ctf_create.c revision 178525
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License").  You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22
23/*
24 * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
25 * Use is subject to license terms.
26 */
27
28#pragma ident	"%Z%%M%	%I%	%E% SMI"
29
30#include <sys/sysmacros.h>
31#include <sys/param.h>
32#include <sys/mman.h>
33#include <ctf_impl.h>
34
35/*
36 * This static string is used as the template for initially populating a
37 * dynamic container's string table.  We always store \0 in the first byte,
38 * and we use the generic string "PARENT" to mark this container's parent
39 * if one is associated with the container using ctf_import().
40 */
41static const char _CTF_STRTAB_TEMPLATE[] = "\0PARENT";
42
43/*
44 * To create an empty CTF container, we just declare a zeroed header and call
45 * ctf_bufopen() on it.  If ctf_bufopen succeeds, we mark the new container r/w
46 * and initialize the dynamic members.  We set dtstrlen to 1 to reserve the
47 * first byte of the string table for a \0 byte, and we start assigning type
48 * IDs at 1 because type ID 0 is used as a sentinel.
49 */
50ctf_file_t *
51ctf_create(int *errp)
52{
53	static const ctf_header_t hdr = { { CTF_MAGIC, CTF_VERSION, 0 } };
54
55	const ulong_t hashlen = 128;
56	ctf_dtdef_t **hash = ctf_alloc(hashlen * sizeof (ctf_dtdef_t *));
57	ctf_sect_t cts;
58	ctf_file_t *fp;
59
60	if (hash == NULL)
61		return (ctf_set_open_errno(errp, EAGAIN));
62
63	cts.cts_name = _CTF_SECTION;
64	cts.cts_type = SHT_PROGBITS;
65	cts.cts_flags = 0;
66	cts.cts_data = &hdr;
67	cts.cts_size = sizeof (hdr);
68	cts.cts_entsize = 1;
69	cts.cts_offset = 0;
70
71	if ((fp = ctf_bufopen(&cts, NULL, NULL, errp)) == NULL) {
72		ctf_free(hash, hashlen * sizeof (ctf_dtdef_t *));
73		return (NULL);
74	}
75
76	fp->ctf_flags |= LCTF_RDWR;
77	fp->ctf_dthashlen = hashlen;
78	bzero(hash, hashlen * sizeof (ctf_dtdef_t *));
79	fp->ctf_dthash = hash;
80	fp->ctf_dtstrlen = sizeof (_CTF_STRTAB_TEMPLATE);
81	fp->ctf_dtnextid = 1;
82	fp->ctf_dtoldid = 0;
83
84	return (fp);
85}
86
87static uchar_t *
88ctf_copy_smembers(ctf_dtdef_t *dtd, uint_t soff, uchar_t *t)
89{
90	ctf_dmdef_t *dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
91	ctf_member_t ctm;
92
93	for (; dmd != NULL; dmd = ctf_list_next(dmd)) {
94		if (dmd->dmd_name) {
95			ctm.ctm_name = soff;
96			soff += strlen(dmd->dmd_name) + 1;
97		} else
98			ctm.ctm_name = 0;
99
100		ctm.ctm_type = (ushort_t)dmd->dmd_type;
101		ctm.ctm_offset = (ushort_t)dmd->dmd_offset;
102
103		bcopy(&ctm, t, sizeof (ctm));
104		t += sizeof (ctm);
105	}
106
107	return (t);
108}
109
110static uchar_t *
111ctf_copy_lmembers(ctf_dtdef_t *dtd, uint_t soff, uchar_t *t)
112{
113	ctf_dmdef_t *dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
114	ctf_lmember_t ctlm;
115
116	for (; dmd != NULL; dmd = ctf_list_next(dmd)) {
117		if (dmd->dmd_name) {
118			ctlm.ctlm_name = soff;
119			soff += strlen(dmd->dmd_name) + 1;
120		} else
121			ctlm.ctlm_name = 0;
122
123		ctlm.ctlm_type = (ushort_t)dmd->dmd_type;
124		ctlm.ctlm_pad = 0;
125		ctlm.ctlm_offsethi = CTF_OFFSET_TO_LMEMHI(dmd->dmd_offset);
126		ctlm.ctlm_offsetlo = CTF_OFFSET_TO_LMEMLO(dmd->dmd_offset);
127
128		bcopy(&ctlm, t, sizeof (ctlm));
129		t += sizeof (ctlm);
130	}
131
132	return (t);
133}
134
135static uchar_t *
136ctf_copy_emembers(ctf_dtdef_t *dtd, uint_t soff, uchar_t *t)
137{
138	ctf_dmdef_t *dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
139	ctf_enum_t cte;
140
141	for (; dmd != NULL; dmd = ctf_list_next(dmd)) {
142		cte.cte_name = soff;
143		cte.cte_value = dmd->dmd_value;
144		soff += strlen(dmd->dmd_name) + 1;
145		bcopy(&cte, t, sizeof (cte));
146		t += sizeof (cte);
147	}
148
149	return (t);
150}
151
152static uchar_t *
153ctf_copy_membnames(ctf_dtdef_t *dtd, uchar_t *s)
154{
155	ctf_dmdef_t *dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
156	size_t len;
157
158	for (; dmd != NULL; dmd = ctf_list_next(dmd)) {
159		if (dmd->dmd_name == NULL)
160			continue; /* skip anonymous members */
161		len = strlen(dmd->dmd_name) + 1;
162		bcopy(dmd->dmd_name, s, len);
163		s += len;
164	}
165
166	return (s);
167}
168
169/*
170 * If the specified CTF container is writable and has been modified, reload
171 * this container with the updated type definitions.  In order to make this
172 * code and the rest of libctf as simple as possible, we perform updates by
173 * taking the dynamic type definitions and creating an in-memory CTF file
174 * containing the definitions, and then call ctf_bufopen() on it.  This not
175 * only leverages ctf_bufopen(), but also avoids having to bifurcate the rest
176 * of the library code with different lookup paths for static and dynamic
177 * type definitions.  We are therefore optimizing greatly for lookup over
178 * update, which we assume will be an uncommon operation.  We perform one
179 * extra trick here for the benefit of callers and to keep our code simple:
180 * ctf_bufopen() will return a new ctf_file_t, but we want to keep the fp
181 * constant for the caller, so after ctf_bufopen() returns, we use bcopy to
182 * swap the interior of the old and new ctf_file_t's, and then free the old.
183 */
184int
185ctf_update(ctf_file_t *fp)
186{
187	ctf_file_t ofp, *nfp;
188	ctf_header_t hdr;
189	ctf_dtdef_t *dtd;
190	ctf_sect_t cts;
191
192	uchar_t *s, *s0, *t;
193	size_t size;
194	void *buf;
195	int err;
196
197	if (!(fp->ctf_flags & LCTF_RDWR))
198		return (ctf_set_errno(fp, ECTF_RDONLY));
199
200	if (!(fp->ctf_flags & LCTF_DIRTY))
201		return (0); /* no update required */
202
203	/*
204	 * Fill in an initial CTF header.  We will leave the label, object,
205	 * and function sections empty and only output a header, type section,
206	 * and string table.  The type section begins at a 4-byte aligned
207	 * boundary past the CTF header itself (at relative offset zero).
208	 */
209	bzero(&hdr, sizeof (hdr));
210	hdr.cth_magic = CTF_MAGIC;
211	hdr.cth_version = CTF_VERSION;
212
213	if (fp->ctf_flags & LCTF_CHILD)
214		hdr.cth_parname = 1; /* i.e. _CTF_STRTAB_TEMPLATE[1] */
215
216	/*
217	 * Iterate through the dynamic type definition list and compute the
218	 * size of the CTF type section we will need to generate.
219	 */
220	for (size = 0, dtd = ctf_list_next(&fp->ctf_dtdefs);
221	    dtd != NULL; dtd = ctf_list_next(dtd)) {
222
223		uint_t kind = CTF_INFO_KIND(dtd->dtd_data.ctt_info);
224		uint_t vlen = CTF_INFO_VLEN(dtd->dtd_data.ctt_info);
225
226		if (dtd->dtd_data.ctt_size != CTF_LSIZE_SENT)
227			size += sizeof (ctf_stype_t);
228		else
229			size += sizeof (ctf_type_t);
230
231		switch (kind) {
232		case CTF_K_INTEGER:
233		case CTF_K_FLOAT:
234			size += sizeof (uint_t);
235			break;
236		case CTF_K_ARRAY:
237			size += sizeof (ctf_array_t);
238			break;
239		case CTF_K_FUNCTION:
240			size += sizeof (ushort_t) * (vlen + (vlen & 1));
241			break;
242		case CTF_K_STRUCT:
243		case CTF_K_UNION:
244			if (dtd->dtd_data.ctt_size < CTF_LSTRUCT_THRESH)
245				size += sizeof (ctf_member_t) * vlen;
246			else
247				size += sizeof (ctf_lmember_t) * vlen;
248			break;
249		case CTF_K_ENUM:
250			size += sizeof (ctf_enum_t) * vlen;
251			break;
252		}
253	}
254
255	/*
256	 * Fill in the string table offset and size, compute the size of the
257	 * entire CTF buffer we need, and then allocate a new buffer and
258	 * bcopy the finished header to the start of the buffer.
259	 */
260	hdr.cth_stroff = hdr.cth_typeoff + size;
261	hdr.cth_strlen = fp->ctf_dtstrlen;
262	size = sizeof (ctf_header_t) + hdr.cth_stroff + hdr.cth_strlen;
263
264	if ((buf = ctf_data_alloc(size)) == MAP_FAILED)
265		return (ctf_set_errno(fp, EAGAIN));
266
267	bcopy(&hdr, buf, sizeof (ctf_header_t));
268	t = (uchar_t *)buf + sizeof (ctf_header_t);
269	s = s0 = (uchar_t *)buf + sizeof (ctf_header_t) + hdr.cth_stroff;
270
271	bcopy(_CTF_STRTAB_TEMPLATE, s, sizeof (_CTF_STRTAB_TEMPLATE));
272	s += sizeof (_CTF_STRTAB_TEMPLATE);
273
274	/*
275	 * We now take a final lap through the dynamic type definition list and
276	 * copy the appropriate type records and strings to the output buffer.
277	 */
278	for (dtd = ctf_list_next(&fp->ctf_dtdefs);
279	    dtd != NULL; dtd = ctf_list_next(dtd)) {
280
281		uint_t kind = CTF_INFO_KIND(dtd->dtd_data.ctt_info);
282		uint_t vlen = CTF_INFO_VLEN(dtd->dtd_data.ctt_info);
283
284		ctf_array_t cta;
285		uint_t encoding;
286		size_t len;
287
288		if (dtd->dtd_name != NULL) {
289			dtd->dtd_data.ctt_name = (uint_t)(s - s0);
290			len = strlen(dtd->dtd_name) + 1;
291			bcopy(dtd->dtd_name, s, len);
292			s += len;
293		} else
294			dtd->dtd_data.ctt_name = 0;
295
296		if (dtd->dtd_data.ctt_size != CTF_LSIZE_SENT)
297			len = sizeof (ctf_stype_t);
298		else
299			len = sizeof (ctf_type_t);
300
301		bcopy(&dtd->dtd_data, t, len);
302		t += len;
303
304		switch (kind) {
305		case CTF_K_INTEGER:
306		case CTF_K_FLOAT:
307			if (kind == CTF_K_INTEGER) {
308				encoding = CTF_INT_DATA(
309				    dtd->dtd_u.dtu_enc.cte_format,
310				    dtd->dtd_u.dtu_enc.cte_offset,
311				    dtd->dtd_u.dtu_enc.cte_bits);
312			} else {
313				encoding = CTF_FP_DATA(
314				    dtd->dtd_u.dtu_enc.cte_format,
315				    dtd->dtd_u.dtu_enc.cte_offset,
316				    dtd->dtd_u.dtu_enc.cte_bits);
317			}
318			bcopy(&encoding, t, sizeof (encoding));
319			t += sizeof (encoding);
320			break;
321
322		case CTF_K_ARRAY:
323			cta.cta_contents = (ushort_t)
324			    dtd->dtd_u.dtu_arr.ctr_contents;
325			cta.cta_index = (ushort_t)
326			    dtd->dtd_u.dtu_arr.ctr_index;
327			cta.cta_nelems = dtd->dtd_u.dtu_arr.ctr_nelems;
328			bcopy(&cta, t, sizeof (cta));
329			t += sizeof (cta);
330			break;
331
332		case CTF_K_FUNCTION: {
333			ushort_t *argv = (ushort_t *)(uintptr_t)t;
334			uint_t argc;
335
336			for (argc = 0; argc < vlen; argc++)
337				*argv++ = (ushort_t)dtd->dtd_u.dtu_argv[argc];
338
339			if (vlen & 1)
340				*argv++ = 0; /* pad to 4-byte boundary */
341
342			t = (uchar_t *)argv;
343			break;
344		}
345
346		case CTF_K_STRUCT:
347		case CTF_K_UNION:
348			if (dtd->dtd_data.ctt_size < CTF_LSTRUCT_THRESH)
349				t = ctf_copy_smembers(dtd, (uint_t)(s - s0), t);
350			else
351				t = ctf_copy_lmembers(dtd, (uint_t)(s - s0), t);
352			s = ctf_copy_membnames(dtd, s);
353			break;
354
355		case CTF_K_ENUM:
356			t = ctf_copy_emembers(dtd, (uint_t)(s - s0), t);
357			s = ctf_copy_membnames(dtd, s);
358			break;
359		}
360	}
361
362	/*
363	 * Finally, we are ready to ctf_bufopen() the new container.  If this
364	 * is successful, we then switch nfp and fp and free the old container.
365	 */
366	ctf_data_protect(buf, size);
367	cts.cts_name = _CTF_SECTION;
368	cts.cts_type = SHT_PROGBITS;
369	cts.cts_flags = 0;
370	cts.cts_data = buf;
371	cts.cts_size = size;
372	cts.cts_entsize = 1;
373	cts.cts_offset = 0;
374
375	if ((nfp = ctf_bufopen(&cts, NULL, NULL, &err)) == NULL) {
376		ctf_data_free(buf, size);
377		return (ctf_set_errno(fp, err));
378	}
379
380	(void) ctf_setmodel(nfp, ctf_getmodel(fp));
381	(void) ctf_import(nfp, fp->ctf_parent);
382
383	nfp->ctf_refcnt = fp->ctf_refcnt;
384	nfp->ctf_flags |= fp->ctf_flags & ~LCTF_DIRTY;
385	nfp->ctf_data.cts_data = NULL; /* force ctf_data_free() on close */
386	nfp->ctf_dthash = fp->ctf_dthash;
387	nfp->ctf_dthashlen = fp->ctf_dthashlen;
388	nfp->ctf_dtdefs = fp->ctf_dtdefs;
389	nfp->ctf_dtstrlen = fp->ctf_dtstrlen;
390	nfp->ctf_dtnextid = fp->ctf_dtnextid;
391	nfp->ctf_dtoldid = fp->ctf_dtnextid - 1;
392	nfp->ctf_specific = fp->ctf_specific;
393
394	fp->ctf_dthash = NULL;
395	fp->ctf_dthashlen = 0;
396	bzero(&fp->ctf_dtdefs, sizeof (ctf_list_t));
397
398	bcopy(fp, &ofp, sizeof (ctf_file_t));
399	bcopy(nfp, fp, sizeof (ctf_file_t));
400	bcopy(&ofp, nfp, sizeof (ctf_file_t));
401
402	/*
403	 * Initialize the ctf_lookup_by_name top-level dictionary.  We keep an
404	 * array of type name prefixes and the corresponding ctf_hash to use.
405	 * NOTE: This code must be kept in sync with the code in ctf_bufopen().
406	 */
407	fp->ctf_lookups[0].ctl_hash = &fp->ctf_structs;
408	fp->ctf_lookups[1].ctl_hash = &fp->ctf_unions;
409	fp->ctf_lookups[2].ctl_hash = &fp->ctf_enums;
410	fp->ctf_lookups[3].ctl_hash = &fp->ctf_names;
411
412	nfp->ctf_refcnt = 1; /* force nfp to be freed */
413	ctf_close(nfp);
414
415	return (0);
416}
417
418void
419ctf_dtd_insert(ctf_file_t *fp, ctf_dtdef_t *dtd)
420{
421	ulong_t h = dtd->dtd_type & (fp->ctf_dthashlen - 1);
422
423	dtd->dtd_hash = fp->ctf_dthash[h];
424	fp->ctf_dthash[h] = dtd;
425	ctf_list_append(&fp->ctf_dtdefs, dtd);
426}
427
428void
429ctf_dtd_delete(ctf_file_t *fp, ctf_dtdef_t *dtd)
430{
431	ulong_t h = dtd->dtd_type & (fp->ctf_dthashlen - 1);
432	ctf_dtdef_t *p, **q = &fp->ctf_dthash[h];
433	ctf_dmdef_t *dmd, *nmd;
434	size_t len;
435
436	for (p = *q; p != NULL; p = p->dtd_hash) {
437		if (p != dtd)
438			q = &p->dtd_hash;
439		else
440			break;
441	}
442
443	if (p != NULL)
444		*q = p->dtd_hash;
445
446	switch (CTF_INFO_KIND(dtd->dtd_data.ctt_info)) {
447	case CTF_K_STRUCT:
448	case CTF_K_UNION:
449	case CTF_K_ENUM:
450		for (dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
451		    dmd != NULL; dmd = nmd) {
452			if (dmd->dmd_name != NULL) {
453				len = strlen(dmd->dmd_name) + 1;
454				ctf_free(dmd->dmd_name, len);
455				fp->ctf_dtstrlen -= len;
456			}
457			nmd = ctf_list_next(dmd);
458			ctf_free(dmd, sizeof (ctf_dmdef_t));
459		}
460		break;
461	case CTF_K_FUNCTION:
462		ctf_free(dtd->dtd_u.dtu_argv, sizeof (ctf_id_t) *
463		    CTF_INFO_VLEN(dtd->dtd_data.ctt_info));
464		break;
465	}
466
467	if (dtd->dtd_name) {
468		len = strlen(dtd->dtd_name) + 1;
469		ctf_free(dtd->dtd_name, len);
470		fp->ctf_dtstrlen -= len;
471	}
472
473	ctf_list_delete(&fp->ctf_dtdefs, dtd);
474	ctf_free(dtd, sizeof (ctf_dtdef_t));
475}
476
477ctf_dtdef_t *
478ctf_dtd_lookup(ctf_file_t *fp, ctf_id_t type)
479{
480	ulong_t h = type & (fp->ctf_dthashlen - 1);
481	ctf_dtdef_t *dtd;
482
483	if (fp->ctf_dthash == NULL)
484		return (NULL);
485
486	for (dtd = fp->ctf_dthash[h]; dtd != NULL; dtd = dtd->dtd_hash) {
487		if (dtd->dtd_type == type)
488			break;
489	}
490
491	return (dtd);
492}
493
494/*
495 * Discard all of the dynamic type definitions that have been added to the
496 * container since the last call to ctf_update().  We locate such types by
497 * scanning the list and deleting elements that have type IDs greater than
498 * ctf_dtoldid, which is set by ctf_update(), above.
499 */
500int
501ctf_discard(ctf_file_t *fp)
502{
503	ctf_dtdef_t *dtd, *ntd;
504
505	if (!(fp->ctf_flags & LCTF_RDWR))
506		return (ctf_set_errno(fp, ECTF_RDONLY));
507
508	if (!(fp->ctf_flags & LCTF_DIRTY))
509		return (0); /* no update required */
510
511	for (dtd = ctf_list_next(&fp->ctf_dtdefs); dtd != NULL; dtd = ntd) {
512		if (dtd->dtd_type <= fp->ctf_dtoldid)
513			continue; /* skip types that have been committed */
514
515		ntd = ctf_list_next(dtd);
516		ctf_dtd_delete(fp, dtd);
517	}
518
519	fp->ctf_dtnextid = fp->ctf_dtoldid + 1;
520	fp->ctf_flags &= ~LCTF_DIRTY;
521
522	return (0);
523}
524
525static ctf_id_t
526ctf_add_generic(ctf_file_t *fp, uint_t flag, const char *name, ctf_dtdef_t **rp)
527{
528	ctf_dtdef_t *dtd;
529	ctf_id_t type;
530	char *s = NULL;
531
532	if (flag != CTF_ADD_NONROOT && flag != CTF_ADD_ROOT)
533		return (ctf_set_errno(fp, EINVAL));
534
535	if (!(fp->ctf_flags & LCTF_RDWR))
536		return (ctf_set_errno(fp, ECTF_RDONLY));
537
538	if (CTF_INDEX_TO_TYPE(fp->ctf_dtnextid, 1) > CTF_MAX_TYPE)
539		return (ctf_set_errno(fp, ECTF_FULL));
540
541	if ((dtd = ctf_alloc(sizeof (ctf_dtdef_t))) == NULL)
542		return (ctf_set_errno(fp, EAGAIN));
543
544	if (name != NULL && (s = ctf_strdup(name)) == NULL) {
545		ctf_free(dtd, sizeof (ctf_dtdef_t));
546		return (ctf_set_errno(fp, EAGAIN));
547	}
548
549	type = fp->ctf_dtnextid++;
550	type = CTF_INDEX_TO_TYPE(type, (fp->ctf_flags & LCTF_CHILD));
551
552	bzero(dtd, sizeof (ctf_dtdef_t));
553	dtd->dtd_name = s;
554	dtd->dtd_type = type;
555
556	if (s != NULL)
557		fp->ctf_dtstrlen += strlen(s) + 1;
558
559	ctf_dtd_insert(fp, dtd);
560	fp->ctf_flags |= LCTF_DIRTY;
561
562	*rp = dtd;
563	return (type);
564}
565
566/*
567 * When encoding integer sizes, we want to convert a byte count in the range
568 * 1-8 to the closest power of 2 (e.g. 3->4, 5->8, etc).  The clp2() function
569 * is a clever implementation from "Hacker's Delight" by Henry Warren, Jr.
570 */
571static size_t
572clp2(size_t x)
573{
574	x--;
575
576	x |= (x >> 1);
577	x |= (x >> 2);
578	x |= (x >> 4);
579	x |= (x >> 8);
580	x |= (x >> 16);
581
582	return (x + 1);
583}
584
585static ctf_id_t
586ctf_add_encoded(ctf_file_t *fp, uint_t flag,
587    const char *name, const ctf_encoding_t *ep, uint_t kind)
588{
589	ctf_dtdef_t *dtd;
590	ctf_id_t type;
591
592	if (ep == NULL)
593		return (ctf_set_errno(fp, EINVAL));
594
595	if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
596		return (CTF_ERR); /* errno is set for us */
597
598	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(kind, flag, 0);
599	dtd->dtd_data.ctt_size = clp2(P2ROUNDUP(ep->cte_bits, NBBY) / NBBY);
600	dtd->dtd_u.dtu_enc = *ep;
601
602	return (type);
603}
604
605static ctf_id_t
606ctf_add_reftype(ctf_file_t *fp, uint_t flag, ctf_id_t ref, uint_t kind)
607{
608	ctf_dtdef_t *dtd;
609	ctf_id_t type;
610
611	if (ref == CTF_ERR || ref < 0 || ref > CTF_MAX_TYPE)
612		return (ctf_set_errno(fp, EINVAL));
613
614	if ((type = ctf_add_generic(fp, flag, NULL, &dtd)) == CTF_ERR)
615		return (CTF_ERR); /* errno is set for us */
616
617	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(kind, flag, 0);
618	dtd->dtd_data.ctt_type = (ushort_t)ref;
619
620	return (type);
621}
622
623ctf_id_t
624ctf_add_integer(ctf_file_t *fp, uint_t flag,
625    const char *name, const ctf_encoding_t *ep)
626{
627	return (ctf_add_encoded(fp, flag, name, ep, CTF_K_INTEGER));
628}
629
630ctf_id_t
631ctf_add_float(ctf_file_t *fp, uint_t flag,
632    const char *name, const ctf_encoding_t *ep)
633{
634	return (ctf_add_encoded(fp, flag, name, ep, CTF_K_FLOAT));
635}
636
637ctf_id_t
638ctf_add_pointer(ctf_file_t *fp, uint_t flag, ctf_id_t ref)
639{
640	return (ctf_add_reftype(fp, flag, ref, CTF_K_POINTER));
641}
642
643ctf_id_t
644ctf_add_array(ctf_file_t *fp, uint_t flag, const ctf_arinfo_t *arp)
645{
646	ctf_dtdef_t *dtd;
647	ctf_id_t type;
648
649	if (arp == NULL)
650		return (ctf_set_errno(fp, EINVAL));
651
652	if ((type = ctf_add_generic(fp, flag, NULL, &dtd)) == CTF_ERR)
653		return (CTF_ERR); /* errno is set for us */
654
655	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_ARRAY, flag, 0);
656	dtd->dtd_data.ctt_size = 0;
657	dtd->dtd_u.dtu_arr = *arp;
658
659	return (type);
660}
661
662int
663ctf_set_array(ctf_file_t *fp, ctf_id_t type, const ctf_arinfo_t *arp)
664{
665	ctf_dtdef_t *dtd = ctf_dtd_lookup(fp, type);
666
667	if (!(fp->ctf_flags & LCTF_RDWR))
668		return (ctf_set_errno(fp, ECTF_RDONLY));
669
670	if (dtd == NULL || CTF_INFO_KIND(dtd->dtd_data.ctt_info) != CTF_K_ARRAY)
671		return (ctf_set_errno(fp, ECTF_BADID));
672
673	fp->ctf_flags |= LCTF_DIRTY;
674	dtd->dtd_u.dtu_arr = *arp;
675
676	return (0);
677}
678
679ctf_id_t
680ctf_add_function(ctf_file_t *fp, uint_t flag,
681    const ctf_funcinfo_t *ctc, const ctf_id_t *argv)
682{
683	ctf_dtdef_t *dtd;
684	ctf_id_t type;
685	uint_t vlen;
686	ctf_id_t *vdat = NULL;
687
688	if (ctc == NULL || (ctc->ctc_flags & ~CTF_FUNC_VARARG) != 0 ||
689	    (ctc->ctc_argc != 0 && argv == NULL))
690		return (ctf_set_errno(fp, EINVAL));
691
692	vlen = ctc->ctc_argc;
693	if (ctc->ctc_flags & CTF_FUNC_VARARG)
694		vlen++; /* add trailing zero to indicate varargs (see below) */
695
696	if (vlen > CTF_MAX_VLEN)
697		return (ctf_set_errno(fp, EOVERFLOW));
698
699	if (vlen != 0 && (vdat = ctf_alloc(sizeof (ctf_id_t) * vlen)) == NULL)
700		return (ctf_set_errno(fp, EAGAIN));
701
702	if ((type = ctf_add_generic(fp, flag, NULL, &dtd)) == CTF_ERR) {
703		ctf_free(vdat, sizeof (ctf_id_t) * vlen);
704		return (CTF_ERR); /* errno is set for us */
705	}
706
707	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_FUNCTION, flag, vlen);
708	dtd->dtd_data.ctt_type = (ushort_t)ctc->ctc_return;
709
710	bcopy(argv, vdat, sizeof (ctf_id_t) * ctc->ctc_argc);
711	if (ctc->ctc_flags & CTF_FUNC_VARARG)
712		vdat[vlen - 1] = 0; /* add trailing zero to indicate varargs */
713	dtd->dtd_u.dtu_argv = vdat;
714
715	return (type);
716}
717
718ctf_id_t
719ctf_add_struct(ctf_file_t *fp, uint_t flag, const char *name)
720{
721	ctf_hash_t *hp = &fp->ctf_structs;
722	ctf_helem_t *hep = NULL;
723	ctf_dtdef_t *dtd;
724	ctf_id_t type;
725
726	if (name != NULL)
727		hep = ctf_hash_lookup(hp, fp, name, strlen(name));
728
729	if (hep != NULL && ctf_type_kind(fp, hep->h_type) == CTF_K_FORWARD)
730		dtd = ctf_dtd_lookup(fp, type = hep->h_type);
731	else if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
732		return (CTF_ERR); /* errno is set for us */
733
734	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_STRUCT, flag, 0);
735	dtd->dtd_data.ctt_size = 0;
736
737	return (type);
738}
739
740ctf_id_t
741ctf_add_union(ctf_file_t *fp, uint_t flag, const char *name)
742{
743	ctf_hash_t *hp = &fp->ctf_unions;
744	ctf_helem_t *hep = NULL;
745	ctf_dtdef_t *dtd;
746	ctf_id_t type;
747
748	if (name != NULL)
749		hep = ctf_hash_lookup(hp, fp, name, strlen(name));
750
751	if (hep != NULL && ctf_type_kind(fp, hep->h_type) == CTF_K_FORWARD)
752		dtd = ctf_dtd_lookup(fp, type = hep->h_type);
753	else if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
754		return (CTF_ERR); /* errno is set for us */
755
756	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_UNION, flag, 0);
757	dtd->dtd_data.ctt_size = 0;
758
759	return (type);
760}
761
762ctf_id_t
763ctf_add_enum(ctf_file_t *fp, uint_t flag, const char *name)
764{
765	ctf_hash_t *hp = &fp->ctf_enums;
766	ctf_helem_t *hep = NULL;
767	ctf_dtdef_t *dtd;
768	ctf_id_t type;
769
770	if (name != NULL)
771		hep = ctf_hash_lookup(hp, fp, name, strlen(name));
772
773	if (hep != NULL && ctf_type_kind(fp, hep->h_type) == CTF_K_FORWARD)
774		dtd = ctf_dtd_lookup(fp, type = hep->h_type);
775	else if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
776		return (CTF_ERR); /* errno is set for us */
777
778	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_ENUM, flag, 0);
779	dtd->dtd_data.ctt_size = fp->ctf_dmodel->ctd_int;
780
781	return (type);
782}
783
784ctf_id_t
785ctf_add_forward(ctf_file_t *fp, uint_t flag, const char *name, uint_t kind)
786{
787	ctf_hash_t *hp;
788	ctf_helem_t *hep;
789	ctf_dtdef_t *dtd;
790	ctf_id_t type;
791
792	switch (kind) {
793	case CTF_K_STRUCT:
794		hp = &fp->ctf_structs;
795		break;
796	case CTF_K_UNION:
797		hp = &fp->ctf_unions;
798		break;
799	case CTF_K_ENUM:
800		hp = &fp->ctf_enums;
801		break;
802	default:
803		return (ctf_set_errno(fp, ECTF_NOTSUE));
804	}
805
806	/*
807	 * If the type is already defined or exists as a forward tag, just
808	 * return the ctf_id_t of the existing definition.
809	 */
810	if (name != NULL && (hep = ctf_hash_lookup(hp,
811	    fp, name, strlen(name))) != NULL)
812		return (hep->h_type);
813
814	if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
815		return (CTF_ERR); /* errno is set for us */
816
817	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_FORWARD, flag, 0);
818	dtd->dtd_data.ctt_type = kind;
819
820	return (type);
821}
822
823ctf_id_t
824ctf_add_typedef(ctf_file_t *fp, uint_t flag, const char *name, ctf_id_t ref)
825{
826	ctf_dtdef_t *dtd;
827	ctf_id_t type;
828
829	if (ref == CTF_ERR || ref < 0 || ref > CTF_MAX_TYPE)
830		return (ctf_set_errno(fp, EINVAL));
831
832	if ((type = ctf_add_generic(fp, flag, name, &dtd)) == CTF_ERR)
833		return (CTF_ERR); /* errno is set for us */
834
835	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(CTF_K_TYPEDEF, flag, 0);
836	dtd->dtd_data.ctt_type = (ushort_t)ref;
837
838	return (type);
839}
840
841ctf_id_t
842ctf_add_volatile(ctf_file_t *fp, uint_t flag, ctf_id_t ref)
843{
844	return (ctf_add_reftype(fp, flag, ref, CTF_K_VOLATILE));
845}
846
847ctf_id_t
848ctf_add_const(ctf_file_t *fp, uint_t flag, ctf_id_t ref)
849{
850	return (ctf_add_reftype(fp, flag, ref, CTF_K_CONST));
851}
852
853ctf_id_t
854ctf_add_restrict(ctf_file_t *fp, uint_t flag, ctf_id_t ref)
855{
856	return (ctf_add_reftype(fp, flag, ref, CTF_K_RESTRICT));
857}
858
859int
860ctf_add_enumerator(ctf_file_t *fp, ctf_id_t enid, const char *name, int value)
861{
862	ctf_dtdef_t *dtd = ctf_dtd_lookup(fp, enid);
863	ctf_dmdef_t *dmd;
864
865	uint_t kind, vlen, root;
866	char *s;
867
868	if (name == NULL)
869		return (ctf_set_errno(fp, EINVAL));
870
871	if (!(fp->ctf_flags & LCTF_RDWR))
872		return (ctf_set_errno(fp, ECTF_RDONLY));
873
874	if (dtd == NULL)
875		return (ctf_set_errno(fp, ECTF_BADID));
876
877	kind = CTF_INFO_KIND(dtd->dtd_data.ctt_info);
878	root = CTF_INFO_ISROOT(dtd->dtd_data.ctt_info);
879	vlen = CTF_INFO_VLEN(dtd->dtd_data.ctt_info);
880
881	if (kind != CTF_K_ENUM)
882		return (ctf_set_errno(fp, ECTF_NOTENUM));
883
884	if (vlen == CTF_MAX_VLEN)
885		return (ctf_set_errno(fp, ECTF_DTFULL));
886
887	for (dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
888	    dmd != NULL; dmd = ctf_list_next(dmd)) {
889		if (strcmp(dmd->dmd_name, name) == 0)
890			return (ctf_set_errno(fp, ECTF_DUPMEMBER));
891	}
892
893	if ((dmd = ctf_alloc(sizeof (ctf_dmdef_t))) == NULL)
894		return (ctf_set_errno(fp, EAGAIN));
895
896	if ((s = ctf_strdup(name)) == NULL) {
897		ctf_free(dmd, sizeof (ctf_dmdef_t));
898		return (ctf_set_errno(fp, EAGAIN));
899	}
900
901	dmd->dmd_name = s;
902	dmd->dmd_type = CTF_ERR;
903	dmd->dmd_offset = 0;
904	dmd->dmd_value = value;
905
906	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(kind, root, vlen + 1);
907	ctf_list_append(&dtd->dtd_u.dtu_members, dmd);
908
909	fp->ctf_dtstrlen += strlen(s) + 1;
910	fp->ctf_flags |= LCTF_DIRTY;
911
912	return (0);
913}
914
915int
916ctf_add_member(ctf_file_t *fp, ctf_id_t souid, const char *name, ctf_id_t type)
917{
918	ctf_dtdef_t *dtd = ctf_dtd_lookup(fp, souid);
919	ctf_dmdef_t *dmd;
920
921	ssize_t msize, malign, ssize;
922	uint_t kind, vlen, root;
923	char *s = NULL;
924
925	if (!(fp->ctf_flags & LCTF_RDWR))
926		return (ctf_set_errno(fp, ECTF_RDONLY));
927
928	if (dtd == NULL)
929		return (ctf_set_errno(fp, ECTF_BADID));
930
931	kind = CTF_INFO_KIND(dtd->dtd_data.ctt_info);
932	root = CTF_INFO_ISROOT(dtd->dtd_data.ctt_info);
933	vlen = CTF_INFO_VLEN(dtd->dtd_data.ctt_info);
934
935	if (kind != CTF_K_STRUCT && kind != CTF_K_UNION)
936		return (ctf_set_errno(fp, ECTF_NOTSOU));
937
938	if (vlen == CTF_MAX_VLEN)
939		return (ctf_set_errno(fp, ECTF_DTFULL));
940
941	if (name != NULL) {
942		for (dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
943		    dmd != NULL; dmd = ctf_list_next(dmd)) {
944			if (dmd->dmd_name != NULL &&
945			    strcmp(dmd->dmd_name, name) == 0)
946				return (ctf_set_errno(fp, ECTF_DUPMEMBER));
947		}
948	}
949
950	if ((msize = ctf_type_size(fp, type)) == CTF_ERR ||
951	    (malign = ctf_type_align(fp, type)) == CTF_ERR)
952		return (CTF_ERR); /* errno is set for us */
953
954	if ((dmd = ctf_alloc(sizeof (ctf_dmdef_t))) == NULL)
955		return (ctf_set_errno(fp, EAGAIN));
956
957	if (name != NULL && (s = ctf_strdup(name)) == NULL) {
958		ctf_free(dmd, sizeof (ctf_dmdef_t));
959		return (ctf_set_errno(fp, EAGAIN));
960	}
961
962	dmd->dmd_name = s;
963	dmd->dmd_type = type;
964	dmd->dmd_value = -1;
965
966	if (kind == CTF_K_STRUCT && vlen != 0) {
967		ctf_dmdef_t *lmd = ctf_list_prev(&dtd->dtd_u.dtu_members);
968		ctf_id_t ltype = ctf_type_resolve(fp, lmd->dmd_type);
969		size_t off = lmd->dmd_offset;
970
971		ctf_encoding_t linfo;
972		ssize_t lsize;
973
974		if (ctf_type_encoding(fp, ltype, &linfo) != CTF_ERR)
975			off += linfo.cte_bits;
976		else if ((lsize = ctf_type_size(fp, ltype)) != CTF_ERR)
977			off += lsize * NBBY;
978
979		/*
980		 * Round up the offset of the end of the last member to the
981		 * next byte boundary, convert 'off' to bytes, and then round
982		 * it up again to the next multiple of the alignment required
983		 * by the new member.  Finally, convert back to bits and store
984		 * the result in dmd_offset.  Technically we could do more
985		 * efficient packing if the new member is a bit-field, but
986		 * we're the "compiler" and ANSI says we can do as we choose.
987		 */
988		off = roundup(off, NBBY) / NBBY;
989		off = roundup(off, MAX(malign, 1));
990		dmd->dmd_offset = off * NBBY;
991		ssize = off + msize;
992	} else {
993		dmd->dmd_offset = 0;
994		ssize = ctf_get_ctt_size(fp, &dtd->dtd_data, NULL, NULL);
995		ssize = MAX(ssize, msize);
996	}
997
998	if (ssize > CTF_MAX_SIZE) {
999		dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1000		dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI(ssize);
1001		dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO(ssize);
1002	} else
1003		dtd->dtd_data.ctt_size = (ushort_t)ssize;
1004
1005	dtd->dtd_data.ctt_info = CTF_TYPE_INFO(kind, root, vlen + 1);
1006	ctf_list_append(&dtd->dtd_u.dtu_members, dmd);
1007
1008	if (s != NULL)
1009		fp->ctf_dtstrlen += strlen(s) + 1;
1010
1011	fp->ctf_flags |= LCTF_DIRTY;
1012	return (0);
1013}
1014
1015static int
1016enumcmp(const char *name, int value, void *arg)
1017{
1018	ctf_bundle_t *ctb = arg;
1019	int bvalue;
1020
1021	return (ctf_enum_value(ctb->ctb_file, ctb->ctb_type,
1022	    name, &bvalue) == CTF_ERR || value != bvalue);
1023}
1024
1025static int
1026enumadd(const char *name, int value, void *arg)
1027{
1028	ctf_bundle_t *ctb = arg;
1029
1030	return (ctf_add_enumerator(ctb->ctb_file, ctb->ctb_type,
1031	    name, value) == CTF_ERR);
1032}
1033
1034/*ARGSUSED*/
1035static int
1036membcmp(const char *name, ctf_id_t type, ulong_t offset, void *arg)
1037{
1038	ctf_bundle_t *ctb = arg;
1039	ctf_membinfo_t ctm;
1040
1041	return (ctf_member_info(ctb->ctb_file, ctb->ctb_type,
1042	    name, &ctm) == CTF_ERR || ctm.ctm_offset != offset);
1043}
1044
1045static int
1046membadd(const char *name, ctf_id_t type, ulong_t offset, void *arg)
1047{
1048	ctf_bundle_t *ctb = arg;
1049	ctf_dmdef_t *dmd;
1050	char *s = NULL;
1051
1052	if ((dmd = ctf_alloc(sizeof (ctf_dmdef_t))) == NULL)
1053		return (ctf_set_errno(ctb->ctb_file, EAGAIN));
1054
1055	if (name != NULL && (s = ctf_strdup(name)) == NULL) {
1056		ctf_free(dmd, sizeof (ctf_dmdef_t));
1057		return (ctf_set_errno(ctb->ctb_file, EAGAIN));
1058	}
1059
1060	/*
1061	 * For now, dmd_type is copied as the src_fp's type; it is reset to an
1062	 * equivalent dst_fp type by a final loop in ctf_add_type(), below.
1063	 */
1064	dmd->dmd_name = s;
1065	dmd->dmd_type = type;
1066	dmd->dmd_offset = offset;
1067	dmd->dmd_value = -1;
1068
1069	ctf_list_append(&ctb->ctb_dtd->dtd_u.dtu_members, dmd);
1070
1071	if (s != NULL)
1072		ctb->ctb_file->ctf_dtstrlen += strlen(s) + 1;
1073
1074	ctb->ctb_file->ctf_flags |= LCTF_DIRTY;
1075	return (0);
1076}
1077
1078/*
1079 * The ctf_add_type routine is used to copy a type from a source CTF container
1080 * to a dynamic destination container.  This routine operates recursively by
1081 * following the source type's links and embedded member types.  If the
1082 * destination container already contains a named type which has the same
1083 * attributes, then we succeed and return this type but no changes occur.
1084 */
1085ctf_id_t
1086ctf_add_type(ctf_file_t *dst_fp, ctf_file_t *src_fp, ctf_id_t src_type)
1087{
1088	ctf_id_t dst_type = CTF_ERR;
1089	uint_t dst_kind = CTF_K_UNKNOWN;
1090
1091	const ctf_type_t *tp;
1092	const char *name;
1093	uint_t kind, flag, vlen;
1094
1095	ctf_bundle_t src, dst;
1096	ctf_encoding_t src_en, dst_en;
1097	ctf_arinfo_t src_ar, dst_ar;
1098
1099	ctf_dtdef_t *dtd;
1100	ctf_funcinfo_t ctc;
1101	ssize_t size;
1102
1103	ctf_hash_t *hp;
1104	ctf_helem_t *hep;
1105
1106	if (!(dst_fp->ctf_flags & LCTF_RDWR))
1107		return (ctf_set_errno(dst_fp, ECTF_RDONLY));
1108
1109	if ((tp = ctf_lookup_by_id(&src_fp, src_type)) == NULL)
1110		return (ctf_set_errno(dst_fp, ctf_errno(src_fp)));
1111
1112	name = ctf_strptr(src_fp, tp->ctt_name);
1113	kind = LCTF_INFO_KIND(src_fp, tp->ctt_info);
1114	flag = LCTF_INFO_ROOT(src_fp, tp->ctt_info);
1115	vlen = LCTF_INFO_VLEN(src_fp, tp->ctt_info);
1116
1117	switch (kind) {
1118	case CTF_K_STRUCT:
1119		hp = &dst_fp->ctf_structs;
1120		break;
1121	case CTF_K_UNION:
1122		hp = &dst_fp->ctf_unions;
1123		break;
1124	case CTF_K_ENUM:
1125		hp = &dst_fp->ctf_enums;
1126		break;
1127	default:
1128		hp = &dst_fp->ctf_names;
1129		break;
1130	}
1131
1132	/*
1133	 * If the source type has a name and is a root type (visible at the
1134	 * top-level scope), lookup the name in the destination container and
1135	 * verify that it is of the same kind before we do anything else.
1136	 */
1137	if ((flag & CTF_ADD_ROOT) && name[0] != '\0' &&
1138	    (hep = ctf_hash_lookup(hp, dst_fp, name, strlen(name))) != NULL) {
1139		dst_type = (ctf_id_t)hep->h_type;
1140		dst_kind = ctf_type_kind(dst_fp, dst_type);
1141	}
1142
1143	/*
1144	 * If an identically named dst_type exists, fail with ECTF_CONFLICT
1145	 * unless dst_type is a forward declaration and src_type is a struct,
1146	 * union, or enum (i.e. the definition of the previous forward decl).
1147	 */
1148	if (dst_type != CTF_ERR && dst_kind != kind && (
1149	    dst_kind != CTF_K_FORWARD || (kind != CTF_K_ENUM &&
1150	    kind != CTF_K_STRUCT && kind != CTF_K_UNION)))
1151		return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1152
1153	/*
1154	 * If the non-empty name was not found in the appropriate hash, search
1155	 * the list of pending dynamic definitions that are not yet committed.
1156	 * If a matching name and kind are found, assume this is the type that
1157	 * we are looking for.  This is necessary to permit ctf_add_type() to
1158	 * operate recursively on entities such as a struct that contains a
1159	 * pointer member that refers to the same struct type.
1160	 */
1161	if (dst_type == CTF_ERR && name[0] != '\0') {
1162		for (dtd = ctf_list_prev(&dst_fp->ctf_dtdefs); dtd != NULL &&
1163		    dtd->dtd_type > dst_fp->ctf_dtoldid;
1164		    dtd = ctf_list_prev(dtd)) {
1165			if (CTF_INFO_KIND(dtd->dtd_data.ctt_info) == kind &&
1166			    dtd->dtd_name != NULL &&
1167			    strcmp(dtd->dtd_name, name) == 0)
1168				return (dtd->dtd_type);
1169		}
1170	}
1171
1172	src.ctb_file = src_fp;
1173	src.ctb_type = src_type;
1174	src.ctb_dtd = NULL;
1175
1176	dst.ctb_file = dst_fp;
1177	dst.ctb_type = dst_type;
1178	dst.ctb_dtd = NULL;
1179
1180	/*
1181	 * Now perform kind-specific processing.  If dst_type is CTF_ERR, then
1182	 * we add a new type with the same properties as src_type to dst_fp.
1183	 * If dst_type is not CTF_ERR, then we verify that dst_type has the
1184	 * same attributes as src_type.  We recurse for embedded references.
1185	 */
1186	switch (kind) {
1187	case CTF_K_INTEGER:
1188	case CTF_K_FLOAT:
1189		if (ctf_type_encoding(src_fp, src_type, &src_en) != 0)
1190			return (ctf_set_errno(dst_fp, ctf_errno(src_fp)));
1191
1192		if (dst_type != CTF_ERR) {
1193			if (ctf_type_encoding(dst_fp, dst_type, &dst_en) != 0)
1194				return (CTF_ERR); /* errno is set for us */
1195
1196			if (bcmp(&src_en, &dst_en, sizeof (ctf_encoding_t)))
1197				return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1198
1199		} else if (kind == CTF_K_INTEGER) {
1200			dst_type = ctf_add_integer(dst_fp, flag, name, &src_en);
1201		} else
1202			dst_type = ctf_add_float(dst_fp, flag, name, &src_en);
1203		break;
1204
1205	case CTF_K_POINTER:
1206	case CTF_K_VOLATILE:
1207	case CTF_K_CONST:
1208	case CTF_K_RESTRICT:
1209		src_type = ctf_type_reference(src_fp, src_type);
1210		src_type = ctf_add_type(dst_fp, src_fp, src_type);
1211
1212		if (src_type == CTF_ERR)
1213			return (CTF_ERR); /* errno is set for us */
1214
1215		dst_type = ctf_add_reftype(dst_fp, flag, src_type, kind);
1216		break;
1217
1218	case CTF_K_ARRAY:
1219		if (ctf_array_info(src_fp, src_type, &src_ar) == CTF_ERR)
1220			return (ctf_set_errno(dst_fp, ctf_errno(src_fp)));
1221
1222		src_ar.ctr_contents =
1223		    ctf_add_type(dst_fp, src_fp, src_ar.ctr_contents);
1224		src_ar.ctr_index =
1225		    ctf_add_type(dst_fp, src_fp, src_ar.ctr_index);
1226		src_ar.ctr_nelems = src_ar.ctr_nelems;
1227
1228		if (src_ar.ctr_contents == CTF_ERR ||
1229		    src_ar.ctr_index == CTF_ERR)
1230			return (CTF_ERR); /* errno is set for us */
1231
1232		if (dst_type != CTF_ERR) {
1233			if (ctf_array_info(dst_fp, dst_type, &dst_ar) != 0)
1234				return (CTF_ERR); /* errno is set for us */
1235
1236			if (bcmp(&src_ar, &dst_ar, sizeof (ctf_arinfo_t)))
1237				return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1238		} else
1239			dst_type = ctf_add_array(dst_fp, flag, &src_ar);
1240		break;
1241
1242	case CTF_K_FUNCTION:
1243		ctc.ctc_return = ctf_add_type(dst_fp, src_fp, tp->ctt_type);
1244		ctc.ctc_argc = 0;
1245		ctc.ctc_flags = 0;
1246
1247		if (ctc.ctc_return == CTF_ERR)
1248			return (CTF_ERR); /* errno is set for us */
1249
1250		dst_type = ctf_add_function(dst_fp, flag, &ctc, NULL);
1251		break;
1252
1253	case CTF_K_STRUCT:
1254	case CTF_K_UNION: {
1255		ctf_dmdef_t *dmd;
1256		int errs = 0;
1257
1258		/*
1259		 * Technically to match a struct or union we need to check both
1260		 * ways (src members vs. dst, dst members vs. src) but we make
1261		 * this more optimal by only checking src vs. dst and comparing
1262		 * the total size of the structure (which we must do anyway)
1263		 * which covers the possibility of dst members not in src.
1264		 * This optimization can be defeated for unions, but is so
1265		 * pathological as to render it irrelevant for our purposes.
1266		 */
1267		if (dst_type != CTF_ERR && dst_kind != CTF_K_FORWARD) {
1268			if (ctf_type_size(src_fp, src_type) !=
1269			    ctf_type_size(dst_fp, dst_type))
1270				return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1271
1272			if (ctf_member_iter(src_fp, src_type, membcmp, &dst))
1273				return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1274
1275			break;
1276		}
1277
1278		/*
1279		 * Unlike the other cases, copying structs and unions is done
1280		 * manually so as to avoid repeated lookups in ctf_add_member
1281		 * and to ensure the exact same member offsets as in src_type.
1282		 */
1283		dst_type = ctf_add_generic(dst_fp, flag, name, &dtd);
1284		if (dst_type == CTF_ERR)
1285			return (CTF_ERR); /* errno is set for us */
1286
1287		dst.ctb_type = dst_type;
1288		dst.ctb_dtd = dtd;
1289
1290		if (ctf_member_iter(src_fp, src_type, membadd, &dst) != 0)
1291			errs++; /* increment errs and fail at bottom of case */
1292
1293		if ((size = ctf_type_size(src_fp, src_type)) > CTF_MAX_SIZE) {
1294			dtd->dtd_data.ctt_size = CTF_LSIZE_SENT;
1295			dtd->dtd_data.ctt_lsizehi = CTF_SIZE_TO_LSIZE_HI(size);
1296			dtd->dtd_data.ctt_lsizelo = CTF_SIZE_TO_LSIZE_LO(size);
1297		} else
1298			dtd->dtd_data.ctt_size = (ushort_t)size;
1299
1300		dtd->dtd_data.ctt_info = CTF_TYPE_INFO(kind, flag, vlen);
1301
1302		/*
1303		 * Make a final pass through the members changing each dmd_type
1304		 * (a src_fp type) to an equivalent type in dst_fp.  We pass
1305		 * through all members, leaving any that fail set to CTF_ERR.
1306		 */
1307		for (dmd = ctf_list_next(&dtd->dtd_u.dtu_members);
1308		    dmd != NULL; dmd = ctf_list_next(dmd)) {
1309			if ((dmd->dmd_type = ctf_add_type(dst_fp, src_fp,
1310			    dmd->dmd_type)) == CTF_ERR)
1311				errs++;
1312		}
1313
1314		if (errs)
1315			return (CTF_ERR); /* errno is set for us */
1316		break;
1317	}
1318
1319	case CTF_K_ENUM:
1320		if (dst_type != CTF_ERR && dst_kind != CTF_K_FORWARD) {
1321			if (ctf_enum_iter(src_fp, src_type, enumcmp, &dst) ||
1322			    ctf_enum_iter(dst_fp, dst_type, enumcmp, &src))
1323				return (ctf_set_errno(dst_fp, ECTF_CONFLICT));
1324		} else {
1325			dst_type = ctf_add_enum(dst_fp, flag, name);
1326			if ((dst.ctb_type = dst_type) == CTF_ERR ||
1327			    ctf_enum_iter(src_fp, src_type, enumadd, &dst))
1328				return (CTF_ERR); /* errno is set for us */
1329		}
1330		break;
1331
1332	case CTF_K_FORWARD:
1333		if (dst_type == CTF_ERR) {
1334			dst_type = ctf_add_forward(dst_fp,
1335			    flag, name, CTF_K_STRUCT); /* assume STRUCT */
1336		}
1337		break;
1338
1339	case CTF_K_TYPEDEF:
1340		src_type = ctf_type_reference(src_fp, src_type);
1341		src_type = ctf_add_type(dst_fp, src_fp, src_type);
1342
1343		if (src_type == CTF_ERR)
1344			return (CTF_ERR); /* errno is set for us */
1345
1346		/*
1347		 * If dst_type is not CTF_ERR at this point, we should check if
1348		 * ctf_type_reference(dst_fp, dst_type) != src_type and if so
1349		 * fail with ECTF_CONFLICT.  However, this causes problems with
1350		 * <sys/types.h> typedefs that vary based on things like if
1351		 * _ILP32x then pid_t is int otherwise long.  We therefore omit
1352		 * this check and assume that if the identically named typedef
1353		 * already exists in dst_fp, it is correct or equivalent.
1354		 */
1355		if (dst_type == CTF_ERR) {
1356			dst_type = ctf_add_typedef(dst_fp, flag,
1357			    name, src_type);
1358		}
1359		break;
1360
1361	default:
1362		return (ctf_set_errno(dst_fp, ECTF_CORRUPT));
1363	}
1364
1365	return (dst_type);
1366}
1367