merge from gcc
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b 2
6aba47ca
DJ
3 Copyright (C) 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
4 2001, 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc.
1bac305b 5
c906108c
SS
6 Written by Fred Fish at Cygnus Support.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
a9762ec7 12 the Free Software Foundation; either version 3 of the License, or
c5aa993b 13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b 20 You should have received a copy of the GNU General Public License
a9762ec7 21 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
22
23#include "defs.h"
24#include "bfd.h"
25#include "gdb_string.h"
26#include "elf-bfd.h"
31d99776
DJ
27#include "elf/common.h"
28#include "elf/internal.h"
c906108c
SS
29#include "elf/mips.h"
30#include "symtab.h"
31#include "symfile.h"
32#include "objfiles.h"
33#include "buildsym.h"
34#include "stabsread.h"
35#include "gdb-stabs.h"
36#include "complaints.h"
37#include "demangle.h"
38
a14ed312 39extern void _initialize_elfread (void);
392a587b 40
c906108c 41/* The struct elfinfo is available only during ELF symbol table and
6426a772 42 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
43 It's local to elf_symfile_read. */
44
c5aa993b
JM
45struct elfinfo
46 {
c5aa993b
JM
47 asection *stabsect; /* Section pointer for .stab section */
48 asection *stabindexsect; /* Section pointer for .stab.index section */
49 asection *mdebugsect; /* Section pointer for .mdebug section */
50 };
c906108c 51
12b9c64f 52static void free_elfinfo (void *);
c906108c 53
31d99776
DJ
54/* Locate the segments in ABFD. */
55
56static struct symfile_segment_data *
57elf_symfile_segments (bfd *abfd)
58{
59 Elf_Internal_Phdr *phdrs, **segments;
60 long phdrs_size;
61 int num_phdrs, num_segments, num_sections, i;
62 asection *sect;
63 struct symfile_segment_data *data;
64
65 phdrs_size = bfd_get_elf_phdr_upper_bound (abfd);
66 if (phdrs_size == -1)
67 return NULL;
68
69 phdrs = alloca (phdrs_size);
70 num_phdrs = bfd_get_elf_phdrs (abfd, phdrs);
71 if (num_phdrs == -1)
72 return NULL;
73
74 num_segments = 0;
75 segments = alloca (sizeof (Elf_Internal_Phdr *) * num_phdrs);
76 for (i = 0; i < num_phdrs; i++)
77 if (phdrs[i].p_type == PT_LOAD)
78 segments[num_segments++] = &phdrs[i];
79
80 if (num_segments == 0)
81 return NULL;
82
83 data = XZALLOC (struct symfile_segment_data);
84 data->num_segments = num_segments;
85 data->segment_bases = XCALLOC (num_segments, CORE_ADDR);
86 data->segment_sizes = XCALLOC (num_segments, CORE_ADDR);
87
88 for (i = 0; i < num_segments; i++)
89 {
90 data->segment_bases[i] = segments[i]->p_vaddr;
91 data->segment_sizes[i] = segments[i]->p_memsz;
92 }
93
94 num_sections = bfd_count_sections (abfd);
95 data->segment_info = XCALLOC (num_sections, int);
96
97 for (i = 0, sect = abfd->sections; sect != NULL; i++, sect = sect->next)
98 {
99 int j;
100 CORE_ADDR vma;
101
102 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
103 continue;
104
105 vma = bfd_get_section_vma (abfd, sect);
106
107 for (j = 0; j < num_segments; j++)
108 if (segments[j]->p_memsz > 0
109 && vma >= segments[j]->p_vaddr
110 && vma < segments[j]->p_vaddr + segments[j]->p_memsz)
111 {
112 data->segment_info[i] = j + 1;
113 break;
114 }
115
116 if (bfd_get_section_size (sect) > 0 && j == num_segments)
117 warning (_("Loadable segment \"%s\" outside of ELF segments"),
118 bfd_section_name (abfd, sect));
119 }
120
121 return data;
122}
123
c906108c
SS
124/* We are called once per section from elf_symfile_read. We
125 need to examine each section we are passed, check to see
126 if it is something we are interested in processing, and
127 if so, stash away some access information for the section.
128
129 For now we recognize the dwarf debug information sections and
130 line number sections from matching their section names. The
131 ELF definition is no real help here since it has no direct
132 knowledge of DWARF (by design, so any debugging format can be
133 used).
134
135 We also recognize the ".stab" sections used by the Sun compilers
136 released with Solaris 2.
137
138 FIXME: The section names should not be hardwired strings (what
139 should they be? I don't think most object file formats have enough
140 section flags to specify what kind of debug section it is
141 -kingdon). */
142
143static void
12b9c64f 144elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 145{
52f0bd74 146 struct elfinfo *ei;
c906108c
SS
147
148 ei = (struct elfinfo *) eip;
7ce59000 149 if (strcmp (sectp->name, ".stab") == 0)
c906108c 150 {
c5aa993b 151 ei->stabsect = sectp;
c906108c 152 }
6314a349 153 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 154 {
c5aa993b 155 ei->stabindexsect = sectp;
c906108c 156 }
6314a349 157 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 158 {
c5aa993b 159 ei->mdebugsect = sectp;
c906108c
SS
160 }
161}
162
c906108c 163static struct minimal_symbol *
f594e5e9
MC
164record_minimal_symbol (char *name, CORE_ADDR address,
165 enum minimal_symbol_type ms_type,
166 asection *bfd_section, struct objfile *objfile)
c906108c 167{
bbeae047 168 if (ms_type == mst_text || ms_type == mst_file_text)
260edbc2 169 address = gdbarch_smash_text_address (current_gdbarch, address);
c906108c
SS
170
171 return prim_record_minimal_symbol_and_info
f594e5e9 172 (name, address, ms_type, NULL, bfd_section->index, bfd_section, objfile);
c906108c
SS
173}
174
175/*
176
c5aa993b 177 LOCAL FUNCTION
c906108c 178
c5aa993b 179 elf_symtab_read -- read the symbol table of an ELF file
c906108c 180
c5aa993b 181 SYNOPSIS
c906108c 182
62553543
EZ
183 void elf_symtab_read (struct objfile *objfile, int dynamic,
184 long number_of_symbols, asymbol **symbol_table)
c906108c 185
c5aa993b 186 DESCRIPTION
c906108c 187
62553543
EZ
188 Given an objfile, a symbol table, and a flag indicating whether the
189 symbol table contains dynamic symbols, add all the global function
190 and data symbols to the minimal symbol table.
c906108c 191
c5aa993b
JM
192 In stabs-in-ELF, as implemented by Sun, there are some local symbols
193 defined in the ELF symbol table, which can be used to locate
194 the beginnings of sections from each ".o" file that was linked to
195 form the executable objfile. We gather any such info and record it
196 in data structures hung off the objfile's private data.
c906108c 197
c5aa993b 198 */
c906108c
SS
199
200static void
62553543
EZ
201elf_symtab_read (struct objfile *objfile, int dynamic,
202 long number_of_symbols, asymbol **symbol_table)
c906108c
SS
203{
204 long storage_needed;
205 asymbol *sym;
c906108c 206 long i;
c906108c 207 CORE_ADDR symaddr;
d4f3574e 208 CORE_ADDR offset;
c906108c
SS
209 enum minimal_symbol_type ms_type;
210 /* If sectinfo is nonNULL, it contains section info that should end up
211 filed in the objfile. */
212 struct stab_section_info *sectinfo = NULL;
213 /* If filesym is nonzero, it points to a file symbol, but we haven't
214 seen any section info for it yet. */
215 asymbol *filesym = 0;
4a146b47
EZ
216 /* Name of filesym, as saved on the objfile_obstack. */
217 char *filesymname = obsavestring ("", 0, &objfile->objfile_obstack);
0a6ddd08 218 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
d4f3574e 219 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 220
0cc7b392 221 for (i = 0; i < number_of_symbols; i++)
c906108c 222 {
0cc7b392
DJ
223 sym = symbol_table[i];
224 if (sym->name == NULL || *sym->name == '\0')
c906108c 225 {
0cc7b392
DJ
226 /* Skip names that don't exist (shouldn't happen), or names
227 that are null strings (may happen). */
228 continue;
229 }
c906108c 230
74763737
DJ
231 /* Skip "special" symbols, e.g. ARM mapping symbols. These are
232 symbols which do not correspond to objects in the symbol table,
233 but have some other target-specific meaning. */
234 if (bfd_is_target_special_symbol (objfile->obfd, sym))
235 continue;
236
0cc7b392
DJ
237 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
238 if (dynamic
239 && sym->section == &bfd_und_section
240 && (sym->flags & BSF_FUNCTION))
241 {
242 struct minimal_symbol *msym;
243
244 /* Symbol is a reference to a function defined in
245 a shared library.
246 If its value is non zero then it is usually the address
247 of the corresponding entry in the procedure linkage table,
248 plus the desired section offset.
249 If its value is zero then the dynamic linker has to resolve
250 the symbol. We are unable to find any meaningful address
251 for this symbol in the executable file, so we skip it. */
252 symaddr = sym->value;
253 if (symaddr == 0)
254 continue;
255 symaddr += offset;
256 msym = record_minimal_symbol
257 ((char *) sym->name, symaddr,
258 mst_solib_trampoline, sym->section, objfile);
0cc7b392
DJ
259 if (msym != NULL)
260 msym->filename = filesymname;
0cc7b392
DJ
261 continue;
262 }
c906108c 263
0cc7b392
DJ
264 /* If it is a nonstripped executable, do not enter dynamic
265 symbols, as the dynamic symbol table is usually a subset
266 of the main symbol table. */
267 if (dynamic && !stripped)
268 continue;
269 if (sym->flags & BSF_FILE)
270 {
271 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
272 Chain any old one onto the objfile; remember new sym. */
273 if (sectinfo != NULL)
c906108c 274 {
0cc7b392
DJ
275 sectinfo->next = dbx->stab_section_info;
276 dbx->stab_section_info = sectinfo;
277 sectinfo = NULL;
278 }
279 filesym = sym;
0cc7b392
DJ
280 filesymname =
281 obsavestring ((char *) filesym->name, strlen (filesym->name),
282 &objfile->objfile_obstack);
0cc7b392
DJ
283 }
284 else if (sym->flags & BSF_SECTION_SYM)
285 continue;
286 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
287 {
288 struct minimal_symbol *msym;
289
290 /* Select global/local/weak symbols. Note that bfd puts abs
291 symbols in their own section, so all symbols we are
292 interested in will have a section. */
293 /* Bfd symbols are section relative. */
294 symaddr = sym->value + sym->section->vma;
295 /* Relocate all non-absolute symbols by the section offset. */
296 if (sym->section != &bfd_abs_section)
297 {
298 symaddr += offset;
c906108c 299 }
0cc7b392
DJ
300 /* For non-absolute symbols, use the type of the section
301 they are relative to, to intuit text/data. Bfd provides
302 no way of figuring this out for absolute symbols. */
303 if (sym->section == &bfd_abs_section)
c906108c 304 {
0cc7b392
DJ
305 /* This is a hack to get the minimal symbol type
306 right for Irix 5, which has absolute addresses
307 with special section indices for dynamic symbols. */
308 unsigned short shndx =
309 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
310
311 switch (shndx)
c906108c 312 {
0cc7b392
DJ
313 case SHN_MIPS_TEXT:
314 ms_type = mst_text;
315 break;
316 case SHN_MIPS_DATA:
317 ms_type = mst_data;
318 break;
319 case SHN_MIPS_ACOMMON:
320 ms_type = mst_bss;
321 break;
322 default:
323 ms_type = mst_abs;
324 }
325
326 /* If it is an Irix dynamic symbol, skip section name
327 symbols, relocate all others by section offset. */
328 if (ms_type != mst_abs)
329 {
330 if (sym->name[0] == '.')
331 continue;
d4f3574e 332 symaddr += offset;
c906108c 333 }
0cc7b392
DJ
334 }
335 else if (sym->section->flags & SEC_CODE)
336 {
08232497 337 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 338 {
0cc7b392
DJ
339 ms_type = mst_text;
340 }
341 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
342 || ((sym->flags & BSF_LOCAL)
343 && sym->name[0] == '$'
344 && sym->name[1] == 'L'))
345 /* Looks like a compiler-generated label. Skip
346 it. The assembler should be skipping these (to
347 keep executables small), but apparently with
348 gcc on the (deleted) delta m88k SVR4, it loses.
349 So to have us check too should be harmless (but
350 I encourage people to fix this in the assembler
351 instead of adding checks here). */
352 continue;
353 else
354 {
355 ms_type = mst_file_text;
c906108c 356 }
0cc7b392
DJ
357 }
358 else if (sym->section->flags & SEC_ALLOC)
359 {
360 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 361 {
0cc7b392 362 if (sym->section->flags & SEC_LOAD)
c906108c 363 {
0cc7b392 364 ms_type = mst_data;
c906108c 365 }
c906108c
SS
366 else
367 {
0cc7b392 368 ms_type = mst_bss;
c906108c
SS
369 }
370 }
0cc7b392 371 else if (sym->flags & BSF_LOCAL)
c906108c 372 {
0cc7b392
DJ
373 /* Named Local variable in a Data section.
374 Check its name for stabs-in-elf. */
375 int special_local_sect;
376 if (strcmp ("Bbss.bss", sym->name) == 0)
377 special_local_sect = SECT_OFF_BSS (objfile);
378 else if (strcmp ("Ddata.data", sym->name) == 0)
379 special_local_sect = SECT_OFF_DATA (objfile);
380 else if (strcmp ("Drodata.rodata", sym->name) == 0)
381 special_local_sect = SECT_OFF_RODATA (objfile);
382 else
383 special_local_sect = -1;
384 if (special_local_sect >= 0)
c906108c 385 {
0cc7b392
DJ
386 /* Found a special local symbol. Allocate a
387 sectinfo, if needed, and fill it in. */
388 if (sectinfo == NULL)
c906108c 389 {
0cc7b392
DJ
390 int max_index;
391 size_t size;
392
393 max_index
394 = max (SECT_OFF_BSS (objfile),
395 max (SECT_OFF_DATA (objfile),
396 SECT_OFF_RODATA (objfile)));
397
398 /* max_index is the largest index we'll
399 use into this array, so we must
400 allocate max_index+1 elements for it.
401 However, 'struct stab_section_info'
402 already includes one element, so we
403 need to allocate max_index aadditional
404 elements. */
405 size = (sizeof (struct stab_section_info)
406 + (sizeof (CORE_ADDR)
407 * max_index));
408 sectinfo = (struct stab_section_info *)
409 xmalloc (size);
410 memset (sectinfo, 0, size);
411 sectinfo->num_sections = max_index;
412 if (filesym == NULL)
c906108c 413 {
0cc7b392
DJ
414 complaint (&symfile_complaints,
415 _("elf/stab section information %s without a preceding file symbol"),
416 sym->name);
417 }
418 else
419 {
420 sectinfo->filename =
421 (char *) filesym->name;
c906108c 422 }
c906108c 423 }
0cc7b392
DJ
424 if (sectinfo->sections[special_local_sect] != 0)
425 complaint (&symfile_complaints,
426 _("duplicated elf/stab section information for %s"),
427 sectinfo->filename);
428 /* BFD symbols are section relative. */
429 symaddr = sym->value + sym->section->vma;
430 /* Relocate non-absolute symbols by the
431 section offset. */
432 if (sym->section != &bfd_abs_section)
433 symaddr += offset;
434 sectinfo->sections[special_local_sect] = symaddr;
435 /* The special local symbols don't go in the
436 minimal symbol table, so ignore this one. */
437 continue;
438 }
439 /* Not a special stabs-in-elf symbol, do regular
440 symbol processing. */
441 if (sym->section->flags & SEC_LOAD)
442 {
443 ms_type = mst_file_data;
c906108c
SS
444 }
445 else
446 {
0cc7b392 447 ms_type = mst_file_bss;
c906108c
SS
448 }
449 }
450 else
451 {
0cc7b392 452 ms_type = mst_unknown;
c906108c 453 }
0cc7b392
DJ
454 }
455 else
456 {
457 /* FIXME: Solaris2 shared libraries include lots of
458 odd "absolute" and "undefined" symbols, that play
459 hob with actions like finding what function the PC
460 is in. Ignore them if they aren't text, data, or bss. */
461 /* ms_type = mst_unknown; */
462 continue; /* Skip this symbol. */
463 }
464 msym = record_minimal_symbol
465 ((char *) sym->name, symaddr,
466 ms_type, sym->section, objfile);
467 if (msym)
468 {
469 /* Pass symbol size field in via BFD. FIXME!!! */
470 unsigned long size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
471 MSYMBOL_SIZE(msym) = size;
472 }
0cc7b392
DJ
473 if (msym != NULL)
474 msym->filename = filesymname;
95f1da47 475 gdbarch_elf_make_msymbol_special (current_gdbarch, sym, msym);
c906108c 476 }
c906108c
SS
477 }
478}
479
480/* Scan and build partial symbols for a symbol file.
481 We have been initialized by a call to elf_symfile_init, which
482 currently does nothing.
483
484 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
485 in each section. We simplify it down to a single offset for all
486 symbols. FIXME.
487
488 MAINLINE is true if we are reading the main symbol
489 table (as opposed to a shared lib or dynamically loaded file).
490
491 This function only does the minimum work necessary for letting the
492 user "name" things symbolically; it does not read the entire symtab.
493 Instead, it reads the external and static symbols and puts them in partial
494 symbol tables. When more extensive information is requested of a
495 file, the corresponding partial symbol table is mutated into a full
496 fledged symbol table by going back and reading the symbols
497 for real.
498
499 We look for sections with specific names, to tell us what debug
500 format to look for: FIXME!!!
501
c906108c
SS
502 elfstab_build_psymtabs() handles STABS symbols;
503 mdebug_build_psymtabs() handles ECOFF debugging information.
504
505 Note that ELF files have a "minimal" symbol table, which looks a lot
506 like a COFF symbol table, but has only the minimal information necessary
507 for linking. We process this also, and use the information to
508 build gdb's minimal symbol table. This gives us some minimal debugging
509 capability even for files compiled without -g. */
510
511static void
fba45db2 512elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
513{
514 bfd *abfd = objfile->obfd;
515 struct elfinfo ei;
516 struct cleanup *back_to;
517 CORE_ADDR offset;
62553543
EZ
518 long symcount = 0, dynsymcount = 0, synthcount, storage_needed;
519 asymbol **symbol_table = NULL, **dyn_symbol_table = NULL;
520 asymbol *synthsyms;
c906108c
SS
521
522 init_minimal_symbol_collection ();
56e290f4 523 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
524
525 memset ((char *) &ei, 0, sizeof (ei));
526
527 /* Allocate struct to keep track of the symfile */
0a6ddd08 528 objfile->deprecated_sym_stab_info = (struct dbx_symfile_info *)
7936743b 529 xmalloc (sizeof (struct dbx_symfile_info));
0a6ddd08 530 memset ((char *) objfile->deprecated_sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 531 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
532
533 /* Process the normal ELF symbol table first. This may write some
0a6ddd08 534 chain of info into the dbx_symfile_info in objfile->deprecated_sym_stab_info,
c906108c
SS
535 which can later be used by elfstab_offset_sections. */
536
62553543
EZ
537 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
538 if (storage_needed < 0)
539 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
540 bfd_errmsg (bfd_get_error ()));
541
542 if (storage_needed > 0)
543 {
544 symbol_table = (asymbol **) xmalloc (storage_needed);
545 make_cleanup (xfree, symbol_table);
546 symcount = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
547
548 if (symcount < 0)
549 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
550 bfd_errmsg (bfd_get_error ()));
551
552 elf_symtab_read (objfile, 0, symcount, symbol_table);
553 }
c906108c
SS
554
555 /* Add the dynamic symbols. */
556
62553543
EZ
557 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
558
559 if (storage_needed > 0)
560 {
561 dyn_symbol_table = (asymbol **) xmalloc (storage_needed);
562 make_cleanup (xfree, dyn_symbol_table);
563 dynsymcount = bfd_canonicalize_dynamic_symtab (objfile->obfd,
564 dyn_symbol_table);
565
566 if (dynsymcount < 0)
567 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
568 bfd_errmsg (bfd_get_error ()));
569
570 elf_symtab_read (objfile, 1, dynsymcount, dyn_symbol_table);
571 }
572
573 /* Add synthetic symbols - for instance, names for any PLT entries. */
574
575 synthcount = bfd_get_synthetic_symtab (abfd, symcount, symbol_table,
576 dynsymcount, dyn_symbol_table,
577 &synthsyms);
578 if (synthcount > 0)
579 {
580 asymbol **synth_symbol_table;
581 long i;
582
583 make_cleanup (xfree, synthsyms);
584 synth_symbol_table = xmalloc (sizeof (asymbol *) * synthcount);
585 for (i = 0; i < synthcount; i++)
9f20e3da 586 synth_symbol_table[i] = synthsyms + i;
62553543
EZ
587 make_cleanup (xfree, synth_symbol_table);
588 elf_symtab_read (objfile, 0, synthcount, synth_symbol_table);
589 }
c906108c 590
7134143f
DJ
591 /* Install any minimal symbols that have been collected as the current
592 minimal symbols for this objfile. The debug readers below this point
593 should not generate new minimal symbols; if they do it's their
594 responsibility to install them. "mdebug" appears to be the only one
595 which will do this. */
596
597 install_minimal_symbols (objfile);
598 do_cleanups (back_to);
599
c906108c
SS
600 /* Now process debugging information, which is contained in
601 special ELF sections. */
602
603 /* If we are reinitializing, or if we have never loaded syms yet,
604 set table to empty. MAINLINE is cleared so that *_read_psymtab
605 functions do not all also re-initialize the psymbol table. */
606 if (mainline)
607 {
608 init_psymbol_list (objfile, 0);
609 mainline = 0;
610 }
611
612 /* We first have to find them... */
12b9c64f 613 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
614
615 /* ELF debugging information is inserted into the psymtab in the
616 order of least informative first - most informative last. Since
617 the psymtab table is searched `most recent insertion first' this
618 increases the probability that more detailed debug information
619 for a section is found.
620
621 For instance, an object file might contain both .mdebug (XCOFF)
622 and .debug_info (DWARF2) sections then .mdebug is inserted first
623 (searched last) and DWARF2 is inserted last (searched first). If
624 we don't do this then the XCOFF info is found first - for code in
625 an included file XCOFF info is useless. */
626
627 if (ei.mdebugsect)
628 {
629 const struct ecoff_debug_swap *swap;
630
631 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 632 information. */
c906108c
SS
633 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
634 if (swap)
d4f3574e 635 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
636 }
637 if (ei.stabsect)
638 {
639 asection *str_sect;
640
641 /* Stab sections have an associated string table that looks like
c5aa993b 642 a separate section. */
c906108c
SS
643 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
644
645 /* FIXME should probably warn about a stab section without a stabstr. */
646 if (str_sect)
647 elfstab_build_psymtabs (objfile,
c906108c 648 mainline,
086df311 649 ei.stabsect,
c906108c
SS
650 str_sect->filepos,
651 bfd_section_size (abfd, str_sect));
652 }
c5edf76a 653 if (dwarf2_has_info (objfile))
c906108c
SS
654 {
655 /* DWARF 2 sections */
d4f3574e 656 dwarf2_build_psymtabs (objfile, mainline);
c906108c 657 }
c906108c 658
625b0b97
AC
659 /* FIXME: kettenis/20030504: This still needs to be integrated with
660 dwarf2read.c in a better way. */
661 dwarf2_build_frame_info (objfile);
c906108c
SS
662}
663
0a6ddd08
AC
664/* This cleans up the objfile's deprecated_sym_stab_info pointer, and
665 the chain of stab_section_info's, that might be dangling from
666 it. */
c906108c
SS
667
668static void
12b9c64f 669free_elfinfo (void *objp)
c906108c 670{
c5aa993b 671 struct objfile *objfile = (struct objfile *) objp;
0a6ddd08 672 struct dbx_symfile_info *dbxinfo = objfile->deprecated_sym_stab_info;
c906108c
SS
673 struct stab_section_info *ssi, *nssi;
674
675 ssi = dbxinfo->stab_section_info;
676 while (ssi)
677 {
678 nssi = ssi->next;
2dc74dc1 679 xfree (ssi);
c906108c
SS
680 ssi = nssi;
681 }
682
683 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
684}
685
686
687/* Initialize anything that needs initializing when a completely new symbol
688 file is specified (not just adding some symbols from another file, e.g. a
689 shared library).
690
691 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
692
693static void
fba45db2 694elf_new_init (struct objfile *ignore)
c906108c
SS
695{
696 stabsread_new_init ();
697 buildsym_new_init ();
698}
699
700/* Perform any local cleanups required when we are done with a particular
701 objfile. I.E, we are in the process of discarding all symbol information
702 for an objfile, freeing up all memory held for it, and unlinking the
703 objfile struct from the global list of known objfiles. */
704
705static void
fba45db2 706elf_symfile_finish (struct objfile *objfile)
c906108c 707{
0a6ddd08 708 if (objfile->deprecated_sym_stab_info != NULL)
c906108c 709 {
0a6ddd08 710 xfree (objfile->deprecated_sym_stab_info);
c906108c 711 }
fe3e1990
DJ
712
713 dwarf2_free_objfile (objfile);
c906108c
SS
714}
715
716/* ELF specific initialization routine for reading symbols.
717
718 It is passed a pointer to a struct sym_fns which contains, among other
719 things, the BFD for the file whose symbols are being read, and a slot for
720 a pointer to "private data" which we can fill with goodies.
721
722 For now at least, we have nothing in particular to do, so this function is
723 just a stub. */
724
725static void
fba45db2 726elf_symfile_init (struct objfile *objfile)
c906108c
SS
727{
728 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
729 find this causes a significant slowdown in gdb then we could
730 set it in the debug symbol readers only when necessary. */
731 objfile->flags |= OBJF_REORDERED;
732}
733
734/* When handling an ELF file that contains Sun STABS debug info,
735 some of the debug info is relative to the particular chunk of the
736 section that was generated in its individual .o file. E.g.
737 offsets to static variables are relative to the start of the data
738 segment *for that module before linking*. This information is
739 painfully squirreled away in the ELF symbol table as local symbols
740 with wierd names. Go get 'em when needed. */
741
742void
fba45db2 743elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
744{
745 char *filename = pst->filename;
0a6ddd08 746 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
c906108c
SS
747 struct stab_section_info *maybe = dbx->stab_section_info;
748 struct stab_section_info *questionable = 0;
749 int i;
750 char *p;
751
752 /* The ELF symbol info doesn't include path names, so strip the path
753 (if any) from the psymtab filename. */
754 while (0 != (p = strchr (filename, '/')))
c5aa993b 755 filename = p + 1;
c906108c
SS
756
757 /* FIXME: This linear search could speed up significantly
758 if it was chained in the right order to match how we search it,
759 and if we unchained when we found a match. */
760 for (; maybe; maybe = maybe->next)
761 {
762 if (filename[0] == maybe->filename[0]
6314a349 763 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
764 {
765 /* We found a match. But there might be several source files
766 (from different directories) with the same name. */
767 if (0 == maybe->found)
768 break;
c5aa993b 769 questionable = maybe; /* Might use it later. */
c906108c
SS
770 }
771 }
772
773 if (maybe == 0 && questionable != 0)
774 {
23136709 775 complaint (&symfile_complaints,
e2e0b3e5 776 _("elf/stab section information questionable for %s"), filename);
c906108c
SS
777 maybe = questionable;
778 }
779
780 if (maybe)
781 {
782 /* Found it! Allocate a new psymtab struct, and fill it in. */
783 maybe->found++;
784 pst->section_offsets = (struct section_offsets *)
8b92e4d5 785 obstack_alloc (&objfile->objfile_obstack,
a39a16c4
MM
786 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
787 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 788 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
789 return;
790 }
791
792 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 793 if (dbx->stab_section_info) /* If there *is* any info, */
23136709 794 complaint (&symfile_complaints,
e2e0b3e5 795 _("elf/stab section information missing for %s"), filename);
c906108c
SS
796}
797\f
798/* Register that we are able to handle ELF object file formats. */
799
800static struct sym_fns elf_sym_fns =
801{
802 bfd_target_elf_flavour,
c5aa993b
JM
803 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
804 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
805 elf_symfile_read, /* sym_read: read a symbol file into symtab */
806 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 807 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
31d99776
DJ
808 elf_symfile_segments, /* sym_segments: Get segment information from
809 a file. */
c295b2e5 810 NULL, /* sym_read_linetable */
c5aa993b 811 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
812};
813
814void
fba45db2 815_initialize_elfread (void)
c906108c
SS
816{
817 add_symtab_fns (&elf_sym_fns);
818}
This page took 0.662953 seconds and 4 git commands to generate.