2000-01-17 Amit S. Kale <akale@veritas.com>
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c
SS
1/* Read ELF (Executable and Linking Format) object files for GDB.
2 Copyright 1991, 92, 93, 94, 95, 96, 1998 Free Software Foundation, Inc.
3 Written by Fred Fish at Cygnus Support.
4
c5aa993b 5 This file is part of GDB.
c906108c 6
c5aa993b
JM
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
c906108c 11
c5aa993b
JM
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
c906108c 16
c5aa993b
JM
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 59 Temple Place - Suite 330,
20 Boston, MA 02111-1307, USA. */
c906108c
SS
21
22#include "defs.h"
23#include "bfd.h"
24#include "gdb_string.h"
25#include "elf-bfd.h"
26#include "elf/mips.h"
27#include "symtab.h"
28#include "symfile.h"
29#include "objfiles.h"
30#include "buildsym.h"
31#include "stabsread.h"
32#include "gdb-stabs.h"
33#include "complaints.h"
34#include "demangle.h"
35
392a587b
JM
36extern void _initialize_elfread PARAMS ((void));
37
c906108c 38/* The struct elfinfo is available only during ELF symbol table and
6426a772 39 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
40 It's local to elf_symfile_read. */
41
c5aa993b
JM
42struct elfinfo
43 {
44 file_ptr dboffset; /* Offset to dwarf debug section */
45 unsigned int dbsize; /* Size of dwarf debug section */
46 file_ptr lnoffset; /* Offset to dwarf line number section */
47 unsigned int lnsize; /* Size of dwarf line number section */
48 asection *stabsect; /* Section pointer for .stab section */
49 asection *stabindexsect; /* Section pointer for .stab.index section */
50 asection *mdebugsect; /* Section pointer for .mdebug section */
51 };
c906108c
SS
52
53/* Various things we might complain about... */
54
c5aa993b
JM
55struct complaint section_info_complaint =
56{"elf/stab section information %s without a preceding file symbol", 0, 0};
c906108c 57
c5aa993b
JM
58struct complaint section_info_dup_complaint =
59{"duplicated elf/stab section information for %s", 0, 0};
c906108c 60
c5aa993b
JM
61struct complaint stab_info_mismatch_complaint =
62{"elf/stab section information missing for %s", 0, 0};
c906108c 63
c5aa993b
JM
64struct complaint stab_info_questionable_complaint =
65{"elf/stab section information questionable for %s", 0, 0};
c906108c
SS
66
67static void
68elf_symfile_init PARAMS ((struct objfile *));
69
70static void
71elf_new_init PARAMS ((struct objfile *));
72
73static void
96baa820 74elf_symfile_read PARAMS ((struct objfile *, int));
c906108c
SS
75
76static void
77elf_symfile_finish PARAMS ((struct objfile *));
78
79static void
d4f3574e 80elf_symtab_read PARAMS ((struct objfile *, int));
c906108c
SS
81
82static void
83free_elfinfo PARAMS ((void *));
84
85static struct minimal_symbol *
c5aa993b
JM
86 record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR,
87 enum minimal_symbol_type, char *,
88 asection * bfd_section,
89 struct objfile *));
c906108c
SS
90
91static void
92elf_locate_sections PARAMS ((bfd *, asection *, void *));
93
94/* We are called once per section from elf_symfile_read. We
95 need to examine each section we are passed, check to see
96 if it is something we are interested in processing, and
97 if so, stash away some access information for the section.
98
99 For now we recognize the dwarf debug information sections and
100 line number sections from matching their section names. The
101 ELF definition is no real help here since it has no direct
102 knowledge of DWARF (by design, so any debugging format can be
103 used).
104
105 We also recognize the ".stab" sections used by the Sun compilers
106 released with Solaris 2.
107
108 FIXME: The section names should not be hardwired strings (what
109 should they be? I don't think most object file formats have enough
110 section flags to specify what kind of debug section it is
111 -kingdon). */
112
113static void
114elf_locate_sections (ignore_abfd, sectp, eip)
115 bfd *ignore_abfd;
116 asection *sectp;
117 PTR eip;
118{
119 register struct elfinfo *ei;
120
121 ei = (struct elfinfo *) eip;
c5aa993b 122 if (STREQ (sectp->name, ".debug"))
c906108c 123 {
c5aa993b
JM
124 ei->dboffset = sectp->filepos;
125 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 126 }
c5aa993b 127 else if (STREQ (sectp->name, ".line"))
c906108c 128 {
c5aa993b
JM
129 ei->lnoffset = sectp->filepos;
130 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 131 }
c5aa993b 132 else if (STREQ (sectp->name, ".stab"))
c906108c 133 {
c5aa993b 134 ei->stabsect = sectp;
c906108c 135 }
c5aa993b 136 else if (STREQ (sectp->name, ".stab.index"))
c906108c 137 {
c5aa993b 138 ei->stabindexsect = sectp;
c906108c 139 }
c5aa993b 140 else if (STREQ (sectp->name, ".mdebug"))
c906108c 141 {
c5aa993b 142 ei->mdebugsect = sectp;
c906108c
SS
143 }
144}
145
c5aa993b 146#if 0 /* Currently unused */
c906108c
SS
147
148char *
149elf_interpreter (abfd)
150 bfd *abfd;
151{
152 sec_ptr interp_sec;
153 unsigned size;
154 char *interp = NULL;
155
156 interp_sec = bfd_get_section_by_name (abfd, ".interp");
157 if (interp_sec)
158 {
159 size = bfd_section_size (abfd, interp_sec);
160 interp = alloca (size);
c5aa993b 161 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr) 0,
c906108c
SS
162 size))
163 {
164 interp = savestring (interp, size - 1);
165 }
166 else
167 {
168 interp = NULL;
169 }
170 }
171 return (interp);
172}
173
174#endif
175
176static struct minimal_symbol *
177record_minimal_symbol_and_info (name, address, ms_type, info, bfd_section,
178 objfile)
179 char *name;
180 CORE_ADDR address;
181 enum minimal_symbol_type ms_type;
182 char *info; /* FIXME, is this really char *? */
183 asection *bfd_section;
184 struct objfile *objfile;
185{
186 int section;
187
188 /* Guess the section from the type. This is likely to be wrong in
189 some cases. */
190 switch (ms_type)
191 {
192 case mst_text:
193 case mst_file_text:
194 section = SECT_OFF_TEXT;
195#ifdef SMASH_TEXT_ADDRESS
196 SMASH_TEXT_ADDRESS (address);
197#endif
198 break;
199 case mst_data:
200 case mst_file_data:
201 section = SECT_OFF_DATA;
202 break;
203 case mst_bss:
204 case mst_file_bss:
205 section = SECT_OFF_BSS;
206 break;
207 default:
208 section = -1;
209 break;
210 }
211
212 return prim_record_minimal_symbol_and_info
213 (name, address, ms_type, info, section, bfd_section, objfile);
214}
215
216/*
217
c5aa993b 218 LOCAL FUNCTION
c906108c 219
c5aa993b 220 elf_symtab_read -- read the symbol table of an ELF file
c906108c 221
c5aa993b 222 SYNOPSIS
c906108c 223
d4f3574e 224 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 225
c5aa993b 226 DESCRIPTION
c906108c 227
d4f3574e
SS
228 Given an objfile and a flag that specifies whether or not the objfile
229 is for an executable or not (may be shared library for example), add
230 all the global function and data symbols to the minimal symbol table.
c906108c 231
c5aa993b
JM
232 In stabs-in-ELF, as implemented by Sun, there are some local symbols
233 defined in the ELF symbol table, which can be used to locate
234 the beginnings of sections from each ".o" file that was linked to
235 form the executable objfile. We gather any such info and record it
236 in data structures hung off the objfile's private data.
c906108c 237
c5aa993b 238 */
c906108c
SS
239
240static void
d4f3574e 241elf_symtab_read (objfile, dynamic)
c906108c
SS
242 struct objfile *objfile;
243 int dynamic;
244{
245 long storage_needed;
246 asymbol *sym;
247 asymbol **symbol_table;
248 long number_of_symbols;
249 long i;
250 int index;
251 struct cleanup *back_to;
252 CORE_ADDR symaddr;
d4f3574e 253 CORE_ADDR offset;
c906108c
SS
254 enum minimal_symbol_type ms_type;
255 /* If sectinfo is nonNULL, it contains section info that should end up
256 filed in the objfile. */
257 struct stab_section_info *sectinfo = NULL;
258 /* If filesym is nonzero, it points to a file symbol, but we haven't
259 seen any section info for it yet. */
260 asymbol *filesym = 0;
261#ifdef SOFUN_ADDRESS_MAYBE_MISSING
262 /* Name of filesym, as saved on the symbol_obstack. */
263 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
264#endif
265 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
266 unsigned long size;
d4f3574e 267 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 268
c906108c
SS
269 if (dynamic)
270 {
d4f3574e 271 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
272
273 /* Nothing to be done if there is no dynamic symtab. */
274 if (storage_needed < 0)
275 return;
276 }
277 else
278 {
d4f3574e 279 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 280 if (storage_needed < 0)
d4f3574e 281 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
282 bfd_errmsg (bfd_get_error ()));
283 }
284 if (storage_needed > 0)
285 {
286 symbol_table = (asymbol **) xmalloc (storage_needed);
287 back_to = make_cleanup (free, symbol_table);
288 if (dynamic)
d4f3574e 289 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
290 symbol_table);
291 else
d4f3574e 292 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 293 if (number_of_symbols < 0)
d4f3574e 294 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 295 bfd_errmsg (bfd_get_error ()));
fa292f23 296 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c
SS
297 for (i = 0; i < number_of_symbols; i++)
298 {
299 sym = symbol_table[i];
c5aa993b 300 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
301 {
302 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 303 that are null strings (may happen). */
c906108c
SS
304 continue;
305 }
306
307 if (dynamic
c5aa993b
JM
308 && sym->section == &bfd_und_section
309 && (sym->flags & BSF_FUNCTION))
c906108c
SS
310 {
311 struct minimal_symbol *msym;
312
313 /* Symbol is a reference to a function defined in
c5aa993b
JM
314 a shared library.
315 If its value is non zero then it is usually the address
316 of the corresponding entry in the procedure linkage table,
d4f3574e 317 plus the desired section offset.
c5aa993b
JM
318 If its value is zero then the dynamic linker has to resolve
319 the symbol. We are unable to find any meaningful address
320 for this symbol in the executable file, so we skip it. */
321 symaddr = sym->value;
c906108c
SS
322 if (symaddr == 0)
323 continue;
d4f3574e 324 symaddr += offset;
c906108c 325 msym = record_minimal_symbol_and_info
c5aa993b
JM
326 ((char *) sym->name, symaddr,
327 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
328#ifdef SOFUN_ADDRESS_MAYBE_MISSING
329 if (msym != NULL)
330 msym->filename = filesymname;
331#endif
332 continue;
333 }
334
335 /* If it is a nonstripped executable, do not enter dynamic
336 symbols, as the dynamic symbol table is usually a subset
337 of the main symbol table. */
338 if (dynamic && !stripped)
339 continue;
c5aa993b 340 if (sym->flags & BSF_FILE)
c906108c
SS
341 {
342 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 343 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
344 if (sectinfo != NULL)
345 {
c5aa993b
JM
346 sectinfo->next = dbx->stab_section_info;
347 dbx->stab_section_info = sectinfo;
c906108c
SS
348 sectinfo = NULL;
349 }
350 filesym = sym;
351#ifdef SOFUN_ADDRESS_MAYBE_MISSING
352 filesymname =
c5aa993b 353 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
354 &objfile->symbol_obstack);
355#endif
356 }
c5aa993b 357 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
358 {
359 struct minimal_symbol *msym;
360
361 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
362 symbols in their own section, so all symbols we are
363 interested in will have a section. */
c906108c 364 /* Bfd symbols are section relative. */
c5aa993b 365 symaddr = sym->value + sym->section->vma;
d4f3574e 366 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 367 if (sym->section != &bfd_abs_section)
c906108c 368 {
d4f3574e 369 symaddr += offset;
c906108c
SS
370 }
371 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
372 they are relative to, to intuit text/data. Bfd provides
373 no way of figuring this out for absolute symbols. */
374 if (sym->section == &bfd_abs_section)
c906108c
SS
375 {
376 /* This is a hack to get the minimal symbol type
11cf8741 377 right for Irix 5, which has absolute addresses
c906108c
SS
378 with special section indices for dynamic symbols. */
379 unsigned short shndx =
c5aa993b 380 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
381
382 switch (shndx)
383 {
384 case SHN_MIPS_TEXT:
385 ms_type = mst_text;
386 break;
387 case SHN_MIPS_DATA:
388 ms_type = mst_data;
389 break;
390 case SHN_MIPS_ACOMMON:
391 ms_type = mst_bss;
392 break;
393 default:
394 ms_type = mst_abs;
395 }
396
397 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 398 symbols, relocate all others by section offset. */
c906108c
SS
399 if (ms_type != mst_abs)
400 {
401 if (sym->name[0] == '.')
402 continue;
d4f3574e 403 symaddr += offset;
c906108c
SS
404 }
405 }
c5aa993b 406 else if (sym->section->flags & SEC_CODE)
c906108c 407 {
c5aa993b 408 if (sym->flags & BSF_GLOBAL)
c906108c
SS
409 {
410 ms_type = mst_text;
411 }
412 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 413 || ((sym->flags & BSF_LOCAL)
c906108c
SS
414 && sym->name[0] == '$'
415 && sym->name[1] == 'L'))
416 /* Looks like a compiler-generated label. Skip it.
417 The assembler should be skipping these (to keep
418 executables small), but apparently with gcc on the
419 delta m88k SVR4, it loses. So to have us check too
420 should be harmless (but I encourage people to fix this
421 in the assembler instead of adding checks here). */
422 continue;
423#ifdef HARRIS_TARGET
424 else if (sym->name[0] == '.' && sym->name[1] == '.')
425 {
426 /* Looks like a Harris compiler generated label for the
c5aa993b
JM
427 purpose of marking instructions that are relevant to
428 DWARF dies. The assembler can't get rid of these
429 because they are relocatable addresses that the
430 linker needs to resolve. */
c906108c
SS
431 continue;
432 }
c5aa993b 433#endif
c906108c
SS
434 else
435 {
436 ms_type = mst_file_text;
437 }
438 }
c5aa993b 439 else if (sym->section->flags & SEC_ALLOC)
c906108c 440 {
c5aa993b 441 if (sym->flags & BSF_GLOBAL)
c906108c 442 {
c5aa993b 443 if (sym->section->flags & SEC_LOAD)
c906108c
SS
444 {
445 ms_type = mst_data;
446 }
447 else
448 {
449 ms_type = mst_bss;
450 }
451 }
c5aa993b 452 else if (sym->flags & BSF_LOCAL)
c906108c
SS
453 {
454 /* Named Local variable in a Data section. Check its
c5aa993b
JM
455 name for stabs-in-elf. The STREQ macro checks the
456 first character inline, so we only actually do a
457 strcmp function call on names that start with 'B'
458 or 'D' */
c906108c 459 index = SECT_OFF_MAX;
c5aa993b 460 if (STREQ ("Bbss.bss", sym->name))
c906108c
SS
461 {
462 index = SECT_OFF_BSS;
463 }
c5aa993b 464 else if (STREQ ("Ddata.data", sym->name))
c906108c
SS
465 {
466 index = SECT_OFF_DATA;
467 }
c5aa993b 468 else if (STREQ ("Drodata.rodata", sym->name))
c906108c
SS
469 {
470 index = SECT_OFF_RODATA;
471 }
472 if (index != SECT_OFF_MAX)
473 {
474 /* Found a special local symbol. Allocate a
475 sectinfo, if needed, and fill it in. */
476 if (sectinfo == NULL)
477 {
478 sectinfo = (struct stab_section_info *)
c5aa993b 479 xmmalloc (objfile->md, sizeof (*sectinfo));
c906108c
SS
480 memset ((PTR) sectinfo, 0, sizeof (*sectinfo));
481 if (filesym == NULL)
482 {
483 complain (&section_info_complaint,
c5aa993b 484 sym->name);
c906108c
SS
485 }
486 else
487 {
c5aa993b
JM
488 sectinfo->filename =
489 (char *) filesym->name;
c906108c
SS
490 }
491 }
c5aa993b 492 if (sectinfo->sections[index] != 0)
c906108c
SS
493 {
494 complain (&section_info_dup_complaint,
c5aa993b 495 sectinfo->filename);
c906108c
SS
496 }
497 /* Bfd symbols are section relative. */
c5aa993b 498 symaddr = sym->value + sym->section->vma;
d4f3574e 499 /* Relocate non-absolute symbols by the section offset. */
c5aa993b 500 if (sym->section != &bfd_abs_section)
c906108c 501 {
d4f3574e 502 symaddr += offset;
c906108c 503 }
c5aa993b 504 sectinfo->sections[index] = symaddr;
c906108c
SS
505 /* The special local symbols don't go in the
506 minimal symbol table, so ignore this one. */
507 continue;
508 }
509 /* Not a special stabs-in-elf symbol, do regular
c5aa993b
JM
510 symbol processing. */
511 if (sym->section->flags & SEC_LOAD)
c906108c
SS
512 {
513 ms_type = mst_file_data;
514 }
515 else
516 {
517 ms_type = mst_file_bss;
518 }
519 }
520 else
521 {
522 ms_type = mst_unknown;
523 }
524 }
525 else
526 {
527 /* FIXME: Solaris2 shared libraries include lots of
528 odd "absolute" and "undefined" symbols, that play
529 hob with actions like finding what function the PC
530 is in. Ignore them if they aren't text, data, or bss. */
531 /* ms_type = mst_unknown; */
c5aa993b 532 continue; /* Skip this symbol. */
c906108c
SS
533 }
534 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 535 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 536 msym = record_minimal_symbol_and_info
c5aa993b
JM
537 ((char *) sym->name, symaddr,
538 ms_type, (PTR) size, sym->section, objfile);
c906108c
SS
539#ifdef SOFUN_ADDRESS_MAYBE_MISSING
540 if (msym != NULL)
541 msym->filename = filesymname;
542#endif
543#ifdef ELF_MAKE_MSYMBOL_SPECIAL
c5aa993b 544 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
545#endif
546 }
547 }
548 do_cleanups (back_to);
549 }
550}
551
552/* Scan and build partial symbols for a symbol file.
553 We have been initialized by a call to elf_symfile_init, which
554 currently does nothing.
555
556 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
557 in each section. We simplify it down to a single offset for all
558 symbols. FIXME.
559
560 MAINLINE is true if we are reading the main symbol
561 table (as opposed to a shared lib or dynamically loaded file).
562
563 This function only does the minimum work necessary for letting the
564 user "name" things symbolically; it does not read the entire symtab.
565 Instead, it reads the external and static symbols and puts them in partial
566 symbol tables. When more extensive information is requested of a
567 file, the corresponding partial symbol table is mutated into a full
568 fledged symbol table by going back and reading the symbols
569 for real.
570
571 We look for sections with specific names, to tell us what debug
572 format to look for: FIXME!!!
573
574 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
575 elfstab_build_psymtabs() handles STABS symbols;
576 mdebug_build_psymtabs() handles ECOFF debugging information.
577
578 Note that ELF files have a "minimal" symbol table, which looks a lot
579 like a COFF symbol table, but has only the minimal information necessary
580 for linking. We process this also, and use the information to
581 build gdb's minimal symbol table. This gives us some minimal debugging
582 capability even for files compiled without -g. */
583
584static void
96baa820 585elf_symfile_read (objfile, mainline)
c906108c 586 struct objfile *objfile;
c906108c
SS
587 int mainline;
588{
589 bfd *abfd = objfile->obfd;
590 struct elfinfo ei;
591 struct cleanup *back_to;
592 CORE_ADDR offset;
593
594 init_minimal_symbol_collection ();
595 back_to = make_cleanup ((make_cleanup_func) discard_minimal_symbols, 0);
596
597 memset ((char *) &ei, 0, sizeof (ei));
598
599 /* Allocate struct to keep track of the symfile */
600 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 601 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c
SS
602 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
603 make_cleanup (free_elfinfo, (PTR) objfile);
604
605 /* Process the normal ELF symbol table first. This may write some
606 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
607 which can later be used by elfstab_offset_sections. */
608
d4f3574e 609 elf_symtab_read (objfile, 0);
c906108c
SS
610
611 /* Add the dynamic symbols. */
612
d4f3574e 613 elf_symtab_read (objfile, 1);
c906108c
SS
614
615 /* Now process debugging information, which is contained in
616 special ELF sections. */
617
618 /* If we are reinitializing, or if we have never loaded syms yet,
619 set table to empty. MAINLINE is cleared so that *_read_psymtab
620 functions do not all also re-initialize the psymbol table. */
621 if (mainline)
622 {
623 init_psymbol_list (objfile, 0);
624 mainline = 0;
625 }
626
627 /* We first have to find them... */
c5aa993b 628 bfd_map_over_sections (abfd, elf_locate_sections, (PTR) & ei);
c906108c
SS
629
630 /* ELF debugging information is inserted into the psymtab in the
631 order of least informative first - most informative last. Since
632 the psymtab table is searched `most recent insertion first' this
633 increases the probability that more detailed debug information
634 for a section is found.
635
636 For instance, an object file might contain both .mdebug (XCOFF)
637 and .debug_info (DWARF2) sections then .mdebug is inserted first
638 (searched last) and DWARF2 is inserted last (searched first). If
639 we don't do this then the XCOFF info is found first - for code in
640 an included file XCOFF info is useless. */
641
642 if (ei.mdebugsect)
643 {
644 const struct ecoff_debug_swap *swap;
645
646 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 647 information. */
c906108c
SS
648 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
649 if (swap)
d4f3574e 650 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
651 }
652 if (ei.stabsect)
653 {
654 asection *str_sect;
655
656 /* Stab sections have an associated string table that looks like
c5aa993b 657 a separate section. */
c906108c
SS
658 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
659
660 /* FIXME should probably warn about a stab section without a stabstr. */
661 if (str_sect)
662 elfstab_build_psymtabs (objfile,
c906108c
SS
663 mainline,
664 ei.stabsect->filepos,
665 bfd_section_size (abfd, ei.stabsect),
666 str_sect->filepos,
667 bfd_section_size (abfd, str_sect));
668 }
669 if (dwarf2_has_info (abfd))
670 {
671 /* DWARF 2 sections */
d4f3574e 672 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
673 }
674 else if (ei.dboffset && ei.lnoffset)
675 {
676 /* DWARF sections */
677 dwarf_build_psymtabs (objfile,
d4f3574e 678 mainline,
c906108c
SS
679 ei.dboffset, ei.dbsize,
680 ei.lnoffset, ei.lnsize);
681 }
682
683 /* Install any minimal symbols that have been collected as the current
684 minimal symbols for this objfile. */
685
686 install_minimal_symbols (objfile);
687
688 do_cleanups (back_to);
689}
690
691/* This cleans up the objfile's sym_stab_info pointer, and the chain of
692 stab_section_info's, that might be dangling from it. */
693
694static void
695free_elfinfo (objp)
696 PTR objp;
697{
c5aa993b 698 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
699 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
700 struct stab_section_info *ssi, *nssi;
701
702 ssi = dbxinfo->stab_section_info;
703 while (ssi)
704 {
705 nssi = ssi->next;
706 mfree (objfile->md, ssi);
707 ssi = nssi;
708 }
709
710 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
711}
712
713
714/* Initialize anything that needs initializing when a completely new symbol
715 file is specified (not just adding some symbols from another file, e.g. a
716 shared library).
717
718 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
719
720static void
721elf_new_init (ignore)
722 struct objfile *ignore;
723{
724 stabsread_new_init ();
725 buildsym_new_init ();
726}
727
728/* Perform any local cleanups required when we are done with a particular
729 objfile. I.E, we are in the process of discarding all symbol information
730 for an objfile, freeing up all memory held for it, and unlinking the
731 objfile struct from the global list of known objfiles. */
732
733static void
734elf_symfile_finish (objfile)
735 struct objfile *objfile;
736{
c5aa993b 737 if (objfile->sym_stab_info != NULL)
c906108c 738 {
c5aa993b 739 mfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
740 }
741}
742
743/* ELF specific initialization routine for reading symbols.
744
745 It is passed a pointer to a struct sym_fns which contains, among other
746 things, the BFD for the file whose symbols are being read, and a slot for
747 a pointer to "private data" which we can fill with goodies.
748
749 For now at least, we have nothing in particular to do, so this function is
750 just a stub. */
751
752static void
753elf_symfile_init (objfile)
754 struct objfile *objfile;
755{
756 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
757 find this causes a significant slowdown in gdb then we could
758 set it in the debug symbol readers only when necessary. */
759 objfile->flags |= OBJF_REORDERED;
760}
761
762/* When handling an ELF file that contains Sun STABS debug info,
763 some of the debug info is relative to the particular chunk of the
764 section that was generated in its individual .o file. E.g.
765 offsets to static variables are relative to the start of the data
766 segment *for that module before linking*. This information is
767 painfully squirreled away in the ELF symbol table as local symbols
768 with wierd names. Go get 'em when needed. */
769
770void
771elfstab_offset_sections (objfile, pst)
772 struct objfile *objfile;
773 struct partial_symtab *pst;
774{
775 char *filename = pst->filename;
776 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
777 struct stab_section_info *maybe = dbx->stab_section_info;
778 struct stab_section_info *questionable = 0;
779 int i;
780 char *p;
781
782 /* The ELF symbol info doesn't include path names, so strip the path
783 (if any) from the psymtab filename. */
784 while (0 != (p = strchr (filename, '/')))
c5aa993b 785 filename = p + 1;
c906108c
SS
786
787 /* FIXME: This linear search could speed up significantly
788 if it was chained in the right order to match how we search it,
789 and if we unchained when we found a match. */
790 for (; maybe; maybe = maybe->next)
791 {
792 if (filename[0] == maybe->filename[0]
793 && STREQ (filename, maybe->filename))
794 {
795 /* We found a match. But there might be several source files
796 (from different directories) with the same name. */
797 if (0 == maybe->found)
798 break;
c5aa993b 799 questionable = maybe; /* Might use it later. */
c906108c
SS
800 }
801 }
802
803 if (maybe == 0 && questionable != 0)
804 {
805 complain (&stab_info_questionable_complaint, filename);
806 maybe = questionable;
807 }
808
809 if (maybe)
810 {
811 /* Found it! Allocate a new psymtab struct, and fill it in. */
812 maybe->found++;
813 pst->section_offsets = (struct section_offsets *)
96baa820 814 obstack_alloc (&objfile->psymbol_obstack, SIZEOF_SECTION_OFFSETS);
c906108c
SS
815 for (i = 0; i < SECT_OFF_MAX; i++)
816 ANOFFSET (pst->section_offsets, i) = maybe->sections[i];
817 return;
818 }
819
820 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 821 if (dbx->stab_section_info) /* If there *is* any info, */
c906108c
SS
822 complain (&stab_info_mismatch_complaint, filename);
823}
824\f
825/* Register that we are able to handle ELF object file formats. */
826
827static struct sym_fns elf_sym_fns =
828{
829 bfd_target_elf_flavour,
c5aa993b
JM
830 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
831 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
832 elf_symfile_read, /* sym_read: read a symbol file into symtab */
833 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 834 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 835 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
836};
837
838void
839_initialize_elfread ()
840{
841 add_symtab_fns (&elf_sym_fns);
842}
This page took 0.073965 seconds and 4 git commands to generate.