* config/mips/{r3900.mt,r3900l.mt,tm-r3900.h,tm-r3900l.h}:
[deliverable/binutils-gdb.git] / bfd / bfd-in2.h
CommitLineData
fdcb0453 1/* Main header file for the bfd library -- portable access to object files.
56f3b62c 2 Copyright 1990, 91, 92, 93, 94, 95, 96, 1997 Free Software Foundation, Inc.
fdcb0453
KR
3 Contributed by Cygnus Support.
4
b66b07a2
KR
5** NOTE: bfd.h and bfd-in2.h are GENERATED files. Don't change them;
6** instead, change bfd-in.h or the other BFD source files processed to
7** generate these files.
8
fdcb0453
KR
9This file is part of BFD, the Binary File Descriptor library.
10
11This program is free software; you can redistribute it and/or modify
12it under the terms of the GNU General Public License as published by
13the Free Software Foundation; either version 2 of the License, or
14(at your option) any later version.
15
16This program is distributed in the hope that it will be useful,
17but WITHOUT ANY WARRANTY; without even the implied warranty of
18MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19GNU General Public License for more details.
20
21You should have received a copy of the GNU General Public License
22along with this program; if not, write to the Free Software
e9614321 23Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
fdcb0453
KR
24
25/* bfd.h -- The only header file required by users of the bfd library
26
27The bfd.h file is generated from bfd-in.h and various .c files; if you
28change it, your changes will probably be lost.
29
30All the prototypes and definitions following the comment "THE FOLLOWING
31IS EXTRACTED FROM THE SOURCE" are extracted from the source files for
32BFD. If you change it, someone oneday will extract it from the source
33again, and your changes will be lost. To save yourself from this bind,
34change the definitions in the source in the bfd directory. Type "make
35docs" and then "make headers" in that directory, and magically this file
36will change to reflect your changes.
37
38If you don't have the tools to perform the extraction, then you are
39safe from someone on your system trampling over your header files.
40You should still maintain the equivalence between the source and this
41file though; every change you make to the .c file should be reflected
42here. */
43
44#ifndef __BFD_H_SEEN__
45#define __BFD_H_SEEN__
46
815179af
ILT
47#ifdef __cplusplus
48extern "C" {
49#endif
50
fdcb0453 51#include "ansidecl.h"
fdcb0453 52
5a66538b 53/* These two lines get substitutions done by commands in Makefile.in. */
b7577823 54#define BFD_VERSION "@VERSION@"
f4e14cb9 55#define BFD_ARCH_SIZE @wordsize@
b7577823 56#define BFD_HOST_64BIT_LONG @BFD_HOST_64BIT_LONG@
f4e14cb9
ILT
57#if @BFD_HOST_64_BIT_DEFINED@
58#define BFD_HOST_64_BIT @BFD_HOST_64_BIT@
59#define BFD_HOST_U_64_BIT @BFD_HOST_U_64_BIT@
60#endif
fdcb0453
KR
61
62#if BFD_ARCH_SIZE >= 64
63#define BFD64
64#endif
65
c3e964b9
FF
66#ifndef INLINE
67#if __GNUC__ >= 2
68#define INLINE __inline__
69#else
70#define INLINE
71#endif
72#endif
73
fdcb0453
KR
74/* forward declaration */
75typedef struct _bfd bfd;
76
77/* To squelch erroneous compiler warnings ("illegal pointer
78 combination") from the SVR3 compiler, we would like to typedef
79 boolean to int (it doesn't like functions which return boolean.
80 Making sure they are never implicitly declared to return int
81 doesn't seem to help). But this file is not configured based on
82 the host. */
83/* General rules: functions which are boolean return true on success
84 and false on failure (unless they're a predicate). -- bfd.doc */
85/* I'm sure this is going to break something and someone is going to
86 force me to change it. */
87/* typedef enum boolean {false, true} boolean; */
88/* Yup, SVR4 has a "typedef enum boolean" in <sys/types.h> -fnf */
442da995 89/* It gets worse if the host also defines a true/false enum... -sts */
3b1f83ad
JL
90/* And even worse if your compiler has built-in boolean types... -law */
91#if defined (__GNUG__) && (__GNUC_MINOR__ > 5)
92#define TRUE_FALSE_ALREADY_DEFINED
93#endif
c53fac12
ILT
94#ifdef MPW
95/* Pre-emptive strike - get the file with the enum. */
96#include <Types.h>
97#define TRUE_FALSE_ALREADY_DEFINED
98#endif /* MPW */
442da995 99#ifndef TRUE_FALSE_ALREADY_DEFINED
fdcb0453 100typedef enum bfd_boolean {false, true} boolean;
442da995
SS
101#define BFD_TRUE_FALSE
102#else
e0151f38
SS
103/* Use enum names that will appear nowhere else. */
104typedef enum bfd_boolean {bfd_fffalse, bfd_tttrue} boolean;
442da995 105#endif
fdcb0453
KR
106
107/* A pointer to a position in a file. */
108/* FIXME: This should be using off_t from <sys/types.h>.
109 For now, try to avoid breaking stuff by not including <sys/types.h> here.
110 This will break on systems with 64-bit file offsets (e.g. 4.4BSD).
111 Probably the best long-term answer is to avoid using file_ptr AND off_t
112 in this header file, and to handle this in the BFD implementation
113 rather than in its interface. */
114/* typedef off_t file_ptr; */
115typedef long int file_ptr;
116
0822b56d 117/* Support for different sizes of target format ints and addresses.
b7577823
ILT
118 If the type `long' is at least 64 bits, BFD_HOST_64BIT_LONG will be
119 set to 1 above. Otherwise, if gcc is being used, this code will
f4e14cb9
ILT
120 use gcc's "long long" type. Otherwise, BFD_HOST_64_BIT must be
121 defined above. */
fdcb0453 122
b7577823 123#ifdef BFD64
fdcb0453 124
b7577823
ILT
125#ifndef BFD_HOST_64_BIT
126#if BFD_HOST_64BIT_LONG
127#define BFD_HOST_64_BIT long
f4e14cb9 128#define BFD_HOST_U_64_BIT unsigned long
b7577823
ILT
129#else
130#ifdef __GNUC__
78c3dc5c 131#define BFD_HOST_64_BIT long long
f4e14cb9 132#define BFD_HOST_U_64_BIT unsigned long long
c3d8e071
ILT
133#else /* ! defined (__GNUC__) */
134 #error No 64 bit integer type available
135#endif /* ! defined (__GNUC__) */
b7577823
ILT
136#endif /* ! BFD_HOST_64BIT_LONG */
137#endif /* ! defined (BFD_HOST_64_BIT) */
fa5ba217 138
f4e14cb9 139typedef BFD_HOST_U_64_BIT bfd_vma;
78c3dc5c 140typedef BFD_HOST_64_BIT bfd_signed_vma;
f4e14cb9
ILT
141typedef BFD_HOST_U_64_BIT bfd_size_type;
142typedef BFD_HOST_U_64_BIT symvalue;
b7577823 143
7e7fb4a8 144#ifndef fprintf_vma
b7577823
ILT
145#if BFD_HOST_64BIT_LONG
146#define sprintf_vma(s,x) sprintf (s, "%016lx", x)
147#define fprintf_vma(f,x) fprintf (f, "%016lx", x)
148#else
149#define _bfd_int64_low(x) ((unsigned long) (((x) & 0xffffffff)))
150#define _bfd_int64_high(x) ((unsigned long) (((x) >> 32) & 0xffffffff))
fdcb0453 151#define fprintf_vma(s,x) \
b7577823 152 fprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
fa5ba217 153#define sprintf_vma(s,x) \
b7577823 154 sprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
7e7fb4a8 155#endif
b7577823
ILT
156#endif
157
fdcb0453
KR
158#else /* not BFD64 */
159
160/* Represent a target address. Also used as a generic unsigned type
161 which is guaranteed to be big enough to hold any arithmetic types
162 we need to deal with. */
163typedef unsigned long bfd_vma;
164
165/* A generic signed type which is guaranteed to be big enough to hold any
166 arithmetic types we need to deal with. Can be assumed to be compatible
167 with bfd_vma in the same way that signed and unsigned ints are compatible
168 (as parameters, in assignment, etc). */
169typedef long bfd_signed_vma;
170
171typedef unsigned long symvalue;
172typedef unsigned long bfd_size_type;
173
174/* Print a bfd_vma x on stream s. */
175#define fprintf_vma(s,x) fprintf(s, "%08lx", x)
fa5ba217 176#define sprintf_vma(s,x) sprintf(s, "%08lx", x)
fdcb0453
KR
177#endif /* not BFD64 */
178#define printf_vma(x) fprintf_vma(stdout,x)
179
180typedef unsigned int flagword; /* 32 bits of flags */
5dc8db48 181typedef unsigned char bfd_byte;
fdcb0453
KR
182\f
183/** File formats */
184
185typedef enum bfd_format {
186 bfd_unknown = 0, /* file format is unknown */
187 bfd_object, /* linker/assember/compiler output */
188 bfd_archive, /* object archive file */
189 bfd_core, /* core dump */
190 bfd_type_end} /* marks the end; don't use it! */
191 bfd_format;
192
9e461dac
JK
193/* Values that may appear in the flags field of a BFD. These also
194 appear in the object_flags field of the bfd_target structure, where
195 they indicate the set of flags used by that backend (not all flags
196 are meaningful for all object file formats) (FIXME: at the moment,
197 the object_flags values have mostly just been copied from backend
198 to another, and are not necessarily correct). */
199
200/* No flags. */
2055bf85 201#define BFD_NO_FLAGS 0x00
9e461dac
JK
202
203/* BFD contains relocation entries. */
fdcb0453 204#define HAS_RELOC 0x01
9e461dac
JK
205
206/* BFD is directly executable. */
fdcb0453 207#define EXEC_P 0x02
9e461dac
JK
208
209/* BFD has line number information (basically used for F_LNNO in a
210 COFF header). */
fdcb0453 211#define HAS_LINENO 0x04
9e461dac
JK
212
213/* BFD has debugging information. */
fdcb0453 214#define HAS_DEBUG 0x08
9e461dac
JK
215
216/* BFD has symbols. */
fdcb0453 217#define HAS_SYMS 0x10
9e461dac
JK
218
219/* BFD has local symbols (basically used for F_LSYMS in a COFF
220 header). */
fdcb0453 221#define HAS_LOCALS 0x20
9e461dac
JK
222
223/* BFD is a dynamic object. */
fdcb0453 224#define DYNAMIC 0x40
9e461dac
JK
225
226/* Text section is write protected (if D_PAGED is not set, this is
227 like an a.out NMAGIC file) (the linker sets this by default, but
228 clears it for -r or -N). */
fdcb0453 229#define WP_TEXT 0x80
9e461dac
JK
230
231/* BFD is dynamically paged (this is like an a.out ZMAGIC file) (the
232 linker sets this by default, but clears it for -r or -n or -N). */
fdcb0453 233#define D_PAGED 0x100
9e461dac
JK
234
235/* BFD is relaxable (this means that bfd_relax_section may be able to
0822b56d
ILT
236 do something) (sometimes bfd_relax_section can do something even if
237 this is not set). */
fdcb0453 238#define BFD_IS_RELAXABLE 0x200
a7ff9b80
ILT
239
240/* This may be set before writing out a BFD to request using a
241 traditional format. For example, this is used to request that when
242 writing out an a.out object the symbols not be hashed to eliminate
243 duplicates. */
244#define BFD_TRADITIONAL_FORMAT 0x400
64d5f5d0
ILT
245
246/* This flag indicates that the BFD contents are actually cached in
247 memory. If this is set, iostream points to a bfd_in_memory struct. */
248#define BFD_IN_MEMORY 0x800
fdcb0453
KR
249\f
250/* symbols and relocation */
251
0f8f509c 252/* A count of carsyms (canonical archive symbols). */
fdcb0453
KR
253typedef unsigned long symindex;
254
5dc8db48
KR
255/* How to perform a relocation. */
256typedef const struct reloc_howto_struct reloc_howto_type;
257
fdcb0453
KR
258#define BFD_NO_MORE_SYMBOLS ((symindex) ~0)
259
0f8f509c
DM
260/* General purpose part of a symbol X;
261 target specific parts are in libcoff.h, libaout.h, etc. */
fdcb0453
KR
262
263#define bfd_get_section(x) ((x)->section)
264#define bfd_get_output_section(x) ((x)->section->output_section)
265#define bfd_set_section(x,y) ((x)->section) = (y)
266#define bfd_asymbol_base(x) ((x)->section->vma)
267#define bfd_asymbol_value(x) (bfd_asymbol_base(x) + (x)->value)
268#define bfd_asymbol_name(x) ((x)->name)
269/*Perhaps future: #define bfd_asymbol_bfd(x) ((x)->section->owner)*/
270#define bfd_asymbol_bfd(x) ((x)->the_bfd)
271#define bfd_asymbol_flavour(x) (bfd_asymbol_bfd(x)->xvec->flavour)
272
0f8f509c 273/* A canonical archive symbol. */
fdcb0453
KR
274/* This is a type pun with struct ranlib on purpose! */
275typedef struct carsym {
276 char *name;
277 file_ptr file_offset; /* look here to find the file */
278} carsym; /* to make these you call a carsymogen */
279
280
0f8f509c
DM
281/* Used in generating armaps (archive tables of contents).
282 Perhaps just a forward definition would do? */
fdcb0453
KR
283struct orl { /* output ranlib */
284 char **name; /* symbol name */
285 file_ptr pos; /* bfd* or file position */
286 int namidx; /* index into string table */
287};
fdcb0453
KR
288\f
289
290/* Linenumber stuff */
291typedef struct lineno_cache_entry {
292 unsigned int line_number; /* Linenumber from start of function*/
293 union {
0f8f509c 294 struct symbol_cache_entry *sym; /* Function name */
fdcb0453
KR
295 unsigned long offset; /* Offset into section */
296 } u;
297} alent;
298\f
299/* object and core file sections */
300
fdcb0453
KR
301#define align_power(addr, align) \
302 ( ((addr) + ((1<<(align))-1)) & (-1 << (align)))
303
304typedef struct sec *sec_ptr;
305
306#define bfd_get_section_name(bfd, ptr) ((ptr)->name + 0)
307#define bfd_get_section_vma(bfd, ptr) ((ptr)->vma + 0)
308#define bfd_get_section_alignment(bfd, ptr) ((ptr)->alignment_power + 0)
309#define bfd_section_name(bfd, ptr) ((ptr)->name)
310#define bfd_section_size(bfd, ptr) (bfd_get_section_size_before_reloc(ptr))
311#define bfd_section_vma(bfd, ptr) ((ptr)->vma)
48e509bf 312#define bfd_section_lma(bfd, ptr) ((ptr)->lma)
fdcb0453
KR
313#define bfd_section_alignment(bfd, ptr) ((ptr)->alignment_power)
314#define bfd_get_section_flags(bfd, ptr) ((ptr)->flags + 0)
315#define bfd_get_section_userdata(bfd, ptr) ((ptr)->userdata)
316
317#define bfd_is_com_section(ptr) (((ptr)->flags & SEC_IS_COMMON) != 0)
318
e0151f38 319#define bfd_set_section_vma(bfd, ptr, val) (((ptr)->vma = (ptr)->lma= (val)), ((ptr)->user_set_vma = (boolean)true), true)
6167a840
JL
320#define bfd_set_section_alignment(bfd, ptr, val) (((ptr)->alignment_power = (val)),true)
321#define bfd_set_section_userdata(bfd, ptr, val) (((ptr)->userdata = (val)),true)
fdcb0453
KR
322
323typedef struct stat stat_type;
324\f
fdcb0453
KR
325typedef enum bfd_print_symbol
326{
327 bfd_print_symbol_name,
328 bfd_print_symbol_more,
329 bfd_print_symbol_all
330} bfd_print_symbol_type;
331
fdcb0453
KR
332/* Information about a symbol that nm needs. */
333
334typedef struct _symbol_info
335{
336 symvalue value;
0f8f509c 337 char type;
fdcb0453 338 CONST char *name; /* Symbol name. */
64d5f5d0
ILT
339 unsigned char stab_type; /* Stab type. */
340 char stab_other; /* Stab other. */
341 short stab_desc; /* Stab desc. */
342 CONST char *stab_name; /* String for stab type. */
fdcb0453 343} symbol_info;
7ec49f91
ILT
344
345/* Get the name of a stabs type code. */
346
347extern const char *bfd_get_stab_name PARAMS ((int));
fdcb0453 348\f
4c3721d5
ILT
349/* Hash table routines. There is no way to free up a hash table. */
350
351/* An element in the hash table. Most uses will actually use a larger
352 structure, and an instance of this will be the first field. */
353
354struct bfd_hash_entry
355{
356 /* Next entry for this hash code. */
357 struct bfd_hash_entry *next;
358 /* String being hashed. */
359 const char *string;
360 /* Hash code. This is the full hash code, not the index into the
361 table. */
362 unsigned long hash;
363};
364
365/* A hash table. */
366
367struct bfd_hash_table
368{
369 /* The hash array. */
370 struct bfd_hash_entry **table;
371 /* The number of slots in the hash table. */
372 unsigned int size;
373 /* A function used to create new elements in the hash table. The
374 first entry is itself a pointer to an element. When this
375 function is first invoked, this pointer will be NULL. However,
376 having the pointer permits a hierarchy of method functions to be
377 built each of which calls the function in the superclass. Thus
378 each function should be written to allocate a new block of memory
379 only if the argument is NULL. */
380 struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *,
381 struct bfd_hash_table *,
382 const char *));
508539ab
ILT
383 /* An objalloc for this hash table. This is a struct objalloc *,
384 but we use PTR to avoid requiring the inclusion of objalloc.h. */
385 PTR memory;
4c3721d5
ILT
386};
387
388/* Initialize a hash table. */
389extern boolean bfd_hash_table_init
390 PARAMS ((struct bfd_hash_table *,
391 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
392 struct bfd_hash_table *,
393 const char *)));
394
395/* Initialize a hash table specifying a size. */
396extern boolean bfd_hash_table_init_n
397 PARAMS ((struct bfd_hash_table *,
398 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
399 struct bfd_hash_table *,
400 const char *),
401 unsigned int size));
402
403/* Free up a hash table. */
404extern void bfd_hash_table_free PARAMS ((struct bfd_hash_table *));
405
406/* Look up a string in a hash table. If CREATE is true, a new entry
407 will be created for this string if one does not already exist. The
408 COPY argument must be true if this routine should copy the string
409 into newly allocated memory when adding an entry. */
410extern struct bfd_hash_entry *bfd_hash_lookup
411 PARAMS ((struct bfd_hash_table *, const char *, boolean create,
412 boolean copy));
413
b7577823
ILT
414/* Replace an entry in a hash table. */
415extern void bfd_hash_replace
416 PARAMS ((struct bfd_hash_table *, struct bfd_hash_entry *old,
417 struct bfd_hash_entry *nw));
418
4c3721d5
ILT
419/* Base method for creating a hash table entry. */
420extern struct bfd_hash_entry *bfd_hash_newfunc
421 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *,
422 const char *));
423
424/* Grab some space for a hash table entry. */
966e0a16
ILT
425extern PTR bfd_hash_allocate PARAMS ((struct bfd_hash_table *,
426 unsigned int));
4c3721d5
ILT
427
428/* Traverse a hash table in a random order, calling a function on each
429 element. If the function returns false, the traversal stops. The
430 INFO argument is passed to the function. */
431extern void bfd_hash_traverse PARAMS ((struct bfd_hash_table *,
432 boolean (*) (struct bfd_hash_entry *,
433 PTR),
434 PTR info));
435\f
c3e964b9
FF
436/* Semi-portable string concatenation in cpp.
437 The CAT4 hack is to avoid a problem with some strict ANSI C preprocessors.
438 The problem is, "32_" is not a valid preprocessing token, and we don't
439 want extra underscores (e.g., "nlm_32_"). The XCAT2 macro will cause the
440 inner CAT macros to be evaluated first, producing still-valid pp-tokens.
441 Then the final concatenation can be done. (Sigh.) */
fdcb0453 442#ifndef CAT
c3e964b9
FF
443#ifdef SABER
444#define CAT(a,b) a##b
445#define CAT3(a,b,c) a##b##c
446#define CAT4(a,b,c,d) a##b##c##d
447#else
442da995 448#if defined(__STDC__) || defined(ALMOST_STDC)
fdcb0453
KR
449#define CAT(a,b) a##b
450#define CAT3(a,b,c) a##b##c
c3e964b9
FF
451#define XCAT2(a,b) CAT(a,b)
452#define CAT4(a,b,c,d) XCAT2(CAT(a,b),CAT(c,d))
fdcb0453
KR
453#else
454#define CAT(a,b) a/**/b
455#define CAT3(a,b,c) a/**/b/**/c
c3e964b9
FF
456#define CAT4(a,b,c,d) a/**/b/**/c/**/d
457#endif
fdcb0453
KR
458#endif
459#endif
460
fdcb0453 461#define COFF_SWAP_TABLE (PTR) &bfd_coff_std_swap_table
fdcb0453
KR
462\f
463/* User program access to BFD facilities */
464
0822b56d
ILT
465/* Direct I/O routines, for programs which know more about the object
466 file than BFD does. Use higher level routines if possible. */
467
468extern bfd_size_type bfd_read
469 PARAMS ((PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
470extern bfd_size_type bfd_write
471 PARAMS ((const PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
d80ebaac 472extern int bfd_seek PARAMS ((bfd *abfd, file_ptr fp, int direction));
0822b56d
ILT
473extern long bfd_tell PARAMS ((bfd *abfd));
474extern int bfd_flush PARAMS ((bfd *abfd));
475extern int bfd_stat PARAMS ((bfd *abfd, struct stat *));
476
018dafca 477
fdcb0453
KR
478/* Cast from const char * to char * so that caller can assign to
479 a char * without a warning. */
480#define bfd_get_filename(abfd) ((char *) (abfd)->filename)
0a197a96 481#define bfd_get_cacheable(abfd) ((abfd)->cacheable)
fdcb0453
KR
482#define bfd_get_format(abfd) ((abfd)->format)
483#define bfd_get_target(abfd) ((abfd)->xvec->name)
9e461dac 484#define bfd_get_flavour(abfd) ((abfd)->xvec->flavour)
64d5f5d0
ILT
485#define bfd_big_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_BIG)
486#define bfd_little_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_LITTLE)
487#define bfd_header_big_endian(abfd) \
488 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_BIG)
489#define bfd_header_little_endian(abfd) \
490 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_LITTLE)
fdcb0453
KR
491#define bfd_get_file_flags(abfd) ((abfd)->flags)
492#define bfd_applicable_file_flags(abfd) ((abfd)->xvec->object_flags)
493#define bfd_applicable_section_flags(abfd) ((abfd)->xvec->section_flags)
494#define bfd_my_archive(abfd) ((abfd)->my_archive)
495#define bfd_has_map(abfd) ((abfd)->has_armap)
fdcb0453
KR
496
497#define bfd_valid_reloc_types(abfd) ((abfd)->xvec->valid_reloc_types)
498#define bfd_usrdata(abfd) ((abfd)->usrdata)
499
500#define bfd_get_start_address(abfd) ((abfd)->start_address)
501#define bfd_get_symcount(abfd) ((abfd)->symcount)
502#define bfd_get_outsymbols(abfd) ((abfd)->outsymbols)
503#define bfd_count_sections(abfd) ((abfd)->section_count)
fdcb0453
KR
504
505#define bfd_get_symbol_leading_char(abfd) ((abfd)->xvec->symbol_leading_char)
506
e0151f38 507#define bfd_set_cacheable(abfd,bool) (((abfd)->cacheable = (boolean)(bool)), true)
0a197a96 508
ae0a6bea
ILT
509extern boolean bfd_record_phdr
510 PARAMS ((bfd *, unsigned long, boolean, flagword, boolean, bfd_vma,
511 boolean, boolean, unsigned int, struct sec **));
512
2b91cc45
SG
513/* Byte swapping routines. */
514
1a973af1
ILT
515bfd_vma bfd_getb64 PARAMS ((const unsigned char *));
516bfd_vma bfd_getl64 PARAMS ((const unsigned char *));
517bfd_signed_vma bfd_getb_signed_64 PARAMS ((const unsigned char *));
518bfd_signed_vma bfd_getl_signed_64 PARAMS ((const unsigned char *));
519bfd_vma bfd_getb32 PARAMS ((const unsigned char *));
520bfd_vma bfd_getl32 PARAMS ((const unsigned char *));
521bfd_signed_vma bfd_getb_signed_32 PARAMS ((const unsigned char *));
522bfd_signed_vma bfd_getl_signed_32 PARAMS ((const unsigned char *));
523bfd_vma bfd_getb16 PARAMS ((const unsigned char *));
524bfd_vma bfd_getl16 PARAMS ((const unsigned char *));
525bfd_signed_vma bfd_getb_signed_16 PARAMS ((const unsigned char *));
526bfd_signed_vma bfd_getl_signed_16 PARAMS ((const unsigned char *));
2b91cc45
SG
527void bfd_putb64 PARAMS ((bfd_vma, unsigned char *));
528void bfd_putl64 PARAMS ((bfd_vma, unsigned char *));
529void bfd_putb32 PARAMS ((bfd_vma, unsigned char *));
530void bfd_putl32 PARAMS ((bfd_vma, unsigned char *));
531void bfd_putb16 PARAMS ((bfd_vma, unsigned char *));
532void bfd_putl16 PARAMS ((bfd_vma, unsigned char *));
c16313f0
ILT
533\f
534/* Externally visible ECOFF routines. */
2b91cc45 535
442da995 536#if defined(__STDC__) || defined(ALMOST_STDC)
8d12f138
ILT
537struct ecoff_debug_info;
538struct ecoff_debug_swap;
539struct ecoff_extr;
540struct symbol_cache_entry;
7e7fb4a8 541struct bfd_link_info;
28a0c103 542struct bfd_link_hash_entry;
35a3e78e 543struct bfd_elf_version_tree;
8d12f138 544#endif
c16313f0
ILT
545extern bfd_vma bfd_ecoff_get_gp_value PARAMS ((bfd * abfd));
546extern boolean bfd_ecoff_set_gp_value PARAMS ((bfd *abfd, bfd_vma gp_value));
547extern boolean bfd_ecoff_set_regmasks
548 PARAMS ((bfd *abfd, unsigned long gprmask, unsigned long fprmask,
549 unsigned long *cprmask));
7e7fb4a8 550extern PTR bfd_ecoff_debug_init
8d12f138 551 PARAMS ((bfd *output_bfd, struct ecoff_debug_info *output_debug,
7e7fb4a8
KR
552 const struct ecoff_debug_swap *output_swap,
553 struct bfd_link_info *));
554extern void bfd_ecoff_debug_free
555 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
556 const struct ecoff_debug_swap *output_swap,
557 struct bfd_link_info *));
558extern boolean bfd_ecoff_debug_accumulate
559 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
8d12f138
ILT
560 const struct ecoff_debug_swap *output_swap,
561 bfd *input_bfd, struct ecoff_debug_info *input_debug,
562 const struct ecoff_debug_swap *input_swap,
7e7fb4a8
KR
563 struct bfd_link_info *));
564extern boolean bfd_ecoff_debug_accumulate_other
565 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
566 const struct ecoff_debug_swap *output_swap, bfd *input_bfd,
567 struct bfd_link_info *));
8d12f138
ILT
568extern boolean bfd_ecoff_debug_externals
569 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
570 const struct ecoff_debug_swap *swap,
571 boolean relocateable,
572 boolean (*get_extr) (struct symbol_cache_entry *,
573 struct ecoff_extr *),
574 void (*set_index) (struct symbol_cache_entry *,
575 bfd_size_type)));
966e0a16
ILT
576extern boolean bfd_ecoff_debug_one_external
577 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
578 const struct ecoff_debug_swap *swap,
579 const char *name, struct ecoff_extr *esym));
8d12f138
ILT
580extern bfd_size_type bfd_ecoff_debug_size
581 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
582 const struct ecoff_debug_swap *swap));
583extern boolean bfd_ecoff_write_debug
584 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
585 const struct ecoff_debug_swap *swap, file_ptr where));
7e7fb4a8
KR
586extern boolean bfd_ecoff_write_accumulated_debug
587 PARAMS ((PTR handle, bfd *abfd, struct ecoff_debug_info *debug,
588 const struct ecoff_debug_swap *swap,
589 struct bfd_link_info *info, file_ptr where));
82b1edf7
KR
590extern boolean bfd_mips_ecoff_create_embedded_relocs
591 PARAMS ((bfd *, struct bfd_link_info *, struct sec *, struct sec *,
592 char **));
8d12f138 593
013dec1a
ILT
594/* Externally visible ELF routines. */
595
54406786 596struct bfd_link_needed_list
b176e1e9 597{
54406786 598 struct bfd_link_needed_list *next;
b176e1e9
ILT
599 bfd *by;
600 const char *name;
601};
54406786
ILT
602
603extern boolean bfd_elf32_record_link_assignment
604 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
605extern boolean bfd_elf64_record_link_assignment
606 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
607extern struct bfd_link_needed_list *bfd_elf_get_needed_list
b176e1e9 608 PARAMS ((bfd *, struct bfd_link_info *));
013dec1a 609extern boolean bfd_elf32_size_dynamic_sections
148437ec 610 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
35a3e78e
ILT
611 const char * const *, struct bfd_link_info *, struct sec **,
612 struct bfd_elf_version_tree *));
013dec1a 613extern boolean bfd_elf64_size_dynamic_sections
148437ec 614 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
35a3e78e
ILT
615 const char * const *, struct bfd_link_info *, struct sec **,
616 struct bfd_elf_version_tree *));
c1f84521 617extern void bfd_elf_set_dt_needed_name PARAMS ((bfd *, const char *));
871a3f3b 618extern const char *bfd_elf_get_dt_soname PARAMS ((bfd *));
013dec1a 619
a7ff9b80
ILT
620/* SunOS shared library support routines for the linker. */
621
28a0c103
ILT
622extern struct bfd_link_needed_list *bfd_sunos_get_needed_list
623 PARAMS ((bfd *, struct bfd_link_info *));
a7ff9b80
ILT
624extern boolean bfd_sunos_record_link_assignment
625 PARAMS ((bfd *, struct bfd_link_info *, const char *));
626extern boolean bfd_sunos_size_dynamic_sections
627 PARAMS ((bfd *, struct bfd_link_info *, struct sec **, struct sec **,
628 struct sec **));
629
04003b57
ILT
630/* Linux shared library support routines for the linker. */
631
7ec49f91
ILT
632extern boolean bfd_i386linux_size_dynamic_sections
633 PARAMS ((bfd *, struct bfd_link_info *));
634extern boolean bfd_m68klinux_size_dynamic_sections
04003b57 635 PARAMS ((bfd *, struct bfd_link_info *));
48e509bf
NC
636extern boolean bfd_sparclinux_size_dynamic_sections
637 PARAMS ((bfd *, struct bfd_link_info *));
04003b57 638
4fe6d901
KR
639/* mmap hacks */
640
641struct _bfd_window_internal;
642typedef struct _bfd_window_internal bfd_window_internal;
643
644typedef struct _bfd_window {
645 /* What the user asked for. */
646 PTR data;
647 bfd_size_type size;
648 /* The actual window used by BFD. Small user-requested read-only
649 regions sharing a page may share a single window into the object
650 file. Read-write versions shouldn't until I've fixed things to
651 keep track of which portions have been claimed by the
652 application; don't want to give the same region back when the
653 application wants two writable copies! */
654 struct _bfd_window_internal *i;
655} bfd_window;
656
092abcdf
ILT
657extern void bfd_init_window PARAMS ((bfd_window *));
658extern void bfd_free_window PARAMS ((bfd_window *));
659extern boolean bfd_get_file_window
0bb8ff19 660 PARAMS ((bfd *, file_ptr, bfd_size_type, bfd_window *, boolean));
4fe6d901 661
28a0c103
ILT
662/* XCOFF support routines for the linker. */
663
2d7de17d
ILT
664extern boolean bfd_xcoff_link_record_set
665 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
666 bfd_size_type));
28a0c103
ILT
667extern boolean bfd_xcoff_import_symbol
668 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
669 bfd_vma, const char *, const char *, const char *));
670extern boolean bfd_xcoff_export_symbol
671 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
672 boolean));
2d7de17d
ILT
673extern boolean bfd_xcoff_link_count_reloc
674 PARAMS ((bfd *, struct bfd_link_info *, const char *));
675extern boolean bfd_xcoff_record_link_assignment
676 PARAMS ((bfd *, struct bfd_link_info *, const char *));
28a0c103
ILT
677extern boolean bfd_xcoff_size_dynamic_sections
678 PARAMS ((bfd *, struct bfd_link_info *, const char *, const char *,
679 unsigned long, unsigned long, unsigned long, boolean,
4a4a66bd 680 int, boolean, boolean, struct sec **));
28a0c103 681
c3d8e071
ILT
682/* Externally visible COFF routines. */
683
684#if defined(__STDC__) || defined(ALMOST_STDC)
685struct internal_syment;
686union internal_auxent;
687#endif
688
689extern boolean bfd_coff_get_syment
690 PARAMS ((bfd *, struct symbol_cache_entry *, struct internal_syment *));
691extern boolean bfd_coff_get_auxent
692 PARAMS ((bfd *, struct symbol_cache_entry *, int, union internal_auxent *));
693
fdcb0453
KR
694/* And more from the source. */
695void
696bfd_init PARAMS ((void));
697
698bfd *
c188b0be 699bfd_openr PARAMS ((CONST char *filename, CONST char *target));
fdcb0453
KR
700
701bfd *
702bfd_fdopenr PARAMS ((CONST char *filename, CONST char *target, int fd));
703
8a51b06c 704bfd *
48e509bf 705bfd_openstreamr PARAMS ((const char *, const char *, PTR));
8a51b06c 706
fdcb0453
KR
707bfd *
708bfd_openw PARAMS ((CONST char *filename, CONST char *target));
709
710boolean
c188b0be 711bfd_close PARAMS ((bfd *abfd));
fdcb0453
KR
712
713boolean
714bfd_close_all_done PARAMS ((bfd *));
715
fdcb0453 716bfd *
10bd43a8 717bfd_create PARAMS ((CONST char *filename, bfd *templ));
fdcb0453
KR
718
719
720 /* Byte swapping macros for user section data. */
721
722#define bfd_put_8(abfd, val, ptr) \
e2756048 723 (*((unsigned char *)(ptr)) = (unsigned char)(val))
fdcb0453
KR
724#define bfd_put_signed_8 \
725 bfd_put_8
726#define bfd_get_8(abfd, ptr) \
727 (*(unsigned char *)(ptr))
728#define bfd_get_signed_8(abfd, ptr) \
729 ((*(unsigned char *)(ptr) ^ 0x80) - 0x80)
730
731#define bfd_put_16(abfd, val, ptr) \
732 BFD_SEND(abfd, bfd_putx16, ((val),(ptr)))
733#define bfd_put_signed_16 \
734 bfd_put_16
735#define bfd_get_16(abfd, ptr) \
736 BFD_SEND(abfd, bfd_getx16, (ptr))
737#define bfd_get_signed_16(abfd, ptr) \
738 BFD_SEND (abfd, bfd_getx_signed_16, (ptr))
739
740#define bfd_put_32(abfd, val, ptr) \
741 BFD_SEND(abfd, bfd_putx32, ((val),(ptr)))
742#define bfd_put_signed_32 \
743 bfd_put_32
744#define bfd_get_32(abfd, ptr) \
745 BFD_SEND(abfd, bfd_getx32, (ptr))
746#define bfd_get_signed_32(abfd, ptr) \
747 BFD_SEND(abfd, bfd_getx_signed_32, (ptr))
748
749#define bfd_put_64(abfd, val, ptr) \
750 BFD_SEND(abfd, bfd_putx64, ((val), (ptr)))
751#define bfd_put_signed_64 \
752 bfd_put_64
753#define bfd_get_64(abfd, ptr) \
754 BFD_SEND(abfd, bfd_getx64, (ptr))
755#define bfd_get_signed_64(abfd, ptr) \
756 BFD_SEND(abfd, bfd_getx_signed_64, (ptr))
757
758
759 /* Byte swapping macros for file header data. */
760
761#define bfd_h_put_8(abfd, val, ptr) \
762 bfd_put_8 (abfd, val, ptr)
763#define bfd_h_put_signed_8(abfd, val, ptr) \
764 bfd_put_8 (abfd, val, ptr)
765#define bfd_h_get_8(abfd, ptr) \
766 bfd_get_8 (abfd, ptr)
767#define bfd_h_get_signed_8(abfd, ptr) \
768 bfd_get_signed_8 (abfd, ptr)
769
770#define bfd_h_put_16(abfd, val, ptr) \
771 BFD_SEND(abfd, bfd_h_putx16,(val,ptr))
772#define bfd_h_put_signed_16 \
773 bfd_h_put_16
774#define bfd_h_get_16(abfd, ptr) \
775 BFD_SEND(abfd, bfd_h_getx16,(ptr))
776#define bfd_h_get_signed_16(abfd, ptr) \
777 BFD_SEND(abfd, bfd_h_getx_signed_16, (ptr))
778
779#define bfd_h_put_32(abfd, val, ptr) \
780 BFD_SEND(abfd, bfd_h_putx32,(val,ptr))
781#define bfd_h_put_signed_32 \
782 bfd_h_put_32
783#define bfd_h_get_32(abfd, ptr) \
784 BFD_SEND(abfd, bfd_h_getx32,(ptr))
785#define bfd_h_get_signed_32(abfd, ptr) \
786 BFD_SEND(abfd, bfd_h_getx_signed_32, (ptr))
787
788#define bfd_h_put_64(abfd, val, ptr) \
789 BFD_SEND(abfd, bfd_h_putx64,(val, ptr))
790#define bfd_h_put_signed_64 \
791 bfd_h_put_64
792#define bfd_h_get_64(abfd, ptr) \
793 BFD_SEND(abfd, bfd_h_getx64,(ptr))
794#define bfd_h_get_signed_64(abfd, ptr) \
795 BFD_SEND(abfd, bfd_h_getx_signed_64, (ptr))
796
57a1867e 797typedef struct sec
fdcb0453 798{
c188b0be 799 /* The name of the section; the name isn't a copy, the pointer is
fdcb0453
KR
800 the same as that passed to bfd_make_section. */
801
802 CONST char *name;
803
c188b0be 804 /* Which section is it; 0..nth. */
fdcb0453 805
57a1867e 806 int index;
fdcb0453
KR
807
808 /* The next section in the list belonging to the BFD, or NULL. */
809
810 struct sec *next;
811
c188b0be 812 /* The field flags contains attributes of the section. Some
fdcb0453 813 flags are read in from the object file, and some are
57a1867e 814 synthesized from other information. */
fdcb0453
KR
815
816 flagword flags;
817
818#define SEC_NO_FLAGS 0x000
819
c188b0be
DM
820 /* Tells the OS to allocate space for this section when loading.
821 This is clear for a section containing debug information
fdcb0453 822 only. */
fdcb0453 823#define SEC_ALLOC 0x001
57a1867e 824
fdcb0453 825 /* Tells the OS to load the section from the file when loading.
c188b0be 826 This is clear for a .bss section. */
fdcb0453 827#define SEC_LOAD 0x002
ef758f3e 828
c188b0be
DM
829 /* The section contains data still to be relocated, so there is
830 some relocation information too. */
fdcb0453
KR
831#define SEC_RELOC 0x004
832
b2ae9efb 833#if 0 /* Obsolete ? */
fdcb0453 834#define SEC_BALIGN 0x008
b2ae9efb 835#endif
fdcb0453
KR
836
837 /* A signal to the OS that the section contains read only
838 data. */
839#define SEC_READONLY 0x010
840
841 /* The section contains code only. */
fdcb0453
KR
842#define SEC_CODE 0x020
843
844 /* The section contains data only. */
b2ae9efb 845#define SEC_DATA 0x040
fdcb0453
KR
846
847 /* The section will reside in ROM. */
fdcb0453
KR
848#define SEC_ROM 0x080
849
850 /* The section contains constructor information. This section
851 type is used by the linker to create lists of constructors and
852 destructors used by <<g++>>. When a back end sees a symbol
853 which should be used in a constructor list, it creates a new
c188b0be
DM
854 section for the type of name (e.g., <<__CTOR_LIST__>>), attaches
855 the symbol to it, and builds a relocation. To build the lists
bc750ff1 856 of constructors, all the linker has to do is catenate all the
c188b0be 857 sections called <<__CTOR_LIST__>> and relocate the data
fdcb0453
KR
858 contained within - exactly the operations it would peform on
859 standard data. */
fdcb0453
KR
860#define SEC_CONSTRUCTOR 0x100
861
862 /* The section is a constuctor, and should be placed at the
b2ae9efb 863 end of the text, data, or bss section(?). */
fdcb0453 864#define SEC_CONSTRUCTOR_TEXT 0x1100
fdcb0453 865#define SEC_CONSTRUCTOR_DATA 0x2100
fdcb0453
KR
866#define SEC_CONSTRUCTOR_BSS 0x3100
867
868 /* The section has contents - a data section could be
c188b0be 869 <<SEC_ALLOC>> | <<SEC_HAS_CONTENTS>>; a debug section could be
fdcb0453 870 <<SEC_HAS_CONTENTS>> */
fdcb0453
KR
871#define SEC_HAS_CONTENTS 0x200
872
c188b0be 873 /* An instruction to the linker to not output the section
c16313f0 874 even if it has information which would normally be written. */
fdcb0453
KR
875#define SEC_NEVER_LOAD 0x400
876
c16313f0
ILT
877 /* The section is a COFF shared library section. This flag is
878 only for the linker. If this type of section appears in
879 the input file, the linker must copy it to the output file
880 without changing the vma or size. FIXME: Although this
881 was originally intended to be general, it really is COFF
882 specific (and the flag was renamed to indicate this). It
883 might be cleaner to have some more general mechanism to
884 allow the back end to control what the linker does with
885 sections. */
886#define SEC_COFF_SHARED_LIBRARY 0x800
fdcb0453 887
5a28331f 888 /* The section contains common symbols (symbols may be defined
fdcb0453
KR
889 multiple times, the value of a symbol is the amount of
890 space it requires, and the largest symbol value is the one
b2ae9efb 891 used). Most targets have exactly one of these (which we
1fb83be6 892 translate to bfd_com_section_ptr), but ECOFF has two. */
fdcb0453
KR
893#define SEC_IS_COMMON 0x8000
894
9b3fa589
JK
895 /* The section contains only debugging information. For
896 example, this is set for ELF .debug and .stab sections.
897 strip tests this flag to see if a section can be
898 discarded. */
899#define SEC_DEBUGGING 0x10000
900
fdfe2d14
SS
901 /* The contents of this section are held in memory pointed to
902 by the contents field. This is checked by
903 bfd_get_section_contents, and the data is retrieved from
904 memory if appropriate. */
905#define SEC_IN_MEMORY 0x20000
906
83f4323e
MM
907 /* The contents of this section are to be excluded by the
908 linker for executable and shared objects unless those
909 objects are to be further relocated. */
910#define SEC_EXCLUDE 0x40000
911
912 /* The contents of this section are to be sorted by the
913 based on the address specified in the associated symbol
914 table. */
915#define SEC_SORT_ENTRIES 0x80000
916
5a28331f
ILT
917 /* When linking, duplicate sections of the same name should be
918 discarded, rather than being combined into a single section as
919 is usually done. This is similar to how common symbols are
920 handled. See SEC_LINK_DUPLICATES below. */
921#define SEC_LINK_ONCE 0x100000
922
923 /* If SEC_LINK_ONCE is set, this bitfield describes how the linker
924 should handle duplicate sections. */
925#define SEC_LINK_DUPLICATES 0x600000
926
927 /* This value for SEC_LINK_DUPLICATES means that duplicate
928 sections with the same name should simply be discarded. */
929#define SEC_LINK_DUPLICATES_DISCARD 0x0
930
931 /* This value for SEC_LINK_DUPLICATES means that the linker
932 should warn if there are any duplicate sections, although
933 it should still only link one copy. */
934#define SEC_LINK_DUPLICATES_ONE_ONLY 0x200000
935
936 /* This value for SEC_LINK_DUPLICATES means that the linker
937 should warn if any duplicate sections are a different size. */
938#define SEC_LINK_DUPLICATES_SAME_SIZE 0x400000
939
940 /* This value for SEC_LINK_DUPLICATES means that the linker
941 should warn if any duplicate sections contain different
942 contents. */
943#define SEC_LINK_DUPLICATES_SAME_CONTENTS 0x600000
944
ff12f303
ILT
945 /* This section was created by the linker as part of dynamic
946 relocation or other arcane processing. It is skipped when
947 going through the first-pass output, trusting that someone
948 else up the line will take care of it later. */
949#define SEC_LINKER_CREATED 0x800000
950
b2ae9efb
KR
951 /* End of section flags. */
952
ff0e4a93
ILT
953 /* Some internal packed boolean fields. */
954
955 /* See the vma field. */
956 unsigned int user_set_vma : 1;
957
958 /* Whether relocations have been processed. */
959 unsigned int reloc_done : 1;
960
961 /* A mark flag used by some of the linker backends. */
962 unsigned int linker_mark : 1;
963
964 /* End of internal packed boolean fields. */
965
fdcb0453 966 /* The virtual memory address of the section - where it will be
b2ae9efb
KR
967 at run time. The symbols are relocated against this. The
968 user_set_vma flag is maintained by bfd; if it's not set, the
969 backend can assign addresses (for example, in <<a.out>>, where
970 the default address for <<.data>> is dependent on the specific
971 target and various flags). */
ef758f3e 972
fdcb0453
KR
973 bfd_vma vma;
974
975 /* The load address of the section - where it would be in a
c188b0be 976 rom image; really only used for writing section header
b2ae9efb 977 information. */
ef758f3e 978
fdcb0453
KR
979 bfd_vma lma;
980
fdcb0453 981 /* The size of the section in bytes, as it will be output.
c188b0be 982 contains a value even if the section has no contents (e.g., the
fdcb0453
KR
983 size of <<.bss>>). This will be filled in after relocation */
984
57a1867e 985 bfd_size_type _cooked_size;
fdcb0453 986
c188b0be 987 /* The original size on disk of the section, in bytes. Normally this
fdcb0453
KR
988 value is the same as the size, but if some relaxing has
989 been done, then this value will be bigger. */
990
57a1867e 991 bfd_size_type _raw_size;
fdcb0453
KR
992
993 /* If this section is going to be output, then this value is the
994 offset into the output section of the first byte in the input
c188b0be 995 section. E.g., if this was going to start at the 100th byte in
fdcb0453
KR
996 the output section, this value would be 100. */
997
998 bfd_vma output_offset;
999
1000 /* The output section through which to map on output. */
1001
1002 struct sec *output_section;
1003
c188b0be
DM
1004 /* The alignment requirement of the section, as an exponent of 2 -
1005 e.g., 3 aligns to 2^3 (or 8). */
fdcb0453
KR
1006
1007 unsigned int alignment_power;
1008
1009 /* If an input section, a pointer to a vector of relocation
1010 records for the data in this section. */
1011
1012 struct reloc_cache_entry *relocation;
1013
1014 /* If an output section, a pointer to a vector of pointers to
1015 relocation records for the data in this section. */
1016
1017 struct reloc_cache_entry **orelocation;
1018
1019 /* The number of relocation records in one of the above */
1020
1021 unsigned reloc_count;
1022
1023 /* Information below is back end specific - and not always used
ef758f3e 1024 or updated. */
fdcb0453 1025
ef758f3e 1026 /* File position of section data */
fdcb0453 1027
57a1867e
DM
1028 file_ptr filepos;
1029
fdcb0453
KR
1030 /* File position of relocation info */
1031
1032 file_ptr rel_filepos;
1033
1034 /* File position of line data */
1035
1036 file_ptr line_filepos;
1037
1038 /* Pointer to data for applications */
1039
1040 PTR userdata;
1041
fdfe2d14
SS
1042 /* If the SEC_IN_MEMORY flag is set, this points to the actual
1043 contents. */
1044 unsigned char *contents;
fdcb0453
KR
1045
1046 /* Attached line number information */
1047
1048 alent *lineno;
57a1867e 1049
fdcb0453
KR
1050 /* Number of line number records */
1051
1052 unsigned int lineno_count;
1053
1054 /* When a section is being output, this value changes as more
1055 linenumbers are written out */
1056
1057 file_ptr moving_line_filepos;
1058
c188b0be 1059 /* What the section number is in the target world */
fdcb0453
KR
1060
1061 int target_index;
1062
1063 PTR used_by_bfd;
1064
1065 /* If this is a constructor section then here is a list of the
1066 relocations created to relocate items within it. */
1067
1068 struct relent_chain *constructor_chain;
1069
1070 /* The BFD which owns the section. */
1071
1072 bfd *owner;
1073
fdcb0453 1074 /* A symbol which points at this section only */
57a1867e 1075 struct symbol_cache_entry *symbol;
fdcb0453 1076 struct symbol_cache_entry **symbol_ptr_ptr;
ef758f3e 1077
4c3721d5
ILT
1078 struct bfd_link_order *link_order_head;
1079 struct bfd_link_order *link_order_tail;
fdcb0453
KR
1080} asection ;
1081
b2ae9efb
KR
1082 /* These sections are global, and are managed by BFD. The application
1083 and target back end are not permitted to change the values in
1fb83be6
KR
1084 these sections. New code should use the section_ptr macros rather
1085 than referring directly to the const sections. The const sections
1086 may eventually vanish. */
fdcb0453
KR
1087#define BFD_ABS_SECTION_NAME "*ABS*"
1088#define BFD_UND_SECTION_NAME "*UND*"
1089#define BFD_COM_SECTION_NAME "*COM*"
1090#define BFD_IND_SECTION_NAME "*IND*"
1091
1092 /* the absolute section */
1fb83be6
KR
1093extern const asection bfd_abs_section;
1094#define bfd_abs_section_ptr ((asection *) &bfd_abs_section)
1095#define bfd_is_abs_section(sec) ((sec) == bfd_abs_section_ptr)
fdcb0453 1096 /* Pointer to the undefined section */
1fb83be6
KR
1097extern const asection bfd_und_section;
1098#define bfd_und_section_ptr ((asection *) &bfd_und_section)
1099#define bfd_is_und_section(sec) ((sec) == bfd_und_section_ptr)
fdcb0453 1100 /* Pointer to the common section */
1fb83be6
KR
1101extern const asection bfd_com_section;
1102#define bfd_com_section_ptr ((asection *) &bfd_com_section)
fdcb0453 1103 /* Pointer to the indirect section */
1fb83be6
KR
1104extern const asection bfd_ind_section;
1105#define bfd_ind_section_ptr ((asection *) &bfd_ind_section)
1106#define bfd_is_ind_section(sec) ((sec) == bfd_ind_section_ptr)
1107
1108extern const struct symbol_cache_entry * const bfd_abs_symbol;
1109extern const struct symbol_cache_entry * const bfd_com_symbol;
1110extern const struct symbol_cache_entry * const bfd_und_symbol;
1111extern const struct symbol_cache_entry * const bfd_ind_symbol;
fdcb0453
KR
1112#define bfd_get_section_size_before_reloc(section) \
1113 (section->reloc_done ? (abort(),1): (section)->_raw_size)
1114#define bfd_get_section_size_after_reloc(section) \
1115 ((section->reloc_done) ? (section)->_cooked_size: (abort(),1))
1116asection *
1117bfd_get_section_by_name PARAMS ((bfd *abfd, CONST char *name));
1118
1119asection *
c188b0be 1120bfd_make_section_old_way PARAMS ((bfd *abfd, CONST char *name));
fdcb0453 1121
9b3fa589 1122asection *
c188b0be 1123bfd_make_section_anyway PARAMS ((bfd *abfd, CONST char *name));
9b3fa589
JK
1124
1125asection *
fdcb0453
KR
1126bfd_make_section PARAMS ((bfd *, CONST char *name));
1127
1128boolean
c188b0be 1129bfd_set_section_flags PARAMS ((bfd *abfd, asection *sec, flagword flags));
fdcb0453
KR
1130
1131void
1132bfd_map_over_sections PARAMS ((bfd *abfd,
1133 void (*func)(bfd *abfd,
1134 asection *sect,
1135 PTR obj),
1136 PTR obj));
1137
1138boolean
c188b0be 1139bfd_set_section_size PARAMS ((bfd *abfd, asection *sec, bfd_size_type val));
fdcb0453
KR
1140
1141boolean
1142bfd_set_section_contents
57a1867e 1143 PARAMS ((bfd *abfd,
fdcb0453
KR
1144 asection *section,
1145 PTR data,
1146 file_ptr offset,
1147 bfd_size_type count));
1148
1149boolean
57a1867e 1150bfd_get_section_contents
fdcb0453
KR
1151 PARAMS ((bfd *abfd, asection *section, PTR location,
1152 file_ptr offset, bfd_size_type count));
1153
5a66538b
KR
1154boolean
1155bfd_copy_private_section_data PARAMS ((bfd *ibfd, asection *isec, bfd *obfd, asection *osec));
1156
1157#define bfd_copy_private_section_data(ibfd, isection, obfd, osection) \
efc2b064 1158 BFD_SEND (obfd, _bfd_copy_private_section_data, \
5a66538b 1159 (ibfd, isection, obfd, osection))
fdcb0453
KR
1160enum bfd_architecture
1161{
1162 bfd_arch_unknown, /* File arch not known */
1163 bfd_arch_obscure, /* Arch known, not one of these */
1164 bfd_arch_m68k, /* Motorola 68xxx */
1165 bfd_arch_vax, /* DEC Vax */
1166 bfd_arch_i960, /* Intel 960 */
1167 /* The order of the following is important.
1168 lower number indicates a machine type that
1169 only accepts a subset of the instructions
1170 available to machines with higher numbers.
1171 The exception is the "ca", which is
1172 incompatible with all other machines except
1173 "core". */
1174
1175#define bfd_mach_i960_core 1
1176#define bfd_mach_i960_ka_sa 2
1177#define bfd_mach_i960_kb_sb 3
1178#define bfd_mach_i960_mc 4
1179#define bfd_mach_i960_xa 5
1180#define bfd_mach_i960_ca 6
047c57ac 1181#define bfd_mach_i960_jx 7
cbe75cb6 1182#define bfd_mach_i960_hx 8
fdcb0453
KR
1183
1184 bfd_arch_a29k, /* AMD 29000 */
1185 bfd_arch_sparc, /* SPARC */
5bc513b4 1186#define bfd_mach_sparc 1
cbe75cb6 1187 /* The difference between v8plus and v9 is that v9 is a true 64 bit env. */
d1f74cd2
DE
1188#define bfd_mach_sparc_sparclet 2
1189#define bfd_mach_sparc_sparclite 3
1190#define bfd_mach_sparc_v8plus 4
1191#define bfd_mach_sparc_v8plusa 5 /* with ultrasparc add'ns */
1192#define bfd_mach_sparc_v9 6
1193#define bfd_mach_sparc_v9a 7 /* with ultrasparc add'ns */
049f3d4c 1194 /* Nonzero if MACH has the v9 instruction set. */
d1f74cd2
DE
1195#define bfd_mach_sparc_v9_p(mach) \
1196 ((mach) >= bfd_mach_sparc_v8plus && (mach) <= bfd_mach_sparc_v9a)
fdcb0453 1197 bfd_arch_mips, /* MIPS Rxxxx */
cd66558c
NC
1198#define bfd_mach_mips3000 3000
1199#define bfd_mach_mips6000 6000
1200#define bfd_mach_mips4000 4000
1201#define bfd_mach_mips8000 8000
1202#define bfd_mach_mips16 16
1203 /* start-sanitize-vr5400 */
1204#define bfd_mach_vr5400 5400
1205#define bfd_mach_vr5000 5000
1206 /* end-sanitize-vr5400 */
fdcb0453 1207 bfd_arch_i386, /* Intel 386 */
3cc21bf6
SG
1208#define bfd_mach_i386_i386 0
1209#define bfd_mach_i386_i8086 1
fdcb0453
KR
1210 bfd_arch_we32k, /* AT&T WE32xxx */
1211 bfd_arch_tahoe, /* CCI/Harris Tahoe */
1212 bfd_arch_i860, /* Intel 860 */
1213 bfd_arch_romp, /* IBM ROMP PC/RT */
1214 bfd_arch_alliant, /* Alliant */
1215 bfd_arch_convex, /* Convex */
1216 bfd_arch_m88k, /* Motorola 88xxx */
1217 bfd_arch_pyramid, /* Pyramid Technology */
1218 bfd_arch_h8300, /* Hitachi H8/300 */
1219#define bfd_mach_h8300 1
1220#define bfd_mach_h8300h 2
34255b70 1221#define bfd_mach_h8300s 3
d1ad85a6 1222 bfd_arch_powerpc, /* PowerPC */
fdcb0453
KR
1223 bfd_arch_rs6000, /* IBM RS/6000 */
1224 bfd_arch_hppa, /* HP PA RISC */
50bd50d4 1225 bfd_arch_d10v, /* Mitsubishi D10V */
fd8d7c31
MH
1226 /* start-sanitize-d30v */
1227 bfd_arch_d30v, /* Mitsubishi D30V */
1228 /* end-sanitize-d30v */
fdcb0453
KR
1229 bfd_arch_z8k, /* Zilog Z8000 */
1230#define bfd_mach_z8001 1
1231#define bfd_mach_z8002 2
1232 bfd_arch_h8500, /* Hitachi H8/500 */
1233 bfd_arch_sh, /* Hitachi SH */
f40d28bf
AC
1234#define bfd_mach_sh 0
1235#define bfd_mach_sh3 0x30
1236#define bfd_mach_sh3e 0x3e
1237 /* start-sanitize-sh4 */
1238#define bfd_mach_sh4 0x40
1239 /* end-sanitize-sh4 */
fdcb0453 1240 bfd_arch_alpha, /* Dec Alpha */
d80ebaac 1241 bfd_arch_arm, /* Advanced Risc Machines ARM */
48e509bf
NC
1242#define bfd_mach_arm_2 1
1243#define bfd_mach_arm_2a 2
1244#define bfd_mach_arm_3 3
1245#define bfd_mach_arm_3M 4
1246#define bfd_mach_arm_4 5
1247#define bfd_mach_arm_4T 6
1fb83be6 1248 bfd_arch_ns32k, /* National Semiconductors ns32000 */
d468a149 1249 bfd_arch_w65, /* WDC 65816 */
fc46a9ec
FF
1250 /* start-sanitize-tic80 */
1251 bfd_arch_tic80, /* TI TMS320c80 (MVP) */
1252 /* end-sanitize-tic80 */
20b2c808
DE
1253 /* start-sanitize-sky */
1254 bfd_arch_txvu, /* TX VU */
1255#define bfd_mach_txvu 0
1256 /* end-sanitize-sky */
c86158e5 1257 bfd_arch_v850, /* NEC V850 */
f40d28bf 1258#define bfd_mach_v850 0
8988d935 1259 /* start-sanitize-v850e */
f40d28bf 1260#define bfd_mach_v850e 'E'
cd66558c 1261#define bfd_mach_v850ea 'A'
3869b11f 1262 /* end-sanitize-v850e */
05cedcf6 1263 bfd_arch_arc, /* Argonaut RISC Core */
c932fd96 1264#define bfd_mach_arc_base 0
3ce77f61
ILT
1265 bfd_arch_m32r, /* Mitsubishi M32R/D */
1266#define bfd_mach_m32r 0 /* backwards compatibility */
1267 /* start-sanitize-m32rx */
a5fdb816 1268#define bfd_mach_m32rx 'x'
3ce77f61 1269 /* end-sanitize-m32rx */
ae1b99e4
JL
1270 bfd_arch_mn10200, /* Matsushita MN10200 */
1271 bfd_arch_mn10300, /* Matsushita MN10300 */
fdcb0453
KR
1272 bfd_arch_last
1273 };
1274
1275typedef struct bfd_arch_info
1276{
1277 int bits_per_word;
1278 int bits_per_address;
1279 int bits_per_byte;
1280 enum bfd_architecture arch;
ae115e51 1281 unsigned long mach;
2ffbb79a
ILT
1282 const char *arch_name;
1283 const char *printable_name;
fdcb0453
KR
1284 unsigned int section_align_power;
1285 /* true if this is the default machine for the architecture */
1286 boolean the_default;
2ffbb79a
ILT
1287 const struct bfd_arch_info * (*compatible)
1288 PARAMS ((const struct bfd_arch_info *a,
1289 const struct bfd_arch_info *b));
1290
1291 boolean (*scan) PARAMS ((const struct bfd_arch_info *, const char *));
1292
1293 const struct bfd_arch_info *next;
fdcb0453 1294} bfd_arch_info_type;
2ffbb79a 1295const char *
fdcb0453
KR
1296bfd_printable_name PARAMS ((bfd *abfd));
1297
2ffbb79a
ILT
1298const bfd_arch_info_type *
1299bfd_scan_arch PARAMS ((const char *string));
fdcb0453 1300
eaa9c2e7
AC
1301const char **
1302bfd_arch_list PARAMS ((void));
1303
2ffbb79a 1304const bfd_arch_info_type *
fdcb0453 1305bfd_arch_get_compatible PARAMS ((
2ffbb79a
ILT
1306 const bfd *abfd,
1307 const bfd *bbfd));
fdcb0453
KR
1308
1309void
2ffbb79a 1310bfd_set_arch_info PARAMS ((bfd *abfd, const bfd_arch_info_type *arg));
fdcb0453
KR
1311
1312enum bfd_architecture
1313bfd_get_arch PARAMS ((bfd *abfd));
1314
1315unsigned long
1316bfd_get_mach PARAMS ((bfd *abfd));
1317
1318unsigned int
1319bfd_arch_bits_per_byte PARAMS ((bfd *abfd));
1320
1321unsigned int
1322bfd_arch_bits_per_address PARAMS ((bfd *abfd));
1323
2ffbb79a 1324const bfd_arch_info_type *
c188b0be 1325bfd_get_arch_info PARAMS ((bfd *abfd));
fdcb0453 1326
2ffbb79a 1327const bfd_arch_info_type *
fdcb0453
KR
1328bfd_lookup_arch
1329 PARAMS ((enum bfd_architecture
1330 arch,
ae115e51 1331 unsigned long machine));
fdcb0453 1332
2ffbb79a 1333const char *
fdcb0453
KR
1334bfd_printable_arch_mach
1335 PARAMS ((enum bfd_architecture arch, unsigned long machine));
1336
57a1867e 1337typedef enum bfd_reloc_status
fdcb0453
KR
1338{
1339 /* No errors detected */
1340 bfd_reloc_ok,
1341
1342 /* The relocation was performed, but there was an overflow. */
1343 bfd_reloc_overflow,
1344
1345 /* The address to relocate was not within the section supplied. */
1346 bfd_reloc_outofrange,
1347
1348 /* Used by special functions */
1349 bfd_reloc_continue,
1350
c188b0be 1351 /* Unsupported relocation size requested. */
fdcb0453
KR
1352 bfd_reloc_notsupported,
1353
c188b0be 1354 /* Unused */
fdcb0453
KR
1355 bfd_reloc_other,
1356
1357 /* The symbol to relocate against was undefined. */
1358 bfd_reloc_undefined,
1359
1360 /* The relocation was performed, but may not be ok - presently
1361 generated only when linking i960 coff files with i960 b.out
4c3721d5
ILT
1362 symbols. If this type is returned, the error_message argument
1363 to bfd_perform_relocation will be set. */
fdcb0453
KR
1364 bfd_reloc_dangerous
1365 }
1366 bfd_reloc_status_type;
1367
1368
57a1867e 1369typedef struct reloc_cache_entry
fdcb0453
KR
1370{
1371 /* A pointer into the canonical table of pointers */
1372 struct symbol_cache_entry **sym_ptr_ptr;
1373
1374 /* offset in section */
1375 bfd_size_type address;
1376
1377 /* addend for relocation value */
57a1867e 1378 bfd_vma addend;
fdcb0453
KR
1379
1380 /* Pointer to how to perform the required relocation */
5dc8db48 1381 reloc_howto_type *howto;
fdcb0453
KR
1382
1383} arelent;
66a277ab
ILT
1384enum complain_overflow
1385{
1386 /* Do not complain on overflow. */
1387 complain_overflow_dont,
1388
1389 /* Complain if the bitfield overflows, whether it is considered
1390 as signed or unsigned. */
1391 complain_overflow_bitfield,
1392
1393 /* Complain if the value overflows when considered as signed
1394 number. */
1395 complain_overflow_signed,
1396
1397 /* Complain if the value overflows when considered as an
1398 unsigned number. */
1399 complain_overflow_unsigned
1400};
fdcb0453 1401
1fb83be6 1402struct reloc_howto_struct
57a1867e 1403{
92a956e8 1404 /* The type field has mainly a documentary use - the back end can
c188b0be
DM
1405 do what it wants with it, though normally the back end's
1406 external idea of what a reloc number is stored
1407 in this field. For example, a PC relative word relocation
1408 in a coff environment has the type 023 - because that's
fdcb0453
KR
1409 what the outside world calls a R_PCRWORD reloc. */
1410 unsigned int type;
1411
1412 /* The value the final relocation is shifted right by. This drops
1413 unwanted data from the relocation. */
1414 unsigned int rightshift;
1415
9e461dac 1416 /* The size of the item to be relocated. This is *not* a
4c3721d5
ILT
1417 power-of-two measure. To get the number of bytes operated
1418 on by a type of relocation, use bfd_get_reloc_size. */
fdcb0453
KR
1419 int size;
1420
66a277ab
ILT
1421 /* The number of bits in the item to be relocated. This is used
1422 when doing overflow checking. */
fdcb0453
KR
1423 unsigned int bitsize;
1424
1425 /* Notes that the relocation is relative to the location in the
1426 data section of the addend. The relocation function will
1427 subtract from the relocation value the address of the location
1428 being relocated. */
1429 boolean pc_relative;
1430
66a277ab
ILT
1431 /* The bit position of the reloc value in the destination.
1432 The relocated value is left shifted by this amount. */
fdcb0453
KR
1433 unsigned int bitpos;
1434
66a277ab
ILT
1435 /* What type of overflow error should be checked for when
1436 relocating. */
1437 enum complain_overflow complain_on_overflow;
fdcb0453
KR
1438
1439 /* If this field is non null, then the supplied function is
1440 called rather than the normal function. This allows really
1441 strange relocation methods to be accomodated (e.g., i960 callj
1442 instructions). */
57a1867e 1443 bfd_reloc_status_type (*special_function)
fdcb0453
KR
1444 PARAMS ((bfd *abfd,
1445 arelent *reloc_entry,
1446 struct symbol_cache_entry *symbol,
1447 PTR data,
57a1867e 1448 asection *input_section,
4c3721d5
ILT
1449 bfd *output_bfd,
1450 char **error_message));
fdcb0453
KR
1451
1452 /* The textual name of the relocation type. */
1453 char *name;
1454
1455 /* When performing a partial link, some formats must modify the
1456 relocations rather than the data - this flag signals this.*/
1457 boolean partial_inplace;
1458
c188b0be 1459 /* The src_mask selects which parts of the read in data
fdcb0453
KR
1460 are to be used in the relocation sum. E.g., if this was an 8 bit
1461 bit of data which we read and relocated, this would be
1462 0x000000ff. When we have relocs which have an addend, such as
1463 sun4 extended relocs, the value in the offset part of a
1464 relocating field is garbage so we never use it. In this case
1465 the mask would be 0x00000000. */
1466 bfd_vma src_mask;
1467
c188b0be 1468 /* The dst_mask selects which parts of the instruction are replaced
fdcb0453
KR
1469 into the instruction. In most cases src_mask == dst_mask,
1470 except in the above special case, where dst_mask would be
1471 0x000000ff, and src_mask would be 0x00000000. */
57a1867e 1472 bfd_vma dst_mask;
fdcb0453
KR
1473
1474 /* When some formats create PC relative instructions, they leave
1475 the value of the pc of the place being relocated in the offset
1476 slot of the instruction, so that a PC relative relocation can
1477 be made just by adding in an ordinary offset (e.g., sun3 a.out).
1478 Some formats leave the displacement part of an instruction
c188b0be 1479 empty (e.g., m88k bcs); this flag signals the fact.*/
fdcb0453
KR
1480 boolean pcrel_offset;
1481
1fb83be6 1482};
66a277ab 1483#define HOWTO(C, R,S,B, P, BI, O, SF, NAME, INPLACE, MASKSRC, MASKDST, PC) \
b5b056fc 1484 {(unsigned)C,R,S,B, P, BI, O,SF,NAME,INPLACE,MASKSRC,MASKDST,PC}
66a277ab 1485#define NEWHOWTO( FUNCTION, NAME,SIZE,REL,IN) HOWTO(0,0,SIZE,0,REL,0,complain_overflow_dont,FUNCTION, NAME,false,0,0,IN)
fdcb0453
KR
1486
1487#define HOWTO_PREPARE(relocation, symbol) \
1488 { \
1489 if (symbol != (asymbol *)NULL) { \
1490 if (bfd_is_com_section (symbol->section)) { \
1491 relocation = 0; \
1492 } \
1493 else { \
1494 relocation = symbol->value; \
1495 } \
1496 } \
57a1867e 1497}
4c3721d5 1498int
82b1edf7 1499bfd_get_reloc_size PARAMS ((reloc_howto_type *));
4c3721d5 1500
fdcb0453
KR
1501typedef struct relent_chain {
1502 arelent relent;
1503 struct relent_chain *next;
1504} arelent_chain;
1505bfd_reloc_status_type
1506
22b23d7d
DE
1507bfd_check_overflow
1508 PARAMS ((enum complain_overflow how,
1509 unsigned int bitsize,
1510 unsigned int rightshift,
cd66558c 1511 bfd_vma relocation));
22b23d7d
DE
1512
1513bfd_reloc_status_type
1514
fdcb0453 1515bfd_perform_relocation
c188b0be 1516 PARAMS ((bfd *abfd,
fdcb0453
KR
1517 arelent *reloc_entry,
1518 PTR data,
1519 asection *input_section,
4c3721d5
ILT
1520 bfd *output_bfd,
1521 char **error_message));
fdcb0453 1522
fca2b81b
KR
1523bfd_reloc_status_type
1524
1525bfd_install_relocation
1526 PARAMS ((bfd *abfd,
1527 arelent *reloc_entry,
1528 PTR data, bfd_vma data_start,
1529 asection *input_section,
1530 char **error_message));
1531
0443af31
KR
1532enum bfd_reloc_code_real {
1533 _dummy_first_bfd_reloc_code_real,
1534
1535
1536/* Basic absolute relocations of N bits. */
fa5ba217 1537 BFD_RELOC_64,
fa5ba217 1538 BFD_RELOC_32,
e9c6595d 1539 BFD_RELOC_26,
db109ca2 1540 BFD_RELOC_24,
57a1867e 1541 BFD_RELOC_16,
7e7fb4a8 1542 BFD_RELOC_14,
fdcb0453 1543 BFD_RELOC_8,
9e461dac 1544
0443af31
KR
1545/* PC-relative relocations. Sometimes these are relative to the address
1546of the relocation itself; sometimes they are relative to the start of
1547the section containing the relocation. It depends on the specific target.
1548
1549The 24-bit relocation is used in some Intel 960 configurations. */
9e461dac
JK
1550 BFD_RELOC_64_PCREL,
1551 BFD_RELOC_32_PCREL,
0443af31 1552 BFD_RELOC_24_PCREL,
9e461dac 1553 BFD_RELOC_16_PCREL,
fca2b81b 1554 BFD_RELOC_12_PCREL,
fdcb0453 1555 BFD_RELOC_8_PCREL,
9e461dac 1556
3b1f83ad
JL
1557/* For ELF. */
1558 BFD_RELOC_32_GOT_PCREL,
1559 BFD_RELOC_16_GOT_PCREL,
1560 BFD_RELOC_8_GOT_PCREL,
1561 BFD_RELOC_32_GOTOFF,
1562 BFD_RELOC_16_GOTOFF,
02f85cda
MM
1563 BFD_RELOC_LO16_GOTOFF,
1564 BFD_RELOC_HI16_GOTOFF,
1565 BFD_RELOC_HI16_S_GOTOFF,
3b1f83ad
JL
1566 BFD_RELOC_8_GOTOFF,
1567 BFD_RELOC_32_PLT_PCREL,
02f85cda 1568 BFD_RELOC_24_PLT_PCREL,
3b1f83ad
JL
1569 BFD_RELOC_16_PLT_PCREL,
1570 BFD_RELOC_8_PLT_PCREL,
1571 BFD_RELOC_32_PLTOFF,
1572 BFD_RELOC_16_PLTOFF,
02f85cda
MM
1573 BFD_RELOC_LO16_PLTOFF,
1574 BFD_RELOC_HI16_PLTOFF,
1575 BFD_RELOC_HI16_S_PLTOFF,
3b1f83ad
JL
1576 BFD_RELOC_8_PLTOFF,
1577
1578/* Relocations used by 68K ELF. */
1579 BFD_RELOC_68K_GLOB_DAT,
1580 BFD_RELOC_68K_JMP_SLOT,
1581 BFD_RELOC_68K_RELATIVE,
1582
0443af31 1583/* Linkage-table relative. */
9e461dac
JK
1584 BFD_RELOC_32_BASEREL,
1585 BFD_RELOC_16_BASEREL,
02f85cda
MM
1586 BFD_RELOC_LO16_BASEREL,
1587 BFD_RELOC_HI16_BASEREL,
1588 BFD_RELOC_HI16_S_BASEREL,
9e461dac 1589 BFD_RELOC_8_BASEREL,
815179af 1590 BFD_RELOC_RVA,
fdcb0453 1591
0443af31 1592/* Absolute 8-bit relocation, but used to form an address like 0xFFnn. */
9e461dac
JK
1593 BFD_RELOC_8_FFnn,
1594
fca2b81b
KR
1595/* These PC-relative relocations are stored as word displacements --
1596i.e., byte displacements shifted right two bits. The 30-bit word
1597displacement (<<32_PCREL_S2>> -- 32 bits, shifted 2) is used on the
1598SPARC. (SPARC tools generally refer to this as <<WDISP30>>.) The
1599signed 16-bit displacement is used on the MIPS, and the 23-bit
1600displacement is used on the Alpha. */
9e461dac 1601 BFD_RELOC_32_PCREL_S2,
7e7fb4a8 1602 BFD_RELOC_16_PCREL_S2,
7e7fb4a8 1603 BFD_RELOC_23_PCREL_S2,
9e461dac 1604
0443af31
KR
1605/* High 22 bits and low 10 bits of 32-bit value, placed into lower bits of
1606the target word. These are used on the SPARC. */
fdcb0453 1607 BFD_RELOC_HI22,
fdcb0453
KR
1608 BFD_RELOC_LO10,
1609
0443af31
KR
1610/* For systems that allocate a Global Pointer register, these are
1611displacements off that register. These relocation types are
1612handled specially, because the value the register will have is
1613decided relatively late. */
7e7fb4a8
KR
1614 BFD_RELOC_GPREL16,
1615 BFD_RELOC_GPREL32,
1616
0443af31 1617/* Reloc types used for i960/b.out. */
fdcb0453
KR
1618 BFD_RELOC_I960_CALLJ,
1619
0443af31
KR
1620/* SPARC ELF relocations. There is probably some overlap with other
1621relocation types already defined. */
1622 BFD_RELOC_NONE,
fdcb0453
KR
1623 BFD_RELOC_SPARC_WDISP22,
1624 BFD_RELOC_SPARC22,
1625 BFD_RELOC_SPARC13,
fdcb0453
KR
1626 BFD_RELOC_SPARC_GOT10,
1627 BFD_RELOC_SPARC_GOT13,
1628 BFD_RELOC_SPARC_GOT22,
1629 BFD_RELOC_SPARC_PC10,
1630 BFD_RELOC_SPARC_PC22,
1631 BFD_RELOC_SPARC_WPLT30,
1632 BFD_RELOC_SPARC_COPY,
1633 BFD_RELOC_SPARC_GLOB_DAT,
1634 BFD_RELOC_SPARC_JMP_SLOT,
1635 BFD_RELOC_SPARC_RELATIVE,
1636 BFD_RELOC_SPARC_UA32,
1637
0443af31 1638/* I think these are specific to SPARC a.out (e.g., Sun 4). */
5284a822 1639 BFD_RELOC_SPARC_BASE13,
fdcb0453
KR
1640 BFD_RELOC_SPARC_BASE22,
1641
22b23d7d 1642/* SPARC64 relocations */
0443af31 1643#define BFD_RELOC_SPARC_64 BFD_RELOC_64
fa5ba217
KR
1644 BFD_RELOC_SPARC_10,
1645 BFD_RELOC_SPARC_11,
fa5ba217
KR
1646 BFD_RELOC_SPARC_OLO10,
1647 BFD_RELOC_SPARC_HH22,
1648 BFD_RELOC_SPARC_HM10,
1649 BFD_RELOC_SPARC_LM22,
1650 BFD_RELOC_SPARC_PC_HH22,
1651 BFD_RELOC_SPARC_PC_HM10,
1652 BFD_RELOC_SPARC_PC_LM22,
1653 BFD_RELOC_SPARC_WDISP16,
5284a822 1654 BFD_RELOC_SPARC_WDISP19,
e9f03cd4
ILT
1655 BFD_RELOC_SPARC_7,
1656 BFD_RELOC_SPARC_6,
1657 BFD_RELOC_SPARC_5,
22b23d7d
DE
1658#define BFD_RELOC_SPARC_DISP64 BFD_RELOC_64_PCREL
1659 BFD_RELOC_SPARC_PLT64,
1660 BFD_RELOC_SPARC_HIX22,
1661 BFD_RELOC_SPARC_LOX10,
1662 BFD_RELOC_SPARC_H44,
1663 BFD_RELOC_SPARC_M44,
1664 BFD_RELOC_SPARC_L44,
1665 BFD_RELOC_SPARC_REGISTER,
5284a822 1666
34255b70
JL
1667/* Alpha ECOFF and ELF relocations. Some of these treat the symbol or
1668"addend" in some special way.
0443af31
KR
1669For GPDISP_HI16 ("gpdisp") relocations, the symbol is ignored when
1670writing; when reading, it will be the absolute section symbol. The
1671addend is the displacement in bytes of the "lda" instruction from
1672the "ldah" instruction (which is at the address of this reloc). */
7e7fb4a8 1673 BFD_RELOC_ALPHA_GPDISP_HI16,
0443af31
KR
1674
1675/* For GPDISP_LO16 ("ignore") relocations, the symbol is handled as
1676with GPDISP_HI16 relocs. The addend is ignored when writing the
1677relocations out, and is filled in with the file's GP value on
1678reading, for convenience. */
7e7fb4a8
KR
1679 BFD_RELOC_ALPHA_GPDISP_LO16,
1680
34255b70
JL
1681/* The ELF GPDISP relocation is exactly the same as the GPDISP_HI16
1682relocation except that there is no accompanying GPDISP_LO16
1683relocation. */
1684 BFD_RELOC_ALPHA_GPDISP,
1685
0443af31
KR
1686/* The Alpha LITERAL/LITUSE relocs are produced by a symbol reference;
1687the assembler turns it into a LDQ instruction to load the address of
1688the symbol, and then fills in a register in the real instruction.
1689
1690The LITERAL reloc, at the LDQ instruction, refers to the .lita
1691section symbol. The addend is ignored when writing, but is filled
1692in with the file's GP value on reading, for convenience, as with the
1693GPDISP_LO16 reloc.
1694
6b31fd3a
ILT
1695The ELF_LITERAL reloc is somewhere between 16_GOTOFF and GPDISP_LO16.
1696It should refer to the symbol to be referenced, as with 16_GOTOFF,
1697but it generates output not based on the position within the .got
1698section, but relative to the GP value chosen for the file during the
1699final link stage.
1700
0443af31
KR
1701The LITUSE reloc, on the instruction using the loaded address, gives
1702information to the linker that it might be able to use to optimize
1703away some literal section references. The symbol is ignored (read
1704as the absolute section symbol), and the "addend" indicates the type
1705of instruction using the register:
17061 - "memory" fmt insn
17072 - byte-manipulation (byte offset reg)
17083 - jsr (target of branch)
1709
1710The GNU linker currently doesn't do any of this optimizing. */
7e7fb4a8 1711 BFD_RELOC_ALPHA_LITERAL,
6b31fd3a 1712 BFD_RELOC_ALPHA_ELF_LITERAL,
7e7fb4a8
KR
1713 BFD_RELOC_ALPHA_LITUSE,
1714
0443af31
KR
1715/* The HINT relocation indicates a value that should be filled into the
1716"hint" field of a jmp/jsr/ret instruction, for possible branch-
1717prediction logic which may be provided on some processors. */
7e7fb4a8
KR
1718 BFD_RELOC_ALPHA_HINT,
1719
8612a388
ILT
1720/* The LINKAGE relocation outputs a linkage pair in the object file,
1721which is filled by the linker. */
c3d8e071
ILT
1722 BFD_RELOC_ALPHA_LINKAGE,
1723
92a956e8
FF
1724/* The CODEADDR relocation outputs a STO_CA in the object file,
1725which is filled by the linker. */
1726 BFD_RELOC_ALPHA_CODEADDR,
1727
0443af31
KR
1728/* Bits 27..2 of the relocation address shifted right 2 bits;
1729simple reloc otherwise. */
fdcb0453
KR
1730 BFD_RELOC_MIPS_JMP,
1731
cd6213ff
FF
1732/* The MIPS16 jump instruction. */
1733 BFD_RELOC_MIPS16_JMP,
1734
a4183ba5
ILT
1735/* MIPS16 GP relative reloc. */
1736 BFD_RELOC_MIPS16_GPREL,
1737
0443af31 1738/* High 16 bits of 32-bit value; simple reloc. */
fdcb0453 1739 BFD_RELOC_HI16,
0443af31
KR
1740
1741/* High 16 bits of 32-bit value but the low 16 bits will be sign
1742extended and added to form the final result. If the low 16
1743bits form a negative number, we need to add one to the high value
1744to compensate for the borrow when the low bits are added. */
fdcb0453 1745 BFD_RELOC_HI16_S,
0443af31
KR
1746
1747/* Low 16 bits. */
fdcb0453 1748 BFD_RELOC_LO16,
0443af31
KR
1749
1750/* Like BFD_RELOC_HI16_S, but PC relative. */
7efb1850 1751 BFD_RELOC_PCREL_HI16_S,
0443af31
KR
1752
1753/* Like BFD_RELOC_LO16, but PC relative. */
7efb1850 1754 BFD_RELOC_PCREL_LO16,
fdcb0453 1755
0443af31 1756/* Relocation relative to the global pointer. */
7e7fb4a8 1757#define BFD_RELOC_MIPS_GPREL BFD_RELOC_GPREL16
fdcb0453 1758
0443af31 1759/* Relocation against a MIPS literal section. */
0a197a96
JG
1760 BFD_RELOC_MIPS_LITERAL,
1761
0443af31 1762/* MIPS ELF relocations. */
0a197a96
JG
1763 BFD_RELOC_MIPS_GOT16,
1764 BFD_RELOC_MIPS_CALL16,
7e7fb4a8 1765#define BFD_RELOC_MIPS_GPREL32 BFD_RELOC_GPREL32
e9f03cd4
ILT
1766 BFD_RELOC_MIPS_GOT_HI16,
1767 BFD_RELOC_MIPS_GOT_LO16,
b7384d22
ILT
1768 BFD_RELOC_MIPS_CALL_HI16,
1769 BFD_RELOC_MIPS_CALL_LO16,
0a197a96 1770
0443af31 1771/* i386/elf relocations */
b66b07a2
KR
1772 BFD_RELOC_386_GOT32,
1773 BFD_RELOC_386_PLT32,
1774 BFD_RELOC_386_COPY,
1775 BFD_RELOC_386_GLOB_DAT,
1776 BFD_RELOC_386_JUMP_SLOT,
1777 BFD_RELOC_386_RELATIVE,
1778 BFD_RELOC_386_GOTOFF,
1779 BFD_RELOC_386_GOTPC,
1780
0443af31 1781/* ns32k relocations */
1fb83be6
KR
1782 BFD_RELOC_NS32K_IMM_8,
1783 BFD_RELOC_NS32K_IMM_16,
1784 BFD_RELOC_NS32K_IMM_32,
1785 BFD_RELOC_NS32K_IMM_8_PCREL,
1786 BFD_RELOC_NS32K_IMM_16_PCREL,
1787 BFD_RELOC_NS32K_IMM_32_PCREL,
1788 BFD_RELOC_NS32K_DISP_8,
1789 BFD_RELOC_NS32K_DISP_16,
1790 BFD_RELOC_NS32K_DISP_32,
1791 BFD_RELOC_NS32K_DISP_8_PCREL,
1792 BFD_RELOC_NS32K_DISP_16_PCREL,
1793 BFD_RELOC_NS32K_DISP_32_PCREL,
1794
02f85cda 1795/* Power(rs6000) and PowerPC relocations. */
d1ad85a6 1796 BFD_RELOC_PPC_B26,
d1ad85a6 1797 BFD_RELOC_PPC_BA26,
d1ad85a6 1798 BFD_RELOC_PPC_TOC16,
02f85cda
MM
1799 BFD_RELOC_PPC_B16,
1800 BFD_RELOC_PPC_B16_BRTAKEN,
1801 BFD_RELOC_PPC_B16_BRNTAKEN,
1802 BFD_RELOC_PPC_BA16,
1803 BFD_RELOC_PPC_BA16_BRTAKEN,
1804 BFD_RELOC_PPC_BA16_BRNTAKEN,
1805 BFD_RELOC_PPC_COPY,
1806 BFD_RELOC_PPC_GLOB_DAT,
1807 BFD_RELOC_PPC_JMP_SLOT,
1808 BFD_RELOC_PPC_RELATIVE,
1809 BFD_RELOC_PPC_LOCAL24PC,
4500a112
MM
1810 BFD_RELOC_PPC_EMB_NADDR32,
1811 BFD_RELOC_PPC_EMB_NADDR16,
1812 BFD_RELOC_PPC_EMB_NADDR16_LO,
1813 BFD_RELOC_PPC_EMB_NADDR16_HI,
1814 BFD_RELOC_PPC_EMB_NADDR16_HA,
1815 BFD_RELOC_PPC_EMB_SDAI16,
1816 BFD_RELOC_PPC_EMB_SDA2I16,
1817 BFD_RELOC_PPC_EMB_SDA2REL,
1818 BFD_RELOC_PPC_EMB_SDA21,
1819 BFD_RELOC_PPC_EMB_MRKREF,
1820 BFD_RELOC_PPC_EMB_RELSEC16,
1821 BFD_RELOC_PPC_EMB_RELST_LO,
1822 BFD_RELOC_PPC_EMB_RELST_HI,
1823 BFD_RELOC_PPC_EMB_RELST_HA,
1824 BFD_RELOC_PPC_EMB_BIT_FLD,
1825 BFD_RELOC_PPC_EMB_RELSDA,
d1ad85a6 1826
0443af31
KR
1827/* The type of reloc used to build a contructor table - at the moment
1828probably a 32 bit wide absolute relocation, but the target can choose.
1829It generally does map to one of the other relocation types. */
1830 BFD_RELOC_CTOR,
d80ebaac
ILT
1831
1832/* ARM 26 bit pc-relative branch. The lowest two bits must be zero and are
1833not stored in the instruction. */
1834 BFD_RELOC_ARM_PCREL_BRANCH,
1835
1836/* These relocs are only used within the ARM assembler. They are not
1837(at present) written to any object files. */
1838 BFD_RELOC_ARM_IMMEDIATE,
1839 BFD_RELOC_ARM_OFFSET_IMM,
1840 BFD_RELOC_ARM_SHIFT_IMM,
1841 BFD_RELOC_ARM_SWI,
1842 BFD_RELOC_ARM_MULTI,
1843 BFD_RELOC_ARM_CP_OFF_IMM,
3b1f83ad
JL
1844 BFD_RELOC_ARM_ADR_IMM,
1845 BFD_RELOC_ARM_LDR_IMM,
1846 BFD_RELOC_ARM_LITERAL,
1847 BFD_RELOC_ARM_IN_POOL,
d1b40d8e
JSC
1848 BFD_RELOC_ARM_OFFSET_IMM8,
1849 BFD_RELOC_ARM_HWLITERAL,
c86158e5
ILT
1850 BFD_RELOC_ARM_THUMB_ADD,
1851 BFD_RELOC_ARM_THUMB_IMM,
1852 BFD_RELOC_ARM_THUMB_SHIFT,
1853 BFD_RELOC_ARM_THUMB_OFFSET,
1854
1855/* Hitachi SH relocs. Not all of these appear in object files. */
1856 BFD_RELOC_SH_PCDISP8BY2,
1857 BFD_RELOC_SH_PCDISP12BY2,
1858 BFD_RELOC_SH_IMM4,
1859 BFD_RELOC_SH_IMM4BY2,
1860 BFD_RELOC_SH_IMM4BY4,
1861 BFD_RELOC_SH_IMM8,
1862 BFD_RELOC_SH_IMM8BY2,
1863 BFD_RELOC_SH_IMM8BY4,
1864 BFD_RELOC_SH_PCRELIMM8BY2,
1865 BFD_RELOC_SH_PCRELIMM8BY4,
1866 BFD_RELOC_SH_SWITCH16,
1867 BFD_RELOC_SH_SWITCH32,
1868 BFD_RELOC_SH_USES,
1869 BFD_RELOC_SH_COUNT,
1870 BFD_RELOC_SH_ALIGN,
1871 BFD_RELOC_SH_CODE,
1872 BFD_RELOC_SH_DATA,
1873 BFD_RELOC_SH_LABEL,
76af94b9
DE
1874
1875/* Thumb 23-, 12- and 9-bit pc-relative branches. The lowest bit must
1876be zero and is not stored in the instruction. */
1877 BFD_RELOC_THUMB_PCREL_BRANCH9,
1878 BFD_RELOC_THUMB_PCREL_BRANCH12,
1879 BFD_RELOC_THUMB_PCREL_BRANCH23,
05cedcf6
DE
1880
1881/* Argonaut RISC Core (ARC) relocs.
1882ARC 22 bit pc-relative branch. The lowest two bits must be zero and are
3b1f83ad
JL
1883not stored in the instruction. The high 20 bits are installed in bits 26
1884through 7 of the instruction. */
05cedcf6 1885 BFD_RELOC_ARC_B22_PCREL,
3b1f83ad
JL
1886
1887/* ARC 26 bit absolute branch. The lowest two bits must be zero and are not
1888stored in the instruction. The high 24 bits are installed in bits 23
1889through 0. */
1890 BFD_RELOC_ARC_B26,
db986c60 1891
50bd50d4
MH
1892/* Mitsubishi D10V relocs.
1893This is a 10-bit reloc with the right 2 bits
1894assumed to be 0. */
50bd50d4
MH
1895 BFD_RELOC_D10V_10_PCREL_R,
1896
f4e14cb9
ILT
1897/* Mitsubishi D10V relocs.
1898This is a 10-bit reloc with the right 2 bits
1899assumed to be 0. This is the same as the previous reloc
1900except it is in the left container, i.e.,
1901shifted left 15 bits. */
1902 BFD_RELOC_D10V_10_PCREL_L,
1903
50bd50d4
MH
1904/* This is an 18-bit reloc with the right 2 bits
1905assumed to be 0. */
1906 BFD_RELOC_D10V_18,
1907
1908/* This is an 18-bit reloc with the right 2 bits
1909assumed to be 0. */
1910 BFD_RELOC_D10V_18_PCREL,
50bd50d4 1911
fd8d7c31
MH
1912/* start-sanitize-d30v */
1913
1914/* Mitsubishi D30V relocs.
1915This is a 6-bit absolute reloc. */
1916 BFD_RELOC_D30V_6,
1917
2199f848
KR
1918/* This is a 6-bit pc-relative reloc with
1919the right 3 bits assumed to be 0. */
1920 BFD_RELOC_D30V_9_PCREL,
1921
1922/* This is a 6-bit pc-relative reloc with
1923the right 3 bits assumed to be 0. Same
1924as the previous reloc but on the right side
1925of the container. */
1926 BFD_RELOC_D30V_9_PCREL_R,
1927
1928/* This is a 12-bit absolute reloc with the
fd8d7c31
MH
1929right 3 bitsassumed to be 0. */
1930 BFD_RELOC_D30V_15,
1931
2199f848 1932/* This is a 12-bit pc-relative reloc with
fd8d7c31
MH
1933the right 3 bits assumed to be 0. */
1934 BFD_RELOC_D30V_15_PCREL,
1935
2199f848
KR
1936/* This is a 12-bit pc-relative reloc with
1937the right 3 bits assumed to be 0. Same
1938as the previous reloc but on the right side
1939of the container. */
1940 BFD_RELOC_D30V_15_PCREL_R,
1941
fd8d7c31
MH
1942/* This is an 18-bit absolute reloc with
1943the right 3 bits assumed to be 0. */
1944 BFD_RELOC_D30V_21,
1945
1946/* This is an 18-bit pc-relative reloc with
1947the right 3 bits assumed to be 0. */
1948 BFD_RELOC_D30V_21_PCREL,
1949
2199f848
KR
1950/* This is an 18-bit pc-relative reloc with
1951the right 3 bits assumed to be 0. Same
1952as the previous reloc but on the right side
1953of the container. */
1954 BFD_RELOC_D30V_21_PCREL_R,
1955
fd8d7c31
MH
1956/* This is a 32-bit absolute reloc. */
1957 BFD_RELOC_D30V_32,
1958
1959/* This is a 32-bit pc-relative reloc. */
1960 BFD_RELOC_D30V_32_PCREL,
1961/* end-sanitize-d30v */
1962
3ebefb07
DE
1963
1964/* Mitsubishi M32R relocs.
cd6213ff
FF
1965This is a 24 bit absolute address. */
1966 BFD_RELOC_M32R_24,
efc2b064 1967
cd6213ff
FF
1968/* This is a 10-bit pc-relative reloc with the right 2 bits assumed to be 0. */
1969 BFD_RELOC_M32R_10_PCREL,
3ebefb07
DE
1970
1971/* This is an 18-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1972 BFD_RELOC_M32R_18_PCREL,
3ebefb07 1973
1d5c6cfd 1974/* This is a 26-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1975 BFD_RELOC_M32R_26_PCREL,
1d5c6cfd
DE
1976
1977/* This is a 16-bit reloc containing the high 16 bits of an address
1978used when the lower 16 bits are treated as unsigned. */
1979 BFD_RELOC_M32R_HI16_ULO,
1980
1981/* This is a 16-bit reloc containing the high 16 bits of an address
1982used when the lower 16 bits are treated as signed. */
1983 BFD_RELOC_M32R_HI16_SLO,
1984
1985/* This is a 16-bit reloc containing the lower 16 bits of an address. */
1986 BFD_RELOC_M32R_LO16,
77dd1a25
DE
1987
1988/* This is a 16-bit reloc containing the small data area offset for use in
1989add3, load, and store instructions. */
1990 BFD_RELOC_M32R_SDA16,
00d7a64b
JL
1991
1992/* This is a 9-bit reloc */
c86158e5 1993 BFD_RELOC_V850_9_PCREL,
00d7a64b
JL
1994
1995/* This is a 22-bit reloc */
c86158e5 1996 BFD_RELOC_V850_22_PCREL,
b6d08fce 1997
4878fa5b
ILT
1998/* This is a 16 bit offset from the short data area pointer. */
1999 BFD_RELOC_V850_SDA_16_16_OFFSET,
2000
2001/* This is a 16 bit offset (of which only 15 bits are used) from the
2002short data area pointer. */
2003 BFD_RELOC_V850_SDA_15_16_OFFSET,
2004
2005/* This is a 16 bit offset from the zero data area pointer. */
2006 BFD_RELOC_V850_ZDA_16_16_OFFSET,
2007
2008/* This is a 16 bit offset (of which only 15 bits are used) from the
2009zero data area pointer. */
2010 BFD_RELOC_V850_ZDA_15_16_OFFSET,
2011
2012/* This is an 8 bit offset (of which only 6 bits are used) from the
2013tiny data area pointer. */
2014 BFD_RELOC_V850_TDA_6_8_OFFSET,
2015
2016/* This is an 8bit offset (of which only 7 bits are used) from the tiny
2017data area pointer. */
2018 BFD_RELOC_V850_TDA_7_8_OFFSET,
2019
2020/* This is a 7 bit offset from the tiny data area pointer. */
2021 BFD_RELOC_V850_TDA_7_7_OFFSET,
5bb28764
NC
2022
2023/* This is a 16 bit offset from the tiny data area pointer. */
2024 BFD_RELOC_V850_TDA_16_16_OFFSET,
def31039 2025/* start-sanitize-v850e */
4878fa5b
ILT
2026
2027/* This is a 5 bit offset (of which only 4 bits are used) from the tiny
2028data area pointer. */
2029 BFD_RELOC_V850_TDA_4_5_OFFSET,
2030
2031/* This is a 4 bit offset from the tiny data area pointer. */
2032 BFD_RELOC_V850_TDA_4_4_OFFSET,
2033
2034/* This is a 16 bit offset from the short data area pointer, with the
2035bits placed non-contigously in the instruction. */
2036 BFD_RELOC_V850_SDA_16_16_SPLIT_OFFSET,
2037
2038/* This is a 16 bit offset from the zero data area pointer, with the
2039bits placed non-contigously in the instruction. */
2040 BFD_RELOC_V850_ZDA_16_16_SPLIT_OFFSET,
9420c20a
NC
2041
2042/* This is a 6 bit offset from the call table base pointer. */
2043 BFD_RELOC_V850_CALLT_6_7_OFFSET,
2044
2045/* This is a 16 bit offset from the call table base pointer. */
2046 BFD_RELOC_V850_CALLT_16_16_OFFSET,
2cf9a0d0 2047/* end-sanitize-v850e */
cd6213ff 2048
4878fa5b 2049
cd6213ff
FF
2050/* This is a 32bit pcrel reloc for the mn10300, offset by two bytes in the
2051instruction. */
2052 BFD_RELOC_MN10300_32_PCREL,
2053
2054/* This is a 16bit pcrel reloc for the mn10300, offset by two bytes in the
2055instruction. */
2056 BFD_RELOC_MN10300_16_PCREL,
0443af31
KR
2057 BFD_RELOC_UNUSED };
2058typedef enum bfd_reloc_code_real bfd_reloc_code_real_type;
5dc8db48 2059reloc_howto_type *
fdcb0453
KR
2060
2061bfd_reloc_type_lookup PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
2062
0443af31
KR
2063const char *
2064bfd_get_reloc_code_name PARAMS ((bfd_reloc_code_real_type code));
2065
ef758f3e 2066
57a1867e 2067typedef struct symbol_cache_entry
fdcb0453
KR
2068{
2069 /* A pointer to the BFD which owns the symbol. This information
2070 is necessary so that a back end can work out what additional
2071 information (invisible to the application writer) is carried
2072 with the symbol.
2073
2074 This field is *almost* redundant, since you can use section->owner
2075 instead, except that some symbols point to the global sections
2076 bfd_{abs,com,und}_section. This could be fixed by making
2077 these globals be per-bfd (or per-target-flavor). FIXME. */
2078
2079 struct _bfd *the_bfd; /* Use bfd_asymbol_bfd(sym) to access this field. */
2080
c188b0be 2081 /* The text of the symbol. The name is left alone, and not copied; the
fdcb0453
KR
2082 application may not alter it. */
2083 CONST char *name;
2084
2085 /* The value of the symbol. This really should be a union of a
2086 numeric value with a pointer, since some flags indicate that
2087 a pointer to another symbol is stored here. */
2088 symvalue value;
2089
2090 /* Attributes of a symbol: */
2091
2092#define BSF_NO_FLAGS 0x00
2093
2094 /* The symbol has local scope; <<static>> in <<C>>. The value
2095 is the offset into the section of the data. */
2096#define BSF_LOCAL 0x01
2097
2098 /* The symbol has global scope; initialized data in <<C>>. The
2099 value is the offset into the section of the data. */
2100#define BSF_GLOBAL 0x02
2101
c188b0be 2102 /* The symbol has global scope and is exported. The value is
fdcb0453 2103 the offset into the section of the data. */
ef758f3e 2104#define BSF_EXPORT BSF_GLOBAL /* no real difference */
fdcb0453
KR
2105
2106 /* A normal C symbol would be one of:
2107 <<BSF_LOCAL>>, <<BSF_FORT_COMM>>, <<BSF_UNDEFINED>> or
ef758f3e 2108 <<BSF_GLOBAL>> */
fdcb0453
KR
2109
2110 /* The symbol is a debugging record. The value has an arbitary
2111 meaning. */
2112#define BSF_DEBUGGING 0x08
2113
2114 /* The symbol denotes a function entry point. Used in ELF,
2115 perhaps others someday. */
2116#define BSF_FUNCTION 0x10
2117
2118 /* Used by the linker. */
2119#define BSF_KEEP 0x20
2120#define BSF_KEEP_G 0x40
2121
b66b07a2
KR
2122 /* A weak global symbol, overridable without warnings by
2123 a regular global symbol of the same name. */
fdcb0453
KR
2124#define BSF_WEAK 0x80
2125
2126 /* This symbol was created to point to a section, e.g. ELF's
2127 STT_SECTION symbols. */
2128#define BSF_SECTION_SYM 0x100
2129
2130 /* The symbol used to be a common symbol, but now it is
2131 allocated. */
2132#define BSF_OLD_COMMON 0x200
2133
2134 /* The default value for common data. */
2135#define BFD_FORT_COMM_DEFAULT_VALUE 0
2136
2137 /* In some files the type of a symbol sometimes alters its
2138 location in an output file - ie in coff a <<ISFCN>> symbol
2139 which is also <<C_EXT>> symbol appears where it was
2140 declared and not at the end of a section. This bit is set
2141 by the target BFD part to convey this information. */
2142
2143#define BSF_NOT_AT_END 0x400
2144
2145 /* Signal that the symbol is the label of constructor section. */
2146#define BSF_CONSTRUCTOR 0x800
2147
fcf490c0
ILT
2148 /* Signal that the symbol is a warning symbol. The name is a
2149 warning. The name of the next symbol is the one to warn about;
2150 if a reference is made to a symbol with the same name as the next
2151 symbol, a warning is issued by the linker. */
fdcb0453
KR
2152#define BSF_WARNING 0x1000
2153
fcf490c0
ILT
2154 /* Signal that the symbol is indirect. This symbol is an indirect
2155 pointer to the symbol with the same name as the next symbol. */
fdcb0453
KR
2156#define BSF_INDIRECT 0x2000
2157
2158 /* BSF_FILE marks symbols that contain a file name. This is used
2159 for ELF STT_FILE symbols. */
2160#define BSF_FILE 0x4000
2161
0ee75d02
ILT
2162 /* Symbol is from dynamic linking information. */
2163#define BSF_DYNAMIC 0x8000
2164
cbe75cb6
ILT
2165 /* The symbol denotes a data object. Used in ELF, and perhaps
2166 others someday. */
2167#define BSF_OBJECT 0x10000
2168
fdcb0453
KR
2169 flagword flags;
2170
57a1867e 2171 /* A pointer to the section to which this symbol is
fdcb0453 2172 relative. This will always be non NULL, there are special
fca2b81b 2173 sections for undefined and absolute symbols. */
fdcb0453
KR
2174 struct sec *section;
2175
fca2b81b
KR
2176 /* Back end special data. */
2177 union
2178 {
2179 PTR p;
2180 bfd_vma i;
2181 } udata;
fdcb0453
KR
2182
2183} asymbol;
326e32d7
ILT
2184#define bfd_get_symtab_upper_bound(abfd) \
2185 BFD_SEND (abfd, _bfd_get_symtab_upper_bound, (abfd))
5a66538b
KR
2186boolean
2187bfd_is_local_label PARAMS ((bfd *abfd, asymbol *sym));
2188
35a3e78e
ILT
2189boolean
2190bfd_is_local_label_name PARAMS ((bfd *abfd, const char *name));
2191
2192#define bfd_is_local_label_name(abfd, name) \
2193 BFD_SEND (abfd, _bfd_is_local_label_name, (abfd, name))
fdcb0453
KR
2194#define bfd_canonicalize_symtab(abfd, location) \
2195 BFD_SEND (abfd, _bfd_canonicalize_symtab,\
2196 (abfd, location))
2197boolean
c188b0be 2198bfd_set_symtab PARAMS ((bfd *abfd, asymbol **location, unsigned int count));
fdcb0453
KR
2199
2200void
2201bfd_print_symbol_vandf PARAMS ((PTR file, asymbol *symbol));
2202
2203#define bfd_make_empty_symbol(abfd) \
2204 BFD_SEND (abfd, _bfd_make_empty_symbol, (abfd))
2205#define bfd_make_debug_symbol(abfd,ptr,size) \
2206 BFD_SEND (abfd, _bfd_make_debug_symbol, (abfd, ptr, size))
2207int
2208bfd_decode_symclass PARAMS ((asymbol *symbol));
2209
2210void
2211bfd_symbol_info PARAMS ((asymbol *symbol, symbol_info *ret));
2212
6167a840
JL
2213boolean
2214bfd_copy_private_symbol_data PARAMS ((bfd *ibfd, asymbol *isym, bfd *obfd, asymbol *osym));
2215
2216#define bfd_copy_private_symbol_data(ibfd, isymbol, obfd, osymbol) \
efc2b064 2217 BFD_SEND (obfd, _bfd_copy_private_symbol_data, \
6167a840 2218 (ibfd, isymbol, obfd, osymbol))
fdcb0453
KR
2219struct _bfd
2220{
2221 /* The filename the application opened the BFD with. */
2222 CONST char *filename;
2223
2224 /* A pointer to the target jump table. */
2f3508ad 2225 const struct bfd_target *xvec;
fdcb0453
KR
2226
2227 /* To avoid dragging too many header files into every file that
2228 includes `<<bfd.h>>', IOSTREAM has been declared as a "char
2229 *", and MTIME as a "long". Their correct types, to which they
2230 are cast when used, are "FILE *" and "time_t". The iostream
64d5f5d0
ILT
2231 is the result of an fopen on the filename. However, if the
2232 BFD_IN_MEMORY flag is set, then iostream is actually a pointer
2233 to a bfd_in_memory struct. */
2234 PTR iostream;
fdcb0453 2235
0a197a96
JG
2236 /* Is the file descriptor being cached? That is, can it be closed as
2237 needed, and re-opened when accessed later? */
fdcb0453
KR
2238
2239 boolean cacheable;
2240
2241 /* Marks whether there was a default target specified when the
c188b0be
DM
2242 BFD was opened. This is used to select which matching algorithm
2243 to use to choose the back end. */
fdcb0453
KR
2244
2245 boolean target_defaulted;
2246
2247 /* The caching routines use these to maintain a
2248 least-recently-used list of BFDs */
2249
2250 struct _bfd *lru_prev, *lru_next;
2251
2252 /* When a file is closed by the caching routines, BFD retains
c188b0be 2253 state information on the file here: */
fdcb0453
KR
2254
2255 file_ptr where;
2256
c188b0be 2257 /* and here: (``once'' means at least once) */
fdcb0453
KR
2258
2259 boolean opened_once;
2260
2261 /* Set if we have a locally maintained mtime value, rather than
2262 getting it from the file each time: */
2263
2264 boolean mtime_set;
2265
2266 /* File modified time, if mtime_set is true: */
2267
2268 long mtime;
2269
2270 /* Reserved for an unimplemented file locking extension.*/
2271
2272 int ifd;
2273
c188b0be 2274 /* The format which belongs to the BFD. (object, core, etc.) */
fdcb0453
KR
2275
2276 bfd_format format;
2277
2278 /* The direction the BFD was opened with*/
2279
2280 enum bfd_direction {no_direction = 0,
2281 read_direction = 1,
2282 write_direction = 2,
2283 both_direction = 3} direction;
2284
2285 /* Format_specific flags*/
2286
2287 flagword flags;
2288
2289 /* Currently my_archive is tested before adding origin to
2290 anything. I believe that this can become always an add of
2291 origin, with origin set to 0 for non archive files. */
2292
2293 file_ptr origin;
2294
2295 /* Remember when output has begun, to stop strange things
c188b0be 2296 from happening. */
fdcb0453
KR
2297 boolean output_has_begun;
2298
2299 /* Pointer to linked list of sections*/
2300 struct sec *sections;
2301
2302 /* The number of sections */
2303 unsigned int section_count;
2304
2305 /* Stuff only useful for object files:
2306 The start address. */
2307 bfd_vma start_address;
2308
2309 /* Used for input and output*/
2310 unsigned int symcount;
2311
c188b0be 2312 /* Symbol table for output BFD (with symcount entries) */
fdcb0453
KR
2313 struct symbol_cache_entry **outsymbols;
2314
2315 /* Pointer to structure which contains architecture information*/
2ffbb79a 2316 const struct bfd_arch_info *arch_info;
fdcb0453
KR
2317
2318 /* Stuff only useful for archives:*/
2319 PTR arelt_data;
c188b0be
DM
2320 struct _bfd *my_archive; /* The containing archive BFD. */
2321 struct _bfd *next; /* The next BFD in the archive. */
2322 struct _bfd *archive_head; /* The first BFD in the archive. */
fdcb0453
KR
2323 boolean has_armap;
2324
4c3721d5
ILT
2325 /* A chain of BFD structures involved in a link. */
2326 struct _bfd *link_next;
2327
2328 /* A field used by _bfd_generic_link_add_archive_symbols. This will
2329 be used only for archive elements. */
2330 int archive_pass;
2331
fdcb0453
KR
2332 /* Used by the back end to hold private data. */
2333
2334 union
2335 {
2336 struct aout_data_struct *aout_data;
2337 struct artdata *aout_ar_data;
2338 struct _oasys_data *oasys_obj_data;
2339 struct _oasys_ar_data *oasys_ar_data;
2340 struct coff_tdata *coff_obj_data;
4e98461f 2341 struct pe_tdata *pe_obj_data;
54406786 2342 struct xcoff_tdata *xcoff_obj_data;
fdcb0453
KR
2343 struct ecoff_tdata *ecoff_obj_data;
2344 struct ieee_data_struct *ieee_data;
2345 struct ieee_ar_data_struct *ieee_ar_data;
2346 struct srec_data_struct *srec_data;
ffd15489 2347 struct ihex_data_struct *ihex_data;
fdcb0453
KR
2348 struct tekhex_data_struct *tekhex_data;
2349 struct elf_obj_tdata *elf_obj_data;
c3e964b9 2350 struct nlm_obj_tdata *nlm_obj_data;
fdcb0453
KR
2351 struct bout_data_struct *bout_data;
2352 struct sun_core_struct *sun_core_data;
2353 struct trad_core_struct *trad_core_data;
9e461dac 2354 struct som_data_struct *som_data;
b66b07a2 2355 struct hpux_core_struct *hpux_core_data;
8d12f138 2356 struct hppabsd_core_struct *hppabsd_core_data;
fdcb0453 2357 struct sgi_core_struct *sgi_core_data;
2b91cc45 2358 struct lynx_core_struct *lynx_core_data;
9b3fa589 2359 struct osf_core_struct *osf_core_data;
326e32d7 2360 struct cisco_core_struct *cisco_core_data;
3b1f83ad 2361 struct versados_data_struct *versados_data;
871a3f3b 2362 struct netbsd_core_struct *netbsd_core_data;
fdcb0453
KR
2363 PTR any;
2364 } tdata;
2365
2366 /* Used by the application to hold private data*/
2367 PTR usrdata;
2368
508539ab
ILT
2369 /* Where all the allocated stuff under this BFD goes. This is a
2370 struct objalloc *, but we use PTR to avoid requiring the inclusion of
2371 objalloc.h. */
2372 PTR memory;
fdcb0453
KR
2373};
2374
0f8f509c
DM
2375typedef enum bfd_error
2376{
d1ad85a6
DM
2377 bfd_error_no_error = 0,
2378 bfd_error_system_call,
2379 bfd_error_invalid_target,
2380 bfd_error_wrong_format,
2381 bfd_error_invalid_operation,
2382 bfd_error_no_memory,
2383 bfd_error_no_symbols,
9675c281 2384 bfd_error_no_armap,
d1ad85a6
DM
2385 bfd_error_no_more_archived_files,
2386 bfd_error_malformed_archive,
2387 bfd_error_file_not_recognized,
2388 bfd_error_file_ambiguously_recognized,
2389 bfd_error_no_contents,
2390 bfd_error_nonrepresentable_section,
2391 bfd_error_no_debug_section,
2392 bfd_error_bad_value,
2393 bfd_error_file_truncated,
5dc8db48 2394 bfd_error_file_too_big,
d1ad85a6
DM
2395 bfd_error_invalid_error_code
2396} bfd_error_type;
2397
2398bfd_error_type
2399bfd_get_error PARAMS ((void));
2400
2401void
2402bfd_set_error PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2403
2404CONST char *
d1ad85a6 2405bfd_errmsg PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2406
2407void
2408bfd_perror PARAMS ((CONST char *message));
2409
3b1f83ad
JL
2410typedef void (*bfd_error_handler_type) PARAMS ((const char *, ...));
2411
2412bfd_error_handler_type
2413bfd_set_error_handler PARAMS ((bfd_error_handler_type));
2414
2415void
2416bfd_set_error_program_name PARAMS ((const char *));
2417
326e32d7 2418long
e2756048
ILT
2419bfd_get_reloc_upper_bound PARAMS ((bfd *abfd, asection *sect));
2420
326e32d7 2421long
e2756048
ILT
2422bfd_canonicalize_reloc
2423 PARAMS ((bfd *abfd,
2424 asection *sec,
2425 arelent **loc,
2426 asymbol **syms));
2427
2428void
2429bfd_set_reloc
2430 PARAMS ((bfd *abfd, asection *sec, arelent **rel, unsigned int count)
2431
2432 );
2433
fdcb0453
KR
2434boolean
2435bfd_set_file_flags PARAMS ((bfd *abfd, flagword flags));
2436
fdcb0453 2437boolean
c188b0be 2438bfd_set_start_address PARAMS ((bfd *abfd, bfd_vma vma));
fdcb0453
KR
2439
2440long
c188b0be 2441bfd_get_mtime PARAMS ((bfd *abfd));
fdcb0453
KR
2442
2443long
c188b0be 2444bfd_get_size PARAMS ((bfd *abfd));
fdcb0453
KR
2445
2446int
c188b0be 2447bfd_get_gp_size PARAMS ((bfd *abfd));
fdcb0453
KR
2448
2449void
c188b0be 2450bfd_set_gp_size PARAMS ((bfd *abfd, int i));
fdcb0453 2451
ef758f3e
KR
2452bfd_vma
2453bfd_scan_vma PARAMS ((CONST char *string, CONST char **end, int base));
2454
5a66538b
KR
2455boolean
2456bfd_copy_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2457
2458#define bfd_copy_private_bfd_data(ibfd, obfd) \
efc2b064 2459 BFD_SEND (obfd, _bfd_copy_private_bfd_data, \
5a66538b 2460 (ibfd, obfd))
3b1f83ad
JL
2461boolean
2462bfd_merge_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2463
2464#define bfd_merge_private_bfd_data(ibfd, obfd) \
efc2b064 2465 BFD_SEND (obfd, _bfd_merge_private_bfd_data, \
3b1f83ad
JL
2466 (ibfd, obfd))
2467boolean
2468bfd_set_private_flags PARAMS ((bfd *abfd, flagword flags));
2469
2470#define bfd_set_private_flags(abfd, flags) \
2471 BFD_SEND (abfd, _bfd_set_private_flags, \
2472 (abfd, flags))
fdcb0453
KR
2473#define bfd_sizeof_headers(abfd, reloc) \
2474 BFD_SEND (abfd, _bfd_sizeof_headers, (abfd, reloc))
2475
2476#define bfd_find_nearest_line(abfd, sec, syms, off, file, func, line) \
2477 BFD_SEND (abfd, _bfd_find_nearest_line, (abfd, sec, syms, off, file, func, line))
2478
2479 /* Do these three do anything useful at all, for any back end? */
2480#define bfd_debug_info_start(abfd) \
2481 BFD_SEND (abfd, _bfd_debug_info_start, (abfd))
2482
2483#define bfd_debug_info_end(abfd) \
2484 BFD_SEND (abfd, _bfd_debug_info_end, (abfd))
2485
2486#define bfd_debug_info_accumulate(abfd, section) \
2487 BFD_SEND (abfd, _bfd_debug_info_accumulate, (abfd, section))
2488
2489
2490#define bfd_stat_arch_elt(abfd, stat) \
2491 BFD_SEND (abfd, _bfd_stat_arch_elt,(abfd, stat))
2492
0822b56d
ILT
2493#define bfd_update_armap_timestamp(abfd) \
2494 BFD_SEND (abfd, _bfd_update_armap_timestamp, (abfd))
2495
fdcb0453
KR
2496#define bfd_set_arch_mach(abfd, arch, mach)\
2497 BFD_SEND ( abfd, _bfd_set_arch_mach, (abfd, arch, mach))
2498
326e32d7
ILT
2499#define bfd_relax_section(abfd, section, link_info, again) \
2500 BFD_SEND (abfd, _bfd_relax_section, (abfd, section, link_info, again))
4c3721d5
ILT
2501
2502#define bfd_link_hash_table_create(abfd) \
2503 BFD_SEND (abfd, _bfd_link_hash_table_create, (abfd))
2504
2505#define bfd_link_add_symbols(abfd, info) \
2506 BFD_SEND (abfd, _bfd_link_add_symbols, (abfd, info))
2507
2508#define bfd_final_link(abfd, info) \
2509 BFD_SEND (abfd, _bfd_final_link, (abfd, info))
fdcb0453 2510
9deaaaf1
ILT
2511#define bfd_free_cached_info(abfd) \
2512 BFD_SEND (abfd, _bfd_free_cached_info, (abfd))
2513
ad46bd1d
ILT
2514#define bfd_get_dynamic_symtab_upper_bound(abfd) \
2515 BFD_SEND (abfd, _bfd_get_dynamic_symtab_upper_bound, (abfd))
2516
4e98461f
SC
2517#define bfd_print_private_bfd_data(abfd, file)\
2518 BFD_SEND (abfd, _bfd_print_private_bfd_data, (abfd, file))
2519
ad46bd1d
ILT
2520#define bfd_canonicalize_dynamic_symtab(abfd, asymbols) \
2521 BFD_SEND (abfd, _bfd_canonicalize_dynamic_symtab, (abfd, asymbols))
2522
2523#define bfd_get_dynamic_reloc_upper_bound(abfd) \
2524 BFD_SEND (abfd, _bfd_get_dynamic_reloc_upper_bound, (abfd))
2525
2526#define bfd_canonicalize_dynamic_reloc(abfd, arels, asyms) \
2527 BFD_SEND (abfd, _bfd_canonicalize_dynamic_reloc, (abfd, arels, asyms))
2528
3b1f83ad
JL
2529extern bfd_byte *bfd_get_relocated_section_contents
2530 PARAMS ((bfd *, struct bfd_link_info *,
2531 struct bfd_link_order *, bfd_byte *,
2532 boolean, asymbol **));
2533
fdcb0453 2534symindex
c188b0be 2535bfd_get_next_mapent PARAMS ((bfd *abfd, symindex previous, carsym **sym));
fdcb0453
KR
2536
2537boolean
2538bfd_set_archive_head PARAMS ((bfd *output, bfd *new_head));
2539
c188b0be 2540bfd *
fdcb0453
KR
2541bfd_openr_next_archived_file PARAMS ((bfd *archive, bfd *previous));
2542
2543CONST char *
c188b0be 2544bfd_core_file_failing_command PARAMS ((bfd *abfd));
fdcb0453
KR
2545
2546int
c188b0be 2547bfd_core_file_failing_signal PARAMS ((bfd *abfd));
fdcb0453
KR
2548
2549boolean
2550core_file_matches_executable_p
2551 PARAMS ((bfd *core_bfd, bfd *exec_bfd));
2552
2553#define BFD_SEND(bfd, message, arglist) \
2554 ((*((bfd)->xvec->message)) arglist)
fdfe2d14
SS
2555
2556#ifdef DEBUG_BFD_SEND
2557#undef BFD_SEND
2558#define BFD_SEND(bfd, message, arglist) \
2559 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2560 ((*((bfd)->xvec->message)) arglist) : \
2561 (bfd_assert (__FILE__,__LINE__), NULL))
2562#endif
fdcb0453
KR
2563#define BFD_SEND_FMT(bfd, message, arglist) \
2564 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist)
fdfe2d14
SS
2565
2566#ifdef DEBUG_BFD_SEND
2567#undef BFD_SEND_FMT
2568#define BFD_SEND_FMT(bfd, message, arglist) \
2569 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2570 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist) : \
2571 (bfd_assert (__FILE__,__LINE__), NULL))
2572#endif
9e461dac
JK
2573enum bfd_flavour {
2574 bfd_target_unknown_flavour,
2575 bfd_target_aout_flavour,
2576 bfd_target_coff_flavour,
2577 bfd_target_ecoff_flavour,
2578 bfd_target_elf_flavour,
2579 bfd_target_ieee_flavour,
2580 bfd_target_nlm_flavour,
2581 bfd_target_oasys_flavour,
2582 bfd_target_tekhex_flavour,
2583 bfd_target_srec_flavour,
ffd15489 2584 bfd_target_ihex_flavour,
d1f8b181 2585 bfd_target_som_flavour,
5dc8db48 2586 bfd_target_os9k_flavour,
9675c281 2587 bfd_target_versados_flavour,
c3d8e071
ILT
2588 bfd_target_msdos_flavour,
2589 bfd_target_evax_flavour
5dc8db48 2590};
4c3721d5 2591
64d5f5d0
ILT
2592enum bfd_endian { BFD_ENDIAN_BIG, BFD_ENDIAN_LITTLE, BFD_ENDIAN_UNKNOWN };
2593
4c3721d5
ILT
2594 /* Forward declaration. */
2595typedef struct bfd_link_info _bfd_link_info;
2596
fdcb0453
KR
2597typedef struct bfd_target
2598{
2599 char *name;
9e461dac 2600 enum bfd_flavour flavour;
64d5f5d0
ILT
2601 enum bfd_endian byteorder;
2602 enum bfd_endian header_byteorder;
fdcb0453
KR
2603 flagword object_flags;
2604 flagword section_flags;
2605 char symbol_leading_char;
2606 char ar_pad_char;
2607 unsigned short ar_max_namelen;
1a973af1
ILT
2608 bfd_vma (*bfd_getx64) PARAMS ((const bfd_byte *));
2609 bfd_signed_vma (*bfd_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2610 void (*bfd_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2611 bfd_vma (*bfd_getx32) PARAMS ((const bfd_byte *));
2612 bfd_signed_vma (*bfd_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2613 void (*bfd_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2614 bfd_vma (*bfd_getx16) PARAMS ((const bfd_byte *));
2615 bfd_signed_vma (*bfd_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2616 void (*bfd_putx16) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2617 bfd_vma (*bfd_h_getx64) PARAMS ((const bfd_byte *));
2618 bfd_signed_vma (*bfd_h_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2619 void (*bfd_h_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2620 bfd_vma (*bfd_h_getx32) PARAMS ((const bfd_byte *));
2621 bfd_signed_vma (*bfd_h_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2622 void (*bfd_h_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2623 bfd_vma (*bfd_h_getx16) PARAMS ((const bfd_byte *));
2624 bfd_signed_vma (*bfd_h_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2625 void (*bfd_h_putx16) PARAMS ((bfd_vma, bfd_byte *));
2f3508ad 2626 const struct bfd_target *(*_bfd_check_format[bfd_type_end]) PARAMS ((bfd *));
fdcb0453
KR
2627 boolean (*_bfd_set_format[bfd_type_end]) PARAMS ((bfd *));
2628 boolean (*_bfd_write_contents[bfd_type_end]) PARAMS ((bfd *));
6812b607
ILT
2629
2630 /* Generic entry points. */
2631#define BFD_JUMP_TABLE_GENERIC(NAME)\
2632CAT(NAME,_close_and_cleanup),\
2633CAT(NAME,_bfd_free_cached_info),\
2634CAT(NAME,_new_section_hook),\
4fe6d901
KR
2635CAT(NAME,_get_section_contents),\
2636CAT(NAME,_get_section_contents_in_window)
2637
6812b607
ILT
2638 /* Called when the BFD is being closed to do any necessary cleanup. */
2639 boolean (*_close_and_cleanup) PARAMS ((bfd *));
2640 /* Ask the BFD to free all cached information. */
2641 boolean (*_bfd_free_cached_info) PARAMS ((bfd *));
2642 /* Called when a new section is created. */
2643 boolean (*_new_section_hook) PARAMS ((bfd *, sec_ptr));
2644 /* Read the contents of a section. */
2645 boolean (*_bfd_get_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2646 file_ptr, bfd_size_type));
4fe6d901
KR
2647 boolean (*_bfd_get_section_contents_in_window)
2648 PARAMS ((bfd *, sec_ptr, bfd_window *,
2649 file_ptr, bfd_size_type));
6812b607
ILT
2650
2651 /* Entry points to copy private data. */
2652#define BFD_JUMP_TABLE_COPY(NAME)\
2653CAT(NAME,_bfd_copy_private_bfd_data),\
3b1f83ad
JL
2654CAT(NAME,_bfd_merge_private_bfd_data),\
2655CAT(NAME,_bfd_copy_private_section_data),\
6167a840 2656CAT(NAME,_bfd_copy_private_symbol_data),\
4e98461f
SC
2657CAT(NAME,_bfd_set_private_flags),\
2658CAT(NAME,_bfd_print_private_bfd_data)\
6812b607
ILT
2659 /* Called to copy BFD general private data from one object file
2660 to another. */
2661 boolean (*_bfd_copy_private_bfd_data) PARAMS ((bfd *, bfd *));
3b1f83ad
JL
2662 /* Called to merge BFD general private data from one object file
2663 to a common output file when linking. */
2664 boolean (*_bfd_merge_private_bfd_data) PARAMS ((bfd *, bfd *));
6812b607
ILT
2665 /* Called to copy BFD private section data from one object file
2666 to another. */
2667 boolean (*_bfd_copy_private_section_data) PARAMS ((bfd *, sec_ptr,
2668 bfd *, sec_ptr));
6167a840
JL
2669 /* Called to copy BFD private symbol data from one symbol
2670 to another. */
2671 boolean (*_bfd_copy_private_symbol_data) PARAMS ((bfd *, asymbol *,
2672 bfd *, asymbol *));
3b1f83ad
JL
2673 /* Called to set private backend flags */
2674 boolean (*_bfd_set_private_flags) PARAMS ((bfd *, flagword));
6812b607 2675
4e98461f 2676 /* Called to print private BFD data */
ae0a6bea 2677 boolean (*_bfd_print_private_bfd_data) PARAMS ((bfd *, PTR));
4e98461f 2678
6812b607
ILT
2679 /* Core file entry points. */
2680#define BFD_JUMP_TABLE_CORE(NAME)\
2681CAT(NAME,_core_file_failing_command),\
2682CAT(NAME,_core_file_failing_signal),\
2683CAT(NAME,_core_file_matches_executable_p)
fdcb0453
KR
2684 char * (*_core_file_failing_command) PARAMS ((bfd *));
2685 int (*_core_file_failing_signal) PARAMS ((bfd *));
2686 boolean (*_core_file_matches_executable_p) PARAMS ((bfd *, bfd *));
6812b607
ILT
2687
2688 /* Archive entry points. */
2689#define BFD_JUMP_TABLE_ARCHIVE(NAME)\
2690CAT(NAME,_slurp_armap),\
2691CAT(NAME,_slurp_extended_name_table),\
fca2b81b 2692CAT(NAME,_construct_extended_name_table),\
6812b607
ILT
2693CAT(NAME,_truncate_arname),\
2694CAT(NAME,_write_armap),\
c53fac12 2695CAT(NAME,_read_ar_hdr),\
6812b607 2696CAT(NAME,_openr_next_archived_file),\
64d5f5d0 2697CAT(NAME,_get_elt_at_index),\
0822b56d
ILT
2698CAT(NAME,_generic_stat_arch_elt),\
2699CAT(NAME,_update_armap_timestamp)
fdcb0453
KR
2700 boolean (*_bfd_slurp_armap) PARAMS ((bfd *));
2701 boolean (*_bfd_slurp_extended_name_table) PARAMS ((bfd *));
fca2b81b
KR
2702 boolean (*_bfd_construct_extended_name_table)
2703 PARAMS ((bfd *, char **, bfd_size_type *, const char **));
fdcb0453
KR
2704 void (*_bfd_truncate_arname) PARAMS ((bfd *, CONST char *, char *));
2705 boolean (*write_armap) PARAMS ((bfd *arch,
2706 unsigned int elength,
2707 struct orl *map,
2708 unsigned int orl_count,
2709 int stridx));
0322af0d 2710 PTR (*_bfd_read_ar_hdr_fn) PARAMS ((bfd *));
0822b56d 2711 bfd * (*openr_next_archived_file) PARAMS ((bfd *arch, bfd *prev));
64d5f5d0
ILT
2712#define bfd_get_elt_at_index(b,i) BFD_SEND(b, _bfd_get_elt_at_index, (b,i))
2713 bfd * (*_bfd_get_elt_at_index) PARAMS ((bfd *, symindex));
0822b56d
ILT
2714 int (*_bfd_stat_arch_elt) PARAMS ((bfd *, struct stat *));
2715 boolean (*_bfd_update_armap_timestamp) PARAMS ((bfd *));
2716
6812b607
ILT
2717 /* Entry points used for symbols. */
2718#define BFD_JUMP_TABLE_SYMBOLS(NAME)\
2719CAT(NAME,_get_symtab_upper_bound),\
2720CAT(NAME,_get_symtab),\
2721CAT(NAME,_make_empty_symbol),\
2722CAT(NAME,_print_symbol),\
2723CAT(NAME,_get_symbol_info),\
35a3e78e 2724CAT(NAME,_bfd_is_local_label_name),\
6812b607
ILT
2725CAT(NAME,_get_lineno),\
2726CAT(NAME,_find_nearest_line),\
e9614321
SC
2727CAT(NAME,_bfd_make_debug_symbol),\
2728CAT(NAME,_read_minisymbols),\
2729CAT(NAME,_minisymbol_to_symbol)
326e32d7
ILT
2730 long (*_bfd_get_symtab_upper_bound) PARAMS ((bfd *));
2731 long (*_bfd_canonicalize_symtab) PARAMS ((bfd *,
2732 struct symbol_cache_entry **));
fdcb0453
KR
2733 struct symbol_cache_entry *
2734 (*_bfd_make_empty_symbol) PARAMS ((bfd *));
2735 void (*_bfd_print_symbol) PARAMS ((bfd *, PTR,
2736 struct symbol_cache_entry *,
2737 bfd_print_symbol_type));
2738#define bfd_print_symbol(b,p,s,e) BFD_SEND(b, _bfd_print_symbol, (b,p,s,e))
2739 void (*_bfd_get_symbol_info) PARAMS ((bfd *,
2740 struct symbol_cache_entry *,
2741 symbol_info *));
2742#define bfd_get_symbol_info(b,p,e) BFD_SEND(b, _bfd_get_symbol_info, (b,p,e))
35a3e78e 2743 boolean (*_bfd_is_local_label_name) PARAMS ((bfd *, const char *));
fdcb0453 2744
6812b607 2745 alent * (*_get_lineno) PARAMS ((bfd *, struct symbol_cache_entry *));
fdcb0453
KR
2746 boolean (*_bfd_find_nearest_line) PARAMS ((bfd *abfd,
2747 struct sec *section, struct symbol_cache_entry **symbols,
2748 bfd_vma offset, CONST char **file, CONST char **func,
2749 unsigned int *line));
6812b607
ILT
2750 /* Back-door to allow format-aware applications to create debug symbols
2751 while using BFD for everything else. Currently used by the assembler
2752 when creating COFF files. */
e9614321 2753 asymbol * (*_bfd_make_debug_symbol) PARAMS ((
6812b607
ILT
2754 bfd *abfd,
2755 void *ptr,
2756 unsigned long size));
e9614321
SC
2757#define bfd_read_minisymbols(b, d, m, s) \
2758 BFD_SEND (b, _read_minisymbols, (b, d, m, s))
2759 long (*_read_minisymbols) PARAMS ((bfd *, boolean, PTR *,
2760 unsigned int *));
2761#define bfd_minisymbol_to_symbol(b, d, m, f) \
2762 BFD_SEND (b, _minisymbol_to_symbol, (b, d, m, f))
2763 asymbol *(*_minisymbol_to_symbol) PARAMS ((bfd *, boolean, const PTR,
2764 asymbol *));
fdcb0453 2765
6812b607
ILT
2766 /* Routines for relocs. */
2767#define BFD_JUMP_TABLE_RELOCS(NAME)\
2768CAT(NAME,_get_reloc_upper_bound),\
2769CAT(NAME,_canonicalize_reloc),\
2770CAT(NAME,_bfd_reloc_type_lookup)
2771 long (*_get_reloc_upper_bound) PARAMS ((bfd *, sec_ptr));
2772 long (*_bfd_canonicalize_reloc) PARAMS ((bfd *, sec_ptr, arelent **,
2773 struct symbol_cache_entry **));
2774 /* See documentation on reloc types. */
5dc8db48 2775 reloc_howto_type *
6812b607
ILT
2776 (*reloc_type_lookup) PARAMS ((bfd *abfd,
2777 bfd_reloc_code_real_type code));
fdcb0453 2778
6812b607
ILT
2779 /* Routines used when writing an object file. */
2780#define BFD_JUMP_TABLE_WRITE(NAME)\
2781CAT(NAME,_set_arch_mach),\
2782CAT(NAME,_set_section_contents)
2783 boolean (*_bfd_set_arch_mach) PARAMS ((bfd *, enum bfd_architecture,
2784 unsigned long));
2785 boolean (*_bfd_set_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2786 file_ptr, bfd_size_type));
fdcb0453 2787
6812b607
ILT
2788 /* Routines used by the linker. */
2789#define BFD_JUMP_TABLE_LINK(NAME)\
2790CAT(NAME,_sizeof_headers),\
2791CAT(NAME,_bfd_get_relocated_section_contents),\
2792CAT(NAME,_bfd_relax_section),\
2793CAT(NAME,_bfd_link_hash_table_create),\
2794CAT(NAME,_bfd_link_add_symbols),\
6167a840
JL
2795CAT(NAME,_bfd_final_link),\
2796CAT(NAME,_bfd_link_split_section)
6812b607 2797 int (*_bfd_sizeof_headers) PARAMS ((bfd *, boolean));
fdcb0453 2798 bfd_byte * (*_bfd_get_relocated_section_contents) PARAMS ((bfd *,
4c3721d5
ILT
2799 struct bfd_link_info *, struct bfd_link_order *,
2800 bfd_byte *data, boolean relocateable,
2801 struct symbol_cache_entry **));
fdcb0453
KR
2802
2803 boolean (*_bfd_relax_section) PARAMS ((bfd *, struct sec *,
326e32d7 2804 struct bfd_link_info *, boolean *again));
fdcb0453 2805
ad46bd1d
ILT
2806 /* Create a hash table for the linker. Different backends store
2807 different information in this table. */
2808 struct bfd_link_hash_table *(*_bfd_link_hash_table_create) PARAMS ((bfd *));
2809
2810 /* Add symbols from this object file into the hash table. */
2811 boolean (*_bfd_link_add_symbols) PARAMS ((bfd *, struct bfd_link_info *));
2812
2813 /* Do a link based on the link_order structures attached to each
2814 section of the BFD. */
2815 boolean (*_bfd_final_link) PARAMS ((bfd *, struct bfd_link_info *));
2816
6167a840
JL
2817 /* Should this section be split up into smaller pieces during linking. */
2818 boolean (*_bfd_link_split_section) PARAMS ((bfd *, struct sec *));
2819
ad46bd1d
ILT
2820 /* Routines to handle dynamic symbols and relocs. */
2821#define BFD_JUMP_TABLE_DYNAMIC(NAME)\
2822CAT(NAME,_get_dynamic_symtab_upper_bound),\
2823CAT(NAME,_canonicalize_dynamic_symtab),\
2824CAT(NAME,_get_dynamic_reloc_upper_bound),\
2825CAT(NAME,_canonicalize_dynamic_reloc)
2826 /* Get the amount of memory required to hold the dynamic symbols. */
2827 long (*_bfd_get_dynamic_symtab_upper_bound) PARAMS ((bfd *));
2828 /* Read in the dynamic symbols. */
2829 long (*_bfd_canonicalize_dynamic_symtab)
2830 PARAMS ((bfd *, struct symbol_cache_entry **));
2831 /* Get the amount of memory required to hold the dynamic relocs. */
2832 long (*_bfd_get_dynamic_reloc_upper_bound) PARAMS ((bfd *));
2833 /* Read in the dynamic relocs. */
2834 long (*_bfd_canonicalize_dynamic_reloc)
2835 PARAMS ((bfd *, arelent **, struct symbol_cache_entry **));
4c3721d5 2836
fdcb0453
KR
2837 PTR backend_data;
2838} bfd_target;
508539ab
ILT
2839boolean
2840bfd_set_default_target PARAMS ((const char *name));
2841
2f3508ad 2842const bfd_target *
c188b0be 2843bfd_find_target PARAMS ((CONST char *target_name, bfd *abfd));
fdcb0453 2844
2f3508ad 2845const char **
fdcb0453
KR
2846bfd_target_list PARAMS ((void));
2847
2848boolean
2849bfd_check_format PARAMS ((bfd *abfd, bfd_format format));
2850
aabda2da
DM
2851boolean
2852bfd_check_format_matches PARAMS ((bfd *abfd, bfd_format format, char ***matching));
3b31740c 2853
fdcb0453 2854boolean
c188b0be 2855bfd_set_format PARAMS ((bfd *abfd, bfd_format format));
fdcb0453
KR
2856
2857CONST char *
c188b0be 2858bfd_format_string PARAMS ((bfd_format format));
fdcb0453 2859
815179af
ILT
2860#ifdef __cplusplus
2861}
2862#endif
fdcb0453 2863#endif
This page took 0.42131 seconds and 4 git commands to generate.