluate_subexp (value_type (arg1), exp, pos, noside);
14f9c5c9 10578 if (noside == EVAL_SKIP)
76a01679 10579 goto nosideret;
4c4b4cd2 10580 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 10581 tem = 0;
4c4b4cd2 10582 else
f44316fa
UW
10583 {
10584 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10585 tem = ada_value_equal (arg1, arg2);
10586 }
4c4b4cd2 10587 if (op == BINOP_NOTEQUAL)
76a01679 10588 tem = !tem;
fbb06eb1
UW
10589 type = language_bool_type (exp->language_defn, exp->gdbarch);
10590 return value_from_longest (type, (LONGEST) tem);
4c4b4cd2
PH
10591
10592 case UNOP_NEG:
10593 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10594 if (noside == EVAL_SKIP)
10595 goto nosideret;
df407dfe
AC
10596 else if (ada_is_fixed_point_type (value_type (arg1)))
10597 return value_cast (value_type (arg1), value_neg (arg1));
14f9c5c9 10598 else
f44316fa
UW
10599 {
10600 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
10601 return value_neg (arg1);
10602 }
4c4b4cd2 10603
2330c6c6
JB
10604 case BINOP_LOGICAL_AND:
10605 case BINOP_LOGICAL_OR:
10606 case UNOP_LOGICAL_NOT:
000d5124
JB
10607 {
10608 struct value *val;
10609
10610 *pos -= 1;
10611 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
fbb06eb1
UW
10612 type = language_bool_type (exp->language_defn, exp->gdbarch);
10613 return value_cast (type, val);
000d5124 10614 }
2330c6c6
JB
10615
10616 case BINOP_BITWISE_AND:
10617 case BINOP_BITWISE_IOR:
10618 case BINOP_BITWISE_XOR:
000d5124
JB
10619 {
10620 struct value *val;
10621
10622 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_AVOID_SIDE_EFFECTS);
10623 *pos = pc;
10624 val = evaluate_subexp_standard (expect_type, exp, pos, noside);
10625
10626 return value_cast (value_type (arg1), val);
10627 }
2330c6c6 10628
14f9c5c9
AS
10629 case OP_VAR_VALUE:
10630 *pos -= 1;
6799def4 10631
14f9c5c9 10632 if (noside == EVAL_SKIP)
4c4b4cd2
PH
10633 {
10634 *pos += 4;
10635 goto nosideret;
10636 }
da5c522f
JB
10637
10638 if (SYMBOL_DOMAIN (exp->elts[pc + 2].symbol) == UNDEF_DOMAIN)
76a01679
JB
10639 /* Only encountered when an unresolved symbol occurs in a
10640 context other than a function call, in which case, it is
52ce6436 10641 invalid. */
323e0a4a 10642 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2 10643 SYMBOL_PRINT_NAME (exp->elts[pc + 2].symbol));
da5c522f
JB
10644
10645 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2 10646 {
0c1f74cf 10647 type = static_unwrap_type (SYMBOL_TYPE (exp->elts[pc + 2].symbol));
31dbc1c5
JB
10648 /* Check to see if this is a tagged type. We also need to handle
10649 the case where the type is a reference to a tagged type, but
10650 we have to be careful to exclude pointers to tagged types.
10651 The latter should be shown as usual (as a pointer), whereas
10652 a reference should mostly be transparent to the user. */
10653 if (ada_is_tagged_type (type, 0)
023db19c 10654 || (TYPE_CODE (type) == TYPE_CODE_REF
31dbc1c5 10655 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0)))
0d72a7c3
JB
10656 {
10657 /* Tagged types are a little special in the fact that the real
10658 type is dynamic and can only be determined by inspecting the
10659 object's tag. This means that we need to get the object's
10660 value first (EVAL_NORMAL) and then extract the actual object
10661 type from its tag.
10662
10663 Note that we cannot skip the final step where we extract
10664 the object type from its tag, because the EVAL_NORMAL phase
10665 results in dynamic components being resolved into fixed ones.
10666 This can cause problems when trying to print the type
10667 description of tagged types whose parent has a dynamic size:
10668 We use the type name of the "_parent" component in order
10669 to print the name of the ancestor type in the type description.
10670 If that component had a dynamic size, the resolution into
10671 a fixed type would result in the loss of that type name,
10672 thus preventing us from printing the name of the ancestor
10673 type in the type description. */
10674 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, EVAL_NORMAL);
10675
10676 if (TYPE_CODE (type) != TYPE_CODE_REF)
10677 {
10678 struct type *actual_type;
10679
10680 actual_type = type_from_tag (ada_value_tag (arg1));
10681 if (actual_type == NULL)
10682 /* If, for some reason, we were unable to determine
10683 the actual type from the tag, then use the static
10684 approximation that we just computed as a fallback.
10685 This can happen if the debugging information is
10686 incomplete, for instance. */
10687 actual_type = type;
10688 return value_zero (actual_type, not_lval);
10689 }
10690 else
10691 {
10692 /* In the case of a ref, ada_coerce_ref takes care
10693 of determining the actual type. But the evaluation
10694 should return a ref as it should be valid to ask
10695 for its address; so rebuild a ref after coerce. */
10696 arg1 = ada_coerce_ref (arg1);
a65cfae5 10697 return value_ref (arg1, TYPE_CODE_REF);
0d72a7c3
JB
10698 }
10699 }
0c1f74cf 10700
84754697
JB
10701 /* Records and unions for which GNAT encodings have been
10702 generated need to be statically fixed as well.
10703 Otherwise, non-static fixing produces a type where
10704 all dynamic properties are removed, which prevents "ptype"
10705 from being able to completely describe the type.
10706 For instance, a case statement in a variant record would be
10707 replaced by the relevant components based on the actual
10708 value of the discriminants. */
10709 if ((TYPE_CODE (type) == TYPE_CODE_STRUCT
10710 && dynamic_template_type (type) != NULL)
10711 || (TYPE_CODE (type) == TYPE_CODE_UNION
10712 && ada_find_parallel_type (type, "___XVU") != NULL))
10713 {
10714 *pos += 4;
10715 return value_zero (to_static_fixed_type (type), not_lval);
10716 }
4c4b4cd2 10717 }
da5c522f
JB
10718
10719 arg1 = evaluate_subexp_standard (expect_type, exp, pos, noside);
10720 return ada_to_fixed_value (arg1);
4c4b4cd2
PH
10721
10722 case OP_FUNCALL:
10723 (*pos) += 2;
10724
10725 /* Allocate arg vector, including space for the function to be
10726 called in argvec[0] and a terminating NULL. */
10727 nargs = longest_to_int (exp->elts[pc + 1].longconst);
8d749320 10728 argvec = XALLOCAVEC (struct value *, nargs + 2);
4c4b4cd2
PH
10729
10730 if (exp->elts[*pos].opcode == OP_VAR_VALUE
76a01679 10731 && SYMBOL_DOMAIN (exp->elts[pc + 5].symbol) == UNDEF_DOMAIN)
323e0a4a 10732 error (_("Unexpected unresolved symbol, %s, during evaluation"),
4c4b4cd2
PH
10733 SYMBOL_PRINT_NAME (exp->elts[pc + 5].symbol));
10734 else
10735 {
10736 for (tem = 0; tem <= nargs; tem += 1)
10737 argvec[tem] = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10738 argvec[tem] = 0;
10739
10740 if (noside == EVAL_SKIP)
10741 goto nosideret;
10742 }
10743
ad82864c
JB
10744 if (ada_is_constrained_packed_array_type
10745 (desc_base_type (value_type (argvec[0]))))
4c4b4cd2 10746 argvec[0] = ada_coerce_to_simple_array (argvec[0]);
284614f0
JB
10747 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10748 && TYPE_FIELD_BITSIZE (value_type (argvec[0]), 0) != 0)
10749 /* This is a packed array that has already been fixed, and
10750 therefore already coerced to a simple array. Nothing further
10751 to do. */
10752 ;
e6c2c623
PMR
10753 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_REF)
10754 {
10755 /* Make sure we dereference references so that all the code below
10756 feels like it's really handling the referenced value. Wrapping
10757 types (for alignment) may be there, so make sure we strip them as
10758 well. */
10759 argvec[0] = ada_to_fixed_value (coerce_ref (argvec[0]));
10760 }
10761 else if (TYPE_CODE (value_type (argvec[0])) == TYPE_CODE_ARRAY
10762 && VALUE_LVAL (argvec[0]) == lval_memory)
10763 argvec[0] = value_addr (argvec[0]);
4c4b4cd2 10764
df407dfe 10765 type = ada_check_typedef (value_type (argvec[0]));
720d1a40
JB
10766
10767 /* Ada allows us to implicitly dereference arrays when subscripting
8f465ea7
JB
10768 them. So, if this is an array typedef (encoding use for array
10769 access types encoded as fat pointers), strip it now. */
720d1a40
JB
10770 if (TYPE_CODE (type) == TYPE_CODE_TYPEDEF)
10771 type = ada_typedef_target_type (type);
10772
4c4b4cd2
PH
10773 if (TYPE_CODE (type) == TYPE_CODE_PTR)
10774 {
61ee279c 10775 switch (TYPE_CODE (ada_check_typedef (TYPE_TARGET_TYPE (type))))
4c4b4cd2
PH
10776 {
10777 case TYPE_CODE_FUNC:
61ee279c 10778 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10779 break;
10780 case TYPE_CODE_ARRAY:
10781 break;
10782 case TYPE_CODE_STRUCT:
10783 if (noside != EVAL_AVOID_SIDE_EFFECTS)
10784 argvec[0] = ada_value_ind (argvec[0]);
61ee279c 10785 type = ada_check_typedef (TYPE_TARGET_TYPE (type));
4c4b4cd2
PH
10786 break;
10787 default:
323e0a4a 10788 error (_("cannot subscript or call something of type `%s'"),
df407dfe 10789 ada_type_name (value_type (argvec[0])));
4c4b4cd2
PH
10790 break;
10791 }
10792 }
10793
10794 switch (TYPE_CODE (type))
10795 {
10796 case TYPE_CODE_FUNC:
10797 if (noside == EVAL_AVOID_SIDE_EFFECTS)
c8ea1972 10798 {
7022349d
PA
10799 if (TYPE_TARGET_TYPE (type) == NULL)
10800 error_call_unknown_return_type (NULL);
10801 return allocate_value (TYPE_TARGET_TYPE (type));
c8ea1972 10802 }
e71585ff
PA
10803 return call_function_by_hand (argvec[0], NULL,
10804 gdb::make_array_view (argvec + 1,
10805 nargs));
c8ea1972
PH
10806 case TYPE_CODE_INTERNAL_FUNCTION:
10807 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10808 /* We don't know anything about what the internal
10809 function might return, but we have to return
10810 something. */
10811 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
10812 not_lval);
10813 else
10814 return call_internal_function (exp->gdbarch, exp->language_defn,
10815 argvec[0], nargs, argvec + 1);
10816
4c4b4cd2
PH
10817 case TYPE_CODE_STRUCT:
10818 {
10819 int arity;
10820
4c4b4cd2
PH
10821 arity = ada_array_arity (type);
10822 type = ada_array_element_type (type, nargs);
10823 if (type == NULL)
323e0a4a 10824 error (_("cannot subscript or call a record"));
4c4b4cd2 10825 if (arity != nargs)
323e0a4a 10826 error (_("wrong number of subscripts; expecting %d"), arity);
4c4b4cd2 10827 if (noside == EVAL_AVOID_SIDE_EFFECTS)
0a07e705 10828 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10829 return
10830 unwrap_value (ada_value_subscript
10831 (argvec[0], nargs, argvec + 1));
10832 }
10833 case TYPE_CODE_ARRAY:
10834 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10835 {
10836 type = ada_array_element_type (type, nargs);
10837 if (type == NULL)
323e0a4a 10838 error (_("element type of array unknown"));
4c4b4cd2 10839 else
0a07e705 10840 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10841 }
10842 return
10843 unwrap_value (ada_value_subscript
10844 (ada_coerce_to_simple_array (argvec[0]),
10845 nargs, argvec + 1));
10846 case TYPE_CODE_PTR: /* Pointer to array */
4c4b4cd2
PH
10847 if (noside == EVAL_AVOID_SIDE_EFFECTS)
10848 {
deede10c 10849 type = to_fixed_array_type (TYPE_TARGET_TYPE (type), NULL, 1);
4c4b4cd2
PH
10850 type = ada_array_element_type (type, nargs);
10851 if (type == NULL)
323e0a4a 10852 error (_("element type of array unknown"));
4c4b4cd2 10853 else
0a07e705 10854 return value_zero (ada_aligned_type (type), lval_memory);
4c4b4cd2
PH
10855 }
10856 return
deede10c
JB
10857 unwrap_value (ada_value_ptr_subscript (argvec[0],
10858 nargs, argvec + 1));
4c4b4cd2
PH
10859
10860 default:
e1d5a0d2
PH
10861 error (_("Attempt to index or call something other than an "
10862 "array or function"));
4c4b4cd2
PH
10863 }
10864
10865 case TERNOP_SLICE:
10866 {
10867 struct value *array = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10868 struct value *low_bound_val =
10869 evaluate_subexp (NULL_TYPE, exp, pos, noside);
714e53ab
PH
10870 struct value *high_bound_val =
10871 evaluate_subexp (NULL_TYPE, exp, pos, noside);
10872 LONGEST low_bound;
10873 LONGEST high_bound;
5b4ee69b 10874
994b9211
AC
10875 low_bound_val = coerce_ref (low_bound_val);
10876 high_bound_val = coerce_ref (high_bound_val);
aa715135
JG
10877 low_bound = value_as_long (low_bound_val);
10878 high_bound = value_as_long (high_bound_val);
963a6417 10879
4c4b4cd2
PH
10880 if (noside == EVAL_SKIP)
10881 goto nosideret;
10882
4c4b4cd2
PH
10883 /* If this is a reference to an aligner type, then remove all
10884 the aligners. */
df407dfe
AC
10885 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10886 && ada_is_aligner_type (TYPE_TARGET_TYPE (value_type (array))))
10887 TYPE_TARGET_TYPE (value_type (array)) =
10888 ada_aligned_type (TYPE_TARGET_TYPE (value_type (array)));
4c4b4cd2 10889
ad82864c 10890 if (ada_is_constrained_packed_array_type (value_type (array)))
323e0a4a 10891 error (_("cannot slice a packed array"));
4c4b4cd2
PH
10892
10893 /* If this is a reference to an array or an array lvalue,
10894 convert to a pointer. */
df407dfe
AC
10895 if (TYPE_CODE (value_type (array)) == TYPE_CODE_REF
10896 || (TYPE_CODE (value_type (array)) == TYPE_CODE_ARRAY
4c4b4cd2
PH
10897 && VALUE_LVAL (array) == lval_memory))
10898 array = value_addr (array);
10899
1265e4aa 10900 if (noside == EVAL_AVOID_SIDE_EFFECTS
61ee279c 10901 && ada_is_array_descriptor_type (ada_check_typedef
df407dfe 10902 (value_type (array))))
bff8c71f
TT
10903 return empty_array (ada_type_of_array (array, 0), low_bound,
10904 high_bound);
4c4b4cd2
PH
10905
10906 array = ada_coerce_to_simple_array_ptr (array);
10907
714e53ab
PH
10908 /* If we have more than one level of pointer indirection,
10909 dereference the value until we get only one level. */
df407dfe
AC
10910 while (TYPE_CODE (value_type (array)) == TYPE_CODE_PTR
10911 && (TYPE_CODE (TYPE_TARGET_TYPE (value_type (array)))
714e53ab
PH
10912 == TYPE_CODE_PTR))
10913 array = value_ind (array);
10914
10915 /* Make sure we really do have an array type before going further,
10916 to avoid a SEGV when trying to get the index type or the target
10917 type later down the road if the debug info generated by
10918 the compiler is incorrect or incomplete. */
df407dfe 10919 if (!ada_is_simple_array_type (value_type (array)))
323e0a4a 10920 error (_("cannot take slice of non-array"));
714e53ab 10921
828292f2
JB
10922 if (TYPE_CODE (ada_check_typedef (value_type (array)))
10923 == TYPE_CODE_PTR)
4c4b4cd2 10924 {
828292f2
JB
10925 struct type *type0 = ada_check_typedef (value_type (array));
10926
0b5d8877 10927 if (high_bound < low_bound || noside == EVAL_AVOID_SIDE_EFFECTS)
bff8c71f 10928 return empty_array (TYPE_TARGET_TYPE (type0), low_bound, high_bound);
4c4b4cd2
PH
10929 else
10930 {
10931 struct type *arr_type0 =
828292f2 10932 to_fixed_array_type (TYPE_TARGET_TYPE (type0), NULL, 1);
5b4ee69b 10933
f5938064
JG
10934 return ada_value_slice_from_ptr (array, arr_type0,
10935 longest_to_int (low_bound),
10936 longest_to_int (high_bound));
4c4b4cd2
PH
10937 }
10938 }
10939 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
10940 return array;
10941 else if (high_bound < low_bound)
bff8c71f 10942 return empty_array (value_type (array), low_bound, high_bound);
4c4b4cd2 10943 else
529cad9c
PH
10944 return ada_value_slice (array, longest_to_int (low_bound),
10945 longest_to_int (high_bound));
4c4b4cd2 10946 }
14f9c5c9 10947
4c4b4cd2
PH
10948 case UNOP_IN_RANGE:
10949 (*pos) += 2;
10950 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8008e265 10951 type = check_typedef (exp->elts[pc + 1].type);
14f9c5c9 10952
14f9c5c9 10953 if (noside == EVAL_SKIP)
4c4b4cd2 10954 goto nosideret;
14f9c5c9 10955
4c4b4cd2
PH
10956 switch (TYPE_CODE (type))
10957 {
10958 default:
e1d5a0d2
PH
10959 lim_warning (_("Membership test incompletely implemented; "
10960 "always returns true"));
fbb06eb1
UW
10961 type = language_bool_type (exp->language_defn, exp->gdbarch);
10962 return value_from_longest (type, (LONGEST) 1);
4c4b4cd2
PH
10963
10964 case TYPE_CODE_RANGE:
030b4912
UW
10965 arg2 = value_from_longest (type, TYPE_LOW_BOUND (type));
10966 arg3 = value_from_longest (type, TYPE_HIGH_BOUND (type));
f44316fa
UW
10967 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
10968 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1
UW
10969 type = language_bool_type (exp->language_defn, exp->gdbarch);
10970 return
10971 value_from_longest (type,
4c4b4cd2
PH
10972 (value_less (arg1, arg3)
10973 || value_equal (arg1, arg3))
10974 && (value_less (arg2, arg1)
10975 || value_equal (arg2, arg1)));
10976 }
10977
10978 case BINOP_IN_BOUNDS:
14f9c5c9 10979 (*pos) += 2;
4c4b4cd2
PH
10980 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
10981 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 10982
4c4b4cd2
PH
10983 if (noside == EVAL_SKIP)
10984 goto nosideret;
14f9c5c9 10985
4c4b4cd2 10986 if (noside == EVAL_AVOID_SIDE_EFFECTS)
fbb06eb1
UW
10987 {
10988 type = language_bool_type (exp->language_defn, exp->gdbarch);
10989 return value_zero (type, not_lval);
10990 }
14f9c5c9 10991
4c4b4cd2 10992 tem = longest_to_int (exp->elts[pc + 1].longconst);
14f9c5c9 10993
1eea4ebd
UW
10994 type = ada_index_type (value_type (arg2), tem, "range");
10995 if (!type)
10996 type = value_type (arg1);
14f9c5c9 10997
1eea4ebd
UW
10998 arg3 = value_from_longest (type, ada_array_bound (arg2, tem, 1));
10999 arg2 = value_from_longest (type, ada_array_bound (arg2, tem, 0));
d2e4a39e 11000
f44316fa
UW
11001 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11002 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 11003 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 11004 return
fbb06eb1 11005 value_from_longest (type,
4c4b4cd2
PH
11006 (value_less (arg1, arg3)
11007 || value_equal (arg1, arg3))
11008 && (value_less (arg2, arg1)
11009 || value_equal (arg2, arg1)));
11010
11011 case TERNOP_IN_RANGE:
11012 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11013 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11014 arg3 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11015
11016 if (noside == EVAL_SKIP)
11017 goto nosideret;
11018
f44316fa
UW
11019 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11020 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg3);
fbb06eb1 11021 type = language_bool_type (exp->language_defn, exp->gdbarch);
4c4b4cd2 11022 return
fbb06eb1 11023 value_from_longest (type,
4c4b4cd2
PH
11024 (value_less (arg1, arg3)
11025 || value_equal (arg1, arg3))
11026 && (value_less (arg2, arg1)
11027 || value_equal (arg2, arg1)));
11028
11029 case OP_ATR_FIRST:
11030 case OP_ATR_LAST:
11031 case OP_ATR_LENGTH:
11032 {
76a01679 11033 struct type *type_arg;
5b4ee69b 11034
76a01679
JB
11035 if (exp->elts[*pos].opcode == OP_TYPE)
11036 {
11037 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
11038 arg1 = NULL;
5bc23cb3 11039 type_arg = check_typedef (exp->elts[pc + 2].type);
76a01679
JB
11040 }
11041 else
11042 {
11043 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11044 type_arg = NULL;
11045 }
11046
11047 if (exp->elts[*pos].opcode != OP_LONG)
323e0a4a 11048 error (_("Invalid operand to '%s"), ada_attribute_name (op));
76a01679
JB
11049 tem = longest_to_int (exp->elts[*pos + 2].longconst);
11050 *pos += 4;
11051
11052 if (noside == EVAL_SKIP)
11053 goto nosideret;
680e1bee
TT
11054 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
11055 {
11056 if (type_arg == NULL)
11057 type_arg = value_type (arg1);
76a01679 11058
680e1bee
TT
11059 if (ada_is_constrained_packed_array_type (type_arg))
11060 type_arg = decode_constrained_packed_array_type (type_arg);
11061
11062 if (!discrete_type_p (type_arg))
11063 {
11064 switch (op)
11065 {
11066 default: /* Should never happen. */
11067 error (_("unexpected attribute encountered"));
11068 case OP_ATR_FIRST:
11069 case OP_ATR_LAST:
11070 type_arg = ada_index_type (type_arg, tem,
11071 ada_attribute_name (op));
11072 break;
11073 case OP_ATR_LENGTH:
11074 type_arg = builtin_type (exp->gdbarch)->builtin_int;
11075 break;
11076 }
11077 }
11078
11079 return value_zero (type_arg, not_lval);
11080 }
11081 else if (type_arg == NULL)
76a01679
JB
11082 {
11083 arg1 = ada_coerce_ref (arg1);
11084
ad82864c 11085 if (ada_is_constrained_packed_array_type (value_type (arg1)))
76a01679
JB
11086 arg1 = ada_coerce_to_simple_array (arg1);
11087
aa4fb036 11088 if (op == OP_ATR_LENGTH)
1eea4ebd 11089 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11090 else
11091 {
11092 type = ada_index_type (value_type (arg1), tem,
11093 ada_attribute_name (op));
11094 if (type == NULL)
11095 type = builtin_type (exp->gdbarch)->builtin_int;
11096 }
76a01679 11097
76a01679
JB
11098 switch (op)
11099 {
11100 default: /* Should never happen. */
323e0a4a 11101 error (_("unexpected attribute encountered"));
76a01679 11102 case OP_ATR_FIRST:
1eea4ebd
UW
11103 return value_from_longest
11104 (type, ada_array_bound (arg1, tem, 0));
76a01679 11105 case OP_ATR_LAST:
1eea4ebd
UW
11106 return value_from_longest
11107 (type, ada_array_bound (arg1, tem, 1));
76a01679 11108 case OP_ATR_LENGTH:
1eea4ebd
UW
11109 return value_from_longest
11110 (type, ada_array_length (arg1, tem));
76a01679
JB
11111 }
11112 }
11113 else if (discrete_type_p (type_arg))
11114 {
11115 struct type *range_type;
0d5cff50 11116 const char *name = ada_type_name (type_arg);
5b4ee69b 11117
76a01679
JB
11118 range_type = NULL;
11119 if (name != NULL && TYPE_CODE (type_arg) != TYPE_CODE_ENUM)
28c85d6c 11120 range_type = to_fixed_range_type (type_arg, NULL);
76a01679
JB
11121 if (range_type == NULL)
11122 range_type = type_arg;
11123 switch (op)
11124 {
11125 default:
323e0a4a 11126 error (_("unexpected attribute encountered"));
76a01679 11127 case OP_ATR_FIRST:
690cc4eb 11128 return value_from_longest
43bbcdc2 11129 (range_type, ada_discrete_type_low_bound (range_type));
76a01679 11130 case OP_ATR_LAST:
690cc4eb 11131 return value_from_longest
43bbcdc2 11132 (range_type, ada_discrete_type_high_bound (range_type));
76a01679 11133 case OP_ATR_LENGTH:
323e0a4a 11134 error (_("the 'length attribute applies only to array types"));
76a01679
JB
11135 }
11136 }
11137 else if (TYPE_CODE (type_arg) == TYPE_CODE_FLT)
323e0a4a 11138 error (_("unimplemented type attribute"));
76a01679
JB
11139 else
11140 {
11141 LONGEST low, high;
11142
ad82864c
JB
11143 if (ada_is_constrained_packed_array_type (type_arg))
11144 type_arg = decode_constrained_packed_array_type (type_arg);
76a01679 11145
aa4fb036 11146 if (op == OP_ATR_LENGTH)
1eea4ebd 11147 type = builtin_type (exp->gdbarch)->builtin_int;
aa4fb036
JB
11148 else
11149 {
11150 type = ada_index_type (type_arg, tem, ada_attribute_name (op));
11151 if (type == NULL)
11152 type = builtin_type (exp->gdbarch)->builtin_int;
11153 }
1eea4ebd 11154
76a01679
JB
11155 switch (op)
11156 {
11157 default:
323e0a4a 11158 error (_("unexpected attribute encountered"));
76a01679 11159 case OP_ATR_FIRST:
1eea4ebd 11160 low = ada_array_bound_from_type (type_arg, tem, 0);
76a01679
JB
11161 return value_from_longest (type, low);
11162 case OP_ATR_LAST:
1eea4ebd 11163 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11164 return value_from_longest (type, high);
11165 case OP_ATR_LENGTH:
1eea4ebd
UW
11166 low = ada_array_bound_from_type (type_arg, tem, 0);
11167 high = ada_array_bound_from_type (type_arg, tem, 1);
76a01679
JB
11168 return value_from_longest (type, high - low + 1);
11169 }
11170 }
14f9c5c9
AS
11171 }
11172
4c4b4cd2
PH
11173 case OP_ATR_TAG:
11174 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11175 if (noside == EVAL_SKIP)
76a01679 11176 goto nosideret;
4c4b4cd2
PH
11177
11178 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11179 return value_zero (ada_tag_type (arg1), not_lval);
4c4b4cd2
PH
11180
11181 return ada_value_tag (arg1);
11182
11183 case OP_ATR_MIN:
11184 case OP_ATR_MAX:
11185 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11186 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11187 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11188 if (noside == EVAL_SKIP)
76a01679 11189 goto nosideret;
d2e4a39e 11190 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11191 return value_zero (value_type (arg1), not_lval);
14f9c5c9 11192 else
f44316fa
UW
11193 {
11194 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11195 return value_binop (arg1, arg2,
11196 op == OP_ATR_MIN ? BINOP_MIN : BINOP_MAX);
11197 }
14f9c5c9 11198
4c4b4cd2
PH
11199 case OP_ATR_MODULUS:
11200 {
31dedfee 11201 struct type *type_arg = check_typedef (exp->elts[pc + 2].type);
4c4b4cd2 11202
5b4ee69b 11203 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
76a01679
JB
11204 if (noside == EVAL_SKIP)
11205 goto nosideret;
4c4b4cd2 11206
76a01679 11207 if (!ada_is_modular_type (type_arg))
323e0a4a 11208 error (_("'modulus must be applied to modular type"));
4c4b4cd2 11209
76a01679
JB
11210 return value_from_longest (TYPE_TARGET_TYPE (type_arg),
11211 ada_modulus (type_arg));
4c4b4cd2
PH
11212 }
11213
11214
11215 case OP_ATR_POS:
11216 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9
AS
11217 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11218 if (noside == EVAL_SKIP)
76a01679 11219 goto nosideret;
3cb382c9
UW
11220 type = builtin_type (exp->gdbarch)->builtin_int;
11221 if (noside == EVAL_AVOID_SIDE_EFFECTS)
11222 return value_zero (type, not_lval);
14f9c5c9 11223 else
3cb382c9 11224 return value_pos_atr (type, arg1);
14f9c5c9 11225
4c4b4cd2
PH
11226 case OP_ATR_SIZE:
11227 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
8c1c099f
JB
11228 type = value_type (arg1);
11229
11230 /* If the argument is a reference, then dereference its type, since
11231 the user is really asking for the size of the actual object,
11232 not the size of the pointer. */
11233 if (TYPE_CODE (type) == TYPE_CODE_REF)
11234 type = TYPE_TARGET_TYPE (type);
11235
4c4b4cd2 11236 if (noside == EVAL_SKIP)
76a01679 11237 goto nosideret;
4c4b4cd2 11238 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
22601c15 11239 return value_zero (builtin_type (exp->gdbarch)->builtin_int, not_lval);
4c4b4cd2 11240 else
22601c15 11241 return value_from_longest (builtin_type (exp->gdbarch)->builtin_int,
8c1c099f 11242 TARGET_CHAR_BIT * TYPE_LENGTH (type));
4c4b4cd2
PH
11243
11244 case OP_ATR_VAL:
11245 evaluate_subexp (NULL_TYPE, exp, pos, EVAL_SKIP);
14f9c5c9 11246 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
4c4b4cd2 11247 type = exp->elts[pc + 2].type;
14f9c5c9 11248 if (noside == EVAL_SKIP)
76a01679 11249 goto nosideret;
4c4b4cd2 11250 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11251 return value_zero (type, not_lval);
4c4b4cd2 11252 else
76a01679 11253 return value_val_atr (type, arg1);
4c4b4cd2
PH
11254
11255 case BINOP_EXP:
11256 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11257 arg2 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11258 if (noside == EVAL_SKIP)
11259 goto nosideret;
11260 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
df407dfe 11261 return value_zero (value_type (arg1), not_lval);
4c4b4cd2 11262 else
f44316fa
UW
11263 {
11264 /* For integer exponentiation operations,
11265 only promote the first argument. */
11266 if (is_integral_type (value_type (arg2)))
11267 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
11268 else
11269 binop_promote (exp->language_defn, exp->gdbarch, &arg1, &arg2);
11270
11271 return value_binop (arg1, arg2, op);
11272 }
4c4b4cd2
PH
11273
11274 case UNOP_PLUS:
11275 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11276 if (noside == EVAL_SKIP)
11277 goto nosideret;
11278 else
11279 return arg1;
11280
11281 case UNOP_ABS:
11282 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11283 if (noside == EVAL_SKIP)
11284 goto nosideret;
f44316fa 11285 unop_promote (exp->language_defn, exp->gdbarch, &arg1);
df407dfe 11286 if (value_less (arg1, value_zero (value_type (arg1), not_lval)))
4c4b4cd2 11287 return value_neg (arg1);
14f9c5c9 11288 else
4c4b4cd2 11289 return arg1;
14f9c5c9
AS
11290
11291 case UNOP_IND:
5ec18f2b 11292 preeval_pos = *pos;
6b0d7253 11293 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
14f9c5c9 11294 if (noside == EVAL_SKIP)
4c4b4cd2 11295 goto nosideret;
df407dfe 11296 type = ada_check_typedef (value_type (arg1));
14f9c5c9 11297 if (noside == EVAL_AVOID_SIDE_EFFECTS)
4c4b4cd2
PH
11298 {
11299 if (ada_is_array_descriptor_type (type))
11300 /* GDB allows dereferencing GNAT array descriptors. */
11301 {
11302 struct type *arrType = ada_type_of_array (arg1, 0);
5b4ee69b 11303
4c4b4cd2 11304 if (arrType == NULL)
323e0a4a 11305 error (_("Attempt to dereference null array pointer."));
00a4c844 11306 return value_at_lazy (arrType, 0);
4c4b4cd2
PH
11307 }
11308 else if (TYPE_CODE (type) == TYPE_CODE_PTR
11309 || TYPE_CODE (type) == TYPE_CODE_REF
11310 /* In C you can dereference an array to get the 1st elt. */
11311 || TYPE_CODE (type) == TYPE_CODE_ARRAY)
714e53ab 11312 {
5ec18f2b
JG
11313 /* As mentioned in the OP_VAR_VALUE case, tagged types can
11314 only be determined by inspecting the object's tag.
11315 This means that we need to evaluate completely the
11316 expression in order to get its type. */
11317
023db19c
JB
11318 if ((TYPE_CODE (type) == TYPE_CODE_REF
11319 || TYPE_CODE (type) == TYPE_CODE_PTR)
5ec18f2b
JG
11320 && ada_is_tagged_type (TYPE_TARGET_TYPE (type), 0))
11321 {
11322 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11323 EVAL_NORMAL);
11324 type = value_type (ada_value_ind (arg1));
11325 }
11326 else
11327 {
11328 type = to_static_fixed_type
11329 (ada_aligned_type
11330 (ada_check_typedef (TYPE_TARGET_TYPE (type))));
11331 }
c1b5a1a6 11332 ada_ensure_varsize_limit (type);
714e53ab
PH
11333 return value_zero (type, lval_memory);
11334 }
4c4b4cd2 11335 else if (TYPE_CODE (type) == TYPE_CODE_INT)
6b0d7253
JB
11336 {
11337 /* GDB allows dereferencing an int. */
11338 if (expect_type == NULL)
11339 return value_zero (builtin_type (exp->gdbarch)->builtin_int,
11340 lval_memory);
11341 else
11342 {
11343 expect_type =
11344 to_static_fixed_type (ada_aligned_type (expect_type));
11345 return value_zero (expect_type, lval_memory);
11346 }
11347 }
4c4b4cd2 11348 else
323e0a4a 11349 error (_("Attempt to take contents of a non-pointer value."));
4c4b4cd2 11350 }
0963b4bd 11351 arg1 = ada_coerce_ref (arg1); /* FIXME: What is this for?? */
df407dfe 11352 type = ada_check_typedef (value_type (arg1));
d2e4a39e 11353
96967637
JB
11354 if (TYPE_CODE (type) == TYPE_CODE_INT)
11355 /* GDB allows dereferencing an int. If we were given
11356 the expect_type, then use that as the target type.
11357 Otherwise, assume that the target type is an int. */
11358 {
11359 if (expect_type != NULL)
11360 return ada_value_ind (value_cast (lookup_pointer_type (expect_type),
11361 arg1));
11362 else
11363 return value_at_lazy (builtin_type (exp->gdbarch)->builtin_int,
11364 (CORE_ADDR) value_as_address (arg1));
11365 }
6b0d7253 11366
4c4b4cd2
PH
11367 if (ada_is_array_descriptor_type (type))
11368 /* GDB allows dereferencing GNAT array descriptors. */
11369 return ada_coerce_to_simple_array (arg1);
14f9c5c9 11370 else
4c4b4cd2 11371 return ada_value_ind (arg1);
14f9c5c9
AS
11372
11373 case STRUCTOP_STRUCT:
11374 tem = longest_to_int (exp->elts[pc + 1].longconst);
11375 (*pos) += 3 + BYTES_TO_EXP_ELEM (tem + 1);
5ec18f2b 11376 preeval_pos = *pos;
14f9c5c9
AS
11377 arg1 = evaluate_subexp (NULL_TYPE, exp, pos, noside);
11378 if (noside == EVAL_SKIP)
4c4b4cd2 11379 goto nosideret;
14f9c5c9 11380 if (noside == EVAL_AVOID_SIDE_EFFECTS)
76a01679 11381 {
df407dfe 11382 struct type *type1 = value_type (arg1);
5b4ee69b 11383
76a01679
JB
11384 if (ada_is_tagged_type (type1, 1))
11385 {
11386 type = ada_lookup_struct_elt_type (type1,
11387 &exp->elts[pc + 2].string,
988f6b3d 11388 1, 1);
5ec18f2b
JG
11389
11390 /* If the field is not found, check if it exists in the
11391 extension of this object's type. This means that we
11392 need to evaluate completely the expression. */
11393
76a01679 11394 if (type == NULL)
5ec18f2b
JG
11395 {
11396 arg1 = evaluate_subexp (NULL_TYPE, exp, &preeval_pos,
11397 EVAL_NORMAL);
11398 arg1 = ada_value_struct_elt (arg1,
11399 &exp->elts[pc + 2].string,
11400 0);
11401 arg1 = unwrap_value (arg1);
11402 type = value_type (ada_to_fixed_value (arg1));
11403 }
76a01679
JB
11404 }
11405 else
11406 type =
11407 ada_lookup_struct_elt_type (type1, &exp->elts[pc + 2].string, 1,
988f6b3d 11408 0);
76a01679
JB
11409
11410 return value_zero (ada_aligned_type (type), lval_memory);
11411 }
14f9c5c9 11412 else
a579cd9a
MW
11413 {
11414 arg1 = ada_value_struct_elt (arg1, &exp->elts[pc + 2].string, 0);
11415 arg1 = unwrap_value (arg1);
11416 return ada_to_fixed_value (arg1);
11417 }
284614f0 11418
14f9c5c9 11419 case OP_TYPE:
4c4b4cd2
PH
11420 /* The value is not supposed to be used. This is here to make it
11421 easier to accommodate expressions that contain types. */
14f9c5c9
AS
11422 (*pos) += 2;
11423 if (noside == EVAL_SKIP)
4c4b4cd2 11424 goto nosideret;
14f9c5c9 11425 else if (noside == EVAL_AVOID_SIDE_EFFECTS)
a6cfbe68 11426 return allocate_value (exp->elts[pc + 1].type);
14f9c5c9 11427 else
323e0a4a 11428 error (_("Attempt to use a type name as an expression"));
52ce6436
PH
11429
11430 case OP_AGGREGATE:
11431 case OP_CHOICES:
11432 case OP_OTHERS:
11433 case OP_DISCRETE_RANGE:
11434 case OP_POSITIONAL:
11435 case OP_NAME:
11436 if (noside == EVAL_NORMAL)
11437 switch (op)
11438 {
11439 case OP_NAME:
11440 error (_("Undefined name, ambiguous name, or renaming used in "
e1d5a0d2 11441 "component association: %s."), &exp->elts[pc+2].string);
52ce6436
PH
11442 case OP_AGGREGATE:
11443 error (_("Aggregates only allowed on the right of an assignment"));
11444 default:
0963b4bd
MS
11445 internal_error (__FILE__, __LINE__,
11446 _("aggregate apparently mangled"));
52ce6436
PH
11447 }
11448
11449 ada_forward_operator_length (exp, pc, &oplen, &nargs);
11450 *pos += oplen - 1;
11451 for (tem = 0; tem < nargs; tem += 1)
11452 ada_evaluate_subexp (NULL, exp, pos, noside);
11453 goto nosideret;
14f9c5c9
AS
11454 }
11455
11456nosideret:
ced9779b 11457 return eval_skip_value (exp);
14f9c5c9 11458}
14f9c5c9 11459\f
d2e4a39e 11460
4c4b4cd2 11461 /* Fixed point */
14f9c5c9
AS
11462
11463/* If TYPE encodes an Ada fixed-point type, return the suffix of the
11464 type name that encodes the 'small and 'delta information.
4c4b4cd2 11465 Otherwise, return NULL. */
14f9c5c9 11466
d2e4a39e 11467static const char *
ebf56fd3 11468fixed_type_info (struct type *type)
14f9c5c9 11469{
d2e4a39e 11470 const char *name = ada_type_name (type);
14f9c5c9
AS
11471 enum type_code code = (type == NULL) ? TYPE_CODE_UNDEF : TYPE_CODE (type);
11472
d2e4a39e
AS
11473 if ((code == TYPE_CODE_INT || code == TYPE_CODE_RANGE) && name != NULL)
11474 {
14f9c5c9 11475 const char *tail = strstr (name, "___XF_");
5b4ee69b 11476
14f9c5c9 11477 if (tail == NULL)
4c4b4cd2 11478 return NULL;
d2e4a39e 11479 else
4c4b4cd2 11480 return tail + 5;
14f9c5c9
AS
11481 }
11482 else if (code == TYPE_CODE_RANGE && TYPE_TARGET_TYPE (type) != type)
11483 return fixed_type_info (TYPE_TARGET_TYPE (type));
11484 else
11485 return NULL;
11486}
11487
4c4b4cd2 11488/* Returns non-zero iff TYPE represents an Ada fixed-point type. */
14f9c5c9
AS
11489
11490int
ebf56fd3 11491ada_is_fixed_point_type (struct type *type)
14f9c5c9
AS
11492{
11493 return fixed_type_info (type) != NULL;
11494}
11495
4c4b4cd2
PH
11496/* Return non-zero iff TYPE represents a System.Address type. */
11497
11498int
11499ada_is_system_address_type (struct type *type)
11500{
11501 return (TYPE_NAME (type)
11502 && strcmp (TYPE_NAME (type), "system__address") == 0);
11503}
11504
14f9c5c9 11505/* Assuming that TYPE is the representation of an Ada fixed-point
50eff16b
UW
11506 type, return the target floating-point type to be used to represent
11507 of this type during internal computation. */
11508
11509static struct type *
11510ada_scaling_type (struct type *type)
11511{
11512 return builtin_type (get_type_arch (type))->builtin_long_double;
11513}
11514
11515/* Assuming that TYPE is the representation of an Ada fixed-point
11516 type, return its delta, or NULL if the type is malformed and the
4c4b4cd2 11517 delta cannot be determined. */
14f9c5c9 11518
50eff16b 11519struct value *
ebf56fd3 11520ada_delta (struct type *type)
14f9c5c9
AS
11521{
11522 const char *encoding = fixed_type_info (type);
50eff16b
UW
11523 struct type *scale_type = ada_scaling_type (type);
11524
11525 long long num, den;
11526
11527 if (sscanf (encoding, "_%lld_%lld", &num, &den) < 2)
11528 return nullptr;
d2e4a39e 11529 else
50eff16b
UW
11530 return value_binop (value_from_longest (scale_type, num),
11531 value_from_longest (scale_type, den), BINOP_DIV);
14f9c5c9
AS
11532}
11533
11534/* Assuming that ada_is_fixed_point_type (TYPE), return the scaling
4c4b4cd2 11535 factor ('SMALL value) associated with the type. */
14f9c5c9 11536
50eff16b
UW
11537struct value *
11538ada_scaling_factor (struct type *type)
14f9c5c9
AS
11539{
11540 const char *encoding = fixed_type_info (type);
50eff16b
UW
11541 struct type *scale_type = ada_scaling_type (type);
11542
11543 long long num0, den0, num1, den1;
14f9c5c9 11544 int n;
d2e4a39e 11545
50eff16b 11546 n = sscanf (encoding, "_%lld_%lld_%lld_%lld",
facc390f 11547 &num0, &den0, &num1, &den1);
14f9c5c9
AS
11548
11549 if (n < 2)
50eff16b 11550 return value_from_longest (scale_type, 1);
14f9c5c9 11551 else if (n == 4)
50eff16b
UW
11552 return value_binop (value_from_longest (scale_type, num1),
11553 value_from_longest (scale_type, den1), BINOP_DIV);
d2e4a39e 11554 else
50eff16b
UW
11555 return value_binop (value_from_longest (scale_type, num0),
11556 value_from_longest (scale_type, den0), BINOP_DIV);
14f9c5c9
AS
11557}
11558
14f9c5c9 11559\f
d2e4a39e 11560
4c4b4cd2 11561 /* Range types */
14f9c5c9
AS
11562
11563/* Scan STR beginning at position K for a discriminant name, and
11564 return the value of that discriminant field of DVAL in *PX. If
11565 PNEW_K is not null, put the position of the character beyond the
11566 name scanned in *PNEW_K. Return 1 if successful; return 0 and do
4c4b4cd2 11567 not alter *PX and *PNEW_K if unsuccessful. */
14f9c5c9
AS
11568
11569static int
108d56a4 11570scan_discrim_bound (const char *str, int k, struct value *dval, LONGEST * px,
76a01679 11571 int *pnew_k)
14f9c5c9
AS
11572{
11573 static char *bound_buffer = NULL;
11574 static size_t bound_buffer_len = 0;
5da1a4d3 11575 const char *pstart, *pend, *bound;
d2e4a39e 11576 struct value *bound_val;
14f9c5c9
AS
11577
11578 if (dval == NULL || str == NULL || str[k] == '\0')
11579 return 0;
11580
5da1a4d3
SM
11581 pstart = str + k;
11582 pend = strstr (pstart, "__");
14f9c5c9
AS
11583 if (pend == NULL)
11584 {
5da1a4d3 11585 bound = pstart;
14f9c5c9
AS
11586 k += strlen (bound);
11587 }
d2e4a39e 11588 else
14f9c5c9 11589 {
5da1a4d3
SM
11590 int len = pend - pstart;
11591
11592 /* Strip __ and beyond. */
11593 GROW_VECT (bound_buffer, bound_buffer_len, len + 1);
11594 strncpy (bound_buffer, pstart, len);
11595 bound_buffer[len] = '\0';
11596
14f9c5c9 11597 bound = bound_buffer;
d2e4a39e 11598 k = pend - str;
14f9c5c9 11599 }
d2e4a39e 11600
df407dfe 11601 bound_val = ada_search_struct_field (bound, dval, 0, value_type (dval));
14f9c5c9
AS
11602 if (bound_val == NULL)
11603 return 0;
11604
11605 *px = value_as_long (bound_val);
11606 if (pnew_k != NULL)
11607 *pnew_k = k;
11608 return 1;
11609}
11610
11611/* Value of variable named NAME in the current environment. If
11612 no such variable found, then if ERR_MSG is null, returns 0, and
4c4b4cd2
PH
11613 otherwise causes an error with message ERR_MSG. */
11614
d2e4a39e 11615static struct value *
edb0c9cb 11616get_var_value (const char *name, const char *err_msg)
14f9c5c9 11617{
b5ec771e 11618 lookup_name_info lookup_name (name, symbol_name_match_type::FULL);
14f9c5c9 11619
54d343a2 11620 std::vector<struct block_symbol> syms;
b5ec771e
PA
11621 int nsyms = ada_lookup_symbol_list_worker (lookup_name,
11622 get_selected_block (0),
11623 VAR_DOMAIN, &syms, 1);
14f9c5c9
AS
11624
11625 if (nsyms != 1)
11626 {
11627 if (err_msg == NULL)
4c4b4cd2 11628 return 0;
14f9c5c9 11629 else
8a3fe4f8 11630 error (("%s"), err_msg);
14f9c5c9
AS
11631 }
11632
54d343a2 11633 return value_of_variable (syms[0].symbol, syms[0].block);
14f9c5c9 11634}
d2e4a39e 11635
edb0c9cb
PA
11636/* Value of integer variable named NAME in the current environment.
11637 If no such variable is found, returns false. Otherwise, sets VALUE
11638 to the variable's value and returns true. */
4c4b4cd2 11639
edb0c9cb
PA
11640bool
11641get_int_var_value (const char *name, LONGEST &value)
14f9c5c9 11642{
4c4b4cd2 11643 struct value *var_val = get_var_value (name, 0);
d2e4a39e 11644
14f9c5c9 11645 if (var_val == 0)
edb0c9cb
PA
11646 return false;
11647
11648 value = value_as_long (var_val);
11649 return true;
14f9c5c9 11650}
d2e4a39e 11651
14f9c5c9
AS
11652
11653/* Return a range type whose base type is that of the range type named
11654 NAME in the current environment, and whose bounds are calculated
4c4b4cd2 11655 from NAME according to the GNAT range encoding conventions.
1ce677a4
UW
11656 Extract discriminant values, if needed, from DVAL. ORIG_TYPE is the
11657 corresponding range type from debug information; fall back to using it
11658 if symbol lookup fails. If a new type must be created, allocate it
11659 like ORIG_TYPE was. The bounds information, in general, is encoded
11660 in NAME, the base type given in the named range type. */
14f9c5c9 11661
d2e4a39e 11662static struct type *
28c85d6c 11663to_fixed_range_type (struct type *raw_type, struct value *dval)
14f9c5c9 11664{
0d5cff50 11665 const char *name;
14f9c5c9 11666 struct type *base_type;
108d56a4 11667 const char *subtype_info;
14f9c5c9 11668
28c85d6c
JB
11669 gdb_assert (raw_type != NULL);
11670 gdb_assert (TYPE_NAME (raw_type) != NULL);
dddfab26 11671
1ce677a4 11672 if (TYPE_CODE (raw_type) == TYPE_CODE_RANGE)
14f9c5c9
AS
11673 base_type = TYPE_TARGET_TYPE (raw_type);
11674 else
11675 base_type = raw_type;
11676
28c85d6c 11677 name = TYPE_NAME (raw_type);
14f9c5c9
AS
11678 subtype_info = strstr (name, "___XD");
11679 if (subtype_info == NULL)
690cc4eb 11680 {
43bbcdc2
PH
11681 LONGEST L = ada_discrete_type_low_bound (raw_type);
11682 LONGEST U = ada_discrete_type_high_bound (raw_type);
5b4ee69b 11683
690cc4eb
PH
11684 if (L < INT_MIN || U > INT_MAX)
11685 return raw_type;
11686 else
0c9c3474
SA
11687 return create_static_range_type (alloc_type_copy (raw_type), raw_type,
11688 L, U);
690cc4eb 11689 }
14f9c5c9
AS
11690 else
11691 {
11692 static char *name_buf = NULL;
11693 static size_t name_len = 0;
11694 int prefix_len = subtype_info - name;
11695 LONGEST L, U;
11696 struct type *type;
108d56a4 11697 const char *bounds_str;
14f9c5c9
AS
11698 int n;
11699
11700 GROW_VECT (name_buf, name_len, prefix_len + 5);
11701 strncpy (name_buf, name, prefix_len);
11702 name_buf[prefix_len] = '\0';
11703
11704 subtype_info += 5;
11705 bounds_str = strchr (subtype_info, '_');
11706 n = 1;
11707
d2e4a39e 11708 if (*subtype_info == 'L')
4c4b4cd2
PH
11709 {
11710 if (!ada_scan_number (bounds_str, n, &L, &n)
11711 && !scan_discrim_bound (bounds_str, n, dval, &L, &n))
11712 return raw_type;
11713 if (bounds_str[n] == '_')
11714 n += 2;
0963b4bd 11715 else if (bounds_str[n] == '.') /* FIXME? SGI Workshop kludge. */
4c4b4cd2
PH
11716 n += 1;
11717 subtype_info += 1;
11718 }
d2e4a39e 11719 else
4c4b4cd2 11720 {
4c4b4cd2 11721 strcpy (name_buf + prefix_len, "___L");
edb0c9cb 11722 if (!get_int_var_value (name_buf, L))
4c4b4cd2 11723 {
323e0a4a 11724 lim_warning (_("Unknown lower bound, using 1."));
4c4b4cd2
PH
11725 L = 1;
11726 }
11727 }
14f9c5c9 11728
d2e4a39e 11729 if (*subtype_info == 'U')
4c4b4cd2
PH
11730 {
11731 if (!ada_scan_number (bounds_str, n, &U, &n)
11732 && !scan_discrim_bound (bounds_str, n, dval, &U, &n))
11733 return raw_type;
11734 }
d2e4a39e 11735 else
4c4b4cd2 11736 {
4c4b4cd2 11737 strcpy (name_buf + prefix_len, "___U");
edb0c9cb 11738 if (!get_int_var_value (name_buf, U))
4c4b4cd2 11739 {
323e0a4a 11740 lim_warning (_("Unknown upper bound, using %ld."), (long) L);
4c4b4cd2
PH
11741 U = L;
11742 }
11743 }
14f9c5c9 11744
0c9c3474
SA
11745 type = create_static_range_type (alloc_type_copy (raw_type),
11746 base_type, L, U);
f5a91472
JB
11747 /* create_static_range_type alters the resulting type's length
11748 to match the size of the base_type, which is not what we want.
11749 Set it back to the original range type's length. */
11750 TYPE_LENGTH (type) = TYPE_LENGTH (raw_type);
d2e4a39e 11751 TYPE_NAME (type) = name;
14f9c5c9
AS
11752 return type;
11753 }
11754}
11755
4c4b4cd2
PH
11756/* True iff NAME is the name of a range type. */
11757
14f9c5c9 11758int
d2e4a39e 11759ada_is_range_type_name (const char *name)
14f9c5c9
AS
11760{
11761 return (name != NULL && strstr (name, "___XD"));
d2e4a39e 11762}
14f9c5c9 11763\f
d2e4a39e 11764
4c4b4cd2
PH
11765 /* Modular types */
11766
11767/* True iff TYPE is an Ada modular type. */
14f9c5c9 11768
14f9c5c9 11769int
d2e4a39e 11770ada_is_modular_type (struct type *type)
14f9c5c9 11771{
18af8284 11772 struct type *subranged_type = get_base_type (type);
14f9c5c9
AS
11773
11774 return (subranged_type != NULL && TYPE_CODE (type) == TYPE_CODE_RANGE
690cc4eb 11775 && TYPE_CODE (subranged_type) == TYPE_CODE_INT
4c4b4cd2 11776 && TYPE_UNSIGNED (subranged_type));
14f9c5c9
AS
11777}
11778
4c4b4cd2
PH
11779/* Assuming ada_is_modular_type (TYPE), the modulus of TYPE. */
11780
61ee279c 11781ULONGEST
0056e4d5 11782ada_modulus (struct type *type)
14f9c5c9 11783{
43bbcdc2 11784 return (ULONGEST) TYPE_HIGH_BOUND (type) + 1;
14f9c5c9 11785}
d2e4a39e 11786\f
f7f9143b
JB
11787
11788/* Ada exception catchpoint support:
11789 ---------------------------------
11790
11791 We support 3 kinds of exception catchpoints:
11792 . catchpoints on Ada exceptions
11793 . catchpoints on unhandled Ada exceptions
11794 . catchpoints on failed assertions
11795
11796 Exceptions raised during failed assertions, or unhandled exceptions
11797 could perfectly be caught with the general catchpoint on Ada exceptions.
11798 However, we can easily differentiate these two special cases, and having
11799 the option to distinguish these two cases from the rest can be useful
11800 to zero-in on certain situations.
11801
11802 Exception catchpoints are a specialized form of breakpoint,
11803 since they rely on inserting breakpoints inside known routines
11804 of the GNAT runtime. The implementation therefore uses a standard
11805 breakpoint structure of the BP_BREAKPOINT type, but with its own set
11806 of breakpoint_ops.
11807
0259addd
JB
11808 Support in the runtime for exception catchpoints have been changed
11809 a few times already, and these changes affect the implementation
11810 of these catchpoints. In order to be able to support several
11811 variants of the runtime, we use a sniffer that will determine
28010a5d 11812 the runtime variant used by the program being debugged. */
f7f9143b 11813
82eacd52
JB
11814/* Ada's standard exceptions.
11815
11816 The Ada 83 standard also defined Numeric_Error. But there so many
11817 situations where it was unclear from the Ada 83 Reference Manual
11818 (RM) whether Constraint_Error or Numeric_Error should be raised,
11819 that the ARG (Ada Rapporteur Group) eventually issued a Binding
11820 Interpretation saying that anytime the RM says that Numeric_Error
11821 should be raised, the implementation may raise Constraint_Error.
11822 Ada 95 went one step further and pretty much removed Numeric_Error
11823 from the list of standard exceptions (it made it a renaming of
11824 Constraint_Error, to help preserve compatibility when compiling
11825 an Ada83 compiler). As such, we do not include Numeric_Error from
11826 this list of standard exceptions. */
3d0b0fa3 11827
a121b7c1 11828static const char *standard_exc[] = {
3d0b0fa3
JB
11829 "constraint_error",
11830 "program_error",
11831 "storage_error",
11832 "tasking_error"
11833};
11834
0259addd
JB
11835typedef CORE_ADDR (ada_unhandled_exception_name_addr_ftype) (void);
11836
11837/* A structure that describes how to support exception catchpoints
11838 for a given executable. */
11839
11840struct exception_support_info
11841{
11842 /* The name of the symbol to break on in order to insert
11843 a catchpoint on exceptions. */
11844 const char *catch_exception_sym;
11845
11846 /* The name of the symbol to break on in order to insert
11847 a catchpoint on unhandled exceptions. */
11848 const char *catch_exception_unhandled_sym;
11849
11850 /* The name of the symbol to break on in order to insert
11851 a catchpoint on failed assertions. */
11852 const char *catch_assert_sym;
11853
9f757bf7
XR
11854 /* The name of the symbol to break on in order to insert
11855 a catchpoint on exception handling. */
11856 const char *catch_handlers_sym;
11857
0259addd
JB
11858 /* Assuming that the inferior just triggered an unhandled exception
11859 catchpoint, this function is responsible for returning the address
11860 in inferior memory where the name of that exception is stored.
11861 Return zero if the address could not be computed. */
11862 ada_unhandled_exception_name_addr_ftype *unhandled_exception_name_addr;
11863};
11864
11865static CORE_ADDR ada_unhandled_exception_name_addr (void);
11866static CORE_ADDR ada_unhandled_exception_name_addr_from_raise (void);
11867
11868/* The following exception support info structure describes how to
11869 implement exception catchpoints with the latest version of the
11870 Ada runtime (as of 2007-03-06). */
11871
11872static const struct exception_support_info default_exception_support_info =
11873{
11874 "__gnat_debug_raise_exception", /* catch_exception_sym */
11875 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11876 "__gnat_debug_raise_assert_failure", /* catch_assert_sym */
9f757bf7 11877 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11878 ada_unhandled_exception_name_addr
11879};
11880
11881/* The following exception support info structure describes how to
11882 implement exception catchpoints with a slightly older version
11883 of the Ada runtime. */
11884
11885static const struct exception_support_info exception_support_info_fallback =
11886{
11887 "__gnat_raise_nodefer_with_msg", /* catch_exception_sym */
11888 "__gnat_unhandled_exception", /* catch_exception_unhandled_sym */
11889 "system__assertions__raise_assert_failure", /* catch_assert_sym */
9f757bf7 11890 "__gnat_begin_handler", /* catch_handlers_sym */
0259addd
JB
11891 ada_unhandled_exception_name_addr_from_raise
11892};
11893
f17011e0
JB
11894/* Return nonzero if we can detect the exception support routines
11895 described in EINFO.
11896
11897 This function errors out if an abnormal situation is detected
11898 (for instance, if we find the exception support routines, but
11899 that support is found to be incomplete). */
11900
11901static int
11902ada_has_this_exception_support (const struct exception_support_info *einfo)
11903{
11904 struct symbol *sym;
11905
11906 /* The symbol we're looking up is provided by a unit in the GNAT runtime
11907 that should be compiled with debugging information. As a result, we
11908 expect to find that symbol in the symtabs. */
11909
11910 sym = standard_lookup (einfo->catch_exception_sym, NULL, VAR_DOMAIN);
11911 if (sym == NULL)
a6af7abe
JB
11912 {
11913 /* Perhaps we did not find our symbol because the Ada runtime was
11914 compiled without debugging info, or simply stripped of it.
11915 It happens on some GNU/Linux distributions for instance, where
11916 users have to install a separate debug package in order to get
11917 the runtime's debugging info. In that situation, let the user
11918 know why we cannot insert an Ada exception catchpoint.
11919
11920 Note: Just for the purpose of inserting our Ada exception
11921 catchpoint, we could rely purely on the associated minimal symbol.
11922 But we would be operating in degraded mode anyway, since we are
11923 still lacking the debugging info needed later on to extract
11924 the name of the exception being raised (this name is printed in
11925 the catchpoint message, and is also used when trying to catch
11926 a specific exception). We do not handle this case for now. */
3b7344d5 11927 struct bound_minimal_symbol msym
1c8e84b0
JB
11928 = lookup_minimal_symbol (einfo->catch_exception_sym, NULL, NULL);
11929
3b7344d5 11930 if (msym.minsym && MSYMBOL_TYPE (msym.minsym) != mst_solib_trampoline)
a6af7abe
JB
11931 error (_("Your Ada runtime appears to be missing some debugging "
11932 "information.\nCannot insert Ada exception catchpoint "
11933 "in this configuration."));
11934
11935 return 0;
11936 }
f17011e0
JB
11937
11938 /* Make sure that the symbol we found corresponds to a function. */
11939
11940 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
11941 error (_("Symbol \"%s\" is not a function (class = %d)"),
11942 SYMBOL_LINKAGE_NAME (sym), SYMBOL_CLASS (sym));
11943
11944 return 1;
11945}
11946
0259addd
JB
11947/* Inspect the Ada runtime and determine which exception info structure
11948 should be used to provide support for exception catchpoints.
11949
3eecfa55
JB
11950 This function will always set the per-inferior exception_info,
11951 or raise an error. */
0259addd
JB
11952
11953static void
11954ada_exception_support_info_sniffer (void)
11955{
3eecfa55 11956 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
0259addd
JB
11957
11958 /* If the exception info is already known, then no need to recompute it. */
3eecfa55 11959 if (data->exception_info != NULL)
0259addd
JB
11960 return;
11961
11962 /* Check the latest (default) exception support info. */
f17011e0 11963 if (ada_has_this_exception_support (&default_exception_support_info))
0259addd 11964 {
3eecfa55 11965 data->exception_info = &default_exception_support_info;
0259addd
JB
11966 return;
11967 }
11968
11969 /* Try our fallback exception suport info. */
f17011e0 11970 if (ada_has_this_exception_support (&exception_support_info_fallback))
0259addd 11971 {
3eecfa55 11972 data->exception_info = &exception_support_info_fallback;
0259addd
JB
11973 return;
11974 }
11975
11976 /* Sometimes, it is normal for us to not be able to find the routine
11977 we are looking for. This happens when the program is linked with
11978 the shared version of the GNAT runtime, and the program has not been
11979 started yet. Inform the user of these two possible causes if
11980 applicable. */
11981
ccefe4c4 11982 if (ada_update_initial_language (language_unknown) != language_ada)
0259addd
JB
11983 error (_("Unable to insert catchpoint. Is this an Ada main program?"));
11984
11985 /* If the symbol does not exist, then check that the program is
11986 already started, to make sure that shared libraries have been
11987 loaded. If it is not started, this may mean that the symbol is
11988 in a shared library. */
11989
e99b03dc 11990 if (inferior_ptid.pid () == 0)
0259addd
JB
11991 error (_("Unable to insert catchpoint. Try to start the program first."));
11992
11993 /* At this point, we know that we are debugging an Ada program and
11994 that the inferior has been started, but we still are not able to
0963b4bd 11995 find the run-time symbols. That can mean that we are in
0259addd
JB
11996 configurable run time mode, or that a-except as been optimized
11997 out by the linker... In any case, at this point it is not worth
11998 supporting this feature. */
11999
7dda8cff 12000 error (_("Cannot insert Ada exception catchpoints in this configuration."));
0259addd
JB
12001}
12002
f7f9143b
JB
12003/* True iff FRAME is very likely to be that of a function that is
12004 part of the runtime system. This is all very heuristic, but is
12005 intended to be used as advice as to what frames are uninteresting
12006 to most users. */
12007
12008static int
12009is_known_support_routine (struct frame_info *frame)
12010{
692465f1 12011 enum language func_lang;
f7f9143b 12012 int i;
f35a17b5 12013 const char *fullname;
f7f9143b 12014
4ed6b5be
JB
12015 /* If this code does not have any debugging information (no symtab),
12016 This cannot be any user code. */
f7f9143b 12017
51abb421 12018 symtab_and_line sal = find_frame_sal (frame);
f7f9143b
JB
12019 if (sal.symtab == NULL)
12020 return 1;
12021
4ed6b5be
JB
12022 /* If there is a symtab, but the associated source file cannot be
12023 located, then assume this is not user code: Selecting a frame
12024 for which we cannot display the code would not be very helpful
12025 for the user. This should also take care of case such as VxWorks
12026 where the kernel has some debugging info provided for a few units. */
f7f9143b 12027
f35a17b5
JK
12028 fullname = symtab_to_fullname (sal.symtab);
12029 if (access (fullname, R_OK) != 0)
f7f9143b
JB
12030 return 1;
12031
4ed6b5be
JB
12032 /* Check the unit filename againt the Ada runtime file naming.
12033 We also check the name of the objfile against the name of some
12034 known system libraries that sometimes come with debugging info
12035 too. */
12036
f7f9143b
JB
12037 for (i = 0; known_runtime_file_name_patterns[i] != NULL; i += 1)
12038 {
12039 re_comp (known_runtime_file_name_patterns[i]);
f69c91ad 12040 if (re_exec (lbasename (sal.symtab->filename)))
f7f9143b 12041 return 1;
eb822aa6
DE
12042 if (SYMTAB_OBJFILE (sal.symtab) != NULL
12043 && re_exec (objfile_name (SYMTAB_OBJFILE (sal.symtab))))
4ed6b5be 12044 return 1;
f7f9143b
JB
12045 }
12046
4ed6b5be 12047 /* Check whether the function is a GNAT-generated entity. */
f7f9143b 12048
c6dc63a1
TT
12049 gdb::unique_xmalloc_ptr<char> func_name
12050 = find_frame_funname (frame, &func_lang, NULL);
f7f9143b
JB
12051 if (func_name == NULL)
12052 return 1;
12053
12054 for (i = 0; known_auxiliary_function_name_patterns[i] != NULL; i += 1)
12055 {
12056 re_comp (known_auxiliary_function_name_patterns[i]);
c6dc63a1
TT
12057 if (re_exec (func_name.get ()))
12058 return 1;
f7f9143b
JB
12059 }
12060
12061 return 0;
12062}
12063
12064/* Find the first frame that contains debugging information and that is not
12065 part of the Ada run-time, starting from FI and moving upward. */
12066
0ef643c8 12067void
f7f9143b
JB
12068ada_find_printable_frame (struct frame_info *fi)
12069{
12070 for (; fi != NULL; fi = get_prev_frame (fi))
12071 {
12072 if (!is_known_support_routine (fi))
12073 {
12074 select_frame (fi);
12075 break;
12076 }
12077 }
12078
12079}
12080
12081/* Assuming that the inferior just triggered an unhandled exception
12082 catchpoint, return the address in inferior memory where the name
12083 of the exception is stored.
12084
12085 Return zero if the address could not be computed. */
12086
12087static CORE_ADDR
12088ada_unhandled_exception_name_addr (void)
0259addd
JB
12089{
12090 return parse_and_eval_address ("e.full_name");
12091}
12092
12093/* Same as ada_unhandled_exception_name_addr, except that this function
12094 should be used when the inferior uses an older version of the runtime,
12095 where the exception name needs to be extracted from a specific frame
12096 several frames up in the callstack. */
12097
12098static CORE_ADDR
12099ada_unhandled_exception_name_addr_from_raise (void)
f7f9143b
JB
12100{
12101 int frame_level;
12102 struct frame_info *fi;
3eecfa55 12103 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
f7f9143b
JB
12104
12105 /* To determine the name of this exception, we need to select
12106 the frame corresponding to RAISE_SYM_NAME. This frame is
12107 at least 3 levels up, so we simply skip the first 3 frames
12108 without checking the name of their associated function. */
12109 fi = get_current_frame ();
12110 for (frame_level = 0; frame_level < 3; frame_level += 1)
12111 if (fi != NULL)
12112 fi = get_prev_frame (fi);
12113
12114 while (fi != NULL)
12115 {
692465f1
JB
12116 enum language func_lang;
12117
c6dc63a1
TT
12118 gdb::unique_xmalloc_ptr<char> func_name
12119 = find_frame_funname (fi, &func_lang, NULL);
55b87a52
KS
12120 if (func_name != NULL)
12121 {
c6dc63a1 12122 if (strcmp (func_name.get (),
55b87a52
KS
12123 data->exception_info->catch_exception_sym) == 0)
12124 break; /* We found the frame we were looking for... */
55b87a52 12125 }
fb44b1a7 12126 fi = get_prev_frame (fi);
f7f9143b
JB
12127 }
12128
12129 if (fi == NULL)
12130 return 0;
12131
12132 select_frame (fi);
12133 return parse_and_eval_address ("id.full_name");
12134}
12135
12136/* Assuming the inferior just triggered an Ada exception catchpoint
12137 (of any type), return the address in inferior memory where the name
12138 of the exception is stored, if applicable.
12139
45db7c09
PA
12140 Assumes the selected frame is the current frame.
12141
f7f9143b
JB
12142 Return zero if the address could not be computed, or if not relevant. */
12143
12144static CORE_ADDR
761269c8 12145ada_exception_name_addr_1 (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12146 struct breakpoint *b)
12147{
3eecfa55
JB
12148 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12149
f7f9143b
JB
12150 switch (ex)
12151 {
761269c8 12152 case ada_catch_exception:
f7f9143b
JB
12153 return (parse_and_eval_address ("e.full_name"));
12154 break;
12155
761269c8 12156 case ada_catch_exception_unhandled:
3eecfa55 12157 return data->exception_info->unhandled_exception_name_addr ();
f7f9143b 12158 break;
9f757bf7
XR
12159
12160 case ada_catch_handlers:
12161 return 0; /* The runtimes does not provide access to the exception
12162 name. */
12163 break;
12164
761269c8 12165 case ada_catch_assert:
f7f9143b
JB
12166 return 0; /* Exception name is not relevant in this case. */
12167 break;
12168
12169 default:
12170 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12171 break;
12172 }
12173
12174 return 0; /* Should never be reached. */
12175}
12176
e547c119
JB
12177/* Assuming the inferior is stopped at an exception catchpoint,
12178 return the message which was associated to the exception, if
12179 available. Return NULL if the message could not be retrieved.
12180
e547c119
JB
12181 Note: The exception message can be associated to an exception
12182 either through the use of the Raise_Exception function, or
12183 more simply (Ada 2005 and later), via:
12184
12185 raise Exception_Name with "exception message";
12186
12187 */
12188
6f46ac85 12189static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12190ada_exception_message_1 (void)
12191{
12192 struct value *e_msg_val;
e547c119 12193 int e_msg_len;
e547c119
JB
12194
12195 /* For runtimes that support this feature, the exception message
12196 is passed as an unbounded string argument called "message". */
12197 e_msg_val = parse_and_eval ("message");
12198 if (e_msg_val == NULL)
12199 return NULL; /* Exception message not supported. */
12200
12201 e_msg_val = ada_coerce_to_simple_array (e_msg_val);
12202 gdb_assert (e_msg_val != NULL);
12203 e_msg_len = TYPE_LENGTH (value_type (e_msg_val));
12204
12205 /* If the message string is empty, then treat it as if there was
12206 no exception message. */
12207 if (e_msg_len <= 0)
12208 return NULL;
12209
6f46ac85
TT
12210 gdb::unique_xmalloc_ptr<char> e_msg ((char *) xmalloc (e_msg_len + 1));
12211 read_memory_string (value_address (e_msg_val), e_msg.get (), e_msg_len + 1);
12212 e_msg.get ()[e_msg_len] = '\0';
e547c119 12213
e547c119
JB
12214 return e_msg;
12215}
12216
12217/* Same as ada_exception_message_1, except that all exceptions are
12218 contained here (returning NULL instead). */
12219
6f46ac85 12220static gdb::unique_xmalloc_ptr<char>
e547c119
JB
12221ada_exception_message (void)
12222{
6f46ac85 12223 gdb::unique_xmalloc_ptr<char> e_msg;
e547c119 12224
a70b8144 12225 try
e547c119
JB
12226 {
12227 e_msg = ada_exception_message_1 ();
12228 }
230d2906 12229 catch (const gdb_exception_error &e)
e547c119 12230 {
6f46ac85 12231 e_msg.reset (nullptr);
e547c119 12232 }
e547c119
JB
12233
12234 return e_msg;
12235}
12236
f7f9143b
JB
12237/* Same as ada_exception_name_addr_1, except that it intercepts and contains
12238 any error that ada_exception_name_addr_1 might cause to be thrown.
12239 When an error is intercepted, a warning with the error message is printed,
12240 and zero is returned. */
12241
12242static CORE_ADDR
761269c8 12243ada_exception_name_addr (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12244 struct breakpoint *b)
12245{
f7f9143b
JB
12246 CORE_ADDR result = 0;
12247
a70b8144 12248 try
f7f9143b
JB
12249 {
12250 result = ada_exception_name_addr_1 (ex, b);
12251 }
12252
230d2906 12253 catch (const gdb_exception_error &e)
f7f9143b 12254 {
3d6e9d23 12255 warning (_("failed to get exception name: %s"), e.what ());
f7f9143b
JB
12256 return 0;
12257 }
12258
12259 return result;
12260}
12261
cb7de75e 12262static std::string ada_exception_catchpoint_cond_string
9f757bf7
XR
12263 (const char *excep_string,
12264 enum ada_exception_catchpoint_kind ex);
28010a5d
PA
12265
12266/* Ada catchpoints.
12267
12268 In the case of catchpoints on Ada exceptions, the catchpoint will
12269 stop the target on every exception the program throws. When a user
12270 specifies the name of a specific exception, we translate this
12271 request into a condition expression (in text form), and then parse
12272 it into an expression stored in each of the catchpoint's locations.
12273 We then use this condition to check whether the exception that was
12274 raised is the one the user is interested in. If not, then the
12275 target is resumed again. We store the name of the requested
12276 exception, in order to be able to re-set the condition expression
12277 when symbols change. */
12278
12279/* An instance of this type is used to represent an Ada catchpoint
5625a286 12280 breakpoint location. */
28010a5d 12281
5625a286 12282class ada_catchpoint_location : public bp_location
28010a5d 12283{
5625a286 12284public:
5f486660 12285 ada_catchpoint_location (breakpoint *owner)
f06f1252 12286 : bp_location (owner, bp_loc_software_breakpoint)
5625a286 12287 {}
28010a5d
PA
12288
12289 /* The condition that checks whether the exception that was raised
12290 is the specific exception the user specified on catchpoint
12291 creation. */
4d01a485 12292 expression_up excep_cond_expr;
28010a5d
PA
12293};
12294
c1fc2657 12295/* An instance of this type is used to represent an Ada catchpoint. */
28010a5d 12296
c1fc2657 12297struct ada_catchpoint : public breakpoint
28010a5d 12298{
28010a5d 12299 /* The name of the specific exception the user specified. */
bc18fbb5 12300 std::string excep_string;
28010a5d
PA
12301};
12302
12303/* Parse the exception condition string in the context of each of the
12304 catchpoint's locations, and store them for later evaluation. */
12305
12306static void
9f757bf7
XR
12307create_excep_cond_exprs (struct ada_catchpoint *c,
12308 enum ada_exception_catchpoint_kind ex)
28010a5d 12309{
28010a5d 12310 /* Nothing to do if there's no specific exception to catch. */
bc18fbb5 12311 if (c->excep_string.empty ())
28010a5d
PA
12312 return;
12313
12314 /* Same if there are no locations... */
c1fc2657 12315 if (c->loc == NULL)
28010a5d
PA
12316 return;
12317
2ff0a947
TT
12318 /* We have to compute the expression once for each program space,
12319 because the expression may hold the addresses of multiple symbols
12320 in some cases. */
12321 std::multimap<program_space *, struct bp_location *> loc_map;
bde09ab7 12322 for (bp_location *bl = c->loc; bl != NULL; bl = bl->next)
2ff0a947 12323 loc_map.emplace (bl->pspace, bl);
28010a5d 12324
2ff0a947
TT
12325 scoped_restore_current_program_space save_pspace;
12326
12327 std::string cond_string;
12328 program_space *last_ps = nullptr;
12329 for (auto iter : loc_map)
28010a5d
PA
12330 {
12331 struct ada_catchpoint_location *ada_loc
2ff0a947
TT
12332 = (struct ada_catchpoint_location *) iter.second;
12333
12334 if (ada_loc->pspace != last_ps)
12335 {
12336 last_ps = ada_loc->pspace;
12337 set_current_program_space (last_ps);
12338
12339 /* Compute the condition expression in text form, from the
12340 specific expection we want to catch. */
12341 cond_string
12342 = ada_exception_catchpoint_cond_string (c->excep_string.c_str (),
12343 ex);
12344 }
12345
4d01a485 12346 expression_up exp;
28010a5d 12347
2ff0a947 12348 if (!ada_loc->shlib_disabled)
28010a5d 12349 {
bbc13ae3 12350 const char *s;
28010a5d 12351
cb7de75e 12352 s = cond_string.c_str ();
a70b8144 12353 try
28010a5d 12354 {
2ff0a947
TT
12355 exp = parse_exp_1 (&s, ada_loc->address,
12356 block_for_pc (ada_loc->address),
036e657b 12357 0);
28010a5d 12358 }
230d2906 12359 catch (const gdb_exception_error &e)
849f2b52
JB
12360 {
12361 warning (_("failed to reevaluate internal exception condition "
12362 "for catchpoint %d: %s"),
3d6e9d23 12363 c->number, e.what ());
849f2b52 12364 }
28010a5d
PA
12365 }
12366
b22e99fd 12367 ada_loc->excep_cond_expr = std::move (exp);
28010a5d 12368 }
28010a5d
PA
12369}
12370
28010a5d
PA
12371/* Implement the ALLOCATE_LOCATION method in the breakpoint_ops
12372 structure for all exception catchpoint kinds. */
12373
12374static struct bp_location *
761269c8 12375allocate_location_exception (enum ada_exception_catchpoint_kind ex,
28010a5d
PA
12376 struct breakpoint *self)
12377{
5f486660 12378 return new ada_catchpoint_location (self);
28010a5d
PA
12379}
12380
12381/* Implement the RE_SET method in the breakpoint_ops structure for all
12382 exception catchpoint kinds. */
12383
12384static void
761269c8 12385re_set_exception (enum ada_exception_catchpoint_kind ex, struct breakpoint *b)
28010a5d
PA
12386{
12387 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12388
12389 /* Call the base class's method. This updates the catchpoint's
12390 locations. */
2060206e 12391 bkpt_breakpoint_ops.re_set (b);
28010a5d
PA
12392
12393 /* Reparse the exception conditional expressions. One for each
12394 location. */
9f757bf7 12395 create_excep_cond_exprs (c, ex);
28010a5d
PA
12396}
12397
12398/* Returns true if we should stop for this breakpoint hit. If the
12399 user specified a specific exception, we only want to cause a stop
12400 if the program thrown that exception. */
12401
12402static int
12403should_stop_exception (const struct bp_location *bl)
12404{
12405 struct ada_catchpoint *c = (struct ada_catchpoint *) bl->owner;
12406 const struct ada_catchpoint_location *ada_loc
12407 = (const struct ada_catchpoint_location *) bl;
28010a5d
PA
12408 int stop;
12409
12410 /* With no specific exception, should always stop. */
bc18fbb5 12411 if (c->excep_string.empty ())
28010a5d
PA
12412 return 1;
12413
12414 if (ada_loc->excep_cond_expr == NULL)
12415 {
12416 /* We will have a NULL expression if back when we were creating
12417 the expressions, this location's had failed to parse. */
12418 return 1;
12419 }
12420
12421 stop = 1;
a70b8144 12422 try
28010a5d
PA
12423 {
12424 struct value *mark;
12425
12426 mark = value_mark ();
4d01a485 12427 stop = value_true (evaluate_expression (ada_loc->excep_cond_expr.get ()));
28010a5d
PA
12428 value_free_to_mark (mark);
12429 }
230d2906 12430 catch (const gdb_exception &ex)
492d29ea
PA
12431 {
12432 exception_fprintf (gdb_stderr, ex,
12433 _("Error in testing exception condition:\n"));
12434 }
492d29ea 12435
28010a5d
PA
12436 return stop;
12437}
12438
12439/* Implement the CHECK_STATUS method in the breakpoint_ops structure
12440 for all exception catchpoint kinds. */
12441
12442static void
761269c8 12443check_status_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
28010a5d
PA
12444{
12445 bs->stop = should_stop_exception (bs->bp_location_at);
12446}
12447
f7f9143b
JB
12448/* Implement the PRINT_IT method in the breakpoint_ops structure
12449 for all exception catchpoint kinds. */
12450
12451static enum print_stop_action
761269c8 12452print_it_exception (enum ada_exception_catchpoint_kind ex, bpstat bs)
f7f9143b 12453{
79a45e25 12454 struct ui_out *uiout = current_uiout;
348d480f
PA
12455 struct breakpoint *b = bs->breakpoint_at;
12456
956a9fb9 12457 annotate_catchpoint (b->number);
f7f9143b 12458
112e8700 12459 if (uiout->is_mi_like_p ())
f7f9143b 12460 {
112e8700 12461 uiout->field_string ("reason",
956a9fb9 12462 async_reason_lookup (EXEC_ASYNC_BREAKPOINT_HIT));
112e8700 12463 uiout->field_string ("disp", bpdisp_text (b->disposition));
f7f9143b
JB
12464 }
12465
112e8700
SM
12466 uiout->text (b->disposition == disp_del
12467 ? "\nTemporary catchpoint " : "\nCatchpoint ");
12468 uiout->field_int ("bkptno", b->number);
12469 uiout->text (", ");
f7f9143b 12470
45db7c09
PA
12471 /* ada_exception_name_addr relies on the selected frame being the
12472 current frame. Need to do this here because this function may be
12473 called more than once when printing a stop, and below, we'll
12474 select the first frame past the Ada run-time (see
12475 ada_find_printable_frame). */
12476 select_frame (get_current_frame ());
12477
f7f9143b
JB
12478 switch (ex)
12479 {
761269c8
JB
12480 case ada_catch_exception:
12481 case ada_catch_exception_unhandled:
9f757bf7 12482 case ada_catch_handlers:
956a9fb9
JB
12483 {
12484 const CORE_ADDR addr = ada_exception_name_addr (ex, b);
12485 char exception_name[256];
12486
12487 if (addr != 0)
12488 {
c714b426
PA
12489 read_memory (addr, (gdb_byte *) exception_name,
12490 sizeof (exception_name) - 1);
956a9fb9
JB
12491 exception_name [sizeof (exception_name) - 1] = '\0';
12492 }
12493 else
12494 {
12495 /* For some reason, we were unable to read the exception
12496 name. This could happen if the Runtime was compiled
12497 without debugging info, for instance. In that case,
12498 just replace the exception name by the generic string
12499 "exception" - it will read as "an exception" in the
12500 notification we are about to print. */
967cff16 12501 memcpy (exception_name, "exception", sizeof ("exception"));
956a9fb9
JB
12502 }
12503 /* In the case of unhandled exception breakpoints, we print
12504 the exception name as "unhandled EXCEPTION_NAME", to make
12505 it clearer to the user which kind of catchpoint just got
12506 hit. We used ui_out_text to make sure that this extra
12507 info does not pollute the exception name in the MI case. */
761269c8 12508 if (ex == ada_catch_exception_unhandled)
112e8700
SM
12509 uiout->text ("unhandled ");
12510 uiout->field_string ("exception-name", exception_name);
956a9fb9
JB
12511 }
12512 break;
761269c8 12513 case ada_catch_assert:
956a9fb9
JB
12514 /* In this case, the name of the exception is not really
12515 important. Just print "failed assertion" to make it clearer
12516 that his program just hit an assertion-failure catchpoint.
12517 We used ui_out_text because this info does not belong in
12518 the MI output. */
112e8700 12519 uiout->text ("failed assertion");
956a9fb9 12520 break;
f7f9143b 12521 }
e547c119 12522
6f46ac85 12523 gdb::unique_xmalloc_ptr<char> exception_message = ada_exception_message ();
e547c119
JB
12524 if (exception_message != NULL)
12525 {
e547c119 12526 uiout->text (" (");
6f46ac85 12527 uiout->field_string ("exception-message", exception_message.get ());
e547c119 12528 uiout->text (")");
e547c119
JB
12529 }
12530
112e8700 12531 uiout->text (" at ");
956a9fb9 12532 ada_find_printable_frame (get_current_frame ());
f7f9143b
JB
12533
12534 return PRINT_SRC_AND_LOC;
12535}
12536
12537/* Implement the PRINT_ONE method in the breakpoint_ops structure
12538 for all exception catchpoint kinds. */
12539
12540static void
761269c8 12541print_one_exception (enum ada_exception_catchpoint_kind ex,
a6d9a66e 12542 struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12543{
79a45e25 12544 struct ui_out *uiout = current_uiout;
28010a5d 12545 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45b7d
TT
12546 struct value_print_options opts;
12547
12548 get_user_print_options (&opts);
f06f1252 12549
79a45b7d 12550 if (opts.addressprint)
f06f1252 12551 uiout->field_skip ("addr");
f7f9143b
JB
12552
12553 annotate_field (5);
f7f9143b
JB
12554 switch (ex)
12555 {
761269c8 12556 case ada_catch_exception:
bc18fbb5 12557 if (!c->excep_string.empty ())
f7f9143b 12558 {
bc18fbb5
TT
12559 std::string msg = string_printf (_("`%s' Ada exception"),
12560 c->excep_string.c_str ());
28010a5d 12561
112e8700 12562 uiout->field_string ("what", msg);
f7f9143b
JB
12563 }
12564 else
112e8700 12565 uiout->field_string ("what", "all Ada exceptions");
f7f9143b
JB
12566
12567 break;
12568
761269c8 12569 case ada_catch_exception_unhandled:
112e8700 12570 uiout->field_string ("what", "unhandled Ada exceptions");
f7f9143b
JB
12571 break;
12572
9f757bf7 12573 case ada_catch_handlers:
bc18fbb5 12574 if (!c->excep_string.empty ())
9f757bf7
XR
12575 {
12576 uiout->field_fmt ("what",
12577 _("`%s' Ada exception handlers"),
bc18fbb5 12578 c->excep_string.c_str ());
9f757bf7
XR
12579 }
12580 else
12581 uiout->field_string ("what", "all Ada exceptions handlers");
12582 break;
12583
761269c8 12584 case ada_catch_assert:
112e8700 12585 uiout->field_string ("what", "failed Ada assertions");
f7f9143b
JB
12586 break;
12587
12588 default:
12589 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12590 break;
12591 }
12592}
12593
12594/* Implement the PRINT_MENTION method in the breakpoint_ops structure
12595 for all exception catchpoint kinds. */
12596
12597static void
761269c8 12598print_mention_exception (enum ada_exception_catchpoint_kind ex,
f7f9143b
JB
12599 struct breakpoint *b)
12600{
28010a5d 12601 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
79a45e25 12602 struct ui_out *uiout = current_uiout;
28010a5d 12603
112e8700 12604 uiout->text (b->disposition == disp_del ? _("Temporary catchpoint ")
00eb2c4a 12605 : _("Catchpoint "));
112e8700
SM
12606 uiout->field_int ("bkptno", b->number);
12607 uiout->text (": ");
00eb2c4a 12608
f7f9143b
JB
12609 switch (ex)
12610 {
761269c8 12611 case ada_catch_exception:
bc18fbb5 12612 if (!c->excep_string.empty ())
00eb2c4a 12613 {
862d101a 12614 std::string info = string_printf (_("`%s' Ada exception"),
bc18fbb5 12615 c->excep_string.c_str ());
862d101a 12616 uiout->text (info.c_str ());
00eb2c4a 12617 }
f7f9143b 12618 else
112e8700 12619 uiout->text (_("all Ada exceptions"));
f7f9143b
JB
12620 break;
12621
761269c8 12622 case ada_catch_exception_unhandled:
112e8700 12623 uiout->text (_("unhandled Ada exceptions"));
f7f9143b 12624 break;
9f757bf7
XR
12625
12626 case ada_catch_handlers:
bc18fbb5 12627 if (!c->excep_string.empty ())
9f757bf7
XR
12628 {
12629 std::string info
12630 = string_printf (_("`%s' Ada exception handlers"),
bc18fbb5 12631 c->excep_string.c_str ());
9f757bf7
XR
12632 uiout->text (info.c_str ());
12633 }
12634 else
12635 uiout->text (_("all Ada exceptions handlers"));
12636 break;
12637
761269c8 12638 case ada_catch_assert:
112e8700 12639 uiout->text (_("failed Ada assertions"));
f7f9143b
JB
12640 break;
12641
12642 default:
12643 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12644 break;
12645 }
12646}
12647
6149aea9
PA
12648/* Implement the PRINT_RECREATE method in the breakpoint_ops structure
12649 for all exception catchpoint kinds. */
12650
12651static void
761269c8 12652print_recreate_exception (enum ada_exception_catchpoint_kind ex,
6149aea9
PA
12653 struct breakpoint *b, struct ui_file *fp)
12654{
28010a5d
PA
12655 struct ada_catchpoint *c = (struct ada_catchpoint *) b;
12656
6149aea9
PA
12657 switch (ex)
12658 {
761269c8 12659 case ada_catch_exception:
6149aea9 12660 fprintf_filtered (fp, "catch exception");
bc18fbb5
TT
12661 if (!c->excep_string.empty ())
12662 fprintf_filtered (fp, " %s", c->excep_string.c_str ());
6149aea9
PA
12663 break;
12664
761269c8 12665 case ada_catch_exception_unhandled:
78076abc 12666 fprintf_filtered (fp, "catch exception unhandled");
6149aea9
PA
12667 break;
12668
9f757bf7
XR
12669 case ada_catch_handlers:
12670 fprintf_filtered (fp, "catch handlers");
12671 break;
12672
761269c8 12673 case ada_catch_assert:
6149aea9
PA
12674 fprintf_filtered (fp, "catch assert");
12675 break;
12676
12677 default:
12678 internal_error (__FILE__, __LINE__, _("unexpected catchpoint type"));
12679 }
d9b3f62e 12680 print_recreate_thread (b, fp);
6149aea9
PA
12681}
12682
f7f9143b
JB
12683/* Virtual table for "catch exception" breakpoints. */
12684
28010a5d
PA
12685static struct bp_location *
12686allocate_location_catch_exception (struct breakpoint *self)
12687{
761269c8 12688 return allocate_location_exception (ada_catch_exception, self);
28010a5d
PA
12689}
12690
12691static void
12692re_set_catch_exception (struct breakpoint *b)
12693{
761269c8 12694 re_set_exception (ada_catch_exception, b);
28010a5d
PA
12695}
12696
12697static void
12698check_status_catch_exception (bpstat bs)
12699{
761269c8 12700 check_status_exception (ada_catch_exception, bs);
28010a5d
PA
12701}
12702
f7f9143b 12703static enum print_stop_action
348d480f 12704print_it_catch_exception (bpstat bs)
f7f9143b 12705{
761269c8 12706 return print_it_exception (ada_catch_exception, bs);
f7f9143b
JB
12707}
12708
12709static void
a6d9a66e 12710print_one_catch_exception (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12711{
761269c8 12712 print_one_exception (ada_catch_exception, b, last_loc);
f7f9143b
JB
12713}
12714
12715static void
12716print_mention_catch_exception (struct breakpoint *b)
12717{
761269c8 12718 print_mention_exception (ada_catch_exception, b);
f7f9143b
JB
12719}
12720
6149aea9
PA
12721static void
12722print_recreate_catch_exception (struct breakpoint *b, struct ui_file *fp)
12723{
761269c8 12724 print_recreate_exception (ada_catch_exception, b, fp);
6149aea9
PA
12725}
12726
2060206e 12727static struct breakpoint_ops catch_exception_breakpoint_ops;
f7f9143b
JB
12728
12729/* Virtual table for "catch exception unhandled" breakpoints. */
12730
28010a5d
PA
12731static struct bp_location *
12732allocate_location_catch_exception_unhandled (struct breakpoint *self)
12733{
761269c8 12734 return allocate_location_exception (ada_catch_exception_unhandled, self);
28010a5d
PA
12735}
12736
12737static void
12738re_set_catch_exception_unhandled (struct breakpoint *b)
12739{
761269c8 12740 re_set_exception (ada_catch_exception_unhandled, b);
28010a5d
PA
12741}
12742
12743static void
12744check_status_catch_exception_unhandled (bpstat bs)
12745{
761269c8 12746 check_status_exception (ada_catch_exception_unhandled, bs);
28010a5d
PA
12747}
12748
f7f9143b 12749static enum print_stop_action
348d480f 12750print_it_catch_exception_unhandled (bpstat bs)
f7f9143b 12751{
761269c8 12752 return print_it_exception (ada_catch_exception_unhandled, bs);
f7f9143b
JB
12753}
12754
12755static void
a6d9a66e
UW
12756print_one_catch_exception_unhandled (struct breakpoint *b,
12757 struct bp_location **last_loc)
f7f9143b 12758{
761269c8 12759 print_one_exception (ada_catch_exception_unhandled, b, last_loc);
f7f9143b
JB
12760}
12761
12762static void
12763print_mention_catch_exception_unhandled (struct breakpoint *b)
12764{
761269c8 12765 print_mention_exception (ada_catch_exception_unhandled, b);
f7f9143b
JB
12766}
12767
6149aea9
PA
12768static void
12769print_recreate_catch_exception_unhandled (struct breakpoint *b,
12770 struct ui_file *fp)
12771{
761269c8 12772 print_recreate_exception (ada_catch_exception_unhandled, b, fp);
6149aea9
PA
12773}
12774
2060206e 12775static struct breakpoint_ops catch_exception_unhandled_breakpoint_ops;
f7f9143b
JB
12776
12777/* Virtual table for "catch assert" breakpoints. */
12778
28010a5d
PA
12779static struct bp_location *
12780allocate_location_catch_assert (struct breakpoint *self)
12781{
761269c8 12782 return allocate_location_exception (ada_catch_assert, self);
28010a5d
PA
12783}
12784
12785static void
12786re_set_catch_assert (struct breakpoint *b)
12787{
761269c8 12788 re_set_exception (ada_catch_assert, b);
28010a5d
PA
12789}
12790
12791static void
12792check_status_catch_assert (bpstat bs)
12793{
761269c8 12794 check_status_exception (ada_catch_assert, bs);
28010a5d
PA
12795}
12796
f7f9143b 12797static enum print_stop_action
348d480f 12798print_it_catch_assert (bpstat bs)
f7f9143b 12799{
761269c8 12800 return print_it_exception (ada_catch_assert, bs);
f7f9143b
JB
12801}
12802
12803static void
a6d9a66e 12804print_one_catch_assert (struct breakpoint *b, struct bp_location **last_loc)
f7f9143b 12805{
761269c8 12806 print_one_exception (ada_catch_assert, b, last_loc);
f7f9143b
JB
12807}
12808
12809static void
12810print_mention_catch_assert (struct breakpoint *b)
12811{
761269c8 12812 print_mention_exception (ada_catch_assert, b);
f7f9143b
JB
12813}
12814
6149aea9
PA
12815static void
12816print_recreate_catch_assert (struct breakpoint *b, struct ui_file *fp)
12817{
761269c8 12818 print_recreate_exception (ada_catch_assert, b, fp);
6149aea9
PA
12819}
12820
2060206e 12821static struct breakpoint_ops catch_assert_breakpoint_ops;
f7f9143b 12822
9f757bf7
XR
12823/* Virtual table for "catch handlers" breakpoints. */
12824
12825static struct bp_location *
12826allocate_location_catch_handlers (struct breakpoint *self)
12827{
12828 return allocate_location_exception (ada_catch_handlers, self);
12829}
12830
12831static void
12832re_set_catch_handlers (struct breakpoint *b)
12833{
12834 re_set_exception (ada_catch_handlers, b);
12835}
12836
12837static void
12838check_status_catch_handlers (bpstat bs)
12839{
12840 check_status_exception (ada_catch_handlers, bs);
12841}
12842
12843static enum print_stop_action
12844print_it_catch_handlers (bpstat bs)
12845{
12846 return print_it_exception (ada_catch_handlers, bs);
12847}
12848
12849static void
12850print_one_catch_handlers (struct breakpoint *b,
12851 struct bp_location **last_loc)
12852{
12853 print_one_exception (ada_catch_handlers, b, last_loc);
12854}
12855
12856static void
12857print_mention_catch_handlers (struct breakpoint *b)
12858{
12859 print_mention_exception (ada_catch_handlers, b);
12860}
12861
12862static void
12863print_recreate_catch_handlers (struct breakpoint *b,
12864 struct ui_file *fp)
12865{
12866 print_recreate_exception (ada_catch_handlers, b, fp);
12867}
12868
12869static struct breakpoint_ops catch_handlers_breakpoint_ops;
12870
f06f1252
TT
12871/* See ada-lang.h. */
12872
12873bool
12874is_ada_exception_catchpoint (breakpoint *bp)
12875{
12876 return (bp->ops == &catch_exception_breakpoint_ops
12877 || bp->ops == &catch_exception_unhandled_breakpoint_ops
12878 || bp->ops == &catch_assert_breakpoint_ops
12879 || bp->ops == &catch_handlers_breakpoint_ops);
12880}
12881
f7f9143b
JB
12882/* Split the arguments specified in a "catch exception" command.
12883 Set EX to the appropriate catchpoint type.
28010a5d 12884 Set EXCEP_STRING to the name of the specific exception if
5845583d 12885 specified by the user.
9f757bf7
XR
12886 IS_CATCH_HANDLERS_CMD: True if the arguments are for a
12887 "catch handlers" command. False otherwise.
5845583d
JB
12888 If a condition is found at the end of the arguments, the condition
12889 expression is stored in COND_STRING (memory must be deallocated
12890 after use). Otherwise COND_STRING is set to NULL. */
f7f9143b
JB
12891
12892static void
a121b7c1 12893catch_ada_exception_command_split (const char *args,
9f757bf7 12894 bool is_catch_handlers_cmd,
761269c8 12895 enum ada_exception_catchpoint_kind *ex,
bc18fbb5
TT
12896 std::string *excep_string,
12897 std::string *cond_string)
f7f9143b 12898{
bc18fbb5 12899 std::string exception_name;
f7f9143b 12900
bc18fbb5
TT
12901 exception_name = extract_arg (&args);
12902 if (exception_name == "if")
5845583d
JB
12903 {
12904 /* This is not an exception name; this is the start of a condition
12905 expression for a catchpoint on all exceptions. So, "un-get"
12906 this token, and set exception_name to NULL. */
bc18fbb5 12907 exception_name.clear ();
5845583d
JB
12908 args -= 2;
12909 }
f7f9143b 12910
5845583d 12911 /* Check to see if we have a condition. */
f7f9143b 12912
f1735a53 12913 args = skip_spaces (args);
61012eef 12914 if (startswith (args, "if")
5845583d
JB
12915 && (isspace (args[2]) || args[2] == '\0'))
12916 {
12917 args += 2;
f1735a53 12918 args = skip_spaces (args);
5845583d
JB
12919
12920 if (args[0] == '\0')
12921 error (_("Condition missing after `if' keyword"));
bc18fbb5 12922 *cond_string = args;
5845583d
JB
12923
12924 args += strlen (args);
12925 }
12926
12927 /* Check that we do not have any more arguments. Anything else
12928 is unexpected. */
f7f9143b
JB
12929
12930 if (args[0] != '\0')
12931 error (_("Junk at end of expression"));
12932
9f757bf7
XR
12933 if (is_catch_handlers_cmd)
12934 {
12935 /* Catch handling of exceptions. */
12936 *ex = ada_catch_handlers;
12937 *excep_string = exception_name;
12938 }
bc18fbb5 12939 else if (exception_name.empty ())
f7f9143b
JB
12940 {
12941 /* Catch all exceptions. */
761269c8 12942 *ex = ada_catch_exception;
bc18fbb5 12943 excep_string->clear ();
f7f9143b 12944 }
bc18fbb5 12945 else if (exception_name == "unhandled")
f7f9143b
JB
12946 {
12947 /* Catch unhandled exceptions. */
761269c8 12948 *ex = ada_catch_exception_unhandled;
bc18fbb5 12949 excep_string->clear ();
f7f9143b
JB
12950 }
12951 else
12952 {
12953 /* Catch a specific exception. */
761269c8 12954 *ex = ada_catch_exception;
28010a5d 12955 *excep_string = exception_name;
f7f9143b
JB
12956 }
12957}
12958
12959/* Return the name of the symbol on which we should break in order to
12960 implement a catchpoint of the EX kind. */
12961
12962static const char *
761269c8 12963ada_exception_sym_name (enum ada_exception_catchpoint_kind ex)
f7f9143b 12964{
3eecfa55
JB
12965 struct ada_inferior_data *data = get_ada_inferior_data (current_inferior ());
12966
12967 gdb_assert (data->exception_info != NULL);
0259addd 12968
f7f9143b
JB
12969 switch (ex)
12970 {
761269c8 12971 case ada_catch_exception:
3eecfa55 12972 return (data->exception_info->catch_exception_sym);
f7f9143b 12973 break;
761269c8 12974 case ada_catch_exception_unhandled:
3eecfa55 12975 return (data->exception_info->catch_exception_unhandled_sym);
f7f9143b 12976 break;
761269c8 12977 case ada_catch_assert:
3eecfa55 12978 return (data->exception_info->catch_assert_sym);
f7f9143b 12979 break;
9f757bf7
XR
12980 case ada_catch_handlers:
12981 return (data->exception_info->catch_handlers_sym);
12982 break;
f7f9143b
JB
12983 default:
12984 internal_error (__FILE__, __LINE__,
12985 _("unexpected catchpoint kind (%d)"), ex);
12986 }
12987}
12988
12989/* Return the breakpoint ops "virtual table" used for catchpoints
12990 of the EX kind. */
12991
c0a91b2b 12992static const struct breakpoint_ops *
761269c8 12993ada_exception_breakpoint_ops (enum ada_exception_catchpoint_kind ex)
f7f9143b
JB
12994{
12995 switch (ex)
12996 {
761269c8 12997 case ada_catch_exception:
f7f9143b
JB
12998 return (&catch_exception_breakpoint_ops);
12999 break;
761269c8 13000 case ada_catch_exception_unhandled:
f7f9143b
JB
13001 return (&catch_exception_unhandled_breakpoint_ops);
13002 break;
761269c8 13003 case ada_catch_assert:
f7f9143b
JB
13004 return (&catch_assert_breakpoint_ops);
13005 break;
9f757bf7
XR
13006 case ada_catch_handlers:
13007 return (&catch_handlers_breakpoint_ops);
13008 break;
f7f9143b
JB
13009 default:
13010 internal_error (__FILE__, __LINE__,
13011 _("unexpected catchpoint kind (%d)"), ex);
13012 }
13013}
13014
13015/* Return the condition that will be used to match the current exception
13016 being raised with the exception that the user wants to catch. This
13017 assumes that this condition is used when the inferior just triggered
13018 an exception catchpoint.
cb7de75e 13019 EX: the type of catchpoints used for catching Ada exceptions. */
f7f9143b 13020
cb7de75e 13021static std::string
9f757bf7
XR
13022ada_exception_catchpoint_cond_string (const char *excep_string,
13023 enum ada_exception_catchpoint_kind ex)
f7f9143b 13024{
3d0b0fa3 13025 int i;
cb7de75e 13026 std::string result;
2ff0a947 13027 const char *name;
9f757bf7
XR
13028
13029 if (ex == ada_catch_handlers)
13030 {
13031 /* For exception handlers catchpoints, the condition string does
13032 not use the same parameter as for the other exceptions. */
2ff0a947
TT
13033 name = ("long_integer (GNAT_GCC_exception_Access"
13034 "(gcc_exception).all.occurrence.id)");
9f757bf7
XR
13035 }
13036 else
2ff0a947 13037 name = "long_integer (e)";
3d0b0fa3 13038
0963b4bd 13039 /* The standard exceptions are a special case. They are defined in
3d0b0fa3 13040 runtime units that have been compiled without debugging info; if
28010a5d 13041 EXCEP_STRING is the not-fully-qualified name of a standard
3d0b0fa3
JB
13042 exception (e.g. "constraint_error") then, during the evaluation
13043 of the condition expression, the symbol lookup on this name would
0963b4bd 13044 *not* return this standard exception. The catchpoint condition
3d0b0fa3
JB
13045 may then be set only on user-defined exceptions which have the
13046 same not-fully-qualified name (e.g. my_package.constraint_error).
13047
13048 To avoid this unexcepted behavior, these standard exceptions are
0963b4bd 13049 systematically prefixed by "standard". This means that "catch
3d0b0fa3
JB
13050 exception constraint_error" is rewritten into "catch exception
13051 standard.constraint_error".
13052
13053 If an exception named contraint_error is defined in another package of
13054 the inferior program, then the only way to specify this exception as a
13055 breakpoint condition is to use its fully-qualified named:
2ff0a947
TT
13056 e.g. my_package.constraint_error.
13057
13058 Furthermore, in some situations a standard exception's symbol may
13059 be present in more than one objfile, because the compiler may
13060 choose to emit copy relocations for them. So, we have to compare
13061 against all the possible addresses. */
3d0b0fa3 13062
2ff0a947
TT
13063 /* Storage for a rewritten symbol name. */
13064 std::string std_name;
3d0b0fa3
JB
13065 for (i = 0; i < sizeof (standard_exc) / sizeof (char *); i++)
13066 {
28010a5d 13067 if (strcmp (standard_exc [i], excep_string) == 0)
3d0b0fa3 13068 {
2ff0a947
TT
13069 std_name = std::string ("standard.") + excep_string;
13070 excep_string = std_name.c_str ();
9f757bf7 13071 break;
3d0b0fa3
JB
13072 }
13073 }
9f757bf7 13074
2ff0a947
TT
13075 excep_string = ada_encode (excep_string);
13076 std::vector<struct bound_minimal_symbol> symbols
13077 = ada_lookup_simple_minsyms (excep_string);
bde09ab7 13078 for (const bound_minimal_symbol &msym : symbols)
2ff0a947
TT
13079 {
13080 if (!result.empty ())
13081 result += " or ";
13082 string_appendf (result, "%s = %s", name,
13083 pulongest (BMSYMBOL_VALUE_ADDRESS (msym)));
13084 }
9f757bf7 13085
9f757bf7 13086 return result;
f7f9143b
JB
13087}
13088
13089/* Return the symtab_and_line that should be used to insert an exception
13090 catchpoint of the TYPE kind.
13091
28010a5d
PA
13092 ADDR_STRING returns the name of the function where the real
13093 breakpoint that implements the catchpoints is set, depending on the
13094 type of catchpoint we need to create. */
f7f9143b
JB
13095
13096static struct symtab_and_line
bc18fbb5 13097ada_exception_sal (enum ada_exception_catchpoint_kind ex,
cc12f4a8 13098 std::string *addr_string, const struct breakpoint_ops **ops)
f7f9143b
JB
13099{
13100 const char *sym_name;
13101 struct symbol *sym;
f7f9143b 13102
0259addd
JB
13103 /* First, find out which exception support info to use. */
13104 ada_exception_support_info_sniffer ();
13105
13106 /* Then lookup the function on which we will break in order to catch
f7f9143b 13107 the Ada exceptions requested by the user. */
f7f9143b
JB
13108 sym_name = ada_exception_sym_name (ex);
13109 sym = standard_lookup (sym_name, NULL, VAR_DOMAIN);
13110
57aff202
JB
13111 if (sym == NULL)
13112 error (_("Catchpoint symbol not found: %s"), sym_name);
13113
13114 if (SYMBOL_CLASS (sym) != LOC_BLOCK)
13115 error (_("Unable to insert catchpoint. %s is not a function."), sym_name);
f7f9143b
JB
13116
13117 /* Set ADDR_STRING. */
cc12f4a8 13118 *addr_string = sym_name;
f7f9143b 13119
f7f9143b 13120 /* Set OPS. */
4b9eee8c 13121 *ops = ada_exception_breakpoint_ops (ex);
f7f9143b 13122
f17011e0 13123 return find_function_start_sal (sym, 1);
f7f9143b
JB
13124}
13125
b4a5b78b 13126/* Create an Ada exception catchpoint.
f7f9143b 13127
b4a5b78b 13128 EX_KIND is the kind of exception catchpoint to be created.
5845583d 13129
bc18fbb5 13130 If EXCEPT_STRING is empty, this catchpoint is expected to trigger
2df4d1d5 13131 for all exceptions. Otherwise, EXCEPT_STRING indicates the name
bc18fbb5 13132 of the exception to which this catchpoint applies.
2df4d1d5 13133
bc18fbb5 13134 COND_STRING, if not empty, is the catchpoint condition.
f7f9143b 13135
b4a5b78b
JB
13136 TEMPFLAG, if nonzero, means that the underlying breakpoint
13137 should be temporary.
28010a5d 13138
b4a5b78b 13139 FROM_TTY is the usual argument passed to all commands implementations. */
28010a5d 13140
349774ef 13141void
28010a5d 13142create_ada_exception_catchpoint (struct gdbarch *gdbarch,
761269c8 13143 enum ada_exception_catchpoint_kind ex_kind,
bc18fbb5 13144 const std::string &excep_string,
56ecd069 13145 const std::string &cond_string,
28010a5d 13146 int tempflag,
349774ef 13147 int disabled,
28010a5d
PA
13148 int from_tty)
13149{
cc12f4a8 13150 std::string addr_string;
b4a5b78b 13151 const struct breakpoint_ops *ops = NULL;
bc18fbb5 13152 struct symtab_and_line sal = ada_exception_sal (ex_kind, &addr_string, &ops);
28010a5d 13153
b270e6f9 13154 std::unique_ptr<ada_catchpoint> c (new ada_catchpoint ());
cc12f4a8 13155 init_ada_exception_breakpoint (c.get (), gdbarch, sal, addr_string.c_str (),
349774ef 13156 ops, tempflag, disabled, from_tty);
28010a5d 13157 c->excep_string = excep_string;
9f757bf7 13158 create_excep_cond_exprs (c.get (), ex_kind);
56ecd069
XR
13159 if (!cond_string.empty ())
13160 set_breakpoint_condition (c.get (), cond_string.c_str (), from_tty);
b270e6f9 13161 install_breakpoint (0, std::move (c), 1);
f7f9143b
JB
13162}
13163
9ac4176b
PA
13164/* Implement the "catch exception" command. */
13165
13166static void
eb4c3f4a 13167catch_ada_exception_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13168 struct cmd_list_element *command)
13169{
a121b7c1 13170 const char *arg = arg_entry;
9ac4176b
PA
13171 struct gdbarch *gdbarch = get_current_arch ();
13172 int tempflag;
761269c8 13173 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 13174 std::string excep_string;
56ecd069 13175 std::string cond_string;
9ac4176b
PA
13176
13177 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13178
13179 if (!arg)
13180 arg = "";
9f757bf7 13181 catch_ada_exception_command_split (arg, false, &ex_kind, &excep_string,
bc18fbb5 13182 &cond_string);
9f757bf7
XR
13183 create_ada_exception_catchpoint (gdbarch, ex_kind,
13184 excep_string, cond_string,
13185 tempflag, 1 /* enabled */,
13186 from_tty);
13187}
13188
13189/* Implement the "catch handlers" command. */
13190
13191static void
13192catch_ada_handlers_command (const char *arg_entry, int from_tty,
13193 struct cmd_list_element *command)
13194{
13195 const char *arg = arg_entry;
13196 struct gdbarch *gdbarch = get_current_arch ();
13197 int tempflag;
13198 enum ada_exception_catchpoint_kind ex_kind;
bc18fbb5 13199 std::string excep_string;
56ecd069 13200 std::string cond_string;
9f757bf7
XR
13201
13202 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13203
13204 if (!arg)
13205 arg = "";
13206 catch_ada_exception_command_split (arg, true, &ex_kind, &excep_string,
bc18fbb5 13207 &cond_string);
b4a5b78b
JB
13208 create_ada_exception_catchpoint (gdbarch, ex_kind,
13209 excep_string, cond_string,
349774ef
JB
13210 tempflag, 1 /* enabled */,
13211 from_tty);
9ac4176b
PA
13212}
13213
71bed2db
TT
13214/* Completion function for the Ada "catch" commands. */
13215
13216static void
13217catch_ada_completer (struct cmd_list_element *cmd, completion_tracker &tracker,
13218 const char *text, const char *word)
13219{
13220 std::vector<ada_exc_info> exceptions = ada_exceptions_list (NULL);
13221
13222 for (const ada_exc_info &info : exceptions)
13223 {
13224 if (startswith (info.name, word))
b02f78f9 13225 tracker.add_completion (make_unique_xstrdup (info.name));
71bed2db
TT
13226 }
13227}
13228
b4a5b78b 13229/* Split the arguments specified in a "catch assert" command.
5845583d 13230
b4a5b78b
JB
13231 ARGS contains the command's arguments (or the empty string if
13232 no arguments were passed).
5845583d
JB
13233
13234 If ARGS contains a condition, set COND_STRING to that condition
b4a5b78b 13235 (the memory needs to be deallocated after use). */
5845583d 13236
b4a5b78b 13237static void
56ecd069 13238catch_ada_assert_command_split (const char *args, std::string &cond_string)
f7f9143b 13239{
f1735a53 13240 args = skip_spaces (args);
f7f9143b 13241
5845583d 13242 /* Check whether a condition was provided. */
61012eef 13243 if (startswith (args, "if")
5845583d 13244 && (isspace (args[2]) || args[2] == '\0'))
f7f9143b 13245 {
5845583d 13246 args += 2;
f1735a53 13247 args = skip_spaces (args);
5845583d
JB
13248 if (args[0] == '\0')
13249 error (_("condition missing after `if' keyword"));
56ecd069 13250 cond_string.assign (args);
f7f9143b
JB
13251 }
13252
5845583d
JB
13253 /* Otherwise, there should be no other argument at the end of
13254 the command. */
13255 else if (args[0] != '\0')
13256 error (_("Junk at end of arguments."));
f7f9143b
JB
13257}
13258
9ac4176b
PA
13259/* Implement the "catch assert" command. */
13260
13261static void
eb4c3f4a 13262catch_assert_command (const char *arg_entry, int from_tty,
9ac4176b
PA
13263 struct cmd_list_element *command)
13264{
a121b7c1 13265 const char *arg = arg_entry;
9ac4176b
PA
13266 struct gdbarch *gdbarch = get_current_arch ();
13267 int tempflag;
56ecd069 13268 std::string cond_string;
9ac4176b
PA
13269
13270 tempflag = get_cmd_context (command) == CATCH_TEMPORARY;
13271
13272 if (!arg)
13273 arg = "";
56ecd069 13274 catch_ada_assert_command_split (arg, cond_string);
761269c8 13275 create_ada_exception_catchpoint (gdbarch, ada_catch_assert,
241db429 13276 "", cond_string,
349774ef
JB
13277 tempflag, 1 /* enabled */,
13278 from_tty);
9ac4176b 13279}
778865d3
JB
13280
13281/* Return non-zero if the symbol SYM is an Ada exception object. */
13282
13283static int
13284ada_is_exception_sym (struct symbol *sym)
13285{
a737d952 13286 const char *type_name = TYPE_NAME (SYMBOL_TYPE (sym));
778865d3
JB
13287
13288 return (SYMBOL_CLASS (sym) != LOC_TYPEDEF
13289 && SYMBOL_CLASS (sym) != LOC_BLOCK
13290 && SYMBOL_CLASS (sym) != LOC_CONST
13291 && SYMBOL_CLASS (sym) != LOC_UNRESOLVED
13292 && type_name != NULL && strcmp (type_name, "exception") == 0);
13293}
13294
13295/* Given a global symbol SYM, return non-zero iff SYM is a non-standard
13296 Ada exception object. This matches all exceptions except the ones
13297 defined by the Ada language. */
13298
13299static int
13300ada_is_non_standard_exception_sym (struct symbol *sym)
13301{
13302 int i;
13303
13304 if (!ada_is_exception_sym (sym))
13305 return 0;
13306
13307 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13308 if (strcmp (SYMBOL_LINKAGE_NAME (sym), standard_exc[i]) == 0)
13309 return 0; /* A standard exception. */
13310
13311 /* Numeric_Error is also a standard exception, so exclude it.
13312 See the STANDARD_EXC description for more details as to why
13313 this exception is not listed in that array. */
13314 if (strcmp (SYMBOL_LINKAGE_NAME (sym), "numeric_error") == 0)
13315 return 0;
13316
13317 return 1;
13318}
13319
ab816a27 13320/* A helper function for std::sort, comparing two struct ada_exc_info
778865d3
JB
13321 objects.
13322
13323 The comparison is determined first by exception name, and then
13324 by exception address. */
13325
ab816a27 13326bool
cc536b21 13327ada_exc_info::operator< (const ada_exc_info &other) const
778865d3 13328{
778865d3
JB
13329 int result;
13330
ab816a27
TT
13331 result = strcmp (name, other.name);
13332 if (result < 0)
13333 return true;
13334 if (result == 0 && addr < other.addr)
13335 return true;
13336 return false;
13337}
778865d3 13338
ab816a27 13339bool
cc536b21 13340ada_exc_info::operator== (const ada_exc_info &other) const
ab816a27
TT
13341{
13342 return addr == other.addr && strcmp (name, other.name) == 0;
778865d3
JB
13343}
13344
13345/* Sort EXCEPTIONS using compare_ada_exception_info as the comparison
13346 routine, but keeping the first SKIP elements untouched.
13347
13348 All duplicates are also removed. */
13349
13350static void
ab816a27 13351sort_remove_dups_ada_exceptions_list (std::vector<ada_exc_info> *exceptions,
778865d3
JB
13352 int skip)
13353{
ab816a27
TT
13354 std::sort (exceptions->begin () + skip, exceptions->end ());
13355 exceptions->erase (std::unique (exceptions->begin () + skip, exceptions->end ()),
13356 exceptions->end ());
778865d3
JB
13357}
13358
778865d3
JB
13359/* Add all exceptions defined by the Ada standard whose name match
13360 a regular expression.
13361
13362 If PREG is not NULL, then this regexp_t object is used to
13363 perform the symbol name matching. Otherwise, no name-based
13364 filtering is performed.
13365
13366 EXCEPTIONS is a vector of exceptions to which matching exceptions
13367 gets pushed. */
13368
13369static void
2d7cc5c7 13370ada_add_standard_exceptions (compiled_regex *preg,
ab816a27 13371 std::vector<ada_exc_info> *exceptions)
778865d3
JB
13372{
13373 int i;
13374
13375 for (i = 0; i < ARRAY_SIZE (standard_exc); i++)
13376 {
13377 if (preg == NULL
2d7cc5c7 13378 || preg->exec (standard_exc[i], 0, NULL, 0) == 0)
778865d3
JB
13379 {
13380 struct bound_minimal_symbol msymbol
13381 = ada_lookup_simple_minsym (standard_exc[i]);
13382
13383 if (msymbol.minsym != NULL)
13384 {
13385 struct ada_exc_info info
77e371c0 13386 = {standard_exc[i], BMSYMBOL_VALUE_ADDRESS (msymbol)};
778865d3 13387
ab816a27 13388 exceptions->push_back (info);
778865d3
JB
13389 }
13390 }
13391 }
13392}
13393
13394/* Add all Ada exceptions defined locally and accessible from the given
13395 FRAME.
13396
13397 If PREG is not NULL, then this regexp_t object is used to
13398 perform the symbol name matching. Otherwise, no name-based
13399 filtering is performed.
13400
13401 EXCEPTIONS is a vector of exceptions to which matching exceptions
13402 gets pushed. */
13403
13404static void
2d7cc5c7
PA
13405ada_add_exceptions_from_frame (compiled_regex *preg,
13406 struct frame_info *frame,
ab816a27 13407 std::vector<ada_exc_info> *exceptions)
778865d3 13408{
3977b71f 13409 const struct block *block = get_frame_block (frame, 0);
778865d3
JB
13410
13411 while (block != 0)
13412 {
13413 struct block_iterator iter;
13414 struct symbol *sym;
13415
13416 ALL_BLOCK_SYMBOLS (block, iter, sym)
13417 {
13418 switch (SYMBOL_CLASS (sym))
13419 {
13420 case LOC_TYPEDEF:
13421 case LOC_BLOCK:
13422 case LOC_CONST:
13423 break;
13424 default:
13425 if (ada_is_exception_sym (sym))
13426 {
13427 struct ada_exc_info info = {SYMBOL_PRINT_NAME (sym),
13428 SYMBOL_VALUE_ADDRESS (sym)};
13429
ab816a27 13430 exceptions->push_back (info);
778865d3
JB
13431 }
13432 }
13433 }
13434 if (BLOCK_FUNCTION (block) != NULL)
13435 break;
13436 block = BLOCK_SUPERBLOCK (block);
13437 }
13438}
13439
14bc53a8
PA
13440/* Return true if NAME matches PREG or if PREG is NULL. */
13441
13442static bool
2d7cc5c7 13443name_matches_regex (const char *name, compiled_regex *preg)
14bc53a8
PA
13444{
13445 return (preg == NULL
2d7cc5c7 13446 || preg->exec (ada_decode (name), 0, NULL, 0) == 0);
14bc53a8
PA
13447}
13448
778865d3
JB
13449/* Add all exceptions defined globally whose name name match
13450 a regular expression, excluding standard exceptions.
13451
13452 The reason we exclude standard exceptions is that they need
13453 to be handled separately: Standard exceptions are defined inside
13454 a runtime unit which is normally not compiled with debugging info,
13455 and thus usually do not show up in our symbol search. However,
13456 if the unit was in fact built with debugging info, we need to
13457 exclude them because they would duplicate the entry we found
13458 during the special loop that specifically searches for those
13459 standard exceptions.
13460
13461 If PREG is not NULL, then this regexp_t object is used to
13462 perform the symbol name matching. Otherwise, no name-based
13463 filtering is performed.
13464
13465 EXCEPTIONS is a vector of exceptions to which matching exceptions
13466 gets pushed. */
13467
13468static void
2d7cc5c7 13469ada_add_global_exceptions (compiled_regex *preg,
ab816a27 13470 std::vector<ada_exc_info> *exceptions)
778865d3 13471{
14bc53a8
PA
13472 /* In Ada, the symbol "search name" is a linkage name, whereas the
13473 regular expression used to do the matching refers to the natural
13474 name. So match against the decoded name. */
13475 expand_symtabs_matching (NULL,
b5ec771e 13476 lookup_name_info::match_any (),
14bc53a8
PA
13477 [&] (const char *search_name)
13478 {
13479 const char *decoded = ada_decode (search_name);
13480 return name_matches_regex (decoded, preg);
13481 },
13482 NULL,
13483 VARIABLES_DOMAIN);
778865d3 13484
2030c079 13485 for (objfile *objfile : current_program_space->objfiles ())
778865d3 13486 {
b669c953 13487 for (compunit_symtab *s : objfile->compunits ())
778865d3 13488 {
d8aeb77f
TT
13489 const struct blockvector *bv = COMPUNIT_BLOCKVECTOR (s);
13490 int i;
778865d3 13491
d8aeb77f
TT
13492 for (i = GLOBAL_BLOCK; i <= STATIC_BLOCK; i++)
13493 {
582942f4 13494 const struct block *b = BLOCKVECTOR_BLOCK (bv, i);
d8aeb77f
TT
13495 struct block_iterator iter;
13496 struct symbol *sym;
778865d3 13497
d8aeb77f
TT
13498 ALL_BLOCK_SYMBOLS (b, iter, sym)
13499 if (ada_is_non_standard_exception_sym (sym)
13500 && name_matches_regex (SYMBOL_NATURAL_NAME (sym), preg))
13501 {
13502 struct ada_exc_info info
13503 = {SYMBOL_PRINT_NAME (sym), SYMBOL_VALUE_ADDRESS (sym)};
13504
13505 exceptions->push_back (info);
13506 }
13507 }
778865d3
JB
13508 }
13509 }
13510}
13511
13512/* Implements ada_exceptions_list with the regular expression passed
13513 as a regex_t, rather than a string.
13514
13515 If not NULL, PREG is used to filter out exceptions whose names
13516 do not match. Otherwise, all exceptions are listed. */
13517
ab816a27 13518static std::vector<ada_exc_info>
2d7cc5c7 13519ada_exceptions_list_1 (compiled_regex *preg)
778865d3 13520{
ab816a27 13521 std::vector<ada_exc_info> result;
778865d3
JB
13522 int prev_len;
13523
13524 /* First, list the known standard exceptions. These exceptions
13525 need to be handled separately, as they are usually defined in
13526 runtime units that have been compiled without debugging info. */
13527
13528 ada_add_standard_exceptions (preg, &result);
13529
13530 /* Next, find all exceptions whose scope is local and accessible
13531 from the currently selected frame. */
13532
13533 if (has_stack_frames ())
13534 {
ab816a27 13535 prev_len = result.size ();
778865d3
JB
13536 ada_add_exceptions_from_frame (preg, get_selected_frame (NULL),
13537 &result);
ab816a27 13538 if (result.size () > prev_len)
778865d3
JB
13539 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13540 }
13541
13542 /* Add all exceptions whose scope is global. */
13543
ab816a27 13544 prev_len = result.size ();
778865d3 13545 ada_add_global_exceptions (preg, &result);
ab816a27 13546 if (result.size () > prev_len)
778865d3
JB
13547 sort_remove_dups_ada_exceptions_list (&result, prev_len);
13548
778865d3
JB
13549 return result;
13550}
13551
13552/* Return a vector of ada_exc_info.
13553
13554 If REGEXP is NULL, all exceptions are included in the result.
13555 Otherwise, it should contain a valid regular expression,
13556 and only the exceptions whose names match that regular expression
13557 are included in the result.
13558
13559 The exceptions are sorted in the following order:
13560 - Standard exceptions (defined by the Ada language), in
13561 alphabetical order;
13562 - Exceptions only visible from the current frame, in
13563 alphabetical order;
13564 - Exceptions whose scope is global, in alphabetical order. */
13565
ab816a27 13566std::vector<ada_exc_info>
778865d3
JB
13567ada_exceptions_list (const char *regexp)
13568{
2d7cc5c7
PA
13569 if (regexp == NULL)
13570 return ada_exceptions_list_1 (NULL);
778865d3 13571
2d7cc5c7
PA
13572 compiled_regex reg (regexp, REG_NOSUB, _("invalid regular expression"));
13573 return ada_exceptions_list_1 (&reg);
778865d3
JB
13574}
13575
13576/* Implement the "info exceptions" command. */
13577
13578static void
1d12d88f 13579info_exceptions_command (const char *regexp, int from_tty)
778865d3 13580{
778865d3 13581 struct gdbarch *gdbarch = get_current_arch ();
778865d3 13582
ab816a27 13583 std::vector<ada_exc_info> exceptions = ada_exceptions_list (regexp);
778865d3
JB
13584
13585 if (regexp != NULL)
13586 printf_filtered
13587 (_("All Ada exceptions matching regular expression \"%s\":\n"), regexp);
13588 else
13589 printf_filtered (_("All defined Ada exceptions:\n"));
13590
ab816a27
TT
13591 for (const ada_exc_info &info : exceptions)
13592 printf_filtered ("%s: %s\n", info.name, paddress (gdbarch, info.addr));
778865d3
JB
13593}
13594
4c4b4cd2
PH
13595 /* Operators */
13596/* Information about operators given special treatment in functions
13597 below. */
13598/* Format: OP_DEFN (<operator>, <operator length>, <# args>, <binop>). */
13599
13600#define ADA_OPERATORS \
13601 OP_DEFN (OP_VAR_VALUE, 4, 0, 0) \
13602 OP_DEFN (BINOP_IN_BOUNDS, 3, 2, 0) \
13603 OP_DEFN (TERNOP_IN_RANGE, 1, 3, 0) \
13604 OP_DEFN (OP_ATR_FIRST, 1, 2, 0) \
13605 OP_DEFN (OP_ATR_LAST, 1, 2, 0) \
13606 OP_DEFN (OP_ATR_LENGTH, 1, 2, 0) \
13607 OP_DEFN (OP_ATR_IMAGE, 1, 2, 0) \
13608 OP_DEFN (OP_ATR_MAX, 1, 3, 0) \
13609 OP_DEFN (OP_ATR_MIN, 1, 3, 0) \
13610 OP_DEFN (OP_ATR_MODULUS, 1, 1, 0) \
13611 OP_DEFN (OP_ATR_POS, 1, 2, 0) \
13612 OP_DEFN (OP_ATR_SIZE, 1, 1, 0) \
13613 OP_DEFN (OP_ATR_TAG, 1, 1, 0) \
13614 OP_DEFN (OP_ATR_VAL, 1, 2, 0) \
13615 OP_DEFN (UNOP_QUAL, 3, 1, 0) \
52ce6436
PH
13616 OP_DEFN (UNOP_IN_RANGE, 3, 1, 0) \
13617 OP_DEFN (OP_OTHERS, 1, 1, 0) \
13618 OP_DEFN (OP_POSITIONAL, 3, 1, 0) \
13619 OP_DEFN (OP_DISCRETE_RANGE, 1, 2, 0)
4c4b4cd2
PH
13620
13621static void
554794dc
SDJ
13622ada_operator_length (const struct expression *exp, int pc, int *oplenp,
13623 int *argsp)
4c4b4cd2
PH
13624{
13625 switch (exp->elts[pc - 1].opcode)
13626 {
76a01679 13627 default:
4c4b4cd2
PH
13628 operator_length_standard (exp, pc, oplenp, argsp);
13629 break;
13630
13631#define OP_DEFN(op, len, args, binop) \
13632 case op: *oplenp = len; *argsp = args; break;
13633 ADA_OPERATORS;
13634#undef OP_DEFN
52ce6436
PH
13635
13636 case OP_AGGREGATE:
13637 *oplenp = 3;
13638 *argsp = longest_to_int (exp->elts[pc - 2].longconst);
13639 break;
13640
13641 case OP_CHOICES:
13642 *oplenp = 3;
13643 *argsp = longest_to_int (exp->elts[pc - 2].longconst) + 1;
13644 break;
4c4b4cd2
PH
13645 }
13646}
13647
c0201579
JK
13648/* Implementation of the exp_descriptor method operator_check. */
13649
13650static int
13651ada_operator_check (struct expression *exp, int pos,
13652 int (*objfile_func) (struct objfile *objfile, void *data),
13653 void *data)
13654{
13655 const union exp_element *const elts = exp->elts;
13656 struct type *type = NULL;
13657
13658 switch (elts[pos].opcode)
13659 {
13660 case UNOP_IN_RANGE:
13661 case UNOP_QUAL:
13662 type = elts[pos + 1].type;
13663 break;
13664
13665 default:
13666 return operator_check_standard (exp, pos, objfile_func, data);
13667 }
13668
13669 /* Invoke callbacks for TYPE and OBJFILE if they were set as non-NULL. */
13670
13671 if (type && TYPE_OBJFILE (type)
13672 && (*objfile_func) (TYPE_OBJFILE (type), data))
13673 return 1;
13674
13675 return 0;
13676}
13677
a121b7c1 13678static const char *
4c4b4cd2
PH
13679ada_op_name (enum exp_opcode opcode)
13680{
13681 switch (opcode)
13682 {
76a01679 13683 default:
4c4b4cd2 13684 return op_name_standard (opcode);
52ce6436 13685
4c4b4cd2
PH
13686#define OP_DEFN(op, len, args, binop) case op: return #op;
13687 ADA_OPERATORS;
13688#undef OP_DEFN
52ce6436
PH
13689
13690 case OP_AGGREGATE:
13691 return "OP_AGGREGATE";
13692 case OP_CHOICES:
13693 return "OP_CHOICES";
13694 case OP_NAME:
13695 return "OP_NAME";
4c4b4cd2
PH
13696 }
13697}
13698
13699/* As for operator_length, but assumes PC is pointing at the first
13700 element of the operator, and gives meaningful results only for the
52ce6436 13701 Ada-specific operators, returning 0 for *OPLENP and *ARGSP otherwise. */
4c4b4cd2
PH
13702
13703static void
76a01679
JB
13704ada_forward_operator_length (struct expression *exp, int pc,
13705 int *oplenp, int *argsp)
4c4b4cd2 13706{
76a01679 13707 switch (exp->elts[pc].opcode)
4c4b4cd2
PH
13708 {
13709 default:
13710 *oplenp = *argsp = 0;
13711 break;
52ce6436 13712
4c4b4cd2
PH
13713#define OP_DEFN(op, len, args, binop) \
13714 case op: *oplenp = len; *argsp = args; break;
13715 ADA_OPERATORS;
13716#undef OP_DEFN
52ce6436
PH
13717
13718 case OP_AGGREGATE:
13719 *oplenp = 3;
13720 *argsp = longest_to_int (exp->elts[pc + 1].longconst);
13721 break;
13722
13723 case OP_CHOICES:
13724 *oplenp = 3;
13725 *argsp = longest_to_int (exp->elts[pc + 1].longconst) + 1;
13726 break;
13727
13728 case OP_STRING:
13729 case OP_NAME:
13730 {
13731 int len = longest_to_int (exp->elts[pc + 1].longconst);
5b4ee69b 13732
52ce6436
PH
13733 *oplenp = 4 + BYTES_TO_EXP_ELEM (len + 1);
13734 *argsp = 0;
13735 break;
13736 }
4c4b4cd2
PH
13737 }
13738}
13739
13740static int
13741ada_dump_subexp_body (struct expression *exp, struct ui_file *stream, int elt)
13742{
13743 enum exp_opcode op = exp->elts[elt].opcode;
13744 int oplen, nargs;
13745 int pc = elt;
13746 int i;
76a01679 13747
4c4b4cd2
PH
13748 ada_forward_operator_length (exp, elt, &oplen, &nargs);
13749
76a01679 13750 switch (op)
4c4b4cd2 13751 {
76a01679 13752 /* Ada attributes ('Foo). */
4c4b4cd2
PH
13753 case OP_ATR_FIRST:
13754 case OP_ATR_LAST:
13755 case OP_ATR_LENGTH:
13756 case OP_ATR_IMAGE:
13757 case OP_ATR_MAX:
13758 case OP_ATR_MIN:
13759 case OP_ATR_MODULUS:
13760 case OP_ATR_POS:
13761 case OP_ATR_SIZE:
13762 case OP_ATR_TAG:
13763 case OP_ATR_VAL:
13764 break;
13765
13766 case UNOP_IN_RANGE:
13767 case UNOP_QUAL:
323e0a4a
AC
13768 /* XXX: gdb_sprint_host_address, type_sprint */
13769 fprintf_filtered (stream, _("Type @"));
4c4b4cd2
PH
13770 gdb_print_host_address (exp->elts[pc + 1].type, stream);
13771 fprintf_filtered (stream, " (");
13772 type_print (exp->elts[pc + 1].type, NULL, stream, 0);
13773 fprintf_filtered (stream, ")");
13774 break;
13775 case BINOP_IN_BOUNDS:
52ce6436
PH
13776 fprintf_filtered (stream, " (%d)",
13777 longest_to_int (exp->elts[pc + 2].longconst));
4c4b4cd2
PH
13778 break;
13779 case TERNOP_IN_RANGE:
13780 break;
13781
52ce6436
PH
13782 case OP_AGGREGATE:
13783 case OP_OTHERS:
13784 case OP_DISCRETE_RANGE:
13785 case OP_POSITIONAL:
13786 case OP_CHOICES:
13787 break;
13788
13789 case OP_NAME:
13790 case OP_STRING:
13791 {
13792 char *name = &exp->elts[elt + 2].string;
13793 int len = longest_to_int (exp->elts[elt + 1].longconst);
5b4ee69b 13794
52ce6436
PH
13795 fprintf_filtered (stream, "Text: `%.*s'", len, name);
13796 break;
13797 }
13798
4c4b4cd2
PH
13799 default:
13800 return dump_subexp_body_standard (exp, stream, elt);
13801 }
13802
13803 elt += oplen;
13804 for (i = 0; i < nargs; i += 1)
13805 elt = dump_subexp (exp, stream, elt);
13806
13807 return elt;
13808}
13809
13810/* The Ada extension of print_subexp (q.v.). */
13811
76a01679
JB
13812static void
13813ada_print_subexp (struct expression *exp, int *pos,
13814 struct ui_file *stream, enum precedence prec)
4c4b4cd2 13815{
52ce6436 13816 int oplen, nargs, i;
4c4b4cd2
PH
13817 int pc = *pos;
13818 enum exp_opcode op = exp->elts[pc].opcode;
13819
13820 ada_forward_operator_length (exp, pc, &oplen, &nargs);
13821
52ce6436 13822 *pos += oplen;
4c4b4cd2
PH
13823 switch (op)
13824 {
13825 default:
52ce6436 13826 *pos -= oplen;
4c4b4cd2
PH
13827 print_subexp_standard (exp, pos, stream, prec);
13828 return;
13829
13830 case OP_VAR_VALUE:
4c4b4cd2
PH
13831 fputs_filtered (SYMBOL_NATURAL_NAME (exp->elts[pc + 2].symbol), stream);
13832 return;
13833
13834 case BINOP_IN_BOUNDS:
323e0a4a 13835 /* XXX: sprint_subexp */
4c4b4cd2 13836 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13837 fputs_filtered (" in ", stream);
4c4b4cd2 13838 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13839 fputs_filtered ("'range", stream);
4c4b4cd2 13840 if (exp->elts[pc + 1].longconst > 1)
76a01679
JB
13841 fprintf_filtered (stream, "(%ld)",
13842 (long) exp->elts[pc + 1].longconst);
4c4b4cd2
PH
13843 return;
13844
13845 case TERNOP_IN_RANGE:
4c4b4cd2 13846 if (prec >= PREC_EQUAL)
76a01679 13847 fputs_filtered ("(", stream);
323e0a4a 13848 /* XXX: sprint_subexp */
4c4b4cd2 13849 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13850 fputs_filtered (" in ", stream);
4c4b4cd2
PH
13851 print_subexp (exp, pos, stream, PREC_EQUAL);
13852 fputs_filtered (" .. ", stream);
13853 print_subexp (exp, pos, stream, PREC_EQUAL);
13854 if (prec >= PREC_EQUAL)
76a01679
JB
13855 fputs_filtered (")", stream);
13856 return;
4c4b4cd2
PH
13857
13858 case OP_ATR_FIRST:
13859 case OP_ATR_LAST:
13860 case OP_ATR_LENGTH:
13861 case OP_ATR_IMAGE:
13862 case OP_ATR_MAX:
13863 case OP_ATR_MIN:
13864 case OP_ATR_MODULUS:
13865 case OP_ATR_POS:
13866 case OP_ATR_SIZE:
13867 case OP_ATR_TAG:
13868 case OP_ATR_VAL:
4c4b4cd2 13869 if (exp->elts[*pos].opcode == OP_TYPE)
76a01679
JB
13870 {
13871 if (TYPE_CODE (exp->elts[*pos + 1].type) != TYPE_CODE_VOID)
79d43c61
TT
13872 LA_PRINT_TYPE (exp->elts[*pos + 1].type, "", stream, 0, 0,
13873 &type_print_raw_options);
76a01679
JB
13874 *pos += 3;
13875 }
4c4b4cd2 13876 else
76a01679 13877 print_subexp (exp, pos, stream, PREC_SUFFIX);
4c4b4cd2
PH
13878 fprintf_filtered (stream, "'%s", ada_attribute_name (op));
13879 if (nargs > 1)
76a01679
JB
13880 {
13881 int tem;
5b4ee69b 13882
76a01679
JB
13883 for (tem = 1; tem < nargs; tem += 1)
13884 {
13885 fputs_filtered ((tem == 1) ? " (" : ", ", stream);
13886 print_subexp (exp, pos, stream, PREC_ABOVE_COMMA);
13887 }
13888 fputs_filtered (")", stream);
13889 }
4c4b4cd2 13890 return;
14f9c5c9 13891
4c4b4cd2 13892 case UNOP_QUAL:
4c4b4cd2
PH
13893 type_print (exp->elts[pc + 1].type, "", stream, 0);
13894 fputs_filtered ("'(", stream);
13895 print_subexp (exp, pos, stream, PREC_PREFIX);
13896 fputs_filtered (")", stream);
13897 return;
14f9c5c9 13898
4c4b4cd2 13899 case UNOP_IN_RANGE:
323e0a4a 13900 /* XXX: sprint_subexp */
4c4b4cd2 13901 print_subexp (exp, pos, stream, PREC_SUFFIX);
0b48a291 13902 fputs_filtered (" in ", stream);
79d43c61
TT
13903 LA_PRINT_TYPE (exp->elts[pc + 1].type, "", stream, 1, 0,
13904 &type_print_raw_options);
4c4b4cd2 13905 return;
52ce6436
PH
13906
13907 case OP_DISCRETE_RANGE:
13908 print_subexp (exp, pos, stream, PREC_SUFFIX);
13909 fputs_filtered ("..", stream);
13910 print_subexp (exp, pos, stream, PREC_SUFFIX);
13911 return;
13912
13913 case OP_OTHERS:
13914 fputs_filtered ("others => ", stream);
13915 print_subexp (exp, pos, stream, PREC_SUFFIX);
13916 return;
13917
13918 case OP_CHOICES:
13919 for (i = 0; i < nargs-1; i += 1)
13920 {
13921 if (i > 0)
13922 fputs_filtered ("|", stream);
13923 print_subexp (exp, pos, stream, PREC_SUFFIX);
13924 }
13925 fputs_filtered (" => ", stream);
13926 print_subexp (exp, pos, stream, PREC_SUFFIX);
13927 return;
13928
13929 case OP_POSITIONAL:
13930 print_subexp (exp, pos, stream, PREC_SUFFIX);
13931 return;
13932
13933 case OP_AGGREGATE:
13934 fputs_filtered ("(", stream);
13935 for (i = 0; i < nargs; i += 1)
13936 {
13937 if (i > 0)
13938 fputs_filtered (", ", stream);
13939 print_subexp (exp, pos, stream, PREC_SUFFIX);
13940 }
13941 fputs_filtered (")", stream);
13942 return;
4c4b4cd2
PH
13943 }
13944}
14f9c5c9
AS
13945
13946/* Table mapping opcodes into strings for printing operators
13947 and precedences of the operators. */
13948
d2e4a39e
AS
13949static const struct op_print ada_op_print_tab[] = {
13950 {":=", BINOP_ASSIGN, PREC_ASSIGN, 1},
13951 {"or else", BINOP_LOGICAL_OR, PREC_LOGICAL_OR, 0},
13952 {"and then", BINOP_LOGICAL_AND, PREC_LOGICAL_AND, 0},
13953 {"or", BINOP_BITWISE_IOR, PREC_BITWISE_IOR, 0},
13954 {"xor", BINOP_BITWISE_XOR, PREC_BITWISE_XOR, 0},
13955 {"and", BINOP_BITWISE_AND, PREC_BITWISE_AND, 0},
13956 {"=", BINOP_EQUAL, PREC_EQUAL, 0},
13957 {"/=", BINOP_NOTEQUAL, PREC_EQUAL, 0},
13958 {"<=", BINOP_LEQ, PREC_ORDER, 0},
13959 {">=", BINOP_GEQ, PREC_ORDER, 0},
13960 {">", BINOP_GTR, PREC_ORDER, 0},
13961 {"<", BINOP_LESS, PREC_ORDER, 0},
13962 {">>", BINOP_RSH, PREC_SHIFT, 0},
13963 {"<<", BINOP_LSH, PREC_SHIFT, 0},
13964 {"+", BINOP_ADD, PREC_ADD, 0},
13965 {"-", BINOP_SUB, PREC_ADD, 0},
13966 {"&", BINOP_CONCAT, PREC_ADD, 0},
13967 {"*", BINOP_MUL, PREC_MUL, 0},
13968 {"/", BINOP_DIV, PREC_MUL, 0},
13969 {"rem", BINOP_REM, PREC_MUL, 0},
13970 {"mod", BINOP_MOD, PREC_MUL, 0},
13971 {"**", BINOP_EXP, PREC_REPEAT, 0},
13972 {"@", BINOP_REPEAT, PREC_REPEAT, 0},
13973 {"-", UNOP_NEG, PREC_PREFIX, 0},
13974 {"+", UNOP_PLUS, PREC_PREFIX, 0},
13975 {"not ", UNOP_LOGICAL_NOT, PREC_PREFIX, 0},
13976 {"not ", UNOP_COMPLEMENT, PREC_PREFIX, 0},
13977 {"abs ", UNOP_ABS, PREC_PREFIX, 0},
4c4b4cd2
PH
13978 {".all", UNOP_IND, PREC_SUFFIX, 1},
13979 {"'access", UNOP_ADDR, PREC_SUFFIX, 1},
13980 {"'size", OP_ATR_SIZE, PREC_SUFFIX, 1},
f486487f 13981 {NULL, OP_NULL, PREC_SUFFIX, 0}
14f9c5c9
AS
13982};
13983\f
72d5681a
PH
13984enum ada_primitive_types {
13985 ada_primitive_type_int,
13986 ada_primitive_type_long,
13987 ada_primitive_type_short,
13988 ada_primitive_type_char,
13989 ada_primitive_type_float,
13990 ada_primitive_type_double,
13991 ada_primitive_type_void,
13992 ada_primitive_type_long_long,
13993 ada_primitive_type_long_double,
13994 ada_primitive_type_natural,
13995 ada_primitive_type_positive,
13996 ada_primitive_type_system_address,
08f49010 13997 ada_primitive_type_storage_offset,
72d5681a
PH
13998 nr_ada_primitive_types
13999};
6c038f32
PH
14000
14001static void
d4a9a881 14002ada_language_arch_info (struct gdbarch *gdbarch,
72d5681a
PH
14003 struct language_arch_info *lai)
14004{
d4a9a881 14005 const struct builtin_type *builtin = builtin_type (gdbarch);
5b4ee69b 14006
72d5681a 14007 lai->primitive_type_vector
d4a9a881 14008 = GDBARCH_OBSTACK_CALLOC (gdbarch, nr_ada_primitive_types + 1,
72d5681a 14009 struct type *);
e9bb382b
UW
14010
14011 lai->primitive_type_vector [ada_primitive_type_int]
14012 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14013 0, "integer");
14014 lai->primitive_type_vector [ada_primitive_type_long]
14015 = arch_integer_type (gdbarch, gdbarch_long_bit (gdbarch),
14016 0, "long_integer");
14017 lai->primitive_type_vector [ada_primitive_type_short]
14018 = arch_integer_type (gdbarch, gdbarch_short_bit (gdbarch),
14019 0, "short_integer");
14020 lai->string_char_type
14021 = lai->primitive_type_vector [ada_primitive_type_char]
cd7c1778 14022 = arch_character_type (gdbarch, TARGET_CHAR_BIT, 0, "character");
e9bb382b
UW
14023 lai->primitive_type_vector [ada_primitive_type_float]
14024 = arch_float_type (gdbarch, gdbarch_float_bit (gdbarch),
49f190bc 14025 "float", gdbarch_float_format (gdbarch));
e9bb382b
UW
14026 lai->primitive_type_vector [ada_primitive_type_double]
14027 = arch_float_type (gdbarch, gdbarch_double_bit (gdbarch),
49f190bc 14028 "long_float", gdbarch_double_format (gdbarch));
e9bb382b
UW
14029 lai->primitive_type_vector [ada_primitive_type_long_long]
14030 = arch_integer_type (gdbarch, gdbarch_long_long_bit (gdbarch),
14031 0, "long_long_integer");
14032 lai->primitive_type_vector [ada_primitive_type_long_double]
5f3bceb6 14033 = arch_float_type (gdbarch, gdbarch_long_double_bit (gdbarch),
49f190bc 14034 "long_long_float", gdbarch_long_double_format (gdbarch));
e9bb382b
UW
14035 lai->primitive_type_vector [ada_primitive_type_natural]
14036 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14037 0, "natural");
14038 lai->primitive_type_vector [ada_primitive_type_positive]
14039 = arch_integer_type (gdbarch, gdbarch_int_bit (gdbarch),
14040 0, "positive");
14041 lai->primitive_type_vector [ada_primitive_type_void]
14042 = builtin->builtin_void;
14043
14044 lai->primitive_type_vector [ada_primitive_type_system_address]
77b7c781
UW
14045 = lookup_pointer_type (arch_type (gdbarch, TYPE_CODE_VOID, TARGET_CHAR_BIT,
14046 "void"));
72d5681a
PH
14047 TYPE_NAME (lai->primitive_type_vector [ada_primitive_type_system_address])
14048 = "system__address";
fbb06eb1 14049
08f49010
XR
14050 /* Create the equivalent of the System.Storage_Elements.Storage_Offset
14051 type. This is a signed integral type whose size is the same as
14052 the size of addresses. */
14053 {
14054 unsigned int addr_length = TYPE_LENGTH
14055 (lai->primitive_type_vector [ada_primitive_type_system_address]);
14056
14057 lai->primitive_type_vector [ada_primitive_type_storage_offset]
14058 = arch_integer_type (gdbarch, addr_length * HOST_CHAR_BIT, 0,
14059 "storage_offset");
14060 }
14061
47e729a8 14062 lai->bool_type_symbol = NULL;
fbb06eb1 14063 lai->bool_type_default = builtin->builtin_bool;
6c038f32 14064}
6c038f32
PH
14065\f
14066 /* Language vector */
14067
14068/* Not really used, but needed in the ada_language_defn. */
14069
14070static void
6c7a06a3 14071emit_char (int c, struct type *type, struct ui_file *stream, int quoter)
6c038f32 14072{
6c7a06a3 14073 ada_emit_char (c, type, stream, quoter, 1);
6c038f32
PH
14074}
14075
14076static int
410a0ff2 14077parse (struct parser_state *ps)
6c038f32
PH
14078{
14079 warnings_issued = 0;
410a0ff2 14080 return ada_parse (ps);
6c038f32
PH
14081}
14082
14083static const struct exp_descriptor ada_exp_descriptor = {
14084 ada_print_subexp,
14085 ada_operator_length,
c0201579 14086 ada_operator_check,
6c038f32
PH
14087 ada_op_name,
14088 ada_dump_subexp_body,
14089 ada_evaluate_subexp
14090};
14091
b5ec771e
PA
14092/* symbol_name_matcher_ftype adapter for wild_match. */
14093
14094static bool
14095do_wild_match (const char *symbol_search_name,
14096 const lookup_name_info &lookup_name,
a207cff2 14097 completion_match_result *comp_match_res)
b5ec771e
PA
14098{
14099 return wild_match (symbol_search_name, ada_lookup_name (lookup_name));
14100}
14101
14102/* symbol_name_matcher_ftype adapter for full_match. */
14103
14104static bool
14105do_full_match (const char *symbol_search_name,
14106 const lookup_name_info &lookup_name,
a207cff2 14107 completion_match_result *comp_match_res)
b5ec771e
PA
14108{
14109 return full_match (symbol_search_name, ada_lookup_name (lookup_name));
14110}
14111
a2cd4f14
JB
14112/* symbol_name_matcher_ftype for exact (verbatim) matches. */
14113
14114static bool
14115do_exact_match (const char *symbol_search_name,
14116 const lookup_name_info &lookup_name,
14117 completion_match_result *comp_match_res)
14118{
14119 return strcmp (symbol_search_name, ada_lookup_name (lookup_name)) == 0;
14120}
14121
b5ec771e
PA
14122/* Build the Ada lookup name for LOOKUP_NAME. */
14123
14124ada_lookup_name_info::ada_lookup_name_info (const lookup_name_info &lookup_name)
14125{
14126 const std::string &user_name = lookup_name.name ();
14127
14128 if (user_name[0] == '<')
14129 {
14130 if (user_name.back () == '>')
14131 m_encoded_name = user_name.substr (1, user_name.size () - 2);
14132 else
14133 m_encoded_name = user_name.substr (1, user_name.size () - 1);
14134 m_encoded_p = true;
14135 m_verbatim_p = true;
14136 m_wild_match_p = false;
14137 m_standard_p = false;
14138 }
14139 else
14140 {
14141 m_verbatim_p = false;
14142
14143 m_encoded_p = user_name.find ("__") != std::string::npos;
14144
14145 if (!m_encoded_p)
14146 {
14147 const char *folded = ada_fold_name (user_name.c_str ());
14148 const char *encoded = ada_encode_1 (folded, false);
14149 if (encoded != NULL)
14150 m_encoded_name = encoded;
14151 else
14152 m_encoded_name = user_name;
14153 }
14154 else
14155 m_encoded_name = user_name;
14156
14157 /* Handle the 'package Standard' special case. See description
14158 of m_standard_p. */
14159 if (startswith (m_encoded_name.c_str (), "standard__"))
14160 {
14161 m_encoded_name = m_encoded_name.substr (sizeof ("standard__") - 1);
14162 m_standard_p = true;
14163 }
14164 else
14165 m_standard_p = false;
74ccd7f5 14166
b5ec771e
PA
14167 /* If the name contains a ".", then the user is entering a fully
14168 qualified entity name, and the match must not be done in wild
14169 mode. Similarly, if the user wants to complete what looks
14170 like an encoded name, the match must not be done in wild
14171 mode. Also, in the standard__ special case always do
14172 non-wild matching. */
14173 m_wild_match_p
14174 = (lookup_name.match_type () != symbol_name_match_type::FULL
14175 && !m_encoded_p
14176 && !m_standard_p
14177 && user_name.find ('.') == std::string::npos);
14178 }
14179}
14180
14181/* symbol_name_matcher_ftype method for Ada. This only handles
14182 completion mode. */
14183
14184static bool
14185ada_symbol_name_matches (const char *symbol_search_name,
14186 const lookup_name_info &lookup_name,
a207cff2 14187 completion_match_result *comp_match_res)
74ccd7f5 14188{
b5ec771e
PA
14189 return lookup_name.ada ().matches (symbol_search_name,
14190 lookup_name.match_type (),
a207cff2 14191 comp_match_res);
b5ec771e
PA
14192}
14193
de63c46b
PA
14194/* A name matcher that matches the symbol name exactly, with
14195 strcmp. */
14196
14197static bool
14198literal_symbol_name_matcher (const char *symbol_search_name,
14199 const lookup_name_info &lookup_name,
14200 completion_match_result *comp_match_res)
14201{
14202 const std::string &name = lookup_name.name ();
14203
14204 int cmp = (lookup_name.completion_mode ()
14205 ? strncmp (symbol_search_name, name.c_str (), name.size ())
14206 : strcmp (symbol_search_name, name.c_str ()));
14207 if (cmp == 0)
14208 {
14209 if (comp_match_res != NULL)
14210 comp_match_res->set_match (symbol_search_name);
14211 return true;
14212 }
14213 else
14214 return false;
14215}
14216
b5ec771e
PA
14217/* Implement the "la_get_symbol_name_matcher" language_defn method for
14218 Ada. */
14219
14220static symbol_name_matcher_ftype *
14221ada_get_symbol_name_matcher (const lookup_name_info &lookup_name)
14222{
de63c46b
PA
14223 if (lookup_name.match_type () == symbol_name_match_type::SEARCH_NAME)
14224 return literal_symbol_name_matcher;
14225
b5ec771e
PA
14226 if (lookup_name.completion_mode ())
14227 return ada_symbol_name_matches;
74ccd7f5 14228 else
b5ec771e
PA
14229 {
14230 if (lookup_name.ada ().wild_match_p ())
14231 return do_wild_match;
a2cd4f14
JB
14232 else if (lookup_name.ada ().verbatim_p ())
14233 return do_exact_match;
b5ec771e
PA
14234 else
14235 return do_full_match;
14236 }
74ccd7f5
JB
14237}
14238
a5ee536b
JB
14239/* Implement the "la_read_var_value" language_defn method for Ada. */
14240
14241static struct value *
63e43d3a
PMR
14242ada_read_var_value (struct symbol *var, const struct block *var_block,
14243 struct frame_info *frame)
a5ee536b 14244{
a5ee536b
JB
14245 /* The only case where default_read_var_value is not sufficient
14246 is when VAR is a renaming... */
c0e70c62
TT
14247 if (frame != nullptr)
14248 {
14249 const struct block *frame_block = get_frame_block (frame, NULL);
14250 if (frame_block != nullptr && ada_is_renaming_symbol (var))
14251 return ada_read_renaming_var_value (var, frame_block);
14252 }
a5ee536b
JB
14253
14254 /* This is a typical case where we expect the default_read_var_value
14255 function to work. */
63e43d3a 14256 return default_read_var_value (var, var_block, frame);
a5ee536b
JB
14257}
14258
56618e20
TT
14259static const char *ada_extensions[] =
14260{
14261 ".adb", ".ads", ".a", ".ada", ".dg", NULL
14262};
14263
47e77640 14264extern const struct language_defn ada_language_defn = {
6c038f32 14265 "ada", /* Language name */
6abde28f 14266 "Ada",
6c038f32 14267 language_ada,
6c038f32 14268 range_check_off,
6c038f32
PH
14269 case_sensitive_on, /* Yes, Ada is case-insensitive, but
14270 that's not quite what this means. */
6c038f32 14271 array_row_major,
9a044a89 14272 macro_expansion_no,
56618e20 14273 ada_extensions,
6c038f32
PH
14274 &ada_exp_descriptor,
14275 parse,
6c038f32
PH
14276 resolve,
14277 ada_printchar, /* Print a character constant */
14278 ada_printstr, /* Function to print string constant */
14279 emit_char, /* Function to print single char (not used) */
6c038f32 14280 ada_print_type, /* Print a type using appropriate syntax */
be942545 14281 ada_print_typedef, /* Print a typedef using appropriate syntax */
6c038f32
PH
14282 ada_val_print, /* Print a value using appropriate syntax */
14283 ada_value_print, /* Print a top-level value */
a5ee536b 14284 ada_read_var_value, /* la_read_var_value */
6c038f32 14285 NULL, /* Language specific skip_trampoline */
2b2d9e11 14286 NULL, /* name_of_this */
59cc4834 14287 true, /* la_store_sym_names_in_linkage_form_p */
6c038f32
PH
14288 ada_lookup_symbol_nonlocal, /* Looking up non-local symbols. */
14289 basic_lookup_transparent_type, /* lookup_transparent_type */
14290 ada_la_decode, /* Language specific symbol demangler */
8b302db8 14291 ada_sniff_from_mangled_name,
0963b4bd
MS
14292 NULL, /* Language specific
14293 class_name_from_physname */
6c038f32
PH
14294 ada_op_print_tab, /* expression operators for printing */
14295 0, /* c-style arrays */
14296 1, /* String lower bound */
6c038f32 14297 ada_get_gdb_completer_word_break_characters,
eb3ff9a5 14298 ada_collect_symbol_completion_matches,
72d5681a 14299 ada_language_arch_info,
e79af960 14300 ada_print_array_index,
41f1b697 14301 default_pass_by_reference,
ae6a3a4c 14302 c_get_string,
e2b7af72 14303 ada_watch_location_expression,
b5ec771e 14304 ada_get_symbol_name_matcher, /* la_get_symbol_name_matcher */
f8eba3c6 14305 ada_iterate_over_symbols,
5ffa0793 14306 default_search_name_hash,
a53b64ea 14307 &ada_varobj_ops,
bb2ec1b3 14308 NULL,
721b08c6 14309 NULL,
4be290b2 14310 ada_is_string_type,
721b08c6 14311 "(...)" /* la_struct_too_deep_ellipsis */
6c038f32
PH
14312};
14313
5bf03f13
JB
14314/* Command-list for the "set/show ada" prefix command. */
14315static struct cmd_list_element *set_ada_list;
14316static struct cmd_list_element *show_ada_list;
14317
14318/* Implement the "set ada" prefix command. */
14319
14320static void
981a3fb3 14321set_ada_command (const char *arg, int from_tty)
5bf03f13
JB
14322{
14323 printf_unfiltered (_(\
14324"\"set ada\" must be followed by the name of a setting.\n"));
635c7e8a 14325 help_list (set_ada_list, "set ada ", all_commands, gdb_stdout);
5bf03f13
JB
14326}
14327
14328/* Implement the "show ada" prefix command. */
14329
14330static void
981a3fb3 14331show_ada_command (const char *args, int from_tty)
5bf03f13
JB
14332{
14333 cmd_show_list (show_ada_list, from_tty, "");
14334}
14335
2060206e
PA
14336static void
14337initialize_ada_catchpoint_ops (void)
14338{
14339 struct breakpoint_ops *ops;
14340
14341 initialize_breakpoint_ops ();
14342
14343 ops = &catch_exception_breakpoint_ops;
14344 *ops = bkpt_breakpoint_ops;
2060206e
PA
14345 ops->allocate_location = allocate_location_catch_exception;
14346 ops->re_set = re_set_catch_exception;
14347 ops->check_status = check_status_catch_exception;
14348 ops->print_it = print_it_catch_exception;
14349 ops->print_one = print_one_catch_exception;
14350 ops->print_mention = print_mention_catch_exception;
14351 ops->print_recreate = print_recreate_catch_exception;
14352
14353 ops = &catch_exception_unhandled_breakpoint_ops;
14354 *ops = bkpt_breakpoint_ops;
2060206e
PA
14355 ops->allocate_location = allocate_location_catch_exception_unhandled;
14356 ops->re_set = re_set_catch_exception_unhandled;
14357 ops->check_status = check_status_catch_exception_unhandled;
14358 ops->print_it = print_it_catch_exception_unhandled;
14359 ops->print_one = print_one_catch_exception_unhandled;
14360 ops->print_mention = print_mention_catch_exception_unhandled;
14361 ops->print_recreate = print_recreate_catch_exception_unhandled;
14362
14363 ops = &catch_assert_breakpoint_ops;
14364 *ops = bkpt_breakpoint_ops;
2060206e
PA
14365 ops->allocate_location = allocate_location_catch_assert;
14366 ops->re_set = re_set_catch_assert;
14367 ops->check_status = check_status_catch_assert;
14368 ops->print_it = print_it_catch_assert;
14369 ops->print_one = print_one_catch_assert;
14370 ops->print_mention = print_mention_catch_assert;
14371 ops->print_recreate = print_recreate_catch_assert;
9f757bf7
XR
14372
14373 ops = &catch_handlers_breakpoint_ops;
14374 *ops = bkpt_breakpoint_ops;
14375 ops->allocate_location = allocate_location_catch_handlers;
14376 ops->re_set = re_set_catch_handlers;
14377 ops->check_status = check_status_catch_handlers;
14378 ops->print_it = print_it_catch_handlers;
14379 ops->print_one = print_one_catch_handlers;
14380 ops->print_mention = print_mention_catch_handlers;
14381 ops->print_recreate = print_recreate_catch_handlers;
2060206e
PA
14382}
14383
3d9434b5
JB
14384/* This module's 'new_objfile' observer. */
14385
14386static void
14387ada_new_objfile_observer (struct objfile *objfile)
14388{
14389 ada_clear_symbol_cache ();
14390}
14391
14392/* This module's 'free_objfile' observer. */
14393
14394static void
14395ada_free_objfile_observer (struct objfile *objfile)
14396{
14397 ada_clear_symbol_cache ();
14398}
14399
d2e4a39e 14400void
6c038f32 14401_initialize_ada_language (void)
14f9c5c9 14402{
2060206e
PA
14403 initialize_ada_catchpoint_ops ();
14404
5bf03f13 14405 add_prefix_cmd ("ada", no_class, set_ada_command,
470678d7 14406 _("Prefix command for changing Ada-specific settings"),
5bf03f13
JB
14407 &set_ada_list, "set ada ", 0, &setlist);
14408
14409 add_prefix_cmd ("ada", no_class, show_ada_command,
14410 _("Generic command for showing Ada-specific settings."),
14411 &show_ada_list, "show ada ", 0, &showlist);
14412
14413 add_setshow_boolean_cmd ("trust-PAD-over-XVS", class_obscure,
14414 &trust_pad_over_xvs, _("\
14415Enable or disable an optimization trusting PAD types over XVS types"), _("\
14416Show whether an optimization trusting PAD types over XVS types is activated"),
14417 _("\
14418This is related to the encoding used by the GNAT compiler. The debugger\n\
14419should normally trust the contents of PAD types, but certain older versions\n\
14420of GNAT have a bug that sometimes causes the information in the PAD type\n\
14421to be incorrect. Turning this setting \"off\" allows the debugger to\n\
14422work around this bug. It is always safe to turn this option \"off\", but\n\
14423this incurs a slight performance penalty, so it is recommended to NOT change\n\
14424this option to \"off\" unless necessary."),
14425 NULL, NULL, &set_ada_list, &show_ada_list);
14426
d72413e6
PMR
14427 add_setshow_boolean_cmd ("print-signatures", class_vars,
14428 &print_signatures, _("\
14429Enable or disable the output of formal and return types for functions in the \
14430overloads selection menu"), _("\
14431Show whether the output of formal and return types for functions in the \
14432overloads selection menu is activated"),
14433 NULL, NULL, NULL, &set_ada_list, &show_ada_list);
14434
9ac4176b
PA
14435 add_catch_command ("exception", _("\
14436Catch Ada exceptions, when raised.\n\
9bf7038b 14437Usage: catch exception [ARG] [if CONDITION]\n\
60a90376
JB
14438Without any argument, stop when any Ada exception is raised.\n\
14439If ARG is \"unhandled\" (without the quotes), only stop when the exception\n\
14440being raised does not have a handler (and will therefore lead to the task's\n\
14441termination).\n\
14442Otherwise, the catchpoint only stops when the name of the exception being\n\
9bf7038b
TT
14443raised is the same as ARG.\n\
14444CONDITION is a boolean expression that is evaluated to see whether the\n\
14445exception should cause a stop."),
9ac4176b 14446 catch_ada_exception_command,
71bed2db 14447 catch_ada_completer,
9ac4176b
PA
14448 CATCH_PERMANENT,
14449 CATCH_TEMPORARY);
9f757bf7
XR
14450
14451 add_catch_command ("handlers", _("\
14452Catch Ada exceptions, when handled.\n\
9bf7038b
TT
14453Usage: catch handlers [ARG] [if CONDITION]\n\
14454Without any argument, stop when any Ada exception is handled.\n\
14455With an argument, catch only exceptions with the given name.\n\
14456CONDITION is a boolean expression that is evaluated to see whether the\n\
14457exception should cause a stop."),
9f757bf7 14458 catch_ada_handlers_command,
71bed2db 14459 catch_ada_completer,
9f757bf7
XR
14460 CATCH_PERMANENT,
14461 CATCH_TEMPORARY);
9ac4176b
PA
14462 add_catch_command ("assert", _("\
14463Catch failed Ada assertions, when raised.\n\
9bf7038b
TT
14464Usage: catch assert [if CONDITION]\n\
14465CONDITION is a boolean expression that is evaluated to see whether the\n\
14466exception should cause a stop."),
9ac4176b
PA
14467 catch_assert_command,
14468 NULL,
14469 CATCH_PERMANENT,
14470 CATCH_TEMPORARY);
14471
6c038f32 14472 varsize_limit = 65536;
3fcded8f
JB
14473 add_setshow_uinteger_cmd ("varsize-limit", class_support,
14474 &varsize_limit, _("\
14475Set the maximum number of bytes allowed in a variable-size object."), _("\
14476Show the maximum number of bytes allowed in a variable-size object."), _("\
14477Attempts to access an object whose size is not a compile-time constant\n\
14478and exceeds this limit will cause an error."),
14479 NULL, NULL, &setlist, &showlist);
6c038f32 14480
778865d3
JB
14481 add_info ("exceptions", info_exceptions_command,
14482 _("\
14483List all Ada exception names.\n\
9bf7038b 14484Usage: info exceptions [REGEXP]\n\
778865d3
JB
14485If a regular expression is passed as an argument, only those matching\n\
14486the regular expression are listed."));
14487
c6044dd1
JB
14488 add_prefix_cmd ("ada", class_maintenance, maint_set_ada_cmd,
14489 _("Set Ada maintenance-related variables."),
14490 &maint_set_ada_cmdlist, "maintenance set ada ",
14491 0/*allow-unknown*/, &maintenance_set_cmdlist);
14492
14493 add_prefix_cmd ("ada", class_maintenance, maint_show_ada_cmd,
14494 _("Show Ada maintenance-related variables"),
14495 &maint_show_ada_cmdlist, "maintenance show ada ",
14496 0/*allow-unknown*/, &maintenance_show_cmdlist);
14497
14498 add_setshow_boolean_cmd
14499 ("ignore-descriptive-types", class_maintenance,
14500 &ada_ignore_descriptive_types_p,
14501 _("Set whether descriptive types generated by GNAT should be ignored."),
14502 _("Show whether descriptive types generated by GNAT should be ignored."),
14503 _("\
14504When enabled, the debugger will stop using the DW_AT_GNAT_descriptive_type\n\
14505DWARF attribute."),
14506 NULL, NULL, &maint_set_ada_cmdlist, &maint_show_ada_cmdlist);
14507
459a2e4c
TT
14508 decoded_names_store = htab_create_alloc (256, htab_hash_string, streq_hash,
14509 NULL, xcalloc, xfree);
6b69afc4 14510
3d9434b5 14511 /* The ada-lang observers. */
76727919
TT
14512 gdb::observers::new_objfile.attach (ada_new_objfile_observer);
14513 gdb::observers::free_objfile.attach (ada_free_objfile_observer);
14514 gdb::observers::inferior_exit.attach (ada_inferior_exit);
14f9c5c9 14515}