1 /* Main program of GNU linker.
2 Copyright (C) 1991-2018 Free Software Foundation, Inc.
3 Written by Steve Chamberlain steve@cygnus.com
5 This file is part of the GNU Binutils.
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
24 #include "safe-ctype.h"
25 #include "libiberty.h"
28 #include "filenames.h"
43 #include "plugin-api.h"
44 #endif /* ENABLE_PLUGINS */
46 /* Somewhere above, sys/stat.h got included. */
47 #if !defined(S_ISDIR) && defined(S_IFDIR)
48 #define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
53 #ifndef TARGET_SYSTEM_ROOT
54 #define TARGET_SYSTEM_ROOT ""
59 FILE *saved_script_handle = NULL;
60 FILE *previous_script_handle = NULL;
61 bfd_boolean force_make_executable = FALSE;
64 const char *output_filename = "a.out";
66 /* Name this program was invoked by. */
69 /* The prefix for system library directories. */
70 const char *ld_sysroot;
72 /* The canonical representation of ld_sysroot. */
73 char *ld_canon_sysroot;
74 int ld_canon_sysroot_len;
76 /* Set by -G argument, for targets like MIPS ELF. */
77 int g_switch_value = 8;
79 /* Nonzero means print names of input files as processed. */
80 bfd_boolean trace_files;
82 /* Nonzero means report actions taken by the linker, and describe the linker script in use. */
85 /* Nonzero means version number was printed, so exit successfully
86 instead of complaining if no input files are given. */
87 bfd_boolean version_printed;
89 /* TRUE if we should demangle symbol names. */
90 bfd_boolean demangling;
92 args_type command_line;
94 ld_config_type config;
96 sort_type sort_section;
98 static const char *get_sysroot
100 static char *get_emulation
102 static bfd_boolean add_archive_element
103 (struct bfd_link_info *, bfd *, const char *, bfd **);
104 static void multiple_definition
105 (struct bfd_link_info *, struct bfd_link_hash_entry *,
106 bfd *, asection *, bfd_vma);
107 static void multiple_common
108 (struct bfd_link_info *, struct bfd_link_hash_entry *,
109 bfd *, enum bfd_link_hash_type, bfd_vma);
110 static void add_to_set
111 (struct bfd_link_info *, struct bfd_link_hash_entry *,
112 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
113 static void constructor_callback
114 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
115 asection *, bfd_vma);
116 static void warning_callback
117 (struct bfd_link_info *, const char *, const char *, bfd *,
118 asection *, bfd_vma);
119 static void warning_find_reloc
120 (bfd *, asection *, void *);
121 static void undefined_symbol
122 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
124 static void reloc_overflow
125 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
126 const char *, bfd_vma, bfd *, asection *, bfd_vma);
127 static void reloc_dangerous
128 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
129 static void unattached_reloc
130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
131 static bfd_boolean notice
132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
133 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
135 static struct bfd_link_callbacks link_callbacks =
141 constructor_callback,
151 ldlang_override_segment_assignment
154 static bfd_assert_handler_type default_bfd_assert_handler;
155 static bfd_error_handler_type default_bfd_error_handler;
157 struct bfd_link_info link_info;
162 bfd_cache_close_all ();
163 #ifdef ENABLE_PLUGINS
164 plugin_call_cleanup ();
166 if (output_filename && delete_output_file_on_failure)
167 unlink_if_ordinary (output_filename);
170 /* Hook to notice BFD assertions. */
173 ld_bfd_assert_handler (const char *fmt, const char *bfdver,
174 const char *file, int line)
176 config.make_executable = FALSE;
177 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
180 /* Hook the bfd error/warning handler for --fatal-warnings. */
183 ld_bfd_error_handler (const char *fmt, va_list ap)
185 if (config.fatal_warnings)
186 config.make_executable = FALSE;
187 (*default_bfd_error_handler) (fmt, ap);
191 main (int argc, char **argv)
194 long start_time = get_run_time ();
196 #if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
197 setlocale (LC_MESSAGES, "");
199 #if defined (HAVE_SETLOCALE)
200 setlocale (LC_CTYPE, "");
202 bindtextdomain (PACKAGE, LOCALEDIR);
203 textdomain (PACKAGE);
205 program_name = argv[0];
206 xmalloc_set_program_name (program_name);
208 START_PROGRESS (program_name, 0);
210 expandargv (&argc, &argv);
214 bfd_set_error_program_name (program_name);
216 /* We want to notice and fail on those nasty BFD assertions which are
217 likely to signal incorrect output being generated but otherwise may
219 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
221 /* Also hook the bfd error/warning handler for --fatal-warnings. */
222 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
224 xatexit (ld_cleanup);
226 /* Set up the sysroot directory. */
227 ld_sysroot = get_sysroot (argc, argv);
229 ld_canon_sysroot = lrealpath (ld_sysroot);
230 if (ld_canon_sysroot)
232 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
234 /* is_sysrooted_pathname() relies on no trailing dirsep. */
235 if (ld_canon_sysroot_len > 0
236 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
237 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
240 ld_canon_sysroot_len = -1;
242 /* Set the default BFD target based on the configured target. Doing
243 this permits the linker to be configured for a particular target,
244 and linked against a shared BFD library which was configured for
245 a different target. The macro TARGET is defined by Makefile. */
246 if (!bfd_set_default_target (TARGET))
248 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
259 config.build_constructors = TRUE;
260 config.rpath_separator = ':';
261 config.split_by_reloc = (unsigned) -1;
262 config.split_by_file = (bfd_size_type) -1;
263 config.make_executable = TRUE;
264 config.magic_demand_paged = TRUE;
265 config.text_read_only = TRUE;
266 link_info.disable_target_specific_optimizations = -1;
268 command_line.warn_mismatch = TRUE;
269 command_line.warn_search_mismatch = TRUE;
270 command_line.check_section_addresses = -1;
272 /* We initialize DEMANGLING based on the environment variable
273 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
274 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
275 environment. Acting the same way here lets us provide the same
276 interface by default. */
277 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
279 link_info.allow_undefined_version = TRUE;
280 link_info.keep_memory = TRUE;
281 link_info.combreloc = TRUE;
282 link_info.strip_discarded = TRUE;
283 link_info.prohibit_multiple_definition_absolute = FALSE;
284 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
285 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
286 link_info.callbacks = &link_callbacks;
287 link_info.input_bfds_tail = &link_info.input_bfds;
288 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
289 and _fini symbols. We are compatible. */
290 link_info.init_function = "_init";
291 link_info.fini_function = "_fini";
292 link_info.relax_pass = 1;
293 link_info.extern_protected_data = -1;
294 link_info.dynamic_undefined_weak = -1;
295 link_info.pei386_auto_import = -1;
296 link_info.spare_dynamic_tags = 5;
297 link_info.path_separator = ':';
298 #ifdef DEFAULT_FLAG_COMPRESS_DEBUG
299 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
301 #ifdef DEFAULT_NEW_DTAGS
302 link_info.new_dtags = DEFAULT_NEW_DTAGS;
305 ldfile_add_arch ("");
306 emulation = get_emulation (argc, argv);
307 ldemul_choose_mode (emulation);
308 default_target = ldemul_choose_target (argc, argv);
311 ldemul_before_parse ();
312 lang_has_input_file = FALSE;
313 parse_args (argc, argv);
315 if (config.hash_table_size != 0)
316 bfd_hash_set_default_size (config.hash_table_size);
318 #ifdef ENABLE_PLUGINS
319 /* Now all the plugin arguments have been gathered, we can load them. */
320 plugin_load_plugins ();
321 #endif /* ENABLE_PLUGINS */
323 ldemul_set_symbols ();
325 /* If we have not already opened and parsed a linker script,
326 try the default script from command line first. */
327 if (saved_script_handle == NULL
328 && command_line.default_script != NULL)
330 ldfile_open_command_file (command_line.default_script);
331 parser_input = input_script;
335 /* If we have not already opened and parsed a linker script
336 read the emulation's appropriate default script. */
337 if (saved_script_handle == NULL)
340 char *s = ldemul_get_script (&isfile);
343 ldfile_open_default_command_file (s);
347 lex_redirect (s, _("built in linker script"), 1);
349 parser_input = input_script;
356 if (saved_script_handle)
357 info_msg (_("using external linker script:"));
359 info_msg (_("using internal linker script:"));
360 info_msg ("\n==================================================\n");
362 if (saved_script_handle)
364 static const int ld_bufsz = 8193;
366 char *buf = (char *) xmalloc (ld_bufsz);
368 rewind (saved_script_handle);
369 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
372 info_msg ("%s", buf);
374 rewind (saved_script_handle);
381 info_msg (ldemul_get_script (&isfile));
384 info_msg ("\n==================================================\n");
387 if (command_line.force_group_allocation
388 || !bfd_link_relocatable (&link_info))
389 link_info.resolve_section_groups = TRUE;
391 link_info.resolve_section_groups = FALSE;
393 if (command_line.print_output_format)
394 info_msg ("%s\n", lang_get_output_target ());
398 /* If the only command line argument has been -v or --version or --verbose
399 then ignore any input files provided by linker scripts and exit now.
400 We do not want to create an output file when the linker is just invoked
401 to provide version information. */
402 if (argc == 2 && version_printed)
405 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
406 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
408 if (!lang_has_input_file)
410 if (version_printed || command_line.print_output_format)
412 einfo (_("%F%P: no input files\n"));
416 info_msg (_("%P: mode %s\n"), emulation);
418 ldemul_after_parse ();
420 if (config.map_filename)
422 if (strcmp (config.map_filename, "-") == 0)
424 config.map_file = stdout;
428 config.map_file = fopen (config.map_filename, FOPEN_WT);
429 if (config.map_file == (FILE *) NULL)
431 bfd_set_error (bfd_error_system_call);
432 einfo (_("%F%P: cannot open map file %s: %E\n"),
433 config.map_filename);
440 /* Print error messages for any missing symbols, for any warning
441 symbols, and possibly multiple definitions. */
442 if (bfd_link_relocatable (&link_info))
443 link_info.output_bfd->flags &= ~EXEC_P;
445 link_info.output_bfd->flags |= EXEC_P;
447 if ((link_info.compress_debug & COMPRESS_DEBUG))
449 link_info.output_bfd->flags |= BFD_COMPRESS;
450 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
451 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
456 if (config.map_file != NULL)
458 if (command_line.cref)
459 output_cref (config.map_file != NULL ? config.map_file : stdout);
460 if (nocrossref_list != NULL)
461 check_nocrossrefs ();
462 if (command_line.print_memory_usage)
463 lang_print_memory_usage ();
466 struct bfd_link_hash_entry *h;
468 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
469 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
475 /* Even if we're producing relocatable output, some non-fatal errors should
476 be reported in the exit status. (What non-fatal errors, if any, do we
477 want to ignore for relocatable output?) */
478 if (!config.make_executable && !force_make_executable)
481 einfo (_("%P: link errors found, deleting executable `%s'\n"),
484 /* The file will be removed by ld_cleanup. */
489 if (!bfd_close (link_info.output_bfd))
490 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
492 /* If the --force-exe-suffix is enabled, and we're making an
493 executable file and it doesn't end in .exe, copy it to one
495 if (!bfd_link_relocatable (&link_info)
496 && command_line.force_exe_suffix)
498 int len = strlen (output_filename);
501 || (strcasecmp (output_filename + len - 4, ".exe") != 0
502 && strcasecmp (output_filename + len - 4, ".dll") != 0))
506 const int bsize = 4096;
507 char *buf = (char *) xmalloc (bsize);
509 char *dst_name = (char *) xmalloc (len + 5);
511 strcpy (dst_name, output_filename);
512 strcat (dst_name, ".exe");
513 src = fopen (output_filename, FOPEN_RB);
514 dst = fopen (dst_name, FOPEN_WB);
517 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
520 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
522 while ((l = fread (buf, 1, bsize, src)) > 0)
524 int done = fwrite (buf, 1, l, dst);
527 einfo (_("%P: error writing file `%s'\n"), dst_name);
531 if (fclose (dst) == EOF)
532 einfo (_("%P: error closing file `%s'\n"), dst_name);
539 END_PROGRESS (program_name);
543 long run_time = get_run_time () - start_time;
546 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
547 program_name, run_time / 1000000, run_time % 1000000);
551 /* Prevent ld_cleanup from doing anything, after a successful link. */
552 output_filename = NULL;
558 /* If the configured sysroot is relocatable, try relocating it based on
559 default prefix FROM. Return the relocated directory if it exists,
560 otherwise return null. */
563 get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
565 #ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
569 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
572 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
580 /* Return the sysroot directory. Return "" if no sysroot is being used. */
583 get_sysroot (int argc, char **argv)
588 for (i = 1; i < argc; i++)
589 if (CONST_STRNEQ (argv[i], "--sysroot="))
590 return argv[i] + strlen ("--sysroot=");
592 path = get_relative_sysroot (BINDIR);
596 path = get_relative_sysroot (TOOLBINDIR);
600 return TARGET_SYSTEM_ROOT;
603 /* We need to find any explicitly given emulation in order to initialize the
604 state that's needed by the lex&yacc argument parser (parse_args). */
607 get_emulation (int argc, char **argv)
612 emulation = getenv (EMULATION_ENVIRON);
613 if (emulation == NULL)
614 emulation = DEFAULT_EMULATION;
616 for (i = 1; i < argc; i++)
618 if (CONST_STRNEQ (argv[i], "-m"))
620 if (argv[i][2] == '\0')
625 emulation = argv[i + 1];
629 einfo (_("%F%P: missing argument to -m\n"));
631 else if (strcmp (argv[i], "-mips1") == 0
632 || strcmp (argv[i], "-mips2") == 0
633 || strcmp (argv[i], "-mips3") == 0
634 || strcmp (argv[i], "-mips4") == 0
635 || strcmp (argv[i], "-mips5") == 0
636 || strcmp (argv[i], "-mips32") == 0
637 || strcmp (argv[i], "-mips32r2") == 0
638 || strcmp (argv[i], "-mips32r6") == 0
639 || strcmp (argv[i], "-mips64") == 0
640 || strcmp (argv[i], "-mips64r2") == 0
641 || strcmp (argv[i], "-mips64r6") == 0)
643 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
644 passed to the linker by some MIPS compilers. They
645 generally tell the linker to use a slightly different
646 library path. Perhaps someday these should be
647 implemented as emulations; until then, we just ignore
648 the arguments and hope that nobody ever creates
649 emulations named ips1, ips2 or ips3. */
651 else if (strcmp (argv[i], "-m486") == 0)
653 /* FIXME: The argument -m486 is passed to the linker on
654 some Linux systems. Hope that nobody creates an
655 emulation named 486. */
660 emulation = &argv[i][2];
669 add_ysym (const char *name)
671 if (link_info.notice_hash == NULL)
673 link_info.notice_hash
674 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
675 if (!bfd_hash_table_init_n (link_info.notice_hash,
677 sizeof (struct bfd_hash_entry),
679 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
682 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
683 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
687 add_ignoresym (struct bfd_link_info *info, const char *name)
689 if (info->ignore_hash == NULL)
691 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
692 if (!bfd_hash_table_init_n (info->ignore_hash,
694 sizeof (struct bfd_hash_entry),
696 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
699 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
700 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
703 /* Record a symbol to be wrapped, from the --wrap option. */
706 add_wrap (const char *name)
708 if (link_info.wrap_hash == NULL)
711 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
712 if (!bfd_hash_table_init_n (link_info.wrap_hash,
714 sizeof (struct bfd_hash_entry),
716 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
719 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
720 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
723 /* Handle the -retain-symbols-file option. */
726 add_keepsyms_file (const char *filename)
733 if (link_info.strip == strip_some)
734 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
736 file = fopen (filename, "r");
739 bfd_set_error (bfd_error_system_call);
740 einfo ("%X%P: %s: %E\n", filename);
744 link_info.keep_hash = (struct bfd_hash_table *)
745 xmalloc (sizeof (struct bfd_hash_table));
746 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
747 sizeof (struct bfd_hash_entry)))
748 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
751 buf = (char *) xmalloc (bufsize);
763 while (!ISSPACE (c) && c != EOF)
770 buf = (char *) xrealloc (buf, bufsize);
777 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
778 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
782 if (link_info.strip != strip_none)
783 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
786 link_info.strip = strip_some;
790 /* Callbacks from the BFD linker routines. */
792 /* This is called when BFD has decided to include an archive member in
796 add_archive_element (struct bfd_link_info *info,
799 bfd **subsbfd ATTRIBUTE_UNUSED)
801 lang_input_statement_type *input;
802 lang_input_statement_type *parent;
803 lang_input_statement_type orig_input;
805 input = (lang_input_statement_type *)
806 xcalloc (1, sizeof (lang_input_statement_type));
807 input->header.type = lang_input_statement_enum;
808 input->filename = abfd->filename;
809 input->local_sym_name = abfd->filename;
810 input->the_bfd = abfd;
812 parent = abfd->my_archive->usrdata;
813 if (parent != NULL && !parent->flags.reload)
814 parent->next = (lang_statement_union_type *) input;
816 /* Save the original data for trace files/tries below, as plugins
817 (if enabled) may possibly alter it to point to a replacement
818 BFD, but we still want to output the original BFD filename. */
820 #ifdef ENABLE_PLUGINS
821 if (link_info.lto_plugin_active)
823 /* We must offer this archive member to the plugins to claim. */
824 plugin_maybe_claim (input);
825 if (input->flags.claimed)
827 if (no_more_claiming)
829 /* Don't claim new IR symbols after all IR symbols have
831 if (trace_files || verbose)
832 info_msg ("%pI: no new IR symbols to claimi\n",
834 input->flags.claimed = 0;
837 input->flags.claim_archive = TRUE;
838 *subsbfd = input->the_bfd;
841 #endif /* ENABLE_PLUGINS */
843 ldlang_add_file (input);
845 if (config.map_file != NULL)
847 static bfd_boolean header_printed;
848 struct bfd_link_hash_entry *h;
852 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
854 && info->pei386_auto_import
855 && CONST_STRNEQ (name, "__imp_"))
856 h = bfd_link_hash_lookup (info->hash, name + 6, FALSE, FALSE, TRUE);
868 case bfd_link_hash_defined:
869 case bfd_link_hash_defweak:
870 from = h->u.def.section->owner;
873 case bfd_link_hash_undefined:
874 case bfd_link_hash_undefweak:
875 from = h->u.undef.abfd;
878 case bfd_link_hash_common:
879 from = h->u.c.p->section->owner;
886 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
887 header_printed = TRUE;
890 if (abfd->my_archive == NULL
891 || bfd_is_thin_archive (abfd->my_archive))
893 minfo ("%s", bfd_get_filename (abfd));
894 len = strlen (bfd_get_filename (abfd));
898 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
899 bfd_get_filename (abfd));
900 len = (strlen (bfd_get_filename (abfd->my_archive))
901 + strlen (bfd_get_filename (abfd))
917 minfo ("%pB ", from);
919 minfo ("(%pT)\n", h->root.string);
921 minfo ("(%s)\n", name);
924 if (trace_files || verbose)
925 info_msg ("%pI\n", &orig_input);
929 /* This is called when BFD has discovered a symbol which is defined
933 multiple_definition (struct bfd_link_info *info,
934 struct bfd_link_hash_entry *h,
944 if (info->allow_multiple_definition)
949 case bfd_link_hash_defined:
950 osec = h->u.def.section;
951 oval = h->u.def.value;
952 obfd = h->u.def.section->owner;
954 case bfd_link_hash_indirect:
955 osec = bfd_ind_section_ptr;
963 /* Ignore a redefinition of an absolute symbol to the
964 same value; it's harmless. */
965 if (h->type == bfd_link_hash_defined
966 && bfd_is_abs_section (osec)
967 && bfd_is_abs_section (nsec)
971 /* If either section has the output_section field set to
972 bfd_abs_section_ptr, it means that the section is being
973 discarded, and this is not really a multiple definition at all.
974 FIXME: It would be cleaner to somehow ignore symbols defined in
975 sections which are being discarded. */
976 if (!info->prohibit_multiple_definition_absolute
977 && ((osec->output_section != NULL
978 && ! bfd_is_abs_section (osec)
979 && bfd_is_abs_section (osec->output_section))
980 || (nsec->output_section != NULL
981 && !bfd_is_abs_section (nsec)
982 && bfd_is_abs_section (nsec->output_section))))
985 name = h->root.string;
993 einfo (_("%X%P: %C: multiple definition of `%pT'"),
994 nbfd, nsec, nval, name);
996 einfo (_("; %D: first defined here"), obfd, osec, oval);
999 if (RELAXATION_ENABLED_BY_USER)
1001 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
1006 /* This is called when there is a definition of a common symbol, or
1007 when a common symbol is found for a symbol that is already defined,
1008 or when two common symbols are found. We only do something if
1009 -warn-common was used. */
1012 multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1013 struct bfd_link_hash_entry *h,
1015 enum bfd_link_hash_type ntype,
1020 enum bfd_link_hash_type otype;
1023 if (!config.warn_common)
1026 name = h->root.string;
1028 if (otype == bfd_link_hash_common)
1030 obfd = h->u.c.p->section->owner;
1031 osize = h->u.c.size;
1033 else if (otype == bfd_link_hash_defined
1034 || otype == bfd_link_hash_defweak)
1036 obfd = h->u.def.section->owner;
1041 /* FIXME: It would nice if we could report the BFD which defined
1042 an indirect symbol, but we don't have anywhere to store the
1048 if (ntype == bfd_link_hash_defined
1049 || ntype == bfd_link_hash_defweak
1050 || ntype == bfd_link_hash_indirect)
1052 ASSERT (otype == bfd_link_hash_common);
1054 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1058 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1061 else if (otype == bfd_link_hash_defined
1062 || otype == bfd_link_hash_defweak
1063 || otype == bfd_link_hash_indirect)
1065 ASSERT (ntype == bfd_link_hash_common);
1067 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1071 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1076 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1080 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1081 " by larger common from %pB\n"),
1084 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1085 " by larger common\n"),
1088 else if (nsize > osize)
1091 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1092 " smaller common from %pB\n"),
1095 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1096 " smaller common\n"),
1102 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1105 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1111 /* This is called when BFD has discovered a set element. H is the
1112 entry in the linker hash table for the set. SECTION and VALUE
1113 represent a value which should be added to the set. */
1116 add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1117 struct bfd_link_hash_entry *h,
1118 bfd_reloc_code_real_type reloc,
1123 if (config.warn_constructors)
1124 einfo (_("%P: warning: global constructor %s used\n"),
1127 if (!config.build_constructors)
1130 ldctor_add_set_entry (h, reloc, NULL, section, value);
1132 if (h->type == bfd_link_hash_new)
1134 h->type = bfd_link_hash_undefined;
1135 h->u.undef.abfd = abfd;
1136 /* We don't call bfd_link_add_undef to add this to the list of
1137 undefined symbols because we are going to define it
1142 /* This is called when BFD has discovered a constructor. This is only
1143 called for some object file formats--those which do not handle
1144 constructors in some more clever fashion. This is similar to
1145 adding an element to a set, but less general. */
1148 constructor_callback (struct bfd_link_info *info,
1149 bfd_boolean constructor,
1156 struct bfd_link_hash_entry *h;
1157 char set_name[1 + sizeof "__CTOR_LIST__"];
1159 if (config.warn_constructors)
1160 einfo (_("%P: warning: global constructor %s used\n"), name);
1162 if (!config.build_constructors)
1165 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1166 useful error message. */
1167 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
1168 && (bfd_link_relocatable (info)
1169 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1170 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1173 if (bfd_get_symbol_leading_char (abfd) != '\0')
1174 *s++ = bfd_get_symbol_leading_char (abfd);
1176 strcpy (s, "__CTOR_LIST__");
1178 strcpy (s, "__DTOR_LIST__");
1180 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
1181 if (h == (struct bfd_link_hash_entry *) NULL)
1182 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
1183 if (h->type == bfd_link_hash_new)
1185 h->type = bfd_link_hash_undefined;
1186 h->u.undef.abfd = abfd;
1187 /* We don't call bfd_link_add_undef to add this to the list of
1188 undefined symbols because we are going to define it
1192 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
1195 /* A structure used by warning_callback to pass information through
1196 bfd_map_over_sections. */
1198 struct warning_callback_info
1201 const char *warning;
1206 /* Look through the relocs to see if we can find a plausible address
1207 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1210 symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1212 struct warning_callback_info cinfo;
1214 if (!bfd_generic_link_read_symbols (abfd))
1215 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
1217 cinfo.found = FALSE;
1218 cinfo.warning = warning;
1219 cinfo.symbol = symbol;
1220 cinfo.asymbols = bfd_get_outsymbols (abfd);
1221 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1225 /* This is called when there is a reference to a warning symbol. */
1228 warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1229 const char *warning,
1235 /* This is a hack to support warn_multiple_gp. FIXME: This should
1236 have a cleaner interface, but what? */
1237 if (!config.warn_multiple_gp
1238 && strcmp (warning, "using multiple gp values") == 0)
1241 if (section != NULL)
1242 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
1243 else if (abfd == NULL)
1244 einfo ("%P: %s%s\n", _("warning: "), warning);
1245 else if (symbol == NULL)
1246 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1247 else if (!symbol_warning (warning, symbol, abfd))
1250 /* Search all input files for a reference to SYMBOL. */
1251 for (b = info->input_bfds; b; b = b->link.next)
1252 if (b != abfd && symbol_warning (warning, symbol, b))
1254 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1258 /* This is called by warning_callback for each section. It checks the
1259 relocs of the section to see if it can find a reference to the
1260 symbol which triggered the warning. If it can, it uses the reloc
1261 to give an error message with a file and line number. */
1264 warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
1266 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
1270 arelent **p, **pend;
1275 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1277 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1281 relpp = (arelent **) xmalloc (relsize);
1282 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1284 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1287 pend = p + relcount;
1288 for (; p < pend && *p != NULL; p++)
1292 if (q->sym_ptr_ptr != NULL
1293 && *q->sym_ptr_ptr != NULL
1294 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1296 /* We found a reloc for the symbol we are looking for. */
1297 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
1307 /* This is called when an undefined symbol is found. */
1310 undefined_symbol (struct bfd_link_info *info,
1317 static char *error_name;
1318 static unsigned int error_count;
1320 #define MAX_ERRORS_IN_A_ROW 5
1322 if (info->ignore_hash != NULL
1323 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1326 if (config.warn_once)
1328 /* Only warn once about a particular undefined symbol. */
1329 add_ignoresym (info, name);
1332 /* We never print more than a reasonable number of errors in a row
1333 for a single symbol. */
1334 if (error_name != NULL
1335 && strcmp (name, error_name) == 0)
1340 if (error_name != NULL)
1342 error_name = xstrdup (name);
1345 if (section != NULL)
1347 if (error_count < MAX_ERRORS_IN_A_ROW)
1350 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
1351 abfd, section, address, name);
1353 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
1354 abfd, section, address, name);
1356 else if (error_count == MAX_ERRORS_IN_A_ROW)
1359 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
1360 abfd, section, address, name);
1362 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
1363 abfd, section, address, name);
1370 if (error_count < MAX_ERRORS_IN_A_ROW)
1373 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
1376 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
1379 else if (error_count == MAX_ERRORS_IN_A_ROW)
1382 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
1385 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
1393 /* Counter to limit the number of relocation overflow error messages
1394 to print. Errors are printed as it is decremented. When it's
1395 called and the counter is zero, a final message is printed
1396 indicating more relocations were omitted. When it gets to -1, no
1397 such errors are printed. If it's initially set to a value less
1398 than -1, all such errors will be printed (--verbose does this). */
1400 int overflow_cutoff_limit = 10;
1402 /* This is called when a reloc overflows. */
1405 reloc_overflow (struct bfd_link_info *info,
1406 struct bfd_link_hash_entry *entry,
1408 const char *reloc_name,
1414 if (overflow_cutoff_limit == -1)
1417 einfo ("%X%P: %H:", abfd, section, address);
1419 if (overflow_cutoff_limit >= 0
1420 && overflow_cutoff_limit-- == 0)
1422 einfo (_(" additional relocation overflows omitted from the output\n"));
1428 while (entry->type == bfd_link_hash_indirect
1429 || entry->type == bfd_link_hash_warning)
1430 entry = entry->u.i.link;
1431 switch (entry->type)
1433 case bfd_link_hash_undefined:
1434 case bfd_link_hash_undefweak:
1435 einfo (_(" relocation truncated to fit: "
1436 "%s against undefined symbol `%pT'"),
1437 reloc_name, entry->root.string);
1439 case bfd_link_hash_defined:
1440 case bfd_link_hash_defweak:
1441 einfo (_(" relocation truncated to fit: "
1442 "%s against symbol `%pT' defined in %pA section in %pB"),
1443 reloc_name, entry->root.string,
1444 entry->u.def.section,
1445 entry->u.def.section == bfd_abs_section_ptr
1446 ? info->output_bfd : entry->u.def.section->owner);
1454 einfo (_(" relocation truncated to fit: %s against `%pT'"),
1457 einfo ("+%v", addend);
1461 /* This is called when a dangerous relocation is made. */
1464 reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1465 const char *message,
1470 einfo (_("%X%P: %H: dangerous relocation: %s\n"),
1471 abfd, section, address, message);
1474 /* This is called when a reloc is being generated attached to a symbol
1475 that is not being output. */
1478 unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1484 einfo (_("%X%P: %H: reloc refers to symbol `%pT' which is not being output\n"),
1485 abfd, section, address, name);
1488 /* This is called if link_info.notice_all is set, or when a symbol in
1489 link_info.notice_hash is found. Symbols are put in notice_hash
1490 using the -y option, while notice_all is set if the --cref option
1491 has been supplied, or if there are any NOCROSSREFS sections in the
1492 linker script; and if plugins are active, since they need to monitor
1493 all references from non-IR files. */
1496 notice (struct bfd_link_info *info,
1497 struct bfd_link_hash_entry *h,
1498 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1502 flagword flags ATTRIBUTE_UNUSED)
1508 if (command_line.cref || nocrossref_list != NULL)
1509 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
1513 name = h->root.string;
1514 if (info->notice_hash != NULL
1515 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
1517 if (bfd_is_und_section (section))
1518 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
1520 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
1523 if (command_line.cref || nocrossref_list != NULL)
1524 add_cref (name, abfd, section, value);