Merge from gcc top-level.
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b 2
6aba47ca 3 Copyright (C) 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
4c38e0a4 4 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010
9b254dd1 5 Free Software Foundation, Inc.
1bac305b 6
c906108c
SS
7 Written by Fred Fish at Cygnus Support.
8
c5aa993b 9 This file is part of GDB.
c906108c 10
c5aa993b
JM
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
a9762ec7 13 the Free Software Foundation; either version 3 of the License, or
c5aa993b 14 (at your option) any later version.
c906108c 15
c5aa993b
JM
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
c906108c 20
c5aa993b 21 You should have received a copy of the GNU General Public License
a9762ec7 22 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
23
24#include "defs.h"
25#include "bfd.h"
26#include "gdb_string.h"
27#include "elf-bfd.h"
31d99776
DJ
28#include "elf/common.h"
29#include "elf/internal.h"
c906108c
SS
30#include "elf/mips.h"
31#include "symtab.h"
32#include "symfile.h"
33#include "objfiles.h"
34#include "buildsym.h"
35#include "stabsread.h"
36#include "gdb-stabs.h"
37#include "complaints.h"
38#include "demangle.h"
ccefe4c4 39#include "psympriv.h"
c906108c 40
a14ed312 41extern void _initialize_elfread (void);
392a587b 42
9291a0cd 43/* Forward declaration. */
00b5771c 44static const struct sym_fns elf_sym_fns_gdb_index;
9291a0cd 45
c906108c 46/* The struct elfinfo is available only during ELF symbol table and
6426a772 47 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
48 It's local to elf_symfile_read. */
49
c5aa993b
JM
50struct elfinfo
51 {
c5aa993b
JM
52 asection *stabsect; /* Section pointer for .stab section */
53 asection *stabindexsect; /* Section pointer for .stab.index section */
54 asection *mdebugsect; /* Section pointer for .mdebug section */
55 };
c906108c 56
12b9c64f 57static void free_elfinfo (void *);
c906108c 58
31d99776
DJ
59/* Locate the segments in ABFD. */
60
61static struct symfile_segment_data *
62elf_symfile_segments (bfd *abfd)
63{
64 Elf_Internal_Phdr *phdrs, **segments;
65 long phdrs_size;
66 int num_phdrs, num_segments, num_sections, i;
67 asection *sect;
68 struct symfile_segment_data *data;
69
70 phdrs_size = bfd_get_elf_phdr_upper_bound (abfd);
71 if (phdrs_size == -1)
72 return NULL;
73
74 phdrs = alloca (phdrs_size);
75 num_phdrs = bfd_get_elf_phdrs (abfd, phdrs);
76 if (num_phdrs == -1)
77 return NULL;
78
79 num_segments = 0;
80 segments = alloca (sizeof (Elf_Internal_Phdr *) * num_phdrs);
81 for (i = 0; i < num_phdrs; i++)
82 if (phdrs[i].p_type == PT_LOAD)
83 segments[num_segments++] = &phdrs[i];
84
85 if (num_segments == 0)
86 return NULL;
87
88 data = XZALLOC (struct symfile_segment_data);
89 data->num_segments = num_segments;
90 data->segment_bases = XCALLOC (num_segments, CORE_ADDR);
91 data->segment_sizes = XCALLOC (num_segments, CORE_ADDR);
92
93 for (i = 0; i < num_segments; i++)
94 {
95 data->segment_bases[i] = segments[i]->p_vaddr;
96 data->segment_sizes[i] = segments[i]->p_memsz;
97 }
98
99 num_sections = bfd_count_sections (abfd);
100 data->segment_info = XCALLOC (num_sections, int);
101
102 for (i = 0, sect = abfd->sections; sect != NULL; i++, sect = sect->next)
103 {
104 int j;
105 CORE_ADDR vma;
106
107 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
108 continue;
109
110 vma = bfd_get_section_vma (abfd, sect);
111
112 for (j = 0; j < num_segments; j++)
113 if (segments[j]->p_memsz > 0
114 && vma >= segments[j]->p_vaddr
a366c65a 115 && (vma - segments[j]->p_vaddr) < segments[j]->p_memsz)
31d99776
DJ
116 {
117 data->segment_info[i] = j + 1;
118 break;
119 }
120
ad09a548
DJ
121 /* We should have found a segment for every non-empty section.
122 If we haven't, we will not relocate this section by any
123 offsets we apply to the segments. As an exception, do not
124 warn about SHT_NOBITS sections; in normal ELF execution
125 environments, SHT_NOBITS means zero-initialized and belongs
126 in a segment, but in no-OS environments some tools (e.g. ARM
127 RealView) use SHT_NOBITS for uninitialized data. Since it is
128 uninitialized, it doesn't need a program header. Such
129 binaries are not relocatable. */
130 if (bfd_get_section_size (sect) > 0 && j == num_segments
131 && (bfd_get_section_flags (abfd, sect) & SEC_LOAD) != 0)
31d99776
DJ
132 warning (_("Loadable segment \"%s\" outside of ELF segments"),
133 bfd_section_name (abfd, sect));
134 }
135
136 return data;
137}
138
c906108c
SS
139/* We are called once per section from elf_symfile_read. We
140 need to examine each section we are passed, check to see
141 if it is something we are interested in processing, and
142 if so, stash away some access information for the section.
143
144 For now we recognize the dwarf debug information sections and
145 line number sections from matching their section names. The
146 ELF definition is no real help here since it has no direct
147 knowledge of DWARF (by design, so any debugging format can be
148 used).
149
150 We also recognize the ".stab" sections used by the Sun compilers
151 released with Solaris 2.
152
153 FIXME: The section names should not be hardwired strings (what
154 should they be? I don't think most object file formats have enough
155 section flags to specify what kind of debug section it is
156 -kingdon). */
157
158static void
12b9c64f 159elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 160{
52f0bd74 161 struct elfinfo *ei;
c906108c
SS
162
163 ei = (struct elfinfo *) eip;
7ce59000 164 if (strcmp (sectp->name, ".stab") == 0)
c906108c 165 {
c5aa993b 166 ei->stabsect = sectp;
c906108c 167 }
6314a349 168 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 169 {
c5aa993b 170 ei->stabindexsect = sectp;
c906108c 171 }
6314a349 172 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 173 {
c5aa993b 174 ei->mdebugsect = sectp;
c906108c
SS
175 }
176}
177
c906108c 178static struct minimal_symbol *
04a679b8
TT
179record_minimal_symbol (const char *name, int name_len, int copy_name,
180 CORE_ADDR address,
f594e5e9
MC
181 enum minimal_symbol_type ms_type,
182 asection *bfd_section, struct objfile *objfile)
c906108c 183{
5e2b427d
UW
184 struct gdbarch *gdbarch = get_objfile_arch (objfile);
185
bbeae047 186 if (ms_type == mst_text || ms_type == mst_file_text)
5e2b427d 187 address = gdbarch_smash_text_address (gdbarch, address);
c906108c 188
04a679b8
TT
189 return prim_record_minimal_symbol_full (name, name_len, copy_name, address,
190 ms_type, bfd_section->index,
191 bfd_section, objfile);
c906108c
SS
192}
193
194/*
195
c5aa993b 196 LOCAL FUNCTION
c906108c 197
c5aa993b 198 elf_symtab_read -- read the symbol table of an ELF file
c906108c 199
c5aa993b 200 SYNOPSIS
c906108c 201
6f610d07 202 void elf_symtab_read (struct objfile *objfile, int type,
62553543 203 long number_of_symbols, asymbol **symbol_table)
c906108c 204
c5aa993b 205 DESCRIPTION
c906108c 206
62553543 207 Given an objfile, a symbol table, and a flag indicating whether the
6f610d07
UW
208 symbol table contains regular, dynamic, or synthetic symbols, add all
209 the global function and data symbols to the minimal symbol table.
c906108c 210
c5aa993b
JM
211 In stabs-in-ELF, as implemented by Sun, there are some local symbols
212 defined in the ELF symbol table, which can be used to locate
213 the beginnings of sections from each ".o" file that was linked to
214 form the executable objfile. We gather any such info and record it
215 in data structures hung off the objfile's private data.
c906108c 216
c5aa993b 217 */
c906108c 218
6f610d07
UW
219#define ST_REGULAR 0
220#define ST_DYNAMIC 1
221#define ST_SYNTHETIC 2
222
c906108c 223static void
6f610d07 224elf_symtab_read (struct objfile *objfile, int type,
04a679b8
TT
225 long number_of_symbols, asymbol **symbol_table,
226 int copy_names)
c906108c 227{
5e2b427d 228 struct gdbarch *gdbarch = get_objfile_arch (objfile);
c906108c 229 asymbol *sym;
c906108c 230 long i;
c906108c 231 CORE_ADDR symaddr;
d4f3574e 232 CORE_ADDR offset;
c906108c
SS
233 enum minimal_symbol_type ms_type;
234 /* If sectinfo is nonNULL, it contains section info that should end up
235 filed in the objfile. */
236 struct stab_section_info *sectinfo = NULL;
237 /* If filesym is nonzero, it points to a file symbol, but we haven't
238 seen any section info for it yet. */
239 asymbol *filesym = 0;
1c9e8358
TT
240 /* Name of filesym. This is either a constant string or is saved on
241 the objfile's obstack. */
242 char *filesymname = "";
0a6ddd08 243 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
d4f3574e 244 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 245
0cc7b392 246 for (i = 0; i < number_of_symbols; i++)
c906108c 247 {
0cc7b392
DJ
248 sym = symbol_table[i];
249 if (sym->name == NULL || *sym->name == '\0')
c906108c 250 {
0cc7b392
DJ
251 /* Skip names that don't exist (shouldn't happen), or names
252 that are null strings (may happen). */
253 continue;
254 }
c906108c 255
74763737
DJ
256 /* Skip "special" symbols, e.g. ARM mapping symbols. These are
257 symbols which do not correspond to objects in the symbol table,
258 but have some other target-specific meaning. */
259 if (bfd_is_target_special_symbol (objfile->obfd, sym))
60c5725c
DJ
260 {
261 if (gdbarch_record_special_symbol_p (gdbarch))
262 gdbarch_record_special_symbol (gdbarch, objfile, sym);
263 continue;
264 }
74763737 265
0cc7b392 266 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
6f610d07 267 if (type == ST_DYNAMIC
0cc7b392
DJ
268 && sym->section == &bfd_und_section
269 && (sym->flags & BSF_FUNCTION))
270 {
271 struct minimal_symbol *msym;
02c75f72
UW
272 bfd *abfd = objfile->obfd;
273 asection *sect;
0cc7b392
DJ
274
275 /* Symbol is a reference to a function defined in
276 a shared library.
277 If its value is non zero then it is usually the address
278 of the corresponding entry in the procedure linkage table,
279 plus the desired section offset.
280 If its value is zero then the dynamic linker has to resolve
281 the symbol. We are unable to find any meaningful address
282 for this symbol in the executable file, so we skip it. */
283 symaddr = sym->value;
284 if (symaddr == 0)
285 continue;
02c75f72
UW
286
287 /* sym->section is the undefined section. However, we want to
288 record the section where the PLT stub resides with the
289 minimal symbol. Search the section table for the one that
290 covers the stub's address. */
291 for (sect = abfd->sections; sect != NULL; sect = sect->next)
292 {
293 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
294 continue;
295
296 if (symaddr >= bfd_get_section_vma (abfd, sect)
297 && symaddr < bfd_get_section_vma (abfd, sect)
298 + bfd_get_section_size (sect))
299 break;
300 }
301 if (!sect)
302 continue;
303
304 symaddr += ANOFFSET (objfile->section_offsets, sect->index);
305
0cc7b392 306 msym = record_minimal_symbol
04a679b8
TT
307 (sym->name, strlen (sym->name), copy_names,
308 symaddr, mst_solib_trampoline, sect, objfile);
0cc7b392
DJ
309 if (msym != NULL)
310 msym->filename = filesymname;
0cc7b392
DJ
311 continue;
312 }
c906108c 313
0cc7b392
DJ
314 /* If it is a nonstripped executable, do not enter dynamic
315 symbols, as the dynamic symbol table is usually a subset
316 of the main symbol table. */
6f610d07 317 if (type == ST_DYNAMIC && !stripped)
0cc7b392
DJ
318 continue;
319 if (sym->flags & BSF_FILE)
320 {
321 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
322 Chain any old one onto the objfile; remember new sym. */
323 if (sectinfo != NULL)
c906108c 324 {
0cc7b392
DJ
325 sectinfo->next = dbx->stab_section_info;
326 dbx->stab_section_info = sectinfo;
327 sectinfo = NULL;
328 }
329 filesym = sym;
0cc7b392
DJ
330 filesymname =
331 obsavestring ((char *) filesym->name, strlen (filesym->name),
332 &objfile->objfile_obstack);
0cc7b392
DJ
333 }
334 else if (sym->flags & BSF_SECTION_SYM)
335 continue;
336 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
337 {
338 struct minimal_symbol *msym;
339
340 /* Select global/local/weak symbols. Note that bfd puts abs
341 symbols in their own section, so all symbols we are
342 interested in will have a section. */
343 /* Bfd symbols are section relative. */
344 symaddr = sym->value + sym->section->vma;
45148c2e
UW
345 /* Relocate all non-absolute and non-TLS symbols by the
346 section offset. */
347 if (sym->section != &bfd_abs_section
348 && !(sym->section->flags & SEC_THREAD_LOCAL))
0cc7b392
DJ
349 {
350 symaddr += offset;
c906108c 351 }
0cc7b392
DJ
352 /* For non-absolute symbols, use the type of the section
353 they are relative to, to intuit text/data. Bfd provides
354 no way of figuring this out for absolute symbols. */
355 if (sym->section == &bfd_abs_section)
c906108c 356 {
0cc7b392
DJ
357 /* This is a hack to get the minimal symbol type
358 right for Irix 5, which has absolute addresses
6f610d07
UW
359 with special section indices for dynamic symbols.
360
361 NOTE: uweigand-20071112: Synthetic symbols do not
362 have an ELF-private part, so do not touch those. */
4fbb74a6 363 unsigned int shndx = type == ST_SYNTHETIC ? 0 :
0cc7b392
DJ
364 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
365
366 switch (shndx)
c906108c 367 {
0cc7b392
DJ
368 case SHN_MIPS_TEXT:
369 ms_type = mst_text;
370 break;
371 case SHN_MIPS_DATA:
372 ms_type = mst_data;
373 break;
374 case SHN_MIPS_ACOMMON:
375 ms_type = mst_bss;
376 break;
377 default:
378 ms_type = mst_abs;
379 }
380
381 /* If it is an Irix dynamic symbol, skip section name
382 symbols, relocate all others by section offset. */
383 if (ms_type != mst_abs)
384 {
385 if (sym->name[0] == '.')
386 continue;
d4f3574e 387 symaddr += offset;
c906108c 388 }
0cc7b392
DJ
389 }
390 else if (sym->section->flags & SEC_CODE)
391 {
08232497 392 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 393 {
0cc7b392
DJ
394 ms_type = mst_text;
395 }
396 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
397 || ((sym->flags & BSF_LOCAL)
398 && sym->name[0] == '$'
399 && sym->name[1] == 'L'))
400 /* Looks like a compiler-generated label. Skip
401 it. The assembler should be skipping these (to
402 keep executables small), but apparently with
403 gcc on the (deleted) delta m88k SVR4, it loses.
404 So to have us check too should be harmless (but
405 I encourage people to fix this in the assembler
406 instead of adding checks here). */
407 continue;
408 else
409 {
410 ms_type = mst_file_text;
c906108c 411 }
0cc7b392
DJ
412 }
413 else if (sym->section->flags & SEC_ALLOC)
414 {
415 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 416 {
0cc7b392 417 if (sym->section->flags & SEC_LOAD)
c906108c 418 {
0cc7b392 419 ms_type = mst_data;
c906108c 420 }
c906108c
SS
421 else
422 {
0cc7b392 423 ms_type = mst_bss;
c906108c
SS
424 }
425 }
0cc7b392 426 else if (sym->flags & BSF_LOCAL)
c906108c 427 {
0cc7b392
DJ
428 /* Named Local variable in a Data section.
429 Check its name for stabs-in-elf. */
430 int special_local_sect;
d7f9d729 431
0cc7b392
DJ
432 if (strcmp ("Bbss.bss", sym->name) == 0)
433 special_local_sect = SECT_OFF_BSS (objfile);
434 else if (strcmp ("Ddata.data", sym->name) == 0)
435 special_local_sect = SECT_OFF_DATA (objfile);
436 else if (strcmp ("Drodata.rodata", sym->name) == 0)
437 special_local_sect = SECT_OFF_RODATA (objfile);
438 else
439 special_local_sect = -1;
440 if (special_local_sect >= 0)
c906108c 441 {
0cc7b392
DJ
442 /* Found a special local symbol. Allocate a
443 sectinfo, if needed, and fill it in. */
444 if (sectinfo == NULL)
c906108c 445 {
0cc7b392
DJ
446 int max_index;
447 size_t size;
448
25c2f6ab
PP
449 max_index = SECT_OFF_BSS (objfile);
450 if (objfile->sect_index_data > max_index)
451 max_index = objfile->sect_index_data;
452 if (objfile->sect_index_rodata > max_index)
453 max_index = objfile->sect_index_rodata;
0cc7b392
DJ
454
455 /* max_index is the largest index we'll
456 use into this array, so we must
457 allocate max_index+1 elements for it.
458 However, 'struct stab_section_info'
459 already includes one element, so we
460 need to allocate max_index aadditional
461 elements. */
462 size = (sizeof (struct stab_section_info)
463 + (sizeof (CORE_ADDR)
464 * max_index));
465 sectinfo = (struct stab_section_info *)
466 xmalloc (size);
467 memset (sectinfo, 0, size);
468 sectinfo->num_sections = max_index;
469 if (filesym == NULL)
c906108c 470 {
0cc7b392
DJ
471 complaint (&symfile_complaints,
472 _("elf/stab section information %s without a preceding file symbol"),
473 sym->name);
474 }
475 else
476 {
477 sectinfo->filename =
478 (char *) filesym->name;
c906108c 479 }
c906108c 480 }
0cc7b392
DJ
481 if (sectinfo->sections[special_local_sect] != 0)
482 complaint (&symfile_complaints,
483 _("duplicated elf/stab section information for %s"),
484 sectinfo->filename);
485 /* BFD symbols are section relative. */
486 symaddr = sym->value + sym->section->vma;
487 /* Relocate non-absolute symbols by the
488 section offset. */
489 if (sym->section != &bfd_abs_section)
490 symaddr += offset;
491 sectinfo->sections[special_local_sect] = symaddr;
492 /* The special local symbols don't go in the
493 minimal symbol table, so ignore this one. */
494 continue;
495 }
496 /* Not a special stabs-in-elf symbol, do regular
497 symbol processing. */
498 if (sym->section->flags & SEC_LOAD)
499 {
500 ms_type = mst_file_data;
c906108c
SS
501 }
502 else
503 {
0cc7b392 504 ms_type = mst_file_bss;
c906108c
SS
505 }
506 }
507 else
508 {
0cc7b392 509 ms_type = mst_unknown;
c906108c 510 }
0cc7b392
DJ
511 }
512 else
513 {
514 /* FIXME: Solaris2 shared libraries include lots of
515 odd "absolute" and "undefined" symbols, that play
516 hob with actions like finding what function the PC
517 is in. Ignore them if they aren't text, data, or bss. */
518 /* ms_type = mst_unknown; */
519 continue; /* Skip this symbol. */
520 }
521 msym = record_minimal_symbol
04a679b8 522 (sym->name, strlen (sym->name), copy_names, symaddr,
0cc7b392 523 ms_type, sym->section, objfile);
6f610d07 524
0cc7b392
DJ
525 if (msym)
526 {
527 /* Pass symbol size field in via BFD. FIXME!!! */
6f610d07
UW
528 elf_symbol_type *elf_sym;
529
530 /* NOTE: uweigand-20071112: A synthetic symbol does not have an
531 ELF-private part. However, in some cases (e.g. synthetic
532 'dot' symbols on ppc64) the udata.p entry is set to point back
533 to the original ELF symbol it was derived from. Get the size
534 from that symbol. */
535 if (type != ST_SYNTHETIC)
536 elf_sym = (elf_symbol_type *) sym;
537 else
538 elf_sym = (elf_symbol_type *) sym->udata.p;
539
540 if (elf_sym)
541 MSYMBOL_SIZE(msym) = elf_sym->internal_elf_sym.st_size;
a103a963
DJ
542
543 msym->filename = filesymname;
544 gdbarch_elf_make_msymbol_special (gdbarch, sym, msym);
0cc7b392 545 }
2eaf8d2a
DJ
546
547 /* For @plt symbols, also record a trampoline to the
548 destination symbol. The @plt symbol will be used in
549 disassembly, and the trampoline will be used when we are
550 trying to find the target. */
551 if (msym && ms_type == mst_text && type == ST_SYNTHETIC)
552 {
553 int len = strlen (sym->name);
554
555 if (len > 4 && strcmp (sym->name + len - 4, "@plt") == 0)
556 {
2eaf8d2a
DJ
557 struct minimal_symbol *mtramp;
558
04a679b8
TT
559 mtramp = record_minimal_symbol (sym->name, len - 4, 1,
560 symaddr,
2eaf8d2a
DJ
561 mst_solib_trampoline,
562 sym->section, objfile);
563 if (mtramp)
564 {
565 MSYMBOL_SIZE (mtramp) = MSYMBOL_SIZE (msym);
566 mtramp->filename = filesymname;
567 gdbarch_elf_make_msymbol_special (gdbarch, sym, mtramp);
568 }
569 }
570 }
c906108c 571 }
c906108c
SS
572 }
573}
574
874f5765
TG
575struct build_id
576 {
577 size_t size;
578 gdb_byte data[1];
579 };
580
581/* Locate NT_GNU_BUILD_ID from ABFD and return its content. */
582
583static struct build_id *
584build_id_bfd_get (bfd *abfd)
585{
586 struct build_id *retval;
587
588 if (!bfd_check_format (abfd, bfd_object)
589 || bfd_get_flavour (abfd) != bfd_target_elf_flavour
590 || elf_tdata (abfd)->build_id == NULL)
591 return NULL;
592
593 retval = xmalloc (sizeof *retval - 1 + elf_tdata (abfd)->build_id_size);
594 retval->size = elf_tdata (abfd)->build_id_size;
595 memcpy (retval->data, elf_tdata (abfd)->build_id, retval->size);
596
597 return retval;
598}
599
600/* Return if FILENAME has NT_GNU_BUILD_ID matching the CHECK value. */
601
602static int
603build_id_verify (const char *filename, struct build_id *check)
604{
605 bfd *abfd;
606 struct build_id *found = NULL;
607 int retval = 0;
608
609 /* We expect to be silent on the non-existing files. */
610 abfd = bfd_open_maybe_remote (filename);
611 if (abfd == NULL)
612 return 0;
613
614 found = build_id_bfd_get (abfd);
615
616 if (found == NULL)
617 warning (_("File \"%s\" has no build-id, file skipped"), filename);
618 else if (found->size != check->size
619 || memcmp (found->data, check->data, found->size) != 0)
620 warning (_("File \"%s\" has a different build-id, file skipped"), filename);
621 else
622 retval = 1;
623
516ba659 624 gdb_bfd_close_or_warn (abfd);
874f5765
TG
625
626 xfree (found);
627
628 return retval;
629}
630
631static char *
632build_id_to_debug_filename (struct build_id *build_id)
633{
634 char *link, *debugdir, *retval = NULL;
635
636 /* DEBUG_FILE_DIRECTORY/.build-id/ab/cdef */
637 link = alloca (strlen (debug_file_directory) + (sizeof "/.build-id/" - 1) + 1
638 + 2 * build_id->size + (sizeof ".debug" - 1) + 1);
639
640 /* Keep backward compatibility so that DEBUG_FILE_DIRECTORY being "" will
641 cause "/.build-id/..." lookups. */
642
643 debugdir = debug_file_directory;
644 do
645 {
646 char *s, *debugdir_end;
647 gdb_byte *data = build_id->data;
648 size_t size = build_id->size;
649
650 while (*debugdir == DIRNAME_SEPARATOR)
651 debugdir++;
652
653 debugdir_end = strchr (debugdir, DIRNAME_SEPARATOR);
654 if (debugdir_end == NULL)
655 debugdir_end = &debugdir[strlen (debugdir)];
656
657 memcpy (link, debugdir, debugdir_end - debugdir);
658 s = &link[debugdir_end - debugdir];
659 s += sprintf (s, "/.build-id/");
660 if (size > 0)
661 {
662 size--;
663 s += sprintf (s, "%02x", (unsigned) *data++);
664 }
665 if (size > 0)
666 *s++ = '/';
667 while (size-- > 0)
668 s += sprintf (s, "%02x", (unsigned) *data++);
669 strcpy (s, ".debug");
670
671 /* lrealpath() is expensive even for the usually non-existent files. */
672 if (access (link, F_OK) == 0)
673 retval = lrealpath (link);
674
675 if (retval != NULL && !build_id_verify (retval, build_id))
676 {
677 xfree (retval);
678 retval = NULL;
679 }
680
681 if (retval != NULL)
682 break;
683
684 debugdir = debugdir_end;
685 }
686 while (*debugdir != 0);
687
688 return retval;
689}
690
691static char *
692find_separate_debug_file_by_buildid (struct objfile *objfile)
693{
874f5765
TG
694 struct build_id *build_id;
695
696 build_id = build_id_bfd_get (objfile->obfd);
697 if (build_id != NULL)
698 {
699 char *build_id_name;
700
701 build_id_name = build_id_to_debug_filename (build_id);
702 xfree (build_id);
703 /* Prevent looping on a stripped .debug file. */
704 if (build_id_name != NULL && strcmp (build_id_name, objfile->name) == 0)
705 {
706 warning (_("\"%s\": separate debug info file has no debug info"),
707 build_id_name);
708 xfree (build_id_name);
709 }
710 else if (build_id_name != NULL)
711 return build_id_name;
712 }
713 return NULL;
714}
715
c906108c
SS
716/* Scan and build partial symbols for a symbol file.
717 We have been initialized by a call to elf_symfile_init, which
718 currently does nothing.
719
720 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
721 in each section. We simplify it down to a single offset for all
722 symbols. FIXME.
723
c906108c
SS
724 This function only does the minimum work necessary for letting the
725 user "name" things symbolically; it does not read the entire symtab.
726 Instead, it reads the external and static symbols and puts them in partial
727 symbol tables. When more extensive information is requested of a
728 file, the corresponding partial symbol table is mutated into a full
729 fledged symbol table by going back and reading the symbols
730 for real.
731
732 We look for sections with specific names, to tell us what debug
733 format to look for: FIXME!!!
734
c906108c
SS
735 elfstab_build_psymtabs() handles STABS symbols;
736 mdebug_build_psymtabs() handles ECOFF debugging information.
737
738 Note that ELF files have a "minimal" symbol table, which looks a lot
739 like a COFF symbol table, but has only the minimal information necessary
740 for linking. We process this also, and use the information to
741 build gdb's minimal symbol table. This gives us some minimal debugging
742 capability even for files compiled without -g. */
743
744static void
f4352531 745elf_symfile_read (struct objfile *objfile, int symfile_flags)
c906108c
SS
746{
747 bfd *abfd = objfile->obfd;
748 struct elfinfo ei;
749 struct cleanup *back_to;
62553543
EZ
750 long symcount = 0, dynsymcount = 0, synthcount, storage_needed;
751 asymbol **symbol_table = NULL, **dyn_symbol_table = NULL;
752 asymbol *synthsyms;
c906108c
SS
753
754 init_minimal_symbol_collection ();
56e290f4 755 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
756
757 memset ((char *) &ei, 0, sizeof (ei));
758
759 /* Allocate struct to keep track of the symfile */
0a6ddd08 760 objfile->deprecated_sym_stab_info = (struct dbx_symfile_info *)
7936743b 761 xmalloc (sizeof (struct dbx_symfile_info));
0a6ddd08 762 memset ((char *) objfile->deprecated_sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 763 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
764
765 /* Process the normal ELF symbol table first. This may write some
0a6ddd08 766 chain of info into the dbx_symfile_info in objfile->deprecated_sym_stab_info,
c906108c
SS
767 which can later be used by elfstab_offset_sections. */
768
62553543
EZ
769 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
770 if (storage_needed < 0)
771 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
772 bfd_errmsg (bfd_get_error ()));
773
774 if (storage_needed > 0)
775 {
776 symbol_table = (asymbol **) xmalloc (storage_needed);
777 make_cleanup (xfree, symbol_table);
778 symcount = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
779
780 if (symcount < 0)
781 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
782 bfd_errmsg (bfd_get_error ()));
783
04a679b8 784 elf_symtab_read (objfile, ST_REGULAR, symcount, symbol_table, 0);
62553543 785 }
c906108c
SS
786
787 /* Add the dynamic symbols. */
788
62553543
EZ
789 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
790
791 if (storage_needed > 0)
792 {
793 dyn_symbol_table = (asymbol **) xmalloc (storage_needed);
794 make_cleanup (xfree, dyn_symbol_table);
795 dynsymcount = bfd_canonicalize_dynamic_symtab (objfile->obfd,
796 dyn_symbol_table);
797
798 if (dynsymcount < 0)
799 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
800 bfd_errmsg (bfd_get_error ()));
801
04a679b8 802 elf_symtab_read (objfile, ST_DYNAMIC, dynsymcount, dyn_symbol_table, 0);
62553543
EZ
803 }
804
805 /* Add synthetic symbols - for instance, names for any PLT entries. */
806
807 synthcount = bfd_get_synthetic_symtab (abfd, symcount, symbol_table,
808 dynsymcount, dyn_symbol_table,
809 &synthsyms);
810 if (synthcount > 0)
811 {
812 asymbol **synth_symbol_table;
813 long i;
814
815 make_cleanup (xfree, synthsyms);
816 synth_symbol_table = xmalloc (sizeof (asymbol *) * synthcount);
817 for (i = 0; i < synthcount; i++)
9f20e3da 818 synth_symbol_table[i] = synthsyms + i;
62553543 819 make_cleanup (xfree, synth_symbol_table);
04a679b8 820 elf_symtab_read (objfile, ST_SYNTHETIC, synthcount, synth_symbol_table, 1);
62553543 821 }
c906108c 822
7134143f
DJ
823 /* Install any minimal symbols that have been collected as the current
824 minimal symbols for this objfile. The debug readers below this point
825 should not generate new minimal symbols; if they do it's their
826 responsibility to install them. "mdebug" appears to be the only one
827 which will do this. */
828
829 install_minimal_symbols (objfile);
830 do_cleanups (back_to);
831
c906108c
SS
832 /* Now process debugging information, which is contained in
833 special ELF sections. */
834
c906108c 835 /* We first have to find them... */
12b9c64f 836 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
837
838 /* ELF debugging information is inserted into the psymtab in the
839 order of least informative first - most informative last. Since
840 the psymtab table is searched `most recent insertion first' this
841 increases the probability that more detailed debug information
842 for a section is found.
843
844 For instance, an object file might contain both .mdebug (XCOFF)
845 and .debug_info (DWARF2) sections then .mdebug is inserted first
846 (searched last) and DWARF2 is inserted last (searched first). If
847 we don't do this then the XCOFF info is found first - for code in
848 an included file XCOFF info is useless. */
849
850 if (ei.mdebugsect)
851 {
852 const struct ecoff_debug_swap *swap;
853
854 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 855 information. */
c906108c
SS
856 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
857 if (swap)
d4f3574e 858 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
859 }
860 if (ei.stabsect)
861 {
862 asection *str_sect;
863
864 /* Stab sections have an associated string table that looks like
c5aa993b 865 a separate section. */
c906108c
SS
866 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
867
868 /* FIXME should probably warn about a stab section without a stabstr. */
869 if (str_sect)
870 elfstab_build_psymtabs (objfile,
086df311 871 ei.stabsect,
c906108c
SS
872 str_sect->filepos,
873 bfd_section_size (abfd, str_sect));
874 }
9291a0cd
TT
875
876 if (dwarf2_has_info (objfile) && dwarf2_initialize_objfile (objfile))
877 objfile->sf = &elf_sym_fns_gdb_index;
c906108c 878
9cce227f
TG
879 /* If the file has its own symbol tables it has no separate debug info.
880 `.dynsym'/`.symtab' go to MSYMBOLS, `.debug_info' goes to SYMTABS/PSYMTABS.
881 `.gnu_debuglink' may no longer be present with `.note.gnu.build-id'. */
882 if (!objfile_has_partial_symbols (objfile))
883 {
884 char *debugfile;
885
886 debugfile = find_separate_debug_file_by_buildid (objfile);
887
888 if (debugfile == NULL)
889 debugfile = find_separate_debug_file_by_debuglink (objfile);
890
891 if (debugfile)
892 {
893 bfd *abfd = symfile_bfd_open (debugfile);
d7f9d729 894
9cce227f
TG
895 symbol_file_add_separate (abfd, symfile_flags, objfile);
896 xfree (debugfile);
897 }
898 }
c906108c
SS
899}
900
0a6ddd08
AC
901/* This cleans up the objfile's deprecated_sym_stab_info pointer, and
902 the chain of stab_section_info's, that might be dangling from
903 it. */
c906108c
SS
904
905static void
12b9c64f 906free_elfinfo (void *objp)
c906108c 907{
c5aa993b 908 struct objfile *objfile = (struct objfile *) objp;
0a6ddd08 909 struct dbx_symfile_info *dbxinfo = objfile->deprecated_sym_stab_info;
c906108c
SS
910 struct stab_section_info *ssi, *nssi;
911
912 ssi = dbxinfo->stab_section_info;
913 while (ssi)
914 {
915 nssi = ssi->next;
2dc74dc1 916 xfree (ssi);
c906108c
SS
917 ssi = nssi;
918 }
919
920 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
921}
922
923
924/* Initialize anything that needs initializing when a completely new symbol
925 file is specified (not just adding some symbols from another file, e.g. a
926 shared library).
927
928 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
929
930static void
fba45db2 931elf_new_init (struct objfile *ignore)
c906108c
SS
932{
933 stabsread_new_init ();
934 buildsym_new_init ();
935}
936
937/* Perform any local cleanups required when we are done with a particular
938 objfile. I.E, we are in the process of discarding all symbol information
939 for an objfile, freeing up all memory held for it, and unlinking the
940 objfile struct from the global list of known objfiles. */
941
942static void
fba45db2 943elf_symfile_finish (struct objfile *objfile)
c906108c 944{
0a6ddd08 945 if (objfile->deprecated_sym_stab_info != NULL)
c906108c 946 {
0a6ddd08 947 xfree (objfile->deprecated_sym_stab_info);
c906108c 948 }
fe3e1990
DJ
949
950 dwarf2_free_objfile (objfile);
c906108c
SS
951}
952
953/* ELF specific initialization routine for reading symbols.
954
955 It is passed a pointer to a struct sym_fns which contains, among other
956 things, the BFD for the file whose symbols are being read, and a slot for
957 a pointer to "private data" which we can fill with goodies.
958
959 For now at least, we have nothing in particular to do, so this function is
960 just a stub. */
961
962static void
fba45db2 963elf_symfile_init (struct objfile *objfile)
c906108c
SS
964{
965 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
966 find this causes a significant slowdown in gdb then we could
967 set it in the debug symbol readers only when necessary. */
968 objfile->flags |= OBJF_REORDERED;
969}
970
971/* When handling an ELF file that contains Sun STABS debug info,
972 some of the debug info is relative to the particular chunk of the
973 section that was generated in its individual .o file. E.g.
974 offsets to static variables are relative to the start of the data
975 segment *for that module before linking*. This information is
976 painfully squirreled away in the ELF symbol table as local symbols
977 with wierd names. Go get 'em when needed. */
978
979void
fba45db2 980elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c 981{
72b9f47f 982 const char *filename = pst->filename;
0a6ddd08 983 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
c906108c
SS
984 struct stab_section_info *maybe = dbx->stab_section_info;
985 struct stab_section_info *questionable = 0;
986 int i;
987 char *p;
988
989 /* The ELF symbol info doesn't include path names, so strip the path
990 (if any) from the psymtab filename. */
991 while (0 != (p = strchr (filename, '/')))
c5aa993b 992 filename = p + 1;
c906108c
SS
993
994 /* FIXME: This linear search could speed up significantly
995 if it was chained in the right order to match how we search it,
996 and if we unchained when we found a match. */
997 for (; maybe; maybe = maybe->next)
998 {
999 if (filename[0] == maybe->filename[0]
6314a349 1000 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
1001 {
1002 /* We found a match. But there might be several source files
1003 (from different directories) with the same name. */
1004 if (0 == maybe->found)
1005 break;
c5aa993b 1006 questionable = maybe; /* Might use it later. */
c906108c
SS
1007 }
1008 }
1009
1010 if (maybe == 0 && questionable != 0)
1011 {
23136709 1012 complaint (&symfile_complaints,
e2e0b3e5 1013 _("elf/stab section information questionable for %s"), filename);
c906108c
SS
1014 maybe = questionable;
1015 }
1016
1017 if (maybe)
1018 {
1019 /* Found it! Allocate a new psymtab struct, and fill it in. */
1020 maybe->found++;
1021 pst->section_offsets = (struct section_offsets *)
8b92e4d5 1022 obstack_alloc (&objfile->objfile_obstack,
a39a16c4
MM
1023 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
1024 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 1025 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
1026 return;
1027 }
1028
1029 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 1030 if (dbx->stab_section_info) /* If there *is* any info, */
23136709 1031 complaint (&symfile_complaints,
e2e0b3e5 1032 _("elf/stab section information missing for %s"), filename);
c906108c
SS
1033}
1034\f
1035/* Register that we are able to handle ELF object file formats. */
1036
00b5771c 1037static const struct sym_fns elf_sym_fns =
c906108c
SS
1038{
1039 bfd_target_elf_flavour,
c5aa993b
JM
1040 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
1041 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
1042 elf_symfile_read, /* sym_read: read a symbol file into symtab */
1043 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 1044 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
31d99776
DJ
1045 elf_symfile_segments, /* sym_segments: Get segment information from
1046 a file. */
c295b2e5 1047 NULL, /* sym_read_linetable */
ac8035ab 1048 default_symfile_relocate, /* sym_relocate: Relocate a debug section. */
00b5771c 1049 &psym_functions
c906108c
SS
1050};
1051
9291a0cd
TT
1052/* The same as elf_sym_fns, but not registered and uses the
1053 DWARF-specific GNU index rather than psymtab. */
00b5771c 1054static const struct sym_fns elf_sym_fns_gdb_index =
9291a0cd
TT
1055{
1056 bfd_target_elf_flavour,
1057 elf_new_init, /* sym_new_init: init anything gbl to entire symab */
1058 elf_symfile_init, /* sym_init: read initial info, setup for sym_red() */
1059 elf_symfile_read, /* sym_read: read a symbol file into symtab */
1060 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
1061 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocatin */
1062 elf_symfile_segments, /* sym_segments: Get segment information from
1063 a file. */
1064 NULL, /* sym_read_linetable */
1065 default_symfile_relocate, /* sym_relocate: Relocate a debug section. */
00b5771c 1066 &dwarf2_gdb_index_functions
9291a0cd
TT
1067};
1068
c906108c 1069void
fba45db2 1070_initialize_elfread (void)
c906108c
SS
1071{
1072 add_symtab_fns (&elf_sym_fns);
1073}
This page took 0.881064 seconds and 4 git commands to generate.