Commit | Line | Data |
---|---|---|
5d3236ee | 1 | /* Plugin control for the GNU linker. |
6f2750fe | 2 | Copyright (C) 2010-2016 Free Software Foundation, Inc. |
5d3236ee DK |
3 | |
4 | This file is part of the GNU Binutils. | |
5 | ||
6 | This program is free software; you can redistribute it and/or modify | |
7 | it under the terms of the GNU General Public License as published by | |
8 | the Free Software Foundation; either version 3 of the License, or | |
9 | (at your option) any later version. | |
10 | ||
11 | This program is distributed in the hope that it will be useful, | |
12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | GNU General Public License for more details. | |
15 | ||
16 | You should have received a copy of the GNU General Public License | |
17 | along with this program; if not, write to the Free Software | |
18 | Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston, | |
19 | MA 02110-1301, USA. */ | |
20 | ||
21 | #include "sysdep.h" | |
22 | #include "libiberty.h" | |
23 | #include "bfd.h" | |
35a1e5f3 | 24 | #include "libbfd.h" |
5d3236ee DK |
25 | #include "bfdlink.h" |
26 | #include "bfdver.h" | |
27 | #include "ld.h" | |
28 | #include "ldmain.h" | |
29 | #include "ldmisc.h" | |
30 | #include "ldexp.h" | |
31 | #include "ldlang.h" | |
32 | #include "ldfile.h" | |
5ae0078c | 33 | #include "../bfd/plugin.h" |
5d3236ee DK |
34 | #include "plugin.h" |
35 | #include "plugin-api.h" | |
36 | #include "elf-bfd.h" | |
2aec968d L |
37 | #if HAVE_MMAP |
38 | # include <sys/mman.h> | |
39 | # ifndef MAP_FAILED | |
40 | # define MAP_FAILED ((void *) -1) | |
41 | # endif | |
42 | # ifndef PROT_READ | |
43 | # define PROT_READ 0 | |
44 | # endif | |
45 | # ifndef MAP_PRIVATE | |
46 | # define MAP_PRIVATE 0 | |
47 | # endif | |
48 | #endif | |
f4b78d18 L |
49 | #include <errno.h> |
50 | #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO)) | |
51 | extern int errno; | |
52 | #endif | |
3917d5d5 | 53 | #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) |
f31d24a0 | 54 | #include <windows.h> |
3917d5d5 | 55 | #endif |
5d3236ee | 56 | |
1715a13c L |
57 | /* Report plugin symbols. */ |
58 | bfd_boolean report_plugin_symbols; | |
59 | ||
5d3236ee DK |
60 | /* The suffix to append to the name of the real (claimed) object file |
61 | when generating a dummy BFD to hold the IR symbols sent from the | |
cf4dc96f DK |
62 | plugin. For cosmetic use only; appears in maps, crefs etc. */ |
63 | #define IRONLY_SUFFIX " (symbol from plugin)" | |
5d3236ee DK |
64 | |
65 | /* Stores a single argument passed to a plugin. */ | |
66 | typedef struct plugin_arg | |
67 | { | |
68 | struct plugin_arg *next; | |
69 | const char *arg; | |
70 | } plugin_arg_t; | |
71 | ||
72 | /* Holds all details of a single plugin. */ | |
73 | typedef struct plugin | |
74 | { | |
75 | /* Next on the list of plugins, or NULL at end of chain. */ | |
76 | struct plugin *next; | |
77 | /* The argument string given to --plugin. */ | |
78 | const char *name; | |
79 | /* The shared library handle returned by dlopen. */ | |
80 | void *dlhandle; | |
81 | /* The list of argument string given to --plugin-opt. */ | |
82 | plugin_arg_t *args; | |
83 | /* Number of args in the list, for convenience. */ | |
84 | size_t n_args; | |
85 | /* The plugin's event handlers. */ | |
86 | ld_plugin_claim_file_handler claim_file_handler; | |
87 | ld_plugin_all_symbols_read_handler all_symbols_read_handler; | |
88 | ld_plugin_cleanup_handler cleanup_handler; | |
89 | /* TRUE if the cleanup handlers have been called. */ | |
90 | bfd_boolean cleanup_done; | |
91 | } plugin_t; | |
92 | ||
2aec968d L |
93 | typedef struct view_buffer |
94 | { | |
95 | char *addr; | |
96 | size_t filesize; | |
97 | off_t offset; | |
98 | } view_buffer_t; | |
99 | ||
f4b78d18 L |
100 | /* The internal version of struct ld_plugin_input_file with a BFD |
101 | pointer. */ | |
102 | typedef struct plugin_input_file | |
103 | { | |
104 | bfd *abfd; | |
2aec968d | 105 | view_buffer_t view_buffer; |
f4b78d18 L |
106 | char *name; |
107 | int fd; | |
38604796 | 108 | bfd_boolean use_mmap; |
f4b78d18 L |
109 | off_t offset; |
110 | off_t filesize; | |
111 | } plugin_input_file_t; | |
112 | ||
5d3236ee DK |
113 | /* The master list of all plugins. */ |
114 | static plugin_t *plugins_list = NULL; | |
115 | ||
116 | /* We keep a tail pointer for easy linking on the end. */ | |
117 | static plugin_t **plugins_tail_chain_ptr = &plugins_list; | |
118 | ||
119 | /* The last plugin added to the list, for receiving args. */ | |
120 | static plugin_t *last_plugin = NULL; | |
121 | ||
122 | /* The tail of the arg chain of the last plugin added to the list. */ | |
123 | static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL; | |
124 | ||
125 | /* The plugin which is currently having a callback executed. */ | |
126 | static plugin_t *called_plugin = NULL; | |
127 | ||
128 | /* Last plugin to cause an error, if any. */ | |
129 | static const char *error_plugin = NULL; | |
130 | ||
24f58f47 | 131 | /* State of linker "notice" interface before we poked at it. */ |
9e2278f5 | 132 | static bfd_boolean orig_notice_all; |
9e2278f5 AM |
133 | |
134 | /* Original linker callbacks, and the plugin version. */ | |
135 | static const struct bfd_link_callbacks *orig_callbacks; | |
136 | static struct bfd_link_callbacks plugin_callbacks; | |
137 | ||
5d3236ee DK |
138 | /* Set at all symbols read time, to avoid recursively offering the plugin |
139 | its own newly-added input files and libs to claim. */ | |
9e2278f5 | 140 | bfd_boolean no_more_claiming = FALSE; |
5d3236ee | 141 | |
38604796 L |
142 | #if HAVE_MMAP && HAVE_GETPAGESIZE |
143 | /* Page size used by mmap. */ | |
144 | static off_t plugin_pagesize; | |
145 | #endif | |
146 | ||
5d3236ee DK |
147 | /* List of tags to set in the constant leading part of the tv array. */ |
148 | static const enum ld_plugin_tag tv_header_tags[] = | |
149 | { | |
150 | LDPT_MESSAGE, | |
151 | LDPT_API_VERSION, | |
152 | LDPT_GNU_LD_VERSION, | |
153 | LDPT_LINKER_OUTPUT, | |
154 | LDPT_OUTPUT_NAME, | |
155 | LDPT_REGISTER_CLAIM_FILE_HOOK, | |
156 | LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK, | |
157 | LDPT_REGISTER_CLEANUP_HOOK, | |
158 | LDPT_ADD_SYMBOLS, | |
159 | LDPT_GET_INPUT_FILE, | |
15f7a26b | 160 | LDPT_GET_VIEW, |
5d3236ee DK |
161 | LDPT_RELEASE_INPUT_FILE, |
162 | LDPT_GET_SYMBOLS, | |
69ee6ab2 | 163 | LDPT_GET_SYMBOLS_V2, |
5d3236ee DK |
164 | LDPT_ADD_INPUT_FILE, |
165 | LDPT_ADD_INPUT_LIBRARY, | |
166 | LDPT_SET_EXTRA_LIBRARY_PATH | |
167 | }; | |
168 | ||
169 | /* How many entries in the constant leading part of the tv array. */ | |
170 | static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags); | |
171 | ||
9e2278f5 | 172 | /* Forward references. */ |
16d96b5b | 173 | static bfd_boolean plugin_notice (struct bfd_link_info *, |
46135103 AM |
174 | struct bfd_link_hash_entry *, |
175 | struct bfd_link_hash_entry *, | |
176 | bfd *, asection *, bfd_vma, flagword); | |
9e2278f5 | 177 | |
5ae0078c L |
178 | static const bfd_target * plugin_object_p (bfd *); |
179 | ||
3917d5d5 DK |
180 | #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) |
181 | ||
182 | #define RTLD_NOW 0 /* Dummy value. */ | |
183 | ||
184 | static void * | |
185 | dlopen (const char *file, int mode ATTRIBUTE_UNUSED) | |
186 | { | |
187 | return LoadLibrary (file); | |
188 | } | |
189 | ||
190 | static void * | |
191 | dlsym (void *handle, const char *name) | |
192 | { | |
193 | return GetProcAddress (handle, name); | |
194 | } | |
195 | ||
196 | static int | |
197 | dlclose (void *handle) | |
198 | { | |
199 | FreeLibrary (handle); | |
200 | return 0; | |
201 | } | |
202 | ||
203 | #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */ | |
204 | ||
d82184d7 L |
205 | #ifndef HAVE_DLFCN_H |
206 | static const char * | |
207 | dlerror (void) | |
208 | { | |
209 | return ""; | |
210 | } | |
211 | #endif | |
212 | ||
5d3236ee DK |
213 | /* Helper function for exiting with error status. */ |
214 | static int | |
215 | set_plugin_error (const char *plugin) | |
216 | { | |
217 | error_plugin = plugin; | |
218 | return -1; | |
219 | } | |
220 | ||
221 | /* Test if an error occurred. */ | |
222 | static bfd_boolean | |
223 | plugin_error_p (void) | |
224 | { | |
225 | return error_plugin != NULL; | |
226 | } | |
227 | ||
228 | /* Return name of plugin which caused an error if any. */ | |
d44ad554 DK |
229 | const char * |
230 | plugin_error_plugin (void) | |
5d3236ee DK |
231 | { |
232 | return error_plugin ? error_plugin : _("<no plugin>"); | |
233 | } | |
234 | ||
235 | /* Handle -plugin arg: find and load plugin, or return error. */ | |
d82184d7 | 236 | void |
d44ad554 | 237 | plugin_opt_plugin (const char *plugin) |
5d3236ee DK |
238 | { |
239 | plugin_t *newplug; | |
240 | ||
241 | newplug = xmalloc (sizeof *newplug); | |
242 | memset (newplug, 0, sizeof *newplug); | |
243 | newplug->name = plugin; | |
244 | newplug->dlhandle = dlopen (plugin, RTLD_NOW); | |
245 | if (!newplug->dlhandle) | |
d82184d7 | 246 | einfo (_("%P%F: %s: error loading plugin: %s\n"), plugin, dlerror ()); |
5d3236ee DK |
247 | |
248 | /* Chain on end, so when we run list it is in command-line order. */ | |
249 | *plugins_tail_chain_ptr = newplug; | |
250 | plugins_tail_chain_ptr = &newplug->next; | |
251 | ||
252 | /* Record it as current plugin for receiving args. */ | |
253 | last_plugin = newplug; | |
254 | last_plugin_args_tail_chain_ptr = &newplug->args; | |
5d3236ee DK |
255 | } |
256 | ||
257 | /* Accumulate option arguments for last-loaded plugin, or return | |
258 | error if none. */ | |
d44ad554 DK |
259 | int |
260 | plugin_opt_plugin_arg (const char *arg) | |
5d3236ee DK |
261 | { |
262 | plugin_arg_t *newarg; | |
263 | ||
264 | if (!last_plugin) | |
265 | return set_plugin_error (_("<no plugin>")); | |
266 | ||
97964ab3 AM |
267 | /* Ignore -pass-through= from GCC driver. */ |
268 | if (*arg == '-') | |
269 | { | |
270 | const char *p = arg + 1; | |
271 | ||
272 | if (*p == '-') | |
273 | ++p; | |
274 | if (strncmp (p, "pass-through=", 13) == 0) | |
275 | return 0; | |
276 | } | |
277 | ||
5d3236ee DK |
278 | newarg = xmalloc (sizeof *newarg); |
279 | newarg->arg = arg; | |
280 | newarg->next = NULL; | |
281 | ||
282 | /* Chain on end to preserve command-line order. */ | |
283 | *last_plugin_args_tail_chain_ptr = newarg; | |
284 | last_plugin_args_tail_chain_ptr = &newarg->next; | |
285 | last_plugin->n_args++; | |
286 | return 0; | |
287 | } | |
288 | ||
37a3056a L |
289 | /* Generate a dummy BFD to represent an IR file, for any callers of |
290 | plugin_call_claim_file to use as the handle in the ld_plugin_input_file | |
291 | struct that they build to pass in. The BFD is initially writable, so | |
292 | that symbols can be added to it; it must be made readable after the | |
293 | add_symbols hook has been called so that it can be read when linking. */ | |
294 | static bfd * | |
5d3236ee DK |
295 | plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate) |
296 | { | |
bc110b6e | 297 | bfd *abfd; |
4a07dc81 | 298 | bfd_boolean bfd_plugin_target; |
bc110b6e AM |
299 | |
300 | bfd_use_reserved_id = 1; | |
4a07dc81 | 301 | bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec); |
9e2278f5 | 302 | abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL), |
4a07dc81 | 303 | bfd_plugin_target ? link_info.output_bfd : srctemplate); |
9e2278f5 AM |
304 | if (abfd != NULL) |
305 | { | |
306 | abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN; | |
5ae0078c L |
307 | if (!bfd_make_writable (abfd)) |
308 | goto report_error; | |
4a07dc81 | 309 | if (!bfd_plugin_target) |
5ae0078c L |
310 | { |
311 | bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate)); | |
312 | bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate)); | |
313 | if (!bfd_copy_private_bfd_data (srctemplate, abfd)) | |
314 | goto report_error; | |
315 | } | |
9e2278f5 AM |
316 | { |
317 | flagword flags; | |
318 | ||
c77ec726 | 319 | /* Create section to own the symbols. */ |
9e2278f5 AM |
320 | flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY |
321 | | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE); | |
322 | if (bfd_make_section_anyway_with_flags (abfd, ".text", flags)) | |
323 | return abfd; | |
324 | } | |
325 | } | |
5ae0078c | 326 | report_error: |
9e2278f5 AM |
327 | einfo (_("could not create dummy IR bfd: %F%E\n")); |
328 | return NULL; | |
5d3236ee DK |
329 | } |
330 | ||
d44ad554 | 331 | /* Check if the BFD passed in is an IR dummy object file. */ |
23ebe1a0 | 332 | static inline bfd_boolean |
5d3236ee DK |
333 | is_ir_dummy_bfd (const bfd *abfd) |
334 | { | |
cf4dc96f | 335 | /* ABFD can sometimes legitimately be NULL, e.g. when called from one |
23ebe1a0 AM |
336 | of the linker callbacks for a symbol in the *ABS* or *UND* sections. */ |
337 | return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0; | |
5d3236ee DK |
338 | } |
339 | ||
340 | /* Helpers to convert between BFD and GOLD symbol formats. */ | |
341 | static enum ld_plugin_status | |
342 | asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym, | |
f84854b6 | 343 | const struct ld_plugin_symbol *ldsym) |
5d3236ee DK |
344 | { |
345 | flagword flags = BSF_NO_FLAGS; | |
346 | struct bfd_section *section; | |
347 | ||
348 | asym->the_bfd = abfd; | |
f84854b6 | 349 | asym->name = (ldsym->version |
9e2278f5 | 350 | ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL) |
f84854b6 | 351 | : ldsym->name); |
5d3236ee DK |
352 | asym->value = 0; |
353 | switch (ldsym->def) | |
354 | { | |
355 | case LDPK_WEAKDEF: | |
356 | flags = BSF_WEAK; | |
357 | /* FALLTHRU */ | |
358 | case LDPK_DEF: | |
359 | flags |= BSF_GLOBAL; | |
c77ec726 AM |
360 | if (ldsym->comdat_key) |
361 | { | |
362 | char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key, | |
363 | (const char *) NULL); | |
364 | section = bfd_get_section_by_name (abfd, name); | |
365 | if (section != NULL) | |
366 | free (name); | |
367 | else | |
368 | { | |
369 | flagword sflags; | |
370 | ||
371 | sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY | |
372 | | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE | |
373 | | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD); | |
374 | section = bfd_make_section_anyway_with_flags (abfd, name, sflags); | |
375 | if (section == NULL) | |
376 | return LDPS_ERR; | |
377 | } | |
378 | } | |
379 | else | |
380 | section = bfd_get_section_by_name (abfd, ".text"); | |
5d3236ee DK |
381 | break; |
382 | ||
383 | case LDPK_WEAKUNDEF: | |
384 | flags = BSF_WEAK; | |
385 | /* FALLTHRU */ | |
386 | case LDPK_UNDEF: | |
387 | section = bfd_und_section_ptr; | |
388 | break; | |
389 | ||
390 | case LDPK_COMMON: | |
391 | flags = BSF_GLOBAL; | |
392 | section = bfd_com_section_ptr; | |
393 | asym->value = ldsym->size; | |
5c08b7d4 L |
394 | /* For ELF targets, set alignment of common symbol to 1. */ |
395 | if (bfd_get_flavour (abfd) == bfd_target_elf_flavour) | |
02d00247 AM |
396 | { |
397 | ((elf_symbol_type *) asym)->internal_elf_sym.st_shndx = SHN_COMMON; | |
398 | ((elf_symbol_type *) asym)->internal_elf_sym.st_value = 1; | |
399 | } | |
5d3236ee DK |
400 | break; |
401 | ||
402 | default: | |
403 | return LDPS_ERR; | |
404 | } | |
405 | asym->flags = flags; | |
406 | asym->section = section; | |
407 | ||
408 | /* Visibility only applies on ELF targets. */ | |
409 | if (bfd_get_flavour (abfd) == bfd_target_elf_flavour) | |
410 | { | |
411 | elf_symbol_type *elfsym = elf_symbol_from (abfd, asym); | |
cfac8028 L |
412 | unsigned char visibility; |
413 | ||
5d3236ee | 414 | if (!elfsym) |
ea360572 | 415 | einfo (_("%P%F: %s: non-ELF symbol in ELF BFD!\n"), asym->name); |
cfac8028 L |
416 | switch (ldsym->visibility) |
417 | { | |
418 | default: | |
ea360572 | 419 | einfo (_("%P%F: unknown ELF symbol visibility: %d!\n"), |
cfac8028 L |
420 | ldsym->visibility); |
421 | case LDPV_DEFAULT: | |
422 | visibility = STV_DEFAULT; | |
423 | break; | |
424 | case LDPV_PROTECTED: | |
425 | visibility = STV_PROTECTED; | |
426 | break; | |
427 | case LDPV_INTERNAL: | |
428 | visibility = STV_INTERNAL; | |
429 | break; | |
430 | case LDPV_HIDDEN: | |
431 | visibility = STV_HIDDEN; | |
432 | break; | |
433 | } | |
434 | elfsym->internal_elf_sym.st_other | |
435 | = (visibility | (elfsym->internal_elf_sym.st_other | |
436 | & ~ELF_ST_VISIBILITY (-1))); | |
5d3236ee DK |
437 | } |
438 | ||
439 | return LDPS_OK; | |
440 | } | |
441 | ||
442 | /* Register a claim-file handler. */ | |
443 | static enum ld_plugin_status | |
444 | register_claim_file (ld_plugin_claim_file_handler handler) | |
445 | { | |
446 | ASSERT (called_plugin); | |
447 | called_plugin->claim_file_handler = handler; | |
448 | return LDPS_OK; | |
449 | } | |
450 | ||
451 | /* Register an all-symbols-read handler. */ | |
452 | static enum ld_plugin_status | |
453 | register_all_symbols_read (ld_plugin_all_symbols_read_handler handler) | |
454 | { | |
455 | ASSERT (called_plugin); | |
456 | called_plugin->all_symbols_read_handler = handler; | |
457 | return LDPS_OK; | |
458 | } | |
459 | ||
460 | /* Register a cleanup handler. */ | |
461 | static enum ld_plugin_status | |
462 | register_cleanup (ld_plugin_cleanup_handler handler) | |
463 | { | |
464 | ASSERT (called_plugin); | |
465 | called_plugin->cleanup_handler = handler; | |
466 | return LDPS_OK; | |
467 | } | |
468 | ||
469 | /* Add symbols from a plugin-claimed input file. */ | |
470 | static enum ld_plugin_status | |
471 | add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms) | |
472 | { | |
473 | asymbol **symptrs; | |
f4b78d18 L |
474 | plugin_input_file_t *input = handle; |
475 | bfd *abfd = input->abfd; | |
7fe550fc | 476 | int n; |
43e1669b | 477 | |
5d3236ee DK |
478 | ASSERT (called_plugin); |
479 | symptrs = xmalloc (nsyms * sizeof *symptrs); | |
7fe550fc | 480 | for (n = 0; n < nsyms; n++) |
5d3236ee DK |
481 | { |
482 | enum ld_plugin_status rv; | |
0c511000 AM |
483 | asymbol *bfdsym; |
484 | ||
0c511000 | 485 | bfdsym = bfd_make_empty_symbol (abfd); |
7fe550fc | 486 | symptrs[n] = bfdsym; |
5d3236ee DK |
487 | rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n); |
488 | if (rv != LDPS_OK) | |
489 | return rv; | |
490 | } | |
7fe550fc | 491 | bfd_set_symtab (abfd, symptrs, nsyms); |
5d3236ee DK |
492 | return LDPS_OK; |
493 | } | |
494 | ||
495 | /* Get the input file information with an open (possibly re-opened) | |
496 | file descriptor. */ | |
497 | static enum ld_plugin_status | |
f4b78d18 | 498 | get_input_file (const void *handle, struct ld_plugin_input_file *file) |
5d3236ee | 499 | { |
f4b78d18 L |
500 | const plugin_input_file_t *input = handle; |
501 | ||
5d3236ee | 502 | ASSERT (called_plugin); |
f4b78d18 L |
503 | |
504 | file->name = input->name; | |
505 | file->offset = input->offset; | |
506 | file->filesize = input->filesize; | |
507 | file->handle = (void *) handle; | |
508 | ||
509 | return LDPS_OK; | |
5d3236ee DK |
510 | } |
511 | ||
15f7a26b L |
512 | /* Get view of the input file. */ |
513 | static enum ld_plugin_status | |
f4b78d18 | 514 | get_view (const void *handle, const void **viewp) |
15f7a26b | 515 | { |
2aec968d | 516 | plugin_input_file_t *input = (plugin_input_file_t *) handle; |
f4b78d18 | 517 | char *buffer; |
2aec968d | 518 | size_t size = input->filesize; |
38604796 L |
519 | off_t offset = input->offset; |
520 | #if HAVE_MMAP && HAVE_GETPAGESIZE | |
521 | off_t bias; | |
fe905789 | 522 | #endif |
f4b78d18 | 523 | |
15f7a26b | 524 | ASSERT (called_plugin); |
f4b78d18 | 525 | |
2aec968d L |
526 | /* FIXME: einfo should support %lld. */ |
527 | if ((off_t) size != input->filesize) | |
528 | einfo (_("%P%F: unsupported input file size: %s (%ld bytes)\n"), | |
529 | input->name, (long) input->filesize); | |
f4b78d18 | 530 | |
2aec968d L |
531 | /* Check the cached view buffer. */ |
532 | if (input->view_buffer.addr != NULL | |
533 | && input->view_buffer.filesize == size | |
38604796 | 534 | && input->view_buffer.offset == offset) |
2aec968d L |
535 | { |
536 | *viewp = input->view_buffer.addr; | |
537 | return LDPS_OK; | |
538 | } | |
539 | ||
540 | input->view_buffer.filesize = size; | |
38604796 | 541 | input->view_buffer.offset = offset; |
f4b78d18 | 542 | |
2aec968d | 543 | #if HAVE_MMAP |
fe905789 | 544 | # if HAVE_GETPAGESIZE |
38604796 L |
545 | bias = offset % plugin_pagesize; |
546 | offset -= bias; | |
fe905789 L |
547 | size += bias; |
548 | # endif | |
549 | buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset); | |
550 | if (buffer != MAP_FAILED) | |
38604796 L |
551 | { |
552 | input->use_mmap = TRUE; | |
553 | # if HAVE_GETPAGESIZE | |
554 | buffer += bias; | |
b677c456 | 555 | # endif |
38604796 L |
556 | } |
557 | else | |
2aec968d | 558 | #endif |
f4b78d18 | 559 | { |
2aec968d L |
560 | char *p; |
561 | ||
38604796 L |
562 | input->use_mmap = FALSE; |
563 | ||
564 | if (lseek (input->fd, offset, SEEK_SET) < 0) | |
2aec968d L |
565 | return LDPS_ERR; |
566 | ||
567 | buffer = bfd_alloc (input->abfd, size); | |
568 | if (buffer == NULL) | |
569 | return LDPS_ERR; | |
570 | ||
571 | p = buffer; | |
572 | do | |
f4b78d18 | 573 | { |
2aec968d L |
574 | ssize_t got = read (input->fd, p, size); |
575 | if (got == 0) | |
576 | break; | |
577 | else if (got > 0) | |
578 | { | |
579 | p += got; | |
580 | size -= got; | |
581 | } | |
582 | else if (errno != EINTR) | |
583 | return LDPS_ERR; | |
f4b78d18 | 584 | } |
2aec968d | 585 | while (size > 0); |
f4b78d18 | 586 | } |
2aec968d L |
587 | |
588 | input->view_buffer.addr = buffer; | |
589 | *viewp = buffer; | |
f4b78d18 L |
590 | |
591 | return LDPS_OK; | |
15f7a26b L |
592 | } |
593 | ||
5d3236ee DK |
594 | /* Release the input file. */ |
595 | static enum ld_plugin_status | |
f4b78d18 | 596 | release_input_file (const void *handle) |
5d3236ee | 597 | { |
119d62ff | 598 | plugin_input_file_t *input = (plugin_input_file_t *) handle; |
5d3236ee | 599 | ASSERT (called_plugin); |
f4b78d18 | 600 | if (input->fd != -1) |
119d62ff L |
601 | { |
602 | close (input->fd); | |
603 | input->fd = -1; | |
604 | } | |
f4b78d18 | 605 | return LDPS_OK; |
5d3236ee DK |
606 | } |
607 | ||
42a851a9 DK |
608 | /* Return TRUE if a defined symbol might be reachable from outside the |
609 | universe of claimed objects. */ | |
610 | static inline bfd_boolean | |
9bbc1a67 | 611 | is_visible_from_outside (struct ld_plugin_symbol *lsym, |
f84854b6 | 612 | struct bfd_link_hash_entry *blhe) |
42a851a9 | 613 | { |
35ed3f94 AM |
614 | struct bfd_sym_chain *sym; |
615 | ||
0e1862bb | 616 | if (bfd_link_relocatable (&link_info)) |
42a851a9 | 617 | return TRUE; |
0e1862bb | 618 | if (link_info.export_dynamic || bfd_link_dll (&link_info)) |
42a851a9 | 619 | { |
fd91d419 L |
620 | /* Check if symbol is hidden by version script. */ |
621 | if (bfd_hide_sym_by_version (link_info.version_info, | |
622 | blhe->root.string)) | |
623 | return FALSE; | |
42a851a9 DK |
624 | /* Only ELF symbols really have visibility. */ |
625 | if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour) | |
626 | { | |
627 | struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe; | |
628 | int vis = ELF_ST_VISIBILITY (el->other); | |
629 | return vis == STV_DEFAULT || vis == STV_PROTECTED; | |
630 | } | |
631 | /* On non-ELF targets, we can safely make inferences by considering | |
f84854b6 | 632 | what visibility the plugin would have liked to apply when it first |
42a851a9 DK |
633 | sent us the symbol. During ELF symbol processing, visibility only |
634 | ever becomes more restrictive, not less, when symbols are merged, | |
635 | so this is a conservative estimate; it may give false positives, | |
636 | declaring something visible from outside when it in fact would | |
637 | not have been, but this will only lead to missed optimisation | |
638 | opportunities during LTRANS at worst; it will not give false | |
639 | negatives, which can lead to the disastrous conclusion that the | |
640 | related symbol is IRONLY. (See GCC PR46319 for an example.) */ | |
cfac8028 L |
641 | return (lsym->visibility == LDPV_DEFAULT |
642 | || lsym->visibility == LDPV_PROTECTED); | |
42a851a9 | 643 | } |
35ed3f94 AM |
644 | |
645 | for (sym = &entry_symbol; sym != NULL; sym = sym->next) | |
646 | if (sym->name | |
647 | && strcmp (sym->name, blhe->root.string) == 0) | |
648 | return TRUE; | |
649 | ||
42a851a9 DK |
650 | return FALSE; |
651 | } | |
652 | ||
5d3236ee DK |
653 | /* Get the symbol resolution info for a plugin-claimed input file. */ |
654 | static enum ld_plugin_status | |
69ee6ab2 AM |
655 | get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms, |
656 | int def_ironly_exp) | |
5d3236ee | 657 | { |
f4b78d18 L |
658 | const plugin_input_file_t *input = handle; |
659 | const bfd *abfd = (const bfd *) input->abfd; | |
5d3236ee | 660 | int n; |
69ee6ab2 | 661 | |
5d3236ee DK |
662 | ASSERT (called_plugin); |
663 | for (n = 0; n < nsyms; n++) | |
664 | { | |
665 | struct bfd_link_hash_entry *blhe; | |
42a851a9 | 666 | asection *owner_sec; |
69ee6ab2 AM |
667 | int res; |
668 | ||
10be1b6a DK |
669 | if (syms[n].def != LDPK_UNDEF) |
670 | blhe = bfd_link_hash_lookup (link_info.hash, syms[n].name, | |
671 | FALSE, FALSE, TRUE); | |
672 | else | |
673 | blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, &link_info, | |
674 | syms[n].name, FALSE, FALSE, TRUE); | |
5d3236ee DK |
675 | if (!blhe) |
676 | { | |
3355cb3b L |
677 | /* The plugin is called to claim symbols in an archive element |
678 | from plugin_object_p. But those symbols aren't needed to | |
679 | create output. They are defined and referenced only within | |
680 | IR. */ | |
681 | switch (syms[n].def) | |
682 | { | |
683 | default: | |
684 | abort (); | |
685 | case LDPK_UNDEF: | |
686 | case LDPK_WEAKUNDEF: | |
687 | res = LDPR_UNDEF; | |
688 | break; | |
689 | case LDPK_DEF: | |
690 | case LDPK_WEAKDEF: | |
691 | case LDPK_COMMON: | |
692 | res = LDPR_PREVAILING_DEF_IRONLY; | |
693 | break; | |
694 | } | |
1715a13c | 695 | goto report_symbol; |
5d3236ee DK |
696 | } |
697 | ||
698 | /* Determine resolution from blhe type and symbol's original type. */ | |
699 | if (blhe->type == bfd_link_hash_undefined | |
f84854b6 | 700 | || blhe->type == bfd_link_hash_undefweak) |
5d3236ee | 701 | { |
69ee6ab2 | 702 | res = LDPR_UNDEF; |
1715a13c | 703 | goto report_symbol; |
5d3236ee DK |
704 | } |
705 | if (blhe->type != bfd_link_hash_defined | |
f84854b6 L |
706 | && blhe->type != bfd_link_hash_defweak |
707 | && blhe->type != bfd_link_hash_common) | |
5d3236ee DK |
708 | { |
709 | /* We should not have a new, indirect or warning symbol here. */ | |
ea360572 | 710 | einfo ("%P%F: %s: plugin symbol table corrupt (sym type %d)\n", |
f84854b6 | 711 | called_plugin->name, blhe->type); |
5d3236ee DK |
712 | } |
713 | ||
42a851a9 DK |
714 | /* Find out which section owns the symbol. Since it's not undef, |
715 | it must have an owner; if it's not a common symbol, both defs | |
716 | and weakdefs keep it in the same place. */ | |
9e2278f5 AM |
717 | owner_sec = (blhe->type == bfd_link_hash_common |
718 | ? blhe->u.c.p->section | |
719 | : blhe->u.def.section); | |
42a851a9 | 720 | |
5d3236ee DK |
721 | |
722 | /* If it was originally undefined or common, then it has been | |
f84854b6 L |
723 | resolved; determine how. */ |
724 | if (syms[n].def == LDPK_UNDEF | |
725 | || syms[n].def == LDPK_WEAKUNDEF | |
5d3236ee DK |
726 | || syms[n].def == LDPK_COMMON) |
727 | { | |
5d3236ee | 728 | if (owner_sec->owner == link_info.output_bfd) |
69ee6ab2 | 729 | res = LDPR_RESOLVED_EXEC; |
5d3236ee | 730 | else if (owner_sec->owner == abfd) |
69ee6ab2 | 731 | res = LDPR_PREVAILING_DEF_IRONLY; |
5d3236ee | 732 | else if (is_ir_dummy_bfd (owner_sec->owner)) |
69ee6ab2 | 733 | res = LDPR_RESOLVED_IR; |
cc322803 L |
734 | else if (owner_sec->owner != NULL |
735 | && (owner_sec->owner->flags & DYNAMIC) != 0) | |
69ee6ab2 | 736 | res = LDPR_RESOLVED_DYN; |
5d3236ee | 737 | else |
69ee6ab2 | 738 | res = LDPR_RESOLVED_EXEC; |
5d3236ee DK |
739 | } |
740 | ||
741 | /* Was originally def, or weakdef. Does it prevail? If the | |
f84854b6 | 742 | owner is the original dummy bfd that supplied it, then this |
5d3236ee | 743 | is the definition that has prevailed. */ |
69ee6ab2 AM |
744 | else if (owner_sec->owner == link_info.output_bfd) |
745 | res = LDPR_PREEMPTED_REG; | |
42a851a9 | 746 | else if (owner_sec->owner == abfd) |
69ee6ab2 | 747 | res = LDPR_PREVAILING_DEF_IRONLY; |
5d3236ee DK |
748 | |
749 | /* Was originally def, weakdef, or common, but has been pre-empted. */ | |
69ee6ab2 AM |
750 | else if (is_ir_dummy_bfd (owner_sec->owner)) |
751 | res = LDPR_PREEMPTED_IR; | |
752 | else | |
753 | res = LDPR_PREEMPTED_REG; | |
754 | ||
755 | if (res == LDPR_PREVAILING_DEF_IRONLY) | |
756 | { | |
757 | /* We need to know if the sym is referenced from non-IR files. Or | |
758 | even potentially-referenced, perhaps in a future final link if | |
759 | this is a partial one, perhaps dynamically at load-time if the | |
760 | symbol is externally visible. */ | |
761 | if (blhe->non_ir_ref) | |
762 | res = LDPR_PREVAILING_DEF; | |
9bbc1a67 | 763 | else if (is_visible_from_outside (&syms[n], blhe)) |
69ee6ab2 AM |
764 | res = def_ironly_exp; |
765 | } | |
1715a13c | 766 | |
9e2278f5 | 767 | report_symbol: |
69ee6ab2 | 768 | syms[n].resolution = res; |
1715a13c | 769 | if (report_plugin_symbols) |
9e2278f5 AM |
770 | einfo (_("%P: %B: symbol `%s' " |
771 | "definition: %d, visibility: %d, resolution: %d\n"), | |
772 | abfd, syms[n].name, | |
69ee6ab2 | 773 | syms[n].def, syms[n].visibility, res); |
5d3236ee DK |
774 | } |
775 | return LDPS_OK; | |
776 | } | |
777 | ||
69ee6ab2 AM |
778 | static enum ld_plugin_status |
779 | get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) | |
780 | { | |
781 | return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF); | |
782 | } | |
783 | ||
784 | static enum ld_plugin_status | |
785 | get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms) | |
786 | { | |
787 | return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP); | |
788 | } | |
789 | ||
5d3236ee DK |
790 | /* Add a new (real) input file generated by a plugin. */ |
791 | static enum ld_plugin_status | |
792 | add_input_file (const char *pathname) | |
793 | { | |
ce875075 AM |
794 | lang_input_statement_type *is; |
795 | ||
5d3236ee | 796 | ASSERT (called_plugin); |
ce875075 AM |
797 | is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum, |
798 | NULL); | |
799 | if (!is) | |
5d3236ee | 800 | return LDPS_ERR; |
ce875075 | 801 | is->flags.lto_output = 1; |
5d3236ee DK |
802 | return LDPS_OK; |
803 | } | |
804 | ||
805 | /* Add a new (real) library required by a plugin. */ | |
806 | static enum ld_plugin_status | |
807 | add_input_library (const char *pathname) | |
808 | { | |
ce875075 AM |
809 | lang_input_statement_type *is; |
810 | ||
5d3236ee | 811 | ASSERT (called_plugin); |
ce875075 AM |
812 | is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum, |
813 | NULL); | |
814 | if (!is) | |
5d3236ee | 815 | return LDPS_ERR; |
ce875075 | 816 | is->flags.lto_output = 1; |
5d3236ee DK |
817 | return LDPS_OK; |
818 | } | |
819 | ||
820 | /* Set the extra library path to be used by libraries added via | |
821 | add_input_library. */ | |
822 | static enum ld_plugin_status | |
823 | set_extra_library_path (const char *path) | |
824 | { | |
825 | ASSERT (called_plugin); | |
d4cb7acd | 826 | ldfile_add_library_path (xstrdup (path), FALSE); |
5d3236ee DK |
827 | return LDPS_OK; |
828 | } | |
829 | ||
830 | /* Issue a diagnostic message from a plugin. */ | |
831 | static enum ld_plugin_status | |
832 | message (int level, const char *format, ...) | |
833 | { | |
834 | va_list args; | |
835 | va_start (args, format); | |
836 | ||
837 | switch (level) | |
838 | { | |
839 | case LDPL_INFO: | |
840 | vfinfo (stdout, format, args, FALSE); | |
d251c5c4 | 841 | putchar ('\n'); |
5d3236ee DK |
842 | break; |
843 | case LDPL_WARNING: | |
45e81354 | 844 | { |
e1fa0163 NC |
845 | char *newfmt = concat ("%P: warning: ", format, "\n", |
846 | (const char *) NULL); | |
45e81354 | 847 | vfinfo (stdout, newfmt, args, TRUE); |
e1fa0163 | 848 | free (newfmt); |
45e81354 | 849 | } |
5d3236ee DK |
850 | break; |
851 | case LDPL_FATAL: | |
852 | case LDPL_ERROR: | |
853 | default: | |
9e2278f5 | 854 | { |
e1fa0163 NC |
855 | char *newfmt = concat (level == LDPL_FATAL ? "%P%F" : "%P%X", |
856 | ": error: ", format, "\n", | |
857 | (const char *) NULL); | |
9e2278f5 AM |
858 | fflush (stdout); |
859 | vfinfo (stderr, newfmt, args, TRUE); | |
860 | fflush (stderr); | |
e1fa0163 | 861 | free (newfmt); |
9e2278f5 | 862 | } |
5d3236ee DK |
863 | break; |
864 | } | |
865 | ||
866 | va_end (args); | |
867 | return LDPS_OK; | |
868 | } | |
869 | ||
870 | /* Helper to size leading part of tv array and set it up. */ | |
69ee6ab2 | 871 | static void |
5d3236ee DK |
872 | set_tv_header (struct ld_plugin_tv *tv) |
873 | { | |
874 | size_t i; | |
875 | ||
876 | /* Version info. */ | |
877 | static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL); | |
878 | static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100; | |
879 | ||
5d3236ee DK |
880 | for (i = 0; i < tv_header_size; i++) |
881 | { | |
882 | tv[i].tv_tag = tv_header_tags[i]; | |
883 | #define TVU(x) tv[i].tv_u.tv_ ## x | |
884 | switch (tv[i].tv_tag) | |
885 | { | |
f84854b6 L |
886 | case LDPT_MESSAGE: |
887 | TVU(message) = message; | |
888 | break; | |
889 | case LDPT_API_VERSION: | |
890 | TVU(val) = LD_PLUGIN_API_VERSION; | |
891 | break; | |
892 | case LDPT_GNU_LD_VERSION: | |
893 | TVU(val) = major * 100 + minor; | |
894 | break; | |
895 | case LDPT_LINKER_OUTPUT: | |
64d94ba0 AM |
896 | TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL |
897 | : bfd_link_pde (&link_info) ? LDPO_EXEC | |
898 | : bfd_link_pie (&link_info) ? LDPO_PIE | |
899 | : LDPO_DYN); | |
f84854b6 L |
900 | break; |
901 | case LDPT_OUTPUT_NAME: | |
902 | TVU(string) = output_filename; | |
903 | break; | |
904 | case LDPT_REGISTER_CLAIM_FILE_HOOK: | |
905 | TVU(register_claim_file) = register_claim_file; | |
906 | break; | |
907 | case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK: | |
908 | TVU(register_all_symbols_read) = register_all_symbols_read; | |
909 | break; | |
910 | case LDPT_REGISTER_CLEANUP_HOOK: | |
911 | TVU(register_cleanup) = register_cleanup; | |
912 | break; | |
913 | case LDPT_ADD_SYMBOLS: | |
914 | TVU(add_symbols) = add_symbols; | |
915 | break; | |
916 | case LDPT_GET_INPUT_FILE: | |
917 | TVU(get_input_file) = get_input_file; | |
918 | break; | |
15f7a26b L |
919 | case LDPT_GET_VIEW: |
920 | TVU(get_view) = get_view; | |
921 | break; | |
f84854b6 L |
922 | case LDPT_RELEASE_INPUT_FILE: |
923 | TVU(release_input_file) = release_input_file; | |
924 | break; | |
925 | case LDPT_GET_SYMBOLS: | |
69ee6ab2 AM |
926 | TVU(get_symbols) = get_symbols_v1; |
927 | break; | |
928 | case LDPT_GET_SYMBOLS_V2: | |
929 | TVU(get_symbols) = get_symbols_v2; | |
f84854b6 L |
930 | break; |
931 | case LDPT_ADD_INPUT_FILE: | |
932 | TVU(add_input_file) = add_input_file; | |
933 | break; | |
934 | case LDPT_ADD_INPUT_LIBRARY: | |
935 | TVU(add_input_library) = add_input_library; | |
936 | break; | |
937 | case LDPT_SET_EXTRA_LIBRARY_PATH: | |
938 | TVU(set_extra_library_path) = set_extra_library_path; | |
939 | break; | |
940 | default: | |
941 | /* Added a new entry to the array without adding | |
942 | a new case to set up its value is a bug. */ | |
943 | FAIL (); | |
5d3236ee DK |
944 | } |
945 | #undef TVU | |
946 | } | |
5d3236ee DK |
947 | } |
948 | ||
949 | /* Append the per-plugin args list and trailing LDPT_NULL to tv. */ | |
950 | static void | |
951 | set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv) | |
952 | { | |
953 | plugin_arg_t *arg = plugin->args; | |
954 | while (arg) | |
955 | { | |
956 | tv->tv_tag = LDPT_OPTION; | |
957 | tv->tv_u.tv_string = arg->arg; | |
958 | arg = arg->next; | |
959 | tv++; | |
960 | } | |
961 | tv->tv_tag = LDPT_NULL; | |
962 | tv->tv_u.tv_val = 0; | |
963 | } | |
964 | ||
965 | /* Load up and initialise all plugins after argument parsing. */ | |
d82184d7 | 966 | void |
d44ad554 | 967 | plugin_load_plugins (void) |
5d3236ee DK |
968 | { |
969 | struct ld_plugin_tv *my_tv; | |
970 | unsigned int max_args = 0; | |
971 | plugin_t *curplug = plugins_list; | |
972 | ||
973 | /* If there are no plugins, we need do nothing this run. */ | |
974 | if (!curplug) | |
d82184d7 | 975 | return; |
5d3236ee DK |
976 | |
977 | /* First pass over plugins to find max # args needed so that we | |
978 | can size and allocate the tv array. */ | |
979 | while (curplug) | |
980 | { | |
981 | if (curplug->n_args > max_args) | |
982 | max_args = curplug->n_args; | |
983 | curplug = curplug->next; | |
984 | } | |
985 | ||
986 | /* Allocate tv array and initialise constant part. */ | |
987 | my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv); | |
988 | set_tv_header (my_tv); | |
989 | ||
990 | /* Pass over plugins again, activating them. */ | |
991 | curplug = plugins_list; | |
992 | while (curplug) | |
993 | { | |
994 | enum ld_plugin_status rv; | |
a8f9d13e AM |
995 | ld_plugin_onload onloadfn; |
996 | ||
997 | onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload"); | |
5d3236ee | 998 | if (!onloadfn) |
a8f9d13e | 999 | onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload"); |
5d3236ee | 1000 | if (!onloadfn) |
d82184d7 L |
1001 | einfo (_("%P%F: %s: error loading plugin: %s\n"), |
1002 | curplug->name, dlerror ()); | |
5d3236ee DK |
1003 | set_tv_plugin_args (curplug, &my_tv[tv_header_size]); |
1004 | called_plugin = curplug; | |
1005 | rv = (*onloadfn) (my_tv); | |
1006 | called_plugin = NULL; | |
1007 | if (rv != LDPS_OK) | |
d82184d7 | 1008 | einfo (_("%P%F: %s: plugin error: %d\n"), curplug->name, rv); |
5d3236ee DK |
1009 | curplug = curplug->next; |
1010 | } | |
1011 | ||
1012 | /* Since plugin(s) inited ok, assume they're going to want symbol | |
1013 | resolutions, which needs us to track which symbols are referenced | |
1014 | by non-IR files using the linker's notice callback. */ | |
9e2278f5 AM |
1015 | orig_notice_all = link_info.notice_all; |
1016 | orig_callbacks = link_info.callbacks; | |
1017 | plugin_callbacks = *orig_callbacks; | |
1018 | plugin_callbacks.notice = &plugin_notice; | |
5d3236ee | 1019 | link_info.notice_all = TRUE; |
61f41c3c | 1020 | link_info.lto_plugin_active = TRUE; |
9e2278f5 | 1021 | link_info.callbacks = &plugin_callbacks; |
38604796 | 1022 | |
5ae0078c L |
1023 | register_ld_plugin_object_p (plugin_object_p); |
1024 | ||
38604796 | 1025 | #if HAVE_MMAP && HAVE_GETPAGESIZE |
fd5a1509 | 1026 | plugin_pagesize = getpagesize (); |
38604796 | 1027 | #endif |
5d3236ee DK |
1028 | } |
1029 | ||
1030 | /* Call 'claim file' hook for all plugins. */ | |
02d00247 | 1031 | static int |
5d3236ee DK |
1032 | plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed) |
1033 | { | |
1034 | plugin_t *curplug = plugins_list; | |
1035 | *claimed = FALSE; | |
5d3236ee DK |
1036 | while (curplug && !*claimed) |
1037 | { | |
1038 | if (curplug->claim_file_handler) | |
1039 | { | |
1040 | enum ld_plugin_status rv; | |
1041 | called_plugin = curplug; | |
1042 | rv = (*curplug->claim_file_handler) (file, claimed); | |
1043 | called_plugin = NULL; | |
1044 | if (rv != LDPS_OK) | |
1045 | set_plugin_error (curplug->name); | |
1046 | } | |
1047 | curplug = curplug->next; | |
1048 | } | |
1049 | return plugin_error_p () ? -1 : 0; | |
1050 | } | |
1051 | ||
35a1e5f3 L |
1052 | /* Duplicates a character string with memory attached to ABFD. */ |
1053 | ||
1054 | static char * | |
1055 | plugin_strdup (bfd *abfd, const char *str) | |
1056 | { | |
1057 | size_t strlength; | |
1058 | char *copy; | |
1059 | strlength = strlen (str) + 1; | |
1060 | copy = bfd_alloc (abfd, strlength); | |
1061 | if (copy == NULL) | |
1062 | einfo (_("%P%F: plugin_strdup failed to allocate memory: %s\n"), | |
1063 | bfd_get_error ()); | |
1064 | memcpy (copy, str, strlength); | |
1065 | return copy; | |
1066 | } | |
1067 | ||
5ae0078c L |
1068 | static const bfd_target * |
1069 | plugin_object_p (bfd *ibfd) | |
02d00247 | 1070 | { |
5ae0078c | 1071 | int claimed; |
f4b78d18 | 1072 | plugin_input_file_t *input; |
35a1e5f3 L |
1073 | off_t offset, filesize; |
1074 | struct ld_plugin_input_file file; | |
1075 | bfd *abfd; | |
5ae0078c L |
1076 | bfd_boolean inarchive; |
1077 | const char *name; | |
1078 | int fd; | |
1079 | ||
1080 | /* Don't try the dummy object file. */ | |
1081 | if ((ibfd->flags & BFD_PLUGIN) != 0) | |
1082 | return NULL; | |
1083 | ||
1084 | if (ibfd->plugin_format != bfd_plugin_uknown) | |
1085 | { | |
1086 | if (ibfd->plugin_format == bfd_plugin_yes) | |
1087 | return ibfd->plugin_dummy_bfd->xvec; | |
1088 | else | |
1089 | return NULL; | |
1090 | } | |
1091 | ||
1092 | inarchive = bfd_my_archive (ibfd) != NULL; | |
1093 | name = inarchive ? bfd_my_archive (ibfd)->filename : ibfd->filename; | |
1094 | fd = open (name, O_RDONLY | O_BINARY); | |
35a1e5f3 L |
1095 | |
1096 | if (fd < 0) | |
5ae0078c | 1097 | return NULL; |
02d00247 AM |
1098 | |
1099 | /* We create a dummy BFD, initially empty, to house whatever symbols | |
1100 | the plugin may want to add. */ | |
35a1e5f3 | 1101 | abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd); |
f4b78d18 L |
1102 | |
1103 | input = bfd_alloc (abfd, sizeof (*input)); | |
1104 | if (input == NULL) | |
1105 | einfo (_("%P%F: plugin failed to allocate memory for input: %s\n"), | |
1106 | bfd_get_error ()); | |
1107 | ||
35a1e5f3 L |
1108 | if (inarchive) |
1109 | { | |
1110 | /* Offset and filesize must refer to the individual archive | |
1111 | member, not the whole file, and must exclude the header. | |
1112 | Fortunately for us, that is how the data is stored in the | |
1113 | origin field of the bfd and in the arelt_data. */ | |
1114 | offset = ibfd->origin; | |
1115 | filesize = arelt_size (ibfd); | |
1116 | } | |
1117 | else | |
1118 | { | |
1119 | offset = 0; | |
1120 | filesize = lseek (fd, 0, SEEK_END); | |
1121 | ||
1122 | /* We must copy filename attached to ibfd if it is not an archive | |
1123 | member since it may be freed by bfd_close below. */ | |
1124 | name = plugin_strdup (abfd, name); | |
1125 | } | |
1126 | ||
1127 | file.name = name; | |
1128 | file.offset = offset; | |
1129 | file.filesize = filesize; | |
1130 | file.fd = fd; | |
1131 | file.handle = input; | |
1132 | ||
f4b78d18 | 1133 | input->abfd = abfd; |
2aec968d L |
1134 | input->view_buffer.addr = NULL; |
1135 | input->view_buffer.filesize = 0; | |
1136 | input->view_buffer.offset = 0; | |
35a1e5f3 | 1137 | input->fd = fd; |
d319a098 | 1138 | input->use_mmap = FALSE; |
35a1e5f3 L |
1139 | input->offset = offset; |
1140 | input->filesize = filesize; | |
1141 | input->name = plugin_strdup (abfd, ibfd->filename); | |
f4b78d18 | 1142 | |
5ae0078c L |
1143 | claimed = 0; |
1144 | ||
35a1e5f3 | 1145 | if (plugin_call_claim_file (&file, &claimed)) |
02d00247 AM |
1146 | einfo (_("%P%F: %s: plugin reported error claiming file\n"), |
1147 | plugin_error_plugin ()); | |
f4b78d18 | 1148 | |
5ae0078c | 1149 | if (input->fd != -1 && ! bfd_plugin_target_p (ibfd->xvec)) |
f4b78d18 | 1150 | { |
5ae0078c L |
1151 | /* FIXME: fd belongs to us, not the plugin. GCC plugin, which |
1152 | doesn't need fd after plugin_call_claim_file, doesn't use | |
1153 | BFD plugin target vector. Since GCC plugin doesn't call | |
1154 | release_input_file, we close it here. LLVM plugin, which | |
1155 | needs fd after plugin_call_claim_file and calls | |
1156 | release_input_file after it is done, uses BFD plugin target | |
1157 | vector. This scheme doesn't work when a plugin needs fd and | |
1158 | doesn't use BFD plugin target vector neither. */ | |
35a1e5f3 | 1159 | close (fd); |
f4b78d18 L |
1160 | input->fd = -1; |
1161 | } | |
1162 | ||
02d00247 AM |
1163 | if (claimed) |
1164 | { | |
5ae0078c L |
1165 | ibfd->plugin_format = bfd_plugin_yes; |
1166 | ibfd->plugin_dummy_bfd = abfd; | |
35a1e5f3 | 1167 | bfd_make_readable (abfd); |
5ae0078c | 1168 | return abfd->xvec; |
02d00247 AM |
1169 | } |
1170 | else | |
1171 | { | |
38604796 L |
1172 | #if HAVE_MMAP |
1173 | if (input->use_mmap) | |
1174 | { | |
1175 | /* If plugin didn't claim the file, unmap the buffer. */ | |
1176 | char *addr = input->view_buffer.addr; | |
1177 | off_t size = input->view_buffer.filesize; | |
1178 | # if HAVE_GETPAGESIZE | |
1179 | off_t bias = input->view_buffer.offset % plugin_pagesize; | |
1180 | size += bias; | |
1181 | addr -= bias; | |
1182 | # endif | |
1183 | munmap (addr, size); | |
1184 | } | |
1185 | #endif | |
1186 | ||
02d00247 AM |
1187 | /* If plugin didn't claim the file, we don't need the dummy bfd. |
1188 | Can't avoid speculatively creating it, alas. */ | |
5ae0078c | 1189 | ibfd->plugin_format = bfd_plugin_no; |
f4b78d18 | 1190 | bfd_close_all_done (abfd); |
5ae0078c L |
1191 | return NULL; |
1192 | } | |
1193 | } | |
1194 | ||
1195 | void | |
1196 | plugin_maybe_claim (lang_input_statement_type *entry) | |
1197 | { | |
1198 | if (plugin_object_p (entry->the_bfd)) | |
1199 | { | |
1200 | bfd *abfd = entry->the_bfd->plugin_dummy_bfd; | |
1201 | ||
1202 | /* Discard the real file's BFD and substitute the dummy one. */ | |
1203 | ||
1204 | /* BFD archive handling caches elements so we can't call | |
1205 | bfd_close for archives. */ | |
1206 | if (entry->the_bfd->my_archive == NULL) | |
1207 | bfd_close (entry->the_bfd); | |
1208 | entry->the_bfd = abfd; | |
1209 | entry->flags.claimed = 1; | |
02d00247 AM |
1210 | } |
1211 | } | |
1212 | ||
5d3236ee DK |
1213 | /* Call 'all symbols read' hook for all plugins. */ |
1214 | int | |
1215 | plugin_call_all_symbols_read (void) | |
1216 | { | |
1217 | plugin_t *curplug = plugins_list; | |
1218 | ||
1219 | /* Disable any further file-claiming. */ | |
1220 | no_more_claiming = TRUE; | |
1221 | ||
5d3236ee DK |
1222 | while (curplug) |
1223 | { | |
1224 | if (curplug->all_symbols_read_handler) | |
1225 | { | |
1226 | enum ld_plugin_status rv; | |
1227 | called_plugin = curplug; | |
1228 | rv = (*curplug->all_symbols_read_handler) (); | |
1229 | called_plugin = NULL; | |
1230 | if (rv != LDPS_OK) | |
1231 | set_plugin_error (curplug->name); | |
1232 | } | |
1233 | curplug = curplug->next; | |
1234 | } | |
1235 | return plugin_error_p () ? -1 : 0; | |
1236 | } | |
1237 | ||
e73d965c | 1238 | /* Call 'cleanup' hook for all plugins at exit. */ |
498cd2a0 | 1239 | void |
5d3236ee DK |
1240 | plugin_call_cleanup (void) |
1241 | { | |
1242 | plugin_t *curplug = plugins_list; | |
1243 | while (curplug) | |
1244 | { | |
1245 | if (curplug->cleanup_handler && !curplug->cleanup_done) | |
1246 | { | |
1247 | enum ld_plugin_status rv; | |
1248 | curplug->cleanup_done = TRUE; | |
1249 | called_plugin = curplug; | |
1250 | rv = (*curplug->cleanup_handler) (); | |
1251 | called_plugin = NULL; | |
1252 | if (rv != LDPS_OK) | |
d82184d7 L |
1253 | info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"), |
1254 | curplug->name, rv); | |
5d3236ee DK |
1255 | dlclose (curplug->dlhandle); |
1256 | } | |
1257 | curplug = curplug->next; | |
1258 | } | |
5d3236ee DK |
1259 | } |
1260 | ||
5d3236ee DK |
1261 | /* To determine which symbols should be resolved LDPR_PREVAILING_DEF |
1262 | and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as | |
35ed3f94 AM |
1263 | the linker adds them to the linker hash table. Mark those |
1264 | referenced from a non-IR file with non_ir_ref. We have to | |
1265 | notice_all symbols, because we won't necessarily know until later | |
1266 | which ones will be contributed by IR files. */ | |
9e2278f5 AM |
1267 | static bfd_boolean |
1268 | plugin_notice (struct bfd_link_info *info, | |
35ed3f94 | 1269 | struct bfd_link_hash_entry *h, |
46135103 | 1270 | struct bfd_link_hash_entry *inh, |
9e2278f5 AM |
1271 | bfd *abfd, |
1272 | asection *section, | |
16d96b5b | 1273 | bfd_vma value, |
46135103 | 1274 | flagword flags) |
5d3236ee | 1275 | { |
46135103 AM |
1276 | struct bfd_link_hash_entry *orig_h = h; |
1277 | ||
35ed3f94 | 1278 | if (h != NULL) |
5d3236ee | 1279 | { |
cd6eee13 AM |
1280 | bfd *sym_bfd; |
1281 | ||
46135103 AM |
1282 | if (h->type == bfd_link_hash_warning) |
1283 | h = h->u.i.link; | |
1284 | ||
4a2b04a7 | 1285 | /* Nothing to do here if this def/ref is from an IR dummy BFD. */ |
9e2278f5 | 1286 | if (is_ir_dummy_bfd (abfd)) |
4a2b04a7 | 1287 | ; |
9e2278f5 | 1288 | |
16d96b5b AM |
1289 | /* Making an indirect symbol counts as a reference unless this |
1290 | is a brand new symbol. */ | |
4a2b04a7 L |
1291 | else if (bfd_is_ind_section (section) |
1292 | || (flags & BSF_INDIRECT) != 0) | |
16d96b5b | 1293 | { |
46135103 AM |
1294 | /* ??? Some of this is questionable. See comments in |
1295 | _bfd_generic_link_add_one_symbol for case IND. */ | |
16d96b5b AM |
1296 | if (h->type != bfd_link_hash_new) |
1297 | { | |
16d96b5b | 1298 | h->non_ir_ref = TRUE; |
46135103 | 1299 | inh->non_ir_ref = TRUE; |
16d96b5b | 1300 | } |
46135103 AM |
1301 | else if (inh->type == bfd_link_hash_new) |
1302 | inh->non_ir_ref = TRUE; | |
16d96b5b AM |
1303 | } |
1304 | ||
1305 | /* Nothing to do here for warning symbols. */ | |
1306 | else if ((flags & BSF_WARNING) != 0) | |
1307 | ; | |
1308 | ||
1309 | /* Nothing to do here for constructor symbols. */ | |
1310 | else if ((flags & BSF_CONSTRUCTOR) != 0) | |
1311 | ; | |
1312 | ||
35ed3f94 | 1313 | /* If this is a ref, set non_ir_ref. */ |
16d96b5b | 1314 | else if (bfd_is_und_section (section)) |
3d5bef4c L |
1315 | { |
1316 | /* Replace the undefined dummy bfd with the real one. */ | |
1317 | if ((h->type == bfd_link_hash_undefined | |
1318 | || h->type == bfd_link_hash_undefweak) | |
46fed7f7 SL |
1319 | && (h->u.undef.abfd == NULL |
1320 | || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0)) | |
3d5bef4c L |
1321 | h->u.undef.abfd = abfd; |
1322 | h->non_ir_ref = TRUE; | |
1323 | } | |
35ed3f94 AM |
1324 | |
1325 | /* Otherwise, it must be a new def. Ensure any symbol defined | |
1326 | in an IR dummy BFD takes on a new value from a real BFD. | |
1327 | Weak symbols are not normally overridden by a new weak | |
1328 | definition, and strong symbols will normally cause multiple | |
1329 | definition errors. Avoid this by making the symbol appear | |
1330 | to be undefined. */ | |
1331 | else if (((h->type == bfd_link_hash_defweak | |
1332 | || h->type == bfd_link_hash_defined) | |
cd6eee13 | 1333 | && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner)) |
35ed3f94 | 1334 | || (h->type == bfd_link_hash_common |
cd6eee13 AM |
1335 | && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))) |
1336 | { | |
1337 | h->type = bfd_link_hash_undefweak; | |
1338 | h->u.undef.abfd = sym_bfd; | |
1339 | } | |
5d3236ee DK |
1340 | } |
1341 | ||
1342 | /* Continue with cref/nocrossref/trace-sym processing. */ | |
46135103 | 1343 | if (orig_h == NULL |
9e2278f5 AM |
1344 | || orig_notice_all |
1345 | || (info->notice_hash != NULL | |
46135103 | 1346 | && bfd_hash_lookup (info->notice_hash, orig_h->root.string, |
35ed3f94 | 1347 | FALSE, FALSE) != NULL)) |
46135103 AM |
1348 | return (*orig_callbacks->notice) (info, orig_h, inh, |
1349 | abfd, section, value, flags); | |
5d3236ee DK |
1350 | return TRUE; |
1351 | } |