]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - ld/plugin.c
bus error with fuzzed archive element
[thirdparty/binutils-gdb.git] / ld / plugin.c
CommitLineData
5d3236ee 1/* Plugin control for the GNU linker.
fd67aa11 2 Copyright (C) 2010-2024 Free Software Foundation, Inc.
5d3236ee
DK
3
4 This file is part of the GNU Binutils.
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
20
21#include "sysdep.h"
22#include "libiberty.h"
23#include "bfd.h"
0381901e 24#if BFD_SUPPORTS_PLUGINS
5d3236ee
DK
25#include "bfdlink.h"
26#include "bfdver.h"
1ff6de03 27#include "ctf-api.h"
5d3236ee
DK
28#include "ld.h"
29#include "ldmain.h"
30#include "ldmisc.h"
31#include "ldexp.h"
32#include "ldlang.h"
33#include "ldfile.h"
7d0b9ebc 34#include "plugin-api.h"
5ae0078c 35#include "../bfd/plugin.h"
5d3236ee 36#include "plugin.h"
5d3236ee 37#include "elf-bfd.h"
2aec968d
L
38#if HAVE_MMAP
39# include <sys/mman.h>
40# ifndef MAP_FAILED
41# define MAP_FAILED ((void *) -1)
42# endif
43# ifndef PROT_READ
44# define PROT_READ 0
45# endif
46# ifndef MAP_PRIVATE
47# define MAP_PRIVATE 0
48# endif
49#endif
f4b78d18
L
50#include <errno.h>
51#if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
52extern int errno;
53#endif
3055522a
AM
54#if defined (HAVE_DLFCN_H)
55#include <dlfcn.h>
56#elif defined (HAVE_WINDOWS_H)
f31d24a0 57#include <windows.h>
3917d5d5 58#endif
5d3236ee 59
1715a13c 60/* Report plugin symbols. */
f38a2680 61bool report_plugin_symbols;
1715a13c 62
5d3236ee
DK
63/* The suffix to append to the name of the real (claimed) object file
64 when generating a dummy BFD to hold the IR symbols sent from the
cf4dc96f
DK
65 plugin. For cosmetic use only; appears in maps, crefs etc. */
66#define IRONLY_SUFFIX " (symbol from plugin)"
5d3236ee
DK
67
68/* Stores a single argument passed to a plugin. */
69typedef struct plugin_arg
70{
71 struct plugin_arg *next;
72 const char *arg;
73} plugin_arg_t;
74
75/* Holds all details of a single plugin. */
76typedef struct plugin
77{
78 /* Next on the list of plugins, or NULL at end of chain. */
79 struct plugin *next;
80 /* The argument string given to --plugin. */
81 const char *name;
82 /* The shared library handle returned by dlopen. */
83 void *dlhandle;
84 /* The list of argument string given to --plugin-opt. */
85 plugin_arg_t *args;
86 /* Number of args in the list, for convenience. */
87 size_t n_args;
88 /* The plugin's event handlers. */
89 ld_plugin_claim_file_handler claim_file_handler;
b21318bd 90 ld_plugin_claim_file_handler_v2 claim_file_handler_v2;
5d3236ee
DK
91 ld_plugin_all_symbols_read_handler all_symbols_read_handler;
92 ld_plugin_cleanup_handler cleanup_handler;
93 /* TRUE if the cleanup handlers have been called. */
f38a2680 94 bool cleanup_done;
5d3236ee
DK
95} plugin_t;
96
2aec968d
L
97typedef struct view_buffer
98{
99 char *addr;
100 size_t filesize;
101 off_t offset;
102} view_buffer_t;
103
f4b78d18
L
104/* The internal version of struct ld_plugin_input_file with a BFD
105 pointer. */
106typedef struct plugin_input_file
107{
7a30ac44 108 /* The dummy BFD. */
f4b78d18 109 bfd *abfd;
7a30ac44 110 /* The original input BFD. Non-NULL if it is an archive member. */
91817247 111 bfd *ibfd;
2aec968d 112 view_buffer_t view_buffer;
f4b78d18
L
113 char *name;
114 int fd;
f38a2680 115 bool use_mmap;
f4b78d18
L
116 off_t offset;
117 off_t filesize;
118} plugin_input_file_t;
119
5d3236ee
DK
120/* The master list of all plugins. */
121static plugin_t *plugins_list = NULL;
122
123/* We keep a tail pointer for easy linking on the end. */
124static plugin_t **plugins_tail_chain_ptr = &plugins_list;
125
126/* The last plugin added to the list, for receiving args. */
127static plugin_t *last_plugin = NULL;
128
129/* The tail of the arg chain of the last plugin added to the list. */
130static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
131
132/* The plugin which is currently having a callback executed. */
133static plugin_t *called_plugin = NULL;
134
135/* Last plugin to cause an error, if any. */
136static const char *error_plugin = NULL;
137
24f58f47 138/* State of linker "notice" interface before we poked at it. */
f38a2680 139static bool orig_notice_all;
9e2278f5
AM
140
141/* Original linker callbacks, and the plugin version. */
142static const struct bfd_link_callbacks *orig_callbacks;
143static struct bfd_link_callbacks plugin_callbacks;
144
5d3236ee
DK
145/* Set at all symbols read time, to avoid recursively offering the plugin
146 its own newly-added input files and libs to claim. */
f38a2680 147bool no_more_claiming = false;
5d3236ee 148
38604796
L
149#if HAVE_MMAP && HAVE_GETPAGESIZE
150/* Page size used by mmap. */
151static off_t plugin_pagesize;
152#endif
153
5d3236ee
DK
154/* List of tags to set in the constant leading part of the tv array. */
155static const enum ld_plugin_tag tv_header_tags[] =
156{
157 LDPT_MESSAGE,
158 LDPT_API_VERSION,
159 LDPT_GNU_LD_VERSION,
160 LDPT_LINKER_OUTPUT,
161 LDPT_OUTPUT_NAME,
162 LDPT_REGISTER_CLAIM_FILE_HOOK,
b21318bd 163 LDPT_REGISTER_CLAIM_FILE_HOOK_V2,
5d3236ee
DK
164 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
165 LDPT_REGISTER_CLEANUP_HOOK,
166 LDPT_ADD_SYMBOLS,
167 LDPT_GET_INPUT_FILE,
15f7a26b 168 LDPT_GET_VIEW,
5d3236ee
DK
169 LDPT_RELEASE_INPUT_FILE,
170 LDPT_GET_SYMBOLS,
69ee6ab2 171 LDPT_GET_SYMBOLS_V2,
5d3236ee
DK
172 LDPT_ADD_INPUT_FILE,
173 LDPT_ADD_INPUT_LIBRARY,
174 LDPT_SET_EXTRA_LIBRARY_PATH
175};
176
177/* How many entries in the constant leading part of the tv array. */
178static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
179
9e2278f5 180/* Forward references. */
f38a2680
AM
181static bool plugin_notice (struct bfd_link_info *,
182 struct bfd_link_hash_entry *,
183 struct bfd_link_hash_entry *,
184 bfd *, asection *, bfd_vma, flagword);
9e2278f5 185
b21318bd 186static bfd_cleanup plugin_object_p (bfd *, bool);
5ae0078c 187
3917d5d5
DK
188#if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
189
190#define RTLD_NOW 0 /* Dummy value. */
191
192static void *
193dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
194{
195 return LoadLibrary (file);
196}
197
198static void *
199dlsym (void *handle, const char *name)
200{
201 return GetProcAddress (handle, name);
202}
203
204static int
205dlclose (void *handle)
206{
207 FreeLibrary (handle);
208 return 0;
209}
210
211#endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */
212
d82184d7
L
213#ifndef HAVE_DLFCN_H
214static const char *
215dlerror (void)
216{
217 return "";
218}
219#endif
220
5d3236ee
DK
221/* Helper function for exiting with error status. */
222static int
223set_plugin_error (const char *plugin)
224{
225 error_plugin = plugin;
226 return -1;
227}
228
229/* Test if an error occurred. */
f38a2680 230static bool
5d3236ee
DK
231plugin_error_p (void)
232{
233 return error_plugin != NULL;
234}
235
236/* Return name of plugin which caused an error if any. */
d44ad554
DK
237const char *
238plugin_error_plugin (void)
5d3236ee
DK
239{
240 return error_plugin ? error_plugin : _("<no plugin>");
241}
242
243/* Handle -plugin arg: find and load plugin, or return error. */
d82184d7 244void
d44ad554 245plugin_opt_plugin (const char *plugin)
5d3236ee
DK
246{
247 plugin_t *newplug;
c3e1c28e 248 plugin_t *curplug = plugins_list;
5d3236ee
DK
249
250 newplug = xmalloc (sizeof *newplug);
251 memset (newplug, 0, sizeof *newplug);
252 newplug->name = plugin;
253 newplug->dlhandle = dlopen (plugin, RTLD_NOW);
254 if (!newplug->dlhandle)
df5f2391 255 einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ());
5d3236ee 256
c3e1c28e
L
257 /* Check if plugin has been loaded already. */
258 while (curplug)
259 {
260 if (newplug->dlhandle == curplug->dlhandle)
261 {
262 einfo (_("%P: %s: duplicated plugin\n"), plugin);
263 free (newplug);
264 return;
265 }
266 curplug = curplug->next;
267 }
268
5d3236ee
DK
269 /* Chain on end, so when we run list it is in command-line order. */
270 *plugins_tail_chain_ptr = newplug;
271 plugins_tail_chain_ptr = &newplug->next;
272
273 /* Record it as current plugin for receiving args. */
274 last_plugin = newplug;
275 last_plugin_args_tail_chain_ptr = &newplug->args;
5d3236ee
DK
276}
277
278/* Accumulate option arguments for last-loaded plugin, or return
279 error if none. */
d44ad554
DK
280int
281plugin_opt_plugin_arg (const char *arg)
5d3236ee
DK
282{
283 plugin_arg_t *newarg;
284
285 if (!last_plugin)
286 return set_plugin_error (_("<no plugin>"));
287
97964ab3
AM
288 /* Ignore -pass-through= from GCC driver. */
289 if (*arg == '-')
290 {
291 const char *p = arg + 1;
292
293 if (*p == '-')
294 ++p;
295 if (strncmp (p, "pass-through=", 13) == 0)
296 return 0;
297 }
298
5d3236ee
DK
299 newarg = xmalloc (sizeof *newarg);
300 newarg->arg = arg;
301 newarg->next = NULL;
302
303 /* Chain on end to preserve command-line order. */
304 *last_plugin_args_tail_chain_ptr = newarg;
305 last_plugin_args_tail_chain_ptr = &newarg->next;
306 last_plugin->n_args++;
307 return 0;
308}
309
37a3056a
L
310/* Generate a dummy BFD to represent an IR file, for any callers of
311 plugin_call_claim_file to use as the handle in the ld_plugin_input_file
312 struct that they build to pass in. The BFD is initially writable, so
313 that symbols can be added to it; it must be made readable after the
314 add_symbols hook has been called so that it can be read when linking. */
315static bfd *
5d3236ee
DK
316plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
317{
bc110b6e 318 bfd *abfd;
f38a2680 319 bool bfd_plugin_target;
bc110b6e
AM
320
321 bfd_use_reserved_id = 1;
4a07dc81 322 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
9e2278f5 323 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
4a07dc81 324 bfd_plugin_target ? link_info.output_bfd : srctemplate);
9e2278f5
AM
325 if (abfd != NULL)
326 {
327 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
5ae0078c
L
328 if (!bfd_make_writable (abfd))
329 goto report_error;
4a07dc81 330 if (!bfd_plugin_target)
5ae0078c
L
331 {
332 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
333 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
334 if (!bfd_copy_private_bfd_data (srctemplate, abfd))
335 goto report_error;
336 }
9e2278f5
AM
337 {
338 flagword flags;
339
c77ec726 340 /* Create section to own the symbols. */
9e2278f5
AM
341 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
342 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
343 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
344 return abfd;
345 }
346 }
dc1e8a47 347 report_error:
df5f2391 348 einfo (_("%F%P: could not create dummy IR bfd: %E\n"));
9e2278f5 349 return NULL;
5d3236ee
DK
350}
351
d44ad554 352/* Check if the BFD passed in is an IR dummy object file. */
f38a2680 353static inline bool
5d3236ee
DK
354is_ir_dummy_bfd (const bfd *abfd)
355{
cf4dc96f 356 /* ABFD can sometimes legitimately be NULL, e.g. when called from one
23ebe1a0
AM
357 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */
358 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
5d3236ee
DK
359}
360
361/* Helpers to convert between BFD and GOLD symbol formats. */
362static enum ld_plugin_status
363asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
f84854b6 364 const struct ld_plugin_symbol *ldsym)
5d3236ee
DK
365{
366 flagword flags = BSF_NO_FLAGS;
367 struct bfd_section *section;
368
369 asym->the_bfd = abfd;
f84854b6 370 asym->name = (ldsym->version
9e2278f5 371 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
f84854b6 372 : ldsym->name);
5d3236ee
DK
373 asym->value = 0;
374 switch (ldsym->def)
375 {
376 case LDPK_WEAKDEF:
377 flags = BSF_WEAK;
378 /* FALLTHRU */
379 case LDPK_DEF:
380 flags |= BSF_GLOBAL;
c77ec726
AM
381 if (ldsym->comdat_key)
382 {
383 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
384 (const char *) NULL);
385 section = bfd_get_section_by_name (abfd, name);
386 if (section != NULL)
387 free (name);
388 else
389 {
390 flagword sflags;
391
392 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
393 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
394 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
395 section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
396 if (section == NULL)
397 return LDPS_ERR;
398 }
399 }
400 else
401 section = bfd_get_section_by_name (abfd, ".text");
5d3236ee
DK
402 break;
403
404 case LDPK_WEAKUNDEF:
405 flags = BSF_WEAK;
406 /* FALLTHRU */
407 case LDPK_UNDEF:
408 section = bfd_und_section_ptr;
409 break;
410
411 case LDPK_COMMON:
412 flags = BSF_GLOBAL;
413 section = bfd_com_section_ptr;
414 asym->value = ldsym->size;
415 break;
416
417 default:
418 return LDPS_ERR;
419 }
420 asym->flags = flags;
421 asym->section = section;
422
5d3236ee
DK
423 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
424 {
c1229f84 425 elf_symbol_type *elfsym = elf_symbol_from (asym);
cfac8028
L
426 unsigned char visibility;
427
5d3236ee 428 if (!elfsym)
df5f2391 429 einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
0410b450
AM
430
431 if (ldsym->def == LDPK_COMMON)
432 {
433 elfsym->internal_elf_sym.st_shndx = SHN_COMMON;
434 elfsym->internal_elf_sym.st_value = 1;
435 }
436
cfac8028
L
437 switch (ldsym->visibility)
438 {
439 default:
df5f2391 440 einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"),
cfac8028 441 ldsym->visibility);
2b804145
AM
442 return LDPS_ERR;
443
cfac8028
L
444 case LDPV_DEFAULT:
445 visibility = STV_DEFAULT;
446 break;
447 case LDPV_PROTECTED:
448 visibility = STV_PROTECTED;
449 break;
450 case LDPV_INTERNAL:
451 visibility = STV_INTERNAL;
452 break;
453 case LDPV_HIDDEN:
454 visibility = STV_HIDDEN;
455 break;
456 }
0410b450 457 elfsym->internal_elf_sym.st_other |= visibility;
5d3236ee
DK
458 }
459
460 return LDPS_OK;
461}
462
463/* Register a claim-file handler. */
464static enum ld_plugin_status
465register_claim_file (ld_plugin_claim_file_handler handler)
466{
467 ASSERT (called_plugin);
468 called_plugin->claim_file_handler = handler;
469 return LDPS_OK;
470}
471
b21318bd
JM
472/* Register a claim-file version 2 handler. */
473static enum ld_plugin_status
474register_claim_file_v2 (ld_plugin_claim_file_handler_v2 handler)
475{
476 ASSERT (called_plugin);
477 called_plugin->claim_file_handler_v2 = handler;
478 return LDPS_OK;
479}
480
5d3236ee
DK
481/* Register an all-symbols-read handler. */
482static enum ld_plugin_status
483register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
484{
485 ASSERT (called_plugin);
486 called_plugin->all_symbols_read_handler = handler;
487 return LDPS_OK;
488}
489
490/* Register a cleanup handler. */
491static enum ld_plugin_status
492register_cleanup (ld_plugin_cleanup_handler handler)
493{
494 ASSERT (called_plugin);
495 called_plugin->cleanup_handler = handler;
496 return LDPS_OK;
497}
498
499/* Add symbols from a plugin-claimed input file. */
500static enum ld_plugin_status
501add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
502{
503 asymbol **symptrs;
f4b78d18
L
504 plugin_input_file_t *input = handle;
505 bfd *abfd = input->abfd;
7fe550fc 506 int n;
43e1669b 507
5d3236ee 508 ASSERT (called_plugin);
19bfbfa6
AM
509 symptrs = bfd_alloc (abfd, nsyms * sizeof *symptrs);
510 if (symptrs == NULL)
511 return LDPS_ERR;
7fe550fc 512 for (n = 0; n < nsyms; n++)
5d3236ee
DK
513 {
514 enum ld_plugin_status rv;
0c511000
AM
515 asymbol *bfdsym;
516
0c511000 517 bfdsym = bfd_make_empty_symbol (abfd);
7fe550fc 518 symptrs[n] = bfdsym;
19bfbfa6
AM
519 if (bfdsym == NULL)
520 return LDPS_ERR;
5d3236ee
DK
521 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
522 if (rv != LDPS_OK)
523 return rv;
524 }
7fe550fc 525 bfd_set_symtab (abfd, symptrs, nsyms);
5d3236ee
DK
526 return LDPS_OK;
527}
528
529/* Get the input file information with an open (possibly re-opened)
530 file descriptor. */
531static enum ld_plugin_status
f4b78d18 532get_input_file (const void *handle, struct ld_plugin_input_file *file)
5d3236ee 533{
f4b78d18
L
534 const plugin_input_file_t *input = handle;
535
5d3236ee 536 ASSERT (called_plugin);
f4b78d18
L
537
538 file->name = input->name;
539 file->offset = input->offset;
540 file->filesize = input->filesize;
541 file->handle = (void *) handle;
542
543 return LDPS_OK;
5d3236ee
DK
544}
545
15f7a26b
L
546/* Get view of the input file. */
547static enum ld_plugin_status
f4b78d18 548get_view (const void *handle, const void **viewp)
15f7a26b 549{
2aec968d 550 plugin_input_file_t *input = (plugin_input_file_t *) handle;
f4b78d18 551 char *buffer;
2aec968d 552 size_t size = input->filesize;
38604796
L
553 off_t offset = input->offset;
554#if HAVE_MMAP && HAVE_GETPAGESIZE
555 off_t bias;
fe905789 556#endif
f4b78d18 557
15f7a26b 558 ASSERT (called_plugin);
f4b78d18 559
2aec968d
L
560 /* FIXME: einfo should support %lld. */
561 if ((off_t) size != input->filesize)
df5f2391 562 einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"),
2aec968d 563 input->name, (long) input->filesize);
f4b78d18 564
2aec968d
L
565 /* Check the cached view buffer. */
566 if (input->view_buffer.addr != NULL
567 && input->view_buffer.filesize == size
38604796 568 && input->view_buffer.offset == offset)
2aec968d
L
569 {
570 *viewp = input->view_buffer.addr;
571 return LDPS_OK;
572 }
573
574 input->view_buffer.filesize = size;
38604796 575 input->view_buffer.offset = offset;
f4b78d18 576
2aec968d 577#if HAVE_MMAP
fe905789 578# if HAVE_GETPAGESIZE
38604796
L
579 bias = offset % plugin_pagesize;
580 offset -= bias;
fe905789
L
581 size += bias;
582# endif
583 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
584 if (buffer != MAP_FAILED)
38604796 585 {
f38a2680 586 input->use_mmap = true;
38604796
L
587# if HAVE_GETPAGESIZE
588 buffer += bias;
b677c456 589# endif
38604796
L
590 }
591 else
2aec968d 592#endif
f4b78d18 593 {
2aec968d
L
594 char *p;
595
f38a2680 596 input->use_mmap = false;
38604796
L
597
598 if (lseek (input->fd, offset, SEEK_SET) < 0)
2aec968d
L
599 return LDPS_ERR;
600
601 buffer = bfd_alloc (input->abfd, size);
602 if (buffer == NULL)
603 return LDPS_ERR;
604
605 p = buffer;
606 do
f4b78d18 607 {
2aec968d
L
608 ssize_t got = read (input->fd, p, size);
609 if (got == 0)
610 break;
611 else if (got > 0)
612 {
613 p += got;
614 size -= got;
615 }
616 else if (errno != EINTR)
617 return LDPS_ERR;
f4b78d18 618 }
2aec968d 619 while (size > 0);
f4b78d18 620 }
2aec968d
L
621
622 input->view_buffer.addr = buffer;
623 *viewp = buffer;
f4b78d18
L
624
625 return LDPS_OK;
15f7a26b
L
626}
627
91817247
L
628/* Release plugin file descriptor. */
629
630static void
631release_plugin_file_descriptor (plugin_input_file_t *input)
632{
633 if (input->fd != -1)
634 {
635 bfd_plugin_close_file_descriptor (input->ibfd, input->fd);
636 input->fd = -1;
637 }
638}
639
5d3236ee
DK
640/* Release the input file. */
641static enum ld_plugin_status
f4b78d18 642release_input_file (const void *handle)
5d3236ee 643{
119d62ff 644 plugin_input_file_t *input = (plugin_input_file_t *) handle;
5d3236ee 645 ASSERT (called_plugin);
91817247 646 release_plugin_file_descriptor (input);
f4b78d18 647 return LDPS_OK;
5d3236ee
DK
648}
649
42a851a9
DK
650/* Return TRUE if a defined symbol might be reachable from outside the
651 universe of claimed objects. */
f38a2680 652static inline bool
9bbc1a67 653is_visible_from_outside (struct ld_plugin_symbol *lsym,
f84854b6 654 struct bfd_link_hash_entry *blhe)
42a851a9 655{
0e1862bb 656 if (bfd_link_relocatable (&link_info))
f38a2680 657 return true;
4070765b 658 if (blhe->non_ir_ref_dynamic
59fa66c5
L
659 || link_info.export_dynamic
660 || bfd_link_dll (&link_info))
42a851a9 661 {
fd91d419
L
662 /* Check if symbol is hidden by version script. */
663 if (bfd_hide_sym_by_version (link_info.version_info,
664 blhe->root.string))
f38a2680 665 return false;
42a851a9 666 /* Only ELF symbols really have visibility. */
fc304b88 667 if (is_elf_hash_table (link_info.hash))
42a851a9
DK
668 {
669 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
670 int vis = ELF_ST_VISIBILITY (el->other);
671 return vis == STV_DEFAULT || vis == STV_PROTECTED;
672 }
673 /* On non-ELF targets, we can safely make inferences by considering
f84854b6 674 what visibility the plugin would have liked to apply when it first
42a851a9
DK
675 sent us the symbol. During ELF symbol processing, visibility only
676 ever becomes more restrictive, not less, when symbols are merged,
677 so this is a conservative estimate; it may give false positives,
678 declaring something visible from outside when it in fact would
679 not have been, but this will only lead to missed optimisation
680 opportunities during LTRANS at worst; it will not give false
681 negatives, which can lead to the disastrous conclusion that the
682 related symbol is IRONLY. (See GCC PR46319 for an example.) */
cfac8028
L
683 return (lsym->visibility == LDPV_DEFAULT
684 || lsym->visibility == LDPV_PROTECTED);
42a851a9 685 }
35ed3f94 686
f38a2680 687 return false;
42a851a9
DK
688}
689
8e5cb9a5 690/* Return LTO kind string name that corresponds to IDX enum value. */
7ea79cb3 691static const char *
8e5cb9a5 692get_lto_kind (unsigned int idx)
7ea79cb3 693{
694 static char buffer[64];
695 const char *lto_kind_str[5] =
696 {
697 "DEF",
698 "WEAKDEF",
699 "UNDEF",
700 "WEAKUNDEF",
701 "COMMON"
702 };
703
8e5cb9a5
JB
704 if (idx < ARRAY_SIZE (lto_kind_str))
705 return lto_kind_str [idx];
7ea79cb3 706
8e5cb9a5 707 sprintf (buffer, _("unknown LTO kind value %x"), idx);
7ea79cb3 708 return buffer;
709}
710
8e5cb9a5 711/* Return LTO resolution string name that corresponds to IDX enum value. */
7ea79cb3 712static const char *
8e5cb9a5 713get_lto_resolution (unsigned int idx)
7ea79cb3 714{
715 static char buffer[64];
716 static const char *lto_resolution_str[10] =
717 {
718 "UNKNOWN",
719 "UNDEF",
720 "PREVAILING_DEF",
721 "PREVAILING_DEF_IRONLY",
722 "PREEMPTED_REG",
723 "PREEMPTED_IR",
724 "RESOLVED_IR",
725 "RESOLVED_EXEC",
726 "RESOLVED_DYN",
727 "PREVAILING_DEF_IRONLY_EXP",
728 };
729
8e5cb9a5
JB
730 if (idx < ARRAY_SIZE (lto_resolution_str))
731 return lto_resolution_str [idx];
7ea79cb3 732
8e5cb9a5 733 sprintf (buffer, _("unknown LTO resolution value %x"), idx);
7ea79cb3 734 return buffer;
735}
736
8e5cb9a5 737/* Return LTO visibility string name that corresponds to IDX enum value. */
7ea79cb3 738static const char *
8e5cb9a5 739get_lto_visibility (unsigned int idx)
7ea79cb3 740{
741 static char buffer[64];
742 const char *lto_visibility_str[4] =
743 {
744 "DEFAULT",
745 "PROTECTED",
746 "INTERNAL",
747 "HIDDEN"
748 };
749
8e5cb9a5
JB
750 if (idx < ARRAY_SIZE (lto_visibility_str))
751 return lto_visibility_str [idx];
7ea79cb3 752
8e5cb9a5 753 sprintf (buffer, _("unknown LTO visibility value %x"), idx);
7ea79cb3 754 return buffer;
755}
756
5d3236ee
DK
757/* Get the symbol resolution info for a plugin-claimed input file. */
758static enum ld_plugin_status
69ee6ab2
AM
759get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
760 int def_ironly_exp)
5d3236ee 761{
f4b78d18
L
762 const plugin_input_file_t *input = handle;
763 const bfd *abfd = (const bfd *) input->abfd;
5d3236ee 764 int n;
69ee6ab2 765
5d3236ee
DK
766 ASSERT (called_plugin);
767 for (n = 0; n < nsyms; n++)
768 {
769 struct bfd_link_hash_entry *blhe;
42a851a9 770 asection *owner_sec;
69ee6ab2 771 int res;
6fe014bc
L
772 struct bfd_link_hash_entry *h
773 = bfd_link_hash_lookup (link_info.hash, syms[n].name,
f38a2680 774 false, false, true);
6fe014bc 775 enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none;
69ee6ab2 776
6fe014bc
L
777 if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF)
778 {
779 blhe = h;
a78fca7b 780 if (blhe && link_info.wrap_hash != NULL)
6fe014bc
L
781 {
782 /* Check if a symbol is a wrapper symbol. */
783 struct bfd_link_hash_entry *unwrap
784 = unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe);
785 if (unwrap && unwrap != h)
786 wrap_status = wrapper;
787 }
788 }
10be1b6a 789 else
6fe014bc
L
790 {
791 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd,
792 &link_info, syms[n].name,
f38a2680 793 false, false, true);
6fe014bc
L
794 /* Check if a symbol is a wrapped symbol. */
795 if (blhe && blhe != h)
796 wrap_status = wrapped;
797 }
5d3236ee
DK
798 if (!blhe)
799 {
3355cb3b
L
800 /* The plugin is called to claim symbols in an archive element
801 from plugin_object_p. But those symbols aren't needed to
802 create output. They are defined and referenced only within
803 IR. */
804 switch (syms[n].def)
805 {
806 default:
807 abort ();
808 case LDPK_UNDEF:
809 case LDPK_WEAKUNDEF:
810 res = LDPR_UNDEF;
811 break;
812 case LDPK_DEF:
813 case LDPK_WEAKDEF:
814 case LDPK_COMMON:
815 res = LDPR_PREVAILING_DEF_IRONLY;
816 break;
817 }
1715a13c 818 goto report_symbol;
5d3236ee
DK
819 }
820
821 /* Determine resolution from blhe type and symbol's original type. */
822 if (blhe->type == bfd_link_hash_undefined
f84854b6 823 || blhe->type == bfd_link_hash_undefweak)
5d3236ee 824 {
69ee6ab2 825 res = LDPR_UNDEF;
1715a13c 826 goto report_symbol;
5d3236ee
DK
827 }
828 if (blhe->type != bfd_link_hash_defined
f84854b6
L
829 && blhe->type != bfd_link_hash_defweak
830 && blhe->type != bfd_link_hash_common)
5d3236ee
DK
831 {
832 /* We should not have a new, indirect or warning symbol here. */
df5f2391 833 einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"),
f84854b6 834 called_plugin->name, blhe->type);
5d3236ee
DK
835 }
836
42a851a9
DK
837 /* Find out which section owns the symbol. Since it's not undef,
838 it must have an owner; if it's not a common symbol, both defs
839 and weakdefs keep it in the same place. */
9e2278f5
AM
840 owner_sec = (blhe->type == bfd_link_hash_common
841 ? blhe->u.c.p->section
842 : blhe->u.def.section);
42a851a9 843
5d3236ee
DK
844
845 /* If it was originally undefined or common, then it has been
f84854b6
L
846 resolved; determine how. */
847 if (syms[n].def == LDPK_UNDEF
848 || syms[n].def == LDPK_WEAKUNDEF
5d3236ee
DK
849 || syms[n].def == LDPK_COMMON)
850 {
5d3236ee 851 if (owner_sec->owner == link_info.output_bfd)
69ee6ab2 852 res = LDPR_RESOLVED_EXEC;
5d3236ee 853 else if (owner_sec->owner == abfd)
69ee6ab2 854 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee 855 else if (is_ir_dummy_bfd (owner_sec->owner))
69ee6ab2 856 res = LDPR_RESOLVED_IR;
cc322803
L
857 else if (owner_sec->owner != NULL
858 && (owner_sec->owner->flags & DYNAMIC) != 0)
69ee6ab2 859 res = LDPR_RESOLVED_DYN;
5d3236ee 860 else
69ee6ab2 861 res = LDPR_RESOLVED_EXEC;
5d3236ee
DK
862 }
863
864 /* Was originally def, or weakdef. Does it prevail? If the
f84854b6 865 owner is the original dummy bfd that supplied it, then this
5d3236ee 866 is the definition that has prevailed. */
69ee6ab2
AM
867 else if (owner_sec->owner == link_info.output_bfd)
868 res = LDPR_PREEMPTED_REG;
42a851a9 869 else if (owner_sec->owner == abfd)
69ee6ab2 870 res = LDPR_PREVAILING_DEF_IRONLY;
5d3236ee
DK
871
872 /* Was originally def, weakdef, or common, but has been pre-empted. */
69ee6ab2
AM
873 else if (is_ir_dummy_bfd (owner_sec->owner))
874 res = LDPR_PREEMPTED_IR;
875 else
876 res = LDPR_PREEMPTED_REG;
877
878 if (res == LDPR_PREVAILING_DEF_IRONLY)
879 {
880 /* We need to know if the sym is referenced from non-IR files. Or
881 even potentially-referenced, perhaps in a future final link if
882 this is a partial one, perhaps dynamically at load-time if the
da422fa4
L
883 symbol is externally visible. Also check for __real_SYM
884 reference and wrapper symbol. */
885 if (blhe->non_ir_ref_regular
886 || blhe->ref_real
887 || wrap_status == wrapper)
69ee6ab2 888 res = LDPR_PREVAILING_DEF;
6fe014bc
L
889 else if (wrap_status == wrapped)
890 res = LDPR_RESOLVED_IR;
9bbc1a67 891 else if (is_visible_from_outside (&syms[n], blhe))
69ee6ab2
AM
892 res = def_ironly_exp;
893 }
1715a13c 894
9e2278f5 895 report_symbol:
69ee6ab2 896 syms[n].resolution = res;
1715a13c 897 if (report_plugin_symbols)
871b3ab2 898 einfo (_("%P: %pB: symbol `%s' "
7ea79cb3 899 "definition: %s, visibility: %s, resolution: %s\n"),
9e2278f5 900 abfd, syms[n].name,
7ea79cb3 901 get_lto_kind (syms[n].def),
902 get_lto_visibility (syms[n].visibility),
903 get_lto_resolution (res));
5d3236ee
DK
904 }
905 return LDPS_OK;
906}
907
69ee6ab2
AM
908static enum ld_plugin_status
909get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
910{
911 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
912}
913
914static enum ld_plugin_status
915get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
916{
917 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
918}
919
5d3236ee
DK
920/* Add a new (real) input file generated by a plugin. */
921static enum ld_plugin_status
922add_input_file (const char *pathname)
923{
ce875075
AM
924 lang_input_statement_type *is;
925
5d3236ee 926 ASSERT (called_plugin);
ce875075
AM
927 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
928 NULL);
929 if (!is)
5d3236ee 930 return LDPS_ERR;
ce875075 931 is->flags.lto_output = 1;
5d3236ee
DK
932 return LDPS_OK;
933}
934
935/* Add a new (real) library required by a plugin. */
936static enum ld_plugin_status
937add_input_library (const char *pathname)
938{
ce875075
AM
939 lang_input_statement_type *is;
940
5d3236ee 941 ASSERT (called_plugin);
ce875075
AM
942 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
943 NULL);
944 if (!is)
5d3236ee 945 return LDPS_ERR;
ce875075 946 is->flags.lto_output = 1;
5d3236ee
DK
947 return LDPS_OK;
948}
949
950/* Set the extra library path to be used by libraries added via
951 add_input_library. */
952static enum ld_plugin_status
953set_extra_library_path (const char *path)
954{
955 ASSERT (called_plugin);
f38a2680 956 ldfile_add_library_path (xstrdup (path), false);
5d3236ee
DK
957 return LDPS_OK;
958}
959
960/* Issue a diagnostic message from a plugin. */
961static enum ld_plugin_status
962message (int level, const char *format, ...)
963{
964 va_list args;
965 va_start (args, format);
966
967 switch (level)
968 {
969 case LDPL_INFO:
f38a2680 970 vfinfo (stdout, format, args, false);
d251c5c4 971 putchar ('\n');
5d3236ee
DK
972 break;
973 case LDPL_WARNING:
45e81354 974 {
df5f2391 975 char *newfmt = concat (_("%P: warning: "), format, "\n",
e1fa0163 976 (const char *) NULL);
f38a2680 977 vfinfo (stdout, newfmt, args, true);
e1fa0163 978 free (newfmt);
45e81354 979 }
5d3236ee
DK
980 break;
981 case LDPL_FATAL:
982 case LDPL_ERROR:
983 default:
9e2278f5 984 {
df5f2391
AM
985 char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X",
986 _("%P: error: "), format, "\n",
e1fa0163 987 (const char *) NULL);
9e2278f5 988 fflush (stdout);
f38a2680 989 vfinfo (stderr, newfmt, args, true);
9e2278f5 990 fflush (stderr);
e1fa0163 991 free (newfmt);
9e2278f5 992 }
5d3236ee
DK
993 break;
994 }
995
996 va_end (args);
997 return LDPS_OK;
998}
999
1000/* Helper to size leading part of tv array and set it up. */
69ee6ab2 1001static void
5d3236ee
DK
1002set_tv_header (struct ld_plugin_tv *tv)
1003{
1004 size_t i;
1005
1006 /* Version info. */
1007 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
1008 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
1009
5d3236ee
DK
1010 for (i = 0; i < tv_header_size; i++)
1011 {
1012 tv[i].tv_tag = tv_header_tags[i];
1013#define TVU(x) tv[i].tv_u.tv_ ## x
1014 switch (tv[i].tv_tag)
1015 {
f84854b6
L
1016 case LDPT_MESSAGE:
1017 TVU(message) = message;
1018 break;
1019 case LDPT_API_VERSION:
1020 TVU(val) = LD_PLUGIN_API_VERSION;
1021 break;
1022 case LDPT_GNU_LD_VERSION:
1023 TVU(val) = major * 100 + minor;
1024 break;
1025 case LDPT_LINKER_OUTPUT:
64d94ba0
AM
1026 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
1027 : bfd_link_pde (&link_info) ? LDPO_EXEC
1028 : bfd_link_pie (&link_info) ? LDPO_PIE
1029 : LDPO_DYN);
f84854b6
L
1030 break;
1031 case LDPT_OUTPUT_NAME:
1032 TVU(string) = output_filename;
1033 break;
1034 case LDPT_REGISTER_CLAIM_FILE_HOOK:
1035 TVU(register_claim_file) = register_claim_file;
1036 break;
b21318bd
JM
1037 case LDPT_REGISTER_CLAIM_FILE_HOOK_V2:
1038 TVU(register_claim_file_v2) = register_claim_file_v2;
1039 break;
f84854b6
L
1040 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
1041 TVU(register_all_symbols_read) = register_all_symbols_read;
1042 break;
1043 case LDPT_REGISTER_CLEANUP_HOOK:
1044 TVU(register_cleanup) = register_cleanup;
1045 break;
1046 case LDPT_ADD_SYMBOLS:
1047 TVU(add_symbols) = add_symbols;
1048 break;
1049 case LDPT_GET_INPUT_FILE:
1050 TVU(get_input_file) = get_input_file;
1051 break;
15f7a26b
L
1052 case LDPT_GET_VIEW:
1053 TVU(get_view) = get_view;
1054 break;
f84854b6
L
1055 case LDPT_RELEASE_INPUT_FILE:
1056 TVU(release_input_file) = release_input_file;
1057 break;
1058 case LDPT_GET_SYMBOLS:
69ee6ab2
AM
1059 TVU(get_symbols) = get_symbols_v1;
1060 break;
1061 case LDPT_GET_SYMBOLS_V2:
1062 TVU(get_symbols) = get_symbols_v2;
f84854b6
L
1063 break;
1064 case LDPT_ADD_INPUT_FILE:
1065 TVU(add_input_file) = add_input_file;
1066 break;
1067 case LDPT_ADD_INPUT_LIBRARY:
1068 TVU(add_input_library) = add_input_library;
1069 break;
1070 case LDPT_SET_EXTRA_LIBRARY_PATH:
1071 TVU(set_extra_library_path) = set_extra_library_path;
1072 break;
1073 default:
1074 /* Added a new entry to the array without adding
1075 a new case to set up its value is a bug. */
1076 FAIL ();
5d3236ee
DK
1077 }
1078#undef TVU
1079 }
5d3236ee
DK
1080}
1081
1082/* Append the per-plugin args list and trailing LDPT_NULL to tv. */
1083static void
1084set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
1085{
1086 plugin_arg_t *arg = plugin->args;
1087 while (arg)
1088 {
1089 tv->tv_tag = LDPT_OPTION;
1090 tv->tv_u.tv_string = arg->arg;
1091 arg = arg->next;
1092 tv++;
1093 }
1094 tv->tv_tag = LDPT_NULL;
1095 tv->tv_u.tv_val = 0;
1096}
1097
1098/* Load up and initialise all plugins after argument parsing. */
d82184d7 1099void
d44ad554 1100plugin_load_plugins (void)
5d3236ee
DK
1101{
1102 struct ld_plugin_tv *my_tv;
1103 unsigned int max_args = 0;
1104 plugin_t *curplug = plugins_list;
1105
1106 /* If there are no plugins, we need do nothing this run. */
1107 if (!curplug)
d82184d7 1108 return;
5d3236ee
DK
1109
1110 /* First pass over plugins to find max # args needed so that we
1111 can size and allocate the tv array. */
1112 while (curplug)
1113 {
1114 if (curplug->n_args > max_args)
1115 max_args = curplug->n_args;
1116 curplug = curplug->next;
1117 }
1118
1119 /* Allocate tv array and initialise constant part. */
1120 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1121 set_tv_header (my_tv);
1122
1123 /* Pass over plugins again, activating them. */
1124 curplug = plugins_list;
1125 while (curplug)
1126 {
1127 enum ld_plugin_status rv;
a8f9d13e
AM
1128 ld_plugin_onload onloadfn;
1129
1130 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
5d3236ee 1131 if (!onloadfn)
a8f9d13e 1132 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
5d3236ee 1133 if (!onloadfn)
df5f2391 1134 einfo (_("%F%P: %s: error loading plugin: %s\n"),
d82184d7 1135 curplug->name, dlerror ());
5d3236ee
DK
1136 set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1137 called_plugin = curplug;
1138 rv = (*onloadfn) (my_tv);
1139 called_plugin = NULL;
1140 if (rv != LDPS_OK)
df5f2391 1141 einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv);
5d3236ee
DK
1142 curplug = curplug->next;
1143 }
1144
1145 /* Since plugin(s) inited ok, assume they're going to want symbol
1146 resolutions, which needs us to track which symbols are referenced
1147 by non-IR files using the linker's notice callback. */
9e2278f5
AM
1148 orig_notice_all = link_info.notice_all;
1149 orig_callbacks = link_info.callbacks;
1150 plugin_callbacks = *orig_callbacks;
1151 plugin_callbacks.notice = &plugin_notice;
f38a2680
AM
1152 link_info.notice_all = true;
1153 link_info.lto_plugin_active = true;
9e2278f5 1154 link_info.callbacks = &plugin_callbacks;
38604796 1155
5ae0078c
L
1156 register_ld_plugin_object_p (plugin_object_p);
1157
38604796 1158#if HAVE_MMAP && HAVE_GETPAGESIZE
fd5a1509 1159 plugin_pagesize = getpagesize ();
38604796 1160#endif
5d3236ee
DK
1161}
1162
1163/* Call 'claim file' hook for all plugins. */
02d00247 1164static int
b21318bd
JM
1165plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed,
1166 bool known_used)
5d3236ee
DK
1167{
1168 plugin_t *curplug = plugins_list;
f38a2680 1169 *claimed = false;
5d3236ee
DK
1170 while (curplug && !*claimed)
1171 {
1172 if (curplug->claim_file_handler)
1173 {
1174 enum ld_plugin_status rv;
ace667e5 1175
5d3236ee 1176 called_plugin = curplug;
b21318bd
JM
1177 if (curplug->claim_file_handler_v2)
1178 rv = (*curplug->claim_file_handler_v2) (file, claimed, known_used);
1179 else
1180 rv = (*curplug->claim_file_handler) (file, claimed);
5d3236ee
DK
1181 called_plugin = NULL;
1182 if (rv != LDPS_OK)
1183 set_plugin_error (curplug->name);
1184 }
1185 curplug = curplug->next;
1186 }
1187 return plugin_error_p () ? -1 : 0;
1188}
1189
35a1e5f3
L
1190/* Duplicates a character string with memory attached to ABFD. */
1191
1192static char *
1193plugin_strdup (bfd *abfd, const char *str)
1194{
1195 size_t strlength;
1196 char *copy;
1197 strlength = strlen (str) + 1;
1198 copy = bfd_alloc (abfd, strlength);
1199 if (copy == NULL)
df5f2391 1200 einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"),
35a1e5f3
L
1201 bfd_get_error ());
1202 memcpy (copy, str, strlength);
1203 return copy;
1204}
1205
cb001c0d
AM
1206static void
1207plugin_cleanup (bfd *abfd ATTRIBUTE_UNUSED)
1208{
1209}
1210
1211static bfd_cleanup
b21318bd 1212plugin_object_p (bfd *ibfd, bool known_used)
02d00247 1213{
5ae0078c 1214 int claimed;
f4b78d18 1215 plugin_input_file_t *input;
35a1e5f3
L
1216 struct ld_plugin_input_file file;
1217 bfd *abfd;
5ae0078c
L
1218
1219 /* Don't try the dummy object file. */
1220 if ((ibfd->flags & BFD_PLUGIN) != 0)
1221 return NULL;
1222
49f30d83 1223 if (ibfd->plugin_format != bfd_plugin_unknown)
5ae0078c
L
1224 {
1225 if (ibfd->plugin_format == bfd_plugin_yes)
cb001c0d 1226 return plugin_cleanup;
5ae0078c
L
1227 else
1228 return NULL;
1229 }
1230
02d00247
AM
1231 /* We create a dummy BFD, initially empty, to house whatever symbols
1232 the plugin may want to add. */
607b4833 1233 abfd = plugin_get_ir_dummy_bfd (bfd_get_filename (ibfd), ibfd);
f4b78d18
L
1234
1235 input = bfd_alloc (abfd, sizeof (*input));
1236 if (input == NULL)
df5f2391 1237 einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"),
f4b78d18
L
1238 bfd_get_error ());
1239
7d0b9ebc
AM
1240 if (!bfd_plugin_open_input (ibfd, &file))
1241 return NULL;
35a1e5f3 1242
607b4833 1243 if (file.name == bfd_get_filename (ibfd))
7d0b9ebc 1244 {
35a1e5f3
L
1245 /* We must copy filename attached to ibfd if it is not an archive
1246 member since it may be freed by bfd_close below. */
7d0b9ebc 1247 file.name = plugin_strdup (abfd, file.name);
35a1e5f3
L
1248 }
1249
35a1e5f3 1250 file.handle = input;
f4b78d18 1251 input->abfd = abfd;
7a30ac44 1252 input->ibfd = ibfd->my_archive != NULL ? ibfd : NULL;
2aec968d
L
1253 input->view_buffer.addr = NULL;
1254 input->view_buffer.filesize = 0;
1255 input->view_buffer.offset = 0;
7d0b9ebc 1256 input->fd = file.fd;
f38a2680 1257 input->use_mmap = false;
7d0b9ebc
AM
1258 input->offset = file.offset;
1259 input->filesize = file.filesize;
607b4833 1260 input->name = plugin_strdup (abfd, bfd_get_filename (ibfd));
f4b78d18 1261
5ae0078c
L
1262 claimed = 0;
1263
b21318bd 1264 if (plugin_call_claim_file (&file, &claimed, known_used))
df5f2391 1265 einfo (_("%F%P: %s: plugin reported error claiming file\n"),
02d00247 1266 plugin_error_plugin ());
f4b78d18 1267
91817247
L
1268 if (input->fd != -1
1269 && (!claimed || !bfd_plugin_target_p (ibfd->xvec)))
f4b78d18 1270 {
5ae0078c
L
1271 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which
1272 doesn't need fd after plugin_call_claim_file, doesn't use
1273 BFD plugin target vector. Since GCC plugin doesn't call
1274 release_input_file, we close it here. LLVM plugin, which
1275 needs fd after plugin_call_claim_file and calls
1276 release_input_file after it is done, uses BFD plugin target
1277 vector. This scheme doesn't work when a plugin needs fd and
1278 doesn't use BFD plugin target vector neither. */
91817247 1279 release_plugin_file_descriptor (input);
f4b78d18
L
1280 }
1281
02d00247
AM
1282 if (claimed)
1283 {
5ae0078c
L
1284 ibfd->plugin_format = bfd_plugin_yes;
1285 ibfd->plugin_dummy_bfd = abfd;
35a1e5f3 1286 bfd_make_readable (abfd);
2aa90762 1287 abfd->no_export = ibfd->no_export;
cb001c0d 1288 return plugin_cleanup;
02d00247
AM
1289 }
1290 else
1291 {
38604796
L
1292#if HAVE_MMAP
1293 if (input->use_mmap)
1294 {
1295 /* If plugin didn't claim the file, unmap the buffer. */
1296 char *addr = input->view_buffer.addr;
1297 off_t size = input->view_buffer.filesize;
1298# if HAVE_GETPAGESIZE
1299 off_t bias = input->view_buffer.offset % plugin_pagesize;
1300 size += bias;
1301 addr -= bias;
1302# endif
1303 munmap (addr, size);
1304 }
1305#endif
1306
02d00247
AM
1307 /* If plugin didn't claim the file, we don't need the dummy bfd.
1308 Can't avoid speculatively creating it, alas. */
5ae0078c 1309 ibfd->plugin_format = bfd_plugin_no;
f4b78d18 1310 bfd_close_all_done (abfd);
5ae0078c
L
1311 return NULL;
1312 }
1313}
1314
1315void
1316plugin_maybe_claim (lang_input_statement_type *entry)
1317{
fb47deda 1318 ASSERT (entry->header.type == lang_input_statement_enum);
b21318bd 1319 if (plugin_object_p (entry->the_bfd, true))
5ae0078c
L
1320 {
1321 bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1322
1323 /* Discard the real file's BFD and substitute the dummy one. */
1324
b0cffb47
AM
1325 /* We can't call bfd_close on archives. BFD archive handling
1326 caches elements, and add_archive_element keeps pointers to
1327 the_bfd and the_bfd->filename in a lang_input_statement_type
1328 linker script statement. */
5ae0078c
L
1329 if (entry->the_bfd->my_archive == NULL)
1330 bfd_close (entry->the_bfd);
1331 entry->the_bfd = abfd;
1332 entry->flags.claimed = 1;
02d00247
AM
1333 }
1334}
1335
5d3236ee
DK
1336/* Call 'all symbols read' hook for all plugins. */
1337int
1338plugin_call_all_symbols_read (void)
1339{
1340 plugin_t *curplug = plugins_list;
1341
1342 /* Disable any further file-claiming. */
f38a2680 1343 no_more_claiming = true;
5d3236ee 1344
5d3236ee
DK
1345 while (curplug)
1346 {
1347 if (curplug->all_symbols_read_handler)
1348 {
1349 enum ld_plugin_status rv;
1350 called_plugin = curplug;
1351 rv = (*curplug->all_symbols_read_handler) ();
1352 called_plugin = NULL;
1353 if (rv != LDPS_OK)
1354 set_plugin_error (curplug->name);
1355 }
1356 curplug = curplug->next;
1357 }
1358 return plugin_error_p () ? -1 : 0;
1359}
1360
e73d965c 1361/* Call 'cleanup' hook for all plugins at exit. */
498cd2a0 1362void
5d3236ee
DK
1363plugin_call_cleanup (void)
1364{
1365 plugin_t *curplug = plugins_list;
1366 while (curplug)
1367 {
1368 if (curplug->cleanup_handler && !curplug->cleanup_done)
1369 {
d9511b64
L
1370 if (!config.plugin_save_temps)
1371 {
1372 enum ld_plugin_status rv;
1373 curplug->cleanup_done = true;
1374 called_plugin = curplug;
1375 rv = (*curplug->cleanup_handler) ();
1376 called_plugin = NULL;
1377 if (rv != LDPS_OK)
1378 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1379 curplug->name, rv);
1380 }
5d3236ee
DK
1381 dlclose (curplug->dlhandle);
1382 }
1383 curplug = curplug->next;
1384 }
5d3236ee
DK
1385}
1386
5d3236ee
DK
1387/* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1388 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
35ed3f94 1389 the linker adds them to the linker hash table. Mark those
bc4e12de 1390 referenced from a non-IR file with non_ir_ref_regular or
4070765b
AM
1391 non_ir_ref_dynamic as appropriate. We have to notice_all symbols,
1392 because we won't necessarily know until later which ones will be
1393 contributed by IR files. */
f38a2680 1394static bool
9e2278f5 1395plugin_notice (struct bfd_link_info *info,
35ed3f94 1396 struct bfd_link_hash_entry *h,
46135103 1397 struct bfd_link_hash_entry *inh,
9e2278f5
AM
1398 bfd *abfd,
1399 asection *section,
16d96b5b 1400 bfd_vma value,
46135103 1401 flagword flags)
5d3236ee 1402{
46135103
AM
1403 struct bfd_link_hash_entry *orig_h = h;
1404
35ed3f94 1405 if (h != NULL)
5d3236ee 1406 {
cd6eee13 1407 bfd *sym_bfd;
f38a2680 1408 bool ref = false;
cd6eee13 1409
46135103
AM
1410 if (h->type == bfd_link_hash_warning)
1411 h = h->u.i.link;
1412
4a2b04a7 1413 /* Nothing to do here if this def/ref is from an IR dummy BFD. */
9e2278f5 1414 if (is_ir_dummy_bfd (abfd))
4a2b04a7 1415 ;
9e2278f5 1416
16d96b5b
AM
1417 /* Making an indirect symbol counts as a reference unless this
1418 is a brand new symbol. */
4a2b04a7
L
1419 else if (bfd_is_ind_section (section)
1420 || (flags & BSF_INDIRECT) != 0)
16d96b5b 1421 {
46135103
AM
1422 /* ??? Some of this is questionable. See comments in
1423 _bfd_generic_link_add_one_symbol for case IND. */
4070765b
AM
1424 if (h->type != bfd_link_hash_new
1425 || inh->type == bfd_link_hash_new)
16d96b5b 1426 {
4070765b 1427 if ((abfd->flags & DYNAMIC) == 0)
f38a2680 1428 inh->non_ir_ref_regular = true;
4070765b 1429 else
f38a2680 1430 inh->non_ir_ref_dynamic = true;
16d96b5b 1431 }
4070765b
AM
1432
1433 if (h->type != bfd_link_hash_new)
f38a2680 1434 ref = true;
16d96b5b
AM
1435 }
1436
1437 /* Nothing to do here for warning symbols. */
1438 else if ((flags & BSF_WARNING) != 0)
1439 ;
1440
1441 /* Nothing to do here for constructor symbols. */
1442 else if ((flags & BSF_CONSTRUCTOR) != 0)
1443 ;
1444
35ed3f94 1445 /* If this is a ref, set non_ir_ref. */
16d96b5b 1446 else if (bfd_is_und_section (section))
3d5bef4c
L
1447 {
1448 /* Replace the undefined dummy bfd with the real one. */
4070765b
AM
1449 if ((h->type == bfd_link_hash_undefined
1450 || h->type == bfd_link_hash_undefweak)
1451 && (h->u.undef.abfd == NULL
1452 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
59fa66c5 1453 h->u.undef.abfd = abfd;
f38a2680 1454 ref = true;
3d5bef4c 1455 }
35ed3f94 1456
af4fa23f
AM
1457
1458 /* A common symbol should be merged with other commons or
1459 defs with the same name. In particular, a common ought
1460 to be overridden by a def in a -flto object. In that
1461 sense a common is also a ref. */
1462 else if (bfd_is_com_section (section))
cd6eee13 1463 {
af4fa23f
AM
1464 if (h->type == bfd_link_hash_common
1465 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))
0616a280
AM
1466 {
1467 h->type = bfd_link_hash_undefweak;
1468 h->u.undef.abfd = sym_bfd;
1469 }
f38a2680 1470 ref = true;
af4fa23f 1471 }
4070765b 1472
af4fa23f
AM
1473 /* Otherwise, it must be a new def.
1474 Ensure any symbol defined in an IR dummy BFD takes on a
1475 new value from a real BFD. Weak symbols are not normally
1476 overridden by a new weak definition, and strong symbols
1477 will normally cause multiple definition errors. Avoid
0e6a3f07
L
1478 this by making the symbol appear to be undefined.
1479
1480 NB: We change the previous definition in the IR object to
04e433a8
L
1481 undefweak only after all LTO symbols have been read or for
1482 non-ELF targets. */
1483 else if ((info->lto_all_symbols_read
1484 || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
0e6a3f07
L
1485 && (((h->type == bfd_link_hash_defweak
1486 || h->type == bfd_link_hash_defined)
1487 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1488 || (h->type == bfd_link_hash_common
1489 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))))
af4fa23f
AM
1490 {
1491 h->type = bfd_link_hash_undefweak;
1492 h->u.undef.abfd = sym_bfd;
4070765b
AM
1493 }
1494
1495 if (ref)
1496 {
1497 if ((abfd->flags & DYNAMIC) == 0)
f38a2680 1498 h->non_ir_ref_regular = true;
4070765b 1499 else
f38a2680 1500 h->non_ir_ref_dynamic = true;
cd6eee13 1501 }
5d3236ee
DK
1502 }
1503
1504 /* Continue with cref/nocrossref/trace-sym processing. */
46135103 1505 if (orig_h == NULL
9e2278f5
AM
1506 || orig_notice_all
1507 || (info->notice_hash != NULL
46135103 1508 && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
f38a2680 1509 false, false) != NULL))
46135103
AM
1510 return (*orig_callbacks->notice) (info, orig_h, inh,
1511 abfd, section, value, flags);
f38a2680 1512 return true;
5d3236ee 1513}
0381901e 1514#endif /* BFD_SUPPORTS_PLUGINS */