Do not run for targets which do not support shared objects.
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b
AC
2
3 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
4 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
5
c906108c
SS
6 Written by Fred Fish at Cygnus Support.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b
JM
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 59 Temple Place - Suite 330,
23 Boston, MA 02111-1307, USA. */
c906108c
SS
24
25#include "defs.h"
26#include "bfd.h"
27#include "gdb_string.h"
28#include "elf-bfd.h"
29#include "elf/mips.h"
30#include "symtab.h"
31#include "symfile.h"
32#include "objfiles.h"
33#include "buildsym.h"
34#include "stabsread.h"
35#include "gdb-stabs.h"
36#include "complaints.h"
37#include "demangle.h"
38
a14ed312 39extern void _initialize_elfread (void);
392a587b 40
c906108c 41/* The struct elfinfo is available only during ELF symbol table and
6426a772 42 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
43 It's local to elf_symfile_read. */
44
c5aa993b
JM
45struct elfinfo
46 {
47 file_ptr dboffset; /* Offset to dwarf debug section */
48 unsigned int dbsize; /* Size of dwarf debug section */
49 file_ptr lnoffset; /* Offset to dwarf line number section */
50 unsigned int lnsize; /* Size of dwarf line number section */
51 asection *stabsect; /* Section pointer for .stab section */
52 asection *stabindexsect; /* Section pointer for .stab.index section */
53 asection *mdebugsect; /* Section pointer for .mdebug section */
54 };
c906108c 55
12b9c64f 56static void free_elfinfo (void *);
c906108c
SS
57
58/* We are called once per section from elf_symfile_read. We
59 need to examine each section we are passed, check to see
60 if it is something we are interested in processing, and
61 if so, stash away some access information for the section.
62
63 For now we recognize the dwarf debug information sections and
64 line number sections from matching their section names. The
65 ELF definition is no real help here since it has no direct
66 knowledge of DWARF (by design, so any debugging format can be
67 used).
68
69 We also recognize the ".stab" sections used by the Sun compilers
70 released with Solaris 2.
71
72 FIXME: The section names should not be hardwired strings (what
73 should they be? I don't think most object file formats have enough
74 section flags to specify what kind of debug section it is
75 -kingdon). */
76
77static void
12b9c64f 78elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 79{
52f0bd74 80 struct elfinfo *ei;
c906108c
SS
81
82 ei = (struct elfinfo *) eip;
6314a349 83 if (strcmp (sectp->name, ".debug") == 0)
c906108c 84 {
c5aa993b
JM
85 ei->dboffset = sectp->filepos;
86 ei->dbsize = bfd_get_section_size_before_reloc (sectp);
c906108c 87 }
6314a349 88 else if (strcmp (sectp->name, ".line") == 0)
c906108c 89 {
c5aa993b
JM
90 ei->lnoffset = sectp->filepos;
91 ei->lnsize = bfd_get_section_size_before_reloc (sectp);
c906108c 92 }
6314a349 93 else if (strcmp (sectp->name, ".stab") == 0)
c906108c 94 {
c5aa993b 95 ei->stabsect = sectp;
c906108c 96 }
6314a349 97 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 98 {
c5aa993b 99 ei->stabindexsect = sectp;
c906108c 100 }
6314a349 101 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 102 {
c5aa993b 103 ei->mdebugsect = sectp;
c906108c
SS
104 }
105}
106
c906108c 107static struct minimal_symbol *
fba45db2
KB
108record_minimal_symbol_and_info (char *name, CORE_ADDR address,
109 enum minimal_symbol_type ms_type, char *info, /* FIXME, is this really char *? */
110 asection *bfd_section, struct objfile *objfile)
c906108c 111{
bbeae047 112 if (ms_type == mst_text || ms_type == mst_file_text)
181c1381 113 address = SMASH_TEXT_ADDRESS (address);
c906108c
SS
114
115 return prim_record_minimal_symbol_and_info
bbeae047 116 (name, address, ms_type, info, bfd_section->index, bfd_section, objfile);
c906108c
SS
117}
118
119/*
120
c5aa993b 121 LOCAL FUNCTION
c906108c 122
c5aa993b 123 elf_symtab_read -- read the symbol table of an ELF file
c906108c 124
c5aa993b 125 SYNOPSIS
c906108c 126
d4f3574e 127 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 128
c5aa993b 129 DESCRIPTION
c906108c 130
d4f3574e
SS
131 Given an objfile and a flag that specifies whether or not the objfile
132 is for an executable or not (may be shared library for example), add
133 all the global function and data symbols to the minimal symbol table.
c906108c 134
c5aa993b
JM
135 In stabs-in-ELF, as implemented by Sun, there are some local symbols
136 defined in the ELF symbol table, which can be used to locate
137 the beginnings of sections from each ".o" file that was linked to
138 form the executable objfile. We gather any such info and record it
139 in data structures hung off the objfile's private data.
c906108c 140
c5aa993b 141 */
c906108c
SS
142
143static void
fba45db2 144elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
145{
146 long storage_needed;
147 asymbol *sym;
148 asymbol **symbol_table;
149 long number_of_symbols;
150 long i;
c906108c
SS
151 struct cleanup *back_to;
152 CORE_ADDR symaddr;
d4f3574e 153 CORE_ADDR offset;
c906108c
SS
154 enum minimal_symbol_type ms_type;
155 /* If sectinfo is nonNULL, it contains section info that should end up
156 filed in the objfile. */
157 struct stab_section_info *sectinfo = NULL;
158 /* If filesym is nonzero, it points to a file symbol, but we haven't
159 seen any section info for it yet. */
160 asymbol *filesym = 0;
161#ifdef SOFUN_ADDRESS_MAYBE_MISSING
162 /* Name of filesym, as saved on the symbol_obstack. */
163 char *filesymname = obsavestring ("", 0, &objfile->symbol_obstack);
164#endif
165 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
166 unsigned long size;
d4f3574e 167 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 168
c906108c
SS
169 if (dynamic)
170 {
d4f3574e 171 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
172
173 /* Nothing to be done if there is no dynamic symtab. */
174 if (storage_needed < 0)
175 return;
176 }
177 else
178 {
d4f3574e 179 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 180 if (storage_needed < 0)
d4f3574e 181 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c
SS
182 bfd_errmsg (bfd_get_error ()));
183 }
184 if (storage_needed > 0)
185 {
186 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 187 back_to = make_cleanup (xfree, symbol_table);
c906108c 188 if (dynamic)
d4f3574e 189 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
190 symbol_table);
191 else
d4f3574e 192 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 193 if (number_of_symbols < 0)
d4f3574e 194 error ("Can't read symbols from %s: %s", bfd_get_filename (objfile->obfd),
c906108c 195 bfd_errmsg (bfd_get_error ()));
b8d39351 196
c906108c
SS
197 for (i = 0; i < number_of_symbols; i++)
198 {
199 sym = symbol_table[i];
c5aa993b 200 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
201 {
202 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 203 that are null strings (may happen). */
c906108c
SS
204 continue;
205 }
206
b8d39351 207 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 208 if (dynamic
c5aa993b
JM
209 && sym->section == &bfd_und_section
210 && (sym->flags & BSF_FUNCTION))
c906108c
SS
211 {
212 struct minimal_symbol *msym;
213
214 /* Symbol is a reference to a function defined in
c5aa993b
JM
215 a shared library.
216 If its value is non zero then it is usually the address
217 of the corresponding entry in the procedure linkage table,
d4f3574e 218 plus the desired section offset.
c5aa993b
JM
219 If its value is zero then the dynamic linker has to resolve
220 the symbol. We are unable to find any meaningful address
221 for this symbol in the executable file, so we skip it. */
222 symaddr = sym->value;
c906108c
SS
223 if (symaddr == 0)
224 continue;
d4f3574e 225 symaddr += offset;
c906108c 226 msym = record_minimal_symbol_and_info
c5aa993b
JM
227 ((char *) sym->name, symaddr,
228 mst_solib_trampoline, NULL, sym->section, objfile);
c906108c
SS
229#ifdef SOFUN_ADDRESS_MAYBE_MISSING
230 if (msym != NULL)
231 msym->filename = filesymname;
232#endif
233 continue;
234 }
235
236 /* If it is a nonstripped executable, do not enter dynamic
237 symbols, as the dynamic symbol table is usually a subset
238 of the main symbol table. */
239 if (dynamic && !stripped)
240 continue;
c5aa993b 241 if (sym->flags & BSF_FILE)
c906108c
SS
242 {
243 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 244 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
245 if (sectinfo != NULL)
246 {
c5aa993b
JM
247 sectinfo->next = dbx->stab_section_info;
248 dbx->stab_section_info = sectinfo;
c906108c
SS
249 sectinfo = NULL;
250 }
251 filesym = sym;
252#ifdef SOFUN_ADDRESS_MAYBE_MISSING
253 filesymname =
c5aa993b 254 obsavestring ((char *) filesym->name, strlen (filesym->name),
c906108c
SS
255 &objfile->symbol_obstack);
256#endif
257 }
c5aa993b 258 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
259 {
260 struct minimal_symbol *msym;
261
262 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
263 symbols in their own section, so all symbols we are
264 interested in will have a section. */
c906108c 265 /* Bfd symbols are section relative. */
c5aa993b 266 symaddr = sym->value + sym->section->vma;
d4f3574e 267 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 268 if (sym->section != &bfd_abs_section)
c906108c 269 {
d4f3574e 270 symaddr += offset;
c906108c
SS
271 }
272 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
273 they are relative to, to intuit text/data. Bfd provides
274 no way of figuring this out for absolute symbols. */
275 if (sym->section == &bfd_abs_section)
c906108c
SS
276 {
277 /* This is a hack to get the minimal symbol type
11cf8741 278 right for Irix 5, which has absolute addresses
c906108c
SS
279 with special section indices for dynamic symbols. */
280 unsigned short shndx =
c5aa993b 281 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
282
283 switch (shndx)
284 {
285 case SHN_MIPS_TEXT:
286 ms_type = mst_text;
287 break;
288 case SHN_MIPS_DATA:
289 ms_type = mst_data;
290 break;
291 case SHN_MIPS_ACOMMON:
292 ms_type = mst_bss;
293 break;
294 default:
295 ms_type = mst_abs;
296 }
297
298 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 299 symbols, relocate all others by section offset. */
c906108c
SS
300 if (ms_type != mst_abs)
301 {
302 if (sym->name[0] == '.')
303 continue;
d4f3574e 304 symaddr += offset;
c906108c
SS
305 }
306 }
c5aa993b 307 else if (sym->section->flags & SEC_CODE)
c906108c 308 {
389e51db 309 if (sym->flags & BSF_GLOBAL)
c906108c
SS
310 {
311 ms_type = mst_text;
312 }
313 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 314 || ((sym->flags & BSF_LOCAL)
c906108c
SS
315 && sym->name[0] == '$'
316 && sym->name[1] == 'L'))
7fb623f7
AC
317 /* Looks like a compiler-generated label. Skip
318 it. The assembler should be skipping these (to
319 keep executables small), but apparently with
1b831c93
AC
320 gcc on the (deleted) delta m88k SVR4, it loses.
321 So to have us check too should be harmless (but
322 I encourage people to fix this in the assembler
323 instead of adding checks here). */
c906108c 324 continue;
c906108c
SS
325 else
326 {
327 ms_type = mst_file_text;
328 }
329 }
c5aa993b 330 else if (sym->section->flags & SEC_ALLOC)
c906108c 331 {
bbeae047 332 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 333 {
c5aa993b 334 if (sym->section->flags & SEC_LOAD)
c906108c
SS
335 {
336 ms_type = mst_data;
337 }
338 else
339 {
340 ms_type = mst_bss;
341 }
342 }
c5aa993b 343 else if (sym->flags & BSF_LOCAL)
c906108c 344 {
9a90a780
AC
345 /* Named Local variable in a Data section.
346 Check its name for stabs-in-elf. The STREQ
347 macro checks the first character inline, so
348 we only actually do a strcmp function call on
349 names that start with 'B' or 'D'. */
350 int special_local_sect;
351 if (strcmp ("Bbss.bss", sym->name) == 0)
352 special_local_sect = SECT_OFF_BSS (objfile);
353 else if (strcmp ("Ddata.data", sym->name) == 0)
354 special_local_sect = SECT_OFF_DATA (objfile);
355 else if (strcmp ("Drodata.rodata", sym->name) == 0)
356 special_local_sect = SECT_OFF_RODATA (objfile);
357 else
358 special_local_sect = -1;
359 if (special_local_sect >= 0)
c906108c
SS
360 {
361 /* Found a special local symbol. Allocate a
362 sectinfo, if needed, and fill it in. */
363 if (sectinfo == NULL)
364 {
a39a16c4
MM
365 int max_index;
366 size_t size;
367
368 max_index
369 = max (SECT_OFF_BSS (objfile),
370 max (SECT_OFF_DATA (objfile),
371 SECT_OFF_RODATA (objfile)));
e372db49
JB
372
373 /* max_index is the largest index we'll
374 use into this array, so we must
375 allocate max_index+1 elements for it.
376 However, 'struct stab_section_info'
377 already includes one element, so we
378 need to allocate max_index aadditional
379 elements. */
a39a16c4
MM
380 size = (sizeof (struct stab_section_info)
381 + (sizeof (CORE_ADDR)
e372db49 382 * max_index));
c906108c 383 sectinfo = (struct stab_section_info *)
a39a16c4
MM
384 xmmalloc (objfile->md, size);
385 memset (sectinfo, 0, size);
386 sectinfo->num_sections = max_index;
c906108c
SS
387 if (filesym == NULL)
388 {
23136709
KB
389 complaint (&symfile_complaints,
390 "elf/stab section information %s without a preceding file symbol",
391 sym->name);
c906108c
SS
392 }
393 else
394 {
c5aa993b
JM
395 sectinfo->filename =
396 (char *) filesym->name;
c906108c
SS
397 }
398 }
9a90a780
AC
399 if (sectinfo->sections[special_local_sect] != 0)
400 complaint (&symfile_complaints,
401 "duplicated elf/stab section information for %s",
402 sectinfo->filename);
403 /* BFD symbols are section relative. */
c5aa993b 404 symaddr = sym->value + sym->section->vma;
9a90a780
AC
405 /* Relocate non-absolute symbols by the
406 section offset. */
c5aa993b 407 if (sym->section != &bfd_abs_section)
9a90a780
AC
408 symaddr += offset;
409 sectinfo->sections[special_local_sect] = symaddr;
c906108c 410 /* The special local symbols don't go in the
9a90a780 411 minimal symbol table, so ignore this one. */
c906108c
SS
412 continue;
413 }
414 /* Not a special stabs-in-elf symbol, do regular
9a90a780 415 symbol processing. */
c5aa993b 416 if (sym->section->flags & SEC_LOAD)
c906108c
SS
417 {
418 ms_type = mst_file_data;
419 }
420 else
421 {
422 ms_type = mst_file_bss;
423 }
424 }
425 else
426 {
427 ms_type = mst_unknown;
428 }
429 }
430 else
431 {
432 /* FIXME: Solaris2 shared libraries include lots of
433 odd "absolute" and "undefined" symbols, that play
434 hob with actions like finding what function the PC
435 is in. Ignore them if they aren't text, data, or bss. */
436 /* ms_type = mst_unknown; */
c5aa993b 437 continue; /* Skip this symbol. */
c906108c
SS
438 }
439 /* Pass symbol size field in via BFD. FIXME!!! */
c5aa993b 440 size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
c906108c 441 msym = record_minimal_symbol_and_info
c5aa993b 442 ((char *) sym->name, symaddr,
12b9c64f 443 ms_type, (void *) size, sym->section, objfile);
c906108c
SS
444#ifdef SOFUN_ADDRESS_MAYBE_MISSING
445 if (msym != NULL)
446 msym->filename = filesymname;
447#endif
c5aa993b 448 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
449 }
450 }
451 do_cleanups (back_to);
452 }
453}
454
455/* Scan and build partial symbols for a symbol file.
456 We have been initialized by a call to elf_symfile_init, which
457 currently does nothing.
458
459 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
460 in each section. We simplify it down to a single offset for all
461 symbols. FIXME.
462
463 MAINLINE is true if we are reading the main symbol
464 table (as opposed to a shared lib or dynamically loaded file).
465
466 This function only does the minimum work necessary for letting the
467 user "name" things symbolically; it does not read the entire symtab.
468 Instead, it reads the external and static symbols and puts them in partial
469 symbol tables. When more extensive information is requested of a
470 file, the corresponding partial symbol table is mutated into a full
471 fledged symbol table by going back and reading the symbols
472 for real.
473
474 We look for sections with specific names, to tell us what debug
475 format to look for: FIXME!!!
476
477 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
478 elfstab_build_psymtabs() handles STABS symbols;
479 mdebug_build_psymtabs() handles ECOFF debugging information.
480
481 Note that ELF files have a "minimal" symbol table, which looks a lot
482 like a COFF symbol table, but has only the minimal information necessary
483 for linking. We process this also, and use the information to
484 build gdb's minimal symbol table. This gives us some minimal debugging
485 capability even for files compiled without -g. */
486
487static void
fba45db2 488elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
489{
490 bfd *abfd = objfile->obfd;
491 struct elfinfo ei;
492 struct cleanup *back_to;
493 CORE_ADDR offset;
494
495 init_minimal_symbol_collection ();
56e290f4 496 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
497
498 memset ((char *) &ei, 0, sizeof (ei));
499
500 /* Allocate struct to keep track of the symfile */
501 objfile->sym_stab_info = (struct dbx_symfile_info *)
c5aa993b 502 xmmalloc (objfile->md, sizeof (struct dbx_symfile_info));
c906108c 503 memset ((char *) objfile->sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 504 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
505
506 /* Process the normal ELF symbol table first. This may write some
507 chain of info into the dbx_symfile_info in objfile->sym_stab_info,
508 which can later be used by elfstab_offset_sections. */
509
d4f3574e 510 elf_symtab_read (objfile, 0);
c906108c
SS
511
512 /* Add the dynamic symbols. */
513
d4f3574e 514 elf_symtab_read (objfile, 1);
c906108c 515
7134143f
DJ
516 /* Install any minimal symbols that have been collected as the current
517 minimal symbols for this objfile. The debug readers below this point
518 should not generate new minimal symbols; if they do it's their
519 responsibility to install them. "mdebug" appears to be the only one
520 which will do this. */
521
522 install_minimal_symbols (objfile);
523 do_cleanups (back_to);
524
c906108c
SS
525 /* Now process debugging information, which is contained in
526 special ELF sections. */
527
528 /* If we are reinitializing, or if we have never loaded syms yet,
529 set table to empty. MAINLINE is cleared so that *_read_psymtab
530 functions do not all also re-initialize the psymbol table. */
531 if (mainline)
532 {
533 init_psymbol_list (objfile, 0);
534 mainline = 0;
535 }
536
537 /* We first have to find them... */
12b9c64f 538 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
539
540 /* ELF debugging information is inserted into the psymtab in the
541 order of least informative first - most informative last. Since
542 the psymtab table is searched `most recent insertion first' this
543 increases the probability that more detailed debug information
544 for a section is found.
545
546 For instance, an object file might contain both .mdebug (XCOFF)
547 and .debug_info (DWARF2) sections then .mdebug is inserted first
548 (searched last) and DWARF2 is inserted last (searched first). If
549 we don't do this then the XCOFF info is found first - for code in
550 an included file XCOFF info is useless. */
551
552 if (ei.mdebugsect)
553 {
554 const struct ecoff_debug_swap *swap;
555
556 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 557 information. */
c906108c
SS
558 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
559 if (swap)
d4f3574e 560 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
561 }
562 if (ei.stabsect)
563 {
564 asection *str_sect;
565
566 /* Stab sections have an associated string table that looks like
c5aa993b 567 a separate section. */
c906108c
SS
568 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
569
570 /* FIXME should probably warn about a stab section without a stabstr. */
571 if (str_sect)
572 elfstab_build_psymtabs (objfile,
c906108c 573 mainline,
086df311 574 ei.stabsect,
c906108c
SS
575 str_sect->filepos,
576 bfd_section_size (abfd, str_sect));
577 }
578 if (dwarf2_has_info (abfd))
579 {
580 /* DWARF 2 sections */
d4f3574e 581 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
582 }
583 else if (ei.dboffset && ei.lnoffset)
584 {
585 /* DWARF sections */
586 dwarf_build_psymtabs (objfile,
d4f3574e 587 mainline,
c906108c
SS
588 ei.dboffset, ei.dbsize,
589 ei.lnoffset, ei.lnsize);
590 }
591
625b0b97
AC
592 /* FIXME: kettenis/20030504: This still needs to be integrated with
593 dwarf2read.c in a better way. */
594 dwarf2_build_frame_info (objfile);
c906108c
SS
595}
596
597/* This cleans up the objfile's sym_stab_info pointer, and the chain of
598 stab_section_info's, that might be dangling from it. */
599
600static void
12b9c64f 601free_elfinfo (void *objp)
c906108c 602{
c5aa993b 603 struct objfile *objfile = (struct objfile *) objp;
c906108c
SS
604 struct dbx_symfile_info *dbxinfo = objfile->sym_stab_info;
605 struct stab_section_info *ssi, *nssi;
606
607 ssi = dbxinfo->stab_section_info;
608 while (ssi)
609 {
610 nssi = ssi->next;
aac7f4ea 611 xmfree (objfile->md, ssi);
c906108c
SS
612 ssi = nssi;
613 }
614
615 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
616}
617
618
619/* Initialize anything that needs initializing when a completely new symbol
620 file is specified (not just adding some symbols from another file, e.g. a
621 shared library).
622
623 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
624
625static void
fba45db2 626elf_new_init (struct objfile *ignore)
c906108c
SS
627{
628 stabsread_new_init ();
629 buildsym_new_init ();
630}
631
632/* Perform any local cleanups required when we are done with a particular
633 objfile. I.E, we are in the process of discarding all symbol information
634 for an objfile, freeing up all memory held for it, and unlinking the
635 objfile struct from the global list of known objfiles. */
636
637static void
fba45db2 638elf_symfile_finish (struct objfile *objfile)
c906108c 639{
c5aa993b 640 if (objfile->sym_stab_info != NULL)
c906108c 641 {
aac7f4ea 642 xmfree (objfile->md, objfile->sym_stab_info);
c906108c
SS
643 }
644}
645
646/* ELF specific initialization routine for reading symbols.
647
648 It is passed a pointer to a struct sym_fns which contains, among other
649 things, the BFD for the file whose symbols are being read, and a slot for
650 a pointer to "private data" which we can fill with goodies.
651
652 For now at least, we have nothing in particular to do, so this function is
653 just a stub. */
654
655static void
fba45db2 656elf_symfile_init (struct objfile *objfile)
c906108c
SS
657{
658 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
659 find this causes a significant slowdown in gdb then we could
660 set it in the debug symbol readers only when necessary. */
661 objfile->flags |= OBJF_REORDERED;
662}
663
664/* When handling an ELF file that contains Sun STABS debug info,
665 some of the debug info is relative to the particular chunk of the
666 section that was generated in its individual .o file. E.g.
667 offsets to static variables are relative to the start of the data
668 segment *for that module before linking*. This information is
669 painfully squirreled away in the ELF symbol table as local symbols
670 with wierd names. Go get 'em when needed. */
671
672void
fba45db2 673elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
674{
675 char *filename = pst->filename;
676 struct dbx_symfile_info *dbx = objfile->sym_stab_info;
677 struct stab_section_info *maybe = dbx->stab_section_info;
678 struct stab_section_info *questionable = 0;
679 int i;
680 char *p;
681
682 /* The ELF symbol info doesn't include path names, so strip the path
683 (if any) from the psymtab filename. */
684 while (0 != (p = strchr (filename, '/')))
c5aa993b 685 filename = p + 1;
c906108c
SS
686
687 /* FIXME: This linear search could speed up significantly
688 if it was chained in the right order to match how we search it,
689 and if we unchained when we found a match. */
690 for (; maybe; maybe = maybe->next)
691 {
692 if (filename[0] == maybe->filename[0]
6314a349 693 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
694 {
695 /* We found a match. But there might be several source files
696 (from different directories) with the same name. */
697 if (0 == maybe->found)
698 break;
c5aa993b 699 questionable = maybe; /* Might use it later. */
c906108c
SS
700 }
701 }
702
703 if (maybe == 0 && questionable != 0)
704 {
23136709
KB
705 complaint (&symfile_complaints,
706 "elf/stab section information questionable for %s", filename);
c906108c
SS
707 maybe = questionable;
708 }
709
710 if (maybe)
711 {
712 /* Found it! Allocate a new psymtab struct, and fill it in. */
713 maybe->found++;
714 pst->section_offsets = (struct section_offsets *)
a39a16c4
MM
715 obstack_alloc (&objfile->psymbol_obstack,
716 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
717 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 718 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
719 return;
720 }
721
722 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 723 if (dbx->stab_section_info) /* If there *is* any info, */
23136709
KB
724 complaint (&symfile_complaints,
725 "elf/stab section information missing for %s", filename);
c906108c
SS
726}
727\f
728/* Register that we are able to handle ELF object file formats. */
729
730static struct sym_fns elf_sym_fns =
731{
732 bfd_target_elf_flavour,
c5aa993b
JM
733 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
734 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
735 elf_symfile_read, /* sym_read: read a symbol file into symtab */
736 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 737 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 738 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
739};
740
741void
fba45db2 742_initialize_elfread (void)
c906108c
SS
743{
744 add_symtab_fns (&elf_sym_fns);
745}
This page took 0.384821 seconds and 4 git commands to generate.