PR10372, SH: ld test with sim/sh/run fails always
[binutils-gdb.git] / ld / ldmain.c
1 /* Main program of GNU linker.
2 Copyright (C) 1991-2022 Free Software Foundation, Inc.
3 Written by Steve Chamberlain steve@cygnus.com
4
5 This file is part of the GNU Binutils.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "safe-ctype.h"
25 #include "libiberty.h"
26 #include "progress.h"
27 #include "bfdlink.h"
28 #include "ctf-api.h"
29 #include "filenames.h"
30 #include "elf/common.h"
31
32 #include "ld.h"
33 #include "ldmain.h"
34 #include "ldmisc.h"
35 #include "ldwrite.h"
36 #include "ldexp.h"
37 #include "ldlang.h"
38 #include <ldgram.h>
39 #include "ldlex.h"
40 #include "ldfile.h"
41 #include "ldemul.h"
42 #include "ldctor.h"
43 #if BFD_SUPPORTS_PLUGINS
44 #include "plugin.h"
45 #include "plugin-api.h"
46 #endif /* BFD_SUPPORTS_PLUGINS */
47
48 /* Somewhere above, sys/stat.h got included. */
49 #if !defined(S_ISDIR) && defined(S_IFDIR)
50 #define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
51 #endif
52
53 #include <string.h>
54
55 #ifndef TARGET_SYSTEM_ROOT
56 #define TARGET_SYSTEM_ROOT ""
57 #endif
58
59 /* EXPORTS */
60
61 FILE *saved_script_handle = NULL;
62 FILE *previous_script_handle = NULL;
63 bool force_make_executable = false;
64
65 char *default_target;
66 const char *output_filename = "a.out";
67
68 /* Name this program was invoked by. */
69 char *program_name;
70
71 /* The prefix for system library directories. */
72 const char *ld_sysroot;
73
74 /* The canonical representation of ld_sysroot. */
75 char *ld_canon_sysroot;
76 int ld_canon_sysroot_len;
77
78 /* Set by -G argument, for targets like MIPS ELF. */
79 int g_switch_value = 8;
80
81 /* Nonzero means print names of input files as processed. */
82 unsigned int trace_files;
83
84 /* Nonzero means report actions taken by the linker, and describe the linker script in use. */
85 bool verbose;
86
87 /* Nonzero means version number was printed, so exit successfully
88 instead of complaining if no input files are given. */
89 bool version_printed;
90
91 /* TRUE if we should demangle symbol names. */
92 bool demangling;
93
94 args_type command_line;
95
96 ld_config_type config;
97
98 sort_type sort_section;
99
100 static const char *get_sysroot
101 (int, char **);
102 static char *get_emulation
103 (int, char **);
104 static bool add_archive_element
105 (struct bfd_link_info *, bfd *, const char *, bfd **);
106 static void multiple_definition
107 (struct bfd_link_info *, struct bfd_link_hash_entry *,
108 bfd *, asection *, bfd_vma);
109 static void multiple_common
110 (struct bfd_link_info *, struct bfd_link_hash_entry *,
111 bfd *, enum bfd_link_hash_type, bfd_vma);
112 static void add_to_set
113 (struct bfd_link_info *, struct bfd_link_hash_entry *,
114 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
115 static void constructor_callback
116 (struct bfd_link_info *, bool, const char *, bfd *,
117 asection *, bfd_vma);
118 static void warning_callback
119 (struct bfd_link_info *, const char *, const char *, bfd *,
120 asection *, bfd_vma);
121 static void warning_find_reloc
122 (bfd *, asection *, void *);
123 static void undefined_symbol
124 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
125 bool);
126 static void reloc_overflow
127 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
128 const char *, bfd_vma, bfd *, asection *, bfd_vma);
129 static void reloc_dangerous
130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
131 static void unattached_reloc
132 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
133 static bool notice
134 (struct bfd_link_info *, struct bfd_link_hash_entry *,
135 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
136
137 static struct bfd_link_callbacks link_callbacks =
138 {
139 add_archive_element,
140 multiple_definition,
141 multiple_common,
142 add_to_set,
143 constructor_callback,
144 warning_callback,
145 undefined_symbol,
146 reloc_overflow,
147 reloc_dangerous,
148 unattached_reloc,
149 notice,
150 einfo,
151 info_msg,
152 minfo,
153 ldlang_override_segment_assignment,
154 ldlang_ctf_acquire_strings,
155 NULL,
156 ldlang_ctf_new_dynsym,
157 ldlang_write_ctf_late
158 };
159
160 static bfd_assert_handler_type default_bfd_assert_handler;
161 static bfd_error_handler_type default_bfd_error_handler;
162
163 struct bfd_link_info link_info;
164 \f
165 struct dependency_file
166 {
167 struct dependency_file *next;
168 char *name;
169 };
170
171 static struct dependency_file *dependency_files, *dependency_files_tail;
172
173 void
174 track_dependency_files (const char *filename)
175 {
176 struct dependency_file *dep
177 = (struct dependency_file *) xmalloc (sizeof (*dep));
178 dep->name = xstrdup (filename);
179 dep->next = NULL;
180 if (dependency_files == NULL)
181 dependency_files = dep;
182 else
183 dependency_files_tail->next = dep;
184 dependency_files_tail = dep;
185 }
186
187 static void
188 write_dependency_file (void)
189 {
190 FILE *out;
191 struct dependency_file *dep;
192
193 out = fopen (config.dependency_file, FOPEN_WT);
194 if (out == NULL)
195 {
196 einfo (_("%F%P: cannot open dependency file %s: %E\n"),
197 config.dependency_file);
198 }
199
200 fprintf (out, "%s:", output_filename);
201
202 for (dep = dependency_files; dep != NULL; dep = dep->next)
203 fprintf (out, " \\\n %s", dep->name);
204
205 fprintf (out, "\n");
206 for (dep = dependency_files; dep != NULL; dep = dep->next)
207 fprintf (out, "\n%s:\n", dep->name);
208
209 fclose (out);
210 }
211 \f
212 static void
213 ld_cleanup (void)
214 {
215 bfd_cache_close_all ();
216 #if BFD_SUPPORTS_PLUGINS
217 plugin_call_cleanup ();
218 #endif
219 if (output_filename && delete_output_file_on_failure)
220 unlink_if_ordinary (output_filename);
221 }
222
223 /* Hook to notice BFD assertions. */
224
225 static void
226 ld_bfd_assert_handler (const char *fmt, const char *bfdver,
227 const char *file, int line)
228 {
229 config.make_executable = false;
230 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
231 }
232
233 /* Hook the bfd error/warning handler for --fatal-warnings. */
234
235 static void
236 ld_bfd_error_handler (const char *fmt, va_list ap)
237 {
238 if (config.fatal_warnings)
239 config.make_executable = false;
240 (*default_bfd_error_handler) (fmt, ap);
241 }
242
243 int
244 main (int argc, char **argv)
245 {
246 char *emulation;
247 long start_time = get_run_time ();
248
249 #ifdef HAVE_LC_MESSAGES
250 setlocale (LC_MESSAGES, "");
251 #endif
252 setlocale (LC_CTYPE, "");
253 bindtextdomain (PACKAGE, LOCALEDIR);
254 textdomain (PACKAGE);
255
256 program_name = argv[0];
257 xmalloc_set_program_name (program_name);
258
259 START_PROGRESS (program_name, 0);
260
261 expandargv (&argc, &argv);
262
263 if (bfd_init () != BFD_INIT_MAGIC)
264 einfo (_("%F%P: fatal error: libbfd ABI mismatch\n"));
265
266 bfd_set_error_program_name (program_name);
267
268 /* We want to notice and fail on those nasty BFD assertions which are
269 likely to signal incorrect output being generated but otherwise may
270 leave no trace. */
271 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
272
273 /* Also hook the bfd error/warning handler for --fatal-warnings. */
274 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
275
276 xatexit (ld_cleanup);
277
278 /* Set up the sysroot directory. */
279 ld_sysroot = get_sysroot (argc, argv);
280 if (*ld_sysroot)
281 ld_canon_sysroot = lrealpath (ld_sysroot);
282 if (ld_canon_sysroot)
283 {
284 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
285
286 /* is_sysrooted_pathname() relies on no trailing dirsep. */
287 if (ld_canon_sysroot_len > 0
288 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
289 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
290 }
291 else
292 ld_canon_sysroot_len = -1;
293
294 /* Set the default BFD target based on the configured target. Doing
295 this permits the linker to be configured for a particular target,
296 and linked against a shared BFD library which was configured for
297 a different target. The macro TARGET is defined by Makefile. */
298 if (!bfd_set_default_target (TARGET))
299 {
300 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
301 xexit (1);
302 }
303
304 #if YYDEBUG
305 {
306 extern int yydebug;
307 yydebug = 1;
308 }
309 #endif
310
311 config.build_constructors = true;
312 config.rpath_separator = ':';
313 config.split_by_reloc = (unsigned) -1;
314 config.split_by_file = (bfd_size_type) -1;
315 config.make_executable = true;
316 config.magic_demand_paged = true;
317 config.text_read_only = true;
318 config.print_map_discarded = true;
319 link_info.disable_target_specific_optimizations = -1;
320
321 command_line.warn_mismatch = true;
322 command_line.warn_search_mismatch = true;
323 command_line.check_section_addresses = -1;
324
325 /* We initialize DEMANGLING based on the environment variable
326 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
327 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
328 environment. Acting the same way here lets us provide the same
329 interface by default. */
330 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
331
332 link_info.allow_undefined_version = true;
333 link_info.keep_memory = true;
334 link_info.max_cache_size = (bfd_size_type) -1;
335 link_info.combreloc = true;
336 link_info.strip_discarded = true;
337 link_info.prohibit_multiple_definition_absolute = false;
338 link_info.textrel_check = DEFAULT_LD_TEXTREL_CHECK;
339 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
340 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
341 link_info.callbacks = &link_callbacks;
342 link_info.input_bfds_tail = &link_info.input_bfds;
343 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
344 and _fini symbols. We are compatible. */
345 link_info.init_function = "_init";
346 link_info.fini_function = "_fini";
347 link_info.relax_pass = 1;
348 link_info.extern_protected_data = -1;
349 link_info.dynamic_undefined_weak = -1;
350 link_info.indirect_extern_access = -1;
351 link_info.pei386_auto_import = -1;
352 link_info.spare_dynamic_tags = 5;
353 link_info.path_separator = ':';
354 #ifdef DEFAULT_FLAG_COMPRESS_DEBUG
355 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
356 #endif
357 #ifdef DEFAULT_NEW_DTAGS
358 link_info.new_dtags = DEFAULT_NEW_DTAGS;
359 #endif
360 link_info.start_stop_gc = false;
361 link_info.start_stop_visibility = STV_PROTECTED;
362
363 ldfile_add_arch ("");
364 emulation = get_emulation (argc, argv);
365 ldemul_choose_mode (emulation);
366 default_target = ldemul_choose_target (argc, argv);
367 lang_init ();
368 ldexp_init ();
369 ldemul_before_parse ();
370 lang_has_input_file = false;
371 parse_args (argc, argv);
372
373 if (config.hash_table_size != 0)
374 bfd_hash_set_default_size (config.hash_table_size);
375
376 #if BFD_SUPPORTS_PLUGINS
377 /* Now all the plugin arguments have been gathered, we can load them. */
378 plugin_load_plugins ();
379 #endif /* BFD_SUPPORTS_PLUGINS */
380
381 ldemul_set_symbols ();
382
383 /* If we have not already opened and parsed a linker script,
384 try the default script from command line first. */
385 if (saved_script_handle == NULL
386 && command_line.default_script != NULL)
387 {
388 ldfile_open_script_file (command_line.default_script);
389 parser_input = input_script;
390 yyparse ();
391 }
392
393 /* If we have not already opened and parsed a linker script
394 read the emulation's appropriate default script. */
395 if (saved_script_handle == NULL)
396 {
397 int isfile;
398 char *s = ldemul_get_script (&isfile);
399
400 if (isfile)
401 ldfile_open_default_command_file (s);
402 else
403 {
404 lex_string = s;
405 lex_redirect (s, _("built in linker script"), 1);
406 }
407 parser_input = input_script;
408 yyparse ();
409 lex_string = NULL;
410 }
411
412 if (verbose)
413 {
414 if (saved_script_handle)
415 info_msg (_("using external linker script:"));
416 else
417 info_msg (_("using internal linker script:"));
418 info_msg ("\n==================================================\n");
419
420 if (saved_script_handle)
421 {
422 static const int ld_bufsz = 8193;
423 size_t n;
424 char *buf = (char *) xmalloc (ld_bufsz);
425
426 rewind (saved_script_handle);
427 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
428 {
429 buf[n] = 0;
430 info_msg ("%s", buf);
431 }
432 rewind (saved_script_handle);
433 free (buf);
434 }
435 else
436 {
437 int isfile;
438
439 info_msg (ldemul_get_script (&isfile));
440 }
441
442 info_msg ("\n==================================================\n");
443 }
444
445 if (command_line.force_group_allocation
446 || !bfd_link_relocatable (&link_info))
447 link_info.resolve_section_groups = true;
448 else
449 link_info.resolve_section_groups = false;
450
451 if (command_line.print_output_format)
452 info_msg ("%s\n", lang_get_output_target ());
453
454 lang_final ();
455
456 /* If the only command line argument has been -v or --version or --verbose
457 then ignore any input files provided by linker scripts and exit now.
458 We do not want to create an output file when the linker is just invoked
459 to provide version information. */
460 if (argc == 2 && version_printed)
461 xexit (0);
462
463 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
464 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
465
466 if (!lang_has_input_file)
467 {
468 if (version_printed || command_line.print_output_format)
469 xexit (0);
470 einfo (_("%F%P: no input files\n"));
471 }
472
473 if (verbose)
474 info_msg (_("%P: mode %s\n"), emulation);
475
476 ldemul_after_parse ();
477
478 if (config.map_filename)
479 {
480 if (strcmp (config.map_filename, "-") == 0)
481 {
482 config.map_file = stdout;
483 }
484 else
485 {
486 config.map_file = fopen (config.map_filename, FOPEN_WT);
487 if (config.map_file == (FILE *) NULL)
488 {
489 bfd_set_error (bfd_error_system_call);
490 einfo (_("%F%P: cannot open map file %s: %E\n"),
491 config.map_filename);
492 }
493 }
494 link_info.has_map_file = true;
495 }
496
497 lang_process ();
498
499 /* Print error messages for any missing symbols, for any warning
500 symbols, and possibly multiple definitions. */
501 if (bfd_link_relocatable (&link_info))
502 link_info.output_bfd->flags &= ~EXEC_P;
503 else
504 link_info.output_bfd->flags |= EXEC_P;
505
506 if ((link_info.compress_debug & COMPRESS_DEBUG))
507 {
508 link_info.output_bfd->flags |= BFD_COMPRESS;
509 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
510 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
511 }
512
513 ldwrite ();
514
515 if (config.map_file != NULL)
516 lang_map ();
517 if (command_line.cref)
518 output_cref (config.map_file != NULL ? config.map_file : stdout);
519 if (nocrossref_list != NULL)
520 check_nocrossrefs ();
521 if (command_line.print_memory_usage)
522 lang_print_memory_usage ();
523 #if 0
524 {
525 struct bfd_link_hash_entry *h;
526
527 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
528 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
529 }
530 #endif
531 ldexp_finish ();
532 lang_finish ();
533
534 if (config.dependency_file != NULL)
535 write_dependency_file ();
536
537 /* Even if we're producing relocatable output, some non-fatal errors should
538 be reported in the exit status. (What non-fatal errors, if any, do we
539 want to ignore for relocatable output?) */
540 if (!config.make_executable && !force_make_executable)
541 {
542 if (verbose)
543 einfo (_("%P: link errors found, deleting executable `%s'\n"),
544 output_filename);
545
546 /* The file will be removed by ld_cleanup. */
547 xexit (1);
548 }
549 else
550 {
551 if (!bfd_close (link_info.output_bfd))
552 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
553
554 /* If the --force-exe-suffix is enabled, and we're making an
555 executable file and it doesn't end in .exe, copy it to one
556 which does. */
557 if (!bfd_link_relocatable (&link_info)
558 && command_line.force_exe_suffix)
559 {
560 int len = strlen (output_filename);
561
562 if (len < 4
563 || (strcasecmp (output_filename + len - 4, ".exe") != 0
564 && strcasecmp (output_filename + len - 4, ".dll") != 0))
565 {
566 FILE *src;
567 FILE *dst;
568 const int bsize = 4096;
569 char *buf = (char *) xmalloc (bsize);
570 int l;
571 char *dst_name = (char *) xmalloc (len + 5);
572
573 strcpy (dst_name, output_filename);
574 strcat (dst_name, ".exe");
575 src = fopen (output_filename, FOPEN_RB);
576 dst = fopen (dst_name, FOPEN_WB);
577
578 if (!src)
579 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
580 output_filename);
581 if (!dst)
582 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
583 dst_name);
584 while ((l = fread (buf, 1, bsize, src)) > 0)
585 {
586 int done = fwrite (buf, 1, l, dst);
587
588 if (done != l)
589 einfo (_("%P: error writing file `%s'\n"), dst_name);
590 }
591
592 fclose (src);
593 if (fclose (dst) == EOF)
594 einfo (_("%P: error closing file `%s'\n"), dst_name);
595 free (dst_name);
596 free (buf);
597 }
598 }
599 }
600
601 END_PROGRESS (program_name);
602
603 if (config.stats)
604 {
605 long run_time = get_run_time () - start_time;
606
607 fflush (stdout);
608 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
609 program_name, run_time / 1000000, run_time % 1000000);
610 fflush (stderr);
611 }
612
613 /* Prevent ld_cleanup from doing anything, after a successful link. */
614 output_filename = NULL;
615
616 xexit (0);
617 return 0;
618 }
619
620 /* If the configured sysroot is relocatable, try relocating it based on
621 default prefix FROM. Return the relocated directory if it exists,
622 otherwise return null. */
623
624 static char *
625 get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
626 {
627 #ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
628 char *path;
629 struct stat s;
630
631 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
632 if (path)
633 {
634 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
635 return path;
636 free (path);
637 }
638 #endif
639 return 0;
640 }
641
642 /* Return the sysroot directory. Return "" if no sysroot is being used. */
643
644 static const char *
645 get_sysroot (int argc, char **argv)
646 {
647 int i;
648 const char *path = NULL;
649
650 for (i = 1; i < argc; i++)
651 if (startswith (argv[i], "--sysroot="))
652 path = argv[i] + strlen ("--sysroot=");
653
654 if (!path)
655 path = get_relative_sysroot (BINDIR);
656
657 if (!path)
658 path = get_relative_sysroot (TOOLBINDIR);
659
660 if (!path)
661 path = TARGET_SYSTEM_ROOT;
662
663 if (IS_DIR_SEPARATOR (*path) && path[1] == 0)
664 path = "";
665
666 return path;
667 }
668
669 /* We need to find any explicitly given emulation in order to initialize the
670 state that's needed by the lex&yacc argument parser (parse_args). */
671
672 static char *
673 get_emulation (int argc, char **argv)
674 {
675 char *emulation;
676 int i;
677
678 emulation = getenv (EMULATION_ENVIRON);
679 if (emulation == NULL)
680 emulation = DEFAULT_EMULATION;
681
682 for (i = 1; i < argc; i++)
683 {
684 if (startswith (argv[i], "-m"))
685 {
686 if (argv[i][2] == '\0')
687 {
688 /* -m EMUL */
689 if (i < argc - 1)
690 {
691 emulation = argv[i + 1];
692 i++;
693 }
694 else
695 einfo (_("%F%P: missing argument to -m\n"));
696 }
697 else if (strcmp (argv[i], "-mips1") == 0
698 || strcmp (argv[i], "-mips2") == 0
699 || strcmp (argv[i], "-mips3") == 0
700 || strcmp (argv[i], "-mips4") == 0
701 || strcmp (argv[i], "-mips5") == 0
702 || strcmp (argv[i], "-mips32") == 0
703 || strcmp (argv[i], "-mips32r2") == 0
704 || strcmp (argv[i], "-mips32r3") == 0
705 || strcmp (argv[i], "-mips32r5") == 0
706 || strcmp (argv[i], "-mips32r6") == 0
707 || strcmp (argv[i], "-mips64") == 0
708 || strcmp (argv[i], "-mips64r2") == 0
709 || strcmp (argv[i], "-mips64r3") == 0
710 || strcmp (argv[i], "-mips64r5") == 0
711 || strcmp (argv[i], "-mips64r6") == 0)
712 {
713 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
714 passed to the linker by some MIPS compilers. They
715 generally tell the linker to use a slightly different
716 library path. Perhaps someday these should be
717 implemented as emulations; until then, we just ignore
718 the arguments and hope that nobody ever creates
719 emulations named ips1, ips2 or ips3. */
720 }
721 else if (strcmp (argv[i], "-m486") == 0)
722 {
723 /* FIXME: The argument -m486 is passed to the linker on
724 some Linux systems. Hope that nobody creates an
725 emulation named 486. */
726 }
727 else
728 {
729 /* -mEMUL */
730 emulation = &argv[i][2];
731 }
732 }
733 }
734
735 return emulation;
736 }
737
738 void
739 add_ysym (const char *name)
740 {
741 if (link_info.notice_hash == NULL)
742 {
743 link_info.notice_hash
744 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
745 if (!bfd_hash_table_init_n (link_info.notice_hash,
746 bfd_hash_newfunc,
747 sizeof (struct bfd_hash_entry),
748 61))
749 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
750 }
751
752 if (bfd_hash_lookup (link_info.notice_hash, name, true, true) == NULL)
753 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
754 }
755
756 void
757 add_ignoresym (struct bfd_link_info *info, const char *name)
758 {
759 if (info->ignore_hash == NULL)
760 {
761 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
762 if (!bfd_hash_table_init_n (info->ignore_hash,
763 bfd_hash_newfunc,
764 sizeof (struct bfd_hash_entry),
765 61))
766 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
767 }
768
769 if (bfd_hash_lookup (info->ignore_hash, name, true, true) == NULL)
770 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
771 }
772
773 /* Record a symbol to be wrapped, from the --wrap option. */
774
775 void
776 add_wrap (const char *name)
777 {
778 if (link_info.wrap_hash == NULL)
779 {
780 link_info.wrap_hash
781 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
782 if (!bfd_hash_table_init_n (link_info.wrap_hash,
783 bfd_hash_newfunc,
784 sizeof (struct bfd_hash_entry),
785 61))
786 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
787 }
788
789 if (bfd_hash_lookup (link_info.wrap_hash, name, true, true) == NULL)
790 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
791 }
792
793 /* Handle the -retain-symbols-file option. */
794
795 void
796 add_keepsyms_file (const char *filename)
797 {
798 FILE *file;
799 char *buf;
800 size_t bufsize;
801 int c;
802
803 if (link_info.strip == strip_some)
804 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
805
806 file = fopen (filename, "r");
807 if (file == NULL)
808 {
809 bfd_set_error (bfd_error_system_call);
810 einfo ("%X%P: %s: %E\n", filename);
811 return;
812 }
813
814 link_info.keep_hash = (struct bfd_hash_table *)
815 xmalloc (sizeof (struct bfd_hash_table));
816 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
817 sizeof (struct bfd_hash_entry)))
818 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
819
820 bufsize = 100;
821 buf = (char *) xmalloc (bufsize);
822
823 c = getc (file);
824 while (c != EOF)
825 {
826 while (ISSPACE (c))
827 c = getc (file);
828
829 if (c != EOF)
830 {
831 size_t len = 0;
832
833 while (!ISSPACE (c) && c != EOF)
834 {
835 buf[len] = c;
836 ++len;
837 if (len >= bufsize)
838 {
839 bufsize *= 2;
840 buf = (char *) xrealloc (buf, bufsize);
841 }
842 c = getc (file);
843 }
844
845 buf[len] = '\0';
846
847 if (bfd_hash_lookup (link_info.keep_hash, buf, true, true) == NULL)
848 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
849 }
850 }
851
852 if (link_info.strip != strip_none)
853 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
854
855 free (buf);
856 link_info.strip = strip_some;
857 fclose (file);
858 }
859 \f
860 /* Callbacks from the BFD linker routines. */
861
862 /* This is called when BFD has decided to include an archive member in
863 a link. */
864
865 static bool
866 add_archive_element (struct bfd_link_info *info,
867 bfd *abfd,
868 const char *name,
869 bfd **subsbfd ATTRIBUTE_UNUSED)
870 {
871 lang_input_statement_type *input;
872 lang_input_statement_type *parent;
873 lang_input_statement_type orig_input;
874
875 input = (lang_input_statement_type *)
876 xcalloc (1, sizeof (lang_input_statement_type));
877 input->header.type = lang_input_statement_enum;
878 input->filename = bfd_get_filename (abfd);
879 input->local_sym_name = bfd_get_filename (abfd);
880 input->the_bfd = abfd;
881
882 /* Save the original data for trace files/tries below, as plugins
883 (if enabled) may possibly alter it to point to a replacement
884 BFD, but we still want to output the original BFD filename. */
885 orig_input = *input;
886 #if BFD_SUPPORTS_PLUGINS
887 if (link_info.lto_plugin_active)
888 {
889 /* We must offer this archive member to the plugins to claim. */
890 plugin_maybe_claim (input);
891 if (input->flags.claimed)
892 {
893 if (no_more_claiming)
894 {
895 /* Don't claim new IR symbols after all IR symbols have
896 been claimed. */
897 if (verbose)
898 info_msg ("%pI: no new IR symbols to claim\n",
899 &orig_input);
900 input->flags.claimed = 0;
901 return false;
902 }
903 input->flags.claim_archive = true;
904 *subsbfd = input->the_bfd;
905 }
906 }
907 #endif /* BFD_SUPPORTS_PLUGINS */
908
909 if (link_info.input_bfds_tail == &input->the_bfd->link.next
910 || input->the_bfd->link.next != NULL)
911 {
912 /* We have already loaded this element, and are attempting to
913 load it again. This can happen when the archive map doesn't
914 match actual symbols defined by the element. */
915 free (input);
916 bfd_set_error (bfd_error_malformed_archive);
917 return false;
918 }
919
920 /* Set the file_chain pointer of archives to the last element loaded
921 from the archive. See ldlang.c:find_rescan_insertion. */
922 parent = bfd_usrdata (abfd->my_archive);
923 if (parent != NULL && !parent->flags.reload)
924 parent->next = input;
925
926 ldlang_add_file (input);
927
928 if (config.map_file != NULL)
929 {
930 static bool header_printed;
931 struct bfd_link_hash_entry *h;
932 bfd *from;
933 int len;
934
935 h = bfd_link_hash_lookup (info->hash, name, false, false, true);
936 if (h == NULL
937 && info->pei386_auto_import
938 && startswith (name, "__imp_"))
939 h = bfd_link_hash_lookup (info->hash, name + 6, false, false, true);
940
941 if (h == NULL)
942 from = NULL;
943 else
944 {
945 switch (h->type)
946 {
947 default:
948 from = NULL;
949 break;
950
951 case bfd_link_hash_defined:
952 case bfd_link_hash_defweak:
953 from = h->u.def.section->owner;
954 break;
955
956 case bfd_link_hash_undefined:
957 case bfd_link_hash_undefweak:
958 from = h->u.undef.abfd;
959 break;
960
961 case bfd_link_hash_common:
962 from = h->u.c.p->section->owner;
963 break;
964 }
965 }
966
967 if (!header_printed)
968 {
969 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
970 header_printed = true;
971 }
972
973 if (abfd->my_archive == NULL
974 || bfd_is_thin_archive (abfd->my_archive))
975 {
976 minfo ("%s", bfd_get_filename (abfd));
977 len = strlen (bfd_get_filename (abfd));
978 }
979 else
980 {
981 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
982 bfd_get_filename (abfd));
983 len = (strlen (bfd_get_filename (abfd->my_archive))
984 + strlen (bfd_get_filename (abfd))
985 + 2);
986 }
987
988 if (len >= 29)
989 {
990 print_nl ();
991 len = 0;
992 }
993 print_spaces (30 - len);
994
995 if (from != NULL)
996 minfo ("%pB ", from);
997 if (h != NULL)
998 minfo ("(%pT)\n", h->root.string);
999 else
1000 minfo ("(%s)\n", name);
1001 }
1002
1003 if (verbose
1004 || trace_files > 1
1005 || (trace_files && bfd_is_thin_archive (orig_input.the_bfd->my_archive)))
1006 info_msg ("%pI\n", &orig_input);
1007 return true;
1008 }
1009
1010 /* This is called when BFD has discovered a symbol which is defined
1011 multiple times. */
1012
1013 static void
1014 multiple_definition (struct bfd_link_info *info,
1015 struct bfd_link_hash_entry *h,
1016 bfd *nbfd,
1017 asection *nsec,
1018 bfd_vma nval)
1019 {
1020 const char *name;
1021 bfd *obfd;
1022 asection *osec;
1023 bfd_vma oval;
1024
1025 if (info->allow_multiple_definition)
1026 return;
1027
1028 switch (h->type)
1029 {
1030 case bfd_link_hash_defined:
1031 osec = h->u.def.section;
1032 oval = h->u.def.value;
1033 obfd = h->u.def.section->owner;
1034 break;
1035 case bfd_link_hash_indirect:
1036 osec = bfd_ind_section_ptr;
1037 oval = 0;
1038 obfd = NULL;
1039 break;
1040 default:
1041 abort ();
1042 }
1043
1044 /* Ignore a redefinition of an absolute symbol to the
1045 same value; it's harmless. */
1046 if (h->type == bfd_link_hash_defined
1047 && bfd_is_abs_section (osec)
1048 && bfd_is_abs_section (nsec)
1049 && nval == oval)
1050 return;
1051
1052 /* If either section has the output_section field set to
1053 bfd_abs_section_ptr, it means that the section is being
1054 discarded, and this is not really a multiple definition at all.
1055 FIXME: It would be cleaner to somehow ignore symbols defined in
1056 sections which are being discarded. */
1057 if (!info->prohibit_multiple_definition_absolute
1058 && ((osec->output_section != NULL
1059 && ! bfd_is_abs_section (osec)
1060 && bfd_is_abs_section (osec->output_section))
1061 || (nsec->output_section != NULL
1062 && !bfd_is_abs_section (nsec)
1063 && bfd_is_abs_section (nsec->output_section))))
1064 return;
1065
1066 name = h->root.string;
1067 if (nbfd == NULL)
1068 {
1069 nbfd = obfd;
1070 nsec = osec;
1071 nval = oval;
1072 obfd = NULL;
1073 }
1074 if (info->warn_multiple_definition)
1075 einfo (_("%P: %C: warning: multiple definition of `%pT'"),
1076 nbfd, nsec, nval, name);
1077 else
1078 einfo (_("%X%P: %C: multiple definition of `%pT'"),
1079 nbfd, nsec, nval, name);
1080 if (obfd != NULL)
1081 einfo (_("; %D: first defined here"), obfd, osec, oval);
1082 einfo ("\n");
1083
1084 if (RELAXATION_ENABLED_BY_USER)
1085 {
1086 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
1087 DISABLE_RELAXATION;
1088 }
1089 }
1090
1091 /* This is called when there is a definition of a common symbol, or
1092 when a common symbol is found for a symbol that is already defined,
1093 or when two common symbols are found. We only do something if
1094 -warn-common was used. */
1095
1096 static void
1097 multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1098 struct bfd_link_hash_entry *h,
1099 bfd *nbfd,
1100 enum bfd_link_hash_type ntype,
1101 bfd_vma nsize)
1102 {
1103 const char *name;
1104 bfd *obfd;
1105 enum bfd_link_hash_type otype;
1106 bfd_vma osize;
1107
1108 if (!config.warn_common)
1109 return;
1110
1111 name = h->root.string;
1112 otype = h->type;
1113 if (otype == bfd_link_hash_common)
1114 {
1115 obfd = h->u.c.p->section->owner;
1116 osize = h->u.c.size;
1117 }
1118 else if (otype == bfd_link_hash_defined
1119 || otype == bfd_link_hash_defweak)
1120 {
1121 obfd = h->u.def.section->owner;
1122 osize = 0;
1123 }
1124 else
1125 {
1126 /* FIXME: It would nice if we could report the BFD which defined
1127 an indirect symbol, but we don't have anywhere to store the
1128 information. */
1129 obfd = NULL;
1130 osize = 0;
1131 }
1132
1133 if (ntype == bfd_link_hash_defined
1134 || ntype == bfd_link_hash_defweak
1135 || ntype == bfd_link_hash_indirect)
1136 {
1137 ASSERT (otype == bfd_link_hash_common);
1138 if (obfd != NULL)
1139 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1140 " from %pB\n"),
1141 nbfd, name, obfd);
1142 else
1143 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1144 nbfd, name);
1145 }
1146 else if (otype == bfd_link_hash_defined
1147 || otype == bfd_link_hash_defweak
1148 || otype == bfd_link_hash_indirect)
1149 {
1150 ASSERT (ntype == bfd_link_hash_common);
1151 if (obfd != NULL)
1152 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1153 " from %pB\n"),
1154 nbfd, name, obfd);
1155 else
1156 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1157 nbfd, name);
1158 }
1159 else
1160 {
1161 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1162 if (osize > nsize)
1163 {
1164 if (obfd != NULL)
1165 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1166 " by larger common from %pB\n"),
1167 nbfd, name, obfd);
1168 else
1169 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1170 " by larger common\n"),
1171 nbfd, name);
1172 }
1173 else if (nsize > osize)
1174 {
1175 if (obfd != NULL)
1176 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1177 " smaller common from %pB\n"),
1178 nbfd, name, obfd);
1179 else
1180 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1181 " smaller common\n"),
1182 nbfd, name);
1183 }
1184 else
1185 {
1186 if (obfd != NULL)
1187 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1188 nbfd, obfd, name);
1189 else
1190 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1191 nbfd, name);
1192 }
1193 }
1194 }
1195
1196 /* This is called when BFD has discovered a set element. H is the
1197 entry in the linker hash table for the set. SECTION and VALUE
1198 represent a value which should be added to the set. */
1199
1200 static void
1201 add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1202 struct bfd_link_hash_entry *h,
1203 bfd_reloc_code_real_type reloc,
1204 bfd *abfd,
1205 asection *section,
1206 bfd_vma value)
1207 {
1208 if (config.warn_constructors)
1209 einfo (_("%P: warning: global constructor %s used\n"),
1210 h->root.string);
1211
1212 if (!config.build_constructors)
1213 return;
1214
1215 ldctor_add_set_entry (h, reloc, NULL, section, value);
1216
1217 if (h->type == bfd_link_hash_new)
1218 {
1219 h->type = bfd_link_hash_undefined;
1220 h->u.undef.abfd = abfd;
1221 /* We don't call bfd_link_add_undef to add this to the list of
1222 undefined symbols because we are going to define it
1223 ourselves. */
1224 }
1225 }
1226
1227 /* This is called when BFD has discovered a constructor. This is only
1228 called for some object file formats--those which do not handle
1229 constructors in some more clever fashion. This is similar to
1230 adding an element to a set, but less general. */
1231
1232 static void
1233 constructor_callback (struct bfd_link_info *info,
1234 bool constructor,
1235 const char *name,
1236 bfd *abfd,
1237 asection *section,
1238 bfd_vma value)
1239 {
1240 char *s;
1241 struct bfd_link_hash_entry *h;
1242 char set_name[1 + sizeof "__CTOR_LIST__"];
1243
1244 if (config.warn_constructors)
1245 einfo (_("%P: warning: global constructor %s used\n"), name);
1246
1247 if (!config.build_constructors)
1248 return;
1249
1250 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1251 useful error message. */
1252 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
1253 && (bfd_link_relocatable (info)
1254 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1255 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1256
1257 s = set_name;
1258 if (bfd_get_symbol_leading_char (abfd) != '\0')
1259 *s++ = bfd_get_symbol_leading_char (abfd);
1260 if (constructor)
1261 strcpy (s, "__CTOR_LIST__");
1262 else
1263 strcpy (s, "__DTOR_LIST__");
1264
1265 h = bfd_link_hash_lookup (info->hash, set_name, true, true, true);
1266 if (h == (struct bfd_link_hash_entry *) NULL)
1267 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
1268 if (h->type == bfd_link_hash_new)
1269 {
1270 h->type = bfd_link_hash_undefined;
1271 h->u.undef.abfd = abfd;
1272 /* We don't call bfd_link_add_undef to add this to the list of
1273 undefined symbols because we are going to define it
1274 ourselves. */
1275 }
1276
1277 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
1278 }
1279
1280 /* A structure used by warning_callback to pass information through
1281 bfd_map_over_sections. */
1282
1283 struct warning_callback_info
1284 {
1285 bool found;
1286 const char *warning;
1287 const char *symbol;
1288 asymbol **asymbols;
1289 };
1290
1291 /* Look through the relocs to see if we can find a plausible address
1292 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1293
1294 static bool
1295 symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1296 {
1297 struct warning_callback_info cinfo;
1298
1299 if (!bfd_generic_link_read_symbols (abfd))
1300 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
1301
1302 cinfo.found = false;
1303 cinfo.warning = warning;
1304 cinfo.symbol = symbol;
1305 cinfo.asymbols = bfd_get_outsymbols (abfd);
1306 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1307 return cinfo.found;
1308 }
1309
1310 /* This is called when there is a reference to a warning symbol. */
1311
1312 static void
1313 warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1314 const char *warning,
1315 const char *symbol,
1316 bfd *abfd,
1317 asection *section,
1318 bfd_vma address)
1319 {
1320 /* This is a hack to support warn_multiple_gp. FIXME: This should
1321 have a cleaner interface, but what? */
1322 if (!config.warn_multiple_gp
1323 && strcmp (warning, "using multiple gp values") == 0)
1324 return;
1325
1326 if (section != NULL)
1327 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
1328 else if (abfd == NULL)
1329 einfo ("%P: %s%s\n", _("warning: "), warning);
1330 else if (symbol == NULL)
1331 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1332 else if (!symbol_warning (warning, symbol, abfd))
1333 {
1334 bfd *b;
1335 /* Search all input files for a reference to SYMBOL. */
1336 for (b = info->input_bfds; b; b = b->link.next)
1337 if (b != abfd && symbol_warning (warning, symbol, b))
1338 return;
1339 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1340 }
1341 }
1342
1343 /* This is called by warning_callback for each section. It checks the
1344 relocs of the section to see if it can find a reference to the
1345 symbol which triggered the warning. If it can, it uses the reloc
1346 to give an error message with a file and line number. */
1347
1348 static void
1349 warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
1350 {
1351 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
1352 long relsize;
1353 arelent **relpp;
1354 long relcount;
1355 arelent **p, **pend;
1356
1357 if (info->found)
1358 return;
1359
1360 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1361 if (relsize < 0)
1362 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1363 if (relsize == 0)
1364 return;
1365
1366 relpp = (arelent **) xmalloc (relsize);
1367 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1368 if (relcount < 0)
1369 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1370
1371 p = relpp;
1372 pend = p + relcount;
1373 for (; p < pend && *p != NULL; p++)
1374 {
1375 arelent *q = *p;
1376
1377 if (q->sym_ptr_ptr != NULL
1378 && *q->sym_ptr_ptr != NULL
1379 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1380 {
1381 /* We found a reloc for the symbol we are looking for. */
1382 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
1383 info->warning);
1384 info->found = true;
1385 break;
1386 }
1387 }
1388
1389 free (relpp);
1390 }
1391
1392 #if SUPPORT_ERROR_HANDLING_SCRIPT
1393 char * error_handling_script = NULL;
1394 #endif
1395
1396 /* This is called when an undefined symbol is found. */
1397
1398 static void
1399 undefined_symbol (struct bfd_link_info *info,
1400 const char *name,
1401 bfd *abfd,
1402 asection *section,
1403 bfd_vma address,
1404 bool error)
1405 {
1406 static char *error_name;
1407 static unsigned int error_count;
1408
1409 #define MAX_ERRORS_IN_A_ROW 5
1410
1411 if (info->ignore_hash != NULL
1412 && bfd_hash_lookup (info->ignore_hash, name, false, false) != NULL)
1413 return;
1414
1415 if (config.warn_once)
1416 {
1417 /* Only warn once about a particular undefined symbol. */
1418 add_ignoresym (info, name);
1419 }
1420
1421 /* We never print more than a reasonable number of errors in a row
1422 for a single symbol. */
1423 if (error_name != NULL
1424 && strcmp (name, error_name) == 0)
1425 ++error_count;
1426 else
1427 {
1428 error_count = 0;
1429 free (error_name);
1430 error_name = xstrdup (name);
1431 }
1432
1433 #if SUPPORT_ERROR_HANDLING_SCRIPT
1434 if (error_handling_script != NULL
1435 && error_count < MAX_ERRORS_IN_A_ROW)
1436 {
1437 char * argv[4];
1438 const char * res;
1439 int status, err;
1440
1441 argv[0] = error_handling_script;
1442 argv[1] = "undefined-symbol";
1443 argv[2] = (char *) name;
1444 argv[3] = NULL;
1445
1446 if (verbose)
1447 einfo (_("%P: About to run error handling script '%s' with arguments: '%s' '%s'\n"),
1448 argv[0], argv[1], argv[2]);
1449
1450 res = pex_one (PEX_SEARCH, error_handling_script, argv,
1451 N_("error handling script"),
1452 NULL /* Send stdout to random, temp file. */,
1453 NULL /* Write to stderr. */,
1454 &status, &err);
1455 if (res != NULL)
1456 {
1457 einfo (_("%P: Failed to run error handling script '%s', reason: "),
1458 error_handling_script);
1459 /* FIXME: We assume here that errrno == err. */
1460 perror (res);
1461 }
1462 /* We ignore the return status of the script and
1463 carry on to issue the normal error message. */
1464 }
1465 #endif /* SUPPORT_ERROR_HANDLING_SCRIPT */
1466
1467 if (section != NULL)
1468 {
1469 if (error_count < MAX_ERRORS_IN_A_ROW)
1470 {
1471 if (error)
1472 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
1473 abfd, section, address, name);
1474 else
1475 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
1476 abfd, section, address, name);
1477 }
1478 else if (error_count == MAX_ERRORS_IN_A_ROW)
1479 {
1480 if (error)
1481 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
1482 abfd, section, address, name);
1483 else
1484 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
1485 abfd, section, address, name);
1486 }
1487 else if (error)
1488 einfo ("%X");
1489 }
1490 else
1491 {
1492 if (error_count < MAX_ERRORS_IN_A_ROW)
1493 {
1494 if (error)
1495 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
1496 abfd, name);
1497 else
1498 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
1499 abfd, name);
1500 }
1501 else if (error_count == MAX_ERRORS_IN_A_ROW)
1502 {
1503 if (error)
1504 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
1505 abfd, name);
1506 else
1507 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
1508 abfd, name);
1509 }
1510 else if (error)
1511 einfo ("%X");
1512 }
1513 }
1514
1515 /* Counter to limit the number of relocation overflow error messages
1516 to print. Errors are printed as it is decremented. When it's
1517 called and the counter is zero, a final message is printed
1518 indicating more relocations were omitted. When it gets to -1, no
1519 such errors are printed. If it's initially set to a value less
1520 than -1, all such errors will be printed (--verbose does this). */
1521
1522 int overflow_cutoff_limit = 10;
1523
1524 /* This is called when a reloc overflows. */
1525
1526 static void
1527 reloc_overflow (struct bfd_link_info *info,
1528 struct bfd_link_hash_entry *entry,
1529 const char *name,
1530 const char *reloc_name,
1531 bfd_vma addend,
1532 bfd *abfd,
1533 asection *section,
1534 bfd_vma address)
1535 {
1536 if (overflow_cutoff_limit == -1)
1537 return;
1538
1539 einfo ("%X%H:", abfd, section, address);
1540
1541 if (overflow_cutoff_limit >= 0
1542 && overflow_cutoff_limit-- == 0)
1543 {
1544 einfo (_(" additional relocation overflows omitted from the output\n"));
1545 return;
1546 }
1547
1548 if (entry)
1549 {
1550 while (entry->type == bfd_link_hash_indirect
1551 || entry->type == bfd_link_hash_warning)
1552 entry = entry->u.i.link;
1553 switch (entry->type)
1554 {
1555 case bfd_link_hash_undefined:
1556 case bfd_link_hash_undefweak:
1557 einfo (_(" relocation truncated to fit: "
1558 "%s against undefined symbol `%pT'"),
1559 reloc_name, entry->root.string);
1560 break;
1561 case bfd_link_hash_defined:
1562 case bfd_link_hash_defweak:
1563 einfo (_(" relocation truncated to fit: "
1564 "%s against symbol `%pT' defined in %pA section in %pB"),
1565 reloc_name, entry->root.string,
1566 entry->u.def.section,
1567 entry->u.def.section == bfd_abs_section_ptr
1568 ? info->output_bfd : entry->u.def.section->owner);
1569 break;
1570 default:
1571 abort ();
1572 break;
1573 }
1574 }
1575 else
1576 einfo (_(" relocation truncated to fit: %s against `%pT'"),
1577 reloc_name, name);
1578 if (addend != 0)
1579 einfo ("+%v", addend);
1580 einfo ("\n");
1581 }
1582
1583 /* This is called when a dangerous relocation is made. */
1584
1585 static void
1586 reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1587 const char *message,
1588 bfd *abfd,
1589 asection *section,
1590 bfd_vma address)
1591 {
1592 einfo (_("%X%H: dangerous relocation: %s\n"),
1593 abfd, section, address, message);
1594 }
1595
1596 /* This is called when a reloc is being generated attached to a symbol
1597 that is not being output. */
1598
1599 static void
1600 unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1601 const char *name,
1602 bfd *abfd,
1603 asection *section,
1604 bfd_vma address)
1605 {
1606 einfo (_("%X%H: reloc refers to symbol `%pT' which is not being output\n"),
1607 abfd, section, address, name);
1608 }
1609
1610 /* This is called if link_info.notice_all is set, or when a symbol in
1611 link_info.notice_hash is found. Symbols are put in notice_hash
1612 using the -y option, while notice_all is set if the --cref option
1613 has been supplied, or if there are any NOCROSSREFS sections in the
1614 linker script; and if plugins are active, since they need to monitor
1615 all references from non-IR files. */
1616
1617 static bool
1618 notice (struct bfd_link_info *info,
1619 struct bfd_link_hash_entry *h,
1620 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1621 bfd *abfd,
1622 asection *section,
1623 bfd_vma value,
1624 flagword flags ATTRIBUTE_UNUSED)
1625 {
1626 const char *name;
1627
1628 if (h == NULL)
1629 {
1630 if (command_line.cref || nocrossref_list != NULL)
1631 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
1632 return true;
1633 }
1634
1635 name = h->root.string;
1636 if (info->notice_hash != NULL
1637 && bfd_hash_lookup (info->notice_hash, name, false, false) != NULL)
1638 {
1639 if (bfd_is_und_section (section))
1640 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
1641 else
1642 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
1643 }
1644
1645 if (command_line.cref || nocrossref_list != NULL)
1646 add_cref (name, abfd, section, value);
1647
1648 return true;
1649 }