* coffread.c: Remove redundant static declarations. Replace
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
b6ba6518 2 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000,
181c1381 3 2001, 2002
8e65ff28 4 Free Software Foundation, Inc.
c906108c
SS
5 Written by Fred Fish at Cygnus Support.
6
c5aa993b 7 This file is part of GDB.
c906108c 8
c5aa993b
JM
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
c906108c 13
c5aa993b
JM
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
c906108c 18
c5aa993b
JM
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 59 Temple Place - Suite 330,
22 Boston, MA 02111-1307, USA. */
c906108c
SS
23
24#include "defs.h"
25#include "bfd.h"
26#include "gdb_string.h"
27#include "elf-bfd.h"
28#include "elf/mips.h"
29#include "symtab.h"
30#include "symfile.h"
31#include "objfiles.h"
32#include "buildsym.h"
33#include "stabsread.h"
34#include "gdb-stabs.h"
35#include "complaints.h"
36#include "demangle.h"
37
a14ed312 38extern void _initialize_elfread (void);
392a587b 39
c906108c 40/* The struct elfinfo is available only during ELF symbol table and
6426a772 41 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
42 It's local to elf_symfile_read. */
43
c5aa993b
JM
44struct elfinfo
45 {
46 file_ptr dboffset; /* Offset to dwarf debug section */
47 unsigned int dbsize; /* Size of dwarf debug section */
48 file_ptr lnoffset; /* Offset to dwarf line number section */
49 unsigned int lnsize; /* Size of dwarf line number section */
50 asection *stabsect; /* Section pointer for .stab section */
51 asection *stabindexsect; /* Section pointer for .stab.index section */
52 asection *mdebugsect; /* Section pointer for .mdebug section */
53 };
c906108c
SS
54
55/* Various things we might complain about... */
56
c5aa993b
JM
57struct complaint section_info_complaint =
58{"elf/stab section information %s without a preceding file symbol", 0, 0};
c906108c 59
c5aa993b
JM
60struct complaint section_info_dup_complaint =
61{"duplicated elf/stab section information for %s", 0, 0};
c906108c 62
c5aa993b
JM
63struct complaint stab_info_mismatch_complaint =
64{"elf/stab section information missing for %s", 0, 0};
c906108c 65
c5aa993b
JM
66struct complaint stab_info_questionable_complaint =
67{"elf/stab section information questionable for %s", 0, 0};
c906108c 68
12b9c64f 69static void free_elfinfo (void *);
c906108c
SS
70
71/* We are called once per section from elf_symfile_read. We
72 need to examine each section we are passed, check to see
73 if it is something we are interested in processing, and
74 if so, stash away some access information for the section.
75
76 For now we recognize the dwarf debug information sections and
77 line number sections from matching their section names. The
78 ELF definition is no real help here since it has no direct
79 knowledge of DWARF (by design, so any debugging format can be
80 used).
81
82 We also recognize the ".stab" sections used by the Sun compilers
83 released with Solaris 2.
84
85 FIXME: The section names should not be hardwired strings (what
86 should they be? I don't think most object file formats have enough
87 section flags to specify what kind of debug section it is
88 -kingdon). */
89
90static void
12b9c64f 91elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c
SS
92{
93 register struct elfinfo *ei;
94
95 ei = (struct elfinfo *) eip;
c5aa993b 96 if (STREQ (sectp->name, ".debug"))
c906108c 97 {
c5aa993b
JM
98 ei->dboffset = sectp->filepos;
99 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 100 }
c5aa993b 101 else if (STREQ (sectp->name, ".line"))
c906108c 102 {
c5aa993b
JM
103 ei->lnoffset = sectp->filepos;
104 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 105 }
c5aa993b 106 else if (STREQ (sectp->name, ".stab"))
c906108c 107 {
c5aa993b 108 ei->stabsect = sectp;
c906108c 109 }
c5aa993b 110 else if (STREQ (sectp->name, ".stab.index"))
c906108c 111 {
c5aa993b 112 ei->stabindexsect = sectp;
c906108c 113 }
c5aa993b 114 else if (STREQ (sectp->name, ".mdebug"))
c906108c 115 {
c5aa993b 116 ei->mdebugsect = sectp;
c906108c
SS
117 }
118}
119
c5aa993b 120#if 0 /* Currently unused */
c906108c
SS
121
122char *
fba45db2 123elf_interpreter (bfd *abfd)
c906108c
SS
124{
125 sec_ptr interp_sec;
126 unsigned size;
127 char *interp = NULL;
128
129 interp_sec = bfd_get_section_by_name (abfd, ".interp");
130 if (interp_sec)
131 {
132 size = bfd_section_size (abfd, interp_sec);
133 interp = alloca (size);
c5aa993b 134 if (bfd_get_section_contents (abfd, interp_sec, interp, (file_ptr) 0,
c906108c
SS
135 size))
136 {
137 interp = savestring (interp, size - 1);
138 }
139 else
140 {
141 interp = NULL;
142 }
143 }
144 return (interp);
145}
146
147#endif
148
149static struct minimal_symbol *
fba45db2
KB
150record_minimal_symbol_and_info (char *name, CORE_ADDR address,
151 enum minimal_symbol_type ms_type, char *info, /* FIXME, is this really char *? */
152 asection *bfd_section, struct objfile *objfile)
c906108c 153{
bbeae047 154 if (ms_type == mst_text || ms_type == mst_file_text)
181c1381 155 address = SMASH_TEXT_ADDRESS (address);
c906108c
SS
156
157 return prim_record_minimal_symbol_and_info
bbeae047 158 (name, address, ms_type, info, bfd_section->index, bfd_section, objfile);
c906108c
SS
159}
160
161/*
162
c5aa993b 163 LOCAL FUNCTION
c906108c 164
c5aa993b 165 elf_symtab_read -- read the symbol table of an ELF file
c906108c 166
c5aa993b 167 SYNOPSIS
c906108c 168
d4f3574e 169 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 170
c5aa993b 171 DESCRIPTION
c906108c 172
d4f3574e
SS
173 Given an objfile and a flag that specifies whether or not the objfile
174 is for an executable or not (may be shared library for example), add
175 all the global function and data symbols to the minimal symbol table.
c906108c 176
c5aa993b
JM
177 In stabs-in-ELF, as implemented by Sun, there are some local symbols
178 defined in the ELF symbol table, which can be used to locate
179 the beginnings of sections from each ".o" file that was linked to
180 form the executable objfile. We gather any such info and record it
181 in data structures hung off the objfile's private data.
c906108c 182
c5aa993b 183 */
c906108c
SS
184
185static void
fba45db2 186elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
187{
188 long storage_needed;
189 asymbol *sym;
190 asymbol **symbol_table;
191 long number_of_symbols;
192 long i;
193 int index;
194 struct cleanup *back_to;
195 CORE_ADDR symaddr;
d4f3574e 196 CORE_ADDR offset;
c906108c
SS
197 enum minimal_symbol_type ms_type;
198 /* If sectinfo is nonNULL, it contains section info that should end up
199 filed in the objfile. */
200 struct stab_section_info *sectinfo = NULL;
201 /* If filesym is nonzero, it points to a file symbol, but we haven't
202 seen any section info for it yet. */
203 asymbol *filesym = 0;
204#ifdef SOFUN_ADDRESS_MAYBE_MISSING
205 /* Name of filesym, as saved on the symbol_obstack. */
206 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
207#endif
208 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
209 unsigned long size;
d4f3574e 210 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 211
c906108c
SS
212 if (dynamic)
213 {
d4f3574e 214 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
215
216 /* Nothing to be done if there is no dynamic symtab. */
217 if (storage_needed < 0)
218 return;
219 }
220 else
221 {
d4f3574e 222 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 223 if (storage_needed < 0)
d4f3574e 224 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
225 bfd_errmsg (bfd_get_error ()));
226 }
227 if (storage_needed > 0)
228 {
229 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 230 back_to = make_cleanup (xfree, symbol_table);
c906108c 231 if (dynamic)
d4f3574e 232 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
233 symbol_table);
234 else
d4f3574e 235 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 236 if (number_of_symbols < 0)
d4f3574e 237 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 238 bfd_errmsg (bfd_get_error ()));
b8d39351 239
c906108c
SS
240 for (i = 0; i < number_of_symbols; i++)
241 {
242 sym = symbol_table[i];
c5aa993b 243 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
244 {
245 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 246 that are null strings (may happen). */
c906108c
SS
247 continue;
248 }
249
b8d39351 250 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 251 if (dynamic
c5aa993b
JM
252 && sym->section == &bfd_und_section
253 && (sym->flags & BSF_FUNCTION))
c906108c
SS
254 {
255 struct minimal_symbol *msym;
256
257 /* Symbol is a reference to a function defined in
c5aa993b
JM
258 a shared library.
259 If its value is non zero then it is usually the address
260 of the corresponding entry in the procedure linkage table,
d4f3574e 261 plus the desired section offset.
c5aa993b
JM
262 If its value is zero then the dynamic linker has to resolve
263 the symbol. We are unable to find any meaningful address
264 for this symbol in the executable file, so we skip it. */
265 symaddr = sym->value;
c906108c
SS
266 if (symaddr == 0)
267 continue;
d4f3574e 268 symaddr += offset;
c906108c 269 msym = record_minimal_symbol_and_info
c5aa993b
JM
270 ((char *) sym->name, symaddr,
271 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
272#ifdef SOFUN_ADDRESS_MAYBE_MISSING
273 if (msym != NULL)
274 msym->filename = filesymname;
275#endif
276 continue;
277 }
278
279 /* If it is a nonstripped executable, do not enter dynamic
280 symbols, as the dynamic symbol table is usually a subset
281 of the main symbol table. */
282 if (dynamic && !stripped)
283 continue;
c5aa993b 284 if (sym->flags & BSF_FILE)
c906108c
SS
285 {
286 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 287 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
288 if (sectinfo != NULL)
289 {
c5aa993b
JM
290 sectinfo->next = dbx->stab_section_info;
291 dbx->stab_section_info = sectinfo;
c906108c
SS
292 sectinfo = NULL;
293 }
294 filesym = sym;
295#ifdef SOFUN_ADDRESS_MAYBE_MISSING
296 filesymname =
c5aa993b 297 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
298 &objfile->symbol_obstack);
299#endif
300 }
c5aa993b 301 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
302 {
303 struct minimal_symbol *msym;
304
305 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
306 symbols in their own section, so all symbols we are
307 interested in will have a section. */
c906108c 308 /* Bfd symbols are section relative. */
c5aa993b 309 symaddr = sym->value + sym->section->vma;
d4f3574e 310 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 311 if (sym->section != &bfd_abs_section)
c906108c 312 {
d4f3574e 313 symaddr += offset;
c906108c
SS
314 }
315 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
316 they are relative to, to intuit text/data. Bfd provides
317 no way of figuring this out for absolute symbols. */
318 if (sym->section == &bfd_abs_section)
c906108c
SS
319 {
320 /* This is a hack to get the minimal symbol type
11cf8741 321 right for Irix 5, which has absolute addresses
c906108c
SS
322 with special section indices for dynamic symbols. */
323 unsigned short shndx =
c5aa993b 324 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
325
326 switch (shndx)
327 {
328 case SHN_MIPS_TEXT:
329 ms_type = mst_text;
330 break;
331 case SHN_MIPS_DATA:
332 ms_type = mst_data;
333 break;
334 case SHN_MIPS_ACOMMON:
335 ms_type = mst_bss;
336 break;
337 default:
338 ms_type = mst_abs;
339 }
340
341 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 342 symbols, relocate all others by section offset. */
c906108c
SS
343 if (ms_type != mst_abs)
344 {
345 if (sym->name[0] == '.')
346 continue;
d4f3574e 347 symaddr += offset;
c906108c
SS
348 }
349 }
c5aa993b 350 else if (sym->section->flags & SEC_CODE)
c906108c 351 {
c5aa993b 352 if (sym->flags & BSF_GLOBAL)
c906108c
SS
353 {
354 ms_type = mst_text;
355 }
356 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 357 || ((sym->flags & BSF_LOCAL)
c906108c
SS
358 && sym->name[0] == '$'
359 && sym->name[1] == 'L'))
360 /* Looks like a compiler-generated label. Skip it.
361 The assembler should be skipping these (to keep
362 executables small), but apparently with gcc on the
363 delta m88k SVR4, it loses. So to have us check too
364 should be harmless (but I encourage people to fix this
365 in the assembler instead of adding checks here). */
366 continue;
367#ifdef HARRIS_TARGET
368 else if (sym->name[0] == '.' && sym->name[1] == '.')
369 {
370 /* Looks like a Harris compiler generated label for the
c5aa993b
JM
371 purpose of marking instructions that are relevant to
372 DWARF dies. The assembler can't get rid of these
373 because they are relocatable addresses that the
374 linker needs to resolve. */
c906108c
SS
375 continue;
376 }
c5aa993b 377#endif
c906108c
SS
378 else
379 {
380 ms_type = mst_file_text;
381 }
382 }
c5aa993b 383 else if (sym->section->flags & SEC_ALLOC)
c906108c 384 {
bbeae047 385 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 386 {
c5aa993b 387 if (sym->section->flags & SEC_LOAD)
c906108c
SS
388 {
389 ms_type = mst_data;
390 }
391 else
392 {
393 ms_type = mst_bss;
394 }
395 }
c5aa993b 396 else if (sym->flags & BSF_LOCAL)
c906108c
SS
397 {
398 /* Named Local variable in a Data section. Check its
c5aa993b
JM
399 name for stabs-in-elf. The STREQ macro checks the
400 first character inline, so we only actually do a
401 strcmp function call on names that start with 'B'
402 or 'D' */
c906108c 403 index = SECT_OFF_MAX;
c5aa993b 404 if (STREQ ("Bbss.bss", sym->name))
c906108c 405 {
b8fbeb18 406 index = SECT_OFF_BSS (objfile);
c906108c 407 }
c5aa993b 408 else if (STREQ ("Ddata.data", sym->name))
c906108c 409 {
b8fbeb18 410 index = SECT_OFF_DATA (objfile);
c906108c 411 }
c5aa993b 412 else if (STREQ ("Drodata.rodata", sym->name))
c906108c 413 {
b8fbeb18 414 index = SECT_OFF_RODATA (objfile);
c906108c
SS
415 }
416 if (index != SECT_OFF_MAX)
417 {
418 /* Found a special local symbol. Allocate a
419 sectinfo, if needed, and fill it in. */
420 if (sectinfo == NULL)
421 {
422 sectinfo = (struct stab_section_info *)
c5aa993b 423 xmmalloc (objfile->md, sizeof (*sectinfo));
12b9c64f
AO
424 memset (sectinfo, 0,
425 sizeof (*sectinfo));
c906108c
SS
426 if (filesym == NULL)
427 {
428 complain (&section_info_complaint,
c5aa993b 429 sym->name);
c906108c
SS
430 }
431 else
432 {
c5aa993b
JM
433 sectinfo->filename =
434 (char *) filesym->name;
c906108c
SS
435 }
436 }
a4c8257b
EZ
437 if (index != -1)
438 {
439 if (sectinfo->sections[index] != 0)
440 {
441 complain (&section_info_dup_complaint,
442 sectinfo->filename);
443 }
c906108c 444 }
a4c8257b 445 else
8e65ff28
AC
446 internal_error (__FILE__, __LINE__,
447 "Section index uninitialized.");
c906108c 448 /* Bfd symbols are section relative. */
c5aa993b 449 symaddr = sym->value + sym->section->vma;
d4f3574e 450 /* Relocate non-absolute symbols by the section offset. */
c5aa993b 451 if (sym->section != &bfd_abs_section)
c906108c 452 {
d4f3574e 453 symaddr += offset;
c906108c 454 }
a4c8257b
EZ
455 if (index != -1)
456 sectinfo->sections[index] = symaddr;
457 else
8e65ff28
AC
458 internal_error (__FILE__, __LINE__,
459 "Section index uninitialized.");
c906108c
SS
460 /* The special local symbols don't go in the
461 minimal symbol table, so ignore this one. */
462 continue;
463 }
464 /* Not a special stabs-in-elf symbol, do regular
c5aa993b
JM
465 symbol processing. */
466 if (sym->section->flags & SEC_LOAD)
c906108c
SS
467 {
468 ms_type = mst_file_data;
469 }
470 else
471 {
472 ms_type = mst_file_bss;
473 }
474 }
475 else
476 {
477 ms_type = mst_unknown;
478 }
479 }
480 else
481 {
482 /* FIXME: Solaris2 shared libraries include lots of
483 odd "absolute" and "undefined" symbols, that play
484 hob with actions like finding what function the PC
485 is in. Ignore them if they aren't text, data, or bss. */
486 /* ms_type = mst_unknown; */
c5aa993b 487 continue; /* Skip this symbol. */
c906108c
SS
488 }
489 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 490 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 491 msym = record_minimal_symbol_and_info
c5aa993b 492 ((char *) sym->name, symaddr,
12b9c64f 493 ms_type, (void *) size, sym->section, objfile);
c906108c
SS
494#ifdef SOFUN_ADDRESS_MAYBE_MISSING
495 if (msym != NULL)
496 msym->filename = filesymname;
497#endif
c5aa993b 498 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
499 }
500 }
501 do_cleanups (back_to);
502 }
503}
504
505/* Scan and build partial symbols for a symbol file.
506 We have been initialized by a call to elf_symfile_init, which
507 currently does nothing.
508
509 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
510 in each section. We simplify it down to a single offset for all
511 symbols. FIXME.
512
513 MAINLINE is true if we are reading the main symbol
514 table (as opposed to a shared lib or dynamically loaded file).
515
516 This function only does the minimum work necessary for letting the
517 user "name" things symbolically; it does not read the entire symtab.
518 Instead, it reads the external and static symbols and puts them in partial
519 symbol tables. When more extensive information is requested of a
520 file, the corresponding partial symbol table is mutated into a full
521 fledged symbol table by going back and reading the symbols
522 for real.
523
524 We look for sections with specific names, to tell us what debug
525 format to look for: FIXME!!!
526
527 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
528 elfstab_build_psymtabs() handles STABS symbols;
529 mdebug_build_psymtabs() handles ECOFF debugging information.
530
531 Note that ELF files have a "minimal" symbol table, which looks a lot
532 like a COFF symbol table, but has only the minimal information necessary
533 for linking. We process this also, and use the information to
534 build gdb's minimal symbol table. This gives us some minimal debugging
535 capability even for files compiled without -g. */
536
537static void
fba45db2 538elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
539{
540 bfd *abfd = objfile->obfd;
541 struct elfinfo ei;
542 struct cleanup *back_to;
543 CORE_ADDR offset;
544
545 init_minimal_symbol_collection ();
56e290f4 546 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
547
548 memset ((char *) &ei, 0, sizeof (ei));
549
550 /* Allocate struct to keep track of the symfile */
551 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 552 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c 553 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 554 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
555
556 /* Process the normal ELF symbol table first. This may write some
557 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
558 which can later be used by elfstab_offset_sections. */
559
d4f3574e 560 elf_symtab_read (objfile, 0);
c906108c
SS
561
562 /* Add the dynamic symbols. */
563
d4f3574e 564 elf_symtab_read (objfile, 1);
c906108c
SS
565
566 /* Now process debugging information, which is contained in
567 special ELF sections. */
568
569 /* If we are reinitializing, or if we have never loaded syms yet,
570 set table to empty. MAINLINE is cleared so that *_read_psymtab
571 functions do not all also re-initialize the psymbol table. */
572 if (mainline)
573 {
574 init_psymbol_list (objfile, 0);
575 mainline = 0;
576 }
577
578 /* We first have to find them... */
12b9c64f 579 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
580
581 /* ELF debugging information is inserted into the psymtab in the
582 order of least informative first - most informative last. Since
583 the psymtab table is searched `most recent insertion first' this
584 increases the probability that more detailed debug information
585 for a section is found.
586
587 For instance, an object file might contain both .mdebug (XCOFF)
588 and .debug_info (DWARF2) sections then .mdebug is inserted first
589 (searched last) and DWARF2 is inserted last (searched first). If
590 we don't do this then the XCOFF info is found first - for code in
591 an included file XCOFF info is useless. */
592
593 if (ei.mdebugsect)
594 {
595 const struct ecoff_debug_swap *swap;
596
597 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 598 information. */
c906108c
SS
599 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
600 if (swap)
d4f3574e 601 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
602 }
603 if (ei.stabsect)
604 {
605 asection *str_sect;
606
607 /* Stab sections have an associated string table that looks like
c5aa993b 608 a separate section. */
c906108c
SS
609 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
610
611 /* FIXME should probably warn about a stab section without a stabstr. */
612 if (str_sect)
613 elfstab_build_psymtabs (objfile,
c906108c
SS
614 mainline,
615 ei.stabsect->filepos,
616 bfd_section_size (abfd, ei.stabsect),
617 str_sect->filepos,
618 bfd_section_size (abfd, str_sect));
619 }
620 if (dwarf2_has_info (abfd))
621 {
622 /* DWARF 2 sections */
d4f3574e 623 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
624 }
625 else if (ei.dboffset && ei.lnoffset)
626 {
627 /* DWARF sections */
628 dwarf_build_psymtabs (objfile,
d4f3574e 629 mainline,
c906108c
SS
630 ei.dboffset, ei.dbsize,
631 ei.lnoffset, ei.lnsize);
632 }
633
b6af0555
JS
634 if (DWARF2_BUILD_FRAME_INFO_P ())
635 DWARF2_BUILD_FRAME_INFO(objfile);
636
c906108c
SS
637 /* Install any minimal symbols that have been collected as the current
638 minimal symbols for this objfile. */
639
640 install_minimal_symbols (objfile);
641
642 do_cleanups (back_to);
643}
644
645/* This cleans up the objfile's sym_stab_info pointer, and the chain of
646 stab_section_info's, that might be dangling from it. */
647
648static void
12b9c64f 649free_elfinfo (void *objp)
c906108c 650{
c5aa993b 651 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
652 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
653 struct stab_section_info *ssi, *nssi;
654
655 ssi = dbxinfo->stab_section_info;
656 while (ssi)
657 {
658 nssi = ssi->next;
aac7f4ea 659 xmfree (objfile->md, ssi);
c906108c
SS
660 ssi = nssi;
661 }
662
663 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
664}
665
666
667/* Initialize anything that needs initializing when a completely new symbol
668 file is specified (not just adding some symbols from another file, e.g. a
669 shared library).
670
671 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
672
673static void
fba45db2 674elf_new_init (struct objfile *ignore)
c906108c
SS
675{
676 stabsread_new_init ();
677 buildsym_new_init ();
678}
679
680/* Perform any local cleanups required when we are done with a particular
681 objfile. I.E, we are in the process of discarding all symbol information
682 for an objfile, freeing up all memory held for it, and unlinking the
683 objfile struct from the global list of known objfiles. */
684
685static void
fba45db2 686elf_symfile_finish (struct objfile *objfile)
c906108c 687{
c5aa993b 688 if (objfile->sym_stab_info != NULL)
c906108c 689 {
aac7f4ea 690 xmfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
691 }
692}
693
694/* ELF specific initialization routine for reading symbols.
695
696 It is passed a pointer to a struct sym_fns which contains, among other
697 things, the BFD for the file whose symbols are being read, and a slot for
698 a pointer to "private data" which we can fill with goodies.
699
700 For now at least, we have nothing in particular to do, so this function is
701 just a stub. */
702
703static void
fba45db2 704elf_symfile_init (struct objfile *objfile)
c906108c
SS
705{
706 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
707 find this causes a significant slowdown in gdb then we could
708 set it in the debug symbol readers only when necessary. */
709 objfile->flags |= OBJF_REORDERED;
710}
711
712/* When handling an ELF file that contains Sun STABS debug info,
713 some of the debug info is relative to the particular chunk of the
714 section that was generated in its individual .o file. E.g.
715 offsets to static variables are relative to the start of the data
716 segment *for that module before linking*. This information is
717 painfully squirreled away in the ELF symbol table as local symbols
718 with wierd names. Go get 'em when needed. */
719
720void
fba45db2 721elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
722{
723 char *filename = pst->filename;
724 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
725 struct stab_section_info *maybe = dbx->stab_section_info;
726 struct stab_section_info *questionable = 0;
727 int i;
728 char *p;
729
730 /* The ELF symbol info doesn't include path names, so strip the path
731 (if any) from the psymtab filename. */
732 while (0 != (p = strchr (filename, '/')))
c5aa993b 733 filename = p + 1;
c906108c
SS
734
735 /* FIXME: This linear search could speed up significantly
736 if it was chained in the right order to match how we search it,
737 and if we unchained when we found a match. */
738 for (; maybe; maybe = maybe->next)
739 {
740 if (filename[0] == maybe->filename[0]
741 && STREQ (filename, maybe->filename))
742 {
743 /* We found a match. But there might be several source files
744 (from different directories) with the same name. */
745 if (0 == maybe->found)
746 break;
c5aa993b 747 questionable = maybe; /* Might use it later. */
c906108c
SS
748 }
749 }
750
751 if (maybe == 0 && questionable != 0)
752 {
753 complain (&stab_info_questionable_complaint, filename);
754 maybe = questionable;
755 }
756
757 if (maybe)
758 {
759 /* Found it! Allocate a new psymtab struct, and fill it in. */
760 maybe->found++;
761 pst->section_offsets = (struct section_offsets *)
96baa820 762 obstack_alloc (&objfile->psymbol_obstack, SIZEOF_SECTION_OFFSETS);
c906108c 763 for (i = 0; i < SECT_OFF_MAX; i++)
a4c8257b 764 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
765 return;
766 }
767
768 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 769 if (dbx->stab_section_info) /* If there *is* any info, */
c906108c
SS
770 complain (&stab_info_mismatch_complaint, filename);
771}
772\f
773/* Register that we are able to handle ELF object file formats. */
774
775static struct sym_fns elf_sym_fns =
776{
777 bfd_target_elf_flavour,
c5aa993b
JM
778 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
779 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
780 elf_symfile_read, /* sym_read: read a symbol file into symtab */
781 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 782 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 783 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
784};
785
786void
fba45db2 787_initialize_elfread (void)
c906108c
SS
788{
789 add_symtab_fns (&elf_sym_fns);
790}
This page took 0.223716 seconds and 4 git commands to generate.