]>
Commit | Line | Data |
---|---|---|
35f5886e | 1 | /* Read ELF (Executable and Linking Format) object files for GDB. |
de537409 | 2 | Copyright 1991, 1992, 1993, 1994, 1995 Free Software Foundation, Inc. |
35f5886e FF |
3 | Written by Fred Fish at Cygnus Support. |
4 | ||
5 | This file is part of GDB. | |
6 | ||
7 | This program is free software; you can redistribute it and/or modify | |
8 | it under the terms of the GNU General Public License as published by | |
9 | the Free Software Foundation; either version 2 of the License, or | |
10 | (at your option) any later version. | |
11 | ||
12 | This program is distributed in the hope that it will be useful, | |
13 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
15 | GNU General Public License for more details. | |
16 | ||
17 | You should have received a copy of the GNU General Public License | |
18 | along with this program; if not, write to the Free Software | |
6c9638b4 | 19 | Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */ |
35f5886e | 20 | |
35f5886e | 21 | #include "defs.h" |
35f5886e | 22 | #include "bfd.h" |
2b576293 | 23 | #include "gdb_string.h" |
a99d0ef1 | 24 | #include "elf-bfd.h" |
0683ac4b | 25 | #include "elf/mips.h" |
35f5886e | 26 | #include "symtab.h" |
1ab3bf1b | 27 | #include "symfile.h" |
5e2e79f8 | 28 | #include "objfiles.h" |
be772100 | 29 | #include "buildsym.h" |
2731625a | 30 | #include "stabsread.h" |
2670f34d | 31 | #include "gdb-stabs.h" |
51b80b00 | 32 | #include "complaints.h" |
2e4964ad | 33 | #include "demangle.h" |
35f5886e | 34 | |
2670f34d JG |
35 | /* The struct elfinfo is available only during ELF symbol table and |
36 | psymtab reading. It is destroyed at the complation of psymtab-reading. | |
37 | It's local to elf_symfile_read. */ | |
38 | ||
35f5886e | 39 | struct elfinfo { |
d5931d79 | 40 | file_ptr dboffset; /* Offset to dwarf debug section */ |
35f5886e | 41 | unsigned int dbsize; /* Size of dwarf debug section */ |
d5931d79 | 42 | file_ptr lnoffset; /* Offset to dwarf line number section */ |
35f5886e | 43 | unsigned int lnsize; /* Size of dwarf line number section */ |
346168a2 JG |
44 | asection *stabsect; /* Section pointer for .stab section */ |
45 | asection *stabindexsect; /* Section pointer for .stab.index section */ | |
e03c0cc6 | 46 | asection *mdebugsect; /* Section pointer for .mdebug section */ |
35f5886e FF |
47 | }; |
48 | ||
2670f34d JG |
49 | /* Various things we might complain about... */ |
50 | ||
51 | struct complaint section_info_complaint = | |
52 | {"elf/stab section information %s without a preceding file symbol", 0, 0}; | |
53 | ||
54 | struct complaint section_info_dup_complaint = | |
55 | {"duplicated elf/stab section information for %s", 0, 0}; | |
56 | ||
57 | struct complaint stab_info_mismatch_complaint = | |
58 | {"elf/stab section information missing for %s", 0, 0}; | |
59 | ||
60 | struct complaint stab_info_questionable_complaint = | |
61 | {"elf/stab section information questionable for %s", 0, 0}; | |
62 | ||
1ab3bf1b | 63 | static void |
80d68b1d | 64 | elf_symfile_init PARAMS ((struct objfile *)); |
1ab3bf1b JG |
65 | |
66 | static void | |
80d68b1d | 67 | elf_new_init PARAMS ((struct objfile *)); |
1ab3bf1b JG |
68 | |
69 | static void | |
2670f34d | 70 | elf_symfile_read PARAMS ((struct objfile *, struct section_offsets *, int)); |
80d68b1d FF |
71 | |
72 | static void | |
73 | elf_symfile_finish PARAMS ((struct objfile *)); | |
1ab3bf1b JG |
74 | |
75 | static void | |
0683ac4b | 76 | elf_symtab_read PARAMS ((bfd *, CORE_ADDR, struct objfile *, int)); |
1ab3bf1b | 77 | |
2670f34d | 78 | static void |
77fe3f84 | 79 | free_elfinfo PARAMS ((void *)); |
2670f34d JG |
80 | |
81 | static struct section_offsets * | |
82 | elf_symfile_offsets PARAMS ((struct objfile *, CORE_ADDR)); | |
83 | ||
2d336b1b | 84 | static struct minimal_symbol * |
51b57ded FF |
85 | record_minimal_symbol_and_info PARAMS ((char *, CORE_ADDR, |
86 | enum minimal_symbol_type, char *, | |
87 | struct objfile *)); | |
1ab3bf1b JG |
88 | |
89 | static void | |
77fe3f84 | 90 | elf_locate_sections PARAMS ((bfd *, asection *, void *)); |
1ab3bf1b | 91 | |
35f5886e FF |
92 | /* We are called once per section from elf_symfile_read. We |
93 | need to examine each section we are passed, check to see | |
94 | if it is something we are interested in processing, and | |
95 | if so, stash away some access information for the section. | |
96 | ||
97 | For now we recognize the dwarf debug information sections and | |
98 | line number sections from matching their section names. The | |
99 | ELF definition is no real help here since it has no direct | |
100 | knowledge of DWARF (by design, so any debugging format can be | |
101 | used). | |
102 | ||
346168a2 JG |
103 | We also recognize the ".stab" sections used by the Sun compilers |
104 | released with Solaris 2. | |
105 | ||
898140fe JK |
106 | FIXME: The section names should not be hardwired strings (what |
107 | should they be? I don't think most object file formats have enough | |
108 | section flags to specify what kind of debug section it is | |
109 | -kingdon). */ | |
35f5886e FF |
110 | |
111 | static void | |
be772100 JG |
112 | elf_locate_sections (ignore_abfd, sectp, eip) |
113 | bfd *ignore_abfd; | |
1ab3bf1b JG |
114 | asection *sectp; |
115 | PTR eip; | |
35f5886e | 116 | { |
1ab3bf1b JG |
117 | register struct elfinfo *ei; |
118 | ||
119 | ei = (struct elfinfo *) eip; | |
35f5886e FF |
120 | if (STREQ (sectp -> name, ".debug")) |
121 | { | |
122 | ei -> dboffset = sectp -> filepos; | |
e5849334 | 123 | ei -> dbsize = bfd_get_section_size_before_reloc (sectp); |
35f5886e FF |
124 | } |
125 | else if (STREQ (sectp -> name, ".line")) | |
126 | { | |
127 | ei -> lnoffset = sectp -> filepos; | |
e5849334 | 128 | ei -> lnsize = bfd_get_section_size_before_reloc (sectp); |
35f5886e | 129 | } |
346168a2 JG |
130 | else if (STREQ (sectp -> name, ".stab")) |
131 | { | |
132 | ei -> stabsect = sectp; | |
133 | } | |
134 | else if (STREQ (sectp -> name, ".stab.index")) | |
135 | { | |
136 | ei -> stabindexsect = sectp; | |
137 | } | |
e03c0cc6 ILT |
138 | else if (STREQ (sectp -> name, ".mdebug")) |
139 | { | |
140 | ei -> mdebugsect = sectp; | |
141 | } | |
35f5886e FF |
142 | } |
143 | ||
1ab3bf1b JG |
144 | #if 0 /* Currently unused */ |
145 | ||
f8b76e70 | 146 | char * |
1ab3bf1b JG |
147 | elf_interpreter (abfd) |
148 | bfd *abfd; | |
f8b76e70 FF |
149 | { |
150 | sec_ptr interp_sec; | |
151 | unsigned size; | |
152 | char *interp = NULL; | |
153 | ||
154 | interp_sec = bfd_get_section_by_name (abfd, ".interp"); | |
155 | if (interp_sec) | |
156 | { | |
157 | size = bfd_section_size (abfd, interp_sec); | |
158 | interp = alloca (size); | |
159 | if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr)0, | |
160 | size)) | |
161 | { | |
162 | interp = savestring (interp, size - 1); | |
163 | } | |
164 | else | |
165 | { | |
166 | interp = NULL; | |
167 | } | |
168 | } | |
169 | return (interp); | |
170 | } | |
171 | ||
1ab3bf1b JG |
172 | #endif |
173 | ||
2d336b1b | 174 | static struct minimal_symbol * |
346168a2 JG |
175 | record_minimal_symbol_and_info (name, address, ms_type, info, objfile) |
176 | char *name; | |
177 | CORE_ADDR address; | |
178 | enum minimal_symbol_type ms_type; | |
179 | char *info; /* FIXME, is this really char *? */ | |
180 | struct objfile *objfile; | |
181 | { | |
610a7e74 ILT |
182 | int section; |
183 | ||
184 | /* Guess the section from the type. This is likely to be wrong in | |
185 | some cases. */ | |
186 | switch (ms_type) | |
187 | { | |
188 | case mst_text: | |
189 | case mst_file_text: | |
190 | section = SECT_OFF_TEXT; | |
9fdb3f7a JK |
191 | #ifdef SMASH_TEXT_ADDRESS |
192 | SMASH_TEXT_ADDRESS (address); | |
193 | #endif | |
610a7e74 ILT |
194 | break; |
195 | case mst_data: | |
196 | case mst_file_data: | |
197 | section = SECT_OFF_DATA; | |
198 | break; | |
199 | case mst_bss: | |
200 | case mst_file_bss: | |
201 | section = SECT_OFF_BSS; | |
202 | break; | |
203 | default: | |
204 | section = -1; | |
205 | break; | |
206 | } | |
207 | ||
346168a2 | 208 | name = obsavestring (name, strlen (name), &objfile -> symbol_obstack); |
2d336b1b JK |
209 | return prim_record_minimal_symbol_and_info |
210 | (name, address, ms_type, info, section, objfile); | |
346168a2 JG |
211 | } |
212 | ||
f8b76e70 FF |
213 | /* |
214 | ||
215 | LOCAL FUNCTION | |
216 | ||
217 | elf_symtab_read -- read the symbol table of an ELF file | |
218 | ||
219 | SYNOPSIS | |
220 | ||
be772100 | 221 | void elf_symtab_read (bfd *abfd, CORE_ADDR addr, |
a1a0d974 | 222 | struct objfile *objfile, int dynamic) |
f8b76e70 FF |
223 | |
224 | DESCRIPTION | |
225 | ||
226 | Given an open bfd, a base address to relocate symbols to, and a | |
227 | flag that specifies whether or not this bfd is for an executable | |
228 | or not (may be shared library for example), add all the global | |
1ab3bf1b | 229 | function and data symbols to the minimal symbol table. |
f8b76e70 | 230 | |
2670f34d JG |
231 | In stabs-in-ELF, as implemented by Sun, there are some local symbols |
232 | defined in the ELF symbol table, which can be used to locate | |
233 | the beginnings of sections from each ".o" file that was linked to | |
234 | form the executable objfile. We gather any such info and record it | |
235 | in data structures hung off the objfile's private data. | |
236 | ||
f8b76e70 FF |
237 | */ |
238 | ||
a7446af6 | 239 | static void |
0683ac4b | 240 | elf_symtab_read (abfd, addr, objfile, dynamic) |
1ab3bf1b JG |
241 | bfd *abfd; |
242 | CORE_ADDR addr; | |
1ab3bf1b | 243 | struct objfile *objfile; |
0683ac4b | 244 | int dynamic; |
a7446af6 | 245 | { |
70f42bae | 246 | long storage_needed; |
a7446af6 FF |
247 | asymbol *sym; |
248 | asymbol **symbol_table; | |
70f42bae ILT |
249 | long number_of_symbols; |
250 | long i; | |
2670f34d | 251 | int index; |
a7446af6 | 252 | struct cleanup *back_to; |
f8b76e70 | 253 | CORE_ADDR symaddr; |
1ab3bf1b | 254 | enum minimal_symbol_type ms_type; |
6c8f91a1 | 255 | /* If sectinfo is nonNULL, it contains section info that should end up |
2670f34d | 256 | filed in the objfile. */ |
6c8f91a1 | 257 | struct stab_section_info *sectinfo = NULL; |
2670f34d JG |
258 | /* If filesym is nonzero, it points to a file symbol, but we haven't |
259 | seen any section info for it yet. */ | |
260 | asymbol *filesym = 0; | |
2d336b1b JK |
261 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
262 | /* Name of filesym, as saved on the symbol_obstack. */ | |
a1a0d974 | 263 | char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack); |
2d336b1b | 264 | #endif |
2670f34d | 265 | struct dbx_symfile_info *dbx = (struct dbx_symfile_info *) |
965a5c32 | 266 | objfile->sym_stab_info; |
6c8f91a1 | 267 | unsigned long size; |
0683ac4b PS |
268 | int stripped = (bfd_get_symcount (abfd) == 0); |
269 | ||
270 | if (dynamic) | |
00306b1e PS |
271 | { |
272 | storage_needed = bfd_get_dynamic_symtab_upper_bound (abfd); | |
273 | ||
274 | /* Nothing to be done if there is no dynamic symtab. */ | |
275 | if (storage_needed < 0) | |
276 | return; | |
277 | } | |
0683ac4b | 278 | else |
00306b1e PS |
279 | { |
280 | storage_needed = bfd_get_symtab_upper_bound (abfd); | |
281 | if (storage_needed < 0) | |
282 | error ("Can't read symbols from %s: %s", bfd_get_filename (abfd), | |
283 | bfd_errmsg (bfd_get_error ())); | |
284 | } | |
a7446af6 FF |
285 | if (storage_needed > 0) |
286 | { | |
3b0b9220 | 287 | symbol_table = (asymbol **) xmalloc (storage_needed); |
a7446af6 | 288 | back_to = make_cleanup (free, symbol_table); |
0683ac4b PS |
289 | if (dynamic) |
290 | number_of_symbols = bfd_canonicalize_dynamic_symtab (abfd, | |
291 | symbol_table); | |
292 | else | |
293 | number_of_symbols = bfd_canonicalize_symtab (abfd, symbol_table); | |
70f42bae ILT |
294 | if (number_of_symbols < 0) |
295 | error ("Can't read symbols from %s: %s", bfd_get_filename (abfd), | |
296 | bfd_errmsg (bfd_get_error ())); | |
a7446af6 FF |
297 | for (i = 0; i < number_of_symbols; i++) |
298 | { | |
2670f34d | 299 | sym = symbol_table[i]; |
6c8f91a1 | 300 | if (sym -> name == NULL || *sym -> name == '\0') |
379dd965 | 301 | { |
6c8f91a1 FF |
302 | /* Skip names that don't exist (shouldn't happen), or names |
303 | that are null strings (may happen). */ | |
379dd965 FF |
304 | continue; |
305 | } | |
0683ac4b | 306 | |
a1a0d974 PS |
307 | if (dynamic |
308 | && sym -> section == &bfd_und_section | |
de537409 PS |
309 | && (sym -> flags & BSF_FUNCTION)) |
310 | { | |
a1a0d974 PS |
311 | struct minimal_symbol *msym; |
312 | ||
de537409 PS |
313 | /* Symbol is a reference to a function defined in |
314 | a shared library. | |
315 | If its value is non zero then it is usually the address | |
316 | of the corresponding entry in the procedure linkage table, | |
317 | relative to the base address. | |
318 | If its value is zero then the dynamic linker has to resolve | |
319 | the symbol. We are unable to find any meaningful address | |
a1a0d974 | 320 | for this symbol in the executable file, so we skip it. */ |
de537409 PS |
321 | symaddr = sym -> value; |
322 | if (symaddr == 0) | |
323 | continue; | |
324 | symaddr += addr; | |
a1a0d974 PS |
325 | msym = record_minimal_symbol_and_info |
326 | ((char *) sym -> name, symaddr, | |
327 | mst_solib_trampoline, NULL, objfile); | |
328 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
6b14af2b FF |
329 | if (msym != NULL) |
330 | msym->filename = filesymname; | |
a1a0d974 | 331 | #endif |
de537409 PS |
332 | continue; |
333 | } | |
334 | ||
0683ac4b PS |
335 | /* If it is a nonstripped executable, do not enter dynamic |
336 | symbols, as the dynamic symbol table is usually a subset | |
de537409 PS |
337 | of the main symbol table. */ |
338 | if (dynamic && !stripped) | |
0683ac4b | 339 | continue; |
6c8f91a1 FF |
340 | if (sym -> flags & BSF_FILE) |
341 | { | |
342 | /* STT_FILE debugging symbol that helps stabs-in-elf debugging. | |
343 | Chain any old one onto the objfile; remember new sym. */ | |
344 | if (sectinfo != NULL) | |
345 | { | |
346 | sectinfo -> next = dbx -> stab_section_info; | |
347 | dbx -> stab_section_info = sectinfo; | |
348 | sectinfo = NULL; | |
349 | } | |
350 | filesym = sym; | |
2d336b1b JK |
351 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING |
352 | filesymname = | |
353 | obsavestring ((char *)filesym->name, strlen (filesym->name), | |
354 | &objfile->symbol_obstack); | |
355 | #endif | |
6c8f91a1 FF |
356 | } |
357 | else if (sym -> flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK)) | |
a7446af6 | 358 | { |
2d336b1b JK |
359 | struct minimal_symbol *msym; |
360 | ||
6c8f91a1 FF |
361 | /* Select global/local/weak symbols. Note that bfd puts abs |
362 | symbols in their own section, so all symbols we are | |
363 | interested in will have a section. */ | |
a608f919 FF |
364 | /* Bfd symbols are section relative. */ |
365 | symaddr = sym -> value + sym -> section -> vma; | |
c2e4669f JG |
366 | /* Relocate all non-absolute symbols by base address. */ |
367 | if (sym -> section != &bfd_abs_section) | |
6c8f91a1 FF |
368 | { |
369 | symaddr += addr; | |
370 | } | |
f8b76e70 FF |
371 | /* For non-absolute symbols, use the type of the section |
372 | they are relative to, to intuit text/data. Bfd provides | |
373 | no way of figuring this out for absolute symbols. */ | |
de537409 | 374 | if (sym -> section == &bfd_abs_section) |
6c8f91a1 | 375 | { |
0683ac4b PS |
376 | /* This is a hack to get the minimal symbol type |
377 | right for Irix 5, which has absolute adresses | |
378 | with special section indices for dynamic symbols. */ | |
379 | unsigned short shndx = | |
380 | ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx; | |
381 | ||
382 | switch (shndx) | |
383 | { | |
384 | case SHN_MIPS_TEXT: | |
385 | ms_type = mst_text; | |
386 | break; | |
387 | case SHN_MIPS_DATA: | |
388 | ms_type = mst_data; | |
389 | break; | |
390 | case SHN_MIPS_ACOMMON: | |
391 | ms_type = mst_bss; | |
392 | break; | |
393 | default: | |
394 | ms_type = mst_abs; | |
395 | } | |
6c8f91a1 FF |
396 | } |
397 | else if (sym -> section -> flags & SEC_CODE) | |
f8b76e70 | 398 | { |
379dd965 FF |
399 | if (sym -> flags & BSF_GLOBAL) |
400 | { | |
401 | ms_type = mst_text; | |
402 | } | |
d54b2c50 SS |
403 | else if ((sym->name[0] == '.' && sym->name[1] == 'L') |
404 | || ((sym -> flags & BSF_LOCAL) | |
d97d5b48 | 405 | && sym->name[0] == '$' |
d54b2c50 | 406 | && sym->name[1] == 'L')) |
bbf1ff10 JK |
407 | /* Looks like a compiler-generated label. Skip it. |
408 | The assembler should be skipping these (to keep | |
409 | executables small), but apparently with gcc on the | |
410 | delta m88k SVR4, it loses. So to have us check too | |
411 | should be harmless (but I encourage people to fix this | |
412 | in the assembler instead of adding checks here). */ | |
5ec3ba25 | 413 | continue; |
379dd965 FF |
414 | else |
415 | { | |
416 | ms_type = mst_file_text; | |
417 | } | |
f8b76e70 | 418 | } |
90141f9c | 419 | else if (sym -> section -> flags & SEC_ALLOC) |
f8b76e70 | 420 | { |
379dd965 FF |
421 | if (sym -> flags & BSF_GLOBAL) |
422 | { | |
90141f9c | 423 | if (sym -> section -> flags & SEC_LOAD) |
379dd965 FF |
424 | { |
425 | ms_type = mst_data; | |
426 | } | |
427 | else | |
428 | { | |
429 | ms_type = mst_bss; | |
430 | } | |
431 | } | |
6c8f91a1 | 432 | else if (sym -> flags & BSF_LOCAL) |
379dd965 | 433 | { |
6c8f91a1 FF |
434 | /* Named Local variable in a Data section. Check its |
435 | name for stabs-in-elf. The STREQ macro checks the | |
436 | first character inline, so we only actually do a | |
437 | strcmp function call on names that start with 'B' | |
438 | or 'D' */ | |
439 | index = SECT_OFF_MAX; | |
440 | if (STREQ ("Bbss.bss", sym -> name)) | |
441 | { | |
442 | index = SECT_OFF_BSS; | |
443 | } | |
444 | else if (STREQ ("Ddata.data", sym -> name)) | |
445 | { | |
446 | index = SECT_OFF_DATA; | |
447 | } | |
448 | else if (STREQ ("Drodata.rodata", sym -> name)) | |
449 | { | |
450 | index = SECT_OFF_RODATA; | |
451 | } | |
452 | if (index != SECT_OFF_MAX) | |
453 | { | |
454 | /* Found a special local symbol. Allocate a | |
455 | sectinfo, if needed, and fill it in. */ | |
456 | if (sectinfo == NULL) | |
457 | { | |
458 | sectinfo = (struct stab_section_info *) | |
459 | xmmalloc (objfile -> md, sizeof (*sectinfo)); | |
460 | memset ((PTR) sectinfo, 0, sizeof (*sectinfo)); | |
461 | if (filesym == NULL) | |
462 | { | |
463 | complain (§ion_info_complaint, | |
464 | sym -> name); | |
465 | } | |
466 | else | |
467 | { | |
468 | sectinfo -> filename = | |
469 | (char *) filesym -> name; | |
470 | } | |
471 | } | |
472 | if (sectinfo -> sections[index] != 0) | |
473 | { | |
474 | complain (§ion_info_dup_complaint, | |
475 | sectinfo -> filename); | |
476 | } | |
477 | /* Bfd symbols are section relative. */ | |
478 | symaddr = sym -> value + sym -> section -> vma; | |
479 | /* Relocate non-absolute symbols by base address. */ | |
480 | if (sym -> section != &bfd_abs_section) | |
481 | { | |
482 | symaddr += addr; | |
483 | } | |
484 | sectinfo -> sections[index] = symaddr; | |
485 | /* The special local symbols don't go in the | |
486 | minimal symbol table, so ignore this one. */ | |
487 | continue; | |
488 | } | |
489 | /* Not a special stabs-in-elf symbol, do regular | |
490 | symbol processing. */ | |
90141f9c | 491 | if (sym -> section -> flags & SEC_LOAD) |
379dd965 FF |
492 | { |
493 | ms_type = mst_file_data; | |
494 | } | |
495 | else | |
496 | { | |
497 | ms_type = mst_file_bss; | |
498 | } | |
499 | } | |
6c8f91a1 FF |
500 | else |
501 | { | |
502 | ms_type = mst_unknown; | |
503 | } | |
f8b76e70 FF |
504 | } |
505 | else | |
506 | { | |
4c7c6bab JG |
507 | /* FIXME: Solaris2 shared libraries include lots of |
508 | odd "absolute" and "undefined" symbols, that play | |
509 | hob with actions like finding what function the PC | |
379dd965 | 510 | is in. Ignore them if they aren't text, data, or bss. */ |
4c7c6bab JG |
511 | /* ms_type = mst_unknown; */ |
512 | continue; /* Skip this symbol. */ | |
f8b76e70 | 513 | } |
346168a2 | 514 | /* Pass symbol size field in via BFD. FIXME!!! */ |
538b2068 | 515 | size = ((elf_symbol_type *) sym) -> internal_elf_sym.st_size; |
2d336b1b JK |
516 | msym = record_minimal_symbol_and_info |
517 | ((char *) sym -> name, symaddr, | |
518 | ms_type, (PTR) size, objfile); | |
519 | #ifdef SOFUN_ADDRESS_MAYBE_MISSING | |
6b14af2b FF |
520 | if (msym != NULL) |
521 | msym->filename = filesymname; | |
2d336b1b | 522 | #endif |
2670f34d | 523 | } |
a7446af6 FF |
524 | } |
525 | do_cleanups (back_to); | |
526 | } | |
527 | } | |
528 | ||
35f5886e FF |
529 | /* Scan and build partial symbols for a symbol file. |
530 | We have been initialized by a call to elf_symfile_init, which | |
531 | currently does nothing. | |
532 | ||
2670f34d JG |
533 | SECTION_OFFSETS is a set of offsets to apply to relocate the symbols |
534 | in each section. We simplify it down to a single offset for all | |
535 | symbols. FIXME. | |
35f5886e FF |
536 | |
537 | MAINLINE is true if we are reading the main symbol | |
538 | table (as opposed to a shared lib or dynamically loaded file). | |
539 | ||
540 | This function only does the minimum work necessary for letting the | |
541 | user "name" things symbolically; it does not read the entire symtab. | |
542 | Instead, it reads the external and static symbols and puts them in partial | |
543 | symbol tables. When more extensive information is requested of a | |
544 | file, the corresponding partial symbol table is mutated into a full | |
545 | fledged symbol table by going back and reading the symbols | |
346168a2 JG |
546 | for real. |
547 | ||
548 | We look for sections with specific names, to tell us what debug | |
549 | format to look for: FIXME!!! | |
550 | ||
551 | dwarf_build_psymtabs() builds psymtabs for DWARF symbols; | |
e03c0cc6 ILT |
552 | elfstab_build_psymtabs() handles STABS symbols; |
553 | mdebug_build_psymtabs() handles ECOFF debugging information. | |
a7446af6 FF |
554 | |
555 | Note that ELF files have a "minimal" symbol table, which looks a lot | |
556 | like a COFF symbol table, but has only the minimal information necessary | |
346168a2 JG |
557 | for linking. We process this also, and use the information to |
558 | build gdb's minimal symbol table. This gives us some minimal debugging | |
559 | capability even for files compiled without -g. */ | |
35f5886e FF |
560 | |
561 | static void | |
2670f34d | 562 | elf_symfile_read (objfile, section_offsets, mainline) |
80d68b1d | 563 | struct objfile *objfile; |
2670f34d | 564 | struct section_offsets *section_offsets; |
1ab3bf1b | 565 | int mainline; |
35f5886e | 566 | { |
80d68b1d | 567 | bfd *abfd = objfile->obfd; |
35f5886e | 568 | struct elfinfo ei; |
a7446af6 | 569 | struct cleanup *back_to; |
346168a2 | 570 | CORE_ADDR offset; |
35f5886e | 571 | |
1ab3bf1b JG |
572 | init_minimal_symbol_collection (); |
573 | back_to = make_cleanup (discard_minimal_symbols, 0); | |
a7446af6 | 574 | |
2670f34d | 575 | memset ((char *) &ei, 0, sizeof (ei)); |
6b801388 | 576 | |
2670f34d | 577 | /* Allocate struct to keep track of the symfile */ |
965a5c32 | 578 | objfile->sym_stab_info = (PTR) |
2670f34d | 579 | xmmalloc (objfile -> md, sizeof (struct dbx_symfile_info)); |
965a5c32 | 580 | memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info)); |
2670f34d | 581 | make_cleanup (free_elfinfo, (PTR) objfile); |
6b801388 | 582 | |
2670f34d | 583 | /* Process the normal ELF symbol table first. This may write some |
965a5c32 | 584 | chain of info into the dbx_symfile_info in objfile->sym_stab_info, |
2670f34d | 585 | which can later be used by elfstab_offset_sections. */ |
a7446af6 | 586 | |
2670f34d JG |
587 | /* FIXME, should take a section_offsets param, not just an offset. */ |
588 | offset = ANOFFSET (section_offsets, 0); | |
0683ac4b PS |
589 | elf_symtab_read (abfd, offset, objfile, 0); |
590 | ||
6d9b8a93 | 591 | /* Add the dynamic symbols. */ |
0683ac4b | 592 | |
6d9b8a93 | 593 | elf_symtab_read (abfd, offset, objfile, 1); |
a7446af6 | 594 | |
346168a2 | 595 | /* Now process debugging information, which is contained in |
a7446af6 FF |
596 | special ELF sections. We first have to find them... */ |
597 | ||
1ab3bf1b | 598 | bfd_map_over_sections (abfd, elf_locate_sections, (PTR) &ei); |
35f5886e FF |
599 | if (ei.dboffset && ei.lnoffset) |
600 | { | |
346168a2 | 601 | /* DWARF sections */ |
d5931d79 | 602 | dwarf_build_psymtabs (objfile, |
2670f34d | 603 | section_offsets, mainline, |
35f5886e | 604 | ei.dboffset, ei.dbsize, |
d5931d79 | 605 | ei.lnoffset, ei.lnsize); |
35f5886e | 606 | } |
346168a2 JG |
607 | if (ei.stabsect) |
608 | { | |
8e3ff823 SS |
609 | asection *str_sect; |
610 | ||
611 | /* Stab sections have an associated string table that looks like | |
612 | a separate section. */ | |
613 | str_sect = bfd_get_section_by_name (abfd, ".stabstr"); | |
614 | ||
615 | /* FIXME should probably warn about a stab section without a stabstr. */ | |
616 | if (str_sect) | |
346168a2 | 617 | elfstab_build_psymtabs (objfile, |
8e3ff823 SS |
618 | section_offsets, |
619 | mainline, | |
620 | ei.stabsect->filepos, | |
621 | bfd_section_size (abfd, ei.stabsect), | |
622 | str_sect->filepos, | |
623 | bfd_section_size (abfd, str_sect)); | |
346168a2 | 624 | } |
e03c0cc6 ILT |
625 | if (ei.mdebugsect) |
626 | { | |
627 | const struct ecoff_debug_swap *swap; | |
628 | ||
629 | /* .mdebug section, presumably holding ECOFF debugging | |
630 | information. */ | |
631 | swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap; | |
632 | if (swap) | |
633 | elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect, | |
634 | section_offsets); | |
635 | } | |
a7446af6 | 636 | |
1ab3bf1b JG |
637 | /* Install any minimal symbols that have been collected as the current |
638 | minimal symbols for this objfile. */ | |
639 | ||
80d68b1d | 640 | install_minimal_symbols (objfile); |
1ab3bf1b | 641 | |
a7446af6 | 642 | do_cleanups (back_to); |
35f5886e FF |
643 | } |
644 | ||
965a5c32 | 645 | /* This cleans up the objfile's sym_stab_info pointer, and the chain of |
2670f34d JG |
646 | stab_section_info's, that might be dangling from it. */ |
647 | ||
648 | static void | |
649 | free_elfinfo (objp) | |
650 | PTR objp; | |
651 | { | |
652 | struct objfile *objfile = (struct objfile *)objp; | |
653 | struct dbx_symfile_info *dbxinfo = (struct dbx_symfile_info *) | |
965a5c32 | 654 | objfile->sym_stab_info; |
2670f34d JG |
655 | struct stab_section_info *ssi, *nssi; |
656 | ||
657 | ssi = dbxinfo->stab_section_info; | |
658 | while (ssi) | |
659 | { | |
660 | nssi = ssi->next; | |
661 | mfree (objfile->md, ssi); | |
662 | ssi = nssi; | |
663 | } | |
664 | ||
665 | dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */ | |
666 | } | |
667 | ||
668 | ||
35f5886e FF |
669 | /* Initialize anything that needs initializing when a completely new symbol |
670 | file is specified (not just adding some symbols from another file, e.g. a | |
671 | shared library). | |
672 | ||
346168a2 | 673 | We reinitialize buildsym, since we may be reading stabs from an ELF file. */ |
35f5886e FF |
674 | |
675 | static void | |
be772100 JG |
676 | elf_new_init (ignore) |
677 | struct objfile *ignore; | |
80d68b1d | 678 | { |
d07734e3 | 679 | stabsread_new_init (); |
80d68b1d FF |
680 | buildsym_new_init (); |
681 | } | |
682 | ||
683 | /* Perform any local cleanups required when we are done with a particular | |
684 | objfile. I.E, we are in the process of discarding all symbol information | |
685 | for an objfile, freeing up all memory held for it, and unlinking the | |
686 | objfile struct from the global list of known objfiles. */ | |
687 | ||
688 | static void | |
689 | elf_symfile_finish (objfile) | |
690 | struct objfile *objfile; | |
35f5886e | 691 | { |
965a5c32 | 692 | if (objfile -> sym_stab_info != NULL) |
80d68b1d | 693 | { |
965a5c32 | 694 | mfree (objfile -> md, objfile -> sym_stab_info); |
80d68b1d | 695 | } |
35f5886e FF |
696 | } |
697 | ||
698 | /* ELF specific initialization routine for reading symbols. | |
699 | ||
700 | It is passed a pointer to a struct sym_fns which contains, among other | |
701 | things, the BFD for the file whose symbols are being read, and a slot for | |
702 | a pointer to "private data" which we can fill with goodies. | |
703 | ||
704 | For now at least, we have nothing in particular to do, so this function is | |
705 | just a stub. */ | |
706 | ||
707 | static void | |
be772100 JG |
708 | elf_symfile_init (ignore) |
709 | struct objfile *ignore; | |
35f5886e FF |
710 | { |
711 | } | |
712 | ||
2670f34d JG |
713 | /* ELF specific parsing routine for section offsets. |
714 | ||
715 | Plain and simple for now. */ | |
716 | ||
717 | static | |
718 | struct section_offsets * | |
719 | elf_symfile_offsets (objfile, addr) | |
720 | struct objfile *objfile; | |
721 | CORE_ADDR addr; | |
722 | { | |
723 | struct section_offsets *section_offsets; | |
724 | int i; | |
4d57c599 JK |
725 | |
726 | objfile->num_sections = SECT_OFF_MAX; | |
2670f34d JG |
727 | section_offsets = (struct section_offsets *) |
728 | obstack_alloc (&objfile -> psymbol_obstack, | |
4d57c599 JK |
729 | sizeof (struct section_offsets) |
730 | + sizeof (section_offsets->offsets) * (SECT_OFF_MAX-1)); | |
2670f34d JG |
731 | |
732 | for (i = 0; i < SECT_OFF_MAX; i++) | |
733 | ANOFFSET (section_offsets, i) = addr; | |
4d57c599 | 734 | |
2670f34d JG |
735 | return section_offsets; |
736 | } | |
737 | \f | |
738 | /* When handling an ELF file that contains Sun STABS debug info, | |
739 | some of the debug info is relative to the particular chunk of the | |
740 | section that was generated in its individual .o file. E.g. | |
741 | offsets to static variables are relative to the start of the data | |
742 | segment *for that module before linking*. This information is | |
743 | painfully squirreled away in the ELF symbol table as local symbols | |
744 | with wierd names. Go get 'em when needed. */ | |
745 | ||
746 | void | |
747 | elfstab_offset_sections (objfile, pst) | |
748 | struct objfile *objfile; | |
749 | struct partial_symtab *pst; | |
750 | { | |
751 | char *filename = pst->filename; | |
752 | struct dbx_symfile_info *dbx = (struct dbx_symfile_info *) | |
965a5c32 | 753 | objfile->sym_stab_info; |
2670f34d JG |
754 | struct stab_section_info *maybe = dbx->stab_section_info; |
755 | struct stab_section_info *questionable = 0; | |
756 | int i; | |
757 | char *p; | |
758 | ||
759 | /* The ELF symbol info doesn't include path names, so strip the path | |
760 | (if any) from the psymtab filename. */ | |
761 | while (0 != (p = strchr (filename, '/'))) | |
762 | filename = p+1; | |
763 | ||
764 | /* FIXME: This linear search could speed up significantly | |
765 | if it was chained in the right order to match how we search it, | |
766 | and if we unchained when we found a match. */ | |
767 | for (; maybe; maybe = maybe->next) | |
768 | { | |
769 | if (filename[0] == maybe->filename[0] | |
2e4964ad | 770 | && STREQ (filename, maybe->filename)) |
2670f34d JG |
771 | { |
772 | /* We found a match. But there might be several source files | |
773 | (from different directories) with the same name. */ | |
774 | if (0 == maybe->found) | |
775 | break; | |
776 | questionable = maybe; /* Might use it later. */ | |
777 | } | |
778 | } | |
779 | ||
780 | if (maybe == 0 && questionable != 0) | |
781 | { | |
782 | complain (&stab_info_questionable_complaint, filename); | |
783 | maybe = questionable; | |
784 | } | |
785 | ||
786 | if (maybe) | |
787 | { | |
788 | /* Found it! Allocate a new psymtab struct, and fill it in. */ | |
789 | maybe->found++; | |
790 | pst->section_offsets = (struct section_offsets *) | |
791 | obstack_alloc (&objfile -> psymbol_obstack, | |
792 | sizeof (struct section_offsets) + | |
793 | sizeof (pst->section_offsets->offsets) * (SECT_OFF_MAX-1)); | |
794 | ||
795 | for (i = 0; i < SECT_OFF_MAX; i++) | |
796 | ANOFFSET (pst->section_offsets, i) = maybe->sections[i]; | |
797 | return; | |
798 | } | |
799 | ||
800 | /* We were unable to find any offsets for this file. Complain. */ | |
801 | if (dbx->stab_section_info) /* If there *is* any info, */ | |
802 | complain (&stab_info_mismatch_complaint, filename); | |
803 | } | |
35f5886e | 804 | \f |
4d57c599 | 805 | /* Register that we are able to handle ELF object file formats. */ |
35f5886e | 806 | |
80d68b1d FF |
807 | static struct sym_fns elf_sym_fns = |
808 | { | |
0eed42de | 809 | bfd_target_elf_flavour, |
35f5886e FF |
810 | elf_new_init, /* sym_new_init: init anything gbl to entire symtab */ |
811 | elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */ | |
812 | elf_symfile_read, /* sym_read: read a symbol file into symtab */ | |
80d68b1d | 813 | elf_symfile_finish, /* sym_finish: finished with file, cleanup */ |
2670f34d | 814 | elf_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */ |
35f5886e FF |
815 | NULL /* next: pointer to next struct sym_fns */ |
816 | }; | |
817 | ||
818 | void | |
1ab3bf1b | 819 | _initialize_elfread () |
35f5886e FF |
820 | { |
821 | add_symtab_fns (&elf_sym_fns); | |
822 | } |