1 /* Plugin control for the GNU linker. 2 Copyright (C) 2010-2020 Free Software Foundation, Inc. 3 4 This file is part of the GNU Binutils. 5 6 This program is free software; you can redistribute it and/or modify 7 it under the terms of the GNU General Public License as published by 8 the Free Software Foundation; either version 3 of the License, or 9 (at your option) any later version. 10 11 This program is distributed in the hope that it will be useful, 12 but WITHOUT ANY WARRANTY; without even the implied warranty of 13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 14 GNU General Public License for more details. 15 16 You should have received a copy of the GNU General Public License 17 along with this program; if not, write to the Free Software 18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, 19 MA 02110-1301, USA. */ 20 21 #include "sysdep.h" 22 #include "libiberty.h" 23 #include "bfd.h" 24 #include "bfdlink.h" 25 #include "bfdver.h" 26 #include "ctf-api.h" 27 #include "ld.h" 28 #include "ldmain.h" 29 #include "ldmisc.h" 30 #include "ldexp.h" 31 #include "ldlang.h" 32 #include "ldfile.h" 33 #include "plugin-api.h" 34 #include "../bfd/plugin.h" 35 #include "plugin.h" 36 #include "elf-bfd.h" 37 #if HAVE_MMAP 38 # include <sys/mman.h> 39 # ifndef MAP_FAILED 40 # define MAP_FAILED ((void *) -1) 41 # endif 42 # ifndef PROT_READ 43 # define PROT_READ 0 44 # endif 45 # ifndef MAP_PRIVATE 46 # define MAP_PRIVATE 0 47 # endif 48 #endif 49 #include <errno.h> 50 #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO)) 51 extern int errno; 52 #endif 53 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) 54 #include <windows.h> 55 #endif 56 57 /* Report plugin symbols. */ 58 bfd_boolean report_plugin_symbols; 59 60 /* The suffix to append to the name of the real (claimed) object file 61 when generating a dummy BFD to hold the IR symbols sent from the 62 plugin. For cosmetic use only; appears in maps, crefs etc. */ 63 #define IRONLY_SUFFIX " (symbol from plugin)" 64 65 /* Stores a single argument passed to a plugin. */ 66 typedef struct plugin_arg 67 { 68 struct plugin_arg *next; 69 const char *arg; 70 } plugin_arg_t; 71 72 /* Holds all details of a single plugin. */ 73 typedef struct plugin 74 { 75 /* Next on the list of plugins, or NULL at end of chain. */ 76 struct plugin *next; 77 /* The argument string given to --plugin. */ 78 const char *name; 79 /* The shared library handle returned by dlopen. */ 80 void *dlhandle; 81 /* The list of argument string given to --plugin-opt. */ 82 plugin_arg_t *args; 83 /* Number of args in the list, for convenience. */ 84 size_t n_args; 85 /* The plugin's event handlers. */ 86 ld_plugin_claim_file_handler claim_file_handler; 87 ld_plugin_all_symbols_read_handler all_symbols_read_handler; 88 ld_plugin_cleanup_handler cleanup_handler; 89 /* TRUE if the cleanup handlers have been called. */ 90 bfd_boolean cleanup_done; 91 } plugin_t; 92 93 typedef struct view_buffer 94 { 95 char *addr; 96 size_t filesize; 97 off_t offset; 98 } view_buffer_t; 99 100 /* The internal version of struct ld_plugin_input_file with a BFD 101 pointer. */ 102 typedef struct plugin_input_file 103 { 104 bfd *abfd; 105 view_buffer_t view_buffer; 106 char *name; 107 int fd; 108 bfd_boolean use_mmap; 109 off_t offset; 110 off_t filesize; 111 } plugin_input_file_t; 112 113 /* The master list of all plugins. */ 114 static plugin_t *plugins_list = NULL; 115 116 /* We keep a tail pointer for easy linking on the end. */ 117 static plugin_t **plugins_tail_chain_ptr = &plugins_list; 118 119 /* The last plugin added to the list, for receiving args. */ 120 static plugin_t *last_plugin = NULL; 121 122 /* The tail of the arg chain of the last plugin added to the list. */ 123 static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL; 124 125 /* The plugin which is currently having a callback executed. */ 126 static plugin_t *called_plugin = NULL; 127 128 /* Last plugin to cause an error, if any. */ 129 static const char *error_plugin = NULL; 130 131 /* State of linker "notice" interface before we poked at it. */ 132 static bfd_boolean orig_notice_all; 133 134 /* Original linker callbacks, and the plugin version. */ 135 static const struct bfd_link_callbacks *orig_callbacks; 136 static struct bfd_link_callbacks plugin_callbacks; 137 138 /* Set at all symbols read time, to avoid recursively offering the plugin 139 its own newly-added input files and libs to claim. */ 140 bfd_boolean no_more_claiming = FALSE; 141 142 #if HAVE_MMAP && HAVE_GETPAGESIZE 143 /* Page size used by mmap. */ 144 static off_t plugin_pagesize; 145 #endif 146 147 /* List of tags to set in the constant leading part of the tv array. */ 148 static const enum ld_plugin_tag tv_header_tags[] = 149 { 150 LDPT_MESSAGE, 151 LDPT_API_VERSION, 152 LDPT_GNU_LD_VERSION, 153 LDPT_LINKER_OUTPUT, 154 LDPT_OUTPUT_NAME, 155 LDPT_REGISTER_CLAIM_FILE_HOOK, 156 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK, 157 LDPT_REGISTER_CLEANUP_HOOK, 158 LDPT_ADD_SYMBOLS, 159 LDPT_GET_INPUT_FILE, 160 LDPT_GET_VIEW, 161 LDPT_RELEASE_INPUT_FILE, 162 LDPT_GET_SYMBOLS, 163 LDPT_GET_SYMBOLS_V2, 164 LDPT_ADD_INPUT_FILE, 165 LDPT_ADD_INPUT_LIBRARY, 166 LDPT_SET_EXTRA_LIBRARY_PATH 167 }; 168 169 /* How many entries in the constant leading part of the tv array. */ 170 static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags); 171 172 /* Forward references. */ 173 static bfd_boolean plugin_notice (struct bfd_link_info *, 174 struct bfd_link_hash_entry *, 175 struct bfd_link_hash_entry *, 176 bfd *, asection *, bfd_vma, flagword); 177 178 static const bfd_target * plugin_object_p (bfd *); 179 180 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) 181 182 #define RTLD_NOW 0 /* Dummy value. */ 183 184 static void * 185 dlopen (const char *file, int mode ATTRIBUTE_UNUSED) 186 { 187 return LoadLibrary (file); 188 } 189 190 static void * 191 dlsym (void *handle, const char *name) 192 { 193 return GetProcAddress (handle, name); 194 } 195 196 static int 197 dlclose (void *handle) 198 { 199 FreeLibrary (handle); 200 return 0; 201 } 202 203 #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */ 204 205 #ifndef HAVE_DLFCN_H 206 static const char * 207 dlerror (void) 208 { 209 return ""; 210 } 211 #endif 212 213 /* Helper function for exiting with error status. */ 214 static int 215 set_plugin_error (const char *plugin) 216 { 217 error_plugin = plugin; 218 return -1; 219 } 220 221 /* Test if an error occurred. */ 222 static bfd_boolean 223 plugin_error_p (void) 224 { 225 return error_plugin != NULL; 226 } 227 228 /* Return name of plugin which caused an error if any. */ 229 const char * 230 plugin_error_plugin (void) 231 { 232 return error_plugin ? error_plugin : _("<no plugin>"); 233 } 234 235 /* Handle -plugin arg: find and load plugin, or return error. */ 236 void 237 plugin_opt_plugin (const char *plugin) 238 { 239 plugin_t *newplug; 240 plugin_t *curplug = plugins_list; 241 242 newplug = xmalloc (sizeof *newplug); 243 memset (newplug, 0, sizeof *newplug); 244 newplug->name = plugin; 245 newplug->dlhandle = dlopen (plugin, RTLD_NOW); 246 if (!newplug->dlhandle) 247 einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ()); 248 249 /* Check if plugin has been loaded already. */ 250 while (curplug) 251 { 252 if (newplug->dlhandle == curplug->dlhandle) 253 { 254 einfo (_("%P: %s: duplicated plugin\n"), plugin); 255 free (newplug); 256 return; 257 } 258 curplug = curplug->next; 259 } 260 261 /* Chain on end, so when we run list it is in command-line order. */ 262 *plugins_tail_chain_ptr = newplug; 263 plugins_tail_chain_ptr = &newplug->next; 264 265 /* Record it as current plugin for receiving args. */ 266 last_plugin = newplug; 267 last_plugin_args_tail_chain_ptr = &newplug->args; 268 } 269 270 /* Accumulate option arguments for last-loaded plugin, or return 271 error if none. */ 272 int 273 plugin_opt_plugin_arg (const char *arg) 274 { 275 plugin_arg_t *newarg; 276 277 if (!last_plugin) 278 return set_plugin_error (_("<no plugin>")); 279 280 /* Ignore -pass-through= from GCC driver. */ 281 if (*arg == '-') 282 { 283 const char *p = arg + 1; 284 285 if (*p == '-') 286 ++p; 287 if (strncmp (p, "pass-through=", 13) == 0) 288 return 0; 289 } 290 291 newarg = xmalloc (sizeof *newarg); 292 newarg->arg = arg; 293 newarg->next = NULL; 294 295 /* Chain on end to preserve command-line order. */ 296 *last_plugin_args_tail_chain_ptr = newarg; 297 last_plugin_args_tail_chain_ptr = &newarg->next; 298 last_plugin->n_args++; 299 return 0; 300 } 301 302 /* Generate a dummy BFD to represent an IR file, for any callers of 303 plugin_call_claim_file to use as the handle in the ld_plugin_input_file 304 struct that they build to pass in. The BFD is initially writable, so 305 that symbols can be added to it; it must be made readable after the 306 add_symbols hook has been called so that it can be read when linking. */ 307 static bfd * 308 plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate) 309 { 310 bfd *abfd; 311 bfd_boolean bfd_plugin_target; 312 313 bfd_use_reserved_id = 1; 314 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec); 315 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL), 316 bfd_plugin_target ? link_info.output_bfd : srctemplate); 317 if (abfd != NULL) 318 { 319 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN; 320 if (!bfd_make_writable (abfd)) 321 goto report_error; 322 if (!bfd_plugin_target) 323 { 324 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate)); 325 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate)); 326 if (!bfd_copy_private_bfd_data (srctemplate, abfd)) 327 goto report_error; 328 } 329 { 330 flagword flags; 331 332 /* Create section to own the symbols. */ 333 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY 334 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE); 335 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags)) 336 return abfd; 337 } 338 } 339 report_error: 340 einfo (_("%F%P: could not create dummy IR bfd: %E\n")); 341 return NULL; 342 } 343 344 /* Check if the BFD passed in is an IR dummy object file. */ 345 static inline bfd_boolean 346 is_ir_dummy_bfd (const bfd *abfd) 347 { 348 /* ABFD can sometimes legitimately be NULL, e.g. when called from one 349 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */ 350 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0; 351 } 352 353 /* Helpers to convert between BFD and GOLD symbol formats. */ 354 static enum ld_plugin_status 355 asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym, 356 const struct ld_plugin_symbol *ldsym) 357 { 358 flagword flags = BSF_NO_FLAGS; 359 struct bfd_section *section; 360 361 asym->the_bfd = abfd; 362 asym->name = (ldsym->version 363 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL) 364 : ldsym->name); 365 asym->value = 0; 366 switch (ldsym->def) 367 { 368 case LDPK_WEAKDEF: 369 flags = BSF_WEAK; 370 /* FALLTHRU */ 371 case LDPK_DEF: 372 flags |= BSF_GLOBAL; 373 if (ldsym->comdat_key) 374 { 375 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key, 376 (const char *) NULL); 377 section = bfd_get_section_by_name (abfd, name); 378 if (section != NULL) 379 free (name); 380 else 381 { 382 flagword sflags; 383 384 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY 385 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE 386 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD); 387 section = bfd_make_section_anyway_with_flags (abfd, name, sflags); 388 if (section == NULL) 389 return LDPS_ERR; 390 } 391 } 392 else 393 section = bfd_get_section_by_name (abfd, ".text"); 394 break; 395 396 case LDPK_WEAKUNDEF: 397 flags = BSF_WEAK; 398 /* FALLTHRU */ 399 case LDPK_UNDEF: 400 section = bfd_und_section_ptr; 401 break; 402 403 case LDPK_COMMON: 404 flags = BSF_GLOBAL; 405 section = bfd_com_section_ptr; 406 asym->value = ldsym->size; 407 break; 408 409 default: 410 return LDPS_ERR; 411 } 412 asym->flags = flags; 413 asym->section = section; 414 415 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour) 416 { 417 elf_symbol_type *elfsym = elf_symbol_from (abfd, asym); 418 unsigned char visibility; 419 420 if (!elfsym) 421 einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name); 422 423 if (ldsym->def == LDPK_COMMON) 424 { 425 elfsym->internal_elf_sym.st_shndx = SHN_COMMON; 426 elfsym->internal_elf_sym.st_value = 1; 427 } 428 429 switch (ldsym->visibility) 430 { 431 default: 432 einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"), 433 ldsym->visibility); 434 return LDPS_ERR; 435 436 case LDPV_DEFAULT: 437 visibility = STV_DEFAULT; 438 break; 439 case LDPV_PROTECTED: 440 visibility = STV_PROTECTED; 441 break; 442 case LDPV_INTERNAL: 443 visibility = STV_INTERNAL; 444 break; 445 case LDPV_HIDDEN: 446 visibility = STV_HIDDEN; 447 break; 448 } 449 elfsym->internal_elf_sym.st_other |= visibility; 450 } 451 452 return LDPS_OK; 453 } 454 455 /* Register a claim-file handler. */ 456 static enum ld_plugin_status 457 register_claim_file (ld_plugin_claim_file_handler handler) 458 { 459 ASSERT (called_plugin); 460 called_plugin->claim_file_handler = handler; 461 return LDPS_OK; 462 } 463 464 /* Register an all-symbols-read handler. */ 465 static enum ld_plugin_status 466 register_all_symbols_read (ld_plugin_all_symbols_read_handler handler) 467 { 468 ASSERT (called_plugin); 469 called_plugin->all_symbols_read_handler = handler; 470 return LDPS_OK; 471 } 472 473 /* Register a cleanup handler. */ 474 static enum ld_plugin_status 475 register_cleanup (ld_plugin_cleanup_handler handler) 476 { 477 ASSERT (called_plugin); 478 called_plugin->cleanup_handler = handler; 479 return LDPS_OK; 480 } 481 482 /* Add symbols from a plugin-claimed input file. */ 483 static enum ld_plugin_status 484 add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms) 485 { 486 asymbol **symptrs; 487 plugin_input_file_t *input = handle; 488 bfd *abfd = input->abfd; 489 int n; 490 491 ASSERT (called_plugin); 492 symptrs = xmalloc (nsyms * sizeof *symptrs); 493 for (n = 0; n < nsyms; n++) 494 { 495 enum ld_plugin_status rv; 496 asymbol *bfdsym; 497 498 bfdsym = bfd_make_empty_symbol (abfd); 499 symptrs[n] = bfdsym; 500 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n); 501 if (rv != LDPS_OK) 502 return rv; 503 } 504 bfd_set_symtab (abfd, symptrs, nsyms); 505 return LDPS_OK; 506 } 507 508 /* Get the input file information with an open (possibly re-opened) 509 file descriptor. */ 510 static enum ld_plugin_status 511 get_input_file (const void *handle, struct ld_plugin_input_file *file) 512 { 513 const plugin_input_file_t *input = handle; 514 515 ASSERT (called_plugin); 516 517 file->name = input->name; 518 file->offset = input->offset; 519 file->filesize = input->filesize; 520 file->handle = (void *) handle; 521 522 return LDPS_OK; 523 } 524 525 /* Get view of the input file. */ 526 static enum ld_plugin_status 527 get_view (const void *handle, const void **viewp) 528 { 529 plugin_input_file_t *input = (plugin_input_file_t *) handle; 530 char *buffer; 531 size_t size = input->filesize; 532 off_t offset = input->offset; 533 #if HAVE_MMAP && HAVE_GETPAGESIZE 534 off_t bias; 535 #endif 536 537 ASSERT (called_plugin); 538 539 /* FIXME: einfo should support %lld. */ 540 if ((off_t) size != input->filesize) 541 einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"), 542 input->name, (long) input->filesize); 543 544 /* Check the cached view buffer. */ 545 if (input->view_buffer.addr != NULL 546 && input->view_buffer.filesize == size 547 && input->view_buffer.offset == offset) 548 { 549 *viewp = input->view_buffer.addr; 550 return LDPS_OK; 551 } 552 553 input->view_buffer.filesize = size; 554 input->view_buffer.offset = offset; 555 556 #if HAVE_MMAP 557 # if HAVE_GETPAGESIZE 558 bias = offset % plugin_pagesize; 559 offset -= bias; 560 size += bias; 561 # endif 562 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset); 563 if (buffer != MAP_FAILED) 564 { 565 input->use_mmap = TRUE; 566 # if HAVE_GETPAGESIZE 567 buffer += bias; 568 # endif 569 } 570 else 571 #endif 572 { 573 char *p; 574 575 input->use_mmap = FALSE; 576 577 if (lseek (input->fd, offset, SEEK_SET) < 0) 578 return LDPS_ERR; 579 580 buffer = bfd_alloc (input->abfd, size); 581 if (buffer == NULL) 582 return LDPS_ERR; 583 584 p = buffer; 585 do 586 { 587 ssize_t got = read (input->fd, p, size); 588 if (got == 0) 589 break; 590 else if (got > 0) 591 { 592 p += got; 593 size -= got; 594 } 595 else if (errno != EINTR) 596 return LDPS_ERR; 597 } 598 while (size > 0); 599 } 600 601 input->view_buffer.addr = buffer; 602 *viewp = buffer; 603 604 return LDPS_OK; 605 } 606 607 /* Release the input file. */ 608 static enum ld_plugin_status 609 release_input_file (const void *handle) 610 { 611 plugin_input_file_t *input = (plugin_input_file_t *) handle; 612 ASSERT (called_plugin); 613 if (input->fd != -1) 614 { 615 close (input->fd); 616 input->fd = -1; 617 } 618 return LDPS_OK; 619 } 620 621 /* Return TRUE if a defined symbol might be reachable from outside the 622 universe of claimed objects. */ 623 static inline bfd_boolean 624 is_visible_from_outside (struct ld_plugin_symbol *lsym, 625 struct bfd_link_hash_entry *blhe) 626 { 627 if (bfd_link_relocatable (&link_info)) 628 return TRUE; 629 if (blhe->non_ir_ref_dynamic 630 || link_info.export_dynamic 631 || bfd_link_dll (&link_info)) 632 { 633 /* Check if symbol is hidden by version script. */ 634 if (bfd_hide_sym_by_version (link_info.version_info, 635 blhe->root.string)) 636 return FALSE; 637 /* Only ELF symbols really have visibility. */ 638 if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour) 639 { 640 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe; 641 int vis = ELF_ST_VISIBILITY (el->other); 642 return vis == STV_DEFAULT || vis == STV_PROTECTED; 643 } 644 /* On non-ELF targets, we can safely make inferences by considering 645 what visibility the plugin would have liked to apply when it first 646 sent us the symbol. During ELF symbol processing, visibility only 647 ever becomes more restrictive, not less, when symbols are merged, 648 so this is a conservative estimate; it may give false positives, 649 declaring something visible from outside when it in fact would 650 not have been, but this will only lead to missed optimisation 651 opportunities during LTRANS at worst; it will not give false 652 negatives, which can lead to the disastrous conclusion that the 653 related symbol is IRONLY. (See GCC PR46319 for an example.) */ 654 return (lsym->visibility == LDPV_DEFAULT 655 || lsym->visibility == LDPV_PROTECTED); 656 } 657 658 return FALSE; 659 } 660 661 /* Return LTO kind string name that corresponds to IDX enum value. */ 662 static const char * 663 get_lto_kind (unsigned int idx) 664 { 665 static char buffer[64]; 666 const char *lto_kind_str[5] = 667 { 668 "DEF", 669 "WEAKDEF", 670 "UNDEF", 671 "WEAKUNDEF", 672 "COMMON" 673 }; 674 675 if (idx < ARRAY_SIZE (lto_kind_str)) 676 return lto_kind_str [idx]; 677 678 sprintf (buffer, _("unknown LTO kind value %x"), idx); 679 return buffer; 680 } 681 682 /* Return LTO resolution string name that corresponds to IDX enum value. */ 683 static const char * 684 get_lto_resolution (unsigned int idx) 685 { 686 static char buffer[64]; 687 static const char *lto_resolution_str[10] = 688 { 689 "UNKNOWN", 690 "UNDEF", 691 "PREVAILING_DEF", 692 "PREVAILING_DEF_IRONLY", 693 "PREEMPTED_REG", 694 "PREEMPTED_IR", 695 "RESOLVED_IR", 696 "RESOLVED_EXEC", 697 "RESOLVED_DYN", 698 "PREVAILING_DEF_IRONLY_EXP", 699 }; 700 701 if (idx < ARRAY_SIZE (lto_resolution_str)) 702 return lto_resolution_str [idx]; 703 704 sprintf (buffer, _("unknown LTO resolution value %x"), idx); 705 return buffer; 706 } 707 708 /* Return LTO visibility string name that corresponds to IDX enum value. */ 709 static const char * 710 get_lto_visibility (unsigned int idx) 711 { 712 static char buffer[64]; 713 const char *lto_visibility_str[4] = 714 { 715 "DEFAULT", 716 "PROTECTED", 717 "INTERNAL", 718 "HIDDEN" 719 }; 720 721 if (idx < ARRAY_SIZE (lto_visibility_str)) 722 return lto_visibility_str [idx]; 723 724 sprintf (buffer, _("unknown LTO visibility value %x"), idx); 725 return buffer; 726 } 727 728 /* Get the symbol resolution info for a plugin-claimed input file. */ 729 static enum ld_plugin_status 730 get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms, 731 int def_ironly_exp) 732 { 733 const plugin_input_file_t *input = handle; 734 const bfd *abfd = (const bfd *) input->abfd; 735 int n; 736 737 ASSERT (called_plugin); 738 for (n = 0; n < nsyms; n++) 739 { 740 struct bfd_link_hash_entry *blhe; 741 asection *owner_sec; 742 int res; 743 struct bfd_link_hash_entry *h 744 = bfd_link_hash_lookup (link_info.hash, syms[n].name, 745 FALSE, FALSE, TRUE); 746 enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none; 747 748 if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF) 749 { 750 blhe = h; 751 if (blhe && link_info.wrap_hash != NULL) 752 { 753 /* Check if a symbol is a wrapper symbol. */ 754 struct bfd_link_hash_entry *unwrap 755 = unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe); 756 if (unwrap && unwrap != h) 757 wrap_status = wrapper; 758 } 759 } 760 else 761 { 762 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, 763 &link_info, syms[n].name, 764 FALSE, FALSE, TRUE); 765 /* Check if a symbol is a wrapped symbol. */ 766 if (blhe && blhe != h) 767 wrap_status = wrapped; 768 } 769 if (!blhe) 770 { 771 /* The plugin is called to claim symbols in an archive element 772 from plugin_object_p. But those symbols aren't needed to 773 create output. They are defined and referenced only within 774 IR. */ 775 switch (syms[n].def) 776 { 777 default: 778 abort (); 779 case LDPK_UNDEF: 780 case LDPK_WEAKUNDEF: 781 res = LDPR_UNDEF; 782 break; 783 case LDPK_DEF: 784 case LDPK_WEAKDEF: 785 case LDPK_COMMON: 786 res = LDPR_PREVAILING_DEF_IRONLY; 787 break; 788 } 789 goto report_symbol; 790 } 791 792 /* Determine resolution from blhe type and symbol's original type. */ 793 if (blhe->type == bfd_link_hash_undefined 794 || blhe->type == bfd_link_hash_undefweak) 795 { 796 res = LDPR_UNDEF; 797 goto report_symbol; 798 } 799 if (blhe->type != bfd_link_hash_defined 800 && blhe->type != bfd_link_hash_defweak 801 && blhe->type != bfd_link_hash_common) 802 { 803 /* We should not have a new, indirect or warning symbol here. */ 804 einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"), 805 called_plugin->name, blhe->type); 806 } 807 808 /* Find out which section owns the symbol. Since it's not undef, 809 it must have an owner; if it's not a common symbol, both defs 810 and weakdefs keep it in the same place. */ 811 owner_sec = (blhe->type == bfd_link_hash_common 812 ? blhe->u.c.p->section 813 : blhe->u.def.section); 814 815 816 /* If it was originally undefined or common, then it has been 817 resolved; determine how. */ 818 if (syms[n].def == LDPK_UNDEF 819 || syms[n].def == LDPK_WEAKUNDEF 820 || syms[n].def == LDPK_COMMON) 821 { 822 if (owner_sec->owner == link_info.output_bfd) 823 res = LDPR_RESOLVED_EXEC; 824 else if (owner_sec->owner == abfd) 825 res = LDPR_PREVAILING_DEF_IRONLY; 826 else if (is_ir_dummy_bfd (owner_sec->owner)) 827 res = LDPR_RESOLVED_IR; 828 else if (owner_sec->owner != NULL 829 && (owner_sec->owner->flags & DYNAMIC) != 0) 830 res = LDPR_RESOLVED_DYN; 831 else 832 res = LDPR_RESOLVED_EXEC; 833 } 834 835 /* Was originally def, or weakdef. Does it prevail? If the 836 owner is the original dummy bfd that supplied it, then this 837 is the definition that has prevailed. */ 838 else if (owner_sec->owner == link_info.output_bfd) 839 res = LDPR_PREEMPTED_REG; 840 else if (owner_sec->owner == abfd) 841 res = LDPR_PREVAILING_DEF_IRONLY; 842 843 /* Was originally def, weakdef, or common, but has been pre-empted. */ 844 else if (is_ir_dummy_bfd (owner_sec->owner)) 845 res = LDPR_PREEMPTED_IR; 846 else 847 res = LDPR_PREEMPTED_REG; 848 849 if (res == LDPR_PREVAILING_DEF_IRONLY) 850 { 851 /* We need to know if the sym is referenced from non-IR files. Or 852 even potentially-referenced, perhaps in a future final link if 853 this is a partial one, perhaps dynamically at load-time if the 854 symbol is externally visible. Also check for wrapper symbol. */ 855 if (blhe->non_ir_ref_regular || wrap_status == wrapper) 856 res = LDPR_PREVAILING_DEF; 857 else if (wrap_status == wrapped) 858 res = LDPR_RESOLVED_IR; 859 else if (is_visible_from_outside (&syms[n], blhe)) 860 res = def_ironly_exp; 861 } 862 863 report_symbol: 864 syms[n].resolution = res; 865 if (report_plugin_symbols) 866 einfo (_("%P: %pB: symbol `%s' " 867 "definition: %s, visibility: %s, resolution: %s\n"), 868 abfd, syms[n].name, 869 get_lto_kind (syms[n].def), 870 get_lto_visibility (syms[n].visibility), 871 get_lto_resolution (res)); 872 } 873 return LDPS_OK; 874 } 875 876 static enum ld_plugin_status 877 get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) 878 { 879 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF); 880 } 881 882 static enum ld_plugin_status 883 get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) 884 { 885 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP); 886 } 887 888 /* Add a new (real) input file generated by a plugin. */ 889 static enum ld_plugin_status 890 add_input_file (const char *pathname) 891 { 892 lang_input_statement_type *is; 893 894 ASSERT (called_plugin); 895 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum, 896 NULL); 897 if (!is) 898 return LDPS_ERR; 899 is->flags.lto_output = 1; 900 return LDPS_OK; 901 } 902 903 /* Add a new (real) library required by a plugin. */ 904 static enum ld_plugin_status 905 add_input_library (const char *pathname) 906 { 907 lang_input_statement_type *is; 908 909 ASSERT (called_plugin); 910 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum, 911 NULL); 912 if (!is) 913 return LDPS_ERR; 914 is->flags.lto_output = 1; 915 return LDPS_OK; 916 } 917 918 /* Set the extra library path to be used by libraries added via 919 add_input_library. */ 920 static enum ld_plugin_status 921 set_extra_library_path (const char *path) 922 { 923 ASSERT (called_plugin); 924 ldfile_add_library_path (xstrdup (path), FALSE); 925 return LDPS_OK; 926 } 927 928 /* Issue a diagnostic message from a plugin. */ 929 static enum ld_plugin_status 930 message (int level, const char *format, ...) 931 { 932 va_list args; 933 va_start (args, format); 934 935 switch (level) 936 { 937 case LDPL_INFO: 938 vfinfo (stdout, format, args, FALSE); 939 putchar ('\n'); 940 break; 941 case LDPL_WARNING: 942 { 943 char *newfmt = concat (_("%P: warning: "), format, "\n", 944 (const char *) NULL); 945 vfinfo (stdout, newfmt, args, TRUE); 946 free (newfmt); 947 } 948 break; 949 case LDPL_FATAL: 950 case LDPL_ERROR: 951 default: 952 { 953 char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X", 954 _("%P: error: "), format, "\n", 955 (const char *) NULL); 956 fflush (stdout); 957 vfinfo (stderr, newfmt, args, TRUE); 958 fflush (stderr); 959 free (newfmt); 960 } 961 break; 962 } 963 964 va_end (args); 965 return LDPS_OK; 966 } 967 968 /* Helper to size leading part of tv array and set it up. */ 969 static void 970 set_tv_header (struct ld_plugin_tv *tv) 971 { 972 size_t i; 973 974 /* Version info. */ 975 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL); 976 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100; 977 978 for (i = 0; i < tv_header_size; i++) 979 { 980 tv[i].tv_tag = tv_header_tags[i]; 981 #define TVU(x) tv[i].tv_u.tv_ ## x 982 switch (tv[i].tv_tag) 983 { 984 case LDPT_MESSAGE: 985 TVU(message) = message; 986 break; 987 case LDPT_API_VERSION: 988 TVU(val) = LD_PLUGIN_API_VERSION; 989 break; 990 case LDPT_GNU_LD_VERSION: 991 TVU(val) = major * 100 + minor; 992 break; 993 case LDPT_LINKER_OUTPUT: 994 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL 995 : bfd_link_pde (&link_info) ? LDPO_EXEC 996 : bfd_link_pie (&link_info) ? LDPO_PIE 997 : LDPO_DYN); 998 break; 999 case LDPT_OUTPUT_NAME: 1000 TVU(string) = output_filename; 1001 break; 1002 case LDPT_REGISTER_CLAIM_FILE_HOOK: 1003 TVU(register_claim_file) = register_claim_file; 1004 break; 1005 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK: 1006 TVU(register_all_symbols_read) = register_all_symbols_read; 1007 break; 1008 case LDPT_REGISTER_CLEANUP_HOOK: 1009 TVU(register_cleanup) = register_cleanup; 1010 break; 1011 case LDPT_ADD_SYMBOLS: 1012 TVU(add_symbols) = add_symbols; 1013 break; 1014 case LDPT_GET_INPUT_FILE: 1015 TVU(get_input_file) = get_input_file; 1016 break; 1017 case LDPT_GET_VIEW: 1018 TVU(get_view) = get_view; 1019 break; 1020 case LDPT_RELEASE_INPUT_FILE: 1021 TVU(release_input_file) = release_input_file; 1022 break; 1023 case LDPT_GET_SYMBOLS: 1024 TVU(get_symbols) = get_symbols_v1; 1025 break; 1026 case LDPT_GET_SYMBOLS_V2: 1027 TVU(get_symbols) = get_symbols_v2; 1028 break; 1029 case LDPT_ADD_INPUT_FILE: 1030 TVU(add_input_file) = add_input_file; 1031 break; 1032 case LDPT_ADD_INPUT_LIBRARY: 1033 TVU(add_input_library) = add_input_library; 1034 break; 1035 case LDPT_SET_EXTRA_LIBRARY_PATH: 1036 TVU(set_extra_library_path) = set_extra_library_path; 1037 break; 1038 default: 1039 /* Added a new entry to the array without adding 1040 a new case to set up its value is a bug. */ 1041 FAIL (); 1042 } 1043 #undef TVU 1044 } 1045 } 1046 1047 /* Append the per-plugin args list and trailing LDPT_NULL to tv. */ 1048 static void 1049 set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv) 1050 { 1051 plugin_arg_t *arg = plugin->args; 1052 while (arg) 1053 { 1054 tv->tv_tag = LDPT_OPTION; 1055 tv->tv_u.tv_string = arg->arg; 1056 arg = arg->next; 1057 tv++; 1058 } 1059 tv->tv_tag = LDPT_NULL; 1060 tv->tv_u.tv_val = 0; 1061 } 1062 1063 /* Load up and initialise all plugins after argument parsing. */ 1064 void 1065 plugin_load_plugins (void) 1066 { 1067 struct ld_plugin_tv *my_tv; 1068 unsigned int max_args = 0; 1069 plugin_t *curplug = plugins_list; 1070 1071 /* If there are no plugins, we need do nothing this run. */ 1072 if (!curplug) 1073 return; 1074 1075 /* First pass over plugins to find max # args needed so that we 1076 can size and allocate the tv array. */ 1077 while (curplug) 1078 { 1079 if (curplug->n_args > max_args) 1080 max_args = curplug->n_args; 1081 curplug = curplug->next; 1082 } 1083 1084 /* Allocate tv array and initialise constant part. */ 1085 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv); 1086 set_tv_header (my_tv); 1087 1088 /* Pass over plugins again, activating them. */ 1089 curplug = plugins_list; 1090 while (curplug) 1091 { 1092 enum ld_plugin_status rv; 1093 ld_plugin_onload onloadfn; 1094 1095 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload"); 1096 if (!onloadfn) 1097 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload"); 1098 if (!onloadfn) 1099 einfo (_("%F%P: %s: error loading plugin: %s\n"), 1100 curplug->name, dlerror ()); 1101 set_tv_plugin_args (curplug, &my_tv[tv_header_size]); 1102 called_plugin = curplug; 1103 rv = (*onloadfn) (my_tv); 1104 called_plugin = NULL; 1105 if (rv != LDPS_OK) 1106 einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv); 1107 curplug = curplug->next; 1108 } 1109 1110 /* Since plugin(s) inited ok, assume they're going to want symbol 1111 resolutions, which needs us to track which symbols are referenced 1112 by non-IR files using the linker's notice callback. */ 1113 orig_notice_all = link_info.notice_all; 1114 orig_callbacks = link_info.callbacks; 1115 plugin_callbacks = *orig_callbacks; 1116 plugin_callbacks.notice = &plugin_notice; 1117 link_info.notice_all = TRUE; 1118 link_info.lto_plugin_active = TRUE; 1119 link_info.callbacks = &plugin_callbacks; 1120 1121 register_ld_plugin_object_p (plugin_object_p); 1122 1123 #if HAVE_MMAP && HAVE_GETPAGESIZE 1124 plugin_pagesize = getpagesize (); 1125 #endif 1126 } 1127 1128 /* Call 'claim file' hook for all plugins. */ 1129 static int 1130 plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed) 1131 { 1132 plugin_t *curplug = plugins_list; 1133 *claimed = FALSE; 1134 while (curplug && !*claimed) 1135 { 1136 if (curplug->claim_file_handler) 1137 { 1138 enum ld_plugin_status rv; 1139 1140 called_plugin = curplug; 1141 rv = (*curplug->claim_file_handler) (file, claimed); 1142 called_plugin = NULL; 1143 if (rv != LDPS_OK) 1144 set_plugin_error (curplug->name); 1145 } 1146 curplug = curplug->next; 1147 } 1148 return plugin_error_p () ? -1 : 0; 1149 } 1150 1151 /* Duplicates a character string with memory attached to ABFD. */ 1152 1153 static char * 1154 plugin_strdup (bfd *abfd, const char *str) 1155 { 1156 size_t strlength; 1157 char *copy; 1158 strlength = strlen (str) + 1; 1159 copy = bfd_alloc (abfd, strlength); 1160 if (copy == NULL) 1161 einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"), 1162 bfd_get_error ()); 1163 memcpy (copy, str, strlength); 1164 return copy; 1165 } 1166 1167 static const bfd_target * 1168 plugin_object_p (bfd *ibfd) 1169 { 1170 int claimed; 1171 plugin_input_file_t *input; 1172 struct ld_plugin_input_file file; 1173 bfd *abfd; 1174 1175 /* Don't try the dummy object file. */ 1176 if ((ibfd->flags & BFD_PLUGIN) != 0) 1177 return NULL; 1178 1179 if (ibfd->plugin_format != bfd_plugin_unknown) 1180 { 1181 if (ibfd->plugin_format == bfd_plugin_yes) 1182 return ibfd->plugin_dummy_bfd->xvec; 1183 else 1184 return NULL; 1185 } 1186 1187 /* We create a dummy BFD, initially empty, to house whatever symbols 1188 the plugin may want to add. */ 1189 abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd); 1190 1191 input = bfd_alloc (abfd, sizeof (*input)); 1192 if (input == NULL) 1193 einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"), 1194 bfd_get_error ()); 1195 1196 if (!bfd_plugin_open_input (ibfd, &file)) 1197 return NULL; 1198 1199 if (file.name == ibfd->filename) 1200 { 1201 /* We must copy filename attached to ibfd if it is not an archive 1202 member since it may be freed by bfd_close below. */ 1203 file.name = plugin_strdup (abfd, file.name); 1204 } 1205 1206 file.handle = input; 1207 input->abfd = abfd; 1208 input->view_buffer.addr = NULL; 1209 input->view_buffer.filesize = 0; 1210 input->view_buffer.offset = 0; 1211 input->fd = file.fd; 1212 input->use_mmap = FALSE; 1213 input->offset = file.offset; 1214 input->filesize = file.filesize; 1215 input->name = plugin_strdup (abfd, ibfd->filename); 1216 1217 claimed = 0; 1218 1219 if (plugin_call_claim_file (&file, &claimed)) 1220 einfo (_("%F%P: %s: plugin reported error claiming file\n"), 1221 plugin_error_plugin ()); 1222 1223 if (input->fd != -1 && !bfd_plugin_target_p (ibfd->xvec)) 1224 { 1225 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which 1226 doesn't need fd after plugin_call_claim_file, doesn't use 1227 BFD plugin target vector. Since GCC plugin doesn't call 1228 release_input_file, we close it here. LLVM plugin, which 1229 needs fd after plugin_call_claim_file and calls 1230 release_input_file after it is done, uses BFD plugin target 1231 vector. This scheme doesn't work when a plugin needs fd and 1232 doesn't use BFD plugin target vector neither. */ 1233 close (input->fd); 1234 input->fd = -1; 1235 } 1236 1237 if (claimed) 1238 { 1239 ibfd->plugin_format = bfd_plugin_yes; 1240 ibfd->plugin_dummy_bfd = abfd; 1241 bfd_make_readable (abfd); 1242 return abfd->xvec; 1243 } 1244 else 1245 { 1246 #if HAVE_MMAP 1247 if (input->use_mmap) 1248 { 1249 /* If plugin didn't claim the file, unmap the buffer. */ 1250 char *addr = input->view_buffer.addr; 1251 off_t size = input->view_buffer.filesize; 1252 # if HAVE_GETPAGESIZE 1253 off_t bias = input->view_buffer.offset % plugin_pagesize; 1254 size += bias; 1255 addr -= bias; 1256 # endif 1257 munmap (addr, size); 1258 } 1259 #endif 1260 1261 /* If plugin didn't claim the file, we don't need the dummy bfd. 1262 Can't avoid speculatively creating it, alas. */ 1263 ibfd->plugin_format = bfd_plugin_no; 1264 bfd_close_all_done (abfd); 1265 return NULL; 1266 } 1267 } 1268 1269 void 1270 plugin_maybe_claim (lang_input_statement_type *entry) 1271 { 1272 ASSERT (entry->header.type == lang_input_statement_enum); 1273 if (plugin_object_p (entry->the_bfd)) 1274 { 1275 bfd *abfd = entry->the_bfd->plugin_dummy_bfd; 1276 1277 /* Discard the real file's BFD and substitute the dummy one. */ 1278 1279 /* We can't call bfd_close on archives. BFD archive handling 1280 caches elements, and add_archive_element keeps pointers to 1281 the_bfd and the_bfd->filename in a lang_input_statement_type 1282 linker script statement. */ 1283 if (entry->the_bfd->my_archive == NULL) 1284 bfd_close (entry->the_bfd); 1285 entry->the_bfd = abfd; 1286 entry->flags.claimed = 1; 1287 } 1288 } 1289 1290 /* Call 'all symbols read' hook for all plugins. */ 1291 int 1292 plugin_call_all_symbols_read (void) 1293 { 1294 plugin_t *curplug = plugins_list; 1295 1296 /* Disable any further file-claiming. */ 1297 no_more_claiming = TRUE; 1298 1299 while (curplug) 1300 { 1301 if (curplug->all_symbols_read_handler) 1302 { 1303 enum ld_plugin_status rv; 1304 called_plugin = curplug; 1305 rv = (*curplug->all_symbols_read_handler) (); 1306 called_plugin = NULL; 1307 if (rv != LDPS_OK) 1308 set_plugin_error (curplug->name); 1309 } 1310 curplug = curplug->next; 1311 } 1312 return plugin_error_p () ? -1 : 0; 1313 } 1314 1315 /* Call 'cleanup' hook for all plugins at exit. */ 1316 void 1317 plugin_call_cleanup (void) 1318 { 1319 plugin_t *curplug = plugins_list; 1320 while (curplug) 1321 { 1322 if (curplug->cleanup_handler && !curplug->cleanup_done) 1323 { 1324 enum ld_plugin_status rv; 1325 curplug->cleanup_done = TRUE; 1326 called_plugin = curplug; 1327 rv = (*curplug->cleanup_handler) (); 1328 called_plugin = NULL; 1329 if (rv != LDPS_OK) 1330 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"), 1331 curplug->name, rv); 1332 dlclose (curplug->dlhandle); 1333 } 1334 curplug = curplug->next; 1335 } 1336 } 1337 1338 /* To determine which symbols should be resolved LDPR_PREVAILING_DEF 1339 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as 1340 the linker adds them to the linker hash table. Mark those 1341 referenced from a non-IR file with non_ir_ref_regular or 1342 non_ir_ref_dynamic as appropriate. We have to notice_all symbols, 1343 because we won't necessarily know until later which ones will be 1344 contributed by IR files. */ 1345 static bfd_boolean 1346 plugin_notice (struct bfd_link_info *info, 1347 struct bfd_link_hash_entry *h, 1348 struct bfd_link_hash_entry *inh, 1349 bfd *abfd, 1350 asection *section, 1351 bfd_vma value, 1352 flagword flags) 1353 { 1354 struct bfd_link_hash_entry *orig_h = h; 1355 1356 if (h != NULL) 1357 { 1358 bfd *sym_bfd; 1359 bfd_boolean ref = FALSE; 1360 1361 if (h->type == bfd_link_hash_warning) 1362 h = h->u.i.link; 1363 1364 /* Nothing to do here if this def/ref is from an IR dummy BFD. */ 1365 if (is_ir_dummy_bfd (abfd)) 1366 ; 1367 1368 /* Making an indirect symbol counts as a reference unless this 1369 is a brand new symbol. */ 1370 else if (bfd_is_ind_section (section) 1371 || (flags & BSF_INDIRECT) != 0) 1372 { 1373 /* ??? Some of this is questionable. See comments in 1374 _bfd_generic_link_add_one_symbol for case IND. */ 1375 if (h->type != bfd_link_hash_new 1376 || inh->type == bfd_link_hash_new) 1377 { 1378 if ((abfd->flags & DYNAMIC) == 0) 1379 inh->non_ir_ref_regular = TRUE; 1380 else 1381 inh->non_ir_ref_dynamic = TRUE; 1382 } 1383 1384 if (h->type != bfd_link_hash_new) 1385 ref = TRUE; 1386 } 1387 1388 /* Nothing to do here for warning symbols. */ 1389 else if ((flags & BSF_WARNING) != 0) 1390 ; 1391 1392 /* Nothing to do here for constructor symbols. */ 1393 else if ((flags & BSF_CONSTRUCTOR) != 0) 1394 ; 1395 1396 /* If this is a ref, set non_ir_ref. */ 1397 else if (bfd_is_und_section (section)) 1398 { 1399 /* Replace the undefined dummy bfd with the real one. */ 1400 if ((h->type == bfd_link_hash_undefined 1401 || h->type == bfd_link_hash_undefweak) 1402 && (h->u.undef.abfd == NULL 1403 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0)) 1404 h->u.undef.abfd = abfd; 1405 ref = TRUE; 1406 } 1407 1408 1409 /* A common symbol should be merged with other commons or 1410 defs with the same name. In particular, a common ought 1411 to be overridden by a def in a -flto object. In that 1412 sense a common is also a ref. */ 1413 else if (bfd_is_com_section (section)) 1414 { 1415 if (h->type == bfd_link_hash_common 1416 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)) 1417 { 1418 h->type = bfd_link_hash_undefweak; 1419 h->u.undef.abfd = sym_bfd; 1420 } 1421 ref = TRUE; 1422 } 1423 1424 /* Otherwise, it must be a new def. 1425 Ensure any symbol defined in an IR dummy BFD takes on a 1426 new value from a real BFD. Weak symbols are not normally 1427 overridden by a new weak definition, and strong symbols 1428 will normally cause multiple definition errors. Avoid 1429 this by making the symbol appear to be undefined. */ 1430 else if (((h->type == bfd_link_hash_defweak 1431 || h->type == bfd_link_hash_defined) 1432 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner)) 1433 || (h->type == bfd_link_hash_common 1434 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))) 1435 { 1436 h->type = bfd_link_hash_undefweak; 1437 h->u.undef.abfd = sym_bfd; 1438 } 1439 1440 if (ref) 1441 { 1442 if ((abfd->flags & DYNAMIC) == 0) 1443 h->non_ir_ref_regular = TRUE; 1444 else 1445 h->non_ir_ref_dynamic = TRUE; 1446 } 1447 } 1448 1449 /* Continue with cref/nocrossref/trace-sym processing. */ 1450 if (orig_h == NULL 1451 || orig_notice_all 1452 || (info->notice_hash != NULL 1453 && bfd_hash_lookup (info->notice_hash, orig_h->root.string, 1454 FALSE, FALSE) != NULL)) 1455 return (*orig_callbacks->notice) (info, orig_h, inh, 1456 abfd, section, value, flags); 1457 return TRUE; 1458 } 1459