]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - ld/ldmain.c
gdb/testsuite/
[thirdparty/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
4e5bae56 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001,
dab69f68 3 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012
252b5132
RH
4 Free Software Foundation, Inc.
5 Written by Steve Chamberlain steve@cygnus.com
6
f96b4a7b 7 This file is part of the GNU Binutils.
252b5132 8
f96b4a7b 9 This program is free software; you can redistribute it and/or modify
2fa9fc65 10 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
252b5132 13
f96b4a7b 14 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
252b5132 18
2fa9fc65 19 You should have received a copy of the GNU General Public License
f96b4a7b
NC
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
22 MA 02110-1301, USA. */
252b5132 23
252b5132 24#include "sysdep.h"
3db64b00 25#include "bfd.h"
3882b010 26#include "safe-ctype.h"
252b5132
RH
27#include "libiberty.h"
28#include "progress.h"
29#include "bfdlink.h"
5af11cab 30#include "filenames.h"
252b5132
RH
31
32#include "ld.h"
33#include "ldmain.h"
34#include "ldmisc.h"
35#include "ldwrite.h"
252b5132
RH
36#include "ldexp.h"
37#include "ldlang.h"
df2a7313 38#include <ldgram.h>
252b5132
RH
39#include "ldlex.h"
40#include "ldfile.h"
b71e2778 41#include "ldemul.h"
252b5132 42#include "ldctor.h"
5d3236ee
DK
43#ifdef ENABLE_PLUGINS
44#include "plugin.h"
45#include "plugin-api.h"
46#include "libbfd.h"
47#endif /* ENABLE_PLUGINS */
252b5132 48
0125cdf2 49/* Somewhere above, sys/stat.h got included. */
252b5132
RH
50#if !defined(S_ISDIR) && defined(S_IFDIR)
51#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
52#endif
53
54#include <string.h>
55
56#ifdef HAVE_SBRK
502bdb00 57#if !HAVE_DECL_SBRK
1579bae1 58extern void *sbrk ();
252b5132
RH
59#endif
60#endif
61
9c8ebd6a
DJ
62#ifndef TARGET_SYSTEM_ROOT
63#define TARGET_SYSTEM_ROOT ""
64#endif
65
252b5132
RH
66/* EXPORTS */
67
53d25da6
AM
68FILE *saved_script_handle = NULL;
69FILE *previous_script_handle = NULL;
70bfd_boolean force_make_executable = FALSE;
71
252b5132
RH
72char *default_target;
73const char *output_filename = "a.out";
74
75/* Name this program was invoked by. */
76char *program_name;
77
9c8ebd6a 78/* The prefix for system library directories. */
e2243057 79const char *ld_sysroot;
9c8ebd6a 80
3fe38064
NC
81/* The canonical representation of ld_sysroot. */
82char * ld_canon_sysroot;
83int ld_canon_sysroot_len;
84
252b5132
RH
85/* Set by -G argument, for MIPS ECOFF target. */
86int g_switch_value = 8;
87
88/* Nonzero means print names of input files as processed. */
b34976b6 89bfd_boolean trace_files;
252b5132
RH
90
91/* Nonzero means same, but note open failures, too. */
b34976b6 92bfd_boolean trace_file_tries;
252b5132
RH
93
94/* Nonzero means version number was printed, so exit successfully
95 instead of complaining if no input files are given. */
b34976b6 96bfd_boolean version_printed;
252b5132 97
b34976b6
AM
98/* TRUE if we should demangle symbol names. */
99bfd_boolean demangling;
252b5132
RH
100
101args_type command_line;
102
103ld_config_type config;
104
bcaa7b3e
L
105sort_type sort_section;
106
e2243057
RS
107static const char *get_sysroot
108 (int, char **);
0125cdf2 109static char *get_emulation
1579bae1 110 (int, char **);
0125cdf2 111static bfd_boolean add_archive_element
5d3236ee 112 (struct bfd_link_info *, bfd *, const char *, bfd **);
0125cdf2 113static bfd_boolean multiple_definition
24f58f47 114 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 115 bfd *, asection *, bfd_vma);
0125cdf2 116static bfd_boolean multiple_common
24f58f47
AM
117 (struct bfd_link_info *, struct bfd_link_hash_entry *,
118 bfd *, enum bfd_link_hash_type, bfd_vma);
0125cdf2 119static bfd_boolean add_to_set
1579bae1
AM
120 (struct bfd_link_info *, struct bfd_link_hash_entry *,
121 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
0125cdf2 122static bfd_boolean constructor_callback
1579bae1
AM
123 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
124 asection *, bfd_vma);
0125cdf2 125static bfd_boolean warning_callback
1579bae1
AM
126 (struct bfd_link_info *, const char *, const char *, bfd *,
127 asection *, bfd_vma);
0125cdf2 128static void warning_find_reloc
1579bae1 129 (bfd *, asection *, void *);
0125cdf2 130static bfd_boolean undefined_symbol
1579bae1
AM
131 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
132 bfd_boolean);
0125cdf2 133static bfd_boolean reloc_overflow
dfeffb9f
L
134 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
135 const char *, bfd_vma, bfd *, asection *, bfd_vma);
0125cdf2 136static bfd_boolean reloc_dangerous
1579bae1 137 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 138static bfd_boolean unattached_reloc
1579bae1 139 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 140static bfd_boolean notice
35ed3f94 141 (struct bfd_link_info *, struct bfd_link_hash_entry *,
16d96b5b 142 bfd *, asection *, bfd_vma, flagword, const char *);
0125cdf2
NC
143
144static struct bfd_link_callbacks link_callbacks =
145{
252b5132
RH
146 add_archive_element,
147 multiple_definition,
148 multiple_common,
149 add_to_set,
150 constructor_callback,
151 warning_callback,
152 undefined_symbol,
153 reloc_overflow,
154 reloc_dangerous,
155 unattached_reloc,
e1fffbe6 156 notice,
2889e75b 157 einfo,
49fa1e15
AM
158 info_msg,
159 minfo,
2889e75b 160 ldlang_override_segment_assignment
252b5132
RH
161};
162
3b66a141
HPN
163static bfd_assert_handler_type default_bfd_assert_handler;
164
252b5132
RH
165struct bfd_link_info link_info;
166\f
167static void
498cd2a0 168ld_cleanup (void)
252b5132 169{
498cd2a0
AM
170 bfd_cache_close_all ();
171#ifdef ENABLE_PLUGINS
172 plugin_call_cleanup ();
173#endif
174 if (output_filename && delete_output_file_on_failure)
175 unlink_if_ordinary (output_filename);
252b5132
RH
176}
177
3b66a141
HPN
178/* If there's a BFD assertion, we'll notice and exit with an error
179 unless otherwise instructed. */
180
181static void
182ld_bfd_assert_handler (const char *fmt, const char *bfdver,
183 const char *file, int line)
184{
185 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
186 config.make_executable = FALSE;
187}
188
252b5132 189int
1579bae1 190main (int argc, char **argv)
252b5132
RH
191{
192 char *emulation;
193 long start_time = get_run_time ();
194
195#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
196 setlocale (LC_MESSAGES, "");
3882b010
L
197#endif
198#if defined (HAVE_SETLOCALE)
199 setlocale (LC_CTYPE, "");
252b5132
RH
200#endif
201 bindtextdomain (PACKAGE, LOCALEDIR);
202 textdomain (PACKAGE);
203
204 program_name = argv[0];
205 xmalloc_set_program_name (program_name);
206
207 START_PROGRESS (program_name, 0);
208
869b9d07
MM
209 expandargv (&argc, &argv);
210
252b5132
RH
211 bfd_init ();
212
213 bfd_set_error_program_name (program_name);
214
3b66a141
HPN
215 /* We want to notice and fail on those nasty BFD assertions which are
216 likely to signal incorrect output being generated but otherwise may
217 leave no trace. */
218 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
219
498cd2a0 220 xatexit (ld_cleanup);
252b5132 221
e2243057
RS
222 /* Set up the sysroot directory. */
223 ld_sysroot = get_sysroot (argc, argv);
224 if (*ld_sysroot)
9c8ebd6a 225 {
e2243057 226 if (*TARGET_SYSTEM_ROOT == 0)
9c8ebd6a 227 {
70487fb2 228 einfo ("%P%F: this linker was not configured to use sysroots\n");
e2243057 229 ld_sysroot = "";
0125cdf2 230 }
e2243057
RS
231 else
232 ld_canon_sysroot = lrealpath (ld_sysroot);
0125cdf2 233 }
3fe38064
NC
234 if (ld_canon_sysroot)
235 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
236 else
237 ld_canon_sysroot_len = -1;
238
252b5132
RH
239 /* Set the default BFD target based on the configured target. Doing
240 this permits the linker to be configured for a particular target,
241 and linked against a shared BFD library which was configured for
242 a different target. The macro TARGET is defined by Makefile. */
243 if (! bfd_set_default_target (TARGET))
244 {
245 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
246 xexit (1);
247 }
248
b47c4208
AM
249#if YYDEBUG
250 {
251 extern int yydebug;
252 yydebug = 1;
253 }
254#endif
255
b34976b6 256 config.build_constructors = TRUE;
c76308d2 257 config.rpath_separator = ':';
a854a4a7
AM
258 config.split_by_reloc = (unsigned) -1;
259 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
260 config.make_executable = TRUE;
261 config.magic_demand_paged = TRUE;
262 config.text_read_only = TRUE;
263
b34976b6 264 command_line.warn_mismatch = TRUE;
fe7929ce 265 command_line.warn_search_mismatch = TRUE;
02b0b1aa 266 command_line.check_section_addresses = -1;
28d5f677 267 command_line.disable_target_specific_optimizations = -1;
bcaa7b3e 268
252b5132
RH
269 /* We initialize DEMANGLING based on the environment variable
270 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
271 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
272 environment. Acting the same way here lets us provide the same
273 interface by default. */
274 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
275
b34976b6 276 link_info.allow_undefined_version = TRUE;
b5067602 277 link_info.keep_memory = TRUE;
b5067602 278 link_info.combreloc = TRUE;
d5cd3933 279 link_info.strip_discarded = TRUE;
fdc90cb4 280 link_info.emit_hash = TRUE;
a9a4c53e
AM
281 link_info.callbacks = &link_callbacks;
282 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
283 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
284 and _fini symbols. We are compatible. */
285 link_info.init_function = "_init";
286 link_info.fini_function = "_fini";
a9a4c53e 287 link_info.relax_pass = 1;
e0076ab3 288 link_info.pei386_auto_import = -1;
db6751f2 289 link_info.spare_dynamic_tags = 5;
967928e9 290 link_info.path_separator = ':';
24718e3b 291
252b5132 292 ldfile_add_arch ("");
252b5132
RH
293 emulation = get_emulation (argc, argv);
294 ldemul_choose_mode (emulation);
742aeb63 295 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
296 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
297 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132
RH
298 lang_init ();
299 ldemul_before_parse ();
b34976b6 300 lang_has_input_file = FALSE;
252b5132
RH
301 parse_args (argc, argv);
302
2d643429
NC
303 if (config.hash_table_size != 0)
304 bfd_hash_set_default_size (config.hash_table_size);
305
9bbc1a67
AM
306#ifdef ENABLE_PLUGINS
307 /* Now all the plugin arguments have been gathered, we can load them. */
308 if (plugin_load_plugins ())
309 einfo (_("%P%F: %s: error loading plugin\n"), plugin_error_plugin ());
310#endif /* ENABLE_PLUGINS */
36af4a4e 311
9bbc1a67 312 ldemul_set_symbols ();
252b5132 313
14be8564
L
314 /* If we have not already opened and parsed a linker script,
315 try the default script from command line first. */
316 if (saved_script_handle == NULL
317 && command_line.default_script != NULL)
318 {
319 ldfile_open_command_file (command_line.default_script);
320 parser_input = input_script;
321 yyparse ();
322 }
323
b9a8de1e
NC
324 /* If we have not already opened and parsed a linker script
325 read the emulation's appropriate default script. */
b90e1c6f 326 if (saved_script_handle == NULL)
252b5132 327 {
252b5132 328 int isfile;
b7a26f91 329 char *s = ldemul_get_script (&isfile);
252b5132
RH
330
331 if (isfile)
7d24f02c 332 ldfile_open_default_command_file (s);
252b5132 333 else
b7a26f91 334 {
252b5132 335 lex_string = s;
dab69f68 336 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
337 }
338 parser_input = input_script;
339 yyparse ();
340 lex_string = NULL;
341 }
342
b9a8de1e
NC
343 if (trace_file_tries)
344 {
9cb61eab
AM
345 if (saved_script_handle)
346 info_msg (_("using external linker script:"));
347 else
348 info_msg (_("using internal linker script:"));
349 info_msg ("\n==================================================\n");
b9a8de1e
NC
350
351 if (saved_script_handle)
352 {
74699268 353 static const int ld_bufsz = 8193;
b9a8de1e 354 size_t n;
1e9cc1c2 355 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
356
357 rewind (saved_script_handle);
74699268 358 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 359 {
b7a26f91 360 buf[n] = 0;
b9a8de1e
NC
361 info_msg (buf);
362 }
363 rewind (saved_script_handle);
364 free (buf);
365 }
366 else
367 {
368 int isfile;
369
b7a26f91 370 info_msg (ldemul_get_script (&isfile));
b9a8de1e 371 }
b7a26f91 372
b9a8de1e
NC
373 info_msg ("\n==================================================\n");
374 }
375
30824704
RM
376 if (command_line.print_output_format)
377 info_msg ("%s\n", lang_get_output_target ());
378
252b5132
RH
379 lang_final ();
380
b34976b6 381 if (!lang_has_input_file)
252b5132 382 {
30824704 383 if (version_printed || command_line.print_output_format)
252b5132
RH
384 xexit (0);
385 einfo (_("%P%F: no input files\n"));
386 }
387
388 if (trace_files)
0125cdf2 389 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
390
391 ldemul_after_parse ();
392
252b5132
RH
393 if (config.map_filename)
394 {
395 if (strcmp (config.map_filename, "-") == 0)
396 {
397 config.map_file = stdout;
398 }
399 else
400 {
401 config.map_file = fopen (config.map_filename, FOPEN_WT);
402 if (config.map_file == (FILE *) NULL)
403 {
404 bfd_set_error (bfd_error_system_call);
405 einfo (_("%P%F: cannot open map file %s: %E\n"),
406 config.map_filename);
407 }
408 }
409 }
410
252b5132
RH
411 lang_process ();
412
413 /* Print error messages for any missing symbols, for any warning
6d5e62f8 414 symbols, and possibly multiple definitions. */
1049f94e 415 if (link_info.relocatable)
f13a99db 416 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 417 else
f13a99db 418 link_info.output_bfd->flags |= EXEC_P;
252b5132
RH
419
420 ldwrite ();
421
422 if (config.map_file != NULL)
423 lang_map ();
424 if (command_line.cref)
425 output_cref (config.map_file != NULL ? config.map_file : stdout);
426 if (nocrossref_list != NULL)
427 check_nocrossrefs ();
428
750877ba
L
429 lang_finish ();
430
1049f94e 431 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 432 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 433 want to ignore for relocatable output?) */
b34976b6 434 if (!config.make_executable && !force_make_executable)
252b5132 435 {
b34976b6 436 if (trace_files)
0125cdf2
NC
437 einfo (_("%P: link errors found, deleting executable `%s'\n"),
438 output_filename);
252b5132 439
4309cbf2 440 /* The file will be removed by ld_cleanup. */
252b5132
RH
441 xexit (1);
442 }
443 else
444 {
f13a99db
AM
445 if (! bfd_close (link_info.output_bfd))
446 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
447
448 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
449 executable file and it doesn't end in .exe, copy it to one
450 which does. */
1049f94e 451 if (! link_info.relocatable && command_line.force_exe_suffix)
252b5132
RH
452 {
453 int len = strlen (output_filename);
0125cdf2 454
6d5e62f8 455 if (len < 4
252b5132
RH
456 || (strcasecmp (output_filename + len - 4, ".exe") != 0
457 && strcasecmp (output_filename + len - 4, ".dll") != 0))
458 {
459 FILE *src;
460 FILE *dst;
461 const int bsize = 4096;
1e9cc1c2 462 char *buf = (char *) xmalloc (bsize);
252b5132 463 int l;
1e9cc1c2 464 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 465
252b5132
RH
466 strcpy (dst_name, output_filename);
467 strcat (dst_name, ".exe");
468 src = fopen (output_filename, FOPEN_RB);
469 dst = fopen (dst_name, FOPEN_WB);
470
471 if (!src)
1579bae1
AM
472 einfo (_("%X%P: unable to open for source of copy `%s'\n"),
473 output_filename);
252b5132 474 if (!dst)
1579bae1
AM
475 einfo (_("%X%P: unable to open for destination of copy `%s'\n"),
476 dst_name);
252b5132
RH
477 while ((l = fread (buf, 1, bsize, src)) > 0)
478 {
479 int done = fwrite (buf, 1, l, dst);
0125cdf2 480
252b5132 481 if (done != l)
0125cdf2 482 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 483 }
0125cdf2 484
252b5132
RH
485 fclose (src);
486 if (fclose (dst) == EOF)
0125cdf2 487 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
488 free (dst_name);
489 free (buf);
490 }
491 }
492 }
493
494 END_PROGRESS (program_name);
495
496 if (config.stats)
497 {
498#ifdef HAVE_SBRK
1e9cc1c2 499 char *lim = (char *) sbrk (0);
252b5132
RH
500#endif
501 long run_time = get_run_time () - start_time;
502
e922bcab 503 fflush (stdout);
252b5132
RH
504 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
505 program_name, run_time / 1000000, run_time % 1000000);
506#ifdef HAVE_SBRK
507 fprintf (stderr, _("%s: data size %ld\n"), program_name,
508 (long) (lim - (char *) &environ));
509#endif
e922bcab 510 fflush (stderr);
252b5132
RH
511 }
512
4309cbf2 513 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
514 output_filename = NULL;
515
516 xexit (0);
517 return 0;
518}
519
e2243057
RS
520/* If the configured sysroot is relocatable, try relocating it based on
521 default prefix FROM. Return the relocated directory if it exists,
522 otherwise return null. */
523
524static char *
525get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
526{
527#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
528 char *path;
529 struct stat s;
530
531 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
532 if (path)
533 {
534 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
535 return path;
536 free (path);
537 }
538#endif
539 return 0;
540}
541
542/* Return the sysroot directory. Return "" if no sysroot is being used. */
543
544static const char *
545get_sysroot (int argc, char **argv)
546{
547 int i;
548 const char *path;
549
550 for (i = 1; i < argc; i++)
0112cd26 551 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
552 return argv[i] + strlen ("--sysroot=");
553
554 path = get_relative_sysroot (BINDIR);
555 if (path)
556 return path;
557
558 path = get_relative_sysroot (TOOLBINDIR);
559 if (path)
560 return path;
561
562 return TARGET_SYSTEM_ROOT;
563}
564
252b5132
RH
565/* We need to find any explicitly given emulation in order to initialize the
566 state that's needed by the lex&yacc argument parser (parse_args). */
567
568static char *
1579bae1 569get_emulation (int argc, char **argv)
252b5132
RH
570{
571 char *emulation;
572 int i;
573
574 emulation = getenv (EMULATION_ENVIRON);
575 if (emulation == NULL)
576 emulation = DEFAULT_EMULATION;
577
578 for (i = 1; i < argc; i++)
579 {
0112cd26 580 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
581 {
582 if (argv[i][2] == '\0')
583 {
584 /* -m EMUL */
585 if (i < argc - 1)
586 {
587 emulation = argv[i + 1];
588 i++;
589 }
590 else
0125cdf2 591 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
592 }
593 else if (strcmp (argv[i], "-mips1") == 0
594 || strcmp (argv[i], "-mips2") == 0
595 || strcmp (argv[i], "-mips3") == 0
d1cf510e 596 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
597 || strcmp (argv[i], "-mips5") == 0
598 || strcmp (argv[i], "-mips32") == 0
599 || strcmp (argv[i], "-mips32r2") == 0
5f74bc13
CD
600 || strcmp (argv[i], "-mips64") == 0
601 || strcmp (argv[i], "-mips64r2") == 0)
252b5132 602 {
31d677f9 603 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
604 passed to the linker by some MIPS compilers. They
605 generally tell the linker to use a slightly different
606 library path. Perhaps someday these should be
607 implemented as emulations; until then, we just ignore
608 the arguments and hope that nobody ever creates
609 emulations named ips1, ips2 or ips3. */
610 }
611 else if (strcmp (argv[i], "-m486") == 0)
612 {
613 /* FIXME: The argument -m486 is passed to the linker on
614 some Linux systems. Hope that nobody creates an
615 emulation named 486. */
616 }
617 else
618 {
619 /* -mEMUL */
620 emulation = &argv[i][2];
621 }
622 }
623 }
624
625 return emulation;
626}
627
252b5132 628void
1579bae1 629add_ysym (const char *name)
252b5132 630{
1579bae1 631 if (link_info.notice_hash == NULL)
252b5132 632 {
1e9cc1c2
NC
633 link_info.notice_hash =
634 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
635 if (!bfd_hash_table_init_n (link_info.notice_hash,
636 bfd_hash_newfunc,
637 sizeof (struct bfd_hash_entry),
638 61))
252b5132 639 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 640 }
252b5132 641
1579bae1 642 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
643 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
644}
645
646/* Record a symbol to be wrapped, from the --wrap option. */
647
648void
1579bae1 649add_wrap (const char *name)
252b5132
RH
650{
651 if (link_info.wrap_hash == NULL)
652 {
1e9cc1c2
NC
653 link_info.wrap_hash =
654 (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
655 if (!bfd_hash_table_init_n (link_info.wrap_hash,
656 bfd_hash_newfunc,
657 sizeof (struct bfd_hash_entry),
658 61))
252b5132
RH
659 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
660 }
0125cdf2 661
b34976b6 662 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
663 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
664}
665
666/* Handle the -retain-symbols-file option. */
667
668void
1579bae1 669add_keepsyms_file (const char *filename)
252b5132
RH
670{
671 FILE *file;
672 char *buf;
673 size_t bufsize;
674 int c;
675
676 if (link_info.strip == strip_some)
677 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
678
679 file = fopen (filename, "r");
1579bae1 680 if (file == NULL)
252b5132
RH
681 {
682 bfd_set_error (bfd_error_system_call);
683 einfo ("%X%P: %s: %E\n", filename);
684 return;
685 }
686
1e9cc1c2
NC
687 link_info.keep_hash = (struct bfd_hash_table *)
688 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
689 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
690 sizeof (struct bfd_hash_entry)))
252b5132
RH
691 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
692
693 bufsize = 100;
1e9cc1c2 694 buf = (char *) xmalloc (bufsize);
252b5132
RH
695
696 c = getc (file);
697 while (c != EOF)
698 {
3882b010 699 while (ISSPACE (c))
252b5132
RH
700 c = getc (file);
701
702 if (c != EOF)
703 {
704 size_t len = 0;
705
3882b010 706 while (! ISSPACE (c) && c != EOF)
252b5132
RH
707 {
708 buf[len] = c;
709 ++len;
710 if (len >= bufsize)
711 {
712 bufsize *= 2;
1e9cc1c2 713 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
714 }
715 c = getc (file);
716 }
717
718 buf[len] = '\0';
719
1579bae1 720 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
721 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
722 }
723 }
724
725 if (link_info.strip != strip_none)
726 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
727
5ed6aba4 728 free (buf);
252b5132
RH
729 link_info.strip = strip_some;
730}
731\f
732/* Callbacks from the BFD linker routines. */
733
734/* This is called when BFD has decided to include an archive member in
735 a link. */
736
b34976b6 737static bfd_boolean
e1fffbe6 738add_archive_element (struct bfd_link_info *info,
1579bae1 739 bfd *abfd,
5d3236ee
DK
740 const char *name,
741 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
742{
743 lang_input_statement_type *input;
5d3236ee 744 lang_input_statement_type orig_input;
252b5132 745
1e9cc1c2
NC
746 input = (lang_input_statement_type *)
747 xcalloc (1, sizeof (lang_input_statement_type));
252b5132
RH
748 input->filename = abfd->filename;
749 input->local_sym_name = abfd->filename;
750 input->the_bfd = abfd;
252b5132 751
5d3236ee
DK
752 /* Save the original data for trace files/tries below, as plugins
753 (if enabled) may possibly alter it to point to a replacement
754 BFD, but we still want to output the original BFD filename. */
755 orig_input = *input;
756#ifdef ENABLE_PLUGINS
2b7e4308 757 if (plugin_active_plugins_p () && !no_more_claiming)
5d3236ee
DK
758 {
759 /* We must offer this archive member to the plugins to claim. */
2b7e4308
L
760 const char *filename = (bfd_my_archive (abfd) != NULL
761 ? bfd_my_archive (abfd)->filename : abfd->filename);
762 int fd = open (filename, O_RDONLY | O_BINARY);
5d3236ee
DK
763 if (fd >= 0)
764 {
765 struct ld_plugin_input_file file;
02d00247 766
5d3236ee
DK
767 /* Offset and filesize must refer to the individual archive
768 member, not the whole file, and must exclude the header.
769 Fortunately for us, that is how the data is stored in the
770 origin field of the bfd and in the arelt_data. */
2b7e4308 771 file.name = filename;
5d3236ee
DK
772 file.offset = abfd->origin;
773 file.filesize = arelt_size (abfd);
774 file.fd = fd;
02d00247 775 plugin_maybe_claim (&file, input);
66be1055 776 if (input->flags.claimed)
5d3236ee 777 {
66be1055 778 input->flags.claim_archive = TRUE;
5d3236ee
DK
779 *subsbfd = input->the_bfd;
780 }
5d3236ee
DK
781 }
782 }
783#endif /* ENABLE_PLUGINS */
784
252b5132
RH
785 ldlang_add_file (input);
786
1579bae1 787 if (config.map_file != NULL)
252b5132 788 {
b34976b6 789 static bfd_boolean header_printed;
252b5132
RH
790 struct bfd_link_hash_entry *h;
791 bfd *from;
792 int len;
793
e1fffbe6 794 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
795
796 if (h == NULL)
797 from = NULL;
798 else
799 {
800 switch (h->type)
801 {
802 default:
803 from = NULL;
804 break;
805
806 case bfd_link_hash_defined:
807 case bfd_link_hash_defweak:
808 from = h->u.def.section->owner;
809 break;
810
811 case bfd_link_hash_undefined:
812 case bfd_link_hash_undefweak:
813 from = h->u.undef.abfd;
814 break;
815
816 case bfd_link_hash_common:
817 from = h->u.c.p->section->owner;
818 break;
819 }
820 }
821
822 if (! header_printed)
823 {
824 char buf[100];
825
e3c8793a 826 sprintf (buf, _("Archive member included because of file (symbol)\n\n"));
252b5132 827 minfo ("%s", buf);
b34976b6 828 header_printed = TRUE;
252b5132
RH
829 }
830
831 if (bfd_my_archive (abfd) == NULL)
832 {
833 minfo ("%s", bfd_get_filename (abfd));
834 len = strlen (bfd_get_filename (abfd));
835 }
836 else
837 {
838 minfo ("%s(%s)", bfd_get_filename (bfd_my_archive (abfd)),
839 bfd_get_filename (abfd));
840 len = (strlen (bfd_get_filename (bfd_my_archive (abfd)))
841 + strlen (bfd_get_filename (abfd))
842 + 2);
843 }
844
845 if (len >= 29)
846 {
847 print_nl ();
848 len = 0;
849 }
850 while (len < 30)
851 {
852 print_space ();
853 ++len;
854 }
855
856 if (from != NULL)
857 minfo ("%B ", from);
858 if (h != NULL)
859 minfo ("(%T)\n", h->root.string);
860 else
861 minfo ("(%s)\n", name);
862 }
863
864 if (trace_files || trace_file_tries)
5d3236ee 865 info_msg ("%I\n", &orig_input);
b34976b6 866 return TRUE;
252b5132
RH
867}
868
869/* This is called when BFD has discovered a symbol which is defined
870 multiple times. */
871
b34976b6 872static bfd_boolean
24f58f47
AM
873multiple_definition (struct bfd_link_info *info,
874 struct bfd_link_hash_entry *h,
1579bae1
AM
875 bfd *nbfd,
876 asection *nsec,
877 bfd_vma nval)
252b5132 878{
24f58f47
AM
879 const char *name;
880 bfd *obfd;
881 asection *osec;
882 bfd_vma oval;
883
884 if (info->allow_multiple_definition)
885 return TRUE;
886
887 switch (h->type)
888 {
889 case bfd_link_hash_defined:
890 osec = h->u.def.section;
891 oval = h->u.def.value;
892 obfd = h->u.def.section->owner;
893 break;
894 case bfd_link_hash_indirect:
895 osec = bfd_ind_section_ptr;
896 oval = 0;
897 obfd = NULL;
898 break;
899 default:
900 abort ();
901 }
902
903 /* Ignore a redefinition of an absolute symbol to the
904 same value; it's harmless. */
905 if (h->type == bfd_link_hash_defined
906 && bfd_is_abs_section (osec)
907 && bfd_is_abs_section (nsec)
908 && nval == oval)
909 return TRUE;
910
252b5132
RH
911 /* If either section has the output_section field set to
912 bfd_abs_section_ptr, it means that the section is being
913 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
914 FIXME: It would be cleaner to somehow ignore symbols defined in
915 sections which are being discarded. */
252b5132
RH
916 if ((osec->output_section != NULL
917 && ! bfd_is_abs_section (osec)
918 && bfd_is_abs_section (osec->output_section))
919 || (nsec->output_section != NULL
920 && ! bfd_is_abs_section (nsec)
921 && bfd_is_abs_section (nsec->output_section)))
b34976b6 922 return TRUE;
252b5132 923
24f58f47
AM
924 name = h->root.string;
925 if (nbfd == NULL)
926 {
927 nbfd = obfd;
928 nsec = osec;
929 nval = oval;
930 obfd = NULL;
931 }
252b5132
RH
932 einfo (_("%X%C: multiple definition of `%T'\n"),
933 nbfd, nsec, nval, name);
1579bae1 934 if (obfd != NULL)
252b5132 935 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 936
28d5f677 937 if (RELAXATION_ENABLED)
9b14b192
NC
938 {
939 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
28d5f677 940 command_line.disable_target_specific_optimizations = -1;
9b14b192 941 }
6d5e62f8 942
b34976b6 943 return TRUE;
252b5132
RH
944}
945
946/* This is called when there is a definition of a common symbol, or
947 when a common symbol is found for a symbol that is already defined,
948 or when two common symbols are found. We only do something if
949 -warn-common was used. */
950
b34976b6 951static bfd_boolean
1579bae1 952multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 953 struct bfd_link_hash_entry *h,
1579bae1
AM
954 bfd *nbfd,
955 enum bfd_link_hash_type ntype,
956 bfd_vma nsize)
252b5132 957{
24f58f47
AM
958 const char *name;
959 bfd *obfd;
960 enum bfd_link_hash_type otype;
961 bfd_vma osize;
962
963 if (!config.warn_common)
b34976b6 964 return TRUE;
252b5132 965
24f58f47
AM
966 name = h->root.string;
967 otype = h->type;
968 if (otype == bfd_link_hash_common)
969 {
970 obfd = h->u.c.p->section->owner;
971 osize = h->u.c.size;
972 }
973 else if (otype == bfd_link_hash_defined
974 || otype == bfd_link_hash_defweak)
975 {
976 obfd = h->u.def.section->owner;
977 osize = 0;
978 }
979 else
980 {
981 /* FIXME: It would nice if we could report the BFD which defined
982 an indirect symbol, but we don't have anywhere to store the
983 information. */
984 obfd = NULL;
985 osize = 0;
986 }
987
252b5132
RH
988 if (ntype == bfd_link_hash_defined
989 || ntype == bfd_link_hash_defweak
990 || ntype == bfd_link_hash_indirect)
991 {
992 ASSERT (otype == bfd_link_hash_common);
993 einfo (_("%B: warning: definition of `%T' overriding common\n"),
994 nbfd, name);
995 if (obfd != NULL)
996 einfo (_("%B: warning: common is here\n"), obfd);
997 }
998 else if (otype == bfd_link_hash_defined
999 || otype == bfd_link_hash_defweak
1000 || otype == bfd_link_hash_indirect)
1001 {
1002 ASSERT (ntype == bfd_link_hash_common);
1003 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1004 nbfd, name);
1005 if (obfd != NULL)
1006 einfo (_("%B: warning: defined here\n"), obfd);
1007 }
1008 else
1009 {
1010 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1011 if (osize > nsize)
1012 {
1013 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1014 nbfd, name);
1015 if (obfd != NULL)
1016 einfo (_("%B: warning: larger common is here\n"), obfd);
1017 }
1018 else if (nsize > osize)
1019 {
1020 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1021 nbfd, name);
1022 if (obfd != NULL)
1023 einfo (_("%B: warning: smaller common is here\n"), obfd);
1024 }
1025 else
1026 {
1027 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1028 if (obfd != NULL)
1029 einfo (_("%B: warning: previous common is here\n"), obfd);
1030 }
1031 }
1032
b34976b6 1033 return TRUE;
252b5132
RH
1034}
1035
1036/* This is called when BFD has discovered a set element. H is the
1037 entry in the linker hash table for the set. SECTION and VALUE
1038 represent a value which should be added to the set. */
1039
b34976b6 1040static bfd_boolean
1579bae1
AM
1041add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1042 struct bfd_link_hash_entry *h,
1043 bfd_reloc_code_real_type reloc,
1044 bfd *abfd,
1045 asection *section,
1046 bfd_vma value)
252b5132
RH
1047{
1048 if (config.warn_constructors)
1049 einfo (_("%P: warning: global constructor %s used\n"),
1050 h->root.string);
1051
1052 if (! config.build_constructors)
b34976b6 1053 return TRUE;
252b5132 1054
1579bae1 1055 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1056
1057 if (h->type == bfd_link_hash_new)
1058 {
1059 h->type = bfd_link_hash_undefined;
1060 h->u.undef.abfd = abfd;
1061 /* We don't call bfd_link_add_undef to add this to the list of
1062 undefined symbols because we are going to define it
1063 ourselves. */
1064 }
1065
b34976b6 1066 return TRUE;
252b5132
RH
1067}
1068
1069/* This is called when BFD has discovered a constructor. This is only
1070 called for some object file formats--those which do not handle
1071 constructors in some more clever fashion. This is similar to
1072 adding an element to a set, but less general. */
1073
b34976b6 1074static bfd_boolean
1579bae1
AM
1075constructor_callback (struct bfd_link_info *info,
1076 bfd_boolean constructor,
1077 const char *name,
1078 bfd *abfd,
1079 asection *section,
1080 bfd_vma value)
252b5132
RH
1081{
1082 char *s;
1083 struct bfd_link_hash_entry *h;
1084 char set_name[1 + sizeof "__CTOR_LIST__"];
1085
1086 if (config.warn_constructors)
1087 einfo (_("%P: warning: global constructor %s used\n"), name);
1088
1089 if (! config.build_constructors)
b34976b6 1090 return TRUE;
252b5132
RH
1091
1092 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1093 useful error message. */
f13a99db 1094 if (bfd_reloc_type_lookup (link_info.output_bfd, BFD_RELOC_CTOR) == NULL
e1fffbe6 1095 && (info->relocatable
252b5132
RH
1096 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1097 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1098
1099 s = set_name;
1100 if (bfd_get_symbol_leading_char (abfd) != '\0')
1101 *s++ = bfd_get_symbol_leading_char (abfd);
1102 if (constructor)
1103 strcpy (s, "__CTOR_LIST__");
1104 else
1105 strcpy (s, "__DTOR_LIST__");
1106
b34976b6 1107 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1108 if (h == (struct bfd_link_hash_entry *) NULL)
1109 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1110 if (h->type == bfd_link_hash_new)
1111 {
1112 h->type = bfd_link_hash_undefined;
1113 h->u.undef.abfd = abfd;
1114 /* We don't call bfd_link_add_undef to add this to the list of
1115 undefined symbols because we are going to define it
1116 ourselves. */
1117 }
1118
1119 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
b34976b6 1120 return TRUE;
252b5132
RH
1121}
1122
1123/* A structure used by warning_callback to pass information through
1124 bfd_map_over_sections. */
1125
0125cdf2
NC
1126struct warning_callback_info
1127{
b34976b6 1128 bfd_boolean found;
252b5132
RH
1129 const char *warning;
1130 const char *symbol;
1131 asymbol **asymbols;
1132};
1133
1134/* This is called when there is a reference to a warning symbol. */
1135
b34976b6 1136static bfd_boolean
1579bae1
AM
1137warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1138 const char *warning,
1139 const char *symbol,
1140 bfd *abfd,
1141 asection *section,
1142 bfd_vma address)
252b5132
RH
1143{
1144 /* This is a hack to support warn_multiple_gp. FIXME: This should
1145 have a cleaner interface, but what? */
1146 if (! config.warn_multiple_gp
1147 && strcmp (warning, "using multiple gp values") == 0)
b34976b6 1148 return TRUE;
252b5132
RH
1149
1150 if (section != NULL)
300475fe 1151 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1152 else if (abfd == NULL)
300475fe 1153 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1154 else if (symbol == NULL)
300475fe 1155 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1156 else
1157 {
91d6fa6a 1158 struct warning_callback_info cinfo;
252b5132
RH
1159
1160 /* Look through the relocs to see if we can find a plausible
1161 address. */
5c1d2f5f
AM
1162
1163 if (!bfd_generic_link_read_symbols (abfd))
1164 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
252b5132 1165
91d6fa6a
NC
1166 cinfo.found = FALSE;
1167 cinfo.warning = warning;
1168 cinfo.symbol = symbol;
1169 cinfo.asymbols = bfd_get_outsymbols (abfd);
1170 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
252b5132 1171
91d6fa6a 1172 if (! cinfo.found)
300475fe 1173 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132
RH
1174 }
1175
b34976b6 1176 return TRUE;
252b5132
RH
1177}
1178
1179/* This is called by warning_callback for each section. It checks the
1180 relocs of the section to see if it can find a reference to the
1181 symbol which triggered the warning. If it can, it uses the reloc
1182 to give an error message with a file and line number. */
1183
1184static void
1579bae1 1185warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1186{
1e9cc1c2 1187 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1188 long relsize;
1189 arelent **relpp;
1190 long relcount;
1191 arelent **p, **pend;
1192
1193 if (info->found)
1194 return;
1195
1196 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1197 if (relsize < 0)
1198 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1199 if (relsize == 0)
1200 return;
1201
1e9cc1c2 1202 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1203 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1204 if (relcount < 0)
1205 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1206
1207 p = relpp;
1208 pend = p + relcount;
1209 for (; p < pend && *p != NULL; p++)
1210 {
1211 arelent *q = *p;
1212
1213 if (q->sym_ptr_ptr != NULL
1214 && *q->sym_ptr_ptr != NULL
1215 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1216 {
1217 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1218 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1219 info->warning);
b34976b6 1220 info->found = TRUE;
252b5132
RH
1221 break;
1222 }
1223 }
1224
1225 free (relpp);
1226}
1227
1228/* This is called when an undefined symbol is found. */
1229
b34976b6 1230static bfd_boolean
1579bae1
AM
1231undefined_symbol (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1232 const char *name,
1233 bfd *abfd,
1234 asection *section,
1235 bfd_vma address,
0b28295d 1236 bfd_boolean error)
252b5132
RH
1237{
1238 static char *error_name;
1239 static unsigned int error_count;
1240
1241#define MAX_ERRORS_IN_A_ROW 5
1242
1243 if (config.warn_once)
1244 {
1245 static struct bfd_hash_table *hash;
1246
1247 /* Only warn once about a particular undefined symbol. */
252b5132
RH
1248 if (hash == NULL)
1249 {
1e9cc1c2
NC
1250 hash = (struct bfd_hash_table *)
1251 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
1252 if (!bfd_hash_table_init (hash, bfd_hash_newfunc,
1253 sizeof (struct bfd_hash_entry)))
252b5132
RH
1254 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
1255 }
1256
b34976b6
AM
1257 if (bfd_hash_lookup (hash, name, FALSE, FALSE) != NULL)
1258 return TRUE;
252b5132 1259
b34976b6 1260 if (bfd_hash_lookup (hash, name, TRUE, TRUE) == NULL)
252b5132
RH
1261 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
1262 }
1263
1264 /* We never print more than a reasonable number of errors in a row
1265 for a single symbol. */
1579bae1 1266 if (error_name != NULL
252b5132
RH
1267 && strcmp (name, error_name) == 0)
1268 ++error_count;
1269 else
1270 {
1271 error_count = 0;
1579bae1 1272 if (error_name != NULL)
252b5132 1273 free (error_name);
d1b2b2dc 1274 error_name = xstrdup (name);
252b5132
RH
1275 }
1276
1277 if (section != NULL)
1278 {
1279 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1280 {
0b28295d
ILT
1281 if (error)
1282 einfo (_("%X%C: undefined reference to `%T'\n"),
1283 abfd, section, address, name);
1284 else
1285 einfo (_("%C: warning: undefined reference to `%T'\n"),
1286 abfd, section, address, name);
b6f29aaa 1287 }
252b5132 1288 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1289 {
1290 if (error)
1291 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1292 abfd, section, address, name);
1293 else
1294 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1295 abfd, section, address, name);
1296 }
1297 else if (error)
1298 einfo ("%X");
252b5132
RH
1299 }
1300 else
1301 {
1302 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1303 {
0b28295d
ILT
1304 if (error)
1305 einfo (_("%X%B: undefined reference to `%T'\n"),
1306 abfd, name);
1307 else
1308 einfo (_("%B: warning: undefined reference to `%T'\n"),
1309 abfd, name);
b6f29aaa 1310 }
252b5132 1311 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1312 {
1313 if (error)
1314 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1315 abfd, name);
1316 else
1317 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1318 abfd, name);
1319 }
1320 else if (error)
1321 einfo ("%X");
252b5132
RH
1322 }
1323
b34976b6 1324 return TRUE;
252b5132
RH
1325}
1326
8aae64e6
AO
1327/* Counter to limit the number of relocation overflow error messages
1328 to print. Errors are printed as it is decremented. When it's
1329 called and the counter is zero, a final message is printed
1330 indicating more relocations were omitted. When it gets to -1, no
1331 such errors are printed. If it's initially set to a value less
1332 than -1, all such errors will be printed (--verbose does this). */
1333
1334int overflow_cutoff_limit = 10;
1335
252b5132
RH
1336/* This is called when a reloc overflows. */
1337
b34976b6 1338static bfd_boolean
1579bae1 1339reloc_overflow (struct bfd_link_info *info ATTRIBUTE_UNUSED,
dfeffb9f 1340 struct bfd_link_hash_entry *entry,
1579bae1
AM
1341 const char *name,
1342 const char *reloc_name,
1343 bfd_vma addend,
1344 bfd *abfd,
1345 asection *section,
1346 bfd_vma address)
252b5132 1347{
8aae64e6
AO
1348 if (overflow_cutoff_limit == -1)
1349 return TRUE;
1350
270396f2 1351 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1352
1353 if (overflow_cutoff_limit >= 0
1354 && overflow_cutoff_limit-- == 0)
1355 {
1356 einfo (_(" additional relocation overflows omitted from the output\n"));
1357 return TRUE;
1358 }
1359
dfeffb9f
L
1360 if (entry)
1361 {
1362 while (entry->type == bfd_link_hash_indirect
1363 || entry->type == bfd_link_hash_warning)
1364 entry = entry->u.i.link;
1365 switch (entry->type)
1366 {
1367 case bfd_link_hash_undefined:
1368 case bfd_link_hash_undefweak:
1369 einfo (_(" relocation truncated to fit: %s against undefined symbol `%T'"),
1370 reloc_name, entry->root.string);
1371 break;
1372 case bfd_link_hash_defined:
1373 case bfd_link_hash_defweak:
1374 einfo (_(" relocation truncated to fit: %s against symbol `%T' defined in %A section in %B"),
1375 reloc_name, entry->root.string,
a6e1b90f
L
1376 entry->u.def.section,
1377 entry->u.def.section == bfd_abs_section_ptr
f13a99db 1378 ? link_info.output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1379 break;
1380 default:
1381 abort ();
1382 break;
1383 }
1384 }
1385 else
1386 einfo (_(" relocation truncated to fit: %s against `%T'"),
1387 reloc_name, name);
252b5132
RH
1388 if (addend != 0)
1389 einfo ("+%v", addend);
1390 einfo ("\n");
b34976b6 1391 return TRUE;
252b5132
RH
1392}
1393
1394/* This is called when a dangerous relocation is made. */
1395
b34976b6 1396static bfd_boolean
1579bae1
AM
1397reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1398 const char *message,
1399 bfd *abfd,
1400 asection *section,
1401 bfd_vma address)
252b5132 1402{
270396f2 1403 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1404 abfd, section, address, message);
b34976b6 1405 return TRUE;
252b5132
RH
1406}
1407
1408/* This is called when a reloc is being generated attached to a symbol
1409 that is not being output. */
1410
b34976b6 1411static bfd_boolean
1579bae1
AM
1412unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1413 const char *name,
1414 bfd *abfd,
1415 asection *section,
1416 bfd_vma address)
252b5132 1417{
270396f2 1418 einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
e1fffbe6 1419 abfd, section, address, name);
b34976b6 1420 return TRUE;
252b5132
RH
1421}
1422
1423/* This is called if link_info.notice_all is set, or when a symbol in
1424 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1425 using the -y option, while notice_all is set if the --cref option
1426 has been supplied, or if there are any NOCROSSREFS sections in the
1427 linker script; and if plugins are active, since they need to monitor
1428 all references from non-IR files. */
252b5132 1429
b34976b6 1430static bfd_boolean
1579bae1 1431notice (struct bfd_link_info *info,
35ed3f94 1432 struct bfd_link_hash_entry *h,
1579bae1
AM
1433 bfd *abfd,
1434 asection *section,
16d96b5b
AM
1435 bfd_vma value,
1436 flagword flags ATTRIBUTE_UNUSED,
1437 const char *string ATTRIBUTE_UNUSED)
252b5132 1438{
35ed3f94
AM
1439 const char *name;
1440
1441 if (h == NULL)
5061a885
AM
1442 {
1443 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1444 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1445 return TRUE;
1446 }
1447
35ed3f94 1448 name = h->root.string;
5d3236ee 1449 if (info->notice_hash != NULL
9e2278f5 1450 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1451 {
1452 if (bfd_is_und_section (section))
1453 einfo ("%B: reference to %s\n", abfd, name);
1454 else
1455 einfo ("%B: definition of %s\n", abfd, name);
1456 }
1457
1458 if (command_line.cref || nocrossref_list != NULL)
1459 add_cref (name, abfd, section, value);
1460
b34976b6 1461 return TRUE;
252b5132 1462}