[MPFR] Fix regression on 32-bit host systems
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b 2
61baf725 3 Copyright (C) 1991-2017 Free Software Foundation, Inc.
1bac305b 4
c906108c
SS
5 Written by Fred Fish at Cygnus Support.
6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
a9762ec7 11 the Free Software Foundation; either version 3 of the License, or
c5aa993b 12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b 19 You should have received a copy of the GNU General Public License
a9762ec7 20 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
21
22#include "defs.h"
23#include "bfd.h"
c906108c 24#include "elf-bfd.h"
31d99776
DJ
25#include "elf/common.h"
26#include "elf/internal.h"
c906108c
SS
27#include "elf/mips.h"
28#include "symtab.h"
29#include "symfile.h"
30#include "objfiles.h"
31#include "buildsym.h"
32#include "stabsread.h"
33#include "gdb-stabs.h"
34#include "complaints.h"
35#include "demangle.h"
ccefe4c4 36#include "psympriv.h"
0ba1096a 37#include "filenames.h"
55aa24fb
SDJ
38#include "probe.h"
39#include "arch-utils.h"
07be84bf
JK
40#include "gdbtypes.h"
41#include "value.h"
42#include "infcall.h"
0e30163f
JK
43#include "gdbthread.h"
44#include "regcache.h"
0af1e9a5 45#include "bcache.h"
cbb099e8 46#include "gdb_bfd.h"
dc294be5 47#include "build-id.h"
f00aae0f 48#include "location.h"
e1b2624a 49#include "auxv.h"
c906108c
SS
50
51/* The struct elfinfo is available only during ELF symbol table and
6426a772 52 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
53 It's local to elf_symfile_read. */
54
c5aa993b
JM
55struct elfinfo
56 {
c5aa993b 57 asection *stabsect; /* Section pointer for .stab section */
c5aa993b
JM
58 asection *mdebugsect; /* Section pointer for .mdebug section */
59 };
c906108c 60
5d9cf8a4 61/* Per-BFD data for probe info. */
55aa24fb 62
5d9cf8a4 63static const struct bfd_data *probe_key = NULL;
55aa24fb 64
07be84bf
JK
65/* Minimal symbols located at the GOT entries for .plt - that is the real
66 pointer where the given entry will jump to. It gets updated by the real
67 function address during lazy ld.so resolving in the inferior. These
68 minimal symbols are indexed for <tab>-completion. */
69
70#define SYMBOL_GOT_PLT_SUFFIX "@got.plt"
71
31d99776
DJ
72/* Locate the segments in ABFD. */
73
74static struct symfile_segment_data *
75elf_symfile_segments (bfd *abfd)
76{
77 Elf_Internal_Phdr *phdrs, **segments;
78 long phdrs_size;
79 int num_phdrs, num_segments, num_sections, i;
80 asection *sect;
81 struct symfile_segment_data *data;
82
83 phdrs_size = bfd_get_elf_phdr_upper_bound (abfd);
84 if (phdrs_size == -1)
85 return NULL;
86
224c3ddb 87 phdrs = (Elf_Internal_Phdr *) alloca (phdrs_size);
31d99776
DJ
88 num_phdrs = bfd_get_elf_phdrs (abfd, phdrs);
89 if (num_phdrs == -1)
90 return NULL;
91
92 num_segments = 0;
8d749320 93 segments = XALLOCAVEC (Elf_Internal_Phdr *, num_phdrs);
31d99776
DJ
94 for (i = 0; i < num_phdrs; i++)
95 if (phdrs[i].p_type == PT_LOAD)
96 segments[num_segments++] = &phdrs[i];
97
98 if (num_segments == 0)
99 return NULL;
100
41bf6aca 101 data = XCNEW (struct symfile_segment_data);
31d99776 102 data->num_segments = num_segments;
fc270c35
TT
103 data->segment_bases = XCNEWVEC (CORE_ADDR, num_segments);
104 data->segment_sizes = XCNEWVEC (CORE_ADDR, num_segments);
31d99776
DJ
105
106 for (i = 0; i < num_segments; i++)
107 {
108 data->segment_bases[i] = segments[i]->p_vaddr;
109 data->segment_sizes[i] = segments[i]->p_memsz;
110 }
111
112 num_sections = bfd_count_sections (abfd);
fc270c35 113 data->segment_info = XCNEWVEC (int, num_sections);
31d99776
DJ
114
115 for (i = 0, sect = abfd->sections; sect != NULL; i++, sect = sect->next)
116 {
117 int j;
118 CORE_ADDR vma;
119
120 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
121 continue;
122
123 vma = bfd_get_section_vma (abfd, sect);
124
125 for (j = 0; j < num_segments; j++)
126 if (segments[j]->p_memsz > 0
127 && vma >= segments[j]->p_vaddr
a366c65a 128 && (vma - segments[j]->p_vaddr) < segments[j]->p_memsz)
31d99776
DJ
129 {
130 data->segment_info[i] = j + 1;
131 break;
132 }
133
ad09a548
DJ
134 /* We should have found a segment for every non-empty section.
135 If we haven't, we will not relocate this section by any
136 offsets we apply to the segments. As an exception, do not
137 warn about SHT_NOBITS sections; in normal ELF execution
138 environments, SHT_NOBITS means zero-initialized and belongs
139 in a segment, but in no-OS environments some tools (e.g. ARM
140 RealView) use SHT_NOBITS for uninitialized data. Since it is
141 uninitialized, it doesn't need a program header. Such
142 binaries are not relocatable. */
143 if (bfd_get_section_size (sect) > 0 && j == num_segments
144 && (bfd_get_section_flags (abfd, sect) & SEC_LOAD) != 0)
28ee876a 145 warning (_("Loadable section \"%s\" outside of ELF segments"),
31d99776
DJ
146 bfd_section_name (abfd, sect));
147 }
148
149 return data;
150}
151
c906108c
SS
152/* We are called once per section from elf_symfile_read. We
153 need to examine each section we are passed, check to see
154 if it is something we are interested in processing, and
155 if so, stash away some access information for the section.
156
157 For now we recognize the dwarf debug information sections and
158 line number sections from matching their section names. The
159 ELF definition is no real help here since it has no direct
160 knowledge of DWARF (by design, so any debugging format can be
161 used).
162
163 We also recognize the ".stab" sections used by the Sun compilers
164 released with Solaris 2.
165
166 FIXME: The section names should not be hardwired strings (what
167 should they be? I don't think most object file formats have enough
0963b4bd 168 section flags to specify what kind of debug section it is.
c906108c
SS
169 -kingdon). */
170
171static void
12b9c64f 172elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 173{
52f0bd74 174 struct elfinfo *ei;
c906108c
SS
175
176 ei = (struct elfinfo *) eip;
7ce59000 177 if (strcmp (sectp->name, ".stab") == 0)
c906108c 178 {
c5aa993b 179 ei->stabsect = sectp;
c906108c 180 }
6314a349 181 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 182 {
c5aa993b 183 ei->mdebugsect = sectp;
c906108c
SS
184 }
185}
186
c906108c 187static struct minimal_symbol *
8dddcb8f 188record_minimal_symbol (minimal_symbol_reader &reader,
ce6c454e 189 const char *name, int name_len, bool copy_name,
04a679b8 190 CORE_ADDR address,
f594e5e9
MC
191 enum minimal_symbol_type ms_type,
192 asection *bfd_section, struct objfile *objfile)
c906108c 193{
5e2b427d
UW
194 struct gdbarch *gdbarch = get_objfile_arch (objfile);
195
0875794a
JK
196 if (ms_type == mst_text || ms_type == mst_file_text
197 || ms_type == mst_text_gnu_ifunc)
85ddcc70 198 address = gdbarch_addr_bits_remove (gdbarch, address);
c906108c 199
8dddcb8f
TT
200 return reader.record_full (name, name_len, copy_name, address,
201 ms_type,
202 gdb_bfd_section_index (objfile->obfd,
203 bfd_section));
c906108c
SS
204}
205
7f86f058 206/* Read the symbol table of an ELF file.
c906108c 207
62553543 208 Given an objfile, a symbol table, and a flag indicating whether the
6f610d07
UW
209 symbol table contains regular, dynamic, or synthetic symbols, add all
210 the global function and data symbols to the minimal symbol table.
c906108c 211
c5aa993b
JM
212 In stabs-in-ELF, as implemented by Sun, there are some local symbols
213 defined in the ELF symbol table, which can be used to locate
214 the beginnings of sections from each ".o" file that was linked to
215 form the executable objfile. We gather any such info and record it
7f86f058 216 in data structures hung off the objfile's private data. */
c906108c 217
6f610d07
UW
218#define ST_REGULAR 0
219#define ST_DYNAMIC 1
220#define ST_SYNTHETIC 2
221
c906108c 222static void
8dddcb8f
TT
223elf_symtab_read (minimal_symbol_reader &reader,
224 struct objfile *objfile, int type,
04a679b8 225 long number_of_symbols, asymbol **symbol_table,
ce6c454e 226 bool copy_names)
c906108c 227{
5e2b427d 228 struct gdbarch *gdbarch = get_objfile_arch (objfile);
c906108c 229 asymbol *sym;
c906108c 230 long i;
c906108c
SS
231 CORE_ADDR symaddr;
232 enum minimal_symbol_type ms_type;
18a94d75
DE
233 /* Name of the last file symbol. This is either a constant string or is
234 saved on the objfile's filename cache. */
0af1e9a5 235 const char *filesymname = "";
d4f3574e 236 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
3e29f34a
MR
237 int elf_make_msymbol_special_p
238 = gdbarch_elf_make_msymbol_special_p (gdbarch);
c5aa993b 239
0cc7b392 240 for (i = 0; i < number_of_symbols; i++)
c906108c 241 {
0cc7b392
DJ
242 sym = symbol_table[i];
243 if (sym->name == NULL || *sym->name == '\0')
c906108c 244 {
0cc7b392 245 /* Skip names that don't exist (shouldn't happen), or names
0963b4bd 246 that are null strings (may happen). */
0cc7b392
DJ
247 continue;
248 }
c906108c 249
74763737
DJ
250 /* Skip "special" symbols, e.g. ARM mapping symbols. These are
251 symbols which do not correspond to objects in the symbol table,
252 but have some other target-specific meaning. */
253 if (bfd_is_target_special_symbol (objfile->obfd, sym))
60c5725c
DJ
254 {
255 if (gdbarch_record_special_symbol_p (gdbarch))
256 gdbarch_record_special_symbol (gdbarch, objfile, sym);
257 continue;
258 }
74763737 259
6f610d07 260 if (type == ST_DYNAMIC
45dfa85a 261 && sym->section == bfd_und_section_ptr
0cc7b392
DJ
262 && (sym->flags & BSF_FUNCTION))
263 {
264 struct minimal_symbol *msym;
02c75f72 265 bfd *abfd = objfile->obfd;
dea91a5c 266 asection *sect;
0cc7b392
DJ
267
268 /* Symbol is a reference to a function defined in
269 a shared library.
270 If its value is non zero then it is usually the address
271 of the corresponding entry in the procedure linkage table,
272 plus the desired section offset.
273 If its value is zero then the dynamic linker has to resolve
0963b4bd 274 the symbol. We are unable to find any meaningful address
0cc7b392
DJ
275 for this symbol in the executable file, so we skip it. */
276 symaddr = sym->value;
277 if (symaddr == 0)
278 continue;
02c75f72
UW
279
280 /* sym->section is the undefined section. However, we want to
281 record the section where the PLT stub resides with the
282 minimal symbol. Search the section table for the one that
283 covers the stub's address. */
284 for (sect = abfd->sections; sect != NULL; sect = sect->next)
285 {
286 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
287 continue;
288
289 if (symaddr >= bfd_get_section_vma (abfd, sect)
290 && symaddr < bfd_get_section_vma (abfd, sect)
291 + bfd_get_section_size (sect))
292 break;
293 }
294 if (!sect)
295 continue;
296
828cfa8d
JB
297 /* On ia64-hpux, we have discovered that the system linker
298 adds undefined symbols with nonzero addresses that cannot
299 be right (their address points inside the code of another
300 function in the .text section). This creates problems
301 when trying to determine which symbol corresponds to
302 a given address.
303
304 We try to detect those buggy symbols by checking which
305 section we think they correspond to. Normally, PLT symbols
306 are stored inside their own section, and the typical name
307 for that section is ".plt". So, if there is a ".plt"
308 section, and yet the section name of our symbol does not
309 start with ".plt", we ignore that symbol. */
61012eef 310 if (!startswith (sect->name, ".plt")
828cfa8d
JB
311 && bfd_get_section_by_name (abfd, ".plt") != NULL)
312 continue;
313
0cc7b392 314 msym = record_minimal_symbol
8dddcb8f 315 (reader, sym->name, strlen (sym->name), copy_names,
04a679b8 316 symaddr, mst_solib_trampoline, sect, objfile);
0cc7b392 317 if (msym != NULL)
9b807e7b
MR
318 {
319 msym->filename = filesymname;
3e29f34a
MR
320 if (elf_make_msymbol_special_p)
321 gdbarch_elf_make_msymbol_special (gdbarch, sym, msym);
9b807e7b 322 }
0cc7b392
DJ
323 continue;
324 }
c906108c 325
0cc7b392
DJ
326 /* If it is a nonstripped executable, do not enter dynamic
327 symbols, as the dynamic symbol table is usually a subset
328 of the main symbol table. */
6f610d07 329 if (type == ST_DYNAMIC && !stripped)
0cc7b392
DJ
330 continue;
331 if (sym->flags & BSF_FILE)
332 {
9a3c8263
SM
333 filesymname
334 = (const char *) bcache (sym->name, strlen (sym->name) + 1,
335 objfile->per_bfd->filename_cache);
0cc7b392
DJ
336 }
337 else if (sym->flags & BSF_SECTION_SYM)
338 continue;
bb869963
SDJ
339 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK
340 | BSF_GNU_UNIQUE))
0cc7b392
DJ
341 {
342 struct minimal_symbol *msym;
343
344 /* Select global/local/weak symbols. Note that bfd puts abs
345 symbols in their own section, so all symbols we are
0963b4bd
MS
346 interested in will have a section. */
347 /* Bfd symbols are section relative. */
0cc7b392 348 symaddr = sym->value + sym->section->vma;
0cc7b392
DJ
349 /* For non-absolute symbols, use the type of the section
350 they are relative to, to intuit text/data. Bfd provides
0963b4bd 351 no way of figuring this out for absolute symbols. */
45dfa85a 352 if (sym->section == bfd_abs_section_ptr)
c906108c 353 {
0cc7b392
DJ
354 /* This is a hack to get the minimal symbol type
355 right for Irix 5, which has absolute addresses
6f610d07
UW
356 with special section indices for dynamic symbols.
357
358 NOTE: uweigand-20071112: Synthetic symbols do not
359 have an ELF-private part, so do not touch those. */
dea91a5c 360 unsigned int shndx = type == ST_SYNTHETIC ? 0 :
0cc7b392
DJ
361 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
362
363 switch (shndx)
c906108c 364 {
0cc7b392
DJ
365 case SHN_MIPS_TEXT:
366 ms_type = mst_text;
367 break;
368 case SHN_MIPS_DATA:
369 ms_type = mst_data;
370 break;
371 case SHN_MIPS_ACOMMON:
372 ms_type = mst_bss;
373 break;
374 default:
375 ms_type = mst_abs;
376 }
377
378 /* If it is an Irix dynamic symbol, skip section name
0963b4bd 379 symbols, relocate all others by section offset. */
0cc7b392
DJ
380 if (ms_type != mst_abs)
381 {
382 if (sym->name[0] == '.')
383 continue;
c906108c 384 }
0cc7b392
DJ
385 }
386 else if (sym->section->flags & SEC_CODE)
387 {
bb869963 388 if (sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE))
c906108c 389 {
0875794a
JK
390 if (sym->flags & BSF_GNU_INDIRECT_FUNCTION)
391 ms_type = mst_text_gnu_ifunc;
392 else
393 ms_type = mst_text;
0cc7b392 394 }
90359a16
JK
395 /* The BSF_SYNTHETIC check is there to omit ppc64 function
396 descriptors mistaken for static functions starting with 'L'.
397 */
398 else if ((sym->name[0] == '.' && sym->name[1] == 'L'
399 && (sym->flags & BSF_SYNTHETIC) == 0)
0cc7b392
DJ
400 || ((sym->flags & BSF_LOCAL)
401 && sym->name[0] == '$'
402 && sym->name[1] == 'L'))
403 /* Looks like a compiler-generated label. Skip
404 it. The assembler should be skipping these (to
405 keep executables small), but apparently with
406 gcc on the (deleted) delta m88k SVR4, it loses.
407 So to have us check too should be harmless (but
408 I encourage people to fix this in the assembler
409 instead of adding checks here). */
410 continue;
411 else
412 {
413 ms_type = mst_file_text;
c906108c 414 }
0cc7b392
DJ
415 }
416 else if (sym->section->flags & SEC_ALLOC)
417 {
bb869963 418 if (sym->flags & (BSF_GLOBAL | BSF_WEAK | BSF_GNU_UNIQUE))
c906108c 419 {
0cc7b392 420 if (sym->section->flags & SEC_LOAD)
c906108c 421 {
0cc7b392 422 ms_type = mst_data;
c906108c 423 }
c906108c
SS
424 else
425 {
0cc7b392 426 ms_type = mst_bss;
c906108c
SS
427 }
428 }
0cc7b392 429 else if (sym->flags & BSF_LOCAL)
c906108c 430 {
0cc7b392
DJ
431 if (sym->section->flags & SEC_LOAD)
432 {
433 ms_type = mst_file_data;
c906108c
SS
434 }
435 else
436 {
0cc7b392 437 ms_type = mst_file_bss;
c906108c
SS
438 }
439 }
440 else
441 {
0cc7b392 442 ms_type = mst_unknown;
c906108c 443 }
0cc7b392
DJ
444 }
445 else
446 {
447 /* FIXME: Solaris2 shared libraries include lots of
dea91a5c 448 odd "absolute" and "undefined" symbols, that play
0cc7b392
DJ
449 hob with actions like finding what function the PC
450 is in. Ignore them if they aren't text, data, or bss. */
451 /* ms_type = mst_unknown; */
0963b4bd 452 continue; /* Skip this symbol. */
0cc7b392
DJ
453 }
454 msym = record_minimal_symbol
8dddcb8f 455 (reader, sym->name, strlen (sym->name), copy_names, symaddr,
0cc7b392 456 ms_type, sym->section, objfile);
6f610d07 457
0cc7b392
DJ
458 if (msym)
459 {
6f610d07 460 /* NOTE: uweigand-20071112: A synthetic symbol does not have an
24c274a1 461 ELF-private part. */
6f610d07 462 if (type != ST_SYNTHETIC)
24c274a1
AM
463 {
464 /* Pass symbol size field in via BFD. FIXME!!! */
465 elf_symbol_type *elf_sym = (elf_symbol_type *) sym;
466 SET_MSYMBOL_SIZE (msym, elf_sym->internal_elf_sym.st_size);
467 }
dea91a5c 468
a103a963 469 msym->filename = filesymname;
3e29f34a
MR
470 if (elf_make_msymbol_special_p)
471 gdbarch_elf_make_msymbol_special (gdbarch, sym, msym);
0cc7b392 472 }
2eaf8d2a 473
715c6909
TT
474 /* If we see a default versioned symbol, install it under
475 its version-less name. */
476 if (msym != NULL)
477 {
478 const char *atsign = strchr (sym->name, '@');
479
480 if (atsign != NULL && atsign[1] == '@' && atsign > sym->name)
481 {
482 int len = atsign - sym->name;
483
ce6c454e 484 record_minimal_symbol (reader, sym->name, len, true, symaddr,
715c6909
TT
485 ms_type, sym->section, objfile);
486 }
487 }
488
2eaf8d2a
DJ
489 /* For @plt symbols, also record a trampoline to the
490 destination symbol. The @plt symbol will be used in
491 disassembly, and the trampoline will be used when we are
492 trying to find the target. */
493 if (msym && ms_type == mst_text && type == ST_SYNTHETIC)
494 {
495 int len = strlen (sym->name);
496
497 if (len > 4 && strcmp (sym->name + len - 4, "@plt") == 0)
498 {
2eaf8d2a
DJ
499 struct minimal_symbol *mtramp;
500
ce6c454e
TT
501 mtramp = record_minimal_symbol (reader, sym->name, len - 4,
502 true, symaddr,
2eaf8d2a
DJ
503 mst_solib_trampoline,
504 sym->section, objfile);
505 if (mtramp)
506 {
d9eaeb59 507 SET_MSYMBOL_SIZE (mtramp, MSYMBOL_SIZE (msym));
422d65e7 508 mtramp->created_by_gdb = 1;
2eaf8d2a 509 mtramp->filename = filesymname;
3e29f34a
MR
510 if (elf_make_msymbol_special_p)
511 gdbarch_elf_make_msymbol_special (gdbarch,
512 sym, mtramp);
2eaf8d2a
DJ
513 }
514 }
515 }
c906108c 516 }
c906108c
SS
517 }
518}
519
07be84bf
JK
520/* Build minimal symbols named `function@got.plt' (see SYMBOL_GOT_PLT_SUFFIX)
521 for later look ups of which function to call when user requests
522 a STT_GNU_IFUNC function. As the STT_GNU_IFUNC type is found at the target
523 library defining `function' we cannot yet know while reading OBJFILE which
524 of the SYMBOL_GOT_PLT_SUFFIX entries will be needed and later
525 DYN_SYMBOL_TABLE is no longer easily available for OBJFILE. */
526
527static void
8dddcb8f
TT
528elf_rel_plt_read (minimal_symbol_reader &reader,
529 struct objfile *objfile, asymbol **dyn_symbol_table)
07be84bf
JK
530{
531 bfd *obfd = objfile->obfd;
532 const struct elf_backend_data *bed = get_elf_backend_data (obfd);
533 asection *plt, *relplt, *got_plt;
07be84bf
JK
534 int plt_elf_idx;
535 bfd_size_type reloc_count, reloc;
df6d5441 536 struct gdbarch *gdbarch = get_objfile_arch (objfile);
07be84bf
JK
537 struct type *ptr_type = builtin_type (gdbarch)->builtin_data_ptr;
538 size_t ptr_size = TYPE_LENGTH (ptr_type);
539
540 if (objfile->separate_debug_objfile_backlink)
541 return;
542
543 plt = bfd_get_section_by_name (obfd, ".plt");
544 if (plt == NULL)
545 return;
546 plt_elf_idx = elf_section_data (plt)->this_idx;
547
548 got_plt = bfd_get_section_by_name (obfd, ".got.plt");
549 if (got_plt == NULL)
4b7d1f7f
WN
550 {
551 /* For platforms where there is no separate .got.plt. */
552 got_plt = bfd_get_section_by_name (obfd, ".got");
553 if (got_plt == NULL)
554 return;
555 }
07be84bf
JK
556
557 /* This search algorithm is from _bfd_elf_canonicalize_dynamic_reloc. */
558 for (relplt = obfd->sections; relplt != NULL; relplt = relplt->next)
559 if (elf_section_data (relplt)->this_hdr.sh_info == plt_elf_idx
560 && (elf_section_data (relplt)->this_hdr.sh_type == SHT_REL
561 || elf_section_data (relplt)->this_hdr.sh_type == SHT_RELA))
562 break;
563 if (relplt == NULL)
564 return;
565
566 if (! bed->s->slurp_reloc_table (obfd, relplt, dyn_symbol_table, TRUE))
567 return;
568
26fcd5d7 569 std::string string_buffer;
07be84bf
JK
570
571 reloc_count = relplt->size / elf_section_data (relplt)->this_hdr.sh_entsize;
572 for (reloc = 0; reloc < reloc_count; reloc++)
573 {
22e048c9 574 const char *name;
07be84bf
JK
575 struct minimal_symbol *msym;
576 CORE_ADDR address;
26fcd5d7 577 const char *got_suffix = SYMBOL_GOT_PLT_SUFFIX;
07be84bf 578 const size_t got_suffix_len = strlen (SYMBOL_GOT_PLT_SUFFIX);
07be84bf
JK
579
580 name = bfd_asymbol_name (*relplt->relocation[reloc].sym_ptr_ptr);
07be84bf
JK
581 address = relplt->relocation[reloc].address;
582
583 /* Does the pointer reside in the .got.plt section? */
584 if (!(bfd_get_section_vma (obfd, got_plt) <= address
585 && address < bfd_get_section_vma (obfd, got_plt)
586 + bfd_get_section_size (got_plt)))
587 continue;
588
589 /* We cannot check if NAME is a reference to mst_text_gnu_ifunc as in
590 OBJFILE the symbol is undefined and the objfile having NAME defined
591 may not yet have been loaded. */
592
26fcd5d7
TT
593 string_buffer.assign (name);
594 string_buffer.append (got_suffix, got_suffix + got_suffix_len);
07be84bf 595
26fcd5d7
TT
596 msym = record_minimal_symbol (reader, string_buffer.c_str (),
597 string_buffer.size (),
ce6c454e 598 true, address, mst_slot_got_plt, got_plt,
07be84bf
JK
599 objfile);
600 if (msym)
d9eaeb59 601 SET_MSYMBOL_SIZE (msym, ptr_size);
07be84bf 602 }
07be84bf
JK
603}
604
605/* The data pointer is htab_t for gnu_ifunc_record_cache_unchecked. */
606
607static const struct objfile_data *elf_objfile_gnu_ifunc_cache_data;
608
609/* Map function names to CORE_ADDR in elf_objfile_gnu_ifunc_cache_data. */
610
611struct elf_gnu_ifunc_cache
612{
613 /* This is always a function entry address, not a function descriptor. */
614 CORE_ADDR addr;
615
616 char name[1];
617};
618
619/* htab_hash for elf_objfile_gnu_ifunc_cache_data. */
620
621static hashval_t
622elf_gnu_ifunc_cache_hash (const void *a_voidp)
623{
9a3c8263
SM
624 const struct elf_gnu_ifunc_cache *a
625 = (const struct elf_gnu_ifunc_cache *) a_voidp;
07be84bf
JK
626
627 return htab_hash_string (a->name);
628}
629
630/* htab_eq for elf_objfile_gnu_ifunc_cache_data. */
631
632static int
633elf_gnu_ifunc_cache_eq (const void *a_voidp, const void *b_voidp)
634{
9a3c8263
SM
635 const struct elf_gnu_ifunc_cache *a
636 = (const struct elf_gnu_ifunc_cache *) a_voidp;
637 const struct elf_gnu_ifunc_cache *b
638 = (const struct elf_gnu_ifunc_cache *) b_voidp;
07be84bf
JK
639
640 return strcmp (a->name, b->name) == 0;
641}
642
643/* Record the target function address of a STT_GNU_IFUNC function NAME is the
644 function entry address ADDR. Return 1 if NAME and ADDR are considered as
645 valid and therefore they were successfully recorded, return 0 otherwise.
646
647 Function does not expect a duplicate entry. Use
648 elf_gnu_ifunc_resolve_by_cache first to check if the entry for NAME already
649 exists. */
650
651static int
652elf_gnu_ifunc_record_cache (const char *name, CORE_ADDR addr)
653{
7cbd4a93 654 struct bound_minimal_symbol msym;
07be84bf
JK
655 asection *sect;
656 struct objfile *objfile;
657 htab_t htab;
658 struct elf_gnu_ifunc_cache entry_local, *entry_p;
659 void **slot;
660
661 msym = lookup_minimal_symbol_by_pc (addr);
7cbd4a93 662 if (msym.minsym == NULL)
07be84bf 663 return 0;
77e371c0 664 if (BMSYMBOL_VALUE_ADDRESS (msym) != addr)
07be84bf
JK
665 return 0;
666 /* minimal symbols have always SYMBOL_OBJ_SECTION non-NULL. */
efd66ac6 667 sect = MSYMBOL_OBJ_SECTION (msym.objfile, msym.minsym)->the_bfd_section;
e27d198c 668 objfile = msym.objfile;
07be84bf
JK
669
670 /* If .plt jumps back to .plt the symbol is still deferred for later
671 resolution and it has no use for GDB. Besides ".text" this symbol can
672 reside also in ".opd" for ppc64 function descriptor. */
673 if (strcmp (bfd_get_section_name (objfile->obfd, sect), ".plt") == 0)
674 return 0;
675
9a3c8263 676 htab = (htab_t) objfile_data (objfile, elf_objfile_gnu_ifunc_cache_data);
07be84bf
JK
677 if (htab == NULL)
678 {
679 htab = htab_create_alloc_ex (1, elf_gnu_ifunc_cache_hash,
680 elf_gnu_ifunc_cache_eq,
681 NULL, &objfile->objfile_obstack,
682 hashtab_obstack_allocate,
683 dummy_obstack_deallocate);
684 set_objfile_data (objfile, elf_objfile_gnu_ifunc_cache_data, htab);
685 }
686
687 entry_local.addr = addr;
688 obstack_grow (&objfile->objfile_obstack, &entry_local,
689 offsetof (struct elf_gnu_ifunc_cache, name));
690 obstack_grow_str0 (&objfile->objfile_obstack, name);
224c3ddb
SM
691 entry_p
692 = (struct elf_gnu_ifunc_cache *) obstack_finish (&objfile->objfile_obstack);
07be84bf
JK
693
694 slot = htab_find_slot (htab, entry_p, INSERT);
695 if (*slot != NULL)
696 {
9a3c8263
SM
697 struct elf_gnu_ifunc_cache *entry_found_p
698 = (struct elf_gnu_ifunc_cache *) *slot;
df6d5441 699 struct gdbarch *gdbarch = get_objfile_arch (objfile);
07be84bf
JK
700
701 if (entry_found_p->addr != addr)
702 {
703 /* This case indicates buggy inferior program, the resolved address
704 should never change. */
705
706 warning (_("gnu-indirect-function \"%s\" has changed its resolved "
707 "function_address from %s to %s"),
708 name, paddress (gdbarch, entry_found_p->addr),
709 paddress (gdbarch, addr));
710 }
711
712 /* New ENTRY_P is here leaked/duplicate in the OBJFILE obstack. */
713 }
714 *slot = entry_p;
715
716 return 1;
717}
718
719/* Try to find the target resolved function entry address of a STT_GNU_IFUNC
720 function NAME. If the address is found it is stored to *ADDR_P (if ADDR_P
721 is not NULL) and the function returns 1. It returns 0 otherwise.
722
723 Only the elf_objfile_gnu_ifunc_cache_data hash table is searched by this
724 function. */
725
726static int
727elf_gnu_ifunc_resolve_by_cache (const char *name, CORE_ADDR *addr_p)
728{
729 struct objfile *objfile;
730
731 ALL_PSPACE_OBJFILES (current_program_space, objfile)
732 {
733 htab_t htab;
734 struct elf_gnu_ifunc_cache *entry_p;
735 void **slot;
736
9a3c8263 737 htab = (htab_t) objfile_data (objfile, elf_objfile_gnu_ifunc_cache_data);
07be84bf
JK
738 if (htab == NULL)
739 continue;
740
224c3ddb
SM
741 entry_p = ((struct elf_gnu_ifunc_cache *)
742 alloca (sizeof (*entry_p) + strlen (name)));
07be84bf
JK
743 strcpy (entry_p->name, name);
744
745 slot = htab_find_slot (htab, entry_p, NO_INSERT);
746 if (slot == NULL)
747 continue;
9a3c8263 748 entry_p = (struct elf_gnu_ifunc_cache *) *slot;
07be84bf
JK
749 gdb_assert (entry_p != NULL);
750
751 if (addr_p)
752 *addr_p = entry_p->addr;
753 return 1;
754 }
755
756 return 0;
757}
758
759/* Try to find the target resolved function entry address of a STT_GNU_IFUNC
760 function NAME. If the address is found it is stored to *ADDR_P (if ADDR_P
761 is not NULL) and the function returns 1. It returns 0 otherwise.
762
763 Only the SYMBOL_GOT_PLT_SUFFIX locations are searched by this function.
764 elf_gnu_ifunc_resolve_by_cache must have been already called for NAME to
765 prevent cache entries duplicates. */
766
767static int
768elf_gnu_ifunc_resolve_by_got (const char *name, CORE_ADDR *addr_p)
769{
770 char *name_got_plt;
771 struct objfile *objfile;
772 const size_t got_suffix_len = strlen (SYMBOL_GOT_PLT_SUFFIX);
773
224c3ddb 774 name_got_plt = (char *) alloca (strlen (name) + got_suffix_len + 1);
07be84bf
JK
775 sprintf (name_got_plt, "%s" SYMBOL_GOT_PLT_SUFFIX, name);
776
777 ALL_PSPACE_OBJFILES (current_program_space, objfile)
778 {
779 bfd *obfd = objfile->obfd;
df6d5441 780 struct gdbarch *gdbarch = get_objfile_arch (objfile);
07be84bf
JK
781 struct type *ptr_type = builtin_type (gdbarch)->builtin_data_ptr;
782 size_t ptr_size = TYPE_LENGTH (ptr_type);
783 CORE_ADDR pointer_address, addr;
784 asection *plt;
224c3ddb 785 gdb_byte *buf = (gdb_byte *) alloca (ptr_size);
3b7344d5 786 struct bound_minimal_symbol msym;
07be84bf
JK
787
788 msym = lookup_minimal_symbol (name_got_plt, NULL, objfile);
3b7344d5 789 if (msym.minsym == NULL)
07be84bf 790 continue;
3b7344d5 791 if (MSYMBOL_TYPE (msym.minsym) != mst_slot_got_plt)
07be84bf 792 continue;
77e371c0 793 pointer_address = BMSYMBOL_VALUE_ADDRESS (msym);
07be84bf
JK
794
795 plt = bfd_get_section_by_name (obfd, ".plt");
796 if (plt == NULL)
797 continue;
798
3b7344d5 799 if (MSYMBOL_SIZE (msym.minsym) != ptr_size)
07be84bf
JK
800 continue;
801 if (target_read_memory (pointer_address, buf, ptr_size) != 0)
802 continue;
803 addr = extract_typed_address (buf, ptr_type);
804 addr = gdbarch_convert_from_func_ptr_addr (gdbarch, addr,
805 &current_target);
4b7d1f7f 806 addr = gdbarch_addr_bits_remove (gdbarch, addr);
07be84bf
JK
807
808 if (addr_p)
809 *addr_p = addr;
810 if (elf_gnu_ifunc_record_cache (name, addr))
811 return 1;
812 }
813
814 return 0;
815}
816
817/* Try to find the target resolved function entry address of a STT_GNU_IFUNC
818 function NAME. If the address is found it is stored to *ADDR_P (if ADDR_P
819 is not NULL) and the function returns 1. It returns 0 otherwise.
820
821 Both the elf_objfile_gnu_ifunc_cache_data hash table and
822 SYMBOL_GOT_PLT_SUFFIX locations are searched by this function. */
823
824static int
825elf_gnu_ifunc_resolve_name (const char *name, CORE_ADDR *addr_p)
826{
827 if (elf_gnu_ifunc_resolve_by_cache (name, addr_p))
828 return 1;
dea91a5c 829
07be84bf
JK
830 if (elf_gnu_ifunc_resolve_by_got (name, addr_p))
831 return 1;
832
833 return 0;
834}
835
836/* Call STT_GNU_IFUNC - a function returning addresss of a real function to
837 call. PC is theSTT_GNU_IFUNC resolving function entry. The value returned
838 is the entry point of the resolved STT_GNU_IFUNC target function to call.
839 */
840
841static CORE_ADDR
842elf_gnu_ifunc_resolve_addr (struct gdbarch *gdbarch, CORE_ADDR pc)
843{
2c02bd72 844 const char *name_at_pc;
07be84bf
JK
845 CORE_ADDR start_at_pc, address;
846 struct type *func_func_type = builtin_type (gdbarch)->builtin_func_func;
847 struct value *function, *address_val;
e1b2624a
AA
848 CORE_ADDR hwcap = 0;
849 struct value *hwcap_val;
07be84bf
JK
850
851 /* Try first any non-intrusive methods without an inferior call. */
852
853 if (find_pc_partial_function (pc, &name_at_pc, &start_at_pc, NULL)
854 && start_at_pc == pc)
855 {
856 if (elf_gnu_ifunc_resolve_name (name_at_pc, &address))
857 return address;
858 }
859 else
860 name_at_pc = NULL;
861
862 function = allocate_value (func_func_type);
1a088441 863 VALUE_LVAL (function) = lval_memory;
07be84bf
JK
864 set_value_address (function, pc);
865
e1b2624a
AA
866 /* STT_GNU_IFUNC resolver functions usually receive the HWCAP vector as
867 parameter. FUNCTION is the function entry address. ADDRESS may be a
868 function descriptor. */
07be84bf 869
e1b2624a
AA
870 target_auxv_search (&current_target, AT_HWCAP, &hwcap);
871 hwcap_val = value_from_longest (builtin_type (gdbarch)
872 ->builtin_unsigned_long, hwcap);
7022349d 873 address_val = call_function_by_hand (function, NULL, 1, &hwcap_val);
07be84bf
JK
874 address = value_as_address (address_val);
875 address = gdbarch_convert_from_func_ptr_addr (gdbarch, address,
876 &current_target);
4b7d1f7f 877 address = gdbarch_addr_bits_remove (gdbarch, address);
07be84bf
JK
878
879 if (name_at_pc)
880 elf_gnu_ifunc_record_cache (name_at_pc, address);
881
882 return address;
883}
884
0e30163f
JK
885/* Handle inferior hit of bp_gnu_ifunc_resolver, see its definition. */
886
887static void
888elf_gnu_ifunc_resolver_stop (struct breakpoint *b)
889{
890 struct breakpoint *b_return;
891 struct frame_info *prev_frame = get_prev_frame (get_current_frame ());
892 struct frame_id prev_frame_id = get_stack_frame_id (prev_frame);
893 CORE_ADDR prev_pc = get_frame_pc (prev_frame);
5d5658a1 894 int thread_id = ptid_to_global_thread_id (inferior_ptid);
0e30163f
JK
895
896 gdb_assert (b->type == bp_gnu_ifunc_resolver);
897
898 for (b_return = b->related_breakpoint; b_return != b;
899 b_return = b_return->related_breakpoint)
900 {
901 gdb_assert (b_return->type == bp_gnu_ifunc_resolver_return);
902 gdb_assert (b_return->loc != NULL && b_return->loc->next == NULL);
903 gdb_assert (frame_id_p (b_return->frame_id));
904
905 if (b_return->thread == thread_id
906 && b_return->loc->requested_address == prev_pc
907 && frame_id_eq (b_return->frame_id, prev_frame_id))
908 break;
909 }
910
911 if (b_return == b)
912 {
0e30163f
JK
913 /* No need to call find_pc_line for symbols resolving as this is only
914 a helper breakpointer never shown to the user. */
915
51abb421 916 symtab_and_line sal;
0e30163f
JK
917 sal.pspace = current_inferior ()->pspace;
918 sal.pc = prev_pc;
919 sal.section = find_pc_overlay (sal.pc);
920 sal.explicit_pc = 1;
454dafbd
TT
921 b_return
922 = set_momentary_breakpoint (get_frame_arch (prev_frame), sal,
923 prev_frame_id,
924 bp_gnu_ifunc_resolver_return).release ();
0e30163f 925
c70a6932
JK
926 /* set_momentary_breakpoint invalidates PREV_FRAME. */
927 prev_frame = NULL;
928
0e30163f
JK
929 /* Add new b_return to the ring list b->related_breakpoint. */
930 gdb_assert (b_return->related_breakpoint == b_return);
931 b_return->related_breakpoint = b->related_breakpoint;
932 b->related_breakpoint = b_return;
933 }
934}
935
936/* Handle inferior hit of bp_gnu_ifunc_resolver_return, see its definition. */
937
938static void
939elf_gnu_ifunc_resolver_return_stop (struct breakpoint *b)
940{
941 struct gdbarch *gdbarch = get_frame_arch (get_current_frame ());
942 struct type *func_func_type = builtin_type (gdbarch)->builtin_func_func;
943 struct type *value_type = TYPE_TARGET_TYPE (func_func_type);
944 struct regcache *regcache = get_thread_regcache (inferior_ptid);
6a3a010b 945 struct value *func_func;
0e30163f
JK
946 struct value *value;
947 CORE_ADDR resolved_address, resolved_pc;
0e30163f
JK
948
949 gdb_assert (b->type == bp_gnu_ifunc_resolver_return);
950
0e30163f
JK
951 while (b->related_breakpoint != b)
952 {
953 struct breakpoint *b_next = b->related_breakpoint;
954
955 switch (b->type)
956 {
957 case bp_gnu_ifunc_resolver:
958 break;
959 case bp_gnu_ifunc_resolver_return:
960 delete_breakpoint (b);
961 break;
962 default:
963 internal_error (__FILE__, __LINE__,
964 _("handle_inferior_event: Invalid "
965 "gnu-indirect-function breakpoint type %d"),
966 (int) b->type);
967 }
968 b = b_next;
969 }
970 gdb_assert (b->type == bp_gnu_ifunc_resolver);
6a3a010b
MR
971 gdb_assert (b->loc->next == NULL);
972
973 func_func = allocate_value (func_func_type);
1a088441 974 VALUE_LVAL (func_func) = lval_memory;
6a3a010b
MR
975 set_value_address (func_func, b->loc->related_address);
976
977 value = allocate_value (value_type);
978 gdbarch_return_value (gdbarch, func_func, value_type, regcache,
979 value_contents_raw (value), NULL);
980 resolved_address = value_as_address (value);
981 resolved_pc = gdbarch_convert_from_func_ptr_addr (gdbarch,
982 resolved_address,
983 &current_target);
4b7d1f7f 984 resolved_pc = gdbarch_addr_bits_remove (gdbarch, resolved_pc);
0e30163f 985
f8eba3c6 986 gdb_assert (current_program_space == b->pspace || b->pspace == NULL);
d28cd78a 987 elf_gnu_ifunc_record_cache (event_location_to_string (b->location.get ()),
f00aae0f 988 resolved_pc);
0e30163f 989
0e30163f 990 b->type = bp_breakpoint;
6c5b2ebe
PA
991 update_breakpoint_locations (b, current_program_space,
992 find_pc_line (resolved_pc, 0), {});
0e30163f
JK
993}
994
2750ef27
TT
995/* A helper function for elf_symfile_read that reads the minimal
996 symbols. */
c906108c
SS
997
998static void
5f6cac40
TT
999elf_read_minimal_symbols (struct objfile *objfile, int symfile_flags,
1000 const struct elfinfo *ei)
c906108c 1001{
63524580 1002 bfd *synth_abfd, *abfd = objfile->obfd;
62553543
EZ
1003 long symcount = 0, dynsymcount = 0, synthcount, storage_needed;
1004 asymbol **symbol_table = NULL, **dyn_symbol_table = NULL;
1005 asymbol *synthsyms;
d2f4b8fe 1006 struct dbx_symfile_info *dbx;
c906108c 1007
45cfd468
DE
1008 if (symtab_create_debug)
1009 {
1010 fprintf_unfiltered (gdb_stdlog,
1011 "Reading minimal symbols of objfile %s ...\n",
4262abfb 1012 objfile_name (objfile));
45cfd468
DE
1013 }
1014
5f6cac40
TT
1015 /* If we already have minsyms, then we can skip some work here.
1016 However, if there were stabs or mdebug sections, we go ahead and
1017 redo all the work anyway, because the psym readers for those
1018 kinds of debuginfo need extra information found here. This can
1019 go away once all types of symbols are in the per-BFD object. */
1020 if (objfile->per_bfd->minsyms_read
1021 && ei->stabsect == NULL
1022 && ei->mdebugsect == NULL)
1023 {
1024 if (symtab_create_debug)
1025 fprintf_unfiltered (gdb_stdlog,
1026 "... minimal symbols previously read\n");
1027 return;
1028 }
1029
d25e8719 1030 minimal_symbol_reader reader (objfile);
c906108c 1031
0963b4bd 1032 /* Allocate struct to keep track of the symfile. */
d2f4b8fe
TT
1033 dbx = XCNEW (struct dbx_symfile_info);
1034 set_objfile_data (objfile, dbx_objfile_data_key, dbx);
c906108c 1035
18a94d75 1036 /* Process the normal ELF symbol table first. */
c906108c 1037
62553543
EZ
1038 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
1039 if (storage_needed < 0)
3e43a32a
MS
1040 error (_("Can't read symbols from %s: %s"),
1041 bfd_get_filename (objfile->obfd),
62553543
EZ
1042 bfd_errmsg (bfd_get_error ()));
1043
1044 if (storage_needed > 0)
1045 {
80c57053
JK
1046 /* Memory gets permanently referenced from ABFD after
1047 bfd_canonicalize_symtab so it must not get freed before ABFD gets. */
1048
224c3ddb 1049 symbol_table = (asymbol **) bfd_alloc (abfd, storage_needed);
62553543
EZ
1050 symcount = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
1051
1052 if (symcount < 0)
3e43a32a
MS
1053 error (_("Can't read symbols from %s: %s"),
1054 bfd_get_filename (objfile->obfd),
62553543
EZ
1055 bfd_errmsg (bfd_get_error ()));
1056
ce6c454e
TT
1057 elf_symtab_read (reader, objfile, ST_REGULAR, symcount, symbol_table,
1058 false);
62553543 1059 }
c906108c
SS
1060
1061 /* Add the dynamic symbols. */
1062
62553543
EZ
1063 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
1064
1065 if (storage_needed > 0)
1066 {
3f1eff0a
JK
1067 /* Memory gets permanently referenced from ABFD after
1068 bfd_get_synthetic_symtab so it must not get freed before ABFD gets.
1069 It happens only in the case when elf_slurp_reloc_table sees
1070 asection->relocation NULL. Determining which section is asection is
1071 done by _bfd_elf_get_synthetic_symtab which is all a bfd
1072 implementation detail, though. */
1073
224c3ddb 1074 dyn_symbol_table = (asymbol **) bfd_alloc (abfd, storage_needed);
62553543
EZ
1075 dynsymcount = bfd_canonicalize_dynamic_symtab (objfile->obfd,
1076 dyn_symbol_table);
1077
1078 if (dynsymcount < 0)
3e43a32a
MS
1079 error (_("Can't read symbols from %s: %s"),
1080 bfd_get_filename (objfile->obfd),
62553543
EZ
1081 bfd_errmsg (bfd_get_error ()));
1082
8dddcb8f 1083 elf_symtab_read (reader, objfile, ST_DYNAMIC, dynsymcount,
ce6c454e 1084 dyn_symbol_table, false);
07be84bf 1085
8dddcb8f 1086 elf_rel_plt_read (reader, objfile, dyn_symbol_table);
62553543
EZ
1087 }
1088
63524580
JK
1089 /* Contrary to binutils --strip-debug/--only-keep-debug the strip command from
1090 elfutils (eu-strip) moves even the .symtab section into the .debug file.
1091
1092 bfd_get_synthetic_symtab on ppc64 for each function descriptor ELF symbol
1093 'name' creates a new BSF_SYNTHETIC ELF symbol '.name' with its code
1094 address. But with eu-strip files bfd_get_synthetic_symtab would fail to
1095 read the code address from .opd while it reads the .symtab section from
1096 a separate debug info file as the .opd section is SHT_NOBITS there.
1097
1098 With SYNTH_ABFD the .opd section will be read from the original
1099 backlinked binary where it is valid. */
1100
1101 if (objfile->separate_debug_objfile_backlink)
1102 synth_abfd = objfile->separate_debug_objfile_backlink->obfd;
1103 else
1104 synth_abfd = abfd;
1105
62553543
EZ
1106 /* Add synthetic symbols - for instance, names for any PLT entries. */
1107
63524580 1108 synthcount = bfd_get_synthetic_symtab (synth_abfd, symcount, symbol_table,
62553543
EZ
1109 dynsymcount, dyn_symbol_table,
1110 &synthsyms);
1111 if (synthcount > 0)
1112 {
62553543
EZ
1113 long i;
1114
b22e99fd 1115 std::unique_ptr<asymbol *[]>
d1e4a624 1116 synth_symbol_table (new asymbol *[synthcount]);
62553543 1117 for (i = 0; i < synthcount; i++)
9f20e3da 1118 synth_symbol_table[i] = synthsyms + i;
8dddcb8f 1119 elf_symtab_read (reader, objfile, ST_SYNTHETIC, synthcount,
ce6c454e 1120 synth_symbol_table.get (), true);
ba713918
AL
1121
1122 xfree (synthsyms);
1123 synthsyms = NULL;
62553543 1124 }
c906108c 1125
7134143f
DJ
1126 /* Install any minimal symbols that have been collected as the current
1127 minimal symbols for this objfile. The debug readers below this point
1128 should not generate new minimal symbols; if they do it's their
1129 responsibility to install them. "mdebug" appears to be the only one
1130 which will do this. */
1131
d25e8719 1132 reader.install ();
7134143f 1133
4f00dda3
DE
1134 if (symtab_create_debug)
1135 fprintf_unfiltered (gdb_stdlog, "Done reading minimal symbols.\n");
2750ef27
TT
1136}
1137
1138/* Scan and build partial symbols for a symbol file.
1139 We have been initialized by a call to elf_symfile_init, which
1140 currently does nothing.
1141
2750ef27
TT
1142 This function only does the minimum work necessary for letting the
1143 user "name" things symbolically; it does not read the entire symtab.
1144 Instead, it reads the external and static symbols and puts them in partial
1145 symbol tables. When more extensive information is requested of a
1146 file, the corresponding partial symbol table is mutated into a full
1147 fledged symbol table by going back and reading the symbols
1148 for real.
1149
1150 We look for sections with specific names, to tell us what debug
1151 format to look for: FIXME!!!
1152
1153 elfstab_build_psymtabs() handles STABS symbols;
1154 mdebug_build_psymtabs() handles ECOFF debugging information.
1155
1156 Note that ELF files have a "minimal" symbol table, which looks a lot
1157 like a COFF symbol table, but has only the minimal information necessary
1158 for linking. We process this also, and use the information to
1159 build gdb's minimal symbol table. This gives us some minimal debugging
1160 capability even for files compiled without -g. */
1161
1162static void
b15cc25c 1163elf_symfile_read (struct objfile *objfile, symfile_add_flags symfile_flags)
2750ef27
TT
1164{
1165 bfd *abfd = objfile->obfd;
1166 struct elfinfo ei;
1167
2750ef27 1168 memset ((char *) &ei, 0, sizeof (ei));
97cbe998
SDJ
1169 if (!(objfile->flags & OBJF_READNEVER))
1170 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c 1171
5f6cac40
TT
1172 elf_read_minimal_symbols (objfile, symfile_flags, &ei);
1173
c906108c
SS
1174 /* ELF debugging information is inserted into the psymtab in the
1175 order of least informative first - most informative last. Since
1176 the psymtab table is searched `most recent insertion first' this
1177 increases the probability that more detailed debug information
1178 for a section is found.
1179
1180 For instance, an object file might contain both .mdebug (XCOFF)
1181 and .debug_info (DWARF2) sections then .mdebug is inserted first
1182 (searched last) and DWARF2 is inserted last (searched first). If
1183 we don't do this then the XCOFF info is found first - for code in
0963b4bd 1184 an included file XCOFF info is useless. */
c906108c
SS
1185
1186 if (ei.mdebugsect)
1187 {
1188 const struct ecoff_debug_swap *swap;
1189
1190 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 1191 information. */
c906108c
SS
1192 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
1193 if (swap)
d4f3574e 1194 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
1195 }
1196 if (ei.stabsect)
1197 {
1198 asection *str_sect;
1199
1200 /* Stab sections have an associated string table that looks like
c5aa993b 1201 a separate section. */
c906108c
SS
1202 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
1203
1204 /* FIXME should probably warn about a stab section without a stabstr. */
1205 if (str_sect)
1206 elfstab_build_psymtabs (objfile,
086df311 1207 ei.stabsect,
c906108c
SS
1208 str_sect->filepos,
1209 bfd_section_size (abfd, str_sect));
1210 }
9291a0cd 1211
251d32d9 1212 if (dwarf2_has_info (objfile, NULL))
b11896a5 1213 {
3e03848b
JK
1214 /* elf_sym_fns_gdb_index cannot handle simultaneous non-DWARF debug
1215 information present in OBJFILE. If there is such debug info present
1216 never use .gdb_index. */
1217
abccd1e7 1218 if (objfile_has_partial_symbols (objfile))
b11896a5
TT
1219 {
1220 /* It is ok to do this even if the stabs reader made some
1221 partial symbols, because OBJF_PSYMTABS_READ has not been
1222 set, and so our lazy reader function will still be called
1223 when needed. */
8fb8eb5c 1224 objfile_set_sym_fns (objfile, &elf_sym_fns_lazy_psyms);
b11896a5 1225 }
abccd1e7
JK
1226 else
1227 objfile_set_sym_fns (objfile, &dwarf2_initialize_objfile (objfile));
b11896a5 1228 }
3e43a32a
MS
1229 /* If the file has its own symbol tables it has no separate debug
1230 info. `.dynsym'/`.symtab' go to MSYMBOLS, `.debug_info' goes to
1231 SYMTABS/PSYMTABS. `.gnu_debuglink' may no longer be present with
8a92335b
JK
1232 `.note.gnu.build-id'.
1233
1234 .gnu_debugdata is !objfile_has_partial_symbols because it contains only
1235 .symtab, not .debug_* section. But if we already added .gnu_debugdata as
1236 an objfile via find_separate_debug_file_in_section there was no separate
1237 debug info available. Therefore do not attempt to search for another one,
1238 objfile->separate_debug_objfile->separate_debug_objfile GDB guarantees to
1239 be NULL and we would possibly violate it. */
1240
1241 else if (!objfile_has_partial_symbols (objfile)
1242 && objfile->separate_debug_objfile == NULL
1243 && objfile->separate_debug_objfile_backlink == NULL)
9cce227f 1244 {
192b62ce
TT
1245 gdb::unique_xmalloc_ptr<char> debugfile
1246 (find_separate_debug_file_by_buildid (objfile));
9cce227f
TG
1247
1248 if (debugfile == NULL)
192b62ce 1249 debugfile.reset (find_separate_debug_file_by_debuglink (objfile));
9cce227f 1250
192b62ce 1251 if (debugfile != NULL)
9cce227f 1252 {
192b62ce 1253 gdb_bfd_ref_ptr abfd (symfile_bfd_open (debugfile.get ()));
d7f9d729 1254
192b62ce
TT
1255 symbol_file_add_separate (abfd.get (), debugfile.get (),
1256 symfile_flags, objfile);
9cce227f
TG
1257 }
1258 }
c906108c
SS
1259}
1260
b11896a5
TT
1261/* Callback to lazily read psymtabs. */
1262
1263static void
1264read_psyms (struct objfile *objfile)
1265{
251d32d9 1266 if (dwarf2_has_info (objfile, NULL))
b11896a5
TT
1267 dwarf2_build_psymtabs (objfile);
1268}
1269
c906108c
SS
1270/* Initialize anything that needs initializing when a completely new symbol
1271 file is specified (not just adding some symbols from another file, e.g. a
1272 shared library).
1273
3e43a32a
MS
1274 We reinitialize buildsym, since we may be reading stabs from an ELF
1275 file. */
c906108c
SS
1276
1277static void
fba45db2 1278elf_new_init (struct objfile *ignore)
c906108c
SS
1279{
1280 stabsread_new_init ();
1281 buildsym_new_init ();
1282}
1283
1284/* Perform any local cleanups required when we are done with a particular
1285 objfile. I.E, we are in the process of discarding all symbol information
1286 for an objfile, freeing up all memory held for it, and unlinking the
0963b4bd 1287 objfile struct from the global list of known objfiles. */
c906108c
SS
1288
1289static void
fba45db2 1290elf_symfile_finish (struct objfile *objfile)
c906108c 1291{
fe3e1990 1292 dwarf2_free_objfile (objfile);
c906108c
SS
1293}
1294
db7a9bcd 1295/* ELF specific initialization routine for reading symbols. */
c906108c
SS
1296
1297static void
fba45db2 1298elf_symfile_init (struct objfile *objfile)
c906108c
SS
1299{
1300 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
1301 find this causes a significant slowdown in gdb then we could
1302 set it in the debug symbol readers only when necessary. */
1303 objfile->flags |= OBJF_REORDERED;
1304}
1305
55aa24fb
SDJ
1306/* Implementation of `sym_get_probes', as documented in symfile.h. */
1307
aaa63a31 1308static const std::vector<probe *> &
55aa24fb
SDJ
1309elf_get_probes (struct objfile *objfile)
1310{
aaa63a31 1311 std::vector<probe *> *probes_per_bfd;
55aa24fb
SDJ
1312
1313 /* Have we parsed this objfile's probes already? */
aaa63a31 1314 probes_per_bfd = (std::vector<probe *> *) bfd_data (objfile->obfd, probe_key);
55aa24fb 1315
aaa63a31 1316 if (probes_per_bfd == NULL)
55aa24fb 1317 {
aaa63a31 1318 probes_per_bfd = new std::vector<probe *>;
55aa24fb
SDJ
1319
1320 /* Here we try to gather information about all types of probes from the
1321 objfile. */
935676c9 1322 for (const static_probe_ops *ops : all_static_probe_ops)
0782db84 1323 ops->get_probes (probes_per_bfd, objfile);
55aa24fb 1324
5d9cf8a4 1325 set_bfd_data (objfile->obfd, probe_key, probes_per_bfd);
55aa24fb
SDJ
1326 }
1327
aaa63a31 1328 return *probes_per_bfd;
55aa24fb
SDJ
1329}
1330
55aa24fb
SDJ
1331/* Helper function used to free the space allocated for storing SystemTap
1332 probe information. */
1333
1334static void
5d9cf8a4 1335probe_key_free (bfd *abfd, void *d)
55aa24fb 1336{
aaa63a31 1337 std::vector<probe *> *probes = (std::vector<probe *> *) d;
55aa24fb 1338
63f0e930 1339 for (probe *p : *probes)
935676c9 1340 delete p;
55aa24fb 1341
aaa63a31 1342 delete probes;
55aa24fb
SDJ
1343}
1344
c906108c 1345\f
55aa24fb
SDJ
1346
1347/* Implementation `sym_probe_fns', as documented in symfile.h. */
1348
1349static const struct sym_probe_fns elf_probe_fns =
1350{
25f9533e 1351 elf_get_probes, /* sym_get_probes */
55aa24fb
SDJ
1352};
1353
c906108c
SS
1354/* Register that we are able to handle ELF object file formats. */
1355
00b5771c 1356static const struct sym_fns elf_sym_fns =
c906108c 1357{
3e43a32a
MS
1358 elf_new_init, /* init anything gbl to entire symtab */
1359 elf_symfile_init, /* read initial info, setup for sym_read() */
1360 elf_symfile_read, /* read a symbol file into symtab */
b11896a5
TT
1361 NULL, /* sym_read_psymbols */
1362 elf_symfile_finish, /* finished with file, cleanup */
1363 default_symfile_offsets, /* Translate ext. to int. relocation */
1364 elf_symfile_segments, /* Get segment information from a file. */
1365 NULL,
1366 default_symfile_relocate, /* Relocate a debug section. */
55aa24fb 1367 &elf_probe_fns, /* sym_probe_fns */
b11896a5
TT
1368 &psym_functions
1369};
1370
1371/* The same as elf_sym_fns, but not registered and lazily reads
1372 psymbols. */
1373
e36122e9 1374const struct sym_fns elf_sym_fns_lazy_psyms =
b11896a5 1375{
b11896a5
TT
1376 elf_new_init, /* init anything gbl to entire symtab */
1377 elf_symfile_init, /* read initial info, setup for sym_read() */
1378 elf_symfile_read, /* read a symbol file into symtab */
1379 read_psyms, /* sym_read_psymbols */
3e43a32a
MS
1380 elf_symfile_finish, /* finished with file, cleanup */
1381 default_symfile_offsets, /* Translate ext. to int. relocation */
1382 elf_symfile_segments, /* Get segment information from a file. */
1383 NULL,
1384 default_symfile_relocate, /* Relocate a debug section. */
55aa24fb 1385 &elf_probe_fns, /* sym_probe_fns */
00b5771c 1386 &psym_functions
c906108c
SS
1387};
1388
9291a0cd
TT
1389/* The same as elf_sym_fns, but not registered and uses the
1390 DWARF-specific GNU index rather than psymtab. */
e36122e9 1391const struct sym_fns elf_sym_fns_gdb_index =
9291a0cd 1392{
3e43a32a
MS
1393 elf_new_init, /* init anything gbl to entire symab */
1394 elf_symfile_init, /* read initial info, setup for sym_red() */
1395 elf_symfile_read, /* read a symbol file into symtab */
b11896a5 1396 NULL, /* sym_read_psymbols */
3e43a32a
MS
1397 elf_symfile_finish, /* finished with file, cleanup */
1398 default_symfile_offsets, /* Translate ext. to int. relocatin */
1399 elf_symfile_segments, /* Get segment information from a file. */
1400 NULL,
1401 default_symfile_relocate, /* Relocate a debug section. */
55aa24fb 1402 &elf_probe_fns, /* sym_probe_fns */
00b5771c 1403 &dwarf2_gdb_index_functions
9291a0cd
TT
1404};
1405
927aa2e7
JK
1406/* The same as elf_sym_fns, but not registered and uses the
1407 DWARF-specific .debug_names index rather than psymtab. */
1408const struct sym_fns elf_sym_fns_debug_names =
1409{
1410 elf_new_init, /* init anything gbl to entire symab */
1411 elf_symfile_init, /* read initial info, setup for sym_red() */
1412 elf_symfile_read, /* read a symbol file into symtab */
1413 NULL, /* sym_read_psymbols */
1414 elf_symfile_finish, /* finished with file, cleanup */
1415 default_symfile_offsets, /* Translate ext. to int. relocatin */
1416 elf_symfile_segments, /* Get segment information from a file. */
1417 NULL,
1418 default_symfile_relocate, /* Relocate a debug section. */
1419 &elf_probe_fns, /* sym_probe_fns */
1420 &dwarf2_debug_names_functions
1421};
1422
07be84bf
JK
1423/* STT_GNU_IFUNC resolver vector to be installed to gnu_ifunc_fns_p. */
1424
1425static const struct gnu_ifunc_fns elf_gnu_ifunc_fns =
1426{
1427 elf_gnu_ifunc_resolve_addr,
1428 elf_gnu_ifunc_resolve_name,
0e30163f
JK
1429 elf_gnu_ifunc_resolver_stop,
1430 elf_gnu_ifunc_resolver_return_stop
07be84bf
JK
1431};
1432
c906108c 1433void
fba45db2 1434_initialize_elfread (void)
c906108c 1435{
5d9cf8a4 1436 probe_key = register_bfd_data_with_cleanup (NULL, probe_key_free);
c256e171 1437 add_symtab_fns (bfd_target_elf_flavour, &elf_sym_fns);
07be84bf
JK
1438
1439 elf_objfile_gnu_ifunc_cache_data = register_objfile_data ();
1440 gnu_ifunc_fns_p = &elf_gnu_ifunc_fns;
c906108c 1441}
This page took 2.189351 seconds and 4 git commands to generate.