PowerPC paranioa testing of symbol merging involving comdat groups
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
b3adc24a 2 Copyright (C) 1991-2020 Free Software Foundation, Inc.
252b5132
RH
3 Written by Steve Chamberlain steve@cygnus.com
4
f96b4a7b 5 This file is part of the GNU Binutils.
252b5132 6
f96b4a7b 7 This program is free software; you can redistribute it and/or modify
2fa9fc65 8 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
252b5132 11
f96b4a7b 12 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
2fa9fc65 17 You should have received a copy of the GNU General Public License
f96b4a7b
NC
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
3882b010 24#include "safe-ctype.h"
252b5132
RH
25#include "libiberty.h"
26#include "progress.h"
27#include "bfdlink.h"
1ff6de03 28#include "ctf-api.h"
5af11cab 29#include "filenames.h"
cae64165 30#include "elf/common.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
0381901e 43#if BFD_SUPPORTS_PLUGINS
5d3236ee
DK
44#include "plugin.h"
45#include "plugin-api.h"
0381901e 46#endif /* BFD_SUPPORTS_PLUGINS */
252b5132 47
0125cdf2 48/* Somewhere above, sys/stat.h got included. */
252b5132
RH
49#if !defined(S_ISDIR) && defined(S_IFDIR)
50#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
51#endif
52
53#include <string.h>
54
9c8ebd6a
DJ
55#ifndef TARGET_SYSTEM_ROOT
56#define TARGET_SYSTEM_ROOT ""
57#endif
58
252b5132
RH
59/* EXPORTS */
60
53d25da6
AM
61FILE *saved_script_handle = NULL;
62FILE *previous_script_handle = NULL;
63bfd_boolean force_make_executable = FALSE;
64
252b5132
RH
65char *default_target;
66const char *output_filename = "a.out";
67
68/* Name this program was invoked by. */
69char *program_name;
70
9c8ebd6a 71/* The prefix for system library directories. */
e2243057 72const char *ld_sysroot;
9c8ebd6a 73
3fe38064 74/* The canonical representation of ld_sysroot. */
0aa7f586 75char *ld_canon_sysroot;
3fe38064
NC
76int ld_canon_sysroot_len;
77
e8044f35 78/* Set by -G argument, for targets like MIPS ELF. */
252b5132
RH
79int g_switch_value = 8;
80
81/* Nonzero means print names of input files as processed. */
727a29ba 82unsigned int trace_files;
252b5132 83
cd6f1cf3
NC
84/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
85bfd_boolean verbose;
252b5132
RH
86
87/* Nonzero means version number was printed, so exit successfully
88 instead of complaining if no input files are given. */
b34976b6 89bfd_boolean version_printed;
252b5132 90
b34976b6
AM
91/* TRUE if we should demangle symbol names. */
92bfd_boolean demangling;
252b5132
RH
93
94args_type command_line;
95
96ld_config_type config;
97
bcaa7b3e
L
98sort_type sort_section;
99
e2243057
RS
100static const char *get_sysroot
101 (int, char **);
0125cdf2 102static char *get_emulation
1579bae1 103 (int, char **);
0125cdf2 104static bfd_boolean add_archive_element
5d3236ee 105 (struct bfd_link_info *, bfd *, const char *, bfd **);
1a72702b 106static void multiple_definition
24f58f47 107 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 108 bfd *, asection *, bfd_vma);
1a72702b 109static void multiple_common
24f58f47
AM
110 (struct bfd_link_info *, struct bfd_link_hash_entry *,
111 bfd *, enum bfd_link_hash_type, bfd_vma);
1a72702b 112static void add_to_set
1579bae1
AM
113 (struct bfd_link_info *, struct bfd_link_hash_entry *,
114 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
1a72702b 115static void constructor_callback
1579bae1
AM
116 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
117 asection *, bfd_vma);
1a72702b 118static void warning_callback
1579bae1
AM
119 (struct bfd_link_info *, const char *, const char *, bfd *,
120 asection *, bfd_vma);
0125cdf2 121static void warning_find_reloc
1579bae1 122 (bfd *, asection *, void *);
1a72702b 123static void undefined_symbol
1579bae1
AM
124 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
125 bfd_boolean);
1a72702b 126static void reloc_overflow
dfeffb9f
L
127 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
128 const char *, bfd_vma, bfd *, asection *, bfd_vma);
1a72702b 129static void reloc_dangerous
1579bae1 130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
1a72702b 131static void unattached_reloc
1579bae1 132 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 133static bfd_boolean notice
35ed3f94 134 (struct bfd_link_info *, struct bfd_link_hash_entry *,
46135103 135 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
0125cdf2
NC
136
137static struct bfd_link_callbacks link_callbacks =
138{
252b5132
RH
139 add_archive_element,
140 multiple_definition,
141 multiple_common,
142 add_to_set,
143 constructor_callback,
144 warning_callback,
145 undefined_symbol,
146 reloc_overflow,
147 reloc_dangerous,
148 unattached_reloc,
e1fffbe6 149 notice,
2889e75b 150 einfo,
49fa1e15
AM
151 info_msg,
152 minfo,
1ff6de03
NA
153 ldlang_override_segment_assignment,
154 ldlang_ctf_apply_strsym,
155 ldlang_write_ctf_late
252b5132
RH
156};
157
3b66a141 158static bfd_assert_handler_type default_bfd_assert_handler;
4519d071 159static bfd_error_handler_type default_bfd_error_handler;
3b66a141 160
252b5132
RH
161struct bfd_link_info link_info;
162\f
f37b21b4
RM
163struct dependency_file
164{
165 struct dependency_file *next;
166 char *name;
167};
168
169static struct dependency_file *dependency_files, *dependency_files_tail;
170
171void
172track_dependency_files (const char *filename)
173{
174 struct dependency_file *dep
175 = (struct dependency_file *) xmalloc (sizeof (*dep));
176 dep->name = xstrdup (filename);
177 dep->next = NULL;
178 if (dependency_files == NULL)
179 dependency_files = dep;
180 else
181 dependency_files_tail->next = dep;
182 dependency_files_tail = dep;
183}
184
185static void
186write_dependency_file (void)
187{
188 FILE *out;
189 struct dependency_file *dep;
190
191 out = fopen (config.dependency_file, FOPEN_WT);
192 if (out == NULL)
193 {
194 einfo (_("%F%P: cannot open dependency file %s: %E\n"),
195 config.dependency_file);
196 }
197
198 fprintf (out, "%s:", output_filename);
199
200 for (dep = dependency_files; dep != NULL; dep = dep->next)
201 fprintf (out, " \\\n %s", dep->name);
202
203 fprintf (out, "\n");
204 for (dep = dependency_files; dep != NULL; dep = dep->next)
205 fprintf (out, "\n%s:\n", dep->name);
206
207 fclose (out);
208}
209\f
252b5132 210static void
498cd2a0 211ld_cleanup (void)
252b5132 212{
498cd2a0 213 bfd_cache_close_all ();
0381901e 214#if BFD_SUPPORTS_PLUGINS
498cd2a0
AM
215 plugin_call_cleanup ();
216#endif
217 if (output_filename && delete_output_file_on_failure)
218 unlink_if_ordinary (output_filename);
252b5132
RH
219}
220
4519d071 221/* Hook to notice BFD assertions. */
3b66a141
HPN
222
223static void
224ld_bfd_assert_handler (const char *fmt, const char *bfdver,
225 const char *file, int line)
226{
3b66a141 227 config.make_executable = FALSE;
4519d071
AM
228 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
229}
230
231/* Hook the bfd error/warning handler for --fatal-warnings. */
232
233static void
234ld_bfd_error_handler (const char *fmt, va_list ap)
235{
236 if (config.fatal_warnings)
237 config.make_executable = FALSE;
238 (*default_bfd_error_handler) (fmt, ap);
3b66a141
HPN
239}
240
252b5132 241int
1579bae1 242main (int argc, char **argv)
252b5132
RH
243{
244 char *emulation;
245 long start_time = get_run_time ();
246
247#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
248 setlocale (LC_MESSAGES, "");
3882b010
L
249#endif
250#if defined (HAVE_SETLOCALE)
251 setlocale (LC_CTYPE, "");
252b5132
RH
252#endif
253 bindtextdomain (PACKAGE, LOCALEDIR);
254 textdomain (PACKAGE);
255
256 program_name = argv[0];
257 xmalloc_set_program_name (program_name);
258
259 START_PROGRESS (program_name, 0);
260
869b9d07
MM
261 expandargv (&argc, &argv);
262
bf2dd8d7
AM
263 if (bfd_init () != BFD_INIT_MAGIC)
264 einfo (_("%F%P: fatal error: libbfd ABI mismatch\n"));
252b5132
RH
265
266 bfd_set_error_program_name (program_name);
267
3b66a141
HPN
268 /* We want to notice and fail on those nasty BFD assertions which are
269 likely to signal incorrect output being generated but otherwise may
270 leave no trace. */
271 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
272
4519d071
AM
273 /* Also hook the bfd error/warning handler for --fatal-warnings. */
274 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
275
498cd2a0 276 xatexit (ld_cleanup);
252b5132 277
e2243057
RS
278 /* Set up the sysroot directory. */
279 ld_sysroot = get_sysroot (argc, argv);
280 if (*ld_sysroot)
3074964f 281 ld_canon_sysroot = lrealpath (ld_sysroot);
3fe38064 282 if (ld_canon_sysroot)
889be5db
DR
283 {
284 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
285
286 /* is_sysrooted_pathname() relies on no trailing dirsep. */
287 if (ld_canon_sysroot_len > 0
288 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
f37b21b4 289 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
889be5db 290 }
3fe38064
NC
291 else
292 ld_canon_sysroot_len = -1;
293
252b5132
RH
294 /* Set the default BFD target based on the configured target. Doing
295 this permits the linker to be configured for a particular target,
296 and linked against a shared BFD library which was configured for
297 a different target. The macro TARGET is defined by Makefile. */
0aa7f586 298 if (!bfd_set_default_target (TARGET))
252b5132
RH
299 {
300 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
301 xexit (1);
302 }
303
b47c4208
AM
304#if YYDEBUG
305 {
306 extern int yydebug;
307 yydebug = 1;
308 }
309#endif
310
b34976b6 311 config.build_constructors = TRUE;
c76308d2 312 config.rpath_separator = ':';
a854a4a7
AM
313 config.split_by_reloc = (unsigned) -1;
314 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
315 config.make_executable = TRUE;
316 config.magic_demand_paged = TRUE;
317 config.text_read_only = TRUE;
035801ce 318 config.print_map_discarded = TRUE;
4f9d22a0 319 link_info.disable_target_specific_optimizations = -1;
3b95049e 320
b34976b6 321 command_line.warn_mismatch = TRUE;
fe7929ce 322 command_line.warn_search_mismatch = TRUE;
02b0b1aa 323 command_line.check_section_addresses = -1;
bcaa7b3e 324
252b5132
RH
325 /* We initialize DEMANGLING based on the environment variable
326 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
327 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
328 environment. Acting the same way here lets us provide the same
329 interface by default. */
330 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
331
b34976b6 332 link_info.allow_undefined_version = TRUE;
b5067602 333 link_info.keep_memory = TRUE;
b5067602 334 link_info.combreloc = TRUE;
d5cd3933 335 link_info.strip_discarded = TRUE;
3f0a5f17 336 link_info.prohibit_multiple_definition_absolute = FALSE;
b32632c4 337 link_info.textrel_check = DEFAULT_LD_TEXTREL_CHECK;
2760f24c
RG
338 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
339 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
a9a4c53e
AM
340 link_info.callbacks = &link_callbacks;
341 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
342 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
343 and _fini symbols. We are compatible. */
344 link_info.init_function = "_init";
345 link_info.fini_function = "_fini";
a9a4c53e 346 link_info.relax_pass = 1;
889c2a67 347 link_info.extern_protected_data = -1;
aec6b87e 348 link_info.dynamic_undefined_weak = -1;
e0076ab3 349 link_info.pei386_auto_import = -1;
db6751f2 350 link_info.spare_dynamic_tags = 5;
967928e9 351 link_info.path_separator = ':';
6c3bc0f8
NC
352#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
353 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
354#endif
6734f10a 355#ifdef DEFAULT_NEW_DTAGS
91001320 356 link_info.new_dtags = DEFAULT_NEW_DTAGS;
6734f10a 357#endif
cae64165 358 link_info.start_stop_visibility = STV_PROTECTED;
24718e3b 359
252b5132 360 ldfile_add_arch ("");
252b5132
RH
361 emulation = get_emulation (argc, argv);
362 ldemul_choose_mode (emulation);
742aeb63 363 default_target = ldemul_choose_target (argc, argv);
252b5132 364 lang_init ();
18d6a79d 365 ldexp_init ();
252b5132 366 ldemul_before_parse ();
b34976b6 367 lang_has_input_file = FALSE;
252b5132
RH
368 parse_args (argc, argv);
369
2d643429
NC
370 if (config.hash_table_size != 0)
371 bfd_hash_set_default_size (config.hash_table_size);
372
0381901e 373#if BFD_SUPPORTS_PLUGINS
9bbc1a67 374 /* Now all the plugin arguments have been gathered, we can load them. */
d82184d7 375 plugin_load_plugins ();
0381901e 376#endif /* BFD_SUPPORTS_PLUGINS */
36af4a4e 377
9bbc1a67 378 ldemul_set_symbols ();
252b5132 379
14be8564
L
380 /* If we have not already opened and parsed a linker script,
381 try the default script from command line first. */
382 if (saved_script_handle == NULL
383 && command_line.default_script != NULL)
384 {
6ec6968b 385 ldfile_open_script_file (command_line.default_script);
14be8564
L
386 parser_input = input_script;
387 yyparse ();
388 }
389
b9a8de1e
NC
390 /* If we have not already opened and parsed a linker script
391 read the emulation's appropriate default script. */
b90e1c6f 392 if (saved_script_handle == NULL)
252b5132 393 {
252b5132 394 int isfile;
b7a26f91 395 char *s = ldemul_get_script (&isfile);
252b5132
RH
396
397 if (isfile)
7d24f02c 398 ldfile_open_default_command_file (s);
252b5132 399 else
b7a26f91 400 {
252b5132 401 lex_string = s;
dab69f68 402 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
403 }
404 parser_input = input_script;
405 yyparse ();
406 lex_string = NULL;
407 }
408
cd6f1cf3 409 if (verbose)
b9a8de1e 410 {
9cb61eab
AM
411 if (saved_script_handle)
412 info_msg (_("using external linker script:"));
413 else
414 info_msg (_("using internal linker script:"));
415 info_msg ("\n==================================================\n");
b9a8de1e
NC
416
417 if (saved_script_handle)
418 {
74699268 419 static const int ld_bufsz = 8193;
b9a8de1e 420 size_t n;
1e9cc1c2 421 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
422
423 rewind (saved_script_handle);
74699268 424 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 425 {
b7a26f91 426 buf[n] = 0;
f5ac6ab3 427 info_msg ("%s", buf);
b9a8de1e
NC
428 }
429 rewind (saved_script_handle);
430 free (buf);
431 }
432 else
433 {
434 int isfile;
435
b7a26f91 436 info_msg (ldemul_get_script (&isfile));
b9a8de1e 437 }
b7a26f91 438
b9a8de1e
NC
439 info_msg ("\n==================================================\n");
440 }
441
7bdf4127
AB
442 if (command_line.force_group_allocation
443 || !bfd_link_relocatable (&link_info))
444 link_info.resolve_section_groups = TRUE;
445 else
446 link_info.resolve_section_groups = FALSE;
447
30824704
RM
448 if (command_line.print_output_format)
449 info_msg ("%s\n", lang_get_output_target ());
450
252b5132
RH
451 lang_final ();
452
61e2488c
JT
453 /* If the only command line argument has been -v or --version or --verbose
454 then ignore any input files provided by linker scripts and exit now.
455 We do not want to create an output file when the linker is just invoked
456 to provide version information. */
457 if (argc == 2 && version_printed)
458 xexit (0);
459
a4819f54 460 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
df5f2391 461 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
a4819f54 462
b34976b6 463 if (!lang_has_input_file)
252b5132 464 {
30824704 465 if (version_printed || command_line.print_output_format)
252b5132 466 xexit (0);
df5f2391 467 einfo (_("%F%P: no input files\n"));
252b5132
RH
468 }
469
5c87f94b 470 if (verbose)
0125cdf2 471 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
472
473 ldemul_after_parse ();
474
252b5132
RH
475 if (config.map_filename)
476 {
477 if (strcmp (config.map_filename, "-") == 0)
478 {
479 config.map_file = stdout;
480 }
481 else
482 {
483 config.map_file = fopen (config.map_filename, FOPEN_WT);
484 if (config.map_file == (FILE *) NULL)
485 {
486 bfd_set_error (bfd_error_system_call);
df5f2391 487 einfo (_("%F%P: cannot open map file %s: %E\n"),
252b5132
RH
488 config.map_filename);
489 }
490 }
d2ef37eb 491 link_info.has_map_file = TRUE;
252b5132
RH
492 }
493
252b5132
RH
494 lang_process ();
495
496 /* Print error messages for any missing symbols, for any warning
6d5e62f8 497 symbols, and possibly multiple definitions. */
0e1862bb 498 if (bfd_link_relocatable (&link_info))
f13a99db 499 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 500 else
f13a99db 501 link_info.output_bfd->flags |= EXEC_P;
252b5132 502
0ce398f1
L
503 if ((link_info.compress_debug & COMPRESS_DEBUG))
504 {
505 link_info.output_bfd->flags |= BFD_COMPRESS;
506 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
507 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
508 }
509
252b5132
RH
510 ldwrite ();
511
512 if (config.map_file != NULL)
513 lang_map ();
514 if (command_line.cref)
515 output_cref (config.map_file != NULL ? config.map_file : stdout);
516 if (nocrossref_list != NULL)
517 check_nocrossrefs ();
3604cb1f
TG
518 if (command_line.print_memory_usage)
519 lang_print_memory_usage ();
edf84efc
NC
520#if 0
521 {
0aa7f586 522 struct bfd_link_hash_entry *h;
252b5132 523
edf84efc
NC
524 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
525 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
526 }
527#endif
18d6a79d 528 ldexp_finish ();
750877ba
L
529 lang_finish ();
530
f37b21b4
RM
531 if (config.dependency_file != NULL)
532 write_dependency_file ();
533
1049f94e 534 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 535 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 536 want to ignore for relocatable output?) */
b34976b6 537 if (!config.make_executable && !force_make_executable)
252b5132 538 {
5c87f94b 539 if (verbose)
0125cdf2
NC
540 einfo (_("%P: link errors found, deleting executable `%s'\n"),
541 output_filename);
252b5132 542
4309cbf2 543 /* The file will be removed by ld_cleanup. */
252b5132
RH
544 xexit (1);
545 }
546 else
547 {
0aa7f586 548 if (!bfd_close (link_info.output_bfd))
df5f2391 549 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
550
551 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
552 executable file and it doesn't end in .exe, copy it to one
553 which does. */
0e1862bb
L
554 if (!bfd_link_relocatable (&link_info)
555 && command_line.force_exe_suffix)
252b5132
RH
556 {
557 int len = strlen (output_filename);
0125cdf2 558
6d5e62f8 559 if (len < 4
252b5132
RH
560 || (strcasecmp (output_filename + len - 4, ".exe") != 0
561 && strcasecmp (output_filename + len - 4, ".dll") != 0))
562 {
563 FILE *src;
564 FILE *dst;
565 const int bsize = 4096;
1e9cc1c2 566 char *buf = (char *) xmalloc (bsize);
252b5132 567 int l;
1e9cc1c2 568 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 569
252b5132
RH
570 strcpy (dst_name, output_filename);
571 strcat (dst_name, ".exe");
572 src = fopen (output_filename, FOPEN_RB);
573 dst = fopen (dst_name, FOPEN_WB);
574
575 if (!src)
df5f2391 576 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
1579bae1 577 output_filename);
252b5132 578 if (!dst)
df5f2391 579 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
1579bae1 580 dst_name);
252b5132
RH
581 while ((l = fread (buf, 1, bsize, src)) > 0)
582 {
583 int done = fwrite (buf, 1, l, dst);
0125cdf2 584
252b5132 585 if (done != l)
df5f2391 586 einfo (_("%P: error writing file `%s'\n"), dst_name);
252b5132 587 }
0125cdf2 588
252b5132
RH
589 fclose (src);
590 if (fclose (dst) == EOF)
df5f2391 591 einfo (_("%P: error closing file `%s'\n"), dst_name);
252b5132
RH
592 free (dst_name);
593 free (buf);
594 }
595 }
596 }
597
598 END_PROGRESS (program_name);
599
600 if (config.stats)
601 {
252b5132
RH
602 long run_time = get_run_time () - start_time;
603
e922bcab 604 fflush (stdout);
252b5132
RH
605 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
606 program_name, run_time / 1000000, run_time % 1000000);
e922bcab 607 fflush (stderr);
252b5132
RH
608 }
609
4309cbf2 610 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
611 output_filename = NULL;
612
613 xexit (0);
614 return 0;
615}
616
e2243057
RS
617/* If the configured sysroot is relocatable, try relocating it based on
618 default prefix FROM. Return the relocated directory if it exists,
619 otherwise return null. */
620
621static char *
622get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
623{
624#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
625 char *path;
626 struct stat s;
627
628 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
629 if (path)
630 {
631 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
632 return path;
633 free (path);
634 }
635#endif
636 return 0;
637}
638
639/* Return the sysroot directory. Return "" if no sysroot is being used. */
640
641static const char *
642get_sysroot (int argc, char **argv)
643{
644 int i;
55d5520a 645 const char *path = NULL;
e2243057
RS
646
647 for (i = 1; i < argc; i++)
0112cd26 648 if (CONST_STRNEQ (argv[i], "--sysroot="))
55d5520a 649 path = argv[i] + strlen ("--sysroot=");
e2243057 650
55d5520a
AM
651 if (!path)
652 path = get_relative_sysroot (BINDIR);
e2243057 653
55d5520a
AM
654 if (!path)
655 path = get_relative_sysroot (TOOLBINDIR);
656
657 if (!path)
658 path = TARGET_SYSTEM_ROOT;
659
660 if (IS_DIR_SEPARATOR (*path) && path[1] == 0)
661 path = "";
e2243057 662
55d5520a 663 return path;
e2243057
RS
664}
665
252b5132
RH
666/* We need to find any explicitly given emulation in order to initialize the
667 state that's needed by the lex&yacc argument parser (parse_args). */
668
669static char *
1579bae1 670get_emulation (int argc, char **argv)
252b5132
RH
671{
672 char *emulation;
673 int i;
674
675 emulation = getenv (EMULATION_ENVIRON);
676 if (emulation == NULL)
677 emulation = DEFAULT_EMULATION;
678
679 for (i = 1; i < argc; i++)
680 {
0112cd26 681 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
682 {
683 if (argv[i][2] == '\0')
684 {
685 /* -m EMUL */
686 if (i < argc - 1)
687 {
688 emulation = argv[i + 1];
689 i++;
690 }
691 else
df5f2391 692 einfo (_("%F%P: missing argument to -m\n"));
252b5132
RH
693 }
694 else if (strcmp (argv[i], "-mips1") == 0
695 || strcmp (argv[i], "-mips2") == 0
696 || strcmp (argv[i], "-mips3") == 0
d1cf510e 697 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
698 || strcmp (argv[i], "-mips5") == 0
699 || strcmp (argv[i], "-mips32") == 0
700 || strcmp (argv[i], "-mips32r2") == 0
7361da2c 701 || strcmp (argv[i], "-mips32r6") == 0
5f74bc13 702 || strcmp (argv[i], "-mips64") == 0
7361da2c
AB
703 || strcmp (argv[i], "-mips64r2") == 0
704 || strcmp (argv[i], "-mips64r6") == 0)
252b5132 705 {
31d677f9 706 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
707 passed to the linker by some MIPS compilers. They
708 generally tell the linker to use a slightly different
709 library path. Perhaps someday these should be
710 implemented as emulations; until then, we just ignore
711 the arguments and hope that nobody ever creates
712 emulations named ips1, ips2 or ips3. */
713 }
714 else if (strcmp (argv[i], "-m486") == 0)
715 {
716 /* FIXME: The argument -m486 is passed to the linker on
717 some Linux systems. Hope that nobody creates an
718 emulation named 486. */
719 }
720 else
721 {
722 /* -mEMUL */
723 emulation = &argv[i][2];
724 }
725 }
726 }
727
728 return emulation;
729}
730
252b5132 731void
1579bae1 732add_ysym (const char *name)
252b5132 733{
1579bae1 734 if (link_info.notice_hash == NULL)
252b5132 735 {
0aa7f586
AM
736 link_info.notice_hash
737 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
738 if (!bfd_hash_table_init_n (link_info.notice_hash,
739 bfd_hash_newfunc,
740 sizeof (struct bfd_hash_entry),
741 61))
df5f2391 742 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
6d5e62f8 743 }
252b5132 744
1579bae1 745 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
df5f2391 746 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
747}
748
0e86e20e
AM
749void
750add_ignoresym (struct bfd_link_info *info, const char *name)
751{
752 if (info->ignore_hash == NULL)
753 {
754 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
0aa7f586
AM
755 if (!bfd_hash_table_init_n (info->ignore_hash,
756 bfd_hash_newfunc,
757 sizeof (struct bfd_hash_entry),
758 61))
df5f2391 759 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
0e86e20e
AM
760 }
761
762 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
df5f2391 763 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
0e86e20e
AM
764}
765
252b5132
RH
766/* Record a symbol to be wrapped, from the --wrap option. */
767
768void
1579bae1 769add_wrap (const char *name)
252b5132
RH
770{
771 if (link_info.wrap_hash == NULL)
772 {
0aa7f586
AM
773 link_info.wrap_hash
774 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
775 if (!bfd_hash_table_init_n (link_info.wrap_hash,
776 bfd_hash_newfunc,
777 sizeof (struct bfd_hash_entry),
778 61))
df5f2391 779 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132 780 }
0125cdf2 781
b34976b6 782 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
df5f2391 783 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
784}
785
786/* Handle the -retain-symbols-file option. */
787
788void
1579bae1 789add_keepsyms_file (const char *filename)
252b5132
RH
790{
791 FILE *file;
792 char *buf;
793 size_t bufsize;
794 int c;
795
796 if (link_info.strip == strip_some)
797 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
798
799 file = fopen (filename, "r");
1579bae1 800 if (file == NULL)
252b5132
RH
801 {
802 bfd_set_error (bfd_error_system_call);
803 einfo ("%X%P: %s: %E\n", filename);
804 return;
805 }
806
1e9cc1c2
NC
807 link_info.keep_hash = (struct bfd_hash_table *)
808 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
809 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
810 sizeof (struct bfd_hash_entry)))
df5f2391 811 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132
RH
812
813 bufsize = 100;
1e9cc1c2 814 buf = (char *) xmalloc (bufsize);
252b5132
RH
815
816 c = getc (file);
817 while (c != EOF)
818 {
3882b010 819 while (ISSPACE (c))
252b5132
RH
820 c = getc (file);
821
822 if (c != EOF)
823 {
824 size_t len = 0;
825
0aa7f586 826 while (!ISSPACE (c) && c != EOF)
252b5132
RH
827 {
828 buf[len] = c;
829 ++len;
830 if (len >= bufsize)
831 {
832 bufsize *= 2;
1e9cc1c2 833 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
834 }
835 c = getc (file);
836 }
837
838 buf[len] = '\0';
839
1579bae1 840 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
df5f2391 841 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
252b5132
RH
842 }
843 }
844
845 if (link_info.strip != strip_none)
846 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
847
5ed6aba4 848 free (buf);
252b5132 849 link_info.strip = strip_some;
d9313f4f 850 fclose (file);
252b5132
RH
851}
852\f
853/* Callbacks from the BFD linker routines. */
854
855/* This is called when BFD has decided to include an archive member in
856 a link. */
857
b34976b6 858static bfd_boolean
e1fffbe6 859add_archive_element (struct bfd_link_info *info,
1579bae1 860 bfd *abfd,
5d3236ee
DK
861 const char *name,
862 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
863{
864 lang_input_statement_type *input;
1fa4ec6a 865 lang_input_statement_type *parent;
5d3236ee 866 lang_input_statement_type orig_input;
252b5132 867
1e9cc1c2
NC
868 input = (lang_input_statement_type *)
869 xcalloc (1, sizeof (lang_input_statement_type));
fb47deda 870 input->header.type = lang_input_statement_enum;
607b4833
AM
871 input->filename = bfd_get_filename (abfd);
872 input->local_sym_name = bfd_get_filename (abfd);
252b5132 873 input->the_bfd = abfd;
252b5132 874
5d3236ee
DK
875 /* Save the original data for trace files/tries below, as plugins
876 (if enabled) may possibly alter it to point to a replacement
877 BFD, but we still want to output the original BFD filename. */
878 orig_input = *input;
0381901e 879#if BFD_SUPPORTS_PLUGINS
b95a0a31 880 if (link_info.lto_plugin_active)
5d3236ee
DK
881 {
882 /* We must offer this archive member to the plugins to claim. */
35a1e5f3
L
883 plugin_maybe_claim (input);
884 if (input->flags.claimed)
5d3236ee 885 {
b95a0a31
L
886 if (no_more_claiming)
887 {
888 /* Don't claim new IR symbols after all IR symbols have
889 been claimed. */
5c87f94b 890 if (verbose)
6e0c75f7 891 info_msg ("%pI: no new IR symbols to claim\n",
b95a0a31
L
892 &orig_input);
893 input->flags.claimed = 0;
894 return FALSE;
895 }
35a1e5f3
L
896 input->flags.claim_archive = TRUE;
897 *subsbfd = input->the_bfd;
5d3236ee
DK
898 }
899 }
0381901e 900#endif /* BFD_SUPPORTS_PLUGINS */
5d3236ee 901
9221725d
AM
902 if (link_info.input_bfds_tail == &input->the_bfd->link.next
903 || input->the_bfd->link.next != NULL)
904 {
905 /* We have already loaded this element, and are attempting to
906 load it again. This can happen when the archive map doesn't
907 match actual symbols defined by the element. */
908 free (input);
909 bfd_set_error (bfd_error_malformed_archive);
910 return FALSE;
911 }
912
913 /* Set the file_chain pointer of archives to the last element loaded
914 from the archive. See ldlang.c:find_rescan_insertion. */
915 parent = bfd_usrdata (abfd->my_archive);
916 if (parent != NULL && !parent->flags.reload)
917 parent->next = input;
918
252b5132
RH
919 ldlang_add_file (input);
920
1579bae1 921 if (config.map_file != NULL)
252b5132 922 {
b34976b6 923 static bfd_boolean header_printed;
252b5132
RH
924 struct bfd_link_hash_entry *h;
925 bfd *from;
926 int len;
927
e1fffbe6 928 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
aa654ee8
AM
929 if (h == NULL
930 && info->pei386_auto_import
931 && CONST_STRNEQ (name, "__imp_"))
932 h = bfd_link_hash_lookup (info->hash, name + 6, FALSE, FALSE, TRUE);
252b5132
RH
933
934 if (h == NULL)
935 from = NULL;
936 else
937 {
938 switch (h->type)
939 {
940 default:
941 from = NULL;
942 break;
943
944 case bfd_link_hash_defined:
945 case bfd_link_hash_defweak:
946 from = h->u.def.section->owner;
947 break;
948
949 case bfd_link_hash_undefined:
950 case bfd_link_hash_undefweak:
951 from = h->u.undef.abfd;
952 break;
953
954 case bfd_link_hash_common:
955 from = h->u.c.p->section->owner;
956 break;
957 }
958 }
959
0aa7f586 960 if (!header_printed)
252b5132 961 {
1273da04 962 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
b34976b6 963 header_printed = TRUE;
252b5132
RH
964 }
965
3860d2b4
AM
966 if (abfd->my_archive == NULL
967 || bfd_is_thin_archive (abfd->my_archive))
252b5132
RH
968 {
969 minfo ("%s", bfd_get_filename (abfd));
970 len = strlen (bfd_get_filename (abfd));
971 }
972 else
973 {
3860d2b4 974 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
252b5132 975 bfd_get_filename (abfd));
3860d2b4 976 len = (strlen (bfd_get_filename (abfd->my_archive))
252b5132
RH
977 + strlen (bfd_get_filename (abfd))
978 + 2);
979 }
980
981 if (len >= 29)
982 {
983 print_nl ();
984 len = 0;
985 }
986 while (len < 30)
987 {
988 print_space ();
989 ++len;
990 }
991
992 if (from != NULL)
871b3ab2 993 minfo ("%pB ", from);
252b5132 994 if (h != NULL)
c1c8c1ef 995 minfo ("(%pT)\n", h->root.string);
252b5132
RH
996 else
997 minfo ("(%s)\n", name);
998 }
999
727a29ba
AM
1000 if (verbose
1001 || trace_files > 1
1002 || (trace_files && bfd_is_thin_archive (orig_input.the_bfd->my_archive)))
c1c8c1ef 1003 info_msg ("%pI\n", &orig_input);
b34976b6 1004 return TRUE;
252b5132
RH
1005}
1006
1007/* This is called when BFD has discovered a symbol which is defined
1008 multiple times. */
1009
1a72702b 1010static void
24f58f47
AM
1011multiple_definition (struct bfd_link_info *info,
1012 struct bfd_link_hash_entry *h,
1579bae1
AM
1013 bfd *nbfd,
1014 asection *nsec,
1015 bfd_vma nval)
252b5132 1016{
24f58f47
AM
1017 const char *name;
1018 bfd *obfd;
1019 asection *osec;
1020 bfd_vma oval;
1021
1022 if (info->allow_multiple_definition)
1a72702b 1023 return;
24f58f47
AM
1024
1025 switch (h->type)
1026 {
1027 case bfd_link_hash_defined:
1028 osec = h->u.def.section;
1029 oval = h->u.def.value;
1030 obfd = h->u.def.section->owner;
1031 break;
1032 case bfd_link_hash_indirect:
1033 osec = bfd_ind_section_ptr;
1034 oval = 0;
1035 obfd = NULL;
1036 break;
1037 default:
1038 abort ();
1039 }
1040
1041 /* Ignore a redefinition of an absolute symbol to the
1042 same value; it's harmless. */
1043 if (h->type == bfd_link_hash_defined
1044 && bfd_is_abs_section (osec)
1045 && bfd_is_abs_section (nsec)
1046 && nval == oval)
1a72702b 1047 return;
24f58f47 1048
252b5132
RH
1049 /* If either section has the output_section field set to
1050 bfd_abs_section_ptr, it means that the section is being
1051 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
1052 FIXME: It would be cleaner to somehow ignore symbols defined in
1053 sections which are being discarded. */
3f0a5f17
ME
1054 if (!info->prohibit_multiple_definition_absolute
1055 && ((osec->output_section != NULL
1056 && ! bfd_is_abs_section (osec)
1057 && bfd_is_abs_section (osec->output_section))
1058 || (nsec->output_section != NULL
1059 && !bfd_is_abs_section (nsec)
1060 && bfd_is_abs_section (nsec->output_section))))
1a72702b 1061 return;
252b5132 1062
24f58f47
AM
1063 name = h->root.string;
1064 if (nbfd == NULL)
1065 {
1066 nbfd = obfd;
1067 nsec = osec;
1068 nval = oval;
1069 obfd = NULL;
1070 }
df5f2391 1071 einfo (_("%X%P: %C: multiple definition of `%pT'"),
252b5132 1072 nbfd, nsec, nval, name);
1579bae1 1073 if (obfd != NULL)
df5f2391
AM
1074 einfo (_("; %D: first defined here"), obfd, osec, oval);
1075 einfo ("\n");
9b14b192 1076
13761a11 1077 if (RELAXATION_ENABLED_BY_USER)
9b14b192 1078 {
df5f2391 1079 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
13761a11 1080 DISABLE_RELAXATION;
9b14b192 1081 }
252b5132
RH
1082}
1083
1084/* This is called when there is a definition of a common symbol, or
1085 when a common symbol is found for a symbol that is already defined,
1086 or when two common symbols are found. We only do something if
1087 -warn-common was used. */
1088
1a72702b 1089static void
1579bae1 1090multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 1091 struct bfd_link_hash_entry *h,
1579bae1
AM
1092 bfd *nbfd,
1093 enum bfd_link_hash_type ntype,
1094 bfd_vma nsize)
252b5132 1095{
24f58f47
AM
1096 const char *name;
1097 bfd *obfd;
1098 enum bfd_link_hash_type otype;
1099 bfd_vma osize;
1100
1101 if (!config.warn_common)
1a72702b 1102 return;
252b5132 1103
24f58f47
AM
1104 name = h->root.string;
1105 otype = h->type;
1106 if (otype == bfd_link_hash_common)
1107 {
1108 obfd = h->u.c.p->section->owner;
1109 osize = h->u.c.size;
1110 }
1111 else if (otype == bfd_link_hash_defined
1112 || otype == bfd_link_hash_defweak)
1113 {
1114 obfd = h->u.def.section->owner;
1115 osize = 0;
1116 }
1117 else
1118 {
1119 /* FIXME: It would nice if we could report the BFD which defined
1120 an indirect symbol, but we don't have anywhere to store the
1121 information. */
1122 obfd = NULL;
1123 osize = 0;
1124 }
1125
252b5132
RH
1126 if (ntype == bfd_link_hash_defined
1127 || ntype == bfd_link_hash_defweak
1128 || ntype == bfd_link_hash_indirect)
1129 {
1130 ASSERT (otype == bfd_link_hash_common);
252b5132 1131 if (obfd != NULL)
df5f2391
AM
1132 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1133 " from %pB\n"),
1134 nbfd, name, obfd);
1135 else
1136 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1137 nbfd, name);
252b5132
RH
1138 }
1139 else if (otype == bfd_link_hash_defined
1140 || otype == bfd_link_hash_defweak
1141 || otype == bfd_link_hash_indirect)
1142 {
1143 ASSERT (ntype == bfd_link_hash_common);
252b5132 1144 if (obfd != NULL)
df5f2391
AM
1145 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1146 " from %pB\n"),
1147 nbfd, name, obfd);
1148 else
1149 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1150 nbfd, name);
252b5132
RH
1151 }
1152 else
1153 {
1154 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1155 if (osize > nsize)
1156 {
252b5132 1157 if (obfd != NULL)
df5f2391
AM
1158 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1159 " by larger common from %pB\n"),
1160 nbfd, name, obfd);
1161 else
1162 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1163 " by larger common\n"),
1164 nbfd, name);
252b5132
RH
1165 }
1166 else if (nsize > osize)
1167 {
252b5132 1168 if (obfd != NULL)
df5f2391
AM
1169 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1170 " smaller common from %pB\n"),
1171 nbfd, name, obfd);
1172 else
1173 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1174 " smaller common\n"),
1175 nbfd, name);
252b5132
RH
1176 }
1177 else
1178 {
252b5132 1179 if (obfd != NULL)
df5f2391
AM
1180 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1181 nbfd, obfd, name);
1182 else
1183 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1184 nbfd, name);
252b5132
RH
1185 }
1186 }
252b5132
RH
1187}
1188
1189/* This is called when BFD has discovered a set element. H is the
1190 entry in the linker hash table for the set. SECTION and VALUE
1191 represent a value which should be added to the set. */
1192
1a72702b 1193static void
1579bae1
AM
1194add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1195 struct bfd_link_hash_entry *h,
1196 bfd_reloc_code_real_type reloc,
1197 bfd *abfd,
1198 asection *section,
1199 bfd_vma value)
252b5132
RH
1200{
1201 if (config.warn_constructors)
1202 einfo (_("%P: warning: global constructor %s used\n"),
1203 h->root.string);
1204
0aa7f586 1205 if (!config.build_constructors)
1a72702b 1206 return;
252b5132 1207
1579bae1 1208 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1209
1210 if (h->type == bfd_link_hash_new)
1211 {
1212 h->type = bfd_link_hash_undefined;
1213 h->u.undef.abfd = abfd;
1214 /* We don't call bfd_link_add_undef to add this to the list of
1215 undefined symbols because we are going to define it
1216 ourselves. */
1217 }
252b5132
RH
1218}
1219
1220/* This is called when BFD has discovered a constructor. This is only
1221 called for some object file formats--those which do not handle
1222 constructors in some more clever fashion. This is similar to
1223 adding an element to a set, but less general. */
1224
1a72702b 1225static void
1579bae1
AM
1226constructor_callback (struct bfd_link_info *info,
1227 bfd_boolean constructor,
1228 const char *name,
1229 bfd *abfd,
1230 asection *section,
1231 bfd_vma value)
252b5132
RH
1232{
1233 char *s;
1234 struct bfd_link_hash_entry *h;
1235 char set_name[1 + sizeof "__CTOR_LIST__"];
1236
1237 if (config.warn_constructors)
1238 einfo (_("%P: warning: global constructor %s used\n"), name);
1239
0aa7f586 1240 if (!config.build_constructors)
1a72702b 1241 return;
252b5132
RH
1242
1243 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1244 useful error message. */
0e86e20e 1245 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
0e1862bb 1246 && (bfd_link_relocatable (info)
252b5132 1247 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
df5f2391 1248 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
252b5132
RH
1249
1250 s = set_name;
1251 if (bfd_get_symbol_leading_char (abfd) != '\0')
1252 *s++ = bfd_get_symbol_leading_char (abfd);
1253 if (constructor)
1254 strcpy (s, "__CTOR_LIST__");
1255 else
1256 strcpy (s, "__DTOR_LIST__");
1257
b34976b6 1258 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132 1259 if (h == (struct bfd_link_hash_entry *) NULL)
df5f2391 1260 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
252b5132
RH
1261 if (h->type == bfd_link_hash_new)
1262 {
1263 h->type = bfd_link_hash_undefined;
1264 h->u.undef.abfd = abfd;
1265 /* We don't call bfd_link_add_undef to add this to the list of
1266 undefined symbols because we are going to define it
1267 ourselves. */
1268 }
1269
1270 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
252b5132
RH
1271}
1272
1273/* A structure used by warning_callback to pass information through
1274 bfd_map_over_sections. */
1275
0125cdf2
NC
1276struct warning_callback_info
1277{
b34976b6 1278 bfd_boolean found;
252b5132
RH
1279 const char *warning;
1280 const char *symbol;
1281 asymbol **asymbols;
1282};
1283
4c6d802e
L
1284/* Look through the relocs to see if we can find a plausible address
1285 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1286
1287static bfd_boolean
1288symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1289{
1290 struct warning_callback_info cinfo;
1291
1292 if (!bfd_generic_link_read_symbols (abfd))
df5f2391 1293 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
4c6d802e
L
1294
1295 cinfo.found = FALSE;
1296 cinfo.warning = warning;
1297 cinfo.symbol = symbol;
1298 cinfo.asymbols = bfd_get_outsymbols (abfd);
1299 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1300 return cinfo.found;
1301}
1302
252b5132
RH
1303/* This is called when there is a reference to a warning symbol. */
1304
1a72702b 1305static void
1579bae1
AM
1306warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1307 const char *warning,
1308 const char *symbol,
1309 bfd *abfd,
1310 asection *section,
1311 bfd_vma address)
252b5132
RH
1312{
1313 /* This is a hack to support warn_multiple_gp. FIXME: This should
1314 have a cleaner interface, but what? */
0aa7f586 1315 if (!config.warn_multiple_gp
252b5132 1316 && strcmp (warning, "using multiple gp values") == 0)
1a72702b 1317 return;
252b5132
RH
1318
1319 if (section != NULL)
df5f2391 1320 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1321 else if (abfd == NULL)
300475fe 1322 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1323 else if (symbol == NULL)
df5f2391 1324 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
0aa7f586 1325 else if (!symbol_warning (warning, symbol, abfd))
252b5132 1326 {
4c6d802e
L
1327 bfd *b;
1328 /* Search all input files for a reference to SYMBOL. */
c72f2fb2 1329 for (b = info->input_bfds; b; b = b->link.next)
4c6d802e 1330 if (b != abfd && symbol_warning (warning, symbol, b))
1a72702b 1331 return;
df5f2391 1332 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
252b5132 1333 }
252b5132
RH
1334}
1335
1336/* This is called by warning_callback for each section. It checks the
1337 relocs of the section to see if it can find a reference to the
1338 symbol which triggered the warning. If it can, it uses the reloc
1339 to give an error message with a file and line number. */
1340
1341static void
1579bae1 1342warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1343{
1e9cc1c2 1344 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1345 long relsize;
1346 arelent **relpp;
1347 long relcount;
1348 arelent **p, **pend;
1349
1350 if (info->found)
1351 return;
1352
1353 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1354 if (relsize < 0)
df5f2391 1355 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1356 if (relsize == 0)
1357 return;
1358
1e9cc1c2 1359 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1360 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1361 if (relcount < 0)
df5f2391 1362 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1363
1364 p = relpp;
1365 pend = p + relcount;
1366 for (; p < pend && *p != NULL; p++)
1367 {
1368 arelent *q = *p;
1369
1370 if (q->sym_ptr_ptr != NULL
1371 && *q->sym_ptr_ptr != NULL
1372 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1373 {
1374 /* We found a reloc for the symbol we are looking for. */
df5f2391 1375 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
300475fe 1376 info->warning);
b34976b6 1377 info->found = TRUE;
252b5132
RH
1378 break;
1379 }
1380 }
1381
1382 free (relpp);
1383}
1384
23ae20f5
NC
1385#if SUPPORT_ERROR_HANDLING_SCRIPT
1386char * error_handling_script = NULL;
1387#endif
1388
252b5132
RH
1389/* This is called when an undefined symbol is found. */
1390
1a72702b 1391static void
0e86e20e 1392undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1393 const char *name,
1394 bfd *abfd,
1395 asection *section,
1396 bfd_vma address,
0b28295d 1397 bfd_boolean error)
252b5132
RH
1398{
1399 static char *error_name;
1400 static unsigned int error_count;
1401
1402#define MAX_ERRORS_IN_A_ROW 5
1403
0e86e20e
AM
1404 if (info->ignore_hash != NULL
1405 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1a72702b 1406 return;
0e86e20e 1407
252b5132
RH
1408 if (config.warn_once)
1409 {
252b5132 1410 /* Only warn once about a particular undefined symbol. */
0e86e20e 1411 add_ignoresym (info, name);
252b5132
RH
1412 }
1413
1414 /* We never print more than a reasonable number of errors in a row
1415 for a single symbol. */
1579bae1 1416 if (error_name != NULL
252b5132
RH
1417 && strcmp (name, error_name) == 0)
1418 ++error_count;
1419 else
1420 {
1421 error_count = 0;
5e2ab612 1422 free (error_name);
d1b2b2dc 1423 error_name = xstrdup (name);
252b5132
RH
1424 }
1425
23ae20f5
NC
1426#if SUPPORT_ERROR_HANDLING_SCRIPT
1427 if (error_handling_script != NULL
1428 && error_count < MAX_ERRORS_IN_A_ROW)
1429 {
1430 char * argv[4];
1431 const char * res;
1432 int status, err;
1433
1434 argv[0] = error_handling_script;
93cf38c0 1435 argv[1] = "undefined-symbol";
23ae20f5
NC
1436 argv[2] = (char *) name;
1437 argv[3] = NULL;
1438
1439 if (verbose)
1440 einfo (_("%P: About to run error handling script '%s' with arguments: '%s' '%s'\n"),
1441 argv[0], argv[1], argv[2]);
1442
1443 res = pex_one (PEX_SEARCH, error_handling_script, argv,
1444 N_("error handling script"),
1445 NULL /* Send stdout to random, temp file. */,
1446 NULL /* Write to stderr. */,
1447 &status, &err);
1448 if (res != NULL)
1449 {
1450 einfo (_("%P: Failed to run error handling script '%s', reason: "),
1451 error_handling_script);
1452 /* FIXME: We assume here that errrno == err. */
1453 perror (res);
1454 }
1455 /* We ignore the return status of the script and
1456 carry on to issue the normal error message. */
1457 }
1458#endif /* SUPPORT_ERROR_HANDLING_SCRIPT */
1459
252b5132
RH
1460 if (section != NULL)
1461 {
1462 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1463 {
0b28295d 1464 if (error)
df5f2391 1465 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
0b28295d
ILT
1466 abfd, section, address, name);
1467 else
df5f2391 1468 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
0b28295d 1469 abfd, section, address, name);
b6f29aaa 1470 }
252b5132 1471 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1472 {
1473 if (error)
df5f2391 1474 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1475 abfd, section, address, name);
1476 else
df5f2391 1477 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1478 abfd, section, address, name);
1479 }
1480 else if (error)
1481 einfo ("%X");
252b5132
RH
1482 }
1483 else
1484 {
1485 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1486 {
0b28295d 1487 if (error)
df5f2391 1488 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
0b28295d
ILT
1489 abfd, name);
1490 else
df5f2391 1491 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
0b28295d 1492 abfd, name);
b6f29aaa 1493 }
252b5132 1494 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1495 {
1496 if (error)
df5f2391 1497 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1498 abfd, name);
1499 else
df5f2391 1500 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1501 abfd, name);
1502 }
1503 else if (error)
1504 einfo ("%X");
252b5132 1505 }
252b5132
RH
1506}
1507
8aae64e6
AO
1508/* Counter to limit the number of relocation overflow error messages
1509 to print. Errors are printed as it is decremented. When it's
1510 called and the counter is zero, a final message is printed
1511 indicating more relocations were omitted. When it gets to -1, no
1512 such errors are printed. If it's initially set to a value less
1513 than -1, all such errors will be printed (--verbose does this). */
1514
1515int overflow_cutoff_limit = 10;
1516
252b5132
RH
1517/* This is called when a reloc overflows. */
1518
1a72702b 1519static void
0e86e20e 1520reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1521 struct bfd_link_hash_entry *entry,
1579bae1
AM
1522 const char *name,
1523 const char *reloc_name,
1524 bfd_vma addend,
1525 bfd *abfd,
1526 asection *section,
1527 bfd_vma address)
252b5132 1528{
8aae64e6 1529 if (overflow_cutoff_limit == -1)
1a72702b 1530 return;
8aae64e6 1531
a5990ada 1532 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1533
1534 if (overflow_cutoff_limit >= 0
1535 && overflow_cutoff_limit-- == 0)
1536 {
1537 einfo (_(" additional relocation overflows omitted from the output\n"));
1a72702b 1538 return;
8aae64e6
AO
1539 }
1540
dfeffb9f
L
1541 if (entry)
1542 {
1543 while (entry->type == bfd_link_hash_indirect
1544 || entry->type == bfd_link_hash_warning)
1545 entry = entry->u.i.link;
1546 switch (entry->type)
1547 {
1548 case bfd_link_hash_undefined:
1549 case bfd_link_hash_undefweak:
0aa7f586 1550 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1551 "%s against undefined symbol `%pT'"),
dfeffb9f
L
1552 reloc_name, entry->root.string);
1553 break;
1554 case bfd_link_hash_defined:
1555 case bfd_link_hash_defweak:
0aa7f586 1556 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1557 "%s against symbol `%pT' defined in %pA section in %pB"),
dfeffb9f 1558 reloc_name, entry->root.string,
a6e1b90f
L
1559 entry->u.def.section,
1560 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1561 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1562 break;
1563 default:
1564 abort ();
1565 break;
1566 }
1567 }
1568 else
c1c8c1ef 1569 einfo (_(" relocation truncated to fit: %s against `%pT'"),
dfeffb9f 1570 reloc_name, name);
252b5132
RH
1571 if (addend != 0)
1572 einfo ("+%v", addend);
1573 einfo ("\n");
252b5132
RH
1574}
1575
1576/* This is called when a dangerous relocation is made. */
1577
1a72702b 1578static void
1579bae1
AM
1579reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1580 const char *message,
1581 bfd *abfd,
1582 asection *section,
1583 bfd_vma address)
252b5132 1584{
a5990ada 1585 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1586 abfd, section, address, message);
252b5132
RH
1587}
1588
1589/* This is called when a reloc is being generated attached to a symbol
1590 that is not being output. */
1591
1a72702b 1592static void
1579bae1
AM
1593unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1594 const char *name,
1595 bfd *abfd,
1596 asection *section,
1597 bfd_vma address)
252b5132 1598{
a5990ada 1599 einfo (_("%X%H: reloc refers to symbol `%pT' which is not being output\n"),
e1fffbe6 1600 abfd, section, address, name);
252b5132
RH
1601}
1602
1603/* This is called if link_info.notice_all is set, or when a symbol in
1604 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1605 using the -y option, while notice_all is set if the --cref option
1606 has been supplied, or if there are any NOCROSSREFS sections in the
1607 linker script; and if plugins are active, since they need to monitor
1608 all references from non-IR files. */
252b5132 1609
b34976b6 1610static bfd_boolean
1579bae1 1611notice (struct bfd_link_info *info,
35ed3f94 1612 struct bfd_link_hash_entry *h,
46135103 1613 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1579bae1
AM
1614 bfd *abfd,
1615 asection *section,
16d96b5b 1616 bfd_vma value,
46135103 1617 flagword flags ATTRIBUTE_UNUSED)
252b5132 1618{
35ed3f94
AM
1619 const char *name;
1620
1621 if (h == NULL)
5061a885
AM
1622 {
1623 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1624 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1625 return TRUE;
1626 }
1627
35ed3f94 1628 name = h->root.string;
5d3236ee 1629 if (info->notice_hash != NULL
9e2278f5 1630 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1631 {
1632 if (bfd_is_und_section (section))
df5f2391 1633 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
252b5132 1634 else
df5f2391 1635 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
252b5132
RH
1636 }
1637
1638 if (command_line.cref || nocrossref_list != NULL)
1639 add_cref (name, abfd, section, value);
1640
b34976b6 1641 return TRUE;
252b5132 1642}
This page took 1.074058 seconds and 4 git commands to generate.