Updated Bulgarian translation for the binutils/ directory
[binutils-gdb.git] / ld / plugin.c
blob03ee9880d104512781aeba5ca8433c25a437ede3
1 /* Plugin control for the GNU linker.
2 Copyright (C) 2010-2024 Free Software Foundation, Inc.
4 This file is part of the GNU Binutils.
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
19 MA 02110-1301, USA. */
21 #include "sysdep.h"
22 #include "libiberty.h"
23 #include "bfd.h"
24 #if BFD_SUPPORTS_PLUGINS
25 #include "bfdlink.h"
26 #include "bfdver.h"
27 #include "ctf-api.h"
28 #include "ld.h"
29 #include "ldmain.h"
30 #include "ldmisc.h"
31 #include "ldexp.h"
32 #include "ldlang.h"
33 #include "ldfile.h"
34 #include "plugin-api.h"
35 #include "../bfd/plugin.h"
36 #include "plugin.h"
37 #include "elf-bfd.h"
38 #if HAVE_MMAP
39 # include <sys/mman.h>
40 # ifndef MAP_FAILED
41 # define MAP_FAILED ((void *) -1)
42 # endif
43 # ifndef PROT_READ
44 # define PROT_READ 0
45 # endif
46 # ifndef MAP_PRIVATE
47 # define MAP_PRIVATE 0
48 # endif
49 #endif
50 #include <errno.h>
51 #if !(defined(errno) || defined(_MSC_VER) && defined(_INC_ERRNO))
52 extern int errno;
53 #endif
54 #if defined (HAVE_DLFCN_H)
55 #include <dlfcn.h>
56 #elif defined (HAVE_WINDOWS_H)
57 #include <windows.h>
58 #endif
60 /* Report plugin symbols. */
61 bool report_plugin_symbols;
63 /* The suffix to append to the name of the real (claimed) object file
64 when generating a dummy BFD to hold the IR symbols sent from the
65 plugin. For cosmetic use only; appears in maps, crefs etc. */
66 #define IRONLY_SUFFIX " (symbol from plugin)"
68 /* Stores a single argument passed to a plugin. */
69 typedef struct plugin_arg
71 struct plugin_arg *next;
72 const char *arg;
73 } plugin_arg_t;
75 /* Holds all details of a single plugin. */
76 typedef struct plugin
78 /* Next on the list of plugins, or NULL at end of chain. */
79 struct plugin *next;
80 /* The argument string given to --plugin. */
81 const char *name;
82 /* The shared library handle returned by dlopen. */
83 void *dlhandle;
84 /* The list of argument string given to --plugin-opt. */
85 plugin_arg_t *args;
86 /* Number of args in the list, for convenience. */
87 size_t n_args;
88 /* The plugin's event handlers. */
89 ld_plugin_claim_file_handler claim_file_handler;
90 ld_plugin_claim_file_handler_v2 claim_file_handler_v2;
91 ld_plugin_all_symbols_read_handler all_symbols_read_handler;
92 ld_plugin_cleanup_handler cleanup_handler;
93 /* TRUE if the cleanup handlers have been called. */
94 bool cleanup_done;
95 } plugin_t;
97 typedef struct view_buffer
99 char *addr;
100 size_t filesize;
101 off_t offset;
102 } view_buffer_t;
104 /* The internal version of struct ld_plugin_input_file with a BFD
105 pointer. */
106 typedef struct plugin_input_file
108 /* The dummy BFD. */
109 bfd *abfd;
110 /* The original input BFD. Non-NULL if it is an archive member. */
111 bfd *ibfd;
112 view_buffer_t view_buffer;
113 char *name;
114 int fd;
115 bool use_mmap;
116 off_t offset;
117 off_t filesize;
118 } plugin_input_file_t;
120 /* The master list of all plugins. */
121 static plugin_t *plugins_list = NULL;
123 /* We keep a tail pointer for easy linking on the end. */
124 static plugin_t **plugins_tail_chain_ptr = &plugins_list;
126 /* The last plugin added to the list, for receiving args. */
127 static plugin_t *last_plugin = NULL;
129 /* The tail of the arg chain of the last plugin added to the list. */
130 static plugin_arg_t **last_plugin_args_tail_chain_ptr = NULL;
132 /* The plugin which is currently having a callback executed. */
133 static plugin_t *called_plugin = NULL;
135 /* Last plugin to cause an error, if any. */
136 static const char *error_plugin = NULL;
138 /* State of linker "notice" interface before we poked at it. */
139 static bool orig_notice_all;
141 /* Original linker callbacks, and the plugin version. */
142 static const struct bfd_link_callbacks *orig_callbacks;
143 static struct bfd_link_callbacks plugin_callbacks;
145 /* Set at all symbols read time, to avoid recursively offering the plugin
146 its own newly-added input files and libs to claim. */
147 bool no_more_claiming = false;
149 #if HAVE_MMAP && HAVE_GETPAGESIZE
150 /* Page size used by mmap. */
151 static off_t plugin_pagesize;
152 #endif
154 /* List of tags to set in the constant leading part of the tv array. */
155 static const enum ld_plugin_tag tv_header_tags[] =
157 LDPT_MESSAGE,
158 LDPT_API_VERSION,
159 LDPT_GNU_LD_VERSION,
160 LDPT_LINKER_OUTPUT,
161 LDPT_OUTPUT_NAME,
162 LDPT_REGISTER_CLAIM_FILE_HOOK,
163 LDPT_REGISTER_CLAIM_FILE_HOOK_V2,
164 LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK,
165 LDPT_REGISTER_CLEANUP_HOOK,
166 LDPT_ADD_SYMBOLS,
167 LDPT_GET_INPUT_FILE,
168 LDPT_GET_VIEW,
169 LDPT_RELEASE_INPUT_FILE,
170 LDPT_GET_SYMBOLS,
171 LDPT_GET_SYMBOLS_V2,
172 LDPT_ADD_INPUT_FILE,
173 LDPT_ADD_INPUT_LIBRARY,
174 LDPT_SET_EXTRA_LIBRARY_PATH
177 /* How many entries in the constant leading part of the tv array. */
178 static const size_t tv_header_size = ARRAY_SIZE (tv_header_tags);
180 /* Forward references. */
181 static bool plugin_notice (struct bfd_link_info *,
182 struct bfd_link_hash_entry *,
183 struct bfd_link_hash_entry *,
184 bfd *, asection *, bfd_vma, flagword);
186 static bfd_cleanup plugin_object_p (bfd *, bool);
188 #if !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H)
190 #define RTLD_NOW 0 /* Dummy value. */
192 static void *
193 dlopen (const char *file, int mode ATTRIBUTE_UNUSED)
195 return LoadLibrary (file);
198 static void *
199 dlsym (void *handle, const char *name)
201 return GetProcAddress (handle, name);
204 static int
205 dlclose (void *handle)
207 FreeLibrary (handle);
208 return 0;
211 #endif /* !defined (HAVE_DLFCN_H) && defined (HAVE_WINDOWS_H) */
213 #ifndef HAVE_DLFCN_H
214 static const char *
215 dlerror (void)
217 return "";
219 #endif
221 /* Helper function for exiting with error status. */
222 static int
223 set_plugin_error (const char *plugin)
225 error_plugin = plugin;
226 return -1;
229 /* Test if an error occurred. */
230 static bool
231 plugin_error_p (void)
233 return error_plugin != NULL;
236 /* Return name of plugin which caused an error if any. */
237 const char *
238 plugin_error_plugin (void)
240 return error_plugin ? error_plugin : _("<no plugin>");
243 /* Handle -plugin arg: find and load plugin, or return error. */
244 void
245 plugin_opt_plugin (const char *plugin)
247 plugin_t *newplug;
248 plugin_t *curplug = plugins_list;
250 newplug = xmalloc (sizeof *newplug);
251 memset (newplug, 0, sizeof *newplug);
252 newplug->name = plugin;
253 newplug->dlhandle = dlopen (plugin, RTLD_NOW);
254 if (!newplug->dlhandle)
255 einfo (_("%F%P: %s: error loading plugin: %s\n"), plugin, dlerror ());
257 /* Check if plugin has been loaded already. */
258 while (curplug)
260 if (newplug->dlhandle == curplug->dlhandle)
262 einfo (_("%P: %s: duplicated plugin\n"), plugin);
263 free (newplug);
264 return;
266 curplug = curplug->next;
269 /* Chain on end, so when we run list it is in command-line order. */
270 *plugins_tail_chain_ptr = newplug;
271 plugins_tail_chain_ptr = &newplug->next;
273 /* Record it as current plugin for receiving args. */
274 last_plugin = newplug;
275 last_plugin_args_tail_chain_ptr = &newplug->args;
278 /* Accumulate option arguments for last-loaded plugin, or return
279 error if none. */
281 plugin_opt_plugin_arg (const char *arg)
283 plugin_arg_t *newarg;
285 if (!last_plugin)
286 return set_plugin_error (_("<no plugin>"));
288 /* Ignore -pass-through= from GCC driver. */
289 if (*arg == '-')
291 const char *p = arg + 1;
293 if (*p == '-')
294 ++p;
295 if (strncmp (p, "pass-through=", 13) == 0)
296 return 0;
299 newarg = xmalloc (sizeof *newarg);
300 newarg->arg = arg;
301 newarg->next = NULL;
303 /* Chain on end to preserve command-line order. */
304 *last_plugin_args_tail_chain_ptr = newarg;
305 last_plugin_args_tail_chain_ptr = &newarg->next;
306 last_plugin->n_args++;
307 return 0;
310 /* Generate a dummy BFD to represent an IR file, for any callers of
311 plugin_call_claim_file to use as the handle in the ld_plugin_input_file
312 struct that they build to pass in. The BFD is initially writable, so
313 that symbols can be added to it; it must be made readable after the
314 add_symbols hook has been called so that it can be read when linking. */
315 static bfd *
316 plugin_get_ir_dummy_bfd (const char *name, bfd *srctemplate)
318 bfd *abfd;
319 bool bfd_plugin_target;
321 bfd_use_reserved_id = 1;
322 bfd_plugin_target = bfd_plugin_target_p (srctemplate->xvec);
323 abfd = bfd_create (concat (name, IRONLY_SUFFIX, (const char *) NULL),
324 bfd_plugin_target ? link_info.output_bfd : srctemplate);
325 if (abfd != NULL)
327 abfd->flags |= BFD_LINKER_CREATED | BFD_PLUGIN;
328 if (!bfd_make_writable (abfd))
329 goto report_error;
330 if (!bfd_plugin_target)
332 bfd_set_arch_info (abfd, bfd_get_arch_info (srctemplate));
333 bfd_set_gp_size (abfd, bfd_get_gp_size (srctemplate));
334 if (!bfd_copy_private_bfd_data (srctemplate, abfd))
335 goto report_error;
338 flagword flags;
340 /* Create section to own the symbols. */
341 flags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
342 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE);
343 if (bfd_make_section_anyway_with_flags (abfd, ".text", flags))
344 return abfd;
347 report_error:
348 einfo (_("%F%P: could not create dummy IR bfd: %E\n"));
349 return NULL;
352 /* Check if the BFD passed in is an IR dummy object file. */
353 static inline bool
354 is_ir_dummy_bfd (const bfd *abfd)
356 /* ABFD can sometimes legitimately be NULL, e.g. when called from one
357 of the linker callbacks for a symbol in the *ABS* or *UND* sections. */
358 return abfd != NULL && (abfd->flags & BFD_PLUGIN) != 0;
361 /* Helpers to convert between BFD and GOLD symbol formats. */
362 static enum ld_plugin_status
363 asymbol_from_plugin_symbol (bfd *abfd, asymbol *asym,
364 const struct ld_plugin_symbol *ldsym)
366 flagword flags = BSF_NO_FLAGS;
367 struct bfd_section *section;
369 asym->the_bfd = abfd;
370 asym->name = (ldsym->version
371 ? concat (ldsym->name, "@", ldsym->version, (const char *) NULL)
372 : ldsym->name);
373 asym->value = 0;
374 switch (ldsym->def)
376 case LDPK_WEAKDEF:
377 flags = BSF_WEAK;
378 /* FALLTHRU */
379 case LDPK_DEF:
380 flags |= BSF_GLOBAL;
381 if (ldsym->comdat_key)
383 char *name = concat (".gnu.linkonce.t.", ldsym->comdat_key,
384 (const char *) NULL);
385 section = bfd_get_section_by_name (abfd, name);
386 if (section != NULL)
387 free (name);
388 else
390 flagword sflags;
392 sflags = (SEC_CODE | SEC_HAS_CONTENTS | SEC_READONLY
393 | SEC_ALLOC | SEC_LOAD | SEC_KEEP | SEC_EXCLUDE
394 | SEC_LINK_ONCE | SEC_LINK_DUPLICATES_DISCARD);
395 section = bfd_make_section_anyway_with_flags (abfd, name, sflags);
396 if (section == NULL)
397 return LDPS_ERR;
400 else
401 section = bfd_get_section_by_name (abfd, ".text");
402 break;
404 case LDPK_WEAKUNDEF:
405 flags = BSF_WEAK;
406 /* FALLTHRU */
407 case LDPK_UNDEF:
408 section = bfd_und_section_ptr;
409 break;
411 case LDPK_COMMON:
412 flags = BSF_GLOBAL;
413 section = bfd_com_section_ptr;
414 asym->value = ldsym->size;
415 break;
417 default:
418 return LDPS_ERR;
420 asym->flags = flags;
421 asym->section = section;
423 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
425 elf_symbol_type *elfsym = elf_symbol_from (asym);
426 unsigned char visibility;
428 if (!elfsym)
429 einfo (_("%F%P: %s: non-ELF symbol in ELF BFD!\n"), asym->name);
431 if (ldsym->def == LDPK_COMMON)
433 elfsym->internal_elf_sym.st_shndx = SHN_COMMON;
434 elfsym->internal_elf_sym.st_value = 1;
437 switch (ldsym->visibility)
439 default:
440 einfo (_("%F%P: unknown ELF symbol visibility: %d!\n"),
441 ldsym->visibility);
442 return LDPS_ERR;
444 case LDPV_DEFAULT:
445 visibility = STV_DEFAULT;
446 break;
447 case LDPV_PROTECTED:
448 visibility = STV_PROTECTED;
449 break;
450 case LDPV_INTERNAL:
451 visibility = STV_INTERNAL;
452 break;
453 case LDPV_HIDDEN:
454 visibility = STV_HIDDEN;
455 break;
457 elfsym->internal_elf_sym.st_other |= visibility;
460 return LDPS_OK;
463 /* Register a claim-file handler. */
464 static enum ld_plugin_status
465 register_claim_file (ld_plugin_claim_file_handler handler)
467 ASSERT (called_plugin);
468 called_plugin->claim_file_handler = handler;
469 return LDPS_OK;
472 /* Register a claim-file version 2 handler. */
473 static enum ld_plugin_status
474 register_claim_file_v2 (ld_plugin_claim_file_handler_v2 handler)
476 ASSERT (called_plugin);
477 called_plugin->claim_file_handler_v2 = handler;
478 return LDPS_OK;
481 /* Register an all-symbols-read handler. */
482 static enum ld_plugin_status
483 register_all_symbols_read (ld_plugin_all_symbols_read_handler handler)
485 ASSERT (called_plugin);
486 called_plugin->all_symbols_read_handler = handler;
487 return LDPS_OK;
490 /* Register a cleanup handler. */
491 static enum ld_plugin_status
492 register_cleanup (ld_plugin_cleanup_handler handler)
494 ASSERT (called_plugin);
495 called_plugin->cleanup_handler = handler;
496 return LDPS_OK;
499 /* Add symbols from a plugin-claimed input file. */
500 static enum ld_plugin_status
501 add_symbols (void *handle, int nsyms, const struct ld_plugin_symbol *syms)
503 asymbol **symptrs;
504 plugin_input_file_t *input = handle;
505 bfd *abfd = input->abfd;
506 int n;
508 ASSERT (called_plugin);
509 symptrs = bfd_alloc (abfd, nsyms * sizeof *symptrs);
510 if (symptrs == NULL)
511 return LDPS_ERR;
512 for (n = 0; n < nsyms; n++)
514 enum ld_plugin_status rv;
515 asymbol *bfdsym;
517 bfdsym = bfd_make_empty_symbol (abfd);
518 symptrs[n] = bfdsym;
519 if (bfdsym == NULL)
520 return LDPS_ERR;
521 rv = asymbol_from_plugin_symbol (abfd, bfdsym, syms + n);
522 if (rv != LDPS_OK)
523 return rv;
525 bfd_set_symtab (abfd, symptrs, nsyms);
526 return LDPS_OK;
529 /* Get the input file information with an open (possibly re-opened)
530 file descriptor. */
531 static enum ld_plugin_status
532 get_input_file (const void *handle, struct ld_plugin_input_file *file)
534 const plugin_input_file_t *input = handle;
536 ASSERT (called_plugin);
538 file->name = input->name;
539 file->offset = input->offset;
540 file->filesize = input->filesize;
541 file->handle = (void *) handle;
543 return LDPS_OK;
546 /* Get view of the input file. */
547 static enum ld_plugin_status
548 get_view (const void *handle, const void **viewp)
550 plugin_input_file_t *input = (plugin_input_file_t *) handle;
551 char *buffer;
552 size_t size = input->filesize;
553 off_t offset = input->offset;
554 #if HAVE_MMAP && HAVE_GETPAGESIZE
555 off_t bias;
556 #endif
558 ASSERT (called_plugin);
560 /* FIXME: einfo should support %lld. */
561 if ((off_t) size != input->filesize)
562 einfo (_("%F%P: unsupported input file size: %s (%ld bytes)\n"),
563 input->name, (long) input->filesize);
565 /* Check the cached view buffer. */
566 if (input->view_buffer.addr != NULL
567 && input->view_buffer.filesize == size
568 && input->view_buffer.offset == offset)
570 *viewp = input->view_buffer.addr;
571 return LDPS_OK;
574 input->view_buffer.filesize = size;
575 input->view_buffer.offset = offset;
577 #if HAVE_MMAP
578 # if HAVE_GETPAGESIZE
579 bias = offset % plugin_pagesize;
580 offset -= bias;
581 size += bias;
582 # endif
583 buffer = mmap (NULL, size, PROT_READ, MAP_PRIVATE, input->fd, offset);
584 if (buffer != MAP_FAILED)
586 input->use_mmap = true;
587 # if HAVE_GETPAGESIZE
588 buffer += bias;
589 # endif
591 else
592 #endif
594 char *p;
596 input->use_mmap = false;
598 if (lseek (input->fd, offset, SEEK_SET) < 0)
599 return LDPS_ERR;
601 buffer = bfd_alloc (input->abfd, size);
602 if (buffer == NULL)
603 return LDPS_ERR;
605 p = buffer;
608 ssize_t got = read (input->fd, p, size);
609 if (got == 0)
610 break;
611 else if (got > 0)
613 p += got;
614 size -= got;
616 else if (errno != EINTR)
617 return LDPS_ERR;
619 while (size > 0);
622 input->view_buffer.addr = buffer;
623 *viewp = buffer;
625 return LDPS_OK;
628 /* Release plugin file descriptor. */
630 static void
631 release_plugin_file_descriptor (plugin_input_file_t *input)
633 if (input->fd != -1)
635 bfd_plugin_close_file_descriptor (input->ibfd, input->fd);
636 input->fd = -1;
640 /* Release the input file. */
641 static enum ld_plugin_status
642 release_input_file (const void *handle)
644 plugin_input_file_t *input = (plugin_input_file_t *) handle;
645 ASSERT (called_plugin);
646 release_plugin_file_descriptor (input);
647 return LDPS_OK;
650 /* Return TRUE if a defined symbol might be reachable from outside the
651 universe of claimed objects. */
652 static inline bool
653 is_visible_from_outside (struct ld_plugin_symbol *lsym,
654 struct bfd_link_hash_entry *blhe)
656 if (bfd_link_relocatable (&link_info))
657 return true;
658 if (blhe->non_ir_ref_dynamic
659 || link_info.export_dynamic
660 || bfd_link_dll (&link_info))
662 /* Check if symbol is hidden by version script. */
663 if (bfd_hide_sym_by_version (link_info.version_info,
664 blhe->root.string))
665 return false;
666 /* Only ELF symbols really have visibility. */
667 if (is_elf_hash_table (link_info.hash))
669 struct elf_link_hash_entry *el = (struct elf_link_hash_entry *)blhe;
670 int vis = ELF_ST_VISIBILITY (el->other);
671 return vis == STV_DEFAULT || vis == STV_PROTECTED;
673 /* On non-ELF targets, we can safely make inferences by considering
674 what visibility the plugin would have liked to apply when it first
675 sent us the symbol. During ELF symbol processing, visibility only
676 ever becomes more restrictive, not less, when symbols are merged,
677 so this is a conservative estimate; it may give false positives,
678 declaring something visible from outside when it in fact would
679 not have been, but this will only lead to missed optimisation
680 opportunities during LTRANS at worst; it will not give false
681 negatives, which can lead to the disastrous conclusion that the
682 related symbol is IRONLY. (See GCC PR46319 for an example.) */
683 return (lsym->visibility == LDPV_DEFAULT
684 || lsym->visibility == LDPV_PROTECTED);
687 return false;
690 /* Return LTO kind string name that corresponds to IDX enum value. */
691 static const char *
692 get_lto_kind (unsigned int idx)
694 static char buffer[64];
695 const char *lto_kind_str[5] =
697 "DEF",
698 "WEAKDEF",
699 "UNDEF",
700 "WEAKUNDEF",
701 "COMMON"
704 if (idx < ARRAY_SIZE (lto_kind_str))
705 return lto_kind_str [idx];
707 sprintf (buffer, _("unknown LTO kind value %x"), idx);
708 return buffer;
711 /* Return LTO resolution string name that corresponds to IDX enum value. */
712 static const char *
713 get_lto_resolution (unsigned int idx)
715 static char buffer[64];
716 static const char *lto_resolution_str[10] =
718 "UNKNOWN",
719 "UNDEF",
720 "PREVAILING_DEF",
721 "PREVAILING_DEF_IRONLY",
722 "PREEMPTED_REG",
723 "PREEMPTED_IR",
724 "RESOLVED_IR",
725 "RESOLVED_EXEC",
726 "RESOLVED_DYN",
727 "PREVAILING_DEF_IRONLY_EXP",
730 if (idx < ARRAY_SIZE (lto_resolution_str))
731 return lto_resolution_str [idx];
733 sprintf (buffer, _("unknown LTO resolution value %x"), idx);
734 return buffer;
737 /* Return LTO visibility string name that corresponds to IDX enum value. */
738 static const char *
739 get_lto_visibility (unsigned int idx)
741 static char buffer[64];
742 const char *lto_visibility_str[4] =
744 "DEFAULT",
745 "PROTECTED",
746 "INTERNAL",
747 "HIDDEN"
750 if (idx < ARRAY_SIZE (lto_visibility_str))
751 return lto_visibility_str [idx];
753 sprintf (buffer, _("unknown LTO visibility value %x"), idx);
754 return buffer;
757 /* Get the symbol resolution info for a plugin-claimed input file. */
758 static enum ld_plugin_status
759 get_symbols (const void *handle, int nsyms, struct ld_plugin_symbol *syms,
760 int def_ironly_exp)
762 const plugin_input_file_t *input = handle;
763 const bfd *abfd = (const bfd *) input->abfd;
764 int n;
766 ASSERT (called_plugin);
767 for (n = 0; n < nsyms; n++)
769 struct bfd_link_hash_entry *blhe;
770 asection *owner_sec;
771 int res;
772 struct bfd_link_hash_entry *h
773 = bfd_link_hash_lookup (link_info.hash, syms[n].name,
774 false, false, true);
775 enum { wrap_none, wrapper, wrapped } wrap_status = wrap_none;
777 if (syms[n].def != LDPK_UNDEF && syms[n].def != LDPK_WEAKUNDEF)
779 blhe = h;
780 /* Check if a symbol is a wrapper symbol. */
781 if (blhe && blhe->wrapper_symbol)
782 wrap_status = wrapper;
784 else
786 blhe = bfd_wrapped_link_hash_lookup (link_info.output_bfd,
787 &link_info, syms[n].name,
788 false, false, true);
789 /* Check if a symbol is a wrapped symbol. */
790 if (blhe && blhe != h)
791 wrap_status = wrapped;
793 if (!blhe)
795 /* The plugin is called to claim symbols in an archive element
796 from plugin_object_p. But those symbols aren't needed to
797 create output. They are defined and referenced only within
798 IR. */
799 switch (syms[n].def)
801 default:
802 abort ();
803 case LDPK_UNDEF:
804 case LDPK_WEAKUNDEF:
805 res = LDPR_UNDEF;
806 break;
807 case LDPK_DEF:
808 case LDPK_WEAKDEF:
809 case LDPK_COMMON:
810 res = LDPR_PREVAILING_DEF_IRONLY;
811 break;
813 goto report_symbol;
816 /* Determine resolution from blhe type and symbol's original type. */
817 if (blhe->type == bfd_link_hash_undefined
818 || blhe->type == bfd_link_hash_undefweak)
820 res = LDPR_UNDEF;
821 goto report_symbol;
823 if (blhe->type != bfd_link_hash_defined
824 && blhe->type != bfd_link_hash_defweak
825 && blhe->type != bfd_link_hash_common)
827 /* We should not have a new, indirect or warning symbol here. */
828 einfo (_("%F%P: %s: plugin symbol table corrupt (sym type %d)\n"),
829 called_plugin->name, blhe->type);
832 /* Find out which section owns the symbol. Since it's not undef,
833 it must have an owner; if it's not a common symbol, both defs
834 and weakdefs keep it in the same place. */
835 owner_sec = (blhe->type == bfd_link_hash_common
836 ? blhe->u.c.p->section
837 : blhe->u.def.section);
840 /* If it was originally undefined or common, then it has been
841 resolved; determine how. */
842 if (syms[n].def == LDPK_UNDEF
843 || syms[n].def == LDPK_WEAKUNDEF
844 || syms[n].def == LDPK_COMMON)
846 if (owner_sec->owner == link_info.output_bfd)
847 res = LDPR_RESOLVED_EXEC;
848 else if (owner_sec->owner == abfd)
849 res = LDPR_PREVAILING_DEF_IRONLY;
850 else if (is_ir_dummy_bfd (owner_sec->owner))
851 res = LDPR_RESOLVED_IR;
852 else if (owner_sec->owner != NULL
853 && (owner_sec->owner->flags & DYNAMIC) != 0)
854 res = LDPR_RESOLVED_DYN;
855 else
856 res = LDPR_RESOLVED_EXEC;
859 /* Was originally def, or weakdef. Does it prevail? If the
860 owner is the original dummy bfd that supplied it, then this
861 is the definition that has prevailed. */
862 else if (owner_sec->owner == link_info.output_bfd)
863 res = LDPR_PREEMPTED_REG;
864 else if (owner_sec->owner == abfd)
865 res = LDPR_PREVAILING_DEF_IRONLY;
867 /* Was originally def, weakdef, or common, but has been pre-empted. */
868 else if (is_ir_dummy_bfd (owner_sec->owner))
869 res = LDPR_PREEMPTED_IR;
870 else
871 res = LDPR_PREEMPTED_REG;
873 if (res == LDPR_PREVAILING_DEF_IRONLY)
875 /* We need to know if the sym is referenced from non-IR files. Or
876 even potentially-referenced, perhaps in a future final link if
877 this is a partial one, perhaps dynamically at load-time if the
878 symbol is externally visible. Also check for __real_SYM
879 reference and wrapper symbol. */
880 if (blhe->non_ir_ref_regular
881 || blhe->ref_real
882 || wrap_status == wrapper)
883 res = LDPR_PREVAILING_DEF;
884 else if (wrap_status == wrapped)
885 res = LDPR_RESOLVED_IR;
886 else if (is_visible_from_outside (&syms[n], blhe))
887 res = def_ironly_exp;
890 report_symbol:
891 syms[n].resolution = res;
892 if (report_plugin_symbols)
893 einfo (_("%P: %pB: symbol `%s' "
894 "definition: %s, visibility: %s, resolution: %s\n"),
895 abfd, syms[n].name,
896 get_lto_kind (syms[n].def),
897 get_lto_visibility (syms[n].visibility),
898 get_lto_resolution (res));
900 return LDPS_OK;
903 static enum ld_plugin_status
904 get_symbols_v1 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
906 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF);
909 static enum ld_plugin_status
910 get_symbols_v2 (const void *handle, int nsyms, struct ld_plugin_symbol *syms)
912 return get_symbols (handle, nsyms, syms, LDPR_PREVAILING_DEF_IRONLY_EXP);
915 /* Add a new (real) input file generated by a plugin. */
916 static enum ld_plugin_status
917 add_input_file (const char *pathname)
919 lang_input_statement_type *is;
921 ASSERT (called_plugin);
922 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_file_enum,
923 NULL);
924 if (!is)
925 return LDPS_ERR;
926 is->plugin = called_plugin;
927 return LDPS_OK;
930 /* Add a new (real) library required by a plugin. */
931 static enum ld_plugin_status
932 add_input_library (const char *pathname)
934 lang_input_statement_type *is;
936 ASSERT (called_plugin);
937 is = lang_add_input_file (xstrdup (pathname), lang_input_file_is_l_enum,
938 NULL);
939 if (!is)
940 return LDPS_ERR;
941 is->plugin = called_plugin;
942 return LDPS_OK;
945 /* Set the extra library path to be used by libraries added via
946 add_input_library. */
948 static enum ld_plugin_status
949 set_extra_library_path (const char *path)
951 search_dirs_type * sdt;
953 ASSERT (called_plugin);
954 sdt = ldfile_add_library_path (xstrdup (path), search_dir_plugin);
955 if (sdt == NULL)
956 return LDPS_ERR;
957 sdt->plugin = called_plugin;
958 return LDPS_OK;
961 /* Issue a diagnostic message from a plugin. */
962 static enum ld_plugin_status
963 message (int level, const char *format, ...)
965 va_list args;
966 va_start (args, format);
968 switch (level)
970 case LDPL_INFO:
971 vfinfo (stdout, format, args, false);
972 putchar ('\n');
973 break;
974 case LDPL_WARNING:
976 char *newfmt = concat (_("%P: warning: "), format, "\n",
977 (const char *) NULL);
978 vfinfo (stdout, newfmt, args, true);
979 free (newfmt);
981 break;
982 case LDPL_FATAL:
983 case LDPL_ERROR:
984 default:
986 char *newfmt = concat (level == LDPL_FATAL ? "%F" : "%X",
987 _("%P: error: "), format, "\n",
988 (const char *) NULL);
989 fflush (stdout);
990 vfinfo (stderr, newfmt, args, true);
991 fflush (stderr);
992 free (newfmt);
994 break;
997 va_end (args);
998 return LDPS_OK;
1001 /* Helper to size leading part of tv array and set it up. */
1002 static void
1003 set_tv_header (struct ld_plugin_tv *tv)
1005 size_t i;
1007 /* Version info. */
1008 static const unsigned int major = (unsigned)(BFD_VERSION / 100000000UL);
1009 static const unsigned int minor = (unsigned)(BFD_VERSION / 1000000UL) % 100;
1011 for (i = 0; i < tv_header_size; i++)
1013 tv[i].tv_tag = tv_header_tags[i];
1014 #define TVU(x) tv[i].tv_u.tv_ ## x
1015 switch (tv[i].tv_tag)
1017 case LDPT_MESSAGE:
1018 TVU(message) = message;
1019 break;
1020 case LDPT_API_VERSION:
1021 TVU(val) = LD_PLUGIN_API_VERSION;
1022 break;
1023 case LDPT_GNU_LD_VERSION:
1024 TVU(val) = major * 100 + minor;
1025 break;
1026 case LDPT_LINKER_OUTPUT:
1027 TVU(val) = (bfd_link_relocatable (&link_info) ? LDPO_REL
1028 : bfd_link_pde (&link_info) ? LDPO_EXEC
1029 : bfd_link_pie (&link_info) ? LDPO_PIE
1030 : LDPO_DYN);
1031 break;
1032 case LDPT_OUTPUT_NAME:
1033 TVU(string) = output_filename;
1034 break;
1035 case LDPT_REGISTER_CLAIM_FILE_HOOK:
1036 TVU(register_claim_file) = register_claim_file;
1037 break;
1038 case LDPT_REGISTER_CLAIM_FILE_HOOK_V2:
1039 TVU(register_claim_file_v2) = register_claim_file_v2;
1040 break;
1041 case LDPT_REGISTER_ALL_SYMBOLS_READ_HOOK:
1042 TVU(register_all_symbols_read) = register_all_symbols_read;
1043 break;
1044 case LDPT_REGISTER_CLEANUP_HOOK:
1045 TVU(register_cleanup) = register_cleanup;
1046 break;
1047 case LDPT_ADD_SYMBOLS:
1048 TVU(add_symbols) = add_symbols;
1049 break;
1050 case LDPT_GET_INPUT_FILE:
1051 TVU(get_input_file) = get_input_file;
1052 break;
1053 case LDPT_GET_VIEW:
1054 TVU(get_view) = get_view;
1055 break;
1056 case LDPT_RELEASE_INPUT_FILE:
1057 TVU(release_input_file) = release_input_file;
1058 break;
1059 case LDPT_GET_SYMBOLS:
1060 TVU(get_symbols) = get_symbols_v1;
1061 break;
1062 case LDPT_GET_SYMBOLS_V2:
1063 TVU(get_symbols) = get_symbols_v2;
1064 break;
1065 case LDPT_ADD_INPUT_FILE:
1066 TVU(add_input_file) = add_input_file;
1067 break;
1068 case LDPT_ADD_INPUT_LIBRARY:
1069 TVU(add_input_library) = add_input_library;
1070 break;
1071 case LDPT_SET_EXTRA_LIBRARY_PATH:
1072 TVU(set_extra_library_path) = set_extra_library_path;
1073 break;
1074 default:
1075 /* Added a new entry to the array without adding
1076 a new case to set up its value is a bug. */
1077 FAIL ();
1079 #undef TVU
1083 /* Append the per-plugin args list and trailing LDPT_NULL to tv. */
1084 static void
1085 set_tv_plugin_args (plugin_t *plugin, struct ld_plugin_tv *tv)
1087 plugin_arg_t *arg = plugin->args;
1088 while (arg)
1090 tv->tv_tag = LDPT_OPTION;
1091 tv->tv_u.tv_string = arg->arg;
1092 arg = arg->next;
1093 tv++;
1095 tv->tv_tag = LDPT_NULL;
1096 tv->tv_u.tv_val = 0;
1099 /* Load up and initialise all plugins after argument parsing. */
1100 void
1101 plugin_load_plugins (void)
1103 struct ld_plugin_tv *my_tv;
1104 unsigned int max_args = 0;
1105 plugin_t *curplug = plugins_list;
1107 /* If there are no plugins, we need do nothing this run. */
1108 if (!curplug)
1109 return;
1111 /* First pass over plugins to find max # args needed so that we
1112 can size and allocate the tv array. */
1113 while (curplug)
1115 if (curplug->n_args > max_args)
1116 max_args = curplug->n_args;
1117 curplug = curplug->next;
1120 /* Allocate tv array and initialise constant part. */
1121 my_tv = xmalloc ((max_args + 1 + tv_header_size) * sizeof *my_tv);
1122 set_tv_header (my_tv);
1124 /* Pass over plugins again, activating them. */
1125 curplug = plugins_list;
1126 while (curplug)
1128 enum ld_plugin_status rv;
1129 ld_plugin_onload onloadfn;
1131 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "onload");
1132 if (!onloadfn)
1133 onloadfn = (ld_plugin_onload) dlsym (curplug->dlhandle, "_onload");
1134 if (!onloadfn)
1135 einfo (_("%F%P: %s: error loading plugin: %s\n"),
1136 curplug->name, dlerror ());
1137 set_tv_plugin_args (curplug, &my_tv[tv_header_size]);
1138 called_plugin = curplug;
1139 rv = (*onloadfn) (my_tv);
1140 called_plugin = NULL;
1141 if (rv != LDPS_OK)
1142 einfo (_("%F%P: %s: plugin error: %d\n"), curplug->name, rv);
1143 curplug = curplug->next;
1146 /* Since plugin(s) inited ok, assume they're going to want symbol
1147 resolutions, which needs us to track which symbols are referenced
1148 by non-IR files using the linker's notice callback. */
1149 orig_notice_all = link_info.notice_all;
1150 orig_callbacks = link_info.callbacks;
1151 plugin_callbacks = *orig_callbacks;
1152 plugin_callbacks.notice = &plugin_notice;
1153 link_info.notice_all = true;
1154 link_info.lto_plugin_active = true;
1155 link_info.callbacks = &plugin_callbacks;
1157 register_ld_plugin_object_p (plugin_object_p);
1159 #if HAVE_MMAP && HAVE_GETPAGESIZE
1160 plugin_pagesize = getpagesize ();
1161 #endif
1164 /* Call 'claim file' hook for all plugins. */
1165 static int
1166 plugin_call_claim_file (const struct ld_plugin_input_file *file, int *claimed,
1167 bool known_used)
1169 plugin_t *curplug = plugins_list;
1170 *claimed = false;
1171 while (curplug && !*claimed)
1173 if (curplug->claim_file_handler)
1175 enum ld_plugin_status rv;
1177 called_plugin = curplug;
1178 if (curplug->claim_file_handler_v2)
1179 rv = (*curplug->claim_file_handler_v2) (file, claimed, known_used);
1180 else
1181 rv = (*curplug->claim_file_handler) (file, claimed);
1182 called_plugin = NULL;
1183 if (rv != LDPS_OK)
1184 set_plugin_error (curplug->name);
1186 curplug = curplug->next;
1188 return plugin_error_p () ? -1 : 0;
1191 /* Duplicates a character string with memory attached to ABFD. */
1193 static char *
1194 plugin_strdup (bfd *abfd, const char *str)
1196 size_t strlength;
1197 char *copy;
1198 strlength = strlen (str) + 1;
1199 copy = bfd_alloc (abfd, strlength);
1200 if (copy == NULL)
1201 einfo (_("%F%P: plugin_strdup failed to allocate memory: %s\n"),
1202 bfd_get_error ());
1203 memcpy (copy, str, strlength);
1204 return copy;
1207 static void
1208 plugin_cleanup (bfd *abfd ATTRIBUTE_UNUSED)
1212 static bfd_cleanup
1213 plugin_object_p (bfd *ibfd, bool known_used)
1215 int claimed;
1216 plugin_input_file_t *input;
1217 struct ld_plugin_input_file file;
1218 bfd *abfd;
1220 /* Don't try the dummy object file. */
1221 if ((ibfd->flags & BFD_PLUGIN) != 0)
1222 return NULL;
1224 if (ibfd->plugin_format != bfd_plugin_unknown)
1226 if (ibfd->plugin_format == bfd_plugin_yes)
1227 return plugin_cleanup;
1228 else
1229 return NULL;
1232 /* We create a dummy BFD, initially empty, to house whatever symbols
1233 the plugin may want to add. */
1234 abfd = plugin_get_ir_dummy_bfd (bfd_get_filename (ibfd), ibfd);
1236 input = bfd_alloc (abfd, sizeof (*input));
1237 if (input == NULL)
1238 einfo (_("%F%P: plugin failed to allocate memory for input: %s\n"),
1239 bfd_get_error ());
1241 if (!bfd_plugin_open_input (ibfd, &file))
1242 return NULL;
1244 if (file.name == bfd_get_filename (ibfd))
1246 /* We must copy filename attached to ibfd if it is not an archive
1247 member since it may be freed by bfd_close below. */
1248 file.name = plugin_strdup (abfd, file.name);
1251 file.handle = input;
1252 input->abfd = abfd;
1253 input->ibfd = ibfd->my_archive != NULL ? ibfd : NULL;
1254 input->view_buffer.addr = NULL;
1255 input->view_buffer.filesize = 0;
1256 input->view_buffer.offset = 0;
1257 input->fd = file.fd;
1258 input->use_mmap = false;
1259 input->offset = file.offset;
1260 input->filesize = file.filesize;
1261 input->name = plugin_strdup (abfd, bfd_get_filename (ibfd));
1263 claimed = 0;
1265 if (plugin_call_claim_file (&file, &claimed, known_used))
1266 einfo (_("%F%P: %s: plugin reported error claiming file\n"),
1267 plugin_error_plugin ());
1269 if (input->fd != -1
1270 && (!claimed || !bfd_plugin_target_p (ibfd->xvec)))
1272 /* FIXME: fd belongs to us, not the plugin. GCC plugin, which
1273 doesn't need fd after plugin_call_claim_file, doesn't use
1274 BFD plugin target vector. Since GCC plugin doesn't call
1275 release_input_file, we close it here. LLVM plugin, which
1276 needs fd after plugin_call_claim_file and calls
1277 release_input_file after it is done, uses BFD plugin target
1278 vector. This scheme doesn't work when a plugin needs fd and
1279 doesn't use BFD plugin target vector neither. */
1280 release_plugin_file_descriptor (input);
1283 if (claimed)
1285 ibfd->plugin_format = bfd_plugin_yes;
1286 ibfd->plugin_dummy_bfd = abfd;
1287 bfd_make_readable (abfd);
1288 abfd->no_export = ibfd->no_export;
1289 return plugin_cleanup;
1291 else
1293 #if HAVE_MMAP
1294 if (input->use_mmap)
1296 /* If plugin didn't claim the file, unmap the buffer. */
1297 char *addr = input->view_buffer.addr;
1298 off_t size = input->view_buffer.filesize;
1299 # if HAVE_GETPAGESIZE
1300 off_t bias = input->view_buffer.offset % plugin_pagesize;
1301 size += bias;
1302 addr -= bias;
1303 # endif
1304 munmap (addr, size);
1306 #endif
1308 /* If plugin didn't claim the file, we don't need the dummy bfd.
1309 Can't avoid speculatively creating it, alas. */
1310 ibfd->plugin_format = bfd_plugin_no;
1311 bfd_close_all_done (abfd);
1312 return NULL;
1316 void
1317 plugin_maybe_claim (lang_input_statement_type *entry)
1319 ASSERT (entry->header.type == lang_input_statement_enum);
1320 if (plugin_object_p (entry->the_bfd, true))
1322 bfd *abfd = entry->the_bfd->plugin_dummy_bfd;
1324 /* Discard the real file's BFD and substitute the dummy one. */
1326 /* We can't call bfd_close on archives. BFD archive handling
1327 caches elements, and add_archive_element keeps pointers to
1328 the_bfd and the_bfd->filename in a lang_input_statement_type
1329 linker script statement. */
1330 if (entry->the_bfd->my_archive == NULL)
1331 bfd_close (entry->the_bfd);
1332 entry->the_bfd = abfd;
1333 entry->flags.claimed = 1;
1337 /* Call 'all symbols read' hook for all plugins. */
1339 plugin_call_all_symbols_read (void)
1341 plugin_t *curplug = plugins_list;
1343 /* Disable any further file-claiming. */
1344 no_more_claiming = true;
1346 while (curplug)
1348 if (curplug->all_symbols_read_handler)
1350 enum ld_plugin_status rv;
1351 called_plugin = curplug;
1352 rv = (*curplug->all_symbols_read_handler) ();
1353 called_plugin = NULL;
1354 if (rv != LDPS_OK)
1355 set_plugin_error (curplug->name);
1357 curplug = curplug->next;
1359 return plugin_error_p () ? -1 : 0;
1362 /* Call 'cleanup' hook for all plugins at exit. */
1363 void
1364 plugin_call_cleanup (void)
1366 plugin_t *curplug = plugins_list;
1367 while (curplug)
1369 if (curplug->cleanup_handler && !curplug->cleanup_done)
1371 if (!config.plugin_save_temps)
1373 enum ld_plugin_status rv;
1374 curplug->cleanup_done = true;
1375 called_plugin = curplug;
1376 rv = (*curplug->cleanup_handler) ();
1377 called_plugin = NULL;
1378 if (rv != LDPS_OK)
1379 info_msg (_("%P: %s: error in plugin cleanup: %d (ignored)\n"),
1380 curplug->name, rv);
1382 dlclose (curplug->dlhandle);
1384 curplug = curplug->next;
1388 /* To determine which symbols should be resolved LDPR_PREVAILING_DEF
1389 and which LDPR_PREVAILING_DEF_IRONLY, we notice all the symbols as
1390 the linker adds them to the linker hash table. Mark those
1391 referenced from a non-IR file with non_ir_ref_regular or
1392 non_ir_ref_dynamic as appropriate. We have to notice_all symbols,
1393 because we won't necessarily know until later which ones will be
1394 contributed by IR files. */
1395 static bool
1396 plugin_notice (struct bfd_link_info *info,
1397 struct bfd_link_hash_entry *h,
1398 struct bfd_link_hash_entry *inh,
1399 bfd *abfd,
1400 asection *section,
1401 bfd_vma value,
1402 flagword flags)
1404 struct bfd_link_hash_entry *orig_h = h;
1406 if (h != NULL)
1408 bfd *sym_bfd;
1409 bool ref = false;
1411 if (h->type == bfd_link_hash_warning)
1412 h = h->u.i.link;
1414 /* Nothing to do here if this def/ref is from an IR dummy BFD. */
1415 if (is_ir_dummy_bfd (abfd))
1418 /* Making an indirect symbol counts as a reference unless this
1419 is a brand new symbol. */
1420 else if (bfd_is_ind_section (section)
1421 || (flags & BSF_INDIRECT) != 0)
1423 /* ??? Some of this is questionable. See comments in
1424 _bfd_generic_link_add_one_symbol for case IND. */
1425 if (h->type != bfd_link_hash_new
1426 || inh->type == bfd_link_hash_new)
1428 if ((abfd->flags & DYNAMIC) == 0)
1429 inh->non_ir_ref_regular = true;
1430 else
1431 inh->non_ir_ref_dynamic = true;
1434 if (h->type != bfd_link_hash_new)
1435 ref = true;
1438 /* Nothing to do here for warning symbols. */
1439 else if ((flags & BSF_WARNING) != 0)
1442 /* Nothing to do here for constructor symbols. */
1443 else if ((flags & BSF_CONSTRUCTOR) != 0)
1446 /* If this is a ref, set non_ir_ref. */
1447 else if (bfd_is_und_section (section))
1449 /* Replace the undefined dummy bfd with the real one. */
1450 if ((h->type == bfd_link_hash_undefined
1451 || h->type == bfd_link_hash_undefweak)
1452 && (h->u.undef.abfd == NULL
1453 || (h->u.undef.abfd->flags & BFD_PLUGIN) != 0))
1454 h->u.undef.abfd = abfd;
1455 ref = true;
1459 /* A common symbol should be merged with other commons or
1460 defs with the same name. In particular, a common ought
1461 to be overridden by a def in a -flto object. In that
1462 sense a common is also a ref. */
1463 else if (bfd_is_com_section (section))
1465 if (h->type == bfd_link_hash_common
1466 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))
1468 h->type = bfd_link_hash_undefweak;
1469 h->u.undef.abfd = sym_bfd;
1471 ref = true;
1474 /* Otherwise, it must be a new def.
1475 Ensure any symbol defined in an IR dummy BFD takes on a
1476 new value from a real BFD. Weak symbols are not normally
1477 overridden by a new weak definition, and strong symbols
1478 will normally cause multiple definition errors. Avoid
1479 this by making the symbol appear to be undefined.
1481 NB: We change the previous definition in the IR object to
1482 undefweak only after all LTO symbols have been read or for
1483 non-ELF targets. */
1484 else if ((info->lto_all_symbols_read
1485 || bfd_get_flavour (abfd) != bfd_target_elf_flavour)
1486 && (((h->type == bfd_link_hash_defweak
1487 || h->type == bfd_link_hash_defined)
1488 && is_ir_dummy_bfd (sym_bfd = h->u.def.section->owner))
1489 || (h->type == bfd_link_hash_common
1490 && is_ir_dummy_bfd (sym_bfd = h->u.c.p->section->owner))))
1492 h->type = bfd_link_hash_undefweak;
1493 h->u.undef.abfd = sym_bfd;
1496 if (ref)
1498 if ((abfd->flags & DYNAMIC) == 0)
1499 h->non_ir_ref_regular = true;
1500 else
1501 h->non_ir_ref_dynamic = true;
1505 /* Continue with cref/nocrossref/trace-sym processing. */
1506 if (orig_h == NULL
1507 || orig_notice_all
1508 || (info->notice_hash != NULL
1509 && bfd_hash_lookup (info->notice_hash, orig_h->root.string,
1510 false, false) != NULL))
1511 return (*orig_callbacks->notice) (info, orig_h, inh,
1512 abfd, section, value, flags);
1513 return true;
1515 #endif /* BFD_SUPPORTS_PLUGINS */