From: Jeff Law Date: Wed, 6 Apr 1994 05:11:31 +0000 (+0000) Subject: * Crude support for examining dynamic libraries. X-Git-Url: https://git.libre-soc.org/?a=commitdiff_plain;h=65b1ef4963ee6e1e788b6ebe0b70f2b96e53d3a4;p=binutils-gdb.git * Crude support for examining dynamic libraries. * som.c (som_object_setup): Set DYNAMIC flag for SHL_MAGIC and DL_MAGIC objects. (som_prep_headers): Preserve the system_id for DYNAMIC objects. Use SHL_MAGIC as the magic number of the DYNAMIC flag is set. Write exec headers for DYNAMIC objects. (som_begin_writing): DYNAMIC objects have the same alignment restrictions as D_PAGED objects. (bfd_section_from_som_symbol): Treat DYNAMIC objects like EXEC_P objects. (object_flags): Add DYNAMIC. --- diff --git a/bfd/ChangeLog b/bfd/ChangeLog index 48f433fdc41..53ef902d08b 100644 --- a/bfd/ChangeLog +++ b/bfd/ChangeLog @@ -1,3 +1,17 @@ +Tue Apr 5 22:10:04 1994 Jeffrey A. Law (law@snake.cs.utah.edu) + + * Crude support for examining dynamic libraries. + * som.c (som_object_setup): Set DYNAMIC flag for SHL_MAGIC and + DL_MAGIC objects. + (som_prep_headers): Preserve the system_id for DYNAMIC objects. + Use SHL_MAGIC as the magic number of the DYNAMIC flag is set. + Write exec headers for DYNAMIC objects. + (som_begin_writing): DYNAMIC objects have the same alignment + restrictions as D_PAGED objects. + (bfd_section_from_som_symbol): Treat DYNAMIC objects like EXEC_P + objects. + (object_flags): Add DYNAMIC. + Tue Apr 5 17:48:52 1994 Stan Shebs (shebs@andros.cygnus.com) * i386lynx.c, sparclynx.c (NAME): Remove embedded whitespace in diff --git a/bfd/som.c b/bfd/som.c index 7d9795b8717..0d359244f4c 100644 --- a/bfd/som.c +++ b/bfd/som.c @@ -1579,6 +1579,15 @@ som_object_setup (abfd, file_hdrp, aux_hdrp) case RELOC_MAGIC: abfd->flags |= HAS_RELOC; break; +#ifdef SHL_MAGIC + case SHL_MAGIC: +#endif +#ifdef DL_MAGIC + case DL_MAGIC: +#endif + abfd->flags |= DYNAMIC; + break; + default: break; } @@ -1955,17 +1964,21 @@ som_prep_headers (abfd) /* FIXME. This should really be conditional based on whether or not PA1.1 instructions/registers have been used. */ - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) file_hdr->system_id = obj_som_exec_data (abfd)->system_id; else file_hdr->system_id = CPU_PA_RISC1_0; - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) { if (abfd->flags & D_PAGED) file_hdr->a_magic = DEMAND_MAGIC; else if (abfd->flags & WP_TEXT) file_hdr->a_magic = SHARE_MAGIC; +#ifdef SHL_MAGIC + else if (abfd->flags & DYNAMIC) + file_hdr->a_magic = SHL_MAGIC; +#endif else file_hdr->a_magic = EXEC_MAGIC; } @@ -2754,7 +2767,7 @@ som_begin_writing (abfd) we support only the copyright and version headers. */ obj_som_file_hdr (abfd)->aux_header_location = current_offset; obj_som_file_hdr (abfd)->aux_header_size = 0; - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) { /* Parts of the exec header will be filled in later, so delay writing the header itself. Fill in the defaults, @@ -2945,7 +2958,7 @@ som_begin_writing (abfd) building an executable, then take care to make sure all the alignments are correct and update the exec header. */ if (first_subspace - && (abfd->flags & EXEC_P)) + && (abfd->flags & (EXEC_P | DYNAMIC))) { /* Demand paged executables have each space aligned to a page boundary. Sharable executables (write-protected @@ -2954,7 +2967,7 @@ som_begin_writing (abfd) The HPUX kernel requires the text to always be page aligned within the file regardless of the executable's type. */ - if (abfd->flags & D_PAGED + if (abfd->flags & (D_PAGED | DYNAMIC) || (subsection->flags & SEC_CODE) || ((abfd->flags & WP_TEXT) && (subsection->flags & SEC_DATA))) @@ -2981,7 +2994,7 @@ som_begin_writing (abfd) /* Only do this for the first subspace within each space. */ first_subspace = 0; } - else if (abfd->flags & EXEC_P) + else if (abfd->flags & (EXEC_P | DYNAMIC)) { /* The braindamaged HPUX loader may have created a hole between two subspaces. It is *not* sufficient to use @@ -3009,10 +3022,10 @@ som_begin_writing (abfd) if (subsection->flags & SEC_LOAD) { /* Update the size of the code & data. */ - if (abfd->flags & EXEC_P + if (abfd->flags & (EXEC_P | DYNAMIC) && subsection->flags & SEC_CODE) exec_header.exec_tsize += subsection->_cooked_size; - else if (abfd->flags & EXEC_P + else if (abfd->flags & (EXEC_P | DYNAMIC) && subsection->flags & SEC_DATA) exec_header.exec_dsize += subsection->_cooked_size; som_section_data (subsection)->subspace_dict->file_loc_init_value @@ -3025,7 +3038,7 @@ som_begin_writing (abfd) else { /* Update the size of the bss section. */ - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) exec_header.exec_bsize += subsection->_cooked_size; som_section_data (subsection)->subspace_dict->file_loc_init_value @@ -3042,7 +3055,7 @@ som_begin_writing (abfd) If building an executable, start the unloadable stuff on its own page. */ - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) current_offset = SOM_ALIGN (current_offset, PA_PAGESIZE); obj_som_file_hdr (abfd)->unloadable_sp_location = current_offset; @@ -3055,7 +3068,7 @@ som_begin_writing (abfd) while (!som_is_space (section)) section = section->next; - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) current_offset = SOM_ALIGN (current_offset, PA_PAGESIZE); /* Now look for all its subspaces. */ @@ -3094,7 +3107,7 @@ som_begin_writing (abfd) /* If building an executable, then make sure to seek to and write one byte at the end of the file to make sure any necessary zeros are filled in. Ugh. */ - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) current_offset = SOM_ALIGN (current_offset, PA_PAGESIZE); if (bfd_seek (abfd, current_offset - 1, SEEK_SET) < 0) return false; @@ -3112,7 +3125,7 @@ som_begin_writing (abfd) obj_som_file_hdr (abfd)->som_length = current_offset; /* Now write the exec header. */ - if (abfd->flags & EXEC_P) + if (abfd->flags & (EXEC_P | DYNAMIC)) { long tmp; @@ -3585,7 +3598,7 @@ bfd_section_from_som_symbol (abfd, symbol) /* The meaning of the symbol_info field changes for functions within executables. So only use the quick symbol_info mapping for incomplete objects and non-function symbols in executables. */ - if ((abfd->flags & EXEC_P) == 0 + if ((abfd->flags & (EXEC_P | DYNAMIC)) == 0 || (symbol->symbol_type != ST_ENTRY && symbol->symbol_type != ST_PRI_PROG && symbol->symbol_type != ST_SEC_PROG @@ -5514,7 +5527,7 @@ bfd_target som_vec = true, /* target headers byte order */ (HAS_RELOC | EXEC_P | /* object flags */ HAS_LINENO | HAS_DEBUG | - HAS_SYMS | HAS_LOCALS | WP_TEXT | D_PAGED), + HAS_SYMS | HAS_LOCALS | WP_TEXT | D_PAGED | DYNAMIC), (SEC_CODE | SEC_DATA | SEC_ROM | SEC_HAS_CONTENTS | SEC_ALLOC | SEC_LOAD | SEC_RELOC), /* section flags */