]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - ld/plugin.c
Update PC when simulate break instruction.
[thirdparty/binutils-gdb.git] / ld / plugin.c
CommitLineData
5d3236ee 1/* Plugin control for the GNU linker.
6f2750fe 2 Copyright (C) 2010-2016 Free Software Foundation, Inc.
5d3236ee
DK
3
4 This file is part of the GNU Binutils.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21#include "sysdep.h"
22#include "libiberty.h"
23#include "bfd.h"
24#include "bfdlink.h"
25#include "bfdver.h"
26#include "ld.h"
27#include "ldmain.h"
28#include "ldmisc.h"
29#include "ldexp.h"
30#include "ldlang.h"
31#include "ldfile.h"
7d0b9ebc 32#include "plugin-api.h"
5ae0078c 33#include "../bfd/plugin.h"
5d3236ee 34#include "plugin.h"
5d3236ee 35#include "elf-bfd.h"
2aec968d
L
36#if HAVE_MMAP
37# include <sys/mman.h>
38# ifndef MAP_FAILED
39# define MAP_FAILED ((void *) -1)
40# endif
41# ifndef PROT_READ
42# define PROT_READ 0
43# endif
44# ifndef MAP_PRIVATE
45# define MAP_PRIVATE 0
46# endif
47#endif
f4b78d18
L
48#include <errno.h>
49#if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
50extern int errno;
51#endif
3917d5d5 52#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
f31d24a0 53#include <windows.h>
3917d5d5 54#endif
5d3236ee 55
1715a13c
L
56/* Report plugin symbols. */
57bfd_boolean report_plugin_symbols;
58
5d3236ee
DK
59/* The suffix to append to the name of the real (claimed) object file
60 when generating a dummy BFD to hold the IR symbols sent from the
cf4dc96f
DK
61 plugin. For cosmetic use only; appears in maps, crefs etc. */
62#define IRONLY_SUFFIX " (symbol from plugin)"
5d3236ee
DK
63
64/* Stores a single argument passed to a plugin. */
65typedef struct plugin_arg
66{
67 struct plugin_arg *next;
68 const char *arg;
69} plugin_arg_t;
70
71/* Holds all details of a single plugin. */
72typedef struct plugin
73{
74 /* Next on the list of plugins, or NULL at end of chain. */
75 struct plugin *next;
76 /* The argument string given to --plugin. */
77 const char *name;
78 /* The shared library handle returned by dlopen. */
79 void *dlhandle;
80 /* The list of argument string given to --plugin-opt. */
81 plugin_arg_t *args;
82 /* Number of args in the list, for convenience. */
83 size_t n_args;
84 /* The plugin's event handlers. */
85 ld_plugin_claim_file_handler claim_file_handler;
86 ld_plugin_all_symbols_read_handler all_symbols_read_handler;
87 ld_plugin_cleanup_handler cleanup_handler;
88 /* TRUE if the cleanup handlers have been called. */
89 bfd_boolean cleanup_done;
90} plugin_t;
91
2aec968d
L
92typedef struct view_buffer
93{
94 char *addr;
95 size_t filesize;
96 off_t offset;
97} view_buffer_t;
98
f4b78d18
L
99/* The internal version of struct ld_plugin_input_file with a BFD
100 pointer. */
101typedef struct plugin_input_file
102{
103 bfd *abfd;
2aec968d 104 view_buffer_t view_buffer;
f4b78d18
L
105 char *name;
106 int fd;
38604796 107 bfd_boolean use_mmap;
f4b78d18
L
108 off_t offset;
109 off_t filesize;
110} plugin_input_file_t;
111
5d3236ee
DK
112/* The master list of all plugins. */
113static plugin_t *plugins_list = NULL;
114
115/* We keep a tail pointer for easy linking on the end. */
116static plugin_t **plugins_tail_chain_ptr = &plugins_list;
117
118/* The last plugin added to the list, for receiving args. */
119static plugin_t *last_plugin = NULL;
120
121/* The tail of the arg chain of the last plugin added to the list. */
122static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
123
124/* The plugin which is currently having a callback executed. */
125static plugin_t *called_plugin = NULL;
126
127/* Last plugin to cause an error, if any. */
128static const char *error_plugin = NULL;
129
24f58f47 130/* State of linker "notice" interface before we poked at it. */
9e2278f5 131static bfd_boolean orig_notice_all;
9e2278f5
AM
132
133/* Original linker callbacks, and the plugin version. */
134static const struct bfd_link_callbacks *orig_callbacks;
135static struct bfd_link_callbacks plugin_callbacks;
136
5d3236ee
DK
137/* Set at all symbols read time, to avoid recursively offering the plugin
138 its own newly-added input files and libs to claim. */
9e2278f5 139bfd_boolean no_more_claiming = FALSE;
5d3236ee 140
38604796
L
141#if HAVE_MMAP && HAVE_GETPAGESIZE
142/* Page size used by mmap. */
143static off_t plugin_pagesize;
144#endif
145
5d3236ee
DK
146/* List of tags to set in the constant leading part of the tv array. */
147static const enum ld_plugin_tag tv_header_tags[] =
148{
149 LDPT_MESSAGE,
150 LDPT_API_VERSION,
151 LDPT_GNU_LD_VERSION,
152 LDPT_LINKER_OUTPUT,
153 LDPT_OUTPUT_NAME,
154 LDPT_REGISTER_CLAIM_FILE_HOOK,
155 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
156 LDPT_REGISTER_CLEANUP_HOOK,
157 LDPT_ADD_SYMBOLS,
158 LDPT_GET_INPUT_FILE,
15f7a26b 159 LDPT_GET_VIEW,
5d3236ee
DK
160 LDPT_RELEASE_INPUT_FILE,
161 LDPT_GET_SYMBOLS,
69ee6ab2 162 LDPT_GET_SYMBOLS_V2,
5d3236ee
DK
163 LDPT_ADD_INPUT_FILE,
164 LDPT_ADD_INPUT_LIBRARY,
165 LDPT_SET_EXTRA_LIBRARY_PATH
166};
167
168/* How many entries in the constant leading part of the tv array. */
169static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
170
9e2278f5 171/* Forward references. */
16d96b5b 172static bfd_boolean plugin_notice (struct bfd_link_info *,
46135103
AM
173 struct bfd_link_hash_entry *,
174 struct bfd_link_hash_entry *,
175 bfd *, asection *, bfd_vma, flagword);
9e2278f5 176
5ae0078c
L
177static const bfd_target * plugin_object_p (bfd *);
178
3917d5d5
DK
179#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
180
181#define RTLD_NOW 0 /* Dummy value. */
182
183static void *
184dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
185{
186 return LoadLibrary (file);
187}
188
189static void *
190dlsym (void *handle, const char *name)
191{
192 return GetProcAddress (handle, name);
193}
194
195static int
196dlclose (void *handle)
197{
198 FreeLibrary (handle);
199 return 0;
200}
201
202#endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */
203
d82184d7
L
204#ifndef HAVE_DLFCN_H
205static const char *
206dlerror (void)
207{
208 return "";
209}
210#endif
211
5d3236ee
DK
212/* Helper function for exiting with error status. */
213static int
214set_plugin_error (const char *plugin)
215{
216 error_plugin = plugin;
217 return -1;
218}
219
220/* Test if an error occurred. */
221static bfd_boolean
222plugin_error_p (void)
223{
224 return error_plugin != NULL;
225}
226
227/* Return name of plugin which caused an error if any. */
d44ad554
DK
228const char *
229plugin_error_plugin (void)
5d3236ee
DK
230{
231 return error_plugin ? error_plugin : _("<no plugin>");
232}
233
234/* Handle -plugin arg: find and load plugin, or return error. */
d82184d7 235void
d44ad554 236plugin_opt_plugin (const char *plugin)
5d3236ee
DK
237{
238 plugin_t *newplug;
c3e1c28e 239 plugin_t *curplug = plugins_list;
5d3236ee
DK
240
241 newplug = xmalloc (sizeof *newplug);
242 memset (newplug, 0, sizeof *newplug);
243 newplug->name = plugin;
244 newplug->dlhandle = dlopen (plugin, RTLD_NOW);
245 if (!newplug->dlhandle)
d82184d7 246 einfo (_("%P%F: %s: error loading plugin: %s\n"), plugin, dlerror ());
5d3236ee 247
c3e1c28e
L
248 /* Check if plugin has been loaded already. */
249 while (curplug)
250 {
251 if (newplug->dlhandle == curplug->dlhandle)
252 {
253 einfo (_("%P: %s: duplicated plugin\n"), plugin);
254 free (newplug);
255 return;
256 }
257 curplug = curplug->next;
258 }
259
5d3236ee
DK
260 /* Chain on end, so when we run list it is in command-line order. */
261 *plugins_tail_chain_ptr = newplug;
262 plugins_tail_chain_ptr = &newplug->next;
263
264 /* Record it as current plugin for receiving args. */
265 last_plugin = newplug;
266 last_plugin_args_tail_chain_ptr = &newplug->args;
5d3236ee
DK
267}
268
269/* Accumulate option arguments for last-loaded plugin, or return
270 error if none. */
d44ad554
DK
271int
272plugin_opt_plugin_arg (const char *arg)
5d3236ee
DK
273{
274 plugin_arg_t *newarg;
275
276 if (!last_plugin)
277 return set_plugin_error (_("<no plugin>"));
278
97964ab3
AM
279 /* Ignore -pass-through= from GCC driver. */
280 if (*arg == '-')
281 {
282 const char *p = arg + 1;
283
284 if (*p == '-')
285 ++p;
286 if (strncmp (p, "pass-through=", 13) == 0)
287 return 0;
288 }
289
5d3236ee
DK
290 newarg = xmalloc (sizeof *newarg);
291 newarg->arg = arg;
292 newarg->next = NULL;
293
294 /* Chain on end to preserve command-line order. */
295 *last_plugin_args_tail_chain_ptr = newarg;
296 last_plugin_args_tail_chain_ptr = &newarg->next;
297 last_plugin->n_args++;
298 return 0;
299}
300
37a3056a
L
301/* Generate a dummy BFD to represent an IR file, for any callers of
302 plugin_call_claim_file to use as the handle in the ld_plugin_input_file
303 struct that they build to pass in. The BFD is initially writable, so
304 that symbols can be added to it; it must be made readable after the
305 add_symbols hook has been called so that it can be read when linking. */
306static bfd *
5d3236ee
DK
307plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
308{
bc110b6e 309 bfd *abfd;
4a07dc81 310 bfd_boolean bfd_plugin_target;
bc110b6e
AM
311
312 bfd_use_reserved_id = 1;
4a07dc81 313 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
9e2278f5 314 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
4a07dc81 315 bfd_plugin_target ? link_info.output_bfd : srctemplate);
9e2278f5
AM
316 if (abfd != NULL)
317 {
318 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
5ae0078c
L
319 if (!bfd_make_writable (abfd))
320 goto report_error;
4a07dc81 321 if (!bfd_plugin_target)
5ae0078c
L
322 {
323 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
324 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
325 if (!bfd_copy_private_bfd_data (srctemplate, abfd))
326 goto report_error;
327 }
9e2278f5
AM
328 {
329 flagword flags;
330
c77ec726 331 /* Create section to own the symbols. */
9e2278f5
AM
332 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
333 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
334 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
335 return abfd;
336 }
337 }
5ae0078c 338report_error:
9e2278f5
AM
339 einfo (_("could not create dummy IR bfd: %F%E\n"));
340 return NULL;
5d3236ee
DK
341}
342
d44ad554 343/* Check if the BFD passed in is an IR dummy object file. */
23ebe1a0 344static inline bfd_boolean
5d3236ee
DK
345is_ir_dummy_bfd (const bfd *abfd)
346{
cf4dc96f 347 /* ABFD can sometimes legitimately be NULL, e.g. when called from one
23ebe1a0
AM
348 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */
349 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
5d3236ee
DK
350}
351
352/* Helpers to convert between BFD and GOLD symbol formats. */
353static enum ld_plugin_status
354asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
f84854b6 355 const struct ld_plugin_symbol *ldsym)
5d3236ee
DK
356{
357 flagword flags = BSF_NO_FLAGS;
358 struct bfd_section *section;
359
360 asym->the_bfd = abfd;
f84854b6 361 asym->name = (ldsym->version
9e2278f5 362 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
f84854b6 363 : ldsym->name);
5d3236ee
DK
364 asym->value = 0;
365 switch (ldsym->def)
366 {
367 case LDPK_WEAKDEF:
368 flags = BSF_WEAK;
369 /* FALLTHRU */
370 case LDPK_DEF:
371 flags |= BSF_GLOBAL;
c77ec726
AM
372 if (ldsym->comdat_key)
373 {
374 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
375 (const char *) NULL);
376 section = bfd_get_section_by_name (abfd, name);
377 if (section != NULL)
378 free (name);
379 else
380 {
381 flagword sflags;
382
383 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
384 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
385 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
386 section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
387 if (section == NULL)
388 return LDPS_ERR;
389 }
390 }
391 else
392 section = bfd_get_section_by_name (abfd, ".text");
5d3236ee
DK
393 break;
394
395 case LDPK_WEAKUNDEF:
396 flags = BSF_WEAK;
397 /* FALLTHRU */
398 case LDPK_UNDEF:
399 section = bfd_und_section_ptr;
400 break;
401
402 case LDPK_COMMON:
403 flags = BSF_GLOBAL;
404 section = bfd_com_section_ptr;
405 asym->value = ldsym->size;
5c08b7d4
L
406 /* For ELF targets, set alignment of common symbol to 1. */
407 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
02d00247
AM
408 {
409 ((elf_symbol_type *) asym)->internal_elf_sym.st_shndx = SHN_COMMON;
410 ((elf_symbol_type *) asym)->internal_elf_sym.st_value = 1;
411 }
5d3236ee
DK
412 break;
413
414 default:
415 return LDPS_ERR;
416 }
417 asym->flags = flags;
418 asym->section = section;
419
420 /* Visibility only applies on ELF targets. */
421 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
422 {
423 elf_symbol_type *elfsym = elf_symbol_from (abfd, asym);
cfac8028
L
424 unsigned char visibility;
425
5d3236ee 426 if (!elfsym)
ea360572 427 einfo (_("%P%F: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
cfac8028
L
428 switch (ldsym->visibility)
429 {
430 default:
ea360572 431 einfo (_("%P%F: unknown ELF symbol visibility: %d!\n"),
cfac8028
L
432 ldsym->visibility);
433 case LDPV_DEFAULT:
434 visibility = STV_DEFAULT;
435 break;
436 case LDPV_PROTECTED:
437 visibility = STV_PROTECTED;
438 break;
439 case LDPV_INTERNAL:
440 visibility = STV_INTERNAL;
441 break;
442 case LDPV_HIDDEN:
443 visibility = STV_HIDDEN;
444 break;
445 }
446 elfsym->internal_elf_sym.st_other
447 = (visibility | (elfsym->internal_elf_sym.st_other
448 & ~ELF_ST_VISIBILITY (-1)));
5d3236ee
DK
449 }
450
451 return LDPS_OK;
452}
453
454/* Register a claim-file handler. */
455static enum ld_plugin_status
456register_claim_file (ld_plugin_claim_file_handler handler)
457{
458 ASSERT (called_plugin);
459 called_plugin->claim_file_handler = handler;
460 return LDPS_OK;
461}
462
463/* Register an all-symbols-read handler. */
464static enum ld_plugin_status
465register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
466{
467 ASSERT (called_plugin);
468 called_plugin->all_symbols_read_handler = handler;
469 return LDPS_OK;
470}
471
472/* Register a cleanup handler. */
473static enum ld_plugin_status
474register_cleanup (ld_plugin_cleanup_handler handler)
475{
476 ASSERT (called_plugin);
477 called_plugin->cleanup_handler = handler;
478 return LDPS_OK;
479}
480
481/* Add symbols from a plugin-claimed input file. */
482static enum ld_plugin_status
483add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
484{
485 asymbol **symptrs;
f4b78d18
L
486 plugin_input_file_t *input = handle;
487 bfd *abfd = input->abfd;
7fe550fc 488 int n;
43e1669b 489
5d3236ee
DK
490 ASSERT (called_plugin);
491 symptrs = xmalloc (nsyms * sizeof *symptrs);
7fe550fc 492 for (n = 0; n < nsyms; n++)
5d3236ee
DK
493 {
494 enum ld_plugin_status rv;
0c511000
AM
495 asymbol *bfdsym;
496
0c511000 497 bfdsym = bfd_make_empty_symbol (abfd);
7fe550fc 498 symptrs[n] = bfdsym;
5d3236ee
DK
499 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
500 if (rv != LDPS_OK)
501 return rv;
502 }
7fe550fc 503 bfd_set_symtab (abfd, symptrs, nsyms);
5d3236ee
DK
504 return LDPS_OK;
505}
506
507/* Get the input file information with an open (possibly re-opened)
508 file descriptor. */
509static enum ld_plugin_status
f4b78d18 510get_input_file (const void *handle, struct ld_plugin_input_file *file)
5d3236ee 511{
f4b78d18
L
512 const plugin_input_file_t *input = handle;
513
5d3236ee 514 ASSERT (called_plugin);
f4b78d18
L
515
516 file->name = input->name;
517 file->offset = input->offset;
518 file->filesize = input->filesize;
519 file->handle = (void *) handle;
520
521 return LDPS_OK;
5d3236ee
DK
522}
523
15f7a26b
L
524/* Get view of the input file. */
525static enum ld_plugin_status
f4b78d18 526get_view (const void *handle, const void **viewp)
15f7a26b 527{
2aec968d 528 plugin_input_file_t *input = (plugin_input_file_t *) handle;
f4b78d18 529 char *buffer;
2aec968d 530 size_t size = input->filesize;
38604796
L
531 off_t offset = input->offset;
532#if HAVE_MMAP && HAVE_GETPAGESIZE
533 off_t bias;
fe905789 534#endif
f4b78d18 535
15f7a26b 536 ASSERT (called_plugin);
f4b78d18 537
2aec968d
L
538 /* FIXME: einfo should support %lld. */
539 if ((off_t) size != input->filesize)
540 einfo (_("%P%F: unsupported input file size: %s (%ld bytes)\n"),
541 input->name, (long) input->filesize);
f4b78d18 542
2aec968d
L
543 /* Check the cached view buffer. */
544 if (input->view_buffer.addr != NULL
545 && input->view_buffer.filesize == size
38604796 546 && input->view_buffer.offset == offset)
2aec968d
L
547 {
548 *viewp = input->view_buffer.addr;
549 return LDPS_OK;
550 }
551
552 input->view_buffer.filesize = size;
38604796 553 input->view_buffer.offset = offset;
f4b78d18 554
2aec968d 555#if HAVE_MMAP
fe905789 556# if HAVE_GETPAGESIZE
38604796
L
557 bias = offset % plugin_pagesize;
558 offset -= bias;
fe905789
L
559 size += bias;
560# endif
561 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
562 if (buffer != MAP_FAILED)
38604796
L
563 {
564 input->use_mmap = TRUE;
565# if HAVE_GETPAGESIZE
566 buffer += bias;
b677c456 567# endif
38604796
L
568 }
569 else
2aec968d 570#endif
f4b78d18 571 {
2aec968d
L
572 char *p;
573
38604796
L
574 input->use_mmap = FALSE;
575
576 if (lseek (input->fd, offset, SEEK_SET) < 0)
2aec968d
L
577 return LDPS_ERR;
578
579 buffer = bfd_alloc (input->abfd, size);
580 if (buffer == NULL)
581 return LDPS_ERR;
582
583 p = buffer;
584 do
f4b78d18 585 {
2aec968d
L
586 ssize_t got = read (input->fd, p, size);
587 if (got == 0)
588 break;
589 else if (got > 0)
590 {
591 p += got;
592 size -= got;
593 }
594 else if (errno != EINTR)
595 return LDPS_ERR;
f4b78d18 596 }
2aec968d 597 while (size > 0);
f4b78d18 598 }
2aec968d
L
599
600 input->view_buffer.addr = buffer;
601 *viewp = buffer;
f4b78d18
L
602
603 return LDPS_OK;
15f7a26b
L
604}
605
5d3236ee
DK
606/* Release the input file. */
607static enum ld_plugin_status
f4b78d18 608release_input_file (const void *handle)
5d3236ee 609{
119d62ff 610 plugin_input_file_t *input = (plugin_input_file_t *) handle;
5d3236ee 611 ASSERT (called_plugin);
f4b78d18 612 if (input->fd != -1)
119d62ff
L
613 {
614 close (input->fd);
615 input->fd = -1;
616 }
f4b78d18 617 return LDPS_OK;
5d3236ee
DK
618}
619
42a851a9
DK
620/* Return TRUE if a defined symbol might be reachable from outside the
621 universe of claimed objects. */
622static inline bfd_boolean
9bbc1a67 623is_visible_from_outside (struct ld_plugin_symbol *lsym,
f84854b6 624 struct bfd_link_hash_entry *blhe)
42a851a9 625{
35ed3f94
AM
626 struct bfd_sym_chain *sym;
627
0e1862bb 628 if (bfd_link_relocatable (&link_info))
42a851a9 629 return TRUE;
0e1862bb 630 if (link_info.export_dynamic || bfd_link_dll (&link_info))
42a851a9 631 {
fd91d419
L
632 /* Check if symbol is hidden by version script. */
633 if (bfd_hide_sym_by_version (link_info.version_info,
634 blhe->root.string))
635 return FALSE;
42a851a9
DK
636 /* Only ELF symbols really have visibility. */
637 if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour)
638 {
639 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
640 int vis = ELF_ST_VISIBILITY (el->other);
641 return vis == STV_DEFAULT || vis == STV_PROTECTED;
642 }
643 /* On non-ELF targets, we can safely make inferences by considering
f84854b6 644 what visibility the plugin would have liked to apply when it first
42a851a9
DK
645 sent us the symbol. During ELF symbol processing, visibility only
646 ever becomes more restrictive, not less, when symbols are merged,
647 so this is a conservative estimate; it may give false positives,
648 declaring something visible from outside when it in fact would
649 not have been, but this will only lead to missed optimisation
650 opportunities during LTRANS at worst; it will not give false
651 negatives, which can lead to the disastrous conclusion that the
652 related symbol is IRONLY. (See GCC PR46319 for an example.) */
cfac8028
L
653 return (lsym->visibility == LDPV_DEFAULT
654 || lsym->visibility == LDPV_PROTECTED);
42a851a9 655 }
35ed3f94
AM
656
657 for (sym = &entry_symbol; sym != NULL; sym = sym->next)
658 if (sym->name
659 && strcmp (sym->name, blhe->root.string) == 0)
660 return TRUE;
661
42a851a9
DK
662 return FALSE;
663}
664
5d3236ee
DK
665/* Get the symbol resolution info for a plugin-claimed input file. */
666static enum ld_plugin_status
69ee6ab2
AM
667get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
668 int def_ironly_exp)
5d3236ee 669{
f4b78d18
L
670 const plugin_input_file_t *input = handle;
671 const bfd *abfd = (const bfd *) input->abfd;
5d3236ee 672 int n;
69ee6ab2 673
5d3236ee
DK
674 ASSERT (called_plugin);
675 for (n = 0; n < nsyms; n++)
676 {
677 struct bfd_link_hash_entry *blhe;
42a851a9 678 asection *owner_sec;
69ee6ab2
AM
679 int res;
680
10be1b6a
DK
681 if (syms[n].def != LDPK_UNDEF)
682 blhe = bfd_link_hash_lookup (link_info.hash, syms[n].name,
683 FALSE, FALSE, TRUE);
684 else
685 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, &link_info,
686 syms[n].name, FALSE, FALSE, TRUE);
5d3236ee
DK
687 if (!blhe)
688 {
3355cb3b
L
689 /* The plugin is called to claim symbols in an archive element
690 from plugin_object_p. But those symbols aren't needed to
691 create output. They are defined and referenced only within
692 IR. */
693 switch (syms[n].def)
694 {
695 default:
696 abort ();
697 case LDPK_UNDEF:
698 case LDPK_WEAKUNDEF:
699 res = LDPR_UNDEF;
700 break;
701 case LDPK_DEF:
702 case LDPK_WEAKDEF:
703 case LDPK_COMMON:
704 res = LDPR_PREVAILING_DEF_IRONLY;
705 break;
706 }
1715a13c 707 goto report_symbol;
5d3236ee
DK
708 }
709
710 /* Determine resolution from blhe type and symbol's original type. */
711 if (blhe->type == bfd_link_hash_undefined
f84854b6 712 || blhe->type == bfd_link_hash_undefweak)
5d3236ee 713 {
69ee6ab2 714 res = LDPR_UNDEF;
1715a13c 715 goto report_symbol;
5d3236ee
DK
716 }
717 if (blhe->type != bfd_link_hash_defined
f84854b6
L
718 && blhe->type != bfd_link_hash_defweak
719 && blhe->type != bfd_link_hash_common)
5d3236ee
DK
720 {
721 /* We should not have a new, indirect or warning symbol here. */
ea360572 722 einfo ("%P%F: %s: plugin symbol table corrupt (sym type %d)\n",
f84854b6 723 called_plugin->name, blhe->type);
5d3236ee
DK
724 }
725
42a851a9
DK
726 /* Find out which section owns the symbol. Since it's not undef,
727 it must have an owner; if it's not a common symbol, both defs
728 and weakdefs keep it in the same place. */
9e2278f5
AM
729 owner_sec = (blhe->type == bfd_link_hash_common
730 ? blhe->u.c.p->section
731 : blhe->u.def.section);
42a851a9 732
5d3236ee
DK
733
734 /* If it was originally undefined or common, then it has been
f84854b6
L
735 resolved; determine how. */
736 if (syms[n].def == LDPK_UNDEF
737 || syms[n].def == LDPK_WEAKUNDEF
5d3236ee
DK
738 || syms[n].def == LDPK_COMMON)
739 {
5d3236ee 740 if (owner_sec->owner == link_info.output_bfd)
69ee6ab2 741 res = LDPR_RESOLVED_EXEC;
5d3236ee 742 else if (owner_sec->owner == abfd)
69ee6ab2 743 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee 744 else if (is_ir_dummy_bfd (owner_sec->owner))
69ee6ab2 745 res = LDPR_RESOLVED_IR;
cc322803
L
746 else if (owner_sec->owner != NULL
747 && (owner_sec->owner->flags & DYNAMIC) != 0)
69ee6ab2 748 res = LDPR_RESOLVED_DYN;
5d3236ee 749 else
69ee6ab2 750 res = LDPR_RESOLVED_EXEC;
5d3236ee
DK
751 }
752
753 /* Was originally def, or weakdef. Does it prevail? If the
f84854b6 754 owner is the original dummy bfd that supplied it, then this
5d3236ee 755 is the definition that has prevailed. */
69ee6ab2
AM
756 else if (owner_sec->owner == link_info.output_bfd)
757 res = LDPR_PREEMPTED_REG;
42a851a9 758 else if (owner_sec->owner == abfd)
69ee6ab2 759 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee
DK
760
761 /* Was originally def, weakdef, or common, but has been pre-empted. */
69ee6ab2
AM
762 else if (is_ir_dummy_bfd (owner_sec->owner))
763 res = LDPR_PREEMPTED_IR;
764 else
765 res = LDPR_PREEMPTED_REG;
766
767 if (res == LDPR_PREVAILING_DEF_IRONLY)
768 {
769 /* We need to know if the sym is referenced from non-IR files. Or
770 even potentially-referenced, perhaps in a future final link if
771 this is a partial one, perhaps dynamically at load-time if the
772 symbol is externally visible. */
773 if (blhe->non_ir_ref)
774 res = LDPR_PREVAILING_DEF;
9bbc1a67 775 else if (is_visible_from_outside (&syms[n], blhe))
69ee6ab2
AM
776 res = def_ironly_exp;
777 }
1715a13c 778
9e2278f5 779 report_symbol:
69ee6ab2 780 syms[n].resolution = res;
1715a13c 781 if (report_plugin_symbols)
9e2278f5
AM
782 einfo (_("%P: %B: symbol `%s' "
783 "definition: %d, visibility: %d, resolution: %d\n"),
784 abfd, syms[n].name,
69ee6ab2 785 syms[n].def, syms[n].visibility, res);
5d3236ee
DK
786 }
787 return LDPS_OK;
788}
789
69ee6ab2
AM
790static enum ld_plugin_status
791get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
792{
793 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
794}
795
796static enum ld_plugin_status
797get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
798{
799 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
800}
801
5d3236ee
DK
802/* Add a new (real) input file generated by a plugin. */
803static enum ld_plugin_status
804add_input_file (const char *pathname)
805{
ce875075
AM
806 lang_input_statement_type *is;
807
5d3236ee 808 ASSERT (called_plugin);
ce875075
AM
809 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
810 NULL);
811 if (!is)
5d3236ee 812 return LDPS_ERR;
ce875075 813 is->flags.lto_output = 1;
5d3236ee
DK
814 return LDPS_OK;
815}
816
817/* Add a new (real) library required by a plugin. */
818static enum ld_plugin_status
819add_input_library (const char *pathname)
820{
ce875075
AM
821 lang_input_statement_type *is;
822
5d3236ee 823 ASSERT (called_plugin);
ce875075
AM
824 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
825 NULL);
826 if (!is)
5d3236ee 827 return LDPS_ERR;
ce875075 828 is->flags.lto_output = 1;
5d3236ee
DK
829 return LDPS_OK;
830}
831
832/* Set the extra library path to be used by libraries added via
833 add_input_library. */
834static enum ld_plugin_status
835set_extra_library_path (const char *path)
836{
837 ASSERT (called_plugin);
d4cb7acd 838 ldfile_add_library_path (xstrdup (path), FALSE);
5d3236ee
DK
839 return LDPS_OK;
840}
841
842/* Issue a diagnostic message from a plugin. */
843static enum ld_plugin_status
844message (int level, const char *format, ...)
845{
846 va_list args;
847 va_start (args, format);
848
849 switch (level)
850 {
851 case LDPL_INFO:
852 vfinfo (stdout, format, args, FALSE);
d251c5c4 853 putchar ('\n');
5d3236ee
DK
854 break;
855 case LDPL_WARNING:
45e81354 856 {
e1fa0163
NC
857 char *newfmt = concat ("%P: warning: ", format, "\n",
858 (const char *) NULL);
45e81354 859 vfinfo (stdout, newfmt, args, TRUE);
e1fa0163 860 free (newfmt);
45e81354 861 }
5d3236ee
DK
862 break;
863 case LDPL_FATAL:
864 case LDPL_ERROR:
865 default:
9e2278f5 866 {
e1fa0163
NC
867 char *newfmt = concat (level == LDPL_FATAL ? "%P%F" : "%P%X",
868 ": error: ", format, "\n",
869 (const char *) NULL);
9e2278f5
AM
870 fflush (stdout);
871 vfinfo (stderr, newfmt, args, TRUE);
872 fflush (stderr);
e1fa0163 873 free (newfmt);
9e2278f5 874 }
5d3236ee
DK
875 break;
876 }
877
878 va_end (args);
879 return LDPS_OK;
880}
881
882/* Helper to size leading part of tv array and set it up. */
69ee6ab2 883static void
5d3236ee
DK
884set_tv_header (struct ld_plugin_tv *tv)
885{
886 size_t i;
887
888 /* Version info. */
889 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
890 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
891
5d3236ee
DK
892 for (i = 0; i < tv_header_size; i++)
893 {
894 tv[i].tv_tag = tv_header_tags[i];
895#define TVU(x) tv[i].tv_u.tv_ ## x
896 switch (tv[i].tv_tag)
897 {
f84854b6
L
898 case LDPT_MESSAGE:
899 TVU(message) = message;
900 break;
901 case LDPT_API_VERSION:
902 TVU(val) = LD_PLUGIN_API_VERSION;
903 break;
904 case LDPT_GNU_LD_VERSION:
905 TVU(val) = major * 100 + minor;
906 break;
907 case LDPT_LINKER_OUTPUT:
64d94ba0
AM
908 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
909 : bfd_link_pde (&link_info) ? LDPO_EXEC
910 : bfd_link_pie (&link_info) ? LDPO_PIE
911 : LDPO_DYN);
f84854b6
L
912 break;
913 case LDPT_OUTPUT_NAME:
914 TVU(string) = output_filename;
915 break;
916 case LDPT_REGISTER_CLAIM_FILE_HOOK:
917 TVU(register_claim_file) = register_claim_file;
918 break;
919 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
920 TVU(register_all_symbols_read) = register_all_symbols_read;
921 break;
922 case LDPT_REGISTER_CLEANUP_HOOK:
923 TVU(register_cleanup) = register_cleanup;
924 break;
925 case LDPT_ADD_SYMBOLS:
926 TVU(add_symbols) = add_symbols;
927 break;
928 case LDPT_GET_INPUT_FILE:
929 TVU(get_input_file) = get_input_file;
930 break;
15f7a26b
L
931 case LDPT_GET_VIEW:
932 TVU(get_view) = get_view;
933 break;
f84854b6
L
934 case LDPT_RELEASE_INPUT_FILE:
935 TVU(release_input_file) = release_input_file;
936 break;
937 case LDPT_GET_SYMBOLS:
69ee6ab2
AM
938 TVU(get_symbols) = get_symbols_v1;
939 break;
940 case LDPT_GET_SYMBOLS_V2:
941 TVU(get_symbols) = get_symbols_v2;
f84854b6
L
942 break;
943 case LDPT_ADD_INPUT_FILE:
944 TVU(add_input_file) = add_input_file;
945 break;
946 case LDPT_ADD_INPUT_LIBRARY:
947 TVU(add_input_library) = add_input_library;
948 break;
949 case LDPT_SET_EXTRA_LIBRARY_PATH:
950 TVU(set_extra_library_path) = set_extra_library_path;
951 break;
952 default:
953 /* Added a new entry to the array without adding
954 a new case to set up its value is a bug. */
955 FAIL ();
5d3236ee
DK
956 }
957#undef TVU
958 }
5d3236ee
DK
959}
960
961/* Append the per-plugin args list and trailing LDPT_NULL to tv. */
962static void
963set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
964{
965 plugin_arg_t *arg = plugin->args;
966 while (arg)
967 {
968 tv->tv_tag = LDPT_OPTION;
969 tv->tv_u.tv_string = arg->arg;
970 arg = arg->next;
971 tv++;
972 }
973 tv->tv_tag = LDPT_NULL;
974 tv->tv_u.tv_val = 0;
975}
976
977/* Load up and initialise all plugins after argument parsing. */
d82184d7 978void
d44ad554 979plugin_load_plugins (void)
5d3236ee
DK
980{
981 struct ld_plugin_tv *my_tv;
982 unsigned int max_args = 0;
983 plugin_t *curplug = plugins_list;
984
985 /* If there are no plugins, we need do nothing this run. */
986 if (!curplug)
d82184d7 987 return;
5d3236ee
DK
988
989 /* First pass over plugins to find max # args needed so that we
990 can size and allocate the tv array. */
991 while (curplug)
992 {
993 if (curplug->n_args > max_args)
994 max_args = curplug->n_args;
995 curplug = curplug->next;
996 }
997
998 /* Allocate tv array and initialise constant part. */
999 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1000 set_tv_header (my_tv);
1001
1002 /* Pass over plugins again, activating them. */
1003 curplug = plugins_list;
1004 while (curplug)
1005 {
1006 enum ld_plugin_status rv;
a8f9d13e
AM
1007 ld_plugin_onload onloadfn;
1008
1009 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
5d3236ee 1010 if (!onloadfn)
a8f9d13e 1011 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
5d3236ee 1012 if (!onloadfn)
d82184d7
L
1013 einfo (_("%P%F: %s: error loading plugin: %s\n"),
1014 curplug->name, dlerror ());
5d3236ee
DK
1015 set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1016 called_plugin = curplug;
1017 rv = (*onloadfn) (my_tv);
1018 called_plugin = NULL;
1019 if (rv != LDPS_OK)
d82184d7 1020 einfo (_("%P%F: %s: plugin error: %d\n"), curplug->name, rv);
5d3236ee
DK
1021 curplug = curplug->next;
1022 }
1023
1024 /* Since plugin(s) inited ok, assume they're going to want symbol
1025 resolutions, which needs us to track which symbols are referenced
1026 by non-IR files using the linker's notice callback. */
9e2278f5
AM
1027 orig_notice_all = link_info.notice_all;
1028 orig_callbacks = link_info.callbacks;
1029 plugin_callbacks = *orig_callbacks;
1030 plugin_callbacks.notice = &plugin_notice;
5d3236ee 1031 link_info.notice_all = TRUE;
61f41c3c 1032 link_info.lto_plugin_active = TRUE;
9e2278f5 1033 link_info.callbacks = &plugin_callbacks;
38604796 1034
5ae0078c
L
1035 register_ld_plugin_object_p (plugin_object_p);
1036
38604796 1037#if HAVE_MMAP && HAVE_GETPAGESIZE
fd5a1509 1038 plugin_pagesize = getpagesize ();
38604796 1039#endif
5d3236ee
DK
1040}
1041
1042/* Call 'claim file' hook for all plugins. */
02d00247 1043static int
5d3236ee
DK
1044plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed)
1045{
1046 plugin_t *curplug = plugins_list;
1047 *claimed = FALSE;
5d3236ee
DK
1048 while (curplug && !*claimed)
1049 {
1050 if (curplug->claim_file_handler)
1051 {
1052 enum ld_plugin_status rv;
1053 called_plugin = curplug;
1054 rv = (*curplug->claim_file_handler) (file, claimed);
1055 called_plugin = NULL;
1056 if (rv != LDPS_OK)
1057 set_plugin_error (curplug->name);
1058 }
1059 curplug = curplug->next;
1060 }
1061 return plugin_error_p () ? -1 : 0;
1062}
1063
35a1e5f3
L
1064/* Duplicates a character string with memory attached to ABFD. */
1065
1066static char *
1067plugin_strdup (bfd *abfd, const char *str)
1068{
1069 size_t strlength;
1070 char *copy;
1071 strlength = strlen (str) + 1;
1072 copy = bfd_alloc (abfd, strlength);
1073 if (copy == NULL)
1074 einfo (_("%P%F: plugin_strdup failed to allocate memory: %s\n"),
1075 bfd_get_error ());
1076 memcpy (copy, str, strlength);
1077 return copy;
1078}
1079
5ae0078c
L
1080static const bfd_target *
1081plugin_object_p (bfd *ibfd)
02d00247 1082{
5ae0078c 1083 int claimed;
f4b78d18 1084 plugin_input_file_t *input;
35a1e5f3
L
1085 struct ld_plugin_input_file file;
1086 bfd *abfd;
5ae0078c
L
1087
1088 /* Don't try the dummy object file. */
1089 if ((ibfd->flags & BFD_PLUGIN) != 0)
1090 return NULL;
1091
49f30d83 1092 if (ibfd->plugin_format != bfd_plugin_unknown)
5ae0078c
L
1093 {
1094 if (ibfd->plugin_format == bfd_plugin_yes)
1095 return ibfd->plugin_dummy_bfd->xvec;
1096 else
1097 return NULL;
1098 }
1099
02d00247
AM
1100 /* We create a dummy BFD, initially empty, to house whatever symbols
1101 the plugin may want to add. */
35a1e5f3 1102 abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd);
f4b78d18
L
1103
1104 input = bfd_alloc (abfd, sizeof (*input));
1105 if (input == NULL)
1106 einfo (_("%P%F: plugin failed to allocate memory for input: %s\n"),
1107 bfd_get_error ());
1108
7d0b9ebc
AM
1109 if (!bfd_plugin_open_input (ibfd, &file))
1110 return NULL;
35a1e5f3 1111
7d0b9ebc
AM
1112 if (file.name == ibfd->filename)
1113 {
35a1e5f3
L
1114 /* We must copy filename attached to ibfd if it is not an archive
1115 member since it may be freed by bfd_close below. */
7d0b9ebc 1116 file.name = plugin_strdup (abfd, file.name);
35a1e5f3
L
1117 }
1118
35a1e5f3 1119 file.handle = input;
7d0b9ebc
AM
1120 /* The plugin API expects that the file descriptor won't be closed
1121 and reused as done by the bfd file cache. So dup one. */
1122 file.fd = dup (file.fd);
1123 if (file.fd < 0)
1124 return NULL;
35a1e5f3 1125
f4b78d18 1126 input->abfd = abfd;
2aec968d
L
1127 input->view_buffer.addr = NULL;
1128 input->view_buffer.filesize = 0;
1129 input->view_buffer.offset = 0;
7d0b9ebc 1130 input->fd = file.fd;
d319a098 1131 input->use_mmap = FALSE;
7d0b9ebc
AM
1132 input->offset = file.offset;
1133 input->filesize = file.filesize;
35a1e5f3 1134 input->name = plugin_strdup (abfd, ibfd->filename);
f4b78d18 1135
5ae0078c
L
1136 claimed = 0;
1137
35a1e5f3 1138 if (plugin_call_claim_file (&file, &claimed))
02d00247
AM
1139 einfo (_("%P%F: %s: plugin reported error claiming file\n"),
1140 plugin_error_plugin ());
f4b78d18 1141
7d0b9ebc 1142 if (input->fd != -1 && !bfd_plugin_target_p (ibfd->xvec))
f4b78d18 1143 {
5ae0078c
L
1144 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which
1145 doesn't need fd after plugin_call_claim_file, doesn't use
1146 BFD plugin target vector. Since GCC plugin doesn't call
1147 release_input_file, we close it here. LLVM plugin, which
1148 needs fd after plugin_call_claim_file and calls
1149 release_input_file after it is done, uses BFD plugin target
1150 vector. This scheme doesn't work when a plugin needs fd and
1151 doesn't use BFD plugin target vector neither. */
7d0b9ebc 1152 close (input->fd);
f4b78d18
L
1153 input->fd = -1;
1154 }
1155
02d00247
AM
1156 if (claimed)
1157 {
5ae0078c
L
1158 ibfd->plugin_format = bfd_plugin_yes;
1159 ibfd->plugin_dummy_bfd = abfd;
35a1e5f3 1160 bfd_make_readable (abfd);
5ae0078c 1161 return abfd->xvec;
02d00247
AM
1162 }
1163 else
1164 {
38604796
L
1165#if HAVE_MMAP
1166 if (input->use_mmap)
1167 {
1168 /* If plugin didn't claim the file, unmap the buffer. */
1169 char *addr = input->view_buffer.addr;
1170 off_t size = input->view_buffer.filesize;
1171# if HAVE_GETPAGESIZE
1172 off_t bias = input->view_buffer.offset % plugin_pagesize;
1173 size += bias;
1174 addr -= bias;
1175# endif
1176 munmap (addr, size);
1177 }
1178#endif
1179
02d00247
AM
1180 /* If plugin didn't claim the file, we don't need the dummy bfd.
1181 Can't avoid speculatively creating it, alas. */
5ae0078c 1182 ibfd->plugin_format = bfd_plugin_no;
f4b78d18 1183 bfd_close_all_done (abfd);
5ae0078c
L
1184 return NULL;
1185 }
1186}
1187
1188void
1189plugin_maybe_claim (lang_input_statement_type *entry)
1190{
1191 if (plugin_object_p (entry->the_bfd))
1192 {
1193 bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1194
1195 /* Discard the real file's BFD and substitute the dummy one. */
1196
b0cffb47
AM
1197 /* We can't call bfd_close on archives. BFD archive handling
1198 caches elements, and add_archive_element keeps pointers to
1199 the_bfd and the_bfd->filename in a lang_input_statement_type
1200 linker script statement. */
5ae0078c
L
1201 if (entry->the_bfd->my_archive == NULL)
1202 bfd_close (entry->the_bfd);
1203 entry->the_bfd = abfd;
1204 entry->flags.claimed = 1;
02d00247
AM
1205 }
1206}
1207
5d3236ee
DK
1208/* Call 'all symbols read' hook for all plugins. */
1209int
1210plugin_call_all_symbols_read (void)
1211{
1212 plugin_t *curplug = plugins_list;
1213
1214 /* Disable any further file-claiming. */
1215 no_more_claiming = TRUE;
1216
5d3236ee
DK
1217 while (curplug)
1218 {
1219 if (curplug->all_symbols_read_handler)
1220 {
1221 enum ld_plugin_status rv;
1222 called_plugin = curplug;
1223 rv = (*curplug->all_symbols_read_handler) ();
1224 called_plugin = NULL;
1225 if (rv != LDPS_OK)
1226 set_plugin_error (curplug->name);
1227 }
1228 curplug = curplug->next;
1229 }
1230 return plugin_error_p () ? -1 : 0;
1231}
1232
e73d965c 1233/* Call 'cleanup' hook for all plugins at exit. */
498cd2a0 1234void
5d3236ee
DK
1235plugin_call_cleanup (void)
1236{
1237 plugin_t *curplug = plugins_list;
1238 while (curplug)
1239 {
1240 if (curplug->cleanup_handler && !curplug->cleanup_done)
1241 {
1242 enum ld_plugin_status rv;
1243 curplug->cleanup_done = TRUE;
1244 called_plugin = curplug;
1245 rv = (*curplug->cleanup_handler) ();
1246 called_plugin = NULL;
1247 if (rv != LDPS_OK)
d82184d7
L
1248 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1249 curplug->name, rv);
5d3236ee
DK
1250 dlclose (curplug->dlhandle);
1251 }
1252 curplug = curplug->next;
1253 }
5d3236ee
DK
1254}
1255
5d3236ee
DK
1256/* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1257 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
35ed3f94
AM
1258 the linker adds them to the linker hash table. Mark those
1259 referenced from a non-IR file with non_ir_ref. We have to
1260 notice_all symbols, because we won't necessarily know until later
1261 which ones will be contributed by IR files. */
9e2278f5
AM
1262static bfd_boolean
1263plugin_notice (struct bfd_link_info *info,
35ed3f94 1264 struct bfd_link_hash_entry *h,
46135103 1265 struct bfd_link_hash_entry *inh,
9e2278f5
AM
1266 bfd *abfd,
1267 asection *section,
16d96b5b 1268 bfd_vma value,
46135103 1269 flagword flags)
5d3236ee 1270{
46135103
AM
1271 struct bfd_link_hash_entry *orig_h = h;
1272
35ed3f94 1273 if (h != NULL)
5d3236ee 1274 {
cd6eee13
AM
1275 bfd *sym_bfd;
1276
46135103
AM
1277 if (h->type == bfd_link_hash_warning)
1278 h = h->u.i.link;
1279
4a2b04a7 1280 /* Nothing to do here if this def/ref is from an IR dummy BFD. */
9e2278f5 1281 if (is_ir_dummy_bfd (abfd))
4a2b04a7 1282 ;
9e2278f5 1283
16d96b5b
AM
1284 /* Making an indirect symbol counts as a reference unless this
1285 is a brand new symbol. */
4a2b04a7
L
1286 else if (bfd_is_ind_section (section)
1287 || (flags & BSF_INDIRECT) != 0)
16d96b5b 1288 {
46135103
AM
1289 /* ??? Some of this is questionable. See comments in
1290 _bfd_generic_link_add_one_symbol for case IND. */
16d96b5b
AM
1291 if (h->type != bfd_link_hash_new)
1292 {
16d96b5b 1293 h->non_ir_ref = TRUE;
46135103 1294 inh->non_ir_ref = TRUE;
16d96b5b 1295 }
46135103
AM
1296 else if (inh->type == bfd_link_hash_new)
1297 inh->non_ir_ref = TRUE;
16d96b5b
AM
1298 }
1299
1300 /* Nothing to do here for warning symbols. */
1301 else if ((flags & BSF_WARNING) != 0)
1302 ;
1303
1304 /* Nothing to do here for constructor symbols. */
1305 else if ((flags & BSF_CONSTRUCTOR) != 0)
1306 ;
1307
35ed3f94 1308 /* If this is a ref, set non_ir_ref. */
16d96b5b 1309 else if (bfd_is_und_section (section))
3d5bef4c
L
1310 {
1311 /* Replace the undefined dummy bfd with the real one. */
1312 if ((h->type == bfd_link_hash_undefined
1313 || h->type == bfd_link_hash_undefweak)
46fed7f7
SL
1314 && (h->u.undef.abfd == NULL
1315 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
3d5bef4c
L
1316 h->u.undef.abfd = abfd;
1317 h->non_ir_ref = TRUE;
1318 }
35ed3f94 1319
0616a280
AM
1320 /* Otherwise, it must be a new def. */
1321 else
cd6eee13 1322 {
0616a280
AM
1323 /* A common symbol should be merged with other commons or
1324 defs with the same name. In particular, a common ought
1325 to be overridden by a def in a -flto object. In that
1326 sense a common is also a ref. */
1327 if (bfd_is_com_section (section))
1328 h->non_ir_ref = TRUE;
1329
1330 /* Ensure any symbol defined in an IR dummy BFD takes on a
1331 new value from a real BFD. Weak symbols are not normally
1332 overridden by a new weak definition, and strong symbols
1333 will normally cause multiple definition errors. Avoid
1334 this by making the symbol appear to be undefined. */
1335 if (((h->type == bfd_link_hash_defweak
1336 || h->type == bfd_link_hash_defined)
1337 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1338 || (h->type == bfd_link_hash_common
1339 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))
1340 {
1341 h->type = bfd_link_hash_undefweak;
1342 h->u.undef.abfd = sym_bfd;
1343 }
cd6eee13 1344 }
5d3236ee
DK
1345 }
1346
1347 /* Continue with cref/nocrossref/trace-sym processing. */
46135103 1348 if (orig_h == NULL
9e2278f5
AM
1349 || orig_notice_all
1350 || (info->notice_hash != NULL
46135103 1351 && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
35ed3f94 1352 FALSE, FALSE) != NULL))
46135103
AM
1353 return (*orig_callbacks->notice) (info, orig_h, inh,
1354 abfd, section, value, flags);
5d3236ee
DK
1355 return TRUE;
1356}