* elf32-mips.c (mips_elf_check_relocs): Give an error if CALL16 is
[deliverable/binutils-gdb.git] / bfd / bfd-in2.h
CommitLineData
fdcb0453 1/* Main header file for the bfd library -- portable access to object files.
56f3b62c 2 Copyright 1990, 91, 92, 93, 94, 95, 96, 1997 Free Software Foundation, Inc.
fdcb0453
KR
3 Contributed by Cygnus Support.
4
b66b07a2
KR
5** NOTE: bfd.h and bfd-in2.h are GENERATED files. Don't change them;
6** instead, change bfd-in.h or the other BFD source files processed to
7** generate these files.
8
fdcb0453
KR
9This file is part of BFD, the Binary File Descriptor library.
10
11This program is free software; you can redistribute it and/or modify
12it under the terms of the GNU General Public License as published by
13the Free Software Foundation; either version 2 of the License, or
14(at your option) any later version.
15
16This program is distributed in the hope that it will be useful,
17but WITHOUT ANY WARRANTY; without even the implied warranty of
18MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19GNU General Public License for more details.
20
21You should have received a copy of the GNU General Public License
22along with this program; if not, write to the Free Software
e9614321 23Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
fdcb0453
KR
24
25/* bfd.h -- The only header file required by users of the bfd library
26
27The bfd.h file is generated from bfd-in.h and various .c files; if you
28change it, your changes will probably be lost.
29
30All the prototypes and definitions following the comment "THE FOLLOWING
31IS EXTRACTED FROM THE SOURCE" are extracted from the source files for
32BFD. If you change it, someone oneday will extract it from the source
33again, and your changes will be lost. To save yourself from this bind,
34change the definitions in the source in the bfd directory. Type "make
35docs" and then "make headers" in that directory, and magically this file
36will change to reflect your changes.
37
38If you don't have the tools to perform the extraction, then you are
39safe from someone on your system trampling over your header files.
40You should still maintain the equivalence between the source and this
41file though; every change you make to the .c file should be reflected
42here. */
43
44#ifndef __BFD_H_SEEN__
45#define __BFD_H_SEEN__
46
815179af
ILT
47#ifdef __cplusplus
48extern "C" {
49#endif
50
fdcb0453
KR
51#include "ansidecl.h"
52#include "obstack.h"
53
5a66538b 54/* These two lines get substitutions done by commands in Makefile.in. */
b7577823 55#define BFD_VERSION "@VERSION@"
f4e14cb9 56#define BFD_ARCH_SIZE @wordsize@
b7577823 57#define BFD_HOST_64BIT_LONG @BFD_HOST_64BIT_LONG@
f4e14cb9
ILT
58#if @BFD_HOST_64_BIT_DEFINED@
59#define BFD_HOST_64_BIT @BFD_HOST_64_BIT@
60#define BFD_HOST_U_64_BIT @BFD_HOST_U_64_BIT@
61#endif
fdcb0453
KR
62
63#if BFD_ARCH_SIZE >= 64
64#define BFD64
65#endif
66
c3e964b9
FF
67#ifndef INLINE
68#if __GNUC__ >= 2
69#define INLINE __inline__
70#else
71#define INLINE
72#endif
73#endif
74
fdcb0453
KR
75/* forward declaration */
76typedef struct _bfd bfd;
77
78/* To squelch erroneous compiler warnings ("illegal pointer
79 combination") from the SVR3 compiler, we would like to typedef
80 boolean to int (it doesn't like functions which return boolean.
81 Making sure they are never implicitly declared to return int
82 doesn't seem to help). But this file is not configured based on
83 the host. */
84/* General rules: functions which are boolean return true on success
85 and false on failure (unless they're a predicate). -- bfd.doc */
86/* I'm sure this is going to break something and someone is going to
87 force me to change it. */
88/* typedef enum boolean {false, true} boolean; */
89/* Yup, SVR4 has a "typedef enum boolean" in <sys/types.h> -fnf */
442da995 90/* It gets worse if the host also defines a true/false enum... -sts */
3b1f83ad
JL
91/* And even worse if your compiler has built-in boolean types... -law */
92#if defined (__GNUG__) && (__GNUC_MINOR__ > 5)
93#define TRUE_FALSE_ALREADY_DEFINED
94#endif
c53fac12
ILT
95#ifdef MPW
96/* Pre-emptive strike - get the file with the enum. */
97#include <Types.h>
98#define TRUE_FALSE_ALREADY_DEFINED
99#endif /* MPW */
442da995 100#ifndef TRUE_FALSE_ALREADY_DEFINED
fdcb0453 101typedef enum bfd_boolean {false, true} boolean;
442da995
SS
102#define BFD_TRUE_FALSE
103#else
e0151f38
SS
104/* Use enum names that will appear nowhere else. */
105typedef enum bfd_boolean {bfd_fffalse, bfd_tttrue} boolean;
442da995 106#endif
fdcb0453
KR
107
108/* A pointer to a position in a file. */
109/* FIXME: This should be using off_t from <sys/types.h>.
110 For now, try to avoid breaking stuff by not including <sys/types.h> here.
111 This will break on systems with 64-bit file offsets (e.g. 4.4BSD).
112 Probably the best long-term answer is to avoid using file_ptr AND off_t
113 in this header file, and to handle this in the BFD implementation
114 rather than in its interface. */
115/* typedef off_t file_ptr; */
116typedef long int file_ptr;
117
0822b56d 118/* Support for different sizes of target format ints and addresses.
b7577823
ILT
119 If the type `long' is at least 64 bits, BFD_HOST_64BIT_LONG will be
120 set to 1 above. Otherwise, if gcc is being used, this code will
f4e14cb9
ILT
121 use gcc's "long long" type. Otherwise, BFD_HOST_64_BIT must be
122 defined above. */
fdcb0453 123
b7577823 124#ifdef BFD64
fdcb0453 125
b7577823
ILT
126#ifndef BFD_HOST_64_BIT
127#if BFD_HOST_64BIT_LONG
128#define BFD_HOST_64_BIT long
f4e14cb9 129#define BFD_HOST_U_64_BIT unsigned long
b7577823
ILT
130#else
131#ifdef __GNUC__
78c3dc5c 132#define BFD_HOST_64_BIT long long
f4e14cb9 133#define BFD_HOST_U_64_BIT unsigned long long
c3d8e071
ILT
134#else /* ! defined (__GNUC__) */
135 #error No 64 bit integer type available
136#endif /* ! defined (__GNUC__) */
b7577823
ILT
137#endif /* ! BFD_HOST_64BIT_LONG */
138#endif /* ! defined (BFD_HOST_64_BIT) */
fa5ba217 139
f4e14cb9 140typedef BFD_HOST_U_64_BIT bfd_vma;
78c3dc5c 141typedef BFD_HOST_64_BIT bfd_signed_vma;
f4e14cb9
ILT
142typedef BFD_HOST_U_64_BIT bfd_size_type;
143typedef BFD_HOST_U_64_BIT symvalue;
b7577823 144
7e7fb4a8 145#ifndef fprintf_vma
b7577823
ILT
146#if BFD_HOST_64BIT_LONG
147#define sprintf_vma(s,x) sprintf (s, "%016lx", x)
148#define fprintf_vma(f,x) fprintf (f, "%016lx", x)
149#else
150#define _bfd_int64_low(x) ((unsigned long) (((x) & 0xffffffff)))
151#define _bfd_int64_high(x) ((unsigned long) (((x) >> 32) & 0xffffffff))
fdcb0453 152#define fprintf_vma(s,x) \
b7577823 153 fprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
fa5ba217 154#define sprintf_vma(s,x) \
b7577823 155 sprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
7e7fb4a8 156#endif
b7577823
ILT
157#endif
158
fdcb0453
KR
159#else /* not BFD64 */
160
161/* Represent a target address. Also used as a generic unsigned type
162 which is guaranteed to be big enough to hold any arithmetic types
163 we need to deal with. */
164typedef unsigned long bfd_vma;
165
166/* A generic signed type which is guaranteed to be big enough to hold any
167 arithmetic types we need to deal with. Can be assumed to be compatible
168 with bfd_vma in the same way that signed and unsigned ints are compatible
169 (as parameters, in assignment, etc). */
170typedef long bfd_signed_vma;
171
172typedef unsigned long symvalue;
173typedef unsigned long bfd_size_type;
174
175/* Print a bfd_vma x on stream s. */
176#define fprintf_vma(s,x) fprintf(s, "%08lx", x)
fa5ba217 177#define sprintf_vma(s,x) sprintf(s, "%08lx", x)
fdcb0453
KR
178#endif /* not BFD64 */
179#define printf_vma(x) fprintf_vma(stdout,x)
180
181typedef unsigned int flagword; /* 32 bits of flags */
5dc8db48 182typedef unsigned char bfd_byte;
fdcb0453
KR
183\f
184/** File formats */
185
186typedef enum bfd_format {
187 bfd_unknown = 0, /* file format is unknown */
188 bfd_object, /* linker/assember/compiler output */
189 bfd_archive, /* object archive file */
190 bfd_core, /* core dump */
191 bfd_type_end} /* marks the end; don't use it! */
192 bfd_format;
193
9e461dac
JK
194/* Values that may appear in the flags field of a BFD. These also
195 appear in the object_flags field of the bfd_target structure, where
196 they indicate the set of flags used by that backend (not all flags
197 are meaningful for all object file formats) (FIXME: at the moment,
198 the object_flags values have mostly just been copied from backend
199 to another, and are not necessarily correct). */
200
201/* No flags. */
2055bf85 202#define BFD_NO_FLAGS 0x00
9e461dac
JK
203
204/* BFD contains relocation entries. */
fdcb0453 205#define HAS_RELOC 0x01
9e461dac
JK
206
207/* BFD is directly executable. */
fdcb0453 208#define EXEC_P 0x02
9e461dac
JK
209
210/* BFD has line number information (basically used for F_LNNO in a
211 COFF header). */
fdcb0453 212#define HAS_LINENO 0x04
9e461dac
JK
213
214/* BFD has debugging information. */
fdcb0453 215#define HAS_DEBUG 0x08
9e461dac
JK
216
217/* BFD has symbols. */
fdcb0453 218#define HAS_SYMS 0x10
9e461dac
JK
219
220/* BFD has local symbols (basically used for F_LSYMS in a COFF
221 header). */
fdcb0453 222#define HAS_LOCALS 0x20
9e461dac
JK
223
224/* BFD is a dynamic object. */
fdcb0453 225#define DYNAMIC 0x40
9e461dac
JK
226
227/* Text section is write protected (if D_PAGED is not set, this is
228 like an a.out NMAGIC file) (the linker sets this by default, but
229 clears it for -r or -N). */
fdcb0453 230#define WP_TEXT 0x80
9e461dac
JK
231
232/* BFD is dynamically paged (this is like an a.out ZMAGIC file) (the
233 linker sets this by default, but clears it for -r or -n or -N). */
fdcb0453 234#define D_PAGED 0x100
9e461dac
JK
235
236/* BFD is relaxable (this means that bfd_relax_section may be able to
0822b56d
ILT
237 do something) (sometimes bfd_relax_section can do something even if
238 this is not set). */
fdcb0453 239#define BFD_IS_RELAXABLE 0x200
a7ff9b80
ILT
240
241/* This may be set before writing out a BFD to request using a
242 traditional format. For example, this is used to request that when
243 writing out an a.out object the symbols not be hashed to eliminate
244 duplicates. */
245#define BFD_TRADITIONAL_FORMAT 0x400
64d5f5d0
ILT
246
247/* This flag indicates that the BFD contents are actually cached in
248 memory. If this is set, iostream points to a bfd_in_memory struct. */
249#define BFD_IN_MEMORY 0x800
fdcb0453
KR
250\f
251/* symbols and relocation */
252
0f8f509c 253/* A count of carsyms (canonical archive symbols). */
fdcb0453
KR
254typedef unsigned long symindex;
255
5dc8db48
KR
256/* How to perform a relocation. */
257typedef const struct reloc_howto_struct reloc_howto_type;
258
fdcb0453
KR
259#define BFD_NO_MORE_SYMBOLS ((symindex) ~0)
260
0f8f509c
DM
261/* General purpose part of a symbol X;
262 target specific parts are in libcoff.h, libaout.h, etc. */
fdcb0453
KR
263
264#define bfd_get_section(x) ((x)->section)
265#define bfd_get_output_section(x) ((x)->section->output_section)
266#define bfd_set_section(x,y) ((x)->section) = (y)
267#define bfd_asymbol_base(x) ((x)->section->vma)
268#define bfd_asymbol_value(x) (bfd_asymbol_base(x) + (x)->value)
269#define bfd_asymbol_name(x) ((x)->name)
270/*Perhaps future: #define bfd_asymbol_bfd(x) ((x)->section->owner)*/
271#define bfd_asymbol_bfd(x) ((x)->the_bfd)
272#define bfd_asymbol_flavour(x) (bfd_asymbol_bfd(x)->xvec->flavour)
273
0f8f509c 274/* A canonical archive symbol. */
fdcb0453
KR
275/* This is a type pun with struct ranlib on purpose! */
276typedef struct carsym {
277 char *name;
278 file_ptr file_offset; /* look here to find the file */
279} carsym; /* to make these you call a carsymogen */
280
281
0f8f509c
DM
282/* Used in generating armaps (archive tables of contents).
283 Perhaps just a forward definition would do? */
fdcb0453
KR
284struct orl { /* output ranlib */
285 char **name; /* symbol name */
286 file_ptr pos; /* bfd* or file position */
287 int namidx; /* index into string table */
288};
fdcb0453
KR
289\f
290
291/* Linenumber stuff */
292typedef struct lineno_cache_entry {
293 unsigned int line_number; /* Linenumber from start of function*/
294 union {
0f8f509c 295 struct symbol_cache_entry *sym; /* Function name */
fdcb0453
KR
296 unsigned long offset; /* Offset into section */
297 } u;
298} alent;
299\f
300/* object and core file sections */
301
fdcb0453
KR
302#define align_power(addr, align) \
303 ( ((addr) + ((1<<(align))-1)) & (-1 << (align)))
304
305typedef struct sec *sec_ptr;
306
307#define bfd_get_section_name(bfd, ptr) ((ptr)->name + 0)
308#define bfd_get_section_vma(bfd, ptr) ((ptr)->vma + 0)
309#define bfd_get_section_alignment(bfd, ptr) ((ptr)->alignment_power + 0)
310#define bfd_section_name(bfd, ptr) ((ptr)->name)
311#define bfd_section_size(bfd, ptr) (bfd_get_section_size_before_reloc(ptr))
312#define bfd_section_vma(bfd, ptr) ((ptr)->vma)
313#define bfd_section_alignment(bfd, ptr) ((ptr)->alignment_power)
314#define bfd_get_section_flags(bfd, ptr) ((ptr)->flags + 0)
315#define bfd_get_section_userdata(bfd, ptr) ((ptr)->userdata)
316
317#define bfd_is_com_section(ptr) (((ptr)->flags & SEC_IS_COMMON) != 0)
318
e0151f38 319#define bfd_set_section_vma(bfd, ptr, val) (((ptr)->vma = (ptr)->lma= (val)), ((ptr)->user_set_vma = (boolean)true), true)
6167a840
JL
320#define bfd_set_section_alignment(bfd, ptr, val) (((ptr)->alignment_power = (val)),true)
321#define bfd_set_section_userdata(bfd, ptr, val) (((ptr)->userdata = (val)),true)
fdcb0453
KR
322
323typedef struct stat stat_type;
324\f
fdcb0453
KR
325typedef enum bfd_print_symbol
326{
327 bfd_print_symbol_name,
328 bfd_print_symbol_more,
329 bfd_print_symbol_all
330} bfd_print_symbol_type;
331
fdcb0453
KR
332/* Information about a symbol that nm needs. */
333
334typedef struct _symbol_info
335{
336 symvalue value;
0f8f509c 337 char type;
fdcb0453 338 CONST char *name; /* Symbol name. */
64d5f5d0
ILT
339 unsigned char stab_type; /* Stab type. */
340 char stab_other; /* Stab other. */
341 short stab_desc; /* Stab desc. */
342 CONST char *stab_name; /* String for stab type. */
fdcb0453 343} symbol_info;
7ec49f91
ILT
344
345/* Get the name of a stabs type code. */
346
347extern const char *bfd_get_stab_name PARAMS ((int));
fdcb0453 348\f
4c3721d5
ILT
349/* Hash table routines. There is no way to free up a hash table. */
350
351/* An element in the hash table. Most uses will actually use a larger
352 structure, and an instance of this will be the first field. */
353
354struct bfd_hash_entry
355{
356 /* Next entry for this hash code. */
357 struct bfd_hash_entry *next;
358 /* String being hashed. */
359 const char *string;
360 /* Hash code. This is the full hash code, not the index into the
361 table. */
362 unsigned long hash;
363};
364
365/* A hash table. */
366
367struct bfd_hash_table
368{
369 /* The hash array. */
370 struct bfd_hash_entry **table;
371 /* The number of slots in the hash table. */
372 unsigned int size;
373 /* A function used to create new elements in the hash table. The
374 first entry is itself a pointer to an element. When this
375 function is first invoked, this pointer will be NULL. However,
376 having the pointer permits a hierarchy of method functions to be
377 built each of which calls the function in the superclass. Thus
378 each function should be written to allocate a new block of memory
379 only if the argument is NULL. */
380 struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *,
381 struct bfd_hash_table *,
382 const char *));
383 /* An obstack for this hash table. */
384 struct obstack memory;
385};
386
387/* Initialize a hash table. */
388extern boolean bfd_hash_table_init
389 PARAMS ((struct bfd_hash_table *,
390 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
391 struct bfd_hash_table *,
392 const char *)));
393
394/* Initialize a hash table specifying a size. */
395extern boolean bfd_hash_table_init_n
396 PARAMS ((struct bfd_hash_table *,
397 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
398 struct bfd_hash_table *,
399 const char *),
400 unsigned int size));
401
402/* Free up a hash table. */
403extern void bfd_hash_table_free PARAMS ((struct bfd_hash_table *));
404
405/* Look up a string in a hash table. If CREATE is true, a new entry
406 will be created for this string if one does not already exist. The
407 COPY argument must be true if this routine should copy the string
408 into newly allocated memory when adding an entry. */
409extern struct bfd_hash_entry *bfd_hash_lookup
410 PARAMS ((struct bfd_hash_table *, const char *, boolean create,
411 boolean copy));
412
b7577823
ILT
413/* Replace an entry in a hash table. */
414extern void bfd_hash_replace
415 PARAMS ((struct bfd_hash_table *, struct bfd_hash_entry *old,
416 struct bfd_hash_entry *nw));
417
4c3721d5
ILT
418/* Base method for creating a hash table entry. */
419extern struct bfd_hash_entry *bfd_hash_newfunc
420 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *,
421 const char *));
422
423/* Grab some space for a hash table entry. */
966e0a16
ILT
424extern PTR bfd_hash_allocate PARAMS ((struct bfd_hash_table *,
425 unsigned int));
4c3721d5
ILT
426
427/* Traverse a hash table in a random order, calling a function on each
428 element. If the function returns false, the traversal stops. The
429 INFO argument is passed to the function. */
430extern void bfd_hash_traverse PARAMS ((struct bfd_hash_table *,
431 boolean (*) (struct bfd_hash_entry *,
432 PTR),
433 PTR info));
434\f
c3e964b9
FF
435/* Semi-portable string concatenation in cpp.
436 The CAT4 hack is to avoid a problem with some strict ANSI C preprocessors.
437 The problem is, "32_" is not a valid preprocessing token, and we don't
438 want extra underscores (e.g., "nlm_32_"). The XCAT2 macro will cause the
439 inner CAT macros to be evaluated first, producing still-valid pp-tokens.
440 Then the final concatenation can be done. (Sigh.) */
fdcb0453 441#ifndef CAT
c3e964b9
FF
442#ifdef SABER
443#define CAT(a,b) a##b
444#define CAT3(a,b,c) a##b##c
445#define CAT4(a,b,c,d) a##b##c##d
446#else
442da995 447#if defined(__STDC__) || defined(ALMOST_STDC)
fdcb0453
KR
448#define CAT(a,b) a##b
449#define CAT3(a,b,c) a##b##c
c3e964b9
FF
450#define XCAT2(a,b) CAT(a,b)
451#define CAT4(a,b,c,d) XCAT2(CAT(a,b),CAT(c,d))
fdcb0453
KR
452#else
453#define CAT(a,b) a/**/b
454#define CAT3(a,b,c) a/**/b/**/c
c3e964b9
FF
455#define CAT4(a,b,c,d) a/**/b/**/c/**/d
456#endif
fdcb0453
KR
457#endif
458#endif
459
fdcb0453 460#define COFF_SWAP_TABLE (PTR) &bfd_coff_std_swap_table
fdcb0453
KR
461\f
462/* User program access to BFD facilities */
463
0822b56d
ILT
464/* Direct I/O routines, for programs which know more about the object
465 file than BFD does. Use higher level routines if possible. */
466
467extern bfd_size_type bfd_read
468 PARAMS ((PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
469extern bfd_size_type bfd_write
470 PARAMS ((const PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
d80ebaac 471extern int bfd_seek PARAMS ((bfd *abfd, file_ptr fp, int direction));
0822b56d
ILT
472extern long bfd_tell PARAMS ((bfd *abfd));
473extern int bfd_flush PARAMS ((bfd *abfd));
474extern int bfd_stat PARAMS ((bfd *abfd, struct stat *));
475
018dafca 476
fdcb0453
KR
477/* Cast from const char * to char * so that caller can assign to
478 a char * without a warning. */
479#define bfd_get_filename(abfd) ((char *) (abfd)->filename)
0a197a96 480#define bfd_get_cacheable(abfd) ((abfd)->cacheable)
fdcb0453
KR
481#define bfd_get_format(abfd) ((abfd)->format)
482#define bfd_get_target(abfd) ((abfd)->xvec->name)
9e461dac 483#define bfd_get_flavour(abfd) ((abfd)->xvec->flavour)
64d5f5d0
ILT
484#define bfd_big_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_BIG)
485#define bfd_little_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_LITTLE)
486#define bfd_header_big_endian(abfd) \
487 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_BIG)
488#define bfd_header_little_endian(abfd) \
489 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_LITTLE)
fdcb0453
KR
490#define bfd_get_file_flags(abfd) ((abfd)->flags)
491#define bfd_applicable_file_flags(abfd) ((abfd)->xvec->object_flags)
492#define bfd_applicable_section_flags(abfd) ((abfd)->xvec->section_flags)
493#define bfd_my_archive(abfd) ((abfd)->my_archive)
494#define bfd_has_map(abfd) ((abfd)->has_armap)
fdcb0453
KR
495
496#define bfd_valid_reloc_types(abfd) ((abfd)->xvec->valid_reloc_types)
497#define bfd_usrdata(abfd) ((abfd)->usrdata)
498
499#define bfd_get_start_address(abfd) ((abfd)->start_address)
500#define bfd_get_symcount(abfd) ((abfd)->symcount)
501#define bfd_get_outsymbols(abfd) ((abfd)->outsymbols)
502#define bfd_count_sections(abfd) ((abfd)->section_count)
fdcb0453
KR
503
504#define bfd_get_symbol_leading_char(abfd) ((abfd)->xvec->symbol_leading_char)
505
e0151f38 506#define bfd_set_cacheable(abfd,bool) (((abfd)->cacheable = (boolean)(bool)), true)
0a197a96 507
ae0a6bea
ILT
508extern boolean bfd_record_phdr
509 PARAMS ((bfd *, unsigned long, boolean, flagword, boolean, bfd_vma,
510 boolean, boolean, unsigned int, struct sec **));
511
2b91cc45
SG
512/* Byte swapping routines. */
513
1a973af1
ILT
514bfd_vma bfd_getb64 PARAMS ((const unsigned char *));
515bfd_vma bfd_getl64 PARAMS ((const unsigned char *));
516bfd_signed_vma bfd_getb_signed_64 PARAMS ((const unsigned char *));
517bfd_signed_vma bfd_getl_signed_64 PARAMS ((const unsigned char *));
518bfd_vma bfd_getb32 PARAMS ((const unsigned char *));
519bfd_vma bfd_getl32 PARAMS ((const unsigned char *));
520bfd_signed_vma bfd_getb_signed_32 PARAMS ((const unsigned char *));
521bfd_signed_vma bfd_getl_signed_32 PARAMS ((const unsigned char *));
522bfd_vma bfd_getb16 PARAMS ((const unsigned char *));
523bfd_vma bfd_getl16 PARAMS ((const unsigned char *));
524bfd_signed_vma bfd_getb_signed_16 PARAMS ((const unsigned char *));
525bfd_signed_vma bfd_getl_signed_16 PARAMS ((const unsigned char *));
2b91cc45
SG
526void bfd_putb64 PARAMS ((bfd_vma, unsigned char *));
527void bfd_putl64 PARAMS ((bfd_vma, unsigned char *));
528void bfd_putb32 PARAMS ((bfd_vma, unsigned char *));
529void bfd_putl32 PARAMS ((bfd_vma, unsigned char *));
530void bfd_putb16 PARAMS ((bfd_vma, unsigned char *));
531void bfd_putl16 PARAMS ((bfd_vma, unsigned char *));
c16313f0
ILT
532\f
533/* Externally visible ECOFF routines. */
2b91cc45 534
442da995 535#if defined(__STDC__) || defined(ALMOST_STDC)
8d12f138
ILT
536struct ecoff_debug_info;
537struct ecoff_debug_swap;
538struct ecoff_extr;
539struct symbol_cache_entry;
7e7fb4a8 540struct bfd_link_info;
28a0c103 541struct bfd_link_hash_entry;
35a3e78e 542struct bfd_elf_version_tree;
8d12f138 543#endif
c16313f0
ILT
544extern bfd_vma bfd_ecoff_get_gp_value PARAMS ((bfd * abfd));
545extern boolean bfd_ecoff_set_gp_value PARAMS ((bfd *abfd, bfd_vma gp_value));
546extern boolean bfd_ecoff_set_regmasks
547 PARAMS ((bfd *abfd, unsigned long gprmask, unsigned long fprmask,
548 unsigned long *cprmask));
7e7fb4a8 549extern PTR bfd_ecoff_debug_init
8d12f138 550 PARAMS ((bfd *output_bfd, struct ecoff_debug_info *output_debug,
7e7fb4a8
KR
551 const struct ecoff_debug_swap *output_swap,
552 struct bfd_link_info *));
553extern void bfd_ecoff_debug_free
554 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
555 const struct ecoff_debug_swap *output_swap,
556 struct bfd_link_info *));
557extern boolean bfd_ecoff_debug_accumulate
558 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
8d12f138
ILT
559 const struct ecoff_debug_swap *output_swap,
560 bfd *input_bfd, struct ecoff_debug_info *input_debug,
561 const struct ecoff_debug_swap *input_swap,
7e7fb4a8
KR
562 struct bfd_link_info *));
563extern boolean bfd_ecoff_debug_accumulate_other
564 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
565 const struct ecoff_debug_swap *output_swap, bfd *input_bfd,
566 struct bfd_link_info *));
8d12f138
ILT
567extern boolean bfd_ecoff_debug_externals
568 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
569 const struct ecoff_debug_swap *swap,
570 boolean relocateable,
571 boolean (*get_extr) (struct symbol_cache_entry *,
572 struct ecoff_extr *),
573 void (*set_index) (struct symbol_cache_entry *,
574 bfd_size_type)));
966e0a16
ILT
575extern boolean bfd_ecoff_debug_one_external
576 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
577 const struct ecoff_debug_swap *swap,
578 const char *name, struct ecoff_extr *esym));
8d12f138
ILT
579extern bfd_size_type bfd_ecoff_debug_size
580 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
581 const struct ecoff_debug_swap *swap));
582extern boolean bfd_ecoff_write_debug
583 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
584 const struct ecoff_debug_swap *swap, file_ptr where));
7e7fb4a8
KR
585extern boolean bfd_ecoff_write_accumulated_debug
586 PARAMS ((PTR handle, bfd *abfd, struct ecoff_debug_info *debug,
587 const struct ecoff_debug_swap *swap,
588 struct bfd_link_info *info, file_ptr where));
82b1edf7
KR
589extern boolean bfd_mips_ecoff_create_embedded_relocs
590 PARAMS ((bfd *, struct bfd_link_info *, struct sec *, struct sec *,
591 char **));
8d12f138 592
013dec1a
ILT
593/* Externally visible ELF routines. */
594
54406786 595struct bfd_link_needed_list
b176e1e9 596{
54406786 597 struct bfd_link_needed_list *next;
b176e1e9
ILT
598 bfd *by;
599 const char *name;
600};
54406786
ILT
601
602extern boolean bfd_elf32_record_link_assignment
603 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
604extern boolean bfd_elf64_record_link_assignment
605 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
606extern struct bfd_link_needed_list *bfd_elf_get_needed_list
b176e1e9 607 PARAMS ((bfd *, struct bfd_link_info *));
013dec1a 608extern boolean bfd_elf32_size_dynamic_sections
148437ec 609 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
35a3e78e
ILT
610 const char * const *, struct bfd_link_info *, struct sec **,
611 struct bfd_elf_version_tree *));
013dec1a 612extern boolean bfd_elf64_size_dynamic_sections
148437ec 613 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
35a3e78e
ILT
614 const char * const *, struct bfd_link_info *, struct sec **,
615 struct bfd_elf_version_tree *));
c1f84521 616extern void bfd_elf_set_dt_needed_name PARAMS ((bfd *, const char *));
871a3f3b 617extern const char *bfd_elf_get_dt_soname PARAMS ((bfd *));
013dec1a 618
a7ff9b80
ILT
619/* SunOS shared library support routines for the linker. */
620
28a0c103
ILT
621extern struct bfd_link_needed_list *bfd_sunos_get_needed_list
622 PARAMS ((bfd *, struct bfd_link_info *));
a7ff9b80
ILT
623extern boolean bfd_sunos_record_link_assignment
624 PARAMS ((bfd *, struct bfd_link_info *, const char *));
625extern boolean bfd_sunos_size_dynamic_sections
626 PARAMS ((bfd *, struct bfd_link_info *, struct sec **, struct sec **,
627 struct sec **));
628
04003b57
ILT
629/* Linux shared library support routines for the linker. */
630
7ec49f91
ILT
631extern boolean bfd_i386linux_size_dynamic_sections
632 PARAMS ((bfd *, struct bfd_link_info *));
633extern boolean bfd_m68klinux_size_dynamic_sections
04003b57
ILT
634 PARAMS ((bfd *, struct bfd_link_info *));
635
4fe6d901
KR
636/* mmap hacks */
637
638struct _bfd_window_internal;
639typedef struct _bfd_window_internal bfd_window_internal;
640
641typedef struct _bfd_window {
642 /* What the user asked for. */
643 PTR data;
644 bfd_size_type size;
645 /* The actual window used by BFD. Small user-requested read-only
646 regions sharing a page may share a single window into the object
647 file. Read-write versions shouldn't until I've fixed things to
648 keep track of which portions have been claimed by the
649 application; don't want to give the same region back when the
650 application wants two writable copies! */
651 struct _bfd_window_internal *i;
652} bfd_window;
653
092abcdf
ILT
654extern void bfd_init_window PARAMS ((bfd_window *));
655extern void bfd_free_window PARAMS ((bfd_window *));
656extern boolean bfd_get_file_window
0bb8ff19 657 PARAMS ((bfd *, file_ptr, bfd_size_type, bfd_window *, boolean));
4fe6d901 658
28a0c103
ILT
659/* XCOFF support routines for the linker. */
660
2d7de17d
ILT
661extern boolean bfd_xcoff_link_record_set
662 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
663 bfd_size_type));
28a0c103
ILT
664extern boolean bfd_xcoff_import_symbol
665 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
666 bfd_vma, const char *, const char *, const char *));
667extern boolean bfd_xcoff_export_symbol
668 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
669 boolean));
2d7de17d
ILT
670extern boolean bfd_xcoff_link_count_reloc
671 PARAMS ((bfd *, struct bfd_link_info *, const char *));
672extern boolean bfd_xcoff_record_link_assignment
673 PARAMS ((bfd *, struct bfd_link_info *, const char *));
28a0c103
ILT
674extern boolean bfd_xcoff_size_dynamic_sections
675 PARAMS ((bfd *, struct bfd_link_info *, const char *, const char *,
676 unsigned long, unsigned long, unsigned long, boolean,
4a4a66bd 677 int, boolean, boolean, struct sec **));
28a0c103 678
c3d8e071
ILT
679/* Externally visible COFF routines. */
680
681#if defined(__STDC__) || defined(ALMOST_STDC)
682struct internal_syment;
683union internal_auxent;
684#endif
685
686extern boolean bfd_coff_get_syment
687 PARAMS ((bfd *, struct symbol_cache_entry *, struct internal_syment *));
688extern boolean bfd_coff_get_auxent
689 PARAMS ((bfd *, struct symbol_cache_entry *, int, union internal_auxent *));
690
fdcb0453
KR
691/* And more from the source. */
692void
693bfd_init PARAMS ((void));
694
695bfd *
c188b0be 696bfd_openr PARAMS ((CONST char *filename, CONST char *target));
fdcb0453
KR
697
698bfd *
699bfd_fdopenr PARAMS ((CONST char *filename, CONST char *target, int fd));
700
8a51b06c
ILT
701bfd *
702bfd_openstreamr PARAMS (());
703
fdcb0453
KR
704bfd *
705bfd_openw PARAMS ((CONST char *filename, CONST char *target));
706
707boolean
c188b0be 708bfd_close PARAMS ((bfd *abfd));
fdcb0453
KR
709
710boolean
711bfd_close_all_done PARAMS ((bfd *));
712
713bfd_size_type
714bfd_alloc_size PARAMS ((bfd *abfd));
715
716bfd *
10bd43a8 717bfd_create PARAMS ((CONST char *filename, bfd *templ));
fdcb0453
KR
718
719
720 /* Byte swapping macros for user section data. */
721
722#define bfd_put_8(abfd, val, ptr) \
e2756048 723 (*((unsigned char *)(ptr)) = (unsigned char)(val))
fdcb0453
KR
724#define bfd_put_signed_8 \
725 bfd_put_8
726#define bfd_get_8(abfd, ptr) \
727 (*(unsigned char *)(ptr))
728#define bfd_get_signed_8(abfd, ptr) \
729 ((*(unsigned char *)(ptr) ^ 0x80) - 0x80)
730
731#define bfd_put_16(abfd, val, ptr) \
732 BFD_SEND(abfd, bfd_putx16, ((val),(ptr)))
733#define bfd_put_signed_16 \
734 bfd_put_16
735#define bfd_get_16(abfd, ptr) \
736 BFD_SEND(abfd, bfd_getx16, (ptr))
737#define bfd_get_signed_16(abfd, ptr) \
738 BFD_SEND (abfd, bfd_getx_signed_16, (ptr))
739
740#define bfd_put_32(abfd, val, ptr) \
741 BFD_SEND(abfd, bfd_putx32, ((val),(ptr)))
742#define bfd_put_signed_32 \
743 bfd_put_32
744#define bfd_get_32(abfd, ptr) \
745 BFD_SEND(abfd, bfd_getx32, (ptr))
746#define bfd_get_signed_32(abfd, ptr) \
747 BFD_SEND(abfd, bfd_getx_signed_32, (ptr))
748
749#define bfd_put_64(abfd, val, ptr) \
750 BFD_SEND(abfd, bfd_putx64, ((val), (ptr)))
751#define bfd_put_signed_64 \
752 bfd_put_64
753#define bfd_get_64(abfd, ptr) \
754 BFD_SEND(abfd, bfd_getx64, (ptr))
755#define bfd_get_signed_64(abfd, ptr) \
756 BFD_SEND(abfd, bfd_getx_signed_64, (ptr))
757
758
759 /* Byte swapping macros for file header data. */
760
761#define bfd_h_put_8(abfd, val, ptr) \
762 bfd_put_8 (abfd, val, ptr)
763#define bfd_h_put_signed_8(abfd, val, ptr) \
764 bfd_put_8 (abfd, val, ptr)
765#define bfd_h_get_8(abfd, ptr) \
766 bfd_get_8 (abfd, ptr)
767#define bfd_h_get_signed_8(abfd, ptr) \
768 bfd_get_signed_8 (abfd, ptr)
769
770#define bfd_h_put_16(abfd, val, ptr) \
771 BFD_SEND(abfd, bfd_h_putx16,(val,ptr))
772#define bfd_h_put_signed_16 \
773 bfd_h_put_16
774#define bfd_h_get_16(abfd, ptr) \
775 BFD_SEND(abfd, bfd_h_getx16,(ptr))
776#define bfd_h_get_signed_16(abfd, ptr) \
777 BFD_SEND(abfd, bfd_h_getx_signed_16, (ptr))
778
779#define bfd_h_put_32(abfd, val, ptr) \
780 BFD_SEND(abfd, bfd_h_putx32,(val,ptr))
781#define bfd_h_put_signed_32 \
782 bfd_h_put_32
783#define bfd_h_get_32(abfd, ptr) \
784 BFD_SEND(abfd, bfd_h_getx32,(ptr))
785#define bfd_h_get_signed_32(abfd, ptr) \
786 BFD_SEND(abfd, bfd_h_getx_signed_32, (ptr))
787
788#define bfd_h_put_64(abfd, val, ptr) \
789 BFD_SEND(abfd, bfd_h_putx64,(val, ptr))
790#define bfd_h_put_signed_64 \
791 bfd_h_put_64
792#define bfd_h_get_64(abfd, ptr) \
793 BFD_SEND(abfd, bfd_h_getx64,(ptr))
794#define bfd_h_get_signed_64(abfd, ptr) \
795 BFD_SEND(abfd, bfd_h_getx_signed_64, (ptr))
796
57a1867e 797typedef struct sec
fdcb0453 798{
c188b0be 799 /* The name of the section; the name isn't a copy, the pointer is
fdcb0453
KR
800 the same as that passed to bfd_make_section. */
801
802 CONST char *name;
803
c188b0be 804 /* Which section is it; 0..nth. */
fdcb0453 805
57a1867e 806 int index;
fdcb0453
KR
807
808 /* The next section in the list belonging to the BFD, or NULL. */
809
810 struct sec *next;
811
c188b0be 812 /* The field flags contains attributes of the section. Some
fdcb0453 813 flags are read in from the object file, and some are
57a1867e 814 synthesized from other information. */
fdcb0453
KR
815
816 flagword flags;
817
818#define SEC_NO_FLAGS 0x000
819
c188b0be
DM
820 /* Tells the OS to allocate space for this section when loading.
821 This is clear for a section containing debug information
fdcb0453 822 only. */
fdcb0453 823#define SEC_ALLOC 0x001
57a1867e 824
fdcb0453 825 /* Tells the OS to load the section from the file when loading.
c188b0be 826 This is clear for a .bss section. */
fdcb0453 827#define SEC_LOAD 0x002
ef758f3e 828
c188b0be
DM
829 /* The section contains data still to be relocated, so there is
830 some relocation information too. */
fdcb0453
KR
831#define SEC_RELOC 0x004
832
b2ae9efb 833#if 0 /* Obsolete ? */
fdcb0453 834#define SEC_BALIGN 0x008
b2ae9efb 835#endif
fdcb0453
KR
836
837 /* A signal to the OS that the section contains read only
838 data. */
839#define SEC_READONLY 0x010
840
841 /* The section contains code only. */
fdcb0453
KR
842#define SEC_CODE 0x020
843
844 /* The section contains data only. */
b2ae9efb 845#define SEC_DATA 0x040
fdcb0453
KR
846
847 /* The section will reside in ROM. */
fdcb0453
KR
848#define SEC_ROM 0x080
849
850 /* The section contains constructor information. This section
851 type is used by the linker to create lists of constructors and
852 destructors used by <<g++>>. When a back end sees a symbol
853 which should be used in a constructor list, it creates a new
c188b0be
DM
854 section for the type of name (e.g., <<__CTOR_LIST__>>), attaches
855 the symbol to it, and builds a relocation. To build the lists
bc750ff1 856 of constructors, all the linker has to do is catenate all the
c188b0be 857 sections called <<__CTOR_LIST__>> and relocate the data
fdcb0453
KR
858 contained within - exactly the operations it would peform on
859 standard data. */
fdcb0453
KR
860#define SEC_CONSTRUCTOR 0x100
861
862 /* The section is a constuctor, and should be placed at the
b2ae9efb 863 end of the text, data, or bss section(?). */
fdcb0453 864#define SEC_CONSTRUCTOR_TEXT 0x1100
fdcb0453 865#define SEC_CONSTRUCTOR_DATA 0x2100
fdcb0453
KR
866#define SEC_CONSTRUCTOR_BSS 0x3100
867
868 /* The section has contents - a data section could be
c188b0be 869 <<SEC_ALLOC>> | <<SEC_HAS_CONTENTS>>; a debug section could be
fdcb0453 870 <<SEC_HAS_CONTENTS>> */
fdcb0453
KR
871#define SEC_HAS_CONTENTS 0x200
872
c188b0be 873 /* An instruction to the linker to not output the section
c16313f0 874 even if it has information which would normally be written. */
fdcb0453
KR
875#define SEC_NEVER_LOAD 0x400
876
c16313f0
ILT
877 /* The section is a COFF shared library section. This flag is
878 only for the linker. If this type of section appears in
879 the input file, the linker must copy it to the output file
880 without changing the vma or size. FIXME: Although this
881 was originally intended to be general, it really is COFF
882 specific (and the flag was renamed to indicate this). It
883 might be cleaner to have some more general mechanism to
884 allow the back end to control what the linker does with
885 sections. */
886#define SEC_COFF_SHARED_LIBRARY 0x800
fdcb0453 887
5a28331f 888 /* The section contains common symbols (symbols may be defined
fdcb0453
KR
889 multiple times, the value of a symbol is the amount of
890 space it requires, and the largest symbol value is the one
b2ae9efb 891 used). Most targets have exactly one of these (which we
1fb83be6 892 translate to bfd_com_section_ptr), but ECOFF has two. */
fdcb0453
KR
893#define SEC_IS_COMMON 0x8000
894
9b3fa589
JK
895 /* The section contains only debugging information. For
896 example, this is set for ELF .debug and .stab sections.
897 strip tests this flag to see if a section can be
898 discarded. */
899#define SEC_DEBUGGING 0x10000
900
fdfe2d14
SS
901 /* The contents of this section are held in memory pointed to
902 by the contents field. This is checked by
903 bfd_get_section_contents, and the data is retrieved from
904 memory if appropriate. */
905#define SEC_IN_MEMORY 0x20000
906
83f4323e
MM
907 /* The contents of this section are to be excluded by the
908 linker for executable and shared objects unless those
909 objects are to be further relocated. */
910#define SEC_EXCLUDE 0x40000
911
912 /* The contents of this section are to be sorted by the
913 based on the address specified in the associated symbol
914 table. */
915#define SEC_SORT_ENTRIES 0x80000
916
5a28331f
ILT
917 /* When linking, duplicate sections of the same name should be
918 discarded, rather than being combined into a single section as
919 is usually done. This is similar to how common symbols are
920 handled. See SEC_LINK_DUPLICATES below. */
921#define SEC_LINK_ONCE 0x100000
922
923 /* If SEC_LINK_ONCE is set, this bitfield describes how the linker
924 should handle duplicate sections. */
925#define SEC_LINK_DUPLICATES 0x600000
926
927 /* This value for SEC_LINK_DUPLICATES means that duplicate
928 sections with the same name should simply be discarded. */
929#define SEC_LINK_DUPLICATES_DISCARD 0x0
930
931 /* This value for SEC_LINK_DUPLICATES means that the linker
932 should warn if there are any duplicate sections, although
933 it should still only link one copy. */
934#define SEC_LINK_DUPLICATES_ONE_ONLY 0x200000
935
936 /* This value for SEC_LINK_DUPLICATES means that the linker
937 should warn if any duplicate sections are a different size. */
938#define SEC_LINK_DUPLICATES_SAME_SIZE 0x400000
939
940 /* This value for SEC_LINK_DUPLICATES means that the linker
941 should warn if any duplicate sections contain different
942 contents. */
943#define SEC_LINK_DUPLICATES_SAME_CONTENTS 0x600000
944
ff12f303
ILT
945 /* This section was created by the linker as part of dynamic
946 relocation or other arcane processing. It is skipped when
947 going through the first-pass output, trusting that someone
948 else up the line will take care of it later. */
949#define SEC_LINKER_CREATED 0x800000
950
b2ae9efb
KR
951 /* End of section flags. */
952
ff0e4a93
ILT
953 /* Some internal packed boolean fields. */
954
955 /* See the vma field. */
956 unsigned int user_set_vma : 1;
957
958 /* Whether relocations have been processed. */
959 unsigned int reloc_done : 1;
960
961 /* A mark flag used by some of the linker backends. */
962 unsigned int linker_mark : 1;
963
964 /* End of internal packed boolean fields. */
965
fdcb0453 966 /* The virtual memory address of the section - where it will be
b2ae9efb
KR
967 at run time. The symbols are relocated against this. The
968 user_set_vma flag is maintained by bfd; if it's not set, the
969 backend can assign addresses (for example, in <<a.out>>, where
970 the default address for <<.data>> is dependent on the specific
971 target and various flags). */
ef758f3e 972
fdcb0453
KR
973 bfd_vma vma;
974
975 /* The load address of the section - where it would be in a
c188b0be 976 rom image; really only used for writing section header
b2ae9efb 977 information. */
ef758f3e 978
fdcb0453
KR
979 bfd_vma lma;
980
fdcb0453 981 /* The size of the section in bytes, as it will be output.
c188b0be 982 contains a value even if the section has no contents (e.g., the
fdcb0453
KR
983 size of <<.bss>>). This will be filled in after relocation */
984
57a1867e 985 bfd_size_type _cooked_size;
fdcb0453 986
c188b0be 987 /* The original size on disk of the section, in bytes. Normally this
fdcb0453
KR
988 value is the same as the size, but if some relaxing has
989 been done, then this value will be bigger. */
990
57a1867e 991 bfd_size_type _raw_size;
fdcb0453
KR
992
993 /* If this section is going to be output, then this value is the
994 offset into the output section of the first byte in the input
c188b0be 995 section. E.g., if this was going to start at the 100th byte in
fdcb0453
KR
996 the output section, this value would be 100. */
997
998 bfd_vma output_offset;
999
1000 /* The output section through which to map on output. */
1001
1002 struct sec *output_section;
1003
c188b0be
DM
1004 /* The alignment requirement of the section, as an exponent of 2 -
1005 e.g., 3 aligns to 2^3 (or 8). */
fdcb0453
KR
1006
1007 unsigned int alignment_power;
1008
1009 /* If an input section, a pointer to a vector of relocation
1010 records for the data in this section. */
1011
1012 struct reloc_cache_entry *relocation;
1013
1014 /* If an output section, a pointer to a vector of pointers to
1015 relocation records for the data in this section. */
1016
1017 struct reloc_cache_entry **orelocation;
1018
1019 /* The number of relocation records in one of the above */
1020
1021 unsigned reloc_count;
1022
1023 /* Information below is back end specific - and not always used
ef758f3e 1024 or updated. */
fdcb0453 1025
ef758f3e 1026 /* File position of section data */
fdcb0453 1027
57a1867e
DM
1028 file_ptr filepos;
1029
fdcb0453
KR
1030 /* File position of relocation info */
1031
1032 file_ptr rel_filepos;
1033
1034 /* File position of line data */
1035
1036 file_ptr line_filepos;
1037
1038 /* Pointer to data for applications */
1039
1040 PTR userdata;
1041
fdfe2d14
SS
1042 /* If the SEC_IN_MEMORY flag is set, this points to the actual
1043 contents. */
1044 unsigned char *contents;
fdcb0453
KR
1045
1046 /* Attached line number information */
1047
1048 alent *lineno;
57a1867e 1049
fdcb0453
KR
1050 /* Number of line number records */
1051
1052 unsigned int lineno_count;
1053
1054 /* When a section is being output, this value changes as more
1055 linenumbers are written out */
1056
1057 file_ptr moving_line_filepos;
1058
c188b0be 1059 /* What the section number is in the target world */
fdcb0453
KR
1060
1061 int target_index;
1062
1063 PTR used_by_bfd;
1064
1065 /* If this is a constructor section then here is a list of the
1066 relocations created to relocate items within it. */
1067
1068 struct relent_chain *constructor_chain;
1069
1070 /* The BFD which owns the section. */
1071
1072 bfd *owner;
1073
fdcb0453 1074 /* A symbol which points at this section only */
57a1867e 1075 struct symbol_cache_entry *symbol;
fdcb0453 1076 struct symbol_cache_entry **symbol_ptr_ptr;
ef758f3e 1077
4c3721d5
ILT
1078 struct bfd_link_order *link_order_head;
1079 struct bfd_link_order *link_order_tail;
fdcb0453
KR
1080} asection ;
1081
b2ae9efb
KR
1082 /* These sections are global, and are managed by BFD. The application
1083 and target back end are not permitted to change the values in
1fb83be6
KR
1084 these sections. New code should use the section_ptr macros rather
1085 than referring directly to the const sections. The const sections
1086 may eventually vanish. */
fdcb0453
KR
1087#define BFD_ABS_SECTION_NAME "*ABS*"
1088#define BFD_UND_SECTION_NAME "*UND*"
1089#define BFD_COM_SECTION_NAME "*COM*"
1090#define BFD_IND_SECTION_NAME "*IND*"
1091
1092 /* the absolute section */
1fb83be6
KR
1093extern const asection bfd_abs_section;
1094#define bfd_abs_section_ptr ((asection *) &bfd_abs_section)
1095#define bfd_is_abs_section(sec) ((sec) == bfd_abs_section_ptr)
fdcb0453 1096 /* Pointer to the undefined section */
1fb83be6
KR
1097extern const asection bfd_und_section;
1098#define bfd_und_section_ptr ((asection *) &bfd_und_section)
1099#define bfd_is_und_section(sec) ((sec) == bfd_und_section_ptr)
fdcb0453 1100 /* Pointer to the common section */
1fb83be6
KR
1101extern const asection bfd_com_section;
1102#define bfd_com_section_ptr ((asection *) &bfd_com_section)
fdcb0453 1103 /* Pointer to the indirect section */
1fb83be6
KR
1104extern const asection bfd_ind_section;
1105#define bfd_ind_section_ptr ((asection *) &bfd_ind_section)
1106#define bfd_is_ind_section(sec) ((sec) == bfd_ind_section_ptr)
1107
1108extern const struct symbol_cache_entry * const bfd_abs_symbol;
1109extern const struct symbol_cache_entry * const bfd_com_symbol;
1110extern const struct symbol_cache_entry * const bfd_und_symbol;
1111extern const struct symbol_cache_entry * const bfd_ind_symbol;
fdcb0453
KR
1112#define bfd_get_section_size_before_reloc(section) \
1113 (section->reloc_done ? (abort(),1): (section)->_raw_size)
1114#define bfd_get_section_size_after_reloc(section) \
1115 ((section->reloc_done) ? (section)->_cooked_size: (abort(),1))
1116asection *
1117bfd_get_section_by_name PARAMS ((bfd *abfd, CONST char *name));
1118
1119asection *
c188b0be 1120bfd_make_section_old_way PARAMS ((bfd *abfd, CONST char *name));
fdcb0453 1121
9b3fa589 1122asection *
c188b0be 1123bfd_make_section_anyway PARAMS ((bfd *abfd, CONST char *name));
9b3fa589
JK
1124
1125asection *
fdcb0453
KR
1126bfd_make_section PARAMS ((bfd *, CONST char *name));
1127
1128boolean
c188b0be 1129bfd_set_section_flags PARAMS ((bfd *abfd, asection *sec, flagword flags));
fdcb0453
KR
1130
1131void
1132bfd_map_over_sections PARAMS ((bfd *abfd,
1133 void (*func)(bfd *abfd,
1134 asection *sect,
1135 PTR obj),
1136 PTR obj));
1137
1138boolean
c188b0be 1139bfd_set_section_size PARAMS ((bfd *abfd, asection *sec, bfd_size_type val));
fdcb0453
KR
1140
1141boolean
1142bfd_set_section_contents
57a1867e 1143 PARAMS ((bfd *abfd,
fdcb0453
KR
1144 asection *section,
1145 PTR data,
1146 file_ptr offset,
1147 bfd_size_type count));
1148
1149boolean
57a1867e 1150bfd_get_section_contents
fdcb0453
KR
1151 PARAMS ((bfd *abfd, asection *section, PTR location,
1152 file_ptr offset, bfd_size_type count));
1153
5a66538b
KR
1154boolean
1155bfd_copy_private_section_data PARAMS ((bfd *ibfd, asection *isec, bfd *obfd, asection *osec));
1156
1157#define bfd_copy_private_section_data(ibfd, isection, obfd, osection) \
efc2b064 1158 BFD_SEND (obfd, _bfd_copy_private_section_data, \
5a66538b 1159 (ibfd, isection, obfd, osection))
fdcb0453
KR
1160enum bfd_architecture
1161{
1162 bfd_arch_unknown, /* File arch not known */
1163 bfd_arch_obscure, /* Arch known, not one of these */
1164 bfd_arch_m68k, /* Motorola 68xxx */
1165 bfd_arch_vax, /* DEC Vax */
1166 bfd_arch_i960, /* Intel 960 */
1167 /* The order of the following is important.
1168 lower number indicates a machine type that
1169 only accepts a subset of the instructions
1170 available to machines with higher numbers.
1171 The exception is the "ca", which is
1172 incompatible with all other machines except
1173 "core". */
1174
1175#define bfd_mach_i960_core 1
1176#define bfd_mach_i960_ka_sa 2
1177#define bfd_mach_i960_kb_sb 3
1178#define bfd_mach_i960_mc 4
1179#define bfd_mach_i960_xa 5
1180#define bfd_mach_i960_ca 6
047c57ac 1181#define bfd_mach_i960_jx 7
cbe75cb6 1182#define bfd_mach_i960_hx 8
fdcb0453
KR
1183
1184 bfd_arch_a29k, /* AMD 29000 */
1185 bfd_arch_sparc, /* SPARC */
5bc513b4 1186#define bfd_mach_sparc 1
cbe75cb6 1187 /* The difference between v8plus and v9 is that v9 is a true 64 bit env. */
d1f74cd2
DE
1188#define bfd_mach_sparc_sparclet 2
1189#define bfd_mach_sparc_sparclite 3
1190#define bfd_mach_sparc_v8plus 4
1191#define bfd_mach_sparc_v8plusa 5 /* with ultrasparc add'ns */
1192#define bfd_mach_sparc_v9 6
1193#define bfd_mach_sparc_v9a 7 /* with ultrasparc add'ns */
049f3d4c 1194 /* Nonzero if MACH has the v9 instruction set. */
d1f74cd2
DE
1195#define bfd_mach_sparc_v9_p(mach) \
1196 ((mach) >= bfd_mach_sparc_v8plus && (mach) <= bfd_mach_sparc_v9a)
fdcb0453
KR
1197 bfd_arch_mips, /* MIPS Rxxxx */
1198 bfd_arch_i386, /* Intel 386 */
3cc21bf6
SG
1199#define bfd_mach_i386_i386 0
1200#define bfd_mach_i386_i8086 1
fdcb0453
KR
1201 bfd_arch_we32k, /* AT&T WE32xxx */
1202 bfd_arch_tahoe, /* CCI/Harris Tahoe */
1203 bfd_arch_i860, /* Intel 860 */
1204 bfd_arch_romp, /* IBM ROMP PC/RT */
1205 bfd_arch_alliant, /* Alliant */
1206 bfd_arch_convex, /* Convex */
1207 bfd_arch_m88k, /* Motorola 88xxx */
1208 bfd_arch_pyramid, /* Pyramid Technology */
1209 bfd_arch_h8300, /* Hitachi H8/300 */
1210#define bfd_mach_h8300 1
1211#define bfd_mach_h8300h 2
34255b70 1212#define bfd_mach_h8300s 3
d1ad85a6 1213 bfd_arch_powerpc, /* PowerPC */
fdcb0453
KR
1214 bfd_arch_rs6000, /* IBM RS/6000 */
1215 bfd_arch_hppa, /* HP PA RISC */
50bd50d4 1216 bfd_arch_d10v, /* Mitsubishi D10V */
fd8d7c31
MH
1217 /* start-sanitize-d30v */
1218 bfd_arch_d30v, /* Mitsubishi D30V */
1219 /* end-sanitize-d30v */
fdcb0453
KR
1220 bfd_arch_z8k, /* Zilog Z8000 */
1221#define bfd_mach_z8001 1
1222#define bfd_mach_z8002 2
1223 bfd_arch_h8500, /* Hitachi H8/500 */
1224 bfd_arch_sh, /* Hitachi SH */
1225 bfd_arch_alpha, /* Dec Alpha */
d80ebaac 1226 bfd_arch_arm, /* Advanced Risc Machines ARM */
1fb83be6 1227 bfd_arch_ns32k, /* National Semiconductors ns32000 */
d468a149 1228 bfd_arch_w65, /* WDC 65816 */
fc46a9ec
FF
1229 /* start-sanitize-tic80 */
1230 bfd_arch_tic80, /* TI TMS320c80 (MVP) */
1231 /* end-sanitize-tic80 */
c86158e5
ILT
1232 /* start-sanitize-v850 */
1233 bfd_arch_v850, /* NEC V850 */
1234 /* end-sanitize-v850 */
05cedcf6
DE
1235 /* start-sanitize-arc */
1236 bfd_arch_arc, /* Argonaut RISC Core */
c932fd96
DE
1237#define bfd_mach_arc_base 0
1238#define bfd_mach_arc_host 1
1239#define bfd_mach_arc_graphics 2
1240#define bfd_mach_arc_audio 3
05cedcf6 1241 /* end-sanitize-arc */
00d7a64b
JL
1242 /* start-sanitize-m32r */
1243 bfd_arch_m32r, /* Mitsubishi M32R */
1244 /* end-sanitize-m32r */
ae1b99e4
JL
1245 bfd_arch_mn10200, /* Matsushita MN10200 */
1246 bfd_arch_mn10300, /* Matsushita MN10300 */
fdcb0453
KR
1247 bfd_arch_last
1248 };
1249
1250typedef struct bfd_arch_info
1251{
1252 int bits_per_word;
1253 int bits_per_address;
1254 int bits_per_byte;
1255 enum bfd_architecture arch;
ae115e51 1256 unsigned long mach;
2ffbb79a
ILT
1257 const char *arch_name;
1258 const char *printable_name;
fdcb0453
KR
1259 unsigned int section_align_power;
1260 /* true if this is the default machine for the architecture */
1261 boolean the_default;
2ffbb79a
ILT
1262 const struct bfd_arch_info * (*compatible)
1263 PARAMS ((const struct bfd_arch_info *a,
1264 const struct bfd_arch_info *b));
1265
1266 boolean (*scan) PARAMS ((const struct bfd_arch_info *, const char *));
1267
1268 const struct bfd_arch_info *next;
fdcb0453 1269} bfd_arch_info_type;
2ffbb79a 1270const char *
fdcb0453
KR
1271bfd_printable_name PARAMS ((bfd *abfd));
1272
2ffbb79a
ILT
1273const bfd_arch_info_type *
1274bfd_scan_arch PARAMS ((const char *string));
fdcb0453 1275
2ffbb79a 1276const bfd_arch_info_type *
fdcb0453 1277bfd_arch_get_compatible PARAMS ((
2ffbb79a
ILT
1278 const bfd *abfd,
1279 const bfd *bbfd));
fdcb0453
KR
1280
1281void
2ffbb79a 1282bfd_set_arch_info PARAMS ((bfd *abfd, const bfd_arch_info_type *arg));
fdcb0453
KR
1283
1284enum bfd_architecture
1285bfd_get_arch PARAMS ((bfd *abfd));
1286
1287unsigned long
1288bfd_get_mach PARAMS ((bfd *abfd));
1289
1290unsigned int
1291bfd_arch_bits_per_byte PARAMS ((bfd *abfd));
1292
1293unsigned int
1294bfd_arch_bits_per_address PARAMS ((bfd *abfd));
1295
2ffbb79a 1296const bfd_arch_info_type *
c188b0be 1297bfd_get_arch_info PARAMS ((bfd *abfd));
fdcb0453 1298
2ffbb79a 1299const bfd_arch_info_type *
fdcb0453
KR
1300bfd_lookup_arch
1301 PARAMS ((enum bfd_architecture
1302 arch,
ae115e51 1303 unsigned long machine));
fdcb0453 1304
2ffbb79a 1305const char *
fdcb0453
KR
1306bfd_printable_arch_mach
1307 PARAMS ((enum bfd_architecture arch, unsigned long machine));
1308
57a1867e 1309typedef enum bfd_reloc_status
fdcb0453
KR
1310{
1311 /* No errors detected */
1312 bfd_reloc_ok,
1313
1314 /* The relocation was performed, but there was an overflow. */
1315 bfd_reloc_overflow,
1316
1317 /* The address to relocate was not within the section supplied. */
1318 bfd_reloc_outofrange,
1319
1320 /* Used by special functions */
1321 bfd_reloc_continue,
1322
c188b0be 1323 /* Unsupported relocation size requested. */
fdcb0453
KR
1324 bfd_reloc_notsupported,
1325
c188b0be 1326 /* Unused */
fdcb0453
KR
1327 bfd_reloc_other,
1328
1329 /* The symbol to relocate against was undefined. */
1330 bfd_reloc_undefined,
1331
1332 /* The relocation was performed, but may not be ok - presently
1333 generated only when linking i960 coff files with i960 b.out
4c3721d5
ILT
1334 symbols. If this type is returned, the error_message argument
1335 to bfd_perform_relocation will be set. */
fdcb0453
KR
1336 bfd_reloc_dangerous
1337 }
1338 bfd_reloc_status_type;
1339
1340
57a1867e 1341typedef struct reloc_cache_entry
fdcb0453
KR
1342{
1343 /* A pointer into the canonical table of pointers */
1344 struct symbol_cache_entry **sym_ptr_ptr;
1345
1346 /* offset in section */
1347 bfd_size_type address;
1348
1349 /* addend for relocation value */
57a1867e 1350 bfd_vma addend;
fdcb0453
KR
1351
1352 /* Pointer to how to perform the required relocation */
5dc8db48 1353 reloc_howto_type *howto;
fdcb0453
KR
1354
1355} arelent;
66a277ab
ILT
1356enum complain_overflow
1357{
1358 /* Do not complain on overflow. */
1359 complain_overflow_dont,
1360
1361 /* Complain if the bitfield overflows, whether it is considered
1362 as signed or unsigned. */
1363 complain_overflow_bitfield,
1364
1365 /* Complain if the value overflows when considered as signed
1366 number. */
1367 complain_overflow_signed,
1368
1369 /* Complain if the value overflows when considered as an
1370 unsigned number. */
1371 complain_overflow_unsigned
1372};
fdcb0453 1373
1fb83be6 1374struct reloc_howto_struct
57a1867e 1375{
92a956e8 1376 /* The type field has mainly a documentary use - the back end can
c188b0be
DM
1377 do what it wants with it, though normally the back end's
1378 external idea of what a reloc number is stored
1379 in this field. For example, a PC relative word relocation
1380 in a coff environment has the type 023 - because that's
fdcb0453
KR
1381 what the outside world calls a R_PCRWORD reloc. */
1382 unsigned int type;
1383
1384 /* The value the final relocation is shifted right by. This drops
1385 unwanted data from the relocation. */
1386 unsigned int rightshift;
1387
9e461dac 1388 /* The size of the item to be relocated. This is *not* a
4c3721d5
ILT
1389 power-of-two measure. To get the number of bytes operated
1390 on by a type of relocation, use bfd_get_reloc_size. */
fdcb0453
KR
1391 int size;
1392
66a277ab
ILT
1393 /* The number of bits in the item to be relocated. This is used
1394 when doing overflow checking. */
fdcb0453
KR
1395 unsigned int bitsize;
1396
1397 /* Notes that the relocation is relative to the location in the
1398 data section of the addend. The relocation function will
1399 subtract from the relocation value the address of the location
1400 being relocated. */
1401 boolean pc_relative;
1402
66a277ab
ILT
1403 /* The bit position of the reloc value in the destination.
1404 The relocated value is left shifted by this amount. */
fdcb0453
KR
1405 unsigned int bitpos;
1406
66a277ab
ILT
1407 /* What type of overflow error should be checked for when
1408 relocating. */
1409 enum complain_overflow complain_on_overflow;
fdcb0453
KR
1410
1411 /* If this field is non null, then the supplied function is
1412 called rather than the normal function. This allows really
1413 strange relocation methods to be accomodated (e.g., i960 callj
1414 instructions). */
57a1867e 1415 bfd_reloc_status_type (*special_function)
fdcb0453
KR
1416 PARAMS ((bfd *abfd,
1417 arelent *reloc_entry,
1418 struct symbol_cache_entry *symbol,
1419 PTR data,
57a1867e 1420 asection *input_section,
4c3721d5
ILT
1421 bfd *output_bfd,
1422 char **error_message));
fdcb0453
KR
1423
1424 /* The textual name of the relocation type. */
1425 char *name;
1426
1427 /* When performing a partial link, some formats must modify the
1428 relocations rather than the data - this flag signals this.*/
1429 boolean partial_inplace;
1430
c188b0be 1431 /* The src_mask selects which parts of the read in data
fdcb0453
KR
1432 are to be used in the relocation sum. E.g., if this was an 8 bit
1433 bit of data which we read and relocated, this would be
1434 0x000000ff. When we have relocs which have an addend, such as
1435 sun4 extended relocs, the value in the offset part of a
1436 relocating field is garbage so we never use it. In this case
1437 the mask would be 0x00000000. */
1438 bfd_vma src_mask;
1439
c188b0be 1440 /* The dst_mask selects which parts of the instruction are replaced
fdcb0453
KR
1441 into the instruction. In most cases src_mask == dst_mask,
1442 except in the above special case, where dst_mask would be
1443 0x000000ff, and src_mask would be 0x00000000. */
57a1867e 1444 bfd_vma dst_mask;
fdcb0453
KR
1445
1446 /* When some formats create PC relative instructions, they leave
1447 the value of the pc of the place being relocated in the offset
1448 slot of the instruction, so that a PC relative relocation can
1449 be made just by adding in an ordinary offset (e.g., sun3 a.out).
1450 Some formats leave the displacement part of an instruction
c188b0be 1451 empty (e.g., m88k bcs); this flag signals the fact.*/
fdcb0453
KR
1452 boolean pcrel_offset;
1453
1fb83be6 1454};
66a277ab 1455#define HOWTO(C, R,S,B, P, BI, O, SF, NAME, INPLACE, MASKSRC, MASKDST, PC) \
b5b056fc 1456 {(unsigned)C,R,S,B, P, BI, O,SF,NAME,INPLACE,MASKSRC,MASKDST,PC}
66a277ab 1457#define NEWHOWTO( FUNCTION, NAME,SIZE,REL,IN) HOWTO(0,0,SIZE,0,REL,0,complain_overflow_dont,FUNCTION, NAME,false,0,0,IN)
fdcb0453
KR
1458
1459#define HOWTO_PREPARE(relocation, symbol) \
1460 { \
1461 if (symbol != (asymbol *)NULL) { \
1462 if (bfd_is_com_section (symbol->section)) { \
1463 relocation = 0; \
1464 } \
1465 else { \
1466 relocation = symbol->value; \
1467 } \
1468 } \
57a1867e 1469}
4c3721d5 1470int
82b1edf7 1471bfd_get_reloc_size PARAMS ((reloc_howto_type *));
4c3721d5 1472
fdcb0453
KR
1473typedef struct relent_chain {
1474 arelent relent;
1475 struct relent_chain *next;
1476} arelent_chain;
1477bfd_reloc_status_type
1478
1479bfd_perform_relocation
c188b0be 1480 PARAMS ((bfd *abfd,
fdcb0453
KR
1481 arelent *reloc_entry,
1482 PTR data,
1483 asection *input_section,
4c3721d5
ILT
1484 bfd *output_bfd,
1485 char **error_message));
fdcb0453 1486
fca2b81b
KR
1487bfd_reloc_status_type
1488
1489bfd_install_relocation
1490 PARAMS ((bfd *abfd,
1491 arelent *reloc_entry,
1492 PTR data, bfd_vma data_start,
1493 asection *input_section,
1494 char **error_message));
1495
0443af31
KR
1496enum bfd_reloc_code_real {
1497 _dummy_first_bfd_reloc_code_real,
1498
1499
1500/* Basic absolute relocations of N bits. */
fa5ba217 1501 BFD_RELOC_64,
fa5ba217 1502 BFD_RELOC_32,
e9c6595d 1503 BFD_RELOC_26,
db109ca2 1504 BFD_RELOC_24,
57a1867e 1505 BFD_RELOC_16,
7e7fb4a8 1506 BFD_RELOC_14,
fdcb0453 1507 BFD_RELOC_8,
9e461dac 1508
0443af31
KR
1509/* PC-relative relocations. Sometimes these are relative to the address
1510of the relocation itself; sometimes they are relative to the start of
1511the section containing the relocation. It depends on the specific target.
1512
1513The 24-bit relocation is used in some Intel 960 configurations. */
9e461dac
JK
1514 BFD_RELOC_64_PCREL,
1515 BFD_RELOC_32_PCREL,
0443af31 1516 BFD_RELOC_24_PCREL,
9e461dac 1517 BFD_RELOC_16_PCREL,
fca2b81b 1518 BFD_RELOC_12_PCREL,
fdcb0453 1519 BFD_RELOC_8_PCREL,
9e461dac 1520
3b1f83ad
JL
1521/* For ELF. */
1522 BFD_RELOC_32_GOT_PCREL,
1523 BFD_RELOC_16_GOT_PCREL,
1524 BFD_RELOC_8_GOT_PCREL,
1525 BFD_RELOC_32_GOTOFF,
1526 BFD_RELOC_16_GOTOFF,
02f85cda
MM
1527 BFD_RELOC_LO16_GOTOFF,
1528 BFD_RELOC_HI16_GOTOFF,
1529 BFD_RELOC_HI16_S_GOTOFF,
3b1f83ad
JL
1530 BFD_RELOC_8_GOTOFF,
1531 BFD_RELOC_32_PLT_PCREL,
02f85cda 1532 BFD_RELOC_24_PLT_PCREL,
3b1f83ad
JL
1533 BFD_RELOC_16_PLT_PCREL,
1534 BFD_RELOC_8_PLT_PCREL,
1535 BFD_RELOC_32_PLTOFF,
1536 BFD_RELOC_16_PLTOFF,
02f85cda
MM
1537 BFD_RELOC_LO16_PLTOFF,
1538 BFD_RELOC_HI16_PLTOFF,
1539 BFD_RELOC_HI16_S_PLTOFF,
3b1f83ad
JL
1540 BFD_RELOC_8_PLTOFF,
1541
1542/* Relocations used by 68K ELF. */
1543 BFD_RELOC_68K_GLOB_DAT,
1544 BFD_RELOC_68K_JMP_SLOT,
1545 BFD_RELOC_68K_RELATIVE,
1546
0443af31 1547/* Linkage-table relative. */
9e461dac
JK
1548 BFD_RELOC_32_BASEREL,
1549 BFD_RELOC_16_BASEREL,
02f85cda
MM
1550 BFD_RELOC_LO16_BASEREL,
1551 BFD_RELOC_HI16_BASEREL,
1552 BFD_RELOC_HI16_S_BASEREL,
9e461dac 1553 BFD_RELOC_8_BASEREL,
815179af 1554 BFD_RELOC_RVA,
fdcb0453 1555
0443af31 1556/* Absolute 8-bit relocation, but used to form an address like 0xFFnn. */
9e461dac
JK
1557 BFD_RELOC_8_FFnn,
1558
fca2b81b
KR
1559/* These PC-relative relocations are stored as word displacements --
1560i.e., byte displacements shifted right two bits. The 30-bit word
1561displacement (<<32_PCREL_S2>> -- 32 bits, shifted 2) is used on the
1562SPARC. (SPARC tools generally refer to this as <<WDISP30>>.) The
1563signed 16-bit displacement is used on the MIPS, and the 23-bit
1564displacement is used on the Alpha. */
9e461dac 1565 BFD_RELOC_32_PCREL_S2,
7e7fb4a8 1566 BFD_RELOC_16_PCREL_S2,
7e7fb4a8 1567 BFD_RELOC_23_PCREL_S2,
9e461dac 1568
0443af31
KR
1569/* High 22 bits and low 10 bits of 32-bit value, placed into lower bits of
1570the target word. These are used on the SPARC. */
fdcb0453 1571 BFD_RELOC_HI22,
fdcb0453
KR
1572 BFD_RELOC_LO10,
1573
0443af31
KR
1574/* For systems that allocate a Global Pointer register, these are
1575displacements off that register. These relocation types are
1576handled specially, because the value the register will have is
1577decided relatively late. */
7e7fb4a8
KR
1578 BFD_RELOC_GPREL16,
1579 BFD_RELOC_GPREL32,
1580
0443af31 1581/* Reloc types used for i960/b.out. */
fdcb0453
KR
1582 BFD_RELOC_I960_CALLJ,
1583
0443af31
KR
1584/* SPARC ELF relocations. There is probably some overlap with other
1585relocation types already defined. */
1586 BFD_RELOC_NONE,
fdcb0453
KR
1587 BFD_RELOC_SPARC_WDISP22,
1588 BFD_RELOC_SPARC22,
1589 BFD_RELOC_SPARC13,
fdcb0453
KR
1590 BFD_RELOC_SPARC_GOT10,
1591 BFD_RELOC_SPARC_GOT13,
1592 BFD_RELOC_SPARC_GOT22,
1593 BFD_RELOC_SPARC_PC10,
1594 BFD_RELOC_SPARC_PC22,
1595 BFD_RELOC_SPARC_WPLT30,
1596 BFD_RELOC_SPARC_COPY,
1597 BFD_RELOC_SPARC_GLOB_DAT,
1598 BFD_RELOC_SPARC_JMP_SLOT,
1599 BFD_RELOC_SPARC_RELATIVE,
1600 BFD_RELOC_SPARC_UA32,
1601
0443af31 1602/* I think these are specific to SPARC a.out (e.g., Sun 4). */
5284a822 1603 BFD_RELOC_SPARC_BASE13,
fdcb0453
KR
1604 BFD_RELOC_SPARC_BASE22,
1605
0443af31
KR
1606/* Some relocations we're using for SPARC V9 -- subject to change. */
1607#define BFD_RELOC_SPARC_64 BFD_RELOC_64
fa5ba217
KR
1608 BFD_RELOC_SPARC_10,
1609 BFD_RELOC_SPARC_11,
fa5ba217
KR
1610 BFD_RELOC_SPARC_OLO10,
1611 BFD_RELOC_SPARC_HH22,
1612 BFD_RELOC_SPARC_HM10,
1613 BFD_RELOC_SPARC_LM22,
1614 BFD_RELOC_SPARC_PC_HH22,
1615 BFD_RELOC_SPARC_PC_HM10,
1616 BFD_RELOC_SPARC_PC_LM22,
1617 BFD_RELOC_SPARC_WDISP16,
5284a822 1618 BFD_RELOC_SPARC_WDISP19,
fa5ba217 1619 BFD_RELOC_SPARC_GLOB_JMP,
e9f03cd4
ILT
1620 BFD_RELOC_SPARC_7,
1621 BFD_RELOC_SPARC_6,
1622 BFD_RELOC_SPARC_5,
5284a822 1623
34255b70
JL
1624/* Alpha ECOFF and ELF relocations. Some of these treat the symbol or
1625"addend" in some special way.
0443af31
KR
1626For GPDISP_HI16 ("gpdisp") relocations, the symbol is ignored when
1627writing; when reading, it will be the absolute section symbol. The
1628addend is the displacement in bytes of the "lda" instruction from
1629the "ldah" instruction (which is at the address of this reloc). */
7e7fb4a8 1630 BFD_RELOC_ALPHA_GPDISP_HI16,
0443af31
KR
1631
1632/* For GPDISP_LO16 ("ignore") relocations, the symbol is handled as
1633with GPDISP_HI16 relocs. The addend is ignored when writing the
1634relocations out, and is filled in with the file's GP value on
1635reading, for convenience. */
7e7fb4a8
KR
1636 BFD_RELOC_ALPHA_GPDISP_LO16,
1637
34255b70
JL
1638/* The ELF GPDISP relocation is exactly the same as the GPDISP_HI16
1639relocation except that there is no accompanying GPDISP_LO16
1640relocation. */
1641 BFD_RELOC_ALPHA_GPDISP,
1642
0443af31
KR
1643/* The Alpha LITERAL/LITUSE relocs are produced by a symbol reference;
1644the assembler turns it into a LDQ instruction to load the address of
1645the symbol, and then fills in a register in the real instruction.
1646
1647The LITERAL reloc, at the LDQ instruction, refers to the .lita
1648section symbol. The addend is ignored when writing, but is filled
1649in with the file's GP value on reading, for convenience, as with the
1650GPDISP_LO16 reloc.
1651
6b31fd3a
ILT
1652The ELF_LITERAL reloc is somewhere between 16_GOTOFF and GPDISP_LO16.
1653It should refer to the symbol to be referenced, as with 16_GOTOFF,
1654but it generates output not based on the position within the .got
1655section, but relative to the GP value chosen for the file during the
1656final link stage.
1657
0443af31
KR
1658The LITUSE reloc, on the instruction using the loaded address, gives
1659information to the linker that it might be able to use to optimize
1660away some literal section references. The symbol is ignored (read
1661as the absolute section symbol), and the "addend" indicates the type
1662of instruction using the register:
16631 - "memory" fmt insn
16642 - byte-manipulation (byte offset reg)
16653 - jsr (target of branch)
1666
1667The GNU linker currently doesn't do any of this optimizing. */
7e7fb4a8 1668 BFD_RELOC_ALPHA_LITERAL,
6b31fd3a 1669 BFD_RELOC_ALPHA_ELF_LITERAL,
7e7fb4a8
KR
1670 BFD_RELOC_ALPHA_LITUSE,
1671
0443af31
KR
1672/* The HINT relocation indicates a value that should be filled into the
1673"hint" field of a jmp/jsr/ret instruction, for possible branch-
1674prediction logic which may be provided on some processors. */
7e7fb4a8
KR
1675 BFD_RELOC_ALPHA_HINT,
1676
8612a388
ILT
1677/* The LINKAGE relocation outputs a linkage pair in the object file,
1678which is filled by the linker. */
c3d8e071
ILT
1679 BFD_RELOC_ALPHA_LINKAGE,
1680
92a956e8
FF
1681/* The CODEADDR relocation outputs a STO_CA in the object file,
1682which is filled by the linker. */
1683 BFD_RELOC_ALPHA_CODEADDR,
1684
0443af31
KR
1685/* Bits 27..2 of the relocation address shifted right 2 bits;
1686simple reloc otherwise. */
fdcb0453
KR
1687 BFD_RELOC_MIPS_JMP,
1688
cd6213ff
FF
1689/* The MIPS16 jump instruction. */
1690 BFD_RELOC_MIPS16_JMP,
1691
a4183ba5
ILT
1692/* MIPS16 GP relative reloc. */
1693 BFD_RELOC_MIPS16_GPREL,
1694
0443af31 1695/* High 16 bits of 32-bit value; simple reloc. */
fdcb0453 1696 BFD_RELOC_HI16,
0443af31
KR
1697
1698/* High 16 bits of 32-bit value but the low 16 bits will be sign
1699extended and added to form the final result. If the low 16
1700bits form a negative number, we need to add one to the high value
1701to compensate for the borrow when the low bits are added. */
fdcb0453 1702 BFD_RELOC_HI16_S,
0443af31
KR
1703
1704/* Low 16 bits. */
fdcb0453 1705 BFD_RELOC_LO16,
0443af31
KR
1706
1707/* Like BFD_RELOC_HI16_S, but PC relative. */
7efb1850 1708 BFD_RELOC_PCREL_HI16_S,
0443af31
KR
1709
1710/* Like BFD_RELOC_LO16, but PC relative. */
7efb1850 1711 BFD_RELOC_PCREL_LO16,
fdcb0453 1712
0443af31 1713/* Relocation relative to the global pointer. */
7e7fb4a8 1714#define BFD_RELOC_MIPS_GPREL BFD_RELOC_GPREL16
fdcb0453 1715
0443af31 1716/* Relocation against a MIPS literal section. */
0a197a96
JG
1717 BFD_RELOC_MIPS_LITERAL,
1718
0443af31 1719/* MIPS ELF relocations. */
0a197a96
JG
1720 BFD_RELOC_MIPS_GOT16,
1721 BFD_RELOC_MIPS_CALL16,
7e7fb4a8 1722#define BFD_RELOC_MIPS_GPREL32 BFD_RELOC_GPREL32
e9f03cd4
ILT
1723 BFD_RELOC_MIPS_GOT_HI16,
1724 BFD_RELOC_MIPS_GOT_LO16,
b7384d22
ILT
1725 BFD_RELOC_MIPS_CALL_HI16,
1726 BFD_RELOC_MIPS_CALL_LO16,
0a197a96 1727
0443af31 1728/* i386/elf relocations */
b66b07a2
KR
1729 BFD_RELOC_386_GOT32,
1730 BFD_RELOC_386_PLT32,
1731 BFD_RELOC_386_COPY,
1732 BFD_RELOC_386_GLOB_DAT,
1733 BFD_RELOC_386_JUMP_SLOT,
1734 BFD_RELOC_386_RELATIVE,
1735 BFD_RELOC_386_GOTOFF,
1736 BFD_RELOC_386_GOTPC,
1737
0443af31 1738/* ns32k relocations */
1fb83be6
KR
1739 BFD_RELOC_NS32K_IMM_8,
1740 BFD_RELOC_NS32K_IMM_16,
1741 BFD_RELOC_NS32K_IMM_32,
1742 BFD_RELOC_NS32K_IMM_8_PCREL,
1743 BFD_RELOC_NS32K_IMM_16_PCREL,
1744 BFD_RELOC_NS32K_IMM_32_PCREL,
1745 BFD_RELOC_NS32K_DISP_8,
1746 BFD_RELOC_NS32K_DISP_16,
1747 BFD_RELOC_NS32K_DISP_32,
1748 BFD_RELOC_NS32K_DISP_8_PCREL,
1749 BFD_RELOC_NS32K_DISP_16_PCREL,
1750 BFD_RELOC_NS32K_DISP_32_PCREL,
1751
02f85cda 1752/* Power(rs6000) and PowerPC relocations. */
d1ad85a6 1753 BFD_RELOC_PPC_B26,
d1ad85a6 1754 BFD_RELOC_PPC_BA26,
d1ad85a6 1755 BFD_RELOC_PPC_TOC16,
02f85cda
MM
1756 BFD_RELOC_PPC_B16,
1757 BFD_RELOC_PPC_B16_BRTAKEN,
1758 BFD_RELOC_PPC_B16_BRNTAKEN,
1759 BFD_RELOC_PPC_BA16,
1760 BFD_RELOC_PPC_BA16_BRTAKEN,
1761 BFD_RELOC_PPC_BA16_BRNTAKEN,
1762 BFD_RELOC_PPC_COPY,
1763 BFD_RELOC_PPC_GLOB_DAT,
1764 BFD_RELOC_PPC_JMP_SLOT,
1765 BFD_RELOC_PPC_RELATIVE,
1766 BFD_RELOC_PPC_LOCAL24PC,
4500a112
MM
1767 BFD_RELOC_PPC_EMB_NADDR32,
1768 BFD_RELOC_PPC_EMB_NADDR16,
1769 BFD_RELOC_PPC_EMB_NADDR16_LO,
1770 BFD_RELOC_PPC_EMB_NADDR16_HI,
1771 BFD_RELOC_PPC_EMB_NADDR16_HA,
1772 BFD_RELOC_PPC_EMB_SDAI16,
1773 BFD_RELOC_PPC_EMB_SDA2I16,
1774 BFD_RELOC_PPC_EMB_SDA2REL,
1775 BFD_RELOC_PPC_EMB_SDA21,
1776 BFD_RELOC_PPC_EMB_MRKREF,
1777 BFD_RELOC_PPC_EMB_RELSEC16,
1778 BFD_RELOC_PPC_EMB_RELST_LO,
1779 BFD_RELOC_PPC_EMB_RELST_HI,
1780 BFD_RELOC_PPC_EMB_RELST_HA,
1781 BFD_RELOC_PPC_EMB_BIT_FLD,
1782 BFD_RELOC_PPC_EMB_RELSDA,
d1ad85a6 1783
0443af31
KR
1784/* The type of reloc used to build a contructor table - at the moment
1785probably a 32 bit wide absolute relocation, but the target can choose.
1786It generally does map to one of the other relocation types. */
1787 BFD_RELOC_CTOR,
d80ebaac
ILT
1788
1789/* ARM 26 bit pc-relative branch. The lowest two bits must be zero and are
1790not stored in the instruction. */
1791 BFD_RELOC_ARM_PCREL_BRANCH,
1792
1793/* These relocs are only used within the ARM assembler. They are not
1794(at present) written to any object files. */
1795 BFD_RELOC_ARM_IMMEDIATE,
1796 BFD_RELOC_ARM_OFFSET_IMM,
1797 BFD_RELOC_ARM_SHIFT_IMM,
1798 BFD_RELOC_ARM_SWI,
1799 BFD_RELOC_ARM_MULTI,
1800 BFD_RELOC_ARM_CP_OFF_IMM,
3b1f83ad
JL
1801 BFD_RELOC_ARM_ADR_IMM,
1802 BFD_RELOC_ARM_LDR_IMM,
1803 BFD_RELOC_ARM_LITERAL,
1804 BFD_RELOC_ARM_IN_POOL,
d1b40d8e
JSC
1805 BFD_RELOC_ARM_OFFSET_IMM8,
1806 BFD_RELOC_ARM_HWLITERAL,
c86158e5
ILT
1807 BFD_RELOC_ARM_THUMB_ADD,
1808 BFD_RELOC_ARM_THUMB_IMM,
1809 BFD_RELOC_ARM_THUMB_SHIFT,
1810 BFD_RELOC_ARM_THUMB_OFFSET,
1811
1812/* Hitachi SH relocs. Not all of these appear in object files. */
1813 BFD_RELOC_SH_PCDISP8BY2,
1814 BFD_RELOC_SH_PCDISP12BY2,
1815 BFD_RELOC_SH_IMM4,
1816 BFD_RELOC_SH_IMM4BY2,
1817 BFD_RELOC_SH_IMM4BY4,
1818 BFD_RELOC_SH_IMM8,
1819 BFD_RELOC_SH_IMM8BY2,
1820 BFD_RELOC_SH_IMM8BY4,
1821 BFD_RELOC_SH_PCRELIMM8BY2,
1822 BFD_RELOC_SH_PCRELIMM8BY4,
1823 BFD_RELOC_SH_SWITCH16,
1824 BFD_RELOC_SH_SWITCH32,
1825 BFD_RELOC_SH_USES,
1826 BFD_RELOC_SH_COUNT,
1827 BFD_RELOC_SH_ALIGN,
1828 BFD_RELOC_SH_CODE,
1829 BFD_RELOC_SH_DATA,
1830 BFD_RELOC_SH_LABEL,
05cedcf6
DE
1831/* start-sanitize-arc */
1832
1833/* Argonaut RISC Core (ARC) relocs.
1834ARC 22 bit pc-relative branch. The lowest two bits must be zero and are
3b1f83ad
JL
1835not stored in the instruction. The high 20 bits are installed in bits 26
1836through 7 of the instruction. */
05cedcf6 1837 BFD_RELOC_ARC_B22_PCREL,
3b1f83ad
JL
1838
1839/* ARC 26 bit absolute branch. The lowest two bits must be zero and are not
1840stored in the instruction. The high 24 bits are installed in bits 23
1841through 0. */
1842 BFD_RELOC_ARC_B26,
05cedcf6 1843/* end-sanitize-arc */
50bd50d4 1844
db986c60 1845
50bd50d4
MH
1846/* Mitsubishi D10V relocs.
1847This is a 10-bit reloc with the right 2 bits
1848assumed to be 0. */
50bd50d4
MH
1849 BFD_RELOC_D10V_10_PCREL_R,
1850
f4e14cb9
ILT
1851/* Mitsubishi D10V relocs.
1852This is a 10-bit reloc with the right 2 bits
1853assumed to be 0. This is the same as the previous reloc
1854except it is in the left container, i.e.,
1855shifted left 15 bits. */
1856 BFD_RELOC_D10V_10_PCREL_L,
1857
50bd50d4
MH
1858/* This is an 18-bit reloc with the right 2 bits
1859assumed to be 0. */
1860 BFD_RELOC_D10V_18,
1861
1862/* This is an 18-bit reloc with the right 2 bits
1863assumed to be 0. */
1864 BFD_RELOC_D10V_18_PCREL,
50bd50d4 1865
fd8d7c31
MH
1866/* start-sanitize-d30v */
1867
1868/* Mitsubishi D30V relocs.
1869This is a 6-bit absolute reloc. */
1870 BFD_RELOC_D30V_6,
1871
1872/* Mitsubishi D30V relocs.
1873This is a 12-bit absolute reloc with the
1874right 3 bitsassumed to be 0. */
1875 BFD_RELOC_D30V_15,
1876
1877/* Mitsubishi D30V relocs.
1878This is a 12-bit pc-relative reloc with
1879the right 3 bits assumed to be 0. */
1880 BFD_RELOC_D30V_15_PCREL,
1881
1882/* This is an 18-bit absolute reloc with
1883the right 3 bits assumed to be 0. */
1884 BFD_RELOC_D30V_21,
1885
1886/* This is an 18-bit pc-relative reloc with
1887the right 3 bits assumed to be 0. */
1888 BFD_RELOC_D30V_21_PCREL,
1889
1890/* This is a 32-bit absolute reloc. */
1891 BFD_RELOC_D30V_32,
1892
1893/* This is a 32-bit pc-relative reloc. */
1894 BFD_RELOC_D30V_32_PCREL,
1895/* end-sanitize-d30v */
1896
3ebefb07
DE
1897/* start-sanitize-m32r */
1898
1899/* Mitsubishi M32R relocs.
cd6213ff
FF
1900This is a 24 bit absolute address. */
1901 BFD_RELOC_M32R_24,
efc2b064 1902
cd6213ff
FF
1903/* This is a 10-bit pc-relative reloc with the right 2 bits assumed to be 0. */
1904 BFD_RELOC_M32R_10_PCREL,
3ebefb07
DE
1905
1906/* This is an 18-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1907 BFD_RELOC_M32R_18_PCREL,
3ebefb07 1908
1d5c6cfd 1909/* This is a 26-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1910 BFD_RELOC_M32R_26_PCREL,
1d5c6cfd
DE
1911
1912/* This is a 16-bit reloc containing the high 16 bits of an address
1913used when the lower 16 bits are treated as unsigned. */
1914 BFD_RELOC_M32R_HI16_ULO,
1915
1916/* This is a 16-bit reloc containing the high 16 bits of an address
1917used when the lower 16 bits are treated as signed. */
1918 BFD_RELOC_M32R_HI16_SLO,
1919
1920/* This is a 16-bit reloc containing the lower 16 bits of an address. */
1921 BFD_RELOC_M32R_LO16,
77dd1a25
DE
1922
1923/* This is a 16-bit reloc containing the small data area offset for use in
1924add3, load, and store instructions. */
1925 BFD_RELOC_M32R_SDA16,
3ebefb07
DE
1926/* end-sanitize-m32r */
1927
00d7a64b
JL
1928/* start-sanitize-v850 */
1929
1930/* This is a 9-bit reloc */
c86158e5 1931 BFD_RELOC_V850_9_PCREL,
00d7a64b
JL
1932
1933/* This is a 22-bit reloc */
c86158e5 1934 BFD_RELOC_V850_22_PCREL,
b6d08fce
JL
1935
1936/* This is an offset from the short data area pointer.. */
1937 BFD_RELOC_V850_SDA_OFFSET,
1938
1939/* This is an offset from the zero data area pointer.. */
1940 BFD_RELOC_V850_ZDA_OFFSET,
1941
1942/* This is an offset from the tiny data area pointer.. */
1943 BFD_RELOC_V850_TDA_OFFSET,
00d7a64b 1944/* end-sanitize-v850 */
c86158e5 1945
cd6213ff
FF
1946
1947/* This is a 32bit pcrel reloc for the mn10300, offset by two bytes in the
1948instruction. */
1949 BFD_RELOC_MN10300_32_PCREL,
1950
1951/* This is a 16bit pcrel reloc for the mn10300, offset by two bytes in the
1952instruction. */
1953 BFD_RELOC_MN10300_16_PCREL,
0443af31
KR
1954 BFD_RELOC_UNUSED };
1955typedef enum bfd_reloc_code_real bfd_reloc_code_real_type;
5dc8db48 1956reloc_howto_type *
fdcb0453
KR
1957
1958bfd_reloc_type_lookup PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
1959
0443af31
KR
1960const char *
1961bfd_get_reloc_code_name PARAMS ((bfd_reloc_code_real_type code));
1962
ef758f3e 1963
57a1867e 1964typedef struct symbol_cache_entry
fdcb0453
KR
1965{
1966 /* A pointer to the BFD which owns the symbol. This information
1967 is necessary so that a back end can work out what additional
1968 information (invisible to the application writer) is carried
1969 with the symbol.
1970
1971 This field is *almost* redundant, since you can use section->owner
1972 instead, except that some symbols point to the global sections
1973 bfd_{abs,com,und}_section. This could be fixed by making
1974 these globals be per-bfd (or per-target-flavor). FIXME. */
1975
1976 struct _bfd *the_bfd; /* Use bfd_asymbol_bfd(sym) to access this field. */
1977
c188b0be 1978 /* The text of the symbol. The name is left alone, and not copied; the
fdcb0453
KR
1979 application may not alter it. */
1980 CONST char *name;
1981
1982 /* The value of the symbol. This really should be a union of a
1983 numeric value with a pointer, since some flags indicate that
1984 a pointer to another symbol is stored here. */
1985 symvalue value;
1986
1987 /* Attributes of a symbol: */
1988
1989#define BSF_NO_FLAGS 0x00
1990
1991 /* The symbol has local scope; <<static>> in <<C>>. The value
1992 is the offset into the section of the data. */
1993#define BSF_LOCAL 0x01
1994
1995 /* The symbol has global scope; initialized data in <<C>>. The
1996 value is the offset into the section of the data. */
1997#define BSF_GLOBAL 0x02
1998
c188b0be 1999 /* The symbol has global scope and is exported. The value is
fdcb0453 2000 the offset into the section of the data. */
ef758f3e 2001#define BSF_EXPORT BSF_GLOBAL /* no real difference */
fdcb0453
KR
2002
2003 /* A normal C symbol would be one of:
2004 <<BSF_LOCAL>>, <<BSF_FORT_COMM>>, <<BSF_UNDEFINED>> or
ef758f3e 2005 <<BSF_GLOBAL>> */
fdcb0453
KR
2006
2007 /* The symbol is a debugging record. The value has an arbitary
2008 meaning. */
2009#define BSF_DEBUGGING 0x08
2010
2011 /* The symbol denotes a function entry point. Used in ELF,
2012 perhaps others someday. */
2013#define BSF_FUNCTION 0x10
2014
2015 /* Used by the linker. */
2016#define BSF_KEEP 0x20
2017#define BSF_KEEP_G 0x40
2018
b66b07a2
KR
2019 /* A weak global symbol, overridable without warnings by
2020 a regular global symbol of the same name. */
fdcb0453
KR
2021#define BSF_WEAK 0x80
2022
2023 /* This symbol was created to point to a section, e.g. ELF's
2024 STT_SECTION symbols. */
2025#define BSF_SECTION_SYM 0x100
2026
2027 /* The symbol used to be a common symbol, but now it is
2028 allocated. */
2029#define BSF_OLD_COMMON 0x200
2030
2031 /* The default value for common data. */
2032#define BFD_FORT_COMM_DEFAULT_VALUE 0
2033
2034 /* In some files the type of a symbol sometimes alters its
2035 location in an output file - ie in coff a <<ISFCN>> symbol
2036 which is also <<C_EXT>> symbol appears where it was
2037 declared and not at the end of a section. This bit is set
2038 by the target BFD part to convey this information. */
2039
2040#define BSF_NOT_AT_END 0x400
2041
2042 /* Signal that the symbol is the label of constructor section. */
2043#define BSF_CONSTRUCTOR 0x800
2044
fcf490c0
ILT
2045 /* Signal that the symbol is a warning symbol. The name is a
2046 warning. The name of the next symbol is the one to warn about;
2047 if a reference is made to a symbol with the same name as the next
2048 symbol, a warning is issued by the linker. */
fdcb0453
KR
2049#define BSF_WARNING 0x1000
2050
fcf490c0
ILT
2051 /* Signal that the symbol is indirect. This symbol is an indirect
2052 pointer to the symbol with the same name as the next symbol. */
fdcb0453
KR
2053#define BSF_INDIRECT 0x2000
2054
2055 /* BSF_FILE marks symbols that contain a file name. This is used
2056 for ELF STT_FILE symbols. */
2057#define BSF_FILE 0x4000
2058
0ee75d02
ILT
2059 /* Symbol is from dynamic linking information. */
2060#define BSF_DYNAMIC 0x8000
2061
cbe75cb6
ILT
2062 /* The symbol denotes a data object. Used in ELF, and perhaps
2063 others someday. */
2064#define BSF_OBJECT 0x10000
2065
fdcb0453
KR
2066 flagword flags;
2067
57a1867e 2068 /* A pointer to the section to which this symbol is
fdcb0453 2069 relative. This will always be non NULL, there are special
fca2b81b 2070 sections for undefined and absolute symbols. */
fdcb0453
KR
2071 struct sec *section;
2072
fca2b81b
KR
2073 /* Back end special data. */
2074 union
2075 {
2076 PTR p;
2077 bfd_vma i;
2078 } udata;
fdcb0453
KR
2079
2080} asymbol;
326e32d7
ILT
2081#define bfd_get_symtab_upper_bound(abfd) \
2082 BFD_SEND (abfd, _bfd_get_symtab_upper_bound, (abfd))
5a66538b
KR
2083boolean
2084bfd_is_local_label PARAMS ((bfd *abfd, asymbol *sym));
2085
35a3e78e
ILT
2086boolean
2087bfd_is_local_label_name PARAMS ((bfd *abfd, const char *name));
2088
2089#define bfd_is_local_label_name(abfd, name) \
2090 BFD_SEND (abfd, _bfd_is_local_label_name, (abfd, name))
fdcb0453
KR
2091#define bfd_canonicalize_symtab(abfd, location) \
2092 BFD_SEND (abfd, _bfd_canonicalize_symtab,\
2093 (abfd, location))
2094boolean
c188b0be 2095bfd_set_symtab PARAMS ((bfd *abfd, asymbol **location, unsigned int count));
fdcb0453
KR
2096
2097void
2098bfd_print_symbol_vandf PARAMS ((PTR file, asymbol *symbol));
2099
2100#define bfd_make_empty_symbol(abfd) \
2101 BFD_SEND (abfd, _bfd_make_empty_symbol, (abfd))
2102#define bfd_make_debug_symbol(abfd,ptr,size) \
2103 BFD_SEND (abfd, _bfd_make_debug_symbol, (abfd, ptr, size))
2104int
2105bfd_decode_symclass PARAMS ((asymbol *symbol));
2106
2107void
2108bfd_symbol_info PARAMS ((asymbol *symbol, symbol_info *ret));
2109
6167a840
JL
2110boolean
2111bfd_copy_private_symbol_data PARAMS ((bfd *ibfd, asymbol *isym, bfd *obfd, asymbol *osym));
2112
2113#define bfd_copy_private_symbol_data(ibfd, isymbol, obfd, osymbol) \
efc2b064 2114 BFD_SEND (obfd, _bfd_copy_private_symbol_data, \
6167a840 2115 (ibfd, isymbol, obfd, osymbol))
fdcb0453
KR
2116struct _bfd
2117{
2118 /* The filename the application opened the BFD with. */
2119 CONST char *filename;
2120
2121 /* A pointer to the target jump table. */
2f3508ad 2122 const struct bfd_target *xvec;
fdcb0453
KR
2123
2124 /* To avoid dragging too many header files into every file that
2125 includes `<<bfd.h>>', IOSTREAM has been declared as a "char
2126 *", and MTIME as a "long". Their correct types, to which they
2127 are cast when used, are "FILE *" and "time_t". The iostream
64d5f5d0
ILT
2128 is the result of an fopen on the filename. However, if the
2129 BFD_IN_MEMORY flag is set, then iostream is actually a pointer
2130 to a bfd_in_memory struct. */
2131 PTR iostream;
fdcb0453 2132
0a197a96
JG
2133 /* Is the file descriptor being cached? That is, can it be closed as
2134 needed, and re-opened when accessed later? */
fdcb0453
KR
2135
2136 boolean cacheable;
2137
2138 /* Marks whether there was a default target specified when the
c188b0be
DM
2139 BFD was opened. This is used to select which matching algorithm
2140 to use to choose the back end. */
fdcb0453
KR
2141
2142 boolean target_defaulted;
2143
2144 /* The caching routines use these to maintain a
2145 least-recently-used list of BFDs */
2146
2147 struct _bfd *lru_prev, *lru_next;
2148
2149 /* When a file is closed by the caching routines, BFD retains
c188b0be 2150 state information on the file here: */
fdcb0453
KR
2151
2152 file_ptr where;
2153
c188b0be 2154 /* and here: (``once'' means at least once) */
fdcb0453
KR
2155
2156 boolean opened_once;
2157
2158 /* Set if we have a locally maintained mtime value, rather than
2159 getting it from the file each time: */
2160
2161 boolean mtime_set;
2162
2163 /* File modified time, if mtime_set is true: */
2164
2165 long mtime;
2166
2167 /* Reserved for an unimplemented file locking extension.*/
2168
2169 int ifd;
2170
c188b0be 2171 /* The format which belongs to the BFD. (object, core, etc.) */
fdcb0453
KR
2172
2173 bfd_format format;
2174
2175 /* The direction the BFD was opened with*/
2176
2177 enum bfd_direction {no_direction = 0,
2178 read_direction = 1,
2179 write_direction = 2,
2180 both_direction = 3} direction;
2181
2182 /* Format_specific flags*/
2183
2184 flagword flags;
2185
2186 /* Currently my_archive is tested before adding origin to
2187 anything. I believe that this can become always an add of
2188 origin, with origin set to 0 for non archive files. */
2189
2190 file_ptr origin;
2191
2192 /* Remember when output has begun, to stop strange things
c188b0be 2193 from happening. */
fdcb0453
KR
2194 boolean output_has_begun;
2195
2196 /* Pointer to linked list of sections*/
2197 struct sec *sections;
2198
2199 /* The number of sections */
2200 unsigned int section_count;
2201
2202 /* Stuff only useful for object files:
2203 The start address. */
2204 bfd_vma start_address;
2205
2206 /* Used for input and output*/
2207 unsigned int symcount;
2208
c188b0be 2209 /* Symbol table for output BFD (with symcount entries) */
fdcb0453
KR
2210 struct symbol_cache_entry **outsymbols;
2211
2212 /* Pointer to structure which contains architecture information*/
2ffbb79a 2213 const struct bfd_arch_info *arch_info;
fdcb0453
KR
2214
2215 /* Stuff only useful for archives:*/
2216 PTR arelt_data;
c188b0be
DM
2217 struct _bfd *my_archive; /* The containing archive BFD. */
2218 struct _bfd *next; /* The next BFD in the archive. */
2219 struct _bfd *archive_head; /* The first BFD in the archive. */
fdcb0453
KR
2220 boolean has_armap;
2221
4c3721d5
ILT
2222 /* A chain of BFD structures involved in a link. */
2223 struct _bfd *link_next;
2224
2225 /* A field used by _bfd_generic_link_add_archive_symbols. This will
2226 be used only for archive elements. */
2227 int archive_pass;
2228
fdcb0453
KR
2229 /* Used by the back end to hold private data. */
2230
2231 union
2232 {
2233 struct aout_data_struct *aout_data;
2234 struct artdata *aout_ar_data;
2235 struct _oasys_data *oasys_obj_data;
2236 struct _oasys_ar_data *oasys_ar_data;
2237 struct coff_tdata *coff_obj_data;
4e98461f 2238 struct pe_tdata *pe_obj_data;
54406786 2239 struct xcoff_tdata *xcoff_obj_data;
fdcb0453
KR
2240 struct ecoff_tdata *ecoff_obj_data;
2241 struct ieee_data_struct *ieee_data;
2242 struct ieee_ar_data_struct *ieee_ar_data;
2243 struct srec_data_struct *srec_data;
ffd15489 2244 struct ihex_data_struct *ihex_data;
fdcb0453
KR
2245 struct tekhex_data_struct *tekhex_data;
2246 struct elf_obj_tdata *elf_obj_data;
c3e964b9 2247 struct nlm_obj_tdata *nlm_obj_data;
fdcb0453
KR
2248 struct bout_data_struct *bout_data;
2249 struct sun_core_struct *sun_core_data;
2250 struct trad_core_struct *trad_core_data;
9e461dac 2251 struct som_data_struct *som_data;
b66b07a2 2252 struct hpux_core_struct *hpux_core_data;
8d12f138 2253 struct hppabsd_core_struct *hppabsd_core_data;
fdcb0453 2254 struct sgi_core_struct *sgi_core_data;
2b91cc45 2255 struct lynx_core_struct *lynx_core_data;
9b3fa589 2256 struct osf_core_struct *osf_core_data;
326e32d7 2257 struct cisco_core_struct *cisco_core_data;
3b1f83ad 2258 struct versados_data_struct *versados_data;
871a3f3b 2259 struct netbsd_core_struct *netbsd_core_data;
fdcb0453
KR
2260 PTR any;
2261 } tdata;
2262
2263 /* Used by the application to hold private data*/
2264 PTR usrdata;
2265
2266 /* Where all the allocated stuff under this BFD goes */
2267 struct obstack memory;
fdcb0453
KR
2268};
2269
0f8f509c
DM
2270typedef enum bfd_error
2271{
d1ad85a6
DM
2272 bfd_error_no_error = 0,
2273 bfd_error_system_call,
2274 bfd_error_invalid_target,
2275 bfd_error_wrong_format,
2276 bfd_error_invalid_operation,
2277 bfd_error_no_memory,
2278 bfd_error_no_symbols,
9675c281 2279 bfd_error_no_armap,
d1ad85a6
DM
2280 bfd_error_no_more_archived_files,
2281 bfd_error_malformed_archive,
2282 bfd_error_file_not_recognized,
2283 bfd_error_file_ambiguously_recognized,
2284 bfd_error_no_contents,
2285 bfd_error_nonrepresentable_section,
2286 bfd_error_no_debug_section,
2287 bfd_error_bad_value,
2288 bfd_error_file_truncated,
5dc8db48 2289 bfd_error_file_too_big,
d1ad85a6
DM
2290 bfd_error_invalid_error_code
2291} bfd_error_type;
2292
2293bfd_error_type
2294bfd_get_error PARAMS ((void));
2295
2296void
2297bfd_set_error PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2298
2299CONST char *
d1ad85a6 2300bfd_errmsg PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2301
2302void
2303bfd_perror PARAMS ((CONST char *message));
2304
3b1f83ad
JL
2305typedef void (*bfd_error_handler_type) PARAMS ((const char *, ...));
2306
2307bfd_error_handler_type
2308bfd_set_error_handler PARAMS ((bfd_error_handler_type));
2309
2310void
2311bfd_set_error_program_name PARAMS ((const char *));
2312
326e32d7 2313long
e2756048
ILT
2314bfd_get_reloc_upper_bound PARAMS ((bfd *abfd, asection *sect));
2315
326e32d7 2316long
e2756048
ILT
2317bfd_canonicalize_reloc
2318 PARAMS ((bfd *abfd,
2319 asection *sec,
2320 arelent **loc,
2321 asymbol **syms));
2322
2323void
2324bfd_set_reloc
2325 PARAMS ((bfd *abfd, asection *sec, arelent **rel, unsigned int count)
2326
2327 );
2328
fdcb0453
KR
2329boolean
2330bfd_set_file_flags PARAMS ((bfd *abfd, flagword flags));
2331
fdcb0453 2332boolean
c188b0be 2333bfd_set_start_address PARAMS ((bfd *abfd, bfd_vma vma));
fdcb0453
KR
2334
2335long
c188b0be 2336bfd_get_mtime PARAMS ((bfd *abfd));
fdcb0453
KR
2337
2338long
c188b0be 2339bfd_get_size PARAMS ((bfd *abfd));
fdcb0453
KR
2340
2341int
c188b0be 2342bfd_get_gp_size PARAMS ((bfd *abfd));
fdcb0453
KR
2343
2344void
c188b0be 2345bfd_set_gp_size PARAMS ((bfd *abfd, int i));
fdcb0453 2346
ef758f3e
KR
2347bfd_vma
2348bfd_scan_vma PARAMS ((CONST char *string, CONST char **end, int base));
2349
5a66538b
KR
2350boolean
2351bfd_copy_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2352
2353#define bfd_copy_private_bfd_data(ibfd, obfd) \
efc2b064 2354 BFD_SEND (obfd, _bfd_copy_private_bfd_data, \
5a66538b 2355 (ibfd, obfd))
3b1f83ad
JL
2356boolean
2357bfd_merge_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2358
2359#define bfd_merge_private_bfd_data(ibfd, obfd) \
efc2b064 2360 BFD_SEND (obfd, _bfd_merge_private_bfd_data, \
3b1f83ad
JL
2361 (ibfd, obfd))
2362boolean
2363bfd_set_private_flags PARAMS ((bfd *abfd, flagword flags));
2364
2365#define bfd_set_private_flags(abfd, flags) \
2366 BFD_SEND (abfd, _bfd_set_private_flags, \
2367 (abfd, flags))
fdcb0453
KR
2368#define bfd_sizeof_headers(abfd, reloc) \
2369 BFD_SEND (abfd, _bfd_sizeof_headers, (abfd, reloc))
2370
2371#define bfd_find_nearest_line(abfd, sec, syms, off, file, func, line) \
2372 BFD_SEND (abfd, _bfd_find_nearest_line, (abfd, sec, syms, off, file, func, line))
2373
2374 /* Do these three do anything useful at all, for any back end? */
2375#define bfd_debug_info_start(abfd) \
2376 BFD_SEND (abfd, _bfd_debug_info_start, (abfd))
2377
2378#define bfd_debug_info_end(abfd) \
2379 BFD_SEND (abfd, _bfd_debug_info_end, (abfd))
2380
2381#define bfd_debug_info_accumulate(abfd, section) \
2382 BFD_SEND (abfd, _bfd_debug_info_accumulate, (abfd, section))
2383
2384
2385#define bfd_stat_arch_elt(abfd, stat) \
2386 BFD_SEND (abfd, _bfd_stat_arch_elt,(abfd, stat))
2387
0822b56d
ILT
2388#define bfd_update_armap_timestamp(abfd) \
2389 BFD_SEND (abfd, _bfd_update_armap_timestamp, (abfd))
2390
fdcb0453
KR
2391#define bfd_set_arch_mach(abfd, arch, mach)\
2392 BFD_SEND ( abfd, _bfd_set_arch_mach, (abfd, arch, mach))
2393
326e32d7
ILT
2394#define bfd_relax_section(abfd, section, link_info, again) \
2395 BFD_SEND (abfd, _bfd_relax_section, (abfd, section, link_info, again))
4c3721d5
ILT
2396
2397#define bfd_link_hash_table_create(abfd) \
2398 BFD_SEND (abfd, _bfd_link_hash_table_create, (abfd))
2399
2400#define bfd_link_add_symbols(abfd, info) \
2401 BFD_SEND (abfd, _bfd_link_add_symbols, (abfd, info))
2402
2403#define bfd_final_link(abfd, info) \
2404 BFD_SEND (abfd, _bfd_final_link, (abfd, info))
fdcb0453 2405
9deaaaf1
ILT
2406#define bfd_free_cached_info(abfd) \
2407 BFD_SEND (abfd, _bfd_free_cached_info, (abfd))
2408
ad46bd1d
ILT
2409#define bfd_get_dynamic_symtab_upper_bound(abfd) \
2410 BFD_SEND (abfd, _bfd_get_dynamic_symtab_upper_bound, (abfd))
2411
4e98461f
SC
2412#define bfd_print_private_bfd_data(abfd, file)\
2413 BFD_SEND (abfd, _bfd_print_private_bfd_data, (abfd, file))
2414
ad46bd1d
ILT
2415#define bfd_canonicalize_dynamic_symtab(abfd, asymbols) \
2416 BFD_SEND (abfd, _bfd_canonicalize_dynamic_symtab, (abfd, asymbols))
2417
2418#define bfd_get_dynamic_reloc_upper_bound(abfd) \
2419 BFD_SEND (abfd, _bfd_get_dynamic_reloc_upper_bound, (abfd))
2420
2421#define bfd_canonicalize_dynamic_reloc(abfd, arels, asyms) \
2422 BFD_SEND (abfd, _bfd_canonicalize_dynamic_reloc, (abfd, arels, asyms))
2423
3b1f83ad
JL
2424extern bfd_byte *bfd_get_relocated_section_contents
2425 PARAMS ((bfd *, struct bfd_link_info *,
2426 struct bfd_link_order *, bfd_byte *,
2427 boolean, asymbol **));
2428
fdcb0453 2429symindex
c188b0be 2430bfd_get_next_mapent PARAMS ((bfd *abfd, symindex previous, carsym **sym));
fdcb0453
KR
2431
2432boolean
2433bfd_set_archive_head PARAMS ((bfd *output, bfd *new_head));
2434
c188b0be 2435bfd *
fdcb0453
KR
2436bfd_openr_next_archived_file PARAMS ((bfd *archive, bfd *previous));
2437
2438CONST char *
c188b0be 2439bfd_core_file_failing_command PARAMS ((bfd *abfd));
fdcb0453
KR
2440
2441int
c188b0be 2442bfd_core_file_failing_signal PARAMS ((bfd *abfd));
fdcb0453
KR
2443
2444boolean
2445core_file_matches_executable_p
2446 PARAMS ((bfd *core_bfd, bfd *exec_bfd));
2447
2448#define BFD_SEND(bfd, message, arglist) \
2449 ((*((bfd)->xvec->message)) arglist)
fdfe2d14
SS
2450
2451#ifdef DEBUG_BFD_SEND
2452#undef BFD_SEND
2453#define BFD_SEND(bfd, message, arglist) \
2454 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2455 ((*((bfd)->xvec->message)) arglist) : \
2456 (bfd_assert (__FILE__,__LINE__), NULL))
2457#endif
fdcb0453
KR
2458#define BFD_SEND_FMT(bfd, message, arglist) \
2459 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist)
fdfe2d14
SS
2460
2461#ifdef DEBUG_BFD_SEND
2462#undef BFD_SEND_FMT
2463#define BFD_SEND_FMT(bfd, message, arglist) \
2464 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2465 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist) : \
2466 (bfd_assert (__FILE__,__LINE__), NULL))
2467#endif
9e461dac
JK
2468enum bfd_flavour {
2469 bfd_target_unknown_flavour,
2470 bfd_target_aout_flavour,
2471 bfd_target_coff_flavour,
2472 bfd_target_ecoff_flavour,
2473 bfd_target_elf_flavour,
2474 bfd_target_ieee_flavour,
2475 bfd_target_nlm_flavour,
2476 bfd_target_oasys_flavour,
2477 bfd_target_tekhex_flavour,
2478 bfd_target_srec_flavour,
ffd15489 2479 bfd_target_ihex_flavour,
d1f8b181 2480 bfd_target_som_flavour,
5dc8db48 2481 bfd_target_os9k_flavour,
9675c281 2482 bfd_target_versados_flavour,
c3d8e071
ILT
2483 bfd_target_msdos_flavour,
2484 bfd_target_evax_flavour
5dc8db48 2485};
4c3721d5 2486
64d5f5d0
ILT
2487enum bfd_endian { BFD_ENDIAN_BIG, BFD_ENDIAN_LITTLE, BFD_ENDIAN_UNKNOWN };
2488
4c3721d5
ILT
2489 /* Forward declaration. */
2490typedef struct bfd_link_info _bfd_link_info;
2491
fdcb0453
KR
2492typedef struct bfd_target
2493{
2494 char *name;
9e461dac 2495 enum bfd_flavour flavour;
64d5f5d0
ILT
2496 enum bfd_endian byteorder;
2497 enum bfd_endian header_byteorder;
fdcb0453
KR
2498 flagword object_flags;
2499 flagword section_flags;
2500 char symbol_leading_char;
2501 char ar_pad_char;
2502 unsigned short ar_max_namelen;
1a973af1
ILT
2503 bfd_vma (*bfd_getx64) PARAMS ((const bfd_byte *));
2504 bfd_signed_vma (*bfd_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2505 void (*bfd_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2506 bfd_vma (*bfd_getx32) PARAMS ((const bfd_byte *));
2507 bfd_signed_vma (*bfd_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2508 void (*bfd_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2509 bfd_vma (*bfd_getx16) PARAMS ((const bfd_byte *));
2510 bfd_signed_vma (*bfd_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2511 void (*bfd_putx16) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2512 bfd_vma (*bfd_h_getx64) PARAMS ((const bfd_byte *));
2513 bfd_signed_vma (*bfd_h_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2514 void (*bfd_h_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2515 bfd_vma (*bfd_h_getx32) PARAMS ((const bfd_byte *));
2516 bfd_signed_vma (*bfd_h_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2517 void (*bfd_h_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2518 bfd_vma (*bfd_h_getx16) PARAMS ((const bfd_byte *));
2519 bfd_signed_vma (*bfd_h_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2520 void (*bfd_h_putx16) PARAMS ((bfd_vma, bfd_byte *));
2f3508ad 2521 const struct bfd_target *(*_bfd_check_format[bfd_type_end]) PARAMS ((bfd *));
fdcb0453
KR
2522 boolean (*_bfd_set_format[bfd_type_end]) PARAMS ((bfd *));
2523 boolean (*_bfd_write_contents[bfd_type_end]) PARAMS ((bfd *));
6812b607
ILT
2524
2525 /* Generic entry points. */
2526#define BFD_JUMP_TABLE_GENERIC(NAME)\
2527CAT(NAME,_close_and_cleanup),\
2528CAT(NAME,_bfd_free_cached_info),\
2529CAT(NAME,_new_section_hook),\
4fe6d901
KR
2530CAT(NAME,_get_section_contents),\
2531CAT(NAME,_get_section_contents_in_window)
2532
6812b607
ILT
2533 /* Called when the BFD is being closed to do any necessary cleanup. */
2534 boolean (*_close_and_cleanup) PARAMS ((bfd *));
2535 /* Ask the BFD to free all cached information. */
2536 boolean (*_bfd_free_cached_info) PARAMS ((bfd *));
2537 /* Called when a new section is created. */
2538 boolean (*_new_section_hook) PARAMS ((bfd *, sec_ptr));
2539 /* Read the contents of a section. */
2540 boolean (*_bfd_get_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2541 file_ptr, bfd_size_type));
4fe6d901
KR
2542 boolean (*_bfd_get_section_contents_in_window)
2543 PARAMS ((bfd *, sec_ptr, bfd_window *,
2544 file_ptr, bfd_size_type));
6812b607
ILT
2545
2546 /* Entry points to copy private data. */
2547#define BFD_JUMP_TABLE_COPY(NAME)\
2548CAT(NAME,_bfd_copy_private_bfd_data),\
3b1f83ad
JL
2549CAT(NAME,_bfd_merge_private_bfd_data),\
2550CAT(NAME,_bfd_copy_private_section_data),\
6167a840 2551CAT(NAME,_bfd_copy_private_symbol_data),\
4e98461f
SC
2552CAT(NAME,_bfd_set_private_flags),\
2553CAT(NAME,_bfd_print_private_bfd_data)\
6812b607
ILT
2554 /* Called to copy BFD general private data from one object file
2555 to another. */
2556 boolean (*_bfd_copy_private_bfd_data) PARAMS ((bfd *, bfd *));
3b1f83ad
JL
2557 /* Called to merge BFD general private data from one object file
2558 to a common output file when linking. */
2559 boolean (*_bfd_merge_private_bfd_data) PARAMS ((bfd *, bfd *));
6812b607
ILT
2560 /* Called to copy BFD private section data from one object file
2561 to another. */
2562 boolean (*_bfd_copy_private_section_data) PARAMS ((bfd *, sec_ptr,
2563 bfd *, sec_ptr));
6167a840
JL
2564 /* Called to copy BFD private symbol data from one symbol
2565 to another. */
2566 boolean (*_bfd_copy_private_symbol_data) PARAMS ((bfd *, asymbol *,
2567 bfd *, asymbol *));
3b1f83ad
JL
2568 /* Called to set private backend flags */
2569 boolean (*_bfd_set_private_flags) PARAMS ((bfd *, flagword));
6812b607 2570
4e98461f 2571 /* Called to print private BFD data */
ae0a6bea 2572 boolean (*_bfd_print_private_bfd_data) PARAMS ((bfd *, PTR));
4e98461f 2573
6812b607
ILT
2574 /* Core file entry points. */
2575#define BFD_JUMP_TABLE_CORE(NAME)\
2576CAT(NAME,_core_file_failing_command),\
2577CAT(NAME,_core_file_failing_signal),\
2578CAT(NAME,_core_file_matches_executable_p)
fdcb0453
KR
2579 char * (*_core_file_failing_command) PARAMS ((bfd *));
2580 int (*_core_file_failing_signal) PARAMS ((bfd *));
2581 boolean (*_core_file_matches_executable_p) PARAMS ((bfd *, bfd *));
6812b607
ILT
2582
2583 /* Archive entry points. */
2584#define BFD_JUMP_TABLE_ARCHIVE(NAME)\
2585CAT(NAME,_slurp_armap),\
2586CAT(NAME,_slurp_extended_name_table),\
fca2b81b 2587CAT(NAME,_construct_extended_name_table),\
6812b607
ILT
2588CAT(NAME,_truncate_arname),\
2589CAT(NAME,_write_armap),\
c53fac12 2590CAT(NAME,_read_ar_hdr),\
6812b607 2591CAT(NAME,_openr_next_archived_file),\
64d5f5d0 2592CAT(NAME,_get_elt_at_index),\
0822b56d
ILT
2593CAT(NAME,_generic_stat_arch_elt),\
2594CAT(NAME,_update_armap_timestamp)
fdcb0453
KR
2595 boolean (*_bfd_slurp_armap) PARAMS ((bfd *));
2596 boolean (*_bfd_slurp_extended_name_table) PARAMS ((bfd *));
fca2b81b
KR
2597 boolean (*_bfd_construct_extended_name_table)
2598 PARAMS ((bfd *, char **, bfd_size_type *, const char **));
fdcb0453
KR
2599 void (*_bfd_truncate_arname) PARAMS ((bfd *, CONST char *, char *));
2600 boolean (*write_armap) PARAMS ((bfd *arch,
2601 unsigned int elength,
2602 struct orl *map,
2603 unsigned int orl_count,
2604 int stridx));
0322af0d 2605 PTR (*_bfd_read_ar_hdr_fn) PARAMS ((bfd *));
0822b56d 2606 bfd * (*openr_next_archived_file) PARAMS ((bfd *arch, bfd *prev));
64d5f5d0
ILT
2607#define bfd_get_elt_at_index(b,i) BFD_SEND(b, _bfd_get_elt_at_index, (b,i))
2608 bfd * (*_bfd_get_elt_at_index) PARAMS ((bfd *, symindex));
0822b56d
ILT
2609 int (*_bfd_stat_arch_elt) PARAMS ((bfd *, struct stat *));
2610 boolean (*_bfd_update_armap_timestamp) PARAMS ((bfd *));
2611
6812b607
ILT
2612 /* Entry points used for symbols. */
2613#define BFD_JUMP_TABLE_SYMBOLS(NAME)\
2614CAT(NAME,_get_symtab_upper_bound),\
2615CAT(NAME,_get_symtab),\
2616CAT(NAME,_make_empty_symbol),\
2617CAT(NAME,_print_symbol),\
2618CAT(NAME,_get_symbol_info),\
35a3e78e 2619CAT(NAME,_bfd_is_local_label_name),\
6812b607
ILT
2620CAT(NAME,_get_lineno),\
2621CAT(NAME,_find_nearest_line),\
e9614321
SC
2622CAT(NAME,_bfd_make_debug_symbol),\
2623CAT(NAME,_read_minisymbols),\
2624CAT(NAME,_minisymbol_to_symbol)
326e32d7
ILT
2625 long (*_bfd_get_symtab_upper_bound) PARAMS ((bfd *));
2626 long (*_bfd_canonicalize_symtab) PARAMS ((bfd *,
2627 struct symbol_cache_entry **));
fdcb0453
KR
2628 struct symbol_cache_entry *
2629 (*_bfd_make_empty_symbol) PARAMS ((bfd *));
2630 void (*_bfd_print_symbol) PARAMS ((bfd *, PTR,
2631 struct symbol_cache_entry *,
2632 bfd_print_symbol_type));
2633#define bfd_print_symbol(b,p,s,e) BFD_SEND(b, _bfd_print_symbol, (b,p,s,e))
2634 void (*_bfd_get_symbol_info) PARAMS ((bfd *,
2635 struct symbol_cache_entry *,
2636 symbol_info *));
2637#define bfd_get_symbol_info(b,p,e) BFD_SEND(b, _bfd_get_symbol_info, (b,p,e))
35a3e78e 2638 boolean (*_bfd_is_local_label_name) PARAMS ((bfd *, const char *));
fdcb0453 2639
6812b607 2640 alent * (*_get_lineno) PARAMS ((bfd *, struct symbol_cache_entry *));
fdcb0453
KR
2641 boolean (*_bfd_find_nearest_line) PARAMS ((bfd *abfd,
2642 struct sec *section, struct symbol_cache_entry **symbols,
2643 bfd_vma offset, CONST char **file, CONST char **func,
2644 unsigned int *line));
6812b607
ILT
2645 /* Back-door to allow format-aware applications to create debug symbols
2646 while using BFD for everything else. Currently used by the assembler
2647 when creating COFF files. */
e9614321 2648 asymbol * (*_bfd_make_debug_symbol) PARAMS ((
6812b607
ILT
2649 bfd *abfd,
2650 void *ptr,
2651 unsigned long size));
e9614321
SC
2652#define bfd_read_minisymbols(b, d, m, s) \
2653 BFD_SEND (b, _read_minisymbols, (b, d, m, s))
2654 long (*_read_minisymbols) PARAMS ((bfd *, boolean, PTR *,
2655 unsigned int *));
2656#define bfd_minisymbol_to_symbol(b, d, m, f) \
2657 BFD_SEND (b, _minisymbol_to_symbol, (b, d, m, f))
2658 asymbol *(*_minisymbol_to_symbol) PARAMS ((bfd *, boolean, const PTR,
2659 asymbol *));
fdcb0453 2660
6812b607
ILT
2661 /* Routines for relocs. */
2662#define BFD_JUMP_TABLE_RELOCS(NAME)\
2663CAT(NAME,_get_reloc_upper_bound),\
2664CAT(NAME,_canonicalize_reloc),\
2665CAT(NAME,_bfd_reloc_type_lookup)
2666 long (*_get_reloc_upper_bound) PARAMS ((bfd *, sec_ptr));
2667 long (*_bfd_canonicalize_reloc) PARAMS ((bfd *, sec_ptr, arelent **,
2668 struct symbol_cache_entry **));
2669 /* See documentation on reloc types. */
5dc8db48 2670 reloc_howto_type *
6812b607
ILT
2671 (*reloc_type_lookup) PARAMS ((bfd *abfd,
2672 bfd_reloc_code_real_type code));
fdcb0453 2673
6812b607
ILT
2674 /* Routines used when writing an object file. */
2675#define BFD_JUMP_TABLE_WRITE(NAME)\
2676CAT(NAME,_set_arch_mach),\
2677CAT(NAME,_set_section_contents)
2678 boolean (*_bfd_set_arch_mach) PARAMS ((bfd *, enum bfd_architecture,
2679 unsigned long));
2680 boolean (*_bfd_set_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2681 file_ptr, bfd_size_type));
fdcb0453 2682
6812b607
ILT
2683 /* Routines used by the linker. */
2684#define BFD_JUMP_TABLE_LINK(NAME)\
2685CAT(NAME,_sizeof_headers),\
2686CAT(NAME,_bfd_get_relocated_section_contents),\
2687CAT(NAME,_bfd_relax_section),\
2688CAT(NAME,_bfd_link_hash_table_create),\
2689CAT(NAME,_bfd_link_add_symbols),\
6167a840
JL
2690CAT(NAME,_bfd_final_link),\
2691CAT(NAME,_bfd_link_split_section)
6812b607 2692 int (*_bfd_sizeof_headers) PARAMS ((bfd *, boolean));
fdcb0453 2693 bfd_byte * (*_bfd_get_relocated_section_contents) PARAMS ((bfd *,
4c3721d5
ILT
2694 struct bfd_link_info *, struct bfd_link_order *,
2695 bfd_byte *data, boolean relocateable,
2696 struct symbol_cache_entry **));
fdcb0453
KR
2697
2698 boolean (*_bfd_relax_section) PARAMS ((bfd *, struct sec *,
326e32d7 2699 struct bfd_link_info *, boolean *again));
fdcb0453 2700
ad46bd1d
ILT
2701 /* Create a hash table for the linker. Different backends store
2702 different information in this table. */
2703 struct bfd_link_hash_table *(*_bfd_link_hash_table_create) PARAMS ((bfd *));
2704
2705 /* Add symbols from this object file into the hash table. */
2706 boolean (*_bfd_link_add_symbols) PARAMS ((bfd *, struct bfd_link_info *));
2707
2708 /* Do a link based on the link_order structures attached to each
2709 section of the BFD. */
2710 boolean (*_bfd_final_link) PARAMS ((bfd *, struct bfd_link_info *));
2711
6167a840
JL
2712 /* Should this section be split up into smaller pieces during linking. */
2713 boolean (*_bfd_link_split_section) PARAMS ((bfd *, struct sec *));
2714
ad46bd1d
ILT
2715 /* Routines to handle dynamic symbols and relocs. */
2716#define BFD_JUMP_TABLE_DYNAMIC(NAME)\
2717CAT(NAME,_get_dynamic_symtab_upper_bound),\
2718CAT(NAME,_canonicalize_dynamic_symtab),\
2719CAT(NAME,_get_dynamic_reloc_upper_bound),\
2720CAT(NAME,_canonicalize_dynamic_reloc)
2721 /* Get the amount of memory required to hold the dynamic symbols. */
2722 long (*_bfd_get_dynamic_symtab_upper_bound) PARAMS ((bfd *));
2723 /* Read in the dynamic symbols. */
2724 long (*_bfd_canonicalize_dynamic_symtab)
2725 PARAMS ((bfd *, struct symbol_cache_entry **));
2726 /* Get the amount of memory required to hold the dynamic relocs. */
2727 long (*_bfd_get_dynamic_reloc_upper_bound) PARAMS ((bfd *));
2728 /* Read in the dynamic relocs. */
2729 long (*_bfd_canonicalize_dynamic_reloc)
2730 PARAMS ((bfd *, arelent **, struct symbol_cache_entry **));
4c3721d5 2731
fdcb0453
KR
2732 PTR backend_data;
2733} bfd_target;
2f3508ad 2734const bfd_target *
c188b0be 2735bfd_find_target PARAMS ((CONST char *target_name, bfd *abfd));
fdcb0453 2736
2f3508ad 2737const char **
fdcb0453
KR
2738bfd_target_list PARAMS ((void));
2739
2740boolean
2741bfd_check_format PARAMS ((bfd *abfd, bfd_format format));
2742
aabda2da
DM
2743boolean
2744bfd_check_format_matches PARAMS ((bfd *abfd, bfd_format format, char ***matching));
3b31740c 2745
fdcb0453 2746boolean
c188b0be 2747bfd_set_format PARAMS ((bfd *abfd, bfd_format format));
fdcb0453
KR
2748
2749CONST char *
c188b0be 2750bfd_format_string PARAMS ((bfd_format format));
fdcb0453 2751
815179af
ILT
2752#ifdef __cplusplus
2753}
2754#endif
fdcb0453 2755#endif
This page took 0.292891 seconds and 4 git commands to generate.