Commit | Line | Data |
---|---|---|
c906108c | 1 | /* Read ELF (Executable and Linking Format) object files for GDB. |
1bac305b AC |
2 | |
3 | Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, | |
4 | 2000, 2001, 2002, 2003 Free Software Foundation, Inc. | |
5 | ||
c906108c SS |
6 | Written by Fred Fish at Cygnus Support. |
7 | ||
c5aa993b | 8 | This file is part of GDB. |
c906108c | 9 | |
c5aa993b JM |
10 | This program is free software; you can redistribute it and/or modify |
11 | it under the terms of the GNU General Public License as published by | |
12 | the Free Software Foundation; either version 2 of the License, or | |
13 | (at your option) any later version. | |
c906108c | 14 | |
c5aa993b JM |
15 | This program is distributed in the hope that it will be useful, |
16 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | GNU General Public License for more details. | |
c906108c | 19 | |
c5aa993b JM |
20 | You should have received a copy of the GNU General Public License |
21 | along with this program; if not, write to the Free Software | |
22 | Foundation, Inc., 59 Temple Place - Suite 330, | |
23 | Boston, MA 02111-1307, USA. */ | |
c906108c SS |
24 | |
25 | #include "defs.h" | |
26 | #include "bfd.h" | |
27 | #include "gdb_string.h" | |
28 | #include "elf-bfd.h" | |
29 | #include "elf/mips.h" | |
30 | #include "symtab.h" | |
31 | #include "symfile.h" | |
32 | #include "objfiles.h" | |
33 | #include "buildsym.h" | |
34 | #include "stabsread.h" | |
35 | #include "gdb-stabs.h" | |
36 | #include "complaints.h" | |
37 | #include "demangle.h" | |
38 | ||
a14ed312 | 39 | extern void _initialize_elfread (void); |
392a587b | 40 | |
c906108c | 41 | /* The struct elfinfo is available only during ELF symbol table and |
6426a772 | 42 | psymtab reading. It is destroyed at the completion of psymtab-reading. |
c906108c SS |
43 | It's local to elf_symfile_read. */ |
44 | ||
c5aa993b JM |
45 | struct elfinfo |
46 | { | |
47 | file_ptr dboffset; /* Offset to dwarf debug section */ | |
48 | unsigned int dbsize; /* Size of dwarf debug section */ | |
49 | file_ptr lnoffset; /* Offset to dwarf line number section */ | |
50 | unsigned int lnsize; /* Size of dwarf line number section */ | |
51 | asection *stabsect; /* Section pointer for .stab section */ | |
52 | asection *stabindexsect; /* Section pointer for .stab.index section */ | |
53 | asection *mdebugsect; /* Section pointer for .mdebug section */ | |
54 | }; | |
c906108c | 55 | |
12b9c64f | 56 | static void free_elfinfo (void *); |
c906108c SS |
57 | |
58 | /* We are called once per section from elf_symfile_read. We | |
59 | need to examine each section we are passed, check to see | |
60 | if it is something we are interested in processing, and | |
61 | if so, stash away some access information for the section. | |
62 | ||
63 | For now we recognize the dwarf debug information sections and | |
64 | line number sections from matching their section names. The | |
65 | ELF definition is no real help here since it has no direct | |
66 | knowledge of DWARF (by design, so any debugging format can be | |
67 | used). | |
68 | ||
69 | We also recognize the ".stab" sections used by the Sun compilers | |
70 | released with Solaris 2. | |
71 | ||
72 | FIXME: The section names should not be hardwired strings (what | |
73 | should they be? I don't think most object file formats have enough | |
74 | section flags to specify what kind of debug section it is | |
75 | -kingdon). */ | |
76 | ||
77 | static void | |
12b9c64f | 78 | elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip) |
c906108c | 79 | { |
52f0bd74 | 80 | struct elfinfo *ei; |
c906108c SS |
81 | |
82 | ei = (struct elfinfo *) eip; | |
6314a349 | 83 | if (strcmp (sectp->name, ".debug") == 0) |
c906108c | 84 | { |
c5aa993b JM |
85 | ei->dboffset = sectp->filepos; |
86 | ei->dbsize = bfd_get_section_size_before_reloc (sectp); | |
c906108c | 87 | } |
6314a349 | 88 | else if (strcmp (sectp->name, ".line") == 0) |
c906108c | 89 | { |
c5aa993b JM |
90 | ei->lnoffset = sectp->filepos; |
91 | ei->lnsize = bfd_get_section_size_before_reloc (sectp); | |
c906108c | 92 | } |
6314a349 | 93 | else if (strcmp (sectp->name, ".stab") == 0) |
c906108c | 94 | { |
c5aa993b | 95 | ei->stabsect = sectp; |
c906108c | 96 | } |
6314a349 | 97 | else if (strcmp (sectp->name, ".stab.index") == 0) |
c906108c | 98 | { |
c5aa993b | 99 | ei->stabindexsect = sectp; |
c906108c | 100 | } |
6314a349 | 101 | else if (strcmp (sectp->name, ".mdebug") == 0) |
c906108c | 102 | { |
c5aa993b | 103 | ei->mdebugsect = sectp; |
c906108c SS |
104 | } |
105 | } | |
106 | ||
c906108c | 107 | static struct minimal_symbol * |
f594e5e9 MC |
108 | record_minimal_symbol (char *name, CORE_ADDR address, |
109 | enum minimal_symbol_type ms_type, | |
110 | asection *bfd_section, struct objfile *objfile) | |
c906108c | 111 | { |
bbeae047 | 112 | if (ms_type == mst_text || ms_type == mst_file_text) |
181c1381 | 113 | address = SMASH_TEXT_ADDRESS (address); |
c906108c SS |
114 | |
115 | return prim_record_minimal_symbol_and_info | |
f594e5e9 | 116 | (name, address, ms_type, NULL, bfd_section->index, bfd_section, objfile); |
c906108c SS |
117 | } |
118 | ||
119 | /* | |
120 | ||
c5aa993b | 121 | LOCAL FUNCTION |
c906108c | 122 | |
c5aa993b | 123 | elf_symtab_read -- read the symbol table of an ELF file |
c906108c | 124 | |
c5aa993b | 125 | SYNOPSIS |
c906108c | 126 | |
d4f3574e | 127 | void elf_symtab_read (struct objfile *objfile, int dynamic) |
c906108c | 128 | |
c5aa993b | 129 | DESCRIPTION |
c906108c | 130 | |
d4f3574e SS |
131 | Given an objfile and a flag that specifies whether or not the objfile |
132 | is for an executable or not (may be shared library for example), add | |
133 | all the global function and data symbols to the minimal symbol table. | |
c906108c | 134 | |
c5aa993b JM |
135 | In stabs-in-ELF, as implemented by Sun, there are some local symbols |
136 | defined in the ELF symbol table, which can be used to locate | |
137 | the beginnings of sections from each ".o" file that was linked to | |
138 | form the executable objfile. We gather any such info and record it | |
139 | in data structures hung off the objfile's private data. | |
c906108c | 140 | |
c5aa993b | 141 | */ |
c906108c SS |
142 | |
143 | static void | |
fba45db2 | 144 | elf_symtab_read (struct objfile *objfile, int dynamic) |
c906108c SS |
145 | { |
146 | long storage_needed; | |
147 | asymbol *sym; | |
148 | asymbol **symbol_table; | |
149 | long number_of_symbols; | |
150 | long i; | |
c906108c SS |
151 | struct cleanup *back_to; |
152 | CORE_ADDR symaddr; | |
d4f3574e | 153 | CORE_ADDR offset; |
c906108c SS |
154 | enum minimal_symbol_type ms_type; |
155 | /* If sectinfo is nonNULL, it contains section info that should end up | |
156 | filed in the objfile. */ | |
157 | struct stab_section_info *sectinfo = NULL; | |
158 | /* If filesym is nonzero, it points to a file symbol, but we haven't | |
159 | seen any section info for it yet. */ | |
160 | asymbol *filesym = 0; | |
161 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
162 | /* Name of filesym, as saved on the symbol_obstack. */ | |
163 | char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack); | |
164 | #endif | |
165 | struct dbx_symfile_info *dbx = objfile->sym_stab_info; | |
d4f3574e | 166 | int stripped = (bfd_get_symcount (objfile->obfd) == 0); |
c5aa993b | 167 | |
c906108c SS |
168 | if (dynamic) |
169 | { | |
d4f3574e | 170 | storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd); |
c906108c SS |
171 | |
172 | /* Nothing to be done if there is no dynamic symtab. */ | |
173 | if (storage_needed < 0) | |
174 | return; | |
175 | } | |
176 | else | |
177 | { | |
d4f3574e | 178 | storage_needed = bfd_get_symtab_upper_bound (objfile->obfd); |
c906108c | 179 | if (storage_needed < 0) |
d4f3574e | 180 | error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd), |
c906108c SS |
181 | bfd_errmsg (bfd_get_error ())); |
182 | } | |
183 | if (storage_needed > 0) | |
184 | { | |
185 | symbol_table = (asymbol **) xmalloc (storage_needed); | |
b8c9b27d | 186 | back_to = make_cleanup (xfree, symbol_table); |
c906108c | 187 | if (dynamic) |
d4f3574e | 188 | number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd, |
c906108c SS |
189 | symbol_table); |
190 | else | |
d4f3574e | 191 | number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table); |
c906108c | 192 | if (number_of_symbols < 0) |
d4f3574e | 193 | error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd), |
c906108c | 194 | bfd_errmsg (bfd_get_error ())); |
b8d39351 | 195 | |
c906108c SS |
196 | for (i = 0; i < number_of_symbols; i++) |
197 | { | |
198 | sym = symbol_table[i]; | |
c5aa993b | 199 | if (sym->name == NULL || *sym->name == '\0') |
c906108c SS |
200 | { |
201 | /* Skip names that don't exist (shouldn't happen), or names | |
c5aa993b | 202 | that are null strings (may happen). */ |
c906108c SS |
203 | continue; |
204 | } | |
205 | ||
b8d39351 | 206 | offset = ANOFFSET (objfile->section_offsets, sym->section->index); |
c906108c | 207 | if (dynamic |
c5aa993b JM |
208 | && sym->section == &bfd_und_section |
209 | && (sym->flags & BSF_FUNCTION)) | |
c906108c SS |
210 | { |
211 | struct minimal_symbol *msym; | |
212 | ||
213 | /* Symbol is a reference to a function defined in | |
c5aa993b JM |
214 | a shared library. |
215 | If its value is non zero then it is usually the address | |
216 | of the corresponding entry in the procedure linkage table, | |
d4f3574e | 217 | plus the desired section offset. |
c5aa993b JM |
218 | If its value is zero then the dynamic linker has to resolve |
219 | the symbol. We are unable to find any meaningful address | |
220 | for this symbol in the executable file, so we skip it. */ | |
221 | symaddr = sym->value; | |
c906108c SS |
222 | if (symaddr == 0) |
223 | continue; | |
d4f3574e | 224 | symaddr += offset; |
f594e5e9 | 225 | msym = record_minimal_symbol |
c5aa993b | 226 | ((char *) sym->name, symaddr, |
f594e5e9 | 227 | mst_solib_trampoline, sym->section, objfile); |
c906108c SS |
228 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
229 | if (msym != NULL) | |
230 | msym->filename = filesymname; | |
231 | #endif | |
232 | continue; | |
233 | } | |
234 | ||
235 | /* If it is a nonstripped executable, do not enter dynamic | |
236 | symbols, as the dynamic symbol table is usually a subset | |
237 | of the main symbol table. */ | |
238 | if (dynamic && !stripped) | |
239 | continue; | |
c5aa993b | 240 | if (sym->flags & BSF_FILE) |
c906108c SS |
241 | { |
242 | /* STT_FILE debugging symbol that helps stabs-in-elf debugging. | |
c5aa993b | 243 | Chain any old one onto the objfile; remember new sym. */ |
c906108c SS |
244 | if (sectinfo != NULL) |
245 | { | |
c5aa993b JM |
246 | sectinfo->next = dbx->stab_section_info; |
247 | dbx->stab_section_info = sectinfo; | |
c906108c SS |
248 | sectinfo = NULL; |
249 | } | |
250 | filesym = sym; | |
251 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
252 | filesymname = | |
c5aa993b | 253 | obsavestring ((char *) filesym->name, strlen (filesym->name), |
c906108c SS |
254 | &objfile->symbol_obstack); |
255 | #endif | |
256 | } | |
c5aa993b | 257 | else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK)) |
c906108c SS |
258 | { |
259 | struct minimal_symbol *msym; | |
260 | ||
261 | /* Select global/local/weak symbols. Note that bfd puts abs | |
c5aa993b JM |
262 | symbols in their own section, so all symbols we are |
263 | interested in will have a section. */ | |
c906108c | 264 | /* Bfd symbols are section relative. */ |
c5aa993b | 265 | symaddr = sym->value + sym->section->vma; |
d4f3574e | 266 | /* Relocate all non-absolute symbols by the section offset. */ |
c5aa993b | 267 | if (sym->section != &bfd_abs_section) |
c906108c | 268 | { |
d4f3574e | 269 | symaddr += offset; |
c906108c SS |
270 | } |
271 | /* For non-absolute symbols, use the type of the section | |
c5aa993b JM |
272 | they are relative to, to intuit text/data. Bfd provides |
273 | no way of figuring this out for absolute symbols. */ | |
274 | if (sym->section == &bfd_abs_section) | |
c906108c SS |
275 | { |
276 | /* This is a hack to get the minimal symbol type | |
11cf8741 | 277 | right for Irix 5, which has absolute addresses |
c906108c SS |
278 | with special section indices for dynamic symbols. */ |
279 | unsigned short shndx = | |
c5aa993b | 280 | ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx; |
c906108c SS |
281 | |
282 | switch (shndx) | |
283 | { | |
284 | case SHN_MIPS_TEXT: | |
285 | ms_type = mst_text; | |
286 | break; | |
287 | case SHN_MIPS_DATA: | |
288 | ms_type = mst_data; | |
289 | break; | |
290 | case SHN_MIPS_ACOMMON: | |
291 | ms_type = mst_bss; | |
292 | break; | |
293 | default: | |
294 | ms_type = mst_abs; | |
295 | } | |
296 | ||
297 | /* If it is an Irix dynamic symbol, skip section name | |
d4f3574e | 298 | symbols, relocate all others by section offset. */ |
c906108c SS |
299 | if (ms_type != mst_abs) |
300 | { | |
301 | if (sym->name[0] == '.') | |
302 | continue; | |
d4f3574e | 303 | symaddr += offset; |
c906108c SS |
304 | } |
305 | } | |
c5aa993b | 306 | else if (sym->section->flags & SEC_CODE) |
c906108c | 307 | { |
389e51db | 308 | if (sym->flags & BSF_GLOBAL) |
c906108c SS |
309 | { |
310 | ms_type = mst_text; | |
311 | } | |
312 | else if ((sym->name[0] == '.' && sym->name[1] == 'L') | |
c5aa993b | 313 | || ((sym->flags & BSF_LOCAL) |
c906108c SS |
314 | && sym->name[0] == '$' |
315 | && sym->name[1] == 'L')) | |
7fb623f7 AC |
316 | /* Looks like a compiler-generated label. Skip |
317 | it. The assembler should be skipping these (to | |
318 | keep executables small), but apparently with | |
1b831c93 AC |
319 | gcc on the (deleted) delta m88k SVR4, it loses. |
320 | So to have us check too should be harmless (but | |
321 | I encourage people to fix this in the assembler | |
322 | instead of adding checks here). */ | |
c906108c | 323 | continue; |
c906108c SS |
324 | else |
325 | { | |
326 | ms_type = mst_file_text; | |
327 | } | |
328 | } | |
c5aa993b | 329 | else if (sym->section->flags & SEC_ALLOC) |
c906108c | 330 | { |
bbeae047 | 331 | if (sym->flags & (BSF_GLOBAL | BSF_WEAK)) |
c906108c | 332 | { |
c5aa993b | 333 | if (sym->section->flags & SEC_LOAD) |
c906108c SS |
334 | { |
335 | ms_type = mst_data; | |
336 | } | |
337 | else | |
338 | { | |
339 | ms_type = mst_bss; | |
340 | } | |
341 | } | |
c5aa993b | 342 | else if (sym->flags & BSF_LOCAL) |
c906108c | 343 | { |
9a90a780 AC |
344 | /* Named Local variable in a Data section. |
345 | Check its name for stabs-in-elf. The STREQ | |
346 | macro checks the first character inline, so | |
347 | we only actually do a strcmp function call on | |
348 | names that start with 'B' or 'D'. */ | |
349 | int special_local_sect; | |
350 | if (strcmp ("Bbss.bss", sym->name) == 0) | |
351 | special_local_sect = SECT_OFF_BSS (objfile); | |
352 | else if (strcmp ("Ddata.data", sym->name) == 0) | |
353 | special_local_sect = SECT_OFF_DATA (objfile); | |
354 | else if (strcmp ("Drodata.rodata", sym->name) == 0) | |
355 | special_local_sect = SECT_OFF_RODATA (objfile); | |
356 | else | |
357 | special_local_sect = -1; | |
358 | if (special_local_sect >= 0) | |
c906108c SS |
359 | { |
360 | /* Found a special local symbol. Allocate a | |
361 | sectinfo, if needed, and fill it in. */ | |
362 | if (sectinfo == NULL) | |
363 | { | |
a39a16c4 MM |
364 | int max_index; |
365 | size_t size; | |
366 | ||
367 | max_index | |
368 | = max (SECT_OFF_BSS (objfile), | |
369 | max (SECT_OFF_DATA (objfile), | |
370 | SECT_OFF_RODATA (objfile))); | |
e372db49 JB |
371 | |
372 | /* max_index is the largest index we'll | |
373 | use into this array, so we must | |
374 | allocate max_index+1 elements for it. | |
375 | However, 'struct stab_section_info' | |
376 | already includes one element, so we | |
377 | need to allocate max_index aadditional | |
378 | elements. */ | |
a39a16c4 MM |
379 | size = (sizeof (struct stab_section_info) |
380 | + (sizeof (CORE_ADDR) | |
e372db49 | 381 | * max_index)); |
c906108c | 382 | sectinfo = (struct stab_section_info *) |
a39a16c4 MM |
383 | xmmalloc (objfile->md, size); |
384 | memset (sectinfo, 0, size); | |
385 | sectinfo->num_sections = max_index; | |
c906108c SS |
386 | if (filesym == NULL) |
387 | { | |
23136709 KB |
388 | complaint (&symfile_complaints, |
389 | "elf/stab section information %s without a preceding file symbol", | |
390 | sym->name); | |
c906108c SS |
391 | } |
392 | else | |
393 | { | |
c5aa993b JM |
394 | sectinfo->filename = |
395 | (char *) filesym->name; | |
c906108c SS |
396 | } |
397 | } | |
9a90a780 AC |
398 | if (sectinfo->sections[special_local_sect] != 0) |
399 | complaint (&symfile_complaints, | |
400 | "duplicated elf/stab section information for %s", | |
401 | sectinfo->filename); | |
402 | /* BFD symbols are section relative. */ | |
c5aa993b | 403 | symaddr = sym->value + sym->section->vma; |
9a90a780 AC |
404 | /* Relocate non-absolute symbols by the |
405 | section offset. */ | |
c5aa993b | 406 | if (sym->section != &bfd_abs_section) |
9a90a780 AC |
407 | symaddr += offset; |
408 | sectinfo->sections[special_local_sect] = symaddr; | |
c906108c | 409 | /* The special local symbols don't go in the |
9a90a780 | 410 | minimal symbol table, so ignore this one. */ |
c906108c SS |
411 | continue; |
412 | } | |
413 | /* Not a special stabs-in-elf symbol, do regular | |
9a90a780 | 414 | symbol processing. */ |
c5aa993b | 415 | if (sym->section->flags & SEC_LOAD) |
c906108c SS |
416 | { |
417 | ms_type = mst_file_data; | |
418 | } | |
419 | else | |
420 | { | |
421 | ms_type = mst_file_bss; | |
422 | } | |
423 | } | |
424 | else | |
425 | { | |
426 | ms_type = mst_unknown; | |
427 | } | |
428 | } | |
429 | else | |
430 | { | |
431 | /* FIXME: Solaris2 shared libraries include lots of | |
432 | odd "absolute" and "undefined" symbols, that play | |
433 | hob with actions like finding what function the PC | |
434 | is in. Ignore them if they aren't text, data, or bss. */ | |
435 | /* ms_type = mst_unknown; */ | |
c5aa993b | 436 | continue; /* Skip this symbol. */ |
c906108c | 437 | } |
f594e5e9 | 438 | msym = record_minimal_symbol |
c5aa993b | 439 | ((char *) sym->name, symaddr, |
f594e5e9 MC |
440 | ms_type, sym->section, objfile); |
441 | if (msym) | |
442 | { | |
443 | /* Pass symbol size field in via BFD. FIXME!!! */ | |
444 | unsigned long size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size; | |
445 | MSYMBOL_SIZE(msym) = size; | |
446 | } | |
c906108c SS |
447 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
448 | if (msym != NULL) | |
449 | msym->filename = filesymname; | |
450 | #endif | |
c5aa993b | 451 | ELF_MAKE_MSYMBOL_SPECIAL (sym, msym); |
c906108c SS |
452 | } |
453 | } | |
454 | do_cleanups (back_to); | |
455 | } | |
456 | } | |
457 | ||
458 | /* Scan and build partial symbols for a symbol file. | |
459 | We have been initialized by a call to elf_symfile_init, which | |
460 | currently does nothing. | |
461 | ||
462 | SECTION_OFFSETS is a set of offsets to apply to relocate the symbols | |
463 | in each section. We simplify it down to a single offset for all | |
464 | symbols. FIXME. | |
465 | ||
466 | MAINLINE is true if we are reading the main symbol | |
467 | table (as opposed to a shared lib or dynamically loaded file). | |
468 | ||
469 | This function only does the minimum work necessary for letting the | |
470 | user "name" things symbolically; it does not read the entire symtab. | |
471 | Instead, it reads the external and static symbols and puts them in partial | |
472 | symbol tables. When more extensive information is requested of a | |
473 | file, the corresponding partial symbol table is mutated into a full | |
474 | fledged symbol table by going back and reading the symbols | |
475 | for real. | |
476 | ||
477 | We look for sections with specific names, to tell us what debug | |
478 | format to look for: FIXME!!! | |
479 | ||
480 | dwarf_build_psymtabs() builds psymtabs for DWARF symbols; | |
481 | elfstab_build_psymtabs() handles STABS symbols; | |
482 | mdebug_build_psymtabs() handles ECOFF debugging information. | |
483 | ||
484 | Note that ELF files have a "minimal" symbol table, which looks a lot | |
485 | like a COFF symbol table, but has only the minimal information necessary | |
486 | for linking. We process this also, and use the information to | |
487 | build gdb's minimal symbol table. This gives us some minimal debugging | |
488 | capability even for files compiled without -g. */ | |
489 | ||
490 | static void | |
fba45db2 | 491 | elf_symfile_read (struct objfile *objfile, int mainline) |
c906108c SS |
492 | { |
493 | bfd *abfd = objfile->obfd; | |
494 | struct elfinfo ei; | |
495 | struct cleanup *back_to; | |
496 | CORE_ADDR offset; | |
497 | ||
498 | init_minimal_symbol_collection (); | |
56e290f4 | 499 | back_to = make_cleanup_discard_minimal_symbols (); |
c906108c SS |
500 | |
501 | memset ((char *) &ei, 0, sizeof (ei)); | |
502 | ||
503 | /* Allocate struct to keep track of the symfile */ | |
504 | objfile->sym_stab_info = (struct dbx_symfile_info *) | |
c5aa993b | 505 | xmmalloc (objfile->md, sizeof (struct dbx_symfile_info)); |
c906108c | 506 | memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info)); |
12b9c64f | 507 | make_cleanup (free_elfinfo, (void *) objfile); |
c906108c SS |
508 | |
509 | /* Process the normal ELF symbol table first. This may write some | |
510 | chain of info into the dbx_symfile_info in objfile->sym_stab_info, | |
511 | which can later be used by elfstab_offset_sections. */ | |
512 | ||
d4f3574e | 513 | elf_symtab_read (objfile, 0); |
c906108c SS |
514 | |
515 | /* Add the dynamic symbols. */ | |
516 | ||
d4f3574e | 517 | elf_symtab_read (objfile, 1); |
c906108c | 518 | |
7134143f DJ |
519 | /* Install any minimal symbols that have been collected as the current |
520 | minimal symbols for this objfile. The debug readers below this point | |
521 | should not generate new minimal symbols; if they do it's their | |
522 | responsibility to install them. "mdebug" appears to be the only one | |
523 | which will do this. */ | |
524 | ||
525 | install_minimal_symbols (objfile); | |
526 | do_cleanups (back_to); | |
527 | ||
c906108c SS |
528 | /* Now process debugging information, which is contained in |
529 | special ELF sections. */ | |
530 | ||
531 | /* If we are reinitializing, or if we have never loaded syms yet, | |
532 | set table to empty. MAINLINE is cleared so that *_read_psymtab | |
533 | functions do not all also re-initialize the psymbol table. */ | |
534 | if (mainline) | |
535 | { | |
536 | init_psymbol_list (objfile, 0); | |
537 | mainline = 0; | |
538 | } | |
539 | ||
540 | /* We first have to find them... */ | |
12b9c64f | 541 | bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei); |
c906108c SS |
542 | |
543 | /* ELF debugging information is inserted into the psymtab in the | |
544 | order of least informative first - most informative last. Since | |
545 | the psymtab table is searched `most recent insertion first' this | |
546 | increases the probability that more detailed debug information | |
547 | for a section is found. | |
548 | ||
549 | For instance, an object file might contain both .mdebug (XCOFF) | |
550 | and .debug_info (DWARF2) sections then .mdebug is inserted first | |
551 | (searched last) and DWARF2 is inserted last (searched first). If | |
552 | we don't do this then the XCOFF info is found first - for code in | |
553 | an included file XCOFF info is useless. */ | |
554 | ||
555 | if (ei.mdebugsect) | |
556 | { | |
557 | const struct ecoff_debug_swap *swap; | |
558 | ||
559 | /* .mdebug section, presumably holding ECOFF debugging | |
c5aa993b | 560 | information. */ |
c906108c SS |
561 | swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; |
562 | if (swap) | |
d4f3574e | 563 | elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect); |
c906108c SS |
564 | } |
565 | if (ei.stabsect) | |
566 | { | |
567 | asection *str_sect; | |
568 | ||
569 | /* Stab sections have an associated string table that looks like | |
c5aa993b | 570 | a separate section. */ |
c906108c SS |
571 | str_sect = bfd_get_section_by_name (abfd, ".stabstr"); |
572 | ||
573 | /* FIXME should probably warn about a stab section without a stabstr. */ | |
574 | if (str_sect) | |
575 | elfstab_build_psymtabs (objfile, | |
c906108c | 576 | mainline, |
086df311 | 577 | ei.stabsect, |
c906108c SS |
578 | str_sect->filepos, |
579 | bfd_section_size (abfd, str_sect)); | |
580 | } | |
581 | if (dwarf2_has_info (abfd)) | |
582 | { | |
583 | /* DWARF 2 sections */ | |
d4f3574e | 584 | dwarf2_build_psymtabs (objfile, mainline); |
c906108c SS |
585 | } |
586 | else if (ei.dboffset && ei.lnoffset) | |
587 | { | |
588 | /* DWARF sections */ | |
589 | dwarf_build_psymtabs (objfile, | |
d4f3574e | 590 | mainline, |
c906108c SS |
591 | ei.dboffset, ei.dbsize, |
592 | ei.lnoffset, ei.lnsize); | |
593 | } | |
594 | ||
625b0b97 AC |
595 | /* FIXME: kettenis/20030504: This still needs to be integrated with |
596 | dwarf2read.c in a better way. */ | |
597 | dwarf2_build_frame_info (objfile); | |
c906108c SS |
598 | } |
599 | ||
600 | /* This cleans up the objfile's sym_stab_info pointer, and the chain of | |
601 | stab_section_info's, that might be dangling from it. */ | |
602 | ||
603 | static void | |
12b9c64f | 604 | free_elfinfo (void *objp) |
c906108c | 605 | { |
c5aa993b | 606 | struct objfile *objfile = (struct objfile *) objp; |
c906108c SS |
607 | struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info; |
608 | struct stab_section_info *ssi, *nssi; | |
609 | ||
610 | ssi = dbxinfo->stab_section_info; | |
611 | while (ssi) | |
612 | { | |
613 | nssi = ssi->next; | |
aac7f4ea | 614 | xmfree (objfile->md, ssi); |
c906108c SS |
615 | ssi = nssi; |
616 | } | |
617 | ||
618 | dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */ | |
619 | } | |
620 | ||
621 | ||
622 | /* Initialize anything that needs initializing when a completely new symbol | |
623 | file is specified (not just adding some symbols from another file, e.g. a | |
624 | shared library). | |
625 | ||
626 | We reinitialize buildsym, since we may be reading stabs from an ELF file. */ | |
627 | ||
628 | static void | |
fba45db2 | 629 | elf_new_init (struct objfile *ignore) |
c906108c SS |
630 | { |
631 | stabsread_new_init (); | |
632 | buildsym_new_init (); | |
633 | } | |
634 | ||
635 | /* Perform any local cleanups required when we are done with a particular | |
636 | objfile. I.E, we are in the process of discarding all symbol information | |
637 | for an objfile, freeing up all memory held for it, and unlinking the | |
638 | objfile struct from the global list of known objfiles. */ | |
639 | ||
640 | static void | |
fba45db2 | 641 | elf_symfile_finish (struct objfile *objfile) |
c906108c | 642 | { |
c5aa993b | 643 | if (objfile->sym_stab_info != NULL) |
c906108c | 644 | { |
aac7f4ea | 645 | xmfree (objfile->md, objfile->sym_stab_info); |
c906108c SS |
646 | } |
647 | } | |
648 | ||
649 | /* ELF specific initialization routine for reading symbols. | |
650 | ||
651 | It is passed a pointer to a struct sym_fns which contains, among other | |
652 | things, the BFD for the file whose symbols are being read, and a slot for | |
653 | a pointer to "private data" which we can fill with goodies. | |
654 | ||
655 | For now at least, we have nothing in particular to do, so this function is | |
656 | just a stub. */ | |
657 | ||
658 | static void | |
fba45db2 | 659 | elf_symfile_init (struct objfile *objfile) |
c906108c SS |
660 | { |
661 | /* ELF objects may be reordered, so set OBJF_REORDERED. If we | |
662 | find this causes a significant slowdown in gdb then we could | |
663 | set it in the debug symbol readers only when necessary. */ | |
664 | objfile->flags |= OBJF_REORDERED; | |
665 | } | |
666 | ||
667 | /* When handling an ELF file that contains Sun STABS debug info, | |
668 | some of the debug info is relative to the particular chunk of the | |
669 | section that was generated in its individual .o file. E.g. | |
670 | offsets to static variables are relative to the start of the data | |
671 | segment *for that module before linking*. This information is | |
672 | painfully squirreled away in the ELF symbol table as local symbols | |
673 | with wierd names. Go get 'em when needed. */ | |
674 | ||
675 | void | |
fba45db2 | 676 | elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst) |
c906108c SS |
677 | { |
678 | char *filename = pst->filename; | |
679 | struct dbx_symfile_info *dbx = objfile->sym_stab_info; | |
680 | struct stab_section_info *maybe = dbx->stab_section_info; | |
681 | struct stab_section_info *questionable = 0; | |
682 | int i; | |
683 | char *p; | |
684 | ||
685 | /* The ELF symbol info doesn't include path names, so strip the path | |
686 | (if any) from the psymtab filename. */ | |
687 | while (0 != (p = strchr (filename, '/'))) | |
c5aa993b | 688 | filename = p + 1; |
c906108c SS |
689 | |
690 | /* FIXME: This linear search could speed up significantly | |
691 | if it was chained in the right order to match how we search it, | |
692 | and if we unchained when we found a match. */ | |
693 | for (; maybe; maybe = maybe->next) | |
694 | { | |
695 | if (filename[0] == maybe->filename[0] | |
6314a349 | 696 | && strcmp (filename, maybe->filename) == 0) |
c906108c SS |
697 | { |
698 | /* We found a match. But there might be several source files | |
699 | (from different directories) with the same name. */ | |
700 | if (0 == maybe->found) | |
701 | break; | |
c5aa993b | 702 | questionable = maybe; /* Might use it later. */ |
c906108c SS |
703 | } |
704 | } | |
705 | ||
706 | if (maybe == 0 && questionable != 0) | |
707 | { | |
23136709 KB |
708 | complaint (&symfile_complaints, |
709 | "elf/stab section information questionable for %s", filename); | |
c906108c SS |
710 | maybe = questionable; |
711 | } | |
712 | ||
713 | if (maybe) | |
714 | { | |
715 | /* Found it! Allocate a new psymtab struct, and fill it in. */ | |
716 | maybe->found++; | |
717 | pst->section_offsets = (struct section_offsets *) | |
a39a16c4 MM |
718 | obstack_alloc (&objfile->psymbol_obstack, |
719 | SIZEOF_N_SECTION_OFFSETS (objfile->num_sections)); | |
720 | for (i = 0; i < maybe->num_sections; i++) | |
a4c8257b | 721 | (pst->section_offsets)->offsets[i] = maybe->sections[i]; |
c906108c SS |
722 | return; |
723 | } | |
724 | ||
725 | /* We were unable to find any offsets for this file. Complain. */ | |
c5aa993b | 726 | if (dbx->stab_section_info) /* If there *is* any info, */ |
23136709 KB |
727 | complaint (&symfile_complaints, |
728 | "elf/stab section information missing for %s", filename); | |
c906108c SS |
729 | } |
730 | \f | |
731 | /* Register that we are able to handle ELF object file formats. */ | |
732 | ||
733 | static struct sym_fns elf_sym_fns = | |
734 | { | |
735 | bfd_target_elf_flavour, | |
c5aa993b JM |
736 | elf_new_init, /* sym_new_init: init anything gbl to entire symtab */ |
737 | elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */ | |
738 | elf_symfile_read, /* sym_read: read a symbol file into symtab */ | |
739 | elf_symfile_finish, /* sym_finish: finished with file, cleanup */ | |
96baa820 | 740 | default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */ |
c5aa993b | 741 | NULL /* next: pointer to next struct sym_fns */ |
c906108c SS |
742 | }; |
743 | ||
744 | void | |
fba45db2 | 745 | _initialize_elfread (void) |
c906108c SS |
746 | { |
747 | add_symtab_fns (&elf_sym_fns); | |
748 | } |