Implement proper "startup-with-shell" support on gdbserver
[deliverable/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
2571583a 2 Copyright (C) 1991-2017 Free Software Foundation, Inc.
252b5132
RH
3 Written by Steve Chamberlain steve@cygnus.com
4
f96b4a7b 5 This file is part of the GNU Binutils.
252b5132 6
f96b4a7b 7 This program is free software; you can redistribute it and/or modify
2fa9fc65 8 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
252b5132 11
f96b4a7b 12 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
2fa9fc65 17 You should have received a copy of the GNU General Public License
f96b4a7b
NC
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
3882b010 24#include "safe-ctype.h"
252b5132
RH
25#include "libiberty.h"
26#include "progress.h"
27#include "bfdlink.h"
5af11cab 28#include "filenames.h"
252b5132
RH
29
30#include "ld.h"
31#include "ldmain.h"
32#include "ldmisc.h"
33#include "ldwrite.h"
252b5132
RH
34#include "ldexp.h"
35#include "ldlang.h"
df2a7313 36#include <ldgram.h>
252b5132
RH
37#include "ldlex.h"
38#include "ldfile.h"
b71e2778 39#include "ldemul.h"
252b5132 40#include "ldctor.h"
5d3236ee
DK
41#ifdef ENABLE_PLUGINS
42#include "plugin.h"
43#include "plugin-api.h"
5d3236ee 44#endif /* ENABLE_PLUGINS */
252b5132 45
0125cdf2 46/* Somewhere above, sys/stat.h got included. */
252b5132
RH
47#if !defined(S_ISDIR) && defined(S_IFDIR)
48#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
49#endif
50
51#include <string.h>
52
53#ifdef HAVE_SBRK
502bdb00 54#if !HAVE_DECL_SBRK
1579bae1 55extern void *sbrk ();
252b5132
RH
56#endif
57#endif
58
9c8ebd6a
DJ
59#ifndef TARGET_SYSTEM_ROOT
60#define TARGET_SYSTEM_ROOT ""
61#endif
62
252b5132
RH
63/* EXPORTS */
64
53d25da6
AM
65FILE *saved_script_handle = NULL;
66FILE *previous_script_handle = NULL;
67bfd_boolean force_make_executable = FALSE;
68
252b5132
RH
69char *default_target;
70const char *output_filename = "a.out";
71
72/* Name this program was invoked by. */
73char *program_name;
74
9c8ebd6a 75/* The prefix for system library directories. */
e2243057 76const char *ld_sysroot;
9c8ebd6a 77
3fe38064 78/* The canonical representation of ld_sysroot. */
0aa7f586 79char *ld_canon_sysroot;
3fe38064
NC
80int ld_canon_sysroot_len;
81
e8044f35 82/* Set by -G argument, for targets like MIPS ELF. */
252b5132
RH
83int g_switch_value = 8;
84
85/* Nonzero means print names of input files as processed. */
b34976b6 86bfd_boolean trace_files;
252b5132 87
cd6f1cf3
NC
88/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
89bfd_boolean verbose;
252b5132
RH
90
91/* Nonzero means version number was printed, so exit successfully
92 instead of complaining if no input files are given. */
b34976b6 93bfd_boolean version_printed;
252b5132 94
b34976b6
AM
95/* TRUE if we should demangle symbol names. */
96bfd_boolean demangling;
252b5132
RH
97
98args_type command_line;
99
100ld_config_type config;
101
bcaa7b3e
L
102sort_type sort_section;
103
e2243057
RS
104static const char *get_sysroot
105 (int, char **);
0125cdf2 106static char *get_emulation
1579bae1 107 (int, char **);
0125cdf2 108static bfd_boolean add_archive_element
5d3236ee 109 (struct bfd_link_info *, bfd *, const char *, bfd **);
1a72702b 110static void multiple_definition
24f58f47 111 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 112 bfd *, asection *, bfd_vma);
1a72702b 113static void multiple_common
24f58f47
AM
114 (struct bfd_link_info *, struct bfd_link_hash_entry *,
115 bfd *, enum bfd_link_hash_type, bfd_vma);
1a72702b 116static void add_to_set
1579bae1
AM
117 (struct bfd_link_info *, struct bfd_link_hash_entry *,
118 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
1a72702b 119static void constructor_callback
1579bae1
AM
120 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
121 asection *, bfd_vma);
1a72702b 122static void warning_callback
1579bae1
AM
123 (struct bfd_link_info *, const char *, const char *, bfd *,
124 asection *, bfd_vma);
0125cdf2 125static void warning_find_reloc
1579bae1 126 (bfd *, asection *, void *);
1a72702b 127static void undefined_symbol
1579bae1
AM
128 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
129 bfd_boolean);
1a72702b 130static void reloc_overflow
dfeffb9f
L
131 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
132 const char *, bfd_vma, bfd *, asection *, bfd_vma);
1a72702b 133static void reloc_dangerous
1579bae1 134 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
1a72702b 135static void unattached_reloc
1579bae1 136 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 137static bfd_boolean notice
35ed3f94 138 (struct bfd_link_info *, struct bfd_link_hash_entry *,
46135103 139 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
0125cdf2
NC
140
141static struct bfd_link_callbacks link_callbacks =
142{
252b5132
RH
143 add_archive_element,
144 multiple_definition,
145 multiple_common,
146 add_to_set,
147 constructor_callback,
148 warning_callback,
149 undefined_symbol,
150 reloc_overflow,
151 reloc_dangerous,
152 unattached_reloc,
e1fffbe6 153 notice,
2889e75b 154 einfo,
49fa1e15
AM
155 info_msg,
156 minfo,
2889e75b 157 ldlang_override_segment_assignment
252b5132
RH
158};
159
3b66a141 160static bfd_assert_handler_type default_bfd_assert_handler;
4519d071 161static bfd_error_handler_type default_bfd_error_handler;
3b66a141 162
252b5132
RH
163struct bfd_link_info link_info;
164\f
165static void
498cd2a0 166ld_cleanup (void)
252b5132 167{
498cd2a0
AM
168 bfd_cache_close_all ();
169#ifdef ENABLE_PLUGINS
170 plugin_call_cleanup ();
171#endif
172 if (output_filename && delete_output_file_on_failure)
173 unlink_if_ordinary (output_filename);
252b5132
RH
174}
175
4519d071 176/* Hook to notice BFD assertions. */
3b66a141
HPN
177
178static void
179ld_bfd_assert_handler (const char *fmt, const char *bfdver,
180 const char *file, int line)
181{
3b66a141 182 config.make_executable = FALSE;
4519d071
AM
183 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
184}
185
186/* Hook the bfd error/warning handler for --fatal-warnings. */
187
188static void
189ld_bfd_error_handler (const char *fmt, va_list ap)
190{
191 if (config.fatal_warnings)
192 config.make_executable = FALSE;
193 (*default_bfd_error_handler) (fmt, ap);
3b66a141
HPN
194}
195
252b5132 196int
1579bae1 197main (int argc, char **argv)
252b5132
RH
198{
199 char *emulation;
200 long start_time = get_run_time ();
24a09713
SB
201#ifdef HAVE_SBRK
202 char *start_sbrk = (char *) sbrk (0);
203#endif
252b5132
RH
204
205#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
206 setlocale (LC_MESSAGES, "");
3882b010
L
207#endif
208#if defined (HAVE_SETLOCALE)
209 setlocale (LC_CTYPE, "");
252b5132
RH
210#endif
211 bindtextdomain (PACKAGE, LOCALEDIR);
212 textdomain (PACKAGE);
213
214 program_name = argv[0];
215 xmalloc_set_program_name (program_name);
216
217 START_PROGRESS (program_name, 0);
218
869b9d07
MM
219 expandargv (&argc, &argv);
220
252b5132
RH
221 bfd_init ();
222
223 bfd_set_error_program_name (program_name);
224
3b66a141
HPN
225 /* We want to notice and fail on those nasty BFD assertions which are
226 likely to signal incorrect output being generated but otherwise may
227 leave no trace. */
228 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
229
4519d071
AM
230 /* Also hook the bfd error/warning handler for --fatal-warnings. */
231 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
232
498cd2a0 233 xatexit (ld_cleanup);
252b5132 234
e2243057
RS
235 /* Set up the sysroot directory. */
236 ld_sysroot = get_sysroot (argc, argv);
237 if (*ld_sysroot)
3074964f 238 ld_canon_sysroot = lrealpath (ld_sysroot);
3fe38064
NC
239 if (ld_canon_sysroot)
240 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
241 else
242 ld_canon_sysroot_len = -1;
243
252b5132
RH
244 /* Set the default BFD target based on the configured target. Doing
245 this permits the linker to be configured for a particular target,
246 and linked against a shared BFD library which was configured for
247 a different target. The macro TARGET is defined by Makefile. */
0aa7f586 248 if (!bfd_set_default_target (TARGET))
252b5132
RH
249 {
250 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
251 xexit (1);
252 }
253
b47c4208
AM
254#if YYDEBUG
255 {
256 extern int yydebug;
257 yydebug = 1;
258 }
259#endif
260
b34976b6 261 config.build_constructors = TRUE;
c76308d2 262 config.rpath_separator = ':';
a854a4a7
AM
263 config.split_by_reloc = (unsigned) -1;
264 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
265 config.make_executable = TRUE;
266 config.magic_demand_paged = TRUE;
267 config.text_read_only = TRUE;
4f9d22a0 268 link_info.disable_target_specific_optimizations = -1;
3b95049e 269
b34976b6 270 command_line.warn_mismatch = TRUE;
fe7929ce 271 command_line.warn_search_mismatch = TRUE;
02b0b1aa 272 command_line.check_section_addresses = -1;
bcaa7b3e 273
252b5132
RH
274 /* We initialize DEMANGLING based on the environment variable
275 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
276 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
277 environment. Acting the same way here lets us provide the same
278 interface by default. */
279 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
280
b34976b6 281 link_info.allow_undefined_version = TRUE;
b5067602 282 link_info.keep_memory = TRUE;
b5067602 283 link_info.combreloc = TRUE;
d5cd3933 284 link_info.strip_discarded = TRUE;
fdc90cb4 285 link_info.emit_hash = TRUE;
a9a4c53e
AM
286 link_info.callbacks = &link_callbacks;
287 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
288 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
289 and _fini symbols. We are compatible. */
290 link_info.init_function = "_init";
291 link_info.fini_function = "_fini";
a9a4c53e 292 link_info.relax_pass = 1;
889c2a67 293 link_info.extern_protected_data = -1;
aec6b87e 294 link_info.dynamic_undefined_weak = -1;
e0076ab3 295 link_info.pei386_auto_import = -1;
db6751f2 296 link_info.spare_dynamic_tags = 5;
967928e9 297 link_info.path_separator = ':';
6c3bc0f8
NC
298#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
299 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
300#endif
6734f10a 301#ifdef DEFAULT_NEW_DTAGS
91001320 302 link_info.new_dtags = DEFAULT_NEW_DTAGS;
6734f10a 303#endif
24718e3b 304
252b5132 305 ldfile_add_arch ("");
252b5132
RH
306 emulation = get_emulation (argc, argv);
307 ldemul_choose_mode (emulation);
742aeb63 308 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
309 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
310 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132 311 lang_init ();
18d6a79d 312 ldexp_init ();
252b5132 313 ldemul_before_parse ();
b34976b6 314 lang_has_input_file = FALSE;
252b5132
RH
315 parse_args (argc, argv);
316
2d643429
NC
317 if (config.hash_table_size != 0)
318 bfd_hash_set_default_size (config.hash_table_size);
319
9bbc1a67
AM
320#ifdef ENABLE_PLUGINS
321 /* Now all the plugin arguments have been gathered, we can load them. */
d82184d7 322 plugin_load_plugins ();
9bbc1a67 323#endif /* ENABLE_PLUGINS */
36af4a4e 324
9bbc1a67 325 ldemul_set_symbols ();
252b5132 326
14be8564
L
327 /* If we have not already opened and parsed a linker script,
328 try the default script from command line first. */
329 if (saved_script_handle == NULL
330 && command_line.default_script != NULL)
331 {
332 ldfile_open_command_file (command_line.default_script);
333 parser_input = input_script;
334 yyparse ();
335 }
336
b9a8de1e
NC
337 /* If we have not already opened and parsed a linker script
338 read the emulation's appropriate default script. */
b90e1c6f 339 if (saved_script_handle == NULL)
252b5132 340 {
252b5132 341 int isfile;
b7a26f91 342 char *s = ldemul_get_script (&isfile);
252b5132
RH
343
344 if (isfile)
7d24f02c 345 ldfile_open_default_command_file (s);
252b5132 346 else
b7a26f91 347 {
252b5132 348 lex_string = s;
dab69f68 349 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
350 }
351 parser_input = input_script;
352 yyparse ();
353 lex_string = NULL;
354 }
355
cd6f1cf3 356 if (verbose)
b9a8de1e 357 {
9cb61eab
AM
358 if (saved_script_handle)
359 info_msg (_("using external linker script:"));
360 else
361 info_msg (_("using internal linker script:"));
362 info_msg ("\n==================================================\n");
b9a8de1e
NC
363
364 if (saved_script_handle)
365 {
74699268 366 static const int ld_bufsz = 8193;
b9a8de1e 367 size_t n;
1e9cc1c2 368 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
369
370 rewind (saved_script_handle);
74699268 371 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 372 {
b7a26f91 373 buf[n] = 0;
f5ac6ab3 374 info_msg ("%s", buf);
b9a8de1e
NC
375 }
376 rewind (saved_script_handle);
377 free (buf);
378 }
379 else
380 {
381 int isfile;
382
b7a26f91 383 info_msg (ldemul_get_script (&isfile));
b9a8de1e 384 }
b7a26f91 385
b9a8de1e
NC
386 info_msg ("\n==================================================\n");
387 }
388
7bdf4127
AB
389 if (command_line.force_group_allocation
390 || !bfd_link_relocatable (&link_info))
391 link_info.resolve_section_groups = TRUE;
392 else
393 link_info.resolve_section_groups = FALSE;
394
30824704
RM
395 if (command_line.print_output_format)
396 info_msg ("%s\n", lang_get_output_target ());
397
252b5132
RH
398 lang_final ();
399
61e2488c
JT
400 /* If the only command line argument has been -v or --version or --verbose
401 then ignore any input files provided by linker scripts and exit now.
402 We do not want to create an output file when the linker is just invoked
403 to provide version information. */
404 if (argc == 2 && version_printed)
405 xexit (0);
406
b34976b6 407 if (!lang_has_input_file)
252b5132 408 {
30824704 409 if (version_printed || command_line.print_output_format)
252b5132
RH
410 xexit (0);
411 einfo (_("%P%F: no input files\n"));
412 }
413
414 if (trace_files)
0125cdf2 415 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
416
417 ldemul_after_parse ();
418
252b5132
RH
419 if (config.map_filename)
420 {
421 if (strcmp (config.map_filename, "-") == 0)
422 {
423 config.map_file = stdout;
424 }
425 else
426 {
427 config.map_file = fopen (config.map_filename, FOPEN_WT);
428 if (config.map_file == (FILE *) NULL)
429 {
430 bfd_set_error (bfd_error_system_call);
431 einfo (_("%P%F: cannot open map file %s: %E\n"),
432 config.map_filename);
433 }
434 }
435 }
436
252b5132
RH
437 lang_process ();
438
439 /* Print error messages for any missing symbols, for any warning
6d5e62f8 440 symbols, and possibly multiple definitions. */
0e1862bb 441 if (bfd_link_relocatable (&link_info))
f13a99db 442 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 443 else
f13a99db 444 link_info.output_bfd->flags |= EXEC_P;
252b5132 445
0ce398f1
L
446 if ((link_info.compress_debug & COMPRESS_DEBUG))
447 {
448 link_info.output_bfd->flags |= BFD_COMPRESS;
449 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
450 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
451 }
452
252b5132
RH
453 ldwrite ();
454
455 if (config.map_file != NULL)
456 lang_map ();
457 if (command_line.cref)
458 output_cref (config.map_file != NULL ? config.map_file : stdout);
459 if (nocrossref_list != NULL)
460 check_nocrossrefs ();
3604cb1f
TG
461 if (command_line.print_memory_usage)
462 lang_print_memory_usage ();
edf84efc
NC
463#if 0
464 {
0aa7f586 465 struct bfd_link_hash_entry *h;
252b5132 466
edf84efc
NC
467 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
468 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
469 }
470#endif
18d6a79d 471 ldexp_finish ();
750877ba
L
472 lang_finish ();
473
1049f94e 474 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 475 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 476 want to ignore for relocatable output?) */
b34976b6 477 if (!config.make_executable && !force_make_executable)
252b5132 478 {
b34976b6 479 if (trace_files)
0125cdf2
NC
480 einfo (_("%P: link errors found, deleting executable `%s'\n"),
481 output_filename);
252b5132 482
4309cbf2 483 /* The file will be removed by ld_cleanup. */
252b5132
RH
484 xexit (1);
485 }
486 else
487 {
0aa7f586 488 if (!bfd_close (link_info.output_bfd))
f13a99db 489 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
490
491 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
492 executable file and it doesn't end in .exe, copy it to one
493 which does. */
0e1862bb
L
494 if (!bfd_link_relocatable (&link_info)
495 && command_line.force_exe_suffix)
252b5132
RH
496 {
497 int len = strlen (output_filename);
0125cdf2 498
6d5e62f8 499 if (len < 4
252b5132
RH
500 || (strcasecmp (output_filename + len - 4, ".exe") != 0
501 && strcasecmp (output_filename + len - 4, ".dll") != 0))
502 {
503 FILE *src;
504 FILE *dst;
505 const int bsize = 4096;
1e9cc1c2 506 char *buf = (char *) xmalloc (bsize);
252b5132 507 int l;
1e9cc1c2 508 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 509
252b5132
RH
510 strcpy (dst_name, output_filename);
511 strcat (dst_name, ".exe");
512 src = fopen (output_filename, FOPEN_RB);
513 dst = fopen (dst_name, FOPEN_WB);
514
515 if (!src)
b3862264 516 einfo (_("%P%F: unable to open for source of copy `%s'\n"),
1579bae1 517 output_filename);
252b5132 518 if (!dst)
b3862264 519 einfo (_("%P%F: unable to open for destination of copy `%s'\n"),
1579bae1 520 dst_name);
252b5132
RH
521 while ((l = fread (buf, 1, bsize, src)) > 0)
522 {
523 int done = fwrite (buf, 1, l, dst);
0125cdf2 524
252b5132 525 if (done != l)
0125cdf2 526 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 527 }
0125cdf2 528
252b5132
RH
529 fclose (src);
530 if (fclose (dst) == EOF)
0125cdf2 531 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
532 free (dst_name);
533 free (buf);
534 }
535 }
536 }
537
538 END_PROGRESS (program_name);
539
540 if (config.stats)
541 {
542#ifdef HAVE_SBRK
1e9cc1c2 543 char *lim = (char *) sbrk (0);
252b5132
RH
544#endif
545 long run_time = get_run_time () - start_time;
546
e922bcab 547 fflush (stdout);
252b5132
RH
548 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
549 program_name, run_time / 1000000, run_time % 1000000);
550#ifdef HAVE_SBRK
551 fprintf (stderr, _("%s: data size %ld\n"), program_name,
24a09713 552 (long) (lim - start_sbrk));
252b5132 553#endif
e922bcab 554 fflush (stderr);
252b5132
RH
555 }
556
4309cbf2 557 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
558 output_filename = NULL;
559
560 xexit (0);
561 return 0;
562}
563
e2243057
RS
564/* If the configured sysroot is relocatable, try relocating it based on
565 default prefix FROM. Return the relocated directory if it exists,
566 otherwise return null. */
567
568static char *
569get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
570{
571#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
572 char *path;
573 struct stat s;
574
575 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
576 if (path)
577 {
578 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
579 return path;
580 free (path);
581 }
582#endif
583 return 0;
584}
585
586/* Return the sysroot directory. Return "" if no sysroot is being used. */
587
588static const char *
589get_sysroot (int argc, char **argv)
590{
591 int i;
592 const char *path;
593
594 for (i = 1; i < argc; i++)
0112cd26 595 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
596 return argv[i] + strlen ("--sysroot=");
597
598 path = get_relative_sysroot (BINDIR);
599 if (path)
600 return path;
601
602 path = get_relative_sysroot (TOOLBINDIR);
603 if (path)
604 return path;
605
606 return TARGET_SYSTEM_ROOT;
607}
608
252b5132
RH
609/* We need to find any explicitly given emulation in order to initialize the
610 state that's needed by the lex&yacc argument parser (parse_args). */
611
612static char *
1579bae1 613get_emulation (int argc, char **argv)
252b5132
RH
614{
615 char *emulation;
616 int i;
617
618 emulation = getenv (EMULATION_ENVIRON);
619 if (emulation == NULL)
620 emulation = DEFAULT_EMULATION;
621
622 for (i = 1; i < argc; i++)
623 {
0112cd26 624 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
625 {
626 if (argv[i][2] == '\0')
627 {
628 /* -m EMUL */
629 if (i < argc - 1)
630 {
631 emulation = argv[i + 1];
632 i++;
633 }
634 else
0125cdf2 635 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
636 }
637 else if (strcmp (argv[i], "-mips1") == 0
638 || strcmp (argv[i], "-mips2") == 0
639 || strcmp (argv[i], "-mips3") == 0
d1cf510e 640 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
641 || strcmp (argv[i], "-mips5") == 0
642 || strcmp (argv[i], "-mips32") == 0
643 || strcmp (argv[i], "-mips32r2") == 0
7361da2c 644 || strcmp (argv[i], "-mips32r6") == 0
5f74bc13 645 || strcmp (argv[i], "-mips64") == 0
7361da2c
AB
646 || strcmp (argv[i], "-mips64r2") == 0
647 || strcmp (argv[i], "-mips64r6") == 0)
252b5132 648 {
31d677f9 649 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
650 passed to the linker by some MIPS compilers. They
651 generally tell the linker to use a slightly different
652 library path. Perhaps someday these should be
653 implemented as emulations; until then, we just ignore
654 the arguments and hope that nobody ever creates
655 emulations named ips1, ips2 or ips3. */
656 }
657 else if (strcmp (argv[i], "-m486") == 0)
658 {
659 /* FIXME: The argument -m486 is passed to the linker on
660 some Linux systems. Hope that nobody creates an
661 emulation named 486. */
662 }
663 else
664 {
665 /* -mEMUL */
666 emulation = &argv[i][2];
667 }
668 }
669 }
670
671 return emulation;
672}
673
252b5132 674void
1579bae1 675add_ysym (const char *name)
252b5132 676{
1579bae1 677 if (link_info.notice_hash == NULL)
252b5132 678 {
0aa7f586
AM
679 link_info.notice_hash
680 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
681 if (!bfd_hash_table_init_n (link_info.notice_hash,
682 bfd_hash_newfunc,
683 sizeof (struct bfd_hash_entry),
684 61))
252b5132 685 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 686 }
252b5132 687
1579bae1 688 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
689 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
690}
691
0e86e20e
AM
692void
693add_ignoresym (struct bfd_link_info *info, const char *name)
694{
695 if (info->ignore_hash == NULL)
696 {
697 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
0aa7f586
AM
698 if (!bfd_hash_table_init_n (info->ignore_hash,
699 bfd_hash_newfunc,
700 sizeof (struct bfd_hash_entry),
701 61))
0e86e20e
AM
702 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
703 }
704
705 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
706 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
707}
708
252b5132
RH
709/* Record a symbol to be wrapped, from the --wrap option. */
710
711void
1579bae1 712add_wrap (const char *name)
252b5132
RH
713{
714 if (link_info.wrap_hash == NULL)
715 {
0aa7f586
AM
716 link_info.wrap_hash
717 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
718 if (!bfd_hash_table_init_n (link_info.wrap_hash,
719 bfd_hash_newfunc,
720 sizeof (struct bfd_hash_entry),
721 61))
252b5132
RH
722 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
723 }
0125cdf2 724
b34976b6 725 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
726 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
727}
728
729/* Handle the -retain-symbols-file option. */
730
731void
1579bae1 732add_keepsyms_file (const char *filename)
252b5132
RH
733{
734 FILE *file;
735 char *buf;
736 size_t bufsize;
737 int c;
738
739 if (link_info.strip == strip_some)
740 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
741
742 file = fopen (filename, "r");
1579bae1 743 if (file == NULL)
252b5132
RH
744 {
745 bfd_set_error (bfd_error_system_call);
746 einfo ("%X%P: %s: %E\n", filename);
747 return;
748 }
749
1e9cc1c2
NC
750 link_info.keep_hash = (struct bfd_hash_table *)
751 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
752 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
753 sizeof (struct bfd_hash_entry)))
252b5132
RH
754 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
755
756 bufsize = 100;
1e9cc1c2 757 buf = (char *) xmalloc (bufsize);
252b5132
RH
758
759 c = getc (file);
760 while (c != EOF)
761 {
3882b010 762 while (ISSPACE (c))
252b5132
RH
763 c = getc (file);
764
765 if (c != EOF)
766 {
767 size_t len = 0;
768
0aa7f586 769 while (!ISSPACE (c) && c != EOF)
252b5132
RH
770 {
771 buf[len] = c;
772 ++len;
773 if (len >= bufsize)
774 {
775 bufsize *= 2;
1e9cc1c2 776 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
777 }
778 c = getc (file);
779 }
780
781 buf[len] = '\0';
782
1579bae1 783 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
784 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
785 }
786 }
787
788 if (link_info.strip != strip_none)
789 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
790
5ed6aba4 791 free (buf);
252b5132 792 link_info.strip = strip_some;
d9313f4f 793 fclose (file);
252b5132
RH
794}
795\f
796/* Callbacks from the BFD linker routines. */
797
798/* This is called when BFD has decided to include an archive member in
799 a link. */
800
b34976b6 801static bfd_boolean
e1fffbe6 802add_archive_element (struct bfd_link_info *info,
1579bae1 803 bfd *abfd,
5d3236ee
DK
804 const char *name,
805 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
806{
807 lang_input_statement_type *input;
5d3236ee 808 lang_input_statement_type orig_input;
252b5132 809
1e9cc1c2
NC
810 input = (lang_input_statement_type *)
811 xcalloc (1, sizeof (lang_input_statement_type));
fb47deda 812 input->header.type = lang_input_statement_enum;
252b5132
RH
813 input->filename = abfd->filename;
814 input->local_sym_name = abfd->filename;
815 input->the_bfd = abfd;
252b5132 816
5d3236ee
DK
817 /* Save the original data for trace files/tries below, as plugins
818 (if enabled) may possibly alter it to point to a replacement
819 BFD, but we still want to output the original BFD filename. */
820 orig_input = *input;
821#ifdef ENABLE_PLUGINS
b95a0a31 822 if (link_info.lto_plugin_active)
5d3236ee
DK
823 {
824 /* We must offer this archive member to the plugins to claim. */
35a1e5f3
L
825 plugin_maybe_claim (input);
826 if (input->flags.claimed)
5d3236ee 827 {
b95a0a31
L
828 if (no_more_claiming)
829 {
830 /* Don't claim new IR symbols after all IR symbols have
831 been claimed. */
832 if (trace_files || verbose)
833 info_msg ("%I: no new IR symbols to claimi\n",
834 &orig_input);
835 input->flags.claimed = 0;
836 return FALSE;
837 }
35a1e5f3
L
838 input->flags.claim_archive = TRUE;
839 *subsbfd = input->the_bfd;
5d3236ee
DK
840 }
841 }
842#endif /* ENABLE_PLUGINS */
843
252b5132
RH
844 ldlang_add_file (input);
845
1579bae1 846 if (config.map_file != NULL)
252b5132 847 {
b34976b6 848 static bfd_boolean header_printed;
252b5132
RH
849 struct bfd_link_hash_entry *h;
850 bfd *from;
851 int len;
852
e1fffbe6 853 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
854
855 if (h == NULL)
856 from = NULL;
857 else
858 {
859 switch (h->type)
860 {
861 default:
862 from = NULL;
863 break;
864
865 case bfd_link_hash_defined:
866 case bfd_link_hash_defweak:
867 from = h->u.def.section->owner;
868 break;
869
870 case bfd_link_hash_undefined:
871 case bfd_link_hash_undefweak:
872 from = h->u.undef.abfd;
873 break;
874
875 case bfd_link_hash_common:
876 from = h->u.c.p->section->owner;
877 break;
878 }
879 }
880
0aa7f586 881 if (!header_printed)
252b5132 882 {
1273da04 883 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
b34976b6 884 header_printed = TRUE;
252b5132
RH
885 }
886
3860d2b4
AM
887 if (abfd->my_archive == NULL
888 || bfd_is_thin_archive (abfd->my_archive))
252b5132
RH
889 {
890 minfo ("%s", bfd_get_filename (abfd));
891 len = strlen (bfd_get_filename (abfd));
892 }
893 else
894 {
3860d2b4 895 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
252b5132 896 bfd_get_filename (abfd));
3860d2b4 897 len = (strlen (bfd_get_filename (abfd->my_archive))
252b5132
RH
898 + strlen (bfd_get_filename (abfd))
899 + 2);
900 }
901
902 if (len >= 29)
903 {
904 print_nl ();
905 len = 0;
906 }
907 while (len < 30)
908 {
909 print_space ();
910 ++len;
911 }
912
913 if (from != NULL)
914 minfo ("%B ", from);
915 if (h != NULL)
916 minfo ("(%T)\n", h->root.string);
917 else
918 minfo ("(%s)\n", name);
919 }
920
cd6f1cf3 921 if (trace_files || verbose)
5d3236ee 922 info_msg ("%I\n", &orig_input);
b34976b6 923 return TRUE;
252b5132
RH
924}
925
926/* This is called when BFD has discovered a symbol which is defined
927 multiple times. */
928
1a72702b 929static void
24f58f47
AM
930multiple_definition (struct bfd_link_info *info,
931 struct bfd_link_hash_entry *h,
1579bae1
AM
932 bfd *nbfd,
933 asection *nsec,
934 bfd_vma nval)
252b5132 935{
24f58f47
AM
936 const char *name;
937 bfd *obfd;
938 asection *osec;
939 bfd_vma oval;
940
941 if (info->allow_multiple_definition)
1a72702b 942 return;
24f58f47
AM
943
944 switch (h->type)
945 {
946 case bfd_link_hash_defined:
947 osec = h->u.def.section;
948 oval = h->u.def.value;
949 obfd = h->u.def.section->owner;
950 break;
951 case bfd_link_hash_indirect:
952 osec = bfd_ind_section_ptr;
953 oval = 0;
954 obfd = NULL;
955 break;
956 default:
957 abort ();
958 }
959
960 /* Ignore a redefinition of an absolute symbol to the
961 same value; it's harmless. */
962 if (h->type == bfd_link_hash_defined
963 && bfd_is_abs_section (osec)
964 && bfd_is_abs_section (nsec)
965 && nval == oval)
1a72702b 966 return;
24f58f47 967
252b5132
RH
968 /* If either section has the output_section field set to
969 bfd_abs_section_ptr, it means that the section is being
970 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
971 FIXME: It would be cleaner to somehow ignore symbols defined in
972 sections which are being discarded. */
252b5132 973 if ((osec->output_section != NULL
0aa7f586 974 && !bfd_is_abs_section (osec)
252b5132
RH
975 && bfd_is_abs_section (osec->output_section))
976 || (nsec->output_section != NULL
0aa7f586 977 && !bfd_is_abs_section (nsec)
252b5132 978 && bfd_is_abs_section (nsec->output_section)))
1a72702b 979 return;
252b5132 980
24f58f47
AM
981 name = h->root.string;
982 if (nbfd == NULL)
983 {
984 nbfd = obfd;
985 nsec = osec;
986 nval = oval;
987 obfd = NULL;
988 }
252b5132
RH
989 einfo (_("%X%C: multiple definition of `%T'\n"),
990 nbfd, nsec, nval, name);
1579bae1 991 if (obfd != NULL)
252b5132 992 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 993
13761a11 994 if (RELAXATION_ENABLED_BY_USER)
9b14b192
NC
995 {
996 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
13761a11 997 DISABLE_RELAXATION;
9b14b192 998 }
252b5132
RH
999}
1000
1001/* This is called when there is a definition of a common symbol, or
1002 when a common symbol is found for a symbol that is already defined,
1003 or when two common symbols are found. We only do something if
1004 -warn-common was used. */
1005
1a72702b 1006static void
1579bae1 1007multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 1008 struct bfd_link_hash_entry *h,
1579bae1
AM
1009 bfd *nbfd,
1010 enum bfd_link_hash_type ntype,
1011 bfd_vma nsize)
252b5132 1012{
24f58f47
AM
1013 const char *name;
1014 bfd *obfd;
1015 enum bfd_link_hash_type otype;
1016 bfd_vma osize;
1017
1018 if (!config.warn_common)
1a72702b 1019 return;
252b5132 1020
24f58f47
AM
1021 name = h->root.string;
1022 otype = h->type;
1023 if (otype == bfd_link_hash_common)
1024 {
1025 obfd = h->u.c.p->section->owner;
1026 osize = h->u.c.size;
1027 }
1028 else if (otype == bfd_link_hash_defined
1029 || otype == bfd_link_hash_defweak)
1030 {
1031 obfd = h->u.def.section->owner;
1032 osize = 0;
1033 }
1034 else
1035 {
1036 /* FIXME: It would nice if we could report the BFD which defined
1037 an indirect symbol, but we don't have anywhere to store the
1038 information. */
1039 obfd = NULL;
1040 osize = 0;
1041 }
1042
252b5132
RH
1043 if (ntype == bfd_link_hash_defined
1044 || ntype == bfd_link_hash_defweak
1045 || ntype == bfd_link_hash_indirect)
1046 {
1047 ASSERT (otype == bfd_link_hash_common);
1048 einfo (_("%B: warning: definition of `%T' overriding common\n"),
1049 nbfd, name);
1050 if (obfd != NULL)
1051 einfo (_("%B: warning: common is here\n"), obfd);
1052 }
1053 else if (otype == bfd_link_hash_defined
1054 || otype == bfd_link_hash_defweak
1055 || otype == bfd_link_hash_indirect)
1056 {
1057 ASSERT (ntype == bfd_link_hash_common);
1058 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1059 nbfd, name);
1060 if (obfd != NULL)
1061 einfo (_("%B: warning: defined here\n"), obfd);
1062 }
1063 else
1064 {
1065 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1066 if (osize > nsize)
1067 {
1068 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1069 nbfd, name);
1070 if (obfd != NULL)
1071 einfo (_("%B: warning: larger common is here\n"), obfd);
1072 }
1073 else if (nsize > osize)
1074 {
1075 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1076 nbfd, name);
1077 if (obfd != NULL)
1078 einfo (_("%B: warning: smaller common is here\n"), obfd);
1079 }
1080 else
1081 {
1082 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1083 if (obfd != NULL)
1084 einfo (_("%B: warning: previous common is here\n"), obfd);
1085 }
1086 }
252b5132
RH
1087}
1088
1089/* This is called when BFD has discovered a set element. H is the
1090 entry in the linker hash table for the set. SECTION and VALUE
1091 represent a value which should be added to the set. */
1092
1a72702b 1093static void
1579bae1
AM
1094add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1095 struct bfd_link_hash_entry *h,
1096 bfd_reloc_code_real_type reloc,
1097 bfd *abfd,
1098 asection *section,
1099 bfd_vma value)
252b5132
RH
1100{
1101 if (config.warn_constructors)
1102 einfo (_("%P: warning: global constructor %s used\n"),
1103 h->root.string);
1104
0aa7f586 1105 if (!config.build_constructors)
1a72702b 1106 return;
252b5132 1107
1579bae1 1108 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1109
1110 if (h->type == bfd_link_hash_new)
1111 {
1112 h->type = bfd_link_hash_undefined;
1113 h->u.undef.abfd = abfd;
1114 /* We don't call bfd_link_add_undef to add this to the list of
1115 undefined symbols because we are going to define it
1116 ourselves. */
1117 }
252b5132
RH
1118}
1119
1120/* This is called when BFD has discovered a constructor. This is only
1121 called for some object file formats--those which do not handle
1122 constructors in some more clever fashion. This is similar to
1123 adding an element to a set, but less general. */
1124
1a72702b 1125static void
1579bae1
AM
1126constructor_callback (struct bfd_link_info *info,
1127 bfd_boolean constructor,
1128 const char *name,
1129 bfd *abfd,
1130 asection *section,
1131 bfd_vma value)
252b5132
RH
1132{
1133 char *s;
1134 struct bfd_link_hash_entry *h;
1135 char set_name[1 + sizeof "__CTOR_LIST__"];
1136
1137 if (config.warn_constructors)
1138 einfo (_("%P: warning: global constructor %s used\n"), name);
1139
0aa7f586 1140 if (!config.build_constructors)
1a72702b 1141 return;
252b5132
RH
1142
1143 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1144 useful error message. */
0e86e20e 1145 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
0e1862bb 1146 && (bfd_link_relocatable (info)
252b5132
RH
1147 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1148 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1149
1150 s = set_name;
1151 if (bfd_get_symbol_leading_char (abfd) != '\0')
1152 *s++ = bfd_get_symbol_leading_char (abfd);
1153 if (constructor)
1154 strcpy (s, "__CTOR_LIST__");
1155 else
1156 strcpy (s, "__DTOR_LIST__");
1157
b34976b6 1158 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1159 if (h == (struct bfd_link_hash_entry *) NULL)
1160 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1161 if (h->type == bfd_link_hash_new)
1162 {
1163 h->type = bfd_link_hash_undefined;
1164 h->u.undef.abfd = abfd;
1165 /* We don't call bfd_link_add_undef to add this to the list of
1166 undefined symbols because we are going to define it
1167 ourselves. */
1168 }
1169
1170 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
252b5132
RH
1171}
1172
1173/* A structure used by warning_callback to pass information through
1174 bfd_map_over_sections. */
1175
0125cdf2
NC
1176struct warning_callback_info
1177{
b34976b6 1178 bfd_boolean found;
252b5132
RH
1179 const char *warning;
1180 const char *symbol;
1181 asymbol **asymbols;
1182};
1183
4c6d802e
L
1184/* Look through the relocs to see if we can find a plausible address
1185 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1186
1187static bfd_boolean
1188symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1189{
1190 struct warning_callback_info cinfo;
1191
1192 if (!bfd_generic_link_read_symbols (abfd))
1193 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
1194
1195 cinfo.found = FALSE;
1196 cinfo.warning = warning;
1197 cinfo.symbol = symbol;
1198 cinfo.asymbols = bfd_get_outsymbols (abfd);
1199 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1200 return cinfo.found;
1201}
1202
252b5132
RH
1203/* This is called when there is a reference to a warning symbol. */
1204
1a72702b 1205static void
1579bae1
AM
1206warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1207 const char *warning,
1208 const char *symbol,
1209 bfd *abfd,
1210 asection *section,
1211 bfd_vma address)
252b5132
RH
1212{
1213 /* This is a hack to support warn_multiple_gp. FIXME: This should
1214 have a cleaner interface, but what? */
0aa7f586 1215 if (!config.warn_multiple_gp
252b5132 1216 && strcmp (warning, "using multiple gp values") == 0)
1a72702b 1217 return;
252b5132
RH
1218
1219 if (section != NULL)
300475fe 1220 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1221 else if (abfd == NULL)
300475fe 1222 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1223 else if (symbol == NULL)
300475fe 1224 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
0aa7f586 1225 else if (!symbol_warning (warning, symbol, abfd))
252b5132 1226 {
4c6d802e
L
1227 bfd *b;
1228 /* Search all input files for a reference to SYMBOL. */
c72f2fb2 1229 for (b = info->input_bfds; b; b = b->link.next)
4c6d802e 1230 if (b != abfd && symbol_warning (warning, symbol, b))
1a72702b 1231 return;
4c6d802e 1232 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132 1233 }
252b5132
RH
1234}
1235
1236/* This is called by warning_callback for each section. It checks the
1237 relocs of the section to see if it can find a reference to the
1238 symbol which triggered the warning. If it can, it uses the reloc
1239 to give an error message with a file and line number. */
1240
1241static void
1579bae1 1242warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1243{
1e9cc1c2 1244 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1245 long relsize;
1246 arelent **relpp;
1247 long relcount;
1248 arelent **p, **pend;
1249
1250 if (info->found)
1251 return;
1252
1253 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1254 if (relsize < 0)
1255 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1256 if (relsize == 0)
1257 return;
1258
1e9cc1c2 1259 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1260 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1261 if (relcount < 0)
1262 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1263
1264 p = relpp;
1265 pend = p + relcount;
1266 for (; p < pend && *p != NULL; p++)
1267 {
1268 arelent *q = *p;
1269
1270 if (q->sym_ptr_ptr != NULL
1271 && *q->sym_ptr_ptr != NULL
1272 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1273 {
1274 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1275 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1276 info->warning);
b34976b6 1277 info->found = TRUE;
252b5132
RH
1278 break;
1279 }
1280 }
1281
1282 free (relpp);
1283}
1284
1285/* This is called when an undefined symbol is found. */
1286
1a72702b 1287static void
0e86e20e 1288undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1289 const char *name,
1290 bfd *abfd,
1291 asection *section,
1292 bfd_vma address,
0b28295d 1293 bfd_boolean error)
252b5132
RH
1294{
1295 static char *error_name;
1296 static unsigned int error_count;
1297
1298#define MAX_ERRORS_IN_A_ROW 5
1299
0e86e20e
AM
1300 if (info->ignore_hash != NULL
1301 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1a72702b 1302 return;
0e86e20e 1303
252b5132
RH
1304 if (config.warn_once)
1305 {
252b5132 1306 /* Only warn once about a particular undefined symbol. */
0e86e20e 1307 add_ignoresym (info, name);
252b5132
RH
1308 }
1309
1310 /* We never print more than a reasonable number of errors in a row
1311 for a single symbol. */
1579bae1 1312 if (error_name != NULL
252b5132
RH
1313 && strcmp (name, error_name) == 0)
1314 ++error_count;
1315 else
1316 {
1317 error_count = 0;
1579bae1 1318 if (error_name != NULL)
252b5132 1319 free (error_name);
d1b2b2dc 1320 error_name = xstrdup (name);
252b5132
RH
1321 }
1322
1323 if (section != NULL)
1324 {
1325 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1326 {
0b28295d
ILT
1327 if (error)
1328 einfo (_("%X%C: undefined reference to `%T'\n"),
1329 abfd, section, address, name);
1330 else
1331 einfo (_("%C: warning: undefined reference to `%T'\n"),
1332 abfd, section, address, name);
b6f29aaa 1333 }
252b5132 1334 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1335 {
1336 if (error)
1337 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1338 abfd, section, address, name);
1339 else
1340 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1341 abfd, section, address, name);
1342 }
1343 else if (error)
1344 einfo ("%X");
252b5132
RH
1345 }
1346 else
1347 {
1348 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1349 {
0b28295d
ILT
1350 if (error)
1351 einfo (_("%X%B: undefined reference to `%T'\n"),
1352 abfd, name);
1353 else
1354 einfo (_("%B: warning: undefined reference to `%T'\n"),
1355 abfd, name);
b6f29aaa 1356 }
252b5132 1357 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1358 {
1359 if (error)
1360 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1361 abfd, name);
1362 else
1363 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1364 abfd, name);
1365 }
1366 else if (error)
1367 einfo ("%X");
252b5132 1368 }
252b5132
RH
1369}
1370
8aae64e6
AO
1371/* Counter to limit the number of relocation overflow error messages
1372 to print. Errors are printed as it is decremented. When it's
1373 called and the counter is zero, a final message is printed
1374 indicating more relocations were omitted. When it gets to -1, no
1375 such errors are printed. If it's initially set to a value less
1376 than -1, all such errors will be printed (--verbose does this). */
1377
1378int overflow_cutoff_limit = 10;
1379
252b5132
RH
1380/* This is called when a reloc overflows. */
1381
1a72702b 1382static void
0e86e20e 1383reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1384 struct bfd_link_hash_entry *entry,
1579bae1
AM
1385 const char *name,
1386 const char *reloc_name,
1387 bfd_vma addend,
1388 bfd *abfd,
1389 asection *section,
1390 bfd_vma address)
252b5132 1391{
8aae64e6 1392 if (overflow_cutoff_limit == -1)
1a72702b 1393 return;
8aae64e6 1394
270396f2 1395 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1396
1397 if (overflow_cutoff_limit >= 0
1398 && overflow_cutoff_limit-- == 0)
1399 {
1400 einfo (_(" additional relocation overflows omitted from the output\n"));
1a72702b 1401 return;
8aae64e6
AO
1402 }
1403
dfeffb9f
L
1404 if (entry)
1405 {
1406 while (entry->type == bfd_link_hash_indirect
1407 || entry->type == bfd_link_hash_warning)
1408 entry = entry->u.i.link;
1409 switch (entry->type)
1410 {
1411 case bfd_link_hash_undefined:
1412 case bfd_link_hash_undefweak:
0aa7f586
AM
1413 einfo (_(" relocation truncated to fit: "
1414 "%s against undefined symbol `%T'"),
dfeffb9f
L
1415 reloc_name, entry->root.string);
1416 break;
1417 case bfd_link_hash_defined:
1418 case bfd_link_hash_defweak:
0aa7f586
AM
1419 einfo (_(" relocation truncated to fit: "
1420 "%s against symbol `%T' defined in %A section in %B"),
dfeffb9f 1421 reloc_name, entry->root.string,
a6e1b90f
L
1422 entry->u.def.section,
1423 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1424 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1425 break;
1426 default:
1427 abort ();
1428 break;
1429 }
1430 }
1431 else
1432 einfo (_(" relocation truncated to fit: %s against `%T'"),
1433 reloc_name, name);
252b5132
RH
1434 if (addend != 0)
1435 einfo ("+%v", addend);
1436 einfo ("\n");
252b5132
RH
1437}
1438
1439/* This is called when a dangerous relocation is made. */
1440
1a72702b 1441static void
1579bae1
AM
1442reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1443 const char *message,
1444 bfd *abfd,
1445 asection *section,
1446 bfd_vma address)
252b5132 1447{
270396f2 1448 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1449 abfd, section, address, message);
252b5132
RH
1450}
1451
1452/* This is called when a reloc is being generated attached to a symbol
1453 that is not being output. */
1454
1a72702b 1455static void
1579bae1
AM
1456unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1457 const char *name,
1458 bfd *abfd,
1459 asection *section,
1460 bfd_vma address)
252b5132 1461{
270396f2 1462 einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
e1fffbe6 1463 abfd, section, address, name);
252b5132
RH
1464}
1465
1466/* This is called if link_info.notice_all is set, or when a symbol in
1467 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1468 using the -y option, while notice_all is set if the --cref option
1469 has been supplied, or if there are any NOCROSSREFS sections in the
1470 linker script; and if plugins are active, since they need to monitor
1471 all references from non-IR files. */
252b5132 1472
b34976b6 1473static bfd_boolean
1579bae1 1474notice (struct bfd_link_info *info,
35ed3f94 1475 struct bfd_link_hash_entry *h,
46135103 1476 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1579bae1
AM
1477 bfd *abfd,
1478 asection *section,
16d96b5b 1479 bfd_vma value,
46135103 1480 flagword flags ATTRIBUTE_UNUSED)
252b5132 1481{
35ed3f94
AM
1482 const char *name;
1483
1484 if (h == NULL)
5061a885
AM
1485 {
1486 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1487 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1488 return TRUE;
1489 }
1490
35ed3f94 1491 name = h->root.string;
5d3236ee 1492 if (info->notice_hash != NULL
9e2278f5 1493 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1494 {
1495 if (bfd_is_und_section (section))
1496 einfo ("%B: reference to %s\n", abfd, name);
1497 else
1498 einfo ("%B: definition of %s\n", abfd, name);
1499 }
1500
1501 if (command_line.cref || nocrossref_list != NULL)
1502 add_cref (name, abfd, section, value);
1503
b34976b6 1504 return TRUE;
252b5132 1505}
This page took 0.849008 seconds and 4 git commands to generate.