]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - ld/ldmain.c
Emit a warning when -z relro is unsupported
[thirdparty/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
b3adc24a 2 Copyright (C) 1991-2020 Free Software Foundation, Inc.
252b5132
RH
3 Written by Steve Chamberlain steve@cygnus.com
4
f96b4a7b 5 This file is part of the GNU Binutils.
252b5132 6
f96b4a7b 7 This program is free software; you can redistribute it and/or modify
2fa9fc65 8 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
252b5132 11
f96b4a7b 12 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
2fa9fc65 17 You should have received a copy of the GNU General Public License
f96b4a7b
NC
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
3882b010 24#include "safe-ctype.h"
252b5132
RH
25#include "libiberty.h"
26#include "progress.h"
27#include "bfdlink.h"
1ff6de03 28#include "ctf-api.h"
5af11cab 29#include "filenames.h"
cae64165 30#include "elf/common.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
5d3236ee 46#endif /* ENABLE_PLUGINS */
252b5132 47
0125cdf2 48/* Somewhere above, sys/stat.h got included. */
252b5132
RH
49#if !defined(S_ISDIR) && defined(S_IFDIR)
50#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
51#endif
52
53#include <string.h>
54
9c8ebd6a
DJ
55#ifndef TARGET_SYSTEM_ROOT
56#define TARGET_SYSTEM_ROOT ""
57#endif
58
252b5132
RH
59/* EXPORTS */
60
53d25da6
AM
61FILE *saved_script_handle = NULL;
62FILE *previous_script_handle = NULL;
63bfd_boolean force_make_executable = FALSE;
64
252b5132
RH
65char *default_target;
66const char *output_filename = "a.out";
67
68/* Name this program was invoked by. */
69char *program_name;
70
9c8ebd6a 71/* The prefix for system library directories. */
e2243057 72const char *ld_sysroot;
9c8ebd6a 73
3fe38064 74/* The canonical representation of ld_sysroot. */
0aa7f586 75char *ld_canon_sysroot;
3fe38064
NC
76int ld_canon_sysroot_len;
77
e8044f35 78/* Set by -G argument, for targets like MIPS ELF. */
252b5132
RH
79int g_switch_value = 8;
80
81/* Nonzero means print names of input files as processed. */
727a29ba 82unsigned int trace_files;
252b5132 83
cd6f1cf3
NC
84/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
85bfd_boolean verbose;
252b5132
RH
86
87/* Nonzero means version number was printed, so exit successfully
88 instead of complaining if no input files are given. */
b34976b6 89bfd_boolean version_printed;
252b5132 90
b34976b6
AM
91/* TRUE if we should demangle symbol names. */
92bfd_boolean demangling;
252b5132
RH
93
94args_type command_line;
95
96ld_config_type config;
97
bcaa7b3e
L
98sort_type sort_section;
99
e2243057
RS
100static const char *get_sysroot
101 (int, char **);
0125cdf2 102static char *get_emulation
1579bae1 103 (int, char **);
0125cdf2 104static bfd_boolean add_archive_element
5d3236ee 105 (struct bfd_link_info *, bfd *, const char *, bfd **);
1a72702b 106static void multiple_definition
24f58f47 107 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 108 bfd *, asection *, bfd_vma);
1a72702b 109static void multiple_common
24f58f47
AM
110 (struct bfd_link_info *, struct bfd_link_hash_entry *,
111 bfd *, enum bfd_link_hash_type, bfd_vma);
1a72702b 112static void add_to_set
1579bae1
AM
113 (struct bfd_link_info *, struct bfd_link_hash_entry *,
114 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
1a72702b 115static void constructor_callback
1579bae1
AM
116 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
117 asection *, bfd_vma);
1a72702b 118static void warning_callback
1579bae1
AM
119 (struct bfd_link_info *, const char *, const char *, bfd *,
120 asection *, bfd_vma);
0125cdf2 121static void warning_find_reloc
1579bae1 122 (bfd *, asection *, void *);
1a72702b 123static void undefined_symbol
1579bae1
AM
124 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
125 bfd_boolean);
1a72702b 126static void reloc_overflow
dfeffb9f
L
127 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
128 const char *, bfd_vma, bfd *, asection *, bfd_vma);
1a72702b 129static void reloc_dangerous
1579bae1 130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
1a72702b 131static void unattached_reloc
1579bae1 132 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 133static bfd_boolean notice
35ed3f94 134 (struct bfd_link_info *, struct bfd_link_hash_entry *,
46135103 135 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
0125cdf2
NC
136
137static struct bfd_link_callbacks link_callbacks =
138{
252b5132
RH
139 add_archive_element,
140 multiple_definition,
141 multiple_common,
142 add_to_set,
143 constructor_callback,
144 warning_callback,
145 undefined_symbol,
146 reloc_overflow,
147 reloc_dangerous,
148 unattached_reloc,
e1fffbe6 149 notice,
2889e75b 150 einfo,
49fa1e15
AM
151 info_msg,
152 minfo,
1ff6de03
NA
153 ldlang_override_segment_assignment,
154 ldlang_ctf_apply_strsym,
155 ldlang_write_ctf_late
252b5132
RH
156};
157
3b66a141 158static bfd_assert_handler_type default_bfd_assert_handler;
4519d071 159static bfd_error_handler_type default_bfd_error_handler;
3b66a141 160
252b5132
RH
161struct bfd_link_info link_info;
162\f
163static void
498cd2a0 164ld_cleanup (void)
252b5132 165{
498cd2a0
AM
166 bfd_cache_close_all ();
167#ifdef ENABLE_PLUGINS
168 plugin_call_cleanup ();
169#endif
170 if (output_filename && delete_output_file_on_failure)
171 unlink_if_ordinary (output_filename);
252b5132
RH
172}
173
4519d071 174/* Hook to notice BFD assertions. */
3b66a141
HPN
175
176static void
177ld_bfd_assert_handler (const char *fmt, const char *bfdver,
178 const char *file, int line)
179{
3b66a141 180 config.make_executable = FALSE;
4519d071
AM
181 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
182}
183
184/* Hook the bfd error/warning handler for --fatal-warnings. */
185
186static void
187ld_bfd_error_handler (const char *fmt, va_list ap)
188{
189 if (config.fatal_warnings)
190 config.make_executable = FALSE;
191 (*default_bfd_error_handler) (fmt, ap);
3b66a141
HPN
192}
193
252b5132 194int
1579bae1 195main (int argc, char **argv)
252b5132
RH
196{
197 char *emulation;
198 long start_time = get_run_time ();
199
200#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
201 setlocale (LC_MESSAGES, "");
3882b010
L
202#endif
203#if defined (HAVE_SETLOCALE)
204 setlocale (LC_CTYPE, "");
252b5132
RH
205#endif
206 bindtextdomain (PACKAGE, LOCALEDIR);
207 textdomain (PACKAGE);
208
209 program_name = argv[0];
210 xmalloc_set_program_name (program_name);
211
212 START_PROGRESS (program_name, 0);
213
869b9d07
MM
214 expandargv (&argc, &argv);
215
bf2dd8d7
AM
216 if (bfd_init () != BFD_INIT_MAGIC)
217 einfo (_("%F%P: fatal error: libbfd ABI mismatch\n"));
252b5132
RH
218
219 bfd_set_error_program_name (program_name);
220
3b66a141
HPN
221 /* We want to notice and fail on those nasty BFD assertions which are
222 likely to signal incorrect output being generated but otherwise may
223 leave no trace. */
224 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
225
4519d071
AM
226 /* Also hook the bfd error/warning handler for --fatal-warnings. */
227 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
228
498cd2a0 229 xatexit (ld_cleanup);
252b5132 230
e2243057
RS
231 /* Set up the sysroot directory. */
232 ld_sysroot = get_sysroot (argc, argv);
233 if (*ld_sysroot)
3074964f 234 ld_canon_sysroot = lrealpath (ld_sysroot);
3fe38064 235 if (ld_canon_sysroot)
889be5db
DR
236 {
237 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
238
239 /* is_sysrooted_pathname() relies on no trailing dirsep. */
240 if (ld_canon_sysroot_len > 0
241 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
242 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
243 }
3fe38064
NC
244 else
245 ld_canon_sysroot_len = -1;
246
252b5132
RH
247 /* Set the default BFD target based on the configured target. Doing
248 this permits the linker to be configured for a particular target,
249 and linked against a shared BFD library which was configured for
250 a different target. The macro TARGET is defined by Makefile. */
0aa7f586 251 if (!bfd_set_default_target (TARGET))
252b5132
RH
252 {
253 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
254 xexit (1);
255 }
256
b47c4208
AM
257#if YYDEBUG
258 {
259 extern int yydebug;
260 yydebug = 1;
261 }
262#endif
263
b34976b6 264 config.build_constructors = TRUE;
c76308d2 265 config.rpath_separator = ':';
a854a4a7
AM
266 config.split_by_reloc = (unsigned) -1;
267 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
268 config.make_executable = TRUE;
269 config.magic_demand_paged = TRUE;
270 config.text_read_only = TRUE;
035801ce 271 config.print_map_discarded = TRUE;
4f9d22a0 272 link_info.disable_target_specific_optimizations = -1;
3b95049e 273
b34976b6 274 command_line.warn_mismatch = TRUE;
fe7929ce 275 command_line.warn_search_mismatch = TRUE;
02b0b1aa 276 command_line.check_section_addresses = -1;
bcaa7b3e 277
252b5132
RH
278 /* We initialize DEMANGLING based on the environment variable
279 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
280 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
281 environment. Acting the same way here lets us provide the same
282 interface by default. */
283 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
284
b34976b6 285 link_info.allow_undefined_version = TRUE;
b5067602 286 link_info.keep_memory = TRUE;
b5067602 287 link_info.combreloc = TRUE;
d5cd3933 288 link_info.strip_discarded = TRUE;
3f0a5f17 289 link_info.prohibit_multiple_definition_absolute = FALSE;
b32632c4 290 link_info.textrel_check = DEFAULT_LD_TEXTREL_CHECK;
2760f24c
RG
291 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
292 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
a9a4c53e
AM
293 link_info.callbacks = &link_callbacks;
294 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
295 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
296 and _fini symbols. We are compatible. */
297 link_info.init_function = "_init";
298 link_info.fini_function = "_fini";
a9a4c53e 299 link_info.relax_pass = 1;
889c2a67 300 link_info.extern_protected_data = -1;
aec6b87e 301 link_info.dynamic_undefined_weak = -1;
e0076ab3 302 link_info.pei386_auto_import = -1;
db6751f2 303 link_info.spare_dynamic_tags = 5;
967928e9 304 link_info.path_separator = ':';
6c3bc0f8
NC
305#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
306 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
307#endif
6734f10a 308#ifdef DEFAULT_NEW_DTAGS
91001320 309 link_info.new_dtags = DEFAULT_NEW_DTAGS;
6734f10a 310#endif
cae64165 311 link_info.start_stop_visibility = STV_PROTECTED;
24718e3b 312
252b5132 313 ldfile_add_arch ("");
252b5132
RH
314 emulation = get_emulation (argc, argv);
315 ldemul_choose_mode (emulation);
742aeb63 316 default_target = ldemul_choose_target (argc, argv);
252b5132 317 lang_init ();
18d6a79d 318 ldexp_init ();
252b5132 319 ldemul_before_parse ();
b34976b6 320 lang_has_input_file = FALSE;
252b5132
RH
321 parse_args (argc, argv);
322
2d643429
NC
323 if (config.hash_table_size != 0)
324 bfd_hash_set_default_size (config.hash_table_size);
325
9bbc1a67
AM
326#ifdef ENABLE_PLUGINS
327 /* Now all the plugin arguments have been gathered, we can load them. */
d82184d7 328 plugin_load_plugins ();
9bbc1a67 329#endif /* ENABLE_PLUGINS */
36af4a4e 330
9bbc1a67 331 ldemul_set_symbols ();
252b5132 332
14be8564
L
333 /* If we have not already opened and parsed a linker script,
334 try the default script from command line first. */
335 if (saved_script_handle == NULL
336 && command_line.default_script != NULL)
337 {
6ec6968b 338 ldfile_open_script_file (command_line.default_script);
14be8564
L
339 parser_input = input_script;
340 yyparse ();
341 }
342
b9a8de1e
NC
343 /* If we have not already opened and parsed a linker script
344 read the emulation's appropriate default script. */
b90e1c6f 345 if (saved_script_handle == NULL)
252b5132 346 {
252b5132 347 int isfile;
b7a26f91 348 char *s = ldemul_get_script (&isfile);
252b5132
RH
349
350 if (isfile)
7d24f02c 351 ldfile_open_default_command_file (s);
252b5132 352 else
b7a26f91 353 {
252b5132 354 lex_string = s;
dab69f68 355 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
356 }
357 parser_input = input_script;
358 yyparse ();
359 lex_string = NULL;
360 }
361
cd6f1cf3 362 if (verbose)
b9a8de1e 363 {
9cb61eab
AM
364 if (saved_script_handle)
365 info_msg (_("using external linker script:"));
366 else
367 info_msg (_("using internal linker script:"));
368 info_msg ("\n==================================================\n");
b9a8de1e
NC
369
370 if (saved_script_handle)
371 {
74699268 372 static const int ld_bufsz = 8193;
b9a8de1e 373 size_t n;
1e9cc1c2 374 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
375
376 rewind (saved_script_handle);
74699268 377 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 378 {
b7a26f91 379 buf[n] = 0;
f5ac6ab3 380 info_msg ("%s", buf);
b9a8de1e
NC
381 }
382 rewind (saved_script_handle);
383 free (buf);
384 }
385 else
386 {
387 int isfile;
388
b7a26f91 389 info_msg (ldemul_get_script (&isfile));
b9a8de1e 390 }
b7a26f91 391
b9a8de1e
NC
392 info_msg ("\n==================================================\n");
393 }
394
7bdf4127
AB
395 if (command_line.force_group_allocation
396 || !bfd_link_relocatable (&link_info))
397 link_info.resolve_section_groups = TRUE;
398 else
399 link_info.resolve_section_groups = FALSE;
400
30824704
RM
401 if (command_line.print_output_format)
402 info_msg ("%s\n", lang_get_output_target ());
403
252b5132
RH
404 lang_final ();
405
61e2488c
JT
406 /* If the only command line argument has been -v or --version or --verbose
407 then ignore any input files provided by linker scripts and exit now.
408 We do not want to create an output file when the linker is just invoked
409 to provide version information. */
410 if (argc == 2 && version_printed)
411 xexit (0);
412
a4819f54 413 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
df5f2391 414 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
a4819f54 415
b34976b6 416 if (!lang_has_input_file)
252b5132 417 {
30824704 418 if (version_printed || command_line.print_output_format)
252b5132 419 xexit (0);
df5f2391 420 einfo (_("%F%P: no input files\n"));
252b5132
RH
421 }
422
5c87f94b 423 if (verbose)
0125cdf2 424 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
425
426 ldemul_after_parse ();
427
252b5132
RH
428 if (config.map_filename)
429 {
430 if (strcmp (config.map_filename, "-") == 0)
431 {
432 config.map_file = stdout;
433 }
434 else
435 {
436 config.map_file = fopen (config.map_filename, FOPEN_WT);
437 if (config.map_file == (FILE *) NULL)
438 {
439 bfd_set_error (bfd_error_system_call);
df5f2391 440 einfo (_("%F%P: cannot open map file %s: %E\n"),
252b5132
RH
441 config.map_filename);
442 }
443 }
d2ef37eb 444 link_info.has_map_file = TRUE;
252b5132
RH
445 }
446
252b5132
RH
447 lang_process ();
448
449 /* Print error messages for any missing symbols, for any warning
6d5e62f8 450 symbols, and possibly multiple definitions. */
0e1862bb 451 if (bfd_link_relocatable (&link_info))
f13a99db 452 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 453 else
f13a99db 454 link_info.output_bfd->flags |= EXEC_P;
252b5132 455
0ce398f1
L
456 if ((link_info.compress_debug & COMPRESS_DEBUG))
457 {
458 link_info.output_bfd->flags |= BFD_COMPRESS;
459 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
460 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
461 }
462
252b5132
RH
463 ldwrite ();
464
465 if (config.map_file != NULL)
466 lang_map ();
467 if (command_line.cref)
468 output_cref (config.map_file != NULL ? config.map_file : stdout);
469 if (nocrossref_list != NULL)
470 check_nocrossrefs ();
3604cb1f
TG
471 if (command_line.print_memory_usage)
472 lang_print_memory_usage ();
edf84efc
NC
473#if 0
474 {
0aa7f586 475 struct bfd_link_hash_entry *h;
252b5132 476
edf84efc
NC
477 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
478 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
479 }
480#endif
18d6a79d 481 ldexp_finish ();
750877ba
L
482 lang_finish ();
483
1049f94e 484 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 485 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 486 want to ignore for relocatable output?) */
b34976b6 487 if (!config.make_executable && !force_make_executable)
252b5132 488 {
5c87f94b 489 if (verbose)
0125cdf2
NC
490 einfo (_("%P: link errors found, deleting executable `%s'\n"),
491 output_filename);
252b5132 492
4309cbf2 493 /* The file will be removed by ld_cleanup. */
252b5132
RH
494 xexit (1);
495 }
496 else
497 {
0aa7f586 498 if (!bfd_close (link_info.output_bfd))
df5f2391 499 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
500
501 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
502 executable file and it doesn't end in .exe, copy it to one
503 which does. */
0e1862bb
L
504 if (!bfd_link_relocatable (&link_info)
505 && command_line.force_exe_suffix)
252b5132
RH
506 {
507 int len = strlen (output_filename);
0125cdf2 508
6d5e62f8 509 if (len < 4
252b5132
RH
510 || (strcasecmp (output_filename + len - 4, ".exe") != 0
511 && strcasecmp (output_filename + len - 4, ".dll") != 0))
512 {
513 FILE *src;
514 FILE *dst;
515 const int bsize = 4096;
1e9cc1c2 516 char *buf = (char *) xmalloc (bsize);
252b5132 517 int l;
1e9cc1c2 518 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 519
252b5132
RH
520 strcpy (dst_name, output_filename);
521 strcat (dst_name, ".exe");
522 src = fopen (output_filename, FOPEN_RB);
523 dst = fopen (dst_name, FOPEN_WB);
524
525 if (!src)
df5f2391 526 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
1579bae1 527 output_filename);
252b5132 528 if (!dst)
df5f2391 529 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
1579bae1 530 dst_name);
252b5132
RH
531 while ((l = fread (buf, 1, bsize, src)) > 0)
532 {
533 int done = fwrite (buf, 1, l, dst);
0125cdf2 534
252b5132 535 if (done != l)
df5f2391 536 einfo (_("%P: error writing file `%s'\n"), dst_name);
252b5132 537 }
0125cdf2 538
252b5132
RH
539 fclose (src);
540 if (fclose (dst) == EOF)
df5f2391 541 einfo (_("%P: error closing file `%s'\n"), dst_name);
252b5132
RH
542 free (dst_name);
543 free (buf);
544 }
545 }
546 }
547
548 END_PROGRESS (program_name);
549
550 if (config.stats)
551 {
252b5132
RH
552 long run_time = get_run_time () - start_time;
553
e922bcab 554 fflush (stdout);
252b5132
RH
555 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
556 program_name, run_time / 1000000, run_time % 1000000);
e922bcab 557 fflush (stderr);
252b5132
RH
558 }
559
4309cbf2 560 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
561 output_filename = NULL;
562
563 xexit (0);
564 return 0;
565}
566
e2243057
RS
567/* If the configured sysroot is relocatable, try relocating it based on
568 default prefix FROM. Return the relocated directory if it exists,
569 otherwise return null. */
570
571static char *
572get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
573{
574#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
575 char *path;
576 struct stat s;
577
578 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
579 if (path)
580 {
581 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
582 return path;
583 free (path);
584 }
585#endif
586 return 0;
587}
588
589/* Return the sysroot directory. Return "" if no sysroot is being used. */
590
591static const char *
592get_sysroot (int argc, char **argv)
593{
594 int i;
55d5520a 595 const char *path = NULL;
e2243057
RS
596
597 for (i = 1; i < argc; i++)
0112cd26 598 if (CONST_STRNEQ (argv[i], "--sysroot="))
55d5520a 599 path = argv[i] + strlen ("--sysroot=");
e2243057 600
55d5520a
AM
601 if (!path)
602 path = get_relative_sysroot (BINDIR);
e2243057 603
55d5520a
AM
604 if (!path)
605 path = get_relative_sysroot (TOOLBINDIR);
606
607 if (!path)
608 path = TARGET_SYSTEM_ROOT;
609
610 if (IS_DIR_SEPARATOR (*path) && path[1] == 0)
611 path = "";
e2243057 612
55d5520a 613 return path;
e2243057
RS
614}
615
252b5132
RH
616/* We need to find any explicitly given emulation in order to initialize the
617 state that's needed by the lex&yacc argument parser (parse_args). */
618
619static char *
1579bae1 620get_emulation (int argc, char **argv)
252b5132
RH
621{
622 char *emulation;
623 int i;
624
625 emulation = getenv (EMULATION_ENVIRON);
626 if (emulation == NULL)
627 emulation = DEFAULT_EMULATION;
628
629 for (i = 1; i < argc; i++)
630 {
0112cd26 631 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
632 {
633 if (argv[i][2] == '\0')
634 {
635 /* -m EMUL */
636 if (i < argc - 1)
637 {
638 emulation = argv[i + 1];
639 i++;
640 }
641 else
df5f2391 642 einfo (_("%F%P: missing argument to -m\n"));
252b5132
RH
643 }
644 else if (strcmp (argv[i], "-mips1") == 0
645 || strcmp (argv[i], "-mips2") == 0
646 || strcmp (argv[i], "-mips3") == 0
d1cf510e 647 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
648 || strcmp (argv[i], "-mips5") == 0
649 || strcmp (argv[i], "-mips32") == 0
650 || strcmp (argv[i], "-mips32r2") == 0
7361da2c 651 || strcmp (argv[i], "-mips32r6") == 0
5f74bc13 652 || strcmp (argv[i], "-mips64") == 0
7361da2c
AB
653 || strcmp (argv[i], "-mips64r2") == 0
654 || strcmp (argv[i], "-mips64r6") == 0)
252b5132 655 {
31d677f9 656 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
657 passed to the linker by some MIPS compilers. They
658 generally tell the linker to use a slightly different
659 library path. Perhaps someday these should be
660 implemented as emulations; until then, we just ignore
661 the arguments and hope that nobody ever creates
662 emulations named ips1, ips2 or ips3. */
663 }
664 else if (strcmp (argv[i], "-m486") == 0)
665 {
666 /* FIXME: The argument -m486 is passed to the linker on
667 some Linux systems. Hope that nobody creates an
668 emulation named 486. */
669 }
670 else
671 {
672 /* -mEMUL */
673 emulation = &argv[i][2];
674 }
675 }
676 }
677
678 return emulation;
679}
680
252b5132 681void
1579bae1 682add_ysym (const char *name)
252b5132 683{
1579bae1 684 if (link_info.notice_hash == NULL)
252b5132 685 {
0aa7f586
AM
686 link_info.notice_hash
687 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
688 if (!bfd_hash_table_init_n (link_info.notice_hash,
689 bfd_hash_newfunc,
690 sizeof (struct bfd_hash_entry),
691 61))
df5f2391 692 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
6d5e62f8 693 }
252b5132 694
1579bae1 695 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
df5f2391 696 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
697}
698
0e86e20e
AM
699void
700add_ignoresym (struct bfd_link_info *info, const char *name)
701{
702 if (info->ignore_hash == NULL)
703 {
704 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
0aa7f586
AM
705 if (!bfd_hash_table_init_n (info->ignore_hash,
706 bfd_hash_newfunc,
707 sizeof (struct bfd_hash_entry),
708 61))
df5f2391 709 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
0e86e20e
AM
710 }
711
712 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
df5f2391 713 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
0e86e20e
AM
714}
715
252b5132
RH
716/* Record a symbol to be wrapped, from the --wrap option. */
717
718void
1579bae1 719add_wrap (const char *name)
252b5132
RH
720{
721 if (link_info.wrap_hash == NULL)
722 {
0aa7f586
AM
723 link_info.wrap_hash
724 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
725 if (!bfd_hash_table_init_n (link_info.wrap_hash,
726 bfd_hash_newfunc,
727 sizeof (struct bfd_hash_entry),
728 61))
df5f2391 729 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132 730 }
0125cdf2 731
b34976b6 732 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
df5f2391 733 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
252b5132
RH
734}
735
736/* Handle the -retain-symbols-file option. */
737
738void
1579bae1 739add_keepsyms_file (const char *filename)
252b5132
RH
740{
741 FILE *file;
742 char *buf;
743 size_t bufsize;
744 int c;
745
746 if (link_info.strip == strip_some)
747 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
748
749 file = fopen (filename, "r");
1579bae1 750 if (file == NULL)
252b5132
RH
751 {
752 bfd_set_error (bfd_error_system_call);
753 einfo ("%X%P: %s: %E\n", filename);
754 return;
755 }
756
1e9cc1c2
NC
757 link_info.keep_hash = (struct bfd_hash_table *)
758 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
759 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
760 sizeof (struct bfd_hash_entry)))
df5f2391 761 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
252b5132
RH
762
763 bufsize = 100;
1e9cc1c2 764 buf = (char *) xmalloc (bufsize);
252b5132
RH
765
766 c = getc (file);
767 while (c != EOF)
768 {
3882b010 769 while (ISSPACE (c))
252b5132
RH
770 c = getc (file);
771
772 if (c != EOF)
773 {
774 size_t len = 0;
775
0aa7f586 776 while (!ISSPACE (c) && c != EOF)
252b5132
RH
777 {
778 buf[len] = c;
779 ++len;
780 if (len >= bufsize)
781 {
782 bufsize *= 2;
1e9cc1c2 783 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
784 }
785 c = getc (file);
786 }
787
788 buf[len] = '\0';
789
1579bae1 790 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
df5f2391 791 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
252b5132
RH
792 }
793 }
794
795 if (link_info.strip != strip_none)
796 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
797
5ed6aba4 798 free (buf);
252b5132 799 link_info.strip = strip_some;
d9313f4f 800 fclose (file);
252b5132
RH
801}
802\f
803/* Callbacks from the BFD linker routines. */
804
805/* This is called when BFD has decided to include an archive member in
806 a link. */
807
b34976b6 808static bfd_boolean
e1fffbe6 809add_archive_element (struct bfd_link_info *info,
1579bae1 810 bfd *abfd,
5d3236ee
DK
811 const char *name,
812 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
813{
814 lang_input_statement_type *input;
1fa4ec6a 815 lang_input_statement_type *parent;
5d3236ee 816 lang_input_statement_type orig_input;
252b5132 817
1e9cc1c2
NC
818 input = (lang_input_statement_type *)
819 xcalloc (1, sizeof (lang_input_statement_type));
fb47deda 820 input->header.type = lang_input_statement_enum;
607b4833
AM
821 input->filename = bfd_get_filename (abfd);
822 input->local_sym_name = bfd_get_filename (abfd);
252b5132 823 input->the_bfd = abfd;
252b5132 824
00f93c44 825 parent = bfd_usrdata (abfd->my_archive);
1fa4ec6a 826 if (parent != NULL && !parent->flags.reload)
36983a93 827 parent->next = input;
1fa4ec6a 828
5d3236ee
DK
829 /* Save the original data for trace files/tries below, as plugins
830 (if enabled) may possibly alter it to point to a replacement
831 BFD, but we still want to output the original BFD filename. */
832 orig_input = *input;
833#ifdef ENABLE_PLUGINS
b95a0a31 834 if (link_info.lto_plugin_active)
5d3236ee
DK
835 {
836 /* We must offer this archive member to the plugins to claim. */
35a1e5f3
L
837 plugin_maybe_claim (input);
838 if (input->flags.claimed)
5d3236ee 839 {
b95a0a31
L
840 if (no_more_claiming)
841 {
842 /* Don't claim new IR symbols after all IR symbols have
843 been claimed. */
5c87f94b 844 if (verbose)
6e0c75f7 845 info_msg ("%pI: no new IR symbols to claim\n",
b95a0a31
L
846 &orig_input);
847 input->flags.claimed = 0;
848 return FALSE;
849 }
35a1e5f3
L
850 input->flags.claim_archive = TRUE;
851 *subsbfd = input->the_bfd;
5d3236ee
DK
852 }
853 }
854#endif /* ENABLE_PLUGINS */
855
252b5132
RH
856 ldlang_add_file (input);
857
1579bae1 858 if (config.map_file != NULL)
252b5132 859 {
b34976b6 860 static bfd_boolean header_printed;
252b5132
RH
861 struct bfd_link_hash_entry *h;
862 bfd *from;
863 int len;
864
e1fffbe6 865 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
aa654ee8
AM
866 if (h == NULL
867 && info->pei386_auto_import
868 && CONST_STRNEQ (name, "__imp_"))
869 h = bfd_link_hash_lookup (info->hash, name + 6, FALSE, FALSE, TRUE);
252b5132
RH
870
871 if (h == NULL)
872 from = NULL;
873 else
874 {
875 switch (h->type)
876 {
877 default:
878 from = NULL;
879 break;
880
881 case bfd_link_hash_defined:
882 case bfd_link_hash_defweak:
883 from = h->u.def.section->owner;
884 break;
885
886 case bfd_link_hash_undefined:
887 case bfd_link_hash_undefweak:
888 from = h->u.undef.abfd;
889 break;
890
891 case bfd_link_hash_common:
892 from = h->u.c.p->section->owner;
893 break;
894 }
895 }
896
0aa7f586 897 if (!header_printed)
252b5132 898 {
1273da04 899 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
b34976b6 900 header_printed = TRUE;
252b5132
RH
901 }
902
3860d2b4
AM
903 if (abfd->my_archive == NULL
904 || bfd_is_thin_archive (abfd->my_archive))
252b5132
RH
905 {
906 minfo ("%s", bfd_get_filename (abfd));
907 len = strlen (bfd_get_filename (abfd));
908 }
909 else
910 {
3860d2b4 911 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
252b5132 912 bfd_get_filename (abfd));
3860d2b4 913 len = (strlen (bfd_get_filename (abfd->my_archive))
252b5132
RH
914 + strlen (bfd_get_filename (abfd))
915 + 2);
916 }
917
918 if (len >= 29)
919 {
920 print_nl ();
921 len = 0;
922 }
923 while (len < 30)
924 {
925 print_space ();
926 ++len;
927 }
928
929 if (from != NULL)
871b3ab2 930 minfo ("%pB ", from);
252b5132 931 if (h != NULL)
c1c8c1ef 932 minfo ("(%pT)\n", h->root.string);
252b5132
RH
933 else
934 minfo ("(%s)\n", name);
935 }
936
727a29ba
AM
937 if (verbose
938 || trace_files > 1
939 || (trace_files && bfd_is_thin_archive (orig_input.the_bfd->my_archive)))
c1c8c1ef 940 info_msg ("%pI\n", &orig_input);
b34976b6 941 return TRUE;
252b5132
RH
942}
943
944/* This is called when BFD has discovered a symbol which is defined
945 multiple times. */
946
1a72702b 947static void
24f58f47
AM
948multiple_definition (struct bfd_link_info *info,
949 struct bfd_link_hash_entry *h,
1579bae1
AM
950 bfd *nbfd,
951 asection *nsec,
952 bfd_vma nval)
252b5132 953{
24f58f47
AM
954 const char *name;
955 bfd *obfd;
956 asection *osec;
957 bfd_vma oval;
958
959 if (info->allow_multiple_definition)
1a72702b 960 return;
24f58f47
AM
961
962 switch (h->type)
963 {
964 case bfd_link_hash_defined:
965 osec = h->u.def.section;
966 oval = h->u.def.value;
967 obfd = h->u.def.section->owner;
968 break;
969 case bfd_link_hash_indirect:
970 osec = bfd_ind_section_ptr;
971 oval = 0;
972 obfd = NULL;
973 break;
974 default:
975 abort ();
976 }
977
978 /* Ignore a redefinition of an absolute symbol to the
979 same value; it's harmless. */
980 if (h->type == bfd_link_hash_defined
981 && bfd_is_abs_section (osec)
982 && bfd_is_abs_section (nsec)
983 && nval == oval)
1a72702b 984 return;
24f58f47 985
252b5132
RH
986 /* If either section has the output_section field set to
987 bfd_abs_section_ptr, it means that the section is being
988 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
989 FIXME: It would be cleaner to somehow ignore symbols defined in
990 sections which are being discarded. */
3f0a5f17
ME
991 if (!info->prohibit_multiple_definition_absolute
992 && ((osec->output_section != NULL
993 && ! bfd_is_abs_section (osec)
994 && bfd_is_abs_section (osec->output_section))
995 || (nsec->output_section != NULL
996 && !bfd_is_abs_section (nsec)
997 && bfd_is_abs_section (nsec->output_section))))
1a72702b 998 return;
252b5132 999
24f58f47
AM
1000 name = h->root.string;
1001 if (nbfd == NULL)
1002 {
1003 nbfd = obfd;
1004 nsec = osec;
1005 nval = oval;
1006 obfd = NULL;
1007 }
df5f2391 1008 einfo (_("%X%P: %C: multiple definition of `%pT'"),
252b5132 1009 nbfd, nsec, nval, name);
1579bae1 1010 if (obfd != NULL)
df5f2391
AM
1011 einfo (_("; %D: first defined here"), obfd, osec, oval);
1012 einfo ("\n");
9b14b192 1013
13761a11 1014 if (RELAXATION_ENABLED_BY_USER)
9b14b192 1015 {
df5f2391 1016 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
13761a11 1017 DISABLE_RELAXATION;
9b14b192 1018 }
252b5132
RH
1019}
1020
1021/* This is called when there is a definition of a common symbol, or
1022 when a common symbol is found for a symbol that is already defined,
1023 or when two common symbols are found. We only do something if
1024 -warn-common was used. */
1025
1a72702b 1026static void
1579bae1 1027multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 1028 struct bfd_link_hash_entry *h,
1579bae1
AM
1029 bfd *nbfd,
1030 enum bfd_link_hash_type ntype,
1031 bfd_vma nsize)
252b5132 1032{
24f58f47
AM
1033 const char *name;
1034 bfd *obfd;
1035 enum bfd_link_hash_type otype;
1036 bfd_vma osize;
1037
1038 if (!config.warn_common)
1a72702b 1039 return;
252b5132 1040
24f58f47
AM
1041 name = h->root.string;
1042 otype = h->type;
1043 if (otype == bfd_link_hash_common)
1044 {
1045 obfd = h->u.c.p->section->owner;
1046 osize = h->u.c.size;
1047 }
1048 else if (otype == bfd_link_hash_defined
1049 || otype == bfd_link_hash_defweak)
1050 {
1051 obfd = h->u.def.section->owner;
1052 osize = 0;
1053 }
1054 else
1055 {
1056 /* FIXME: It would nice if we could report the BFD which defined
1057 an indirect symbol, but we don't have anywhere to store the
1058 information. */
1059 obfd = NULL;
1060 osize = 0;
1061 }
1062
252b5132
RH
1063 if (ntype == bfd_link_hash_defined
1064 || ntype == bfd_link_hash_defweak
1065 || ntype == bfd_link_hash_indirect)
1066 {
1067 ASSERT (otype == bfd_link_hash_common);
252b5132 1068 if (obfd != NULL)
df5f2391
AM
1069 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1070 " from %pB\n"),
1071 nbfd, name, obfd);
1072 else
1073 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1074 nbfd, name);
252b5132
RH
1075 }
1076 else if (otype == bfd_link_hash_defined
1077 || otype == bfd_link_hash_defweak
1078 || otype == bfd_link_hash_indirect)
1079 {
1080 ASSERT (ntype == bfd_link_hash_common);
252b5132 1081 if (obfd != NULL)
df5f2391
AM
1082 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1083 " from %pB\n"),
1084 nbfd, name, obfd);
1085 else
1086 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1087 nbfd, name);
252b5132
RH
1088 }
1089 else
1090 {
1091 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1092 if (osize > nsize)
1093 {
252b5132 1094 if (obfd != NULL)
df5f2391
AM
1095 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1096 " by larger common from %pB\n"),
1097 nbfd, name, obfd);
1098 else
1099 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1100 " by larger common\n"),
1101 nbfd, name);
252b5132
RH
1102 }
1103 else if (nsize > osize)
1104 {
252b5132 1105 if (obfd != NULL)
df5f2391
AM
1106 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1107 " smaller common from %pB\n"),
1108 nbfd, name, obfd);
1109 else
1110 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1111 " smaller common\n"),
1112 nbfd, name);
252b5132
RH
1113 }
1114 else
1115 {
252b5132 1116 if (obfd != NULL)
df5f2391
AM
1117 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1118 nbfd, obfd, name);
1119 else
1120 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1121 nbfd, name);
252b5132
RH
1122 }
1123 }
252b5132
RH
1124}
1125
1126/* This is called when BFD has discovered a set element. H is the
1127 entry in the linker hash table for the set. SECTION and VALUE
1128 represent a value which should be added to the set. */
1129
1a72702b 1130static void
1579bae1
AM
1131add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1132 struct bfd_link_hash_entry *h,
1133 bfd_reloc_code_real_type reloc,
1134 bfd *abfd,
1135 asection *section,
1136 bfd_vma value)
252b5132
RH
1137{
1138 if (config.warn_constructors)
1139 einfo (_("%P: warning: global constructor %s used\n"),
1140 h->root.string);
1141
0aa7f586 1142 if (!config.build_constructors)
1a72702b 1143 return;
252b5132 1144
1579bae1 1145 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1146
1147 if (h->type == bfd_link_hash_new)
1148 {
1149 h->type = bfd_link_hash_undefined;
1150 h->u.undef.abfd = abfd;
1151 /* We don't call bfd_link_add_undef to add this to the list of
1152 undefined symbols because we are going to define it
1153 ourselves. */
1154 }
252b5132
RH
1155}
1156
1157/* This is called when BFD has discovered a constructor. This is only
1158 called for some object file formats--those which do not handle
1159 constructors in some more clever fashion. This is similar to
1160 adding an element to a set, but less general. */
1161
1a72702b 1162static void
1579bae1
AM
1163constructor_callback (struct bfd_link_info *info,
1164 bfd_boolean constructor,
1165 const char *name,
1166 bfd *abfd,
1167 asection *section,
1168 bfd_vma value)
252b5132
RH
1169{
1170 char *s;
1171 struct bfd_link_hash_entry *h;
1172 char set_name[1 + sizeof "__CTOR_LIST__"];
1173
1174 if (config.warn_constructors)
1175 einfo (_("%P: warning: global constructor %s used\n"), name);
1176
0aa7f586 1177 if (!config.build_constructors)
1a72702b 1178 return;
252b5132
RH
1179
1180 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1181 useful error message. */
0e86e20e 1182 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
0e1862bb 1183 && (bfd_link_relocatable (info)
252b5132 1184 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
df5f2391 1185 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
252b5132
RH
1186
1187 s = set_name;
1188 if (bfd_get_symbol_leading_char (abfd) != '\0')
1189 *s++ = bfd_get_symbol_leading_char (abfd);
1190 if (constructor)
1191 strcpy (s, "__CTOR_LIST__");
1192 else
1193 strcpy (s, "__DTOR_LIST__");
1194
b34976b6 1195 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132 1196 if (h == (struct bfd_link_hash_entry *) NULL)
df5f2391 1197 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
252b5132
RH
1198 if (h->type == bfd_link_hash_new)
1199 {
1200 h->type = bfd_link_hash_undefined;
1201 h->u.undef.abfd = abfd;
1202 /* We don't call bfd_link_add_undef to add this to the list of
1203 undefined symbols because we are going to define it
1204 ourselves. */
1205 }
1206
1207 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
252b5132
RH
1208}
1209
1210/* A structure used by warning_callback to pass information through
1211 bfd_map_over_sections. */
1212
0125cdf2
NC
1213struct warning_callback_info
1214{
b34976b6 1215 bfd_boolean found;
252b5132
RH
1216 const char *warning;
1217 const char *symbol;
1218 asymbol **asymbols;
1219};
1220
4c6d802e
L
1221/* Look through the relocs to see if we can find a plausible address
1222 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1223
1224static bfd_boolean
1225symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1226{
1227 struct warning_callback_info cinfo;
1228
1229 if (!bfd_generic_link_read_symbols (abfd))
df5f2391 1230 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
4c6d802e
L
1231
1232 cinfo.found = FALSE;
1233 cinfo.warning = warning;
1234 cinfo.symbol = symbol;
1235 cinfo.asymbols = bfd_get_outsymbols (abfd);
1236 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1237 return cinfo.found;
1238}
1239
252b5132
RH
1240/* This is called when there is a reference to a warning symbol. */
1241
1a72702b 1242static void
1579bae1
AM
1243warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1244 const char *warning,
1245 const char *symbol,
1246 bfd *abfd,
1247 asection *section,
1248 bfd_vma address)
252b5132
RH
1249{
1250 /* This is a hack to support warn_multiple_gp. FIXME: This should
1251 have a cleaner interface, but what? */
0aa7f586 1252 if (!config.warn_multiple_gp
252b5132 1253 && strcmp (warning, "using multiple gp values") == 0)
1a72702b 1254 return;
252b5132
RH
1255
1256 if (section != NULL)
df5f2391 1257 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1258 else if (abfd == NULL)
300475fe 1259 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1260 else if (symbol == NULL)
df5f2391 1261 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
0aa7f586 1262 else if (!symbol_warning (warning, symbol, abfd))
252b5132 1263 {
4c6d802e
L
1264 bfd *b;
1265 /* Search all input files for a reference to SYMBOL. */
c72f2fb2 1266 for (b = info->input_bfds; b; b = b->link.next)
4c6d802e 1267 if (b != abfd && symbol_warning (warning, symbol, b))
1a72702b 1268 return;
df5f2391 1269 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
252b5132 1270 }
252b5132
RH
1271}
1272
1273/* This is called by warning_callback for each section. It checks the
1274 relocs of the section to see if it can find a reference to the
1275 symbol which triggered the warning. If it can, it uses the reloc
1276 to give an error message with a file and line number. */
1277
1278static void
1579bae1 1279warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1280{
1e9cc1c2 1281 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1282 long relsize;
1283 arelent **relpp;
1284 long relcount;
1285 arelent **p, **pend;
1286
1287 if (info->found)
1288 return;
1289
1290 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1291 if (relsize < 0)
df5f2391 1292 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1293 if (relsize == 0)
1294 return;
1295
1e9cc1c2 1296 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1297 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1298 if (relcount < 0)
df5f2391 1299 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
252b5132
RH
1300
1301 p = relpp;
1302 pend = p + relcount;
1303 for (; p < pend && *p != NULL; p++)
1304 {
1305 arelent *q = *p;
1306
1307 if (q->sym_ptr_ptr != NULL
1308 && *q->sym_ptr_ptr != NULL
1309 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1310 {
1311 /* We found a reloc for the symbol we are looking for. */
df5f2391 1312 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
300475fe 1313 info->warning);
b34976b6 1314 info->found = TRUE;
252b5132
RH
1315 break;
1316 }
1317 }
1318
1319 free (relpp);
1320}
1321
1322/* This is called when an undefined symbol is found. */
1323
1a72702b 1324static void
0e86e20e 1325undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1326 const char *name,
1327 bfd *abfd,
1328 asection *section,
1329 bfd_vma address,
0b28295d 1330 bfd_boolean error)
252b5132
RH
1331{
1332 static char *error_name;
1333 static unsigned int error_count;
1334
1335#define MAX_ERRORS_IN_A_ROW 5
1336
0e86e20e
AM
1337 if (info->ignore_hash != NULL
1338 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1a72702b 1339 return;
0e86e20e 1340
252b5132
RH
1341 if (config.warn_once)
1342 {
252b5132 1343 /* Only warn once about a particular undefined symbol. */
0e86e20e 1344 add_ignoresym (info, name);
252b5132
RH
1345 }
1346
1347 /* We never print more than a reasonable number of errors in a row
1348 for a single symbol. */
1579bae1 1349 if (error_name != NULL
252b5132
RH
1350 && strcmp (name, error_name) == 0)
1351 ++error_count;
1352 else
1353 {
1354 error_count = 0;
5e2ab612 1355 free (error_name);
d1b2b2dc 1356 error_name = xstrdup (name);
252b5132
RH
1357 }
1358
1359 if (section != NULL)
1360 {
1361 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1362 {
0b28295d 1363 if (error)
df5f2391 1364 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
0b28295d
ILT
1365 abfd, section, address, name);
1366 else
df5f2391 1367 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
0b28295d 1368 abfd, section, address, name);
b6f29aaa 1369 }
252b5132 1370 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1371 {
1372 if (error)
df5f2391 1373 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1374 abfd, section, address, name);
1375 else
df5f2391 1376 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1377 abfd, section, address, name);
1378 }
1379 else if (error)
1380 einfo ("%X");
252b5132
RH
1381 }
1382 else
1383 {
1384 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1385 {
0b28295d 1386 if (error)
df5f2391 1387 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
0b28295d
ILT
1388 abfd, name);
1389 else
df5f2391 1390 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
0b28295d 1391 abfd, name);
b6f29aaa 1392 }
252b5132 1393 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1394 {
1395 if (error)
df5f2391 1396 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1397 abfd, name);
1398 else
df5f2391 1399 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
0b28295d
ILT
1400 abfd, name);
1401 }
1402 else if (error)
1403 einfo ("%X");
252b5132 1404 }
252b5132
RH
1405}
1406
8aae64e6
AO
1407/* Counter to limit the number of relocation overflow error messages
1408 to print. Errors are printed as it is decremented. When it's
1409 called and the counter is zero, a final message is printed
1410 indicating more relocations were omitted. When it gets to -1, no
1411 such errors are printed. If it's initially set to a value less
1412 than -1, all such errors will be printed (--verbose does this). */
1413
1414int overflow_cutoff_limit = 10;
1415
252b5132
RH
1416/* This is called when a reloc overflows. */
1417
1a72702b 1418static void
0e86e20e 1419reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1420 struct bfd_link_hash_entry *entry,
1579bae1
AM
1421 const char *name,
1422 const char *reloc_name,
1423 bfd_vma addend,
1424 bfd *abfd,
1425 asection *section,
1426 bfd_vma address)
252b5132 1427{
8aae64e6 1428 if (overflow_cutoff_limit == -1)
1a72702b 1429 return;
8aae64e6 1430
a5990ada 1431 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1432
1433 if (overflow_cutoff_limit >= 0
1434 && overflow_cutoff_limit-- == 0)
1435 {
1436 einfo (_(" additional relocation overflows omitted from the output\n"));
1a72702b 1437 return;
8aae64e6
AO
1438 }
1439
dfeffb9f
L
1440 if (entry)
1441 {
1442 while (entry->type == bfd_link_hash_indirect
1443 || entry->type == bfd_link_hash_warning)
1444 entry = entry->u.i.link;
1445 switch (entry->type)
1446 {
1447 case bfd_link_hash_undefined:
1448 case bfd_link_hash_undefweak:
0aa7f586 1449 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1450 "%s against undefined symbol `%pT'"),
dfeffb9f
L
1451 reloc_name, entry->root.string);
1452 break;
1453 case bfd_link_hash_defined:
1454 case bfd_link_hash_defweak:
0aa7f586 1455 einfo (_(" relocation truncated to fit: "
c1c8c1ef 1456 "%s against symbol `%pT' defined in %pA section in %pB"),
dfeffb9f 1457 reloc_name, entry->root.string,
a6e1b90f
L
1458 entry->u.def.section,
1459 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1460 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1461 break;
1462 default:
1463 abort ();
1464 break;
1465 }
1466 }
1467 else
c1c8c1ef 1468 einfo (_(" relocation truncated to fit: %s against `%pT'"),
dfeffb9f 1469 reloc_name, name);
252b5132
RH
1470 if (addend != 0)
1471 einfo ("+%v", addend);
1472 einfo ("\n");
252b5132
RH
1473}
1474
1475/* This is called when a dangerous relocation is made. */
1476
1a72702b 1477static void
1579bae1
AM
1478reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1479 const char *message,
1480 bfd *abfd,
1481 asection *section,
1482 bfd_vma address)
252b5132 1483{
a5990ada 1484 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1485 abfd, section, address, message);
252b5132
RH
1486}
1487
1488/* This is called when a reloc is being generated attached to a symbol
1489 that is not being output. */
1490
1a72702b 1491static void
1579bae1
AM
1492unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1493 const char *name,
1494 bfd *abfd,
1495 asection *section,
1496 bfd_vma address)
252b5132 1497{
a5990ada 1498 einfo (_("%X%H: reloc refers to symbol `%pT' which is not being output\n"),
e1fffbe6 1499 abfd, section, address, name);
252b5132
RH
1500}
1501
1502/* This is called if link_info.notice_all is set, or when a symbol in
1503 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1504 using the -y option, while notice_all is set if the --cref option
1505 has been supplied, or if there are any NOCROSSREFS sections in the
1506 linker script; and if plugins are active, since they need to monitor
1507 all references from non-IR files. */
252b5132 1508
b34976b6 1509static bfd_boolean
1579bae1 1510notice (struct bfd_link_info *info,
35ed3f94 1511 struct bfd_link_hash_entry *h,
46135103 1512 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1579bae1
AM
1513 bfd *abfd,
1514 asection *section,
16d96b5b 1515 bfd_vma value,
46135103 1516 flagword flags ATTRIBUTE_UNUSED)
252b5132 1517{
35ed3f94
AM
1518 const char *name;
1519
1520 if (h == NULL)
5061a885
AM
1521 {
1522 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1523 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1524 return TRUE;
1525 }
1526
35ed3f94 1527 name = h->root.string;
5d3236ee 1528 if (info->notice_hash != NULL
9e2278f5 1529 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1530 {
1531 if (bfd_is_und_section (section))
df5f2391 1532 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
252b5132 1533 else
df5f2391 1534 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
252b5132
RH
1535 }
1536
1537 if (command_line.cref || nocrossref_list != NULL)
1538 add_cref (name, abfd, section, value);
1539
b34976b6 1540 return TRUE;
252b5132 1541}