Update year range in copyright notice of binutils files
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
82704155 2 Copyright (C) 1991-2019 Free Software Foundation, Inc.
252b5132
RH
3 Written by Steve Chamberlain steve@cygnus.com
4
f96b4a7b 5 This file is part of the GNU Binutils.
252b5132 6
f96b4a7b 7 This program is free software; you can redistribute it and/or modify
2fa9fc65 8 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
252b5132 11
f96b4a7b 12 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
2fa9fc65 17 You should have received a copy of the GNU General Public License
f96b4a7b
NC
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
3882b010 24#include "safe-ctype.h"
252b5132
RH
25#include "libiberty.h"
26#include "progress.h"
27#include "bfdlink.h"
5af11cab 28#include "filenames.h"
252b5132
RH
29
30#include "ld.h"
31#include "ldmain.h"
32#include "ldmisc.h"
33#include "ldwrite.h"
252b5132
RH
34#include "ldexp.h"
35#include "ldlang.h"
df2a7313 36#include <ldgram.h>
252b5132
RH
37#include "ldlex.h"
38#include "ldfile.h"
b71e2778 39#include "ldemul.h"
252b5132 40#include "ldctor.h"
5d3236ee
DK
41#ifdef ENABLE_PLUGINS
42#include "plugin.h"
43#include "plugin-api.h"
5d3236ee 44#endif /* ENABLE_PLUGINS */
252b5132 45
0125cdf2 46/* Somewhere above, sys/stat.h got included. */
252b5132
RH
47#if !defined(S_ISDIR) && defined(S_IFDIR)
48#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
49#endif
50
51#include <string.h>
52
9c8ebd6a
DJ
53#ifndef TARGET_SYSTEM_ROOT
54#define TARGET_SYSTEM_ROOT ""
55#endif
56
252b5132
RH
57/* EXPORTS */
58
53d25da6
AM
59FILE *saved_script_handle = NULL;
60FILE *previous_script_handle = NULL;
61bfd_boolean force_make_executable = FALSE;
62
252b5132
RH
63char *default_target;
64const char *output_filename = "a.out";
65
66/* Name this program was invoked by. */
67char *program_name;
68
9c8ebd6a 69/* The prefix for system library directories. */
e2243057 70const char *ld_sysroot;
9c8ebd6a 71
3fe38064 72/* The canonical representation of ld_sysroot. */
0aa7f586 73char *ld_canon_sysroot;
3fe38064
NC
74int ld_canon_sysroot_len;
75
e8044f35 76/* Set by -G argument, for targets like MIPS ELF. */
252b5132
RH
77int g_switch_value = 8;
78
79/* Nonzero means print names of input files as processed. */
727a29ba 80unsigned int trace_files;
252b5132 81
cd6f1cf3
NC
82/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
83bfd_boolean verbose;
252b5132
RH
84
85/* Nonzero means version number was printed, so exit successfully
86 instead of complaining if no input files are given. */
b34976b6 87bfd_boolean version_printed;
252b5132 88
b34976b6
AM
89/* TRUE if we should demangle symbol names. */
90bfd_boolean demangling;
252b5132
RH
91
92args_type command_line;
93
94ld_config_type config;
95
bcaa7b3e
L
96sort_type sort_section;
97
e2243057
RS
98static const char *get_sysroot
99 (int, char **);
0125cdf2 100static char *get_emulation
1579bae1 101 (int, char **);
0125cdf2 102static bfd_boolean add_archive_element
5d3236ee 103 (struct bfd_link_info *, bfd *, const char *, bfd **);
1a72702b 104static void multiple_definition
24f58f47 105 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 106 bfd *, asection *, bfd_vma);
1a72702b 107static void multiple_common
24f58f47
AM
108 (struct bfd_link_info *, struct bfd_link_hash_entry *,
109 bfd *, enum bfd_link_hash_type, bfd_vma);
1a72702b 110static void add_to_set
1579bae1
AM
111 (struct bfd_link_info *, struct bfd_link_hash_entry *,
112 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
1a72702b 113static void constructor_callback
1579bae1
AM
114 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
115 asection *, bfd_vma);
1a72702b 116static void warning_callback
1579bae1
AM
117 (struct bfd_link_info *, const char *, const char *, bfd *,
118 asection *, bfd_vma);
0125cdf2 119static void warning_find_reloc
1579bae1 120 (bfd *, asection *, void *);
1a72702b 121static void undefined_symbol
1579bae1
AM
122 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
123 bfd_boolean);
1a72702b 124static void reloc_overflow
dfeffb9f
L
125 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
126 const char *, bfd_vma, bfd *, asection *, bfd_vma);
1a72702b 127static void reloc_dangerous
1579bae1 128 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
1a72702b 129static void unattached_reloc
1579bae1 130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 131static bfd_boolean notice
35ed3f94 132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
46135103 133 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
0125cdf2
NC
134
135static struct bfd_link_callbacks link_callbacks =
136{
252b5132
RH
137 add_archive_element,
138 multiple_definition,
139 multiple_common,
140 add_to_set,
141 constructor_callback,
142 warning_callback,
143 undefined_symbol,
144 reloc_overflow,
145 reloc_dangerous,
146 unattached_reloc,
e1fffbe6 147 notice,
2889e75b 148 einfo,
49fa1e15
AM
149 info_msg,
150 minfo,
2889e75b 151 ldlang_override_segment_assignment
252b5132
RH
152};
153
3b66a141 154static bfd_assert_handler_type default_bfd_assert_handler;
4519d071 155static bfd_error_handler_type default_bfd_error_handler;
3b66a141 156
252b5132
RH
157struct bfd_link_info link_info;
158\f
159static void
498cd2a0 160ld_cleanup (void)
252b5132 161{
498cd2a0
AM
162 bfd_cache_close_all ();
163#ifdef ENABLE_PLUGINS
164 plugin_call_cleanup ();
165#endif
166 if (output_filename && delete_output_file_on_failure)
167 unlink_if_ordinary (output_filename);
252b5132
RH
168}
169
4519d071 170/* Hook to notice BFD assertions. */
3b66a141
HPN
171
172static void
173ld_bfd_assert_handler (const char *fmt, const char *bfdver,
174 const char *file, int line)
175{
3b66a141 176 config.make_executable = FALSE;
4519d071
AM
177 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
178}
179
180/* Hook the bfd error/warning handler for --fatal-warnings. */
181
182static void
183ld_bfd_error_handler (const char *fmt, va_list ap)
184{
185 if (config.fatal_warnings)
186 config.make_executable = FALSE;
187 (*default_bfd_error_handler) (fmt, ap);
3b66a141
HPN
188}
189
252b5132 190int
1579bae1 191main (int argc, char **argv)
252b5132
RH
192{
193 char *emulation;
194 long start_time = get_run_time ();
195
196#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
197 setlocale (LC_MESSAGES, "");
3882b010
L
198#endif
199#if defined (HAVE_SETLOCALE)
200 setlocale (LC_CTYPE, "");
252b5132
RH
201#endif
202 bindtextdomain (PACKAGE, LOCALEDIR);
203 textdomain (PACKAGE);
204
205 program_name = argv[0];
206 xmalloc_set_program_name (program_name);
207
208 START_PROGRESS (program_name, 0);
209
869b9d07
MM
210 expandargv (&argc, &argv);
211
bf2dd8d7
AM
212 if (bfd_init () != BFD_INIT_MAGIC)
213 einfo (_("%F%P: fatal error: libbfd ABI mismatch\n"));
252b5132
RH
214
215 bfd_set_error_program_name (program_name);
216
3b66a141
HPN
217 /* We want to notice and fail on those nasty BFD assertions which are
218 likely to signal incorrect output being generated but otherwise may
219 leave no trace. */
220 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
221
4519d071
AM
222 /* Also hook the bfd error/warning handler for --fatal-warnings. */
223 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
224
498cd2a0 225 xatexit (ld_cleanup);
252b5132 226
e2243057
RS
227 /* Set up the sysroot directory. */
228 ld_sysroot = get_sysroot (argc, argv);
229 if (*ld_sysroot)
3074964f 230 ld_canon_sysroot = lrealpath (ld_sysroot);
3fe38064 231 if (ld_canon_sysroot)
889be5db
DR
232 {
233 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
234
235 /* is_sysrooted_pathname() relies on no trailing dirsep. */
236 if (ld_canon_sysroot_len > 0
237 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
238 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
239 }
3fe38064
NC
240 else
241 ld_canon_sysroot_len = -1;
242
252b5132
RH
243 /* Set the default BFD target based on the configured target. Doing
244 this permits the linker to be configured for a particular target,
245 and linked against a shared BFD library which was configured for
246 a different target. The macro TARGET is defined by Makefile. */
0aa7f586 247 if (!bfd_set_default_target (TARGET))
252b5132
RH
248 {
249 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
250 xexit (1);
251 }
252
b47c4208
AM
253#if YYDEBUG
254 {
255 extern int yydebug;
256 yydebug = 1;
257 }
258#endif
259
b34976b6 260 config.build_constructors = TRUE;
c76308d2 261 config.rpath_separator = ':';
a854a4a7
AM
262 config.split_by_reloc = (unsigned) -1;
263 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
264 config.make_executable = TRUE;
265 config.magic_demand_paged = TRUE;
266 config.text_read_only = TRUE;
4f9d22a0 267 link_info.disable_target_specific_optimizations = -1;
3b95049e 268
b34976b6 269 command_line.warn_mismatch = TRUE;
fe7929ce 270 command_line.warn_search_mismatch = TRUE;
02b0b1aa 271 command_line.check_section_addresses = -1;
bcaa7b3e 272
252b5132
RH
273 /* We initialize DEMANGLING based on the environment variable
274 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
275 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
276 environment. Acting the same way here lets us provide the same
277 interface by default. */
278 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
279
b34976b6 280 link_info.allow_undefined_version = TRUE;
b5067602 281 link_info.keep_memory = TRUE;
b5067602 282 link_info.combreloc = TRUE;
d5cd3933 283 link_info.strip_discarded = TRUE;
3f0a5f17 284 link_info.prohibit_multiple_definition_absolute = FALSE;
2760f24c
RG
285 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
286 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
a9a4c53e
AM
287 link_info.callbacks = &link_callbacks;
288 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
289 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
290 and _fini symbols. We are compatible. */
291 link_info.init_function = "_init";
292 link_info.fini_function = "_fini";
a9a4c53e 293 link_info.relax_pass = 1;
889c2a67 294 link_info.extern_protected_data = -1;
aec6b87e 295 link_info.dynamic_undefined_weak = -1;
e0076ab3 296 link_info.pei386_auto_import = -1;
db6751f2 297 link_info.spare_dynamic_tags = 5;
967928e9 298 link_info.path_separator = ':';
6c3bc0f8
NC
299#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
300 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
301#endif
6734f10a 302#ifdef DEFAULT_NEW_DTAGS
91001320 303 link_info.new_dtags = DEFAULT_NEW_DTAGS;
6734f10a 304#endif
24718e3b 305
252b5132 306 ldfile_add_arch ("");
252b5132
RH
307 emulation = get_emulation (argc, argv);
308 ldemul_choose_mode (emulation);
742aeb63 309 default_target = ldemul_choose_target (argc, argv);
252b5132 310 lang_init ();
18d6a79d 311 ldexp_init ();
252b5132 312 ldemul_before_parse ();
b34976b6 313 lang_has_input_file = FALSE;
252b5132
RH
314 parse_args (argc, argv);
315
2d643429
NC
316 if (config.hash_table_size != 0)
317 bfd_hash_set_default_size (config.hash_table_size);
318
9bbc1a67
AM
319#ifdef ENABLE_PLUGINS
320 /* Now all the plugin arguments have been gathered, we can load them. */
d82184d7 321 plugin_load_plugins ();
9bbc1a67 322#endif /* ENABLE_PLUGINS */
36af4a4e 323
9bbc1a67 324 ldemul_set_symbols ();
252b5132 325
14be8564
L
326 /* If we have not already opened and parsed a linker script,
327 try the default script from command line first. */
328 if (saved_script_handle == NULL
329 && command_line.default_script != NULL)
330 {
331 ldfile_open_command_file (command_line.default_script);
332 parser_input = input_script;
333 yyparse ();
334 }
335
b9a8de1e
NC
336 /* If we have not already opened and parsed a linker script
337 read the emulation's appropriate default script. */
b90e1c6f 338 if (saved_script_handle == NULL)
252b5132 339 {
252b5132 340 int isfile;
b7a26f91 341 char *s = ldemul_get_script (&isfile);
252b5132
RH
342
343 if (isfile)
7d24f02c 344 ldfile_open_default_command_file (s);
252b5132 345 else
b7a26f91 346 {
252b5132 347 lex_string = s;
dab69f68 348 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
349 }
350 parser_input = input_script;
351 yyparse ();
352 lex_string = NULL;
353 }
354
cd6f1cf3 355 if (verbose)
b9a8de1e 356 {
9cb61eab
AM
357 if (saved_script_handle)
358 info_msg (_("using external linker script:"));
359 else
360 info_msg (_("using internal linker script:"));
361 info_msg ("\n==================================================\n");
b9a8de1e
NC
362
363 if (saved_script_handle)
364 {
74699268 365 static const int ld_bufsz = 8193;
b9a8de1e 366 size_t n;
1e9cc1c2 367 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
368
369 rewind (saved_script_handle);
74699268 370 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 371 {
b7a26f91 372 buf[n] = 0;
f5ac6ab3 373 info_msg ("%s", buf);
b9a8de1e
NC
374 }
375 rewind (saved_script_handle);
376 free (buf);
377 }
378 else
379 {
380 int isfile;
381
b7a26f91 382 info_msg (ldemul_get_script (&isfile));
b9a8de1e 383 }
b7a26f91 384
b9a8de1e
NC
385 info_msg ("\n==================================================\n");
386 }
387
7bdf4127
AB
388 if (command_line.force_group_allocation
389 || !bfd_link_relocatable (&link_info))
390 link_info.resolve_section_groups = TRUE;
391 else
392 link_info.resolve_section_groups = FALSE;
393
30824704
RM
394 if (command_line.print_output_format)
395 info_msg ("%s\n", lang_get_output_target ());
396
252b5132
RH
397 lang_final ();
398
61e2488c
JT
399 /* If the only command line argument has been -v or --version or --verbose
400 then ignore any input files provided by linker scripts and exit now.
401 We do not want to create an output file when the linker is just invoked
402 to provide version information. */
403 if (argc == 2 && version_printed)
404 xexit (0);
405
a4819f54 406 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
df5f2391 407 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
a4819f54 408
b34976b6 409 if (!lang_has_input_file)
252b5132 410 {
30824704 411 if (version_printed || command_line.print_output_format)
252b5132 412 xexit (0);
df5f2391 413 einfo (_("%F%P: no input files\n"));
252b5132
RH
414 }
415
5c87f94b 416 if (verbose)
0125cdf2 417 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
418
419 ldemul_after_parse ();
420
252b5132
RH
421 if (config.map_filename)
422 {
423 if (strcmp (config.map_filename, "-") == 0)
424 {
425 config.map_file = stdout;
426 }
427 else
428 {
429 config.map_file = fopen (config.map_filename, FOPEN_WT);
430 if (config.map_file == (FILE *) NULL)
431 {
432 bfd_set_error (bfd_error_system_call);
df5f2391 433 einfo (_("%F%P: cannot open map file %s: %E\n"),
252b5132
RH
434 config.map_filename);
435 }
436 }
d2ef37eb 437 link_info.has_map_file = TRUE;
252b5132
RH
438 }
439
252b5132
RH
440 lang_process ();
441
442 /* Print error messages for any missing symbols, for any warning
6d5e62f8 443 symbols, and possibly multiple definitions. */
0e1862bb 444 if (bfd_link_relocatable (&link_info))
f13a99db 445 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 446 else
f13a99db 447 link_info.output_bfd->flags |= EXEC_P;
252b5132 448
0ce398f1
L
449 if ((link_info.compress_debug & COMPRESS_DEBUG))
450 {
451 link_info.output_bfd->flags |= BFD_COMPRESS;
452 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
453 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
454 }
455
252b5132
RH
456 ldwrite ();
457
458 if (config.map_file != NULL)
459 lang_map ();
460 if (command_line.cref)
461 output_cref (config.map_file != NULL ? config.map_file : stdout);
462 if (nocrossref_list != NULL)
463 check_nocrossrefs ();
3604cb1f
TG
464 if (command_line.print_memory_usage)
465 lang_print_memory_usage ();
edf84efc
NC
466#if 0
467 {
0aa7f586 468 struct bfd_link_hash_entry *h;
252b5132 469
edf84efc
NC
470 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
471 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
472 }
473#endif
18d6a79d 474 ldexp_finish ();
750877ba
L
475 lang_finish ();
476
1049f94e 477 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 478 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 479 want to ignore for relocatable output?) */
b34976b6 480 if (!config.make_executable && !force_make_executable)
252b5132 481 {
5c87f94b 482 if (verbose)
0125cdf2
NC
483 einfo (_("%P: link errors found, deleting executable `%s'\n"),
484 output_filename);
252b5132 485
4309cbf2 486 /* The file will be removed by ld_cleanup. */
252b5132
RH
487 xexit (1);
488 }
489 else
490 {
0aa7f586 491 if (!bfd_close (link_info.output_bfd))
df5f2391 492 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
493
494 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
495 executable file and it doesn't end in .exe, copy it to one
496 which does. */
0e1862bb
L
497 if (!bfd_link_relocatable (&link_info)
498 && command_line.force_exe_suffix)
252b5132
RH
499 {
500 int len = strlen (output_filename);
0125cdf2 501
6d5e62f8 502 if (len < 4
252b5132
RH
503 || (strcasecmp (output_filename + len - 4, ".exe") != 0
504 && strcasecmp (output_filename + len - 4, ".dll") != 0))
505 {
506 FILE *src;
507 FILE *dst;
508 const int bsize = 4096;
1e9cc1c2 509 char *buf = (char *) xmalloc (bsize);
252b5132 510 int l;
1e9cc1c2 511 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 512
252b5132
RH
513 strcpy (dst_name, output_filename);
514 strcat (dst_name, ".exe");
515 src = fopen (output_filename, FOPEN_RB);
516 dst = fopen (dst_name, FOPEN_WB);
517
518 if (!src)
df5f2391 519 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
1579bae1 520 output_filename);
252b5132 521 if (!dst)
df5f2391 522 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
1579bae1 523 dst_name);
252b5132
RH
524 while ((l = fread (buf, 1, bsize, src)) > 0)
525 {
526 int done = fwrite (buf, 1, l, dst);
0125cdf2 527
252b5132 528 if (done != l)
df5f2391 529 einfo (_("%P: error writing file `%s'\n"), dst_name);
252b5132 530 }
0125cdf2 531
252b5132
RH
532 fclose (src);
533 if (fclose (dst) == EOF)
df5f2391 534 einfo (_("%P: error closing file `%s'\n"), dst_name);
252b5132
RH
535 free (dst_name);
536 free (buf);
537 }
538 }
539 }
540
541 END_PROGRESS (program_name);
542
543 if (config.stats)
544 {
252b5132
RH
545 long run_time = get_run_time () - start_time;
546
e922bcab 547 fflush (stdout);
252b5132
RH
548 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
549 program_name, run_time / 1000000, run_time % 1000000);
e922bcab 550 fflush (stderr);
252b5132
RH
551 }
552
4309cbf2 553 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
554 output_filename = NULL;
555
556 xexit (0);
557 return 0;
558}
559
e2243057
RS
560/* If the configured sysroot is relocatable, try relocating it based on
561 default prefix FROM. Return the relocated directory if it exists,
562 otherwise return null. */
563
564static char *
565get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
566{
567#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
568 char *path;
569 struct stat s;
570
571 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
572 if (path)
573 {
574 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
575 return path;
576 free (path);
577 }
578#endif
579 return 0;
580}
581
582/* Return the sysroot directory. Return "" if no sysroot is being used. */
583
584static const char *
585get_sysroot (int argc, char **argv)
586{
587 int i;
55d5520a 588 const char *path = NULL;
e2243057
RS
589
590 for (i = 1; i < argc; i++)
0112cd26 591 if (CONST_STRNEQ (argv[i], "--sysroot="))
55d5520a 592 path = argv[i] + strlen ("--sysroot=");
e2243057 593
55d5520a
AM
594 if (!path)
595 path = get_relative_sysroot (BINDIR);
e2243057 596
55d5520a
AM
597 if (!path)
598 path = get_relative_sysroot (TOOLBINDIR);
599
600 if (!path)
601 path = TARGET_SYSTEM_ROOT;
602
603 if (IS_DIR_SEPARATOR (*path) && path[1] == 0)
604 path = "";
e2243057 605
55d5520a 606 return path;
e2243057
RS
607}
608
252b5132
RH
609/* We need to find any explicitly given emulation in order to initialize the
610 state that's needed by the lex&yacc argument parser (parse_args). */
611
612static char *
1579bae1 613get_emulation (int argc, char **argv)
252b5132
RH
614{
615 char *emulation;
616 int i;
617
618 emulation = getenv (EMULATION_ENVIRON);
619 if (emulation == NULL)
620 emulation = DEFAULT_EMULATION;
621
622 for (i = 1; i < argc; i++)
623 {
0112cd26 624 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
625 {
626 if (argv[i][2] == '\0')
627 {
628 /* -m EMUL */
629 if (i < argc - 1)
630 {
631 emulation = argv[i + 1];
632 i++;
633 }
634 else
df5f2391 635 einfo (_("%F%P: missing argument to -m\n"));
252b5132
RH
636 }
637 else if (strcmp (argv[i], "-mips1") == 0
638 || strcmp (argv[i], "-mips2") == 0
639 || strcmp (argv[i], "-mips3") == 0
d1cf510e 640 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
641 || strcmp (argv[i], "-mips5") == 0
642 || strcmp (argv[i], "-mips32") == 0
643 || strcmp (argv[i], "-mips32r2") == 0
7361da2c 644 || strcmp (argv[i], "-mips32r6") == 0
5f74bc13 645 || strcmp (argv[i], "-mips64") == 0
7361da2c
AB
646 || strcmp (argv[i], "-mips64r2") == 0
647 || strcmp (argv[i], "-mips64r6") == 0)
252b5132 648 {
31d677f9 649 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
650 passed to the linker by some MIPS compilers. They
651 generally tell the linker to use a slightly different
652 library path. Perhaps someday these should be
653 implemented as emulations; until then, we just ignore
654 the arguments and hope that nobody ever creates
655 emulations named ips1, ips2 or ips3. */
656 }
657 else if (strcmp (argv[i], "-m486") == 0)
658 {
659 /* FIXME: The argument -m486 is passed to the linker on
660 some Linux systems. Hope that nobody creates an
661 emulation named 486. */
662 }
663 else
664 {
665 /* -mEMUL */
666 emulation = &argv[i][2];
667 }
668 }
669 }
670
671 return emulation;
672}
673
252b5132 674void
1579bae1 675add_ysym (const char *name)
252b5132 676{
1579bae1 677 if (link_info.notice_hash == NULL)
252b5132 678 {
0aa7f586
AM
679 link_info.notice_hash
680 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
681 if (!bfd_hash_table_init_n (link_info.notice_hash,
682 bfd_hash_newfunc,
683 sizeof (struct bfd_hash_entry),
684 61))
df5f2391 685 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
6d5e62f8 686 }
252b5132 687
1579bae1 688 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
df5f2391 689 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
690}
691
0e86e20e
AM
692void
693add_ignoresym (struct bfd_link_info *info, const char *name)
694{
695 if (info->ignore_hash == NULL)
696 {
697 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
0aa7f586
AM
698 if (!bfd_hash_table_init_n (info->ignore_hash,
699 bfd_hash_newfunc,
700 sizeof (struct bfd_hash_entry),
701 61))
df5f2391 702 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
0e86e20e
AM
703 }
704
705 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
df5f2391 706 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
0e86e20e
AM
707}
708
252b5132
RH
709/* Record a symbol to be wrapped, from the --wrap option. */
710
711void
1579bae1 712add_wrap (const char *name)
252b5132
RH
713{
714 if (link_info.wrap_hash == NULL)
715 {
0aa7f586
AM
716 link_info.wrap_hash
717 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
718 if (!bfd_hash_table_init_n (link_info.wrap_hash,
719 bfd_hash_newfunc,
720 sizeof (struct bfd_hash_entry),
721 61))
df5f2391 722 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132 723 }
0125cdf2 724
b34976b6 725 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
df5f2391 726 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
727}
728
729/* Handle the -retain-symbols-file option. */
730
731void
1579bae1 732add_keepsyms_file (const char *filename)
252b5132
RH
733{
734 FILE *file;
735 char *buf;
736 size_t bufsize;
737 int c;
738
739 if (link_info.strip == strip_some)
740 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
741
742 file = fopen (filename, "r");
1579bae1 743 if (file == NULL)
252b5132
RH
744 {
745 bfd_set_error (bfd_error_system_call);
746 einfo ("%X%P: %s: %E\n", filename);
747 return;
748 }
749
1e9cc1c2
NC
750 link_info.keep_hash = (struct bfd_hash_table *)
751 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
752 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
753 sizeof (struct bfd_hash_entry)))
df5f2391 754 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132
RH
755
756 bufsize = 100;
1e9cc1c2 757 buf = (char *) xmalloc (bufsize);
252b5132
RH
758
759 c = getc (file);
760 while (c != EOF)
761 {
3882b010 762 while (ISSPACE (c))
252b5132
RH
763 c = getc (file);
764
765 if (c != EOF)
766 {
767 size_t len = 0;
768
0aa7f586 769 while (!ISSPACE (c) && c != EOF)
252b5132
RH
770 {
771 buf[len] = c;
772 ++len;
773 if (len >= bufsize)
774 {
775 bufsize *= 2;
1e9cc1c2 776 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
777 }
778 c = getc (file);
779 }
780
781 buf[len] = '\0';
782
1579bae1 783 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
df5f2391 784 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
252b5132
RH
785 }
786 }
787
788 if (link_info.strip != strip_none)
789 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
790
5ed6aba4 791 free (buf);
252b5132 792 link_info.strip = strip_some;
d9313f4f 793 fclose (file);
252b5132
RH
794}
795\f
796/* Callbacks from the BFD linker routines. */
797
798/* This is called when BFD has decided to include an archive member in
799 a link. */
800
b34976b6 801static bfd_boolean
e1fffbe6 802add_archive_element (struct bfd_link_info *info,
1579bae1 803 bfd *abfd,
5d3236ee
DK
804 const char *name,
805 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
806{
807 lang_input_statement_type *input;
1fa4ec6a 808 lang_input_statement_type *parent;
5d3236ee 809 lang_input_statement_type orig_input;
252b5132 810
1e9cc1c2
NC
811 input = (lang_input_statement_type *)
812 xcalloc (1, sizeof (lang_input_statement_type));
fb47deda 813 input->header.type = lang_input_statement_enum;
252b5132
RH
814 input->filename = abfd->filename;
815 input->local_sym_name = abfd->filename;
816 input->the_bfd = abfd;
252b5132 817
1fa4ec6a
AM
818 parent = abfd->my_archive->usrdata;
819 if (parent != NULL && !parent->flags.reload)
820 parent->next = (lang_statement_union_type *) input;
821
5d3236ee
DK
822 /* Save the original data for trace files/tries below, as plugins
823 (if enabled) may possibly alter it to point to a replacement
824 BFD, but we still want to output the original BFD filename. */
825 orig_input = *input;
826#ifdef ENABLE_PLUGINS
b95a0a31 827 if (link_info.lto_plugin_active)
5d3236ee
DK
828 {
829 /* We must offer this archive member to the plugins to claim. */
35a1e5f3
L
830 plugin_maybe_claim (input);
831 if (input->flags.claimed)
5d3236ee 832 {
b95a0a31
L
833 if (no_more_claiming)
834 {
835 /* Don't claim new IR symbols after all IR symbols have
836 been claimed. */
5c87f94b 837 if (verbose)
c1c8c1ef 838 info_msg ("%pI: no new IR symbols to claimi\n",
b95a0a31
L
839 &orig_input);
840 input->flags.claimed = 0;
841 return FALSE;
842 }
35a1e5f3
L
843 input->flags.claim_archive = TRUE;
844 *subsbfd = input->the_bfd;
5d3236ee
DK
845 }
846 }
847#endif /* ENABLE_PLUGINS */
848
252b5132
RH
849 ldlang_add_file (input);
850
1579bae1 851 if (config.map_file != NULL)
252b5132 852 {
b34976b6 853 static bfd_boolean header_printed;
252b5132
RH
854 struct bfd_link_hash_entry *h;
855 bfd *from;
856 int len;
857
e1fffbe6 858 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
aa654ee8
AM
859 if (h == NULL
860 && info->pei386_auto_import
861 && CONST_STRNEQ (name, "__imp_"))
862 h = bfd_link_hash_lookup (info->hash, name + 6, FALSE, FALSE, TRUE);
252b5132
RH
863
864 if (h == NULL)
865 from = NULL;
866 else
867 {
868 switch (h->type)
869 {
870 default:
871 from = NULL;
872 break;
873
874 case bfd_link_hash_defined:
875 case bfd_link_hash_defweak:
876 from = h->u.def.section->owner;
877 break;
878
879 case bfd_link_hash_undefined:
880 case bfd_link_hash_undefweak:
881 from = h->u.undef.abfd;
882 break;
883
884 case bfd_link_hash_common:
885 from = h->u.c.p->section->owner;
886 break;
887 }
888 }
889
0aa7f586 890 if (!header_printed)
252b5132 891 {
1273da04 892 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
b34976b6 893 header_printed = TRUE;
252b5132
RH
894 }
895
3860d2b4
AM
896 if (abfd->my_archive == NULL
897 || bfd_is_thin_archive (abfd->my_archive))
252b5132
RH
898 {
899 minfo ("%s", bfd_get_filename (abfd));
900 len = strlen (bfd_get_filename (abfd));
901 }
902 else
903 {
3860d2b4 904 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
252b5132 905 bfd_get_filename (abfd));
3860d2b4 906 len = (strlen (bfd_get_filename (abfd->my_archive))
252b5132
RH
907 + strlen (bfd_get_filename (abfd))
908 + 2);
909 }
910
911 if (len >= 29)
912 {
913 print_nl ();
914 len = 0;
915 }
916 while (len < 30)
917 {
918 print_space ();
919 ++len;
920 }
921
922 if (from != NULL)
871b3ab2 923 minfo ("%pB ", from);
252b5132 924 if (h != NULL)
c1c8c1ef 925 minfo ("(%pT)\n", h->root.string);
252b5132
RH
926 else
927 minfo ("(%s)\n", name);
928 }
929
727a29ba
AM
930 if (verbose
931 || trace_files > 1
932 || (trace_files && bfd_is_thin_archive (orig_input.the_bfd->my_archive)))
c1c8c1ef 933 info_msg ("%pI\n", &orig_input);
b34976b6 934 return TRUE;
252b5132
RH
935}
936
937/* This is called when BFD has discovered a symbol which is defined
938 multiple times. */
939
1a72702b 940static void
24f58f47
AM
941multiple_definition (struct bfd_link_info *info,
942 struct bfd_link_hash_entry *h,
1579bae1
AM
943 bfd *nbfd,
944 asection *nsec,
945 bfd_vma nval)
252b5132 946{
24f58f47
AM
947 const char *name;
948 bfd *obfd;
949 asection *osec;
950 bfd_vma oval;
951
952 if (info->allow_multiple_definition)
1a72702b 953 return;
24f58f47
AM
954
955 switch (h->type)
956 {
957 case bfd_link_hash_defined:
958 osec = h->u.def.section;
959 oval = h->u.def.value;
960 obfd = h->u.def.section->owner;
961 break;
962 case bfd_link_hash_indirect:
963 osec = bfd_ind_section_ptr;
964 oval = 0;
965 obfd = NULL;
966 break;
967 default:
968 abort ();
969 }
970
971 /* Ignore a redefinition of an absolute symbol to the
972 same value; it's harmless. */
973 if (h->type == bfd_link_hash_defined
974 && bfd_is_abs_section (osec)
975 && bfd_is_abs_section (nsec)
976 && nval == oval)
1a72702b 977 return;
24f58f47 978
252b5132
RH
979 /* If either section has the output_section field set to
980 bfd_abs_section_ptr, it means that the section is being
981 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
982 FIXME: It would be cleaner to somehow ignore symbols defined in
983 sections which are being discarded. */
3f0a5f17
ME
984 if (!info->prohibit_multiple_definition_absolute
985 && ((osec->output_section != NULL
986 && ! bfd_is_abs_section (osec)
987 && bfd_is_abs_section (osec->output_section))
988 || (nsec->output_section != NULL
989 && !bfd_is_abs_section (nsec)
990 && bfd_is_abs_section (nsec->output_section))))
1a72702b 991 return;
252b5132 992
24f58f47
AM
993 name = h->root.string;
994 if (nbfd == NULL)
995 {
996 nbfd = obfd;
997 nsec = osec;
998 nval = oval;
999 obfd = NULL;
1000 }
df5f2391 1001 einfo (_("%X%P: %C: multiple definition of `%pT'"),
252b5132 1002 nbfd, nsec, nval, name);
1579bae1 1003 if (obfd != NULL)
df5f2391
AM
1004 einfo (_("; %D: first defined here"), obfd, osec, oval);
1005 einfo ("\n");
9b14b192 1006
13761a11 1007 if (RELAXATION_ENABLED_BY_USER)
9b14b192 1008 {
df5f2391 1009 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
13761a11 1010 DISABLE_RELAXATION;
9b14b192 1011 }
252b5132
RH
1012}
1013
1014/* This is called when there is a definition of a common symbol, or
1015 when a common symbol is found for a symbol that is already defined,
1016 or when two common symbols are found. We only do something if
1017 -warn-common was used. */
1018
1a72702b 1019static void
1579bae1 1020multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 1021 struct bfd_link_hash_entry *h,
1579bae1
AM
1022 bfd *nbfd,
1023 enum bfd_link_hash_type ntype,
1024 bfd_vma nsize)
252b5132 1025{
24f58f47
AM
1026 const char *name;
1027 bfd *obfd;
1028 enum bfd_link_hash_type otype;
1029 bfd_vma osize;
1030
1031 if (!config.warn_common)
1a72702b 1032 return;
252b5132 1033
24f58f47
AM
1034 name = h->root.string;
1035 otype = h->type;
1036 if (otype == bfd_link_hash_common)
1037 {
1038 obfd = h->u.c.p->section->owner;
1039 osize = h->u.c.size;
1040 }
1041 else if (otype == bfd_link_hash_defined
1042 || otype == bfd_link_hash_defweak)
1043 {
1044 obfd = h->u.def.section->owner;
1045 osize = 0;
1046 }
1047 else
1048 {
1049 /* FIXME: It would nice if we could report the BFD which defined
1050 an indirect symbol, but we don't have anywhere to store the
1051 information. */
1052 obfd = NULL;
1053 osize = 0;
1054 }
1055
252b5132
RH
1056 if (ntype == bfd_link_hash_defined
1057 || ntype == bfd_link_hash_defweak
1058 || ntype == bfd_link_hash_indirect)
1059 {
1060 ASSERT (otype == bfd_link_hash_common);
252b5132 1061 if (obfd != NULL)
df5f2391
AM
1062 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1063 " from %pB\n"),
1064 nbfd, name, obfd);
1065 else
1066 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1067 nbfd, name);
252b5132
RH
1068 }
1069 else if (otype == bfd_link_hash_defined
1070 || otype == bfd_link_hash_defweak
1071 || otype == bfd_link_hash_indirect)
1072 {
1073 ASSERT (ntype == bfd_link_hash_common);
252b5132 1074 if (obfd != NULL)
df5f2391
AM
1075 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1076 " from %pB\n"),
1077 nbfd, name, obfd);
1078 else
1079 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1080 nbfd, name);
252b5132
RH
1081 }
1082 else
1083 {
1084 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1085 if (osize > nsize)
1086 {
252b5132 1087 if (obfd != NULL)
df5f2391
AM
1088 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1089 " by larger common from %pB\n"),
1090 nbfd, name, obfd);
1091 else
1092 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1093 " by larger common\n"),
1094 nbfd, name);
252b5132
RH
1095 }
1096 else if (nsize > osize)
1097 {
252b5132 1098 if (obfd != NULL)
df5f2391
AM
1099 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1100 " smaller common from %pB\n"),
1101 nbfd, name, obfd);
1102 else
1103 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1104 " smaller common\n"),
1105 nbfd, name);
252b5132
RH
1106 }
1107 else
1108 {
252b5132 1109 if (obfd != NULL)
df5f2391
AM
1110 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1111 nbfd, obfd, name);
1112 else
1113 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1114 nbfd, name);
252b5132
RH
1115 }
1116 }
252b5132
RH
1117}
1118
1119/* This is called when BFD has discovered a set element. H is the
1120 entry in the linker hash table for the set. SECTION and VALUE
1121 represent a value which should be added to the set. */
1122
1a72702b 1123static void
1579bae1
AM
1124add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1125 struct bfd_link_hash_entry *h,
1126 bfd_reloc_code_real_type reloc,
1127 bfd *abfd,
1128 asection *section,
1129 bfd_vma value)
252b5132
RH
1130{
1131 if (config.warn_constructors)
1132 einfo (_("%P: warning: global constructor %s used\n"),
1133 h->root.string);
1134
0aa7f586 1135 if (!config.build_constructors)
1a72702b 1136 return;
252b5132 1137
1579bae1 1138 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1139
1140 if (h->type == bfd_link_hash_new)
1141 {
1142 h->type = bfd_link_hash_undefined;
1143 h->u.undef.abfd = abfd;
1144 /* We don't call bfd_link_add_undef to add this to the list of
1145 undefined symbols because we are going to define it
1146 ourselves. */
1147 }
252b5132
RH
1148}
1149
1150/* This is called when BFD has discovered a constructor. This is only
1151 called for some object file formats--those which do not handle
1152 constructors in some more clever fashion. This is similar to
1153 adding an element to a set, but less general. */
1154
1a72702b 1155static void
1579bae1
AM
1156constructor_callback (struct bfd_link_info *info,
1157 bfd_boolean constructor,
1158 const char *name,
1159 bfd *abfd,
1160 asection *section,
1161 bfd_vma value)
252b5132
RH
1162{
1163 char *s;
1164 struct bfd_link_hash_entry *h;
1165 char set_name[1 + sizeof "__CTOR_LIST__"];
1166
1167 if (config.warn_constructors)
1168 einfo (_("%P: warning: global constructor %s used\n"), name);
1169
0aa7f586 1170 if (!config.build_constructors)
1a72702b 1171 return;
252b5132
RH
1172
1173 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1174 useful error message. */
0e86e20e 1175 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
0e1862bb 1176 && (bfd_link_relocatable (info)
252b5132 1177 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
df5f2391 1178 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
252b5132
RH
1179
1180 s = set_name;
1181 if (bfd_get_symbol_leading_char (abfd) != '\0')
1182 *s++ = bfd_get_symbol_leading_char (abfd);
1183 if (constructor)
1184 strcpy (s, "__CTOR_LIST__");
1185 else
1186 strcpy (s, "__DTOR_LIST__");
1187
b34976b6 1188 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132 1189 if (h == (struct bfd_link_hash_entry *) NULL)
df5f2391 1190 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
252b5132
RH
1191 if (h->type == bfd_link_hash_new)
1192 {
1193 h->type = bfd_link_hash_undefined;
1194 h->u.undef.abfd = abfd;
1195 /* We don't call bfd_link_add_undef to add this to the list of
1196 undefined symbols because we are going to define it
1197 ourselves. */
1198 }
1199
1200 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
252b5132
RH
1201}
1202
1203/* A structure used by warning_callback to pass information through
1204 bfd_map_over_sections. */
1205
0125cdf2
NC
1206struct warning_callback_info
1207{
b34976b6 1208 bfd_boolean found;
252b5132
RH
1209 const char *warning;
1210 const char *symbol;
1211 asymbol **asymbols;
1212};
1213
4c6d802e
L
1214/* Look through the relocs to see if we can find a plausible address
1215 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1216
1217static bfd_boolean
1218symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1219{
1220 struct warning_callback_info cinfo;
1221
1222 if (!bfd_generic_link_read_symbols (abfd))
df5f2391 1223 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
4c6d802e
L
1224
1225 cinfo.found = FALSE;
1226 cinfo.warning = warning;
1227 cinfo.symbol = symbol;
1228 cinfo.asymbols = bfd_get_outsymbols (abfd);
1229 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1230 return cinfo.found;
1231}
1232
252b5132
RH
1233/* This is called when there is a reference to a warning symbol. */
1234
1a72702b 1235static void
1579bae1
AM
1236warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1237 const char *warning,
1238 const char *symbol,
1239 bfd *abfd,
1240 asection *section,
1241 bfd_vma address)
252b5132
RH
1242{
1243 /* This is a hack to support warn_multiple_gp. FIXME: This should
1244 have a cleaner interface, but what? */
0aa7f586 1245 if (!config.warn_multiple_gp
252b5132 1246 && strcmp (warning, "using multiple gp values") == 0)
1a72702b 1247 return;
252b5132
RH
1248
1249 if (section != NULL)
df5f2391 1250 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1251 else if (abfd == NULL)
300475fe 1252 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1253 else if (symbol == NULL)
df5f2391 1254 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
0aa7f586 1255 else if (!symbol_warning (warning, symbol, abfd))
252b5132 1256 {
4c6d802e
L
1257 bfd *b;
1258 /* Search all input files for a reference to SYMBOL. */
c72f2fb2 1259 for (b = info->input_bfds; b; b = b->link.next)
4c6d802e 1260 if (b != abfd && symbol_warning (warning, symbol, b))
1a72702b 1261 return;
df5f2391 1262 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
252b5132 1263 }
252b5132
RH
1264}
1265
1266/* This is called by warning_callback for each section. It checks the
1267 relocs of the section to see if it can find a reference to the
1268 symbol which triggered the warning. If it can, it uses the reloc
1269 to give an error message with a file and line number. */
1270
1271static void
1579bae1 1272warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1273{
1e9cc1c2 1274 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1275 long relsize;
1276 arelent **relpp;
1277 long relcount;
1278 arelent **p, **pend;
1279
1280 if (info->found)
1281 return;
1282
1283 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1284 if (relsize < 0)
df5f2391 1285 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1286 if (relsize == 0)
1287 return;
1288
1e9cc1c2 1289 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1290 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1291 if (relcount < 0)
df5f2391 1292 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1293
1294 p = relpp;
1295 pend = p + relcount;
1296 for (; p < pend && *p != NULL; p++)
1297 {
1298 arelent *q = *p;
1299
1300 if (q->sym_ptr_ptr != NULL
1301 && *q->sym_ptr_ptr != NULL
1302 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1303 {
1304 /* We found a reloc for the symbol we are looking for. */
df5f2391 1305 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
300475fe 1306 info->warning);
b34976b6 1307 info->found = TRUE;
252b5132
RH
1308 break;
1309 }
1310 }
1311
1312 free (relpp);
1313}
1314
1315/* This is called when an undefined symbol is found. */
1316
1a72702b 1317static void
0e86e20e 1318undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1319 const char *name,
1320 bfd *abfd,
1321 asection *section,
1322 bfd_vma address,
0b28295d 1323 bfd_boolean error)
252b5132
RH
1324{
1325 static char *error_name;
1326 static unsigned int error_count;
1327
1328#define MAX_ERRORS_IN_A_ROW 5
1329
0e86e20e
AM
1330 if (info->ignore_hash != NULL
1331 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1a72702b 1332 return;
0e86e20e 1333
252b5132
RH
1334 if (config.warn_once)
1335 {
252b5132 1336 /* Only warn once about a particular undefined symbol. */
0e86e20e 1337 add_ignoresym (info, name);
252b5132
RH
1338 }
1339
1340 /* We never print more than a reasonable number of errors in a row
1341 for a single symbol. */
1579bae1 1342 if (error_name != NULL
252b5132
RH
1343 && strcmp (name, error_name) == 0)
1344 ++error_count;
1345 else
1346 {
1347 error_count = 0;
1579bae1 1348 if (error_name != NULL)
252b5132 1349 free (error_name);
d1b2b2dc 1350 error_name = xstrdup (name);
252b5132
RH
1351 }
1352
1353 if (section != NULL)
1354 {
1355 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1356 {
0b28295d 1357 if (error)
df5f2391 1358 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
0b28295d
ILT
1359 abfd, section, address, name);
1360 else
df5f2391 1361 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
0b28295d 1362 abfd, section, address, name);
b6f29aaa 1363 }
252b5132 1364 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1365 {
1366 if (error)
df5f2391 1367 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1368 abfd, section, address, name);
1369 else
df5f2391 1370 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1371 abfd, section, address, name);
1372 }
1373 else if (error)
1374 einfo ("%X");
252b5132
RH
1375 }
1376 else
1377 {
1378 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1379 {
0b28295d 1380 if (error)
df5f2391 1381 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
0b28295d
ILT
1382 abfd, name);
1383 else
df5f2391 1384 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
0b28295d 1385 abfd, name);
b6f29aaa 1386 }
252b5132 1387 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1388 {
1389 if (error)
df5f2391 1390 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1391 abfd, name);
1392 else
df5f2391 1393 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1394 abfd, name);
1395 }
1396 else if (error)
1397 einfo ("%X");
252b5132 1398 }
252b5132
RH
1399}
1400
8aae64e6
AO
1401/* Counter to limit the number of relocation overflow error messages
1402 to print. Errors are printed as it is decremented. When it's
1403 called and the counter is zero, a final message is printed
1404 indicating more relocations were omitted. When it gets to -1, no
1405 such errors are printed. If it's initially set to a value less
1406 than -1, all such errors will be printed (--verbose does this). */
1407
1408int overflow_cutoff_limit = 10;
1409
252b5132
RH
1410/* This is called when a reloc overflows. */
1411
1a72702b 1412static void
0e86e20e 1413reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1414 struct bfd_link_hash_entry *entry,
1579bae1
AM
1415 const char *name,
1416 const char *reloc_name,
1417 bfd_vma addend,
1418 bfd *abfd,
1419 asection *section,
1420 bfd_vma address)
252b5132 1421{
8aae64e6 1422 if (overflow_cutoff_limit == -1)
1a72702b 1423 return;
8aae64e6 1424
a5990ada 1425 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1426
1427 if (overflow_cutoff_limit >= 0
1428 && overflow_cutoff_limit-- == 0)
1429 {
1430 einfo (_(" additional relocation overflows omitted from the output\n"));
1a72702b 1431 return;
8aae64e6
AO
1432 }
1433
dfeffb9f
L
1434 if (entry)
1435 {
1436 while (entry->type == bfd_link_hash_indirect
1437 || entry->type == bfd_link_hash_warning)
1438 entry = entry->u.i.link;
1439 switch (entry->type)
1440 {
1441 case bfd_link_hash_undefined:
1442 case bfd_link_hash_undefweak:
0aa7f586 1443 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1444 "%s against undefined symbol `%pT'"),
dfeffb9f
L
1445 reloc_name, entry->root.string);
1446 break;
1447 case bfd_link_hash_defined:
1448 case bfd_link_hash_defweak:
0aa7f586 1449 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1450 "%s against symbol `%pT' defined in %pA section in %pB"),
dfeffb9f 1451 reloc_name, entry->root.string,
a6e1b90f
L
1452 entry->u.def.section,
1453 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1454 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1455 break;
1456 default:
1457 abort ();
1458 break;
1459 }
1460 }
1461 else
c1c8c1ef 1462 einfo (_(" relocation truncated to fit: %s against `%pT'"),
dfeffb9f 1463 reloc_name, name);
252b5132
RH
1464 if (addend != 0)
1465 einfo ("+%v", addend);
1466 einfo ("\n");
252b5132
RH
1467}
1468
1469/* This is called when a dangerous relocation is made. */
1470
1a72702b 1471static void
1579bae1
AM
1472reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1473 const char *message,
1474 bfd *abfd,
1475 asection *section,
1476 bfd_vma address)
252b5132 1477{
a5990ada 1478 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1479 abfd, section, address, message);
252b5132
RH
1480}
1481
1482/* This is called when a reloc is being generated attached to a symbol
1483 that is not being output. */
1484
1a72702b 1485static void
1579bae1
AM
1486unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1487 const char *name,
1488 bfd *abfd,
1489 asection *section,
1490 bfd_vma address)
252b5132 1491{
a5990ada 1492 einfo (_("%X%H: reloc refers to symbol `%pT' which is not being output\n"),
e1fffbe6 1493 abfd, section, address, name);
252b5132
RH
1494}
1495
1496/* This is called if link_info.notice_all is set, or when a symbol in
1497 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1498 using the -y option, while notice_all is set if the --cref option
1499 has been supplied, or if there are any NOCROSSREFS sections in the
1500 linker script; and if plugins are active, since they need to monitor
1501 all references from non-IR files. */
252b5132 1502
b34976b6 1503static bfd_boolean
1579bae1 1504notice (struct bfd_link_info *info,
35ed3f94 1505 struct bfd_link_hash_entry *h,
46135103 1506 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1579bae1
AM
1507 bfd *abfd,
1508 asection *section,
16d96b5b 1509 bfd_vma value,
46135103 1510 flagword flags ATTRIBUTE_UNUSED)
252b5132 1511{
35ed3f94
AM
1512 const char *name;
1513
1514 if (h == NULL)
5061a885
AM
1515 {
1516 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1517 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1518 return TRUE;
1519 }
1520
35ed3f94 1521 name = h->root.string;
5d3236ee 1522 if (info->notice_hash != NULL
9e2278f5 1523 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1524 {
1525 if (bfd_is_und_section (section))
df5f2391 1526 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
252b5132 1527 else
df5f2391 1528 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
252b5132
RH
1529 }
1530
1531 if (command_line.cref || nocrossref_list != NULL)
1532 add_cref (name, abfd, section, value);
1533
b34976b6 1534 return TRUE;
252b5132 1535}
This page took 0.952457 seconds and 4 git commands to generate.