| /* Plugin control for the GNU linker. |
| Copyright (C) 2010-2024 Free Software Foundation, Inc. |
| |
| This file is part of the GNU Binutils. |
| |
| This program is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License as published by |
| the Free Software Foundation; either version 3 of the License, or |
| (at your option) any later version. |
| |
| This program is distributed in the hope that it will be useful, |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| GNU General Public License for more details. |
| |
| You should have received a copy of the GNU General Public License |
| along with this program; if not, write to the Free Software |
| Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, |
| MA 02110-1301, USA. */ |
| |
| #include "sysdep.h" |
| #include "libiberty.h" |
| #include "bfd.h" |
| #if BFD_SUPPORTS_PLUGINS |
| #include "bfdlink.h" |
| #include "bfdver.h" |
| #include "ctf-api.h" |
| #include "ld.h" |
| #include "ldmain.h" |
| #include "ldmisc.h" |
| #include "ldexp.h" |
| #include "ldlang.h" |
| #include "ldfile.h" |
| #include "plugin-api.h" |
| #include "../bfd/plugin.h" |
| #include "plugin.h" |
| #include "elf-bfd.h" |
| #if HAVE_MMAP |
| # include <sys/mman.h> |
| # ifndef MAP_FAILED |
| # define MAP_FAILED ((void *) -1) |
| # endif |
| # ifndef PROT_READ |
| # define PROT_READ 0 |
| # endif |
| # ifndef MAP_PRIVATE |
| # define MAP_PRIVATE 0 |
| # endif |
| #endif |
| #include <errno.h> |
| #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO)) |
| extern int errno; |
| #endif |
| #if defined (HAVE_DLFCN_H) |
| #include <dlfcn.h> |
| #elif defined (HAVE_WINDOWS_H) |
| #include <windows.h> |
| #endif |
| |
| /* Report plugin symbols. */ |
| bool report_plugin_symbols; |
| |
| /* The suffix to append to the name of the real (claimed) object file |
| when generating a dummy BFD to hold the IR symbols sent from the |
| plugin. For cosmetic use only; appears in maps, crefs etc. */ |
| #define IRONLY_SUFFIX " (symbol from plugin)" |
| |
| /* Stores a single argument passed to a plugin. */ |
| typedef struct plugin_arg |
| { |
| struct plugin_arg *next; |
| const char *arg; |
| } plugin_arg_t; |
| |
| /* Holds all details of a single plugin. */ |
| typedef struct plugin |
| { |
| /* Next on the list of plugins, or NULL at end of chain. */ |
| struct plugin *next; |
| /* The argument string given to --plugin. */ |
| const char *name; |
| /* The shared library handle returned by dlopen. */ |
| void *dlhandle; |
| /* The list of argument string given to --plugin-opt. */ |
| plugin_arg_t *args; |
| /* Number of args in the list, for convenience. */ |
| size_t n_args; |
| /* The plugin's event handlers. */ |
| ld_plugin_claim_file_handler claim_file_handler; |
| ld_plugin_claim_file_handler_v2 claim_file_handler_v2; |
| ld_plugin_all_symbols_read_handler all_symbols_read_handler; |
| ld_plugin_cleanup_handler cleanup_handler; |
| /* TRUE if the cleanup handlers have been called. */ |
| bool cleanup_done; |
| } plugin_t; |
| |
| typedef struct view_buffer |
| { |
| char *addr; |
| size_t filesize; |
| off_t offset; |
| } view_buffer_t; |
| |
| /* The internal version of struct ld_plugin_input_file with a BFD |
| pointer. */ |
| typedef struct plugin_input_file |
| { |
| /* The dummy BFD. */ |
| bfd *abfd; |
| /* The original input BFD. Non-NULL if it is an archive member. */ |
| bfd *ibfd; |
| view_buffer_t view_buffer; |
| char *name; |
| int fd; |
| bool use_mmap; |
| off_t offset; |
| off_t filesize; |
| } plugin_input_file_t; |
| |
| /* The master list of all plugins. */ |
| static plugin_t *plugins_list = NULL; |
| |
| /* We keep a tail pointer for easy linking on the end. */ |
| static plugin_t **plugins_tail_chain_ptr = &plugins_list; |
| |
| /* The last plugin added to the list, for receiving args. */ |
| static plugin_t *last_plugin = NULL; |
| |
| /* The tail of the arg chain of the last plugin added to the list. */ |
| static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL; |
| |
| /* The plugin which is currently having a callback executed. */ |
| static plugin_t *called_plugin = NULL; |
| |
| /* Last plugin to cause an error, if any. */ |
| static const char *error_plugin = NULL; |
| |
| /* State of linker "notice" interface before we poked at it. */ |
| static bool orig_notice_all; |
| |
| /* Original linker callbacks, and the plugin version. */ |
| static const struct bfd_link_callbacks *orig_callbacks; |
| static struct bfd_link_callbacks plugin_callbacks; |
| |
| /* Set at all symbols read time, to avoid recursively offering the plugin |
| its own newly-added input files and libs to claim. */ |
| bool no_more_claiming = false; |
| |
| #if HAVE_MMAP && HAVE_GETPAGESIZE |
| /* Page size used by mmap. */ |
| static off_t plugin_pagesize; |
| #endif |
| |
| /* List of tags to set in the constant leading part of the tv array. */ |
| static const enum ld_plugin_tag tv_header_tags[] = |
| { |
| LDPT_MESSAGE, |
| LDPT_API_VERSION, |
| LDPT_GNU_LD_VERSION, |
| LDPT_LINKER_OUTPUT, |
| LDPT_OUTPUT_NAME, |
| LDPT_REGISTER_CLAIM_FILE_HOOK, |
| LDPT_REGISTER_CLAIM_FILE_HOOK_V2, |
| LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK, |
| LDPT_REGISTER_CLEANUP_HOOK, |
| LDPT_ADD_SYMBOLS, |
| LDPT_GET_INPUT_FILE, |
| LDPT_GET_VIEW, |
| LDPT_RELEASE_INPUT_FILE, |
| LDPT_GET_SYMBOLS, |
| LDPT_GET_SYMBOLS_V2, |
| LDPT_ADD_INPUT_FILE, |
| LDPT_ADD_INPUT_LIBRARY, |
| LDPT_SET_EXTRA_LIBRARY_PATH |
| }; |
| |
| /* How many entries in the constant leading part of the tv array. */ |
| static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags); |
| |
| /* Forward references. */ |
| static bool plugin_notice (struct bfd_link_info *, |
| struct bfd_link_hash_entry *, |
| struct bfd_link_hash_entry *, |
| bfd *, asection *, bfd_vma, flagword); |
| |
| static bfd_cleanup plugin_object_p (bfd *, bool); |
| |
| #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) |
| |
| #define RTLD_NOW 0 /* Dummy value. */ |
| |
| static void * |
| dlopen (const char *file, int mode ATTRIBUTE_UNUSED) |
| { |
| return LoadLibrary (file); |
| } |
| |
| static void * |
| dlsym (void *handle, const char *name) |
| { |
| return GetProcAddress (handle, name); |
| } |
| |
| static int |
| dlclose (void *handle) |
| { |
| FreeLibrary (handle); |
| return 0; |
| } |
| |
| #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */ |
| |
| #ifndef HAVE_DLFCN_H |
| static const char * |
| dlerror (void) |
| { |
| return ""; |
| } |
| #endif |
| |
| /* Helper function for exiting with error status. */ |
| static int |
| set_plugin_error (const char *plugin) |
| { |
| error_plugin = plugin; |
| return -1; |
| } |
| |
| /* Test if an error occurred. */ |
| static bool |
| plugin_error_p (void) |
| { |
| return error_plugin != NULL; |
| } |
| |
| /* Return name of plugin which caused an error if any. */ |
| const char * |
| plugin_error_plugin (void) |
| { |
| return error_plugin ? error_plugin : _("<no plugin>"); |
| } |
| |
| /* Handle -plugin arg: find and load plugin, or return error. */ |
| void |
| plugin_opt_plugin (const char *plugin) |
| { |
| plugin_t *newplug; |
| plugin_t *curplug = plugins_list; |
| |
| newplug = xmalloc (sizeof *newplug); |
| memset (newplug, 0, sizeof *newplug); |
| newplug->name = plugin; |
| newplug->dlhandle = dlopen (plugin, RTLD_NOW); |
| if (!newplug->dlhandle) |
| einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ()); |
| |
| /* Check if plugin has been loaded already. */ |
| while (curplug) |
| { |
| if (newplug->dlhandle == curplug->dlhandle) |
| { |
| einfo (_("%P: %s: duplicated plugin\n"), plugin); |
| free (newplug); |
| return; |
| } |
| curplug = curplug->next; |
| } |
| |
| /* Chain on end, so when we run list it is in command-line order. */ |
| *plugins_tail_chain_ptr = newplug; |
| plugins_tail_chain_ptr = &newplug->next; |
| |
| /* Record it as current plugin for receiving args. */ |
| last_plugin = newplug; |
| last_plugin_args_tail_chain_ptr = &newplug->args; |
| } |
| |
| /* Accumulate option arguments for last-loaded plugin, or return |
| error if none. */ |
| int |
| plugin_opt_plugin_arg (const char *arg) |
| { |
| plugin_arg_t *newarg; |
| |
| if (!last_plugin) |
| return set_plugin_error (_("<no plugin>")); |
| |
| /* Ignore -pass-through= from GCC driver. */ |
| if (*arg == '-') |
| { |
| const char *p = arg + 1; |
| |
| if (*p == '-') |
| ++p; |
| if (strncmp (p, "pass-through=", 13) == 0) |
| return 0; |
| } |
| |
| newarg = xmalloc (sizeof *newarg); |
| newarg->arg = arg; |
| newarg->next = NULL; |
| |
| /* Chain on end to preserve command-line order. */ |
| *last_plugin_args_tail_chain_ptr = newarg; |
| last_plugin_args_tail_chain_ptr = &newarg->next; |
| last_plugin->n_args++; |
| return 0; |
| } |
| |
| /* Generate a dummy BFD to represent an IR file, for any callers of |
| plugin_call_claim_file to use as the handle in the ld_plugin_input_file |
| struct that they build to pass in. The BFD is initially writable, so |
| that symbols can be added to it; it must be made readable after the |
| add_symbols hook has been called so that it can be read when linking. */ |
| static bfd * |
| plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate) |
| { |
| bfd *abfd; |
| bool bfd_plugin_target; |
| |
| bfd_use_reserved_id = 1; |
| bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec); |
| abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL), |
| bfd_plugin_target ? link_info.output_bfd : srctemplate); |
| if (abfd != NULL) |
| { |
| abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN; |
| if (!bfd_make_writable (abfd)) |
| goto report_error; |
| if (!bfd_plugin_target) |
| { |
| bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate)); |
| bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate)); |
| if (!bfd_copy_private_bfd_data (srctemplate, abfd)) |
| goto report_error; |
| } |
| { |
| flagword flags; |
| |
| /* Create section to own the symbols. */ |
| flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY |
| | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE); |
| if (bfd_make_section_anyway_with_flags (abfd, ".text", flags)) |
| return abfd; |
| } |
| } |
| report_error: |
| einfo (_("%F%P: could not create dummy IR bfd: %E\n")); |
| return NULL; |
| } |
| |
| /* Check if the BFD passed in is an IR dummy object file. */ |
| static inline bool |
| is_ir_dummy_bfd (const bfd *abfd) |
| { |
| /* ABFD can sometimes legitimately be NULL, e.g. when called from one |
| of the linker callbacks for a symbol in the *ABS* or *UND* sections. */ |
| return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0; |
| } |
| |
| /* Helpers to convert between BFD and GOLD symbol formats. */ |
| static enum ld_plugin_status |
| asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym, |
| const struct ld_plugin_symbol *ldsym) |
| { |
| flagword flags = BSF_NO_FLAGS; |
| struct bfd_section *section; |
| |
| asym->the_bfd = abfd; |
| asym->name = (ldsym->version |
| ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL) |
| : ldsym->name); |
| asym->value = 0; |
| switch (ldsym->def) |
| { |
| case LDPK_WEAKDEF: |
| flags = BSF_WEAK; |
| /* FALLTHRU */ |
| case LDPK_DEF: |
| flags |= BSF_GLOBAL; |
| if (ldsym->comdat_key) |
| { |
| char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key, |
| (const char *) NULL); |
| section = bfd_get_section_by_name (abfd, name); |
| if (section != NULL) |
| free (name); |
| else |
| { |
| flagword sflags; |
| |
| sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY |
| | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE |
| | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD); |
| section = bfd_make_section_anyway_with_flags (abfd, name, sflags); |
| if (section == NULL) |
| return LDPS_ERR; |
| } |
| } |
| else |
| section = bfd_get_section_by_name (abfd, ".text"); |
| break; |
| |
| case LDPK_WEAKUNDEF: |
| flags = BSF_WEAK; |
| /* FALLTHRU */ |
| case LDPK_UNDEF: |
| section = bfd_und_section_ptr; |
| break; |
| |
| case LDPK_COMMON: |
| flags = BSF_GLOBAL; |
| section = bfd_com_section_ptr; |
| asym->value = ldsym->size; |
| break; |
| |
| default: |
| return LDPS_ERR; |
| } |
| asym->flags = flags; |
| asym->section = section; |
| |
| if (bfd_get_flavour (abfd) == bfd_target_elf_flavour) |
| { |
| elf_symbol_type *elfsym = elf_symbol_from (asym); |
| unsigned char visibility; |
| |
| if (!elfsym) |
| einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name); |
| |
| if (ldsym->def == LDPK_COMMON) |
| { |
| elfsym->internal_elf_sym.st_shndx = SHN_COMMON; |
| elfsym->internal_elf_sym.st_value = 1; |
| } |
| |
| switch (ldsym->visibility) |
| { |
| default: |
| einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"), |
| ldsym->visibility); |
| return LDPS_ERR; |
| |
| case LDPV_DEFAULT: |
| visibility = STV_DEFAULT; |
| break; |
| case LDPV_PROTECTED: |
| visibility = STV_PROTECTED; |
| break; |
| case LDPV_INTERNAL: |
| visibility = STV_INTERNAL; |
| break; |
| case LDPV_HIDDEN: |
| visibility = STV_HIDDEN; |
| break; |
| } |
| elfsym->internal_elf_sym.st_other |= visibility; |
| } |
| |
| return LDPS_OK; |
| } |
| |
| /* Register a claim-file handler. */ |
| static enum ld_plugin_status |
| register_claim_file (ld_plugin_claim_file_handler handler) |
| { |
| ASSERT (called_plugin); |
| called_plugin->claim_file_handler = handler; |
| return LDPS_OK; |
| } |
| |
| /* Register a claim-file version 2 handler. */ |
| static enum ld_plugin_status |
| register_claim_file_v2 (ld_plugin_claim_file_handler_v2 handler) |
| { |
| ASSERT (called_plugin); |
| called_plugin->claim_file_handler_v2 = handler; |
| return LDPS_OK; |
| } |
| |
| /* Register an all-symbols-read handler. */ |
| static enum ld_plugin_status |
| register_all_symbols_read (ld_plugin_all_symbols_read_handler handler) |
| { |
| ASSERT (called_plugin); |
| called_plugin->all_symbols_read_handler = handler; |
| return LDPS_OK; |
| } |
| |
| /* Register a cleanup handler. */ |
| static enum ld_plugin_status |
| register_cleanup (ld_plugin_cleanup_handler handler) |
| { |
| ASSERT (called_plugin); |
| called_plugin->cleanup_handler = handler; |
| return LDPS_OK; |
| } |
| |
| /* Add symbols from a plugin-claimed input file. */ |
| static enum ld_plugin_status |
| add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms) |
| { |
| asymbol **symptrs; |
| plugin_input_file_t *input = handle; |
| bfd *abfd = input->abfd; |
| int n; |
| |
| ASSERT (called_plugin); |
| symptrs = bfd_alloc (abfd, nsyms * sizeof *symptrs); |
| if (symptrs == NULL) |
| return LDPS_ERR; |
| for (n = 0; n < nsyms; n++) |
| { |
| enum ld_plugin_status rv; |
| asymbol *bfdsym; |
| |
| bfdsym = bfd_make_empty_symbol (abfd); |
| symptrs[n] = bfdsym; |
| if (bfdsym == NULL) |
| return LDPS_ERR; |
| rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n); |
| if (rv != LDPS_OK) |
| return rv; |
| } |
| bfd_set_symtab (abfd, symptrs, nsyms); |
| return LDPS_OK; |
| } |
| |
| /* Get the input file information with an open (possibly re-opened) |
| file descriptor. */ |
| static enum ld_plugin_status |
| get_input_file (const void *handle, struct ld_plugin_input_file *file) |
| { |
| const plugin_input_file_t *input = handle; |
| |
| ASSERT (called_plugin); |
| |
| file->name = input->name; |
| file->offset = input->offset; |
| file->filesize = input->filesize; |
| file->handle = (void *) handle; |
| |
| return LDPS_OK; |
| } |
| |
| /* Get view of the input file. */ |
| static enum ld_plugin_status |
| get_view (const void *handle, const void **viewp) |
| { |
| plugin_input_file_t *input = (plugin_input_file_t *) handle; |
| char *buffer; |
| size_t size = input->filesize; |
| off_t offset = input->offset; |
| #if HAVE_MMAP && HAVE_GETPAGESIZE |
| off_t bias; |
| #endif |
| |
| ASSERT (called_plugin); |
| |
| /* FIXME: einfo should support %lld. */ |
| if ((off_t) size != input->filesize) |
| einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"), |
| input->name, (long) input->filesize); |
| |
| /* Check the cached view buffer. */ |
| if (input->view_buffer.addr != NULL |
| && input->view_buffer.filesize == size |
| && input->view_buffer.offset == offset) |
| { |
| *viewp = input->view_buffer.addr; |
| return LDPS_OK; |
| } |
| |
| input->view_buffer.filesize = size; |
| input->view_buffer.offset = offset; |
| |
| #if HAVE_MMAP |
| # if HAVE_GETPAGESIZE |
| bias = offset % plugin_pagesize; |
| offset -= bias; |
| size += bias; |
| # endif |
| buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset); |
| if (buffer != MAP_FAILED) |
| { |
| input->use_mmap = true; |
| # if HAVE_GETPAGESIZE |
| buffer += bias; |
| # endif |
| } |
| else |
| #endif |
| { |
| char *p; |
| |
| input->use_mmap = false; |
| |
| if (lseek (input->fd, offset, SEEK_SET) < 0) |
| return LDPS_ERR; |
| |
| buffer = bfd_alloc (input->abfd, size); |
| if (buffer == NULL) |
| return LDPS_ERR; |
| |
| p = buffer; |
| do |
| { |
| ssize_t got = read (input->fd, p, size); |
| if (got == 0) |
| break; |
| else if (got > 0) |
| { |
| p += got; |
| size -= got; |
| } |
| else if (errno != EINTR) |
| return LDPS_ERR; |
| } |
| while (size > 0); |
| } |
| |
| input->view_buffer.addr = buffer; |
| *viewp = buffer; |
| |
| return LDPS_OK; |
| } |
| |
| /* Release plugin file descriptor. */ |
| |
| static void |
| release_plugin_file_descriptor (plugin_input_file_t *input) |
| { |
| if (input->fd != -1) |
| { |
| bfd_plugin_close_file_descriptor (input->ibfd, input->fd); |
| input->fd = -1; |
| } |
| } |
| |
| /* Release the input file. */ |
| static enum ld_plugin_status |
| release_input_file (const void *handle) |
| { |
| plugin_input_file_t *input = (plugin_input_file_t *) handle; |
| ASSERT (called_plugin); |
| release_plugin_file_descriptor (input); |
| return LDPS_OK; |
| } |
| |
| /* Return TRUE if a defined symbol might be reachable from outside the |
| universe of claimed objects. */ |
| static inline bool |
| is_visible_from_outside (struct ld_plugin_symbol *lsym, |
| struct bfd_link_hash_entry *blhe) |
| { |
| if (bfd_link_relocatable (&link_info)) |
| return true; |
| if (blhe->non_ir_ref_dynamic |
| || link_info.export_dynamic |
| || bfd_link_dll (&link_info)) |
| { |
| /* Check if symbol is hidden by version script. */ |
| if (bfd_hide_sym_by_version (link_info.version_info, |
| blhe->root.string)) |
| return false; |
| /* Only ELF symbols really have visibility. */ |
| if (is_elf_hash_table (link_info.hash)) |
| { |
| struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe; |
| int vis = ELF_ST_VISIBILITY (el->other); |
| return vis == STV_DEFAULT || vis == STV_PROTECTED; |
| } |
| /* On non-ELF targets, we can safely make inferences by considering |
| what visibility the plugin would have liked to apply when it first |
| sent us the symbol. During ELF symbol processing, visibility only |
| ever becomes more restrictive, not less, when symbols are merged, |
| so this is a conservative estimate; it may give false positives, |
| declaring something visible from outside when it in fact would |
| not have been, but this will only lead to missed optimisation |
| opportunities during LTRANS at worst; it will not give false |
| negatives, which can lead to the disastrous conclusion that the |
| related symbol is IRONLY. (See GCC PR46319 for an example.) */ |
| return (lsym->visibility == LDPV_DEFAULT |
| || lsym->visibility == LDPV_PROTECTED); |
| } |
| |
| return false; |
| } |
| |
| /* Return LTO kind string name that corresponds to IDX enum value. */ |
| static const char * |
| get_lto_kind (unsigned int idx) |
| { |
| static char buffer[64]; |
| const char *lto_kind_str[5] = |
| { |
| "DEF", |
| "WEAKDEF", |
| "UNDEF", |
| "WEAKUNDEF", |
| "COMMON" |
| }; |
| |
| if (idx < ARRAY_SIZE (lto_kind_str)) |
| return lto_kind_str [idx]; |
| |
| sprintf (buffer, _("unknown LTO kind value %x"), idx); |
| return buffer; |
| } |
| |
| /* Return LTO resolution string name that corresponds to IDX enum value. */ |
| static const char * |
| get_lto_resolution (unsigned int idx) |
| { |
| static char buffer[64]; |
| static const char *lto_resolution_str[10] = |
| { |
| "UNKNOWN", |
| "UNDEF", |
| "PREVAILING_DEF", |
| "PREVAILING_DEF_IRONLY", |
| "PREEMPTED_REG", |
| "PREEMPTED_IR", |
| "RESOLVED_IR", |
| "RESOLVED_EXEC", |
| "RESOLVED_DYN", |
| "PREVAILING_DEF_IRONLY_EXP", |
| }; |
| |
| if (idx < ARRAY_SIZE (lto_resolution_str)) |
| return lto_resolution_str [idx]; |
| |
| sprintf (buffer, _("unknown LTO resolution value %x"), idx); |
| return buffer; |
| } |
| |
| /* Return LTO visibility string name that corresponds to IDX enum value. */ |
| static const char * |
| get_lto_visibility (unsigned int idx) |
| { |
| static char buffer[64]; |
| const char *lto_visibility_str[4] = |
| { |
| "DEFAULT", |
| "PROTECTED", |
| "INTERNAL", |
| "HIDDEN" |
| }; |
| |
| if (idx < ARRAY_SIZE (lto_visibility_str)) |
| return lto_visibility_str [idx]; |
| |
| sprintf (buffer, _("unknown LTO visibility value %x"), idx); |
| return buffer; |
| } |
| |
| /* Get the symbol resolution info for a plugin-claimed input file. */ |
| static enum ld_plugin_status |
| get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms, |
| int def_ironly_exp) |
| { |
| const plugin_input_file_t *input = handle; |
| const bfd *abfd = (const bfd *) input->abfd; |
| int n; |
| |
| ASSERT (called_plugin); |
| for (n = 0; n < nsyms; n++) |
| { |
| struct bfd_link_hash_entry *blhe; |
| asection *owner_sec; |
| int res; |
| struct bfd_link_hash_entry *h |
| = bfd_link_hash_lookup (link_info.hash, syms[n].name, |
| false, false, true); |
| enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none; |
| |
| if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF) |
| { |
| blhe = h; |
| /* Check if a symbol is a wrapper symbol. */ |
| if (blhe) |
| { |
| if (blhe->wrapper_symbol) |
| wrap_status = wrapper; |
| else if (link_info.wrap_hash != NULL) |
| { |
| struct bfd_link_hash_entry *unwrap |
| = unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe); |
| if (unwrap != NULL && unwrap != h) |
| wrap_status = wrapper; |
| } |
| } |
| } |
| else |
| { |
| blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, |
| &link_info, syms[n].name, |
| false, false, true); |
| /* Check if a symbol is a wrapped symbol. */ |
| if (blhe && blhe != h) |
| wrap_status = wrapped; |
| } |
| if (!blhe) |
| { |
| /* The plugin is called to claim symbols in an archive element |
| from plugin_object_p. But those symbols aren't needed to |
| create output. They are defined and referenced only within |
| IR. */ |
| switch (syms[n].def) |
| { |
| default: |
| abort (); |
| case LDPK_UNDEF: |
| case LDPK_WEAKUNDEF: |
| res = LDPR_UNDEF; |
| break; |
| case LDPK_DEF: |
| case LDPK_WEAKDEF: |
| case LDPK_COMMON: |
| res = LDPR_PREVAILING_DEF_IRONLY; |
| break; |
| } |
| goto report_symbol; |
| } |
| |
| /* Determine resolution from blhe type and symbol's original type. */ |
| if (blhe->type == bfd_link_hash_undefined |
| || blhe->type == bfd_link_hash_undefweak) |
| { |
| res = LDPR_UNDEF; |
| goto report_symbol; |
| } |
| if (blhe->type != bfd_link_hash_defined |
| && blhe->type != bfd_link_hash_defweak |
| && blhe->type != bfd_link_hash_common) |
| { |
| /* We should not have a new, indirect or warning symbol here. */ |
| einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"), |
| called_plugin->name, blhe->type); |
| } |
| |
| /* Find out which section owns the symbol. Since it's not undef, |
| it must have an owner; if it's not a common symbol, both defs |
| and weakdefs keep it in the same place. */ |
| owner_sec = (blhe->type == bfd_link_hash_common |
| ? blhe->u.c.p->section |
| : blhe->u.def.section); |
| |
| |
| /* If it was originally undefined or common, then it has been |
| resolved; determine how. */ |
| if (syms[n].def == LDPK_UNDEF |
| || syms[n].def == LDPK_WEAKUNDEF |
| || syms[n].def == LDPK_COMMON) |
| { |
| if (owner_sec->owner == link_info.output_bfd) |
| res = LDPR_RESOLVED_EXEC; |
| else if (owner_sec->owner == abfd) |
| res = LDPR_PREVAILING_DEF_IRONLY; |
| else if (is_ir_dummy_bfd (owner_sec->owner)) |
| res = LDPR_RESOLVED_IR; |
| else if (owner_sec->owner != NULL |
| && (owner_sec->owner->flags & DYNAMIC) != 0) |
| res = LDPR_RESOLVED_DYN; |
| else |
| res = LDPR_RESOLVED_EXEC; |
| } |
| |
| /* Was originally def, or weakdef. Does it prevail? If the |
| owner is the original dummy bfd that supplied it, then this |
| is the definition that has prevailed. */ |
| else if (owner_sec->owner == link_info.output_bfd) |
| res = LDPR_PREEMPTED_REG; |
| else if (owner_sec->owner == abfd) |
| res = LDPR_PREVAILING_DEF_IRONLY; |
| |
| /* Was originally def, weakdef, or common, but has been pre-empted. */ |
| else if (is_ir_dummy_bfd (owner_sec->owner)) |
| res = LDPR_PREEMPTED_IR; |
| else |
| res = LDPR_PREEMPTED_REG; |
| |
| if (res == LDPR_PREVAILING_DEF_IRONLY) |
| { |
| /* We need to know if the sym is referenced from non-IR files. Or |
| even potentially-referenced, perhaps in a future final link if |
| this is a partial one, perhaps dynamically at load-time if the |
| symbol is externally visible. Also check for __real_SYM |
| reference and wrapper symbol. */ |
| if (blhe->non_ir_ref_regular |
| || blhe->ref_real |
| || wrap_status == wrapper) |
| res = LDPR_PREVAILING_DEF; |
| else if (wrap_status == wrapped) |
| res = LDPR_RESOLVED_IR; |
| else if (is_visible_from_outside (&syms[n], blhe)) |
| res = def_ironly_exp; |
| } |
| |
| report_symbol: |
| syms[n].resolution = res; |
| if (report_plugin_symbols) |
| einfo (_("%P: %pB: symbol `%s' " |
| "definition: %s, visibility: %s, resolution: %s\n"), |
| abfd, syms[n].name, |
| get_lto_kind (syms[n].def), |
| get_lto_visibility (syms[n].visibility), |
| get_lto_resolution (res)); |
| } |
| return LDPS_OK; |
| } |
| |
| static enum ld_plugin_status |
| get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) |
| { |
| return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF); |
| } |
| |
| static enum ld_plugin_status |
| get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) |
| { |
| return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP); |
| } |
| |
| /* Add a new (real) input file generated by a plugin. */ |
| static enum ld_plugin_status |
| add_input_file (const char *pathname) |
| { |
| lang_input_statement_type *is; |
| |
| ASSERT (called_plugin); |
| is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum, |
| NULL); |
| if (!is) |
| return LDPS_ERR; |
| is->plugin = called_plugin; |
| return LDPS_OK; |
| } |
| |
| /* Add a new (real) library required by a plugin. */ |
| static enum ld_plugin_status |
| add_input_library (const char *pathname) |
| { |
| lang_input_statement_type *is; |
| |
| ASSERT (called_plugin); |
| is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum, |
| NULL); |
| if (!is) |
| return LDPS_ERR; |
| is->plugin = called_plugin; |
| return LDPS_OK; |
| } |
| |
| /* Set the extra library path to be used by libraries added via |
| add_input_library. */ |
| |
| static enum ld_plugin_status |
| set_extra_library_path (const char *path) |
| { |
| search_dirs_type * sdt; |
| |
| ASSERT (called_plugin); |
| sdt = ldfile_add_library_path (xstrdup (path), search_dir_plugin); |
| if (sdt == NULL) |
| return LDPS_ERR; |
| sdt->plugin = called_plugin; |
| return LDPS_OK; |
| } |
| |
| /* Issue a diagnostic message from a plugin. */ |
| static enum ld_plugin_status |
| message (int level, const char *format, ...) |
| { |
| va_list args; |
| va_start (args, format); |
| |
| switch (level) |
| { |
| case LDPL_INFO: |
| vfinfo (stdout, format, args, false); |
| putchar ('\n'); |
| break; |
| case LDPL_WARNING: |
| { |
| char *newfmt = concat (_("%P: warning: "), format, "\n", |
| (const char *) NULL); |
| vfinfo (stdout, newfmt, args, true); |
| free (newfmt); |
| } |
| break; |
| case LDPL_FATAL: |
| case LDPL_ERROR: |
| default: |
| { |
| char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X", |
| _("%P: error: "), format, "\n", |
| (const char *) NULL); |
| fflush (stdout); |
| vfinfo (stderr, newfmt, args, true); |
| fflush (stderr); |
| free (newfmt); |
| } |
| break; |
| } |
| |
| va_end (args); |
| return LDPS_OK; |
| } |
| |
| /* Helper to size leading part of tv array and set it up. */ |
| static void |
| set_tv_header (struct ld_plugin_tv *tv) |
| { |
| size_t i; |
| |
| /* Version info. */ |
| static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL); |
| static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100; |
| |
| for (i = 0; i < tv_header_size; i++) |
| { |
| tv[i].tv_tag = tv_header_tags[i]; |
| #define TVU(x) tv[i].tv_u.tv_ ## x |
| switch (tv[i].tv_tag) |
| { |
| case LDPT_MESSAGE: |
| TVU(message) = message; |
| break; |
| case LDPT_API_VERSION: |
| TVU(val) = LD_PLUGIN_API_VERSION; |
| break; |
| case LDPT_GNU_LD_VERSION: |
| TVU(val) = major * 100 + minor; |
| break; |
| case LDPT_LINKER_OUTPUT: |
| TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL |
| : bfd_link_pde (&link_info) ? LDPO_EXEC |
| : bfd_link_pie (&link_info) ? LDPO_PIE |
| : LDPO_DYN); |
| break; |
| case LDPT_OUTPUT_NAME: |
| TVU(string) = output_filename; |
| break; |
| case LDPT_REGISTER_CLAIM_FILE_HOOK: |
| TVU(register_claim_file) = register_claim_file; |
| break; |
| case LDPT_REGISTER_CLAIM_FILE_HOOK_V2: |
| TVU(register_claim_file_v2) = register_claim_file_v2; |
| break; |
| case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK: |
| TVU(register_all_symbols_read) = register_all_symbols_read; |
| break; |
| case LDPT_REGISTER_CLEANUP_HOOK: |
| TVU(register_cleanup) = register_cleanup; |
| break; |
| case LDPT_ADD_SYMBOLS: |
| TVU(add_symbols) = add_symbols; |
| break; |
| case LDPT_GET_INPUT_FILE: |
| TVU(get_input_file) = get_input_file; |
| break; |
| case LDPT_GET_VIEW: |
| TVU(get_view) = get_view; |
| break; |
| case LDPT_RELEASE_INPUT_FILE: |
| TVU(release_input_file) = release_input_file; |
| break; |
| case LDPT_GET_SYMBOLS: |
| TVU(get_symbols) = get_symbols_v1; |
| break; |
| case LDPT_GET_SYMBOLS_V2: |
| TVU(get_symbols) = get_symbols_v2; |
| break; |
| case LDPT_ADD_INPUT_FILE: |
| TVU(add_input_file) = add_input_file; |
| break; |
| case LDPT_ADD_INPUT_LIBRARY: |
| TVU(add_input_library) = add_input_library; |
| break; |
| case LDPT_SET_EXTRA_LIBRARY_PATH: |
| TVU(set_extra_library_path) = set_extra_library_path; |
| break; |
| default: |
| /* Added a new entry to the array without adding |
| a new case to set up its value is a bug. */ |
| FAIL (); |
| } |
| #undef TVU |
| } |
| } |
| |
| /* Append the per-plugin args list and trailing LDPT_NULL to tv. */ |
| static void |
| set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv) |
| { |
| plugin_arg_t *arg = plugin->args; |
| while (arg) |
| { |
| tv->tv_tag = LDPT_OPTION; |
| tv->tv_u.tv_string = arg->arg; |
| arg = arg->next; |
| tv++; |
| } |
| tv->tv_tag = LDPT_NULL; |
| tv->tv_u.tv_val = 0; |
| } |
| |
| /* Load up and initialise all plugins after argument parsing. */ |
| void |
| plugin_load_plugins (void) |
| { |
| struct ld_plugin_tv *my_tv; |
| unsigned int max_args = 0; |
| plugin_t *curplug = plugins_list; |
| |
| /* If there are no plugins, we need do nothing this run. */ |
| if (!curplug) |
| return; |
| |
| /* First pass over plugins to find max # args needed so that we |
| can size and allocate the tv array. */ |
| while (curplug) |
| { |
| if (curplug->n_args > max_args) |
| max_args = curplug->n_args; |
| curplug = curplug->next; |
| } |
| |
| /* Allocate tv array and initialise constant part. */ |
| my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv); |
| set_tv_header (my_tv); |
| |
| /* Pass over plugins again, activating them. */ |
| curplug = plugins_list; |
| while (curplug) |
| { |
| enum ld_plugin_status rv; |
| ld_plugin_onload onloadfn; |
| |
| onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload"); |
| if (!onloadfn) |
| onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload"); |
| if (!onloadfn) |
| einfo (_("%F%P: %s: error loading plugin: %s\n"), |
| curplug->name, dlerror ()); |
| set_tv_plugin_args (curplug, &my_tv[tv_header_size]); |
| called_plugin = curplug; |
| rv = (*onloadfn) (my_tv); |
| called_plugin = NULL; |
| if (rv != LDPS_OK) |
| einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv); |
| curplug = curplug->next; |
| } |
| |
| /* Since plugin(s) inited ok, assume they're going to want symbol |
| resolutions, which needs us to track which symbols are referenced |
| by non-IR files using the linker's notice callback. */ |
| orig_notice_all = link_info.notice_all; |
| orig_callbacks = link_info.callbacks; |
| plugin_callbacks = *orig_callbacks; |
| plugin_callbacks.notice = &plugin_notice; |
| link_info.notice_all = true; |
| link_info.lto_plugin_active = true; |
| link_info.callbacks = &plugin_callbacks; |
| |
| register_ld_plugin_object_p (plugin_object_p); |
| |
| #if HAVE_MMAP && HAVE_GETPAGESIZE |
| plugin_pagesize = getpagesize (); |
| #endif |
| } |
| |
| /* Call 'claim file' hook for all plugins. */ |
| static int |
| plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed, |
| int *claim_file_handler_v2, bool known_used) |
| { |
| plugin_t *curplug = plugins_list; |
| *claimed = false; |
| *claim_file_handler_v2 = false; |
| while (curplug && !*claimed) |
| { |
| if (curplug->claim_file_handler) |
| { |
| enum ld_plugin_status rv; |
| |
| called_plugin = curplug; |
| if (curplug->claim_file_handler_v2) |
| { |
| rv = (*curplug->claim_file_handler_v2) (file, claimed, |
| known_used); |
| *claim_file_handler_v2 = true; |
| } |
| else |
| rv = (*curplug->claim_file_handler) (file, claimed); |
| called_plugin = NULL; |
| if (rv != LDPS_OK) |
| set_plugin_error (curplug->name); |
| } |
| curplug = curplug->next; |
| } |
| return plugin_error_p () ? -1 : 0; |
| } |
| |
| /* Duplicates a character string with memory attached to ABFD. */ |
| |
| static char * |
| plugin_strdup (bfd *abfd, const char *str) |
| { |
| size_t strlength; |
| char *copy; |
| strlength = strlen (str) + 1; |
| copy = bfd_alloc (abfd, strlength); |
| if (copy == NULL) |
| einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"), |
| bfd_get_error ()); |
| memcpy (copy, str, strlength); |
| return copy; |
| } |
| |
| static void |
| plugin_cleanup (bfd *abfd ATTRIBUTE_UNUSED) |
| { |
| } |
| |
| static bfd_cleanup |
| plugin_object_p (bfd *ibfd, bool known_used) |
| { |
| int claimed, claim_file_handler_v2; |
| plugin_input_file_t *input; |
| struct ld_plugin_input_file file; |
| bfd *abfd; |
| |
| /* Don't try the dummy object file. */ |
| if ((ibfd->flags & BFD_PLUGIN) != 0) |
| return NULL; |
| |
| /* When KNOWN_USED is false, we call plugin claim_file if plugin_format |
| is bfd_plugin_unknown and set plugin_format to bfd_plugin_yes_unused |
| on LTO object. When KNOWN_USED is true, we call plugin claim_file |
| if plugin_format is bfd_plugin_unknown or bfd_plugin_yes_unused. */ |
| if (ibfd->plugin_format != bfd_plugin_unknown |
| && (!known_used || ibfd->plugin_format != bfd_plugin_yes_unused)) |
| { |
| if (ibfd->plugin_format == bfd_plugin_no) |
| return NULL; |
| else |
| return plugin_cleanup; |
| } |
| |
| /* We create a dummy BFD, initially empty, to house whatever symbols |
| the plugin may want to add. */ |
| abfd = plugin_get_ir_dummy_bfd (bfd_get_filename (ibfd), ibfd); |
| |
| input = bfd_alloc (abfd, sizeof (*input)); |
| if (input == NULL) |
| einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"), |
| bfd_get_error ()); |
| |
| if (!bfd_plugin_open_input (ibfd, &file)) |
| return NULL; |
| |
| if (file.name == bfd_get_filename (ibfd)) |
| { |
| /* We must copy filename attached to ibfd if it is not an archive |
| member since it may be freed by bfd_close below. */ |
| file.name = plugin_strdup (abfd, file.name); |
| } |
| |
| file.handle = input; |
| input->abfd = abfd; |
| input->ibfd = ibfd->my_archive != NULL ? ibfd : NULL; |
| input->view_buffer.addr = NULL; |
| input->view_buffer.filesize = 0; |
| input->view_buffer.offset = 0; |
| input->fd = file.fd; |
| input->use_mmap = false; |
| input->offset = file.offset; |
| input->filesize = file.filesize; |
| input->name = plugin_strdup (abfd, bfd_get_filename (ibfd)); |
| |
| claimed = 0; |
| |
| if (plugin_call_claim_file (&file, &claimed, &claim_file_handler_v2, |
| known_used)) |
| einfo (_("%F%P: %s: plugin reported error claiming file\n"), |
| plugin_error_plugin ()); |
| |
| if (input->fd != -1 |
| && (!claimed || !bfd_plugin_target_p (ibfd->xvec))) |
| { |
| /* FIXME: fd belongs to us, not the plugin. GCC plugin, which |
| doesn't need fd after plugin_call_claim_file, doesn't use |
| BFD plugin target vector. Since GCC plugin doesn't call |
| release_input_file, we close it here. LLVM plugin, which |
| needs fd after plugin_call_claim_file and calls |
| release_input_file after it is done, uses BFD plugin target |
| vector. This scheme doesn't work when a plugin needs fd and |
| doesn't use BFD plugin target vector neither. */ |
| release_plugin_file_descriptor (input); |
| } |
| |
| if (claimed) |
| { |
| /* Set plugin_format to bfd_plugin_yes_unused if KNOWN_USED is |
| false for plugin claim_file_v2 to avoid including the unused |
| LTO archive members in linker output. */ |
| if (known_used || !claim_file_handler_v2) |
| ibfd->plugin_format = bfd_plugin_yes; |
| else |
| ibfd->plugin_format = bfd_plugin_yes_unused; |
| ibfd->plugin_dummy_bfd = abfd; |
| bfd_make_readable (abfd); |
| abfd->no_export = ibfd->no_export; |
| return plugin_cleanup; |
| } |
| else |
| { |
| #if HAVE_MMAP |
| if (input->use_mmap) |
| { |
| /* If plugin didn't claim the file, unmap the buffer. */ |
| char *addr = input->view_buffer.addr; |
| off_t size = input->view_buffer.filesize; |
| # if HAVE_GETPAGESIZE |
| off_t bias = input->view_buffer.offset % plugin_pagesize; |
| size += bias; |
| addr -= bias; |
| # endif |
| munmap (addr, size); |
| } |
| #endif |
| |
| /* If plugin didn't claim the file, we don't need the dummy bfd. |
| Can't avoid speculatively creating it, alas. */ |
| ibfd->plugin_format = bfd_plugin_no; |
| bfd_close_all_done (abfd); |
| return NULL; |
| } |
| } |
| |
| void |
| plugin_maybe_claim (lang_input_statement_type *entry) |
| { |
| ASSERT (entry->header.type == lang_input_statement_enum); |
| if (plugin_object_p (entry->the_bfd, true)) |
| { |
| bfd *abfd = entry->the_bfd->plugin_dummy_bfd; |
| |
| /* Discard the real file's BFD and substitute the dummy one. */ |
| |
| /* We can't call bfd_close on archives. BFD archive handling |
| caches elements, and add_archive_element keeps pointers to |
| the_bfd and the_bfd->filename in a lang_input_statement_type |
| linker script statement. */ |
| if (entry->the_bfd->my_archive == NULL) |
| bfd_close (entry->the_bfd); |
| entry->the_bfd = abfd; |
| entry->flags.claimed = 1; |
| } |
| } |
| |
| /* Call 'all symbols read' hook for all plugins. */ |
| int |
| plugin_call_all_symbols_read (void) |
| { |
| plugin_t *curplug = plugins_list; |
| |
| /* Disable any further file-claiming. */ |
| no_more_claiming = true; |
| |
| while (curplug) |
| { |
| if (curplug->all_symbols_read_handler) |
| { |
| enum ld_plugin_status rv; |
| called_plugin = curplug; |
| rv = (*curplug->all_symbols_read_handler) (); |
| called_plugin = NULL; |
| if (rv != LDPS_OK) |
| set_plugin_error (curplug->name); |
| } |
| curplug = curplug->next; |
| } |
| return plugin_error_p () ? -1 : 0; |
| } |
| |
| /* Call 'cleanup' hook for all plugins at exit. */ |
| void |
| plugin_call_cleanup (void) |
| { |
| plugin_t *curplug = plugins_list; |
| while (curplug) |
| { |
| if (curplug->cleanup_handler && !curplug->cleanup_done) |
| { |
| if (!config.plugin_save_temps) |
| { |
| enum ld_plugin_status rv; |
| curplug->cleanup_done = true; |
| called_plugin = curplug; |
| rv = (*curplug->cleanup_handler) (); |
| called_plugin = NULL; |
| if (rv != LDPS_OK) |
| info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"), |
| curplug->name, rv); |
| } |
| dlclose (curplug->dlhandle); |
| } |
| curplug = curplug->next; |
| } |
| } |
| |
| /* To determine which symbols should be resolved LDPR_PREVAILING_DEF |
| and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as |
| the linker adds them to the linker hash table. Mark those |
| referenced from a non-IR file with non_ir_ref_regular or |
| non_ir_ref_dynamic as appropriate. We have to notice_all symbols, |
| because we won't necessarily know until later which ones will be |
| contributed by IR files. */ |
| static bool |
| plugin_notice (struct bfd_link_info *info, |
| struct bfd_link_hash_entry *h, |
| struct bfd_link_hash_entry *inh, |
| bfd *abfd, |
| asection *section, |
| bfd_vma value, |
| flagword flags) |
| { |
| struct bfd_link_hash_entry *orig_h = h; |
| |
| if (h != NULL) |
| { |
| bfd *sym_bfd; |
| bool ref = false; |
| |
| if (h->type == bfd_link_hash_warning) |
| h = h->u.i.link; |
| |
| /* Nothing to do here if this def/ref is from an IR dummy BFD. */ |
| if (is_ir_dummy_bfd (abfd)) |
| ; |
| |
| /* Making an indirect symbol counts as a reference unless this |
| is a brand new symbol. */ |
| else if (bfd_is_ind_section (section) |
| || (flags & BSF_INDIRECT) != 0) |
| { |
| /* ??? Some of this is questionable. See comments in |
| _bfd_generic_link_add_one_symbol for case IND. */ |
| if (h->type != bfd_link_hash_new |
| || inh->type == bfd_link_hash_new) |
| { |
| if ((abfd->flags & DYNAMIC) == 0) |
| inh->non_ir_ref_regular = true; |
| else |
| inh->non_ir_ref_dynamic = true; |
| } |
| |
| if (h->type != bfd_link_hash_new) |
| ref = true; |
| } |
| |
| /* Nothing to do here for warning symbols. */ |
| else if ((flags & BSF_WARNING) != 0) |
| ; |
| |
| /* Nothing to do here for constructor symbols. */ |
| else if ((flags & BSF_CONSTRUCTOR) != 0) |
| ; |
| |
| /* If this is a ref, set non_ir_ref. */ |
| else if (bfd_is_und_section (section)) |
| { |
| /* Replace the undefined dummy bfd with the real one. */ |
| if ((h->type == bfd_link_hash_undefined |
| || h->type == bfd_link_hash_undefweak) |
| && (h->u.undef.abfd == NULL |
| || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0)) |
| h->u.undef.abfd = abfd; |
| ref = true; |
| } |
| |
| |
| /* A common symbol should be merged with other commons or |
| defs with the same name. In particular, a common ought |
| to be overridden by a def in a -flto object. In that |
| sense a common is also a ref. */ |
| else if (bfd_is_com_section (section)) |
| { |
| if (h->type == bfd_link_hash_common |
| && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)) |
| { |
| h->type = bfd_link_hash_undefweak; |
| h->u.undef.abfd = sym_bfd; |
| } |
| ref = true; |
| } |
| |
| /* Otherwise, it must be a new def. |
| Ensure any symbol defined in an IR dummy BFD takes on a |
| new value from a real BFD. Weak symbols are not normally |
| overridden by a new weak definition, and strong symbols |
| will normally cause multiple definition errors. Avoid |
| this by making the symbol appear to be undefined. |
| |
| NB: We change the previous definition in the IR object to |
| undefweak only after all LTO symbols have been read or for |
| non-ELF targets. */ |
| else if ((info->lto_all_symbols_read |
| || bfd_get_flavour (abfd) != bfd_target_elf_flavour) |
| && (((h->type == bfd_link_hash_defweak |
| || h->type == bfd_link_hash_defined) |
| && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner)) |
| || (h->type == bfd_link_hash_common |
| && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))) |
| { |
| h->type = bfd_link_hash_undefweak; |
| h->u.undef.abfd = sym_bfd; |
| } |
| |
| if (ref) |
| { |
| if ((abfd->flags & DYNAMIC) == 0) |
| h->non_ir_ref_regular = true; |
| else |
| h->non_ir_ref_dynamic = true; |
| } |
| } |
| |
| /* Continue with cref/nocrossref/trace-sym processing. */ |
| if (orig_h == NULL |
| || orig_notice_all |
| || (info->notice_hash != NULL |
| && bfd_hash_lookup (info->notice_hash, orig_h->root.string, |
| false, false) != NULL)) |
| return (*orig_callbacks->notice) (info, orig_h, inh, |
| abfd, section, value, flags); |
| return true; |
| } |
| #endif /* BFD_SUPPORTS_PLUGINS */ |