]>
Commit | Line | Data |
---|---|---|
5d3236ee | 1 | /* Plugin control for the GNU linker. |
fd67aa11 | 2 | Copyright (C) 2010-2024 Free Software Foundation, Inc. |
5d3236ee DK |
3 | |
4 | This file is part of the GNU Binutils. | |
5 | ||
6 | This program is free software; you can redistribute it and/or modify | |
7 | it under the terms of the GNU General Public License as published by | |
8 | the Free Software Foundation; either version 3 of the License, or | |
9 | (at your option) any later version. | |
10 | ||
11 | This program is distributed in the hope that it will be useful, | |
12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | GNU General Public License for more details. | |
15 | ||
16 | You should have received a copy of the GNU General Public License | |
17 | along with this program; if not, write to the Free Software | |
18 | Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, | |
19 | MA 02110-1301, USA. */ | |
20 | ||
21 | #include "sysdep.h" | |
22 | #include "libiberty.h" | |
23 | #include "bfd.h" | |
0381901e | 24 | #if BFD_SUPPORTS_PLUGINS |
5d3236ee DK |
25 | #include "bfdlink.h" |
26 | #include "bfdver.h" | |
1ff6de03 | 27 | #include "ctf-api.h" |
5d3236ee DK |
28 | #include "ld.h" |
29 | #include "ldmain.h" | |
30 | #include "ldmisc.h" | |
31 | #include "ldexp.h" | |
32 | #include "ldlang.h" | |
33 | #include "ldfile.h" | |
7d0b9ebc | 34 | #include "plugin-api.h" |
5ae0078c | 35 | #include "../bfd/plugin.h" |
5d3236ee | 36 | #include "plugin.h" |
5d3236ee | 37 | #include "elf-bfd.h" |
2aec968d L |
38 | #if HAVE_MMAP |
39 | # include <sys/mman.h> | |
40 | # ifndef MAP_FAILED | |
41 | # define MAP_FAILED ((void *) -1) | |
42 | # endif | |
43 | # ifndef PROT_READ | |
44 | # define PROT_READ 0 | |
45 | # endif | |
46 | # ifndef MAP_PRIVATE | |
47 | # define MAP_PRIVATE 0 | |
48 | # endif | |
49 | #endif | |
f4b78d18 L |
50 | #include <errno.h> |
51 | #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO)) | |
52 | extern int errno; | |
53 | #endif | |
3055522a AM |
54 | #if defined (HAVE_DLFCN_H) |
55 | #include <dlfcn.h> | |
56 | #elif defined (HAVE_WINDOWS_H) | |
f31d24a0 | 57 | #include <windows.h> |
3917d5d5 | 58 | #endif |
5d3236ee | 59 | |
1715a13c | 60 | /* Report plugin symbols. */ |
f38a2680 | 61 | bool report_plugin_symbols; |
1715a13c | 62 | |
5d3236ee DK |
63 | /* The suffix to append to the name of the real (claimed) object file |
64 | when generating a dummy BFD to hold the IR symbols sent from the | |
cf4dc96f DK |
65 | plugin. For cosmetic use only; appears in maps, crefs etc. */ |
66 | #define IRONLY_SUFFIX " (symbol from plugin)" | |
5d3236ee DK |
67 | |
68 | /* Stores a single argument passed to a plugin. */ | |
69 | typedef struct plugin_arg | |
70 | { | |
71 | struct plugin_arg *next; | |
72 | const char *arg; | |
73 | } plugin_arg_t; | |
74 | ||
75 | /* Holds all details of a single plugin. */ | |
76 | typedef struct plugin | |
77 | { | |
78 | /* Next on the list of plugins, or NULL at end of chain. */ | |
79 | struct plugin *next; | |
80 | /* The argument string given to --plugin. */ | |
81 | const char *name; | |
82 | /* The shared library handle returned by dlopen. */ | |
83 | void *dlhandle; | |
84 | /* The list of argument string given to --plugin-opt. */ | |
85 | plugin_arg_t *args; | |
86 | /* Number of args in the list, for convenience. */ | |
87 | size_t n_args; | |
88 | /* The plugin's event handlers. */ | |
89 | ld_plugin_claim_file_handler claim_file_handler; | |
b21318bd | 90 | ld_plugin_claim_file_handler_v2 claim_file_handler_v2; |
5d3236ee DK |
91 | ld_plugin_all_symbols_read_handler all_symbols_read_handler; |
92 | ld_plugin_cleanup_handler cleanup_handler; | |
93 | /* TRUE if the cleanup handlers have been called. */ | |
f38a2680 | 94 | bool cleanup_done; |
5d3236ee DK |
95 | } plugin_t; |
96 | ||
2aec968d L |
97 | typedef struct view_buffer |
98 | { | |
99 | char *addr; | |
100 | size_t filesize; | |
101 | off_t offset; | |
102 | } view_buffer_t; | |
103 | ||
f4b78d18 L |
104 | /* The internal version of struct ld_plugin_input_file with a BFD |
105 | pointer. */ | |
106 | typedef struct plugin_input_file | |
107 | { | |
7a30ac44 | 108 | /* The dummy BFD. */ |
f4b78d18 | 109 | bfd *abfd; |
7a30ac44 | 110 | /* The original input BFD. Non-NULL if it is an archive member. */ |
91817247 | 111 | bfd *ibfd; |
2aec968d | 112 | view_buffer_t view_buffer; |
f4b78d18 L |
113 | char *name; |
114 | int fd; | |
f38a2680 | 115 | bool use_mmap; |
f4b78d18 L |
116 | off_t offset; |
117 | off_t filesize; | |
118 | } plugin_input_file_t; | |
119 | ||
5d3236ee DK |
120 | /* The master list of all plugins. */ |
121 | static plugin_t *plugins_list = NULL; | |
122 | ||
123 | /* We keep a tail pointer for easy linking on the end. */ | |
124 | static plugin_t **plugins_tail_chain_ptr = &plugins_list; | |
125 | ||
126 | /* The last plugin added to the list, for receiving args. */ | |
127 | static plugin_t *last_plugin = NULL; | |
128 | ||
129 | /* The tail of the arg chain of the last plugin added to the list. */ | |
130 | static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL; | |
131 | ||
132 | /* The plugin which is currently having a callback executed. */ | |
133 | static plugin_t *called_plugin = NULL; | |
134 | ||
135 | /* Last plugin to cause an error, if any. */ | |
136 | static const char *error_plugin = NULL; | |
137 | ||
24f58f47 | 138 | /* State of linker "notice" interface before we poked at it. */ |
f38a2680 | 139 | static bool orig_notice_all; |
9e2278f5 AM |
140 | |
141 | /* Original linker callbacks, and the plugin version. */ | |
142 | static const struct bfd_link_callbacks *orig_callbacks; | |
143 | static struct bfd_link_callbacks plugin_callbacks; | |
144 | ||
5d3236ee DK |
145 | /* Set at all symbols read time, to avoid recursively offering the plugin |
146 | its own newly-added input files and libs to claim. */ | |
f38a2680 | 147 | bool no_more_claiming = false; |
5d3236ee | 148 | |
38604796 L |
149 | #if HAVE_MMAP && HAVE_GETPAGESIZE |
150 | /* Page size used by mmap. */ | |
151 | static off_t plugin_pagesize; | |
152 | #endif | |
153 | ||
5d3236ee DK |
154 | /* List of tags to set in the constant leading part of the tv array. */ |
155 | static const enum ld_plugin_tag tv_header_tags[] = | |
156 | { | |
157 | LDPT_MESSAGE, | |
158 | LDPT_API_VERSION, | |
159 | LDPT_GNU_LD_VERSION, | |
160 | LDPT_LINKER_OUTPUT, | |
161 | LDPT_OUTPUT_NAME, | |
162 | LDPT_REGISTER_CLAIM_FILE_HOOK, | |
b21318bd | 163 | LDPT_REGISTER_CLAIM_FILE_HOOK_V2, |
5d3236ee DK |
164 | LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK, |
165 | LDPT_REGISTER_CLEANUP_HOOK, | |
166 | LDPT_ADD_SYMBOLS, | |
167 | LDPT_GET_INPUT_FILE, | |
15f7a26b | 168 | LDPT_GET_VIEW, |
5d3236ee DK |
169 | LDPT_RELEASE_INPUT_FILE, |
170 | LDPT_GET_SYMBOLS, | |
69ee6ab2 | 171 | LDPT_GET_SYMBOLS_V2, |
5d3236ee DK |
172 | LDPT_ADD_INPUT_FILE, |
173 | LDPT_ADD_INPUT_LIBRARY, | |
174 | LDPT_SET_EXTRA_LIBRARY_PATH | |
175 | }; | |
176 | ||
177 | /* How many entries in the constant leading part of the tv array. */ | |
178 | static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags); | |
179 | ||
9e2278f5 | 180 | /* Forward references. */ |
f38a2680 AM |
181 | static bool plugin_notice (struct bfd_link_info *, |
182 | struct bfd_link_hash_entry *, | |
183 | struct bfd_link_hash_entry *, | |
184 | bfd *, asection *, bfd_vma, flagword); | |
9e2278f5 | 185 | |
b21318bd | 186 | static bfd_cleanup plugin_object_p (bfd *, bool); |
5ae0078c | 187 | |
3917d5d5 DK |
188 | #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) |
189 | ||
190 | #define RTLD_NOW 0 /* Dummy value. */ | |
191 | ||
192 | static void * | |
193 | dlopen (const char *file, int mode ATTRIBUTE_UNUSED) | |
194 | { | |
195 | return LoadLibrary (file); | |
196 | } | |
197 | ||
198 | static void * | |
199 | dlsym (void *handle, const char *name) | |
200 | { | |
201 | return GetProcAddress (handle, name); | |
202 | } | |
203 | ||
204 | static int | |
205 | dlclose (void *handle) | |
206 | { | |
207 | FreeLibrary (handle); | |
208 | return 0; | |
209 | } | |
210 | ||
211 | #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */ | |
212 | ||
d82184d7 L |
213 | #ifndef HAVE_DLFCN_H |
214 | static const char * | |
215 | dlerror (void) | |
216 | { | |
217 | return ""; | |
218 | } | |
219 | #endif | |
220 | ||
5d3236ee DK |
221 | /* Helper function for exiting with error status. */ |
222 | static int | |
223 | set_plugin_error (const char *plugin) | |
224 | { | |
225 | error_plugin = plugin; | |
226 | return -1; | |
227 | } | |
228 | ||
229 | /* Test if an error occurred. */ | |
f38a2680 | 230 | static bool |
5d3236ee DK |
231 | plugin_error_p (void) |
232 | { | |
233 | return error_plugin != NULL; | |
234 | } | |
235 | ||
236 | /* Return name of plugin which caused an error if any. */ | |
d44ad554 DK |
237 | const char * |
238 | plugin_error_plugin (void) | |
5d3236ee DK |
239 | { |
240 | return error_plugin ? error_plugin : _("<no plugin>"); | |
241 | } | |
242 | ||
243 | /* Handle -plugin arg: find and load plugin, or return error. */ | |
d82184d7 | 244 | void |
d44ad554 | 245 | plugin_opt_plugin (const char *plugin) |
5d3236ee DK |
246 | { |
247 | plugin_t *newplug; | |
c3e1c28e | 248 | plugin_t *curplug = plugins_list; |
5d3236ee DK |
249 | |
250 | newplug = xmalloc (sizeof *newplug); | |
251 | memset (newplug, 0, sizeof *newplug); | |
252 | newplug->name = plugin; | |
253 | newplug->dlhandle = dlopen (plugin, RTLD_NOW); | |
254 | if (!newplug->dlhandle) | |
df5f2391 | 255 | einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ()); |
5d3236ee | 256 | |
c3e1c28e L |
257 | /* Check if plugin has been loaded already. */ |
258 | while (curplug) | |
259 | { | |
260 | if (newplug->dlhandle == curplug->dlhandle) | |
261 | { | |
262 | einfo (_("%P: %s: duplicated plugin\n"), plugin); | |
263 | free (newplug); | |
264 | return; | |
265 | } | |
266 | curplug = curplug->next; | |
267 | } | |
268 | ||
5d3236ee DK |
269 | /* Chain on end, so when we run list it is in command-line order. */ |
270 | *plugins_tail_chain_ptr = newplug; | |
271 | plugins_tail_chain_ptr = &newplug->next; | |
272 | ||
273 | /* Record it as current plugin for receiving args. */ | |
274 | last_plugin = newplug; | |
275 | last_plugin_args_tail_chain_ptr = &newplug->args; | |
5d3236ee DK |
276 | } |
277 | ||
278 | /* Accumulate option arguments for last-loaded plugin, or return | |
279 | error if none. */ | |
d44ad554 DK |
280 | int |
281 | plugin_opt_plugin_arg (const char *arg) | |
5d3236ee DK |
282 | { |
283 | plugin_arg_t *newarg; | |
284 | ||
285 | if (!last_plugin) | |
286 | return set_plugin_error (_("<no plugin>")); | |
287 | ||
97964ab3 AM |
288 | /* Ignore -pass-through= from GCC driver. */ |
289 | if (*arg == '-') | |
290 | { | |
291 | const char *p = arg + 1; | |
292 | ||
293 | if (*p == '-') | |
294 | ++p; | |
295 | if (strncmp (p, "pass-through=", 13) == 0) | |
296 | return 0; | |
297 | } | |
298 | ||
5d3236ee DK |
299 | newarg = xmalloc (sizeof *newarg); |
300 | newarg->arg = arg; | |
301 | newarg->next = NULL; | |
302 | ||
303 | /* Chain on end to preserve command-line order. */ | |
304 | *last_plugin_args_tail_chain_ptr = newarg; | |
305 | last_plugin_args_tail_chain_ptr = &newarg->next; | |
306 | last_plugin->n_args++; | |
307 | return 0; | |
308 | } | |
309 | ||
37a3056a L |
310 | /* Generate a dummy BFD to represent an IR file, for any callers of |
311 | plugin_call_claim_file to use as the handle in the ld_plugin_input_file | |
312 | struct that they build to pass in. The BFD is initially writable, so | |
313 | that symbols can be added to it; it must be made readable after the | |
314 | add_symbols hook has been called so that it can be read when linking. */ | |
315 | static bfd * | |
5d3236ee DK |
316 | plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate) |
317 | { | |
bc110b6e | 318 | bfd *abfd; |
f38a2680 | 319 | bool bfd_plugin_target; |
bc110b6e AM |
320 | |
321 | bfd_use_reserved_id = 1; | |
4a07dc81 | 322 | bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec); |
9e2278f5 | 323 | abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL), |
4a07dc81 | 324 | bfd_plugin_target ? link_info.output_bfd : srctemplate); |
9e2278f5 AM |
325 | if (abfd != NULL) |
326 | { | |
327 | abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN; | |
5ae0078c L |
328 | if (!bfd_make_writable (abfd)) |
329 | goto report_error; | |
4a07dc81 | 330 | if (!bfd_plugin_target) |
5ae0078c L |
331 | { |
332 | bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate)); | |
333 | bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate)); | |
334 | if (!bfd_copy_private_bfd_data (srctemplate, abfd)) | |
335 | goto report_error; | |
336 | } | |
9e2278f5 AM |
337 | { |
338 | flagword flags; | |
339 | ||
c77ec726 | 340 | /* Create section to own the symbols. */ |
9e2278f5 AM |
341 | flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY |
342 | | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE); | |
343 | if (bfd_make_section_anyway_with_flags (abfd, ".text", flags)) | |
344 | return abfd; | |
345 | } | |
346 | } | |
dc1e8a47 | 347 | report_error: |
df5f2391 | 348 | einfo (_("%F%P: could not create dummy IR bfd: %E\n")); |
9e2278f5 | 349 | return NULL; |
5d3236ee DK |
350 | } |
351 | ||
d44ad554 | 352 | /* Check if the BFD passed in is an IR dummy object file. */ |
f38a2680 | 353 | static inline bool |
5d3236ee DK |
354 | is_ir_dummy_bfd (const bfd *abfd) |
355 | { | |
cf4dc96f | 356 | /* ABFD can sometimes legitimately be NULL, e.g. when called from one |
23ebe1a0 AM |
357 | of the linker callbacks for a symbol in the *ABS* or *UND* sections. */ |
358 | return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0; | |
5d3236ee DK |
359 | } |
360 | ||
361 | /* Helpers to convert between BFD and GOLD symbol formats. */ | |
362 | static enum ld_plugin_status | |
363 | asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym, | |
f84854b6 | 364 | const struct ld_plugin_symbol *ldsym) |
5d3236ee DK |
365 | { |
366 | flagword flags = BSF_NO_FLAGS; | |
367 | struct bfd_section *section; | |
368 | ||
369 | asym->the_bfd = abfd; | |
f84854b6 | 370 | asym->name = (ldsym->version |
9e2278f5 | 371 | ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL) |
f84854b6 | 372 | : ldsym->name); |
5d3236ee DK |
373 | asym->value = 0; |
374 | switch (ldsym->def) | |
375 | { | |
376 | case LDPK_WEAKDEF: | |
377 | flags = BSF_WEAK; | |
378 | /* FALLTHRU */ | |
379 | case LDPK_DEF: | |
380 | flags |= BSF_GLOBAL; | |
c77ec726 AM |
381 | if (ldsym->comdat_key) |
382 | { | |
383 | char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key, | |
384 | (const char *) NULL); | |
385 | section = bfd_get_section_by_name (abfd, name); | |
386 | if (section != NULL) | |
387 | free (name); | |
388 | else | |
389 | { | |
390 | flagword sflags; | |
391 | ||
392 | sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY | |
393 | | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE | |
394 | | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD); | |
395 | section = bfd_make_section_anyway_with_flags (abfd, name, sflags); | |
396 | if (section == NULL) | |
397 | return LDPS_ERR; | |
398 | } | |
399 | } | |
400 | else | |
401 | section = bfd_get_section_by_name (abfd, ".text"); | |
5d3236ee DK |
402 | break; |
403 | ||
404 | case LDPK_WEAKUNDEF: | |
405 | flags = BSF_WEAK; | |
406 | /* FALLTHRU */ | |
407 | case LDPK_UNDEF: | |
408 | section = bfd_und_section_ptr; | |
409 | break; | |
410 | ||
411 | case LDPK_COMMON: | |
412 | flags = BSF_GLOBAL; | |
413 | section = bfd_com_section_ptr; | |
414 | asym->value = ldsym->size; | |
415 | break; | |
416 | ||
417 | default: | |
418 | return LDPS_ERR; | |
419 | } | |
420 | asym->flags = flags; | |
421 | asym->section = section; | |
422 | ||
5d3236ee DK |
423 | if (bfd_get_flavour (abfd) == bfd_target_elf_flavour) |
424 | { | |
c1229f84 | 425 | elf_symbol_type *elfsym = elf_symbol_from (asym); |
cfac8028 L |
426 | unsigned char visibility; |
427 | ||
5d3236ee | 428 | if (!elfsym) |
df5f2391 | 429 | einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name); |
0410b450 AM |
430 | |
431 | if (ldsym->def == LDPK_COMMON) | |
432 | { | |
433 | elfsym->internal_elf_sym.st_shndx = SHN_COMMON; | |
434 | elfsym->internal_elf_sym.st_value = 1; | |
435 | } | |
436 | ||
cfac8028 L |
437 | switch (ldsym->visibility) |
438 | { | |
439 | default: | |
df5f2391 | 440 | einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"), |
cfac8028 | 441 | ldsym->visibility); |
2b804145 AM |
442 | return LDPS_ERR; |
443 | ||
cfac8028 L |
444 | case LDPV_DEFAULT: |
445 | visibility = STV_DEFAULT; | |
446 | break; | |
447 | case LDPV_PROTECTED: | |
448 | visibility = STV_PROTECTED; | |
449 | break; | |
450 | case LDPV_INTERNAL: | |
451 | visibility = STV_INTERNAL; | |
452 | break; | |
453 | case LDPV_HIDDEN: | |
454 | visibility = STV_HIDDEN; | |
455 | break; | |
456 | } | |
0410b450 | 457 | elfsym->internal_elf_sym.st_other |= visibility; |
5d3236ee DK |
458 | } |
459 | ||
460 | return LDPS_OK; | |
461 | } | |
462 | ||
463 | /* Register a claim-file handler. */ | |
464 | static enum ld_plugin_status | |
465 | register_claim_file (ld_plugin_claim_file_handler handler) | |
466 | { | |
467 | ASSERT (called_plugin); | |
468 | called_plugin->claim_file_handler = handler; | |
469 | return LDPS_OK; | |
470 | } | |
471 | ||
b21318bd JM |
472 | /* Register a claim-file version 2 handler. */ |
473 | static enum ld_plugin_status | |
474 | register_claim_file_v2 (ld_plugin_claim_file_handler_v2 handler) | |
475 | { | |
476 | ASSERT (called_plugin); | |
477 | called_plugin->claim_file_handler_v2 = handler; | |
478 | return LDPS_OK; | |
479 | } | |
480 | ||
5d3236ee DK |
481 | /* Register an all-symbols-read handler. */ |
482 | static enum ld_plugin_status | |
483 | register_all_symbols_read (ld_plugin_all_symbols_read_handler handler) | |
484 | { | |
485 | ASSERT (called_plugin); | |
486 | called_plugin->all_symbols_read_handler = handler; | |
487 | return LDPS_OK; | |
488 | } | |
489 | ||
490 | /* Register a cleanup handler. */ | |
491 | static enum ld_plugin_status | |
492 | register_cleanup (ld_plugin_cleanup_handler handler) | |
493 | { | |
494 | ASSERT (called_plugin); | |
495 | called_plugin->cleanup_handler = handler; | |
496 | return LDPS_OK; | |
497 | } | |
498 | ||
499 | /* Add symbols from a plugin-claimed input file. */ | |
500 | static enum ld_plugin_status | |
501 | add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms) | |
502 | { | |
503 | asymbol **symptrs; | |
f4b78d18 L |
504 | plugin_input_file_t *input = handle; |
505 | bfd *abfd = input->abfd; | |
7fe550fc | 506 | int n; |
43e1669b | 507 | |
5d3236ee | 508 | ASSERT (called_plugin); |
19bfbfa6 AM |
509 | symptrs = bfd_alloc (abfd, nsyms * sizeof *symptrs); |
510 | if (symptrs == NULL) | |
511 | return LDPS_ERR; | |
7fe550fc | 512 | for (n = 0; n < nsyms; n++) |
5d3236ee DK |
513 | { |
514 | enum ld_plugin_status rv; | |
0c511000 AM |
515 | asymbol *bfdsym; |
516 | ||
0c511000 | 517 | bfdsym = bfd_make_empty_symbol (abfd); |
7fe550fc | 518 | symptrs[n] = bfdsym; |
19bfbfa6 AM |
519 | if (bfdsym == NULL) |
520 | return LDPS_ERR; | |
5d3236ee DK |
521 | rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n); |
522 | if (rv != LDPS_OK) | |
523 | return rv; | |
524 | } | |
7fe550fc | 525 | bfd_set_symtab (abfd, symptrs, nsyms); |
5d3236ee DK |
526 | return LDPS_OK; |
527 | } | |
528 | ||
529 | /* Get the input file information with an open (possibly re-opened) | |
530 | file descriptor. */ | |
531 | static enum ld_plugin_status | |
f4b78d18 | 532 | get_input_file (const void *handle, struct ld_plugin_input_file *file) |
5d3236ee | 533 | { |
f4b78d18 L |
534 | const plugin_input_file_t *input = handle; |
535 | ||
5d3236ee | 536 | ASSERT (called_plugin); |
f4b78d18 L |
537 | |
538 | file->name = input->name; | |
539 | file->offset = input->offset; | |
540 | file->filesize = input->filesize; | |
541 | file->handle = (void *) handle; | |
542 | ||
543 | return LDPS_OK; | |
5d3236ee DK |
544 | } |
545 | ||
15f7a26b L |
546 | /* Get view of the input file. */ |
547 | static enum ld_plugin_status | |
f4b78d18 | 548 | get_view (const void *handle, const void **viewp) |
15f7a26b | 549 | { |
2aec968d | 550 | plugin_input_file_t *input = (plugin_input_file_t *) handle; |
f4b78d18 | 551 | char *buffer; |
2aec968d | 552 | size_t size = input->filesize; |
38604796 L |
553 | off_t offset = input->offset; |
554 | #if HAVE_MMAP && HAVE_GETPAGESIZE | |
555 | off_t bias; | |
fe905789 | 556 | #endif |
f4b78d18 | 557 | |
15f7a26b | 558 | ASSERT (called_plugin); |
f4b78d18 | 559 | |
2aec968d L |
560 | /* FIXME: einfo should support %lld. */ |
561 | if ((off_t) size != input->filesize) | |
df5f2391 | 562 | einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"), |
2aec968d | 563 | input->name, (long) input->filesize); |
f4b78d18 | 564 | |
2aec968d L |
565 | /* Check the cached view buffer. */ |
566 | if (input->view_buffer.addr != NULL | |
567 | && input->view_buffer.filesize == size | |
38604796 | 568 | && input->view_buffer.offset == offset) |
2aec968d L |
569 | { |
570 | *viewp = input->view_buffer.addr; | |
571 | return LDPS_OK; | |
572 | } | |
573 | ||
574 | input->view_buffer.filesize = size; | |
38604796 | 575 | input->view_buffer.offset = offset; |
f4b78d18 | 576 | |
2aec968d | 577 | #if HAVE_MMAP |
fe905789 | 578 | # if HAVE_GETPAGESIZE |
38604796 L |
579 | bias = offset % plugin_pagesize; |
580 | offset -= bias; | |
fe905789 L |
581 | size += bias; |
582 | # endif | |
583 | buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset); | |
584 | if (buffer != MAP_FAILED) | |
38604796 | 585 | { |
f38a2680 | 586 | input->use_mmap = true; |
38604796 L |
587 | # if HAVE_GETPAGESIZE |
588 | buffer += bias; | |
b677c456 | 589 | # endif |
38604796 L |
590 | } |
591 | else | |
2aec968d | 592 | #endif |
f4b78d18 | 593 | { |
2aec968d L |
594 | char *p; |
595 | ||
f38a2680 | 596 | input->use_mmap = false; |
38604796 L |
597 | |
598 | if (lseek (input->fd, offset, SEEK_SET) < 0) | |
2aec968d L |
599 | return LDPS_ERR; |
600 | ||
601 | buffer = bfd_alloc (input->abfd, size); | |
602 | if (buffer == NULL) | |
603 | return LDPS_ERR; | |
604 | ||
605 | p = buffer; | |
606 | do | |
f4b78d18 | 607 | { |
2aec968d L |
608 | ssize_t got = read (input->fd, p, size); |
609 | if (got == 0) | |
610 | break; | |
611 | else if (got > 0) | |
612 | { | |
613 | p += got; | |
614 | size -= got; | |
615 | } | |
616 | else if (errno != EINTR) | |
617 | return LDPS_ERR; | |
f4b78d18 | 618 | } |
2aec968d | 619 | while (size > 0); |
f4b78d18 | 620 | } |
2aec968d L |
621 | |
622 | input->view_buffer.addr = buffer; | |
623 | *viewp = buffer; | |
f4b78d18 L |
624 | |
625 | return LDPS_OK; | |
15f7a26b L |
626 | } |
627 | ||
91817247 L |
628 | /* Release plugin file descriptor. */ |
629 | ||
630 | static void | |
631 | release_plugin_file_descriptor (plugin_input_file_t *input) | |
632 | { | |
633 | if (input->fd != -1) | |
634 | { | |
635 | bfd_plugin_close_file_descriptor (input->ibfd, input->fd); | |
636 | input->fd = -1; | |
637 | } | |
638 | } | |
639 | ||
5d3236ee DK |
640 | /* Release the input file. */ |
641 | static enum ld_plugin_status | |
f4b78d18 | 642 | release_input_file (const void *handle) |
5d3236ee | 643 | { |
119d62ff | 644 | plugin_input_file_t *input = (plugin_input_file_t *) handle; |
5d3236ee | 645 | ASSERT (called_plugin); |
91817247 | 646 | release_plugin_file_descriptor (input); |
f4b78d18 | 647 | return LDPS_OK; |
5d3236ee DK |
648 | } |
649 | ||
42a851a9 DK |
650 | /* Return TRUE if a defined symbol might be reachable from outside the |
651 | universe of claimed objects. */ | |
f38a2680 | 652 | static inline bool |
9bbc1a67 | 653 | is_visible_from_outside (struct ld_plugin_symbol *lsym, |
f84854b6 | 654 | struct bfd_link_hash_entry *blhe) |
42a851a9 | 655 | { |
0e1862bb | 656 | if (bfd_link_relocatable (&link_info)) |
f38a2680 | 657 | return true; |
4070765b | 658 | if (blhe->non_ir_ref_dynamic |
59fa66c5 L |
659 | || link_info.export_dynamic |
660 | || bfd_link_dll (&link_info)) | |
42a851a9 | 661 | { |
fd91d419 L |
662 | /* Check if symbol is hidden by version script. */ |
663 | if (bfd_hide_sym_by_version (link_info.version_info, | |
664 | blhe->root.string)) | |
f38a2680 | 665 | return false; |
42a851a9 | 666 | /* Only ELF symbols really have visibility. */ |
fc304b88 | 667 | if (is_elf_hash_table (link_info.hash)) |
42a851a9 DK |
668 | { |
669 | struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe; | |
670 | int vis = ELF_ST_VISIBILITY (el->other); | |
671 | return vis == STV_DEFAULT || vis == STV_PROTECTED; | |
672 | } | |
673 | /* On non-ELF targets, we can safely make inferences by considering | |
f84854b6 | 674 | what visibility the plugin would have liked to apply when it first |
42a851a9 DK |
675 | sent us the symbol. During ELF symbol processing, visibility only |
676 | ever becomes more restrictive, not less, when symbols are merged, | |
677 | so this is a conservative estimate; it may give false positives, | |
678 | declaring something visible from outside when it in fact would | |
679 | not have been, but this will only lead to missed optimisation | |
680 | opportunities during LTRANS at worst; it will not give false | |
681 | negatives, which can lead to the disastrous conclusion that the | |
682 | related symbol is IRONLY. (See GCC PR46319 for an example.) */ | |
cfac8028 L |
683 | return (lsym->visibility == LDPV_DEFAULT |
684 | || lsym->visibility == LDPV_PROTECTED); | |
42a851a9 | 685 | } |
35ed3f94 | 686 | |
f38a2680 | 687 | return false; |
42a851a9 DK |
688 | } |
689 | ||
8e5cb9a5 | 690 | /* Return LTO kind string name that corresponds to IDX enum value. */ |
7ea79cb3 | 691 | static const char * |
8e5cb9a5 | 692 | get_lto_kind (unsigned int idx) |
7ea79cb3 | 693 | { |
694 | static char buffer[64]; | |
695 | const char *lto_kind_str[5] = | |
696 | { | |
697 | "DEF", | |
698 | "WEAKDEF", | |
699 | "UNDEF", | |
700 | "WEAKUNDEF", | |
701 | "COMMON" | |
702 | }; | |
703 | ||
8e5cb9a5 JB |
704 | if (idx < ARRAY_SIZE (lto_kind_str)) |
705 | return lto_kind_str [idx]; | |
7ea79cb3 | 706 | |
8e5cb9a5 | 707 | sprintf (buffer, _("unknown LTO kind value %x"), idx); |
7ea79cb3 | 708 | return buffer; |
709 | } | |
710 | ||
8e5cb9a5 | 711 | /* Return LTO resolution string name that corresponds to IDX enum value. */ |
7ea79cb3 | 712 | static const char * |
8e5cb9a5 | 713 | get_lto_resolution (unsigned int idx) |
7ea79cb3 | 714 | { |
715 | static char buffer[64]; | |
716 | static const char *lto_resolution_str[10] = | |
717 | { | |
718 | "UNKNOWN", | |
719 | "UNDEF", | |
720 | "PREVAILING_DEF", | |
721 | "PREVAILING_DEF_IRONLY", | |
722 | "PREEMPTED_REG", | |
723 | "PREEMPTED_IR", | |
724 | "RESOLVED_IR", | |
725 | "RESOLVED_EXEC", | |
726 | "RESOLVED_DYN", | |
727 | "PREVAILING_DEF_IRONLY_EXP", | |
728 | }; | |
729 | ||
8e5cb9a5 JB |
730 | if (idx < ARRAY_SIZE (lto_resolution_str)) |
731 | return lto_resolution_str [idx]; | |
7ea79cb3 | 732 | |
8e5cb9a5 | 733 | sprintf (buffer, _("unknown LTO resolution value %x"), idx); |
7ea79cb3 | 734 | return buffer; |
735 | } | |
736 | ||
8e5cb9a5 | 737 | /* Return LTO visibility string name that corresponds to IDX enum value. */ |
7ea79cb3 | 738 | static const char * |
8e5cb9a5 | 739 | get_lto_visibility (unsigned int idx) |
7ea79cb3 | 740 | { |
741 | static char buffer[64]; | |
742 | const char *lto_visibility_str[4] = | |
743 | { | |
744 | "DEFAULT", | |
745 | "PROTECTED", | |
746 | "INTERNAL", | |
747 | "HIDDEN" | |
748 | }; | |
749 | ||
8e5cb9a5 JB |
750 | if (idx < ARRAY_SIZE (lto_visibility_str)) |
751 | return lto_visibility_str [idx]; | |
7ea79cb3 | 752 | |
8e5cb9a5 | 753 | sprintf (buffer, _("unknown LTO visibility value %x"), idx); |
7ea79cb3 | 754 | return buffer; |
755 | } | |
756 | ||
5d3236ee DK |
757 | /* Get the symbol resolution info for a plugin-claimed input file. */ |
758 | static enum ld_plugin_status | |
69ee6ab2 AM |
759 | get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms, |
760 | int def_ironly_exp) | |
5d3236ee | 761 | { |
f4b78d18 L |
762 | const plugin_input_file_t *input = handle; |
763 | const bfd *abfd = (const bfd *) input->abfd; | |
5d3236ee | 764 | int n; |
69ee6ab2 | 765 | |
5d3236ee DK |
766 | ASSERT (called_plugin); |
767 | for (n = 0; n < nsyms; n++) | |
768 | { | |
769 | struct bfd_link_hash_entry *blhe; | |
42a851a9 | 770 | asection *owner_sec; |
69ee6ab2 | 771 | int res; |
6fe014bc L |
772 | struct bfd_link_hash_entry *h |
773 | = bfd_link_hash_lookup (link_info.hash, syms[n].name, | |
f38a2680 | 774 | false, false, true); |
6fe014bc | 775 | enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none; |
69ee6ab2 | 776 | |
6fe014bc L |
777 | if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF) |
778 | { | |
779 | blhe = h; | |
a78fca7b | 780 | if (blhe && link_info.wrap_hash != NULL) |
6fe014bc L |
781 | { |
782 | /* Check if a symbol is a wrapper symbol. */ | |
783 | struct bfd_link_hash_entry *unwrap | |
784 | = unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe); | |
785 | if (unwrap && unwrap != h) | |
786 | wrap_status = wrapper; | |
787 | } | |
788 | } | |
10be1b6a | 789 | else |
6fe014bc L |
790 | { |
791 | blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, | |
792 | &link_info, syms[n].name, | |
f38a2680 | 793 | false, false, true); |
6fe014bc L |
794 | /* Check if a symbol is a wrapped symbol. */ |
795 | if (blhe && blhe != h) | |
796 | wrap_status = wrapped; | |
797 | } | |
5d3236ee DK |
798 | if (!blhe) |
799 | { | |
3355cb3b L |
800 | /* The plugin is called to claim symbols in an archive element |
801 | from plugin_object_p. But those symbols aren't needed to | |
802 | create output. They are defined and referenced only within | |
803 | IR. */ | |
804 | switch (syms[n].def) | |
805 | { | |
806 | default: | |
807 | abort (); | |
808 | case LDPK_UNDEF: | |
809 | case LDPK_WEAKUNDEF: | |
810 | res = LDPR_UNDEF; | |
811 | break; | |
812 | case LDPK_DEF: | |
813 | case LDPK_WEAKDEF: | |
814 | case LDPK_COMMON: | |
815 | res = LDPR_PREVAILING_DEF_IRONLY; | |
816 | break; | |
817 | } | |
1715a13c | 818 | goto report_symbol; |
5d3236ee DK |
819 | } |
820 | ||
821 | /* Determine resolution from blhe type and symbol's original type. */ | |
822 | if (blhe->type == bfd_link_hash_undefined | |
f84854b6 | 823 | || blhe->type == bfd_link_hash_undefweak) |
5d3236ee | 824 | { |
69ee6ab2 | 825 | res = LDPR_UNDEF; |
1715a13c | 826 | goto report_symbol; |
5d3236ee DK |
827 | } |
828 | if (blhe->type != bfd_link_hash_defined | |
f84854b6 L |
829 | && blhe->type != bfd_link_hash_defweak |
830 | && blhe->type != bfd_link_hash_common) | |
5d3236ee DK |
831 | { |
832 | /* We should not have a new, indirect or warning symbol here. */ | |
df5f2391 | 833 | einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"), |
f84854b6 | 834 | called_plugin->name, blhe->type); |
5d3236ee DK |
835 | } |
836 | ||
42a851a9 DK |
837 | /* Find out which section owns the symbol. Since it's not undef, |
838 | it must have an owner; if it's not a common symbol, both defs | |
839 | and weakdefs keep it in the same place. */ | |
9e2278f5 AM |
840 | owner_sec = (blhe->type == bfd_link_hash_common |
841 | ? blhe->u.c.p->section | |
842 | : blhe->u.def.section); | |
42a851a9 | 843 | |
5d3236ee DK |
844 | |
845 | /* If it was originally undefined or common, then it has been | |
f84854b6 L |
846 | resolved; determine how. */ |
847 | if (syms[n].def == LDPK_UNDEF | |
848 | || syms[n].def == LDPK_WEAKUNDEF | |
5d3236ee DK |
849 | || syms[n].def == LDPK_COMMON) |
850 | { | |
5d3236ee | 851 | if (owner_sec->owner == link_info.output_bfd) |
69ee6ab2 | 852 | res = LDPR_RESOLVED_EXEC; |
5d3236ee | 853 | else if (owner_sec->owner == abfd) |
69ee6ab2 | 854 | res = LDPR_PREVAILING_DEF_IRONLY; |
5d3236ee | 855 | else if (is_ir_dummy_bfd (owner_sec->owner)) |
69ee6ab2 | 856 | res = LDPR_RESOLVED_IR; |
cc322803 L |
857 | else if (owner_sec->owner != NULL |
858 | && (owner_sec->owner->flags & DYNAMIC) != 0) | |
69ee6ab2 | 859 | res = LDPR_RESOLVED_DYN; |
5d3236ee | 860 | else |
69ee6ab2 | 861 | res = LDPR_RESOLVED_EXEC; |
5d3236ee DK |
862 | } |
863 | ||
864 | /* Was originally def, or weakdef. Does it prevail? If the | |
f84854b6 | 865 | owner is the original dummy bfd that supplied it, then this |
5d3236ee | 866 | is the definition that has prevailed. */ |
69ee6ab2 AM |
867 | else if (owner_sec->owner == link_info.output_bfd) |
868 | res = LDPR_PREEMPTED_REG; | |
42a851a9 | 869 | else if (owner_sec->owner == abfd) |
69ee6ab2 | 870 | res = LDPR_PREVAILING_DEF_IRONLY; |
5d3236ee DK |
871 | |
872 | /* Was originally def, weakdef, or common, but has been pre-empted. */ | |
69ee6ab2 AM |
873 | else if (is_ir_dummy_bfd (owner_sec->owner)) |
874 | res = LDPR_PREEMPTED_IR; | |
875 | else | |
876 | res = LDPR_PREEMPTED_REG; | |
877 | ||
878 | if (res == LDPR_PREVAILING_DEF_IRONLY) | |
879 | { | |
880 | /* We need to know if the sym is referenced from non-IR files. Or | |
881 | even potentially-referenced, perhaps in a future final link if | |
882 | this is a partial one, perhaps dynamically at load-time if the | |
da422fa4 L |
883 | symbol is externally visible. Also check for __real_SYM |
884 | reference and wrapper symbol. */ | |
885 | if (blhe->non_ir_ref_regular | |
886 | || blhe->ref_real | |
887 | || wrap_status == wrapper) | |
69ee6ab2 | 888 | res = LDPR_PREVAILING_DEF; |
6fe014bc L |
889 | else if (wrap_status == wrapped) |
890 | res = LDPR_RESOLVED_IR; | |
9bbc1a67 | 891 | else if (is_visible_from_outside (&syms[n], blhe)) |
69ee6ab2 AM |
892 | res = def_ironly_exp; |
893 | } | |
1715a13c | 894 | |
9e2278f5 | 895 | report_symbol: |
69ee6ab2 | 896 | syms[n].resolution = res; |
1715a13c | 897 | if (report_plugin_symbols) |
871b3ab2 | 898 | einfo (_("%P: %pB: symbol `%s' " |
7ea79cb3 | 899 | "definition: %s, visibility: %s, resolution: %s\n"), |
9e2278f5 | 900 | abfd, syms[n].name, |
7ea79cb3 | 901 | get_lto_kind (syms[n].def), |
902 | get_lto_visibility (syms[n].visibility), | |
903 | get_lto_resolution (res)); | |
5d3236ee DK |
904 | } |
905 | return LDPS_OK; | |
906 | } | |
907 | ||
69ee6ab2 AM |
908 | static enum ld_plugin_status |
909 | get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) | |
910 | { | |
911 | return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF); | |
912 | } | |
913 | ||
914 | static enum ld_plugin_status | |
915 | get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) | |
916 | { | |
917 | return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP); | |
918 | } | |
919 | ||
5d3236ee DK |
920 | /* Add a new (real) input file generated by a plugin. */ |
921 | static enum ld_plugin_status | |
922 | add_input_file (const char *pathname) | |
923 | { | |
ce875075 AM |
924 | lang_input_statement_type *is; |
925 | ||
5d3236ee | 926 | ASSERT (called_plugin); |
ce875075 AM |
927 | is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum, |
928 | NULL); | |
929 | if (!is) | |
5d3236ee | 930 | return LDPS_ERR; |
ce875075 | 931 | is->flags.lto_output = 1; |
5d3236ee DK |
932 | return LDPS_OK; |
933 | } | |
934 | ||
935 | /* Add a new (real) library required by a plugin. */ | |
936 | static enum ld_plugin_status | |
937 | add_input_library (const char *pathname) | |
938 | { | |
ce875075 AM |
939 | lang_input_statement_type *is; |
940 | ||
5d3236ee | 941 | ASSERT (called_plugin); |
ce875075 AM |
942 | is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum, |
943 | NULL); | |
944 | if (!is) | |
5d3236ee | 945 | return LDPS_ERR; |
ce875075 | 946 | is->flags.lto_output = 1; |
5d3236ee DK |
947 | return LDPS_OK; |
948 | } | |
949 | ||
950 | /* Set the extra library path to be used by libraries added via | |
951 | add_input_library. */ | |
952 | static enum ld_plugin_status | |
953 | set_extra_library_path (const char *path) | |
954 | { | |
955 | ASSERT (called_plugin); | |
f38a2680 | 956 | ldfile_add_library_path (xstrdup (path), false); |
5d3236ee DK |
957 | return LDPS_OK; |
958 | } | |
959 | ||
960 | /* Issue a diagnostic message from a plugin. */ | |
961 | static enum ld_plugin_status | |
962 | message (int level, const char *format, ...) | |
963 | { | |
964 | va_list args; | |
965 | va_start (args, format); | |
966 | ||
967 | switch (level) | |
968 | { | |
969 | case LDPL_INFO: | |
f38a2680 | 970 | vfinfo (stdout, format, args, false); |
d251c5c4 | 971 | putchar ('\n'); |
5d3236ee DK |
972 | break; |
973 | case LDPL_WARNING: | |
45e81354 | 974 | { |
df5f2391 | 975 | char *newfmt = concat (_("%P: warning: "), format, "\n", |
e1fa0163 | 976 | (const char *) NULL); |
f38a2680 | 977 | vfinfo (stdout, newfmt, args, true); |
e1fa0163 | 978 | free (newfmt); |
45e81354 | 979 | } |
5d3236ee DK |
980 | break; |
981 | case LDPL_FATAL: | |
982 | case LDPL_ERROR: | |
983 | default: | |
9e2278f5 | 984 | { |
df5f2391 AM |
985 | char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X", |
986 | _("%P: error: "), format, "\n", | |
e1fa0163 | 987 | (const char *) NULL); |
9e2278f5 | 988 | fflush (stdout); |
f38a2680 | 989 | vfinfo (stderr, newfmt, args, true); |
9e2278f5 | 990 | fflush (stderr); |
e1fa0163 | 991 | free (newfmt); |
9e2278f5 | 992 | } |
5d3236ee DK |
993 | break; |
994 | } | |
995 | ||
996 | va_end (args); | |
997 | return LDPS_OK; | |
998 | } | |
999 | ||
1000 | /* Helper to size leading part of tv array and set it up. */ | |
69ee6ab2 | 1001 | static void |
5d3236ee DK |
1002 | set_tv_header (struct ld_plugin_tv *tv) |
1003 | { | |
1004 | size_t i; | |
1005 | ||
1006 | /* Version info. */ | |
1007 | static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL); | |
1008 | static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100; | |
1009 | ||
5d3236ee DK |
1010 | for (i = 0; i < tv_header_size; i++) |
1011 | { | |
1012 | tv[i].tv_tag = tv_header_tags[i]; | |
1013 | #define TVU(x) tv[i].tv_u.tv_ ## x | |
1014 | switch (tv[i].tv_tag) | |
1015 | { | |
f84854b6 L |
1016 | case LDPT_MESSAGE: |
1017 | TVU(message) = message; | |
1018 | break; | |
1019 | case LDPT_API_VERSION: | |
1020 | TVU(val) = LD_PLUGIN_API_VERSION; | |
1021 | break; | |
1022 | case LDPT_GNU_LD_VERSION: | |
1023 | TVU(val) = major * 100 + minor; | |
1024 | break; | |
1025 | case LDPT_LINKER_OUTPUT: | |
64d94ba0 AM |
1026 | TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL |
1027 | : bfd_link_pde (&link_info) ? LDPO_EXEC | |
1028 | : bfd_link_pie (&link_info) ? LDPO_PIE | |
1029 | : LDPO_DYN); | |
f84854b6 L |
1030 | break; |
1031 | case LDPT_OUTPUT_NAME: | |
1032 | TVU(string) = output_filename; | |
1033 | break; | |
1034 | case LDPT_REGISTER_CLAIM_FILE_HOOK: | |
1035 | TVU(register_claim_file) = register_claim_file; | |
1036 | break; | |
b21318bd JM |
1037 | case LDPT_REGISTER_CLAIM_FILE_HOOK_V2: |
1038 | TVU(register_claim_file_v2) = register_claim_file_v2; | |
1039 | break; | |
f84854b6 L |
1040 | case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK: |
1041 | TVU(register_all_symbols_read) = register_all_symbols_read; | |
1042 | break; | |
1043 | case LDPT_REGISTER_CLEANUP_HOOK: | |
1044 | TVU(register_cleanup) = register_cleanup; | |
1045 | break; | |
1046 | case LDPT_ADD_SYMBOLS: | |
1047 | TVU(add_symbols) = add_symbols; | |
1048 | break; | |
1049 | case LDPT_GET_INPUT_FILE: | |
1050 | TVU(get_input_file) = get_input_file; | |
1051 | break; | |
15f7a26b L |
1052 | case LDPT_GET_VIEW: |
1053 | TVU(get_view) = get_view; | |
1054 | break; | |
f84854b6 L |
1055 | case LDPT_RELEASE_INPUT_FILE: |
1056 | TVU(release_input_file) = release_input_file; | |
1057 | break; | |
1058 | case LDPT_GET_SYMBOLS: | |
69ee6ab2 AM |
1059 | TVU(get_symbols) = get_symbols_v1; |
1060 | break; | |
1061 | case LDPT_GET_SYMBOLS_V2: | |
1062 | TVU(get_symbols) = get_symbols_v2; | |
f84854b6 L |
1063 | break; |
1064 | case LDPT_ADD_INPUT_FILE: | |
1065 | TVU(add_input_file) = add_input_file; | |
1066 | break; | |
1067 | case LDPT_ADD_INPUT_LIBRARY: | |
1068 | TVU(add_input_library) = add_input_library; | |
1069 | break; | |
1070 | case LDPT_SET_EXTRA_LIBRARY_PATH: | |
1071 | TVU(set_extra_library_path) = set_extra_library_path; | |
1072 | break; | |
1073 | default: | |
1074 | /* Added a new entry to the array without adding | |
1075 | a new case to set up its value is a bug. */ | |
1076 | FAIL (); | |
5d3236ee DK |
1077 | } |
1078 | #undef TVU | |
1079 | } | |
5d3236ee DK |
1080 | } |
1081 | ||
1082 | /* Append the per-plugin args list and trailing LDPT_NULL to tv. */ | |
1083 | static void | |
1084 | set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv) | |
1085 | { | |
1086 | plugin_arg_t *arg = plugin->args; | |
1087 | while (arg) | |
1088 | { | |
1089 | tv->tv_tag = LDPT_OPTION; | |
1090 | tv->tv_u.tv_string = arg->arg; | |
1091 | arg = arg->next; | |
1092 | tv++; | |
1093 | } | |
1094 | tv->tv_tag = LDPT_NULL; | |
1095 | tv->tv_u.tv_val = 0; | |
1096 | } | |
1097 | ||
1098 | /* Load up and initialise all plugins after argument parsing. */ | |
d82184d7 | 1099 | void |
d44ad554 | 1100 | plugin_load_plugins (void) |
5d3236ee DK |
1101 | { |
1102 | struct ld_plugin_tv *my_tv; | |
1103 | unsigned int max_args = 0; | |
1104 | plugin_t *curplug = plugins_list; | |
1105 | ||
1106 | /* If there are no plugins, we need do nothing this run. */ | |
1107 | if (!curplug) | |
d82184d7 | 1108 | return; |
5d3236ee DK |
1109 | |
1110 | /* First pass over plugins to find max # args needed so that we | |
1111 | can size and allocate the tv array. */ | |
1112 | while (curplug) | |
1113 | { | |
1114 | if (curplug->n_args > max_args) | |
1115 | max_args = curplug->n_args; | |
1116 | curplug = curplug->next; | |
1117 | } | |
1118 | ||
1119 | /* Allocate tv array and initialise constant part. */ | |
1120 | my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv); | |
1121 | set_tv_header (my_tv); | |
1122 | ||
1123 | /* Pass over plugins again, activating them. */ | |
1124 | curplug = plugins_list; | |
1125 | while (curplug) | |
1126 | { | |
1127 | enum ld_plugin_status rv; | |
a8f9d13e AM |
1128 | ld_plugin_onload onloadfn; |
1129 | ||
1130 | onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload"); | |
5d3236ee | 1131 | if (!onloadfn) |
a8f9d13e | 1132 | onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload"); |
5d3236ee | 1133 | if (!onloadfn) |
df5f2391 | 1134 | einfo (_("%F%P: %s: error loading plugin: %s\n"), |
d82184d7 | 1135 | curplug->name, dlerror ()); |
5d3236ee DK |
1136 | set_tv_plugin_args (curplug, &my_tv[tv_header_size]); |
1137 | called_plugin = curplug; | |
1138 | rv = (*onloadfn) (my_tv); | |
1139 | called_plugin = NULL; | |
1140 | if (rv != LDPS_OK) | |
df5f2391 | 1141 | einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv); |
5d3236ee DK |
1142 | curplug = curplug->next; |
1143 | } | |
1144 | ||
1145 | /* Since plugin(s) inited ok, assume they're going to want symbol | |
1146 | resolutions, which needs us to track which symbols are referenced | |
1147 | by non-IR files using the linker's notice callback. */ | |
9e2278f5 AM |
1148 | orig_notice_all = link_info.notice_all; |
1149 | orig_callbacks = link_info.callbacks; | |
1150 | plugin_callbacks = *orig_callbacks; | |
1151 | plugin_callbacks.notice = &plugin_notice; | |
f38a2680 AM |
1152 | link_info.notice_all = true; |
1153 | link_info.lto_plugin_active = true; | |
9e2278f5 | 1154 | link_info.callbacks = &plugin_callbacks; |
38604796 | 1155 | |
5ae0078c L |
1156 | register_ld_plugin_object_p (plugin_object_p); |
1157 | ||
38604796 | 1158 | #if HAVE_MMAP && HAVE_GETPAGESIZE |
fd5a1509 | 1159 | plugin_pagesize = getpagesize (); |
38604796 | 1160 | #endif |
5d3236ee DK |
1161 | } |
1162 | ||
1163 | /* Call 'claim file' hook for all plugins. */ | |
02d00247 | 1164 | static int |
b21318bd JM |
1165 | plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed, |
1166 | bool known_used) | |
5d3236ee DK |
1167 | { |
1168 | plugin_t *curplug = plugins_list; | |
f38a2680 | 1169 | *claimed = false; |
5d3236ee DK |
1170 | while (curplug && !*claimed) |
1171 | { | |
1172 | if (curplug->claim_file_handler) | |
1173 | { | |
1174 | enum ld_plugin_status rv; | |
ace667e5 | 1175 | |
5d3236ee | 1176 | called_plugin = curplug; |
b21318bd JM |
1177 | if (curplug->claim_file_handler_v2) |
1178 | rv = (*curplug->claim_file_handler_v2) (file, claimed, known_used); | |
1179 | else | |
1180 | rv = (*curplug->claim_file_handler) (file, claimed); | |
5d3236ee DK |
1181 | called_plugin = NULL; |
1182 | if (rv != LDPS_OK) | |
1183 | set_plugin_error (curplug->name); | |
1184 | } | |
1185 | curplug = curplug->next; | |
1186 | } | |
1187 | return plugin_error_p () ? -1 : 0; | |
1188 | } | |
1189 | ||
35a1e5f3 L |
1190 | /* Duplicates a character string with memory attached to ABFD. */ |
1191 | ||
1192 | static char * | |
1193 | plugin_strdup (bfd *abfd, const char *str) | |
1194 | { | |
1195 | size_t strlength; | |
1196 | char *copy; | |
1197 | strlength = strlen (str) + 1; | |
1198 | copy = bfd_alloc (abfd, strlength); | |
1199 | if (copy == NULL) | |
df5f2391 | 1200 | einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"), |
35a1e5f3 L |
1201 | bfd_get_error ()); |
1202 | memcpy (copy, str, strlength); | |
1203 | return copy; | |
1204 | } | |
1205 | ||
cb001c0d AM |
1206 | static void |
1207 | plugin_cleanup (bfd *abfd ATTRIBUTE_UNUSED) | |
1208 | { | |
1209 | } | |
1210 | ||
1211 | static bfd_cleanup | |
b21318bd | 1212 | plugin_object_p (bfd *ibfd, bool known_used) |
02d00247 | 1213 | { |
5ae0078c | 1214 | int claimed; |
f4b78d18 | 1215 | plugin_input_file_t *input; |
35a1e5f3 L |
1216 | struct ld_plugin_input_file file; |
1217 | bfd *abfd; | |
5ae0078c L |
1218 | |
1219 | /* Don't try the dummy object file. */ | |
1220 | if ((ibfd->flags & BFD_PLUGIN) != 0) | |
1221 | return NULL; | |
1222 | ||
49f30d83 | 1223 | if (ibfd->plugin_format != bfd_plugin_unknown) |
5ae0078c L |
1224 | { |
1225 | if (ibfd->plugin_format == bfd_plugin_yes) | |
cb001c0d | 1226 | return plugin_cleanup; |
5ae0078c L |
1227 | else |
1228 | return NULL; | |
1229 | } | |
1230 | ||
02d00247 AM |
1231 | /* We create a dummy BFD, initially empty, to house whatever symbols |
1232 | the plugin may want to add. */ | |
607b4833 | 1233 | abfd = plugin_get_ir_dummy_bfd (bfd_get_filename (ibfd), ibfd); |
f4b78d18 L |
1234 | |
1235 | input = bfd_alloc (abfd, sizeof (*input)); | |
1236 | if (input == NULL) | |
df5f2391 | 1237 | einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"), |
f4b78d18 L |
1238 | bfd_get_error ()); |
1239 | ||
7d0b9ebc AM |
1240 | if (!bfd_plugin_open_input (ibfd, &file)) |
1241 | return NULL; | |
35a1e5f3 | 1242 | |
607b4833 | 1243 | if (file.name == bfd_get_filename (ibfd)) |
7d0b9ebc | 1244 | { |
35a1e5f3 L |
1245 | /* We must copy filename attached to ibfd if it is not an archive |
1246 | member since it may be freed by bfd_close below. */ | |
7d0b9ebc | 1247 | file.name = plugin_strdup (abfd, file.name); |
35a1e5f3 L |
1248 | } |
1249 | ||
35a1e5f3 | 1250 | file.handle = input; |
f4b78d18 | 1251 | input->abfd = abfd; |
7a30ac44 | 1252 | input->ibfd = ibfd->my_archive != NULL ? ibfd : NULL; |
2aec968d L |
1253 | input->view_buffer.addr = NULL; |
1254 | input->view_buffer.filesize = 0; | |
1255 | input->view_buffer.offset = 0; | |
7d0b9ebc | 1256 | input->fd = file.fd; |
f38a2680 | 1257 | input->use_mmap = false; |
7d0b9ebc AM |
1258 | input->offset = file.offset; |
1259 | input->filesize = file.filesize; | |
607b4833 | 1260 | input->name = plugin_strdup (abfd, bfd_get_filename (ibfd)); |
f4b78d18 | 1261 | |
5ae0078c L |
1262 | claimed = 0; |
1263 | ||
b21318bd | 1264 | if (plugin_call_claim_file (&file, &claimed, known_used)) |
df5f2391 | 1265 | einfo (_("%F%P: %s: plugin reported error claiming file\n"), |
02d00247 | 1266 | plugin_error_plugin ()); |
f4b78d18 | 1267 | |
91817247 L |
1268 | if (input->fd != -1 |
1269 | && (!claimed || !bfd_plugin_target_p (ibfd->xvec))) | |
f4b78d18 | 1270 | { |
5ae0078c L |
1271 | /* FIXME: fd belongs to us, not the plugin. GCC plugin, which |
1272 | doesn't need fd after plugin_call_claim_file, doesn't use | |
1273 | BFD plugin target vector. Since GCC plugin doesn't call | |
1274 | release_input_file, we close it here. LLVM plugin, which | |
1275 | needs fd after plugin_call_claim_file and calls | |
1276 | release_input_file after it is done, uses BFD plugin target | |
1277 | vector. This scheme doesn't work when a plugin needs fd and | |
1278 | doesn't use BFD plugin target vector neither. */ | |
91817247 | 1279 | release_plugin_file_descriptor (input); |
f4b78d18 L |
1280 | } |
1281 | ||
02d00247 AM |
1282 | if (claimed) |
1283 | { | |
5ae0078c L |
1284 | ibfd->plugin_format = bfd_plugin_yes; |
1285 | ibfd->plugin_dummy_bfd = abfd; | |
35a1e5f3 | 1286 | bfd_make_readable (abfd); |
2aa90762 | 1287 | abfd->no_export = ibfd->no_export; |
cb001c0d | 1288 | return plugin_cleanup; |
02d00247 AM |
1289 | } |
1290 | else | |
1291 | { | |
38604796 L |
1292 | #if HAVE_MMAP |
1293 | if (input->use_mmap) | |
1294 | { | |
1295 | /* If plugin didn't claim the file, unmap the buffer. */ | |
1296 | char *addr = input->view_buffer.addr; | |
1297 | off_t size = input->view_buffer.filesize; | |
1298 | # if HAVE_GETPAGESIZE | |
1299 | off_t bias = input->view_buffer.offset % plugin_pagesize; | |
1300 | size += bias; | |
1301 | addr -= bias; | |
1302 | # endif | |
1303 | munmap (addr, size); | |
1304 | } | |
1305 | #endif | |
1306 | ||
02d00247 AM |
1307 | /* If plugin didn't claim the file, we don't need the dummy bfd. |
1308 | Can't avoid speculatively creating it, alas. */ | |
5ae0078c | 1309 | ibfd->plugin_format = bfd_plugin_no; |
f4b78d18 | 1310 | bfd_close_all_done (abfd); |
5ae0078c L |
1311 | return NULL; |
1312 | } | |
1313 | } | |
1314 | ||
1315 | void | |
1316 | plugin_maybe_claim (lang_input_statement_type *entry) | |
1317 | { | |
fb47deda | 1318 | ASSERT (entry->header.type == lang_input_statement_enum); |
b21318bd | 1319 | if (plugin_object_p (entry->the_bfd, true)) |
5ae0078c L |
1320 | { |
1321 | bfd *abfd = entry->the_bfd->plugin_dummy_bfd; | |
1322 | ||
1323 | /* Discard the real file's BFD and substitute the dummy one. */ | |
1324 | ||
b0cffb47 AM |
1325 | /* We can't call bfd_close on archives. BFD archive handling |
1326 | caches elements, and add_archive_element keeps pointers to | |
1327 | the_bfd and the_bfd->filename in a lang_input_statement_type | |
1328 | linker script statement. */ | |
5ae0078c L |
1329 | if (entry->the_bfd->my_archive == NULL) |
1330 | bfd_close (entry->the_bfd); | |
1331 | entry->the_bfd = abfd; | |
1332 | entry->flags.claimed = 1; | |
02d00247 AM |
1333 | } |
1334 | } | |
1335 | ||
5d3236ee DK |
1336 | /* Call 'all symbols read' hook for all plugins. */ |
1337 | int | |
1338 | plugin_call_all_symbols_read (void) | |
1339 | { | |
1340 | plugin_t *curplug = plugins_list; | |
1341 | ||
1342 | /* Disable any further file-claiming. */ | |
f38a2680 | 1343 | no_more_claiming = true; |
5d3236ee | 1344 | |
5d3236ee DK |
1345 | while (curplug) |
1346 | { | |
1347 | if (curplug->all_symbols_read_handler) | |
1348 | { | |
1349 | enum ld_plugin_status rv; | |
1350 | called_plugin = curplug; | |
1351 | rv = (*curplug->all_symbols_read_handler) (); | |
1352 | called_plugin = NULL; | |
1353 | if (rv != LDPS_OK) | |
1354 | set_plugin_error (curplug->name); | |
1355 | } | |
1356 | curplug = curplug->next; | |
1357 | } | |
1358 | return plugin_error_p () ? -1 : 0; | |
1359 | } | |
1360 | ||
e73d965c | 1361 | /* Call 'cleanup' hook for all plugins at exit. */ |
498cd2a0 | 1362 | void |
5d3236ee DK |
1363 | plugin_call_cleanup (void) |
1364 | { | |
1365 | plugin_t *curplug = plugins_list; | |
1366 | while (curplug) | |
1367 | { | |
1368 | if (curplug->cleanup_handler && !curplug->cleanup_done) | |
1369 | { | |
d9511b64 L |
1370 | if (!config.plugin_save_temps) |
1371 | { | |
1372 | enum ld_plugin_status rv; | |
1373 | curplug->cleanup_done = true; | |
1374 | called_plugin = curplug; | |
1375 | rv = (*curplug->cleanup_handler) (); | |
1376 | called_plugin = NULL; | |
1377 | if (rv != LDPS_OK) | |
1378 | info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"), | |
1379 | curplug->name, rv); | |
1380 | } | |
5d3236ee DK |
1381 | dlclose (curplug->dlhandle); |
1382 | } | |
1383 | curplug = curplug->next; | |
1384 | } | |
5d3236ee DK |
1385 | } |
1386 | ||
5d3236ee DK |
1387 | /* To determine which symbols should be resolved LDPR_PREVAILING_DEF |
1388 | and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as | |
35ed3f94 | 1389 | the linker adds them to the linker hash table. Mark those |
bc4e12de | 1390 | referenced from a non-IR file with non_ir_ref_regular or |
4070765b AM |
1391 | non_ir_ref_dynamic as appropriate. We have to notice_all symbols, |
1392 | because we won't necessarily know until later which ones will be | |
1393 | contributed by IR files. */ | |
f38a2680 | 1394 | static bool |
9e2278f5 | 1395 | plugin_notice (struct bfd_link_info *info, |
35ed3f94 | 1396 | struct bfd_link_hash_entry *h, |
46135103 | 1397 | struct bfd_link_hash_entry *inh, |
9e2278f5 AM |
1398 | bfd *abfd, |
1399 | asection *section, | |
16d96b5b | 1400 | bfd_vma value, |
46135103 | 1401 | flagword flags) |
5d3236ee | 1402 | { |
46135103 AM |
1403 | struct bfd_link_hash_entry *orig_h = h; |
1404 | ||
35ed3f94 | 1405 | if (h != NULL) |
5d3236ee | 1406 | { |
cd6eee13 | 1407 | bfd *sym_bfd; |
f38a2680 | 1408 | bool ref = false; |
cd6eee13 | 1409 | |
46135103 AM |
1410 | if (h->type == bfd_link_hash_warning) |
1411 | h = h->u.i.link; | |
1412 | ||
4a2b04a7 | 1413 | /* Nothing to do here if this def/ref is from an IR dummy BFD. */ |
9e2278f5 | 1414 | if (is_ir_dummy_bfd (abfd)) |
4a2b04a7 | 1415 | ; |
9e2278f5 | 1416 | |
16d96b5b AM |
1417 | /* Making an indirect symbol counts as a reference unless this |
1418 | is a brand new symbol. */ | |
4a2b04a7 L |
1419 | else if (bfd_is_ind_section (section) |
1420 | || (flags & BSF_INDIRECT) != 0) | |
16d96b5b | 1421 | { |
46135103 AM |
1422 | /* ??? Some of this is questionable. See comments in |
1423 | _bfd_generic_link_add_one_symbol for case IND. */ | |
4070765b AM |
1424 | if (h->type != bfd_link_hash_new |
1425 | || inh->type == bfd_link_hash_new) | |
16d96b5b | 1426 | { |
4070765b | 1427 | if ((abfd->flags & DYNAMIC) == 0) |
f38a2680 | 1428 | inh->non_ir_ref_regular = true; |
4070765b | 1429 | else |
f38a2680 | 1430 | inh->non_ir_ref_dynamic = true; |
16d96b5b | 1431 | } |
4070765b AM |
1432 | |
1433 | if (h->type != bfd_link_hash_new) | |
f38a2680 | 1434 | ref = true; |
16d96b5b AM |
1435 | } |
1436 | ||
1437 | /* Nothing to do here for warning symbols. */ | |
1438 | else if ((flags & BSF_WARNING) != 0) | |
1439 | ; | |
1440 | ||
1441 | /* Nothing to do here for constructor symbols. */ | |
1442 | else if ((flags & BSF_CONSTRUCTOR) != 0) | |
1443 | ; | |
1444 | ||
35ed3f94 | 1445 | /* If this is a ref, set non_ir_ref. */ |
16d96b5b | 1446 | else if (bfd_is_und_section (section)) |
3d5bef4c L |
1447 | { |
1448 | /* Replace the undefined dummy bfd with the real one. */ | |
4070765b AM |
1449 | if ((h->type == bfd_link_hash_undefined |
1450 | || h->type == bfd_link_hash_undefweak) | |
1451 | && (h->u.undef.abfd == NULL | |
1452 | || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0)) | |
59fa66c5 | 1453 | h->u.undef.abfd = abfd; |
f38a2680 | 1454 | ref = true; |
3d5bef4c | 1455 | } |
35ed3f94 | 1456 | |
af4fa23f AM |
1457 | |
1458 | /* A common symbol should be merged with other commons or | |
1459 | defs with the same name. In particular, a common ought | |
1460 | to be overridden by a def in a -flto object. In that | |
1461 | sense a common is also a ref. */ | |
1462 | else if (bfd_is_com_section (section)) | |
cd6eee13 | 1463 | { |
af4fa23f AM |
1464 | if (h->type == bfd_link_hash_common |
1465 | && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)) | |
0616a280 AM |
1466 | { |
1467 | h->type = bfd_link_hash_undefweak; | |
1468 | h->u.undef.abfd = sym_bfd; | |
1469 | } | |
f38a2680 | 1470 | ref = true; |
af4fa23f | 1471 | } |
4070765b | 1472 | |
af4fa23f AM |
1473 | /* Otherwise, it must be a new def. |
1474 | Ensure any symbol defined in an IR dummy BFD takes on a | |
1475 | new value from a real BFD. Weak symbols are not normally | |
1476 | overridden by a new weak definition, and strong symbols | |
1477 | will normally cause multiple definition errors. Avoid | |
0e6a3f07 L |
1478 | this by making the symbol appear to be undefined. |
1479 | ||
1480 | NB: We change the previous definition in the IR object to | |
04e433a8 L |
1481 | undefweak only after all LTO symbols have been read or for |
1482 | non-ELF targets. */ | |
1483 | else if ((info->lto_all_symbols_read | |
1484 | || bfd_get_flavour (abfd) != bfd_target_elf_flavour) | |
0e6a3f07 L |
1485 | && (((h->type == bfd_link_hash_defweak |
1486 | || h->type == bfd_link_hash_defined) | |
1487 | && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner)) | |
1488 | || (h->type == bfd_link_hash_common | |
1489 | && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))) | |
af4fa23f AM |
1490 | { |
1491 | h->type = bfd_link_hash_undefweak; | |
1492 | h->u.undef.abfd = sym_bfd; | |
4070765b AM |
1493 | } |
1494 | ||
1495 | if (ref) | |
1496 | { | |
1497 | if ((abfd->flags & DYNAMIC) == 0) | |
f38a2680 | 1498 | h->non_ir_ref_regular = true; |
4070765b | 1499 | else |
f38a2680 | 1500 | h->non_ir_ref_dynamic = true; |
cd6eee13 | 1501 | } |
5d3236ee DK |
1502 | } |
1503 | ||
1504 | /* Continue with cref/nocrossref/trace-sym processing. */ | |
46135103 | 1505 | if (orig_h == NULL |
9e2278f5 AM |
1506 | || orig_notice_all |
1507 | || (info->notice_hash != NULL | |
46135103 | 1508 | && bfd_hash_lookup (info->notice_hash, orig_h->root.string, |
f38a2680 | 1509 | false, false) != NULL)) |
46135103 AM |
1510 | return (*orig_callbacks->notice) (info, orig_h, inh, |
1511 | abfd, section, value, flags); | |
f38a2680 | 1512 | return true; |
5d3236ee | 1513 | } |
0381901e | 1514 | #endif /* BFD_SUPPORTS_PLUGINS */ |