gdb: add target_ops::supports_displaced_step
[deliverable/binutils-gdb.git] / ld / plugin.c
CommitLineData
5d3236ee 1/* Plugin control for the GNU linker.
b3adc24a 2 Copyright (C) 2010-2020 Free Software Foundation, Inc.
5d3236ee
DK
3
4 This file is part of the GNU Binutils.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21#include "sysdep.h"
22#include "libiberty.h"
23#include "bfd.h"
24#include "bfdlink.h"
25#include "bfdver.h"
1ff6de03 26#include "ctf-api.h"
5d3236ee
DK
27#include "ld.h"
28#include "ldmain.h"
29#include "ldmisc.h"
30#include "ldexp.h"
31#include "ldlang.h"
32#include "ldfile.h"
7d0b9ebc 33#include "plugin-api.h"
5ae0078c 34#include "../bfd/plugin.h"
5d3236ee 35#include "plugin.h"
5d3236ee 36#include "elf-bfd.h"
2aec968d
L
37#if HAVE_MMAP
38# include <sys/mman.h>
39# ifndef MAP_FAILED
40# define MAP_FAILED ((void *) -1)
41# endif
42# ifndef PROT_READ
43# define PROT_READ 0
44# endif
45# ifndef MAP_PRIVATE
46# define MAP_PRIVATE 0
47# endif
48#endif
f4b78d18
L
49#include <errno.h>
50#if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
51extern int errno;
52#endif
3917d5d5 53#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
f31d24a0 54#include <windows.h>
3917d5d5 55#endif
5d3236ee 56
1715a13c
L
57/* Report plugin symbols. */
58bfd_boolean report_plugin_symbols;
59
5d3236ee
DK
60/* The suffix to append to the name of the real (claimed) object file
61 when generating a dummy BFD to hold the IR symbols sent from the
cf4dc96f
DK
62 plugin. For cosmetic use only; appears in maps, crefs etc. */
63#define IRONLY_SUFFIX " (symbol from plugin)"
5d3236ee
DK
64
65/* Stores a single argument passed to a plugin. */
66typedef struct plugin_arg
67{
68 struct plugin_arg *next;
69 const char *arg;
70} plugin_arg_t;
71
72/* Holds all details of a single plugin. */
73typedef struct plugin
74{
75 /* Next on the list of plugins, or NULL at end of chain. */
76 struct plugin *next;
77 /* The argument string given to --plugin. */
78 const char *name;
79 /* The shared library handle returned by dlopen. */
80 void *dlhandle;
81 /* The list of argument string given to --plugin-opt. */
82 plugin_arg_t *args;
83 /* Number of args in the list, for convenience. */
84 size_t n_args;
85 /* The plugin's event handlers. */
86 ld_plugin_claim_file_handler claim_file_handler;
87 ld_plugin_all_symbols_read_handler all_symbols_read_handler;
88 ld_plugin_cleanup_handler cleanup_handler;
89 /* TRUE if the cleanup handlers have been called. */
90 bfd_boolean cleanup_done;
91} plugin_t;
92
2aec968d
L
93typedef struct view_buffer
94{
95 char *addr;
96 size_t filesize;
97 off_t offset;
98} view_buffer_t;
99
f4b78d18
L
100/* The internal version of struct ld_plugin_input_file with a BFD
101 pointer. */
102typedef struct plugin_input_file
103{
104 bfd *abfd;
2aec968d 105 view_buffer_t view_buffer;
f4b78d18
L
106 char *name;
107 int fd;
38604796 108 bfd_boolean use_mmap;
f4b78d18
L
109 off_t offset;
110 off_t filesize;
111} plugin_input_file_t;
112
5d3236ee
DK
113/* The master list of all plugins. */
114static plugin_t *plugins_list = NULL;
115
116/* We keep a tail pointer for easy linking on the end. */
117static plugin_t **plugins_tail_chain_ptr = &plugins_list;
118
119/* The last plugin added to the list, for receiving args. */
120static plugin_t *last_plugin = NULL;
121
122/* The tail of the arg chain of the last plugin added to the list. */
123static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
124
125/* The plugin which is currently having a callback executed. */
126static plugin_t *called_plugin = NULL;
127
128/* Last plugin to cause an error, if any. */
129static const char *error_plugin = NULL;
130
24f58f47 131/* State of linker "notice" interface before we poked at it. */
9e2278f5 132static bfd_boolean orig_notice_all;
9e2278f5
AM
133
134/* Original linker callbacks, and the plugin version. */
135static const struct bfd_link_callbacks *orig_callbacks;
136static struct bfd_link_callbacks plugin_callbacks;
137
5d3236ee
DK
138/* Set at all symbols read time, to avoid recursively offering the plugin
139 its own newly-added input files and libs to claim. */
9e2278f5 140bfd_boolean no_more_claiming = FALSE;
5d3236ee 141
38604796
L
142#if HAVE_MMAP && HAVE_GETPAGESIZE
143/* Page size used by mmap. */
144static off_t plugin_pagesize;
145#endif
146
5d3236ee
DK
147/* List of tags to set in the constant leading part of the tv array. */
148static const enum ld_plugin_tag tv_header_tags[] =
149{
150 LDPT_MESSAGE,
151 LDPT_API_VERSION,
152 LDPT_GNU_LD_VERSION,
153 LDPT_LINKER_OUTPUT,
154 LDPT_OUTPUT_NAME,
155 LDPT_REGISTER_CLAIM_FILE_HOOK,
156 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
157 LDPT_REGISTER_CLEANUP_HOOK,
158 LDPT_ADD_SYMBOLS,
159 LDPT_GET_INPUT_FILE,
15f7a26b 160 LDPT_GET_VIEW,
5d3236ee
DK
161 LDPT_RELEASE_INPUT_FILE,
162 LDPT_GET_SYMBOLS,
69ee6ab2 163 LDPT_GET_SYMBOLS_V2,
5d3236ee
DK
164 LDPT_ADD_INPUT_FILE,
165 LDPT_ADD_INPUT_LIBRARY,
166 LDPT_SET_EXTRA_LIBRARY_PATH
167};
168
169/* How many entries in the constant leading part of the tv array. */
170static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
171
9e2278f5 172/* Forward references. */
16d96b5b 173static bfd_boolean plugin_notice (struct bfd_link_info *,
46135103
AM
174 struct bfd_link_hash_entry *,
175 struct bfd_link_hash_entry *,
176 bfd *, asection *, bfd_vma, flagword);
9e2278f5 177
cb001c0d 178static bfd_cleanup plugin_object_p (bfd *);
5ae0078c 179
3917d5d5
DK
180#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
181
182#define RTLD_NOW 0 /* Dummy value. */
183
184static void *
185dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
186{
187 return LoadLibrary (file);
188}
189
190static void *
191dlsym (void *handle, const char *name)
192{
193 return GetProcAddress (handle, name);
194}
195
196static int
197dlclose (void *handle)
198{
199 FreeLibrary (handle);
200 return 0;
201}
202
203#endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */
204
d82184d7
L
205#ifndef HAVE_DLFCN_H
206static const char *
207dlerror (void)
208{
209 return "";
210}
211#endif
212
5d3236ee
DK
213/* Helper function for exiting with error status. */
214static int
215set_plugin_error (const char *plugin)
216{
217 error_plugin = plugin;
218 return -1;
219}
220
221/* Test if an error occurred. */
222static bfd_boolean
223plugin_error_p (void)
224{
225 return error_plugin != NULL;
226}
227
228/* Return name of plugin which caused an error if any. */
d44ad554
DK
229const char *
230plugin_error_plugin (void)
5d3236ee
DK
231{
232 return error_plugin ? error_plugin : _("<no plugin>");
233}
234
235/* Handle -plugin arg: find and load plugin, or return error. */
d82184d7 236void
d44ad554 237plugin_opt_plugin (const char *plugin)
5d3236ee
DK
238{
239 plugin_t *newplug;
c3e1c28e 240 plugin_t *curplug = plugins_list;
5d3236ee
DK
241
242 newplug = xmalloc (sizeof *newplug);
243 memset (newplug, 0, sizeof *newplug);
244 newplug->name = plugin;
245 newplug->dlhandle = dlopen (plugin, RTLD_NOW);
246 if (!newplug->dlhandle)
df5f2391 247 einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ());
5d3236ee 248
c3e1c28e
L
249 /* Check if plugin has been loaded already. */
250 while (curplug)
251 {
252 if (newplug->dlhandle == curplug->dlhandle)
253 {
254 einfo (_("%P: %s: duplicated plugin\n"), plugin);
255 free (newplug);
256 return;
257 }
258 curplug = curplug->next;
259 }
260
5d3236ee
DK
261 /* Chain on end, so when we run list it is in command-line order. */
262 *plugins_tail_chain_ptr = newplug;
263 plugins_tail_chain_ptr = &newplug->next;
264
265 /* Record it as current plugin for receiving args. */
266 last_plugin = newplug;
267 last_plugin_args_tail_chain_ptr = &newplug->args;
5d3236ee
DK
268}
269
270/* Accumulate option arguments for last-loaded plugin, or return
271 error if none. */
d44ad554
DK
272int
273plugin_opt_plugin_arg (const char *arg)
5d3236ee
DK
274{
275 plugin_arg_t *newarg;
276
277 if (!last_plugin)
278 return set_plugin_error (_("<no plugin>"));
279
97964ab3
AM
280 /* Ignore -pass-through= from GCC driver. */
281 if (*arg == '-')
282 {
283 const char *p = arg + 1;
284
285 if (*p == '-')
286 ++p;
287 if (strncmp (p, "pass-through=", 13) == 0)
288 return 0;
289 }
290
5d3236ee
DK
291 newarg = xmalloc (sizeof *newarg);
292 newarg->arg = arg;
293 newarg->next = NULL;
294
295 /* Chain on end to preserve command-line order. */
296 *last_plugin_args_tail_chain_ptr = newarg;
297 last_plugin_args_tail_chain_ptr = &newarg->next;
298 last_plugin->n_args++;
299 return 0;
300}
301
37a3056a
L
302/* Generate a dummy BFD to represent an IR file, for any callers of
303 plugin_call_claim_file to use as the handle in the ld_plugin_input_file
304 struct that they build to pass in. The BFD is initially writable, so
305 that symbols can be added to it; it must be made readable after the
306 add_symbols hook has been called so that it can be read when linking. */
307static bfd *
5d3236ee
DK
308plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
309{
bc110b6e 310 bfd *abfd;
4a07dc81 311 bfd_boolean bfd_plugin_target;
bc110b6e
AM
312
313 bfd_use_reserved_id = 1;
4a07dc81 314 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
9e2278f5 315 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
4a07dc81 316 bfd_plugin_target ? link_info.output_bfd : srctemplate);
9e2278f5
AM
317 if (abfd != NULL)
318 {
319 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
5ae0078c
L
320 if (!bfd_make_writable (abfd))
321 goto report_error;
4a07dc81 322 if (!bfd_plugin_target)
5ae0078c
L
323 {
324 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
325 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
326 if (!bfd_copy_private_bfd_data (srctemplate, abfd))
327 goto report_error;
328 }
9e2278f5
AM
329 {
330 flagword flags;
331
c77ec726 332 /* Create section to own the symbols. */
9e2278f5
AM
333 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
334 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
335 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
336 return abfd;
337 }
338 }
dc1e8a47 339 report_error:
df5f2391 340 einfo (_("%F%P: could not create dummy IR bfd: %E\n"));
9e2278f5 341 return NULL;
5d3236ee
DK
342}
343
d44ad554 344/* Check if the BFD passed in is an IR dummy object file. */
23ebe1a0 345static inline bfd_boolean
5d3236ee
DK
346is_ir_dummy_bfd (const bfd *abfd)
347{
cf4dc96f 348 /* ABFD can sometimes legitimately be NULL, e.g. when called from one
23ebe1a0
AM
349 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */
350 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
5d3236ee
DK
351}
352
353/* Helpers to convert between BFD and GOLD symbol formats. */
354static enum ld_plugin_status
355asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
f84854b6 356 const struct ld_plugin_symbol *ldsym)
5d3236ee
DK
357{
358 flagword flags = BSF_NO_FLAGS;
359 struct bfd_section *section;
360
361 asym->the_bfd = abfd;
f84854b6 362 asym->name = (ldsym->version
9e2278f5 363 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
f84854b6 364 : ldsym->name);
5d3236ee
DK
365 asym->value = 0;
366 switch (ldsym->def)
367 {
368 case LDPK_WEAKDEF:
369 flags = BSF_WEAK;
370 /* FALLTHRU */
371 case LDPK_DEF:
372 flags |= BSF_GLOBAL;
c77ec726
AM
373 if (ldsym->comdat_key)
374 {
375 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
376 (const char *) NULL);
377 section = bfd_get_section_by_name (abfd, name);
378 if (section != NULL)
379 free (name);
380 else
381 {
382 flagword sflags;
383
384 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
385 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
386 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
387 section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
388 if (section == NULL)
389 return LDPS_ERR;
390 }
391 }
392 else
393 section = bfd_get_section_by_name (abfd, ".text");
5d3236ee
DK
394 break;
395
396 case LDPK_WEAKUNDEF:
397 flags = BSF_WEAK;
398 /* FALLTHRU */
399 case LDPK_UNDEF:
400 section = bfd_und_section_ptr;
401 break;
402
403 case LDPK_COMMON:
404 flags = BSF_GLOBAL;
405 section = bfd_com_section_ptr;
406 asym->value = ldsym->size;
407 break;
408
409 default:
410 return LDPS_ERR;
411 }
412 asym->flags = flags;
413 asym->section = section;
414
5d3236ee
DK
415 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
416 {
417 elf_symbol_type *elfsym = elf_symbol_from (abfd, asym);
cfac8028
L
418 unsigned char visibility;
419
5d3236ee 420 if (!elfsym)
df5f2391 421 einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
0410b450
AM
422
423 if (ldsym->def == LDPK_COMMON)
424 {
425 elfsym->internal_elf_sym.st_shndx = SHN_COMMON;
426 elfsym->internal_elf_sym.st_value = 1;
427 }
428
cfac8028
L
429 switch (ldsym->visibility)
430 {
431 default:
df5f2391 432 einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"),
cfac8028 433 ldsym->visibility);
2b804145
AM
434 return LDPS_ERR;
435
cfac8028
L
436 case LDPV_DEFAULT:
437 visibility = STV_DEFAULT;
438 break;
439 case LDPV_PROTECTED:
440 visibility = STV_PROTECTED;
441 break;
442 case LDPV_INTERNAL:
443 visibility = STV_INTERNAL;
444 break;
445 case LDPV_HIDDEN:
446 visibility = STV_HIDDEN;
447 break;
448 }
0410b450 449 elfsym->internal_elf_sym.st_other |= visibility;
5d3236ee
DK
450 }
451
452 return LDPS_OK;
453}
454
455/* Register a claim-file handler. */
456static enum ld_plugin_status
457register_claim_file (ld_plugin_claim_file_handler handler)
458{
459 ASSERT (called_plugin);
460 called_plugin->claim_file_handler = handler;
461 return LDPS_OK;
462}
463
464/* Register an all-symbols-read handler. */
465static enum ld_plugin_status
466register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
467{
468 ASSERT (called_plugin);
469 called_plugin->all_symbols_read_handler = handler;
470 return LDPS_OK;
471}
472
473/* Register a cleanup handler. */
474static enum ld_plugin_status
475register_cleanup (ld_plugin_cleanup_handler handler)
476{
477 ASSERT (called_plugin);
478 called_plugin->cleanup_handler = handler;
479 return LDPS_OK;
480}
481
482/* Add symbols from a plugin-claimed input file. */
483static enum ld_plugin_status
484add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
485{
486 asymbol **symptrs;
f4b78d18
L
487 plugin_input_file_t *input = handle;
488 bfd *abfd = input->abfd;
7fe550fc 489 int n;
43e1669b 490
5d3236ee
DK
491 ASSERT (called_plugin);
492 symptrs = xmalloc (nsyms * sizeof *symptrs);
7fe550fc 493 for (n = 0; n < nsyms; n++)
5d3236ee
DK
494 {
495 enum ld_plugin_status rv;
0c511000
AM
496 asymbol *bfdsym;
497
0c511000 498 bfdsym = bfd_make_empty_symbol (abfd);
7fe550fc 499 symptrs[n] = bfdsym;
5d3236ee
DK
500 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
501 if (rv != LDPS_OK)
502 return rv;
503 }
7fe550fc 504 bfd_set_symtab (abfd, symptrs, nsyms);
5d3236ee
DK
505 return LDPS_OK;
506}
507
508/* Get the input file information with an open (possibly re-opened)
509 file descriptor. */
510static enum ld_plugin_status
f4b78d18 511get_input_file (const void *handle, struct ld_plugin_input_file *file)
5d3236ee 512{
f4b78d18
L
513 const plugin_input_file_t *input = handle;
514
5d3236ee 515 ASSERT (called_plugin);
f4b78d18
L
516
517 file->name = input->name;
518 file->offset = input->offset;
519 file->filesize = input->filesize;
520 file->handle = (void *) handle;
521
522 return LDPS_OK;
5d3236ee
DK
523}
524
15f7a26b
L
525/* Get view of the input file. */
526static enum ld_plugin_status
f4b78d18 527get_view (const void *handle, const void **viewp)
15f7a26b 528{
2aec968d 529 plugin_input_file_t *input = (plugin_input_file_t *) handle;
f4b78d18 530 char *buffer;
2aec968d 531 size_t size = input->filesize;
38604796
L
532 off_t offset = input->offset;
533#if HAVE_MMAP && HAVE_GETPAGESIZE
534 off_t bias;
fe905789 535#endif
f4b78d18 536
15f7a26b 537 ASSERT (called_plugin);
f4b78d18 538
2aec968d
L
539 /* FIXME: einfo should support %lld. */
540 if ((off_t) size != input->filesize)
df5f2391 541 einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"),
2aec968d 542 input->name, (long) input->filesize);
f4b78d18 543
2aec968d
L
544 /* Check the cached view buffer. */
545 if (input->view_buffer.addr != NULL
546 && input->view_buffer.filesize == size
38604796 547 && input->view_buffer.offset == offset)
2aec968d
L
548 {
549 *viewp = input->view_buffer.addr;
550 return LDPS_OK;
551 }
552
553 input->view_buffer.filesize = size;
38604796 554 input->view_buffer.offset = offset;
f4b78d18 555
2aec968d 556#if HAVE_MMAP
fe905789 557# if HAVE_GETPAGESIZE
38604796
L
558 bias = offset % plugin_pagesize;
559 offset -= bias;
fe905789
L
560 size += bias;
561# endif
562 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
563 if (buffer != MAP_FAILED)
38604796
L
564 {
565 input->use_mmap = TRUE;
566# if HAVE_GETPAGESIZE
567 buffer += bias;
b677c456 568# endif
38604796
L
569 }
570 else
2aec968d 571#endif
f4b78d18 572 {
2aec968d
L
573 char *p;
574
38604796
L
575 input->use_mmap = FALSE;
576
577 if (lseek (input->fd, offset, SEEK_SET) < 0)
2aec968d
L
578 return LDPS_ERR;
579
580 buffer = bfd_alloc (input->abfd, size);
581 if (buffer == NULL)
582 return LDPS_ERR;
583
584 p = buffer;
585 do
f4b78d18 586 {
2aec968d
L
587 ssize_t got = read (input->fd, p, size);
588 if (got == 0)
589 break;
590 else if (got > 0)
591 {
592 p += got;
593 size -= got;
594 }
595 else if (errno != EINTR)
596 return LDPS_ERR;
f4b78d18 597 }
2aec968d 598 while (size > 0);
f4b78d18 599 }
2aec968d
L
600
601 input->view_buffer.addr = buffer;
602 *viewp = buffer;
f4b78d18
L
603
604 return LDPS_OK;
15f7a26b
L
605}
606
5d3236ee
DK
607/* Release the input file. */
608static enum ld_plugin_status
f4b78d18 609release_input_file (const void *handle)
5d3236ee 610{
119d62ff 611 plugin_input_file_t *input = (plugin_input_file_t *) handle;
5d3236ee 612 ASSERT (called_plugin);
f4b78d18 613 if (input->fd != -1)
119d62ff
L
614 {
615 close (input->fd);
616 input->fd = -1;
617 }
f4b78d18 618 return LDPS_OK;
5d3236ee
DK
619}
620
42a851a9
DK
621/* Return TRUE if a defined symbol might be reachable from outside the
622 universe of claimed objects. */
623static inline bfd_boolean
9bbc1a67 624is_visible_from_outside (struct ld_plugin_symbol *lsym,
f84854b6 625 struct bfd_link_hash_entry *blhe)
42a851a9 626{
0e1862bb 627 if (bfd_link_relocatable (&link_info))
42a851a9 628 return TRUE;
4070765b 629 if (blhe->non_ir_ref_dynamic
59fa66c5
L
630 || link_info.export_dynamic
631 || bfd_link_dll (&link_info))
42a851a9 632 {
fd91d419
L
633 /* Check if symbol is hidden by version script. */
634 if (bfd_hide_sym_by_version (link_info.version_info,
635 blhe->root.string))
636 return FALSE;
42a851a9
DK
637 /* Only ELF symbols really have visibility. */
638 if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour)
639 {
640 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
641 int vis = ELF_ST_VISIBILITY (el->other);
642 return vis == STV_DEFAULT || vis == STV_PROTECTED;
643 }
644 /* On non-ELF targets, we can safely make inferences by considering
f84854b6 645 what visibility the plugin would have liked to apply when it first
42a851a9
DK
646 sent us the symbol. During ELF symbol processing, visibility only
647 ever becomes more restrictive, not less, when symbols are merged,
648 so this is a conservative estimate; it may give false positives,
649 declaring something visible from outside when it in fact would
650 not have been, but this will only lead to missed optimisation
651 opportunities during LTRANS at worst; it will not give false
652 negatives, which can lead to the disastrous conclusion that the
653 related symbol is IRONLY. (See GCC PR46319 for an example.) */
cfac8028
L
654 return (lsym->visibility == LDPV_DEFAULT
655 || lsym->visibility == LDPV_PROTECTED);
42a851a9 656 }
35ed3f94 657
42a851a9
DK
658 return FALSE;
659}
660
8e5cb9a5 661/* Return LTO kind string name that corresponds to IDX enum value. */
7ea79cb3 662static const char *
8e5cb9a5 663get_lto_kind (unsigned int idx)
7ea79cb3 664{
665 static char buffer[64];
666 const char *lto_kind_str[5] =
667 {
668 "DEF",
669 "WEAKDEF",
670 "UNDEF",
671 "WEAKUNDEF",
672 "COMMON"
673 };
674
8e5cb9a5
JB
675 if (idx < ARRAY_SIZE (lto_kind_str))
676 return lto_kind_str [idx];
7ea79cb3 677
8e5cb9a5 678 sprintf (buffer, _("unknown LTO kind value %x"), idx);
7ea79cb3 679 return buffer;
680}
681
8e5cb9a5 682/* Return LTO resolution string name that corresponds to IDX enum value. */
7ea79cb3 683static const char *
8e5cb9a5 684get_lto_resolution (unsigned int idx)
7ea79cb3 685{
686 static char buffer[64];
687 static const char *lto_resolution_str[10] =
688 {
689 "UNKNOWN",
690 "UNDEF",
691 "PREVAILING_DEF",
692 "PREVAILING_DEF_IRONLY",
693 "PREEMPTED_REG",
694 "PREEMPTED_IR",
695 "RESOLVED_IR",
696 "RESOLVED_EXEC",
697 "RESOLVED_DYN",
698 "PREVAILING_DEF_IRONLY_EXP",
699 };
700
8e5cb9a5
JB
701 if (idx < ARRAY_SIZE (lto_resolution_str))
702 return lto_resolution_str [idx];
7ea79cb3 703
8e5cb9a5 704 sprintf (buffer, _("unknown LTO resolution value %x"), idx);
7ea79cb3 705 return buffer;
706}
707
8e5cb9a5 708/* Return LTO visibility string name that corresponds to IDX enum value. */
7ea79cb3 709static const char *
8e5cb9a5 710get_lto_visibility (unsigned int idx)
7ea79cb3 711{
712 static char buffer[64];
713 const char *lto_visibility_str[4] =
714 {
715 "DEFAULT",
716 "PROTECTED",
717 "INTERNAL",
718 "HIDDEN"
719 };
720
8e5cb9a5
JB
721 if (idx < ARRAY_SIZE (lto_visibility_str))
722 return lto_visibility_str [idx];
7ea79cb3 723
8e5cb9a5 724 sprintf (buffer, _("unknown LTO visibility value %x"), idx);
7ea79cb3 725 return buffer;
726}
727
5d3236ee
DK
728/* Get the symbol resolution info for a plugin-claimed input file. */
729static enum ld_plugin_status
69ee6ab2
AM
730get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
731 int def_ironly_exp)
5d3236ee 732{
f4b78d18
L
733 const plugin_input_file_t *input = handle;
734 const bfd *abfd = (const bfd *) input->abfd;
5d3236ee 735 int n;
69ee6ab2 736
5d3236ee
DK
737 ASSERT (called_plugin);
738 for (n = 0; n < nsyms; n++)
739 {
740 struct bfd_link_hash_entry *blhe;
42a851a9 741 asection *owner_sec;
69ee6ab2 742 int res;
6fe014bc
L
743 struct bfd_link_hash_entry *h
744 = bfd_link_hash_lookup (link_info.hash, syms[n].name,
745 FALSE, FALSE, TRUE);
746 enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none;
69ee6ab2 747
6fe014bc
L
748 if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF)
749 {
750 blhe = h;
a78fca7b 751 if (blhe && link_info.wrap_hash != NULL)
6fe014bc
L
752 {
753 /* Check if a symbol is a wrapper symbol. */
754 struct bfd_link_hash_entry *unwrap
755 = unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe);
756 if (unwrap && unwrap != h)
757 wrap_status = wrapper;
758 }
759 }
10be1b6a 760 else
6fe014bc
L
761 {
762 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd,
763 &link_info, syms[n].name,
764 FALSE, FALSE, TRUE);
765 /* Check if a symbol is a wrapped symbol. */
766 if (blhe && blhe != h)
767 wrap_status = wrapped;
768 }
5d3236ee
DK
769 if (!blhe)
770 {
3355cb3b
L
771 /* The plugin is called to claim symbols in an archive element
772 from plugin_object_p. But those symbols aren't needed to
773 create output. They are defined and referenced only within
774 IR. */
775 switch (syms[n].def)
776 {
777 default:
778 abort ();
779 case LDPK_UNDEF:
780 case LDPK_WEAKUNDEF:
781 res = LDPR_UNDEF;
782 break;
783 case LDPK_DEF:
784 case LDPK_WEAKDEF:
785 case LDPK_COMMON:
786 res = LDPR_PREVAILING_DEF_IRONLY;
787 break;
788 }
1715a13c 789 goto report_symbol;
5d3236ee
DK
790 }
791
792 /* Determine resolution from blhe type and symbol's original type. */
793 if (blhe->type == bfd_link_hash_undefined
f84854b6 794 || blhe->type == bfd_link_hash_undefweak)
5d3236ee 795 {
69ee6ab2 796 res = LDPR_UNDEF;
1715a13c 797 goto report_symbol;
5d3236ee
DK
798 }
799 if (blhe->type != bfd_link_hash_defined
f84854b6
L
800 && blhe->type != bfd_link_hash_defweak
801 && blhe->type != bfd_link_hash_common)
5d3236ee
DK
802 {
803 /* We should not have a new, indirect or warning symbol here. */
df5f2391 804 einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"),
f84854b6 805 called_plugin->name, blhe->type);
5d3236ee
DK
806 }
807
42a851a9
DK
808 /* Find out which section owns the symbol. Since it's not undef,
809 it must have an owner; if it's not a common symbol, both defs
810 and weakdefs keep it in the same place. */
9e2278f5
AM
811 owner_sec = (blhe->type == bfd_link_hash_common
812 ? blhe->u.c.p->section
813 : blhe->u.def.section);
42a851a9 814
5d3236ee
DK
815
816 /* If it was originally undefined or common, then it has been
f84854b6
L
817 resolved; determine how. */
818 if (syms[n].def == LDPK_UNDEF
819 || syms[n].def == LDPK_WEAKUNDEF
5d3236ee
DK
820 || syms[n].def == LDPK_COMMON)
821 {
5d3236ee 822 if (owner_sec->owner == link_info.output_bfd)
69ee6ab2 823 res = LDPR_RESOLVED_EXEC;
5d3236ee 824 else if (owner_sec->owner == abfd)
69ee6ab2 825 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee 826 else if (is_ir_dummy_bfd (owner_sec->owner))
69ee6ab2 827 res = LDPR_RESOLVED_IR;
cc322803
L
828 else if (owner_sec->owner != NULL
829 && (owner_sec->owner->flags & DYNAMIC) != 0)
69ee6ab2 830 res = LDPR_RESOLVED_DYN;
5d3236ee 831 else
69ee6ab2 832 res = LDPR_RESOLVED_EXEC;
5d3236ee
DK
833 }
834
835 /* Was originally def, or weakdef. Does it prevail? If the
f84854b6 836 owner is the original dummy bfd that supplied it, then this
5d3236ee 837 is the definition that has prevailed. */
69ee6ab2
AM
838 else if (owner_sec->owner == link_info.output_bfd)
839 res = LDPR_PREEMPTED_REG;
42a851a9 840 else if (owner_sec->owner == abfd)
69ee6ab2 841 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee
DK
842
843 /* Was originally def, weakdef, or common, but has been pre-empted. */
69ee6ab2
AM
844 else if (is_ir_dummy_bfd (owner_sec->owner))
845 res = LDPR_PREEMPTED_IR;
846 else
847 res = LDPR_PREEMPTED_REG;
848
849 if (res == LDPR_PREVAILING_DEF_IRONLY)
850 {
851 /* We need to know if the sym is referenced from non-IR files. Or
852 even potentially-referenced, perhaps in a future final link if
853 this is a partial one, perhaps dynamically at load-time if the
6fe014bc
L
854 symbol is externally visible. Also check for wrapper symbol. */
855 if (blhe->non_ir_ref_regular || wrap_status == wrapper)
69ee6ab2 856 res = LDPR_PREVAILING_DEF;
6fe014bc
L
857 else if (wrap_status == wrapped)
858 res = LDPR_RESOLVED_IR;
9bbc1a67 859 else if (is_visible_from_outside (&syms[n], blhe))
69ee6ab2
AM
860 res = def_ironly_exp;
861 }
1715a13c 862
9e2278f5 863 report_symbol:
69ee6ab2 864 syms[n].resolution = res;
1715a13c 865 if (report_plugin_symbols)
871b3ab2 866 einfo (_("%P: %pB: symbol `%s' "
7ea79cb3 867 "definition: %s, visibility: %s, resolution: %s\n"),
9e2278f5 868 abfd, syms[n].name,
7ea79cb3 869 get_lto_kind (syms[n].def),
870 get_lto_visibility (syms[n].visibility),
871 get_lto_resolution (res));
5d3236ee
DK
872 }
873 return LDPS_OK;
874}
875
69ee6ab2
AM
876static enum ld_plugin_status
877get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
878{
879 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
880}
881
882static enum ld_plugin_status
883get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
884{
885 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
886}
887
5d3236ee
DK
888/* Add a new (real) input file generated by a plugin. */
889static enum ld_plugin_status
890add_input_file (const char *pathname)
891{
ce875075
AM
892 lang_input_statement_type *is;
893
5d3236ee 894 ASSERT (called_plugin);
ce875075
AM
895 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
896 NULL);
897 if (!is)
5d3236ee 898 return LDPS_ERR;
ce875075 899 is->flags.lto_output = 1;
5d3236ee
DK
900 return LDPS_OK;
901}
902
903/* Add a new (real) library required by a plugin. */
904static enum ld_plugin_status
905add_input_library (const char *pathname)
906{
ce875075
AM
907 lang_input_statement_type *is;
908
5d3236ee 909 ASSERT (called_plugin);
ce875075
AM
910 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
911 NULL);
912 if (!is)
5d3236ee 913 return LDPS_ERR;
ce875075 914 is->flags.lto_output = 1;
5d3236ee
DK
915 return LDPS_OK;
916}
917
918/* Set the extra library path to be used by libraries added via
919 add_input_library. */
920static enum ld_plugin_status
921set_extra_library_path (const char *path)
922{
923 ASSERT (called_plugin);
d4cb7acd 924 ldfile_add_library_path (xstrdup (path), FALSE);
5d3236ee
DK
925 return LDPS_OK;
926}
927
928/* Issue a diagnostic message from a plugin. */
929static enum ld_plugin_status
930message (int level, const char *format, ...)
931{
932 va_list args;
933 va_start (args, format);
934
935 switch (level)
936 {
937 case LDPL_INFO:
938 vfinfo (stdout, format, args, FALSE);
d251c5c4 939 putchar ('\n');
5d3236ee
DK
940 break;
941 case LDPL_WARNING:
45e81354 942 {
df5f2391 943 char *newfmt = concat (_("%P: warning: "), format, "\n",
e1fa0163 944 (const char *) NULL);
45e81354 945 vfinfo (stdout, newfmt, args, TRUE);
e1fa0163 946 free (newfmt);
45e81354 947 }
5d3236ee
DK
948 break;
949 case LDPL_FATAL:
950 case LDPL_ERROR:
951 default:
9e2278f5 952 {
df5f2391
AM
953 char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X",
954 _("%P: error: "), format, "\n",
e1fa0163 955 (const char *) NULL);
9e2278f5
AM
956 fflush (stdout);
957 vfinfo (stderr, newfmt, args, TRUE);
958 fflush (stderr);
e1fa0163 959 free (newfmt);
9e2278f5 960 }
5d3236ee
DK
961 break;
962 }
963
964 va_end (args);
965 return LDPS_OK;
966}
967
968/* Helper to size leading part of tv array and set it up. */
69ee6ab2 969static void
5d3236ee
DK
970set_tv_header (struct ld_plugin_tv *tv)
971{
972 size_t i;
973
974 /* Version info. */
975 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
976 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
977
5d3236ee
DK
978 for (i = 0; i < tv_header_size; i++)
979 {
980 tv[i].tv_tag = tv_header_tags[i];
981#define TVU(x) tv[i].tv_u.tv_ ## x
982 switch (tv[i].tv_tag)
983 {
f84854b6
L
984 case LDPT_MESSAGE:
985 TVU(message) = message;
986 break;
987 case LDPT_API_VERSION:
988 TVU(val) = LD_PLUGIN_API_VERSION;
989 break;
990 case LDPT_GNU_LD_VERSION:
991 TVU(val) = major * 100 + minor;
992 break;
993 case LDPT_LINKER_OUTPUT:
64d94ba0
AM
994 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
995 : bfd_link_pde (&link_info) ? LDPO_EXEC
996 : bfd_link_pie (&link_info) ? LDPO_PIE
997 : LDPO_DYN);
f84854b6
L
998 break;
999 case LDPT_OUTPUT_NAME:
1000 TVU(string) = output_filename;
1001 break;
1002 case LDPT_REGISTER_CLAIM_FILE_HOOK:
1003 TVU(register_claim_file) = register_claim_file;
1004 break;
1005 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
1006 TVU(register_all_symbols_read) = register_all_symbols_read;
1007 break;
1008 case LDPT_REGISTER_CLEANUP_HOOK:
1009 TVU(register_cleanup) = register_cleanup;
1010 break;
1011 case LDPT_ADD_SYMBOLS:
1012 TVU(add_symbols) = add_symbols;
1013 break;
1014 case LDPT_GET_INPUT_FILE:
1015 TVU(get_input_file) = get_input_file;
1016 break;
15f7a26b
L
1017 case LDPT_GET_VIEW:
1018 TVU(get_view) = get_view;
1019 break;
f84854b6
L
1020 case LDPT_RELEASE_INPUT_FILE:
1021 TVU(release_input_file) = release_input_file;
1022 break;
1023 case LDPT_GET_SYMBOLS:
69ee6ab2
AM
1024 TVU(get_symbols) = get_symbols_v1;
1025 break;
1026 case LDPT_GET_SYMBOLS_V2:
1027 TVU(get_symbols) = get_symbols_v2;
f84854b6
L
1028 break;
1029 case LDPT_ADD_INPUT_FILE:
1030 TVU(add_input_file) = add_input_file;
1031 break;
1032 case LDPT_ADD_INPUT_LIBRARY:
1033 TVU(add_input_library) = add_input_library;
1034 break;
1035 case LDPT_SET_EXTRA_LIBRARY_PATH:
1036 TVU(set_extra_library_path) = set_extra_library_path;
1037 break;
1038 default:
1039 /* Added a new entry to the array without adding
1040 a new case to set up its value is a bug. */
1041 FAIL ();
5d3236ee
DK
1042 }
1043#undef TVU
1044 }
5d3236ee
DK
1045}
1046
1047/* Append the per-plugin args list and trailing LDPT_NULL to tv. */
1048static void
1049set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
1050{
1051 plugin_arg_t *arg = plugin->args;
1052 while (arg)
1053 {
1054 tv->tv_tag = LDPT_OPTION;
1055 tv->tv_u.tv_string = arg->arg;
1056 arg = arg->next;
1057 tv++;
1058 }
1059 tv->tv_tag = LDPT_NULL;
1060 tv->tv_u.tv_val = 0;
1061}
1062
1063/* Load up and initialise all plugins after argument parsing. */
d82184d7 1064void
d44ad554 1065plugin_load_plugins (void)
5d3236ee
DK
1066{
1067 struct ld_plugin_tv *my_tv;
1068 unsigned int max_args = 0;
1069 plugin_t *curplug = plugins_list;
1070
1071 /* If there are no plugins, we need do nothing this run. */
1072 if (!curplug)
d82184d7 1073 return;
5d3236ee
DK
1074
1075 /* First pass over plugins to find max # args needed so that we
1076 can size and allocate the tv array. */
1077 while (curplug)
1078 {
1079 if (curplug->n_args > max_args)
1080 max_args = curplug->n_args;
1081 curplug = curplug->next;
1082 }
1083
1084 /* Allocate tv array and initialise constant part. */
1085 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1086 set_tv_header (my_tv);
1087
1088 /* Pass over plugins again, activating them. */
1089 curplug = plugins_list;
1090 while (curplug)
1091 {
1092 enum ld_plugin_status rv;
a8f9d13e
AM
1093 ld_plugin_onload onloadfn;
1094
1095 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
5d3236ee 1096 if (!onloadfn)
a8f9d13e 1097 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
5d3236ee 1098 if (!onloadfn)
df5f2391 1099 einfo (_("%F%P: %s: error loading plugin: %s\n"),
d82184d7 1100 curplug->name, dlerror ());
5d3236ee
DK
1101 set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1102 called_plugin = curplug;
1103 rv = (*onloadfn) (my_tv);
1104 called_plugin = NULL;
1105 if (rv != LDPS_OK)
df5f2391 1106 einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv);
5d3236ee
DK
1107 curplug = curplug->next;
1108 }
1109
1110 /* Since plugin(s) inited ok, assume they're going to want symbol
1111 resolutions, which needs us to track which symbols are referenced
1112 by non-IR files using the linker's notice callback. */
9e2278f5
AM
1113 orig_notice_all = link_info.notice_all;
1114 orig_callbacks = link_info.callbacks;
1115 plugin_callbacks = *orig_callbacks;
1116 plugin_callbacks.notice = &plugin_notice;
5d3236ee 1117 link_info.notice_all = TRUE;
61f41c3c 1118 link_info.lto_plugin_active = TRUE;
9e2278f5 1119 link_info.callbacks = &plugin_callbacks;
38604796 1120
5ae0078c
L
1121 register_ld_plugin_object_p (plugin_object_p);
1122
38604796 1123#if HAVE_MMAP && HAVE_GETPAGESIZE
fd5a1509 1124 plugin_pagesize = getpagesize ();
38604796 1125#endif
5d3236ee
DK
1126}
1127
1128/* Call 'claim file' hook for all plugins. */
02d00247 1129static int
5d3236ee
DK
1130plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed)
1131{
1132 plugin_t *curplug = plugins_list;
1133 *claimed = FALSE;
5d3236ee
DK
1134 while (curplug && !*claimed)
1135 {
1136 if (curplug->claim_file_handler)
1137 {
1138 enum ld_plugin_status rv;
ace667e5 1139
5d3236ee
DK
1140 called_plugin = curplug;
1141 rv = (*curplug->claim_file_handler) (file, claimed);
1142 called_plugin = NULL;
1143 if (rv != LDPS_OK)
1144 set_plugin_error (curplug->name);
1145 }
1146 curplug = curplug->next;
1147 }
1148 return plugin_error_p () ? -1 : 0;
1149}
1150
35a1e5f3
L
1151/* Duplicates a character string with memory attached to ABFD. */
1152
1153static char *
1154plugin_strdup (bfd *abfd, const char *str)
1155{
1156 size_t strlength;
1157 char *copy;
1158 strlength = strlen (str) + 1;
1159 copy = bfd_alloc (abfd, strlength);
1160 if (copy == NULL)
df5f2391 1161 einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"),
35a1e5f3
L
1162 bfd_get_error ());
1163 memcpy (copy, str, strlength);
1164 return copy;
1165}
1166
cb001c0d
AM
1167static void
1168plugin_cleanup (bfd *abfd ATTRIBUTE_UNUSED)
1169{
1170}
1171
1172static bfd_cleanup
5ae0078c 1173plugin_object_p (bfd *ibfd)
02d00247 1174{
5ae0078c 1175 int claimed;
f4b78d18 1176 plugin_input_file_t *input;
35a1e5f3
L
1177 struct ld_plugin_input_file file;
1178 bfd *abfd;
5ae0078c
L
1179
1180 /* Don't try the dummy object file. */
1181 if ((ibfd->flags & BFD_PLUGIN) != 0)
1182 return NULL;
1183
49f30d83 1184 if (ibfd->plugin_format != bfd_plugin_unknown)
5ae0078c
L
1185 {
1186 if (ibfd->plugin_format == bfd_plugin_yes)
cb001c0d 1187 return plugin_cleanup;
5ae0078c
L
1188 else
1189 return NULL;
1190 }
1191
02d00247
AM
1192 /* We create a dummy BFD, initially empty, to house whatever symbols
1193 the plugin may want to add. */
607b4833 1194 abfd = plugin_get_ir_dummy_bfd (bfd_get_filename (ibfd), ibfd);
f4b78d18
L
1195
1196 input = bfd_alloc (abfd, sizeof (*input));
1197 if (input == NULL)
df5f2391 1198 einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"),
f4b78d18
L
1199 bfd_get_error ());
1200
7d0b9ebc
AM
1201 if (!bfd_plugin_open_input (ibfd, &file))
1202 return NULL;
35a1e5f3 1203
607b4833 1204 if (file.name == bfd_get_filename (ibfd))
7d0b9ebc 1205 {
35a1e5f3
L
1206 /* We must copy filename attached to ibfd if it is not an archive
1207 member since it may be freed by bfd_close below. */
7d0b9ebc 1208 file.name = plugin_strdup (abfd, file.name);
35a1e5f3
L
1209 }
1210
35a1e5f3 1211 file.handle = input;
f4b78d18 1212 input->abfd = abfd;
2aec968d
L
1213 input->view_buffer.addr = NULL;
1214 input->view_buffer.filesize = 0;
1215 input->view_buffer.offset = 0;
7d0b9ebc 1216 input->fd = file.fd;
d319a098 1217 input->use_mmap = FALSE;
7d0b9ebc
AM
1218 input->offset = file.offset;
1219 input->filesize = file.filesize;
607b4833 1220 input->name = plugin_strdup (abfd, bfd_get_filename (ibfd));
f4b78d18 1221
5ae0078c
L
1222 claimed = 0;
1223
35a1e5f3 1224 if (plugin_call_claim_file (&file, &claimed))
df5f2391 1225 einfo (_("%F%P: %s: plugin reported error claiming file\n"),
02d00247 1226 plugin_error_plugin ());
f4b78d18 1227
7d0b9ebc 1228 if (input->fd != -1 && !bfd_plugin_target_p (ibfd->xvec))
f4b78d18 1229 {
5ae0078c
L
1230 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which
1231 doesn't need fd after plugin_call_claim_file, doesn't use
1232 BFD plugin target vector. Since GCC plugin doesn't call
1233 release_input_file, we close it here. LLVM plugin, which
1234 needs fd after plugin_call_claim_file and calls
1235 release_input_file after it is done, uses BFD plugin target
1236 vector. This scheme doesn't work when a plugin needs fd and
1237 doesn't use BFD plugin target vector neither. */
7d0b9ebc 1238 close (input->fd);
f4b78d18
L
1239 input->fd = -1;
1240 }
1241
02d00247
AM
1242 if (claimed)
1243 {
5ae0078c
L
1244 ibfd->plugin_format = bfd_plugin_yes;
1245 ibfd->plugin_dummy_bfd = abfd;
35a1e5f3 1246 bfd_make_readable (abfd);
2aa90762 1247 abfd->no_export = ibfd->no_export;
cb001c0d 1248 return plugin_cleanup;
02d00247
AM
1249 }
1250 else
1251 {
38604796
L
1252#if HAVE_MMAP
1253 if (input->use_mmap)
1254 {
1255 /* If plugin didn't claim the file, unmap the buffer. */
1256 char *addr = input->view_buffer.addr;
1257 off_t size = input->view_buffer.filesize;
1258# if HAVE_GETPAGESIZE
1259 off_t bias = input->view_buffer.offset % plugin_pagesize;
1260 size += bias;
1261 addr -= bias;
1262# endif
1263 munmap (addr, size);
1264 }
1265#endif
1266
02d00247
AM
1267 /* If plugin didn't claim the file, we don't need the dummy bfd.
1268 Can't avoid speculatively creating it, alas. */
5ae0078c 1269 ibfd->plugin_format = bfd_plugin_no;
f4b78d18 1270 bfd_close_all_done (abfd);
5ae0078c
L
1271 return NULL;
1272 }
1273}
1274
1275void
1276plugin_maybe_claim (lang_input_statement_type *entry)
1277{
fb47deda 1278 ASSERT (entry->header.type == lang_input_statement_enum);
5ae0078c
L
1279 if (plugin_object_p (entry->the_bfd))
1280 {
1281 bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1282
1283 /* Discard the real file's BFD and substitute the dummy one. */
1284
b0cffb47
AM
1285 /* We can't call bfd_close on archives. BFD archive handling
1286 caches elements, and add_archive_element keeps pointers to
1287 the_bfd and the_bfd->filename in a lang_input_statement_type
1288 linker script statement. */
5ae0078c
L
1289 if (entry->the_bfd->my_archive == NULL)
1290 bfd_close (entry->the_bfd);
1291 entry->the_bfd = abfd;
1292 entry->flags.claimed = 1;
02d00247
AM
1293 }
1294}
1295
5d3236ee
DK
1296/* Call 'all symbols read' hook for all plugins. */
1297int
1298plugin_call_all_symbols_read (void)
1299{
1300 plugin_t *curplug = plugins_list;
1301
1302 /* Disable any further file-claiming. */
1303 no_more_claiming = TRUE;
1304
5d3236ee
DK
1305 while (curplug)
1306 {
1307 if (curplug->all_symbols_read_handler)
1308 {
1309 enum ld_plugin_status rv;
1310 called_plugin = curplug;
1311 rv = (*curplug->all_symbols_read_handler) ();
1312 called_plugin = NULL;
1313 if (rv != LDPS_OK)
1314 set_plugin_error (curplug->name);
1315 }
1316 curplug = curplug->next;
1317 }
1318 return plugin_error_p () ? -1 : 0;
1319}
1320
e73d965c 1321/* Call 'cleanup' hook for all plugins at exit. */
498cd2a0 1322void
5d3236ee
DK
1323plugin_call_cleanup (void)
1324{
1325 plugin_t *curplug = plugins_list;
1326 while (curplug)
1327 {
1328 if (curplug->cleanup_handler && !curplug->cleanup_done)
1329 {
1330 enum ld_plugin_status rv;
1331 curplug->cleanup_done = TRUE;
1332 called_plugin = curplug;
1333 rv = (*curplug->cleanup_handler) ();
1334 called_plugin = NULL;
1335 if (rv != LDPS_OK)
d82184d7
L
1336 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1337 curplug->name, rv);
5d3236ee
DK
1338 dlclose (curplug->dlhandle);
1339 }
1340 curplug = curplug->next;
1341 }
5d3236ee
DK
1342}
1343
5d3236ee
DK
1344/* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1345 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
35ed3f94 1346 the linker adds them to the linker hash table. Mark those
bc4e12de 1347 referenced from a non-IR file with non_ir_ref_regular or
4070765b
AM
1348 non_ir_ref_dynamic as appropriate. We have to notice_all symbols,
1349 because we won't necessarily know until later which ones will be
1350 contributed by IR files. */
9e2278f5
AM
1351static bfd_boolean
1352plugin_notice (struct bfd_link_info *info,
35ed3f94 1353 struct bfd_link_hash_entry *h,
46135103 1354 struct bfd_link_hash_entry *inh,
9e2278f5
AM
1355 bfd *abfd,
1356 asection *section,
16d96b5b 1357 bfd_vma value,
46135103 1358 flagword flags)
5d3236ee 1359{
46135103
AM
1360 struct bfd_link_hash_entry *orig_h = h;
1361
35ed3f94 1362 if (h != NULL)
5d3236ee 1363 {
cd6eee13 1364 bfd *sym_bfd;
4070765b 1365 bfd_boolean ref = FALSE;
cd6eee13 1366
46135103
AM
1367 if (h->type == bfd_link_hash_warning)
1368 h = h->u.i.link;
1369
4a2b04a7 1370 /* Nothing to do here if this def/ref is from an IR dummy BFD. */
9e2278f5 1371 if (is_ir_dummy_bfd (abfd))
4a2b04a7 1372 ;
9e2278f5 1373
16d96b5b
AM
1374 /* Making an indirect symbol counts as a reference unless this
1375 is a brand new symbol. */
4a2b04a7
L
1376 else if (bfd_is_ind_section (section)
1377 || (flags & BSF_INDIRECT) != 0)
16d96b5b 1378 {
46135103
AM
1379 /* ??? Some of this is questionable. See comments in
1380 _bfd_generic_link_add_one_symbol for case IND. */
4070765b
AM
1381 if (h->type != bfd_link_hash_new
1382 || inh->type == bfd_link_hash_new)
16d96b5b 1383 {
4070765b 1384 if ((abfd->flags & DYNAMIC) == 0)
bc4e12de 1385 inh->non_ir_ref_regular = TRUE;
4070765b
AM
1386 else
1387 inh->non_ir_ref_dynamic = TRUE;
16d96b5b 1388 }
4070765b
AM
1389
1390 if (h->type != bfd_link_hash_new)
1391 ref = TRUE;
16d96b5b
AM
1392 }
1393
1394 /* Nothing to do here for warning symbols. */
1395 else if ((flags & BSF_WARNING) != 0)
1396 ;
1397
1398 /* Nothing to do here for constructor symbols. */
1399 else if ((flags & BSF_CONSTRUCTOR) != 0)
1400 ;
1401
35ed3f94 1402 /* If this is a ref, set non_ir_ref. */
16d96b5b 1403 else if (bfd_is_und_section (section))
3d5bef4c
L
1404 {
1405 /* Replace the undefined dummy bfd with the real one. */
4070765b
AM
1406 if ((h->type == bfd_link_hash_undefined
1407 || h->type == bfd_link_hash_undefweak)
1408 && (h->u.undef.abfd == NULL
1409 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
59fa66c5 1410 h->u.undef.abfd = abfd;
4070765b 1411 ref = TRUE;
3d5bef4c 1412 }
35ed3f94 1413
af4fa23f
AM
1414
1415 /* A common symbol should be merged with other commons or
1416 defs with the same name. In particular, a common ought
1417 to be overridden by a def in a -flto object. In that
1418 sense a common is also a ref. */
1419 else if (bfd_is_com_section (section))
cd6eee13 1420 {
af4fa23f
AM
1421 if (h->type == bfd_link_hash_common
1422 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))
0616a280
AM
1423 {
1424 h->type = bfd_link_hash_undefweak;
1425 h->u.undef.abfd = sym_bfd;
1426 }
af4fa23f
AM
1427 ref = TRUE;
1428 }
4070765b 1429
af4fa23f
AM
1430 /* Otherwise, it must be a new def.
1431 Ensure any symbol defined in an IR dummy BFD takes on a
1432 new value from a real BFD. Weak symbols are not normally
1433 overridden by a new weak definition, and strong symbols
1434 will normally cause multiple definition errors. Avoid
1435 this by making the symbol appear to be undefined. */
1436 else if (((h->type == bfd_link_hash_defweak
1437 || h->type == bfd_link_hash_defined)
1438 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1439 || (h->type == bfd_link_hash_common
1440 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))
1441 {
1442 h->type = bfd_link_hash_undefweak;
1443 h->u.undef.abfd = sym_bfd;
4070765b
AM
1444 }
1445
1446 if (ref)
1447 {
1448 if ((abfd->flags & DYNAMIC) == 0)
bc4e12de 1449 h->non_ir_ref_regular = TRUE;
4070765b
AM
1450 else
1451 h->non_ir_ref_dynamic = TRUE;
cd6eee13 1452 }
5d3236ee
DK
1453 }
1454
1455 /* Continue with cref/nocrossref/trace-sym processing. */
46135103 1456 if (orig_h == NULL
9e2278f5
AM
1457 || orig_notice_all
1458 || (info->notice_hash != NULL
46135103 1459 && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
35ed3f94 1460 FALSE, FALSE) != NULL))
46135103
AM
1461 return (*orig_callbacks->notice) (info, orig_h, inh,
1462 abfd, section, value, flags);
5d3236ee
DK
1463 return TRUE;
1464}
This page took 0.55695 seconds and 4 git commands to generate.