*** empty log message ***
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b 2
6aba47ca 3 Copyright (C) 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
7b6bb8da 4 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
9b254dd1 5 Free Software Foundation, Inc.
1bac305b 6
c906108c
SS
7 Written by Fred Fish at Cygnus Support.
8
c5aa993b 9 This file is part of GDB.
c906108c 10
c5aa993b
JM
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
a9762ec7 13 the Free Software Foundation; either version 3 of the License, or
c5aa993b 14 (at your option) any later version.
c906108c 15
c5aa993b
JM
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
c906108c 20
c5aa993b 21 You should have received a copy of the GNU General Public License
a9762ec7 22 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
23
24#include "defs.h"
25#include "bfd.h"
26#include "gdb_string.h"
27#include "elf-bfd.h"
31d99776
DJ
28#include "elf/common.h"
29#include "elf/internal.h"
c906108c
SS
30#include "elf/mips.h"
31#include "symtab.h"
32#include "symfile.h"
33#include "objfiles.h"
34#include "buildsym.h"
35#include "stabsread.h"
36#include "gdb-stabs.h"
37#include "complaints.h"
38#include "demangle.h"
ccefe4c4 39#include "psympriv.h"
0ba1096a 40#include "filenames.h"
c906108c 41
a14ed312 42extern void _initialize_elfread (void);
392a587b 43
b11896a5 44/* Forward declarations. */
00b5771c 45static const struct sym_fns elf_sym_fns_gdb_index;
b11896a5 46static const struct sym_fns elf_sym_fns_lazy_psyms;
9291a0cd 47
c906108c 48/* The struct elfinfo is available only during ELF symbol table and
6426a772 49 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
50 It's local to elf_symfile_read. */
51
c5aa993b
JM
52struct elfinfo
53 {
c5aa993b
JM
54 asection *stabsect; /* Section pointer for .stab section */
55 asection *stabindexsect; /* Section pointer for .stab.index section */
56 asection *mdebugsect; /* Section pointer for .mdebug section */
57 };
c906108c 58
12b9c64f 59static void free_elfinfo (void *);
c906108c 60
31d99776
DJ
61/* Locate the segments in ABFD. */
62
63static struct symfile_segment_data *
64elf_symfile_segments (bfd *abfd)
65{
66 Elf_Internal_Phdr *phdrs, **segments;
67 long phdrs_size;
68 int num_phdrs, num_segments, num_sections, i;
69 asection *sect;
70 struct symfile_segment_data *data;
71
72 phdrs_size = bfd_get_elf_phdr_upper_bound (abfd);
73 if (phdrs_size == -1)
74 return NULL;
75
76 phdrs = alloca (phdrs_size);
77 num_phdrs = bfd_get_elf_phdrs (abfd, phdrs);
78 if (num_phdrs == -1)
79 return NULL;
80
81 num_segments = 0;
82 segments = alloca (sizeof (Elf_Internal_Phdr *) * num_phdrs);
83 for (i = 0; i < num_phdrs; i++)
84 if (phdrs[i].p_type == PT_LOAD)
85 segments[num_segments++] = &phdrs[i];
86
87 if (num_segments == 0)
88 return NULL;
89
90 data = XZALLOC (struct symfile_segment_data);
91 data->num_segments = num_segments;
92 data->segment_bases = XCALLOC (num_segments, CORE_ADDR);
93 data->segment_sizes = XCALLOC (num_segments, CORE_ADDR);
94
95 for (i = 0; i < num_segments; i++)
96 {
97 data->segment_bases[i] = segments[i]->p_vaddr;
98 data->segment_sizes[i] = segments[i]->p_memsz;
99 }
100
101 num_sections = bfd_count_sections (abfd);
102 data->segment_info = XCALLOC (num_sections, int);
103
104 for (i = 0, sect = abfd->sections; sect != NULL; i++, sect = sect->next)
105 {
106 int j;
107 CORE_ADDR vma;
108
109 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
110 continue;
111
112 vma = bfd_get_section_vma (abfd, sect);
113
114 for (j = 0; j < num_segments; j++)
115 if (segments[j]->p_memsz > 0
116 && vma >= segments[j]->p_vaddr
a366c65a 117 && (vma - segments[j]->p_vaddr) < segments[j]->p_memsz)
31d99776
DJ
118 {
119 data->segment_info[i] = j + 1;
120 break;
121 }
122
ad09a548
DJ
123 /* We should have found a segment for every non-empty section.
124 If we haven't, we will not relocate this section by any
125 offsets we apply to the segments. As an exception, do not
126 warn about SHT_NOBITS sections; in normal ELF execution
127 environments, SHT_NOBITS means zero-initialized and belongs
128 in a segment, but in no-OS environments some tools (e.g. ARM
129 RealView) use SHT_NOBITS for uninitialized data. Since it is
130 uninitialized, it doesn't need a program header. Such
131 binaries are not relocatable. */
132 if (bfd_get_section_size (sect) > 0 && j == num_segments
133 && (bfd_get_section_flags (abfd, sect) & SEC_LOAD) != 0)
31d99776
DJ
134 warning (_("Loadable segment \"%s\" outside of ELF segments"),
135 bfd_section_name (abfd, sect));
136 }
137
138 return data;
139}
140
c906108c
SS
141/* We are called once per section from elf_symfile_read. We
142 need to examine each section we are passed, check to see
143 if it is something we are interested in processing, and
144 if so, stash away some access information for the section.
145
146 For now we recognize the dwarf debug information sections and
147 line number sections from matching their section names. The
148 ELF definition is no real help here since it has no direct
149 knowledge of DWARF (by design, so any debugging format can be
150 used).
151
152 We also recognize the ".stab" sections used by the Sun compilers
153 released with Solaris 2.
154
155 FIXME: The section names should not be hardwired strings (what
156 should they be? I don't think most object file formats have enough
0963b4bd 157 section flags to specify what kind of debug section it is.
c906108c
SS
158 -kingdon). */
159
160static void
12b9c64f 161elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 162{
52f0bd74 163 struct elfinfo *ei;
c906108c
SS
164
165 ei = (struct elfinfo *) eip;
7ce59000 166 if (strcmp (sectp->name, ".stab") == 0)
c906108c 167 {
c5aa993b 168 ei->stabsect = sectp;
c906108c 169 }
6314a349 170 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 171 {
c5aa993b 172 ei->stabindexsect = sectp;
c906108c 173 }
6314a349 174 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 175 {
c5aa993b 176 ei->mdebugsect = sectp;
c906108c
SS
177 }
178}
179
c906108c 180static struct minimal_symbol *
04a679b8
TT
181record_minimal_symbol (const char *name, int name_len, int copy_name,
182 CORE_ADDR address,
f594e5e9
MC
183 enum minimal_symbol_type ms_type,
184 asection *bfd_section, struct objfile *objfile)
c906108c 185{
5e2b427d
UW
186 struct gdbarch *gdbarch = get_objfile_arch (objfile);
187
bbeae047 188 if (ms_type == mst_text || ms_type == mst_file_text)
5e2b427d 189 address = gdbarch_smash_text_address (gdbarch, address);
c906108c 190
04a679b8
TT
191 return prim_record_minimal_symbol_full (name, name_len, copy_name, address,
192 ms_type, bfd_section->index,
193 bfd_section, objfile);
c906108c
SS
194}
195
196/*
197
c5aa993b 198 LOCAL FUNCTION
c906108c 199
c5aa993b 200 elf_symtab_read -- read the symbol table of an ELF file
c906108c 201
c5aa993b 202 SYNOPSIS
c906108c 203
6f610d07 204 void elf_symtab_read (struct objfile *objfile, int type,
62553543 205 long number_of_symbols, asymbol **symbol_table)
c906108c 206
c5aa993b 207 DESCRIPTION
c906108c 208
62553543 209 Given an objfile, a symbol table, and a flag indicating whether the
6f610d07
UW
210 symbol table contains regular, dynamic, or synthetic symbols, add all
211 the global function and data symbols to the minimal symbol table.
c906108c 212
c5aa993b
JM
213 In stabs-in-ELF, as implemented by Sun, there are some local symbols
214 defined in the ELF symbol table, which can be used to locate
215 the beginnings of sections from each ".o" file that was linked to
216 form the executable objfile. We gather any such info and record it
217 in data structures hung off the objfile's private data.
c906108c 218
c5aa993b 219 */
c906108c 220
6f610d07
UW
221#define ST_REGULAR 0
222#define ST_DYNAMIC 1
223#define ST_SYNTHETIC 2
224
c906108c 225static void
6f610d07 226elf_symtab_read (struct objfile *objfile, int type,
04a679b8
TT
227 long number_of_symbols, asymbol **symbol_table,
228 int copy_names)
c906108c 229{
5e2b427d 230 struct gdbarch *gdbarch = get_objfile_arch (objfile);
c906108c 231 asymbol *sym;
c906108c 232 long i;
c906108c 233 CORE_ADDR symaddr;
d4f3574e 234 CORE_ADDR offset;
c906108c
SS
235 enum minimal_symbol_type ms_type;
236 /* If sectinfo is nonNULL, it contains section info that should end up
237 filed in the objfile. */
238 struct stab_section_info *sectinfo = NULL;
239 /* If filesym is nonzero, it points to a file symbol, but we haven't
240 seen any section info for it yet. */
241 asymbol *filesym = 0;
1c9e8358
TT
242 /* Name of filesym. This is either a constant string or is saved on
243 the objfile's obstack. */
244 char *filesymname = "";
0a6ddd08 245 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
d4f3574e 246 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
69feea6f 247 struct cleanup *back_to = make_cleanup (null_cleanup, NULL);
c5aa993b 248
0cc7b392 249 for (i = 0; i < number_of_symbols; i++)
c906108c 250 {
0cc7b392
DJ
251 sym = symbol_table[i];
252 if (sym->name == NULL || *sym->name == '\0')
c906108c 253 {
0cc7b392 254 /* Skip names that don't exist (shouldn't happen), or names
0963b4bd 255 that are null strings (may happen). */
0cc7b392
DJ
256 continue;
257 }
c906108c 258
74763737
DJ
259 /* Skip "special" symbols, e.g. ARM mapping symbols. These are
260 symbols which do not correspond to objects in the symbol table,
261 but have some other target-specific meaning. */
262 if (bfd_is_target_special_symbol (objfile->obfd, sym))
60c5725c
DJ
263 {
264 if (gdbarch_record_special_symbol_p (gdbarch))
265 gdbarch_record_special_symbol (gdbarch, objfile, sym);
266 continue;
267 }
74763737 268
0cc7b392 269 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
6f610d07 270 if (type == ST_DYNAMIC
0cc7b392
DJ
271 && sym->section == &bfd_und_section
272 && (sym->flags & BSF_FUNCTION))
273 {
274 struct minimal_symbol *msym;
02c75f72
UW
275 bfd *abfd = objfile->obfd;
276 asection *sect;
0cc7b392
DJ
277
278 /* Symbol is a reference to a function defined in
279 a shared library.
280 If its value is non zero then it is usually the address
281 of the corresponding entry in the procedure linkage table,
282 plus the desired section offset.
283 If its value is zero then the dynamic linker has to resolve
0963b4bd 284 the symbol. We are unable to find any meaningful address
0cc7b392
DJ
285 for this symbol in the executable file, so we skip it. */
286 symaddr = sym->value;
287 if (symaddr == 0)
288 continue;
02c75f72
UW
289
290 /* sym->section is the undefined section. However, we want to
291 record the section where the PLT stub resides with the
292 minimal symbol. Search the section table for the one that
293 covers the stub's address. */
294 for (sect = abfd->sections; sect != NULL; sect = sect->next)
295 {
296 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
297 continue;
298
299 if (symaddr >= bfd_get_section_vma (abfd, sect)
300 && symaddr < bfd_get_section_vma (abfd, sect)
301 + bfd_get_section_size (sect))
302 break;
303 }
304 if (!sect)
305 continue;
306
307 symaddr += ANOFFSET (objfile->section_offsets, sect->index);
308
0cc7b392 309 msym = record_minimal_symbol
04a679b8
TT
310 (sym->name, strlen (sym->name), copy_names,
311 symaddr, mst_solib_trampoline, sect, objfile);
0cc7b392
DJ
312 if (msym != NULL)
313 msym->filename = filesymname;
0cc7b392
DJ
314 continue;
315 }
c906108c 316
0cc7b392
DJ
317 /* If it is a nonstripped executable, do not enter dynamic
318 symbols, as the dynamic symbol table is usually a subset
319 of the main symbol table. */
6f610d07 320 if (type == ST_DYNAMIC && !stripped)
0cc7b392
DJ
321 continue;
322 if (sym->flags & BSF_FILE)
323 {
324 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
325 Chain any old one onto the objfile; remember new sym. */
326 if (sectinfo != NULL)
c906108c 327 {
0cc7b392
DJ
328 sectinfo->next = dbx->stab_section_info;
329 dbx->stab_section_info = sectinfo;
330 sectinfo = NULL;
331 }
332 filesym = sym;
0cc7b392
DJ
333 filesymname =
334 obsavestring ((char *) filesym->name, strlen (filesym->name),
335 &objfile->objfile_obstack);
0cc7b392
DJ
336 }
337 else if (sym->flags & BSF_SECTION_SYM)
338 continue;
339 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
340 {
341 struct minimal_symbol *msym;
342
343 /* Select global/local/weak symbols. Note that bfd puts abs
344 symbols in their own section, so all symbols we are
0963b4bd
MS
345 interested in will have a section. */
346 /* Bfd symbols are section relative. */
0cc7b392 347 symaddr = sym->value + sym->section->vma;
45148c2e
UW
348 /* Relocate all non-absolute and non-TLS symbols by the
349 section offset. */
350 if (sym->section != &bfd_abs_section
351 && !(sym->section->flags & SEC_THREAD_LOCAL))
0cc7b392
DJ
352 {
353 symaddr += offset;
c906108c 354 }
0cc7b392
DJ
355 /* For non-absolute symbols, use the type of the section
356 they are relative to, to intuit text/data. Bfd provides
0963b4bd 357 no way of figuring this out for absolute symbols. */
0cc7b392 358 if (sym->section == &bfd_abs_section)
c906108c 359 {
0cc7b392
DJ
360 /* This is a hack to get the minimal symbol type
361 right for Irix 5, which has absolute addresses
6f610d07
UW
362 with special section indices for dynamic symbols.
363
364 NOTE: uweigand-20071112: Synthetic symbols do not
365 have an ELF-private part, so do not touch those. */
4fbb74a6 366 unsigned int shndx = type == ST_SYNTHETIC ? 0 :
0cc7b392
DJ
367 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
368
369 switch (shndx)
c906108c 370 {
0cc7b392
DJ
371 case SHN_MIPS_TEXT:
372 ms_type = mst_text;
373 break;
374 case SHN_MIPS_DATA:
375 ms_type = mst_data;
376 break;
377 case SHN_MIPS_ACOMMON:
378 ms_type = mst_bss;
379 break;
380 default:
381 ms_type = mst_abs;
382 }
383
384 /* If it is an Irix dynamic symbol, skip section name
0963b4bd 385 symbols, relocate all others by section offset. */
0cc7b392
DJ
386 if (ms_type != mst_abs)
387 {
388 if (sym->name[0] == '.')
389 continue;
d4f3574e 390 symaddr += offset;
c906108c 391 }
0cc7b392
DJ
392 }
393 else if (sym->section->flags & SEC_CODE)
394 {
08232497 395 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 396 {
0cc7b392
DJ
397 ms_type = mst_text;
398 }
399 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
400 || ((sym->flags & BSF_LOCAL)
401 && sym->name[0] == '$'
402 && sym->name[1] == 'L'))
403 /* Looks like a compiler-generated label. Skip
404 it. The assembler should be skipping these (to
405 keep executables small), but apparently with
406 gcc on the (deleted) delta m88k SVR4, it loses.
407 So to have us check too should be harmless (but
408 I encourage people to fix this in the assembler
409 instead of adding checks here). */
410 continue;
411 else
412 {
413 ms_type = mst_file_text;
c906108c 414 }
0cc7b392
DJ
415 }
416 else if (sym->section->flags & SEC_ALLOC)
417 {
418 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 419 {
0cc7b392 420 if (sym->section->flags & SEC_LOAD)
c906108c 421 {
0cc7b392 422 ms_type = mst_data;
c906108c 423 }
c906108c
SS
424 else
425 {
0cc7b392 426 ms_type = mst_bss;
c906108c
SS
427 }
428 }
0cc7b392 429 else if (sym->flags & BSF_LOCAL)
c906108c 430 {
0cc7b392
DJ
431 /* Named Local variable in a Data section.
432 Check its name for stabs-in-elf. */
433 int special_local_sect;
d7f9d729 434
0cc7b392
DJ
435 if (strcmp ("Bbss.bss", sym->name) == 0)
436 special_local_sect = SECT_OFF_BSS (objfile);
437 else if (strcmp ("Ddata.data", sym->name) == 0)
438 special_local_sect = SECT_OFF_DATA (objfile);
439 else if (strcmp ("Drodata.rodata", sym->name) == 0)
440 special_local_sect = SECT_OFF_RODATA (objfile);
441 else
442 special_local_sect = -1;
443 if (special_local_sect >= 0)
c906108c 444 {
0cc7b392
DJ
445 /* Found a special local symbol. Allocate a
446 sectinfo, if needed, and fill it in. */
447 if (sectinfo == NULL)
c906108c 448 {
0cc7b392
DJ
449 int max_index;
450 size_t size;
451
25c2f6ab
PP
452 max_index = SECT_OFF_BSS (objfile);
453 if (objfile->sect_index_data > max_index)
454 max_index = objfile->sect_index_data;
455 if (objfile->sect_index_rodata > max_index)
456 max_index = objfile->sect_index_rodata;
0cc7b392
DJ
457
458 /* max_index is the largest index we'll
459 use into this array, so we must
460 allocate max_index+1 elements for it.
461 However, 'struct stab_section_info'
462 already includes one element, so we
463 need to allocate max_index aadditional
464 elements. */
465 size = (sizeof (struct stab_section_info)
c05d19c5 466 + (sizeof (CORE_ADDR) * max_index));
0cc7b392
DJ
467 sectinfo = (struct stab_section_info *)
468 xmalloc (size);
69feea6f 469 make_cleanup (xfree, sectinfo);
0cc7b392
DJ
470 memset (sectinfo, 0, size);
471 sectinfo->num_sections = max_index;
472 if (filesym == NULL)
c906108c 473 {
0cc7b392 474 complaint (&symfile_complaints,
3e43a32a
MS
475 _("elf/stab section information %s "
476 "without a preceding file symbol"),
0cc7b392
DJ
477 sym->name);
478 }
479 else
480 {
481 sectinfo->filename =
482 (char *) filesym->name;
c906108c 483 }
c906108c 484 }
0cc7b392
DJ
485 if (sectinfo->sections[special_local_sect] != 0)
486 complaint (&symfile_complaints,
3e43a32a
MS
487 _("duplicated elf/stab section "
488 "information for %s"),
0cc7b392
DJ
489 sectinfo->filename);
490 /* BFD symbols are section relative. */
491 symaddr = sym->value + sym->section->vma;
492 /* Relocate non-absolute symbols by the
493 section offset. */
494 if (sym->section != &bfd_abs_section)
495 symaddr += offset;
496 sectinfo->sections[special_local_sect] = symaddr;
497 /* The special local symbols don't go in the
498 minimal symbol table, so ignore this one. */
499 continue;
500 }
501 /* Not a special stabs-in-elf symbol, do regular
502 symbol processing. */
503 if (sym->section->flags & SEC_LOAD)
504 {
505 ms_type = mst_file_data;
c906108c
SS
506 }
507 else
508 {
0cc7b392 509 ms_type = mst_file_bss;
c906108c
SS
510 }
511 }
512 else
513 {
0cc7b392 514 ms_type = mst_unknown;
c906108c 515 }
0cc7b392
DJ
516 }
517 else
518 {
519 /* FIXME: Solaris2 shared libraries include lots of
520 odd "absolute" and "undefined" symbols, that play
521 hob with actions like finding what function the PC
522 is in. Ignore them if they aren't text, data, or bss. */
523 /* ms_type = mst_unknown; */
0963b4bd 524 continue; /* Skip this symbol. */
0cc7b392
DJ
525 }
526 msym = record_minimal_symbol
04a679b8 527 (sym->name, strlen (sym->name), copy_names, symaddr,
0cc7b392 528 ms_type, sym->section, objfile);
6f610d07 529
0cc7b392
DJ
530 if (msym)
531 {
532 /* Pass symbol size field in via BFD. FIXME!!! */
6f610d07
UW
533 elf_symbol_type *elf_sym;
534
535 /* NOTE: uweigand-20071112: A synthetic symbol does not have an
536 ELF-private part. However, in some cases (e.g. synthetic
537 'dot' symbols on ppc64) the udata.p entry is set to point back
538 to the original ELF symbol it was derived from. Get the size
539 from that symbol. */
540 if (type != ST_SYNTHETIC)
541 elf_sym = (elf_symbol_type *) sym;
542 else
543 elf_sym = (elf_symbol_type *) sym->udata.p;
544
545 if (elf_sym)
546 MSYMBOL_SIZE(msym) = elf_sym->internal_elf_sym.st_size;
a103a963
DJ
547
548 msym->filename = filesymname;
549 gdbarch_elf_make_msymbol_special (gdbarch, sym, msym);
0cc7b392 550 }
2eaf8d2a
DJ
551
552 /* For @plt symbols, also record a trampoline to the
553 destination symbol. The @plt symbol will be used in
554 disassembly, and the trampoline will be used when we are
555 trying to find the target. */
556 if (msym && ms_type == mst_text && type == ST_SYNTHETIC)
557 {
558 int len = strlen (sym->name);
559
560 if (len > 4 && strcmp (sym->name + len - 4, "@plt") == 0)
561 {
2eaf8d2a
DJ
562 struct minimal_symbol *mtramp;
563
04a679b8
TT
564 mtramp = record_minimal_symbol (sym->name, len - 4, 1,
565 symaddr,
2eaf8d2a
DJ
566 mst_solib_trampoline,
567 sym->section, objfile);
568 if (mtramp)
569 {
570 MSYMBOL_SIZE (mtramp) = MSYMBOL_SIZE (msym);
571 mtramp->filename = filesymname;
572 gdbarch_elf_make_msymbol_special (gdbarch, sym, mtramp);
573 }
574 }
575 }
c906108c 576 }
c906108c 577 }
69feea6f 578 do_cleanups (back_to);
c906108c
SS
579}
580
874f5765
TG
581struct build_id
582 {
583 size_t size;
584 gdb_byte data[1];
585 };
586
587/* Locate NT_GNU_BUILD_ID from ABFD and return its content. */
588
589static struct build_id *
590build_id_bfd_get (bfd *abfd)
591{
592 struct build_id *retval;
593
594 if (!bfd_check_format (abfd, bfd_object)
595 || bfd_get_flavour (abfd) != bfd_target_elf_flavour
596 || elf_tdata (abfd)->build_id == NULL)
597 return NULL;
598
599 retval = xmalloc (sizeof *retval - 1 + elf_tdata (abfd)->build_id_size);
600 retval->size = elf_tdata (abfd)->build_id_size;
601 memcpy (retval->data, elf_tdata (abfd)->build_id, retval->size);
602
603 return retval;
604}
605
606/* Return if FILENAME has NT_GNU_BUILD_ID matching the CHECK value. */
607
608static int
609build_id_verify (const char *filename, struct build_id *check)
610{
611 bfd *abfd;
612 struct build_id *found = NULL;
613 int retval = 0;
614
615 /* We expect to be silent on the non-existing files. */
616 abfd = bfd_open_maybe_remote (filename);
617 if (abfd == NULL)
618 return 0;
619
620 found = build_id_bfd_get (abfd);
621
622 if (found == NULL)
623 warning (_("File \"%s\" has no build-id, file skipped"), filename);
624 else if (found->size != check->size
625 || memcmp (found->data, check->data, found->size) != 0)
3e43a32a
MS
626 warning (_("File \"%s\" has a different build-id, file skipped"),
627 filename);
874f5765
TG
628 else
629 retval = 1;
630
516ba659 631 gdb_bfd_close_or_warn (abfd);
874f5765
TG
632
633 xfree (found);
634
635 return retval;
636}
637
638static char *
639build_id_to_debug_filename (struct build_id *build_id)
640{
641 char *link, *debugdir, *retval = NULL;
642
643 /* DEBUG_FILE_DIRECTORY/.build-id/ab/cdef */
644 link = alloca (strlen (debug_file_directory) + (sizeof "/.build-id/" - 1) + 1
645 + 2 * build_id->size + (sizeof ".debug" - 1) + 1);
646
647 /* Keep backward compatibility so that DEBUG_FILE_DIRECTORY being "" will
648 cause "/.build-id/..." lookups. */
649
650 debugdir = debug_file_directory;
651 do
652 {
653 char *s, *debugdir_end;
654 gdb_byte *data = build_id->data;
655 size_t size = build_id->size;
656
657 while (*debugdir == DIRNAME_SEPARATOR)
658 debugdir++;
659
660 debugdir_end = strchr (debugdir, DIRNAME_SEPARATOR);
661 if (debugdir_end == NULL)
662 debugdir_end = &debugdir[strlen (debugdir)];
663
664 memcpy (link, debugdir, debugdir_end - debugdir);
665 s = &link[debugdir_end - debugdir];
666 s += sprintf (s, "/.build-id/");
667 if (size > 0)
668 {
669 size--;
670 s += sprintf (s, "%02x", (unsigned) *data++);
671 }
672 if (size > 0)
673 *s++ = '/';
674 while (size-- > 0)
675 s += sprintf (s, "%02x", (unsigned) *data++);
676 strcpy (s, ".debug");
677
678 /* lrealpath() is expensive even for the usually non-existent files. */
679 if (access (link, F_OK) == 0)
680 retval = lrealpath (link);
681
682 if (retval != NULL && !build_id_verify (retval, build_id))
683 {
684 xfree (retval);
685 retval = NULL;
686 }
687
688 if (retval != NULL)
689 break;
690
691 debugdir = debugdir_end;
692 }
693 while (*debugdir != 0);
694
695 return retval;
696}
697
698static char *
699find_separate_debug_file_by_buildid (struct objfile *objfile)
700{
874f5765
TG
701 struct build_id *build_id;
702
703 build_id = build_id_bfd_get (objfile->obfd);
704 if (build_id != NULL)
705 {
706 char *build_id_name;
707
708 build_id_name = build_id_to_debug_filename (build_id);
709 xfree (build_id);
710 /* Prevent looping on a stripped .debug file. */
0ba1096a
KT
711 if (build_id_name != NULL
712 && filename_cmp (build_id_name, objfile->name) == 0)
874f5765
TG
713 {
714 warning (_("\"%s\": separate debug info file has no debug info"),
715 build_id_name);
716 xfree (build_id_name);
717 }
718 else if (build_id_name != NULL)
719 return build_id_name;
720 }
721 return NULL;
722}
723
c906108c
SS
724/* Scan and build partial symbols for a symbol file.
725 We have been initialized by a call to elf_symfile_init, which
726 currently does nothing.
727
728 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
729 in each section. We simplify it down to a single offset for all
730 symbols. FIXME.
731
c906108c
SS
732 This function only does the minimum work necessary for letting the
733 user "name" things symbolically; it does not read the entire symtab.
734 Instead, it reads the external and static symbols and puts them in partial
735 symbol tables. When more extensive information is requested of a
736 file, the corresponding partial symbol table is mutated into a full
737 fledged symbol table by going back and reading the symbols
738 for real.
739
740 We look for sections with specific names, to tell us what debug
741 format to look for: FIXME!!!
742
c906108c
SS
743 elfstab_build_psymtabs() handles STABS symbols;
744 mdebug_build_psymtabs() handles ECOFF debugging information.
745
746 Note that ELF files have a "minimal" symbol table, which looks a lot
747 like a COFF symbol table, but has only the minimal information necessary
748 for linking. We process this also, and use the information to
749 build gdb's minimal symbol table. This gives us some minimal debugging
750 capability even for files compiled without -g. */
751
752static void
f4352531 753elf_symfile_read (struct objfile *objfile, int symfile_flags)
c906108c
SS
754{
755 bfd *abfd = objfile->obfd;
756 struct elfinfo ei;
757 struct cleanup *back_to;
62553543
EZ
758 long symcount = 0, dynsymcount = 0, synthcount, storage_needed;
759 asymbol **symbol_table = NULL, **dyn_symbol_table = NULL;
760 asymbol *synthsyms;
c906108c
SS
761
762 init_minimal_symbol_collection ();
56e290f4 763 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
764
765 memset ((char *) &ei, 0, sizeof (ei));
766
0963b4bd 767 /* Allocate struct to keep track of the symfile. */
0a6ddd08 768 objfile->deprecated_sym_stab_info = (struct dbx_symfile_info *)
7936743b 769 xmalloc (sizeof (struct dbx_symfile_info));
3e43a32a
MS
770 memset ((char *) objfile->deprecated_sym_stab_info,
771 0, sizeof (struct dbx_symfile_info));
12b9c64f 772 make_cleanup (free_elfinfo, (void *) objfile);
c906108c 773
3e43a32a
MS
774 /* Process the normal ELF symbol table first. This may write some
775 chain of info into the dbx_symfile_info in
776 objfile->deprecated_sym_stab_info, which can later be used by
777 elfstab_offset_sections. */
c906108c 778
62553543
EZ
779 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
780 if (storage_needed < 0)
3e43a32a
MS
781 error (_("Can't read symbols from %s: %s"),
782 bfd_get_filename (objfile->obfd),
62553543
EZ
783 bfd_errmsg (bfd_get_error ()));
784
785 if (storage_needed > 0)
786 {
787 symbol_table = (asymbol **) xmalloc (storage_needed);
788 make_cleanup (xfree, symbol_table);
789 symcount = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
790
791 if (symcount < 0)
3e43a32a
MS
792 error (_("Can't read symbols from %s: %s"),
793 bfd_get_filename (objfile->obfd),
62553543
EZ
794 bfd_errmsg (bfd_get_error ()));
795
04a679b8 796 elf_symtab_read (objfile, ST_REGULAR, symcount, symbol_table, 0);
62553543 797 }
c906108c
SS
798
799 /* Add the dynamic symbols. */
800
62553543
EZ
801 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
802
803 if (storage_needed > 0)
804 {
3f1eff0a
JK
805 /* Memory gets permanently referenced from ABFD after
806 bfd_get_synthetic_symtab so it must not get freed before ABFD gets.
807 It happens only in the case when elf_slurp_reloc_table sees
808 asection->relocation NULL. Determining which section is asection is
809 done by _bfd_elf_get_synthetic_symtab which is all a bfd
810 implementation detail, though. */
811
812 dyn_symbol_table = bfd_alloc (abfd, storage_needed);
62553543
EZ
813 dynsymcount = bfd_canonicalize_dynamic_symtab (objfile->obfd,
814 dyn_symbol_table);
815
816 if (dynsymcount < 0)
3e43a32a
MS
817 error (_("Can't read symbols from %s: %s"),
818 bfd_get_filename (objfile->obfd),
62553543
EZ
819 bfd_errmsg (bfd_get_error ()));
820
04a679b8 821 elf_symtab_read (objfile, ST_DYNAMIC, dynsymcount, dyn_symbol_table, 0);
62553543
EZ
822 }
823
824 /* Add synthetic symbols - for instance, names for any PLT entries. */
825
826 synthcount = bfd_get_synthetic_symtab (abfd, symcount, symbol_table,
827 dynsymcount, dyn_symbol_table,
828 &synthsyms);
829 if (synthcount > 0)
830 {
831 asymbol **synth_symbol_table;
832 long i;
833
834 make_cleanup (xfree, synthsyms);
835 synth_symbol_table = xmalloc (sizeof (asymbol *) * synthcount);
836 for (i = 0; i < synthcount; i++)
9f20e3da 837 synth_symbol_table[i] = synthsyms + i;
62553543 838 make_cleanup (xfree, synth_symbol_table);
3e43a32a
MS
839 elf_symtab_read (objfile, ST_SYNTHETIC, synthcount,
840 synth_symbol_table, 1);
62553543 841 }
c906108c 842
7134143f
DJ
843 /* Install any minimal symbols that have been collected as the current
844 minimal symbols for this objfile. The debug readers below this point
845 should not generate new minimal symbols; if they do it's their
846 responsibility to install them. "mdebug" appears to be the only one
847 which will do this. */
848
849 install_minimal_symbols (objfile);
850 do_cleanups (back_to);
851
c906108c 852 /* Now process debugging information, which is contained in
0963b4bd 853 special ELF sections. */
c906108c 854
0963b4bd 855 /* We first have to find them... */
12b9c64f 856 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
857
858 /* ELF debugging information is inserted into the psymtab in the
859 order of least informative first - most informative last. Since
860 the psymtab table is searched `most recent insertion first' this
861 increases the probability that more detailed debug information
862 for a section is found.
863
864 For instance, an object file might contain both .mdebug (XCOFF)
865 and .debug_info (DWARF2) sections then .mdebug is inserted first
866 (searched last) and DWARF2 is inserted last (searched first). If
867 we don't do this then the XCOFF info is found first - for code in
0963b4bd 868 an included file XCOFF info is useless. */
c906108c
SS
869
870 if (ei.mdebugsect)
871 {
872 const struct ecoff_debug_swap *swap;
873
874 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 875 information. */
c906108c
SS
876 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
877 if (swap)
d4f3574e 878 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
879 }
880 if (ei.stabsect)
881 {
882 asection *str_sect;
883
884 /* Stab sections have an associated string table that looks like
c5aa993b 885 a separate section. */
c906108c
SS
886 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
887
888 /* FIXME should probably warn about a stab section without a stabstr. */
889 if (str_sect)
890 elfstab_build_psymtabs (objfile,
086df311 891 ei.stabsect,
c906108c
SS
892 str_sect->filepos,
893 bfd_section_size (abfd, str_sect));
894 }
9291a0cd 895
b11896a5
TT
896 if (dwarf2_has_info (objfile))
897 {
898 if (dwarf2_initialize_objfile (objfile))
899 objfile->sf = &elf_sym_fns_gdb_index;
900 else
901 {
902 /* It is ok to do this even if the stabs reader made some
903 partial symbols, because OBJF_PSYMTABS_READ has not been
904 set, and so our lazy reader function will still be called
905 when needed. */
906 objfile->sf = &elf_sym_fns_lazy_psyms;
907 }
908 }
3e43a32a
MS
909 /* If the file has its own symbol tables it has no separate debug
910 info. `.dynsym'/`.symtab' go to MSYMBOLS, `.debug_info' goes to
911 SYMTABS/PSYMTABS. `.gnu_debuglink' may no longer be present with
912 `.note.gnu.build-id'. */
b11896a5 913 else if (!objfile_has_partial_symbols (objfile))
9cce227f
TG
914 {
915 char *debugfile;
916
917 debugfile = find_separate_debug_file_by_buildid (objfile);
918
919 if (debugfile == NULL)
920 debugfile = find_separate_debug_file_by_debuglink (objfile);
921
922 if (debugfile)
923 {
924 bfd *abfd = symfile_bfd_open (debugfile);
d7f9d729 925
9cce227f
TG
926 symbol_file_add_separate (abfd, symfile_flags, objfile);
927 xfree (debugfile);
928 }
929 }
c906108c
SS
930}
931
b11896a5
TT
932/* Callback to lazily read psymtabs. */
933
934static void
935read_psyms (struct objfile *objfile)
936{
937 if (dwarf2_has_info (objfile))
938 dwarf2_build_psymtabs (objfile);
939}
940
0a6ddd08
AC
941/* This cleans up the objfile's deprecated_sym_stab_info pointer, and
942 the chain of stab_section_info's, that might be dangling from
943 it. */
c906108c
SS
944
945static void
12b9c64f 946free_elfinfo (void *objp)
c906108c 947{
c5aa993b 948 struct objfile *objfile = (struct objfile *) objp;
0a6ddd08 949 struct dbx_symfile_info *dbxinfo = objfile->deprecated_sym_stab_info;
c906108c
SS
950 struct stab_section_info *ssi, *nssi;
951
952 ssi = dbxinfo->stab_section_info;
953 while (ssi)
954 {
955 nssi = ssi->next;
2dc74dc1 956 xfree (ssi);
c906108c
SS
957 ssi = nssi;
958 }
959
960 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
961}
962
963
964/* Initialize anything that needs initializing when a completely new symbol
965 file is specified (not just adding some symbols from another file, e.g. a
966 shared library).
967
3e43a32a
MS
968 We reinitialize buildsym, since we may be reading stabs from an ELF
969 file. */
c906108c
SS
970
971static void
fba45db2 972elf_new_init (struct objfile *ignore)
c906108c
SS
973{
974 stabsread_new_init ();
975 buildsym_new_init ();
976}
977
978/* Perform any local cleanups required when we are done with a particular
979 objfile. I.E, we are in the process of discarding all symbol information
980 for an objfile, freeing up all memory held for it, and unlinking the
0963b4bd 981 objfile struct from the global list of known objfiles. */
c906108c
SS
982
983static void
fba45db2 984elf_symfile_finish (struct objfile *objfile)
c906108c 985{
0a6ddd08 986 if (objfile->deprecated_sym_stab_info != NULL)
c906108c 987 {
0a6ddd08 988 xfree (objfile->deprecated_sym_stab_info);
c906108c 989 }
fe3e1990
DJ
990
991 dwarf2_free_objfile (objfile);
c906108c
SS
992}
993
994/* ELF specific initialization routine for reading symbols.
995
996 It is passed a pointer to a struct sym_fns which contains, among other
997 things, the BFD for the file whose symbols are being read, and a slot for
998 a pointer to "private data" which we can fill with goodies.
999
1000 For now at least, we have nothing in particular to do, so this function is
0963b4bd 1001 just a stub. */
c906108c
SS
1002
1003static void
fba45db2 1004elf_symfile_init (struct objfile *objfile)
c906108c
SS
1005{
1006 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
1007 find this causes a significant slowdown in gdb then we could
1008 set it in the debug symbol readers only when necessary. */
1009 objfile->flags |= OBJF_REORDERED;
1010}
1011
1012/* When handling an ELF file that contains Sun STABS debug info,
1013 some of the debug info is relative to the particular chunk of the
1014 section that was generated in its individual .o file. E.g.
1015 offsets to static variables are relative to the start of the data
1016 segment *for that module before linking*. This information is
1017 painfully squirreled away in the ELF symbol table as local symbols
1018 with wierd names. Go get 'em when needed. */
1019
1020void
fba45db2 1021elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c 1022{
72b9f47f 1023 const char *filename = pst->filename;
0a6ddd08 1024 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
c906108c
SS
1025 struct stab_section_info *maybe = dbx->stab_section_info;
1026 struct stab_section_info *questionable = 0;
1027 int i;
c906108c
SS
1028
1029 /* The ELF symbol info doesn't include path names, so strip the path
1030 (if any) from the psymtab filename. */
0ba1096a 1031 filename = lbasename (filename);
c906108c
SS
1032
1033 /* FIXME: This linear search could speed up significantly
1034 if it was chained in the right order to match how we search it,
0963b4bd 1035 and if we unchained when we found a match. */
c906108c
SS
1036 for (; maybe; maybe = maybe->next)
1037 {
1038 if (filename[0] == maybe->filename[0]
0ba1096a 1039 && filename_cmp (filename, maybe->filename) == 0)
c906108c
SS
1040 {
1041 /* We found a match. But there might be several source files
1042 (from different directories) with the same name. */
1043 if (0 == maybe->found)
1044 break;
c5aa993b 1045 questionable = maybe; /* Might use it later. */
c906108c
SS
1046 }
1047 }
1048
1049 if (maybe == 0 && questionable != 0)
1050 {
23136709 1051 complaint (&symfile_complaints,
3e43a32a
MS
1052 _("elf/stab section information questionable for %s"),
1053 filename);
c906108c
SS
1054 maybe = questionable;
1055 }
1056
1057 if (maybe)
1058 {
1059 /* Found it! Allocate a new psymtab struct, and fill it in. */
1060 maybe->found++;
1061 pst->section_offsets = (struct section_offsets *)
8b92e4d5 1062 obstack_alloc (&objfile->objfile_obstack,
a39a16c4
MM
1063 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
1064 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 1065 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
1066 return;
1067 }
1068
1069 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 1070 if (dbx->stab_section_info) /* If there *is* any info, */
23136709 1071 complaint (&symfile_complaints,
e2e0b3e5 1072 _("elf/stab section information missing for %s"), filename);
c906108c
SS
1073}
1074\f
1075/* Register that we are able to handle ELF object file formats. */
1076
00b5771c 1077static const struct sym_fns elf_sym_fns =
c906108c
SS
1078{
1079 bfd_target_elf_flavour,
3e43a32a
MS
1080 elf_new_init, /* init anything gbl to entire symtab */
1081 elf_symfile_init, /* read initial info, setup for sym_read() */
1082 elf_symfile_read, /* read a symbol file into symtab */
b11896a5
TT
1083 NULL, /* sym_read_psymbols */
1084 elf_symfile_finish, /* finished with file, cleanup */
1085 default_symfile_offsets, /* Translate ext. to int. relocation */
1086 elf_symfile_segments, /* Get segment information from a file. */
1087 NULL,
1088 default_symfile_relocate, /* Relocate a debug section. */
1089 &psym_functions
1090};
1091
1092/* The same as elf_sym_fns, but not registered and lazily reads
1093 psymbols. */
1094
1095static const struct sym_fns elf_sym_fns_lazy_psyms =
1096{
1097 bfd_target_elf_flavour,
1098 elf_new_init, /* init anything gbl to entire symtab */
1099 elf_symfile_init, /* read initial info, setup for sym_read() */
1100 elf_symfile_read, /* read a symbol file into symtab */
1101 read_psyms, /* sym_read_psymbols */
3e43a32a
MS
1102 elf_symfile_finish, /* finished with file, cleanup */
1103 default_symfile_offsets, /* Translate ext. to int. relocation */
1104 elf_symfile_segments, /* Get segment information from a file. */
1105 NULL,
1106 default_symfile_relocate, /* Relocate a debug section. */
00b5771c 1107 &psym_functions
c906108c
SS
1108};
1109
9291a0cd
TT
1110/* The same as elf_sym_fns, but not registered and uses the
1111 DWARF-specific GNU index rather than psymtab. */
00b5771c 1112static const struct sym_fns elf_sym_fns_gdb_index =
9291a0cd
TT
1113{
1114 bfd_target_elf_flavour,
3e43a32a
MS
1115 elf_new_init, /* init anything gbl to entire symab */
1116 elf_symfile_init, /* read initial info, setup for sym_red() */
1117 elf_symfile_read, /* read a symbol file into symtab */
b11896a5 1118 NULL, /* sym_read_psymbols */
3e43a32a
MS
1119 elf_symfile_finish, /* finished with file, cleanup */
1120 default_symfile_offsets, /* Translate ext. to int. relocatin */
1121 elf_symfile_segments, /* Get segment information from a file. */
1122 NULL,
1123 default_symfile_relocate, /* Relocate a debug section. */
00b5771c 1124 &dwarf2_gdb_index_functions
9291a0cd
TT
1125};
1126
c906108c 1127void
fba45db2 1128_initialize_elfread (void)
c906108c
SS
1129{
1130 add_symtab_fns (&elf_sym_fns);
1131}
This page took 0.783638 seconds and 4 git commands to generate.