2005-02-11 Andrew Cagney <cagney@gnu.org>
[deliverable/binutils-gdb.git] / gdb / elfread.c
CommitLineData
c906108c 1/* Read ELF (Executable and Linking Format) object files for GDB.
1bac305b
AC
2
3 Copyright 1991, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999,
8b92e4d5 4 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc.
1bac305b 5
c906108c
SS
6 Written by Fred Fish at Cygnus Support.
7
c5aa993b 8 This file is part of GDB.
c906108c 9
c5aa993b
JM
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2 of the License, or
13 (at your option) any later version.
c906108c 14
c5aa993b
JM
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
c906108c 19
c5aa993b
JM
20 You should have received a copy of the GNU General Public License
21 along with this program; if not, write to the Free Software
22 Foundation, Inc., 59 Temple Place - Suite 330,
23 Boston, MA 02111-1307, USA. */
c906108c
SS
24
25#include "defs.h"
26#include "bfd.h"
27#include "gdb_string.h"
28#include "elf-bfd.h"
29#include "elf/mips.h"
30#include "symtab.h"
31#include "symfile.h"
32#include "objfiles.h"
33#include "buildsym.h"
34#include "stabsread.h"
35#include "gdb-stabs.h"
36#include "complaints.h"
37#include "demangle.h"
38
a14ed312 39extern void _initialize_elfread (void);
392a587b 40
c906108c 41/* The struct elfinfo is available only during ELF symbol table and
6426a772 42 psymtab reading. It is destroyed at the completion of psymtab-reading.
c906108c
SS
43 It's local to elf_symfile_read. */
44
c5aa993b
JM
45struct elfinfo
46 {
47 file_ptr dboffset; /* Offset to dwarf debug section */
48 unsigned int dbsize; /* Size of dwarf debug section */
49 file_ptr lnoffset; /* Offset to dwarf line number section */
50 unsigned int lnsize; /* Size of dwarf line number section */
51 asection *stabsect; /* Section pointer for .stab section */
52 asection *stabindexsect; /* Section pointer for .stab.index section */
53 asection *mdebugsect; /* Section pointer for .mdebug section */
54 };
c906108c 55
12b9c64f 56static void free_elfinfo (void *);
c906108c
SS
57
58/* We are called once per section from elf_symfile_read. We
59 need to examine each section we are passed, check to see
60 if it is something we are interested in processing, and
61 if so, stash away some access information for the section.
62
63 For now we recognize the dwarf debug information sections and
64 line number sections from matching their section names. The
65 ELF definition is no real help here since it has no direct
66 knowledge of DWARF (by design, so any debugging format can be
67 used).
68
69 We also recognize the ".stab" sections used by the Sun compilers
70 released with Solaris 2.
71
72 FIXME: The section names should not be hardwired strings (what
73 should they be? I don't think most object file formats have enough
74 section flags to specify what kind of debug section it is
75 -kingdon). */
76
77static void
12b9c64f 78elf_locate_sections (bfd *ignore_abfd, asection *sectp, void *eip)
c906108c 79{
52f0bd74 80 struct elfinfo *ei;
c906108c
SS
81
82 ei = (struct elfinfo *) eip;
6314a349 83 if (strcmp (sectp->name, ".debug") == 0)
c906108c 84 {
c5aa993b 85 ei->dboffset = sectp->filepos;
2c500098 86 ei->dbsize = bfd_get_section_size (sectp);
c906108c 87 }
6314a349 88 else if (strcmp (sectp->name, ".line") == 0)
c906108c 89 {
c5aa993b 90 ei->lnoffset = sectp->filepos;
2c500098 91 ei->lnsize = bfd_get_section_size (sectp);
c906108c 92 }
6314a349 93 else if (strcmp (sectp->name, ".stab") == 0)
c906108c 94 {
c5aa993b 95 ei->stabsect = sectp;
c906108c 96 }
6314a349 97 else if (strcmp (sectp->name, ".stab.index") == 0)
c906108c 98 {
c5aa993b 99 ei->stabindexsect = sectp;
c906108c 100 }
6314a349 101 else if (strcmp (sectp->name, ".mdebug") == 0)
c906108c 102 {
c5aa993b 103 ei->mdebugsect = sectp;
c906108c
SS
104 }
105}
106
c906108c 107static struct minimal_symbol *
f594e5e9
MC
108record_minimal_symbol (char *name, CORE_ADDR address,
109 enum minimal_symbol_type ms_type,
110 asection *bfd_section, struct objfile *objfile)
c906108c 111{
bbeae047 112 if (ms_type == mst_text || ms_type == mst_file_text)
181c1381 113 address = SMASH_TEXT_ADDRESS (address);
c906108c
SS
114
115 return prim_record_minimal_symbol_and_info
f594e5e9 116 (name, address, ms_type, NULL, bfd_section->index, bfd_section, objfile);
c906108c
SS
117}
118
119/*
120
c5aa993b 121 LOCAL FUNCTION
c906108c 122
c5aa993b 123 elf_symtab_read -- read the symbol table of an ELF file
c906108c 124
c5aa993b 125 SYNOPSIS
c906108c 126
d4f3574e 127 void elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c 128
c5aa993b 129 DESCRIPTION
c906108c 130
d4f3574e
SS
131 Given an objfile and a flag that specifies whether or not the objfile
132 is for an executable or not (may be shared library for example), add
133 all the global function and data symbols to the minimal symbol table.
c906108c 134
c5aa993b
JM
135 In stabs-in-ELF, as implemented by Sun, there are some local symbols
136 defined in the ELF symbol table, which can be used to locate
137 the beginnings of sections from each ".o" file that was linked to
138 form the executable objfile. We gather any such info and record it
139 in data structures hung off the objfile's private data.
c906108c 140
c5aa993b 141 */
c906108c
SS
142
143static void
fba45db2 144elf_symtab_read (struct objfile *objfile, int dynamic)
c906108c
SS
145{
146 long storage_needed;
147 asymbol *sym;
148 asymbol **symbol_table;
149 long number_of_symbols;
150 long i;
c906108c
SS
151 struct cleanup *back_to;
152 CORE_ADDR symaddr;
d4f3574e 153 CORE_ADDR offset;
c906108c
SS
154 enum minimal_symbol_type ms_type;
155 /* If sectinfo is nonNULL, it contains section info that should end up
156 filed in the objfile. */
157 struct stab_section_info *sectinfo = NULL;
158 /* If filesym is nonzero, it points to a file symbol, but we haven't
159 seen any section info for it yet. */
160 asymbol *filesym = 0;
161#ifdef SOFUN_ADDRESS_MAYBE_MISSING
4a146b47
EZ
162 /* Name of filesym, as saved on the objfile_obstack. */
163 char *filesymname = obsavestring ("", 0, &objfile->objfile_obstack);
c906108c 164#endif
0a6ddd08 165 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
d4f3574e 166 int stripped = (bfd_get_symcount (objfile->obfd) == 0);
c5aa993b 167
c906108c
SS
168 if (dynamic)
169 {
d4f3574e 170 storage_needed = bfd_get_dynamic_symtab_upper_bound (objfile->obfd);
c906108c
SS
171
172 /* Nothing to be done if there is no dynamic symtab. */
173 if (storage_needed < 0)
174 return;
175 }
176 else
177 {
d4f3574e 178 storage_needed = bfd_get_symtab_upper_bound (objfile->obfd);
c906108c 179 if (storage_needed < 0)
8a3fe4f8 180 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
c906108c
SS
181 bfd_errmsg (bfd_get_error ()));
182 }
183 if (storage_needed > 0)
184 {
185 symbol_table = (asymbol **) xmalloc (storage_needed);
b8c9b27d 186 back_to = make_cleanup (xfree, symbol_table);
c906108c 187 if (dynamic)
d4f3574e 188 number_of_symbols = bfd_canonicalize_dynamic_symtab (objfile->obfd,
c906108c
SS
189 symbol_table);
190 else
d4f3574e 191 number_of_symbols = bfd_canonicalize_symtab (objfile->obfd, symbol_table);
c906108c 192 if (number_of_symbols < 0)
8a3fe4f8 193 error (_("Can't read symbols from %s: %s"), bfd_get_filename (objfile->obfd),
c906108c 194 bfd_errmsg (bfd_get_error ()));
b8d39351 195
c906108c
SS
196 for (i = 0; i < number_of_symbols; i++)
197 {
198 sym = symbol_table[i];
c5aa993b 199 if (sym->name == NULL || *sym->name == '\0')
c906108c
SS
200 {
201 /* Skip names that don't exist (shouldn't happen), or names
c5aa993b 202 that are null strings (may happen). */
c906108c
SS
203 continue;
204 }
205
b8d39351 206 offset = ANOFFSET (objfile->section_offsets, sym->section->index);
c906108c 207 if (dynamic
c5aa993b
JM
208 && sym->section == &bfd_und_section
209 && (sym->flags & BSF_FUNCTION))
c906108c
SS
210 {
211 struct minimal_symbol *msym;
212
213 /* Symbol is a reference to a function defined in
c5aa993b
JM
214 a shared library.
215 If its value is non zero then it is usually the address
216 of the corresponding entry in the procedure linkage table,
d4f3574e 217 plus the desired section offset.
c5aa993b
JM
218 If its value is zero then the dynamic linker has to resolve
219 the symbol. We are unable to find any meaningful address
220 for this symbol in the executable file, so we skip it. */
221 symaddr = sym->value;
c906108c
SS
222 if (symaddr == 0)
223 continue;
d4f3574e 224 symaddr += offset;
f594e5e9 225 msym = record_minimal_symbol
c5aa993b 226 ((char *) sym->name, symaddr,
f594e5e9 227 mst_solib_trampoline, sym->section, objfile);
c906108c
SS
228#ifdef SOFUN_ADDRESS_MAYBE_MISSING
229 if (msym != NULL)
230 msym->filename = filesymname;
231#endif
232 continue;
233 }
234
235 /* If it is a nonstripped executable, do not enter dynamic
236 symbols, as the dynamic symbol table is usually a subset
237 of the main symbol table. */
238 if (dynamic && !stripped)
239 continue;
c5aa993b 240 if (sym->flags & BSF_FILE)
c906108c
SS
241 {
242 /* STT_FILE debugging symbol that helps stabs-in-elf debugging.
c5aa993b 243 Chain any old one onto the objfile; remember new sym. */
c906108c
SS
244 if (sectinfo != NULL)
245 {
c5aa993b
JM
246 sectinfo->next = dbx->stab_section_info;
247 dbx->stab_section_info = sectinfo;
c906108c
SS
248 sectinfo = NULL;
249 }
250 filesym = sym;
251#ifdef SOFUN_ADDRESS_MAYBE_MISSING
252 filesymname =
c5aa993b 253 obsavestring ((char *) filesym->name, strlen (filesym->name),
4a146b47 254 &objfile->objfile_obstack);
c906108c
SS
255#endif
256 }
c5aa993b 257 else if (sym->flags & (BSF_GLOBAL | BSF_LOCAL | BSF_WEAK))
c906108c
SS
258 {
259 struct minimal_symbol *msym;
260
261 /* Select global/local/weak symbols. Note that bfd puts abs
c5aa993b
JM
262 symbols in their own section, so all symbols we are
263 interested in will have a section. */
c906108c 264 /* Bfd symbols are section relative. */
c5aa993b 265 symaddr = sym->value + sym->section->vma;
d4f3574e 266 /* Relocate all non-absolute symbols by the section offset. */
c5aa993b 267 if (sym->section != &bfd_abs_section)
c906108c 268 {
d4f3574e 269 symaddr += offset;
c906108c
SS
270 }
271 /* For non-absolute symbols, use the type of the section
c5aa993b
JM
272 they are relative to, to intuit text/data. Bfd provides
273 no way of figuring this out for absolute symbols. */
274 if (sym->section == &bfd_abs_section)
c906108c
SS
275 {
276 /* This is a hack to get the minimal symbol type
11cf8741 277 right for Irix 5, which has absolute addresses
c906108c
SS
278 with special section indices for dynamic symbols. */
279 unsigned short shndx =
c5aa993b 280 ((elf_symbol_type *) sym)->internal_elf_sym.st_shndx;
c906108c
SS
281
282 switch (shndx)
283 {
284 case SHN_MIPS_TEXT:
285 ms_type = mst_text;
286 break;
287 case SHN_MIPS_DATA:
288 ms_type = mst_data;
289 break;
290 case SHN_MIPS_ACOMMON:
291 ms_type = mst_bss;
292 break;
293 default:
294 ms_type = mst_abs;
295 }
296
297 /* If it is an Irix dynamic symbol, skip section name
d4f3574e 298 symbols, relocate all others by section offset. */
c906108c
SS
299 if (ms_type != mst_abs)
300 {
301 if (sym->name[0] == '.')
302 continue;
d4f3574e 303 symaddr += offset;
c906108c
SS
304 }
305 }
c5aa993b 306 else if (sym->section->flags & SEC_CODE)
c906108c 307 {
389e51db 308 if (sym->flags & BSF_GLOBAL)
c906108c
SS
309 {
310 ms_type = mst_text;
311 }
312 else if ((sym->name[0] == '.' && sym->name[1] == 'L')
c5aa993b 313 || ((sym->flags & BSF_LOCAL)
c906108c
SS
314 && sym->name[0] == '$'
315 && sym->name[1] == 'L'))
7fb623f7
AC
316 /* Looks like a compiler-generated label. Skip
317 it. The assembler should be skipping these (to
318 keep executables small), but apparently with
1b831c93
AC
319 gcc on the (deleted) delta m88k SVR4, it loses.
320 So to have us check too should be harmless (but
321 I encourage people to fix this in the assembler
322 instead of adding checks here). */
c906108c 323 continue;
c906108c
SS
324 else
325 {
326 ms_type = mst_file_text;
327 }
328 }
c5aa993b 329 else if (sym->section->flags & SEC_ALLOC)
c906108c 330 {
bbeae047 331 if (sym->flags & (BSF_GLOBAL | BSF_WEAK))
c906108c 332 {
c5aa993b 333 if (sym->section->flags & SEC_LOAD)
c906108c
SS
334 {
335 ms_type = mst_data;
336 }
337 else
338 {
339 ms_type = mst_bss;
340 }
341 }
c5aa993b 342 else if (sym->flags & BSF_LOCAL)
c906108c 343 {
9a90a780 344 /* Named Local variable in a Data section.
66c57289 345 Check its name for stabs-in-elf. */
9a90a780
AC
346 int special_local_sect;
347 if (strcmp ("Bbss.bss", sym->name) == 0)
348 special_local_sect = SECT_OFF_BSS (objfile);
349 else if (strcmp ("Ddata.data", sym->name) == 0)
350 special_local_sect = SECT_OFF_DATA (objfile);
351 else if (strcmp ("Drodata.rodata", sym->name) == 0)
352 special_local_sect = SECT_OFF_RODATA (objfile);
353 else
354 special_local_sect = -1;
355 if (special_local_sect >= 0)
c906108c
SS
356 {
357 /* Found a special local symbol. Allocate a
358 sectinfo, if needed, and fill it in. */
359 if (sectinfo == NULL)
360 {
a39a16c4
MM
361 int max_index;
362 size_t size;
363
364 max_index
365 = max (SECT_OFF_BSS (objfile),
366 max (SECT_OFF_DATA (objfile),
367 SECT_OFF_RODATA (objfile)));
e372db49
JB
368
369 /* max_index is the largest index we'll
370 use into this array, so we must
371 allocate max_index+1 elements for it.
372 However, 'struct stab_section_info'
373 already includes one element, so we
374 need to allocate max_index aadditional
375 elements. */
a39a16c4
MM
376 size = (sizeof (struct stab_section_info)
377 + (sizeof (CORE_ADDR)
e372db49 378 * max_index));
c906108c 379 sectinfo = (struct stab_section_info *)
7936743b 380 xmalloc (size);
a39a16c4
MM
381 memset (sectinfo, 0, size);
382 sectinfo->num_sections = max_index;
c906108c
SS
383 if (filesym == NULL)
384 {
23136709 385 complaint (&symfile_complaints,
e2e0b3e5 386 _("elf/stab section information %s without a preceding file symbol"),
23136709 387 sym->name);
c906108c
SS
388 }
389 else
390 {
c5aa993b
JM
391 sectinfo->filename =
392 (char *) filesym->name;
c906108c
SS
393 }
394 }
9a90a780
AC
395 if (sectinfo->sections[special_local_sect] != 0)
396 complaint (&symfile_complaints,
e2e0b3e5 397 _("duplicated elf/stab section information for %s"),
9a90a780
AC
398 sectinfo->filename);
399 /* BFD symbols are section relative. */
c5aa993b 400 symaddr = sym->value + sym->section->vma;
9a90a780
AC
401 /* Relocate non-absolute symbols by the
402 section offset. */
c5aa993b 403 if (sym->section != &bfd_abs_section)
9a90a780
AC
404 symaddr += offset;
405 sectinfo->sections[special_local_sect] = symaddr;
c906108c 406 /* The special local symbols don't go in the
9a90a780 407 minimal symbol table, so ignore this one. */
c906108c
SS
408 continue;
409 }
410 /* Not a special stabs-in-elf symbol, do regular
9a90a780 411 symbol processing. */
c5aa993b 412 if (sym->section->flags & SEC_LOAD)
c906108c
SS
413 {
414 ms_type = mst_file_data;
415 }
416 else
417 {
418 ms_type = mst_file_bss;
419 }
420 }
421 else
422 {
423 ms_type = mst_unknown;
424 }
425 }
426 else
427 {
428 /* FIXME: Solaris2 shared libraries include lots of
429 odd "absolute" and "undefined" symbols, that play
430 hob with actions like finding what function the PC
431 is in. Ignore them if they aren't text, data, or bss. */
432 /* ms_type = mst_unknown; */
c5aa993b 433 continue; /* Skip this symbol. */
c906108c 434 }
f594e5e9 435 msym = record_minimal_symbol
c5aa993b 436 ((char *) sym->name, symaddr,
f594e5e9
MC
437 ms_type, sym->section, objfile);
438 if (msym)
439 {
440 /* Pass symbol size field in via BFD. FIXME!!! */
441 unsigned long size = ((elf_symbol_type *) sym)->internal_elf_sym.st_size;
442 MSYMBOL_SIZE(msym) = size;
443 }
c906108c
SS
444#ifdef SOFUN_ADDRESS_MAYBE_MISSING
445 if (msym != NULL)
446 msym->filename = filesymname;
447#endif
c5aa993b 448 ELF_MAKE_MSYMBOL_SPECIAL (sym, msym);
c906108c
SS
449 }
450 }
451 do_cleanups (back_to);
452 }
453}
454
455/* Scan and build partial symbols for a symbol file.
456 We have been initialized by a call to elf_symfile_init, which
457 currently does nothing.
458
459 SECTION_OFFSETS is a set of offsets to apply to relocate the symbols
460 in each section. We simplify it down to a single offset for all
461 symbols. FIXME.
462
463 MAINLINE is true if we are reading the main symbol
464 table (as opposed to a shared lib or dynamically loaded file).
465
466 This function only does the minimum work necessary for letting the
467 user "name" things symbolically; it does not read the entire symtab.
468 Instead, it reads the external and static symbols and puts them in partial
469 symbol tables. When more extensive information is requested of a
470 file, the corresponding partial symbol table is mutated into a full
471 fledged symbol table by going back and reading the symbols
472 for real.
473
474 We look for sections with specific names, to tell us what debug
475 format to look for: FIXME!!!
476
477 dwarf_build_psymtabs() builds psymtabs for DWARF symbols;
478 elfstab_build_psymtabs() handles STABS symbols;
479 mdebug_build_psymtabs() handles ECOFF debugging information.
480
481 Note that ELF files have a "minimal" symbol table, which looks a lot
482 like a COFF symbol table, but has only the minimal information necessary
483 for linking. We process this also, and use the information to
484 build gdb's minimal symbol table. This gives us some minimal debugging
485 capability even for files compiled without -g. */
486
487static void
fba45db2 488elf_symfile_read (struct objfile *objfile, int mainline)
c906108c
SS
489{
490 bfd *abfd = objfile->obfd;
491 struct elfinfo ei;
492 struct cleanup *back_to;
493 CORE_ADDR offset;
494
495 init_minimal_symbol_collection ();
56e290f4 496 back_to = make_cleanup_discard_minimal_symbols ();
c906108c
SS
497
498 memset ((char *) &ei, 0, sizeof (ei));
499
500 /* Allocate struct to keep track of the symfile */
0a6ddd08 501 objfile->deprecated_sym_stab_info = (struct dbx_symfile_info *)
7936743b 502 xmalloc (sizeof (struct dbx_symfile_info));
0a6ddd08 503 memset ((char *) objfile->deprecated_sym_stab_info, 0, sizeof (struct dbx_symfile_info));
12b9c64f 504 make_cleanup (free_elfinfo, (void *) objfile);
c906108c
SS
505
506 /* Process the normal ELF symbol table first. This may write some
0a6ddd08 507 chain of info into the dbx_symfile_info in objfile->deprecated_sym_stab_info,
c906108c
SS
508 which can later be used by elfstab_offset_sections. */
509
d4f3574e 510 elf_symtab_read (objfile, 0);
c906108c
SS
511
512 /* Add the dynamic symbols. */
513
d4f3574e 514 elf_symtab_read (objfile, 1);
c906108c 515
7134143f
DJ
516 /* Install any minimal symbols that have been collected as the current
517 minimal symbols for this objfile. The debug readers below this point
518 should not generate new minimal symbols; if they do it's their
519 responsibility to install them. "mdebug" appears to be the only one
520 which will do this. */
521
522 install_minimal_symbols (objfile);
523 do_cleanups (back_to);
524
c906108c
SS
525 /* Now process debugging information, which is contained in
526 special ELF sections. */
527
528 /* If we are reinitializing, or if we have never loaded syms yet,
529 set table to empty. MAINLINE is cleared so that *_read_psymtab
530 functions do not all also re-initialize the psymbol table. */
531 if (mainline)
532 {
533 init_psymbol_list (objfile, 0);
534 mainline = 0;
535 }
536
537 /* We first have to find them... */
12b9c64f 538 bfd_map_over_sections (abfd, elf_locate_sections, (void *) & ei);
c906108c
SS
539
540 /* ELF debugging information is inserted into the psymtab in the
541 order of least informative first - most informative last. Since
542 the psymtab table is searched `most recent insertion first' this
543 increases the probability that more detailed debug information
544 for a section is found.
545
546 For instance, an object file might contain both .mdebug (XCOFF)
547 and .debug_info (DWARF2) sections then .mdebug is inserted first
548 (searched last) and DWARF2 is inserted last (searched first). If
549 we don't do this then the XCOFF info is found first - for code in
550 an included file XCOFF info is useless. */
551
552 if (ei.mdebugsect)
553 {
554 const struct ecoff_debug_swap *swap;
555
556 /* .mdebug section, presumably holding ECOFF debugging
c5aa993b 557 information. */
c906108c
SS
558 swap = get_elf_backend_data (abfd)->elf_backend_ecoff_debug_swap;
559 if (swap)
d4f3574e 560 elfmdebug_build_psymtabs (objfile, swap, ei.mdebugsect);
c906108c
SS
561 }
562 if (ei.stabsect)
563 {
564 asection *str_sect;
565
566 /* Stab sections have an associated string table that looks like
c5aa993b 567 a separate section. */
c906108c
SS
568 str_sect = bfd_get_section_by_name (abfd, ".stabstr");
569
570 /* FIXME should probably warn about a stab section without a stabstr. */
571 if (str_sect)
572 elfstab_build_psymtabs (objfile,
c906108c 573 mainline,
086df311 574 ei.stabsect,
c906108c
SS
575 str_sect->filepos,
576 bfd_section_size (abfd, str_sect));
577 }
c5edf76a 578 if (dwarf2_has_info (objfile))
c906108c
SS
579 {
580 /* DWARF 2 sections */
d4f3574e 581 dwarf2_build_psymtabs (objfile, mainline);
c906108c
SS
582 }
583 else if (ei.dboffset && ei.lnoffset)
584 {
585 /* DWARF sections */
586 dwarf_build_psymtabs (objfile,
d4f3574e 587 mainline,
c906108c
SS
588 ei.dboffset, ei.dbsize,
589 ei.lnoffset, ei.lnsize);
590 }
591
625b0b97
AC
592 /* FIXME: kettenis/20030504: This still needs to be integrated with
593 dwarf2read.c in a better way. */
594 dwarf2_build_frame_info (objfile);
c906108c
SS
595}
596
0a6ddd08
AC
597/* This cleans up the objfile's deprecated_sym_stab_info pointer, and
598 the chain of stab_section_info's, that might be dangling from
599 it. */
c906108c
SS
600
601static void
12b9c64f 602free_elfinfo (void *objp)
c906108c 603{
c5aa993b 604 struct objfile *objfile = (struct objfile *) objp;
0a6ddd08 605 struct dbx_symfile_info *dbxinfo = objfile->deprecated_sym_stab_info;
c906108c
SS
606 struct stab_section_info *ssi, *nssi;
607
608 ssi = dbxinfo->stab_section_info;
609 while (ssi)
610 {
611 nssi = ssi->next;
2dc74dc1 612 xfree (ssi);
c906108c
SS
613 ssi = nssi;
614 }
615
616 dbxinfo->stab_section_info = 0; /* Just say No mo info about this. */
617}
618
619
620/* Initialize anything that needs initializing when a completely new symbol
621 file is specified (not just adding some symbols from another file, e.g. a
622 shared library).
623
624 We reinitialize buildsym, since we may be reading stabs from an ELF file. */
625
626static void
fba45db2 627elf_new_init (struct objfile *ignore)
c906108c
SS
628{
629 stabsread_new_init ();
630 buildsym_new_init ();
631}
632
633/* Perform any local cleanups required when we are done with a particular
634 objfile. I.E, we are in the process of discarding all symbol information
635 for an objfile, freeing up all memory held for it, and unlinking the
636 objfile struct from the global list of known objfiles. */
637
638static void
fba45db2 639elf_symfile_finish (struct objfile *objfile)
c906108c 640{
0a6ddd08 641 if (objfile->deprecated_sym_stab_info != NULL)
c906108c 642 {
0a6ddd08 643 xfree (objfile->deprecated_sym_stab_info);
c906108c
SS
644 }
645}
646
647/* ELF specific initialization routine for reading symbols.
648
649 It is passed a pointer to a struct sym_fns which contains, among other
650 things, the BFD for the file whose symbols are being read, and a slot for
651 a pointer to "private data" which we can fill with goodies.
652
653 For now at least, we have nothing in particular to do, so this function is
654 just a stub. */
655
656static void
fba45db2 657elf_symfile_init (struct objfile *objfile)
c906108c
SS
658{
659 /* ELF objects may be reordered, so set OBJF_REORDERED. If we
660 find this causes a significant slowdown in gdb then we could
661 set it in the debug symbol readers only when necessary. */
662 objfile->flags |= OBJF_REORDERED;
663}
664
665/* When handling an ELF file that contains Sun STABS debug info,
666 some of the debug info is relative to the particular chunk of the
667 section that was generated in its individual .o file. E.g.
668 offsets to static variables are relative to the start of the data
669 segment *for that module before linking*. This information is
670 painfully squirreled away in the ELF symbol table as local symbols
671 with wierd names. Go get 'em when needed. */
672
673void
fba45db2 674elfstab_offset_sections (struct objfile *objfile, struct partial_symtab *pst)
c906108c
SS
675{
676 char *filename = pst->filename;
0a6ddd08 677 struct dbx_symfile_info *dbx = objfile->deprecated_sym_stab_info;
c906108c
SS
678 struct stab_section_info *maybe = dbx->stab_section_info;
679 struct stab_section_info *questionable = 0;
680 int i;
681 char *p;
682
683 /* The ELF symbol info doesn't include path names, so strip the path
684 (if any) from the psymtab filename. */
685 while (0 != (p = strchr (filename, '/')))
c5aa993b 686 filename = p + 1;
c906108c
SS
687
688 /* FIXME: This linear search could speed up significantly
689 if it was chained in the right order to match how we search it,
690 and if we unchained when we found a match. */
691 for (; maybe; maybe = maybe->next)
692 {
693 if (filename[0] == maybe->filename[0]
6314a349 694 && strcmp (filename, maybe->filename) == 0)
c906108c
SS
695 {
696 /* We found a match. But there might be several source files
697 (from different directories) with the same name. */
698 if (0 == maybe->found)
699 break;
c5aa993b 700 questionable = maybe; /* Might use it later. */
c906108c
SS
701 }
702 }
703
704 if (maybe == 0 && questionable != 0)
705 {
23136709 706 complaint (&symfile_complaints,
e2e0b3e5 707 _("elf/stab section information questionable for %s"), filename);
c906108c
SS
708 maybe = questionable;
709 }
710
711 if (maybe)
712 {
713 /* Found it! Allocate a new psymtab struct, and fill it in. */
714 maybe->found++;
715 pst->section_offsets = (struct section_offsets *)
8b92e4d5 716 obstack_alloc (&objfile->objfile_obstack,
a39a16c4
MM
717 SIZEOF_N_SECTION_OFFSETS (objfile->num_sections));
718 for (i = 0; i < maybe->num_sections; i++)
a4c8257b 719 (pst->section_offsets)->offsets[i] = maybe->sections[i];
c906108c
SS
720 return;
721 }
722
723 /* We were unable to find any offsets for this file. Complain. */
c5aa993b 724 if (dbx->stab_section_info) /* If there *is* any info, */
23136709 725 complaint (&symfile_complaints,
e2e0b3e5 726 _("elf/stab section information missing for %s"), filename);
c906108c
SS
727}
728\f
729/* Register that we are able to handle ELF object file formats. */
730
731static struct sym_fns elf_sym_fns =
732{
733 bfd_target_elf_flavour,
c5aa993b
JM
734 elf_new_init, /* sym_new_init: init anything gbl to entire symtab */
735 elf_symfile_init, /* sym_init: read initial info, setup for sym_read() */
736 elf_symfile_read, /* sym_read: read a symbol file into symtab */
737 elf_symfile_finish, /* sym_finish: finished with file, cleanup */
96baa820 738 default_symfile_offsets, /* sym_offsets: Translate ext. to int. relocation */
c5aa993b 739 NULL /* next: pointer to next struct sym_fns */
c906108c
SS
740};
741
742void
fba45db2 743_initialize_elfread (void)
c906108c
SS
744{
745 add_symtab_fns (&elf_sym_fns);
746}
This page took 0.728966 seconds and 4 git commands to generate.