Remove use of alloca.
[deliverable/binutils-gdb.git] / ld / plugin.c
CommitLineData
5d3236ee 1/* Plugin control for the GNU linker.
6f2750fe 2 Copyright (C) 2010-2016 Free Software Foundation, Inc.
5d3236ee
DK
3
4 This file is part of the GNU Binutils.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21#include "sysdep.h"
22#include "libiberty.h"
23#include "bfd.h"
35a1e5f3 24#include "libbfd.h"
5d3236ee
DK
25#include "bfdlink.h"
26#include "bfdver.h"
27#include "ld.h"
28#include "ldmain.h"
29#include "ldmisc.h"
30#include "ldexp.h"
31#include "ldlang.h"
32#include "ldfile.h"
5ae0078c 33#include "../bfd/plugin.h"
5d3236ee
DK
34#include "plugin.h"
35#include "plugin-api.h"
36#include "elf-bfd.h"
2aec968d
L
37#if HAVE_MMAP
38# include <sys/mman.h>
39# ifndef MAP_FAILED
40# define MAP_FAILED ((void *) -1)
41# endif
42# ifndef PROT_READ
43# define PROT_READ 0
44# endif
45# ifndef MAP_PRIVATE
46# define MAP_PRIVATE 0
47# endif
48#endif
f4b78d18
L
49#include <errno.h>
50#if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
51extern int errno;
52#endif
3917d5d5 53#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
f31d24a0 54#include <windows.h>
3917d5d5 55#endif
5d3236ee 56
1715a13c
L
57/* Report plugin symbols. */
58bfd_boolean report_plugin_symbols;
59
5d3236ee
DK
60/* The suffix to append to the name of the real (claimed) object file
61 when generating a dummy BFD to hold the IR symbols sent from the
cf4dc96f
DK
62 plugin. For cosmetic use only; appears in maps, crefs etc. */
63#define IRONLY_SUFFIX " (symbol from plugin)"
5d3236ee
DK
64
65/* Stores a single argument passed to a plugin. */
66typedef struct plugin_arg
67{
68 struct plugin_arg *next;
69 const char *arg;
70} plugin_arg_t;
71
72/* Holds all details of a single plugin. */
73typedef struct plugin
74{
75 /* Next on the list of plugins, or NULL at end of chain. */
76 struct plugin *next;
77 /* The argument string given to --plugin. */
78 const char *name;
79 /* The shared library handle returned by dlopen. */
80 void *dlhandle;
81 /* The list of argument string given to --plugin-opt. */
82 plugin_arg_t *args;
83 /* Number of args in the list, for convenience. */
84 size_t n_args;
85 /* The plugin's event handlers. */
86 ld_plugin_claim_file_handler claim_file_handler;
87 ld_plugin_all_symbols_read_handler all_symbols_read_handler;
88 ld_plugin_cleanup_handler cleanup_handler;
89 /* TRUE if the cleanup handlers have been called. */
90 bfd_boolean cleanup_done;
91} plugin_t;
92
2aec968d
L
93typedef struct view_buffer
94{
95 char *addr;
96 size_t filesize;
97 off_t offset;
98} view_buffer_t;
99
f4b78d18
L
100/* The internal version of struct ld_plugin_input_file with a BFD
101 pointer. */
102typedef struct plugin_input_file
103{
104 bfd *abfd;
2aec968d 105 view_buffer_t view_buffer;
f4b78d18
L
106 char *name;
107 int fd;
38604796 108 bfd_boolean use_mmap;
f4b78d18
L
109 off_t offset;
110 off_t filesize;
111} plugin_input_file_t;
112
5d3236ee
DK
113/* The master list of all plugins. */
114static plugin_t *plugins_list = NULL;
115
116/* We keep a tail pointer for easy linking on the end. */
117static plugin_t **plugins_tail_chain_ptr = &plugins_list;
118
119/* The last plugin added to the list, for receiving args. */
120static plugin_t *last_plugin = NULL;
121
122/* The tail of the arg chain of the last plugin added to the list. */
123static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
124
125/* The plugin which is currently having a callback executed. */
126static plugin_t *called_plugin = NULL;
127
128/* Last plugin to cause an error, if any. */
129static const char *error_plugin = NULL;
130
24f58f47 131/* State of linker "notice" interface before we poked at it. */
9e2278f5 132static bfd_boolean orig_notice_all;
9e2278f5
AM
133
134/* Original linker callbacks, and the plugin version. */
135static const struct bfd_link_callbacks *orig_callbacks;
136static struct bfd_link_callbacks plugin_callbacks;
137
5d3236ee
DK
138/* Set at all symbols read time, to avoid recursively offering the plugin
139 its own newly-added input files and libs to claim. */
9e2278f5 140bfd_boolean no_more_claiming = FALSE;
5d3236ee 141
38604796
L
142#if HAVE_MMAP && HAVE_GETPAGESIZE
143/* Page size used by mmap. */
144static off_t plugin_pagesize;
145#endif
146
5d3236ee
DK
147/* List of tags to set in the constant leading part of the tv array. */
148static const enum ld_plugin_tag tv_header_tags[] =
149{
150 LDPT_MESSAGE,
151 LDPT_API_VERSION,
152 LDPT_GNU_LD_VERSION,
153 LDPT_LINKER_OUTPUT,
154 LDPT_OUTPUT_NAME,
155 LDPT_REGISTER_CLAIM_FILE_HOOK,
156 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
157 LDPT_REGISTER_CLEANUP_HOOK,
158 LDPT_ADD_SYMBOLS,
159 LDPT_GET_INPUT_FILE,
15f7a26b 160 LDPT_GET_VIEW,
5d3236ee
DK
161 LDPT_RELEASE_INPUT_FILE,
162 LDPT_GET_SYMBOLS,
69ee6ab2 163 LDPT_GET_SYMBOLS_V2,
5d3236ee
DK
164 LDPT_ADD_INPUT_FILE,
165 LDPT_ADD_INPUT_LIBRARY,
166 LDPT_SET_EXTRA_LIBRARY_PATH
167};
168
169/* How many entries in the constant leading part of the tv array. */
170static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
171
9e2278f5 172/* Forward references. */
16d96b5b 173static bfd_boolean plugin_notice (struct bfd_link_info *,
46135103
AM
174 struct bfd_link_hash_entry *,
175 struct bfd_link_hash_entry *,
176 bfd *, asection *, bfd_vma, flagword);
9e2278f5 177
5ae0078c
L
178static const bfd_target * plugin_object_p (bfd *);
179
3917d5d5
DK
180#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
181
182#define RTLD_NOW 0 /* Dummy value. */
183
184static void *
185dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
186{
187 return LoadLibrary (file);
188}
189
190static void *
191dlsym (void *handle, const char *name)
192{
193 return GetProcAddress (handle, name);
194}
195
196static int
197dlclose (void *handle)
198{
199 FreeLibrary (handle);
200 return 0;
201}
202
203#endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */
204
d82184d7
L
205#ifndef HAVE_DLFCN_H
206static const char *
207dlerror (void)
208{
209 return "";
210}
211#endif
212
5d3236ee
DK
213/* Helper function for exiting with error status. */
214static int
215set_plugin_error (const char *plugin)
216{
217 error_plugin = plugin;
218 return -1;
219}
220
221/* Test if an error occurred. */
222static bfd_boolean
223plugin_error_p (void)
224{
225 return error_plugin != NULL;
226}
227
228/* Return name of plugin which caused an error if any. */
d44ad554
DK
229const char *
230plugin_error_plugin (void)
5d3236ee
DK
231{
232 return error_plugin ? error_plugin : _("<no plugin>");
233}
234
235/* Handle -plugin arg: find and load plugin, or return error. */
d82184d7 236void
d44ad554 237plugin_opt_plugin (const char *plugin)
5d3236ee
DK
238{
239 plugin_t *newplug;
240
241 newplug = xmalloc (sizeof *newplug);
242 memset (newplug, 0, sizeof *newplug);
243 newplug->name = plugin;
244 newplug->dlhandle = dlopen (plugin, RTLD_NOW);
245 if (!newplug->dlhandle)
d82184d7 246 einfo (_("%P%F: %s: error loading plugin: %s\n"), plugin, dlerror ());
5d3236ee
DK
247
248 /* Chain on end, so when we run list it is in command-line order. */
249 *plugins_tail_chain_ptr = newplug;
250 plugins_tail_chain_ptr = &newplug->next;
251
252 /* Record it as current plugin for receiving args. */
253 last_plugin = newplug;
254 last_plugin_args_tail_chain_ptr = &newplug->args;
5d3236ee
DK
255}
256
257/* Accumulate option arguments for last-loaded plugin, or return
258 error if none. */
d44ad554
DK
259int
260plugin_opt_plugin_arg (const char *arg)
5d3236ee
DK
261{
262 plugin_arg_t *newarg;
263
264 if (!last_plugin)
265 return set_plugin_error (_("<no plugin>"));
266
97964ab3
AM
267 /* Ignore -pass-through= from GCC driver. */
268 if (*arg == '-')
269 {
270 const char *p = arg + 1;
271
272 if (*p == '-')
273 ++p;
274 if (strncmp (p, "pass-through=", 13) == 0)
275 return 0;
276 }
277
5d3236ee
DK
278 newarg = xmalloc (sizeof *newarg);
279 newarg->arg = arg;
280 newarg->next = NULL;
281
282 /* Chain on end to preserve command-line order. */
283 *last_plugin_args_tail_chain_ptr = newarg;
284 last_plugin_args_tail_chain_ptr = &newarg->next;
285 last_plugin->n_args++;
286 return 0;
287}
288
37a3056a
L
289/* Generate a dummy BFD to represent an IR file, for any callers of
290 plugin_call_claim_file to use as the handle in the ld_plugin_input_file
291 struct that they build to pass in. The BFD is initially writable, so
292 that symbols can be added to it; it must be made readable after the
293 add_symbols hook has been called so that it can be read when linking. */
294static bfd *
5d3236ee
DK
295plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
296{
bc110b6e 297 bfd *abfd;
4a07dc81 298 bfd_boolean bfd_plugin_target;
bc110b6e
AM
299
300 bfd_use_reserved_id = 1;
4a07dc81 301 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
9e2278f5 302 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
4a07dc81 303 bfd_plugin_target ? link_info.output_bfd : srctemplate);
9e2278f5
AM
304 if (abfd != NULL)
305 {
306 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
5ae0078c
L
307 if (!bfd_make_writable (abfd))
308 goto report_error;
4a07dc81 309 if (!bfd_plugin_target)
5ae0078c
L
310 {
311 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
312 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
313 if (!bfd_copy_private_bfd_data (srctemplate, abfd))
314 goto report_error;
315 }
9e2278f5
AM
316 {
317 flagword flags;
318
c77ec726 319 /* Create section to own the symbols. */
9e2278f5
AM
320 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
321 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
322 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
323 return abfd;
324 }
325 }
5ae0078c 326report_error:
9e2278f5
AM
327 einfo (_("could not create dummy IR bfd: %F%E\n"));
328 return NULL;
5d3236ee
DK
329}
330
d44ad554 331/* Check if the BFD passed in is an IR dummy object file. */
23ebe1a0 332static inline bfd_boolean
5d3236ee
DK
333is_ir_dummy_bfd (const bfd *abfd)
334{
cf4dc96f 335 /* ABFD can sometimes legitimately be NULL, e.g. when called from one
23ebe1a0
AM
336 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */
337 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
5d3236ee
DK
338}
339
340/* Helpers to convert between BFD and GOLD symbol formats. */
341static enum ld_plugin_status
342asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
f84854b6 343 const struct ld_plugin_symbol *ldsym)
5d3236ee
DK
344{
345 flagword flags = BSF_NO_FLAGS;
346 struct bfd_section *section;
347
348 asym->the_bfd = abfd;
f84854b6 349 asym->name = (ldsym->version
9e2278f5 350 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
f84854b6 351 : ldsym->name);
5d3236ee
DK
352 asym->value = 0;
353 switch (ldsym->def)
354 {
355 case LDPK_WEAKDEF:
356 flags = BSF_WEAK;
357 /* FALLTHRU */
358 case LDPK_DEF:
359 flags |= BSF_GLOBAL;
c77ec726
AM
360 if (ldsym->comdat_key)
361 {
362 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
363 (const char *) NULL);
364 section = bfd_get_section_by_name (abfd, name);
365 if (section != NULL)
366 free (name);
367 else
368 {
369 flagword sflags;
370
371 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
372 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
373 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
374 section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
375 if (section == NULL)
376 return LDPS_ERR;
377 }
378 }
379 else
380 section = bfd_get_section_by_name (abfd, ".text");
5d3236ee
DK
381 break;
382
383 case LDPK_WEAKUNDEF:
384 flags = BSF_WEAK;
385 /* FALLTHRU */
386 case LDPK_UNDEF:
387 section = bfd_und_section_ptr;
388 break;
389
390 case LDPK_COMMON:
391 flags = BSF_GLOBAL;
392 section = bfd_com_section_ptr;
393 asym->value = ldsym->size;
5c08b7d4
L
394 /* For ELF targets, set alignment of common symbol to 1. */
395 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
02d00247
AM
396 {
397 ((elf_symbol_type *) asym)->internal_elf_sym.st_shndx = SHN_COMMON;
398 ((elf_symbol_type *) asym)->internal_elf_sym.st_value = 1;
399 }
5d3236ee
DK
400 break;
401
402 default:
403 return LDPS_ERR;
404 }
405 asym->flags = flags;
406 asym->section = section;
407
408 /* Visibility only applies on ELF targets. */
409 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
410 {
411 elf_symbol_type *elfsym = elf_symbol_from (abfd, asym);
cfac8028
L
412 unsigned char visibility;
413
5d3236ee 414 if (!elfsym)
ea360572 415 einfo (_("%P%F: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
cfac8028
L
416 switch (ldsym->visibility)
417 {
418 default:
ea360572 419 einfo (_("%P%F: unknown ELF symbol visibility: %d!\n"),
cfac8028
L
420 ldsym->visibility);
421 case LDPV_DEFAULT:
422 visibility = STV_DEFAULT;
423 break;
424 case LDPV_PROTECTED:
425 visibility = STV_PROTECTED;
426 break;
427 case LDPV_INTERNAL:
428 visibility = STV_INTERNAL;
429 break;
430 case LDPV_HIDDEN:
431 visibility = STV_HIDDEN;
432 break;
433 }
434 elfsym->internal_elf_sym.st_other
435 = (visibility | (elfsym->internal_elf_sym.st_other
436 & ~ELF_ST_VISIBILITY (-1)));
5d3236ee
DK
437 }
438
439 return LDPS_OK;
440}
441
442/* Register a claim-file handler. */
443static enum ld_plugin_status
444register_claim_file (ld_plugin_claim_file_handler handler)
445{
446 ASSERT (called_plugin);
447 called_plugin->claim_file_handler = handler;
448 return LDPS_OK;
449}
450
451/* Register an all-symbols-read handler. */
452static enum ld_plugin_status
453register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
454{
455 ASSERT (called_plugin);
456 called_plugin->all_symbols_read_handler = handler;
457 return LDPS_OK;
458}
459
460/* Register a cleanup handler. */
461static enum ld_plugin_status
462register_cleanup (ld_plugin_cleanup_handler handler)
463{
464 ASSERT (called_plugin);
465 called_plugin->cleanup_handler = handler;
466 return LDPS_OK;
467}
468
469/* Add symbols from a plugin-claimed input file. */
470static enum ld_plugin_status
471add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
472{
473 asymbol **symptrs;
f4b78d18
L
474 plugin_input_file_t *input = handle;
475 bfd *abfd = input->abfd;
7fe550fc 476 int n;
43e1669b 477
5d3236ee
DK
478 ASSERT (called_plugin);
479 symptrs = xmalloc (nsyms * sizeof *symptrs);
7fe550fc 480 for (n = 0; n < nsyms; n++)
5d3236ee
DK
481 {
482 enum ld_plugin_status rv;
0c511000
AM
483 asymbol *bfdsym;
484
0c511000 485 bfdsym = bfd_make_empty_symbol (abfd);
7fe550fc 486 symptrs[n] = bfdsym;
5d3236ee
DK
487 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
488 if (rv != LDPS_OK)
489 return rv;
490 }
7fe550fc 491 bfd_set_symtab (abfd, symptrs, nsyms);
5d3236ee
DK
492 return LDPS_OK;
493}
494
495/* Get the input file information with an open (possibly re-opened)
496 file descriptor. */
497static enum ld_plugin_status
f4b78d18 498get_input_file (const void *handle, struct ld_plugin_input_file *file)
5d3236ee 499{
f4b78d18
L
500 const plugin_input_file_t *input = handle;
501
5d3236ee 502 ASSERT (called_plugin);
f4b78d18
L
503
504 file->name = input->name;
505 file->offset = input->offset;
506 file->filesize = input->filesize;
507 file->handle = (void *) handle;
508
509 return LDPS_OK;
5d3236ee
DK
510}
511
15f7a26b
L
512/* Get view of the input file. */
513static enum ld_plugin_status
f4b78d18 514get_view (const void *handle, const void **viewp)
15f7a26b 515{
2aec968d 516 plugin_input_file_t *input = (plugin_input_file_t *) handle;
f4b78d18 517 char *buffer;
2aec968d 518 size_t size = input->filesize;
38604796
L
519 off_t offset = input->offset;
520#if HAVE_MMAP && HAVE_GETPAGESIZE
521 off_t bias;
fe905789 522#endif
f4b78d18 523
15f7a26b 524 ASSERT (called_plugin);
f4b78d18 525
2aec968d
L
526 /* FIXME: einfo should support %lld. */
527 if ((off_t) size != input->filesize)
528 einfo (_("%P%F: unsupported input file size: %s (%ld bytes)\n"),
529 input->name, (long) input->filesize);
f4b78d18 530
2aec968d
L
531 /* Check the cached view buffer. */
532 if (input->view_buffer.addr != NULL
533 && input->view_buffer.filesize == size
38604796 534 && input->view_buffer.offset == offset)
2aec968d
L
535 {
536 *viewp = input->view_buffer.addr;
537 return LDPS_OK;
538 }
539
540 input->view_buffer.filesize = size;
38604796 541 input->view_buffer.offset = offset;
f4b78d18 542
2aec968d 543#if HAVE_MMAP
fe905789 544# if HAVE_GETPAGESIZE
38604796
L
545 bias = offset % plugin_pagesize;
546 offset -= bias;
fe905789
L
547 size += bias;
548# endif
549 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
550 if (buffer != MAP_FAILED)
38604796
L
551 {
552 input->use_mmap = TRUE;
553# if HAVE_GETPAGESIZE
554 buffer += bias;
b677c456 555# endif
38604796
L
556 }
557 else
2aec968d 558#endif
f4b78d18 559 {
2aec968d
L
560 char *p;
561
38604796
L
562 input->use_mmap = FALSE;
563
564 if (lseek (input->fd, offset, SEEK_SET) < 0)
2aec968d
L
565 return LDPS_ERR;
566
567 buffer = bfd_alloc (input->abfd, size);
568 if (buffer == NULL)
569 return LDPS_ERR;
570
571 p = buffer;
572 do
f4b78d18 573 {
2aec968d
L
574 ssize_t got = read (input->fd, p, size);
575 if (got == 0)
576 break;
577 else if (got > 0)
578 {
579 p += got;
580 size -= got;
581 }
582 else if (errno != EINTR)
583 return LDPS_ERR;
f4b78d18 584 }
2aec968d 585 while (size > 0);
f4b78d18 586 }
2aec968d
L
587
588 input->view_buffer.addr = buffer;
589 *viewp = buffer;
f4b78d18
L
590
591 return LDPS_OK;
15f7a26b
L
592}
593
5d3236ee
DK
594/* Release the input file. */
595static enum ld_plugin_status
f4b78d18 596release_input_file (const void *handle)
5d3236ee 597{
119d62ff 598 plugin_input_file_t *input = (plugin_input_file_t *) handle;
5d3236ee 599 ASSERT (called_plugin);
f4b78d18 600 if (input->fd != -1)
119d62ff
L
601 {
602 close (input->fd);
603 input->fd = -1;
604 }
f4b78d18 605 return LDPS_OK;
5d3236ee
DK
606}
607
42a851a9
DK
608/* Return TRUE if a defined symbol might be reachable from outside the
609 universe of claimed objects. */
610static inline bfd_boolean
9bbc1a67 611is_visible_from_outside (struct ld_plugin_symbol *lsym,
f84854b6 612 struct bfd_link_hash_entry *blhe)
42a851a9 613{
35ed3f94
AM
614 struct bfd_sym_chain *sym;
615
0e1862bb 616 if (bfd_link_relocatable (&link_info))
42a851a9 617 return TRUE;
0e1862bb 618 if (link_info.export_dynamic || bfd_link_dll (&link_info))
42a851a9 619 {
fd91d419
L
620 /* Check if symbol is hidden by version script. */
621 if (bfd_hide_sym_by_version (link_info.version_info,
622 blhe->root.string))
623 return FALSE;
42a851a9
DK
624 /* Only ELF symbols really have visibility. */
625 if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour)
626 {
627 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
628 int vis = ELF_ST_VISIBILITY (el->other);
629 return vis == STV_DEFAULT || vis == STV_PROTECTED;
630 }
631 /* On non-ELF targets, we can safely make inferences by considering
f84854b6 632 what visibility the plugin would have liked to apply when it first
42a851a9
DK
633 sent us the symbol. During ELF symbol processing, visibility only
634 ever becomes more restrictive, not less, when symbols are merged,
635 so this is a conservative estimate; it may give false positives,
636 declaring something visible from outside when it in fact would
637 not have been, but this will only lead to missed optimisation
638 opportunities during LTRANS at worst; it will not give false
639 negatives, which can lead to the disastrous conclusion that the
640 related symbol is IRONLY. (See GCC PR46319 for an example.) */
cfac8028
L
641 return (lsym->visibility == LDPV_DEFAULT
642 || lsym->visibility == LDPV_PROTECTED);
42a851a9 643 }
35ed3f94
AM
644
645 for (sym = &entry_symbol; sym != NULL; sym = sym->next)
646 if (sym->name
647 && strcmp (sym->name, blhe->root.string) == 0)
648 return TRUE;
649
42a851a9
DK
650 return FALSE;
651}
652
5d3236ee
DK
653/* Get the symbol resolution info for a plugin-claimed input file. */
654static enum ld_plugin_status
69ee6ab2
AM
655get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
656 int def_ironly_exp)
5d3236ee 657{
f4b78d18
L
658 const plugin_input_file_t *input = handle;
659 const bfd *abfd = (const bfd *) input->abfd;
5d3236ee 660 int n;
69ee6ab2 661
5d3236ee
DK
662 ASSERT (called_plugin);
663 for (n = 0; n < nsyms; n++)
664 {
665 struct bfd_link_hash_entry *blhe;
42a851a9 666 asection *owner_sec;
69ee6ab2
AM
667 int res;
668
10be1b6a
DK
669 if (syms[n].def != LDPK_UNDEF)
670 blhe = bfd_link_hash_lookup (link_info.hash, syms[n].name,
671 FALSE, FALSE, TRUE);
672 else
673 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, &link_info,
674 syms[n].name, FALSE, FALSE, TRUE);
5d3236ee
DK
675 if (!blhe)
676 {
69ee6ab2 677 res = LDPR_UNKNOWN;
1715a13c 678 goto report_symbol;
5d3236ee
DK
679 }
680
681 /* Determine resolution from blhe type and symbol's original type. */
682 if (blhe->type == bfd_link_hash_undefined
f84854b6 683 || blhe->type == bfd_link_hash_undefweak)
5d3236ee 684 {
69ee6ab2 685 res = LDPR_UNDEF;
1715a13c 686 goto report_symbol;
5d3236ee
DK
687 }
688 if (blhe->type != bfd_link_hash_defined
f84854b6
L
689 && blhe->type != bfd_link_hash_defweak
690 && blhe->type != bfd_link_hash_common)
5d3236ee
DK
691 {
692 /* We should not have a new, indirect or warning symbol here. */
ea360572 693 einfo ("%P%F: %s: plugin symbol table corrupt (sym type %d)\n",
f84854b6 694 called_plugin->name, blhe->type);
5d3236ee
DK
695 }
696
42a851a9
DK
697 /* Find out which section owns the symbol. Since it's not undef,
698 it must have an owner; if it's not a common symbol, both defs
699 and weakdefs keep it in the same place. */
9e2278f5
AM
700 owner_sec = (blhe->type == bfd_link_hash_common
701 ? blhe->u.c.p->section
702 : blhe->u.def.section);
42a851a9 703
5d3236ee
DK
704
705 /* If it was originally undefined or common, then it has been
f84854b6
L
706 resolved; determine how. */
707 if (syms[n].def == LDPK_UNDEF
708 || syms[n].def == LDPK_WEAKUNDEF
5d3236ee
DK
709 || syms[n].def == LDPK_COMMON)
710 {
5d3236ee 711 if (owner_sec->owner == link_info.output_bfd)
69ee6ab2 712 res = LDPR_RESOLVED_EXEC;
5d3236ee 713 else if (owner_sec->owner == abfd)
69ee6ab2 714 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee 715 else if (is_ir_dummy_bfd (owner_sec->owner))
69ee6ab2 716 res = LDPR_RESOLVED_IR;
cc322803
L
717 else if (owner_sec->owner != NULL
718 && (owner_sec->owner->flags & DYNAMIC) != 0)
69ee6ab2 719 res = LDPR_RESOLVED_DYN;
5d3236ee 720 else
69ee6ab2 721 res = LDPR_RESOLVED_EXEC;
5d3236ee
DK
722 }
723
724 /* Was originally def, or weakdef. Does it prevail? If the
f84854b6 725 owner is the original dummy bfd that supplied it, then this
5d3236ee 726 is the definition that has prevailed. */
69ee6ab2
AM
727 else if (owner_sec->owner == link_info.output_bfd)
728 res = LDPR_PREEMPTED_REG;
42a851a9 729 else if (owner_sec->owner == abfd)
69ee6ab2 730 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee
DK
731
732 /* Was originally def, weakdef, or common, but has been pre-empted. */
69ee6ab2
AM
733 else if (is_ir_dummy_bfd (owner_sec->owner))
734 res = LDPR_PREEMPTED_IR;
735 else
736 res = LDPR_PREEMPTED_REG;
737
738 if (res == LDPR_PREVAILING_DEF_IRONLY)
739 {
740 /* We need to know if the sym is referenced from non-IR files. Or
741 even potentially-referenced, perhaps in a future final link if
742 this is a partial one, perhaps dynamically at load-time if the
743 symbol is externally visible. */
744 if (blhe->non_ir_ref)
745 res = LDPR_PREVAILING_DEF;
9bbc1a67 746 else if (is_visible_from_outside (&syms[n], blhe))
69ee6ab2
AM
747 res = def_ironly_exp;
748 }
1715a13c 749
9e2278f5 750 report_symbol:
69ee6ab2 751 syms[n].resolution = res;
1715a13c 752 if (report_plugin_symbols)
9e2278f5
AM
753 einfo (_("%P: %B: symbol `%s' "
754 "definition: %d, visibility: %d, resolution: %d\n"),
755 abfd, syms[n].name,
69ee6ab2 756 syms[n].def, syms[n].visibility, res);
5d3236ee
DK
757 }
758 return LDPS_OK;
759}
760
69ee6ab2
AM
761static enum ld_plugin_status
762get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
763{
764 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
765}
766
767static enum ld_plugin_status
768get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
769{
770 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
771}
772
5d3236ee
DK
773/* Add a new (real) input file generated by a plugin. */
774static enum ld_plugin_status
775add_input_file (const char *pathname)
776{
ce875075
AM
777 lang_input_statement_type *is;
778
5d3236ee 779 ASSERT (called_plugin);
ce875075
AM
780 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
781 NULL);
782 if (!is)
5d3236ee 783 return LDPS_ERR;
ce875075 784 is->flags.lto_output = 1;
5d3236ee
DK
785 return LDPS_OK;
786}
787
788/* Add a new (real) library required by a plugin. */
789static enum ld_plugin_status
790add_input_library (const char *pathname)
791{
ce875075
AM
792 lang_input_statement_type *is;
793
5d3236ee 794 ASSERT (called_plugin);
ce875075
AM
795 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
796 NULL);
797 if (!is)
5d3236ee 798 return LDPS_ERR;
ce875075 799 is->flags.lto_output = 1;
5d3236ee
DK
800 return LDPS_OK;
801}
802
803/* Set the extra library path to be used by libraries added via
804 add_input_library. */
805static enum ld_plugin_status
806set_extra_library_path (const char *path)
807{
808 ASSERT (called_plugin);
d4cb7acd 809 ldfile_add_library_path (xstrdup (path), FALSE);
5d3236ee
DK
810 return LDPS_OK;
811}
812
813/* Issue a diagnostic message from a plugin. */
814static enum ld_plugin_status
815message (int level, const char *format, ...)
816{
817 va_list args;
818 va_start (args, format);
819
820 switch (level)
821 {
822 case LDPL_INFO:
823 vfinfo (stdout, format, args, FALSE);
d251c5c4 824 putchar ('\n');
5d3236ee
DK
825 break;
826 case LDPL_WARNING:
45e81354 827 {
e1fa0163
NC
828 char *newfmt = concat ("%P: warning: ", format, "\n",
829 (const char *) NULL);
45e81354 830 vfinfo (stdout, newfmt, args, TRUE);
e1fa0163 831 free (newfmt);
45e81354 832 }
5d3236ee
DK
833 break;
834 case LDPL_FATAL:
835 case LDPL_ERROR:
836 default:
9e2278f5 837 {
e1fa0163
NC
838 char *newfmt = concat (level == LDPL_FATAL ? "%P%F" : "%P%X",
839 ": error: ", format, "\n",
840 (const char *) NULL);
9e2278f5
AM
841 fflush (stdout);
842 vfinfo (stderr, newfmt, args, TRUE);
843 fflush (stderr);
e1fa0163 844 free (newfmt);
9e2278f5 845 }
5d3236ee
DK
846 break;
847 }
848
849 va_end (args);
850 return LDPS_OK;
851}
852
853/* Helper to size leading part of tv array and set it up. */
69ee6ab2 854static void
5d3236ee
DK
855set_tv_header (struct ld_plugin_tv *tv)
856{
857 size_t i;
858
859 /* Version info. */
860 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
861 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
862
5d3236ee
DK
863 for (i = 0; i < tv_header_size; i++)
864 {
865 tv[i].tv_tag = tv_header_tags[i];
866#define TVU(x) tv[i].tv_u.tv_ ## x
867 switch (tv[i].tv_tag)
868 {
f84854b6
L
869 case LDPT_MESSAGE:
870 TVU(message) = message;
871 break;
872 case LDPT_API_VERSION:
873 TVU(val) = LD_PLUGIN_API_VERSION;
874 break;
875 case LDPT_GNU_LD_VERSION:
876 TVU(val) = major * 100 + minor;
877 break;
878 case LDPT_LINKER_OUTPUT:
64d94ba0
AM
879 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
880 : bfd_link_pde (&link_info) ? LDPO_EXEC
881 : bfd_link_pie (&link_info) ? LDPO_PIE
882 : LDPO_DYN);
f84854b6
L
883 break;
884 case LDPT_OUTPUT_NAME:
885 TVU(string) = output_filename;
886 break;
887 case LDPT_REGISTER_CLAIM_FILE_HOOK:
888 TVU(register_claim_file) = register_claim_file;
889 break;
890 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
891 TVU(register_all_symbols_read) = register_all_symbols_read;
892 break;
893 case LDPT_REGISTER_CLEANUP_HOOK:
894 TVU(register_cleanup) = register_cleanup;
895 break;
896 case LDPT_ADD_SYMBOLS:
897 TVU(add_symbols) = add_symbols;
898 break;
899 case LDPT_GET_INPUT_FILE:
900 TVU(get_input_file) = get_input_file;
901 break;
15f7a26b
L
902 case LDPT_GET_VIEW:
903 TVU(get_view) = get_view;
904 break;
f84854b6
L
905 case LDPT_RELEASE_INPUT_FILE:
906 TVU(release_input_file) = release_input_file;
907 break;
908 case LDPT_GET_SYMBOLS:
69ee6ab2
AM
909 TVU(get_symbols) = get_symbols_v1;
910 break;
911 case LDPT_GET_SYMBOLS_V2:
912 TVU(get_symbols) = get_symbols_v2;
f84854b6
L
913 break;
914 case LDPT_ADD_INPUT_FILE:
915 TVU(add_input_file) = add_input_file;
916 break;
917 case LDPT_ADD_INPUT_LIBRARY:
918 TVU(add_input_library) = add_input_library;
919 break;
920 case LDPT_SET_EXTRA_LIBRARY_PATH:
921 TVU(set_extra_library_path) = set_extra_library_path;
922 break;
923 default:
924 /* Added a new entry to the array without adding
925 a new case to set up its value is a bug. */
926 FAIL ();
5d3236ee
DK
927 }
928#undef TVU
929 }
5d3236ee
DK
930}
931
932/* Append the per-plugin args list and trailing LDPT_NULL to tv. */
933static void
934set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
935{
936 plugin_arg_t *arg = plugin->args;
937 while (arg)
938 {
939 tv->tv_tag = LDPT_OPTION;
940 tv->tv_u.tv_string = arg->arg;
941 arg = arg->next;
942 tv++;
943 }
944 tv->tv_tag = LDPT_NULL;
945 tv->tv_u.tv_val = 0;
946}
947
948/* Load up and initialise all plugins after argument parsing. */
d82184d7 949void
d44ad554 950plugin_load_plugins (void)
5d3236ee
DK
951{
952 struct ld_plugin_tv *my_tv;
953 unsigned int max_args = 0;
954 plugin_t *curplug = plugins_list;
955
956 /* If there are no plugins, we need do nothing this run. */
957 if (!curplug)
d82184d7 958 return;
5d3236ee
DK
959
960 /* First pass over plugins to find max # args needed so that we
961 can size and allocate the tv array. */
962 while (curplug)
963 {
964 if (curplug->n_args > max_args)
965 max_args = curplug->n_args;
966 curplug = curplug->next;
967 }
968
969 /* Allocate tv array and initialise constant part. */
970 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
971 set_tv_header (my_tv);
972
973 /* Pass over plugins again, activating them. */
974 curplug = plugins_list;
975 while (curplug)
976 {
977 enum ld_plugin_status rv;
a8f9d13e
AM
978 ld_plugin_onload onloadfn;
979
980 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
5d3236ee 981 if (!onloadfn)
a8f9d13e 982 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
5d3236ee 983 if (!onloadfn)
d82184d7
L
984 einfo (_("%P%F: %s: error loading plugin: %s\n"),
985 curplug->name, dlerror ());
5d3236ee
DK
986 set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
987 called_plugin = curplug;
988 rv = (*onloadfn) (my_tv);
989 called_plugin = NULL;
990 if (rv != LDPS_OK)
d82184d7 991 einfo (_("%P%F: %s: plugin error: %d\n"), curplug->name, rv);
5d3236ee
DK
992 curplug = curplug->next;
993 }
994
995 /* Since plugin(s) inited ok, assume they're going to want symbol
996 resolutions, which needs us to track which symbols are referenced
997 by non-IR files using the linker's notice callback. */
9e2278f5
AM
998 orig_notice_all = link_info.notice_all;
999 orig_callbacks = link_info.callbacks;
1000 plugin_callbacks = *orig_callbacks;
1001 plugin_callbacks.notice = &plugin_notice;
5d3236ee 1002 link_info.notice_all = TRUE;
61f41c3c 1003 link_info.lto_plugin_active = TRUE;
9e2278f5 1004 link_info.callbacks = &plugin_callbacks;
38604796 1005
5ae0078c
L
1006 register_ld_plugin_object_p (plugin_object_p);
1007
38604796 1008#if HAVE_MMAP && HAVE_GETPAGESIZE
fd5a1509 1009 plugin_pagesize = getpagesize ();
38604796 1010#endif
5d3236ee
DK
1011}
1012
1013/* Call 'claim file' hook for all plugins. */
02d00247 1014static int
5d3236ee
DK
1015plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed)
1016{
1017 plugin_t *curplug = plugins_list;
1018 *claimed = FALSE;
1019 if (no_more_claiming)
1020 return 0;
1021 while (curplug && !*claimed)
1022 {
1023 if (curplug->claim_file_handler)
1024 {
1025 enum ld_plugin_status rv;
1026 called_plugin = curplug;
1027 rv = (*curplug->claim_file_handler) (file, claimed);
1028 called_plugin = NULL;
1029 if (rv != LDPS_OK)
1030 set_plugin_error (curplug->name);
1031 }
1032 curplug = curplug->next;
1033 }
1034 return plugin_error_p () ? -1 : 0;
1035}
1036
35a1e5f3
L
1037/* Duplicates a character string with memory attached to ABFD. */
1038
1039static char *
1040plugin_strdup (bfd *abfd, const char *str)
1041{
1042 size_t strlength;
1043 char *copy;
1044 strlength = strlen (str) + 1;
1045 copy = bfd_alloc (abfd, strlength);
1046 if (copy == NULL)
1047 einfo (_("%P%F: plugin_strdup failed to allocate memory: %s\n"),
1048 bfd_get_error ());
1049 memcpy (copy, str, strlength);
1050 return copy;
1051}
1052
5ae0078c
L
1053static const bfd_target *
1054plugin_object_p (bfd *ibfd)
02d00247 1055{
5ae0078c 1056 int claimed;
f4b78d18 1057 plugin_input_file_t *input;
35a1e5f3
L
1058 off_t offset, filesize;
1059 struct ld_plugin_input_file file;
1060 bfd *abfd;
5ae0078c
L
1061 bfd_boolean inarchive;
1062 const char *name;
1063 int fd;
1064
1065 /* Don't try the dummy object file. */
1066 if ((ibfd->flags & BFD_PLUGIN) != 0)
1067 return NULL;
1068
1069 if (ibfd->plugin_format != bfd_plugin_uknown)
1070 {
1071 if (ibfd->plugin_format == bfd_plugin_yes)
1072 return ibfd->plugin_dummy_bfd->xvec;
1073 else
1074 return NULL;
1075 }
1076
1077 inarchive = bfd_my_archive (ibfd) != NULL;
1078 name = inarchive ? bfd_my_archive (ibfd)->filename : ibfd->filename;
1079 fd = open (name, O_RDONLY | O_BINARY);
35a1e5f3
L
1080
1081 if (fd < 0)
5ae0078c 1082 return NULL;
02d00247
AM
1083
1084 /* We create a dummy BFD, initially empty, to house whatever symbols
1085 the plugin may want to add. */
35a1e5f3 1086 abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd);
f4b78d18
L
1087
1088 input = bfd_alloc (abfd, sizeof (*input));
1089 if (input == NULL)
1090 einfo (_("%P%F: plugin failed to allocate memory for input: %s\n"),
1091 bfd_get_error ());
1092
35a1e5f3
L
1093 if (inarchive)
1094 {
1095 /* Offset and filesize must refer to the individual archive
1096 member, not the whole file, and must exclude the header.
1097 Fortunately for us, that is how the data is stored in the
1098 origin field of the bfd and in the arelt_data. */
1099 offset = ibfd->origin;
1100 filesize = arelt_size (ibfd);
1101 }
1102 else
1103 {
1104 offset = 0;
1105 filesize = lseek (fd, 0, SEEK_END);
1106
1107 /* We must copy filename attached to ibfd if it is not an archive
1108 member since it may be freed by bfd_close below. */
1109 name = plugin_strdup (abfd, name);
1110 }
1111
1112 file.name = name;
1113 file.offset = offset;
1114 file.filesize = filesize;
1115 file.fd = fd;
1116 file.handle = input;
1117
f4b78d18 1118 input->abfd = abfd;
2aec968d
L
1119 input->view_buffer.addr = NULL;
1120 input->view_buffer.filesize = 0;
1121 input->view_buffer.offset = 0;
35a1e5f3 1122 input->fd = fd;
d319a098 1123 input->use_mmap = FALSE;
35a1e5f3
L
1124 input->offset = offset;
1125 input->filesize = filesize;
1126 input->name = plugin_strdup (abfd, ibfd->filename);
f4b78d18 1127
5ae0078c
L
1128 claimed = 0;
1129
35a1e5f3 1130 if (plugin_call_claim_file (&file, &claimed))
02d00247
AM
1131 einfo (_("%P%F: %s: plugin reported error claiming file\n"),
1132 plugin_error_plugin ());
f4b78d18 1133
5ae0078c 1134 if (input->fd != -1 && ! bfd_plugin_target_p (ibfd->xvec))
f4b78d18 1135 {
5ae0078c
L
1136 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which
1137 doesn't need fd after plugin_call_claim_file, doesn't use
1138 BFD plugin target vector. Since GCC plugin doesn't call
1139 release_input_file, we close it here. LLVM plugin, which
1140 needs fd after plugin_call_claim_file and calls
1141 release_input_file after it is done, uses BFD plugin target
1142 vector. This scheme doesn't work when a plugin needs fd and
1143 doesn't use BFD plugin target vector neither. */
35a1e5f3 1144 close (fd);
f4b78d18
L
1145 input->fd = -1;
1146 }
1147
02d00247
AM
1148 if (claimed)
1149 {
5ae0078c
L
1150 ibfd->plugin_format = bfd_plugin_yes;
1151 ibfd->plugin_dummy_bfd = abfd;
35a1e5f3 1152 bfd_make_readable (abfd);
5ae0078c 1153 return abfd->xvec;
02d00247
AM
1154 }
1155 else
1156 {
38604796
L
1157#if HAVE_MMAP
1158 if (input->use_mmap)
1159 {
1160 /* If plugin didn't claim the file, unmap the buffer. */
1161 char *addr = input->view_buffer.addr;
1162 off_t size = input->view_buffer.filesize;
1163# if HAVE_GETPAGESIZE
1164 off_t bias = input->view_buffer.offset % plugin_pagesize;
1165 size += bias;
1166 addr -= bias;
1167# endif
1168 munmap (addr, size);
1169 }
1170#endif
1171
02d00247
AM
1172 /* If plugin didn't claim the file, we don't need the dummy bfd.
1173 Can't avoid speculatively creating it, alas. */
5ae0078c 1174 ibfd->plugin_format = bfd_plugin_no;
f4b78d18 1175 bfd_close_all_done (abfd);
5ae0078c
L
1176 return NULL;
1177 }
1178}
1179
1180void
1181plugin_maybe_claim (lang_input_statement_type *entry)
1182{
1183 if (plugin_object_p (entry->the_bfd))
1184 {
1185 bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1186
1187 /* Discard the real file's BFD and substitute the dummy one. */
1188
1189 /* BFD archive handling caches elements so we can't call
1190 bfd_close for archives. */
1191 if (entry->the_bfd->my_archive == NULL)
1192 bfd_close (entry->the_bfd);
1193 entry->the_bfd = abfd;
1194 entry->flags.claimed = 1;
02d00247
AM
1195 }
1196}
1197
5d3236ee
DK
1198/* Call 'all symbols read' hook for all plugins. */
1199int
1200plugin_call_all_symbols_read (void)
1201{
1202 plugin_t *curplug = plugins_list;
1203
1204 /* Disable any further file-claiming. */
1205 no_more_claiming = TRUE;
1206
5d3236ee
DK
1207 while (curplug)
1208 {
1209 if (curplug->all_symbols_read_handler)
1210 {
1211 enum ld_plugin_status rv;
1212 called_plugin = curplug;
1213 rv = (*curplug->all_symbols_read_handler) ();
1214 called_plugin = NULL;
1215 if (rv != LDPS_OK)
1216 set_plugin_error (curplug->name);
1217 }
1218 curplug = curplug->next;
1219 }
1220 return plugin_error_p () ? -1 : 0;
1221}
1222
e73d965c 1223/* Call 'cleanup' hook for all plugins at exit. */
498cd2a0 1224void
5d3236ee
DK
1225plugin_call_cleanup (void)
1226{
1227 plugin_t *curplug = plugins_list;
1228 while (curplug)
1229 {
1230 if (curplug->cleanup_handler && !curplug->cleanup_done)
1231 {
1232 enum ld_plugin_status rv;
1233 curplug->cleanup_done = TRUE;
1234 called_plugin = curplug;
1235 rv = (*curplug->cleanup_handler) ();
1236 called_plugin = NULL;
1237 if (rv != LDPS_OK)
d82184d7
L
1238 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1239 curplug->name, rv);
5d3236ee
DK
1240 dlclose (curplug->dlhandle);
1241 }
1242 curplug = curplug->next;
1243 }
5d3236ee
DK
1244}
1245
5d3236ee
DK
1246/* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1247 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
35ed3f94
AM
1248 the linker adds them to the linker hash table. Mark those
1249 referenced from a non-IR file with non_ir_ref. We have to
1250 notice_all symbols, because we won't necessarily know until later
1251 which ones will be contributed by IR files. */
9e2278f5
AM
1252static bfd_boolean
1253plugin_notice (struct bfd_link_info *info,
35ed3f94 1254 struct bfd_link_hash_entry *h,
46135103 1255 struct bfd_link_hash_entry *inh,
9e2278f5
AM
1256 bfd *abfd,
1257 asection *section,
16d96b5b 1258 bfd_vma value,
46135103 1259 flagword flags)
5d3236ee 1260{
46135103
AM
1261 struct bfd_link_hash_entry *orig_h = h;
1262
35ed3f94 1263 if (h != NULL)
5d3236ee 1264 {
cd6eee13
AM
1265 bfd *sym_bfd;
1266
46135103
AM
1267 if (h->type == bfd_link_hash_warning)
1268 h = h->u.i.link;
1269
4a2b04a7 1270 /* Nothing to do here if this def/ref is from an IR dummy BFD. */
9e2278f5 1271 if (is_ir_dummy_bfd (abfd))
4a2b04a7 1272 ;
9e2278f5 1273
16d96b5b
AM
1274 /* Making an indirect symbol counts as a reference unless this
1275 is a brand new symbol. */
4a2b04a7
L
1276 else if (bfd_is_ind_section (section)
1277 || (flags & BSF_INDIRECT) != 0)
16d96b5b 1278 {
46135103
AM
1279 /* ??? Some of this is questionable. See comments in
1280 _bfd_generic_link_add_one_symbol for case IND. */
16d96b5b
AM
1281 if (h->type != bfd_link_hash_new)
1282 {
16d96b5b 1283 h->non_ir_ref = TRUE;
46135103 1284 inh->non_ir_ref = TRUE;
16d96b5b 1285 }
46135103
AM
1286 else if (inh->type == bfd_link_hash_new)
1287 inh->non_ir_ref = TRUE;
16d96b5b
AM
1288 }
1289
1290 /* Nothing to do here for warning symbols. */
1291 else if ((flags & BSF_WARNING) != 0)
1292 ;
1293
1294 /* Nothing to do here for constructor symbols. */
1295 else if ((flags & BSF_CONSTRUCTOR) != 0)
1296 ;
1297
35ed3f94 1298 /* If this is a ref, set non_ir_ref. */
16d96b5b 1299 else if (bfd_is_und_section (section))
3d5bef4c
L
1300 {
1301 /* Replace the undefined dummy bfd with the real one. */
1302 if ((h->type == bfd_link_hash_undefined
1303 || h->type == bfd_link_hash_undefweak)
46fed7f7
SL
1304 && (h->u.undef.abfd == NULL
1305 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
3d5bef4c
L
1306 h->u.undef.abfd = abfd;
1307 h->non_ir_ref = TRUE;
1308 }
35ed3f94
AM
1309
1310 /* Otherwise, it must be a new def. Ensure any symbol defined
1311 in an IR dummy BFD takes on a new value from a real BFD.
1312 Weak symbols are not normally overridden by a new weak
1313 definition, and strong symbols will normally cause multiple
1314 definition errors. Avoid this by making the symbol appear
1315 to be undefined. */
1316 else if (((h->type == bfd_link_hash_defweak
1317 || h->type == bfd_link_hash_defined)
cd6eee13 1318 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
35ed3f94 1319 || (h->type == bfd_link_hash_common
cd6eee13
AM
1320 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))
1321 {
1322 h->type = bfd_link_hash_undefweak;
1323 h->u.undef.abfd = sym_bfd;
1324 }
5d3236ee
DK
1325 }
1326
1327 /* Continue with cref/nocrossref/trace-sym processing. */
46135103 1328 if (orig_h == NULL
9e2278f5
AM
1329 || orig_notice_all
1330 || (info->notice_hash != NULL
46135103 1331 && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
35ed3f94 1332 FALSE, FALSE) != NULL))
46135103
AM
1333 return (*orig_callbacks->notice) (info, orig_h, inh,
1334 abfd, section, value, flags);
5d3236ee
DK
1335 return TRUE;
1336}
This page took 0.456136 seconds and 4 git commands to generate.