a.out.h revision 1.13 1 1.1 cgd /*-
2 1.13 deraadt * Copyright (c) 1993 Theo de Raadt
3 1.1 cgd * Copyright (c) 1991 The Regents of the University of California.
4 1.1 cgd * All rights reserved.
5 1.1 cgd *
6 1.1 cgd * Redistribution and use in source and binary forms, with or without
7 1.1 cgd * modification, are permitted provided that the following conditions
8 1.1 cgd * are met:
9 1.1 cgd * 1. Redistributions of source code must retain the above copyright
10 1.1 cgd * notice, this list of conditions and the following disclaimer.
11 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
12 1.1 cgd * notice, this list of conditions and the following disclaimer in the
13 1.1 cgd * documentation and/or other materials provided with the distribution.
14 1.1 cgd * 3. All advertising materials mentioning features or use of this software
15 1.1 cgd * must display the following acknowledgement:
16 1.1 cgd * This product includes software developed by the University of
17 1.1 cgd * California, Berkeley and its contributors.
18 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
19 1.1 cgd * may be used to endorse or promote products derived from this software
20 1.1 cgd * without specific prior written permission.
21 1.1 cgd *
22 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 cgd * SUCH DAMAGE.
33 1.1 cgd *
34 1.6 mycroft * from: @(#)a.out.h 5.6 (Berkeley) 4/30/91
35 1.13 deraadt * $Id: a.out.h,v 1.13 1994/04/07 06:34:03 deraadt Exp $
36 1.1 cgd */
37 1.1 cgd
38 1.1 cgd #ifndef _AOUT_H_
39 1.1 cgd #define _AOUT_H_
40 1.1 cgd
41 1.1 cgd #include <sys/exec.h>
42 1.10 pk #include <machine/exec.h>
43 1.1 cgd
44 1.1 cgd
45 1.11 mycroft #ifndef N_PAGSIZ
46 1.11 mycroft #define N_PAGSIZ(ex) (__LDPGSZ)
47 1.11 mycroft #endif
48 1.11 mycroft
49 1.13 deraadt /*
50 1.13 deraadt * The a.out structure's a_midmag field is a network-byteorder encoding
51 1.13 deraadt * of this int
52 1.13 deraadt * FFFFFFmmmmmmmmmmMMMMMMMMMMMMMMMM
53 1.13 deraadt * Where `F' is 6 bits of flag like EX_DYNAMIC,
54 1.13 deraadt * `m' is 10 bits of machine-id like MID_I386, and
55 1.13 deraadt * `M' is 16 bits worth of magic number, ie. ZMAGIC.
56 1.13 deraadt * The macros below will set/get the needed fields.
57 1.13 deraadt */
58 1.11 mycroft #define N_GETMAGIC(ex) \
59 1.5 cgd ( (((ex).a_midmag)&0xffff0000) ? (ntohl(((ex).a_midmag))&0xffff) : ((ex).a_midmag))
60 1.11 mycroft #define N_GETMAGIC2(ex) \
61 1.5 cgd ( (((ex).a_midmag)&0xffff0000) ? (ntohl(((ex).a_midmag))&0xffff) : \
62 1.5 cgd (((ex).a_midmag) | 0x10000) )
63 1.11 mycroft #define N_GETMID(ex) \
64 1.5 cgd ( (((ex).a_midmag)&0xffff0000) ? ((ntohl(((ex).a_midmag))>>16)&0x03ff) : MID_ZERO )
65 1.11 mycroft #define N_GETFLAG(ex) \
66 1.5 cgd ( (((ex).a_midmag)&0xffff0000) ? ((ntohl(((ex).a_midmag))>>26)&0x3f) : 0 )
67 1.11 mycroft #define N_SETMAGIC(ex,mag,mid,flag) \
68 1.5 cgd ( (ex).a_midmag = htonl( (((flag)&0x3f)<<26) | (((mid)&0x03ff)<<16) | \
69 1.5 cgd (((mag)&0xffff)) ) )
70 1.5 cgd
71 1.11 mycroft #define N_ALIGN(ex,x) \
72 1.5 cgd (N_GETMAGIC(ex) == ZMAGIC || N_GETMAGIC(ex) == QMAGIC ? \
73 1.13 deraadt ((x) + __LDPGSZ - 1) & ~(__LDPGSZ - 1) : (x))
74 1.2 mycroft
75 1.1 cgd /* Valid magic number check. */
76 1.1 cgd #define N_BADMAG(ex) \
77 1.5 cgd (N_GETMAGIC(ex) != NMAGIC && N_GETMAGIC(ex) != OMAGIC && \
78 1.13 deraadt N_GETMAGIC(ex) != ZMAGIC && N_GETMAGIC(ex) != QMAGIC)
79 1.1 cgd
80 1.1 cgd /* Address of the bottom of the text segment. */
81 1.11 mycroft #define N_TXTADDR(ex) (N_GETMAGIC2(ex) == (ZMAGIC|0x10000) ? 0 : __LDPGSZ)
82 1.1 cgd
83 1.1 cgd /* Address of the bottom of the data segment. */
84 1.11 mycroft #define N_DATADDR(ex) \
85 1.12 pk (N_GETMAGIC(ex) == OMAGIC ? N_TXTADDR(ex) + (ex).a_text : \
86 1.13 deraadt (N_TXTADDR(ex) + (ex).a_text + __LDPGSZ - 1) & ~(__LDPGSZ - 1))
87 1.1 cgd
88 1.11 mycroft /* Address of the bottom of the bss segment. */
89 1.11 mycroft #define N_BSSADDR(ex) \
90 1.12 pk (N_DATADDR(ex) + (ex).a_data)
91 1.11 mycroft
92 1.1 cgd /* Text segment offset. */
93 1.1 cgd #define N_TXTOFF(ex) \
94 1.5 cgd ( N_GETMAGIC2(ex)==ZMAGIC || N_GETMAGIC2(ex)==(QMAGIC|0x10000) ? \
95 1.13 deraadt 0 : (N_GETMAGIC2(ex)==(ZMAGIC|0x10000) ? __LDPGSZ : \
96 1.13 deraadt sizeof(struct exec)) )
97 1.1 cgd
98 1.1 cgd /* Data segment offset. */
99 1.1 cgd #define N_DATOFF(ex) \
100 1.3 mycroft N_ALIGN(ex, N_TXTOFF(ex) + (ex).a_text)
101 1.1 cgd
102 1.11 mycroft /* Text relocation table offset. */
103 1.11 mycroft #define N_TRELOFF(ex) \
104 1.12 pk (N_DATOFF(ex) + (ex).a_data)
105 1.4 mycroft
106 1.11 mycroft /* Data relocation table offset. */
107 1.11 mycroft #define N_DRELOFF(ex) \
108 1.11 mycroft (N_TRELOFF(ex) + (ex).a_trsize)
109 1.11 mycroft
110 1.1 cgd /* Symbol table offset. */
111 1.11 mycroft #define N_SYMOFF(ex) \
112 1.11 mycroft (N_DRELOFF(ex) + (ex).a_drsize)
113 1.1 cgd
114 1.1 cgd /* String table offset. */
115 1.11 mycroft #define N_STROFF(ex) \
116 1.11 mycroft (N_SYMOFF(ex) + (ex).a_syms)
117 1.1 cgd
118 1.11 mycroft #define _AOUT_INCLUDE_
119 1.1 cgd #include <nlist.h>
120 1.1 cgd
121 1.1 cgd #endif /* !_AOUT_H_ */
122