]>
Commit | Line | Data |
---|---|---|
c906108c | 1 | /* Support routines for decoding "stabs" debugging information format. |
cf5b2f1b | 2 | |
3666a048 | 3 | Copyright (C) 1986-2021 Free Software Foundation, Inc. |
c906108c | 4 | |
c5aa993b | 5 | This file is part of GDB. |
c906108c | 6 | |
c5aa993b JM |
7 | This program is free software; you can redistribute it and/or modify |
8 | it under the terms of the GNU General Public License as published by | |
a9762ec7 | 9 | the Free Software Foundation; either version 3 of the License, or |
c5aa993b | 10 | (at your option) any later version. |
c906108c | 11 | |
c5aa993b JM |
12 | This program is distributed in the hope that it will be useful, |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
c906108c | 16 | |
c5aa993b | 17 | You should have received a copy of the GNU General Public License |
a9762ec7 | 18 | along with this program. If not, see <http://www.gnu.org/licenses/>. */ |
c906108c SS |
19 | |
20 | /* Support routines for reading and decoding debugging information in | |
1736a7bd PA |
21 | the "stabs" format. This format is used by some systems that use |
22 | COFF or ELF where the stabs data is placed in a special section (as | |
23 | well as with many old systems that used the a.out object file | |
24 | format). Avoid placing any object file format specific code in | |
25 | this file. */ | |
c906108c SS |
26 | |
27 | #include "defs.h" | |
c906108c | 28 | #include "bfd.h" |
04ea0df1 | 29 | #include "gdb_obstack.h" |
c906108c SS |
30 | #include "symtab.h" |
31 | #include "gdbtypes.h" | |
32 | #include "expression.h" | |
33 | #include "symfile.h" | |
34 | #include "objfiles.h" | |
3e43a32a | 35 | #include "aout/stab_gnu.h" /* We always use GNU stabs, not native. */ |
c906108c SS |
36 | #include "libaout.h" |
37 | #include "aout/aout64.h" | |
38 | #include "gdb-stabs.h" | |
0baae8db | 39 | #include "buildsym-legacy.h" |
c906108c SS |
40 | #include "complaints.h" |
41 | #include "demangle.h" | |
50f182aa | 42 | #include "gdb-demangle.h" |
c906108c | 43 | #include "language.h" |
f69fdf9b | 44 | #include "target-float.h" |
bad5c026 | 45 | #include "c-lang.h" |
de17c821 DJ |
46 | #include "cp-abi.h" |
47 | #include "cp-support.h" | |
c906108c SS |
48 | #include <ctype.h> |
49 | ||
d65d5705 TT |
50 | #include "stabsread.h" |
51 | ||
52 | /* See stabsread.h for these globals. */ | |
53 | unsigned int symnum; | |
54 | const char *(*next_symbol_text_func) (struct objfile *); | |
55 | unsigned char processing_gcc_compilation; | |
56 | int within_function; | |
57 | struct symbol *global_sym_chain[HASHSIZE]; | |
58 | struct pending_stabs *global_stabs; | |
59 | int previous_stab_code; | |
60 | int *this_object_header_files; | |
61 | int n_this_object_header_files; | |
62 | int n_allocated_this_object_header_files; | |
c906108c | 63 | |
52059ffd TT |
64 | struct nextfield |
65 | { | |
66 | struct nextfield *next; | |
67 | ||
68 | /* This is the raw visibility from the stab. It is not checked | |
69 | for being one of the visibilities we recognize, so code which | |
70 | examines this field better be able to deal. */ | |
71 | int visibility; | |
72 | ||
73 | struct field field; | |
74 | }; | |
75 | ||
76 | struct next_fnfieldlist | |
77 | { | |
78 | struct next_fnfieldlist *next; | |
79 | struct fn_fieldlist fn_fieldlist; | |
80 | }; | |
81 | ||
c906108c SS |
82 | /* The routines that read and process a complete stabs for a C struct or |
83 | C++ class pass lists of data member fields and lists of member function | |
84 | fields in an instance of a field_info structure, as defined below. | |
85 | This is part of some reorganization of low level C++ support and is | |
c378eb4e | 86 | expected to eventually go away... (FIXME) */ |
c906108c | 87 | |
61b30099 | 88 | struct stab_field_info |
c5aa993b | 89 | { |
61b30099 TT |
90 | struct nextfield *list = nullptr; |
91 | struct next_fnfieldlist *fnlist = nullptr; | |
92 | ||
93 | auto_obstack obstack; | |
c5aa993b | 94 | }; |
c906108c SS |
95 | |
96 | static void | |
61b30099 | 97 | read_one_struct_field (struct stab_field_info *, const char **, const char *, |
a14ed312 | 98 | struct type *, struct objfile *); |
c906108c | 99 | |
a14ed312 | 100 | static struct type *dbx_alloc_type (int[2], struct objfile *); |
c906108c | 101 | |
a121b7c1 | 102 | static long read_huge_number (const char **, int, int *, int); |
c906108c | 103 | |
a121b7c1 | 104 | static struct type *error_type (const char **, struct objfile *); |
c906108c SS |
105 | |
106 | static void | |
a14ed312 KB |
107 | patch_block_stabs (struct pending *, struct pending_stabs *, |
108 | struct objfile *); | |
c906108c | 109 | |
46cb6474 | 110 | static void fix_common_block (struct symbol *, CORE_ADDR); |
c906108c | 111 | |
a121b7c1 | 112 | static int read_type_number (const char **, int *); |
c906108c | 113 | |
a121b7c1 | 114 | static struct type *read_type (const char **, struct objfile *); |
a7a48797 | 115 | |
a121b7c1 PA |
116 | static struct type *read_range_type (const char **, int[2], |
117 | int, struct objfile *); | |
c906108c | 118 | |
a121b7c1 PA |
119 | static struct type *read_sun_builtin_type (const char **, |
120 | int[2], struct objfile *); | |
c906108c | 121 | |
a121b7c1 | 122 | static struct type *read_sun_floating_type (const char **, int[2], |
a14ed312 | 123 | struct objfile *); |
c906108c | 124 | |
a121b7c1 | 125 | static struct type *read_enum_type (const char **, struct type *, struct objfile *); |
c906108c | 126 | |
46bf5051 | 127 | static struct type *rs6000_builtin_type (int, struct objfile *); |
c906108c SS |
128 | |
129 | static int | |
61b30099 | 130 | read_member_functions (struct stab_field_info *, const char **, struct type *, |
a14ed312 | 131 | struct objfile *); |
c906108c SS |
132 | |
133 | static int | |
61b30099 | 134 | read_struct_fields (struct stab_field_info *, const char **, struct type *, |
a14ed312 | 135 | struct objfile *); |
c906108c SS |
136 | |
137 | static int | |
61b30099 | 138 | read_baseclasses (struct stab_field_info *, const char **, struct type *, |
a14ed312 | 139 | struct objfile *); |
c906108c SS |
140 | |
141 | static int | |
61b30099 | 142 | read_tilde_fields (struct stab_field_info *, const char **, struct type *, |
a14ed312 | 143 | struct objfile *); |
c906108c | 144 | |
61b30099 | 145 | static int attach_fn_fields_to_type (struct stab_field_info *, struct type *); |
c906108c | 146 | |
61b30099 | 147 | static int attach_fields_to_type (struct stab_field_info *, struct type *, |
570b8f7c | 148 | struct objfile *); |
c906108c | 149 | |
a121b7c1 | 150 | static struct type *read_struct_type (const char **, struct type *, |
dda83cd7 | 151 | enum type_code, |
a14ed312 | 152 | struct objfile *); |
c906108c | 153 | |
a121b7c1 | 154 | static struct type *read_array_type (const char **, struct type *, |
a14ed312 | 155 | struct objfile *); |
c906108c | 156 | |
a121b7c1 PA |
157 | static struct field *read_args (const char **, int, struct objfile *, |
158 | int *, int *); | |
c906108c | 159 | |
bf362611 | 160 | static void add_undefined_type (struct type *, int[2]); |
a7a48797 | 161 | |
c906108c | 162 | static int |
61b30099 | 163 | read_cpp_abbrev (struct stab_field_info *, const char **, struct type *, |
a14ed312 | 164 | struct objfile *); |
c906108c | 165 | |
a121b7c1 | 166 | static const char *find_name_end (const char *name); |
7e1d63ec | 167 | |
a121b7c1 | 168 | static int process_reference (const char **string); |
c906108c | 169 | |
a14ed312 | 170 | void stabsread_clear_cache (void); |
7be570e7 | 171 | |
8343f86c DJ |
172 | static const char vptr_name[] = "_vptr$"; |
173 | static const char vb_name[] = "_vb$"; | |
c906108c | 174 | |
23136709 KB |
175 | static void |
176 | invalid_cpp_abbrev_complaint (const char *arg1) | |
177 | { | |
b98664d3 | 178 | complaint (_("invalid C++ abbreviation `%s'"), arg1); |
23136709 | 179 | } |
c906108c | 180 | |
23136709 | 181 | static void |
49b0b195 | 182 | reg_value_complaint (int regnum, int num_regs, const char *sym) |
23136709 | 183 | { |
b98664d3 | 184 | complaint (_("bad register number %d (max %d) in symbol %s"), |
dda83cd7 | 185 | regnum, num_regs - 1, sym); |
23136709 | 186 | } |
c906108c | 187 | |
23136709 KB |
188 | static void |
189 | stabs_general_complaint (const char *arg1) | |
190 | { | |
b98664d3 | 191 | complaint ("%s", arg1); |
23136709 | 192 | } |
c906108c | 193 | |
c906108c SS |
194 | /* Make a list of forward references which haven't been defined. */ |
195 | ||
196 | static struct type **undef_types; | |
197 | static int undef_types_allocated; | |
198 | static int undef_types_length; | |
199 | static struct symbol *current_symbol = NULL; | |
200 | ||
bf362611 JB |
201 | /* Make a list of nameless types that are undefined. |
202 | This happens when another type is referenced by its number | |
c378eb4e | 203 | before this type is actually defined. For instance "t(0,1)=k(0,2)" |
bf362611 JB |
204 | and type (0,2) is defined only later. */ |
205 | ||
206 | struct nat | |
207 | { | |
208 | int typenums[2]; | |
209 | struct type *type; | |
210 | }; | |
211 | static struct nat *noname_undefs; | |
212 | static int noname_undefs_allocated; | |
213 | static int noname_undefs_length; | |
214 | ||
c906108c SS |
215 | /* Check for and handle cretinous stabs symbol name continuation! */ |
216 | #define STABS_CONTINUE(pp,objfile) \ | |
217 | do { \ | |
218 | if (**(pp) == '\\' || (**(pp) == '?' && (*(pp))[1] == '\0')) \ | |
219 | *(pp) = next_symbol_text (objfile); \ | |
220 | } while (0) | |
fc474241 DE |
221 | |
222 | /* Vector of types defined so far, indexed by their type numbers. | |
223 | (In newer sun systems, dbx uses a pair of numbers in parens, | |
224 | as in "(SUBFILENUM,NUMWITHINSUBFILE)". | |
225 | Then these numbers must be translated through the type_translations | |
226 | hash table to get the index into the type vector.) */ | |
227 | ||
228 | static struct type **type_vector; | |
229 | ||
230 | /* Number of elements allocated for type_vector currently. */ | |
231 | ||
232 | static int type_vector_length; | |
233 | ||
234 | /* Initial size of type vector. Is realloc'd larger if needed, and | |
235 | realloc'd down to the size actually used, when completed. */ | |
236 | ||
237 | #define INITIAL_TYPE_VECTOR_LENGTH 160 | |
c906108c | 238 | \f |
c906108c SS |
239 | |
240 | /* Look up a dbx type-number pair. Return the address of the slot | |
241 | where the type for that number-pair is stored. | |
242 | The number-pair is in TYPENUMS. | |
243 | ||
244 | This can be used for finding the type associated with that pair | |
245 | or for associating a new type with the pair. */ | |
246 | ||
a7a48797 | 247 | static struct type ** |
46bf5051 | 248 | dbx_lookup_type (int typenums[2], struct objfile *objfile) |
c906108c | 249 | { |
52f0bd74 AC |
250 | int filenum = typenums[0]; |
251 | int index = typenums[1]; | |
c906108c | 252 | unsigned old_len; |
52f0bd74 AC |
253 | int real_filenum; |
254 | struct header_file *f; | |
c906108c SS |
255 | int f_orig_length; |
256 | ||
257 | if (filenum == -1) /* -1,-1 is for temporary types. */ | |
258 | return 0; | |
259 | ||
260 | if (filenum < 0 || filenum >= n_this_object_header_files) | |
261 | { | |
b98664d3 | 262 | complaint (_("Invalid symbol data: type number " |
3e43a32a | 263 | "(%d,%d) out of range at symtab pos %d."), |
23136709 | 264 | filenum, index, symnum); |
c906108c SS |
265 | goto error_return; |
266 | } | |
267 | ||
268 | if (filenum == 0) | |
269 | { | |
270 | if (index < 0) | |
271 | { | |
272 | /* Caller wants address of address of type. We think | |
273 | that negative (rs6k builtin) types will never appear as | |
274 | "lvalues", (nor should they), so we stuff the real type | |
275 | pointer into a temp, and return its address. If referenced, | |
276 | this will do the right thing. */ | |
277 | static struct type *temp_type; | |
278 | ||
46bf5051 | 279 | temp_type = rs6000_builtin_type (index, objfile); |
c906108c SS |
280 | return &temp_type; |
281 | } | |
282 | ||
283 | /* Type is defined outside of header files. | |
dda83cd7 | 284 | Find it in this object file's type vector. */ |
c906108c SS |
285 | if (index >= type_vector_length) |
286 | { | |
287 | old_len = type_vector_length; | |
288 | if (old_len == 0) | |
289 | { | |
290 | type_vector_length = INITIAL_TYPE_VECTOR_LENGTH; | |
8d749320 | 291 | type_vector = XNEWVEC (struct type *, type_vector_length); |
c906108c SS |
292 | } |
293 | while (index >= type_vector_length) | |
294 | { | |
295 | type_vector_length *= 2; | |
296 | } | |
297 | type_vector = (struct type **) | |
298 | xrealloc ((char *) type_vector, | |
299 | (type_vector_length * sizeof (struct type *))); | |
300 | memset (&type_vector[old_len], 0, | |
301 | (type_vector_length - old_len) * sizeof (struct type *)); | |
c906108c SS |
302 | } |
303 | return (&type_vector[index]); | |
304 | } | |
305 | else | |
306 | { | |
307 | real_filenum = this_object_header_files[filenum]; | |
308 | ||
46bf5051 | 309 | if (real_filenum >= N_HEADER_FILES (objfile)) |
c906108c | 310 | { |
46bf5051 | 311 | static struct type *temp_type; |
c906108c | 312 | |
8a3fe4f8 | 313 | warning (_("GDB internal error: bad real_filenum")); |
c906108c SS |
314 | |
315 | error_return: | |
46bf5051 UW |
316 | temp_type = objfile_type (objfile)->builtin_error; |
317 | return &temp_type; | |
c906108c SS |
318 | } |
319 | ||
46bf5051 | 320 | f = HEADER_FILES (objfile) + real_filenum; |
c906108c SS |
321 | |
322 | f_orig_length = f->length; | |
323 | if (index >= f_orig_length) | |
324 | { | |
325 | while (index >= f->length) | |
326 | { | |
327 | f->length *= 2; | |
328 | } | |
329 | f->vector = (struct type **) | |
330 | xrealloc ((char *) f->vector, f->length * sizeof (struct type *)); | |
331 | memset (&f->vector[f_orig_length], 0, | |
332 | (f->length - f_orig_length) * sizeof (struct type *)); | |
333 | } | |
334 | return (&f->vector[index]); | |
335 | } | |
336 | } | |
337 | ||
338 | /* Make sure there is a type allocated for type numbers TYPENUMS | |
339 | and return the type object. | |
340 | This can create an empty (zeroed) type object. | |
341 | TYPENUMS may be (-1, -1) to return a new type object that is not | |
c378eb4e | 342 | put into the type vector, and so may not be referred to by number. */ |
c906108c SS |
343 | |
344 | static struct type * | |
35a2f538 | 345 | dbx_alloc_type (int typenums[2], struct objfile *objfile) |
c906108c | 346 | { |
52f0bd74 | 347 | struct type **type_addr; |
c906108c SS |
348 | |
349 | if (typenums[0] == -1) | |
350 | { | |
351 | return (alloc_type (objfile)); | |
352 | } | |
353 | ||
46bf5051 | 354 | type_addr = dbx_lookup_type (typenums, objfile); |
c906108c SS |
355 | |
356 | /* If we are referring to a type not known at all yet, | |
357 | allocate an empty type for it. | |
358 | We will fill it in later if we find out how. */ | |
359 | if (*type_addr == 0) | |
360 | { | |
361 | *type_addr = alloc_type (objfile); | |
362 | } | |
363 | ||
364 | return (*type_addr); | |
365 | } | |
366 | ||
9b790ce7 UW |
367 | /* Allocate a floating-point type of size BITS. */ |
368 | ||
369 | static struct type * | |
370 | dbx_init_float_type (struct objfile *objfile, int bits) | |
371 | { | |
08feed99 | 372 | struct gdbarch *gdbarch = objfile->arch (); |
9b790ce7 UW |
373 | const struct floatformat **format; |
374 | struct type *type; | |
375 | ||
376 | format = gdbarch_floatformat_for_type (gdbarch, NULL, bits); | |
377 | if (format) | |
378 | type = init_float_type (objfile, bits, NULL, format); | |
379 | else | |
77b7c781 | 380 | type = init_type (objfile, TYPE_CODE_ERROR, bits, NULL); |
9b790ce7 UW |
381 | |
382 | return type; | |
383 | } | |
384 | ||
c906108c | 385 | /* for all the stabs in a given stab vector, build appropriate types |
c378eb4e | 386 | and fix their symbols in given symbol vector. */ |
c906108c SS |
387 | |
388 | static void | |
fba45db2 KB |
389 | patch_block_stabs (struct pending *symbols, struct pending_stabs *stabs, |
390 | struct objfile *objfile) | |
c906108c SS |
391 | { |
392 | int ii; | |
393 | char *name; | |
a121b7c1 | 394 | const char *pp; |
c906108c SS |
395 | struct symbol *sym; |
396 | ||
397 | if (stabs) | |
398 | { | |
c906108c | 399 | /* for all the stab entries, find their corresponding symbols and |
dda83cd7 | 400 | patch their types! */ |
c5aa993b | 401 | |
c906108c SS |
402 | for (ii = 0; ii < stabs->count; ++ii) |
403 | { | |
404 | name = stabs->stab[ii]; | |
c5aa993b | 405 | pp = (char *) strchr (name, ':'); |
8fb822e0 | 406 | gdb_assert (pp); /* Must find a ':' or game's over. */ |
c906108c SS |
407 | while (pp[1] == ':') |
408 | { | |
c5aa993b JM |
409 | pp += 2; |
410 | pp = (char *) strchr (pp, ':'); | |
c906108c | 411 | } |
c5aa993b | 412 | sym = find_symbol_in_list (symbols, name, pp - name); |
c906108c SS |
413 | if (!sym) |
414 | { | |
415 | /* FIXME-maybe: it would be nice if we noticed whether | |
dda83cd7 SM |
416 | the variable was defined *anywhere*, not just whether |
417 | it is defined in this compilation unit. But neither | |
418 | xlc or GCC seem to need such a definition, and until | |
419 | we do psymtabs (so that the minimal symbols from all | |
420 | compilation units are available now), I'm not sure | |
421 | how to get the information. */ | |
c906108c SS |
422 | |
423 | /* On xcoff, if a global is defined and never referenced, | |
dda83cd7 SM |
424 | ld will remove it from the executable. There is then |
425 | a N_GSYM stab for it, but no regular (C_EXT) symbol. */ | |
8c14c3a3 | 426 | sym = new (&objfile->objfile_obstack) symbol; |
176620f1 | 427 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
f1e6e072 | 428 | SYMBOL_ACLASS_INDEX (sym) = LOC_OPTIMIZED_OUT; |
43678b0a CB |
429 | sym->set_linkage_name |
430 | (obstack_strndup (&objfile->objfile_obstack, name, pp - name)); | |
c906108c | 431 | pp += 2; |
c5aa993b | 432 | if (*(pp - 1) == 'F' || *(pp - 1) == 'f') |
c906108c SS |
433 | { |
434 | /* I don't think the linker does this with functions, | |
435 | so as far as I know this is never executed. | |
436 | But it doesn't hurt to check. */ | |
437 | SYMBOL_TYPE (sym) = | |
438 | lookup_function_type (read_type (&pp, objfile)); | |
439 | } | |
440 | else | |
441 | { | |
442 | SYMBOL_TYPE (sym) = read_type (&pp, objfile); | |
443 | } | |
e148f09d | 444 | add_symbol_to_list (sym, get_global_symbols ()); |
c906108c SS |
445 | } |
446 | else | |
447 | { | |
448 | pp += 2; | |
c5aa993b | 449 | if (*(pp - 1) == 'F' || *(pp - 1) == 'f') |
c906108c SS |
450 | { |
451 | SYMBOL_TYPE (sym) = | |
452 | lookup_function_type (read_type (&pp, objfile)); | |
453 | } | |
454 | else | |
455 | { | |
456 | SYMBOL_TYPE (sym) = read_type (&pp, objfile); | |
457 | } | |
458 | } | |
459 | } | |
460 | } | |
461 | } | |
c906108c | 462 | \f |
c5aa993b | 463 | |
c906108c SS |
464 | /* Read a number by which a type is referred to in dbx data, |
465 | or perhaps read a pair (FILENUM, TYPENUM) in parentheses. | |
466 | Just a single number N is equivalent to (0,N). | |
467 | Return the two numbers by storing them in the vector TYPENUMS. | |
468 | TYPENUMS will then be used as an argument to dbx_lookup_type. | |
469 | ||
470 | Returns 0 for success, -1 for error. */ | |
471 | ||
472 | static int | |
a121b7c1 | 473 | read_type_number (const char **pp, int *typenums) |
c906108c SS |
474 | { |
475 | int nbits; | |
433759f7 | 476 | |
c906108c SS |
477 | if (**pp == '(') |
478 | { | |
479 | (*pp)++; | |
94e10a22 | 480 | typenums[0] = read_huge_number (pp, ',', &nbits, 0); |
c5aa993b JM |
481 | if (nbits != 0) |
482 | return -1; | |
94e10a22 | 483 | typenums[1] = read_huge_number (pp, ')', &nbits, 0); |
c5aa993b JM |
484 | if (nbits != 0) |
485 | return -1; | |
c906108c SS |
486 | } |
487 | else | |
488 | { | |
489 | typenums[0] = 0; | |
94e10a22 | 490 | typenums[1] = read_huge_number (pp, 0, &nbits, 0); |
c5aa993b JM |
491 | if (nbits != 0) |
492 | return -1; | |
c906108c SS |
493 | } |
494 | return 0; | |
495 | } | |
c906108c | 496 | \f |
c5aa993b | 497 | |
c906108c SS |
498 | #define VISIBILITY_PRIVATE '0' /* Stabs character for private field */ |
499 | #define VISIBILITY_PROTECTED '1' /* Stabs character for protected fld */ | |
500 | #define VISIBILITY_PUBLIC '2' /* Stabs character for public field */ | |
501 | #define VISIBILITY_IGNORE '9' /* Optimized out or zero length */ | |
502 | ||
c906108c | 503 | /* Structure for storing pointers to reference definitions for fast lookup |
c378eb4e | 504 | during "process_later". */ |
c906108c SS |
505 | |
506 | struct ref_map | |
507 | { | |
a121b7c1 | 508 | const char *stabs; |
c906108c SS |
509 | CORE_ADDR value; |
510 | struct symbol *sym; | |
511 | }; | |
512 | ||
513 | #define MAX_CHUNK_REFS 100 | |
514 | #define REF_CHUNK_SIZE (MAX_CHUNK_REFS * sizeof (struct ref_map)) | |
515 | #define REF_MAP_SIZE(ref_chunk) ((ref_chunk) * REF_CHUNK_SIZE) | |
516 | ||
c5aa993b | 517 | static struct ref_map *ref_map; |
c906108c | 518 | |
c378eb4e | 519 | /* Ptr to free cell in chunk's linked list. */ |
c5aa993b | 520 | static int ref_count = 0; |
c906108c | 521 | |
c378eb4e | 522 | /* Number of chunks malloced. */ |
c906108c SS |
523 | static int ref_chunk = 0; |
524 | ||
7be570e7 | 525 | /* This file maintains a cache of stabs aliases found in the symbol |
c378eb4e MS |
526 | table. If the symbol table changes, this cache must be cleared |
527 | or we are left holding onto data in invalid obstacks. */ | |
7be570e7 | 528 | void |
fba45db2 | 529 | stabsread_clear_cache (void) |
7be570e7 JM |
530 | { |
531 | ref_count = 0; | |
532 | ref_chunk = 0; | |
533 | } | |
534 | ||
c906108c SS |
535 | /* Create array of pointers mapping refids to symbols and stab strings. |
536 | Add pointers to reference definition symbols and/or their values as we | |
c378eb4e MS |
537 | find them, using their reference numbers as our index. |
538 | These will be used later when we resolve references. */ | |
c906108c | 539 | void |
a121b7c1 | 540 | ref_add (int refnum, struct symbol *sym, const char *stabs, CORE_ADDR value) |
c906108c SS |
541 | { |
542 | if (ref_count == 0) | |
543 | ref_chunk = 0; | |
544 | if (refnum >= ref_count) | |
545 | ref_count = refnum + 1; | |
546 | if (ref_count > ref_chunk * MAX_CHUNK_REFS) | |
547 | { | |
c5aa993b | 548 | int new_slots = ref_count - ref_chunk * MAX_CHUNK_REFS; |
c906108c | 549 | int new_chunks = new_slots / MAX_CHUNK_REFS + 1; |
433759f7 | 550 | |
c906108c SS |
551 | ref_map = (struct ref_map *) |
552 | xrealloc (ref_map, REF_MAP_SIZE (ref_chunk + new_chunks)); | |
433759f7 MS |
553 | memset (ref_map + ref_chunk * MAX_CHUNK_REFS, 0, |
554 | new_chunks * REF_CHUNK_SIZE); | |
c906108c SS |
555 | ref_chunk += new_chunks; |
556 | } | |
557 | ref_map[refnum].stabs = stabs; | |
558 | ref_map[refnum].sym = sym; | |
559 | ref_map[refnum].value = value; | |
560 | } | |
561 | ||
562 | /* Return defined sym for the reference REFNUM. */ | |
563 | struct symbol * | |
fba45db2 | 564 | ref_search (int refnum) |
c906108c SS |
565 | { |
566 | if (refnum < 0 || refnum > ref_count) | |
567 | return 0; | |
568 | return ref_map[refnum].sym; | |
569 | } | |
570 | ||
c906108c SS |
571 | /* Parse a reference id in STRING and return the resulting |
572 | reference number. Move STRING beyond the reference id. */ | |
573 | ||
c5aa993b | 574 | static int |
a121b7c1 | 575 | process_reference (const char **string) |
c906108c | 576 | { |
a121b7c1 | 577 | const char *p; |
c906108c SS |
578 | int refnum = 0; |
579 | ||
c5aa993b JM |
580 | if (**string != '#') |
581 | return 0; | |
582 | ||
c906108c SS |
583 | /* Advance beyond the initial '#'. */ |
584 | p = *string + 1; | |
585 | ||
c378eb4e | 586 | /* Read number as reference id. */ |
c906108c SS |
587 | while (*p && isdigit (*p)) |
588 | { | |
589 | refnum = refnum * 10 + *p - '0'; | |
590 | p++; | |
591 | } | |
592 | *string = p; | |
593 | return refnum; | |
594 | } | |
595 | ||
596 | /* If STRING defines a reference, store away a pointer to the reference | |
597 | definition for later use. Return the reference number. */ | |
598 | ||
599 | int | |
a121b7c1 | 600 | symbol_reference_defined (const char **string) |
c906108c | 601 | { |
a121b7c1 | 602 | const char *p = *string; |
c906108c SS |
603 | int refnum = 0; |
604 | ||
605 | refnum = process_reference (&p); | |
606 | ||
c378eb4e | 607 | /* Defining symbols end in '='. */ |
c5aa993b | 608 | if (*p == '=') |
c906108c | 609 | { |
c378eb4e | 610 | /* Symbol is being defined here. */ |
c906108c SS |
611 | *string = p + 1; |
612 | return refnum; | |
613 | } | |
614 | else | |
615 | { | |
c378eb4e | 616 | /* Must be a reference. Either the symbol has already been defined, |
dda83cd7 | 617 | or this is a forward reference to it. */ |
c906108c SS |
618 | *string = p; |
619 | return -1; | |
620 | } | |
621 | } | |
622 | ||
768a979c UW |
623 | static int |
624 | stab_reg_to_regnum (struct symbol *sym, struct gdbarch *gdbarch) | |
625 | { | |
626 | int regno = gdbarch_stab_reg_to_regnum (gdbarch, SYMBOL_VALUE (sym)); | |
627 | ||
f6efe3f8 | 628 | if (regno < 0 || regno >= gdbarch_num_cooked_regs (gdbarch)) |
768a979c | 629 | { |
f6efe3f8 | 630 | reg_value_complaint (regno, gdbarch_num_cooked_regs (gdbarch), |
987012b8 | 631 | sym->print_name ()); |
768a979c | 632 | |
c378eb4e | 633 | regno = gdbarch_sp_regnum (gdbarch); /* Known safe, though useless. */ |
768a979c UW |
634 | } |
635 | ||
636 | return regno; | |
637 | } | |
638 | ||
639 | static const struct symbol_register_ops stab_register_funcs = { | |
640 | stab_reg_to_regnum | |
641 | }; | |
642 | ||
f1e6e072 TT |
643 | /* The "aclass" indices for computed symbols. */ |
644 | ||
645 | static int stab_register_index; | |
646 | static int stab_regparm_index; | |
647 | ||
c906108c | 648 | struct symbol * |
a121b7c1 | 649 | define_symbol (CORE_ADDR valu, const char *string, int desc, int type, |
fba45db2 | 650 | struct objfile *objfile) |
c906108c | 651 | { |
08feed99 | 652 | struct gdbarch *gdbarch = objfile->arch (); |
52f0bd74 | 653 | struct symbol *sym; |
a121b7c1 | 654 | const char *p = find_name_end (string); |
c906108c SS |
655 | int deftype; |
656 | int synonym = 0; | |
52f0bd74 | 657 | int i; |
c906108c SS |
658 | |
659 | /* We would like to eliminate nameless symbols, but keep their types. | |
660 | E.g. stab entry ":t10=*2" should produce a type 10, which is a pointer | |
c378eb4e MS |
661 | to type 2, but, should not create a symbol to address that type. Since |
662 | the symbol will be nameless, there is no way any user can refer to it. */ | |
c906108c SS |
663 | |
664 | int nameless; | |
665 | ||
666 | /* Ignore syms with empty names. */ | |
667 | if (string[0] == 0) | |
668 | return 0; | |
669 | ||
c378eb4e | 670 | /* Ignore old-style symbols from cc -go. */ |
c906108c SS |
671 | if (p == 0) |
672 | return 0; | |
673 | ||
674 | while (p[1] == ':') | |
675 | { | |
c5aa993b JM |
676 | p += 2; |
677 | p = strchr (p, ':'); | |
681c238c MS |
678 | if (p == NULL) |
679 | { | |
b98664d3 | 680 | complaint ( |
681c238c MS |
681 | _("Bad stabs string '%s'"), string); |
682 | return NULL; | |
683 | } | |
c906108c SS |
684 | } |
685 | ||
686 | /* If a nameless stab entry, all we need is the type, not the symbol. | |
687 | e.g. ":t10=*2" or a nameless enum like " :T16=ered:0,green:1,blue:2,;" */ | |
688 | nameless = (p == string || ((string[0] == ' ') && (string[1] == ':'))); | |
689 | ||
8c14c3a3 | 690 | current_symbol = sym = new (&objfile->objfile_obstack) symbol; |
c906108c | 691 | |
c906108c SS |
692 | if (processing_gcc_compilation) |
693 | { | |
694 | /* GCC 2.x puts the line number in desc. SunOS apparently puts in the | |
dda83cd7 | 695 | number of bytes occupied by a type or object, which we ignore. */ |
c5aa993b | 696 | SYMBOL_LINE (sym) = desc; |
c906108c SS |
697 | } |
698 | else | |
699 | { | |
c5aa993b | 700 | SYMBOL_LINE (sym) = 0; /* unknown */ |
c906108c SS |
701 | } |
702 | ||
d3ecddab CB |
703 | sym->set_language (get_current_subfile ()->language, |
704 | &objfile->objfile_obstack); | |
025ac414 | 705 | |
c906108c SS |
706 | if (is_cplus_marker (string[0])) |
707 | { | |
708 | /* Special GNU C++ names. */ | |
709 | switch (string[1]) | |
710 | { | |
c5aa993b | 711 | case 't': |
43678b0a | 712 | sym->set_linkage_name ("this"); |
c5aa993b | 713 | break; |
c906108c | 714 | |
c5aa993b | 715 | case 'v': /* $vtbl_ptr_type */ |
c5aa993b | 716 | goto normal; |
c906108c | 717 | |
c5aa993b | 718 | case 'e': |
43678b0a | 719 | sym->set_linkage_name ("eh_throw"); |
c5aa993b | 720 | break; |
c906108c | 721 | |
c5aa993b JM |
722 | case '_': |
723 | /* This was an anonymous type that was never fixed up. */ | |
724 | goto normal; | |
c906108c | 725 | |
c5aa993b | 726 | default: |
b98664d3 | 727 | complaint (_("Unknown C++ symbol name `%s'"), |
23136709 | 728 | string); |
c378eb4e | 729 | goto normal; /* Do *something* with it. */ |
c906108c SS |
730 | } |
731 | } | |
c906108c SS |
732 | else |
733 | { | |
734 | normal: | |
596dc4ad | 735 | gdb::unique_xmalloc_ptr<char> new_name; |
2f408ecb | 736 | |
c1b5c1eb | 737 | if (sym->language () == language_cplus) |
71c25dea | 738 | { |
224c3ddb | 739 | char *name = (char *) alloca (p - string + 1); |
433759f7 | 740 | |
71c25dea TT |
741 | memcpy (name, string, p - string); |
742 | name[p - string] = '\0'; | |
743 | new_name = cp_canonicalize_string (name); | |
71c25dea | 744 | } |
596dc4ad TT |
745 | if (new_name != nullptr) |
746 | sym->compute_and_set_names (new_name.get (), true, objfile->per_bfd); | |
71c25dea | 747 | else |
4d4eaa30 CB |
748 | sym->compute_and_set_names (gdb::string_view (string, p - string), true, |
749 | objfile->per_bfd); | |
45c58896 | 750 | |
c1b5c1eb | 751 | if (sym->language () == language_cplus) |
80e649fc TT |
752 | cp_scan_for_anonymous_namespaces (get_buildsym_compunit (), sym, |
753 | objfile); | |
45c58896 | 754 | |
c906108c SS |
755 | } |
756 | p++; | |
757 | ||
758 | /* Determine the type of name being defined. */ | |
759 | #if 0 | |
760 | /* Getting GDB to correctly skip the symbol on an undefined symbol | |
761 | descriptor and not ever dump core is a very dodgy proposition if | |
762 | we do things this way. I say the acorn RISC machine can just | |
763 | fix their compiler. */ | |
764 | /* The Acorn RISC machine's compiler can put out locals that don't | |
765 | start with "234=" or "(3,4)=", so assume anything other than the | |
766 | deftypes we know how to handle is a local. */ | |
767 | if (!strchr ("cfFGpPrStTvVXCR", *p)) | |
768 | #else | |
769 | if (isdigit (*p) || *p == '(' || *p == '-') | |
770 | #endif | |
771 | deftype = 'l'; | |
772 | else | |
773 | deftype = *p++; | |
774 | ||
775 | switch (deftype) | |
776 | { | |
777 | case 'c': | |
778 | /* c is a special case, not followed by a type-number. | |
dda83cd7 SM |
779 | SYMBOL:c=iVALUE for an integer constant symbol. |
780 | SYMBOL:c=rVALUE for a floating constant symbol. | |
781 | SYMBOL:c=eTYPE,INTVALUE for an enum constant symbol. | |
782 | e.g. "b:c=e6,0" for "const b = blob1" | |
783 | (where type 6 is defined by "blobs:t6=eblob1:0,blob2:1,;"). */ | |
c906108c SS |
784 | if (*p != '=') |
785 | { | |
f1e6e072 | 786 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
c906108c | 787 | SYMBOL_TYPE (sym) = error_type (&p, objfile); |
176620f1 | 788 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 789 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
790 | return sym; |
791 | } | |
792 | ++p; | |
793 | switch (*p++) | |
794 | { | |
795 | case 'r': | |
796 | { | |
4e38b386 | 797 | gdb_byte *dbl_valu; |
6ccb9162 | 798 | struct type *dbl_type; |
c906108c | 799 | |
46bf5051 | 800 | dbl_type = objfile_type (objfile)->builtin_double; |
224c3ddb SM |
801 | dbl_valu |
802 | = (gdb_byte *) obstack_alloc (&objfile->objfile_obstack, | |
803 | TYPE_LENGTH (dbl_type)); | |
f69fdf9b UW |
804 | |
805 | target_float_from_string (dbl_valu, dbl_type, std::string (p)); | |
6ccb9162 UW |
806 | |
807 | SYMBOL_TYPE (sym) = dbl_type; | |
c906108c | 808 | SYMBOL_VALUE_BYTES (sym) = dbl_valu; |
f1e6e072 | 809 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST_BYTES; |
c906108c SS |
810 | } |
811 | break; | |
812 | case 'i': | |
813 | { | |
814 | /* Defining integer constants this way is kind of silly, | |
815 | since 'e' constants allows the compiler to give not | |
816 | only the value, but the type as well. C has at least | |
817 | int, long, unsigned int, and long long as constant | |
818 | types; other languages probably should have at least | |
819 | unsigned as well as signed constants. */ | |
820 | ||
46bf5051 | 821 | SYMBOL_TYPE (sym) = objfile_type (objfile)->builtin_long; |
c906108c | 822 | SYMBOL_VALUE (sym) = atoi (p); |
f1e6e072 | 823 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
c906108c SS |
824 | } |
825 | break; | |
ec8a089a PM |
826 | |
827 | case 'c': | |
828 | { | |
829 | SYMBOL_TYPE (sym) = objfile_type (objfile)->builtin_char; | |
830 | SYMBOL_VALUE (sym) = atoi (p); | |
f1e6e072 | 831 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
ec8a089a PM |
832 | } |
833 | break; | |
834 | ||
835 | case 's': | |
836 | { | |
837 | struct type *range_type; | |
838 | int ind = 0; | |
839 | char quote = *p++; | |
ec8a089a PM |
840 | gdb_byte *string_local = (gdb_byte *) alloca (strlen (p)); |
841 | gdb_byte *string_value; | |
842 | ||
843 | if (quote != '\'' && quote != '"') | |
844 | { | |
f1e6e072 | 845 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
ec8a089a PM |
846 | SYMBOL_TYPE (sym) = error_type (&p, objfile); |
847 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; | |
e148f09d | 848 | add_symbol_to_list (sym, get_file_symbols ()); |
ec8a089a PM |
849 | return sym; |
850 | } | |
851 | ||
852 | /* Find matching quote, rejecting escaped quotes. */ | |
853 | while (*p && *p != quote) | |
854 | { | |
855 | if (*p == '\\' && p[1] == quote) | |
856 | { | |
857 | string_local[ind] = (gdb_byte) quote; | |
858 | ind++; | |
859 | p += 2; | |
860 | } | |
861 | else if (*p) | |
862 | { | |
863 | string_local[ind] = (gdb_byte) (*p); | |
864 | ind++; | |
865 | p++; | |
866 | } | |
867 | } | |
868 | if (*p != quote) | |
869 | { | |
f1e6e072 | 870 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
ec8a089a PM |
871 | SYMBOL_TYPE (sym) = error_type (&p, objfile); |
872 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; | |
e148f09d | 873 | add_symbol_to_list (sym, get_file_symbols ()); |
ec8a089a PM |
874 | return sym; |
875 | } | |
876 | ||
877 | /* NULL terminate the string. */ | |
878 | string_local[ind] = 0; | |
3e43a32a | 879 | range_type |
0c9c3474 SA |
880 | = create_static_range_type (NULL, |
881 | objfile_type (objfile)->builtin_int, | |
882 | 0, ind); | |
ec8a089a PM |
883 | SYMBOL_TYPE (sym) = create_array_type (NULL, |
884 | objfile_type (objfile)->builtin_char, | |
885 | range_type); | |
224c3ddb SM |
886 | string_value |
887 | = (gdb_byte *) obstack_alloc (&objfile->objfile_obstack, ind + 1); | |
ec8a089a PM |
888 | memcpy (string_value, string_local, ind + 1); |
889 | p++; | |
890 | ||
891 | SYMBOL_VALUE_BYTES (sym) = string_value; | |
f1e6e072 | 892 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST_BYTES; |
ec8a089a PM |
893 | } |
894 | break; | |
895 | ||
c906108c SS |
896 | case 'e': |
897 | /* SYMBOL:c=eTYPE,INTVALUE for a constant symbol whose value | |
898 | can be represented as integral. | |
899 | e.g. "b:c=e6,0" for "const b = blob1" | |
900 | (where type 6 is defined by "blobs:t6=eblob1:0,blob2:1,;"). */ | |
901 | { | |
f1e6e072 | 902 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
c906108c SS |
903 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
904 | ||
905 | if (*p != ',') | |
906 | { | |
907 | SYMBOL_TYPE (sym) = error_type (&p, objfile); | |
908 | break; | |
909 | } | |
910 | ++p; | |
911 | ||
912 | /* If the value is too big to fit in an int (perhaps because | |
913 | it is unsigned), or something like that, we silently get | |
914 | a bogus value. The type and everything else about it is | |
915 | correct. Ideally, we should be using whatever we have | |
916 | available for parsing unsigned and long long values, | |
917 | however. */ | |
918 | SYMBOL_VALUE (sym) = atoi (p); | |
919 | } | |
920 | break; | |
921 | default: | |
922 | { | |
f1e6e072 | 923 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
c906108c SS |
924 | SYMBOL_TYPE (sym) = error_type (&p, objfile); |
925 | } | |
926 | } | |
176620f1 | 927 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 928 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
929 | return sym; |
930 | ||
931 | case 'C': | |
932 | /* The name of a caught exception. */ | |
933 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 934 | SYMBOL_ACLASS_INDEX (sym) = LOC_LABEL; |
176620f1 | 935 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
38583298 | 936 | SET_SYMBOL_VALUE_ADDRESS (sym, valu); |
e148f09d | 937 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
938 | break; |
939 | ||
940 | case 'f': | |
941 | /* A static function definition. */ | |
942 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 943 | SYMBOL_ACLASS_INDEX (sym) = LOC_BLOCK; |
176620f1 | 944 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 945 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
946 | /* fall into process_function_types. */ |
947 | ||
948 | process_function_types: | |
949 | /* Function result types are described as the result type in stabs. | |
dda83cd7 SM |
950 | We need to convert this to the function-returning-type-X type |
951 | in GDB. E.g. "int" is converted to "function returning int". */ | |
78134374 | 952 | if (SYMBOL_TYPE (sym)->code () != TYPE_CODE_FUNC) |
c906108c SS |
953 | SYMBOL_TYPE (sym) = lookup_function_type (SYMBOL_TYPE (sym)); |
954 | ||
1e698235 | 955 | /* All functions in C++ have prototypes. Stabs does not offer an |
dda83cd7 SM |
956 | explicit way to identify prototyped or unprototyped functions, |
957 | but both GCC and Sun CC emit stabs for the "call-as" type rather | |
958 | than the "declared-as" type for unprototyped functions, so | |
959 | we treat all functions as if they were prototyped. This is used | |
960 | primarily for promotion when calling the function from GDB. */ | |
27e69b7a | 961 | SYMBOL_TYPE (sym)->set_is_prototyped (true); |
c906108c | 962 | |
c378eb4e | 963 | /* fall into process_prototype_types. */ |
c906108c SS |
964 | |
965 | process_prototype_types: | |
966 | /* Sun acc puts declared types of arguments here. */ | |
967 | if (*p == ';') | |
968 | { | |
969 | struct type *ftype = SYMBOL_TYPE (sym); | |
970 | int nsemi = 0; | |
971 | int nparams = 0; | |
a121b7c1 | 972 | const char *p1 = p; |
c906108c SS |
973 | |
974 | /* Obtain a worst case guess for the number of arguments | |
975 | by counting the semicolons. */ | |
976 | while (*p1) | |
977 | { | |
978 | if (*p1++ == ';') | |
979 | nsemi++; | |
980 | } | |
981 | ||
c378eb4e | 982 | /* Allocate parameter information fields and fill them in. */ |
3cabb6b0 SM |
983 | ftype->set_fields |
984 | ((struct field *) | |
985 | TYPE_ALLOC (ftype, nsemi * sizeof (struct field))); | |
c906108c SS |
986 | while (*p++ == ';') |
987 | { | |
988 | struct type *ptype; | |
989 | ||
990 | /* A type number of zero indicates the start of varargs. | |
dda83cd7 | 991 | FIXME: GDB currently ignores vararg functions. */ |
c906108c SS |
992 | if (p[0] == '0' && p[1] == '\0') |
993 | break; | |
994 | ptype = read_type (&p, objfile); | |
995 | ||
996 | /* The Sun compilers mark integer arguments, which should | |
dda83cd7 SM |
997 | be promoted to the width of the calling conventions, with |
998 | a type which references itself. This type is turned into | |
999 | a TYPE_CODE_VOID type by read_type, and we have to turn | |
1000 | it back into builtin_int here. | |
1001 | FIXME: Do we need a new builtin_promoted_int_arg ? */ | |
78134374 | 1002 | if (ptype->code () == TYPE_CODE_VOID) |
46bf5051 | 1003 | ptype = objfile_type (objfile)->builtin_int; |
5d14b6e5 | 1004 | ftype->field (nparams).set_type (ptype); |
8176bb6d | 1005 | TYPE_FIELD_ARTIFICIAL (ftype, nparams++) = 0; |
c906108c | 1006 | } |
5e33d5f4 | 1007 | ftype->set_num_fields (nparams); |
27e69b7a | 1008 | ftype->set_is_prototyped (true); |
c906108c SS |
1009 | } |
1010 | break; | |
1011 | ||
1012 | case 'F': | |
1013 | /* A global function definition. */ | |
1014 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1015 | SYMBOL_ACLASS_INDEX (sym) = LOC_BLOCK; |
176620f1 | 1016 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1017 | add_symbol_to_list (sym, get_global_symbols ()); |
c906108c SS |
1018 | goto process_function_types; |
1019 | ||
1020 | case 'G': | |
1021 | /* For a class G (global) symbol, it appears that the | |
dda83cd7 SM |
1022 | value is not correct. It is necessary to search for the |
1023 | corresponding linker definition to find the value. | |
1024 | These definitions appear at the end of the namelist. */ | |
c906108c | 1025 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
f1e6e072 | 1026 | SYMBOL_ACLASS_INDEX (sym) = LOC_STATIC; |
176620f1 | 1027 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
c906108c | 1028 | /* Don't add symbol references to global_sym_chain. |
dda83cd7 SM |
1029 | Symbol references don't have valid names and wont't match up with |
1030 | minimal symbols when the global_sym_chain is relocated. | |
1031 | We'll fixup symbol references when we fixup the defining symbol. */ | |
987012b8 | 1032 | if (sym->linkage_name () && sym->linkage_name ()[0] != '#') |
c906108c | 1033 | { |
987012b8 | 1034 | i = hashname (sym->linkage_name ()); |
c5aa993b JM |
1035 | SYMBOL_VALUE_CHAIN (sym) = global_sym_chain[i]; |
1036 | global_sym_chain[i] = sym; | |
c906108c | 1037 | } |
e148f09d | 1038 | add_symbol_to_list (sym, get_global_symbols ()); |
c906108c SS |
1039 | break; |
1040 | ||
1041 | /* This case is faked by a conditional above, | |
dda83cd7 SM |
1042 | when there is no code letter in the dbx data. |
1043 | Dbx data never actually contains 'l'. */ | |
c906108c SS |
1044 | case 's': |
1045 | case 'l': | |
1046 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1047 | SYMBOL_ACLASS_INDEX (sym) = LOC_LOCAL; |
c906108c | 1048 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1049 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1050 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1051 | break; |
1052 | ||
1053 | case 'p': | |
1054 | if (*p == 'F') | |
1055 | /* pF is a two-letter code that means a function parameter in Fortran. | |
1056 | The type-number specifies the type of the return value. | |
1057 | Translate it into a pointer-to-function type. */ | |
1058 | { | |
1059 | p++; | |
1060 | SYMBOL_TYPE (sym) | |
1061 | = lookup_pointer_type | |
c5aa993b | 1062 | (lookup_function_type (read_type (&p, objfile))); |
c906108c SS |
1063 | } |
1064 | else | |
1065 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
1066 | ||
f1e6e072 | 1067 | SYMBOL_ACLASS_INDEX (sym) = LOC_ARG; |
c906108c | 1068 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1069 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
2a2d4dc3 | 1070 | SYMBOL_IS_ARGUMENT (sym) = 1; |
e148f09d | 1071 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c | 1072 | |
5e2b427d | 1073 | if (gdbarch_byte_order (gdbarch) != BFD_ENDIAN_BIG) |
c906108c SS |
1074 | { |
1075 | /* On little-endian machines, this crud is never necessary, | |
1076 | and, if the extra bytes contain garbage, is harmful. */ | |
1077 | break; | |
1078 | } | |
1079 | ||
1080 | /* If it's gcc-compiled, if it says `short', believe it. */ | |
f73e88f9 | 1081 | if (processing_gcc_compilation |
5e2b427d | 1082 | || gdbarch_believe_pcc_promotion (gdbarch)) |
c906108c SS |
1083 | break; |
1084 | ||
5e2b427d | 1085 | if (!gdbarch_believe_pcc_promotion (gdbarch)) |
7a292a7a | 1086 | { |
8ee56bcf AC |
1087 | /* If PCC says a parameter is a short or a char, it is |
1088 | really an int. */ | |
5e2b427d UW |
1089 | if (TYPE_LENGTH (SYMBOL_TYPE (sym)) |
1090 | < gdbarch_int_bit (gdbarch) / TARGET_CHAR_BIT | |
78134374 | 1091 | && SYMBOL_TYPE (sym)->code () == TYPE_CODE_INT) |
7a292a7a | 1092 | { |
8ee56bcf | 1093 | SYMBOL_TYPE (sym) = |
c6d940a9 SM |
1094 | (SYMBOL_TYPE (sym)->is_unsigned () |
1095 | ? objfile_type (objfile)->builtin_unsigned_int | |
1096 | : objfile_type (objfile)->builtin_int); | |
7a292a7a | 1097 | } |
8ee56bcf | 1098 | break; |
7a292a7a | 1099 | } |
0019cd49 | 1100 | /* Fall through. */ |
c906108c SS |
1101 | |
1102 | case 'P': | |
1103 | /* acc seems to use P to declare the prototypes of functions that | |
dda83cd7 SM |
1104 | are referenced by this file. gdb is not prepared to deal |
1105 | with this extra information. FIXME, it ought to. */ | |
c906108c SS |
1106 | if (type == N_FUN) |
1107 | { | |
1108 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
1109 | goto process_prototype_types; | |
1110 | } | |
c5aa993b | 1111 | /*FALLTHROUGH */ |
c906108c SS |
1112 | |
1113 | case 'R': | |
1114 | /* Parameter which is in a register. */ | |
1115 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1116 | SYMBOL_ACLASS_INDEX (sym) = stab_register_index; |
2a2d4dc3 | 1117 | SYMBOL_IS_ARGUMENT (sym) = 1; |
768a979c | 1118 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1119 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1120 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1121 | break; |
1122 | ||
1123 | case 'r': | |
1124 | /* Register variable (either global or local). */ | |
1125 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1126 | SYMBOL_ACLASS_INDEX (sym) = stab_register_index; |
768a979c | 1127 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1128 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
c906108c SS |
1129 | if (within_function) |
1130 | { | |
192cb3d4 MK |
1131 | /* Sun cc uses a pair of symbols, one 'p' and one 'r', with |
1132 | the same name to represent an argument passed in a | |
1133 | register. GCC uses 'P' for the same case. So if we find | |
1134 | such a symbol pair we combine it into one 'P' symbol. | |
987012b8 | 1135 | For Sun cc we need to do this regardless of stabs_argument_has_addr, because the compiler puts out |
192cb3d4 MK |
1136 | the 'p' symbol even if it never saves the argument onto |
1137 | the stack. | |
1138 | ||
1139 | On most machines, we want to preserve both symbols, so | |
1140 | that we can still get information about what is going on | |
1141 | with the stack (VAX for computing args_printed, using | |
1142 | stack slots instead of saved registers in backtraces, | |
1143 | etc.). | |
c906108c SS |
1144 | |
1145 | Note that this code illegally combines | |
c5aa993b | 1146 | main(argc) struct foo argc; { register struct foo argc; } |
c906108c SS |
1147 | but this case is considered pathological and causes a warning |
1148 | from a decent compiler. */ | |
1149 | ||
e148f09d | 1150 | struct pending *local_symbols = *get_local_symbols (); |
c906108c SS |
1151 | if (local_symbols |
1152 | && local_symbols->nsyms > 0 | |
5e2b427d | 1153 | && gdbarch_stabs_argument_has_addr (gdbarch, SYMBOL_TYPE (sym))) |
c906108c SS |
1154 | { |
1155 | struct symbol *prev_sym; | |
433759f7 | 1156 | |
c906108c SS |
1157 | prev_sym = local_symbols->symbol[local_symbols->nsyms - 1]; |
1158 | if ((SYMBOL_CLASS (prev_sym) == LOC_REF_ARG | |
1159 | || SYMBOL_CLASS (prev_sym) == LOC_ARG) | |
987012b8 CB |
1160 | && strcmp (prev_sym->linkage_name (), |
1161 | sym->linkage_name ()) == 0) | |
c906108c | 1162 | { |
f1e6e072 | 1163 | SYMBOL_ACLASS_INDEX (prev_sym) = stab_register_index; |
c906108c SS |
1164 | /* Use the type from the LOC_REGISTER; that is the type |
1165 | that is actually in that register. */ | |
1166 | SYMBOL_TYPE (prev_sym) = SYMBOL_TYPE (sym); | |
1167 | SYMBOL_VALUE (prev_sym) = SYMBOL_VALUE (sym); | |
1168 | sym = prev_sym; | |
1169 | break; | |
1170 | } | |
1171 | } | |
e148f09d | 1172 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1173 | } |
1174 | else | |
e148f09d | 1175 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
1176 | break; |
1177 | ||
1178 | case 'S': | |
c378eb4e | 1179 | /* Static symbol at top level of file. */ |
c906108c | 1180 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
f1e6e072 | 1181 | SYMBOL_ACLASS_INDEX (sym) = LOC_STATIC; |
38583298 | 1182 | SET_SYMBOL_VALUE_ADDRESS (sym, valu); |
176620f1 | 1183 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1184 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
1185 | break; |
1186 | ||
1187 | case 't': | |
52eea4ce | 1188 | /* In Ada, there is no distinction between typedef and non-typedef; |
dda83cd7 SM |
1189 | any type declaration implicitly has the equivalent of a typedef, |
1190 | and thus 't' is in fact equivalent to 'Tt'. | |
1191 | ||
1192 | Therefore, for Ada units, we check the character immediately | |
1193 | before the 't', and if we do not find a 'T', then make sure to | |
1194 | create the associated symbol in the STRUCT_DOMAIN ('t' definitions | |
1195 | will be stored in the VAR_DOMAIN). If the symbol was indeed | |
1196 | defined as 'Tt' then the STRUCT_DOMAIN symbol will be created | |
1197 | elsewhere, so we don't need to take care of that. | |
1198 | ||
1199 | This is important to do, because of forward references: | |
1200 | The cleanup of undefined types stored in undef_types only uses | |
1201 | STRUCT_DOMAIN symbols to perform the replacement. */ | |
c1b5c1eb | 1202 | synonym = (sym->language () == language_ada && p[-2] != 'T'); |
52eea4ce | 1203 | |
e2cd42dd | 1204 | /* Typedef */ |
c906108c SS |
1205 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
1206 | ||
1207 | /* For a nameless type, we don't want a create a symbol, thus we | |
dda83cd7 | 1208 | did not use `sym'. Return without further processing. */ |
c5aa993b JM |
1209 | if (nameless) |
1210 | return NULL; | |
c906108c | 1211 | |
f1e6e072 | 1212 | SYMBOL_ACLASS_INDEX (sym) = LOC_TYPEDEF; |
c906108c | 1213 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1214 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
c906108c | 1215 | /* C++ vagaries: we may have a type which is derived from |
dda83cd7 SM |
1216 | a base type which did not have its name defined when the |
1217 | derived class was output. We fill in the derived class's | |
1218 | base part member's name here in that case. */ | |
7d93a1e0 | 1219 | if (SYMBOL_TYPE (sym)->name () != NULL) |
78134374 SM |
1220 | if ((SYMBOL_TYPE (sym)->code () == TYPE_CODE_STRUCT |
1221 | || SYMBOL_TYPE (sym)->code () == TYPE_CODE_UNION) | |
c906108c SS |
1222 | && TYPE_N_BASECLASSES (SYMBOL_TYPE (sym))) |
1223 | { | |
1224 | int j; | |
433759f7 | 1225 | |
c906108c SS |
1226 | for (j = TYPE_N_BASECLASSES (SYMBOL_TYPE (sym)) - 1; j >= 0; j--) |
1227 | if (TYPE_BASECLASS_NAME (SYMBOL_TYPE (sym), j) == 0) | |
1228 | TYPE_BASECLASS_NAME (SYMBOL_TYPE (sym), j) = | |
7d93a1e0 | 1229 | TYPE_BASECLASS (SYMBOL_TYPE (sym), j)->name (); |
c906108c SS |
1230 | } |
1231 | ||
7d93a1e0 | 1232 | if (SYMBOL_TYPE (sym)->name () == NULL) |
c906108c | 1233 | { |
78134374 | 1234 | if ((SYMBOL_TYPE (sym)->code () == TYPE_CODE_PTR |
987012b8 | 1235 | && strcmp (sym->linkage_name (), vtbl_ptr_name)) |
78134374 | 1236 | || SYMBOL_TYPE (sym)->code () == TYPE_CODE_FUNC) |
c906108c SS |
1237 | { |
1238 | /* If we are giving a name to a type such as "pointer to | |
dda83cd7 SM |
1239 | foo" or "function returning foo", we better not set |
1240 | the TYPE_NAME. If the program contains "typedef char | |
1241 | *caddr_t;", we don't want all variables of type char | |
1242 | * to print as caddr_t. This is not just a | |
1243 | consequence of GDB's type management; PCC and GCC (at | |
1244 | least through version 2.4) both output variables of | |
1245 | either type char * or caddr_t with the type number | |
1246 | defined in the 't' symbol for caddr_t. If a future | |
1247 | compiler cleans this up it GDB is not ready for it | |
1248 | yet, but if it becomes ready we somehow need to | |
1249 | disable this check (without breaking the PCC/GCC2.4 | |
1250 | case). | |
1251 | ||
1252 | Sigh. | |
1253 | ||
1254 | Fortunately, this check seems not to be necessary | |
1255 | for anything except pointers or functions. */ | |
1256 | /* ezannoni: 2000-10-26. This seems to apply for | |
c378eb4e | 1257 | versions of gcc older than 2.8. This was the original |
49d97c60 | 1258 | problem: with the following code gdb would tell that |
c378eb4e MS |
1259 | the type for name1 is caddr_t, and func is char(). |
1260 | ||
dda83cd7 | 1261 | typedef char *caddr_t; |
49d97c60 EZ |
1262 | char *name2; |
1263 | struct x | |
1264 | { | |
c378eb4e | 1265 | char *name1; |
49d97c60 EZ |
1266 | } xx; |
1267 | char *func() | |
1268 | { | |
1269 | } | |
1270 | main () {} | |
1271 | */ | |
1272 | ||
c378eb4e | 1273 | /* Pascal accepts names for pointer types. */ |
3c65e5b3 | 1274 | if (get_current_subfile ()->language == language_pascal) |
d0e39ea2 | 1275 | SYMBOL_TYPE (sym)->set_name (sym->linkage_name ()); |
c906108c SS |
1276 | } |
1277 | else | |
d0e39ea2 | 1278 | SYMBOL_TYPE (sym)->set_name (sym->linkage_name ()); |
c906108c SS |
1279 | } |
1280 | ||
e148f09d | 1281 | add_symbol_to_list (sym, get_file_symbols ()); |
52eea4ce JB |
1282 | |
1283 | if (synonym) | |
dda83cd7 SM |
1284 | { |
1285 | /* Create the STRUCT_DOMAIN clone. */ | |
1286 | struct symbol *struct_sym = new (&objfile->objfile_obstack) symbol; | |
1287 | ||
1288 | *struct_sym = *sym; | |
1289 | SYMBOL_ACLASS_INDEX (struct_sym) = LOC_TYPEDEF; | |
1290 | SYMBOL_VALUE (struct_sym) = valu; | |
1291 | SYMBOL_DOMAIN (struct_sym) = STRUCT_DOMAIN; | |
1292 | if (SYMBOL_TYPE (sym)->name () == 0) | |
d0e39ea2 SM |
1293 | SYMBOL_TYPE (sym)->set_name |
1294 | (obconcat (&objfile->objfile_obstack, sym->linkage_name (), | |
1295 | (char *) NULL)); | |
dda83cd7 SM |
1296 | add_symbol_to_list (struct_sym, get_file_symbols ()); |
1297 | } | |
d0e39ea2 | 1298 | |
c906108c SS |
1299 | break; |
1300 | ||
1301 | case 'T': | |
1302 | /* Struct, union, or enum tag. For GNU C++, this can be be followed | |
dda83cd7 | 1303 | by 't' which means we are typedef'ing it as well. */ |
c906108c SS |
1304 | synonym = *p == 't'; |
1305 | ||
1306 | if (synonym) | |
1307 | p++; | |
c906108c SS |
1308 | |
1309 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
25caa7a8 | 1310 | |
c906108c | 1311 | /* For a nameless type, we don't want a create a symbol, thus we |
dda83cd7 | 1312 | did not use `sym'. Return without further processing. */ |
c5aa993b JM |
1313 | if (nameless) |
1314 | return NULL; | |
c906108c | 1315 | |
f1e6e072 | 1316 | SYMBOL_ACLASS_INDEX (sym) = LOC_TYPEDEF; |
c906108c | 1317 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1318 | SYMBOL_DOMAIN (sym) = STRUCT_DOMAIN; |
7d93a1e0 | 1319 | if (SYMBOL_TYPE (sym)->name () == 0) |
d0e39ea2 SM |
1320 | SYMBOL_TYPE (sym)->set_name |
1321 | (obconcat (&objfile->objfile_obstack, sym->linkage_name (), | |
1322 | (char *) NULL)); | |
e148f09d | 1323 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
1324 | |
1325 | if (synonym) | |
1326 | { | |
c378eb4e | 1327 | /* Clone the sym and then modify it. */ |
8c14c3a3 | 1328 | struct symbol *typedef_sym = new (&objfile->objfile_obstack) symbol; |
433759f7 | 1329 | |
c906108c | 1330 | *typedef_sym = *sym; |
f1e6e072 | 1331 | SYMBOL_ACLASS_INDEX (typedef_sym) = LOC_TYPEDEF; |
c906108c | 1332 | SYMBOL_VALUE (typedef_sym) = valu; |
176620f1 | 1333 | SYMBOL_DOMAIN (typedef_sym) = VAR_DOMAIN; |
7d93a1e0 | 1334 | if (SYMBOL_TYPE (sym)->name () == 0) |
d0e39ea2 SM |
1335 | SYMBOL_TYPE (sym)->set_name |
1336 | (obconcat (&objfile->objfile_obstack, sym->linkage_name (), | |
1337 | (char *) NULL)); | |
e148f09d | 1338 | add_symbol_to_list (typedef_sym, get_file_symbols ()); |
c906108c SS |
1339 | } |
1340 | break; | |
1341 | ||
1342 | case 'V': | |
c378eb4e | 1343 | /* Static symbol of local scope. */ |
c906108c | 1344 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
f1e6e072 | 1345 | SYMBOL_ACLASS_INDEX (sym) = LOC_STATIC; |
38583298 | 1346 | SET_SYMBOL_VALUE_ADDRESS (sym, valu); |
176620f1 | 1347 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
bb6e55f3 | 1348 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1349 | break; |
1350 | ||
1351 | case 'v': | |
1352 | /* Reference parameter */ | |
1353 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1354 | SYMBOL_ACLASS_INDEX (sym) = LOC_REF_ARG; |
2a2d4dc3 | 1355 | SYMBOL_IS_ARGUMENT (sym) = 1; |
c906108c | 1356 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1357 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1358 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1359 | break; |
1360 | ||
1361 | case 'a': | |
1362 | /* Reference parameter which is in a register. */ | |
1363 | SYMBOL_TYPE (sym) = read_type (&p, objfile); | |
f1e6e072 | 1364 | SYMBOL_ACLASS_INDEX (sym) = stab_regparm_index; |
2a2d4dc3 | 1365 | SYMBOL_IS_ARGUMENT (sym) = 1; |
768a979c | 1366 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1367 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1368 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c SS |
1369 | break; |
1370 | ||
1371 | case 'X': | |
1372 | /* This is used by Sun FORTRAN for "function result value". | |
dda83cd7 SM |
1373 | Sun claims ("dbx and dbxtool interfaces", 2nd ed) |
1374 | that Pascal uses it too, but when I tried it Pascal used | |
1375 | "x:3" (local symbol) instead. */ | |
c906108c | 1376 | SYMBOL_TYPE (sym) = read_type (&p, objfile); |
f1e6e072 | 1377 | SYMBOL_ACLASS_INDEX (sym) = LOC_LOCAL; |
c906108c | 1378 | SYMBOL_VALUE (sym) = valu; |
176620f1 | 1379 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1380 | add_symbol_to_list (sym, get_local_symbols ()); |
c906108c | 1381 | break; |
c906108c SS |
1382 | |
1383 | default: | |
1384 | SYMBOL_TYPE (sym) = error_type (&p, objfile); | |
f1e6e072 | 1385 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
c906108c | 1386 | SYMBOL_VALUE (sym) = 0; |
176620f1 | 1387 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
e148f09d | 1388 | add_symbol_to_list (sym, get_file_symbols ()); |
c906108c SS |
1389 | break; |
1390 | } | |
1391 | ||
192cb3d4 MK |
1392 | /* Some systems pass variables of certain types by reference instead |
1393 | of by value, i.e. they will pass the address of a structure (in a | |
1394 | register or on the stack) instead of the structure itself. */ | |
c906108c | 1395 | |
5e2b427d | 1396 | if (gdbarch_stabs_argument_has_addr (gdbarch, SYMBOL_TYPE (sym)) |
2a2d4dc3 | 1397 | && SYMBOL_IS_ARGUMENT (sym)) |
c906108c | 1398 | { |
2a2d4dc3 | 1399 | /* We have to convert LOC_REGISTER to LOC_REGPARM_ADDR (for |
dda83cd7 | 1400 | variables passed in a register). */ |
2a2d4dc3 | 1401 | if (SYMBOL_CLASS (sym) == LOC_REGISTER) |
f1e6e072 | 1402 | SYMBOL_ACLASS_INDEX (sym) = LOC_REGPARM_ADDR; |
192cb3d4 MK |
1403 | /* Likewise for converting LOC_ARG to LOC_REF_ARG (for the 7th |
1404 | and subsequent arguments on SPARC, for example). */ | |
1405 | else if (SYMBOL_CLASS (sym) == LOC_ARG) | |
f1e6e072 | 1406 | SYMBOL_ACLASS_INDEX (sym) = LOC_REF_ARG; |
c906108c SS |
1407 | } |
1408 | ||
c906108c SS |
1409 | return sym; |
1410 | } | |
1411 | ||
c906108c SS |
1412 | /* Skip rest of this symbol and return an error type. |
1413 | ||
1414 | General notes on error recovery: error_type always skips to the | |
1415 | end of the symbol (modulo cretinous dbx symbol name continuation). | |
1416 | Thus code like this: | |
1417 | ||
1418 | if (*(*pp)++ != ';') | |
c5aa993b | 1419 | return error_type (pp, objfile); |
c906108c SS |
1420 | |
1421 | is wrong because if *pp starts out pointing at '\0' (typically as the | |
1422 | result of an earlier error), it will be incremented to point to the | |
1423 | start of the next symbol, which might produce strange results, at least | |
1424 | if you run off the end of the string table. Instead use | |
1425 | ||
1426 | if (**pp != ';') | |
c5aa993b | 1427 | return error_type (pp, objfile); |
c906108c SS |
1428 | ++*pp; |
1429 | ||
1430 | or | |
1431 | ||
1432 | if (**pp != ';') | |
c5aa993b | 1433 | foo = error_type (pp, objfile); |
c906108c | 1434 | else |
c5aa993b | 1435 | ++*pp; |
c906108c SS |
1436 | |
1437 | And in case it isn't obvious, the point of all this hair is so the compiler | |
1438 | can define new types and new syntaxes, and old versions of the | |
1439 | debugger will be able to read the new symbol tables. */ | |
1440 | ||
1441 | static struct type * | |
a121b7c1 | 1442 | error_type (const char **pp, struct objfile *objfile) |
c906108c | 1443 | { |
b98664d3 | 1444 | complaint (_("couldn't parse type; debugger out of date?")); |
c906108c SS |
1445 | while (1) |
1446 | { | |
1447 | /* Skip to end of symbol. */ | |
1448 | while (**pp != '\0') | |
1449 | { | |
1450 | (*pp)++; | |
1451 | } | |
1452 | ||
1453 | /* Check for and handle cretinous dbx symbol name continuation! */ | |
1454 | if ((*pp)[-1] == '\\' || (*pp)[-1] == '?') | |
1455 | { | |
1456 | *pp = next_symbol_text (objfile); | |
1457 | } | |
1458 | else | |
1459 | { | |
1460 | break; | |
1461 | } | |
1462 | } | |
46bf5051 | 1463 | return objfile_type (objfile)->builtin_error; |
c906108c | 1464 | } |
c906108c | 1465 | \f |
c5aa993b | 1466 | |
c906108c SS |
1467 | /* Read type information or a type definition; return the type. Even |
1468 | though this routine accepts either type information or a type | |
1469 | definition, the distinction is relevant--some parts of stabsread.c | |
1470 | assume that type information starts with a digit, '-', or '(' in | |
1471 | deciding whether to call read_type. */ | |
1472 | ||
a7a48797 | 1473 | static struct type * |
a121b7c1 | 1474 | read_type (const char **pp, struct objfile *objfile) |
c906108c | 1475 | { |
52f0bd74 | 1476 | struct type *type = 0; |
c906108c SS |
1477 | struct type *type1; |
1478 | int typenums[2]; | |
1479 | char type_descriptor; | |
1480 | ||
1481 | /* Size in bits of type if specified by a type attribute, or -1 if | |
1482 | there is no size attribute. */ | |
1483 | int type_size = -1; | |
1484 | ||
c378eb4e | 1485 | /* Used to distinguish string and bitstring from char-array and set. */ |
c906108c SS |
1486 | int is_string = 0; |
1487 | ||
c378eb4e | 1488 | /* Used to distinguish vector from array. */ |
e2cd42dd MS |
1489 | int is_vector = 0; |
1490 | ||
c906108c SS |
1491 | /* Read type number if present. The type number may be omitted. |
1492 | for instance in a two-dimensional array declared with type | |
1493 | "ar1;1;10;ar1;1;10;4". */ | |
1494 | if ((**pp >= '0' && **pp <= '9') | |
1495 | || **pp == '(' | |
1496 | || **pp == '-') | |
1497 | { | |
1498 | if (read_type_number (pp, typenums) != 0) | |
1499 | return error_type (pp, objfile); | |
c5aa993b | 1500 | |
c906108c | 1501 | if (**pp != '=') |
dda83cd7 SM |
1502 | { |
1503 | /* Type is not being defined here. Either it already | |
1504 | exists, or this is a forward reference to it. | |
1505 | dbx_alloc_type handles both cases. */ | |
1506 | type = dbx_alloc_type (typenums, objfile); | |
8cfe231d | 1507 | |
dda83cd7 SM |
1508 | /* If this is a forward reference, arrange to complain if it |
1509 | doesn't get patched up by the time we're done | |
1510 | reading. */ | |
1511 | if (type->code () == TYPE_CODE_UNDEF) | |
1512 | add_undefined_type (type, typenums); | |
8cfe231d | 1513 | |
dda83cd7 SM |
1514 | return type; |
1515 | } | |
c906108c SS |
1516 | |
1517 | /* Type is being defined here. */ | |
1518 | /* Skip the '='. | |
dda83cd7 | 1519 | Also skip the type descriptor - we get it below with (*pp)[-1]. */ |
c5aa993b | 1520 | (*pp) += 2; |
c906108c SS |
1521 | } |
1522 | else | |
1523 | { | |
1524 | /* 'typenums=' not present, type is anonymous. Read and return | |
dda83cd7 | 1525 | the definition, but don't put it in the type vector. */ |
c906108c SS |
1526 | typenums[0] = typenums[1] = -1; |
1527 | (*pp)++; | |
1528 | } | |
1529 | ||
c5aa993b | 1530 | again: |
c906108c SS |
1531 | type_descriptor = (*pp)[-1]; |
1532 | switch (type_descriptor) | |
1533 | { | |
1534 | case 'x': | |
1535 | { | |
1536 | enum type_code code; | |
1537 | ||
1538 | /* Used to index through file_symbols. */ | |
1539 | struct pending *ppt; | |
1540 | int i; | |
c5aa993b | 1541 | |
c906108c SS |
1542 | /* Name including "struct", etc. */ |
1543 | char *type_name; | |
c5aa993b | 1544 | |
c906108c | 1545 | { |
a121b7c1 | 1546 | const char *from, *p, *q1, *q2; |
c5aa993b | 1547 | |
c906108c SS |
1548 | /* Set the type code according to the following letter. */ |
1549 | switch ((*pp)[0]) | |
1550 | { | |
1551 | case 's': | |
1552 | code = TYPE_CODE_STRUCT; | |
1553 | break; | |
1554 | case 'u': | |
1555 | code = TYPE_CODE_UNION; | |
1556 | break; | |
1557 | case 'e': | |
1558 | code = TYPE_CODE_ENUM; | |
1559 | break; | |
1560 | default: | |
1561 | { | |
1562 | /* Complain and keep going, so compilers can invent new | |
1563 | cross-reference types. */ | |
b98664d3 | 1564 | complaint (_("Unrecognized cross-reference type `%c'"), |
3e43a32a | 1565 | (*pp)[0]); |
c906108c SS |
1566 | code = TYPE_CODE_STRUCT; |
1567 | break; | |
1568 | } | |
1569 | } | |
c5aa993b | 1570 | |
c906108c SS |
1571 | q1 = strchr (*pp, '<'); |
1572 | p = strchr (*pp, ':'); | |
1573 | if (p == NULL) | |
1574 | return error_type (pp, objfile); | |
1575 | if (q1 && p > q1 && p[1] == ':') | |
1576 | { | |
1577 | int nesting_level = 0; | |
433759f7 | 1578 | |
c906108c SS |
1579 | for (q2 = q1; *q2; q2++) |
1580 | { | |
1581 | if (*q2 == '<') | |
1582 | nesting_level++; | |
1583 | else if (*q2 == '>') | |
1584 | nesting_level--; | |
1585 | else if (*q2 == ':' && nesting_level == 0) | |
1586 | break; | |
1587 | } | |
1588 | p = q2; | |
1589 | if (*p != ':') | |
1590 | return error_type (pp, objfile); | |
1591 | } | |
71c25dea | 1592 | type_name = NULL; |
3c65e5b3 | 1593 | if (get_current_subfile ()->language == language_cplus) |
71c25dea | 1594 | { |
2f408ecb | 1595 | char *name = (char *) alloca (p - *pp + 1); |
433759f7 | 1596 | |
71c25dea TT |
1597 | memcpy (name, *pp, p - *pp); |
1598 | name[p - *pp] = '\0'; | |
2f408ecb | 1599 | |
596dc4ad TT |
1600 | gdb::unique_xmalloc_ptr<char> new_name = cp_canonicalize_string (name); |
1601 | if (new_name != nullptr) | |
efba19b0 | 1602 | type_name = obstack_strdup (&objfile->objfile_obstack, |
596dc4ad | 1603 | new_name.get ()); |
71c25dea TT |
1604 | } |
1605 | if (type_name == NULL) | |
1606 | { | |
a121b7c1 | 1607 | char *to = type_name = (char *) |
3e43a32a | 1608 | obstack_alloc (&objfile->objfile_obstack, p - *pp + 1); |
71c25dea TT |
1609 | |
1610 | /* Copy the name. */ | |
1611 | from = *pp + 1; | |
1612 | while (from < p) | |
1613 | *to++ = *from++; | |
1614 | *to = '\0'; | |
1615 | } | |
c5aa993b | 1616 | |
c906108c SS |
1617 | /* Set the pointer ahead of the name which we just read, and |
1618 | the colon. */ | |
71c25dea | 1619 | *pp = p + 1; |
c906108c SS |
1620 | } |
1621 | ||
dda83cd7 SM |
1622 | /* If this type has already been declared, then reuse the same |
1623 | type, rather than allocating a new one. This saves some | |
1624 | memory. */ | |
c906108c | 1625 | |
e148f09d | 1626 | for (ppt = *get_file_symbols (); ppt; ppt = ppt->next) |
c906108c SS |
1627 | for (i = 0; i < ppt->nsyms; i++) |
1628 | { | |
1629 | struct symbol *sym = ppt->symbol[i]; | |
1630 | ||
1631 | if (SYMBOL_CLASS (sym) == LOC_TYPEDEF | |
176620f1 | 1632 | && SYMBOL_DOMAIN (sym) == STRUCT_DOMAIN |
78134374 | 1633 | && (SYMBOL_TYPE (sym)->code () == code) |
987012b8 | 1634 | && strcmp (sym->linkage_name (), type_name) == 0) |
c906108c | 1635 | { |
b99607ea | 1636 | obstack_free (&objfile->objfile_obstack, type_name); |
c906108c | 1637 | type = SYMBOL_TYPE (sym); |
dda83cd7 SM |
1638 | if (typenums[0] != -1) |
1639 | *dbx_lookup_type (typenums, objfile) = type; | |
c906108c SS |
1640 | return type; |
1641 | } | |
1642 | } | |
1643 | ||
1644 | /* Didn't find the type to which this refers, so we must | |
1645 | be dealing with a forward reference. Allocate a type | |
1646 | structure for it, and keep track of it so we can | |
1647 | fill in the rest of the fields when we get the full | |
1648 | type. */ | |
1649 | type = dbx_alloc_type (typenums, objfile); | |
67607e24 | 1650 | type->set_code (code); |
d0e39ea2 | 1651 | type->set_name (type_name); |
c5aa993b | 1652 | INIT_CPLUS_SPECIFIC (type); |
b4b73759 | 1653 | type->set_is_stub (true); |
c906108c | 1654 | |
bf362611 | 1655 | add_undefined_type (type, typenums); |
c906108c SS |
1656 | return type; |
1657 | } | |
1658 | ||
c5aa993b | 1659 | case '-': /* RS/6000 built-in type */ |
c906108c SS |
1660 | case '0': |
1661 | case '1': | |
1662 | case '2': | |
1663 | case '3': | |
1664 | case '4': | |
1665 | case '5': | |
1666 | case '6': | |
1667 | case '7': | |
1668 | case '8': | |
1669 | case '9': | |
1670 | case '(': | |
1671 | (*pp)--; | |
1672 | ||
1673 | /* We deal with something like t(1,2)=(3,4)=... which | |
dda83cd7 | 1674 | the Lucid compiler and recent gcc versions (post 2.7.3) use. */ |
c906108c SS |
1675 | |
1676 | /* Allocate and enter the typedef type first. | |
dda83cd7 | 1677 | This handles recursive types. */ |
c906108c | 1678 | type = dbx_alloc_type (typenums, objfile); |
67607e24 | 1679 | type->set_code (TYPE_CODE_TYPEDEF); |
c5aa993b JM |
1680 | { |
1681 | struct type *xtype = read_type (pp, objfile); | |
433759f7 | 1682 | |
c906108c SS |
1683 | if (type == xtype) |
1684 | { | |
1685 | /* It's being defined as itself. That means it is "void". */ | |
67607e24 | 1686 | type->set_code (TYPE_CODE_VOID); |
c906108c SS |
1687 | TYPE_LENGTH (type) = 1; |
1688 | } | |
1689 | else if (type_size >= 0 || is_string) | |
1690 | { | |
dd6bda65 DJ |
1691 | /* This is the absolute wrong way to construct types. Every |
1692 | other debug format has found a way around this problem and | |
1693 | the related problems with unnecessarily stubbed types; | |
1694 | someone motivated should attempt to clean up the issue | |
1695 | here as well. Once a type pointed to has been created it | |
13a393b0 JB |
1696 | should not be modified. |
1697 | ||
dda83cd7 SM |
1698 | Well, it's not *absolutely* wrong. Constructing recursive |
1699 | types (trees, linked lists) necessarily entails modifying | |
1700 | types after creating them. Constructing any loop structure | |
1701 | entails side effects. The Dwarf 2 reader does handle this | |
1702 | more gracefully (it never constructs more than once | |
1703 | instance of a type object, so it doesn't have to copy type | |
1704 | objects wholesale), but it still mutates type objects after | |
1705 | other folks have references to them. | |
1706 | ||
1707 | Keep in mind that this circularity/mutation issue shows up | |
1708 | at the source language level, too: C's "incomplete types", | |
1709 | for example. So the proper cleanup, I think, would be to | |
1710 | limit GDB's type smashing to match exactly those required | |
1711 | by the source language. So GDB could have a | |
1712 | "complete_this_type" function, but never create unnecessary | |
1713 | copies of a type otherwise. */ | |
dd6bda65 | 1714 | replace_type (type, xtype); |
d0e39ea2 | 1715 | type->set_name (NULL); |
c906108c SS |
1716 | } |
1717 | else | |
1718 | { | |
8f53807e | 1719 | type->set_target_is_stub (true); |
c906108c SS |
1720 | TYPE_TARGET_TYPE (type) = xtype; |
1721 | } | |
1722 | } | |
1723 | break; | |
1724 | ||
c5aa993b | 1725 | /* In the following types, we must be sure to overwrite any existing |
dda83cd7 SM |
1726 | type that the typenums refer to, rather than allocating a new one |
1727 | and making the typenums point to the new one. This is because there | |
1728 | may already be pointers to the existing type (if it had been | |
1729 | forward-referenced), and we must change it to a pointer, function, | |
1730 | reference, or whatever, *in-place*. */ | |
c906108c | 1731 | |
e2cd42dd | 1732 | case '*': /* Pointer to another type */ |
c906108c | 1733 | type1 = read_type (pp, objfile); |
46bf5051 | 1734 | type = make_pointer_type (type1, dbx_lookup_type (typenums, objfile)); |
c906108c SS |
1735 | break; |
1736 | ||
c5aa993b | 1737 | case '&': /* Reference to another type */ |
c906108c | 1738 | type1 = read_type (pp, objfile); |
3b224330 | 1739 | type = make_reference_type (type1, dbx_lookup_type (typenums, objfile), |
dda83cd7 | 1740 | TYPE_CODE_REF); |
c906108c SS |
1741 | break; |
1742 | ||
c5aa993b | 1743 | case 'f': /* Function returning another type */ |
c906108c | 1744 | type1 = read_type (pp, objfile); |
0c8b41f1 | 1745 | type = make_function_type (type1, dbx_lookup_type (typenums, objfile)); |
c906108c SS |
1746 | break; |
1747 | ||
da966255 JB |
1748 | case 'g': /* Prototyped function. (Sun) */ |
1749 | { | |
dda83cd7 SM |
1750 | /* Unresolved questions: |
1751 | ||
1752 | - According to Sun's ``STABS Interface Manual'', for 'f' | |
1753 | and 'F' symbol descriptors, a `0' in the argument type list | |
1754 | indicates a varargs function. But it doesn't say how 'g' | |
1755 | type descriptors represent that info. Someone with access | |
1756 | to Sun's toolchain should try it out. | |
1757 | ||
1758 | - According to the comment in define_symbol (search for | |
1759 | `process_prototype_types:'), Sun emits integer arguments as | |
1760 | types which ref themselves --- like `void' types. Do we | |
1761 | have to deal with that here, too? Again, someone with | |
1762 | access to Sun's toolchain should try it out and let us | |
1763 | know. */ | |
1764 | ||
1765 | const char *type_start = (*pp) - 1; | |
1766 | struct type *return_type = read_type (pp, objfile); | |
1767 | struct type *func_type | |
1768 | = make_function_type (return_type, | |
0c8b41f1 | 1769 | dbx_lookup_type (typenums, objfile)); |
dda83cd7 SM |
1770 | struct type_list { |
1771 | struct type *type; | |
1772 | struct type_list *next; | |
1773 | } *arg_types = 0; | |
1774 | int num_args = 0; | |
1775 | ||
1776 | while (**pp && **pp != '#') | |
1777 | { | |
1778 | struct type *arg_type = read_type (pp, objfile); | |
1779 | struct type_list *newobj = XALLOCA (struct type_list); | |
1780 | newobj->type = arg_type; | |
1781 | newobj->next = arg_types; | |
1782 | arg_types = newobj; | |
1783 | num_args++; | |
1784 | } | |
1785 | if (**pp == '#') | |
1786 | ++*pp; | |
1787 | else | |
1788 | { | |
b98664d3 | 1789 | complaint (_("Prototyped function type didn't " |
3e43a32a | 1790 | "end arguments with `#':\n%s"), |
23136709 | 1791 | type_start); |
dda83cd7 | 1792 | } |
da966255 | 1793 | |
dda83cd7 SM |
1794 | /* If there is just one argument whose type is `void', then |
1795 | that's just an empty argument list. */ | |
1796 | if (arg_types | |
1797 | && ! arg_types->next | |
1798 | && arg_types->type->code () == TYPE_CODE_VOID) | |
1799 | num_args = 0; | |
da966255 | 1800 | |
3cabb6b0 SM |
1801 | func_type->set_fields |
1802 | ((struct field *) TYPE_ALLOC (func_type, | |
1803 | num_args * sizeof (struct field))); | |
dda83cd7 SM |
1804 | memset (func_type->fields (), 0, num_args * sizeof (struct field)); |
1805 | { | |
1806 | int i; | |
1807 | struct type_list *t; | |
1808 | ||
1809 | /* We stuck each argument type onto the front of the list | |
1810 | when we read it, so the list is reversed. Build the | |
1811 | fields array right-to-left. */ | |
1812 | for (t = arg_types, i = num_args - 1; t; t = t->next, i--) | |
1813 | func_type->field (i).set_type (t->type); | |
1814 | } | |
1815 | func_type->set_num_fields (num_args); | |
27e69b7a | 1816 | func_type->set_is_prototyped (true); |
da966255 | 1817 | |
dda83cd7 SM |
1818 | type = func_type; |
1819 | break; | |
da966255 JB |
1820 | } |
1821 | ||
c5aa993b | 1822 | case 'k': /* Const qualifier on some type (Sun) */ |
c906108c | 1823 | type = read_type (pp, objfile); |
d7242108 | 1824 | type = make_cv_type (1, TYPE_VOLATILE (type), type, |
46bf5051 | 1825 | dbx_lookup_type (typenums, objfile)); |
c906108c SS |
1826 | break; |
1827 | ||
c5aa993b | 1828 | case 'B': /* Volatile qual on some type (Sun) */ |
c906108c | 1829 | type = read_type (pp, objfile); |
d7242108 | 1830 | type = make_cv_type (TYPE_CONST (type), 1, type, |
46bf5051 | 1831 | dbx_lookup_type (typenums, objfile)); |
c906108c SS |
1832 | break; |
1833 | ||
1834 | case '@': | |
c5aa993b JM |
1835 | if (isdigit (**pp) || **pp == '(' || **pp == '-') |
1836 | { /* Member (class & variable) type */ | |
c906108c SS |
1837 | /* FIXME -- we should be doing smash_to_XXX types here. */ |
1838 | ||
1839 | struct type *domain = read_type (pp, objfile); | |
1840 | struct type *memtype; | |
1841 | ||
1842 | if (**pp != ',') | |
1843 | /* Invalid member type data format. */ | |
1844 | return error_type (pp, objfile); | |
1845 | ++*pp; | |
1846 | ||
1847 | memtype = read_type (pp, objfile); | |
1848 | type = dbx_alloc_type (typenums, objfile); | |
0d5de010 | 1849 | smash_to_memberptr_type (type, domain, memtype); |
c906108c | 1850 | } |
c5aa993b JM |
1851 | else |
1852 | /* type attribute */ | |
c906108c | 1853 | { |
a121b7c1 | 1854 | const char *attr = *pp; |
433759f7 | 1855 | |
c906108c SS |
1856 | /* Skip to the semicolon. */ |
1857 | while (**pp != ';' && **pp != '\0') | |
1858 | ++(*pp); | |
1859 | if (**pp == '\0') | |
1860 | return error_type (pp, objfile); | |
1861 | else | |
c5aa993b | 1862 | ++ * pp; /* Skip the semicolon. */ |
c906108c SS |
1863 | |
1864 | switch (*attr) | |
1865 | { | |
e2cd42dd | 1866 | case 's': /* Size attribute */ |
c906108c SS |
1867 | type_size = atoi (attr + 1); |
1868 | if (type_size <= 0) | |
1869 | type_size = -1; | |
1870 | break; | |
1871 | ||
e2cd42dd | 1872 | case 'S': /* String attribute */ |
c378eb4e | 1873 | /* FIXME: check to see if following type is array? */ |
c906108c SS |
1874 | is_string = 1; |
1875 | break; | |
1876 | ||
e2cd42dd | 1877 | case 'V': /* Vector attribute */ |
c378eb4e | 1878 | /* FIXME: check to see if following type is array? */ |
e2cd42dd MS |
1879 | is_vector = 1; |
1880 | break; | |
1881 | ||
c906108c SS |
1882 | default: |
1883 | /* Ignore unrecognized type attributes, so future compilers | |
dda83cd7 | 1884 | can invent new ones. */ |
c906108c SS |
1885 | break; |
1886 | } | |
1887 | ++*pp; | |
1888 | goto again; | |
1889 | } | |
1890 | break; | |
1891 | ||
c5aa993b | 1892 | case '#': /* Method (class & fn) type */ |
c906108c SS |
1893 | if ((*pp)[0] == '#') |
1894 | { | |
1895 | /* We'll get the parameter types from the name. */ | |
1896 | struct type *return_type; | |
1897 | ||
1898 | (*pp)++; | |
1899 | return_type = read_type (pp, objfile); | |
1900 | if (*(*pp)++ != ';') | |
b98664d3 | 1901 | complaint (_("invalid (minimal) member type " |
3e43a32a | 1902 | "data format at symtab pos %d."), |
23136709 | 1903 | symnum); |
c906108c SS |
1904 | type = allocate_stub_method (return_type); |
1905 | if (typenums[0] != -1) | |
46bf5051 | 1906 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c SS |
1907 | } |
1908 | else | |
1909 | { | |
1910 | struct type *domain = read_type (pp, objfile); | |
1911 | struct type *return_type; | |
ad2f7632 DJ |
1912 | struct field *args; |
1913 | int nargs, varargs; | |
c906108c SS |
1914 | |
1915 | if (**pp != ',') | |
1916 | /* Invalid member type data format. */ | |
1917 | return error_type (pp, objfile); | |
1918 | else | |
1919 | ++(*pp); | |
1920 | ||
1921 | return_type = read_type (pp, objfile); | |
ad2f7632 | 1922 | args = read_args (pp, ';', objfile, &nargs, &varargs); |
0a029df5 DJ |
1923 | if (args == NULL) |
1924 | return error_type (pp, objfile); | |
c906108c | 1925 | type = dbx_alloc_type (typenums, objfile); |
ad2f7632 DJ |
1926 | smash_to_method_type (type, domain, return_type, args, |
1927 | nargs, varargs); | |
c906108c SS |
1928 | } |
1929 | break; | |
1930 | ||
c5aa993b | 1931 | case 'r': /* Range type */ |
94e10a22 | 1932 | type = read_range_type (pp, typenums, type_size, objfile); |
c906108c | 1933 | if (typenums[0] != -1) |
46bf5051 | 1934 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c SS |
1935 | break; |
1936 | ||
1937 | case 'b': | |
c906108c SS |
1938 | { |
1939 | /* Sun ACC builtin int type */ | |
1940 | type = read_sun_builtin_type (pp, typenums, objfile); | |
1941 | if (typenums[0] != -1) | |
46bf5051 | 1942 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c SS |
1943 | } |
1944 | break; | |
1945 | ||
c5aa993b | 1946 | case 'R': /* Sun ACC builtin float type */ |
c906108c SS |
1947 | type = read_sun_floating_type (pp, typenums, objfile); |
1948 | if (typenums[0] != -1) | |
46bf5051 | 1949 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c | 1950 | break; |
c5aa993b JM |
1951 | |
1952 | case 'e': /* Enumeration type */ | |
c906108c SS |
1953 | type = dbx_alloc_type (typenums, objfile); |
1954 | type = read_enum_type (pp, type, objfile); | |
1955 | if (typenums[0] != -1) | |
46bf5051 | 1956 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c SS |
1957 | break; |
1958 | ||
c5aa993b JM |
1959 | case 's': /* Struct type */ |
1960 | case 'u': /* Union type */ | |
2ae1c2d2 | 1961 | { |
dda83cd7 SM |
1962 | enum type_code type_code = TYPE_CODE_UNDEF; |
1963 | type = dbx_alloc_type (typenums, objfile); | |
1964 | switch (type_descriptor) | |
1965 | { | |
1966 | case 's': | |
1967 | type_code = TYPE_CODE_STRUCT; | |
1968 | break; | |
1969 | case 'u': | |
1970 | type_code = TYPE_CODE_UNION; | |
1971 | break; | |
1972 | } | |
1973 | type = read_struct_type (pp, type, type_code, objfile); | |
1974 | break; | |
2ae1c2d2 | 1975 | } |
c906108c | 1976 | |
c5aa993b | 1977 | case 'a': /* Array type */ |
c906108c SS |
1978 | if (**pp != 'r') |
1979 | return error_type (pp, objfile); | |
1980 | ++*pp; | |
c5aa993b | 1981 | |
c906108c SS |
1982 | type = dbx_alloc_type (typenums, objfile); |
1983 | type = read_array_type (pp, type, objfile); | |
1984 | if (is_string) | |
67607e24 | 1985 | type->set_code (TYPE_CODE_STRING); |
e2cd42dd | 1986 | if (is_vector) |
ea37ba09 | 1987 | make_vector_type (type); |
c906108c SS |
1988 | break; |
1989 | ||
6b1755ce | 1990 | case 'S': /* Set type */ |
c906108c | 1991 | type1 = read_type (pp, objfile); |
cafb3438 | 1992 | type = create_set_type (NULL, type1); |
c906108c | 1993 | if (typenums[0] != -1) |
46bf5051 | 1994 | *dbx_lookup_type (typenums, objfile) = type; |
c906108c SS |
1995 | break; |
1996 | ||
1997 | default: | |
c378eb4e MS |
1998 | --*pp; /* Go back to the symbol in error. */ |
1999 | /* Particularly important if it was \0! */ | |
c906108c SS |
2000 | return error_type (pp, objfile); |
2001 | } | |
2002 | ||
2003 | if (type == 0) | |
2004 | { | |
8a3fe4f8 | 2005 | warning (_("GDB internal error, type is NULL in stabsread.c.")); |
c906108c SS |
2006 | return error_type (pp, objfile); |
2007 | } | |
2008 | ||
2009 | /* Size specified in a type attribute overrides any other size. */ | |
2010 | if (type_size != -1) | |
2011 | TYPE_LENGTH (type) = (type_size + TARGET_CHAR_BIT - 1) / TARGET_CHAR_BIT; | |
2012 | ||
2013 | return type; | |
2014 | } | |
2015 | \f | |
2016 | /* RS/6000 xlc/dbx combination uses a set of builtin types, starting from -1. | |
c378eb4e | 2017 | Return the proper type node for a given builtin type number. */ |
c906108c | 2018 | |
d772d2ab TT |
2019 | static const struct objfile_key<struct type *, |
2020 | gdb::noop_deleter<struct type *>> | |
2021 | rs6000_builtin_type_data; | |
46bf5051 | 2022 | |
c906108c | 2023 | static struct type * |
46bf5051 | 2024 | rs6000_builtin_type (int typenum, struct objfile *objfile) |
c906108c | 2025 | { |
d772d2ab | 2026 | struct type **negative_types = rs6000_builtin_type_data.get (objfile); |
46bf5051 | 2027 | |
c906108c SS |
2028 | /* We recognize types numbered from -NUMBER_RECOGNIZED to -1. */ |
2029 | #define NUMBER_RECOGNIZED 34 | |
c906108c SS |
2030 | struct type *rettype = NULL; |
2031 | ||
2032 | if (typenum >= 0 || typenum < -NUMBER_RECOGNIZED) | |
2033 | { | |
b98664d3 | 2034 | complaint (_("Unknown builtin type %d"), typenum); |
46bf5051 | 2035 | return objfile_type (objfile)->builtin_error; |
c906108c | 2036 | } |
46bf5051 UW |
2037 | |
2038 | if (!negative_types) | |
2039 | { | |
2040 | /* This includes an empty slot for type number -0. */ | |
2041 | negative_types = OBSTACK_CALLOC (&objfile->objfile_obstack, | |
2042 | NUMBER_RECOGNIZED + 1, struct type *); | |
d772d2ab | 2043 | rs6000_builtin_type_data.set (objfile, negative_types); |
46bf5051 UW |
2044 | } |
2045 | ||
c906108c SS |
2046 | if (negative_types[-typenum] != NULL) |
2047 | return negative_types[-typenum]; | |
2048 | ||
2049 | #if TARGET_CHAR_BIT != 8 | |
c5aa993b | 2050 | #error This code wrong for TARGET_CHAR_BIT not 8 |
c906108c SS |
2051 | /* These definitions all assume that TARGET_CHAR_BIT is 8. I think |
2052 | that if that ever becomes not true, the correct fix will be to | |
2053 | make the size in the struct type to be in bits, not in units of | |
2054 | TARGET_CHAR_BIT. */ | |
2055 | #endif | |
2056 | ||
2057 | switch (-typenum) | |
2058 | { | |
2059 | case 1: | |
2060 | /* The size of this and all the other types are fixed, defined | |
dda83cd7 SM |
2061 | by the debugging format. If there is a type called "int" which |
2062 | is other than 32 bits, then it should use a new negative type | |
2063 | number (or avoid negative type numbers for that case). | |
2064 | See stabs.texinfo. */ | |
19f392bc | 2065 | rettype = init_integer_type (objfile, 32, 0, "int"); |
c906108c SS |
2066 | break; |
2067 | case 2: | |
19f392bc | 2068 | rettype = init_integer_type (objfile, 8, 0, "char"); |
15152a54 | 2069 | rettype->set_has_no_signedness (true); |
c906108c SS |
2070 | break; |
2071 | case 3: | |
19f392bc | 2072 | rettype = init_integer_type (objfile, 16, 0, "short"); |
c906108c SS |
2073 | break; |
2074 | case 4: | |
19f392bc | 2075 | rettype = init_integer_type (objfile, 32, 0, "long"); |
c906108c SS |
2076 | break; |
2077 | case 5: | |
19f392bc | 2078 | rettype = init_integer_type (objfile, 8, 1, "unsigned char"); |
c906108c SS |
2079 | break; |
2080 | case 6: | |
19f392bc | 2081 | rettype = init_integer_type (objfile, 8, 0, "signed char"); |
c906108c SS |
2082 | break; |
2083 | case 7: | |
19f392bc | 2084 | rettype = init_integer_type (objfile, 16, 1, "unsigned short"); |
c906108c SS |
2085 | break; |
2086 | case 8: | |
19f392bc | 2087 | rettype = init_integer_type (objfile, 32, 1, "unsigned int"); |
c906108c SS |
2088 | break; |
2089 | case 9: | |
19f392bc | 2090 | rettype = init_integer_type (objfile, 32, 1, "unsigned"); |
89acf84d | 2091 | break; |
c906108c | 2092 | case 10: |
19f392bc | 2093 | rettype = init_integer_type (objfile, 32, 1, "unsigned long"); |
c906108c SS |
2094 | break; |
2095 | case 11: | |
77b7c781 | 2096 | rettype = init_type (objfile, TYPE_CODE_VOID, TARGET_CHAR_BIT, "void"); |
c906108c SS |
2097 | break; |
2098 | case 12: | |
2099 | /* IEEE single precision (32 bit). */ | |
49f190bc UW |
2100 | rettype = init_float_type (objfile, 32, "float", |
2101 | floatformats_ieee_single); | |
c906108c SS |
2102 | break; |
2103 | case 13: | |
2104 | /* IEEE double precision (64 bit). */ | |
49f190bc UW |
2105 | rettype = init_float_type (objfile, 64, "double", |
2106 | floatformats_ieee_double); | |
c906108c SS |
2107 | break; |
2108 | case 14: | |
2109 | /* This is an IEEE double on the RS/6000, and different machines with | |
dda83cd7 SM |
2110 | different sizes for "long double" should use different negative |
2111 | type numbers. See stabs.texinfo. */ | |
49f190bc UW |
2112 | rettype = init_float_type (objfile, 64, "long double", |
2113 | floatformats_ieee_double); | |
c906108c SS |
2114 | break; |
2115 | case 15: | |
19f392bc | 2116 | rettype = init_integer_type (objfile, 32, 0, "integer"); |
c906108c SS |
2117 | break; |
2118 | case 16: | |
19f392bc | 2119 | rettype = init_boolean_type (objfile, 32, 1, "boolean"); |
c906108c SS |
2120 | break; |
2121 | case 17: | |
49f190bc UW |
2122 | rettype = init_float_type (objfile, 32, "short real", |
2123 | floatformats_ieee_single); | |
c906108c SS |
2124 | break; |
2125 | case 18: | |
49f190bc UW |
2126 | rettype = init_float_type (objfile, 64, "real", |
2127 | floatformats_ieee_double); | |
c906108c SS |
2128 | break; |
2129 | case 19: | |
19f392bc | 2130 | rettype = init_type (objfile, TYPE_CODE_ERROR, 0, "stringptr"); |
c906108c SS |
2131 | break; |
2132 | case 20: | |
19f392bc | 2133 | rettype = init_character_type (objfile, 8, 1, "character"); |
c906108c SS |
2134 | break; |
2135 | case 21: | |
19f392bc | 2136 | rettype = init_boolean_type (objfile, 8, 1, "logical*1"); |
c906108c SS |
2137 | break; |
2138 | case 22: | |
19f392bc | 2139 | rettype = init_boolean_type (objfile, 16, 1, "logical*2"); |
c906108c SS |
2140 | break; |
2141 | case 23: | |
19f392bc | 2142 | rettype = init_boolean_type (objfile, 32, 1, "logical*4"); |
c906108c SS |
2143 | break; |
2144 | case 24: | |
19f392bc | 2145 | rettype = init_boolean_type (objfile, 32, 1, "logical"); |
c906108c SS |
2146 | break; |
2147 | case 25: | |
2148 | /* Complex type consisting of two IEEE single precision values. */ | |
5b930b45 | 2149 | rettype = init_complex_type ("complex", |
19f392bc | 2150 | rs6000_builtin_type (12, objfile)); |
c906108c SS |
2151 | break; |
2152 | case 26: | |
2153 | /* Complex type consisting of two IEEE double precision values. */ | |
5b930b45 | 2154 | rettype = init_complex_type ("double complex", |
19f392bc | 2155 | rs6000_builtin_type (13, objfile)); |
c906108c SS |
2156 | break; |
2157 | case 27: | |
19f392bc | 2158 | rettype = init_integer_type (objfile, 8, 0, "integer*1"); |
c906108c SS |
2159 | break; |
2160 | case 28: | |
19f392bc | 2161 | rettype = init_integer_type (objfile, 16, 0, "integer*2"); |
c906108c SS |
2162 | break; |
2163 | case 29: | |
19f392bc | 2164 | rettype = init_integer_type (objfile, 32, 0, "integer*4"); |
c906108c SS |
2165 | break; |
2166 | case 30: | |
19f392bc | 2167 | rettype = init_character_type (objfile, 16, 0, "wchar"); |
c906108c SS |
2168 | break; |
2169 | case 31: | |
19f392bc | 2170 | rettype = init_integer_type (objfile, 64, 0, "long long"); |
c906108c SS |
2171 | break; |
2172 | case 32: | |
19f392bc | 2173 | rettype = init_integer_type (objfile, 64, 1, "unsigned long long"); |
c906108c SS |
2174 | break; |
2175 | case 33: | |
19f392bc | 2176 | rettype = init_integer_type (objfile, 64, 1, "logical*8"); |
c906108c SS |
2177 | break; |
2178 | case 34: | |
19f392bc | 2179 | rettype = init_integer_type (objfile, 64, 0, "integer*8"); |
c906108c SS |
2180 | break; |
2181 | } | |
2182 | negative_types[-typenum] = rettype; | |
2183 | return rettype; | |
2184 | } | |
2185 | \f | |
2186 | /* This page contains subroutines of read_type. */ | |
2187 | ||
0d5cff50 DE |
2188 | /* Wrapper around method_name_from_physname to flag a complaint |
2189 | if there is an error. */ | |
de17c821 | 2190 | |
0d5cff50 DE |
2191 | static char * |
2192 | stabs_method_name_from_physname (const char *physname) | |
de17c821 DJ |
2193 | { |
2194 | char *method_name; | |
2195 | ||
2196 | method_name = method_name_from_physname (physname); | |
2197 | ||
2198 | if (method_name == NULL) | |
c263362b | 2199 | { |
b98664d3 | 2200 | complaint (_("Method has bad physname %s\n"), physname); |
0d5cff50 | 2201 | return NULL; |
c263362b | 2202 | } |
de17c821 | 2203 | |
0d5cff50 | 2204 | return method_name; |
de17c821 DJ |
2205 | } |
2206 | ||
c906108c SS |
2207 | /* Read member function stabs info for C++ classes. The form of each member |
2208 | function data is: | |
2209 | ||
c5aa993b | 2210 | NAME :: TYPENUM[=type definition] ARGS : PHYSNAME ; |
c906108c SS |
2211 | |
2212 | An example with two member functions is: | |
2213 | ||
c5aa993b | 2214 | afunc1::20=##15;:i;2A.;afunc2::20:i;2A.; |
c906108c SS |
2215 | |
2216 | For the case of overloaded operators, the format is op$::*.funcs, where | |
2217 | $ is the CPLUS_MARKER (usually '$'), `*' holds the place for an operator | |
2218 | name (such as `+=') and `.' marks the end of the operator name. | |
2219 | ||
2220 | Returns 1 for success, 0 for failure. */ | |
2221 | ||
2222 | static int | |
61b30099 | 2223 | read_member_functions (struct stab_field_info *fip, const char **pp, |
a121b7c1 | 2224 | struct type *type, struct objfile *objfile) |
c906108c SS |
2225 | { |
2226 | int nfn_fields = 0; | |
2227 | int length = 0; | |
c906108c SS |
2228 | int i; |
2229 | struct next_fnfield | |
2230 | { | |
2231 | struct next_fnfield *next; | |
2232 | struct fn_field fn_field; | |
c5aa993b JM |
2233 | } |
2234 | *sublist; | |
c906108c SS |
2235 | struct type *look_ahead_type; |
2236 | struct next_fnfieldlist *new_fnlist; | |
2237 | struct next_fnfield *new_sublist; | |
2238 | char *main_fn_name; | |
a121b7c1 | 2239 | const char *p; |
c5aa993b | 2240 | |
c906108c | 2241 | /* Process each list until we find something that is not a member function |
c378eb4e | 2242 | or find the end of the functions. */ |
c906108c SS |
2243 | |
2244 | while (**pp != ';') | |
2245 | { | |
2246 | /* We should be positioned at the start of the function name. | |
dda83cd7 SM |
2247 | Scan forward to find the first ':' and if it is not the |
2248 | first of a "::" delimiter, then this is not a member function. */ | |
c906108c SS |
2249 | p = *pp; |
2250 | while (*p != ':') | |
2251 | { | |
2252 | p++; | |
2253 | } | |
2254 | if (p[1] != ':') | |
2255 | { | |
2256 | break; | |
2257 | } | |
2258 | ||
2259 | sublist = NULL; | |
2260 | look_ahead_type = NULL; | |
2261 | length = 0; | |
c5aa993b | 2262 | |
61b30099 | 2263 | new_fnlist = OBSTACK_ZALLOC (&fip->obstack, struct next_fnfieldlist); |
c5aa993b | 2264 | |
c906108c SS |
2265 | if ((*pp)[0] == 'o' && (*pp)[1] == 'p' && is_cplus_marker ((*pp)[2])) |
2266 | { | |
2267 | /* This is a completely wierd case. In order to stuff in the | |
2268 | names that might contain colons (the usual name delimiter), | |
2269 | Mike Tiemann defined a different name format which is | |
2270 | signalled if the identifier is "op$". In that case, the | |
2271 | format is "op$::XXXX." where XXXX is the name. This is | |
2272 | used for names like "+" or "=". YUUUUUUUK! FIXME! */ | |
2273 | /* This lets the user type "break operator+". | |
2274 | We could just put in "+" as the name, but that wouldn't | |
2275 | work for "*". */ | |
8343f86c | 2276 | static char opname[32] = "op$"; |
c906108c | 2277 | char *o = opname + 3; |
c5aa993b | 2278 | |
c906108c SS |
2279 | /* Skip past '::'. */ |
2280 | *pp = p + 2; | |
2281 | ||
2282 | STABS_CONTINUE (pp, objfile); | |
2283 | p = *pp; | |
2284 | while (*p != '.') | |
2285 | { | |
2286 | *o++ = *p++; | |
2287 | } | |
2288 | main_fn_name = savestring (opname, o - opname); | |
2289 | /* Skip past '.' */ | |
2290 | *pp = p + 1; | |
2291 | } | |
2292 | else | |
2293 | { | |
2294 | main_fn_name = savestring (*pp, p - *pp); | |
2295 | /* Skip past '::'. */ | |
2296 | *pp = p + 2; | |
2297 | } | |
c5aa993b JM |
2298 | new_fnlist->fn_fieldlist.name = main_fn_name; |
2299 | ||
c906108c SS |
2300 | do |
2301 | { | |
61b30099 | 2302 | new_sublist = OBSTACK_ZALLOC (&fip->obstack, struct next_fnfield); |
c5aa993b | 2303 | |
c906108c SS |
2304 | /* Check for and handle cretinous dbx symbol name continuation! */ |
2305 | if (look_ahead_type == NULL) | |
2306 | { | |
c378eb4e | 2307 | /* Normal case. */ |
c906108c | 2308 | STABS_CONTINUE (pp, objfile); |
c5aa993b JM |
2309 | |
2310 | new_sublist->fn_field.type = read_type (pp, objfile); | |
c906108c SS |
2311 | if (**pp != ':') |
2312 | { | |
2313 | /* Invalid symtab info for member function. */ | |
2314 | return 0; | |
2315 | } | |
2316 | } | |
2317 | else | |
2318 | { | |
2319 | /* g++ version 1 kludge */ | |
c5aa993b | 2320 | new_sublist->fn_field.type = look_ahead_type; |
c906108c SS |
2321 | look_ahead_type = NULL; |
2322 | } | |
c5aa993b | 2323 | |
c906108c SS |
2324 | (*pp)++; |
2325 | p = *pp; | |
2326 | while (*p != ';') | |
2327 | { | |
2328 | p++; | |
2329 | } | |
c5aa993b | 2330 | |
09e2d7c7 | 2331 | /* These are methods, not functions. */ |
78134374 | 2332 | if (new_sublist->fn_field.type->code () == TYPE_CODE_FUNC) |
67607e24 | 2333 | new_sublist->fn_field.type->set_code (TYPE_CODE_METHOD); |
c906108c | 2334 | |
09e2d7c7 | 2335 | /* If this is just a stub, then we don't have the real name here. */ |
e46d3488 | 2336 | if (new_sublist->fn_field.type->is_stub ()) |
c906108c | 2337 | { |
4bfb94b8 | 2338 | if (!TYPE_SELF_TYPE (new_sublist->fn_field.type)) |
09e2d7c7 | 2339 | set_type_self_type (new_sublist->fn_field.type, type); |
c5aa993b | 2340 | new_sublist->fn_field.is_stub = 1; |
c906108c | 2341 | } |
09e2d7c7 | 2342 | |
c5aa993b | 2343 | new_sublist->fn_field.physname = savestring (*pp, p - *pp); |
c906108c | 2344 | *pp = p + 1; |
c5aa993b | 2345 | |
c906108c SS |
2346 | /* Set this member function's visibility fields. */ |
2347 | switch (*(*pp)++) | |
2348 | { | |
c5aa993b JM |
2349 | case VISIBILITY_PRIVATE: |
2350 | new_sublist->fn_field.is_private = 1; | |
2351 | break; | |
2352 | case VISIBILITY_PROTECTED: | |
2353 | new_sublist->fn_field.is_protected = 1; | |
2354 | break; | |
c906108c | 2355 | } |
c5aa993b | 2356 | |
c906108c SS |
2357 | STABS_CONTINUE (pp, objfile); |
2358 | switch (**pp) | |
2359 | { | |
c378eb4e | 2360 | case 'A': /* Normal functions. */ |
c5aa993b JM |
2361 | new_sublist->fn_field.is_const = 0; |
2362 | new_sublist->fn_field.is_volatile = 0; | |
2363 | (*pp)++; | |
2364 | break; | |
c378eb4e | 2365 | case 'B': /* `const' member functions. */ |
c5aa993b JM |
2366 | new_sublist->fn_field.is_const = 1; |
2367 | new_sublist->fn_field.is_volatile = 0; | |
2368 | (*pp)++; | |
2369 | break; | |
c378eb4e | 2370 | case 'C': /* `volatile' member function. */ |
c5aa993b JM |
2371 | new_sublist->fn_field.is_const = 0; |
2372 | new_sublist->fn_field.is_volatile = 1; | |
2373 | (*pp)++; | |
2374 | break; | |
c378eb4e | 2375 | case 'D': /* `const volatile' member function. */ |
c5aa993b JM |
2376 | new_sublist->fn_field.is_const = 1; |
2377 | new_sublist->fn_field.is_volatile = 1; | |
2378 | (*pp)++; | |
2379 | break; | |
3e43a32a | 2380 | case '*': /* File compiled with g++ version 1 -- |
c378eb4e | 2381 | no info. */ |
c5aa993b JM |
2382 | case '?': |
2383 | case '.': | |
2384 | break; | |
2385 | default: | |
b98664d3 | 2386 | complaint (_("const/volatile indicator missing, got '%c'"), |
3e43a32a | 2387 | **pp); |
c5aa993b | 2388 | break; |
c906108c | 2389 | } |
c5aa993b | 2390 | |
c906108c SS |
2391 | switch (*(*pp)++) |
2392 | { | |
c5aa993b | 2393 | case '*': |
c906108c SS |
2394 | { |
2395 | int nbits; | |
c5aa993b | 2396 | /* virtual member function, followed by index. |
c906108c SS |
2397 | The sign bit is set to distinguish pointers-to-methods |
2398 | from virtual function indicies. Since the array is | |
2399 | in words, the quantity must be shifted left by 1 | |
2400 | on 16 bit machine, and by 2 on 32 bit machine, forcing | |
2401 | the sign bit out, and usable as a valid index into | |
2402 | the array. Remove the sign bit here. */ | |
c5aa993b | 2403 | new_sublist->fn_field.voffset = |
94e10a22 | 2404 | (0x7fffffff & read_huge_number (pp, ';', &nbits, 0)) + 2; |
c906108c SS |
2405 | if (nbits != 0) |
2406 | return 0; | |
c5aa993b | 2407 | |
c906108c SS |
2408 | STABS_CONTINUE (pp, objfile); |
2409 | if (**pp == ';' || **pp == '\0') | |
2410 | { | |
2411 | /* Must be g++ version 1. */ | |
c5aa993b | 2412 | new_sublist->fn_field.fcontext = 0; |
c906108c SS |
2413 | } |
2414 | else | |
2415 | { | |
2416 | /* Figure out from whence this virtual function came. | |
2417 | It may belong to virtual function table of | |
2418 | one of its baseclasses. */ | |
2419 | look_ahead_type = read_type (pp, objfile); | |
2420 | if (**pp == ':') | |
2421 | { | |
c378eb4e | 2422 | /* g++ version 1 overloaded methods. */ |
c906108c SS |
2423 | } |
2424 | else | |
2425 | { | |
c5aa993b | 2426 | new_sublist->fn_field.fcontext = look_ahead_type; |
c906108c SS |
2427 | if (**pp != ';') |
2428 | { | |
2429 | return 0; | |
2430 | } | |
2431 | else | |
2432 | { | |
2433 | ++*pp; | |
2434 | } | |
2435 | look_ahead_type = NULL; | |
2436 | } | |
2437 | } | |
2438 | break; | |
2439 | } | |
c5aa993b JM |
2440 | case '?': |
2441 | /* static member function. */ | |
4ea09c10 PS |
2442 | { |
2443 | int slen = strlen (main_fn_name); | |
2444 | ||
2445 | new_sublist->fn_field.voffset = VOFFSET_STATIC; | |
2446 | ||
2447 | /* For static member functions, we can't tell if they | |
2448 | are stubbed, as they are put out as functions, and not as | |
2449 | methods. | |
2450 | GCC v2 emits the fully mangled name if | |
2451 | dbxout.c:flag_minimal_debug is not set, so we have to | |
2452 | detect a fully mangled physname here and set is_stub | |
2453 | accordingly. Fully mangled physnames in v2 start with | |
2454 | the member function name, followed by two underscores. | |
2455 | GCC v3 currently always emits stubbed member functions, | |
2456 | but with fully mangled physnames, which start with _Z. */ | |
2457 | if (!(strncmp (new_sublist->fn_field.physname, | |
2458 | main_fn_name, slen) == 0 | |
2459 | && new_sublist->fn_field.physname[slen] == '_' | |
2460 | && new_sublist->fn_field.physname[slen + 1] == '_')) | |
2461 | { | |
2462 | new_sublist->fn_field.is_stub = 1; | |
2463 | } | |
2464 | break; | |
2465 | } | |
c5aa993b JM |
2466 | |
2467 | default: | |
2468 | /* error */ | |
b98664d3 | 2469 | complaint (_("member function type missing, got '%c'"), |
3e43a32a | 2470 | (*pp)[-1]); |
86a73007 TT |
2471 | /* Normal member function. */ |
2472 | /* Fall through. */ | |
c5aa993b JM |
2473 | |
2474 | case '.': | |
2475 | /* normal member function. */ | |
2476 | new_sublist->fn_field.voffset = 0; | |
2477 | new_sublist->fn_field.fcontext = 0; | |
2478 | break; | |
c906108c | 2479 | } |
c5aa993b JM |
2480 | |
2481 | new_sublist->next = sublist; | |
c906108c SS |
2482 | sublist = new_sublist; |
2483 | length++; | |
2484 | STABS_CONTINUE (pp, objfile); | |
2485 | } | |
2486 | while (**pp != ';' && **pp != '\0'); | |
c5aa993b | 2487 | |
c906108c | 2488 | (*pp)++; |
0c867556 | 2489 | STABS_CONTINUE (pp, objfile); |
c5aa993b | 2490 | |
0c867556 PS |
2491 | /* Skip GCC 3.X member functions which are duplicates of the callable |
2492 | constructor/destructor. */ | |
6cbbcdfe KS |
2493 | if (strcmp_iw (main_fn_name, "__base_ctor ") == 0 |
2494 | || strcmp_iw (main_fn_name, "__base_dtor ") == 0 | |
0c867556 | 2495 | || strcmp (main_fn_name, "__deleting_dtor") == 0) |
c906108c | 2496 | { |
0c867556 | 2497 | xfree (main_fn_name); |
c906108c | 2498 | } |
0c867556 PS |
2499 | else |
2500 | { | |
de17c821 DJ |
2501 | int has_destructor = 0, has_other = 0; |
2502 | int is_v3 = 0; | |
2503 | struct next_fnfield *tmp_sublist; | |
2504 | ||
2505 | /* Various versions of GCC emit various mostly-useless | |
2506 | strings in the name field for special member functions. | |
2507 | ||
2508 | For stub methods, we need to defer correcting the name | |
2509 | until we are ready to unstub the method, because the current | |
2510 | name string is used by gdb_mangle_name. The only stub methods | |
2511 | of concern here are GNU v2 operators; other methods have their | |
2512 | names correct (see caveat below). | |
2513 | ||
2514 | For non-stub methods, in GNU v3, we have a complete physname. | |
2515 | Therefore we can safely correct the name now. This primarily | |
2516 | affects constructors and destructors, whose name will be | |
2517 | __comp_ctor or __comp_dtor instead of Foo or ~Foo. Cast | |
2518 | operators will also have incorrect names; for instance, | |
2519 | "operator int" will be named "operator i" (i.e. the type is | |
2520 | mangled). | |
2521 | ||
2522 | For non-stub methods in GNU v2, we have no easy way to | |
2523 | know if we have a complete physname or not. For most | |
2524 | methods the result depends on the platform (if CPLUS_MARKER | |
2525 | can be `$' or `.', it will use minimal debug information, or | |
2526 | otherwise the full physname will be included). | |
2527 | ||
2528 | Rather than dealing with this, we take a different approach. | |
2529 | For v3 mangled names, we can use the full physname; for v2, | |
2530 | we use cplus_demangle_opname (which is actually v2 specific), | |
2531 | because the only interesting names are all operators - once again | |
2532 | barring the caveat below. Skip this process if any method in the | |
2533 | group is a stub, to prevent our fouling up the workings of | |
2534 | gdb_mangle_name. | |
2535 | ||
2536 | The caveat: GCC 2.95.x (and earlier?) put constructors and | |
2537 | destructors in the same method group. We need to split this | |
2538 | into two groups, because they should have different names. | |
2539 | So for each method group we check whether it contains both | |
2540 | routines whose physname appears to be a destructor (the physnames | |
2541 | for and destructors are always provided, due to quirks in v2 | |
2542 | mangling) and routines whose physname does not appear to be a | |
2543 | destructor. If so then we break up the list into two halves. | |
2544 | Even if the constructors and destructors aren't in the same group | |
2545 | the destructor will still lack the leading tilde, so that also | |
2546 | needs to be fixed. | |
2547 | ||
2548 | So, to summarize what we expect and handle here: | |
2549 | ||
dda83cd7 | 2550 | Given Given Real Real Action |
de17c821 DJ |
2551 | method name physname physname method name |
2552 | ||
2553 | __opi [none] __opi__3Foo operator int opname | |
dda83cd7 | 2554 | [now or later] |
3e43a32a | 2555 | Foo _._3Foo _._3Foo ~Foo separate and |
dda83cd7 | 2556 | rename |
de17c821 DJ |
2557 | operator i _ZN3FoocviEv _ZN3FoocviEv operator int demangle |
2558 | __comp_ctor _ZN3FooC1ERKS_ _ZN3FooC1ERKS_ Foo demangle | |
2559 | */ | |
2560 | ||
2561 | tmp_sublist = sublist; | |
2562 | while (tmp_sublist != NULL) | |
2563 | { | |
de17c821 DJ |
2564 | if (tmp_sublist->fn_field.physname[0] == '_' |
2565 | && tmp_sublist->fn_field.physname[1] == 'Z') | |
2566 | is_v3 = 1; | |
2567 | ||
2568 | if (is_destructor_name (tmp_sublist->fn_field.physname)) | |
2569 | has_destructor++; | |
2570 | else | |
2571 | has_other++; | |
2572 | ||
2573 | tmp_sublist = tmp_sublist->next; | |
2574 | } | |
2575 | ||
2576 | if (has_destructor && has_other) | |
2577 | { | |
2578 | struct next_fnfieldlist *destr_fnlist; | |
2579 | struct next_fnfield *last_sublist; | |
2580 | ||
2581 | /* Create a new fn_fieldlist for the destructors. */ | |
2582 | ||
61b30099 TT |
2583 | destr_fnlist = OBSTACK_ZALLOC (&fip->obstack, |
2584 | struct next_fnfieldlist); | |
8d749320 | 2585 | |
de17c821 | 2586 | destr_fnlist->fn_fieldlist.name |
48cb83fd JK |
2587 | = obconcat (&objfile->objfile_obstack, "~", |
2588 | new_fnlist->fn_fieldlist.name, (char *) NULL); | |
de17c821 | 2589 | |
8d749320 SM |
2590 | destr_fnlist->fn_fieldlist.fn_fields = |
2591 | XOBNEWVEC (&objfile->objfile_obstack, | |
2592 | struct fn_field, has_destructor); | |
de17c821 DJ |
2593 | memset (destr_fnlist->fn_fieldlist.fn_fields, 0, |
2594 | sizeof (struct fn_field) * has_destructor); | |
2595 | tmp_sublist = sublist; | |
2596 | last_sublist = NULL; | |
2597 | i = 0; | |
2598 | while (tmp_sublist != NULL) | |
2599 | { | |
2600 | if (!is_destructor_name (tmp_sublist->fn_field.physname)) | |
2601 | { | |
2602 | tmp_sublist = tmp_sublist->next; | |
2603 | continue; | |
2604 | } | |
2605 | ||
2606 | destr_fnlist->fn_fieldlist.fn_fields[i++] | |
2607 | = tmp_sublist->fn_field; | |
2608 | if (last_sublist) | |
2609 | last_sublist->next = tmp_sublist->next; | |
2610 | else | |
2611 | sublist = tmp_sublist->next; | |
2612 | last_sublist = tmp_sublist; | |
2613 | tmp_sublist = tmp_sublist->next; | |
2614 | } | |
2615 | ||
2616 | destr_fnlist->fn_fieldlist.length = has_destructor; | |
2617 | destr_fnlist->next = fip->fnlist; | |
2618 | fip->fnlist = destr_fnlist; | |
2619 | nfn_fields++; | |
de17c821 DJ |
2620 | length -= has_destructor; |
2621 | } | |
2622 | else if (is_v3) | |
2623 | { | |
2624 | /* v3 mangling prevents the use of abbreviated physnames, | |
2625 | so we can do this here. There are stubbed methods in v3 | |
2626 | only: | |
2627 | - in -gstabs instead of -gstabs+ | |
2628 | - or for static methods, which are output as a function type | |
2629 | instead of a method type. */ | |
0d5cff50 DE |
2630 | char *new_method_name = |
2631 | stabs_method_name_from_physname (sublist->fn_field.physname); | |
de17c821 | 2632 | |
0d5cff50 DE |
2633 | if (new_method_name != NULL |
2634 | && strcmp (new_method_name, | |
2635 | new_fnlist->fn_fieldlist.name) != 0) | |
2636 | { | |
2637 | new_fnlist->fn_fieldlist.name = new_method_name; | |
2638 | xfree (main_fn_name); | |
2639 | } | |
2640 | else | |
2641 | xfree (new_method_name); | |
de17c821 DJ |
2642 | } |
2643 | else if (has_destructor && new_fnlist->fn_fieldlist.name[0] != '~') | |
2644 | { | |
1754f103 | 2645 | new_fnlist->fn_fieldlist.name = |
0d5cff50 DE |
2646 | obconcat (&objfile->objfile_obstack, |
2647 | "~", main_fn_name, (char *)NULL); | |
de17c821 DJ |
2648 | xfree (main_fn_name); |
2649 | } | |
de17c821 | 2650 | |
e39db4db SM |
2651 | new_fnlist->fn_fieldlist.fn_fields |
2652 | = OBSTACK_CALLOC (&objfile->objfile_obstack, length, fn_field); | |
0c867556 PS |
2653 | for (i = length; (i--, sublist); sublist = sublist->next) |
2654 | { | |
2655 | new_fnlist->fn_fieldlist.fn_fields[i] = sublist->fn_field; | |
2656 | } | |
c5aa993b | 2657 | |
0c867556 PS |
2658 | new_fnlist->fn_fieldlist.length = length; |
2659 | new_fnlist->next = fip->fnlist; | |
2660 | fip->fnlist = new_fnlist; | |
2661 | nfn_fields++; | |
0c867556 | 2662 | } |
c906108c SS |
2663 | } |
2664 | ||
2665 | if (nfn_fields) | |
2666 | { | |
2667 | ALLOCATE_CPLUS_STRUCT_TYPE (type); | |
2668 | TYPE_FN_FIELDLISTS (type) = (struct fn_fieldlist *) | |
2669 | TYPE_ALLOC (type, sizeof (struct fn_fieldlist) * nfn_fields); | |
2670 | memset (TYPE_FN_FIELDLISTS (type), 0, | |
2671 | sizeof (struct fn_fieldlist) * nfn_fields); | |
2672 | TYPE_NFN_FIELDS (type) = nfn_fields; | |
c906108c SS |
2673 | } |
2674 | ||
2675 | return 1; | |
2676 | } | |
2677 | ||
2678 | /* Special GNU C++ name. | |
2679 | ||
2680 | Returns 1 for success, 0 for failure. "failure" means that we can't | |
2681 | keep parsing and it's time for error_type(). */ | |
2682 | ||
2683 | static int | |
61b30099 TT |
2684 | read_cpp_abbrev (struct stab_field_info *fip, const char **pp, |
2685 | struct type *type, struct objfile *objfile) | |
c906108c | 2686 | { |
a121b7c1 | 2687 | const char *p; |
0d5cff50 | 2688 | const char *name; |
c906108c SS |
2689 | char cpp_abbrev; |
2690 | struct type *context; | |
2691 | ||
2692 | p = *pp; | |
2693 | if (*++p == 'v') | |
2694 | { | |
2695 | name = NULL; | |
2696 | cpp_abbrev = *++p; | |
2697 | ||
2698 | *pp = p + 1; | |
2699 | ||
2700 | /* At this point, *pp points to something like "22:23=*22...", | |
dda83cd7 SM |
2701 | where the type number before the ':' is the "context" and |
2702 | everything after is a regular type definition. Lookup the | |
2703 | type, find it's name, and construct the field name. */ | |
c906108c SS |
2704 | |
2705 | context = read_type (pp, objfile); | |
2706 | ||
2707 | switch (cpp_abbrev) | |
2708 | { | |
c5aa993b | 2709 | case 'f': /* $vf -- a virtual function table pointer */ |
7d93a1e0 | 2710 | name = context->name (); |
c2bd2ed9 | 2711 | if (name == NULL) |
433759f7 MS |
2712 | { |
2713 | name = ""; | |
2714 | } | |
48cb83fd JK |
2715 | fip->list->field.name = obconcat (&objfile->objfile_obstack, |
2716 | vptr_name, name, (char *) NULL); | |
c5aa993b | 2717 | break; |
c906108c | 2718 | |
c5aa993b | 2719 | case 'b': /* $vb -- a virtual bsomethingorother */ |
7d93a1e0 | 2720 | name = context->name (); |
c5aa993b JM |
2721 | if (name == NULL) |
2722 | { | |
b98664d3 | 2723 | complaint (_("C++ abbreviated type name " |
3e43a32a | 2724 | "unknown at symtab pos %d"), |
23136709 | 2725 | symnum); |
c5aa993b JM |
2726 | name = "FOO"; |
2727 | } | |
48cb83fd JK |
2728 | fip->list->field.name = obconcat (&objfile->objfile_obstack, vb_name, |
2729 | name, (char *) NULL); | |
c5aa993b | 2730 | break; |
c906108c | 2731 | |
c5aa993b | 2732 | default: |
23136709 | 2733 | invalid_cpp_abbrev_complaint (*pp); |
48cb83fd JK |
2734 | fip->list->field.name = obconcat (&objfile->objfile_obstack, |
2735 | "INVALID_CPLUSPLUS_ABBREV", | |
2736 | (char *) NULL); | |
c5aa993b | 2737 | break; |
c906108c SS |
2738 | } |
2739 | ||
2740 | /* At this point, *pp points to the ':'. Skip it and read the | |
dda83cd7 | 2741 | field type. */ |
c906108c SS |
2742 | |
2743 | p = ++(*pp); | |
2744 | if (p[-1] != ':') | |
2745 | { | |
23136709 | 2746 | invalid_cpp_abbrev_complaint (*pp); |
c906108c SS |
2747 | return 0; |
2748 | } | |
5d14b6e5 | 2749 | fip->list->field.set_type (read_type (pp, objfile)); |
c906108c | 2750 | if (**pp == ',') |
c5aa993b | 2751 | (*pp)++; /* Skip the comma. */ |
c906108c SS |
2752 | else |
2753 | return 0; | |
2754 | ||
2755 | { | |
2756 | int nbits; | |
433759f7 | 2757 | |
f41f5e61 PA |
2758 | SET_FIELD_BITPOS (fip->list->field, |
2759 | read_huge_number (pp, ';', &nbits, 0)); | |
c906108c SS |
2760 | if (nbits != 0) |
2761 | return 0; | |
2762 | } | |
2763 | /* This field is unpacked. */ | |
2764 | FIELD_BITSIZE (fip->list->field) = 0; | |
2765 | fip->list->visibility = VISIBILITY_PRIVATE; | |
2766 | } | |
2767 | else | |
2768 | { | |
23136709 | 2769 | invalid_cpp_abbrev_complaint (*pp); |
c906108c | 2770 | /* We have no idea what syntax an unrecognized abbrev would have, so |
dda83cd7 SM |
2771 | better return 0. If we returned 1, we would need to at least advance |
2772 | *pp to avoid an infinite loop. */ | |
c906108c SS |
2773 | return 0; |
2774 | } | |
2775 | return 1; | |
2776 | } | |
2777 | ||
2778 | static void | |
61b30099 TT |
2779 | read_one_struct_field (struct stab_field_info *fip, const char **pp, |
2780 | const char *p, struct type *type, | |
2781 | struct objfile *objfile) | |
c906108c | 2782 | { |
08feed99 | 2783 | struct gdbarch *gdbarch = objfile->arch (); |
5e2b427d | 2784 | |
224c3ddb | 2785 | fip->list->field.name |
0cf9feb9 | 2786 | = obstack_strndup (&objfile->objfile_obstack, *pp, p - *pp); |
c906108c SS |
2787 | *pp = p + 1; |
2788 | ||
c378eb4e | 2789 | /* This means we have a visibility for a field coming. */ |
c906108c SS |
2790 | if (**pp == '/') |
2791 | { | |
2792 | (*pp)++; | |
c5aa993b | 2793 | fip->list->visibility = *(*pp)++; |
c906108c SS |
2794 | } |
2795 | else | |
2796 | { | |
2797 | /* normal dbx-style format, no explicit visibility */ | |
c5aa993b | 2798 | fip->list->visibility = VISIBILITY_PUBLIC; |
c906108c SS |
2799 | } |
2800 | ||
5d14b6e5 | 2801 | fip->list->field.set_type (read_type (pp, objfile)); |
c906108c SS |
2802 | if (**pp == ':') |
2803 | { | |
2804 | p = ++(*pp); | |
2805 | #if 0 | |
c378eb4e | 2806 | /* Possible future hook for nested types. */ |
c906108c SS |
2807 | if (**pp == '!') |
2808 | { | |
c5aa993b | 2809 | fip->list->field.bitpos = (long) -2; /* nested type */ |
c906108c SS |
2810 | p = ++(*pp); |
2811 | } | |
c5aa993b JM |
2812 | else |
2813 | ...; | |
c906108c | 2814 | #endif |
c5aa993b | 2815 | while (*p != ';') |
c906108c SS |
2816 | { |
2817 | p++; | |
2818 | } | |
2819 | /* Static class member. */ | |
2820 | SET_FIELD_PHYSNAME (fip->list->field, savestring (*pp, p - *pp)); | |
2821 | *pp = p + 1; | |
2822 | return; | |
2823 | } | |
2824 | else if (**pp != ',') | |
2825 | { | |
2826 | /* Bad structure-type format. */ | |
23136709 | 2827 | stabs_general_complaint ("bad structure-type format"); |
c906108c SS |
2828 | return; |
2829 | } | |
2830 | ||
2831 | (*pp)++; /* Skip the comma. */ | |
2832 | ||
2833 | { | |
2834 | int nbits; | |
433759f7 | 2835 | |
f41f5e61 PA |
2836 | SET_FIELD_BITPOS (fip->list->field, |
2837 | read_huge_number (pp, ',', &nbits, 0)); | |
c906108c SS |
2838 | if (nbits != 0) |
2839 | { | |
23136709 | 2840 | stabs_general_complaint ("bad structure-type format"); |
c906108c SS |
2841 | return; |
2842 | } | |
94e10a22 | 2843 | FIELD_BITSIZE (fip->list->field) = read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
2844 | if (nbits != 0) |
2845 | { | |
23136709 | 2846 | stabs_general_complaint ("bad structure-type format"); |
c906108c SS |
2847 | return; |
2848 | } | |
2849 | } | |
2850 | ||
2851 | if (FIELD_BITPOS (fip->list->field) == 0 | |
2852 | && FIELD_BITSIZE (fip->list->field) == 0) | |
2853 | { | |
2854 | /* This can happen in two cases: (1) at least for gcc 2.4.5 or so, | |
dda83cd7 SM |
2855 | it is a field which has been optimized out. The correct stab for |
2856 | this case is to use VISIBILITY_IGNORE, but that is a recent | |
2857 | invention. (2) It is a 0-size array. For example | |
2858 | union { int num; char str[0]; } foo. Printing _("<no value>" for | |
2859 | str in "p foo" is OK, since foo.str (and thus foo.str[3]) | |
2860 | will continue to work, and a 0-size array as a whole doesn't | |
2861 | have any contents to print. | |
2862 | ||
2863 | I suspect this probably could also happen with gcc -gstabs (not | |
2864 | -gstabs+) for static fields, and perhaps other C++ extensions. | |
2865 | Hopefully few people use -gstabs with gdb, since it is intended | |
2866 | for dbx compatibility. */ | |
c906108c SS |
2867 | |
2868 | /* Ignore this field. */ | |
c5aa993b | 2869 | fip->list->visibility = VISIBILITY_IGNORE; |
c906108c SS |
2870 | } |
2871 | else | |
2872 | { | |
2873 | /* Detect an unpacked field and mark it as such. | |
dda83cd7 SM |
2874 | dbx gives a bit size for all fields. |
2875 | Note that forward refs cannot be packed, | |
2876 | and treat enums as if they had the width of ints. */ | |
c906108c | 2877 | |
b6cdac4b | 2878 | struct type *field_type = check_typedef (fip->list->field.type ()); |
c906108c | 2879 | |
78134374 SM |
2880 | if (field_type->code () != TYPE_CODE_INT |
2881 | && field_type->code () != TYPE_CODE_RANGE | |
2882 | && field_type->code () != TYPE_CODE_BOOL | |
2883 | && field_type->code () != TYPE_CODE_ENUM) | |
c906108c SS |
2884 | { |
2885 | FIELD_BITSIZE (fip->list->field) = 0; | |
2886 | } | |
c5aa993b | 2887 | if ((FIELD_BITSIZE (fip->list->field) |
c906108c | 2888 | == TARGET_CHAR_BIT * TYPE_LENGTH (field_type) |
78134374 | 2889 | || (field_type->code () == TYPE_CODE_ENUM |
9a76efb6 | 2890 | && FIELD_BITSIZE (fip->list->field) |
5e2b427d | 2891 | == gdbarch_int_bit (gdbarch)) |
c5aa993b | 2892 | ) |
c906108c SS |
2893 | && |
2894 | FIELD_BITPOS (fip->list->field) % 8 == 0) | |
2895 | { | |
2896 | FIELD_BITSIZE (fip->list->field) = 0; | |
2897 | } | |
2898 | } | |
2899 | } | |
2900 | ||
2901 | ||
2902 | /* Read struct or class data fields. They have the form: | |
2903 | ||
c5aa993b | 2904 | NAME : [VISIBILITY] TYPENUM , BITPOS , BITSIZE ; |
c906108c SS |
2905 | |
2906 | At the end, we see a semicolon instead of a field. | |
2907 | ||
2908 | In C++, this may wind up being NAME:?TYPENUM:PHYSNAME; for | |
2909 | a static field. | |
2910 | ||
2911 | The optional VISIBILITY is one of: | |
2912 | ||
c5aa993b JM |
2913 | '/0' (VISIBILITY_PRIVATE) |
2914 | '/1' (VISIBILITY_PROTECTED) | |
2915 | '/2' (VISIBILITY_PUBLIC) | |
2916 | '/9' (VISIBILITY_IGNORE) | |
c906108c SS |
2917 | |
2918 | or nothing, for C style fields with public visibility. | |
2919 | ||
2920 | Returns 1 for success, 0 for failure. */ | |
2921 | ||
2922 | static int | |
61b30099 TT |
2923 | read_struct_fields (struct stab_field_info *fip, const char **pp, |
2924 | struct type *type, struct objfile *objfile) | |
c906108c | 2925 | { |
a121b7c1 | 2926 | const char *p; |
fe978cb0 | 2927 | struct nextfield *newobj; |
c906108c SS |
2928 | |
2929 | /* We better set p right now, in case there are no fields at all... */ | |
2930 | ||
2931 | p = *pp; | |
2932 | ||
2933 | /* Read each data member type until we find the terminating ';' at the end of | |
2934 | the data member list, or break for some other reason such as finding the | |
c378eb4e | 2935 | start of the member function list. */ |
fedbd091 | 2936 | /* Stab string for structure/union does not end with two ';' in |
c378eb4e | 2937 | SUN C compiler 5.3 i.e. F6U2, hence check for end of string. */ |
c906108c | 2938 | |
fedbd091 | 2939 | while (**pp != ';' && **pp != '\0') |
c906108c | 2940 | { |
c906108c SS |
2941 | STABS_CONTINUE (pp, objfile); |
2942 | /* Get space to record the next field's data. */ | |
61b30099 | 2943 | newobj = OBSTACK_ZALLOC (&fip->obstack, struct nextfield); |
8d749320 | 2944 | |
fe978cb0 PA |
2945 | newobj->next = fip->list; |
2946 | fip->list = newobj; | |
c906108c SS |
2947 | |
2948 | /* Get the field name. */ | |
2949 | p = *pp; | |
2950 | ||
2951 | /* If is starts with CPLUS_MARKER it is a special abbreviation, | |
dda83cd7 SM |
2952 | unless the CPLUS_MARKER is followed by an underscore, in |
2953 | which case it is just the name of an anonymous type, which we | |
2954 | should handle like any other type name. */ | |
c906108c SS |
2955 | |
2956 | if (is_cplus_marker (p[0]) && p[1] != '_') | |
2957 | { | |
2958 | if (!read_cpp_abbrev (fip, pp, type, objfile)) | |
2959 | return 0; | |
2960 | continue; | |
2961 | } | |
2962 | ||
2963 | /* Look for the ':' that separates the field name from the field | |
dda83cd7 SM |
2964 | values. Data members are delimited by a single ':', while member |
2965 | functions are delimited by a pair of ':'s. When we hit the member | |
2966 | functions (if any), terminate scan loop and return. */ | |
c906108c | 2967 | |
c5aa993b | 2968 | while (*p != ':' && *p != '\0') |
c906108c SS |
2969 | { |
2970 | p++; | |
2971 | } | |
2972 | if (*p == '\0') | |
2973 | return 0; | |
2974 | ||
2975 | /* Check to see if we have hit the member functions yet. */ | |
2976 | if (p[1] == ':') | |
2977 | { | |
2978 | break; | |
2979 | } | |
2980 | read_one_struct_field (fip, pp, p, type, objfile); | |
2981 | } | |
2982 | if (p[0] == ':' && p[1] == ':') | |
2983 | { | |
1b831c93 | 2984 | /* (the deleted) chill the list of fields: the last entry (at |
dda83cd7 SM |
2985 | the head) is a partially constructed entry which we now |
2986 | scrub. */ | |
c5aa993b | 2987 | fip->list = fip->list->next; |
c906108c SS |
2988 | } |
2989 | return 1; | |
2990 | } | |
9846de1b | 2991 | /* *INDENT-OFF* */ |
c906108c SS |
2992 | /* The stabs for C++ derived classes contain baseclass information which |
2993 | is marked by a '!' character after the total size. This function is | |
2994 | called when we encounter the baseclass marker, and slurps up all the | |
2995 | baseclass information. | |
2996 | ||
2997 | Immediately following the '!' marker is the number of base classes that | |
2998 | the class is derived from, followed by information for each base class. | |
2999 | For each base class, there are two visibility specifiers, a bit offset | |
3000 | to the base class information within the derived class, a reference to | |
3001 | the type for the base class, and a terminating semicolon. | |
3002 | ||
3003 | A typical example, with two base classes, would be "!2,020,19;0264,21;". | |
24b21115 | 3004 | ^^ ^ ^ ^ ^ ^ ^ |
c906108c SS |
3005 | Baseclass information marker __________________|| | | | | | | |
3006 | Number of baseclasses __________________________| | | | | | | | |
3007 | Visibility specifiers (2) ________________________| | | | | | | |
3008 | Offset in bits from start of class _________________| | | | | | |
3009 | Type number for base class ___________________________| | | | | |
3010 | Visibility specifiers (2) _______________________________| | | | |
3011 | Offset in bits from start of class ________________________| | | |
3012 | Type number of base class ____________________________________| | |
3013 | ||
3014 | Return 1 for success, 0 for (error-type-inducing) failure. */ | |
9846de1b | 3015 | /* *INDENT-ON* */ |
c906108c | 3016 | |
c5aa993b JM |
3017 | |
3018 | ||
c906108c | 3019 | static int |
61b30099 TT |
3020 | read_baseclasses (struct stab_field_info *fip, const char **pp, |
3021 | struct type *type, struct objfile *objfile) | |
c906108c SS |
3022 | { |
3023 | int i; | |
fe978cb0 | 3024 | struct nextfield *newobj; |
c906108c SS |
3025 | |
3026 | if (**pp != '!') | |
3027 | { | |
3028 | return 1; | |
3029 | } | |
3030 | else | |
3031 | { | |
c378eb4e | 3032 | /* Skip the '!' baseclass information marker. */ |
c906108c SS |
3033 | (*pp)++; |
3034 | } | |
3035 | ||
3036 | ALLOCATE_CPLUS_STRUCT_TYPE (type); | |
3037 | { | |
3038 | int nbits; | |
433759f7 | 3039 | |
94e10a22 | 3040 | TYPE_N_BASECLASSES (type) = read_huge_number (pp, ',', &nbits, 0); |
c906108c SS |
3041 | if (nbits != 0) |
3042 | return 0; | |
3043 | } | |
3044 | ||
3045 | #if 0 | |
3046 | /* Some stupid compilers have trouble with the following, so break | |
3047 | it up into simpler expressions. */ | |
3048 | TYPE_FIELD_VIRTUAL_BITS (type) = (B_TYPE *) | |
3049 | TYPE_ALLOC (type, B_BYTES (TYPE_N_BASECLASSES (type))); | |
3050 | #else | |
3051 | { | |
3052 | int num_bytes = B_BYTES (TYPE_N_BASECLASSES (type)); | |
3053 | char *pointer; | |
3054 | ||
3055 | pointer = (char *) TYPE_ALLOC (type, num_bytes); | |
3056 | TYPE_FIELD_VIRTUAL_BITS (type) = (B_TYPE *) pointer; | |
3057 | } | |
3058 | #endif /* 0 */ | |
3059 | ||
3060 | B_CLRALL (TYPE_FIELD_VIRTUAL_BITS (type), TYPE_N_BASECLASSES (type)); | |
3061 | ||
3062 | for (i = 0; i < TYPE_N_BASECLASSES (type); i++) | |
3063 | { | |
61b30099 | 3064 | newobj = OBSTACK_ZALLOC (&fip->obstack, struct nextfield); |
8d749320 | 3065 | |
fe978cb0 PA |
3066 | newobj->next = fip->list; |
3067 | fip->list = newobj; | |
3068 | FIELD_BITSIZE (newobj->field) = 0; /* This should be an unpacked | |
c378eb4e | 3069 | field! */ |
c906108c SS |
3070 | |
3071 | STABS_CONTINUE (pp, objfile); | |
3072 | switch (**pp) | |
3073 | { | |
c5aa993b | 3074 | case '0': |
c378eb4e | 3075 | /* Nothing to do. */ |
c5aa993b JM |
3076 | break; |
3077 | case '1': | |
3078 | SET_TYPE_FIELD_VIRTUAL (type, i); | |
3079 | break; | |
3080 | default: | |
3081 | /* Unknown character. Complain and treat it as non-virtual. */ | |
3082 | { | |
b98664d3 | 3083 | complaint (_("Unknown virtual character `%c' for baseclass"), |
3e43a32a | 3084 | **pp); |
c5aa993b | 3085 | } |
c906108c SS |
3086 | } |
3087 | ++(*pp); | |
3088 | ||
fe978cb0 PA |
3089 | newobj->visibility = *(*pp)++; |
3090 | switch (newobj->visibility) | |
c906108c | 3091 | { |
c5aa993b JM |
3092 | case VISIBILITY_PRIVATE: |
3093 | case VISIBILITY_PROTECTED: | |
3094 | case VISIBILITY_PUBLIC: | |
3095 | break; | |
3096 | default: | |
3097 | /* Bad visibility format. Complain and treat it as | |
3098 | public. */ | |
3099 | { | |
b98664d3 | 3100 | complaint (_("Unknown visibility `%c' for baseclass"), |
fe978cb0 PA |
3101 | newobj->visibility); |
3102 | newobj->visibility = VISIBILITY_PUBLIC; | |
c5aa993b | 3103 | } |
c906108c SS |
3104 | } |
3105 | ||
3106 | { | |
3107 | int nbits; | |
c5aa993b | 3108 | |
c906108c SS |
3109 | /* The remaining value is the bit offset of the portion of the object |
3110 | corresponding to this baseclass. Always zero in the absence of | |
3111 | multiple inheritance. */ | |
3112 | ||
fe978cb0 | 3113 | SET_FIELD_BITPOS (newobj->field, read_huge_number (pp, ',', &nbits, 0)); |
c906108c SS |
3114 | if (nbits != 0) |
3115 | return 0; | |
3116 | } | |
3117 | ||
3118 | /* The last piece of baseclass information is the type of the | |
dda83cd7 SM |
3119 | base class. Read it, and remember it's type name as this |
3120 | field's name. */ | |
c906108c | 3121 | |
5d14b6e5 SM |
3122 | newobj->field.set_type (read_type (pp, objfile)); |
3123 | newobj->field.name = newobj->field.type ()->name (); | |
c906108c | 3124 | |
c378eb4e | 3125 | /* Skip trailing ';' and bump count of number of fields seen. */ |
c906108c SS |
3126 | if (**pp == ';') |
3127 | (*pp)++; | |
3128 | else | |
3129 | return 0; | |
3130 | } | |
3131 | return 1; | |
3132 | } | |
3133 | ||
3134 | /* The tail end of stabs for C++ classes that contain a virtual function | |
3135 | pointer contains a tilde, a %, and a type number. | |
3136 | The type number refers to the base class (possibly this class itself) which | |
3137 | contains the vtable pointer for the current class. | |
3138 | ||
3139 | This function is called when we have parsed all the method declarations, | |
3140 | so we can look for the vptr base class info. */ | |
3141 | ||
3142 | static int | |
61b30099 TT |
3143 | read_tilde_fields (struct stab_field_info *fip, const char **pp, |
3144 | struct type *type, struct objfile *objfile) | |
c906108c | 3145 | { |
a121b7c1 | 3146 | const char *p; |
c906108c SS |
3147 | |
3148 | STABS_CONTINUE (pp, objfile); | |
3149 | ||
c378eb4e | 3150 | /* If we are positioned at a ';', then skip it. */ |
c906108c SS |
3151 | if (**pp == ';') |
3152 | { | |
3153 | (*pp)++; | |
3154 | } | |
3155 | ||
3156 | if (**pp == '~') | |
3157 | { | |
3158 | (*pp)++; | |
3159 | ||
3160 | if (**pp == '=' || **pp == '+' || **pp == '-') | |
3161 | { | |
3162 | /* Obsolete flags that used to indicate the presence | |
c378eb4e | 3163 | of constructors and/or destructors. */ |
c906108c SS |
3164 | (*pp)++; |
3165 | } | |
3166 | ||
3167 | /* Read either a '%' or the final ';'. */ | |
3168 | if (*(*pp)++ == '%') | |
3169 | { | |
3170 | /* The next number is the type number of the base class | |
3171 | (possibly our own class) which supplies the vtable for | |
3172 | this class. Parse it out, and search that class to find | |
3173 | its vtable pointer, and install those into TYPE_VPTR_BASETYPE | |
3174 | and TYPE_VPTR_FIELDNO. */ | |
3175 | ||
3176 | struct type *t; | |
3177 | int i; | |
3178 | ||
3179 | t = read_type (pp, objfile); | |
3180 | p = (*pp)++; | |
3181 | while (*p != '\0' && *p != ';') | |
3182 | { | |
3183 | p++; | |
3184 | } | |
3185 | if (*p == '\0') | |
3186 | { | |
3187 | /* Premature end of symbol. */ | |
3188 | return 0; | |
3189 | } | |
c5aa993b | 3190 | |
ae6ae975 | 3191 | set_type_vptr_basetype (type, t); |
c378eb4e | 3192 | if (type == t) /* Our own class provides vtbl ptr. */ |
c906108c | 3193 | { |
1f704f76 | 3194 | for (i = t->num_fields () - 1; |
c906108c SS |
3195 | i >= TYPE_N_BASECLASSES (t); |
3196 | --i) | |
3197 | { | |
0d5cff50 | 3198 | const char *name = TYPE_FIELD_NAME (t, i); |
433759f7 | 3199 | |
8343f86c | 3200 | if (!strncmp (name, vptr_name, sizeof (vptr_name) - 2) |
74451869 | 3201 | && is_cplus_marker (name[sizeof (vptr_name) - 2])) |
c906108c | 3202 | { |
ae6ae975 | 3203 | set_type_vptr_fieldno (type, i); |
c906108c SS |
3204 | goto gotit; |
3205 | } | |
3206 | } | |
3207 | /* Virtual function table field not found. */ | |
b98664d3 | 3208 | complaint (_("virtual function table pointer " |
3e43a32a | 3209 | "not found when defining class `%s'"), |
7d93a1e0 | 3210 | type->name ()); |
c906108c SS |
3211 | return 0; |
3212 | } | |
3213 | else | |
3214 | { | |
ae6ae975 | 3215 | set_type_vptr_fieldno (type, TYPE_VPTR_FIELDNO (t)); |
c906108c SS |
3216 | } |
3217 | ||
c5aa993b | 3218 | gotit: |
c906108c SS |
3219 | *pp = p + 1; |
3220 | } | |
3221 | } | |
3222 | return 1; | |
3223 | } | |
3224 | ||
3225 | static int | |
61b30099 | 3226 | attach_fn_fields_to_type (struct stab_field_info *fip, struct type *type) |
c906108c | 3227 | { |
52f0bd74 | 3228 | int n; |
c906108c SS |
3229 | |
3230 | for (n = TYPE_NFN_FIELDS (type); | |
c5aa993b JM |
3231 | fip->fnlist != NULL; |
3232 | fip->fnlist = fip->fnlist->next) | |
c906108c | 3233 | { |
c378eb4e | 3234 | --n; /* Circumvent Sun3 compiler bug. */ |
c5aa993b | 3235 | TYPE_FN_FIELDLISTS (type)[n] = fip->fnlist->fn_fieldlist; |
c906108c SS |
3236 | } |
3237 | return 1; | |
3238 | } | |
3239 | ||
c906108c SS |
3240 | /* Create the vector of fields, and record how big it is. |
3241 | We need this info to record proper virtual function table information | |
3242 | for this class's virtual functions. */ | |
3243 | ||
3244 | static int | |
61b30099 | 3245 | attach_fields_to_type (struct stab_field_info *fip, struct type *type, |
fba45db2 | 3246 | struct objfile *objfile) |
c906108c | 3247 | { |
52f0bd74 AC |
3248 | int nfields = 0; |
3249 | int non_public_fields = 0; | |
3250 | struct nextfield *scan; | |
c906108c SS |
3251 | |
3252 | /* Count up the number of fields that we have, as well as taking note of | |
3253 | whether or not there are any non-public fields, which requires us to | |
3254 | allocate and build the private_field_bits and protected_field_bits | |
c378eb4e | 3255 | bitfields. */ |
c906108c | 3256 | |
c5aa993b | 3257 | for (scan = fip->list; scan != NULL; scan = scan->next) |
c906108c SS |
3258 | { |
3259 | nfields++; | |
c5aa993b | 3260 | if (scan->visibility != VISIBILITY_PUBLIC) |
c906108c SS |
3261 | { |
3262 | non_public_fields++; | |
3263 | } | |
3264 | } | |
3265 | ||
3266 | /* Now we know how many fields there are, and whether or not there are any | |
3267 | non-public fields. Record the field count, allocate space for the | |
c378eb4e | 3268 | array of fields, and create blank visibility bitfields if necessary. */ |
c906108c | 3269 | |
5e33d5f4 | 3270 | type->set_num_fields (nfields); |
3cabb6b0 SM |
3271 | type->set_fields |
3272 | ((struct field *) | |
3273 | TYPE_ALLOC (type, sizeof (struct field) * nfields)); | |
80fc5e77 | 3274 | memset (type->fields (), 0, sizeof (struct field) * nfields); |
c906108c SS |
3275 | |
3276 | if (non_public_fields) | |
3277 | { | |
3278 | ALLOCATE_CPLUS_STRUCT_TYPE (type); | |
3279 | ||
3280 | TYPE_FIELD_PRIVATE_BITS (type) = | |
3281 | (B_TYPE *) TYPE_ALLOC (type, B_BYTES (nfields)); | |
3282 | B_CLRALL (TYPE_FIELD_PRIVATE_BITS (type), nfields); | |
3283 | ||
3284 | TYPE_FIELD_PROTECTED_BITS (type) = | |
3285 | (B_TYPE *) TYPE_ALLOC (type, B_BYTES (nfields)); | |
3286 | B_CLRALL (TYPE_FIELD_PROTECTED_BITS (type), nfields); | |
3287 | ||
3288 | TYPE_FIELD_IGNORE_BITS (type) = | |
3289 | (B_TYPE *) TYPE_ALLOC (type, B_BYTES (nfields)); | |
3290 | B_CLRALL (TYPE_FIELD_IGNORE_BITS (type), nfields); | |
3291 | } | |
3292 | ||
c378eb4e MS |
3293 | /* Copy the saved-up fields into the field vector. Start from the |
3294 | head of the list, adding to the tail of the field array, so that | |
3295 | they end up in the same order in the array in which they were | |
3296 | added to the list. */ | |
c906108c SS |
3297 | |
3298 | while (nfields-- > 0) | |
3299 | { | |
ceacbf6e | 3300 | type->field (nfields) = fip->list->field; |
c5aa993b | 3301 | switch (fip->list->visibility) |
c906108c | 3302 | { |
c5aa993b JM |
3303 | case VISIBILITY_PRIVATE: |
3304 | SET_TYPE_FIELD_PRIVATE (type, nfields); | |
3305 | break; | |
c906108c | 3306 | |
c5aa993b JM |
3307 | case VISIBILITY_PROTECTED: |
3308 | SET_TYPE_FIELD_PROTECTED (type, nfields); | |
3309 | break; | |
c906108c | 3310 | |
c5aa993b JM |
3311 | case VISIBILITY_IGNORE: |
3312 | SET_TYPE_FIELD_IGNORE (type, nfields); | |
3313 | break; | |
c906108c | 3314 | |
c5aa993b JM |
3315 | case VISIBILITY_PUBLIC: |
3316 | break; | |
c906108c | 3317 | |
c5aa993b JM |
3318 | default: |
3319 | /* Unknown visibility. Complain and treat it as public. */ | |
3320 | { | |
b98664d3 | 3321 | complaint (_("Unknown visibility `%c' for field"), |
23136709 | 3322 | fip->list->visibility); |
c5aa993b JM |
3323 | } |
3324 | break; | |
c906108c | 3325 | } |
c5aa993b | 3326 | fip->list = fip->list->next; |
c906108c SS |
3327 | } |
3328 | return 1; | |
3329 | } | |
3330 | ||
2ae1c2d2 | 3331 | |
2ae1c2d2 JB |
3332 | /* Complain that the compiler has emitted more than one definition for the |
3333 | structure type TYPE. */ | |
3334 | static void | |
3335 | complain_about_struct_wipeout (struct type *type) | |
3336 | { | |
0d5cff50 DE |
3337 | const char *name = ""; |
3338 | const char *kind = ""; | |
2ae1c2d2 | 3339 | |
7d93a1e0 | 3340 | if (type->name ()) |
2ae1c2d2 | 3341 | { |
7d93a1e0 | 3342 | name = type->name (); |
78134374 | 3343 | switch (type->code ()) |
dda83cd7 SM |
3344 | { |
3345 | case TYPE_CODE_STRUCT: kind = "struct "; break; | |
3346 | case TYPE_CODE_UNION: kind = "union "; break; | |
3347 | case TYPE_CODE_ENUM: kind = "enum "; break; | |
3348 | default: kind = ""; | |
3349 | } | |
2ae1c2d2 | 3350 | } |
2ae1c2d2 JB |
3351 | else |
3352 | { | |
3353 | name = "<unknown>"; | |
3354 | kind = ""; | |
3355 | } | |
3356 | ||
b98664d3 | 3357 | complaint (_("struct/union type gets multiply defined: %s%s"), kind, name); |
2ae1c2d2 JB |
3358 | } |
3359 | ||
621791b8 PM |
3360 | /* Set the length for all variants of a same main_type, which are |
3361 | connected in the closed chain. | |
3362 | ||
3363 | This is something that needs to be done when a type is defined *after* | |
3364 | some cross references to this type have already been read. Consider | |
3365 | for instance the following scenario where we have the following two | |
3366 | stabs entries: | |
3367 | ||
dda83cd7 SM |
3368 | .stabs "t:p(0,21)=*(0,22)=k(0,23)=xsdummy:",160,0,28,-24 |
3369 | .stabs "dummy:T(0,23)=s16x:(0,1),0,3[...]" | |
621791b8 PM |
3370 | |
3371 | A stubbed version of type dummy is created while processing the first | |
3372 | stabs entry. The length of that type is initially set to zero, since | |
3373 | it is unknown at this point. Also, a "constant" variation of type | |
3374 | "dummy" is created as well (this is the "(0,22)=k(0,23)" section of | |
3375 | the stabs line). | |
3376 | ||
3377 | The second stabs entry allows us to replace the stubbed definition | |
3378 | with the real definition. However, we still need to adjust the length | |
3379 | of the "constant" variation of that type, as its length was left | |
3380 | untouched during the main type replacement... */ | |
3381 | ||
3382 | static void | |
9e69f3b6 | 3383 | set_length_in_type_chain (struct type *type) |
621791b8 PM |
3384 | { |
3385 | struct type *ntype = TYPE_CHAIN (type); | |
3386 | ||
3387 | while (ntype != type) | |
3388 | { | |
3389 | if (TYPE_LENGTH(ntype) == 0) | |
3390 | TYPE_LENGTH (ntype) = TYPE_LENGTH (type); | |
3391 | else | |
dda83cd7 | 3392 | complain_about_struct_wipeout (ntype); |
621791b8 PM |
3393 | ntype = TYPE_CHAIN (ntype); |
3394 | } | |
3395 | } | |
2ae1c2d2 | 3396 | |
c906108c SS |
3397 | /* Read the description of a structure (or union type) and return an object |
3398 | describing the type. | |
3399 | ||
3400 | PP points to a character pointer that points to the next unconsumed token | |
b021a221 | 3401 | in the stabs string. For example, given stabs "A:T4=s4a:1,0,32;;", |
c906108c SS |
3402 | *PP will point to "4a:1,0,32;;". |
3403 | ||
3404 | TYPE points to an incomplete type that needs to be filled in. | |
3405 | ||
3406 | OBJFILE points to the current objfile from which the stabs information is | |
3407 | being read. (Note that it is redundant in that TYPE also contains a pointer | |
3408 | to this same objfile, so it might be a good idea to eliminate it. FIXME). | |
c5aa993b | 3409 | */ |
c906108c SS |
3410 | |
3411 | static struct type * | |
a121b7c1 | 3412 | read_struct_type (const char **pp, struct type *type, enum type_code type_code, |
dda83cd7 | 3413 | struct objfile *objfile) |
c906108c | 3414 | { |
61b30099 | 3415 | struct stab_field_info fi; |
c906108c | 3416 | |
2ae1c2d2 JB |
3417 | /* When describing struct/union/class types in stabs, G++ always drops |
3418 | all qualifications from the name. So if you've got: | |
3419 | struct A { ... struct B { ... }; ... }; | |
3420 | then G++ will emit stabs for `struct A::B' that call it simply | |
3421 | `struct B'. Obviously, if you've got a real top-level definition for | |
3422 | `struct B', or other nested definitions, this is going to cause | |
3423 | problems. | |
3424 | ||
3425 | Obviously, GDB can't fix this by itself, but it can at least avoid | |
3426 | scribbling on existing structure type objects when new definitions | |
3427 | appear. */ | |
78134374 | 3428 | if (! (type->code () == TYPE_CODE_UNDEF |
dda83cd7 | 3429 | || type->is_stub ())) |
2ae1c2d2 JB |
3430 | { |
3431 | complain_about_struct_wipeout (type); | |
3432 | ||
3433 | /* It's probably best to return the type unchanged. */ | |
3434 | return type; | |
3435 | } | |
3436 | ||
c906108c | 3437 | INIT_CPLUS_SPECIFIC (type); |
67607e24 | 3438 | type->set_code (type_code); |
b4b73759 | 3439 | type->set_is_stub (false); |
c906108c SS |
3440 | |
3441 | /* First comes the total size in bytes. */ | |
3442 | ||
3443 | { | |
3444 | int nbits; | |
433759f7 | 3445 | |
94e10a22 | 3446 | TYPE_LENGTH (type) = read_huge_number (pp, 0, &nbits, 0); |
c906108c | 3447 | if (nbits != 0) |
61b30099 | 3448 | return error_type (pp, objfile); |
621791b8 | 3449 | set_length_in_type_chain (type); |
c906108c SS |
3450 | } |
3451 | ||
3452 | /* Now read the baseclasses, if any, read the regular C struct or C++ | |
3453 | class member fields, attach the fields to the type, read the C++ | |
3454 | member functions, attach them to the type, and then read any tilde | |
3e43a32a | 3455 | field (baseclass specifier for the class holding the main vtable). */ |
c906108c SS |
3456 | |
3457 | if (!read_baseclasses (&fi, pp, type, objfile) | |
3458 | || !read_struct_fields (&fi, pp, type, objfile) | |
3459 | || !attach_fields_to_type (&fi, type, objfile) | |
3460 | || !read_member_functions (&fi, pp, type, objfile) | |
3461 | || !attach_fn_fields_to_type (&fi, type) | |
3462 | || !read_tilde_fields (&fi, pp, type, objfile)) | |
3463 | { | |
3464 | type = error_type (pp, objfile); | |
3465 | } | |
3466 | ||
c906108c SS |
3467 | return (type); |
3468 | } | |
3469 | ||
3470 | /* Read a definition of an array type, | |
3471 | and create and return a suitable type object. | |
3472 | Also creates a range type which represents the bounds of that | |
3473 | array. */ | |
3474 | ||
3475 | static struct type * | |
a121b7c1 | 3476 | read_array_type (const char **pp, struct type *type, |
fba45db2 | 3477 | struct objfile *objfile) |
c906108c SS |
3478 | { |
3479 | struct type *index_type, *element_type, *range_type; | |
3480 | int lower, upper; | |
3481 | int adjustable = 0; | |
3482 | int nbits; | |
3483 | ||
3484 | /* Format of an array type: | |
3485 | "ar<index type>;lower;upper;<array_contents_type>". | |
3486 | OS9000: "arlower,upper;<array_contents_type>". | |
3487 | ||
3488 | Fortran adjustable arrays use Adigits or Tdigits for lower or upper; | |
3489 | for these, produce a type like float[][]. */ | |
3490 | ||
c906108c SS |
3491 | { |
3492 | index_type = read_type (pp, objfile); | |
3493 | if (**pp != ';') | |
3494 | /* Improper format of array type decl. */ | |
3495 | return error_type (pp, objfile); | |
3496 | ++*pp; | |
3497 | } | |
3498 | ||
3499 | if (!(**pp >= '0' && **pp <= '9') && **pp != '-') | |
3500 | { | |
3501 | (*pp)++; | |
3502 | adjustable = 1; | |
3503 | } | |
94e10a22 | 3504 | lower = read_huge_number (pp, ';', &nbits, 0); |
cdecafbe | 3505 | |
c906108c SS |
3506 | if (nbits != 0) |
3507 | return error_type (pp, objfile); | |
3508 | ||
3509 | if (!(**pp >= '0' && **pp <= '9') && **pp != '-') | |
3510 | { | |
3511 | (*pp)++; | |
3512 | adjustable = 1; | |
3513 | } | |
94e10a22 | 3514 | upper = read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
3515 | if (nbits != 0) |
3516 | return error_type (pp, objfile); | |
c5aa993b | 3517 | |
c906108c SS |
3518 | element_type = read_type (pp, objfile); |
3519 | ||
3520 | if (adjustable) | |
3521 | { | |
3522 | lower = 0; | |
3523 | upper = -1; | |
3524 | } | |
3525 | ||
3526 | range_type = | |
cafb3438 | 3527 | create_static_range_type (NULL, index_type, lower, upper); |
c906108c SS |
3528 | type = create_array_type (type, element_type, range_type); |
3529 | ||
3530 | return type; | |
3531 | } | |
3532 | ||
3533 | ||
3534 | /* Read a definition of an enumeration type, | |
3535 | and create and return a suitable type object. | |
3536 | Also defines the symbols that represent the values of the type. */ | |
3537 | ||
3538 | static struct type * | |
a121b7c1 | 3539 | read_enum_type (const char **pp, struct type *type, |
fba45db2 | 3540 | struct objfile *objfile) |
c906108c | 3541 | { |
08feed99 | 3542 | struct gdbarch *gdbarch = objfile->arch (); |
a121b7c1 | 3543 | const char *p; |
c906108c | 3544 | char *name; |
52f0bd74 AC |
3545 | long n; |
3546 | struct symbol *sym; | |
c906108c SS |
3547 | int nsyms = 0; |
3548 | struct pending **symlist; | |
3549 | struct pending *osyms, *syms; | |
3550 | int o_nsyms; | |
3551 | int nbits; | |
3552 | int unsigned_enum = 1; | |
3553 | ||
3554 | #if 0 | |
3555 | /* FIXME! The stabs produced by Sun CC merrily define things that ought | |
3556 | to be file-scope, between N_FN entries, using N_LSYM. What's a mother | |
3557 | to do? For now, force all enum values to file scope. */ | |
3558 | if (within_function) | |
e148f09d | 3559 | symlist = get_local_symbols (); |
c906108c SS |
3560 | else |
3561 | #endif | |
e148f09d | 3562 | symlist = get_file_symbols (); |
c906108c SS |
3563 | osyms = *symlist; |
3564 | o_nsyms = osyms ? osyms->nsyms : 0; | |
3565 | ||
c906108c SS |
3566 | /* The aix4 compiler emits an extra field before the enum members; |
3567 | my guess is it's a type of some sort. Just ignore it. */ | |
3568 | if (**pp == '-') | |
3569 | { | |
3570 | /* Skip over the type. */ | |
3571 | while (**pp != ':') | |
c5aa993b | 3572 | (*pp)++; |
c906108c SS |
3573 | |
3574 | /* Skip over the colon. */ | |
3575 | (*pp)++; | |
3576 | } | |
3577 | ||
3578 | /* Read the value-names and their values. | |
3579 | The input syntax is NAME:VALUE,NAME:VALUE, and so on. | |
3580 | A semicolon or comma instead of a NAME means the end. */ | |
3581 | while (**pp && **pp != ';' && **pp != ',') | |
3582 | { | |
3583 | STABS_CONTINUE (pp, objfile); | |
3584 | p = *pp; | |
c5aa993b JM |
3585 | while (*p != ':') |
3586 | p++; | |
0cf9feb9 | 3587 | name = obstack_strndup (&objfile->objfile_obstack, *pp, p - *pp); |
c906108c | 3588 | *pp = p + 1; |
94e10a22 | 3589 | n = read_huge_number (pp, ',', &nbits, 0); |
c906108c SS |
3590 | if (nbits != 0) |
3591 | return error_type (pp, objfile); | |
3592 | ||
8c14c3a3 | 3593 | sym = new (&objfile->objfile_obstack) symbol; |
43678b0a | 3594 | sym->set_linkage_name (name); |
d3ecddab CB |
3595 | sym->set_language (get_current_subfile ()->language, |
3596 | &objfile->objfile_obstack); | |
f1e6e072 | 3597 | SYMBOL_ACLASS_INDEX (sym) = LOC_CONST; |
176620f1 | 3598 | SYMBOL_DOMAIN (sym) = VAR_DOMAIN; |
c906108c SS |
3599 | SYMBOL_VALUE (sym) = n; |
3600 | if (n < 0) | |
3601 | unsigned_enum = 0; | |
3602 | add_symbol_to_list (sym, symlist); | |
3603 | nsyms++; | |
3604 | } | |
3605 | ||
3606 | if (**pp == ';') | |
3607 | (*pp)++; /* Skip the semicolon. */ | |
3608 | ||
3609 | /* Now fill in the fields of the type-structure. */ | |
3610 | ||
5e2b427d | 3611 | TYPE_LENGTH (type) = gdbarch_int_bit (gdbarch) / HOST_CHAR_BIT; |
621791b8 | 3612 | set_length_in_type_chain (type); |
67607e24 | 3613 | type->set_code (TYPE_CODE_ENUM); |
b4b73759 | 3614 | type->set_is_stub (false); |
c906108c | 3615 | if (unsigned_enum) |
653223d3 | 3616 | type->set_is_unsigned (true); |
5e33d5f4 | 3617 | type->set_num_fields (nsyms); |
3cabb6b0 SM |
3618 | type->set_fields |
3619 | ((struct field *) | |
3620 | TYPE_ALLOC (type, sizeof (struct field) * nsyms)); | |
80fc5e77 | 3621 | memset (type->fields (), 0, sizeof (struct field) * nsyms); |
c906108c SS |
3622 | |
3623 | /* Find the symbols for the values and put them into the type. | |
3624 | The symbols can be found in the symlist that we put them on | |
3625 | to cause them to be defined. osyms contains the old value | |
3626 | of that symlist; everything up to there was defined by us. */ | |
3627 | /* Note that we preserve the order of the enum constants, so | |
3628 | that in something like "enum {FOO, LAST_THING=FOO}" we print | |
3629 | FOO, not LAST_THING. */ | |
3630 | ||
3631 | for (syms = *symlist, n = nsyms - 1; syms; syms = syms->next) | |
3632 | { | |
3633 | int last = syms == osyms ? o_nsyms : 0; | |
3634 | int j = syms->nsyms; | |
433759f7 | 3635 | |
c906108c SS |
3636 | for (; --j >= last; --n) |
3637 | { | |
3638 | struct symbol *xsym = syms->symbol[j]; | |
433759f7 | 3639 | |
c906108c | 3640 | SYMBOL_TYPE (xsym) = type; |
987012b8 | 3641 | TYPE_FIELD_NAME (type, n) = xsym->linkage_name (); |
ceacbf6e | 3642 | SET_FIELD_ENUMVAL (type->field (n), SYMBOL_VALUE (xsym)); |
c906108c SS |
3643 | TYPE_FIELD_BITSIZE (type, n) = 0; |
3644 | } | |
3645 | if (syms == osyms) | |
3646 | break; | |
3647 | } | |
3648 | ||
3649 | return type; | |
3650 | } | |
3651 | ||
3652 | /* Sun's ACC uses a somewhat saner method for specifying the builtin | |
3653 | typedefs in every file (for int, long, etc): | |
3654 | ||
c5aa993b JM |
3655 | type = b <signed> <width> <format type>; <offset>; <nbits> |
3656 | signed = u or s. | |
3657 | optional format type = c or b for char or boolean. | |
3658 | offset = offset from high order bit to start bit of type. | |
3659 | width is # bytes in object of this type, nbits is # bits in type. | |
c906108c SS |
3660 | |
3661 | The width/offset stuff appears to be for small objects stored in | |
3662 | larger ones (e.g. `shorts' in `int' registers). We ignore it for now, | |
3663 | FIXME. */ | |
3664 | ||
3665 | static struct type * | |
a121b7c1 | 3666 | read_sun_builtin_type (const char **pp, int typenums[2], struct objfile *objfile) |
c906108c SS |
3667 | { |
3668 | int type_bits; | |
3669 | int nbits; | |
19f392bc UW |
3670 | int unsigned_type; |
3671 | int boolean_type = 0; | |
c906108c SS |
3672 | |
3673 | switch (**pp) | |
3674 | { | |
c5aa993b | 3675 | case 's': |
19f392bc | 3676 | unsigned_type = 0; |
c5aa993b JM |
3677 | break; |
3678 | case 'u': | |
19f392bc | 3679 | unsigned_type = 1; |
c5aa993b JM |
3680 | break; |
3681 | default: | |
3682 | return error_type (pp, objfile); | |
c906108c SS |
3683 | } |
3684 | (*pp)++; | |
3685 | ||
3686 | /* For some odd reason, all forms of char put a c here. This is strange | |
3687 | because no other type has this honor. We can safely ignore this because | |
3688 | we actually determine 'char'acterness by the number of bits specified in | |
3689 | the descriptor. | |
3690 | Boolean forms, e.g Fortran logical*X, put a b here. */ | |
3691 | ||
3692 | if (**pp == 'c') | |
3693 | (*pp)++; | |
3694 | else if (**pp == 'b') | |
3695 | { | |
19f392bc | 3696 | boolean_type = 1; |
c906108c SS |
3697 | (*pp)++; |
3698 | } | |
3699 | ||
3700 | /* The first number appears to be the number of bytes occupied | |
3701 | by this type, except that unsigned short is 4 instead of 2. | |
3702 | Since this information is redundant with the third number, | |
3703 | we will ignore it. */ | |
94e10a22 | 3704 | read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
3705 | if (nbits != 0) |
3706 | return error_type (pp, objfile); | |
3707 | ||
c378eb4e | 3708 | /* The second number is always 0, so ignore it too. */ |
94e10a22 | 3709 | read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
3710 | if (nbits != 0) |
3711 | return error_type (pp, objfile); | |
3712 | ||
c378eb4e | 3713 | /* The third number is the number of bits for this type. */ |
94e10a22 | 3714 | type_bits = read_huge_number (pp, 0, &nbits, 0); |
c906108c SS |
3715 | if (nbits != 0) |
3716 | return error_type (pp, objfile); | |
3717 | /* The type *should* end with a semicolon. If it are embedded | |
3718 | in a larger type the semicolon may be the only way to know where | |
3719 | the type ends. If this type is at the end of the stabstring we | |
3720 | can deal with the omitted semicolon (but we don't have to like | |
3721 | it). Don't bother to complain(), Sun's compiler omits the semicolon | |
3722 | for "void". */ | |
3723 | if (**pp == ';') | |
3724 | ++(*pp); | |
3725 | ||
3726 | if (type_bits == 0) | |
19f392bc | 3727 | { |
77b7c781 UW |
3728 | struct type *type = init_type (objfile, TYPE_CODE_VOID, |
3729 | TARGET_CHAR_BIT, NULL); | |
19f392bc | 3730 | if (unsigned_type) |
653223d3 SM |
3731 | type->set_is_unsigned (true); |
3732 | ||
19f392bc UW |
3733 | return type; |
3734 | } | |
3735 | ||
3736 | if (boolean_type) | |
3737 | return init_boolean_type (objfile, type_bits, unsigned_type, NULL); | |
c906108c | 3738 | else |
19f392bc | 3739 | return init_integer_type (objfile, type_bits, unsigned_type, NULL); |
c906108c SS |
3740 | } |
3741 | ||
3742 | static struct type * | |
a121b7c1 PA |
3743 | read_sun_floating_type (const char **pp, int typenums[2], |
3744 | struct objfile *objfile) | |
c906108c SS |
3745 | { |
3746 | int nbits; | |
3747 | int details; | |
3748 | int nbytes; | |
f65ca430 | 3749 | struct type *rettype; |
c906108c SS |
3750 | |
3751 | /* The first number has more details about the type, for example | |
3752 | FN_COMPLEX. */ | |
94e10a22 | 3753 | details = read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
3754 | if (nbits != 0) |
3755 | return error_type (pp, objfile); | |
3756 | ||
c378eb4e | 3757 | /* The second number is the number of bytes occupied by this type. */ |
94e10a22 | 3758 | nbytes = read_huge_number (pp, ';', &nbits, 0); |
c906108c SS |
3759 | if (nbits != 0) |
3760 | return error_type (pp, objfile); | |
3761 | ||
19f392bc UW |
3762 | nbits = nbytes * TARGET_CHAR_BIT; |
3763 | ||
c906108c SS |
3764 | if (details == NF_COMPLEX || details == NF_COMPLEX16 |
3765 | || details == NF_COMPLEX32) | |
f65ca430 | 3766 | { |
9b790ce7 | 3767 | rettype = dbx_init_float_type (objfile, nbits / 2); |
5b930b45 | 3768 | return init_complex_type (NULL, rettype); |
f65ca430 | 3769 | } |
c906108c | 3770 | |
9b790ce7 | 3771 | return dbx_init_float_type (objfile, nbits); |
c906108c SS |
3772 | } |
3773 | ||
3774 | /* Read a number from the string pointed to by *PP. | |
3775 | The value of *PP is advanced over the number. | |
3776 | If END is nonzero, the character that ends the | |
3777 | number must match END, or an error happens; | |
3778 | and that character is skipped if it does match. | |
3779 | If END is zero, *PP is left pointing to that character. | |
3780 | ||
94e10a22 JG |
3781 | If TWOS_COMPLEMENT_BITS is set to a strictly positive value and if |
3782 | the number is represented in an octal representation, assume that | |
3783 | it is represented in a 2's complement representation with a size of | |
3784 | TWOS_COMPLEMENT_BITS. | |
3785 | ||
c906108c SS |
3786 | If the number fits in a long, set *BITS to 0 and return the value. |
3787 | If not, set *BITS to be the number of bits in the number and return 0. | |
3788 | ||
3789 | If encounter garbage, set *BITS to -1 and return 0. */ | |
3790 | ||
c2d11a7d | 3791 | static long |
a121b7c1 PA |
3792 | read_huge_number (const char **pp, int end, int *bits, |
3793 | int twos_complement_bits) | |
c906108c | 3794 | { |
a121b7c1 | 3795 | const char *p = *pp; |
c906108c | 3796 | int sign = 1; |
51e9e0d4 | 3797 | int sign_bit = 0; |
c2d11a7d | 3798 | long n = 0; |
c906108c SS |
3799 | int radix = 10; |
3800 | char overflow = 0; | |
3801 | int nbits = 0; | |
3802 | int c; | |
c2d11a7d | 3803 | long upper_limit; |
a2699720 | 3804 | int twos_complement_representation = 0; |
c5aa993b | 3805 | |
c906108c SS |
3806 | if (*p == '-') |
3807 | { | |
3808 | sign = -1; | |
3809 | p++; | |
3810 | } | |
3811 | ||
3812 | /* Leading zero means octal. GCC uses this to output values larger | |
3813 | than an int (because that would be hard in decimal). */ | |
3814 | if (*p == '0') | |
3815 | { | |
3816 | radix = 8; | |
3817 | p++; | |
3818 | } | |
3819 | ||
a2699720 PA |
3820 | /* Skip extra zeros. */ |
3821 | while (*p == '0') | |
3822 | p++; | |
3823 | ||
3824 | if (sign > 0 && radix == 8 && twos_complement_bits > 0) | |
3825 | { | |
3826 | /* Octal, possibly signed. Check if we have enough chars for a | |
3827 | negative number. */ | |
3828 | ||
3829 | size_t len; | |
a121b7c1 | 3830 | const char *p1 = p; |
433759f7 | 3831 | |
a2699720 PA |
3832 | while ((c = *p1) >= '0' && c < '8') |
3833 | p1++; | |
3834 | ||
3835 | len = p1 - p; | |
3836 | if (len > twos_complement_bits / 3 | |
3e43a32a MS |
3837 | || (twos_complement_bits % 3 == 0 |
3838 | && len == twos_complement_bits / 3)) | |
a2699720 PA |
3839 | { |
3840 | /* Ok, we have enough characters for a signed value, check | |
85102364 | 3841 | for signedness by testing if the sign bit is set. */ |
a2699720 PA |
3842 | sign_bit = (twos_complement_bits % 3 + 2) % 3; |
3843 | c = *p - '0'; | |
3844 | if (c & (1 << sign_bit)) | |
3845 | { | |
3846 | /* Definitely signed. */ | |
3847 | twos_complement_representation = 1; | |
3848 | sign = -1; | |
3849 | } | |
3850 | } | |
3851 | } | |
3852 | ||
1b831c93 | 3853 | upper_limit = LONG_MAX / radix; |
c906108c SS |
3854 | |
3855 | while ((c = *p++) >= '0' && c < ('0' + radix)) | |
3856 | { | |
3857 | if (n <= upper_limit) | |
dda83cd7 SM |
3858 | { |
3859 | if (twos_complement_representation) | |
3860 | { | |
a2699720 PA |
3861 | /* Octal, signed, twos complement representation. In |
3862 | this case, n is the corresponding absolute value. */ | |
3863 | if (n == 0) | |
3864 | { | |
3865 | long sn = c - '0' - ((2 * (c - '0')) | (2 << sign_bit)); | |
433759f7 | 3866 | |
a2699720 PA |
3867 | n = -sn; |
3868 | } | |
dda83cd7 SM |
3869 | else |
3870 | { | |
3871 | n *= radix; | |
3872 | n -= c - '0'; | |
3873 | } | |
3874 | } | |
3875 | else | |
3876 | { | |
3877 | /* unsigned representation */ | |
3878 | n *= radix; | |
3879 | n += c - '0'; /* FIXME this overflows anyway. */ | |
3880 | } | |
3881 | } | |
c906108c | 3882 | else |
dda83cd7 | 3883 | overflow = 1; |
c5aa993b | 3884 | |
c906108c | 3885 | /* This depends on large values being output in octal, which is |
dda83cd7 | 3886 | what GCC does. */ |
c906108c SS |
3887 | if (radix == 8) |
3888 | { | |
3889 | if (nbits == 0) | |
3890 | { | |
3891 | if (c == '0') | |
3892 | /* Ignore leading zeroes. */ | |
3893 | ; | |
3894 | else if (c == '1') | |
3895 | nbits = 1; | |
3896 | else if (c == '2' || c == '3') | |
3897 | nbits = 2; | |
3898 | else | |
3899 | nbits = 3; | |
3900 | } | |
3901 | else | |
3902 | nbits += 3; | |
3903 | } | |
3904 | } | |
3905 | if (end) | |
3906 | { | |
3907 | if (c && c != end) | |
3908 | { | |
3909 | if (bits != NULL) | |
3910 | *bits = -1; | |
3911 | return 0; | |
3912 | } | |
3913 | } | |
3914 | else | |
3915 | --p; | |
3916 | ||
a2699720 PA |
3917 | if (radix == 8 && twos_complement_bits > 0 && nbits > twos_complement_bits) |
3918 | { | |
3919 | /* We were supposed to parse a number with maximum | |
3920 | TWOS_COMPLEMENT_BITS bits, but something went wrong. */ | |
3921 | if (bits != NULL) | |
3922 | *bits = -1; | |
3923 | return 0; | |
3924 | } | |
3925 | ||
c906108c SS |
3926 | *pp = p; |
3927 | if (overflow) | |
3928 | { | |
3929 | if (nbits == 0) | |
3930 | { | |
3931 | /* Large decimal constants are an error (because it is hard to | |
3932 | count how many bits are in them). */ | |
3933 | if (bits != NULL) | |
3934 | *bits = -1; | |
3935 | return 0; | |
3936 | } | |
c5aa993b | 3937 | |
c906108c | 3938 | /* -0x7f is the same as 0x80. So deal with it by adding one to |
dda83cd7 SM |
3939 | the number of bits. Two's complement represention octals |
3940 | can't have a '-' in front. */ | |
a2699720 | 3941 | if (sign == -1 && !twos_complement_representation) |
c906108c SS |
3942 | ++nbits; |
3943 | if (bits) | |
3944 | *bits = nbits; | |
3945 | } | |
3946 | else | |
3947 | { | |
3948 | if (bits) | |
3949 | *bits = 0; | |
a2699720 | 3950 | return n * sign; |
c906108c SS |
3951 | } |
3952 | /* It's *BITS which has the interesting information. */ | |
3953 | return 0; | |
3954 | } | |
3955 | ||
3956 | static struct type * | |
a121b7c1 | 3957 | read_range_type (const char **pp, int typenums[2], int type_size, |
dda83cd7 | 3958 | struct objfile *objfile) |
c906108c | 3959 | { |
08feed99 | 3960 | struct gdbarch *gdbarch = objfile->arch (); |
a121b7c1 | 3961 | const char *orig_pp = *pp; |
c906108c | 3962 | int rangenums[2]; |
c2d11a7d | 3963 | long n2, n3; |
c906108c SS |
3964 | int n2bits, n3bits; |
3965 | int self_subrange; | |
3966 | struct type *result_type; | |
3967 | struct type *index_type = NULL; | |
3968 | ||
3969 | /* First comes a type we are a subrange of. | |
3970 | In C it is usually 0, 1 or the type being defined. */ | |
3971 | if (read_type_number (pp, rangenums) != 0) | |
3972 | return error_type (pp, objfile); | |
3973 | self_subrange = (rangenums[0] == typenums[0] && | |
3974 | rangenums[1] == typenums[1]); | |
3975 | ||
3976 | if (**pp == '=') | |
3977 | { | |
3978 | *pp = orig_pp; | |
3979 | index_type = read_type (pp, objfile); | |
3980 | } | |
3981 | ||
3982 | /* A semicolon should now follow; skip it. */ | |
3983 | if (**pp == ';') | |
3984 | (*pp)++; | |
3985 | ||
3986 | /* The remaining two operands are usually lower and upper bounds | |
3987 | of the range. But in some special cases they mean something else. */ | |
94e10a22 JG |
3988 | n2 = read_huge_number (pp, ';', &n2bits, type_size); |
3989 | n3 = read_huge_number (pp, ';', &n3bits, type_size); | |
c906108c SS |
3990 | |
3991 | if (n2bits == -1 || n3bits == -1) | |
3992 | return error_type (pp, objfile); | |
3993 | ||
3994 | if (index_type) | |
3995 | goto handle_true_range; | |
3996 | ||
3997 | /* If limits are huge, must be large integral type. */ | |
3998 | if (n2bits != 0 || n3bits != 0) | |
3999 | { | |
4000 | char got_signed = 0; | |
4001 | char got_unsigned = 0; | |
4002 | /* Number of bits in the type. */ | |
4003 | int nbits = 0; | |
4004 | ||
94e10a22 | 4005 | /* If a type size attribute has been specified, the bounds of |
dda83cd7 SM |
4006 | the range should fit in this size. If the lower bounds needs |
4007 | more bits than the upper bound, then the type is signed. */ | |
94e10a22 | 4008 | if (n2bits <= type_size && n3bits <= type_size) |
dda83cd7 SM |
4009 | { |
4010 | if (n2bits == type_size && n2bits > n3bits) | |
4011 | got_signed = 1; | |
4012 | else | |
4013 | got_unsigned = 1; | |
4014 | nbits = type_size; | |
4015 | } | |
c906108c | 4016 | /* Range from 0 to <large number> is an unsigned large integral type. */ |
94e10a22 | 4017 | else if ((n2bits == 0 && n2 == 0) && n3bits != 0) |
c906108c SS |
4018 | { |
4019 | got_unsigned = 1; | |
4020 | nbits = n3bits; | |
4021 | } | |
4022 | /* Range from <large number> to <large number>-1 is a large signed | |
dda83cd7 SM |
4023 | integral type. Take care of the case where <large number> doesn't |
4024 | fit in a long but <large number>-1 does. */ | |
c906108c SS |
4025 | else if ((n2bits != 0 && n3bits != 0 && n2bits == n3bits + 1) |
4026 | || (n2bits != 0 && n3bits == 0 | |
c2d11a7d JM |
4027 | && (n2bits == sizeof (long) * HOST_CHAR_BIT) |
4028 | && n3 == LONG_MAX)) | |
c906108c SS |
4029 | { |
4030 | got_signed = 1; | |
4031 | nbits = n2bits; | |
4032 | } | |
4033 | ||
4034 | if (got_signed || got_unsigned) | |
19f392bc | 4035 | return init_integer_type (objfile, nbits, got_unsigned, NULL); |
c906108c SS |
4036 | else |
4037 | return error_type (pp, objfile); | |
4038 | } | |
4039 | ||
4040 | /* A type defined as a subrange of itself, with bounds both 0, is void. */ | |
4041 | if (self_subrange && n2 == 0 && n3 == 0) | |
77b7c781 | 4042 | return init_type (objfile, TYPE_CODE_VOID, TARGET_CHAR_BIT, NULL); |
c906108c SS |
4043 | |
4044 | /* If n3 is zero and n2 is positive, we want a floating type, and n2 | |
4045 | is the width in bytes. | |
4046 | ||
4047 | Fortran programs appear to use this for complex types also. To | |
4048 | distinguish between floats and complex, g77 (and others?) seem | |
4049 | to use self-subranges for the complexes, and subranges of int for | |
4050 | the floats. | |
4051 | ||
4052 | Also note that for complexes, g77 sets n2 to the size of one of | |
4053 | the member floats, not the whole complex beast. My guess is that | |
c378eb4e | 4054 | this was to work well with pre-COMPLEX versions of gdb. */ |
c906108c SS |
4055 | |
4056 | if (n3 == 0 && n2 > 0) | |
4057 | { | |
1300f5dd | 4058 | struct type *float_type |
9b790ce7 | 4059 | = dbx_init_float_type (objfile, n2 * TARGET_CHAR_BIT); |
1300f5dd | 4060 | |
c906108c | 4061 | if (self_subrange) |
5b930b45 | 4062 | return init_complex_type (NULL, float_type); |
c906108c | 4063 | else |
1300f5dd | 4064 | return float_type; |
c906108c SS |
4065 | } |
4066 | ||
a2699720 | 4067 | /* If the upper bound is -1, it must really be an unsigned integral. */ |
c906108c SS |
4068 | |
4069 | else if (n2 == 0 && n3 == -1) | |
4070 | { | |
a2699720 | 4071 | int bits = type_size; |
433759f7 | 4072 | |
a2699720 PA |
4073 | if (bits <= 0) |
4074 | { | |
4075 | /* We don't know its size. It is unsigned int or unsigned | |
4076 | long. GCC 2.3.3 uses this for long long too, but that is | |
4077 | just a GDB 3.5 compatibility hack. */ | |
5e2b427d | 4078 | bits = gdbarch_int_bit (gdbarch); |
a2699720 PA |
4079 | } |
4080 | ||
19f392bc | 4081 | return init_integer_type (objfile, bits, 1, NULL); |
c906108c SS |
4082 | } |
4083 | ||
4084 | /* Special case: char is defined (Who knows why) as a subrange of | |
4085 | itself with range 0-127. */ | |
4086 | else if (self_subrange && n2 == 0 && n3 == 127) | |
19f392bc | 4087 | { |
77b7c781 UW |
4088 | struct type *type = init_integer_type (objfile, TARGET_CHAR_BIT, |
4089 | 0, NULL); | |
15152a54 | 4090 | type->set_has_no_signedness (true); |
19f392bc UW |
4091 | return type; |
4092 | } | |
c906108c SS |
4093 | /* We used to do this only for subrange of self or subrange of int. */ |
4094 | else if (n2 == 0) | |
4095 | { | |
a0b3c4fd | 4096 | /* -1 is used for the upper bound of (4 byte) "unsigned int" and |
dda83cd7 SM |
4097 | "unsigned long", and we already checked for that, |
4098 | so don't need to test for it here. */ | |
a0b3c4fd | 4099 | |
c906108c SS |
4100 | if (n3 < 0) |
4101 | /* n3 actually gives the size. */ | |
19f392bc | 4102 | return init_integer_type (objfile, -n3 * TARGET_CHAR_BIT, 1, NULL); |
c906108c | 4103 | |
7be570e7 | 4104 | /* Is n3 == 2**(8n)-1 for some integer n? Then it's an |
dda83cd7 SM |
4105 | unsigned n-byte integer. But do require n to be a power of |
4106 | two; we don't want 3- and 5-byte integers flying around. */ | |
a0b3c4fd JM |
4107 | { |
4108 | int bytes; | |
4109 | unsigned long bits; | |
4110 | ||
4111 | bits = n3; | |
4112 | for (bytes = 0; (bits & 0xff) == 0xff; bytes++) | |
4113 | bits >>= 8; | |
4114 | if (bits == 0 | |
4115 | && ((bytes - 1) & bytes) == 0) /* "bytes is a power of two" */ | |
19f392bc | 4116 | return init_integer_type (objfile, bytes * TARGET_CHAR_BIT, 1, NULL); |
a0b3c4fd | 4117 | } |
c906108c SS |
4118 | } |
4119 | /* I think this is for Convex "long long". Since I don't know whether | |
4120 | Convex sets self_subrange, I also accept that particular size regardless | |
4121 | of self_subrange. */ | |
4122 | else if (n3 == 0 && n2 < 0 | |
4123 | && (self_subrange | |
9a76efb6 | 4124 | || n2 == -gdbarch_long_long_bit |
5e2b427d | 4125 | (gdbarch) / TARGET_CHAR_BIT)) |
19f392bc | 4126 | return init_integer_type (objfile, -n2 * TARGET_CHAR_BIT, 0, NULL); |
c5aa993b | 4127 | else if (n2 == -n3 - 1) |
c906108c SS |
4128 | { |
4129 | if (n3 == 0x7f) | |
19f392bc | 4130 | return init_integer_type (objfile, 8, 0, NULL); |
c906108c | 4131 | if (n3 == 0x7fff) |
19f392bc | 4132 | return init_integer_type (objfile, 16, 0, NULL); |
c906108c | 4133 | if (n3 == 0x7fffffff) |
19f392bc | 4134 | return init_integer_type (objfile, 32, 0, NULL); |
c906108c SS |
4135 | } |
4136 | ||
4137 | /* We have a real range type on our hands. Allocate space and | |
4138 | return a real pointer. */ | |
c5aa993b | 4139 | handle_true_range: |
c906108c SS |
4140 | |
4141 | if (self_subrange) | |
46bf5051 | 4142 | index_type = objfile_type (objfile)->builtin_int; |
c906108c | 4143 | else |
46bf5051 | 4144 | index_type = *dbx_lookup_type (rangenums, objfile); |
c906108c SS |
4145 | if (index_type == NULL) |
4146 | { | |
4147 | /* Does this actually ever happen? Is that why we are worrying | |
dda83cd7 | 4148 | about dealing with it rather than just calling error_type? */ |
c906108c | 4149 | |
b98664d3 | 4150 | complaint (_("base type %d of range type is not defined"), rangenums[1]); |
5e2b427d | 4151 | |
46bf5051 | 4152 | index_type = objfile_type (objfile)->builtin_int; |
c906108c SS |
4153 | } |
4154 | ||
0c9c3474 | 4155 | result_type |
cafb3438 | 4156 | = create_static_range_type (NULL, index_type, n2, n3); |
c906108c SS |
4157 | return (result_type); |
4158 | } | |
4159 | ||
4160 | /* Read in an argument list. This is a list of types, separated by commas | |
0a029df5 DJ |
4161 | and terminated with END. Return the list of types read in, or NULL |
4162 | if there is an error. */ | |
c906108c | 4163 | |
ad2f7632 | 4164 | static struct field * |
a121b7c1 | 4165 | read_args (const char **pp, int end, struct objfile *objfile, int *nargsp, |
ad2f7632 | 4166 | int *varargsp) |
c906108c SS |
4167 | { |
4168 | /* FIXME! Remove this arbitrary limit! */ | |
c378eb4e | 4169 | struct type *types[1024]; /* Allow for fns of 1023 parameters. */ |
ad2f7632 DJ |
4170 | int n = 0, i; |
4171 | struct field *rval; | |
c906108c SS |
4172 | |
4173 | while (**pp != end) | |
4174 | { | |
4175 | if (**pp != ',') | |
4176 | /* Invalid argument list: no ','. */ | |
0a029df5 | 4177 | return NULL; |
c906108c SS |
4178 | (*pp)++; |
4179 | STABS_CONTINUE (pp, objfile); | |
4180 | types[n++] = read_type (pp, objfile); | |
4181 | } | |
c378eb4e | 4182 | (*pp)++; /* get past `end' (the ':' character). */ |
c906108c | 4183 | |
d24d8548 JK |
4184 | if (n == 0) |
4185 | { | |
4186 | /* We should read at least the THIS parameter here. Some broken stabs | |
4187 | output contained `(0,41),(0,42)=@s8;-16;,(0,43),(0,1);' where should | |
4188 | have been present ";-16,(0,43)" reference instead. This way the | |
4189 | excessive ";" marker prematurely stops the parameters parsing. */ | |
4190 | ||
b98664d3 | 4191 | complaint (_("Invalid (empty) method arguments")); |
d24d8548 JK |
4192 | *varargsp = 0; |
4193 | } | |
78134374 | 4194 | else if (types[n - 1]->code () != TYPE_CODE_VOID) |
ad2f7632 | 4195 | *varargsp = 1; |
c906108c SS |
4196 | else |
4197 | { | |
ad2f7632 DJ |
4198 | n--; |
4199 | *varargsp = 0; | |
c906108c | 4200 | } |
ad2f7632 | 4201 | |
8d749320 | 4202 | rval = XCNEWVEC (struct field, n); |
ad2f7632 | 4203 | for (i = 0; i < n; i++) |
5d14b6e5 | 4204 | rval[i].set_type (types[i]); |
ad2f7632 | 4205 | *nargsp = n; |
c906108c SS |
4206 | return rval; |
4207 | } | |
4208 | \f | |
4209 | /* Common block handling. */ | |
4210 | ||
4211 | /* List of symbols declared since the last BCOMM. This list is a tail | |
4212 | of local_symbols. When ECOMM is seen, the symbols on the list | |
4213 | are noted so their proper addresses can be filled in later, | |
4214 | using the common block base address gotten from the assembler | |
4215 | stabs. */ | |
4216 | ||
4217 | static struct pending *common_block; | |
4218 | static int common_block_i; | |
4219 | ||
4220 | /* Name of the current common block. We get it from the BCOMM instead of the | |
4221 | ECOMM to match IBM documentation (even though IBM puts the name both places | |
4222 | like everyone else). */ | |
4223 | static char *common_block_name; | |
4224 | ||
4225 | /* Process a N_BCOMM symbol. The storage for NAME is not guaranteed | |
4226 | to remain after this function returns. */ | |
4227 | ||
4228 | void | |
a121b7c1 | 4229 | common_block_start (const char *name, struct objfile *objfile) |
c906108c SS |
4230 | { |
4231 | if (common_block_name != NULL) | |
4232 | { | |
b98664d3 | 4233 | complaint (_("Invalid symbol data: common block within common block")); |
c906108c | 4234 | } |
e148f09d TT |
4235 | common_block = *get_local_symbols (); |
4236 | common_block_i = common_block ? common_block->nsyms : 0; | |
021887d8 | 4237 | common_block_name = obstack_strdup (&objfile->objfile_obstack, name); |
c906108c SS |
4238 | } |
4239 | ||
4240 | /* Process a N_ECOMM symbol. */ | |
4241 | ||
4242 | void | |
fba45db2 | 4243 | common_block_end (struct objfile *objfile) |
c906108c SS |
4244 | { |
4245 | /* Symbols declared since the BCOMM are to have the common block | |
4246 | start address added in when we know it. common_block and | |
4247 | common_block_i point to the first symbol after the BCOMM in | |
4248 | the local_symbols list; copy the list and hang it off the | |
4249 | symbol for the common block name for later fixup. */ | |
4250 | int i; | |
4251 | struct symbol *sym; | |
fe978cb0 | 4252 | struct pending *newobj = 0; |
c906108c SS |
4253 | struct pending *next; |
4254 | int j; | |
4255 | ||
4256 | if (common_block_name == NULL) | |
4257 | { | |
b98664d3 | 4258 | complaint (_("ECOMM symbol unmatched by BCOMM")); |
c906108c SS |
4259 | return; |
4260 | } | |
4261 | ||
8c14c3a3 | 4262 | sym = new (&objfile->objfile_obstack) symbol; |
c378eb4e | 4263 | /* Note: common_block_name already saved on objfile_obstack. */ |
43678b0a | 4264 | sym->set_linkage_name (common_block_name); |
f1e6e072 | 4265 | SYMBOL_ACLASS_INDEX (sym) = LOC_BLOCK; |
c906108c SS |
4266 | |
4267 | /* Now we copy all the symbols which have been defined since the BCOMM. */ | |
4268 | ||
4269 | /* Copy all the struct pendings before common_block. */ | |
e148f09d | 4270 | for (next = *get_local_symbols (); |
c906108c SS |
4271 | next != NULL && next != common_block; |
4272 | next = next->next) | |
4273 | { | |
4274 | for (j = 0; j < next->nsyms; j++) | |
fe978cb0 | 4275 | add_symbol_to_list (next->symbol[j], &newobj); |
c906108c SS |
4276 | } |
4277 | ||
4278 | /* Copy however much of COMMON_BLOCK we need. If COMMON_BLOCK is | |
4279 | NULL, it means copy all the local symbols (which we already did | |
4280 | above). */ | |
4281 | ||
4282 | if (common_block != NULL) | |
4283 | for (j = common_block_i; j < common_block->nsyms; j++) | |
fe978cb0 | 4284 | add_symbol_to_list (common_block->symbol[j], &newobj); |
c906108c | 4285 | |
fe978cb0 | 4286 | SYMBOL_TYPE (sym) = (struct type *) newobj; |
c906108c SS |
4287 | |
4288 | /* Should we be putting local_symbols back to what it was? | |
4289 | Does it matter? */ | |
4290 | ||
987012b8 | 4291 | i = hashname (sym->linkage_name ()); |
c906108c SS |
4292 | SYMBOL_VALUE_CHAIN (sym) = global_sym_chain[i]; |
4293 | global_sym_chain[i] = sym; | |
4294 | common_block_name = NULL; | |
4295 | } | |
4296 | ||
4297 | /* Add a common block's start address to the offset of each symbol | |
4298 | declared to be in it (by being between a BCOMM/ECOMM pair that uses | |
4299 | the common block name). */ | |
4300 | ||
4301 | static void | |
46cb6474 | 4302 | fix_common_block (struct symbol *sym, CORE_ADDR valu) |
c906108c SS |
4303 | { |
4304 | struct pending *next = (struct pending *) SYMBOL_TYPE (sym); | |
433759f7 | 4305 | |
c5aa993b | 4306 | for (; next; next = next->next) |
c906108c | 4307 | { |
aa1ee363 | 4308 | int j; |
433759f7 | 4309 | |
c906108c | 4310 | for (j = next->nsyms - 1; j >= 0; j--) |
38583298 TT |
4311 | SET_SYMBOL_VALUE_ADDRESS (next->symbol[j], |
4312 | SYMBOL_VALUE_ADDRESS (next->symbol[j]) | |
4313 | + valu); | |
c906108c SS |
4314 | } |
4315 | } | |
c5aa993b | 4316 | \f |
c906108c SS |
4317 | |
4318 | ||
bf362611 JB |
4319 | /* Add {TYPE, TYPENUMS} to the NONAME_UNDEFS vector. |
4320 | See add_undefined_type for more details. */ | |
c906108c | 4321 | |
a7a48797 | 4322 | static void |
bf362611 JB |
4323 | add_undefined_type_noname (struct type *type, int typenums[2]) |
4324 | { | |
4325 | struct nat nat; | |
4326 | ||
4327 | nat.typenums[0] = typenums [0]; | |
4328 | nat.typenums[1] = typenums [1]; | |
4329 | nat.type = type; | |
4330 | ||
4331 | if (noname_undefs_length == noname_undefs_allocated) | |
4332 | { | |
4333 | noname_undefs_allocated *= 2; | |
4334 | noname_undefs = (struct nat *) | |
4335 | xrealloc ((char *) noname_undefs, | |
4336 | noname_undefs_allocated * sizeof (struct nat)); | |
4337 | } | |
4338 | noname_undefs[noname_undefs_length++] = nat; | |
4339 | } | |
4340 | ||
4341 | /* Add TYPE to the UNDEF_TYPES vector. | |
4342 | See add_undefined_type for more details. */ | |
4343 | ||
4344 | static void | |
4345 | add_undefined_type_1 (struct type *type) | |
c906108c SS |
4346 | { |
4347 | if (undef_types_length == undef_types_allocated) | |
4348 | { | |
4349 | undef_types_allocated *= 2; | |
4350 | undef_types = (struct type **) | |
4351 | xrealloc ((char *) undef_types, | |
4352 | undef_types_allocated * sizeof (struct type *)); | |
4353 | } | |
4354 | undef_types[undef_types_length++] = type; | |
4355 | } | |
4356 | ||
bf362611 JB |
4357 | /* What about types defined as forward references inside of a small lexical |
4358 | scope? */ | |
4359 | /* Add a type to the list of undefined types to be checked through | |
4360 | once this file has been read in. | |
4361 | ||
4362 | In practice, we actually maintain two such lists: The first list | |
4363 | (UNDEF_TYPES) is used for types whose name has been provided, and | |
4364 | concerns forward references (eg 'xs' or 'xu' forward references); | |
4365 | the second list (NONAME_UNDEFS) is used for types whose name is | |
4366 | unknown at creation time, because they were referenced through | |
4367 | their type number before the actual type was declared. | |
4368 | This function actually adds the given type to the proper list. */ | |
4369 | ||
4370 | static void | |
4371 | add_undefined_type (struct type *type, int typenums[2]) | |
4372 | { | |
7d93a1e0 | 4373 | if (type->name () == NULL) |
bf362611 JB |
4374 | add_undefined_type_noname (type, typenums); |
4375 | else | |
4376 | add_undefined_type_1 (type); | |
4377 | } | |
4378 | ||
4379 | /* Try to fix all undefined types pushed on the UNDEF_TYPES vector. */ | |
4380 | ||
2c0b251b | 4381 | static void |
46bf5051 | 4382 | cleanup_undefined_types_noname (struct objfile *objfile) |
bf362611 JB |
4383 | { |
4384 | int i; | |
4385 | ||
4386 | for (i = 0; i < noname_undefs_length; i++) | |
4387 | { | |
4388 | struct nat nat = noname_undefs[i]; | |
4389 | struct type **type; | |
4390 | ||
46bf5051 | 4391 | type = dbx_lookup_type (nat.typenums, objfile); |
78134374 | 4392 | if (nat.type != *type && (*type)->code () != TYPE_CODE_UNDEF) |
dda83cd7 SM |
4393 | { |
4394 | /* The instance flags of the undefined type are still unset, | |
4395 | and needs to be copied over from the reference type. | |
4396 | Since replace_type expects them to be identical, we need | |
4397 | to set these flags manually before hand. */ | |
4398 | nat.type->set_instance_flags ((*type)->instance_flags ()); | |
4399 | replace_type (nat.type, *type); | |
4400 | } | |
bf362611 JB |
4401 | } |
4402 | ||
4403 | noname_undefs_length = 0; | |
4404 | } | |
4405 | ||
c906108c SS |
4406 | /* Go through each undefined type, see if it's still undefined, and fix it |
4407 | up if possible. We have two kinds of undefined types: | |
4408 | ||
4409 | TYPE_CODE_ARRAY: Array whose target type wasn't defined yet. | |
c5aa993b JM |
4410 | Fix: update array length using the element bounds |
4411 | and the target type's length. | |
c906108c | 4412 | TYPE_CODE_STRUCT, TYPE_CODE_UNION: Structure whose fields were not |
c5aa993b JM |
4413 | yet defined at the time a pointer to it was made. |
4414 | Fix: Do a full lookup on the struct/union tag. */ | |
bf362611 | 4415 | |
2c0b251b | 4416 | static void |
bf362611 | 4417 | cleanup_undefined_types_1 (void) |
c906108c SS |
4418 | { |
4419 | struct type **type; | |
4420 | ||
9e386756 JB |
4421 | /* Iterate over every undefined type, and look for a symbol whose type |
4422 | matches our undefined type. The symbol matches if: | |
4423 | 1. It is a typedef in the STRUCT domain; | |
4424 | 2. It has the same name, and same type code; | |
4425 | 3. The instance flags are identical. | |
4426 | ||
4427 | It is important to check the instance flags, because we have seen | |
4428 | examples where the debug info contained definitions such as: | |
4429 | ||
dda83cd7 | 4430 | "foo_t:t30=B31=xefoo_t:" |
9e386756 JB |
4431 | |
4432 | In this case, we have created an undefined type named "foo_t" whose | |
4433 | instance flags is null (when processing "xefoo_t"), and then created | |
4434 | another type with the same name, but with different instance flags | |
4435 | ('B' means volatile). I think that the definition above is wrong, | |
4436 | since the same type cannot be volatile and non-volatile at the same | |
4437 | time, but we need to be able to cope with it when it happens. The | |
4438 | approach taken here is to treat these two types as different. */ | |
4439 | ||
c906108c SS |
4440 | for (type = undef_types; type < undef_types + undef_types_length; type++) |
4441 | { | |
78134374 | 4442 | switch ((*type)->code ()) |
c906108c SS |
4443 | { |
4444 | ||
c5aa993b JM |
4445 | case TYPE_CODE_STRUCT: |
4446 | case TYPE_CODE_UNION: | |
4447 | case TYPE_CODE_ENUM: | |
c906108c SS |
4448 | { |
4449 | /* Check if it has been defined since. Need to do this here | |
4450 | as well as in check_typedef to deal with the (legitimate in | |
4451 | C though not C++) case of several types with the same name | |
4452 | in different source files. */ | |
e46d3488 | 4453 | if ((*type)->is_stub ()) |
c906108c SS |
4454 | { |
4455 | struct pending *ppt; | |
4456 | int i; | |
c378eb4e | 4457 | /* Name of the type, without "struct" or "union". */ |
7d93a1e0 | 4458 | const char *type_name = (*type)->name (); |
c906108c | 4459 | |
fe978cb0 | 4460 | if (type_name == NULL) |
c906108c | 4461 | { |
b98664d3 | 4462 | complaint (_("need a type name")); |
c906108c SS |
4463 | break; |
4464 | } | |
e148f09d | 4465 | for (ppt = *get_file_symbols (); ppt; ppt = ppt->next) |
c906108c SS |
4466 | { |
4467 | for (i = 0; i < ppt->nsyms; i++) | |
4468 | { | |
4469 | struct symbol *sym = ppt->symbol[i]; | |
c5aa993b | 4470 | |
c906108c | 4471 | if (SYMBOL_CLASS (sym) == LOC_TYPEDEF |
176620f1 | 4472 | && SYMBOL_DOMAIN (sym) == STRUCT_DOMAIN |
10242f36 SM |
4473 | && (SYMBOL_TYPE (sym)->code () == (*type)->code ()) |
4474 | && ((*type)->instance_flags () | |
4475 | == SYMBOL_TYPE (sym)->instance_flags ()) | |
987012b8 | 4476 | && strcmp (sym->linkage_name (), type_name) == 0) |
10242f36 | 4477 | replace_type (*type, SYMBOL_TYPE (sym)); |
c906108c SS |
4478 | } |
4479 | } | |
4480 | } | |
4481 | } | |
4482 | break; | |
4483 | ||
4484 | default: | |
4485 | { | |
b98664d3 | 4486 | complaint (_("forward-referenced types left unresolved, " |
dda83cd7 | 4487 | "type code %d."), |
78134374 | 4488 | (*type)->code ()); |
c906108c SS |
4489 | } |
4490 | break; | |
4491 | } | |
4492 | } | |
4493 | ||
4494 | undef_types_length = 0; | |
4495 | } | |
4496 | ||
30baf67b | 4497 | /* Try to fix all the undefined types we encountered while processing |
bf362611 JB |
4498 | this unit. */ |
4499 | ||
4500 | void | |
0a0edcd5 | 4501 | cleanup_undefined_stabs_types (struct objfile *objfile) |
bf362611 JB |
4502 | { |
4503 | cleanup_undefined_types_1 (); | |
46bf5051 | 4504 | cleanup_undefined_types_noname (objfile); |
bf362611 JB |
4505 | } |
4506 | ||
77d6f1aa | 4507 | /* See stabsread.h. */ |
c906108c SS |
4508 | |
4509 | void | |
fba45db2 | 4510 | scan_file_globals (struct objfile *objfile) |
c906108c SS |
4511 | { |
4512 | int hash; | |
507836c0 | 4513 | struct symbol *sym, *prev; |
c906108c SS |
4514 | struct objfile *resolve_objfile; |
4515 | ||
4516 | /* SVR4 based linkers copy referenced global symbols from shared | |
4517 | libraries to the main executable. | |
4518 | If we are scanning the symbols for a shared library, try to resolve | |
4519 | them from the minimal symbols of the main executable first. */ | |
4520 | ||
a42d7dd8 TT |
4521 | if (current_program_space->symfile_object_file |
4522 | && objfile != current_program_space->symfile_object_file) | |
4523 | resolve_objfile = current_program_space->symfile_object_file; | |
c906108c SS |
4524 | else |
4525 | resolve_objfile = objfile; | |
4526 | ||
4527 | while (1) | |
4528 | { | |
4529 | /* Avoid expensive loop through all minimal symbols if there are | |
dda83cd7 | 4530 | no unresolved symbols. */ |
c906108c SS |
4531 | for (hash = 0; hash < HASHSIZE; hash++) |
4532 | { | |
4533 | if (global_sym_chain[hash]) | |
4534 | break; | |
4535 | } | |
4536 | if (hash >= HASHSIZE) | |
4537 | return; | |
4538 | ||
7932255d | 4539 | for (minimal_symbol *msymbol : resolve_objfile->msymbols ()) |
c906108c SS |
4540 | { |
4541 | QUIT; | |
4542 | ||
4543 | /* Skip static symbols. */ | |
4544 | switch (MSYMBOL_TYPE (msymbol)) | |
4545 | { | |
4546 | case mst_file_text: | |
4547 | case mst_file_data: | |
4548 | case mst_file_bss: | |
4549 | continue; | |
4550 | default: | |
4551 | break; | |
4552 | } | |
4553 | ||
4554 | prev = NULL; | |
4555 | ||
4556 | /* Get the hash index and check all the symbols | |
c378eb4e | 4557 | under that hash index. */ |
c906108c | 4558 | |
c9d95fa3 | 4559 | hash = hashname (msymbol->linkage_name ()); |
c906108c SS |
4560 | |
4561 | for (sym = global_sym_chain[hash]; sym;) | |
4562 | { | |
987012b8 | 4563 | if (strcmp (msymbol->linkage_name (), sym->linkage_name ()) == 0) |
c906108c | 4564 | { |
c906108c | 4565 | /* Splice this symbol out of the hash chain and |
c378eb4e | 4566 | assign the value we have to it. */ |
c906108c SS |
4567 | if (prev) |
4568 | { | |
4569 | SYMBOL_VALUE_CHAIN (prev) = SYMBOL_VALUE_CHAIN (sym); | |
4570 | } | |
4571 | else | |
4572 | { | |
4573 | global_sym_chain[hash] = SYMBOL_VALUE_CHAIN (sym); | |
4574 | } | |
c5aa993b | 4575 | |
c906108c SS |
4576 | /* Check to see whether we need to fix up a common block. */ |
4577 | /* Note: this code might be executed several times for | |
4578 | the same symbol if there are multiple references. */ | |
507836c0 | 4579 | if (sym) |
c906108c | 4580 | { |
507836c0 | 4581 | if (SYMBOL_CLASS (sym) == LOC_BLOCK) |
c906108c | 4582 | { |
507836c0 | 4583 | fix_common_block (sym, |
77e371c0 TT |
4584 | MSYMBOL_VALUE_ADDRESS (resolve_objfile, |
4585 | msymbol)); | |
c906108c SS |
4586 | } |
4587 | else | |
4588 | { | |
38583298 TT |
4589 | SET_SYMBOL_VALUE_ADDRESS |
4590 | (sym, MSYMBOL_VALUE_ADDRESS (resolve_objfile, | |
4591 | msymbol)); | |
c906108c | 4592 | } |
a52d653e | 4593 | sym->set_section_index (msymbol->section_index ()); |
c906108c SS |
4594 | } |
4595 | ||
c906108c SS |
4596 | if (prev) |
4597 | { | |
4598 | sym = SYMBOL_VALUE_CHAIN (prev); | |
4599 | } | |
4600 | else | |
4601 | { | |
4602 | sym = global_sym_chain[hash]; | |
4603 | } | |
4604 | } | |
4605 | else | |
4606 | { | |
4607 | prev = sym; | |
4608 | sym = SYMBOL_VALUE_CHAIN (sym); | |
4609 | } | |
4610 | } | |
4611 | } | |
4612 | if (resolve_objfile == objfile) | |
4613 | break; | |
4614 | resolve_objfile = objfile; | |
4615 | } | |
4616 | ||
4617 | /* Change the storage class of any remaining unresolved globals to | |
4618 | LOC_UNRESOLVED and remove them from the chain. */ | |
4619 | for (hash = 0; hash < HASHSIZE; hash++) | |
4620 | { | |
4621 | sym = global_sym_chain[hash]; | |
4622 | while (sym) | |
4623 | { | |
4624 | prev = sym; | |
4625 | sym = SYMBOL_VALUE_CHAIN (sym); | |
4626 | ||
4627 | /* Change the symbol address from the misleading chain value | |
4628 | to address zero. */ | |
38583298 | 4629 | SET_SYMBOL_VALUE_ADDRESS (prev, 0); |
c906108c SS |
4630 | |
4631 | /* Complain about unresolved common block symbols. */ | |
4632 | if (SYMBOL_CLASS (prev) == LOC_STATIC) | |
f1e6e072 | 4633 | SYMBOL_ACLASS_INDEX (prev) = LOC_UNRESOLVED; |
c906108c | 4634 | else |
b98664d3 | 4635 | complaint (_("%s: common block `%s' from " |
3e43a32a | 4636 | "global_sym_chain unresolved"), |
987012b8 | 4637 | objfile_name (objfile), prev->print_name ()); |
c906108c SS |
4638 | } |
4639 | } | |
4640 | memset (global_sym_chain, 0, sizeof (global_sym_chain)); | |
4641 | } | |
4642 | ||
4643 | /* Initialize anything that needs initializing when starting to read | |
4644 | a fresh piece of a symbol file, e.g. reading in the stuff corresponding | |
4645 | to a psymtab. */ | |
4646 | ||
4647 | void | |
fba45db2 | 4648 | stabsread_init (void) |
c906108c SS |
4649 | { |
4650 | } | |
4651 | ||
4652 | /* Initialize anything that needs initializing when a completely new | |
4653 | symbol file is specified (not just adding some symbols from another | |
4654 | file, e.g. a shared library). */ | |
4655 | ||
4656 | void | |
fba45db2 | 4657 | stabsread_new_init (void) |
c906108c SS |
4658 | { |
4659 | /* Empty the hash table of global syms looking for values. */ | |
4660 | memset (global_sym_chain, 0, sizeof (global_sym_chain)); | |
4661 | } | |
4662 | ||
4663 | /* Initialize anything that needs initializing at the same time as | |
c378eb4e | 4664 | start_symtab() is called. */ |
c906108c | 4665 | |
c5aa993b | 4666 | void |
fba45db2 | 4667 | start_stabs (void) |
c906108c SS |
4668 | { |
4669 | global_stabs = NULL; /* AIX COFF */ | |
4670 | /* Leave FILENUM of 0 free for builtin types and this file's types. */ | |
4671 | n_this_object_header_files = 1; | |
4672 | type_vector_length = 0; | |
4673 | type_vector = (struct type **) 0; | |
5985ac61 | 4674 | within_function = 0; |
c906108c SS |
4675 | |
4676 | /* FIXME: If common_block_name is not already NULL, we should complain(). */ | |
4677 | common_block_name = NULL; | |
c906108c SS |
4678 | } |
4679 | ||
c378eb4e | 4680 | /* Call after end_symtab(). */ |
c906108c | 4681 | |
c5aa993b | 4682 | void |
fba45db2 | 4683 | end_stabs (void) |
c906108c SS |
4684 | { |
4685 | if (type_vector) | |
4686 | { | |
b8c9b27d | 4687 | xfree (type_vector); |
c906108c SS |
4688 | } |
4689 | type_vector = 0; | |
4690 | type_vector_length = 0; | |
4691 | previous_stab_code = 0; | |
4692 | } | |
4693 | ||
4694 | void | |
fba45db2 | 4695 | finish_global_stabs (struct objfile *objfile) |
c906108c SS |
4696 | { |
4697 | if (global_stabs) | |
4698 | { | |
e148f09d | 4699 | patch_block_stabs (*get_global_symbols (), global_stabs, objfile); |
b8c9b27d | 4700 | xfree (global_stabs); |
c906108c SS |
4701 | global_stabs = NULL; |
4702 | } | |
4703 | } | |
4704 | ||
7e1d63ec AF |
4705 | /* Find the end of the name, delimited by a ':', but don't match |
4706 | ObjC symbols which look like -[Foo bar::]:bla. */ | |
a121b7c1 PA |
4707 | static const char * |
4708 | find_name_end (const char *name) | |
7e1d63ec | 4709 | { |
a121b7c1 | 4710 | const char *s = name; |
433759f7 | 4711 | |
7e1d63ec AF |
4712 | if (s[0] == '-' || *s == '+') |
4713 | { | |
4714 | /* Must be an ObjC method symbol. */ | |
4715 | if (s[1] != '[') | |
4716 | { | |
8a3fe4f8 | 4717 | error (_("invalid symbol name \"%s\""), name); |
7e1d63ec AF |
4718 | } |
4719 | s = strchr (s, ']'); | |
4720 | if (s == NULL) | |
4721 | { | |
8a3fe4f8 | 4722 | error (_("invalid symbol name \"%s\""), name); |
7e1d63ec AF |
4723 | } |
4724 | return strchr (s, ':'); | |
4725 | } | |
4726 | else | |
4727 | { | |
4728 | return strchr (s, ':'); | |
4729 | } | |
4730 | } | |
4731 | ||
2150c3ef TT |
4732 | /* See stabsread.h. */ |
4733 | ||
4734 | int | |
4735 | hashname (const char *name) | |
4736 | { | |
4cbd39b2 | 4737 | return fast_hash (name, strlen (name)) % HASHSIZE; |
2150c3ef TT |
4738 | } |
4739 | ||
c378eb4e | 4740 | /* Initializer for this module. */ |
c906108c | 4741 | |
6c265988 | 4742 | void _initialize_stabsread (); |
c906108c | 4743 | void |
6c265988 | 4744 | _initialize_stabsread () |
c906108c SS |
4745 | { |
4746 | undef_types_allocated = 20; | |
4747 | undef_types_length = 0; | |
8d749320 | 4748 | undef_types = XNEWVEC (struct type *, undef_types_allocated); |
bf362611 JB |
4749 | |
4750 | noname_undefs_allocated = 20; | |
4751 | noname_undefs_length = 0; | |
8d749320 | 4752 | noname_undefs = XNEWVEC (struct nat, noname_undefs_allocated); |
f1e6e072 TT |
4753 | |
4754 | stab_register_index = register_symbol_register_impl (LOC_REGISTER, | |
4755 | &stab_register_funcs); | |
4756 | stab_regparm_index = register_symbol_register_impl (LOC_REGPARM_ADDR, | |
4757 | &stab_register_funcs); | |
c906108c | 4758 | } |