* config/mips/vr4300.mt: Added simulator to default VR4300 build.
[deliverable/binutils-gdb.git] / bfd / libbfd.c
CommitLineData
0d552306 1/* Assorted BFD support routines, only used internally.
f4bd7a8f 2 Copyright 1990, 91, 92, 93, 94 Free Software Foundation, Inc.
f58809fd 3 Written by Cygnus Support.
4a81b561 4
f58809fd 5This file is part of BFD, the Binary File Descriptor library.
4a81b561 6
f58809fd 7This program is free software; you can redistribute it and/or modify
4a81b561 8it under the terms of the GNU General Public License as published by
f58809fd
SC
9the Free Software Foundation; either version 2 of the License, or
10(at your option) any later version.
4a81b561 11
f58809fd 12This program is distributed in the hope that it will be useful,
4a81b561
DHW
13but WITHOUT ANY WARRANTY; without even the implied warranty of
14MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15GNU General Public License for more details.
16
17You should have received a copy of the GNU General Public License
f58809fd 18along with this program; if not, write to the Free Software
4fe6d901 19Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
4a81b561 20
4a81b561 21#include "bfd.h"
f58809fd 22#include "sysdep.h"
4a81b561
DHW
23#include "libbfd.h"
24
4fe6d901
KR
25static int real_read PARAMS ((PTR, size_t, size_t, FILE *));
26
f8e01940
JG
27/*
28SECTION
17ecba1a 29 Internal functions
f8e01940
JG
30
31DESCRIPTION
c188b0be 32 These routines are used within BFD.
f8e01940
JG
33 They are not intended for export, but are documented here for
34 completeness.
35*/
4a81b561 36
6812b607
ILT
37/* A routine which is used in target vectors for unsupported
38 operations. */
4a81b561 39
728472f1 40/*ARGSUSED*/
4a81b561 41boolean
f4bd7a8f
DM
42bfd_false (ignore)
43 bfd *ignore;
4a81b561 44{
6812b607 45 bfd_set_error (bfd_error_invalid_operation);
4a81b561
DHW
46 return false;
47}
48
6812b607
ILT
49/* A routine which is used in target vectors for supported operations
50 which do not actually do anything. */
51
728472f1 52/*ARGSUSED*/
4a81b561 53boolean
f4bd7a8f
DM
54bfd_true (ignore)
55 bfd *ignore;
4a81b561
DHW
56{
57 return true;
58}
59
6812b607
ILT
60/* A routine which is used in target vectors for unsupported
61 operations which return a pointer value. */
62
728472f1 63/*ARGSUSED*/
d0ec7a8e 64PTR
f4bd7a8f
DM
65bfd_nullvoidptr (ignore)
66 bfd *ignore;
4a81b561 67{
6812b607
ILT
68 bfd_set_error (bfd_error_invalid_operation);
69 return NULL;
4a81b561 70}
fc723380 71
728472f1 72/*ARGSUSED*/
4a81b561 73int
f4bd7a8f
DM
74bfd_0 (ignore)
75 bfd *ignore;
4a81b561
DHW
76{
77 return 0;
78}
fc723380 79
728472f1 80/*ARGSUSED*/
4a81b561 81unsigned int
f4bd7a8f
DM
82bfd_0u (ignore)
83 bfd *ignore;
4a81b561
DHW
84{
85 return 0;
86}
87
326e32d7
ILT
88/*ARGUSED*/
89long
90bfd_0l (ignore)
91 bfd *ignore;
92{
93 return 0;
94}
95
6812b607
ILT
96/* A routine which is used in target vectors for unsupported
97 operations which return -1 on error. */
98
99/*ARGSUSED*/
100long
101_bfd_n1 (ignore_abfd)
102 bfd *ignore_abfd;
103{
104 bfd_set_error (bfd_error_invalid_operation);
105 return -1;
106}
107
728472f1 108/*ARGSUSED*/
4a81b561 109void
f4bd7a8f
DM
110bfd_void (ignore)
111 bfd *ignore;
4a81b561
DHW
112{
113}
114
728472f1 115/*ARGSUSED*/
4a81b561 116boolean
6812b607 117_bfd_nocore_core_file_matches_executable_p (ignore_core_bfd, ignore_exec_bfd)
f4bd7a8f
DM
118 bfd *ignore_core_bfd;
119 bfd *ignore_exec_bfd;
4a81b561 120{
120f5bd9 121 bfd_set_error (bfd_error_invalid_operation);
4a81b561
DHW
122 return false;
123}
124
6812b607
ILT
125/* Routine to handle core_file_failing_command entry point for targets
126 without core file support. */
4a81b561 127
728472f1 128/*ARGSUSED*/
4a81b561 129char *
6812b607 130_bfd_nocore_core_file_failing_command (ignore_abfd)
f4bd7a8f 131 bfd *ignore_abfd;
4a81b561 132{
6812b607 133 bfd_set_error (bfd_error_invalid_operation);
4a81b561
DHW
134 return (char *)NULL;
135}
136
6812b607
ILT
137/* Routine to handle core_file_failing_signal entry point for targets
138 without core file support. */
139
728472f1 140/*ARGSUSED*/
4a81b561 141int
6812b607 142_bfd_nocore_core_file_failing_signal (ignore_abfd)
f4bd7a8f 143 bfd *ignore_abfd;
4a81b561 144{
6812b607 145 bfd_set_error (bfd_error_invalid_operation);
4a81b561
DHW
146 return 0;
147}
148
728472f1 149/*ARGSUSED*/
4fe6d901 150const bfd_target *
f4bd7a8f
DM
151_bfd_dummy_target (ignore_abfd)
152 bfd *ignore_abfd;
4a81b561 153{
4fe6d901 154 bfd_set_error (bfd_error_wrong_format);
4a81b561
DHW
155 return 0;
156}
157\f
4a81b561 158
f4bd7a8f
DM
159#ifndef bfd_zmalloc
160/* allocate and clear storage */
4a81b561 161
4a81b561 162char *
f4bd7a8f
DM
163bfd_zmalloc (size)
164 bfd_size_type size;
4a81b561 165{
120f5bd9 166 char *ptr = (char *) malloc ((size_t) size);
4a81b561 167
120f5bd9
JL
168 if (ptr && size)
169 memset(ptr, 0, (size_t) size);
4a81b561
DHW
170
171 return ptr;
172}
f4bd7a8f 173#endif /* bfd_zmalloc */
4a81b561
DHW
174\f
175/* Some IO code */
176
177
178/* Note that archive entries don't have streams; they share their parent's.
f58809fd 179 This allows someone to play with the iostream behind BFD's back.
4a81b561
DHW
180
181 Also, note that the origin pointer points to the beginning of a file's
182 contents (0 for non-archive elements). For archive entries this is the
183 first octet in the file, NOT the beginning of the archive header. */
184
4fe6d901 185static int
f4bd7a8f
DM
186real_read (where, a,b, file)
187 PTR where;
4fe6d901
KR
188 size_t a;
189 size_t b;
f4bd7a8f 190 FILE *file;
7ed4093a 191{
4fe6d901 192 return fread (where, a, b, file);
7ed4093a 193}
f4bd7a8f 194
120f5bd9
JL
195/* Return value is amount read (FIXME: how are errors and end of file dealt
196 with? We never call bfd_set_error, which is probably a mistake). */
197
23b0b558 198bfd_size_type
f4bd7a8f
DM
199bfd_read (ptr, size, nitems, abfd)
200 PTR ptr;
201 bfd_size_type size;
202 bfd_size_type nitems;
203 bfd *abfd;
4a81b561 204{
0d552306 205 int nread;
4fe6d901 206 nread = real_read (ptr, 1, (size_t)(size*nitems), bfd_cache_lookup(abfd));
0d552306
KR
207#ifdef FILE_OFFSET_IS_CHAR_INDEX
208 if (nread > 0)
209 abfd->where += nread;
210#endif
120f5bd9
JL
211
212 /* Set bfd_error if we did not read as much data as we expected.
213
214 If the read failed due to an error set the bfd_error_system_call,
215 else set bfd_error_file_truncated.
216
217 A BFD backend may wish to override bfd_error_file_truncated to
218 provide something more useful (eg. no_symbols or wrong_format). */
219 if (nread < (int)(size * nitems))
220 {
221 if (ferror (bfd_cache_lookup (abfd)))
222 bfd_set_error (bfd_error_system_call);
223 else
224 bfd_set_error (bfd_error_file_truncated);
225 }
226
0d552306 227 return nread;
4a81b561
DHW
228}
229
4fe6d901
KR
230/* The window support stuff should probably be broken out into
231 another file.... */
232/* The idea behind the next and refcount fields is that one mapped
233 region can suffice for multiple read-only windows or multiple
234 non-overlapping read-write windows. It's not implemented yet
235 though. */
236struct _bfd_window_internal {
237 struct _bfd_window_internal *next;
238 PTR data;
239 bfd_size_type size;
240 int refcount : 31; /* should be enough... */
241 unsigned mapped : 1; /* 1 = mmap, 0 = malloc */
242};
243
244void
245bfd_init_window (windowp)
246 bfd_window *windowp;
247{
248 windowp->data = 0;
249 windowp->i = 0;
250 windowp->size = 0;
251}
252
253#undef HAVE_MPROTECT /* code's not tested yet */
254
255#if HAVE_MMAP || HAVE_MPROTECT
256#include <sys/types.h>
257#include <sys/mman.h>
258#endif
259
260#ifndef MAP_FILE
261#define MAP_FILE 0
262#endif
263
264static int debug_windows;
265
266void
267bfd_free_window (windowp)
268 bfd_window *windowp;
269{
270 bfd_window_internal *i = windowp->i;
271 windowp->i = 0;
272 windowp->data = 0;
273 if (i == 0)
274 return;
275 i->refcount--;
276 if (debug_windows)
277 fprintf (stderr, "freeing window @%p<%p,%lx,%p>\n",
278 windowp, windowp->data, windowp->size, windowp->i);
279 if (i->refcount != 0)
280 return;
281
282 if (i->mapped)
283 {
284#ifdef HAVE_MMAP
285 munmap (i->data, i->size);
286 goto no_free;
287#else
288 abort ();
289#endif
290 }
291#ifdef HAVE_MPROTECT
292 mprotect (i->data, i->size, PROT_READ | PROT_WRITE);
293#endif
294 free (i->data);
295#ifdef HAVE_MMAP
296 no_free:
297#endif
298 i->data = 0;
299 /* There should be no more references to i at this point. */
300 free (i);
301}
302
303static int ok_to_map = 1;
304
305int
306bfd_get_file_window (abfd, offset, size, windowp, writable)
307 bfd *abfd;
308 file_ptr offset;
309 bfd_size_type size;
310 bfd_window *windowp;
311 int writable;
312{
313 static size_t pagesize;
314 bfd_window_internal *i = windowp->i;
315 size_t size_to_alloc = size;
316
317 if (debug_windows)
318 fprintf (stderr, "bfd_get_file_window (%p, %6ld, %6ld, %p<%p,%lx,%p>, %d)",
319 abfd, (long) offset, (long) size,
320 windowp, windowp->data, windowp->size, windowp->i,
321 writable);
322
323 /* Make sure we know the page size, so we can be friendly to mmap. */
324 if (pagesize == 0)
325 pagesize = getpagesize ();
326 if (pagesize == 0)
327 abort ();
328
329 if (i == 0)
330 {
331 windowp->i = i = (bfd_window_internal *) bfd_zmalloc (sizeof (bfd_window_internal));
332 if (i == 0)
333 return false;
334 i->data = 0;
335 }
336#ifdef HAVE_MMAP
337 if (ok_to_map && (i->data == 0 || i->mapped == 1))
338 {
339 file_ptr file_offset, offset2;
340 size_t real_size;
341 int fd;
342 FILE *f;
343
344 /* Find the real file and the real offset into it. */
345 while (abfd->my_archive != NULL)
346 {
347 offset += abfd->origin;
348 abfd = abfd->my_archive;
349 }
350 f = bfd_cache_lookup (abfd);
351 fd = fileno (f);
352
353 /* Compute offsets and size for mmap and for the user's data. */
354 offset2 = offset % pagesize;
355 if (offset2 < 0)
356 abort ();
357 file_offset = offset - offset2;
358 real_size = offset + size - file_offset;
359 real_size = real_size + pagesize - 1;
360 real_size -= real_size % pagesize;
361
362 /* If we're re-using a memory region, make sure it's big enough. */
363 if (i->data && i->size < size)
364 {
365 munmap (i->data, i->size);
366 i->data = 0;
367 }
368 i->data = mmap (i->data, real_size,
369 writable ? PROT_WRITE | PROT_READ : PROT_READ,
370 writable ? MAP_FILE | MAP_PRIVATE : MAP_FILE,
371 fd, file_offset);
372 if (i->data == (PTR) -1)
373 {
374 /* An error happened. Report it, or try using malloc, or
375 something. */
376 bfd_set_error (bfd_error_system_call);
377 i->data = 0;
378 windowp->data = 0;
379 if (debug_windows)
380 fprintf (stderr, "\t\tmmap failed!\n");
381 return false;
382 }
383 if (debug_windows)
384 fprintf (stderr, "\n\tmapped %ld at %p, offset is %ld\n",
385 (long) real_size, i->data, (long) offset2);
386 i->size = real_size;
387 windowp->data = i->data + offset2;
388 windowp->size = size;
389 i->mapped = 1;
390 return true;
391 }
392 else if (debug_windows)
393 {
394 if (ok_to_map)
395 fprintf (stderr, "not mapping: data=%x mapped=%d\n",
396 i->data, i->mapped);
397 else
398 fprintf (stderr, "not mapping: env var not set\n");
399 }
400#else
401 ok_to_map = 0;
402#endif
403
404#ifdef HAVE_MPROTECT
405 if (!writable)
406 {
407 size_to_alloc += pagesize - 1;
408 size_to_alloc -= size_to_alloc % pagesize;
409 }
410#endif
411 if (debug_windows)
412 fprintf (stderr, "\n\t%s(%6ld)",
413 i->data ? "realloc" : " malloc", (long) size_to_alloc);
414 if (i->data)
415 i->data = realloc (i->data, size_to_alloc);
416 else
417 i->data = malloc (size_to_alloc);
418 if (debug_windows)
419 fprintf (stderr, "\t-> %p\n", i->data);
420 i->refcount = 1;
421 if (i->data == 0)
422 return size_to_alloc == 0;
423 if (bfd_seek (abfd, offset, SEEK_SET) != 0)
424 return false;
425 i->size = bfd_read (i->data, size, 1, abfd);
426 if (i->size != size)
427 return false;
428 i->mapped = 0;
429#ifdef HAVE_MPROTECT
430 if (!writable)
431 {
432 if (debug_windows)
433 fprintf (stderr, "\tmprotect (%p, %ld, PROT_READ)\n", i->data,
434 (long) i->size);
435 mprotect (i->data, i->size, PROT_READ);
436 }
437#endif
438 windowp->data = i->data;
439 windowp->size = i->size;
440 return true;
441}
442
23b0b558 443bfd_size_type
df34342b
ILT
444bfd_write (ptr, size, nitems, abfd)
445 CONST PTR ptr;
446 bfd_size_type size;
447 bfd_size_type nitems;
448 bfd *abfd;
4a81b561 449{
4fe6d901
KR
450 long nwrote = fwrite (ptr, 1, (size_t) (size * nitems),
451 bfd_cache_lookup (abfd));
0d552306
KR
452#ifdef FILE_OFFSET_IS_CHAR_INDEX
453 if (nwrote > 0)
454 abfd->where += nwrote;
455#endif
4fe6d901 456 if ((bfd_size_type) nwrote != size * nitems)
df34342b
ILT
457 {
458#ifdef ENOSPC
459 if (nwrote >= 0)
460 errno = ENOSPC;
461#endif
120f5bd9 462 bfd_set_error (bfd_error_system_call);
df34342b 463 }
0d552306 464 return nwrote;
4a81b561
DHW
465}
466
f8e01940
JG
467/*
468INTERNAL_FUNCTION
469 bfd_write_bigendian_4byte_int
470
471SYNOPSIS
472 void bfd_write_bigendian_4byte_int(bfd *abfd, int i);
473
474DESCRIPTION
c188b0be
DM
475 Write a 4 byte integer @var{i} to the output BFD @var{abfd}, in big
476 endian order regardless of what else is going on. This is useful in
f8e01940 477 archives.
1e310759 478
1e310759 479*/
f58809fd 480void
f4bd7a8f
DM
481bfd_write_bigendian_4byte_int (abfd, i)
482 bfd *abfd;
483 int i;
f58809fd 484{
1e310759 485 bfd_byte buffer[4];
b5b4294e 486 bfd_putb32(i, buffer);
4002f18a
ILT
487 if (bfd_write((PTR)buffer, 4, 1, abfd) != 4)
488 abort ();
f58809fd
SC
489}
490
0d552306 491long
f4bd7a8f
DM
492bfd_tell (abfd)
493 bfd *abfd;
0d552306
KR
494{
495 file_ptr ptr;
496
497 ptr = ftell (bfd_cache_lookup(abfd));
498
499 if (abfd->my_archive)
500 ptr -= abfd->origin;
501 abfd->where = ptr;
502 return ptr;
503}
504
b5b4294e 505int
f4bd7a8f
DM
506bfd_flush (abfd)
507 bfd *abfd;
b5b4294e
JG
508{
509 return fflush (bfd_cache_lookup(abfd));
510}
511
4fe6d901
KR
512/* Returns 0 for success, negative value for failure (in which case
513 bfd_get_error can retrieve the error code). */
b5b4294e 514int
f4bd7a8f
DM
515bfd_stat (abfd, statbuf)
516 bfd *abfd;
517 struct stat *statbuf;
b5b4294e 518{
4fe6d901
KR
519 FILE *f;
520 int result;
521 f = bfd_cache_lookup (abfd);
522 if (f == NULL)
523 {
524 bfd_set_error (bfd_error_system_call);
525 return -1;
526 }
527 result = fstat (fileno (f), statbuf);
528 if (result < 0)
529 bfd_set_error (bfd_error_system_call);
530 return result;
b5b4294e
JG
531}
532
120f5bd9
JL
533/* Returns 0 for success, nonzero for failure (in which case bfd_get_error
534 can retrieve the error code). */
535
4a81b561 536int
f4bd7a8f 537bfd_seek (abfd, position, direction)
4fe6d901
KR
538 bfd *abfd;
539 file_ptr position;
540 int direction;
4a81b561 541{
0d552306
KR
542 int result;
543 FILE *f;
e5b02860 544 file_ptr file_position;
0d552306
KR
545 /* For the time being, a BFD may not seek to it's end. The problem
546 is that we don't easily have a way to recognize the end of an
547 element in an archive. */
548
549 BFD_ASSERT (direction == SEEK_SET || direction == SEEK_CUR);
550
b31d06ca 551 if (direction == SEEK_CUR && position == 0)
0d552306
KR
552 return 0;
553#ifdef FILE_OFFSET_IS_CHAR_INDEX
b6090f4d
JG
554 if (abfd->format != bfd_archive && abfd->my_archive == 0)
555 {
4c3721d5 556#if 0
b6090f4d
JG
557 /* Explanation for this code: I'm only about 95+% sure that the above
558 conditions are sufficient and that all i/o calls are properly
559 adjusting the `where' field. So this is sort of an `assert'
560 that the `where' field is correct. If we can go a while without
561 tripping the abort, we can probably safely disable this code,
562 so that the real optimizations happen. */
563 file_ptr where_am_i_now;
564 where_am_i_now = ftell (bfd_cache_lookup (abfd));
565 if (abfd->my_archive)
566 where_am_i_now -= abfd->origin;
567 if (where_am_i_now != abfd->where)
568 abort ();
569#endif
570 if (direction == SEEK_SET && position == abfd->where)
571 return 0;
572 }
573 else
574 {
575 /* We need something smarter to optimize access to archives.
576 Currently, anything inside an archive is read via the file
577 handle for the archive. Which means that a bfd_seek on one
578 component affects the `current position' in the archive, as
579 well as in any other component.
580
581 It might be sufficient to put a spike through the cache
582 abstraction, and look to the archive for the file position,
583 but I think we should try for something cleaner.
584
585 In the meantime, no optimization for archives. */
586 }
0d552306 587#endif
4a81b561 588
0d552306 589 f = bfd_cache_lookup (abfd);
e5b02860 590 file_position = position;
0d552306 591 if (direction == SEEK_SET && abfd->my_archive != NULL)
e5b02860
KR
592 file_position += abfd->origin;
593
594 result = fseek (f, file_position, direction);
595
596 if (result != 0)
df34342b
ILT
597 {
598 /* Force redetermination of `where' field. */
599 bfd_tell (abfd);
120f5bd9 600 bfd_set_error (bfd_error_system_call);
df34342b 601 }
0d552306
KR
602 else
603 {
e5b02860
KR
604#ifdef FILE_OFFSET_IS_CHAR_INDEX
605 /* Adjust `where' field. */
606 if (direction == SEEK_SET)
607 abfd->where = position;
608 else
609 abfd->where += position;
610#endif
0d552306 611 }
e5b02860 612 return result;
4a81b561
DHW
613}
614\f
4a81b561
DHW
615/** The do-it-yourself (byte) sex-change kit */
616
617/* The middle letter e.g. get<b>short indicates Big or Little endian
618 target machine. It doesn't matter what the byte order of the host
619 machine is; these routines work for either. */
620
621/* FIXME: Should these take a count argument?
622 Answer (gnu@cygnus.com): No, but perhaps they should be inline
6f715d66
SC
623 functions in swap.h #ifdef __GNUC__.
624 Gprof them later and find out. */
625
f8e01940
JG
626/*
627FUNCTION
628 bfd_put_size
629FUNCTION
630 bfd_get_size
631
632DESCRIPTION
633 These macros as used for reading and writing raw data in
634 sections; each access (except for bytes) is vectored through
635 the target format of the BFD and mangled accordingly. The
636 mangling performs any necessary endian translations and
14e3c2e4
JK
637 removes alignment restrictions. Note that types accepted and
638 returned by these macros are identical so they can be swapped
17ecba1a
DM
639 around in macros---for example, @file{libaout.h} defines <<GET_WORD>>
640 to either <<bfd_get_32>> or <<bfd_get_64>>.
f8e01940 641
17ecba1a 642 In the put routines, @var{val} must be a <<bfd_vma>>. If we are on a
7e4db254
JK
643 system without prototypes, the caller is responsible for making
644 sure that is true, with a cast if necessary. We don't cast
17ecba1a
DM
645 them in the macro definitions because that would prevent <<lint>>
646 or <<gcc -Wall>> from detecting sins such as passing a pointer.
647 To detect calling these with less than a <<bfd_vma>>, use
648 <<gcc -Wconversion>> on a host with 64 bit <<bfd_vma>>'s.
7e4db254 649
da3cd00a
KR
650.
651.{* Byte swapping macros for user section data. *}
652.
f8e01940 653.#define bfd_put_8(abfd, val, ptr) \
4c3721d5 654. (*((unsigned char *)(ptr)) = (unsigned char)(val))
da3cd00a
KR
655.#define bfd_put_signed_8 \
656. bfd_put_8
f8e01940 657.#define bfd_get_8(abfd, ptr) \
da3cd00a
KR
658. (*(unsigned char *)(ptr))
659.#define bfd_get_signed_8(abfd, ptr) \
660. ((*(unsigned char *)(ptr) ^ 0x80) - 0x80)
661.
f8e01940 662.#define bfd_put_16(abfd, val, ptr) \
7e4db254 663. BFD_SEND(abfd, bfd_putx16, ((val),(ptr)))
da3cd00a
KR
664.#define bfd_put_signed_16 \
665. bfd_put_16
f8e01940
JG
666.#define bfd_get_16(abfd, ptr) \
667. BFD_SEND(abfd, bfd_getx16, (ptr))
14e3c2e4
JK
668.#define bfd_get_signed_16(abfd, ptr) \
669. BFD_SEND (abfd, bfd_getx_signed_16, (ptr))
da3cd00a 670.
f8e01940 671.#define bfd_put_32(abfd, val, ptr) \
7e4db254 672. BFD_SEND(abfd, bfd_putx32, ((val),(ptr)))
da3cd00a
KR
673.#define bfd_put_signed_32 \
674. bfd_put_32
f8e01940
JG
675.#define bfd_get_32(abfd, ptr) \
676. BFD_SEND(abfd, bfd_getx32, (ptr))
14e3c2e4
JK
677.#define bfd_get_signed_32(abfd, ptr) \
678. BFD_SEND(abfd, bfd_getx_signed_32, (ptr))
da3cd00a 679.
f8e01940 680.#define bfd_put_64(abfd, val, ptr) \
7e4db254 681. BFD_SEND(abfd, bfd_putx64, ((val), (ptr)))
da3cd00a
KR
682.#define bfd_put_signed_64 \
683. bfd_put_64
f8e01940
JG
684.#define bfd_get_64(abfd, ptr) \
685. BFD_SEND(abfd, bfd_getx64, (ptr))
14e3c2e4
JK
686.#define bfd_get_signed_64(abfd, ptr) \
687. BFD_SEND(abfd, bfd_getx_signed_64, (ptr))
da3cd00a 688.
f8e01940
JG
689*/
690
691/*
692FUNCTION
693 bfd_h_put_size
f8e01940
JG
694 bfd_h_get_size
695
696DESCRIPTION
697 These macros have the same function as their <<bfd_get_x>>
c188b0be 698 bretheren, except that they are used for removing information
f8e01940
JG
699 for the header records of object files. Believe it or not,
700 some object files keep their header records in big endian
c188b0be 701 order and their data in little endian order.
da3cd00a
KR
702.
703.{* Byte swapping macros for file header data. *}
704.
f8e01940 705.#define bfd_h_put_8(abfd, val, ptr) \
da3cd00a
KR
706. bfd_put_8 (abfd, val, ptr)
707.#define bfd_h_put_signed_8(abfd, val, ptr) \
708. bfd_put_8 (abfd, val, ptr)
f8e01940 709.#define bfd_h_get_8(abfd, ptr) \
da3cd00a
KR
710. bfd_get_8 (abfd, ptr)
711.#define bfd_h_get_signed_8(abfd, ptr) \
712. bfd_get_signed_8 (abfd, ptr)
713.
f8e01940
JG
714.#define bfd_h_put_16(abfd, val, ptr) \
715. BFD_SEND(abfd, bfd_h_putx16,(val,ptr))
da3cd00a
KR
716.#define bfd_h_put_signed_16 \
717. bfd_h_put_16
f8e01940
JG
718.#define bfd_h_get_16(abfd, ptr) \
719. BFD_SEND(abfd, bfd_h_getx16,(ptr))
14e3c2e4
JK
720.#define bfd_h_get_signed_16(abfd, ptr) \
721. BFD_SEND(abfd, bfd_h_getx_signed_16, (ptr))
da3cd00a 722.
f8e01940
JG
723.#define bfd_h_put_32(abfd, val, ptr) \
724. BFD_SEND(abfd, bfd_h_putx32,(val,ptr))
da3cd00a
KR
725.#define bfd_h_put_signed_32 \
726. bfd_h_put_32
f8e01940
JG
727.#define bfd_h_get_32(abfd, ptr) \
728. BFD_SEND(abfd, bfd_h_getx32,(ptr))
14e3c2e4
JK
729.#define bfd_h_get_signed_32(abfd, ptr) \
730. BFD_SEND(abfd, bfd_h_getx_signed_32, (ptr))
da3cd00a 731.
f8e01940
JG
732.#define bfd_h_put_64(abfd, val, ptr) \
733. BFD_SEND(abfd, bfd_h_putx64,(val, ptr))
da3cd00a
KR
734.#define bfd_h_put_signed_64 \
735. bfd_h_put_64
f8e01940
JG
736.#define bfd_h_get_64(abfd, ptr) \
737. BFD_SEND(abfd, bfd_h_getx64,(ptr))
14e3c2e4
JK
738.#define bfd_h_get_signed_64(abfd, ptr) \
739. BFD_SEND(abfd, bfd_h_getx_signed_64, (ptr))
da3cd00a 740.
f8e01940 741*/
4a81b561 742
14e3c2e4 743/* Sign extension to bfd_signed_vma. */
df34342b
ILT
744#define COERCE16(x) (((bfd_signed_vma) (x) ^ 0x8000) - 0x8000)
745#define COERCE32(x) (((bfd_signed_vma) (x) ^ 0x80000000) - 0x80000000)
96ad107b 746#define EIGHT_GAZILLION (((BFD_HOST_64_BIT)0x80000000) << 32)
df34342b
ILT
747#define COERCE64(x) \
748 (((bfd_signed_vma) (x) ^ EIGHT_GAZILLION) - EIGHT_GAZILLION)
14e3c2e4 749
f58809fd 750bfd_vma
f4bd7a8f
DM
751bfd_getb16 (addr)
752 register const bfd_byte *addr;
4a81b561 753{
f4bd7a8f 754 return (addr[0] << 8) | addr[1];
4a81b561
DHW
755}
756
f58809fd 757bfd_vma
f4bd7a8f
DM
758bfd_getl16 (addr)
759 register const bfd_byte *addr;
4a81b561 760{
f4bd7a8f 761 return (addr[1] << 8) | addr[0];
4a81b561
DHW
762}
763
14e3c2e4 764bfd_signed_vma
f4bd7a8f
DM
765bfd_getb_signed_16 (addr)
766 register const bfd_byte *addr;
14e3c2e4 767{
f4bd7a8f 768 return COERCE16((addr[0] << 8) | addr[1]);
14e3c2e4
JK
769}
770
771bfd_signed_vma
f4bd7a8f
DM
772bfd_getl_signed_16 (addr)
773 register const bfd_byte *addr;
14e3c2e4 774{
f4bd7a8f 775 return COERCE16((addr[1] << 8) | addr[0]);
14e3c2e4
JK
776}
777
4a81b561 778void
f4bd7a8f
DM
779bfd_putb16 (data, addr)
780 bfd_vma data;
781 register bfd_byte *addr;
4a81b561 782{
f4bd7a8f
DM
783 addr[0] = (bfd_byte)(data >> 8);
784 addr[1] = (bfd_byte )data;
4a81b561
DHW
785}
786
787void
f4bd7a8f
DM
788bfd_putl16 (data, addr)
789 bfd_vma data;
790 register bfd_byte *addr;
4a81b561 791{
f4bd7a8f
DM
792 addr[0] = (bfd_byte )data;
793 addr[1] = (bfd_byte)(data >> 8);
4a81b561
DHW
794}
795
f58809fd 796bfd_vma
b5b4294e 797bfd_getb32 (addr)
f4bd7a8f 798 register const bfd_byte *addr;
4a81b561 799{
f4bd7a8f
DM
800 return (((((bfd_vma)addr[0] << 8) | addr[1]) << 8)
801 | addr[2]) << 8 | addr[3];
4a81b561
DHW
802}
803
f58809fd 804bfd_vma
b5b4294e 805bfd_getl32 (addr)
f4bd7a8f 806 register const bfd_byte *addr;
4a81b561 807{
f4bd7a8f
DM
808 return (((((bfd_vma)addr[3] << 8) | addr[2]) << 8)
809 | addr[1]) << 8 | addr[0];
4a81b561
DHW
810}
811
14e3c2e4 812bfd_signed_vma
b5b4294e 813bfd_getb_signed_32 (addr)
f4bd7a8f 814 register const bfd_byte *addr;
14e3c2e4 815{
f4bd7a8f
DM
816 return COERCE32((((((bfd_vma)addr[0] << 8) | addr[1]) << 8)
817 | addr[2]) << 8 | addr[3]);
14e3c2e4
JK
818}
819
820bfd_signed_vma
b5b4294e 821bfd_getl_signed_32 (addr)
f4bd7a8f 822 register const bfd_byte *addr;
14e3c2e4 823{
f4bd7a8f
DM
824 return COERCE32((((((bfd_vma)addr[3] << 8) | addr[2]) << 8)
825 | addr[1]) << 8 | addr[0]);
14e3c2e4
JK
826}
827
f58809fd 828bfd_vma
f4bd7a8f
DM
829bfd_getb64 (addr)
830 register const bfd_byte *addr;
7ed4093a 831{
b5b4294e 832#ifdef BFD64
b6090f4d 833 bfd_vma low, high;
536b27a5 834
7ed4093a 835 high= ((((((((addr[0]) << 8) |
6f715d66
SC
836 addr[1]) << 8) |
837 addr[2]) << 8) |
838 addr[3]) );
7ed4093a 839
df34342b 840 low = (((((((((bfd_vma)addr[4]) << 8) |
6f715d66
SC
841 addr[5]) << 8) |
842 addr[6]) << 8) |
843 addr[7]));
7ed4093a
SC
844
845 return high << 32 | low;
846#else
847 BFD_FAIL();
f58809fd 848 return 0;
7ed4093a 849#endif
7ed4093a
SC
850}
851
f58809fd 852bfd_vma
f4bd7a8f
DM
853bfd_getl64 (addr)
854 register const bfd_byte *addr;
7ed4093a 855{
b5b4294e 856#ifdef BFD64
b6090f4d 857 bfd_vma low, high;
7ed4093a 858 high= (((((((addr[7] << 8) |
6f715d66
SC
859 addr[6]) << 8) |
860 addr[5]) << 8) |
861 addr[4]));
7ed4093a 862
df34342b 863 low = ((((((((bfd_vma)addr[3] << 8) |
6f715d66
SC
864 addr[2]) << 8) |
865 addr[1]) << 8) |
866 addr[0]) );
7ed4093a
SC
867
868 return high << 32 | low;
869#else
870 BFD_FAIL();
f58809fd 871 return 0;
7ed4093a 872#endif
6f715d66 873
7ed4093a
SC
874}
875
14e3c2e4 876bfd_signed_vma
f4bd7a8f
DM
877bfd_getb_signed_64 (addr)
878 register const bfd_byte *addr;
14e3c2e4 879{
b5b4294e 880#ifdef BFD64
14e3c2e4
JK
881 bfd_vma low, high;
882
883 high= ((((((((addr[0]) << 8) |
884 addr[1]) << 8) |
885 addr[2]) << 8) |
886 addr[3]) );
887
df34342b 888 low = (((((((((bfd_vma)addr[4]) << 8) |
14e3c2e4
JK
889 addr[5]) << 8) |
890 addr[6]) << 8) |
891 addr[7]));
892
893 return COERCE64(high << 32 | low);
894#else
895 BFD_FAIL();
896 return 0;
897#endif
14e3c2e4
JK
898}
899
900bfd_signed_vma
f4bd7a8f
DM
901bfd_getl_signed_64 (addr)
902 register const bfd_byte *addr;
14e3c2e4 903{
b5b4294e 904#ifdef BFD64
14e3c2e4
JK
905 bfd_vma low, high;
906 high= (((((((addr[7] << 8) |
907 addr[6]) << 8) |
908 addr[5]) << 8) |
909 addr[4]));
910
df34342b 911 low = ((((((((bfd_vma)addr[3] << 8) |
14e3c2e4
JK
912 addr[2]) << 8) |
913 addr[1]) << 8) |
914 addr[0]) );
915
916 return COERCE64(high << 32 | low);
917#else
918 BFD_FAIL();
919 return 0;
920#endif
14e3c2e4
JK
921}
922
4a81b561 923void
f4bd7a8f
DM
924bfd_putb32 (data, addr)
925 bfd_vma data;
926 register bfd_byte *addr;
4a81b561 927{
6f715d66
SC
928 addr[0] = (bfd_byte)(data >> 24);
929 addr[1] = (bfd_byte)(data >> 16);
930 addr[2] = (bfd_byte)(data >> 8);
931 addr[3] = (bfd_byte)data;
4a81b561
DHW
932}
933
934void
f4bd7a8f
DM
935bfd_putl32 (data, addr)
936 bfd_vma data;
937 register bfd_byte *addr;
4a81b561 938{
6f715d66
SC
939 addr[0] = (bfd_byte)data;
940 addr[1] = (bfd_byte)(data >> 8);
941 addr[2] = (bfd_byte)(data >> 16);
942 addr[3] = (bfd_byte)(data >> 24);
4a81b561 943}
f4bd7a8f 944
7ed4093a 945void
f4bd7a8f
DM
946bfd_putb64 (data, addr)
947 bfd_vma data;
948 register bfd_byte *addr;
7ed4093a 949{
b5b4294e 950#ifdef BFD64
536b27a5
SC
951 addr[0] = (bfd_byte)(data >> (7*8));
952 addr[1] = (bfd_byte)(data >> (6*8));
953 addr[2] = (bfd_byte)(data >> (5*8));
954 addr[3] = (bfd_byte)(data >> (4*8));
955 addr[4] = (bfd_byte)(data >> (3*8));
956 addr[5] = (bfd_byte)(data >> (2*8));
957 addr[6] = (bfd_byte)(data >> (1*8));
958 addr[7] = (bfd_byte)(data >> (0*8));
7ed4093a 959#else
536b27a5 960 BFD_FAIL();
7ed4093a 961#endif
7ed4093a
SC
962}
963
964void
f4bd7a8f
DM
965bfd_putl64 (data, addr)
966 bfd_vma data;
967 register bfd_byte *addr;
7ed4093a 968{
b5b4294e 969#ifdef BFD64
536b27a5
SC
970 addr[7] = (bfd_byte)(data >> (7*8));
971 addr[6] = (bfd_byte)(data >> (6*8));
972 addr[5] = (bfd_byte)(data >> (5*8));
973 addr[4] = (bfd_byte)(data >> (4*8));
974 addr[3] = (bfd_byte)(data >> (3*8));
975 addr[2] = (bfd_byte)(data >> (2*8));
976 addr[1] = (bfd_byte)(data >> (1*8));
977 addr[0] = (bfd_byte)(data >> (0*8));
7ed4093a 978#else
536b27a5 979 BFD_FAIL();
7ed4093a 980#endif
7ed4093a 981}
2203f786
JG
982\f
983/* Default implementation */
4a81b561 984
2203f786 985boolean
6812b607 986_bfd_generic_get_section_contents (abfd, section, location, offset, count)
f4bd7a8f
DM
987 bfd *abfd;
988 sec_ptr section;
989 PTR location;
990 file_ptr offset;
991 bfd_size_type count;
2203f786
JG
992{
993 if (count == 0)
6f715d66 994 return true;
f8e01940
JG
995 if ((bfd_size_type)(offset+count) > section->_raw_size
996 || bfd_seek(abfd, (file_ptr)(section->filepos + offset), SEEK_SET) == -1
6f715d66
SC
997 || bfd_read(location, (bfd_size_type)1, count, abfd) != count)
998 return (false); /* on error */
2203f786
JG
999 return (true);
1000}
6f715d66 1001
4fe6d901
KR
1002boolean
1003_bfd_generic_get_section_contents_in_window (abfd, section, w, offset, count)
1004 bfd *abfd;
1005 sec_ptr section;
1006 bfd_window *w;
1007 file_ptr offset;
1008 bfd_size_type count;
1009{
1010 if (count == 0)
1011 return true;
1012 if (abfd->xvec->_bfd_get_section_contents != _bfd_generic_get_section_contents)
1013 {
1014 /* We don't know what changes the bfd's get_section_contents
1015 method may have to make. So punt trying to map the file
1016 window, and let get_section_contents do its thing. */
1017 /* @@ FIXME : If the internal window has a refcount of 1 and was
1018 allocated with malloc instead of mmap, just reuse it. */
1019 bfd_free_window (w);
1020 w->i = (bfd_window_internal *) bfd_zmalloc (sizeof (bfd_window_internal));
1021 if (w->i == NULL)
1022 return false;
1023 w->i->data = (PTR) malloc ((size_t) count);
1024 if (w->i->data == NULL)
1025 {
1026 free (w->i);
1027 w->i = NULL;
1028 return false;
1029 }
1030 w->i->mapped = 0;
1031 w->i->refcount = 1;
1032 w->size = w->i->size = count;
1033 w->data = w->i->data;
1034 return bfd_get_section_contents (abfd, section, w->data, offset, count);
1035 }
1036 if ((bfd_size_type) (offset+count) > section->_raw_size
1037 || (bfd_get_file_window (abfd, section->filepos + offset, count, w, 1)
1038 == false))
1039 return false;
1040 return true;
1041}
1042
f58809fd
SC
1043/* This generic function can only be used in implementations where creating
1044 NEW sections is disallowed. It is useful in patching existing sections
1045 in read-write files, though. See other set_section_contents functions
1046 to see why it doesn't work for new sections. */
1047boolean
6812b607 1048_bfd_generic_set_section_contents (abfd, section, location, offset, count)
df34342b
ILT
1049 bfd *abfd;
1050 sec_ptr section;
1051 PTR location;
1052 file_ptr offset;
1053 bfd_size_type count;
f58809fd 1054{
df34342b
ILT
1055 if (count == 0)
1056 return true;
1057
df34342b
ILT
1058 if (bfd_seek (abfd, (file_ptr) (section->filepos + offset), SEEK_SET) == -1
1059 || bfd_write (location, (bfd_size_type) 1, count, abfd) != count)
1060 return false;
1061
1062 return true;
f58809fd
SC
1063}
1064
f8e01940
JG
1065/*
1066INTERNAL_FUNCTION
1067 bfd_log2
1068
17ecba1a
DM
1069SYNOPSIS
1070 unsigned int bfd_log2(bfd_vma x);
1071
f8e01940 1072DESCRIPTION
c188b0be
DM
1073 Return the log base 2 of the value supplied, rounded up. E.g., an
1074 @var{x} of 1025 returns 11.
f8e01940 1075*/
6f715d66 1076
b5b4294e
JG
1077unsigned
1078bfd_log2(x)
1079 bfd_vma x;
6f715d66 1080{
b5b4294e 1081 unsigned result = 0;
6f715d66
SC
1082 while ( (bfd_vma)(1<< result) < x)
1083 result++;
1084 return result;
1085}
120f5bd9
JL
1086
1087boolean
1088bfd_generic_is_local_label (abfd, sym)
1089 bfd *abfd;
1090 asymbol *sym;
1091{
1092 char locals_prefix = (bfd_get_symbol_leading_char (abfd) == '_') ? 'L' : '.';
1093
1094 return (sym->name[0] == locals_prefix);
1095}
1096
This page took 0.214619 seconds and 4 git commands to generate.