* config/sparc/nm-linux.h: Include config/nm-linux.h.
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c
SS
1/* Read ELF (Executable and Linking Format) object files for GDB.
2 Copyright 1991, 92, 93, 94, 95, 96, 1998 Free Software Foundation, Inc.
3 Written by Fred Fish at Cygnus Support.
4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b
JM
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
c906108c
SS
21
22#include "defs.h"
23#include "bfd.h"
24#include "gdb_string.h"
25#include "elf-bfd.h"
26#include "elf/mips.h"
27#include "symtab.h"
28#include "symfile.h"
29#include "objfiles.h"
30#include "buildsym.h"
31#include "stabsread.h"
32#include "gdb-stabs.h"
33#include "complaints.h"
34#include "demangle.h"
35
392a587b
JM
36extern void _initialize_elfread PARAMS ((void));
37
c906108c 38/* The struct elfinfo is available only during ELF symbol table and
6426a772 39 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
40 It's local to elf_symfile_read. */
41
c5aa993b
JM
42struct elfinfo
43 {
44 file_ptr dboffset; /* Offset to dwarf debug section */
45 unsigned int dbsize; /* Size of dwarf debug section */
46 file_ptr lnoffset; /* Offset to dwarf line number section */
47 unsigned int lnsize; /* Size of dwarf line number section */
48 asection *stabsect; /* Section pointer for .stab section */
49 asection *stabindexsect; /* Section pointer for .stab.index section */
50 asection *mdebugsect; /* Section pointer for .mdebug section */
51 };
c906108c
SS
52
53/* Various things we might complain about... */
54
c5aa993b
JM
55struct complaint section_info_complaint =
56{"elf/stab section information %s without a preceding file symbol", 0, 0};
c906108c 57
c5aa993b
JM
58struct complaint section_info_dup_complaint =
59{"duplicated elf/stab section information for %s", 0, 0};
c906108c 60
c5aa993b
JM
61struct complaint stab_info_mismatch_complaint =
62{"elf/stab section information missing for %s", 0, 0};
c906108c 63
c5aa993b
JM
64struct complaint stab_info_questionable_complaint =
65{"elf/stab section information questionable for %s", 0, 0};
c906108c
SS
66
67static void
68elf_symfile_init PARAMS ((struct objfile *));
69
70static void
71elf_new_init PARAMS ((struct objfile *));
72
73static void
96baa820 74elf_symfile_read PARAMS ((struct objfile *, int));
c906108c
SS
75
76static void
77elf_symfile_finish PARAMS ((struct objfile *));
78
79static void
d4f3574e 80elf_symtab_read PARAMS ((struct objfile *, int));
c906108c
SS
81
82static void
83free_elfinfo PARAMS ((void *));
84
85static struct minimal_symbol *
c5aa993b
JM
86 record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
87 enum minimal_symbol_type, char *,
88 asection * bfd_section,
89 struct objfile *));
c906108c
SS
90
91static void
92elf_locate_sections PARAMS ((bfd *, asection *, void *));
93
94/* We are called once per section from elf_symfile_read. We
95 need to examine each section we are passed, check to see
96 if it is something we are interested in processing, and
97 if so, stash away some access information for the section.
98
99 For now we recognize the dwarf debug information sections and
100 line number sections from matching their section names. The
101 ELF definition is no real help here since it has no direct
102 knowledge of DWARF (by design, so any debugging format can be
103 used).
104
105 We also recognize the ".stab" sections used by the Sun compilers
106 released with Solaris 2.
107
108 FIXME: The section names should not be hardwired strings (what
109 should they be? I don't think most object file formats have enough
110 section flags to specify what kind of debug section it is
111 -kingdon). */
112
113static void
114elf_locate_sections (ignore_abfd, sectp, eip)
115 bfd *ignore_abfd;
116 asection *sectp;
117 PTR eip;
118{
119 register struct elfinfo *ei;
120
121 ei = (struct elfinfo *) eip;
c5aa993b 122 if (STREQ (sectp->name, ".debug"))
c906108c 123 {
c5aa993b
JM
124 ei->dboffset = sectp->filepos;
125 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 126 }
c5aa993b 127 else if (STREQ (sectp->name, ".line"))
c906108c 128 {
c5aa993b
JM
129 ei->lnoffset = sectp->filepos;
130 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 131 }
c5aa993b 132 else if (STREQ (sectp->name, ".stab"))
c906108c 133 {
c5aa993b 134 ei->stabsect = sectp;
c906108c 135 }
c5aa993b 136 else if (STREQ (sectp->name, ".stab.index"))
c906108c 137 {
c5aa993b 138 ei->stabindexsect = sectp;
c906108c 139 }
c5aa993b 140 else if (STREQ (sectp->name, ".mdebug"))
c906108c 141 {
c5aa993b 142 ei->mdebugsect = sectp;
c906108c
SS
143 }
144}
145
c5aa993b 146#if 0 /* Currently unused */
c906108c
SS
147
148char *
149elf_interpreter (abfd)
150 bfd *abfd;
151{
152 sec_ptr interp_sec;
153 unsigned size;
154 char *interp = NULL;
155
156 interp_sec = bfd_get_section_by_name (abfd, ".interp");
157 if (interp_sec)
158 {
159 size = bfd_section_size (abfd, interp_sec);
160 interp = alloca (size);
c5aa993b 161 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr) 0,
c906108c
SS
162 size))
163 {
164 interp = savestring (interp, size - 1);
165 }
166 else
167 {
168 interp = NULL;
169 }
170 }
171 return (interp);
172}
173
174#endif
175
176static struct minimal_symbol *
177record_minimal_symbol_and_info (name, address, ms_type, info, bfd_section,
178 objfile)
179 char *name;
180 CORE_ADDR address;
181 enum minimal_symbol_type ms_type;
182 char *info; /* FIXME, is this really char *? */
183 asection *bfd_section;
184 struct objfile *objfile;
185{
186 int section;
187
188 /* Guess the section from the type. This is likely to be wrong in
189 some cases. */
190 switch (ms_type)
191 {
192 case mst_text:
193 case mst_file_text:
9e124216 194 section = bfd_section->index;
c906108c
SS
195#ifdef SMASH_TEXT_ADDRESS
196 SMASH_TEXT_ADDRESS (address);
197#endif
198 break;
199 case mst_data:
200 case mst_file_data:
c906108c
SS
201 case mst_bss:
202 case mst_file_bss:
9e124216 203 section = bfd_section->index;
c906108c
SS
204 break;
205 default:
206 section = -1;
207 break;
208 }
209
210 return prim_record_minimal_symbol_and_info
211 (name, address, ms_type, info, section, bfd_section, objfile);
212}
213
214/*
215
c5aa993b 216 LOCAL FUNCTION
c906108c 217
c5aa993b 218 elf_symtab_read -- read the symbol table of an ELF file
c906108c 219
c5aa993b 220 SYNOPSIS
c906108c 221
d4f3574e 222 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 223
c5aa993b 224 DESCRIPTION
c906108c 225
d4f3574e
SS
226 Given an objfile and a flag that specifies whether or not the objfile
227 is for an executable or not (may be shared library for example), add
228 all the global function and data symbols to the minimal symbol table.
c906108c 229
c5aa993b
JM
230 In stabs-in-ELF, as implemented by Sun, there are some local symbols
231 defined in the ELF symbol table, which can be used to locate
232 the beginnings of sections from each ".o" file that was linked to
233 form the executable objfile. We gather any such info and record it
234 in data structures hung off the objfile's private data.
c906108c 235
c5aa993b 236 */
c906108c
SS
237
238static void
d4f3574e 239elf_symtab_read (objfile, dynamic)
c906108c
SS
240 struct objfile *objfile;
241 int dynamic;
242{
243 long storage_needed;
244 asymbol *sym;
245 asymbol **symbol_table;
246 long number_of_symbols;
247 long i;
248 int index;
249 struct cleanup *back_to;
250 CORE_ADDR symaddr;
d4f3574e 251 CORE_ADDR offset;
c906108c
SS
252 enum minimal_symbol_type ms_type;
253 /* If sectinfo is nonNULL, it contains section info that should end up
254 filed in the objfile. */
255 struct stab_section_info *sectinfo = NULL;
256 /* If filesym is nonzero, it points to a file symbol, but we haven't
257 seen any section info for it yet. */
258 asymbol *filesym = 0;
259#ifdef SOFUN_ADDRESS_MAYBE_MISSING
260 /* Name of filesym, as saved on the symbol_obstack. */
261 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
262#endif
263 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
264 unsigned long size;
d4f3574e 265 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 266
c906108c
SS
267 if (dynamic)
268 {
d4f3574e 269 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
270
271 /* Nothing to be done if there is no dynamic symtab. */
272 if (storage_needed < 0)
273 return;
274 }
275 else
276 {
d4f3574e 277 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 278 if (storage_needed < 0)
d4f3574e 279 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
280 bfd_errmsg (bfd_get_error ()));
281 }
282 if (storage_needed > 0)
283 {
284 symbol_table = (asymbol **) xmalloc (storage_needed);
285 back_to = make_cleanup (free, symbol_table);
286 if (dynamic)
d4f3574e 287 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
288 symbol_table);
289 else
d4f3574e 290 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 291 if (number_of_symbols < 0)
d4f3574e 292 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 293 bfd_errmsg (bfd_get_error ()));
b8d39351 294
c906108c
SS
295 for (i = 0; i < number_of_symbols; i++)
296 {
297 sym = symbol_table[i];
c5aa993b 298 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
299 {
300 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 301 that are null strings (may happen). */
c906108c
SS
302 continue;
303 }
304
b8d39351 305 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 306 if (dynamic
c5aa993b
JM
307 && sym->section == &bfd_und_section
308 && (sym->flags & BSF_FUNCTION))
c906108c
SS
309 {
310 struct minimal_symbol *msym;
311
312 /* Symbol is a reference to a function defined in
c5aa993b
JM
313 a shared library.
314 If its value is non zero then it is usually the address
315 of the corresponding entry in the procedure linkage table,
d4f3574e 316 plus the desired section offset.
c5aa993b
JM
317 If its value is zero then the dynamic linker has to resolve
318 the symbol. We are unable to find any meaningful address
319 for this symbol in the executable file, so we skip it. */
320 symaddr = sym->value;
c906108c
SS
321 if (symaddr == 0)
322 continue;
d4f3574e 323 symaddr += offset;
c906108c 324 msym = record_minimal_symbol_and_info
c5aa993b
JM
325 ((char *) sym->name, symaddr,
326 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
327#ifdef SOFUN_ADDRESS_MAYBE_MISSING
328 if (msym != NULL)
329 msym->filename = filesymname;
330#endif
331 continue;
332 }
333
334 /* If it is a nonstripped executable, do not enter dynamic
335 symbols, as the dynamic symbol table is usually a subset
336 of the main symbol table. */
337 if (dynamic && !stripped)
338 continue;
c5aa993b 339 if (sym->flags & BSF_FILE)
c906108c
SS
340 {
341 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 342 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
343 if (sectinfo != NULL)
344 {
c5aa993b
JM
345 sectinfo->next = dbx->stab_section_info;
346 dbx->stab_section_info = sectinfo;
c906108c
SS
347 sectinfo = NULL;
348 }
349 filesym = sym;
350#ifdef SOFUN_ADDRESS_MAYBE_MISSING
351 filesymname =
c5aa993b 352 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
353 &objfile->symbol_obstack);
354#endif
355 }
c5aa993b 356 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
357 {
358 struct minimal_symbol *msym;
359
360 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
361 symbols in their own section, so all symbols we are
362 interested in will have a section. */
c906108c 363 /* Bfd symbols are section relative. */
c5aa993b 364 symaddr = sym->value + sym->section->vma;
d4f3574e 365 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 366 if (sym->section != &bfd_abs_section)
c906108c 367 {
d4f3574e 368 symaddr += offset;
c906108c
SS
369 }
370 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
371 they are relative to, to intuit text/data. Bfd provides
372 no way of figuring this out for absolute symbols. */
373 if (sym->section == &bfd_abs_section)
c906108c
SS
374 {
375 /* This is a hack to get the minimal symbol type
11cf8741 376 right for Irix 5, which has absolute addresses
c906108c
SS
377 with special section indices for dynamic symbols. */
378 unsigned short shndx =
c5aa993b 379 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
380
381 switch (shndx)
382 {
383 case SHN_MIPS_TEXT:
384 ms_type = mst_text;
385 break;
386 case SHN_MIPS_DATA:
387 ms_type = mst_data;
388 break;
389 case SHN_MIPS_ACOMMON:
390 ms_type = mst_bss;
391 break;
392 default:
393 ms_type = mst_abs;
394 }
395
396 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 397 symbols, relocate all others by section offset. */
c906108c
SS
398 if (ms_type != mst_abs)
399 {
400 if (sym->name[0] == '.')
401 continue;
d4f3574e 402 symaddr += offset;
c906108c
SS
403 }
404 }
c5aa993b 405 else if (sym->section->flags & SEC_CODE)
c906108c 406 {
c5aa993b 407 if (sym->flags & BSF_GLOBAL)
c906108c
SS
408 {
409 ms_type = mst_text;
410 }
411 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 412 || ((sym->flags & BSF_LOCAL)
c906108c
SS
413 && sym->name[0] == '$'
414 && sym->name[1] == 'L'))
415 /* Looks like a compiler-generated label. Skip it.
416 The assembler should be skipping these (to keep
417 executables small), but apparently with gcc on the
418 delta m88k SVR4, it loses. So to have us check too
419 should be harmless (but I encourage people to fix this
420 in the assembler instead of adding checks here). */
421 continue;
422#ifdef HARRIS_TARGET
423 else if (sym->name[0] == '.' && sym->name[1] == '.')
424 {
425 /* Looks like a Harris compiler generated label for the
c5aa993b
JM
426 purpose of marking instructions that are relevant to
427 DWARF dies. The assembler can't get rid of these
428 because they are relocatable addresses that the
429 linker needs to resolve. */
c906108c
SS
430 continue;
431 }
c5aa993b 432#endif
c906108c
SS
433 else
434 {
435 ms_type = mst_file_text;
436 }
437 }
c5aa993b 438 else if (sym->section->flags & SEC_ALLOC)
c906108c 439 {
c5aa993b 440 if (sym->flags & BSF_GLOBAL)
c906108c 441 {
c5aa993b 442 if (sym->section->flags & SEC_LOAD)
c906108c
SS
443 {
444 ms_type = mst_data;
445 }
446 else
447 {
448 ms_type = mst_bss;
449 }
450 }
c5aa993b 451 else if (sym->flags & BSF_LOCAL)
c906108c
SS
452 {
453 /* Named Local variable in a Data section. Check its
c5aa993b
JM
454 name for stabs-in-elf. The STREQ macro checks the
455 first character inline, so we only actually do a
456 strcmp function call on names that start with 'B'
457 or 'D' */
c906108c 458 index = SECT_OFF_MAX;
c5aa993b 459 if (STREQ ("Bbss.bss", sym->name))
c906108c 460 {
b8fbeb18 461 index = SECT_OFF_BSS (objfile);
c906108c 462 }
c5aa993b 463 else if (STREQ ("Ddata.data", sym->name))
c906108c 464 {
b8fbeb18 465 index = SECT_OFF_DATA (objfile);
c906108c 466 }
c5aa993b 467 else if (STREQ ("Drodata.rodata", sym->name))
c906108c 468 {
b8fbeb18 469 index = SECT_OFF_RODATA (objfile);
c906108c
SS
470 }
471 if (index != SECT_OFF_MAX)
472 {
473 /* Found a special local symbol. Allocate a
474 sectinfo, if needed, and fill it in. */
475 if (sectinfo == NULL)
476 {
477 sectinfo = (struct stab_section_info *)
c5aa993b 478 xmmalloc (objfile->md, sizeof (*sectinfo));
c906108c
SS
479 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
480 if (filesym == NULL)
481 {
482 complain (&section_info_complaint,
c5aa993b 483 sym->name);
c906108c
SS
484 }
485 else
486 {
c5aa993b
JM
487 sectinfo->filename =
488 (char *) filesym->name;
c906108c
SS
489 }
490 }
c5aa993b 491 if (sectinfo->sections[index] != 0)
c906108c
SS
492 {
493 complain (&section_info_dup_complaint,
c5aa993b 494 sectinfo->filename);
c906108c
SS
495 }
496 /* Bfd symbols are section relative. */
c5aa993b 497 symaddr = sym->value + sym->section->vma;
d4f3574e 498 /* Relocate non-absolute symbols by the section offset. */
c5aa993b 499 if (sym->section != &bfd_abs_section)
c906108c 500 {
d4f3574e 501 symaddr += offset;
c906108c 502 }
c5aa993b 503 sectinfo->sections[index] = symaddr;
c906108c
SS
504 /* The special local symbols don't go in the
505 minimal symbol table, so ignore this one. */
506 continue;
507 }
508 /* Not a special stabs-in-elf symbol, do regular
c5aa993b
JM
509 symbol processing. */
510 if (sym->section->flags & SEC_LOAD)
c906108c
SS
511 {
512 ms_type = mst_file_data;
513 }
514 else
515 {
516 ms_type = mst_file_bss;
517 }
518 }
519 else
520 {
521 ms_type = mst_unknown;
522 }
523 }
524 else
525 {
526 /* FIXME: Solaris2 shared libraries include lots of
527 odd "absolute" and "undefined" symbols, that play
528 hob with actions like finding what function the PC
529 is in. Ignore them if they aren't text, data, or bss. */
530 /* ms_type = mst_unknown; */
c5aa993b 531 continue; /* Skip this symbol. */
c906108c
SS
532 }
533 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 534 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 535 msym = record_minimal_symbol_and_info
c5aa993b
JM
536 ((char *) sym->name, symaddr,
537 ms_type, (PTR) size, sym->section, objfile);
c906108c
SS
538#ifdef SOFUN_ADDRESS_MAYBE_MISSING
539 if (msym != NULL)
540 msym->filename = filesymname;
541#endif
542#ifdef ELF_MAKE_MSYMBOL_SPECIAL
c5aa993b 543 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
544#endif
545 }
546 }
547 do_cleanups (back_to);
548 }
549}
550
551/* Scan and build partial symbols for a symbol file.
552 We have been initialized by a call to elf_symfile_init, which
553 currently does nothing.
554
555 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
556 in each section. We simplify it down to a single offset for all
557 symbols. FIXME.
558
559 MAINLINE is true if we are reading the main symbol
560 table (as opposed to a shared lib or dynamically loaded file).
561
562 This function only does the minimum work necessary for letting the
563 user "name" things symbolically; it does not read the entire symtab.
564 Instead, it reads the external and static symbols and puts them in partial
565 symbol tables. When more extensive information is requested of a
566 file, the corresponding partial symbol table is mutated into a full
567 fledged symbol table by going back and reading the symbols
568 for real.
569
570 We look for sections with specific names, to tell us what debug
571 format to look for: FIXME!!!
572
573 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
574 elfstab_build_psymtabs() handles STABS symbols;
575 mdebug_build_psymtabs() handles ECOFF debugging information.
576
577 Note that ELF files have a "minimal" symbol table, which looks a lot
578 like a COFF symbol table, but has only the minimal information necessary
579 for linking. We process this also, and use the information to
580 build gdb's minimal symbol table. This gives us some minimal debugging
581 capability even for files compiled without -g. */
582
583static void
96baa820 584elf_symfile_read (objfile, mainline)
c906108c 585 struct objfile *objfile;
c906108c
SS
586 int mainline;
587{
588 bfd *abfd = objfile->obfd;
589 struct elfinfo ei;
590 struct cleanup *back_to;
591 CORE_ADDR offset;
592
593 init_minimal_symbol_collection ();
56e290f4 594 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
595
596 memset ((char *) &ei, 0, sizeof (ei));
597
598 /* Allocate struct to keep track of the symfile */
599 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 600 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c
SS
601 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
602 make_cleanup (free_elfinfo, (PTR) objfile);
603
604 /* Process the normal ELF symbol table first. This may write some
605 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
606 which can later be used by elfstab_offset_sections. */
607
d4f3574e 608 elf_symtab_read (objfile, 0);
c906108c
SS
609
610 /* Add the dynamic symbols. */
611
d4f3574e 612 elf_symtab_read (objfile, 1);
c906108c
SS
613
614 /* Now process debugging information, which is contained in
615 special ELF sections. */
616
617 /* If we are reinitializing, or if we have never loaded syms yet,
618 set table to empty. MAINLINE is cleared so that *_read_psymtab
619 functions do not all also re-initialize the psymbol table. */
620 if (mainline)
621 {
622 init_psymbol_list (objfile, 0);
623 mainline = 0;
624 }
625
626 /* We first have to find them... */
c5aa993b 627 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) & ei);
c906108c
SS
628
629 /* ELF debugging information is inserted into the psymtab in the
630 order of least informative first - most informative last. Since
631 the psymtab table is searched `most recent insertion first' this
632 increases the probability that more detailed debug information
633 for a section is found.
634
635 For instance, an object file might contain both .mdebug (XCOFF)
636 and .debug_info (DWARF2) sections then .mdebug is inserted first
637 (searched last) and DWARF2 is inserted last (searched first). If
638 we don't do this then the XCOFF info is found first - for code in
639 an included file XCOFF info is useless. */
640
641 if (ei.mdebugsect)
642 {
643 const struct ecoff_debug_swap *swap;
644
645 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 646 information. */
c906108c
SS
647 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
648 if (swap)
d4f3574e 649 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
650 }
651 if (ei.stabsect)
652 {
653 asection *str_sect;
654
655 /* Stab sections have an associated string table that looks like
c5aa993b 656 a separate section. */
c906108c
SS
657 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
658
659 /* FIXME should probably warn about a stab section without a stabstr. */
660 if (str_sect)
661 elfstab_build_psymtabs (objfile,
c906108c
SS
662 mainline,
663 ei.stabsect->filepos,
664 bfd_section_size (abfd, ei.stabsect),
665 str_sect->filepos,
666 bfd_section_size (abfd, str_sect));
667 }
668 if (dwarf2_has_info (abfd))
669 {
670 /* DWARF 2 sections */
d4f3574e 671 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
672 }
673 else if (ei.dboffset && ei.lnoffset)
674 {
675 /* DWARF sections */
676 dwarf_build_psymtabs (objfile,
d4f3574e 677 mainline,
c906108c
SS
678 ei.dboffset, ei.dbsize,
679 ei.lnoffset, ei.lnsize);
680 }
681
682 /* Install any minimal symbols that have been collected as the current
683 minimal symbols for this objfile. */
684
685 install_minimal_symbols (objfile);
686
687 do_cleanups (back_to);
688}
689
690/* This cleans up the objfile's sym_stab_info pointer, and the chain of
691 stab_section_info's, that might be dangling from it. */
692
693static void
694free_elfinfo (objp)
695 PTR objp;
696{
c5aa993b 697 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
698 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
699 struct stab_section_info *ssi, *nssi;
700
701 ssi = dbxinfo->stab_section_info;
702 while (ssi)
703 {
704 nssi = ssi->next;
705 mfree (objfile->md, ssi);
706 ssi = nssi;
707 }
708
709 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
710}
711
712
713/* Initialize anything that needs initializing when a completely new symbol
714 file is specified (not just adding some symbols from another file, e.g. a
715 shared library).
716
717 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
718
719static void
720elf_new_init (ignore)
721 struct objfile *ignore;
722{
723 stabsread_new_init ();
724 buildsym_new_init ();
725}
726
727/* Perform any local cleanups required when we are done with a particular
728 objfile. I.E, we are in the process of discarding all symbol information
729 for an objfile, freeing up all memory held for it, and unlinking the
730 objfile struct from the global list of known objfiles. */
731
732static void
733elf_symfile_finish (objfile)
734 struct objfile *objfile;
735{
c5aa993b 736 if (objfile->sym_stab_info != NULL)
c906108c 737 {
c5aa993b 738 mfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
739 }
740}
741
742/* ELF specific initialization routine for reading symbols.
743
744 It is passed a pointer to a struct sym_fns which contains, among other
745 things, the BFD for the file whose symbols are being read, and a slot for
746 a pointer to "private data" which we can fill with goodies.
747
748 For now at least, we have nothing in particular to do, so this function is
749 just a stub. */
750
751static void
752elf_symfile_init (objfile)
753 struct objfile *objfile;
754{
755 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
756 find this causes a significant slowdown in gdb then we could
757 set it in the debug symbol readers only when necessary. */
758 objfile->flags |= OBJF_REORDERED;
759}
760
761/* When handling an ELF file that contains Sun STABS debug info,
762 some of the debug info is relative to the particular chunk of the
763 section that was generated in its individual .o file. E.g.
764 offsets to static variables are relative to the start of the data
765 segment *for that module before linking*. This information is
766 painfully squirreled away in the ELF symbol table as local symbols
767 with wierd names. Go get 'em when needed. */
768
769void
770elfstab_offset_sections (objfile, pst)
771 struct objfile *objfile;
772 struct partial_symtab *pst;
773{
774 char *filename = pst->filename;
775 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
776 struct stab_section_info *maybe = dbx->stab_section_info;
777 struct stab_section_info *questionable = 0;
778 int i;
779 char *p;
780
781 /* The ELF symbol info doesn't include path names, so strip the path
782 (if any) from the psymtab filename. */
783 while (0 != (p = strchr (filename, '/')))
c5aa993b 784 filename = p + 1;
c906108c
SS
785
786 /* FIXME: This linear search could speed up significantly
787 if it was chained in the right order to match how we search it,
788 and if we unchained when we found a match. */
789 for (; maybe; maybe = maybe->next)
790 {
791 if (filename[0] == maybe->filename[0]
792 && STREQ (filename, maybe->filename))
793 {
794 /* We found a match. But there might be several source files
795 (from different directories) with the same name. */
796 if (0 == maybe->found)
797 break;
c5aa993b 798 questionable = maybe; /* Might use it later. */
c906108c
SS
799 }
800 }
801
802 if (maybe == 0 && questionable != 0)
803 {
804 complain (&stab_info_questionable_complaint, filename);
805 maybe = questionable;
806 }
807
808 if (maybe)
809 {
810 /* Found it! Allocate a new psymtab struct, and fill it in. */
811 maybe->found++;
812 pst->section_offsets = (struct section_offsets *)
96baa820 813 obstack_alloc (&objfile->psymbol_obstack, SIZEOF_SECTION_OFFSETS);
c906108c
SS
814 for (i = 0; i < SECT_OFF_MAX; i++)
815 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
816 return;
817 }
818
819 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 820 if (dbx->stab_section_info) /* If there *is* any info, */
c906108c
SS
821 complain (&stab_info_mismatch_complaint, filename);
822}
823\f
824/* Register that we are able to handle ELF object file formats. */
825
826static struct sym_fns elf_sym_fns =
827{
828 bfd_target_elf_flavour,
c5aa993b
JM
829 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
830 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
831 elf_symfile_read, /* sym_read: read a symbol file into symtab */
832 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 833 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 834 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
835};
836
837void
838_initialize_elfread ()
839{
840 add_symtab_fns (&elf_sym_fns);
841}
This page took 0.164176 seconds and 4 git commands to generate.