PR ld/12365
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
4e5bae56 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
e922bcab 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
252b5132
RH
4 Free Software Foundation, Inc.
5 Written by Steve Chamberlain steve@cygnus.com
6
f96b4a7b 7 This file is part of the GNU Binutils.
252b5132 8
f96b4a7b 9 This program is free software; you can redistribute it and/or modify
2fa9fc65 10 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
252b5132 13
f96b4a7b 14 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
2fa9fc65 19 You should have received a copy of the GNU General Public License
f96b4a7b
NC
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
3882b010 26#include "safe-ctype.h"
252b5132
RH
27#include "libiberty.h"
28#include "progress.h"
29#include "bfdlink.h"
5af11cab 30#include "filenames.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
46#include "libbfd.h"
47#endif /* ENABLE_PLUGINS */
252b5132 48
0125cdf2 49/* Somewhere above, sys/stat.h got included. */
252b5132
RH
50#if !defined(S_ISDIR) && defined(S_IFDIR)
51#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
52#endif
53
54#include <string.h>
55
56#ifdef HAVE_SBRK
502bdb00 57#if !HAVE_DECL_SBRK
1579bae1 58extern void *sbrk ();
252b5132
RH
59#endif
60#endif
61
9c8ebd6a
DJ
62#ifndef TARGET_SYSTEM_ROOT
63#define TARGET_SYSTEM_ROOT ""
64#endif
65
252b5132
RH
66/* EXPORTS */
67
53d25da6
AM
68FILE *saved_script_handle = NULL;
69FILE *previous_script_handle = NULL;
70bfd_boolean force_make_executable = FALSE;
71
252b5132
RH
72char *default_target;
73const char *output_filename = "a.out";
74
75/* Name this program was invoked by. */
76char *program_name;
77
9c8ebd6a 78/* The prefix for system library directories. */
e2243057 79const char *ld_sysroot;
9c8ebd6a 80
3fe38064
NC
81/* The canonical representation of ld_sysroot. */
82char * ld_canon_sysroot;
83int ld_canon_sysroot_len;
84
252b5132
RH
85/* Set by -G argument, for MIPS ECOFF target. */
86int g_switch_value = 8;
87
88/* Nonzero means print names of input files as processed. */
b34976b6 89bfd_boolean trace_files;
252b5132
RH
90
91/* Nonzero means same, but note open failures, too. */
b34976b6 92bfd_boolean trace_file_tries;
252b5132
RH
93
94/* Nonzero means version number was printed, so exit successfully
95 instead of complaining if no input files are given. */
b34976b6 96bfd_boolean version_printed;
252b5132
RH
97
98/* Nonzero means link in every member of an archive. */
b34976b6 99bfd_boolean whole_archive;
252b5132 100
ddbb8a31
NC
101/* True means only create DT_NEEDED entries for dynamic libraries
102 if they actually satisfy some reference in a regular object. */
103bfd_boolean add_DT_NEEDED_for_regular;
104
105/* True means create DT_NEEDED entries for dynamic libraries that
106 are DT_NEEDED by dynamic libraries specifically mentioned on
107 the command line. */
df856bcc 108bfd_boolean add_DT_NEEDED_for_dynamic = TRUE;
e56f61be 109
b34976b6
AM
110/* TRUE if we should demangle symbol names. */
111bfd_boolean demangling;
252b5132
RH
112
113args_type command_line;
114
115ld_config_type config;
116
bcaa7b3e
L
117sort_type sort_section;
118
e2243057
RS
119static const char *get_sysroot
120 (int, char **);
0125cdf2 121static char *get_emulation
1579bae1 122 (int, char **);
0125cdf2 123static bfd_boolean add_archive_element
5d3236ee 124 (struct bfd_link_info *, bfd *, const char *, bfd **);
0125cdf2 125static bfd_boolean multiple_definition
24f58f47 126 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 127 bfd *, asection *, bfd_vma);
0125cdf2 128static bfd_boolean multiple_common
24f58f47
AM
129 (struct bfd_link_info *, struct bfd_link_hash_entry *,
130 bfd *, enum bfd_link_hash_type, bfd_vma);
0125cdf2 131static bfd_boolean add_to_set
1579bae1
AM
132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
133 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
0125cdf2 134static bfd_boolean constructor_callback
1579bae1
AM
135 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
136 asection *, bfd_vma);
0125cdf2 137static bfd_boolean warning_callback
1579bae1
AM
138 (struct bfd_link_info *, const char *, const char *, bfd *,
139 asection *, bfd_vma);
0125cdf2 140static void warning_find_reloc
1579bae1 141 (bfd *, asection *, void *);
0125cdf2 142static bfd_boolean undefined_symbol
1579bae1
AM
143 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
144 bfd_boolean);
0125cdf2 145static bfd_boolean reloc_overflow
dfeffb9f
L
146 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
147 const char *, bfd_vma, bfd *, asection *, bfd_vma);
0125cdf2 148static bfd_boolean reloc_dangerous
1579bae1 149 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 150static bfd_boolean unattached_reloc
1579bae1 151 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 152static bfd_boolean notice
1579bae1 153 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2
NC
154
155static struct bfd_link_callbacks link_callbacks =
156{
252b5132
RH
157 add_archive_element,
158 multiple_definition,
159 multiple_common,
160 add_to_set,
161 constructor_callback,
162 warning_callback,
163 undefined_symbol,
164 reloc_overflow,
165 reloc_dangerous,
166 unattached_reloc,
e1fffbe6 167 notice,
2889e75b 168 einfo,
49fa1e15
AM
169 info_msg,
170 minfo,
2889e75b 171 ldlang_override_segment_assignment
252b5132
RH
172};
173
174struct bfd_link_info link_info;
175\f
176static void
498cd2a0 177ld_cleanup (void)
252b5132 178{
498cd2a0
AM
179 bfd_cache_close_all ();
180#ifdef ENABLE_PLUGINS
181 plugin_call_cleanup ();
182#endif
183 if (output_filename && delete_output_file_on_failure)
184 unlink_if_ordinary (output_filename);
252b5132
RH
185}
186
187int
1579bae1 188main (int argc, char **argv)
252b5132
RH
189{
190 char *emulation;
191 long start_time = get_run_time ();
192
193#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
194 setlocale (LC_MESSAGES, "");
3882b010
L
195#endif
196#if defined (HAVE_SETLOCALE)
197 setlocale (LC_CTYPE, "");
252b5132
RH
198#endif
199 bindtextdomain (PACKAGE, LOCALEDIR);
200 textdomain (PACKAGE);
201
202 program_name = argv[0];
203 xmalloc_set_program_name (program_name);
204
205 START_PROGRESS (program_name, 0);
206
869b9d07
MM
207 expandargv (&argc, &argv);
208
252b5132
RH
209 bfd_init ();
210
211 bfd_set_error_program_name (program_name);
212
498cd2a0 213 xatexit (ld_cleanup);
252b5132 214
e2243057
RS
215 /* Set up the sysroot directory. */
216 ld_sysroot = get_sysroot (argc, argv);
217 if (*ld_sysroot)
9c8ebd6a 218 {
e2243057 219 if (*TARGET_SYSTEM_ROOT == 0)
9c8ebd6a 220 {
70487fb2 221 einfo ("%P%F: this linker was not configured to use sysroots\n");
e2243057 222 ld_sysroot = "";
0125cdf2 223 }
e2243057
RS
224 else
225 ld_canon_sysroot = lrealpath (ld_sysroot);
0125cdf2 226 }
3fe38064
NC
227 if (ld_canon_sysroot)
228 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
229 else
230 ld_canon_sysroot_len = -1;
231
252b5132
RH
232 /* Set the default BFD target based on the configured target. Doing
233 this permits the linker to be configured for a particular target,
234 and linked against a shared BFD library which was configured for
235 a different target. The macro TARGET is defined by Makefile. */
236 if (! bfd_set_default_target (TARGET))
237 {
238 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
239 xexit (1);
240 }
241
b47c4208
AM
242#if YYDEBUG
243 {
244 extern int yydebug;
245 yydebug = 1;
246 }
247#endif
248
b34976b6 249 config.build_constructors = TRUE;
c76308d2 250 config.rpath_separator = ':';
a854a4a7
AM
251 config.split_by_reloc = (unsigned) -1;
252 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
253 config.make_executable = TRUE;
254 config.magic_demand_paged = TRUE;
255 config.text_read_only = TRUE;
256
b34976b6 257 command_line.warn_mismatch = TRUE;
fe7929ce 258 command_line.warn_search_mismatch = TRUE;
02b0b1aa 259 command_line.check_section_addresses = -1;
28d5f677 260 command_line.disable_target_specific_optimizations = -1;
bcaa7b3e 261
252b5132
RH
262 /* We initialize DEMANGLING based on the environment variable
263 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
264 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
265 environment. Acting the same way here lets us provide the same
266 interface by default. */
267 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
268
b34976b6 269 link_info.allow_undefined_version = TRUE;
b5067602 270 link_info.keep_memory = TRUE;
b5067602 271 link_info.combreloc = TRUE;
d5cd3933 272 link_info.strip_discarded = TRUE;
fdc90cb4 273 link_info.emit_hash = TRUE;
a9a4c53e
AM
274 link_info.callbacks = &link_callbacks;
275 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
276 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
277 and _fini symbols. We are compatible. */
278 link_info.init_function = "_init";
279 link_info.fini_function = "_fini";
a9a4c53e 280 link_info.relax_pass = 1;
e0076ab3 281 link_info.pei386_auto_import = -1;
db6751f2 282 link_info.spare_dynamic_tags = 5;
967928e9 283 link_info.path_separator = ':';
24718e3b 284
252b5132 285 ldfile_add_arch ("");
252b5132
RH
286 emulation = get_emulation (argc, argv);
287 ldemul_choose_mode (emulation);
742aeb63 288 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
289 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
290 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132
RH
291 lang_init ();
292 ldemul_before_parse ();
b34976b6 293 lang_has_input_file = FALSE;
252b5132
RH
294 parse_args (argc, argv);
295
2d643429
NC
296 if (config.hash_table_size != 0)
297 bfd_hash_set_default_size (config.hash_table_size);
298
252b5132
RH
299 ldemul_set_symbols ();
300
1049f94e 301 if (link_info.relocatable)
252b5132 302 {
02b0b1aa
NS
303 if (command_line.check_section_addresses < 0)
304 command_line.check_section_addresses = 0;
252b5132
RH
305 if (link_info.shared)
306 einfo (_("%P%F: -r and -shared may not be used together\n"));
307 }
308
d8cf8b51
L
309 /* We may have -Bsymbolic, -Bsymbolic-functions, --dynamic-list-data,
310 --dynamic-list-cpp-new, --dynamic-list-cpp-typeinfo and
311 --dynamic-list FILE. -Bsymbolic and -Bsymbolic-functions are
312 for shared libraries. -Bsymbolic overrides all others and vice
313 versa. */
314 switch (command_line.symbolic)
315 {
316 case symbolic_unset:
317 break;
318 case symbolic:
319 /* -Bsymbolic is for shared library only. */
320 if (link_info.shared)
321 {
322 link_info.symbolic = TRUE;
323 /* Should we free the unused memory? */
324 link_info.dynamic_list = NULL;
325 command_line.dynamic_list = dynamic_list_unset;
326 }
327 break;
328 case symbolic_functions:
329 /* -Bsymbolic-functions is for shared library only. */
330 if (link_info.shared)
331 command_line.dynamic_list = dynamic_list_data;
332 break;
333 }
334
335 switch (command_line.dynamic_list)
336 {
337 case dynamic_list_unset:
338 break;
339 case dynamic_list_data:
340 link_info.dynamic_data = TRUE;
341 case dynamic_list:
342 link_info.dynamic = TRUE;
343 break;
344 }
345
7333607e
JJ
346 if (! link_info.shared)
347 {
348 if (command_line.filter_shlib)
e97cb84f 349 einfo (_("%P%F: -F may not be used without -shared\n"));
7333607e 350 if (command_line.auxiliary_filters)
e97cb84f 351 einfo (_("%P%F: -f may not be used without -shared\n"));
7333607e
JJ
352 }
353
36af4a4e
JJ
354 if (! link_info.shared || link_info.pie)
355 link_info.executable = TRUE;
356
252b5132
RH
357 /* Treat ld -r -s as ld -r -S -x (i.e., strip all local symbols). I
358 don't see how else this can be handled, since in this case we
359 must preserve all externally visible symbols. */
1049f94e 360 if (link_info.relocatable && link_info.strip == strip_all)
252b5132
RH
361 {
362 link_info.strip = strip_debugger;
f5fa8ca2 363 if (link_info.discard == discard_sec_merge)
252b5132
RH
364 link_info.discard = discard_all;
365 }
366
14be8564
L
367 /* If we have not already opened and parsed a linker script,
368 try the default script from command line first. */
369 if (saved_script_handle == NULL
370 && command_line.default_script != NULL)
371 {
372 ldfile_open_command_file (command_line.default_script);
373 parser_input = input_script;
374 yyparse ();
375 }
376
b9a8de1e
NC
377 /* If we have not already opened and parsed a linker script
378 read the emulation's appropriate default script. */
b90e1c6f 379 if (saved_script_handle == NULL)
252b5132 380 {
252b5132 381 int isfile;
b7a26f91 382 char *s = ldemul_get_script (&isfile);
252b5132
RH
383
384 if (isfile)
7d24f02c 385 ldfile_open_default_command_file (s);
252b5132 386 else
b7a26f91 387 {
252b5132
RH
388 lex_string = s;
389 lex_redirect (s);
390 }
391 parser_input = input_script;
392 yyparse ();
393 lex_string = NULL;
394 }
395
b9a8de1e
NC
396 if (trace_file_tries)
397 {
9cb61eab
AM
398 if (saved_script_handle)
399 info_msg (_("using external linker script:"));
400 else
401 info_msg (_("using internal linker script:"));
402 info_msg ("\n==================================================\n");
b9a8de1e
NC
403
404 if (saved_script_handle)
405 {
74699268 406 static const int ld_bufsz = 8193;
b9a8de1e 407 size_t n;
1e9cc1c2 408 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
409
410 rewind (saved_script_handle);
74699268 411 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 412 {
b7a26f91 413 buf[n] = 0;
b9a8de1e
NC
414 info_msg (buf);
415 }
416 rewind (saved_script_handle);
417 free (buf);
418 }
419 else
420 {
421 int isfile;
422
b7a26f91 423 info_msg (ldemul_get_script (&isfile));
b9a8de1e 424 }
b7a26f91 425
b9a8de1e
NC
426 info_msg ("\n==================================================\n");
427 }
428
252b5132
RH
429 lang_final ();
430
b34976b6 431 if (!lang_has_input_file)
252b5132
RH
432 {
433 if (version_printed)
434 xexit (0);
435 einfo (_("%P%F: no input files\n"));
436 }
437
438 if (trace_files)
0125cdf2 439 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
440
441 ldemul_after_parse ();
442
252b5132
RH
443 if (config.map_filename)
444 {
445 if (strcmp (config.map_filename, "-") == 0)
446 {
447 config.map_file = stdout;
448 }
449 else
450 {
451 config.map_file = fopen (config.map_filename, FOPEN_WT);
452 if (config.map_file == (FILE *) NULL)
453 {
454 bfd_set_error (bfd_error_system_call);
455 einfo (_("%P%F: cannot open map file %s: %E\n"),
456 config.map_filename);
457 }
458 }
459 }
460
252b5132
RH
461 lang_process ();
462
463 /* Print error messages for any missing symbols, for any warning
6d5e62f8 464 symbols, and possibly multiple definitions. */
1049f94e 465 if (link_info.relocatable)
f13a99db 466 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 467 else
f13a99db 468 link_info.output_bfd->flags |= EXEC_P;
252b5132
RH
469
470 ldwrite ();
471
472 if (config.map_file != NULL)
473 lang_map ();
474 if (command_line.cref)
475 output_cref (config.map_file != NULL ? config.map_file : stdout);
476 if (nocrossref_list != NULL)
477 check_nocrossrefs ();
478
750877ba
L
479 lang_finish ();
480
1049f94e 481 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 482 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 483 want to ignore for relocatable output?) */
b34976b6 484 if (!config.make_executable && !force_make_executable)
252b5132 485 {
b34976b6 486 if (trace_files)
0125cdf2
NC
487 einfo (_("%P: link errors found, deleting executable `%s'\n"),
488 output_filename);
252b5132
RH
489
490 /* The file will be removed by remove_output. */
252b5132
RH
491 xexit (1);
492 }
493 else
494 {
f13a99db
AM
495 if (! bfd_close (link_info.output_bfd))
496 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
497
498 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
499 executable file and it doesn't end in .exe, copy it to one
500 which does. */
1049f94e 501 if (! link_info.relocatable && command_line.force_exe_suffix)
252b5132
RH
502 {
503 int len = strlen (output_filename);
0125cdf2 504
6d5e62f8 505 if (len < 4
252b5132
RH
506 || (strcasecmp (output_filename + len - 4, ".exe") != 0
507 && strcasecmp (output_filename + len - 4, ".dll") != 0))
508 {
509 FILE *src;
510 FILE *dst;
511 const int bsize = 4096;
1e9cc1c2 512 char *buf = (char *) xmalloc (bsize);
252b5132 513 int l;
1e9cc1c2 514 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 515
252b5132
RH
516 strcpy (dst_name, output_filename);
517 strcat (dst_name, ".exe");
518 src = fopen (output_filename, FOPEN_RB);
519 dst = fopen (dst_name, FOPEN_WB);
520
521 if (!src)
1579bae1
AM
522 einfo (_("%X%P: unable to open for source of copy `%s'\n"),
523 output_filename);
252b5132 524 if (!dst)
1579bae1
AM
525 einfo (_("%X%P: unable to open for destination of copy `%s'\n"),
526 dst_name);
252b5132
RH
527 while ((l = fread (buf, 1, bsize, src)) > 0)
528 {
529 int done = fwrite (buf, 1, l, dst);
0125cdf2 530
252b5132 531 if (done != l)
0125cdf2 532 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 533 }
0125cdf2 534
252b5132
RH
535 fclose (src);
536 if (fclose (dst) == EOF)
0125cdf2 537 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
538 free (dst_name);
539 free (buf);
540 }
541 }
542 }
543
544 END_PROGRESS (program_name);
545
546 if (config.stats)
547 {
548#ifdef HAVE_SBRK
1e9cc1c2 549 char *lim = (char *) sbrk (0);
252b5132
RH
550#endif
551 long run_time = get_run_time () - start_time;
552
e922bcab 553 fflush (stdout);
252b5132
RH
554 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
555 program_name, run_time / 1000000, run_time % 1000000);
556#ifdef HAVE_SBRK
557 fprintf (stderr, _("%s: data size %ld\n"), program_name,
558 (long) (lim - (char *) &environ));
559#endif
e922bcab 560 fflush (stderr);
252b5132
RH
561 }
562
563 /* Prevent remove_output from doing anything, after a successful link. */
564 output_filename = NULL;
565
566 xexit (0);
567 return 0;
568}
569
e2243057
RS
570/* If the configured sysroot is relocatable, try relocating it based on
571 default prefix FROM. Return the relocated directory if it exists,
572 otherwise return null. */
573
574static char *
575get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
576{
577#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
578 char *path;
579 struct stat s;
580
581 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
582 if (path)
583 {
584 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
585 return path;
586 free (path);
587 }
588#endif
589 return 0;
590}
591
592/* Return the sysroot directory. Return "" if no sysroot is being used. */
593
594static const char *
595get_sysroot (int argc, char **argv)
596{
597 int i;
598 const char *path;
599
600 for (i = 1; i < argc; i++)
0112cd26 601 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
602 return argv[i] + strlen ("--sysroot=");
603
604 path = get_relative_sysroot (BINDIR);
605 if (path)
606 return path;
607
608 path = get_relative_sysroot (TOOLBINDIR);
609 if (path)
610 return path;
611
612 return TARGET_SYSTEM_ROOT;
613}
614
252b5132
RH
615/* We need to find any explicitly given emulation in order to initialize the
616 state that's needed by the lex&yacc argument parser (parse_args). */
617
618static char *
1579bae1 619get_emulation (int argc, char **argv)
252b5132
RH
620{
621 char *emulation;
622 int i;
623
624 emulation = getenv (EMULATION_ENVIRON);
625 if (emulation == NULL)
626 emulation = DEFAULT_EMULATION;
627
628 for (i = 1; i < argc; i++)
629 {
0112cd26 630 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
631 {
632 if (argv[i][2] == '\0')
633 {
634 /* -m EMUL */
635 if (i < argc - 1)
636 {
637 emulation = argv[i + 1];
638 i++;
639 }
640 else
0125cdf2 641 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
642 }
643 else if (strcmp (argv[i], "-mips1") == 0
644 || strcmp (argv[i], "-mips2") == 0
645 || strcmp (argv[i], "-mips3") == 0
d1cf510e 646 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
647 || strcmp (argv[i], "-mips5") == 0
648 || strcmp (argv[i], "-mips32") == 0
649 || strcmp (argv[i], "-mips32r2") == 0
5f74bc13
CD
650 || strcmp (argv[i], "-mips64") == 0
651 || strcmp (argv[i], "-mips64r2") == 0)
252b5132 652 {
31d677f9 653 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
654 passed to the linker by some MIPS compilers. They
655 generally tell the linker to use a slightly different
656 library path. Perhaps someday these should be
657 implemented as emulations; until then, we just ignore
658 the arguments and hope that nobody ever creates
659 emulations named ips1, ips2 or ips3. */
660 }
661 else if (strcmp (argv[i], "-m486") == 0)
662 {
663 /* FIXME: The argument -m486 is passed to the linker on
664 some Linux systems. Hope that nobody creates an
665 emulation named 486. */
666 }
667 else
668 {
669 /* -mEMUL */
670 emulation = &argv[i][2];
671 }
672 }
673 }
674
675 return emulation;
676}
677
252b5132 678void
1579bae1 679add_ysym (const char *name)
252b5132 680{
1579bae1 681 if (link_info.notice_hash == NULL)
252b5132 682 {
1e9cc1c2
NC
683 link_info.notice_hash =
684 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
685 if (!bfd_hash_table_init_n (link_info.notice_hash,
686 bfd_hash_newfunc,
687 sizeof (struct bfd_hash_entry),
688 61))
252b5132 689 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 690 }
252b5132 691
1579bae1 692 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
693 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
694}
695
696/* Record a symbol to be wrapped, from the --wrap option. */
697
698void
1579bae1 699add_wrap (const char *name)
252b5132
RH
700{
701 if (link_info.wrap_hash == NULL)
702 {
1e9cc1c2
NC
703 link_info.wrap_hash =
704 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
705 if (!bfd_hash_table_init_n (link_info.wrap_hash,
706 bfd_hash_newfunc,
707 sizeof (struct bfd_hash_entry),
708 61))
252b5132
RH
709 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
710 }
0125cdf2 711
b34976b6 712 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
713 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
714}
715
716/* Handle the -retain-symbols-file option. */
717
718void
1579bae1 719add_keepsyms_file (const char *filename)
252b5132
RH
720{
721 FILE *file;
722 char *buf;
723 size_t bufsize;
724 int c;
725
726 if (link_info.strip == strip_some)
727 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
728
729 file = fopen (filename, "r");
1579bae1 730 if (file == NULL)
252b5132
RH
731 {
732 bfd_set_error (bfd_error_system_call);
733 einfo ("%X%P: %s: %E\n", filename);
734 return;
735 }
736
1e9cc1c2
NC
737 link_info.keep_hash = (struct bfd_hash_table *)
738 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
739 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
740 sizeof (struct bfd_hash_entry)))
252b5132
RH
741 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
742
743 bufsize = 100;
1e9cc1c2 744 buf = (char *) xmalloc (bufsize);
252b5132
RH
745
746 c = getc (file);
747 while (c != EOF)
748 {
3882b010 749 while (ISSPACE (c))
252b5132
RH
750 c = getc (file);
751
752 if (c != EOF)
753 {
754 size_t len = 0;
755
3882b010 756 while (! ISSPACE (c) && c != EOF)
252b5132
RH
757 {
758 buf[len] = c;
759 ++len;
760 if (len >= bufsize)
761 {
762 bufsize *= 2;
1e9cc1c2 763 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
764 }
765 c = getc (file);
766 }
767
768 buf[len] = '\0';
769
1579bae1 770 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
771 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
772 }
773 }
774
775 if (link_info.strip != strip_none)
776 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
777
5ed6aba4 778 free (buf);
252b5132
RH
779 link_info.strip = strip_some;
780}
781\f
782/* Callbacks from the BFD linker routines. */
783
784/* This is called when BFD has decided to include an archive member in
785 a link. */
786
b34976b6 787static bfd_boolean
e1fffbe6 788add_archive_element (struct bfd_link_info *info,
1579bae1 789 bfd *abfd,
5d3236ee
DK
790 const char *name,
791 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
792{
793 lang_input_statement_type *input;
5d3236ee 794 lang_input_statement_type orig_input;
252b5132 795
1e9cc1c2
NC
796 input = (lang_input_statement_type *)
797 xcalloc (1, sizeof (lang_input_statement_type));
252b5132
RH
798 input->filename = abfd->filename;
799 input->local_sym_name = abfd->filename;
800 input->the_bfd = abfd;
252b5132 801
5d3236ee
DK
802 /* Save the original data for trace files/tries below, as plugins
803 (if enabled) may possibly alter it to point to a replacement
804 BFD, but we still want to output the original BFD filename. */
805 orig_input = *input;
806#ifdef ENABLE_PLUGINS
9e2278f5
AM
807 if (bfd_my_archive (abfd) != NULL
808 && plugin_active_plugins_p ()
809 && !no_more_claiming)
5d3236ee
DK
810 {
811 /* We must offer this archive member to the plugins to claim. */
812 int fd = open (bfd_my_archive (abfd)->filename, O_RDONLY | O_BINARY);
813 if (fd >= 0)
814 {
815 struct ld_plugin_input_file file;
816 int claimed = 0;
817 /* Offset and filesize must refer to the individual archive
818 member, not the whole file, and must exclude the header.
819 Fortunately for us, that is how the data is stored in the
820 origin field of the bfd and in the arelt_data. */
821 file.name = bfd_my_archive (abfd)->filename;
822 file.offset = abfd->origin;
823 file.filesize = arelt_size (abfd);
824 file.fd = fd;
825 /* We create a dummy BFD, initially empty, to house
826 whatever symbols the plugin may want to add. */
827 file.handle = plugin_get_ir_dummy_bfd (abfd->filename, abfd);
828 if (plugin_call_claim_file (&file, &claimed))
829 einfo (_("%P%F: %s: plugin reported error claiming file\n"),
f84854b6 830 plugin_error_plugin ());
d44ad554
DK
831 /* fd belongs to us, not the plugin; but we don't need it. */
832 close (fd);
5d3236ee
DK
833 if (claimed)
834 {
835 /* Substitute the dummy BFD. */
836 input->the_bfd = file.handle;
837 input->claimed = TRUE;
8543fde5 838 input->claim_archive = TRUE;
5d3236ee
DK
839 bfd_make_readable (input->the_bfd);
840 *subsbfd = input->the_bfd;
841 }
842 else
843 {
844 /* Abandon the dummy BFD. */
845 bfd_close_all_done (file.handle);
5d3236ee
DK
846 input->claimed = FALSE;
847 }
848 }
849 }
850#endif /* ENABLE_PLUGINS */
851
252b5132
RH
852 ldlang_add_file (input);
853
1579bae1 854 if (config.map_file != NULL)
252b5132 855 {
b34976b6 856 static bfd_boolean header_printed;
252b5132
RH
857 struct bfd_link_hash_entry *h;
858 bfd *from;
859 int len;
860
e1fffbe6 861 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
862
863 if (h == NULL)
864 from = NULL;
865 else
866 {
867 switch (h->type)
868 {
869 default:
870 from = NULL;
871 break;
872
873 case bfd_link_hash_defined:
874 case bfd_link_hash_defweak:
875 from = h->u.def.section->owner;
876 break;
877
878 case bfd_link_hash_undefined:
879 case bfd_link_hash_undefweak:
880 from = h->u.undef.abfd;
881 break;
882
883 case bfd_link_hash_common:
884 from = h->u.c.p->section->owner;
885 break;
886 }
887 }
888
889 if (! header_printed)
890 {
891 char buf[100];
892
e3c8793a 893 sprintf (buf, _("Archive member included because of file (symbol)\n\n"));
252b5132 894 minfo ("%s", buf);
b34976b6 895 header_printed = TRUE;
252b5132
RH
896 }
897
898 if (bfd_my_archive (abfd) == NULL)
899 {
900 minfo ("%s", bfd_get_filename (abfd));
901 len = strlen (bfd_get_filename (abfd));
902 }
903 else
904 {
905 minfo ("%s(%s)", bfd_get_filename (bfd_my_archive (abfd)),
906 bfd_get_filename (abfd));
907 len = (strlen (bfd_get_filename (bfd_my_archive (abfd)))
908 + strlen (bfd_get_filename (abfd))
909 + 2);
910 }
911
912 if (len >= 29)
913 {
914 print_nl ();
915 len = 0;
916 }
917 while (len < 30)
918 {
919 print_space ();
920 ++len;
921 }
922
923 if (from != NULL)
924 minfo ("%B ", from);
925 if (h != NULL)
926 minfo ("(%T)\n", h->root.string);
927 else
928 minfo ("(%s)\n", name);
929 }
930
931 if (trace_files || trace_file_tries)
5d3236ee 932 info_msg ("%I\n", &orig_input);
b34976b6 933 return TRUE;
252b5132
RH
934}
935
936/* This is called when BFD has discovered a symbol which is defined
937 multiple times. */
938
b34976b6 939static bfd_boolean
24f58f47
AM
940multiple_definition (struct bfd_link_info *info,
941 struct bfd_link_hash_entry *h,
1579bae1
AM
942 bfd *nbfd,
943 asection *nsec,
944 bfd_vma nval)
252b5132 945{
24f58f47
AM
946 const char *name;
947 bfd *obfd;
948 asection *osec;
949 bfd_vma oval;
950
951 if (info->allow_multiple_definition)
952 return TRUE;
953
954 switch (h->type)
955 {
956 case bfd_link_hash_defined:
957 osec = h->u.def.section;
958 oval = h->u.def.value;
959 obfd = h->u.def.section->owner;
960 break;
961 case bfd_link_hash_indirect:
962 osec = bfd_ind_section_ptr;
963 oval = 0;
964 obfd = NULL;
965 break;
966 default:
967 abort ();
968 }
969
970 /* Ignore a redefinition of an absolute symbol to the
971 same value; it's harmless. */
972 if (h->type == bfd_link_hash_defined
973 && bfd_is_abs_section (osec)
974 && bfd_is_abs_section (nsec)
975 && nval == oval)
976 return TRUE;
977
252b5132
RH
978 /* If either section has the output_section field set to
979 bfd_abs_section_ptr, it means that the section is being
980 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
981 FIXME: It would be cleaner to somehow ignore symbols defined in
982 sections which are being discarded. */
252b5132
RH
983 if ((osec->output_section != NULL
984 && ! bfd_is_abs_section (osec)
985 && bfd_is_abs_section (osec->output_section))
986 || (nsec->output_section != NULL
987 && ! bfd_is_abs_section (nsec)
988 && bfd_is_abs_section (nsec->output_section)))
b34976b6 989 return TRUE;
252b5132 990
24f58f47
AM
991 name = h->root.string;
992 if (nbfd == NULL)
993 {
994 nbfd = obfd;
995 nsec = osec;
996 nval = oval;
997 obfd = NULL;
998 }
252b5132
RH
999 einfo (_("%X%C: multiple definition of `%T'\n"),
1000 nbfd, nsec, nval, name);
1579bae1 1001 if (obfd != NULL)
252b5132 1002 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 1003
28d5f677 1004 if (RELAXATION_ENABLED)
9b14b192
NC
1005 {
1006 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
28d5f677 1007 command_line.disable_target_specific_optimizations = -1;
9b14b192 1008 }
6d5e62f8 1009
b34976b6 1010 return TRUE;
252b5132
RH
1011}
1012
1013/* This is called when there is a definition of a common symbol, or
1014 when a common symbol is found for a symbol that is already defined,
1015 or when two common symbols are found. We only do something if
1016 -warn-common was used. */
1017
b34976b6 1018static bfd_boolean
1579bae1 1019multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 1020 struct bfd_link_hash_entry *h,
1579bae1
AM
1021 bfd *nbfd,
1022 enum bfd_link_hash_type ntype,
1023 bfd_vma nsize)
252b5132 1024{
24f58f47
AM
1025 const char *name;
1026 bfd *obfd;
1027 enum bfd_link_hash_type otype;
1028 bfd_vma osize;
1029
1030 if (!config.warn_common)
b34976b6 1031 return TRUE;
252b5132 1032
24f58f47
AM
1033 name = h->root.string;
1034 otype = h->type;
1035 if (otype == bfd_link_hash_common)
1036 {
1037 obfd = h->u.c.p->section->owner;
1038 osize = h->u.c.size;
1039 }
1040 else if (otype == bfd_link_hash_defined
1041 || otype == bfd_link_hash_defweak)
1042 {
1043 obfd = h->u.def.section->owner;
1044 osize = 0;
1045 }
1046 else
1047 {
1048 /* FIXME: It would nice if we could report the BFD which defined
1049 an indirect symbol, but we don't have anywhere to store the
1050 information. */
1051 obfd = NULL;
1052 osize = 0;
1053 }
1054
252b5132
RH
1055 if (ntype == bfd_link_hash_defined
1056 || ntype == bfd_link_hash_defweak
1057 || ntype == bfd_link_hash_indirect)
1058 {
1059 ASSERT (otype == bfd_link_hash_common);
1060 einfo (_("%B: warning: definition of `%T' overriding common\n"),
1061 nbfd, name);
1062 if (obfd != NULL)
1063 einfo (_("%B: warning: common is here\n"), obfd);
1064 }
1065 else if (otype == bfd_link_hash_defined
1066 || otype == bfd_link_hash_defweak
1067 || otype == bfd_link_hash_indirect)
1068 {
1069 ASSERT (ntype == bfd_link_hash_common);
1070 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1071 nbfd, name);
1072 if (obfd != NULL)
1073 einfo (_("%B: warning: defined here\n"), obfd);
1074 }
1075 else
1076 {
1077 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1078 if (osize > nsize)
1079 {
1080 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1081 nbfd, name);
1082 if (obfd != NULL)
1083 einfo (_("%B: warning: larger common is here\n"), obfd);
1084 }
1085 else if (nsize > osize)
1086 {
1087 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1088 nbfd, name);
1089 if (obfd != NULL)
1090 einfo (_("%B: warning: smaller common is here\n"), obfd);
1091 }
1092 else
1093 {
1094 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1095 if (obfd != NULL)
1096 einfo (_("%B: warning: previous common is here\n"), obfd);
1097 }
1098 }
1099
b34976b6 1100 return TRUE;
252b5132
RH
1101}
1102
1103/* This is called when BFD has discovered a set element. H is the
1104 entry in the linker hash table for the set. SECTION and VALUE
1105 represent a value which should be added to the set. */
1106
b34976b6 1107static bfd_boolean
1579bae1
AM
1108add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1109 struct bfd_link_hash_entry *h,
1110 bfd_reloc_code_real_type reloc,
1111 bfd *abfd,
1112 asection *section,
1113 bfd_vma value)
252b5132
RH
1114{
1115 if (config.warn_constructors)
1116 einfo (_("%P: warning: global constructor %s used\n"),
1117 h->root.string);
1118
1119 if (! config.build_constructors)
b34976b6 1120 return TRUE;
252b5132 1121
1579bae1 1122 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1123
1124 if (h->type == bfd_link_hash_new)
1125 {
1126 h->type = bfd_link_hash_undefined;
1127 h->u.undef.abfd = abfd;
1128 /* We don't call bfd_link_add_undef to add this to the list of
1129 undefined symbols because we are going to define it
1130 ourselves. */
1131 }
1132
b34976b6 1133 return TRUE;
252b5132
RH
1134}
1135
1136/* This is called when BFD has discovered a constructor. This is only
1137 called for some object file formats--those which do not handle
1138 constructors in some more clever fashion. This is similar to
1139 adding an element to a set, but less general. */
1140
b34976b6 1141static bfd_boolean
1579bae1
AM
1142constructor_callback (struct bfd_link_info *info,
1143 bfd_boolean constructor,
1144 const char *name,
1145 bfd *abfd,
1146 asection *section,
1147 bfd_vma value)
252b5132
RH
1148{
1149 char *s;
1150 struct bfd_link_hash_entry *h;
1151 char set_name[1 + sizeof "__CTOR_LIST__"];
1152
1153 if (config.warn_constructors)
1154 einfo (_("%P: warning: global constructor %s used\n"), name);
1155
1156 if (! config.build_constructors)
b34976b6 1157 return TRUE;
252b5132
RH
1158
1159 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1160 useful error message. */
f13a99db 1161 if (bfd_reloc_type_lookup (link_info.output_bfd, BFD_RELOC_CTOR) == NULL
e1fffbe6 1162 && (info->relocatable
252b5132
RH
1163 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1164 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1165
1166 s = set_name;
1167 if (bfd_get_symbol_leading_char (abfd) != '\0')
1168 *s++ = bfd_get_symbol_leading_char (abfd);
1169 if (constructor)
1170 strcpy (s, "__CTOR_LIST__");
1171 else
1172 strcpy (s, "__DTOR_LIST__");
1173
b34976b6 1174 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1175 if (h == (struct bfd_link_hash_entry *) NULL)
1176 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1177 if (h->type == bfd_link_hash_new)
1178 {
1179 h->type = bfd_link_hash_undefined;
1180 h->u.undef.abfd = abfd;
1181 /* We don't call bfd_link_add_undef to add this to the list of
1182 undefined symbols because we are going to define it
1183 ourselves. */
1184 }
1185
1186 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
b34976b6 1187 return TRUE;
252b5132
RH
1188}
1189
1190/* A structure used by warning_callback to pass information through
1191 bfd_map_over_sections. */
1192
0125cdf2
NC
1193struct warning_callback_info
1194{
b34976b6 1195 bfd_boolean found;
252b5132
RH
1196 const char *warning;
1197 const char *symbol;
1198 asymbol **asymbols;
1199};
1200
1201/* This is called when there is a reference to a warning symbol. */
1202
b34976b6 1203static bfd_boolean
1579bae1
AM
1204warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1205 const char *warning,
1206 const char *symbol,
1207 bfd *abfd,
1208 asection *section,
1209 bfd_vma address)
252b5132
RH
1210{
1211 /* This is a hack to support warn_multiple_gp. FIXME: This should
1212 have a cleaner interface, but what? */
1213 if (! config.warn_multiple_gp
1214 && strcmp (warning, "using multiple gp values") == 0)
b34976b6 1215 return TRUE;
252b5132
RH
1216
1217 if (section != NULL)
300475fe 1218 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1219 else if (abfd == NULL)
300475fe 1220 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1221 else if (symbol == NULL)
300475fe 1222 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1223 else
1224 {
91d6fa6a 1225 struct warning_callback_info cinfo;
252b5132
RH
1226
1227 /* Look through the relocs to see if we can find a plausible
1228 address. */
5c1d2f5f
AM
1229
1230 if (!bfd_generic_link_read_symbols (abfd))
1231 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
252b5132 1232
91d6fa6a
NC
1233 cinfo.found = FALSE;
1234 cinfo.warning = warning;
1235 cinfo.symbol = symbol;
1236 cinfo.asymbols = bfd_get_outsymbols (abfd);
1237 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
252b5132 1238
91d6fa6a 1239 if (! cinfo.found)
300475fe 1240 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1241 }
1242
b34976b6 1243 return TRUE;
252b5132
RH
1244}
1245
1246/* This is called by warning_callback for each section. It checks the
1247 relocs of the section to see if it can find a reference to the
1248 symbol which triggered the warning. If it can, it uses the reloc
1249 to give an error message with a file and line number. */
1250
1251static void
1579bae1 1252warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1253{
1e9cc1c2 1254 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1255 long relsize;
1256 arelent **relpp;
1257 long relcount;
1258 arelent **p, **pend;
1259
1260 if (info->found)
1261 return;
1262
1263 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1264 if (relsize < 0)
1265 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1266 if (relsize == 0)
1267 return;
1268
1e9cc1c2 1269 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1270 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1271 if (relcount < 0)
1272 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1273
1274 p = relpp;
1275 pend = p + relcount;
1276 for (; p < pend && *p != NULL; p++)
1277 {
1278 arelent *q = *p;
1279
1280 if (q->sym_ptr_ptr != NULL
1281 && *q->sym_ptr_ptr != NULL
1282 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1283 {
1284 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1285 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1286 info->warning);
b34976b6 1287 info->found = TRUE;
252b5132
RH
1288 break;
1289 }
1290 }
1291
1292 free (relpp);
1293}
1294
1295/* This is called when an undefined symbol is found. */
1296
b34976b6 1297static bfd_boolean
1579bae1
AM
1298undefined_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1299 const char *name,
1300 bfd *abfd,
1301 asection *section,
1302 bfd_vma address,
0b28295d 1303 bfd_boolean error)
252b5132
RH
1304{
1305 static char *error_name;
1306 static unsigned int error_count;
1307
1308#define MAX_ERRORS_IN_A_ROW 5
1309
1310 if (config.warn_once)
1311 {
1312 static struct bfd_hash_table *hash;
1313
1314 /* Only warn once about a particular undefined symbol. */
252b5132
RH
1315 if (hash == NULL)
1316 {
1e9cc1c2
NC
1317 hash = (struct bfd_hash_table *)
1318 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
1319 if (!bfd_hash_table_init (hash, bfd_hash_newfunc,
1320 sizeof (struct bfd_hash_entry)))
252b5132
RH
1321 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
1322 }
1323
b34976b6
AM
1324 if (bfd_hash_lookup (hash, name, FALSE, FALSE) != NULL)
1325 return TRUE;
252b5132 1326
b34976b6 1327 if (bfd_hash_lookup (hash, name, TRUE, TRUE) == NULL)
252b5132
RH
1328 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
1329 }
1330
1331 /* We never print more than a reasonable number of errors in a row
1332 for a single symbol. */
1579bae1 1333 if (error_name != NULL
252b5132
RH
1334 && strcmp (name, error_name) == 0)
1335 ++error_count;
1336 else
1337 {
1338 error_count = 0;
1579bae1 1339 if (error_name != NULL)
252b5132 1340 free (error_name);
d1b2b2dc 1341 error_name = xstrdup (name);
252b5132
RH
1342 }
1343
1344 if (section != NULL)
1345 {
1346 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1347 {
0b28295d
ILT
1348 if (error)
1349 einfo (_("%X%C: undefined reference to `%T'\n"),
1350 abfd, section, address, name);
1351 else
1352 einfo (_("%C: warning: undefined reference to `%T'\n"),
1353 abfd, section, address, name);
b6f29aaa 1354 }
252b5132 1355 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1356 {
1357 if (error)
1358 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1359 abfd, section, address, name);
1360 else
1361 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1362 abfd, section, address, name);
1363 }
1364 else if (error)
1365 einfo ("%X");
252b5132
RH
1366 }
1367 else
1368 {
1369 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1370 {
0b28295d
ILT
1371 if (error)
1372 einfo (_("%X%B: undefined reference to `%T'\n"),
1373 abfd, name);
1374 else
1375 einfo (_("%B: warning: undefined reference to `%T'\n"),
1376 abfd, name);
b6f29aaa 1377 }
252b5132 1378 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1379 {
1380 if (error)
1381 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1382 abfd, name);
1383 else
1384 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1385 abfd, name);
1386 }
1387 else if (error)
1388 einfo ("%X");
252b5132
RH
1389 }
1390
b34976b6 1391 return TRUE;
252b5132
RH
1392}
1393
8aae64e6
AO
1394/* Counter to limit the number of relocation overflow error messages
1395 to print. Errors are printed as it is decremented. When it's
1396 called and the counter is zero, a final message is printed
1397 indicating more relocations were omitted. When it gets to -1, no
1398 such errors are printed. If it's initially set to a value less
1399 than -1, all such errors will be printed (--verbose does this). */
1400
1401int overflow_cutoff_limit = 10;
1402
252b5132
RH
1403/* This is called when a reloc overflows. */
1404
b34976b6 1405static bfd_boolean
1579bae1 1406reloc_overflow (struct bfd_link_info *info ATTRIBUTE_UNUSED,
dfeffb9f 1407 struct bfd_link_hash_entry *entry,
1579bae1
AM
1408 const char *name,
1409 const char *reloc_name,
1410 bfd_vma addend,
1411 bfd *abfd,
1412 asection *section,
1413 bfd_vma address)
252b5132 1414{
8aae64e6
AO
1415 if (overflow_cutoff_limit == -1)
1416 return TRUE;
1417
e1fffbe6 1418 einfo ("%X%C:", abfd, section, address);
8aae64e6
AO
1419
1420 if (overflow_cutoff_limit >= 0
1421 && overflow_cutoff_limit-- == 0)
1422 {
1423 einfo (_(" additional relocation overflows omitted from the output\n"));
1424 return TRUE;
1425 }
1426
dfeffb9f
L
1427 if (entry)
1428 {
1429 while (entry->type == bfd_link_hash_indirect
1430 || entry->type == bfd_link_hash_warning)
1431 entry = entry->u.i.link;
1432 switch (entry->type)
1433 {
1434 case bfd_link_hash_undefined:
1435 case bfd_link_hash_undefweak:
1436 einfo (_(" relocation truncated to fit: %s against undefined symbol `%T'"),
1437 reloc_name, entry->root.string);
1438 break;
1439 case bfd_link_hash_defined:
1440 case bfd_link_hash_defweak:
1441 einfo (_(" relocation truncated to fit: %s against symbol `%T' defined in %A section in %B"),
1442 reloc_name, entry->root.string,
a6e1b90f
L
1443 entry->u.def.section,
1444 entry->u.def.section == bfd_abs_section_ptr
f13a99db 1445 ? link_info.output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1446 break;
1447 default:
1448 abort ();
1449 break;
1450 }
1451 }
1452 else
1453 einfo (_(" relocation truncated to fit: %s against `%T'"),
1454 reloc_name, name);
252b5132
RH
1455 if (addend != 0)
1456 einfo ("+%v", addend);
1457 einfo ("\n");
b34976b6 1458 return TRUE;
252b5132
RH
1459}
1460
1461/* This is called when a dangerous relocation is made. */
1462
b34976b6 1463static bfd_boolean
1579bae1
AM
1464reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1465 const char *message,
1466 bfd *abfd,
1467 asection *section,
1468 bfd_vma address)
252b5132 1469{
e1fffbe6
AM
1470 einfo (_("%X%C: dangerous relocation: %s\n"),
1471 abfd, section, address, message);
b34976b6 1472 return TRUE;
252b5132
RH
1473}
1474
1475/* This is called when a reloc is being generated attached to a symbol
1476 that is not being output. */
1477
b34976b6 1478static bfd_boolean
1579bae1
AM
1479unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1480 const char *name,
1481 bfd *abfd,
1482 asection *section,
1483 bfd_vma address)
252b5132 1484{
e1fffbe6
AM
1485 einfo (_("%X%C: reloc refers to symbol `%T' which is not being output\n"),
1486 abfd, section, address, name);
b34976b6 1487 return TRUE;
252b5132
RH
1488}
1489
1490/* This is called if link_info.notice_all is set, or when a symbol in
1491 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1492 using the -y option, while notice_all is set if the --cref option
1493 has been supplied, or if there are any NOCROSSREFS sections in the
1494 linker script; and if plugins are active, since they need to monitor
1495 all references from non-IR files. */
252b5132 1496
b34976b6 1497static bfd_boolean
1579bae1
AM
1498notice (struct bfd_link_info *info,
1499 const char *name,
1500 bfd *abfd,
1501 asection *section,
1502 bfd_vma value)
252b5132 1503{
5061a885
AM
1504 if (name == NULL)
1505 {
1506 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1507 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1508 return TRUE;
1509 }
1510
5d3236ee 1511 if (info->notice_hash != NULL
9e2278f5 1512 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1513 {
1514 if (bfd_is_und_section (section))
1515 einfo ("%B: reference to %s\n", abfd, name);
1516 else
1517 einfo ("%B: definition of %s\n", abfd, name);
1518 }
1519
1520 if (command_line.cref || nocrossref_list != NULL)
1521 add_cref (name, abfd, section, value);
1522
b34976b6 1523 return TRUE;
252b5132 1524}
This page took 0.550259 seconds and 4 git commands to generate.