Re-indent plugin code.
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
4e5bae56 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
aa820537 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009
252b5132
RH
4 Free Software Foundation, Inc.
5 Written by Steve Chamberlain steve@cygnus.com
6
f96b4a7b 7 This file is part of the GNU Binutils.
252b5132 8
f96b4a7b 9 This program is free software; you can redistribute it and/or modify
2fa9fc65 10 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
252b5132 13
f96b4a7b 14 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
2fa9fc65 19 You should have received a copy of the GNU General Public License
f96b4a7b
NC
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
3882b010 26#include "safe-ctype.h"
252b5132
RH
27#include "libiberty.h"
28#include "progress.h"
29#include "bfdlink.h"
5af11cab 30#include "filenames.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
46#include "libbfd.h"
47#endif /* ENABLE_PLUGINS */
252b5132 48
0125cdf2 49/* Somewhere above, sys/stat.h got included. */
252b5132
RH
50#if !defined(S_ISDIR) && defined(S_IFDIR)
51#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
52#endif
53
54#include <string.h>
55
56#ifdef HAVE_SBRK
502bdb00 57#if !HAVE_DECL_SBRK
1579bae1 58extern void *sbrk ();
252b5132
RH
59#endif
60#endif
61
9c8ebd6a
DJ
62#ifndef TARGET_SYSTEM_ROOT
63#define TARGET_SYSTEM_ROOT ""
64#endif
65
252b5132
RH
66/* EXPORTS */
67
53d25da6
AM
68FILE *saved_script_handle = NULL;
69FILE *previous_script_handle = NULL;
70bfd_boolean force_make_executable = FALSE;
71
252b5132
RH
72char *default_target;
73const char *output_filename = "a.out";
74
75/* Name this program was invoked by. */
76char *program_name;
77
9c8ebd6a 78/* The prefix for system library directories. */
e2243057 79const char *ld_sysroot;
9c8ebd6a 80
3fe38064
NC
81/* The canonical representation of ld_sysroot. */
82char * ld_canon_sysroot;
83int ld_canon_sysroot_len;
84
252b5132
RH
85/* Set by -G argument, for MIPS ECOFF target. */
86int g_switch_value = 8;
87
88/* Nonzero means print names of input files as processed. */
b34976b6 89bfd_boolean trace_files;
252b5132
RH
90
91/* Nonzero means same, but note open failures, too. */
b34976b6 92bfd_boolean trace_file_tries;
252b5132
RH
93
94/* Nonzero means version number was printed, so exit successfully
95 instead of complaining if no input files are given. */
b34976b6 96bfd_boolean version_printed;
252b5132
RH
97
98/* Nonzero means link in every member of an archive. */
b34976b6 99bfd_boolean whole_archive;
252b5132 100
ddbb8a31
NC
101/* True means only create DT_NEEDED entries for dynamic libraries
102 if they actually satisfy some reference in a regular object. */
103bfd_boolean add_DT_NEEDED_for_regular;
104
105/* True means create DT_NEEDED entries for dynamic libraries that
106 are DT_NEEDED by dynamic libraries specifically mentioned on
107 the command line. */
df856bcc 108bfd_boolean add_DT_NEEDED_for_dynamic = TRUE;
e56f61be 109
b34976b6
AM
110/* TRUE if we should demangle symbol names. */
111bfd_boolean demangling;
252b5132
RH
112
113args_type command_line;
114
115ld_config_type config;
116
bcaa7b3e
L
117sort_type sort_section;
118
e2243057
RS
119static const char *get_sysroot
120 (int, char **);
0125cdf2 121static char *get_emulation
1579bae1 122 (int, char **);
0125cdf2 123static bfd_boolean add_archive_element
5d3236ee 124 (struct bfd_link_info *, bfd *, const char *, bfd **);
0125cdf2 125static bfd_boolean multiple_definition
1579bae1
AM
126 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
127 bfd *, asection *, bfd_vma);
0125cdf2 128static bfd_boolean multiple_common
1579bae1
AM
129 (struct bfd_link_info *, const char *, bfd *, enum bfd_link_hash_type,
130 bfd_vma, bfd *, enum bfd_link_hash_type, bfd_vma);
0125cdf2 131static bfd_boolean add_to_set
1579bae1
AM
132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
133 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
0125cdf2 134static bfd_boolean constructor_callback
1579bae1
AM
135 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
136 asection *, bfd_vma);
0125cdf2 137static bfd_boolean warning_callback
1579bae1
AM
138 (struct bfd_link_info *, const char *, const char *, bfd *,
139 asection *, bfd_vma);
0125cdf2 140static void warning_find_reloc
1579bae1 141 (bfd *, asection *, void *);
0125cdf2 142static bfd_boolean undefined_symbol
1579bae1
AM
143 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
144 bfd_boolean);
0125cdf2 145static bfd_boolean reloc_overflow
dfeffb9f
L
146 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
147 const char *, bfd_vma, bfd *, asection *, bfd_vma);
0125cdf2 148static bfd_boolean reloc_dangerous
1579bae1 149 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 150static bfd_boolean unattached_reloc
1579bae1 151 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 152static bfd_boolean notice
1579bae1 153 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2
NC
154
155static struct bfd_link_callbacks link_callbacks =
156{
252b5132
RH
157 add_archive_element,
158 multiple_definition,
159 multiple_common,
160 add_to_set,
161 constructor_callback,
162 warning_callback,
163 undefined_symbol,
164 reloc_overflow,
165 reloc_dangerous,
166 unattached_reloc,
e1fffbe6 167 notice,
2889e75b 168 einfo,
49fa1e15
AM
169 info_msg,
170 minfo,
2889e75b 171 ldlang_override_segment_assignment
252b5132
RH
172};
173
174struct bfd_link_info link_info;
175\f
176static void
1579bae1 177remove_output (void)
252b5132 178{
6d5e62f8 179 if (output_filename)
252b5132 180 {
f13a99db
AM
181 if (link_info.output_bfd)
182 bfd_cache_close (link_info.output_bfd);
252b5132 183 if (delete_output_file_on_failure)
bb14f524 184 unlink_if_ordinary (output_filename);
252b5132
RH
185 }
186}
187
188int
1579bae1 189main (int argc, char **argv)
252b5132
RH
190{
191 char *emulation;
192 long start_time = get_run_time ();
193
194#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
195 setlocale (LC_MESSAGES, "");
3882b010
L
196#endif
197#if defined (HAVE_SETLOCALE)
198 setlocale (LC_CTYPE, "");
252b5132
RH
199#endif
200 bindtextdomain (PACKAGE, LOCALEDIR);
201 textdomain (PACKAGE);
202
203 program_name = argv[0];
204 xmalloc_set_program_name (program_name);
205
206 START_PROGRESS (program_name, 0);
207
869b9d07
MM
208 expandargv (&argc, &argv);
209
252b5132
RH
210 bfd_init ();
211
212 bfd_set_error_program_name (program_name);
213
214 xatexit (remove_output);
215
e2243057
RS
216 /* Set up the sysroot directory. */
217 ld_sysroot = get_sysroot (argc, argv);
218 if (*ld_sysroot)
9c8ebd6a 219 {
e2243057 220 if (*TARGET_SYSTEM_ROOT == 0)
9c8ebd6a 221 {
70487fb2 222 einfo ("%P%F: this linker was not configured to use sysroots\n");
e2243057 223 ld_sysroot = "";
0125cdf2 224 }
e2243057
RS
225 else
226 ld_canon_sysroot = lrealpath (ld_sysroot);
0125cdf2 227 }
3fe38064
NC
228 if (ld_canon_sysroot)
229 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
230 else
231 ld_canon_sysroot_len = -1;
232
252b5132
RH
233 /* Set the default BFD target based on the configured target. Doing
234 this permits the linker to be configured for a particular target,
235 and linked against a shared BFD library which was configured for
236 a different target. The macro TARGET is defined by Makefile. */
237 if (! bfd_set_default_target (TARGET))
238 {
239 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
240 xexit (1);
241 }
242
b47c4208
AM
243#if YYDEBUG
244 {
245 extern int yydebug;
246 yydebug = 1;
247 }
248#endif
249
b34976b6 250 config.build_constructors = TRUE;
c76308d2 251 config.rpath_separator = ':';
a854a4a7
AM
252 config.split_by_reloc = (unsigned) -1;
253 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
254 config.make_executable = TRUE;
255 config.magic_demand_paged = TRUE;
256 config.text_read_only = TRUE;
257
b34976b6 258 command_line.warn_mismatch = TRUE;
fe7929ce 259 command_line.warn_search_mismatch = TRUE;
02b0b1aa 260 command_line.check_section_addresses = -1;
28d5f677 261 command_line.disable_target_specific_optimizations = -1;
bcaa7b3e 262
252b5132
RH
263 /* We initialize DEMANGLING based on the environment variable
264 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
265 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
266 environment. Acting the same way here lets us provide the same
267 interface by default. */
268 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
269
b34976b6 270 link_info.allow_undefined_version = TRUE;
b5067602 271 link_info.keep_memory = TRUE;
b5067602 272 link_info.combreloc = TRUE;
d5cd3933 273 link_info.strip_discarded = TRUE;
fdc90cb4 274 link_info.emit_hash = TRUE;
a9a4c53e
AM
275 link_info.callbacks = &link_callbacks;
276 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
277 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
278 and _fini symbols. We are compatible. */
279 link_info.init_function = "_init";
280 link_info.fini_function = "_fini";
a9a4c53e 281 link_info.relax_pass = 1;
e0076ab3 282 link_info.pei386_auto_import = -1;
db6751f2 283 link_info.spare_dynamic_tags = 5;
967928e9 284 link_info.path_separator = ':';
24718e3b 285
252b5132 286 ldfile_add_arch ("");
252b5132
RH
287 emulation = get_emulation (argc, argv);
288 ldemul_choose_mode (emulation);
742aeb63 289 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
290 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
291 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132
RH
292 lang_init ();
293 ldemul_before_parse ();
b34976b6 294 lang_has_input_file = FALSE;
252b5132
RH
295 parse_args (argc, argv);
296
2d643429
NC
297 if (config.hash_table_size != 0)
298 bfd_hash_set_default_size (config.hash_table_size);
299
252b5132
RH
300 ldemul_set_symbols ();
301
1049f94e 302 if (link_info.relocatable)
252b5132 303 {
02b0b1aa
NS
304 if (command_line.check_section_addresses < 0)
305 command_line.check_section_addresses = 0;
252b5132
RH
306 if (link_info.shared)
307 einfo (_("%P%F: -r and -shared may not be used together\n"));
308 }
309
d8cf8b51
L
310 /* We may have -Bsymbolic, -Bsymbolic-functions, --dynamic-list-data,
311 --dynamic-list-cpp-new, --dynamic-list-cpp-typeinfo and
312 --dynamic-list FILE. -Bsymbolic and -Bsymbolic-functions are
313 for shared libraries. -Bsymbolic overrides all others and vice
314 versa. */
315 switch (command_line.symbolic)
316 {
317 case symbolic_unset:
318 break;
319 case symbolic:
320 /* -Bsymbolic is for shared library only. */
321 if (link_info.shared)
322 {
323 link_info.symbolic = TRUE;
324 /* Should we free the unused memory? */
325 link_info.dynamic_list = NULL;
326 command_line.dynamic_list = dynamic_list_unset;
327 }
328 break;
329 case symbolic_functions:
330 /* -Bsymbolic-functions is for shared library only. */
331 if (link_info.shared)
332 command_line.dynamic_list = dynamic_list_data;
333 break;
334 }
335
336 switch (command_line.dynamic_list)
337 {
338 case dynamic_list_unset:
339 break;
340 case dynamic_list_data:
341 link_info.dynamic_data = TRUE;
342 case dynamic_list:
343 link_info.dynamic = TRUE;
344 break;
345 }
346
7333607e
JJ
347 if (! link_info.shared)
348 {
349 if (command_line.filter_shlib)
e97cb84f 350 einfo (_("%P%F: -F may not be used without -shared\n"));
7333607e 351 if (command_line.auxiliary_filters)
e97cb84f 352 einfo (_("%P%F: -f may not be used without -shared\n"));
7333607e
JJ
353 }
354
36af4a4e
JJ
355 if (! link_info.shared || link_info.pie)
356 link_info.executable = TRUE;
357
252b5132
RH
358 /* Treat ld -r -s as ld -r -S -x (i.e., strip all local symbols). I
359 don't see how else this can be handled, since in this case we
360 must preserve all externally visible symbols. */
1049f94e 361 if (link_info.relocatable && link_info.strip == strip_all)
252b5132
RH
362 {
363 link_info.strip = strip_debugger;
f5fa8ca2 364 if (link_info.discard == discard_sec_merge)
252b5132
RH
365 link_info.discard = discard_all;
366 }
367
14be8564
L
368 /* If we have not already opened and parsed a linker script,
369 try the default script from command line first. */
370 if (saved_script_handle == NULL
371 && command_line.default_script != NULL)
372 {
373 ldfile_open_command_file (command_line.default_script);
374 parser_input = input_script;
375 yyparse ();
376 }
377
b9a8de1e
NC
378 /* If we have not already opened and parsed a linker script
379 read the emulation's appropriate default script. */
b90e1c6f 380 if (saved_script_handle == NULL)
252b5132 381 {
252b5132 382 int isfile;
b7a26f91 383 char *s = ldemul_get_script (&isfile);
252b5132
RH
384
385 if (isfile)
7d24f02c 386 ldfile_open_default_command_file (s);
252b5132 387 else
b7a26f91 388 {
252b5132
RH
389 lex_string = s;
390 lex_redirect (s);
391 }
392 parser_input = input_script;
393 yyparse ();
394 lex_string = NULL;
395 }
396
b9a8de1e
NC
397 if (trace_file_tries)
398 {
9cb61eab
AM
399 if (saved_script_handle)
400 info_msg (_("using external linker script:"));
401 else
402 info_msg (_("using internal linker script:"));
403 info_msg ("\n==================================================\n");
b9a8de1e
NC
404
405 if (saved_script_handle)
406 {
74699268 407 static const int ld_bufsz = 8193;
b9a8de1e 408 size_t n;
1e9cc1c2 409 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
410
411 rewind (saved_script_handle);
74699268 412 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 413 {
b7a26f91 414 buf[n] = 0;
b9a8de1e
NC
415 info_msg (buf);
416 }
417 rewind (saved_script_handle);
418 free (buf);
419 }
420 else
421 {
422 int isfile;
423
b7a26f91 424 info_msg (ldemul_get_script (&isfile));
b9a8de1e 425 }
b7a26f91 426
b9a8de1e
NC
427 info_msg ("\n==================================================\n");
428 }
429
252b5132
RH
430 lang_final ();
431
b34976b6 432 if (!lang_has_input_file)
252b5132
RH
433 {
434 if (version_printed)
435 xexit (0);
436 einfo (_("%P%F: no input files\n"));
437 }
438
439 if (trace_files)
0125cdf2 440 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
441
442 ldemul_after_parse ();
443
252b5132
RH
444 if (config.map_filename)
445 {
446 if (strcmp (config.map_filename, "-") == 0)
447 {
448 config.map_file = stdout;
449 }
450 else
451 {
452 config.map_file = fopen (config.map_filename, FOPEN_WT);
453 if (config.map_file == (FILE *) NULL)
454 {
455 bfd_set_error (bfd_error_system_call);
456 einfo (_("%P%F: cannot open map file %s: %E\n"),
457 config.map_filename);
458 }
459 }
460 }
461
252b5132
RH
462 lang_process ();
463
464 /* Print error messages for any missing symbols, for any warning
6d5e62f8 465 symbols, and possibly multiple definitions. */
1049f94e 466 if (link_info.relocatable)
f13a99db 467 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 468 else
f13a99db 469 link_info.output_bfd->flags |= EXEC_P;
252b5132
RH
470
471 ldwrite ();
472
473 if (config.map_file != NULL)
474 lang_map ();
475 if (command_line.cref)
476 output_cref (config.map_file != NULL ? config.map_file : stdout);
477 if (nocrossref_list != NULL)
478 check_nocrossrefs ();
479
750877ba
L
480 lang_finish ();
481
5d3236ee
DK
482#ifdef ENABLE_PLUGINS
483 /* Now everything is finished, we can tell the plugins to clean up. */
484 if (plugin_call_cleanup ())
f84854b6
L
485 info_msg (_("%P: %s: error in plugin cleanup (ignored)\n"),
486 plugin_error_plugin ());
5d3236ee
DK
487#endif /* ENABLE_PLUGINS */
488
1049f94e 489 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 490 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 491 want to ignore for relocatable output?) */
b34976b6 492 if (!config.make_executable && !force_make_executable)
252b5132 493 {
b34976b6 494 if (trace_files)
0125cdf2
NC
495 einfo (_("%P: link errors found, deleting executable `%s'\n"),
496 output_filename);
252b5132
RH
497
498 /* The file will be removed by remove_output. */
252b5132
RH
499 xexit (1);
500 }
501 else
502 {
f13a99db
AM
503 if (! bfd_close (link_info.output_bfd))
504 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
505
506 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
507 executable file and it doesn't end in .exe, copy it to one
508 which does. */
1049f94e 509 if (! link_info.relocatable && command_line.force_exe_suffix)
252b5132
RH
510 {
511 int len = strlen (output_filename);
0125cdf2 512
6d5e62f8 513 if (len < 4
252b5132
RH
514 || (strcasecmp (output_filename + len - 4, ".exe") != 0
515 && strcasecmp (output_filename + len - 4, ".dll") != 0))
516 {
517 FILE *src;
518 FILE *dst;
519 const int bsize = 4096;
1e9cc1c2 520 char *buf = (char *) xmalloc (bsize);
252b5132 521 int l;
1e9cc1c2 522 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 523
252b5132
RH
524 strcpy (dst_name, output_filename);
525 strcat (dst_name, ".exe");
526 src = fopen (output_filename, FOPEN_RB);
527 dst = fopen (dst_name, FOPEN_WB);
528
529 if (!src)
1579bae1
AM
530 einfo (_("%X%P: unable to open for source of copy `%s'\n"),
531 output_filename);
252b5132 532 if (!dst)
1579bae1
AM
533 einfo (_("%X%P: unable to open for destination of copy `%s'\n"),
534 dst_name);
252b5132
RH
535 while ((l = fread (buf, 1, bsize, src)) > 0)
536 {
537 int done = fwrite (buf, 1, l, dst);
0125cdf2 538
252b5132 539 if (done != l)
0125cdf2 540 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 541 }
0125cdf2 542
252b5132
RH
543 fclose (src);
544 if (fclose (dst) == EOF)
0125cdf2 545 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
546 free (dst_name);
547 free (buf);
548 }
549 }
550 }
551
552 END_PROGRESS (program_name);
553
554 if (config.stats)
555 {
556#ifdef HAVE_SBRK
1e9cc1c2 557 char *lim = (char *) sbrk (0);
252b5132
RH
558#endif
559 long run_time = get_run_time () - start_time;
560
561 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
562 program_name, run_time / 1000000, run_time % 1000000);
563#ifdef HAVE_SBRK
564 fprintf (stderr, _("%s: data size %ld\n"), program_name,
565 (long) (lim - (char *) &environ));
566#endif
567 }
568
569 /* Prevent remove_output from doing anything, after a successful link. */
570 output_filename = NULL;
571
572 xexit (0);
573 return 0;
574}
575
e2243057
RS
576/* If the configured sysroot is relocatable, try relocating it based on
577 default prefix FROM. Return the relocated directory if it exists,
578 otherwise return null. */
579
580static char *
581get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
582{
583#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
584 char *path;
585 struct stat s;
586
587 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
588 if (path)
589 {
590 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
591 return path;
592 free (path);
593 }
594#endif
595 return 0;
596}
597
598/* Return the sysroot directory. Return "" if no sysroot is being used. */
599
600static const char *
601get_sysroot (int argc, char **argv)
602{
603 int i;
604 const char *path;
605
606 for (i = 1; i < argc; i++)
0112cd26 607 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
608 return argv[i] + strlen ("--sysroot=");
609
610 path = get_relative_sysroot (BINDIR);
611 if (path)
612 return path;
613
614 path = get_relative_sysroot (TOOLBINDIR);
615 if (path)
616 return path;
617
618 return TARGET_SYSTEM_ROOT;
619}
620
252b5132
RH
621/* We need to find any explicitly given emulation in order to initialize the
622 state that's needed by the lex&yacc argument parser (parse_args). */
623
624static char *
1579bae1 625get_emulation (int argc, char **argv)
252b5132
RH
626{
627 char *emulation;
628 int i;
629
630 emulation = getenv (EMULATION_ENVIRON);
631 if (emulation == NULL)
632 emulation = DEFAULT_EMULATION;
633
634 for (i = 1; i < argc; i++)
635 {
0112cd26 636 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
637 {
638 if (argv[i][2] == '\0')
639 {
640 /* -m EMUL */
641 if (i < argc - 1)
642 {
643 emulation = argv[i + 1];
644 i++;
645 }
646 else
0125cdf2 647 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
648 }
649 else if (strcmp (argv[i], "-mips1") == 0
650 || strcmp (argv[i], "-mips2") == 0
651 || strcmp (argv[i], "-mips3") == 0
d1cf510e 652 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
653 || strcmp (argv[i], "-mips5") == 0
654 || strcmp (argv[i], "-mips32") == 0
655 || strcmp (argv[i], "-mips32r2") == 0
5f74bc13
CD
656 || strcmp (argv[i], "-mips64") == 0
657 || strcmp (argv[i], "-mips64r2") == 0)
252b5132 658 {
31d677f9 659 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
660 passed to the linker by some MIPS compilers. They
661 generally tell the linker to use a slightly different
662 library path. Perhaps someday these should be
663 implemented as emulations; until then, we just ignore
664 the arguments and hope that nobody ever creates
665 emulations named ips1, ips2 or ips3. */
666 }
667 else if (strcmp (argv[i], "-m486") == 0)
668 {
669 /* FIXME: The argument -m486 is passed to the linker on
670 some Linux systems. Hope that nobody creates an
671 emulation named 486. */
672 }
673 else
674 {
675 /* -mEMUL */
676 emulation = &argv[i][2];
677 }
678 }
679 }
680
681 return emulation;
682}
683
252b5132 684void
1579bae1 685add_ysym (const char *name)
252b5132 686{
1579bae1 687 if (link_info.notice_hash == NULL)
252b5132 688 {
1e9cc1c2
NC
689 link_info.notice_hash =
690 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
691 if (!bfd_hash_table_init_n (link_info.notice_hash,
692 bfd_hash_newfunc,
693 sizeof (struct bfd_hash_entry),
694 61))
252b5132 695 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 696 }
252b5132 697
1579bae1 698 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
699 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
700}
701
702/* Record a symbol to be wrapped, from the --wrap option. */
703
704void
1579bae1 705add_wrap (const char *name)
252b5132
RH
706{
707 if (link_info.wrap_hash == NULL)
708 {
1e9cc1c2
NC
709 link_info.wrap_hash =
710 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
711 if (!bfd_hash_table_init_n (link_info.wrap_hash,
712 bfd_hash_newfunc,
713 sizeof (struct bfd_hash_entry),
714 61))
252b5132
RH
715 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
716 }
0125cdf2 717
b34976b6 718 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
719 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
720}
721
722/* Handle the -retain-symbols-file option. */
723
724void
1579bae1 725add_keepsyms_file (const char *filename)
252b5132
RH
726{
727 FILE *file;
728 char *buf;
729 size_t bufsize;
730 int c;
731
732 if (link_info.strip == strip_some)
733 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
734
735 file = fopen (filename, "r");
1579bae1 736 if (file == NULL)
252b5132
RH
737 {
738 bfd_set_error (bfd_error_system_call);
739 einfo ("%X%P: %s: %E\n", filename);
740 return;
741 }
742
1e9cc1c2
NC
743 link_info.keep_hash = (struct bfd_hash_table *)
744 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
745 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
746 sizeof (struct bfd_hash_entry)))
252b5132
RH
747 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
748
749 bufsize = 100;
1e9cc1c2 750 buf = (char *) xmalloc (bufsize);
252b5132
RH
751
752 c = getc (file);
753 while (c != EOF)
754 {
3882b010 755 while (ISSPACE (c))
252b5132
RH
756 c = getc (file);
757
758 if (c != EOF)
759 {
760 size_t len = 0;
761
3882b010 762 while (! ISSPACE (c) && c != EOF)
252b5132
RH
763 {
764 buf[len] = c;
765 ++len;
766 if (len >= bufsize)
767 {
768 bufsize *= 2;
1e9cc1c2 769 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
770 }
771 c = getc (file);
772 }
773
774 buf[len] = '\0';
775
1579bae1 776 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
777 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
778 }
779 }
780
781 if (link_info.strip != strip_none)
782 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
783
5ed6aba4 784 free (buf);
252b5132
RH
785 link_info.strip = strip_some;
786}
787\f
788/* Callbacks from the BFD linker routines. */
789
790/* This is called when BFD has decided to include an archive member in
791 a link. */
792
b34976b6 793static bfd_boolean
e1fffbe6 794add_archive_element (struct bfd_link_info *info,
1579bae1 795 bfd *abfd,
5d3236ee
DK
796 const char *name,
797 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
798{
799 lang_input_statement_type *input;
5d3236ee 800 lang_input_statement_type orig_input;
252b5132 801
1e9cc1c2
NC
802 input = (lang_input_statement_type *)
803 xcalloc (1, sizeof (lang_input_statement_type));
252b5132
RH
804 input->filename = abfd->filename;
805 input->local_sym_name = abfd->filename;
806 input->the_bfd = abfd;
252b5132 807
5d3236ee
DK
808 /* Save the original data for trace files/tries below, as plugins
809 (if enabled) may possibly alter it to point to a replacement
810 BFD, but we still want to output the original BFD filename. */
811 orig_input = *input;
812#ifdef ENABLE_PLUGINS
d44ad554 813 if (bfd_my_archive (abfd) != NULL && plugin_active_plugins_p ())
5d3236ee
DK
814 {
815 /* We must offer this archive member to the plugins to claim. */
816 int fd = open (bfd_my_archive (abfd)->filename, O_RDONLY | O_BINARY);
817 if (fd >= 0)
818 {
819 struct ld_plugin_input_file file;
820 int claimed = 0;
821 /* Offset and filesize must refer to the individual archive
822 member, not the whole file, and must exclude the header.
823 Fortunately for us, that is how the data is stored in the
824 origin field of the bfd and in the arelt_data. */
825 file.name = bfd_my_archive (abfd)->filename;
826 file.offset = abfd->origin;
827 file.filesize = arelt_size (abfd);
828 file.fd = fd;
829 /* We create a dummy BFD, initially empty, to house
830 whatever symbols the plugin may want to add. */
831 file.handle = plugin_get_ir_dummy_bfd (abfd->filename, abfd);
832 if (plugin_call_claim_file (&file, &claimed))
833 einfo (_("%P%F: %s: plugin reported error claiming file\n"),
f84854b6 834 plugin_error_plugin ());
d44ad554
DK
835 /* fd belongs to us, not the plugin; but we don't need it. */
836 close (fd);
5d3236ee
DK
837 if (claimed)
838 {
839 /* Substitute the dummy BFD. */
840 input->the_bfd = file.handle;
841 input->claimed = TRUE;
842 bfd_make_readable (input->the_bfd);
843 *subsbfd = input->the_bfd;
844 }
845 else
846 {
847 /* Abandon the dummy BFD. */
848 bfd_close_all_done (file.handle);
5d3236ee
DK
849 input->claimed = FALSE;
850 }
851 }
852 }
853#endif /* ENABLE_PLUGINS */
854
252b5132
RH
855 ldlang_add_file (input);
856
1579bae1 857 if (config.map_file != NULL)
252b5132 858 {
b34976b6 859 static bfd_boolean header_printed;
252b5132
RH
860 struct bfd_link_hash_entry *h;
861 bfd *from;
862 int len;
863
e1fffbe6 864 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
865
866 if (h == NULL)
867 from = NULL;
868 else
869 {
870 switch (h->type)
871 {
872 default:
873 from = NULL;
874 break;
875
876 case bfd_link_hash_defined:
877 case bfd_link_hash_defweak:
878 from = h->u.def.section->owner;
879 break;
880
881 case bfd_link_hash_undefined:
882 case bfd_link_hash_undefweak:
883 from = h->u.undef.abfd;
884 break;
885
886 case bfd_link_hash_common:
887 from = h->u.c.p->section->owner;
888 break;
889 }
890 }
891
892 if (! header_printed)
893 {
894 char buf[100];
895
e3c8793a 896 sprintf (buf, _("Archive member included because of file (symbol)\n\n"));
252b5132 897 minfo ("%s", buf);
b34976b6 898 header_printed = TRUE;
252b5132
RH
899 }
900
901 if (bfd_my_archive (abfd) == NULL)
902 {
903 minfo ("%s", bfd_get_filename (abfd));
904 len = strlen (bfd_get_filename (abfd));
905 }
906 else
907 {
908 minfo ("%s(%s)", bfd_get_filename (bfd_my_archive (abfd)),
909 bfd_get_filename (abfd));
910 len = (strlen (bfd_get_filename (bfd_my_archive (abfd)))
911 + strlen (bfd_get_filename (abfd))
912 + 2);
913 }
914
915 if (len >= 29)
916 {
917 print_nl ();
918 len = 0;
919 }
920 while (len < 30)
921 {
922 print_space ();
923 ++len;
924 }
925
926 if (from != NULL)
927 minfo ("%B ", from);
928 if (h != NULL)
929 minfo ("(%T)\n", h->root.string);
930 else
931 minfo ("(%s)\n", name);
932 }
933
934 if (trace_files || trace_file_tries)
5d3236ee 935 info_msg ("%I\n", &orig_input);
b34976b6 936 return TRUE;
252b5132
RH
937}
938
939/* This is called when BFD has discovered a symbol which is defined
940 multiple times. */
941
b34976b6 942static bfd_boolean
1579bae1
AM
943multiple_definition (struct bfd_link_info *info ATTRIBUTE_UNUSED,
944 const char *name,
945 bfd *obfd,
946 asection *osec,
947 bfd_vma oval,
948 bfd *nbfd,
949 asection *nsec,
950 bfd_vma nval)
252b5132 951{
5d3236ee
DK
952#ifdef ENABLE_PLUGINS
953 /* We may get called back even when --allow-multiple-definition is in
954 effect, as the plugin infrastructure needs to use this hook in
955 order to swap out IR-only symbols for real ones. In that case,
956 it will let us know not to continue by returning TRUE even if this
957 is not an IR-only vs. non-IR symbol conflict. */
958 if (plugin_multiple_definition (info, name, obfd, osec, oval, nbfd,
f84854b6 959 nsec, nval))
5d3236ee
DK
960 return TRUE;
961#endif /* ENABLE_PLUGINS */
962
252b5132
RH
963 /* If either section has the output_section field set to
964 bfd_abs_section_ptr, it means that the section is being
965 discarded, and this is not really a multiple definition at all.
f84854b6
L
966FIXME: It would be cleaner to somehow ignore symbols defined in
967sections which are being discarded. */
252b5132
RH
968 if ((osec->output_section != NULL
969 && ! bfd_is_abs_section (osec)
970 && bfd_is_abs_section (osec->output_section))
971 || (nsec->output_section != NULL
972 && ! bfd_is_abs_section (nsec)
973 && bfd_is_abs_section (nsec->output_section)))
b34976b6 974 return TRUE;
252b5132
RH
975
976 einfo (_("%X%C: multiple definition of `%T'\n"),
977 nbfd, nsec, nval, name);
1579bae1 978 if (obfd != NULL)
252b5132 979 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 980
28d5f677 981 if (RELAXATION_ENABLED)
9b14b192
NC
982 {
983 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
28d5f677 984 command_line.disable_target_specific_optimizations = -1;
9b14b192 985 }
6d5e62f8 986
b34976b6 987 return TRUE;
252b5132
RH
988}
989
990/* This is called when there is a definition of a common symbol, or
991 when a common symbol is found for a symbol that is already defined,
992 or when two common symbols are found. We only do something if
993 -warn-common was used. */
994
b34976b6 995static bfd_boolean
1579bae1
AM
996multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
997 const char *name,
998 bfd *obfd,
999 enum bfd_link_hash_type otype,
1000 bfd_vma osize,
1001 bfd *nbfd,
1002 enum bfd_link_hash_type ntype,
1003 bfd_vma nsize)
252b5132
RH
1004{
1005 if (! config.warn_common)
b34976b6 1006 return TRUE;
252b5132
RH
1007
1008 if (ntype == bfd_link_hash_defined
1009 || ntype == bfd_link_hash_defweak
1010 || ntype == bfd_link_hash_indirect)
1011 {
1012 ASSERT (otype == bfd_link_hash_common);
1013 einfo (_("%B: warning: definition of `%T' overriding common\n"),
1014 nbfd, name);
1015 if (obfd != NULL)
1016 einfo (_("%B: warning: common is here\n"), obfd);
1017 }
1018 else if (otype == bfd_link_hash_defined
1019 || otype == bfd_link_hash_defweak
1020 || otype == bfd_link_hash_indirect)
1021 {
1022 ASSERT (ntype == bfd_link_hash_common);
1023 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1024 nbfd, name);
1025 if (obfd != NULL)
1026 einfo (_("%B: warning: defined here\n"), obfd);
1027 }
1028 else
1029 {
1030 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1031 if (osize > nsize)
1032 {
1033 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1034 nbfd, name);
1035 if (obfd != NULL)
1036 einfo (_("%B: warning: larger common is here\n"), obfd);
1037 }
1038 else if (nsize > osize)
1039 {
1040 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1041 nbfd, name);
1042 if (obfd != NULL)
1043 einfo (_("%B: warning: smaller common is here\n"), obfd);
1044 }
1045 else
1046 {
1047 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1048 if (obfd != NULL)
1049 einfo (_("%B: warning: previous common is here\n"), obfd);
1050 }
1051 }
1052
b34976b6 1053 return TRUE;
252b5132
RH
1054}
1055
1056/* This is called when BFD has discovered a set element. H is the
1057 entry in the linker hash table for the set. SECTION and VALUE
1058 represent a value which should be added to the set. */
1059
b34976b6 1060static bfd_boolean
1579bae1
AM
1061add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1062 struct bfd_link_hash_entry *h,
1063 bfd_reloc_code_real_type reloc,
1064 bfd *abfd,
1065 asection *section,
1066 bfd_vma value)
252b5132
RH
1067{
1068 if (config.warn_constructors)
1069 einfo (_("%P: warning: global constructor %s used\n"),
1070 h->root.string);
1071
1072 if (! config.build_constructors)
b34976b6 1073 return TRUE;
252b5132 1074
1579bae1 1075 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1076
1077 if (h->type == bfd_link_hash_new)
1078 {
1079 h->type = bfd_link_hash_undefined;
1080 h->u.undef.abfd = abfd;
1081 /* We don't call bfd_link_add_undef to add this to the list of
1082 undefined symbols because we are going to define it
1083 ourselves. */
1084 }
1085
b34976b6 1086 return TRUE;
252b5132
RH
1087}
1088
1089/* This is called when BFD has discovered a constructor. This is only
1090 called for some object file formats--those which do not handle
1091 constructors in some more clever fashion. This is similar to
1092 adding an element to a set, but less general. */
1093
b34976b6 1094static bfd_boolean
1579bae1
AM
1095constructor_callback (struct bfd_link_info *info,
1096 bfd_boolean constructor,
1097 const char *name,
1098 bfd *abfd,
1099 asection *section,
1100 bfd_vma value)
252b5132
RH
1101{
1102 char *s;
1103 struct bfd_link_hash_entry *h;
1104 char set_name[1 + sizeof "__CTOR_LIST__"];
1105
1106 if (config.warn_constructors)
1107 einfo (_("%P: warning: global constructor %s used\n"), name);
1108
1109 if (! config.build_constructors)
b34976b6 1110 return TRUE;
252b5132
RH
1111
1112 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1113 useful error message. */
f13a99db 1114 if (bfd_reloc_type_lookup (link_info.output_bfd, BFD_RELOC_CTOR) == NULL
e1fffbe6 1115 && (info->relocatable
252b5132
RH
1116 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1117 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1118
1119 s = set_name;
1120 if (bfd_get_symbol_leading_char (abfd) != '\0')
1121 *s++ = bfd_get_symbol_leading_char (abfd);
1122 if (constructor)
1123 strcpy (s, "__CTOR_LIST__");
1124 else
1125 strcpy (s, "__DTOR_LIST__");
1126
b34976b6 1127 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1128 if (h == (struct bfd_link_hash_entry *) NULL)
1129 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1130 if (h->type == bfd_link_hash_new)
1131 {
1132 h->type = bfd_link_hash_undefined;
1133 h->u.undef.abfd = abfd;
1134 /* We don't call bfd_link_add_undef to add this to the list of
1135 undefined symbols because we are going to define it
1136 ourselves. */
1137 }
1138
1139 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
b34976b6 1140 return TRUE;
252b5132
RH
1141}
1142
1143/* A structure used by warning_callback to pass information through
1144 bfd_map_over_sections. */
1145
0125cdf2
NC
1146struct warning_callback_info
1147{
b34976b6 1148 bfd_boolean found;
252b5132
RH
1149 const char *warning;
1150 const char *symbol;
1151 asymbol **asymbols;
1152};
1153
1154/* This is called when there is a reference to a warning symbol. */
1155
b34976b6 1156static bfd_boolean
1579bae1
AM
1157warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1158 const char *warning,
1159 const char *symbol,
1160 bfd *abfd,
1161 asection *section,
1162 bfd_vma address)
252b5132
RH
1163{
1164 /* This is a hack to support warn_multiple_gp. FIXME: This should
1165 have a cleaner interface, but what? */
1166 if (! config.warn_multiple_gp
1167 && strcmp (warning, "using multiple gp values") == 0)
b34976b6 1168 return TRUE;
252b5132
RH
1169
1170 if (section != NULL)
300475fe 1171 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1172 else if (abfd == NULL)
300475fe 1173 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1174 else if (symbol == NULL)
300475fe 1175 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1176 else
1177 {
91d6fa6a 1178 struct warning_callback_info cinfo;
252b5132
RH
1179
1180 /* Look through the relocs to see if we can find a plausible
1181 address. */
5c1d2f5f
AM
1182
1183 if (!bfd_generic_link_read_symbols (abfd))
1184 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
252b5132 1185
91d6fa6a
NC
1186 cinfo.found = FALSE;
1187 cinfo.warning = warning;
1188 cinfo.symbol = symbol;
1189 cinfo.asymbols = bfd_get_outsymbols (abfd);
1190 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
252b5132 1191
91d6fa6a 1192 if (! cinfo.found)
300475fe 1193 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1194 }
1195
b34976b6 1196 return TRUE;
252b5132
RH
1197}
1198
1199/* This is called by warning_callback for each section. It checks the
1200 relocs of the section to see if it can find a reference to the
1201 symbol which triggered the warning. If it can, it uses the reloc
1202 to give an error message with a file and line number. */
1203
1204static void
1579bae1 1205warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1206{
1e9cc1c2 1207 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1208 long relsize;
1209 arelent **relpp;
1210 long relcount;
1211 arelent **p, **pend;
1212
1213 if (info->found)
1214 return;
1215
1216 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1217 if (relsize < 0)
1218 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1219 if (relsize == 0)
1220 return;
1221
1e9cc1c2 1222 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1223 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1224 if (relcount < 0)
1225 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1226
1227 p = relpp;
1228 pend = p + relcount;
1229 for (; p < pend && *p != NULL; p++)
1230 {
1231 arelent *q = *p;
1232
1233 if (q->sym_ptr_ptr != NULL
1234 && *q->sym_ptr_ptr != NULL
1235 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1236 {
1237 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1238 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1239 info->warning);
b34976b6 1240 info->found = TRUE;
252b5132
RH
1241 break;
1242 }
1243 }
1244
1245 free (relpp);
1246}
1247
1248/* This is called when an undefined symbol is found. */
1249
b34976b6 1250static bfd_boolean
1579bae1
AM
1251undefined_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1252 const char *name,
1253 bfd *abfd,
1254 asection *section,
1255 bfd_vma address,
0b28295d 1256 bfd_boolean error)
252b5132
RH
1257{
1258 static char *error_name;
1259 static unsigned int error_count;
1260
1261#define MAX_ERRORS_IN_A_ROW 5
1262
1263 if (config.warn_once)
1264 {
1265 static struct bfd_hash_table *hash;
1266
1267 /* Only warn once about a particular undefined symbol. */
252b5132
RH
1268 if (hash == NULL)
1269 {
1e9cc1c2
NC
1270 hash = (struct bfd_hash_table *)
1271 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
1272 if (!bfd_hash_table_init (hash, bfd_hash_newfunc,
1273 sizeof (struct bfd_hash_entry)))
252b5132
RH
1274 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
1275 }
1276
b34976b6
AM
1277 if (bfd_hash_lookup (hash, name, FALSE, FALSE) != NULL)
1278 return TRUE;
252b5132 1279
b34976b6 1280 if (bfd_hash_lookup (hash, name, TRUE, TRUE) == NULL)
252b5132
RH
1281 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
1282 }
1283
1284 /* We never print more than a reasonable number of errors in a row
1285 for a single symbol. */
1579bae1 1286 if (error_name != NULL
252b5132
RH
1287 && strcmp (name, error_name) == 0)
1288 ++error_count;
1289 else
1290 {
1291 error_count = 0;
1579bae1 1292 if (error_name != NULL)
252b5132 1293 free (error_name);
d1b2b2dc 1294 error_name = xstrdup (name);
252b5132
RH
1295 }
1296
1297 if (section != NULL)
1298 {
1299 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1300 {
0b28295d
ILT
1301 if (error)
1302 einfo (_("%X%C: undefined reference to `%T'\n"),
1303 abfd, section, address, name);
1304 else
1305 einfo (_("%C: warning: undefined reference to `%T'\n"),
1306 abfd, section, address, name);
b6f29aaa 1307 }
252b5132 1308 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1309 {
1310 if (error)
1311 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1312 abfd, section, address, name);
1313 else
1314 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1315 abfd, section, address, name);
1316 }
1317 else if (error)
1318 einfo ("%X");
252b5132
RH
1319 }
1320 else
1321 {
1322 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1323 {
0b28295d
ILT
1324 if (error)
1325 einfo (_("%X%B: undefined reference to `%T'\n"),
1326 abfd, name);
1327 else
1328 einfo (_("%B: warning: undefined reference to `%T'\n"),
1329 abfd, name);
b6f29aaa 1330 }
252b5132 1331 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1332 {
1333 if (error)
1334 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1335 abfd, name);
1336 else
1337 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1338 abfd, name);
1339 }
1340 else if (error)
1341 einfo ("%X");
252b5132
RH
1342 }
1343
b34976b6 1344 return TRUE;
252b5132
RH
1345}
1346
8aae64e6
AO
1347/* Counter to limit the number of relocation overflow error messages
1348 to print. Errors are printed as it is decremented. When it's
1349 called and the counter is zero, a final message is printed
1350 indicating more relocations were omitted. When it gets to -1, no
1351 such errors are printed. If it's initially set to a value less
1352 than -1, all such errors will be printed (--verbose does this). */
1353
1354int overflow_cutoff_limit = 10;
1355
252b5132
RH
1356/* This is called when a reloc overflows. */
1357
b34976b6 1358static bfd_boolean
1579bae1 1359reloc_overflow (struct bfd_link_info *info ATTRIBUTE_UNUSED,
dfeffb9f 1360 struct bfd_link_hash_entry *entry,
1579bae1
AM
1361 const char *name,
1362 const char *reloc_name,
1363 bfd_vma addend,
1364 bfd *abfd,
1365 asection *section,
1366 bfd_vma address)
252b5132 1367{
8aae64e6
AO
1368 if (overflow_cutoff_limit == -1)
1369 return TRUE;
1370
e1fffbe6 1371 einfo ("%X%C:", abfd, section, address);
8aae64e6
AO
1372
1373 if (overflow_cutoff_limit >= 0
1374 && overflow_cutoff_limit-- == 0)
1375 {
1376 einfo (_(" additional relocation overflows omitted from the output\n"));
1377 return TRUE;
1378 }
1379
dfeffb9f
L
1380 if (entry)
1381 {
1382 while (entry->type == bfd_link_hash_indirect
1383 || entry->type == bfd_link_hash_warning)
1384 entry = entry->u.i.link;
1385 switch (entry->type)
1386 {
1387 case bfd_link_hash_undefined:
1388 case bfd_link_hash_undefweak:
1389 einfo (_(" relocation truncated to fit: %s against undefined symbol `%T'"),
1390 reloc_name, entry->root.string);
1391 break;
1392 case bfd_link_hash_defined:
1393 case bfd_link_hash_defweak:
1394 einfo (_(" relocation truncated to fit: %s against symbol `%T' defined in %A section in %B"),
1395 reloc_name, entry->root.string,
a6e1b90f
L
1396 entry->u.def.section,
1397 entry->u.def.section == bfd_abs_section_ptr
f13a99db 1398 ? link_info.output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1399 break;
1400 default:
1401 abort ();
1402 break;
1403 }
1404 }
1405 else
1406 einfo (_(" relocation truncated to fit: %s against `%T'"),
1407 reloc_name, name);
252b5132
RH
1408 if (addend != 0)
1409 einfo ("+%v", addend);
1410 einfo ("\n");
b34976b6 1411 return TRUE;
252b5132
RH
1412}
1413
1414/* This is called when a dangerous relocation is made. */
1415
b34976b6 1416static bfd_boolean
1579bae1
AM
1417reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1418 const char *message,
1419 bfd *abfd,
1420 asection *section,
1421 bfd_vma address)
252b5132 1422{
e1fffbe6
AM
1423 einfo (_("%X%C: dangerous relocation: %s\n"),
1424 abfd, section, address, message);
b34976b6 1425 return TRUE;
252b5132
RH
1426}
1427
1428/* This is called when a reloc is being generated attached to a symbol
1429 that is not being output. */
1430
b34976b6 1431static bfd_boolean
1579bae1
AM
1432unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1433 const char *name,
1434 bfd *abfd,
1435 asection *section,
1436 bfd_vma address)
252b5132 1437{
e1fffbe6
AM
1438 einfo (_("%X%C: reloc refers to symbol `%T' which is not being output\n"),
1439 abfd, section, address, name);
b34976b6 1440 return TRUE;
252b5132
RH
1441}
1442
1443/* This is called if link_info.notice_all is set, or when a symbol in
1444 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1445 using the -y option, while notice_all is set if the --cref option
1446 has been supplied, or if there are any NOCROSSREFS sections in the
1447 linker script; and if plugins are active, since they need to monitor
1448 all references from non-IR files. */
252b5132 1449
b34976b6 1450static bfd_boolean
1579bae1
AM
1451notice (struct bfd_link_info *info,
1452 const char *name,
1453 bfd *abfd,
1454 asection *section,
1455 bfd_vma value)
252b5132 1456{
5061a885
AM
1457 if (name == NULL)
1458 {
1459 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1460 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1461 return TRUE;
1462 }
1463
5d3236ee
DK
1464#ifdef ENABLE_PLUGINS
1465 /* We should hide symbols in the dummy IR BFDs from the nocrossrefs list
1466 and let the real object files that are generated and added later trip
1467 the error instead. Similarly would be better to trace the real symbol
1468 from the real file than the temporary dummy. */
1469 if (!plugin_notice (info, name, abfd, section, value))
1470 return TRUE;
1471#endif /* ENABLE_PLUGINS */
1472
1473 if (info->notice_hash != NULL
1474 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1475 {
1476 if (bfd_is_und_section (section))
1477 einfo ("%B: reference to %s\n", abfd, name);
1478 else
1479 einfo ("%B: definition of %s\n", abfd, name);
1480 }
1481
1482 if (command_line.cref || nocrossref_list != NULL)
1483 add_cref (name, abfd, section, value);
1484
b34976b6 1485 return TRUE;
252b5132 1486}
This page took 0.567023 seconds and 4 git commands to generate.