]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - ld/ldmain.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / ld / ldmain.c
CommitLineData
252b5132 1/* Main program of GNU linker.
2571583a 2 Copyright (C) 1991-2017 Free Software Foundation, Inc.
252b5132
RH
3 Written by Steve Chamberlain steve@cygnus.com
4
f96b4a7b 5 This file is part of the GNU Binutils.
252b5132 6
f96b4a7b 7 This program is free software; you can redistribute it and/or modify
2fa9fc65 8 it under the terms of the GNU General Public License as published by
f96b4a7b
NC
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
252b5132 11
f96b4a7b 12 This program is distributed in the hope that it will be useful,
2fa9fc65
NC
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
2fa9fc65 17 You should have received a copy of the GNU General Public License
f96b4a7b
NC
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
20 MA 02110-1301, USA. */
252b5132 21
252b5132 22#include "sysdep.h"
3db64b00 23#include "bfd.h"
3882b010 24#include "safe-ctype.h"
252b5132
RH
25#include "libiberty.h"
26#include "progress.h"
27#include "bfdlink.h"
5af11cab 28#include "filenames.h"
252b5132
RH
29
30#include "ld.h"
31#include "ldmain.h"
32#include "ldmisc.h"
33#include "ldwrite.h"
252b5132
RH
34#include "ldexp.h"
35#include "ldlang.h"
df2a7313 36#include <ldgram.h>
252b5132
RH
37#include "ldlex.h"
38#include "ldfile.h"
b71e2778 39#include "ldemul.h"
252b5132 40#include "ldctor.h"
5d3236ee
DK
41#ifdef ENABLE_PLUGINS
42#include "plugin.h"
43#include "plugin-api.h"
5d3236ee 44#endif /* ENABLE_PLUGINS */
252b5132 45
0125cdf2 46/* Somewhere above, sys/stat.h got included. */
252b5132
RH
47#if !defined(S_ISDIR) && defined(S_IFDIR)
48#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
49#endif
50
51#include <string.h>
52
9c8ebd6a
DJ
53#ifndef TARGET_SYSTEM_ROOT
54#define TARGET_SYSTEM_ROOT ""
55#endif
56
252b5132
RH
57/* EXPORTS */
58
53d25da6
AM
59FILE *saved_script_handle = NULL;
60FILE *previous_script_handle = NULL;
61bfd_boolean force_make_executable = FALSE;
62
252b5132
RH
63char *default_target;
64const char *output_filename = "a.out";
65
66/* Name this program was invoked by. */
67char *program_name;
68
9c8ebd6a 69/* The prefix for system library directories. */
e2243057 70const char *ld_sysroot;
9c8ebd6a 71
3fe38064 72/* The canonical representation of ld_sysroot. */
0aa7f586 73char *ld_canon_sysroot;
3fe38064
NC
74int ld_canon_sysroot_len;
75
e8044f35 76/* Set by -G argument, for targets like MIPS ELF. */
252b5132
RH
77int g_switch_value = 8;
78
79/* Nonzero means print names of input files as processed. */
b34976b6 80bfd_boolean trace_files;
252b5132 81
cd6f1cf3
NC
82/* Nonzero means report actions taken by the linker, and describe the linker script in use. */
83bfd_boolean verbose;
252b5132
RH
84
85/* Nonzero means version number was printed, so exit successfully
86 instead of complaining if no input files are given. */
b34976b6 87bfd_boolean version_printed;
252b5132 88
b34976b6
AM
89/* TRUE if we should demangle symbol names. */
90bfd_boolean demangling;
252b5132
RH
91
92args_type command_line;
93
94ld_config_type config;
95
bcaa7b3e
L
96sort_type sort_section;
97
e2243057
RS
98static const char *get_sysroot
99 (int, char **);
0125cdf2 100static char *get_emulation
1579bae1 101 (int, char **);
0125cdf2 102static bfd_boolean add_archive_element
5d3236ee 103 (struct bfd_link_info *, bfd *, const char *, bfd **);
1a72702b 104static void multiple_definition
24f58f47 105 (struct bfd_link_info *, struct bfd_link_hash_entry *,
1579bae1 106 bfd *, asection *, bfd_vma);
1a72702b 107static void multiple_common
24f58f47
AM
108 (struct bfd_link_info *, struct bfd_link_hash_entry *,
109 bfd *, enum bfd_link_hash_type, bfd_vma);
1a72702b 110static void add_to_set
1579bae1
AM
111 (struct bfd_link_info *, struct bfd_link_hash_entry *,
112 bfd_reloc_code_real_type, bfd *, asection *, bfd_vma);
1a72702b 113static void constructor_callback
1579bae1
AM
114 (struct bfd_link_info *, bfd_boolean, const char *, bfd *,
115 asection *, bfd_vma);
1a72702b 116static void warning_callback
1579bae1
AM
117 (struct bfd_link_info *, const char *, const char *, bfd *,
118 asection *, bfd_vma);
0125cdf2 119static void warning_find_reloc
1579bae1 120 (bfd *, asection *, void *);
1a72702b 121static void undefined_symbol
1579bae1
AM
122 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma,
123 bfd_boolean);
1a72702b 124static void reloc_overflow
dfeffb9f
L
125 (struct bfd_link_info *, struct bfd_link_hash_entry *, const char *,
126 const char *, bfd_vma, bfd *, asection *, bfd_vma);
1a72702b 127static void reloc_dangerous
1579bae1 128 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
1a72702b 129static void unattached_reloc
1579bae1 130 (struct bfd_link_info *, const char *, bfd *, asection *, bfd_vma);
0125cdf2 131static bfd_boolean notice
35ed3f94 132 (struct bfd_link_info *, struct bfd_link_hash_entry *,
46135103 133 struct bfd_link_hash_entry *, bfd *, asection *, bfd_vma, flagword);
0125cdf2
NC
134
135static struct bfd_link_callbacks link_callbacks =
136{
252b5132
RH
137 add_archive_element,
138 multiple_definition,
139 multiple_common,
140 add_to_set,
141 constructor_callback,
142 warning_callback,
143 undefined_symbol,
144 reloc_overflow,
145 reloc_dangerous,
146 unattached_reloc,
e1fffbe6 147 notice,
2889e75b 148 einfo,
49fa1e15
AM
149 info_msg,
150 minfo,
2889e75b 151 ldlang_override_segment_assignment
252b5132
RH
152};
153
3b66a141 154static bfd_assert_handler_type default_bfd_assert_handler;
4519d071 155static bfd_error_handler_type default_bfd_error_handler;
3b66a141 156
252b5132
RH
157struct bfd_link_info link_info;
158\f
159static void
498cd2a0 160ld_cleanup (void)
252b5132 161{
498cd2a0
AM
162 bfd_cache_close_all ();
163#ifdef ENABLE_PLUGINS
164 plugin_call_cleanup ();
165#endif
166 if (output_filename && delete_output_file_on_failure)
167 unlink_if_ordinary (output_filename);
252b5132
RH
168}
169
4519d071 170/* Hook to notice BFD assertions. */
3b66a141
HPN
171
172static void
173ld_bfd_assert_handler (const char *fmt, const char *bfdver,
174 const char *file, int line)
175{
3b66a141 176 config.make_executable = FALSE;
4519d071
AM
177 (*default_bfd_assert_handler) (fmt, bfdver, file, line);
178}
179
180/* Hook the bfd error/warning handler for --fatal-warnings. */
181
182static void
183ld_bfd_error_handler (const char *fmt, va_list ap)
184{
185 if (config.fatal_warnings)
186 config.make_executable = FALSE;
187 (*default_bfd_error_handler) (fmt, ap);
3b66a141
HPN
188}
189
252b5132 190int
1579bae1 191main (int argc, char **argv)
252b5132
RH
192{
193 char *emulation;
194 long start_time = get_run_time ();
195
196#if defined (HAVE_SETLOCALE) && defined (HAVE_LC_MESSAGES)
197 setlocale (LC_MESSAGES, "");
3882b010
L
198#endif
199#if defined (HAVE_SETLOCALE)
200 setlocale (LC_CTYPE, "");
252b5132
RH
201#endif
202 bindtextdomain (PACKAGE, LOCALEDIR);
203 textdomain (PACKAGE);
204
205 program_name = argv[0];
206 xmalloc_set_program_name (program_name);
207
208 START_PROGRESS (program_name, 0);
209
869b9d07
MM
210 expandargv (&argc, &argv);
211
252b5132
RH
212 bfd_init ();
213
214 bfd_set_error_program_name (program_name);
215
3b66a141
HPN
216 /* We want to notice and fail on those nasty BFD assertions which are
217 likely to signal incorrect output being generated but otherwise may
218 leave no trace. */
219 default_bfd_assert_handler = bfd_set_assert_handler (ld_bfd_assert_handler);
220
4519d071
AM
221 /* Also hook the bfd error/warning handler for --fatal-warnings. */
222 default_bfd_error_handler = bfd_set_error_handler (ld_bfd_error_handler);
223
498cd2a0 224 xatexit (ld_cleanup);
252b5132 225
e2243057
RS
226 /* Set up the sysroot directory. */
227 ld_sysroot = get_sysroot (argc, argv);
228 if (*ld_sysroot)
3074964f 229 ld_canon_sysroot = lrealpath (ld_sysroot);
3fe38064
NC
230 if (ld_canon_sysroot)
231 ld_canon_sysroot_len = strlen (ld_canon_sysroot);
232 else
233 ld_canon_sysroot_len = -1;
234
252b5132
RH
235 /* Set the default BFD target based on the configured target. Doing
236 this permits the linker to be configured for a particular target,
237 and linked against a shared BFD library which was configured for
238 a different target. The macro TARGET is defined by Makefile. */
0aa7f586 239 if (!bfd_set_default_target (TARGET))
252b5132
RH
240 {
241 einfo (_("%X%P: can't set BFD default target to `%s': %E\n"), TARGET);
242 xexit (1);
243 }
244
b47c4208
AM
245#if YYDEBUG
246 {
247 extern int yydebug;
248 yydebug = 1;
249 }
250#endif
251
b34976b6 252 config.build_constructors = TRUE;
c76308d2 253 config.rpath_separator = ':';
a854a4a7
AM
254 config.split_by_reloc = (unsigned) -1;
255 config.split_by_file = (bfd_size_type) -1;
3b95049e
AM
256 config.make_executable = TRUE;
257 config.magic_demand_paged = TRUE;
258 config.text_read_only = TRUE;
4f9d22a0 259 link_info.disable_target_specific_optimizations = -1;
3b95049e 260
b34976b6 261 command_line.warn_mismatch = TRUE;
fe7929ce 262 command_line.warn_search_mismatch = TRUE;
02b0b1aa 263 command_line.check_section_addresses = -1;
bcaa7b3e 264
252b5132
RH
265 /* We initialize DEMANGLING based on the environment variable
266 COLLECT_NO_DEMANGLE. The gcc collect2 program will demangle the
267 output of the linker, unless COLLECT_NO_DEMANGLE is set in the
268 environment. Acting the same way here lets us provide the same
269 interface by default. */
270 demangling = getenv ("COLLECT_NO_DEMANGLE") == NULL;
271
b34976b6 272 link_info.allow_undefined_version = TRUE;
b5067602 273 link_info.keep_memory = TRUE;
b5067602 274 link_info.combreloc = TRUE;
d5cd3933 275 link_info.strip_discarded = TRUE;
fdc90cb4 276 link_info.emit_hash = TRUE;
a9a4c53e
AM
277 link_info.callbacks = &link_callbacks;
278 link_info.input_bfds_tail = &link_info.input_bfds;
3dbf70a2
MM
279 /* SVR4 linkers seem to set DT_INIT and DT_FINI based on magic _init
280 and _fini symbols. We are compatible. */
281 link_info.init_function = "_init";
282 link_info.fini_function = "_fini";
a9a4c53e 283 link_info.relax_pass = 1;
889c2a67 284 link_info.extern_protected_data = -1;
aec6b87e 285 link_info.dynamic_undefined_weak = -1;
e0076ab3 286 link_info.pei386_auto_import = -1;
db6751f2 287 link_info.spare_dynamic_tags = 5;
967928e9 288 link_info.path_separator = ':';
6c3bc0f8
NC
289#ifdef DEFAULT_FLAG_COMPRESS_DEBUG
290 link_info.compress_debug = COMPRESS_DEBUG_GABI_ZLIB;
291#endif
6734f10a 292#ifdef DEFAULT_NEW_DTAGS
91001320 293 link_info.new_dtags = DEFAULT_NEW_DTAGS;
6734f10a 294#endif
24718e3b 295
252b5132 296 ldfile_add_arch ("");
252b5132
RH
297 emulation = get_emulation (argc, argv);
298 ldemul_choose_mode (emulation);
742aeb63 299 default_target = ldemul_choose_target (argc, argv);
8be573a7
AM
300 config.maxpagesize = bfd_emul_get_maxpagesize (default_target);
301 config.commonpagesize = bfd_emul_get_commonpagesize (default_target);
252b5132 302 lang_init ();
18d6a79d 303 ldexp_init ();
252b5132 304 ldemul_before_parse ();
b34976b6 305 lang_has_input_file = FALSE;
252b5132
RH
306 parse_args (argc, argv);
307
2d643429
NC
308 if (config.hash_table_size != 0)
309 bfd_hash_set_default_size (config.hash_table_size);
310
9bbc1a67
AM
311#ifdef ENABLE_PLUGINS
312 /* Now all the plugin arguments have been gathered, we can load them. */
d82184d7 313 plugin_load_plugins ();
9bbc1a67 314#endif /* ENABLE_PLUGINS */
36af4a4e 315
9bbc1a67 316 ldemul_set_symbols ();
252b5132 317
14be8564
L
318 /* If we have not already opened and parsed a linker script,
319 try the default script from command line first. */
320 if (saved_script_handle == NULL
321 && command_line.default_script != NULL)
322 {
323 ldfile_open_command_file (command_line.default_script);
324 parser_input = input_script;
325 yyparse ();
326 }
327
b9a8de1e
NC
328 /* If we have not already opened and parsed a linker script
329 read the emulation's appropriate default script. */
b90e1c6f 330 if (saved_script_handle == NULL)
252b5132 331 {
252b5132 332 int isfile;
b7a26f91 333 char *s = ldemul_get_script (&isfile);
252b5132
RH
334
335 if (isfile)
7d24f02c 336 ldfile_open_default_command_file (s);
252b5132 337 else
b7a26f91 338 {
252b5132 339 lex_string = s;
dab69f68 340 lex_redirect (s, _("built in linker script"), 1);
252b5132
RH
341 }
342 parser_input = input_script;
343 yyparse ();
344 lex_string = NULL;
345 }
346
cd6f1cf3 347 if (verbose)
b9a8de1e 348 {
9cb61eab
AM
349 if (saved_script_handle)
350 info_msg (_("using external linker script:"));
351 else
352 info_msg (_("using internal linker script:"));
353 info_msg ("\n==================================================\n");
b9a8de1e
NC
354
355 if (saved_script_handle)
356 {
74699268 357 static const int ld_bufsz = 8193;
b9a8de1e 358 size_t n;
1e9cc1c2 359 char *buf = (char *) xmalloc (ld_bufsz);
b9a8de1e
NC
360
361 rewind (saved_script_handle);
74699268 362 while ((n = fread (buf, 1, ld_bufsz - 1, saved_script_handle)) > 0)
b9a8de1e 363 {
b7a26f91 364 buf[n] = 0;
f5ac6ab3 365 info_msg ("%s", buf);
b9a8de1e
NC
366 }
367 rewind (saved_script_handle);
368 free (buf);
369 }
370 else
371 {
372 int isfile;
373
b7a26f91 374 info_msg (ldemul_get_script (&isfile));
b9a8de1e 375 }
b7a26f91 376
b9a8de1e
NC
377 info_msg ("\n==================================================\n");
378 }
379
7bdf4127
AB
380 if (command_line.force_group_allocation
381 || !bfd_link_relocatable (&link_info))
382 link_info.resolve_section_groups = TRUE;
383 else
384 link_info.resolve_section_groups = FALSE;
385
30824704
RM
386 if (command_line.print_output_format)
387 info_msg ("%s\n", lang_get_output_target ());
388
252b5132
RH
389 lang_final ();
390
61e2488c
JT
391 /* If the only command line argument has been -v or --version or --verbose
392 then ignore any input files provided by linker scripts and exit now.
393 We do not want to create an output file when the linker is just invoked
394 to provide version information. */
395 if (argc == 2 && version_printed)
396 xexit (0);
397
b34976b6 398 if (!lang_has_input_file)
252b5132 399 {
30824704 400 if (version_printed || command_line.print_output_format)
252b5132
RH
401 xexit (0);
402 einfo (_("%P%F: no input files\n"));
403 }
404
405 if (trace_files)
0125cdf2 406 info_msg (_("%P: mode %s\n"), emulation);
252b5132
RH
407
408 ldemul_after_parse ();
409
252b5132
RH
410 if (config.map_filename)
411 {
412 if (strcmp (config.map_filename, "-") == 0)
413 {
414 config.map_file = stdout;
415 }
416 else
417 {
418 config.map_file = fopen (config.map_filename, FOPEN_WT);
419 if (config.map_file == (FILE *) NULL)
420 {
421 bfd_set_error (bfd_error_system_call);
422 einfo (_("%P%F: cannot open map file %s: %E\n"),
423 config.map_filename);
424 }
425 }
426 }
427
252b5132
RH
428 lang_process ();
429
430 /* Print error messages for any missing symbols, for any warning
6d5e62f8 431 symbols, and possibly multiple definitions. */
0e1862bb 432 if (bfd_link_relocatable (&link_info))
f13a99db 433 link_info.output_bfd->flags &= ~EXEC_P;
252b5132 434 else
f13a99db 435 link_info.output_bfd->flags |= EXEC_P;
252b5132 436
0ce398f1
L
437 if ((link_info.compress_debug & COMPRESS_DEBUG))
438 {
439 link_info.output_bfd->flags |= BFD_COMPRESS;
440 if (link_info.compress_debug == COMPRESS_DEBUG_GABI_ZLIB)
441 link_info.output_bfd->flags |= BFD_COMPRESS_GABI;
442 }
443
252b5132
RH
444 ldwrite ();
445
446 if (config.map_file != NULL)
447 lang_map ();
448 if (command_line.cref)
449 output_cref (config.map_file != NULL ? config.map_file : stdout);
450 if (nocrossref_list != NULL)
451 check_nocrossrefs ();
3604cb1f
TG
452 if (command_line.print_memory_usage)
453 lang_print_memory_usage ();
edf84efc
NC
454#if 0
455 {
0aa7f586 456 struct bfd_link_hash_entry *h;
252b5132 457
edf84efc
NC
458 h = bfd_link_hash_lookup (link_info.hash, "__image_base__", 0,0,1);
459 fprintf (stderr, "lookup = %p val %lx\n", h, h ? h->u.def.value : 1);
460 }
461#endif
18d6a79d 462 ldexp_finish ();
750877ba
L
463 lang_finish ();
464
1049f94e 465 /* Even if we're producing relocatable output, some non-fatal errors should
252b5132 466 be reported in the exit status. (What non-fatal errors, if any, do we
1049f94e 467 want to ignore for relocatable output?) */
b34976b6 468 if (!config.make_executable && !force_make_executable)
252b5132 469 {
b34976b6 470 if (trace_files)
0125cdf2
NC
471 einfo (_("%P: link errors found, deleting executable `%s'\n"),
472 output_filename);
252b5132 473
4309cbf2 474 /* The file will be removed by ld_cleanup. */
252b5132
RH
475 xexit (1);
476 }
477 else
478 {
0aa7f586 479 if (!bfd_close (link_info.output_bfd))
f13a99db 480 einfo (_("%F%B: final close failed: %E\n"), link_info.output_bfd);
252b5132
RH
481
482 /* If the --force-exe-suffix is enabled, and we're making an
6d5e62f8
KH
483 executable file and it doesn't end in .exe, copy it to one
484 which does. */
0e1862bb
L
485 if (!bfd_link_relocatable (&link_info)
486 && command_line.force_exe_suffix)
252b5132
RH
487 {
488 int len = strlen (output_filename);
0125cdf2 489
6d5e62f8 490 if (len < 4
252b5132
RH
491 || (strcasecmp (output_filename + len - 4, ".exe") != 0
492 && strcasecmp (output_filename + len - 4, ".dll") != 0))
493 {
494 FILE *src;
495 FILE *dst;
496 const int bsize = 4096;
1e9cc1c2 497 char *buf = (char *) xmalloc (bsize);
252b5132 498 int l;
1e9cc1c2 499 char *dst_name = (char *) xmalloc (len + 5);
0125cdf2 500
252b5132
RH
501 strcpy (dst_name, output_filename);
502 strcat (dst_name, ".exe");
503 src = fopen (output_filename, FOPEN_RB);
504 dst = fopen (dst_name, FOPEN_WB);
505
506 if (!src)
b3862264 507 einfo (_("%P%F: unable to open for source of copy `%s'\n"),
1579bae1 508 output_filename);
252b5132 509 if (!dst)
b3862264 510 einfo (_("%P%F: unable to open for destination of copy `%s'\n"),
1579bae1 511 dst_name);
252b5132
RH
512 while ((l = fread (buf, 1, bsize, src)) > 0)
513 {
514 int done = fwrite (buf, 1, l, dst);
0125cdf2 515
252b5132 516 if (done != l)
0125cdf2 517 einfo (_("%P: Error writing file `%s'\n"), dst_name);
252b5132 518 }
0125cdf2 519
252b5132
RH
520 fclose (src);
521 if (fclose (dst) == EOF)
0125cdf2 522 einfo (_("%P: Error closing file `%s'\n"), dst_name);
252b5132
RH
523 free (dst_name);
524 free (buf);
525 }
526 }
527 }
528
529 END_PROGRESS (program_name);
530
531 if (config.stats)
532 {
252b5132
RH
533 long run_time = get_run_time () - start_time;
534
e922bcab 535 fflush (stdout);
252b5132
RH
536 fprintf (stderr, _("%s: total time in link: %ld.%06ld\n"),
537 program_name, run_time / 1000000, run_time % 1000000);
e922bcab 538 fflush (stderr);
252b5132
RH
539 }
540
4309cbf2 541 /* Prevent ld_cleanup from doing anything, after a successful link. */
252b5132
RH
542 output_filename = NULL;
543
544 xexit (0);
545 return 0;
546}
547
e2243057
RS
548/* If the configured sysroot is relocatable, try relocating it based on
549 default prefix FROM. Return the relocated directory if it exists,
550 otherwise return null. */
551
552static char *
553get_relative_sysroot (const char *from ATTRIBUTE_UNUSED)
554{
555#ifdef TARGET_SYSTEM_ROOT_RELOCATABLE
556 char *path;
557 struct stat s;
558
559 path = make_relative_prefix (program_name, from, TARGET_SYSTEM_ROOT);
560 if (path)
561 {
562 if (stat (path, &s) == 0 && S_ISDIR (s.st_mode))
563 return path;
564 free (path);
565 }
566#endif
567 return 0;
568}
569
570/* Return the sysroot directory. Return "" if no sysroot is being used. */
571
572static const char *
573get_sysroot (int argc, char **argv)
574{
575 int i;
576 const char *path;
577
578 for (i = 1; i < argc; i++)
0112cd26 579 if (CONST_STRNEQ (argv[i], "--sysroot="))
e2243057
RS
580 return argv[i] + strlen ("--sysroot=");
581
582 path = get_relative_sysroot (BINDIR);
583 if (path)
584 return path;
585
586 path = get_relative_sysroot (TOOLBINDIR);
587 if (path)
588 return path;
589
590 return TARGET_SYSTEM_ROOT;
591}
592
252b5132
RH
593/* We need to find any explicitly given emulation in order to initialize the
594 state that's needed by the lex&yacc argument parser (parse_args). */
595
596static char *
1579bae1 597get_emulation (int argc, char **argv)
252b5132
RH
598{
599 char *emulation;
600 int i;
601
602 emulation = getenv (EMULATION_ENVIRON);
603 if (emulation == NULL)
604 emulation = DEFAULT_EMULATION;
605
606 for (i = 1; i < argc; i++)
607 {
0112cd26 608 if (CONST_STRNEQ (argv[i], "-m"))
252b5132
RH
609 {
610 if (argv[i][2] == '\0')
611 {
612 /* -m EMUL */
613 if (i < argc - 1)
614 {
615 emulation = argv[i + 1];
616 i++;
617 }
618 else
0125cdf2 619 einfo (_("%P%F: missing argument to -m\n"));
252b5132
RH
620 }
621 else if (strcmp (argv[i], "-mips1") == 0
622 || strcmp (argv[i], "-mips2") == 0
623 || strcmp (argv[i], "-mips3") == 0
d1cf510e 624 || strcmp (argv[i], "-mips4") == 0
6f33421c
CD
625 || strcmp (argv[i], "-mips5") == 0
626 || strcmp (argv[i], "-mips32") == 0
627 || strcmp (argv[i], "-mips32r2") == 0
7361da2c 628 || strcmp (argv[i], "-mips32r6") == 0
5f74bc13 629 || strcmp (argv[i], "-mips64") == 0
7361da2c
AB
630 || strcmp (argv[i], "-mips64r2") == 0
631 || strcmp (argv[i], "-mips64r6") == 0)
252b5132 632 {
31d677f9 633 /* FIXME: The arguments -mips1, -mips2, -mips3, etc. are
252b5132
RH
634 passed to the linker by some MIPS compilers. They
635 generally tell the linker to use a slightly different
636 library path. Perhaps someday these should be
637 implemented as emulations; until then, we just ignore
638 the arguments and hope that nobody ever creates
639 emulations named ips1, ips2 or ips3. */
640 }
641 else if (strcmp (argv[i], "-m486") == 0)
642 {
643 /* FIXME: The argument -m486 is passed to the linker on
644 some Linux systems. Hope that nobody creates an
645 emulation named 486. */
646 }
647 else
648 {
649 /* -mEMUL */
650 emulation = &argv[i][2];
651 }
652 }
653 }
654
655 return emulation;
656}
657
252b5132 658void
1579bae1 659add_ysym (const char *name)
252b5132 660{
1579bae1 661 if (link_info.notice_hash == NULL)
252b5132 662 {
0aa7f586
AM
663 link_info.notice_hash
664 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
665 if (!bfd_hash_table_init_n (link_info.notice_hash,
666 bfd_hash_newfunc,
667 sizeof (struct bfd_hash_entry),
668 61))
252b5132 669 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
6d5e62f8 670 }
252b5132 671
1579bae1 672 if (bfd_hash_lookup (link_info.notice_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
673 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
674}
675
0e86e20e
AM
676void
677add_ignoresym (struct bfd_link_info *info, const char *name)
678{
679 if (info->ignore_hash == NULL)
680 {
681 info->ignore_hash = xmalloc (sizeof (struct bfd_hash_table));
0aa7f586
AM
682 if (!bfd_hash_table_init_n (info->ignore_hash,
683 bfd_hash_newfunc,
684 sizeof (struct bfd_hash_entry),
685 61))
0e86e20e
AM
686 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
687 }
688
689 if (bfd_hash_lookup (info->ignore_hash, name, TRUE, TRUE) == NULL)
690 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
691}
692
252b5132
RH
693/* Record a symbol to be wrapped, from the --wrap option. */
694
695void
1579bae1 696add_wrap (const char *name)
252b5132
RH
697{
698 if (link_info.wrap_hash == NULL)
699 {
0aa7f586
AM
700 link_info.wrap_hash
701 = (struct bfd_hash_table *) xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
702 if (!bfd_hash_table_init_n (link_info.wrap_hash,
703 bfd_hash_newfunc,
704 sizeof (struct bfd_hash_entry),
705 61))
252b5132
RH
706 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
707 }
0125cdf2 708
b34976b6 709 if (bfd_hash_lookup (link_info.wrap_hash, name, TRUE, TRUE) == NULL)
252b5132
RH
710 einfo (_("%P%F: bfd_hash_lookup failed: %E\n"));
711}
712
713/* Handle the -retain-symbols-file option. */
714
715void
1579bae1 716add_keepsyms_file (const char *filename)
252b5132
RH
717{
718 FILE *file;
719 char *buf;
720 size_t bufsize;
721 int c;
722
723 if (link_info.strip == strip_some)
724 einfo (_("%X%P: error: duplicate retain-symbols-file\n"));
725
726 file = fopen (filename, "r");
1579bae1 727 if (file == NULL)
252b5132
RH
728 {
729 bfd_set_error (bfd_error_system_call);
730 einfo ("%X%P: %s: %E\n", filename);
731 return;
732 }
733
1e9cc1c2
NC
734 link_info.keep_hash = (struct bfd_hash_table *)
735 xmalloc (sizeof (struct bfd_hash_table));
66eb6687
AM
736 if (!bfd_hash_table_init (link_info.keep_hash, bfd_hash_newfunc,
737 sizeof (struct bfd_hash_entry)))
252b5132
RH
738 einfo (_("%P%F: bfd_hash_table_init failed: %E\n"));
739
740 bufsize = 100;
1e9cc1c2 741 buf = (char *) xmalloc (bufsize);
252b5132
RH
742
743 c = getc (file);
744 while (c != EOF)
745 {
3882b010 746 while (ISSPACE (c))
252b5132
RH
747 c = getc (file);
748
749 if (c != EOF)
750 {
751 size_t len = 0;
752
0aa7f586 753 while (!ISSPACE (c) && c != EOF)
252b5132
RH
754 {
755 buf[len] = c;
756 ++len;
757 if (len >= bufsize)
758 {
759 bufsize *= 2;
1e9cc1c2 760 buf = (char *) xrealloc (buf, bufsize);
252b5132
RH
761 }
762 c = getc (file);
763 }
764
765 buf[len] = '\0';
766
1579bae1 767 if (bfd_hash_lookup (link_info.keep_hash, buf, TRUE, TRUE) == NULL)
252b5132
RH
768 einfo (_("%P%F: bfd_hash_lookup for insertion failed: %E\n"));
769 }
770 }
771
772 if (link_info.strip != strip_none)
773 einfo (_("%P: `-retain-symbols-file' overrides `-s' and `-S'\n"));
774
5ed6aba4 775 free (buf);
252b5132 776 link_info.strip = strip_some;
d9313f4f 777 fclose (file);
252b5132
RH
778}
779\f
780/* Callbacks from the BFD linker routines. */
781
782/* This is called when BFD has decided to include an archive member in
783 a link. */
784
b34976b6 785static bfd_boolean
e1fffbe6 786add_archive_element (struct bfd_link_info *info,
1579bae1 787 bfd *abfd,
5d3236ee
DK
788 const char *name,
789 bfd **subsbfd ATTRIBUTE_UNUSED)
252b5132
RH
790{
791 lang_input_statement_type *input;
5d3236ee 792 lang_input_statement_type orig_input;
252b5132 793
1e9cc1c2
NC
794 input = (lang_input_statement_type *)
795 xcalloc (1, sizeof (lang_input_statement_type));
fb47deda 796 input->header.type = lang_input_statement_enum;
252b5132
RH
797 input->filename = abfd->filename;
798 input->local_sym_name = abfd->filename;
799 input->the_bfd = abfd;
252b5132 800
5d3236ee
DK
801 /* Save the original data for trace files/tries below, as plugins
802 (if enabled) may possibly alter it to point to a replacement
803 BFD, but we still want to output the original BFD filename. */
804 orig_input = *input;
805#ifdef ENABLE_PLUGINS
b95a0a31 806 if (link_info.lto_plugin_active)
5d3236ee
DK
807 {
808 /* We must offer this archive member to the plugins to claim. */
35a1e5f3
L
809 plugin_maybe_claim (input);
810 if (input->flags.claimed)
5d3236ee 811 {
b95a0a31
L
812 if (no_more_claiming)
813 {
814 /* Don't claim new IR symbols after all IR symbols have
815 been claimed. */
816 if (trace_files || verbose)
817 info_msg ("%I: no new IR symbols to claimi\n",
818 &orig_input);
819 input->flags.claimed = 0;
820 return FALSE;
821 }
35a1e5f3
L
822 input->flags.claim_archive = TRUE;
823 *subsbfd = input->the_bfd;
5d3236ee
DK
824 }
825 }
826#endif /* ENABLE_PLUGINS */
827
252b5132
RH
828 ldlang_add_file (input);
829
1579bae1 830 if (config.map_file != NULL)
252b5132 831 {
b34976b6 832 static bfd_boolean header_printed;
252b5132
RH
833 struct bfd_link_hash_entry *h;
834 bfd *from;
835 int len;
836
e1fffbe6 837 h = bfd_link_hash_lookup (info->hash, name, FALSE, FALSE, TRUE);
252b5132
RH
838
839 if (h == NULL)
840 from = NULL;
841 else
842 {
843 switch (h->type)
844 {
845 default:
846 from = NULL;
847 break;
848
849 case bfd_link_hash_defined:
850 case bfd_link_hash_defweak:
851 from = h->u.def.section->owner;
852 break;
853
854 case bfd_link_hash_undefined:
855 case bfd_link_hash_undefweak:
856 from = h->u.undef.abfd;
857 break;
858
859 case bfd_link_hash_common:
860 from = h->u.c.p->section->owner;
861 break;
862 }
863 }
864
0aa7f586 865 if (!header_printed)
252b5132 866 {
1273da04 867 minfo (_("Archive member included to satisfy reference by file (symbol)\n\n"));
b34976b6 868 header_printed = TRUE;
252b5132
RH
869 }
870
3860d2b4
AM
871 if (abfd->my_archive == NULL
872 || bfd_is_thin_archive (abfd->my_archive))
252b5132
RH
873 {
874 minfo ("%s", bfd_get_filename (abfd));
875 len = strlen (bfd_get_filename (abfd));
876 }
877 else
878 {
3860d2b4 879 minfo ("%s(%s)", bfd_get_filename (abfd->my_archive),
252b5132 880 bfd_get_filename (abfd));
3860d2b4 881 len = (strlen (bfd_get_filename (abfd->my_archive))
252b5132
RH
882 + strlen (bfd_get_filename (abfd))
883 + 2);
884 }
885
886 if (len >= 29)
887 {
888 print_nl ();
889 len = 0;
890 }
891 while (len < 30)
892 {
893 print_space ();
894 ++len;
895 }
896
897 if (from != NULL)
898 minfo ("%B ", from);
899 if (h != NULL)
900 minfo ("(%T)\n", h->root.string);
901 else
902 minfo ("(%s)\n", name);
903 }
904
cd6f1cf3 905 if (trace_files || verbose)
5d3236ee 906 info_msg ("%I\n", &orig_input);
b34976b6 907 return TRUE;
252b5132
RH
908}
909
910/* This is called when BFD has discovered a symbol which is defined
911 multiple times. */
912
1a72702b 913static void
24f58f47
AM
914multiple_definition (struct bfd_link_info *info,
915 struct bfd_link_hash_entry *h,
1579bae1
AM
916 bfd *nbfd,
917 asection *nsec,
918 bfd_vma nval)
252b5132 919{
24f58f47
AM
920 const char *name;
921 bfd *obfd;
922 asection *osec;
923 bfd_vma oval;
924
925 if (info->allow_multiple_definition)
1a72702b 926 return;
24f58f47
AM
927
928 switch (h->type)
929 {
930 case bfd_link_hash_defined:
931 osec = h->u.def.section;
932 oval = h->u.def.value;
933 obfd = h->u.def.section->owner;
934 break;
935 case bfd_link_hash_indirect:
936 osec = bfd_ind_section_ptr;
937 oval = 0;
938 obfd = NULL;
939 break;
940 default:
941 abort ();
942 }
943
944 /* Ignore a redefinition of an absolute symbol to the
945 same value; it's harmless. */
946 if (h->type == bfd_link_hash_defined
947 && bfd_is_abs_section (osec)
948 && bfd_is_abs_section (nsec)
949 && nval == oval)
1a72702b 950 return;
24f58f47 951
252b5132
RH
952 /* If either section has the output_section field set to
953 bfd_abs_section_ptr, it means that the section is being
954 discarded, and this is not really a multiple definition at all.
9e2278f5
AM
955 FIXME: It would be cleaner to somehow ignore symbols defined in
956 sections which are being discarded. */
252b5132 957 if ((osec->output_section != NULL
0aa7f586 958 && !bfd_is_abs_section (osec)
252b5132
RH
959 && bfd_is_abs_section (osec->output_section))
960 || (nsec->output_section != NULL
0aa7f586 961 && !bfd_is_abs_section (nsec)
252b5132 962 && bfd_is_abs_section (nsec->output_section)))
1a72702b 963 return;
252b5132 964
24f58f47
AM
965 name = h->root.string;
966 if (nbfd == NULL)
967 {
968 nbfd = obfd;
969 nsec = osec;
970 nval = oval;
971 obfd = NULL;
972 }
252b5132
RH
973 einfo (_("%X%C: multiple definition of `%T'\n"),
974 nbfd, nsec, nval, name);
1579bae1 975 if (obfd != NULL)
252b5132 976 einfo (_("%D: first defined here\n"), obfd, osec, oval);
9b14b192 977
13761a11 978 if (RELAXATION_ENABLED_BY_USER)
9b14b192
NC
979 {
980 einfo (_("%P: Disabling relaxation: it will not work with multiple definitions\n"));
13761a11 981 DISABLE_RELAXATION;
9b14b192 982 }
252b5132
RH
983}
984
985/* This is called when there is a definition of a common symbol, or
986 when a common symbol is found for a symbol that is already defined,
987 or when two common symbols are found. We only do something if
988 -warn-common was used. */
989
1a72702b 990static void
1579bae1 991multiple_common (struct bfd_link_info *info ATTRIBUTE_UNUSED,
24f58f47 992 struct bfd_link_hash_entry *h,
1579bae1
AM
993 bfd *nbfd,
994 enum bfd_link_hash_type ntype,
995 bfd_vma nsize)
252b5132 996{
24f58f47
AM
997 const char *name;
998 bfd *obfd;
999 enum bfd_link_hash_type otype;
1000 bfd_vma osize;
1001
1002 if (!config.warn_common)
1a72702b 1003 return;
252b5132 1004
24f58f47
AM
1005 name = h->root.string;
1006 otype = h->type;
1007 if (otype == bfd_link_hash_common)
1008 {
1009 obfd = h->u.c.p->section->owner;
1010 osize = h->u.c.size;
1011 }
1012 else if (otype == bfd_link_hash_defined
1013 || otype == bfd_link_hash_defweak)
1014 {
1015 obfd = h->u.def.section->owner;
1016 osize = 0;
1017 }
1018 else
1019 {
1020 /* FIXME: It would nice if we could report the BFD which defined
1021 an indirect symbol, but we don't have anywhere to store the
1022 information. */
1023 obfd = NULL;
1024 osize = 0;
1025 }
1026
252b5132
RH
1027 if (ntype == bfd_link_hash_defined
1028 || ntype == bfd_link_hash_defweak
1029 || ntype == bfd_link_hash_indirect)
1030 {
1031 ASSERT (otype == bfd_link_hash_common);
1032 einfo (_("%B: warning: definition of `%T' overriding common\n"),
1033 nbfd, name);
1034 if (obfd != NULL)
1035 einfo (_("%B: warning: common is here\n"), obfd);
1036 }
1037 else if (otype == bfd_link_hash_defined
1038 || otype == bfd_link_hash_defweak
1039 || otype == bfd_link_hash_indirect)
1040 {
1041 ASSERT (ntype == bfd_link_hash_common);
1042 einfo (_("%B: warning: common of `%T' overridden by definition\n"),
1043 nbfd, name);
1044 if (obfd != NULL)
1045 einfo (_("%B: warning: defined here\n"), obfd);
1046 }
1047 else
1048 {
1049 ASSERT (otype == bfd_link_hash_common && ntype == bfd_link_hash_common);
1050 if (osize > nsize)
1051 {
1052 einfo (_("%B: warning: common of `%T' overridden by larger common\n"),
1053 nbfd, name);
1054 if (obfd != NULL)
1055 einfo (_("%B: warning: larger common is here\n"), obfd);
1056 }
1057 else if (nsize > osize)
1058 {
1059 einfo (_("%B: warning: common of `%T' overriding smaller common\n"),
1060 nbfd, name);
1061 if (obfd != NULL)
1062 einfo (_("%B: warning: smaller common is here\n"), obfd);
1063 }
1064 else
1065 {
1066 einfo (_("%B: warning: multiple common of `%T'\n"), nbfd, name);
1067 if (obfd != NULL)
1068 einfo (_("%B: warning: previous common is here\n"), obfd);
1069 }
1070 }
252b5132
RH
1071}
1072
1073/* This is called when BFD has discovered a set element. H is the
1074 entry in the linker hash table for the set. SECTION and VALUE
1075 represent a value which should be added to the set. */
1076
1a72702b 1077static void
1579bae1
AM
1078add_to_set (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1079 struct bfd_link_hash_entry *h,
1080 bfd_reloc_code_real_type reloc,
1081 bfd *abfd,
1082 asection *section,
1083 bfd_vma value)
252b5132
RH
1084{
1085 if (config.warn_constructors)
1086 einfo (_("%P: warning: global constructor %s used\n"),
1087 h->root.string);
1088
0aa7f586 1089 if (!config.build_constructors)
1a72702b 1090 return;
252b5132 1091
1579bae1 1092 ldctor_add_set_entry (h, reloc, NULL, section, value);
252b5132
RH
1093
1094 if (h->type == bfd_link_hash_new)
1095 {
1096 h->type = bfd_link_hash_undefined;
1097 h->u.undef.abfd = abfd;
1098 /* We don't call bfd_link_add_undef to add this to the list of
1099 undefined symbols because we are going to define it
1100 ourselves. */
1101 }
252b5132
RH
1102}
1103
1104/* This is called when BFD has discovered a constructor. This is only
1105 called for some object file formats--those which do not handle
1106 constructors in some more clever fashion. This is similar to
1107 adding an element to a set, but less general. */
1108
1a72702b 1109static void
1579bae1
AM
1110constructor_callback (struct bfd_link_info *info,
1111 bfd_boolean constructor,
1112 const char *name,
1113 bfd *abfd,
1114 asection *section,
1115 bfd_vma value)
252b5132
RH
1116{
1117 char *s;
1118 struct bfd_link_hash_entry *h;
1119 char set_name[1 + sizeof "__CTOR_LIST__"];
1120
1121 if (config.warn_constructors)
1122 einfo (_("%P: warning: global constructor %s used\n"), name);
1123
0aa7f586 1124 if (!config.build_constructors)
1a72702b 1125 return;
252b5132
RH
1126
1127 /* Ensure that BFD_RELOC_CTOR exists now, so that we can give a
1128 useful error message. */
0e86e20e 1129 if (bfd_reloc_type_lookup (info->output_bfd, BFD_RELOC_CTOR) == NULL
0e1862bb 1130 && (bfd_link_relocatable (info)
252b5132
RH
1131 || bfd_reloc_type_lookup (abfd, BFD_RELOC_CTOR) == NULL))
1132 einfo (_("%P%F: BFD backend error: BFD_RELOC_CTOR unsupported\n"));
1133
1134 s = set_name;
1135 if (bfd_get_symbol_leading_char (abfd) != '\0')
1136 *s++ = bfd_get_symbol_leading_char (abfd);
1137 if (constructor)
1138 strcpy (s, "__CTOR_LIST__");
1139 else
1140 strcpy (s, "__DTOR_LIST__");
1141
b34976b6 1142 h = bfd_link_hash_lookup (info->hash, set_name, TRUE, TRUE, TRUE);
252b5132
RH
1143 if (h == (struct bfd_link_hash_entry *) NULL)
1144 einfo (_("%P%F: bfd_link_hash_lookup failed: %E\n"));
1145 if (h->type == bfd_link_hash_new)
1146 {
1147 h->type = bfd_link_hash_undefined;
1148 h->u.undef.abfd = abfd;
1149 /* We don't call bfd_link_add_undef to add this to the list of
1150 undefined symbols because we are going to define it
1151 ourselves. */
1152 }
1153
1154 ldctor_add_set_entry (h, BFD_RELOC_CTOR, name, section, value);
252b5132
RH
1155}
1156
1157/* A structure used by warning_callback to pass information through
1158 bfd_map_over_sections. */
1159
0125cdf2
NC
1160struct warning_callback_info
1161{
b34976b6 1162 bfd_boolean found;
252b5132
RH
1163 const char *warning;
1164 const char *symbol;
1165 asymbol **asymbols;
1166};
1167
4c6d802e
L
1168/* Look through the relocs to see if we can find a plausible address
1169 for SYMBOL in ABFD. Return TRUE if found. Otherwise return FALSE. */
1170
1171static bfd_boolean
1172symbol_warning (const char *warning, const char *symbol, bfd *abfd)
1173{
1174 struct warning_callback_info cinfo;
1175
1176 if (!bfd_generic_link_read_symbols (abfd))
1177 einfo (_("%B%F: could not read symbols: %E\n"), abfd);
1178
1179 cinfo.found = FALSE;
1180 cinfo.warning = warning;
1181 cinfo.symbol = symbol;
1182 cinfo.asymbols = bfd_get_outsymbols (abfd);
1183 bfd_map_over_sections (abfd, warning_find_reloc, &cinfo);
1184 return cinfo.found;
1185}
1186
252b5132
RH
1187/* This is called when there is a reference to a warning symbol. */
1188
1a72702b 1189static void
1579bae1
AM
1190warning_callback (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1191 const char *warning,
1192 const char *symbol,
1193 bfd *abfd,
1194 asection *section,
1195 bfd_vma address)
252b5132
RH
1196{
1197 /* This is a hack to support warn_multiple_gp. FIXME: This should
1198 have a cleaner interface, but what? */
0aa7f586 1199 if (!config.warn_multiple_gp
252b5132 1200 && strcmp (warning, "using multiple gp values") == 0)
1a72702b 1201 return;
252b5132
RH
1202
1203 if (section != NULL)
300475fe 1204 einfo ("%C: %s%s\n", abfd, section, address, _("warning: "), warning);
252b5132 1205 else if (abfd == NULL)
300475fe 1206 einfo ("%P: %s%s\n", _("warning: "), warning);
252b5132 1207 else if (symbol == NULL)
300475fe 1208 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
0aa7f586 1209 else if (!symbol_warning (warning, symbol, abfd))
252b5132 1210 {
4c6d802e
L
1211 bfd *b;
1212 /* Search all input files for a reference to SYMBOL. */
c72f2fb2 1213 for (b = info->input_bfds; b; b = b->link.next)
4c6d802e 1214 if (b != abfd && symbol_warning (warning, symbol, b))
1a72702b 1215 return;
4c6d802e 1216 einfo ("%B: %s%s\n", abfd, _("warning: "), warning);
252b5132 1217 }
252b5132
RH
1218}
1219
1220/* This is called by warning_callback for each section. It checks the
1221 relocs of the section to see if it can find a reference to the
1222 symbol which triggered the warning. If it can, it uses the reloc
1223 to give an error message with a file and line number. */
1224
1225static void
1579bae1 1226warning_find_reloc (bfd *abfd, asection *sec, void *iarg)
252b5132 1227{
1e9cc1c2 1228 struct warning_callback_info *info = (struct warning_callback_info *) iarg;
252b5132
RH
1229 long relsize;
1230 arelent **relpp;
1231 long relcount;
1232 arelent **p, **pend;
1233
1234 if (info->found)
1235 return;
1236
1237 relsize = bfd_get_reloc_upper_bound (abfd, sec);
1238 if (relsize < 0)
1239 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1240 if (relsize == 0)
1241 return;
1242
1e9cc1c2 1243 relpp = (arelent **) xmalloc (relsize);
252b5132
RH
1244 relcount = bfd_canonicalize_reloc (abfd, sec, relpp, info->asymbols);
1245 if (relcount < 0)
1246 einfo (_("%B%F: could not read relocs: %E\n"), abfd);
1247
1248 p = relpp;
1249 pend = p + relcount;
1250 for (; p < pend && *p != NULL; p++)
1251 {
1252 arelent *q = *p;
1253
1254 if (q->sym_ptr_ptr != NULL
1255 && *q->sym_ptr_ptr != NULL
1256 && strcmp (bfd_asymbol_name (*q->sym_ptr_ptr), info->symbol) == 0)
1257 {
1258 /* We found a reloc for the symbol we are looking for. */
300475fe
HPN
1259 einfo ("%C: %s%s\n", abfd, sec, q->address, _("warning: "),
1260 info->warning);
b34976b6 1261 info->found = TRUE;
252b5132
RH
1262 break;
1263 }
1264 }
1265
1266 free (relpp);
1267}
1268
1269/* This is called when an undefined symbol is found. */
1270
1a72702b 1271static void
0e86e20e 1272undefined_symbol (struct bfd_link_info *info,
1579bae1
AM
1273 const char *name,
1274 bfd *abfd,
1275 asection *section,
1276 bfd_vma address,
0b28295d 1277 bfd_boolean error)
252b5132
RH
1278{
1279 static char *error_name;
1280 static unsigned int error_count;
1281
1282#define MAX_ERRORS_IN_A_ROW 5
1283
0e86e20e
AM
1284 if (info->ignore_hash != NULL
1285 && bfd_hash_lookup (info->ignore_hash, name, FALSE, FALSE) != NULL)
1a72702b 1286 return;
0e86e20e 1287
252b5132
RH
1288 if (config.warn_once)
1289 {
252b5132 1290 /* Only warn once about a particular undefined symbol. */
0e86e20e 1291 add_ignoresym (info, name);
252b5132
RH
1292 }
1293
1294 /* We never print more than a reasonable number of errors in a row
1295 for a single symbol. */
1579bae1 1296 if (error_name != NULL
252b5132
RH
1297 && strcmp (name, error_name) == 0)
1298 ++error_count;
1299 else
1300 {
1301 error_count = 0;
1579bae1 1302 if (error_name != NULL)
252b5132 1303 free (error_name);
d1b2b2dc 1304 error_name = xstrdup (name);
252b5132
RH
1305 }
1306
1307 if (section != NULL)
1308 {
1309 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1310 {
0b28295d
ILT
1311 if (error)
1312 einfo (_("%X%C: undefined reference to `%T'\n"),
1313 abfd, section, address, name);
1314 else
1315 einfo (_("%C: warning: undefined reference to `%T'\n"),
1316 abfd, section, address, name);
b6f29aaa 1317 }
252b5132 1318 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1319 {
1320 if (error)
1321 einfo (_("%X%D: more undefined references to `%T' follow\n"),
1322 abfd, section, address, name);
1323 else
1324 einfo (_("%D: warning: more undefined references to `%T' follow\n"),
1325 abfd, section, address, name);
1326 }
1327 else if (error)
1328 einfo ("%X");
252b5132
RH
1329 }
1330 else
1331 {
1332 if (error_count < MAX_ERRORS_IN_A_ROW)
b6f29aaa 1333 {
0b28295d
ILT
1334 if (error)
1335 einfo (_("%X%B: undefined reference to `%T'\n"),
1336 abfd, name);
1337 else
1338 einfo (_("%B: warning: undefined reference to `%T'\n"),
1339 abfd, name);
b6f29aaa 1340 }
252b5132 1341 else if (error_count == MAX_ERRORS_IN_A_ROW)
0b28295d
ILT
1342 {
1343 if (error)
1344 einfo (_("%X%B: more undefined references to `%T' follow\n"),
1345 abfd, name);
1346 else
1347 einfo (_("%B: warning: more undefined references to `%T' follow\n"),
1348 abfd, name);
1349 }
1350 else if (error)
1351 einfo ("%X");
252b5132 1352 }
252b5132
RH
1353}
1354
8aae64e6
AO
1355/* Counter to limit the number of relocation overflow error messages
1356 to print. Errors are printed as it is decremented. When it's
1357 called and the counter is zero, a final message is printed
1358 indicating more relocations were omitted. When it gets to -1, no
1359 such errors are printed. If it's initially set to a value less
1360 than -1, all such errors will be printed (--verbose does this). */
1361
1362int overflow_cutoff_limit = 10;
1363
252b5132
RH
1364/* This is called when a reloc overflows. */
1365
1a72702b 1366static void
0e86e20e 1367reloc_overflow (struct bfd_link_info *info,
dfeffb9f 1368 struct bfd_link_hash_entry *entry,
1579bae1
AM
1369 const char *name,
1370 const char *reloc_name,
1371 bfd_vma addend,
1372 bfd *abfd,
1373 asection *section,
1374 bfd_vma address)
252b5132 1375{
8aae64e6 1376 if (overflow_cutoff_limit == -1)
1a72702b 1377 return;
8aae64e6 1378
270396f2 1379 einfo ("%X%H:", abfd, section, address);
8aae64e6
AO
1380
1381 if (overflow_cutoff_limit >= 0
1382 && overflow_cutoff_limit-- == 0)
1383 {
1384 einfo (_(" additional relocation overflows omitted from the output\n"));
1a72702b 1385 return;
8aae64e6
AO
1386 }
1387
dfeffb9f
L
1388 if (entry)
1389 {
1390 while (entry->type == bfd_link_hash_indirect
1391 || entry->type == bfd_link_hash_warning)
1392 entry = entry->u.i.link;
1393 switch (entry->type)
1394 {
1395 case bfd_link_hash_undefined:
1396 case bfd_link_hash_undefweak:
0aa7f586
AM
1397 einfo (_(" relocation truncated to fit: "
1398 "%s against undefined symbol `%T'"),
dfeffb9f
L
1399 reloc_name, entry->root.string);
1400 break;
1401 case bfd_link_hash_defined:
1402 case bfd_link_hash_defweak:
0aa7f586
AM
1403 einfo (_(" relocation truncated to fit: "
1404 "%s against symbol `%T' defined in %A section in %B"),
dfeffb9f 1405 reloc_name, entry->root.string,
a6e1b90f
L
1406 entry->u.def.section,
1407 entry->u.def.section == bfd_abs_section_ptr
0e86e20e 1408 ? info->output_bfd : entry->u.def.section->owner);
dfeffb9f
L
1409 break;
1410 default:
1411 abort ();
1412 break;
1413 }
1414 }
1415 else
1416 einfo (_(" relocation truncated to fit: %s against `%T'"),
1417 reloc_name, name);
252b5132
RH
1418 if (addend != 0)
1419 einfo ("+%v", addend);
1420 einfo ("\n");
252b5132
RH
1421}
1422
1423/* This is called when a dangerous relocation is made. */
1424
1a72702b 1425static void
1579bae1
AM
1426reloc_dangerous (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1427 const char *message,
1428 bfd *abfd,
1429 asection *section,
1430 bfd_vma address)
252b5132 1431{
270396f2 1432 einfo (_("%X%H: dangerous relocation: %s\n"),
e1fffbe6 1433 abfd, section, address, message);
252b5132
RH
1434}
1435
1436/* This is called when a reloc is being generated attached to a symbol
1437 that is not being output. */
1438
1a72702b 1439static void
1579bae1
AM
1440unattached_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1441 const char *name,
1442 bfd *abfd,
1443 asection *section,
1444 bfd_vma address)
252b5132 1445{
270396f2 1446 einfo (_("%X%H: reloc refers to symbol `%T' which is not being output\n"),
e1fffbe6 1447 abfd, section, address, name);
252b5132
RH
1448}
1449
1450/* This is called if link_info.notice_all is set, or when a symbol in
1451 link_info.notice_hash is found. Symbols are put in notice_hash
5d3236ee
DK
1452 using the -y option, while notice_all is set if the --cref option
1453 has been supplied, or if there are any NOCROSSREFS sections in the
1454 linker script; and if plugins are active, since they need to monitor
1455 all references from non-IR files. */
252b5132 1456
b34976b6 1457static bfd_boolean
1579bae1 1458notice (struct bfd_link_info *info,
35ed3f94 1459 struct bfd_link_hash_entry *h,
46135103 1460 struct bfd_link_hash_entry *inh ATTRIBUTE_UNUSED,
1579bae1
AM
1461 bfd *abfd,
1462 asection *section,
16d96b5b 1463 bfd_vma value,
46135103 1464 flagword flags ATTRIBUTE_UNUSED)
252b5132 1465{
35ed3f94
AM
1466 const char *name;
1467
1468 if (h == NULL)
5061a885
AM
1469 {
1470 if (command_line.cref || nocrossref_list != NULL)
1e9cc1c2 1471 return handle_asneeded_cref (abfd, (enum notice_asneeded_action) value);
5061a885
AM
1472 return TRUE;
1473 }
1474
35ed3f94 1475 name = h->root.string;
5d3236ee 1476 if (info->notice_hash != NULL
9e2278f5 1477 && bfd_hash_lookup (info->notice_hash, name, FALSE, FALSE) != NULL)
252b5132
RH
1478 {
1479 if (bfd_is_und_section (section))
1480 einfo ("%B: reference to %s\n", abfd, name);
1481 else
1482 einfo ("%B: definition of %s\n", abfd, name);
1483 }
1484
1485 if (command_line.cref || nocrossref_list != NULL)
1486 add_cref (name, abfd, section, value);
1487
b34976b6 1488 return TRUE;
252b5132 1489}