gdb/testsuite/
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
4e5bae56 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
e922bcab 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
252b5132
RH
4 Free Software Foundation, Inc.
5 Written by Steve Chamberlain steve@cygnus.com
6
f96b4a7b 7 This file is part of the GNU Binutils.
252b5132 8
f96b4a7b 9 This program is free software; you can redistribute it and/or modify
2fa9fc65 10 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
252b5132 13
f96b4a7b 14 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
2fa9fc65 19 You should have received a copy of the GNU General Public License
f96b4a7b
NC
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
3882b010 26#include "safe-ctype.h"
252b5132
RH
27#include "libiberty.h"
28#include "progress.h"
29#include "bfdlink.h"
5af11cab 30#include "filenames.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
46#include "libbfd.h"
47#endif /* ENABLE_PLUGINS */
252b5132 48
0125cdf2 49/* Somewhere above, sys/stat.h got included. */
252b5132
RH
50#if !defined(S_ISDIR) && defined(S_IFDIR)
51#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
52#endif
53
54#include <string.h>
55
56#ifdef HAVE_SBRK
502bdb00 57#if !HAVE_DECL_SBRK
1579bae1 58extern void *sbrk ();
252b5132
RH
59#endif
60#endif
61
9c8ebd6a
DJ
62#ifndef TARGET_SYSTEM_ROOT
63#define TARGET_SYSTEM_ROOT ""
64#endif
65
252b5132
RH
66/* EXPORTS */
67
53d25da6
AM
68FILE *saved_script_handle = NULL;
69FILE *previous_script_handle = NULL;
70bfd_boolean force_make_executable = FALSE;
71
252b5132
RH
72char *default_target;
73const char *output_filename = "a.out";
74
75/* Name this program was invoked by. */
76char *program_name;
77
9c8ebd6a 78/* The prefix for system library directories. */
e2243057 79const char *ld_sysroot;
9c8ebd6a 80
3fe38064
NC
81/* The canonical representation of ld_sysroot. */
82char * ld_canon_sysroot;
83int ld_canon_sysroot_len;
84
252b5132
RH
85/* Set by -G argument, for MIPS ECOFF target. */
86int g_switch_value = 8;
87
88/* Nonzero means print names of input files as processed. */
b34976b6 89bfd_boolean trace_files;
252b5132
RH
90
91/* Nonzero means same, but note open failures, too. */
b34976b6 92bfd_boolean trace_file_tries;
252b5132
RH
93
94/* Nonzero means version number was printed, so exit successfully
95 instead of complaining if no input files are given. */
b34976b6 96bfd_boolean version_printed;
252b5132
RH
97
98/* Nonzero means link in every member of an archive. */
b34976b6 99bfd_boolean whole_archive;
252b5132 100
ddbb8a31
NC
101/* True means only create DT_NEEDED entries for dynamic libraries
102 if they actually satisfy some reference in a regular object. */
103bfd_boolean add_DT_NEEDED_for_regular;
104
105/* True means create DT_NEEDED entries for dynamic libraries that
106 are DT_NEEDED by dynamic libraries specifically mentioned on
107 the command line. */
08efffb8 108bfd_boolean add_DT_NEEDED_for_dynamic;
e56f61be 109
b34976b6
AM
110/* TRUE if we should demangle symbol names. */
111bfd_boolean demangling;
252b5132
RH
112
113args_type command_line;
114
115ld_config_type config;
116
bcaa7b3e
L
117sort_type sort_section;
118
e2243057
RS
119static const char *get_sysroot
120 (int, char **);
0125cdf2 121static char *get_emulation
1579bae1 122 (int, char **);
0125cdf2 123static bfd_boolean add_archive_element
5d3236ee 124 (struct bfd_link_info *, bfd *, const char *, bfd **);
0125cdf2 125static bfd_boolean multiple_definition
24f58f47 126 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 127 bfd *, asection *, bfd_vma);
0125cdf2 128static bfd_boolean multiple_common
24f58f47
AM
129 (struct bfd_link_info *, struct bfd_link_hash_entry *,
130 bfd *, enum bfd_link_hash_type, bfd_vma);
0125cdf2 131static bfd_boolean add_to_set
1579bae1
AM
132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
133 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
0125cdf2 134static bfd_boolean constructor_callback
1579bae1
AM
135 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
136 asection *, bfd_vma);
0125cdf2 137static bfd_boolean warning_callback
1579bae1
AM
138 (struct bfd_link_info *, const char *, const char *, bfd *,
139 asection *, bfd_vma);
0125cdf2 140static void warning_find_reloc
1579bae1 141 (bfd *, asection *, void *);
0125cdf2 142static bfd_boolean undefined_symbol
1579bae1
AM
143 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
144 bfd_boolean);
0125cdf2 145static bfd_boolean reloc_overflow
dfeffb9f
L
146 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
147 const char *, bfd_vma, bfd *, asection *, bfd_vma);
0125cdf2 148static bfd_boolean reloc_dangerous
1579bae1 149 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 150static bfd_boolean unattached_reloc
1579bae1 151 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 152static bfd_boolean notice
35ed3f94 153 (struct bfd_link_info *, struct bfd_link_hash_entry *,
16d96b5b 154 bfd *, asection *, bfd_vma, flagword, const char *);
0125cdf2
NC
155
156static struct bfd_link_callbacks link_callbacks =
157{
252b5132
RH
158 add_archive_element,
159 multiple_definition,
160 multiple_common,
161 add_to_set,
162 constructor_callback,
163 warning_callback,
164 undefined_symbol,
165 reloc_overflow,
166 reloc_dangerous,
167 unattached_reloc,
e1fffbe6 168 notice,
2889e75b 169 einfo,
49fa1e15
AM
170 info_msg,
171 minfo,
2889e75b 172 ldlang_override_segment_assignment
252b5132
RH
173};
174
175struct bfd_link_info link_info;
176\f
177static void
498cd2a0 178ld_cleanup (void)
252b5132 179{
498cd2a0
AM
180 bfd_cache_close_all ();
181#ifdef ENABLE_PLUGINS
182 plugin_call_cleanup ();
183#endif
184 if (output_filename && delete_output_file_on_failure)
185 unlink_if_ordinary (output_filename);
252b5132
RH
186}
187
188int
1579bae1 189main (int argc, char **argv)
252b5132
RH
190{
191 char *emulation;
192 long start_time = get_run_time ();
193
194#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
195 setlocale (LC_MESSAGES, "");
3882b010
L
196#endif
197#if defined (HAVE_SETLOCALE)
198 setlocale (LC_CTYPE, "");
252b5132
RH
199#endif
200 bindtextdomain (PACKAGE, LOCALEDIR);
201 textdomain (PACKAGE);
202
203 program_name = argv[0];
204 xmalloc_set_program_name (program_name);
205
206 START_PROGRESS (program_name, 0);
207
869b9d07
MM
208 expandargv (&argc, &argv);
209
252b5132
RH
210 bfd_init ();
211
212 bfd_set_error_program_name (program_name);
213
498cd2a0 214 xatexit (ld_cleanup);
252b5132 215
e2243057
RS
216 /* Set up the sysroot directory. */
217 ld_sysroot = get_sysroot (argc, argv);
218 if (*ld_sysroot)
9c8ebd6a 219 {
e2243057 220 if (*TARGET_SYSTEM_ROOT == 0)
9c8ebd6a 221 {
70487fb2 222 einfo ("%P%F: this linker was not configured to use sysroots\n");
e2243057 223 ld_sysroot = "";
0125cdf2 224 }
e2243057
RS
225 else
226 ld_canon_sysroot = lrealpath (ld_sysroot);
0125cdf2 227 }
3fe38064
NC
228 if (ld_canon_sysroot)
229 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
230 else
231 ld_canon_sysroot_len = -1;
232
252b5132
RH
233 /* Set the default BFD target based on the configured target. Doing
234 this permits the linker to be configured for a particular target,
235 and linked against a shared BFD library which was configured for
236 a different target. The macro TARGET is defined by Makefile. */
237 if (! bfd_set_default_target (TARGET))
238 {
239 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
240 xexit (1);
241 }
242
b47c4208
AM
243#if YYDEBUG
244 {
245 extern int yydebug;
246 yydebug = 1;
247 }
248#endif
249
b34976b6 250 config.build_constructors = TRUE;
c76308d2 251 config.rpath_separator = ':';
a854a4a7
AM
252 config.split_by_reloc = (unsigned) -1;
253 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
254 config.make_executable = TRUE;
255 config.magic_demand_paged = TRUE;
256 config.text_read_only = TRUE;
257
b34976b6 258 command_line.warn_mismatch = TRUE;
fe7929ce 259 command_line.warn_search_mismatch = TRUE;
02b0b1aa 260 command_line.check_section_addresses = -1;
28d5f677 261 command_line.disable_target_specific_optimizations = -1;
bcaa7b3e 262
252b5132
RH
263 /* We initialize DEMANGLING based on the environment variable
264 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
265 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
266 environment. Acting the same way here lets us provide the same
267 interface by default. */
268 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
269
b34976b6 270 link_info.allow_undefined_version = TRUE;
b5067602 271 link_info.keep_memory = TRUE;
b5067602 272 link_info.combreloc = TRUE;
d5cd3933 273 link_info.strip_discarded = TRUE;
fdc90cb4 274 link_info.emit_hash = TRUE;
a9a4c53e
AM
275 link_info.callbacks = &link_callbacks;
276 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
277 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
278 and _fini symbols. We are compatible. */
279 link_info.init_function = "_init";
280 link_info.fini_function = "_fini";
a9a4c53e 281 link_info.relax_pass = 1;
e0076ab3 282 link_info.pei386_auto_import = -1;
db6751f2 283 link_info.spare_dynamic_tags = 5;
967928e9 284 link_info.path_separator = ':';
24718e3b 285
252b5132 286 ldfile_add_arch ("");
252b5132
RH
287 emulation = get_emulation (argc, argv);
288 ldemul_choose_mode (emulation);
742aeb63 289 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
290 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
291 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132
RH
292 lang_init ();
293 ldemul_before_parse ();
b34976b6 294 lang_has_input_file = FALSE;
252b5132
RH
295 parse_args (argc, argv);
296
2d643429
NC
297 if (config.hash_table_size != 0)
298 bfd_hash_set_default_size (config.hash_table_size);
299
9bbc1a67
AM
300#ifdef ENABLE_PLUGINS
301 /* Now all the plugin arguments have been gathered, we can load them. */
302 if (plugin_load_plugins ())
303 einfo (_("%P%F: %s: error loading plugin\n"), plugin_error_plugin ());
304#endif /* ENABLE_PLUGINS */
36af4a4e 305
9bbc1a67 306 ldemul_set_symbols ();
252b5132 307
14be8564
L
308 /* If we have not already opened and parsed a linker script,
309 try the default script from command line first. */
310 if (saved_script_handle == NULL
311 && command_line.default_script != NULL)
312 {
313 ldfile_open_command_file (command_line.default_script);
314 parser_input = input_script;
315 yyparse ();
316 }
317
b9a8de1e
NC
318 /* If we have not already opened and parsed a linker script
319 read the emulation's appropriate default script. */
b90e1c6f 320 if (saved_script_handle == NULL)
252b5132 321 {
252b5132 322 int isfile;
b7a26f91 323 char *s = ldemul_get_script (&isfile);
252b5132
RH
324
325 if (isfile)
7d24f02c 326 ldfile_open_default_command_file (s);
252b5132 327 else
b7a26f91 328 {
252b5132
RH
329 lex_string = s;
330 lex_redirect (s);
331 }
332 parser_input = input_script;
333 yyparse ();
334 lex_string = NULL;
335 }
336
b9a8de1e
NC
337 if (trace_file_tries)
338 {
9cb61eab
AM
339 if (saved_script_handle)
340 info_msg (_("using external linker script:"));
341 else
342 info_msg (_("using internal linker script:"));
343 info_msg ("\n==================================================\n");
b9a8de1e
NC
344
345 if (saved_script_handle)
346 {
74699268 347 static const int ld_bufsz = 8193;
b9a8de1e 348 size_t n;
1e9cc1c2 349 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
350
351 rewind (saved_script_handle);
74699268 352 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 353 {
b7a26f91 354 buf[n] = 0;
b9a8de1e
NC
355 info_msg (buf);
356 }
357 rewind (saved_script_handle);
358 free (buf);
359 }
360 else
361 {
362 int isfile;
363
b7a26f91 364 info_msg (ldemul_get_script (&isfile));
b9a8de1e 365 }
b7a26f91 366
b9a8de1e
NC
367 info_msg ("\n==================================================\n");
368 }
369
30824704
RM
370 if (command_line.print_output_format)
371 info_msg ("%s\n", lang_get_output_target ());
372
252b5132
RH
373 lang_final ();
374
b34976b6 375 if (!lang_has_input_file)
252b5132 376 {
30824704 377 if (version_printed || command_line.print_output_format)
252b5132
RH
378 xexit (0);
379 einfo (_("%P%F: no input files\n"));
380 }
381
382 if (trace_files)
0125cdf2 383 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
384
385 ldemul_after_parse ();
386
252b5132
RH
387 if (config.map_filename)
388 {
389 if (strcmp (config.map_filename, "-") == 0)
390 {
391 config.map_file = stdout;
392 }
393 else
394 {
395 config.map_file = fopen (config.map_filename, FOPEN_WT);
396 if (config.map_file == (FILE *) NULL)
397 {
398 bfd_set_error (bfd_error_system_call);
399 einfo (_("%P%F: cannot open map file %s: %E\n"),
400 config.map_filename);
401 }
402 }
403 }
404
252b5132
RH
405 lang_process ();
406
407 /* Print error messages for any missing symbols, for any warning
6d5e62f8 408 symbols, and possibly multiple definitions. */
1049f94e 409 if (link_info.relocatable)
f13a99db 410 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 411 else
f13a99db 412 link_info.output_bfd->flags |= EXEC_P;
252b5132
RH
413
414 ldwrite ();
415
416 if (config.map_file != NULL)
417 lang_map ();
418 if (command_line.cref)
419 output_cref (config.map_file != NULL ? config.map_file : stdout);
420 if (nocrossref_list != NULL)
421 check_nocrossrefs ();
422
750877ba
L
423 lang_finish ();
424
1049f94e 425 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 426 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 427 want to ignore for relocatable output?) */
b34976b6 428 if (!config.make_executable && !force_make_executable)
252b5132 429 {
b34976b6 430 if (trace_files)
0125cdf2
NC
431 einfo (_("%P: link errors found, deleting executable `%s'\n"),
432 output_filename);
252b5132 433
4309cbf2 434 /* The file will be removed by ld_cleanup. */
252b5132
RH
435 xexit (1);
436 }
437 else
438 {
f13a99db
AM
439 if (! bfd_close (link_info.output_bfd))
440 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
441
442 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
443 executable file and it doesn't end in .exe, copy it to one
444 which does. */
1049f94e 445 if (! link_info.relocatable && command_line.force_exe_suffix)
252b5132
RH
446 {
447 int len = strlen (output_filename);
0125cdf2 448
6d5e62f8 449 if (len < 4
252b5132
RH
450 || (strcasecmp (output_filename + len - 4, ".exe") != 0
451 && strcasecmp (output_filename + len - 4, ".dll") != 0))
452 {
453 FILE *src;
454 FILE *dst;
455 const int bsize = 4096;
1e9cc1c2 456 char *buf = (char *) xmalloc (bsize);
252b5132 457 int l;
1e9cc1c2 458 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 459
252b5132
RH
460 strcpy (dst_name, output_filename);
461 strcat (dst_name, ".exe");
462 src = fopen (output_filename, FOPEN_RB);
463 dst = fopen (dst_name, FOPEN_WB);
464
465 if (!src)
1579bae1
AM
466 einfo (_("%X%P: unable to open for source of copy `%s'\n"),
467 output_filename);
252b5132 468 if (!dst)
1579bae1
AM
469 einfo (_("%X%P: unable to open for destination of copy `%s'\n"),
470 dst_name);
252b5132
RH
471 while ((l = fread (buf, 1, bsize, src)) > 0)
472 {
473 int done = fwrite (buf, 1, l, dst);
0125cdf2 474
252b5132 475 if (done != l)
0125cdf2 476 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 477 }
0125cdf2 478
252b5132
RH
479 fclose (src);
480 if (fclose (dst) == EOF)
0125cdf2 481 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
482 free (dst_name);
483 free (buf);
484 }
485 }
486 }
487
488 END_PROGRESS (program_name);
489
490 if (config.stats)
491 {
492#ifdef HAVE_SBRK
1e9cc1c2 493 char *lim = (char *) sbrk (0);
252b5132
RH
494#endif
495 long run_time = get_run_time () - start_time;
496
e922bcab 497 fflush (stdout);
252b5132
RH
498 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
499 program_name, run_time / 1000000, run_time % 1000000);
500#ifdef HAVE_SBRK
501 fprintf (stderr, _("%s: data size %ld\n"), program_name,
502 (long) (lim - (char *) &environ));
503#endif
e922bcab 504 fflush (stderr);
252b5132
RH
505 }
506
4309cbf2 507 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
508 output_filename = NULL;
509
510 xexit (0);
511 return 0;
512}
513
e2243057
RS
514/* If the configured sysroot is relocatable, try relocating it based on
515 default prefix FROM. Return the relocated directory if it exists,
516 otherwise return null. */
517
518static char *
519get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
520{
521#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
522 char *path;
523 struct stat s;
524
525 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
526 if (path)
527 {
528 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
529 return path;
530 free (path);
531 }
532#endif
533 return 0;
534}
535
536/* Return the sysroot directory. Return "" if no sysroot is being used. */
537
538static const char *
539get_sysroot (int argc, char **argv)
540{
541 int i;
542 const char *path;
543
544 for (i = 1; i < argc; i++)
0112cd26 545 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
546 return argv[i] + strlen ("--sysroot=");
547
548 path = get_relative_sysroot (BINDIR);
549 if (path)
550 return path;
551
552 path = get_relative_sysroot (TOOLBINDIR);
553 if (path)
554 return path;
555
556 return TARGET_SYSTEM_ROOT;
557}
558
252b5132
RH
559/* We need to find any explicitly given emulation in order to initialize the
560 state that's needed by the lex&yacc argument parser (parse_args). */
561
562static char *
1579bae1 563get_emulation (int argc, char **argv)
252b5132
RH
564{
565 char *emulation;
566 int i;
567
568 emulation = getenv (EMULATION_ENVIRON);
569 if (emulation == NULL)
570 emulation = DEFAULT_EMULATION;
571
572 for (i = 1; i < argc; i++)
573 {
0112cd26 574 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
575 {
576 if (argv[i][2] == '\0')
577 {
578 /* -m EMUL */
579 if (i < argc - 1)
580 {
581 emulation = argv[i + 1];
582 i++;
583 }
584 else
0125cdf2 585 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
586 }
587 else if (strcmp (argv[i], "-mips1") == 0
588 || strcmp (argv[i], "-mips2") == 0
589 || strcmp (argv[i], "-mips3") == 0
d1cf510e 590 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
591 || strcmp (argv[i], "-mips5") == 0
592 || strcmp (argv[i], "-mips32") == 0
593 || strcmp (argv[i], "-mips32r2") == 0
5f74bc13
CD
594 || strcmp (argv[i], "-mips64") == 0
595 || strcmp (argv[i], "-mips64r2") == 0)
252b5132 596 {
31d677f9 597 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
598 passed to the linker by some MIPS compilers. They
599 generally tell the linker to use a slightly different
600 library path. Perhaps someday these should be
601 implemented as emulations; until then, we just ignore
602 the arguments and hope that nobody ever creates
603 emulations named ips1, ips2 or ips3. */
604 }
605 else if (strcmp (argv[i], "-m486") == 0)
606 {
607 /* FIXME: The argument -m486 is passed to the linker on
608 some Linux systems. Hope that nobody creates an
609 emulation named 486. */
610 }
611 else
612 {
613 /* -mEMUL */
614 emulation = &argv[i][2];
615 }
616 }
617 }
618
619 return emulation;
620}
621
252b5132 622void
1579bae1 623add_ysym (const char *name)
252b5132 624{
1579bae1 625 if (link_info.notice_hash == NULL)
252b5132 626 {
1e9cc1c2
NC
627 link_info.notice_hash =
628 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
629 if (!bfd_hash_table_init_n (link_info.notice_hash,
630 bfd_hash_newfunc,
631 sizeof (struct bfd_hash_entry),
632 61))
252b5132 633 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 634 }
252b5132 635
1579bae1 636 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
637 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
638}
639
640/* Record a symbol to be wrapped, from the --wrap option. */
641
642void
1579bae1 643add_wrap (const char *name)
252b5132
RH
644{
645 if (link_info.wrap_hash == NULL)
646 {
1e9cc1c2
NC
647 link_info.wrap_hash =
648 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
649 if (!bfd_hash_table_init_n (link_info.wrap_hash,
650 bfd_hash_newfunc,
651 sizeof (struct bfd_hash_entry),
652 61))
252b5132
RH
653 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
654 }
0125cdf2 655
b34976b6 656 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
657 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
658}
659
660/* Handle the -retain-symbols-file option. */
661
662void
1579bae1 663add_keepsyms_file (const char *filename)
252b5132
RH
664{
665 FILE *file;
666 char *buf;
667 size_t bufsize;
668 int c;
669
670 if (link_info.strip == strip_some)
671 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
672
673 file = fopen (filename, "r");
1579bae1 674 if (file == NULL)
252b5132
RH
675 {
676 bfd_set_error (bfd_error_system_call);
677 einfo ("%X%P: %s: %E\n", filename);
678 return;
679 }
680
1e9cc1c2
NC
681 link_info.keep_hash = (struct bfd_hash_table *)
682 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
683 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
684 sizeof (struct bfd_hash_entry)))
252b5132
RH
685 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
686
687 bufsize = 100;
1e9cc1c2 688 buf = (char *) xmalloc (bufsize);
252b5132
RH
689
690 c = getc (file);
691 while (c != EOF)
692 {
3882b010 693 while (ISSPACE (c))
252b5132
RH
694 c = getc (file);
695
696 if (c != EOF)
697 {
698 size_t len = 0;
699
3882b010 700 while (! ISSPACE (c) && c != EOF)
252b5132
RH
701 {
702 buf[len] = c;
703 ++len;
704 if (len >= bufsize)
705 {
706 bufsize *= 2;
1e9cc1c2 707 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
708 }
709 c = getc (file);
710 }
711
712 buf[len] = '\0';
713
1579bae1 714 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
715 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
716 }
717 }
718
719 if (link_info.strip != strip_none)
720 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
721
5ed6aba4 722 free (buf);
252b5132
RH
723 link_info.strip = strip_some;
724}
725\f
726/* Callbacks from the BFD linker routines. */
727
728/* This is called when BFD has decided to include an archive member in
729 a link. */
730
b34976b6 731static bfd_boolean
e1fffbe6 732add_archive_element (struct bfd_link_info *info,
1579bae1 733 bfd *abfd,
5d3236ee
DK
734 const char *name,
735 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
736{
737 lang_input_statement_type *input;
5d3236ee 738 lang_input_statement_type orig_input;
252b5132 739
1e9cc1c2
NC
740 input = (lang_input_statement_type *)
741 xcalloc (1, sizeof (lang_input_statement_type));
252b5132
RH
742 input->filename = abfd->filename;
743 input->local_sym_name = abfd->filename;
744 input->the_bfd = abfd;
252b5132 745
5d3236ee
DK
746 /* Save the original data for trace files/tries below, as plugins
747 (if enabled) may possibly alter it to point to a replacement
748 BFD, but we still want to output the original BFD filename. */
749 orig_input = *input;
750#ifdef ENABLE_PLUGINS
2b7e4308 751 if (plugin_active_plugins_p () && !no_more_claiming)
5d3236ee
DK
752 {
753 /* We must offer this archive member to the plugins to claim. */
2b7e4308
L
754 const char *filename = (bfd_my_archive (abfd) != NULL
755 ? bfd_my_archive (abfd)->filename : abfd->filename);
756 int fd = open (filename, O_RDONLY | O_BINARY);
5d3236ee
DK
757 if (fd >= 0)
758 {
759 struct ld_plugin_input_file file;
02d00247 760
5d3236ee
DK
761 /* Offset and filesize must refer to the individual archive
762 member, not the whole file, and must exclude the header.
763 Fortunately for us, that is how the data is stored in the
764 origin field of the bfd and in the arelt_data. */
2b7e4308 765 file.name = filename;
5d3236ee
DK
766 file.offset = abfd->origin;
767 file.filesize = arelt_size (abfd);
768 file.fd = fd;
02d00247
AM
769 plugin_maybe_claim (&file, input);
770 if (input->claimed)
5d3236ee 771 {
8543fde5 772 input->claim_archive = TRUE;
5d3236ee
DK
773 *subsbfd = input->the_bfd;
774 }
5d3236ee
DK
775 }
776 }
777#endif /* ENABLE_PLUGINS */
778
252b5132
RH
779 ldlang_add_file (input);
780
1579bae1 781 if (config.map_file != NULL)
252b5132 782 {
b34976b6 783 static bfd_boolean header_printed;
252b5132
RH
784 struct bfd_link_hash_entry *h;
785 bfd *from;
786 int len;
787
e1fffbe6 788 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
789
790 if (h == NULL)
791 from = NULL;
792 else
793 {
794 switch (h->type)
795 {
796 default:
797 from = NULL;
798 break;
799
800 case bfd_link_hash_defined:
801 case bfd_link_hash_defweak:
802 from = h->u.def.section->owner;
803 break;
804
805 case bfd_link_hash_undefined:
806 case bfd_link_hash_undefweak:
807 from = h->u.undef.abfd;
808 break;
809
810 case bfd_link_hash_common:
811 from = h->u.c.p->section->owner;
812 break;
813 }
814 }
815
816 if (! header_printed)
817 {
818 char buf[100];
819
e3c8793a 820 sprintf (buf, _("Archive member included because of file (symbol)\n\n"));
252b5132 821 minfo ("%s", buf);
b34976b6 822 header_printed = TRUE;
252b5132
RH
823 }
824
825 if (bfd_my_archive (abfd) == NULL)
826 {
827 minfo ("%s", bfd_get_filename (abfd));
828 len = strlen (bfd_get_filename (abfd));
829 }
830 else
831 {
832 minfo ("%s(%s)", bfd_get_filename (bfd_my_archive (abfd)),
833 bfd_get_filename (abfd));
834 len = (strlen (bfd_get_filename (bfd_my_archive (abfd)))
835 + strlen (bfd_get_filename (abfd))
836 + 2);
837 }
838
839 if (len >= 29)
840 {
841 print_nl ();
842 len = 0;
843 }
844 while (len < 30)
845 {
846 print_space ();
847 ++len;
848 }
849
850 if (from != NULL)
851 minfo ("%B ", from);
852 if (h != NULL)
853 minfo ("(%T)\n", h->root.string);
854 else
855 minfo ("(%s)\n", name);
856 }
857
858 if (trace_files || trace_file_tries)
5d3236ee 859 info_msg ("%I\n", &orig_input);
b34976b6 860 return TRUE;
252b5132
RH
861}
862
863/* This is called when BFD has discovered a symbol which is defined
864 multiple times. */
865
b34976b6 866static bfd_boolean
24f58f47
AM
867multiple_definition (struct bfd_link_info *info,
868 struct bfd_link_hash_entry *h,
1579bae1
AM
869 bfd *nbfd,
870 asection *nsec,
871 bfd_vma nval)
252b5132 872{
24f58f47
AM
873 const char *name;
874 bfd *obfd;
875 asection *osec;
876 bfd_vma oval;
877
878 if (info->allow_multiple_definition)
879 return TRUE;
880
881 switch (h->type)
882 {
883 case bfd_link_hash_defined:
884 osec = h->u.def.section;
885 oval = h->u.def.value;
886 obfd = h->u.def.section->owner;
887 break;
888 case bfd_link_hash_indirect:
889 osec = bfd_ind_section_ptr;
890 oval = 0;
891 obfd = NULL;
892 break;
893 default:
894 abort ();
895 }
896
897 /* Ignore a redefinition of an absolute symbol to the
898 same value; it's harmless. */
899 if (h->type == bfd_link_hash_defined
900 && bfd_is_abs_section (osec)
901 && bfd_is_abs_section (nsec)
902 && nval == oval)
903 return TRUE;
904
252b5132
RH
905 /* If either section has the output_section field set to
906 bfd_abs_section_ptr, it means that the section is being
907 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
908 FIXME: It would be cleaner to somehow ignore symbols defined in
909 sections which are being discarded. */
252b5132
RH
910 if ((osec->output_section != NULL
911 && ! bfd_is_abs_section (osec)
912 && bfd_is_abs_section (osec->output_section))
913 || (nsec->output_section != NULL
914 && ! bfd_is_abs_section (nsec)
915 && bfd_is_abs_section (nsec->output_section)))
b34976b6 916 return TRUE;
252b5132 917
24f58f47
AM
918 name = h->root.string;
919 if (nbfd == NULL)
920 {
921 nbfd = obfd;
922 nsec = osec;
923 nval = oval;
924 obfd = NULL;
925 }
252b5132
RH
926 einfo (_("%X%C: multiple definition of `%T'\n"),
927 nbfd, nsec, nval, name);
1579bae1 928 if (obfd != NULL)
252b5132 929 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 930
28d5f677 931 if (RELAXATION_ENABLED)
9b14b192
NC
932 {
933 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
28d5f677 934 command_line.disable_target_specific_optimizations = -1;
9b14b192 935 }
6d5e62f8 936
b34976b6 937 return TRUE;
252b5132
RH
938}
939
940/* This is called when there is a definition of a common symbol, or
941 when a common symbol is found for a symbol that is already defined,
942 or when two common symbols are found. We only do something if
943 -warn-common was used. */
944
b34976b6 945static bfd_boolean
1579bae1 946multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 947 struct bfd_link_hash_entry *h,
1579bae1
AM
948 bfd *nbfd,
949 enum bfd_link_hash_type ntype,
950 bfd_vma nsize)
252b5132 951{
24f58f47
AM
952 const char *name;
953 bfd *obfd;
954 enum bfd_link_hash_type otype;
955 bfd_vma osize;
956
957 if (!config.warn_common)
b34976b6 958 return TRUE;
252b5132 959
24f58f47
AM
960 name = h->root.string;
961 otype = h->type;
962 if (otype == bfd_link_hash_common)
963 {
964 obfd = h->u.c.p->section->owner;
965 osize = h->u.c.size;
966 }
967 else if (otype == bfd_link_hash_defined
968 || otype == bfd_link_hash_defweak)
969 {
970 obfd = h->u.def.section->owner;
971 osize = 0;
972 }
973 else
974 {
975 /* FIXME: It would nice if we could report the BFD which defined
976 an indirect symbol, but we don't have anywhere to store the
977 information. */
978 obfd = NULL;
979 osize = 0;
980 }
981
252b5132
RH
982 if (ntype == bfd_link_hash_defined
983 || ntype == bfd_link_hash_defweak
984 || ntype == bfd_link_hash_indirect)
985 {
986 ASSERT (otype == bfd_link_hash_common);
987 einfo (_("%B: warning: definition of `%T' overriding common\n"),
988 nbfd, name);
989 if (obfd != NULL)
990 einfo (_("%B: warning: common is here\n"), obfd);
991 }
992 else if (otype == bfd_link_hash_defined
993 || otype == bfd_link_hash_defweak
994 || otype == bfd_link_hash_indirect)
995 {
996 ASSERT (ntype == bfd_link_hash_common);
997 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
998 nbfd, name);
999 if (obfd != NULL)
1000 einfo (_("%B: warning: defined here\n"), obfd);
1001 }
1002 else
1003 {
1004 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1005 if (osize > nsize)
1006 {
1007 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1008 nbfd, name);
1009 if (obfd != NULL)
1010 einfo (_("%B: warning: larger common is here\n"), obfd);
1011 }
1012 else if (nsize > osize)
1013 {
1014 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1015 nbfd, name);
1016 if (obfd != NULL)
1017 einfo (_("%B: warning: smaller common is here\n"), obfd);
1018 }
1019 else
1020 {
1021 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1022 if (obfd != NULL)
1023 einfo (_("%B: warning: previous common is here\n"), obfd);
1024 }
1025 }
1026
b34976b6 1027 return TRUE;
252b5132
RH
1028}
1029
1030/* This is called when BFD has discovered a set element. H is the
1031 entry in the linker hash table for the set. SECTION and VALUE
1032 represent a value which should be added to the set. */
1033
b34976b6 1034static bfd_boolean
1579bae1
AM
1035add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1036 struct bfd_link_hash_entry *h,
1037 bfd_reloc_code_real_type reloc,
1038 bfd *abfd,
1039 asection *section,
1040 bfd_vma value)
252b5132
RH
1041{
1042 if (config.warn_constructors)
1043 einfo (_("%P: warning: global constructor %s used\n"),
1044 h->root.string);
1045
1046 if (! config.build_constructors)
b34976b6 1047 return TRUE;
252b5132 1048
1579bae1 1049 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1050
1051 if (h->type == bfd_link_hash_new)
1052 {
1053 h->type = bfd_link_hash_undefined;
1054 h->u.undef.abfd = abfd;
1055 /* We don't call bfd_link_add_undef to add this to the list of
1056 undefined symbols because we are going to define it
1057 ourselves. */
1058 }
1059
b34976b6 1060 return TRUE;
252b5132
RH
1061}
1062
1063/* This is called when BFD has discovered a constructor. This is only
1064 called for some object file formats--those which do not handle
1065 constructors in some more clever fashion. This is similar to
1066 adding an element to a set, but less general. */
1067
b34976b6 1068static bfd_boolean
1579bae1
AM
1069constructor_callback (struct bfd_link_info *info,
1070 bfd_boolean constructor,
1071 const char *name,
1072 bfd *abfd,
1073 asection *section,
1074 bfd_vma value)
252b5132
RH
1075{
1076 char *s;
1077 struct bfd_link_hash_entry *h;
1078 char set_name[1 + sizeof "__CTOR_LIST__"];
1079
1080 if (config.warn_constructors)
1081 einfo (_("%P: warning: global constructor %s used\n"), name);
1082
1083 if (! config.build_constructors)
b34976b6 1084 return TRUE;
252b5132
RH
1085
1086 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1087 useful error message. */
f13a99db 1088 if (bfd_reloc_type_lookup (link_info.output_bfd, BFD_RELOC_CTOR) == NULL
e1fffbe6 1089 && (info->relocatable
252b5132
RH
1090 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1091 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1092
1093 s = set_name;
1094 if (bfd_get_symbol_leading_char (abfd) != '\0')
1095 *s++ = bfd_get_symbol_leading_char (abfd);
1096 if (constructor)
1097 strcpy (s, "__CTOR_LIST__");
1098 else
1099 strcpy (s, "__DTOR_LIST__");
1100
b34976b6 1101 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1102 if (h == (struct bfd_link_hash_entry *) NULL)
1103 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1104 if (h->type == bfd_link_hash_new)
1105 {
1106 h->type = bfd_link_hash_undefined;
1107 h->u.undef.abfd = abfd;
1108 /* We don't call bfd_link_add_undef to add this to the list of
1109 undefined symbols because we are going to define it
1110 ourselves. */
1111 }
1112
1113 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
b34976b6 1114 return TRUE;
252b5132
RH
1115}
1116
1117/* A structure used by warning_callback to pass information through
1118 bfd_map_over_sections. */
1119
0125cdf2
NC
1120struct warning_callback_info
1121{
b34976b6 1122 bfd_boolean found;
252b5132
RH
1123 const char *warning;
1124 const char *symbol;
1125 asymbol **asymbols;
1126};
1127
1128/* This is called when there is a reference to a warning symbol. */
1129
b34976b6 1130static bfd_boolean
1579bae1
AM
1131warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1132 const char *warning,
1133 const char *symbol,
1134 bfd *abfd,
1135 asection *section,
1136 bfd_vma address)
252b5132
RH
1137{
1138 /* This is a hack to support warn_multiple_gp. FIXME: This should
1139 have a cleaner interface, but what? */
1140 if (! config.warn_multiple_gp
1141 && strcmp (warning, "using multiple gp values") == 0)
b34976b6 1142 return TRUE;
252b5132
RH
1143
1144 if (section != NULL)
300475fe 1145 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1146 else if (abfd == NULL)
300475fe 1147 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1148 else if (symbol == NULL)
300475fe 1149 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1150 else
1151 {
91d6fa6a 1152 struct warning_callback_info cinfo;
252b5132
RH
1153
1154 /* Look through the relocs to see if we can find a plausible
1155 address. */
5c1d2f5f
AM
1156
1157 if (!bfd_generic_link_read_symbols (abfd))
1158 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
252b5132 1159
91d6fa6a
NC
1160 cinfo.found = FALSE;
1161 cinfo.warning = warning;
1162 cinfo.symbol = symbol;
1163 cinfo.asymbols = bfd_get_outsymbols (abfd);
1164 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
252b5132 1165
91d6fa6a 1166 if (! cinfo.found)
300475fe 1167 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1168 }
1169
b34976b6 1170 return TRUE;
252b5132
RH
1171}
1172
1173/* This is called by warning_callback for each section. It checks the
1174 relocs of the section to see if it can find a reference to the
1175 symbol which triggered the warning. If it can, it uses the reloc
1176 to give an error message with a file and line number. */
1177
1178static void
1579bae1 1179warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1180{
1e9cc1c2 1181 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1182 long relsize;
1183 arelent **relpp;
1184 long relcount;
1185 arelent **p, **pend;
1186
1187 if (info->found)
1188 return;
1189
1190 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1191 if (relsize < 0)
1192 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1193 if (relsize == 0)
1194 return;
1195
1e9cc1c2 1196 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1197 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1198 if (relcount < 0)
1199 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1200
1201 p = relpp;
1202 pend = p + relcount;
1203 for (; p < pend && *p != NULL; p++)
1204 {
1205 arelent *q = *p;
1206
1207 if (q->sym_ptr_ptr != NULL
1208 && *q->sym_ptr_ptr != NULL
1209 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1210 {
1211 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1212 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1213 info->warning);
b34976b6 1214 info->found = TRUE;
252b5132
RH
1215 break;
1216 }
1217 }
1218
1219 free (relpp);
1220}
1221
1222/* This is called when an undefined symbol is found. */
1223
b34976b6 1224static bfd_boolean
1579bae1
AM
1225undefined_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1226 const char *name,
1227 bfd *abfd,
1228 asection *section,
1229 bfd_vma address,
0b28295d 1230 bfd_boolean error)
252b5132
RH
1231{
1232 static char *error_name;
1233 static unsigned int error_count;
1234
1235#define MAX_ERRORS_IN_A_ROW 5
1236
1237 if (config.warn_once)
1238 {
1239 static struct bfd_hash_table *hash;
1240
1241 /* Only warn once about a particular undefined symbol. */
252b5132
RH
1242 if (hash == NULL)
1243 {
1e9cc1c2
NC
1244 hash = (struct bfd_hash_table *)
1245 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
1246 if (!bfd_hash_table_init (hash, bfd_hash_newfunc,
1247 sizeof (struct bfd_hash_entry)))
252b5132
RH
1248 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
1249 }
1250
b34976b6
AM
1251 if (bfd_hash_lookup (hash, name, FALSE, FALSE) != NULL)
1252 return TRUE;
252b5132 1253
b34976b6 1254 if (bfd_hash_lookup (hash, name, TRUE, TRUE) == NULL)
252b5132
RH
1255 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
1256 }
1257
1258 /* We never print more than a reasonable number of errors in a row
1259 for a single symbol. */
1579bae1 1260 if (error_name != NULL
252b5132
RH
1261 && strcmp (name, error_name) == 0)
1262 ++error_count;
1263 else
1264 {
1265 error_count = 0;
1579bae1 1266 if (error_name != NULL)
252b5132 1267 free (error_name);
d1b2b2dc 1268 error_name = xstrdup (name);
252b5132
RH
1269 }
1270
1271 if (section != NULL)
1272 {
1273 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1274 {
0b28295d
ILT
1275 if (error)
1276 einfo (_("%X%C: undefined reference to `%T'\n"),
1277 abfd, section, address, name);
1278 else
1279 einfo (_("%C: warning: undefined reference to `%T'\n"),
1280 abfd, section, address, name);
b6f29aaa 1281 }
252b5132 1282 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1283 {
1284 if (error)
1285 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1286 abfd, section, address, name);
1287 else
1288 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1289 abfd, section, address, name);
1290 }
1291 else if (error)
1292 einfo ("%X");
252b5132
RH
1293 }
1294 else
1295 {
1296 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1297 {
0b28295d
ILT
1298 if (error)
1299 einfo (_("%X%B: undefined reference to `%T'\n"),
1300 abfd, name);
1301 else
1302 einfo (_("%B: warning: undefined reference to `%T'\n"),
1303 abfd, name);
b6f29aaa 1304 }
252b5132 1305 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1306 {
1307 if (error)
1308 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1309 abfd, name);
1310 else
1311 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1312 abfd, name);
1313 }
1314 else if (error)
1315 einfo ("%X");
252b5132
RH
1316 }
1317
b34976b6 1318 return TRUE;
252b5132
RH
1319}
1320
8aae64e6
AO
1321/* Counter to limit the number of relocation overflow error messages
1322 to print. Errors are printed as it is decremented. When it's
1323 called and the counter is zero, a final message is printed
1324 indicating more relocations were omitted. When it gets to -1, no
1325 such errors are printed. If it's initially set to a value less
1326 than -1, all such errors will be printed (--verbose does this). */
1327
1328int overflow_cutoff_limit = 10;
1329
252b5132
RH
1330/* This is called when a reloc overflows. */
1331
b34976b6 1332static bfd_boolean
1579bae1 1333reloc_overflow (struct bfd_link_info *info ATTRIBUTE_UNUSED,
dfeffb9f 1334 struct bfd_link_hash_entry *entry,
1579bae1
AM
1335 const char *name,
1336 const char *reloc_name,
1337 bfd_vma addend,
1338 bfd *abfd,
1339 asection *section,
1340 bfd_vma address)
252b5132 1341{
8aae64e6
AO
1342 if (overflow_cutoff_limit == -1)
1343 return TRUE;
1344
270396f2 1345 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1346
1347 if (overflow_cutoff_limit >= 0
1348 && overflow_cutoff_limit-- == 0)
1349 {
1350 einfo (_(" additional relocation overflows omitted from the output\n"));
1351 return TRUE;
1352 }
1353
dfeffb9f
L
1354 if (entry)
1355 {
1356 while (entry->type == bfd_link_hash_indirect
1357 || entry->type == bfd_link_hash_warning)
1358 entry = entry->u.i.link;
1359 switch (entry->type)
1360 {
1361 case bfd_link_hash_undefined:
1362 case bfd_link_hash_undefweak:
1363 einfo (_(" relocation truncated to fit: %s against undefined symbol `%T'"),
1364 reloc_name, entry->root.string);
1365 break;
1366 case bfd_link_hash_defined:
1367 case bfd_link_hash_defweak:
1368 einfo (_(" relocation truncated to fit: %s against symbol `%T' defined in %A section in %B"),
1369 reloc_name, entry->root.string,
a6e1b90f
L
1370 entry->u.def.section,
1371 entry->u.def.section == bfd_abs_section_ptr
f13a99db 1372 ? link_info.output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1373 break;
1374 default:
1375 abort ();
1376 break;
1377 }
1378 }
1379 else
1380 einfo (_(" relocation truncated to fit: %s against `%T'"),
1381 reloc_name, name);
252b5132
RH
1382 if (addend != 0)
1383 einfo ("+%v", addend);
1384 einfo ("\n");
b34976b6 1385 return TRUE;
252b5132
RH
1386}
1387
1388/* This is called when a dangerous relocation is made. */
1389
b34976b6 1390static bfd_boolean
1579bae1
AM
1391reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1392 const char *message,
1393 bfd *abfd,
1394 asection *section,
1395 bfd_vma address)
252b5132 1396{
270396f2 1397 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1398 abfd, section, address, message);
b34976b6 1399 return TRUE;
252b5132
RH
1400}
1401
1402/* This is called when a reloc is being generated attached to a symbol
1403 that is not being output. */
1404
b34976b6 1405static bfd_boolean
1579bae1
AM
1406unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1407 const char *name,
1408 bfd *abfd,
1409 asection *section,
1410 bfd_vma address)
252b5132 1411{
270396f2 1412 einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
e1fffbe6 1413 abfd, section, address, name);
b34976b6 1414 return TRUE;
252b5132
RH
1415}
1416
1417/* This is called if link_info.notice_all is set, or when a symbol in
1418 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1419 using the -y option, while notice_all is set if the --cref option
1420 has been supplied, or if there are any NOCROSSREFS sections in the
1421 linker script; and if plugins are active, since they need to monitor
1422 all references from non-IR files. */
252b5132 1423
b34976b6 1424static bfd_boolean
1579bae1 1425notice (struct bfd_link_info *info,
35ed3f94 1426 struct bfd_link_hash_entry *h,
1579bae1
AM
1427 bfd *abfd,
1428 asection *section,
16d96b5b
AM
1429 bfd_vma value,
1430 flagword flags ATTRIBUTE_UNUSED,
1431 const char *string ATTRIBUTE_UNUSED)
252b5132 1432{
35ed3f94
AM
1433 const char *name;
1434
1435 if (h == NULL)
5061a885
AM
1436 {
1437 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1438 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1439 return TRUE;
1440 }
1441
35ed3f94 1442 name = h->root.string;
5d3236ee 1443 if (info->notice_hash != NULL
9e2278f5 1444 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1445 {
1446 if (bfd_is_und_section (section))
1447 einfo ("%B: reference to %s\n", abfd, name);
1448 else
1449 einfo ("%B: definition of %s\n", abfd, name);
1450 }
1451
1452 if (command_line.cref || nocrossref_list != NULL)
1453 add_cref (name, abfd, section, value);
1454
b34976b6 1455 return TRUE;
252b5132 1456}
This page took 0.596932 seconds and 4 git commands to generate.