bfdlink.h revision 1.1.1.9.2.1 1 /* bfdlink.h -- header file for BFD link routines
2 Copyright (C) 1993-2024 Free Software Foundation, Inc.
3 Written by Steve Chamberlain and Ian Lance Taylor, Cygnus Support.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #ifndef BFDLINK_H
23 #define BFDLINK_H
24
25 /* Which symbols to strip during a link. */
26 enum bfd_link_strip
27 {
28 strip_none, /* Don't strip any symbols. */
29 strip_debugger, /* Strip debugging symbols. */
30 strip_some, /* keep_hash is the list of symbols to keep. */
31 strip_all /* Strip all symbols. */
32 };
33
34 /* Which local symbols to discard during a link. This is irrelevant
35 if strip_all is used. */
36 enum bfd_link_discard
37 {
38 discard_sec_merge, /* Discard local temporary symbols in SEC_MERGE
39 sections. */
40 discard_none, /* Don't discard any locals. */
41 discard_l, /* Discard local temporary symbols. */
42 discard_all /* Discard all locals. */
43 };
44
45 enum notice_asneeded_action {
46 notice_as_needed,
47 notice_not_needed,
48 notice_needed
49 };
50
51 /* Whether to generate ELF common symbols with the STT_COMMON type
52 during a relocatable link. */
53 enum bfd_link_elf_stt_common
54 {
55 unchanged,
56 elf_stt_common,
57 no_elf_stt_common
58 };
59
60 /* Describes the type of hash table entry structure being used.
61 Different hash table structure have different fields and so
62 support different linking features. */
63 enum bfd_link_hash_table_type
64 {
65 bfd_link_generic_hash_table,
66 bfd_link_elf_hash_table
67 };
68
69 /* These are the possible types of an entry in the BFD link hash
71 table. */
72
73 enum bfd_link_hash_type
74 {
75 bfd_link_hash_new, /* Symbol is new. */
76 bfd_link_hash_undefined, /* Symbol seen before, but undefined. */
77 bfd_link_hash_undefweak, /* Symbol is weak and undefined. */
78 bfd_link_hash_defined, /* Symbol is defined. */
79 bfd_link_hash_defweak, /* Symbol is weak and defined. */
80 bfd_link_hash_common, /* Symbol is common. */
81 bfd_link_hash_indirect, /* Symbol is an indirect link. */
82 bfd_link_hash_warning /* Like indirect, but warn if referenced. */
83 };
84
85 enum bfd_link_common_skip_ar_symbols
86 {
87 bfd_link_common_skip_none,
88 bfd_link_common_skip_text,
89 bfd_link_common_skip_data,
90 bfd_link_common_skip_all
91 };
92
93 struct bfd_link_hash_common_entry
94 {
95 unsigned int alignment_power; /* Alignment. */
96 asection *section; /* Symbol section. */
97 };
98
99 /* The linking routines use a hash table which uses this structure for
100 its elements. */
101
102 struct bfd_link_hash_entry
103 {
104 /* Base hash table entry structure. */
105 struct bfd_hash_entry root;
106
107 /* Type of this entry. */
108 ENUM_BITFIELD (bfd_link_hash_type) type : 8;
109
110 /* Symbol is referenced in a normal regular object file,
111 as distinct from a LTO IR object file. */
112 unsigned int non_ir_ref_regular : 1;
113
114 /* Symbol is referenced in a normal dynamic object file,
115 as distinct from a LTO IR object file. */
116 unsigned int non_ir_ref_dynamic : 1;
117
118 /* The symbol, SYM, is referenced by __real_SYM in an object file. */
119 unsigned int ref_real : 1;
120
121 /* Symbol is a built-in define. These will be overridden by PROVIDE
122 in a linker script. */
123 unsigned int linker_def : 1;
124
125 /* Symbol defined in a linker script. */
126 unsigned int ldscript_def : 1;
127
128 /* Symbol will be converted from absolute to section-relative. Set for
129 symbols defined by a script from "dot" (also SEGMENT_START or ORIGIN)
130 outside of an output section statement. */
131 unsigned int rel_from_abs : 1;
132
133 /* A union of information depending upon the type. */
134 union
135 {
136 /* Nothing is kept for bfd_hash_new. */
137 /* bfd_link_hash_undefined, bfd_link_hash_undefweak. */
138 struct
139 {
140 /* Undefined and common symbols are kept in a linked list through
141 this field. This field is present in all of the union element
142 so that we don't need to remove entries from the list when we
143 change their type. Removing entries would either require the
144 list to be doubly linked, which would waste more memory, or
145 require a traversal. When an undefined or common symbol is
146 created, it should be added to this list, the head of which is in
147 the link hash table itself. As symbols are defined, they need
148 not be removed from the list; anything which reads the list must
149 doublecheck the symbol type.
150
151 Weak symbols are not kept on this list.
152
153 Defined and defweak symbols use this field as a reference marker.
154 If the field is not NULL, or this structure is the tail of the
155 undefined symbol list, the symbol has been referenced. If the
156 symbol is undefined and becomes defined, this field will
157 automatically be non-NULL since the symbol will have been on the
158 undefined symbol list. */
159 struct bfd_link_hash_entry *next;
160 /* BFD symbol was found in. */
161 bfd *abfd;
162 } undef;
163 /* bfd_link_hash_defined, bfd_link_hash_defweak. */
164 struct
165 {
166 struct bfd_link_hash_entry *next;
167 /* Symbol section. */
168 asection *section;
169 /* Symbol value. */
170 bfd_vma value;
171 } def;
172 /* bfd_link_hash_indirect, bfd_link_hash_warning. */
173 struct
174 {
175 struct bfd_link_hash_entry *next;
176 /* Real symbol. */
177 struct bfd_link_hash_entry *link;
178 /* Warning message (bfd_link_hash_warning only). */
179 const char *warning;
180 } i;
181 /* bfd_link_hash_common. */
182 struct
183 {
184 struct bfd_link_hash_entry *next;
185 /* The linker needs to know three things about common
186 symbols: the size, the alignment, and the section in
187 which the symbol should be placed. We store the size
188 here, and we allocate a small structure to hold the
189 section and the alignment. The alignment is stored as a
190 power of two. We don't store all the information
191 directly because we don't want to increase the size of
192 the union; this structure is a major space user in the
193 linker. */
194 struct bfd_link_hash_common_entry *p;
195 /* Common symbol size. */
196 bfd_size_type size;
197 } c;
198 } u;
199 };
200
201 /* This is the link hash table. It is a derived class of
202 bfd_hash_table. */
203
204 struct bfd_link_hash_table
205 {
206 /* The hash table itself. */
207 struct bfd_hash_table table;
208 /* A linked list of undefined and common symbols, linked through the
209 next field in the bfd_link_hash_entry structure. */
210 struct bfd_link_hash_entry *undefs;
211 /* Entries are added to the tail of the undefs list. */
212 struct bfd_link_hash_entry *undefs_tail;
213 /* Function to free the hash table on closing BFD. */
214 void (*hash_table_free) (bfd *);
215 /* The type of the link hash table. */
216 enum bfd_link_hash_table_type type;
217 };
218
219 /* Look up an entry in a link hash table. If FOLLOW is TRUE, this
220 follows bfd_link_hash_indirect and bfd_link_hash_warning links to
221 the real symbol. */
222 extern struct bfd_link_hash_entry *bfd_link_hash_lookup
223 (struct bfd_link_hash_table *, const char *, bool create,
224 bool copy, bool follow);
225
226 /* Look up an entry in the main linker hash table if the symbol might
227 be wrapped. This should only be used for references to an
228 undefined symbol, not for definitions of a symbol. */
229
230 extern struct bfd_link_hash_entry *bfd_wrapped_link_hash_lookup
231 (bfd *, struct bfd_link_info *, const char *, bool, bool, bool);
232
233 /* If H is a wrapped symbol, ie. the symbol name starts with "__wrap_"
234 and the remainder is found in wrap_hash, return the real symbol. */
235
236 extern struct bfd_link_hash_entry *unwrap_hash_lookup
237 (struct bfd_link_info *, bfd *, struct bfd_link_hash_entry *);
238
239 /* Traverse a link hash table. */
240 extern void bfd_link_hash_traverse
241 (struct bfd_link_hash_table *,
242 bool (*) (struct bfd_link_hash_entry *, void *),
243 void *);
244
245 /* Add an entry to the undefs list. */
246 extern void bfd_link_add_undef
247 (struct bfd_link_hash_table *, struct bfd_link_hash_entry *);
248
249 /* Remove symbols from the undefs list that don't belong there. */
250 extern void bfd_link_repair_undef_list
251 (struct bfd_link_hash_table *table);
252
253 /* Read symbols and cache symbol pointer array in outsymbols. */
254 extern bool bfd_generic_link_read_symbols (bfd *);
255
256 /* Check the relocs in the BFD. Called after all the input
257 files have been loaded, and garbage collection has tagged
258 any unneeded sections. */
259 extern bool bfd_link_check_relocs (bfd *,struct bfd_link_info *);
260
261 struct bfd_sym_chain
262 {
263 struct bfd_sym_chain *next;
264 const char *name;
265 };
266
267 /* How to handle unresolved symbols.
269 There are four possibilities which are enumerated below: */
270 enum report_method
271 {
272 /* This is the initial value when then link_info structure is created.
273 It allows the various stages of the linker to determine whether they
274 allowed to set the value. */
275 RM_NOT_YET_SET = 0,
276 RM_IGNORE,
277 RM_DIAGNOSE,
278 };
279
280 /* How to handle DT_TEXTREL. */
281
282 enum textrel_check_method
283 {
284 textrel_check_none,
285 textrel_check_warning,
286 textrel_check_error
287 };
288
289 #define bfd_link_textrel_check(info) \
290 (info->textrel_check != textrel_check_none)
291
292 typedef enum {with_flags, without_flags} flag_type;
293
294 /* A section flag list. */
295 struct flag_info_list
296 {
297 flag_type with;
298 const char *name;
299 bool valid;
300 struct flag_info_list *next;
301 };
302
303 /* Section flag info. */
304 struct flag_info
305 {
306 flagword only_with_flags;
307 flagword not_with_flags;
308 struct flag_info_list *flag_list;
309 bool flags_initialized;
310 };
311
312 struct bfd_elf_dynamic_list;
313 struct bfd_elf_version_tree;
314
315 /* Types of output. */
316
317 enum output_type
318 {
319 type_pde,
320 type_pie,
321 type_relocatable,
322 type_dll,
323 };
324
325 #define bfd_link_pde(info) ((info)->type == type_pde)
326 #define bfd_link_dll(info) ((info)->type == type_dll)
327 #define bfd_link_relocatable(info) ((info)->type == type_relocatable)
328 #define bfd_link_pie(info) ((info)->type == type_pie)
329 #define bfd_link_executable(info) (bfd_link_pde (info) || bfd_link_pie (info))
330 #define bfd_link_pic(info) (bfd_link_dll (info) || bfd_link_pie (info))
331
332 /* This structure holds all the information needed to communicate
333 between BFD and the linker when doing a link. */
334
335 struct bfd_link_info
336 {
337 /* Output type. */
338 ENUM_BITFIELD (output_type) type : 2;
339
340 /* TRUE if BFD should pre-bind symbols in a shared object. */
341 unsigned int symbolic: 1;
342
343 /* TRUE if BFD should export all symbols in the dynamic symbol table
344 of an executable, rather than only those used. */
345 unsigned int export_dynamic: 1;
346
347 /* TRUE if a default symbol version should be created and used for
348 exported symbols. */
349 unsigned int create_default_symver: 1;
350
351 /* TRUE if unreferenced sections should be removed. */
352 unsigned int gc_sections: 1;
353
354 /* TRUE if exported symbols should be kept during section gc. */
355 unsigned int gc_keep_exported: 1;
356
357 /* TRUE if every symbol should be reported back via the notice
358 callback. */
359 unsigned int notice_all: 1;
360
361 /* TRUE if the LTO plugin is active. */
362 unsigned int lto_plugin_active: 1;
363
364 /* TRUE if all LTO IR symbols have been read. */
365 unsigned int lto_all_symbols_read : 1;
366
367 /* TRUE if global symbols in discarded sections should be stripped. */
368 unsigned int strip_discarded: 1;
369
370 /* TRUE if all data symbols should be dynamic. */
371 unsigned int dynamic_data: 1;
372
373 /* TRUE if section groups should be resolved. */
374 unsigned int resolve_section_groups: 1;
375
376 /* Set if output file is big-endian, or if that is unknown, from
377 the command line or first input file endianness. */
378 unsigned int big_endian : 1;
379
380 /* Which symbols to strip. */
381 ENUM_BITFIELD (bfd_link_strip) strip : 2;
382
383 /* Which local symbols to discard. */
384 ENUM_BITFIELD (bfd_link_discard) discard : 2;
385
386 /* Whether to generate ELF common symbols with the STT_COMMON type. */
387 ENUM_BITFIELD (bfd_link_elf_stt_common) elf_stt_common : 2;
388
389 /* Criteria for skipping symbols when determining
390 whether to include an object from an archive. */
391 ENUM_BITFIELD (bfd_link_common_skip_ar_symbols) common_skip_ar_symbols : 2;
392
393 /* What to do with unresolved symbols in an object file.
394 When producing executables the default is GENERATE_ERROR.
395 When producing shared libraries the default is IGNORE. The
396 assumption with shared libraries is that the reference will be
397 resolved at load/execution time. */
398 ENUM_BITFIELD (report_method) unresolved_syms_in_objects : 2;
399
400 /* What to do with unresolved symbols in a shared library.
401 The same defaults apply. */
402 ENUM_BITFIELD (report_method) unresolved_syms_in_shared_libs : 2;
403
404 /* TRUE if unresolved symbols are to be warned, rather than errored. */
405 unsigned int warn_unresolved_syms: 1;
406
407 /* TRUE if shared objects should be linked directly, not shared. */
408 unsigned int static_link: 1;
409
410 /* TRUE if symbols should be retained in memory, FALSE if they
411 should be freed and reread. */
412 unsigned int keep_memory: 1;
413
414 /* TRUE if BFD should generate relocation information in the final
415 executable. */
416 unsigned int emitrelocations: 1;
417
418 /* TRUE if PT_GNU_RELRO segment should be created. */
419 unsigned int relro: 1;
420
421 /* TRUE if DT_RELR should be enabled for compact relative
422 relocations. */
423 unsigned int enable_dt_relr: 1;
424
425 /* TRUE if separate code segment should be created. */
426 unsigned int separate_code: 1;
427
428 /* Nonzero if .eh_frame_hdr section and PT_GNU_EH_FRAME ELF segment
429 should be created. 1 for DWARF2 tables, 2 for compact tables. */
430 unsigned int eh_frame_hdr_type: 2;
431
432 /* What to do with DT_TEXTREL in output. */
433 ENUM_BITFIELD (textrel_check_method) textrel_check: 2;
434
435 /* TRUE if .hash section should be created. */
436 unsigned int emit_hash: 1;
437
438 /* TRUE if .gnu.hash section should be created. */
439 unsigned int emit_gnu_hash: 1;
440
441 /* If TRUE reduce memory overheads, at the expense of speed. This will
442 cause map file generation to use an O(N^2) algorithm and disable
443 caching ELF symbol buffer. */
444 unsigned int reduce_memory_overheads: 1;
445
446 /* TRUE if the output file should be in a traditional format. This
447 is equivalent to the setting of the BFD_TRADITIONAL_FORMAT flag
448 on the output file, but may be checked when reading the input
449 files. */
450 unsigned int traditional_format: 1;
451
452 /* TRUE if non-PLT relocs should be merged into one reloc section
453 and sorted so that relocs against the same symbol come together. */
454 unsigned int combreloc: 1;
455
456 /* TRUE if a default symbol version should be created and used for
457 imported symbols. */
458 unsigned int default_imported_symver: 1;
459
460 /* TRUE if the new ELF dynamic tags are enabled. */
461 unsigned int new_dtags: 1;
462
463 /* FALSE if .eh_frame unwind info should be generated for PLT and other
464 linker created sections, TRUE if it should be omitted. */
465 unsigned int no_ld_generated_unwind_info: 1;
466
467 /* TRUE if BFD should generate a "task linked" object file,
468 similar to relocatable but also with globals converted to
469 statics. */
470 unsigned int task_link: 1;
471
472 /* TRUE if ok to have multiple definitions, without warning. */
473 unsigned int allow_multiple_definition: 1;
474
475 /* TRUE if multiple definition of absolute symbols (eg. from -R) should
476 be reported. */
477 unsigned int prohibit_multiple_definition_absolute: 1;
478
479 /* TRUE if multiple definitions should only warn. */
480 unsigned int warn_multiple_definition: 1;
481
482 /* TRUE if ok to have version with no definition. */
483 unsigned int allow_undefined_version: 1;
484
485 /* TRUE if some symbols have to be dynamic, controlled by
486 --dynamic-list command line options. */
487 unsigned int dynamic: 1;
488
489 /* Set if the "-z execstack" option has been used to request that a
490 PT_GNU_STACK segment should be created with PF_R, PF_W and PF_X
491 flags set.
492
493 Note - if performing a relocatable link then a .note.GNU-stack
494 section will be created instead, if one does not exist already.
495 The section will have the SHF_EXECINSTR flag bit set. */
496 unsigned int execstack: 1;
497
498 /* Set if the "-z noexecstack" option has been used to request that a
499 PT_GNU_STACK segment should be created with PF_R and PF_W flags. Or
500 a non-executable .note.GNU-stack section for relocateable links.
501
502 Note - this flag is not quite orthogonal to execstack, since both
503 of these flags can be 0. In this case a stack segment can still
504 be created, but it will only have the PF_X flag bit set if one or
505 more of the input files contains a .note.GNU-stack section with the
506 SHF_EXECINSTR flag bit set, or if the default behaviour for the
507 architecture is to create executable stacks.
508
509 The execstack and noexecstack flags should never both be 1. */
510 unsigned int noexecstack: 1;
511
512 /* Tri-state variable:
513 0 => do not warn when creating an executable stack.
514 1 => always warn when creating an executable stack (for any reason).
515 2 => only warn when an executable stack has been requested an object
516 file and execstack is 0 or noexecstack is 1.
517 3 => not used. */
518 unsigned int warn_execstack: 2;
519 /* TRUE if a warning generated because of warn_execstack should be instead
520 be treated as an error. */
521 unsigned int error_execstack: 1;
522
523 /* TRUE if warnings should NOT be generated for TLS segments with eXecute
524 permission or LOAD segments with RWX permissions. */
525 unsigned int no_warn_rwx_segments: 1;
526 /* TRUE if the user gave either --warn-rwx-segments or
527 --no-warn-rwx-segments on the linker command line. */
528 unsigned int user_warn_rwx_segments: 1;
529 /* TRUE if warnings generated when no_warn_rwx_segements is 0 should
530 instead be treated as errors. */
531 unsigned int warn_is_error_for_rwx_segments: 1;
532
533 /* TRUE if the stack can be made executable because of the absence of a
534 .note.GNU-stack section in an input file. Note - even if this field
535 is set, some targets may choose to ignore the setting and not create
536 an executable stack. */
537 unsigned int default_execstack : 1;
538
539 /* TRUE if we want to produced optimized output files. This might
540 need much more time and therefore must be explicitly selected. */
541 unsigned int optimize: 1;
542
543 /* TRUE if user should be informed of removed unreferenced sections. */
544 unsigned int print_gc_sections: 1;
545
546 /* TRUE if we should warn alternate ELF machine code. */
547 unsigned int warn_alternate_em: 1;
548
549 /* TRUE if the linker script contained an explicit PHDRS command. */
550 unsigned int user_phdrs: 1;
551
552 /* TRUE if program headers ought to be loaded. */
553 unsigned int load_phdrs: 1;
554
555 /* TRUE if we should check relocations after all input files have
556 been opened. */
557 unsigned int check_relocs_after_open_input: 1;
558
559 /* TRUE if generation of .interp/PT_INTERP should be suppressed. */
560 unsigned int nointerp: 1;
561
562 /* TRUE if common symbols should be treated as undefined. */
563 unsigned int inhibit_common_definition : 1;
564
565 /* TRUE if "-Map map" is passed to linker. */
566 unsigned int has_map_file : 1;
567
568 /* TRUE if "--enable-non-contiguous-regions" is passed to the
569 linker. */
570 unsigned int non_contiguous_regions : 1;
571
572 /* TRUE if "--enable-non-contiguous-regions-warnings" is passed to
573 the linker. */
574 unsigned int non_contiguous_regions_warnings : 1;
575
576 /* TRUE if all symbol names should be unique. */
577 unsigned int unique_symbol : 1;
578
579 /* TRUE if maxpagesize is set on command-line. */
580 unsigned int maxpagesize_is_set : 1;
581
582 /* TRUE if commonpagesize is set on command-line. */
583 unsigned int commonpagesize_is_set : 1;
584
585 /* Char that may appear as the first char of a symbol, but should be
586 skipped (like symbol_leading_char) when looking up symbols in
587 wrap_hash. Used by PowerPC Linux for 'dot' symbols. */
588 char wrap_char;
589
590 /* Separator between archive and filename in linker script filespecs. */
591 char path_separator;
592
593 /* Default stack size. Zero means default (often zero itself), -1
594 means explicitly zero-sized. */
595 bfd_signed_vma stacksize;
596
597 /* Enable or disable target specific optimizations.
598
599 Not all targets have optimizations to enable.
600
601 Normally these optimizations are disabled by default but some targets
602 prefer to enable them by default. So this field is a tri-state variable.
603 The values are:
604
605 zero: Enable the optimizations (either from --relax being specified on
606 the command line or the backend's before_allocation emulation function.
607
608 positive: The user has requested that these optimizations be disabled.
609 (Via the --no-relax command line option).
610
611 negative: The optimizations are disabled. (Set when initializing the
612 args_type structure in ldmain.c:main. */
613 signed int disable_target_specific_optimizations;
614
615 /* Function callbacks. */
616 const struct bfd_link_callbacks *callbacks;
617
618 /* Hash table handled by BFD. */
619 struct bfd_link_hash_table *hash;
620
621 /* Hash table of symbols to keep. This is NULL unless strip is
622 strip_some. */
623 struct bfd_hash_table *keep_hash;
624
625 /* Hash table of symbols to report back via the notice callback. If
626 this is NULL, and notice_all is FALSE, then no symbols are
627 reported back. */
628 struct bfd_hash_table *notice_hash;
629
630 /* Hash table of symbols which are being wrapped (the --wrap linker
631 option). If this is NULL, no symbols are being wrapped. */
632 struct bfd_hash_table *wrap_hash;
633
634 /* Hash table of symbols which may be left unresolved during
635 a link. If this is NULL, no symbols can be left unresolved. */
636 struct bfd_hash_table *ignore_hash;
637
638 /* The output BFD. */
639 bfd *output_bfd;
640
641 /* The import library generated. */
642 bfd *out_implib_bfd;
643
644 /* The list of input BFD's involved in the link. These are chained
645 together via the link.next field. */
646 bfd *input_bfds;
647 bfd **input_bfds_tail;
648
649 /* If a symbol should be created for each input BFD, this is section
650 where those symbols should be placed. It must be a section in
651 the output BFD. It may be NULL, in which case no such symbols
652 will be created. This is to support CREATE_OBJECT_SYMBOLS in the
653 linker command language. */
654 asection *create_object_symbols_section;
655
656 /* List of global symbol names that are starting points for marking
657 sections against garbage collection. */
658 struct bfd_sym_chain *gc_sym_list;
659
660 /* If a base output file is wanted, then this points to it */
661 void *base_file;
662
663 /* The function to call when the executable or shared object is
664 loaded. */
665 const char *init_function;
666
667 /* The function to call when the executable or shared object is
668 unloaded. */
669 const char *fini_function;
670
671 /* Number of relaxation passes. Usually only one relaxation pass
672 is needed. But a backend can have as many relaxation passes as
673 necessary. During bfd_relax_section call, it is set to the
674 current pass, starting from 0. */
675 int relax_pass;
676
677 /* Number of relaxation trips. This number is incremented every
678 time the relaxation pass is restarted due to a previous
679 relaxation returning true in *AGAIN. */
680 int relax_trip;
681
682 /* > 0 to treat protected data defined in the shared library as
683 reference external. 0 to treat it as internal. -1 to let
684 backend to decide. */
685 int extern_protected_data;
686
687 /* 1 to make undefined weak symbols dynamic when building a dynamic
688 object. 0 to resolve undefined weak symbols to zero. -1 to let
689 the backend decide. */
690 int dynamic_undefined_weak;
691
692 /* Non-zero if auto-import thunks for DATA items in pei386 DLLs
693 should be generated/linked against. Set to 1 if this feature
694 is explicitly requested by the user, -1 if enabled by default. */
695 int pei386_auto_import;
696
697 /* Non-zero if runtime relocs for DATA items with non-zero addends
698 in pei386 DLLs should be generated. Set to 1 if this feature
699 is explicitly requested by the user, -1 if enabled by default. */
700 int pei386_runtime_pseudo_reloc;
701
702 /* How many spare .dynamic DT_NULL entries should be added? */
703 unsigned int spare_dynamic_tags;
704
705 /* GNU_PROPERTY_1_NEEDED_INDIRECT_EXTERN_ACCESS control:
706 > 1: Turn on by -z indirect-extern-access or by backend.
707 == 1: Turn on by an input.
708 0: Turn off.
709 < 0: Turn on if it is set on any inputs or let backend to
710 decide. */
711 int indirect_extern_access;
712
713 /* Non-zero if executable should not contain copy relocs.
714 > 1: Implied by indirect_extern_access.
715 == 1: Turn on by -z nocopyreloc.
716 0: Turn off.
717 Setting this to non-zero may result in a non-sharable text
718 segment. */
719 int nocopyreloc;
720
721 /* Pointer to the GNU_PROPERTY_1_NEEDED property in memory. */
722 bfd_byte *needed_1_p;
723
724 /* May be used to set DT_FLAGS for ELF. */
725 bfd_vma flags;
726
727 /* May be used to set DT_FLAGS_1 for ELF. */
728 bfd_vma flags_1;
729
730 /* May be used to set DT_GNU_FLAGS_1 for ELF. */
731 bfd_vma gnu_flags_1;
732
733 /* TRUE if references to __start_/__stop_ synthesized symbols do not
734 specially retain C identifier named sections. */
735 int start_stop_gc;
736
737 /* May be used to set ELF visibility for __start_* / __stop_. */
738 unsigned int start_stop_visibility;
739
740 /* The maximum page size for ELF. */
741 bfd_vma maxpagesize;
742
743 /* The common page size for ELF. */
744 bfd_vma commonpagesize;
745
746 /* Start and end of RELRO region. */
747 bfd_vma relro_start, relro_end;
748
749 /* List of symbols should be dynamic. */
750 struct bfd_elf_dynamic_list *dynamic_list;
751
752 /* The version information. */
753 struct bfd_elf_version_tree *version_info;
754
755 /* Size of cache. Backend can use it to keep strace cache size. */
756 bfd_size_type cache_size;
757
758 /* The maximum cache size. Backend can use cache_size and and
759 max_cache_size to decide if keep_memory should be honored. */
760 bfd_size_type max_cache_size;
761 };
762
763 /* Some forward-definitions used by some callbacks. */
764
765 struct elf_strtab_hash;
766 struct elf_internal_sym;
767
768 /* This structures holds a set of callback functions. These are called
769 by the BFD linker routines. */
770
771 struct bfd_link_callbacks
772 {
773 /* A function which is called when an object is added from an
774 archive. ABFD is the archive element being added. NAME is the
775 name of the symbol which caused the archive element to be pulled
776 in. This function may set *SUBSBFD to point to an alternative
777 BFD from which symbols should in fact be added in place of the
778 original BFD's symbols. Returns TRUE if the object should be
779 added, FALSE if it should be skipped. */
780 bool (*add_archive_element)
781 (struct bfd_link_info *, bfd *abfd, const char *name, bfd **subsbfd);
782 /* A function which is called when a symbol is found with multiple
783 definitions. H is the symbol which is defined multiple times.
784 NBFD is the new BFD, NSEC is the new section, and NVAL is the new
785 value. NSEC may be bfd_com_section or bfd_ind_section. */
786 void (*multiple_definition)
787 (struct bfd_link_info *, struct bfd_link_hash_entry *h,
788 bfd *nbfd, asection *nsec, bfd_vma nval);
789 /* A function which is called when a common symbol is defined
790 multiple times. H is the symbol appearing multiple times.
791 NBFD is the BFD of the new symbol. NTYPE is the type of the new
792 symbol, one of bfd_link_hash_defined, bfd_link_hash_common, or
793 bfd_link_hash_indirect. If NTYPE is bfd_link_hash_common, NSIZE
794 is the size of the new symbol. */
795 void (*multiple_common)
796 (struct bfd_link_info *, struct bfd_link_hash_entry *h,
797 bfd *nbfd, enum bfd_link_hash_type ntype, bfd_vma nsize);
798 /* A function which is called to add a symbol to a set. ENTRY is
799 the link hash table entry for the set itself (e.g.,
800 __CTOR_LIST__). RELOC is the relocation to use for an entry in
801 the set when generating a relocatable file, and is also used to
802 get the size of the entry when generating an executable file.
803 ABFD, SEC and VALUE identify the value to add to the set. */
804 void (*add_to_set)
805 (struct bfd_link_info *, struct bfd_link_hash_entry *entry,
806 bfd_reloc_code_real_type reloc, bfd *abfd, asection *sec, bfd_vma value);
807 /* A function which is called when the name of a g++ constructor or
808 destructor is found. This is only called by some object file
809 formats. CONSTRUCTOR is TRUE for a constructor, FALSE for a
810 destructor. This will use BFD_RELOC_CTOR when generating a
811 relocatable file. NAME is the name of the symbol found. ABFD,
812 SECTION and VALUE are the value of the symbol. */
813 void (*constructor)
814 (struct bfd_link_info *, bool constructor, const char *name,
815 bfd *abfd, asection *sec, bfd_vma value);
816 /* A function which is called to issue a linker warning. For
817 example, this is called when there is a reference to a warning
818 symbol. WARNING is the warning to be issued. SYMBOL is the name
819 of the symbol which triggered the warning; it may be NULL if
820 there is none. ABFD, SECTION and ADDRESS identify the location
821 which trigerred the warning; either ABFD or SECTION or both may
822 be NULL if the location is not known. */
823 void (*warning)
824 (struct bfd_link_info *, const char *warning, const char *symbol,
825 bfd *abfd, asection *section, bfd_vma address);
826 /* A function which is called when a relocation is attempted against
827 an undefined symbol. NAME is the symbol which is undefined.
828 ABFD, SECTION and ADDRESS identify the location from which the
829 reference is made. IS_FATAL indicates whether an undefined symbol is
830 a fatal error or not. In some cases SECTION may be NULL. */
831 void (*undefined_symbol)
832 (struct bfd_link_info *, const char *name, bfd *abfd,
833 asection *section, bfd_vma address, bool is_fatal);
834 /* A function which is called when a reloc overflow occurs. ENTRY is
835 the link hash table entry for the symbol the reloc is against.
836 NAME is the name of the local symbol or section the reloc is
837 against, RELOC_NAME is the name of the relocation, and ADDEND is
838 any addend that is used. ABFD, SECTION and ADDRESS identify the
839 location at which the overflow occurs; if this is the result of a
840 bfd_section_reloc_link_order or bfd_symbol_reloc_link_order, then
841 ABFD will be NULL. */
842 void (*reloc_overflow)
843 (struct bfd_link_info *, struct bfd_link_hash_entry *entry,
844 const char *name, const char *reloc_name, bfd_vma addend,
845 bfd *abfd, asection *section, bfd_vma address);
846 /* A function which is called when a dangerous reloc is performed.
847 MESSAGE is an appropriate message.
848 ABFD, SECTION and ADDRESS identify the location at which the
849 problem occurred; if this is the result of a
850 bfd_section_reloc_link_order or bfd_symbol_reloc_link_order, then
851 ABFD will be NULL. */
852 void (*reloc_dangerous)
853 (struct bfd_link_info *, const char *message,
854 bfd *abfd, asection *section, bfd_vma address);
855 /* A function which is called when a reloc is found to be attached
856 to a symbol which is not being written out. NAME is the name of
857 the symbol. ABFD, SECTION and ADDRESS identify the location of
858 the reloc; if this is the result of a
859 bfd_section_reloc_link_order or bfd_symbol_reloc_link_order, then
860 ABFD will be NULL. */
861 void (*unattached_reloc)
862 (struct bfd_link_info *, const char *name,
863 bfd *abfd, asection *section, bfd_vma address);
864 /* A function which is called when a symbol in notice_hash is
865 defined or referenced. H is the symbol, INH the indirect symbol
866 if applicable. ABFD, SECTION and ADDRESS are the (new) value of
867 the symbol. If SECTION is bfd_und_section, this is a reference.
868 FLAGS are the symbol BSF_* flags. */
869 bool (*notice)
870 (struct bfd_link_info *, struct bfd_link_hash_entry *h,
871 struct bfd_link_hash_entry *inh,
872 bfd *abfd, asection *section, bfd_vma address, flagword flags);
873 /* Error or warning link info message. */
874 void (*einfo)
875 (const char *fmt, ...);
876 /* General link info message. */
877 void (*info)
878 (const char *fmt, ...);
879 /* Message to be printed in linker map file. */
880 void (*minfo)
881 (const char *fmt, ...);
882 /* This callback provides a chance for users of the BFD library to
883 override its decision about whether to place two adjacent sections
884 into the same segment. */
885 bool (*override_segment_assignment)
886 (struct bfd_link_info *, bfd * abfd,
887 asection * current_section, asection * previous_section,
888 bool new_segment);
889 /* This callback provides a chance for callers of the BFD to examine the
890 ELF (dynamic) string table once it is complete. */
891 void (*examine_strtab)
892 (struct elf_strtab_hash *symstrtab);
893 /* This callback is called just before a symbol is swapped out, so that the
894 CTF machinery can look up symbols during construction. The name is
895 already an external strtab offset at this point. */
896 void (*ctf_new_symbol)
897 (int symidx, struct elf_internal_sym *sym);
898 /* Likewise, for dynamic symbols. */
899 void (*ctf_new_dynsym)
900 (int symidx, struct elf_internal_sym *sym);
901 /* This callback should emit the CTF section into a non-loadable section in
902 the output BFD named .ctf or a name beginning with ".ctf.". */
903 void (*emit_ctf)
904 (void);
905 };
906
907 /* The linker builds link_order structures which tell the code how to
909 include input data in the output file. */
910
911 /* These are the types of link_order structures. */
912
913 enum bfd_link_order_type
914 {
915 bfd_undefined_link_order, /* Undefined. */
916 bfd_indirect_link_order, /* Built from a section. */
917 bfd_data_link_order, /* Set to explicit data. */
918 bfd_section_reloc_link_order, /* Relocate against a section. */
919 bfd_symbol_reloc_link_order /* Relocate against a symbol. */
920 };
921
922 /* This is the link_order structure itself. These form a chain
923 attached to the output section whose contents they are describing. */
924
925 struct bfd_link_order
926 {
927 /* Next link_order in chain. */
928 struct bfd_link_order *next;
929 /* Type of link_order. */
930 enum bfd_link_order_type type;
931 /* Offset within output section in bytes. */
932 bfd_vma offset;
933 /* Size within output section in octets. */
934 bfd_size_type size;
935 /* Type specific information. */
936 union
937 {
938 struct
939 {
940 /* Section to include. If this is used, then
941 section->output_section must be the section the
942 link_order is attached to, section->output_offset must
943 equal the link_order offset field, and section->size
944 must equal the link_order size field. Maybe these
945 restrictions should be relaxed someday. */
946 asection *section;
947 } indirect;
948 struct
949 {
950 /* Size of contents, or zero when contents should be filled by
951 the architecture-dependent fill function.
952 A non-zero value allows filling of the output section
953 with an arbitrary repeated pattern. */
954 unsigned int size;
955 /* Data to put into file. */
956 bfd_byte *contents;
957 } data;
958 struct
959 {
960 /* Description of reloc to generate. Used for
961 bfd_section_reloc_link_order and
962 bfd_symbol_reloc_link_order. */
963 struct bfd_link_order_reloc *p;
964 } reloc;
965 } u;
966 };
967
968 /* A linker order of type bfd_section_reloc_link_order or
969 bfd_symbol_reloc_link_order means to create a reloc against a
970 section or symbol, respectively. This is used to implement -Ur to
971 generate relocs for the constructor tables. The
972 bfd_link_order_reloc structure describes the reloc that BFD should
973 create. It is similar to a arelent, but I didn't use arelent
974 because the linker does not know anything about most symbols, and
975 any asymbol structure it creates will be partially meaningless.
976 This information could logically be in the bfd_link_order struct,
977 but I didn't want to waste the space since these types of relocs
978 are relatively rare. */
979
980 struct bfd_link_order_reloc
981 {
982 /* Reloc type. */
983 bfd_reloc_code_real_type reloc;
984
985 union
986 {
987 /* For type bfd_section_reloc_link_order, this is the section
988 the reloc should be against. This must be a section in the
989 output BFD, not any of the input BFDs. */
990 asection *section;
991 /* For type bfd_symbol_reloc_link_order, this is the name of the
992 symbol the reloc should be against. */
993 const char *name;
994 } u;
995
996 /* Addend to use. The object file should contain zero. The BFD
997 backend is responsible for filling in the contents of the object
998 file correctly. For some object file formats (e.g., COFF) the
999 addend must be stored into in the object file, and for some
1000 (e.g., SPARC a.out) it is kept in the reloc. */
1001 bfd_vma addend;
1002 };
1003
1004 /* Allocate a new link_order for a section. */
1005 extern struct bfd_link_order *bfd_new_link_order (bfd *, asection *);
1006
1007 struct bfd_section_already_linked;
1008
1009 extern bool bfd_section_already_linked_table_init (void);
1010 extern void bfd_section_already_linked_table_free (void);
1011 extern bool _bfd_handle_already_linked
1012 (struct bfd_section *, struct bfd_section_already_linked *,
1013 struct bfd_link_info *);
1014
1015 extern struct bfd_section *_bfd_nearby_section
1016 (bfd *, struct bfd_section *, bfd_vma);
1017
1018 extern void _bfd_fix_excluded_sec_syms
1019 (bfd *, struct bfd_link_info *);
1020
1021 /* These structures are used to describe version information for the
1022 ELF linker. These structures could be manipulated entirely inside
1023 BFD, but it would be a pain. Instead, the regular linker sets up
1024 these structures, and then passes them into BFD. */
1025
1026 /* Glob pattern for a version. */
1027
1028 struct bfd_elf_version_expr
1029 {
1030 /* Next glob pattern for this version. */
1031 struct bfd_elf_version_expr *next;
1032 /* Glob pattern. */
1033 const char *pattern;
1034 /* Set if pattern is not a glob. */
1035 unsigned int literal : 1;
1036 /* Defined by ".symver". */
1037 unsigned int symver : 1;
1038 /* Defined by version script. */
1039 unsigned int script : 1;
1040 /* Pattern type. */
1041 #define BFD_ELF_VERSION_C_TYPE 1
1042 #define BFD_ELF_VERSION_CXX_TYPE 2
1043 #define BFD_ELF_VERSION_JAVA_TYPE 4
1044 unsigned int mask : 3;
1045 };
1046
1047 struct bfd_elf_version_expr_head
1048 {
1049 /* List of all patterns, both wildcards and non-wildcards. */
1050 struct bfd_elf_version_expr *list;
1051 /* Hash table for non-wildcards. */
1052 void *htab;
1053 /* Remaining patterns. */
1054 struct bfd_elf_version_expr *remaining;
1055 /* What kind of pattern types are present in list (bitmask). */
1056 unsigned int mask;
1057 };
1058
1059 /* Version dependencies. */
1060
1061 struct bfd_elf_version_deps
1062 {
1063 /* Next dependency for this version. */
1064 struct bfd_elf_version_deps *next;
1065 /* The version which this version depends upon. */
1066 struct bfd_elf_version_tree *version_needed;
1067 };
1068
1069 /* A node in the version tree. */
1070
1071 struct bfd_elf_version_tree
1072 {
1073 /* Next version. */
1074 struct bfd_elf_version_tree *next;
1075 /* Name of this version. */
1076 const char *name;
1077 /* Version number. */
1078 unsigned int vernum;
1079 /* Regular expressions for global symbols in this version. */
1080 struct bfd_elf_version_expr_head globals;
1081 /* Regular expressions for local symbols in this version. */
1082 struct bfd_elf_version_expr_head locals;
1083 /* List of versions which this version depends upon. */
1084 struct bfd_elf_version_deps *deps;
1085 /* Index of the version name. This is used within BFD. */
1086 unsigned int name_indx;
1087 /* Whether this version tree was used. This is used within BFD. */
1088 int used;
1089 /* Matching hook. */
1090 struct bfd_elf_version_expr *(*match)
1091 (struct bfd_elf_version_expr_head *head,
1092 struct bfd_elf_version_expr *prev, const char *sym);
1093 };
1094
1095 struct bfd_elf_dynamic_list
1096 {
1097 struct bfd_elf_version_expr_head head;
1098 struct bfd_elf_version_expr *(*match)
1099 (struct bfd_elf_version_expr_head *head,
1100 struct bfd_elf_version_expr *prev, const char *sym);
1101 };
1102
1103 #endif
1104