x86_64 k1om tests
[deliverable/binutils-gdb.git] / ld / ldmain.c
1 /* Main program of GNU linker.
2 Copyright (C) 1991-2020 Free Software Foundation, Inc.
3 Written by Steve Chamberlain steve@cygnus.com
4
5 This file is part of the GNU Binutils.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "safe-ctype.h"
25 #include "libiberty.h"
26 #include "progress.h"
27 #include "bfdlink.h"
28 #include "ctf-api.h"
29 #include "filenames.h"
30 #include "elf/common.h"
31
32 #include "ld.h"
33 #include "ldmain.h"
34 #include "ldmisc.h"
35 #include "ldwrite.h"
36 #include "ldexp.h"
37 #include "ldlang.h"
38 #include <ldgram.h>
39 #include "ldlex.h"
40 #include "ldfile.h"
41 #include "ldemul.h"
42 #include "ldctor.h"
43 #if BFD_SUPPORTS_PLUGINS
44 #include "plugin.h"
45 #include "plugin-api.h"
46 #endif /* BFD_SUPPORTS_PLUGINS */
47
48 /* Somewhere above, sys/stat.h got included. */
49 #if !defined(S_ISDIR) && defined(S_IFDIR)
50 #define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
51 #endif
52
53 #include <string.h>
54
55 #ifndef TARGET_SYSTEM_ROOT
56 #define TARGET_SYSTEM_ROOT ""
57 #endif
58
59 /* EXPORTS */
60
61 FILE *saved_script_handle = NULL;
62 FILE *previous_script_handle = NULL;
63 bfd_boolean force_make_executable = FALSE;
64
65 char *default_target;
66 const char *output_filename = "a.out";
67
68 /* Name this program was invoked by. */
69 char *program_name;
70
71 /* The prefix for system library directories. */
72 const char *ld_sysroot;
73
74 /* The canonical representation of ld_sysroot. */
75 char *ld_canon_sysroot;
76 int ld_canon_sysroot_len;
77
78 /* Set by -G argument, for targets like MIPS ELF. */
79 int g_switch_value = 8;
80
81 /* Nonzero means print names of input files as processed. */
82 unsigned int trace_files;
83
84 /* Nonzero means report actions taken by the linker, and describe the linker script in use. */
85 bfd_boolean verbose;
86
87 /* Nonzero means version number was printed, so exit successfully
88 instead of complaining if no input files are given. */
89 bfd_boolean version_printed;
90
91 /* TRUE if we should demangle symbol names. */
92 bfd_boolean demangling;
93
94 args_type command_line;
95
96 ld_config_type config;
97
98 sort_type sort_section;
99
100 static const char *get_sysroot
101 (int, char **);
102 static char *get_emulation
103 (int, char **);
104 static bfd_boolean add_archive_element
105 (struct bfd_link_info *, bfd *, const char *, bfd **);
106 static void multiple_definition
107 (struct bfd_link_info *, struct bfd_link_hash_entry *,
108 bfd *, asection *, bfd_vma);
109 static void multiple_common
110 (struct bfd_link_info *, struct bfd_link_hash_entry *,
111 bfd *, enum bfd_link_hash_type, bfd_vma);
112 static void add_to_set
113 (struct bfd_link_info *, struct bfd_link_hash_entry *,
114 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
115 static void constructor_callback
116 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
117 asection *, bfd_vma);
118 static void warning_callback
119 (struct bfd_link_info *, const char *, const char *, bfd *,
120 asection *, bfd_vma);
121 static void warning_find_reloc
122 (bfd *, asection *, void *);
123 static void undefined_symbol
124 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
125 bfd_boolean);
126 static void reloc_overflow
127 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
128 const char *, bfd_vma, bfd *, asection *, bfd_vma);
129 static void reloc_dangerous
130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
131 static void unattached_reloc
132 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
133 static bfd_boolean notice
134 (struct bfd_link_info *, struct bfd_link_hash_entry *,
135 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
136
137 static struct bfd_link_callbacks link_callbacks =
138 {
139 add_archive_element,
140 multiple_definition,
141 multiple_common,
142 add_to_set,
143 constructor_callback,
144 warning_callback,
145 undefined_symbol,
146 reloc_overflow,
147 reloc_dangerous,
148 unattached_reloc,
149 notice,
150 einfo,
151 info_msg,
152 minfo,
153 ldlang_override_segment_assignment,
154 ldlang_ctf_apply_strsym,
155 ldlang_write_ctf_late
156 };
157
158 static bfd_assert_handler_type default_bfd_assert_handler;
159 static bfd_error_handler_type default_bfd_error_handler;
160
161 struct bfd_link_info link_info;
162 \f
163 struct dependency_file
164 {
165 struct dependency_file *next;
166 char *name;
167 };
168
169 static struct dependency_file *dependency_files, *dependency_files_tail;
170
171 void
172 track_dependency_files (const char *filename)
173 {
174 struct dependency_file *dep
175 = (struct dependency_file *) xmalloc (sizeof (*dep));
176 dep->name = xstrdup (filename);
177 dep->next = NULL;
178 if (dependency_files == NULL)
179 dependency_files = dep;
180 else
181 dependency_files_tail->next = dep;
182 dependency_files_tail = dep;
183 }
184
185 static void
186 write_dependency_file (void)
187 {
188 FILE *out;
189 struct dependency_file *dep;
190
191 out = fopen (config.dependency_file, FOPEN_WT);
192 if (out == NULL)
193 {
194 einfo (_("%F%P: cannot open dependency file %s: %E\n"),
195 config.dependency_file);
196 }
197
198 fprintf (out, "%s:", output_filename);
199
200 for (dep = dependency_files; dep != NULL; dep = dep->next)
201 fprintf (out, " \\\n %s", dep->name);
202
203 fprintf (out, "\n");
204 for (dep = dependency_files; dep != NULL; dep = dep->next)
205 fprintf (out, "\n%s:\n", dep->name);
206
207 fclose (out);
208 }
209 \f
210 static void
211 ld_cleanup (void)
212 {
213 bfd_cache_close_all ();
214 #if BFD_SUPPORTS_PLUGINS
215 plugin_call_cleanup ();
216 #endif
217 if (output_filename && delete_output_file_on_failure)
218 unlink_if_ordinary (output_filename);
219 }
220
221 /* Hook to notice BFD assertions. */
222
223 static void
224 ld_bfd_assert_handler (const char *fmt, const char *bfdver,
225 const char *file, int line)
226 {
227 config.make_executable = FALSE;
228 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
229 }
230
231 /* Hook the bfd error/warning handler for --fatal-warnings. */
232
233 static void
234 ld_bfd_error_handler (const char *fmt, va_list ap)
235 {
236 if (config.fatal_warnings)
237 config.make_executable = FALSE;
238 (*default_bfd_error_handler) (fmt, ap);
239 }
240
241 int
242 main (int argc, char **argv)
243 {
244 char *emulation;
245 long start_time = get_run_time ();
246
247 #if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
248 setlocale (LC_MESSAGES, "");
249 #endif
250 #if defined (HAVE_SETLOCALE)
251 setlocale (LC_CTYPE, "");
252 #endif
253 bindtextdomain (PACKAGE, LOCALEDIR);
254 textdomain (PACKAGE);
255
256 program_name = argv[0];
257 xmalloc_set_program_name (program_name);
258
259 START_PROGRESS (program_name, 0);
260
261 expandargv (&argc, &argv);
262
263 if (bfd_init () != BFD_INIT_MAGIC)
264 einfo (_("%F%P: fatal error: libbfd ABI mismatch\n"));
265
266 bfd_set_error_program_name (program_name);
267
268 /* We want to notice and fail on those nasty BFD assertions which are
269 likely to signal incorrect output being generated but otherwise may
270 leave no trace. */
271 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
272
273 /* Also hook the bfd error/warning handler for --fatal-warnings. */
274 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
275
276 xatexit (ld_cleanup);
277
278 /* Set up the sysroot directory. */
279 ld_sysroot = get_sysroot (argc, argv);
280 if (*ld_sysroot)
281 ld_canon_sysroot = lrealpath (ld_sysroot);
282 if (ld_canon_sysroot)
283 {
284 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
285
286 /* is_sysrooted_pathname() relies on no trailing dirsep. */
287 if (ld_canon_sysroot_len > 0
288 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
289 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
290 }
291 else
292 ld_canon_sysroot_len = -1;
293
294 /* Set the default BFD target based on the configured target. Doing
295 this permits the linker to be configured for a particular target,
296 and linked against a shared BFD library which was configured for
297 a different target. The macro TARGET is defined by Makefile. */
298 if (!bfd_set_default_target (TARGET))
299 {
300 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
301 xexit (1);
302 }
303
304 #if YYDEBUG
305 {
306 extern int yydebug;
307 yydebug = 1;
308 }
309 #endif
310
311 config.build_constructors = TRUE;
312 config.rpath_separator = ':';
313 config.split_by_reloc = (unsigned) -1;
314 config.split_by_file = (bfd_size_type) -1;
315 config.make_executable = TRUE;
316 config.magic_demand_paged = TRUE;
317 config.text_read_only = TRUE;
318 config.print_map_discarded = TRUE;
319 link_info.disable_target_specific_optimizations = -1;
320
321 command_line.warn_mismatch = TRUE;
322 command_line.warn_search_mismatch = TRUE;
323 command_line.check_section_addresses = -1;
324
325 /* We initialize DEMANGLING based on the environment variable
326 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
327 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
328 environment. Acting the same way here lets us provide the same
329 interface by default. */
330 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
331
332 link_info.allow_undefined_version = TRUE;
333 link_info.keep_memory = TRUE;
334 link_info.combreloc = TRUE;
335 link_info.strip_discarded = TRUE;
336 link_info.prohibit_multiple_definition_absolute = FALSE;
337 link_info.textrel_check = DEFAULT_LD_TEXTREL_CHECK;
338 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
339 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
340 link_info.callbacks = &link_callbacks;
341 link_info.input_bfds_tail = &link_info.input_bfds;
342 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
343 and _fini symbols. We are compatible. */
344 link_info.init_function = "_init";
345 link_info.fini_function = "_fini";
346 link_info.relax_pass = 1;
347 link_info.extern_protected_data = -1;
348 link_info.dynamic_undefined_weak = -1;
349 link_info.pei386_auto_import = -1;
350 link_info.spare_dynamic_tags = 5;
351 link_info.path_separator = ':';
352 #ifdef DEFAULT_FLAG_COMPRESS_DEBUG
353 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
354 #endif
355 #ifdef DEFAULT_NEW_DTAGS
356 link_info.new_dtags = DEFAULT_NEW_DTAGS;
357 #endif
358 link_info.start_stop_visibility = STV_PROTECTED;
359
360 ldfile_add_arch ("");
361 emulation = get_emulation (argc, argv);
362 ldemul_choose_mode (emulation);
363 default_target = ldemul_choose_target (argc, argv);
364 lang_init ();
365 ldexp_init ();
366 ldemul_before_parse ();
367 lang_has_input_file = FALSE;
368 parse_args (argc, argv);
369
370 if (config.hash_table_size != 0)
371 bfd_hash_set_default_size (config.hash_table_size);
372
373 #if BFD_SUPPORTS_PLUGINS
374 /* Now all the plugin arguments have been gathered, we can load them. */
375 plugin_load_plugins ();
376 #endif /* BFD_SUPPORTS_PLUGINS */
377
378 ldemul_set_symbols ();
379
380 /* If we have not already opened and parsed a linker script,
381 try the default script from command line first. */
382 if (saved_script_handle == NULL
383 && command_line.default_script != NULL)
384 {
385 ldfile_open_script_file (command_line.default_script);
386 parser_input = input_script;
387 yyparse ();
388 }
389
390 /* If we have not already opened and parsed a linker script
391 read the emulation's appropriate default script. */
392 if (saved_script_handle == NULL)
393 {
394 int isfile;
395 char *s = ldemul_get_script (&isfile);
396
397 if (isfile)
398 ldfile_open_default_command_file (s);
399 else
400 {
401 lex_string = s;
402 lex_redirect (s, _("built in linker script"), 1);
403 }
404 parser_input = input_script;
405 yyparse ();
406 lex_string = NULL;
407 }
408
409 if (verbose)
410 {
411 if (saved_script_handle)
412 info_msg (_("using external linker script:"));
413 else
414 info_msg (_("using internal linker script:"));
415 info_msg ("\n==================================================\n");
416
417 if (saved_script_handle)
418 {
419 static const int ld_bufsz = 8193;
420 size_t n;
421 char *buf = (char *) xmalloc (ld_bufsz);
422
423 rewind (saved_script_handle);
424 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
425 {
426 buf[n] = 0;
427 info_msg ("%s", buf);
428 }
429 rewind (saved_script_handle);
430 free (buf);
431 }
432 else
433 {
434 int isfile;
435
436 info_msg (ldemul_get_script (&isfile));
437 }
438
439 info_msg ("\n==================================================\n");
440 }
441
442 if (command_line.force_group_allocation
443 || !bfd_link_relocatable (&link_info))
444 link_info.resolve_section_groups = TRUE;
445 else
446 link_info.resolve_section_groups = FALSE;
447
448 if (command_line.print_output_format)
449 info_msg ("%s\n", lang_get_output_target ());
450
451 lang_final ();
452
453 /* If the only command line argument has been -v or --version or --verbose
454 then ignore any input files provided by linker scripts and exit now.
455 We do not want to create an output file when the linker is just invoked
456 to provide version information. */
457 if (argc == 2 && version_printed)
458 xexit (0);
459
460 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
461 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
462
463 if (!lang_has_input_file)
464 {
465 if (version_printed || command_line.print_output_format)
466 xexit (0);
467 einfo (_("%F%P: no input files\n"));
468 }
469
470 if (verbose)
471 info_msg (_("%P: mode %s\n"), emulation);
472
473 ldemul_after_parse ();
474
475 if (config.map_filename)
476 {
477 if (strcmp (config.map_filename, "-") == 0)
478 {
479 config.map_file = stdout;
480 }
481 else
482 {
483 config.map_file = fopen (config.map_filename, FOPEN_WT);
484 if (config.map_file == (FILE *) NULL)
485 {
486 bfd_set_error (bfd_error_system_call);
487 einfo (_("%F%P: cannot open map file %s: %E\n"),
488 config.map_filename);
489 }
490 }
491 link_info.has_map_file = TRUE;
492 }
493
494 lang_process ();
495
496 /* Print error messages for any missing symbols, for any warning
497 symbols, and possibly multiple definitions. */
498 if (bfd_link_relocatable (&link_info))
499 link_info.output_bfd->flags &= ~EXEC_P;
500 else
501 link_info.output_bfd->flags |= EXEC_P;
502
503 if ((link_info.compress_debug & COMPRESS_DEBUG))
504 {
505 link_info.output_bfd->flags |= BFD_COMPRESS;
506 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
507 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
508 }
509
510 ldwrite ();
511
512 if (config.map_file != NULL)
513 lang_map ();
514 if (command_line.cref)
515 output_cref (config.map_file != NULL ? config.map_file : stdout);
516 if (nocrossref_list != NULL)
517 check_nocrossrefs ();
518 if (command_line.print_memory_usage)
519 lang_print_memory_usage ();
520 #if 0
521 {
522 struct bfd_link_hash_entry *h;
523
524 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
525 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
526 }
527 #endif
528 ldexp_finish ();
529 lang_finish ();
530
531 if (config.dependency_file != NULL)
532 write_dependency_file ();
533
534 /* Even if we're producing relocatable output, some non-fatal errors should
535 be reported in the exit status. (What non-fatal errors, if any, do we
536 want to ignore for relocatable output?) */
537 if (!config.make_executable && !force_make_executable)
538 {
539 if (verbose)
540 einfo (_("%P: link errors found, deleting executable `%s'\n"),
541 output_filename);
542
543 /* The file will be removed by ld_cleanup. */
544 xexit (1);
545 }
546 else
547 {
548 if (!bfd_close (link_info.output_bfd))
549 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
550
551 /* If the --force-exe-suffix is enabled, and we're making an
552 executable file and it doesn't end in .exe, copy it to one
553 which does. */
554 if (!bfd_link_relocatable (&link_info)
555 && command_line.force_exe_suffix)
556 {
557 int len = strlen (output_filename);
558
559 if (len < 4
560 || (strcasecmp (output_filename + len - 4, ".exe") != 0
561 && strcasecmp (output_filename + len - 4, ".dll") != 0))
562 {
563 FILE *src;
564 FILE *dst;
565 const int bsize = 4096;
566 char *buf = (char *) xmalloc (bsize);
567 int l;
568 char *dst_name = (char *) xmalloc (len + 5);
569
570 strcpy (dst_name, output_filename);
571 strcat (dst_name, ".exe");
572 src = fopen (output_filename, FOPEN_RB);
573 dst = fopen (dst_name, FOPEN_WB);
574
575 if (!src)
576 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
577 output_filename);
578 if (!dst)
579 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
580 dst_name);
581 while ((l = fread (buf, 1, bsize, src)) > 0)
582 {
583 int done = fwrite (buf, 1, l, dst);
584
585 if (done != l)
586 einfo (_("%P: error writing file `%s'\n"), dst_name);
587 }
588
589 fclose (src);
590 if (fclose (dst) == EOF)
591 einfo (_("%P: error closing file `%s'\n"), dst_name);
592 free (dst_name);
593 free (buf);
594 }
595 }
596 }
597
598 END_PROGRESS (program_name);
599
600 if (config.stats)
601 {
602 long run_time = get_run_time () - start_time;
603
604 fflush (stdout);
605 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
606 program_name, run_time / 1000000, run_time % 1000000);
607 fflush (stderr);
608 }
609
610 /* Prevent ld_cleanup from doing anything, after a successful link. */
611 output_filename = NULL;
612
613 xexit (0);
614 return 0;
615 }
616
617 /* If the configured sysroot is relocatable, try relocating it based on
618 default prefix FROM. Return the relocated directory if it exists,
619 otherwise return null. */
620
621 static char *
622 get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
623 {
624 #ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
625 char *path;
626 struct stat s;
627
628 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
629 if (path)
630 {
631 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
632 return path;
633 free (path);
634 }
635 #endif
636 return 0;
637 }
638
639 /* Return the sysroot directory. Return "" if no sysroot is being used. */
640
641 static const char *
642 get_sysroot (int argc, char **argv)
643 {
644 int i;
645 const char *path = NULL;
646
647 for (i = 1; i < argc; i++)
648 if (CONST_STRNEQ (argv[i], "--sysroot="))
649 path = argv[i] + strlen ("--sysroot=");
650
651 if (!path)
652 path = get_relative_sysroot (BINDIR);
653
654 if (!path)
655 path = get_relative_sysroot (TOOLBINDIR);
656
657 if (!path)
658 path = TARGET_SYSTEM_ROOT;
659
660 if (IS_DIR_SEPARATOR (*path) && path[1] == 0)
661 path = "";
662
663 return path;
664 }
665
666 /* We need to find any explicitly given emulation in order to initialize the
667 state that's needed by the lex&yacc argument parser (parse_args). */
668
669 static char *
670 get_emulation (int argc, char **argv)
671 {
672 char *emulation;
673 int i;
674
675 emulation = getenv (EMULATION_ENVIRON);
676 if (emulation == NULL)
677 emulation = DEFAULT_EMULATION;
678
679 for (i = 1; i < argc; i++)
680 {
681 if (CONST_STRNEQ (argv[i], "-m"))
682 {
683 if (argv[i][2] == '\0')
684 {
685 /* -m EMUL */
686 if (i < argc - 1)
687 {
688 emulation = argv[i + 1];
689 i++;
690 }
691 else
692 einfo (_("%F%P: missing argument to -m\n"));
693 }
694 else if (strcmp (argv[i], "-mips1") == 0
695 || strcmp (argv[i], "-mips2") == 0
696 || strcmp (argv[i], "-mips3") == 0
697 || strcmp (argv[i], "-mips4") == 0
698 || strcmp (argv[i], "-mips5") == 0
699 || strcmp (argv[i], "-mips32") == 0
700 || strcmp (argv[i], "-mips32r2") == 0
701 || strcmp (argv[i], "-mips32r6") == 0
702 || strcmp (argv[i], "-mips64") == 0
703 || strcmp (argv[i], "-mips64r2") == 0
704 || strcmp (argv[i], "-mips64r6") == 0)
705 {
706 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
707 passed to the linker by some MIPS compilers. They
708 generally tell the linker to use a slightly different
709 library path. Perhaps someday these should be
710 implemented as emulations; until then, we just ignore
711 the arguments and hope that nobody ever creates
712 emulations named ips1, ips2 or ips3. */
713 }
714 else if (strcmp (argv[i], "-m486") == 0)
715 {
716 /* FIXME: The argument -m486 is passed to the linker on
717 some Linux systems. Hope that nobody creates an
718 emulation named 486. */
719 }
720 else
721 {
722 /* -mEMUL */
723 emulation = &argv[i][2];
724 }
725 }
726 }
727
728 return emulation;
729 }
730
731 void
732 add_ysym (const char *name)
733 {
734 if (link_info.notice_hash == NULL)
735 {
736 link_info.notice_hash
737 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
738 if (!bfd_hash_table_init_n (link_info.notice_hash,
739 bfd_hash_newfunc,
740 sizeof (struct bfd_hash_entry),
741 61))
742 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
743 }
744
745 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
746 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
747 }
748
749 void
750 add_ignoresym (struct bfd_link_info *info, const char *name)
751 {
752 if (info->ignore_hash == NULL)
753 {
754 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
755 if (!bfd_hash_table_init_n (info->ignore_hash,
756 bfd_hash_newfunc,
757 sizeof (struct bfd_hash_entry),
758 61))
759 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
760 }
761
762 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
763 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
764 }
765
766 /* Record a symbol to be wrapped, from the --wrap option. */
767
768 void
769 add_wrap (const char *name)
770 {
771 if (link_info.wrap_hash == NULL)
772 {
773 link_info.wrap_hash
774 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
775 if (!bfd_hash_table_init_n (link_info.wrap_hash,
776 bfd_hash_newfunc,
777 sizeof (struct bfd_hash_entry),
778 61))
779 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
780 }
781
782 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
783 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
784 }
785
786 /* Handle the -retain-symbols-file option. */
787
788 void
789 add_keepsyms_file (const char *filename)
790 {
791 FILE *file;
792 char *buf;
793 size_t bufsize;
794 int c;
795
796 if (link_info.strip == strip_some)
797 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
798
799 file = fopen (filename, "r");
800 if (file == NULL)
801 {
802 bfd_set_error (bfd_error_system_call);
803 einfo ("%X%P: %s: %E\n", filename);
804 return;
805 }
806
807 link_info.keep_hash = (struct bfd_hash_table *)
808 xmalloc (sizeof (struct bfd_hash_table));
809 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
810 sizeof (struct bfd_hash_entry)))
811 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
812
813 bufsize = 100;
814 buf = (char *) xmalloc (bufsize);
815
816 c = getc (file);
817 while (c != EOF)
818 {
819 while (ISSPACE (c))
820 c = getc (file);
821
822 if (c != EOF)
823 {
824 size_t len = 0;
825
826 while (!ISSPACE (c) && c != EOF)
827 {
828 buf[len] = c;
829 ++len;
830 if (len >= bufsize)
831 {
832 bufsize *= 2;
833 buf = (char *) xrealloc (buf, bufsize);
834 }
835 c = getc (file);
836 }
837
838 buf[len] = '\0';
839
840 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
841 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
842 }
843 }
844
845 if (link_info.strip != strip_none)
846 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
847
848 free (buf);
849 link_info.strip = strip_some;
850 fclose (file);
851 }
852 \f
853 /* Callbacks from the BFD linker routines. */
854
855 /* This is called when BFD has decided to include an archive member in
856 a link. */
857
858 static bfd_boolean
859 add_archive_element (struct bfd_link_info *info,
860 bfd *abfd,
861 const char *name,
862 bfd **subsbfd ATTRIBUTE_UNUSED)
863 {
864 lang_input_statement_type *input;
865 lang_input_statement_type *parent;
866 lang_input_statement_type orig_input;
867
868 input = (lang_input_statement_type *)
869 xcalloc (1, sizeof (lang_input_statement_type));
870 input->header.type = lang_input_statement_enum;
871 input->filename = bfd_get_filename (abfd);
872 input->local_sym_name = bfd_get_filename (abfd);
873 input->the_bfd = abfd;
874
875 /* Save the original data for trace files/tries below, as plugins
876 (if enabled) may possibly alter it to point to a replacement
877 BFD, but we still want to output the original BFD filename. */
878 orig_input = *input;
879 #if BFD_SUPPORTS_PLUGINS
880 if (link_info.lto_plugin_active)
881 {
882 /* We must offer this archive member to the plugins to claim. */
883 plugin_maybe_claim (input);
884 if (input->flags.claimed)
885 {
886 if (no_more_claiming)
887 {
888 /* Don't claim new IR symbols after all IR symbols have
889 been claimed. */
890 if (verbose)
891 info_msg ("%pI: no new IR symbols to claim\n",
892 &orig_input);
893 input->flags.claimed = 0;
894 return FALSE;
895 }
896 input->flags.claim_archive = TRUE;
897 *subsbfd = input->the_bfd;
898 }
899 }
900 #endif /* BFD_SUPPORTS_PLUGINS */
901
902 if (link_info.input_bfds_tail == &input->the_bfd->link.next
903 || input->the_bfd->link.next != NULL)
904 {
905 /* We have already loaded this element, and are attempting to
906 load it again. This can happen when the archive map doesn't
907 match actual symbols defined by the element. */
908 free (input);
909 bfd_set_error (bfd_error_malformed_archive);
910 return FALSE;
911 }
912
913 /* Set the file_chain pointer of archives to the last element loaded
914 from the archive. See ldlang.c:find_rescan_insertion. */
915 parent = bfd_usrdata (abfd->my_archive);
916 if (parent != NULL && !parent->flags.reload)
917 parent->next = input;
918
919 ldlang_add_file (input);
920
921 if (config.map_file != NULL)
922 {
923 static bfd_boolean header_printed;
924 struct bfd_link_hash_entry *h;
925 bfd *from;
926 int len;
927
928 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
929 if (h == NULL
930 && info->pei386_auto_import
931 && CONST_STRNEQ (name, "__imp_"))
932 h = bfd_link_hash_lookup (info->hash, name + 6, FALSE, FALSE, TRUE);
933
934 if (h == NULL)
935 from = NULL;
936 else
937 {
938 switch (h->type)
939 {
940 default:
941 from = NULL;
942 break;
943
944 case bfd_link_hash_defined:
945 case bfd_link_hash_defweak:
946 from = h->u.def.section->owner;
947 break;
948
949 case bfd_link_hash_undefined:
950 case bfd_link_hash_undefweak:
951 from = h->u.undef.abfd;
952 break;
953
954 case bfd_link_hash_common:
955 from = h->u.c.p->section->owner;
956 break;
957 }
958 }
959
960 if (!header_printed)
961 {
962 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
963 header_printed = TRUE;
964 }
965
966 if (abfd->my_archive == NULL
967 || bfd_is_thin_archive (abfd->my_archive))
968 {
969 minfo ("%s", bfd_get_filename (abfd));
970 len = strlen (bfd_get_filename (abfd));
971 }
972 else
973 {
974 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
975 bfd_get_filename (abfd));
976 len = (strlen (bfd_get_filename (abfd->my_archive))
977 + strlen (bfd_get_filename (abfd))
978 + 2);
979 }
980
981 if (len >= 29)
982 {
983 print_nl ();
984 len = 0;
985 }
986 while (len < 30)
987 {
988 print_space ();
989 ++len;
990 }
991
992 if (from != NULL)
993 minfo ("%pB ", from);
994 if (h != NULL)
995 minfo ("(%pT)\n", h->root.string);
996 else
997 minfo ("(%s)\n", name);
998 }
999
1000 if (verbose
1001 || trace_files > 1
1002 || (trace_files && bfd_is_thin_archive (orig_input.the_bfd->my_archive)))
1003 info_msg ("%pI\n", &orig_input);
1004 return TRUE;
1005 }
1006
1007 /* This is called when BFD has discovered a symbol which is defined
1008 multiple times. */
1009
1010 static void
1011 multiple_definition (struct bfd_link_info *info,
1012 struct bfd_link_hash_entry *h,
1013 bfd *nbfd,
1014 asection *nsec,
1015 bfd_vma nval)
1016 {
1017 const char *name;
1018 bfd *obfd;
1019 asection *osec;
1020 bfd_vma oval;
1021
1022 if (info->allow_multiple_definition)
1023 return;
1024
1025 switch (h->type)
1026 {
1027 case bfd_link_hash_defined:
1028 osec = h->u.def.section;
1029 oval = h->u.def.value;
1030 obfd = h->u.def.section->owner;
1031 break;
1032 case bfd_link_hash_indirect:
1033 osec = bfd_ind_section_ptr;
1034 oval = 0;
1035 obfd = NULL;
1036 break;
1037 default:
1038 abort ();
1039 }
1040
1041 /* Ignore a redefinition of an absolute symbol to the
1042 same value; it's harmless. */
1043 if (h->type == bfd_link_hash_defined
1044 && bfd_is_abs_section (osec)
1045 && bfd_is_abs_section (nsec)
1046 && nval == oval)
1047 return;
1048
1049 /* If either section has the output_section field set to
1050 bfd_abs_section_ptr, it means that the section is being
1051 discarded, and this is not really a multiple definition at all.
1052 FIXME: It would be cleaner to somehow ignore symbols defined in
1053 sections which are being discarded. */
1054 if (!info->prohibit_multiple_definition_absolute
1055 && ((osec->output_section != NULL
1056 && ! bfd_is_abs_section (osec)
1057 && bfd_is_abs_section (osec->output_section))
1058 || (nsec->output_section != NULL
1059 && !bfd_is_abs_section (nsec)
1060 && bfd_is_abs_section (nsec->output_section))))
1061 return;
1062
1063 name = h->root.string;
1064 if (nbfd == NULL)
1065 {
1066 nbfd = obfd;
1067 nsec = osec;
1068 nval = oval;
1069 obfd = NULL;
1070 }
1071 einfo (_("%X%P: %C: multiple definition of `%pT'"),
1072 nbfd, nsec, nval, name);
1073 if (obfd != NULL)
1074 einfo (_("; %D: first defined here"), obfd, osec, oval);
1075 einfo ("\n");
1076
1077 if (RELAXATION_ENABLED_BY_USER)
1078 {
1079 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
1080 DISABLE_RELAXATION;
1081 }
1082 }
1083
1084 /* This is called when there is a definition of a common symbol, or
1085 when a common symbol is found for a symbol that is already defined,
1086 or when two common symbols are found. We only do something if
1087 -warn-common was used. */
1088
1089 static void
1090 multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1091 struct bfd_link_hash_entry *h,
1092 bfd *nbfd,
1093 enum bfd_link_hash_type ntype,
1094 bfd_vma nsize)
1095 {
1096 const char *name;
1097 bfd *obfd;
1098 enum bfd_link_hash_type otype;
1099 bfd_vma osize;
1100
1101 if (!config.warn_common)
1102 return;
1103
1104 name = h->root.string;
1105 otype = h->type;
1106 if (otype == bfd_link_hash_common)
1107 {
1108 obfd = h->u.c.p->section->owner;
1109 osize = h->u.c.size;
1110 }
1111 else if (otype == bfd_link_hash_defined
1112 || otype == bfd_link_hash_defweak)
1113 {
1114 obfd = h->u.def.section->owner;
1115 osize = 0;
1116 }
1117 else
1118 {
1119 /* FIXME: It would nice if we could report the BFD which defined
1120 an indirect symbol, but we don't have anywhere to store the
1121 information. */
1122 obfd = NULL;
1123 osize = 0;
1124 }
1125
1126 if (ntype == bfd_link_hash_defined
1127 || ntype == bfd_link_hash_defweak
1128 || ntype == bfd_link_hash_indirect)
1129 {
1130 ASSERT (otype == bfd_link_hash_common);
1131 if (obfd != NULL)
1132 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1133 " from %pB\n"),
1134 nbfd, name, obfd);
1135 else
1136 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1137 nbfd, name);
1138 }
1139 else if (otype == bfd_link_hash_defined
1140 || otype == bfd_link_hash_defweak
1141 || otype == bfd_link_hash_indirect)
1142 {
1143 ASSERT (ntype == bfd_link_hash_common);
1144 if (obfd != NULL)
1145 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1146 " from %pB\n"),
1147 nbfd, name, obfd);
1148 else
1149 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1150 nbfd, name);
1151 }
1152 else
1153 {
1154 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1155 if (osize > nsize)
1156 {
1157 if (obfd != NULL)
1158 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1159 " by larger common from %pB\n"),
1160 nbfd, name, obfd);
1161 else
1162 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1163 " by larger common\n"),
1164 nbfd, name);
1165 }
1166 else if (nsize > osize)
1167 {
1168 if (obfd != NULL)
1169 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1170 " smaller common from %pB\n"),
1171 nbfd, name, obfd);
1172 else
1173 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1174 " smaller common\n"),
1175 nbfd, name);
1176 }
1177 else
1178 {
1179 if (obfd != NULL)
1180 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1181 nbfd, obfd, name);
1182 else
1183 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1184 nbfd, name);
1185 }
1186 }
1187 }
1188
1189 /* This is called when BFD has discovered a set element. H is the
1190 entry in the linker hash table for the set. SECTION and VALUE
1191 represent a value which should be added to the set. */
1192
1193 static void
1194 add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1195 struct bfd_link_hash_entry *h,
1196 bfd_reloc_code_real_type reloc,
1197 bfd *abfd,
1198 asection *section,
1199 bfd_vma value)
1200 {
1201 if (config.warn_constructors)
1202 einfo (_("%P: warning: global constructor %s used\n"),
1203 h->root.string);
1204
1205 if (!config.build_constructors)
1206 return;
1207
1208 ldctor_add_set_entry (h, reloc, NULL, section, value);
1209
1210 if (h->type == bfd_link_hash_new)
1211 {
1212 h->type = bfd_link_hash_undefined;
1213 h->u.undef.abfd = abfd;
1214 /* We don't call bfd_link_add_undef to add this to the list of
1215 undefined symbols because we are going to define it
1216 ourselves. */
1217 }
1218 }
1219
1220 /* This is called when BFD has discovered a constructor. This is only
1221 called for some object file formats--those which do not handle
1222 constructors in some more clever fashion. This is similar to
1223 adding an element to a set, but less general. */
1224
1225 static void
1226 constructor_callback (struct bfd_link_info *info,
1227 bfd_boolean constructor,
1228 const char *name,
1229 bfd *abfd,
1230 asection *section,
1231 bfd_vma value)
1232 {
1233 char *s;
1234 struct bfd_link_hash_entry *h;
1235 char set_name[1 + sizeof "__CTOR_LIST__"];
1236
1237 if (config.warn_constructors)
1238 einfo (_("%P: warning: global constructor %s used\n"), name);
1239
1240 if (!config.build_constructors)
1241 return;
1242
1243 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1244 useful error message. */
1245 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
1246 && (bfd_link_relocatable (info)
1247 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1248 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1249
1250 s = set_name;
1251 if (bfd_get_symbol_leading_char (abfd) != '\0')
1252 *s++ = bfd_get_symbol_leading_char (abfd);
1253 if (constructor)
1254 strcpy (s, "__CTOR_LIST__");
1255 else
1256 strcpy (s, "__DTOR_LIST__");
1257
1258 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
1259 if (h == (struct bfd_link_hash_entry *) NULL)
1260 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
1261 if (h->type == bfd_link_hash_new)
1262 {
1263 h->type = bfd_link_hash_undefined;
1264 h->u.undef.abfd = abfd;
1265 /* We don't call bfd_link_add_undef to add this to the list of
1266 undefined symbols because we are going to define it
1267 ourselves. */
1268 }
1269
1270 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
1271 }
1272
1273 /* A structure used by warning_callback to pass information through
1274 bfd_map_over_sections. */
1275
1276 struct warning_callback_info
1277 {
1278 bfd_boolean found;
1279 const char *warning;
1280 const char *symbol;
1281 asymbol **asymbols;
1282 };
1283
1284 /* Look through the relocs to see if we can find a plausible address
1285 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1286
1287 static bfd_boolean
1288 symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1289 {
1290 struct warning_callback_info cinfo;
1291
1292 if (!bfd_generic_link_read_symbols (abfd))
1293 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
1294
1295 cinfo.found = FALSE;
1296 cinfo.warning = warning;
1297 cinfo.symbol = symbol;
1298 cinfo.asymbols = bfd_get_outsymbols (abfd);
1299 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1300 return cinfo.found;
1301 }
1302
1303 /* This is called when there is a reference to a warning symbol. */
1304
1305 static void
1306 warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1307 const char *warning,
1308 const char *symbol,
1309 bfd *abfd,
1310 asection *section,
1311 bfd_vma address)
1312 {
1313 /* This is a hack to support warn_multiple_gp. FIXME: This should
1314 have a cleaner interface, but what? */
1315 if (!config.warn_multiple_gp
1316 && strcmp (warning, "using multiple gp values") == 0)
1317 return;
1318
1319 if (section != NULL)
1320 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
1321 else if (abfd == NULL)
1322 einfo ("%P: %s%s\n", _("warning: "), warning);
1323 else if (symbol == NULL)
1324 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1325 else if (!symbol_warning (warning, symbol, abfd))
1326 {
1327 bfd *b;
1328 /* Search all input files for a reference to SYMBOL. */
1329 for (b = info->input_bfds; b; b = b->link.next)
1330 if (b != abfd && symbol_warning (warning, symbol, b))
1331 return;
1332 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1333 }
1334 }
1335
1336 /* This is called by warning_callback for each section. It checks the
1337 relocs of the section to see if it can find a reference to the
1338 symbol which triggered the warning. If it can, it uses the reloc
1339 to give an error message with a file and line number. */
1340
1341 static void
1342 warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
1343 {
1344 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
1345 long relsize;
1346 arelent **relpp;
1347 long relcount;
1348 arelent **p, **pend;
1349
1350 if (info->found)
1351 return;
1352
1353 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1354 if (relsize < 0)
1355 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1356 if (relsize == 0)
1357 return;
1358
1359 relpp = (arelent **) xmalloc (relsize);
1360 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1361 if (relcount < 0)
1362 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1363
1364 p = relpp;
1365 pend = p + relcount;
1366 for (; p < pend && *p != NULL; p++)
1367 {
1368 arelent *q = *p;
1369
1370 if (q->sym_ptr_ptr != NULL
1371 && *q->sym_ptr_ptr != NULL
1372 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1373 {
1374 /* We found a reloc for the symbol we are looking for. */
1375 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
1376 info->warning);
1377 info->found = TRUE;
1378 break;
1379 }
1380 }
1381
1382 free (relpp);
1383 }
1384
1385 /* This is called when an undefined symbol is found. */
1386
1387 static void
1388 undefined_symbol (struct bfd_link_info *info,
1389 const char *name,
1390 bfd *abfd,
1391 asection *section,
1392 bfd_vma address,
1393 bfd_boolean error)
1394 {
1395 static char *error_name;
1396 static unsigned int error_count;
1397
1398 #define MAX_ERRORS_IN_A_ROW 5
1399
1400 if (info->ignore_hash != NULL
1401 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1402 return;
1403
1404 if (config.warn_once)
1405 {
1406 /* Only warn once about a particular undefined symbol. */
1407 add_ignoresym (info, name);
1408 }
1409
1410 /* We never print more than a reasonable number of errors in a row
1411 for a single symbol. */
1412 if (error_name != NULL
1413 && strcmp (name, error_name) == 0)
1414 ++error_count;
1415 else
1416 {
1417 error_count = 0;
1418 free (error_name);
1419 error_name = xstrdup (name);
1420 }
1421
1422 if (section != NULL)
1423 {
1424 if (error_count < MAX_ERRORS_IN_A_ROW)
1425 {
1426 if (error)
1427 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
1428 abfd, section, address, name);
1429 else
1430 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
1431 abfd, section, address, name);
1432 }
1433 else if (error_count == MAX_ERRORS_IN_A_ROW)
1434 {
1435 if (error)
1436 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
1437 abfd, section, address, name);
1438 else
1439 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
1440 abfd, section, address, name);
1441 }
1442 else if (error)
1443 einfo ("%X");
1444 }
1445 else
1446 {
1447 if (error_count < MAX_ERRORS_IN_A_ROW)
1448 {
1449 if (error)
1450 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
1451 abfd, name);
1452 else
1453 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
1454 abfd, name);
1455 }
1456 else if (error_count == MAX_ERRORS_IN_A_ROW)
1457 {
1458 if (error)
1459 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
1460 abfd, name);
1461 else
1462 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
1463 abfd, name);
1464 }
1465 else if (error)
1466 einfo ("%X");
1467 }
1468 }
1469
1470 /* Counter to limit the number of relocation overflow error messages
1471 to print. Errors are printed as it is decremented. When it's
1472 called and the counter is zero, a final message is printed
1473 indicating more relocations were omitted. When it gets to -1, no
1474 such errors are printed. If it's initially set to a value less
1475 than -1, all such errors will be printed (--verbose does this). */
1476
1477 int overflow_cutoff_limit = 10;
1478
1479 /* This is called when a reloc overflows. */
1480
1481 static void
1482 reloc_overflow (struct bfd_link_info *info,
1483 struct bfd_link_hash_entry *entry,
1484 const char *name,
1485 const char *reloc_name,
1486 bfd_vma addend,
1487 bfd *abfd,
1488 asection *section,
1489 bfd_vma address)
1490 {
1491 if (overflow_cutoff_limit == -1)
1492 return;
1493
1494 einfo ("%X%H:", abfd, section, address);
1495
1496 if (overflow_cutoff_limit >= 0
1497 && overflow_cutoff_limit-- == 0)
1498 {
1499 einfo (_(" additional relocation overflows omitted from the output\n"));
1500 return;
1501 }
1502
1503 if (entry)
1504 {
1505 while (entry->type == bfd_link_hash_indirect
1506 || entry->type == bfd_link_hash_warning)
1507 entry = entry->u.i.link;
1508 switch (entry->type)
1509 {
1510 case bfd_link_hash_undefined:
1511 case bfd_link_hash_undefweak:
1512 einfo (_(" relocation truncated to fit: "
1513 "%s against undefined symbol `%pT'"),
1514 reloc_name, entry->root.string);
1515 break;
1516 case bfd_link_hash_defined:
1517 case bfd_link_hash_defweak:
1518 einfo (_(" relocation truncated to fit: "
1519 "%s against symbol `%pT' defined in %pA section in %pB"),
1520 reloc_name, entry->root.string,
1521 entry->u.def.section,
1522 entry->u.def.section == bfd_abs_section_ptr
1523 ? info->output_bfd : entry->u.def.section->owner);
1524 break;
1525 default:
1526 abort ();
1527 break;
1528 }
1529 }
1530 else
1531 einfo (_(" relocation truncated to fit: %s against `%pT'"),
1532 reloc_name, name);
1533 if (addend != 0)
1534 einfo ("+%v", addend);
1535 einfo ("\n");
1536 }
1537
1538 /* This is called when a dangerous relocation is made. */
1539
1540 static void
1541 reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1542 const char *message,
1543 bfd *abfd,
1544 asection *section,
1545 bfd_vma address)
1546 {
1547 einfo (_("%X%H: dangerous relocation: %s\n"),
1548 abfd, section, address, message);
1549 }
1550
1551 /* This is called when a reloc is being generated attached to a symbol
1552 that is not being output. */
1553
1554 static void
1555 unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1556 const char *name,
1557 bfd *abfd,
1558 asection *section,
1559 bfd_vma address)
1560 {
1561 einfo (_("%X%H: reloc refers to symbol `%pT' which is not being output\n"),
1562 abfd, section, address, name);
1563 }
1564
1565 /* This is called if link_info.notice_all is set, or when a symbol in
1566 link_info.notice_hash is found. Symbols are put in notice_hash
1567 using the -y option, while notice_all is set if the --cref option
1568 has been supplied, or if there are any NOCROSSREFS sections in the
1569 linker script; and if plugins are active, since they need to monitor
1570 all references from non-IR files. */
1571
1572 static bfd_boolean
1573 notice (struct bfd_link_info *info,
1574 struct bfd_link_hash_entry *h,
1575 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1576 bfd *abfd,
1577 asection *section,
1578 bfd_vma value,
1579 flagword flags ATTRIBUTE_UNUSED)
1580 {
1581 const char *name;
1582
1583 if (h == NULL)
1584 {
1585 if (command_line.cref || nocrossref_list != NULL)
1586 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
1587 return TRUE;
1588 }
1589
1590 name = h->root.string;
1591 if (info->notice_hash != NULL
1592 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
1593 {
1594 if (bfd_is_und_section (section))
1595 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
1596 else
1597 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
1598 }
1599
1600 if (command_line.cref || nocrossref_list != NULL)
1601 add_cref (name, abfd, section, value);
1602
1603 return TRUE;
1604 }
This page took 0.06119 seconds and 4 git commands to generate.