diff options
Diffstat (limited to 'contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp')
| -rw-r--r-- | contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp | 3380 | 
1 files changed, 3380 insertions, 0 deletions
diff --git a/contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp b/contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp new file mode 100644 index 000000000000..d62afa34bbe8 --- /dev/null +++ b/contrib/llvm-project/lldb/source/Plugins/ObjectFile/ELF/ObjectFileELF.cpp @@ -0,0 +1,3380 @@ +//===-- ObjectFileELF.cpp ------------------------------------- -*- C++ -*-===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "ObjectFileELF.h" + +#include <algorithm> +#include <cassert> +#include <unordered_map> + +#include "lldb/Core/FileSpecList.h" +#include "lldb/Core/Module.h" +#include "lldb/Core/ModuleSpec.h" +#include "lldb/Core/PluginManager.h" +#include "lldb/Core/Section.h" +#include "lldb/Host/FileSystem.h" +#include "lldb/Symbol/DWARFCallFrameInfo.h" +#include "lldb/Symbol/SymbolContext.h" +#include "lldb/Target/SectionLoadList.h" +#include "lldb/Target/Target.h" +#include "lldb/Utility/ArchSpec.h" +#include "lldb/Utility/DataBufferHeap.h" +#include "lldb/Utility/Log.h" +#include "lldb/Utility/RangeMap.h" +#include "lldb/Utility/Status.h" +#include "lldb/Utility/Stream.h" +#include "lldb/Utility/Timer.h" + +#include "llvm/ADT/IntervalMap.h" +#include "llvm/ADT/PointerUnion.h" +#include "llvm/ADT/StringRef.h" +#include "llvm/Object/Decompressor.h" +#include "llvm/Support/ARMBuildAttributes.h" +#include "llvm/Support/MathExtras.h" +#include "llvm/Support/MemoryBuffer.h" +#include "llvm/Support/MipsABIFlags.h" + +#define CASE_AND_STREAM(s, def, width)                                         \ +  case def:                                                                    \ +    s->Printf("%-*s", width, #def);                                            \ +    break; + +using namespace lldb; +using namespace lldb_private; +using namespace elf; +using namespace llvm::ELF; + +namespace { + +// ELF note owner definitions +const char *const LLDB_NT_OWNER_FREEBSD = "FreeBSD"; +const char *const LLDB_NT_OWNER_GNU = "GNU"; +const char *const LLDB_NT_OWNER_NETBSD = "NetBSD"; +const char *const LLDB_NT_OWNER_NETBSDCORE = "NetBSD-CORE"; +const char *const LLDB_NT_OWNER_OPENBSD = "OpenBSD"; +const char *const LLDB_NT_OWNER_ANDROID = "Android"; +const char *const LLDB_NT_OWNER_CORE = "CORE"; +const char *const LLDB_NT_OWNER_LINUX = "LINUX"; + +// ELF note type definitions +const elf_word LLDB_NT_FREEBSD_ABI_TAG = 0x01; +const elf_word LLDB_NT_FREEBSD_ABI_SIZE = 4; + +const elf_word LLDB_NT_GNU_ABI_TAG = 0x01; +const elf_word LLDB_NT_GNU_ABI_SIZE = 16; + +const elf_word LLDB_NT_GNU_BUILD_ID_TAG = 0x03; + +const elf_word LLDB_NT_NETBSD_IDENT_TAG = 1; +const elf_word LLDB_NT_NETBSD_IDENT_DESCSZ = 4; +const elf_word LLDB_NT_NETBSD_IDENT_NAMESZ = 7; +const elf_word LLDB_NT_NETBSD_PROCINFO = 1; + +// GNU ABI note OS constants +const elf_word LLDB_NT_GNU_ABI_OS_LINUX = 0x00; +const elf_word LLDB_NT_GNU_ABI_OS_HURD = 0x01; +const elf_word LLDB_NT_GNU_ABI_OS_SOLARIS = 0x02; + +// LLDB_NT_OWNER_CORE and LLDB_NT_OWNER_LINUX note contants +#define NT_PRSTATUS 1 +#define NT_PRFPREG 2 +#define NT_PRPSINFO 3 +#define NT_TASKSTRUCT 4 +#define NT_AUXV 6 +#define NT_SIGINFO 0x53494749 +#define NT_FILE 0x46494c45 +#define NT_PRXFPREG 0x46e62b7f +#define NT_PPC_VMX 0x100 +#define NT_PPC_SPE 0x101 +#define NT_PPC_VSX 0x102 +#define NT_386_TLS 0x200 +#define NT_386_IOPERM 0x201 +#define NT_X86_XSTATE 0x202 +#define NT_S390_HIGH_GPRS 0x300 +#define NT_S390_TIMER 0x301 +#define NT_S390_TODCMP 0x302 +#define NT_S390_TODPREG 0x303 +#define NT_S390_CTRS 0x304 +#define NT_S390_PREFIX 0x305 +#define NT_S390_LAST_BREAK 0x306 +#define NT_S390_SYSTEM_CALL 0x307 +#define NT_S390_TDB 0x308 +#define NT_S390_VXRS_LOW 0x309 +#define NT_S390_VXRS_HIGH 0x30a +#define NT_ARM_VFP 0x400 +#define NT_ARM_TLS 0x401 +#define NT_ARM_HW_BREAK 0x402 +#define NT_ARM_HW_WATCH 0x403 +#define NT_ARM_SYSTEM_CALL 0x404 +#define NT_METAG_CBUF 0x500 +#define NT_METAG_RPIPE 0x501 +#define NT_METAG_TLS 0x502 + +//===----------------------------------------------------------------------===// +/// \class ELFRelocation +/// Generic wrapper for ELFRel and ELFRela. +/// +/// This helper class allows us to parse both ELFRel and ELFRela relocation +/// entries in a generic manner. +class ELFRelocation { +public: +  /// Constructs an ELFRelocation entry with a personality as given by @p +  /// type. +  /// +  /// \param type Either DT_REL or DT_RELA.  Any other value is invalid. +  ELFRelocation(unsigned type); + +  ~ELFRelocation(); + +  bool Parse(const lldb_private::DataExtractor &data, lldb::offset_t *offset); + +  static unsigned RelocType32(const ELFRelocation &rel); + +  static unsigned RelocType64(const ELFRelocation &rel); + +  static unsigned RelocSymbol32(const ELFRelocation &rel); + +  static unsigned RelocSymbol64(const ELFRelocation &rel); + +  static unsigned RelocOffset32(const ELFRelocation &rel); + +  static unsigned RelocOffset64(const ELFRelocation &rel); + +  static unsigned RelocAddend32(const ELFRelocation &rel); + +  static unsigned RelocAddend64(const ELFRelocation &rel); + +private: +  typedef llvm::PointerUnion<ELFRel *, ELFRela *> RelocUnion; + +  RelocUnion reloc; +}; + +ELFRelocation::ELFRelocation(unsigned type) { +  if (type == DT_REL || type == SHT_REL) +    reloc = new ELFRel(); +  else if (type == DT_RELA || type == SHT_RELA) +    reloc = new ELFRela(); +  else { +    assert(false && "unexpected relocation type"); +    reloc = static_cast<ELFRel *>(nullptr); +  } +} + +ELFRelocation::~ELFRelocation() { +  if (reloc.is<ELFRel *>()) +    delete reloc.get<ELFRel *>(); +  else +    delete reloc.get<ELFRela *>(); +} + +bool ELFRelocation::Parse(const lldb_private::DataExtractor &data, +                          lldb::offset_t *offset) { +  if (reloc.is<ELFRel *>()) +    return reloc.get<ELFRel *>()->Parse(data, offset); +  else +    return reloc.get<ELFRela *>()->Parse(data, offset); +} + +unsigned ELFRelocation::RelocType32(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return ELFRel::RelocType32(*rel.reloc.get<ELFRel *>()); +  else +    return ELFRela::RelocType32(*rel.reloc.get<ELFRela *>()); +} + +unsigned ELFRelocation::RelocType64(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return ELFRel::RelocType64(*rel.reloc.get<ELFRel *>()); +  else +    return ELFRela::RelocType64(*rel.reloc.get<ELFRela *>()); +} + +unsigned ELFRelocation::RelocSymbol32(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return ELFRel::RelocSymbol32(*rel.reloc.get<ELFRel *>()); +  else +    return ELFRela::RelocSymbol32(*rel.reloc.get<ELFRela *>()); +} + +unsigned ELFRelocation::RelocSymbol64(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return ELFRel::RelocSymbol64(*rel.reloc.get<ELFRel *>()); +  else +    return ELFRela::RelocSymbol64(*rel.reloc.get<ELFRela *>()); +} + +unsigned ELFRelocation::RelocOffset32(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return rel.reloc.get<ELFRel *>()->r_offset; +  else +    return rel.reloc.get<ELFRela *>()->r_offset; +} + +unsigned ELFRelocation::RelocOffset64(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return rel.reloc.get<ELFRel *>()->r_offset; +  else +    return rel.reloc.get<ELFRela *>()->r_offset; +} + +unsigned ELFRelocation::RelocAddend32(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return 0; +  else +    return rel.reloc.get<ELFRela *>()->r_addend; +} + +unsigned ELFRelocation::RelocAddend64(const ELFRelocation &rel) { +  if (rel.reloc.is<ELFRel *>()) +    return 0; +  else +    return rel.reloc.get<ELFRela *>()->r_addend; +} + +} // end anonymous namespace + +static user_id_t SegmentID(size_t PHdrIndex) { return ~PHdrIndex; } + +bool ELFNote::Parse(const DataExtractor &data, lldb::offset_t *offset) { +  // Read all fields. +  if (data.GetU32(offset, &n_namesz, 3) == nullptr) +    return false; + +  // The name field is required to be nul-terminated, and n_namesz includes the +  // terminating nul in observed implementations (contrary to the ELF-64 spec). +  // A special case is needed for cores generated by some older Linux versions, +  // which write a note named "CORE" without a nul terminator and n_namesz = 4. +  if (n_namesz == 4) { +    char buf[4]; +    if (data.ExtractBytes(*offset, 4, data.GetByteOrder(), buf) != 4) +      return false; +    if (strncmp(buf, "CORE", 4) == 0) { +      n_name = "CORE"; +      *offset += 4; +      return true; +    } +  } + +  const char *cstr = data.GetCStr(offset, llvm::alignTo(n_namesz, 4)); +  if (cstr == nullptr) { +    Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_SYMBOLS)); +    if (log) +      log->Printf("Failed to parse note name lacking nul terminator"); + +    return false; +  } +  n_name = cstr; +  return true; +} + +static uint32_t mipsVariantFromElfFlags (const elf::ELFHeader &header) { +  const uint32_t mips_arch = header.e_flags & llvm::ELF::EF_MIPS_ARCH; +  uint32_t endian = header.e_ident[EI_DATA]; +  uint32_t arch_variant = ArchSpec::eMIPSSubType_unknown; +  uint32_t fileclass = header.e_ident[EI_CLASS]; + +  // If there aren't any elf flags available (e.g core elf file) then return +  // default +  // 32 or 64 bit arch (without any architecture revision) based on object file's class. +  if (header.e_type == ET_CORE) { +    switch (fileclass) { +    case llvm::ELF::ELFCLASS32: +      return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips32el +                                     : ArchSpec::eMIPSSubType_mips32; +    case llvm::ELF::ELFCLASS64: +      return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips64el +                                     : ArchSpec::eMIPSSubType_mips64; +    default: +      return arch_variant; +    } +  } + +  switch (mips_arch) { +  case llvm::ELF::EF_MIPS_ARCH_1: +  case llvm::ELF::EF_MIPS_ARCH_2: +  case llvm::ELF::EF_MIPS_ARCH_32: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips32el +                                   : ArchSpec::eMIPSSubType_mips32; +  case llvm::ELF::EF_MIPS_ARCH_32R2: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips32r2el +                                   : ArchSpec::eMIPSSubType_mips32r2; +  case llvm::ELF::EF_MIPS_ARCH_32R6: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips32r6el +                                   : ArchSpec::eMIPSSubType_mips32r6; +  case llvm::ELF::EF_MIPS_ARCH_3: +  case llvm::ELF::EF_MIPS_ARCH_4: +  case llvm::ELF::EF_MIPS_ARCH_5: +  case llvm::ELF::EF_MIPS_ARCH_64: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips64el +                                   : ArchSpec::eMIPSSubType_mips64; +  case llvm::ELF::EF_MIPS_ARCH_64R2: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips64r2el +                                   : ArchSpec::eMIPSSubType_mips64r2; +  case llvm::ELF::EF_MIPS_ARCH_64R6: +    return (endian == ELFDATA2LSB) ? ArchSpec::eMIPSSubType_mips64r6el +                                   : ArchSpec::eMIPSSubType_mips64r6; +  default: +    break; +  } + +  return arch_variant; +} + +static uint32_t subTypeFromElfHeader(const elf::ELFHeader &header) { +  if (header.e_machine == llvm::ELF::EM_MIPS) +    return mipsVariantFromElfFlags(header); + +  return LLDB_INVALID_CPUTYPE; +} + +// Arbitrary constant used as UUID prefix for core files. +const uint32_t ObjectFileELF::g_core_uuid_magic(0xE210C); + +// Static methods. +void ObjectFileELF::Initialize() { +  PluginManager::RegisterPlugin(GetPluginNameStatic(), +                                GetPluginDescriptionStatic(), CreateInstance, +                                CreateMemoryInstance, GetModuleSpecifications); +} + +void ObjectFileELF::Terminate() { +  PluginManager::UnregisterPlugin(CreateInstance); +} + +lldb_private::ConstString ObjectFileELF::GetPluginNameStatic() { +  static ConstString g_name("elf"); +  return g_name; +} + +const char *ObjectFileELF::GetPluginDescriptionStatic() { +  return "ELF object file reader."; +} + +ObjectFile *ObjectFileELF::CreateInstance(const lldb::ModuleSP &module_sp, +                                          DataBufferSP &data_sp, +                                          lldb::offset_t data_offset, +                                          const lldb_private::FileSpec *file, +                                          lldb::offset_t file_offset, +                                          lldb::offset_t length) { +  if (!data_sp) { +    data_sp = MapFileData(*file, length, file_offset); +    if (!data_sp) +      return nullptr; +    data_offset = 0; +  } + +  assert(data_sp); + +  if (data_sp->GetByteSize() <= (llvm::ELF::EI_NIDENT + data_offset)) +    return nullptr; + +  const uint8_t *magic = data_sp->GetBytes() + data_offset; +  if (!ELFHeader::MagicBytesMatch(magic)) +    return nullptr; + +  // Update the data to contain the entire file if it doesn't already +  if (data_sp->GetByteSize() < length) { +    data_sp = MapFileData(*file, length, file_offset); +    if (!data_sp) +      return nullptr; +    data_offset = 0; +    magic = data_sp->GetBytes(); +  } + +  unsigned address_size = ELFHeader::AddressSizeInBytes(magic); +  if (address_size == 4 || address_size == 8) { +    std::unique_ptr<ObjectFileELF> objfile_up(new ObjectFileELF( +        module_sp, data_sp, data_offset, file, file_offset, length)); +    ArchSpec spec = objfile_up->GetArchitecture(); +    if (spec && objfile_up->SetModulesArchitecture(spec)) +      return objfile_up.release(); +  } + +  return nullptr; +} + +ObjectFile *ObjectFileELF::CreateMemoryInstance( +    const lldb::ModuleSP &module_sp, DataBufferSP &data_sp, +    const lldb::ProcessSP &process_sp, lldb::addr_t header_addr) { +  if (data_sp && data_sp->GetByteSize() > (llvm::ELF::EI_NIDENT)) { +    const uint8_t *magic = data_sp->GetBytes(); +    if (ELFHeader::MagicBytesMatch(magic)) { +      unsigned address_size = ELFHeader::AddressSizeInBytes(magic); +      if (address_size == 4 || address_size == 8) { +        std::unique_ptr<ObjectFileELF> objfile_up( +            new ObjectFileELF(module_sp, data_sp, process_sp, header_addr)); +        ArchSpec spec = objfile_up->GetArchitecture(); +        if (spec && objfile_up->SetModulesArchitecture(spec)) +          return objfile_up.release(); +      } +    } +  } +  return nullptr; +} + +bool ObjectFileELF::MagicBytesMatch(DataBufferSP &data_sp, +                                    lldb::addr_t data_offset, +                                    lldb::addr_t data_length) { +  if (data_sp && +      data_sp->GetByteSize() > (llvm::ELF::EI_NIDENT + data_offset)) { +    const uint8_t *magic = data_sp->GetBytes() + data_offset; +    return ELFHeader::MagicBytesMatch(magic); +  } +  return false; +} + +/* + * crc function from http://svnweb.freebsd.org/base/head/sys/libkern/crc32.c + * + *   COPYRIGHT (C) 1986 Gary S. Brown. You may use this program, or + *   code or tables extracted from it, as desired without restriction. + */ +static uint32_t calc_crc32(uint32_t crc, const void *buf, size_t size) { +  static const uint32_t g_crc32_tab[] = { +      0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f, +      0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, 0xe0d5e91e, 0x97d2d988, +      0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, 0x90bf1d91, 0x1db71064, 0x6ab020f2, +      0xf3b97148, 0x84be41de, 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, +      0x136c9856, 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9, +      0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, 0xa2677172, +      0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, 0x35b5a8fa, 0x42b2986c, +      0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, 0x45df5c75, 0xdcd60dcf, 0xabd13d59, +      0x26d930ac, 0x51de003a, 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, +      0xcfba9599, 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, +      0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, 0x01db7106, +      0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, 0x9fbfe4a5, 0xe8b8d433, +      0x7807c9a2, 0x0f00f934, 0x9609a88e, 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, +      0x91646c97, 0xe6635c01, 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, +      0x6c0695ed, 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950, +      0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, 0xfbd44c65, +      0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, 0x4adfa541, 0x3dd895d7, +      0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, 0x346ed9fc, 0xad678846, 0xda60b8d0, +      0x44042d73, 0x33031de5, 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa, +      0xbe0b1010, 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, +      0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, 0x2eb40d81, +      0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, 0x03b6e20c, 0x74b1d29a, +      0xead54739, 0x9dd277af, 0x04db2615, 0x73dc1683, 0xe3630b12, 0x94643b84, +      0x0d6d6a3e, 0x7a6a5aa8, 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, +      0xf00f9344, 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb, +      0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, 0x67dd4acc, +      0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, 0xd6d6a3e8, 0xa1d1937e, +      0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, 0xa6bc5767, 0x3fb506dd, 0x48b2364b, +      0xd80d2bda, 0xaf0a1b4c, 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, +      0x316e8eef, 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, +      0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, 0xb2bd0b28, +      0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, 0x2cd99e8b, 0x5bdeae1d, +      0x9b64c2b0, 0xec63f226, 0x756aa39c, 0x026d930a, 0x9c0906a9, 0xeb0e363f, +      0x72076785, 0x05005713, 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, +      0x92d28e9b, 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242, +      0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, 0x18b74777, +      0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, 0x8f659eff, 0xf862ae69, +      0x616bffd3, 0x166ccf45, 0xa00ae278, 0xd70dd2ee, 0x4e048354, 0x3903b3c2, +      0xa7672661, 0xd06016f7, 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, +      0x40df0b66, 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, +      0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, 0xcdd70693, +      0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, 0x5d681b02, 0x2a6f2b94, +      0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, 0x2d02ef8d}; +  const uint8_t *p = (const uint8_t *)buf; + +  crc = crc ^ ~0U; +  while (size--) +    crc = g_crc32_tab[(crc ^ *p++) & 0xFF] ^ (crc >> 8); +  return crc ^ ~0U; +} + +static uint32_t calc_gnu_debuglink_crc32(const void *buf, size_t size) { +  return calc_crc32(0U, buf, size); +} + +uint32_t ObjectFileELF::CalculateELFNotesSegmentsCRC32( +    const ProgramHeaderColl &program_headers, DataExtractor &object_data) { + +  uint32_t core_notes_crc = 0; + +  for (const ELFProgramHeader &H : program_headers) { +    if (H.p_type == llvm::ELF::PT_NOTE) { +      const elf_off ph_offset = H.p_offset; +      const size_t ph_size = H.p_filesz; + +      DataExtractor segment_data; +      if (segment_data.SetData(object_data, ph_offset, ph_size) != ph_size) { +        // The ELF program header contained incorrect data, probably corefile +        // is incomplete or corrupted. +        break; +      } + +      core_notes_crc = calc_crc32(core_notes_crc, segment_data.GetDataStart(), +                                  segment_data.GetByteSize()); +    } +  } + +  return core_notes_crc; +} + +static const char *OSABIAsCString(unsigned char osabi_byte) { +#define _MAKE_OSABI_CASE(x)                                                    \ +  case x:                                                                      \ +    return #x +  switch (osabi_byte) { +    _MAKE_OSABI_CASE(ELFOSABI_NONE); +    _MAKE_OSABI_CASE(ELFOSABI_HPUX); +    _MAKE_OSABI_CASE(ELFOSABI_NETBSD); +    _MAKE_OSABI_CASE(ELFOSABI_GNU); +    _MAKE_OSABI_CASE(ELFOSABI_HURD); +    _MAKE_OSABI_CASE(ELFOSABI_SOLARIS); +    _MAKE_OSABI_CASE(ELFOSABI_AIX); +    _MAKE_OSABI_CASE(ELFOSABI_IRIX); +    _MAKE_OSABI_CASE(ELFOSABI_FREEBSD); +    _MAKE_OSABI_CASE(ELFOSABI_TRU64); +    _MAKE_OSABI_CASE(ELFOSABI_MODESTO); +    _MAKE_OSABI_CASE(ELFOSABI_OPENBSD); +    _MAKE_OSABI_CASE(ELFOSABI_OPENVMS); +    _MAKE_OSABI_CASE(ELFOSABI_NSK); +    _MAKE_OSABI_CASE(ELFOSABI_AROS); +    _MAKE_OSABI_CASE(ELFOSABI_FENIXOS); +    _MAKE_OSABI_CASE(ELFOSABI_C6000_ELFABI); +    _MAKE_OSABI_CASE(ELFOSABI_C6000_LINUX); +    _MAKE_OSABI_CASE(ELFOSABI_ARM); +    _MAKE_OSABI_CASE(ELFOSABI_STANDALONE); +  default: +    return "<unknown-osabi>"; +  } +#undef _MAKE_OSABI_CASE +} + +// +// WARNING : This function is being deprecated +// It's functionality has moved to ArchSpec::SetArchitecture This function is +// only being kept to validate the move. +// +// TODO : Remove this function +static bool GetOsFromOSABI(unsigned char osabi_byte, +                           llvm::Triple::OSType &ostype) { +  switch (osabi_byte) { +  case ELFOSABI_AIX: +    ostype = llvm::Triple::OSType::AIX; +    break; +  case ELFOSABI_FREEBSD: +    ostype = llvm::Triple::OSType::FreeBSD; +    break; +  case ELFOSABI_GNU: +    ostype = llvm::Triple::OSType::Linux; +    break; +  case ELFOSABI_NETBSD: +    ostype = llvm::Triple::OSType::NetBSD; +    break; +  case ELFOSABI_OPENBSD: +    ostype = llvm::Triple::OSType::OpenBSD; +    break; +  case ELFOSABI_SOLARIS: +    ostype = llvm::Triple::OSType::Solaris; +    break; +  default: +    ostype = llvm::Triple::OSType::UnknownOS; +  } +  return ostype != llvm::Triple::OSType::UnknownOS; +} + +size_t ObjectFileELF::GetModuleSpecifications( +    const lldb_private::FileSpec &file, lldb::DataBufferSP &data_sp, +    lldb::offset_t data_offset, lldb::offset_t file_offset, +    lldb::offset_t length, lldb_private::ModuleSpecList &specs) { +  Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_MODULES)); + +  const size_t initial_count = specs.GetSize(); + +  if (ObjectFileELF::MagicBytesMatch(data_sp, 0, data_sp->GetByteSize())) { +    DataExtractor data; +    data.SetData(data_sp); +    elf::ELFHeader header; +    lldb::offset_t header_offset = data_offset; +    if (header.Parse(data, &header_offset)) { +      if (data_sp) { +        ModuleSpec spec(file); + +        const uint32_t sub_type = subTypeFromElfHeader(header); +        spec.GetArchitecture().SetArchitecture( +            eArchTypeELF, header.e_machine, sub_type, header.e_ident[EI_OSABI]); + +        if (spec.GetArchitecture().IsValid()) { +          llvm::Triple::OSType ostype; +          llvm::Triple::VendorType vendor; +          llvm::Triple::OSType spec_ostype = +              spec.GetArchitecture().GetTriple().getOS(); + +          if (log) +            log->Printf("ObjectFileELF::%s file '%s' module OSABI: %s", +                        __FUNCTION__, file.GetPath().c_str(), +                        OSABIAsCString(header.e_ident[EI_OSABI])); + +          // SetArchitecture should have set the vendor to unknown +          vendor = spec.GetArchitecture().GetTriple().getVendor(); +          assert(vendor == llvm::Triple::UnknownVendor); +          UNUSED_IF_ASSERT_DISABLED(vendor); + +          // +          // Validate it is ok to remove GetOsFromOSABI +          GetOsFromOSABI(header.e_ident[EI_OSABI], ostype); +          assert(spec_ostype == ostype); +          if (spec_ostype != llvm::Triple::OSType::UnknownOS) { +            if (log) +              log->Printf("ObjectFileELF::%s file '%s' set ELF module OS type " +                          "from ELF header OSABI.", +                          __FUNCTION__, file.GetPath().c_str()); +          } + +          data_sp = MapFileData(file, -1, file_offset); +          if (data_sp) +            data.SetData(data_sp); +          // In case there is header extension in the section #0, the header we +          // parsed above could have sentinel values for e_phnum, e_shnum, and +          // e_shstrndx.  In this case we need to reparse the header with a +          // bigger data source to get the actual values. +          if (header.HasHeaderExtension()) { +            lldb::offset_t header_offset = data_offset; +            header.Parse(data, &header_offset); +          } + +          uint32_t gnu_debuglink_crc = 0; +          std::string gnu_debuglink_file; +          SectionHeaderColl section_headers; +          lldb_private::UUID &uuid = spec.GetUUID(); + +          GetSectionHeaderInfo(section_headers, data, header, uuid, +                               gnu_debuglink_file, gnu_debuglink_crc, +                               spec.GetArchitecture()); + +          llvm::Triple &spec_triple = spec.GetArchitecture().GetTriple(); + +          if (log) +            log->Printf("ObjectFileELF::%s file '%s' module set to triple: %s " +                        "(architecture %s)", +                        __FUNCTION__, file.GetPath().c_str(), +                        spec_triple.getTriple().c_str(), +                        spec.GetArchitecture().GetArchitectureName()); + +          if (!uuid.IsValid()) { +            uint32_t core_notes_crc = 0; + +            if (!gnu_debuglink_crc) { +              static Timer::Category func_cat(LLVM_PRETTY_FUNCTION); +              lldb_private::Timer scoped_timer( +                  func_cat, +                  "Calculating module crc32 %s with size %" PRIu64 " KiB", +                  file.GetLastPathComponent().AsCString(), +                  (FileSystem::Instance().GetByteSize(file) - file_offset) / +                      1024); + +              // For core files - which usually don't happen to have a +              // gnu_debuglink, and are pretty bulky - calculating whole +              // contents crc32 would be too much of luxury.  Thus we will need +              // to fallback to something simpler. +              if (header.e_type == llvm::ELF::ET_CORE) { +                ProgramHeaderColl program_headers; +                GetProgramHeaderInfo(program_headers, data, header); + +                core_notes_crc = +                    CalculateELFNotesSegmentsCRC32(program_headers, data); +              } else { +                gnu_debuglink_crc = calc_gnu_debuglink_crc32( +                    data.GetDataStart(), data.GetByteSize()); +              } +            } +            using u32le = llvm::support::ulittle32_t; +            if (gnu_debuglink_crc) { +              // Use 4 bytes of crc from the .gnu_debuglink section. +              u32le data(gnu_debuglink_crc); +              uuid = UUID::fromData(&data, sizeof(data)); +            } else if (core_notes_crc) { +              // Use 8 bytes - first 4 bytes for *magic* prefix, mainly to make +              // it look different form .gnu_debuglink crc followed by 4 bytes +              // of note segments crc. +              u32le data[] = {u32le(g_core_uuid_magic), u32le(core_notes_crc)}; +              uuid = UUID::fromData(data, sizeof(data)); +            } +          } + +          specs.Append(spec); +        } +      } +    } +  } + +  return specs.GetSize() - initial_count; +} + +// PluginInterface protocol +lldb_private::ConstString ObjectFileELF::GetPluginName() { +  return GetPluginNameStatic(); +} + +uint32_t ObjectFileELF::GetPluginVersion() { return m_plugin_version; } +// ObjectFile protocol + +ObjectFileELF::ObjectFileELF(const lldb::ModuleSP &module_sp, +                             DataBufferSP &data_sp, lldb::offset_t data_offset, +                             const FileSpec *file, lldb::offset_t file_offset, +                             lldb::offset_t length) +    : ObjectFile(module_sp, file, file_offset, length, data_sp, data_offset), +      m_header(), m_uuid(), m_gnu_debuglink_file(), m_gnu_debuglink_crc(0), +      m_program_headers(), m_section_headers(), m_dynamic_symbols(), +      m_filespec_up(), m_entry_point_address(), m_arch_spec() { +  if (file) +    m_file = *file; +  ::memset(&m_header, 0, sizeof(m_header)); +} + +ObjectFileELF::ObjectFileELF(const lldb::ModuleSP &module_sp, +                             DataBufferSP &header_data_sp, +                             const lldb::ProcessSP &process_sp, +                             addr_t header_addr) +    : ObjectFile(module_sp, process_sp, header_addr, header_data_sp), +      m_header(), m_uuid(), m_gnu_debuglink_file(), m_gnu_debuglink_crc(0), +      m_program_headers(), m_section_headers(), m_dynamic_symbols(), +      m_filespec_up(), m_entry_point_address(), m_arch_spec() { +  ::memset(&m_header, 0, sizeof(m_header)); +} + +ObjectFileELF::~ObjectFileELF() {} + +bool ObjectFileELF::IsExecutable() const { +  return ((m_header.e_type & ET_EXEC) != 0) || (m_header.e_entry != 0); +} + +bool ObjectFileELF::SetLoadAddress(Target &target, lldb::addr_t value, +                                   bool value_is_offset) { +  ModuleSP module_sp = GetModule(); +  if (module_sp) { +    size_t num_loaded_sections = 0; +    SectionList *section_list = GetSectionList(); +    if (section_list) { +      if (!value_is_offset) { +        addr_t base = GetBaseAddress().GetFileAddress(); +        if (base == LLDB_INVALID_ADDRESS) +          return false; +        value -= base; +      } + +      const size_t num_sections = section_list->GetSize(); +      size_t sect_idx = 0; + +      for (sect_idx = 0; sect_idx < num_sections; ++sect_idx) { +        // Iterate through the object file sections to find all of the sections +        // that have SHF_ALLOC in their flag bits. +        SectionSP section_sp(section_list->GetSectionAtIndex(sect_idx)); +        if (section_sp->Test(SHF_ALLOC) || +            section_sp->GetType() == eSectionTypeContainer) { +          lldb::addr_t load_addr = section_sp->GetFileAddress(); +          // We don't want to update the load address of a section with type +          // eSectionTypeAbsoluteAddress as they already have the absolute load +          // address already specified +          if (section_sp->GetType() != eSectionTypeAbsoluteAddress) +            load_addr += value; + +          // On 32-bit systems the load address have to fit into 4 bytes. The +          // rest of the bytes are the overflow from the addition. +          if (GetAddressByteSize() == 4) +            load_addr &= 0xFFFFFFFF; + +          if (target.GetSectionLoadList().SetSectionLoadAddress(section_sp, +                                                                load_addr)) +            ++num_loaded_sections; +        } +      } +      return num_loaded_sections > 0; +    } +  } +  return false; +} + +ByteOrder ObjectFileELF::GetByteOrder() const { +  if (m_header.e_ident[EI_DATA] == ELFDATA2MSB) +    return eByteOrderBig; +  if (m_header.e_ident[EI_DATA] == ELFDATA2LSB) +    return eByteOrderLittle; +  return eByteOrderInvalid; +} + +uint32_t ObjectFileELF::GetAddressByteSize() const { +  return m_data.GetAddressByteSize(); +} + +AddressClass ObjectFileELF::GetAddressClass(addr_t file_addr) { +  Symtab *symtab = GetSymtab(); +  if (!symtab) +    return AddressClass::eUnknown; + +  // The address class is determined based on the symtab. Ask it from the +  // object file what contains the symtab information. +  ObjectFile *symtab_objfile = symtab->GetObjectFile(); +  if (symtab_objfile != nullptr && symtab_objfile != this) +    return symtab_objfile->GetAddressClass(file_addr); + +  auto res = ObjectFile::GetAddressClass(file_addr); +  if (res != AddressClass::eCode) +    return res; + +  auto ub = m_address_class_map.upper_bound(file_addr); +  if (ub == m_address_class_map.begin()) { +    // No entry in the address class map before the address. Return default +    // address class for an address in a code section. +    return AddressClass::eCode; +  } + +  // Move iterator to the address class entry preceding address +  --ub; + +  return ub->second; +} + +size_t ObjectFileELF::SectionIndex(const SectionHeaderCollIter &I) { +  return std::distance(m_section_headers.begin(), I); +} + +size_t ObjectFileELF::SectionIndex(const SectionHeaderCollConstIter &I) const { +  return std::distance(m_section_headers.begin(), I); +} + +bool ObjectFileELF::ParseHeader() { +  lldb::offset_t offset = 0; +  return m_header.Parse(m_data, &offset); +} + +UUID ObjectFileELF::GetUUID() { +  // Need to parse the section list to get the UUIDs, so make sure that's been +  // done. +  if (!ParseSectionHeaders() && GetType() != ObjectFile::eTypeCoreFile) +    return UUID(); + +  if (!m_uuid) { +    using u32le = llvm::support::ulittle32_t; +    if (GetType() == ObjectFile::eTypeCoreFile) { +      uint32_t core_notes_crc = 0; + +      if (!ParseProgramHeaders()) +        return UUID(); + +      core_notes_crc = +          CalculateELFNotesSegmentsCRC32(m_program_headers, m_data); + +      if (core_notes_crc) { +        // Use 8 bytes - first 4 bytes for *magic* prefix, mainly to make it +        // look different form .gnu_debuglink crc - followed by 4 bytes of note +        // segments crc. +        u32le data[] = {u32le(g_core_uuid_magic), u32le(core_notes_crc)}; +        m_uuid = UUID::fromData(data, sizeof(data)); +      } +    } else { +      if (!m_gnu_debuglink_crc) +        m_gnu_debuglink_crc = calc_gnu_debuglink_crc32(m_data.GetDataStart(), +                                                       m_data.GetByteSize()); +      if (m_gnu_debuglink_crc) { +        // Use 4 bytes of crc from the .gnu_debuglink section. +        u32le data(m_gnu_debuglink_crc); +        m_uuid = UUID::fromData(&data, sizeof(data)); +      } +    } +  } + +  return m_uuid; +} + +lldb_private::FileSpecList ObjectFileELF::GetDebugSymbolFilePaths() { +  FileSpecList file_spec_list; + +  if (!m_gnu_debuglink_file.empty()) { +    FileSpec file_spec(m_gnu_debuglink_file); +    file_spec_list.Append(file_spec); +  } +  return file_spec_list; +} + +uint32_t ObjectFileELF::GetDependentModules(FileSpecList &files) { +  size_t num_modules = ParseDependentModules(); +  uint32_t num_specs = 0; + +  for (unsigned i = 0; i < num_modules; ++i) { +    if (files.AppendIfUnique(m_filespec_up->GetFileSpecAtIndex(i))) +      num_specs++; +  } + +  return num_specs; +} + +Address ObjectFileELF::GetImageInfoAddress(Target *target) { +  if (!ParseDynamicSymbols()) +    return Address(); + +  SectionList *section_list = GetSectionList(); +  if (!section_list) +    return Address(); + +  // Find the SHT_DYNAMIC (.dynamic) section. +  SectionSP dynsym_section_sp( +      section_list->FindSectionByType(eSectionTypeELFDynamicLinkInfo, true)); +  if (!dynsym_section_sp) +    return Address(); +  assert(dynsym_section_sp->GetObjectFile() == this); + +  user_id_t dynsym_id = dynsym_section_sp->GetID(); +  const ELFSectionHeaderInfo *dynsym_hdr = GetSectionHeaderByIndex(dynsym_id); +  if (!dynsym_hdr) +    return Address(); + +  for (size_t i = 0; i < m_dynamic_symbols.size(); ++i) { +    ELFDynamic &symbol = m_dynamic_symbols[i]; + +    if (symbol.d_tag == DT_DEBUG) { +      // Compute the offset as the number of previous entries plus the size of +      // d_tag. +      addr_t offset = i * dynsym_hdr->sh_entsize + GetAddressByteSize(); +      return Address(dynsym_section_sp, offset); +    } +    // MIPS executables uses DT_MIPS_RLD_MAP_REL to support PIE. DT_MIPS_RLD_MAP +    // exists in non-PIE. +    else if ((symbol.d_tag == DT_MIPS_RLD_MAP || +              symbol.d_tag == DT_MIPS_RLD_MAP_REL) && +             target) { +      addr_t offset = i * dynsym_hdr->sh_entsize + GetAddressByteSize(); +      addr_t dyn_base = dynsym_section_sp->GetLoadBaseAddress(target); +      if (dyn_base == LLDB_INVALID_ADDRESS) +        return Address(); + +      Status error; +      if (symbol.d_tag == DT_MIPS_RLD_MAP) { +        // DT_MIPS_RLD_MAP tag stores an absolute address of the debug pointer. +        Address addr; +        if (target->ReadPointerFromMemory(dyn_base + offset, false, error, +                                          addr)) +          return addr; +      } +      if (symbol.d_tag == DT_MIPS_RLD_MAP_REL) { +        // DT_MIPS_RLD_MAP_REL tag stores the offset to the debug pointer, +        // relative to the address of the tag. +        uint64_t rel_offset; +        rel_offset = target->ReadUnsignedIntegerFromMemory( +            dyn_base + offset, false, GetAddressByteSize(), UINT64_MAX, error); +        if (error.Success() && rel_offset != UINT64_MAX) { +          Address addr; +          addr_t debug_ptr_address = +              dyn_base + (offset - GetAddressByteSize()) + rel_offset; +          addr.SetOffset(debug_ptr_address); +          return addr; +        } +      } +    } +  } + +  return Address(); +} + +lldb_private::Address ObjectFileELF::GetEntryPointAddress() { +  if (m_entry_point_address.IsValid()) +    return m_entry_point_address; + +  if (!ParseHeader() || !IsExecutable()) +    return m_entry_point_address; + +  SectionList *section_list = GetSectionList(); +  addr_t offset = m_header.e_entry; + +  if (!section_list) +    m_entry_point_address.SetOffset(offset); +  else +    m_entry_point_address.ResolveAddressUsingFileSections(offset, section_list); +  return m_entry_point_address; +} + +Address ObjectFileELF::GetBaseAddress() { +  for (const auto &EnumPHdr : llvm::enumerate(ProgramHeaders())) { +    const ELFProgramHeader &H = EnumPHdr.value(); +    if (H.p_type != PT_LOAD) +      continue; + +    return Address( +        GetSectionList()->FindSectionByID(SegmentID(EnumPHdr.index())), 0); +  } +  return LLDB_INVALID_ADDRESS; +} + +// ParseDependentModules +size_t ObjectFileELF::ParseDependentModules() { +  if (m_filespec_up) +    return m_filespec_up->GetSize(); + +  m_filespec_up.reset(new FileSpecList()); + +  if (!ParseSectionHeaders()) +    return 0; + +  SectionList *section_list = GetSectionList(); +  if (!section_list) +    return 0; + +  // Find the SHT_DYNAMIC section. +  Section *dynsym = +      section_list->FindSectionByType(eSectionTypeELFDynamicLinkInfo, true) +          .get(); +  if (!dynsym) +    return 0; +  assert(dynsym->GetObjectFile() == this); + +  const ELFSectionHeaderInfo *header = GetSectionHeaderByIndex(dynsym->GetID()); +  if (!header) +    return 0; +  // sh_link: section header index of string table used by entries in the +  // section. +  Section *dynstr = section_list->FindSectionByID(header->sh_link).get(); +  if (!dynstr) +    return 0; + +  DataExtractor dynsym_data; +  DataExtractor dynstr_data; +  if (ReadSectionData(dynsym, dynsym_data) && +      ReadSectionData(dynstr, dynstr_data)) { +    ELFDynamic symbol; +    const lldb::offset_t section_size = dynsym_data.GetByteSize(); +    lldb::offset_t offset = 0; + +    // The only type of entries we are concerned with are tagged DT_NEEDED, +    // yielding the name of a required library. +    while (offset < section_size) { +      if (!symbol.Parse(dynsym_data, &offset)) +        break; + +      if (symbol.d_tag != DT_NEEDED) +        continue; + +      uint32_t str_index = static_cast<uint32_t>(symbol.d_val); +      const char *lib_name = dynstr_data.PeekCStr(str_index); +      FileSpec file_spec(lib_name); +      FileSystem::Instance().Resolve(file_spec); +      m_filespec_up->Append(file_spec); +    } +  } + +  return m_filespec_up->GetSize(); +} + +// GetProgramHeaderInfo +size_t ObjectFileELF::GetProgramHeaderInfo(ProgramHeaderColl &program_headers, +                                           DataExtractor &object_data, +                                           const ELFHeader &header) { +  // We have already parsed the program headers +  if (!program_headers.empty()) +    return program_headers.size(); + +  // If there are no program headers to read we are done. +  if (header.e_phnum == 0) +    return 0; + +  program_headers.resize(header.e_phnum); +  if (program_headers.size() != header.e_phnum) +    return 0; + +  const size_t ph_size = header.e_phnum * header.e_phentsize; +  const elf_off ph_offset = header.e_phoff; +  DataExtractor data; +  if (data.SetData(object_data, ph_offset, ph_size) != ph_size) +    return 0; + +  uint32_t idx; +  lldb::offset_t offset; +  for (idx = 0, offset = 0; idx < header.e_phnum; ++idx) { +    if (!program_headers[idx].Parse(data, &offset)) +      break; +  } + +  if (idx < program_headers.size()) +    program_headers.resize(idx); + +  return program_headers.size(); +} + +// ParseProgramHeaders +bool ObjectFileELF::ParseProgramHeaders() { +  return GetProgramHeaderInfo(m_program_headers, m_data, m_header) != 0; +} + +lldb_private::Status +ObjectFileELF::RefineModuleDetailsFromNote(lldb_private::DataExtractor &data, +                                           lldb_private::ArchSpec &arch_spec, +                                           lldb_private::UUID &uuid) { +  Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_MODULES)); +  Status error; + +  lldb::offset_t offset = 0; + +  while (true) { +    // Parse the note header.  If this fails, bail out. +    const lldb::offset_t note_offset = offset; +    ELFNote note = ELFNote(); +    if (!note.Parse(data, &offset)) { +      // We're done. +      return error; +    } + +    if (log) +      log->Printf("ObjectFileELF::%s parsing note name='%s', type=%" PRIu32, +                  __FUNCTION__, note.n_name.c_str(), note.n_type); + +    // Process FreeBSD ELF notes. +    if ((note.n_name == LLDB_NT_OWNER_FREEBSD) && +        (note.n_type == LLDB_NT_FREEBSD_ABI_TAG) && +        (note.n_descsz == LLDB_NT_FREEBSD_ABI_SIZE)) { +      // Pull out the min version info. +      uint32_t version_info; +      if (data.GetU32(&offset, &version_info, 1) == nullptr) { +        error.SetErrorString("failed to read FreeBSD ABI note payload"); +        return error; +      } + +      // Convert the version info into a major/minor number. +      const uint32_t version_major = version_info / 100000; +      const uint32_t version_minor = (version_info / 1000) % 100; + +      char os_name[32]; +      snprintf(os_name, sizeof(os_name), "freebsd%" PRIu32 ".%" PRIu32, +               version_major, version_minor); + +      // Set the elf OS version to FreeBSD.  Also clear the vendor. +      arch_spec.GetTriple().setOSName(os_name); +      arch_spec.GetTriple().setVendor(llvm::Triple::VendorType::UnknownVendor); + +      if (log) +        log->Printf("ObjectFileELF::%s detected FreeBSD %" PRIu32 ".%" PRIu32 +                    ".%" PRIu32, +                    __FUNCTION__, version_major, version_minor, +                    static_cast<uint32_t>(version_info % 1000)); +    } +    // Process GNU ELF notes. +    else if (note.n_name == LLDB_NT_OWNER_GNU) { +      switch (note.n_type) { +      case LLDB_NT_GNU_ABI_TAG: +        if (note.n_descsz == LLDB_NT_GNU_ABI_SIZE) { +          // Pull out the min OS version supporting the ABI. +          uint32_t version_info[4]; +          if (data.GetU32(&offset, &version_info[0], note.n_descsz / 4) == +              nullptr) { +            error.SetErrorString("failed to read GNU ABI note payload"); +            return error; +          } + +          // Set the OS per the OS field. +          switch (version_info[0]) { +          case LLDB_NT_GNU_ABI_OS_LINUX: +            arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +            arch_spec.GetTriple().setVendor( +                llvm::Triple::VendorType::UnknownVendor); +            if (log) +              log->Printf( +                  "ObjectFileELF::%s detected Linux, min version %" PRIu32 +                  ".%" PRIu32 ".%" PRIu32, +                  __FUNCTION__, version_info[1], version_info[2], +                  version_info[3]); +            // FIXME we have the minimal version number, we could be propagating +            // that.  version_info[1] = OS Major, version_info[2] = OS Minor, +            // version_info[3] = Revision. +            break; +          case LLDB_NT_GNU_ABI_OS_HURD: +            arch_spec.GetTriple().setOS(llvm::Triple::OSType::UnknownOS); +            arch_spec.GetTriple().setVendor( +                llvm::Triple::VendorType::UnknownVendor); +            if (log) +              log->Printf("ObjectFileELF::%s detected Hurd (unsupported), min " +                          "version %" PRIu32 ".%" PRIu32 ".%" PRIu32, +                          __FUNCTION__, version_info[1], version_info[2], +                          version_info[3]); +            break; +          case LLDB_NT_GNU_ABI_OS_SOLARIS: +            arch_spec.GetTriple().setOS(llvm::Triple::OSType::Solaris); +            arch_spec.GetTriple().setVendor( +                llvm::Triple::VendorType::UnknownVendor); +            if (log) +              log->Printf( +                  "ObjectFileELF::%s detected Solaris, min version %" PRIu32 +                  ".%" PRIu32 ".%" PRIu32, +                  __FUNCTION__, version_info[1], version_info[2], +                  version_info[3]); +            break; +          default: +            if (log) +              log->Printf( +                  "ObjectFileELF::%s unrecognized OS in note, id %" PRIu32 +                  ", min version %" PRIu32 ".%" PRIu32 ".%" PRIu32, +                  __FUNCTION__, version_info[0], version_info[1], +                  version_info[2], version_info[3]); +            break; +          } +        } +        break; + +      case LLDB_NT_GNU_BUILD_ID_TAG: +        // Only bother processing this if we don't already have the uuid set. +        if (!uuid.IsValid()) { +          // 16 bytes is UUID|MD5, 20 bytes is SHA1. Other linkers may produce a +          // build-id of a different length. Accept it as long as it's at least +          // 4 bytes as it will be better than our own crc32. +          if (note.n_descsz >= 4) { +            if (const uint8_t *buf = data.PeekData(offset, note.n_descsz)) { +              // Save the build id as the UUID for the module. +              uuid = UUID::fromData(buf, note.n_descsz); +            } else { +              error.SetErrorString("failed to read GNU_BUILD_ID note payload"); +              return error; +            } +          } +        } +        break; +      } +      if (arch_spec.IsMIPS() && +          arch_spec.GetTriple().getOS() == llvm::Triple::OSType::UnknownOS) +        // The note.n_name == LLDB_NT_OWNER_GNU is valid for Linux platform +        arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +    } +    // Process NetBSD ELF executables and shared libraries +    else if ((note.n_name == LLDB_NT_OWNER_NETBSD) && +             (note.n_type == LLDB_NT_NETBSD_IDENT_TAG) && +             (note.n_descsz == LLDB_NT_NETBSD_IDENT_DESCSZ) && +             (note.n_namesz == LLDB_NT_NETBSD_IDENT_NAMESZ)) { +      // Pull out the version info. +      uint32_t version_info; +      if (data.GetU32(&offset, &version_info, 1) == nullptr) { +        error.SetErrorString("failed to read NetBSD ABI note payload"); +        return error; +      } +      // Convert the version info into a major/minor/patch number. +      //     #define __NetBSD_Version__ MMmmrrpp00 +      // +      //     M = major version +      //     m = minor version; a minor number of 99 indicates current. +      //     r = 0 (since NetBSD 3.0 not used) +      //     p = patchlevel +      const uint32_t version_major = version_info / 100000000; +      const uint32_t version_minor = (version_info % 100000000) / 1000000; +      const uint32_t version_patch = (version_info % 10000) / 100; +      // Set the elf OS version to NetBSD.  Also clear the vendor. +      arch_spec.GetTriple().setOSName( +          llvm::formatv("netbsd{0}.{1}.{2}", version_major, version_minor, +                        version_patch).str()); +      arch_spec.GetTriple().setVendor(llvm::Triple::VendorType::UnknownVendor); +    } +    // Process NetBSD ELF core(5) notes +    else if ((note.n_name == LLDB_NT_OWNER_NETBSDCORE) && +             (note.n_type == LLDB_NT_NETBSD_PROCINFO)) { +      // Set the elf OS version to NetBSD.  Also clear the vendor. +      arch_spec.GetTriple().setOS(llvm::Triple::OSType::NetBSD); +      arch_spec.GetTriple().setVendor(llvm::Triple::VendorType::UnknownVendor); +    } +    // Process OpenBSD ELF notes. +    else if (note.n_name == LLDB_NT_OWNER_OPENBSD) { +      // Set the elf OS version to OpenBSD.  Also clear the vendor. +      arch_spec.GetTriple().setOS(llvm::Triple::OSType::OpenBSD); +      arch_spec.GetTriple().setVendor(llvm::Triple::VendorType::UnknownVendor); +    } else if (note.n_name == LLDB_NT_OWNER_ANDROID) { +      arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +      arch_spec.GetTriple().setEnvironment( +          llvm::Triple::EnvironmentType::Android); +    } else if (note.n_name == LLDB_NT_OWNER_LINUX) { +      // This is sometimes found in core files and usually contains extended +      // register info +      arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +    } else if (note.n_name == LLDB_NT_OWNER_CORE) { +      // Parse the NT_FILE to look for stuff in paths to shared libraries As +      // the contents look like this in a 64 bit ELF core file: count     = +      // 0x000000000000000a (10) page_size = 0x0000000000001000 (4096) Index +      // start              end                file_ofs           path ===== +      // 0x0000000000401000 0x0000000000000000 /tmp/a.out [  1] +      // 0x0000000000600000 0x0000000000601000 0x0000000000000000 /tmp/a.out [ +      // 2] 0x0000000000601000 0x0000000000602000 0x0000000000000001 /tmp/a.out +      // [  3] 0x00007fa79c9ed000 0x00007fa79cba8000 0x0000000000000000 +      // /lib/x86_64-linux-gnu/libc-2.19.so [  4] 0x00007fa79cba8000 +      // 0x00007fa79cda7000 0x00000000000001bb /lib/x86_64-linux- +      // gnu/libc-2.19.so [  5] 0x00007fa79cda7000 0x00007fa79cdab000 +      // 0x00000000000001ba /lib/x86_64-linux-gnu/libc-2.19.so [  6] +      // 0x00007fa79cdab000 0x00007fa79cdad000 0x00000000000001be /lib/x86_64 +      // -linux-gnu/libc-2.19.so [  7] 0x00007fa79cdb2000 0x00007fa79cdd5000 +      // 0x0000000000000000 /lib/x86_64-linux-gnu/ld-2.19.so [  8] +      // 0x00007fa79cfd4000 0x00007fa79cfd5000 0x0000000000000022 /lib/x86_64 +      // -linux-gnu/ld-2.19.so [  9] 0x00007fa79cfd5000 0x00007fa79cfd6000 +      // 0x0000000000000023 /lib/x86_64-linux-gnu/ld-2.19.so In the 32 bit ELFs +      // the count, page_size, start, end, file_ofs are uint32_t For reference: +      // see readelf source code (in binutils). +      if (note.n_type == NT_FILE) { +        uint64_t count = data.GetAddress(&offset); +        const char *cstr; +        data.GetAddress(&offset); // Skip page size +        offset += count * 3 * +                  data.GetAddressByteSize(); // Skip all start/end/file_ofs +        for (size_t i = 0; i < count; ++i) { +          cstr = data.GetCStr(&offset); +          if (cstr == nullptr) { +            error.SetErrorStringWithFormat("ObjectFileELF::%s trying to read " +                                           "at an offset after the end " +                                           "(GetCStr returned nullptr)", +                                           __FUNCTION__); +            return error; +          } +          llvm::StringRef path(cstr); +          if (path.contains("/lib/x86_64-linux-gnu") || path.contains("/lib/i386-linux-gnu")) { +            arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +            break; +          } +        } +        if (arch_spec.IsMIPS() && +            arch_spec.GetTriple().getOS() == llvm::Triple::OSType::UnknownOS) +          // In case of MIPSR6, the LLDB_NT_OWNER_GNU note is missing for some +          // cases (e.g. compile with -nostdlib) Hence set OS to Linux +          arch_spec.GetTriple().setOS(llvm::Triple::OSType::Linux); +      } +    } + +    // Calculate the offset of the next note just in case "offset" has been +    // used to poke at the contents of the note data +    offset = note_offset + note.GetByteSize(); +  } + +  return error; +} + +void ObjectFileELF::ParseARMAttributes(DataExtractor &data, uint64_t length, +                                       ArchSpec &arch_spec) { +  lldb::offset_t Offset = 0; + +  uint8_t FormatVersion = data.GetU8(&Offset); +  if (FormatVersion != llvm::ARMBuildAttrs::Format_Version) +    return; + +  Offset = Offset + sizeof(uint32_t); // Section Length +  llvm::StringRef VendorName = data.GetCStr(&Offset); + +  if (VendorName != "aeabi") +    return; + +  if (arch_spec.GetTriple().getEnvironment() == +      llvm::Triple::UnknownEnvironment) +    arch_spec.GetTriple().setEnvironment(llvm::Triple::EABI); + +  while (Offset < length) { +    uint8_t Tag = data.GetU8(&Offset); +    uint32_t Size = data.GetU32(&Offset); + +    if (Tag != llvm::ARMBuildAttrs::File || Size == 0) +      continue; + +    while (Offset < length) { +      uint64_t Tag = data.GetULEB128(&Offset); +      switch (Tag) { +      default: +        if (Tag < 32) +          data.GetULEB128(&Offset); +        else if (Tag % 2 == 0) +          data.GetULEB128(&Offset); +        else +          data.GetCStr(&Offset); + +        break; + +      case llvm::ARMBuildAttrs::CPU_raw_name: +      case llvm::ARMBuildAttrs::CPU_name: +        data.GetCStr(&Offset); + +        break; + +      case llvm::ARMBuildAttrs::ABI_VFP_args: { +        uint64_t VFPArgs = data.GetULEB128(&Offset); + +        if (VFPArgs == llvm::ARMBuildAttrs::BaseAAPCS) { +          if (arch_spec.GetTriple().getEnvironment() == +                  llvm::Triple::UnknownEnvironment || +              arch_spec.GetTriple().getEnvironment() == llvm::Triple::EABIHF) +            arch_spec.GetTriple().setEnvironment(llvm::Triple::EABI); + +          arch_spec.SetFlags(ArchSpec::eARM_abi_soft_float); +        } else if (VFPArgs == llvm::ARMBuildAttrs::HardFPAAPCS) { +          if (arch_spec.GetTriple().getEnvironment() == +                  llvm::Triple::UnknownEnvironment || +              arch_spec.GetTriple().getEnvironment() == llvm::Triple::EABI) +            arch_spec.GetTriple().setEnvironment(llvm::Triple::EABIHF); + +          arch_spec.SetFlags(ArchSpec::eARM_abi_hard_float); +        } + +        break; +      } +      } +    } +  } +} + +// GetSectionHeaderInfo +size_t ObjectFileELF::GetSectionHeaderInfo(SectionHeaderColl §ion_headers, +                                           DataExtractor &object_data, +                                           const elf::ELFHeader &header, +                                           lldb_private::UUID &uuid, +                                           std::string &gnu_debuglink_file, +                                           uint32_t &gnu_debuglink_crc, +                                           ArchSpec &arch_spec) { +  // Don't reparse the section headers if we already did that. +  if (!section_headers.empty()) +    return section_headers.size(); + +  // Only initialize the arch_spec to okay defaults if they're not already set. +  // We'll refine this with note data as we parse the notes. +  if (arch_spec.GetTriple().getOS() == llvm::Triple::OSType::UnknownOS) { +    llvm::Triple::OSType ostype; +    llvm::Triple::OSType spec_ostype; +    const uint32_t sub_type = subTypeFromElfHeader(header); +    arch_spec.SetArchitecture(eArchTypeELF, header.e_machine, sub_type, +                              header.e_ident[EI_OSABI]); + +    // Validate if it is ok to remove GetOsFromOSABI. Note, that now the OS is +    // determined based on EI_OSABI flag and the info extracted from ELF notes +    // (see RefineModuleDetailsFromNote). However in some cases that still +    // might be not enough: for example a shared library might not have any +    // notes at all and have EI_OSABI flag set to System V, as result the OS +    // will be set to UnknownOS. +    GetOsFromOSABI(header.e_ident[EI_OSABI], ostype); +    spec_ostype = arch_spec.GetTriple().getOS(); +    assert(spec_ostype == ostype); +    UNUSED_IF_ASSERT_DISABLED(spec_ostype); +  } + +  if (arch_spec.GetMachine() == llvm::Triple::mips || +      arch_spec.GetMachine() == llvm::Triple::mipsel || +      arch_spec.GetMachine() == llvm::Triple::mips64 || +      arch_spec.GetMachine() == llvm::Triple::mips64el) { +    switch (header.e_flags & llvm::ELF::EF_MIPS_ARCH_ASE) { +    case llvm::ELF::EF_MIPS_MICROMIPS: +      arch_spec.SetFlags(ArchSpec::eMIPSAse_micromips); +      break; +    case llvm::ELF::EF_MIPS_ARCH_ASE_M16: +      arch_spec.SetFlags(ArchSpec::eMIPSAse_mips16); +      break; +    case llvm::ELF::EF_MIPS_ARCH_ASE_MDMX: +      arch_spec.SetFlags(ArchSpec::eMIPSAse_mdmx); +      break; +    default: +      break; +    } +  } + +  if (arch_spec.GetMachine() == llvm::Triple::arm || +      arch_spec.GetMachine() == llvm::Triple::thumb) { +    if (header.e_flags & llvm::ELF::EF_ARM_SOFT_FLOAT) +      arch_spec.SetFlags(ArchSpec::eARM_abi_soft_float); +    else if (header.e_flags & llvm::ELF::EF_ARM_VFP_FLOAT) +      arch_spec.SetFlags(ArchSpec::eARM_abi_hard_float); +  } + +  // If there are no section headers we are done. +  if (header.e_shnum == 0) +    return 0; + +  Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_MODULES)); + +  section_headers.resize(header.e_shnum); +  if (section_headers.size() != header.e_shnum) +    return 0; + +  const size_t sh_size = header.e_shnum * header.e_shentsize; +  const elf_off sh_offset = header.e_shoff; +  DataExtractor sh_data; +  if (sh_data.SetData(object_data, sh_offset, sh_size) != sh_size) +    return 0; + +  uint32_t idx; +  lldb::offset_t offset; +  for (idx = 0, offset = 0; idx < header.e_shnum; ++idx) { +    if (!section_headers[idx].Parse(sh_data, &offset)) +      break; +  } +  if (idx < section_headers.size()) +    section_headers.resize(idx); + +  const unsigned strtab_idx = header.e_shstrndx; +  if (strtab_idx && strtab_idx < section_headers.size()) { +    const ELFSectionHeaderInfo &sheader = section_headers[strtab_idx]; +    const size_t byte_size = sheader.sh_size; +    const Elf64_Off offset = sheader.sh_offset; +    lldb_private::DataExtractor shstr_data; + +    if (shstr_data.SetData(object_data, offset, byte_size) == byte_size) { +      for (SectionHeaderCollIter I = section_headers.begin(); +           I != section_headers.end(); ++I) { +        static ConstString g_sect_name_gnu_debuglink(".gnu_debuglink"); +        const ELFSectionHeaderInfo &sheader = *I; +        const uint64_t section_size = +            sheader.sh_type == SHT_NOBITS ? 0 : sheader.sh_size; +        ConstString name(shstr_data.PeekCStr(I->sh_name)); + +        I->section_name = name; + +        if (arch_spec.IsMIPS()) { +          uint32_t arch_flags = arch_spec.GetFlags(); +          DataExtractor data; +          if (sheader.sh_type == SHT_MIPS_ABIFLAGS) { + +            if (section_size && (data.SetData(object_data, sheader.sh_offset, +                                              section_size) == section_size)) { +              // MIPS ASE Mask is at offset 12 in MIPS.abiflags section +              lldb::offset_t offset = 12; // MIPS ABI Flags Version: 0 +              arch_flags |= data.GetU32(&offset); + +              // The floating point ABI is at offset 7 +              offset = 7; +              switch (data.GetU8(&offset)) { +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_ANY: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_ANY; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_DOUBLE: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_DOUBLE; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_SINGLE: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_SINGLE; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_SOFT: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_SOFT; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_OLD_64: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_OLD_64; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_XX: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_XX; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_64: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_64; +                break; +              case llvm::Mips::Val_GNU_MIPS_ABI_FP_64A: +                arch_flags |= lldb_private::ArchSpec::eMIPS_ABI_FP_64A; +                break; +              } +            } +          } +          // Settings appropriate ArchSpec ABI Flags +          switch (header.e_flags & llvm::ELF::EF_MIPS_ABI) { +          case llvm::ELF::EF_MIPS_ABI_O32: +            arch_flags |= lldb_private::ArchSpec::eMIPSABI_O32; +            break; +          case EF_MIPS_ABI_O64: +            arch_flags |= lldb_private::ArchSpec::eMIPSABI_O64; +            break; +          case EF_MIPS_ABI_EABI32: +            arch_flags |= lldb_private::ArchSpec::eMIPSABI_EABI32; +            break; +          case EF_MIPS_ABI_EABI64: +            arch_flags |= lldb_private::ArchSpec::eMIPSABI_EABI64; +            break; +          default: +            // ABI Mask doesn't cover N32 and N64 ABI. +            if (header.e_ident[EI_CLASS] == llvm::ELF::ELFCLASS64) +              arch_flags |= lldb_private::ArchSpec::eMIPSABI_N64; +            else if (header.e_flags & llvm::ELF::EF_MIPS_ABI2) +              arch_flags |= lldb_private::ArchSpec::eMIPSABI_N32; +            break; +          } +          arch_spec.SetFlags(arch_flags); +        } + +        if (arch_spec.GetMachine() == llvm::Triple::arm || +            arch_spec.GetMachine() == llvm::Triple::thumb) { +          DataExtractor data; + +          if (sheader.sh_type == SHT_ARM_ATTRIBUTES && section_size != 0 && +              data.SetData(object_data, sheader.sh_offset, section_size) == section_size) +            ParseARMAttributes(data, section_size, arch_spec); +        } + +        if (name == g_sect_name_gnu_debuglink) { +          DataExtractor data; +          if (section_size && (data.SetData(object_data, sheader.sh_offset, +                                            section_size) == section_size)) { +            lldb::offset_t gnu_debuglink_offset = 0; +            gnu_debuglink_file = data.GetCStr(&gnu_debuglink_offset); +            gnu_debuglink_offset = llvm::alignTo(gnu_debuglink_offset, 4); +            data.GetU32(&gnu_debuglink_offset, &gnu_debuglink_crc, 1); +          } +        } + +        // Process ELF note section entries. +        bool is_note_header = (sheader.sh_type == SHT_NOTE); + +        // The section header ".note.android.ident" is stored as a +        // PROGBITS type header but it is actually a note header. +        static ConstString g_sect_name_android_ident(".note.android.ident"); +        if (!is_note_header && name == g_sect_name_android_ident) +          is_note_header = true; + +        if (is_note_header) { +          // Allow notes to refine module info. +          DataExtractor data; +          if (section_size && (data.SetData(object_data, sheader.sh_offset, +                                            section_size) == section_size)) { +            Status error = RefineModuleDetailsFromNote(data, arch_spec, uuid); +            if (error.Fail()) { +              if (log) +                log->Printf("ObjectFileELF::%s ELF note processing failed: %s", +                            __FUNCTION__, error.AsCString()); +            } +          } +        } +      } + +      // Make any unknown triple components to be unspecified unknowns. +      if (arch_spec.GetTriple().getVendor() == llvm::Triple::UnknownVendor) +        arch_spec.GetTriple().setVendorName(llvm::StringRef()); +      if (arch_spec.GetTriple().getOS() == llvm::Triple::UnknownOS) +        arch_spec.GetTriple().setOSName(llvm::StringRef()); + +      return section_headers.size(); +    } +  } + +  section_headers.clear(); +  return 0; +} + +llvm::StringRef +ObjectFileELF::StripLinkerSymbolAnnotations(llvm::StringRef symbol_name) const { +  size_t pos = symbol_name.find('@'); +  return symbol_name.substr(0, pos); +} + +// ParseSectionHeaders +size_t ObjectFileELF::ParseSectionHeaders() { +  return GetSectionHeaderInfo(m_section_headers, m_data, m_header, m_uuid, +                              m_gnu_debuglink_file, m_gnu_debuglink_crc, +                              m_arch_spec); +} + +const ObjectFileELF::ELFSectionHeaderInfo * +ObjectFileELF::GetSectionHeaderByIndex(lldb::user_id_t id) { +  if (!ParseSectionHeaders()) +    return nullptr; + +  if (id < m_section_headers.size()) +    return &m_section_headers[id]; + +  return nullptr; +} + +lldb::user_id_t ObjectFileELF::GetSectionIndexByName(const char *name) { +  if (!name || !name[0] || !ParseSectionHeaders()) +    return 0; +  for (size_t i = 1; i < m_section_headers.size(); ++i) +    if (m_section_headers[i].section_name == ConstString(name)) +      return i; +  return 0; +} + +static SectionType GetSectionTypeFromName(llvm::StringRef Name) { +  if (Name.consume_front(".debug_") || Name.consume_front(".zdebug_")) { +    return llvm::StringSwitch<SectionType>(Name) +        .Case("abbrev", eSectionTypeDWARFDebugAbbrev) +        .Case("abbrev.dwo", eSectionTypeDWARFDebugAbbrevDwo) +        .Case("addr", eSectionTypeDWARFDebugAddr) +        .Case("aranges", eSectionTypeDWARFDebugAranges) +        .Case("cu_index", eSectionTypeDWARFDebugCuIndex) +        .Case("frame", eSectionTypeDWARFDebugFrame) +        .Case("info", eSectionTypeDWARFDebugInfo) +        .Case("info.dwo", eSectionTypeDWARFDebugInfoDwo) +        .Cases("line", "line.dwo", eSectionTypeDWARFDebugLine) +        .Cases("line_str", "line_str.dwo", eSectionTypeDWARFDebugLineStr) +        .Cases("loc", "loc.dwo", eSectionTypeDWARFDebugLoc) +        .Cases("loclists", "loclists.dwo", eSectionTypeDWARFDebugLocLists) +        .Case("macinfo", eSectionTypeDWARFDebugMacInfo) +        .Cases("macro", "macro.dwo", eSectionTypeDWARFDebugMacro) +        .Case("names", eSectionTypeDWARFDebugNames) +        .Case("pubnames", eSectionTypeDWARFDebugPubNames) +        .Case("pubtypes", eSectionTypeDWARFDebugPubTypes) +        .Case("ranges", eSectionTypeDWARFDebugRanges) +        .Case("rnglists", eSectionTypeDWARFDebugRngLists) +        .Case("str", eSectionTypeDWARFDebugStr) +        .Case("str.dwo", eSectionTypeDWARFDebugStrDwo) +        .Case("str_offsets", eSectionTypeDWARFDebugStrOffsets) +        .Case("str_offsets.dwo", eSectionTypeDWARFDebugStrOffsetsDwo) +        .Case("types", eSectionTypeDWARFDebugTypes) +        .Case("types.dwo", eSectionTypeDWARFDebugTypesDwo) +        .Default(eSectionTypeOther); +  } +  return llvm::StringSwitch<SectionType>(Name) +      .Case(".ARM.exidx", eSectionTypeARMexidx) +      .Case(".ARM.extab", eSectionTypeARMextab) +      .Cases(".bss", ".tbss", eSectionTypeZeroFill) +      .Cases(".data", ".tdata", eSectionTypeData) +      .Case(".eh_frame", eSectionTypeEHFrame) +      .Case(".gnu_debugaltlink", eSectionTypeDWARFGNUDebugAltLink) +      .Case(".gosymtab", eSectionTypeGoSymtab) +      .Case(".text", eSectionTypeCode) +      .Default(eSectionTypeOther); +} + +SectionType ObjectFileELF::GetSectionType(const ELFSectionHeaderInfo &H) const { +  switch (H.sh_type) { +  case SHT_PROGBITS: +    if (H.sh_flags & SHF_EXECINSTR) +      return eSectionTypeCode; +    break; +  case SHT_SYMTAB: +    return eSectionTypeELFSymbolTable; +  case SHT_DYNSYM: +    return eSectionTypeELFDynamicSymbols; +  case SHT_RELA: +  case SHT_REL: +    return eSectionTypeELFRelocationEntries; +  case SHT_DYNAMIC: +    return eSectionTypeELFDynamicLinkInfo; +  } +  return GetSectionTypeFromName(H.section_name.GetStringRef()); +} + +static uint32_t GetTargetByteSize(SectionType Type, const ArchSpec &arch) { +  switch (Type) { +  case eSectionTypeData: +  case eSectionTypeZeroFill: +    return arch.GetDataByteSize(); +  case eSectionTypeCode: +    return arch.GetCodeByteSize(); +  default: +    return 1; +  } +} + +static Permissions GetPermissions(const ELFSectionHeader &H) { +  Permissions Perm = Permissions(0); +  if (H.sh_flags & SHF_ALLOC) +    Perm |= ePermissionsReadable; +  if (H.sh_flags & SHF_WRITE) +    Perm |= ePermissionsWritable; +  if (H.sh_flags & SHF_EXECINSTR) +    Perm |= ePermissionsExecutable; +  return Perm; +} + +static Permissions GetPermissions(const ELFProgramHeader &H) { +  Permissions Perm = Permissions(0); +  if (H.p_flags & PF_R) +    Perm |= ePermissionsReadable; +  if (H.p_flags & PF_W) +    Perm |= ePermissionsWritable; +  if (H.p_flags & PF_X) +    Perm |= ePermissionsExecutable; +  return Perm; +} + +namespace { + +using VMRange = lldb_private::Range<addr_t, addr_t>; + +struct SectionAddressInfo { +  SectionSP Segment; +  VMRange Range; +}; + +// (Unlinked) ELF object files usually have 0 for every section address, meaning +// we need to compute synthetic addresses in order for "file addresses" from +// different sections to not overlap. This class handles that logic. +class VMAddressProvider { +  using VMMap = llvm::IntervalMap<addr_t, SectionSP, 4, +                                       llvm::IntervalMapHalfOpenInfo<addr_t>>; + +  ObjectFile::Type ObjectType; +  addr_t NextVMAddress = 0; +  VMMap::Allocator Alloc; +  VMMap Segments = VMMap(Alloc); +  VMMap Sections = VMMap(Alloc); +  lldb_private::Log *Log = GetLogIfAllCategoriesSet(LIBLLDB_LOG_MODULES); + +  VMRange GetVMRange(const ELFSectionHeader &H) { +    addr_t Address = H.sh_addr; +    addr_t Size = H.sh_flags & SHF_ALLOC ? H.sh_size : 0; +    if (ObjectType == ObjectFile::Type::eTypeObjectFile && Segments.empty() && (H.sh_flags & SHF_ALLOC)) { +      NextVMAddress = +          llvm::alignTo(NextVMAddress, std::max<addr_t>(H.sh_addralign, 1)); +      Address = NextVMAddress; +      NextVMAddress += Size; +    } +    return VMRange(Address, Size); +  } + +public: +  VMAddressProvider(ObjectFile::Type Type) : ObjectType(Type) {} + +  llvm::Optional<VMRange> GetAddressInfo(const ELFProgramHeader &H) { +    if (H.p_memsz == 0) { +      LLDB_LOG(Log, +               "Ignoring zero-sized PT_LOAD segment. Corrupt object file?"); +      return llvm::None; +    } + +    if (Segments.overlaps(H.p_vaddr, H.p_vaddr + H.p_memsz)) { +      LLDB_LOG(Log, +               "Ignoring overlapping PT_LOAD segment. Corrupt object file?"); +      return llvm::None; +    } +    return VMRange(H.p_vaddr, H.p_memsz); +  } + +  llvm::Optional<SectionAddressInfo> GetAddressInfo(const ELFSectionHeader &H) { +    VMRange Range = GetVMRange(H); +    SectionSP Segment; +    auto It = Segments.find(Range.GetRangeBase()); +    if ((H.sh_flags & SHF_ALLOC) && It.valid()) { +      addr_t MaxSize; +      if (It.start() <= Range.GetRangeBase()) { +        MaxSize = It.stop() - Range.GetRangeBase(); +        Segment = *It; +      } else +        MaxSize = It.start() - Range.GetRangeBase(); +      if (Range.GetByteSize() > MaxSize) { +        LLDB_LOG(Log, "Shortening section crossing segment boundaries. " +                      "Corrupt object file?"); +        Range.SetByteSize(MaxSize); +      } +    } +    if (Range.GetByteSize() > 0 && +        Sections.overlaps(Range.GetRangeBase(), Range.GetRangeEnd())) { +      LLDB_LOG(Log, "Ignoring overlapping section. Corrupt object file?"); +      return llvm::None; +    } +    if (Segment) +      Range.Slide(-Segment->GetFileAddress()); +    return SectionAddressInfo{Segment, Range}; +  } + +  void AddSegment(const VMRange &Range, SectionSP Seg) { +    Segments.insert(Range.GetRangeBase(), Range.GetRangeEnd(), std::move(Seg)); +  } + +  void AddSection(SectionAddressInfo Info, SectionSP Sect) { +    if (Info.Range.GetByteSize() == 0) +      return; +    if (Info.Segment) +      Info.Range.Slide(Info.Segment->GetFileAddress()); +    Sections.insert(Info.Range.GetRangeBase(), Info.Range.GetRangeEnd(), +                    std::move(Sect)); +  } +}; +} + +void ObjectFileELF::CreateSections(SectionList &unified_section_list) { +  if (m_sections_up) +    return; + +  m_sections_up = llvm::make_unique<SectionList>(); +  VMAddressProvider address_provider(GetType()); + +  size_t LoadID = 0; +  for (const auto &EnumPHdr : llvm::enumerate(ProgramHeaders())) { +    const ELFProgramHeader &PHdr = EnumPHdr.value(); +    if (PHdr.p_type != PT_LOAD) +      continue; + +    auto InfoOr = address_provider.GetAddressInfo(PHdr); +    if (!InfoOr) +      continue; + +    ConstString Name(("PT_LOAD[" + llvm::Twine(LoadID++) + "]").str()); +    uint32_t Log2Align = llvm::Log2_64(std::max<elf_xword>(PHdr.p_align, 1)); +    SectionSP Segment = std::make_shared<Section>( +        GetModule(), this, SegmentID(EnumPHdr.index()), Name, +        eSectionTypeContainer, InfoOr->GetRangeBase(), InfoOr->GetByteSize(), +        PHdr.p_offset, PHdr.p_filesz, Log2Align, /*flags*/ 0); +    Segment->SetPermissions(GetPermissions(PHdr)); +    m_sections_up->AddSection(Segment); + +    address_provider.AddSegment(*InfoOr, std::move(Segment)); +  } + +  ParseSectionHeaders(); +  if (m_section_headers.empty()) +    return; + +  for (SectionHeaderCollIter I = std::next(m_section_headers.begin()); +       I != m_section_headers.end(); ++I) { +    const ELFSectionHeaderInfo &header = *I; + +    ConstString &name = I->section_name; +    const uint64_t file_size = +        header.sh_type == SHT_NOBITS ? 0 : header.sh_size; + +    auto InfoOr = address_provider.GetAddressInfo(header); +    if (!InfoOr) +      continue; + +    SectionType sect_type = GetSectionType(header); + +    const uint32_t target_bytes_size = +        GetTargetByteSize(sect_type, m_arch_spec); + +    elf::elf_xword log2align = +        (header.sh_addralign == 0) ? 0 : llvm::Log2_64(header.sh_addralign); + +    SectionSP section_sp(new Section( +        InfoOr->Segment, GetModule(), // Module to which this section belongs. +        this,            // ObjectFile to which this section belongs and should +                         // read section data from. +        SectionIndex(I), // Section ID. +        name,            // Section name. +        sect_type,       // Section type. +        InfoOr->Range.GetRangeBase(), // VM address. +        InfoOr->Range.GetByteSize(),  // VM size in bytes of this section. +        header.sh_offset,             // Offset of this section in the file. +        file_size,           // Size of the section as found in the file. +        log2align,           // Alignment of the section +        header.sh_flags,     // Flags for this section. +        target_bytes_size)); // Number of host bytes per target byte + +    section_sp->SetPermissions(GetPermissions(header)); +    section_sp->SetIsThreadSpecific(header.sh_flags & SHF_TLS); +    (InfoOr->Segment ? InfoOr->Segment->GetChildren() : *m_sections_up) +        .AddSection(section_sp); +    address_provider.AddSection(std::move(*InfoOr), std::move(section_sp)); +  } + +  // For eTypeDebugInfo files, the Symbol Vendor will take care of updating the +  // unified section list. +  if (GetType() != eTypeDebugInfo) +    unified_section_list = *m_sections_up; +} + +// Find the arm/aarch64 mapping symbol character in the given symbol name. +// Mapping symbols have the form of "$<char>[.<any>]*". Additionally we +// recognize cases when the mapping symbol prefixed by an arbitrary string +// because if a symbol prefix added to each symbol in the object file with +// objcopy then the mapping symbols are also prefixed. +static char FindArmAarch64MappingSymbol(const char *symbol_name) { +  if (!symbol_name) +    return '\0'; + +  const char *dollar_pos = ::strchr(symbol_name, '$'); +  if (!dollar_pos || dollar_pos[1] == '\0') +    return '\0'; + +  if (dollar_pos[2] == '\0' || dollar_pos[2] == '.') +    return dollar_pos[1]; +  return '\0'; +} + +#define STO_MIPS_ISA (3 << 6) +#define STO_MICROMIPS (2 << 6) +#define IS_MICROMIPS(ST_OTHER) (((ST_OTHER)&STO_MIPS_ISA) == STO_MICROMIPS) + +// private +unsigned ObjectFileELF::ParseSymbols(Symtab *symtab, user_id_t start_id, +                                     SectionList *section_list, +                                     const size_t num_symbols, +                                     const DataExtractor &symtab_data, +                                     const DataExtractor &strtab_data) { +  ELFSymbol symbol; +  lldb::offset_t offset = 0; + +  static ConstString text_section_name(".text"); +  static ConstString init_section_name(".init"); +  static ConstString fini_section_name(".fini"); +  static ConstString ctors_section_name(".ctors"); +  static ConstString dtors_section_name(".dtors"); + +  static ConstString data_section_name(".data"); +  static ConstString rodata_section_name(".rodata"); +  static ConstString rodata1_section_name(".rodata1"); +  static ConstString data2_section_name(".data1"); +  static ConstString bss_section_name(".bss"); +  static ConstString opd_section_name(".opd"); // For ppc64 + +  // On Android the oatdata and the oatexec symbols in the oat and odex files +  // covers the full .text section what causes issues with displaying unusable +  // symbol name to the user and very slow unwinding speed because the +  // instruction emulation based unwind plans try to emulate all instructions +  // in these symbols. Don't add these symbols to the symbol list as they have +  // no use for the debugger and they are causing a lot of trouble. Filtering +  // can't be restricted to Android because this special object file don't +  // contain the note section specifying the environment to Android but the +  // custom extension and file name makes it highly unlikely that this will +  // collide with anything else. +  ConstString file_extension = m_file.GetFileNameExtension(); +  bool skip_oatdata_oatexec = +      file_extension == ".oat" || file_extension == ".odex"; + +  ArchSpec arch = GetArchitecture(); +  ModuleSP module_sp(GetModule()); +  SectionList *module_section_list = +      module_sp ? module_sp->GetSectionList() : nullptr; + +  // Local cache to avoid doing a FindSectionByName for each symbol. The "const +  // char*" key must came from a ConstString object so they can be compared by +  // pointer +  std::unordered_map<const char *, lldb::SectionSP> section_name_to_section; + +  unsigned i; +  for (i = 0; i < num_symbols; ++i) { +    if (!symbol.Parse(symtab_data, &offset)) +      break; + +    const char *symbol_name = strtab_data.PeekCStr(symbol.st_name); +    if (!symbol_name) +      symbol_name = ""; + +    // No need to add non-section symbols that have no names +    if (symbol.getType() != STT_SECTION && +        (symbol_name == nullptr || symbol_name[0] == '\0')) +      continue; + +    // Skipping oatdata and oatexec sections if it is requested. See details +    // above the definition of skip_oatdata_oatexec for the reasons. +    if (skip_oatdata_oatexec && (::strcmp(symbol_name, "oatdata") == 0 || +                                 ::strcmp(symbol_name, "oatexec") == 0)) +      continue; + +    SectionSP symbol_section_sp; +    SymbolType symbol_type = eSymbolTypeInvalid; +    Elf64_Half shndx = symbol.st_shndx; + +    switch (shndx) { +    case SHN_ABS: +      symbol_type = eSymbolTypeAbsolute; +      break; +    case SHN_UNDEF: +      symbol_type = eSymbolTypeUndefined; +      break; +    default: +      symbol_section_sp = section_list->FindSectionByID(shndx); +      break; +    } + +    // If a symbol is undefined do not process it further even if it has a STT +    // type +    if (symbol_type != eSymbolTypeUndefined) { +      switch (symbol.getType()) { +      default: +      case STT_NOTYPE: +        // The symbol's type is not specified. +        break; + +      case STT_OBJECT: +        // The symbol is associated with a data object, such as a variable, an +        // array, etc. +        symbol_type = eSymbolTypeData; +        break; + +      case STT_FUNC: +        // The symbol is associated with a function or other executable code. +        symbol_type = eSymbolTypeCode; +        break; + +      case STT_SECTION: +        // The symbol is associated with a section. Symbol table entries of +        // this type exist primarily for relocation and normally have STB_LOCAL +        // binding. +        break; + +      case STT_FILE: +        // Conventionally, the symbol's name gives the name of the source file +        // associated with the object file. A file symbol has STB_LOCAL +        // binding, its section index is SHN_ABS, and it precedes the other +        // STB_LOCAL symbols for the file, if it is present. +        symbol_type = eSymbolTypeSourceFile; +        break; + +      case STT_GNU_IFUNC: +        // The symbol is associated with an indirect function. The actual +        // function will be resolved if it is referenced. +        symbol_type = eSymbolTypeResolver; +        break; +      } +    } + +    if (symbol_type == eSymbolTypeInvalid && symbol.getType() != STT_SECTION) { +      if (symbol_section_sp) { +        ConstString sect_name = symbol_section_sp->GetName(); +        if (sect_name == text_section_name || sect_name == init_section_name || +            sect_name == fini_section_name || sect_name == ctors_section_name || +            sect_name == dtors_section_name) { +          symbol_type = eSymbolTypeCode; +        } else if (sect_name == data_section_name || +                   sect_name == data2_section_name || +                   sect_name == rodata_section_name || +                   sect_name == rodata1_section_name || +                   sect_name == bss_section_name) { +          symbol_type = eSymbolTypeData; +        } +      } +    } + +    int64_t symbol_value_offset = 0; +    uint32_t additional_flags = 0; + +    if (arch.IsValid()) { +      if (arch.GetMachine() == llvm::Triple::arm) { +        if (symbol.getBinding() == STB_LOCAL) { +          char mapping_symbol = FindArmAarch64MappingSymbol(symbol_name); +          if (symbol_type == eSymbolTypeCode) { +            switch (mapping_symbol) { +            case 'a': +              // $a[.<any>]* - marks an ARM instruction sequence +              m_address_class_map[symbol.st_value] = AddressClass::eCode; +              break; +            case 'b': +            case 't': +              // $b[.<any>]* - marks a THUMB BL instruction sequence +              // $t[.<any>]* - marks a THUMB instruction sequence +              m_address_class_map[symbol.st_value] = +                  AddressClass::eCodeAlternateISA; +              break; +            case 'd': +              // $d[.<any>]* - marks a data item sequence (e.g. lit pool) +              m_address_class_map[symbol.st_value] = AddressClass::eData; +              break; +            } +          } +          if (mapping_symbol) +            continue; +        } +      } else if (arch.GetMachine() == llvm::Triple::aarch64) { +        if (symbol.getBinding() == STB_LOCAL) { +          char mapping_symbol = FindArmAarch64MappingSymbol(symbol_name); +          if (symbol_type == eSymbolTypeCode) { +            switch (mapping_symbol) { +            case 'x': +              // $x[.<any>]* - marks an A64 instruction sequence +              m_address_class_map[symbol.st_value] = AddressClass::eCode; +              break; +            case 'd': +              // $d[.<any>]* - marks a data item sequence (e.g. lit pool) +              m_address_class_map[symbol.st_value] = AddressClass::eData; +              break; +            } +          } +          if (mapping_symbol) +            continue; +        } +      } + +      if (arch.GetMachine() == llvm::Triple::arm) { +        if (symbol_type == eSymbolTypeCode) { +          if (symbol.st_value & 1) { +            // Subtracting 1 from the address effectively unsets the low order +            // bit, which results in the address actually pointing to the +            // beginning of the symbol. This delta will be used below in +            // conjunction with symbol.st_value to produce the final +            // symbol_value that we store in the symtab. +            symbol_value_offset = -1; +            m_address_class_map[symbol.st_value ^ 1] = +                AddressClass::eCodeAlternateISA; +          } else { +            // This address is ARM +            m_address_class_map[symbol.st_value] = AddressClass::eCode; +          } +        } +      } + +      /* +       * MIPS: +       * The bit #0 of an address is used for ISA mode (1 for microMIPS, 0 for +       * MIPS). +       * This allows processor to switch between microMIPS and MIPS without any +       * need +       * for special mode-control register. However, apart from .debug_line, +       * none of +       * the ELF/DWARF sections set the ISA bit (for symbol or section). Use +       * st_other +       * flag to check whether the symbol is microMIPS and then set the address +       * class +       * accordingly. +      */ +      if (arch.IsMIPS()) { +        if (IS_MICROMIPS(symbol.st_other)) +          m_address_class_map[symbol.st_value] = AddressClass::eCodeAlternateISA; +        else if ((symbol.st_value & 1) && (symbol_type == eSymbolTypeCode)) { +          symbol.st_value = symbol.st_value & (~1ull); +          m_address_class_map[symbol.st_value] = AddressClass::eCodeAlternateISA; +        } else { +          if (symbol_type == eSymbolTypeCode) +            m_address_class_map[symbol.st_value] = AddressClass::eCode; +          else if (symbol_type == eSymbolTypeData) +            m_address_class_map[symbol.st_value] = AddressClass::eData; +          else +            m_address_class_map[symbol.st_value] = AddressClass::eUnknown; +        } +      } +    } + +    // symbol_value_offset may contain 0 for ARM symbols or -1 for THUMB +    // symbols. See above for more details. +    uint64_t symbol_value = symbol.st_value + symbol_value_offset; + +    if (symbol_section_sp == nullptr && shndx == SHN_ABS && +        symbol.st_size != 0) { +      // We don't have a section for a symbol with non-zero size. Create a new +      // section for it so the address range covered by the symbol is also +      // covered by the module (represented through the section list). It is +      // needed so module lookup for the addresses covered by this symbol will +      // be successfull. This case happens for absolute symbols. +      ConstString fake_section_name(std::string(".absolute.") + symbol_name); +      symbol_section_sp = +          std::make_shared<Section>(module_sp, this, SHN_ABS, fake_section_name, +                                    eSectionTypeAbsoluteAddress, symbol_value, +                                    symbol.st_size, 0, 0, 0, SHF_ALLOC); + +      module_section_list->AddSection(symbol_section_sp); +      section_list->AddSection(symbol_section_sp); +    } + +    if (symbol_section_sp && +        CalculateType() != ObjectFile::Type::eTypeObjectFile) +      symbol_value -= symbol_section_sp->GetFileAddress(); + +    if (symbol_section_sp && module_section_list && +        module_section_list != section_list) { +      ConstString sect_name = symbol_section_sp->GetName(); +      auto section_it = section_name_to_section.find(sect_name.GetCString()); +      if (section_it == section_name_to_section.end()) +        section_it = +            section_name_to_section +                .emplace(sect_name.GetCString(), +                         module_section_list->FindSectionByName(sect_name)) +                .first; +      if (section_it->second) +        symbol_section_sp = section_it->second; +    } + +    bool is_global = symbol.getBinding() == STB_GLOBAL; +    uint32_t flags = symbol.st_other << 8 | symbol.st_info | additional_flags; +    bool is_mangled = (symbol_name[0] == '_' && symbol_name[1] == 'Z'); + +    llvm::StringRef symbol_ref(symbol_name); + +    // Symbol names may contain @VERSION suffixes. Find those and strip them +    // temporarily. +    size_t version_pos = symbol_ref.find('@'); +    bool has_suffix = version_pos != llvm::StringRef::npos; +    llvm::StringRef symbol_bare = symbol_ref.substr(0, version_pos); +    Mangled mangled(ConstString(symbol_bare), is_mangled); + +    // Now append the suffix back to mangled and unmangled names. Only do it if +    // the demangling was successful (string is not empty). +    if (has_suffix) { +      llvm::StringRef suffix = symbol_ref.substr(version_pos); + +      llvm::StringRef mangled_name = mangled.GetMangledName().GetStringRef(); +      if (!mangled_name.empty()) +        mangled.SetMangledName(ConstString((mangled_name + suffix).str())); + +      ConstString demangled = +          mangled.GetDemangledName(lldb::eLanguageTypeUnknown); +      llvm::StringRef demangled_name = demangled.GetStringRef(); +      if (!demangled_name.empty()) +        mangled.SetDemangledName(ConstString((demangled_name + suffix).str())); +    } + +    // In ELF all symbol should have a valid size but it is not true for some +    // function symbols coming from hand written assembly. As none of the +    // function symbol should have 0 size we try to calculate the size for +    // these symbols in the symtab with saying that their original size is not +    // valid. +    bool symbol_size_valid = +        symbol.st_size != 0 || symbol.getType() != STT_FUNC; + +    Symbol dc_symbol( +        i + start_id, // ID is the original symbol table index. +        mangled, +        symbol_type,                    // Type of this symbol +        is_global,                      // Is this globally visible? +        false,                          // Is this symbol debug info? +        false,                          // Is this symbol a trampoline? +        false,                          // Is this symbol artificial? +        AddressRange(symbol_section_sp, // Section in which this symbol is +                                        // defined or null. +                     symbol_value,      // Offset in section or symbol value. +                     symbol.st_size),   // Size in bytes of this symbol. +        symbol_size_valid,              // Symbol size is valid +        has_suffix,                     // Contains linker annotations? +        flags);                         // Symbol flags. +    symtab->AddSymbol(dc_symbol); +  } +  return i; +} + +unsigned ObjectFileELF::ParseSymbolTable(Symtab *symbol_table, +                                         user_id_t start_id, +                                         lldb_private::Section *symtab) { +  if (symtab->GetObjectFile() != this) { +    // If the symbol table section is owned by a different object file, have it +    // do the parsing. +    ObjectFileELF *obj_file_elf = +        static_cast<ObjectFileELF *>(symtab->GetObjectFile()); +    return obj_file_elf->ParseSymbolTable(symbol_table, start_id, symtab); +  } + +  // Get section list for this object file. +  SectionList *section_list = m_sections_up.get(); +  if (!section_list) +    return 0; + +  user_id_t symtab_id = symtab->GetID(); +  const ELFSectionHeaderInfo *symtab_hdr = GetSectionHeaderByIndex(symtab_id); +  assert(symtab_hdr->sh_type == SHT_SYMTAB || +         symtab_hdr->sh_type == SHT_DYNSYM); + +  // sh_link: section header index of associated string table. +  user_id_t strtab_id = symtab_hdr->sh_link; +  Section *strtab = section_list->FindSectionByID(strtab_id).get(); + +  if (symtab && strtab) { +    assert(symtab->GetObjectFile() == this); +    assert(strtab->GetObjectFile() == this); + +    DataExtractor symtab_data; +    DataExtractor strtab_data; +    if (ReadSectionData(symtab, symtab_data) && +        ReadSectionData(strtab, strtab_data)) { +      size_t num_symbols = symtab_data.GetByteSize() / symtab_hdr->sh_entsize; + +      return ParseSymbols(symbol_table, start_id, section_list, num_symbols, +                          symtab_data, strtab_data); +    } +  } + +  return 0; +} + +size_t ObjectFileELF::ParseDynamicSymbols() { +  if (m_dynamic_symbols.size()) +    return m_dynamic_symbols.size(); + +  SectionList *section_list = GetSectionList(); +  if (!section_list) +    return 0; + +  // Find the SHT_DYNAMIC section. +  Section *dynsym = +      section_list->FindSectionByType(eSectionTypeELFDynamicLinkInfo, true) +          .get(); +  if (!dynsym) +    return 0; +  assert(dynsym->GetObjectFile() == this); + +  ELFDynamic symbol; +  DataExtractor dynsym_data; +  if (ReadSectionData(dynsym, dynsym_data)) { +    const lldb::offset_t section_size = dynsym_data.GetByteSize(); +    lldb::offset_t cursor = 0; + +    while (cursor < section_size) { +      if (!symbol.Parse(dynsym_data, &cursor)) +        break; + +      m_dynamic_symbols.push_back(symbol); +    } +  } + +  return m_dynamic_symbols.size(); +} + +const ELFDynamic *ObjectFileELF::FindDynamicSymbol(unsigned tag) { +  if (!ParseDynamicSymbols()) +    return nullptr; + +  DynamicSymbolCollIter I = m_dynamic_symbols.begin(); +  DynamicSymbolCollIter E = m_dynamic_symbols.end(); +  for (; I != E; ++I) { +    ELFDynamic *symbol = &*I; + +    if (symbol->d_tag == tag) +      return symbol; +  } + +  return nullptr; +} + +unsigned ObjectFileELF::PLTRelocationType() { +  // DT_PLTREL +  //  This member specifies the type of relocation entry to which the +  //  procedure linkage table refers. The d_val member holds DT_REL or +  //  DT_RELA, as appropriate. All relocations in a procedure linkage table +  //  must use the same relocation. +  const ELFDynamic *symbol = FindDynamicSymbol(DT_PLTREL); + +  if (symbol) +    return symbol->d_val; + +  return 0; +} + +// Returns the size of the normal plt entries and the offset of the first +// normal plt entry. The 0th entry in the plt table is usually a resolution +// entry which have different size in some architectures then the rest of the +// plt entries. +static std::pair<uint64_t, uint64_t> +GetPltEntrySizeAndOffset(const ELFSectionHeader *rel_hdr, +                         const ELFSectionHeader *plt_hdr) { +  const elf_xword num_relocations = rel_hdr->sh_size / rel_hdr->sh_entsize; + +  // Clang 3.3 sets entsize to 4 for 32-bit binaries, but the plt entries are +  // 16 bytes. So round the entsize up by the alignment if addralign is set. +  elf_xword plt_entsize = +      plt_hdr->sh_addralign +          ? llvm::alignTo(plt_hdr->sh_entsize, plt_hdr->sh_addralign) +          : plt_hdr->sh_entsize; + +  // Some linkers e.g ld for arm, fill plt_hdr->sh_entsize field incorrectly. +  // PLT entries relocation code in general requires multiple instruction and +  // should be greater than 4 bytes in most cases. Try to guess correct size +  // just in case. +  if (plt_entsize <= 4) { +    // The linker haven't set the plt_hdr->sh_entsize field. Try to guess the +    // size of the plt entries based on the number of entries and the size of +    // the plt section with the assumption that the size of the 0th entry is at +    // least as big as the size of the normal entries and it isn't much bigger +    // then that. +    if (plt_hdr->sh_addralign) +      plt_entsize = plt_hdr->sh_size / plt_hdr->sh_addralign / +                    (num_relocations + 1) * plt_hdr->sh_addralign; +    else +      plt_entsize = plt_hdr->sh_size / (num_relocations + 1); +  } + +  elf_xword plt_offset = plt_hdr->sh_size - num_relocations * plt_entsize; + +  return std::make_pair(plt_entsize, plt_offset); +} + +static unsigned ParsePLTRelocations( +    Symtab *symbol_table, user_id_t start_id, unsigned rel_type, +    const ELFHeader *hdr, const ELFSectionHeader *rel_hdr, +    const ELFSectionHeader *plt_hdr, const ELFSectionHeader *sym_hdr, +    const lldb::SectionSP &plt_section_sp, DataExtractor &rel_data, +    DataExtractor &symtab_data, DataExtractor &strtab_data) { +  ELFRelocation rel(rel_type); +  ELFSymbol symbol; +  lldb::offset_t offset = 0; + +  uint64_t plt_offset, plt_entsize; +  std::tie(plt_entsize, plt_offset) = +      GetPltEntrySizeAndOffset(rel_hdr, plt_hdr); +  const elf_xword num_relocations = rel_hdr->sh_size / rel_hdr->sh_entsize; + +  typedef unsigned (*reloc_info_fn)(const ELFRelocation &rel); +  reloc_info_fn reloc_type; +  reloc_info_fn reloc_symbol; + +  if (hdr->Is32Bit()) { +    reloc_type = ELFRelocation::RelocType32; +    reloc_symbol = ELFRelocation::RelocSymbol32; +  } else { +    reloc_type = ELFRelocation::RelocType64; +    reloc_symbol = ELFRelocation::RelocSymbol64; +  } + +  unsigned slot_type = hdr->GetRelocationJumpSlotType(); +  unsigned i; +  for (i = 0; i < num_relocations; ++i) { +    if (!rel.Parse(rel_data, &offset)) +      break; + +    if (reloc_type(rel) != slot_type) +      continue; + +    lldb::offset_t symbol_offset = reloc_symbol(rel) * sym_hdr->sh_entsize; +    if (!symbol.Parse(symtab_data, &symbol_offset)) +      break; + +    const char *symbol_name = strtab_data.PeekCStr(symbol.st_name); +    bool is_mangled = +        symbol_name ? (symbol_name[0] == '_' && symbol_name[1] == 'Z') : false; +    uint64_t plt_index = plt_offset + i * plt_entsize; + +    Symbol jump_symbol( +        i + start_id,          // Symbol table index +        symbol_name,           // symbol name. +        is_mangled,            // is the symbol name mangled? +        eSymbolTypeTrampoline, // Type of this symbol +        false,                 // Is this globally visible? +        false,                 // Is this symbol debug info? +        true,                  // Is this symbol a trampoline? +        true,                  // Is this symbol artificial? +        plt_section_sp, // Section in which this symbol is defined or null. +        plt_index,      // Offset in section or symbol value. +        plt_entsize,    // Size in bytes of this symbol. +        true,           // Size is valid +        false,          // Contains linker annotations? +        0);             // Symbol flags. + +    symbol_table->AddSymbol(jump_symbol); +  } + +  return i; +} + +unsigned +ObjectFileELF::ParseTrampolineSymbols(Symtab *symbol_table, user_id_t start_id, +                                      const ELFSectionHeaderInfo *rel_hdr, +                                      user_id_t rel_id) { +  assert(rel_hdr->sh_type == SHT_RELA || rel_hdr->sh_type == SHT_REL); + +  // The link field points to the associated symbol table. +  user_id_t symtab_id = rel_hdr->sh_link; + +  // If the link field doesn't point to the appropriate symbol name table then +  // try to find it by name as some compiler don't fill in the link fields. +  if (!symtab_id) +    symtab_id = GetSectionIndexByName(".dynsym"); + +  // Get PLT section.  We cannot use rel_hdr->sh_info, since current linkers +  // point that to the .got.plt or .got section instead of .plt. +  user_id_t plt_id = GetSectionIndexByName(".plt"); + +  if (!symtab_id || !plt_id) +    return 0; + +  const ELFSectionHeaderInfo *plt_hdr = GetSectionHeaderByIndex(plt_id); +  if (!plt_hdr) +    return 0; + +  const ELFSectionHeaderInfo *sym_hdr = GetSectionHeaderByIndex(symtab_id); +  if (!sym_hdr) +    return 0; + +  SectionList *section_list = m_sections_up.get(); +  if (!section_list) +    return 0; + +  Section *rel_section = section_list->FindSectionByID(rel_id).get(); +  if (!rel_section) +    return 0; + +  SectionSP plt_section_sp(section_list->FindSectionByID(plt_id)); +  if (!plt_section_sp) +    return 0; + +  Section *symtab = section_list->FindSectionByID(symtab_id).get(); +  if (!symtab) +    return 0; + +  // sh_link points to associated string table. +  Section *strtab = section_list->FindSectionByID(sym_hdr->sh_link).get(); +  if (!strtab) +    return 0; + +  DataExtractor rel_data; +  if (!ReadSectionData(rel_section, rel_data)) +    return 0; + +  DataExtractor symtab_data; +  if (!ReadSectionData(symtab, symtab_data)) +    return 0; + +  DataExtractor strtab_data; +  if (!ReadSectionData(strtab, strtab_data)) +    return 0; + +  unsigned rel_type = PLTRelocationType(); +  if (!rel_type) +    return 0; + +  return ParsePLTRelocations(symbol_table, start_id, rel_type, &m_header, +                             rel_hdr, plt_hdr, sym_hdr, plt_section_sp, +                             rel_data, symtab_data, strtab_data); +} + +unsigned ObjectFileELF::ApplyRelocations( +    Symtab *symtab, const ELFHeader *hdr, const ELFSectionHeader *rel_hdr, +    const ELFSectionHeader *symtab_hdr, const ELFSectionHeader *debug_hdr, +    DataExtractor &rel_data, DataExtractor &symtab_data, +    DataExtractor &debug_data, Section *rel_section) { +  ELFRelocation rel(rel_hdr->sh_type); +  lldb::addr_t offset = 0; +  const unsigned num_relocations = rel_hdr->sh_size / rel_hdr->sh_entsize; +  typedef unsigned (*reloc_info_fn)(const ELFRelocation &rel); +  reloc_info_fn reloc_type; +  reloc_info_fn reloc_symbol; + +  if (hdr->Is32Bit()) { +    reloc_type = ELFRelocation::RelocType32; +    reloc_symbol = ELFRelocation::RelocSymbol32; +  } else { +    reloc_type = ELFRelocation::RelocType64; +    reloc_symbol = ELFRelocation::RelocSymbol64; +  } + +  for (unsigned i = 0; i < num_relocations; ++i) { +    if (!rel.Parse(rel_data, &offset)) +      break; + +    Symbol *symbol = nullptr; + +    if (hdr->Is32Bit()) { +      switch (reloc_type(rel)) { +      case R_386_32: +      case R_386_PC32: +      default: +        // FIXME: This asserts with this input: +        // +        // foo.cpp +        // int main(int argc, char **argv) { return 0; } +        // +        // clang++.exe --target=i686-unknown-linux-gnu -g -c foo.cpp -o foo.o +        // +        // and running this on the foo.o module. +        assert(false && "unexpected relocation type"); +      } +    } else { +      switch (reloc_type(rel)) { +      case R_AARCH64_ABS64: +      case R_X86_64_64: { +        symbol = symtab->FindSymbolByID(reloc_symbol(rel)); +        if (symbol) { +          addr_t value = symbol->GetAddressRef().GetFileAddress(); +          DataBufferSP &data_buffer_sp = debug_data.GetSharedDataBuffer(); +          uint64_t *dst = reinterpret_cast<uint64_t *>( +              data_buffer_sp->GetBytes() + rel_section->GetFileOffset() + +              ELFRelocation::RelocOffset64(rel)); +          uint64_t val_offset = value + ELFRelocation::RelocAddend64(rel); +          memcpy(dst, &val_offset, sizeof(uint64_t)); +        } +        break; +      } +      case R_X86_64_32: +      case R_X86_64_32S: +      case R_AARCH64_ABS32: { +        symbol = symtab->FindSymbolByID(reloc_symbol(rel)); +        if (symbol) { +          addr_t value = symbol->GetAddressRef().GetFileAddress(); +          value += ELFRelocation::RelocAddend32(rel); +          if ((reloc_type(rel) == R_X86_64_32 && (value > UINT32_MAX)) || +              (reloc_type(rel) == R_X86_64_32S && +               ((int64_t)value > INT32_MAX && (int64_t)value < INT32_MIN)) || +              (reloc_type(rel) == R_AARCH64_ABS32 && +               ((int64_t)value > INT32_MAX && (int64_t)value < INT32_MIN))) { +            Log *log = +                lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_MODULES); +            log->Printf("Failed to apply debug info relocations"); +            break; +          } +          uint32_t truncated_addr = (value & 0xFFFFFFFF); +          DataBufferSP &data_buffer_sp = debug_data.GetSharedDataBuffer(); +          uint32_t *dst = reinterpret_cast<uint32_t *>( +              data_buffer_sp->GetBytes() + rel_section->GetFileOffset() + +              ELFRelocation::RelocOffset32(rel)); +          memcpy(dst, &truncated_addr, sizeof(uint32_t)); +        } +        break; +      } +      case R_X86_64_PC32: +      default: +        assert(false && "unexpected relocation type"); +      } +    } +  } + +  return 0; +} + +unsigned ObjectFileELF::RelocateDebugSections(const ELFSectionHeader *rel_hdr, +                                              user_id_t rel_id, +                                              lldb_private::Symtab *thetab) { +  assert(rel_hdr->sh_type == SHT_RELA || rel_hdr->sh_type == SHT_REL); + +  // Parse in the section list if needed. +  SectionList *section_list = GetSectionList(); +  if (!section_list) +    return 0; + +  user_id_t symtab_id = rel_hdr->sh_link; +  user_id_t debug_id = rel_hdr->sh_info; + +  const ELFSectionHeader *symtab_hdr = GetSectionHeaderByIndex(symtab_id); +  if (!symtab_hdr) +    return 0; + +  const ELFSectionHeader *debug_hdr = GetSectionHeaderByIndex(debug_id); +  if (!debug_hdr) +    return 0; + +  Section *rel = section_list->FindSectionByID(rel_id).get(); +  if (!rel) +    return 0; + +  Section *symtab = section_list->FindSectionByID(symtab_id).get(); +  if (!symtab) +    return 0; + +  Section *debug = section_list->FindSectionByID(debug_id).get(); +  if (!debug) +    return 0; + +  DataExtractor rel_data; +  DataExtractor symtab_data; +  DataExtractor debug_data; + +  if (GetData(rel->GetFileOffset(), rel->GetFileSize(), rel_data) && +      GetData(symtab->GetFileOffset(), symtab->GetFileSize(), symtab_data) && +      GetData(debug->GetFileOffset(), debug->GetFileSize(), debug_data)) { +    ApplyRelocations(thetab, &m_header, rel_hdr, symtab_hdr, debug_hdr, +                     rel_data, symtab_data, debug_data, debug); +  } + +  return 0; +} + +Symtab *ObjectFileELF::GetSymtab() { +  ModuleSP module_sp(GetModule()); +  if (!module_sp) +    return nullptr; + +  // We always want to use the main object file so we (hopefully) only have one +  // cached copy of our symtab, dynamic sections, etc. +  ObjectFile *module_obj_file = module_sp->GetObjectFile(); +  if (module_obj_file && module_obj_file != this) +    return module_obj_file->GetSymtab(); + +  if (m_symtab_up == nullptr) { +    SectionList *section_list = module_sp->GetSectionList(); +    if (!section_list) +      return nullptr; + +    uint64_t symbol_id = 0; +    std::lock_guard<std::recursive_mutex> guard(module_sp->GetMutex()); + +    // Sharable objects and dynamic executables usually have 2 distinct symbol +    // tables, one named ".symtab", and the other ".dynsym". The dynsym is a +    // smaller version of the symtab that only contains global symbols. The +    // information found in the dynsym is therefore also found in the symtab, +    // while the reverse is not necessarily true. +    Section *symtab = +        section_list->FindSectionByType(eSectionTypeELFSymbolTable, true).get(); +    if (!symtab) { +      // The symtab section is non-allocable and can be stripped, so if it +      // doesn't exist then use the dynsym section which should always be +      // there. +      symtab = +          section_list->FindSectionByType(eSectionTypeELFDynamicSymbols, true) +              .get(); +    } +    if (symtab) { +      m_symtab_up.reset(new Symtab(symtab->GetObjectFile())); +      symbol_id += ParseSymbolTable(m_symtab_up.get(), symbol_id, symtab); +    } + +    // DT_JMPREL +    //      If present, this entry's d_ptr member holds the address of +    //      relocation +    //      entries associated solely with the procedure linkage table. +    //      Separating +    //      these relocation entries lets the dynamic linker ignore them during +    //      process initialization, if lazy binding is enabled. If this entry is +    //      present, the related entries of types DT_PLTRELSZ and DT_PLTREL must +    //      also be present. +    const ELFDynamic *symbol = FindDynamicSymbol(DT_JMPREL); +    if (symbol) { +      // Synthesize trampoline symbols to help navigate the PLT. +      addr_t addr = symbol->d_ptr; +      Section *reloc_section = +          section_list->FindSectionContainingFileAddress(addr).get(); +      if (reloc_section) { +        user_id_t reloc_id = reloc_section->GetID(); +        const ELFSectionHeaderInfo *reloc_header = +            GetSectionHeaderByIndex(reloc_id); +        assert(reloc_header); + +        if (m_symtab_up == nullptr) +          m_symtab_up.reset(new Symtab(reloc_section->GetObjectFile())); + +        ParseTrampolineSymbols(m_symtab_up.get(), symbol_id, reloc_header, +                               reloc_id); +      } +    } + +    if (DWARFCallFrameInfo *eh_frame = +            GetModule()->GetUnwindTable().GetEHFrameInfo()) { +      if (m_symtab_up == nullptr) +        m_symtab_up.reset(new Symtab(this)); +      ParseUnwindSymbols(m_symtab_up.get(), eh_frame); +    } + +    // If we still don't have any symtab then create an empty instance to avoid +    // do the section lookup next time. +    if (m_symtab_up == nullptr) +      m_symtab_up.reset(new Symtab(this)); + +    m_symtab_up->CalculateSymbolSizes(); +  } + +  return m_symtab_up.get(); +} + +void ObjectFileELF::RelocateSection(lldb_private::Section *section) +{ +  static const char *debug_prefix = ".debug"; + +  // Set relocated bit so we stop getting called, regardless of whether we +  // actually relocate. +  section->SetIsRelocated(true); + +  // We only relocate in ELF relocatable files +  if (CalculateType() != eTypeObjectFile) +    return; + +  const char *section_name = section->GetName().GetCString(); +  // Can't relocate that which can't be named +  if (section_name == nullptr) +    return; + +  // We don't relocate non-debug sections at the moment +  if (strncmp(section_name, debug_prefix, strlen(debug_prefix))) +    return; + +  // Relocation section names to look for +  std::string needle = std::string(".rel") + section_name; +  std::string needlea = std::string(".rela") + section_name; + +  for (SectionHeaderCollIter I = m_section_headers.begin(); +       I != m_section_headers.end(); ++I) { +    if (I->sh_type == SHT_RELA || I->sh_type == SHT_REL) { +      const char *hay_name = I->section_name.GetCString(); +      if (hay_name == nullptr) +        continue; +      if (needle == hay_name || needlea == hay_name) { +        const ELFSectionHeader &reloc_header = *I; +        user_id_t reloc_id = SectionIndex(I); +        RelocateDebugSections(&reloc_header, reloc_id, GetSymtab()); +        break; +      } +    } +  } +} + +void ObjectFileELF::ParseUnwindSymbols(Symtab *symbol_table, +                                       DWARFCallFrameInfo *eh_frame) { +  SectionList *section_list = GetSectionList(); +  if (!section_list) +    return; + +  // First we save the new symbols into a separate list and add them to the +  // symbol table after we colleced all symbols we want to add. This is +  // neccessary because adding a new symbol invalidates the internal index of +  // the symtab what causing the next lookup to be slow because it have to +  // recalculate the index first. +  std::vector<Symbol> new_symbols; + +  eh_frame->ForEachFDEEntries([this, symbol_table, section_list, &new_symbols]( +      lldb::addr_t file_addr, uint32_t size, dw_offset_t) { +    Symbol *symbol = symbol_table->FindSymbolAtFileAddress(file_addr); +    if (symbol) { +      if (!symbol->GetByteSizeIsValid()) { +        symbol->SetByteSize(size); +        symbol->SetSizeIsSynthesized(true); +      } +    } else { +      SectionSP section_sp = +          section_list->FindSectionContainingFileAddress(file_addr); +      if (section_sp) { +        addr_t offset = file_addr - section_sp->GetFileAddress(); +        const char *symbol_name = GetNextSyntheticSymbolName().GetCString(); +        uint64_t symbol_id = symbol_table->GetNumSymbols(); +        Symbol eh_symbol( +            symbol_id,       // Symbol table index. +            symbol_name,     // Symbol name. +            false,           // Is the symbol name mangled? +            eSymbolTypeCode, // Type of this symbol. +            true,            // Is this globally visible? +            false,           // Is this symbol debug info? +            false,           // Is this symbol a trampoline? +            true,            // Is this symbol artificial? +            section_sp,      // Section in which this symbol is defined or null. +            offset,          // Offset in section or symbol value. +            0,     // Size:          Don't specify the size as an FDE can +            false, // Size is valid: cover multiple symbols. +            false, // Contains linker annotations? +            0);    // Symbol flags. +        new_symbols.push_back(eh_symbol); +      } +    } +    return true; +  }); + +  for (const Symbol &s : new_symbols) +    symbol_table->AddSymbol(s); +} + +bool ObjectFileELF::IsStripped() { +  // TODO: determine this for ELF +  return false; +} + +//===----------------------------------------------------------------------===// +// Dump +// +// Dump the specifics of the runtime file container (such as any headers +// segments, sections, etc). +void ObjectFileELF::Dump(Stream *s) { +  ModuleSP module_sp(GetModule()); +  if (!module_sp) { +    return; +  } + +  std::lock_guard<std::recursive_mutex> guard(module_sp->GetMutex()); +  s->Printf("%p: ", static_cast<void *>(this)); +  s->Indent(); +  s->PutCString("ObjectFileELF"); + +  ArchSpec header_arch = GetArchitecture(); + +  *s << ", file = '" << m_file +     << "', arch = " << header_arch.GetArchitectureName() << "\n"; + +  DumpELFHeader(s, m_header); +  s->EOL(); +  DumpELFProgramHeaders(s); +  s->EOL(); +  DumpELFSectionHeaders(s); +  s->EOL(); +  SectionList *section_list = GetSectionList(); +  if (section_list) +    section_list->Dump(s, nullptr, true, UINT32_MAX); +  Symtab *symtab = GetSymtab(); +  if (symtab) +    symtab->Dump(s, nullptr, eSortOrderNone); +  s->EOL(); +  DumpDependentModules(s); +  s->EOL(); +} + +// DumpELFHeader +// +// Dump the ELF header to the specified output stream +void ObjectFileELF::DumpELFHeader(Stream *s, const ELFHeader &header) { +  s->PutCString("ELF Header\n"); +  s->Printf("e_ident[EI_MAG0   ] = 0x%2.2x\n", header.e_ident[EI_MAG0]); +  s->Printf("e_ident[EI_MAG1   ] = 0x%2.2x '%c'\n", header.e_ident[EI_MAG1], +            header.e_ident[EI_MAG1]); +  s->Printf("e_ident[EI_MAG2   ] = 0x%2.2x '%c'\n", header.e_ident[EI_MAG2], +            header.e_ident[EI_MAG2]); +  s->Printf("e_ident[EI_MAG3   ] = 0x%2.2x '%c'\n", header.e_ident[EI_MAG3], +            header.e_ident[EI_MAG3]); + +  s->Printf("e_ident[EI_CLASS  ] = 0x%2.2x\n", header.e_ident[EI_CLASS]); +  s->Printf("e_ident[EI_DATA   ] = 0x%2.2x ", header.e_ident[EI_DATA]); +  DumpELFHeader_e_ident_EI_DATA(s, header.e_ident[EI_DATA]); +  s->Printf("\ne_ident[EI_VERSION] = 0x%2.2x\n", header.e_ident[EI_VERSION]); +  s->Printf("e_ident[EI_PAD    ] = 0x%2.2x\n", header.e_ident[EI_PAD]); + +  s->Printf("e_type      = 0x%4.4x ", header.e_type); +  DumpELFHeader_e_type(s, header.e_type); +  s->Printf("\ne_machine   = 0x%4.4x\n", header.e_machine); +  s->Printf("e_version   = 0x%8.8x\n", header.e_version); +  s->Printf("e_entry     = 0x%8.8" PRIx64 "\n", header.e_entry); +  s->Printf("e_phoff     = 0x%8.8" PRIx64 "\n", header.e_phoff); +  s->Printf("e_shoff     = 0x%8.8" PRIx64 "\n", header.e_shoff); +  s->Printf("e_flags     = 0x%8.8x\n", header.e_flags); +  s->Printf("e_ehsize    = 0x%4.4x\n", header.e_ehsize); +  s->Printf("e_phentsize = 0x%4.4x\n", header.e_phentsize); +  s->Printf("e_phnum     = 0x%8.8x\n", header.e_phnum); +  s->Printf("e_shentsize = 0x%4.4x\n", header.e_shentsize); +  s->Printf("e_shnum     = 0x%8.8x\n", header.e_shnum); +  s->Printf("e_shstrndx  = 0x%8.8x\n", header.e_shstrndx); +} + +// DumpELFHeader_e_type +// +// Dump an token value for the ELF header member e_type +void ObjectFileELF::DumpELFHeader_e_type(Stream *s, elf_half e_type) { +  switch (e_type) { +  case ET_NONE: +    *s << "ET_NONE"; +    break; +  case ET_REL: +    *s << "ET_REL"; +    break; +  case ET_EXEC: +    *s << "ET_EXEC"; +    break; +  case ET_DYN: +    *s << "ET_DYN"; +    break; +  case ET_CORE: +    *s << "ET_CORE"; +    break; +  default: +    break; +  } +} + +// DumpELFHeader_e_ident_EI_DATA +// +// Dump an token value for the ELF header member e_ident[EI_DATA] +void ObjectFileELF::DumpELFHeader_e_ident_EI_DATA(Stream *s, +                                                  unsigned char ei_data) { +  switch (ei_data) { +  case ELFDATANONE: +    *s << "ELFDATANONE"; +    break; +  case ELFDATA2LSB: +    *s << "ELFDATA2LSB - Little Endian"; +    break; +  case ELFDATA2MSB: +    *s << "ELFDATA2MSB - Big Endian"; +    break; +  default: +    break; +  } +} + +// DumpELFProgramHeader +// +// Dump a single ELF program header to the specified output stream +void ObjectFileELF::DumpELFProgramHeader(Stream *s, +                                         const ELFProgramHeader &ph) { +  DumpELFProgramHeader_p_type(s, ph.p_type); +  s->Printf(" %8.8" PRIx64 " %8.8" PRIx64 " %8.8" PRIx64, ph.p_offset, +            ph.p_vaddr, ph.p_paddr); +  s->Printf(" %8.8" PRIx64 " %8.8" PRIx64 " %8.8x (", ph.p_filesz, ph.p_memsz, +            ph.p_flags); + +  DumpELFProgramHeader_p_flags(s, ph.p_flags); +  s->Printf(") %8.8" PRIx64, ph.p_align); +} + +// DumpELFProgramHeader_p_type +// +// Dump an token value for the ELF program header member p_type which describes +// the type of the program header +void ObjectFileELF::DumpELFProgramHeader_p_type(Stream *s, elf_word p_type) { +  const int kStrWidth = 15; +  switch (p_type) { +    CASE_AND_STREAM(s, PT_NULL, kStrWidth); +    CASE_AND_STREAM(s, PT_LOAD, kStrWidth); +    CASE_AND_STREAM(s, PT_DYNAMIC, kStrWidth); +    CASE_AND_STREAM(s, PT_INTERP, kStrWidth); +    CASE_AND_STREAM(s, PT_NOTE, kStrWidth); +    CASE_AND_STREAM(s, PT_SHLIB, kStrWidth); +    CASE_AND_STREAM(s, PT_PHDR, kStrWidth); +    CASE_AND_STREAM(s, PT_TLS, kStrWidth); +    CASE_AND_STREAM(s, PT_GNU_EH_FRAME, kStrWidth); +  default: +    s->Printf("0x%8.8x%*s", p_type, kStrWidth - 10, ""); +    break; +  } +} + +// DumpELFProgramHeader_p_flags +// +// Dump an token value for the ELF program header member p_flags +void ObjectFileELF::DumpELFProgramHeader_p_flags(Stream *s, elf_word p_flags) { +  *s << ((p_flags & PF_X) ? "PF_X" : "    ") +     << (((p_flags & PF_X) && (p_flags & PF_W)) ? '+' : ' ') +     << ((p_flags & PF_W) ? "PF_W" : "    ") +     << (((p_flags & PF_W) && (p_flags & PF_R)) ? '+' : ' ') +     << ((p_flags & PF_R) ? "PF_R" : "    "); +} + +// DumpELFProgramHeaders +// +// Dump all of the ELF program header to the specified output stream +void ObjectFileELF::DumpELFProgramHeaders(Stream *s) { +  if (!ParseProgramHeaders()) +    return; + +  s->PutCString("Program Headers\n"); +  s->PutCString("IDX  p_type          p_offset p_vaddr  p_paddr  " +                "p_filesz p_memsz  p_flags                   p_align\n"); +  s->PutCString("==== --------------- -------- -------- -------- " +                "-------- -------- ------------------------- --------\n"); + +  for (const auto &H : llvm::enumerate(m_program_headers)) { +    s->Format("[{0,2}] ", H.index()); +    ObjectFileELF::DumpELFProgramHeader(s, H.value()); +    s->EOL(); +  } +} + +// DumpELFSectionHeader +// +// Dump a single ELF section header to the specified output stream +void ObjectFileELF::DumpELFSectionHeader(Stream *s, +                                         const ELFSectionHeaderInfo &sh) { +  s->Printf("%8.8x ", sh.sh_name); +  DumpELFSectionHeader_sh_type(s, sh.sh_type); +  s->Printf(" %8.8" PRIx64 " (", sh.sh_flags); +  DumpELFSectionHeader_sh_flags(s, sh.sh_flags); +  s->Printf(") %8.8" PRIx64 " %8.8" PRIx64 " %8.8" PRIx64, sh.sh_addr, +            sh.sh_offset, sh.sh_size); +  s->Printf(" %8.8x %8.8x", sh.sh_link, sh.sh_info); +  s->Printf(" %8.8" PRIx64 " %8.8" PRIx64, sh.sh_addralign, sh.sh_entsize); +} + +// DumpELFSectionHeader_sh_type +// +// Dump an token value for the ELF section header member sh_type which +// describes the type of the section +void ObjectFileELF::DumpELFSectionHeader_sh_type(Stream *s, elf_word sh_type) { +  const int kStrWidth = 12; +  switch (sh_type) { +    CASE_AND_STREAM(s, SHT_NULL, kStrWidth); +    CASE_AND_STREAM(s, SHT_PROGBITS, kStrWidth); +    CASE_AND_STREAM(s, SHT_SYMTAB, kStrWidth); +    CASE_AND_STREAM(s, SHT_STRTAB, kStrWidth); +    CASE_AND_STREAM(s, SHT_RELA, kStrWidth); +    CASE_AND_STREAM(s, SHT_HASH, kStrWidth); +    CASE_AND_STREAM(s, SHT_DYNAMIC, kStrWidth); +    CASE_AND_STREAM(s, SHT_NOTE, kStrWidth); +    CASE_AND_STREAM(s, SHT_NOBITS, kStrWidth); +    CASE_AND_STREAM(s, SHT_REL, kStrWidth); +    CASE_AND_STREAM(s, SHT_SHLIB, kStrWidth); +    CASE_AND_STREAM(s, SHT_DYNSYM, kStrWidth); +    CASE_AND_STREAM(s, SHT_LOPROC, kStrWidth); +    CASE_AND_STREAM(s, SHT_HIPROC, kStrWidth); +    CASE_AND_STREAM(s, SHT_LOUSER, kStrWidth); +    CASE_AND_STREAM(s, SHT_HIUSER, kStrWidth); +  default: +    s->Printf("0x%8.8x%*s", sh_type, kStrWidth - 10, ""); +    break; +  } +} + +// DumpELFSectionHeader_sh_flags +// +// Dump an token value for the ELF section header member sh_flags +void ObjectFileELF::DumpELFSectionHeader_sh_flags(Stream *s, +                                                  elf_xword sh_flags) { +  *s << ((sh_flags & SHF_WRITE) ? "WRITE" : "     ") +     << (((sh_flags & SHF_WRITE) && (sh_flags & SHF_ALLOC)) ? '+' : ' ') +     << ((sh_flags & SHF_ALLOC) ? "ALLOC" : "     ") +     << (((sh_flags & SHF_ALLOC) && (sh_flags & SHF_EXECINSTR)) ? '+' : ' ') +     << ((sh_flags & SHF_EXECINSTR) ? "EXECINSTR" : "         "); +} + +// DumpELFSectionHeaders +// +// Dump all of the ELF section header to the specified output stream +void ObjectFileELF::DumpELFSectionHeaders(Stream *s) { +  if (!ParseSectionHeaders()) +    return; + +  s->PutCString("Section Headers\n"); +  s->PutCString("IDX  name     type         flags                            " +                "addr     offset   size     link     info     addralgn " +                "entsize  Name\n"); +  s->PutCString("==== -------- ------------ -------------------------------- " +                "-------- -------- -------- -------- -------- -------- " +                "-------- ====================\n"); + +  uint32_t idx = 0; +  for (SectionHeaderCollConstIter I = m_section_headers.begin(); +       I != m_section_headers.end(); ++I, ++idx) { +    s->Printf("[%2u] ", idx); +    ObjectFileELF::DumpELFSectionHeader(s, *I); +    const char *section_name = I->section_name.AsCString(""); +    if (section_name) +      *s << ' ' << section_name << "\n"; +  } +} + +void ObjectFileELF::DumpDependentModules(lldb_private::Stream *s) { +  size_t num_modules = ParseDependentModules(); + +  if (num_modules > 0) { +    s->PutCString("Dependent Modules:\n"); +    for (unsigned i = 0; i < num_modules; ++i) { +      const FileSpec &spec = m_filespec_up->GetFileSpecAtIndex(i); +      s->Printf("   %s\n", spec.GetFilename().GetCString()); +    } +  } +} + +ArchSpec ObjectFileELF::GetArchitecture() { +  if (!ParseHeader()) +    return ArchSpec(); + +  if (m_section_headers.empty()) { +    // Allow elf notes to be parsed which may affect the detected architecture. +    ParseSectionHeaders(); +  } + +  if (CalculateType() == eTypeCoreFile && +      !m_arch_spec.TripleOSWasSpecified()) { +    // Core files don't have section headers yet they have PT_NOTE program +    // headers that might shed more light on the architecture +    for (const elf::ELFProgramHeader &H : ProgramHeaders()) { +      if (H.p_type != PT_NOTE || H.p_offset == 0 || H.p_filesz == 0) +        continue; +      DataExtractor data; +      if (data.SetData(m_data, H.p_offset, H.p_filesz) == H.p_filesz) { +        UUID uuid; +        RefineModuleDetailsFromNote(data, m_arch_spec, uuid); +      } +    } +  } +  return m_arch_spec; +} + +ObjectFile::Type ObjectFileELF::CalculateType() { +  switch (m_header.e_type) { +  case llvm::ELF::ET_NONE: +    // 0 - No file type +    return eTypeUnknown; + +  case llvm::ELF::ET_REL: +    // 1 - Relocatable file +    return eTypeObjectFile; + +  case llvm::ELF::ET_EXEC: +    // 2 - Executable file +    return eTypeExecutable; + +  case llvm::ELF::ET_DYN: +    // 3 - Shared object file +    return eTypeSharedLibrary; + +  case ET_CORE: +    // 4 - Core file +    return eTypeCoreFile; + +  default: +    break; +  } +  return eTypeUnknown; +} + +ObjectFile::Strata ObjectFileELF::CalculateStrata() { +  switch (m_header.e_type) { +  case llvm::ELF::ET_NONE: +    // 0 - No file type +    return eStrataUnknown; + +  case llvm::ELF::ET_REL: +    // 1 - Relocatable file +    return eStrataUnknown; + +  case llvm::ELF::ET_EXEC: +    // 2 - Executable file +    // TODO: is there any way to detect that an executable is a kernel +    // related executable by inspecting the program headers, section headers, +    // symbols, or any other flag bits??? +    return eStrataUser; + +  case llvm::ELF::ET_DYN: +    // 3 - Shared object file +    // TODO: is there any way to detect that an shared library is a kernel +    // related executable by inspecting the program headers, section headers, +    // symbols, or any other flag bits??? +    return eStrataUnknown; + +  case ET_CORE: +    // 4 - Core file +    // TODO: is there any way to detect that an core file is a kernel +    // related executable by inspecting the program headers, section headers, +    // symbols, or any other flag bits??? +    return eStrataUnknown; + +  default: +    break; +  } +  return eStrataUnknown; +} + +size_t ObjectFileELF::ReadSectionData(Section *section, +                       lldb::offset_t section_offset, void *dst, +                       size_t dst_len) { +  // If some other objectfile owns this data, pass this to them. +  if (section->GetObjectFile() != this) +    return section->GetObjectFile()->ReadSectionData(section, section_offset, +                                                     dst, dst_len); + +  if (!section->Test(SHF_COMPRESSED)) +    return ObjectFile::ReadSectionData(section, section_offset, dst, dst_len); + +  // For compressed sections we need to read to full data to be able to +  // decompress. +  DataExtractor data; +  ReadSectionData(section, data); +  return data.CopyData(section_offset, dst_len, dst); +} + +size_t ObjectFileELF::ReadSectionData(Section *section, +                                      DataExtractor §ion_data) { +  // If some other objectfile owns this data, pass this to them. +  if (section->GetObjectFile() != this) +    return section->GetObjectFile()->ReadSectionData(section, section_data); + +  size_t result = ObjectFile::ReadSectionData(section, section_data); +  if (result == 0 || !llvm::object::Decompressor::isCompressedELFSection( +                         section->Get(), section->GetName().GetStringRef())) +    return result; + +  auto Decompressor = llvm::object::Decompressor::create( +      section->GetName().GetStringRef(), +      {reinterpret_cast<const char *>(section_data.GetDataStart()), +       size_t(section_data.GetByteSize())}, +      GetByteOrder() == eByteOrderLittle, GetAddressByteSize() == 8); +  if (!Decompressor) { +    GetModule()->ReportWarning( +        "Unable to initialize decompressor for section '%s': %s", +        section->GetName().GetCString(), +        llvm::toString(Decompressor.takeError()).c_str()); +    section_data.Clear(); +    return 0; +  } + +  auto buffer_sp = +      std::make_shared<DataBufferHeap>(Decompressor->getDecompressedSize(), 0); +  if (auto error = Decompressor->decompress( +          {reinterpret_cast<char *>(buffer_sp->GetBytes()), +           size_t(buffer_sp->GetByteSize())})) { +    GetModule()->ReportWarning( +        "Decompression of section '%s' failed: %s", +        section->GetName().GetCString(), +        llvm::toString(std::move(error)).c_str()); +    section_data.Clear(); +    return 0; +  } + +  section_data.SetData(buffer_sp); +  return buffer_sp->GetByteSize(); +} + +llvm::ArrayRef<ELFProgramHeader> ObjectFileELF::ProgramHeaders() { +  ParseProgramHeaders(); +  return m_program_headers; +} + +DataExtractor ObjectFileELF::GetSegmentData(const ELFProgramHeader &H) { +  return DataExtractor(m_data, H.p_offset, H.p_filesz); +} + +bool ObjectFileELF::AnySegmentHasPhysicalAddress() { +  for (const ELFProgramHeader &H : ProgramHeaders()) { +    if (H.p_paddr != 0) +      return true; +  } +  return false; +} + +std::vector<ObjectFile::LoadableData> +ObjectFileELF::GetLoadableData(Target &target) { +  // Create a list of loadable data from loadable segments, using physical +  // addresses if they aren't all null +  std::vector<LoadableData> loadables; +  bool should_use_paddr = AnySegmentHasPhysicalAddress(); +  for (const ELFProgramHeader &H : ProgramHeaders()) { +    LoadableData loadable; +    if (H.p_type != llvm::ELF::PT_LOAD) +      continue; +    loadable.Dest = should_use_paddr ? H.p_paddr : H.p_vaddr; +    if (loadable.Dest == LLDB_INVALID_ADDRESS) +      continue; +    if (H.p_filesz == 0) +      continue; +    auto segment_data = GetSegmentData(H); +    loadable.Contents = llvm::ArrayRef<uint8_t>(segment_data.GetDataStart(), +                                                segment_data.GetByteSize()); +    loadables.push_back(loadable); +  } +  return loadables; +}  | 
