xref: /netbsd-src/external/gpl3/binutils/dist/ld/plugin.c (revision bdc22b2e01993381dcefeff2bc9b56ca75a4235c)
1 /* Plugin control for the GNU linker.
2    Copyright (C) 2010-2018 Free Software Foundation, Inc.
3 
4    This file is part of the GNU Binutils.
5 
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License as published by
8    the Free Software Foundation; either version 3 of the License, or
9    (at your option) any later version.
10 
11    This program is distributed in the hope that it will be useful,
12    but WITHOUT ANY WARRANTY; without even the implied warranty of
13    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14    GNU General Public License for more details.
15 
16    You should have received a copy of the GNU General Public License
17    along with this program; if not, write to the Free Software
18    Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19    MA 02110-1301, USA.  */
20 
21 #include "sysdep.h"
22 #include "libiberty.h"
23 #include "bfd.h"
24 #include "bfdlink.h"
25 #include "bfdver.h"
26 #include "ld.h"
27 #include "ldmain.h"
28 #include "ldmisc.h"
29 #include "ldexp.h"
30 #include "ldlang.h"
31 #include "ldfile.h"
32 #include "plugin-api.h"
33 #include "../bfd/plugin.h"
34 #include "plugin.h"
35 #include "elf-bfd.h"
36 #if HAVE_MMAP
37 # include <sys/mman.h>
38 # ifndef MAP_FAILED
39 #  define MAP_FAILED ((void *) -1)
40 # endif
41 # ifndef PROT_READ
42 #  define PROT_READ 0
43 # endif
44 # ifndef MAP_PRIVATE
45 #  define MAP_PRIVATE 0
46 # endif
47 #endif
48 #include <errno.h>
49 #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
50 extern int errno;
51 #endif
52 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
53 #include <windows.h>
54 #endif
55 
56 /* Report plugin symbols.  */
57 bfd_boolean report_plugin_symbols;
58 
59 /* The suffix to append to the name of the real (claimed) object file
60    when generating a dummy BFD to hold the IR symbols sent from the
61    plugin.  For cosmetic use only; appears in maps, crefs etc.  */
62 #define IRONLY_SUFFIX " (symbol from plugin)"
63 
64 /* Stores a single argument passed to a plugin.  */
65 typedef struct plugin_arg
66 {
67   struct plugin_arg *next;
68   const char *arg;
69 } plugin_arg_t;
70 
71 /* Holds all details of a single plugin.  */
72 typedef struct plugin
73 {
74   /* Next on the list of plugins, or NULL at end of chain.  */
75   struct plugin *next;
76   /* The argument string given to --plugin.  */
77   const char *name;
78   /* The shared library handle returned by dlopen.  */
79   void *dlhandle;
80   /* The list of argument string given to --plugin-opt.  */
81   plugin_arg_t *args;
82   /* Number of args in the list, for convenience.  */
83   size_t n_args;
84   /* The plugin's event handlers.  */
85   ld_plugin_claim_file_handler claim_file_handler;
86   ld_plugin_all_symbols_read_handler all_symbols_read_handler;
87   ld_plugin_cleanup_handler cleanup_handler;
88   /* TRUE if the cleanup handlers have been called.  */
89   bfd_boolean cleanup_done;
90 } plugin_t;
91 
92 typedef struct view_buffer
93 {
94   char *addr;
95   size_t filesize;
96   off_t offset;
97 } view_buffer_t;
98 
99 /* The internal version of struct ld_plugin_input_file with a BFD
100    pointer.  */
101 typedef struct plugin_input_file
102 {
103   bfd *abfd;
104   view_buffer_t view_buffer;
105   char *name;
106   int fd;
107   bfd_boolean use_mmap;
108   off_t offset;
109   off_t filesize;
110 } plugin_input_file_t;
111 
112 /* The master list of all plugins.  */
113 static plugin_t *plugins_list = NULL;
114 
115 /* We keep a tail pointer for easy linking on the end.  */
116 static plugin_t **plugins_tail_chain_ptr = &plugins_list;
117 
118 /* The last plugin added to the list, for receiving args.  */
119 static plugin_t *last_plugin = NULL;
120 
121 /* The tail of the arg chain of the last plugin added to the list.  */
122 static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
123 
124 /* The plugin which is currently having a callback executed.  */
125 static plugin_t *called_plugin = NULL;
126 
127 /* Last plugin to cause an error, if any.  */
128 static const char *error_plugin = NULL;
129 
130 /* State of linker "notice" interface before we poked at it.  */
131 static bfd_boolean orig_notice_all;
132 
133 /* Original linker callbacks, and the plugin version.  */
134 static const struct bfd_link_callbacks *orig_callbacks;
135 static struct bfd_link_callbacks plugin_callbacks;
136 
137 /* Set at all symbols read time, to avoid recursively offering the plugin
138    its own newly-added input files and libs to claim.  */
139 bfd_boolean no_more_claiming = FALSE;
140 
141 #if HAVE_MMAP && HAVE_GETPAGESIZE
142 /* Page size used by mmap.  */
143 static off_t plugin_pagesize;
144 #endif
145 
146 /* List of tags to set in the constant leading part of the tv array. */
147 static const enum ld_plugin_tag tv_header_tags[] =
148 {
149   LDPT_MESSAGE,
150   LDPT_API_VERSION,
151   LDPT_GNU_LD_VERSION,
152   LDPT_LINKER_OUTPUT,
153   LDPT_OUTPUT_NAME,
154   LDPT_REGISTER_CLAIM_FILE_HOOK,
155   LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
156   LDPT_REGISTER_CLEANUP_HOOK,
157   LDPT_ADD_SYMBOLS,
158   LDPT_GET_INPUT_FILE,
159   LDPT_GET_VIEW,
160   LDPT_RELEASE_INPUT_FILE,
161   LDPT_GET_SYMBOLS,
162   LDPT_GET_SYMBOLS_V2,
163   LDPT_ADD_INPUT_FILE,
164   LDPT_ADD_INPUT_LIBRARY,
165   LDPT_SET_EXTRA_LIBRARY_PATH
166 };
167 
168 /* How many entries in the constant leading part of the tv array.  */
169 static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
170 
171 /* Forward references.  */
172 static bfd_boolean plugin_notice (struct bfd_link_info *,
173 				  struct bfd_link_hash_entry *,
174 				  struct bfd_link_hash_entry *,
175 				  bfd *, asection *, bfd_vma, flagword);
176 
177 static const bfd_target * plugin_object_p (bfd *);
178 
179 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
180 
181 #define RTLD_NOW 0	/* Dummy value.  */
182 
183 static void *
184 dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
185 {
186   return LoadLibrary (file);
187 }
188 
189 static void *
190 dlsym (void *handle, const char *name)
191 {
192   return GetProcAddress (handle, name);
193 }
194 
195 static int
196 dlclose (void *handle)
197 {
198   FreeLibrary (handle);
199   return 0;
200 }
201 
202 #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)  */
203 
204 #ifndef HAVE_DLFCN_H
205 static const char *
206 dlerror (void)
207 {
208   return "";
209 }
210 #endif
211 
212 /* Helper function for exiting with error status.  */
213 static int
214 set_plugin_error (const char *plugin)
215 {
216   error_plugin = plugin;
217   return -1;
218 }
219 
220 /* Test if an error occurred.  */
221 static bfd_boolean
222 plugin_error_p (void)
223 {
224   return error_plugin != NULL;
225 }
226 
227 /* Return name of plugin which caused an error if any.  */
228 const char *
229 plugin_error_plugin (void)
230 {
231   return error_plugin ? error_plugin : _("<no plugin>");
232 }
233 
234 /* Handle -plugin arg: find and load plugin, or return error.  */
235 void
236 plugin_opt_plugin (const char *plugin)
237 {
238   plugin_t *newplug;
239   plugin_t *curplug = plugins_list;
240 
241   newplug = xmalloc (sizeof *newplug);
242   memset (newplug, 0, sizeof *newplug);
243   newplug->name = plugin;
244   newplug->dlhandle = dlopen (plugin, RTLD_NOW);
245   if (!newplug->dlhandle)
246     einfo (_("%P%F: %s: error loading plugin: %s\n"), plugin, dlerror ());
247 
248   /* Check if plugin has been loaded already.  */
249   while (curplug)
250     {
251       if (newplug->dlhandle == curplug->dlhandle)
252 	{
253 	  einfo (_("%P: %s: duplicated plugin\n"), plugin);
254 	  free (newplug);
255 	  return;
256 	}
257       curplug = curplug->next;
258     }
259 
260   /* Chain on end, so when we run list it is in command-line order.  */
261   *plugins_tail_chain_ptr = newplug;
262   plugins_tail_chain_ptr = &newplug->next;
263 
264   /* Record it as current plugin for receiving args.  */
265   last_plugin = newplug;
266   last_plugin_args_tail_chain_ptr = &newplug->args;
267 }
268 
269 /* Accumulate option arguments for last-loaded plugin, or return
270    error if none.  */
271 int
272 plugin_opt_plugin_arg (const char *arg)
273 {
274   plugin_arg_t *newarg;
275 
276   if (!last_plugin)
277     return set_plugin_error (_("<no plugin>"));
278 
279   /* Ignore -pass-through= from GCC driver.  */
280   if (*arg == '-')
281     {
282       const char *p = arg + 1;
283 
284       if (*p == '-')
285 	++p;
286       if (strncmp (p, "pass-through=", 13) == 0)
287 	return 0;
288     }
289 
290   newarg = xmalloc (sizeof *newarg);
291   newarg->arg = arg;
292   newarg->next = NULL;
293 
294   /* Chain on end to preserve command-line order.  */
295   *last_plugin_args_tail_chain_ptr = newarg;
296   last_plugin_args_tail_chain_ptr = &newarg->next;
297   last_plugin->n_args++;
298   return 0;
299 }
300 
301 /* Generate a dummy BFD to represent an IR file, for any callers of
302    plugin_call_claim_file to use as the handle in the ld_plugin_input_file
303    struct that they build to pass in.  The BFD is initially writable, so
304    that symbols can be added to it; it must be made readable after the
305    add_symbols hook has been called so that it can be read when linking.  */
306 static bfd *
307 plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
308 {
309   bfd *abfd;
310   bfd_boolean bfd_plugin_target;
311 
312   bfd_use_reserved_id = 1;
313   bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
314   abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
315 		     bfd_plugin_target ? link_info.output_bfd : srctemplate);
316   if (abfd != NULL)
317     {
318       abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
319       if (!bfd_make_writable (abfd))
320 	goto report_error;
321       if (!bfd_plugin_target)
322 	{
323 	  bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
324 	  bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
325 	  if (!bfd_copy_private_bfd_data (srctemplate, abfd))
326 	    goto report_error;
327 	}
328 	{
329 	  flagword flags;
330 
331 	  /* Create section to own the symbols.  */
332 	  flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
333 		   | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
334 	  if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
335 	    return abfd;
336 	}
337     }
338 report_error:
339   einfo (_("could not create dummy IR bfd: %F%E\n"));
340   return NULL;
341 }
342 
343 /* Check if the BFD passed in is an IR dummy object file.  */
344 static inline bfd_boolean
345 is_ir_dummy_bfd (const bfd *abfd)
346 {
347   /* ABFD can sometimes legitimately be NULL, e.g. when called from one
348      of the linker callbacks for a symbol in the *ABS* or *UND* sections.  */
349   return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
350 }
351 
352 /* Helpers to convert between BFD and GOLD symbol formats.  */
353 static enum ld_plugin_status
354 asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
355 			    const struct ld_plugin_symbol *ldsym)
356 {
357   flagword flags = BSF_NO_FLAGS;
358   struct bfd_section *section;
359 
360   asym->the_bfd = abfd;
361   asym->name = (ldsym->version
362 		? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
363 		: ldsym->name);
364   asym->value = 0;
365   switch (ldsym->def)
366     {
367     case LDPK_WEAKDEF:
368       flags = BSF_WEAK;
369       /* FALLTHRU */
370     case LDPK_DEF:
371       flags |= BSF_GLOBAL;
372       if (ldsym->comdat_key)
373 	{
374 	  char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
375 			       (const char *) NULL);
376 	  section = bfd_get_section_by_name (abfd, name);
377 	  if (section != NULL)
378 	    free (name);
379 	  else
380 	    {
381 	      flagword sflags;
382 
383 	      sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
384 			| SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
385 			| SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
386 	      section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
387 	      if (section == NULL)
388 		return LDPS_ERR;
389 	    }
390 	}
391       else
392 	section = bfd_get_section_by_name (abfd, ".text");
393       break;
394 
395     case LDPK_WEAKUNDEF:
396       flags = BSF_WEAK;
397       /* FALLTHRU */
398     case LDPK_UNDEF:
399       section = bfd_und_section_ptr;
400       break;
401 
402     case LDPK_COMMON:
403       flags = BSF_GLOBAL;
404       section = bfd_com_section_ptr;
405       asym->value = ldsym->size;
406       /* For ELF targets, set alignment of common symbol to 1.  */
407       if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
408 	{
409 	  ((elf_symbol_type *) asym)->internal_elf_sym.st_shndx = SHN_COMMON;
410 	  ((elf_symbol_type *) asym)->internal_elf_sym.st_value = 1;
411 	}
412       break;
413 
414     default:
415       return LDPS_ERR;
416     }
417   asym->flags = flags;
418   asym->section = section;
419 
420   /* Visibility only applies on ELF targets.  */
421   if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
422     {
423       elf_symbol_type *elfsym = elf_symbol_from (abfd, asym);
424       unsigned char visibility;
425 
426       if (!elfsym)
427 	einfo (_("%P%F: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
428       switch (ldsym->visibility)
429 	{
430 	default:
431 	  einfo (_("%P%F: unknown ELF symbol visibility: %d!\n"),
432 		 ldsym->visibility);
433 	  return LDPS_ERR;
434 
435 	case LDPV_DEFAULT:
436 	  visibility = STV_DEFAULT;
437 	  break;
438 	case LDPV_PROTECTED:
439 	  visibility = STV_PROTECTED;
440 	  break;
441 	case LDPV_INTERNAL:
442 	  visibility = STV_INTERNAL;
443 	  break;
444 	case LDPV_HIDDEN:
445 	  visibility = STV_HIDDEN;
446 	  break;
447 	}
448       elfsym->internal_elf_sym.st_other
449 	= (visibility | (elfsym->internal_elf_sym.st_other
450 			 & ~ELF_ST_VISIBILITY (-1)));
451     }
452 
453   return LDPS_OK;
454 }
455 
456 /* Register a claim-file handler.  */
457 static enum ld_plugin_status
458 register_claim_file (ld_plugin_claim_file_handler handler)
459 {
460   ASSERT (called_plugin);
461   called_plugin->claim_file_handler = handler;
462   return LDPS_OK;
463 }
464 
465 /* Register an all-symbols-read handler.  */
466 static enum ld_plugin_status
467 register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
468 {
469   ASSERT (called_plugin);
470   called_plugin->all_symbols_read_handler = handler;
471   return LDPS_OK;
472 }
473 
474 /* Register a cleanup handler.  */
475 static enum ld_plugin_status
476 register_cleanup (ld_plugin_cleanup_handler handler)
477 {
478   ASSERT (called_plugin);
479   called_plugin->cleanup_handler = handler;
480   return LDPS_OK;
481 }
482 
483 /* Add symbols from a plugin-claimed input file.  */
484 static enum ld_plugin_status
485 add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
486 {
487   asymbol **symptrs;
488   plugin_input_file_t *input = handle;
489   bfd *abfd = input->abfd;
490   int n;
491 
492   ASSERT (called_plugin);
493   symptrs = xmalloc (nsyms * sizeof *symptrs);
494   for (n = 0; n < nsyms; n++)
495     {
496       enum ld_plugin_status rv;
497       asymbol *bfdsym;
498 
499       bfdsym = bfd_make_empty_symbol (abfd);
500       symptrs[n] = bfdsym;
501       rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
502       if (rv != LDPS_OK)
503 	return rv;
504     }
505   bfd_set_symtab (abfd, symptrs, nsyms);
506   return LDPS_OK;
507 }
508 
509 /* Get the input file information with an open (possibly re-opened)
510    file descriptor.  */
511 static enum ld_plugin_status
512 get_input_file (const void *handle, struct ld_plugin_input_file *file)
513 {
514   const plugin_input_file_t *input = handle;
515 
516   ASSERT (called_plugin);
517 
518   file->name = input->name;
519   file->offset = input->offset;
520   file->filesize = input->filesize;
521   file->handle = (void *) handle;
522 
523   return LDPS_OK;
524 }
525 
526 /* Get view of the input file.  */
527 static enum ld_plugin_status
528 get_view (const void *handle, const void **viewp)
529 {
530   plugin_input_file_t *input = (plugin_input_file_t *) handle;
531   char *buffer;
532   size_t size = input->filesize;
533   off_t offset = input->offset;
534 #if HAVE_MMAP && HAVE_GETPAGESIZE
535   off_t bias;
536 #endif
537 
538   ASSERT (called_plugin);
539 
540   /* FIXME: einfo should support %lld.  */
541   if ((off_t) size != input->filesize)
542     einfo (_("%P%F: unsupported input file size: %s (%ld bytes)\n"),
543 	   input->name, (long) input->filesize);
544 
545   /* Check the cached view buffer.  */
546   if (input->view_buffer.addr != NULL
547       && input->view_buffer.filesize == size
548       && input->view_buffer.offset == offset)
549     {
550       *viewp = input->view_buffer.addr;
551       return LDPS_OK;
552     }
553 
554   input->view_buffer.filesize = size;
555   input->view_buffer.offset = offset;
556 
557 #if HAVE_MMAP
558 # if HAVE_GETPAGESIZE
559   bias = offset % plugin_pagesize;
560   offset -= bias;
561   size += bias;
562 # endif
563   buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
564   if (buffer != MAP_FAILED)
565     {
566       input->use_mmap = TRUE;
567 # if HAVE_GETPAGESIZE
568       buffer += bias;
569 # endif
570     }
571   else
572 #endif
573     {
574       char *p;
575 
576       input->use_mmap = FALSE;
577 
578       if (lseek (input->fd, offset, SEEK_SET) < 0)
579 	return LDPS_ERR;
580 
581       buffer = bfd_alloc (input->abfd, size);
582       if (buffer == NULL)
583 	return LDPS_ERR;
584 
585       p = buffer;
586       do
587 	{
588 	  ssize_t got = read (input->fd, p, size);
589 	  if (got == 0)
590 	    break;
591 	  else if (got > 0)
592 	    {
593 	      p += got;
594 	      size -= got;
595 	    }
596 	  else if (errno != EINTR)
597 	    return LDPS_ERR;
598 	}
599       while (size > 0);
600     }
601 
602   input->view_buffer.addr = buffer;
603   *viewp = buffer;
604 
605   return LDPS_OK;
606 }
607 
608 /* Release the input file.  */
609 static enum ld_plugin_status
610 release_input_file (const void *handle)
611 {
612   plugin_input_file_t *input = (plugin_input_file_t *) handle;
613   ASSERT (called_plugin);
614   if (input->fd != -1)
615     {
616       close (input->fd);
617       input->fd = -1;
618     }
619   return LDPS_OK;
620 }
621 
622 /* Return TRUE if a defined symbol might be reachable from outside the
623    universe of claimed objects.  */
624 static inline bfd_boolean
625 is_visible_from_outside (struct ld_plugin_symbol *lsym,
626 			 struct bfd_link_hash_entry *blhe)
627 {
628   struct bfd_sym_chain *sym;
629 
630   if (bfd_link_relocatable (&link_info))
631     return TRUE;
632   if (blhe->non_ir_ref_dynamic
633       || link_info.export_dynamic
634       || bfd_link_dll (&link_info))
635     {
636       /* Check if symbol is hidden by version script.  */
637       if (bfd_hide_sym_by_version (link_info.version_info,
638 				   blhe->root.string))
639 	return FALSE;
640       /* Only ELF symbols really have visibility.  */
641       if (bfd_get_flavour (link_info.output_bfd) == bfd_target_elf_flavour)
642 	{
643 	  struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
644 	  int vis = ELF_ST_VISIBILITY (el->other);
645 	  return vis == STV_DEFAULT || vis == STV_PROTECTED;
646 	}
647       /* On non-ELF targets, we can safely make inferences by considering
648 	 what visibility the plugin would have liked to apply when it first
649 	 sent us the symbol.  During ELF symbol processing, visibility only
650 	 ever becomes more restrictive, not less, when symbols are merged,
651 	 so this is a conservative estimate; it may give false positives,
652 	 declaring something visible from outside when it in fact would
653 	 not have been, but this will only lead to missed optimisation
654 	 opportunities during LTRANS at worst; it will not give false
655 	 negatives, which can lead to the disastrous conclusion that the
656 	 related symbol is IRONLY.  (See GCC PR46319 for an example.)  */
657       return (lsym->visibility == LDPV_DEFAULT
658 	      || lsym->visibility == LDPV_PROTECTED);
659     }
660 
661   for (sym = &entry_symbol; sym != NULL; sym = sym->next)
662     if (sym->name
663 	&& strcmp (sym->name, blhe->root.string) == 0)
664       return TRUE;
665 
666   return FALSE;
667 }
668 
669 /* Get the symbol resolution info for a plugin-claimed input file.  */
670 static enum ld_plugin_status
671 get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
672 	     int def_ironly_exp)
673 {
674   const plugin_input_file_t *input = handle;
675   const bfd *abfd = (const bfd *) input->abfd;
676   int n;
677 
678   ASSERT (called_plugin);
679   for (n = 0; n < nsyms; n++)
680     {
681       struct bfd_link_hash_entry *blhe;
682       asection *owner_sec;
683       int res;
684 
685       if (syms[n].def != LDPK_UNDEF)
686 	blhe = bfd_link_hash_lookup (link_info.hash, syms[n].name,
687 				     FALSE, FALSE, TRUE);
688       else
689 	blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd, &link_info,
690 					     syms[n].name, FALSE, FALSE, TRUE);
691       if (!blhe)
692 	{
693 	  /* The plugin is called to claim symbols in an archive element
694 	     from plugin_object_p.  But those symbols aren't needed to
695 	     create output.  They are defined and referenced only within
696 	     IR.  */
697 	  switch (syms[n].def)
698 	    {
699 	    default:
700 	      abort ();
701 	    case LDPK_UNDEF:
702 	    case LDPK_WEAKUNDEF:
703 	      res = LDPR_UNDEF;
704 	      break;
705 	    case LDPK_DEF:
706 	    case LDPK_WEAKDEF:
707 	    case LDPK_COMMON:
708 	      res = LDPR_PREVAILING_DEF_IRONLY;
709 	      break;
710 	    }
711 	  goto report_symbol;
712 	}
713 
714       /* Determine resolution from blhe type and symbol's original type.  */
715       if (blhe->type == bfd_link_hash_undefined
716 	  || blhe->type == bfd_link_hash_undefweak)
717 	{
718 	  res = LDPR_UNDEF;
719 	  goto report_symbol;
720 	}
721       if (blhe->type != bfd_link_hash_defined
722 	  && blhe->type != bfd_link_hash_defweak
723 	  && blhe->type != bfd_link_hash_common)
724 	{
725 	  /* We should not have a new, indirect or warning symbol here.  */
726 	  einfo (_("%P%F: %s: plugin symbol table corrupt (sym type %d)\n"),
727 		 called_plugin->name, blhe->type);
728 	}
729 
730       /* Find out which section owns the symbol.  Since it's not undef,
731 	 it must have an owner; if it's not a common symbol, both defs
732 	 and weakdefs keep it in the same place. */
733       owner_sec = (blhe->type == bfd_link_hash_common
734 		   ? blhe->u.c.p->section
735 		   : blhe->u.def.section);
736 
737 
738       /* If it was originally undefined or common, then it has been
739 	 resolved; determine how.  */
740       if (syms[n].def == LDPK_UNDEF
741 	  || syms[n].def == LDPK_WEAKUNDEF
742 	  || syms[n].def == LDPK_COMMON)
743 	{
744 	  if (owner_sec->owner == link_info.output_bfd)
745 	    res = LDPR_RESOLVED_EXEC;
746 	  else if (owner_sec->owner == abfd)
747 	    res = LDPR_PREVAILING_DEF_IRONLY;
748 	  else if (is_ir_dummy_bfd (owner_sec->owner))
749 	    res = LDPR_RESOLVED_IR;
750 	  else if (owner_sec->owner != NULL
751 		   && (owner_sec->owner->flags & DYNAMIC) != 0)
752 	    res = LDPR_RESOLVED_DYN;
753 	  else
754 	    res = LDPR_RESOLVED_EXEC;
755 	}
756 
757       /* Was originally def, or weakdef.  Does it prevail?  If the
758 	 owner is the original dummy bfd that supplied it, then this
759 	 is the definition that has prevailed.  */
760       else if (owner_sec->owner == link_info.output_bfd)
761 	res = LDPR_PREEMPTED_REG;
762       else if (owner_sec->owner == abfd)
763 	res = LDPR_PREVAILING_DEF_IRONLY;
764 
765       /* Was originally def, weakdef, or common, but has been pre-empted.  */
766       else if (is_ir_dummy_bfd (owner_sec->owner))
767 	res = LDPR_PREEMPTED_IR;
768       else
769 	res = LDPR_PREEMPTED_REG;
770 
771       if (res == LDPR_PREVAILING_DEF_IRONLY)
772 	{
773 	  /* We need to know if the sym is referenced from non-IR files.  Or
774 	     even potentially-referenced, perhaps in a future final link if
775 	     this is a partial one, perhaps dynamically at load-time if the
776 	     symbol is externally visible.  */
777 	  if (blhe->non_ir_ref_regular)
778 	    res = LDPR_PREVAILING_DEF;
779 	  else if (is_visible_from_outside (&syms[n], blhe))
780 	    res = def_ironly_exp;
781 	}
782 
783     report_symbol:
784       syms[n].resolution = res;
785       if (report_plugin_symbols)
786 	einfo (_("%P: %B: symbol `%s' "
787 		 "definition: %d, visibility: %d, resolution: %d\n"),
788 	       abfd, syms[n].name,
789 	       syms[n].def, syms[n].visibility, res);
790     }
791   return LDPS_OK;
792 }
793 
794 static enum ld_plugin_status
795 get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
796 {
797   return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
798 }
799 
800 static enum ld_plugin_status
801 get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
802 {
803   return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
804 }
805 
806 /* Add a new (real) input file generated by a plugin.  */
807 static enum ld_plugin_status
808 add_input_file (const char *pathname)
809 {
810   lang_input_statement_type *is;
811 
812   ASSERT (called_plugin);
813   is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
814 			    NULL);
815   if (!is)
816     return LDPS_ERR;
817   is->flags.lto_output = 1;
818   return LDPS_OK;
819 }
820 
821 /* Add a new (real) library required by a plugin.  */
822 static enum ld_plugin_status
823 add_input_library (const char *pathname)
824 {
825   lang_input_statement_type *is;
826 
827   ASSERT (called_plugin);
828   is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
829 			    NULL);
830   if (!is)
831     return LDPS_ERR;
832   is->flags.lto_output = 1;
833   return LDPS_OK;
834 }
835 
836 /* Set the extra library path to be used by libraries added via
837    add_input_library.  */
838 static enum ld_plugin_status
839 set_extra_library_path (const char *path)
840 {
841   ASSERT (called_plugin);
842   ldfile_add_library_path (xstrdup (path), FALSE);
843   return LDPS_OK;
844 }
845 
846 /* Issue a diagnostic message from a plugin.  */
847 static enum ld_plugin_status
848 message (int level, const char *format, ...)
849 {
850   va_list args;
851   va_start (args, format);
852 
853   switch (level)
854     {
855     case LDPL_INFO:
856       vfinfo (stdout, format, args, FALSE);
857       putchar ('\n');
858       break;
859     case LDPL_WARNING:
860       {
861 	char *newfmt = concat ("%P: warning: ", format, "\n",
862 			       (const char *) NULL);
863 	vfinfo (stdout, newfmt, args, TRUE);
864 	free (newfmt);
865       }
866       break;
867     case LDPL_FATAL:
868     case LDPL_ERROR:
869     default:
870       {
871 	char *newfmt = concat (level == LDPL_FATAL ? "%P%F" : "%P%X",
872 			       ": error: ", format, "\n",
873 			       (const char *) NULL);
874 	fflush (stdout);
875 	vfinfo (stderr, newfmt, args, TRUE);
876 	fflush (stderr);
877 	free (newfmt);
878       }
879       break;
880     }
881 
882   va_end (args);
883   return LDPS_OK;
884 }
885 
886 /* Helper to size leading part of tv array and set it up. */
887 static void
888 set_tv_header (struct ld_plugin_tv *tv)
889 {
890   size_t i;
891 
892   /* Version info.  */
893   static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
894   static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
895 
896   for (i = 0; i < tv_header_size; i++)
897     {
898       tv[i].tv_tag = tv_header_tags[i];
899 #define TVU(x) tv[i].tv_u.tv_ ## x
900       switch (tv[i].tv_tag)
901 	{
902 	case LDPT_MESSAGE:
903 	  TVU(message) = message;
904 	  break;
905 	case LDPT_API_VERSION:
906 	  TVU(val) = LD_PLUGIN_API_VERSION;
907 	  break;
908 	case LDPT_GNU_LD_VERSION:
909 	  TVU(val) = major * 100 + minor;
910 	  break;
911 	case LDPT_LINKER_OUTPUT:
912 	  TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
913 		      : bfd_link_pde (&link_info) ? LDPO_EXEC
914 		      : bfd_link_pie (&link_info) ? LDPO_PIE
915 		      : LDPO_DYN);
916 	  break;
917 	case LDPT_OUTPUT_NAME:
918 	  TVU(string) = output_filename;
919 	  break;
920 	case LDPT_REGISTER_CLAIM_FILE_HOOK:
921 	  TVU(register_claim_file) = register_claim_file;
922 	  break;
923 	case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
924 	  TVU(register_all_symbols_read) = register_all_symbols_read;
925 	  break;
926 	case LDPT_REGISTER_CLEANUP_HOOK:
927 	  TVU(register_cleanup) = register_cleanup;
928 	  break;
929 	case LDPT_ADD_SYMBOLS:
930 	  TVU(add_symbols) = add_symbols;
931 	  break;
932 	case LDPT_GET_INPUT_FILE:
933 	  TVU(get_input_file) = get_input_file;
934 	  break;
935 	case LDPT_GET_VIEW:
936 	  TVU(get_view) = get_view;
937 	  break;
938 	case LDPT_RELEASE_INPUT_FILE:
939 	  TVU(release_input_file) = release_input_file;
940 	  break;
941 	case LDPT_GET_SYMBOLS:
942 	  TVU(get_symbols) = get_symbols_v1;
943 	  break;
944 	case LDPT_GET_SYMBOLS_V2:
945 	  TVU(get_symbols) = get_symbols_v2;
946 	  break;
947 	case LDPT_ADD_INPUT_FILE:
948 	  TVU(add_input_file) = add_input_file;
949 	  break;
950 	case LDPT_ADD_INPUT_LIBRARY:
951 	  TVU(add_input_library) = add_input_library;
952 	  break;
953 	case LDPT_SET_EXTRA_LIBRARY_PATH:
954 	  TVU(set_extra_library_path) = set_extra_library_path;
955 	  break;
956 	default:
957 	  /* Added a new entry to the array without adding
958 	     a new case to set up its value is a bug.  */
959 	  FAIL ();
960 	}
961 #undef TVU
962     }
963 }
964 
965 /* Append the per-plugin args list and trailing LDPT_NULL to tv.  */
966 static void
967 set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
968 {
969   plugin_arg_t *arg = plugin->args;
970   while (arg)
971     {
972       tv->tv_tag = LDPT_OPTION;
973       tv->tv_u.tv_string = arg->arg;
974       arg = arg->next;
975       tv++;
976     }
977   tv->tv_tag = LDPT_NULL;
978   tv->tv_u.tv_val = 0;
979 }
980 
981 /* Load up and initialise all plugins after argument parsing.  */
982 void
983 plugin_load_plugins (void)
984 {
985   struct ld_plugin_tv *my_tv;
986   unsigned int max_args = 0;
987   plugin_t *curplug = plugins_list;
988 
989   /* If there are no plugins, we need do nothing this run.  */
990   if (!curplug)
991     return;
992 
993   /* First pass over plugins to find max # args needed so that we
994      can size and allocate the tv array.  */
995   while (curplug)
996     {
997       if (curplug->n_args > max_args)
998 	max_args = curplug->n_args;
999       curplug = curplug->next;
1000     }
1001 
1002   /* Allocate tv array and initialise constant part.  */
1003   my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1004   set_tv_header (my_tv);
1005 
1006   /* Pass over plugins again, activating them.  */
1007   curplug = plugins_list;
1008   while (curplug)
1009     {
1010       enum ld_plugin_status rv;
1011       ld_plugin_onload onloadfn;
1012 
1013       onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
1014       if (!onloadfn)
1015 	onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
1016       if (!onloadfn)
1017 	einfo (_("%P%F: %s: error loading plugin: %s\n"),
1018 	       curplug->name, dlerror ());
1019       set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1020       called_plugin = curplug;
1021       rv = (*onloadfn) (my_tv);
1022       called_plugin = NULL;
1023       if (rv != LDPS_OK)
1024 	einfo (_("%P%F: %s: plugin error: %d\n"), curplug->name, rv);
1025       curplug = curplug->next;
1026     }
1027 
1028   /* Since plugin(s) inited ok, assume they're going to want symbol
1029      resolutions, which needs us to track which symbols are referenced
1030      by non-IR files using the linker's notice callback.  */
1031   orig_notice_all = link_info.notice_all;
1032   orig_callbacks = link_info.callbacks;
1033   plugin_callbacks = *orig_callbacks;
1034   plugin_callbacks.notice = &plugin_notice;
1035   link_info.notice_all = TRUE;
1036   link_info.lto_plugin_active = TRUE;
1037   link_info.callbacks = &plugin_callbacks;
1038 
1039   register_ld_plugin_object_p (plugin_object_p);
1040 
1041 #if HAVE_MMAP && HAVE_GETPAGESIZE
1042   plugin_pagesize = getpagesize ();
1043 #endif
1044 }
1045 
1046 /* Call 'claim file' hook for all plugins.  */
1047 static int
1048 plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed)
1049 {
1050   plugin_t *curplug = plugins_list;
1051   *claimed = FALSE;
1052   while (curplug && !*claimed)
1053     {
1054       if (curplug->claim_file_handler)
1055 	{
1056 	  off_t cur_offset;
1057 	  enum ld_plugin_status rv;
1058 
1059 	  called_plugin = curplug;
1060 	  cur_offset = lseek (file->fd, 0, SEEK_CUR);
1061 	  rv = (*curplug->claim_file_handler) (file, claimed);
1062 	  if (!*claimed)
1063 	    lseek (file->fd, cur_offset, SEEK_SET);
1064 	  called_plugin = NULL;
1065 	  if (rv != LDPS_OK)
1066 	    set_plugin_error (curplug->name);
1067 	}
1068       curplug = curplug->next;
1069     }
1070   return plugin_error_p () ? -1 : 0;
1071 }
1072 
1073 /* Duplicates a character string with memory attached to ABFD.  */
1074 
1075 static char *
1076 plugin_strdup (bfd *abfd, const char *str)
1077 {
1078   size_t strlength;
1079   char *copy;
1080   strlength = strlen (str) + 1;
1081   copy = bfd_alloc (abfd, strlength);
1082   if (copy == NULL)
1083     einfo (_("%P%F: plugin_strdup failed to allocate memory: %s\n"),
1084 	   bfd_get_error ());
1085   memcpy (copy, str, strlength);
1086   return copy;
1087 }
1088 
1089 static const bfd_target *
1090 plugin_object_p (bfd *ibfd)
1091 {
1092   int claimed;
1093   plugin_input_file_t *input;
1094   struct ld_plugin_input_file file;
1095   bfd *abfd;
1096 
1097   /* Don't try the dummy object file.  */
1098   if ((ibfd->flags & BFD_PLUGIN) != 0)
1099     return NULL;
1100 
1101   if (ibfd->plugin_format != bfd_plugin_unknown)
1102     {
1103       if (ibfd->plugin_format == bfd_plugin_yes)
1104 	return ibfd->plugin_dummy_bfd->xvec;
1105       else
1106 	return NULL;
1107     }
1108 
1109   /* We create a dummy BFD, initially empty, to house whatever symbols
1110      the plugin may want to add.  */
1111   abfd = plugin_get_ir_dummy_bfd (ibfd->filename, ibfd);
1112 
1113   input = bfd_alloc (abfd, sizeof (*input));
1114   if (input == NULL)
1115     einfo (_("%P%F: plugin failed to allocate memory for input: %s\n"),
1116 	   bfd_get_error ());
1117 
1118   if (!bfd_plugin_open_input (ibfd, &file))
1119     return NULL;
1120 
1121   if (file.name == ibfd->filename)
1122     {
1123       /* We must copy filename attached to ibfd if it is not an archive
1124 	 member since it may be freed by bfd_close below.  */
1125       file.name = plugin_strdup (abfd, file.name);
1126     }
1127 
1128   file.handle = input;
1129   /* The plugin API expects that the file descriptor won't be closed
1130      and reused as done by the bfd file cache.  So dup one.  */
1131   file.fd = dup (file.fd);
1132   if (file.fd < 0)
1133     return NULL;
1134 
1135   input->abfd = abfd;
1136   input->view_buffer.addr = NULL;
1137   input->view_buffer.filesize = 0;
1138   input->view_buffer.offset = 0;
1139   input->fd = file.fd;
1140   input->use_mmap = FALSE;
1141   input->offset = file.offset;
1142   input->filesize = file.filesize;
1143   input->name = plugin_strdup (abfd, ibfd->filename);
1144 
1145   claimed = 0;
1146 
1147   if (plugin_call_claim_file (&file, &claimed))
1148     einfo (_("%P%F: %s: plugin reported error claiming file\n"),
1149 	   plugin_error_plugin ());
1150 
1151   if (input->fd != -1 && !bfd_plugin_target_p (ibfd->xvec))
1152     {
1153       /* FIXME: fd belongs to us, not the plugin.  GCC plugin, which
1154 	 doesn't need fd after plugin_call_claim_file, doesn't use
1155 	 BFD plugin target vector.  Since GCC plugin doesn't call
1156 	 release_input_file, we close it here.  LLVM plugin, which
1157 	 needs fd after plugin_call_claim_file and calls
1158 	 release_input_file after it is done, uses BFD plugin target
1159 	 vector.  This scheme doesn't work when a plugin needs fd and
1160 	 doesn't use BFD plugin target vector neither.  */
1161       close (input->fd);
1162       input->fd = -1;
1163     }
1164 
1165   if (claimed)
1166     {
1167       ibfd->plugin_format = bfd_plugin_yes;
1168       ibfd->plugin_dummy_bfd = abfd;
1169       bfd_make_readable (abfd);
1170       return abfd->xvec;
1171     }
1172   else
1173     {
1174 #if HAVE_MMAP
1175       if (input->use_mmap)
1176 	{
1177 	  /* If plugin didn't claim the file, unmap the buffer.  */
1178 	  char *addr = input->view_buffer.addr;
1179 	  off_t size = input->view_buffer.filesize;
1180 # if HAVE_GETPAGESIZE
1181 	  off_t bias = input->view_buffer.offset % plugin_pagesize;
1182 	  size += bias;
1183 	  addr -= bias;
1184 # endif
1185 	  munmap (addr, size);
1186 	}
1187 #endif
1188 
1189       /* If plugin didn't claim the file, we don't need the dummy bfd.
1190 	 Can't avoid speculatively creating it, alas.  */
1191       ibfd->plugin_format = bfd_plugin_no;
1192       bfd_close_all_done (abfd);
1193       return NULL;
1194     }
1195 }
1196 
1197 void
1198 plugin_maybe_claim (lang_input_statement_type *entry)
1199 {
1200   ASSERT (entry->header.type == lang_input_statement_enum);
1201   if (plugin_object_p (entry->the_bfd))
1202     {
1203       bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1204 
1205       /* Discard the real file's BFD and substitute the dummy one.  */
1206 
1207       /* We can't call bfd_close on archives.  BFD archive handling
1208 	 caches elements, and add_archive_element keeps pointers to
1209 	 the_bfd and the_bfd->filename in a lang_input_statement_type
1210 	 linker script statement.  */
1211       if (entry->the_bfd->my_archive == NULL)
1212 	bfd_close (entry->the_bfd);
1213       entry->the_bfd = abfd;
1214       entry->flags.claimed = 1;
1215     }
1216 }
1217 
1218 /* Call 'all symbols read' hook for all plugins.  */
1219 int
1220 plugin_call_all_symbols_read (void)
1221 {
1222   plugin_t *curplug = plugins_list;
1223 
1224   /* Disable any further file-claiming.  */
1225   no_more_claiming = TRUE;
1226 
1227   while (curplug)
1228     {
1229       if (curplug->all_symbols_read_handler)
1230 	{
1231 	  enum ld_plugin_status rv;
1232 	  called_plugin = curplug;
1233 	  rv = (*curplug->all_symbols_read_handler) ();
1234 	  called_plugin = NULL;
1235 	  if (rv != LDPS_OK)
1236 	    set_plugin_error (curplug->name);
1237 	}
1238       curplug = curplug->next;
1239     }
1240   return plugin_error_p () ? -1 : 0;
1241 }
1242 
1243 /* Call 'cleanup' hook for all plugins at exit.  */
1244 void
1245 plugin_call_cleanup (void)
1246 {
1247   plugin_t *curplug = plugins_list;
1248   while (curplug)
1249     {
1250       if (curplug->cleanup_handler && !curplug->cleanup_done)
1251 	{
1252 	  enum ld_plugin_status rv;
1253 	  curplug->cleanup_done = TRUE;
1254 	  called_plugin = curplug;
1255 	  rv = (*curplug->cleanup_handler) ();
1256 	  called_plugin = NULL;
1257 	  if (rv != LDPS_OK)
1258 	    info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1259 		      curplug->name, rv);
1260 	  dlclose (curplug->dlhandle);
1261 	}
1262       curplug = curplug->next;
1263     }
1264 }
1265 
1266 /* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1267    and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
1268    the linker adds them to the linker hash table.  Mark those
1269    referenced from a non-IR file with non_ir_ref_regular or
1270    non_ir_ref_dynamic as appropriate.  We have to notice_all symbols,
1271    because we won't necessarily know until later which ones will be
1272    contributed by IR files.  */
1273 static bfd_boolean
1274 plugin_notice (struct bfd_link_info *info,
1275 	       struct bfd_link_hash_entry *h,
1276 	       struct bfd_link_hash_entry *inh,
1277 	       bfd *abfd,
1278 	       asection *section,
1279 	       bfd_vma value,
1280 	       flagword flags)
1281 {
1282   struct bfd_link_hash_entry *orig_h = h;
1283 
1284   if (h != NULL)
1285     {
1286       bfd *sym_bfd;
1287       bfd_boolean ref = FALSE;
1288 
1289       if (h->type == bfd_link_hash_warning)
1290 	h = h->u.i.link;
1291 
1292       /* Nothing to do here if this def/ref is from an IR dummy BFD.  */
1293       if (is_ir_dummy_bfd (abfd))
1294 	;
1295 
1296       /* Making an indirect symbol counts as a reference unless this
1297 	 is a brand new symbol.  */
1298       else if (bfd_is_ind_section (section)
1299 	       || (flags & BSF_INDIRECT) != 0)
1300 	{
1301 	  /* ??? Some of this is questionable.  See comments in
1302 	     _bfd_generic_link_add_one_symbol for case IND.  */
1303 	  if (h->type != bfd_link_hash_new
1304 	      || inh->type == bfd_link_hash_new)
1305 	    {
1306 	      if ((abfd->flags & DYNAMIC) == 0)
1307 		inh->non_ir_ref_regular = TRUE;
1308 	      else
1309 		inh->non_ir_ref_dynamic = TRUE;
1310 	    }
1311 
1312 	  if (h->type != bfd_link_hash_new)
1313 	    ref = TRUE;
1314 	}
1315 
1316       /* Nothing to do here for warning symbols.  */
1317       else if ((flags & BSF_WARNING) != 0)
1318 	;
1319 
1320       /* Nothing to do here for constructor symbols.  */
1321       else if ((flags & BSF_CONSTRUCTOR) != 0)
1322 	;
1323 
1324       /* If this is a ref, set non_ir_ref.  */
1325       else if (bfd_is_und_section (section))
1326 	{
1327 	  /* Replace the undefined dummy bfd with the real one.  */
1328 	   if ((h->type == bfd_link_hash_undefined
1329 		|| h->type == bfd_link_hash_undefweak)
1330 	       && (h->u.undef.abfd == NULL
1331 		   || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
1332 	     h->u.undef.abfd = abfd;
1333 	  ref = TRUE;
1334 	}
1335 
1336       /* Otherwise, it must be a new def.  */
1337       else
1338 	{
1339 	  /* Ensure any symbol defined in an IR dummy BFD takes on a
1340 	     new value from a real BFD.  Weak symbols are not normally
1341 	     overridden by a new weak definition, and strong symbols
1342 	     will normally cause multiple definition errors.  Avoid
1343 	     this by making the symbol appear to be undefined.  */
1344 	  if (((h->type == bfd_link_hash_defweak
1345 		|| h->type == bfd_link_hash_defined)
1346 	       && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1347 	      || (h->type == bfd_link_hash_common
1348 		  && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner)))
1349 	    {
1350 	      h->type = bfd_link_hash_undefweak;
1351 	      h->u.undef.abfd = sym_bfd;
1352 	    }
1353 
1354 	  /* A common symbol should be merged with other commons or
1355 	     defs with the same name.  In particular, a common ought
1356 	     to be overridden by a def in a -flto object.  In that
1357 	     sense a common is also a ref.  */
1358 	  if (bfd_is_com_section (section))
1359 	    ref = TRUE;
1360 	}
1361 
1362       if (ref)
1363 	{
1364 	  if ((abfd->flags & DYNAMIC) == 0)
1365 	    h->non_ir_ref_regular = TRUE;
1366 	  else
1367 	    h->non_ir_ref_dynamic = TRUE;
1368 	}
1369     }
1370 
1371   /* Continue with cref/nocrossref/trace-sym processing.  */
1372   if (orig_h == NULL
1373       || orig_notice_all
1374       || (info->notice_hash != NULL
1375 	  && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
1376 			      FALSE, FALSE) != NULL))
1377     return (*orig_callbacks->notice) (info, orig_h, inh,
1378 				      abfd, section, value, flags);
1379   return TRUE;
1380 }
1381