update copyright
[deliverable/binutils-gdb.git] / bfd / bfd-in2.h
CommitLineData
fdcb0453 1/* Main header file for the bfd library -- portable access to object files.
56f3b62c 2 Copyright 1990, 91, 92, 93, 94, 95, 96, 1997 Free Software Foundation, Inc.
fdcb0453
KR
3 Contributed by Cygnus Support.
4
b66b07a2
KR
5** NOTE: bfd.h and bfd-in2.h are GENERATED files. Don't change them;
6** instead, change bfd-in.h or the other BFD source files processed to
7** generate these files.
8
fdcb0453
KR
9This file is part of BFD, the Binary File Descriptor library.
10
11This program is free software; you can redistribute it and/or modify
12it under the terms of the GNU General Public License as published by
13the Free Software Foundation; either version 2 of the License, or
14(at your option) any later version.
15
16This program is distributed in the hope that it will be useful,
17but WITHOUT ANY WARRANTY; without even the implied warranty of
18MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19GNU General Public License for more details.
20
21You should have received a copy of the GNU General Public License
22along with this program; if not, write to the Free Software
e9614321 23Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
fdcb0453
KR
24
25/* bfd.h -- The only header file required by users of the bfd library
26
27The bfd.h file is generated from bfd-in.h and various .c files; if you
28change it, your changes will probably be lost.
29
30All the prototypes and definitions following the comment "THE FOLLOWING
31IS EXTRACTED FROM THE SOURCE" are extracted from the source files for
32BFD. If you change it, someone oneday will extract it from the source
33again, and your changes will be lost. To save yourself from this bind,
34change the definitions in the source in the bfd directory. Type "make
35docs" and then "make headers" in that directory, and magically this file
36will change to reflect your changes.
37
38If you don't have the tools to perform the extraction, then you are
39safe from someone on your system trampling over your header files.
40You should still maintain the equivalence between the source and this
41file though; every change you make to the .c file should be reflected
42here. */
43
44#ifndef __BFD_H_SEEN__
45#define __BFD_H_SEEN__
46
815179af
ILT
47#ifdef __cplusplus
48extern "C" {
49#endif
50
fdcb0453
KR
51#include "ansidecl.h"
52#include "obstack.h"
53
5a66538b 54/* These two lines get substitutions done by commands in Makefile.in. */
b7577823 55#define BFD_VERSION "@VERSION@"
f4e14cb9 56#define BFD_ARCH_SIZE @wordsize@
b7577823 57#define BFD_HOST_64BIT_LONG @BFD_HOST_64BIT_LONG@
f4e14cb9
ILT
58#if @BFD_HOST_64_BIT_DEFINED@
59#define BFD_HOST_64_BIT @BFD_HOST_64_BIT@
60#define BFD_HOST_U_64_BIT @BFD_HOST_U_64_BIT@
61#endif
fdcb0453
KR
62
63#if BFD_ARCH_SIZE >= 64
64#define BFD64
65#endif
66
c3e964b9
FF
67#ifndef INLINE
68#if __GNUC__ >= 2
69#define INLINE __inline__
70#else
71#define INLINE
72#endif
73#endif
74
fdcb0453
KR
75/* forward declaration */
76typedef struct _bfd bfd;
77
78/* To squelch erroneous compiler warnings ("illegal pointer
79 combination") from the SVR3 compiler, we would like to typedef
80 boolean to int (it doesn't like functions which return boolean.
81 Making sure they are never implicitly declared to return int
82 doesn't seem to help). But this file is not configured based on
83 the host. */
84/* General rules: functions which are boolean return true on success
85 and false on failure (unless they're a predicate). -- bfd.doc */
86/* I'm sure this is going to break something and someone is going to
87 force me to change it. */
88/* typedef enum boolean {false, true} boolean; */
89/* Yup, SVR4 has a "typedef enum boolean" in <sys/types.h> -fnf */
442da995 90/* It gets worse if the host also defines a true/false enum... -sts */
3b1f83ad
JL
91/* And even worse if your compiler has built-in boolean types... -law */
92#if defined (__GNUG__) && (__GNUC_MINOR__ > 5)
93#define TRUE_FALSE_ALREADY_DEFINED
94#endif
c53fac12
ILT
95#ifdef MPW
96/* Pre-emptive strike - get the file with the enum. */
97#include <Types.h>
98#define TRUE_FALSE_ALREADY_DEFINED
99#endif /* MPW */
442da995 100#ifndef TRUE_FALSE_ALREADY_DEFINED
fdcb0453 101typedef enum bfd_boolean {false, true} boolean;
442da995
SS
102#define BFD_TRUE_FALSE
103#else
e0151f38
SS
104/* Use enum names that will appear nowhere else. */
105typedef enum bfd_boolean {bfd_fffalse, bfd_tttrue} boolean;
442da995 106#endif
fdcb0453
KR
107
108/* A pointer to a position in a file. */
109/* FIXME: This should be using off_t from <sys/types.h>.
110 For now, try to avoid breaking stuff by not including <sys/types.h> here.
111 This will break on systems with 64-bit file offsets (e.g. 4.4BSD).
112 Probably the best long-term answer is to avoid using file_ptr AND off_t
113 in this header file, and to handle this in the BFD implementation
114 rather than in its interface. */
115/* typedef off_t file_ptr; */
116typedef long int file_ptr;
117
0822b56d 118/* Support for different sizes of target format ints and addresses.
b7577823
ILT
119 If the type `long' is at least 64 bits, BFD_HOST_64BIT_LONG will be
120 set to 1 above. Otherwise, if gcc is being used, this code will
f4e14cb9
ILT
121 use gcc's "long long" type. Otherwise, BFD_HOST_64_BIT must be
122 defined above. */
fdcb0453 123
b7577823 124#ifdef BFD64
fdcb0453 125
b7577823
ILT
126#ifndef BFD_HOST_64_BIT
127#if BFD_HOST_64BIT_LONG
128#define BFD_HOST_64_BIT long
f4e14cb9 129#define BFD_HOST_U_64_BIT unsigned long
b7577823
ILT
130#else
131#ifdef __GNUC__
78c3dc5c 132#define BFD_HOST_64_BIT long long
f4e14cb9 133#define BFD_HOST_U_64_BIT unsigned long long
c3d8e071
ILT
134#else /* ! defined (__GNUC__) */
135 #error No 64 bit integer type available
136#endif /* ! defined (__GNUC__) */
b7577823
ILT
137#endif /* ! BFD_HOST_64BIT_LONG */
138#endif /* ! defined (BFD_HOST_64_BIT) */
fa5ba217 139
f4e14cb9 140typedef BFD_HOST_U_64_BIT bfd_vma;
78c3dc5c 141typedef BFD_HOST_64_BIT bfd_signed_vma;
f4e14cb9
ILT
142typedef BFD_HOST_U_64_BIT bfd_size_type;
143typedef BFD_HOST_U_64_BIT symvalue;
b7577823 144
7e7fb4a8 145#ifndef fprintf_vma
b7577823
ILT
146#if BFD_HOST_64BIT_LONG
147#define sprintf_vma(s,x) sprintf (s, "%016lx", x)
148#define fprintf_vma(f,x) fprintf (f, "%016lx", x)
149#else
150#define _bfd_int64_low(x) ((unsigned long) (((x) & 0xffffffff)))
151#define _bfd_int64_high(x) ((unsigned long) (((x) >> 32) & 0xffffffff))
fdcb0453 152#define fprintf_vma(s,x) \
b7577823 153 fprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
fa5ba217 154#define sprintf_vma(s,x) \
b7577823 155 sprintf ((s), "%08lx%08lx", _bfd_int64_high (x), _bfd_int64_low (x))
7e7fb4a8 156#endif
b7577823
ILT
157#endif
158
fdcb0453
KR
159#else /* not BFD64 */
160
161/* Represent a target address. Also used as a generic unsigned type
162 which is guaranteed to be big enough to hold any arithmetic types
163 we need to deal with. */
164typedef unsigned long bfd_vma;
165
166/* A generic signed type which is guaranteed to be big enough to hold any
167 arithmetic types we need to deal with. Can be assumed to be compatible
168 with bfd_vma in the same way that signed and unsigned ints are compatible
169 (as parameters, in assignment, etc). */
170typedef long bfd_signed_vma;
171
172typedef unsigned long symvalue;
173typedef unsigned long bfd_size_type;
174
175/* Print a bfd_vma x on stream s. */
176#define fprintf_vma(s,x) fprintf(s, "%08lx", x)
fa5ba217 177#define sprintf_vma(s,x) sprintf(s, "%08lx", x)
fdcb0453
KR
178#endif /* not BFD64 */
179#define printf_vma(x) fprintf_vma(stdout,x)
180
181typedef unsigned int flagword; /* 32 bits of flags */
5dc8db48 182typedef unsigned char bfd_byte;
fdcb0453
KR
183\f
184/** File formats */
185
186typedef enum bfd_format {
187 bfd_unknown = 0, /* file format is unknown */
188 bfd_object, /* linker/assember/compiler output */
189 bfd_archive, /* object archive file */
190 bfd_core, /* core dump */
191 bfd_type_end} /* marks the end; don't use it! */
192 bfd_format;
193
9e461dac
JK
194/* Values that may appear in the flags field of a BFD. These also
195 appear in the object_flags field of the bfd_target structure, where
196 they indicate the set of flags used by that backend (not all flags
197 are meaningful for all object file formats) (FIXME: at the moment,
198 the object_flags values have mostly just been copied from backend
199 to another, and are not necessarily correct). */
200
201/* No flags. */
2055bf85 202#define BFD_NO_FLAGS 0x00
9e461dac
JK
203
204/* BFD contains relocation entries. */
fdcb0453 205#define HAS_RELOC 0x01
9e461dac
JK
206
207/* BFD is directly executable. */
fdcb0453 208#define EXEC_P 0x02
9e461dac
JK
209
210/* BFD has line number information (basically used for F_LNNO in a
211 COFF header). */
fdcb0453 212#define HAS_LINENO 0x04
9e461dac
JK
213
214/* BFD has debugging information. */
fdcb0453 215#define HAS_DEBUG 0x08
9e461dac
JK
216
217/* BFD has symbols. */
fdcb0453 218#define HAS_SYMS 0x10
9e461dac
JK
219
220/* BFD has local symbols (basically used for F_LSYMS in a COFF
221 header). */
fdcb0453 222#define HAS_LOCALS 0x20
9e461dac
JK
223
224/* BFD is a dynamic object. */
fdcb0453 225#define DYNAMIC 0x40
9e461dac
JK
226
227/* Text section is write protected (if D_PAGED is not set, this is
228 like an a.out NMAGIC file) (the linker sets this by default, but
229 clears it for -r or -N). */
fdcb0453 230#define WP_TEXT 0x80
9e461dac
JK
231
232/* BFD is dynamically paged (this is like an a.out ZMAGIC file) (the
233 linker sets this by default, but clears it for -r or -n or -N). */
fdcb0453 234#define D_PAGED 0x100
9e461dac
JK
235
236/* BFD is relaxable (this means that bfd_relax_section may be able to
0822b56d
ILT
237 do something) (sometimes bfd_relax_section can do something even if
238 this is not set). */
fdcb0453 239#define BFD_IS_RELAXABLE 0x200
a7ff9b80
ILT
240
241/* This may be set before writing out a BFD to request using a
242 traditional format. For example, this is used to request that when
243 writing out an a.out object the symbols not be hashed to eliminate
244 duplicates. */
245#define BFD_TRADITIONAL_FORMAT 0x400
64d5f5d0
ILT
246
247/* This flag indicates that the BFD contents are actually cached in
248 memory. If this is set, iostream points to a bfd_in_memory struct. */
249#define BFD_IN_MEMORY 0x800
fdcb0453
KR
250\f
251/* symbols and relocation */
252
0f8f509c 253/* A count of carsyms (canonical archive symbols). */
fdcb0453
KR
254typedef unsigned long symindex;
255
5dc8db48
KR
256/* How to perform a relocation. */
257typedef const struct reloc_howto_struct reloc_howto_type;
258
fdcb0453
KR
259#define BFD_NO_MORE_SYMBOLS ((symindex) ~0)
260
0f8f509c
DM
261/* General purpose part of a symbol X;
262 target specific parts are in libcoff.h, libaout.h, etc. */
fdcb0453
KR
263
264#define bfd_get_section(x) ((x)->section)
265#define bfd_get_output_section(x) ((x)->section->output_section)
266#define bfd_set_section(x,y) ((x)->section) = (y)
267#define bfd_asymbol_base(x) ((x)->section->vma)
268#define bfd_asymbol_value(x) (bfd_asymbol_base(x) + (x)->value)
269#define bfd_asymbol_name(x) ((x)->name)
270/*Perhaps future: #define bfd_asymbol_bfd(x) ((x)->section->owner)*/
271#define bfd_asymbol_bfd(x) ((x)->the_bfd)
272#define bfd_asymbol_flavour(x) (bfd_asymbol_bfd(x)->xvec->flavour)
273
0f8f509c 274/* A canonical archive symbol. */
fdcb0453
KR
275/* This is a type pun with struct ranlib on purpose! */
276typedef struct carsym {
277 char *name;
278 file_ptr file_offset; /* look here to find the file */
279} carsym; /* to make these you call a carsymogen */
280
281
0f8f509c
DM
282/* Used in generating armaps (archive tables of contents).
283 Perhaps just a forward definition would do? */
fdcb0453
KR
284struct orl { /* output ranlib */
285 char **name; /* symbol name */
286 file_ptr pos; /* bfd* or file position */
287 int namidx; /* index into string table */
288};
fdcb0453
KR
289\f
290
291/* Linenumber stuff */
292typedef struct lineno_cache_entry {
293 unsigned int line_number; /* Linenumber from start of function*/
294 union {
0f8f509c 295 struct symbol_cache_entry *sym; /* Function name */
fdcb0453
KR
296 unsigned long offset; /* Offset into section */
297 } u;
298} alent;
299\f
300/* object and core file sections */
301
fdcb0453
KR
302#define align_power(addr, align) \
303 ( ((addr) + ((1<<(align))-1)) & (-1 << (align)))
304
305typedef struct sec *sec_ptr;
306
307#define bfd_get_section_name(bfd, ptr) ((ptr)->name + 0)
308#define bfd_get_section_vma(bfd, ptr) ((ptr)->vma + 0)
309#define bfd_get_section_alignment(bfd, ptr) ((ptr)->alignment_power + 0)
310#define bfd_section_name(bfd, ptr) ((ptr)->name)
311#define bfd_section_size(bfd, ptr) (bfd_get_section_size_before_reloc(ptr))
312#define bfd_section_vma(bfd, ptr) ((ptr)->vma)
313#define bfd_section_alignment(bfd, ptr) ((ptr)->alignment_power)
314#define bfd_get_section_flags(bfd, ptr) ((ptr)->flags + 0)
315#define bfd_get_section_userdata(bfd, ptr) ((ptr)->userdata)
316
317#define bfd_is_com_section(ptr) (((ptr)->flags & SEC_IS_COMMON) != 0)
318
e0151f38 319#define bfd_set_section_vma(bfd, ptr, val) (((ptr)->vma = (ptr)->lma= (val)), ((ptr)->user_set_vma = (boolean)true), true)
6167a840
JL
320#define bfd_set_section_alignment(bfd, ptr, val) (((ptr)->alignment_power = (val)),true)
321#define bfd_set_section_userdata(bfd, ptr, val) (((ptr)->userdata = (val)),true)
fdcb0453
KR
322
323typedef struct stat stat_type;
324\f
fdcb0453
KR
325typedef enum bfd_print_symbol
326{
327 bfd_print_symbol_name,
328 bfd_print_symbol_more,
329 bfd_print_symbol_all
330} bfd_print_symbol_type;
331
fdcb0453
KR
332/* Information about a symbol that nm needs. */
333
334typedef struct _symbol_info
335{
336 symvalue value;
0f8f509c 337 char type;
fdcb0453 338 CONST char *name; /* Symbol name. */
64d5f5d0
ILT
339 unsigned char stab_type; /* Stab type. */
340 char stab_other; /* Stab other. */
341 short stab_desc; /* Stab desc. */
342 CONST char *stab_name; /* String for stab type. */
fdcb0453 343} symbol_info;
7ec49f91
ILT
344
345/* Get the name of a stabs type code. */
346
347extern const char *bfd_get_stab_name PARAMS ((int));
fdcb0453 348\f
4c3721d5
ILT
349/* Hash table routines. There is no way to free up a hash table. */
350
351/* An element in the hash table. Most uses will actually use a larger
352 structure, and an instance of this will be the first field. */
353
354struct bfd_hash_entry
355{
356 /* Next entry for this hash code. */
357 struct bfd_hash_entry *next;
358 /* String being hashed. */
359 const char *string;
360 /* Hash code. This is the full hash code, not the index into the
361 table. */
362 unsigned long hash;
363};
364
365/* A hash table. */
366
367struct bfd_hash_table
368{
369 /* The hash array. */
370 struct bfd_hash_entry **table;
371 /* The number of slots in the hash table. */
372 unsigned int size;
373 /* A function used to create new elements in the hash table. The
374 first entry is itself a pointer to an element. When this
375 function is first invoked, this pointer will be NULL. However,
376 having the pointer permits a hierarchy of method functions to be
377 built each of which calls the function in the superclass. Thus
378 each function should be written to allocate a new block of memory
379 only if the argument is NULL. */
380 struct bfd_hash_entry *(*newfunc) PARAMS ((struct bfd_hash_entry *,
381 struct bfd_hash_table *,
382 const char *));
383 /* An obstack for this hash table. */
384 struct obstack memory;
385};
386
387/* Initialize a hash table. */
388extern boolean bfd_hash_table_init
389 PARAMS ((struct bfd_hash_table *,
390 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
391 struct bfd_hash_table *,
392 const char *)));
393
394/* Initialize a hash table specifying a size. */
395extern boolean bfd_hash_table_init_n
396 PARAMS ((struct bfd_hash_table *,
397 struct bfd_hash_entry *(*) (struct bfd_hash_entry *,
398 struct bfd_hash_table *,
399 const char *),
400 unsigned int size));
401
402/* Free up a hash table. */
403extern void bfd_hash_table_free PARAMS ((struct bfd_hash_table *));
404
405/* Look up a string in a hash table. If CREATE is true, a new entry
406 will be created for this string if one does not already exist. The
407 COPY argument must be true if this routine should copy the string
408 into newly allocated memory when adding an entry. */
409extern struct bfd_hash_entry *bfd_hash_lookup
410 PARAMS ((struct bfd_hash_table *, const char *, boolean create,
411 boolean copy));
412
b7577823
ILT
413/* Replace an entry in a hash table. */
414extern void bfd_hash_replace
415 PARAMS ((struct bfd_hash_table *, struct bfd_hash_entry *old,
416 struct bfd_hash_entry *nw));
417
4c3721d5
ILT
418/* Base method for creating a hash table entry. */
419extern struct bfd_hash_entry *bfd_hash_newfunc
420 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *,
421 const char *));
422
423/* Grab some space for a hash table entry. */
966e0a16
ILT
424extern PTR bfd_hash_allocate PARAMS ((struct bfd_hash_table *,
425 unsigned int));
4c3721d5
ILT
426
427/* Traverse a hash table in a random order, calling a function on each
428 element. If the function returns false, the traversal stops. The
429 INFO argument is passed to the function. */
430extern void bfd_hash_traverse PARAMS ((struct bfd_hash_table *,
431 boolean (*) (struct bfd_hash_entry *,
432 PTR),
433 PTR info));
434\f
c3e964b9
FF
435/* Semi-portable string concatenation in cpp.
436 The CAT4 hack is to avoid a problem with some strict ANSI C preprocessors.
437 The problem is, "32_" is not a valid preprocessing token, and we don't
438 want extra underscores (e.g., "nlm_32_"). The XCAT2 macro will cause the
439 inner CAT macros to be evaluated first, producing still-valid pp-tokens.
440 Then the final concatenation can be done. (Sigh.) */
fdcb0453 441#ifndef CAT
c3e964b9
FF
442#ifdef SABER
443#define CAT(a,b) a##b
444#define CAT3(a,b,c) a##b##c
445#define CAT4(a,b,c,d) a##b##c##d
446#else
442da995 447#if defined(__STDC__) || defined(ALMOST_STDC)
fdcb0453
KR
448#define CAT(a,b) a##b
449#define CAT3(a,b,c) a##b##c
c3e964b9
FF
450#define XCAT2(a,b) CAT(a,b)
451#define CAT4(a,b,c,d) XCAT2(CAT(a,b),CAT(c,d))
fdcb0453
KR
452#else
453#define CAT(a,b) a/**/b
454#define CAT3(a,b,c) a/**/b/**/c
c3e964b9
FF
455#define CAT4(a,b,c,d) a/**/b/**/c/**/d
456#endif
fdcb0453
KR
457#endif
458#endif
459
fdcb0453 460#define COFF_SWAP_TABLE (PTR) &bfd_coff_std_swap_table
fdcb0453
KR
461\f
462/* User program access to BFD facilities */
463
0822b56d
ILT
464/* Direct I/O routines, for programs which know more about the object
465 file than BFD does. Use higher level routines if possible. */
466
467extern bfd_size_type bfd_read
468 PARAMS ((PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
469extern bfd_size_type bfd_write
470 PARAMS ((const PTR, bfd_size_type size, bfd_size_type nitems, bfd *abfd));
d80ebaac 471extern int bfd_seek PARAMS ((bfd *abfd, file_ptr fp, int direction));
0822b56d
ILT
472extern long bfd_tell PARAMS ((bfd *abfd));
473extern int bfd_flush PARAMS ((bfd *abfd));
474extern int bfd_stat PARAMS ((bfd *abfd, struct stat *));
475
018dafca 476
fdcb0453
KR
477/* Cast from const char * to char * so that caller can assign to
478 a char * without a warning. */
479#define bfd_get_filename(abfd) ((char *) (abfd)->filename)
0a197a96 480#define bfd_get_cacheable(abfd) ((abfd)->cacheable)
fdcb0453
KR
481#define bfd_get_format(abfd) ((abfd)->format)
482#define bfd_get_target(abfd) ((abfd)->xvec->name)
9e461dac 483#define bfd_get_flavour(abfd) ((abfd)->xvec->flavour)
64d5f5d0
ILT
484#define bfd_big_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_BIG)
485#define bfd_little_endian(abfd) ((abfd)->xvec->byteorder == BFD_ENDIAN_LITTLE)
486#define bfd_header_big_endian(abfd) \
487 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_BIG)
488#define bfd_header_little_endian(abfd) \
489 ((abfd)->xvec->header_byteorder == BFD_ENDIAN_LITTLE)
fdcb0453
KR
490#define bfd_get_file_flags(abfd) ((abfd)->flags)
491#define bfd_applicable_file_flags(abfd) ((abfd)->xvec->object_flags)
492#define bfd_applicable_section_flags(abfd) ((abfd)->xvec->section_flags)
493#define bfd_my_archive(abfd) ((abfd)->my_archive)
494#define bfd_has_map(abfd) ((abfd)->has_armap)
fdcb0453
KR
495
496#define bfd_valid_reloc_types(abfd) ((abfd)->xvec->valid_reloc_types)
497#define bfd_usrdata(abfd) ((abfd)->usrdata)
498
499#define bfd_get_start_address(abfd) ((abfd)->start_address)
500#define bfd_get_symcount(abfd) ((abfd)->symcount)
501#define bfd_get_outsymbols(abfd) ((abfd)->outsymbols)
502#define bfd_count_sections(abfd) ((abfd)->section_count)
fdcb0453
KR
503
504#define bfd_get_symbol_leading_char(abfd) ((abfd)->xvec->symbol_leading_char)
505
e0151f38 506#define bfd_set_cacheable(abfd,bool) (((abfd)->cacheable = (boolean)(bool)), true)
0a197a96 507
ae0a6bea
ILT
508extern boolean bfd_record_phdr
509 PARAMS ((bfd *, unsigned long, boolean, flagword, boolean, bfd_vma,
510 boolean, boolean, unsigned int, struct sec **));
511
2b91cc45
SG
512/* Byte swapping routines. */
513
1a973af1
ILT
514bfd_vma bfd_getb64 PARAMS ((const unsigned char *));
515bfd_vma bfd_getl64 PARAMS ((const unsigned char *));
516bfd_signed_vma bfd_getb_signed_64 PARAMS ((const unsigned char *));
517bfd_signed_vma bfd_getl_signed_64 PARAMS ((const unsigned char *));
518bfd_vma bfd_getb32 PARAMS ((const unsigned char *));
519bfd_vma bfd_getl32 PARAMS ((const unsigned char *));
520bfd_signed_vma bfd_getb_signed_32 PARAMS ((const unsigned char *));
521bfd_signed_vma bfd_getl_signed_32 PARAMS ((const unsigned char *));
522bfd_vma bfd_getb16 PARAMS ((const unsigned char *));
523bfd_vma bfd_getl16 PARAMS ((const unsigned char *));
524bfd_signed_vma bfd_getb_signed_16 PARAMS ((const unsigned char *));
525bfd_signed_vma bfd_getl_signed_16 PARAMS ((const unsigned char *));
2b91cc45
SG
526void bfd_putb64 PARAMS ((bfd_vma, unsigned char *));
527void bfd_putl64 PARAMS ((bfd_vma, unsigned char *));
528void bfd_putb32 PARAMS ((bfd_vma, unsigned char *));
529void bfd_putl32 PARAMS ((bfd_vma, unsigned char *));
530void bfd_putb16 PARAMS ((bfd_vma, unsigned char *));
531void bfd_putl16 PARAMS ((bfd_vma, unsigned char *));
c16313f0
ILT
532\f
533/* Externally visible ECOFF routines. */
2b91cc45 534
442da995 535#if defined(__STDC__) || defined(ALMOST_STDC)
8d12f138
ILT
536struct ecoff_debug_info;
537struct ecoff_debug_swap;
538struct ecoff_extr;
539struct symbol_cache_entry;
7e7fb4a8 540struct bfd_link_info;
28a0c103 541struct bfd_link_hash_entry;
8d12f138 542#endif
c16313f0
ILT
543extern bfd_vma bfd_ecoff_get_gp_value PARAMS ((bfd * abfd));
544extern boolean bfd_ecoff_set_gp_value PARAMS ((bfd *abfd, bfd_vma gp_value));
545extern boolean bfd_ecoff_set_regmasks
546 PARAMS ((bfd *abfd, unsigned long gprmask, unsigned long fprmask,
547 unsigned long *cprmask));
7e7fb4a8 548extern PTR bfd_ecoff_debug_init
8d12f138 549 PARAMS ((bfd *output_bfd, struct ecoff_debug_info *output_debug,
7e7fb4a8
KR
550 const struct ecoff_debug_swap *output_swap,
551 struct bfd_link_info *));
552extern void bfd_ecoff_debug_free
553 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
554 const struct ecoff_debug_swap *output_swap,
555 struct bfd_link_info *));
556extern boolean bfd_ecoff_debug_accumulate
557 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
8d12f138
ILT
558 const struct ecoff_debug_swap *output_swap,
559 bfd *input_bfd, struct ecoff_debug_info *input_debug,
560 const struct ecoff_debug_swap *input_swap,
7e7fb4a8
KR
561 struct bfd_link_info *));
562extern boolean bfd_ecoff_debug_accumulate_other
563 PARAMS ((PTR handle, bfd *output_bfd, struct ecoff_debug_info *output_debug,
564 const struct ecoff_debug_swap *output_swap, bfd *input_bfd,
565 struct bfd_link_info *));
8d12f138
ILT
566extern boolean bfd_ecoff_debug_externals
567 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
568 const struct ecoff_debug_swap *swap,
569 boolean relocateable,
570 boolean (*get_extr) (struct symbol_cache_entry *,
571 struct ecoff_extr *),
572 void (*set_index) (struct symbol_cache_entry *,
573 bfd_size_type)));
966e0a16
ILT
574extern boolean bfd_ecoff_debug_one_external
575 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
576 const struct ecoff_debug_swap *swap,
577 const char *name, struct ecoff_extr *esym));
8d12f138
ILT
578extern bfd_size_type bfd_ecoff_debug_size
579 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
580 const struct ecoff_debug_swap *swap));
581extern boolean bfd_ecoff_write_debug
582 PARAMS ((bfd *abfd, struct ecoff_debug_info *debug,
583 const struct ecoff_debug_swap *swap, file_ptr where));
7e7fb4a8
KR
584extern boolean bfd_ecoff_write_accumulated_debug
585 PARAMS ((PTR handle, bfd *abfd, struct ecoff_debug_info *debug,
586 const struct ecoff_debug_swap *swap,
587 struct bfd_link_info *info, file_ptr where));
82b1edf7
KR
588extern boolean bfd_mips_ecoff_create_embedded_relocs
589 PARAMS ((bfd *, struct bfd_link_info *, struct sec *, struct sec *,
590 char **));
8d12f138 591
013dec1a
ILT
592/* Externally visible ELF routines. */
593
54406786 594struct bfd_link_needed_list
b176e1e9 595{
54406786 596 struct bfd_link_needed_list *next;
b176e1e9
ILT
597 bfd *by;
598 const char *name;
599};
54406786
ILT
600
601extern boolean bfd_elf32_record_link_assignment
602 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
603extern boolean bfd_elf64_record_link_assignment
604 PARAMS ((bfd *, struct bfd_link_info *, const char *, boolean));
605extern struct bfd_link_needed_list *bfd_elf_get_needed_list
b176e1e9 606 PARAMS ((bfd *, struct bfd_link_info *));
013dec1a 607extern boolean bfd_elf32_size_dynamic_sections
148437ec
ILT
608 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
609 const char *, struct bfd_link_info *, struct sec **));
013dec1a 610extern boolean bfd_elf64_size_dynamic_sections
148437ec
ILT
611 PARAMS ((bfd *, const char *, const char *, boolean, const char *,
612 const char *, struct bfd_link_info *, struct sec **));
c1f84521 613extern void bfd_elf_set_dt_needed_name PARAMS ((bfd *, const char *));
871a3f3b 614extern const char *bfd_elf_get_dt_soname PARAMS ((bfd *));
013dec1a 615
a7ff9b80
ILT
616/* SunOS shared library support routines for the linker. */
617
28a0c103
ILT
618extern struct bfd_link_needed_list *bfd_sunos_get_needed_list
619 PARAMS ((bfd *, struct bfd_link_info *));
a7ff9b80
ILT
620extern boolean bfd_sunos_record_link_assignment
621 PARAMS ((bfd *, struct bfd_link_info *, const char *));
622extern boolean bfd_sunos_size_dynamic_sections
623 PARAMS ((bfd *, struct bfd_link_info *, struct sec **, struct sec **,
624 struct sec **));
625
04003b57
ILT
626/* Linux shared library support routines for the linker. */
627
7ec49f91
ILT
628extern boolean bfd_i386linux_size_dynamic_sections
629 PARAMS ((bfd *, struct bfd_link_info *));
630extern boolean bfd_m68klinux_size_dynamic_sections
04003b57
ILT
631 PARAMS ((bfd *, struct bfd_link_info *));
632
4fe6d901
KR
633/* mmap hacks */
634
635struct _bfd_window_internal;
636typedef struct _bfd_window_internal bfd_window_internal;
637
638typedef struct _bfd_window {
639 /* What the user asked for. */
640 PTR data;
641 bfd_size_type size;
642 /* The actual window used by BFD. Small user-requested read-only
643 regions sharing a page may share a single window into the object
644 file. Read-write versions shouldn't until I've fixed things to
645 keep track of which portions have been claimed by the
646 application; don't want to give the same region back when the
647 application wants two writable copies! */
648 struct _bfd_window_internal *i;
649} bfd_window;
650
092abcdf
ILT
651extern void bfd_init_window PARAMS ((bfd_window *));
652extern void bfd_free_window PARAMS ((bfd_window *));
653extern boolean bfd_get_file_window
0bb8ff19 654 PARAMS ((bfd *, file_ptr, bfd_size_type, bfd_window *, boolean));
4fe6d901 655
28a0c103
ILT
656/* XCOFF support routines for the linker. */
657
2d7de17d
ILT
658extern boolean bfd_xcoff_link_record_set
659 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
660 bfd_size_type));
28a0c103
ILT
661extern boolean bfd_xcoff_import_symbol
662 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
663 bfd_vma, const char *, const char *, const char *));
664extern boolean bfd_xcoff_export_symbol
665 PARAMS ((bfd *, struct bfd_link_info *, struct bfd_link_hash_entry *,
666 boolean));
2d7de17d
ILT
667extern boolean bfd_xcoff_link_count_reloc
668 PARAMS ((bfd *, struct bfd_link_info *, const char *));
669extern boolean bfd_xcoff_record_link_assignment
670 PARAMS ((bfd *, struct bfd_link_info *, const char *));
28a0c103
ILT
671extern boolean bfd_xcoff_size_dynamic_sections
672 PARAMS ((bfd *, struct bfd_link_info *, const char *, const char *,
673 unsigned long, unsigned long, unsigned long, boolean,
4a4a66bd 674 int, boolean, boolean, struct sec **));
28a0c103 675
c3d8e071
ILT
676/* Externally visible COFF routines. */
677
678#if defined(__STDC__) || defined(ALMOST_STDC)
679struct internal_syment;
680union internal_auxent;
681#endif
682
683extern boolean bfd_coff_get_syment
684 PARAMS ((bfd *, struct symbol_cache_entry *, struct internal_syment *));
685extern boolean bfd_coff_get_auxent
686 PARAMS ((bfd *, struct symbol_cache_entry *, int, union internal_auxent *));
687
fdcb0453
KR
688/* And more from the source. */
689void
690bfd_init PARAMS ((void));
691
692bfd *
c188b0be 693bfd_openr PARAMS ((CONST char *filename, CONST char *target));
fdcb0453
KR
694
695bfd *
696bfd_fdopenr PARAMS ((CONST char *filename, CONST char *target, int fd));
697
8a51b06c
ILT
698bfd *
699bfd_openstreamr PARAMS (());
700
fdcb0453
KR
701bfd *
702bfd_openw PARAMS ((CONST char *filename, CONST char *target));
703
704boolean
c188b0be 705bfd_close PARAMS ((bfd *abfd));
fdcb0453
KR
706
707boolean
708bfd_close_all_done PARAMS ((bfd *));
709
710bfd_size_type
711bfd_alloc_size PARAMS ((bfd *abfd));
712
713bfd *
10bd43a8 714bfd_create PARAMS ((CONST char *filename, bfd *templ));
fdcb0453
KR
715
716
717 /* Byte swapping macros for user section data. */
718
719#define bfd_put_8(abfd, val, ptr) \
e2756048 720 (*((unsigned char *)(ptr)) = (unsigned char)(val))
fdcb0453
KR
721#define bfd_put_signed_8 \
722 bfd_put_8
723#define bfd_get_8(abfd, ptr) \
724 (*(unsigned char *)(ptr))
725#define bfd_get_signed_8(abfd, ptr) \
726 ((*(unsigned char *)(ptr) ^ 0x80) - 0x80)
727
728#define bfd_put_16(abfd, val, ptr) \
729 BFD_SEND(abfd, bfd_putx16, ((val),(ptr)))
730#define bfd_put_signed_16 \
731 bfd_put_16
732#define bfd_get_16(abfd, ptr) \
733 BFD_SEND(abfd, bfd_getx16, (ptr))
734#define bfd_get_signed_16(abfd, ptr) \
735 BFD_SEND (abfd, bfd_getx_signed_16, (ptr))
736
737#define bfd_put_32(abfd, val, ptr) \
738 BFD_SEND(abfd, bfd_putx32, ((val),(ptr)))
739#define bfd_put_signed_32 \
740 bfd_put_32
741#define bfd_get_32(abfd, ptr) \
742 BFD_SEND(abfd, bfd_getx32, (ptr))
743#define bfd_get_signed_32(abfd, ptr) \
744 BFD_SEND(abfd, bfd_getx_signed_32, (ptr))
745
746#define bfd_put_64(abfd, val, ptr) \
747 BFD_SEND(abfd, bfd_putx64, ((val), (ptr)))
748#define bfd_put_signed_64 \
749 bfd_put_64
750#define bfd_get_64(abfd, ptr) \
751 BFD_SEND(abfd, bfd_getx64, (ptr))
752#define bfd_get_signed_64(abfd, ptr) \
753 BFD_SEND(abfd, bfd_getx_signed_64, (ptr))
754
755
756 /* Byte swapping macros for file header data. */
757
758#define bfd_h_put_8(abfd, val, ptr) \
759 bfd_put_8 (abfd, val, ptr)
760#define bfd_h_put_signed_8(abfd, val, ptr) \
761 bfd_put_8 (abfd, val, ptr)
762#define bfd_h_get_8(abfd, ptr) \
763 bfd_get_8 (abfd, ptr)
764#define bfd_h_get_signed_8(abfd, ptr) \
765 bfd_get_signed_8 (abfd, ptr)
766
767#define bfd_h_put_16(abfd, val, ptr) \
768 BFD_SEND(abfd, bfd_h_putx16,(val,ptr))
769#define bfd_h_put_signed_16 \
770 bfd_h_put_16
771#define bfd_h_get_16(abfd, ptr) \
772 BFD_SEND(abfd, bfd_h_getx16,(ptr))
773#define bfd_h_get_signed_16(abfd, ptr) \
774 BFD_SEND(abfd, bfd_h_getx_signed_16, (ptr))
775
776#define bfd_h_put_32(abfd, val, ptr) \
777 BFD_SEND(abfd, bfd_h_putx32,(val,ptr))
778#define bfd_h_put_signed_32 \
779 bfd_h_put_32
780#define bfd_h_get_32(abfd, ptr) \
781 BFD_SEND(abfd, bfd_h_getx32,(ptr))
782#define bfd_h_get_signed_32(abfd, ptr) \
783 BFD_SEND(abfd, bfd_h_getx_signed_32, (ptr))
784
785#define bfd_h_put_64(abfd, val, ptr) \
786 BFD_SEND(abfd, bfd_h_putx64,(val, ptr))
787#define bfd_h_put_signed_64 \
788 bfd_h_put_64
789#define bfd_h_get_64(abfd, ptr) \
790 BFD_SEND(abfd, bfd_h_getx64,(ptr))
791#define bfd_h_get_signed_64(abfd, ptr) \
792 BFD_SEND(abfd, bfd_h_getx_signed_64, (ptr))
793
57a1867e 794typedef struct sec
fdcb0453 795{
c188b0be 796 /* The name of the section; the name isn't a copy, the pointer is
fdcb0453
KR
797 the same as that passed to bfd_make_section. */
798
799 CONST char *name;
800
c188b0be 801 /* Which section is it; 0..nth. */
fdcb0453 802
57a1867e 803 int index;
fdcb0453
KR
804
805 /* The next section in the list belonging to the BFD, or NULL. */
806
807 struct sec *next;
808
c188b0be 809 /* The field flags contains attributes of the section. Some
fdcb0453 810 flags are read in from the object file, and some are
57a1867e 811 synthesized from other information. */
fdcb0453
KR
812
813 flagword flags;
814
815#define SEC_NO_FLAGS 0x000
816
c188b0be
DM
817 /* Tells the OS to allocate space for this section when loading.
818 This is clear for a section containing debug information
fdcb0453 819 only. */
fdcb0453 820#define SEC_ALLOC 0x001
57a1867e 821
fdcb0453 822 /* Tells the OS to load the section from the file when loading.
c188b0be 823 This is clear for a .bss section. */
fdcb0453 824#define SEC_LOAD 0x002
ef758f3e 825
c188b0be
DM
826 /* The section contains data still to be relocated, so there is
827 some relocation information too. */
fdcb0453
KR
828#define SEC_RELOC 0x004
829
b2ae9efb 830#if 0 /* Obsolete ? */
fdcb0453 831#define SEC_BALIGN 0x008
b2ae9efb 832#endif
fdcb0453
KR
833
834 /* A signal to the OS that the section contains read only
835 data. */
836#define SEC_READONLY 0x010
837
838 /* The section contains code only. */
fdcb0453
KR
839#define SEC_CODE 0x020
840
841 /* The section contains data only. */
b2ae9efb 842#define SEC_DATA 0x040
fdcb0453
KR
843
844 /* The section will reside in ROM. */
fdcb0453
KR
845#define SEC_ROM 0x080
846
847 /* The section contains constructor information. This section
848 type is used by the linker to create lists of constructors and
849 destructors used by <<g++>>. When a back end sees a symbol
850 which should be used in a constructor list, it creates a new
c188b0be
DM
851 section for the type of name (e.g., <<__CTOR_LIST__>>), attaches
852 the symbol to it, and builds a relocation. To build the lists
bc750ff1 853 of constructors, all the linker has to do is catenate all the
c188b0be 854 sections called <<__CTOR_LIST__>> and relocate the data
fdcb0453
KR
855 contained within - exactly the operations it would peform on
856 standard data. */
fdcb0453
KR
857#define SEC_CONSTRUCTOR 0x100
858
859 /* The section is a constuctor, and should be placed at the
b2ae9efb 860 end of the text, data, or bss section(?). */
fdcb0453 861#define SEC_CONSTRUCTOR_TEXT 0x1100
fdcb0453 862#define SEC_CONSTRUCTOR_DATA 0x2100
fdcb0453
KR
863#define SEC_CONSTRUCTOR_BSS 0x3100
864
865 /* The section has contents - a data section could be
c188b0be 866 <<SEC_ALLOC>> | <<SEC_HAS_CONTENTS>>; a debug section could be
fdcb0453 867 <<SEC_HAS_CONTENTS>> */
fdcb0453
KR
868#define SEC_HAS_CONTENTS 0x200
869
c188b0be 870 /* An instruction to the linker to not output the section
c16313f0 871 even if it has information which would normally be written. */
fdcb0453
KR
872#define SEC_NEVER_LOAD 0x400
873
c16313f0
ILT
874 /* The section is a COFF shared library section. This flag is
875 only for the linker. If this type of section appears in
876 the input file, the linker must copy it to the output file
877 without changing the vma or size. FIXME: Although this
878 was originally intended to be general, it really is COFF
879 specific (and the flag was renamed to indicate this). It
880 might be cleaner to have some more general mechanism to
881 allow the back end to control what the linker does with
882 sections. */
883#define SEC_COFF_SHARED_LIBRARY 0x800
fdcb0453 884
5a28331f 885 /* The section contains common symbols (symbols may be defined
fdcb0453
KR
886 multiple times, the value of a symbol is the amount of
887 space it requires, and the largest symbol value is the one
b2ae9efb 888 used). Most targets have exactly one of these (which we
1fb83be6 889 translate to bfd_com_section_ptr), but ECOFF has two. */
fdcb0453
KR
890#define SEC_IS_COMMON 0x8000
891
9b3fa589
JK
892 /* The section contains only debugging information. For
893 example, this is set for ELF .debug and .stab sections.
894 strip tests this flag to see if a section can be
895 discarded. */
896#define SEC_DEBUGGING 0x10000
897
fdfe2d14
SS
898 /* The contents of this section are held in memory pointed to
899 by the contents field. This is checked by
900 bfd_get_section_contents, and the data is retrieved from
901 memory if appropriate. */
902#define SEC_IN_MEMORY 0x20000
903
83f4323e
MM
904 /* The contents of this section are to be excluded by the
905 linker for executable and shared objects unless those
906 objects are to be further relocated. */
907#define SEC_EXCLUDE 0x40000
908
909 /* The contents of this section are to be sorted by the
910 based on the address specified in the associated symbol
911 table. */
912#define SEC_SORT_ENTRIES 0x80000
913
5a28331f
ILT
914 /* When linking, duplicate sections of the same name should be
915 discarded, rather than being combined into a single section as
916 is usually done. This is similar to how common symbols are
917 handled. See SEC_LINK_DUPLICATES below. */
918#define SEC_LINK_ONCE 0x100000
919
920 /* If SEC_LINK_ONCE is set, this bitfield describes how the linker
921 should handle duplicate sections. */
922#define SEC_LINK_DUPLICATES 0x600000
923
924 /* This value for SEC_LINK_DUPLICATES means that duplicate
925 sections with the same name should simply be discarded. */
926#define SEC_LINK_DUPLICATES_DISCARD 0x0
927
928 /* This value for SEC_LINK_DUPLICATES means that the linker
929 should warn if there are any duplicate sections, although
930 it should still only link one copy. */
931#define SEC_LINK_DUPLICATES_ONE_ONLY 0x200000
932
933 /* This value for SEC_LINK_DUPLICATES means that the linker
934 should warn if any duplicate sections are a different size. */
935#define SEC_LINK_DUPLICATES_SAME_SIZE 0x400000
936
937 /* This value for SEC_LINK_DUPLICATES means that the linker
938 should warn if any duplicate sections contain different
939 contents. */
940#define SEC_LINK_DUPLICATES_SAME_CONTENTS 0x600000
941
ff12f303
ILT
942 /* This section was created by the linker as part of dynamic
943 relocation or other arcane processing. It is skipped when
944 going through the first-pass output, trusting that someone
945 else up the line will take care of it later. */
946#define SEC_LINKER_CREATED 0x800000
947
b2ae9efb
KR
948 /* End of section flags. */
949
ff0e4a93
ILT
950 /* Some internal packed boolean fields. */
951
952 /* See the vma field. */
953 unsigned int user_set_vma : 1;
954
955 /* Whether relocations have been processed. */
956 unsigned int reloc_done : 1;
957
958 /* A mark flag used by some of the linker backends. */
959 unsigned int linker_mark : 1;
960
961 /* End of internal packed boolean fields. */
962
fdcb0453 963 /* The virtual memory address of the section - where it will be
b2ae9efb
KR
964 at run time. The symbols are relocated against this. The
965 user_set_vma flag is maintained by bfd; if it's not set, the
966 backend can assign addresses (for example, in <<a.out>>, where
967 the default address for <<.data>> is dependent on the specific
968 target and various flags). */
ef758f3e 969
fdcb0453
KR
970 bfd_vma vma;
971
972 /* The load address of the section - where it would be in a
c188b0be 973 rom image; really only used for writing section header
b2ae9efb 974 information. */
ef758f3e 975
fdcb0453
KR
976 bfd_vma lma;
977
fdcb0453 978 /* The size of the section in bytes, as it will be output.
c188b0be 979 contains a value even if the section has no contents (e.g., the
fdcb0453
KR
980 size of <<.bss>>). This will be filled in after relocation */
981
57a1867e 982 bfd_size_type _cooked_size;
fdcb0453 983
c188b0be 984 /* The original size on disk of the section, in bytes. Normally this
fdcb0453
KR
985 value is the same as the size, but if some relaxing has
986 been done, then this value will be bigger. */
987
57a1867e 988 bfd_size_type _raw_size;
fdcb0453
KR
989
990 /* If this section is going to be output, then this value is the
991 offset into the output section of the first byte in the input
c188b0be 992 section. E.g., if this was going to start at the 100th byte in
fdcb0453
KR
993 the output section, this value would be 100. */
994
995 bfd_vma output_offset;
996
997 /* The output section through which to map on output. */
998
999 struct sec *output_section;
1000
c188b0be
DM
1001 /* The alignment requirement of the section, as an exponent of 2 -
1002 e.g., 3 aligns to 2^3 (or 8). */
fdcb0453
KR
1003
1004 unsigned int alignment_power;
1005
1006 /* If an input section, a pointer to a vector of relocation
1007 records for the data in this section. */
1008
1009 struct reloc_cache_entry *relocation;
1010
1011 /* If an output section, a pointer to a vector of pointers to
1012 relocation records for the data in this section. */
1013
1014 struct reloc_cache_entry **orelocation;
1015
1016 /* The number of relocation records in one of the above */
1017
1018 unsigned reloc_count;
1019
1020 /* Information below is back end specific - and not always used
ef758f3e 1021 or updated. */
fdcb0453 1022
ef758f3e 1023 /* File position of section data */
fdcb0453 1024
57a1867e
DM
1025 file_ptr filepos;
1026
fdcb0453
KR
1027 /* File position of relocation info */
1028
1029 file_ptr rel_filepos;
1030
1031 /* File position of line data */
1032
1033 file_ptr line_filepos;
1034
1035 /* Pointer to data for applications */
1036
1037 PTR userdata;
1038
fdfe2d14
SS
1039 /* If the SEC_IN_MEMORY flag is set, this points to the actual
1040 contents. */
1041 unsigned char *contents;
fdcb0453
KR
1042
1043 /* Attached line number information */
1044
1045 alent *lineno;
57a1867e 1046
fdcb0453
KR
1047 /* Number of line number records */
1048
1049 unsigned int lineno_count;
1050
1051 /* When a section is being output, this value changes as more
1052 linenumbers are written out */
1053
1054 file_ptr moving_line_filepos;
1055
c188b0be 1056 /* What the section number is in the target world */
fdcb0453
KR
1057
1058 int target_index;
1059
1060 PTR used_by_bfd;
1061
1062 /* If this is a constructor section then here is a list of the
1063 relocations created to relocate items within it. */
1064
1065 struct relent_chain *constructor_chain;
1066
1067 /* The BFD which owns the section. */
1068
1069 bfd *owner;
1070
fdcb0453 1071 /* A symbol which points at this section only */
57a1867e 1072 struct symbol_cache_entry *symbol;
fdcb0453 1073 struct symbol_cache_entry **symbol_ptr_ptr;
ef758f3e 1074
4c3721d5
ILT
1075 struct bfd_link_order *link_order_head;
1076 struct bfd_link_order *link_order_tail;
fdcb0453
KR
1077} asection ;
1078
b2ae9efb
KR
1079 /* These sections are global, and are managed by BFD. The application
1080 and target back end are not permitted to change the values in
1fb83be6
KR
1081 these sections. New code should use the section_ptr macros rather
1082 than referring directly to the const sections. The const sections
1083 may eventually vanish. */
fdcb0453
KR
1084#define BFD_ABS_SECTION_NAME "*ABS*"
1085#define BFD_UND_SECTION_NAME "*UND*"
1086#define BFD_COM_SECTION_NAME "*COM*"
1087#define BFD_IND_SECTION_NAME "*IND*"
1088
1089 /* the absolute section */
1fb83be6
KR
1090extern const asection bfd_abs_section;
1091#define bfd_abs_section_ptr ((asection *) &bfd_abs_section)
1092#define bfd_is_abs_section(sec) ((sec) == bfd_abs_section_ptr)
fdcb0453 1093 /* Pointer to the undefined section */
1fb83be6
KR
1094extern const asection bfd_und_section;
1095#define bfd_und_section_ptr ((asection *) &bfd_und_section)
1096#define bfd_is_und_section(sec) ((sec) == bfd_und_section_ptr)
fdcb0453 1097 /* Pointer to the common section */
1fb83be6
KR
1098extern const asection bfd_com_section;
1099#define bfd_com_section_ptr ((asection *) &bfd_com_section)
fdcb0453 1100 /* Pointer to the indirect section */
1fb83be6
KR
1101extern const asection bfd_ind_section;
1102#define bfd_ind_section_ptr ((asection *) &bfd_ind_section)
1103#define bfd_is_ind_section(sec) ((sec) == bfd_ind_section_ptr)
1104
1105extern const struct symbol_cache_entry * const bfd_abs_symbol;
1106extern const struct symbol_cache_entry * const bfd_com_symbol;
1107extern const struct symbol_cache_entry * const bfd_und_symbol;
1108extern const struct symbol_cache_entry * const bfd_ind_symbol;
fdcb0453
KR
1109#define bfd_get_section_size_before_reloc(section) \
1110 (section->reloc_done ? (abort(),1): (section)->_raw_size)
1111#define bfd_get_section_size_after_reloc(section) \
1112 ((section->reloc_done) ? (section)->_cooked_size: (abort(),1))
1113asection *
1114bfd_get_section_by_name PARAMS ((bfd *abfd, CONST char *name));
1115
1116asection *
c188b0be 1117bfd_make_section_old_way PARAMS ((bfd *abfd, CONST char *name));
fdcb0453 1118
9b3fa589 1119asection *
c188b0be 1120bfd_make_section_anyway PARAMS ((bfd *abfd, CONST char *name));
9b3fa589
JK
1121
1122asection *
fdcb0453
KR
1123bfd_make_section PARAMS ((bfd *, CONST char *name));
1124
1125boolean
c188b0be 1126bfd_set_section_flags PARAMS ((bfd *abfd, asection *sec, flagword flags));
fdcb0453
KR
1127
1128void
1129bfd_map_over_sections PARAMS ((bfd *abfd,
1130 void (*func)(bfd *abfd,
1131 asection *sect,
1132 PTR obj),
1133 PTR obj));
1134
1135boolean
c188b0be 1136bfd_set_section_size PARAMS ((bfd *abfd, asection *sec, bfd_size_type val));
fdcb0453
KR
1137
1138boolean
1139bfd_set_section_contents
57a1867e 1140 PARAMS ((bfd *abfd,
fdcb0453
KR
1141 asection *section,
1142 PTR data,
1143 file_ptr offset,
1144 bfd_size_type count));
1145
1146boolean
57a1867e 1147bfd_get_section_contents
fdcb0453
KR
1148 PARAMS ((bfd *abfd, asection *section, PTR location,
1149 file_ptr offset, bfd_size_type count));
1150
5a66538b
KR
1151boolean
1152bfd_copy_private_section_data PARAMS ((bfd *ibfd, asection *isec, bfd *obfd, asection *osec));
1153
1154#define bfd_copy_private_section_data(ibfd, isection, obfd, osection) \
efc2b064 1155 BFD_SEND (obfd, _bfd_copy_private_section_data, \
5a66538b 1156 (ibfd, isection, obfd, osection))
fdcb0453
KR
1157enum bfd_architecture
1158{
1159 bfd_arch_unknown, /* File arch not known */
1160 bfd_arch_obscure, /* Arch known, not one of these */
1161 bfd_arch_m68k, /* Motorola 68xxx */
1162 bfd_arch_vax, /* DEC Vax */
1163 bfd_arch_i960, /* Intel 960 */
1164 /* The order of the following is important.
1165 lower number indicates a machine type that
1166 only accepts a subset of the instructions
1167 available to machines with higher numbers.
1168 The exception is the "ca", which is
1169 incompatible with all other machines except
1170 "core". */
1171
1172#define bfd_mach_i960_core 1
1173#define bfd_mach_i960_ka_sa 2
1174#define bfd_mach_i960_kb_sb 3
1175#define bfd_mach_i960_mc 4
1176#define bfd_mach_i960_xa 5
1177#define bfd_mach_i960_ca 6
047c57ac 1178#define bfd_mach_i960_jx 7
cbe75cb6 1179#define bfd_mach_i960_hx 8
fdcb0453
KR
1180
1181 bfd_arch_a29k, /* AMD 29000 */
1182 bfd_arch_sparc, /* SPARC */
5bc513b4 1183#define bfd_mach_sparc 1
cbe75cb6 1184 /* The difference between v8plus and v9 is that v9 is a true 64 bit env. */
d1f74cd2
DE
1185#define bfd_mach_sparc_sparclet 2
1186#define bfd_mach_sparc_sparclite 3
1187#define bfd_mach_sparc_v8plus 4
1188#define bfd_mach_sparc_v8plusa 5 /* with ultrasparc add'ns */
1189#define bfd_mach_sparc_v9 6
1190#define bfd_mach_sparc_v9a 7 /* with ultrasparc add'ns */
049f3d4c 1191 /* Nonzero if MACH has the v9 instruction set. */
d1f74cd2
DE
1192#define bfd_mach_sparc_v9_p(mach) \
1193 ((mach) >= bfd_mach_sparc_v8plus && (mach) <= bfd_mach_sparc_v9a)
fdcb0453
KR
1194 bfd_arch_mips, /* MIPS Rxxxx */
1195 bfd_arch_i386, /* Intel 386 */
3cc21bf6
SG
1196#define bfd_mach_i386_i386 0
1197#define bfd_mach_i386_i8086 1
fdcb0453
KR
1198 bfd_arch_we32k, /* AT&T WE32xxx */
1199 bfd_arch_tahoe, /* CCI/Harris Tahoe */
1200 bfd_arch_i860, /* Intel 860 */
1201 bfd_arch_romp, /* IBM ROMP PC/RT */
1202 bfd_arch_alliant, /* Alliant */
1203 bfd_arch_convex, /* Convex */
1204 bfd_arch_m88k, /* Motorola 88xxx */
1205 bfd_arch_pyramid, /* Pyramid Technology */
1206 bfd_arch_h8300, /* Hitachi H8/300 */
1207#define bfd_mach_h8300 1
1208#define bfd_mach_h8300h 2
34255b70 1209#define bfd_mach_h8300s 3
d1ad85a6 1210 bfd_arch_powerpc, /* PowerPC */
fdcb0453
KR
1211 bfd_arch_rs6000, /* IBM RS/6000 */
1212 bfd_arch_hppa, /* HP PA RISC */
f4e14cb9 1213 /* start-sanitize-d10v */
50bd50d4 1214 bfd_arch_d10v, /* Mitsubishi D10V */
f4e14cb9 1215 /* end-sanitize-d10v */
fdcb0453
KR
1216 bfd_arch_z8k, /* Zilog Z8000 */
1217#define bfd_mach_z8001 1
1218#define bfd_mach_z8002 2
1219 bfd_arch_h8500, /* Hitachi H8/500 */
1220 bfd_arch_sh, /* Hitachi SH */
1221 bfd_arch_alpha, /* Dec Alpha */
d80ebaac 1222 bfd_arch_arm, /* Advanced Risc Machines ARM */
1fb83be6 1223 bfd_arch_ns32k, /* National Semiconductors ns32000 */
d468a149 1224 bfd_arch_w65, /* WDC 65816 */
fc46a9ec
FF
1225 /* start-sanitize-tic80 */
1226 bfd_arch_tic80, /* TI TMS320c80 (MVP) */
1227 /* end-sanitize-tic80 */
c86158e5
ILT
1228 /* start-sanitize-v850 */
1229 bfd_arch_v850, /* NEC V850 */
1230 /* end-sanitize-v850 */
05cedcf6
DE
1231 /* start-sanitize-arc */
1232 bfd_arch_arc, /* Argonaut RISC Core */
c932fd96
DE
1233#define bfd_mach_arc_base 0
1234#define bfd_mach_arc_host 1
1235#define bfd_mach_arc_graphics 2
1236#define bfd_mach_arc_audio 3
05cedcf6 1237 /* end-sanitize-arc */
00d7a64b
JL
1238 /* start-sanitize-m32r */
1239 bfd_arch_m32r, /* Mitsubishi M32R */
1240 /* end-sanitize-m32r */
ae1b99e4
JL
1241 bfd_arch_mn10200, /* Matsushita MN10200 */
1242 bfd_arch_mn10300, /* Matsushita MN10300 */
fdcb0453
KR
1243 bfd_arch_last
1244 };
1245
1246typedef struct bfd_arch_info
1247{
1248 int bits_per_word;
1249 int bits_per_address;
1250 int bits_per_byte;
1251 enum bfd_architecture arch;
ae115e51 1252 unsigned long mach;
2ffbb79a
ILT
1253 const char *arch_name;
1254 const char *printable_name;
fdcb0453
KR
1255 unsigned int section_align_power;
1256 /* true if this is the default machine for the architecture */
1257 boolean the_default;
2ffbb79a
ILT
1258 const struct bfd_arch_info * (*compatible)
1259 PARAMS ((const struct bfd_arch_info *a,
1260 const struct bfd_arch_info *b));
1261
1262 boolean (*scan) PARAMS ((const struct bfd_arch_info *, const char *));
1263
1264 const struct bfd_arch_info *next;
fdcb0453 1265} bfd_arch_info_type;
2ffbb79a 1266const char *
fdcb0453
KR
1267bfd_printable_name PARAMS ((bfd *abfd));
1268
2ffbb79a
ILT
1269const bfd_arch_info_type *
1270bfd_scan_arch PARAMS ((const char *string));
fdcb0453 1271
2ffbb79a 1272const bfd_arch_info_type *
fdcb0453 1273bfd_arch_get_compatible PARAMS ((
2ffbb79a
ILT
1274 const bfd *abfd,
1275 const bfd *bbfd));
fdcb0453
KR
1276
1277void
2ffbb79a 1278bfd_set_arch_info PARAMS ((bfd *abfd, const bfd_arch_info_type *arg));
fdcb0453
KR
1279
1280enum bfd_architecture
1281bfd_get_arch PARAMS ((bfd *abfd));
1282
1283unsigned long
1284bfd_get_mach PARAMS ((bfd *abfd));
1285
1286unsigned int
1287bfd_arch_bits_per_byte PARAMS ((bfd *abfd));
1288
1289unsigned int
1290bfd_arch_bits_per_address PARAMS ((bfd *abfd));
1291
2ffbb79a 1292const bfd_arch_info_type *
c188b0be 1293bfd_get_arch_info PARAMS ((bfd *abfd));
fdcb0453 1294
2ffbb79a 1295const bfd_arch_info_type *
fdcb0453
KR
1296bfd_lookup_arch
1297 PARAMS ((enum bfd_architecture
1298 arch,
ae115e51 1299 unsigned long machine));
fdcb0453 1300
2ffbb79a 1301const char *
fdcb0453
KR
1302bfd_printable_arch_mach
1303 PARAMS ((enum bfd_architecture arch, unsigned long machine));
1304
57a1867e 1305typedef enum bfd_reloc_status
fdcb0453
KR
1306{
1307 /* No errors detected */
1308 bfd_reloc_ok,
1309
1310 /* The relocation was performed, but there was an overflow. */
1311 bfd_reloc_overflow,
1312
1313 /* The address to relocate was not within the section supplied. */
1314 bfd_reloc_outofrange,
1315
1316 /* Used by special functions */
1317 bfd_reloc_continue,
1318
c188b0be 1319 /* Unsupported relocation size requested. */
fdcb0453
KR
1320 bfd_reloc_notsupported,
1321
c188b0be 1322 /* Unused */
fdcb0453
KR
1323 bfd_reloc_other,
1324
1325 /* The symbol to relocate against was undefined. */
1326 bfd_reloc_undefined,
1327
1328 /* The relocation was performed, but may not be ok - presently
1329 generated only when linking i960 coff files with i960 b.out
4c3721d5
ILT
1330 symbols. If this type is returned, the error_message argument
1331 to bfd_perform_relocation will be set. */
fdcb0453
KR
1332 bfd_reloc_dangerous
1333 }
1334 bfd_reloc_status_type;
1335
1336
57a1867e 1337typedef struct reloc_cache_entry
fdcb0453
KR
1338{
1339 /* A pointer into the canonical table of pointers */
1340 struct symbol_cache_entry **sym_ptr_ptr;
1341
1342 /* offset in section */
1343 bfd_size_type address;
1344
1345 /* addend for relocation value */
57a1867e 1346 bfd_vma addend;
fdcb0453
KR
1347
1348 /* Pointer to how to perform the required relocation */
5dc8db48 1349 reloc_howto_type *howto;
fdcb0453
KR
1350
1351} arelent;
66a277ab
ILT
1352enum complain_overflow
1353{
1354 /* Do not complain on overflow. */
1355 complain_overflow_dont,
1356
1357 /* Complain if the bitfield overflows, whether it is considered
1358 as signed or unsigned. */
1359 complain_overflow_bitfield,
1360
1361 /* Complain if the value overflows when considered as signed
1362 number. */
1363 complain_overflow_signed,
1364
1365 /* Complain if the value overflows when considered as an
1366 unsigned number. */
1367 complain_overflow_unsigned
1368};
fdcb0453 1369
1fb83be6 1370struct reloc_howto_struct
57a1867e 1371{
fdcb0453 1372 /* The type field has mainly a documetary use - the back end can
c188b0be
DM
1373 do what it wants with it, though normally the back end's
1374 external idea of what a reloc number is stored
1375 in this field. For example, a PC relative word relocation
1376 in a coff environment has the type 023 - because that's
fdcb0453
KR
1377 what the outside world calls a R_PCRWORD reloc. */
1378 unsigned int type;
1379
1380 /* The value the final relocation is shifted right by. This drops
1381 unwanted data from the relocation. */
1382 unsigned int rightshift;
1383
9e461dac 1384 /* The size of the item to be relocated. This is *not* a
4c3721d5
ILT
1385 power-of-two measure. To get the number of bytes operated
1386 on by a type of relocation, use bfd_get_reloc_size. */
fdcb0453
KR
1387 int size;
1388
66a277ab
ILT
1389 /* The number of bits in the item to be relocated. This is used
1390 when doing overflow checking. */
fdcb0453
KR
1391 unsigned int bitsize;
1392
1393 /* Notes that the relocation is relative to the location in the
1394 data section of the addend. The relocation function will
1395 subtract from the relocation value the address of the location
1396 being relocated. */
1397 boolean pc_relative;
1398
66a277ab
ILT
1399 /* The bit position of the reloc value in the destination.
1400 The relocated value is left shifted by this amount. */
fdcb0453
KR
1401 unsigned int bitpos;
1402
66a277ab
ILT
1403 /* What type of overflow error should be checked for when
1404 relocating. */
1405 enum complain_overflow complain_on_overflow;
fdcb0453
KR
1406
1407 /* If this field is non null, then the supplied function is
1408 called rather than the normal function. This allows really
1409 strange relocation methods to be accomodated (e.g., i960 callj
1410 instructions). */
57a1867e 1411 bfd_reloc_status_type (*special_function)
fdcb0453
KR
1412 PARAMS ((bfd *abfd,
1413 arelent *reloc_entry,
1414 struct symbol_cache_entry *symbol,
1415 PTR data,
57a1867e 1416 asection *input_section,
4c3721d5
ILT
1417 bfd *output_bfd,
1418 char **error_message));
fdcb0453
KR
1419
1420 /* The textual name of the relocation type. */
1421 char *name;
1422
1423 /* When performing a partial link, some formats must modify the
1424 relocations rather than the data - this flag signals this.*/
1425 boolean partial_inplace;
1426
c188b0be 1427 /* The src_mask selects which parts of the read in data
fdcb0453
KR
1428 are to be used in the relocation sum. E.g., if this was an 8 bit
1429 bit of data which we read and relocated, this would be
1430 0x000000ff. When we have relocs which have an addend, such as
1431 sun4 extended relocs, the value in the offset part of a
1432 relocating field is garbage so we never use it. In this case
1433 the mask would be 0x00000000. */
1434 bfd_vma src_mask;
1435
c188b0be 1436 /* The dst_mask selects which parts of the instruction are replaced
fdcb0453
KR
1437 into the instruction. In most cases src_mask == dst_mask,
1438 except in the above special case, where dst_mask would be
1439 0x000000ff, and src_mask would be 0x00000000. */
57a1867e 1440 bfd_vma dst_mask;
fdcb0453
KR
1441
1442 /* When some formats create PC relative instructions, they leave
1443 the value of the pc of the place being relocated in the offset
1444 slot of the instruction, so that a PC relative relocation can
1445 be made just by adding in an ordinary offset (e.g., sun3 a.out).
1446 Some formats leave the displacement part of an instruction
c188b0be 1447 empty (e.g., m88k bcs); this flag signals the fact.*/
fdcb0453
KR
1448 boolean pcrel_offset;
1449
1fb83be6 1450};
66a277ab 1451#define HOWTO(C, R,S,B, P, BI, O, SF, NAME, INPLACE, MASKSRC, MASKDST, PC) \
b5b056fc 1452 {(unsigned)C,R,S,B, P, BI, O,SF,NAME,INPLACE,MASKSRC,MASKDST,PC}
66a277ab 1453#define NEWHOWTO( FUNCTION, NAME,SIZE,REL,IN) HOWTO(0,0,SIZE,0,REL,0,complain_overflow_dont,FUNCTION, NAME,false,0,0,IN)
fdcb0453
KR
1454
1455#define HOWTO_PREPARE(relocation, symbol) \
1456 { \
1457 if (symbol != (asymbol *)NULL) { \
1458 if (bfd_is_com_section (symbol->section)) { \
1459 relocation = 0; \
1460 } \
1461 else { \
1462 relocation = symbol->value; \
1463 } \
1464 } \
57a1867e 1465}
4c3721d5 1466int
82b1edf7 1467bfd_get_reloc_size PARAMS ((reloc_howto_type *));
4c3721d5 1468
fdcb0453
KR
1469typedef struct relent_chain {
1470 arelent relent;
1471 struct relent_chain *next;
1472} arelent_chain;
1473bfd_reloc_status_type
1474
1475bfd_perform_relocation
c188b0be 1476 PARAMS ((bfd *abfd,
fdcb0453
KR
1477 arelent *reloc_entry,
1478 PTR data,
1479 asection *input_section,
4c3721d5
ILT
1480 bfd *output_bfd,
1481 char **error_message));
fdcb0453 1482
fca2b81b
KR
1483bfd_reloc_status_type
1484
1485bfd_install_relocation
1486 PARAMS ((bfd *abfd,
1487 arelent *reloc_entry,
1488 PTR data, bfd_vma data_start,
1489 asection *input_section,
1490 char **error_message));
1491
0443af31
KR
1492enum bfd_reloc_code_real {
1493 _dummy_first_bfd_reloc_code_real,
1494
1495
1496/* Basic absolute relocations of N bits. */
fa5ba217 1497 BFD_RELOC_64,
fa5ba217 1498 BFD_RELOC_32,
e9c6595d 1499 BFD_RELOC_26,
57a1867e 1500 BFD_RELOC_16,
7e7fb4a8 1501 BFD_RELOC_14,
fdcb0453 1502 BFD_RELOC_8,
9e461dac 1503
0443af31
KR
1504/* PC-relative relocations. Sometimes these are relative to the address
1505of the relocation itself; sometimes they are relative to the start of
1506the section containing the relocation. It depends on the specific target.
1507
1508The 24-bit relocation is used in some Intel 960 configurations. */
9e461dac
JK
1509 BFD_RELOC_64_PCREL,
1510 BFD_RELOC_32_PCREL,
0443af31 1511 BFD_RELOC_24_PCREL,
9e461dac 1512 BFD_RELOC_16_PCREL,
fca2b81b 1513 BFD_RELOC_12_PCREL,
fdcb0453 1514 BFD_RELOC_8_PCREL,
9e461dac 1515
3b1f83ad
JL
1516/* For ELF. */
1517 BFD_RELOC_32_GOT_PCREL,
1518 BFD_RELOC_16_GOT_PCREL,
1519 BFD_RELOC_8_GOT_PCREL,
1520 BFD_RELOC_32_GOTOFF,
1521 BFD_RELOC_16_GOTOFF,
02f85cda
MM
1522 BFD_RELOC_LO16_GOTOFF,
1523 BFD_RELOC_HI16_GOTOFF,
1524 BFD_RELOC_HI16_S_GOTOFF,
3b1f83ad
JL
1525 BFD_RELOC_8_GOTOFF,
1526 BFD_RELOC_32_PLT_PCREL,
02f85cda 1527 BFD_RELOC_24_PLT_PCREL,
3b1f83ad
JL
1528 BFD_RELOC_16_PLT_PCREL,
1529 BFD_RELOC_8_PLT_PCREL,
1530 BFD_RELOC_32_PLTOFF,
1531 BFD_RELOC_16_PLTOFF,
02f85cda
MM
1532 BFD_RELOC_LO16_PLTOFF,
1533 BFD_RELOC_HI16_PLTOFF,
1534 BFD_RELOC_HI16_S_PLTOFF,
3b1f83ad
JL
1535 BFD_RELOC_8_PLTOFF,
1536
1537/* Relocations used by 68K ELF. */
1538 BFD_RELOC_68K_GLOB_DAT,
1539 BFD_RELOC_68K_JMP_SLOT,
1540 BFD_RELOC_68K_RELATIVE,
1541
0443af31 1542/* Linkage-table relative. */
9e461dac
JK
1543 BFD_RELOC_32_BASEREL,
1544 BFD_RELOC_16_BASEREL,
02f85cda
MM
1545 BFD_RELOC_LO16_BASEREL,
1546 BFD_RELOC_HI16_BASEREL,
1547 BFD_RELOC_HI16_S_BASEREL,
9e461dac 1548 BFD_RELOC_8_BASEREL,
815179af 1549 BFD_RELOC_RVA,
fdcb0453 1550
0443af31 1551/* Absolute 8-bit relocation, but used to form an address like 0xFFnn. */
9e461dac
JK
1552 BFD_RELOC_8_FFnn,
1553
fca2b81b
KR
1554/* These PC-relative relocations are stored as word displacements --
1555i.e., byte displacements shifted right two bits. The 30-bit word
1556displacement (<<32_PCREL_S2>> -- 32 bits, shifted 2) is used on the
1557SPARC. (SPARC tools generally refer to this as <<WDISP30>>.) The
1558signed 16-bit displacement is used on the MIPS, and the 23-bit
1559displacement is used on the Alpha. */
9e461dac 1560 BFD_RELOC_32_PCREL_S2,
7e7fb4a8 1561 BFD_RELOC_16_PCREL_S2,
7e7fb4a8 1562 BFD_RELOC_23_PCREL_S2,
9e461dac 1563
0443af31
KR
1564/* High 22 bits and low 10 bits of 32-bit value, placed into lower bits of
1565the target word. These are used on the SPARC. */
fdcb0453 1566 BFD_RELOC_HI22,
fdcb0453
KR
1567 BFD_RELOC_LO10,
1568
0443af31
KR
1569/* For systems that allocate a Global Pointer register, these are
1570displacements off that register. These relocation types are
1571handled specially, because the value the register will have is
1572decided relatively late. */
7e7fb4a8
KR
1573 BFD_RELOC_GPREL16,
1574 BFD_RELOC_GPREL32,
1575
0443af31 1576/* Reloc types used for i960/b.out. */
fdcb0453
KR
1577 BFD_RELOC_I960_CALLJ,
1578
0443af31
KR
1579/* SPARC ELF relocations. There is probably some overlap with other
1580relocation types already defined. */
1581 BFD_RELOC_NONE,
fdcb0453
KR
1582 BFD_RELOC_SPARC_WDISP22,
1583 BFD_RELOC_SPARC22,
1584 BFD_RELOC_SPARC13,
fdcb0453
KR
1585 BFD_RELOC_SPARC_GOT10,
1586 BFD_RELOC_SPARC_GOT13,
1587 BFD_RELOC_SPARC_GOT22,
1588 BFD_RELOC_SPARC_PC10,
1589 BFD_RELOC_SPARC_PC22,
1590 BFD_RELOC_SPARC_WPLT30,
1591 BFD_RELOC_SPARC_COPY,
1592 BFD_RELOC_SPARC_GLOB_DAT,
1593 BFD_RELOC_SPARC_JMP_SLOT,
1594 BFD_RELOC_SPARC_RELATIVE,
1595 BFD_RELOC_SPARC_UA32,
1596
0443af31 1597/* I think these are specific to SPARC a.out (e.g., Sun 4). */
5284a822 1598 BFD_RELOC_SPARC_BASE13,
fdcb0453
KR
1599 BFD_RELOC_SPARC_BASE22,
1600
0443af31
KR
1601/* Some relocations we're using for SPARC V9 -- subject to change. */
1602#define BFD_RELOC_SPARC_64 BFD_RELOC_64
fa5ba217
KR
1603 BFD_RELOC_SPARC_10,
1604 BFD_RELOC_SPARC_11,
fa5ba217
KR
1605 BFD_RELOC_SPARC_OLO10,
1606 BFD_RELOC_SPARC_HH22,
1607 BFD_RELOC_SPARC_HM10,
1608 BFD_RELOC_SPARC_LM22,
1609 BFD_RELOC_SPARC_PC_HH22,
1610 BFD_RELOC_SPARC_PC_HM10,
1611 BFD_RELOC_SPARC_PC_LM22,
1612 BFD_RELOC_SPARC_WDISP16,
5284a822 1613 BFD_RELOC_SPARC_WDISP19,
fa5ba217 1614 BFD_RELOC_SPARC_GLOB_JMP,
e9f03cd4
ILT
1615 BFD_RELOC_SPARC_7,
1616 BFD_RELOC_SPARC_6,
1617 BFD_RELOC_SPARC_5,
5284a822 1618
34255b70
JL
1619/* Alpha ECOFF and ELF relocations. Some of these treat the symbol or
1620"addend" in some special way.
0443af31
KR
1621For GPDISP_HI16 ("gpdisp") relocations, the symbol is ignored when
1622writing; when reading, it will be the absolute section symbol. The
1623addend is the displacement in bytes of the "lda" instruction from
1624the "ldah" instruction (which is at the address of this reloc). */
7e7fb4a8 1625 BFD_RELOC_ALPHA_GPDISP_HI16,
0443af31
KR
1626
1627/* For GPDISP_LO16 ("ignore") relocations, the symbol is handled as
1628with GPDISP_HI16 relocs. The addend is ignored when writing the
1629relocations out, and is filled in with the file's GP value on
1630reading, for convenience. */
7e7fb4a8
KR
1631 BFD_RELOC_ALPHA_GPDISP_LO16,
1632
34255b70
JL
1633/* The ELF GPDISP relocation is exactly the same as the GPDISP_HI16
1634relocation except that there is no accompanying GPDISP_LO16
1635relocation. */
1636 BFD_RELOC_ALPHA_GPDISP,
1637
0443af31
KR
1638/* The Alpha LITERAL/LITUSE relocs are produced by a symbol reference;
1639the assembler turns it into a LDQ instruction to load the address of
1640the symbol, and then fills in a register in the real instruction.
1641
1642The LITERAL reloc, at the LDQ instruction, refers to the .lita
1643section symbol. The addend is ignored when writing, but is filled
1644in with the file's GP value on reading, for convenience, as with the
1645GPDISP_LO16 reloc.
1646
6b31fd3a
ILT
1647The ELF_LITERAL reloc is somewhere between 16_GOTOFF and GPDISP_LO16.
1648It should refer to the symbol to be referenced, as with 16_GOTOFF,
1649but it generates output not based on the position within the .got
1650section, but relative to the GP value chosen for the file during the
1651final link stage.
1652
0443af31
KR
1653The LITUSE reloc, on the instruction using the loaded address, gives
1654information to the linker that it might be able to use to optimize
1655away some literal section references. The symbol is ignored (read
1656as the absolute section symbol), and the "addend" indicates the type
1657of instruction using the register:
16581 - "memory" fmt insn
16592 - byte-manipulation (byte offset reg)
16603 - jsr (target of branch)
1661
1662The GNU linker currently doesn't do any of this optimizing. */
7e7fb4a8 1663 BFD_RELOC_ALPHA_LITERAL,
6b31fd3a 1664 BFD_RELOC_ALPHA_ELF_LITERAL,
7e7fb4a8
KR
1665 BFD_RELOC_ALPHA_LITUSE,
1666
0443af31
KR
1667/* The HINT relocation indicates a value that should be filled into the
1668"hint" field of a jmp/jsr/ret instruction, for possible branch-
1669prediction logic which may be provided on some processors. */
7e7fb4a8
KR
1670 BFD_RELOC_ALPHA_HINT,
1671
8612a388
ILT
1672/* The LINKAGE relocation outputs a linkage pair in the object file,
1673which is filled by the linker. */
c3d8e071
ILT
1674 BFD_RELOC_ALPHA_LINKAGE,
1675
0443af31
KR
1676/* Bits 27..2 of the relocation address shifted right 2 bits;
1677simple reloc otherwise. */
fdcb0453
KR
1678 BFD_RELOC_MIPS_JMP,
1679
cd6213ff
FF
1680/* The MIPS16 jump instruction. */
1681 BFD_RELOC_MIPS16_JMP,
1682
0443af31 1683/* High 16 bits of 32-bit value; simple reloc. */
fdcb0453 1684 BFD_RELOC_HI16,
0443af31
KR
1685
1686/* High 16 bits of 32-bit value but the low 16 bits will be sign
1687extended and added to form the final result. If the low 16
1688bits form a negative number, we need to add one to the high value
1689to compensate for the borrow when the low bits are added. */
fdcb0453 1690 BFD_RELOC_HI16_S,
0443af31
KR
1691
1692/* Low 16 bits. */
fdcb0453 1693 BFD_RELOC_LO16,
0443af31
KR
1694
1695/* Like BFD_RELOC_HI16_S, but PC relative. */
7efb1850 1696 BFD_RELOC_PCREL_HI16_S,
0443af31
KR
1697
1698/* Like BFD_RELOC_LO16, but PC relative. */
7efb1850 1699 BFD_RELOC_PCREL_LO16,
fdcb0453 1700
0443af31 1701/* Relocation relative to the global pointer. */
7e7fb4a8 1702#define BFD_RELOC_MIPS_GPREL BFD_RELOC_GPREL16
fdcb0453 1703
0443af31 1704/* Relocation against a MIPS literal section. */
0a197a96
JG
1705 BFD_RELOC_MIPS_LITERAL,
1706
0443af31 1707/* MIPS ELF relocations. */
0a197a96
JG
1708 BFD_RELOC_MIPS_GOT16,
1709 BFD_RELOC_MIPS_CALL16,
7e7fb4a8 1710#define BFD_RELOC_MIPS_GPREL32 BFD_RELOC_GPREL32
e9f03cd4
ILT
1711 BFD_RELOC_MIPS_GOT_HI16,
1712 BFD_RELOC_MIPS_GOT_LO16,
b7384d22
ILT
1713 BFD_RELOC_MIPS_CALL_HI16,
1714 BFD_RELOC_MIPS_CALL_LO16,
0a197a96 1715
0443af31 1716/* i386/elf relocations */
b66b07a2
KR
1717 BFD_RELOC_386_GOT32,
1718 BFD_RELOC_386_PLT32,
1719 BFD_RELOC_386_COPY,
1720 BFD_RELOC_386_GLOB_DAT,
1721 BFD_RELOC_386_JUMP_SLOT,
1722 BFD_RELOC_386_RELATIVE,
1723 BFD_RELOC_386_GOTOFF,
1724 BFD_RELOC_386_GOTPC,
1725
0443af31 1726/* ns32k relocations */
1fb83be6
KR
1727 BFD_RELOC_NS32K_IMM_8,
1728 BFD_RELOC_NS32K_IMM_16,
1729 BFD_RELOC_NS32K_IMM_32,
1730 BFD_RELOC_NS32K_IMM_8_PCREL,
1731 BFD_RELOC_NS32K_IMM_16_PCREL,
1732 BFD_RELOC_NS32K_IMM_32_PCREL,
1733 BFD_RELOC_NS32K_DISP_8,
1734 BFD_RELOC_NS32K_DISP_16,
1735 BFD_RELOC_NS32K_DISP_32,
1736 BFD_RELOC_NS32K_DISP_8_PCREL,
1737 BFD_RELOC_NS32K_DISP_16_PCREL,
1738 BFD_RELOC_NS32K_DISP_32_PCREL,
1739
02f85cda 1740/* Power(rs6000) and PowerPC relocations. */
d1ad85a6 1741 BFD_RELOC_PPC_B26,
d1ad85a6 1742 BFD_RELOC_PPC_BA26,
d1ad85a6 1743 BFD_RELOC_PPC_TOC16,
02f85cda
MM
1744 BFD_RELOC_PPC_B16,
1745 BFD_RELOC_PPC_B16_BRTAKEN,
1746 BFD_RELOC_PPC_B16_BRNTAKEN,
1747 BFD_RELOC_PPC_BA16,
1748 BFD_RELOC_PPC_BA16_BRTAKEN,
1749 BFD_RELOC_PPC_BA16_BRNTAKEN,
1750 BFD_RELOC_PPC_COPY,
1751 BFD_RELOC_PPC_GLOB_DAT,
1752 BFD_RELOC_PPC_JMP_SLOT,
1753 BFD_RELOC_PPC_RELATIVE,
1754 BFD_RELOC_PPC_LOCAL24PC,
4500a112
MM
1755 BFD_RELOC_PPC_EMB_NADDR32,
1756 BFD_RELOC_PPC_EMB_NADDR16,
1757 BFD_RELOC_PPC_EMB_NADDR16_LO,
1758 BFD_RELOC_PPC_EMB_NADDR16_HI,
1759 BFD_RELOC_PPC_EMB_NADDR16_HA,
1760 BFD_RELOC_PPC_EMB_SDAI16,
1761 BFD_RELOC_PPC_EMB_SDA2I16,
1762 BFD_RELOC_PPC_EMB_SDA2REL,
1763 BFD_RELOC_PPC_EMB_SDA21,
1764 BFD_RELOC_PPC_EMB_MRKREF,
1765 BFD_RELOC_PPC_EMB_RELSEC16,
1766 BFD_RELOC_PPC_EMB_RELST_LO,
1767 BFD_RELOC_PPC_EMB_RELST_HI,
1768 BFD_RELOC_PPC_EMB_RELST_HA,
1769 BFD_RELOC_PPC_EMB_BIT_FLD,
1770 BFD_RELOC_PPC_EMB_RELSDA,
d1ad85a6 1771
0443af31
KR
1772/* The type of reloc used to build a contructor table - at the moment
1773probably a 32 bit wide absolute relocation, but the target can choose.
1774It generally does map to one of the other relocation types. */
1775 BFD_RELOC_CTOR,
d80ebaac
ILT
1776
1777/* ARM 26 bit pc-relative branch. The lowest two bits must be zero and are
1778not stored in the instruction. */
1779 BFD_RELOC_ARM_PCREL_BRANCH,
1780
1781/* These relocs are only used within the ARM assembler. They are not
1782(at present) written to any object files. */
1783 BFD_RELOC_ARM_IMMEDIATE,
1784 BFD_RELOC_ARM_OFFSET_IMM,
1785 BFD_RELOC_ARM_SHIFT_IMM,
1786 BFD_RELOC_ARM_SWI,
1787 BFD_RELOC_ARM_MULTI,
1788 BFD_RELOC_ARM_CP_OFF_IMM,
3b1f83ad
JL
1789 BFD_RELOC_ARM_ADR_IMM,
1790 BFD_RELOC_ARM_LDR_IMM,
1791 BFD_RELOC_ARM_LITERAL,
1792 BFD_RELOC_ARM_IN_POOL,
d1b40d8e
JSC
1793 BFD_RELOC_ARM_OFFSET_IMM8,
1794 BFD_RELOC_ARM_HWLITERAL,
c86158e5
ILT
1795 BFD_RELOC_ARM_THUMB_ADD,
1796 BFD_RELOC_ARM_THUMB_IMM,
1797 BFD_RELOC_ARM_THUMB_SHIFT,
1798 BFD_RELOC_ARM_THUMB_OFFSET,
1799
1800/* Hitachi SH relocs. Not all of these appear in object files. */
1801 BFD_RELOC_SH_PCDISP8BY2,
1802 BFD_RELOC_SH_PCDISP12BY2,
1803 BFD_RELOC_SH_IMM4,
1804 BFD_RELOC_SH_IMM4BY2,
1805 BFD_RELOC_SH_IMM4BY4,
1806 BFD_RELOC_SH_IMM8,
1807 BFD_RELOC_SH_IMM8BY2,
1808 BFD_RELOC_SH_IMM8BY4,
1809 BFD_RELOC_SH_PCRELIMM8BY2,
1810 BFD_RELOC_SH_PCRELIMM8BY4,
1811 BFD_RELOC_SH_SWITCH16,
1812 BFD_RELOC_SH_SWITCH32,
1813 BFD_RELOC_SH_USES,
1814 BFD_RELOC_SH_COUNT,
1815 BFD_RELOC_SH_ALIGN,
1816 BFD_RELOC_SH_CODE,
1817 BFD_RELOC_SH_DATA,
1818 BFD_RELOC_SH_LABEL,
05cedcf6
DE
1819/* start-sanitize-arc */
1820
1821/* Argonaut RISC Core (ARC) relocs.
1822ARC 22 bit pc-relative branch. The lowest two bits must be zero and are
3b1f83ad
JL
1823not stored in the instruction. The high 20 bits are installed in bits 26
1824through 7 of the instruction. */
05cedcf6 1825 BFD_RELOC_ARC_B22_PCREL,
3b1f83ad
JL
1826
1827/* ARC 26 bit absolute branch. The lowest two bits must be zero and are not
1828stored in the instruction. The high 24 bits are installed in bits 23
1829through 0. */
1830 BFD_RELOC_ARC_B26,
05cedcf6 1831/* end-sanitize-arc */
50bd50d4
MH
1832
1833/* start-sanitize-d10v */
1834
1835/* Mitsubishi D10V relocs.
1836This is a 10-bit reloc with the right 2 bits
1837assumed to be 0. */
50bd50d4
MH
1838 BFD_RELOC_D10V_10_PCREL_R,
1839
f4e14cb9
ILT
1840/* Mitsubishi D10V relocs.
1841This is a 10-bit reloc with the right 2 bits
1842assumed to be 0. This is the same as the previous reloc
1843except it is in the left container, i.e.,
1844shifted left 15 bits. */
1845 BFD_RELOC_D10V_10_PCREL_L,
1846
50bd50d4
MH
1847/* This is an 18-bit reloc with the right 2 bits
1848assumed to be 0. */
1849 BFD_RELOC_D10V_18,
1850
1851/* This is an 18-bit reloc with the right 2 bits
1852assumed to be 0. */
1853 BFD_RELOC_D10V_18_PCREL,
1854/* end-sanitize-d10v */
1855
3ebefb07
DE
1856/* start-sanitize-m32r */
1857
1858/* Mitsubishi M32R relocs.
cd6213ff
FF
1859This is a 24 bit absolute address. */
1860 BFD_RELOC_M32R_24,
efc2b064 1861
cd6213ff
FF
1862/* This is a 10-bit pc-relative reloc with the right 2 bits assumed to be 0. */
1863 BFD_RELOC_M32R_10_PCREL,
3ebefb07
DE
1864
1865/* This is an 18-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1866 BFD_RELOC_M32R_18_PCREL,
3ebefb07
DE
1867
1868/* This is an 26-bit reloc with the right 2 bits assumed to be 0. */
cd6213ff 1869 BFD_RELOC_M32R_26_PCREL,
3ebefb07
DE
1870/* end-sanitize-m32r */
1871
00d7a64b
JL
1872/* start-sanitize-v850 */
1873
1874/* This is a 9-bit reloc */
c86158e5 1875 BFD_RELOC_V850_9_PCREL,
00d7a64b
JL
1876
1877/* This is a 22-bit reloc */
c86158e5 1878 BFD_RELOC_V850_22_PCREL,
b6d08fce
JL
1879
1880/* This is an offset from the short data area pointer.. */
1881 BFD_RELOC_V850_SDA_OFFSET,
1882
1883/* This is an offset from the zero data area pointer.. */
1884 BFD_RELOC_V850_ZDA_OFFSET,
1885
1886/* This is an offset from the tiny data area pointer.. */
1887 BFD_RELOC_V850_TDA_OFFSET,
00d7a64b 1888/* end-sanitize-v850 */
c86158e5 1889
cd6213ff
FF
1890
1891/* This is a 32bit pcrel reloc for the mn10300, offset by two bytes in the
1892instruction. */
1893 BFD_RELOC_MN10300_32_PCREL,
1894
1895/* This is a 16bit pcrel reloc for the mn10300, offset by two bytes in the
1896instruction. */
1897 BFD_RELOC_MN10300_16_PCREL,
0443af31
KR
1898 BFD_RELOC_UNUSED };
1899typedef enum bfd_reloc_code_real bfd_reloc_code_real_type;
5dc8db48 1900reloc_howto_type *
fdcb0453
KR
1901
1902bfd_reloc_type_lookup PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
1903
0443af31
KR
1904const char *
1905bfd_get_reloc_code_name PARAMS ((bfd_reloc_code_real_type code));
1906
ef758f3e 1907
57a1867e 1908typedef struct symbol_cache_entry
fdcb0453
KR
1909{
1910 /* A pointer to the BFD which owns the symbol. This information
1911 is necessary so that a back end can work out what additional
1912 information (invisible to the application writer) is carried
1913 with the symbol.
1914
1915 This field is *almost* redundant, since you can use section->owner
1916 instead, except that some symbols point to the global sections
1917 bfd_{abs,com,und}_section. This could be fixed by making
1918 these globals be per-bfd (or per-target-flavor). FIXME. */
1919
1920 struct _bfd *the_bfd; /* Use bfd_asymbol_bfd(sym) to access this field. */
1921
c188b0be 1922 /* The text of the symbol. The name is left alone, and not copied; the
fdcb0453
KR
1923 application may not alter it. */
1924 CONST char *name;
1925
1926 /* The value of the symbol. This really should be a union of a
1927 numeric value with a pointer, since some flags indicate that
1928 a pointer to another symbol is stored here. */
1929 symvalue value;
1930
1931 /* Attributes of a symbol: */
1932
1933#define BSF_NO_FLAGS 0x00
1934
1935 /* The symbol has local scope; <<static>> in <<C>>. The value
1936 is the offset into the section of the data. */
1937#define BSF_LOCAL 0x01
1938
1939 /* The symbol has global scope; initialized data in <<C>>. The
1940 value is the offset into the section of the data. */
1941#define BSF_GLOBAL 0x02
1942
c188b0be 1943 /* The symbol has global scope and is exported. The value is
fdcb0453 1944 the offset into the section of the data. */
ef758f3e 1945#define BSF_EXPORT BSF_GLOBAL /* no real difference */
fdcb0453
KR
1946
1947 /* A normal C symbol would be one of:
1948 <<BSF_LOCAL>>, <<BSF_FORT_COMM>>, <<BSF_UNDEFINED>> or
ef758f3e 1949 <<BSF_GLOBAL>> */
fdcb0453
KR
1950
1951 /* The symbol is a debugging record. The value has an arbitary
1952 meaning. */
1953#define BSF_DEBUGGING 0x08
1954
1955 /* The symbol denotes a function entry point. Used in ELF,
1956 perhaps others someday. */
1957#define BSF_FUNCTION 0x10
1958
1959 /* Used by the linker. */
1960#define BSF_KEEP 0x20
1961#define BSF_KEEP_G 0x40
1962
b66b07a2
KR
1963 /* A weak global symbol, overridable without warnings by
1964 a regular global symbol of the same name. */
fdcb0453
KR
1965#define BSF_WEAK 0x80
1966
1967 /* This symbol was created to point to a section, e.g. ELF's
1968 STT_SECTION symbols. */
1969#define BSF_SECTION_SYM 0x100
1970
1971 /* The symbol used to be a common symbol, but now it is
1972 allocated. */
1973#define BSF_OLD_COMMON 0x200
1974
1975 /* The default value for common data. */
1976#define BFD_FORT_COMM_DEFAULT_VALUE 0
1977
1978 /* In some files the type of a symbol sometimes alters its
1979 location in an output file - ie in coff a <<ISFCN>> symbol
1980 which is also <<C_EXT>> symbol appears where it was
1981 declared and not at the end of a section. This bit is set
1982 by the target BFD part to convey this information. */
1983
1984#define BSF_NOT_AT_END 0x400
1985
1986 /* Signal that the symbol is the label of constructor section. */
1987#define BSF_CONSTRUCTOR 0x800
1988
fcf490c0
ILT
1989 /* Signal that the symbol is a warning symbol. The name is a
1990 warning. The name of the next symbol is the one to warn about;
1991 if a reference is made to a symbol with the same name as the next
1992 symbol, a warning is issued by the linker. */
fdcb0453
KR
1993#define BSF_WARNING 0x1000
1994
fcf490c0
ILT
1995 /* Signal that the symbol is indirect. This symbol is an indirect
1996 pointer to the symbol with the same name as the next symbol. */
fdcb0453
KR
1997#define BSF_INDIRECT 0x2000
1998
1999 /* BSF_FILE marks symbols that contain a file name. This is used
2000 for ELF STT_FILE symbols. */
2001#define BSF_FILE 0x4000
2002
0ee75d02
ILT
2003 /* Symbol is from dynamic linking information. */
2004#define BSF_DYNAMIC 0x8000
2005
cbe75cb6
ILT
2006 /* The symbol denotes a data object. Used in ELF, and perhaps
2007 others someday. */
2008#define BSF_OBJECT 0x10000
2009
fdcb0453
KR
2010 flagword flags;
2011
57a1867e 2012 /* A pointer to the section to which this symbol is
fdcb0453 2013 relative. This will always be non NULL, there are special
fca2b81b 2014 sections for undefined and absolute symbols. */
fdcb0453
KR
2015 struct sec *section;
2016
fca2b81b
KR
2017 /* Back end special data. */
2018 union
2019 {
2020 PTR p;
2021 bfd_vma i;
2022 } udata;
fdcb0453
KR
2023
2024} asymbol;
326e32d7
ILT
2025#define bfd_get_symtab_upper_bound(abfd) \
2026 BFD_SEND (abfd, _bfd_get_symtab_upper_bound, (abfd))
5a66538b
KR
2027boolean
2028bfd_is_local_label PARAMS ((bfd *abfd, asymbol *sym));
2029
2030#define bfd_is_local_label(abfd, sym) \
2031 BFD_SEND (abfd, _bfd_is_local_label,(abfd, sym))
fdcb0453
KR
2032#define bfd_canonicalize_symtab(abfd, location) \
2033 BFD_SEND (abfd, _bfd_canonicalize_symtab,\
2034 (abfd, location))
2035boolean
c188b0be 2036bfd_set_symtab PARAMS ((bfd *abfd, asymbol **location, unsigned int count));
fdcb0453
KR
2037
2038void
2039bfd_print_symbol_vandf PARAMS ((PTR file, asymbol *symbol));
2040
2041#define bfd_make_empty_symbol(abfd) \
2042 BFD_SEND (abfd, _bfd_make_empty_symbol, (abfd))
2043#define bfd_make_debug_symbol(abfd,ptr,size) \
2044 BFD_SEND (abfd, _bfd_make_debug_symbol, (abfd, ptr, size))
2045int
2046bfd_decode_symclass PARAMS ((asymbol *symbol));
2047
2048void
2049bfd_symbol_info PARAMS ((asymbol *symbol, symbol_info *ret));
2050
6167a840
JL
2051boolean
2052bfd_copy_private_symbol_data PARAMS ((bfd *ibfd, asymbol *isym, bfd *obfd, asymbol *osym));
2053
2054#define bfd_copy_private_symbol_data(ibfd, isymbol, obfd, osymbol) \
efc2b064 2055 BFD_SEND (obfd, _bfd_copy_private_symbol_data, \
6167a840 2056 (ibfd, isymbol, obfd, osymbol))
fdcb0453
KR
2057struct _bfd
2058{
2059 /* The filename the application opened the BFD with. */
2060 CONST char *filename;
2061
2062 /* A pointer to the target jump table. */
2f3508ad 2063 const struct bfd_target *xvec;
fdcb0453
KR
2064
2065 /* To avoid dragging too many header files into every file that
2066 includes `<<bfd.h>>', IOSTREAM has been declared as a "char
2067 *", and MTIME as a "long". Their correct types, to which they
2068 are cast when used, are "FILE *" and "time_t". The iostream
64d5f5d0
ILT
2069 is the result of an fopen on the filename. However, if the
2070 BFD_IN_MEMORY flag is set, then iostream is actually a pointer
2071 to a bfd_in_memory struct. */
2072 PTR iostream;
fdcb0453 2073
0a197a96
JG
2074 /* Is the file descriptor being cached? That is, can it be closed as
2075 needed, and re-opened when accessed later? */
fdcb0453
KR
2076
2077 boolean cacheable;
2078
2079 /* Marks whether there was a default target specified when the
c188b0be
DM
2080 BFD was opened. This is used to select which matching algorithm
2081 to use to choose the back end. */
fdcb0453
KR
2082
2083 boolean target_defaulted;
2084
2085 /* The caching routines use these to maintain a
2086 least-recently-used list of BFDs */
2087
2088 struct _bfd *lru_prev, *lru_next;
2089
2090 /* When a file is closed by the caching routines, BFD retains
c188b0be 2091 state information on the file here: */
fdcb0453
KR
2092
2093 file_ptr where;
2094
c188b0be 2095 /* and here: (``once'' means at least once) */
fdcb0453
KR
2096
2097 boolean opened_once;
2098
2099 /* Set if we have a locally maintained mtime value, rather than
2100 getting it from the file each time: */
2101
2102 boolean mtime_set;
2103
2104 /* File modified time, if mtime_set is true: */
2105
2106 long mtime;
2107
2108 /* Reserved for an unimplemented file locking extension.*/
2109
2110 int ifd;
2111
c188b0be 2112 /* The format which belongs to the BFD. (object, core, etc.) */
fdcb0453
KR
2113
2114 bfd_format format;
2115
2116 /* The direction the BFD was opened with*/
2117
2118 enum bfd_direction {no_direction = 0,
2119 read_direction = 1,
2120 write_direction = 2,
2121 both_direction = 3} direction;
2122
2123 /* Format_specific flags*/
2124
2125 flagword flags;
2126
2127 /* Currently my_archive is tested before adding origin to
2128 anything. I believe that this can become always an add of
2129 origin, with origin set to 0 for non archive files. */
2130
2131 file_ptr origin;
2132
2133 /* Remember when output has begun, to stop strange things
c188b0be 2134 from happening. */
fdcb0453
KR
2135 boolean output_has_begun;
2136
2137 /* Pointer to linked list of sections*/
2138 struct sec *sections;
2139
2140 /* The number of sections */
2141 unsigned int section_count;
2142
2143 /* Stuff only useful for object files:
2144 The start address. */
2145 bfd_vma start_address;
2146
2147 /* Used for input and output*/
2148 unsigned int symcount;
2149
c188b0be 2150 /* Symbol table for output BFD (with symcount entries) */
fdcb0453
KR
2151 struct symbol_cache_entry **outsymbols;
2152
2153 /* Pointer to structure which contains architecture information*/
2ffbb79a 2154 const struct bfd_arch_info *arch_info;
fdcb0453
KR
2155
2156 /* Stuff only useful for archives:*/
2157 PTR arelt_data;
c188b0be
DM
2158 struct _bfd *my_archive; /* The containing archive BFD. */
2159 struct _bfd *next; /* The next BFD in the archive. */
2160 struct _bfd *archive_head; /* The first BFD in the archive. */
fdcb0453
KR
2161 boolean has_armap;
2162
4c3721d5
ILT
2163 /* A chain of BFD structures involved in a link. */
2164 struct _bfd *link_next;
2165
2166 /* A field used by _bfd_generic_link_add_archive_symbols. This will
2167 be used only for archive elements. */
2168 int archive_pass;
2169
fdcb0453
KR
2170 /* Used by the back end to hold private data. */
2171
2172 union
2173 {
2174 struct aout_data_struct *aout_data;
2175 struct artdata *aout_ar_data;
2176 struct _oasys_data *oasys_obj_data;
2177 struct _oasys_ar_data *oasys_ar_data;
2178 struct coff_tdata *coff_obj_data;
4e98461f 2179 struct pe_tdata *pe_obj_data;
54406786 2180 struct xcoff_tdata *xcoff_obj_data;
fdcb0453
KR
2181 struct ecoff_tdata *ecoff_obj_data;
2182 struct ieee_data_struct *ieee_data;
2183 struct ieee_ar_data_struct *ieee_ar_data;
2184 struct srec_data_struct *srec_data;
ffd15489 2185 struct ihex_data_struct *ihex_data;
fdcb0453
KR
2186 struct tekhex_data_struct *tekhex_data;
2187 struct elf_obj_tdata *elf_obj_data;
c3e964b9 2188 struct nlm_obj_tdata *nlm_obj_data;
fdcb0453
KR
2189 struct bout_data_struct *bout_data;
2190 struct sun_core_struct *sun_core_data;
2191 struct trad_core_struct *trad_core_data;
9e461dac 2192 struct som_data_struct *som_data;
b66b07a2 2193 struct hpux_core_struct *hpux_core_data;
8d12f138 2194 struct hppabsd_core_struct *hppabsd_core_data;
fdcb0453 2195 struct sgi_core_struct *sgi_core_data;
2b91cc45 2196 struct lynx_core_struct *lynx_core_data;
9b3fa589 2197 struct osf_core_struct *osf_core_data;
326e32d7 2198 struct cisco_core_struct *cisco_core_data;
3b1f83ad 2199 struct versados_data_struct *versados_data;
871a3f3b 2200 struct netbsd_core_struct *netbsd_core_data;
fdcb0453
KR
2201 PTR any;
2202 } tdata;
2203
2204 /* Used by the application to hold private data*/
2205 PTR usrdata;
2206
2207 /* Where all the allocated stuff under this BFD goes */
2208 struct obstack memory;
fdcb0453
KR
2209};
2210
0f8f509c
DM
2211typedef enum bfd_error
2212{
d1ad85a6
DM
2213 bfd_error_no_error = 0,
2214 bfd_error_system_call,
2215 bfd_error_invalid_target,
2216 bfd_error_wrong_format,
2217 bfd_error_invalid_operation,
2218 bfd_error_no_memory,
2219 bfd_error_no_symbols,
9675c281 2220 bfd_error_no_armap,
d1ad85a6
DM
2221 bfd_error_no_more_archived_files,
2222 bfd_error_malformed_archive,
2223 bfd_error_file_not_recognized,
2224 bfd_error_file_ambiguously_recognized,
2225 bfd_error_no_contents,
2226 bfd_error_nonrepresentable_section,
2227 bfd_error_no_debug_section,
2228 bfd_error_bad_value,
2229 bfd_error_file_truncated,
5dc8db48 2230 bfd_error_file_too_big,
d1ad85a6
DM
2231 bfd_error_invalid_error_code
2232} bfd_error_type;
2233
2234bfd_error_type
2235bfd_get_error PARAMS ((void));
2236
2237void
2238bfd_set_error PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2239
2240CONST char *
d1ad85a6 2241bfd_errmsg PARAMS ((bfd_error_type error_tag));
0f8f509c
DM
2242
2243void
2244bfd_perror PARAMS ((CONST char *message));
2245
3b1f83ad
JL
2246typedef void (*bfd_error_handler_type) PARAMS ((const char *, ...));
2247
2248bfd_error_handler_type
2249bfd_set_error_handler PARAMS ((bfd_error_handler_type));
2250
2251void
2252bfd_set_error_program_name PARAMS ((const char *));
2253
326e32d7 2254long
e2756048
ILT
2255bfd_get_reloc_upper_bound PARAMS ((bfd *abfd, asection *sect));
2256
326e32d7 2257long
e2756048
ILT
2258bfd_canonicalize_reloc
2259 PARAMS ((bfd *abfd,
2260 asection *sec,
2261 arelent **loc,
2262 asymbol **syms));
2263
2264void
2265bfd_set_reloc
2266 PARAMS ((bfd *abfd, asection *sec, arelent **rel, unsigned int count)
2267
2268 );
2269
fdcb0453
KR
2270boolean
2271bfd_set_file_flags PARAMS ((bfd *abfd, flagword flags));
2272
fdcb0453 2273boolean
c188b0be 2274bfd_set_start_address PARAMS ((bfd *abfd, bfd_vma vma));
fdcb0453
KR
2275
2276long
c188b0be 2277bfd_get_mtime PARAMS ((bfd *abfd));
fdcb0453
KR
2278
2279long
c188b0be 2280bfd_get_size PARAMS ((bfd *abfd));
fdcb0453
KR
2281
2282int
c188b0be 2283bfd_get_gp_size PARAMS ((bfd *abfd));
fdcb0453
KR
2284
2285void
c188b0be 2286bfd_set_gp_size PARAMS ((bfd *abfd, int i));
fdcb0453 2287
ef758f3e
KR
2288bfd_vma
2289bfd_scan_vma PARAMS ((CONST char *string, CONST char **end, int base));
2290
5a66538b
KR
2291boolean
2292bfd_copy_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2293
2294#define bfd_copy_private_bfd_data(ibfd, obfd) \
efc2b064 2295 BFD_SEND (obfd, _bfd_copy_private_bfd_data, \
5a66538b 2296 (ibfd, obfd))
3b1f83ad
JL
2297boolean
2298bfd_merge_private_bfd_data PARAMS ((bfd *ibfd, bfd *obfd));
2299
2300#define bfd_merge_private_bfd_data(ibfd, obfd) \
efc2b064 2301 BFD_SEND (obfd, _bfd_merge_private_bfd_data, \
3b1f83ad
JL
2302 (ibfd, obfd))
2303boolean
2304bfd_set_private_flags PARAMS ((bfd *abfd, flagword flags));
2305
2306#define bfd_set_private_flags(abfd, flags) \
2307 BFD_SEND (abfd, _bfd_set_private_flags, \
2308 (abfd, flags))
fdcb0453
KR
2309#define bfd_sizeof_headers(abfd, reloc) \
2310 BFD_SEND (abfd, _bfd_sizeof_headers, (abfd, reloc))
2311
2312#define bfd_find_nearest_line(abfd, sec, syms, off, file, func, line) \
2313 BFD_SEND (abfd, _bfd_find_nearest_line, (abfd, sec, syms, off, file, func, line))
2314
2315 /* Do these three do anything useful at all, for any back end? */
2316#define bfd_debug_info_start(abfd) \
2317 BFD_SEND (abfd, _bfd_debug_info_start, (abfd))
2318
2319#define bfd_debug_info_end(abfd) \
2320 BFD_SEND (abfd, _bfd_debug_info_end, (abfd))
2321
2322#define bfd_debug_info_accumulate(abfd, section) \
2323 BFD_SEND (abfd, _bfd_debug_info_accumulate, (abfd, section))
2324
2325
2326#define bfd_stat_arch_elt(abfd, stat) \
2327 BFD_SEND (abfd, _bfd_stat_arch_elt,(abfd, stat))
2328
0822b56d
ILT
2329#define bfd_update_armap_timestamp(abfd) \
2330 BFD_SEND (abfd, _bfd_update_armap_timestamp, (abfd))
2331
fdcb0453
KR
2332#define bfd_set_arch_mach(abfd, arch, mach)\
2333 BFD_SEND ( abfd, _bfd_set_arch_mach, (abfd, arch, mach))
2334
326e32d7
ILT
2335#define bfd_relax_section(abfd, section, link_info, again) \
2336 BFD_SEND (abfd, _bfd_relax_section, (abfd, section, link_info, again))
4c3721d5
ILT
2337
2338#define bfd_link_hash_table_create(abfd) \
2339 BFD_SEND (abfd, _bfd_link_hash_table_create, (abfd))
2340
2341#define bfd_link_add_symbols(abfd, info) \
2342 BFD_SEND (abfd, _bfd_link_add_symbols, (abfd, info))
2343
2344#define bfd_final_link(abfd, info) \
2345 BFD_SEND (abfd, _bfd_final_link, (abfd, info))
fdcb0453 2346
9deaaaf1
ILT
2347#define bfd_free_cached_info(abfd) \
2348 BFD_SEND (abfd, _bfd_free_cached_info, (abfd))
2349
ad46bd1d
ILT
2350#define bfd_get_dynamic_symtab_upper_bound(abfd) \
2351 BFD_SEND (abfd, _bfd_get_dynamic_symtab_upper_bound, (abfd))
2352
4e98461f
SC
2353#define bfd_print_private_bfd_data(abfd, file)\
2354 BFD_SEND (abfd, _bfd_print_private_bfd_data, (abfd, file))
2355
ad46bd1d
ILT
2356#define bfd_canonicalize_dynamic_symtab(abfd, asymbols) \
2357 BFD_SEND (abfd, _bfd_canonicalize_dynamic_symtab, (abfd, asymbols))
2358
2359#define bfd_get_dynamic_reloc_upper_bound(abfd) \
2360 BFD_SEND (abfd, _bfd_get_dynamic_reloc_upper_bound, (abfd))
2361
2362#define bfd_canonicalize_dynamic_reloc(abfd, arels, asyms) \
2363 BFD_SEND (abfd, _bfd_canonicalize_dynamic_reloc, (abfd, arels, asyms))
2364
3b1f83ad
JL
2365extern bfd_byte *bfd_get_relocated_section_contents
2366 PARAMS ((bfd *, struct bfd_link_info *,
2367 struct bfd_link_order *, bfd_byte *,
2368 boolean, asymbol **));
2369
fdcb0453 2370symindex
c188b0be 2371bfd_get_next_mapent PARAMS ((bfd *abfd, symindex previous, carsym **sym));
fdcb0453
KR
2372
2373boolean
2374bfd_set_archive_head PARAMS ((bfd *output, bfd *new_head));
2375
c188b0be 2376bfd *
fdcb0453
KR
2377bfd_openr_next_archived_file PARAMS ((bfd *archive, bfd *previous));
2378
2379CONST char *
c188b0be 2380bfd_core_file_failing_command PARAMS ((bfd *abfd));
fdcb0453
KR
2381
2382int
c188b0be 2383bfd_core_file_failing_signal PARAMS ((bfd *abfd));
fdcb0453
KR
2384
2385boolean
2386core_file_matches_executable_p
2387 PARAMS ((bfd *core_bfd, bfd *exec_bfd));
2388
2389#define BFD_SEND(bfd, message, arglist) \
2390 ((*((bfd)->xvec->message)) arglist)
fdfe2d14
SS
2391
2392#ifdef DEBUG_BFD_SEND
2393#undef BFD_SEND
2394#define BFD_SEND(bfd, message, arglist) \
2395 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2396 ((*((bfd)->xvec->message)) arglist) : \
2397 (bfd_assert (__FILE__,__LINE__), NULL))
2398#endif
fdcb0453
KR
2399#define BFD_SEND_FMT(bfd, message, arglist) \
2400 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist)
fdfe2d14
SS
2401
2402#ifdef DEBUG_BFD_SEND
2403#undef BFD_SEND_FMT
2404#define BFD_SEND_FMT(bfd, message, arglist) \
2405 (((bfd) && (bfd)->xvec && (bfd)->xvec->message) ? \
2406 (((bfd)->xvec->message[(int)((bfd)->format)]) arglist) : \
2407 (bfd_assert (__FILE__,__LINE__), NULL))
2408#endif
9e461dac
JK
2409enum bfd_flavour {
2410 bfd_target_unknown_flavour,
2411 bfd_target_aout_flavour,
2412 bfd_target_coff_flavour,
2413 bfd_target_ecoff_flavour,
2414 bfd_target_elf_flavour,
2415 bfd_target_ieee_flavour,
2416 bfd_target_nlm_flavour,
2417 bfd_target_oasys_flavour,
2418 bfd_target_tekhex_flavour,
2419 bfd_target_srec_flavour,
ffd15489 2420 bfd_target_ihex_flavour,
d1f8b181 2421 bfd_target_som_flavour,
5dc8db48 2422 bfd_target_os9k_flavour,
9675c281 2423 bfd_target_versados_flavour,
c3d8e071
ILT
2424 bfd_target_msdos_flavour,
2425 bfd_target_evax_flavour
5dc8db48 2426};
4c3721d5 2427
64d5f5d0
ILT
2428enum bfd_endian { BFD_ENDIAN_BIG, BFD_ENDIAN_LITTLE, BFD_ENDIAN_UNKNOWN };
2429
4c3721d5
ILT
2430 /* Forward declaration. */
2431typedef struct bfd_link_info _bfd_link_info;
2432
fdcb0453
KR
2433typedef struct bfd_target
2434{
2435 char *name;
9e461dac 2436 enum bfd_flavour flavour;
64d5f5d0
ILT
2437 enum bfd_endian byteorder;
2438 enum bfd_endian header_byteorder;
fdcb0453
KR
2439 flagword object_flags;
2440 flagword section_flags;
2441 char symbol_leading_char;
2442 char ar_pad_char;
2443 unsigned short ar_max_namelen;
1a973af1
ILT
2444 bfd_vma (*bfd_getx64) PARAMS ((const bfd_byte *));
2445 bfd_signed_vma (*bfd_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2446 void (*bfd_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2447 bfd_vma (*bfd_getx32) PARAMS ((const bfd_byte *));
2448 bfd_signed_vma (*bfd_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2449 void (*bfd_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2450 bfd_vma (*bfd_getx16) PARAMS ((const bfd_byte *));
2451 bfd_signed_vma (*bfd_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2452 void (*bfd_putx16) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2453 bfd_vma (*bfd_h_getx64) PARAMS ((const bfd_byte *));
2454 bfd_signed_vma (*bfd_h_getx_signed_64) PARAMS ((const bfd_byte *));
fdcb0453 2455 void (*bfd_h_putx64) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2456 bfd_vma (*bfd_h_getx32) PARAMS ((const bfd_byte *));
2457 bfd_signed_vma (*bfd_h_getx_signed_32) PARAMS ((const bfd_byte *));
fdcb0453 2458 void (*bfd_h_putx32) PARAMS ((bfd_vma, bfd_byte *));
1a973af1
ILT
2459 bfd_vma (*bfd_h_getx16) PARAMS ((const bfd_byte *));
2460 bfd_signed_vma (*bfd_h_getx_signed_16) PARAMS ((const bfd_byte *));
fdcb0453 2461 void (*bfd_h_putx16) PARAMS ((bfd_vma, bfd_byte *));
2f3508ad 2462 const struct bfd_target *(*_bfd_check_format[bfd_type_end]) PARAMS ((bfd *));
fdcb0453
KR
2463 boolean (*_bfd_set_format[bfd_type_end]) PARAMS ((bfd *));
2464 boolean (*_bfd_write_contents[bfd_type_end]) PARAMS ((bfd *));
6812b607
ILT
2465
2466 /* Generic entry points. */
2467#define BFD_JUMP_TABLE_GENERIC(NAME)\
2468CAT(NAME,_close_and_cleanup),\
2469CAT(NAME,_bfd_free_cached_info),\
2470CAT(NAME,_new_section_hook),\
4fe6d901
KR
2471CAT(NAME,_get_section_contents),\
2472CAT(NAME,_get_section_contents_in_window)
2473
6812b607
ILT
2474 /* Called when the BFD is being closed to do any necessary cleanup. */
2475 boolean (*_close_and_cleanup) PARAMS ((bfd *));
2476 /* Ask the BFD to free all cached information. */
2477 boolean (*_bfd_free_cached_info) PARAMS ((bfd *));
2478 /* Called when a new section is created. */
2479 boolean (*_new_section_hook) PARAMS ((bfd *, sec_ptr));
2480 /* Read the contents of a section. */
2481 boolean (*_bfd_get_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2482 file_ptr, bfd_size_type));
4fe6d901
KR
2483 boolean (*_bfd_get_section_contents_in_window)
2484 PARAMS ((bfd *, sec_ptr, bfd_window *,
2485 file_ptr, bfd_size_type));
6812b607
ILT
2486
2487 /* Entry points to copy private data. */
2488#define BFD_JUMP_TABLE_COPY(NAME)\
2489CAT(NAME,_bfd_copy_private_bfd_data),\
3b1f83ad
JL
2490CAT(NAME,_bfd_merge_private_bfd_data),\
2491CAT(NAME,_bfd_copy_private_section_data),\
6167a840 2492CAT(NAME,_bfd_copy_private_symbol_data),\
4e98461f
SC
2493CAT(NAME,_bfd_set_private_flags),\
2494CAT(NAME,_bfd_print_private_bfd_data)\
6812b607
ILT
2495 /* Called to copy BFD general private data from one object file
2496 to another. */
2497 boolean (*_bfd_copy_private_bfd_data) PARAMS ((bfd *, bfd *));
3b1f83ad
JL
2498 /* Called to merge BFD general private data from one object file
2499 to a common output file when linking. */
2500 boolean (*_bfd_merge_private_bfd_data) PARAMS ((bfd *, bfd *));
6812b607
ILT
2501 /* Called to copy BFD private section data from one object file
2502 to another. */
2503 boolean (*_bfd_copy_private_section_data) PARAMS ((bfd *, sec_ptr,
2504 bfd *, sec_ptr));
6167a840
JL
2505 /* Called to copy BFD private symbol data from one symbol
2506 to another. */
2507 boolean (*_bfd_copy_private_symbol_data) PARAMS ((bfd *, asymbol *,
2508 bfd *, asymbol *));
3b1f83ad
JL
2509 /* Called to set private backend flags */
2510 boolean (*_bfd_set_private_flags) PARAMS ((bfd *, flagword));
6812b607 2511
4e98461f 2512 /* Called to print private BFD data */
ae0a6bea 2513 boolean (*_bfd_print_private_bfd_data) PARAMS ((bfd *, PTR));
4e98461f 2514
6812b607
ILT
2515 /* Core file entry points. */
2516#define BFD_JUMP_TABLE_CORE(NAME)\
2517CAT(NAME,_core_file_failing_command),\
2518CAT(NAME,_core_file_failing_signal),\
2519CAT(NAME,_core_file_matches_executable_p)
fdcb0453
KR
2520 char * (*_core_file_failing_command) PARAMS ((bfd *));
2521 int (*_core_file_failing_signal) PARAMS ((bfd *));
2522 boolean (*_core_file_matches_executable_p) PARAMS ((bfd *, bfd *));
6812b607
ILT
2523
2524 /* Archive entry points. */
2525#define BFD_JUMP_TABLE_ARCHIVE(NAME)\
2526CAT(NAME,_slurp_armap),\
2527CAT(NAME,_slurp_extended_name_table),\
fca2b81b 2528CAT(NAME,_construct_extended_name_table),\
6812b607
ILT
2529CAT(NAME,_truncate_arname),\
2530CAT(NAME,_write_armap),\
c53fac12 2531CAT(NAME,_read_ar_hdr),\
6812b607 2532CAT(NAME,_openr_next_archived_file),\
64d5f5d0 2533CAT(NAME,_get_elt_at_index),\
0822b56d
ILT
2534CAT(NAME,_generic_stat_arch_elt),\
2535CAT(NAME,_update_armap_timestamp)
fdcb0453
KR
2536 boolean (*_bfd_slurp_armap) PARAMS ((bfd *));
2537 boolean (*_bfd_slurp_extended_name_table) PARAMS ((bfd *));
fca2b81b
KR
2538 boolean (*_bfd_construct_extended_name_table)
2539 PARAMS ((bfd *, char **, bfd_size_type *, const char **));
fdcb0453
KR
2540 void (*_bfd_truncate_arname) PARAMS ((bfd *, CONST char *, char *));
2541 boolean (*write_armap) PARAMS ((bfd *arch,
2542 unsigned int elength,
2543 struct orl *map,
2544 unsigned int orl_count,
2545 int stridx));
0322af0d 2546 PTR (*_bfd_read_ar_hdr_fn) PARAMS ((bfd *));
0822b56d 2547 bfd * (*openr_next_archived_file) PARAMS ((bfd *arch, bfd *prev));
64d5f5d0
ILT
2548#define bfd_get_elt_at_index(b,i) BFD_SEND(b, _bfd_get_elt_at_index, (b,i))
2549 bfd * (*_bfd_get_elt_at_index) PARAMS ((bfd *, symindex));
0822b56d
ILT
2550 int (*_bfd_stat_arch_elt) PARAMS ((bfd *, struct stat *));
2551 boolean (*_bfd_update_armap_timestamp) PARAMS ((bfd *));
2552
6812b607
ILT
2553 /* Entry points used for symbols. */
2554#define BFD_JUMP_TABLE_SYMBOLS(NAME)\
2555CAT(NAME,_get_symtab_upper_bound),\
2556CAT(NAME,_get_symtab),\
2557CAT(NAME,_make_empty_symbol),\
2558CAT(NAME,_print_symbol),\
2559CAT(NAME,_get_symbol_info),\
2560CAT(NAME,_bfd_is_local_label),\
2561CAT(NAME,_get_lineno),\
2562CAT(NAME,_find_nearest_line),\
e9614321
SC
2563CAT(NAME,_bfd_make_debug_symbol),\
2564CAT(NAME,_read_minisymbols),\
2565CAT(NAME,_minisymbol_to_symbol)
326e32d7
ILT
2566 long (*_bfd_get_symtab_upper_bound) PARAMS ((bfd *));
2567 long (*_bfd_canonicalize_symtab) PARAMS ((bfd *,
2568 struct symbol_cache_entry **));
fdcb0453
KR
2569 struct symbol_cache_entry *
2570 (*_bfd_make_empty_symbol) PARAMS ((bfd *));
2571 void (*_bfd_print_symbol) PARAMS ((bfd *, PTR,
2572 struct symbol_cache_entry *,
2573 bfd_print_symbol_type));
2574#define bfd_print_symbol(b,p,s,e) BFD_SEND(b, _bfd_print_symbol, (b,p,s,e))
2575 void (*_bfd_get_symbol_info) PARAMS ((bfd *,
2576 struct symbol_cache_entry *,
2577 symbol_info *));
2578#define bfd_get_symbol_info(b,p,e) BFD_SEND(b, _bfd_get_symbol_info, (b,p,e))
5a66538b 2579 boolean (*_bfd_is_local_label) PARAMS ((bfd *, asymbol *));
fdcb0453 2580
6812b607 2581 alent * (*_get_lineno) PARAMS ((bfd *, struct symbol_cache_entry *));
fdcb0453
KR
2582 boolean (*_bfd_find_nearest_line) PARAMS ((bfd *abfd,
2583 struct sec *section, struct symbol_cache_entry **symbols,
2584 bfd_vma offset, CONST char **file, CONST char **func,
2585 unsigned int *line));
6812b607
ILT
2586 /* Back-door to allow format-aware applications to create debug symbols
2587 while using BFD for everything else. Currently used by the assembler
2588 when creating COFF files. */
e9614321 2589 asymbol * (*_bfd_make_debug_symbol) PARAMS ((
6812b607
ILT
2590 bfd *abfd,
2591 void *ptr,
2592 unsigned long size));
e9614321
SC
2593#define bfd_read_minisymbols(b, d, m, s) \
2594 BFD_SEND (b, _read_minisymbols, (b, d, m, s))
2595 long (*_read_minisymbols) PARAMS ((bfd *, boolean, PTR *,
2596 unsigned int *));
2597#define bfd_minisymbol_to_symbol(b, d, m, f) \
2598 BFD_SEND (b, _minisymbol_to_symbol, (b, d, m, f))
2599 asymbol *(*_minisymbol_to_symbol) PARAMS ((bfd *, boolean, const PTR,
2600 asymbol *));
fdcb0453 2601
6812b607
ILT
2602 /* Routines for relocs. */
2603#define BFD_JUMP_TABLE_RELOCS(NAME)\
2604CAT(NAME,_get_reloc_upper_bound),\
2605CAT(NAME,_canonicalize_reloc),\
2606CAT(NAME,_bfd_reloc_type_lookup)
2607 long (*_get_reloc_upper_bound) PARAMS ((bfd *, sec_ptr));
2608 long (*_bfd_canonicalize_reloc) PARAMS ((bfd *, sec_ptr, arelent **,
2609 struct symbol_cache_entry **));
2610 /* See documentation on reloc types. */
5dc8db48 2611 reloc_howto_type *
6812b607
ILT
2612 (*reloc_type_lookup) PARAMS ((bfd *abfd,
2613 bfd_reloc_code_real_type code));
fdcb0453 2614
6812b607
ILT
2615 /* Routines used when writing an object file. */
2616#define BFD_JUMP_TABLE_WRITE(NAME)\
2617CAT(NAME,_set_arch_mach),\
2618CAT(NAME,_set_section_contents)
2619 boolean (*_bfd_set_arch_mach) PARAMS ((bfd *, enum bfd_architecture,
2620 unsigned long));
2621 boolean (*_bfd_set_section_contents) PARAMS ((bfd *, sec_ptr, PTR,
2622 file_ptr, bfd_size_type));
fdcb0453 2623
6812b607
ILT
2624 /* Routines used by the linker. */
2625#define BFD_JUMP_TABLE_LINK(NAME)\
2626CAT(NAME,_sizeof_headers),\
2627CAT(NAME,_bfd_get_relocated_section_contents),\
2628CAT(NAME,_bfd_relax_section),\
2629CAT(NAME,_bfd_link_hash_table_create),\
2630CAT(NAME,_bfd_link_add_symbols),\
6167a840
JL
2631CAT(NAME,_bfd_final_link),\
2632CAT(NAME,_bfd_link_split_section)
6812b607 2633 int (*_bfd_sizeof_headers) PARAMS ((bfd *, boolean));
fdcb0453 2634 bfd_byte * (*_bfd_get_relocated_section_contents) PARAMS ((bfd *,
4c3721d5
ILT
2635 struct bfd_link_info *, struct bfd_link_order *,
2636 bfd_byte *data, boolean relocateable,
2637 struct symbol_cache_entry **));
fdcb0453
KR
2638
2639 boolean (*_bfd_relax_section) PARAMS ((bfd *, struct sec *,
326e32d7 2640 struct bfd_link_info *, boolean *again));
fdcb0453 2641
ad46bd1d
ILT
2642 /* Create a hash table for the linker. Different backends store
2643 different information in this table. */
2644 struct bfd_link_hash_table *(*_bfd_link_hash_table_create) PARAMS ((bfd *));
2645
2646 /* Add symbols from this object file into the hash table. */
2647 boolean (*_bfd_link_add_symbols) PARAMS ((bfd *, struct bfd_link_info *));
2648
2649 /* Do a link based on the link_order structures attached to each
2650 section of the BFD. */
2651 boolean (*_bfd_final_link) PARAMS ((bfd *, struct bfd_link_info *));
2652
6167a840
JL
2653 /* Should this section be split up into smaller pieces during linking. */
2654 boolean (*_bfd_link_split_section) PARAMS ((bfd *, struct sec *));
2655
ad46bd1d
ILT
2656 /* Routines to handle dynamic symbols and relocs. */
2657#define BFD_JUMP_TABLE_DYNAMIC(NAME)\
2658CAT(NAME,_get_dynamic_symtab_upper_bound),\
2659CAT(NAME,_canonicalize_dynamic_symtab),\
2660CAT(NAME,_get_dynamic_reloc_upper_bound),\
2661CAT(NAME,_canonicalize_dynamic_reloc)
2662 /* Get the amount of memory required to hold the dynamic symbols. */
2663 long (*_bfd_get_dynamic_symtab_upper_bound) PARAMS ((bfd *));
2664 /* Read in the dynamic symbols. */
2665 long (*_bfd_canonicalize_dynamic_symtab)
2666 PARAMS ((bfd *, struct symbol_cache_entry **));
2667 /* Get the amount of memory required to hold the dynamic relocs. */
2668 long (*_bfd_get_dynamic_reloc_upper_bound) PARAMS ((bfd *));
2669 /* Read in the dynamic relocs. */
2670 long (*_bfd_canonicalize_dynamic_reloc)
2671 PARAMS ((bfd *, arelent **, struct symbol_cache_entry **));
4c3721d5 2672
fdcb0453
KR
2673 PTR backend_data;
2674} bfd_target;
2f3508ad 2675const bfd_target *
c188b0be 2676bfd_find_target PARAMS ((CONST char *target_name, bfd *abfd));
fdcb0453 2677
2f3508ad 2678const char **
fdcb0453
KR
2679bfd_target_list PARAMS ((void));
2680
2681boolean
2682bfd_check_format PARAMS ((bfd *abfd, bfd_format format));
2683
aabda2da
DM
2684boolean
2685bfd_check_format_matches PARAMS ((bfd *abfd, bfd_format format, char ***matching));
3b31740c 2686
fdcb0453 2687boolean
c188b0be 2688bfd_set_format PARAMS ((bfd *abfd, bfd_format format));
fdcb0453
KR
2689
2690CONST char *
c188b0be 2691bfd_format_string PARAMS ((bfd_format format));
fdcb0453 2692
815179af
ILT
2693#ifdef __cplusplus
2694}
2695#endif
fdcb0453 2696#endif
This page took 0.36984 seconds and 4 git commands to generate.