* objfiles.h (struct objfile): New GDBARCH member.
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b 2
6aba47ca 3 Copyright (C) 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
9b254dd1
DJ
4 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008
5 Free Software Foundation, Inc.
1bac305b 6
c906108c
SS
7 Written by Fred Fish at Cygnus Support.
8
c5aa993b 9 This file is part of GDB.
c906108c 10
c5aa993b
JM
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
a9762ec7 13 the Free Software Foundation; either version 3 of the License, or
c5aa993b 14 (at your option) any later version.
c906108c 15
c5aa993b
JM
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
c906108c 20
c5aa993b 21 You should have received a copy of the GNU General Public License
a9762ec7 22 along with this program. If not, see <http://www.gnu.org/licenses/>. */
c906108c
SS
23
24#include "defs.h"
25#include "bfd.h"
26#include "gdb_string.h"
27#include "elf-bfd.h"
31d99776
DJ
28#include "elf/common.h"
29#include "elf/internal.h"
c906108c
SS
30#include "elf/mips.h"
31#include "symtab.h"
32#include "symfile.h"
33#include "objfiles.h"
34#include "buildsym.h"
35#include "stabsread.h"
36#include "gdb-stabs.h"
37#include "complaints.h"
38#include "demangle.h"
39
a14ed312 40extern void _initialize_elfread (void);
392a587b 41
c906108c 42/* The struct elfinfo is available only during ELF symbol table and
6426a772 43 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
44 It's local to elf_symfile_read. */
45
c5aa993b
JM
46struct elfinfo
47 {
c5aa993b
JM
48 asection *stabsect; /* Section pointer for .stab section */
49 asection *stabindexsect; /* Section pointer for .stab.index section */
50 asection *mdebugsect; /* Section pointer for .mdebug section */
51 };
c906108c 52
12b9c64f 53static void free_elfinfo (void *);
c906108c 54
31d99776
DJ
55/* Locate the segments in ABFD. */
56
57static struct symfile_segment_data *
58elf_symfile_segments (bfd *abfd)
59{
60 Elf_Internal_Phdr *phdrs, **segments;
61 long phdrs_size;
62 int num_phdrs, num_segments, num_sections, i;
63 asection *sect;
64 struct symfile_segment_data *data;
65
66 phdrs_size = bfd_get_elf_phdr_upper_bound (abfd);
67 if (phdrs_size == -1)
68 return NULL;
69
70 phdrs = alloca (phdrs_size);
71 num_phdrs = bfd_get_elf_phdrs (abfd, phdrs);
72 if (num_phdrs == -1)
73 return NULL;
74
75 num_segments = 0;
76 segments = alloca (sizeof (Elf_Internal_Phdr *) * num_phdrs);
77 for (i = 0; i < num_phdrs; i++)
78 if (phdrs[i].p_type == PT_LOAD)
79 segments[num_segments++] = &phdrs[i];
80
81 if (num_segments == 0)
82 return NULL;
83
84 data = XZALLOC (struct symfile_segment_data);
85 data->num_segments = num_segments;
86 data->segment_bases = XCALLOC (num_segments, CORE_ADDR);
87 data->segment_sizes = XCALLOC (num_segments, CORE_ADDR);
88
89 for (i = 0; i < num_segments; i++)
90 {
91 data->segment_bases[i] = segments[i]->p_vaddr;
92 data->segment_sizes[i] = segments[i]->p_memsz;
93 }
94
95 num_sections = bfd_count_sections (abfd);
96 data->segment_info = XCALLOC (num_sections, int);
97
98 for (i = 0, sect = abfd->sections; sect != NULL; i++, sect = sect->next)
99 {
100 int j;
101 CORE_ADDR vma;
102
103 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
104 continue;
105
106 vma = bfd_get_section_vma (abfd, sect);
107
108 for (j = 0; j < num_segments; j++)
109 if (segments[j]->p_memsz > 0
110 && vma >= segments[j]->p_vaddr
111 && vma < segments[j]->p_vaddr + segments[j]->p_memsz)
112 {
113 data->segment_info[i] = j + 1;
114 break;
115 }
116
117 if (bfd_get_section_size (sect) > 0 && j == num_segments)
118 warning (_("Loadable segment \"%s\" outside of ELF segments"),
119 bfd_section_name (abfd, sect));
120 }
121
122 return data;
123}
124
c906108c
SS
125/* We are called once per section from elf_symfile_read. We
126 need to examine each section we are passed, check to see
127 if it is something we are interested in processing, and
128 if so, stash away some access information for the section.
129
130 For now we recognize the dwarf debug information sections and
131 line number sections from matching their section names. The
132 ELF definition is no real help here since it has no direct
133 knowledge of DWARF (by design, so any debugging format can be
134 used).
135
136 We also recognize the ".stab" sections used by the Sun compilers
137 released with Solaris 2.
138
139 FIXME: The section names should not be hardwired strings (what
140 should they be? I don't think most object file formats have enough
141 section flags to specify what kind of debug section it is
142 -kingdon). */
143
144static void
12b9c64f 145elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 146{
52f0bd74 147 struct elfinfo *ei;
c906108c
SS
148
149 ei = (struct elfinfo *) eip;
7ce59000 150 if (strcmp (sectp->name, ".stab") == 0)
c906108c 151 {
c5aa993b 152 ei->stabsect = sectp;
c906108c 153 }
6314a349 154 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 155 {
c5aa993b 156 ei->stabindexsect = sectp;
c906108c 157 }
6314a349 158 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 159 {
c5aa993b 160 ei->mdebugsect = sectp;
c906108c
SS
161 }
162}
163
c906108c 164static struct minimal_symbol *
f594e5e9
MC
165record_minimal_symbol (char *name, CORE_ADDR address,
166 enum minimal_symbol_type ms_type,
167 asection *bfd_section, struct objfile *objfile)
c906108c 168{
5e2b427d
UW
169 struct gdbarch *gdbarch = get_objfile_arch (objfile);
170
bbeae047 171 if (ms_type == mst_text || ms_type == mst_file_text)
5e2b427d 172 address = gdbarch_smash_text_address (gdbarch, address);
c906108c
SS
173
174 return prim_record_minimal_symbol_and_info
f594e5e9 175 (name, address, ms_type, NULL, bfd_section->index, bfd_section, objfile);
c906108c
SS
176}
177
178/*
179
c5aa993b 180 LOCAL FUNCTION
c906108c 181
c5aa993b 182 elf_symtab_read -- read the symbol table of an ELF file
c906108c 183
c5aa993b 184 SYNOPSIS
c906108c 185
6f610d07 186 void elf_symtab_read (struct objfile *objfile, int type,
62553543 187 long number_of_symbols, asymbol **symbol_table)
c906108c 188
c5aa993b 189 DESCRIPTION
c906108c 190
62553543 191 Given an objfile, a symbol table, and a flag indicating whether the
6f610d07
UW
192 symbol table contains regular, dynamic, or synthetic symbols, add all
193 the global function and data symbols to the minimal symbol table.
c906108c 194
c5aa993b
JM
195 In stabs-in-ELF, as implemented by Sun, there are some local symbols
196 defined in the ELF symbol table, which can be used to locate
197 the beginnings of sections from each ".o" file that was linked to
198 form the executable objfile. We gather any such info and record it
199 in data structures hung off the objfile's private data.
c906108c 200
c5aa993b 201 */
c906108c 202
6f610d07
UW
203#define ST_REGULAR 0
204#define ST_DYNAMIC 1
205#define ST_SYNTHETIC 2
206
c906108c 207static void
6f610d07 208elf_symtab_read (struct objfile *objfile, int type,
62553543 209 long number_of_symbols, asymbol **symbol_table)
c906108c 210{
5e2b427d 211 struct gdbarch *gdbarch = get_objfile_arch (objfile);
c906108c
SS
212 long storage_needed;
213 asymbol *sym;
c906108c 214 long i;
c906108c 215 CORE_ADDR symaddr;
d4f3574e 216 CORE_ADDR offset;
c906108c
SS
217 enum minimal_symbol_type ms_type;
218 /* If sectinfo is nonNULL, it contains section info that should end up
219 filed in the objfile. */
220 struct stab_section_info *sectinfo = NULL;
221 /* If filesym is nonzero, it points to a file symbol, but we haven't
222 seen any section info for it yet. */
223 asymbol *filesym = 0;
4a146b47
EZ
224 /* Name of filesym, as saved on the objfile_obstack. */
225 char *filesymname = obsavestring ("", 0, &objfile->objfile_obstack);
0a6ddd08 226 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
d4f3574e 227 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 228
0cc7b392 229 for (i = 0; i < number_of_symbols; i++)
c906108c 230 {
0cc7b392
DJ
231 sym = symbol_table[i];
232 if (sym->name == NULL || *sym->name == '\0')
c906108c 233 {
0cc7b392
DJ
234 /* Skip names that don't exist (shouldn't happen), or names
235 that are null strings (may happen). */
236 continue;
237 }
c906108c 238
74763737
DJ
239 /* Skip "special" symbols, e.g. ARM mapping symbols. These are
240 symbols which do not correspond to objects in the symbol table,
241 but have some other target-specific meaning. */
242 if (bfd_is_target_special_symbol (objfile->obfd, sym))
243 continue;
244
0cc7b392 245 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
6f610d07 246 if (type == ST_DYNAMIC
0cc7b392
DJ
247 && sym->section == &bfd_und_section
248 && (sym->flags & BSF_FUNCTION))
249 {
250 struct minimal_symbol *msym;
02c75f72
UW
251 bfd *abfd = objfile->obfd;
252 asection *sect;
0cc7b392
DJ
253
254 /* Symbol is a reference to a function defined in
255 a shared library.
256 If its value is non zero then it is usually the address
257 of the corresponding entry in the procedure linkage table,
258 plus the desired section offset.
259 If its value is zero then the dynamic linker has to resolve
260 the symbol. We are unable to find any meaningful address
261 for this symbol in the executable file, so we skip it. */
262 symaddr = sym->value;
263 if (symaddr == 0)
264 continue;
02c75f72
UW
265
266 /* sym->section is the undefined section. However, we want to
267 record the section where the PLT stub resides with the
268 minimal symbol. Search the section table for the one that
269 covers the stub's address. */
270 for (sect = abfd->sections; sect != NULL; sect = sect->next)
271 {
272 if ((bfd_get_section_flags (abfd, sect) & SEC_ALLOC) == 0)
273 continue;
274
275 if (symaddr >= bfd_get_section_vma (abfd, sect)
276 && symaddr < bfd_get_section_vma (abfd, sect)
277 + bfd_get_section_size (sect))
278 break;
279 }
280 if (!sect)
281 continue;
282
283 symaddr += ANOFFSET (objfile->section_offsets, sect->index);
284
0cc7b392 285 msym = record_minimal_symbol
02c75f72 286 ((char *) sym->name, symaddr, mst_solib_trampoline, sect, objfile);
0cc7b392
DJ
287 if (msym != NULL)
288 msym->filename = filesymname;
0cc7b392
DJ
289 continue;
290 }
c906108c 291
0cc7b392
DJ
292 /* If it is a nonstripped executable, do not enter dynamic
293 symbols, as the dynamic symbol table is usually a subset
294 of the main symbol table. */
6f610d07 295 if (type == ST_DYNAMIC && !stripped)
0cc7b392
DJ
296 continue;
297 if (sym->flags & BSF_FILE)
298 {
299 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
300 Chain any old one onto the objfile; remember new sym. */
301 if (sectinfo != NULL)
c906108c 302 {
0cc7b392
DJ
303 sectinfo->next = dbx->stab_section_info;
304 dbx->stab_section_info = sectinfo;
305 sectinfo = NULL;
306 }
307 filesym = sym;
0cc7b392
DJ
308 filesymname =
309 obsavestring ((char *) filesym->name, strlen (filesym->name),
310 &objfile->objfile_obstack);
0cc7b392
DJ
311 }
312 else if (sym->flags & BSF_SECTION_SYM)
313 continue;
314 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
315 {
316 struct minimal_symbol *msym;
317
318 /* Select global/local/weak symbols. Note that bfd puts abs
319 symbols in their own section, so all symbols we are
320 interested in will have a section. */
321 /* Bfd symbols are section relative. */
322 symaddr = sym->value + sym->section->vma;
323 /* Relocate all non-absolute symbols by the section offset. */
324 if (sym->section != &bfd_abs_section)
325 {
326 symaddr += offset;
c906108c 327 }
0cc7b392
DJ
328 /* For non-absolute symbols, use the type of the section
329 they are relative to, to intuit text/data. Bfd provides
330 no way of figuring this out for absolute symbols. */
331 if (sym->section == &bfd_abs_section)
c906108c 332 {
0cc7b392
DJ
333 /* This is a hack to get the minimal symbol type
334 right for Irix 5, which has absolute addresses
6f610d07
UW
335 with special section indices for dynamic symbols.
336
337 NOTE: uweigand-20071112: Synthetic symbols do not
338 have an ELF-private part, so do not touch those. */
4fbb74a6 339 unsigned int shndx = type == ST_SYNTHETIC ? 0 :
0cc7b392
DJ
340 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
341
342 switch (shndx)
c906108c 343 {
0cc7b392
DJ
344 case SHN_MIPS_TEXT:
345 ms_type = mst_text;
346 break;
347 case SHN_MIPS_DATA:
348 ms_type = mst_data;
349 break;
350 case SHN_MIPS_ACOMMON:
351 ms_type = mst_bss;
352 break;
353 default:
354 ms_type = mst_abs;
355 }
356
357 /* If it is an Irix dynamic symbol, skip section name
358 symbols, relocate all others by section offset. */
359 if (ms_type != mst_abs)
360 {
361 if (sym->name[0] == '.')
362 continue;
d4f3574e 363 symaddr += offset;
c906108c 364 }
0cc7b392
DJ
365 }
366 else if (sym->section->flags & SEC_CODE)
367 {
08232497 368 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 369 {
0cc7b392
DJ
370 ms_type = mst_text;
371 }
372 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
373 || ((sym->flags & BSF_LOCAL)
374 && sym->name[0] == '$'
375 && sym->name[1] == 'L'))
376 /* Looks like a compiler-generated label. Skip
377 it. The assembler should be skipping these (to
378 keep executables small), but apparently with
379 gcc on the (deleted) delta m88k SVR4, it loses.
380 So to have us check too should be harmless (but
381 I encourage people to fix this in the assembler
382 instead of adding checks here). */
383 continue;
384 else
385 {
386 ms_type = mst_file_text;
c906108c 387 }
0cc7b392
DJ
388 }
389 else if (sym->section->flags & SEC_ALLOC)
390 {
391 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 392 {
0cc7b392 393 if (sym->section->flags & SEC_LOAD)
c906108c 394 {
0cc7b392 395 ms_type = mst_data;
c906108c 396 }
c906108c
SS
397 else
398 {
0cc7b392 399 ms_type = mst_bss;
c906108c
SS
400 }
401 }
0cc7b392 402 else if (sym->flags & BSF_LOCAL)
c906108c 403 {
0cc7b392
DJ
404 /* Named Local variable in a Data section.
405 Check its name for stabs-in-elf. */
406 int special_local_sect;
407 if (strcmp ("Bbss.bss", sym->name) == 0)
408 special_local_sect = SECT_OFF_BSS (objfile);
409 else if (strcmp ("Ddata.data", sym->name) == 0)
410 special_local_sect = SECT_OFF_DATA (objfile);
411 else if (strcmp ("Drodata.rodata", sym->name) == 0)
412 special_local_sect = SECT_OFF_RODATA (objfile);
413 else
414 special_local_sect = -1;
415 if (special_local_sect >= 0)
c906108c 416 {
0cc7b392
DJ
417 /* Found a special local symbol. Allocate a
418 sectinfo, if needed, and fill it in. */
419 if (sectinfo == NULL)
c906108c 420 {
0cc7b392
DJ
421 int max_index;
422 size_t size;
423
424 max_index
425 = max (SECT_OFF_BSS (objfile),
426 max (SECT_OFF_DATA (objfile),
427 SECT_OFF_RODATA (objfile)));
428
429 /* max_index is the largest index we'll
430 use into this array, so we must
431 allocate max_index+1 elements for it.
432 However, 'struct stab_section_info'
433 already includes one element, so we
434 need to allocate max_index aadditional
435 elements. */
436 size = (sizeof (struct stab_section_info)
437 + (sizeof (CORE_ADDR)
438 * max_index));
439 sectinfo = (struct stab_section_info *)
440 xmalloc (size);
441 memset (sectinfo, 0, size);
442 sectinfo->num_sections = max_index;
443 if (filesym == NULL)
c906108c 444 {
0cc7b392
DJ
445 complaint (&symfile_complaints,
446 _("elf/stab section information %s without a preceding file symbol"),
447 sym->name);
448 }
449 else
450 {
451 sectinfo->filename =
452 (char *) filesym->name;
c906108c 453 }
c906108c 454 }
0cc7b392
DJ
455 if (sectinfo->sections[special_local_sect] != 0)
456 complaint (&symfile_complaints,
457 _("duplicated elf/stab section information for %s"),
458 sectinfo->filename);
459 /* BFD symbols are section relative. */
460 symaddr = sym->value + sym->section->vma;
461 /* Relocate non-absolute symbols by the
462 section offset. */
463 if (sym->section != &bfd_abs_section)
464 symaddr += offset;
465 sectinfo->sections[special_local_sect] = symaddr;
466 /* The special local symbols don't go in the
467 minimal symbol table, so ignore this one. */
468 continue;
469 }
470 /* Not a special stabs-in-elf symbol, do regular
471 symbol processing. */
472 if (sym->section->flags & SEC_LOAD)
473 {
474 ms_type = mst_file_data;
c906108c
SS
475 }
476 else
477 {
0cc7b392 478 ms_type = mst_file_bss;
c906108c
SS
479 }
480 }
481 else
482 {
0cc7b392 483 ms_type = mst_unknown;
c906108c 484 }
0cc7b392
DJ
485 }
486 else
487 {
488 /* FIXME: Solaris2 shared libraries include lots of
489 odd "absolute" and "undefined" symbols, that play
490 hob with actions like finding what function the PC
491 is in. Ignore them if they aren't text, data, or bss. */
492 /* ms_type = mst_unknown; */
493 continue; /* Skip this symbol. */
494 }
495 msym = record_minimal_symbol
496 ((char *) sym->name, symaddr,
497 ms_type, sym->section, objfile);
6f610d07 498
0cc7b392
DJ
499 if (msym)
500 {
501 /* Pass symbol size field in via BFD. FIXME!!! */
6f610d07
UW
502 elf_symbol_type *elf_sym;
503
504 /* NOTE: uweigand-20071112: A synthetic symbol does not have an
505 ELF-private part. However, in some cases (e.g. synthetic
506 'dot' symbols on ppc64) the udata.p entry is set to point back
507 to the original ELF symbol it was derived from. Get the size
508 from that symbol. */
509 if (type != ST_SYNTHETIC)
510 elf_sym = (elf_symbol_type *) sym;
511 else
512 elf_sym = (elf_symbol_type *) sym->udata.p;
513
514 if (elf_sym)
515 MSYMBOL_SIZE(msym) = elf_sym->internal_elf_sym.st_size;
0cc7b392 516 }
0cc7b392
DJ
517 if (msym != NULL)
518 msym->filename = filesymname;
5e2b427d 519 gdbarch_elf_make_msymbol_special (gdbarch, sym, msym);
c906108c 520 }
c906108c
SS
521 }
522}
523
524/* Scan and build partial symbols for a symbol file.
525 We have been initialized by a call to elf_symfile_init, which
526 currently does nothing.
527
528 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
529 in each section. We simplify it down to a single offset for all
530 symbols. FIXME.
531
532 MAINLINE is true if we are reading the main symbol
533 table (as opposed to a shared lib or dynamically loaded file).
534
535 This function only does the minimum work necessary for letting the
536 user "name" things symbolically; it does not read the entire symtab.
537 Instead, it reads the external and static symbols and puts them in partial
538 symbol tables. When more extensive information is requested of a
539 file, the corresponding partial symbol table is mutated into a full
540 fledged symbol table by going back and reading the symbols
541 for real.
542
543 We look for sections with specific names, to tell us what debug
544 format to look for: FIXME!!!
545
c906108c
SS
546 elfstab_build_psymtabs() handles STABS symbols;
547 mdebug_build_psymtabs() handles ECOFF debugging information.
548
549 Note that ELF files have a "minimal" symbol table, which looks a lot
550 like a COFF symbol table, but has only the minimal information necessary
551 for linking. We process this also, and use the information to
552 build gdb's minimal symbol table. This gives us some minimal debugging
553 capability even for files compiled without -g. */
554
555static void
fba45db2 556elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
557{
558 bfd *abfd = objfile->obfd;
559 struct elfinfo ei;
560 struct cleanup *back_to;
561 CORE_ADDR offset;
62553543
EZ
562 long symcount = 0, dynsymcount = 0, synthcount, storage_needed;
563 asymbol **symbol_table = NULL, **dyn_symbol_table = NULL;
564 asymbol *synthsyms;
c906108c
SS
565
566 init_minimal_symbol_collection ();
56e290f4 567 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
568
569 memset ((char *) &ei, 0, sizeof (ei));
570
571 /* Allocate struct to keep track of the symfile */
0a6ddd08 572 objfile->deprecated_sym_stab_info = (struct dbx_symfile_info *)
7936743b 573 xmalloc (sizeof (struct dbx_symfile_info));
0a6ddd08 574 memset ((char *) objfile->deprecated_sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 575 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
576
577 /* Process the normal ELF symbol table first. This may write some
0a6ddd08 578 chain of info into the dbx_symfile_info in objfile->deprecated_sym_stab_info,
c906108c
SS
579 which can later be used by elfstab_offset_sections. */
580
62553543
EZ
581 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
582 if (storage_needed < 0)
583 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
584 bfd_errmsg (bfd_get_error ()));
585
586 if (storage_needed > 0)
587 {
588 symbol_table = (asymbol **) xmalloc (storage_needed);
589 make_cleanup (xfree, symbol_table);
590 symcount = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
591
592 if (symcount < 0)
593 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
594 bfd_errmsg (bfd_get_error ()));
595
6f610d07 596 elf_symtab_read (objfile, ST_REGULAR, symcount, symbol_table);
62553543 597 }
c906108c
SS
598
599 /* Add the dynamic symbols. */
600
62553543
EZ
601 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
602
603 if (storage_needed > 0)
604 {
605 dyn_symbol_table = (asymbol **) xmalloc (storage_needed);
606 make_cleanup (xfree, dyn_symbol_table);
607 dynsymcount = bfd_canonicalize_dynamic_symtab (objfile->obfd,
608 dyn_symbol_table);
609
610 if (dynsymcount < 0)
611 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
612 bfd_errmsg (bfd_get_error ()));
613
6f610d07 614 elf_symtab_read (objfile, ST_DYNAMIC, dynsymcount, dyn_symbol_table);
62553543
EZ
615 }
616
617 /* Add synthetic symbols - for instance, names for any PLT entries. */
618
619 synthcount = bfd_get_synthetic_symtab (abfd, symcount, symbol_table,
620 dynsymcount, dyn_symbol_table,
621 &synthsyms);
622 if (synthcount > 0)
623 {
624 asymbol **synth_symbol_table;
625 long i;
626
627 make_cleanup (xfree, synthsyms);
628 synth_symbol_table = xmalloc (sizeof (asymbol *) * synthcount);
629 for (i = 0; i < synthcount; i++)
9f20e3da 630 synth_symbol_table[i] = synthsyms + i;
62553543 631 make_cleanup (xfree, synth_symbol_table);
6f610d07 632 elf_symtab_read (objfile, ST_SYNTHETIC, synthcount, synth_symbol_table);
62553543 633 }
c906108c 634
7134143f
DJ
635 /* Install any minimal symbols that have been collected as the current
636 minimal symbols for this objfile. The debug readers below this point
637 should not generate new minimal symbols; if they do it's their
638 responsibility to install them. "mdebug" appears to be the only one
639 which will do this. */
640
641 install_minimal_symbols (objfile);
642 do_cleanups (back_to);
643
c906108c
SS
644 /* Now process debugging information, which is contained in
645 special ELF sections. */
646
647 /* If we are reinitializing, or if we have never loaded syms yet,
648 set table to empty. MAINLINE is cleared so that *_read_psymtab
649 functions do not all also re-initialize the psymbol table. */
650 if (mainline)
651 {
652 init_psymbol_list (objfile, 0);
653 mainline = 0;
654 }
655
656 /* We first have to find them... */
12b9c64f 657 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
658
659 /* ELF debugging information is inserted into the psymtab in the
660 order of least informative first - most informative last. Since
661 the psymtab table is searched `most recent insertion first' this
662 increases the probability that more detailed debug information
663 for a section is found.
664
665 For instance, an object file might contain both .mdebug (XCOFF)
666 and .debug_info (DWARF2) sections then .mdebug is inserted first
667 (searched last) and DWARF2 is inserted last (searched first). If
668 we don't do this then the XCOFF info is found first - for code in
669 an included file XCOFF info is useless. */
670
671 if (ei.mdebugsect)
672 {
673 const struct ecoff_debug_swap *swap;
674
675 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 676 information. */
c906108c
SS
677 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
678 if (swap)
d4f3574e 679 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
680 }
681 if (ei.stabsect)
682 {
683 asection *str_sect;
684
685 /* Stab sections have an associated string table that looks like
c5aa993b 686 a separate section. */
c906108c
SS
687 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
688
689 /* FIXME should probably warn about a stab section without a stabstr. */
690 if (str_sect)
691 elfstab_build_psymtabs (objfile,
c906108c 692 mainline,
086df311 693 ei.stabsect,
c906108c
SS
694 str_sect->filepos,
695 bfd_section_size (abfd, str_sect));
696 }
c5edf76a 697 if (dwarf2_has_info (objfile))
c906108c
SS
698 {
699 /* DWARF 2 sections */
d4f3574e 700 dwarf2_build_psymtabs (objfile, mainline);
c906108c 701 }
c906108c 702
625b0b97
AC
703 /* FIXME: kettenis/20030504: This still needs to be integrated with
704 dwarf2read.c in a better way. */
705 dwarf2_build_frame_info (objfile);
c906108c
SS
706}
707
0a6ddd08
AC
708/* This cleans up the objfile's deprecated_sym_stab_info pointer, and
709 the chain of stab_section_info's, that might be dangling from
710 it. */
c906108c
SS
711
712static void
12b9c64f 713free_elfinfo (void *objp)
c906108c 714{
c5aa993b 715 struct objfile *objfile = (struct objfile *) objp;
0a6ddd08 716 struct dbx_symfile_info *dbxinfo = objfile->deprecated_sym_stab_info;
c906108c
SS
717 struct stab_section_info *ssi, *nssi;
718
719 ssi = dbxinfo->stab_section_info;
720 while (ssi)
721 {
722 nssi = ssi->next;
2dc74dc1 723 xfree (ssi);
c906108c
SS
724 ssi = nssi;
725 }
726
727 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
728}
729
730
731/* Initialize anything that needs initializing when a completely new symbol
732 file is specified (not just adding some symbols from another file, e.g. a
733 shared library).
734
735 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
736
737static void
fba45db2 738elf_new_init (struct objfile *ignore)
c906108c
SS
739{
740 stabsread_new_init ();
741 buildsym_new_init ();
742}
743
744/* Perform any local cleanups required when we are done with a particular
745 objfile. I.E, we are in the process of discarding all symbol information
746 for an objfile, freeing up all memory held for it, and unlinking the
747 objfile struct from the global list of known objfiles. */
748
749static void
fba45db2 750elf_symfile_finish (struct objfile *objfile)
c906108c 751{
0a6ddd08 752 if (objfile->deprecated_sym_stab_info != NULL)
c906108c 753 {
0a6ddd08 754 xfree (objfile->deprecated_sym_stab_info);
c906108c 755 }
fe3e1990
DJ
756
757 dwarf2_free_objfile (objfile);
c906108c
SS
758}
759
760/* ELF specific initialization routine for reading symbols.
761
762 It is passed a pointer to a struct sym_fns which contains, among other
763 things, the BFD for the file whose symbols are being read, and a slot for
764 a pointer to "private data" which we can fill with goodies.
765
766 For now at least, we have nothing in particular to do, so this function is
767 just a stub. */
768
769static void
fba45db2 770elf_symfile_init (struct objfile *objfile)
c906108c
SS
771{
772 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
773 find this causes a significant slowdown in gdb then we could
774 set it in the debug symbol readers only when necessary. */
775 objfile->flags |= OBJF_REORDERED;
776}
777
778/* When handling an ELF file that contains Sun STABS debug info,
779 some of the debug info is relative to the particular chunk of the
780 section that was generated in its individual .o file. E.g.
781 offsets to static variables are relative to the start of the data
782 segment *for that module before linking*. This information is
783 painfully squirreled away in the ELF symbol table as local symbols
784 with wierd names. Go get 'em when needed. */
785
786void
fba45db2 787elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
788{
789 char *filename = pst->filename;
0a6ddd08 790 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
c906108c
SS
791 struct stab_section_info *maybe = dbx->stab_section_info;
792 struct stab_section_info *questionable = 0;
793 int i;
794 char *p;
795
796 /* The ELF symbol info doesn't include path names, so strip the path
797 (if any) from the psymtab filename. */
798 while (0 != (p = strchr (filename, '/')))
c5aa993b 799 filename = p + 1;
c906108c
SS
800
801 /* FIXME: This linear search could speed up significantly
802 if it was chained in the right order to match how we search it,
803 and if we unchained when we found a match. */
804 for (; maybe; maybe = maybe->next)
805 {
806 if (filename[0] == maybe->filename[0]
6314a349 807 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
808 {
809 /* We found a match. But there might be several source files
810 (from different directories) with the same name. */
811 if (0 == maybe->found)
812 break;
c5aa993b 813 questionable = maybe; /* Might use it later. */
c906108c
SS
814 }
815 }
816
817 if (maybe == 0 && questionable != 0)
818 {
23136709 819 complaint (&symfile_complaints,
e2e0b3e5 820 _("elf/stab section information questionable for %s"), filename);
c906108c
SS
821 maybe = questionable;
822 }
823
824 if (maybe)
825 {
826 /* Found it! Allocate a new psymtab struct, and fill it in. */
827 maybe->found++;
828 pst->section_offsets = (struct section_offsets *)
8b92e4d5 829 obstack_alloc (&objfile->objfile_obstack,
a39a16c4
MM
830 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
831 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 832 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
833 return;
834 }
835
836 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 837 if (dbx->stab_section_info) /* If there *is* any info, */
23136709 838 complaint (&symfile_complaints,
e2e0b3e5 839 _("elf/stab section information missing for %s"), filename);
c906108c
SS
840}
841\f
842/* Register that we are able to handle ELF object file formats. */
843
844static struct sym_fns elf_sym_fns =
845{
846 bfd_target_elf_flavour,
c5aa993b
JM
847 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
848 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
849 elf_symfile_read, /* sym_read: read a symbol file into symtab */
850 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 851 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
31d99776
DJ
852 elf_symfile_segments, /* sym_segments: Get segment information from
853 a file. */
c295b2e5 854 NULL, /* sym_read_linetable */
c5aa993b 855 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
856};
857
858void
fba45db2 859_initialize_elfread (void)
c906108c
SS
860{
861 add_symtab_fns (&elf_sym_fns);
862}
This page took 0.879488 seconds and 4 git commands to generate.