2012-03-26 19:18:29 +00:00
|
|
|
|
/* Main program of GNU linker.
|
2017-04-10 11:32:00 +00:00
|
|
|
|
Copyright (C) 1991-2017 Free Software Foundation, Inc.
|
2012-03-26 19:18:29 +00:00
|
|
|
|
Written by Steve Chamberlain steve@cygnus.com
|
|
|
|
|
|
|
|
|
|
This file is part of the GNU Binutils.
|
|
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
|
along with this program; if not, write to the Free Software
|
|
|
|
|
Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
|
|
|
|
|
MA 02110-1301, USA. */
|
|
|
|
|
|
|
|
|
|
#include "sysdep.h"
|
|
|
|
|
#include "bfd.h"
|
|
|
|
|
#include "safe-ctype.h"
|
|
|
|
|
#include "libiberty.h"
|
|
|
|
|
#include "progress.h"
|
|
|
|
|
#include "bfdlink.h"
|
|
|
|
|
#include "filenames.h"
|
|
|
|
|
|
|
|
|
|
#include "ld.h"
|
|
|
|
|
#include "ldmain.h"
|
|
|
|
|
#include "ldmisc.h"
|
|
|
|
|
#include "ldwrite.h"
|
|
|
|
|
#include "ldexp.h"
|
|
|
|
|
#include "ldlang.h"
|
|
|
|
|
#include <ldgram.h>
|
|
|
|
|
#include "ldlex.h"
|
|
|
|
|
#include "ldfile.h"
|
|
|
|
|
#include "ldemul.h"
|
|
|
|
|
#include "ldctor.h"
|
2014-09-12 22:14:23 +00:00
|
|
|
|
#ifdef ENABLE_PLUGINS
|
|
|
|
|
#include "plugin.h"
|
|
|
|
|
#include "plugin-api.h"
|
|
|
|
|
#endif /* ENABLE_PLUGINS */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
/* Somewhere above, sys/stat.h got included. */
|
|
|
|
|
#if !defined(S_ISDIR) && defined(S_IFDIR)
|
|
|
|
|
#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
|
|
#ifdef HAVE_SBRK
|
|
|
|
|
#if !HAVE_DECL_SBRK
|
|
|
|
|
extern void *sbrk ();
|
|
|
|
|
#endif
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
#ifndef TARGET_SYSTEM_ROOT
|
|
|
|
|
#define TARGET_SYSTEM_ROOT ""
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
/* EXPORTS */
|
|
|
|
|
|
|
|
|
|
FILE *saved_script_handle = NULL;
|
|
|
|
|
FILE *previous_script_handle = NULL;
|
|
|
|
|
bfd_boolean force_make_executable = FALSE;
|
|
|
|
|
|
|
|
|
|
char *default_target;
|
|
|
|
|
const char *output_filename = "a.out";
|
|
|
|
|
|
|
|
|
|
/* Name this program was invoked by. */
|
|
|
|
|
char *program_name;
|
|
|
|
|
|
|
|
|
|
/* The prefix for system library directories. */
|
|
|
|
|
const char *ld_sysroot;
|
|
|
|
|
|
|
|
|
|
/* The canonical representation of ld_sysroot. */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
char *ld_canon_sysroot;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
int ld_canon_sysroot_len;
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* Set by -G argument, for targets like MIPS ELF. */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
int g_switch_value = 8;
|
|
|
|
|
|
|
|
|
|
/* Nonzero means print names of input files as processed. */
|
|
|
|
|
bfd_boolean trace_files;
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
|
|
|
|
|
bfd_boolean verbose;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
/* Nonzero means version number was printed, so exit successfully
|
|
|
|
|
instead of complaining if no input files are given. */
|
|
|
|
|
bfd_boolean version_printed;
|
|
|
|
|
|
|
|
|
|
/* TRUE if we should demangle symbol names. */
|
|
|
|
|
bfd_boolean demangling;
|
|
|
|
|
|
|
|
|
|
args_type command_line;
|
|
|
|
|
|
|
|
|
|
ld_config_type config;
|
|
|
|
|
|
|
|
|
|
sort_type sort_section;
|
|
|
|
|
|
|
|
|
|
static const char *get_sysroot
|
|
|
|
|
(int, char **);
|
|
|
|
|
static char *get_emulation
|
|
|
|
|
(int, char **);
|
|
|
|
|
static bfd_boolean add_archive_element
|
2014-09-12 22:14:23 +00:00
|
|
|
|
(struct bfd_link_info *, bfd *, const char *, bfd **);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void multiple_definition
|
2014-09-12 22:14:23 +00:00
|
|
|
|
(struct bfd_link_info *, struct bfd_link_hash_entry *,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
bfd *, asection *, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void multiple_common
|
2014-09-12 22:14:23 +00:00
|
|
|
|
(struct bfd_link_info *, struct bfd_link_hash_entry *,
|
|
|
|
|
bfd *, enum bfd_link_hash_type, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void add_to_set
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, struct bfd_link_hash_entry *,
|
|
|
|
|
bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void constructor_callback
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, bfd_boolean, const char *, bfd *,
|
|
|
|
|
asection *, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void warning_callback
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, const char *, const char *, bfd *,
|
|
|
|
|
asection *, bfd_vma);
|
|
|
|
|
static void warning_find_reloc
|
|
|
|
|
(bfd *, asection *, void *);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void undefined_symbol
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
|
|
|
|
|
bfd_boolean);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void reloc_overflow
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
|
|
|
|
|
const char *, bfd_vma, bfd *, asection *, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void reloc_dangerous
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void unattached_reloc
|
2012-03-26 19:18:29 +00:00
|
|
|
|
(struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
|
|
|
|
|
static bfd_boolean notice
|
2014-09-12 22:14:23 +00:00
|
|
|
|
(struct bfd_link_info *, struct bfd_link_hash_entry *,
|
2015-08-28 15:32:19 +00:00
|
|
|
|
struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
static struct bfd_link_callbacks link_callbacks =
|
|
|
|
|
{
|
|
|
|
|
add_archive_element,
|
|
|
|
|
multiple_definition,
|
|
|
|
|
multiple_common,
|
|
|
|
|
add_to_set,
|
|
|
|
|
constructor_callback,
|
|
|
|
|
warning_callback,
|
|
|
|
|
undefined_symbol,
|
|
|
|
|
reloc_overflow,
|
|
|
|
|
reloc_dangerous,
|
|
|
|
|
unattached_reloc,
|
|
|
|
|
notice,
|
|
|
|
|
einfo,
|
|
|
|
|
info_msg,
|
|
|
|
|
minfo,
|
|
|
|
|
ldlang_override_segment_assignment
|
|
|
|
|
};
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
static bfd_assert_handler_type default_bfd_assert_handler;
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static bfd_error_handler_type default_bfd_error_handler;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
struct bfd_link_info link_info;
|
|
|
|
|
|
|
|
|
|
static void
|
2014-09-12 22:14:23 +00:00
|
|
|
|
ld_cleanup (void)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
bfd_cache_close_all ();
|
|
|
|
|
#ifdef ENABLE_PLUGINS
|
|
|
|
|
plugin_call_cleanup ();
|
|
|
|
|
#endif
|
|
|
|
|
if (output_filename && delete_output_file_on_failure)
|
|
|
|
|
unlink_if_ordinary (output_filename);
|
|
|
|
|
}
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
/* Hook to notice BFD assertions. */
|
2014-09-12 22:14:23 +00:00
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ld_bfd_assert_handler (const char *fmt, const char *bfdver,
|
|
|
|
|
const char *file, int line)
|
|
|
|
|
{
|
|
|
|
|
config.make_executable = FALSE;
|
2017-04-10 11:32:00 +00:00
|
|
|
|
(*default_bfd_assert_handler) (fmt, bfdver, file, line);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Hook the bfd error/warning handler for --fatal-warnings. */
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ld_bfd_error_handler (const char *fmt, va_list ap)
|
|
|
|
|
{
|
|
|
|
|
if (config.fatal_warnings)
|
|
|
|
|
config.make_executable = FALSE;
|
|
|
|
|
(*default_bfd_error_handler) (fmt, ap);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
|
main (int argc, char **argv)
|
|
|
|
|
{
|
|
|
|
|
char *emulation;
|
|
|
|
|
long start_time = get_run_time ();
|
2014-09-12 22:14:23 +00:00
|
|
|
|
#ifdef HAVE_SBRK
|
|
|
|
|
char *start_sbrk = (char *) sbrk (0);
|
|
|
|
|
#endif
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
|
|
|
|
|
setlocale (LC_MESSAGES, "");
|
|
|
|
|
#endif
|
|
|
|
|
#if defined (HAVE_SETLOCALE)
|
|
|
|
|
setlocale (LC_CTYPE, "");
|
|
|
|
|
#endif
|
|
|
|
|
bindtextdomain (PACKAGE, LOCALEDIR);
|
|
|
|
|
textdomain (PACKAGE);
|
|
|
|
|
|
|
|
|
|
program_name = argv[0];
|
|
|
|
|
xmalloc_set_program_name (program_name);
|
|
|
|
|
|
|
|
|
|
START_PROGRESS (program_name, 0);
|
|
|
|
|
|
|
|
|
|
expandargv (&argc, &argv);
|
|
|
|
|
|
|
|
|
|
bfd_init ();
|
|
|
|
|
|
|
|
|
|
bfd_set_error_program_name (program_name);
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* We want to notice and fail on those nasty BFD assertions which are
|
|
|
|
|
likely to signal incorrect output being generated but otherwise may
|
|
|
|
|
leave no trace. */
|
|
|
|
|
default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
/* Also hook the bfd error/warning handler for --fatal-warnings. */
|
|
|
|
|
default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
xatexit (ld_cleanup);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
/* Set up the sysroot directory. */
|
|
|
|
|
ld_sysroot = get_sysroot (argc, argv);
|
|
|
|
|
if (*ld_sysroot)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
ld_canon_sysroot = lrealpath (ld_sysroot);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (ld_canon_sysroot)
|
|
|
|
|
ld_canon_sysroot_len = strlen (ld_canon_sysroot);
|
|
|
|
|
else
|
|
|
|
|
ld_canon_sysroot_len = -1;
|
|
|
|
|
|
|
|
|
|
/* Set the default BFD target based on the configured target. Doing
|
|
|
|
|
this permits the linker to be configured for a particular target,
|
|
|
|
|
and linked against a shared BFD library which was configured for
|
|
|
|
|
a different target. The macro TARGET is defined by Makefile. */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!bfd_set_default_target (TARGET))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
|
|
|
|
|
xexit (1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#if YYDEBUG
|
|
|
|
|
{
|
|
|
|
|
extern int yydebug;
|
|
|
|
|
yydebug = 1;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
config.build_constructors = TRUE;
|
|
|
|
|
config.rpath_separator = ':';
|
|
|
|
|
config.split_by_reloc = (unsigned) -1;
|
|
|
|
|
config.split_by_file = (bfd_size_type) -1;
|
|
|
|
|
config.make_executable = TRUE;
|
|
|
|
|
config.magic_demand_paged = TRUE;
|
|
|
|
|
config.text_read_only = TRUE;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
link_info.disable_target_specific_optimizations = -1;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
command_line.warn_mismatch = TRUE;
|
|
|
|
|
command_line.warn_search_mismatch = TRUE;
|
|
|
|
|
command_line.check_section_addresses = -1;
|
|
|
|
|
|
|
|
|
|
/* We initialize DEMANGLING based on the environment variable
|
|
|
|
|
COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
|
|
|
|
|
output of the linker, unless COLLECT_NO_DEMANGLE is set in the
|
|
|
|
|
environment. Acting the same way here lets us provide the same
|
|
|
|
|
interface by default. */
|
|
|
|
|
demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
|
|
|
|
|
|
|
|
|
|
link_info.allow_undefined_version = TRUE;
|
|
|
|
|
link_info.keep_memory = TRUE;
|
|
|
|
|
link_info.combreloc = TRUE;
|
|
|
|
|
link_info.strip_discarded = TRUE;
|
|
|
|
|
link_info.emit_hash = TRUE;
|
|
|
|
|
link_info.callbacks = &link_callbacks;
|
|
|
|
|
link_info.input_bfds_tail = &link_info.input_bfds;
|
|
|
|
|
/* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
|
|
|
|
|
and _fini symbols. We are compatible. */
|
|
|
|
|
link_info.init_function = "_init";
|
|
|
|
|
link_info.fini_function = "_fini";
|
|
|
|
|
link_info.relax_pass = 1;
|
2017-04-10 11:32:00 +00:00
|
|
|
|
link_info.extern_protected_data = -1;
|
|
|
|
|
link_info.dynamic_undefined_weak = -1;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
link_info.pei386_auto_import = -1;
|
|
|
|
|
link_info.spare_dynamic_tags = 5;
|
|
|
|
|
link_info.path_separator = ':';
|
2017-04-10 11:32:00 +00:00
|
|
|
|
#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
|
|
|
|
|
link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
|
|
|
|
|
#endif
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
ldfile_add_arch ("");
|
|
|
|
|
emulation = get_emulation (argc, argv);
|
|
|
|
|
ldemul_choose_mode (emulation);
|
|
|
|
|
default_target = ldemul_choose_target (argc, argv);
|
|
|
|
|
config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
|
|
|
|
|
config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
|
|
|
|
|
lang_init ();
|
2015-08-28 15:32:19 +00:00
|
|
|
|
ldexp_init ();
|
2012-03-26 19:18:29 +00:00
|
|
|
|
ldemul_before_parse ();
|
|
|
|
|
lang_has_input_file = FALSE;
|
|
|
|
|
parse_args (argc, argv);
|
|
|
|
|
|
|
|
|
|
if (config.hash_table_size != 0)
|
|
|
|
|
bfd_hash_set_default_size (config.hash_table_size);
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
#ifdef ENABLE_PLUGINS
|
|
|
|
|
/* Now all the plugin arguments have been gathered, we can load them. */
|
|
|
|
|
plugin_load_plugins ();
|
|
|
|
|
#endif /* ENABLE_PLUGINS */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
ldemul_set_symbols ();
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
/* If we have not already opened and parsed a linker script,
|
|
|
|
|
try the default script from command line first. */
|
|
|
|
|
if (saved_script_handle == NULL
|
|
|
|
|
&& command_line.default_script != NULL)
|
|
|
|
|
{
|
|
|
|
|
ldfile_open_command_file (command_line.default_script);
|
|
|
|
|
parser_input = input_script;
|
|
|
|
|
yyparse ();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* If we have not already opened and parsed a linker script
|
|
|
|
|
read the emulation's appropriate default script. */
|
|
|
|
|
if (saved_script_handle == NULL)
|
|
|
|
|
{
|
|
|
|
|
int isfile;
|
|
|
|
|
char *s = ldemul_get_script (&isfile);
|
|
|
|
|
|
|
|
|
|
if (isfile)
|
|
|
|
|
ldfile_open_default_command_file (s);
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
lex_string = s;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
lex_redirect (s, _("built in linker script"), 1);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
parser_input = input_script;
|
|
|
|
|
yyparse ();
|
|
|
|
|
lex_string = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (verbose)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
if (saved_script_handle)
|
|
|
|
|
info_msg (_("using external linker script:"));
|
|
|
|
|
else
|
|
|
|
|
info_msg (_("using internal linker script:"));
|
|
|
|
|
info_msg ("\n==================================================\n");
|
|
|
|
|
|
|
|
|
|
if (saved_script_handle)
|
|
|
|
|
{
|
|
|
|
|
static const int ld_bufsz = 8193;
|
|
|
|
|
size_t n;
|
|
|
|
|
char *buf = (char *) xmalloc (ld_bufsz);
|
|
|
|
|
|
|
|
|
|
rewind (saved_script_handle);
|
|
|
|
|
while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
|
|
|
|
|
{
|
|
|
|
|
buf[n] = 0;
|
2017-04-10 11:32:00 +00:00
|
|
|
|
info_msg ("%s", buf);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
rewind (saved_script_handle);
|
|
|
|
|
free (buf);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
int isfile;
|
|
|
|
|
|
|
|
|
|
info_msg (ldemul_get_script (&isfile));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info_msg ("\n==================================================\n");
|
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (command_line.print_output_format)
|
|
|
|
|
info_msg ("%s\n", lang_get_output_target ());
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
lang_final ();
|
|
|
|
|
|
2015-08-28 15:32:19 +00:00
|
|
|
|
/* If the only command line argument has been -v or --version or --verbose
|
|
|
|
|
then ignore any input files provided by linker scripts and exit now.
|
|
|
|
|
We do not want to create an output file when the linker is just invoked
|
|
|
|
|
to provide version information. */
|
|
|
|
|
if (argc == 2 && version_printed)
|
|
|
|
|
xexit (0);
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (!lang_has_input_file)
|
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (version_printed || command_line.print_output_format)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
xexit (0);
|
|
|
|
|
einfo (_("%P%F: no input files\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (trace_files)
|
|
|
|
|
info_msg (_("%P: mode %s\n"), emulation);
|
|
|
|
|
|
|
|
|
|
ldemul_after_parse ();
|
|
|
|
|
|
|
|
|
|
if (config.map_filename)
|
|
|
|
|
{
|
|
|
|
|
if (strcmp (config.map_filename, "-") == 0)
|
|
|
|
|
{
|
|
|
|
|
config.map_file = stdout;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
config.map_file = fopen (config.map_filename, FOPEN_WT);
|
|
|
|
|
if (config.map_file == (FILE *) NULL)
|
|
|
|
|
{
|
|
|
|
|
bfd_set_error (bfd_error_system_call);
|
|
|
|
|
einfo (_("%P%F: cannot open map file %s: %E\n"),
|
|
|
|
|
config.map_filename);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
lang_process ();
|
|
|
|
|
|
|
|
|
|
/* Print error messages for any missing symbols, for any warning
|
|
|
|
|
symbols, and possibly multiple definitions. */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (bfd_link_relocatable (&link_info))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
link_info.output_bfd->flags &= ~EXEC_P;
|
|
|
|
|
else
|
|
|
|
|
link_info.output_bfd->flags |= EXEC_P;
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if ((link_info.compress_debug & COMPRESS_DEBUG))
|
|
|
|
|
{
|
|
|
|
|
link_info.output_bfd->flags |= BFD_COMPRESS;
|
|
|
|
|
if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
|
|
|
|
|
link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
ldwrite ();
|
|
|
|
|
|
|
|
|
|
if (config.map_file != NULL)
|
|
|
|
|
lang_map ();
|
|
|
|
|
if (command_line.cref)
|
|
|
|
|
output_cref (config.map_file != NULL ? config.map_file : stdout);
|
|
|
|
|
if (nocrossref_list != NULL)
|
|
|
|
|
check_nocrossrefs ();
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (command_line.print_memory_usage)
|
|
|
|
|
lang_print_memory_usage ();
|
2015-08-28 15:32:19 +00:00
|
|
|
|
#if 0
|
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
struct bfd_link_hash_entry *h;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
2015-08-28 15:32:19 +00:00
|
|
|
|
h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
|
|
|
|
|
fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
ldexp_finish ();
|
2012-03-26 19:18:29 +00:00
|
|
|
|
lang_finish ();
|
|
|
|
|
|
|
|
|
|
/* Even if we're producing relocatable output, some non-fatal errors should
|
|
|
|
|
be reported in the exit status. (What non-fatal errors, if any, do we
|
|
|
|
|
want to ignore for relocatable output?) */
|
|
|
|
|
if (!config.make_executable && !force_make_executable)
|
|
|
|
|
{
|
|
|
|
|
if (trace_files)
|
|
|
|
|
einfo (_("%P: link errors found, deleting executable `%s'\n"),
|
|
|
|
|
output_filename);
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* The file will be removed by ld_cleanup. */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
xexit (1);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!bfd_close (link_info.output_bfd))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
|
|
|
|
|
|
|
|
|
|
/* If the --force-exe-suffix is enabled, and we're making an
|
|
|
|
|
executable file and it doesn't end in .exe, copy it to one
|
|
|
|
|
which does. */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!bfd_link_relocatable (&link_info)
|
|
|
|
|
&& command_line.force_exe_suffix)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
int len = strlen (output_filename);
|
|
|
|
|
|
|
|
|
|
if (len < 4
|
|
|
|
|
|| (strcasecmp (output_filename + len - 4, ".exe") != 0
|
|
|
|
|
&& strcasecmp (output_filename + len - 4, ".dll") != 0))
|
|
|
|
|
{
|
|
|
|
|
FILE *src;
|
|
|
|
|
FILE *dst;
|
|
|
|
|
const int bsize = 4096;
|
|
|
|
|
char *buf = (char *) xmalloc (bsize);
|
|
|
|
|
int l;
|
|
|
|
|
char *dst_name = (char *) xmalloc (len + 5);
|
|
|
|
|
|
|
|
|
|
strcpy (dst_name, output_filename);
|
|
|
|
|
strcat (dst_name, ".exe");
|
|
|
|
|
src = fopen (output_filename, FOPEN_RB);
|
|
|
|
|
dst = fopen (dst_name, FOPEN_WB);
|
|
|
|
|
|
|
|
|
|
if (!src)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
einfo (_("%P%F: unable to open for source of copy `%s'\n"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
output_filename);
|
|
|
|
|
if (!dst)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
einfo (_("%P%F: unable to open for destination of copy `%s'\n"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
dst_name);
|
|
|
|
|
while ((l = fread (buf, 1, bsize, src)) > 0)
|
|
|
|
|
{
|
|
|
|
|
int done = fwrite (buf, 1, l, dst);
|
|
|
|
|
|
|
|
|
|
if (done != l)
|
|
|
|
|
einfo (_("%P: Error writing file `%s'\n"), dst_name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fclose (src);
|
|
|
|
|
if (fclose (dst) == EOF)
|
|
|
|
|
einfo (_("%P: Error closing file `%s'\n"), dst_name);
|
|
|
|
|
free (dst_name);
|
|
|
|
|
free (buf);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
END_PROGRESS (program_name);
|
|
|
|
|
|
|
|
|
|
if (config.stats)
|
|
|
|
|
{
|
|
|
|
|
#ifdef HAVE_SBRK
|
|
|
|
|
char *lim = (char *) sbrk (0);
|
|
|
|
|
#endif
|
|
|
|
|
long run_time = get_run_time () - start_time;
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
fflush (stdout);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
|
|
|
|
|
program_name, run_time / 1000000, run_time % 1000000);
|
|
|
|
|
#ifdef HAVE_SBRK
|
|
|
|
|
fprintf (stderr, _("%s: data size %ld\n"), program_name,
|
2014-09-12 22:14:23 +00:00
|
|
|
|
(long) (lim - start_sbrk));
|
2012-03-26 19:18:29 +00:00
|
|
|
|
#endif
|
2014-09-12 22:14:23 +00:00
|
|
|
|
fflush (stderr);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* Prevent ld_cleanup from doing anything, after a successful link. */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
output_filename = NULL;
|
|
|
|
|
|
|
|
|
|
xexit (0);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* If the configured sysroot is relocatable, try relocating it based on
|
|
|
|
|
default prefix FROM. Return the relocated directory if it exists,
|
|
|
|
|
otherwise return null. */
|
|
|
|
|
|
|
|
|
|
static char *
|
|
|
|
|
get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
|
|
|
|
|
{
|
|
|
|
|
#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
|
|
|
|
|
char *path;
|
|
|
|
|
struct stat s;
|
|
|
|
|
|
|
|
|
|
path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
|
|
|
|
|
if (path)
|
|
|
|
|
{
|
|
|
|
|
if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
|
|
|
|
|
return path;
|
|
|
|
|
free (path);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Return the sysroot directory. Return "" if no sysroot is being used. */
|
|
|
|
|
|
|
|
|
|
static const char *
|
|
|
|
|
get_sysroot (int argc, char **argv)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
const char *path;
|
|
|
|
|
|
|
|
|
|
for (i = 1; i < argc; i++)
|
|
|
|
|
if (CONST_STRNEQ (argv[i], "--sysroot="))
|
|
|
|
|
return argv[i] + strlen ("--sysroot=");
|
|
|
|
|
|
|
|
|
|
path = get_relative_sysroot (BINDIR);
|
|
|
|
|
if (path)
|
|
|
|
|
return path;
|
|
|
|
|
|
|
|
|
|
path = get_relative_sysroot (TOOLBINDIR);
|
|
|
|
|
if (path)
|
|
|
|
|
return path;
|
|
|
|
|
|
|
|
|
|
return TARGET_SYSTEM_ROOT;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We need to find any explicitly given emulation in order to initialize the
|
|
|
|
|
state that's needed by the lex&yacc argument parser (parse_args). */
|
|
|
|
|
|
|
|
|
|
static char *
|
|
|
|
|
get_emulation (int argc, char **argv)
|
|
|
|
|
{
|
|
|
|
|
char *emulation;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
emulation = getenv (EMULATION_ENVIRON);
|
|
|
|
|
if (emulation == NULL)
|
|
|
|
|
emulation = DEFAULT_EMULATION;
|
|
|
|
|
|
|
|
|
|
for (i = 1; i < argc; i++)
|
|
|
|
|
{
|
|
|
|
|
if (CONST_STRNEQ (argv[i], "-m"))
|
|
|
|
|
{
|
|
|
|
|
if (argv[i][2] == '\0')
|
|
|
|
|
{
|
|
|
|
|
/* -m EMUL */
|
|
|
|
|
if (i < argc - 1)
|
|
|
|
|
{
|
|
|
|
|
emulation = argv[i + 1];
|
|
|
|
|
i++;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
einfo (_("%P%F: missing argument to -m\n"));
|
|
|
|
|
}
|
|
|
|
|
else if (strcmp (argv[i], "-mips1") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips2") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips3") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips4") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips5") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips32") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips32r2") == 0
|
2015-08-28 15:32:19 +00:00
|
|
|
|
|| strcmp (argv[i], "-mips32r6") == 0
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|| strcmp (argv[i], "-mips64") == 0
|
2015-08-28 15:32:19 +00:00
|
|
|
|
|| strcmp (argv[i], "-mips64r2") == 0
|
|
|
|
|
|| strcmp (argv[i], "-mips64r6") == 0)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
/* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
|
|
|
|
|
passed to the linker by some MIPS compilers. They
|
|
|
|
|
generally tell the linker to use a slightly different
|
|
|
|
|
library path. Perhaps someday these should be
|
|
|
|
|
implemented as emulations; until then, we just ignore
|
|
|
|
|
the arguments and hope that nobody ever creates
|
|
|
|
|
emulations named ips1, ips2 or ips3. */
|
|
|
|
|
}
|
|
|
|
|
else if (strcmp (argv[i], "-m486") == 0)
|
|
|
|
|
{
|
|
|
|
|
/* FIXME: The argument -m486 is passed to the linker on
|
|
|
|
|
some Linux systems. Hope that nobody creates an
|
|
|
|
|
emulation named 486. */
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* -mEMUL */
|
|
|
|
|
emulation = &argv[i][2];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return emulation;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
add_ysym (const char *name)
|
|
|
|
|
{
|
|
|
|
|
if (link_info.notice_hash == NULL)
|
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
link_info.notice_hash
|
|
|
|
|
= (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (!bfd_hash_table_init_n (link_info.notice_hash,
|
|
|
|
|
bfd_hash_newfunc,
|
|
|
|
|
sizeof (struct bfd_hash_entry),
|
|
|
|
|
61))
|
|
|
|
|
einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
|
|
|
|
|
einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
void
|
|
|
|
|
add_ignoresym (struct bfd_link_info *info, const char *name)
|
|
|
|
|
{
|
|
|
|
|
if (info->ignore_hash == NULL)
|
|
|
|
|
{
|
|
|
|
|
info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!bfd_hash_table_init_n (info->ignore_hash,
|
|
|
|
|
bfd_hash_newfunc,
|
|
|
|
|
sizeof (struct bfd_hash_entry),
|
|
|
|
|
61))
|
2014-09-12 22:14:23 +00:00
|
|
|
|
einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
|
|
|
|
|
einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
/* Record a symbol to be wrapped, from the --wrap option. */
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
add_wrap (const char *name)
|
|
|
|
|
{
|
|
|
|
|
if (link_info.wrap_hash == NULL)
|
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
link_info.wrap_hash
|
|
|
|
|
= (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (!bfd_hash_table_init_n (link_info.wrap_hash,
|
|
|
|
|
bfd_hash_newfunc,
|
|
|
|
|
sizeof (struct bfd_hash_entry),
|
|
|
|
|
61))
|
|
|
|
|
einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
|
|
|
|
|
einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Handle the -retain-symbols-file option. */
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
|
add_keepsyms_file (const char *filename)
|
|
|
|
|
{
|
|
|
|
|
FILE *file;
|
|
|
|
|
char *buf;
|
|
|
|
|
size_t bufsize;
|
|
|
|
|
int c;
|
|
|
|
|
|
|
|
|
|
if (link_info.strip == strip_some)
|
|
|
|
|
einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
|
|
|
|
|
|
|
|
|
|
file = fopen (filename, "r");
|
|
|
|
|
if (file == NULL)
|
|
|
|
|
{
|
|
|
|
|
bfd_set_error (bfd_error_system_call);
|
|
|
|
|
einfo ("%X%P: %s: %E\n", filename);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
link_info.keep_hash = (struct bfd_hash_table *)
|
|
|
|
|
xmalloc (sizeof (struct bfd_hash_table));
|
|
|
|
|
if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
|
|
|
|
|
sizeof (struct bfd_hash_entry)))
|
|
|
|
|
einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
|
|
|
|
|
|
|
|
|
|
bufsize = 100;
|
|
|
|
|
buf = (char *) xmalloc (bufsize);
|
|
|
|
|
|
|
|
|
|
c = getc (file);
|
|
|
|
|
while (c != EOF)
|
|
|
|
|
{
|
|
|
|
|
while (ISSPACE (c))
|
|
|
|
|
c = getc (file);
|
|
|
|
|
|
|
|
|
|
if (c != EOF)
|
|
|
|
|
{
|
|
|
|
|
size_t len = 0;
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
while (!ISSPACE (c) && c != EOF)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
buf[len] = c;
|
|
|
|
|
++len;
|
|
|
|
|
if (len >= bufsize)
|
|
|
|
|
{
|
|
|
|
|
bufsize *= 2;
|
|
|
|
|
buf = (char *) xrealloc (buf, bufsize);
|
|
|
|
|
}
|
|
|
|
|
c = getc (file);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
buf[len] = '\0';
|
|
|
|
|
|
|
|
|
|
if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
|
|
|
|
|
einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (link_info.strip != strip_none)
|
|
|
|
|
einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
|
|
|
|
|
|
|
|
|
|
free (buf);
|
|
|
|
|
link_info.strip = strip_some;
|
2015-08-28 15:32:19 +00:00
|
|
|
|
fclose (file);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Callbacks from the BFD linker routines. */
|
|
|
|
|
|
|
|
|
|
/* This is called when BFD has decided to include an archive member in
|
|
|
|
|
a link. */
|
|
|
|
|
|
|
|
|
|
static bfd_boolean
|
|
|
|
|
add_archive_element (struct bfd_link_info *info,
|
|
|
|
|
bfd *abfd,
|
2014-09-12 22:14:23 +00:00
|
|
|
|
const char *name,
|
|
|
|
|
bfd **subsbfd ATTRIBUTE_UNUSED)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
lang_input_statement_type *input;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
lang_input_statement_type orig_input;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
input = (lang_input_statement_type *)
|
|
|
|
|
xcalloc (1, sizeof (lang_input_statement_type));
|
2017-04-10 11:32:00 +00:00
|
|
|
|
input->header.type = lang_input_statement_enum;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
input->filename = abfd->filename;
|
|
|
|
|
input->local_sym_name = abfd->filename;
|
|
|
|
|
input->the_bfd = abfd;
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
/* Save the original data for trace files/tries below, as plugins
|
|
|
|
|
(if enabled) may possibly alter it to point to a replacement
|
|
|
|
|
BFD, but we still want to output the original BFD filename. */
|
|
|
|
|
orig_input = *input;
|
|
|
|
|
#ifdef ENABLE_PLUGINS
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (link_info.lto_plugin_active)
|
2014-09-12 22:14:23 +00:00
|
|
|
|
{
|
|
|
|
|
/* We must offer this archive member to the plugins to claim. */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
plugin_maybe_claim (input);
|
|
|
|
|
if (input->flags.claimed)
|
2014-09-12 22:14:23 +00:00
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (no_more_claiming)
|
2014-09-12 22:14:23 +00:00
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
/* Don't claim new IR symbols after all IR symbols have
|
|
|
|
|
been claimed. */
|
|
|
|
|
if (trace_files || verbose)
|
|
|
|
|
info_msg ("%I: no new IR symbols to claimi\n",
|
|
|
|
|
&orig_input);
|
|
|
|
|
input->flags.claimed = 0;
|
|
|
|
|
return FALSE;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
}
|
2017-04-10 11:32:00 +00:00
|
|
|
|
input->flags.claim_archive = TRUE;
|
|
|
|
|
*subsbfd = input->the_bfd;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
#endif /* ENABLE_PLUGINS */
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
ldlang_add_file (input);
|
|
|
|
|
|
|
|
|
|
if (config.map_file != NULL)
|
|
|
|
|
{
|
|
|
|
|
static bfd_boolean header_printed;
|
|
|
|
|
struct bfd_link_hash_entry *h;
|
|
|
|
|
bfd *from;
|
|
|
|
|
int len;
|
|
|
|
|
|
|
|
|
|
h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
|
|
|
|
|
|
|
|
|
|
if (h == NULL)
|
|
|
|
|
from = NULL;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
switch (h->type)
|
|
|
|
|
{
|
|
|
|
|
default:
|
|
|
|
|
from = NULL;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case bfd_link_hash_defined:
|
|
|
|
|
case bfd_link_hash_defweak:
|
|
|
|
|
from = h->u.def.section->owner;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case bfd_link_hash_undefined:
|
|
|
|
|
case bfd_link_hash_undefweak:
|
|
|
|
|
from = h->u.undef.abfd;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case bfd_link_hash_common:
|
|
|
|
|
from = h->u.c.p->section->owner;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!header_printed)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
char buf[100];
|
|
|
|
|
|
2015-08-28 15:32:19 +00:00
|
|
|
|
sprintf (buf, _("Archive member included "
|
|
|
|
|
"to satisfy reference by file (symbol)\n\n"));
|
2012-03-26 19:18:29 +00:00
|
|
|
|
minfo ("%s", buf);
|
|
|
|
|
header_printed = TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (abfd->my_archive == NULL
|
|
|
|
|
|| bfd_is_thin_archive (abfd->my_archive))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
minfo ("%s", bfd_get_filename (abfd));
|
|
|
|
|
len = strlen (bfd_get_filename (abfd));
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
2017-04-10 11:32:00 +00:00
|
|
|
|
minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
bfd_get_filename (abfd));
|
2017-04-10 11:32:00 +00:00
|
|
|
|
len = (strlen (bfd_get_filename (abfd->my_archive))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
+ strlen (bfd_get_filename (abfd))
|
|
|
|
|
+ 2);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (len >= 29)
|
|
|
|
|
{
|
|
|
|
|
print_nl ();
|
|
|
|
|
len = 0;
|
|
|
|
|
}
|
|
|
|
|
while (len < 30)
|
|
|
|
|
{
|
|
|
|
|
print_space ();
|
|
|
|
|
++len;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (from != NULL)
|
|
|
|
|
minfo ("%B ", from);
|
|
|
|
|
if (h != NULL)
|
|
|
|
|
minfo ("(%T)\n", h->root.string);
|
|
|
|
|
else
|
|
|
|
|
minfo ("(%s)\n", name);
|
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (trace_files || verbose)
|
|
|
|
|
info_msg ("%I\n", &orig_input);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when BFD has discovered a symbol which is defined
|
|
|
|
|
multiple times. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2014-09-12 22:14:23 +00:00
|
|
|
|
multiple_definition (struct bfd_link_info *info,
|
|
|
|
|
struct bfd_link_hash_entry *h,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
bfd *nbfd,
|
|
|
|
|
asection *nsec,
|
|
|
|
|
bfd_vma nval)
|
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
const char *name;
|
|
|
|
|
bfd *obfd;
|
|
|
|
|
asection *osec;
|
|
|
|
|
bfd_vma oval;
|
|
|
|
|
|
|
|
|
|
if (info->allow_multiple_definition)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
|
|
|
|
|
switch (h->type)
|
|
|
|
|
{
|
|
|
|
|
case bfd_link_hash_defined:
|
|
|
|
|
osec = h->u.def.section;
|
|
|
|
|
oval = h->u.def.value;
|
|
|
|
|
obfd = h->u.def.section->owner;
|
|
|
|
|
break;
|
|
|
|
|
case bfd_link_hash_indirect:
|
|
|
|
|
osec = bfd_ind_section_ptr;
|
|
|
|
|
oval = 0;
|
|
|
|
|
obfd = NULL;
|
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
abort ();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Ignore a redefinition of an absolute symbol to the
|
|
|
|
|
same value; it's harmless. */
|
|
|
|
|
if (h->type == bfd_link_hash_defined
|
|
|
|
|
&& bfd_is_abs_section (osec)
|
|
|
|
|
&& bfd_is_abs_section (nsec)
|
|
|
|
|
&& nval == oval)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
/* If either section has the output_section field set to
|
|
|
|
|
bfd_abs_section_ptr, it means that the section is being
|
|
|
|
|
discarded, and this is not really a multiple definition at all.
|
|
|
|
|
FIXME: It would be cleaner to somehow ignore symbols defined in
|
|
|
|
|
sections which are being discarded. */
|
|
|
|
|
if ((osec->output_section != NULL
|
2017-04-10 11:32:00 +00:00
|
|
|
|
&& !bfd_is_abs_section (osec)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
&& bfd_is_abs_section (osec->output_section))
|
|
|
|
|
|| (nsec->output_section != NULL
|
2017-04-10 11:32:00 +00:00
|
|
|
|
&& !bfd_is_abs_section (nsec)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
&& bfd_is_abs_section (nsec->output_section)))
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
name = h->root.string;
|
|
|
|
|
if (nbfd == NULL)
|
|
|
|
|
{
|
|
|
|
|
nbfd = obfd;
|
|
|
|
|
nsec = osec;
|
|
|
|
|
nval = oval;
|
|
|
|
|
obfd = NULL;
|
|
|
|
|
}
|
2012-03-26 19:18:29 +00:00
|
|
|
|
einfo (_("%X%C: multiple definition of `%T'\n"),
|
|
|
|
|
nbfd, nsec, nval, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%D: first defined here\n"), obfd, osec, oval);
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (RELAXATION_ENABLED_BY_USER)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
|
2014-09-12 22:14:23 +00:00
|
|
|
|
DISABLE_RELAXATION;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when there is a definition of a common symbol, or
|
|
|
|
|
when a common symbol is found for a symbol that is already defined,
|
|
|
|
|
or when two common symbols are found. We only do something if
|
|
|
|
|
-warn-common was used. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
|
2014-09-12 22:14:23 +00:00
|
|
|
|
struct bfd_link_hash_entry *h,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
bfd *nbfd,
|
|
|
|
|
enum bfd_link_hash_type ntype,
|
|
|
|
|
bfd_vma nsize)
|
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
const char *name;
|
|
|
|
|
bfd *obfd;
|
|
|
|
|
enum bfd_link_hash_type otype;
|
|
|
|
|
bfd_vma osize;
|
|
|
|
|
|
|
|
|
|
if (!config.warn_common)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
name = h->root.string;
|
|
|
|
|
otype = h->type;
|
|
|
|
|
if (otype == bfd_link_hash_common)
|
|
|
|
|
{
|
|
|
|
|
obfd = h->u.c.p->section->owner;
|
|
|
|
|
osize = h->u.c.size;
|
|
|
|
|
}
|
|
|
|
|
else if (otype == bfd_link_hash_defined
|
|
|
|
|
|| otype == bfd_link_hash_defweak)
|
|
|
|
|
{
|
|
|
|
|
obfd = h->u.def.section->owner;
|
|
|
|
|
osize = 0;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
/* FIXME: It would nice if we could report the BFD which defined
|
|
|
|
|
an indirect symbol, but we don't have anywhere to store the
|
|
|
|
|
information. */
|
|
|
|
|
obfd = NULL;
|
|
|
|
|
osize = 0;
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (ntype == bfd_link_hash_defined
|
|
|
|
|
|| ntype == bfd_link_hash_defweak
|
|
|
|
|
|| ntype == bfd_link_hash_indirect)
|
|
|
|
|
{
|
|
|
|
|
ASSERT (otype == bfd_link_hash_common);
|
|
|
|
|
einfo (_("%B: warning: definition of `%T' overriding common\n"),
|
|
|
|
|
nbfd, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%B: warning: common is here\n"), obfd);
|
|
|
|
|
}
|
|
|
|
|
else if (otype == bfd_link_hash_defined
|
|
|
|
|
|| otype == bfd_link_hash_defweak
|
|
|
|
|
|| otype == bfd_link_hash_indirect)
|
|
|
|
|
{
|
|
|
|
|
ASSERT (ntype == bfd_link_hash_common);
|
|
|
|
|
einfo (_("%B: warning: common of `%T' overridden by definition\n"),
|
|
|
|
|
nbfd, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%B: warning: defined here\n"), obfd);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
|
|
|
|
|
if (osize > nsize)
|
|
|
|
|
{
|
|
|
|
|
einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
|
|
|
|
|
nbfd, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%B: warning: larger common is here\n"), obfd);
|
|
|
|
|
}
|
|
|
|
|
else if (nsize > osize)
|
|
|
|
|
{
|
|
|
|
|
einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
|
|
|
|
|
nbfd, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%B: warning: smaller common is here\n"), obfd);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
|
|
|
|
|
if (obfd != NULL)
|
|
|
|
|
einfo (_("%B: warning: previous common is here\n"), obfd);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when BFD has discovered a set element. H is the
|
|
|
|
|
entry in the linker hash table for the set. SECTION and VALUE
|
|
|
|
|
represent a value which should be added to the set. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
|
|
|
|
|
struct bfd_link_hash_entry *h,
|
|
|
|
|
bfd_reloc_code_real_type reloc,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma value)
|
|
|
|
|
{
|
|
|
|
|
if (config.warn_constructors)
|
|
|
|
|
einfo (_("%P: warning: global constructor %s used\n"),
|
|
|
|
|
h->root.string);
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!config.build_constructors)
|
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
ldctor_add_set_entry (h, reloc, NULL, section, value);
|
|
|
|
|
|
|
|
|
|
if (h->type == bfd_link_hash_new)
|
|
|
|
|
{
|
|
|
|
|
h->type = bfd_link_hash_undefined;
|
|
|
|
|
h->u.undef.abfd = abfd;
|
|
|
|
|
/* We don't call bfd_link_add_undef to add this to the list of
|
|
|
|
|
undefined symbols because we are going to define it
|
|
|
|
|
ourselves. */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when BFD has discovered a constructor. This is only
|
|
|
|
|
called for some object file formats--those which do not handle
|
|
|
|
|
constructors in some more clever fashion. This is similar to
|
|
|
|
|
adding an element to a set, but less general. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
constructor_callback (struct bfd_link_info *info,
|
|
|
|
|
bfd_boolean constructor,
|
|
|
|
|
const char *name,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma value)
|
|
|
|
|
{
|
|
|
|
|
char *s;
|
|
|
|
|
struct bfd_link_hash_entry *h;
|
|
|
|
|
char set_name[1 + sizeof "__CTOR_LIST__"];
|
|
|
|
|
|
|
|
|
|
if (config.warn_constructors)
|
|
|
|
|
einfo (_("%P: warning: global constructor %s used\n"), name);
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!config.build_constructors)
|
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
/* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
|
|
|
|
|
useful error message. */
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
|
2017-04-10 11:32:00 +00:00
|
|
|
|
&& (bfd_link_relocatable (info)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|| bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
|
|
|
|
|
einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
|
|
|
|
|
|
|
|
|
|
s = set_name;
|
|
|
|
|
if (bfd_get_symbol_leading_char (abfd) != '\0')
|
|
|
|
|
*s++ = bfd_get_symbol_leading_char (abfd);
|
|
|
|
|
if (constructor)
|
|
|
|
|
strcpy (s, "__CTOR_LIST__");
|
|
|
|
|
else
|
|
|
|
|
strcpy (s, "__DTOR_LIST__");
|
|
|
|
|
|
|
|
|
|
h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
|
|
|
|
|
if (h == (struct bfd_link_hash_entry *) NULL)
|
|
|
|
|
einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
|
|
|
|
|
if (h->type == bfd_link_hash_new)
|
|
|
|
|
{
|
|
|
|
|
h->type = bfd_link_hash_undefined;
|
|
|
|
|
h->u.undef.abfd = abfd;
|
|
|
|
|
/* We don't call bfd_link_add_undef to add this to the list of
|
|
|
|
|
undefined symbols because we are going to define it
|
|
|
|
|
ourselves. */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* A structure used by warning_callback to pass information through
|
|
|
|
|
bfd_map_over_sections. */
|
|
|
|
|
|
|
|
|
|
struct warning_callback_info
|
|
|
|
|
{
|
|
|
|
|
bfd_boolean found;
|
|
|
|
|
const char *warning;
|
|
|
|
|
const char *symbol;
|
|
|
|
|
asymbol **asymbols;
|
|
|
|
|
};
|
|
|
|
|
|
2015-08-28 15:32:19 +00:00
|
|
|
|
/* Look through the relocs to see if we can find a plausible address
|
|
|
|
|
for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
|
|
|
|
|
|
|
|
|
|
static bfd_boolean
|
|
|
|
|
symbol_warning (const char *warning, const char *symbol, bfd *abfd)
|
|
|
|
|
{
|
|
|
|
|
struct warning_callback_info cinfo;
|
|
|
|
|
|
|
|
|
|
if (!bfd_generic_link_read_symbols (abfd))
|
|
|
|
|
einfo (_("%B%F: could not read symbols: %E\n"), abfd);
|
|
|
|
|
|
|
|
|
|
cinfo.found = FALSE;
|
|
|
|
|
cinfo.warning = warning;
|
|
|
|
|
cinfo.symbol = symbol;
|
|
|
|
|
cinfo.asymbols = bfd_get_outsymbols (abfd);
|
|
|
|
|
bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
|
|
|
|
|
return cinfo.found;
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
/* This is called when there is a reference to a warning symbol. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
|
|
|
|
|
const char *warning,
|
|
|
|
|
const char *symbol,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma address)
|
|
|
|
|
{
|
|
|
|
|
/* This is a hack to support warn_multiple_gp. FIXME: This should
|
|
|
|
|
have a cleaner interface, but what? */
|
2017-04-10 11:32:00 +00:00
|
|
|
|
if (!config.warn_multiple_gp
|
2012-03-26 19:18:29 +00:00
|
|
|
|
&& strcmp (warning, "using multiple gp values") == 0)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
if (section != NULL)
|
|
|
|
|
einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
|
|
|
|
|
else if (abfd == NULL)
|
|
|
|
|
einfo ("%P: %s%s\n", _("warning: "), warning);
|
|
|
|
|
else if (symbol == NULL)
|
|
|
|
|
einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
|
2017-04-10 11:32:00 +00:00
|
|
|
|
else if (!symbol_warning (warning, symbol, abfd))
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
2015-08-28 15:32:19 +00:00
|
|
|
|
bfd *b;
|
|
|
|
|
/* Search all input files for a reference to SYMBOL. */
|
|
|
|
|
for (b = info->input_bfds; b; b = b->link.next)
|
|
|
|
|
if (b != abfd && symbol_warning (warning, symbol, b))
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2015-08-28 15:32:19 +00:00
|
|
|
|
einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called by warning_callback for each section. It checks the
|
|
|
|
|
relocs of the section to see if it can find a reference to the
|
|
|
|
|
symbol which triggered the warning. If it can, it uses the reloc
|
|
|
|
|
to give an error message with a file and line number. */
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
|
|
|
|
|
{
|
|
|
|
|
struct warning_callback_info *info = (struct warning_callback_info *) iarg;
|
|
|
|
|
long relsize;
|
|
|
|
|
arelent **relpp;
|
|
|
|
|
long relcount;
|
|
|
|
|
arelent **p, **pend;
|
|
|
|
|
|
|
|
|
|
if (info->found)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
relsize = bfd_get_reloc_upper_bound (abfd, sec);
|
|
|
|
|
if (relsize < 0)
|
|
|
|
|
einfo (_("%B%F: could not read relocs: %E\n"), abfd);
|
|
|
|
|
if (relsize == 0)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
relpp = (arelent **) xmalloc (relsize);
|
|
|
|
|
relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
|
|
|
|
|
if (relcount < 0)
|
|
|
|
|
einfo (_("%B%F: could not read relocs: %E\n"), abfd);
|
|
|
|
|
|
|
|
|
|
p = relpp;
|
|
|
|
|
pend = p + relcount;
|
|
|
|
|
for (; p < pend && *p != NULL; p++)
|
|
|
|
|
{
|
|
|
|
|
arelent *q = *p;
|
|
|
|
|
|
|
|
|
|
if (q->sym_ptr_ptr != NULL
|
|
|
|
|
&& *q->sym_ptr_ptr != NULL
|
|
|
|
|
&& strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
|
|
|
|
|
{
|
|
|
|
|
/* We found a reloc for the symbol we are looking for. */
|
|
|
|
|
einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
|
|
|
|
|
info->warning);
|
|
|
|
|
info->found = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free (relpp);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when an undefined symbol is found. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2014-09-12 22:14:23 +00:00
|
|
|
|
undefined_symbol (struct bfd_link_info *info,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
const char *name,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma address,
|
|
|
|
|
bfd_boolean error)
|
|
|
|
|
{
|
|
|
|
|
static char *error_name;
|
|
|
|
|
static unsigned int error_count;
|
|
|
|
|
|
|
|
|
|
#define MAX_ERRORS_IN_A_ROW 5
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
if (info->ignore_hash != NULL
|
|
|
|
|
&& bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2014-09-12 22:14:23 +00:00
|
|
|
|
|
2012-03-26 19:18:29 +00:00
|
|
|
|
if (config.warn_once)
|
|
|
|
|
{
|
|
|
|
|
/* Only warn once about a particular undefined symbol. */
|
2014-09-12 22:14:23 +00:00
|
|
|
|
add_ignoresym (info, name);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* We never print more than a reasonable number of errors in a row
|
|
|
|
|
for a single symbol. */
|
|
|
|
|
if (error_name != NULL
|
|
|
|
|
&& strcmp (name, error_name) == 0)
|
|
|
|
|
++error_count;
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
error_count = 0;
|
|
|
|
|
if (error_name != NULL)
|
|
|
|
|
free (error_name);
|
|
|
|
|
error_name = xstrdup (name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (section != NULL)
|
|
|
|
|
{
|
|
|
|
|
if (error_count < MAX_ERRORS_IN_A_ROW)
|
|
|
|
|
{
|
|
|
|
|
if (error)
|
|
|
|
|
einfo (_("%X%C: undefined reference to `%T'\n"),
|
|
|
|
|
abfd, section, address, name);
|
|
|
|
|
else
|
|
|
|
|
einfo (_("%C: warning: undefined reference to `%T'\n"),
|
|
|
|
|
abfd, section, address, name);
|
|
|
|
|
}
|
|
|
|
|
else if (error_count == MAX_ERRORS_IN_A_ROW)
|
|
|
|
|
{
|
|
|
|
|
if (error)
|
|
|
|
|
einfo (_("%X%D: more undefined references to `%T' follow\n"),
|
|
|
|
|
abfd, section, address, name);
|
|
|
|
|
else
|
|
|
|
|
einfo (_("%D: warning: more undefined references to `%T' follow\n"),
|
|
|
|
|
abfd, section, address, name);
|
|
|
|
|
}
|
|
|
|
|
else if (error)
|
|
|
|
|
einfo ("%X");
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
if (error_count < MAX_ERRORS_IN_A_ROW)
|
|
|
|
|
{
|
|
|
|
|
if (error)
|
|
|
|
|
einfo (_("%X%B: undefined reference to `%T'\n"),
|
|
|
|
|
abfd, name);
|
|
|
|
|
else
|
|
|
|
|
einfo (_("%B: warning: undefined reference to `%T'\n"),
|
|
|
|
|
abfd, name);
|
|
|
|
|
}
|
|
|
|
|
else if (error_count == MAX_ERRORS_IN_A_ROW)
|
|
|
|
|
{
|
|
|
|
|
if (error)
|
|
|
|
|
einfo (_("%X%B: more undefined references to `%T' follow\n"),
|
|
|
|
|
abfd, name);
|
|
|
|
|
else
|
|
|
|
|
einfo (_("%B: warning: more undefined references to `%T' follow\n"),
|
|
|
|
|
abfd, name);
|
|
|
|
|
}
|
|
|
|
|
else if (error)
|
|
|
|
|
einfo ("%X");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Counter to limit the number of relocation overflow error messages
|
|
|
|
|
to print. Errors are printed as it is decremented. When it's
|
|
|
|
|
called and the counter is zero, a final message is printed
|
|
|
|
|
indicating more relocations were omitted. When it gets to -1, no
|
|
|
|
|
such errors are printed. If it's initially set to a value less
|
|
|
|
|
than -1, all such errors will be printed (--verbose does this). */
|
|
|
|
|
|
|
|
|
|
int overflow_cutoff_limit = 10;
|
|
|
|
|
|
|
|
|
|
/* This is called when a reloc overflows. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2014-09-12 22:14:23 +00:00
|
|
|
|
reloc_overflow (struct bfd_link_info *info,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
struct bfd_link_hash_entry *entry,
|
|
|
|
|
const char *name,
|
|
|
|
|
const char *reloc_name,
|
|
|
|
|
bfd_vma addend,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma address)
|
|
|
|
|
{
|
|
|
|
|
if (overflow_cutoff_limit == -1)
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
einfo ("%X%H:", abfd, section, address);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
if (overflow_cutoff_limit >= 0
|
|
|
|
|
&& overflow_cutoff_limit-- == 0)
|
|
|
|
|
{
|
|
|
|
|
einfo (_(" additional relocation overflows omitted from the output\n"));
|
2017-04-10 11:32:00 +00:00
|
|
|
|
return;
|
2012-03-26 19:18:29 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (entry)
|
|
|
|
|
{
|
|
|
|
|
while (entry->type == bfd_link_hash_indirect
|
|
|
|
|
|| entry->type == bfd_link_hash_warning)
|
|
|
|
|
entry = entry->u.i.link;
|
|
|
|
|
switch (entry->type)
|
|
|
|
|
{
|
|
|
|
|
case bfd_link_hash_undefined:
|
|
|
|
|
case bfd_link_hash_undefweak:
|
2017-04-10 11:32:00 +00:00
|
|
|
|
einfo (_(" relocation truncated to fit: "
|
|
|
|
|
"%s against undefined symbol `%T'"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
reloc_name, entry->root.string);
|
|
|
|
|
break;
|
|
|
|
|
case bfd_link_hash_defined:
|
|
|
|
|
case bfd_link_hash_defweak:
|
2017-04-10 11:32:00 +00:00
|
|
|
|
einfo (_(" relocation truncated to fit: "
|
|
|
|
|
"%s against symbol `%T' defined in %A section in %B"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
reloc_name, entry->root.string,
|
|
|
|
|
entry->u.def.section,
|
|
|
|
|
entry->u.def.section == bfd_abs_section_ptr
|
2014-09-12 22:14:23 +00:00
|
|
|
|
? info->output_bfd : entry->u.def.section->owner);
|
2012-03-26 19:18:29 +00:00
|
|
|
|
break;
|
|
|
|
|
default:
|
|
|
|
|
abort ();
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
einfo (_(" relocation truncated to fit: %s against `%T'"),
|
|
|
|
|
reloc_name, name);
|
|
|
|
|
if (addend != 0)
|
|
|
|
|
einfo ("+%v", addend);
|
|
|
|
|
einfo ("\n");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when a dangerous relocation is made. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
|
|
|
|
|
const char *message,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma address)
|
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
einfo (_("%X%H: dangerous relocation: %s\n"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
abfd, section, address, message);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called when a reloc is being generated attached to a symbol
|
|
|
|
|
that is not being output. */
|
|
|
|
|
|
2017-04-10 11:32:00 +00:00
|
|
|
|
static void
|
2012-03-26 19:18:29 +00:00
|
|
|
|
unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
|
|
|
|
|
const char *name,
|
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
|
|
|
|
bfd_vma address)
|
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
|
2012-03-26 19:18:29 +00:00
|
|
|
|
abfd, section, address, name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* This is called if link_info.notice_all is set, or when a symbol in
|
|
|
|
|
link_info.notice_hash is found. Symbols are put in notice_hash
|
2014-09-12 22:14:23 +00:00
|
|
|
|
using the -y option, while notice_all is set if the --cref option
|
|
|
|
|
has been supplied, or if there are any NOCROSSREFS sections in the
|
|
|
|
|
linker script; and if plugins are active, since they need to monitor
|
|
|
|
|
all references from non-IR files. */
|
2012-03-26 19:18:29 +00:00
|
|
|
|
|
|
|
|
|
static bfd_boolean
|
|
|
|
|
notice (struct bfd_link_info *info,
|
2014-09-12 22:14:23 +00:00
|
|
|
|
struct bfd_link_hash_entry *h,
|
2015-08-28 15:32:19 +00:00
|
|
|
|
struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
|
2012-03-26 19:18:29 +00:00
|
|
|
|
bfd *abfd,
|
|
|
|
|
asection *section,
|
2014-09-12 22:14:23 +00:00
|
|
|
|
bfd_vma value,
|
2015-08-28 15:32:19 +00:00
|
|
|
|
flagword flags ATTRIBUTE_UNUSED)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
2014-09-12 22:14:23 +00:00
|
|
|
|
const char *name;
|
|
|
|
|
|
|
|
|
|
if (h == NULL)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
if (command_line.cref || nocrossref_list != NULL)
|
|
|
|
|
return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
2014-09-12 22:14:23 +00:00
|
|
|
|
name = h->root.string;
|
|
|
|
|
if (info->notice_hash != NULL
|
|
|
|
|
&& bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
|
2012-03-26 19:18:29 +00:00
|
|
|
|
{
|
|
|
|
|
if (bfd_is_und_section (section))
|
|
|
|
|
einfo ("%B: reference to %s\n", abfd, name);
|
|
|
|
|
else
|
|
|
|
|
einfo ("%B: definition of %s\n", abfd, name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (command_line.cref || nocrossref_list != NULL)
|
|
|
|
|
add_cref (name, abfd, section, value);
|
|
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
|
}
|