ldmain.c revision 1.8 1 /* Main program of GNU linker.
2 Copyright (C) 1991-2018 Free Software Foundation, Inc.
3 Written by Steve Chamberlain steve (at) cygnus.com
4
5 This file is part of the GNU Binutils.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
21
22 #include "sysdep.h"
23 #include "bfd.h"
24 #include "safe-ctype.h"
25 #include "libiberty.h"
26 #include "progress.h"
27 #include "bfdlink.h"
28 #include "filenames.h"
29
30 #include "ld.h"
31 #include "ldmain.h"
32 #include "ldmisc.h"
33 #include "ldwrite.h"
34 #include "ldexp.h"
35 #include "ldlang.h"
36 #include <ldgram.h>
37 #include "ldlex.h"
38 #include "ldfile.h"
39 #include "ldemul.h"
40 #include "ldctor.h"
41 #ifdef ENABLE_PLUGINS
42 #include "plugin.h"
43 #include "plugin-api.h"
44 #endif /* ENABLE_PLUGINS */
45
46 /* Somewhere above, sys/stat.h got included. */
47 #if !defined(S_ISDIR) && defined(S_IFDIR)
48 #define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
49 #endif
50
51 #include <string.h>
52
53 #ifndef TARGET_SYSTEM_ROOT
54 #define TARGET_SYSTEM_ROOT ""
55 #endif
56
57 /* EXPORTS */
58
59 FILE *saved_script_handle = NULL;
60 FILE *previous_script_handle = NULL;
61 bfd_boolean force_make_executable = FALSE;
62
63 char *default_target;
64 const char *output_filename = "a.out";
65
66 /* Name this program was invoked by. */
67 char *program_name;
68
69 /* The prefix for system library directories. */
70 const char *ld_sysroot;
71
72 /* The canonical representation of ld_sysroot. */
73 char *ld_canon_sysroot;
74 int ld_canon_sysroot_len;
75
76 /* Set by -G argument, for targets like MIPS ELF. */
77 int g_switch_value = 8;
78
79 /* Nonzero means print names of input files as processed. */
80 bfd_boolean trace_files;
81
82 /* Nonzero means report actions taken by the linker, and describe the linker script in use. */
83 bfd_boolean verbose;
84
85 /* Nonzero means version number was printed, so exit successfully
86 instead of complaining if no input files are given. */
87 bfd_boolean version_printed;
88
89 /* TRUE if we should demangle symbol names. */
90 bfd_boolean demangling;
91
92 args_type command_line;
93
94 ld_config_type config;
95
96 sort_type sort_section;
97
98 static const char *get_sysroot
99 (int, char **);
100 static char *get_emulation
101 (int, char **);
102 static bfd_boolean add_archive_element
103 (struct bfd_link_info *, bfd *, const char *, bfd **);
104 static void multiple_definition
105 (struct bfd_link_info *, struct bfd_link_hash_entry *,
106 bfd *, asection *, bfd_vma);
107 static void multiple_common
108 (struct bfd_link_info *, struct bfd_link_hash_entry *,
109 bfd *, enum bfd_link_hash_type, bfd_vma);
110 static void add_to_set
111 (struct bfd_link_info *, struct bfd_link_hash_entry *,
112 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
113 static void constructor_callback
114 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
115 asection *, bfd_vma);
116 static void warning_callback
117 (struct bfd_link_info *, const char *, const char *, bfd *,
118 asection *, bfd_vma);
119 static void warning_find_reloc
120 (bfd *, asection *, void *);
121 static void undefined_symbol
122 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
123 bfd_boolean);
124 static void reloc_overflow
125 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
126 const char *, bfd_vma, bfd *, asection *, bfd_vma);
127 static void reloc_dangerous
128 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
129 static void unattached_reloc
130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
131 static bfd_boolean notice
132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
133 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
134
135 static struct bfd_link_callbacks link_callbacks =
136 {
137 add_archive_element,
138 multiple_definition,
139 multiple_common,
140 add_to_set,
141 constructor_callback,
142 warning_callback,
143 undefined_symbol,
144 reloc_overflow,
145 reloc_dangerous,
146 unattached_reloc,
147 notice,
148 einfo,
149 info_msg,
150 minfo,
151 ldlang_override_segment_assignment
152 };
153
154 static bfd_assert_handler_type default_bfd_assert_handler;
155 static bfd_error_handler_type default_bfd_error_handler;
156
157 struct bfd_link_info link_info;
158
159 static void
161 ld_cleanup (void)
162 {
163 bfd_cache_close_all ();
164 #ifdef ENABLE_PLUGINS
165 plugin_call_cleanup ();
166 #endif
167 if (output_filename && delete_output_file_on_failure)
168 unlink_if_ordinary (output_filename);
169 }
170
171 /* Hook to notice BFD assertions. */
172
173 static void
174 ld_bfd_assert_handler (const char *fmt, const char *bfdver,
175 const char *file, int line)
176 {
177 config.make_executable = FALSE;
178 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
179 }
180
181 /* Hook the bfd error/warning handler for --fatal-warnings. */
182
183 static void
184 ld_bfd_error_handler (const char *fmt, va_list ap)
185 {
186 if (config.fatal_warnings)
187 config.make_executable = FALSE;
188 (*default_bfd_error_handler) (fmt, ap);
189 }
190
191 int
192 main (int argc, char **argv)
193 {
194 char *emulation;
195 long start_time = get_run_time ();
196
197 #if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
198 setlocale (LC_MESSAGES, "");
199 #endif
200 #if defined (HAVE_SETLOCALE)
201 setlocale (LC_CTYPE, "");
202 #endif
203 bindtextdomain (PACKAGE, LOCALEDIR);
204 textdomain (PACKAGE);
205
206 program_name = argv[0];
207 xmalloc_set_program_name (program_name);
208
209 START_PROGRESS (program_name, 0);
210
211 expandargv (&argc, &argv);
212
213 bfd_init ();
214
215 bfd_set_error_program_name (program_name);
216
217 /* We want to notice and fail on those nasty BFD assertions which are
218 likely to signal incorrect output being generated but otherwise may
219 leave no trace. */
220 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
221
222 /* Also hook the bfd error/warning handler for --fatal-warnings. */
223 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
224
225 xatexit (ld_cleanup);
226
227 /* Set up the sysroot directory. */
228 ld_sysroot = get_sysroot (argc, argv);
229 if (*ld_sysroot)
230 ld_canon_sysroot = lrealpath (ld_sysroot);
231 if (ld_canon_sysroot)
232 {
233 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
234
235 /* is_sysrooted_pathname() relies on no trailing dirsep. */
236 if (ld_canon_sysroot_len > 0
237 && IS_DIR_SEPARATOR (ld_canon_sysroot [ld_canon_sysroot_len - 1]))
238 ld_canon_sysroot [--ld_canon_sysroot_len] = '\0';
239 }
240 else
241 ld_canon_sysroot_len = -1;
242
243 /* Set the default BFD target based on the configured target. Doing
244 this permits the linker to be configured for a particular target,
245 and linked against a shared BFD library which was configured for
246 a different target. The macro TARGET is defined by Makefile. */
247 if (!bfd_set_default_target (TARGET))
248 {
249 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
250 xexit (1);
251 }
252
253 #if YYDEBUG
254 {
255 extern int yydebug;
256 yydebug = 1;
257 }
258 #endif
259
260 config.build_constructors = TRUE;
261 config.rpath_separator = ':';
262 config.split_by_reloc = (unsigned) -1;
263 config.split_by_file = (bfd_size_type) -1;
264 config.make_executable = TRUE;
265 config.magic_demand_paged = TRUE;
266 config.text_read_only = TRUE;
267 link_info.disable_target_specific_optimizations = -1;
268
269 command_line.warn_mismatch = TRUE;
270 command_line.warn_search_mismatch = TRUE;
271 command_line.check_section_addresses = -1;
272
273 /* We initialize DEMANGLING based on the environment variable
274 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
275 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
276 environment. Acting the same way here lets us provide the same
277 interface by default. */
278 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
279
280 link_info.allow_undefined_version = TRUE;
281 link_info.keep_memory = TRUE;
282 link_info.combreloc = TRUE;
283 link_info.strip_discarded = TRUE;
284 link_info.prohibit_multiple_definition_absolute = FALSE;
285 link_info.emit_hash = DEFAULT_EMIT_SYSV_HASH;
286 link_info.emit_gnu_hash = DEFAULT_EMIT_GNU_HASH;
287 link_info.callbacks = &link_callbacks;
288 link_info.input_bfds_tail = &link_info.input_bfds;
289 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
290 and _fini symbols. We are compatible. */
291 link_info.init_function = "_init";
292 link_info.fini_function = "_fini";
293 link_info.relax_pass = 1;
294 link_info.extern_protected_data = -1;
295 link_info.dynamic_undefined_weak = -1;
296 link_info.pei386_auto_import = -1;
297 link_info.spare_dynamic_tags = 5;
298 link_info.path_separator = ':';
299 #ifdef DEFAULT_FLAG_COMPRESS_DEBUG
300 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
301 #endif
302 #ifdef DEFAULT_NEW_DTAGS
303 link_info.new_dtags = DEFAULT_NEW_DTAGS;
304 #endif
305
306 ldfile_add_arch ("");
307 emulation = get_emulation (argc, argv);
308 ldemul_choose_mode (emulation);
309 default_target = ldemul_choose_target (argc, argv);
310 lang_init ();
311 ldexp_init ();
312 ldemul_before_parse ();
313 lang_has_input_file = FALSE;
314 parse_args (argc, argv);
315
316 if (config.hash_table_size != 0)
317 bfd_hash_set_default_size (config.hash_table_size);
318
319 #ifdef ENABLE_PLUGINS
320 /* Now all the plugin arguments have been gathered, we can load them. */
321 plugin_load_plugins ();
322 #endif /* ENABLE_PLUGINS */
323
324 ldemul_set_symbols ();
325
326 /* If we have not already opened and parsed a linker script,
327 try the default script from command line first. */
328 if (saved_script_handle == NULL
329 && command_line.default_script != NULL)
330 {
331 ldfile_open_command_file (command_line.default_script);
332 parser_input = input_script;
333 yyparse ();
334 }
335
336 /* If we have not already opened and parsed a linker script
337 read the emulation's appropriate default script. */
338 if (saved_script_handle == NULL)
339 {
340 int isfile;
341 char *s = ldemul_get_script (&isfile);
342
343 if (isfile)
344 ldfile_open_default_command_file (s);
345 else
346 {
347 lex_string = s;
348 lex_redirect (s, _("built in linker script"), 1);
349 }
350 parser_input = input_script;
351 yyparse ();
352 lex_string = NULL;
353 }
354
355 if (verbose)
356 {
357 if (saved_script_handle)
358 info_msg (_("using external linker script:"));
359 else
360 info_msg (_("using internal linker script:"));
361 info_msg ("\n==================================================\n");
362
363 if (saved_script_handle)
364 {
365 static const int ld_bufsz = 8193;
366 size_t n;
367 char *buf = (char *) xmalloc (ld_bufsz);
368
369 rewind (saved_script_handle);
370 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
371 {
372 buf[n] = 0;
373 info_msg ("%s", buf);
374 }
375 rewind (saved_script_handle);
376 free (buf);
377 }
378 else
379 {
380 int isfile;
381
382 info_msg (ldemul_get_script (&isfile));
383 }
384
385 info_msg ("\n==================================================\n");
386 }
387
388 if (command_line.force_group_allocation
389 || !bfd_link_relocatable (&link_info))
390 link_info.resolve_section_groups = TRUE;
391 else
392 link_info.resolve_section_groups = FALSE;
393
394 if (command_line.print_output_format)
395 info_msg ("%s\n", lang_get_output_target ());
396
397 lang_final ();
398
399 /* If the only command line argument has been -v or --version or --verbose
400 then ignore any input files provided by linker scripts and exit now.
401 We do not want to create an output file when the linker is just invoked
402 to provide version information. */
403 if (argc == 2 && version_printed)
404 xexit (0);
405
406 if (link_info.inhibit_common_definition && !bfd_link_dll (&link_info))
407 einfo (_("%F%P: --no-define-common may not be used without -shared\n"));
408
409 if (!lang_has_input_file)
410 {
411 if (version_printed || command_line.print_output_format)
412 xexit (0);
413 einfo (_("%F%P: no input files\n"));
414 }
415
416 if (trace_files)
417 info_msg (_("%P: mode %s\n"), emulation);
418
419 ldemul_after_parse ();
420
421 if (config.map_filename)
422 {
423 if (strcmp (config.map_filename, "-") == 0)
424 {
425 config.map_file = stdout;
426 }
427 else
428 {
429 config.map_file = fopen (config.map_filename, FOPEN_WT);
430 if (config.map_file == (FILE *) NULL)
431 {
432 bfd_set_error (bfd_error_system_call);
433 einfo (_("%F%P: cannot open map file %s: %E\n"),
434 config.map_filename);
435 }
436 }
437 }
438
439 lang_process ();
440
441 /* Print error messages for any missing symbols, for any warning
442 symbols, and possibly multiple definitions. */
443 if (bfd_link_relocatable (&link_info))
444 link_info.output_bfd->flags &= ~EXEC_P;
445 else
446 link_info.output_bfd->flags |= EXEC_P;
447
448 if ((link_info.compress_debug & COMPRESS_DEBUG))
449 {
450 link_info.output_bfd->flags |= BFD_COMPRESS;
451 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
452 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
453 }
454
455 ldwrite ();
456
457 if (config.map_file != NULL)
458 lang_map ();
459 if (command_line.cref)
460 output_cref (config.map_file != NULL ? config.map_file : stdout);
461 if (nocrossref_list != NULL)
462 check_nocrossrefs ();
463 if (command_line.print_memory_usage)
464 lang_print_memory_usage ();
465 #if 0
466 {
467 struct bfd_link_hash_entry *h;
468
469 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
470 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
471 }
472 #endif
473 ldexp_finish ();
474 lang_finish ();
475
476 /* Even if we're producing relocatable output, some non-fatal errors should
477 be reported in the exit status. (What non-fatal errors, if any, do we
478 want to ignore for relocatable output?) */
479 if (!config.make_executable && !force_make_executable)
480 {
481 if (trace_files)
482 einfo (_("%P: link errors found, deleting executable `%s'\n"),
483 output_filename);
484
485 /* The file will be removed by ld_cleanup. */
486 xexit (1);
487 }
488 else
489 {
490 if (!bfd_close (link_info.output_bfd))
491 einfo (_("%F%P: %pB: final close failed: %E\n"), link_info.output_bfd);
492
493 /* If the --force-exe-suffix is enabled, and we're making an
494 executable file and it doesn't end in .exe, copy it to one
495 which does. */
496 if (!bfd_link_relocatable (&link_info)
497 && command_line.force_exe_suffix)
498 {
499 int len = strlen (output_filename);
500
501 if (len < 4
502 || (strcasecmp (output_filename + len - 4, ".exe") != 0
503 && strcasecmp (output_filename + len - 4, ".dll") != 0))
504 {
505 FILE *src;
506 FILE *dst;
507 const int bsize = 4096;
508 char *buf = (char *) xmalloc (bsize);
509 int l;
510 char *dst_name = (char *) xmalloc (len + 5);
511
512 strcpy (dst_name, output_filename);
513 strcat (dst_name, ".exe");
514 src = fopen (output_filename, FOPEN_RB);
515 dst = fopen (dst_name, FOPEN_WB);
516
517 if (!src)
518 einfo (_("%F%P: unable to open for source of copy `%s'\n"),
519 output_filename);
520 if (!dst)
521 einfo (_("%F%P: unable to open for destination of copy `%s'\n"),
522 dst_name);
523 while ((l = fread (buf, 1, bsize, src)) > 0)
524 {
525 int done = fwrite (buf, 1, l, dst);
526
527 if (done != l)
528 einfo (_("%P: error writing file `%s'\n"), dst_name);
529 }
530
531 fclose (src);
532 if (fclose (dst) == EOF)
533 einfo (_("%P: error closing file `%s'\n"), dst_name);
534 free (dst_name);
535 free (buf);
536 }
537 }
538 }
539
540 END_PROGRESS (program_name);
541
542 if (config.stats)
543 {
544 long run_time = get_run_time () - start_time;
545
546 fflush (stdout);
547 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
548 program_name, run_time / 1000000, run_time % 1000000);
549 fflush (stderr);
550 }
551
552 /* Prevent ld_cleanup from doing anything, after a successful link. */
553 output_filename = NULL;
554
555 xexit (0);
556 return 0;
557 }
558
559 /* If the configured sysroot is relocatable, try relocating it based on
560 default prefix FROM. Return the relocated directory if it exists,
561 otherwise return null. */
562
563 static char *
564 get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
565 {
566 #ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
567 char *path;
568 struct stat s;
569
570 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
571 if (path)
572 {
573 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
574 return path;
575 free (path);
576 }
577 #endif
578 return 0;
579 }
580
581 /* Return the sysroot directory. Return "" if no sysroot is being used. */
582
583 static const char *
584 get_sysroot (int argc, char **argv)
585 {
586 int i;
587 const char *path;
588
589 for (i = 1; i < argc; i++)
590 if (CONST_STRNEQ (argv[i], "--sysroot="))
591 return argv[i] + strlen ("--sysroot=");
592
593 path = get_relative_sysroot (BINDIR);
594 if (path)
595 return path;
596
597 path = get_relative_sysroot (TOOLBINDIR);
598 if (path)
599 return path;
600
601 return TARGET_SYSTEM_ROOT;
602 }
603
604 /* We need to find any explicitly given emulation in order to initialize the
605 state that's needed by the lex&yacc argument parser (parse_args). */
606
607 static char *
608 get_emulation (int argc, char **argv)
609 {
610 char *emulation;
611 int i;
612
613 emulation = getenv (EMULATION_ENVIRON);
614 if (emulation == NULL)
615 emulation = DEFAULT_EMULATION;
616
617 for (i = 1; i < argc; i++)
618 {
619 if (CONST_STRNEQ (argv[i], "-m"))
620 {
621 if (argv[i][2] == '\0')
622 {
623 /* -m EMUL */
624 if (i < argc - 1)
625 {
626 emulation = argv[i + 1];
627 i++;
628 }
629 else
630 einfo (_("%F%P: missing argument to -m\n"));
631 }
632 else if (strcmp (argv[i], "-mips1") == 0
633 || strcmp (argv[i], "-mips2") == 0
634 || strcmp (argv[i], "-mips3") == 0
635 || strcmp (argv[i], "-mips4") == 0
636 || strcmp (argv[i], "-mips5") == 0
637 || strcmp (argv[i], "-mips32") == 0
638 || strcmp (argv[i], "-mips32r2") == 0
639 || strcmp (argv[i], "-mips32r6") == 0
640 || strcmp (argv[i], "-mips64") == 0
641 || strcmp (argv[i], "-mips64r2") == 0
642 || strcmp (argv[i], "-mips64r6") == 0)
643 {
644 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
645 passed to the linker by some MIPS compilers. They
646 generally tell the linker to use a slightly different
647 library path. Perhaps someday these should be
648 implemented as emulations; until then, we just ignore
649 the arguments and hope that nobody ever creates
650 emulations named ips1, ips2 or ips3. */
651 }
652 else if (strcmp (argv[i], "-m486") == 0)
653 {
654 /* FIXME: The argument -m486 is passed to the linker on
655 some Linux systems. Hope that nobody creates an
656 emulation named 486. */
657 }
658 else
659 {
660 /* -mEMUL */
661 emulation = &argv[i][2];
662 }
663 }
664 }
665
666 return emulation;
667 }
668
669 void
670 add_ysym (const char *name)
671 {
672 if (link_info.notice_hash == NULL)
673 {
674 link_info.notice_hash
675 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
676 if (!bfd_hash_table_init_n (link_info.notice_hash,
677 bfd_hash_newfunc,
678 sizeof (struct bfd_hash_entry),
679 61))
680 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
681 }
682
683 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
684 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
685 }
686
687 void
688 add_ignoresym (struct bfd_link_info *info, const char *name)
689 {
690 if (info->ignore_hash == NULL)
691 {
692 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
693 if (!bfd_hash_table_init_n (info->ignore_hash,
694 bfd_hash_newfunc,
695 sizeof (struct bfd_hash_entry),
696 61))
697 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
698 }
699
700 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
701 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
702 }
703
704 /* Record a symbol to be wrapped, from the --wrap option. */
705
706 void
707 add_wrap (const char *name)
708 {
709 if (link_info.wrap_hash == NULL)
710 {
711 link_info.wrap_hash
712 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
713 if (!bfd_hash_table_init_n (link_info.wrap_hash,
714 bfd_hash_newfunc,
715 sizeof (struct bfd_hash_entry),
716 61))
717 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
718 }
719
720 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
721 einfo (_("%F%P: bfd_hash_lookup failed: %E\n"));
722 }
723
724 /* Handle the -retain-symbols-file option. */
725
726 void
727 add_keepsyms_file (const char *filename)
728 {
729 FILE *file;
730 char *buf;
731 size_t bufsize;
732 int c;
733
734 if (link_info.strip == strip_some)
735 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
736
737 file = fopen (filename, "r");
738 if (file == NULL)
739 {
740 bfd_set_error (bfd_error_system_call);
741 einfo ("%X%P: %s: %E\n", filename);
742 return;
743 }
744
745 link_info.keep_hash = (struct bfd_hash_table *)
746 xmalloc (sizeof (struct bfd_hash_table));
747 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
748 sizeof (struct bfd_hash_entry)))
749 einfo (_("%F%P: bfd_hash_table_init failed: %E\n"));
750
751 bufsize = 100;
752 buf = (char *) xmalloc (bufsize);
753
754 c = getc (file);
755 while (c != EOF)
756 {
757 while (ISSPACE (c))
758 c = getc (file);
759
760 if (c != EOF)
761 {
762 size_t len = 0;
763
764 while (!ISSPACE (c) && c != EOF)
765 {
766 buf[len] = c;
767 ++len;
768 if (len >= bufsize)
769 {
770 bufsize *= 2;
771 buf = (char *) xrealloc (buf, bufsize);
772 }
773 c = getc (file);
774 }
775
776 buf[len] = '\0';
777
778 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
779 einfo (_("%F%P: bfd_hash_lookup for insertion failed: %E\n"));
780 }
781 }
782
783 if (link_info.strip != strip_none)
784 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
785
786 free (buf);
787 link_info.strip = strip_some;
788 fclose (file);
789 }
790
791 /* Callbacks from the BFD linker routines. */
793
794 /* This is called when BFD has decided to include an archive member in
795 a link. */
796
797 static bfd_boolean
798 add_archive_element (struct bfd_link_info *info,
799 bfd *abfd,
800 const char *name,
801 bfd **subsbfd ATTRIBUTE_UNUSED)
802 {
803 lang_input_statement_type *input;
804 lang_input_statement_type *parent;
805 lang_input_statement_type orig_input;
806
807 input = (lang_input_statement_type *)
808 xcalloc (1, sizeof (lang_input_statement_type));
809 input->header.type = lang_input_statement_enum;
810 input->filename = abfd->filename;
811 input->local_sym_name = abfd->filename;
812 input->the_bfd = abfd;
813
814 parent = abfd->my_archive->usrdata;
815 if (parent != NULL && !parent->flags.reload)
816 parent->next = (lang_statement_union_type *) input;
817
818 /* Save the original data for trace files/tries below, as plugins
819 (if enabled) may possibly alter it to point to a replacement
820 BFD, but we still want to output the original BFD filename. */
821 orig_input = *input;
822 #ifdef ENABLE_PLUGINS
823 if (link_info.lto_plugin_active)
824 {
825 /* We must offer this archive member to the plugins to claim. */
826 plugin_maybe_claim (input);
827 if (input->flags.claimed)
828 {
829 if (no_more_claiming)
830 {
831 /* Don't claim new IR symbols after all IR symbols have
832 been claimed. */
833 if (trace_files || verbose)
834 info_msg ("%pI: no new IR symbols to claimi\n",
835 &orig_input);
836 input->flags.claimed = 0;
837 return FALSE;
838 }
839 input->flags.claim_archive = TRUE;
840 *subsbfd = input->the_bfd;
841 }
842 }
843 #endif /* ENABLE_PLUGINS */
844
845 ldlang_add_file (input);
846
847 if (config.map_file != NULL)
848 {
849 static bfd_boolean header_printed;
850 struct bfd_link_hash_entry *h;
851 bfd *from;
852 int len;
853
854 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
855
856 if (h == NULL)
857 from = NULL;
858 else
859 {
860 switch (h->type)
861 {
862 default:
863 from = NULL;
864 break;
865
866 case bfd_link_hash_defined:
867 case bfd_link_hash_defweak:
868 from = h->u.def.section->owner;
869 break;
870
871 case bfd_link_hash_undefined:
872 case bfd_link_hash_undefweak:
873 from = h->u.undef.abfd;
874 break;
875
876 case bfd_link_hash_common:
877 from = h->u.c.p->section->owner;
878 break;
879 }
880 }
881
882 if (!header_printed)
883 {
884 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
885 header_printed = TRUE;
886 }
887
888 if (abfd->my_archive == NULL
889 || bfd_is_thin_archive (abfd->my_archive))
890 {
891 minfo ("%s", bfd_get_filename (abfd));
892 len = strlen (bfd_get_filename (abfd));
893 }
894 else
895 {
896 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
897 bfd_get_filename (abfd));
898 len = (strlen (bfd_get_filename (abfd->my_archive))
899 + strlen (bfd_get_filename (abfd))
900 + 2);
901 }
902
903 if (len >= 29)
904 {
905 print_nl ();
906 len = 0;
907 }
908 while (len < 30)
909 {
910 print_space ();
911 ++len;
912 }
913
914 if (from != NULL)
915 minfo ("%pB ", from);
916 if (h != NULL)
917 minfo ("(%pT)\n", h->root.string);
918 else
919 minfo ("(%s)\n", name);
920 }
921
922 if (trace_files || verbose)
923 info_msg ("%pI\n", &orig_input);
924 return TRUE;
925 }
926
927 /* This is called when BFD has discovered a symbol which is defined
928 multiple times. */
929
930 static void
931 multiple_definition (struct bfd_link_info *info,
932 struct bfd_link_hash_entry *h,
933 bfd *nbfd,
934 asection *nsec,
935 bfd_vma nval)
936 {
937 const char *name;
938 bfd *obfd;
939 asection *osec;
940 bfd_vma oval;
941
942 if (info->allow_multiple_definition)
943 return;
944
945 switch (h->type)
946 {
947 case bfd_link_hash_defined:
948 osec = h->u.def.section;
949 oval = h->u.def.value;
950 obfd = h->u.def.section->owner;
951 break;
952 case bfd_link_hash_indirect:
953 osec = bfd_ind_section_ptr;
954 oval = 0;
955 obfd = NULL;
956 break;
957 default:
958 abort ();
959 }
960
961 /* Ignore a redefinition of an absolute symbol to the
962 same value; it's harmless. */
963 if (h->type == bfd_link_hash_defined
964 && bfd_is_abs_section (osec)
965 && bfd_is_abs_section (nsec)
966 && nval == oval)
967 return;
968
969 /* If either section has the output_section field set to
970 bfd_abs_section_ptr, it means that the section is being
971 discarded, and this is not really a multiple definition at all.
972 FIXME: It would be cleaner to somehow ignore symbols defined in
973 sections which are being discarded. */
974 if (!info->prohibit_multiple_definition_absolute
975 && ((osec->output_section != NULL
976 && ! bfd_is_abs_section (osec)
977 && bfd_is_abs_section (osec->output_section))
978 || (nsec->output_section != NULL
979 && !bfd_is_abs_section (nsec)
980 && bfd_is_abs_section (nsec->output_section))))
981 return;
982
983 name = h->root.string;
984 if (nbfd == NULL)
985 {
986 nbfd = obfd;
987 nsec = osec;
988 nval = oval;
989 obfd = NULL;
990 }
991 einfo (_("%X%P: %C: multiple definition of `%pT'"),
992 nbfd, nsec, nval, name);
993 if (obfd != NULL)
994 einfo (_("; %D: first defined here"), obfd, osec, oval);
995 einfo ("\n");
996
997 if (RELAXATION_ENABLED_BY_USER)
998 {
999 einfo (_("%P: disabling relaxation; it will not work with multiple definitions\n"));
1000 DISABLE_RELAXATION;
1001 }
1002 }
1003
1004 /* This is called when there is a definition of a common symbol, or
1005 when a common symbol is found for a symbol that is already defined,
1006 or when two common symbols are found. We only do something if
1007 -warn-common was used. */
1008
1009 static void
1010 multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1011 struct bfd_link_hash_entry *h,
1012 bfd *nbfd,
1013 enum bfd_link_hash_type ntype,
1014 bfd_vma nsize)
1015 {
1016 const char *name;
1017 bfd *obfd;
1018 enum bfd_link_hash_type otype;
1019 bfd_vma osize;
1020
1021 if (!config.warn_common)
1022 return;
1023
1024 name = h->root.string;
1025 otype = h->type;
1026 if (otype == bfd_link_hash_common)
1027 {
1028 obfd = h->u.c.p->section->owner;
1029 osize = h->u.c.size;
1030 }
1031 else if (otype == bfd_link_hash_defined
1032 || otype == bfd_link_hash_defweak)
1033 {
1034 obfd = h->u.def.section->owner;
1035 osize = 0;
1036 }
1037 else
1038 {
1039 /* FIXME: It would nice if we could report the BFD which defined
1040 an indirect symbol, but we don't have anywhere to store the
1041 information. */
1042 obfd = NULL;
1043 osize = 0;
1044 }
1045
1046 if (ntype == bfd_link_hash_defined
1047 || ntype == bfd_link_hash_defweak
1048 || ntype == bfd_link_hash_indirect)
1049 {
1050 ASSERT (otype == bfd_link_hash_common);
1051 if (obfd != NULL)
1052 einfo (_("%P: %pB: warning: definition of `%pT' overriding common"
1053 " from %pB\n"),
1054 nbfd, name, obfd);
1055 else
1056 einfo (_("%P: %pB: warning: definition of `%pT' overriding common\n"),
1057 nbfd, name);
1058 }
1059 else if (otype == bfd_link_hash_defined
1060 || otype == bfd_link_hash_defweak
1061 || otype == bfd_link_hash_indirect)
1062 {
1063 ASSERT (ntype == bfd_link_hash_common);
1064 if (obfd != NULL)
1065 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition"
1066 " from %pB\n"),
1067 nbfd, name, obfd);
1068 else
1069 einfo (_("%P: %pB: warning: common of `%pT' overridden by definition\n"),
1070 nbfd, name);
1071 }
1072 else
1073 {
1074 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1075 if (osize > nsize)
1076 {
1077 if (obfd != NULL)
1078 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1079 " by larger common from %pB\n"),
1080 nbfd, name, obfd);
1081 else
1082 einfo (_("%P: %pB: warning: common of `%pT' overridden"
1083 " by larger common\n"),
1084 nbfd, name);
1085 }
1086 else if (nsize > osize)
1087 {
1088 if (obfd != NULL)
1089 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1090 " smaller common from %pB\n"),
1091 nbfd, name, obfd);
1092 else
1093 einfo (_("%P: %pB: warning: common of `%pT' overriding"
1094 " smaller common\n"),
1095 nbfd, name);
1096 }
1097 else
1098 {
1099 if (obfd != NULL)
1100 einfo (_("%P: %pB and %pB: warning: multiple common of `%pT'\n"),
1101 nbfd, obfd, name);
1102 else
1103 einfo (_("%P: %pB: warning: multiple common of `%pT'\n"),
1104 nbfd, name);
1105 }
1106 }
1107 }
1108
1109 /* This is called when BFD has discovered a set element. H is the
1110 entry in the linker hash table for the set. SECTION and VALUE
1111 represent a value which should be added to the set. */
1112
1113 static void
1114 add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1115 struct bfd_link_hash_entry *h,
1116 bfd_reloc_code_real_type reloc,
1117 bfd *abfd,
1118 asection *section,
1119 bfd_vma value)
1120 {
1121 if (config.warn_constructors)
1122 einfo (_("%P: warning: global constructor %s used\n"),
1123 h->root.string);
1124
1125 if (!config.build_constructors)
1126 return;
1127
1128 ldctor_add_set_entry (h, reloc, NULL, section, value);
1129
1130 if (h->type == bfd_link_hash_new)
1131 {
1132 h->type = bfd_link_hash_undefined;
1133 h->u.undef.abfd = abfd;
1134 /* We don't call bfd_link_add_undef to add this to the list of
1135 undefined symbols because we are going to define it
1136 ourselves. */
1137 }
1138 }
1139
1140 /* This is called when BFD has discovered a constructor. This is only
1141 called for some object file formats--those which do not handle
1142 constructors in some more clever fashion. This is similar to
1143 adding an element to a set, but less general. */
1144
1145 static void
1146 constructor_callback (struct bfd_link_info *info,
1147 bfd_boolean constructor,
1148 const char *name,
1149 bfd *abfd,
1150 asection *section,
1151 bfd_vma value)
1152 {
1153 char *s;
1154 struct bfd_link_hash_entry *h;
1155 char set_name[1 + sizeof "__CTOR_LIST__"];
1156
1157 if (config.warn_constructors)
1158 einfo (_("%P: warning: global constructor %s used\n"), name);
1159
1160 if (!config.build_constructors)
1161 return;
1162
1163 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1164 useful error message. */
1165 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
1166 && (bfd_link_relocatable (info)
1167 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1168 einfo (_("%F%P: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1169
1170 s = set_name;
1171 if (bfd_get_symbol_leading_char (abfd) != '\0')
1172 *s++ = bfd_get_symbol_leading_char (abfd);
1173 if (constructor)
1174 strcpy (s, "__CTOR_LIST__");
1175 else
1176 strcpy (s, "__DTOR_LIST__");
1177
1178 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
1179 if (h == (struct bfd_link_hash_entry *) NULL)
1180 einfo (_("%F%P: bfd_link_hash_lookup failed: %E\n"));
1181 if (h->type == bfd_link_hash_new)
1182 {
1183 h->type = bfd_link_hash_undefined;
1184 h->u.undef.abfd = abfd;
1185 /* We don't call bfd_link_add_undef to add this to the list of
1186 undefined symbols because we are going to define it
1187 ourselves. */
1188 }
1189
1190 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
1191 }
1192
1193 /* A structure used by warning_callback to pass information through
1194 bfd_map_over_sections. */
1195
1196 struct warning_callback_info
1197 {
1198 bfd_boolean found;
1199 const char *warning;
1200 const char *symbol;
1201 asymbol **asymbols;
1202 };
1203
1204 /* Look through the relocs to see if we can find a plausible address
1205 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1206
1207 static bfd_boolean
1208 symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1209 {
1210 struct warning_callback_info cinfo;
1211
1212 if (!bfd_generic_link_read_symbols (abfd))
1213 einfo (_("%F%P: %pB: could not read symbols: %E\n"), abfd);
1214
1215 cinfo.found = FALSE;
1216 cinfo.warning = warning;
1217 cinfo.symbol = symbol;
1218 cinfo.asymbols = bfd_get_outsymbols (abfd);
1219 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1220 return cinfo.found;
1221 }
1222
1223 /* This is called when there is a reference to a warning symbol. */
1224
1225 static void
1226 warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1227 const char *warning,
1228 const char *symbol,
1229 bfd *abfd,
1230 asection *section,
1231 bfd_vma address)
1232 {
1233 /* This is a hack to support warn_multiple_gp. FIXME: This should
1234 have a cleaner interface, but what? */
1235 if (!config.warn_multiple_gp
1236 && strcmp (warning, "using multiple gp values") == 0)
1237 return;
1238
1239 if (section != NULL)
1240 einfo ("%P: %C: %s%s\n", abfd, section, address, _("warning: "), warning);
1241 else if (abfd == NULL)
1242 einfo ("%P: %s%s\n", _("warning: "), warning);
1243 else if (symbol == NULL)
1244 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1245 else if (!symbol_warning (warning, symbol, abfd))
1246 {
1247 bfd *b;
1248 /* Search all input files for a reference to SYMBOL. */
1249 for (b = info->input_bfds; b; b = b->link.next)
1250 if (b != abfd && symbol_warning (warning, symbol, b))
1251 return;
1252 einfo ("%P: %pB: %s%s\n", abfd, _("warning: "), warning);
1253 }
1254 }
1255
1256 /* This is called by warning_callback for each section. It checks the
1257 relocs of the section to see if it can find a reference to the
1258 symbol which triggered the warning. If it can, it uses the reloc
1259 to give an error message with a file and line number. */
1260
1261 static void
1262 warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
1263 {
1264 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
1265 long relsize;
1266 arelent **relpp;
1267 long relcount;
1268 arelent **p, **pend;
1269
1270 if (info->found)
1271 return;
1272
1273 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1274 if (relsize < 0)
1275 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1276 if (relsize == 0)
1277 return;
1278
1279 relpp = (arelent **) xmalloc (relsize);
1280 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1281 if (relcount < 0)
1282 einfo (_("%F%P: %pB: could not read relocs: %E\n"), abfd);
1283
1284 p = relpp;
1285 pend = p + relcount;
1286 for (; p < pend && *p != NULL; p++)
1287 {
1288 arelent *q = *p;
1289
1290 if (q->sym_ptr_ptr != NULL
1291 && *q->sym_ptr_ptr != NULL
1292 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1293 {
1294 /* We found a reloc for the symbol we are looking for. */
1295 einfo ("%P: %C: %s%s\n", abfd, sec, q->address, _("warning: "),
1296 info->warning);
1297 info->found = TRUE;
1298 break;
1299 }
1300 }
1301
1302 free (relpp);
1303 }
1304
1305 /* This is called when an undefined symbol is found. */
1306
1307 static void
1308 undefined_symbol (struct bfd_link_info *info,
1309 const char *name,
1310 bfd *abfd,
1311 asection *section,
1312 bfd_vma address,
1313 bfd_boolean error)
1314 {
1315 static char *error_name;
1316 static unsigned int error_count;
1317
1318 #define MAX_ERRORS_IN_A_ROW 5
1319
1320 if (info->ignore_hash != NULL
1321 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1322 return;
1323
1324 if (config.warn_once)
1325 {
1326 /* Only warn once about a particular undefined symbol. */
1327 add_ignoresym (info, name);
1328 }
1329
1330 /* We never print more than a reasonable number of errors in a row
1331 for a single symbol. */
1332 if (error_name != NULL
1333 && strcmp (name, error_name) == 0)
1334 ++error_count;
1335 else
1336 {
1337 error_count = 0;
1338 if (error_name != NULL)
1339 free (error_name);
1340 error_name = xstrdup (name);
1341 }
1342
1343 if (section != NULL)
1344 {
1345 if (error_count < MAX_ERRORS_IN_A_ROW)
1346 {
1347 if (error)
1348 einfo (_("%X%P: %C: undefined reference to `%pT'\n"),
1349 abfd, section, address, name);
1350 else
1351 einfo (_("%P: %C: warning: undefined reference to `%pT'\n"),
1352 abfd, section, address, name);
1353 }
1354 else if (error_count == MAX_ERRORS_IN_A_ROW)
1355 {
1356 if (error)
1357 einfo (_("%X%P: %D: more undefined references to `%pT' follow\n"),
1358 abfd, section, address, name);
1359 else
1360 einfo (_("%P: %D: warning: more undefined references to `%pT' follow\n"),
1361 abfd, section, address, name);
1362 }
1363 else if (error)
1364 einfo ("%X");
1365 }
1366 else
1367 {
1368 if (error_count < MAX_ERRORS_IN_A_ROW)
1369 {
1370 if (error)
1371 einfo (_("%X%P: %pB: undefined reference to `%pT'\n"),
1372 abfd, name);
1373 else
1374 einfo (_("%P: %pB: warning: undefined reference to `%pT'\n"),
1375 abfd, name);
1376 }
1377 else if (error_count == MAX_ERRORS_IN_A_ROW)
1378 {
1379 if (error)
1380 einfo (_("%X%P: %pB: more undefined references to `%pT' follow\n"),
1381 abfd, name);
1382 else
1383 einfo (_("%P: %pB: warning: more undefined references to `%pT' follow\n"),
1384 abfd, name);
1385 }
1386 else if (error)
1387 einfo ("%X");
1388 }
1389 }
1390
1391 /* Counter to limit the number of relocation overflow error messages
1392 to print. Errors are printed as it is decremented. When it's
1393 called and the counter is zero, a final message is printed
1394 indicating more relocations were omitted. When it gets to -1, no
1395 such errors are printed. If it's initially set to a value less
1396 than -1, all such errors will be printed (--verbose does this). */
1397
1398 int overflow_cutoff_limit = 10;
1399
1400 /* This is called when a reloc overflows. */
1401
1402 static void
1403 reloc_overflow (struct bfd_link_info *info,
1404 struct bfd_link_hash_entry *entry,
1405 const char *name,
1406 const char *reloc_name,
1407 bfd_vma addend,
1408 bfd *abfd,
1409 asection *section,
1410 bfd_vma address)
1411 {
1412 if (overflow_cutoff_limit == -1)
1413 return;
1414
1415 einfo ("%X%P: %H:", abfd, section, address);
1416
1417 if (overflow_cutoff_limit >= 0
1418 && overflow_cutoff_limit-- == 0)
1419 {
1420 einfo (_(" additional relocation overflows omitted from the output\n"));
1421 return;
1422 }
1423
1424 if (entry)
1425 {
1426 while (entry->type == bfd_link_hash_indirect
1427 || entry->type == bfd_link_hash_warning)
1428 entry = entry->u.i.link;
1429 switch (entry->type)
1430 {
1431 case bfd_link_hash_undefined:
1432 case bfd_link_hash_undefweak:
1433 einfo (_(" relocation truncated to fit: "
1434 "%s against undefined symbol `%pT'"),
1435 reloc_name, entry->root.string);
1436 break;
1437 case bfd_link_hash_defined:
1438 case bfd_link_hash_defweak:
1439 einfo (_(" relocation truncated to fit: "
1440 "%s against symbol `%pT' defined in %pA section in %pB"),
1441 reloc_name, entry->root.string,
1442 entry->u.def.section,
1443 entry->u.def.section == bfd_abs_section_ptr
1444 ? info->output_bfd : entry->u.def.section->owner);
1445 break;
1446 default:
1447 abort ();
1448 break;
1449 }
1450 }
1451 else
1452 einfo (_(" relocation truncated to fit: %s against `%pT'"),
1453 reloc_name, name);
1454 if (addend != 0)
1455 einfo ("+%v", addend);
1456 einfo ("\n");
1457 }
1458
1459 /* This is called when a dangerous relocation is made. */
1460
1461 static void
1462 reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1463 const char *message,
1464 bfd *abfd,
1465 asection *section,
1466 bfd_vma address)
1467 {
1468 einfo (_("%X%P: %H: dangerous relocation: %s\n"),
1469 abfd, section, address, message);
1470 }
1471
1472 /* This is called when a reloc is being generated attached to a symbol
1473 that is not being output. */
1474
1475 static void
1476 unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1477 const char *name,
1478 bfd *abfd,
1479 asection *section,
1480 bfd_vma address)
1481 {
1482 einfo (_("%X%P: %H: reloc refers to symbol `%pT' which is not being output\n"),
1483 abfd, section, address, name);
1484 }
1485
1486 /* This is called if link_info.notice_all is set, or when a symbol in
1487 link_info.notice_hash is found. Symbols are put in notice_hash
1488 using the -y option, while notice_all is set if the --cref option
1489 has been supplied, or if there are any NOCROSSREFS sections in the
1490 linker script; and if plugins are active, since they need to monitor
1491 all references from non-IR files. */
1492
1493 static bfd_boolean
1494 notice (struct bfd_link_info *info,
1495 struct bfd_link_hash_entry *h,
1496 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1497 bfd *abfd,
1498 asection *section,
1499 bfd_vma value,
1500 flagword flags ATTRIBUTE_UNUSED)
1501 {
1502 const char *name;
1503
1504 if (h == NULL)
1505 {
1506 if (command_line.cref || nocrossref_list != NULL)
1507 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
1508 return TRUE;
1509 }
1510
1511 name = h->root.string;
1512 if (info->notice_hash != NULL
1513 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
1514 {
1515 if (bfd_is_und_section (section))
1516 einfo (_("%P: %pB: reference to %s\n"), abfd, name);
1517 else
1518 einfo (_("%P: %pB: definition of %s\n"), abfd, name);
1519 }
1520
1521 if (command_line.cref || nocrossref_list != NULL)
1522 add_cref (name, abfd, section, value);
1523
1524 return TRUE;
1525 }
1526