xref: /dragonfly/contrib/binutils-2.34/ld/plugin.c (revision a1626531)
1 /* Plugin control for the GNU linker.
2    Copyright (C) 2010-2020 Free Software Foundation, Inc.
3 
4    This file is part of the GNU Binutils.
5 
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License as published by
8    the Free Software Foundation; either version 3 of the License, or
9    (at your option) any later version.
10 
11    This program is distributed in the hope that it will be useful,
12    but WITHOUT ANY WARRANTY; without even the implied warranty of
13    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14    GNU General Public License for more details.
15 
16    You should have received a copy of the GNU General Public License
17    along with this program; if not, write to the Free Software
18    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19    MA 02110-1301, USA.  */
20 
21 #include "sysdep.h"
22 #include "libiberty.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "bfdver.h"
26 #include "ctf-api.h"
27 #include "ld.h"
28 #include "ldmain.h"
29 #include "ldmisc.h"
30 #include "ldexp.h"
31 #include "ldlang.h"
32 #include "ldfile.h"
33 #include "plugin-api.h"
34 #include "../bfd/plugin.h"
35 #include "plugin.h"
36 #include "elf-bfd.h"
37 #if HAVE_MMAP
38 # include <sys/mman.h>
39 # ifndef MAP_FAILED
40 #  define MAP_FAILED ((void *) -1)
41 # endif
42 # ifndef PROT_READ
43 #  define PROT_READ 0
44 # endif
45 # ifndef MAP_PRIVATE
46 #  define MAP_PRIVATE 0
47 # endif
48 #endif
49 #include <errno.h>
50 #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
51 extern int errno;
52 #endif
53 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
54 #include <windows.h>
55 #endif
56 
57 /* Report plugin symbols.  */
58 bfd_boolean report_plugin_symbols;
59 
60 /* The suffix to append to the name of the real (claimed) object file
61    when generating a dummy BFD to hold the IR symbols sent from the
62    plugin.  For cosmetic use only; appears in maps, crefs etc.  */
63 #define IRONLY_SUFFIX " (symbol from plugin)"
64 
65 /* Stores a single argument passed to a plugin.  */
66 typedef struct plugin_arg
67 {
68   struct plugin_arg *next;
69   const char *arg;
70 } plugin_arg_t;
71 
72 /* Holds all details of a single plugin.  */
73 typedef struct plugin
74 {
75   /* Next on the list of plugins, or NULL at end of chain.  */
76   struct plugin *next;
77   /* The argument string given to --plugin.  */
78   const char *name;
79   /* The shared library handle returned by dlopen.  */
80   void *dlhandle;
81   /* The list of argument string given to --plugin-opt.  */
82   plugin_arg_t *args;
83   /* Number of args in the list, for convenience.  */
84   size_t n_args;
85   /* The plugin's event handlers.  */
86   ld_plugin_claim_file_handler claim_file_handler;
87   ld_plugin_all_symbols_read_handler all_symbols_read_handler;
88   ld_plugin_cleanup_handler cleanup_handler;
89   /* TRUE if the cleanup handlers have been called.  */
90   bfd_boolean cleanup_done;
91 } plugin_t;
92 
93 typedef struct view_buffer
94 {
95   char *addr;
96   size_t filesize;
97   off_t offset;
98 } view_buffer_t;
99 
100 /* The internal version of struct ld_plugin_input_file with a BFD
101    pointer.  */
102 typedef struct plugin_input_file
103 {
104   bfd *abfd;
105   view_buffer_t view_buffer;
106   char *name;
107   int fd;
108   bfd_boolean use_mmap;
109   off_t offset;
110   off_t filesize;
111 } plugin_input_file_t;
112 
113 /* The master list of all plugins.  */
114 static plugin_t *plugins_list = NULL;
115 
116 /* We keep a tail pointer for easy linking on the end.  */
117 static plugin_t **plugins_tail_chain_ptr = &plugins_list;
118 
119 /* The last plugin added to the list, for receiving args.  */
120 static plugin_t *last_plugin = NULL;
121 
122 /* The tail of the arg chain of the last plugin added to the list.  */
123 static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
124 
125 /* The plugin which is currently having a callback executed.  */
126 static plugin_t *called_plugin = NULL;
127 
128 /* Last plugin to cause an error, if any.  */
129 static const char *error_plugin = NULL;
130 
131 /* State of linker "notice" interface before we poked at it.  */
132 static bfd_boolean orig_notice_all;
133 
134 /* Original linker callbacks, and the plugin version.  */
135 static const struct bfd_link_callbacks *orig_callbacks;
136 static struct bfd_link_callbacks plugin_callbacks;
137 
138 /* Set at all symbols read time, to avoid recursively offering the plugin
139    its own newly-added input files and libs to claim.  */
140 bfd_boolean no_more_claiming = FALSE;
141 
142 #if HAVE_MMAP && HAVE_GETPAGESIZE
143 /* Page size used by mmap.  */
144 static off_t plugin_pagesize;
145 #endif
146 
147 /* List of tags to set in the constant leading part of the tv array. */
148 static const enum ld_plugin_tag tv_header_tags[] =
149 {
150   LDPT_MESSAGE,
151   LDPT_API_VERSION,
152   LDPT_GNU_LD_VERSION,
153   LDPT_LINKER_OUTPUT,
154   LDPT_OUTPUT_NAME,
155   LDPT_REGISTER_CLAIM_FILE_HOOK,
156   LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
157   LDPT_REGISTER_CLEANUP_HOOK,
158   LDPT_ADD_SYMBOLS,
159   LDPT_GET_INPUT_FILE,
160   LDPT_GET_VIEW,
161   LDPT_RELEASE_INPUT_FILE,
162   LDPT_GET_SYMBOLS,
163   LDPT_GET_SYMBOLS_V2,
164   LDPT_ADD_INPUT_FILE,
165   LDPT_ADD_INPUT_LIBRARY,
166   LDPT_SET_EXTRA_LIBRARY_PATH
167 };
168 
169 /* How many entries in the constant leading part of the tv array.  */
170 static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
171 
172 /* Forward references.  */
173 static bfd_boolean plugin_notice (struct bfd_link_info *,
174 				  struct bfd_link_hash_entry *,
175 				  struct bfd_link_hash_entry *,
176 				  bfd *, asection *, bfd_vma, flagword);
177 
178 static const bfd_target * plugin_object_p (bfd *);
179 
180 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
181 
182 #define RTLD_NOW 0	/* Dummy value.  */
183 
184 static void *
185 dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
186 {
187   return LoadLibrary (file);
188 }
189 
190 static void *
191 dlsym (void *handle, const char *name)
192 {
193   return GetProcAddress (handle, name);
194 }
195 
196 static int
197 dlclose (void *handle)
198 {
199   FreeLibrary (handle);
200   return 0;
201 }
202 
203 #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)  */
204 
205 #ifndef HAVE_DLFCN_H
206 static const char *
207 dlerror (void)
208 {
209   return "";
210 }
211 #endif
212 
213 /* Helper function for exiting with error status.  */
214 static int
215 set_plugin_error (const char *plugin)
216 {
217   error_plugin = plugin;
218   return -1;
219 }
220 
221 /* Test if an error occurred.  */
222 static bfd_boolean
223 plugin_error_p (void)
224 {
225   return error_plugin != NULL;
226 }
227 
228 /* Return name of plugin which caused an error if any.  */
229 const char *
230 plugin_error_plugin (void)
231 {
232   return error_plugin ? error_plugin : _("<no plugin>");
233 }
234 
235 /* Handle -plugin arg: find and load plugin, or return error.  */
236 void
237 plugin_opt_plugin (const char *plugin)
238 {
239   plugin_t *newplug;
240   plugin_t *curplug = plugins_list;
241 
242   newplug = xmalloc (sizeof *newplug);
243   memset (newplug, 0, sizeof *newplug);
244   newplug->name = plugin;
245   newplug->dlhandle = dlopen (plugin, RTLD_NOW);
246   if (!newplug->dlhandle)
247     einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ());
248 
249   /* Check if plugin has been loaded already.  */
250   while (curplug)
251     {
252       if (newplug->dlhandle == curplug->dlhandle)
253 	{
254 	  einfo (_("%P: %s: duplicated plugin\n"), plugin);
255 	  free (newplug);
256 	  return;
257 	}
258       curplug = curplug->next;
259     }
260 
261   /* Chain on end, so when we run list it is in command-line order.  */
262   *plugins_tail_chain_ptr = newplug;
263   plugins_tail_chain_ptr = &newplug->next;
264 
265   /* Record it as current plugin for receiving args.  */
266   last_plugin = newplug;
267   last_plugin_args_tail_chain_ptr = &newplug->args;
268 }
269 
270 /* Accumulate option arguments for last-loaded plugin, or return
271    error if none.  */
272 int
273 plugin_opt_plugin_arg (const char *arg)
274 {
275   plugin_arg_t *newarg;
276 
277   if (!last_plugin)
278     return set_plugin_error (_("<no plugin>"));
279 
280   /* Ignore -pass-through= from GCC driver.  */
281   if (*arg == '-')
282     {
283       const char *p = arg + 1;
284 
285       if (*p == '-')
286 	++p;
287       if (strncmp (p, "pass-through=", 13) == 0)
288 	return 0;
289     }
290 
291   newarg = xmalloc (sizeof *newarg);
292   newarg->arg = arg;
293   newarg->next = NULL;
294 
295   /* Chain on end to preserve command-line order.  */
296   *last_plugin_args_tail_chain_ptr = newarg;
297   last_plugin_args_tail_chain_ptr = &newarg->next;
298   last_plugin->n_args++;
299   return 0;
300 }
301 
302 /* Generate a dummy BFD to represent an IR file, for any callers of
303    plugin_call_claim_file to use as the handle in the ld_plugin_input_file
304    struct that they build to pass in.  The BFD is initially writable, so
305    that symbols can be added to it; it must be made readable after the
306    add_symbols hook has been called so that it can be read when linking.  */
307 static bfd *
308 plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
309 {
310   bfd *abfd;
311   bfd_boolean bfd_plugin_target;
312 
313   bfd_use_reserved_id = 1;
314   bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
315   abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
316 		     bfd_plugin_target ? link_info.output_bfd : srctemplate);
317   if (abfd != NULL)
318     {
319       abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
320       if (!bfd_make_writable (abfd))
321 	goto report_error;
322       if (!bfd_plugin_target)
323 	{
324 	  bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
325 	  bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
326 	  if (!bfd_copy_private_bfd_data (srctemplate, abfd))
327 	    goto report_error;
328 	}
329 	{
330 	  flagword flags;
331 
332 	  /* Create section to own the symbols.  */
333 	  flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
334 		   | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
335 	  if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
336 	    return abfd;
337 	}
338     }
339 report_error:
340   einfo (_("%F%P: could not create dummy IR bfd: %E\n"));
341   return NULL;
342 }
343 
344 /* Check if the BFD passed in is an IR dummy object file.  */
345 static inline bfd_boolean
346 is_ir_dummy_bfd (const bfd *abfd)
347 {
348   /* ABFD can sometimes legitimately be NULL, e.g. when called from one
349      of the linker callbacks for a symbol in the *ABS* or *UND* sections.  */
350   return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
351 }
352 
353 /* Helpers to convert between BFD and GOLD symbol formats.  */
354 static enum ld_plugin_status
355 asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
356 			    const struct ld_plugin_symbol *ldsym)
357 {
358   flagword flags = BSF_NO_FLAGS;
359   struct bfd_section *section;
360 
361   asym->the_bfd = abfd;
362   asym->name = (ldsym->version
363 		? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
364 		: ldsym->name);
365   asym->value = 0;
366   switch (ldsym->def)
367     {
368     case LDPK_WEAKDEF:
369       flags = BSF_WEAK;
370       /* FALLTHRU */
371     case LDPK_DEF:
372       flags |= BSF_GLOBAL;
373       if (ldsym->comdat_key)
374 	{
375 	  char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
376 			       (const char *) NULL);
377 	  section = bfd_get_section_by_name (abfd, name);
378 	  if (section != NULL)
379 	    free (name);
380 	  else
381 	    {
382 	      flagword sflags;
383 
384 	      sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
385 			| SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
386 			| SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
387 	      section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
388 	      if (section == NULL)
389 		return LDPS_ERR;
390 	    }
391 	}
392       else
393 	section = bfd_get_section_by_name (abfd, ".text");
394       break;
395 
396     case LDPK_WEAKUNDEF:
397       flags = BSF_WEAK;
398       /* FALLTHRU */
399     case LDPK_UNDEF:
400       section = bfd_und_section_ptr;
401       break;
402 
403     case LDPK_COMMON:
404       flags = BSF_GLOBAL;
405       section = bfd_com_section_ptr;
406       asym->value = ldsym->size;
407       break;
408 
409     default:
410       return LDPS_ERR;
411     }
412   asym->flags = flags;
413   asym->section = section;
414 
415   if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
416     {
417       elf_symbol_type *elfsym = elf_symbol_from (abfd, asym);
418       unsigned char visibility;
419 
420       if (!elfsym)
421 	einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
422 
423       if (ldsym->def == LDPK_COMMON)
424 	{
425 	  elfsym->internal_elf_sym.st_shndx = SHN_COMMON;
426 	  elfsym->internal_elf_sym.st_value = 1;
427 	}
428 
429       switch (ldsym->visibility)
430 	{
431 	default:
432 	  einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"),
433 		 ldsym->visibility);
434 	  return LDPS_ERR;
435 
436 	case LDPV_DEFAULT:
437 	  visibility = STV_DEFAULT;
438 	  break;
439 	case LDPV_PROTECTED:
440 	  visibility = STV_PROTECTED;
441 	  break;
442 	case LDPV_INTERNAL:
443 	  visibility = STV_INTERNAL;
444 	  break;
445 	case LDPV_HIDDEN:
446 	  visibility = STV_HIDDEN;
447 	  break;
448 	}
449       elfsym->internal_elf_sym.st_other |= visibility;
450     }
451 
452   return LDPS_OK;
453 }
454 
455 /* Register a claim-file handler.  */
456 static enum ld_plugin_status
457 register_claim_file (ld_plugin_claim_file_handler handler)
458 {
459   ASSERT (called_plugin);
460   called_plugin->claim_file_handler = handler;
461   return LDPS_OK;
462 }
463 
464 /* Register an all-symbols-read handler.  */
465 static enum ld_plugin_status
466 register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
467 {
468   ASSERT (called_plugin);
469   called_plugin->all_symbols_read_handler = handler;
470   return LDPS_OK;
471 }
472 
473 /* Register a cleanup handler.  */
474 static enum ld_plugin_status
475 register_cleanup (ld_plugin_cleanup_handler handler)
476 {
477   ASSERT (called_plugin);
478   called_plugin->cleanup_handler = handler;
479   return LDPS_OK;
480 }
481 
482 /* Add symbols from a plugin-claimed input file.  */
483 static enum ld_plugin_status
484 add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
485 {
486   asymbol **symptrs;
487   plugin_input_file_t *input = handle;
488   bfd *abfd = input->abfd;
489   int n;
490 
491   ASSERT (called_plugin);
492   symptrs = xmalloc (nsyms * sizeof *symptrs);
493   for (n = 0; n < nsyms; n++)
494     {
495       enum ld_plugin_status rv;
496       asymbol *bfdsym;
497 
498       bfdsym = bfd_make_empty_symbol (abfd);
499       symptrs[n] = bfdsym;
500       rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
501       if (rv != LDPS_OK)
502 	return rv;
503     }
504   bfd_set_symtab (abfd, symptrs, nsyms);
505   return LDPS_OK;
506 }
507 
508 /* Get the input file information with an open (possibly re-opened)
509    file descriptor.  */
510 static enum ld_plugin_status
511 get_input_file (const void *handle, struct ld_plugin_input_file *file)
512 {
513   const plugin_input_file_t *input = handle;
514 
515   ASSERT (called_plugin);
516 
517   file->name = input->name;
518   file->offset = input->offset;
519   file->filesize = input->filesize;
520   file->handle = (void *) handle;
521 
522   return LDPS_OK;
523 }
524 
525 /* Get view of the input file.  */
526 static enum ld_plugin_status
527 get_view (const void *handle, const void **viewp)
528 {
529   plugin_input_file_t *input = (plugin_input_file_t *) handle;
530   char *buffer;
531   size_t size = input->filesize;
532   off_t offset = input->offset;
533 #if HAVE_MMAP && HAVE_GETPAGESIZE
534   off_t bias;
535 #endif
536 
537   ASSERT (called_plugin);
538 
539   /* FIXME: einfo should support %lld.  */
540   if ((off_t) size != input->filesize)
541     einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"),
542 	   input->name, (long) input->filesize);
543 
544   /* Check the cached view buffer.  */
545   if (input->view_buffer.addr != NULL
546       && input->view_buffer.filesize == size
547       && input->view_buffer.offset == offset)
548     {
549       *viewp = input->view_buffer.addr;
550       return LDPS_OK;
551     }
552 
553   input->view_buffer.filesize = size;
554   input->view_buffer.offset = offset;
555 
556 #if HAVE_MMAP
557 # if HAVE_GETPAGESIZE
558   bias = offset % plugin_pagesize;
559   offset -= bias;
560   size += bias;
561 # endif
562   buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
563   if (buffer != MAP_FAILED)
564     {
565       input->use_mmap = TRUE;
566 # if HAVE_GETPAGESIZE
567       buffer += bias;
568 # endif
569     }
570   else
571 #endif
572     {
573       char *p;
574 
575       input->use_mmap = FALSE;
576 
577       if (lseek (input->fd, offset, SEEK_SET) < 0)
578 	return LDPS_ERR;
579 
580       buffer = bfd_alloc (input->abfd, size);
581       if (buffer == NULL)
582 	return LDPS_ERR;
583 
584       p = buffer;
585       do
586 	{
587 	  ssize_t got = read (input->fd, p, size);
588 	  if (got == 0)
589 	    break;
590 	  else if (got > 0)
591 	    {
592 	      p += got;
593 	      size -= got;
594 	    }
595 	  else if (errno != EINTR)
596 	    return LDPS_ERR;
597 	}
598       while (size > 0);
599     }
600 
601   input->view_buffer.addr = buffer;
602   *viewp = buffer;
603 
604   return LDPS_OK;
605 }
606 
607 /* Release the input file.  */
608 static enum ld_plugin_status
609 release_input_file (const void *handle)
610 {
611   plugin_input_file_t *input = (plugin_input_file_t *) handle;
612   ASSERT (called_plugin);
613   if (input->fd != -1)
614     {
615       close (input->fd);
616       input->fd = -1;
617     }
618   return LDPS_OK;
619 }
620 
621 /* Return TRUE if a defined symbol might be reachable from outside the
622    universe of claimed objects.  */
623 static inline bfd_boolean
624 is_visible_from_outside (struct ld_plugin_symbol *lsym,
625 			 struct bfd_link_hash_entry *blhe)
626 {
627   if (bfd_link_relocatable (&link_info))
628     return TRUE;
629   if (blhe->non_ir_ref_dynamic
630       || link_info.export_dynamic
631       || bfd_link_dll (&link_info))
632     {
633       /* Check if symbol is hidden by version script.  */
634       if (bfd_hide_sym_by_version (link_info.version_info,
635 				   blhe->root.string))
636 	return FALSE;
637       /* Only ELF symbols really have visibility.  */
638       if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour)
639 	{
640 	  struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
641 	  int vis = ELF_ST_VISIBILITY (el->other);
642 	  return vis == STV_DEFAULT || vis == STV_PROTECTED;
643 	}
644       /* On non-ELF targets, we can safely make inferences by considering
645 	 what visibility the plugin would have liked to apply when it first
646 	 sent us the symbol.  During ELF symbol processing, visibility only
647 	 ever becomes more restrictive, not less, when symbols are merged,
648 	 so this is a conservative estimate; it may give false positives,
649 	 declaring something visible from outside when it in fact would
650 	 not have been, but this will only lead to missed optimisation
651 	 opportunities during LTRANS at worst; it will not give false
652 	 negatives, which can lead to the disastrous conclusion that the
653 	 related symbol is IRONLY.  (See GCC PR46319 for an example.)  */
654       return (lsym->visibility == LDPV_DEFAULT
655 	      || lsym->visibility == LDPV_PROTECTED);
656     }
657 
658   return FALSE;
659 }
660 
661 /* Return LTO kind string name that corresponds to IDX enum value.  */
662 static const char *
663 get_lto_kind (unsigned int idx)
664 {
665   static char buffer[64];
666   const char *lto_kind_str[5] =
667   {
668     "DEF",
669     "WEAKDEF",
670     "UNDEF",
671     "WEAKUNDEF",
672     "COMMON"
673   };
674 
675   if (idx < ARRAY_SIZE (lto_kind_str))
676     return lto_kind_str [idx];
677 
678   sprintf (buffer, _("unknown LTO kind value %x"), idx);
679   return buffer;
680 }
681 
682 /* Return LTO resolution string name that corresponds to IDX enum value.  */
683 static const char *
684 get_lto_resolution (unsigned int idx)
685 {
686   static char buffer[64];
687   static const char *lto_resolution_str[10] =
688   {
689     "UNKNOWN",
690     "UNDEF",
691     "PREVAILING_DEF",
692     "PREVAILING_DEF_IRONLY",
693     "PREEMPTED_REG",
694     "PREEMPTED_IR",
695     "RESOLVED_IR",
696     "RESOLVED_EXEC",
697     "RESOLVED_DYN",
698     "PREVAILING_DEF_IRONLY_EXP",
699   };
700 
701   if (idx < ARRAY_SIZE (lto_resolution_str))
702     return lto_resolution_str [idx];
703 
704   sprintf (buffer, _("unknown LTO resolution value %x"), idx);
705   return buffer;
706 }
707 
708 /* Return LTO visibility string name that corresponds to IDX enum value.  */
709 static const char *
710 get_lto_visibility (unsigned int idx)
711 {
712   static char buffer[64];
713   const char *lto_visibility_str[4] =
714   {
715     "DEFAULT",
716     "PROTECTED",
717     "INTERNAL",
718     "HIDDEN"
719   };
720 
721   if (idx < ARRAY_SIZE (lto_visibility_str))
722     return lto_visibility_str [idx];
723 
724   sprintf (buffer, _("unknown LTO visibility value %x"), idx);
725   return buffer;
726 }
727 
728 /* Get the symbol resolution info for a plugin-claimed input file.  */
729 static enum ld_plugin_status
730 get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
731 	     int def_ironly_exp)
732 {
733   const plugin_input_file_t *input = handle;
734   const bfd *abfd = (const bfd *) input->abfd;
735   int n;
736 
737   ASSERT (called_plugin);
738   for (n = 0; n < nsyms; n++)
739     {
740       struct bfd_link_hash_entry *blhe;
741       asection *owner_sec;
742       int res;
743       struct bfd_link_hash_entry *h
744 	= bfd_link_hash_lookup (link_info.hash, syms[n].name,
745 				FALSE, FALSE, TRUE);
746       enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none;
747 
748       if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF)
749 	{
750 	  blhe = h;
751 	  if (blhe && link_info.wrap_hash != NULL)
752 	    {
753 	      /* Check if a symbol is a wrapper symbol.  */
754 	      struct bfd_link_hash_entry *unwrap
755 		= unwrap_hash_lookup (&link_info, (bfd *) abfd, blhe);
756 	      if (unwrap && unwrap != h)
757 		wrap_status = wrapper;
758 	     }
759 	}
760       else
761 	{
762 	  blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd,
763 					       &link_info, syms[n].name,
764 					       FALSE, FALSE, TRUE);
765 	  /* Check if a symbol is a wrapped symbol.  */
766 	  if (blhe && blhe != h)
767 	    wrap_status = wrapped;
768 	}
769       if (!blhe)
770 	{
771 	  /* The plugin is called to claim symbols in an archive element
772 	     from plugin_object_p.  But those symbols aren't needed to
773 	     create output.  They are defined and referenced only within
774 	     IR.  */
775 	  switch (syms[n].def)
776 	    {
777 	    default:
778 	      abort ();
779 	    case LDPK_UNDEF:
780 	    case LDPK_WEAKUNDEF:
781 	      res = LDPR_UNDEF;
782 	      break;
783 	    case LDPK_DEF:
784 	    case LDPK_WEAKDEF:
785 	    case LDPK_COMMON:
786 	      res = LDPR_PREVAILING_DEF_IRONLY;
787 	      break;
788 	    }
789 	  goto report_symbol;
790 	}
791 
792       /* Determine resolution from blhe type and symbol's original type.  */
793       if (blhe->type == bfd_link_hash_undefined
794 	  || blhe->type == bfd_link_hash_undefweak)
795 	{
796 	  res = LDPR_UNDEF;
797 	  goto report_symbol;
798 	}
799       if (blhe->type != bfd_link_hash_defined
800 	  && blhe->type != bfd_link_hash_defweak
801 	  && blhe->type != bfd_link_hash_common)
802 	{
803 	  /* We should not have a new, indirect or warning symbol here.  */
804 	  einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"),
805 		 called_plugin->name, blhe->type);
806 	}
807 
808       /* Find out which section owns the symbol.  Since it's not undef,
809 	 it must have an owner; if it's not a common symbol, both defs
810 	 and weakdefs keep it in the same place. */
811       owner_sec = (blhe->type == bfd_link_hash_common
812 		   ? blhe->u.c.p->section
813 		   : blhe->u.def.section);
814 
815 
816       /* If it was originally undefined or common, then it has been
817 	 resolved; determine how.  */
818       if (syms[n].def == LDPK_UNDEF
819 	  || syms[n].def == LDPK_WEAKUNDEF
820 	  || syms[n].def == LDPK_COMMON)
821 	{
822 	  if (owner_sec->owner == link_info.output_bfd)
823 	    res = LDPR_RESOLVED_EXEC;
824 	  else if (owner_sec->owner == abfd)
825 	    res = LDPR_PREVAILING_DEF_IRONLY;
826 	  else if (is_ir_dummy_bfd (owner_sec->owner))
827 	    res = LDPR_RESOLVED_IR;
828 	  else if (owner_sec->owner != NULL
829 		   && (owner_sec->owner->flags & DYNAMIC) != 0)
830 	    res = LDPR_RESOLVED_DYN;
831 	  else
832 	    res = LDPR_RESOLVED_EXEC;
833 	}
834 
835       /* Was originally def, or weakdef.  Does it prevail?  If the
836 	 owner is the original dummy bfd that supplied it, then this
837 	 is the definition that has prevailed.  */
838       else if (owner_sec->owner == link_info.output_bfd)
839 	res = LDPR_PREEMPTED_REG;
840       else if (owner_sec->owner == abfd)
841 	res = LDPR_PREVAILING_DEF_IRONLY;
842 
843       /* Was originally def, weakdef, or common, but has been pre-empted.  */
844       else if (is_ir_dummy_bfd (owner_sec->owner))
845 	res = LDPR_PREEMPTED_IR;
846       else
847 	res = LDPR_PREEMPTED_REG;
848 
849       if (res == LDPR_PREVAILING_DEF_IRONLY)
850 	{
851 	  /* We need to know if the sym is referenced from non-IR files.  Or
852 	     even potentially-referenced, perhaps in a future final link if
853 	     this is a partial one, perhaps dynamically at load-time if the
854 	     symbol is externally visible.  Also check for wrapper symbol.  */
855 	  if (blhe->non_ir_ref_regular || wrap_status == wrapper)
856 	    res = LDPR_PREVAILING_DEF;
857 	  else if (wrap_status == wrapped)
858 	    res = LDPR_RESOLVED_IR;
859 	  else if (is_visible_from_outside (&syms[n], blhe))
860 	    res = def_ironly_exp;
861 	}
862 
863     report_symbol:
864       syms[n].resolution = res;
865       if (report_plugin_symbols)
866 	einfo (_("%P: %pB: symbol `%s' "
867 		 "definition: %s, visibility: %s, resolution: %s\n"),
868 	       abfd, syms[n].name,
869 	       get_lto_kind (syms[n].def),
870 	       get_lto_visibility (syms[n].visibility),
871 	       get_lto_resolution (res));
872     }
873   return LDPS_OK;
874 }
875 
876 static enum ld_plugin_status
877 get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
878 {
879   return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
880 }
881 
882 static enum ld_plugin_status
883 get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
884 {
885   return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
886 }
887 
888 /* Add a new (real) input file generated by a plugin.  */
889 static enum ld_plugin_status
890 add_input_file (const char *pathname)
891 {
892   lang_input_statement_type *is;
893 
894   ASSERT (called_plugin);
895   is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
896 			    NULL);
897   if (!is)
898     return LDPS_ERR;
899   is->flags.lto_output = 1;
900   return LDPS_OK;
901 }
902 
903 /* Add a new (real) library required by a plugin.  */
904 static enum ld_plugin_status
905 add_input_library (const char *pathname)
906 {
907   lang_input_statement_type *is;
908 
909   ASSERT (called_plugin);
910   is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
911 			    NULL);
912   if (!is)
913     return LDPS_ERR;
914   is->flags.lto_output = 1;
915   return LDPS_OK;
916 }
917 
918 /* Set the extra library path to be used by libraries added via
919    add_input_library.  */
920 static enum ld_plugin_status
921 set_extra_library_path (const char *path)
922 {
923   ASSERT (called_plugin);
924   ldfile_add_library_path (xstrdup (path), FALSE);
925   return LDPS_OK;
926 }
927 
928 /* Issue a diagnostic message from a plugin.  */
929 static enum ld_plugin_status
930 message (int level, const char *format, ...)
931 {
932   va_list args;
933   va_start (args, format);
934 
935   switch (level)
936     {
937     case LDPL_INFO:
938       vfinfo (stdout, format, args, FALSE);
939       putchar ('\n');
940       break;
941     case LDPL_WARNING:
942       {
943 	char *newfmt = concat (_("%P: warning: "), format, "\n",
944 			       (const char *) NULL);
945 	vfinfo (stdout, newfmt, args, TRUE);
946 	free (newfmt);
947       }
948       break;
949     case LDPL_FATAL:
950     case LDPL_ERROR:
951     default:
952       {
953 	char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X",
954 			       _("%P: error: "), format, "\n",
955 			       (const char *) NULL);
956 	fflush (stdout);
957 	vfinfo (stderr, newfmt, args, TRUE);
958 	fflush (stderr);
959 	free (newfmt);
960       }
961       break;
962     }
963 
964   va_end (args);
965   return LDPS_OK;
966 }
967 
968 /* Helper to size leading part of tv array and set it up. */
969 static void
970 set_tv_header (struct ld_plugin_tv *tv)
971 {
972   size_t i;
973 
974   /* Version info.  */
975   static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
976   static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
977 
978   for (i = 0; i < tv_header_size; i++)
979     {
980       tv[i].tv_tag = tv_header_tags[i];
981 #define TVU(x) tv[i].tv_u.tv_ ## x
982       switch (tv[i].tv_tag)
983 	{
984 	case LDPT_MESSAGE:
985 	  TVU(message) = message;
986 	  break;
987 	case LDPT_API_VERSION:
988 	  TVU(val) = LD_PLUGIN_API_VERSION;
989 	  break;
990 	case LDPT_GNU_LD_VERSION:
991 	  TVU(val) = major * 100 + minor;
992 	  break;
993 	case LDPT_LINKER_OUTPUT:
994 	  TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
995 		      : bfd_link_pde (&link_info) ? LDPO_EXEC
996 		      : bfd_link_pie (&link_info) ? LDPO_PIE
997 		      : LDPO_DYN);
998 	  break;
999 	case LDPT_OUTPUT_NAME:
1000 	  TVU(string) = output_filename;
1001 	  break;
1002 	case LDPT_REGISTER_CLAIM_FILE_HOOK:
1003 	  TVU(register_claim_file) = register_claim_file;
1004 	  break;
1005 	case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
1006 	  TVU(register_all_symbols_read) = register_all_symbols_read;
1007 	  break;
1008 	case LDPT_REGISTER_CLEANUP_HOOK:
1009 	  TVU(register_cleanup) = register_cleanup;
1010 	  break;
1011 	case LDPT_ADD_SYMBOLS:
1012 	  TVU(add_symbols) = add_symbols;
1013 	  break;
1014 	case LDPT_GET_INPUT_FILE:
1015 	  TVU(get_input_file) = get_input_file;
1016 	  break;
1017 	case LDPT_GET_VIEW:
1018 	  TVU(get_view) = get_view;
1019 	  break;
1020 	case LDPT_RELEASE_INPUT_FILE:
1021 	  TVU(release_input_file) = release_input_file;
1022 	  break;
1023 	case LDPT_GET_SYMBOLS:
1024 	  TVU(get_symbols) = get_symbols_v1;
1025 	  break;
1026 	case LDPT_GET_SYMBOLS_V2:
1027 	  TVU(get_symbols) = get_symbols_v2;
1028 	  break;
1029 	case LDPT_ADD_INPUT_FILE:
1030 	  TVU(add_input_file) = add_input_file;
1031 	  break;
1032 	case LDPT_ADD_INPUT_LIBRARY:
1033 	  TVU(add_input_library) = add_input_library;
1034 	  break;
1035 	case LDPT_SET_EXTRA_LIBRARY_PATH:
1036 	  TVU(set_extra_library_path) = set_extra_library_path;
1037 	  break;
1038 	default:
1039 	  /* Added a new entry to the array without adding
1040 	     a new case to set up its value is a bug.  */
1041 	  FAIL ();
1042 	}
1043 #undef TVU
1044     }
1045 }
1046 
1047 /* Append the per-plugin args list and trailing LDPT_NULL to tv.  */
1048 static void
1049 set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
1050 {
1051   plugin_arg_t *arg = plugin->args;
1052   while (arg)
1053     {
1054       tv->tv_tag = LDPT_OPTION;
1055       tv->tv_u.tv_string = arg->arg;
1056       arg = arg->next;
1057       tv++;
1058     }
1059   tv->tv_tag = LDPT_NULL;
1060   tv->tv_u.tv_val = 0;
1061 }
1062 
1063 /* Load up and initialise all plugins after argument parsing.  */
1064 void
1065 plugin_load_plugins (void)
1066 {
1067   struct ld_plugin_tv *my_tv;
1068   unsigned int max_args = 0;
1069   plugin_t *curplug = plugins_list;
1070 
1071   /* If there are no plugins, we need do nothing this run.  */
1072   if (!curplug)
1073     return;
1074 
1075   /* First pass over plugins to find max # args needed so that we
1076      can size and allocate the tv array.  */
1077   while (curplug)
1078     {
1079       if (curplug->n_args > max_args)
1080 	max_args = curplug->n_args;
1081       curplug = curplug->next;
1082     }
1083 
1084   /* Allocate tv array and initialise constant part.  */
1085   my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1086   set_tv_header (my_tv);
1087 
1088   /* Pass over plugins again, activating them.  */
1089   curplug = plugins_list;
1090   while (curplug)
1091     {
1092       enum ld_plugin_status rv;
1093       ld_plugin_onload onloadfn;
1094 
1095       onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
1096       if (!onloadfn)
1097 	onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
1098       if (!onloadfn)
1099 	einfo (_("%F%P: %s: error loading plugin: %s\n"),
1100 	       curplug->name, dlerror ());
1101       set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1102       called_plugin = curplug;
1103       rv = (*onloadfn) (my_tv);
1104       called_plugin = NULL;
1105       if (rv != LDPS_OK)
1106 	einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv);
1107       curplug = curplug->next;
1108     }
1109 
1110   /* Since plugin(s) inited ok, assume they're going to want symbol
1111      resolutions, which needs us to track which symbols are referenced
1112      by non-IR files using the linker's notice callback.  */
1113   orig_notice_all = link_info.notice_all;
1114   orig_callbacks = link_info.callbacks;
1115   plugin_callbacks = *orig_callbacks;
1116   plugin_callbacks.notice = &plugin_notice;
1117   link_info.notice_all = TRUE;
1118   link_info.lto_plugin_active = TRUE;
1119   link_info.callbacks = &plugin_callbacks;
1120 
1121   register_ld_plugin_object_p (plugin_object_p);
1122 
1123 #if HAVE_MMAP && HAVE_GETPAGESIZE
1124   plugin_pagesize = getpagesize ();
1125 #endif
1126 }
1127 
1128 /* Call 'claim file' hook for all plugins.  */
1129 static int
1130 plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed)
1131 {
1132   plugin_t *curplug = plugins_list;
1133   *claimed = FALSE;
1134   while (curplug && !*claimed)
1135     {
1136       if (curplug->claim_file_handler)
1137 	{
1138 	  enum ld_plugin_status rv;
1139 
1140 	  called_plugin = curplug;
1141 	  rv = (*curplug->claim_file_handler) (file, claimed);
1142 	  called_plugin = NULL;
1143 	  if (rv != LDPS_OK)
1144 	    set_plugin_error (curplug->name);
1145 	}
1146       curplug = curplug->next;
1147     }
1148   return plugin_error_p () ? -1 : 0;
1149 }
1150 
1151 /* Duplicates a character string with memory attached to ABFD.  */
1152 
1153 static char *
1154 plugin_strdup (bfd *abfd, const char *str)
1155 {
1156   size_t strlength;
1157   char *copy;
1158   strlength = strlen (str) + 1;
1159   copy = bfd_alloc (abfd, strlength);
1160   if (copy == NULL)
1161     einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"),
1162 	   bfd_get_error ());
1163   memcpy (copy, str, strlength);
1164   return copy;
1165 }
1166 
1167 static const bfd_target *
1168 plugin_object_p (bfd *ibfd)
1169 {
1170   int claimed;
1171   plugin_input_file_t *input;
1172   struct ld_plugin_input_file file;
1173   bfd *abfd;
1174 
1175   /* Don't try the dummy object file.  */
1176   if ((ibfd->flags & BFD_PLUGIN) != 0)
1177     return NULL;
1178 
1179   if (ibfd->plugin_format != bfd_plugin_unknown)
1180     {
1181       if (ibfd->plugin_format == bfd_plugin_yes)
1182 	return ibfd->plugin_dummy_bfd->xvec;
1183       else
1184 	return NULL;
1185     }
1186 
1187   /* We create a dummy BFD, initially empty, to house whatever symbols
1188      the plugin may want to add.  */
1189   abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd);
1190 
1191   input = bfd_alloc (abfd, sizeof (*input));
1192   if (input == NULL)
1193     einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"),
1194 	   bfd_get_error ());
1195 
1196   if (!bfd_plugin_open_input (ibfd, &file))
1197     return NULL;
1198 
1199   if (file.name == ibfd->filename)
1200     {
1201       /* We must copy filename attached to ibfd if it is not an archive
1202 	 member since it may be freed by bfd_close below.  */
1203       file.name = plugin_strdup (abfd, file.name);
1204     }
1205 
1206   file.handle = input;
1207   input->abfd = abfd;
1208   input->view_buffer.addr = NULL;
1209   input->view_buffer.filesize = 0;
1210   input->view_buffer.offset = 0;
1211   input->fd = file.fd;
1212   input->use_mmap = FALSE;
1213   input->offset = file.offset;
1214   input->filesize = file.filesize;
1215   input->name = plugin_strdup (abfd, ibfd->filename);
1216 
1217   claimed = 0;
1218 
1219   if (plugin_call_claim_file (&file, &claimed))
1220     einfo (_("%F%P: %s: plugin reported error claiming file\n"),
1221 	   plugin_error_plugin ());
1222 
1223   if (input->fd != -1 && !bfd_plugin_target_p (ibfd->xvec))
1224     {
1225       /* FIXME: fd belongs to us, not the plugin.  GCC plugin, which
1226 	 doesn't need fd after plugin_call_claim_file, doesn't use
1227 	 BFD plugin target vector.  Since GCC plugin doesn't call
1228 	 release_input_file, we close it here.  LLVM plugin, which
1229 	 needs fd after plugin_call_claim_file and calls
1230 	 release_input_file after it is done, uses BFD plugin target
1231 	 vector.  This scheme doesn't work when a plugin needs fd and
1232 	 doesn't use BFD plugin target vector neither.  */
1233       close (input->fd);
1234       input->fd = -1;
1235     }
1236 
1237   if (claimed)
1238     {
1239       ibfd->plugin_format = bfd_plugin_yes;
1240       ibfd->plugin_dummy_bfd = abfd;
1241       bfd_make_readable (abfd);
1242       return abfd->xvec;
1243     }
1244   else
1245     {
1246 #if HAVE_MMAP
1247       if (input->use_mmap)
1248 	{
1249 	  /* If plugin didn't claim the file, unmap the buffer.  */
1250 	  char *addr = input->view_buffer.addr;
1251 	  off_t size = input->view_buffer.filesize;
1252 # if HAVE_GETPAGESIZE
1253 	  off_t bias = input->view_buffer.offset % plugin_pagesize;
1254 	  size += bias;
1255 	  addr -= bias;
1256 # endif
1257 	  munmap (addr, size);
1258 	}
1259 #endif
1260 
1261       /* If plugin didn't claim the file, we don't need the dummy bfd.
1262 	 Can't avoid speculatively creating it, alas.  */
1263       ibfd->plugin_format = bfd_plugin_no;
1264       bfd_close_all_done (abfd);
1265       return NULL;
1266     }
1267 }
1268 
1269 void
1270 plugin_maybe_claim (lang_input_statement_type *entry)
1271 {
1272   ASSERT (entry->header.type == lang_input_statement_enum);
1273   if (plugin_object_p (entry->the_bfd))
1274     {
1275       bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1276 
1277       /* Discard the real file's BFD and substitute the dummy one.  */
1278 
1279       /* We can't call bfd_close on archives.  BFD archive handling
1280 	 caches elements, and add_archive_element keeps pointers to
1281 	 the_bfd and the_bfd->filename in a lang_input_statement_type
1282 	 linker script statement.  */
1283       if (entry->the_bfd->my_archive == NULL)
1284 	bfd_close (entry->the_bfd);
1285       entry->the_bfd = abfd;
1286       entry->flags.claimed = 1;
1287     }
1288 }
1289 
1290 /* Call 'all symbols read' hook for all plugins.  */
1291 int
1292 plugin_call_all_symbols_read (void)
1293 {
1294   plugin_t *curplug = plugins_list;
1295 
1296   /* Disable any further file-claiming.  */
1297   no_more_claiming = TRUE;
1298 
1299   while (curplug)
1300     {
1301       if (curplug->all_symbols_read_handler)
1302 	{
1303 	  enum ld_plugin_status rv;
1304 	  called_plugin = curplug;
1305 	  rv = (*curplug->all_symbols_read_handler) ();
1306 	  called_plugin = NULL;
1307 	  if (rv != LDPS_OK)
1308 	    set_plugin_error (curplug->name);
1309 	}
1310       curplug = curplug->next;
1311     }
1312   return plugin_error_p () ? -1 : 0;
1313 }
1314 
1315 /* Call 'cleanup' hook for all plugins at exit.  */
1316 void
1317 plugin_call_cleanup (void)
1318 {
1319   plugin_t *curplug = plugins_list;
1320   while (curplug)
1321     {
1322       if (curplug->cleanup_handler && !curplug->cleanup_done)
1323 	{
1324 	  enum ld_plugin_status rv;
1325 	  curplug->cleanup_done = TRUE;
1326 	  called_plugin = curplug;
1327 	  rv = (*curplug->cleanup_handler) ();
1328 	  called_plugin = NULL;
1329 	  if (rv != LDPS_OK)
1330 	    info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1331 		      curplug->name, rv);
1332 	  dlclose (curplug->dlhandle);
1333 	}
1334       curplug = curplug->next;
1335     }
1336 }
1337 
1338 /* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1339    and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
1340    the linker adds them to the linker hash table.  Mark those
1341    referenced from a non-IR file with non_ir_ref_regular or
1342    non_ir_ref_dynamic as appropriate.  We have to notice_all symbols,
1343    because we won't necessarily know until later which ones will be
1344    contributed by IR files.  */
1345 static bfd_boolean
1346 plugin_notice (struct bfd_link_info *info,
1347 	       struct bfd_link_hash_entry *h,
1348 	       struct bfd_link_hash_entry *inh,
1349 	       bfd *abfd,
1350 	       asection *section,
1351 	       bfd_vma value,
1352 	       flagword flags)
1353 {
1354   struct bfd_link_hash_entry *orig_h = h;
1355 
1356   if (h != NULL)
1357     {
1358       bfd *sym_bfd;
1359       bfd_boolean ref = FALSE;
1360 
1361       if (h->type == bfd_link_hash_warning)
1362 	h = h->u.i.link;
1363 
1364       /* Nothing to do here if this def/ref is from an IR dummy BFD.  */
1365       if (is_ir_dummy_bfd (abfd))
1366 	;
1367 
1368       /* Making an indirect symbol counts as a reference unless this
1369 	 is a brand new symbol.  */
1370       else if (bfd_is_ind_section (section)
1371 	       || (flags & BSF_INDIRECT) != 0)
1372 	{
1373 	  /* ??? Some of this is questionable.  See comments in
1374 	     _bfd_generic_link_add_one_symbol for case IND.  */
1375 	  if (h->type != bfd_link_hash_new
1376 	      || inh->type == bfd_link_hash_new)
1377 	    {
1378 	      if ((abfd->flags & DYNAMIC) == 0)
1379 		inh->non_ir_ref_regular = TRUE;
1380 	      else
1381 		inh->non_ir_ref_dynamic = TRUE;
1382 	    }
1383 
1384 	  if (h->type != bfd_link_hash_new)
1385 	    ref = TRUE;
1386 	}
1387 
1388       /* Nothing to do here for warning symbols.  */
1389       else if ((flags & BSF_WARNING) != 0)
1390 	;
1391 
1392       /* Nothing to do here for constructor symbols.  */
1393       else if ((flags & BSF_CONSTRUCTOR) != 0)
1394 	;
1395 
1396       /* If this is a ref, set non_ir_ref.  */
1397       else if (bfd_is_und_section (section))
1398 	{
1399 	  /* Replace the undefined dummy bfd with the real one.  */
1400 	   if ((h->type == bfd_link_hash_undefined
1401 		|| h->type == bfd_link_hash_undefweak)
1402 	       && (h->u.undef.abfd == NULL
1403 		   || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
1404 	     h->u.undef.abfd = abfd;
1405 	  ref = TRUE;
1406 	}
1407 
1408 
1409       /* A common symbol should be merged with other commons or
1410 	 defs with the same name.  In particular, a common ought
1411 	 to be overridden by a def in a -flto object.  In that
1412 	 sense a common is also a ref.  */
1413       else if (bfd_is_com_section (section))
1414 	{
1415 	  if (h->type == bfd_link_hash_common
1416 	      && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))
1417 	    {
1418 	      h->type = bfd_link_hash_undefweak;
1419 	      h->u.undef.abfd = sym_bfd;
1420 	    }
1421 	  ref = TRUE;
1422 	}
1423 
1424       /* Otherwise, it must be a new def.
1425 	 Ensure any symbol defined in an IR dummy BFD takes on a
1426 	 new value from a real BFD.  Weak symbols are not normally
1427 	 overridden by a new weak definition, and strong symbols
1428 	 will normally cause multiple definition errors.  Avoid
1429 	 this by making the symbol appear to be undefined.  */
1430       else if (((h->type == bfd_link_hash_defweak
1431 		 || h->type == bfd_link_hash_defined)
1432 		&& is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1433 	       || (h->type == bfd_link_hash_common
1434 		   && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))
1435 	{
1436 	  h->type = bfd_link_hash_undefweak;
1437 	  h->u.undef.abfd = sym_bfd;
1438 	}
1439 
1440       if (ref)
1441 	{
1442 	  if ((abfd->flags & DYNAMIC) == 0)
1443 	    h->non_ir_ref_regular = TRUE;
1444 	  else
1445 	    h->non_ir_ref_dynamic = TRUE;
1446 	}
1447     }
1448 
1449   /* Continue with cref/nocrossref/trace-sym processing.  */
1450   if (orig_h == NULL
1451       || orig_notice_all
1452       || (info->notice_hash != NULL
1453 	  && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
1454 			      FALSE, FALSE) != NULL))
1455     return (*orig_callbacks->notice) (info, orig_h, inh,
1456 				      abfd, section, value, flags);
1457   return TRUE;
1458 }
1459