Commit | Line | Data |
---|---|---|
c906108c | 1 | /* Read ELF (Executable and Linking Format) object files for GDB. |
1bac305b AC |
2 | |
3 | Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, | |
4 | 2000, 2001, 2002, 2003 Free Software Foundation, Inc. | |
5 | ||
c906108c SS |
6 | Written by Fred Fish at Cygnus Support. |
7 | ||
c5aa993b | 8 | This file is part of GDB. |
c906108c | 9 | |
c5aa993b JM |
10 | This program is free software; you can redistribute it and/or modify |
11 | it under the terms of the GNU General Public License as published by | |
12 | the Free Software Foundation; either version 2 of the License, or | |
13 | (at your option) any later version. | |
c906108c | 14 | |
c5aa993b JM |
15 | This program is distributed in the hope that it will be useful, |
16 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | GNU General Public License for more details. | |
c906108c | 19 | |
c5aa993b JM |
20 | You should have received a copy of the GNU General Public License |
21 | along with this program; if not, write to the Free Software | |
22 | Foundation, Inc., 59 Temple Place - Suite 330, | |
23 | Boston, MA 02111-1307, USA. */ | |
c906108c SS |
24 | |
25 | #include "defs.h" | |
26 | #include "bfd.h" | |
27 | #include "gdb_string.h" | |
28 | #include "elf-bfd.h" | |
29 | #include "elf/mips.h" | |
30 | #include "symtab.h" | |
31 | #include "symfile.h" | |
32 | #include "objfiles.h" | |
33 | #include "buildsym.h" | |
34 | #include "stabsread.h" | |
35 | #include "gdb-stabs.h" | |
36 | #include "complaints.h" | |
37 | #include "demangle.h" | |
38 | ||
a14ed312 | 39 | extern void _initialize_elfread (void); |
392a587b | 40 | |
c906108c | 41 | /* The struct elfinfo is available only during ELF symbol table and |
6426a772 | 42 | psymtab reading. It is destroyed at the completion of psymtab-reading. |
c906108c SS |
43 | It's local to elf_symfile_read. */ |
44 | ||
c5aa993b JM |
45 | struct elfinfo |
46 | { | |
47 | file_ptr dboffset; /* Offset to dwarf debug section */ | |
48 | unsigned int dbsize; /* Size of dwarf debug section */ | |
49 | file_ptr lnoffset; /* Offset to dwarf line number section */ | |
50 | unsigned int lnsize; /* Size of dwarf line number section */ | |
51 | asection *stabsect; /* Section pointer for .stab section */ | |
52 | asection *stabindexsect; /* Section pointer for .stab.index section */ | |
53 | asection *mdebugsect; /* Section pointer for .mdebug section */ | |
54 | }; | |
c906108c | 55 | |
12b9c64f | 56 | static void free_elfinfo (void *); |
c906108c SS |
57 | |
58 | /* We are called once per section from elf_symfile_read. We | |
59 | need to examine each section we are passed, check to see | |
60 | if it is something we are interested in processing, and | |
61 | if so, stash away some access information for the section. | |
62 | ||
63 | For now we recognize the dwarf debug information sections and | |
64 | line number sections from matching their section names. The | |
65 | ELF definition is no real help here since it has no direct | |
66 | knowledge of DWARF (by design, so any debugging format can be | |
67 | used). | |
68 | ||
69 | We also recognize the ".stab" sections used by the Sun compilers | |
70 | released with Solaris 2. | |
71 | ||
72 | FIXME: The section names should not be hardwired strings (what | |
73 | should they be? I don't think most object file formats have enough | |
74 | section flags to specify what kind of debug section it is | |
75 | -kingdon). */ | |
76 | ||
77 | static void | |
12b9c64f | 78 | elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip) |
c906108c | 79 | { |
52f0bd74 | 80 | struct elfinfo *ei; |
c906108c SS |
81 | |
82 | ei = (struct elfinfo *) eip; | |
c5aa993b | 83 | if (STREQ (sectp->name, ".debug")) |
c906108c | 84 | { |
c5aa993b JM |
85 | ei->dboffset = sectp->filepos; |
86 | ei->dbsize = bfd_get_section_size_before_reloc (sectp); | |
c906108c | 87 | } |
c5aa993b | 88 | else if (STREQ (sectp->name, ".line")) |
c906108c | 89 | { |
c5aa993b JM |
90 | ei->lnoffset = sectp->filepos; |
91 | ei->lnsize = bfd_get_section_size_before_reloc (sectp); | |
c906108c | 92 | } |
c5aa993b | 93 | else if (STREQ (sectp->name, ".stab")) |
c906108c | 94 | { |
c5aa993b | 95 | ei->stabsect = sectp; |
c906108c | 96 | } |
c5aa993b | 97 | else if (STREQ (sectp->name, ".stab.index")) |
c906108c | 98 | { |
c5aa993b | 99 | ei->stabindexsect = sectp; |
c906108c | 100 | } |
c5aa993b | 101 | else if (STREQ (sectp->name, ".mdebug")) |
c906108c | 102 | { |
c5aa993b | 103 | ei->mdebugsect = sectp; |
c906108c SS |
104 | } |
105 | } | |
106 | ||
c906108c | 107 | static struct minimal_symbol * |
fba45db2 KB |
108 | record_minimal_symbol_and_info (char *name, CORE_ADDR address, |
109 | enum minimal_symbol_type ms_type, char *info, /* FIXME, is this really char *? */ | |
110 | asection *bfd_section, struct objfile *objfile) | |
c906108c | 111 | { |
bbeae047 | 112 | if (ms_type == mst_text || ms_type == mst_file_text) |
181c1381 | 113 | address = SMASH_TEXT_ADDRESS (address); |
c906108c SS |
114 | |
115 | return prim_record_minimal_symbol_and_info | |
bbeae047 | 116 | (name, address, ms_type, info, bfd_section->index, bfd_section, objfile); |
c906108c SS |
117 | } |
118 | ||
119 | /* | |
120 | ||
c5aa993b | 121 | LOCAL FUNCTION |
c906108c | 122 | |
c5aa993b | 123 | elf_symtab_read -- read the symbol table of an ELF file |
c906108c | 124 | |
c5aa993b | 125 | SYNOPSIS |
c906108c | 126 | |
d4f3574e | 127 | void elf_symtab_read (struct objfile *objfile, int dynamic) |
c906108c | 128 | |
c5aa993b | 129 | DESCRIPTION |
c906108c | 130 | |
d4f3574e SS |
131 | Given an objfile and a flag that specifies whether or not the objfile |
132 | is for an executable or not (may be shared library for example), add | |
133 | all the global function and data symbols to the minimal symbol table. | |
c906108c | 134 | |
c5aa993b JM |
135 | In stabs-in-ELF, as implemented by Sun, there are some local symbols |
136 | defined in the ELF symbol table, which can be used to locate | |
137 | the beginnings of sections from each ".o" file that was linked to | |
138 | form the executable objfile. We gather any such info and record it | |
139 | in data structures hung off the objfile's private data. | |
c906108c | 140 | |
c5aa993b | 141 | */ |
c906108c SS |
142 | |
143 | static void | |
fba45db2 | 144 | elf_symtab_read (struct objfile *objfile, int dynamic) |
c906108c SS |
145 | { |
146 | long storage_needed; | |
147 | asymbol *sym; | |
148 | asymbol **symbol_table; | |
149 | long number_of_symbols; | |
150 | long i; | |
c906108c SS |
151 | struct cleanup *back_to; |
152 | CORE_ADDR symaddr; | |
d4f3574e | 153 | CORE_ADDR offset; |
c906108c SS |
154 | enum minimal_symbol_type ms_type; |
155 | /* If sectinfo is nonNULL, it contains section info that should end up | |
156 | filed in the objfile. */ | |
157 | struct stab_section_info *sectinfo = NULL; | |
158 | /* If filesym is nonzero, it points to a file symbol, but we haven't | |
159 | seen any section info for it yet. */ | |
160 | asymbol *filesym = 0; | |
161 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
162 | /* Name of filesym, as saved on the symbol_obstack. */ | |
163 | char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack); | |
164 | #endif | |
165 | struct dbx_symfile_info *dbx = objfile->sym_stab_info; | |
166 | unsigned long size; | |
d4f3574e | 167 | int stripped = (bfd_get_symcount (objfile->obfd) == 0); |
c5aa993b | 168 | |
c906108c SS |
169 | if (dynamic) |
170 | { | |
d4f3574e | 171 | storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd); |
c906108c SS |
172 | |
173 | /* Nothing to be done if there is no dynamic symtab. */ | |
174 | if (storage_needed < 0) | |
175 | return; | |
176 | } | |
177 | else | |
178 | { | |
d4f3574e | 179 | storage_needed = bfd_get_symtab_upper_bound (objfile->obfd); |
c906108c | 180 | if (storage_needed < 0) |
d4f3574e | 181 | error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd), |
c906108c SS |
182 | bfd_errmsg (bfd_get_error ())); |
183 | } | |
184 | if (storage_needed > 0) | |
185 | { | |
186 | symbol_table = (asymbol **) xmalloc (storage_needed); | |
b8c9b27d | 187 | back_to = make_cleanup (xfree, symbol_table); |
c906108c | 188 | if (dynamic) |
d4f3574e | 189 | number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd, |
c906108c SS |
190 | symbol_table); |
191 | else | |
d4f3574e | 192 | number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table); |
c906108c | 193 | if (number_of_symbols < 0) |
d4f3574e | 194 | error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd), |
c906108c | 195 | bfd_errmsg (bfd_get_error ())); |
b8d39351 | 196 | |
c906108c SS |
197 | for (i = 0; i < number_of_symbols; i++) |
198 | { | |
199 | sym = symbol_table[i]; | |
c5aa993b | 200 | if (sym->name == NULL || *sym->name == '\0') |
c906108c SS |
201 | { |
202 | /* Skip names that don't exist (shouldn't happen), or names | |
c5aa993b | 203 | that are null strings (may happen). */ |
c906108c SS |
204 | continue; |
205 | } | |
206 | ||
b8d39351 | 207 | offset = ANOFFSET (objfile->section_offsets, sym->section->index); |
c906108c | 208 | if (dynamic |
c5aa993b JM |
209 | && sym->section == &bfd_und_section |
210 | && (sym->flags & BSF_FUNCTION)) | |
c906108c SS |
211 | { |
212 | struct minimal_symbol *msym; | |
213 | ||
214 | /* Symbol is a reference to a function defined in | |
c5aa993b JM |
215 | a shared library. |
216 | If its value is non zero then it is usually the address | |
217 | of the corresponding entry in the procedure linkage table, | |
d4f3574e | 218 | plus the desired section offset. |
c5aa993b JM |
219 | If its value is zero then the dynamic linker has to resolve |
220 | the symbol. We are unable to find any meaningful address | |
221 | for this symbol in the executable file, so we skip it. */ | |
222 | symaddr = sym->value; | |
c906108c SS |
223 | if (symaddr == 0) |
224 | continue; | |
d4f3574e | 225 | symaddr += offset; |
c906108c | 226 | msym = record_minimal_symbol_and_info |
c5aa993b JM |
227 | ((char *) sym->name, symaddr, |
228 | mst_solib_trampoline, NULL, sym->section, objfile); | |
c906108c SS |
229 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
230 | if (msym != NULL) | |
231 | msym->filename = filesymname; | |
232 | #endif | |
233 | continue; | |
234 | } | |
235 | ||
236 | /* If it is a nonstripped executable, do not enter dynamic | |
237 | symbols, as the dynamic symbol table is usually a subset | |
238 | of the main symbol table. */ | |
239 | if (dynamic && !stripped) | |
240 | continue; | |
c5aa993b | 241 | if (sym->flags & BSF_FILE) |
c906108c SS |
242 | { |
243 | /* STT_FILE debugging symbol that helps stabs-in-elf debugging. | |
c5aa993b | 244 | Chain any old one onto the objfile; remember new sym. */ |
c906108c SS |
245 | if (sectinfo != NULL) |
246 | { | |
c5aa993b JM |
247 | sectinfo->next = dbx->stab_section_info; |
248 | dbx->stab_section_info = sectinfo; | |
c906108c SS |
249 | sectinfo = NULL; |
250 | } | |
251 | filesym = sym; | |
252 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
253 | filesymname = | |
c5aa993b | 254 | obsavestring ((char *) filesym->name, strlen (filesym->name), |
c906108c SS |
255 | &objfile->symbol_obstack); |
256 | #endif | |
257 | } | |
c5aa993b | 258 | else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK)) |
c906108c SS |
259 | { |
260 | struct minimal_symbol *msym; | |
261 | ||
262 | /* Select global/local/weak symbols. Note that bfd puts abs | |
c5aa993b JM |
263 | symbols in their own section, so all symbols we are |
264 | interested in will have a section. */ | |
c906108c | 265 | /* Bfd symbols are section relative. */ |
c5aa993b | 266 | symaddr = sym->value + sym->section->vma; |
d4f3574e | 267 | /* Relocate all non-absolute symbols by the section offset. */ |
c5aa993b | 268 | if (sym->section != &bfd_abs_section) |
c906108c | 269 | { |
d4f3574e | 270 | symaddr += offset; |
c906108c SS |
271 | } |
272 | /* For non-absolute symbols, use the type of the section | |
c5aa993b JM |
273 | they are relative to, to intuit text/data. Bfd provides |
274 | no way of figuring this out for absolute symbols. */ | |
275 | if (sym->section == &bfd_abs_section) | |
c906108c SS |
276 | { |
277 | /* This is a hack to get the minimal symbol type | |
11cf8741 | 278 | right for Irix 5, which has absolute addresses |
c906108c SS |
279 | with special section indices for dynamic symbols. */ |
280 | unsigned short shndx = | |
c5aa993b | 281 | ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx; |
c906108c SS |
282 | |
283 | switch (shndx) | |
284 | { | |
285 | case SHN_MIPS_TEXT: | |
286 | ms_type = mst_text; | |
287 | break; | |
288 | case SHN_MIPS_DATA: | |
289 | ms_type = mst_data; | |
290 | break; | |
291 | case SHN_MIPS_ACOMMON: | |
292 | ms_type = mst_bss; | |
293 | break; | |
294 | default: | |
295 | ms_type = mst_abs; | |
296 | } | |
297 | ||
298 | /* If it is an Irix dynamic symbol, skip section name | |
d4f3574e | 299 | symbols, relocate all others by section offset. */ |
c906108c SS |
300 | if (ms_type != mst_abs) |
301 | { | |
302 | if (sym->name[0] == '.') | |
303 | continue; | |
d4f3574e | 304 | symaddr += offset; |
c906108c SS |
305 | } |
306 | } | |
c5aa993b | 307 | else if (sym->section->flags & SEC_CODE) |
c906108c | 308 | { |
389e51db | 309 | if (sym->flags & BSF_GLOBAL) |
c906108c SS |
310 | { |
311 | ms_type = mst_text; | |
312 | } | |
313 | else if ((sym->name[0] == '.' && sym->name[1] == 'L') | |
c5aa993b | 314 | || ((sym->flags & BSF_LOCAL) |
c906108c SS |
315 | && sym->name[0] == '$' |
316 | && sym->name[1] == 'L')) | |
7fb623f7 AC |
317 | /* Looks like a compiler-generated label. Skip |
318 | it. The assembler should be skipping these (to | |
319 | keep executables small), but apparently with | |
1b831c93 AC |
320 | gcc on the (deleted) delta m88k SVR4, it loses. |
321 | So to have us check too should be harmless (but | |
322 | I encourage people to fix this in the assembler | |
323 | instead of adding checks here). */ | |
c906108c | 324 | continue; |
c906108c SS |
325 | else |
326 | { | |
327 | ms_type = mst_file_text; | |
328 | } | |
329 | } | |
c5aa993b | 330 | else if (sym->section->flags & SEC_ALLOC) |
c906108c | 331 | { |
bbeae047 | 332 | if (sym->flags & (BSF_GLOBAL | BSF_WEAK)) |
c906108c | 333 | { |
c5aa993b | 334 | if (sym->section->flags & SEC_LOAD) |
c906108c SS |
335 | { |
336 | ms_type = mst_data; | |
337 | } | |
338 | else | |
339 | { | |
340 | ms_type = mst_bss; | |
341 | } | |
342 | } | |
c5aa993b | 343 | else if (sym->flags & BSF_LOCAL) |
c906108c | 344 | { |
9a90a780 AC |
345 | /* Named Local variable in a Data section. |
346 | Check its name for stabs-in-elf. The STREQ | |
347 | macro checks the first character inline, so | |
348 | we only actually do a strcmp function call on | |
349 | names that start with 'B' or 'D'. */ | |
350 | int special_local_sect; | |
351 | if (strcmp ("Bbss.bss", sym->name) == 0) | |
352 | special_local_sect = SECT_OFF_BSS (objfile); | |
353 | else if (strcmp ("Ddata.data", sym->name) == 0) | |
354 | special_local_sect = SECT_OFF_DATA (objfile); | |
355 | else if (strcmp ("Drodata.rodata", sym->name) == 0) | |
356 | special_local_sect = SECT_OFF_RODATA (objfile); | |
357 | else | |
358 | special_local_sect = -1; | |
359 | if (special_local_sect >= 0) | |
c906108c SS |
360 | { |
361 | /* Found a special local symbol. Allocate a | |
362 | sectinfo, if needed, and fill it in. */ | |
363 | if (sectinfo == NULL) | |
364 | { | |
a39a16c4 MM |
365 | int max_index; |
366 | size_t size; | |
367 | ||
368 | max_index | |
369 | = max (SECT_OFF_BSS (objfile), | |
370 | max (SECT_OFF_DATA (objfile), | |
371 | SECT_OFF_RODATA (objfile))); | |
e372db49 JB |
372 | |
373 | /* max_index is the largest index we'll | |
374 | use into this array, so we must | |
375 | allocate max_index+1 elements for it. | |
376 | However, 'struct stab_section_info' | |
377 | already includes one element, so we | |
378 | need to allocate max_index aadditional | |
379 | elements. */ | |
a39a16c4 MM |
380 | size = (sizeof (struct stab_section_info) |
381 | + (sizeof (CORE_ADDR) | |
e372db49 | 382 | * max_index)); |
c906108c | 383 | sectinfo = (struct stab_section_info *) |
a39a16c4 MM |
384 | xmmalloc (objfile->md, size); |
385 | memset (sectinfo, 0, size); | |
386 | sectinfo->num_sections = max_index; | |
c906108c SS |
387 | if (filesym == NULL) |
388 | { | |
23136709 KB |
389 | complaint (&symfile_complaints, |
390 | "elf/stab section information %s without a preceding file symbol", | |
391 | sym->name); | |
c906108c SS |
392 | } |
393 | else | |
394 | { | |
c5aa993b JM |
395 | sectinfo->filename = |
396 | (char *) filesym->name; | |
c906108c SS |
397 | } |
398 | } | |
9a90a780 AC |
399 | if (sectinfo->sections[special_local_sect] != 0) |
400 | complaint (&symfile_complaints, | |
401 | "duplicated elf/stab section information for %s", | |
402 | sectinfo->filename); | |
403 | /* BFD symbols are section relative. */ | |
c5aa993b | 404 | symaddr = sym->value + sym->section->vma; |
9a90a780 AC |
405 | /* Relocate non-absolute symbols by the |
406 | section offset. */ | |
c5aa993b | 407 | if (sym->section != &bfd_abs_section) |
9a90a780 AC |
408 | symaddr += offset; |
409 | sectinfo->sections[special_local_sect] = symaddr; | |
c906108c | 410 | /* The special local symbols don't go in the |
9a90a780 | 411 | minimal symbol table, so ignore this one. */ |
c906108c SS |
412 | continue; |
413 | } | |
414 | /* Not a special stabs-in-elf symbol, do regular | |
9a90a780 | 415 | symbol processing. */ |
c5aa993b | 416 | if (sym->section->flags & SEC_LOAD) |
c906108c SS |
417 | { |
418 | ms_type = mst_file_data; | |
419 | } | |
420 | else | |
421 | { | |
422 | ms_type = mst_file_bss; | |
423 | } | |
424 | } | |
425 | else | |
426 | { | |
427 | ms_type = mst_unknown; | |
428 | } | |
429 | } | |
430 | else | |
431 | { | |
432 | /* FIXME: Solaris2 shared libraries include lots of | |
433 | odd "absolute" and "undefined" symbols, that play | |
434 | hob with actions like finding what function the PC | |
435 | is in. Ignore them if they aren't text, data, or bss. */ | |
436 | /* ms_type = mst_unknown; */ | |
c5aa993b | 437 | continue; /* Skip this symbol. */ |
c906108c SS |
438 | } |
439 | /* Pass symbol size field in via BFD. FIXME!!! */ | |
c5aa993b | 440 | size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size; |
c906108c | 441 | msym = record_minimal_symbol_and_info |
c5aa993b | 442 | ((char *) sym->name, symaddr, |
12b9c64f | 443 | ms_type, (void *) size, sym->section, objfile); |
c906108c SS |
444 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
445 | if (msym != NULL) | |
446 | msym->filename = filesymname; | |
447 | #endif | |
c5aa993b | 448 | ELF_MAKE_MSYMBOL_SPECIAL (sym, msym); |
c906108c SS |
449 | } |
450 | } | |
451 | do_cleanups (back_to); | |
452 | } | |
453 | } | |
454 | ||
455 | /* Scan and build partial symbols for a symbol file. | |
456 | We have been initialized by a call to elf_symfile_init, which | |
457 | currently does nothing. | |
458 | ||
459 | SECTION_OFFSETS is a set of offsets to apply to relocate the symbols | |
460 | in each section. We simplify it down to a single offset for all | |
461 | symbols. FIXME. | |
462 | ||
463 | MAINLINE is true if we are reading the main symbol | |
464 | table (as opposed to a shared lib or dynamically loaded file). | |
465 | ||
466 | This function only does the minimum work necessary for letting the | |
467 | user "name" things symbolically; it does not read the entire symtab. | |
468 | Instead, it reads the external and static symbols and puts them in partial | |
469 | symbol tables. When more extensive information is requested of a | |
470 | file, the corresponding partial symbol table is mutated into a full | |
471 | fledged symbol table by going back and reading the symbols | |
472 | for real. | |
473 | ||
474 | We look for sections with specific names, to tell us what debug | |
475 | format to look for: FIXME!!! | |
476 | ||
477 | dwarf_build_psymtabs() builds psymtabs for DWARF symbols; | |
478 | elfstab_build_psymtabs() handles STABS symbols; | |
479 | mdebug_build_psymtabs() handles ECOFF debugging information. | |
480 | ||
481 | Note that ELF files have a "minimal" symbol table, which looks a lot | |
482 | like a COFF symbol table, but has only the minimal information necessary | |
483 | for linking. We process this also, and use the information to | |
484 | build gdb's minimal symbol table. This gives us some minimal debugging | |
485 | capability even for files compiled without -g. */ | |
486 | ||
487 | static void | |
fba45db2 | 488 | elf_symfile_read (struct objfile *objfile, int mainline) |
c906108c SS |
489 | { |
490 | bfd *abfd = objfile->obfd; | |
491 | struct elfinfo ei; | |
492 | struct cleanup *back_to; | |
493 | CORE_ADDR offset; | |
494 | ||
495 | init_minimal_symbol_collection (); | |
56e290f4 | 496 | back_to = make_cleanup_discard_minimal_symbols (); |
c906108c SS |
497 | |
498 | memset ((char *) &ei, 0, sizeof (ei)); | |
499 | ||
500 | /* Allocate struct to keep track of the symfile */ | |
501 | objfile->sym_stab_info = (struct dbx_symfile_info *) | |
c5aa993b | 502 | xmmalloc (objfile->md, sizeof (struct dbx_symfile_info)); |
c906108c | 503 | memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info)); |
12b9c64f | 504 | make_cleanup (free_elfinfo, (void *) objfile); |
c906108c SS |
505 | |
506 | /* Process the normal ELF symbol table first. This may write some | |
507 | chain of info into the dbx_symfile_info in objfile->sym_stab_info, | |
508 | which can later be used by elfstab_offset_sections. */ | |
509 | ||
d4f3574e | 510 | elf_symtab_read (objfile, 0); |
c906108c SS |
511 | |
512 | /* Add the dynamic symbols. */ | |
513 | ||
d4f3574e | 514 | elf_symtab_read (objfile, 1); |
c906108c | 515 | |
7134143f DJ |
516 | /* Install any minimal symbols that have been collected as the current |
517 | minimal symbols for this objfile. The debug readers below this point | |
518 | should not generate new minimal symbols; if they do it's their | |
519 | responsibility to install them. "mdebug" appears to be the only one | |
520 | which will do this. */ | |
521 | ||
522 | install_minimal_symbols (objfile); | |
523 | do_cleanups (back_to); | |
524 | ||
c906108c SS |
525 | /* Now process debugging information, which is contained in |
526 | special ELF sections. */ | |
527 | ||
528 | /* If we are reinitializing, or if we have never loaded syms yet, | |
529 | set table to empty. MAINLINE is cleared so that *_read_psymtab | |
530 | functions do not all also re-initialize the psymbol table. */ | |
531 | if (mainline) | |
532 | { | |
533 | init_psymbol_list (objfile, 0); | |
534 | mainline = 0; | |
535 | } | |
536 | ||
537 | /* We first have to find them... */ | |
12b9c64f | 538 | bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei); |
c906108c SS |
539 | |
540 | /* ELF debugging information is inserted into the psymtab in the | |
541 | order of least informative first - most informative last. Since | |
542 | the psymtab table is searched `most recent insertion first' this | |
543 | increases the probability that more detailed debug information | |
544 | for a section is found. | |
545 | ||
546 | For instance, an object file might contain both .mdebug (XCOFF) | |
547 | and .debug_info (DWARF2) sections then .mdebug is inserted first | |
548 | (searched last) and DWARF2 is inserted last (searched first). If | |
549 | we don't do this then the XCOFF info is found first - for code in | |
550 | an included file XCOFF info is useless. */ | |
551 | ||
552 | if (ei.mdebugsect) | |
553 | { | |
554 | const struct ecoff_debug_swap *swap; | |
555 | ||
556 | /* .mdebug section, presumably holding ECOFF debugging | |
c5aa993b | 557 | information. */ |
c906108c SS |
558 | swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; |
559 | if (swap) | |
d4f3574e | 560 | elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect); |
c906108c SS |
561 | } |
562 | if (ei.stabsect) | |
563 | { | |
564 | asection *str_sect; | |
565 | ||
566 | /* Stab sections have an associated string table that looks like | |
c5aa993b | 567 | a separate section. */ |
c906108c SS |
568 | str_sect = bfd_get_section_by_name (abfd, ".stabstr"); |
569 | ||
570 | /* FIXME should probably warn about a stab section without a stabstr. */ | |
571 | if (str_sect) | |
572 | elfstab_build_psymtabs (objfile, | |
c906108c | 573 | mainline, |
086df311 | 574 | ei.stabsect, |
c906108c SS |
575 | str_sect->filepos, |
576 | bfd_section_size (abfd, str_sect)); | |
577 | } | |
578 | if (dwarf2_has_info (abfd)) | |
579 | { | |
580 | /* DWARF 2 sections */ | |
d4f3574e | 581 | dwarf2_build_psymtabs (objfile, mainline); |
c906108c SS |
582 | } |
583 | else if (ei.dboffset && ei.lnoffset) | |
584 | { | |
585 | /* DWARF sections */ | |
586 | dwarf_build_psymtabs (objfile, | |
d4f3574e | 587 | mainline, |
c906108c SS |
588 | ei.dboffset, ei.dbsize, |
589 | ei.lnoffset, ei.lnsize); | |
590 | } | |
591 | ||
625b0b97 AC |
592 | /* FIXME: kettenis/20030504: This still needs to be integrated with |
593 | dwarf2read.c in a better way. */ | |
594 | dwarf2_build_frame_info (objfile); | |
c906108c SS |
595 | } |
596 | ||
597 | /* This cleans up the objfile's sym_stab_info pointer, and the chain of | |
598 | stab_section_info's, that might be dangling from it. */ | |
599 | ||
600 | static void | |
12b9c64f | 601 | free_elfinfo (void *objp) |
c906108c | 602 | { |
c5aa993b | 603 | struct objfile *objfile = (struct objfile *) objp; |
c906108c SS |
604 | struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info; |
605 | struct stab_section_info *ssi, *nssi; | |
606 | ||
607 | ssi = dbxinfo->stab_section_info; | |
608 | while (ssi) | |
609 | { | |
610 | nssi = ssi->next; | |
aac7f4ea | 611 | xmfree (objfile->md, ssi); |
c906108c SS |
612 | ssi = nssi; |
613 | } | |
614 | ||
615 | dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */ | |
616 | } | |
617 | ||
618 | ||
619 | /* Initialize anything that needs initializing when a completely new symbol | |
620 | file is specified (not just adding some symbols from another file, e.g. a | |
621 | shared library). | |
622 | ||
623 | We reinitialize buildsym, since we may be reading stabs from an ELF file. */ | |
624 | ||
625 | static void | |
fba45db2 | 626 | elf_new_init (struct objfile *ignore) |
c906108c SS |
627 | { |
628 | stabsread_new_init (); | |
629 | buildsym_new_init (); | |
630 | } | |
631 | ||
632 | /* Perform any local cleanups required when we are done with a particular | |
633 | objfile. I.E, we are in the process of discarding all symbol information | |
634 | for an objfile, freeing up all memory held for it, and unlinking the | |
635 | objfile struct from the global list of known objfiles. */ | |
636 | ||
637 | static void | |
fba45db2 | 638 | elf_symfile_finish (struct objfile *objfile) |
c906108c | 639 | { |
c5aa993b | 640 | if (objfile->sym_stab_info != NULL) |
c906108c | 641 | { |
aac7f4ea | 642 | xmfree (objfile->md, objfile->sym_stab_info); |
c906108c SS |
643 | } |
644 | } | |
645 | ||
646 | /* ELF specific initialization routine for reading symbols. | |
647 | ||
648 | It is passed a pointer to a struct sym_fns which contains, among other | |
649 | things, the BFD for the file whose symbols are being read, and a slot for | |
650 | a pointer to "private data" which we can fill with goodies. | |
651 | ||
652 | For now at least, we have nothing in particular to do, so this function is | |
653 | just a stub. */ | |
654 | ||
655 | static void | |
fba45db2 | 656 | elf_symfile_init (struct objfile *objfile) |
c906108c SS |
657 | { |
658 | /* ELF objects may be reordered, so set OBJF_REORDERED. If we | |
659 | find this causes a significant slowdown in gdb then we could | |
660 | set it in the debug symbol readers only when necessary. */ | |
661 | objfile->flags |= OBJF_REORDERED; | |
662 | } | |
663 | ||
664 | /* When handling an ELF file that contains Sun STABS debug info, | |
665 | some of the debug info is relative to the particular chunk of the | |
666 | section that was generated in its individual .o file. E.g. | |
667 | offsets to static variables are relative to the start of the data | |
668 | segment *for that module before linking*. This information is | |
669 | painfully squirreled away in the ELF symbol table as local symbols | |
670 | with wierd names. Go get 'em when needed. */ | |
671 | ||
672 | void | |
fba45db2 | 673 | elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst) |
c906108c SS |
674 | { |
675 | char *filename = pst->filename; | |
676 | struct dbx_symfile_info *dbx = objfile->sym_stab_info; | |
677 | struct stab_section_info *maybe = dbx->stab_section_info; | |
678 | struct stab_section_info *questionable = 0; | |
679 | int i; | |
680 | char *p; | |
681 | ||
682 | /* The ELF symbol info doesn't include path names, so strip the path | |
683 | (if any) from the psymtab filename. */ | |
684 | while (0 != (p = strchr (filename, '/'))) | |
c5aa993b | 685 | filename = p + 1; |
c906108c SS |
686 | |
687 | /* FIXME: This linear search could speed up significantly | |
688 | if it was chained in the right order to match how we search it, | |
689 | and if we unchained when we found a match. */ | |
690 | for (; maybe; maybe = maybe->next) | |
691 | { | |
692 | if (filename[0] == maybe->filename[0] | |
693 | && STREQ (filename, maybe->filename)) | |
694 | { | |
695 | /* We found a match. But there might be several source files | |
696 | (from different directories) with the same name. */ | |
697 | if (0 == maybe->found) | |
698 | break; | |
c5aa993b | 699 | questionable = maybe; /* Might use it later. */ |
c906108c SS |
700 | } |
701 | } | |
702 | ||
703 | if (maybe == 0 && questionable != 0) | |
704 | { | |
23136709 KB |
705 | complaint (&symfile_complaints, |
706 | "elf/stab section information questionable for %s", filename); | |
c906108c SS |
707 | maybe = questionable; |
708 | } | |
709 | ||
710 | if (maybe) | |
711 | { | |
712 | /* Found it! Allocate a new psymtab struct, and fill it in. */ | |
713 | maybe->found++; | |
714 | pst->section_offsets = (struct section_offsets *) | |
a39a16c4 MM |
715 | obstack_alloc (&objfile->psymbol_obstack, |
716 | SIZEOF_N_SECTION_OFFSETS (objfile->num_sections)); | |
717 | for (i = 0; i < maybe->num_sections; i++) | |
a4c8257b | 718 | (pst->section_offsets)->offsets[i] = maybe->sections[i]; |
c906108c SS |
719 | return; |
720 | } | |
721 | ||
722 | /* We were unable to find any offsets for this file. Complain. */ | |
c5aa993b | 723 | if (dbx->stab_section_info) /* If there *is* any info, */ |
23136709 KB |
724 | complaint (&symfile_complaints, |
725 | "elf/stab section information missing for %s", filename); | |
c906108c SS |
726 | } |
727 | \f | |
728 | /* Register that we are able to handle ELF object file formats. */ | |
729 | ||
730 | static struct sym_fns elf_sym_fns = | |
731 | { | |
732 | bfd_target_elf_flavour, | |
c5aa993b JM |
733 | elf_new_init, /* sym_new_init: init anything gbl to entire symtab */ |
734 | elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */ | |
735 | elf_symfile_read, /* sym_read: read a symbol file into symtab */ | |
736 | elf_symfile_finish, /* sym_finish: finished with file, cleanup */ | |
96baa820 | 737 | default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */ |
c5aa993b | 738 | NULL /* next: pointer to next struct sym_fns */ |
c906108c SS |
739 | }; |
740 | ||
741 | void | |
fba45db2 | 742 | _initialize_elfread (void) |
c906108c SS |
743 | { |
744 | add_symtab_fns (&elf_sym_fns); | |
745 | } |