]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - libctf/ctf-create.c
libctf, open: drop unnecessary historical wart around forwards
[thirdparty/binutils-gdb.git] / libctf / ctf-create.c
CommitLineData
47d546f4 1/* CTF file creation.
b3adc24a 2 Copyright (C) 2019-2020 Free Software Foundation, Inc.
47d546f4
NA
3
4 This file is part of libctf.
5
6 libctf is free software; you can redistribute it and/or modify it under
7 the terms of the GNU General Public License as published by the Free
8 Software Foundation; either version 3, or (at your option) any later
9 version.
10
11 This program is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
14 See the GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; see the file COPYING. If not see
18 <http://www.gnu.org/licenses/>. */
19
20#include <ctf-impl.h>
21#include <sys/param.h>
22#include <assert.h>
23#include <string.h>
c1401ecc 24#include <unistd.h>
47d546f4
NA
25#include <zlib.h>
26
a0486bac
JM
27#ifndef roundup
28#define roundup(x, y) ((((x) + ((y) - 1)) / (y)) * (y))
29#endif
30
676c3ecb
NA
31/* Make sure the ptrtab has enough space for at least one more type.
32
33 We start with 4KiB of ptrtab, enough for a thousand types, then grow it 25%
34 at a time. */
35
36static int
37ctf_grow_ptrtab (ctf_file_t *fp)
38{
39 size_t new_ptrtab_len = fp->ctf_ptrtab_len;
40
41 /* We allocate one more ptrtab entry than we need, for the initial zero,
42 plus one because the caller will probably allocate a new type. */
43
44 if (fp->ctf_ptrtab == NULL)
45 new_ptrtab_len = 1024;
46 else if ((fp->ctf_typemax + 2) > fp->ctf_ptrtab_len)
47 new_ptrtab_len = fp->ctf_ptrtab_len * 1.25;
48
49 if (new_ptrtab_len != fp->ctf_ptrtab_len)
50 {
51 uint32_t *new_ptrtab;
52
53 if ((new_ptrtab = realloc (fp->ctf_ptrtab,
54 new_ptrtab_len * sizeof (uint32_t))) == NULL)
55 return (ctf_set_errno (fp, ENOMEM));
56
57 fp->ctf_ptrtab = new_ptrtab;
58 memset (fp->ctf_ptrtab + fp->ctf_ptrtab_len, 0,
59 (new_ptrtab_len - fp->ctf_ptrtab_len) * sizeof (uint32_t));
60 fp->ctf_ptrtab_len = new_ptrtab_len;
61 }
62 return 0;
63}
64
47d546f4
NA
65/* To create an empty CTF container, we just declare a zeroed header and call
66 ctf_bufopen() on it. If ctf_bufopen succeeds, we mark the new container r/w
f5e9c9bd
NA
67 and initialize the dynamic members. We start assigning type IDs at 1 because
68 type ID 0 is used as a sentinel and a not-found indicator. */
47d546f4
NA
69
70ctf_file_t *
71ctf_create (int *errp)
72{
73 static const ctf_header_t hdr = { .cth_preamble = { CTF_MAGIC, CTF_VERSION, 0 } };
74
75 ctf_dynhash_t *dthash;
76 ctf_dynhash_t *dvhash;
676c3ecb 77 ctf_dynhash_t *structs = NULL, *unions = NULL, *enums = NULL, *names = NULL;
47d546f4
NA
78 ctf_sect_t cts;
79 ctf_file_t *fp;
80
81 libctf_init_debug();
82 dthash = ctf_dynhash_create (ctf_hash_integer, ctf_hash_eq_integer,
83 NULL, NULL);
84 if (dthash == NULL)
85 {
86 ctf_set_open_errno (errp, EAGAIN);
87 goto err;
88 }
89
90 dvhash = ctf_dynhash_create (ctf_hash_string, ctf_hash_eq_string,
91 NULL, NULL);
92 if (dvhash == NULL)
93 {
94 ctf_set_open_errno (errp, EAGAIN);
95 goto err_dt;
96 }
97
676c3ecb
NA
98 structs = ctf_dynhash_create (ctf_hash_string, ctf_hash_eq_string,
99 NULL, NULL);
100 unions = ctf_dynhash_create (ctf_hash_string, ctf_hash_eq_string,
101 NULL, NULL);
102 enums = ctf_dynhash_create (ctf_hash_string, ctf_hash_eq_string,
103 NULL, NULL);
104 names = ctf_dynhash_create (ctf_hash_string, ctf_hash_eq_string,
105 NULL, NULL);
106 if (!structs || !unions || !enums || !names)
47d546f4
NA
107 {
108 ctf_set_open_errno (errp, EAGAIN);
109 goto err_dv;
110 }
111
112 cts.cts_name = _CTF_SECTION;
47d546f4
NA
113 cts.cts_data = &hdr;
114 cts.cts_size = sizeof (hdr);
115 cts.cts_entsize = 1;
47d546f4 116
676c3ecb
NA
117 if ((fp = ctf_bufopen_internal (&cts, NULL, NULL, NULL, 1, errp)) == NULL)
118 goto err_dv;
47d546f4 119
676c3ecb
NA
120 fp->ctf_structs.ctn_writable = structs;
121 fp->ctf_unions.ctn_writable = unions;
122 fp->ctf_enums.ctn_writable = enums;
123 fp->ctf_names.ctn_writable = names;
47d546f4
NA
124 fp->ctf_dthash = dthash;
125 fp->ctf_dvhash = dvhash;
47d546f4 126 fp->ctf_dtoldid = 0;
f57cf0e3 127 fp->ctf_snapshots = 1;
47d546f4
NA
128 fp->ctf_snapshot_lu = 0;
129
676c3ecb
NA
130 ctf_set_ctl_hashes (fp);
131 ctf_setmodel (fp, CTF_MODEL_NATIVE);
132 if (ctf_grow_ptrtab (fp) < 0)
133 {
134 ctf_set_open_errno (errp, ctf_errno (fp));
135 ctf_file_close (fp);
136 return NULL;
137 }
138
47d546f4
NA
139 return fp;
140
47d546f4 141 err_dv:
676c3ecb
NA
142 ctf_dynhash_destroy (structs);
143 ctf_dynhash_destroy (unions);
144 ctf_dynhash_destroy (enums);
145 ctf_dynhash_destroy (names);
47d546f4
NA
146 ctf_dynhash_destroy (dvhash);
147 err_dt:
148 ctf_dynhash_destroy (dthash);
149 err:
150 return NULL;
151}
152
153static unsigned char *
f5e9c9bd 154ctf_copy_smembers (ctf_file_t *fp, ctf_dtdef_t *dtd, unsigned char *t)
47d546f4
NA
155{
156 ctf_dmdef_t *dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
157 ctf_member_t ctm;
158
159 for (; dmd != NULL; dmd = ctf_list_next (dmd))
160 {
f5e9c9bd 161 ctf_member_t *copied;
47d546f4 162
f5e9c9bd 163 ctm.ctm_name = 0;
47d546f4
NA
164 ctm.ctm_type = (uint32_t) dmd->dmd_type;
165 ctm.ctm_offset = (uint32_t) dmd->dmd_offset;
166
167 memcpy (t, &ctm, sizeof (ctm));
f5e9c9bd
NA
168 copied = (ctf_member_t *) t;
169 if (dmd->dmd_name)
170 ctf_str_add_ref (fp, dmd->dmd_name, &copied->ctm_name);
171
47d546f4
NA
172 t += sizeof (ctm);
173 }
174
175 return t;
176}
177
178static unsigned char *
f5e9c9bd 179ctf_copy_lmembers (ctf_file_t *fp, ctf_dtdef_t *dtd, unsigned char *t)
47d546f4
NA
180{
181 ctf_dmdef_t *dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
182 ctf_lmember_t ctlm;
183
184 for (; dmd != NULL; dmd = ctf_list_next (dmd))
185 {
f5e9c9bd 186 ctf_lmember_t *copied;
47d546f4 187
f5e9c9bd 188 ctlm.ctlm_name = 0;
47d546f4
NA
189 ctlm.ctlm_type = (uint32_t) dmd->dmd_type;
190 ctlm.ctlm_offsethi = CTF_OFFSET_TO_LMEMHI (dmd->dmd_offset);
191 ctlm.ctlm_offsetlo = CTF_OFFSET_TO_LMEMLO (dmd->dmd_offset);
192
193 memcpy (t, &ctlm, sizeof (ctlm));
f5e9c9bd
NA
194 copied = (ctf_lmember_t *) t;
195 if (dmd->dmd_name)
196 ctf_str_add_ref (fp, dmd->dmd_name, &copied->ctlm_name);
197
47d546f4
NA
198 t += sizeof (ctlm);
199 }
200
201 return t;
202}
203
204static unsigned char *
f5e9c9bd 205ctf_copy_emembers (ctf_file_t *fp, ctf_dtdef_t *dtd, unsigned char *t)
47d546f4
NA
206{
207 ctf_dmdef_t *dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
208 ctf_enum_t cte;
209
210 for (; dmd != NULL; dmd = ctf_list_next (dmd))
211 {
f5e9c9bd
NA
212 ctf_enum_t *copied;
213
47d546f4 214 cte.cte_value = dmd->dmd_value;
47d546f4 215 memcpy (t, &cte, sizeof (cte));
f5e9c9bd
NA
216 copied = (ctf_enum_t *) t;
217 ctf_str_add_ref (fp, dmd->dmd_name, &copied->cte_name);
47d546f4
NA
218 t += sizeof (cte);
219 }
220
221 return t;
222}
223
47d546f4
NA
224/* Sort a newly-constructed static variable array. */
225
d851ecd3
NA
226typedef struct ctf_sort_var_arg_cb
227{
228 ctf_file_t *fp;
229 ctf_strs_t *strtab;
230} ctf_sort_var_arg_cb_t;
231
47d546f4 232static int
d851ecd3 233ctf_sort_var (const void *one_, const void *two_, void *arg_)
47d546f4
NA
234{
235 const ctf_varent_t *one = one_;
236 const ctf_varent_t *two = two_;
d851ecd3 237 ctf_sort_var_arg_cb_t *arg = arg_;
47d546f4 238
d851ecd3
NA
239 return (strcmp (ctf_strraw_explicit (arg->fp, one->ctv_name, arg->strtab),
240 ctf_strraw_explicit (arg->fp, two->ctv_name, arg->strtab)));
47d546f4
NA
241}
242
676c3ecb 243/* Compatibility: just update the threshold for ctf_discard. */
47d546f4
NA
244int
245ctf_update (ctf_file_t *fp)
676c3ecb
NA
246{
247 if (!(fp->ctf_flags & LCTF_RDWR))
248 return (ctf_set_errno (fp, ECTF_RDONLY));
249
250 fp->ctf_dtoldid = fp->ctf_typemax;
251 return 0;
252}
253
254/* If the specified CTF container is writable and has been modified, reload this
255 container with the updated type definitions, ready for serialization. In
256 order to make this code and the rest of libctf as simple as possible, we
257 perform updates by taking the dynamic type definitions and creating an
258 in-memory CTF file containing the definitions, and then call
259 ctf_simple_open_internal() on it. We perform one extra trick here for the
260 benefit of callers and to keep our code simple: ctf_simple_open_internal()
261 will return a new ctf_file_t, but we want to keep the fp constant for the
262 caller, so after ctf_simple_open_internal() returns, we use memcpy to swap
263 the interior of the old and new ctf_file_t's, and then free the old. */
264int
265ctf_serialize (ctf_file_t *fp)
47d546f4
NA
266{
267 ctf_file_t ofp, *nfp;
f5e9c9bd 268 ctf_header_t hdr, *hdrp;
47d546f4
NA
269 ctf_dtdef_t *dtd;
270 ctf_dvdef_t *dvd;
271 ctf_varent_t *dvarents;
f5e9c9bd 272 ctf_strs_writable_t strtab;
47d546f4 273
f5e9c9bd 274 unsigned char *t;
47d546f4
NA
275 unsigned long i;
276 size_t buf_size, type_size, nvars;
f5e9c9bd 277 unsigned char *buf, *newbuf;
47d546f4
NA
278 int err;
279
280 if (!(fp->ctf_flags & LCTF_RDWR))
281 return (ctf_set_errno (fp, ECTF_RDONLY));
282
283 /* Update required? */
284 if (!(fp->ctf_flags & LCTF_DIRTY))
285 return 0;
286
287 /* Fill in an initial CTF header. We will leave the label, object,
288 and function sections empty and only output a header, type section,
289 and string table. The type section begins at a 4-byte aligned
290 boundary past the CTF header itself (at relative offset zero). */
291
292 memset (&hdr, 0, sizeof (hdr));
293 hdr.cth_magic = CTF_MAGIC;
294 hdr.cth_version = CTF_VERSION;
295
47d546f4
NA
296 /* Iterate through the dynamic type definition list and compute the
297 size of the CTF type section we will need to generate. */
298
299 for (type_size = 0, dtd = ctf_list_next (&fp->ctf_dtdefs);
300 dtd != NULL; dtd = ctf_list_next (dtd))
301 {
302 uint32_t kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
303 uint32_t vlen = LCTF_INFO_VLEN (fp, dtd->dtd_data.ctt_info);
304
305 if (dtd->dtd_data.ctt_size != CTF_LSIZE_SENT)
306 type_size += sizeof (ctf_stype_t);
307 else
308 type_size += sizeof (ctf_type_t);
309
310 switch (kind)
311 {
312 case CTF_K_INTEGER:
313 case CTF_K_FLOAT:
314 type_size += sizeof (uint32_t);
315 break;
316 case CTF_K_ARRAY:
317 type_size += sizeof (ctf_array_t);
318 break;
319 case CTF_K_SLICE:
320 type_size += sizeof (ctf_slice_t);
321 break;
322 case CTF_K_FUNCTION:
323 type_size += sizeof (uint32_t) * (vlen + (vlen & 1));
324 break;
325 case CTF_K_STRUCT:
326 case CTF_K_UNION:
327 if (dtd->dtd_data.ctt_size < CTF_LSTRUCT_THRESH)
328 type_size += sizeof (ctf_member_t) * vlen;
329 else
330 type_size += sizeof (ctf_lmember_t) * vlen;
331 break;
332 case CTF_K_ENUM:
333 type_size += sizeof (ctf_enum_t) * vlen;
334 break;
335 }
336 }
337
338 /* Computing the number of entries in the CTF variable section is much
339 simpler. */
340
341 for (nvars = 0, dvd = ctf_list_next (&fp->ctf_dvdefs);
342 dvd != NULL; dvd = ctf_list_next (dvd), nvars++);
343
f5e9c9bd
NA
344 /* Compute the size of the CTF buffer we need, sans only the string table,
345 then allocate a new buffer and memcpy the finished header to the start of
346 the buffer. (We will adjust this later with strtab length info.) */
47d546f4
NA
347
348 hdr.cth_typeoff = hdr.cth_varoff + (nvars * sizeof (ctf_varent_t));
349 hdr.cth_stroff = hdr.cth_typeoff + type_size;
f5e9c9bd 350 hdr.cth_strlen = 0;
47d546f4
NA
351
352 buf_size = sizeof (ctf_header_t) + hdr.cth_stroff + hdr.cth_strlen;
353
65365aa8 354 if ((buf = malloc (buf_size)) == NULL)
47d546f4
NA
355 return (ctf_set_errno (fp, EAGAIN));
356
357 memcpy (buf, &hdr, sizeof (ctf_header_t));
358 t = (unsigned char *) buf + sizeof (ctf_header_t) + hdr.cth_varoff;
47d546f4 359
f5e9c9bd
NA
360 hdrp = (ctf_header_t *) buf;
361 if ((fp->ctf_flags & LCTF_CHILD) && (fp->ctf_parname != NULL))
362 ctf_str_add_ref (fp, fp->ctf_parname, &hdrp->cth_parname);
fd55eae8
NA
363 if (fp->ctf_cuname != NULL)
364 ctf_str_add_ref (fp, fp->ctf_cuname, &hdrp->cth_cuname);
47d546f4 365
f5e9c9bd
NA
366 /* Work over the variable list, translating everything into ctf_varent_t's and
367 prepping the string table. */
47d546f4
NA
368
369 dvarents = (ctf_varent_t *) t;
370 for (i = 0, dvd = ctf_list_next (&fp->ctf_dvdefs); dvd != NULL;
371 dvd = ctf_list_next (dvd), i++)
372 {
373 ctf_varent_t *var = &dvarents[i];
47d546f4 374
f5e9c9bd 375 ctf_str_add_ref (fp, dvd->dvd_name, &var->ctv_name);
9943fa3a 376 var->ctv_type = (uint32_t) dvd->dvd_type;
47d546f4
NA
377 }
378 assert (i == nvars);
379
47d546f4
NA
380 t += sizeof (ctf_varent_t) * nvars;
381
382 assert (t == (unsigned char *) buf + sizeof (ctf_header_t) + hdr.cth_typeoff);
383
f5e9c9bd
NA
384 /* We now take a final lap through the dynamic type definition list and copy
385 the appropriate type records to the output buffer, noting down the
386 strings as we go. */
47d546f4
NA
387
388 for (dtd = ctf_list_next (&fp->ctf_dtdefs);
389 dtd != NULL; dtd = ctf_list_next (dtd))
390 {
47d546f4
NA
391 uint32_t kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
392 uint32_t vlen = LCTF_INFO_VLEN (fp, dtd->dtd_data.ctt_info);
393
394 ctf_array_t cta;
395 uint32_t encoding;
396 size_t len;
f5e9c9bd 397 ctf_stype_t *copied;
676c3ecb 398 const char *name;
47d546f4
NA
399
400 if (dtd->dtd_data.ctt_size != CTF_LSIZE_SENT)
401 len = sizeof (ctf_stype_t);
402 else
403 len = sizeof (ctf_type_t);
404
405 memcpy (t, &dtd->dtd_data, len);
f5e9c9bd 406 copied = (ctf_stype_t *) t; /* name is at the start: constant offset. */
676c3ecb
NA
407 if (copied->ctt_name
408 && (name = ctf_strraw (fp, copied->ctt_name)) != NULL)
409 ctf_str_add_ref (fp, name, &copied->ctt_name);
47d546f4
NA
410 t += len;
411
412 switch (kind)
413 {
414 case CTF_K_INTEGER:
415 case CTF_K_FLOAT:
416 if (kind == CTF_K_INTEGER)
417 {
418 encoding = CTF_INT_DATA (dtd->dtd_u.dtu_enc.cte_format,
419 dtd->dtd_u.dtu_enc.cte_offset,
420 dtd->dtd_u.dtu_enc.cte_bits);
421 }
422 else
423 {
424 encoding = CTF_FP_DATA (dtd->dtd_u.dtu_enc.cte_format,
425 dtd->dtd_u.dtu_enc.cte_offset,
426 dtd->dtd_u.dtu_enc.cte_bits);
427 }
428 memcpy (t, &encoding, sizeof (encoding));
429 t += sizeof (encoding);
430 break;
431
432 case CTF_K_SLICE:
433 memcpy (t, &dtd->dtd_u.dtu_slice, sizeof (struct ctf_slice));
434 t += sizeof (struct ctf_slice);
435 break;
436
437 case CTF_K_ARRAY:
438 cta.cta_contents = (uint32_t) dtd->dtd_u.dtu_arr.ctr_contents;
439 cta.cta_index = (uint32_t) dtd->dtd_u.dtu_arr.ctr_index;
440 cta.cta_nelems = dtd->dtd_u.dtu_arr.ctr_nelems;
441 memcpy (t, &cta, sizeof (cta));
442 t += sizeof (cta);
443 break;
444
445 case CTF_K_FUNCTION:
446 {
447 uint32_t *argv = (uint32_t *) (uintptr_t) t;
448 uint32_t argc;
449
450 for (argc = 0; argc < vlen; argc++)
afd78bd6 451 *argv++ = dtd->dtd_u.dtu_argv[argc];
47d546f4
NA
452
453 if (vlen & 1)
454 *argv++ = 0; /* Pad to 4-byte boundary. */
455
456 t = (unsigned char *) argv;
457 break;
458 }
459
460 case CTF_K_STRUCT:
461 case CTF_K_UNION:
462 if (dtd->dtd_data.ctt_size < CTF_LSTRUCT_THRESH)
f5e9c9bd 463 t = ctf_copy_smembers (fp, dtd, t);
47d546f4 464 else
f5e9c9bd 465 t = ctf_copy_lmembers (fp, dtd, t);
47d546f4
NA
466 break;
467
468 case CTF_K_ENUM:
f5e9c9bd 469 t = ctf_copy_emembers (fp, dtd, t);
47d546f4
NA
470 break;
471 }
472 }
473 assert (t == (unsigned char *) buf + sizeof (ctf_header_t) + hdr.cth_stroff);
474
f5e9c9bd
NA
475 /* Construct the final string table and fill out all the string refs with the
476 final offsets. Then purge the refs list, because we're about to move this
477 strtab onto the end of the buf, invalidating all the offsets. */
478 strtab = ctf_str_write_strtab (fp);
479 ctf_str_purge_refs (fp);
480
d851ecd3
NA
481 if (strtab.cts_strs == NULL)
482 {
de07e349 483 free (buf);
d851ecd3
NA
484 return (ctf_set_errno (fp, EAGAIN));
485 }
486
f5e9c9bd
NA
487 /* Now the string table is constructed, we can sort the buffer of
488 ctf_varent_t's. */
d851ecd3 489 ctf_sort_var_arg_cb_t sort_var_arg = { fp, (ctf_strs_t *) &strtab };
f5e9c9bd 490 ctf_qsort_r (dvarents, nvars, sizeof (ctf_varent_t), ctf_sort_var,
d851ecd3 491 &sort_var_arg);
f5e9c9bd
NA
492
493 if ((newbuf = ctf_realloc (fp, buf, buf_size + strtab.cts_len)) == NULL)
494 {
de07e349
NA
495 free (buf);
496 free (strtab.cts_strs);
f5e9c9bd
NA
497 return (ctf_set_errno (fp, EAGAIN));
498 }
499 buf = newbuf;
500 memcpy (buf + buf_size, strtab.cts_strs, strtab.cts_len);
501 hdrp = (ctf_header_t *) buf;
502 hdrp->cth_strlen = strtab.cts_len;
503 buf_size += hdrp->cth_strlen;
de07e349 504 free (strtab.cts_strs);
f5e9c9bd 505
47d546f4
NA
506 /* Finally, we are ready to ctf_simple_open() the new container. If this
507 is successful, we then switch nfp and fp and free the old container. */
508
d851ecd3
NA
509 if ((nfp = ctf_simple_open_internal ((char *) buf, buf_size, NULL, 0,
510 0, NULL, 0, fp->ctf_syn_ext_strtab,
676c3ecb 511 1, &err)) == NULL)
47d546f4 512 {
de07e349 513 free (buf);
47d546f4
NA
514 return (ctf_set_errno (fp, err));
515 }
516
517 (void) ctf_setmodel (nfp, ctf_getmodel (fp));
518 (void) ctf_import (nfp, fp->ctf_parent);
519
520 nfp->ctf_refcnt = fp->ctf_refcnt;
521 nfp->ctf_flags |= fp->ctf_flags & ~LCTF_DIRTY;
fd55eae8
NA
522 if (nfp->ctf_dynbase == NULL)
523 nfp->ctf_dynbase = buf; /* Make sure buf is freed on close. */
47d546f4
NA
524 nfp->ctf_dthash = fp->ctf_dthash;
525 nfp->ctf_dtdefs = fp->ctf_dtdefs;
47d546f4
NA
526 nfp->ctf_dvhash = fp->ctf_dvhash;
527 nfp->ctf_dvdefs = fp->ctf_dvdefs;
676c3ecb 528 nfp->ctf_dtoldid = fp->ctf_dtoldid;
99dc3ebd 529 nfp->ctf_add_processing = fp->ctf_add_processing;
47d546f4
NA
530 nfp->ctf_snapshots = fp->ctf_snapshots + 1;
531 nfp->ctf_specific = fp->ctf_specific;
676c3ecb
NA
532 nfp->ctf_ptrtab = fp->ctf_ptrtab;
533 nfp->ctf_ptrtab_len = fp->ctf_ptrtab_len;
72c83edd
NA
534 nfp->ctf_link_inputs = fp->ctf_link_inputs;
535 nfp->ctf_link_outputs = fp->ctf_link_outputs;
676c3ecb 536 nfp->ctf_str_prov_offset = fp->ctf_str_prov_offset;
d851ecd3 537 nfp->ctf_syn_ext_strtab = fp->ctf_syn_ext_strtab;
49ea9b45 538 nfp->ctf_link_cu_mapping = fp->ctf_link_cu_mapping;
886453cb 539 nfp->ctf_link_type_mapping = fp->ctf_link_type_mapping;
49ea9b45
NA
540 nfp->ctf_link_memb_name_changer = fp->ctf_link_memb_name_changer;
541 nfp->ctf_link_memb_name_changer_arg = fp->ctf_link_memb_name_changer_arg;
47d546f4
NA
542
543 nfp->ctf_snapshot_lu = fp->ctf_snapshots;
544
676c3ecb
NA
545 memcpy (&nfp->ctf_lookups, fp->ctf_lookups, sizeof (fp->ctf_lookups));
546 nfp->ctf_structs = fp->ctf_structs;
547 nfp->ctf_unions = fp->ctf_unions;
548 nfp->ctf_enums = fp->ctf_enums;
549 nfp->ctf_names = fp->ctf_names;
550
47d546f4 551 fp->ctf_dthash = NULL;
f5e9c9bd
NA
552 ctf_str_free_atoms (nfp);
553 nfp->ctf_str_atoms = fp->ctf_str_atoms;
676c3ecb 554 nfp->ctf_prov_strtab = fp->ctf_prov_strtab;
f5e9c9bd 555 fp->ctf_str_atoms = NULL;
676c3ecb 556 fp->ctf_prov_strtab = NULL;
47d546f4 557 memset (&fp->ctf_dtdefs, 0, sizeof (ctf_list_t));
99dc3ebd 558 fp->ctf_add_processing = NULL;
676c3ecb 559 fp->ctf_ptrtab = NULL;
72c83edd
NA
560 fp->ctf_link_inputs = NULL;
561 fp->ctf_link_outputs = NULL;
d851ecd3 562 fp->ctf_syn_ext_strtab = NULL;
49ea9b45 563 fp->ctf_link_cu_mapping = NULL;
886453cb 564 fp->ctf_link_type_mapping = NULL;
47d546f4
NA
565
566 fp->ctf_dvhash = NULL;
567 memset (&fp->ctf_dvdefs, 0, sizeof (ctf_list_t));
676c3ecb
NA
568 memset (fp->ctf_lookups, 0, sizeof (fp->ctf_lookups));
569 fp->ctf_structs.ctn_writable = NULL;
570 fp->ctf_unions.ctn_writable = NULL;
571 fp->ctf_enums.ctn_writable = NULL;
572 fp->ctf_names.ctn_writable = NULL;
47d546f4
NA
573
574 memcpy (&ofp, fp, sizeof (ctf_file_t));
575 memcpy (fp, nfp, sizeof (ctf_file_t));
576 memcpy (nfp, &ofp, sizeof (ctf_file_t));
577
47d546f4
NA
578 nfp->ctf_refcnt = 1; /* Force nfp to be freed. */
579 ctf_file_close (nfp);
580
581 return 0;
582}
583
676c3ecb
NA
584ctf_names_t *
585ctf_name_table (ctf_file_t *fp, int kind)
47d546f4 586{
47d546f4
NA
587 switch (kind)
588 {
589 case CTF_K_STRUCT:
676c3ecb 590 return &fp->ctf_structs;
47d546f4 591 case CTF_K_UNION:
676c3ecb 592 return &fp->ctf_unions;
47d546f4 593 case CTF_K_ENUM:
676c3ecb 594 return &fp->ctf_enums;
47d546f4 595 default:
676c3ecb 596 return &fp->ctf_names;
47d546f4 597 }
47d546f4
NA
598}
599
24865428 600int
fe4c2d55 601ctf_dtd_insert (ctf_file_t *fp, ctf_dtdef_t *dtd, int flag, int kind)
47d546f4 602{
676c3ecb 603 const char *name;
24865428
NA
604 if (ctf_dynhash_insert (fp->ctf_dthash, (void *) dtd->dtd_type, dtd) < 0)
605 return -1;
606
fe4c2d55 607 if (flag == CTF_ADD_ROOT && dtd->dtd_data.ctt_name
676c3ecb 608 && (name = ctf_strraw (fp, dtd->dtd_data.ctt_name)) != NULL)
47d546f4 609 {
676c3ecb
NA
610 if (ctf_dynhash_insert (ctf_name_table (fp, kind)->ctn_writable,
611 (char *) name, (void *) dtd->dtd_type) < 0)
612 {
613 ctf_dynhash_remove (fp->ctf_dthash, (void *) dtd->dtd_type);
614 return -1;
615 }
47d546f4 616 }
24865428
NA
617 ctf_list_append (&fp->ctf_dtdefs, dtd);
618 return 0;
47d546f4
NA
619}
620
621void
622ctf_dtd_delete (ctf_file_t *fp, ctf_dtdef_t *dtd)
623{
624 ctf_dmdef_t *dmd, *nmd;
625 int kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
8ffcdf18 626 int name_kind = kind;
676c3ecb 627 const char *name;
47d546f4
NA
628
629 ctf_dynhash_remove (fp->ctf_dthash, (void *) dtd->dtd_type);
630
631 switch (kind)
632 {
633 case CTF_K_STRUCT:
634 case CTF_K_UNION:
635 case CTF_K_ENUM:
636 for (dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
637 dmd != NULL; dmd = nmd)
638 {
639 if (dmd->dmd_name != NULL)
de07e349 640 free (dmd->dmd_name);
47d546f4 641 nmd = ctf_list_next (dmd);
de07e349 642 free (dmd);
47d546f4
NA
643 }
644 break;
645 case CTF_K_FUNCTION:
de07e349 646 free (dtd->dtd_u.dtu_argv);
47d546f4 647 break;
8ffcdf18
NA
648 case CTF_K_FORWARD:
649 name_kind = dtd->dtd_data.ctt_type;
650 break;
47d546f4
NA
651 }
652
676c3ecb 653 if (dtd->dtd_data.ctt_name
fe4c2d55
NA
654 && (name = ctf_strraw (fp, dtd->dtd_data.ctt_name)) != NULL
655 && LCTF_INFO_ISROOT (fp, dtd->dtd_data.ctt_info))
47d546f4 656 {
8ffcdf18 657 ctf_dynhash_remove (ctf_name_table (fp, name_kind)->ctn_writable,
676c3ecb
NA
658 name);
659 ctf_str_remove_ref (fp, name, &dtd->dtd_data.ctt_name);
47d546f4
NA
660 }
661
662 ctf_list_delete (&fp->ctf_dtdefs, dtd);
de07e349 663 free (dtd);
47d546f4
NA
664}
665
666ctf_dtdef_t *
667ctf_dtd_lookup (const ctf_file_t *fp, ctf_id_t type)
668{
669 return (ctf_dtdef_t *) ctf_dynhash_lookup (fp->ctf_dthash, (void *) type);
670}
671
47d546f4
NA
672ctf_dtdef_t *
673ctf_dynamic_type (const ctf_file_t *fp, ctf_id_t id)
674{
675 ctf_id_t idx;
676
676c3ecb
NA
677 if (!(fp->ctf_flags & LCTF_RDWR))
678 return NULL;
679
47d546f4
NA
680 if ((fp->ctf_flags & LCTF_CHILD) && LCTF_TYPE_ISPARENT (fp, id))
681 fp = fp->ctf_parent;
682
683 idx = LCTF_TYPE_TO_INDEX(fp, id);
684
676c3ecb 685 if ((unsigned long) idx <= fp->ctf_typemax)
47d546f4
NA
686 return ctf_dtd_lookup (fp, id);
687 return NULL;
688}
689
24865428 690int
47d546f4
NA
691ctf_dvd_insert (ctf_file_t *fp, ctf_dvdef_t *dvd)
692{
24865428
NA
693 if (ctf_dynhash_insert (fp->ctf_dvhash, dvd->dvd_name, dvd) < 0)
694 return -1;
47d546f4 695 ctf_list_append (&fp->ctf_dvdefs, dvd);
24865428 696 return 0;
47d546f4
NA
697}
698
699void
700ctf_dvd_delete (ctf_file_t *fp, ctf_dvdef_t *dvd)
701{
702 ctf_dynhash_remove (fp->ctf_dvhash, dvd->dvd_name);
de07e349 703 free (dvd->dvd_name);
47d546f4
NA
704
705 ctf_list_delete (&fp->ctf_dvdefs, dvd);
de07e349 706 free (dvd);
47d546f4
NA
707}
708
709ctf_dvdef_t *
710ctf_dvd_lookup (const ctf_file_t *fp, const char *name)
711{
712 return (ctf_dvdef_t *) ctf_dynhash_lookup (fp->ctf_dvhash, name);
713}
714
715/* Discard all of the dynamic type definitions and variable definitions that
716 have been added to the container since the last call to ctf_update(). We
717 locate such types by scanning the dtd list and deleting elements that have
718 type IDs greater than ctf_dtoldid, which is set by ctf_update(), above, and
719 by scanning the variable list and deleting elements that have update IDs
720 equal to the current value of the last-update snapshot count (indicating that
721 they were added after the most recent call to ctf_update()). */
722int
723ctf_discard (ctf_file_t *fp)
724{
725 ctf_snapshot_id_t last_update =
726 { fp->ctf_dtoldid,
727 fp->ctf_snapshot_lu + 1 };
728
729 /* Update required? */
730 if (!(fp->ctf_flags & LCTF_DIRTY))
731 return 0;
732
733 return (ctf_rollback (fp, last_update));
734}
735
736ctf_snapshot_id_t
737ctf_snapshot (ctf_file_t *fp)
738{
739 ctf_snapshot_id_t snapid;
676c3ecb 740 snapid.dtd_id = fp->ctf_typemax;
47d546f4
NA
741 snapid.snapshot_id = fp->ctf_snapshots++;
742 return snapid;
743}
744
745/* Like ctf_discard(), only discards everything after a particular ID. */
746int
747ctf_rollback (ctf_file_t *fp, ctf_snapshot_id_t id)
748{
749 ctf_dtdef_t *dtd, *ntd;
750 ctf_dvdef_t *dvd, *nvd;
751
752 if (!(fp->ctf_flags & LCTF_RDWR))
753 return (ctf_set_errno (fp, ECTF_RDONLY));
754
47d546f4
NA
755 if (fp->ctf_snapshot_lu >= id.snapshot_id)
756 return (ctf_set_errno (fp, ECTF_OVERROLLBACK));
757
758 for (dtd = ctf_list_next (&fp->ctf_dtdefs); dtd != NULL; dtd = ntd)
759 {
676c3ecb
NA
760 int kind;
761 const char *name;
762
47d546f4
NA
763 ntd = ctf_list_next (dtd);
764
765 if (LCTF_TYPE_TO_INDEX (fp, dtd->dtd_type) <= id.dtd_id)
766 continue;
767
676c3ecb 768 kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
8ffcdf18
NA
769 if (kind == CTF_K_FORWARD)
770 kind = dtd->dtd_data.ctt_type;
676c3ecb
NA
771
772 if (dtd->dtd_data.ctt_name
fe4c2d55
NA
773 && (name = ctf_strraw (fp, dtd->dtd_data.ctt_name)) != NULL
774 && LCTF_INFO_ISROOT (fp, dtd->dtd_data.ctt_info))
676c3ecb
NA
775 {
776 ctf_dynhash_remove (ctf_name_table (fp, kind)->ctn_writable,
777 name);
778 ctf_str_remove_ref (fp, name, &dtd->dtd_data.ctt_name);
779 }
780
781 ctf_dynhash_remove (fp->ctf_dthash, (void *) dtd->dtd_type);
47d546f4
NA
782 ctf_dtd_delete (fp, dtd);
783 }
784
785 for (dvd = ctf_list_next (&fp->ctf_dvdefs); dvd != NULL; dvd = nvd)
786 {
787 nvd = ctf_list_next (dvd);
788
789 if (dvd->dvd_snapshots <= id.snapshot_id)
790 continue;
791
792 ctf_dvd_delete (fp, dvd);
793 }
794
676c3ecb 795 fp->ctf_typemax = id.dtd_id;
47d546f4
NA
796 fp->ctf_snapshots = id.snapshot_id;
797
798 if (fp->ctf_snapshots == fp->ctf_snapshot_lu)
799 fp->ctf_flags &= ~LCTF_DIRTY;
800
801 return 0;
802}
803
804static ctf_id_t
676c3ecb 805ctf_add_generic (ctf_file_t *fp, uint32_t flag, const char *name, int kind,
47d546f4
NA
806 ctf_dtdef_t **rp)
807{
808 ctf_dtdef_t *dtd;
809 ctf_id_t type;
47d546f4
NA
810
811 if (flag != CTF_ADD_NONROOT && flag != CTF_ADD_ROOT)
812 return (ctf_set_errno (fp, EINVAL));
813
814 if (!(fp->ctf_flags & LCTF_RDWR))
815 return (ctf_set_errno (fp, ECTF_RDONLY));
816
676c3ecb 817 if (LCTF_INDEX_TO_TYPE (fp, fp->ctf_typemax, 1) >= CTF_MAX_TYPE)
47d546f4
NA
818 return (ctf_set_errno (fp, ECTF_FULL));
819
676c3ecb 820 if (LCTF_INDEX_TO_TYPE (fp, fp->ctf_typemax, 1) == (CTF_MAX_PTYPE - 1))
47d546f4
NA
821 return (ctf_set_errno (fp, ECTF_FULL));
822
676c3ecb
NA
823 /* Make sure ptrtab always grows to be big enough for all types. */
824 if (ctf_grow_ptrtab (fp) < 0)
825 return CTF_ERR; /* errno is set for us. */
826
de07e349 827 if ((dtd = malloc (sizeof (ctf_dtdef_t))) == NULL)
47d546f4
NA
828 return (ctf_set_errno (fp, EAGAIN));
829
676c3ecb 830 type = ++fp->ctf_typemax;
47d546f4
NA
831 type = LCTF_INDEX_TO_TYPE (fp, type, (fp->ctf_flags & LCTF_CHILD));
832
833 memset (dtd, 0, sizeof (ctf_dtdef_t));
676c3ecb 834 dtd->dtd_data.ctt_name = ctf_str_add_ref (fp, name, &dtd->dtd_data.ctt_name);
47d546f4
NA
835 dtd->dtd_type = type;
836
676c3ecb
NA
837 if (dtd->dtd_data.ctt_name == 0 && name != NULL && name[0] != '\0')
838 {
de07e349 839 free (dtd);
676c3ecb
NA
840 return (ctf_set_errno (fp, EAGAIN));
841 }
842
fe4c2d55 843 if (ctf_dtd_insert (fp, dtd, flag, kind) < 0)
24865428 844 {
de07e349 845 free (dtd);
24865428
NA
846 return CTF_ERR; /* errno is set for us. */
847 }
47d546f4
NA
848 fp->ctf_flags |= LCTF_DIRTY;
849
850 *rp = dtd;
851 return type;
852}
853
854/* When encoding integer sizes, we want to convert a byte count in the range
855 1-8 to the closest power of 2 (e.g. 3->4, 5->8, etc). The clp2() function
856 is a clever implementation from "Hacker's Delight" by Henry Warren, Jr. */
857static size_t
858clp2 (size_t x)
859{
860 x--;
861
862 x |= (x >> 1);
863 x |= (x >> 2);
864 x |= (x >> 4);
865 x |= (x >> 8);
866 x |= (x >> 16);
867
868 return (x + 1);
869}
870
871static ctf_id_t
872ctf_add_encoded (ctf_file_t *fp, uint32_t flag,
873 const char *name, const ctf_encoding_t *ep, uint32_t kind)
874{
875 ctf_dtdef_t *dtd;
876 ctf_id_t type;
877
878 if (ep == NULL)
879 return (ctf_set_errno (fp, EINVAL));
880
676c3ecb 881 if ((type = ctf_add_generic (fp, flag, name, kind, &dtd)) == CTF_ERR)
47d546f4
NA
882 return CTF_ERR; /* errno is set for us. */
883
884 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (kind, flag, 0);
76fad999
TT
885 dtd->dtd_data.ctt_size = clp2 (P2ROUNDUP (ep->cte_bits, CHAR_BIT)
886 / CHAR_BIT);
47d546f4
NA
887 dtd->dtd_u.dtu_enc = *ep;
888
889 return type;
890}
891
892static ctf_id_t
893ctf_add_reftype (ctf_file_t *fp, uint32_t flag, ctf_id_t ref, uint32_t kind)
894{
895 ctf_dtdef_t *dtd;
896 ctf_id_t type;
897 ctf_file_t *tmp = fp;
676c3ecb 898 int child = fp->ctf_flags & LCTF_CHILD;
47d546f4 899
a0486bac 900 if (ref == CTF_ERR || ref > CTF_MAX_TYPE)
47d546f4
NA
901 return (ctf_set_errno (fp, EINVAL));
902
2361f1c8 903 if (ref != 0 && ctf_lookup_by_id (&tmp, ref) == NULL)
47d546f4
NA
904 return CTF_ERR; /* errno is set for us. */
905
676c3ecb 906 if ((type = ctf_add_generic (fp, flag, NULL, kind, &dtd)) == CTF_ERR)
47d546f4
NA
907 return CTF_ERR; /* errno is set for us. */
908
909 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (kind, flag, 0);
910 dtd->dtd_data.ctt_type = (uint32_t) ref;
911
676c3ecb
NA
912 if (kind != CTF_K_POINTER)
913 return type;
914
915 /* If we are adding a pointer, update the ptrtab, both the directly pointed-to
916 type and (if an anonymous typedef node is being pointed at) the type that
917 points at too. Note that ctf_typemax is at this point one higher than we
918 want to check against, because it's just been incremented for the addition
919 of this type. */
920
921 uint32_t type_idx = LCTF_TYPE_TO_INDEX (fp, type);
922 uint32_t ref_idx = LCTF_TYPE_TO_INDEX (fp, ref);
923
924 if (LCTF_TYPE_ISCHILD (fp, ref) == child
925 && ref_idx < fp->ctf_typemax)
926 {
927 fp->ctf_ptrtab[ref_idx] = type_idx;
928
929 ctf_id_t refref_idx = LCTF_TYPE_TO_INDEX (fp, dtd->dtd_data.ctt_type);
930
931 if (tmp == fp
932 && (LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info) == CTF_K_TYPEDEF)
933 && strcmp (ctf_strptr (fp, dtd->dtd_data.ctt_name), "") == 0
934 && refref_idx < fp->ctf_typemax)
935 fp->ctf_ptrtab[refref_idx] = type_idx;
936 }
937
47d546f4
NA
938 return type;
939}
940
941ctf_id_t
942ctf_add_slice (ctf_file_t *fp, uint32_t flag, ctf_id_t ref,
943 const ctf_encoding_t *ep)
944{
945 ctf_dtdef_t *dtd;
946 ctf_id_t type;
947 int kind;
948 const ctf_type_t *tp;
949 ctf_file_t *tmp = fp;
950
951 if (ep == NULL)
952 return (ctf_set_errno (fp, EINVAL));
953
954 if ((ep->cte_bits > 255) || (ep->cte_offset > 255))
955 return (ctf_set_errno (fp, ECTF_SLICEOVERFLOW));
956
a0486bac 957 if (ref == CTF_ERR || ref > CTF_MAX_TYPE)
47d546f4
NA
958 return (ctf_set_errno (fp, EINVAL));
959
2361f1c8 960 if (ref != 0 && ((tp = ctf_lookup_by_id (&tmp, ref)) == NULL))
47d546f4
NA
961 return CTF_ERR; /* errno is set for us. */
962
963 kind = ctf_type_kind_unsliced (tmp, ref);
964 if ((kind != CTF_K_INTEGER) && (kind != CTF_K_FLOAT) &&
2361f1c8
NA
965 (kind != CTF_K_ENUM)
966 && (ref != 0))
47d546f4
NA
967 return (ctf_set_errno (fp, ECTF_NOTINTFP));
968
676c3ecb 969 if ((type = ctf_add_generic (fp, flag, NULL, CTF_K_SLICE, &dtd)) == CTF_ERR)
47d546f4
NA
970 return CTF_ERR; /* errno is set for us. */
971
972 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_SLICE, flag, 0);
76fad999
TT
973 dtd->dtd_data.ctt_size = clp2 (P2ROUNDUP (ep->cte_bits, CHAR_BIT)
974 / CHAR_BIT);
9943fa3a 975 dtd->dtd_u.dtu_slice.cts_type = (uint32_t) ref;
47d546f4
NA
976 dtd->dtd_u.dtu_slice.cts_bits = ep->cte_bits;
977 dtd->dtd_u.dtu_slice.cts_offset = ep->cte_offset;
978
979 return type;
980}
981
982ctf_id_t
983ctf_add_integer (ctf_file_t *fp, uint32_t flag,
984 const char *name, const ctf_encoding_t *ep)
985{
986 return (ctf_add_encoded (fp, flag, name, ep, CTF_K_INTEGER));
987}
988
989ctf_id_t
990ctf_add_float (ctf_file_t *fp, uint32_t flag,
991 const char *name, const ctf_encoding_t *ep)
992{
993 return (ctf_add_encoded (fp, flag, name, ep, CTF_K_FLOAT));
994}
995
996ctf_id_t
997ctf_add_pointer (ctf_file_t *fp, uint32_t flag, ctf_id_t ref)
998{
999 return (ctf_add_reftype (fp, flag, ref, CTF_K_POINTER));
1000}
1001
1002ctf_id_t
1003ctf_add_array (ctf_file_t *fp, uint32_t flag, const ctf_arinfo_t *arp)
1004{
1005 ctf_dtdef_t *dtd;
1006 ctf_id_t type;
1007 ctf_file_t *tmp = fp;
1008
1009 if (arp == NULL)
1010 return (ctf_set_errno (fp, EINVAL));
1011
2361f1c8
NA
1012 if (arp->ctr_contents != 0
1013 && ctf_lookup_by_id (&tmp, arp->ctr_contents) == NULL)
47d546f4
NA
1014 return CTF_ERR; /* errno is set for us. */
1015
1016 tmp = fp;
1017 if (ctf_lookup_by_id (&tmp, arp->ctr_index) == NULL)
1018 return CTF_ERR; /* errno is set for us. */
1019
676c3ecb 1020 if ((type = ctf_add_generic (fp, flag, NULL, CTF_K_ARRAY, &dtd)) == CTF_ERR)
47d546f4
NA
1021 return CTF_ERR; /* errno is set for us. */
1022
1023 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_ARRAY, flag, 0);
1024 dtd->dtd_data.ctt_size = 0;
1025 dtd->dtd_u.dtu_arr = *arp;
1026
1027 return type;
1028}
1029
1030int
1031ctf_set_array (ctf_file_t *fp, ctf_id_t type, const ctf_arinfo_t *arp)
1032{
1033 ctf_dtdef_t *dtd = ctf_dtd_lookup (fp, type);
1034
1035 if (!(fp->ctf_flags & LCTF_RDWR))
1036 return (ctf_set_errno (fp, ECTF_RDONLY));
1037
1038 if (dtd == NULL
1039 || LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info) != CTF_K_ARRAY)
1040 return (ctf_set_errno (fp, ECTF_BADID));
1041
1042 fp->ctf_flags |= LCTF_DIRTY;
1043 dtd->dtd_u.dtu_arr = *arp;
1044
1045 return 0;
1046}
1047
1048ctf_id_t
1049ctf_add_function (ctf_file_t *fp, uint32_t flag,
1050 const ctf_funcinfo_t *ctc, const ctf_id_t *argv)
1051{
1052 ctf_dtdef_t *dtd;
1053 ctf_id_t type;
1054 uint32_t vlen;
afd78bd6 1055 uint32_t *vdat = NULL;
47d546f4
NA
1056 ctf_file_t *tmp = fp;
1057 size_t i;
1058
1059 if (ctc == NULL || (ctc->ctc_flags & ~CTF_FUNC_VARARG) != 0
1060 || (ctc->ctc_argc != 0 && argv == NULL))
1061 return (ctf_set_errno (fp, EINVAL));
1062
1063 vlen = ctc->ctc_argc;
1064 if (ctc->ctc_flags & CTF_FUNC_VARARG)
1065 vlen++; /* Add trailing zero to indicate varargs (see below). */
1066
2361f1c8
NA
1067 if (ctc->ctc_return != 0
1068 && ctf_lookup_by_id (&tmp, ctc->ctc_return) == NULL)
47d546f4
NA
1069 return CTF_ERR; /* errno is set for us. */
1070
47d546f4
NA
1071 if (vlen > CTF_MAX_VLEN)
1072 return (ctf_set_errno (fp, EOVERFLOW));
1073
de07e349 1074 if (vlen != 0 && (vdat = malloc (sizeof (ctf_id_t) * vlen)) == NULL)
47d546f4
NA
1075 return (ctf_set_errno (fp, EAGAIN));
1076
afd78bd6
NA
1077 for (i = 0; i < ctc->ctc_argc; i++)
1078 {
1079 tmp = fp;
1080 if (argv[i] != 0 && ctf_lookup_by_id (&tmp, argv[i]) == NULL)
1081 {
1082 free (vdat);
1083 return CTF_ERR; /* errno is set for us. */
1084 }
1085 vdat[i] = (uint32_t) argv[i];
1086 }
1087
676c3ecb
NA
1088 if ((type = ctf_add_generic (fp, flag, NULL, CTF_K_FUNCTION,
1089 &dtd)) == CTF_ERR)
47d546f4 1090 {
de07e349 1091 free (vdat);
47d546f4
NA
1092 return CTF_ERR; /* errno is set for us. */
1093 }
1094
1095 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_FUNCTION, flag, vlen);
1096 dtd->dtd_data.ctt_type = (uint32_t) ctc->ctc_return;
1097
47d546f4
NA
1098 if (ctc->ctc_flags & CTF_FUNC_VARARG)
1099 vdat[vlen - 1] = 0; /* Add trailing zero to indicate varargs. */
1100 dtd->dtd_u.dtu_argv = vdat;
1101
1102 return type;
1103}
1104
1105ctf_id_t
1106ctf_add_struct_sized (ctf_file_t *fp, uint32_t flag, const char *name,
1107 size_t size)
1108{
47d546f4
NA
1109 ctf_dtdef_t *dtd;
1110 ctf_id_t type = 0;
1111
fe4c2d55 1112 /* Promote root-visible forwards to structs. */
47d546f4 1113 if (name != NULL)
676c3ecb 1114 type = ctf_lookup_by_rawname (fp, CTF_K_STRUCT, name);
47d546f4
NA
1115
1116 if (type != 0 && ctf_type_kind (fp, type) == CTF_K_FORWARD)
1117 dtd = ctf_dtd_lookup (fp, type);
676c3ecb
NA
1118 else if ((type = ctf_add_generic (fp, flag, name, CTF_K_STRUCT,
1119 &dtd)) == CTF_ERR)
47d546f4
NA
1120 return CTF_ERR; /* errno is set for us. */
1121
1122 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_STRUCT, flag, 0);
1123
1124 if (size > CTF_MAX_SIZE)
1125 {
1126 dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1127 dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI (size);
1128 dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO (size);
1129 }
1130 else
1131 dtd->dtd_data.ctt_size = (uint32_t) size;
1132
1133 return type;
1134}
1135
1136ctf_id_t
1137ctf_add_struct (ctf_file_t *fp, uint32_t flag, const char *name)
1138{
1139 return (ctf_add_struct_sized (fp, flag, name, 0));
1140}
1141
1142ctf_id_t
1143ctf_add_union_sized (ctf_file_t *fp, uint32_t flag, const char *name,
1144 size_t size)
1145{
47d546f4
NA
1146 ctf_dtdef_t *dtd;
1147 ctf_id_t type = 0;
1148
fe4c2d55 1149 /* Promote root-visible forwards to unions. */
47d546f4 1150 if (name != NULL)
676c3ecb 1151 type = ctf_lookup_by_rawname (fp, CTF_K_UNION, name);
47d546f4
NA
1152
1153 if (type != 0 && ctf_type_kind (fp, type) == CTF_K_FORWARD)
1154 dtd = ctf_dtd_lookup (fp, type);
676c3ecb
NA
1155 else if ((type = ctf_add_generic (fp, flag, name, CTF_K_UNION,
1156 &dtd)) == CTF_ERR)
47d546f4
NA
1157 return CTF_ERR; /* errno is set for us */
1158
1159 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_UNION, flag, 0);
1160
1161 if (size > CTF_MAX_SIZE)
1162 {
1163 dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1164 dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI (size);
1165 dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO (size);
1166 }
1167 else
1168 dtd->dtd_data.ctt_size = (uint32_t) size;
1169
1170 return type;
1171}
1172
1173ctf_id_t
1174ctf_add_union (ctf_file_t *fp, uint32_t flag, const char *name)
1175{
1176 return (ctf_add_union_sized (fp, flag, name, 0));
1177}
1178
1179ctf_id_t
1180ctf_add_enum (ctf_file_t *fp, uint32_t flag, const char *name)
1181{
47d546f4
NA
1182 ctf_dtdef_t *dtd;
1183 ctf_id_t type = 0;
1184
fe4c2d55 1185 /* Promote root-visible forwards to enums. */
47d546f4 1186 if (name != NULL)
676c3ecb 1187 type = ctf_lookup_by_rawname (fp, CTF_K_ENUM, name);
47d546f4
NA
1188
1189 if (type != 0 && ctf_type_kind (fp, type) == CTF_K_FORWARD)
1190 dtd = ctf_dtd_lookup (fp, type);
676c3ecb
NA
1191 else if ((type = ctf_add_generic (fp, flag, name, CTF_K_ENUM,
1192 &dtd)) == CTF_ERR)
47d546f4
NA
1193 return CTF_ERR; /* errno is set for us. */
1194
1195 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_ENUM, flag, 0);
1196 dtd->dtd_data.ctt_size = fp->ctf_dmodel->ctd_int;
1197
1198 return type;
1199}
1200
1201ctf_id_t
1202ctf_add_enum_encoded (ctf_file_t *fp, uint32_t flag, const char *name,
1203 const ctf_encoding_t *ep)
1204{
47d546f4
NA
1205 ctf_id_t type = 0;
1206
1207 /* First, create the enum if need be, using most of the same machinery as
1208 ctf_add_enum(), to ensure that we do not allow things past that are not
1209 enums or forwards to them. (This includes other slices: you cannot slice a
1210 slice, which would be a useless thing to do anyway.) */
1211
1212 if (name != NULL)
676c3ecb 1213 type = ctf_lookup_by_rawname (fp, CTF_K_ENUM, name);
47d546f4
NA
1214
1215 if (type != 0)
1216 {
1217 if ((ctf_type_kind (fp, type) != CTF_K_FORWARD) &&
1218 (ctf_type_kind_unsliced (fp, type) != CTF_K_ENUM))
1219 return (ctf_set_errno (fp, ECTF_NOTINTFP));
1220 }
1221 else if ((type = ctf_add_enum (fp, flag, name)) == CTF_ERR)
1222 return CTF_ERR; /* errno is set for us. */
1223
1224 /* Now attach a suitable slice to it. */
1225
1226 return ctf_add_slice (fp, flag, type, ep);
1227}
1228
1229ctf_id_t
1230ctf_add_forward (ctf_file_t *fp, uint32_t flag, const char *name,
1231 uint32_t kind)
1232{
47d546f4
NA
1233 ctf_dtdef_t *dtd;
1234 ctf_id_t type = 0;
1235
676c3ecb
NA
1236 if (kind != CTF_K_STRUCT && kind != CTF_K_UNION && kind != CTF_K_ENUM)
1237 return (ctf_set_errno (fp, ECTF_NOTSUE));
47d546f4
NA
1238
1239 /* If the type is already defined or exists as a forward tag, just
1240 return the ctf_id_t of the existing definition. */
1241
1242 if (name != NULL)
676c3ecb 1243 type = ctf_lookup_by_rawname (fp, kind, name);
47d546f4 1244
6bbf9da8
NA
1245 if (type)
1246 return type;
1247
8ffcdf18 1248 if ((type = ctf_add_generic (fp, flag, name, kind, &dtd)) == CTF_ERR)
47d546f4
NA
1249 return CTF_ERR; /* errno is set for us. */
1250
1251 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_FORWARD, flag, 0);
1252 dtd->dtd_data.ctt_type = kind;
1253
1254 return type;
1255}
1256
1257ctf_id_t
1258ctf_add_typedef (ctf_file_t *fp, uint32_t flag, const char *name,
1259 ctf_id_t ref)
1260{
1261 ctf_dtdef_t *dtd;
1262 ctf_id_t type;
1263 ctf_file_t *tmp = fp;
1264
a0486bac 1265 if (ref == CTF_ERR || ref > CTF_MAX_TYPE)
47d546f4
NA
1266 return (ctf_set_errno (fp, EINVAL));
1267
2361f1c8 1268 if (ref != 0 && ctf_lookup_by_id (&tmp, ref) == NULL)
47d546f4
NA
1269 return CTF_ERR; /* errno is set for us. */
1270
676c3ecb
NA
1271 if ((type = ctf_add_generic (fp, flag, name, CTF_K_TYPEDEF,
1272 &dtd)) == CTF_ERR)
47d546f4
NA
1273 return CTF_ERR; /* errno is set for us. */
1274
1275 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (CTF_K_TYPEDEF, flag, 0);
1276 dtd->dtd_data.ctt_type = (uint32_t) ref;
1277
1278 return type;
1279}
1280
1281ctf_id_t
1282ctf_add_volatile (ctf_file_t *fp, uint32_t flag, ctf_id_t ref)
1283{
1284 return (ctf_add_reftype (fp, flag, ref, CTF_K_VOLATILE));
1285}
1286
1287ctf_id_t
1288ctf_add_const (ctf_file_t *fp, uint32_t flag, ctf_id_t ref)
1289{
1290 return (ctf_add_reftype (fp, flag, ref, CTF_K_CONST));
1291}
1292
1293ctf_id_t
1294ctf_add_restrict (ctf_file_t *fp, uint32_t flag, ctf_id_t ref)
1295{
1296 return (ctf_add_reftype (fp, flag, ref, CTF_K_RESTRICT));
1297}
1298
1299int
1300ctf_add_enumerator (ctf_file_t *fp, ctf_id_t enid, const char *name,
1301 int value)
1302{
1303 ctf_dtdef_t *dtd = ctf_dtd_lookup (fp, enid);
1304 ctf_dmdef_t *dmd;
1305
1306 uint32_t kind, vlen, root;
1307 char *s;
1308
1309 if (name == NULL)
1310 return (ctf_set_errno (fp, EINVAL));
1311
1312 if (!(fp->ctf_flags & LCTF_RDWR))
1313 return (ctf_set_errno (fp, ECTF_RDONLY));
1314
1315 if (dtd == NULL)
1316 return (ctf_set_errno (fp, ECTF_BADID));
1317
1318 kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
1319 root = LCTF_INFO_ISROOT (fp, dtd->dtd_data.ctt_info);
1320 vlen = LCTF_INFO_VLEN (fp, dtd->dtd_data.ctt_info);
1321
1322 if (kind != CTF_K_ENUM)
1323 return (ctf_set_errno (fp, ECTF_NOTENUM));
1324
1325 if (vlen == CTF_MAX_VLEN)
1326 return (ctf_set_errno (fp, ECTF_DTFULL));
1327
1328 for (dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
1329 dmd != NULL; dmd = ctf_list_next (dmd))
1330 {
1331 if (strcmp (dmd->dmd_name, name) == 0)
1332 return (ctf_set_errno (fp, ECTF_DUPLICATE));
1333 }
1334
de07e349 1335 if ((dmd = malloc (sizeof (ctf_dmdef_t))) == NULL)
47d546f4
NA
1336 return (ctf_set_errno (fp, EAGAIN));
1337
de07e349 1338 if ((s = strdup (name)) == NULL)
47d546f4 1339 {
de07e349 1340 free (dmd);
47d546f4
NA
1341 return (ctf_set_errno (fp, EAGAIN));
1342 }
1343
1344 dmd->dmd_name = s;
1345 dmd->dmd_type = CTF_ERR;
1346 dmd->dmd_offset = 0;
1347 dmd->dmd_value = value;
1348
1349 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (kind, root, vlen + 1);
1350 ctf_list_append (&dtd->dtd_u.dtu_members, dmd);
1351
47d546f4
NA
1352 fp->ctf_flags |= LCTF_DIRTY;
1353
1354 return 0;
1355}
1356
1357int
1358ctf_add_member_offset (ctf_file_t *fp, ctf_id_t souid, const char *name,
1359 ctf_id_t type, unsigned long bit_offset)
1360{
1361 ctf_dtdef_t *dtd = ctf_dtd_lookup (fp, souid);
1362 ctf_dmdef_t *dmd;
1363
1364 ssize_t msize, malign, ssize;
1365 uint32_t kind, vlen, root;
1366 char *s = NULL;
1367
1368 if (!(fp->ctf_flags & LCTF_RDWR))
1369 return (ctf_set_errno (fp, ECTF_RDONLY));
1370
1371 if (dtd == NULL)
1372 return (ctf_set_errno (fp, ECTF_BADID));
1373
1374 kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
1375 root = LCTF_INFO_ISROOT (fp, dtd->dtd_data.ctt_info);
1376 vlen = LCTF_INFO_VLEN (fp, dtd->dtd_data.ctt_info);
1377
1378 if (kind != CTF_K_STRUCT && kind != CTF_K_UNION)
1379 return (ctf_set_errno (fp, ECTF_NOTSOU));
1380
1381 if (vlen == CTF_MAX_VLEN)
1382 return (ctf_set_errno (fp, ECTF_DTFULL));
1383
1384 if (name != NULL)
1385 {
1386 for (dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
1387 dmd != NULL; dmd = ctf_list_next (dmd))
1388 {
1389 if (dmd->dmd_name != NULL && strcmp (dmd->dmd_name, name) == 0)
1390 return (ctf_set_errno (fp, ECTF_DUPLICATE));
1391 }
1392 }
1393
a0486bac
JM
1394 if ((msize = ctf_type_size (fp, type)) < 0 ||
1395 (malign = ctf_type_align (fp, type)) < 0)
2361f1c8
NA
1396 {
1397 /* The unimplemented type, and any type that resolves to it, has no size
1398 and no alignment: it can correspond to any number of compiler-inserted
1399 types. */
1400
1401 if (ctf_errno (fp) == ECTF_NONREPRESENTABLE)
1402 {
1403 msize = 0;
1404 malign = 0;
1405 ctf_set_errno (fp, 0);
1406 }
1407 else
1408 return -1; /* errno is set for us. */
1409 }
47d546f4 1410
de07e349 1411 if ((dmd = malloc (sizeof (ctf_dmdef_t))) == NULL)
47d546f4
NA
1412 return (ctf_set_errno (fp, EAGAIN));
1413
de07e349 1414 if (name != NULL && (s = strdup (name)) == NULL)
47d546f4 1415 {
de07e349 1416 free (dmd);
47d546f4
NA
1417 return (ctf_set_errno (fp, EAGAIN));
1418 }
1419
1420 dmd->dmd_name = s;
1421 dmd->dmd_type = type;
1422 dmd->dmd_value = -1;
1423
1424 if (kind == CTF_K_STRUCT && vlen != 0)
1425 {
1426 if (bit_offset == (unsigned long) - 1)
1427 {
1428 /* Natural alignment. */
1429
1430 ctf_dmdef_t *lmd = ctf_list_prev (&dtd->dtd_u.dtu_members);
1431 ctf_id_t ltype = ctf_type_resolve (fp, lmd->dmd_type);
1432 size_t off = lmd->dmd_offset;
1433
1434 ctf_encoding_t linfo;
1435 ssize_t lsize;
1436
2361f1c8
NA
1437 /* Propagate any error from ctf_type_resolve. If the last member was
1438 of unimplemented type, this may be -ECTF_NONREPRESENTABLE: we
1439 cannot insert right after such a member without explicit offset
1440 specification, because its alignment and size is not known. */
1441 if (ltype == CTF_ERR)
1442 {
1443 free (dmd);
1444 return -1; /* errno is set for us. */
1445 }
1446
a0486bac 1447 if (ctf_type_encoding (fp, ltype, &linfo) == 0)
47d546f4 1448 off += linfo.cte_bits;
a0486bac 1449 else if ((lsize = ctf_type_size (fp, ltype)) > 0)
76fad999 1450 off += lsize * CHAR_BIT;
47d546f4
NA
1451
1452 /* Round up the offset of the end of the last member to
1453 the next byte boundary, convert 'off' to bytes, and
1454 then round it up again to the next multiple of the
1455 alignment required by the new member. Finally,
1456 convert back to bits and store the result in
1457 dmd_offset. Technically we could do more efficient
1458 packing if the new member is a bit-field, but we're
1459 the "compiler" and ANSI says we can do as we choose. */
1460
76fad999 1461 off = roundup (off, CHAR_BIT) / CHAR_BIT;
47d546f4 1462 off = roundup (off, MAX (malign, 1));
76fad999 1463 dmd->dmd_offset = off * CHAR_BIT;
47d546f4
NA
1464 ssize = off + msize;
1465 }
1466 else
1467 {
1468 /* Specified offset in bits. */
1469
1470 dmd->dmd_offset = bit_offset;
1471 ssize = ctf_get_ctt_size (fp, &dtd->dtd_data, NULL, NULL);
76fad999 1472 ssize = MAX (ssize, ((signed) bit_offset / CHAR_BIT) + msize);
47d546f4
NA
1473 }
1474 }
1475 else
1476 {
1477 dmd->dmd_offset = 0;
1478 ssize = ctf_get_ctt_size (fp, &dtd->dtd_data, NULL, NULL);
1479 ssize = MAX (ssize, msize);
1480 }
1481
a0486bac 1482 if ((size_t) ssize > CTF_MAX_SIZE)
47d546f4
NA
1483 {
1484 dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1485 dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI (ssize);
1486 dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO (ssize);
1487 }
1488 else
1489 dtd->dtd_data.ctt_size = (uint32_t) ssize;
1490
1491 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (kind, root, vlen + 1);
1492 ctf_list_append (&dtd->dtd_u.dtu_members, dmd);
1493
47d546f4
NA
1494 fp->ctf_flags |= LCTF_DIRTY;
1495 return 0;
1496}
1497
1498int
1499ctf_add_member_encoded (ctf_file_t *fp, ctf_id_t souid, const char *name,
1500 ctf_id_t type, unsigned long bit_offset,
1501 const ctf_encoding_t encoding)
1502{
1503 ctf_dtdef_t *dtd = ctf_dtd_lookup (fp, type);
1504 int kind = LCTF_INFO_KIND (fp, dtd->dtd_data.ctt_info);
1505 int otype = type;
1506
1507 if ((kind != CTF_K_INTEGER) && (kind != CTF_K_FLOAT) && (kind != CTF_K_ENUM))
1508 return (ctf_set_errno (fp, ECTF_NOTINTFP));
1509
1510 if ((type = ctf_add_slice (fp, CTF_ADD_NONROOT, otype, &encoding)) == CTF_ERR)
a0486bac 1511 return -1; /* errno is set for us. */
47d546f4
NA
1512
1513 return ctf_add_member_offset (fp, souid, name, type, bit_offset);
1514}
1515
1516int
1517ctf_add_member (ctf_file_t *fp, ctf_id_t souid, const char *name,
1518 ctf_id_t type)
1519{
1520 return ctf_add_member_offset (fp, souid, name, type, (unsigned long) - 1);
1521}
1522
1523int
1524ctf_add_variable (ctf_file_t *fp, const char *name, ctf_id_t ref)
1525{
1526 ctf_dvdef_t *dvd;
1527 ctf_file_t *tmp = fp;
1528
1529 if (!(fp->ctf_flags & LCTF_RDWR))
1530 return (ctf_set_errno (fp, ECTF_RDONLY));
1531
1532 if (ctf_dvd_lookup (fp, name) != NULL)
1533 return (ctf_set_errno (fp, ECTF_DUPLICATE));
1534
1535 if (ctf_lookup_by_id (&tmp, ref) == NULL)
a0486bac 1536 return -1; /* errno is set for us. */
47d546f4 1537
791915db
NA
1538 /* Make sure this type is representable. */
1539 if ((ctf_type_resolve (fp, ref) == CTF_ERR)
1540 && (ctf_errno (fp) == ECTF_NONREPRESENTABLE))
1541 return -1;
1542
de07e349 1543 if ((dvd = malloc (sizeof (ctf_dvdef_t))) == NULL)
47d546f4
NA
1544 return (ctf_set_errno (fp, EAGAIN));
1545
de07e349 1546 if (name != NULL && (dvd->dvd_name = strdup (name)) == NULL)
47d546f4 1547 {
de07e349 1548 free (dvd);
47d546f4
NA
1549 return (ctf_set_errno (fp, EAGAIN));
1550 }
1551 dvd->dvd_type = ref;
1552 dvd->dvd_snapshots = fp->ctf_snapshots;
1553
24865428
NA
1554 if (ctf_dvd_insert (fp, dvd) < 0)
1555 {
de07e349
NA
1556 free (dvd->dvd_name);
1557 free (dvd);
24865428
NA
1558 return -1; /* errno is set for us. */
1559 }
47d546f4 1560
47d546f4
NA
1561 fp->ctf_flags |= LCTF_DIRTY;
1562 return 0;
1563}
1564
c499eb68
NA
1565static int
1566enumcmp (const char *name, int value, void *arg)
1567{
1568 ctf_bundle_t *ctb = arg;
1569 int bvalue;
1570
a0486bac 1571 if (ctf_enum_value (ctb->ctb_file, ctb->ctb_type, name, &bvalue) < 0)
c499eb68 1572 {
99dc3ebd
NA
1573 ctf_dprintf ("Conflict due to member %s iteration error: %s.\n", name,
1574 ctf_errmsg (ctf_errno (ctb->ctb_file)));
c499eb68
NA
1575 return 1;
1576 }
1577 if (value != bvalue)
1578 {
1579 ctf_dprintf ("Conflict due to value change: %i versus %i\n",
1580 value, bvalue);
1581 return 1;
1582 }
1583 return 0;
1584}
1585
1586static int
1587enumadd (const char *name, int value, void *arg)
1588{
1589 ctf_bundle_t *ctb = arg;
1590
1591 return (ctf_add_enumerator (ctb->ctb_file, ctb->ctb_type,
a0486bac 1592 name, value) < 0);
c499eb68
NA
1593}
1594
1595static int
1596membcmp (const char *name, ctf_id_t type _libctf_unused_, unsigned long offset,
1597 void *arg)
1598{
1599 ctf_bundle_t *ctb = arg;
1600 ctf_membinfo_t ctm;
1601
a0486bac 1602 if (ctf_member_info (ctb->ctb_file, ctb->ctb_type, name, &ctm) < 0)
c499eb68 1603 {
99dc3ebd
NA
1604 ctf_dprintf ("Conflict due to member %s iteration error: %s.\n", name,
1605 ctf_errmsg (ctf_errno (ctb->ctb_file)));
c499eb68
NA
1606 return 1;
1607 }
1608 if (ctm.ctm_offset != offset)
1609 {
1610 ctf_dprintf ("Conflict due to member %s offset change: "
1611 "%lx versus %lx\n", name, ctm.ctm_offset, offset);
1612 return 1;
1613 }
1614 return 0;
1615}
1616
1617static int
1618membadd (const char *name, ctf_id_t type, unsigned long offset, void *arg)
1619{
1620 ctf_bundle_t *ctb = arg;
1621 ctf_dmdef_t *dmd;
1622 char *s = NULL;
1623
de07e349 1624 if ((dmd = malloc (sizeof (ctf_dmdef_t))) == NULL)
c499eb68
NA
1625 return (ctf_set_errno (ctb->ctb_file, EAGAIN));
1626
de07e349 1627 if (name != NULL && (s = strdup (name)) == NULL)
c499eb68 1628 {
de07e349 1629 free (dmd);
c499eb68
NA
1630 return (ctf_set_errno (ctb->ctb_file, EAGAIN));
1631 }
1632
1633 /* For now, dmd_type is copied as the src_fp's type; it is reset to an
1634 equivalent dst_fp type by a final loop in ctf_add_type(), below. */
1635 dmd->dmd_name = s;
1636 dmd->dmd_type = type;
1637 dmd->dmd_offset = offset;
1638 dmd->dmd_value = -1;
1639
1640 ctf_list_append (&ctb->ctb_dtd->dtd_u.dtu_members, dmd);
1641
c499eb68
NA
1642 ctb->ctb_file->ctf_flags |= LCTF_DIRTY;
1643 return 0;
1644}
1645
1646/* The ctf_add_type routine is used to copy a type from a source CTF container
1647 to a dynamic destination container. This routine operates recursively by
1648 following the source type's links and embedded member types. If the
1649 destination container already contains a named type which has the same
1650 attributes, then we succeed and return this type but no changes occur. */
99dc3ebd
NA
1651static ctf_id_t
1652ctf_add_type_internal (ctf_file_t *dst_fp, ctf_file_t *src_fp, ctf_id_t src_type,
1653 ctf_file_t *proc_tracking_fp)
c499eb68
NA
1654{
1655 ctf_id_t dst_type = CTF_ERR;
1656 uint32_t dst_kind = CTF_K_UNKNOWN;
99dc3ebd 1657 ctf_file_t *tmp_fp = dst_fp;
c499eb68
NA
1658 ctf_id_t tmp;
1659
1660 const char *name;
5de9eada 1661 uint32_t kind, forward_kind, flag, vlen;
c499eb68
NA
1662
1663 const ctf_type_t *src_tp, *dst_tp;
1664 ctf_bundle_t src, dst;
1665 ctf_encoding_t src_en, dst_en;
1666 ctf_arinfo_t src_ar, dst_ar;
1667
c499eb68 1668 ctf_funcinfo_t ctc;
c499eb68 1669
886453cb 1670 ctf_id_t orig_src_type = src_type;
c499eb68
NA
1671
1672 if (!(dst_fp->ctf_flags & LCTF_RDWR))
1673 return (ctf_set_errno (dst_fp, ECTF_RDONLY));
1674
1675 if ((src_tp = ctf_lookup_by_id (&src_fp, src_type)) == NULL)
1676 return (ctf_set_errno (dst_fp, ctf_errno (src_fp)));
1677
791915db
NA
1678 if ((ctf_type_resolve (src_fp, src_type) == CTF_ERR)
1679 && (ctf_errno (src_fp) == ECTF_NONREPRESENTABLE))
1680 return (ctf_set_errno (dst_fp, ECTF_NONREPRESENTABLE));
1681
c499eb68
NA
1682 name = ctf_strptr (src_fp, src_tp->ctt_name);
1683 kind = LCTF_INFO_KIND (src_fp, src_tp->ctt_info);
1684 flag = LCTF_INFO_ISROOT (src_fp, src_tp->ctt_info);
1685 vlen = LCTF_INFO_VLEN (src_fp, src_tp->ctt_info);
1686
99dc3ebd
NA
1687 /* If this is a type we are currently in the middle of adding, hand it
1688 straight back. (This lets us handle self-referential structures without
1689 considering forwards and empty structures the same as their completed
1690 forms.) */
1691
1692 tmp = ctf_type_mapping (src_fp, src_type, &tmp_fp);
1693
1694 if (tmp != 0)
1695 {
1696 if (ctf_dynhash_lookup (proc_tracking_fp->ctf_add_processing,
1697 (void *) (uintptr_t) src_type))
1698 return tmp;
1699
1700 /* If this type has already been added from this container, and is the same
1701 kind and (if a struct or union) has the same number of members, hand it
1702 straight back. */
1703
d04a47ac 1704 if (ctf_type_kind_unsliced (tmp_fp, tmp) == (int) kind)
99dc3ebd 1705 {
d04a47ac
NA
1706 if (kind == CTF_K_STRUCT || kind == CTF_K_UNION
1707 || kind == CTF_K_ENUM)
1708 {
1709 if ((dst_tp = ctf_lookup_by_id (&tmp_fp, dst_type)) != NULL)
1710 if (vlen == LCTF_INFO_VLEN (tmp_fp, dst_tp->ctt_info))
1711 return tmp;
1712 }
1713 else
1714 return tmp;
99dc3ebd
NA
1715 }
1716 }
1717
5de9eada
NA
1718 forward_kind = kind;
1719 if (kind == CTF_K_FORWARD)
1720 forward_kind = src_tp->ctt_type;
1721
c499eb68
NA
1722 /* If the source type has a name and is a root type (visible at the
1723 top-level scope), lookup the name in the destination container and
1724 verify that it is of the same kind before we do anything else. */
1725
1726 if ((flag & CTF_ADD_ROOT) && name[0] != '\0'
676c3ecb 1727 && (tmp = ctf_lookup_by_rawname (dst_fp, forward_kind, name)) != 0)
c499eb68
NA
1728 {
1729 dst_type = tmp;
1730 dst_kind = ctf_type_kind_unsliced (dst_fp, dst_type);
1731 }
1732
1733 /* If an identically named dst_type exists, fail with ECTF_CONFLICT
1734 unless dst_type is a forward declaration and src_type is a struct,
5de9eada 1735 union, or enum (i.e. the definition of the previous forward decl).
c499eb68 1736
5de9eada
NA
1737 We also allow addition in the opposite order (addition of a forward when a
1738 struct, union, or enum already exists), which is a NOP and returns the
1739 already-present struct, union, or enum. */
1740
1741 if (dst_type != CTF_ERR && dst_kind != kind)
c499eb68 1742 {
5de9eada
NA
1743 if (kind == CTF_K_FORWARD
1744 && (dst_kind == CTF_K_ENUM || dst_kind == CTF_K_STRUCT
1745 || dst_kind == CTF_K_UNION))
1746 {
1747 ctf_add_type_mapping (src_fp, src_type, dst_fp, dst_type);
1748 return dst_type;
1749 }
1750
1751 if (dst_kind != CTF_K_FORWARD
1752 || (kind != CTF_K_ENUM && kind != CTF_K_STRUCT
1753 && kind != CTF_K_UNION))
1754 {
1755 ctf_dprintf ("Conflict for type %s: kinds differ, new: %i; "
1756 "old (ID %lx): %i\n", name, kind, dst_type, dst_kind);
1757 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
1758 }
c499eb68
NA
1759 }
1760
1761 /* We take special action for an integer, float, or slice since it is
1762 described not only by its name but also its encoding. For integers,
1763 bit-fields exploit this degeneracy. */
1764
1765 if (kind == CTF_K_INTEGER || kind == CTF_K_FLOAT || kind == CTF_K_SLICE)
1766 {
1767 if (ctf_type_encoding (src_fp, src_type, &src_en) != 0)
1768 return (ctf_set_errno (dst_fp, ctf_errno (src_fp)));
1769
1770 if (dst_type != CTF_ERR)
1771 {
1772 ctf_file_t *fp = dst_fp;
1773
1774 if ((dst_tp = ctf_lookup_by_id (&fp, dst_type)) == NULL)
1775 return CTF_ERR;
1776
99dc3ebd
NA
1777 if (ctf_type_encoding (dst_fp, dst_type, &dst_en) != 0)
1778 return CTF_ERR; /* errno set for us. */
1779
c499eb68
NA
1780 if (LCTF_INFO_ISROOT (fp, dst_tp->ctt_info) & CTF_ADD_ROOT)
1781 {
1782 /* The type that we found in the hash is also root-visible. If
1783 the two types match then use the existing one; otherwise,
1784 declare a conflict. Note: slices are not certain to match
1785 even if there is no conflict: we must check the contained type
1786 too. */
1787
c499eb68
NA
1788 if (memcmp (&src_en, &dst_en, sizeof (ctf_encoding_t)) == 0)
1789 {
1790 if (kind != CTF_K_SLICE)
886453cb
NA
1791 {
1792 ctf_add_type_mapping (src_fp, src_type, dst_fp, dst_type);
1793 return dst_type;
1794 }
c499eb68
NA
1795 }
1796 else
1797 {
1798 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
1799 }
1800 }
1801 else
1802 {
99dc3ebd
NA
1803 /* We found a non-root-visible type in the hash. If its encoding
1804 is the same, we can reuse it, unless it is a slice. */
c499eb68 1805
99dc3ebd 1806 if (memcmp (&src_en, &dst_en, sizeof (ctf_encoding_t)) == 0)
c499eb68
NA
1807 {
1808 if (kind != CTF_K_SLICE)
886453cb 1809 {
99dc3ebd
NA
1810 ctf_add_type_mapping (src_fp, src_type, dst_fp, dst_type);
1811 return dst_type;
886453cb 1812 }
c499eb68 1813 }
c499eb68
NA
1814 }
1815 }
1816 }
1817
1818 src.ctb_file = src_fp;
1819 src.ctb_type = src_type;
1820 src.ctb_dtd = NULL;
1821
1822 dst.ctb_file = dst_fp;
1823 dst.ctb_type = dst_type;
1824 dst.ctb_dtd = NULL;
1825
99dc3ebd
NA
1826 /* Now perform kind-specific processing. If dst_type is CTF_ERR, then we add
1827 a new type with the same properties as src_type to dst_fp. If dst_type is
1828 not CTF_ERR, then we verify that dst_type has the same attributes as
1829 src_type. We recurse for embedded references. Before we start, we note
1830 that we are processing this type, to prevent infinite recursion: we do not
1831 re-process any type that appears in this list. The list is emptied
1832 wholesale at the end of processing everything in this recursive stack. */
1833
1834 if (ctf_dynhash_insert (proc_tracking_fp->ctf_add_processing,
1835 (void *) (uintptr_t) src_type, (void *) 1) < 0)
1836 return ctf_set_errno (dst_fp, ENOMEM);
1837
c499eb68
NA
1838 switch (kind)
1839 {
1840 case CTF_K_INTEGER:
1841 /* If we found a match we will have either returned it or declared a
1842 conflict. */
1843 dst_type = ctf_add_integer (dst_fp, flag, name, &src_en);
1844 break;
1845
1846 case CTF_K_FLOAT:
1847 /* If we found a match we will have either returned it or declared a
1848 conflict. */
1849 dst_type = ctf_add_float (dst_fp, flag, name, &src_en);
1850 break;
1851
1852 case CTF_K_SLICE:
1853 /* We have checked for conflicting encodings: now try to add the
1854 contained type. */
1855 src_type = ctf_type_reference (src_fp, src_type);
99dc3ebd
NA
1856 src_type = ctf_add_type_internal (dst_fp, src_fp, src_type,
1857 proc_tracking_fp);
c499eb68
NA
1858
1859 if (src_type == CTF_ERR)
1860 return CTF_ERR; /* errno is set for us. */
1861
1862 dst_type = ctf_add_slice (dst_fp, flag, src_type, &src_en);
1863 break;
1864
1865 case CTF_K_POINTER:
1866 case CTF_K_VOLATILE:
1867 case CTF_K_CONST:
1868 case CTF_K_RESTRICT:
1869 src_type = ctf_type_reference (src_fp, src_type);
99dc3ebd
NA
1870 src_type = ctf_add_type_internal (dst_fp, src_fp, src_type,
1871 proc_tracking_fp);
c499eb68
NA
1872
1873 if (src_type == CTF_ERR)
1874 return CTF_ERR; /* errno is set for us. */
1875
1876 dst_type = ctf_add_reftype (dst_fp, flag, src_type, kind);
1877 break;
1878
1879 case CTF_K_ARRAY:
a0486bac 1880 if (ctf_array_info (src_fp, src_type, &src_ar) != 0)
c499eb68
NA
1881 return (ctf_set_errno (dst_fp, ctf_errno (src_fp)));
1882
1883 src_ar.ctr_contents =
99dc3ebd
NA
1884 ctf_add_type_internal (dst_fp, src_fp, src_ar.ctr_contents,
1885 proc_tracking_fp);
1886 src_ar.ctr_index = ctf_add_type_internal (dst_fp, src_fp,
1887 src_ar.ctr_index,
1888 proc_tracking_fp);
c499eb68
NA
1889 src_ar.ctr_nelems = src_ar.ctr_nelems;
1890
1891 if (src_ar.ctr_contents == CTF_ERR || src_ar.ctr_index == CTF_ERR)
1892 return CTF_ERR; /* errno is set for us. */
1893
1894 if (dst_type != CTF_ERR)
1895 {
1896 if (ctf_array_info (dst_fp, dst_type, &dst_ar) != 0)
1897 return CTF_ERR; /* errno is set for us. */
1898
1899 if (memcmp (&src_ar, &dst_ar, sizeof (ctf_arinfo_t)))
1900 {
1901 ctf_dprintf ("Conflict for type %s against ID %lx: "
1902 "array info differs, old %lx/%lx/%x; "
1903 "new: %lx/%lx/%x\n", name, dst_type,
1904 src_ar.ctr_contents, src_ar.ctr_index,
1905 src_ar.ctr_nelems, dst_ar.ctr_contents,
1906 dst_ar.ctr_index, dst_ar.ctr_nelems);
1907 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
1908 }
1909 }
1910 else
1911 dst_type = ctf_add_array (dst_fp, flag, &src_ar);
1912 break;
1913
1914 case CTF_K_FUNCTION:
99dc3ebd
NA
1915 ctc.ctc_return = ctf_add_type_internal (dst_fp, src_fp,
1916 src_tp->ctt_type,
1917 proc_tracking_fp);
c499eb68
NA
1918 ctc.ctc_argc = 0;
1919 ctc.ctc_flags = 0;
1920
1921 if (ctc.ctc_return == CTF_ERR)
1922 return CTF_ERR; /* errno is set for us. */
1923
1924 dst_type = ctf_add_function (dst_fp, flag, &ctc, NULL);
1925 break;
1926
1927 case CTF_K_STRUCT:
1928 case CTF_K_UNION:
1929 {
1930 ctf_dmdef_t *dmd;
1931 int errs = 0;
a0486bac
JM
1932 size_t size;
1933 ssize_t ssize;
99dc3ebd 1934 ctf_dtdef_t *dtd;
c499eb68
NA
1935
1936 /* Technically to match a struct or union we need to check both
1937 ways (src members vs. dst, dst members vs. src) but we make
1938 this more optimal by only checking src vs. dst and comparing
1939 the total size of the structure (which we must do anyway)
1940 which covers the possibility of dst members not in src.
1941 This optimization can be defeated for unions, but is so
1942 pathological as to render it irrelevant for our purposes. */
1943
99dc3ebd
NA
1944 if (dst_type != CTF_ERR && kind != CTF_K_FORWARD
1945 && dst_kind != CTF_K_FORWARD)
c499eb68
NA
1946 {
1947 if (ctf_type_size (src_fp, src_type) !=
1948 ctf_type_size (dst_fp, dst_type))
1949 {
1950 ctf_dprintf ("Conflict for type %s against ID %lx: "
62d8e3b7
NA
1951 "union size differs, old %li, new %li\n",
1952 name, dst_type,
1953 (long) ctf_type_size (src_fp, src_type),
1954 (long) ctf_type_size (dst_fp, dst_type));
c499eb68
NA
1955 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
1956 }
1957
1958 if (ctf_member_iter (src_fp, src_type, membcmp, &dst))
1959 {
1960 ctf_dprintf ("Conflict for type %s against ID %lx: "
1961 "members differ, see above\n", name, dst_type);
1962 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
1963 }
1964
1965 break;
1966 }
1967
1968 /* Unlike the other cases, copying structs and unions is done
1969 manually so as to avoid repeated lookups in ctf_add_member
1970 and to ensure the exact same member offsets as in src_type. */
1971
676c3ecb 1972 dst_type = ctf_add_generic (dst_fp, flag, name, kind, &dtd);
c499eb68
NA
1973 if (dst_type == CTF_ERR)
1974 return CTF_ERR; /* errno is set for us. */
1975
1976 dst.ctb_type = dst_type;
1977 dst.ctb_dtd = dtd;
1978
99dc3ebd
NA
1979 /* Pre-emptively add this struct to the type mapping so that
1980 structures that refer to themselves work. */
1981 ctf_add_type_mapping (src_fp, src_type, dst_fp, dst_type);
1982
c499eb68
NA
1983 if (ctf_member_iter (src_fp, src_type, membadd, &dst) != 0)
1984 errs++; /* Increment errs and fail at bottom of case. */
1985
a0486bac
JM
1986 if ((ssize = ctf_type_size (src_fp, src_type)) < 0)
1987 return CTF_ERR; /* errno is set for us. */
1988
1989 size = (size_t) ssize;
1990 if (size > CTF_MAX_SIZE)
c499eb68
NA
1991 {
1992 dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1993 dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI (size);
1994 dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO (size);
1995 }
1996 else
1997 dtd->dtd_data.ctt_size = (uint32_t) size;
1998
1999 dtd->dtd_data.ctt_info = CTF_TYPE_INFO (kind, flag, vlen);
2000
2001 /* Make a final pass through the members changing each dmd_type (a
2002 src_fp type) to an equivalent type in dst_fp. We pass through all
791915db
NA
2003 members, leaving any that fail set to CTF_ERR, unless they fail
2004 because they are marking a member of type not representable in this
2005 version of CTF, in which case we just want to silently omit them:
2006 no consumer can do anything with them anyway. */
c499eb68
NA
2007 for (dmd = ctf_list_next (&dtd->dtd_u.dtu_members);
2008 dmd != NULL; dmd = ctf_list_next (dmd))
2009 {
99dc3ebd
NA
2010 ctf_file_t *dst = dst_fp;
2011 ctf_id_t memb_type;
2012
2013 memb_type = ctf_type_mapping (src_fp, dmd->dmd_type, &dst);
2014 if (memb_type == 0)
791915db 2015 {
99dc3ebd
NA
2016 if ((dmd->dmd_type =
2017 ctf_add_type_internal (dst_fp, src_fp, dmd->dmd_type,
2018 proc_tracking_fp)) == CTF_ERR)
2019 {
2020 if (ctf_errno (dst_fp) != ECTF_NONREPRESENTABLE)
2021 errs++;
2022 }
791915db 2023 }
99dc3ebd
NA
2024 else
2025 dmd->dmd_type = memb_type;
c499eb68
NA
2026 }
2027
2028 if (errs)
2029 return CTF_ERR; /* errno is set for us. */
2030 break;
2031 }
2032
2033 case CTF_K_ENUM:
99dc3ebd
NA
2034 if (dst_type != CTF_ERR && kind != CTF_K_FORWARD
2035 && dst_kind != CTF_K_FORWARD)
c499eb68
NA
2036 {
2037 if (ctf_enum_iter (src_fp, src_type, enumcmp, &dst)
2038 || ctf_enum_iter (dst_fp, dst_type, enumcmp, &src))
2039 {
2040 ctf_dprintf ("Conflict for enum %s against ID %lx: "
2041 "members differ, see above\n", name, dst_type);
2042 return (ctf_set_errno (dst_fp, ECTF_CONFLICT));
2043 }
2044 }
2045 else
2046 {
2047 dst_type = ctf_add_enum (dst_fp, flag, name);
2048 if ((dst.ctb_type = dst_type) == CTF_ERR
2049 || ctf_enum_iter (src_fp, src_type, enumadd, &dst))
2050 return CTF_ERR; /* errno is set for us */
2051 }
2052 break;
2053
2054 case CTF_K_FORWARD:
2055 if (dst_type == CTF_ERR)
5de9eada 2056 dst_type = ctf_add_forward (dst_fp, flag, name, forward_kind);
c499eb68
NA
2057 break;
2058
2059 case CTF_K_TYPEDEF:
2060 src_type = ctf_type_reference (src_fp, src_type);
99dc3ebd
NA
2061 src_type = ctf_add_type_internal (dst_fp, src_fp, src_type,
2062 proc_tracking_fp);
c499eb68
NA
2063
2064 if (src_type == CTF_ERR)
2065 return CTF_ERR; /* errno is set for us. */
2066
2067 /* If dst_type is not CTF_ERR at this point, we should check if
2068 ctf_type_reference(dst_fp, dst_type) != src_type and if so fail with
2069 ECTF_CONFLICT. However, this causes problems with bitness typedefs
2070 that vary based on things like if 32-bit then pid_t is int otherwise
2071 long. We therefore omit this check and assume that if the identically
2072 named typedef already exists in dst_fp, it is correct or
2073 equivalent. */
2074
2075 if (dst_type == CTF_ERR)
c499eb68 2076 dst_type = ctf_add_typedef (dst_fp, flag, name, src_type);
99dc3ebd 2077
c499eb68
NA
2078 break;
2079
2080 default:
2081 return (ctf_set_errno (dst_fp, ECTF_CORRUPT));
2082 }
2083
886453cb
NA
2084 if (dst_type != CTF_ERR)
2085 ctf_add_type_mapping (src_fp, orig_src_type, dst_fp, dst_type);
c499eb68
NA
2086 return dst_type;
2087}
2088
99dc3ebd
NA
2089ctf_id_t
2090ctf_add_type (ctf_file_t *dst_fp, ctf_file_t *src_fp, ctf_id_t src_type)
2091{
2092 ctf_id_t id;
2093
2094 if (!src_fp->ctf_add_processing)
2095 src_fp->ctf_add_processing = ctf_dynhash_create (ctf_hash_integer,
2096 ctf_hash_eq_integer,
2097 NULL, NULL);
2098
2099 /* We store the hash on the source, because it contains only source type IDs:
2100 but callers will invariably expect errors to appear on the dest. */
2101 if (!src_fp->ctf_add_processing)
2102 return (ctf_set_errno (dst_fp, ENOMEM));
2103
2104 id = ctf_add_type_internal (dst_fp, src_fp, src_type, src_fp);
2105 ctf_dynhash_empty (src_fp->ctf_add_processing);
2106
2107 return id;
2108}
2109
fd55eae8 2110/* Write the compressed CTF data stream to the specified gzFile descriptor. */
47d546f4
NA
2111int
2112ctf_gzwrite (ctf_file_t *fp, gzFile fd)
2113{
fd55eae8
NA
2114 const unsigned char *buf;
2115 ssize_t resid;
47d546f4
NA
2116 ssize_t len;
2117
fd55eae8
NA
2118 resid = sizeof (ctf_header_t);
2119 buf = (unsigned char *) fp->ctf_header;
2120 while (resid != 0)
2121 {
2122 if ((len = gzwrite (fd, buf, resid)) <= 0)
2123 return (ctf_set_errno (fp, errno));
2124 resid -= len;
2125 buf += len;
2126 }
2127
2128 resid = fp->ctf_size;
2129 buf = fp->ctf_buf;
47d546f4
NA
2130 while (resid != 0)
2131 {
2132 if ((len = gzwrite (fd, buf, resid)) <= 0)
2133 return (ctf_set_errno (fp, errno));
2134 resid -= len;
2135 buf += len;
2136 }
2137
2138 return 0;
2139}
2140
2141/* Compress the specified CTF data stream and write it to the specified file
2142 descriptor. */
2143int
2144ctf_compress_write (ctf_file_t *fp, int fd)
2145{
2146 unsigned char *buf;
2147 unsigned char *bp;
2148 ctf_header_t h;
2149 ctf_header_t *hp = &h;
2150 ssize_t header_len = sizeof (ctf_header_t);
2151 ssize_t compress_len;
47d546f4
NA
2152 ssize_t len;
2153 int rc;
2154 int err = 0;
2155
676c3ecb
NA
2156 if (ctf_serialize (fp) < 0)
2157 return -1; /* errno is set for us. */
2158
fd55eae8 2159 memcpy (hp, fp->ctf_header, header_len);
47d546f4 2160 hp->cth_flags |= CTF_F_COMPRESS;
676c3ecb 2161 compress_len = compressBound (fp->ctf_size);
47d546f4 2162
de07e349 2163 if ((buf = malloc (compress_len)) == NULL)
47d546f4
NA
2164 return (ctf_set_errno (fp, ECTF_ZALLOC));
2165
65365aa8 2166 if ((rc = compress (buf, (uLongf *) &compress_len,
fd55eae8 2167 fp->ctf_buf, fp->ctf_size)) != Z_OK)
47d546f4
NA
2168 {
2169 ctf_dprintf ("zlib deflate err: %s\n", zError (rc));
2170 err = ctf_set_errno (fp, ECTF_COMPRESS);
2171 goto ret;
2172 }
2173
2174 while (header_len > 0)
2175 {
2176 if ((len = write (fd, hp, header_len)) < 0)
2177 {
2178 err = ctf_set_errno (fp, errno);
2179 goto ret;
2180 }
2181 header_len -= len;
2182 hp += len;
2183 }
2184
2185 bp = buf;
2186 while (compress_len > 0)
2187 {
2188 if ((len = write (fd, bp, compress_len)) < 0)
2189 {
2190 err = ctf_set_errno (fp, errno);
2191 goto ret;
2192 }
2193 compress_len -= len;
2194 bp += len;
2195 }
2196
2197ret:
de07e349 2198 free (buf);
47d546f4
NA
2199 return err;
2200}
2201
5537f9b9
NA
2202/* Optionally compress the specified CTF data stream and return it as a new
2203 dynamically-allocated string. */
2204unsigned char *
2205ctf_write_mem (ctf_file_t *fp, size_t *size, size_t threshold)
2206{
2207 unsigned char *buf;
2208 unsigned char *bp;
2209 ctf_header_t *hp;
2210 ssize_t header_len = sizeof (ctf_header_t);
2211 ssize_t compress_len;
5537f9b9
NA
2212 int rc;
2213
676c3ecb
NA
2214 if (ctf_serialize (fp) < 0)
2215 return NULL; /* errno is set for us. */
2216
2217 compress_len = compressBound (fp->ctf_size);
5537f9b9 2218 if (fp->ctf_size < threshold)
676c3ecb
NA
2219 compress_len = fp->ctf_size;
2220 if ((buf = malloc (compress_len
5537f9b9
NA
2221 + sizeof (struct ctf_header))) == NULL)
2222 {
2223 ctf_set_errno (fp, ENOMEM);
2224 return NULL;
2225 }
2226
2227 hp = (ctf_header_t *) buf;
2228 memcpy (hp, fp->ctf_header, header_len);
2229 bp = buf + sizeof (struct ctf_header);
2230 *size = sizeof (struct ctf_header);
2231
5537f9b9
NA
2232 if (fp->ctf_size < threshold)
2233 {
2234 hp->cth_flags &= ~CTF_F_COMPRESS;
2235 memcpy (bp, fp->ctf_buf, fp->ctf_size);
2236 *size += fp->ctf_size;
2237 }
2238 else
2239 {
2240 hp->cth_flags |= CTF_F_COMPRESS;
2241 if ((rc = compress (bp, (uLongf *) &compress_len,
2242 fp->ctf_buf, fp->ctf_size)) != Z_OK)
2243 {
2244 ctf_dprintf ("zlib deflate err: %s\n", zError (rc));
2245 ctf_set_errno (fp, ECTF_COMPRESS);
de07e349 2246 free (buf);
5537f9b9
NA
2247 return NULL;
2248 }
2249 *size += compress_len;
2250 }
2251 return buf;
2252}
2253
fd55eae8 2254/* Write the uncompressed CTF data stream to the specified file descriptor. */
47d546f4
NA
2255int
2256ctf_write (ctf_file_t *fp, int fd)
2257{
fd55eae8
NA
2258 const unsigned char *buf;
2259 ssize_t resid;
47d546f4
NA
2260 ssize_t len;
2261
676c3ecb
NA
2262 if (ctf_serialize (fp) < 0)
2263 return -1; /* errno is set for us. */
2264
fd55eae8
NA
2265 resid = sizeof (ctf_header_t);
2266 buf = (unsigned char *) fp->ctf_header;
2267 while (resid != 0)
2268 {
2269 if ((len = write (fd, buf, resid)) <= 0)
2270 return (ctf_set_errno (fp, errno));
2271 resid -= len;
2272 buf += len;
2273 }
2274
2275 resid = fp->ctf_size;
2276 buf = fp->ctf_buf;
47d546f4
NA
2277 while (resid != 0)
2278 {
fd55eae8 2279 if ((len = write (fd, buf, resid)) <= 0)
47d546f4
NA
2280 return (ctf_set_errno (fp, errno));
2281 resid -= len;
2282 buf += len;
2283 }
2284
2285 return 0;
2286}