typo fix
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
4e5bae56 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
dab69f68 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
252b5132
RH
4 Free Software Foundation, Inc.
5 Written by Steve Chamberlain steve@cygnus.com
6
f96b4a7b 7 This file is part of the GNU Binutils.
252b5132 8
f96b4a7b 9 This program is free software; you can redistribute it and/or modify
2fa9fc65 10 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
252b5132 13
f96b4a7b 14 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
2fa9fc65 19 You should have received a copy of the GNU General Public License
f96b4a7b
NC
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
3882b010 26#include "safe-ctype.h"
252b5132
RH
27#include "libiberty.h"
28#include "progress.h"
29#include "bfdlink.h"
5af11cab 30#include "filenames.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
46#include "libbfd.h"
47#endif /* ENABLE_PLUGINS */
252b5132 48
0125cdf2 49/* Somewhere above, sys/stat.h got included. */
252b5132
RH
50#if !defined(S_ISDIR) && defined(S_IFDIR)
51#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
52#endif
53
54#include <string.h>
55
56#ifdef HAVE_SBRK
502bdb00 57#if !HAVE_DECL_SBRK
1579bae1 58extern void *sbrk ();
252b5132
RH
59#endif
60#endif
61
9c8ebd6a
DJ
62#ifndef TARGET_SYSTEM_ROOT
63#define TARGET_SYSTEM_ROOT ""
64#endif
65
252b5132
RH
66/* EXPORTS */
67
53d25da6
AM
68FILE *saved_script_handle = NULL;
69FILE *previous_script_handle = NULL;
70bfd_boolean force_make_executable = FALSE;
71
252b5132
RH
72char *default_target;
73const char *output_filename = "a.out";
74
75/* Name this program was invoked by. */
76char *program_name;
77
9c8ebd6a 78/* The prefix for system library directories. */
e2243057 79const char *ld_sysroot;
9c8ebd6a 80
3fe38064
NC
81/* The canonical representation of ld_sysroot. */
82char * ld_canon_sysroot;
83int ld_canon_sysroot_len;
84
252b5132
RH
85/* Set by -G argument, for MIPS ECOFF target. */
86int g_switch_value = 8;
87
88/* Nonzero means print names of input files as processed. */
b34976b6 89bfd_boolean trace_files;
252b5132 90
cd6f1cf3
NC
91/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
92bfd_boolean verbose;
252b5132
RH
93
94/* Nonzero means version number was printed, so exit successfully
95 instead of complaining if no input files are given. */
b34976b6 96bfd_boolean version_printed;
252b5132 97
b34976b6
AM
98/* TRUE if we should demangle symbol names. */
99bfd_boolean demangling;
252b5132
RH
100
101args_type command_line;
102
103ld_config_type config;
104
bcaa7b3e
L
105sort_type sort_section;
106
e2243057
RS
107static const char *get_sysroot
108 (int, char **);
0125cdf2 109static char *get_emulation
1579bae1 110 (int, char **);
0125cdf2 111static bfd_boolean add_archive_element
5d3236ee 112 (struct bfd_link_info *, bfd *, const char *, bfd **);
0125cdf2 113static bfd_boolean multiple_definition
24f58f47 114 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 115 bfd *, asection *, bfd_vma);
0125cdf2 116static bfd_boolean multiple_common
24f58f47
AM
117 (struct bfd_link_info *, struct bfd_link_hash_entry *,
118 bfd *, enum bfd_link_hash_type, bfd_vma);
0125cdf2 119static bfd_boolean add_to_set
1579bae1
AM
120 (struct bfd_link_info *, struct bfd_link_hash_entry *,
121 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
0125cdf2 122static bfd_boolean constructor_callback
1579bae1
AM
123 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
124 asection *, bfd_vma);
0125cdf2 125static bfd_boolean warning_callback
1579bae1
AM
126 (struct bfd_link_info *, const char *, const char *, bfd *,
127 asection *, bfd_vma);
0125cdf2 128static void warning_find_reloc
1579bae1 129 (bfd *, asection *, void *);
0125cdf2 130static bfd_boolean undefined_symbol
1579bae1
AM
131 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
132 bfd_boolean);
0125cdf2 133static bfd_boolean reloc_overflow
dfeffb9f
L
134 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
135 const char *, bfd_vma, bfd *, asection *, bfd_vma);
0125cdf2 136static bfd_boolean reloc_dangerous
1579bae1 137 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 138static bfd_boolean unattached_reloc
1579bae1 139 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 140static bfd_boolean notice
35ed3f94 141 (struct bfd_link_info *, struct bfd_link_hash_entry *,
16d96b5b 142 bfd *, asection *, bfd_vma, flagword, const char *);
0125cdf2
NC
143
144static struct bfd_link_callbacks link_callbacks =
145{
252b5132
RH
146 add_archive_element,
147 multiple_definition,
148 multiple_common,
149 add_to_set,
150 constructor_callback,
151 warning_callback,
152 undefined_symbol,
153 reloc_overflow,
154 reloc_dangerous,
155 unattached_reloc,
e1fffbe6 156 notice,
2889e75b 157 einfo,
49fa1e15
AM
158 info_msg,
159 minfo,
2889e75b 160 ldlang_override_segment_assignment
252b5132
RH
161};
162
3b66a141
HPN
163static bfd_assert_handler_type default_bfd_assert_handler;
164
252b5132
RH
165struct bfd_link_info link_info;
166\f
167static void
498cd2a0 168ld_cleanup (void)
252b5132 169{
498cd2a0
AM
170 bfd_cache_close_all ();
171#ifdef ENABLE_PLUGINS
172 plugin_call_cleanup ();
173#endif
174 if (output_filename && delete_output_file_on_failure)
175 unlink_if_ordinary (output_filename);
252b5132
RH
176}
177
3b66a141
HPN
178/* If there's a BFD assertion, we'll notice and exit with an error
179 unless otherwise instructed. */
180
181static void
182ld_bfd_assert_handler (const char *fmt, const char *bfdver,
183 const char *file, int line)
184{
185 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
186 config.make_executable = FALSE;
187}
188
252b5132 189int
1579bae1 190main (int argc, char **argv)
252b5132
RH
191{
192 char *emulation;
193 long start_time = get_run_time ();
24a09713
SB
194#ifdef HAVE_SBRK
195 char *start_sbrk = (char *) sbrk (0);
196#endif
252b5132
RH
197
198#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
199 setlocale (LC_MESSAGES, "");
3882b010
L
200#endif
201#if defined (HAVE_SETLOCALE)
202 setlocale (LC_CTYPE, "");
252b5132
RH
203#endif
204 bindtextdomain (PACKAGE, LOCALEDIR);
205 textdomain (PACKAGE);
206
207 program_name = argv[0];
208 xmalloc_set_program_name (program_name);
209
210 START_PROGRESS (program_name, 0);
211
869b9d07
MM
212 expandargv (&argc, &argv);
213
252b5132
RH
214 bfd_init ();
215
216 bfd_set_error_program_name (program_name);
217
3b66a141
HPN
218 /* We want to notice and fail on those nasty BFD assertions which are
219 likely to signal incorrect output being generated but otherwise may
220 leave no trace. */
221 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
222
498cd2a0 223 xatexit (ld_cleanup);
252b5132 224
e2243057
RS
225 /* Set up the sysroot directory. */
226 ld_sysroot = get_sysroot (argc, argv);
227 if (*ld_sysroot)
9c8ebd6a 228 {
e2243057 229 if (*TARGET_SYSTEM_ROOT == 0)
9c8ebd6a 230 {
70487fb2 231 einfo ("%P%F: this linker was not configured to use sysroots\n");
e2243057 232 ld_sysroot = "";
0125cdf2 233 }
e2243057
RS
234 else
235 ld_canon_sysroot = lrealpath (ld_sysroot);
0125cdf2 236 }
3fe38064
NC
237 if (ld_canon_sysroot)
238 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
239 else
240 ld_canon_sysroot_len = -1;
241
252b5132
RH
242 /* Set the default BFD target based on the configured target. Doing
243 this permits the linker to be configured for a particular target,
244 and linked against a shared BFD library which was configured for
245 a different target. The macro TARGET is defined by Makefile. */
246 if (! bfd_set_default_target (TARGET))
247 {
248 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
249 xexit (1);
250 }
251
b47c4208
AM
252#if YYDEBUG
253 {
254 extern int yydebug;
255 yydebug = 1;
256 }
257#endif
258
b34976b6 259 config.build_constructors = TRUE;
c76308d2 260 config.rpath_separator = ':';
a854a4a7
AM
261 config.split_by_reloc = (unsigned) -1;
262 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
263 config.make_executable = TRUE;
264 config.magic_demand_paged = TRUE;
265 config.text_read_only = TRUE;
4f9d22a0 266 link_info.disable_target_specific_optimizations = -1;
3b95049e 267
b34976b6 268 command_line.warn_mismatch = TRUE;
fe7929ce 269 command_line.warn_search_mismatch = TRUE;
02b0b1aa 270 command_line.check_section_addresses = -1;
bcaa7b3e 271
252b5132
RH
272 /* We initialize DEMANGLING based on the environment variable
273 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
274 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
275 environment. Acting the same way here lets us provide the same
276 interface by default. */
277 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
278
b34976b6 279 link_info.allow_undefined_version = TRUE;
b5067602 280 link_info.keep_memory = TRUE;
b5067602 281 link_info.combreloc = TRUE;
d5cd3933 282 link_info.strip_discarded = TRUE;
fdc90cb4 283 link_info.emit_hash = TRUE;
a9a4c53e
AM
284 link_info.callbacks = &link_callbacks;
285 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
286 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
287 and _fini symbols. We are compatible. */
288 link_info.init_function = "_init";
289 link_info.fini_function = "_fini";
a9a4c53e 290 link_info.relax_pass = 1;
e0076ab3 291 link_info.pei386_auto_import = -1;
db6751f2 292 link_info.spare_dynamic_tags = 5;
967928e9 293 link_info.path_separator = ':';
24718e3b 294
252b5132 295 ldfile_add_arch ("");
252b5132
RH
296 emulation = get_emulation (argc, argv);
297 ldemul_choose_mode (emulation);
742aeb63 298 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
299 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
300 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132
RH
301 lang_init ();
302 ldemul_before_parse ();
b34976b6 303 lang_has_input_file = FALSE;
252b5132
RH
304 parse_args (argc, argv);
305
2d643429
NC
306 if (config.hash_table_size != 0)
307 bfd_hash_set_default_size (config.hash_table_size);
308
9bbc1a67
AM
309#ifdef ENABLE_PLUGINS
310 /* Now all the plugin arguments have been gathered, we can load them. */
311 if (plugin_load_plugins ())
312 einfo (_("%P%F: %s: error loading plugin\n"), plugin_error_plugin ());
313#endif /* ENABLE_PLUGINS */
36af4a4e 314
9bbc1a67 315 ldemul_set_symbols ();
252b5132 316
14be8564
L
317 /* If we have not already opened and parsed a linker script,
318 try the default script from command line first. */
319 if (saved_script_handle == NULL
320 && command_line.default_script != NULL)
321 {
322 ldfile_open_command_file (command_line.default_script);
323 parser_input = input_script;
324 yyparse ();
325 }
326
b9a8de1e
NC
327 /* If we have not already opened and parsed a linker script
328 read the emulation's appropriate default script. */
b90e1c6f 329 if (saved_script_handle == NULL)
252b5132 330 {
252b5132 331 int isfile;
b7a26f91 332 char *s = ldemul_get_script (&isfile);
252b5132
RH
333
334 if (isfile)
7d24f02c 335 ldfile_open_default_command_file (s);
252b5132 336 else
b7a26f91 337 {
252b5132 338 lex_string = s;
dab69f68 339 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
340 }
341 parser_input = input_script;
342 yyparse ();
343 lex_string = NULL;
344 }
345
cd6f1cf3 346 if (verbose)
b9a8de1e 347 {
9cb61eab
AM
348 if (saved_script_handle)
349 info_msg (_("using external linker script:"));
350 else
351 info_msg (_("using internal linker script:"));
352 info_msg ("\n==================================================\n");
b9a8de1e
NC
353
354 if (saved_script_handle)
355 {
74699268 356 static const int ld_bufsz = 8193;
b9a8de1e 357 size_t n;
1e9cc1c2 358 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
359
360 rewind (saved_script_handle);
74699268 361 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 362 {
b7a26f91 363 buf[n] = 0;
b9a8de1e
NC
364 info_msg (buf);
365 }
366 rewind (saved_script_handle);
367 free (buf);
368 }
369 else
370 {
371 int isfile;
372
b7a26f91 373 info_msg (ldemul_get_script (&isfile));
b9a8de1e 374 }
b7a26f91 375
b9a8de1e
NC
376 info_msg ("\n==================================================\n");
377 }
378
30824704
RM
379 if (command_line.print_output_format)
380 info_msg ("%s\n", lang_get_output_target ());
381
252b5132
RH
382 lang_final ();
383
b34976b6 384 if (!lang_has_input_file)
252b5132 385 {
30824704 386 if (version_printed || command_line.print_output_format)
252b5132
RH
387 xexit (0);
388 einfo (_("%P%F: no input files\n"));
389 }
390
391 if (trace_files)
0125cdf2 392 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
393
394 ldemul_after_parse ();
395
252b5132
RH
396 if (config.map_filename)
397 {
398 if (strcmp (config.map_filename, "-") == 0)
399 {
400 config.map_file = stdout;
401 }
402 else
403 {
404 config.map_file = fopen (config.map_filename, FOPEN_WT);
405 if (config.map_file == (FILE *) NULL)
406 {
407 bfd_set_error (bfd_error_system_call);
408 einfo (_("%P%F: cannot open map file %s: %E\n"),
409 config.map_filename);
410 }
411 }
412 }
413
252b5132
RH
414 lang_process ();
415
416 /* Print error messages for any missing symbols, for any warning
6d5e62f8 417 symbols, and possibly multiple definitions. */
1049f94e 418 if (link_info.relocatable)
f13a99db 419 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 420 else
f13a99db 421 link_info.output_bfd->flags |= EXEC_P;
252b5132
RH
422
423 ldwrite ();
424
425 if (config.map_file != NULL)
426 lang_map ();
427 if (command_line.cref)
428 output_cref (config.map_file != NULL ? config.map_file : stdout);
429 if (nocrossref_list != NULL)
430 check_nocrossrefs ();
431
750877ba
L
432 lang_finish ();
433
1049f94e 434 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 435 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 436 want to ignore for relocatable output?) */
b34976b6 437 if (!config.make_executable && !force_make_executable)
252b5132 438 {
b34976b6 439 if (trace_files)
0125cdf2
NC
440 einfo (_("%P: link errors found, deleting executable `%s'\n"),
441 output_filename);
252b5132 442
4309cbf2 443 /* The file will be removed by ld_cleanup. */
252b5132
RH
444 xexit (1);
445 }
446 else
447 {
f13a99db
AM
448 if (! bfd_close (link_info.output_bfd))
449 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
450
451 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
452 executable file and it doesn't end in .exe, copy it to one
453 which does. */
1049f94e 454 if (! link_info.relocatable && command_line.force_exe_suffix)
252b5132
RH
455 {
456 int len = strlen (output_filename);
0125cdf2 457
6d5e62f8 458 if (len < 4
252b5132
RH
459 || (strcasecmp (output_filename + len - 4, ".exe") != 0
460 && strcasecmp (output_filename + len - 4, ".dll") != 0))
461 {
462 FILE *src;
463 FILE *dst;
464 const int bsize = 4096;
1e9cc1c2 465 char *buf = (char *) xmalloc (bsize);
252b5132 466 int l;
1e9cc1c2 467 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 468
252b5132
RH
469 strcpy (dst_name, output_filename);
470 strcat (dst_name, ".exe");
471 src = fopen (output_filename, FOPEN_RB);
472 dst = fopen (dst_name, FOPEN_WB);
473
474 if (!src)
1579bae1
AM
475 einfo (_("%X%P: unable to open for source of copy `%s'\n"),
476 output_filename);
252b5132 477 if (!dst)
1579bae1
AM
478 einfo (_("%X%P: unable to open for destination of copy `%s'\n"),
479 dst_name);
252b5132
RH
480 while ((l = fread (buf, 1, bsize, src)) > 0)
481 {
482 int done = fwrite (buf, 1, l, dst);
0125cdf2 483
252b5132 484 if (done != l)
0125cdf2 485 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 486 }
0125cdf2 487
252b5132
RH
488 fclose (src);
489 if (fclose (dst) == EOF)
0125cdf2 490 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
491 free (dst_name);
492 free (buf);
493 }
494 }
495 }
496
497 END_PROGRESS (program_name);
498
499 if (config.stats)
500 {
501#ifdef HAVE_SBRK
1e9cc1c2 502 char *lim = (char *) sbrk (0);
252b5132
RH
503#endif
504 long run_time = get_run_time () - start_time;
505
e922bcab 506 fflush (stdout);
252b5132
RH
507 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
508 program_name, run_time / 1000000, run_time % 1000000);
509#ifdef HAVE_SBRK
510 fprintf (stderr, _("%s: data size %ld\n"), program_name,
24a09713 511 (long) (lim - start_sbrk));
252b5132 512#endif
e922bcab 513 fflush (stderr);
252b5132
RH
514 }
515
4309cbf2 516 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
517 output_filename = NULL;
518
519 xexit (0);
520 return 0;
521}
522
e2243057
RS
523/* If the configured sysroot is relocatable, try relocating it based on
524 default prefix FROM. Return the relocated directory if it exists,
525 otherwise return null. */
526
527static char *
528get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
529{
530#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
531 char *path;
532 struct stat s;
533
534 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
535 if (path)
536 {
537 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
538 return path;
539 free (path);
540 }
541#endif
542 return 0;
543}
544
545/* Return the sysroot directory. Return "" if no sysroot is being used. */
546
547static const char *
548get_sysroot (int argc, char **argv)
549{
550 int i;
551 const char *path;
552
553 for (i = 1; i < argc; i++)
0112cd26 554 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
555 return argv[i] + strlen ("--sysroot=");
556
557 path = get_relative_sysroot (BINDIR);
558 if (path)
559 return path;
560
561 path = get_relative_sysroot (TOOLBINDIR);
562 if (path)
563 return path;
564
565 return TARGET_SYSTEM_ROOT;
566}
567
252b5132
RH
568/* We need to find any explicitly given emulation in order to initialize the
569 state that's needed by the lex&yacc argument parser (parse_args). */
570
571static char *
1579bae1 572get_emulation (int argc, char **argv)
252b5132
RH
573{
574 char *emulation;
575 int i;
576
577 emulation = getenv (EMULATION_ENVIRON);
578 if (emulation == NULL)
579 emulation = DEFAULT_EMULATION;
580
581 for (i = 1; i < argc; i++)
582 {
0112cd26 583 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
584 {
585 if (argv[i][2] == '\0')
586 {
587 /* -m EMUL */
588 if (i < argc - 1)
589 {
590 emulation = argv[i + 1];
591 i++;
592 }
593 else
0125cdf2 594 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
595 }
596 else if (strcmp (argv[i], "-mips1") == 0
597 || strcmp (argv[i], "-mips2") == 0
598 || strcmp (argv[i], "-mips3") == 0
d1cf510e 599 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
600 || strcmp (argv[i], "-mips5") == 0
601 || strcmp (argv[i], "-mips32") == 0
602 || strcmp (argv[i], "-mips32r2") == 0
5f74bc13
CD
603 || strcmp (argv[i], "-mips64") == 0
604 || strcmp (argv[i], "-mips64r2") == 0)
252b5132 605 {
31d677f9 606 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
607 passed to the linker by some MIPS compilers. They
608 generally tell the linker to use a slightly different
609 library path. Perhaps someday these should be
610 implemented as emulations; until then, we just ignore
611 the arguments and hope that nobody ever creates
612 emulations named ips1, ips2 or ips3. */
613 }
614 else if (strcmp (argv[i], "-m486") == 0)
615 {
616 /* FIXME: The argument -m486 is passed to the linker on
617 some Linux systems. Hope that nobody creates an
618 emulation named 486. */
619 }
620 else
621 {
622 /* -mEMUL */
623 emulation = &argv[i][2];
624 }
625 }
626 }
627
628 return emulation;
629}
630
252b5132 631void
1579bae1 632add_ysym (const char *name)
252b5132 633{
1579bae1 634 if (link_info.notice_hash == NULL)
252b5132 635 {
1e9cc1c2
NC
636 link_info.notice_hash =
637 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
638 if (!bfd_hash_table_init_n (link_info.notice_hash,
639 bfd_hash_newfunc,
640 sizeof (struct bfd_hash_entry),
641 61))
252b5132 642 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 643 }
252b5132 644
1579bae1 645 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
646 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
647}
648
0e86e20e
AM
649void
650add_ignoresym (struct bfd_link_info *info, const char *name)
651{
652 if (info->ignore_hash == NULL)
653 {
654 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
655 if (! bfd_hash_table_init_n (info->ignore_hash,
656 bfd_hash_newfunc,
657 sizeof (struct bfd_hash_entry),
658 61))
659 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
660 }
661
662 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
663 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
664}
665
252b5132
RH
666/* Record a symbol to be wrapped, from the --wrap option. */
667
668void
1579bae1 669add_wrap (const char *name)
252b5132
RH
670{
671 if (link_info.wrap_hash == NULL)
672 {
1e9cc1c2
NC
673 link_info.wrap_hash =
674 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
675 if (!bfd_hash_table_init_n (link_info.wrap_hash,
676 bfd_hash_newfunc,
677 sizeof (struct bfd_hash_entry),
678 61))
252b5132
RH
679 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
680 }
0125cdf2 681
b34976b6 682 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
683 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
684}
685
686/* Handle the -retain-symbols-file option. */
687
688void
1579bae1 689add_keepsyms_file (const char *filename)
252b5132
RH
690{
691 FILE *file;
692 char *buf;
693 size_t bufsize;
694 int c;
695
696 if (link_info.strip == strip_some)
697 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
698
699 file = fopen (filename, "r");
1579bae1 700 if (file == NULL)
252b5132
RH
701 {
702 bfd_set_error (bfd_error_system_call);
703 einfo ("%X%P: %s: %E\n", filename);
704 return;
705 }
706
1e9cc1c2
NC
707 link_info.keep_hash = (struct bfd_hash_table *)
708 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
709 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
710 sizeof (struct bfd_hash_entry)))
252b5132
RH
711 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
712
713 bufsize = 100;
1e9cc1c2 714 buf = (char *) xmalloc (bufsize);
252b5132
RH
715
716 c = getc (file);
717 while (c != EOF)
718 {
3882b010 719 while (ISSPACE (c))
252b5132
RH
720 c = getc (file);
721
722 if (c != EOF)
723 {
724 size_t len = 0;
725
3882b010 726 while (! ISSPACE (c) && c != EOF)
252b5132
RH
727 {
728 buf[len] = c;
729 ++len;
730 if (len >= bufsize)
731 {
732 bufsize *= 2;
1e9cc1c2 733 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
734 }
735 c = getc (file);
736 }
737
738 buf[len] = '\0';
739
1579bae1 740 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
741 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
742 }
743 }
744
745 if (link_info.strip != strip_none)
746 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
747
5ed6aba4 748 free (buf);
252b5132
RH
749 link_info.strip = strip_some;
750}
751\f
752/* Callbacks from the BFD linker routines. */
753
754/* This is called when BFD has decided to include an archive member in
755 a link. */
756
b34976b6 757static bfd_boolean
e1fffbe6 758add_archive_element (struct bfd_link_info *info,
1579bae1 759 bfd *abfd,
5d3236ee
DK
760 const char *name,
761 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
762{
763 lang_input_statement_type *input;
5d3236ee 764 lang_input_statement_type orig_input;
252b5132 765
1e9cc1c2
NC
766 input = (lang_input_statement_type *)
767 xcalloc (1, sizeof (lang_input_statement_type));
252b5132
RH
768 input->filename = abfd->filename;
769 input->local_sym_name = abfd->filename;
770 input->the_bfd = abfd;
252b5132 771
5d3236ee
DK
772 /* Save the original data for trace files/tries below, as plugins
773 (if enabled) may possibly alter it to point to a replacement
774 BFD, but we still want to output the original BFD filename. */
775 orig_input = *input;
776#ifdef ENABLE_PLUGINS
2b7e4308 777 if (plugin_active_plugins_p () && !no_more_claiming)
5d3236ee
DK
778 {
779 /* We must offer this archive member to the plugins to claim. */
2b7e4308
L
780 const char *filename = (bfd_my_archive (abfd) != NULL
781 ? bfd_my_archive (abfd)->filename : abfd->filename);
782 int fd = open (filename, O_RDONLY | O_BINARY);
5d3236ee
DK
783 if (fd >= 0)
784 {
785 struct ld_plugin_input_file file;
02d00247 786
5d3236ee
DK
787 /* Offset and filesize must refer to the individual archive
788 member, not the whole file, and must exclude the header.
789 Fortunately for us, that is how the data is stored in the
790 origin field of the bfd and in the arelt_data. */
2b7e4308 791 file.name = filename;
5d3236ee
DK
792 file.offset = abfd->origin;
793 file.filesize = arelt_size (abfd);
794 file.fd = fd;
02d00247 795 plugin_maybe_claim (&file, input);
66be1055 796 if (input->flags.claimed)
5d3236ee 797 {
66be1055 798 input->flags.claim_archive = TRUE;
5d3236ee
DK
799 *subsbfd = input->the_bfd;
800 }
5d3236ee
DK
801 }
802 }
803#endif /* ENABLE_PLUGINS */
804
252b5132
RH
805 ldlang_add_file (input);
806
1579bae1 807 if (config.map_file != NULL)
252b5132 808 {
b34976b6 809 static bfd_boolean header_printed;
252b5132
RH
810 struct bfd_link_hash_entry *h;
811 bfd *from;
812 int len;
813
e1fffbe6 814 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
815
816 if (h == NULL)
817 from = NULL;
818 else
819 {
820 switch (h->type)
821 {
822 default:
823 from = NULL;
824 break;
825
826 case bfd_link_hash_defined:
827 case bfd_link_hash_defweak:
828 from = h->u.def.section->owner;
829 break;
830
831 case bfd_link_hash_undefined:
832 case bfd_link_hash_undefweak:
833 from = h->u.undef.abfd;
834 break;
835
836 case bfd_link_hash_common:
837 from = h->u.c.p->section->owner;
838 break;
839 }
840 }
841
842 if (! header_printed)
843 {
844 char buf[100];
845
e3c8793a 846 sprintf (buf, _("Archive member included because of file (symbol)\n\n"));
252b5132 847 minfo ("%s", buf);
b34976b6 848 header_printed = TRUE;
252b5132
RH
849 }
850
851 if (bfd_my_archive (abfd) == NULL)
852 {
853 minfo ("%s", bfd_get_filename (abfd));
854 len = strlen (bfd_get_filename (abfd));
855 }
856 else
857 {
858 minfo ("%s(%s)", bfd_get_filename (bfd_my_archive (abfd)),
859 bfd_get_filename (abfd));
860 len = (strlen (bfd_get_filename (bfd_my_archive (abfd)))
861 + strlen (bfd_get_filename (abfd))
862 + 2);
863 }
864
865 if (len >= 29)
866 {
867 print_nl ();
868 len = 0;
869 }
870 while (len < 30)
871 {
872 print_space ();
873 ++len;
874 }
875
876 if (from != NULL)
877 minfo ("%B ", from);
878 if (h != NULL)
879 minfo ("(%T)\n", h->root.string);
880 else
881 minfo ("(%s)\n", name);
882 }
883
cd6f1cf3 884 if (trace_files || verbose)
5d3236ee 885 info_msg ("%I\n", &orig_input);
b34976b6 886 return TRUE;
252b5132
RH
887}
888
889/* This is called when BFD has discovered a symbol which is defined
890 multiple times. */
891
b34976b6 892static bfd_boolean
24f58f47
AM
893multiple_definition (struct bfd_link_info *info,
894 struct bfd_link_hash_entry *h,
1579bae1
AM
895 bfd *nbfd,
896 asection *nsec,
897 bfd_vma nval)
252b5132 898{
24f58f47
AM
899 const char *name;
900 bfd *obfd;
901 asection *osec;
902 bfd_vma oval;
903
904 if (info->allow_multiple_definition)
905 return TRUE;
906
907 switch (h->type)
908 {
909 case bfd_link_hash_defined:
910 osec = h->u.def.section;
911 oval = h->u.def.value;
912 obfd = h->u.def.section->owner;
913 break;
914 case bfd_link_hash_indirect:
915 osec = bfd_ind_section_ptr;
916 oval = 0;
917 obfd = NULL;
918 break;
919 default:
920 abort ();
921 }
922
923 /* Ignore a redefinition of an absolute symbol to the
924 same value; it's harmless. */
925 if (h->type == bfd_link_hash_defined
926 && bfd_is_abs_section (osec)
927 && bfd_is_abs_section (nsec)
928 && nval == oval)
929 return TRUE;
930
252b5132
RH
931 /* If either section has the output_section field set to
932 bfd_abs_section_ptr, it means that the section is being
933 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
934 FIXME: It would be cleaner to somehow ignore symbols defined in
935 sections which are being discarded. */
252b5132
RH
936 if ((osec->output_section != NULL
937 && ! bfd_is_abs_section (osec)
938 && bfd_is_abs_section (osec->output_section))
939 || (nsec->output_section != NULL
940 && ! bfd_is_abs_section (nsec)
941 && bfd_is_abs_section (nsec->output_section)))
b34976b6 942 return TRUE;
252b5132 943
24f58f47
AM
944 name = h->root.string;
945 if (nbfd == NULL)
946 {
947 nbfd = obfd;
948 nsec = osec;
949 nval = oval;
950 obfd = NULL;
951 }
252b5132
RH
952 einfo (_("%X%C: multiple definition of `%T'\n"),
953 nbfd, nsec, nval, name);
1579bae1 954 if (obfd != NULL)
252b5132 955 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 956
28d5f677 957 if (RELAXATION_ENABLED)
9b14b192
NC
958 {
959 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
4f9d22a0 960 link_info.disable_target_specific_optimizations = -1;
9b14b192 961 }
6d5e62f8 962
b34976b6 963 return TRUE;
252b5132
RH
964}
965
966/* This is called when there is a definition of a common symbol, or
967 when a common symbol is found for a symbol that is already defined,
968 or when two common symbols are found. We only do something if
969 -warn-common was used. */
970
b34976b6 971static bfd_boolean
1579bae1 972multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 973 struct bfd_link_hash_entry *h,
1579bae1
AM
974 bfd *nbfd,
975 enum bfd_link_hash_type ntype,
976 bfd_vma nsize)
252b5132 977{
24f58f47
AM
978 const char *name;
979 bfd *obfd;
980 enum bfd_link_hash_type otype;
981 bfd_vma osize;
982
983 if (!config.warn_common)
b34976b6 984 return TRUE;
252b5132 985
24f58f47
AM
986 name = h->root.string;
987 otype = h->type;
988 if (otype == bfd_link_hash_common)
989 {
990 obfd = h->u.c.p->section->owner;
991 osize = h->u.c.size;
992 }
993 else if (otype == bfd_link_hash_defined
994 || otype == bfd_link_hash_defweak)
995 {
996 obfd = h->u.def.section->owner;
997 osize = 0;
998 }
999 else
1000 {
1001 /* FIXME: It would nice if we could report the BFD which defined
1002 an indirect symbol, but we don't have anywhere to store the
1003 information. */
1004 obfd = NULL;
1005 osize = 0;
1006 }
1007
252b5132
RH
1008 if (ntype == bfd_link_hash_defined
1009 || ntype == bfd_link_hash_defweak
1010 || ntype == bfd_link_hash_indirect)
1011 {
1012 ASSERT (otype == bfd_link_hash_common);
1013 einfo (_("%B: warning: definition of `%T' overriding common\n"),
1014 nbfd, name);
1015 if (obfd != NULL)
1016 einfo (_("%B: warning: common is here\n"), obfd);
1017 }
1018 else if (otype == bfd_link_hash_defined
1019 || otype == bfd_link_hash_defweak
1020 || otype == bfd_link_hash_indirect)
1021 {
1022 ASSERT (ntype == bfd_link_hash_common);
1023 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1024 nbfd, name);
1025 if (obfd != NULL)
1026 einfo (_("%B: warning: defined here\n"), obfd);
1027 }
1028 else
1029 {
1030 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1031 if (osize > nsize)
1032 {
1033 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1034 nbfd, name);
1035 if (obfd != NULL)
1036 einfo (_("%B: warning: larger common is here\n"), obfd);
1037 }
1038 else if (nsize > osize)
1039 {
1040 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1041 nbfd, name);
1042 if (obfd != NULL)
1043 einfo (_("%B: warning: smaller common is here\n"), obfd);
1044 }
1045 else
1046 {
1047 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1048 if (obfd != NULL)
1049 einfo (_("%B: warning: previous common is here\n"), obfd);
1050 }
1051 }
1052
b34976b6 1053 return TRUE;
252b5132
RH
1054}
1055
1056/* This is called when BFD has discovered a set element. H is the
1057 entry in the linker hash table for the set. SECTION and VALUE
1058 represent a value which should be added to the set. */
1059
b34976b6 1060static bfd_boolean
1579bae1
AM
1061add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1062 struct bfd_link_hash_entry *h,
1063 bfd_reloc_code_real_type reloc,
1064 bfd *abfd,
1065 asection *section,
1066 bfd_vma value)
252b5132
RH
1067{
1068 if (config.warn_constructors)
1069 einfo (_("%P: warning: global constructor %s used\n"),
1070 h->root.string);
1071
1072 if (! config.build_constructors)
b34976b6 1073 return TRUE;
252b5132 1074
1579bae1 1075 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1076
1077 if (h->type == bfd_link_hash_new)
1078 {
1079 h->type = bfd_link_hash_undefined;
1080 h->u.undef.abfd = abfd;
1081 /* We don't call bfd_link_add_undef to add this to the list of
1082 undefined symbols because we are going to define it
1083 ourselves. */
1084 }
1085
b34976b6 1086 return TRUE;
252b5132
RH
1087}
1088
1089/* This is called when BFD has discovered a constructor. This is only
1090 called for some object file formats--those which do not handle
1091 constructors in some more clever fashion. This is similar to
1092 adding an element to a set, but less general. */
1093
b34976b6 1094static bfd_boolean
1579bae1
AM
1095constructor_callback (struct bfd_link_info *info,
1096 bfd_boolean constructor,
1097 const char *name,
1098 bfd *abfd,
1099 asection *section,
1100 bfd_vma value)
252b5132
RH
1101{
1102 char *s;
1103 struct bfd_link_hash_entry *h;
1104 char set_name[1 + sizeof "__CTOR_LIST__"];
1105
1106 if (config.warn_constructors)
1107 einfo (_("%P: warning: global constructor %s used\n"), name);
1108
1109 if (! config.build_constructors)
b34976b6 1110 return TRUE;
252b5132
RH
1111
1112 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1113 useful error message. */
0e86e20e 1114 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
e1fffbe6 1115 && (info->relocatable
252b5132
RH
1116 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1117 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1118
1119 s = set_name;
1120 if (bfd_get_symbol_leading_char (abfd) != '\0')
1121 *s++ = bfd_get_symbol_leading_char (abfd);
1122 if (constructor)
1123 strcpy (s, "__CTOR_LIST__");
1124 else
1125 strcpy (s, "__DTOR_LIST__");
1126
b34976b6 1127 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1128 if (h == (struct bfd_link_hash_entry *) NULL)
1129 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1130 if (h->type == bfd_link_hash_new)
1131 {
1132 h->type = bfd_link_hash_undefined;
1133 h->u.undef.abfd = abfd;
1134 /* We don't call bfd_link_add_undef to add this to the list of
1135 undefined symbols because we are going to define it
1136 ourselves. */
1137 }
1138
1139 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
b34976b6 1140 return TRUE;
252b5132
RH
1141}
1142
1143/* A structure used by warning_callback to pass information through
1144 bfd_map_over_sections. */
1145
0125cdf2
NC
1146struct warning_callback_info
1147{
b34976b6 1148 bfd_boolean found;
252b5132
RH
1149 const char *warning;
1150 const char *symbol;
1151 asymbol **asymbols;
1152};
1153
1154/* This is called when there is a reference to a warning symbol. */
1155
b34976b6 1156static bfd_boolean
1579bae1
AM
1157warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1158 const char *warning,
1159 const char *symbol,
1160 bfd *abfd,
1161 asection *section,
1162 bfd_vma address)
252b5132
RH
1163{
1164 /* This is a hack to support warn_multiple_gp. FIXME: This should
1165 have a cleaner interface, but what? */
1166 if (! config.warn_multiple_gp
1167 && strcmp (warning, "using multiple gp values") == 0)
b34976b6 1168 return TRUE;
252b5132
RH
1169
1170 if (section != NULL)
300475fe 1171 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1172 else if (abfd == NULL)
300475fe 1173 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1174 else if (symbol == NULL)
300475fe 1175 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1176 else
1177 {
91d6fa6a 1178 struct warning_callback_info cinfo;
252b5132
RH
1179
1180 /* Look through the relocs to see if we can find a plausible
1181 address. */
5c1d2f5f
AM
1182
1183 if (!bfd_generic_link_read_symbols (abfd))
1184 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
252b5132 1185
91d6fa6a
NC
1186 cinfo.found = FALSE;
1187 cinfo.warning = warning;
1188 cinfo.symbol = symbol;
1189 cinfo.asymbols = bfd_get_outsymbols (abfd);
1190 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
252b5132 1191
91d6fa6a 1192 if (! cinfo.found)
300475fe 1193 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1194 }
1195
b34976b6 1196 return TRUE;
252b5132
RH
1197}
1198
1199/* This is called by warning_callback for each section. It checks the
1200 relocs of the section to see if it can find a reference to the
1201 symbol which triggered the warning. If it can, it uses the reloc
1202 to give an error message with a file and line number. */
1203
1204static void
1579bae1 1205warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1206{
1e9cc1c2 1207 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1208 long relsize;
1209 arelent **relpp;
1210 long relcount;
1211 arelent **p, **pend;
1212
1213 if (info->found)
1214 return;
1215
1216 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1217 if (relsize < 0)
1218 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1219 if (relsize == 0)
1220 return;
1221
1e9cc1c2 1222 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1223 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1224 if (relcount < 0)
1225 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1226
1227 p = relpp;
1228 pend = p + relcount;
1229 for (; p < pend && *p != NULL; p++)
1230 {
1231 arelent *q = *p;
1232
1233 if (q->sym_ptr_ptr != NULL
1234 && *q->sym_ptr_ptr != NULL
1235 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1236 {
1237 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1238 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1239 info->warning);
b34976b6 1240 info->found = TRUE;
252b5132
RH
1241 break;
1242 }
1243 }
1244
1245 free (relpp);
1246}
1247
1248/* This is called when an undefined symbol is found. */
1249
b34976b6 1250static bfd_boolean
0e86e20e 1251undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1252 const char *name,
1253 bfd *abfd,
1254 asection *section,
1255 bfd_vma address,
0b28295d 1256 bfd_boolean error)
252b5132
RH
1257{
1258 static char *error_name;
1259 static unsigned int error_count;
1260
1261#define MAX_ERRORS_IN_A_ROW 5
1262
0e86e20e
AM
1263 if (info->ignore_hash != NULL
1264 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1265 return TRUE;
1266
252b5132
RH
1267 if (config.warn_once)
1268 {
252b5132 1269 /* Only warn once about a particular undefined symbol. */
0e86e20e 1270 add_ignoresym (info, name);
252b5132
RH
1271 }
1272
1273 /* We never print more than a reasonable number of errors in a row
1274 for a single symbol. */
1579bae1 1275 if (error_name != NULL
252b5132
RH
1276 && strcmp (name, error_name) == 0)
1277 ++error_count;
1278 else
1279 {
1280 error_count = 0;
1579bae1 1281 if (error_name != NULL)
252b5132 1282 free (error_name);
d1b2b2dc 1283 error_name = xstrdup (name);
252b5132
RH
1284 }
1285
1286 if (section != NULL)
1287 {
1288 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1289 {
0b28295d
ILT
1290 if (error)
1291 einfo (_("%X%C: undefined reference to `%T'\n"),
1292 abfd, section, address, name);
1293 else
1294 einfo (_("%C: warning: undefined reference to `%T'\n"),
1295 abfd, section, address, name);
b6f29aaa 1296 }
252b5132 1297 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1298 {
1299 if (error)
1300 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1301 abfd, section, address, name);
1302 else
1303 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1304 abfd, section, address, name);
1305 }
1306 else if (error)
1307 einfo ("%X");
252b5132
RH
1308 }
1309 else
1310 {
1311 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1312 {
0b28295d
ILT
1313 if (error)
1314 einfo (_("%X%B: undefined reference to `%T'\n"),
1315 abfd, name);
1316 else
1317 einfo (_("%B: warning: undefined reference to `%T'\n"),
1318 abfd, name);
b6f29aaa 1319 }
252b5132 1320 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1321 {
1322 if (error)
1323 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1324 abfd, name);
1325 else
1326 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1327 abfd, name);
1328 }
1329 else if (error)
1330 einfo ("%X");
252b5132
RH
1331 }
1332
b34976b6 1333 return TRUE;
252b5132
RH
1334}
1335
8aae64e6
AO
1336/* Counter to limit the number of relocation overflow error messages
1337 to print. Errors are printed as it is decremented. When it's
1338 called and the counter is zero, a final message is printed
1339 indicating more relocations were omitted. When it gets to -1, no
1340 such errors are printed. If it's initially set to a value less
1341 than -1, all such errors will be printed (--verbose does this). */
1342
1343int overflow_cutoff_limit = 10;
1344
252b5132
RH
1345/* This is called when a reloc overflows. */
1346
b34976b6 1347static bfd_boolean
0e86e20e 1348reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1349 struct bfd_link_hash_entry *entry,
1579bae1
AM
1350 const char *name,
1351 const char *reloc_name,
1352 bfd_vma addend,
1353 bfd *abfd,
1354 asection *section,
1355 bfd_vma address)
252b5132 1356{
8aae64e6
AO
1357 if (overflow_cutoff_limit == -1)
1358 return TRUE;
1359
270396f2 1360 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1361
1362 if (overflow_cutoff_limit >= 0
1363 && overflow_cutoff_limit-- == 0)
1364 {
1365 einfo (_(" additional relocation overflows omitted from the output\n"));
1366 return TRUE;
1367 }
1368
dfeffb9f
L
1369 if (entry)
1370 {
1371 while (entry->type == bfd_link_hash_indirect
1372 || entry->type == bfd_link_hash_warning)
1373 entry = entry->u.i.link;
1374 switch (entry->type)
1375 {
1376 case bfd_link_hash_undefined:
1377 case bfd_link_hash_undefweak:
1378 einfo (_(" relocation truncated to fit: %s against undefined symbol `%T'"),
1379 reloc_name, entry->root.string);
1380 break;
1381 case bfd_link_hash_defined:
1382 case bfd_link_hash_defweak:
1383 einfo (_(" relocation truncated to fit: %s against symbol `%T' defined in %A section in %B"),
1384 reloc_name, entry->root.string,
a6e1b90f
L
1385 entry->u.def.section,
1386 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1387 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1388 break;
1389 default:
1390 abort ();
1391 break;
1392 }
1393 }
1394 else
1395 einfo (_(" relocation truncated to fit: %s against `%T'"),
1396 reloc_name, name);
252b5132
RH
1397 if (addend != 0)
1398 einfo ("+%v", addend);
1399 einfo ("\n");
b34976b6 1400 return TRUE;
252b5132
RH
1401}
1402
1403/* This is called when a dangerous relocation is made. */
1404
b34976b6 1405static bfd_boolean
1579bae1
AM
1406reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1407 const char *message,
1408 bfd *abfd,
1409 asection *section,
1410 bfd_vma address)
252b5132 1411{
270396f2 1412 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1413 abfd, section, address, message);
b34976b6 1414 return TRUE;
252b5132
RH
1415}
1416
1417/* This is called when a reloc is being generated attached to a symbol
1418 that is not being output. */
1419
b34976b6 1420static bfd_boolean
1579bae1
AM
1421unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1422 const char *name,
1423 bfd *abfd,
1424 asection *section,
1425 bfd_vma address)
252b5132 1426{
270396f2 1427 einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
e1fffbe6 1428 abfd, section, address, name);
b34976b6 1429 return TRUE;
252b5132
RH
1430}
1431
1432/* This is called if link_info.notice_all is set, or when a symbol in
1433 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1434 using the -y option, while notice_all is set if the --cref option
1435 has been supplied, or if there are any NOCROSSREFS sections in the
1436 linker script; and if plugins are active, since they need to monitor
1437 all references from non-IR files. */
252b5132 1438
b34976b6 1439static bfd_boolean
1579bae1 1440notice (struct bfd_link_info *info,
35ed3f94 1441 struct bfd_link_hash_entry *h,
1579bae1
AM
1442 bfd *abfd,
1443 asection *section,
16d96b5b
AM
1444 bfd_vma value,
1445 flagword flags ATTRIBUTE_UNUSED,
1446 const char *string ATTRIBUTE_UNUSED)
252b5132 1447{
35ed3f94
AM
1448 const char *name;
1449
1450 if (h == NULL)
5061a885
AM
1451 {
1452 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1453 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1454 return TRUE;
1455 }
1456
35ed3f94 1457 name = h->root.string;
5d3236ee 1458 if (info->notice_hash != NULL
9e2278f5 1459 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1460 {
1461 if (bfd_is_und_section (section))
1462 einfo ("%B: reference to %s\n", abfd, name);
1463 else
1464 einfo ("%B: definition of %s\n", abfd, name);
1465 }
1466
1467 if (command_line.cref || nocrossref_list != NULL)
1468 add_cref (name, abfd, section, value);
1469
b34976b6 1470 return TRUE;
252b5132 1471}
This page took 0.832391 seconds and 4 git commands to generate.