* gdb.base/scope.exp: Use gdb_test.
[deliverable/binutils-gdb.git] / bfd / bfd-in2.h
CommitLineData
fdcb0453 1/* Main header file for the bfd library -- portable access to object files.
56f3b62c 2 Copyright 1990, 91, 92, 93, 94, 95, 96, 1997 Free Software Foundation, Inc.
fdcb0453
KR
3 Contributed by Cygnus Support.
4
b66b07a2
KR
5** NOTE: bfd.h and bfd-in2.h are GENERATED files. Don't change them;
6** instead, change bfd-in.h or the other BFD source files processed to
7** generate these files.
8
fdcb0453
KR
9This file is part of BFD, the Binary File Descriptor library.
10
11This program is free software; you can redistribute it and/or modify
12it under the terms of the GNU General Public License as published by
13the Free Software Foundation; either version 2 of the License, or
14(at your option) any later version.
15
16This program is distributed in the hope that it will be useful,
17but WITHOUT ANY WARRANTY; without even the implied warranty of
18MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19GNU General Public License for more details.
20
21You should have received a copy of the GNU General Public License
22along with this program; if not, write to the Free Software
e9614321 23Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
fdcb0453
KR
24
25/* bfd.h -- The only header file required by users of the bfd library
26
27The bfd.h file is generated from bfd-in.h and various .c files; if you
28change it, your changes will probably be lost.
29
30All the prototypes and definitions following the comment "THE FOLLOWING
31IS EXTRACTED FROM THE SOURCE" are extracted from the source files for
32BFD. If you change it, someone oneday will extract it from the source
33again, and your changes will be lost. To save yourself from this bind,
34change the definitions in the source in the bfd directory. Type "make
35docs" and then "make headers" in that directory, and magically this file
36will change to reflect your changes.
37
38If you don't have the tools to perform the extraction, then you are
39safe from someone on your system trampling over your header files.
40You should still maintain the equivalence between the source and this
41file though; every change you make to the .c file should be reflected
42here. */
43
44#ifndef __BFD_H_SEEN__
45#define __BFD_H_SEEN__
46
815179af
ILT
47#ifdef __cplusplus
48extern "C" {
49#endif
50
fdcb0453
KR
51#include "ansidecl.h"
52#include "obstack.h"
53
5a66538b 54/* These two lines get substitutions done by commands in Makefile.in. */
b7577823 55#define BFD_VERSION "@VERSION@"
f4e14cb9 56#define BFD_ARCH_SIZE @wordsize@
b7577823 57#define BFD_HOST_64BIT_LONG @BFD_HOST_64BIT_LONG@
f4e14cb9
ILT
58#if @BFD_HOST_64_BIT_DEFINED@
59#define BFD_HOST_64_BIT @BFD_HOST_64_BIT@
60#define BFD_HOST_U_64_BIT @BFD_HOST_U_64_BIT@
61#endif
fdcb0453
KR
62
63#if BFD_ARCH_SIZE >= 64
64#define BFD64
65#endif
66
c3e964b9
FF
67#ifndef INLINE
68#if __GNUC__ >= 2
69#define INLINE __inline__
70#else
71#define INLINE
72#endif
73#endif
74
fdcb0453
KR
75/* forward declaration */
76typedef struct _bfd bfd;
77
78/* To squelch erroneous compiler warnings ("illegal pointer
79 combination") from the SVR3 compiler, we would like to typedef
80 boolean to int (it doesn't like functions which return boolean.
81 Making sure they are never implicitly declared to return int
82 doesn't seem to help). But this file is not configured based on
83 the host. */
84/* General rules: functions which are boolean return true on success
85 and false on failure (unless they're a predicate). -- bfd.doc */
86/* I'm sure this is going to break something and someone is going to
87 force me to change it. */
88/* typedef enum boolean {false, true} boolean; */
89/* Yup, SVR4 has a "typedef enum boolean" in <sys/types.h> -fnf */
442da995 90/* It gets worse if the host also defines a true/false enum... -sts */
3b1f83ad
JL
91/* And even worse if your compiler has built-in boolean types... -law */
92#if defined (__GNUG__) && (__GNUC_MINOR__ > 5)
93#define TRUE_FALSE_ALREADY_DEFINED
94#endif
c53fac12
ILT
95#ifdef MPW
96/* Pre-emptive strike - get the file with the enum. */
97#include <Types.h>
98#define TRUE_FALSE_ALREADY_DEFINED
99#endif /* MPW */
442da995 100#ifndef TRUE_FALSE_ALREADY_DEFINED
fdcb0453 101typedef enum bfd_boolean {false, true} boolean;
442da995
SS
102#define BFD_TRUE_FALSE
103#else
e0151f38
SS
104/* Use enum names that will appear nowhere else. */
105typedef enum bfd_boolean {bfd_fffalse, bfd_tttrue} boolean;
442da995 106#endif
fdcb0453
KR
107
108/* A pointer to a position in a file. */
109/* FIXME: This should be using off_t from <sys/types.h>.
110 For now, try to avoid breaking stuff by not including <sys/types.h> here.
111 This will break on systems with 64-bit file offsets (e.g. 4.4BSD).
112 Probably the best long-term answer is to avoid using file_ptr AND off_t
113 in this header file, and to handle this in the BFD implementation
114 rather than in its interface. */
115/* typedef off_t file_ptr; */
116typedef long int file_ptr;
117
0822b56d 118/* Support for different sizes of target format ints and addresses.
b7577823
ILT
119 If the type `long' is at least 64 bits, BFD_HOST_64BIT_LONG will be
120 set to 1 above. Otherwise, if gcc is being used, this code will
f4e14cb9
ILT
121 use gcc's "long long" type. Otherwise, BFD_HOST_64_BIT must be
122 defined above. */
fdcb0453 123
b7577823 124#ifdef BFD64
fdcb0453 125
b7577823
ILT
126#ifndef BFD_HOST_64_BIT
127#if BFD_HOST_64BIT_LONG
128#define BFD_HOST_64_BIT long
f4e14cb9 129#define BFD_HOST_U_64_BIT unsigned long
b7577823
ILT
130#else
131#ifdef __GNUC__
78c3dc5c 132#define BFD_HOST_64_BIT long long
f4e14cb9 133#define BFD_HOST_U_64_BIT unsigned long long
c3d8e071
ILT
134#else /* ! defined (__GNUC__) */
135 #error No 64 bit integer type available
136#endif /* ! defined (__GNUC__) */
b7577823
ILT
137#endif /* ! BFD_HOST_64BIT_LONG */
138#endif /* ! defined (BFD_HOST_64_BIT) */
fa5ba217 139
f4e14cb9 140typedef BFD_HOST_U_64_BIT bfd_vma;
78c3dc5c 141typedef BFD_HOST_64_BIT bfd_signed_vma;
f4e14cb9
ILT
142typedef BFD_HOST_U_64_BIT bfd_size_type;
143typedef BFD_HOST_U_64_BIT symvalue;
b7577823 144
7e7fb4a8 145#ifndef fprintf_vma
b7577823
ILT
146#if BFD_HOST_64BIT_LONG
147#define sprintf_vma(s,x) sprintf (s, "%016lx", x)
148#define fprintf_vma(f,x) fprintf (f, "%016lx", x)
149#else
150#define _bfd_int64_low(x) ((unsigned long) (((x) & 0xffffffff)))
151#define _bfd_int64_high(x) ((unsigned long) (((x) >> 32) & 0xffffffff))
fdcb0453 152#define fprintf_vma(s,x) \
b7577823 153 fprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
fa5ba217 154#define sprintf_vma(s,x) \
b7577823 155 sprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
7e7fb4a8 156#endif
b7577823
ILT
157#endif
158
fdcb0453
KR
159#else /* not BFD64 */
160
161/* Represent a target address. Also used as a generic unsigned type
162 which is guaranteed to be big enough to hold any arithmetic types
163 we need to deal with. */
164typedef unsigned long bfd_vma;
165
166/* A generic signed type which is guaranteed to be big enough to hold any
167 arithmetic types we need to deal with. Can be assumed to be compatible
168 with bfd_vma in the same way that signed and unsigned ints are compatible
169 (as parameters, in assignment, etc). */
170typedef long bfd_signed_vma;
171
172typedef unsigned long symvalue;
173typedef unsigned long bfd_size_type;
174
175/* Print a bfd_vma x on stream s. */
176#define fprintf_vma(s,x) fprintf(s, "%08lx", x)
fa5ba217 177#define sprintf_vma(s,x) sprintf(s, "%08lx", x)
fdcb0453
KR
178#endif /* not BFD64 */
179#define printf_vma(x) fprintf_vma(stdout,x)
180
181typedef unsigned int flagword; /* 32 bits of flags */
5dc8db48 182typedef unsigned char bfd_byte;
fdcb0453
KR
183\f
184/** File formats */
185
186typedef enum bfd_format {
187 bfd_unknown = 0, /* file format is unknown */
188 bfd_object, /* linker/assember/compiler output */
189 bfd_archive, /* object archive file */
190 bfd_core, /* core dump */
191 bfd_type_end} /* marks the end; don't use it! */
192 bfd_format;
193
9e461dac
JK
194/* Values that may appear in the flags field of a BFD. These also
195 appear in the object_flags field of the bfd_target structure, where
196 they indicate the set of flags used by that backend (not all flags
197 are meaningful for all object file formats) (FIXME: at the moment,
198 the object_flags values have mostly just been copied from backend
199 to another, and are not necessarily correct). */
200
201/* No flags. */
2055bf85 202#define BFD_NO_FLAGS 0x00
9e461dac
JK
203
204/* BFD contains relocation entries. */
fdcb0453 205#define HAS_RELOC 0x01
9e461dac
JK
206
207/* BFD is directly executable. */
fdcb0453 208#define EXEC_P 0x02
9e461dac
JK
209
210/* BFD has line number information (basically used for F_LNNO in a
211 COFF header). */
fdcb0453 212#define HAS_LINENO 0x04
9e461dac
JK
213
214/* BFD has debugging information. */
fdcb0453 215#define HAS_DEBUG 0x08
9e461dac
JK
216
217/* BFD has symbols. */
fdcb0453 218#define HAS_SYMS 0x10
9e461dac
JK
219
220/* BFD has local symbols (basically used for F_LSYMS in a COFF
221 header). */
fdcb0453 222#define HAS_LOCALS 0x20
9e461dac
JK
223
224/* BFD is a dynamic object. */
fdcb0453 225#define DYNAMIC 0x40
9e461dac
JK
226
227/* Text section is write protected (if D_PAGED is not set, this is
228 like an a.out NMAGIC file) (the linker sets this by default, but
229 clears it for -r or -N). */
fdcb0453 230#define WP_TEXT 0x80
9e461dac
JK
231
232/* BFD is dynamically paged (this is like an a.out ZMAGIC file) (the
233 linker sets this by default, but clears it for -r or -n or -N). */
fdcb0453 234#define D_PAGED 0x100
9e461dac
JK
235
236/* BFD is relaxable (this means that bfd_relax_section may be able to
0822b56d
ILT
237 do something) (sometimes bfd_relax_section can do something even if
238 this is not set). */
fdcb0453 239#define BFD_IS_RELAXABLE 0x200
a7ff9b80
ILT
240
241/* This may be set before writing out a BFD to request using a
242 traditional format. For example, this is used to request that when
243 writing out an a.out object the symbols not be hashed to eliminate
244 duplicates. */
245#define BFD_TRADITIONAL_FORMAT 0x400
64d5f5d0
ILT
246
247/* This flag indicates that the BFD contents are actually cached in
248 memory. If this is set, iostream points to a bfd_in_memory struct. */
249#define BFD_IN_MEMORY 0x800
fdcb0453
KR
250\f
251/* symbols and relocation */
252
0f8f509c 253/* A count of carsyms (canonical archive symbols). */
fdcb0453
KR
254typedef unsigned long symindex;
255
5dc8db48
KR
256/* How to perform a relocation. */
257typedef const struct reloc_howto_struct reloc_howto_type;
258
fdcb0453
KR
259#define BFD_NO_MORE_SYMBOLS ((symindex) ~0)
260
0f8f509c
DM
261/* General purpose part of a symbol X;
262 target specific parts are in libcoff.h, libaout.h, etc. */
fdcb0453
KR
263
264#define bfd_get_section(x) ((x)->section)
265#define bfd_get_output_section(x) ((x)->section->output_section)
266#define bfd_set_section(x,y) ((x)->section) = (y)
267#define bfd_asymbol_base(x) ((x)->section->vma)
268#define bfd_asymbol_value(x) (bfd_asymbol_base(x) + (x)->value)
269#define bfd_asymbol_name(x) ((x)->name)
270/*Perhaps future: #define bfd_asymbol_bfd(x) ((x)->section->owner)*/
271#define bfd_asymbol_bfd(x) ((x)->the_bfd)
272#define bfd_asymbol_flavour(x) (bfd_asymbol_bfd(x)->xvec->flavour)
273
0f8f509c 274/* A canonical archive symbol. */
fdcb0453
KR
275/* This is a type pun with struct ranlib on purpose! */
276typedef struct carsym {
277 char *name;
278 file_ptr file_offset; /* look here to find the file */
279} carsym; /* to make these you call a carsymogen */
280
281
0f8f509c
DM
282/* Used in generating armaps (archive tables of contents).
283 Perhaps just a forward definition would do? */
fdcb0453
KR
284struct orl { /* output ranlib */
285 char **name; /* symbol name */
286 file_ptr pos; /* bfd* or file position */
287 int namidx; /* index into string table */
288};
fdcb0453
KR
289\f
290
291/* Linenumber stuff */
292typedef struct lineno_cache_entry {
293 unsigned int line_number; /* Linenumber from start of function*/
294 union {
0f8f509c 295 struct symbol_cache_entry *sym; /* Function name */
fdcb0453
KR
296 unsigned long offset; /* Offset into section */
297 } u;
298} alent;
299\f
300/* object and core file sections */
301
fdcb0453
KR
302#define align_power(addr, align) \
303 ( ((addr) + ((1<<(align))-1)) & (-1 << (align)))
304
305typedef struct sec *sec_ptr;
306
307#define bfd_get_section_name(bfd, ptr) ((ptr)->name + 0)
308#define bfd_get_section_vma(bfd, ptr) ((ptr)->vma + 0)
309#define bfd_get_section_alignment(bfd, ptr) ((ptr)->alignment_power + 0)
310#define bfd_section_name(bfd, ptr) ((ptr)->name)
311#define bfd_section_size(bfd, ptr) (bfd_get_section_size_before_reloc(ptr))
312#define bfd_section_vma(bfd, ptr) ((ptr)->vma)
313#define bfd_section_alignment(bfd, ptr) ((ptr)->alignment_power)
314#define bfd_get_section_flags(bfd, ptr) ((ptr)->flags + 0)
315#define bfd_get_section_userdata(bfd, ptr) ((ptr)->userdata)
316
317#define bfd_is_com_section(ptr) (((ptr)->flags & SEC_IS_COMMON) != 0)
318
e0151f38 319#define bfd_set_section_vma(bfd, ptr, val) (((ptr)->vma = (ptr)->lma= (val)), ((ptr)->user_set_vma = (boolean)true), true)
6167a840
JL
320#define bfd_set_section_alignment(bfd, ptr, val) (((ptr)->alignment_power = (val)),true)
321#define bfd_set_section_userdata(bfd, ptr, val) (((ptr)->userdata = (val)),true)
fdcb0453
KR
322
323typedef struct stat stat_type;
324\f
fdcb0453
KR
325typedef enum bfd_print_symbol
326{
327 bfd_print_symbol_name,
328 bfd_print_symbol_more,
329 bfd_print_symbol_all
330} bfd_print_symbol_type;
331
fdcb0453
KR
332/* Information about a symbol that nm needs. */
333
334typedef struct _symbol_info
335{
336 symvalue value;
0f8f509c 337 char type;
fdcb0453 338 CONST char *name; /* Symbol name. */
64d5f5d0
ILT
339 unsigned char stab_type; /* Stab type. */
340 char stab_other; /* Stab other. */
341 short stab_desc; /* Stab desc. */
342 CONST char *stab_name; /* String for stab type. */
fdcb0453 343} symbol_info;
7ec49f91
ILT
344
345/* Get the name of a stabs type code. */
346
347extern const char *bfd_get_stab_name PARAMS ((int));
fdcb0453 348\f
4c3721d5
ILT
349/* Hash table routines. There is no way to free up a hash table. */
350
351/* An element in the hash table. Most uses will actually use a larger
352 structure, and an instance of this will be the first field. */
353
354struct bfd_hash_entry
355{
356 /* Next entry for this hash code. */
357 struct bfd_hash_entry *next;
358 /* String being hashed. */
359 const char *string;
360 /* Hash code. This is the full hash code, not the index into the
361 table. */
362 unsigned long hash;
363};
364
365/* A hash table. */
366
367struct bfd_hash_table
368{
369 /* The hash array. */
370 struct bfd_hash_entry **table;
371 /* The number of slots in the hash table. */
372 unsigned int size;
373 /* A function used to create new elements in the hash table. The
374 first entry is itself a pointer to an element. When this
375 function is first invoked, this pointer will be NULL. However,
376 having the pointer permits a hierarchy of method functions to be
377 built each of which calls the function in the superclass. Thus
378 each function should be written to allocate a new block of memory
379 only if the argument is NULL. */
380 struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *,
381 struct bfd_hash_table *,
382 const char *));
383 /* An obstack for this hash table. */
384 struct obstack memory;
385};
386
387/* Initialize a hash table. */
388extern boolean bfd_hash_table_init
389 PARAMS ((struct bfd_hash_table *,
390 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
391 struct bfd_hash_table *,
392 const char *)));
393
394/* Initialize a hash table specifying a size. */
395extern boolean bfd_hash_table_init_n
396 PARAMS ((struct bfd_hash_table *,
397 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
398 struct bfd_hash_table *,
399 const char *),
400 unsigned int size));
401
402/* Free up a hash table. */
403extern void bfd_hash_table_free PARAMS ((struct bfd_hash_table *));
404
405/* Look up a string in a hash table. If CREATE is true, a new entry
406 will be created for this string if one does not already exist. The
407 COPY argument must be true if this routine should copy the string
408 into newly allocated memory when adding an entry. */
409extern struct bfd_hash_entry *bfd_hash_lookup
410 PARAMS ((struct bfd_hash_table *, const char *, boolean create,
411 boolean copy));
412
b7577823
ILT
413/* Replace an entry in a hash table. */
414extern void bfd_hash_replace
415 PARAMS ((struct bfd_hash_table *, struct bfd_hash_entry *old,
416 struct bfd_hash_entry *nw));
417
4c3721d5
ILT
418/* Base method for creating a hash table entry. */
419extern struct bfd_hash_entry *bfd_hash_newfunc
420 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *,
421 const char *));
422
423/* Grab some space for a hash table entry. */
966e0a16
ILT
424extern PTR bfd_hash_allocate PARAMS ((struct bfd_hash_table *,
425 unsigned int));
4c3721d5
ILT
426
427/* Traverse a hash table in a random order, calling a function on each
428 element. If the function returns false, the traversal stops. The
429 INFO argument is passed to the function. */
430extern void bfd_hash_traverse PARAMS ((struct bfd_hash_table *,
431 boolean (*) (struct bfd_hash_entry *,
432 PTR),
433 PTR info));
434\f
c3e964b9
FF
435/* Semi-portable string concatenation in cpp.
436 The CAT4 hack is to avoid a problem with some strict ANSI C preprocessors.
437 The problem is, "32_" is not a valid preprocessing token, and we don't
438 want extra underscores (e.g., "nlm_32_"). The XCAT2 macro will cause the
439 inner CAT macros to be evaluated first, producing still-valid pp-tokens.
440 Then the final concatenation can be done. (Sigh.) */
fdcb0453 441#ifndef CAT
c3e964b9
FF
442#ifdef SABER
443#define CAT(a,b) a##b
444#define CAT3(a,b,c) a##b##c
445#define CAT4(a,b,c,d) a##b##c##d
446#else
442da995 447#if defined(__STDC__) || defined(ALMOST_STDC)
fdcb0453
KR
448#define CAT(a,b) a##b
449#define CAT3(a,b,c) a##b##c
c3e964b9
FF
450#define XCAT2(a,b) CAT(a,b)
451#define CAT4(a,b,c,d) XCAT2(CAT(a,b),CAT(c,d))
fdcb0453
KR
452#else
453#define CAT(a,b) a/**/b
454#define CAT3(a,b,c) a/**/b/**/c
c3e964b9
FF
455#define CAT4(a,b,c,d) a/**/b/**/c/**/d
456#endif
fdcb0453
KR
457#endif
458#endif
459
fdcb0453 460#define COFF_SWAP_TABLE (PTR) &bfd_coff_std_swap_table
fdcb0453
KR
461\f
462/* User program access to BFD facilities */
463
0822b56d
ILT
464/* Direct I/O routines, for programs which know more about the object
465 file than BFD does. Use higher level routines if possible. */
466
467extern bfd_size_type bfd_read
468 PARAMS ((PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
469extern bfd_size_type bfd_write
470 PARAMS ((const PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
d80ebaac 471extern int bfd_seek PARAMS ((bfd *abfd, file_ptr fp, int direction));
0822b56d
ILT
472extern long bfd_tell PARAMS ((bfd *abfd));
473extern int bfd_flush PARAMS ((bfd *abfd));
474extern int bfd_stat PARAMS ((bfd *abfd, struct stat *));
475
018dafca 476
fdcb0453
KR
477/* Cast from const char * to char * so that caller can assign to
478 a char * without a warning. */
479#define bfd_get_filename(abfd) ((char *) (abfd)->filename)
0a197a96 480#define bfd_get_cacheable(abfd) ((abfd)->cacheable)
fdcb0453
KR
481#define bfd_get_format(abfd) ((abfd)->format)
482#define bfd_get_target(abfd) ((abfd)->xvec->name)
9e461dac 483#define bfd_get_flavour(abfd) ((abfd)->xvec->flavour)
64d5f5d0
ILT
484#define bfd_big_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_BIG)
485#define bfd_little_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_LITTLE)
486#define bfd_header_big_endian(abfd) \
487 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_BIG)
488#define bfd_header_little_endian(abfd) \
489 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_LITTLE)
fdcb0453
KR
490#define bfd_get_file_flags(abfd) ((abfd)->flags)
491#define bfd_applicable_file_flags(abfd) ((abfd)->xvec->object_flags)
492#define bfd_applicable_section_flags(abfd) ((abfd)->xvec->section_flags)
493#define bfd_my_archive(abfd) ((abfd)->my_archive)
494#define bfd_has_map(abfd) ((abfd)->has_armap)
fdcb0453
KR
495
496#define bfd_valid_reloc_types(abfd) ((abfd)->xvec->valid_reloc_types)
497#define bfd_usrdata(abfd) ((abfd)->usrdata)
498
499#define bfd_get_start_address(abfd) ((abfd)->start_address)
500#define bfd_get_symcount(abfd) ((abfd)->symcount)
501#define bfd_get_outsymbols(abfd) ((abfd)->outsymbols)
502#define bfd_count_sections(abfd) ((abfd)->section_count)
fdcb0453
KR
503
504#define bfd_get_symbol_leading_char(abfd) ((abfd)->xvec->symbol_leading_char)
505
e0151f38 506#define bfd_set_cacheable(abfd,bool) (((abfd)->cacheable = (boolean)(bool)), true)
0a197a96 507
ae0a6bea
ILT
508extern boolean bfd_record_phdr
509 PARAMS ((bfd *, unsigned long, boolean, flagword, boolean, bfd_vma,
510 boolean, boolean, unsigned int, struct sec **));
511
2b91cc45
SG
512/* Byte swapping routines. */
513
1a973af1
ILT
514bfd_vma bfd_getb64 PARAMS ((const unsigned char *));
515bfd_vma bfd_getl64 PARAMS ((const unsigned char *));
516bfd_signed_vma bfd_getb_signed_64 PARAMS ((const unsigned char *));
517bfd_signed_vma bfd_getl_signed_64 PARAMS ((const unsigned char *));
518bfd_vma bfd_getb32 PARAMS ((const unsigned char *));
519bfd_vma bfd_getl32 PARAMS ((const unsigned char *));
520bfd_signed_vma bfd_getb_signed_32 PARAMS ((const unsigned char *));
521bfd_signed_vma bfd_getl_signed_32 PARAMS ((const unsigned char *));
522bfd_vma bfd_getb16 PARAMS ((const unsigned char *));
523bfd_vma bfd_getl16 PARAMS ((const unsigned char *));
524bfd_signed_vma bfd_getb_signed_16 PARAMS ((const unsigned char *));
525bfd_signed_vma bfd_getl_signed_16 PARAMS ((const unsigned char *));
2b91cc45
SG
526void bfd_putb64 PARAMS ((bfd_vma, unsigned char *));
527void bfd_putl64 PARAMS ((bfd_vma, unsigned char *));
528void bfd_putb32 PARAMS ((bfd_vma, unsigned char *));
529void bfd_putl32 PARAMS ((bfd_vma, unsigned char *));
530void bfd_putb16 PARAMS ((bfd_vma, unsigned char *));
531void bfd_putl16 PARAMS ((bfd_vma, unsigned char *));
c16313f0
ILT
532\f
533/* Externally visible ECOFF routines. */
2b91cc45 534
442da995 535#if defined(__STDC__) || defined(ALMOST_STDC)
8d12f138
ILT
536struct ecoff_debug_info;
537struct ecoff_debug_swap;
538struct ecoff_extr;
539struct symbol_cache_entry;
7e7fb4a8 540struct bfd_link_info;
28a0c103 541struct bfd_link_hash_entry;
8d12f138 542#endif
c16313f0
ILT
543extern bfd_vma bfd_ecoff_get_gp_value PARAMS ((bfd * abfd));
544extern boolean bfd_ecoff_set_gp_value PARAMS ((bfd *abfd, bfd_vma gp_value));
545extern boolean bfd_ecoff_set_regmasks
546 PARAMS ((bfd *abfd, unsigned long gprmask, unsigned long fprmask,
547 unsigned long *cprmask));
7e7fb4a8 548extern PTR bfd_ecoff_debug_init
8d12f138 549 PARAMS ((bfd *output_bfd, struct ecoff_debug_info *output_debug,
7e7fb4a8
KR
550 const struct ecoff_debug_swap *output_swap,
551 struct bfd_link_info *));
552extern void bfd_ecoff_debug_free
553 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
554 const struct ecoff_debug_swap *output_swap,
555 struct bfd_link_info *));
556extern boolean bfd_ecoff_debug_accumulate
557 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
8d12f138
ILT
558 const struct ecoff_debug_swap *output_swap,
559 bfd *input_bfd, struct ecoff_debug_info *input_debug,
560 const struct ecoff_debug_swap *input_swap,
7e7fb4a8
KR
561 struct bfd_link_info *));
562extern boolean bfd_ecoff_debug_accumulate_other
563 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
564 const struct ecoff_debug_swap *output_swap, bfd *input_bfd,
565 struct bfd_link_info *));
8d12f138
ILT
566extern boolean bfd_ecoff_debug_externals
567 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
568 const struct ecoff_debug_swap *swap,
569 boolean relocateable,
570 boolean (*get_extr) (struct symbol_cache_entry *,
571 struct ecoff_extr *),
572 void (*set_index) (struct symbol_cache_entry *,
573 bfd_size_type)));
966e0a16
ILT
574extern boolean bfd_ecoff_debug_one_external
575 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
576 const struct ecoff_debug_swap *swap,
577 const char *name, struct ecoff_extr *esym));
8d12f138
ILT
578extern bfd_size_type bfd_ecoff_debug_size
579 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
580 const struct ecoff_debug_swap *swap));
581extern boolean bfd_ecoff_write_debug
582 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
583 const struct ecoff_debug_swap *swap, file_ptr where));
7e7fb4a8
KR
584extern boolean bfd_ecoff_write_accumulated_debug
585 PARAMS ((PTR handle, bfd *abfd, struct ecoff_debug_info *debug,
586 const struct ecoff_debug_swap *swap,
587 struct bfd_link_info *info, file_ptr where));
82b1edf7
KR
588extern boolean bfd_mips_ecoff_create_embedded_relocs
589 PARAMS ((bfd *, struct bfd_link_info *, struct sec *, struct sec *,
590 char **));
8d12f138 591
013dec1a
ILT
592/* Externally visible ELF routines. */
593
54406786 594struct bfd_link_needed_list
b176e1e9 595{
54406786 596 struct bfd_link_needed_list *next;
b176e1e9
ILT
597 bfd *by;
598 const char *name;
599};
54406786
ILT
600
601extern boolean bfd_elf32_record_link_assignment
602 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
603extern boolean bfd_elf64_record_link_assignment
604 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
605extern struct bfd_link_needed_list *bfd_elf_get_needed_list
b176e1e9 606 PARAMS ((bfd *, struct bfd_link_info *));
013dec1a 607extern boolean bfd_elf32_size_dynamic_sections
148437ec 608 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
db109ca2 609 const char * const *, struct bfd_link_info *, struct sec **));
013dec1a 610extern boolean bfd_elf64_size_dynamic_sections
148437ec 611 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
db109ca2 612 const char * const *, struct bfd_link_info *, struct sec **));
c1f84521 613extern void bfd_elf_set_dt_needed_name PARAMS ((bfd *, const char *));
871a3f3b 614extern const char *bfd_elf_get_dt_soname PARAMS ((bfd *));
013dec1a 615
a7ff9b80
ILT
616/* SunOS shared library support routines for the linker. */
617
28a0c103
ILT
618extern struct bfd_link_needed_list *bfd_sunos_get_needed_list
619 PARAMS ((bfd *, struct bfd_link_info *));
a7ff9b80
ILT
620extern boolean bfd_sunos_record_link_assignment
621 PARAMS ((bfd *, struct bfd_link_info *, const char *));
622extern boolean bfd_sunos_size_dynamic_sections
623 PARAMS ((bfd *, struct bfd_link_info *, struct sec **, struct sec **,
624 struct sec **));
625
04003b57
ILT
626/* Linux shared library support routines for the linker. */
627
7ec49f91
ILT
628extern boolean bfd_i386linux_size_dynamic_sections
629 PARAMS ((bfd *, struct bfd_link_info *));
630extern boolean bfd_m68klinux_size_dynamic_sections
04003b57
ILT
631 PARAMS ((bfd *, struct bfd_link_info *));
632
4fe6d901
KR
633/* mmap hacks */
634
635struct _bfd_window_internal;
636typedef struct _bfd_window_internal bfd_window_internal;
637
638typedef struct _bfd_window {
639 /* What the user asked for. */
640 PTR data;
641 bfd_size_type size;
642 /* The actual window used by BFD. Small user-requested read-only
643 regions sharing a page may share a single window into the object
644 file. Read-write versions shouldn't until I've fixed things to
645 keep track of which portions have been claimed by the
646 application; don't want to give the same region back when the
647 application wants two writable copies! */
648 struct _bfd_window_internal *i;
649} bfd_window;
650
092abcdf
ILT
651extern void bfd_init_window PARAMS ((bfd_window *));
652extern void bfd_free_window PARAMS ((bfd_window *));
653extern boolean bfd_get_file_window
0bb8ff19 654 PARAMS ((bfd *, file_ptr, bfd_size_type, bfd_window *, boolean));
4fe6d901 655
28a0c103
ILT
656/* XCOFF support routines for the linker. */
657
2d7de17d
ILT
658extern boolean bfd_xcoff_link_record_set
659 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
660 bfd_size_type));
28a0c103
ILT
661extern boolean bfd_xcoff_import_symbol
662 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
663 bfd_vma, const char *, const char *, const char *));
664extern boolean bfd_xcoff_export_symbol
665 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
666 boolean));
2d7de17d
ILT
667extern boolean bfd_xcoff_link_count_reloc
668 PARAMS ((bfd *, struct bfd_link_info *, const char *));
669extern boolean bfd_xcoff_record_link_assignment
670 PARAMS ((bfd *, struct bfd_link_info *, const char *));
28a0c103
ILT
671extern boolean bfd_xcoff_size_dynamic_sections
672 PARAMS ((bfd *, struct bfd_link_info *, const char *, const char *,
673 unsigned long, unsigned long, unsigned long, boolean,
4a4a66bd 674 int, boolean, boolean, struct sec **));
28a0c103 675
c3d8e071
ILT
676/* Externally visible COFF routines. */
677
678#if defined(__STDC__) || defined(ALMOST_STDC)
679struct internal_syment;
680union internal_auxent;
681#endif
682
683extern boolean bfd_coff_get_syment
684 PARAMS ((bfd *, struct symbol_cache_entry *, struct internal_syment *));
685extern boolean bfd_coff_get_auxent
686 PARAMS ((bfd *, struct symbol_cache_entry *, int, union internal_auxent *));
687
fdcb0453
KR
688/* And more from the source. */
689void
690bfd_init PARAMS ((void));
691
692bfd *
c188b0be 693bfd_openr PARAMS ((CONST char *filename, CONST char *target));
fdcb0453
KR
694
695bfd *
696bfd_fdopenr PARAMS ((CONST char *filename, CONST char *target, int fd));
697
8a51b06c
ILT
698bfd *
699bfd_openstreamr PARAMS (());
700
fdcb0453
KR
701bfd *
702bfd_openw PARAMS ((CONST char *filename, CONST char *target));
703
704boolean
c188b0be 705bfd_close PARAMS ((bfd *abfd));
fdcb0453
KR
706
707boolean
708bfd_close_all_done PARAMS ((bfd *));
709
710bfd_size_type
711bfd_alloc_size PARAMS ((bfd *abfd));
712
713bfd *
10bd43a8 714bfd_create PARAMS ((CONST char *filename, bfd *templ));
fdcb0453
KR
715
716
717 /* Byte swapping macros for user section data. */
718
719#define bfd_put_8(abfd, val, ptr) \
e2756048 720 (*((unsigned char *)(ptr)) = (unsigned char)(val))
fdcb0453
KR
721#define bfd_put_signed_8 \
722 bfd_put_8
723#define bfd_get_8(abfd, ptr) \
724 (*(unsigned char *)(ptr))
725#define bfd_get_signed_8(abfd, ptr) \
726 ((*(unsigned char *)(ptr) ^ 0x80) - 0x80)
727
728#define bfd_put_16(abfd, val, ptr) \
729 BFD_SEND(abfd, bfd_putx16, ((val),(ptr)))
730#define bfd_put_signed_16 \
731 bfd_put_16
732#define bfd_get_16(abfd, ptr) \
733 BFD_SEND(abfd, bfd_getx16, (ptr))
734#define bfd_get_signed_16(abfd, ptr) \
735 BFD_SEND (abfd, bfd_getx_signed_16, (ptr))
736
737#define bfd_put_32(abfd, val, ptr) \
738 BFD_SEND(abfd, bfd_putx32, ((val),(ptr)))
739#define bfd_put_signed_32 \
740 bfd_put_32
741#define bfd_get_32(abfd, ptr) \
742 BFD_SEND(abfd, bfd_getx32, (ptr))
743#define bfd_get_signed_32(abfd, ptr) \
744 BFD_SEND(abfd, bfd_getx_signed_32, (ptr))
745
746#define bfd_put_64(abfd, val, ptr) \
747 BFD_SEND(abfd, bfd_putx64, ((val), (ptr)))
748#define bfd_put_signed_64 \
749 bfd_put_64
750#define bfd_get_64(abfd, ptr) \
751 BFD_SEND(abfd, bfd_getx64, (ptr))
752#define bfd_get_signed_64(abfd, ptr) \
753 BFD_SEND(abfd, bfd_getx_signed_64, (ptr))
754
755
756 /* Byte swapping macros for file header data. */
757
758#define bfd_h_put_8(abfd, val, ptr) \
759 bfd_put_8 (abfd, val, ptr)
760#define bfd_h_put_signed_8(abfd, val, ptr) \
761 bfd_put_8 (abfd, val, ptr)
762#define bfd_h_get_8(abfd, ptr) \
763 bfd_get_8 (abfd, ptr)
764#define bfd_h_get_signed_8(abfd, ptr) \
765 bfd_get_signed_8 (abfd, ptr)
766
767#define bfd_h_put_16(abfd, val, ptr) \
768 BFD_SEND(abfd, bfd_h_putx16,(val,ptr))
769#define bfd_h_put_signed_16 \
770 bfd_h_put_16
771#define bfd_h_get_16(abfd, ptr) \
772 BFD_SEND(abfd, bfd_h_getx16,(ptr))
773#define bfd_h_get_signed_16(abfd, ptr) \
774 BFD_SEND(abfd, bfd_h_getx_signed_16, (ptr))
775
776#define bfd_h_put_32(abfd, val, ptr) \
777 BFD_SEND(abfd, bfd_h_putx32,(val,ptr))
778#define bfd_h_put_signed_32 \
779 bfd_h_put_32
780#define bfd_h_get_32(abfd, ptr) \
781 BFD_SEND(abfd, bfd_h_getx32,(ptr))
782#define bfd_h_get_signed_32(abfd, ptr) \
783 BFD_SEND(abfd, bfd_h_getx_signed_32, (ptr))
784
785#define bfd_h_put_64(abfd, val, ptr) \
786 BFD_SEND(abfd, bfd_h_putx64,(val, ptr))
787#define bfd_h_put_signed_64 \
788 bfd_h_put_64
789#define bfd_h_get_64(abfd, ptr) \
790 BFD_SEND(abfd, bfd_h_getx64,(ptr))
791#define bfd_h_get_signed_64(abfd, ptr) \
792 BFD_SEND(abfd, bfd_h_getx_signed_64, (ptr))
793
57a1867e 794typedef struct sec
fdcb0453 795{
c188b0be 796 /* The name of the section; the name isn't a copy, the pointer is
fdcb0453
KR
797 the same as that passed to bfd_make_section. */
798
799 CONST char *name;
800
c188b0be 801 /* Which section is it; 0..nth. */
fdcb0453 802
57a1867e 803 int index;
fdcb0453
KR
804
805 /* The next section in the list belonging to the BFD, or NULL. */
806
807 struct sec *next;
808
c188b0be 809 /* The field flags contains attributes of the section. Some
fdcb0453 810 flags are read in from the object file, and some are
57a1867e 811 synthesized from other information. */
fdcb0453
KR
812
813 flagword flags;
814
815#define SEC_NO_FLAGS 0x000
816
c188b0be
DM
817 /* Tells the OS to allocate space for this section when loading.
818 This is clear for a section containing debug information
fdcb0453 819 only. */
fdcb0453 820#define SEC_ALLOC 0x001
57a1867e 821
fdcb0453 822 /* Tells the OS to load the section from the file when loading.
c188b0be 823 This is clear for a .bss section. */
fdcb0453 824#define SEC_LOAD 0x002
ef758f3e 825
c188b0be
DM
826 /* The section contains data still to be relocated, so there is
827 some relocation information too. */
fdcb0453
KR
828#define SEC_RELOC 0x004
829
b2ae9efb 830#if 0 /* Obsolete ? */
fdcb0453 831#define SEC_BALIGN 0x008
b2ae9efb 832#endif
fdcb0453
KR
833
834 /* A signal to the OS that the section contains read only
835 data. */
836#define SEC_READONLY 0x010
837
838 /* The section contains code only. */
fdcb0453
KR
839#define SEC_CODE 0x020
840
841 /* The section contains data only. */
b2ae9efb 842#define SEC_DATA 0x040
fdcb0453
KR
843
844 /* The section will reside in ROM. */
fdcb0453
KR
845#define SEC_ROM 0x080
846
847 /* The section contains constructor information. This section
848 type is used by the linker to create lists of constructors and
849 destructors used by <<g++>>. When a back end sees a symbol
850 which should be used in a constructor list, it creates a new
c188b0be
DM
851 section for the type of name (e.g., <<__CTOR_LIST__>>), attaches
852 the symbol to it, and builds a relocation. To build the lists
bc750ff1 853 of constructors, all the linker has to do is catenate all the
c188b0be 854 sections called <<__CTOR_LIST__>> and relocate the data
fdcb0453
KR
855 contained within - exactly the operations it would peform on
856 standard data. */
fdcb0453
KR
857#define SEC_CONSTRUCTOR 0x100
858
859 /* The section is a constuctor, and should be placed at the
b2ae9efb 860 end of the text, data, or bss section(?). */
fdcb0453 861#define SEC_CONSTRUCTOR_TEXT 0x1100
fdcb0453 862#define SEC_CONSTRUCTOR_DATA 0x2100
fdcb0453
KR
863#define SEC_CONSTRUCTOR_BSS 0x3100
864
865 /* The section has contents - a data section could be
c188b0be 866 <<SEC_ALLOC>> | <<SEC_HAS_CONTENTS>>; a debug section could be
fdcb0453 867 <<SEC_HAS_CONTENTS>> */
fdcb0453
KR
868#define SEC_HAS_CONTENTS 0x200
869
c188b0be 870 /* An instruction to the linker to not output the section
c16313f0 871 even if it has information which would normally be written. */
fdcb0453
KR
872#define SEC_NEVER_LOAD 0x400
873
c16313f0
ILT
874 /* The section is a COFF shared library section. This flag is
875 only for the linker. If this type of section appears in
876 the input file, the linker must copy it to the output file
877 without changing the vma or size. FIXME: Although this
878 was originally intended to be general, it really is COFF
879 specific (and the flag was renamed to indicate this). It
880 might be cleaner to have some more general mechanism to
881 allow the back end to control what the linker does with
882 sections. */
883#define SEC_COFF_SHARED_LIBRARY 0x800
fdcb0453 884
5a28331f 885 /* The section contains common symbols (symbols may be defined
fdcb0453
KR
886 multiple times, the value of a symbol is the amount of
887 space it requires, and the largest symbol value is the one
b2ae9efb 888 used). Most targets have exactly one of these (which we
1fb83be6 889 translate to bfd_com_section_ptr), but ECOFF has two. */
fdcb0453
KR
890#define SEC_IS_COMMON 0x8000
891
9b3fa589
JK
892 /* The section contains only debugging information. For
893 example, this is set for ELF .debug and .stab sections.
894 strip tests this flag to see if a section can be
895 discarded. */
896#define SEC_DEBUGGING 0x10000
897
fdfe2d14
SS
898 /* The contents of this section are held in memory pointed to
899 by the contents field. This is checked by
900 bfd_get_section_contents, and the data is retrieved from
901 memory if appropriate. */
902#define SEC_IN_MEMORY 0x20000
903
83f4323e
MM
904 /* The contents of this section are to be excluded by the
905 linker for executable and shared objects unless those
906 objects are to be further relocated. */
907#define SEC_EXCLUDE 0x40000
908
909 /* The contents of this section are to be sorted by the
910 based on the address specified in the associated symbol
911 table. */
912#define SEC_SORT_ENTRIES 0x80000
913
5a28331f
ILT
914 /* When linking, duplicate sections of the same name should be
915 discarded, rather than being combined into a single section as
916 is usually done. This is similar to how common symbols are
917 handled. See SEC_LINK_DUPLICATES below. */
918#define SEC_LINK_ONCE 0x100000
919
920 /* If SEC_LINK_ONCE is set, this bitfield describes how the linker
921 should handle duplicate sections. */
922#define SEC_LINK_DUPLICATES 0x600000
923
924 /* This value for SEC_LINK_DUPLICATES means that duplicate
925 sections with the same name should simply be discarded. */
926#define SEC_LINK_DUPLICATES_DISCARD 0x0
927
928 /* This value for SEC_LINK_DUPLICATES means that the linker
929 should warn if there are any duplicate sections, although
930 it should still only link one copy. */
931#define SEC_LINK_DUPLICATES_ONE_ONLY 0x200000
932
933 /* This value for SEC_LINK_DUPLICATES means that the linker
934 should warn if any duplicate sections are a different size. */
935#define SEC_LINK_DUPLICATES_SAME_SIZE 0x400000
936
937 /* This value for SEC_LINK_DUPLICATES means that the linker
938 should warn if any duplicate sections contain different
939 contents. */
940#define SEC_LINK_DUPLICATES_SAME_CONTENTS 0x600000
941
ff12f303
ILT
942 /* This section was created by the linker as part of dynamic
943 relocation or other arcane processing. It is skipped when
944 going through the first-pass output, trusting that someone
945 else up the line will take care of it later. */
946#define SEC_LINKER_CREATED 0x800000
947
b2ae9efb
KR
948 /* End of section flags. */
949
ff0e4a93
ILT
950 /* Some internal packed boolean fields. */
951
952 /* See the vma field. */
953 unsigned int user_set_vma : 1;
954
955 /* Whether relocations have been processed. */
956 unsigned int reloc_done : 1;
957
958 /* A mark flag used by some of the linker backends. */
959 unsigned int linker_mark : 1;
960
961 /* End of internal packed boolean fields. */
962
fdcb0453 963 /* The virtual memory address of the section - where it will be
b2ae9efb
KR
964 at run time. The symbols are relocated against this. The
965 user_set_vma flag is maintained by bfd; if it's not set, the
966 backend can assign addresses (for example, in <<a.out>>, where
967 the default address for <<.data>> is dependent on the specific
968 target and various flags). */
ef758f3e 969
fdcb0453
KR
970 bfd_vma vma;
971
972 /* The load address of the section - where it would be in a
c188b0be 973 rom image; really only used for writing section header
b2ae9efb 974 information. */
ef758f3e 975
fdcb0453
KR
976 bfd_vma lma;
977
fdcb0453 978 /* The size of the section in bytes, as it will be output.
c188b0be 979 contains a value even if the section has no contents (e.g., the
fdcb0453
KR
980 size of <<.bss>>). This will be filled in after relocation */
981
57a1867e 982 bfd_size_type _cooked_size;
fdcb0453 983
c188b0be 984 /* The original size on disk of the section, in bytes. Normally this
fdcb0453
KR
985 value is the same as the size, but if some relaxing has
986 been done, then this value will be bigger. */
987
57a1867e 988 bfd_size_type _raw_size;
fdcb0453
KR
989
990 /* If this section is going to be output, then this value is the
991 offset into the output section of the first byte in the input
c188b0be 992 section. E.g., if this was going to start at the 100th byte in
fdcb0453
KR
993 the output section, this value would be 100. */
994
995 bfd_vma output_offset;
996
997 /* The output section through which to map on output. */
998
999 struct sec *output_section;
1000
c188b0be
DM
1001 /* The alignment requirement of the section, as an exponent of 2 -
1002 e.g., 3 aligns to 2^3 (or 8). */
fdcb0453
KR
1003
1004 unsigned int alignment_power;
1005
1006 /* If an input section, a pointer to a vector of relocation
1007 records for the data in this section. */
1008
1009 struct reloc_cache_entry *relocation;
1010
1011 /* If an output section, a pointer to a vector of pointers to
1012 relocation records for the data in this section. */
1013
1014 struct reloc_cache_entry **orelocation;
1015
1016 /* The number of relocation records in one of the above */
1017
1018 unsigned reloc_count;
1019
1020 /* Information below is back end specific - and not always used
ef758f3e 1021 or updated. */
fdcb0453 1022
ef758f3e 1023 /* File position of section data */
fdcb0453 1024
57a1867e
DM
1025 file_ptr filepos;
1026
fdcb0453
KR
1027 /* File position of relocation info */
1028
1029 file_ptr rel_filepos;
1030
1031 /* File position of line data */
1032
1033 file_ptr line_filepos;
1034
1035 /* Pointer to data for applications */
1036
1037 PTR userdata;
1038
fdfe2d14
SS
1039 /* If the SEC_IN_MEMORY flag is set, this points to the actual
1040 contents. */
1041 unsigned char *contents;
fdcb0453
KR
1042
1043 /* Attached line number information */
1044
1045 alent *lineno;
57a1867e 1046
fdcb0453
KR
1047 /* Number of line number records */
1048
1049 unsigned int lineno_count;
1050
1051 /* When a section is being output, this value changes as more
1052 linenumbers are written out */
1053
1054 file_ptr moving_line_filepos;
1055
c188b0be 1056 /* What the section number is in the target world */
fdcb0453
KR
1057
1058 int target_index;
1059
1060 PTR used_by_bfd;
1061
1062 /* If this is a constructor section then here is a list of the
1063 relocations created to relocate items within it. */
1064
1065 struct relent_chain *constructor_chain;
1066
1067 /* The BFD which owns the section. */
1068
1069 bfd *owner;
1070
fdcb0453 1071 /* A symbol which points at this section only */
57a1867e 1072 struct symbol_cache_entry *symbol;
fdcb0453 1073 struct symbol_cache_entry **symbol_ptr_ptr;
ef758f3e 1074
4c3721d5
ILT
1075 struct bfd_link_order *link_order_head;
1076 struct bfd_link_order *link_order_tail;
fdcb0453
KR
1077} asection ;
1078
b2ae9efb
KR
1079 /* These sections are global, and are managed by BFD. The application
1080 and target back end are not permitted to change the values in
1fb83be6
KR
1081 these sections. New code should use the section_ptr macros rather
1082 than referring directly to the const sections. The const sections
1083 may eventually vanish. */
fdcb0453
KR
1084#define BFD_ABS_SECTION_NAME "*ABS*"
1085#define BFD_UND_SECTION_NAME "*UND*"
1086#define BFD_COM_SECTION_NAME "*COM*"
1087#define BFD_IND_SECTION_NAME "*IND*"
1088
1089 /* the absolute section */
1fb83be6
KR
1090extern const asection bfd_abs_section;
1091#define bfd_abs_section_ptr ((asection *) &bfd_abs_section)
1092#define bfd_is_abs_section(sec) ((sec) == bfd_abs_section_ptr)
fdcb0453 1093 /* Pointer to the undefined section */
1fb83be6
KR
1094extern const asection bfd_und_section;
1095#define bfd_und_section_ptr ((asection *) &bfd_und_section)
1096#define bfd_is_und_section(sec) ((sec) == bfd_und_section_ptr)
fdcb0453 1097 /* Pointer to the common section */
1fb83be6
KR
1098extern const asection bfd_com_section;
1099#define bfd_com_section_ptr ((asection *) &bfd_com_section)
fdcb0453 1100 /* Pointer to the indirect section */
1fb83be6
KR
1101extern const asection bfd_ind_section;
1102#define bfd_ind_section_ptr ((asection *) &bfd_ind_section)
1103#define bfd_is_ind_section(sec) ((sec) == bfd_ind_section_ptr)
1104
1105extern const struct symbol_cache_entry * const bfd_abs_symbol;
1106extern const struct symbol_cache_entry * const bfd_com_symbol;
1107extern const struct symbol_cache_entry * const bfd_und_symbol;
1108extern const struct symbol_cache_entry * const bfd_ind_symbol;
fdcb0453
KR
1109#define bfd_get_section_size_before_reloc(section) \
1110 (section->reloc_done ? (abort(),1): (section)->_raw_size)
1111#define bfd_get_section_size_after_reloc(section) \
1112 ((section->reloc_done) ? (section)->_cooked_size: (abort(),1))
1113asection *
1114bfd_get_section_by_name PARAMS ((bfd *abfd, CONST char *name));
1115
1116asection *
c188b0be 1117bfd_make_section_old_way PARAMS ((bfd *abfd, CONST char *name));
fdcb0453 1118
9b3fa589 1119asection *
c188b0be 1120bfd_make_section_anyway PARAMS ((bfd *abfd, CONST char *name));
9b3fa589
JK
1121
1122asection *
fdcb0453
KR
1123bfd_make_section PARAMS ((bfd *, CONST char *name));
1124
1125boolean
c188b0be 1126bfd_set_section_flags PARAMS ((bfd *abfd, asection *sec, flagword flags));
fdcb0453
KR
1127
1128void
1129bfd_map_over_sections PARAMS ((bfd *abfd,
1130 void (*func)(bfd *abfd,
1131 asection *sect,
1132 PTR obj),
1133 PTR obj));
1134
1135boolean
c188b0be 1136bfd_set_section_size PARAMS ((bfd *abfd, asection *sec, bfd_size_type val));
fdcb0453
KR
1137
1138boolean
1139bfd_set_section_contents
57a1867e 1140 PARAMS ((bfd *abfd,
fdcb0453
KR
1141 asection *section,
1142 PTR data,
1143 file_ptr offset,
1144 bfd_size_type count));
1145
1146boolean
57a1867e 1147bfd_get_section_contents
fdcb0453
KR
1148 PARAMS ((bfd *abfd, asection *section, PTR location,
1149 file_ptr offset, bfd_size_type count));
1150
5a66538b
KR
1151boolean
1152bfd_copy_private_section_data PARAMS ((bfd *ibfd, asection *isec, bfd *obfd, asection *osec));
1153
1154#define bfd_copy_private_section_data(ibfd, isection, obfd, osection) \
efc2b064 1155 BFD_SEND (obfd, _bfd_copy_private_section_data, \
5a66538b 1156 (ibfd, isection, obfd, osection))
fdcb0453
KR
1157enum bfd_architecture
1158{
1159 bfd_arch_unknown, /* File arch not known */
1160 bfd_arch_obscure, /* Arch known, not one of these */
1161 bfd_arch_m68k, /* Motorola 68xxx */
1162 bfd_arch_vax, /* DEC Vax */
1163 bfd_arch_i960, /* Intel 960 */
1164 /* The order of the following is important.
1165 lower number indicates a machine type that
1166 only accepts a subset of the instructions
1167 available to machines with higher numbers.
1168 The exception is the "ca", which is
1169 incompatible with all other machines except
1170 "core". */
1171
1172#define bfd_mach_i960_core 1
1173#define bfd_mach_i960_ka_sa 2
1174#define bfd_mach_i960_kb_sb 3
1175#define bfd_mach_i960_mc 4
1176#define bfd_mach_i960_xa 5
1177#define bfd_mach_i960_ca 6
047c57ac 1178#define bfd_mach_i960_jx 7
cbe75cb6 1179#define bfd_mach_i960_hx 8
fdcb0453
KR
1180
1181 bfd_arch_a29k, /* AMD 29000 */
1182 bfd_arch_sparc, /* SPARC */
5bc513b4 1183#define bfd_mach_sparc 1
cbe75cb6 1184 /* The difference between v8plus and v9 is that v9 is a true 64 bit env. */
d1f74cd2
DE
1185#define bfd_mach_sparc_sparclet 2
1186#define bfd_mach_sparc_sparclite 3
1187#define bfd_mach_sparc_v8plus 4
1188#define bfd_mach_sparc_v8plusa 5 /* with ultrasparc add'ns */
1189#define bfd_mach_sparc_v9 6
1190#define bfd_mach_sparc_v9a 7 /* with ultrasparc add'ns */
049f3d4c 1191 /* Nonzero if MACH has the v9 instruction set. */
d1f74cd2
DE
1192#define bfd_mach_sparc_v9_p(mach) \
1193 ((mach) >= bfd_mach_sparc_v8plus && (mach) <= bfd_mach_sparc_v9a)
fdcb0453
KR
1194 bfd_arch_mips, /* MIPS Rxxxx */
1195 bfd_arch_i386, /* Intel 386 */
3cc21bf6
SG
1196#define bfd_mach_i386_i386 0
1197#define bfd_mach_i386_i8086 1
fdcb0453
KR
1198 bfd_arch_we32k, /* AT&T WE32xxx */
1199 bfd_arch_tahoe, /* CCI/Harris Tahoe */
1200 bfd_arch_i860, /* Intel 860 */
1201 bfd_arch_romp, /* IBM ROMP PC/RT */
1202 bfd_arch_alliant, /* Alliant */
1203 bfd_arch_convex, /* Convex */
1204 bfd_arch_m88k, /* Motorola 88xxx */
1205 bfd_arch_pyramid, /* Pyramid Technology */
1206 bfd_arch_h8300, /* Hitachi H8/300 */
1207#define bfd_mach_h8300 1
1208#define bfd_mach_h8300h 2
34255b70 1209#define bfd_mach_h8300s 3
d1ad85a6 1210 bfd_arch_powerpc, /* PowerPC */
fdcb0453
KR
1211 bfd_arch_rs6000, /* IBM RS/6000 */
1212 bfd_arch_hppa, /* HP PA RISC */
50bd50d4 1213 bfd_arch_d10v, /* Mitsubishi D10V */
fd8d7c31
MH
1214 /* start-sanitize-d30v */
1215 bfd_arch_d30v, /* Mitsubishi D30V */
1216 /* end-sanitize-d30v */
fdcb0453
KR
1217 bfd_arch_z8k, /* Zilog Z8000 */
1218#define bfd_mach_z8001 1
1219#define bfd_mach_z8002 2
1220 bfd_arch_h8500, /* Hitachi H8/500 */
1221 bfd_arch_sh, /* Hitachi SH */
1222 bfd_arch_alpha, /* Dec Alpha */
d80ebaac 1223 bfd_arch_arm, /* Advanced Risc Machines ARM */
1fb83be6 1224 bfd_arch_ns32k, /* National Semiconductors ns32000 */
d468a149 1225 bfd_arch_w65, /* WDC 65816 */
fc46a9ec
FF
1226 /* start-sanitize-tic80 */
1227 bfd_arch_tic80, /* TI TMS320c80 (MVP) */
1228 /* end-sanitize-tic80 */
c86158e5
ILT
1229 /* start-sanitize-v850 */
1230 bfd_arch_v850, /* NEC V850 */
1231 /* end-sanitize-v850 */
05cedcf6
DE
1232 /* start-sanitize-arc */
1233 bfd_arch_arc, /* Argonaut RISC Core */
c932fd96
DE
1234#define bfd_mach_arc_base 0
1235#define bfd_mach_arc_host 1
1236#define bfd_mach_arc_graphics 2
1237#define bfd_mach_arc_audio 3
05cedcf6 1238 /* end-sanitize-arc */
00d7a64b
JL
1239 /* start-sanitize-m32r */
1240 bfd_arch_m32r, /* Mitsubishi M32R */
1241 /* end-sanitize-m32r */
ae1b99e4
JL
1242 bfd_arch_mn10200, /* Matsushita MN10200 */
1243 bfd_arch_mn10300, /* Matsushita MN10300 */
fdcb0453
KR
1244 bfd_arch_last
1245 };
1246
1247typedef struct bfd_arch_info
1248{
1249 int bits_per_word;
1250 int bits_per_address;
1251 int bits_per_byte;
1252 enum bfd_architecture arch;
ae115e51 1253 unsigned long mach;
2ffbb79a
ILT
1254 const char *arch_name;
1255 const char *printable_name;
fdcb0453
KR
1256 unsigned int section_align_power;
1257 /* true if this is the default machine for the architecture */
1258 boolean the_default;
2ffbb79a
ILT
1259 const struct bfd_arch_info * (*compatible)
1260 PARAMS ((const struct bfd_arch_info *a,
1261 const struct bfd_arch_info *b));
1262
1263 boolean (*scan) PARAMS ((const struct bfd_arch_info *, const char *));
1264
1265 const struct bfd_arch_info *next;
fdcb0453 1266} bfd_arch_info_type;
2ffbb79a 1267const char *
fdcb0453
KR
1268bfd_printable_name PARAMS ((bfd *abfd));
1269
2ffbb79a
ILT
1270const bfd_arch_info_type *
1271bfd_scan_arch PARAMS ((const char *string));
fdcb0453 1272
2ffbb79a 1273const bfd_arch_info_type *
fdcb0453 1274bfd_arch_get_compatible PARAMS ((
2ffbb79a
ILT
1275 const bfd *abfd,
1276 const bfd *bbfd));
fdcb0453
KR
1277
1278void
2ffbb79a 1279bfd_set_arch_info PARAMS ((bfd *abfd, const bfd_arch_info_type *arg));
fdcb0453
KR
1280
1281enum bfd_architecture
1282bfd_get_arch PARAMS ((bfd *abfd));
1283
1284unsigned long
1285bfd_get_mach PARAMS ((bfd *abfd));
1286
1287unsigned int
1288bfd_arch_bits_per_byte PARAMS ((bfd *abfd));
1289
1290unsigned int
1291bfd_arch_bits_per_address PARAMS ((bfd *abfd));
1292
2ffbb79a 1293const bfd_arch_info_type *
c188b0be 1294bfd_get_arch_info PARAMS ((bfd *abfd));
fdcb0453 1295
2ffbb79a 1296const bfd_arch_info_type *
fdcb0453
KR
1297bfd_lookup_arch
1298 PARAMS ((enum bfd_architecture
1299 arch,
ae115e51 1300 unsigned long machine));
fdcb0453 1301
2ffbb79a 1302const char *
fdcb0453
KR
1303bfd_printable_arch_mach
1304 PARAMS ((enum bfd_architecture arch, unsigned long machine));
1305
57a1867e 1306typedef enum bfd_reloc_status
fdcb0453
KR
1307{
1308 /* No errors detected */
1309 bfd_reloc_ok,
1310
1311 /* The relocation was performed, but there was an overflow. */
1312 bfd_reloc_overflow,
1313
1314 /* The address to relocate was not within the section supplied. */
1315 bfd_reloc_outofrange,
1316
1317 /* Used by special functions */
1318 bfd_reloc_continue,
1319
c188b0be 1320 /* Unsupported relocation size requested. */
fdcb0453
KR
1321 bfd_reloc_notsupported,
1322
c188b0be 1323 /* Unused */
fdcb0453
KR
1324 bfd_reloc_other,
1325
1326 /* The symbol to relocate against was undefined. */
1327 bfd_reloc_undefined,
1328
1329 /* The relocation was performed, but may not be ok - presently
1330 generated only when linking i960 coff files with i960 b.out
4c3721d5
ILT
1331 symbols. If this type is returned, the error_message argument
1332 to bfd_perform_relocation will be set. */
fdcb0453
KR
1333 bfd_reloc_dangerous
1334 }
1335 bfd_reloc_status_type;
1336
1337
57a1867e 1338typedef struct reloc_cache_entry
fdcb0453
KR
1339{
1340 /* A pointer into the canonical table of pointers */
1341 struct symbol_cache_entry **sym_ptr_ptr;
1342
1343 /* offset in section */
1344 bfd_size_type address;
1345
1346 /* addend for relocation value */
57a1867e 1347 bfd_vma addend;
fdcb0453
KR
1348
1349 /* Pointer to how to perform the required relocation */
5dc8db48 1350 reloc_howto_type *howto;
fdcb0453
KR
1351
1352} arelent;
66a277ab
ILT
1353enum complain_overflow
1354{
1355 /* Do not complain on overflow. */
1356 complain_overflow_dont,
1357
1358 /* Complain if the bitfield overflows, whether it is considered
1359 as signed or unsigned. */
1360 complain_overflow_bitfield,
1361
1362 /* Complain if the value overflows when considered as signed
1363 number. */
1364 complain_overflow_signed,
1365
1366 /* Complain if the value overflows when considered as an
1367 unsigned number. */
1368 complain_overflow_unsigned
1369};
fdcb0453 1370
1fb83be6 1371struct reloc_howto_struct
57a1867e 1372{
92a956e8 1373 /* The type field has mainly a documentary use - the back end can
c188b0be
DM
1374 do what it wants with it, though normally the back end's
1375 external idea of what a reloc number is stored
1376 in this field. For example, a PC relative word relocation
1377 in a coff environment has the type 023 - because that's
fdcb0453
KR
1378 what the outside world calls a R_PCRWORD reloc. */
1379 unsigned int type;
1380
1381 /* The value the final relocation is shifted right by. This drops
1382 unwanted data from the relocation. */
1383 unsigned int rightshift;
1384
9e461dac 1385 /* The size of the item to be relocated. This is *not* a
4c3721d5
ILT
1386 power-of-two measure. To get the number of bytes operated
1387 on by a type of relocation, use bfd_get_reloc_size. */
fdcb0453
KR
1388 int size;
1389
66a277ab
ILT
1390 /* The number of bits in the item to be relocated. This is used
1391 when doing overflow checking. */
fdcb0453
KR
1392 unsigned int bitsize;
1393
1394 /* Notes that the relocation is relative to the location in the
1395 data section of the addend. The relocation function will
1396 subtract from the relocation value the address of the location
1397 being relocated. */
1398 boolean pc_relative;
1399
66a277ab
ILT
1400 /* The bit position of the reloc value in the destination.
1401 The relocated value is left shifted by this amount. */
fdcb0453
KR
1402 unsigned int bitpos;
1403
66a277ab
ILT
1404 /* What type of overflow error should be checked for when
1405 relocating. */
1406 enum complain_overflow complain_on_overflow;
fdcb0453
KR
1407
1408 /* If this field is non null, then the supplied function is
1409 called rather than the normal function. This allows really
1410 strange relocation methods to be accomodated (e.g., i960 callj
1411 instructions). */
57a1867e 1412 bfd_reloc_status_type (*special_function)
fdcb0453
KR
1413 PARAMS ((bfd *abfd,
1414 arelent *reloc_entry,
1415 struct symbol_cache_entry *symbol,
1416 PTR data,
57a1867e 1417 asection *input_section,
4c3721d5
ILT
1418 bfd *output_bfd,
1419 char **error_message));
fdcb0453
KR
1420
1421 /* The textual name of the relocation type. */
1422 char *name;
1423
1424 /* When performing a partial link, some formats must modify the
1425 relocations rather than the data - this flag signals this.*/
1426 boolean partial_inplace;
1427
c188b0be 1428 /* The src_mask selects which parts of the read in data
fdcb0453
KR
1429 are to be used in the relocation sum. E.g., if this was an 8 bit
1430 bit of data which we read and relocated, this would be
1431 0x000000ff. When we have relocs which have an addend, such as
1432 sun4 extended relocs, the value in the offset part of a
1433 relocating field is garbage so we never use it. In this case
1434 the mask would be 0x00000000. */
1435 bfd_vma src_mask;
1436
c188b0be 1437 /* The dst_mask selects which parts of the instruction are replaced
fdcb0453
KR
1438 into the instruction. In most cases src_mask == dst_mask,
1439 except in the above special case, where dst_mask would be
1440 0x000000ff, and src_mask would be 0x00000000. */
57a1867e 1441 bfd_vma dst_mask;
fdcb0453
KR
1442
1443 /* When some formats create PC relative instructions, they leave
1444 the value of the pc of the place being relocated in the offset
1445 slot of the instruction, so that a PC relative relocation can
1446 be made just by adding in an ordinary offset (e.g., sun3 a.out).
1447 Some formats leave the displacement part of an instruction
c188b0be 1448 empty (e.g., m88k bcs); this flag signals the fact.*/
fdcb0453
KR
1449 boolean pcrel_offset;
1450
1fb83be6 1451};
66a277ab 1452#define HOWTO(C, R,S,B, P, BI, O, SF, NAME, INPLACE, MASKSRC, MASKDST, PC) \
b5b056fc 1453 {(unsigned)C,R,S,B, P, BI, O,SF,NAME,INPLACE,MASKSRC,MASKDST,PC}
66a277ab 1454#define NEWHOWTO( FUNCTION, NAME,SIZE,REL,IN) HOWTO(0,0,SIZE,0,REL,0,complain_overflow_dont,FUNCTION, NAME,false,0,0,IN)
fdcb0453
KR
1455
1456#define HOWTO_PREPARE(relocation, symbol) \
1457 { \
1458 if (symbol != (asymbol *)NULL) { \
1459 if (bfd_is_com_section (symbol->section)) { \
1460 relocation = 0; \
1461 } \
1462 else { \
1463 relocation = symbol->value; \
1464 } \
1465 } \
57a1867e 1466}
4c3721d5 1467int
82b1edf7 1468bfd_get_reloc_size PARAMS ((reloc_howto_type *));
4c3721d5 1469
fdcb0453
KR
1470typedef struct relent_chain {
1471 arelent relent;
1472 struct relent_chain *next;
1473} arelent_chain;
1474bfd_reloc_status_type
1475
1476bfd_perform_relocation
c188b0be 1477 PARAMS ((bfd *abfd,
fdcb0453
KR
1478 arelent *reloc_entry,
1479 PTR data,
1480 asection *input_section,
4c3721d5
ILT
1481 bfd *output_bfd,
1482 char **error_message));
fdcb0453 1483
fca2b81b
KR
1484bfd_reloc_status_type
1485
1486bfd_install_relocation
1487 PARAMS ((bfd *abfd,
1488 arelent *reloc_entry,
1489 PTR data, bfd_vma data_start,
1490 asection *input_section,
1491 char **error_message));
1492
0443af31
KR
1493enum bfd_reloc_code_real {
1494 _dummy_first_bfd_reloc_code_real,
1495
1496
1497/* Basic absolute relocations of N bits. */
fa5ba217 1498 BFD_RELOC_64,
fa5ba217 1499 BFD_RELOC_32,
e9c6595d 1500 BFD_RELOC_26,
db109ca2 1501 BFD_RELOC_24,
57a1867e 1502 BFD_RELOC_16,
7e7fb4a8 1503 BFD_RELOC_14,
fdcb0453 1504 BFD_RELOC_8,
9e461dac 1505
0443af31
KR
1506/* PC-relative relocations. Sometimes these are relative to the address
1507of the relocation itself; sometimes they are relative to the start of
1508the section containing the relocation. It depends on the specific target.
1509
1510The 24-bit relocation is used in some Intel 960 configurations. */
9e461dac
JK
1511 BFD_RELOC_64_PCREL,
1512 BFD_RELOC_32_PCREL,
0443af31 1513 BFD_RELOC_24_PCREL,
9e461dac 1514 BFD_RELOC_16_PCREL,
fca2b81b 1515 BFD_RELOC_12_PCREL,
fdcb0453 1516 BFD_RELOC_8_PCREL,
9e461dac 1517
3b1f83ad
JL
1518/* For ELF. */
1519 BFD_RELOC_32_GOT_PCREL,
1520 BFD_RELOC_16_GOT_PCREL,
1521 BFD_RELOC_8_GOT_PCREL,
1522 BFD_RELOC_32_GOTOFF,
1523 BFD_RELOC_16_GOTOFF,
02f85cda
MM
1524 BFD_RELOC_LO16_GOTOFF,
1525 BFD_RELOC_HI16_GOTOFF,
1526 BFD_RELOC_HI16_S_GOTOFF,
3b1f83ad
JL
1527 BFD_RELOC_8_GOTOFF,
1528 BFD_RELOC_32_PLT_PCREL,
02f85cda 1529 BFD_RELOC_24_PLT_PCREL,
3b1f83ad
JL
1530 BFD_RELOC_16_PLT_PCREL,
1531 BFD_RELOC_8_PLT_PCREL,
1532 BFD_RELOC_32_PLTOFF,
1533 BFD_RELOC_16_PLTOFF,
02f85cda
MM
1534 BFD_RELOC_LO16_PLTOFF,
1535 BFD_RELOC_HI16_PLTOFF,
1536 BFD_RELOC_HI16_S_PLTOFF,
3b1f83ad
JL
1537 BFD_RELOC_8_PLTOFF,
1538
1539/* Relocations used by 68K ELF. */
1540 BFD_RELOC_68K_GLOB_DAT,
1541 BFD_RELOC_68K_JMP_SLOT,
1542 BFD_RELOC_68K_RELATIVE,
1543
0443af31 1544/* Linkage-table relative. */
9e461dac
JK
1545 BFD_RELOC_32_BASEREL,
1546 BFD_RELOC_16_BASEREL,
02f85cda
MM
1547 BFD_RELOC_LO16_BASEREL,
1548 BFD_RELOC_HI16_BASEREL,
1549 BFD_RELOC_HI16_S_BASEREL,
9e461dac 1550 BFD_RELOC_8_BASEREL,
815179af 1551 BFD_RELOC_RVA,
fdcb0453 1552
0443af31 1553/* Absolute 8-bit relocation, but used to form an address like 0xFFnn. */
9e461dac
JK
1554 BFD_RELOC_8_FFnn,
1555
fca2b81b
KR
1556/* These PC-relative relocations are stored as word displacements --
1557i.e., byte displacements shifted right two bits. The 30-bit word
1558displacement (<<32_PCREL_S2>> -- 32 bits, shifted 2) is used on the
1559SPARC. (SPARC tools generally refer to this as <<WDISP30>>.) The
1560signed 16-bit displacement is used on the MIPS, and the 23-bit
1561displacement is used on the Alpha. */
9e461dac 1562 BFD_RELOC_32_PCREL_S2,
7e7fb4a8 1563 BFD_RELOC_16_PCREL_S2,
7e7fb4a8 1564 BFD_RELOC_23_PCREL_S2,
9e461dac 1565
0443af31
KR
1566/* High 22 bits and low 10 bits of 32-bit value, placed into lower bits of
1567the target word. These are used on the SPARC. */
fdcb0453 1568 BFD_RELOC_HI22,
fdcb0453
KR
1569 BFD_RELOC_LO10,
1570
0443af31
KR
1571/* For systems that allocate a Global Pointer register, these are
1572displacements off that register. These relocation types are
1573handled specially, because the value the register will have is
1574decided relatively late. */
7e7fb4a8
KR
1575 BFD_RELOC_GPREL16,
1576 BFD_RELOC_GPREL32,
1577
0443af31 1578/* Reloc types used for i960/b.out. */
fdcb0453
KR
1579 BFD_RELOC_I960_CALLJ,
1580
0443af31
KR
1581/* SPARC ELF relocations. There is probably some overlap with other
1582relocation types already defined. */
1583 BFD_RELOC_NONE,
fdcb0453
KR
1584 BFD_RELOC_SPARC_WDISP22,
1585 BFD_RELOC_SPARC22,
1586 BFD_RELOC_SPARC13,
fdcb0453
KR
1587 BFD_RELOC_SPARC_GOT10,
1588 BFD_RELOC_SPARC_GOT13,
1589 BFD_RELOC_SPARC_GOT22,
1590 BFD_RELOC_SPARC_PC10,
1591 BFD_RELOC_SPARC_PC22,
1592 BFD_RELOC_SPARC_WPLT30,
1593 BFD_RELOC_SPARC_COPY,
1594 BFD_RELOC_SPARC_GLOB_DAT,
1595 BFD_RELOC_SPARC_JMP_SLOT,
1596 BFD_RELOC_SPARC_RELATIVE,
1597 BFD_RELOC_SPARC_UA32,
1598
0443af31 1599/* I think these are specific to SPARC a.out (e.g., Sun 4). */
5284a822 1600 BFD_RELOC_SPARC_BASE13,
fdcb0453
KR
1601 BFD_RELOC_SPARC_BASE22,
1602
0443af31
KR
1603/* Some relocations we're using for SPARC V9 -- subject to change. */
1604#define BFD_RELOC_SPARC_64 BFD_RELOC_64
fa5ba217
KR
1605 BFD_RELOC_SPARC_10,
1606 BFD_RELOC_SPARC_11,
fa5ba217
KR
1607 BFD_RELOC_SPARC_OLO10,
1608 BFD_RELOC_SPARC_HH22,
1609 BFD_RELOC_SPARC_HM10,
1610 BFD_RELOC_SPARC_LM22,
1611 BFD_RELOC_SPARC_PC_HH22,
1612 BFD_RELOC_SPARC_PC_HM10,
1613 BFD_RELOC_SPARC_PC_LM22,
1614 BFD_RELOC_SPARC_WDISP16,
5284a822 1615 BFD_RELOC_SPARC_WDISP19,
fa5ba217 1616 BFD_RELOC_SPARC_GLOB_JMP,
e9f03cd4
ILT
1617 BFD_RELOC_SPARC_7,
1618 BFD_RELOC_SPARC_6,
1619 BFD_RELOC_SPARC_5,
5284a822 1620
34255b70
JL
1621/* Alpha ECOFF and ELF relocations. Some of these treat the symbol or
1622"addend" in some special way.
0443af31
KR
1623For GPDISP_HI16 ("gpdisp") relocations, the symbol is ignored when
1624writing; when reading, it will be the absolute section symbol. The
1625addend is the displacement in bytes of the "lda" instruction from
1626the "ldah" instruction (which is at the address of this reloc). */
7e7fb4a8 1627 BFD_RELOC_ALPHA_GPDISP_HI16,
0443af31
KR
1628
1629/* For GPDISP_LO16 ("ignore") relocations, the symbol is handled as
1630with GPDISP_HI16 relocs. The addend is ignored when writing the
1631relocations out, and is filled in with the file's GP value on
1632reading, for convenience. */
7e7fb4a8
KR
1633 BFD_RELOC_ALPHA_GPDISP_LO16,
1634
34255b70
JL
1635/* The ELF GPDISP relocation is exactly the same as the GPDISP_HI16
1636relocation except that there is no accompanying GPDISP_LO16
1637relocation. */
1638 BFD_RELOC_ALPHA_GPDISP,
1639
0443af31
KR
1640/* The Alpha LITERAL/LITUSE relocs are produced by a symbol reference;
1641the assembler turns it into a LDQ instruction to load the address of
1642the symbol, and then fills in a register in the real instruction.
1643
1644The LITERAL reloc, at the LDQ instruction, refers to the .lita
1645section symbol. The addend is ignored when writing, but is filled
1646in with the file's GP value on reading, for convenience, as with the
1647GPDISP_LO16 reloc.
1648
6b31fd3a
ILT
1649The ELF_LITERAL reloc is somewhere between 16_GOTOFF and GPDISP_LO16.
1650It should refer to the symbol to be referenced, as with 16_GOTOFF,
1651but it generates output not based on the position within the .got
1652section, but relative to the GP value chosen for the file during the
1653final link stage.
1654
0443af31
KR
1655The LITUSE reloc, on the instruction using the loaded address, gives
1656information to the linker that it might be able to use to optimize
1657away some literal section references. The symbol is ignored (read
1658as the absolute section symbol), and the "addend" indicates the type
1659of instruction using the register:
16601 - "memory" fmt insn
16612 - byte-manipulation (byte offset reg)
16623 - jsr (target of branch)
1663
1664The GNU linker currently doesn't do any of this optimizing. */
7e7fb4a8 1665 BFD_RELOC_ALPHA_LITERAL,
6b31fd3a 1666 BFD_RELOC_ALPHA_ELF_LITERAL,
7e7fb4a8
KR
1667 BFD_RELOC_ALPHA_LITUSE,
1668
0443af31
KR
1669/* The HINT relocation indicates a value that should be filled into the
1670"hint" field of a jmp/jsr/ret instruction, for possible branch-
1671prediction logic which may be provided on some processors. */
7e7fb4a8
KR
1672 BFD_RELOC_ALPHA_HINT,
1673
8612a388
ILT
1674/* The LINKAGE relocation outputs a linkage pair in the object file,
1675which is filled by the linker. */
c3d8e071
ILT
1676 BFD_RELOC_ALPHA_LINKAGE,
1677
92a956e8
FF
1678/* The CODEADDR relocation outputs a STO_CA in the object file,
1679which is filled by the linker. */
1680 BFD_RELOC_ALPHA_CODEADDR,
1681
0443af31
KR
1682/* Bits 27..2 of the relocation address shifted right 2 bits;
1683simple reloc otherwise. */
fdcb0453
KR
1684 BFD_RELOC_MIPS_JMP,
1685
cd6213ff
FF
1686/* The MIPS16 jump instruction. */
1687 BFD_RELOC_MIPS16_JMP,
1688
a4183ba5
ILT
1689/* MIPS16 GP relative reloc. */
1690 BFD_RELOC_MIPS16_GPREL,
1691
0443af31 1692/* High 16 bits of 32-bit value; simple reloc. */
fdcb0453 1693 BFD_RELOC_HI16,
0443af31
KR
1694
1695/* High 16 bits of 32-bit value but the low 16 bits will be sign
1696extended and added to form the final result. If the low 16
1697bits form a negative number, we need to add one to the high value
1698to compensate for the borrow when the low bits are added. */
fdcb0453 1699 BFD_RELOC_HI16_S,
0443af31
KR
1700
1701/* Low 16 bits. */
fdcb0453 1702 BFD_RELOC_LO16,
0443af31
KR
1703
1704/* Like BFD_RELOC_HI16_S, but PC relative. */
7efb1850 1705 BFD_RELOC_PCREL_HI16_S,
0443af31
KR
1706
1707/* Like BFD_RELOC_LO16, but PC relative. */
7efb1850 1708 BFD_RELOC_PCREL_LO16,
fdcb0453 1709
0443af31 1710/* Relocation relative to the global pointer. */
7e7fb4a8 1711#define BFD_RELOC_MIPS_GPREL BFD_RELOC_GPREL16
fdcb0453 1712
0443af31 1713/* Relocation against a MIPS literal section. */
0a197a96
JG
1714 BFD_RELOC_MIPS_LITERAL,
1715
0443af31 1716/* MIPS ELF relocations. */
0a197a96
JG
1717 BFD_RELOC_MIPS_GOT16,
1718 BFD_RELOC_MIPS_CALL16,
7e7fb4a8 1719#define BFD_RELOC_MIPS_GPREL32 BFD_RELOC_GPREL32
e9f03cd4
ILT
1720 BFD_RELOC_MIPS_GOT_HI16,
1721 BFD_RELOC_MIPS_GOT_LO16,
b7384d22
ILT
1722 BFD_RELOC_MIPS_CALL_HI16,
1723 BFD_RELOC_MIPS_CALL_LO16,
0a197a96 1724
0443af31 1725/* i386/elf relocations */
b66b07a2
KR
1726 BFD_RELOC_386_GOT32,
1727 BFD_RELOC_386_PLT32,
1728 BFD_RELOC_386_COPY,
1729 BFD_RELOC_386_GLOB_DAT,
1730 BFD_RELOC_386_JUMP_SLOT,
1731 BFD_RELOC_386_RELATIVE,
1732 BFD_RELOC_386_GOTOFF,
1733 BFD_RELOC_386_GOTPC,
1734
0443af31 1735/* ns32k relocations */
1fb83be6
KR
1736 BFD_RELOC_NS32K_IMM_8,
1737 BFD_RELOC_NS32K_IMM_16,
1738 BFD_RELOC_NS32K_IMM_32,
1739 BFD_RELOC_NS32K_IMM_8_PCREL,
1740 BFD_RELOC_NS32K_IMM_16_PCREL,
1741 BFD_RELOC_NS32K_IMM_32_PCREL,
1742 BFD_RELOC_NS32K_DISP_8,
1743 BFD_RELOC_NS32K_DISP_16,
1744 BFD_RELOC_NS32K_DISP_32,
1745 BFD_RELOC_NS32K_DISP_8_PCREL,
1746 BFD_RELOC_NS32K_DISP_16_PCREL,
1747 BFD_RELOC_NS32K_DISP_32_PCREL,
1748
02f85cda 1749/* Power(rs6000) and PowerPC relocations. */
d1ad85a6 1750 BFD_RELOC_PPC_B26,
d1ad85a6 1751 BFD_RELOC_PPC_BA26,
d1ad85a6 1752 BFD_RELOC_PPC_TOC16,
02f85cda
MM
1753 BFD_RELOC_PPC_B16,
1754 BFD_RELOC_PPC_B16_BRTAKEN,
1755 BFD_RELOC_PPC_B16_BRNTAKEN,
1756 BFD_RELOC_PPC_BA16,
1757 BFD_RELOC_PPC_BA16_BRTAKEN,
1758 BFD_RELOC_PPC_BA16_BRNTAKEN,
1759 BFD_RELOC_PPC_COPY,
1760 BFD_RELOC_PPC_GLOB_DAT,
1761 BFD_RELOC_PPC_JMP_SLOT,
1762 BFD_RELOC_PPC_RELATIVE,
1763 BFD_RELOC_PPC_LOCAL24PC,
4500a112
MM
1764 BFD_RELOC_PPC_EMB_NADDR32,
1765 BFD_RELOC_PPC_EMB_NADDR16,
1766 BFD_RELOC_PPC_EMB_NADDR16_LO,
1767 BFD_RELOC_PPC_EMB_NADDR16_HI,
1768 BFD_RELOC_PPC_EMB_NADDR16_HA,
1769 BFD_RELOC_PPC_EMB_SDAI16,
1770 BFD_RELOC_PPC_EMB_SDA2I16,
1771 BFD_RELOC_PPC_EMB_SDA2REL,
1772 BFD_RELOC_PPC_EMB_SDA21,
1773 BFD_RELOC_PPC_EMB_MRKREF,
1774 BFD_RELOC_PPC_EMB_RELSEC16,
1775 BFD_RELOC_PPC_EMB_RELST_LO,
1776 BFD_RELOC_PPC_EMB_RELST_HI,
1777 BFD_RELOC_PPC_EMB_RELST_HA,
1778 BFD_RELOC_PPC_EMB_BIT_FLD,
1779 BFD_RELOC_PPC_EMB_RELSDA,
d1ad85a6 1780
0443af31
KR
1781/* The type of reloc used to build a contructor table - at the moment
1782probably a 32 bit wide absolute relocation, but the target can choose.
1783It generally does map to one of the other relocation types. */
1784 BFD_RELOC_CTOR,
d80ebaac
ILT
1785
1786/* ARM 26 bit pc-relative branch. The lowest two bits must be zero and are
1787not stored in the instruction. */
1788 BFD_RELOC_ARM_PCREL_BRANCH,
1789
1790/* These relocs are only used within the ARM assembler. They are not
1791(at present) written to any object files. */
1792 BFD_RELOC_ARM_IMMEDIATE,
1793 BFD_RELOC_ARM_OFFSET_IMM,
1794 BFD_RELOC_ARM_SHIFT_IMM,
1795 BFD_RELOC_ARM_SWI,
1796 BFD_RELOC_ARM_MULTI,
1797 BFD_RELOC_ARM_CP_OFF_IMM,
3b1f83ad
JL
1798 BFD_RELOC_ARM_ADR_IMM,
1799 BFD_RELOC_ARM_LDR_IMM,
1800 BFD_RELOC_ARM_LITERAL,
1801 BFD_RELOC_ARM_IN_POOL,
d1b40d8e
JSC
1802 BFD_RELOC_ARM_OFFSET_IMM8,
1803 BFD_RELOC_ARM_HWLITERAL,
c86158e5
ILT
1804 BFD_RELOC_ARM_THUMB_ADD,
1805 BFD_RELOC_ARM_THUMB_IMM,
1806 BFD_RELOC_ARM_THUMB_SHIFT,
1807 BFD_RELOC_ARM_THUMB_OFFSET,
1808
1809/* Hitachi SH relocs. Not all of these appear in object files. */
1810 BFD_RELOC_SH_PCDISP8BY2,
1811 BFD_RELOC_SH_PCDISP12BY2,
1812 BFD_RELOC_SH_IMM4,
1813 BFD_RELOC_SH_IMM4BY2,
1814 BFD_RELOC_SH_IMM4BY4,
1815 BFD_RELOC_SH_IMM8,
1816 BFD_RELOC_SH_IMM8BY2,
1817 BFD_RELOC_SH_IMM8BY4,
1818 BFD_RELOC_SH_PCRELIMM8BY2,
1819 BFD_RELOC_SH_PCRELIMM8BY4,
1820 BFD_RELOC_SH_SWITCH16,
1821 BFD_RELOC_SH_SWITCH32,
1822 BFD_RELOC_SH_USES,
1823 BFD_RELOC_SH_COUNT,
1824 BFD_RELOC_SH_ALIGN,
1825 BFD_RELOC_SH_CODE,
1826 BFD_RELOC_SH_DATA,
1827 BFD_RELOC_SH_LABEL,
05cedcf6
DE
1828/* start-sanitize-arc */
1829
1830/* Argonaut RISC Core (ARC) relocs.
1831ARC 22 bit pc-relative branch. The lowest two bits must be zero and are
3b1f83ad
JL
1832not stored in the instruction. The high 20 bits are installed in bits 26
1833through 7 of the instruction. */
05cedcf6 1834 BFD_RELOC_ARC_B22_PCREL,
3b1f83ad
JL
1835
1836/* ARC 26 bit absolute branch. The lowest two bits must be zero and are not
1837stored in the instruction. The high 24 bits are installed in bits 23
1838through 0. */
1839 BFD_RELOC_ARC_B26,
05cedcf6 1840/* end-sanitize-arc */
50bd50d4 1841
50bd50d4
MH
1842/* Mitsubishi D10V relocs.
1843This is a 10-bit reloc with the right 2 bits
1844assumed to be 0. */
50bd50d4
MH
1845 BFD_RELOC_D10V_10_PCREL_R,
1846
f4e14cb9
ILT
1847/* Mitsubishi D10V relocs.
1848This is a 10-bit reloc with the right 2 bits
1849assumed to be 0. This is the same as the previous reloc
1850except it is in the left container, i.e.,
1851shifted left 15 bits. */
1852 BFD_RELOC_D10V_10_PCREL_L,
1853
50bd50d4
MH
1854/* This is an 18-bit reloc with the right 2 bits
1855assumed to be 0. */
1856 BFD_RELOC_D10V_18,
1857
1858/* This is an 18-bit reloc with the right 2 bits
1859assumed to be 0. */
1860 BFD_RELOC_D10V_18_PCREL,
50bd50d4 1861
fd8d7c31
MH
1862/* start-sanitize-d30v */
1863
1864/* Mitsubishi D30V relocs.
1865This is a 6-bit absolute reloc. */
1866 BFD_RELOC_D30V_6,
1867
1868/* Mitsubishi D30V relocs.
1869This is a 12-bit absolute reloc with the
1870right 3 bitsassumed to be 0. */
1871 BFD_RELOC_D30V_15,
1872
1873/* Mitsubishi D30V relocs.
1874This is a 12-bit pc-relative reloc with
1875the right 3 bits assumed to be 0. */
1876 BFD_RELOC_D30V_15_PCREL,
1877
1878/* This is an 18-bit absolute reloc with
1879the right 3 bits assumed to be 0. */
1880 BFD_RELOC_D30V_21,
1881
1882/* This is an 18-bit pc-relative reloc with
1883the right 3 bits assumed to be 0. */
1884 BFD_RELOC_D30V_21_PCREL,
1885
1886/* This is a 32-bit absolute reloc. */
1887 BFD_RELOC_D30V_32,
1888
1889/* This is a 32-bit pc-relative reloc. */
1890 BFD_RELOC_D30V_32_PCREL,
1891/* end-sanitize-d30v */
1892
3ebefb07
DE
1893/* start-sanitize-m32r */
1894
1895/* Mitsubishi M32R relocs.
cd6213ff
FF
1896This is a 24 bit absolute address. */
1897 BFD_RELOC_M32R_24,
efc2b064 1898
cd6213ff
FF
1899/* This is a 10-bit pc-relative reloc with the right 2 bits assumed to be 0. */
1900 BFD_RELOC_M32R_10_PCREL,
3ebefb07
DE
1901
1902/* This is an 18-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1903 BFD_RELOC_M32R_18_PCREL,
3ebefb07 1904
1d5c6cfd 1905/* This is a 26-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1906 BFD_RELOC_M32R_26_PCREL,
1d5c6cfd
DE
1907
1908/* This is a 16-bit reloc containing the high 16 bits of an address
1909used when the lower 16 bits are treated as unsigned. */
1910 BFD_RELOC_M32R_HI16_ULO,
1911
1912/* This is a 16-bit reloc containing the high 16 bits of an address
1913used when the lower 16 bits are treated as signed. */
1914 BFD_RELOC_M32R_HI16_SLO,
1915
1916/* This is a 16-bit reloc containing the lower 16 bits of an address. */
1917 BFD_RELOC_M32R_LO16,
3ebefb07
DE
1918/* end-sanitize-m32r */
1919
00d7a64b
JL
1920/* start-sanitize-v850 */
1921
1922/* This is a 9-bit reloc */
c86158e5 1923 BFD_RELOC_V850_9_PCREL,
00d7a64b
JL
1924
1925/* This is a 22-bit reloc */
c86158e5 1926 BFD_RELOC_V850_22_PCREL,
b6d08fce
JL
1927
1928/* This is an offset from the short data area pointer.. */
1929 BFD_RELOC_V850_SDA_OFFSET,
1930
1931/* This is an offset from the zero data area pointer.. */
1932 BFD_RELOC_V850_ZDA_OFFSET,
1933
1934/* This is an offset from the tiny data area pointer.. */
1935 BFD_RELOC_V850_TDA_OFFSET,
00d7a64b 1936/* end-sanitize-v850 */
c86158e5 1937
cd6213ff
FF
1938
1939/* This is a 32bit pcrel reloc for the mn10300, offset by two bytes in the
1940instruction. */
1941 BFD_RELOC_MN10300_32_PCREL,
1942
1943/* This is a 16bit pcrel reloc for the mn10300, offset by two bytes in the
1944instruction. */
1945 BFD_RELOC_MN10300_16_PCREL,
0443af31
KR
1946 BFD_RELOC_UNUSED };
1947typedef enum bfd_reloc_code_real bfd_reloc_code_real_type;
5dc8db48 1948reloc_howto_type *
fdcb0453
KR
1949
1950bfd_reloc_type_lookup PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
1951
0443af31
KR
1952const char *
1953bfd_get_reloc_code_name PARAMS ((bfd_reloc_code_real_type code));
1954
ef758f3e 1955
57a1867e 1956typedef struct symbol_cache_entry
fdcb0453
KR
1957{
1958 /* A pointer to the BFD which owns the symbol. This information
1959 is necessary so that a back end can work out what additional
1960 information (invisible to the application writer) is carried
1961 with the symbol.
1962
1963 This field is *almost* redundant, since you can use section->owner
1964 instead, except that some symbols point to the global sections
1965 bfd_{abs,com,und}_section. This could be fixed by making
1966 these globals be per-bfd (or per-target-flavor). FIXME. */
1967
1968 struct _bfd *the_bfd; /* Use bfd_asymbol_bfd(sym) to access this field. */
1969
c188b0be 1970 /* The text of the symbol. The name is left alone, and not copied; the
fdcb0453
KR
1971 application may not alter it. */
1972 CONST char *name;
1973
1974 /* The value of the symbol. This really should be a union of a
1975 numeric value with a pointer, since some flags indicate that
1976 a pointer to another symbol is stored here. */
1977 symvalue value;
1978
1979 /* Attributes of a symbol: */
1980
1981#define BSF_NO_FLAGS 0x00
1982
1983 /* The symbol has local scope; <<static>> in <<C>>. The value
1984 is the offset into the section of the data. */
1985#define BSF_LOCAL 0x01
1986
1987 /* The symbol has global scope; initialized data in <<C>>. The
1988 value is the offset into the section of the data. */
1989#define BSF_GLOBAL 0x02
1990
c188b0be 1991 /* The symbol has global scope and is exported. The value is
fdcb0453 1992 the offset into the section of the data. */
ef758f3e 1993#define BSF_EXPORT BSF_GLOBAL /* no real difference */
fdcb0453
KR
1994
1995 /* A normal C symbol would be one of:
1996 <<BSF_LOCAL>>, <<BSF_FORT_COMM>>, <<BSF_UNDEFINED>> or
ef758f3e 1997 <<BSF_GLOBAL>> */
fdcb0453
KR
1998
1999 /* The symbol is a debugging record. The value has an arbitary
2000 meaning. */
2001#define BSF_DEBUGGING 0x08
2002
2003 /* The symbol denotes a function entry point. Used in ELF,
2004 perhaps others someday. */
2005#define BSF_FUNCTION 0x10
2006
2007 /* Used by the linker. */
2008#define BSF_KEEP 0x20
2009#define BSF_KEEP_G 0x40
2010
b66b07a2
KR
2011 /* A weak global symbol, overridable without warnings by
2012 a regular global symbol of the same name. */
fdcb0453
KR
2013#define BSF_WEAK 0x80
2014
2015 /* This symbol was created to point to a section, e.g. ELF's
2016 STT_SECTION symbols. */
2017#define BSF_SECTION_SYM 0x100
2018
2019 /* The symbol used to be a common symbol, but now it is
2020 allocated. */
2021#define BSF_OLD_COMMON 0x200
2022
2023 /* The default value for common data. */
2024#define BFD_FORT_COMM_DEFAULT_VALUE 0
2025
2026 /* In some files the type of a symbol sometimes alters its
2027 location in an output file - ie in coff a <<ISFCN>> symbol
2028 which is also <<C_EXT>> symbol appears where it was
2029 declared and not at the end of a section. This bit is set
2030 by the target BFD part to convey this information. */
2031
2032#define BSF_NOT_AT_END 0x400
2033
2034 /* Signal that the symbol is the label of constructor section. */
2035#define BSF_CONSTRUCTOR 0x800
2036
fcf490c0
ILT
2037 /* Signal that the symbol is a warning symbol. The name is a
2038 warning. The name of the next symbol is the one to warn about;
2039 if a reference is made to a symbol with the same name as the next
2040 symbol, a warning is issued by the linker. */
fdcb0453
KR
2041#define BSF_WARNING 0x1000
2042
fcf490c0
ILT
2043 /* Signal that the symbol is indirect. This symbol is an indirect
2044 pointer to the symbol with the same name as the next symbol. */
fdcb0453
KR
2045#define BSF_INDIRECT 0x2000
2046
2047 /* BSF_FILE marks symbols that contain a file name. This is used
2048 for ELF STT_FILE symbols. */
2049#define BSF_FILE 0x4000
2050
0ee75d02
ILT
2051 /* Symbol is from dynamic linking information. */
2052#define BSF_DYNAMIC 0x8000
2053
cbe75cb6
ILT
2054 /* The symbol denotes a data object. Used in ELF, and perhaps
2055 others someday. */
2056#define BSF_OBJECT 0x10000
2057
fdcb0453
KR
2058 flagword flags;
2059
57a1867e 2060 /* A pointer to the section to which this symbol is
fdcb0453 2061 relative. This will always be non NULL, there are special
fca2b81b 2062 sections for undefined and absolute symbols. */
fdcb0453
KR
2063 struct sec *section;
2064
fca2b81b
KR
2065 /* Back end special data. */
2066 union
2067 {
2068 PTR p;
2069 bfd_vma i;
2070 } udata;
fdcb0453
KR
2071
2072} asymbol;
326e32d7
ILT
2073#define bfd_get_symtab_upper_bound(abfd) \
2074 BFD_SEND (abfd, _bfd_get_symtab_upper_bound, (abfd))
5a66538b
KR
2075boolean
2076bfd_is_local_label PARAMS ((bfd *abfd, asymbol *sym));
2077
2078#define bfd_is_local_label(abfd, sym) \
2079 BFD_SEND (abfd, _bfd_is_local_label,(abfd, sym))
fdcb0453
KR
2080#define bfd_canonicalize_symtab(abfd, location) \
2081 BFD_SEND (abfd, _bfd_canonicalize_symtab,\
2082 (abfd, location))
2083boolean
c188b0be 2084bfd_set_symtab PARAMS ((bfd *abfd, asymbol **location, unsigned int count));
fdcb0453
KR
2085
2086void
2087bfd_print_symbol_vandf PARAMS ((PTR file, asymbol *symbol));
2088
2089#define bfd_make_empty_symbol(abfd) \
2090 BFD_SEND (abfd, _bfd_make_empty_symbol, (abfd))
2091#define bfd_make_debug_symbol(abfd,ptr,size) \
2092 BFD_SEND (abfd, _bfd_make_debug_symbol, (abfd, ptr, size))
2093int
2094bfd_decode_symclass PARAMS ((asymbol *symbol));
2095
2096void
2097bfd_symbol_info PARAMS ((asymbol *symbol, symbol_info *ret));
2098
6167a840
JL
2099boolean
2100bfd_copy_private_symbol_data PARAMS ((bfd *ibfd, asymbol *isym, bfd *obfd, asymbol *osym));
2101
2102#define bfd_copy_private_symbol_data(ibfd, isymbol, obfd, osymbol) \
efc2b064 2103 BFD_SEND (obfd, _bfd_copy_private_symbol_data, \
6167a840 2104 (ibfd, isymbol, obfd, osymbol))
fdcb0453
KR
2105struct _bfd
2106{
2107 /* The filename the application opened the BFD with. */
2108 CONST char *filename;
2109
2110 /* A pointer to the target jump table. */
2f3508ad 2111 const struct bfd_target *xvec;
fdcb0453
KR
2112
2113 /* To avoid dragging too many header files into every file that
2114 includes `<<bfd.h>>', IOSTREAM has been declared as a "char
2115 *", and MTIME as a "long". Their correct types, to which they
2116 are cast when used, are "FILE *" and "time_t". The iostream
64d5f5d0
ILT
2117 is the result of an fopen on the filename. However, if the
2118 BFD_IN_MEMORY flag is set, then iostream is actually a pointer
2119 to a bfd_in_memory struct. */
2120 PTR iostream;
fdcb0453 2121
0a197a96
JG
2122 /* Is the file descriptor being cached? That is, can it be closed as
2123 needed, and re-opened when accessed later? */
fdcb0453
KR
2124
2125 boolean cacheable;
2126
2127 /* Marks whether there was a default target specified when the
c188b0be
DM
2128 BFD was opened. This is used to select which matching algorithm
2129 to use to choose the back end. */
fdcb0453
KR
2130
2131 boolean target_defaulted;
2132
2133 /* The caching routines use these to maintain a
2134 least-recently-used list of BFDs */
2135
2136 struct _bfd *lru_prev, *lru_next;
2137
2138 /* When a file is closed by the caching routines, BFD retains
c188b0be 2139 state information on the file here: */
fdcb0453
KR
2140
2141 file_ptr where;
2142
c188b0be 2143 /* and here: (``once'' means at least once) */
fdcb0453
KR
2144
2145 boolean opened_once;
2146
2147 /* Set if we have a locally maintained mtime value, rather than
2148 getting it from the file each time: */
2149
2150 boolean mtime_set;
2151
2152 /* File modified time, if mtime_set is true: */
2153
2154 long mtime;
2155
2156 /* Reserved for an unimplemented file locking extension.*/
2157
2158 int ifd;
2159
c188b0be 2160 /* The format which belongs to the BFD. (object, core, etc.) */
fdcb0453
KR
2161
2162 bfd_format format;
2163
2164 /* The direction the BFD was opened with*/
2165
2166 enum bfd_direction {no_direction = 0,
2167 read_direction = 1,
2168 write_direction = 2,
2169 both_direction = 3} direction;
2170
2171 /* Format_specific flags*/
2172
2173 flagword flags;
2174
2175 /* Currently my_archive is tested before adding origin to
2176 anything. I believe that this can become always an add of
2177 origin, with origin set to 0 for non archive files. */
2178
2179 file_ptr origin;
2180
2181 /* Remember when output has begun, to stop strange things
c188b0be 2182 from happening. */
fdcb0453
KR
2183 boolean output_has_begun;
2184
2185 /* Pointer to linked list of sections*/
2186 struct sec *sections;
2187
2188 /* The number of sections */
2189 unsigned int section_count;
2190
2191 /* Stuff only useful for object files:
2192 The start address. */
2193 bfd_vma start_address;
2194
2195 /* Used for input and output*/
2196 unsigned int symcount;
2197
c188b0be 2198 /* Symbol table for output BFD (with symcount entries) */
fdcb0453
KR
2199 struct symbol_cache_entry **outsymbols;
2200
2201 /* Pointer to structure which contains architecture information*/
2ffbb79a 2202 const struct bfd_arch_info *arch_info;
fdcb0453
KR
2203
2204 /* Stuff only useful for archives:*/
2205 PTR arelt_data;
c188b0be
DM
2206 struct _bfd *my_archive; /* The containing archive BFD. */
2207 struct _bfd *next; /* The next BFD in the archive. */
2208 struct _bfd *archive_head; /* The first BFD in the archive. */
fdcb0453
KR
2209 boolean has_armap;
2210
4c3721d5
ILT
2211 /* A chain of BFD structures involved in a link. */
2212 struct _bfd *link_next;
2213
2214 /* A field used by _bfd_generic_link_add_archive_symbols. This will
2215 be used only for archive elements. */
2216 int archive_pass;
2217
fdcb0453
KR
2218 /* Used by the back end to hold private data. */
2219
2220 union
2221 {
2222 struct aout_data_struct *aout_data;
2223 struct artdata *aout_ar_data;
2224 struct _oasys_data *oasys_obj_data;
2225 struct _oasys_ar_data *oasys_ar_data;
2226 struct coff_tdata *coff_obj_data;
4e98461f 2227 struct pe_tdata *pe_obj_data;
54406786 2228 struct xcoff_tdata *xcoff_obj_data;
fdcb0453
KR
2229 struct ecoff_tdata *ecoff_obj_data;
2230 struct ieee_data_struct *ieee_data;
2231 struct ieee_ar_data_struct *ieee_ar_data;
2232 struct srec_data_struct *srec_data;
ffd15489 2233 struct ihex_data_struct *ihex_data;
fdcb0453
KR
2234 struct tekhex_data_struct *tekhex_data;
2235 struct elf_obj_tdata *elf_obj_data;
c3e964b9 2236 struct nlm_obj_tdata *nlm_obj_data;
fdcb0453
KR
2237 struct bout_data_struct *bout_data;
2238 struct sun_core_struct *sun_core_data;
2239 struct trad_core_struct *trad_core_data;
9e461dac 2240 struct som_data_struct *som_data;
b66b07a2 2241 struct hpux_core_struct *hpux_core_data;
8d12f138 2242 struct hppabsd_core_struct *hppabsd_core_data;
fdcb0453 2243 struct sgi_core_struct *sgi_core_data;
2b91cc45 2244 struct lynx_core_struct *lynx_core_data;
9b3fa589 2245 struct osf_core_struct *osf_core_data;
326e32d7 2246 struct cisco_core_struct *cisco_core_data;
3b1f83ad 2247 struct versados_data_struct *versados_data;
871a3f3b 2248 struct netbsd_core_struct *netbsd_core_data;
fdcb0453
KR
2249 PTR any;
2250 } tdata;
2251
2252 /* Used by the application to hold private data*/
2253 PTR usrdata;
2254
2255 /* Where all the allocated stuff under this BFD goes */
2256 struct obstack memory;
fdcb0453
KR
2257};
2258
0f8f509c
DM
2259typedef enum bfd_error
2260{
d1ad85a6
DM
2261 bfd_error_no_error = 0,
2262 bfd_error_system_call,
2263 bfd_error_invalid_target,
2264 bfd_error_wrong_format,
2265 bfd_error_invalid_operation,
2266 bfd_error_no_memory,
2267 bfd_error_no_symbols,
9675c281 2268 bfd_error_no_armap,
d1ad85a6
DM
2269 bfd_error_no_more_archived_files,
2270 bfd_error_malformed_archive,
2271 bfd_error_file_not_recognized,
2272 bfd_error_file_ambiguously_recognized,
2273 bfd_error_no_contents,
2274 bfd_error_nonrepresentable_section,
2275 bfd_error_no_debug_section,
2276 bfd_error_bad_value,
2277 bfd_error_file_truncated,
5dc8db48 2278 bfd_error_file_too_big,
d1ad85a6
DM
2279 bfd_error_invalid_error_code
2280} bfd_error_type;
2281
2282bfd_error_type
2283bfd_get_error PARAMS ((void));
2284
2285void
2286bfd_set_error PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2287
2288CONST char *
d1ad85a6 2289bfd_errmsg PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2290
2291void
2292bfd_perror PARAMS ((CONST char *message));
2293
3b1f83ad
JL
2294typedef void (*bfd_error_handler_type) PARAMS ((const char *, ...));
2295
2296bfd_error_handler_type
2297bfd_set_error_handler PARAMS ((bfd_error_handler_type));
2298
2299void
2300bfd_set_error_program_name PARAMS ((const char *));
2301
326e32d7 2302long
e2756048
ILT
2303bfd_get_reloc_upper_bound PARAMS ((bfd *abfd, asection *sect));
2304
326e32d7 2305long
e2756048
ILT
2306bfd_canonicalize_reloc
2307 PARAMS ((bfd *abfd,
2308 asection *sec,
2309 arelent **loc,
2310 asymbol **syms));
2311
2312void
2313bfd_set_reloc
2314 PARAMS ((bfd *abfd, asection *sec, arelent **rel, unsigned int count)
2315
2316 );
2317
fdcb0453
KR
2318boolean
2319bfd_set_file_flags PARAMS ((bfd *abfd, flagword flags));
2320
fdcb0453 2321boolean
c188b0be 2322bfd_set_start_address PARAMS ((bfd *abfd, bfd_vma vma));
fdcb0453
KR
2323
2324long
c188b0be 2325bfd_get_mtime PARAMS ((bfd *abfd));
fdcb0453
KR
2326
2327long
c188b0be 2328bfd_get_size PARAMS ((bfd *abfd));
fdcb0453
KR
2329
2330int
c188b0be 2331bfd_get_gp_size PARAMS ((bfd *abfd));
fdcb0453
KR
2332
2333void
c188b0be 2334bfd_set_gp_size PARAMS ((bfd *abfd, int i));
fdcb0453 2335
ef758f3e
KR
2336bfd_vma
2337bfd_scan_vma PARAMS ((CONST char *string, CONST char **end, int base));
2338
5a66538b
KR
2339boolean
2340bfd_copy_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2341
2342#define bfd_copy_private_bfd_data(ibfd, obfd) \
efc2b064 2343 BFD_SEND (obfd, _bfd_copy_private_bfd_data, \
5a66538b 2344 (ibfd, obfd))
3b1f83ad
JL
2345boolean
2346bfd_merge_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2347
2348#define bfd_merge_private_bfd_data(ibfd, obfd) \
efc2b064 2349 BFD_SEND (obfd, _bfd_merge_private_bfd_data, \
3b1f83ad
JL
2350 (ibfd, obfd))
2351boolean
2352bfd_set_private_flags PARAMS ((bfd *abfd, flagword flags));
2353
2354#define bfd_set_private_flags(abfd, flags) \
2355 BFD_SEND (abfd, _bfd_set_private_flags, \
2356 (abfd, flags))
fdcb0453
KR
2357#define bfd_sizeof_headers(abfd, reloc) \
2358 BFD_SEND (abfd, _bfd_sizeof_headers, (abfd, reloc))
2359
2360#define bfd_find_nearest_line(abfd, sec, syms, off, file, func, line) \
2361 BFD_SEND (abfd, _bfd_find_nearest_line, (abfd, sec, syms, off, file, func, line))
2362
2363 /* Do these three do anything useful at all, for any back end? */
2364#define bfd_debug_info_start(abfd) \
2365 BFD_SEND (abfd, _bfd_debug_info_start, (abfd))
2366
2367#define bfd_debug_info_end(abfd) \
2368 BFD_SEND (abfd, _bfd_debug_info_end, (abfd))
2369
2370#define bfd_debug_info_accumulate(abfd, section) \
2371 BFD_SEND (abfd, _bfd_debug_info_accumulate, (abfd, section))
2372
2373
2374#define bfd_stat_arch_elt(abfd, stat) \
2375 BFD_SEND (abfd, _bfd_stat_arch_elt,(abfd, stat))
2376
0822b56d
ILT
2377#define bfd_update_armap_timestamp(abfd) \
2378 BFD_SEND (abfd, _bfd_update_armap_timestamp, (abfd))
2379
fdcb0453
KR
2380#define bfd_set_arch_mach(abfd, arch, mach)\
2381 BFD_SEND ( abfd, _bfd_set_arch_mach, (abfd, arch, mach))
2382
326e32d7
ILT
2383#define bfd_relax_section(abfd, section, link_info, again) \
2384 BFD_SEND (abfd, _bfd_relax_section, (abfd, section, link_info, again))
4c3721d5
ILT
2385
2386#define bfd_link_hash_table_create(abfd) \
2387 BFD_SEND (abfd, _bfd_link_hash_table_create, (abfd))
2388
2389#define bfd_link_add_symbols(abfd, info) \
2390 BFD_SEND (abfd, _bfd_link_add_symbols, (abfd, info))
2391
2392#define bfd_final_link(abfd, info) \
2393 BFD_SEND (abfd, _bfd_final_link, (abfd, info))
fdcb0453 2394
9deaaaf1
ILT
2395#define bfd_free_cached_info(abfd) \
2396 BFD_SEND (abfd, _bfd_free_cached_info, (abfd))
2397
ad46bd1d
ILT
2398#define bfd_get_dynamic_symtab_upper_bound(abfd) \
2399 BFD_SEND (abfd, _bfd_get_dynamic_symtab_upper_bound, (abfd))
2400
4e98461f
SC
2401#define bfd_print_private_bfd_data(abfd, file)\
2402 BFD_SEND (abfd, _bfd_print_private_bfd_data, (abfd, file))
2403
ad46bd1d
ILT
2404#define bfd_canonicalize_dynamic_symtab(abfd, asymbols) \
2405 BFD_SEND (abfd, _bfd_canonicalize_dynamic_symtab, (abfd, asymbols))
2406
2407#define bfd_get_dynamic_reloc_upper_bound(abfd) \
2408 BFD_SEND (abfd, _bfd_get_dynamic_reloc_upper_bound, (abfd))
2409
2410#define bfd_canonicalize_dynamic_reloc(abfd, arels, asyms) \
2411 BFD_SEND (abfd, _bfd_canonicalize_dynamic_reloc, (abfd, arels, asyms))
2412
3b1f83ad
JL
2413extern bfd_byte *bfd_get_relocated_section_contents
2414 PARAMS ((bfd *, struct bfd_link_info *,
2415 struct bfd_link_order *, bfd_byte *,
2416 boolean, asymbol **));
2417
fdcb0453 2418symindex
c188b0be 2419bfd_get_next_mapent PARAMS ((bfd *abfd, symindex previous, carsym **sym));
fdcb0453
KR
2420
2421boolean
2422bfd_set_archive_head PARAMS ((bfd *output, bfd *new_head));
2423
c188b0be 2424bfd *
fdcb0453
KR
2425bfd_openr_next_archived_file PARAMS ((bfd *archive, bfd *previous));
2426
2427CONST char *
c188b0be 2428bfd_core_file_failing_command PARAMS ((bfd *abfd));
fdcb0453
KR
2429
2430int
c188b0be 2431bfd_core_file_failing_signal PARAMS ((bfd *abfd));
fdcb0453
KR
2432
2433boolean
2434core_file_matches_executable_p
2435 PARAMS ((bfd *core_bfd, bfd *exec_bfd));
2436
2437#define BFD_SEND(bfd, message, arglist) \
2438 ((*((bfd)->xvec->message)) arglist)
fdfe2d14
SS
2439
2440#ifdef DEBUG_BFD_SEND
2441#undef BFD_SEND
2442#define BFD_SEND(bfd, message, arglist) \
2443 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2444 ((*((bfd)->xvec->message)) arglist) : \
2445 (bfd_assert (__FILE__,__LINE__), NULL))
2446#endif
fdcb0453
KR
2447#define BFD_SEND_FMT(bfd, message, arglist) \
2448 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist)
fdfe2d14
SS
2449
2450#ifdef DEBUG_BFD_SEND
2451#undef BFD_SEND_FMT
2452#define BFD_SEND_FMT(bfd, message, arglist) \
2453 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2454 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist) : \
2455 (bfd_assert (__FILE__,__LINE__), NULL))
2456#endif
9e461dac
JK
2457enum bfd_flavour {
2458 bfd_target_unknown_flavour,
2459 bfd_target_aout_flavour,
2460 bfd_target_coff_flavour,
2461 bfd_target_ecoff_flavour,
2462 bfd_target_elf_flavour,
2463 bfd_target_ieee_flavour,
2464 bfd_target_nlm_flavour,
2465 bfd_target_oasys_flavour,
2466 bfd_target_tekhex_flavour,
2467 bfd_target_srec_flavour,
ffd15489 2468 bfd_target_ihex_flavour,
d1f8b181 2469 bfd_target_som_flavour,
5dc8db48 2470 bfd_target_os9k_flavour,
9675c281 2471 bfd_target_versados_flavour,
c3d8e071
ILT
2472 bfd_target_msdos_flavour,
2473 bfd_target_evax_flavour
5dc8db48 2474};
4c3721d5 2475
64d5f5d0
ILT
2476enum bfd_endian { BFD_ENDIAN_BIG, BFD_ENDIAN_LITTLE, BFD_ENDIAN_UNKNOWN };
2477
4c3721d5
ILT
2478 /* Forward declaration. */
2479typedef struct bfd_link_info _bfd_link_info;
2480
fdcb0453
KR
2481typedef struct bfd_target
2482{
2483 char *name;
9e461dac 2484 enum bfd_flavour flavour;
64d5f5d0
ILT
2485 enum bfd_endian byteorder;
2486 enum bfd_endian header_byteorder;
fdcb0453
KR
2487 flagword object_flags;
2488 flagword section_flags;
2489 char symbol_leading_char;
2490 char ar_pad_char;
2491 unsigned short ar_max_namelen;
1a973af1
ILT
2492 bfd_vma (*bfd_getx64) PARAMS ((const bfd_byte *));
2493 bfd_signed_vma (*bfd_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2494 void (*bfd_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2495 bfd_vma (*bfd_getx32) PARAMS ((const bfd_byte *));
2496 bfd_signed_vma (*bfd_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2497 void (*bfd_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2498 bfd_vma (*bfd_getx16) PARAMS ((const bfd_byte *));
2499 bfd_signed_vma (*bfd_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2500 void (*bfd_putx16) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2501 bfd_vma (*bfd_h_getx64) PARAMS ((const bfd_byte *));
2502 bfd_signed_vma (*bfd_h_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2503 void (*bfd_h_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2504 bfd_vma (*bfd_h_getx32) PARAMS ((const bfd_byte *));
2505 bfd_signed_vma (*bfd_h_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2506 void (*bfd_h_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2507 bfd_vma (*bfd_h_getx16) PARAMS ((const bfd_byte *));
2508 bfd_signed_vma (*bfd_h_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2509 void (*bfd_h_putx16) PARAMS ((bfd_vma, bfd_byte *));
2f3508ad 2510 const struct bfd_target *(*_bfd_check_format[bfd_type_end]) PARAMS ((bfd *));
fdcb0453
KR
2511 boolean (*_bfd_set_format[bfd_type_end]) PARAMS ((bfd *));
2512 boolean (*_bfd_write_contents[bfd_type_end]) PARAMS ((bfd *));
6812b607
ILT
2513
2514 /* Generic entry points. */
2515#define BFD_JUMP_TABLE_GENERIC(NAME)\
2516CAT(NAME,_close_and_cleanup),\
2517CAT(NAME,_bfd_free_cached_info),\
2518CAT(NAME,_new_section_hook),\
4fe6d901
KR
2519CAT(NAME,_get_section_contents),\
2520CAT(NAME,_get_section_contents_in_window)
2521
6812b607
ILT
2522 /* Called when the BFD is being closed to do any necessary cleanup. */
2523 boolean (*_close_and_cleanup) PARAMS ((bfd *));
2524 /* Ask the BFD to free all cached information. */
2525 boolean (*_bfd_free_cached_info) PARAMS ((bfd *));
2526 /* Called when a new section is created. */
2527 boolean (*_new_section_hook) PARAMS ((bfd *, sec_ptr));
2528 /* Read the contents of a section. */
2529 boolean (*_bfd_get_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2530 file_ptr, bfd_size_type));
4fe6d901
KR
2531 boolean (*_bfd_get_section_contents_in_window)
2532 PARAMS ((bfd *, sec_ptr, bfd_window *,
2533 file_ptr, bfd_size_type));
6812b607
ILT
2534
2535 /* Entry points to copy private data. */
2536#define BFD_JUMP_TABLE_COPY(NAME)\
2537CAT(NAME,_bfd_copy_private_bfd_data),\
3b1f83ad
JL
2538CAT(NAME,_bfd_merge_private_bfd_data),\
2539CAT(NAME,_bfd_copy_private_section_data),\
6167a840 2540CAT(NAME,_bfd_copy_private_symbol_data),\
4e98461f
SC
2541CAT(NAME,_bfd_set_private_flags),\
2542CAT(NAME,_bfd_print_private_bfd_data)\
6812b607
ILT
2543 /* Called to copy BFD general private data from one object file
2544 to another. */
2545 boolean (*_bfd_copy_private_bfd_data) PARAMS ((bfd *, bfd *));
3b1f83ad
JL
2546 /* Called to merge BFD general private data from one object file
2547 to a common output file when linking. */
2548 boolean (*_bfd_merge_private_bfd_data) PARAMS ((bfd *, bfd *));
6812b607
ILT
2549 /* Called to copy BFD private section data from one object file
2550 to another. */
2551 boolean (*_bfd_copy_private_section_data) PARAMS ((bfd *, sec_ptr,
2552 bfd *, sec_ptr));
6167a840
JL
2553 /* Called to copy BFD private symbol data from one symbol
2554 to another. */
2555 boolean (*_bfd_copy_private_symbol_data) PARAMS ((bfd *, asymbol *,
2556 bfd *, asymbol *));
3b1f83ad
JL
2557 /* Called to set private backend flags */
2558 boolean (*_bfd_set_private_flags) PARAMS ((bfd *, flagword));
6812b607 2559
4e98461f 2560 /* Called to print private BFD data */
ae0a6bea 2561 boolean (*_bfd_print_private_bfd_data) PARAMS ((bfd *, PTR));
4e98461f 2562
6812b607
ILT
2563 /* Core file entry points. */
2564#define BFD_JUMP_TABLE_CORE(NAME)\
2565CAT(NAME,_core_file_failing_command),\
2566CAT(NAME,_core_file_failing_signal),\
2567CAT(NAME,_core_file_matches_executable_p)
fdcb0453
KR
2568 char * (*_core_file_failing_command) PARAMS ((bfd *));
2569 int (*_core_file_failing_signal) PARAMS ((bfd *));
2570 boolean (*_core_file_matches_executable_p) PARAMS ((bfd *, bfd *));
6812b607
ILT
2571
2572 /* Archive entry points. */
2573#define BFD_JUMP_TABLE_ARCHIVE(NAME)\
2574CAT(NAME,_slurp_armap),\
2575CAT(NAME,_slurp_extended_name_table),\
fca2b81b 2576CAT(NAME,_construct_extended_name_table),\
6812b607
ILT
2577CAT(NAME,_truncate_arname),\
2578CAT(NAME,_write_armap),\
c53fac12 2579CAT(NAME,_read_ar_hdr),\
6812b607 2580CAT(NAME,_openr_next_archived_file),\
64d5f5d0 2581CAT(NAME,_get_elt_at_index),\
0822b56d
ILT
2582CAT(NAME,_generic_stat_arch_elt),\
2583CAT(NAME,_update_armap_timestamp)
fdcb0453
KR
2584 boolean (*_bfd_slurp_armap) PARAMS ((bfd *));
2585 boolean (*_bfd_slurp_extended_name_table) PARAMS ((bfd *));
fca2b81b
KR
2586 boolean (*_bfd_construct_extended_name_table)
2587 PARAMS ((bfd *, char **, bfd_size_type *, const char **));
fdcb0453
KR
2588 void (*_bfd_truncate_arname) PARAMS ((bfd *, CONST char *, char *));
2589 boolean (*write_armap) PARAMS ((bfd *arch,
2590 unsigned int elength,
2591 struct orl *map,
2592 unsigned int orl_count,
2593 int stridx));
0322af0d 2594 PTR (*_bfd_read_ar_hdr_fn) PARAMS ((bfd *));
0822b56d 2595 bfd * (*openr_next_archived_file) PARAMS ((bfd *arch, bfd *prev));
64d5f5d0
ILT
2596#define bfd_get_elt_at_index(b,i) BFD_SEND(b, _bfd_get_elt_at_index, (b,i))
2597 bfd * (*_bfd_get_elt_at_index) PARAMS ((bfd *, symindex));
0822b56d
ILT
2598 int (*_bfd_stat_arch_elt) PARAMS ((bfd *, struct stat *));
2599 boolean (*_bfd_update_armap_timestamp) PARAMS ((bfd *));
2600
6812b607
ILT
2601 /* Entry points used for symbols. */
2602#define BFD_JUMP_TABLE_SYMBOLS(NAME)\
2603CAT(NAME,_get_symtab_upper_bound),\
2604CAT(NAME,_get_symtab),\
2605CAT(NAME,_make_empty_symbol),\
2606CAT(NAME,_print_symbol),\
2607CAT(NAME,_get_symbol_info),\
2608CAT(NAME,_bfd_is_local_label),\
2609CAT(NAME,_get_lineno),\
2610CAT(NAME,_find_nearest_line),\
e9614321
SC
2611CAT(NAME,_bfd_make_debug_symbol),\
2612CAT(NAME,_read_minisymbols),\
2613CAT(NAME,_minisymbol_to_symbol)
326e32d7
ILT
2614 long (*_bfd_get_symtab_upper_bound) PARAMS ((bfd *));
2615 long (*_bfd_canonicalize_symtab) PARAMS ((bfd *,
2616 struct symbol_cache_entry **));
fdcb0453
KR
2617 struct symbol_cache_entry *
2618 (*_bfd_make_empty_symbol) PARAMS ((bfd *));
2619 void (*_bfd_print_symbol) PARAMS ((bfd *, PTR,
2620 struct symbol_cache_entry *,
2621 bfd_print_symbol_type));
2622#define bfd_print_symbol(b,p,s,e) BFD_SEND(b, _bfd_print_symbol, (b,p,s,e))
2623 void (*_bfd_get_symbol_info) PARAMS ((bfd *,
2624 struct symbol_cache_entry *,
2625 symbol_info *));
2626#define bfd_get_symbol_info(b,p,e) BFD_SEND(b, _bfd_get_symbol_info, (b,p,e))
5a66538b 2627 boolean (*_bfd_is_local_label) PARAMS ((bfd *, asymbol *));
fdcb0453 2628
6812b607 2629 alent * (*_get_lineno) PARAMS ((bfd *, struct symbol_cache_entry *));
fdcb0453
KR
2630 boolean (*_bfd_find_nearest_line) PARAMS ((bfd *abfd,
2631 struct sec *section, struct symbol_cache_entry **symbols,
2632 bfd_vma offset, CONST char **file, CONST char **func,
2633 unsigned int *line));
6812b607
ILT
2634 /* Back-door to allow format-aware applications to create debug symbols
2635 while using BFD for everything else. Currently used by the assembler
2636 when creating COFF files. */
e9614321 2637 asymbol * (*_bfd_make_debug_symbol) PARAMS ((
6812b607
ILT
2638 bfd *abfd,
2639 void *ptr,
2640 unsigned long size));
e9614321
SC
2641#define bfd_read_minisymbols(b, d, m, s) \
2642 BFD_SEND (b, _read_minisymbols, (b, d, m, s))
2643 long (*_read_minisymbols) PARAMS ((bfd *, boolean, PTR *,
2644 unsigned int *));
2645#define bfd_minisymbol_to_symbol(b, d, m, f) \
2646 BFD_SEND (b, _minisymbol_to_symbol, (b, d, m, f))
2647 asymbol *(*_minisymbol_to_symbol) PARAMS ((bfd *, boolean, const PTR,
2648 asymbol *));
fdcb0453 2649
6812b607
ILT
2650 /* Routines for relocs. */
2651#define BFD_JUMP_TABLE_RELOCS(NAME)\
2652CAT(NAME,_get_reloc_upper_bound),\
2653CAT(NAME,_canonicalize_reloc),\
2654CAT(NAME,_bfd_reloc_type_lookup)
2655 long (*_get_reloc_upper_bound) PARAMS ((bfd *, sec_ptr));
2656 long (*_bfd_canonicalize_reloc) PARAMS ((bfd *, sec_ptr, arelent **,
2657 struct symbol_cache_entry **));
2658 /* See documentation on reloc types. */
5dc8db48 2659 reloc_howto_type *
6812b607
ILT
2660 (*reloc_type_lookup) PARAMS ((bfd *abfd,
2661 bfd_reloc_code_real_type code));
fdcb0453 2662
6812b607
ILT
2663 /* Routines used when writing an object file. */
2664#define BFD_JUMP_TABLE_WRITE(NAME)\
2665CAT(NAME,_set_arch_mach),\
2666CAT(NAME,_set_section_contents)
2667 boolean (*_bfd_set_arch_mach) PARAMS ((bfd *, enum bfd_architecture,
2668 unsigned long));
2669 boolean (*_bfd_set_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2670 file_ptr, bfd_size_type));
fdcb0453 2671
6812b607
ILT
2672 /* Routines used by the linker. */
2673#define BFD_JUMP_TABLE_LINK(NAME)\
2674CAT(NAME,_sizeof_headers),\
2675CAT(NAME,_bfd_get_relocated_section_contents),\
2676CAT(NAME,_bfd_relax_section),\
2677CAT(NAME,_bfd_link_hash_table_create),\
2678CAT(NAME,_bfd_link_add_symbols),\
6167a840
JL
2679CAT(NAME,_bfd_final_link),\
2680CAT(NAME,_bfd_link_split_section)
6812b607 2681 int (*_bfd_sizeof_headers) PARAMS ((bfd *, boolean));
fdcb0453 2682 bfd_byte * (*_bfd_get_relocated_section_contents) PARAMS ((bfd *,
4c3721d5
ILT
2683 struct bfd_link_info *, struct bfd_link_order *,
2684 bfd_byte *data, boolean relocateable,
2685 struct symbol_cache_entry **));
fdcb0453
KR
2686
2687 boolean (*_bfd_relax_section) PARAMS ((bfd *, struct sec *,
326e32d7 2688 struct bfd_link_info *, boolean *again));
fdcb0453 2689
ad46bd1d
ILT
2690 /* Create a hash table for the linker. Different backends store
2691 different information in this table. */
2692 struct bfd_link_hash_table *(*_bfd_link_hash_table_create) PARAMS ((bfd *));
2693
2694 /* Add symbols from this object file into the hash table. */
2695 boolean (*_bfd_link_add_symbols) PARAMS ((bfd *, struct bfd_link_info *));
2696
2697 /* Do a link based on the link_order structures attached to each
2698 section of the BFD. */
2699 boolean (*_bfd_final_link) PARAMS ((bfd *, struct bfd_link_info *));
2700
6167a840
JL
2701 /* Should this section be split up into smaller pieces during linking. */
2702 boolean (*_bfd_link_split_section) PARAMS ((bfd *, struct sec *));
2703
ad46bd1d
ILT
2704 /* Routines to handle dynamic symbols and relocs. */
2705#define BFD_JUMP_TABLE_DYNAMIC(NAME)\
2706CAT(NAME,_get_dynamic_symtab_upper_bound),\
2707CAT(NAME,_canonicalize_dynamic_symtab),\
2708CAT(NAME,_get_dynamic_reloc_upper_bound),\
2709CAT(NAME,_canonicalize_dynamic_reloc)
2710 /* Get the amount of memory required to hold the dynamic symbols. */
2711 long (*_bfd_get_dynamic_symtab_upper_bound) PARAMS ((bfd *));
2712 /* Read in the dynamic symbols. */
2713 long (*_bfd_canonicalize_dynamic_symtab)
2714 PARAMS ((bfd *, struct symbol_cache_entry **));
2715 /* Get the amount of memory required to hold the dynamic relocs. */
2716 long (*_bfd_get_dynamic_reloc_upper_bound) PARAMS ((bfd *));
2717 /* Read in the dynamic relocs. */
2718 long (*_bfd_canonicalize_dynamic_reloc)
2719 PARAMS ((bfd *, arelent **, struct symbol_cache_entry **));
4c3721d5 2720
fdcb0453
KR
2721 PTR backend_data;
2722} bfd_target;
2f3508ad 2723const bfd_target *
c188b0be 2724bfd_find_target PARAMS ((CONST char *target_name, bfd *abfd));
fdcb0453 2725
2f3508ad 2726const char **
fdcb0453
KR
2727bfd_target_list PARAMS ((void));
2728
2729boolean
2730bfd_check_format PARAMS ((bfd *abfd, bfd_format format));
2731
aabda2da
DM
2732boolean
2733bfd_check_format_matches PARAMS ((bfd *abfd, bfd_format format, char ***matching));
3b31740c 2734
fdcb0453 2735boolean
c188b0be 2736bfd_set_format PARAMS ((bfd *abfd, bfd_format format));
fdcb0453
KR
2737
2738CONST char *
c188b0be 2739bfd_format_string PARAMS ((bfd_format format));
fdcb0453 2740
815179af
ILT
2741#ifdef __cplusplus
2742}
2743#endif
fdcb0453 2744#endif
This page took 0.312209 seconds and 4 git commands to generate.